From patchwork Thu Jun 8 16:37:26 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tim Gardner X-Patchwork-Id: 1792405 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=I2CFuX/l; dkim-atps=neutral Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4QcVHr230kz20Wn for ; Fri, 9 Jun 2023 02:37:44 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1q7Idm-0000kb-D1; Thu, 08 Jun 2023 16:37:38 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1q7Idi-0000jj-Jg for kernel-team@lists.ubuntu.com; Thu, 08 Jun 2023 16:37:34 +0000 Received: from mail-pf1-f197.google.com (mail-pf1-f197.google.com [209.85.210.197]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 6F6D73F15F for ; Thu, 8 Jun 2023 16:37:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1686242253; bh=QXUfMZM8ql/z6/Hi0DK6Hc2FfafD1RLkhsyP3nZXPkg=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=I2CFuX/lwkVpu4cfFg5YkjgBzm7BzVfn4NaEa+n1p6Dp4/BrxjLPtUP7pA19E8RVa hseDJj52JPd88cePMqBNUAoP2rdO5b+NAB9nb/kd0voKQKEWzOYADkTN9twGFNFAxN jPqjY3ilceqBrGMPMey56vALmYUoJSXuLivtmBGWp4gCYoWWpyuSI5G4IYFUtPQd4g RwOMYzjW6oFLE8qcg8cnVOa8vltP7jxg3XwdHM8ZSkZkNMcCntx1hCLlyBHWLddFRy yaf9LFj2iTmiea9qX1Lj+17HbUXcgTIS6LKkHxX0vKbXfOuCvPBSubxU4ARkXF9Rq0 i7ebka9n2L+Ig== Received: by mail-pf1-f197.google.com with SMTP id d2e1a72fcca58-653c16b3093so421864b3a.3 for ; Thu, 08 Jun 2023 09:37:33 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686242251; x=1688834251; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=QXUfMZM8ql/z6/Hi0DK6Hc2FfafD1RLkhsyP3nZXPkg=; b=OBm8iGW7Dg/DbAihZ3Idbi+q7iYHOad4VgKkTSbrAS+lbG/EHeo5ZSj2RQY7w2dKXw mfw1JDXBOeEkMMVKx6wKOQQWwFB2jYTVnRjZcFiMTxmn1o9ce9n+MuJ8ryQyIvxaoODu aBx+pcdRm6rHzmkdLae0hDlNeedn6YbUzCkiW+r5usjCk3xuvd0FHnlKtXqRfv00YKJ6 tFGKnYDTBZNV1wXPhW0csWS+I2rOenhhn2O5fYmN9qEMg7Amu6fXnbjdu4FXsdWg7dJs KsP6SkBF/IC7bccOxu+X52bErrq0LRmi6hEvwPAMegXXM0ZonbeoxAdZ/s/SET0leG6c dSpg== X-Gm-Message-State: AC+VfDwjinEqOJ5bfRSFlvDIwF4+c80loLoZdmTxOqoSSMc2GHRkTVZY nZj01KOoT7HJU16zI7mdxGRDrvdOsaQn9i78gA1lfO48iCAPSdDpCTAllsz7/iULUhRF0vgsP4w nAGTH2KeMax6G1C2kRvjjm8JS10ArvyNir81DVbmZG4+oXQBifA== X-Received: by 2002:a05:6a00:114a:b0:662:1126:909f with SMTP id b10-20020a056a00114a00b006621126909fmr4196539pfm.8.1686242251173; Thu, 08 Jun 2023 09:37:31 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5PstF6I38yLhl/Y3L2xL5P9pQhen3pzw6X2jivAdQFyTnEYi2C5aV0s7g7aHuToK9oUc/V/Q== X-Received: by 2002:a05:6a00:114a:b0:662:1126:909f with SMTP id b10-20020a056a00114a00b006621126909fmr4196515pfm.8.1686242250870; Thu, 08 Jun 2023 09:37:30 -0700 (PDT) Received: from smtp.gmail.com (174-045-099-030.res.spectrum.com. [174.45.99.30]) by smtp.gmail.com with ESMTPSA id x16-20020aa79190000000b0064f76992905sm1286658pfa.202.2023.06.08.09.37.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 08 Jun 2023 09:37:30 -0700 (PDT) From: Tim Gardner To: kernel-team@lists.ubuntu.com Subject: [PATCH 0/1][jammy/kinetic linux] Resolve synchronous exception on arm64 Date: Thu, 8 Jun 2023 10:37:26 -0600 Message-Id: <20230608163727.585219-1-tim.gardner@canonical.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/2023311 SRU Justification [Impact] MSFT has requested the inclusion of commit e8dfdf3162eb549d064b8c10b1564f7e8ee82591 ('arm64: efi: Recover from synchronous exceptions occurring in firmware'). It looks generic enough to apply to the master kernels. Unlike x86, which has machinery to deal with page faults that occur during the execution of EFI runtime services, arm64 has nothing like that, and a synchronous exception raised by firmware code brings down the whole system. [Test Plan] This looks like a hard one to reproduce. Boot and regression testing should be sufficient. [Regression Potential] Firmware exceptions could still take down the system. [Other Info] SF: #00362062 Acked-by: Andrei Gherzan