VMX already does so if the host has SMEP, in order to support the combination of
CR0.WP=1 and CR4.SMEP=1. However, it is perfectly safe to always do so, and in
fact VMX already ends up running with EFER.NXE=1 on old processors that lack the
"load EFER" controls, because it may help avoiding a slow MSR write. Removing
all the conditionals simplifies the code.
SVM does not have similar code, but it should since recent AMD processors do
support SMEP. So this patch also makes the code for the two vendors more similar
while fixing NPT=0, CR0.WP=1 and CR4.SMEP=1 on AMD processors.
Cc: stable(a)vger.kernel.org
Cc: Joerg Roedel <jroedel(a)suse.de>
Signed-off-by: Paolo Bonzini <pbonzini(a)redhat.com>
---
arch/x86/kvm/svm.c | 10 ++++++++--
arch/x86/kvm/vmx/vmx.c | 14 +++-----------
2 files changed, 11 insertions(+), 13 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index b6feb6a11a8d..2c452293c7cc 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -732,8 +732,14 @@ static int get_npt_level(struct kvm_vcpu *vcpu)
static void svm_set_efer(struct kvm_vcpu *vcpu, u64 efer)
{
vcpu->arch.efer = efer;
- if (!npt_enabled && !(efer & EFER_LMA))
- efer &= ~EFER_LME;
+
+ if (!npt_enabled) {
+ /* Shadow paging assumes NX to be available. */
+ efer |= EFER_NX;
+
+ if (!(efer & EFER_LMA))
+ efer &= ~EFER_LME;
+ }
to_svm(vcpu)->vmcb->save.efer = efer | EFER_SVME;
mark_dirty(to_svm(vcpu)->vmcb, VMCB_CR);
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 2a2ba277c676..e191d41afb34 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -896,17 +896,9 @@ static bool update_transition_efer(struct vcpu_vmx *vmx, int efer_offset)
u64 guest_efer = vmx->vcpu.arch.efer;
u64 ignore_bits = 0;
- if (!enable_ept) {
- /*
- * NX is needed to handle CR0.WP=1, CR4.SMEP=1. Testing
- * host CPUID is more efficient than testing guest CPUID
- * or CR4. Host SMEP is anyway a requirement for guest SMEP.
- */
- if (boot_cpu_has(X86_FEATURE_SMEP))
- guest_efer |= EFER_NX;
- else if (!(guest_efer & EFER_NX))
- ignore_bits |= EFER_NX;
- }
+ /* Shadow paging assumes NX to be available. */
+ if (!enable_ept)
+ guest_efer |= EFER_NX;
/*
* LMA and LME handled by hardware; SCE meaningless outside long mode.
--
2.21.0
I'm announcing the release of the 4.14.151 kernel.
All users of the 4.14 kernel series must upgrade.
The updated 4.14.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.14.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Documentation/admin-guide/kernel-parameters.txt | 16
Documentation/arm64/cpu-feature-registers.txt | 26
Makefile | 2
arch/arm/boot/dts/am4372.dtsi | 2
arch/arm/mach-omap2/omap_hwmod_33xx_43xx_ipblock_data.c | 3
arch/arm/xen/efi.c | 2
arch/arm64/Kconfig | 1
arch/arm64/include/asm/cpucaps.h | 6
arch/arm64/include/asm/cpufeature.h | 250 +++++++
arch/arm64/include/asm/cputype.h | 43 +
arch/arm64/include/asm/kvm_asm.h | 2
arch/arm64/include/asm/kvm_host.h | 11
arch/arm64/include/asm/processor.h | 22
arch/arm64/include/asm/ptrace.h | 58 +
arch/arm64/include/asm/sysreg.h | 95 ++
arch/arm64/include/asm/virt.h | 6
arch/arm64/include/uapi/asm/hwcap.h | 12
arch/arm64/include/uapi/asm/ptrace.h | 1
arch/arm64/kernel/bpi.S | 19
arch/arm64/kernel/cpu_errata.c | 495 +++++++++------
arch/arm64/kernel/cpufeature.c | 517 +++++++++++-----
arch/arm64/kernel/cpuinfo.c | 12
arch/arm64/kernel/fpsimd.c | 1
arch/arm64/kernel/head.S | 13
arch/arm64/kernel/process.c | 31
arch/arm64/kernel/ptrace.c | 13
arch/arm64/kernel/smp.c | 44 -
arch/arm64/kernel/ssbd.c | 22
arch/arm64/kernel/traps.c | 4
arch/arm64/kvm/hyp/entry.S | 12
arch/arm64/kvm/hyp/switch.c | 10
arch/arm64/kvm/hyp/sysreg-sr.c | 11
arch/arm64/mm/fault.c | 3
arch/arm64/mm/proc.S | 24
arch/mips/boot/dts/qca/ar9331.dtsi | 2
arch/mips/loongson64/common/serial.c | 2
arch/mips/mm/tlbex.c | 23
arch/parisc/mm/ioremap.c | 12
arch/x86/include/asm/kvm_host.h | 4
arch/x86/kernel/head64.c | 22
arch/x86/kvm/lapic.c | 12
arch/x86/kvm/lapic.h | 14
arch/x86/kvm/svm.c | 18
arch/x86/kvm/vmx.c | 79 +-
arch/x86/kvm/x86.c | 32
arch/x86/xen/efi.c | 2
arch/xtensa/kernel/xtensa_ksyms.c | 7
drivers/base/core.c | 3
drivers/base/memory.c | 3
drivers/block/loop.c | 1
drivers/cpufreq/cpufreq.c | 10
drivers/gpu/drm/amd/amdgpu/amdgpu_drv.c | 35 +
drivers/gpu/drm/amd/amdgpu/amdgpu_kms.c | 35 -
drivers/gpu/drm/drm_edid.c | 3
drivers/gpu/drm/radeon/radeon_drv.c | 8
drivers/infiniband/hw/cxgb4/mem.c | 28
drivers/input/misc/da9063_onkey.c | 5
drivers/input/rmi4/rmi_driver.c | 6
drivers/md/raid0.c | 2
drivers/memstick/host/jmb38x_ms.c | 2
drivers/net/dsa/qca8k.c | 4
drivers/net/ethernet/broadcom/genet/bcmgenet.h | 1
drivers/net/ethernet/broadcom/genet/bcmmii.c | 11
drivers/net/ethernet/hisilicon/hns_mdio.c | 6
drivers/net/ethernet/i825xx/lasi_82596.c | 4
drivers/net/ethernet/i825xx/lib82596.c | 4
drivers/net/ethernet/i825xx/sni_82596.c | 4
drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 12
drivers/net/ieee802154/ca8210.c | 2
drivers/net/usb/r8152.c | 3
drivers/net/xen-netback/interface.c | 1
drivers/pci/pci.c | 24
drivers/pinctrl/mvebu/pinctrl-armada-37xx.c | 26
drivers/s390/scsi/zfcp_fsf.c | 16
drivers/scsi/ch.c | 1
drivers/scsi/megaraid.c | 4
drivers/scsi/qla2xxx/qla_target.c | 4
drivers/scsi/scsi_error.c | 3
drivers/scsi/scsi_sysfs.c | 11
drivers/scsi/sd.c | 3
drivers/scsi/ufs/ufshcd.c | 3
drivers/staging/wlan-ng/cfg80211.c | 6
drivers/usb/class/usblp.c | 4
drivers/usb/gadget/udc/lpc32xx_udc.c | 6
drivers/usb/misc/ldusb.c | 20
drivers/usb/misc/legousbtower.c | 5
drivers/usb/serial/ti_usb_3410_5052.c | 10
fs/btrfs/extent-tree.c | 1
fs/cifs/smb1ops.c | 3
fs/ocfs2/journal.c | 3
fs/ocfs2/localalloc.c | 3
fs/proc/page.c | 28
include/scsi/scsi_eh.h | 1
mm/hugetlb.c | 5
mm/page_owner.c | 5
mm/shmem.c | 18
mm/slub.c | 13
net/ipv4/route.c | 9
net/mac80211/debugfs_netdev.c | 11
net/mac80211/mlme.c | 5
net/sched/act_api.c | 13
net/sctp/socket.c | 4
net/wireless/nl80211.c | 3
net/wireless/wext-sme.c | 8
scripts/namespace.pl | 13
sound/pci/hda/patch_realtek.c | 3
sound/soc/sh/rcar/core.c | 1
107 files changed, 1700 insertions(+), 807 deletions(-)
Alessio Balsini (1):
loop: Add LOOP_SET_DIRECT_IO to compat ioctl
Alex Deucher (1):
Revert "drm/radeon: Fix EEH during kexec"
Bart Van Assche (1):
scsi: ch: Make it possible to open a ch device multiple times again
Biao Huang (1):
net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow
Christophe JAILLET (2):
mips: Loongson: Fix the link time qualifier of 'serial_exit()'
memstick: jmb38x_ms: Fix an error handling path in 'jmb38x_ms_probe()'
Colin Ian King (1):
staging: wlan-ng: fix exit return when sme->key_idx >= NUM_WEPKEYS
Damien Le Moal (1):
scsi: core: save/restore command resid for error handling
Dave Martin (1):
arm64: capabilities: Update prototype for enable call back
David Hildenbrand (3):
drivers/base/memory.c: don't access uninitialized memmaps in soft_offline_page_store()
fs/proc/page.c: don't access uninitialized memmaps in fs/proc/page.c
hugetlbfs: don't access uninitialized memmaps in pfn_range_valid_gigantic()
Dongjiu Geng (1):
arm64: v8.4: Support for new floating point multiplication instructions
Eric Dumazet (1):
net: avoid potential infinite loop in tc_ctl_action()
Evan Green (1):
Input: synaptics-rmi4 - avoid processing unknown IRQs
Florian Fainelli (2):
net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3
net: bcmgenet: Set phydev->dev_flags only for internal PHYs
Greg KH (1):
RDMA/cxgb4: Do not dma memory off of the stack
Greg Kroah-Hartman (1):
Linux 4.14.151
Gustavo A. R. Silva (1):
usb: udc: lpc32xx: fix bad bit shift operation
Hans de Goede (1):
drm/amdgpu: Bail earlier when amdgpu.cik_/si_support is not set to 1
Helge Deller (1):
parisc: Fix vmap memory leak in ioremap()/iounmap()
Jacob Keller (1):
namespace: fix namespace.pl script to support relative paths
James Morse (1):
arm64: sysreg: Move to use definitions for all the SCTLR bits
Jeremy Linton (6):
arm64: add sysfs vulnerability show for meltdown
arm64: Always enable ssb vulnerability detection
arm64: Provide a command line to disable spectre_v2 mitigation
arm64: Always enable spectre-v2 vulnerability detection
arm64: add sysfs vulnerability show for spectre-v2
arm64: add sysfs vulnerability show for speculative store bypass
Jim Mattson (2):
kvm: vmx: Introduce lapic_mode enumeration
kvm: vmx: Basic APIC virtualization controls have three settings
Johan Hovold (5):
USB: legousbtower: fix memleak on disconnect
USB: serial: ti_usb_3410_5052: fix port-close races
USB: ldusb: fix memleak on disconnect
USB: usblp: fix use-after-free on disconnect
USB: ldusb: fix read info leaks
Josh Poimboeuf (1):
arm64/speculation: Support 'mitigations=' cmdline option
Juergen Gross (1):
xen/netback: fix error path of xenvif_connect_data()
Junaid Shahid (1):
kvm: apic: Flush TLB after APIC mode/address change if VPIDs are in use
Junya Monden (1):
ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting
Kai-Heng Feng (2):
r8152: Set macpassthru in reset_resume callback
drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50
Kailang Yang (1):
ALSA: hda/realtek - Add support for ALC711
Marc Zyngier (4):
arm64: Get rid of __smccc_workaround_1_hvc_*
arm64: Advertise mitigation of Spectre-v2, or lack thereof
arm64: Force SSBS on context switch
arm64: Use firmware to detect CPUs that are not affected by Spectre-v2
Marco Felsch (1):
Input: da9063 - fix capability and drop KEY_SLEEP
Mark Rutland (5):
arm64: move SCTLR_EL{1,2} assertions to <asm/sysreg.h>
arm64: add PSR_AA32_* definitions
arm64: Introduce sysreg_clear_set()
arm64: don't zero DIT on signal return
arm64: fix SSBS sanitization
Matthew Wilcox (Oracle) (1):
memfd: Fix locking when tagging pins
Max Filippov (1):
xtensa: drop EXPORT_SYMBOL for outs*/ins*
Mian Yousaf Kaukab (2):
arm64: Add sysfs vulnerability show for spectre-v1
arm64: enable generic CPU vulnerabilites support
Miaoqing Pan (2):
nl80211: fix null pointer dereference
mac80211: fix txq null pointer dereference
Michal Vokáč (1):
net: dsa: qca8k: Use up to 7 ports for all operations
Navid Emamdoost (1):
ieee802154: ca8210: prevent memory leak
Oleksij Rempel (1):
MIPS: dts: ar9331: fix interrupt-controller size
Oliver Neukum (1):
scsi: sd: Ignore a failure to sync cache due to lack of authorization
Patrick Williams (2):
pinctrl: armada-37xx: fix control of pins 32 and up
pinctrl: armada-37xx: swap polarity on LED group
Paul Burton (1):
MIPS: tlbex: Fix build_restore_pagemask KScratch restore
Peter Ujfalusi (1):
ARM: dts: am4372: Set memory bandwidth limit for DISPC
Qian Cai (2):
mm/slub: fix a deadlock in show_slab_objects()
mm/page_owner: don't access uninitialized memmaps when reading /proc/pagetypeinfo
Qu Wenruo (1):
btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group()
Quinn Tran (1):
scsi: qla2xxx: Fix unbound sleep in fcport delete path.
Rafael J. Wysocki (2):
cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown
PCI: PM: Fix pci_power_up()
Roberto Bergantinos Corpas (1):
CIFS: avoid using MID 0xFFFF
Ross Lagerwall (1):
xen/efi: Set nonblocking callbacks
Shanker Donthineni (1):
arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening
Song Liu (1):
md/raid0: fix warning message for parameter default_layout
Stanley Chu (1):
scsi: ufs: skip shutdown if hba is not powered
Stefano Brivio (1):
ipv4: Return -ENETUNREACH if we can't create route but saddr is valid
Steffen Maier (1):
scsi: zfcp: fix reaction on bit error threshold notification
Steve Wahl (1):
x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area
Suzuki K Poulose (22):
arm64: Expose support for optional ARMv8-A features
arm64: Fix the feature type for ID register fields
arm64: Documentation: cpu-feature-registers: Remove RES0 fields
arm64: Expose Arm v8.4 features
arm64: capabilities: Move errata work around check on boot CPU
arm64: capabilities: Move errata processing code
arm64: capabilities: Prepare for fine grained capabilities
arm64: capabilities: Add flags to handle the conflicts on late CPU
arm64: capabilities: Unify the verification
arm64: capabilities: Filter the entries based on a given mask
arm64: capabilities: Prepare for grouping features and errata work arounds
arm64: capabilities: Split the processing of errata work arounds
arm64: capabilities: Allow features based on local CPU scope
arm64: capabilities: Group handling of features and errata workarounds
arm64: capabilities: Introduce weak features based on local CPU
arm64: capabilities: Restrict KPTI detection to boot-time CPUs
arm64: capabilities: Add support for features enabled early
arm64: capabilities: Change scope of VHE to Boot CPU feature
arm64: capabilities: Clean up midr range helpers
arm64: Add helpers for checking CPU MIDR against a range
arm64: Add MIDR encoding for Arm Cortex-A55 and Cortex-A35
arm64: capabilities: Add support for checks based on a list of MIDRs
Thomas Bogendoerfer (1):
net: i82596: fix dma_alloc_attr for sni_82596
Tony Lindgren (1):
ARM: OMAP2+: Fix missing reset done flag for am3 and am43
Wanpeng Li (1):
KVM: X86: introduce invalidate_gpa argument to tlb flush
Will Deacon (6):
arm64: cpufeature: Detect SSBS and advertise to userspace
arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3
KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe
arm64: ssbs: Don't treat CPUs with SSBS as unaffected by SSB
cfg80211: wext: avoid copying malformed SSIDs
mac80211: Reject malformed SSID elements
Xiang Chen (1):
scsi: megaraid: disable device when probe failed after enabled device
Xin Long (1):
sctp: change sctp_prot .no_autobind with true
Yi Li (1):
ocfs2: fix panic due to ocfs2_wq is null
Yizhuo (1):
net: hisilicon: Fix usage of uninitialized variable in function mdio_sc_cfg_reg_write()
Yufen Yu (1):
scsi: core: try to get module before removing device
From: Remi Pommarel <repk(a)triplefau.lt>
[ Upstream commit de10ac47597e7a3596b27631d0d5ce5f48d2c099 ]
meson_saradc's irq handler uses priv->regmap so make sure that it is
allocated before the irq get enabled.
This also fixes crash when CONFIG_DEBUG_SHIRQ is enabled, as device
managed resources are freed in the inverted order they had been
allocated, priv->regmap was freed before the spurious fake irq that
CONFIG_DEBUG_SHIRQ adds called the handler.
Fixes: 3af109131b7eb8 ("iio: adc: meson-saradc: switch from polling to interrupt mode")
Reported-by: Elie Roudninski <xademax(a)gmail.com>
Signed-off-by: Remi Pommarel <repk(a)triplefau.lt>
Reviewed-by: Martin Blumenstingl <martin.blumenstingl(a)googlemail.com>
Tested-by: Elie ROUDNINSKI <xademax(a)gmail.com>
Reviewed-by: Kevin Hilman <khilman(a)baylibre.com>
Signed-off-by: Jonathan Cameron <Jonathan.Cameron(a)huawei.com>
Signed-off-by: Sasha Levin <sashal(a)kernel.org>
---
drivers/iio/adc/meson_saradc.c | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/drivers/iio/adc/meson_saradc.c b/drivers/iio/adc/meson_saradc.c
index 7b28d045d2719..7b27306330a35 100644
--- a/drivers/iio/adc/meson_saradc.c
+++ b/drivers/iio/adc/meson_saradc.c
@@ -1219,6 +1219,11 @@ static int meson_sar_adc_probe(struct platform_device *pdev)
if (IS_ERR(base))
return PTR_ERR(base);
+ priv->regmap = devm_regmap_init_mmio(&pdev->dev, base,
+ priv->param->regmap_config);
+ if (IS_ERR(priv->regmap))
+ return PTR_ERR(priv->regmap);
+
irq = irq_of_parse_and_map(pdev->dev.of_node, 0);
if (!irq)
return -EINVAL;
@@ -1228,11 +1233,6 @@ static int meson_sar_adc_probe(struct platform_device *pdev)
if (ret)
return ret;
- priv->regmap = devm_regmap_init_mmio(&pdev->dev, base,
- priv->param->regmap_config);
- if (IS_ERR(priv->regmap))
- return PTR_ERR(priv->regmap);
-
priv->clkin = devm_clk_get(&pdev->dev, "clkin");
if (IS_ERR(priv->clkin)) {
dev_err(&pdev->dev, "failed to get clkin\n");
--
2.20.1
This is a note to let you know that I've just added the patch titled
USB: gadget: Reject endpoints with 0 maxpacket value
to my usb git tree which can be found at
git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git
in the usb-linus branch.
The patch will show up in the next release of the linux-next tree
(usually sometime within the next 24 hours during the week.)
The patch will hopefully also be merged in Linus's tree for the
next -rc kernel release.
If you have any questions about this process, please let me know.
>From 54f83b8c8ea9b22082a496deadf90447a326954e Mon Sep 17 00:00:00 2001
From: Alan Stern <stern(a)rowland.harvard.edu>
Date: Mon, 28 Oct 2019 10:54:26 -0400
Subject: USB: gadget: Reject endpoints with 0 maxpacket value
Endpoints with a maxpacket length of 0 are probably useless. They
can't transfer any data, and it's not at all unlikely that a UDC will
crash or hang when trying to handle a non-zero-length usb_request for
such an endpoint. Indeed, dummy-hcd gets a divide error when trying
to calculate the remainder of a transfer length by the maxpacket
value, as discovered by the syzbot fuzzer.
Currently the gadget core does not check for endpoints having a
maxpacket value of 0. This patch adds a check to usb_ep_enable(),
preventing such endpoints from being used.
As far as I know, none of the gadget drivers in the kernel tries to
create an endpoint with maxpacket = 0, but until now there has been
nothing to prevent userspace programs under gadgetfs or configfs from
doing it.
Signed-off-by: Alan Stern <stern(a)rowland.harvard.edu>
Reported-and-tested-by: syzbot+8ab8bf161038a8768553(a)syzkaller.appspotmail.com
CC: <stable(a)vger.kernel.org>
Acked-by: Felipe Balbi <balbi(a)kernel.org>
Link: https://lore.kernel.org/r/Pine.LNX.4.44L0.1910281052370.1485-100000@iolanth…
Signed-off-by: Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
---
drivers/usb/gadget/udc/core.c | 11 +++++++++++
1 file changed, 11 insertions(+)
diff --git a/drivers/usb/gadget/udc/core.c b/drivers/usb/gadget/udc/core.c
index 92af8dc98c3d..51fa614b4079 100644
--- a/drivers/usb/gadget/udc/core.c
+++ b/drivers/usb/gadget/udc/core.c
@@ -98,6 +98,17 @@ int usb_ep_enable(struct usb_ep *ep)
if (ep->enabled)
goto out;
+ /* UDC drivers can't handle endpoints with maxpacket size 0 */
+ if (usb_endpoint_maxp(ep->desc) == 0) {
+ /*
+ * We should log an error message here, but we can't call
+ * dev_err() because there's no way to find the gadget
+ * given only ep.
+ */
+ ret = -EINVAL;
+ goto out;
+ }
+
ret = ep->ops->enable(ep, ep->desc);
if (ret)
goto out;
--
2.23.0
PRCM_PWROFF_GATING_REG has CPU0 at bit 4 on A83T. So without this
patch, instead of gating the CPU0, the whole cluster was power gated,
when shutting down first CPU in the cluster.
Fixes: 6961275e72a8c1 ("ARM: sun8i: smp: Add support for A83T")
Signed-off-by: Ondrej Jirman <megous(a)megous.com>
Cc: stable(a)vger.kernel.org
---
arch/arm/mach-sunxi/mc_smp.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/arch/arm/mach-sunxi/mc_smp.c b/arch/arm/mach-sunxi/mc_smp.c
index 239084cf8192..26cbce135338 100644
--- a/arch/arm/mach-sunxi/mc_smp.c
+++ b/arch/arm/mach-sunxi/mc_smp.c
@@ -481,14 +481,18 @@ static void sunxi_mc_smp_cpu_die(unsigned int l_cpu)
static int sunxi_cpu_powerdown(unsigned int cpu, unsigned int cluster)
{
u32 reg;
+ int gating_bit = cpu;
pr_debug("%s: cluster %u cpu %u\n", __func__, cluster, cpu);
if (cpu >= SUNXI_CPUS_PER_CLUSTER || cluster >= SUNXI_NR_CLUSTERS)
return -EINVAL;
+ if (is_a83t && cpu == 0)
+ gating_bit = 4;
+
/* gate processor power */
reg = readl(prcm_base + PRCM_PWROFF_GATING_REG(cluster));
- reg |= PRCM_PWROFF_GATING_REG_CORE(cpu);
+ reg |= PRCM_PWROFF_GATING_REG_CORE(gating_bit);
writel(reg, prcm_base + PRCM_PWROFF_GATING_REG(cluster));
udelay(20);
--
2.23.0
Hello,
We ran automated tests on a recent commit from this kernel tree:
Kernel repo: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
Commit: 740177dc0d52 - Linux 5.3.8-rc1
The results of these automated tests are provided below.
Overall result: FAILED (see details below)
Merge: OK
Compile: OK
Tests: FAILED
All kernel binaries, config files, and logs are available for download here:
https://artifacts.cki-project.org/pipelines/251766
One or more kernel tests failed:
ppc64le:
❌ xfstests: ext4
❌ xfstests: xfs
aarch64:
❌ xfstests: ext4
❌ xfstests: xfs
x86_64:
❌ Memory function: kaslr
❌ xfstests: ext4
❌ xfstests: xfs
We hope that these logs can help you find the problem quickly. For the full
detail on our testing procedures, please scroll to the bottom of this message.
Please reply to this email if you have any questions about the tests that we
ran or if you have any suggestions on how to make future tests more effective.
,-. ,-.
( C ) ( K ) Continuous
`-',-.`-' Kernel
( I ) Integration
`-'
______________________________________________________________________________
Compile testing
---------------
We compiled the kernel for 3 architectures:
aarch64:
make options: -j30 INSTALL_MOD_STRIP=1 targz-pkg
ppc64le:
make options: -j30 INSTALL_MOD_STRIP=1 targz-pkg
x86_64:
make options: -j30 INSTALL_MOD_STRIP=1 targz-pkg
Hardware testing
----------------
We booted each kernel and ran the following tests:
aarch64:
Host 1:
✅ Boot test
❌ xfstests: ext4
❌ xfstests: xfs
✅ selinux-policy: serge-testsuite
✅ lvm thinp sanity
✅ storage: software RAID testing
🚧 ✅ Storage blktests
Host 2:
✅ Boot test
✅ Podman system integration test (as root)
✅ Podman system integration test (as user)
✅ LTP lite
✅ Loopdev Sanity
✅ jvm test suite
✅ Memory function: memfd_create
✅ Memory function: kaslr
✅ AMTU (Abstract Machine Test Utility)
✅ LTP: openposix test suite
✅ Ethernet drivers sanity
✅ Networking MACsec: sanity
✅ Networking socket: fuzz
✅ Networking sctp-auth: sockopts test
✅ Networking: igmp conformance test
✅ Networking route: pmtu
✅ Networking TCP: keepalive test
✅ Networking UDP: socket
✅ Networking tunnel: geneve basic test
✅ Networking tunnel: gre basic
✅ Networking tunnel: vxlan basic
✅ audit: audit testsuite test
✅ httpd: mod_ssl smoke sanity
✅ iotop: sanity
✅ tuned: tune-processes-through-perf
✅ ALSA PCM loopback test
✅ ALSA Control (mixer) Userspace Element test
✅ Usex - version 1.9-29
✅ storage: SCSI VPD
✅ stress: stress-ng
✅ trace: ftrace/tracer
🚧 ✅ CIFS Connectathon
🚧 ✅ POSIX pjd-fstest suites
🚧 ✅ Networking bridge: sanity
🚧 ✅ Networking route_func: local
✅ Networking route_func: forward
🚧 ✅ L2TP basic test
🚧 ✅ Networking vnic: ipvlan/basic
🚧 ✅ storage: dm/common
🚧 ✅ Networking ipsec: basic netns transport
🚧 ✅ Networking ipsec: basic netns tunnel
ppc64le:
Host 1:
✅ Boot test
❌ xfstests: ext4
❌ xfstests: xfs
✅ selinux-policy: serge-testsuite
✅ lvm thinp sanity
✅ storage: software RAID testing
🚧 ✅ Storage blktests
Host 2:
✅ Boot test
✅ Podman system integration test (as root)
✅ Podman system integration test (as user)
✅ LTP lite
✅ Loopdev Sanity
✅ jvm test suite
✅ Memory function: memfd_create
✅ Memory function: kaslr
✅ AMTU (Abstract Machine Test Utility)
✅ LTP: openposix test suite
✅ Ethernet drivers sanity
✅ Networking MACsec: sanity
✅ Networking socket: fuzz
✅ Networking sctp-auth: sockopts test
✅ Networking route: pmtu
✅ Networking TCP: keepalive test
✅ Networking UDP: socket
✅ Networking tunnel: geneve basic test
✅ Networking tunnel: gre basic
✅ Networking tunnel: vxlan basic
✅ audit: audit testsuite test
✅ httpd: mod_ssl smoke sanity
✅ iotop: sanity
✅ tuned: tune-processes-through-perf
✅ ALSA PCM loopback test
✅ ALSA Control (mixer) Userspace Element test
✅ Usex - version 1.9-29
✅ trace: ftrace/tracer
🚧 ✅ CIFS Connectathon
🚧 ✅ POSIX pjd-fstest suites
🚧 ✅ Networking bridge: sanity
🚧 ✅ Networking route_func: local
✅ Networking route_func: forward
🚧 ✅ L2TP basic test
🚧 ✅ Networking ipsec: basic netns tunnel
🚧 ✅ Networking vnic: ipvlan/basic
🚧 ✅ storage: dm/common
x86_64:
Host 1:
✅ Boot test
🚧 ✅ IPMI driver test
🚧 ✅ IPMItool loop stress test
Host 2:
⚡ Internal infrastructure issues prevented one or more tests (marked
with ⚡⚡⚡) from running on this architecture.
This is not the fault of the kernel that was tested.
✅ Boot test
✅ Podman system integration test (as root)
✅ Podman system integration test (as user)
⚡⚡⚡ LTP lite
✅ Loopdev Sanity
✅ jvm test suite
✅ Memory function: memfd_create
❌ Memory function: kaslr
✅ AMTU (Abstract Machine Test Utility)
✅ LTP: openposix test suite
✅ Ethernet drivers sanity
✅ Networking MACsec: sanity
✅ Networking socket: fuzz
✅ Networking sctp-auth: sockopts test
✅ Networking: igmp conformance test
✅ Networking route: pmtu
✅ Networking TCP: keepalive test
✅ Networking UDP: socket
✅ Networking tunnel: geneve basic test
✅ Networking tunnel: gre basic
✅ Networking tunnel: vxlan basic
✅ audit: audit testsuite test
✅ httpd: mod_ssl smoke sanity
✅ iotop: sanity
✅ tuned: tune-processes-through-perf
✅ pciutils: sanity smoke test
✅ ALSA PCM loopback test
✅ ALSA Control (mixer) Userspace Element test
✅ Usex - version 1.9-29
✅ storage: SCSI VPD
✅ stress: stress-ng
✅ trace: ftrace/tracer
🚧 ✅ CIFS Connectathon
🚧 ✅ POSIX pjd-fstest suites
🚧 ✅ Networking bridge: sanity
🚧 ✅ Networking route_func: local
✅ Networking route_func: forward
🚧 ✅ L2TP basic test
🚧 ✅ Networking vnic: ipvlan/basic
🚧 ✅ storage: dm/common
🚧 ✅ Networking ipsec: basic netns transport
🚧 ✅ Networking ipsec: basic netns tunnel
Host 3:
✅ Boot test
❌ xfstests: ext4
❌ xfstests: xfs
✅ selinux-policy: serge-testsuite
✅ lvm thinp sanity
✅ storage: software RAID testing
🚧 ✅ IOMMU boot test
🚧 ❌ Storage blktests
Test sources: https://github.com/CKI-project/tests-beaker
💚 Pull requests are welcome for new tests or improvements to existing tests!
Waived tests
------------
If the test run included waived tests, they are marked with 🚧. Such tests are
executed but their results are not taken into account. Tests are waived when
their results are not reliable enough, e.g. when they're just introduced or are
being fixed.
Testing timeout
---------------
We aim to provide a report within reasonable timeframe. Tests that haven't
finished running are marked with ⏱. Reports for non-upstream kernels have
a Beaker recipe linked to next to each host.