Date   

[ANNOUNCE] Release v4.19.257-cip81 and v5.10.140-cip16

Nobuhiro Iwamatsu
 

Hi,

CIP kernel team has released Linux kernel v4.19.257-cip81 and v5.10.140-cip16 The linux-4.19.y-cip tree has been updated base version from v4.19.256 to v4.19.257, and the linux-5.10.y-cip tree has been updated base version from v5.10.138 to v5.10.140.
RZ/G2UL SoC and reference board support have been added to 5.10.y-cip tree with this update.

You can get this release via the git tree at:

v4.19.257-cip81:
repository:
https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
branch:
linux-4.19.y-cip
commit hash:
16d8368674cebd6b5d9a4b7317c0837f0a24eb5b
Fixed CVEs:
None
added commits:
CIP: Bump version suffix to -cip81 after merge from stable
drm: rcar-du: Fix Alpha blending issue on Gen3

v5.10.140-cip16:
repository:
https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
branch:
linux-5.10.y-cip
commit hash:
e972e58dc6d8823515d89143ffc10d6dd7c9e621
Fixed CVEs:
CVE-2022-39190: netfilter: nf_tables: disallow binding to already bound chain
CVE-2022-3028: af_key: Do not call xfrm_probe_algs in parallel
CVE-2022-2905: bpf: Don't use tnum_range on array range checking for poke descriptors
added commits:
CIP: Bump version suffix to -cip16 after merge from stable
drm: rcar-du: Fix Alpha blending issue on Gen3
arm64: dts: renesas: rzg2ul-smarc-som: Enable ADC on SMARC platform
arm64: dts: renesas: rzg2ul-smarc: Enable RSPI1 on carrier board
arm64: dts: renesas: r9a07g043: Add ADC node
arm64: dts: renesas: r9a07g043: Add SPI Multi I/O Bus controller node
arm64: dts: renesas: r9a07g043: Create thermal zone to support IPA
arm64: dts: renesas: r9a07g043: Add TSU node
arm64: dts: renesas: r9a07g043: Add OPP table
arm64: dts: renesas: r9a07g043: Add RSPI{0,1,2} nodes
arm64: dts: renesas: rzg2ul-smarc: Enable USB2.0 support
arm64: dts: renesas: rzg2ul-smarc: Enable Audio
arm64: dts: renesas: rzg2l-smarc: Move ssi0 and cpu sound_dai nodes from common dtsi
arm64: dts: renesas: rzg2ul-smarc-som: Enable watchdog
arm64: dts: renesas: rzg2ul-smarc-som: Enable OSTM
arm64: dts: renesas: rzg2ul-smarc: Enable CANFD
arm64: dts: renesas: rzg2ul-smarc: Enable i2c{0,1} and wm8978
arm64: dts: renesas: r9a07g043: Fillup the WDT{0,2} stub nodes
arm64: dts: renesas: r9a07g043: Fillup the OSTM{0,1,2} stub nodes
arm64: dts: renesas: r9a07g043: Fillup the CANFD stub node
arm64: dts: renesas: r9a07g043: Add USB2.0 support
arm64: dts: renesas: r9a07g043: Add SSI{1,2,3} nodes and fillup the SSI0 stub node
arm64: dts: renesas: r9a07g043: Add I2C2 node and fillup the I2C{0,1,3} stub nodes
clk: renesas: r9a07g043: Add clock and reset entries for ADC
clk: renesas: r9a07g043: Add TSU clock and reset entry
clk: renesas: r9a07g043: Add RSPI clock and reset entries
clk: renesas: r9a07g043: Add clock and reset entries for SPI Multi I/O Bus Controller
dt-bindings: reset: renesas,rzg2l-usbphy-ctrl: Document RZ/G2UL USBPHY Control bindings
dt-bindings: iio: adc: Document Renesas RZ/G2UL ADC
dt-bindings: iio: adc: Document Renesas RZ/V2L ADC
ASoC: dt-bindings: renesas,rz-ssi: Document RZ/G2UL SoC
dt-bindings: watchdog: renesas,wdt: Document RZ/G2UL SoC
dt-bindings: thermal: rzg2l-thermal: Document RZ/G2UL bindings
dt-bindings: memory: renesas,rpc-if: Document RZ/G2UL SoC
spi: dt-bindings: renesas,rspi: Document RZ/G2UL SoC
dt-bindings: phy: renesas,usb2-phy: Document RZ/G2UL phy bindings
dt-bindings: can: renesas,rcar-canfd: Document RZ/G2UL support
dt-bindings: usb: renesas,usbhs: Document RZ/G2UL bindings
dt-bindings: i2c: renesas,riic: Document RZ/G2UL SoC
dt-bindings: timer: renesas: ostm: Document Renesas RZ/G2UL OSTM
arm64: dts: renesas: rzg2ul-smarc-som: Enable Ethernet on SMARC platform
arm64: dts: renesas: rzg2ul-smarc-som: Enable eMMC on SMARC platform
arm64: dts: renesas: rzg2ul-smarc: Enable microSD on SMARC platform
arm64: defconfig: Enable ARCH_R9A07G043
arm64: dts: renesas: r9a07g043: Add GbEthernet nodes
arm64: dts: renesas: r9a07g043: Add SDHI nodes
arm64: dts: renesas: rzg2ul-smarc: Add scif0 and audio clk pins
arm64: dts: renesas: r9a07g043: Fillup the pinctrl stub node
arm64: dts: renesas: Add initial device tree for RZ/G2UL Type-1 SMARC EVK
arm64: dts: renesas: Add initial DTSI for RZ/G2UL SoC
pinctrl: renesas: rzg2l: Return -EINVAL for pins which have input disabled
pinctrl: renesas: rzg2l: Restore pin config order
pinctrl: renesas: rzg2l: Add RZ/G2UL support
clk: renesas: r9a07g043: Add WDT clock and reset entries
clk: renesas: r9a07g043: Add OSTM clock and reset entries
clk: renesas: r9a07g043: Add clock and reset entries for CANFD
clk: renesas: r9a07g043: Add USB clocks/resets
clk: renesas: r9a07g043: Add SSIF-2 clock and reset entries
clk: renesas: r9a07g043: Add I2C clocks/resets
clk: renesas: r9a07g043: Add SDHI clock and reset entries
clk: renesas: r9a07g043: Add GbEthernet clock/reset
clk: renesas: r9a07g043: Add ethernet clock sources
clk: renesas: r9a07g043: Add GPIO clock and reset entries
clk: renesas: Add support for RZ/G2UL SoC
soc: renesas: Identify RZ/G2UL SoC
dt-bindings: clock: Add R9A07G043 CPG Clock and Reset Definitions
dt-bindings: net: renesas,etheravb: Document RZ/G2UL SoC
dt-bindings: mmc: renesas,sdhi: Document RZ/G2UL SoC
dt-bindings: dma: rz-dmac: Document RZ/G2UL SoC
dt-bindings: serial: renesas,sci: Document RZ/G2UL SoC
dt-bindings: serial: renesas,scif: Document RZ/G2UL SoC
dt-bindings: pinctrl: renesas: Document RZ/G2UL pinctrl
dt-bindings: clock: renesas: Document RZ/G2UL SoC
dt-bindings: power: renesas,rzg2l-sysc: Document RZ/G2UL SoC
dt-bindings: arm: renesas: Document Renesas RZ/G2UL SMARC EVK
dt-bindings: arm: renesas: Document Renesas RZ/V2L SoC on SMARC EVK

Best regards,
Nobuhiro


[isar-cip-core 2/2] cip-core-image-security.bb: Add duplicity package to enable IEC requirement

sai.sathujoda@...
 

From: Sai <Sai.Sathujoda@...>

Duplicity package provides below features in order to implement IEC
requirement "Control System Backup"
1. Backup and restore
2. Encryption of backup
3. Checks integrity before restore

Python3-paramiko package is required to enable remote backups.

Signed-off-by: Sai <Sai.Sathujoda@...>
---
recipes-core/images/cip-core-image-security.bb | 1 +
1 file changed, 1 insertion(+)

diff --git a/recipes-core/images/cip-core-image-security.bb b/recipes-core/images/cip-core-image-security.bb
index 24b1f46..9e9e43a 100644
--- a/recipes-core/images/cip-core-image-security.bb
+++ b/recipes-core/images/cip-core-image-security.bb
@@ -34,6 +34,7 @@ IMAGE_PREINSTALL += " \
sudo \
aide-common \
libpam-google-authenticator \
+ duplicity python3-paramiko \
"

OVERRIDES_append = ":${BASE_DISTRO_CODENAME}"
--
2.20.1


[isar-cip-core 1/2] README.control-system-backup.md: Add steps to explain control system backup

sai.sathujoda@...
 

From: Sai <Sai.Sathujoda@...>

Control system backup is an IEC security requirement to backup critical
systems for disaster recovery and system migration program.

This document demonstrates how control system backup can be taken using
'duplicity', and also provide steps to check the integrity and restore
the backups.

Signed-off-by: Sai <Sai.Sathujoda@...>
---
doc/README.control-system-backup.md | 194 ++++++++++++++++++++++++++++
1 file changed, 194 insertions(+)
create mode 100644 doc/README.control-system-backup.md

diff --git a/doc/README.control-system-backup.md b/doc/README.control-system-backup.md
new file mode 100644
index 0000000..4f4f9e1
--- /dev/null
+++ b/doc/README.control-system-backup.md
@@ -0,0 +1,194 @@
+# Overview
+This document explains how to take system-level backup, verify integrity, and restore the backup file. It also mentions the demonstration which has to be carried out using **duplicity** to perform both local and remote backups.
+
+# Description
+There is always a chance for the data to get corrupted or lost due to some unknown reasons. In those situations, system level backup is helpful so that if any data is lost then it can be restored back.
+If there is a lot of space available in the system then **Local backup** can be considered. But in some cases space will not be enough if we opt for daily backup. In that situation, it is better to choose remote backup where all the data in the system will be stored on a remote server.
+
+**Duplicity** provides facilities like system-level backup, encryption of the data taken as a backup, verification of data integrity before restore and finally the restoration of the data from the backup.
+
+# Pre-Requisites
+1. CIP security image which includes **duplicity** package, to build the image follow the steps described in the [README.security-testing.md](./README.security-testing.md#build-cip-security-linux-image).
+2. Additional storage in case of local backup, (Add the below lines in **/kas/opt/security.yml** file to increase the rootfs size).
+ ```
+ local_conf_header:
+ security_image_size: |
+ ROOTFS_EXTRA = "8192"
+ ```
+3. Remote machine with Linux OS to store remote backups.
+
+# Local Backup & Restore
+For the first backup taken it will be a **full backup** but after that it will be incremental backups. If full backups are to be taken explicitly then add "full" in the command.
+
+The user can choose the data needed to be taken as backup. For example, in the below command /usr/bin directory is taken as backup in the /usr/local/backup location locally.
+Note: PASSPHRASE should be more than 8 characters.
+```
+root@demo:~# export PASSPHRASE=12345678
+root@demo:~# duplicity /usr/bin file:///usr/local/backup
+Local and Remote metadata are synchronized, no sync needed.
+Last full backup date: none
+No signatures found, switching to full backup.
+--------------[ Backup Statistics ]--------------
+StartTime 1661752359.77 (Mon Aug 29 05:52:39 2022)
+EndTime 1661752362.69 (Mon Aug 29 05:52:42 2022)
+ElapsedTime 2.92 (2.92 seconds)
+SourceFiles 582
+SourceFileSize 49793026 (47.5 MB)
+NewFiles 582
+NewFileSize 49793026 (47.5 MB)
+DeletedFiles 0
+ChangedFiles 0
+ChangedFileSize 0 (0 bytes)
+ChangedDeltaSize 0 (0 bytes)
+DeltaEntries 582
+RawDeltaSize 49779683 (47.5 MB)
+TotalDestinationSizeChange 21135788 (20.2 MB)
+Errors 0
+```
+Note: Two different data sets cannot be taken as backup into the same location. So make sure when a data set different from the previous is taken as backup, choose a different storage location.
+
+### Verification of data integrity before restore
+We can verify whatever changes are made to our latest file system on comparing with a latest backup taken like below:
+```
+root@demo:/usr/bin# rm google-authenticator
+root@demo:~# duplicity verify --compare-data -v4 file:///usr/local/backup /usr/bin
+Last full backup date: Mon Aug 29 05:52:31 2022
+GnuPG passphrase for decryption:
+Difference found: File . has mtime Mon Aug 29 05:56:13 2022, expected Mon Aug 29 03:54:07 2022
+Difference found: File google-authenticator is missing
+Verify complete: 582 files compared, 2 differences found.
+```
+
+#### Data Restore
+The files can be restored only after integrity verification as shown above so that the user will specifically know which files or directories have to be restored due to an unwanted change or deletion in the file system.
+
+```
+root@demo:~# duplicity --file-to-restore google-authenticator file:///usr/local/backup /usr/bin/google-authenticator
+```
+Situation : If a directory containing 1000 files has around 250 files deleted and around 100 files modified. In that case it is not user friendly for the user to individually restore such a huge list of modified files to restore. Duplicity will not allow overwrite of remaining files in the directory so in that case the only possible solution is to delete the entire directory and restore it from the backup.
+
+The --file-to-restore switch should be removed if the user wants to restore a complete directory like shown below.
+```
+root@demo:~# duplicity file:///usr/local/backup /usr/bin/
+```
+
+### Listing all the files in the backup
+To check all the contents of a backup do as shown below:
+```
+root@demo:~# duplicity list-current-files file:///usr/local/backup
+Local and Remote metadata are synchronized, no sync needed.
+Last full backup date: Mon Aug 29 05:52:31 2022
+Mon Aug 29 03:54:07 2022 .
+Mon Aug 29 03:52:37 2022 Mail
+Thu Sep 24 08:36:09 2020 [
+Thu Jan 20 20:10:35 2022 addpart
+Sun Jan 16 12:36:56 2022 aide
+Thu Jun 10 08:53:34 2021 apt
+Thu Jun 10 08:53:34 2021 apt-cache
+Thu Jun 10 08:53:34 2021 apt-cdrom
+Thu Jun 10 08:53:34 2021 apt-config
+...
+```
+
+# Remote Backup & Restore
+### Setting up the environment on remote server
+In the Local server, generate a pair of RSA keys that will be used for authentication during remote backup.
+```
+root@demo:~# ssh-keygen -t rsa -b 2048 -N "" -f /root/.ssh/id_rsa
+root@demo:~# ssh-copy-id -i ~/.ssh/id_rsa remoteuser@remoteserver-ip
+```
+
+Create a directory in remote server for keeping the backup files
+```
+root@demo:~# ssh remoteuser@remoteserver mkdir -p sftp_remote_bk_testing/first_backup
+```
+
+### Generation of GPG keys for encryption of data
+Create a file name gen-key-script and add the parameters like below:
+```
+root@demo:~# cat >foo <<EOF
+ Key-Type: DSA
+ Key-Length: 1024
+ Subkey-Type: ELG-E
+ Subkey-Length: 1024
+ Name-Real: username
+ Name-Email: usermailID
+ Expire-Date: 0
+ # passphrase should be more than 8 characters
+ Passphrase: 123456789
+EOF
+root@demo:~# gpg --batch --gen-key foo
+gpg: Generating a basic OpenPGP key
+gpg: key AE57464HFG4 marked as ultimately trusted
+gpg: revocation certificate stored as '/root/.gnupg/openpgp-revocs.d/E4C84C97B37BB24947E4522DA4B60C25738850E9.rev'
+```
+Use the encrypted key generated as above command and the encrypt key is AE57464HFG4 in the remote backup.
+
+### Remote Backup
+```
+root@demo:~# duplicity --encrypt-key "AE57464HFG4" /usr/bin sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+```
+Find the backed up files in the remote location using the below command
+```
+root@demo:~# ssh remoteuser@remoteserver ls /home/remoteuser/sftp_remote_bk_testing/first_backup
+- duplicity-full.20220829T070950Z.manifest.gpg
+- duplicity-full.20220829T070950Z.vol1.difftar.gpg
+- duplicity-full-signatures.20220829T070950Z.sigtar.gpg
+```
+
+### Verification of integrity after recent backup in remote server
+```
+root@demo:~# duplicity verify --encrypt-key "AE57464HFG4" --compare-data sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup /usr/bin
+Local and Remote metadata are synchronized, no sync needed.5CAE2A504" --compare-data sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup /usr/bin
+Last full backup date: Mon Aug 29 07:09:50 2022
+GnuPG passphrase for decryption:
+Difference found: File . has mtime Mon Aug 29 07:14:15 2022, expected Mon Aug 29 06:00:22 2022
+Difference found: File google-authenticator is missing
+Verify complete: 582 files compared, 2 differences found.
+```
+
+#### Restoration of data from remote server
+```
+root@demo:~# duplicity --file-to-restore google-authenticator sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup /usr/bin/google-authenticator
+```
+
+# Automatic Backup scheduling using cron service
+To avoid operator overhead to regularly take system backup, it is necessary to automate the backup so that the data backup will be **up-to-date**.
+
+While automating this backup process, it is suggestible to use remote backup based on space issue.
+
+Below a simple script which shall be added in the crontab to run on a daily basis.
+
+```
+#!/bin/bash
+echo "This will execute the backup on the first minute, first hour , every day"
+export PASSPHRASE=12345678
+duplicity --encrypt-key "AE57464HFG4" /usr/bin sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+unset PASSPHRASE
+```
+
+In this demo script, the /usr/bin is being taken as a backup. The user can replace based on the requirement.
+The passphrase should also match the one assigned by the user during GPG keys creation.
+
+Save the file (daily_backup.sh) in a known path and start the cron service.
+```
+root@demo:~# systemctl start cron
+```
+Check the status of the service (expected to be in running state)
+```
+root@demo:~# systemctl status cron
+● cron.service - Regular background program processing daemon
+ Loaded: loaded (/lib/systemd/system/cron.service; enabled; vendor preset: enabled)
+ Active: active (running) since Mon 2022-08-29 12:11:25 UTC; 12min ago
+```
+Open the crontab
+```
+root@demo:~# crontab -e
+```
+Add the below line at the end of the crontab file if the user needs a backup on daily basis onto the remote server.
+```
+0 0 * * * /root/daily_backup.sh
+```
+After saving the crontab, the below message should be displayed.
+**crontab: installing new crontab**
+The user can verify this automation by checking the contents of the remote backup folder regularly.
--
2.20.1


[isar-cip-core 0/2] Patches to meet IEC CR 7.3

sai.sathujoda@...
 

From: Sai <Sai.Sathujoda@...>

These patches contain the packages to add in the IEC security layer to
meet CR 7.3 and the manual to use the package to fulfill the requirement.

Sai (2):
README.control-system-backup.md: Add steps to explain control system
backup
cip-core-image-security.bb: Add duplicity package to enable IEC
requirement

doc/README.control-system-backup.md | 194 ++++++++++++++++++
.../images/cip-core-image-security.bb | 1 +
2 files changed, 195 insertions(+)
create mode 100644 doc/README.control-system-backup.md

--
2.20.1


Re: [isar-cip-core 2/2] README.control-system-backup.md : Add steps to explain control system backup

sai.sathujoda@...
 

Hi Jan,

Please ignore below patch series , it has merge conflicts. I will resolve and re-send the patch series again.
Sorry for the confusion.

Regards,
Sai Ashrith

-----Original Message-----
From: cip-dev@... <cip-dev@...> On Behalf Of sai.sathujoda@...
Sent: Friday, September 9, 2022 12:34 PM
To: cip-dev@...; jan.kiszka@...
Cc: ashrith sai(TSIP) <Sai.Sathujoda@...>; dinesh kumar(TSIP TMIEC ODG Porting) <dinesh.kumar@...>; hayashi kazuhiro(林 和宏 □SWC◯ACT) <kazuhiro3.hayashi@...>
Subject: [cip-dev] [isar-cip-core 2/2] README.control-system-backup.md : Add steps to explain control system backup

From: Sai <Sai.Sathujoda@...>

Control system backup is an IEC security requirement to backup critical systems for disaster recovery and system migration program.

Signed-off-by: Sai <Sai.Sathujoda@...>
---
doc/README.control-system-backup.md | 214 ++++++++++++++++++++++++++++
1 file changed, 214 insertions(+)
create mode 100644 doc/README.control-system-backup.md

diff --git a/doc/README.control-system-backup.md b/doc/README.control-system-backup.md
new file mode 100644
index 0000000..ea8b761
--- /dev/null
+++ b/doc/README.control-system-backup.md
@@ -0,0 +1,214 @@
+# Overview
+This document explains how to take system-level backup, verify integrity, and restore the backup file. It also mentions the demonstration which has to be carried out using **duplicity** to perform both local and remote backups.
+
+<<<<<<< HEAD
+There is always a chance for the data to get corrupted or lost due to some unknown reasons. In those situations, system level backup is helpful so that if any data is lost then it can be restored back.
+=======
+# Description
+There is always a chance for the data to get corrupted or lost due to some unknown reasons. In those situations, system level backup is helpful so that if any data is lost then it can restored back.
+>>>>>>> 22bdd8e95910548b96c7b2e30499b6f7ad951b9e
+If there is a lot of space available in the system then **Local backup** can be considered. But in some cases space will not be enough if we opt for daily backup. In that situation, it is better to choose remote backup where all the data in the system will be stored on a remote server.
+
+**Duplicity** provides facilities like system-level backup, encryption of the data taken as a backup, verification of data integrity before restore and finally the restoration of the data from the backup.
+
+# Pre-Requisites
+<<<<<<< HEAD
+
+1. Build the CIP security image which includes **duplicity** package as described in the [README.security-testing.md](./README.security-testing.md).
+2. Add additional storage in case of local backup like below in **/kas/opt/security.yml** file.
+```
+local_conf_header:
+ security_image_size: |
+ ROOTFS_EXTRA = "8192"
+```
+=======
+1. CIP security image which includes **duplicity** package, to build the image follow the steps described in the [README.security-testing.md](./README.security-testing.md#build-cip-security-linux-image).
+2. Additional storage in case of local backups or increase the rootfs size by adding the below lines in **/kas/opt/security.yml** file.
+ ```
+ local_conf_header:
+ security_image_size: |
+ ROOTFS_EXTRA = "8192"
+ ```
+>>>>>>> 22bdd8e95910548b96c7b2e30499b6f7ad951b9e
+3. Remote machine with Linux OS to store remote backups.
+
+# Local Backup & Restore
+For the first backup taken it will be a **full backup** but after that it will be incremental backups. If full backups are to be taken explicitly then add "full" in the command.
+
+The user can choose the data needed to be taken as backup. For example, in the below command /usr/bin directory is taken as backup in the /usr/local/backup location locally.
+Note: PASSPHRASE should be more than 8 characters.
+```
+root@demo:~# export PASSPHRASE=12345678 root@demo:~# duplicity /usr/bin
+file:///usr/local/backup Local and Remote metadata are synchronized, no
+sync needed.
+Last full backup date: none
+No signatures found, switching to full backup.
+--------------[ Backup Statistics ]-------------- StartTime
+1661752359.77 (Mon Aug 29 05:52:39 2022) EndTime 1661752362.69 (Mon Aug
+29 05:52:42 2022) ElapsedTime 2.92 (2.92 seconds) SourceFiles 582
+SourceFileSize 49793026 (47.5 MB) NewFiles 582 NewFileSize 49793026
+(47.5 MB) DeletedFiles 0 ChangedFiles 0 ChangedFileSize 0 (0 bytes)
+ChangedDeltaSize 0 (0 bytes) DeltaEntries 582 RawDeltaSize 49779683
+(47.5 MB) TotalDestinationSizeChange 21135788 (20.2 MB) Errors 0 ```
+Note: Two different data sets cannot be taken as backup into the same location. So make sure when a data set different from the previous is taken as backup, choose a different storage location.
+
+### Verification of data integrity before restore We can verify
+whatever changes are made to our latest file system on comparing with a latest backup taken like below:
+```
+root@demo:/usr/bin# rm google-authenticator root@demo:~# duplicity
+verify --compare-data -v4 file:///usr/local/backup /usr/bin Last full
+backup date: Mon Aug 29 05:52:31 2022 GnuPG passphrase for decryption:
+Difference found: File . has mtime Mon Aug 29 05:56:13 2022, expected
+Mon Aug 29 03:54:07 2022 Difference found: File google-authenticator is
+missing Verify complete: 582 files compared, 2 differences found.
+```
+<<<<<<< HEAD
+#### Data Restore
+The files can be restored only after integrity verification as shown above so that the user will specifically know which files or directories have to be restored due to an unwanted change or deletion in the file system.
+=======
+
+### Data Restore
+The files can be restored only after integrity verification as shown above so that the user will specifically know which files or directories have to restored due to an unwanted change or deletion in the file system.
+>>>>>>> 22bdd8e95910548b96c7b2e30499b6f7ad951b9e
+
+```
+root@demo:~# duplicity --file-to-restore google-authenticator
+file:///usr/local/backup /usr/bin/google-authenticator ``` Situation :
+If a directory containing 1000 files has around 250 files deleted and around 100 files unwantedly modified. In that case it is not user friendly for the user to individually restore such a huge list of modified files to restore. Duplicity will not allow overwrite of remaining files in the directory so in that case the only possible solution is to delete the entire directory and restore it from the backup.
+
+The --file-to-restore switch should be removed if the user wants to restore a complete directory like shown below.
+```
+root@demo:~# duplicity file:///usr/local/backup /usr/bin/ ```
+
+### Listing all the files in the backup To check all the contents of a
+backup do as shown below:
+```
+root@demo:~# duplicity list-current-files file:///usr/local/backup
+Local and Remote metadata are synchronized, no sync needed.
+Last full backup date: Mon Aug 29 05:52:31 2022 Mon Aug 29 03:54:07
+2022 .
+Mon Aug 29 03:52:37 2022 Mail
+Thu Sep 24 08:36:09 2020 [
+Thu Jan 20 20:10:35 2022 addpart
+Sun Jan 16 12:36:56 2022 aide
+Thu Jun 10 08:53:34 2021 apt
+Thu Jun 10 08:53:34 2021 apt-cache
+Thu Jun 10 08:53:34 2021 apt-cdrom
+Thu Jun 10 08:53:34 2021 apt-config
+...
+```
+
+# Remote Backup & Restore
+### Setting up the environment on remote server In the Local server,
+generate a pair of RSA keys that will be used for authentication during remote backup.
+```
+root@demo:~# ssh-keygen -t rsa -b 2048 -N "" -f /root/.ssh/id_rsa
+root@demo:~# ssh-copy-id -i ~/.ssh/id_rsa remoteuser@remoteserver-ip
+```
+
+Create a directory in remote server for keeping the backup files ```
+root@demo:~# ssh remoteuser@remoteserver mkdir -p
+sftp_remote_bk_testing/first_backup
+```
+
+### Generation of GPG keys for encryption of data Create a file name
+gen-key-script and add the parameters like below:
+```
+root@demo:~# cat >foo <<EOF
+ Key-Type: DSA
+ Key-Length: 1024
+ Subkey-Type: ELG-E
+ Subkey-Length: 1024
+ Name-Real: username
+ Name-Email: usermailID
+ Expire-Date: 0
+ # passphrase should be more than 8 characters
+ Passphrase: 123456789
+EOF
+root@demo:~# gpg --batch --gen-key foo
+gpg: Generating a basic OpenPGP key
+gpg: key AE57464HFG4 marked as ultimately trusted
+gpg: revocation certificate stored as '/root/.gnupg/openpgp-revocs.d/E4C84C97B37BB24947E4522DA4B60C25738850E9.rev'
+```
+Use the encrypted key generated as above command and the encrypt key is AE57464HFG4 in the remote backup.
+
+### Remote Backup
+```
+root@demo:~# duplicity --encrypt-key "AE57464HFG4" /usr/bin
+sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+```
+Find the backed up files in the remote location using the below command
+``` root@demo:~# ssh remoteuser@remoteserver ls
+/home/remoteuser/sftp_remote_bk_testing/first_backup
+- duplicity-full.20220829T070950Z.manifest.gpg
+- duplicity-full.20220829T070950Z.vol1.difftar.gpg
+- duplicity-full-signatures.20220829T070950Z.sigtar.gpg
+```
+
+### Verification of integrity after recent backup in remote server ```
+root@demo:~# duplicity verify --encrypt-key "AE57464HFG4"
+--compare-data
+sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+/usr/bin Local and Remote metadata are synchronized, no sync needed.5CAE2A504" --compare-data sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup /usr/bin Last full backup date: Mon Aug 29 07:09:50 2022 GnuPG passphrase for decryption:
+Difference found: File . has mtime Mon Aug 29 07:14:15 2022, expected
+Mon Aug 29 06:00:22 2022 Difference found: File google-authenticator is
+missing Verify complete: 582 files compared, 2 differences found.
+```
+
+#### Restoration of data from remote server ``` root@demo:~# duplicity
+--file-to-restore google-authenticator
+sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+/usr/bin/google-authenticator ```
+
+# Automatic Backup scheduling using cron service To avoid operator
+overhead to regularly take system backup, it is necessary to automate the backup so that the data backup will be **up-to-date**.
+
+While automating this backup process, it is suggestible to use remote backup based on space issue.
+
+Below a simple script which shall be added in the crontab to run on a daily basis.
+
+```
+#!/bin/bash
+echo "This will execute the backup on the first minute, first hour , every day"
+export PASSPHRASE=12345678
+duplicity --encrypt-key "AE57464HFG4" /usr/bin
+sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+unset PASSPHRASE
+```
+
+In this demo script, the /usr/bin is being taken as a backup. The user can replace based on the requirement.
+The passphrase should also match the one assigned by the user during GPG keys creation.
+
+Save the file (daily_backup.sh) in a known path and start the cron service.
+```
+root@demo:~# systemctl start cron
+```
+Check the status of the service (expected to be in running state) ```
+root@demo:~# systemctl status cron ● cron.service - Regular background
+program processing daemon
+ Loaded: loaded (/lib/systemd/system/cron.service; enabled; vendor preset: enabled)
+ Active: active (running) since Mon 2022-08-29 12:11:25 UTC; 12min
+ago ``` Open the crontab ``` root@demo:~# crontab -e ``` Add the below
+line at the end of the crontab file if the user needs a backup on daily basis onto the remote server.
+```
+0 0 * * * /root/daily_backup.sh
+```
+After saving the crontab, the below message should be displayed.
+**crontab: installing new crontab**
+The user can verify this automation by checking the contents of the remote backup folder regularly.
--
2.20.1


[isar-cip-core 2/2] README.control-system-backup.md : Add steps to explain control system backup

sai.sathujoda@...
 

From: Sai <Sai.Sathujoda@...>

Control system backup is an IEC security requirement to backup critical
systems for disaster recovery and system migration program.

Signed-off-by: Sai <Sai.Sathujoda@...>
---
doc/README.control-system-backup.md | 214 ++++++++++++++++++++++++++++
1 file changed, 214 insertions(+)
create mode 100644 doc/README.control-system-backup.md

diff --git a/doc/README.control-system-backup.md b/doc/README.control-system-backup.md
new file mode 100644
index 0000000..ea8b761
--- /dev/null
+++ b/doc/README.control-system-backup.md
@@ -0,0 +1,214 @@
+# Overview
+This document explains how to take system-level backup, verify integrity, and restore the backup file. It also mentions the demonstration which has to be carried out using **duplicity** to perform both local and remote backups.
+
+<<<<<<< HEAD
+There is always a chance for the data to get corrupted or lost due to some unknown reasons. In those situations, system level backup is helpful so that if any data is lost then it can be restored back.
+=======
+# Description
+There is always a chance for the data to get corrupted or lost due to some unknown reasons. In those situations, system level backup is helpful so that if any data is lost then it can restored back.
+>>>>>>> 22bdd8e95910548b96c7b2e30499b6f7ad951b9e
+If there is a lot of space available in the system then **Local backup** can be considered. But in some cases space will not be enough if we opt for daily backup. In that situation, it is better to choose remote backup where all the data in the system will be stored on a remote server.
+
+**Duplicity** provides facilities like system-level backup, encryption of the data taken as a backup, verification of data integrity before restore and finally the restoration of the data from the backup.
+
+# Pre-Requisites
+<<<<<<< HEAD
+
+1. Build the CIP security image which includes **duplicity** package as described in the [README.security-testing.md](./README.security-testing.md).
+2. Add additional storage in case of local backup like below in **/kas/opt/security.yml** file.
+```
+local_conf_header:
+ security_image_size: |
+ ROOTFS_EXTRA = "8192"
+```
+=======
+1. CIP security image which includes **duplicity** package, to build the image follow the steps described in the [README.security-testing.md](./README.security-testing.md#build-cip-security-linux-image).
+2. Additional storage in case of local backups or increase the rootfs size by adding the below lines in **/kas/opt/security.yml** file.
+ ```
+ local_conf_header:
+ security_image_size: |
+ ROOTFS_EXTRA = "8192"
+ ```
+>>>>>>> 22bdd8e95910548b96c7b2e30499b6f7ad951b9e
+3. Remote machine with Linux OS to store remote backups.
+
+# Local Backup & Restore
+For the first backup taken it will be a **full backup** but after that it will be incremental backups. If full backups are to be taken explicitly then add "full" in the command.
+
+The user can choose the data needed to be taken as backup. For example, in the below command /usr/bin directory is taken as backup in the /usr/local/backup location locally.
+Note: PASSPHRASE should be more than 8 characters.
+```
+root@demo:~# export PASSPHRASE=12345678
+root@demo:~# duplicity /usr/bin file:///usr/local/backup
+Local and Remote metadata are synchronized, no sync needed.
+Last full backup date: none
+No signatures found, switching to full backup.
+--------------[ Backup Statistics ]--------------
+StartTime 1661752359.77 (Mon Aug 29 05:52:39 2022)
+EndTime 1661752362.69 (Mon Aug 29 05:52:42 2022)
+ElapsedTime 2.92 (2.92 seconds)
+SourceFiles 582
+SourceFileSize 49793026 (47.5 MB)
+NewFiles 582
+NewFileSize 49793026 (47.5 MB)
+DeletedFiles 0
+ChangedFiles 0
+ChangedFileSize 0 (0 bytes)
+ChangedDeltaSize 0 (0 bytes)
+DeltaEntries 582
+RawDeltaSize 49779683 (47.5 MB)
+TotalDestinationSizeChange 21135788 (20.2 MB)
+Errors 0
+```
+Note: Two different data sets cannot be taken as backup into the same location. So make sure when a data set different from the previous is taken as backup, choose a different storage location.
+
+### Verification of data integrity before restore
+We can verify whatever changes are made to our latest file system on comparing with a latest backup taken like below:
+```
+root@demo:/usr/bin# rm google-authenticator
+root@demo:~# duplicity verify --compare-data -v4 file:///usr/local/backup /usr/bin
+Last full backup date: Mon Aug 29 05:52:31 2022
+GnuPG passphrase for decryption:
+Difference found: File . has mtime Mon Aug 29 05:56:13 2022, expected Mon Aug 29 03:54:07 2022
+Difference found: File google-authenticator is missing
+Verify complete: 582 files compared, 2 differences found.
+```
+<<<<<<< HEAD
+#### Data Restore
+The files can be restored only after integrity verification as shown above so that the user will specifically know which files or directories have to be restored due to an unwanted change or deletion in the file system.
+=======
+
+### Data Restore
+The files can be restored only after integrity verification as shown above so that the user will specifically know which files or directories have to restored due to an unwanted change or deletion in the file system.
+>>>>>>> 22bdd8e95910548b96c7b2e30499b6f7ad951b9e
+
+```
+root@demo:~# duplicity --file-to-restore google-authenticator file:///usr/local/backup /usr/bin/google-authenticator
+```
+Situation : If a directory containing 1000 files has around 250 files deleted and around 100 files unwantedly modified. In that case it is not user friendly for the user to individually restore such a huge list of modified files to restore. Duplicity will not allow overwrite of remaining files in the directory so in that case the only possible solution is to delete the entire directory and restore it from the backup.
+
+The --file-to-restore switch should be removed if the user wants to restore a complete directory like shown below.
+```
+root@demo:~# duplicity file:///usr/local/backup /usr/bin/
+```
+
+### Listing all the files in the backup
+To check all the contents of a backup do as shown below:
+```
+root@demo:~# duplicity list-current-files file:///usr/local/backup
+Local and Remote metadata are synchronized, no sync needed.
+Last full backup date: Mon Aug 29 05:52:31 2022
+Mon Aug 29 03:54:07 2022 .
+Mon Aug 29 03:52:37 2022 Mail
+Thu Sep 24 08:36:09 2020 [
+Thu Jan 20 20:10:35 2022 addpart
+Sun Jan 16 12:36:56 2022 aide
+Thu Jun 10 08:53:34 2021 apt
+Thu Jun 10 08:53:34 2021 apt-cache
+Thu Jun 10 08:53:34 2021 apt-cdrom
+Thu Jun 10 08:53:34 2021 apt-config
+...
+```
+
+# Remote Backup & Restore
+### Setting up the environment on remote server
+In the Local server, generate a pair of RSA keys that will be used for authentication during remote backup.
+```
+root@demo:~# ssh-keygen -t rsa -b 2048 -N "" -f /root/.ssh/id_rsa
+root@demo:~# ssh-copy-id -i ~/.ssh/id_rsa remoteuser@remoteserver-ip
+```
+
+Create a directory in remote server for keeping the backup files
+```
+root@demo:~# ssh remoteuser@remoteserver mkdir -p sftp_remote_bk_testing/first_backup
+```
+
+### Generation of GPG keys for encryption of data
+Create a file name gen-key-script and add the parameters like below:
+```
+root@demo:~# cat >foo <<EOF
+ Key-Type: DSA
+ Key-Length: 1024
+ Subkey-Type: ELG-E
+ Subkey-Length: 1024
+ Name-Real: username
+ Name-Email: usermailID
+ Expire-Date: 0
+ # passphrase should be more than 8 characters
+ Passphrase: 123456789
+EOF
+root@demo:~# gpg --batch --gen-key foo
+gpg: Generating a basic OpenPGP key
+gpg: key AE57464HFG4 marked as ultimately trusted
+gpg: revocation certificate stored as '/root/.gnupg/openpgp-revocs.d/E4C84C97B37BB24947E4522DA4B60C25738850E9.rev'
+```
+Use the encrypted key generated as above command and the encrypt key is AE57464HFG4 in the remote backup.
+
+### Remote Backup
+```
+root@demo:~# duplicity --encrypt-key "AE57464HFG4" /usr/bin sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+```
+Find the backed up files in the remote location using the below command
+```
+root@demo:~# ssh remoteuser@remoteserver ls /home/remoteuser/sftp_remote_bk_testing/first_backup
+- duplicity-full.20220829T070950Z.manifest.gpg
+- duplicity-full.20220829T070950Z.vol1.difftar.gpg
+- duplicity-full-signatures.20220829T070950Z.sigtar.gpg
+```
+
+### Verification of integrity after recent backup in remote server
+```
+root@demo:~# duplicity verify --encrypt-key "AE57464HFG4" --compare-data sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup /usr/bin
+Local and Remote metadata are synchronized, no sync needed.5CAE2A504" --compare-data sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup /usr/bin
+Last full backup date: Mon Aug 29 07:09:50 2022
+GnuPG passphrase for decryption:
+Difference found: File . has mtime Mon Aug 29 07:14:15 2022, expected Mon Aug 29 06:00:22 2022
+Difference found: File google-authenticator is missing
+Verify complete: 582 files compared, 2 differences found.
+```
+
+#### Restoration of data from remote server
+```
+root@demo:~# duplicity --file-to-restore google-authenticator sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup /usr/bin/google-authenticator
+```
+
+# Automatic Backup scheduling using cron service
+To avoid operator overhead to regularly take system backup, it is necessary to automate the backup so that the data backup will be **up-to-date**.
+
+While automating this backup process, it is suggestible to use remote backup based on space issue.
+
+Below a simple script which shall be added in the crontab to run on a daily basis.
+
+```
+#!/bin/bash
+echo "This will execute the backup on the first minute, first hour , every day"
+export PASSPHRASE=12345678
+duplicity --encrypt-key "AE57464HFG4" /usr/bin sftp://remoteuser@remoteserver:/sftp_remote_bk_testing/first_backup
+unset PASSPHRASE
+```
+
+In this demo script, the /usr/bin is being taken as a backup. The user can replace based on the requirement.
+The passphrase should also match the one assigned by the user during GPG keys creation.
+
+Save the file (daily_backup.sh) in a known path and start the cron service.
+```
+root@demo:~# systemctl start cron
+```
+Check the status of the service (expected to be in running state)
+```
+root@demo:~# systemctl status cron
+● cron.service - Regular background program processing daemon
+ Loaded: loaded (/lib/systemd/system/cron.service; enabled; vendor preset: enabled)
+ Active: active (running) since Mon 2022-08-29 12:11:25 UTC; 12min ago
+```
+Open the crontab
+```
+root@demo:~# crontab -e
+```
+Add the below line at the end of the crontab file if the user needs a backup on daily basis onto the remote server.
+```
+0 0 * * * /root/daily_backup.sh
+```
+After saving the crontab, the below message should be displayed.
+**crontab: installing new crontab**
+The user can verify this automation by checking the contents of the remote backup folder regularly.
--
2.20.1


[isar-cip-core 1/2] cip-core-image-security.bb: Add duplicity package to enable IEC requirement

sai.sathujoda@...
 

From: Sai <Sai.Sathujoda@...>

Duplicity package provides below features in order to implement IEC
requirement "Control System Backup"
1. Backup and restore
2. Encryption of backup
3. Checks integrity before restore

Python3-paramiko package is required to enable remote backups.

Signed-off-by: Sai <Sai.Sathujoda@...>
---
recipes-core/images/cip-core-image-security.bb | 1 +
1 file changed, 1 insertion(+)

diff --git a/recipes-core/images/cip-core-image-security.bb b/recipes-core/images/cip-core-image-security.bb
index 24b1f46..9e9e43a 100644
--- a/recipes-core/images/cip-core-image-security.bb
+++ b/recipes-core/images/cip-core-image-security.bb
@@ -34,6 +34,7 @@ IMAGE_PREINSTALL += " \
sudo \
aide-common \
libpam-google-authenticator \
+ duplicity python3-paramiko \
"

OVERRIDES_append = ":${BASE_DISTRO_CODENAME}"
--
2.20.1


[isar-cip-core 0/2] Patches to meet IEC CR 7.3

sai.sathujoda@...
 

From: Sai <Sai.Sathujoda@...>

These patches contain the packages to add in the IEC security layer to meet CR 7.3
and the manual to use the package to fulfill the requirement.

Sai (2):
cip-core-image-security.bb: Add duplicity package to enable IEC
requirement
README.control-system-backup.md : Add steps to explain control system
backup

doc/README.control-system-backup.md | 214 ++++++++++++++++++
.../images/cip-core-image-security.bb | 1 +
2 files changed, 215 insertions(+)
create mode 100644 doc/README.control-system-backup.md

--
2.20.1


CIP IRC weekly meeting today on libera.chat

Jan Kiszka
 

Hi all,

Kindly be reminded to attend the weekly meeting through IRC to discuss
technical topics with CIP kernel today. Our channel is the following:

irc:irc.libera.chat:6667/cip

The IRC meeting is scheduled to UTC (GMT) 12:00:

https://www.timeanddate.com/worldclock/meetingdetails.html?year=2022&month=9&day=8&hour=12&min=0&sec=0&p1=224&p2=179&p3=136&p4=37&p5=241&p6=248

USWest USEast UK DE TW JP
05:00 08:00 13:00 14:00 20:00 21:00

Last meeting minutes:
https://ircbot.wl.linuxfoundation.org/meetings/cip/2022/09/cip.2022-09-01-12.03.log.html

* Action items
1. Resolve/ignore failures of KernelCI on 4.4-cip - alicefm
2. Check cip devices on kernelci old pull request - patersonc
* Kernel maintenance updates
* Kernel testing

Jan


New CVE entries this week

Masami Ichikawa
 

Hi !

It's this week's CVE report.

This week reported 3 new CVEs and 2 updated CVEs.

* New CVEs

CVE-2022-3078: lack of check after calling vzalloc() and lack of free
after allocation in vidtv driver

CVSS v3 score is 5.5 MEDIUM.

The vidtv driver was introduced by commit f90cf60 ("media: vidtv: add
a bridge driver") was merged in 5.10-rc1.

There is a lack of check after calling vzalloc() and lack of free
after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.
Kernel 4.4, 4.9, 4.14, 4.19, and 5.4 are not affected.

No CIP member enables CONFIG_DVB_VIDTV.

Fixed status
mainline: [e6a21a14106d9718aa4f8e115b1e474888eeba44]
stable/5.10: [663e7a72871f89f7a10cc8d7b2f17f27c64e071d]
stable/5.15: [9dd2fd7a1f84c947561af29424c5ddcecfcf2cbe]

CVE-2022-39190: 'netfilter: nf_tables: disallow binding to already bound chain

CVSS v3 score is not assigned.

There is a lack of input value check in nft_verdict_init of the file
net/netfilter/nf_tables_api.c which will cause denial of service
vulnerability. This vulnerability was introduced by commit d0e2c7d
("netfilter: nf_tables: add NFT_CHAIN_BINDING") which was merged in
5.9-rc1.

Kernel 4.4, 4.9, 4.14, 4.19, and 5.4 are not affected.

Fixed status
mainline: [e02f0d3970404bfea385b6edb86f2d936db0ea2b]
stable/5.10: [c08a104a8bce832f6e7a4e8d9ac091777b9982ea]
stable/5.15: [51f192ae71c3431aa69a988449ee2fd288e57648]
stable/5.19: [fdca693fcf26c11596e7aa1e540af2b4a5288c76]

CVE-2022-39842: video: fbdev: pxa3xx-gcu: Fix integer overflow in
pxa3xx_gcu_write

CVSS v3 score is not assigned.

There is an integer overflow bug in pxa3xx_gcu_write() in PXA3XX_GCU driver.

All stable kernels(include 4.4) are affected by this issue.
No CIP member enables CONFIG_PXA3XX_GCU.

Fixed status
mainline: [a09d2d00af53b43c6f11e6ab3cb58443c2cac8a7]

* Updated CVEs

CVE-2022-39188: unmap_mapping_range() race with munmap() on VM_PFNMAP
mappings leads to stale TLB entry

4.14, 4.19, 4.9, 5.10, 5.15, and 5.4 were fixed.

Fixed status
mainline: [b67fbebd4cf980aecbcc750e1462128bffe8ae15]
stable/4.14: [b8a54a2a45feacbc96065e5d6b9a1cbee2aa1e9d]
stable/4.19: [c3b1e88f14e7f442e2ddcbec94527eec84ac0ca3]
stable/4.9: [390f33a95419f7fa1254ba6b6feeabde480732f9]
stable/5.10: [895428ee124ad70b9763259308354877b725c31d]
stable/5.15: [3ffb97fce282df03723995f5eed6a559d008078e]
stable/5.4: [c9c5501e815132530d741ec9fdd22657f91656bc]

CVE-2022-3028: af_key: Do not call xfrm_probe_algs in parallel

4.14, 4.19, 4.9, and 5.4 were fixed.

Fixed status
mainline: [ba953a9d89a00c078b85f4b190bc1dde66fe16b5]
stable/4.14: [f1b1b63e307478e93548f59e18bd844744b396d3]
stable/4.19: [7dbfc8f25f22fe2a64dd808266e00c8d2661ebdd]
stable/4.9: [e580d3201ed222c4752ced7e629ad96bc0340713]
stable/5.10: [c5c4d4c9806dadac7bc82f9c29ef4e1b78894775]
stable/5.15: [103bd319c0fc90f1cb013c3a508615e6df8af823]
stable/5.19: [6901885656c029c976498290b52f67f2c251e6a0]
stable/5.4: [8ee27a4f0f1ad36d430221842767880df6494147]

Currently tracking CVEs

CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in
Bluetooth Core Specifications 4.0 through 5.2

There is no fix information.

CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh
Provisioning Leads to MITM

No fix information.

CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning

No fix information.

CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning

No fix information.

Regards,
--
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@...
:masami.ichikawa@...


Re: [PATCH 5.10.y-cip] drm: rcar-du: Fix Alpha blending issue on Gen3

Pavel Machek
 

Hi!

From: LUU HOAI <hoai.luu.ub@...>

commit b7aaa61726cbc7b941007af14a9f991a828c67e4 upstream.

As per R-Car-Gen3_Common_OPC_Customer_Notifications_V30.1.pdf,
unexpected image output(such as incorrect colors or planes being
invisible) can happen on the below conditions, as PnALPHAR register
is not initialized by reset.
Thank you, applied.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: [PATCH 5.10.y-cip 00/25] Add more support to RZ/G2UL SMARC EVK

Pavel Machek
 

Hi!

This patch series aims to add CANFD, WDT, USB2.0, AUDIO, Serial NOR Flash,
OSTM, ADC and RSPI on SMARC EVK based on RZ/G2UL SoC.

All these patches are cherry-picked from the mainline.
Thank you, applied.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: [PATCH 4.19.y-cip] drm: rcar-du: Fix Alpha blending issue on Gen3

Pavel Machek
 

Hi!

From: LUU HOAI <hoai.luu.ub@...>

commit b7aaa61726cbc7b941007af14a9f991a828c67e4 upstream.

As per R-Car-Gen3_Common_OPC_Customer_Notifications_V30.1.pdf,
unexpected image output(such as incorrect colors or planes being
invisible) can happen on the below conditions, as PnALPHAR register
is not initialized by reset.
Thank you, applied.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: [PATCH 5.10.y-cip 00/13] Add more document support for RZ/G2UL SoC.

Pavel Machek
 

Hi!

This patch series aims to document various IP's present in RZ/G2UL SoC and
RZ/V2L ADC.
Thank you, applied.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: [PATCH 5.10.y-cip 00/26] Add RZ/G2UL support

Pavel Machek
 

Hi!

This patch series aims to add Basic board support for SMARC EVK
based on RZ/G2UL SoC.
Thank you, applied.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: [PATCH 5.10.y-cip 00/10] Document RZ/G2UL SOC bindings

Pavel Machek
 

Hi!

This patch series aims to document various IP's present in
RZ/G2UL SoC.
Thank you, applied.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


cip-gitlab/ci/pavel/linux-test smc: 14 runs, 5 regressions (v5.10.138-cip15-10-g52cbd8ad1543e) #kernelci

kernelci.org bot <bot@...>
 

cip-gitlab/ci/pavel/linux-test smc: 14 runs, 5 regressions (v5.10.138-cip15-10-g52cbd8ad1543e)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
----------------------+--------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig | 1
qemu_x86_64 | x86_64 | lab-collabora | gcc-10 | x86_64_defconfig | 1

Details: https://kernelci.org/test/job/cip-gitlab/branch/ci%2Fpavel%2Flinux-test/kernel/v5.10.138-cip15-10-g52cbd8ad1543e/plan/smc/

Test: smc
Tree: cip-gitlab
Branch: ci/pavel/linux-test
Describe: v5.10.138-cip15-10-g52cbd8ad1543e
URL: https://gitlab.com/cip-project/cip-kernel/linux-cip.git
SHA: 52cbd8ad1543e12ef69b428c8535df3b2e60fa86


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
----------------------+--------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/6316a28bf2dc37d8ec35564c

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/smc-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/smc-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* smc.login: https://kernelci.org/test/case/id/6316a28bf2dc37d8ec35564d
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
----------------------+--------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/6316a2c7563f4a454f355652

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/smc-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/smc-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* smc.login: https://kernelci.org/test/case/id/6316a2c7563f4a454f355653
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
----------------------+--------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/631695fca9a019501e35564f

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/smc-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/smc-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* smc.login: https://kernelci.org/test/case/id/631695fca9a019501e355650
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
----------------------+--------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/631699f5dfa9130d763556a4

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/smc-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/smc-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* smc.login: https://kernelci.org/test/case/id/631699f5dfa9130d763556a5
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
----------------------+--------+---------------+----------+----------------------------+------------
qemu_x86_64 | x86_64 | lab-collabora | gcc-10 | x86_64_defconfig | 1

Details: https://kernelci.org/test/plan/id/631696601ddeb56a3b355645

Results: 15 PASS, 1 FAIL, 0 SKIP
Full config: x86_64_defconfig
Compiler: gcc-10 (gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/x86_64/x86_64_defconfig/gcc-10/lab-collabora/smc-qemu_x86_64.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/x86_64/x86_64_defconfig/gcc-10/lab-collabora/smc-qemu_x86_64.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/x86/rootfs.cpio.gz


* smc.CVE-2020-0543: https://kernelci.org/test/case/id/631696601ddeb56a3b355647
failing since 20 days (last pass: v5.10.131-cip13-49-g1145e9c6352e6, first fail: v5.10.131-cip13-84-g5fcbe4a63ab4d)

2022-09-06T00:37:40.933383 <8>[ 2.552757] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=CVE-2018-12207 RESULT=pass>
2022-09-06T00:37:40.937890 <8>[ 2.557610] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=CVE-2020-0543 RESULT=fail>


cip-gitlab/ci/pavel/linux-test ltp-timers: 10 runs, 1 regressions (v5.10.138-cip15-10-g52cbd8ad1543e) #kernelci

kernelci.org bot <bot@...>
 

cip-gitlab/ci/pavel/linux-test ltp-timers: 10 runs, 1 regressions (v5.10.138-cip15-10-g52cbd8ad1543e)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
--------------------------+--------+---------------+----------+------------------------------+------------
asus-C433TA-AJ0005-rammus | x86_64 | lab-collabora | gcc-10 | x86_64_defcon...6-chromebook | 1

Details: https://kernelci.org/test/job/cip-gitlab/branch/ci%2Fpavel%2Flinux-test/kernel/v5.10.138-cip15-10-g52cbd8ad1543e/plan/ltp-timers/

Test: ltp-timers
Tree: cip-gitlab
Branch: ci/pavel/linux-test
Describe: v5.10.138-cip15-10-g52cbd8ad1543e
URL: https://gitlab.com/cip-project/cip-kernel/linux-cip.git
SHA: 52cbd8ad1543e12ef69b428c8535df3b2e60fa86

Test suite revisions:
ltp-tests
URL: https://github.com/linux-test-project/ltp.git
SHA: 48cfd7a9977e6268b4aa2600608cebad7e0e42b8


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
--------------------------+--------+---------------+----------+------------------------------+------------
asus-C433TA-AJ0005-rammus | x86_64 | lab-collabora | gcc-10 | x86_64_defcon...6-chromebook | 1

Details: https://kernelci.org/test/plan/id/631699f27b489f05c4355673

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: x86_64_defconfig+x86-chromebook
Compiler: gcc-10 (gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/x86_64/x86_64_defconfig+x86-chromebook/gcc-10/lab-collabora/ltp-timers-asus-C433TA-AJ0005-rammus.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/x86_64/x86_64_defconfig+x86-chromebook/gcc-10/lab-collabora/ltp-timers-asus-C433TA-AJ0005-rammus.html
Rootfs: http://storage.kernelci.org/images/rootfs/debian/bullseye-ltp/20220826.0/amd64/initrd.cpio.gz


* ltp-timers.login: https://kernelci.org/test/case/id/631699f27b489f05c4355674
new failure (last pass: v5.10.131-cip13-84-g5fcbe4a63ab4d)


cip-gitlab/ci/pavel/linux-test kselftest-filesystems: 9 runs, 1 regressions (v5.10.138-cip15-10-g52cbd8ad1543e) #kernelci

kernelci.org bot <bot@...>
 

cip-gitlab/ci/pavel/linux-test kselftest-filesystems: 9 runs, 1 regressions (v5.10.138-cip15-10-g52cbd8ad1543e)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
-----------------------------+-------+--------------+----------+-----------+------------
meson-g12b-a311d-khadas-vim3 | arm64 | lab-baylibre | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/job/cip-gitlab/branch/ci%2Fpavel%2Flinux-test/kernel/v5.10.138-cip15-10-g52cbd8ad1543e/plan/kselftest-filesystems/

Test: kselftest-filesystems
Tree: cip-gitlab
Branch: ci/pavel/linux-test
Describe: v5.10.138-cip15-10-g52cbd8ad1543e
URL: https://gitlab.com/cip-project/cip-kernel/linux-cip.git
SHA: 52cbd8ad1543e12ef69b428c8535df3b2e60fa86


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
-----------------------------+-------+--------------+----------+-----------+------------
meson-g12b-a311d-khadas-vim3 | arm64 | lab-baylibre | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/631697a141ddd6680d355655

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-baylibre/kselftest-filesystems-meson-g12b-a311d-khadas-vim3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-baylibre/kselftest-filesystems-meson-g12b-a311d-khadas-vim3.html
Rootfs: http://storage.kernelci.org/images/rootfs/debian/bullseye-kselftest/20220826.0/arm64/initrd.cpio.gz


* kselftest-filesystems.login: https://kernelci.org/test/case/id/631697a141ddd6680d355656
new failure (last pass: v5.10.131-cip13-84-g5fcbe4a63ab4d)


cip-gitlab/ci/pavel/linux-test baseline: 165 runs, 22 regressions (v5.10.138-cip15-10-g52cbd8ad1543e) #kernelci

kernelci.org bot <bot@...>
 

cip-gitlab/ci/pavel/linux-test baseline: 165 runs, 22 regressions (v5.10.138-cip15-10-g52cbd8ad1543e)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
bcm2836-rpi-2-b | arm | lab-collabora | gcc-10 | multi_v7_defconfig | 1
da850-lcdk | arm | lab-baylibre | gcc-10 | davinci_all_defconfig | 1
imx6q-udoo | arm | lab-broonie | gcc-10 | imx_v6_v7_defconfig | 1
imx6q-udoo | arm | lab-broonie | gcc-10 | multi_v7_defconfig | 1
qemu_arm64-virt-gicv2 | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv2 | arm64 | lab-broonie | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv2 | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv2 | arm64 | lab-collabora | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv2-uefi | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv2-uefi | arm64 | lab-broonie | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv2-uefi | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv2-uefi | arm64 | lab-collabora | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv3-uefi | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv3-uefi | arm64 | lab-broonie | gcc-10 | defconfig | 1
qemu_arm64-virt-gicv3-uefi | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1
qemu_arm64-virt-gicv3-uefi | arm64 | lab-collabora | gcc-10 | defconfig | 1
zynqmp-zcu102 | arm64 | lab-cip | gcc-10 | defconfig+arm64-chromebook | 1
zynqmp-zcu102 | arm64 | lab-cip | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/job/cip-gitlab/branch/ci%2Fpavel%2Flinux-test/kernel/v5.10.138-cip15-10-g52cbd8ad1543e/plan/baseline/

Test: baseline
Tree: cip-gitlab
Branch: ci/pavel/linux-test
Describe: v5.10.138-cip15-10-g52cbd8ad1543e
URL: https://gitlab.com/cip-project/cip-kernel/linux-cip.git
SHA: 52cbd8ad1543e12ef69b428c8535df3b2e60fa86


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
bcm2836-rpi-2-b | arm | lab-collabora | gcc-10 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/6316977de607961815355672

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-10 (arm-linux-gnueabihf-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/multi_v7_defconfig/gcc-10/lab-collabora/baseline-bcm2836-rpi-2-b.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/multi_v7_defconfig/gcc-10/lab-collabora/baseline-bcm2836-rpi-2-b.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/armel/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/6316977de607961815355673
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
da850-lcdk | arm | lab-baylibre | gcc-10 | davinci_all_defconfig | 1

Details: https://kernelci.org/test/plan/id/6316949b8262ee36cb355659

Results: 5 PASS, 1 FAIL, 1 SKIP
Full config: davinci_all_defconfig
Compiler: gcc-10 (arm-linux-gnueabihf-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/davinci_all_defconfig/gcc-10/lab-baylibre/baseline-da850-lcdk.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/davinci_all_defconfig/gcc-10/lab-baylibre/baseline-da850-lcdk.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/armel/rootfs.cpio.gz


* baseline.dmesg.alert: https://kernelci.org/test/case/id/6316949b8262ee36cb35565d
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)
4 lines

2022-09-06T00:30:09.182025 kern :alert : BUG: Bad page state in process swapper pfn:c3000
2022-09-06T00:30:09.182328 kern :alert : BUG: Bad page state in process swapper pfn:c3400
2022-09-06T00:30:09.182794 kern :alert : BUG: Bad page state in process swapper pfn:c3800
2022-09-06T00:30:09.185254 kern :alert : BUG: Bad page state in process swapper pfn:c3c00
2022-09-06T00:30:09.227104 <8><LAVA_SIGNAL_TESTCASE TEST_CASE_ID=alert RESULT=fail UNITS=lines MEASUREMENT=4>



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
imx6q-udoo | arm | lab-broonie | gcc-10 | imx_v6_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/631698f23e042d2d65355667

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: imx_v6_v7_defconfig
Compiler: gcc-10 (arm-linux-gnueabihf-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/imx_v6_v7_defconfig/gcc-10/lab-broonie/baseline-imx6q-udoo.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/imx_v6_v7_defconfig/gcc-10/lab-broonie/baseline-imx6q-udoo.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/armel/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631698f23e042d2d65355668
failing since 20 days (last pass: v4.4-st20-96-g74ff989472f09, first fail: v5.10.131-cip13-49-g1145e9c6352e6)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
imx6q-udoo | arm | lab-broonie | gcc-10 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/63169727e905fd2293355658

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-10 (arm-linux-gnueabihf-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/multi_v7_defconfig/gcc-10/lab-broonie/baseline-imx6q-udoo.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm/multi_v7_defconfig/gcc-10/lab-broonie/baseline-imx6q-udoo.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/armel/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/63169727e905fd2293355659
failing since 24 days (last pass: v4.4-st20-96-g74ff989472f09, first fail: v5.10.131-cip13-35-gab58aa0904675)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2 | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/6316961f85c1dda4ea355642

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/6316961f85c1dda4ea355643
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2 | arm64 | lab-broonie | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/63169a7e50ed9cab3d355642

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/63169a7e50ed9cab3d355643
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2 | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/631695c2f8220890ce355653

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631695c2f8220890ce355654
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2 | arm64 | lab-collabora | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/631699bc0e5d2cca7e355642

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631699bc0e5d2cca7e355643
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2-uefi | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/63169736773fb5752d35566d

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/63169736773fb5752d35566e
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2-uefi | arm64 | lab-broonie | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/63169aba71227b48c03556d6

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv2-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/63169aba71227b48c03556d7
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2-uefi | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/631696e9f371d45cac35565e

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631696e9f371d45cac35565f
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv2-uefi | arm64 | lab-collabora | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/631699e483266c2e0435564f

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv2-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631699e483266c2e04355650
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/6316961e1ba94d1a3035567b

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/6316961e1ba94d1a3035567c
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-broonie | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/63169aa673319e9c07355782

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/63169aa673319e9c07355783
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/631695c1f8220890ce355643

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631695c1f8220890ce355644
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3 | arm64 | lab-collabora | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/631699d12641b88f8e355661

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631699d12641b88f8e355662
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3-uefi | arm64 | lab-broonie | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/6316974ac06d4d30e0355651

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/6316974ac06d4d30e0355652
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3-uefi | arm64 | lab-broonie | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/63169a924c57c915f1355650

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-broonie/baseline-qemu_arm64-virt-gicv3-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/63169a924c57c915f1355651
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3-uefi | arm64 | lab-collabora | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/631697117a6e2b38dc355665

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631697117a6e2b38dc355666
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
qemu_arm64-virt-gicv3-uefi | arm64 | lab-collabora | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/631699d02641b88f8e35565e

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3-uefi.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-collabora/baseline-qemu_arm64-virt-gicv3-uefi.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631699d02641b88f8e35565f
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
zynqmp-zcu102 | arm64 | lab-cip | gcc-10 | defconfig+arm64-chromebook | 1

Details: https://kernelci.org/test/plan/id/631695c981a7121c3b355649

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig+arm64-chromebook
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-cip/baseline-zynqmp-zcu102.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig+arm64-chromebook/gcc-10/lab-cip/baseline-zynqmp-zcu102.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/631695c981a7121c3b35564a
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)



platform | arch | lab | compiler | defconfig | regressions
---------------------------+-------+---------------+----------+----------------------------+------------
zynqmp-zcu102 | arm64 | lab-cip | gcc-10 | defconfig | 1

Details: https://kernelci.org/test/plan/id/63169781d9a1eda3aa35564f

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-10 (aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110)
Plain log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-cip/baseline-zynqmp-zcu102.txt
HTML log: https://storage.kernelci.org//cip-gitlab/ci-pavel-linux-test/v5.10.138-cip15-10-g52cbd8ad1543e/arm64/defconfig/gcc-10/lab-cip/baseline-zynqmp-zcu102.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/buildroot-baseline/20220805.0/arm64/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/63169781d9a1eda3aa355650
failing since 118 days (last pass: v4.19.233-516-ge5e741fbfc87, first fail: v5.10.109-cip5-384-g722204542e8a)

121 - 140 of 9599