Date   

Re: New CVE entries this week

Pavel Machek
 

Hi!

CVE-2021-3600: eBPF 32-bit source register truncation on div/mod

The vulnerability has been introduced since 4.15-rc9. 4.4 is not
affected. 4.19 is not fixed yet as of 2021/08/26.

mainline: [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90]
stable/5.10: [1d16cc210fabd0a7ebf52d3025f81c2bde054a90]
stable/5.4: [78e2f71b89b22222583f74803d14f3d90cdf9d12]
I took a look into this. Apparently 4.14 and 4.19 is affected. (
https://seclists.org/oss-sec/2021/q2/228 )

Due to BPF 32-bit subregister requirements (see bpf_design_QA.rst)
top 32 bits should be always zero when the 32 bit registers are in
use. So it could be possible to use BPF_JMP instead of BPF_JMP32.
Hmm, no; that is what original code did and what is known not to work
for reasons I don't fully understand.

Anyway, I asked on the lists, and according to Thadeu Lima de Souza
Cascardo Ubuntu did some work on it and is likely to do some more.

Oh, and we may want watch CVE-2021-3444, it is apparently related and
not yet fixed in 4.19.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: New CVE entries this week

Pavel Machek
 

Hi!

New CVEs

CVE-2020-3702: Specifically timed and handcrafted traffic can cause
internal errors in a WLAN device that lead to improper layer 2 Wi-Fi
encryption with a consequent possibility of information disclosure
over the air for a discrete set of traffic

This CVE affects ath9k driver.

Fixed status

mainline: [56c5485c9e444c2e85e11694b6c44f1338fc20fd,
73488cb2fa3bb1ef9f6cf0d757f76958bd4deaca,
d2d3e36498dd8e0c83ea99861fac5cf9e8671226,
144cd24dbc36650a51f7fe3bf1424a1432f1f480,
ca2848022c12789685d3fab3227df02b863f9696]
At least some of the relevant fixes are queued for
5.10.61/4.19. Likely this will resolve itself.

CVE-2021-3600: eBPF 32-bit source register truncation on div/mod

The vulnerability has been introduced since 4.15-rc9. 4.4 is not
affected. 4.19 is not fixed yet as of 2021/08/26.

mainline: [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90]
stable/5.10: [1d16cc210fabd0a7ebf52d3025f81c2bde054a90]
stable/5.4: [78e2f71b89b22222583f74803d14f3d90cdf9d12]
I took a look into this. Apparently 4.14 and 4.19 is affected. (
https://seclists.org/oss-sec/2021/q2/228 )

Due to BPF 32-bit subregister requirements (see bpf_design_QA.rst)
top 32 bits should be always zero when the 32 bit registers are in
use. So it could be possible to use BPF_JMP instead of BPF_JMP32.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


New CVE entries this week

Masami Ichikawa
 

Hi !

It's this week's CVE report.

* CVE short summary

** New CVEs

CVE-2020-3702: mainline is fixed

CVE-2021-3732: mainline and stable kernels are fixed

** Updated CVEs

There is no update.

** Tracking CVEs

CVE-2021-31615: No fix information as of 2021/08/26.

CVE-2021-3640: No fix information as of 2021/08/26.

CVE-2020-26555: No fix information as of 2021/08/26.

CVE-2020-26556: No fix information as of 2021/08/26.

CVE-2020-26557: No fix information as of 2021/08/26.

CVE-2020-26559: No fix information as of 2021/08/26.

CVE-2020-26560: No fix information as of 2021/08/26.

CVE-2021-3600: mainline, 5.10, 5.4 are fixed. 4.4 isn't affected. 4.19
isn't fixed.

* CVE detail

New CVEs

CVE-2020-3702: Specifically timed and handcrafted traffic can cause
internal errors in a WLAN device that lead to improper layer 2 Wi-Fi
encryption with a consequent possibility of information disclosure
over the air for a discrete set of traffic

This CVE affects ath9k driver.

Fixed status

mainline: [56c5485c9e444c2e85e11694b6c44f1338fc20fd,
73488cb2fa3bb1ef9f6cf0d757f76958bd4deaca,
d2d3e36498dd8e0c83ea99861fac5cf9e8671226,
144cd24dbc36650a51f7fe3bf1424a1432f1f480,
ca2848022c12789685d3fab3227df02b863f9696]

CVE-2021-3732: kernel: overlayfs: Mounting overlayfs inside an
unprivileged user namespace can reveal files

cip/4.19: [963d85d630dabe75a3cfde44a006fec3304d07b8]
cip/4.4: [c6e8810d25295acb40a7b69ed3962ff181919571]
mainline: [427215d85e8d1476da1a86b8d67aceb485eb3631]
stable/4.14: [517b875dfbf58f0c6c9e32dc90f5cf42d71a42ce]
stable/4.19: [963d85d630dabe75a3cfde44a006fec3304d07b8]
stable/4.4: [c6e8810d25295acb40a7b69ed3962ff181919571]
stable/4.9: [e3eee87c846dc47f6d8eb6d85e7271f24122a279]
stable/5.10: [6a002d48a66076524f67098132538bef17e8445e]
stable/5.13: [41812f4b84484530057513478c6770590347dc30]
stable/5.4: [812f39ed5b0b7f34868736de3055c92c7c4cf459]

Updated CVEs

There is no update.

Currently tracking CVEs

CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in
Bluetooth Core Specifications 4.0 through 5.2

There is no fix information as of 2021/08/26.

CVE-2021-3640: UAF in sco_send_frame function

There is no fix information as of 2021/08/26.

CVE-2020-26555: BR/EDR pin code pairing broken

There is no fix information as of 2021/08/26.

CVE-2020-26556: kernel: malleable commitment Bluetooth Mesh Provisioning

No fix information as of 2021/08/26.

CVE-2020-26557: kernel: predictable Authvalue in Bluetooth Mesh
Provisioning Leads to MITM

No fix information as of 2021/08/26.

CVE-2020-26559: kernel: Authvalue leak in Bluetooth Mesh Provisioning

No fix information as of 2021/08/26.

CVE-2020-26560: kernel: impersonation attack in Bluetooth Mesh Provisioning

No fix information as of 2021/08/26.

CVE-2021-3600: eBPF 32-bit source register truncation on div/mod

The vulnerability has been introduced since 4.15-rc9. 4.4 is not
affected. 4.19 is not fixed yet as of 2021/08/26.

mainline: [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90]
stable/5.10: [1d16cc210fabd0a7ebf52d3025f81c2bde054a90]
stable/5.4: [78e2f71b89b22222583f74803d14f3d90cdf9d12]

Regards,


--
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@...
:masami.ichikawa@...


CIP IRC weekly meeting today on libera.chat

masashi.kudo@cybertrust.co.jp <masashi.kudo@...>
 

Hi all,

 

Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today.

 

Please note that we already moved from Freenode to libera.chat, and our channel is the following:

              irc:irc.libera.chat:6667/cip

 

Please also note that the IRC meeting was rescheduled to UTC (GMT) 13:00.

https://www.timeanddate.com/worldclock/meetingdetails.html?year=2021&month=8&day=26&hour=13&min=0&sec=0&p1=224&p2=179&p3=136&p4=37&p5=241&p6=248

 

USWest USEast  UK         DE         TW        JP

06:00     09:00     14:00     15:00     21:00     22:00

 

Last meeting minutes:

https://irclogs.baserock.org/meetings/cip/2021/08/cip.2021-08-19-09.00.log.html

https://irclogs.baserock.org/meetings/cip/2021/08/cip.2021-08-19-13.00.log.html

 

* Action item

  1. Combine root filesystem with kselftest binary - iwamatsu & alicef

  2. Do some experiment to lower burdens on CI - patersonc

 

* Kernel maintenance updates

* Kernel testing

* AOB

 

The meeting will take 30 min, although it can be extended to an hour if it makes sense and those involved in the topics can stay. Otherwise, the topic will be taken offline or in the next meeting.

 

Best regards,

--

M. Kudo

Cybertrust Japan Co., Ltd.


Re: [isar-cip-dev][PATCH] Uprevision the cip-kernel-config to latest one

Jan Kiszka
 

On 10.08.21 09:20, Srinuvasan A wrote:
From: Srinuvasan A <srinuvasan_a@...>

Uprevision the cip-kernel-config to latest one.

Signed-off-by: Srinuvasan A <srinuvasan_a@...>
---
recipes-kernel/linux/linux-cip-common.inc | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/recipes-kernel/linux/linux-cip-common.inc b/recipes-kernel/linux/linux-cip-common.inc
index 6362408..1afec88 100644
--- a/recipes-kernel/linux/linux-cip-common.inc
+++ b/recipes-kernel/linux/linux-cip-common.inc
@@ -25,6 +25,6 @@ SRC_URI_append = " ${@ "git://gitlab.com/cip-project/cip-kernel/cip-kernel-confi

SRC_URI_append_bbb = "file://${KERNEL_DEFCONFIG}"

-SRCREV_cip-kernel-config ?= "b72318b9346f7262f6dd7511384ca61bd8b545c8"
+SRCREV_cip-kernel-config ?= "cd5d43e99f4d5f20707d7ac1e721bb22d4c9e16e"

S = "${WORKDIR}/linux-cip-v${PV}"
Thanks, applied.

Jan

--
Siemens AG, T RDA IOT
Corporate Competence Center Embedded Linux


Re: [isar-cip-dev][PATCH] Uprevision the cip-kernel-config to latest one

Srinuvasan A
 

Hi All,

                  Can you please merge into next.

Thanks.


[ANNOUNCE] Release v4.19.204-cip55 and v4.4.281-cip61

Nobuhiro Iwamatsu
 

Hi,

Sorry, release was delayed due to a LAVA issue.

CIP kernel team has released Linux kernel v4.19.204-cip55 and v4.4.281-cip61.
The linux-4.19.y-cip tree has been updated base version from v4.19.198
to v4.19.204, and the linux-4.4.y-cip tree has been updated base version from
v4.4.277 to v4.4.281.

You can get this release via the git tree at:

v4.19.204-cip55:
repository:
https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
branch:
linux-4.19.y-cip
commit hash:
62089879a4547be35f0c23d8992c51ab5898e076
added commits:
CIP: Bump version suffix to -cip55 after merge from stable

v4.4.281-cip61:
repository:
https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
branch:
linux-4.4.y-cip
commit hash:
4efaeea21a7699c04fddc3381cd86c6e37676d20
added commits:
CIP: Bump version suffix to -cip61 after merge from stable

Best regards,
Nobuhiro

--
Nobuhiro Iwamatsu


Re: Old CVE entries worth watching -- was Re: [cip-dev] New CVE entries this week

Masami Ichikawa
 

Hi !

On Thu, Aug 19, 2021 at 4:23 PM Pavel Machek <pavel@...> wrote:

Hi!

I was going through CVE entries for a month or so and these
accumulated in that time. Would it make sense to add them to the
current "watch list"?

** Bluetooth

Unfortunately, not enough info is present here:

CVE-2020-26555 -- BR/EDR pin code pairing broken
CVE-2020-26556 CVE-2020-26557 CVE-2020-26559 CVE-2020-26560 -- bluetooth mesh

** BPF

CVE-2021-3600 -- More eBPF issues. 4.19+, but we still may need to
fix 4.19
Thank you for the information.
I'll add these CVEs to tracking list.

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Regrads,
--
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@...
:masami.ichikawa@...


Re: New CVE entries this week

Nobuhiro Iwamatsu
 

Hi,

-----Original Message-----
From: cip-dev@... [mailto:cip-dev@...] On Behalf Of Pavel Machek
Sent: Thursday, August 19, 2021 4:10 PM
To: cip-dev@...
Subject: Re: [cip-dev] New CVE entries this week

Hi!


CVE-2021-38198: KVM: X86: MMU: Use the correct inherited permissions
to get shadow page

This vulnerability has been introduced since 2.6.20-rc4 so 4.4 affects
this CVE but patch didn't apply to 4.4
(https://lore.kernel.org/stable/162358450944186@kroah.com/). 4.19 also
failed to apply this patch but backport patch has been merged
recently(https://lore.kernel.org/stable/20210812174140.2370680-1-ovidiu.panait@windriver.com/).
I tried to look at this, and it is rather non-trivial. In particular,
I'd not know how to test it. I ended up with this patch, but it is not
even compile-tested.
Thanks for your work. I just checked this issue.

This probably won't compile because the walk_nx_mask variable isn't well defined.
I think we need to backport a patch for this variable or create another patch.


Best regards,
Pavel
Best regards,
Nobuhiro


diff --git a/Documentation/virtual/kvm/mmu.txt b/Documentation/virtual/kvm/mmu.txt
index b653641d4261..ee5bd16a0856 100644
--- a/Documentation/virtual/kvm/mmu.txt
+++ b/Documentation/virtual/kvm/mmu.txt
@@ -152,8 +152,8 @@ Shadow pages contain the following information:
shadow pages) so role.quadrant takes values in the range 0..3. Each
quadrant maps 1GB virtual address space.
role.access:
- Inherited guest access permissions in the form uwx. Note execute
- permission is positive, not negative.
+ Inherited guest access permissions from the parent ptes in the form uwx.
+ Note execute permission is positive, not negative.
role.invalid:
The page is invalid and should not be used. It is a root page that is
currently pinned (by a cpu hardware register pointing to it); once it is
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index 7be8a251363e..cebcf7b29b15 100644
--- a/arch/x86/kvm/paging_tmpl.h
+++ b/arch/x86/kvm/paging_tmpl.h
@@ -100,8 +100,8 @@ struct guest_walker {
gpa_t pte_gpa[PT_MAX_FULL_LEVELS];
pt_element_t __user *ptep_user[PT_MAX_FULL_LEVELS];
bool pte_writable[PT_MAX_FULL_LEVELS];
- unsigned pt_access;
- unsigned pte_access;
+ unsigned int pt_access[PT_MAX_FULL_LEVELS];
+ unsigned int pte_access;
gfn_t gfn;
struct x86_exception fault;
};
@@ -354,6 +354,9 @@ retry_walk:
pte_access = pt_access & FNAME(gpte_access)(vcpu, pte);

walker->ptes[walker->level - 1] = pte;
+
+ /* Convert to ACC_*_MASK flags for struct guest_walker. */
+ walker->pt_access[walker->level - 1] = FNAME(gpte_access)(pt_access ^ walk_nx_mask);
} while (!is_last_gpte(mmu, walker->level, pte));

if (unlikely(permission_fault(vcpu, mmu, pte_access, access))) {
@@ -392,10 +395,11 @@ retry_walk:
goto retry_walk;
}

- walker->pt_access = pt_access;
- walker->pte_access = pte_access;
+ walker->pt_access = FNAME(gpte_access)(pt_access ^ walk_nx_mask);
+ walker->pte_access = FNAME(gpte_access)(pte_access ^ walk_nx_mask);
pgprintk("%s: pte %llx pte_access %x pt_access %x\n",
- __func__, (u64)pte, pte_access, pt_access);
+ __func__, (u64)pte, walker->pte_access,
+ walker->pt_access[walker->level - 1]);
return 1;

error:
@@ -555,7 +559,7 @@ static int FNAME(fetch)(struct kvm_vcpu *vcpu, gva_t addr,
{
struct kvm_mmu_page *sp = NULL;
struct kvm_shadow_walk_iterator it;
- unsigned direct_access, access = gw->pt_access;
+ unsigned int direct_access, access;
int top_level, emulate = 0;

direct_access = gw->pte_access;
@@ -586,6 +590,7 @@ static int FNAME(fetch)(struct kvm_vcpu *vcpu, gva_t addr,
sp = NULL;
if (!is_shadow_present_pte(*it.sptep)) {
table_gfn = gw->table_gfn[it.level - 2];
+ access = gw->pt_access[it.level - 2];
sp = kvm_mmu_get_page(vcpu, table_gfn, addr, it.level-1,
false, access, it.sptep);
}


--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: New CVE entries this week

Masami Ichikawa
 

Hi !

On Thu, Aug 19, 2021 at 4:10 PM Pavel Machek <pavel@...> wrote:

Hi!


CVE-2021-38198: KVM: X86: MMU: Use the correct inherited permissions
to get shadow page

This vulnerability has been introduced since 2.6.20-rc4 so 4.4 affects
this CVE but patch didn't apply to 4.4
(https://lore.kernel.org/stable/162358450944186@kroah.com/). 4.19 also
failed to apply this patch but backport patch has been merged
recently(https://lore.kernel.org/stable/20210812174140.2370680-1-ovidiu.panait@windriver.com/).
I tried to look at this, and it is rather non-trivial. In particular,
I'd not know how to test it. I ended up with this patch, but it is not
even compile-tested.

Best regards,
Pavel

diff --git a/Documentation/virtual/kvm/mmu.txt b/Documentation/virtual/kvm/mmu.txt
index b653641d4261..ee5bd16a0856 100644
--- a/Documentation/virtual/kvm/mmu.txt
+++ b/Documentation/virtual/kvm/mmu.txt
@@ -152,8 +152,8 @@ Shadow pages contain the following information:
shadow pages) so role.quadrant takes values in the range 0..3. Each
quadrant maps 1GB virtual address space.
role.access:
- Inherited guest access permissions in the form uwx. Note execute
- permission is positive, not negative.
+ Inherited guest access permissions from the parent ptes in the form uwx.
+ Note execute permission is positive, not negative.
role.invalid:
The page is invalid and should not be used. It is a root page that is
currently pinned (by a cpu hardware register pointing to it); once it is
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index 7be8a251363e..cebcf7b29b15 100644
--- a/arch/x86/kvm/paging_tmpl.h
+++ b/arch/x86/kvm/paging_tmpl.h
@@ -100,8 +100,8 @@ struct guest_walker {
gpa_t pte_gpa[PT_MAX_FULL_LEVELS];
pt_element_t __user *ptep_user[PT_MAX_FULL_LEVELS];
bool pte_writable[PT_MAX_FULL_LEVELS];
- unsigned pt_access;
- unsigned pte_access;
+ unsigned int pt_access[PT_MAX_FULL_LEVELS];
+ unsigned int pte_access;
gfn_t gfn;
struct x86_exception fault;
};
@@ -354,6 +354,9 @@ retry_walk:
pte_access = pt_access & FNAME(gpte_access)(vcpu, pte);

walker->ptes[walker->level - 1] = pte;
+
+ /* Convert to ACC_*_MASK flags for struct guest_walker. */
+ walker->pt_access[walker->level - 1] = FNAME(gpte_access)(pt_access ^ walk_nx_mask);
} while (!is_last_gpte(mmu, walker->level, pte));

if (unlikely(permission_fault(vcpu, mmu, pte_access, access))) {
@@ -392,10 +395,11 @@ retry_walk:
goto retry_walk;
}

- walker->pt_access = pt_access;
- walker->pte_access = pte_access;
+ walker->pt_access = FNAME(gpte_access)(pt_access ^ walk_nx_mask);
+ walker->pte_access = FNAME(gpte_access)(pte_access ^ walk_nx_mask);
pgprintk("%s: pte %llx pte_access %x pt_access %x\n",
- __func__, (u64)pte, pte_access, pt_access);
+ __func__, (u64)pte, walker->pte_access,
+ walker->pt_access[walker->level - 1]);
return 1;

error:
@@ -555,7 +559,7 @@ static int FNAME(fetch)(struct kvm_vcpu *vcpu, gva_t addr,
{
struct kvm_mmu_page *sp = NULL;
struct kvm_shadow_walk_iterator it;
- unsigned direct_access, access = gw->pt_access;
+ unsigned int direct_access, access;
int top_level, emulate = 0;

direct_access = gw->pte_access;
@@ -586,6 +590,7 @@ static int FNAME(fetch)(struct kvm_vcpu *vcpu, gva_t addr,
sp = NULL;
if (!is_shadow_present_pte(*it.sptep)) {
table_gfn = gw->table_gfn[it.level - 2];
+ access = gw->pt_access[it.level - 2];
sp = kvm_mmu_get_page(vcpu, table_gfn, addr, it.level-1,
false, access, it.sptep);
}

Thank you for the patch. I looked at both original
patch(b1bd5cba3306691c771d558e94baa73e8b0b96b7) and your's.
This patch looks good to me.

--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Regards,

--
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@...
:masami.ichikawa@...


Old CVE entries worth watching -- was Re: [cip-dev] New CVE entries this week

Pavel Machek
 

Hi!

I was going through CVE entries for a month or so and these
accumulated in that time. Would it make sense to add them to the
current "watch list"?

** Bluetooth

Unfortunately, not enough info is present here:

CVE-2020-26555 -- BR/EDR pin code pairing broken
CVE-2020-26556 CVE-2020-26557 CVE-2020-26559 CVE-2020-26560 -- bluetooth mesh

** BPF

CVE-2021-3600 -- More eBPF issues. 4.19+, but we still may need to
fix 4.19

Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: New CVE entries this week

Pavel Machek
 

Hi!


CVE-2021-38198: KVM: X86: MMU: Use the correct inherited permissions
to get shadow page

This vulnerability has been introduced since 2.6.20-rc4 so 4.4 affects
this CVE but patch didn't apply to 4.4
(https://lore.kernel.org/stable/162358450944186@kroah.com/). 4.19 also
failed to apply this patch but backport patch has been merged
recently(https://lore.kernel.org/stable/20210812174140.2370680-1-ovidiu.panait@windriver.com/).
I tried to look at this, and it is rather non-trivial. In particular,
I'd not know how to test it. I ended up with this patch, but it is not
even compile-tested.

Best regards,
Pavel

diff --git a/Documentation/virtual/kvm/mmu.txt b/Documentation/virtual/kvm/mmu.txt
index b653641d4261..ee5bd16a0856 100644
--- a/Documentation/virtual/kvm/mmu.txt
+++ b/Documentation/virtual/kvm/mmu.txt
@@ -152,8 +152,8 @@ Shadow pages contain the following information:
shadow pages) so role.quadrant takes values in the range 0..3. Each
quadrant maps 1GB virtual address space.
role.access:
- Inherited guest access permissions in the form uwx. Note execute
- permission is positive, not negative.
+ Inherited guest access permissions from the parent ptes in the form uwx.
+ Note execute permission is positive, not negative.
role.invalid:
The page is invalid and should not be used. It is a root page that is
currently pinned (by a cpu hardware register pointing to it); once it is
diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
index 7be8a251363e..cebcf7b29b15 100644
--- a/arch/x86/kvm/paging_tmpl.h
+++ b/arch/x86/kvm/paging_tmpl.h
@@ -100,8 +100,8 @@ struct guest_walker {
gpa_t pte_gpa[PT_MAX_FULL_LEVELS];
pt_element_t __user *ptep_user[PT_MAX_FULL_LEVELS];
bool pte_writable[PT_MAX_FULL_LEVELS];
- unsigned pt_access;
- unsigned pte_access;
+ unsigned int pt_access[PT_MAX_FULL_LEVELS];
+ unsigned int pte_access;
gfn_t gfn;
struct x86_exception fault;
};
@@ -354,6 +354,9 @@ retry_walk:
pte_access = pt_access & FNAME(gpte_access)(vcpu, pte);

walker->ptes[walker->level - 1] = pte;
+
+ /* Convert to ACC_*_MASK flags for struct guest_walker. */
+ walker->pt_access[walker->level - 1] = FNAME(gpte_access)(pt_access ^ walk_nx_mask);
} while (!is_last_gpte(mmu, walker->level, pte));

if (unlikely(permission_fault(vcpu, mmu, pte_access, access))) {
@@ -392,10 +395,11 @@ retry_walk:
goto retry_walk;
}

- walker->pt_access = pt_access;
- walker->pte_access = pte_access;
+ walker->pt_access = FNAME(gpte_access)(pt_access ^ walk_nx_mask);
+ walker->pte_access = FNAME(gpte_access)(pte_access ^ walk_nx_mask);
pgprintk("%s: pte %llx pte_access %x pt_access %x\n",
- __func__, (u64)pte, pte_access, pt_access);
+ __func__, (u64)pte, walker->pte_access,
+ walker->pt_access[walker->level - 1]);
return 1;

error:
@@ -555,7 +559,7 @@ static int FNAME(fetch)(struct kvm_vcpu *vcpu, gva_t addr,
{
struct kvm_mmu_page *sp = NULL;
struct kvm_shadow_walk_iterator it;
- unsigned direct_access, access = gw->pt_access;
+ unsigned int direct_access, access;
int top_level, emulate = 0;

direct_access = gw->pte_access;
@@ -586,6 +590,7 @@ static int FNAME(fetch)(struct kvm_vcpu *vcpu, gva_t addr,
sp = NULL;
if (!is_shadow_present_pte(*it.sptep)) {
table_gfn = gw->table_gfn[it.level - 2];
+ access = gw->pt_access[it.level - 2];
sp = kvm_mmu_get_page(vcpu, table_gfn, addr, it.level-1,
false, access, it.sptep);
}


--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


CIP IRC weekly meeting today on libera.chat

masashi.kudo@cybertrust.co.jp <masashi.kudo@...>
 

Hi all,

There seems to be some confusion about the change of meeting slot.
And I admit that it was too sudden.
So, this week, I am going to host two meetings at UTC (GMT) 09:00 and UTC (GMT) 13:00 as follows:
1) UTC (GMT) 09:00
USWest USEast UK DE TW JP
02:00 05:00 10:00 11:00 17:00 18:00
2) UTC (GMT) 13:00
USWest USEast UK DE TW JP
06:00 09:00 14:00 15:00 21:00 22:00

Please join whichever convenient for you through the following channel:
irc:irc.libera.chat:6667/cip

Last meeting minutes:
https://irclogs.baserock.org/meetings/cip/2021/08/cip.2021-08-12-09.00.log.html

* Action item
1. Combine root filesystem with kselftest binary - iwamatsu & alicef
2. Do some experiment to lower burdens on CI - patersonc

* Kernel maintenance updates
* Kernel testing
* AOB

The meeting will take 30 min, although it can be extended to an hour if it makes sense and those involved in the topics can stay. Otherwise, the topic will be taken offline or in the next meeting.

Best regards,
--
M. Kudo
Cybertrust Japan Co., Ltd.


New CVE entries this week

Masami Ichikawa
 

Hi !

It's this week's CVE report.

* CVE short summary

** New CVEs

CVE-2021-3653: mainline, 5.10, 5.13, 5.4 are fixed.

CVE-2021-3656: mainline, 5.10, 5.13, 5.4 are fixed. 4.4 is not affected.

** Updated CVEs

CVE-2021-33624: mainline, 4.19, 5.10, 5,12, 5.4 are fixed. 4.4 is not
affected by this vulnerability.

CVE-2021-38198: mainline, 4.19, 5.10, 5.4 are fixed. 4.4 affects this
vulnerability.

CVE-2021-38205: mainline and stable kernels are fixed.

** Tracking CVEs

CVE-2021-31615: there is no fixed information as of 2021/08/12

CVE-2021-3640: there is no fixed information as of 2021/08/12


* CVE detail

New CVEs

CVE-2021-3653: KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl

CVE-2021-3653 and CVE-2021-3656 are vulnerable when nested kvm is enabled.

Patch for 4.19 is backported by
https://lore.kernel.org/stable/20210816140240.11399-2-pbonzini@redhat.com/
but not applyed yet.

Fixed status

mainline: [0f923e07124df069ba68d8bb12324398f4b6b709]
stable/5.10: [c0883f693187c646c0972d73e525523f9486c2e3]
stable/5.13: [a0949ee63cf95408870a564ccad163018b1a9e6b]
stable/5.4: [7c1c96ffb658fbfe66c5ebed6bcb5909837bc267]

CVE-2021-3656: KVM: nSVM: always intercept VMLOAD/VMSAVE when nested

This vulnerability has been introduced since 4.13-rc1 so that 4.4
kernel is not affected.
CVE-2021-3653 and CVE-2021-3656 are vulnerable when nested kvm is enabled.

Patch for 4.19 is backported by
https://lore.kernel.org/stable/20210816140240.11399-9-pbonzini@redhat.com/
but not applyed yet.

Fixed status

mainline: [c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc]
stable/5.10: [3dc5666baf2a135f250e4101d41d5959ac2c2e1f]
stable/5.13: [639a033fd765ed473dfee27028df5ccbe1038a2e]
stable/5.4: [a17f2f2c89494c0974529579f3552ecbd1bc2d52]

Updated CVEs

CVE-2021-33624: Linux kernel BPF protection against speculative
execution attacks can be bypassed to read arbitrary kernel memory

The main patch 9183671af6dbf60a1219371d4ed73e23f43b49db fixes commit
b2157399cc9898260d6031c5bfe45fe137c1fbe7 which has been merged since
4.15-rc8 so 4.4 aren't affected this vulnerability.

Fixed status

mainline: [d203b0fd863a2261e5d00b97f3d060c4c2a6db71,
fe9a5ca7e370e613a9a75a13008a3845ea759d6e,
9183671af6dbf60a1219371d4ed73e23f43b49db,
973377ffe8148180b2651825b92ae91988141b05]
stable/4.19: [0abc8c9754c953f5cd0ac7488c668ca8d53ffc90,
c510c1845f7b54214b4117272e0d87dff8732af6,
9df311b2e743642c5427ecf563c5050ceb355d1d,
c15b387769446c37a892f958b169744dabf7ff23]
stable/5.10: [e9d271731d21647f8f9e9a261582cf47b868589a,
8c82c52d1de931532200b447df8b4fc92129cfd9,
5fc6ed1831ca5a30fb0ceefd5e33c7c689e7627b]
stable/5.12: [408a4956acde24413f3c684912b1d3e404bed8e2,
68a1936e1812653b68c5b68e698d88fb35018835,
4a99047ed51c98a09a537fe2c12420d815dfe296,
e5e2010ac3e27efa1e6e830b250f491da82d51b4]
stable/5.4: [283d742988f6b304f32110f39e189a00d4e52b92,
d2f790327f83b457db357e7c66f942bc00d43462,
fd568de5806f8859190e6305a1792ba8cb20de61,
a0f66ddf05c2050e1b7f53256bd9c25c2bb3022b]

CVE-2021-38198: KVM: X86: MMU: Use the correct inherited permissions
to get shadow page

This vulnerability has been introduced since 2.6.20-rc4 so 4.4 affects
this CVE but patch didn't apply to 4.4
(https://lore.kernel.org/stable/162358450944186@kroah.com/). 4.19 also
failed to apply this patch but backport patch has been merged
recently(https://lore.kernel.org/stable/20210812174140.2370680-1-ovidiu.panait@windriver.com/).


Fixed status

mainline: [b1bd5cba3306691c771d558e94baa73e8b0b96b7]
stable/4.19: [4c07e70141eebd3db64297515a427deea4822957]
stable/5.10: [6b6ff4d1f349cb35a7c7d2057819af1b14f80437]
stable/5.4: [d28adaabbbf4a6949d0f6f71daca6744979174e2]

CVE-2021-38205: net: xilinx_emaclite: Do not print real IOMEM pointer

We talked about this CVE at previous weekly CVE report. Thank your for
Pavel to backport the patch.

Fixed status

mainline: [d0d62baa7f505bd4c59cd169692ff07ec49dde37]
stable/4.14: [1994eacac7af52da86e4b0cb6ae61621bef7393f]
stable/4.19: [9322401477a6d1f9de8f18e5d6eb43a68e0b113a]
stable/4.4: [3d4ba14fc5ffbe5712055af09a5c0cbab93c0f44]
stable/4.9: [ffdc1e312e2074875147c1df90764a9bae56f11f]
stable/5.10: [25cff25ec60690247db8138cd1af8b867df2c489]
stable/5.13: [8722275b41d5127048e1422a8a1b6370b4878533]
stable/5.4: [38b8485b72cbe4521fd2e0b8770e3d78f9b89e60]

Currently tracking CVEs

CVE-2021-31615: Unencrypted Bluetooth Low Energy baseband links in
Bluetooth Core Specifications 4.0 through 5.2

There is no fixed information as of 2021/08/19.

CVE-2021-3640: UAF in sco_send_frame function

There is no fixed information as of 2021/08/19.

Regards,


--
Masami Ichikawa
Cybertrust Japan Co., Ltd.

Email :masami.ichikawa@...
:masami.ichikawa@...


Re: IRC meeting start time

masashi.kudo@cybertrust.co.jp <masashi.kudo@...>
 

Hi, Pavel-san,

I thought time shift was agreed at the TSC.
Sorry if there are any miscommunications.
--
M. Kudo

-----Original Message-----
From: cip-dev@... <cip-dev@...> On Behalf Of Pavel Machek
Sent: Thursday, August 19, 2021 3:31 AM
To: cip-dev@...
Subject: Re: [cip-dev] IRC meeting start time

Hi!

We will change start time of IRC meetings held every Thursday.
We will start the meeting at UTC 13:00. That is:
- Summer Time: USWest 06:00, USEast 09:00, UK 14:00, DE 15:00, TW 21:00, JP 22:00
- Winter Time: USWest 05:00, USEast 08:00, UK 13:00, DE 14:00, TW
21:00, JP 22:00

This change is effective starting tomorrow.
I was at TSC Zoom meeting but did not realize consequences. I have scheduling conflict this week, so I'll most likely not make it.

Best regards,
Pavel

--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Re: IRC meeting start time

Pavel Machek
 

Hi!

We will change start time of IRC meetings held every Thursday.
We will start the meeting at UTC 13:00. That is:
- Summer Time: USWest 06:00, USEast 09:00, UK 14:00, DE 15:00, TW 21:00, JP 22:00
- Winter Time: USWest 05:00, USEast 08:00, UK 13:00, DE 14:00, TW 21:00, JP 22:00

This change is effective starting tomorrow.
I was at TSC Zoom meeting but did not realize consequences. I have
scheduling conflict this week, so I'll most likely not make it.

Best regards,
Pavel

--
DENX Software Engineering GmbH, Managing Director: Wolfgang Denk
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


cip/linux-4.19.y-cip sleep: 6 runs, 1 regressions (v4.19.204-cip55) #kernelci

kernelci.org bot <bot@...>
 

cip/linux-4.19.y-cip sleep: 6 runs, 1 regressions (v4.19.204-cip55)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
-----------------+-------+---------------+----------+-----------+------------
rk3399-gru-kevin | arm64 | lab-collabora | gcc-8 | defconfig | 1

Details: https://kernelci.org/test/job/cip/branch/linux-4.19.y-cip/kernel/v4.19.204-cip55/plan/sleep/

Test: sleep
Tree: cip
Branch: linux-4.19.y-cip
Describe: v4.19.204-cip55
URL: https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
SHA: 62089879a4547be35f0c23d8992c51ab5898e076


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
-----------------+-------+---------------+----------+-----------+------------
rk3399-gru-kevin | arm64 | lab-collabora | gcc-8 | defconfig | 1

Details: https://kernelci.org/test/plan/id/611d30336e62eb7898b1367d

Results: 12 PASS, 1 FAIL, 0 SKIP
Full config: defconfig
Compiler: gcc-8 (aarch64-linux-gnu-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm64/defconfig/gcc-8/lab-collabora/sleep-rk3399-gru-kevin.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm64/defconfig/gcc-8/lab-collabora/sleep-rk3399-gru-kevin.html
Rootfs: http://storage.kernelci.org/images/rootfs/debian/buster/20210730.6/arm64/rootfs.cpio.gz


* sleep.rtcwake-mem-9: https://kernelci.org/test/case/id/611d30336e62eb7898b13680
new failure (last pass: v4.19.196-cip53)

2021-08-18T16:02:57.508679 rtcwake: assuming RTC uses UTC ...
2021-08-18T16:02:57.514286 rtcwake: wakeup from \"mem\" using rtc0 at Wed Aug 18 16:01:42 2021
2021-08-18T16:02:57.526691 <6>[ 41.289634] PM: suspend entry (deep)
2021-08-18T16:02:57.533625 <6>[ 41.295802] PM: Syncing filesystems ... done.
2021-08-18T16:02:57.544560 <6>[ 41.303062] Freezing user space processes ... (elapsed 0.001 seconds) done.
2021-08-18T16:02:57.550872 <6>[ 41.314291] OOM killer disabled.
2021-08-18T16:02:57.562818 <6>[ 41.320061] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done.
2021-08-18T16:02:57.570706 <6>[ 41.331660] Suspending console(s) (use no_console_suspend to debug)
2021-08-18T16:02:58.694728 <3>[ 41.935659] mwifiex_pcie 0000:01:00.0: adapter is not valid
2021-08-18T16:02:58.703393 <4>[ 42.000138] xhci-hcd xhci-hcd.2.auto: WARN: xHC CMD_RUN timeout
... (13 line(s) more)


cip/linux-4.4.y-cip baseline: 168 runs, 14 regressions (v4.4.281-cip61) #kernelci

kernelci.org bot <bot@...>
 

cip/linux-4.4.y-cip baseline: 168 runs, 14 regressions (v4.4.281-cip61)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
dove-cubox | arm | lab-pengutronix | gcc-8 | mvebu_v7_defconfig | 1
imx6q-sabresd | arm | lab-nxp | gcc-8 | multi_v7_defconfig+ima | 1
qemu_arm-virt-gicv2 | arm | lab-baylibre | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1
qemu_arm-virt-gicv2 | arm | lab-baylibre | gcc-8 | multi_v7_defconfig | 1
qemu_arm-virt-gicv2 | arm | lab-cip | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1
qemu_arm-virt-gicv2 | arm | lab-cip | gcc-8 | multi_v7_defconfig | 1
qemu_arm-virt-gicv2 | arm | lab-collabora | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1
qemu_arm-virt-gicv2 | arm | lab-collabora | gcc-8 | multi_v7_defconfig | 1
qemu_arm-virt-gicv3 | arm | lab-baylibre | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1
qemu_arm-virt-gicv3 | arm | lab-baylibre | gcc-8 | multi_v7_defconfig | 1
qemu_arm-virt-gicv3 | arm | lab-cip | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1
qemu_arm-virt-gicv3 | arm | lab-cip | gcc-8 | multi_v7_defconfig | 1
qemu_arm-virt-gicv3 | arm | lab-collabora | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1
qemu_arm-virt-gicv3 | arm | lab-collabora | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/job/cip/branch/linux-4.4.y-cip/kernel/v4.4.281-cip61/plan/baseline/

Test: baseline
Tree: cip
Branch: linux-4.4.y-cip
Describe: v4.4.281-cip61
URL: https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
SHA: 4efaeea21a7699c04fddc3381cd86c6e37676d20


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
dove-cubox | arm | lab-pengutronix | gcc-8 | mvebu_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d30246e62eb7898b1366e

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: mvebu_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/mvebu_v7_defconfig/gcc-8/lab-pengutronix/baseline-dove-cubox.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/mvebu_v7_defconfig/gcc-8/lab-pengutronix/baseline-dove-cubox.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d30246e62eb7898b1366f
failing since 13 days (last pass: v4.4.274-cip59, first fail: v4.4.277-cip60)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
imx6q-sabresd | arm | lab-nxp | gcc-8 | multi_v7_defconfig+ima | 1

Details: https://kernelci.org/test/plan/id/611d3210aa4e73d2b5b1369a

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig+ima
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+ima/gcc-8/lab-nxp/baseline-imx6q-sabresd.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+ima/gcc-8/lab-nxp/baseline-imx6q-sabresd.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d3210aa4e73d2b5b1369b
new failure (last pass: v4.4.277-cip60)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv2 | arm | lab-baylibre | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1

Details: https://kernelci.org/test/plan/id/611d353fd8621310d6b136b0

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_SMP=n
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d353fd8621310d6b136b1
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv2 | arm | lab-baylibre | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d365969fb811bc0b13682

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d365969fb811bc0b13683
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv2 | arm | lab-cip | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1

Details: https://kernelci.org/test/plan/id/611d32aff68e2f47dbb136a0

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_SMP=n
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d32aff68e2f47dbb136a1
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv2 | arm | lab-cip | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d33c41792c101b0b13693

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d33c41792c101b0b13694
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv2 | arm | lab-collabora | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1

Details: https://kernelci.org/test/plan/id/611d382d3a644bcd4cb1368c

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_SMP=n
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d382d3a644bcd4cb1368d
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv2 | arm | lab-collabora | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d398bc990c1790eb13663

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv2.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv2.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d398bc990c1790eb13664
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv3 | arm | lab-baylibre | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1

Details: https://kernelci.org/test/plan/id/611d35cc6cfffb910bb136a0

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_SMP=n
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d35cc6cfffb910bb136a1
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv3 | arm | lab-baylibre | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d365869fb811bc0b13675

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-baylibre/baseline-qemu_arm-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d365869fb811bc0b13676
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv3 | arm | lab-cip | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1

Details: https://kernelci.org/test/plan/id/611d333b3f06c5f627b13662

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_SMP=n
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d333b3f06c5f627b13663
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv3 | arm | lab-cip | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d33b91792c101b0b13672

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-cip/baseline-qemu_arm-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d33b91792c101b0b13673
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv3 | arm | lab-collabora | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 1

Details: https://kernelci.org/test/plan/id/611d388bc0e35a29beb13661

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_SMP=n
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d388bc0e35a29beb13662
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)



platform | arch | lab | compiler | defconfig | regressions
--------------------+------+-----------------+----------+------------------------------+------------
qemu_arm-virt-gicv3 | arm | lab-collabora | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d3906c786f3bee0b13669

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv3.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-collabora/baseline-qemu_arm-virt-gicv3.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d3906c786f3bee0b1366a
failing since 266 days (last pass: v4.4.243-cip51, first fail: v4.4.243-cip51-10-gd7466739b72e9)


cip/linux-4.4.y-cip baseline-nfs: 29 runs, 1 regressions (v4.4.281-cip61) #kernelci

kernelci.org bot <bot@...>
 

cip/linux-4.4.y-cip baseline-nfs: 29 runs, 1 regressions (v4.4.281-cip61)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
-----------+------+-----------------+----------+--------------------+------------
dove-cubox | arm | lab-pengutronix | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/job/cip/branch/linux-4.4.y-cip/kernel/v4.4.281-cip61/plan/baseline-nfs/

Test: baseline-nfs
Tree: cip
Branch: linux-4.4.y-cip
Describe: v4.4.281-cip61
URL: https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
SHA: 4efaeea21a7699c04fddc3381cd86c6e37676d20


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
-----------+------+-----------------+----------+--------------------+------------
dove-cubox | arm | lab-pengutronix | gcc-8 | multi_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d328309a0788b8eb1368c

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-pengutronix/baseline-nfs-dove-cubox.txt
HTML log: https://storage.kernelci.org//cip/linux-4.4.y-cip/v4.4.281-cip61/arm/multi_v7_defconfig/gcc-8/lab-pengutronix/baseline-nfs-dove-cubox.html
Rootfs: http://storage.kernelci.org/images/rootfs/debian/buster/20210730.6/armhf/initrd.cpio.gz


* baseline-nfs.login: https://kernelci.org/test/case/id/611d328309a0788b8eb1368d
failing since 93 days (last pass: v4.4.266-cip56, first fail: v4.4.268-cip57)


cip/linux-4.19.y-cip baseline: 357 runs, 14 regressions (v4.19.204-cip55) #kernelci

kernelci.org bot <bot@...>
 

cip/linux-4.19.y-cip baseline: 357 runs, 14 regressions (v4.19.204-cip55)

Regressions Summary
-------------------

platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
imx6ul-14x14-evk | arm | lab-nxp | gcc-8 | imx_v6_v7_defconfig | 1
qemu_arm-versatilepb | arm | lab-baylibre | gcc-8 | versatile_defconfig | 1
qemu_arm-versatilepb | arm | lab-broonie | gcc-8 | versatile_defconfig | 1
qemu_arm-versatilepb | arm | lab-cip | gcc-8 | versatile_defconfig | 1
qemu_arm-versatilepb | arm | lab-collabora | gcc-8 | versatile_defconfig | 1
rk3288-veyron-jaq | arm | lab-collabora | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 3
rk3288-veyron-jaq | arm | lab-collabora | gcc-8 | multi_v7_defconfig | 3
rk3288-veyron-jaq | arm | lab-collabora | gcc-8 | multi_v7_defc...G_ARM_LPAE=y | 3

Details: https://kernelci.org/test/job/cip/branch/linux-4.19.y-cip/kernel/v4.19.204-cip55/plan/baseline/

Test: baseline
Tree: cip
Branch: linux-4.19.y-cip
Describe: v4.19.204-cip55
URL: https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
SHA: 62089879a4547be35f0c23d8992c51ab5898e076


Test Regressions
----------------


platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
imx6ul-14x14-evk | arm | lab-nxp | gcc-8 | imx_v6_v7_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d342b7cc0d07da9b1368e

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: imx_v6_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/imx_v6_v7_defconfig/gcc-8/lab-nxp/baseline-imx6ul-14x14-evk.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/imx_v6_v7_defconfig/gcc-8/lab-nxp/baseline-imx6ul-14x14-evk.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d342b7cc0d07da9b1368f
new failure (last pass: v4.19.196-cip53)



platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
qemu_arm-versatilepb | arm | lab-baylibre | gcc-8 | versatile_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d2aee3a542a7c69b13663

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: versatile_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-baylibre/baseline-qemu_arm-versatilepb.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-baylibre/baseline-qemu_arm-versatilepb.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d2aee3a542a7c69b13664
failing since 277 days (last pass: v4.19.152-cip37-37-g18852869b06b, first fail: v4.19.157-cip38)



platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
qemu_arm-versatilepb | arm | lab-broonie | gcc-8 | versatile_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d36ce44cf7a72a2b13701

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: versatile_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-broonie/baseline-qemu_arm-versatilepb.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-broonie/baseline-qemu_arm-versatilepb.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d36ce44cf7a72a2b13702
failing since 277 days (last pass: v4.19.152-cip37-37-g18852869b06b, first fail: v4.19.157-cip38)



platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
qemu_arm-versatilepb | arm | lab-cip | gcc-8 | versatile_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d29b0fb2ac7a26fb13673

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: versatile_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-cip/baseline-qemu_arm-versatilepb.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-cip/baseline-qemu_arm-versatilepb.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d29b0fb2ac7a26fb13674
failing since 277 days (last pass: v4.19.152-cip37-37-g18852869b06b, first fail: v4.19.157-cip38)



platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
qemu_arm-versatilepb | arm | lab-collabora | gcc-8 | versatile_defconfig | 1

Details: https://kernelci.org/test/plan/id/611d29953ff7d59c3cb1369a

Results: 0 PASS, 1 FAIL, 0 SKIP
Full config: versatile_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-collabora/baseline-qemu_arm-versatilepb.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/versatile_defconfig/gcc-8/lab-collabora/baseline-qemu_arm-versatilepb.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.login: https://kernelci.org/test/case/id/611d29953ff7d59c3cb1369b
failing since 277 days (last pass: v4.19.152-cip37-37-g18852869b06b, first fail: v4.19.157-cip38)



platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
rk3288-veyron-jaq | arm | lab-collabora | gcc-8 | multi_v7_defc...CONFIG_SMP=n | 3

Details: https://kernelci.org/test/plan/id/611d312daa53039bccb136c2

Results: 64 PASS, 6 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_SMP=n
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/baseline-rk3288-veyron-jaq.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/multi_v7_defconfig+CONFIG_SMP=n/gcc-8/lab-collabora/baseline-rk3288-veyron-jaq.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.bootrr.rockchip-iodomain-grf-probed: https://kernelci.org/test/case/id/611d312daa53039bccb136da
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:11:06.006545 <4>[ 18.739876] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:06.014942 <3>[ 18.748509] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:06.027757 <3>[ 18.757216] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:06.245019 <4>[ 18.969910] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:06.245412 <3>[ 18.978567] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:06.257992 <3>[ 18.987308] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:06.507030 <4>[ 19.239877] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:06.528137 <3>[ 19.248560] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:06.528433 <3>[ 19.257308] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:06.746870 <4>[ 19.479882] cros-ec-spi spi0.0: EC failed to respond in time
... (4 line(s) more)

* baseline.bootrr.dwmmc_rockchip-sdio0-probed: https://kernelci.org/test/case/id/611d312daa53039bccb136f1
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:11:02.877050 <4>[ 15.609893] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:02.885082 <3>[ 15.618649] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:02.897981 <3>[ 15.627468] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:03.125264 <4>[ 15.849909] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:03.125557 <3>[ 15.858639] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:03.137992 <3>[ 15.867457] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:03.357088 <4>[ 16.089910] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:03.378179 <3>[ 16.098636] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:03.378494 <3>[ 16.107429] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:03.597253 <4>[ 16.329926] cros-ec-spi spi0.0: EC failed to respond in time
... (7 line(s) more)

* baseline.bootrr.dwmmc_rockchip-sdmmc-probed: https://kernelci.org/test/case/id/611d312daa53039bccb136f2
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:11:01.782954 <3>[ 14.513010] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:01.997007 <4>[ 14.729893] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:02.005053 <3>[ 14.738641] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:02.018246 <3>[ 14.747461] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:02.236536 <4>[ 14.969876] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:02.256324 <3>[ 14.978593] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:02.262060 <3>[ 14.987374] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
2021-08-18T16:11:02.637189 <4>[ 15.369887] cros-ec-spi spi0.0: EC failed to respond in time
2021-08-18T16:11:02.645148 <3>[ 15.378609] cros-ec-spi spi0.0: Command xfer error (err:-110)
2021-08-18T16:11:02.661034 <3>[ 15.387393] cros-ec-i2c-tunnel ff110000.spi:ec@0:i2c-tunnel: Error transferring EC i2c message -110
... (2 line(s) more)



platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
rk3288-veyron-jaq | arm | lab-collabora | gcc-8 | multi_v7_defconfig | 3

Details: https://kernelci.org/test/plan/id/611d330392824da1b1b1366f

Results: 64 PASS, 6 FAIL, 0 SKIP
Full config: multi_v7_defconfig
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/multi_v7_defconfig/gcc-8/lab-collabora/baseline-rk3288-veyron-jaq.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/multi_v7_defconfig/gcc-8/lab-collabora/baseline-rk3288-veyron-jaq.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.bootrr.rockchip-iodomain-grf-probed: https://kernelci.org/test/case/id/611d330392824da1b1b13687
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:19:04.202493 /lava-4377579/1/../bin/lava-test-case
2021-08-18T16:19:04.218549 <8>[ 22.864076] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=rockchip-iodomain-grf-probed RESULT=fail>
2021-08-18T16:19:04.218787 /lava-4377579/1/../bin/lava-test-case

* baseline.bootrr.dwmmc_rockchip-sdio0-probed: https://kernelci.org/test/case/id/611d330392824da1b1b136a0
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:19:01.775925 /lava-4377579/1/../bin/lava-test-case<8>[ 20.421423] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=dwmmc_rockchip-sdio0-probed RESULT=fail>
2021-08-18T16:19:01.776272
2021-08-18T16:19:01.776466 /lava-4377579/1/../bin/lava-test-case

* baseline.bootrr.dwmmc_rockchip-sdmmc-probed: https://kernelci.org/test/case/id/611d330392824da1b1b136a1
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:19:00.738547 /lava-4377579/1/../bin/lava-test-case
2021-08-18T16:19:00.743719 <8>[ 19.401948] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=dwmmc_rockchip-sdmmc-probed RESULT=fail>



platform | arch | lab | compiler | defconfig | regressions
---------------------+------+---------------+----------+------------------------------+------------
rk3288-veyron-jaq | arm | lab-collabora | gcc-8 | multi_v7_defc...G_ARM_LPAE=y | 3

Details: https://kernelci.org/test/plan/id/611d35970f556b668eb13681

Results: 64 PASS, 6 FAIL, 0 SKIP
Full config: multi_v7_defconfig+CONFIG_EFI=y+CONFIG_ARM_LPAE=y
Compiler: gcc-8 (arm-linux-gnueabihf-gcc (Debian 8.3.0-2) 8.3.0)
Plain log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/multi_v7_defconfig+CONFIG_EFI=y+CONFIG_ARM_LPAE=y/gcc-8/lab-collabora/baseline-rk3288-veyron-jaq.txt
HTML log: https://storage.kernelci.org//cip/linux-4.19.y-cip/v4.19.204-cip55/arm/multi_v7_defconfig+CONFIG_EFI=y+CONFIG_ARM_LPAE=y/gcc-8/lab-collabora/baseline-rk3288-veyron-jaq.html
Rootfs: http://storage.kernelci.org/images/rootfs/buildroot/kci-2020.05-6-g8983f3b738df/armel/baseline/rootfs.cpio.gz


* baseline.bootrr.rockchip-iodomain-grf-probed: https://kernelci.org/test/case/id/611d35970f556b668eb13699
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:29:58.539646 /lava-4377601/1/../bin/lava-test-case
2021-08-18T16:29:58.556795 <8>[ 17.390104] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=rockchip-iodomain-grf-probed RESULT=fail>
2021-08-18T16:29:58.557112 /lava-4377601/1/../bin/lava-test-case

* baseline.bootrr.dwmmc_rockchip-sdio0-probed: https://kernelci.org/test/case/id/611d35970f556b668eb136af
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:29:56.102860 /lava-4377601/1/../bin/lava-test-case
2021-08-18T16:29:56.103261 <8>[ 14.951016] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=dwmmc_rockchip-sdio0-probed RESULT=fail>

* baseline.bootrr.dwmmc_rockchip-sdmmc-probed: https://kernelci.org/test/case/id/611d35970f556b668eb136b0
failing since 40 days (last pass: v4.19.194-cip51, first fail: v4.19.196-cip53)

2021-08-18T16:29:55.081926 /lava-4377601/1/../bin/lava-test-case
2021-08-18T16:29:55.087100 <8>[ 13.931800] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=dwmmc_rockchip-sdmmc-probed RESULT=fail>

1921 - 1940 of 8627