Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp2610451rdh; Sun, 26 Nov 2023 12:39:39 -0800 (PST) X-Google-Smtp-Source: AGHT+IGxVAomknY7FwybMjC2tf/1u/Yy3d2t+CWyy9KnHvqS8Tqu99ZiK5TFNLWqWW2R8gwiX5wb X-Received: by 2002:a05:6a20:8e18:b0:18c:30:f408 with SMTP id y24-20020a056a208e1800b0018c0030f408mr11341777pzj.0.1701031178805; Sun, 26 Nov 2023 12:39:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701031178; cv=none; d=google.com; s=arc-20160816; b=aefhAPotLyFNZk1/Tyr+C3xGqm5jrFr38KHRgHq7TFZ8IW98nddzQj3JdbgDry2LRG lFaeSzFEMML+FRMD7mc4uFTsuxpncnHmDpu6zGtKx27x8aSIJUl3SRlqpawNVOajWMZG dqmQbKjfeh4rKOO1DbKI1yaR0E/145ouTXk+tOHOR3GcKf72GuYo/gQpPFlMC57x+gz8 nKntefhR/tKrUu+rbmnUKj++mhDMxJXas8ui2y8G0zF+JWw7MrRJp4DsPGu1R++oN6DL i7VxD2q94JtfMiFxsF2KhfLR+OsvpC2H9J1Uh8mddNle6v+msuWzaqF4SuBbXtNHiBk2 VwAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=jjOh6Rssj2hTGItaKj4X/F6H3SlWmvKHirq3bzwzcPw=; fh=92IE5yKvlvJKPCO/oDKdqSDZgNQpu7Dp7UX8xpK9ZA4=; b=JCDTNrATocf7VrB/BePjZeOxT0bMgJwF4ymmSD0/nQjWtg3vHsS3+dKu9IETbuz6nr 640CYeKB4RTug492e+bSK02ZlI/6MDDgqW1OEGtabmVRPUkqcYrzH6Gsk2KibULbTL/Z xOacrEL4D5jlUDpzDMaqIFi2+CvDHKfXISMwCgtZ6RMO/9fq107o0eHP1F6GMGyvxxNJ PPrHvNzObeVCkpMHkfV0Ys/2II3cqmlctRT+dn+4Wp/Wxnr0e1/4VzeMYAY9DQdFeYI7 kVzB/VB1L9R92a3kRPZ4cUPOkp+7+HLtI2H/2CH0Oht3sKMVRl6Jj7YDXo/zMBPRWeJJ 9ERg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gmx.de Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id b18-20020a056a000cd200b006cc07022e9fsi3536410pfv.57.2023.11.26.12.39.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 26 Nov 2023 12:39:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gmx.de Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id EB948804B6BF; Sun, 26 Nov 2023 12:39:35 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229560AbjKZUjI (ORCPT + 99 others); Sun, 26 Nov 2023 15:39:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51662 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229437AbjKZUjH (ORCPT ); Sun, 26 Nov 2023 15:39:07 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B630891 for ; Sun, 26 Nov 2023 12:39:13 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 135D3C433C7; Sun, 26 Nov 2023 20:39:08 +0000 (UTC) Date: Sun, 26 Nov 2023 21:39:06 +0100 From: Helge Deller To: Guenter Roeck , Greg Kroah-Hartman Cc: stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, allen.lkml@gmail.com, Helge Deller Subject: Re: [PATCH 4.14 00/53] 4.14.331-rc2 review Message-ID: References: <20231125163059.878143365@linuxfoundation.org> <09f33739-9bf6-4ff8-895d-92d3567c3cb9@roeck-us.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <09f33739-9bf6-4ff8-895d-92d3567c3cb9@roeck-us.net> X-Spam-Status: No, score=-0.5 required=5.0 tests=FREEMAIL_FORGED_FROMDOMAIN, FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Sun, 26 Nov 2023 12:39:36 -0800 (PST) * Guenter Roeck : > On 11/25/23 08:32, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 4.14.331 release. > > There are 53 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Mon, 27 Nov 2023 16:30:48 +0000. > > Anything received after that time might be too late. > > > > Building parisc64:generic-64bit_defconfig ... failed > -------------- > Error log: > hppa64-linux-ld: arch/parisc/kernel/head.o: in function `$iodc_panic': > (.head.text+0x64): undefined reference to `init_stack' > hppa64-linux-ld: (.head.text+0x68): undefined reference to `init_stack' > make[1]: *** [Makefile:1049: vmlinux] Error 1 > make: *** [Makefile:153: sub-make] Error 2 Indeed. Thanks for testing, Guenter! Greg, could you please replace the patch in queue/4.14 with the one below? It simply uses another stack start, which is ok since the machine will stop anyway. No changes needed for your other stable-queues. I tested 4.19 and it's ok as-is. Thanks! Helge From 29e10df694b70b4283e2d6f6852afc0ea7823e5b Mon Sep 17 00:00:00 2001 From: Helge Deller Date: Fri, 10 Nov 2023 16:13:15 +0100 Subject: [PATCH] parisc: Prevent booting 64-bit kernels on PA1.x machines commit a406b8b424fa01f244c1aab02ba186258448c36b upstream. Bail out early with error message when trying to boot a 64-bit kernel on 32-bit machines. This fixes the previous commit to include the check for true 64-bit kernels as well. Patch modified for 4.14 to use __bss_stop for stack. This is OK, since the machine will halt after printing the warning. Signed-off-by: Helge Deller Fixes: 591d2108f3abc ("parisc: Add runtime check to prevent PA2.0 kernels on PA1.x machines") Cc: # v6.0+ Signed-off-by: Greg Kroah-Hartman diff --git a/arch/parisc/kernel/head.S b/arch/parisc/kernel/head.S index 2f570a520586..2f552ff3a75f 100644 --- a/arch/parisc/kernel/head.S +++ b/arch/parisc/kernel/head.S @@ -69,9 +69,8 @@ $bss_loop: stw,ma %arg2,4(%r1) stw,ma %arg3,4(%r1) -#if !defined(CONFIG_64BIT) && defined(CONFIG_PA20) - /* This 32-bit kernel was compiled for PA2.0 CPUs. Check current CPU - * and halt kernel if we detect a PA1.x CPU. */ +#if defined(CONFIG_PA20) + /* check for 64-bit capable CPU as required by current kernel */ ldi 32,%r10 mtctl %r10,%cr11 .level 2.0 @@ -84,7 +83,7 @@ $bss_loop: $iodc_panic: copy %arg0, %r10 copy %arg1, %r11 - load32 PA(init_stack),%sp + load32 PA(__bss_stop),%sp #define MEM_CONS 0x3A0 ldw MEM_CONS+32(%r0),%arg0 // HPA ldi ENTRY_IO_COUT,%arg1