From patchwork Thu Aug 31 10:24:10 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Emil Renner Berthing X-Patchwork-Id: 1828201 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=IKGMpyb/; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Rby2g6SSDz1ygM for ; Thu, 31 Aug 2023 20:24:43 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1qbeqk-0004Mg-0Y; Thu, 31 Aug 2023 10:24:30 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1qbeqe-0004Jg-0s for kernel-team@lists.ubuntu.com; Thu, 31 Aug 2023 10:24:24 +0000 Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id D635941D2F for ; Thu, 31 Aug 2023 10:24:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1693477463; bh=YTFPieiNYqbtzVf6bSYScJyMnGi9ad56UrE4GMP0dXE=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=IKGMpyb/SdHHRfARMadS/t5LzWFmWwoHt1NuldFe7bZYLEAQHXdSOlRnV26EFUlxb /DNf2pt8pcttfWaFCr7f616az84OBI/sFfxD1OzcQtmpJ6ewETCgNC//OBZHXpmbwN gR8/3HfLmTUYJ0px7lYIbXGL8tV+kXl1Xal9BUnEATs81HeLoW5SvEz6kxSOD+n3+K PLDdHjXN7tKx2WZ7WzpV6+aErQ5YVYWp9UX5WfnOwHjuCRgSYjYgYIVPfRdU3O3XSO OHne8ev5sBNO48vK5MZ8mqKDztDXZ7pm735/C9aLLWhvqDkDKVa3SQmd0p1dUHUFKN nLQGEXzLZ6+jQ== Received: by mail-ed1-f70.google.com with SMTP id 4fb4d7f45d1cf-51da39aa6dcso512021a12.2 for ; Thu, 31 Aug 2023 03:24:23 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693477463; x=1694082263; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YTFPieiNYqbtzVf6bSYScJyMnGi9ad56UrE4GMP0dXE=; b=dhPoJG+cTkukoZIP4I6t1vb/fHflfZPDyh/LQYXiKKGFsF95cQJTKOyePbY7gLMv8r Cw34ZN/llRkzx6zzRwjAW06VGQoFzOjFt4P1p64HwaEtCheVeYZtl+tArWWtrvXcpMwb ZOVGK5YYxRKlA7CMNM0NYmcmqDShCRsVk3ZmhyNA55gOqAs2mduY2ZKvqtDiPxTRjhIB Zg/ZyaU7T02z/AI5Z13N++XsUgXs9ZwLe+bret89hh/H721HjS5qQgcfNEdqAjVXyFqN OaZijjdsvtUw/SC9WIs+2DcT2/vGyXqZLeocd3sDaLgHwO/oqXQ2dLve+wVTFa9Sqrt0 UYUA== X-Gm-Message-State: AOJu0YwMeBN7c5O+KaUf8H+0dLA+kNAQyB4XH6HUdrQ6f7Yrfk82isgW 86bukPvQQoA3nNs1t7MXZCN47QcHdJgVjqcVLxrLhZs4feiPAjOZ7PWo43lmE8CMc4MCUu9wdkX eFcUVCKz/uUsVMc2gbNw9vA8PfY1YXtKpNc4e2yfecyAypS0Q0g== X-Received: by 2002:a17:906:1051:b0:9a1:d0bb:d215 with SMTP id j17-20020a170906105100b009a1d0bbd215mr3511905ejj.5.1693477463356; Thu, 31 Aug 2023 03:24:23 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFjDVSuApQXwJbPo0qWCiQOCyEMID9Ovy+knn1CWx3S/L9gXEuAilspMXbCMc76C7gIcxCCKA== X-Received: by 2002:a17:906:1051:b0:9a1:d0bb:d215 with SMTP id j17-20020a170906105100b009a1d0bbd215mr3511896ejj.5.1693477463074; Thu, 31 Aug 2023 03:24:23 -0700 (PDT) Received: from stitch.. (80.71.140.73.ipv4.parknet.dk. [80.71.140.73]) by smtp.gmail.com with ESMTPSA id h26-20020a1709062dda00b009a1fef32ce6sm599512eji.177.2023.08.31.03.24.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 31 Aug 2023 03:24:22 -0700 (PDT) From: Emil Renner Berthing To: kernel-team@lists.ubuntu.com Subject: [SRU][M][PATCH 02/12] UBUNTU: [Config] Enable virtually mapped stacks on riscv64 Date: Thu, 31 Aug 2023 12:24:10 +0200 Message-Id: <20230831102420.510624-3-emil.renner.berthing@canonical.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: <20230831102420.510624-1-emil.renner.berthing@canonical.com> References: <20230831102420.510624-1-emil.renner.berthing@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/1967130 On RISC-V there used to be a problem with accessing the EFI runtime services/variables if the kernel was configured with CONFIG_VMAP_STACK=y. This issue should now be resolved with the following upstream commit, so let's enable virtually mapped stacks again: 3f105a742725 ("riscv: Sync efi page table's kernel mappings before switching") Signed-off-by: Emil Renner Berthing --- debian.master/config/annotations | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/debian.master/config/annotations b/debian.master/config/annotations index 2da5a03bb460..a7a02093283d 100644 --- a/debian.master/config/annotations +++ b/debian.master/config/annotations @@ -14691,7 +14691,7 @@ CONFIG_VLAN_8021Q policy<{'amd64': 'm', 'arm64': ' CONFIG_VLAN_8021Q_GVRP policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> CONFIG_VLAN_8021Q_MVRP policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'ppc64el': 'y', 'riscv64': 'y', 's390x': 'y'}> CONFIG_VMAP_PFN policy<{'amd64': 'y', 'arm64': '-'}> -CONFIG_VMAP_STACK policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'riscv64': 'n', 's390x': 'y'}> +CONFIG_VMAP_STACK policy<{'amd64': 'y', 'arm64': 'y', 'armhf': 'y', 'riscv64': 'y', 's390x': 'y'}> CONFIG_VMCP policy<{'s390x': 'y'}> CONFIG_VMCP_CMA_SIZE policy<{'s390x': '4'}> CONFIG_VMD policy<{'amd64': 'm'}>