Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4161531pxv; Mon, 19 Jul 2021 18:54:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzh1WJcwrjpaPzNQxm2OywR4v8fgLllVtuOSooMOYPN1HUYgceXAzBCPfq9GbmXsMoZWPBD X-Received: by 2002:a50:8d4e:: with SMTP id t14mr27931090edt.138.1626746065784; Mon, 19 Jul 2021 18:54:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626746065; cv=none; d=google.com; s=arc-20160816; b=BZ5kGeZpgpSDD3ROt1QexlSBbj/F+vTq5qMOS6M9zI8GDPQjToq+PX6HswwPbrZPxk F2yjWx6Ir534VhPeFFHsvcQ5HAN4tcY46nJN3yY0VXbDLDe4FilbsWAwjYdcxnMyefO2 LPYzEtywzDU4dBan/GTHMwBdyjIqXWFsL1dWdXkhAJtM4dbAtcvX4cgYTl4jcLhFXxzh er66jw03Ne5PPb8hIijkhjCPsc/OstvVzjOCj0XCp8wosq3oNI+C688d9LwMxohuYBFO GV3m9sX6epTSKCmV7EEBH/h0OOywXUzRhHEs3ZmboisDJtWt/kDlr7HDeKrESRwLDoej QUzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Cu1GhOuF0GLKiB4YycFt0ACix9/nj8fbGi3CipZP8g8=; b=GPcrivfKSPrdaTZ3UOj5RGT0P2Y1/K7XU+0TEI8swHKR0KL+lQRe9sKrTsWJyuaWj9 aRfJG4j+6S21vtf51lWDCcHXwQ0o1PlVC6YSuBv19cX+++TclABl5+eetcKpgrU2edLG /KmtJbxe6ehEdG0TK7AxT/l23r2jSfuDSRgHVNYr0+OZ4Alt2RNb1gT0EheD4f0iFDA9 cgfZtN7sMBbjQqqFZf/mqEVTCsQDTulirWcRlf6UJlARDwgSZedVESgrq0Zv+bIVL44F YNQi8OVr5Z6Qnvm8Lxy1xfzJoZnnqDhNKydElICGKEjZObculhS8x5SIvYeN6h78Qz05 Yl5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="u/Z+86Fs"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v8si23397920edt.425.2021.07.19.18.54.02; Mon, 19 Jul 2021 18:54:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="u/Z+86Fs"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345475AbhGSPJX (ORCPT + 99 others); Mon, 19 Jul 2021 11:09:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:40454 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245414AbhGSOr3 (ORCPT ); Mon, 19 Jul 2021 10:47:29 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3BB6761380; Mon, 19 Jul 2021 15:23:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626708237; bh=lK1OJcXdg459ZhteeF7voycMQlelBiJ59v0OFlhME6I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u/Z+86FsXEYw1Pq9v/Pq2dow6gBnoyugA74yNgyubjeppvW4lbBfKwn5xNnB7CTpu qpkSFl/GkPY/q3hE87tQl2ov7zFHN6QbCvVT6IpPKI3usjZMXaPZuJvGrK2TBC/nve aVJ0TqJmB+5Eha3VZkTeBId8PCH4HA8J9NkrTwBY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Petr Pavlu , Corey Minyard Subject: [PATCH 4.14 217/315] ipmi/watchdog: Stop watchdog timer when the current action is none Date: Mon, 19 Jul 2021 16:51:46 +0200 Message-Id: <20210719144950.567817714@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144942.861561397@linuxfoundation.org> References: <20210719144942.861561397@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Petr Pavlu commit 2253042d86f57d90a621ac2513a7a7a13afcf809 upstream. When an IPMI watchdog timer is being stopped in ipmi_close() or ipmi_ioctl(WDIOS_DISABLECARD), the current watchdog action is updated to WDOG_TIMEOUT_NONE and _ipmi_set_timeout(IPMI_SET_TIMEOUT_NO_HB) is called to install this action. The latter function ends up invoking __ipmi_set_timeout() which makes the actual 'Set Watchdog Timer' IPMI request. For IPMI 1.0, this operation results in fully stopping the watchdog timer. For IPMI >= 1.5, function __ipmi_set_timeout() always specifies the "don't stop" flag in the prepared 'Set Watchdog Timer' IPMI request. This causes that the watchdog timer has its action correctly updated to 'none' but the timer continues to run. A problem is that IPMI firmware can then still log an expiration event when the configured timeout is reached, which is unexpected because the watchdog timer was requested to be stopped. The patch fixes this problem by not setting the "don't stop" flag in __ipmi_set_timeout() when the current action is WDOG_TIMEOUT_NONE which results in stopping the watchdog timer. This makes the behaviour for IPMI >= 1.5 consistent with IPMI 1.0. It also matches the logic in __ipmi_heartbeat() which does not allow to reset the watchdog if the current action is WDOG_TIMEOUT_NONE as that would start the timer. Signed-off-by: Petr Pavlu Message-Id: <10a41bdc-9c99-089c-8d89-fa98ce5ea080@suse.com> Cc: stable@vger.kernel.org Signed-off-by: Corey Minyard Signed-off-by: Greg Kroah-Hartman --- drivers/char/ipmi/ipmi_watchdog.c | 22 ++++++++++++---------- 1 file changed, 12 insertions(+), 10 deletions(-) --- a/drivers/char/ipmi/ipmi_watchdog.c +++ b/drivers/char/ipmi/ipmi_watchdog.c @@ -394,16 +394,18 @@ static int i_ipmi_set_timeout(struct ipm data[0] = 0; WDOG_SET_TIMER_USE(data[0], WDOG_TIMER_USE_SMS_OS); - if ((ipmi_version_major > 1) - || ((ipmi_version_major == 1) && (ipmi_version_minor >= 5))) { - /* This is an IPMI 1.5-only feature. */ - data[0] |= WDOG_DONT_STOP_ON_SET; - } else if (ipmi_watchdog_state != WDOG_TIMEOUT_NONE) { - /* - * In ipmi 1.0, setting the timer stops the watchdog, we - * need to start it back up again. - */ - hbnow = 1; + if (ipmi_watchdog_state != WDOG_TIMEOUT_NONE) { + if ((ipmi_version_major > 1) || + ((ipmi_version_major == 1) && (ipmi_version_minor >= 5))) { + /* This is an IPMI 1.5-only feature. */ + data[0] |= WDOG_DONT_STOP_ON_SET; + } else { + /* + * In ipmi 1.0, setting the timer stops the watchdog, we + * need to start it back up again. + */ + hbnow = 1; + } } data[1] = 0;