source
large_stringclasses
2 values
subject
large_stringclasses
112 values
code
large_stringclasses
112 values
critique
large_stringlengths
61
3.04M
metadata
dict
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
The new hash-based module integrity checking will also be able to satisfy the requirements of lockdown. Such an alternative is not representable with "select", so use "depends on" instead. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- security/lockdown/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/lockdown/Kconfig b/security/lockdown/Kconfig index e84ddf484010..155959205b8e 100644 --- a/security/lockdown/Kconfig +++ b/security/lockdown/Kconfig @@ -1,7 +1,7 @@ config SECURITY_LOCKDOWN_LSM bool "Basic module for enforcing kernel lockdown" depends on SECURITY - select MODULE_SIG if MODULES + depends on !MODULES || MODULE_SIG help Build support for an LSM that enforces a coarse kernel lockdown behaviour. -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:28:58 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
The upcoming CONFIG_MODULE_HASHES will introduce a signature type. This needs to be handled by callers differently than PKCS7 signatures. Report the signature type to the caller and let them verify it. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- include/linux/module_signature.h | 2 +- kernel/module/main.c | 9 +++++++-- kernel/module_signature.c | 14 ++++---------- security/integrity/ima/ima_modsig.c | 8 +++++++- 4 files changed, 19 insertions(+), 14 deletions(-) diff --git a/include/linux/module_signature.h b/include/linux/module_signature.h index 186a55effa30..a45ce3b24403 100644 --- a/include/linux/module_signature.h +++ b/include/linux/module_signature.h @@ -41,6 +41,6 @@ struct module_signature { }; int mod_split_sig(const void *buf, size_t *buf_len, bool mangled, - size_t *sig_len, const u8 **sig, const char *name); + enum pkey_id_type *sig_type, size_t *sig_len, const u8 **sig, const char *name); #endif /* _LINUX_MODULE_SIGNATURE_H */ diff --git a/kernel/module/main.c b/kernel/module/main.c index d65bc300a78c..2a28a0ece809 100644 --- a/kernel/module/main.c +++ b/kernel/module/main.c @@ -3348,19 +3348,24 @@ static int module_integrity_check(struct load_info *info, int flags) { bool mangled_module = flags & (MODULE_INIT_IGNORE_MODVERSIONS | MODULE_INIT_IGNORE_VERMAGIC); + enum pkey_id_type sig_type; size_t sig_len; const u8 *sig; int err = 0; if (IS_ENABLED(CONFIG_MODULE_SIG_POLICY)) { err = mod_split_sig(info->hdr, &info->len, mangled_module, - &sig_len, &sig, "module"); + &sig_type, &sig_len, &sig, "module"); if (err) return err; } - if (IS_ENABLED(CONFIG_MODULE_SIG)) + if (IS_ENABLED(CONFIG_MODULE_SIG) && sig_type == PKEY_ID_PKCS7) { err = module_sig_check(info, sig, sig_len); + } else { + pr_err("module: not signed with expected PKCS#7 message\n"); + err = -ENOPKG; + } if (err) return err; diff --git a/kernel/module_signature.c b/kernel/module_signature.c index b2384a73524c..8e0ac9906c9c 100644 --- a/kernel/module_signature.c +++ b/kernel/module_signature.c @@ -19,18 +19,11 @@ * @file_len: Size of the file to which @ms is appended. * @name: What is being checked. Used for error messages. */ -static int mod_check_sig(const struct module_signature *ms, size_t file_len, - const char *name) +static int mod_check_sig(const struct module_signature *ms, size_t file_len, const char *name) { if (be32_to_cpu(ms->sig_len) >= file_len - sizeof(*ms)) return -EBADMSG; - if (ms->id_type != PKEY_ID_PKCS7) { - pr_err("%s: not signed with expected PKCS#7 message\n", - name); - return -ENOPKG; - } - if (ms->algo != 0 || ms->hash != 0 || ms->signer_len != 0 || @@ -38,7 +31,7 @@ static int mod_check_sig(const struct module_signature *ms, size_t file_len, ms->__pad[0] != 0 || ms->__pad[1] != 0 || ms->__pad[2] != 0) { - pr_err("%s: PKCS#7 signature info has unexpected non-zero params\n", + pr_err("%s: signature info has unexpected non-zero params\n", name); return -EBADMSG; } @@ -47,7 +40,7 @@ static int mod_check_sig(const struct module_signature *ms, size_t file_len, } int mod_split_sig(const void *buf, size_t *buf_len, bool mangled, - size_t *sig_len, const u8 **sig, const char *name) + enum pkey_id_type *sig_type, size_t *sig_len, const u8 **sig, const char *name) { const unsigned long markerlen = sizeof(MODULE_SIG_STRING) - 1; struct module_signature ms; @@ -74,6 +67,7 @@ int mod_split_sig(const void *buf, size_t *buf_len, bool mangled, if (ret) return ret; + *sig_type = ms.id_type; *sig_len = be32_to_cpu(ms.sig_len); modlen -= *sig_len + sizeof(ms); *buf_len = modlen; diff --git a/security/integrity/ima/ima_modsig.c b/security/integrity/ima/ima_modsig.c index a57342d39b07..a05008324a10 100644 --- a/security/integrity/ima/ima_modsig.c +++ b/security/integrity/ima/ima_modsig.c @@ -41,15 +41,21 @@ int ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len, struct modsig **modsig) { size_t buf_len_sz = buf_len; + enum pkey_id_type sig_type; struct modsig *hdr; size_t sig_len; const u8 *sig; int rc; - rc = mod_split_sig(buf, &buf_len_sz, true, &sig_len, &sig, func_tokens[func]); + rc = mod_split_sig(buf, &buf_len_sz, true, &sig_type, &sig_len, &sig, func_tokens[func]); if (rc) return rc; + if (sig_type != PKEY_ID_PKCS7) { + pr_err("%s: not signed with expected PKCS#7 message\n", func_tokens[func]); + return -ENOPKG; + } + /* Allocate sig_len additional bytes to hold the raw PKCS#7 data. */ hdr = kzalloc(struct_size(hdr, raw_pkcs7, sig_len), GFP_KERNEL); if (!hdr) -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:28:57 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
CONFIG_MODULE_HASHES needs to process the modules at build time in the exact form they will be loaded at runtime. If the modules are stripped afterwards they will not be loadable anymore. Also evaluate INSTALL_MOD_STRIP at build time and build the hashes based on modules stripped this way. If users specify inconsistent values of INSTALL_MOD_STRIP between build and installation time, an error is reported. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- .gitignore | 1 + kernel/module/Kconfig | 5 +++++ scripts/Makefile.modfinal | 9 +++++++-- scripts/Makefile.modinst | 4 ++-- scripts/Makefile.vmlinux | 1 + 5 files changed, 16 insertions(+), 4 deletions(-) diff --git a/.gitignore b/.gitignore index 299c54083672..900251c72ade 100644 --- a/.gitignore +++ b/.gitignore @@ -29,6 +29,7 @@ *.gz *.i *.ko +*.ko.stripped *.lex.c *.ll *.lst diff --git a/kernel/module/Kconfig b/kernel/module/Kconfig index c00ca830330c..9fd34765ce2c 100644 --- a/kernel/module/Kconfig +++ b/kernel/module/Kconfig @@ -425,6 +425,11 @@ config MODULE_HASHES Also see the warning in MODULE_SIG about stripping modules. +# To validate the consistency of INSTALL_MOD_STRIP for MODULE_HASHES +config MODULE_INSTALL_STRIP + string + default "$(INSTALL_MOD_STRIP)" + config MODULE_ALLOW_MISSING_NAMESPACE_IMPORTS bool "Allow loading of modules with missing namespace imports" help diff --git a/scripts/Makefile.modfinal b/scripts/Makefile.modfinal index 5b8e94170beb..890724edac69 100644 --- a/scripts/Makefile.modfinal +++ b/scripts/Makefile.modfinal @@ -63,10 +63,14 @@ ifdef CONFIG_DEBUG_INFO_BTF_MODULES endif +$(call cmd,check_tracepoint) +%.ko.stripped: %.ko $(wildcard include/config/MODULE_INSTALL_STRIP) + $(call cmd,install_mod) + $(call cmd,strip_mod) + quiet_cmd_merkle = MERKLE $@ - cmd_merkle = $(objtree)/scripts/modules-merkle-tree $@ .ko + cmd_merkle = $(objtree)/scripts/modules-merkle-tree $@ $(if $(CONFIG_MODULE_INSTALL_STRIP),.ko.stripped,.ko) -.tmp_module_hashes.c: $(modules:%.o=%.ko) $(objtree)/scripts/modules-merkle-tree FORCE +.tmp_module_hashes.c: $(if $(CONFIG_MODULE_INSTALL_STRIP),$(modules:%.o=%.ko.stripped),$(modules:%.o=%.ko)) $(objtree)/scripts/modules-merkle-tree $(wildcard include/config/MODULE_INSTALL_STRIP) FORCE $(call cmd,merkle) ifdef CONFIG_MODULE_HASHES @@ -75,6 +79,7 @@ endif targets += $(modules:%.o=%.ko) $(modules:%.o=%.mod.o) .module-common.o targets += $(modules:%.o=%.merkle) .tmp_module_hashes.c +targets += $(modules:%.o=%.ko.stripped) # Add FORCE to the prerequisites of a target to force it to be always rebuilt. # --------------------------------------------------------------------------- diff --git a/scripts/Makefile.modinst b/scripts/Makefile.modinst index 07380c7233a0..45606f994ad9 100644 --- a/scripts/Makefile.modinst +++ b/scripts/Makefile.modinst @@ -68,8 +68,8 @@ __modinst: $(install-y) ifdef CONFIG_MODULE_HASHES ifeq ($(KBUILD_EXTMOD),) -ifdef INSTALL_MOD_STRIP -$(error CONFIG_MODULE_HASHES and INSTALL_MOD_STRIP are mutually exclusive) +ifneq ($(INSTALL_MOD_STRIP),$(CONFIG_MODULE_INSTALL_STRIP)) +$(error Inconsistent values for INSTALL_MOD_STRIP between build and installation) endif endif endif diff --git a/scripts/Makefile.vmlinux b/scripts/Makefile.vmlinux index f4e38b953b01..4ce849f6253a 100644 --- a/scripts/Makefile.vmlinux +++ b/scripts/Makefile.vmlinux @@ -81,6 +81,7 @@ endif ifdef CONFIG_MODULE_HASHES vmlinux.unstripped: $(objtree)/scripts/modules-merkle-tree vmlinux.unstripped: modules.order +vmlinux.unstripped: $(wildcard include/config/MODULE_INSTALL_STRIP) endif # vmlinux -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:29:01 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
The logic to extract the signature bits from a module file are duplicated between the module core and IMA modsig appraisal. Unify the implementation. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- include/linux/module_signature.h | 4 +-- kernel/module/signing.c | 52 +++++++------------------------------ kernel/module_signature.c | 41 +++++++++++++++++++++++++++-- security/integrity/ima/ima_modsig.c | 24 ++++------------- 4 files changed, 56 insertions(+), 65 deletions(-) diff --git a/include/linux/module_signature.h b/include/linux/module_signature.h index 7eb4b00381ac..186a55effa30 100644 --- a/include/linux/module_signature.h +++ b/include/linux/module_signature.h @@ -40,7 +40,7 @@ struct module_signature { __be32 sig_len; /* Length of signature data */ }; -int mod_check_sig(const struct module_signature *ms, size_t file_len, - const char *name); +int mod_split_sig(const void *buf, size_t *buf_len, bool mangled, + size_t *sig_len, const u8 **sig, const char *name); #endif /* _LINUX_MODULE_SIGNATURE_H */ diff --git a/kernel/module/signing.c b/kernel/module/signing.c index fe3f51ac6199..6d64c0d18d0a 100644 --- a/kernel/module/signing.c +++ b/kernel/module/signing.c @@ -37,54 +37,22 @@ void set_module_sig_enforced(void) sig_enforce = true; } -/* - * Verify the signature on a module. - */ -static int mod_verify_sig(const void *mod, struct load_info *info) -{ - struct module_signature ms; - size_t sig_len, modlen = info->len; - int ret; - - pr_devel("==>%s(,%zu)\n", __func__, modlen); - - if (modlen <= sizeof(ms)) - return -EBADMSG; - - memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); - - ret = mod_check_sig(&ms, modlen, "module"); - if (ret) - return ret; - - sig_len = be32_to_cpu(ms.sig_len); - modlen -= sig_len + sizeof(ms); - info->len = modlen; - - return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, - VERIFY_USE_SECONDARY_KEYRING, - VERIFYING_MODULE_SIGNATURE, - NULL, NULL); -} - int module_sig_check(struct load_info *info, int flags) { - int err = -ENODATA; - const unsigned long markerlen = sizeof(MODULE_SIG_STRING) - 1; + int err; const char *reason; const void *mod = info->hdr; + size_t sig_len; + const u8 *sig; bool mangled_module = flags & (MODULE_INIT_IGNORE_MODVERSIONS | MODULE_INIT_IGNORE_VERMAGIC); - /* - * Do not allow mangled modules as a module with version information - * removed is no longer the module that was signed. - */ - if (!mangled_module && - info->len > markerlen && - memcmp(mod + info->len - markerlen, MODULE_SIG_STRING, markerlen) == 0) { - /* We truncate the module to discard the signature */ - info->len -= markerlen; - err = mod_verify_sig(mod, info); + + err = mod_split_sig(info->hdr, &info->len, mangled_module, &sig_len, &sig, "module"); + if (!err) { + err = verify_pkcs7_signature(mod, info->len, sig, sig_len, + VERIFY_USE_SECONDARY_KEYRING, + VERIFYING_MODULE_SIGNATURE, + NULL, NULL); if (!err) { info->sig_ok = true; return 0; diff --git a/kernel/module_signature.c b/kernel/module_signature.c index 00132d12487c..b2384a73524c 100644 --- a/kernel/module_signature.c +++ b/kernel/module_signature.c @@ -8,6 +8,7 @@ #include <linux/errno.h> #include <linux/printk.h> +#include <linux/string.h> #include <linux/module_signature.h> #include <asm/byteorder.h> @@ -18,8 +19,8 @@ * @file_len: Size of the file to which @ms is appended. * @name: What is being checked. Used for error messages. */ -int mod_check_sig(const struct module_signature *ms, size_t file_len, - const char *name) +static int mod_check_sig(const struct module_signature *ms, size_t file_len, + const char *name) { if (be32_to_cpu(ms->sig_len) >= file_len - sizeof(*ms)) return -EBADMSG; @@ -44,3 +45,39 @@ int mod_check_sig(const struct module_signature *ms, size_t file_len, return 0; } + +int mod_split_sig(const void *buf, size_t *buf_len, bool mangled, + size_t *sig_len, const u8 **sig, const char *name) +{ + const unsigned long markerlen = sizeof(MODULE_SIG_STRING) - 1; + struct module_signature ms; + size_t modlen = *buf_len; + int ret; + + /* + * Do not allow mangled modules as a module with version information + * removed is no longer the module that was signed. + */ + if (!mangled && + *buf_len > markerlen && + memcmp(buf + modlen - markerlen, MODULE_SIG_STRING, markerlen) == 0) { + /* We truncate the module to discard the signature */ + modlen -= markerlen; + } + + if (modlen <= sizeof(ms)) + return -EBADMSG; + + memcpy(&ms, buf + (modlen - sizeof(ms)), sizeof(ms)); + + ret = mod_check_sig(&ms, modlen, name); + if (ret) + return ret; + + *sig_len = be32_to_cpu(ms.sig_len); + modlen -= *sig_len + sizeof(ms); + *buf_len = modlen; + *sig = buf + modlen; + + return 0; +} diff --git a/security/integrity/ima/ima_modsig.c b/security/integrity/ima/ima_modsig.c index 3265d744d5ce..a57342d39b07 100644 --- a/security/integrity/ima/ima_modsig.c +++ b/security/integrity/ima/ima_modsig.c @@ -40,44 +40,30 @@ struct modsig { int ima_read_modsig(enum ima_hooks func, const void *buf, loff_t buf_len, struct modsig **modsig) { - const size_t marker_len = strlen(MODULE_SIG_STRING); - const struct module_signature *sig; + size_t buf_len_sz = buf_len; struct modsig *hdr; size_t sig_len; - const void *p; + const u8 *sig; int rc; - if (buf_len <= marker_len + sizeof(*sig)) - return -ENOENT; - - p = buf + buf_len - marker_len; - if (memcmp(p, MODULE_SIG_STRING, marker_len)) - return -ENOENT; - - buf_len -= marker_len; - sig = (const struct module_signature *)(p - sizeof(*sig)); - - rc = mod_check_sig(sig, buf_len, func_tokens[func]); + rc = mod_split_sig(buf, &buf_len_sz, true, &sig_len, &sig, func_tokens[func]); if (rc) return rc; - sig_len = be32_to_cpu(sig->sig_len); - buf_len -= sig_len + sizeof(*sig); - /* Allocate sig_len additional bytes to hold the raw PKCS#7 data. */ hdr = kzalloc(struct_size(hdr, raw_pkcs7, sig_len), GFP_KERNEL); if (!hdr) return -ENOMEM; hdr->raw_pkcs7_len = sig_len; - hdr->pkcs7_msg = pkcs7_parse_message(buf + buf_len, sig_len); + hdr->pkcs7_msg = pkcs7_parse_message(sig, sig_len); if (IS_ERR(hdr->pkcs7_msg)) { rc = PTR_ERR(hdr->pkcs7_msg); kfree(hdr); return rc; } - memcpy(hdr->raw_pkcs7, buf + buf_len, sig_len); + memcpy(hdr->raw_pkcs7, sig, sig_len); /* We don't know the hash algorithm yet. */ hdr->hash_algo = HASH_ALGO__LAST; -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:28:52 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
To allow CONFIG_MODULE_HASHES in combination with INSTALL_MOD_STRIP, this logc will also be used by Makefile.modfinal. Move it to a shared location to enable reuse. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- scripts/Makefile.lib | 32 ++++++++++++++++++++++++++++++++ scripts/Makefile.modinst | 37 +++++-------------------------------- 2 files changed, 37 insertions(+), 32 deletions(-) diff --git a/scripts/Makefile.lib b/scripts/Makefile.lib index 28a1c08e3b22..7fcf3c43e408 100644 --- a/scripts/Makefile.lib +++ b/scripts/Makefile.lib @@ -474,6 +474,38 @@ define sed-offsets s:->::; p;}' endef +# +# Module Installation +# +quiet_cmd_install_mod = INSTALL $@ + cmd_install_mod = cp $< $@ + +# Module Strip +# --------------------------------------------------------------------------- +# +# INSTALL_MOD_STRIP, if defined, will cause modules to be stripped after they +# are installed. If INSTALL_MOD_STRIP is '1', then the default option +# --strip-debug will be used. Otherwise, INSTALL_MOD_STRIP value will be used +# as the options to the strip command. +ifeq ($(INSTALL_MOD_STRIP),1) +mod-strip-option := --strip-debug +else +mod-strip-option := $(INSTALL_MOD_STRIP) +endif + +# Strip +ifdef INSTALL_MOD_STRIP + +quiet_cmd_strip_mod = STRIP $@ + cmd_strip_mod = $(STRIP) $(mod-strip-option) $@ + +else + +quiet_cmd_strip_mod = + cmd_strip_mod = : + +endif + # Use filechk to avoid rebuilds when a header changes, but the resulting file # does not define filechk_offsets diff --git a/scripts/Makefile.modinst b/scripts/Makefile.modinst index ba4343b40497..07380c7233a0 100644 --- a/scripts/Makefile.modinst +++ b/scripts/Makefile.modinst @@ -8,6 +8,7 @@ __modinst: include $(objtree)/include/config/auto.conf include $(srctree)/scripts/Kbuild.include +include $(srctree)/scripts/Makefile.lib install-y := @@ -36,7 +37,7 @@ install-y += $(addprefix $(MODLIB)/, modules.builtin modules.builtin.modinfo) install-$(CONFIG_BUILTIN_MODULE_RANGES) += $(MODLIB)/modules.builtin.ranges $(addprefix $(MODLIB)/, modules.builtin modules.builtin.modinfo modules.builtin.ranges): $(MODLIB)/%: % FORCE - $(call cmd,install) + $(call cmd,install_mod) endif @@ -65,40 +66,12 @@ install-$(CONFIG_MODULES) += $(modules) __modinst: $(install-y) @: -# -# Installation -# -quiet_cmd_install = INSTALL $@ - cmd_install = cp $< $@ - -# Strip -# -# INSTALL_MOD_STRIP, if defined, will cause modules to be stripped after they -# are installed. If INSTALL_MOD_STRIP is '1', then the default option -# --strip-debug will be used. Otherwise, INSTALL_MOD_STRIP value will be used -# as the options to the strip command. -ifdef INSTALL_MOD_STRIP - ifdef CONFIG_MODULE_HASHES ifeq ($(KBUILD_EXTMOD),) +ifdef INSTALL_MOD_STRIP $(error CONFIG_MODULE_HASHES and INSTALL_MOD_STRIP are mutually exclusive) endif endif - -ifeq ($(INSTALL_MOD_STRIP),1) -strip-option := --strip-debug -else -strip-option := $(INSTALL_MOD_STRIP) -endif - -quiet_cmd_strip = STRIP $@ - cmd_strip = $(STRIP) $(strip-option) $@ - -else - -quiet_cmd_strip = - cmd_strip = : - endif # @@ -133,8 +106,8 @@ endif $(foreach dir, $(sort $(dir $(install-y))), $(shell mkdir -p $(dir))) $(dst)/%.ko: %.ko FORCE - $(call cmd,install) - $(call cmd,strip) + $(call cmd,install_mod) + $(call cmd,strip_mod) $(call cmd,sign) ifdef CONFIG_MODULES -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:29:00 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
The signature splitting will also be used by CONFIG_MODULE_HASHES. Move it up the callchain, so the result can be reused. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- kernel/module/internal.h | 2 +- kernel/module/main.c | 13 ++++++++++++- kernel/module/signing.c | 21 +++++++-------------- 3 files changed, 20 insertions(+), 16 deletions(-) diff --git a/kernel/module/internal.h b/kernel/module/internal.h index e053c29a5d08..e2d49122c2a1 100644 --- a/kernel/module/internal.h +++ b/kernel/module/internal.h @@ -337,7 +337,7 @@ int module_enforce_rwx_sections(const Elf_Ehdr *hdr, const Elf_Shdr *sechdrs, void module_mark_ro_after_init(const Elf_Ehdr *hdr, Elf_Shdr *sechdrs, const char *secstrings); -int module_sig_check(struct load_info *info, int flags); +int module_sig_check(struct load_info *info, const u8 *sig, size_t sig_len); #ifdef CONFIG_DEBUG_KMEMLEAK void kmemleak_load_module(const struct module *mod, const struct load_info *info); diff --git a/kernel/module/main.c b/kernel/module/main.c index c09b25c0166a..d65bc300a78c 100644 --- a/kernel/module/main.c +++ b/kernel/module/main.c @@ -3346,10 +3346,21 @@ static int early_mod_check(struct load_info *info, int flags) static int module_integrity_check(struct load_info *info, int flags) { + bool mangled_module = flags & (MODULE_INIT_IGNORE_MODVERSIONS | + MODULE_INIT_IGNORE_VERMAGIC); + size_t sig_len; + const u8 *sig; int err = 0; + if (IS_ENABLED(CONFIG_MODULE_SIG_POLICY)) { + err = mod_split_sig(info->hdr, &info->len, mangled_module, + &sig_len, &sig, "module"); + if (err) + return err; + } + if (IS_ENABLED(CONFIG_MODULE_SIG)) - err = module_sig_check(info, flags); + err = module_sig_check(info, sig, sig_len); if (err) return err; diff --git a/kernel/module/signing.c b/kernel/module/signing.c index 8a5f66389116..86164761cac7 100644 --- a/kernel/module/signing.c +++ b/kernel/module/signing.c @@ -15,26 +15,19 @@ #include <uapi/linux/module.h> #include "internal.h" -int module_sig_check(struct load_info *info, int flags) +int module_sig_check(struct load_info *info, const u8 *sig, size_t sig_len) { int err; const char *reason; const void *mod = info->hdr; - size_t sig_len; - const u8 *sig; - bool mangled_module = flags & (MODULE_INIT_IGNORE_MODVERSIONS | - MODULE_INIT_IGNORE_VERMAGIC); - err = mod_split_sig(info->hdr, &info->len, mangled_module, &sig_len, &sig, "module"); + err = verify_pkcs7_signature(mod, info->len, sig, sig_len, + VERIFY_USE_SECONDARY_KEYRING, + VERIFYING_MODULE_SIGNATURE, + NULL, NULL); if (!err) { - err = verify_pkcs7_signature(mod, info->len, sig, sig_len, - VERIFY_USE_SECONDARY_KEYRING, - VERIFYING_MODULE_SIGNATURE, - NULL, NULL); - if (!err) { - info->sig_ok = true; - return 0; - } + info->sig_ok = true; + return 0; } /* -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:28:56 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
The upcoming module hashes functionality will build the modules in between the generation of the BTF data and the final link of vmlinux. Having a dependency from the modules on vmlinux would make this impossible as it would mean having a cyclic dependency. Break this cyclic dependency by introducing a new target. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- scripts/Makefile.modfinal | 4 ++-- scripts/link-vmlinux.sh | 6 ++++++ 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/scripts/Makefile.modfinal b/scripts/Makefile.modfinal index 149e12ff5700..adfef1e002a9 100644 --- a/scripts/Makefile.modfinal +++ b/scripts/Makefile.modfinal @@ -56,8 +56,8 @@ if_changed_except = $(if $(call newer_prereqs_except,$(2))$(cmd-check), \ printf '%s\n' 'savedcmd_$@ := $(make-cmd)' > $(dot-target).cmd, @:) # Re-generate module BTFs if either module's .ko or vmlinux changed -%.ko: %.o %.mod.o .module-common.o $(objtree)/scripts/module.lds $(and $(CONFIG_DEBUG_INFO_BTF_MODULES),$(KBUILD_BUILTIN),$(objtree)/vmlinux) FORCE - +$(call if_changed_except,ld_ko_o,$(objtree)/vmlinux) +%.ko: %.o %.mod.o .module-common.o $(objtree)/scripts/module.lds $(and $(CONFIG_DEBUG_INFO_BTF_MODULES),$(KBUILD_BUILTIN),$(objtree)/.tmp_vmlinux_btf.stamp) FORCE + +$(call if_changed_except,ld_ko_o,$(objtree)/.tmp_vmlinux_btf.stamp) ifdef CONFIG_DEBUG_INFO_BTF_MODULES +$(if $(newer-prereqs),$(call cmd,btf_ko)) endif diff --git a/scripts/link-vmlinux.sh b/scripts/link-vmlinux.sh index 4ab44c73da4d..8c98f8645a5c 100755 --- a/scripts/link-vmlinux.sh +++ b/scripts/link-vmlinux.sh @@ -111,6 +111,7 @@ vmlinux_link() gen_btf() { local btf_data=${1}.btf.o + local btf_stamp=.tmp_vmlinux_btf.stamp info BTF "${btf_data}" LLVM_OBJCOPY="${OBJCOPY}" ${PAHOLE} -J ${PAHOLE_FLAGS} ${1} @@ -131,6 +132,11 @@ gen_btf() fi printf "${et_rel}" | dd of="${btf_data}" conv=notrunc bs=1 seek=16 status=none + info STAMP $btf_stamp + if ! cmp --silent $btf_data $btf_stamp; then + cp $btf_data $btf_stamp + fi + btf_vmlinux_bin_o=${btf_data} } -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:28:50 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Non-builtin modules can be validated as before through signatures. Normally the .ko module files depend on a fully built vmlinux to be available for modpost validation and BTF generation. With CONFIG_MODULE_HASHES, vmlinux now depends on the modules to build a merkle tree. This introduces a dependency cycle which is impossible to satisfy. Work around this by building the modules during link-vmlinux.sh, after vmlinux is complete enough for modpost and BTF but before the final module hashes are The PKCS7 format which is used for regular module signatures can not represent Merkle proofs, so a new kind of module signature is introduced. As this signature type is only ever used for builtin modules, no compatibility issues can arise. Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- .gitignore | 1 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 1 + kernel/module/Kconfig | 21 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 1 + kernel/module/main.c | 4 +- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.modfinal | 11 + scripts/Makefile.modinst | 13 + scripts/Makefile.vmlinux | 5 + scripts/link-vmlinux.sh | 14 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/lockdown/Kconfig | 2 +- 20 files changed, 685 insertions(+), 7 deletions(-) diff --git a/.gitignore b/.gitignore index 3a7241c941f5..299c54083672 100644 --- a/.gitignore +++ b/.gitignore @@ -35,6 +35,7 @@ *.lz4 *.lzma *.lzo +*.merkle *.mod *.mod.c *.o diff --git a/Documentation/kbuild/reproducible-builds.rst b/Documentation/kbuild/reproducible-builds.rst index 96d208e578cd..bfde81e47b2d 100644 --- a/Documentation/kbuild/reproducible-builds.rst +++ b/Documentation/kbuild/reproducible-builds.rst @@ -82,7 +82,10 @@ generate a different temporary key for each build, resulting in the modules being unreproducible. However, including a signing key with your source would presumably defeat the purpose of signing modules. -One approach to this is to divide up the build process so that the +Instead ``CONFIG_MODULE_HASHES`` can be used to embed a static list +of valid modules to load. + +Another approach to this is to divide up the build process so that the unreproducible parts can be treated as sources: 1. Generate a persistent signing key. Add the certificate for the key diff --git a/Makefile b/Makefile index e404e4767944..841772a5a260 100644 --- a/Makefile +++ b/Makefile @@ -1588,8 +1588,10 @@ endif # is an exception. ifdef CONFIG_DEBUG_INFO_BTF_MODULES KBUILD_BUILTIN := y +ifndef CONFIG_MODULE_HASHES modules: vmlinux endif +endif modules: modules_prepare @@ -1981,7 +1983,11 @@ modules.order: $(build-dir) # KBUILD_MODPOST_NOFINAL can be set to skip the final link of modules. # This is solely useful to speed up test compiles. modules: modpost -ifneq ($(KBUILD_MODPOST_NOFINAL),1) +ifdef CONFIG_MODULE_HASHES +ifeq ($(MODULE_HASHES_MODPOST_FINAL), 1) + $(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modfinal +endif +else ifneq ($(KBUILD_MODPOST_NOFINAL),1) $(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modfinal endif diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinux.lds.h index 8ca130af301f..d3846845e37b 100644 --- a/include/asm-generic/vmlinux.lds.h +++ b/include/asm-generic/vmlinux.lds.h @@ -508,6 +508,8 @@ \ PRINTK_INDEX \ \ + MODULE_HASHES \ + \ /* Kernel symbol table: Normal symbols */ \ __ksymtab : AT(ADDR(__ksymtab) - LOAD_OFFSET) { \ __start___ksymtab = .; \ @@ -918,6 +920,15 @@ #define PRINTK_INDEX #endif +#ifdef CONFIG_MODULE_HASHES +#define MODULE_HASHES \ + .module_hashes : AT(ADDR(.module_hashes) - LOAD_OFFSET) { \ + KEEP(*(SORT(.module_hashes))) \ + } +#else +#define MODULE_HASHES +#endif + /* * Discard .note.GNU-stack, which is emitted as PROGBITS by the compiler. * Otherwise, the type of .notes section would become PROGBITS instead of NOTES. diff --git a/include/linux/module_hashes.h b/include/linux/module_hashes.h new file mode 100644 index 000000000000..de61072627cc --- /dev/null +++ b/include/linux/module_hashes.h @@ -0,0 +1,25 @@ +/* SPDX-License-Identifier: GPL-2.0-or-later */ + +#ifndef _LINUX_MODULE_HASHES_H +#define _LINUX_MODULE_HASHES_H + +#include <linux/compiler_attributes.h> +#include <linux/types.h> +#include <crypto/sha2.h> + +#define __module_hashes_section __section(".module_hashes") +#define MODULE_HASHES_HASH_SIZE SHA256_DIGEST_SIZE + +struct module_hashes_proof { + __be32 pos; + u8 hash_sigs[][MODULE_HASHES_HASH_SIZE]; +} __packed; + +struct module_hashes_root { + u32 levels; + u8 hash[MODULE_HASHES_HASH_SIZE]; +}; + +extern const struct module_hashes_root module_hashes_root; + +#endif /* _LINUX_MODULE_HASHES_H */ diff --git a/include/linux/module_signature.h b/include/linux/module_signature.h index a45ce3b24403..3b510651830d 100644 --- a/include/linux/module_signature.h +++ b/include/linux/module_signature.h @@ -18,6 +18,7 @@ enum pkey_id_type { PKEY_ID_PGP, /* OpenPGP generated key ID */ PKEY_ID_X509, /* X.509 arbitrary subjectKeyIdentifier */ PKEY_ID_PKCS7, /* Signature in PKCS#7 message */ + PKEY_ID_MERKLE, /* Merkle proof for modules */ }; /* diff --git a/kernel/module/Kconfig b/kernel/module/Kconfig index db3b61fb3e73..c00ca830330c 100644 --- a/kernel/module/Kconfig +++ b/kernel/module/Kconfig @@ -271,7 +271,7 @@ config MODULE_SIG inclusion into an initramfs that wants the module size reduced. config MODULE_SIG_POLICY - def_bool MODULE_SIG + def_bool MODULE_SIG || MODULE_HASHES config MODULE_SIG_FORCE bool "Require modules to be validly signed" @@ -289,7 +289,7 @@ config MODULE_SIG_ALL modules must be signed manually, using the scripts/sign-file tool. comment "Do not forget to sign required modules with scripts/sign-file" - depends on MODULE_SIG_FORCE && !MODULE_SIG_ALL + depends on MODULE_SIG_FORCE && !MODULE_SIG_ALL && !MODULE_HASHES choice prompt "Hash algorithm to sign modules" @@ -408,6 +408,23 @@ config MODULE_DECOMPRESS If unsure, say N. +config MODULE_HASHES + bool "Module hash validation" + depends on !MODULE_SIG_ALL + depends on !IMA_APPRAISE_MODSIG + select MODULE_SIG_FORMAT + select CRYPTO_LIB_SHA256 + help + Validate modules by their hashes. + Only modules built together with the main kernel image can be + validated that way. + + This is a reproducible-build compatible alternative to a build-time + generated module keyring, as enabled by + CONFIG_MODULE_SIG_KEY=certs/signing_key.pem. + + Also see the warning in MODULE_SIG about stripping modules. + config MODULE_ALLOW_MISSING_NAMESPACE_IMPORTS bool "Allow loading of modules with missing namespace imports" help diff --git a/kernel/module/Makefile b/kernel/module/Makefile index d9e8759a7b05..dd37aaf4a61a 100644 --- a/kernel/module/Makefile +++ b/kernel/module/Makefile @@ -25,3 +25,4 @@ obj-$(CONFIG_KGDB_KDB) += kdb.o obj-$(CONFIG_MODVERSIONS) += version.o obj-$(CONFIG_MODULE_UNLOAD_TAINT_TRACKING) += tracking.o obj-$(CONFIG_MODULE_STATS) += stats.o +obj-$(CONFIG_MODULE_HASHES) += hashes.o hashes_root.o diff --git a/kernel/module/hashes.c b/kernel/module/hashes.c new file mode 100644 index 000000000000..23ca9f66652f --- /dev/null +++ b/kernel/module/hashes.c @@ -0,0 +1,92 @@ +// SPDX-License-Identifier: GPL-2.0-or-later +/* Module hash-based integrity checker + * + * Copyright (C) 2025 Thomas Weißschuh <linux@weissschuh.net> + * Copyright (C) 2025 Sebastian Andrzej Siewior <sebastian@breakpoint.cc> + */ + +#define pr_fmt(fmt) "module/hash: " fmt + +#include <linux/module_hashes.h> +#include <linux/module.h> +#include <linux/unaligned.h> + +#include <crypto/sha2.h> + +#include "internal.h" + +static __init __maybe_unused int module_hashes_init(void) +{ + pr_debug("root: levels=%u hash=%*phN\n", + module_hashes_root.levels, + (int)sizeof(module_hashes_root.hash), module_hashes_root.hash); + + return 0; +} + +#if IS_ENABLED(CONFIG_MODULE_DEBUG) +early_initcall(module_hashes_init); +#endif + +static void hash_entry(const void *left, const void *right, void *out) +{ + struct sha256_ctx ctx; + u8 magic = 0x02; + + sha256_init(&ctx); + sha256_update(&ctx, &magic, sizeof(magic)); + sha256_update(&ctx, left, MODULE_HASHES_HASH_SIZE); + sha256_update(&ctx, right, MODULE_HASHES_HASH_SIZE); + sha256_final(&ctx, out); +} + +static void hash_data(const void *d, size_t len, unsigned int pos, void *out) +{ + struct sha256_ctx ctx; + u8 magic = 0x01; + __be32 pos_be; + + pos_be = cpu_to_be32(pos); + + sha256_init(&ctx); + sha256_update(&ctx, &magic, sizeof(magic)); + sha256_update(&ctx, (const u8 *)&pos_be, sizeof(pos_be)); + sha256_update(&ctx, d, len); + sha256_final(&ctx, out); +} + +static bool module_hashes_verify_proof(u32 pos, const u8 hash_sigs[][MODULE_HASHES_HASH_SIZE], + u8 *cur) +{ + for (unsigned int i = 0; i < module_hashes_root.levels; i++, pos >>= 1) { + if ((pos & 1) == 0) + hash_entry(cur, hash_sigs[i], cur); + else + hash_entry(hash_sigs[i], cur, cur); + } + + return !memcmp(cur, module_hashes_root.hash, MODULE_HASHES_HASH_SIZE); +} + +int module_hash_check(struct load_info *info, const u8 *sig, size_t sig_len) +{ + u8 modhash[MODULE_HASHES_HASH_SIZE]; + const struct module_hashes_proof *proof; + size_t proof_size; + u32 pos; + + proof_size = struct_size(proof, hash_sigs, module_hashes_root.levels); + + if (sig_len != proof_size) + return -ENOPKG; + + proof = (const struct module_hashes_proof *)sig; + pos = get_unaligned_be32(&proof->pos); + + hash_data(info->hdr, info->len, pos, &modhash); + + if (module_hashes_verify_proof(pos, proof->hash_sigs, modhash)) + info->sig_ok = true; + + return 0; +} diff --git a/kernel/module/hashes_root.c b/kernel/module/hashes_root.c new file mode 100644 index 000000000000..1abfcd3aa679 --- /dev/null +++ b/kernel/module/hashes_root.c @@ -0,0 +1,6 @@ +// SPDX-License-Identifier: GPL-2.0-or-later + +#include <linux/module_hashes.h> + +/* Blank dummy data. Will be overridden by link-vmlinux.sh */ +const struct module_hashes_root module_hashes_root __module_hashes_section = {}; diff --git a/kernel/module/internal.h b/kernel/module/internal.h index e2d49122c2a1..e22837d3ac76 100644 --- a/kernel/module/internal.h +++ b/kernel/module/internal.h @@ -338,6 +338,7 @@ void module_mark_ro_after_init(const Elf_Ehdr *hdr, Elf_Shdr *sechdrs, const char *secstrings); int module_sig_check(struct load_info *info, const u8 *sig, size_t sig_len); +int module_hash_check(struct load_info *info, const u8 *sig, size_t sig_len); #ifdef CONFIG_DEBUG_KMEMLEAK void kmemleak_load_module(const struct module *mod, const struct load_info *info); diff --git a/kernel/module/main.c b/kernel/module/main.c index 2a28a0ece809..fa30b6387936 100644 --- a/kernel/module/main.c +++ b/kernel/module/main.c @@ -3362,8 +3362,10 @@ static int module_integrity_check(struct load_info *info, int flags) if (IS_ENABLED(CONFIG_MODULE_SIG) && sig_type == PKEY_ID_PKCS7) { err = module_sig_check(info, sig, sig_len); + } else if (IS_ENABLED(CONFIG_MODULE_HASHES) && sig_type == PKEY_ID_MERKLE) { + err = module_hash_check(info, sig, sig_len); } else { - pr_err("module: not signed with expected PKCS#7 message\n"); + pr_err("module: not signed with signature mechanism\n"); err = -ENOPKG; } diff --git a/scripts/.gitignore b/scripts/.gitignore index 4215c2208f7e..8dad9b0d3b2d 100644 --- a/scripts/.gitignore +++ b/scripts/.gitignore @@ -5,6 +5,7 @@ /insert-sys-cert /kallsyms /module.lds +/modules-merkle-tree /recordmcount /rustdoc_test_builder /rustdoc_test_gen diff --git a/scripts/Makefile b/scripts/Makefile index 0941e5ce7b57..f539e4d93af7 100644 --- a/scripts/Makefile +++ b/scripts/Makefile @@ -11,6 +11,7 @@ hostprogs-always-$(CONFIG_MODULE_SIG_FORMAT) += sign-file hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert hostprogs-always-$(CONFIG_RUST_KERNEL_DOCTESTS) += rustdoc_test_builder hostprogs-always-$(CONFIG_RUST_KERNEL_DOCTESTS) += rustdoc_test_gen +hostprogs-always-$(CONFIG_MODULE_HASHES) += modules-merkle-tree hostprogs-always-$(CONFIG_TRACEPOINTS) += tracepoint-update sorttable-objs := sorttable.o elf-parse.o @@ -36,6 +37,8 @@ HOSTLDLIBS_sorttable = -lpthread HOSTCFLAGS_asn1_compiler.o = -I$(srctree)/include HOSTCFLAGS_sign-file.o = $(shell $(HOSTPKG_CONFIG) --cflags libcrypto 2> /dev/null) HOSTLDLIBS_sign-file = $(shell $(HOSTPKG_CONFIG) --libs libcrypto 2> /dev/null || echo -lcrypto) +HOSTCFLAGS_modules-merkle-tree.o = $(shell $(HOSTPKG_CONFIG) --cflags libcrypto 2> /dev/null) +HOSTLDLIBS_modules-merkle-tree = $(shell $(HOSTPKG_CONFIG) --libs libcrypto 2> /dev/null || echo -lcrypto) ifdef CONFIG_UNWINDER_ORC ifeq ($(ARCH),x86_64) diff --git a/scripts/Makefile.modfinal b/scripts/Makefile.modfinal index 930db0524a0a..5b8e94170beb 100644 --- a/scripts/Makefile.modfinal +++ b/scripts/Makefile.modfinal @@ -63,7 +63,18 @@ ifdef CONFIG_DEBUG_INFO_BTF_MODULES endif +$(call cmd,check_tracepoint) +quiet_cmd_merkle = MERKLE $@ + cmd_merkle = $(objtree)/scripts/modules-merkle-tree $@ .ko + +.tmp_module_hashes.c: $(modules:%.o=%.ko) $(objtree)/scripts/modules-merkle-tree FORCE + $(call cmd,merkle) + +ifdef CONFIG_MODULE_HASHES +__modfinal: .tmp_module_hashes.c +endif + targets += $(modules:%.o=%.ko) $(modules:%.o=%.mod.o) .module-common.o +targets += $(modules:%.o=%.merkle) .tmp_module_hashes.c # Add FORCE to the prerequisites of a target to force it to be always rebuilt. # --------------------------------------------------------------------------- diff --git a/scripts/Makefile.modinst b/scripts/Makefile.modinst index 9ba45e5b32b1..ba4343b40497 100644 --- a/scripts/Makefile.modinst +++ b/scripts/Makefile.modinst @@ -79,6 +79,12 @@ quiet_cmd_install = INSTALL $@ # as the options to the strip command. ifdef INSTALL_MOD_STRIP +ifdef CONFIG_MODULE_HASHES +ifeq ($(KBUILD_EXTMOD),) +$(error CONFIG_MODULE_HASHES and INSTALL_MOD_STRIP are mutually exclusive) +endif +endif + ifeq ($(INSTALL_MOD_STRIP),1) strip-option := --strip-debug else @@ -116,6 +122,13 @@ quiet_cmd_sign := cmd_sign := : endif +ifeq ($(KBUILD_EXTMOD),) +ifdef CONFIG_MODULE_HASHES +quiet_cmd_sign = MERKLE [M] $@ + cmd_sign = cat $(objtree)/$*.merkle >> $@ +endif +endif + # Create necessary directories $(foreach dir, $(sort $(dir $(install-y))), $(shell mkdir -p $(dir))) diff --git a/scripts/Makefile.vmlinux b/scripts/Makefile.vmlinux index cd788cac9d91..f4e38b953b01 100644 --- a/scripts/Makefile.vmlinux +++ b/scripts/Makefile.vmlinux @@ -78,6 +78,11 @@ ifdef CONFIG_BUILDTIME_TABLE_SORT vmlinux.unstripped: scripts/sorttable endif +ifdef CONFIG_MODULE_HASHES +vmlinux.unstripped: $(objtree)/scripts/modules-merkle-tree +vmlinux.unstripped: modules.order +endif + # vmlinux # --------------------------------------------------------------------------- diff --git a/scripts/link-vmlinux.sh b/scripts/link-vmlinux.sh index 8c98f8645a5c..bfeff1f5753d 100755 --- a/scripts/link-vmlinux.sh +++ b/scripts/link-vmlinux.sh @@ -103,7 +103,7 @@ vmlinux_link() ${ld} ${ldflags} -o ${output} \ ${wl}--whole-archive ${objs} ${wl}--no-whole-archive \ ${wl}--start-group ${libs} ${wl}--end-group \ - ${kallsymso} ${btf_vmlinux_bin_o} ${arch_vmlinux_o} ${ldlibs} + ${kallsymso} ${btf_vmlinux_bin_o} ${module_hashes_o} ${arch_vmlinux_o} ${ldlibs} } # generate .BTF typeinfo from DWARF debuginfo @@ -212,6 +212,7 @@ fi btf_vmlinux_bin_o= kallsymso= +module_hashes_o= strip_debug= generate_map= @@ -315,6 +316,17 @@ if is_enabled CONFIG_BUILDTIME_TABLE_SORT; then fi fi +if is_enabled CONFIG_MODULE_HASHES; then + info MAKE modules + ${MAKE} -f Makefile MODULE_HASHES_MODPOST_FINAL=1 modules + module_hashes_o=.tmp_module_hashes.o + info CC ${module_hashes_o} + ${CC} ${NOSTDINC_FLAGS} ${LINUXINCLUDE} ${KBUILD_CPPFLAGS} ${KBUILD_CFLAGS} \ + ${KBUILD_CFLAGS_KERNEL} -fno-lto -c -o "${module_hashes_o}" ".tmp_module_hashes.c" + ${OBJCOPY} --dump-section .module_hashes=.tmp_module_hashes.bin ${module_hashes_o} + ${OBJCOPY} --update-section .module_hashes=.tmp_module_hashes.bin ${VMLINUX} +fi + # step a (see comment above) if is_enabled CONFIG_KALLSYMS; then if ! cmp -s System.map "${kallsyms_sysmap}"; then diff --git a/scripts/modules-merkle-tree.c b/scripts/modules-merkle-tree.c new file mode 100644 index 000000000000..a6ec0e21213b --- /dev/null +++ b/scripts/modules-merkle-tree.c @@ -0,0 +1,467 @@ +// SPDX-License-Identifier: GPL-2.0-or-later +/* + * Compute hashes for modules files and build a merkle tree. + * + * Copyright (C) 2025 Sebastian Andrzej Siewior <sebastian@breakpoint.cc> + * Copyright (C) 2025 Thomas Weißschuh <linux@weissschuh.net> + * + */ +#define _GNU_SOURCE 1 +#include <arpa/inet.h> +#include <err.h> +#include <unistd.h> +#include <fcntl.h> +#include <stdarg.h> +#include <stdio.h> +#include <string.h> +#include <stdbool.h> +#include <stdlib.h> + +#include <sys/stat.h> +#include <sys/mman.h> + +#include <openssl/evp.h> +#include <openssl/err.h> + +#include "ssl-common.h" + +static int hash_size; +static EVP_MD_CTX *ctx; + +struct module_signature { + uint8_t algo; /* Public-key crypto algorithm [0] */ + uint8_t hash; /* Digest algorithm [0] */ + uint8_t id_type; /* Key identifier type [PKEY_ID_PKCS7] */ + uint8_t signer_len; /* Length of signer's name [0] */ + uint8_t key_id_len; /* Length of key identifier [0] */ + uint8_t __pad[3]; + uint32_t sig_len; /* Length of signature data */ +}; + +#define PKEY_ID_MERKLE 3 + +static const char magic_number[] = "~Module signature appended~\n"; + +struct file_entry { + char *name; + unsigned int pos; + unsigned char hash[EVP_MAX_MD_SIZE]; +}; + +static struct file_entry *fh_list; +static size_t num_files; + +struct leaf_hash { + unsigned char hash[EVP_MAX_MD_SIZE]; +}; + +struct mtree { + struct leaf_hash **l; + unsigned int *entries; + unsigned int levels; +}; + +static inline void *xcalloc(size_t n, size_t size) +{ + void *p; + + p = calloc(n, size); + if (!p) + errx(1, "Memory allocation failed"); + + return p; +} + +static void *xmalloc(size_t size) +{ + void *p; + + p = malloc(size); + if (!p) + errx(1, "Memory allocation failed"); + + return p; +} + +static inline void *xreallocarray(void *oldp, size_t n, size_t size) +{ + void *p; + + p = reallocarray(oldp, n, size); + if (!p) + errx(1, "Memory allocation failed"); + + return p; +} + +static inline char *xasprintf(const char *fmt, ...) +{ + va_list ap; + char *strp; + int ret; + + va_start(ap, fmt); + ret = vasprintf(&strp, fmt, ap); + va_end(ap); + if (ret == -1) + err(1, "Memory allocation failed"); + + return strp; +} + +static unsigned int get_pow2(unsigned int val) +{ + return 31 - __builtin_clz(val); +} + +static unsigned int roundup_pow2(unsigned int val) +{ + return 1 << (get_pow2(val - 1) + 1); +} + +static unsigned int log2_roundup(unsigned int val) +{ + return get_pow2(roundup_pow2(val)); +} + +static void hash_data(void *p, unsigned int pos, size_t size, void *ret_hash) +{ + unsigned char magic = 0x01; + unsigned int pos_be; + + pos_be = htonl(pos); + + ERR(EVP_DigestInit_ex(ctx, NULL, NULL) != 1, "EVP_DigestInit_ex()"); + ERR(EVP_DigestUpdate(ctx, &magic, sizeof(magic)) != 1, "EVP_DigestUpdate(magic)"); + ERR(EVP_DigestUpdate(ctx, &pos_be, sizeof(pos_be)) != 1, "EVP_DigestUpdate(pos)"); + ERR(EVP_DigestUpdate(ctx, p, size) != 1, "EVP_DigestUpdate(data)"); + ERR(EVP_DigestFinal_ex(ctx, ret_hash, NULL) != 1, "EVP_DigestFinal_ex()"); +} + +static void hash_entry(void *left, void *right, void *ret_hash) +{ + int hash_size = EVP_MD_CTX_get_size_ex(ctx); + unsigned char magic = 0x02; + + ERR(EVP_DigestInit_ex(ctx, NULL, NULL) != 1, "EVP_DigestInit_ex()"); + ERR(EVP_DigestUpdate(ctx, &magic, sizeof(magic)) != 1, "EVP_DigestUpdate(magic)"); + ERR(EVP_DigestUpdate(ctx, left, hash_size) != 1, "EVP_DigestUpdate(left)"); + ERR(EVP_DigestUpdate(ctx, right, hash_size) != 1, "EVP_DigestUpdate(right)"); + ERR(EVP_DigestFinal_ex(ctx, ret_hash, NULL) != 1, "EVP_DigestFinal_ex()"); +} + +static void hash_file(struct file_entry *fe) +{ + struct stat sb; + int fd, ret; + void *mem; + + fd = open(fe->name, O_RDONLY); + if (fd < 0) + err(1, "Failed to open %s", fe->name); + + ret = fstat(fd, &sb); + if (ret) + err(1, "Failed to stat %s", fe->name); + + mem = mmap(NULL, sb.st_size, PROT_READ, MAP_SHARED, fd, 0); + close(fd); + + if (mem == MAP_FAILED) + err(1, "Failed to mmap %s", fe->name); + + hash_data(mem, fe->pos, sb.st_size, fe->hash); + + munmap(mem, sb.st_size); +} + +static struct mtree *build_merkle(struct file_entry *fh, size_t num) +{ + struct mtree *mt; + unsigned int le; + + if (!num) + return NULL; + + mt = xmalloc(sizeof(*mt)); + mt->levels = log2_roundup(num); + + mt->l = xcalloc(sizeof(*mt->l), mt->levels); + + mt->entries = xcalloc(sizeof(*mt->entries), mt->levels); + le = num / 2; + if (num & 1) + le++; + mt->entries[0] = le; + mt->l[0] = xcalloc(sizeof(**mt->l), le); + + /* First level of pairs */ + for (unsigned int i = 0; i < num; i += 2) { + if (i == num - 1) { + /* Odd number of files, no pair. Hash with itself */ + hash_entry(fh[i].hash, fh[i].hash, mt->l[0][i / 2].hash); + } else { + hash_entry(fh[i].hash, fh[i + 1].hash, mt->l[0][i / 2].hash); + } + } + for (unsigned int i = 1; i < mt->levels; i++) { + int odd = 0; + + if (le & 1) { + le++; + odd++; + } + + mt->entries[i] = le / 2; + mt->l[i] = xcalloc(sizeof(**mt->l), le); + + for (unsigned int n = 0; n < le; n += 2) { + if (n == le - 2 && odd) { + /* Odd number of pairs, no pair. Hash with itself */ + hash_entry(mt->l[i - 1][n].hash, mt->l[i - 1][n].hash, + mt->l[i][n / 2].hash); + } else { + hash_entry(mt->l[i - 1][n].hash, mt->l[i - 1][n + 1].hash, + mt->l[i][n / 2].hash); + } + } + le = mt->entries[i]; + } + return mt; +} + +static void free_mtree(struct mtree *mt) +{ + if (!mt) + return; + + for (unsigned int i = 0; i < mt->levels; i++) + free(mt->l[i]); + + free(mt->l); + free(mt->entries); + free(mt); +} + +static void write_be_int(int fd, unsigned int v) +{ + unsigned int be_val = htonl(v); + + if (write(fd, &be_val, sizeof(be_val)) != sizeof(be_val)) + err(1, "Failed writing to file"); +} + +static void write_hash(int fd, const void *h) +{ + ssize_t wr; + + wr = write(fd, h, hash_size); + if (wr != hash_size) + err(1, "Failed writing to file"); +} + +static void build_proof(struct mtree *mt, unsigned int n, int fd) +{ + unsigned char cur[EVP_MAX_MD_SIZE]; + unsigned char tmp[EVP_MAX_MD_SIZE]; + struct file_entry *fe, *fe_sib; + + fe = &fh_list[n]; + + if ((n & 1) == 0) { + /* No pair, hash with itself */ + if (n + 1 == num_files) + fe_sib = fe; + else + fe_sib = &fh_list[n + 1]; + } else { + fe_sib = &fh_list[n - 1]; + } + /* First comes the node position into the file */ + write_be_int(fd, n); + + if ((n & 1) == 0) + hash_entry(fe->hash, fe_sib->hash, cur); + else + hash_entry(fe_sib->hash, fe->hash, cur); + + /* Next is the sibling hash, followed by hashes in the tree */ + write_hash(fd, fe_sib->hash); + + for (unsigned int i = 0; i < mt->levels - 1; i++) { + n >>= 1; + if ((n & 1) == 0) { + void *h; + + /* No pair, hash with itself */ + if (n + 1 == mt->entries[i]) + h = cur; + else + h = mt->l[i][n + 1].hash; + + hash_entry(cur, h, tmp); + write_hash(fd, h); + } else { + hash_entry(mt->l[i][n - 1].hash, cur, tmp); + write_hash(fd, mt->l[i][n - 1].hash); + } + memcpy(cur, tmp, hash_size); + } + + /* After all that, the end hash should match the root hash */ + if (memcmp(cur, mt->l[mt->levels - 1][0].hash, hash_size)) + errx(1, "hash mismatch"); +} + +static void append_module_signature_magic(int fd, unsigned int sig_len) +{ + struct module_signature sig_info = { + .id_type = PKEY_ID_MERKLE, + .sig_len = htonl(sig_len), + }; + + if (write(fd, &sig_info, sizeof(sig_info)) < 0) + err(1, "write(sig_info) failed"); + + if (write(fd, &magic_number, sizeof(magic_number) - 1) < 0) + err(1, "write(magic_number) failed"); +} + +static void write_merkle_root(struct mtree *mt, const char *fp) +{ + char buf[1024]; + unsigned int levels; + unsigned char *h; + FILE *f; + + if (mt) { + levels = mt->levels; + h = mt->l[mt->levels - 1][0].hash; + } else { + levels = 0; + h = xcalloc(1, hash_size); + } + + f = fopen(fp, "w"); + if (!f) + err(1, "Failed to create %s", buf); + + fprintf(f, "#include <linux/module_hashes.h>\n\n"); + fprintf(f, "const struct module_hashes_root module_hashes_root __module_hashes_section = {\n"); + + fprintf(f, "\t.levels = %u,\n", levels); + fprintf(f, "\t.hash = {"); + for (unsigned int i = 0; i < hash_size; i++) { + char *space = ""; + + if (!(i % 8)) + fprintf(f, "\n\t\t"); + + if ((i + 1) % 8) + space = " "; + + fprintf(f, "0x%02x,%s", h[i], space); + } + fprintf(f, "\n\t},"); + + fprintf(f, "\n};\n"); + fclose(f); + + if (!mt) + free(h); +} + +static char *xstrdup_replace_suffix(const char *str, const char *new_suffix) +{ + const char *current_suffix; + size_t base_len; + + current_suffix = strchr(str, '.'); + if (!current_suffix) + errx(1, "No existing suffix in '%s'", str); + + base_len = current_suffix - str; + + return xasprintf("%.*s%s", (int)base_len, str, new_suffix); +} + +static void read_modules_order(const char *fname, const char *suffix) +{ + char line[PATH_MAX]; + FILE *in; + + in = fopen(fname, "r"); + if (!in) + err(1, "fopen(%s)", fname); + + while (fgets(line, PATH_MAX, in)) { + struct file_entry *entry; + + fh_list = xreallocarray(fh_list, num_files + 1, sizeof(*fh_list)); + entry = &fh_list[num_files]; + + entry->pos = num_files; + entry->name = xstrdup_replace_suffix(line, suffix); + hash_file(entry); + + num_files++; + } + + fclose(in); +} + +static __attribute__((noreturn)) +void format(void) +{ + fprintf(stderr, + "Usage: scripts/modules-merkle-tree <root definition>\n"); + exit(2); +} + +int main(int argc, char *argv[]) +{ + const EVP_MD *hash_evp; + struct mtree *mt; + + if (argc != 3) + format(); + + hash_evp = EVP_get_digestbyname("sha256"); + ERR(!hash_evp, "EVP_get_digestbyname"); + + ctx = EVP_MD_CTX_new(); + ERR(!ctx, "EVP_MD_CTX_new()"); + + hash_size = EVP_MD_get_size(hash_evp); + ERR(hash_size <= 0, "EVP_get_digestbyname"); + + if (EVP_DigestInit_ex(ctx, hash_evp, NULL) != 1) + ERR(1, "EVP_DigestInit_ex()"); + + read_modules_order("modules.order", argv[2]); + + mt = build_merkle(fh_list, num_files); + write_merkle_root(mt, argv[1]); + for (unsigned int i = 0; i < num_files; i++) { + char *signame; + int fd; + + signame = xstrdup_replace_suffix(fh_list[i].name, ".merkle"); + + fd = open(signame, O_WRONLY | O_CREAT | O_TRUNC, 0644); + if (fd < 0) + err(1, "Can't create %s", signame); + + build_proof(mt, i, fd); + append_module_signature_magic(fd, lseek(fd, 0, SEEK_CUR)); + close(fd); + } + + free_mtree(mt); + for (unsigned int i = 0; i < num_files; i++) + free(fh_list[i].name); + free(fh_list); + + EVP_MD_CTX_free(ctx); + return 0; +} diff --git a/security/lockdown/Kconfig b/security/lockdown/Kconfig index 155959205b8e..60b240e3ef1f 100644 --- a/security/lockdown/Kconfig +++ b/security/lockdown/Kconfig @@ -1,7 +1,7 @@ config SECURITY_LOCKDOWN_LSM bool "Basic module for enforcing kernel lockdown" depends on SECURITY - depends on !MODULES || MODULE_SIG + depends on !MODULES || MODULE_SIG || MODULE_HASHES help Build support for an LSM that enforces a coarse kernel lockdown behaviour. -- 2.52.0
{ "author": "=?utf-8?q?Thomas_Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Tue, 13 Jan 2026 13:28:59 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On 2026-01-13 13:28:59 [+0100], Thomas Weißschuh wrote: … This and a few other instances below could be optimized to avoid hashing. I probably forgot to let you know. -> https://git.kernel.org/pub/scm/linux/kernel/git/bigeasy/mtree-hashed-mods.git/commit/?id=10b565c123c731da37befe862de13678b7c54877 Sebastian
{ "author": "Sebastian Andrzej Siewior <bigeasy@linutronix.de>", "date": "Tue, 13 Jan 2026 15:56:35 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On 1/13/26 1:28 PM, Thomas Weißschuh wrote: The patch looks to modify the behavior when mangled_module is true. Previously, module_sig_check() didn't attempt to extract the signature in such a case and treated the module as unsigned. The err remained set to -ENODATA and the function subsequently consulted module_sig_check() and security_locked_down() to determine an appropriate result. Newly, module_sig_check() calls mod_split_sig(), which skips the extraction of the marker ("~Module signature appended~\n") from the end of the module and instead attempts to read it as an actual module_signature. The value is then passed to mod_check_sig() which should return -EBADMSG. The error is propagated to module_sig_check() and treated as fatal, without consulting module_sig_check() and security_locked_down(). I think the mangled_module flag should not be passed to mod_split_sig() and it should be handled solely by module_sig_check(). Passing mangled=true to mod_split_sig() seems incorrect here. It causes that the function doesn't properly extract the signature marker at the end of the module, no? -- Thanks, Petr
{ "author": "Petr Pavlu <petr.pavlu@suse.com>", "date": "Tue, 27 Jan 2026 16:20:15 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On 1/13/26 1:28 PM, Thomas Weißschuh wrote: I suggest moving the IS_ENABLED(CONFIG_MODULE_SIG) block under the new IS_ENABLED(CONFIG_MODULE_SIG_POLICY) section. I realize that CONFIG_MODULE_SIG implies CONFIG_MODULE_SIG_POLICY, but I believe this change makes it more apparent that this it the case. Otherwise, one might for example wonder if sig_len in the module_sig_check() call can be undefined. if (IS_ENABLED(CONFIG_MODULE_SIG_POLICY)) { err = mod_split_sig(info->hdr, &info->len, mangled_module, &sig_len, &sig, "module"); if (err) return err; if (IS_ENABLED(CONFIG_MODULE_SIG)) err = module_sig_check(info, sig, sig_len); } -- Thanks, Petr
{ "author": "Petr Pavlu <petr.pavlu@suse.com>", "date": "Thu, 29 Jan 2026 15:41:43 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On 1/13/26 1:28 PM, Thomas Weißschuh wrote: The new else branch means that if the user chooses not to configure any module integrity policy, they will no longer be able to load any modules. I think this entire if-else part should be moved under the IS_ENABLED(CONFIG_MODULE_SIG_POLICY) block above, as I'm mentioning on patch #12. -- Thanks, Petr
{ "author": "Petr Pavlu <petr.pavlu@suse.com>", "date": "Thu, 29 Jan 2026 15:44:31 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On 1/13/26 1:28 PM, Thomas Weißschuh wrote: I wonder if this dependency cycle could be resolved by utilizing the split into vmlinux.unstripped and vmlinux that occurred last year. The idea is to create the following ordering: vmlinux.unstripped -> modules -> vmlinux, and to patch in .module_hashes only when building the final vmlinux. This would require the following: * Split scripts/Makefile.vmlinux into two Makefiles, one that builds the current vmlinux.unstripped and the second one that builds the final vmlinux from it. * Modify the top Makefile to recognize vmlinux.unstripped and update the BTF generation rule 'modules: vmlinux' to 'modules: vmlinux.unstripped'. * Add the 'vmlinux: modules' ordering in the top Makefile for CONFIG_MODULE_HASHES=y. * Remove the patching of vmlinux.unstripped in scripts/link-vmlinux.sh and instead move it into scripts/Makefile.vmlinux when running objcopy to produce the final vmlinux. I think this approach has two main advantages: * CONFIG_MODULE_HASHES can be made orthogonal to CONFIG_DEBUG_INFO_BTF_MODULES. * All dependencies are expressed at the Makefile level instead of having scripts/link-vmlinux.sh invoke 'make -f Makefile modules'. Below is a rough prototype that applies on top of this series. It is a bit verbose due to the splitting of part of scripts/Makefile.vmlinux into scripts/Makefile.vmlinux_unstripped. -- Thanks, Petr diff --git a/Makefile b/Makefile index 841772a5a260..19a3beb82fa7 100644 --- a/Makefile +++ b/Makefile @@ -1259,7 +1259,7 @@ vmlinux_o: vmlinux.a $(KBUILD_VMLINUX_LIBS) vmlinux.o modules.builtin.modinfo modules.builtin: vmlinux_o @: -PHONY += vmlinux +PHONY += vmlinux.unstripped vmlinux # LDFLAGS_vmlinux in the top Makefile defines linker flags for the top vmlinux, # not for decompressors. LDFLAGS_vmlinux in arch/*/boot/compressed/Makefile is # unrelated; the decompressors just happen to have the same base name, @@ -1270,9 +1270,11 @@ PHONY += vmlinux # https://savannah.gnu.org/bugs/?61463 # For Make > 4.4, the following simple code will work: # vmlinux: private export LDFLAGS_vmlinux := $(LDFLAGS_vmlinux) -vmlinux: private _LDFLAGS_vmlinux := $(LDFLAGS_vmlinux) -vmlinux: export LDFLAGS_vmlinux = $(_LDFLAGS_vmlinux) -vmlinux: vmlinux.o $(KBUILD_LDS) modpost +vmlinux.unstripped: private _LDFLAGS_vmlinux := $(LDFLAGS_vmlinux) +vmlinux.unstripped: export LDFLAGS_vmlinux = $(_LDFLAGS_vmlinux) +vmlinux.unstripped: vmlinux.o $(KBUILD_LDS) modpost + $(Q)$(MAKE) -f $(srctree)/scripts/Makefile.vmlinux_unstripped +vmlinux: vmlinux.unstripped $(Q)$(MAKE) -f $(srctree)/scripts/Makefile.vmlinux # The actual objects are generated when descending, @@ -1541,7 +1543,7 @@ all: dtbs endif ifdef CONFIG_GENERIC_BUILTIN_DTB -vmlinux: dtbs +vmlinux.unstripped: dtbs endif endif @@ -1588,9 +1590,11 @@ endif # is an exception. ifdef CONFIG_DEBUG_INFO_BTF_MODULES KBUILD_BUILTIN := y -ifndef CONFIG_MODULE_HASHES -modules: vmlinux +modules: vmlinux.unstripped endif + +ifdef CONFIG_MODULE_HASHES +vmlinux: modules endif modules: modules_prepare @@ -1983,11 +1987,7 @@ modules.order: $(build-dir) # KBUILD_MODPOST_NOFINAL can be set to skip the final link of modules. # This is solely useful to speed up test compiles. modules: modpost -ifdef CONFIG_MODULE_HASHES -ifeq ($(MODULE_HASHES_MODPOST_FINAL), 1) - $(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modfinal -endif -else ifneq ($(KBUILD_MODPOST_NOFINAL),1) +ifneq ($(KBUILD_MODPOST_NOFINAL),1) $(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modfinal endif diff --git a/scripts/Makefile.modfinal b/scripts/Makefile.modfinal index 890724edac69..213e21ecfe0d 100644 --- a/scripts/Makefile.modfinal +++ b/scripts/Makefile.modfinal @@ -55,7 +55,7 @@ if_changed_except = $(if $(call newer_prereqs_except,$(2))$(cmd-check), \ $(cmd); \ printf '%s\n' 'savedcmd_$@ := $(make-cmd)' > $(dot-target).cmd, @:) -# Re-generate module BTFs if either module's .ko or vmlinux changed +# Re-generate module BTFs if either module's .ko or vmlinux.unstripped changed %.ko: %.o %.mod.o .module-common.o $(objtree)/scripts/module.lds $(and $(CONFIG_DEBUG_INFO_BTF_MODULES),$(KBUILD_BUILTIN),$(objtree)/.tmp_vmlinux_btf.stamp) FORCE +$(call if_changed_except,ld_ko_o,$(objtree)/.tmp_vmlinux_btf.stamp) ifdef CONFIG_DEBUG_INFO_BTF_MODULES diff --git a/scripts/Makefile.vmlinux b/scripts/Makefile.vmlinux index 4ce849f6253a..8c2a938c88ab 100644 --- a/scripts/Makefile.vmlinux +++ b/scripts/Makefile.vmlinux @@ -15,78 +15,24 @@ targets := %.o: %.S FORCE $(call if_changed_rule,as_o_S) -# Built-in dtb -# --------------------------------------------------------------------------- - -quiet_cmd_wrap_dtbs = WRAP $@ - cmd_wrap_dtbs = { \ - echo '\#include <asm-generic/vmlinux.lds.h>'; \ - echo '.section .dtb.init.rodata,"a"'; \ - while read dtb; do \ - symbase=__dtb_$$(basename -s .dtb "$${dtb}" | tr - _); \ - echo '.balign STRUCT_ALIGNMENT'; \ - echo ".global $${symbase}_begin"; \ - echo "$${symbase}_begin:"; \ - echo '.incbin "'$$dtb'" '; \ - echo ".global $${symbase}_end"; \ - echo "$${symbase}_end:"; \ - done < $<; \ - } > $@ - -.builtin-dtbs.S: .builtin-dtbs-list FORCE - $(call if_changed,wrap_dtbs) - -quiet_cmd_gen_dtbs_list = GEN $@ - cmd_gen_dtbs_list = \ - $(if $(CONFIG_BUILTIN_DTB_NAME), echo "arch/$(SRCARCH)/boot/dts/$(CONFIG_BUILTIN_DTB_NAME).dtb",:) > $@ - -.builtin-dtbs-list: arch/$(SRCARCH)/boot/dts/dtbs-list FORCE - $(call if_changed,$(if $(CONFIG_BUILTIN_DTB_ALL),copy,gen_dtbs_list)) - -targets += .builtin-dtbs-list - -ifdef CONFIG_GENERIC_BUILTIN_DTB -targets += .builtin-dtbs.S .builtin-dtbs.o -vmlinux.unstripped: .builtin-dtbs.o -endif - -# vmlinux.unstripped +# vmlinux # --------------------------------------------------------------------------- -ifdef CONFIG_ARCH_WANTS_PRE_LINK_VMLINUX -vmlinux.unstripped: arch/$(SRCARCH)/tools/vmlinux.arch.o - -arch/$(SRCARCH)/tools/vmlinux.arch.o: vmlinux.o FORCE - $(Q)$(MAKE) $(build)=arch/$(SRCARCH)/tools $@ -endif - -ARCH_POSTLINK := $(wildcard $(srctree)/arch/$(SRCARCH)/Makefile.postlink) - -# Final link of vmlinux with optional arch pass after final link -cmd_link_vmlinux = \ - $< "$(LD)" "$(KBUILD_LDFLAGS)" "$(LDFLAGS_vmlinux)" "$@"; \ - $(if $(ARCH_POSTLINK), $(MAKE) -f $(ARCH_POSTLINK) $@, true) +ifdef CONFIG_MODULE_HASHES +targets += .tmp_module_hashes.o +.tmp_module_hashes.o: .tmp_module_hashes.c FORCE -targets += vmlinux.unstripped .vmlinux.export.o -vmlinux.unstripped: scripts/link-vmlinux.sh vmlinux.o .vmlinux.export.o $(KBUILD_LDS) FORCE - +$(call if_changed_dep,link_vmlinux) -ifdef CONFIG_DEBUG_INFO_BTF -vmlinux.unstripped: $(RESOLVE_BTFIDS) -endif +quiet_cmd_module_hashes = OBJCOPY $@ + cmd_module_hashes = $(OBJCOPY) --dump-section .module_hashes=$@ $< -ifdef CONFIG_BUILDTIME_TABLE_SORT -vmlinux.unstripped: scripts/sorttable -endif +targets += .tmp_module_hashes.bin +.tmp_module_hashes.bin: .tmp_module_hashes.o FORCE + $(call if_changed,module_hashes) -ifdef CONFIG_MODULE_HASHES -vmlinux.unstripped: $(objtree)/scripts/modules-merkle-tree -vmlinux.unstripped: modules.order -vmlinux.unstripped: $(wildcard include/config/MODULE_INSTALL_STRIP) +vmlinux: .tmp_module_hashes.bin +patch-module-hashes := --update-section .module_hashes=.tmp_module_hashes.bin endif -# vmlinux -# --------------------------------------------------------------------------- - remove-section-y := .modinfo remove-section-$(CONFIG_ARCH_VMLINUX_NEEDS_RELOCS) += '.rel*' '!.rel*.dyn' # for compatibility with binutils < 2.32 @@ -98,70 +44,15 @@ remove-symbols := -w --strip-unneeded-symbol='__mod_device_table__*' # To avoid warnings: "empty loadable segment detected at ..." from GNU objcopy, # it is necessary to remove the PT_LOAD flag from the segment. quiet_cmd_strip_relocs = OBJCOPY $@ - cmd_strip_relocs = $(OBJCOPY) $(patsubst %,--set-section-flags %=noload,$(remove-section-y)) $< $@; \ - $(OBJCOPY) $(addprefix --remove-section=,$(remove-section-y)) $(remove-symbols) $@ + cmd_script_relocs = $(OBJCOPY) $(patsubst %,--set-section-flags %=noload,$(remove-section-y)) $< $@; \ + $(OBJCOPY) $(addprefix --remove-section=,$(remove-section-y)) \ + $(remove-symbols) \ + $(patch-module-hashes) $@ targets += vmlinux vmlinux: vmlinux.unstripped FORCE $(call if_changed,strip_relocs) -# modules.builtin.modinfo -# --------------------------------------------------------------------------- - -# .modinfo in vmlinux.unstripped is aligned to 8 bytes for compatibility with -# tools that expect vmlinux to have sufficiently aligned sections but the -# additional bytes used for padding .modinfo to satisfy this requirement break -# certain versions of kmod with -# -# depmod: ERROR: kmod_builtin_iter_next: unexpected string without modname prefix -# -# Strip the trailing padding bytes after extracting .modinfo to comply with -# what kmod expects to parse. -quiet_cmd_modules_builtin_modinfo = GEN $@ - cmd_modules_builtin_modinfo = $(cmd_objcopy); \ - sed -i 's/\x00\+$$/\x00/g' $@ - -OBJCOPYFLAGS_modules.builtin.modinfo := -j .modinfo -O binary - -targets += modules.builtin.modinfo -modules.builtin.modinfo: vmlinux.unstripped FORCE - $(call if_changed,modules_builtin_modinfo) - -# modules.builtin -# --------------------------------------------------------------------------- - -__default: modules.builtin - -# The second line aids cases where multiple modules share the same object. - -quiet_cmd_modules_builtin = GEN $@ - cmd_modules_builtin = \ - tr '\0' '\n' < $< | \ - sed -n 's/^[[:alnum:]:_]*\.file=//p' | \ - tr ' ' '\n' | uniq | sed -e 's:^:kernel/:' -e 's/$$/.ko/' > $@ - -targets += modules.builtin -modules.builtin: modules.builtin.modinfo FORCE - $(call if_changed,modules_builtin) - -# modules.builtin.ranges -# --------------------------------------------------------------------------- -ifdef CONFIG_BUILTIN_MODULE_RANGES -__default: modules.builtin.ranges - -quiet_cmd_modules_builtin_ranges = GEN $@ - cmd_modules_builtin_ranges = gawk -f $(real-prereqs) > $@ - -targets += modules.builtin.ranges -modules.builtin.ranges: $(srctree)/scripts/generate_builtin_ranges.awk \ - modules.builtin vmlinux.map vmlinux.o.map FORCE - $(call if_changed,modules_builtin_ranges) - -vmlinux.map: vmlinux.unstripped - @: - -endif - # Add FORCE to the prerequisites of a target to force it to be always rebuilt. # --------------------------------------------------------------------------- diff --git a/scripts/Makefile.vmlinux_unstripped b/scripts/Makefile.vmlinux_unstripped new file mode 100644 index 000000000000..914ee6f3b935 --- /dev/null +++ b/scripts/Makefile.vmlinux_unstripped @@ -0,0 +1,159 @@ +# SPDX-License-Identifier: GPL-2.0-only + +PHONY := __default +__default: vmlinux.unstripped + +include include/config/auto.conf +include $(srctree)/scripts/Kbuild.include +include $(srctree)/scripts/Makefile.lib + +targets := + +%.o: %.c FORCE + $(call if_changed_rule,cc_o_c) + +%.o: %.S FORCE + $(call if_changed_rule,as_o_S) + +# Built-in dtb +# --------------------------------------------------------------------------- + +quiet_cmd_wrap_dtbs = WRAP $@ + cmd_wrap_dtbs = { \ + echo '\#include <asm-generic/vmlinux.lds.h>'; \ + echo '.section .dtb.init.rodata,"a"'; \ + while read dtb; do \ + symbase=__dtb_$$(basename -s .dtb "$${dtb}" | tr - _); \ + echo '.balign STRUCT_ALIGNMENT'; \ + echo ".global $${symbase}_begin"; \ + echo "$${symbase}_begin:"; \ + echo '.incbin "'$$dtb'" '; \ + echo ".global $${symbase}_end"; \ + echo "$${symbase}_end:"; \ + done < $<; \ + } > $@ + +.builtin-dtbs.S: .builtin-dtbs-list FORCE + $(call if_changed,wrap_dtbs) + +quiet_cmd_gen_dtbs_list = GEN $@ + cmd_gen_dtbs_list = \ + $(if $(CONFIG_BUILTIN_DTB_NAME), echo "arch/$(SRCARCH)/boot/dts/$(CONFIG_BUILTIN_DTB_NAME).dtb",:) > $@ + +.builtin-dtbs-list: arch/$(SRCARCH)/boot/dts/dtbs-list FORCE + $(call if_changed,$(if $(CONFIG_BUILTIN_DTB_ALL),copy,gen_dtbs_list)) + +targets += .builtin-dtbs-list + +ifdef CONFIG_GENERIC_BUILTIN_DTB +targets += .builtin-dtbs.S .builtin-dtbs.o +vmlinux.unstripped: .builtin-dtbs.o +endif + +# vmlinux.unstripped +# --------------------------------------------------------------------------- + +ifdef CONFIG_ARCH_WANTS_PRE_LINK_VMLINUX +vmlinux.unstripped: arch/$(SRCARCH)/tools/vmlinux.arch.o + +arch/$(SRCARCH)/tools/vmlinux.arch.o: vmlinux.o FORCE + $(Q)$(MAKE) $(build)=arch/$(SRCARCH)/tools $@ +endif + +ARCH_POSTLINK := $(wildcard $(srctree)/arch/$(SRCARCH)/Makefile.postlink) + +# Final link of vmlinux with optional arch pass after final link +cmd_link_vmlinux = \ + $< "$(LD)" "$(KBUILD_LDFLAGS)" "$(LDFLAGS_vmlinux)" "$@"; \ + $(if $(ARCH_POSTLINK), $(MAKE) -f $(ARCH_POSTLINK) $@, true) + +targets += vmlinux.unstripped .vmlinux.export.o +vmlinux.unstripped: scripts/link-vmlinux.sh vmlinux.o .vmlinux.export.o $(KBUILD_LDS) FORCE + +$(call if_changed_dep,link_vmlinux) +ifdef CONFIG_DEBUG_INFO_BTF +vmlinux.unstripped: $(RESOLVE_BTFIDS) +endif + +ifdef CONFIG_BUILDTIME_TABLE_SORT +vmlinux.unstripped: scripts/sorttable +endif + +ifdef CONFIG_MODULE_HASHES +vmlinux.unstripped: $(objtree)/scripts/modules-merkle-tree +vmlinux.unstripped: modules.order +vmlinux.unstripped: $(wildcard include/config/MODULE_INSTALL_STRIP) +endif + +# modules.builtin.modinfo +# --------------------------------------------------------------------------- + +# .modinfo in vmlinux.unstripped is aligned to 8 bytes for compatibility with +# tools that expect vmlinux to have sufficiently aligned sections but the +# additional bytes used for padding .modinfo to satisfy this requirement break +# certain versions of kmod with +# +# depmod: ERROR: kmod_builtin_iter_next: unexpected string without modname prefix +# +# Strip the trailing padding bytes after extracting .modinfo to comply with +# what kmod expects to parse. +quiet_cmd_modules_builtin_modinfo = GEN $@ + cmd_modules_builtin_modinfo = $(cmd_objcopy); \ + sed -i 's/\x00\+$$/\x00/g' $@ + +OBJCOPYFLAGS_modules.builtin.modinfo := -j .modinfo -O binary + +targets += modules.builtin.modinfo +modules.builtin.modinfo: vmlinux.unstripped FORCE + $(call if_changed,modules_builtin_modinfo) + +# modules.builtin +# --------------------------------------------------------------------------- + +__default: modules.builtin + +# The second line aids cases where multiple modules share the same object. + +quiet_cmd_modules_builtin = GEN $@ + cmd_modules_builtin = \ + tr '\0' '\n' < $< | \ + sed -n 's/^[[:alnum:]:_]*\.file=//p' | \ + tr ' ' '\n' | uniq | sed -e 's:^:kernel/:' -e 's/$$/.ko/' > $@ + +targets += modules.builtin +modules.builtin: modules.builtin.modinfo FORCE + $(call if_changed,modules_builtin) + +# modules.builtin.ranges +# --------------------------------------------------------------------------- +ifdef CONFIG_BUILTIN_MODULE_RANGES +__default: modules.builtin.ranges + +quiet_cmd_modules_builtin_ranges = GEN $@ + cmd_modules_builtin_ranges = gawk -f $(real-prereqs) > $@ + +targets += modules.builtin.ranges +modules.builtin.ranges: $(srctree)/scripts/generate_builtin_ranges.awk \ + modules.builtin vmlinux.map vmlinux.o.map FORCE + $(call if_changed,modules_builtin_ranges) + +vmlinux.map: vmlinux.unstripped + @: + +endif + +# Add FORCE to the prerequisites of a target to force it to be always rebuilt. +# --------------------------------------------------------------------------- + +PHONY += FORCE +FORCE: + +# Read all saved command lines and dependencies for the $(targets) we +# may be building above, using $(if_changed{,_dep}). As an +# optimization, we don't need to read them if the target does not +# exist, we will rebuild anyway in that case. + +existing-targets := $(wildcard $(sort $(targets))) + +-include $(foreach f,$(existing-targets),$(dir $(f)).$(notdir $(f)).cmd) + +.PHONY: $(PHONY) diff --git a/scripts/link-vmlinux.sh b/scripts/link-vmlinux.sh index bfeff1f5753d..80cb09707426 100755 --- a/scripts/link-vmlinux.sh +++ b/scripts/link-vmlinux.sh @@ -316,17 +316,6 @@ if is_enabled CONFIG_BUILDTIME_TABLE_SORT; then fi fi -if is_enabled CONFIG_MODULE_HASHES; then - info MAKE modules - ${MAKE} -f Makefile MODULE_HASHES_MODPOST_FINAL=1 modules - module_hashes_o=.tmp_module_hashes.o - info CC ${module_hashes_o} - ${CC} ${NOSTDINC_FLAGS} ${LINUXINCLUDE} ${KBUILD_CPPFLAGS} ${KBUILD_CFLAGS} \ - ${KBUILD_CFLAGS_KERNEL} -fno-lto -c -o "${module_hashes_o}" ".tmp_module_hashes.c" - ${OBJCOPY} --dump-section .module_hashes=.tmp_module_hashes.bin ${module_hashes_o} - ${OBJCOPY} --update-section .module_hashes=.tmp_module_hashes.bin ${VMLINUX} -fi - # step a (see comment above) if is_enabled CONFIG_KALLSYMS; then if ! cmp -s System.map "${kallsyms_sysmap}"; then
{ "author": "Petr Pavlu <petr.pavlu@suse.com>", "date": "Fri, 30 Jan 2026 18:06:20 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On Tue, Jan 13, 2026 at 01:28:46PM +0100, Thomas Weißschuh wrote: Reviewed-by: Aaron Tomlin <atomlin@atomlin.com> -- Aaron Tomlin
{ "author": "Aaron Tomlin <atomlin@atomlin.com>", "date": "Fri, 30 Jan 2026 15:43:09 -0500", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On Tue, Jan 13, 2026 at 01:28:47PM +0100, Thomas Weißschuh wrote: Reviewed-by: Aaron Tomlin <atomlin@atomlin.com> -- Aaron Tomlin
{ "author": "Aaron Tomlin <atomlin@atomlin.com>", "date": "Fri, 30 Jan 2026 15:49:16 -0500", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On Tue, Jan 13, 2026 at 01:28:48PM +0100, Thomas Weißschuh wrote: Reviewed-by: Aaron Tomlin <atomlin@atomlin.com> -- Aaron Tomlin
{ "author": "Aaron Tomlin <atomlin@atomlin.com>", "date": "Fri, 30 Jan 2026 15:53:50 -0500", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. I think there is a middle ground where the module signing key is generated using a key derivation function that has as an input a deterministic value on the build host, such as /etc/machine-id . The problem with this approach is that only hosts knowing the value will be able to reproduce the build. Maybe this is a solution to NixOS secret management? Introduce minimal impurity as a cryptographic seed and derive the rest of the secrets using something like Argon2(seed, key_uuid). There might be another approach to code integrity rather than step-by-step reproducibility. One may exploit the very cryptographic primitives that make reproducibility hard to ensure that reproducibility is most likely valid. For example, the module signing issue, the build host publishes four artifacts: * The source-code * The compiled and signed binary * The build environment * Its public key Now, we don't need to sign with the private key to know that building the source code using the specific build environment and signing the result with the private key will result in the claimed binary. We can just compile and verify with the public key. So a traditional workflow would be: compiled_module + module_signature == module In this case we build the module, sign it with whatever key, distribute the builds and the private key to whoever wants to reproduce the build. Or we build locally and the key stays with the end-user. While the cryptographic approach would be: verify(compiled_code, module.signature) is True In this case we distribute the builds, source code and the public key. While everyone can ensure that the compiled code is the result of the build environment and source code. The signature is verified using cryptographic means. As long as no one cracks RSA or an algorithm of our choosing/has an absurd amount of luck, the cryptographic approach would be just as good as the traditional approach at ensuring that a program has stopped with a certain output.
{ "author": "=?UTF-8?q?Mihai-Drosi=20C=C3=A2ju?= <mcaju95@gmail.com>", "date": "Sat, 31 Jan 2026 09:36:36 +0200", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
Hi Mihai-Drosi, thanks for taking an interest into these patches! On 2026-01-31 09:36:36+0200, Mihai-Drosi Câju wrote: The goal is to make the distro kernel packages rebuildable by the general public. Any involvement of secret values will break this goal. I am not familiar with NixOS and its secret management. This patchset serves a wider audience. This could work if the goal is only to verify the reproducibility of a single, signed-en-bloc artifact. But we also need to handle vmlinux which contains the corresponding public key. It would need different handling. We can add some special logic to strip that public key before comparision. But then vmlinux might be compressed or wrapped in some other format. Another whole collection of special logic. (...) Thomas
{ "author": "Thomas =?utf-8?Q?Wei=C3=9Fschuh?= <linux@weissschuh.net>", "date": "Sun, 1 Feb 2026 17:22:12 +0100", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
Mihai-Drosi Câju <mcaju95@gmail.com> wrote: There is another issue too: If you have a static private key that you use to sign modules (and probably other things), someone will likely give you a GPL request to get it. One advantage of using a transient key every build and deleting it after is that no one has the key. One other thing to remember: security is *meant* to get in the way. That's the whole point of it. However, IANAL. David
{ "author": "David Howells <dhowells@redhat.com>", "date": "Sun, 01 Feb 2026 17:09:48 +0000", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On Sun, Feb 01, 2026 at 05:09:48PM +0000, David Howells wrote: It sounds like hash-based module authentication is just better, then. If the full set of authentic modules is known at kernel build time, then signatures are unnecessary to verify their authenticity: a list of hashes built into the kernel image is perfectly sufficient. (This patchset actually gets a little fancy and makes it a Merkle tree root. But it could be simplified to just a list of hashes.) With that being the case, why is there still effort being put into adding more features to module signing? I would think efforts should be focused on hash-based module authentication, i.e. this patchset. - Eric
{ "author": "Eric Biggers <ebiggers@kernel.org>", "date": "Sun, 1 Feb 2026 12:12:18 -0800", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
Eric Biggers <ebiggers@kernel.org> wrote: Because it's not just signing of modules and it's not just modules built with the kernel. Also a hash table just of module hashes built into the core kernel image will increase the size of the kernel by around a third of a meg (on Fedora 43 and assuming SHA512) with uncompressible data. David
{ "author": "David Howells <dhowells@redhat.com>", "date": "Mon, 02 Feb 2026 09:21:19 +0000", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On Mon, Feb 02, 2026 at 09:21:19AM +0000, David Howells wrote: Module signing is indeed about the signing of modules. Could you give more details on this use case and why it needs signatures, as opposed to e.g. loading an additional Merkle tree root into the kernel to add to the set of allowed modules? This patchset already optimizes it to use Merkle tree proofs instead. While I'm a bit skeptical of the complexity myself (and distros shouldn't be shipping such an excessively large number of modules in the first place), if it's indeed needed it's already been solved. It's still much simpler than the PKCS#7 signature mess. - Eric
{ "author": "Eric Biggers <ebiggers@kernel.org>", "date": "Mon, 2 Feb 2026 10:30:55 -0800", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
Eric Biggers <ebiggers@kernel.org> wrote: The signature verification stuff in the kernel isn't just used for modules. kexec, for instance; wifi restriction database for another. Because we don't want to, for example, include all the nvidia drivers in our kernel SRPM. David
{ "author": "David Howells <dhowells@redhat.com>", "date": "Mon, 02 Feb 2026 18:38:51 +0000", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 00/17] module: Introduce hash-based integrity checking
The current signature-based module integrity checking has some drawbacks in combination with reproducible builds. Either the module signing key is generated at build time, which makes the build unreproducible, or a static signing key is used, which precludes rebuilds by third parties and makes the whole build and packaging process much more complicated. The goal is to reach bit-for-bit reproducibility. Excluding certain parts of the build output from the reproducibility analysis would be error-prone and force each downstream consumer to introduce new tooling. Introduce a new mechanism to ensure only well-known modules are loaded by embedding a merkle tree root of all modules built as part of the full kernel build into vmlinux. Interest has been proclaimed by NixOS, Arch Linux, Proxmox, SUSE and the general reproducible builds community. Compatibility with IMA modsig is not provided yet. It is still unclear to me if it should be hooked up transparently without any changes to the policy or it should require new policy options. Further improvements: * Use MODULE_SIG_HASH for configuration * UAPI for discovery? Signed-off-by: Thomas Weißschuh <linux@weissschuh.net> --- Changes in v4: - Use as Merkle tree over a linera list of hashes. - Provide compatibilith with INSTALL_MOD_STRIP - Rework commit messages. - Use vmlinux.unstripped over plain "vmlinux". - Link to v3: https://lore.kernel.org/r/20250429-module-hashes-v3-0-00e9258def9e@weissschuh.net Changes in v3: - Rebase on v6.15-rc1 - Use openssl to calculate hash - Avoid warning if no modules are built - Simplify module_integrity_check() a bit - Make incompatibility with INSTALL_MOD_STRIP explicit - Update docs - Add IMA cleanups - Link to v2: https://lore.kernel.org/r/20250120-module-hashes-v2-0-ba1184e27b7f@weissschuh.net Changes in v2: - Drop RFC state - Mention interested parties in cover letter - Expand Kconfig description - Add compatibility with CONFIG_MODULE_SIG - Parallelize module-hashes.sh - Update Documentation/kbuild/reproducible-builds.rst - Link to v1: https://lore.kernel.org/r/20241225-module-hashes-v1-0-d710ce7a3fd1@weissschuh.net --- Coiby Xu (1): module: Only declare set_module_sig_enforced when CONFIG_MODULE_SIG=y Thomas Weißschuh (16): powerpc/ima: Drop unnecessary check for CONFIG_MODULE_SIG ima: efi: Drop unnecessary check for CONFIG_MODULE_SIG/CONFIG_KEXEC_SIG module: Make mod_verify_sig() static module: Switch load_info::len to size_t kbuild: add stamp file for vmlinux BTF data kbuild: generate module BTF based on vmlinux.unstripped module: Deduplicate signature extraction module: Make module loading policy usable without MODULE_SIG module: Move integrity checks into dedicated function module: Move lockdown check into generic module loader module: Move signature splitting up module: Report signature type to users lockdown: Make the relationship to MODULE_SIG a dependency module: Introduce hash-based integrity checking kbuild: move handling of module stripping to Makefile.lib kbuild: make CONFIG_MODULE_HASHES compatible with module stripping .gitignore | 2 + Documentation/kbuild/reproducible-builds.rst | 5 +- Makefile | 8 +- arch/powerpc/kernel/ima_arch.c | 3 +- include/asm-generic/vmlinux.lds.h | 11 + include/linux/module.h | 20 +- include/linux/module_hashes.h | 25 ++ include/linux/module_signature.h | 5 +- kernel/module/Kconfig | 29 +- kernel/module/Makefile | 1 + kernel/module/hashes.c | 92 ++++++ kernel/module/hashes_root.c | 6 + kernel/module/internal.h | 13 +- kernel/module/main.c | 68 +++- kernel/module/signing.c | 83 +---- kernel/module_signature.c | 49 ++- scripts/.gitignore | 1 + scripts/Makefile | 3 + scripts/Makefile.lib | 32 ++ scripts/Makefile.modfinal | 28 +- scripts/Makefile.modinst | 46 +-- scripts/Makefile.vmlinux | 6 + scripts/link-vmlinux.sh | 20 +- scripts/modules-merkle-tree.c | 467 +++++++++++++++++++++++++++ security/integrity/ima/ima_efi.c | 6 +- security/integrity/ima/ima_modsig.c | 28 +- security/lockdown/Kconfig | 2 +- 27 files changed, 884 insertions(+), 175 deletions(-) --- base-commit: 8f0b4cce4481fb22653697cced8d0d04027cb1e8 change-id: 20241225-module-hashes-7a50a7cc2a30 Best regards, -- Thomas Weißschuh <linux@weissschuh.net>
On Mon, Feb 02, 2026 at 06:38:51PM +0000, David Howells wrote: That doesn't answer my question. Are you trying to say these modules need to be built later *and* signed using the original signing key? - Eric
{ "author": "Eric Biggers <ebiggers@kernel.org>", "date": "Mon, 2 Feb 2026 10:47:25 -0800", "thread_id": "20260202184725.GC2036@quark.mbox.gz" }
lkml
[PATCH v4 0/4] Support runtime configuration for per-VM's HGATP mode
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Currently, RISC-V KVM hardcodes the G-stage page table format (HGATP mode) to the maximum mode detected at boot time (e.g., SV57x4 if supported). but often such a wide GPA is unnecessary, just as a host sometimes doesn't need sv57. This patch introduces per-VM configurability of the G-stage mode via a new KVM capability: KVM_CAP_RISCV_SET_HGATP_MODE. User-space can now explicitly request a specific HGATP mode (SV39x4, SV48x4, or SV57x4 on 64-bit) during VM creation. --- Changes in v4: - Extend kvm_riscv_gstage_mode_detect() to probe all HGATP.MODE values supported by the host and record them in a bitmask. - Treat unexpected pgd_levels in kvm_riscv_gstage_mode() as an internal error (e.g. WARN_ON_ONCE())(per Radim). - Move kvm_riscv_gstage_gpa_bits() and kvm_riscv_gstage_gpa_size() to header as static inline helpers(per Radim). - Drop gstage_mode_user_initialized and Remove the kvm_debug() message from KVM_CAP_RISCV_SET_HGATP_MODE(per Radim). - Link to v3: https://lore.kernel.org/linux-riscv/20260125150450.27068-1-fangyu.yu@linux.alibaba.com/ --- Changes in v3: - Reworked the patch formatting (per Drew). - Dropped kvm->arch.kvm_riscv_gstage_mode and derive HGATP.MODE from kvm_riscv_gstage_pgd_levels via a helper, avoiding redundant per-VM state(per Drew). - Removed kvm_riscv_gstage_max_mode and keep only kvm_riscv_gstage_max_pgd_levels for host capability detection(per Drew). - Other initialization and return value issues(per Drew). - Enforce that KVM_CAP_RISCV_SET_HGATP_MODE can only be enabled before any vCPUs are created by rejecting the ioctl once kvm->created_vcpus is non-zero(per Radim). - Add a memslot safety check and reject the capability unless kvm_are_all_memslots_empty(kvm) is true, ensuring the G-stage format is not changed after any memslots have been installed(per Radim). - Link to v2: https://lore.kernel.org/linux-riscv/20260105143232.76715-1-fangyu.yu@linux.alibaba.com/ Fangyu Yu (4): RISC-V: KVM: Support runtime configuration for per-VM's HGATP mode RISC-V: KVM: Detect and expose supported HGATP G-stage modes RISC-V: KVM: add KVM_CAP_RISCV_SET_HGATP_MODE RISC-V: KVM: Define HGATP mode bits for KVM_CAP_RISCV_SET_HGATP_MODE Documentation/virt/kvm/api.rst | 27 ++++++++ arch/riscv/include/asm/kvm_gstage.h | 57 ++++++++++++++--- arch/riscv/include/asm/kvm_host.h | 19 ++++++ arch/riscv/include/uapi/asm/kvm.h | 3 + arch/riscv/kvm/gstage.c | 98 ++++++++++++++--------------- arch/riscv/kvm/main.c | 12 ++-- arch/riscv/kvm/mmu.c | 20 +++--- arch/riscv/kvm/vm.c | 22 ++++++- arch/riscv/kvm/vmid.c | 3 +- include/uapi/linux/kvm.h | 1 + 10 files changed, 188 insertions(+), 74 deletions(-) -- 2.50.1
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Extend kvm_riscv_gstage_mode_detect() to probe all HGATP.MODE values supported by the host and record them in a bitmask. Keep tracking the maximum supported G-stage page table level for existing internal users. Also provide lightweight helpers to retrieve the supported-mode bitmask and validate a requested HGATP.MODE against it. Signed-off-by: Fangyu Yu <fangyu.yu@linux.alibaba.com> --- arch/riscv/include/asm/kvm_gstage.h | 37 +++++++++++++++++++++++++++ arch/riscv/kvm/gstage.c | 39 ++++++++++++++++------------- 2 files changed, 58 insertions(+), 18 deletions(-) diff --git a/arch/riscv/include/asm/kvm_gstage.h b/arch/riscv/include/asm/kvm_gstage.h index b12605fbca44..c0c5a8b99056 100644 --- a/arch/riscv/include/asm/kvm_gstage.h +++ b/arch/riscv/include/asm/kvm_gstage.h @@ -30,6 +30,7 @@ struct kvm_gstage_mapping { #endif extern unsigned long kvm_riscv_gstage_max_pgd_levels; +extern u32 kvm_riscv_gstage_mode_mask; #define kvm_riscv_gstage_pgd_xbits 2 #define kvm_riscv_gstage_pgd_size (1UL << (HGATP_PAGE_SHIFT + kvm_riscv_gstage_pgd_xbits)) @@ -75,4 +76,40 @@ void kvm_riscv_gstage_wp_range(struct kvm_gstage *gstage, gpa_t start, gpa_t end void kvm_riscv_gstage_mode_detect(void); +enum kvm_riscv_hgatp_mode_bit { + HGATP_MODE_SV39X4_BIT = 0, + HGATP_MODE_SV48X4_BIT = 1, + HGATP_MODE_SV57X4_BIT = 2, +}; + +static inline u32 kvm_riscv_get_hgatp_mode_mask(void) +{ + return kvm_riscv_gstage_mode_mask; +} + +static inline bool kvm_riscv_hgatp_mode_is_valid(unsigned long mode) +{ +#ifdef CONFIG_64BIT + u32 bit; + + switch (mode) { + case HGATP_MODE_SV39X4: + bit = HGATP_MODE_SV39X4_BIT; + break; + case HGATP_MODE_SV48X4: + bit = HGATP_MODE_SV48X4_BIT; + break; + case HGATP_MODE_SV57X4: + bit = HGATP_MODE_SV57X4_BIT; + break; + default: + return false; + } + + return kvm_riscv_gstage_mode_mask & BIT(bit); +#else + return false; +#endif +} + #endif diff --git a/arch/riscv/kvm/gstage.c b/arch/riscv/kvm/gstage.c index 2d0045f502d1..edbabdac57d8 100644 --- a/arch/riscv/kvm/gstage.c +++ b/arch/riscv/kvm/gstage.c @@ -16,6 +16,8 @@ unsigned long kvm_riscv_gstage_max_pgd_levels __ro_after_init = 3; #else unsigned long kvm_riscv_gstage_max_pgd_levels __ro_after_init = 2; #endif +/* Bitmask of supported HGATP.MODE (see HGATP_MODE_*_BIT). */ +u32 kvm_riscv_gstage_mode_mask __ro_after_init; #define gstage_pte_leaf(__ptep) \ (pte_val(*(__ptep)) & (_PAGE_READ | _PAGE_WRITE | _PAGE_EXEC)) @@ -315,42 +317,43 @@ void kvm_riscv_gstage_wp_range(struct kvm_gstage *gstage, gpa_t start, gpa_t end } } +static bool __init kvm_riscv_hgatp_mode_supported(unsigned long mode) +{ + csr_write(CSR_HGATP, mode << HGATP_MODE_SHIFT); + return ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == mode); +} + void __init kvm_riscv_gstage_mode_detect(void) { + kvm_riscv_gstage_mode_mask = 0; + kvm_riscv_gstage_max_pgd_levels = 0; + #ifdef CONFIG_64BIT - /* Try Sv57x4 G-stage mode */ - csr_write(CSR_HGATP, HGATP_MODE_SV57X4 << HGATP_MODE_SHIFT); - if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV57X4) { - kvm_riscv_gstage_max_pgd_levels = 5; - goto done; + /* Try Sv39x4 G-stage mode */ + if (kvm_riscv_hgatp_mode_supported(HGATP_MODE_SV39X4)) { + kvm_riscv_gstage_mode_mask |= BIT(HGATP_MODE_SV39X4_BIT); + kvm_riscv_gstage_max_pgd_levels = 3; } /* Try Sv48x4 G-stage mode */ - csr_write(CSR_HGATP, HGATP_MODE_SV48X4 << HGATP_MODE_SHIFT); - if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV48X4) { + if (kvm_riscv_hgatp_mode_supported(HGATP_MODE_SV48X4)) { + kvm_riscv_gstage_mode_mask |= BIT(HGATP_MODE_SV48X4_BIT); kvm_riscv_gstage_max_pgd_levels = 4; - goto done; } - /* Try Sv39x4 G-stage mode */ - csr_write(CSR_HGATP, HGATP_MODE_SV39X4 << HGATP_MODE_SHIFT); - if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV39X4) { - kvm_riscv_gstage_max_pgd_levels = 3; - goto done; + /* Try Sv57x4 G-stage mode */ + if (kvm_riscv_hgatp_mode_supported(HGATP_MODE_SV57X4)) { + kvm_riscv_gstage_mode_mask |= BIT(HGATP_MODE_SV57X4_BIT); + kvm_riscv_gstage_max_pgd_levels = 5; } #else /* CONFIG_32BIT */ /* Try Sv32x4 G-stage mode */ csr_write(CSR_HGATP, HGATP_MODE_SV32X4 << HGATP_MODE_SHIFT); if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV32X4) { kvm_riscv_gstage_max_pgd_levels = 2; - goto done; } #endif - /* KVM depends on !HGATP_MODE_OFF */ - kvm_riscv_gstage_max_pgd_levels = 0; - -done: csr_write(CSR_HGATP, 0); kvm_riscv_local_hfence_gvma_all(); } -- 2.50.1
{ "author": "fangyu.yu@linux.alibaba.com", "date": "Mon, 2 Feb 2026 22:07:14 +0800", "thread_id": "ftdnjnfvmybiskej3txd23mqn3jpjdewmgjxjbap3y4ekj4h4m@d74ihtpclyps.mbox.gz" }
lkml
[PATCH v4 0/4] Support runtime configuration for per-VM's HGATP mode
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Currently, RISC-V KVM hardcodes the G-stage page table format (HGATP mode) to the maximum mode detected at boot time (e.g., SV57x4 if supported). but often such a wide GPA is unnecessary, just as a host sometimes doesn't need sv57. This patch introduces per-VM configurability of the G-stage mode via a new KVM capability: KVM_CAP_RISCV_SET_HGATP_MODE. User-space can now explicitly request a specific HGATP mode (SV39x4, SV48x4, or SV57x4 on 64-bit) during VM creation. --- Changes in v4: - Extend kvm_riscv_gstage_mode_detect() to probe all HGATP.MODE values supported by the host and record them in a bitmask. - Treat unexpected pgd_levels in kvm_riscv_gstage_mode() as an internal error (e.g. WARN_ON_ONCE())(per Radim). - Move kvm_riscv_gstage_gpa_bits() and kvm_riscv_gstage_gpa_size() to header as static inline helpers(per Radim). - Drop gstage_mode_user_initialized and Remove the kvm_debug() message from KVM_CAP_RISCV_SET_HGATP_MODE(per Radim). - Link to v3: https://lore.kernel.org/linux-riscv/20260125150450.27068-1-fangyu.yu@linux.alibaba.com/ --- Changes in v3: - Reworked the patch formatting (per Drew). - Dropped kvm->arch.kvm_riscv_gstage_mode and derive HGATP.MODE from kvm_riscv_gstage_pgd_levels via a helper, avoiding redundant per-VM state(per Drew). - Removed kvm_riscv_gstage_max_mode and keep only kvm_riscv_gstage_max_pgd_levels for host capability detection(per Drew). - Other initialization and return value issues(per Drew). - Enforce that KVM_CAP_RISCV_SET_HGATP_MODE can only be enabled before any vCPUs are created by rejecting the ioctl once kvm->created_vcpus is non-zero(per Radim). - Add a memslot safety check and reject the capability unless kvm_are_all_memslots_empty(kvm) is true, ensuring the G-stage format is not changed after any memslots have been installed(per Radim). - Link to v2: https://lore.kernel.org/linux-riscv/20260105143232.76715-1-fangyu.yu@linux.alibaba.com/ Fangyu Yu (4): RISC-V: KVM: Support runtime configuration for per-VM's HGATP mode RISC-V: KVM: Detect and expose supported HGATP G-stage modes RISC-V: KVM: add KVM_CAP_RISCV_SET_HGATP_MODE RISC-V: KVM: Define HGATP mode bits for KVM_CAP_RISCV_SET_HGATP_MODE Documentation/virt/kvm/api.rst | 27 ++++++++ arch/riscv/include/asm/kvm_gstage.h | 57 ++++++++++++++--- arch/riscv/include/asm/kvm_host.h | 19 ++++++ arch/riscv/include/uapi/asm/kvm.h | 3 + arch/riscv/kvm/gstage.c | 98 ++++++++++++++--------------- arch/riscv/kvm/main.c | 12 ++-- arch/riscv/kvm/mmu.c | 20 +++--- arch/riscv/kvm/vm.c | 22 ++++++- arch/riscv/kvm/vmid.c | 3 +- include/uapi/linux/kvm.h | 1 + 10 files changed, 188 insertions(+), 74 deletions(-) -- 2.50.1
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Add a VM capability that allows userspace to select the G-stage page table format by setting HGATP.MODE on a per-VM basis. Userspace enables the capability via KVM_ENABLE_CAP, passing the requested HGATP.MODE in args[0]. The request is rejected with -EINVAL if the mode is not supported by the host, and with -EBUSY if the VM has already been committed (e.g. vCPUs have been created or any memslot is populated). KVM_CHECK_EXTENSION(KVM_CAP_RISCV_SET_HGATP_MODE) returns a bitmask of the HGATP.MODE formats supported by the host. Signed-off-by: Fangyu Yu <fangyu.yu@linux.alibaba.com> --- Documentation/virt/kvm/api.rst | 27 +++++++++++++++++++++++++++ arch/riscv/kvm/vm.c | 20 ++++++++++++++++++-- include/uapi/linux/kvm.h | 1 + 3 files changed, 46 insertions(+), 2 deletions(-) diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index 01a3abef8abb..1a0c5ddacae8 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -8765,6 +8765,33 @@ helpful if user space wants to emulate instructions which are not This capability can be enabled dynamically even if VCPUs were already created and are running. +7.47 KVM_CAP_RISCV_SET_HGATP_MODE +--------------------------------- + +:Architectures: riscv +:Type: VM +:Parameters: args[0] contains the requested HGATP mode +:Returns: + - 0 on success. + - -EINVAL if args[0] is outside the range of HGATP modes supported by the + hardware. + - -EBUSY if vCPUs have already been created for the VM, if the VM has any + non-empty memslots. + +This capability allows userspace to explicitly select the HGATP mode for +the VM. The selected mode must be supported by both KVM and hardware. This +capability must be enabled before creating any vCPUs or memslots. + +``KVM_CHECK_EXTENSION(KVM_CAP_RISCV_SET_HGATP_MODE)`` returns a bitmask of +HGATP.MODE values supported by the host. A return value of 0 indicates that +the capability is not supported. + +The returned bitmask uses the following bit positions:: + + bit 0: HGATP.MODE = SV39X4 + bit 1: HGATP.MODE = SV48X4 + bit 2: HGATP.MODE = SV57X4 + 8. Other capabilities. ====================== diff --git a/arch/riscv/kvm/vm.c b/arch/riscv/kvm/vm.c index 4b2156df40fc..3bbbcb6a17a6 100644 --- a/arch/riscv/kvm/vm.c +++ b/arch/riscv/kvm/vm.c @@ -202,6 +202,9 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) case KVM_CAP_VM_GPA_BITS: r = kvm_riscv_gstage_gpa_bits(&kvm->arch); break; + case KVM_CAP_RISCV_SET_HGATP_MODE: + r = kvm_riscv_get_hgatp_mode_mask(); + break; default: r = 0; break; @@ -212,12 +215,25 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap) { + if (cap->flags) + return -EINVAL; + switch (cap->cap) { case KVM_CAP_RISCV_MP_STATE_RESET: - if (cap->flags) - return -EINVAL; kvm->arch.mp_state_reset = true; return 0; + case KVM_CAP_RISCV_SET_HGATP_MODE: +#ifdef CONFIG_64BIT + if (!kvm_riscv_hgatp_mode_is_valid(cap->args[0])) + return -EINVAL; + + if (kvm->created_vcpus || !kvm_are_all_memslots_empty(kvm)) + return -EBUSY; + + kvm->arch.kvm_riscv_gstage_pgd_levels = + 3 + cap->args[0] - HGATP_MODE_SV39X4; +#endif + return 0; default: return -EINVAL; } diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index dddb781b0507..00c02a880518 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -974,6 +974,7 @@ struct kvm_enable_cap { #define KVM_CAP_GUEST_MEMFD_FLAGS 244 #define KVM_CAP_ARM_SEA_TO_USER 245 #define KVM_CAP_S390_USER_OPEREXEC 246 +#define KVM_CAP_RISCV_SET_HGATP_MODE 247 struct kvm_irq_routing_irqchip { __u32 irqchip; -- 2.50.1
{ "author": "fangyu.yu@linux.alibaba.com", "date": "Mon, 2 Feb 2026 22:07:15 +0800", "thread_id": "ftdnjnfvmybiskej3txd23mqn3jpjdewmgjxjbap3y4ekj4h4m@d74ihtpclyps.mbox.gz" }
lkml
[PATCH v4 0/4] Support runtime configuration for per-VM's HGATP mode
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Currently, RISC-V KVM hardcodes the G-stage page table format (HGATP mode) to the maximum mode detected at boot time (e.g., SV57x4 if supported). but often such a wide GPA is unnecessary, just as a host sometimes doesn't need sv57. This patch introduces per-VM configurability of the G-stage mode via a new KVM capability: KVM_CAP_RISCV_SET_HGATP_MODE. User-space can now explicitly request a specific HGATP mode (SV39x4, SV48x4, or SV57x4 on 64-bit) during VM creation. --- Changes in v4: - Extend kvm_riscv_gstage_mode_detect() to probe all HGATP.MODE values supported by the host and record them in a bitmask. - Treat unexpected pgd_levels in kvm_riscv_gstage_mode() as an internal error (e.g. WARN_ON_ONCE())(per Radim). - Move kvm_riscv_gstage_gpa_bits() and kvm_riscv_gstage_gpa_size() to header as static inline helpers(per Radim). - Drop gstage_mode_user_initialized and Remove the kvm_debug() message from KVM_CAP_RISCV_SET_HGATP_MODE(per Radim). - Link to v3: https://lore.kernel.org/linux-riscv/20260125150450.27068-1-fangyu.yu@linux.alibaba.com/ --- Changes in v3: - Reworked the patch formatting (per Drew). - Dropped kvm->arch.kvm_riscv_gstage_mode and derive HGATP.MODE from kvm_riscv_gstage_pgd_levels via a helper, avoiding redundant per-VM state(per Drew). - Removed kvm_riscv_gstage_max_mode and keep only kvm_riscv_gstage_max_pgd_levels for host capability detection(per Drew). - Other initialization and return value issues(per Drew). - Enforce that KVM_CAP_RISCV_SET_HGATP_MODE can only be enabled before any vCPUs are created by rejecting the ioctl once kvm->created_vcpus is non-zero(per Radim). - Add a memslot safety check and reject the capability unless kvm_are_all_memslots_empty(kvm) is true, ensuring the G-stage format is not changed after any memslots have been installed(per Radim). - Link to v2: https://lore.kernel.org/linux-riscv/20260105143232.76715-1-fangyu.yu@linux.alibaba.com/ Fangyu Yu (4): RISC-V: KVM: Support runtime configuration for per-VM's HGATP mode RISC-V: KVM: Detect and expose supported HGATP G-stage modes RISC-V: KVM: add KVM_CAP_RISCV_SET_HGATP_MODE RISC-V: KVM: Define HGATP mode bits for KVM_CAP_RISCV_SET_HGATP_MODE Documentation/virt/kvm/api.rst | 27 ++++++++ arch/riscv/include/asm/kvm_gstage.h | 57 ++++++++++++++--- arch/riscv/include/asm/kvm_host.h | 19 ++++++ arch/riscv/include/uapi/asm/kvm.h | 3 + arch/riscv/kvm/gstage.c | 98 ++++++++++++++--------------- arch/riscv/kvm/main.c | 12 ++-- arch/riscv/kvm/mmu.c | 20 +++--- arch/riscv/kvm/vm.c | 22 ++++++- arch/riscv/kvm/vmid.c | 3 +- include/uapi/linux/kvm.h | 1 + 10 files changed, 188 insertions(+), 74 deletions(-) -- 2.50.1
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Define UAPI bit positions for the supported-mode bitmask returned by KVM_CHECK_EXTENSION(KVM_CAP_RISCV_SET_HGATP_MODE). Signed-off-by: Fangyu Yu <fangyu.yu@linux.alibaba.com> --- arch/riscv/include/uapi/asm/kvm.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/riscv/include/uapi/asm/kvm.h b/arch/riscv/include/uapi/asm/kvm.h index 54f3ad7ed2e4..236cd790cb13 100644 --- a/arch/riscv/include/uapi/asm/kvm.h +++ b/arch/riscv/include/uapi/asm/kvm.h @@ -393,6 +393,9 @@ struct kvm_riscv_sbi_fwft { /* One single KVM irqchip, ie. the AIA */ #define KVM_NR_IRQCHIPS 1 +#define KVM_RISCV_HGATP_MODE_SV39X4_BIT 0 +#define KVM_RISCV_HGATP_MODE_SV48X4_BIT 1 +#define KVM_RISCV_HGATP_MODE_SV57X4_BIT 2 #endif #endif /* __LINUX_KVM_RISCV_H */ -- 2.50.1
{ "author": "fangyu.yu@linux.alibaba.com", "date": "Mon, 2 Feb 2026 22:07:16 +0800", "thread_id": "ftdnjnfvmybiskej3txd23mqn3jpjdewmgjxjbap3y4ekj4h4m@d74ihtpclyps.mbox.gz" }
lkml
[PATCH v4 0/4] Support runtime configuration for per-VM's HGATP mode
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Currently, RISC-V KVM hardcodes the G-stage page table format (HGATP mode) to the maximum mode detected at boot time (e.g., SV57x4 if supported). but often such a wide GPA is unnecessary, just as a host sometimes doesn't need sv57. This patch introduces per-VM configurability of the G-stage mode via a new KVM capability: KVM_CAP_RISCV_SET_HGATP_MODE. User-space can now explicitly request a specific HGATP mode (SV39x4, SV48x4, or SV57x4 on 64-bit) during VM creation. --- Changes in v4: - Extend kvm_riscv_gstage_mode_detect() to probe all HGATP.MODE values supported by the host and record them in a bitmask. - Treat unexpected pgd_levels in kvm_riscv_gstage_mode() as an internal error (e.g. WARN_ON_ONCE())(per Radim). - Move kvm_riscv_gstage_gpa_bits() and kvm_riscv_gstage_gpa_size() to header as static inline helpers(per Radim). - Drop gstage_mode_user_initialized and Remove the kvm_debug() message from KVM_CAP_RISCV_SET_HGATP_MODE(per Radim). - Link to v3: https://lore.kernel.org/linux-riscv/20260125150450.27068-1-fangyu.yu@linux.alibaba.com/ --- Changes in v3: - Reworked the patch formatting (per Drew). - Dropped kvm->arch.kvm_riscv_gstage_mode and derive HGATP.MODE from kvm_riscv_gstage_pgd_levels via a helper, avoiding redundant per-VM state(per Drew). - Removed kvm_riscv_gstage_max_mode and keep only kvm_riscv_gstage_max_pgd_levels for host capability detection(per Drew). - Other initialization and return value issues(per Drew). - Enforce that KVM_CAP_RISCV_SET_HGATP_MODE can only be enabled before any vCPUs are created by rejecting the ioctl once kvm->created_vcpus is non-zero(per Radim). - Add a memslot safety check and reject the capability unless kvm_are_all_memslots_empty(kvm) is true, ensuring the G-stage format is not changed after any memslots have been installed(per Radim). - Link to v2: https://lore.kernel.org/linux-riscv/20260105143232.76715-1-fangyu.yu@linux.alibaba.com/ Fangyu Yu (4): RISC-V: KVM: Support runtime configuration for per-VM's HGATP mode RISC-V: KVM: Detect and expose supported HGATP G-stage modes RISC-V: KVM: add KVM_CAP_RISCV_SET_HGATP_MODE RISC-V: KVM: Define HGATP mode bits for KVM_CAP_RISCV_SET_HGATP_MODE Documentation/virt/kvm/api.rst | 27 ++++++++ arch/riscv/include/asm/kvm_gstage.h | 57 ++++++++++++++--- arch/riscv/include/asm/kvm_host.h | 19 ++++++ arch/riscv/include/uapi/asm/kvm.h | 3 + arch/riscv/kvm/gstage.c | 98 ++++++++++++++--------------- arch/riscv/kvm/main.c | 12 ++-- arch/riscv/kvm/mmu.c | 20 +++--- arch/riscv/kvm/vm.c | 22 ++++++- arch/riscv/kvm/vmid.c | 3 +- include/uapi/linux/kvm.h | 1 + 10 files changed, 188 insertions(+), 74 deletions(-) -- 2.50.1
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Introduces one per-VM architecture-specific fields to support runtime configuration of the G-stage page table format: - kvm->arch.kvm_riscv_gstage_pgd_levels: the corresponding number of page table levels for the selected mode. These fields replace the previous global variables kvm_riscv_gstage_mode and kvm_riscv_gstage_pgd_levels, enabling different virtual machines to independently select their G-stage page table format instead of being forced to share the maximum mode detected by the kernel at boot time. Signed-off-by: Fangyu Yu <fangyu.yu@linux.alibaba.com> --- arch/riscv/include/asm/kvm_gstage.h | 20 +++++---- arch/riscv/include/asm/kvm_host.h | 19 +++++++++ arch/riscv/kvm/gstage.c | 65 ++++++++++++++--------------- arch/riscv/kvm/main.c | 12 +++--- arch/riscv/kvm/mmu.c | 20 +++++---- arch/riscv/kvm/vm.c | 2 +- arch/riscv/kvm/vmid.c | 3 +- 7 files changed, 84 insertions(+), 57 deletions(-) diff --git a/arch/riscv/include/asm/kvm_gstage.h b/arch/riscv/include/asm/kvm_gstage.h index 595e2183173e..b12605fbca44 100644 --- a/arch/riscv/include/asm/kvm_gstage.h +++ b/arch/riscv/include/asm/kvm_gstage.h @@ -29,16 +29,22 @@ struct kvm_gstage_mapping { #define kvm_riscv_gstage_index_bits 10 #endif -extern unsigned long kvm_riscv_gstage_mode; -extern unsigned long kvm_riscv_gstage_pgd_levels; +extern unsigned long kvm_riscv_gstage_max_pgd_levels; #define kvm_riscv_gstage_pgd_xbits 2 #define kvm_riscv_gstage_pgd_size (1UL << (HGATP_PAGE_SHIFT + kvm_riscv_gstage_pgd_xbits)) -#define kvm_riscv_gstage_gpa_bits (HGATP_PAGE_SHIFT + \ - (kvm_riscv_gstage_pgd_levels * \ - kvm_riscv_gstage_index_bits) + \ - kvm_riscv_gstage_pgd_xbits) -#define kvm_riscv_gstage_gpa_size ((gpa_t)(1ULL << kvm_riscv_gstage_gpa_bits)) + +static inline unsigned long kvm_riscv_gstage_gpa_bits(struct kvm_arch *ka) +{ + return (HGATP_PAGE_SHIFT + + ka->kvm_riscv_gstage_pgd_levels * kvm_riscv_gstage_index_bits + + kvm_riscv_gstage_pgd_xbits); +} + +static inline gpa_t kvm_riscv_gstage_gpa_size(struct kvm_arch *ka) +{ + return BIT_ULL(kvm_riscv_gstage_gpa_bits(ka)); +} bool kvm_riscv_gstage_get_leaf(struct kvm_gstage *gstage, gpa_t addr, pte_t **ptepp, u32 *ptep_level); diff --git a/arch/riscv/include/asm/kvm_host.h b/arch/riscv/include/asm/kvm_host.h index 24585304c02b..0ace5e98c133 100644 --- a/arch/riscv/include/asm/kvm_host.h +++ b/arch/riscv/include/asm/kvm_host.h @@ -87,6 +87,23 @@ struct kvm_vcpu_stat { struct kvm_arch_memory_slot { }; +static inline unsigned long kvm_riscv_gstage_mode(unsigned long pgd_levels) +{ + switch (pgd_levels) { + case 2: + return HGATP_MODE_SV32X4; + case 3: + return HGATP_MODE_SV39X4; + case 4: + return HGATP_MODE_SV48X4; + case 5: + return HGATP_MODE_SV57X4; + default: + WARN_ON_ONCE(1); + return HGATP_MODE_OFF; + } +} + struct kvm_arch { /* G-stage vmid */ struct kvm_vmid vmid; @@ -103,6 +120,8 @@ struct kvm_arch { /* KVM_CAP_RISCV_MP_STATE_RESET */ bool mp_state_reset; + + unsigned long kvm_riscv_gstage_pgd_levels; }; struct kvm_cpu_trap { diff --git a/arch/riscv/kvm/gstage.c b/arch/riscv/kvm/gstage.c index b67d60d722c2..2d0045f502d1 100644 --- a/arch/riscv/kvm/gstage.c +++ b/arch/riscv/kvm/gstage.c @@ -12,22 +12,21 @@ #include <asm/kvm_gstage.h> #ifdef CONFIG_64BIT -unsigned long kvm_riscv_gstage_mode __ro_after_init = HGATP_MODE_SV39X4; -unsigned long kvm_riscv_gstage_pgd_levels __ro_after_init = 3; +unsigned long kvm_riscv_gstage_max_pgd_levels __ro_after_init = 3; #else -unsigned long kvm_riscv_gstage_mode __ro_after_init = HGATP_MODE_SV32X4; -unsigned long kvm_riscv_gstage_pgd_levels __ro_after_init = 2; +unsigned long kvm_riscv_gstage_max_pgd_levels __ro_after_init = 2; #endif #define gstage_pte_leaf(__ptep) \ (pte_val(*(__ptep)) & (_PAGE_READ | _PAGE_WRITE | _PAGE_EXEC)) -static inline unsigned long gstage_pte_index(gpa_t addr, u32 level) +static inline unsigned long gstage_pte_index(struct kvm_gstage *gstage, + gpa_t addr, u32 level) { unsigned long mask; unsigned long shift = HGATP_PAGE_SHIFT + (kvm_riscv_gstage_index_bits * level); - if (level == (kvm_riscv_gstage_pgd_levels - 1)) + if (level == gstage->kvm->arch.kvm_riscv_gstage_pgd_levels - 1) mask = (PTRS_PER_PTE * (1UL << kvm_riscv_gstage_pgd_xbits)) - 1; else mask = PTRS_PER_PTE - 1; @@ -40,12 +39,13 @@ static inline unsigned long gstage_pte_page_vaddr(pte_t pte) return (unsigned long)pfn_to_virt(__page_val_to_pfn(pte_val(pte))); } -static int gstage_page_size_to_level(unsigned long page_size, u32 *out_level) +static int gstage_page_size_to_level(struct kvm_gstage *gstage, unsigned long page_size, + u32 *out_level) { u32 i; unsigned long psz = 1UL << 12; - for (i = 0; i < kvm_riscv_gstage_pgd_levels; i++) { + for (i = 0; i < gstage->kvm->arch.kvm_riscv_gstage_pgd_levels; i++) { if (page_size == (psz << (i * kvm_riscv_gstage_index_bits))) { *out_level = i; return 0; @@ -55,21 +55,23 @@ static int gstage_page_size_to_level(unsigned long page_size, u32 *out_level) return -EINVAL; } -static int gstage_level_to_page_order(u32 level, unsigned long *out_pgorder) +static int gstage_level_to_page_order(struct kvm_gstage *gstage, u32 level, + unsigned long *out_pgorder) { - if (kvm_riscv_gstage_pgd_levels < level) + if (gstage->kvm->arch.kvm_riscv_gstage_pgd_levels < level) return -EINVAL; *out_pgorder = 12 + (level * kvm_riscv_gstage_index_bits); return 0; } -static int gstage_level_to_page_size(u32 level, unsigned long *out_pgsize) +static int gstage_level_to_page_size(struct kvm_gstage *gstage, u32 level, + unsigned long *out_pgsize) { int rc; unsigned long page_order = PAGE_SHIFT; - rc = gstage_level_to_page_order(level, &page_order); + rc = gstage_level_to_page_order(gstage, level, &page_order); if (rc) return rc; @@ -81,11 +83,11 @@ bool kvm_riscv_gstage_get_leaf(struct kvm_gstage *gstage, gpa_t addr, pte_t **ptepp, u32 *ptep_level) { pte_t *ptep; - u32 current_level = kvm_riscv_gstage_pgd_levels - 1; + u32 current_level = gstage->kvm->arch.kvm_riscv_gstage_pgd_levels - 1; *ptep_level = current_level; ptep = (pte_t *)gstage->pgd; - ptep = &ptep[gstage_pte_index(addr, current_level)]; + ptep = &ptep[gstage_pte_index(gstage, addr, current_level)]; while (ptep && pte_val(ptep_get(ptep))) { if (gstage_pte_leaf(ptep)) { *ptep_level = current_level; @@ -97,7 +99,7 @@ bool kvm_riscv_gstage_get_leaf(struct kvm_gstage *gstage, gpa_t addr, current_level--; *ptep_level = current_level; ptep = (pte_t *)gstage_pte_page_vaddr(ptep_get(ptep)); - ptep = &ptep[gstage_pte_index(addr, current_level)]; + ptep = &ptep[gstage_pte_index(gstage, addr, current_level)]; } else { ptep = NULL; } @@ -110,7 +112,7 @@ static void gstage_tlb_flush(struct kvm_gstage *gstage, u32 level, gpa_t addr) { unsigned long order = PAGE_SHIFT; - if (gstage_level_to_page_order(level, &order)) + if (gstage_level_to_page_order(gstage, level, &order)) return; addr &= ~(BIT(order) - 1); @@ -125,9 +127,9 @@ int kvm_riscv_gstage_set_pte(struct kvm_gstage *gstage, struct kvm_mmu_memory_cache *pcache, const struct kvm_gstage_mapping *map) { - u32 current_level = kvm_riscv_gstage_pgd_levels - 1; + u32 current_level = gstage->kvm->arch.kvm_riscv_gstage_pgd_levels - 1; pte_t *next_ptep = (pte_t *)gstage->pgd; - pte_t *ptep = &next_ptep[gstage_pte_index(map->addr, current_level)]; + pte_t *ptep = &next_ptep[gstage_pte_index(gstage, map->addr, current_level)]; if (current_level < map->level) return -EINVAL; @@ -151,7 +153,7 @@ int kvm_riscv_gstage_set_pte(struct kvm_gstage *gstage, } current_level--; - ptep = &next_ptep[gstage_pte_index(map->addr, current_level)]; + ptep = &next_ptep[gstage_pte_index(gstage, map->addr, current_level)]; } if (pte_val(*ptep) != pte_val(map->pte)) { @@ -175,7 +177,7 @@ int kvm_riscv_gstage_map_page(struct kvm_gstage *gstage, out_map->addr = gpa; out_map->level = 0; - ret = gstage_page_size_to_level(page_size, &out_map->level); + ret = gstage_page_size_to_level(gstage, page_size, &out_map->level); if (ret) return ret; @@ -217,7 +219,7 @@ void kvm_riscv_gstage_op_pte(struct kvm_gstage *gstage, gpa_t addr, u32 next_ptep_level; unsigned long next_page_size, page_size; - ret = gstage_level_to_page_size(ptep_level, &page_size); + ret = gstage_level_to_page_size(gstage, ptep_level, &page_size); if (ret) return; @@ -229,7 +231,7 @@ void kvm_riscv_gstage_op_pte(struct kvm_gstage *gstage, gpa_t addr, if (ptep_level && !gstage_pte_leaf(ptep)) { next_ptep = (pte_t *)gstage_pte_page_vaddr(ptep_get(ptep)); next_ptep_level = ptep_level - 1; - ret = gstage_level_to_page_size(next_ptep_level, &next_page_size); + ret = gstage_level_to_page_size(gstage, next_ptep_level, &next_page_size); if (ret) return; @@ -263,7 +265,7 @@ void kvm_riscv_gstage_unmap_range(struct kvm_gstage *gstage, while (addr < end) { found_leaf = kvm_riscv_gstage_get_leaf(gstage, addr, &ptep, &ptep_level); - ret = gstage_level_to_page_size(ptep_level, &page_size); + ret = gstage_level_to_page_size(gstage, ptep_level, &page_size); if (ret) break; @@ -297,7 +299,7 @@ void kvm_riscv_gstage_wp_range(struct kvm_gstage *gstage, gpa_t start, gpa_t end while (addr < end) { found_leaf = kvm_riscv_gstage_get_leaf(gstage, addr, &ptep, &ptep_level); - ret = gstage_level_to_page_size(ptep_level, &page_size); + ret = gstage_level_to_page_size(gstage, ptep_level, &page_size); if (ret) break; @@ -319,39 +321,34 @@ void __init kvm_riscv_gstage_mode_detect(void) /* Try Sv57x4 G-stage mode */ csr_write(CSR_HGATP, HGATP_MODE_SV57X4 << HGATP_MODE_SHIFT); if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV57X4) { - kvm_riscv_gstage_mode = HGATP_MODE_SV57X4; - kvm_riscv_gstage_pgd_levels = 5; + kvm_riscv_gstage_max_pgd_levels = 5; goto done; } /* Try Sv48x4 G-stage mode */ csr_write(CSR_HGATP, HGATP_MODE_SV48X4 << HGATP_MODE_SHIFT); if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV48X4) { - kvm_riscv_gstage_mode = HGATP_MODE_SV48X4; - kvm_riscv_gstage_pgd_levels = 4; + kvm_riscv_gstage_max_pgd_levels = 4; goto done; } /* Try Sv39x4 G-stage mode */ csr_write(CSR_HGATP, HGATP_MODE_SV39X4 << HGATP_MODE_SHIFT); if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV39X4) { - kvm_riscv_gstage_mode = HGATP_MODE_SV39X4; - kvm_riscv_gstage_pgd_levels = 3; + kvm_riscv_gstage_max_pgd_levels = 3; goto done; } #else /* CONFIG_32BIT */ /* Try Sv32x4 G-stage mode */ csr_write(CSR_HGATP, HGATP_MODE_SV32X4 << HGATP_MODE_SHIFT); if ((csr_read(CSR_HGATP) >> HGATP_MODE_SHIFT) == HGATP_MODE_SV32X4) { - kvm_riscv_gstage_mode = HGATP_MODE_SV32X4; - kvm_riscv_gstage_pgd_levels = 2; + kvm_riscv_gstage_max_pgd_levels = 2; goto done; } #endif /* KVM depends on !HGATP_MODE_OFF */ - kvm_riscv_gstage_mode = HGATP_MODE_OFF; - kvm_riscv_gstage_pgd_levels = 0; + kvm_riscv_gstage_max_pgd_levels = 0; done: csr_write(CSR_HGATP, 0); diff --git a/arch/riscv/kvm/main.c b/arch/riscv/kvm/main.c index 45536af521f0..786c0025e2c3 100644 --- a/arch/riscv/kvm/main.c +++ b/arch/riscv/kvm/main.c @@ -105,17 +105,17 @@ static int __init riscv_kvm_init(void) return rc; kvm_riscv_gstage_mode_detect(); - switch (kvm_riscv_gstage_mode) { - case HGATP_MODE_SV32X4: + switch (kvm_riscv_gstage_max_pgd_levels) { + case 2: str = "Sv32x4"; break; - case HGATP_MODE_SV39X4: + case 3: str = "Sv39x4"; break; - case HGATP_MODE_SV48X4: + case 4: str = "Sv48x4"; break; - case HGATP_MODE_SV57X4: + case 5: str = "Sv57x4"; break; default: @@ -164,7 +164,7 @@ static int __init riscv_kvm_init(void) (rc) ? slist : "no features"); } - kvm_info("using %s G-stage page table format\n", str); + kvm_info("Max G-stage page table format %s\n", str); kvm_info("VMID %ld bits available\n", kvm_riscv_gstage_vmid_bits()); diff --git a/arch/riscv/kvm/mmu.c b/arch/riscv/kvm/mmu.c index 4ab06697bfc0..458a2ed98818 100644 --- a/arch/riscv/kvm/mmu.c +++ b/arch/riscv/kvm/mmu.c @@ -67,7 +67,7 @@ int kvm_riscv_mmu_ioremap(struct kvm *kvm, gpa_t gpa, phys_addr_t hpa, if (!writable) map.pte = pte_wrprotect(map.pte); - ret = kvm_mmu_topup_memory_cache(&pcache, kvm_riscv_gstage_pgd_levels); + ret = kvm_mmu_topup_memory_cache(&pcache, kvm->arch.kvm_riscv_gstage_pgd_levels); if (ret) goto out; @@ -186,7 +186,7 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm, * space addressable by the KVM guest GPA space. */ if ((new->base_gfn + new->npages) >= - (kvm_riscv_gstage_gpa_size >> PAGE_SHIFT)) + kvm_riscv_gstage_gpa_size(&kvm->arch) >> PAGE_SHIFT) return -EFAULT; hva = new->userspace_addr; @@ -332,7 +332,7 @@ int kvm_riscv_mmu_map(struct kvm_vcpu *vcpu, struct kvm_memory_slot *memslot, memset(out_map, 0, sizeof(*out_map)); /* We need minimum second+third level pages */ - ret = kvm_mmu_topup_memory_cache(pcache, kvm_riscv_gstage_pgd_levels); + ret = kvm_mmu_topup_memory_cache(pcache, kvm->arch.kvm_riscv_gstage_pgd_levels); if (ret) { kvm_err("Failed to topup G-stage cache\n"); return ret; @@ -431,6 +431,7 @@ int kvm_riscv_mmu_alloc_pgd(struct kvm *kvm) return -ENOMEM; kvm->arch.pgd = page_to_virt(pgd_page); kvm->arch.pgd_phys = page_to_phys(pgd_page); + kvm->arch.kvm_riscv_gstage_pgd_levels = kvm_riscv_gstage_max_pgd_levels; return 0; } @@ -446,10 +447,12 @@ void kvm_riscv_mmu_free_pgd(struct kvm *kvm) gstage.flags = 0; gstage.vmid = READ_ONCE(kvm->arch.vmid.vmid); gstage.pgd = kvm->arch.pgd; - kvm_riscv_gstage_unmap_range(&gstage, 0UL, kvm_riscv_gstage_gpa_size, false); + kvm_riscv_gstage_unmap_range(&gstage, 0UL, + kvm_riscv_gstage_gpa_size(&kvm->arch), false); pgd = READ_ONCE(kvm->arch.pgd); kvm->arch.pgd = NULL; kvm->arch.pgd_phys = 0; + kvm->arch.kvm_riscv_gstage_pgd_levels = 0; } spin_unlock(&kvm->mmu_lock); @@ -459,11 +462,12 @@ void kvm_riscv_mmu_free_pgd(struct kvm *kvm) void kvm_riscv_mmu_update_hgatp(struct kvm_vcpu *vcpu) { - unsigned long hgatp = kvm_riscv_gstage_mode << HGATP_MODE_SHIFT; - struct kvm_arch *k = &vcpu->kvm->arch; + struct kvm_arch *ka = &vcpu->kvm->arch; + unsigned long hgatp = kvm_riscv_gstage_mode(ka->kvm_riscv_gstage_pgd_levels) + << HGATP_MODE_SHIFT; - hgatp |= (READ_ONCE(k->vmid.vmid) << HGATP_VMID_SHIFT) & HGATP_VMID; - hgatp |= (k->pgd_phys >> PAGE_SHIFT) & HGATP_PPN; + hgatp |= (READ_ONCE(ka->vmid.vmid) << HGATP_VMID_SHIFT) & HGATP_VMID; + hgatp |= (ka->pgd_phys >> PAGE_SHIFT) & HGATP_PPN; ncsr_write(CSR_HGATP, hgatp); diff --git a/arch/riscv/kvm/vm.c b/arch/riscv/kvm/vm.c index 66d91ae6e9b2..4b2156df40fc 100644 --- a/arch/riscv/kvm/vm.c +++ b/arch/riscv/kvm/vm.c @@ -200,7 +200,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) r = KVM_USER_MEM_SLOTS; break; case KVM_CAP_VM_GPA_BITS: - r = kvm_riscv_gstage_gpa_bits; + r = kvm_riscv_gstage_gpa_bits(&kvm->arch); break; default: r = 0; diff --git a/arch/riscv/kvm/vmid.c b/arch/riscv/kvm/vmid.c index cf34d448289d..c15bdb1dd8be 100644 --- a/arch/riscv/kvm/vmid.c +++ b/arch/riscv/kvm/vmid.c @@ -26,7 +26,8 @@ static DEFINE_SPINLOCK(vmid_lock); void __init kvm_riscv_gstage_vmid_detect(void) { /* Figure-out number of VMID bits in HW */ - csr_write(CSR_HGATP, (kvm_riscv_gstage_mode << HGATP_MODE_SHIFT) | HGATP_VMID); + csr_write(CSR_HGATP, (kvm_riscv_gstage_mode(kvm_riscv_gstage_max_pgd_levels) << + HGATP_MODE_SHIFT) | HGATP_VMID); vmid_bits = csr_read(CSR_HGATP); vmid_bits = (vmid_bits & HGATP_VMID) >> HGATP_VMID_SHIFT; vmid_bits = fls_long(vmid_bits); -- 2.50.1
{ "author": "fangyu.yu@linux.alibaba.com", "date": "Mon, 2 Feb 2026 22:07:13 +0800", "thread_id": "ftdnjnfvmybiskej3txd23mqn3jpjdewmgjxjbap3y4ekj4h4m@d74ihtpclyps.mbox.gz" }
lkml
[PATCH v4 0/4] Support runtime configuration for per-VM's HGATP mode
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Currently, RISC-V KVM hardcodes the G-stage page table format (HGATP mode) to the maximum mode detected at boot time (e.g., SV57x4 if supported). but often such a wide GPA is unnecessary, just as a host sometimes doesn't need sv57. This patch introduces per-VM configurability of the G-stage mode via a new KVM capability: KVM_CAP_RISCV_SET_HGATP_MODE. User-space can now explicitly request a specific HGATP mode (SV39x4, SV48x4, or SV57x4 on 64-bit) during VM creation. --- Changes in v4: - Extend kvm_riscv_gstage_mode_detect() to probe all HGATP.MODE values supported by the host and record them in a bitmask. - Treat unexpected pgd_levels in kvm_riscv_gstage_mode() as an internal error (e.g. WARN_ON_ONCE())(per Radim). - Move kvm_riscv_gstage_gpa_bits() and kvm_riscv_gstage_gpa_size() to header as static inline helpers(per Radim). - Drop gstage_mode_user_initialized and Remove the kvm_debug() message from KVM_CAP_RISCV_SET_HGATP_MODE(per Radim). - Link to v3: https://lore.kernel.org/linux-riscv/20260125150450.27068-1-fangyu.yu@linux.alibaba.com/ --- Changes in v3: - Reworked the patch formatting (per Drew). - Dropped kvm->arch.kvm_riscv_gstage_mode and derive HGATP.MODE from kvm_riscv_gstage_pgd_levels via a helper, avoiding redundant per-VM state(per Drew). - Removed kvm_riscv_gstage_max_mode and keep only kvm_riscv_gstage_max_pgd_levels for host capability detection(per Drew). - Other initialization and return value issues(per Drew). - Enforce that KVM_CAP_RISCV_SET_HGATP_MODE can only be enabled before any vCPUs are created by rejecting the ioctl once kvm->created_vcpus is non-zero(per Radim). - Add a memslot safety check and reject the capability unless kvm_are_all_memslots_empty(kvm) is true, ensuring the G-stage format is not changed after any memslots have been installed(per Radim). - Link to v2: https://lore.kernel.org/linux-riscv/20260105143232.76715-1-fangyu.yu@linux.alibaba.com/ Fangyu Yu (4): RISC-V: KVM: Support runtime configuration for per-VM's HGATP mode RISC-V: KVM: Detect and expose supported HGATP G-stage modes RISC-V: KVM: add KVM_CAP_RISCV_SET_HGATP_MODE RISC-V: KVM: Define HGATP mode bits for KVM_CAP_RISCV_SET_HGATP_MODE Documentation/virt/kvm/api.rst | 27 ++++++++ arch/riscv/include/asm/kvm_gstage.h | 57 ++++++++++++++--- arch/riscv/include/asm/kvm_host.h | 19 ++++++ arch/riscv/include/uapi/asm/kvm.h | 3 + arch/riscv/kvm/gstage.c | 98 ++++++++++++++--------------- arch/riscv/kvm/main.c | 12 ++-- arch/riscv/kvm/mmu.c | 20 +++--- arch/riscv/kvm/vm.c | 22 ++++++- arch/riscv/kvm/vmid.c | 3 +- include/uapi/linux/kvm.h | 1 + 10 files changed, 188 insertions(+), 74 deletions(-) -- 2.50.1
On Mon, Feb 02, 2026 at 10:07:14PM +0800, fangyu.yu@linux.alibaba.com wrote: These should be defined in the UAPI, as I see the last patch of the series does. No need to define them twice. It seems like we're going out of our way to only provide the capability for rv64. While the cap isn't useful for rv32, having #ifdefs in KVM and additional paths in kvm userspace is probably worse than just having a useless HGATP_MODE_SV32X4_BIT that rv32 userspace can set. Can use kvm_riscv_hgatp_mode_supported() here too. Thanks, drew
{ "author": "Andrew Jones <andrew.jones@oss.qualcomm.com>", "date": "Mon, 2 Feb 2026 12:45:31 -0600", "thread_id": "ftdnjnfvmybiskej3txd23mqn3jpjdewmgjxjbap3y4ekj4h4m@d74ihtpclyps.mbox.gz" }
lkml
[PATCH v4 0/4] Support runtime configuration for per-VM's HGATP mode
From: Fangyu Yu <fangyu.yu@linux.alibaba.com> Currently, RISC-V KVM hardcodes the G-stage page table format (HGATP mode) to the maximum mode detected at boot time (e.g., SV57x4 if supported). but often such a wide GPA is unnecessary, just as a host sometimes doesn't need sv57. This patch introduces per-VM configurability of the G-stage mode via a new KVM capability: KVM_CAP_RISCV_SET_HGATP_MODE. User-space can now explicitly request a specific HGATP mode (SV39x4, SV48x4, or SV57x4 on 64-bit) during VM creation. --- Changes in v4: - Extend kvm_riscv_gstage_mode_detect() to probe all HGATP.MODE values supported by the host and record them in a bitmask. - Treat unexpected pgd_levels in kvm_riscv_gstage_mode() as an internal error (e.g. WARN_ON_ONCE())(per Radim). - Move kvm_riscv_gstage_gpa_bits() and kvm_riscv_gstage_gpa_size() to header as static inline helpers(per Radim). - Drop gstage_mode_user_initialized and Remove the kvm_debug() message from KVM_CAP_RISCV_SET_HGATP_MODE(per Radim). - Link to v3: https://lore.kernel.org/linux-riscv/20260125150450.27068-1-fangyu.yu@linux.alibaba.com/ --- Changes in v3: - Reworked the patch formatting (per Drew). - Dropped kvm->arch.kvm_riscv_gstage_mode and derive HGATP.MODE from kvm_riscv_gstage_pgd_levels via a helper, avoiding redundant per-VM state(per Drew). - Removed kvm_riscv_gstage_max_mode and keep only kvm_riscv_gstage_max_pgd_levels for host capability detection(per Drew). - Other initialization and return value issues(per Drew). - Enforce that KVM_CAP_RISCV_SET_HGATP_MODE can only be enabled before any vCPUs are created by rejecting the ioctl once kvm->created_vcpus is non-zero(per Radim). - Add a memslot safety check and reject the capability unless kvm_are_all_memslots_empty(kvm) is true, ensuring the G-stage format is not changed after any memslots have been installed(per Radim). - Link to v2: https://lore.kernel.org/linux-riscv/20260105143232.76715-1-fangyu.yu@linux.alibaba.com/ Fangyu Yu (4): RISC-V: KVM: Support runtime configuration for per-VM's HGATP mode RISC-V: KVM: Detect and expose supported HGATP G-stage modes RISC-V: KVM: add KVM_CAP_RISCV_SET_HGATP_MODE RISC-V: KVM: Define HGATP mode bits for KVM_CAP_RISCV_SET_HGATP_MODE Documentation/virt/kvm/api.rst | 27 ++++++++ arch/riscv/include/asm/kvm_gstage.h | 57 ++++++++++++++--- arch/riscv/include/asm/kvm_host.h | 19 ++++++ arch/riscv/include/uapi/asm/kvm.h | 3 + arch/riscv/kvm/gstage.c | 98 ++++++++++++++--------------- arch/riscv/kvm/main.c | 12 ++-- arch/riscv/kvm/mmu.c | 20 +++--- arch/riscv/kvm/vm.c | 22 ++++++- arch/riscv/kvm/vmid.c | 3 +- include/uapi/linux/kvm.h | 1 + 10 files changed, 188 insertions(+), 74 deletions(-) -- 2.50.1
On Mon, Feb 02, 2026 at 10:07:15PM +0800, fangyu.yu@linux.alibaba.com wrote: If we only want this to work for rv64, then we should write riscv64 here, but, as I said in the last patch, I think we can just support rv32 too by supporting its one and only mode. We should write what happens if the capability (setting the mode) is not done, i.e. what's the default mode. Could write something along the lines of the UAPI having the bit definitions rather than duplicating that information here. Thanks, drew
{ "author": "Andrew Jones <andrew.jones@oss.qualcomm.com>", "date": "Mon, 2 Feb 2026 12:49:41 -0600", "thread_id": "ftdnjnfvmybiskej3txd23mqn3jpjdewmgjxjbap3y4ekj4h4m@d74ihtpclyps.mbox.gz" }
lkml
[PATCH bpf-next] ftrace: Fix direct_functions leak in update_ftrace_direct_del
Alexei reported memory leak in update_ftrace_direct_del. We miss cleanup of the replaced direct_functions in the success path in update_ftrace_direct_del, adding that. Fixes: 8d2c1233f371 ("ftrace: Add update_ftrace_direct_del function") Reported-by: Alexei Starovoitov <alexei.starovoitov@gmail.com> Closes: https://lore.kernel.org/bpf/aX_BxG5EJTJdCMT9@krava/T/#m7c13f5a95f862ed7ab78e905fbb678d635306a0c Signed-off-by: Jiri Olsa <jolsa@kernel.org> --- kernel/trace/ftrace.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/trace/ftrace.c b/kernel/trace/ftrace.c index 8574932e66b6..b12dbd93ae1c 100644 --- a/kernel/trace/ftrace.c +++ b/kernel/trace/ftrace.c @@ -6537,6 +6537,7 @@ int update_ftrace_direct_del(struct ftrace_ops *ops, struct ftrace_hash *hash) /* free the new_direct_functions */ old_direct_functions = new_direct_functions; } else { + old_direct_functions = direct_functions; rcu_assign_pointer(direct_functions, new_direct_functions); } -- 2.52.0
On Mon, 2 Feb 2026 08:58:49 +0100 Jiri Olsa <jolsa@kernel.org> wrote: Acked-by: Steven Rostedt (Google) <rostedt@goodmis.org> -- Steve
{ "author": "Steven Rostedt <rostedt@kernel.org>", "date": "Mon, 2 Feb 2026 09:55:15 -0500", "thread_id": "202602030237.Ze7K6UoS-lkp@intel.com.mbox.gz" }
lkml
[PATCH bpf-next] ftrace: Fix direct_functions leak in update_ftrace_direct_del
Alexei reported memory leak in update_ftrace_direct_del. We miss cleanup of the replaced direct_functions in the success path in update_ftrace_direct_del, adding that. Fixes: 8d2c1233f371 ("ftrace: Add update_ftrace_direct_del function") Reported-by: Alexei Starovoitov <alexei.starovoitov@gmail.com> Closes: https://lore.kernel.org/bpf/aX_BxG5EJTJdCMT9@krava/T/#m7c13f5a95f862ed7ab78e905fbb678d635306a0c Signed-off-by: Jiri Olsa <jolsa@kernel.org> --- kernel/trace/ftrace.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/trace/ftrace.c b/kernel/trace/ftrace.c index 8574932e66b6..b12dbd93ae1c 100644 --- a/kernel/trace/ftrace.c +++ b/kernel/trace/ftrace.c @@ -6537,6 +6537,7 @@ int update_ftrace_direct_del(struct ftrace_ops *ops, struct ftrace_hash *hash) /* free the new_direct_functions */ old_direct_functions = new_direct_functions; } else { + old_direct_functions = direct_functions; rcu_assign_pointer(direct_functions, new_direct_functions); } -- 2.52.0
Hello: This patch was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Mon, 2 Feb 2026 08:58:49 +0100 you wrote: Here is the summary with links: - [bpf-next] ftrace: Fix direct_functions leak in update_ftrace_direct_del https://git.kernel.org/bpf/bpf-next/c/6b95cc562de2 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
{ "author": "patchwork-bot+netdevbpf@kernel.org", "date": "Mon, 02 Feb 2026 16:00:04 +0000", "thread_id": "202602030237.Ze7K6UoS-lkp@intel.com.mbox.gz" }
lkml
[PATCH bpf-next] ftrace: Fix direct_functions leak in update_ftrace_direct_del
Alexei reported memory leak in update_ftrace_direct_del. We miss cleanup of the replaced direct_functions in the success path in update_ftrace_direct_del, adding that. Fixes: 8d2c1233f371 ("ftrace: Add update_ftrace_direct_del function") Reported-by: Alexei Starovoitov <alexei.starovoitov@gmail.com> Closes: https://lore.kernel.org/bpf/aX_BxG5EJTJdCMT9@krava/T/#m7c13f5a95f862ed7ab78e905fbb678d635306a0c Signed-off-by: Jiri Olsa <jolsa@kernel.org> --- kernel/trace/ftrace.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/trace/ftrace.c b/kernel/trace/ftrace.c index 8574932e66b6..b12dbd93ae1c 100644 --- a/kernel/trace/ftrace.c +++ b/kernel/trace/ftrace.c @@ -6537,6 +6537,7 @@ int update_ftrace_direct_del(struct ftrace_ops *ops, struct ftrace_hash *hash) /* free the new_direct_functions */ old_direct_functions = new_direct_functions; } else { + old_direct_functions = direct_functions; rcu_assign_pointer(direct_functions, new_direct_functions); } -- 2.52.0
Hi Jiri, kernel test robot noticed the following build warnings: [auto build test WARNING on bpf-next/master] url: https://github.com/intel-lab-lkp/linux/commits/Jiri-Olsa/ftrace-Fix-direct_functions-leak-in-update_ftrace_direct_del/20260202-160850 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master patch link: https://lore.kernel.org/r/20260202075849.1684369-1-jolsa%40kernel.org patch subject: [PATCH bpf-next] ftrace: Fix direct_functions leak in update_ftrace_direct_del config: i386-randconfig-r123-20260202 (https://download.01.org/0day-ci/archive/20260203/202602030237.Ze7K6UoS-lkp@intel.com/config) compiler: gcc-14 (Debian 14.2.0-19) 14.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260203/202602030237.Ze7K6UoS-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202602030237.Ze7K6UoS-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) kernel/trace/ftrace.c:1094:43: sparse: got struct ftrace_hash * kernel/trace/ftrace.c:1326:40: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:1326:40: sparse: expected struct ftrace_hash *hash kernel/trace/ftrace.c:1326:40: sparse: got struct ftrace_hash [noderef] __rcu *filter_hash kernel/trace/ftrace.c:1327:40: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:1327:40: sparse: expected struct ftrace_hash *hash kernel/trace/ftrace.c:1327:40: sparse: got struct ftrace_hash [noderef] __rcu *notrace_hash kernel/trace/ftrace.c:1328:37: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:1328:37: sparse: expected struct ftrace_hash [noderef] __rcu *filter_hash kernel/trace/ftrace.c:1328:37: sparse: got struct ftrace_hash * kernel/trace/ftrace.c:1329:38: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *notrace_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:1329:38: sparse: expected struct ftrace_hash [noderef] __rcu *notrace_hash kernel/trace/ftrace.c:1329:38: sparse: got struct ftrace_hash * kernel/trace/ftrace.c:2141:54: sparse: sparse: incorrect type in initializer (different address spaces) @@ expected struct ftrace_hash *old_hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:2141:54: sparse: expected struct ftrace_hash *old_hash kernel/trace/ftrace.c:2141:54: sparse: got struct ftrace_hash [noderef] __rcu *filter_hash kernel/trace/ftrace.c:1533:9: sparse: sparse: incompatible types in comparison expression (different address spaces): kernel/trace/ftrace.c:1533:9: sparse: struct ftrace_hash [noderef] __rcu * kernel/trace/ftrace.c:1533:9: sparse: struct ftrace_hash * kernel/trace/ftrace.c:1549:39: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:1550:40: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:1551:40: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:1552:42: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:1723:18: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_ops *ops @@ got struct ftrace_ops [noderef] __rcu *[addressable] [toplevel] ftrace_ops_list @@ kernel/trace/ftrace.c:1724:43: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_ops *ops @@ got struct ftrace_ops [noderef] __rcu *next @@ kernel/trace/ftrace.c:1785:14: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:1786:22: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *notrace_hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:2119:50: sparse: sparse: incorrect type in initializer (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:2130:50: sparse: sparse: incorrect type in initializer (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:2613:53: sparse: sparse: incorrect type in initializer (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *static [toplevel] direct_functions @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:2624:36: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *static [toplevel] direct_functions @@ kernel/trace/ftrace.c:3425:51: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *B @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3426:66: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:3432:52: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *B @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3433:66: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:3446:41: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3447:51: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *src @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3450:52: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *notrace_hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3454:52: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *src @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3469:39: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3470:42: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3478:17: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3484:81: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3488:54: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *notrace_hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3490:56: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *new_hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3520:60: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *new_hash1 @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3521:49: sparse: sparse: incorrect type in argument 3 (different address spaces) @@ expected struct ftrace_hash *new_hash2 @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3560:45: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3562:46: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *notrace_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3564:48: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3566:49: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *notrace_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3572:17: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3573:17: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3579:34: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *save_filter_hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3580:35: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *save_notrace_hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3582:45: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash *[addressable] filter_hash @@ kernel/trace/ftrace.c:3583:46: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *notrace_hash @@ got struct ftrace_hash *[addressable] notrace_hash @@ kernel/trace/ftrace.c:3588:53: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash *save_filter_hash @@ kernel/trace/ftrace.c:3589:54: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *notrace_hash @@ got struct ftrace_hash *save_notrace_hash @@ kernel/trace/ftrace.c:3636:31: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3637:32: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *notrace_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3652:59: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *[addressable] filter_hash @@ kernel/trace/ftrace.c:3653:59: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *[addressable] notrace_hash @@ kernel/trace/ftrace.c:3658:43: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *[addressable] filter_hash @@ kernel/trace/ftrace.c:3659:43: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *[addressable] notrace_hash @@ kernel/trace/ftrace.c:3661:39: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *[addressable] filter_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3662:40: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *[addressable] notrace_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3704:48: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3705:48: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3706:45: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3707:46: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *notrace_hash @@ got struct ftrace_hash * @@ kernel/trace/ftrace.c:3993:14: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:4010:22: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:4699:22: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:4702:22: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:5113:27: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:5115:27: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:5495:19: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:5639:19: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:5645:34: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash *[assigned] old_hash @@ kernel/trace/ftrace.c:5910:27: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:5912:27: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:5993:50: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *static [toplevel] direct_functions @@ kernel/trace/ftrace.c:5996:51: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *static [toplevel] direct_functions @@ kernel/trace/ftrace.c:6012:50: sparse: sparse: incorrect type in initializer (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:6056:14: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:6106:19: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *free_hash @@ got struct ftrace_hash [noderef] __rcu *static [toplevel] direct_functions @@ kernel/trace/ftrace.c:6171:50: sparse: sparse: incorrect type in initializer (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:6209:52: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *static [addressable] [assigned] [toplevel] direct_functions @@ kernel/trace/ftrace.c:6357:48: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *static [addressable] [assigned] [toplevel] direct_functions @@ kernel/trace/ftrace.c:6362:25: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *old_filter_hash @@ got struct ftrace_hash [noderef] __rcu * @@ kernel/trace/ftrace.c:6378:41: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *a @@ got struct ftrace_hash [noderef] __rcu *static [addressable] [assigned] [toplevel] direct_functions @@ kernel/trace/ftrace.c:6382:30: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *old_direct_functions @@ got struct ftrace_hash [noderef] __rcu *static [addressable] [assigned] [toplevel] direct_functions @@ kernel/trace/ftrace.c:6389:45: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash *[assigned] new_filter_hash @@ kernel/trace/ftrace.c:6394:53: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash [noderef] __rcu *filter_hash @@ got struct ftrace_hash *old_filter_hash @@ kernel/trace/ftrace.c:6489:30: sparse: sparse: incompatible types in comparison expression (different address spaces): kernel/trace/ftrace.c:6489:30: sparse: struct ftrace_hash [noderef] __rcu * kernel/trace/ftrace.c:6489:30: sparse: struct ftrace_hash * kernel/trace/ftrace.c:6503:50: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *static [addressable] [assigned] [toplevel] direct_functions @@ kernel/trace/ftrace.c:6514:41: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *a @@ got struct ftrace_hash [noderef] __rcu *static [addressable] [assigned] [toplevel] direct_functions @@ kernel/trace/ftrace.c:6589:30: sparse: sparse: incompatible types in comparison expression (different address spaces): kernel/trace/ftrace.c:6589:30: sparse: struct ftrace_hash [noderef] __rcu * kernel/trace/ftrace.c:6589:30: sparse: struct ftrace_hash * kernel/trace/ftrace.c:6969:35: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:6977:35: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash **orig_hash @@ got struct ftrace_hash [noderef] __rcu ** @@ kernel/trace/ftrace.c:7762:46: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:7763:47: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:7767:44: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:7785:18: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_ops *ops @@ got struct ftrace_ops [noderef] __rcu *[addressable] [toplevel] ftrace_ops_list @@ kernel/trace/ftrace.c:7785:66: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_ops *ops @@ got struct ftrace_ops [noderef] __rcu *next @@ kernel/trace/ftrace.c:7837:59: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:7838:59: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:8227:62: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:8228:62: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:8272:36: sparse: sparse: incompatible types in comparison expression (different address spaces): kernel/trace/ftrace.c:8272:36: sparse: struct ftrace_ops [noderef] __rcu * kernel/trace/ftrace.c:8272:36: sparse: struct ftrace_ops * kernel/trace/ftrace.c:9048:14: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:9048:14: sparse: expected struct ftrace_hash *hash kernel/trace/ftrace.c:9048:14: sparse: got struct ftrace_hash [noderef] __rcu *filter_hash kernel/trace/ftrace.c:9097:14: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:9097:14: sparse: expected struct ftrace_hash *hash kernel/trace/ftrace.c:9097:14: sparse: got struct ftrace_hash [noderef] __rcu *filter_hash kernel/trace/ftrace.c:230:20: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:230:20: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:230:20: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3480:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3480:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3480:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3480:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3480:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3480:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3514:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3514:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3514:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3514:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3514:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3514:29: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:6074:30: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:6083:21: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:6085:17: sparse: sparse: dereference of noderef expression kernel/trace/ftrace.c:3785:48: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *filter_hash @@ kernel/trace/ftrace.c:3785:48: sparse: expected struct ftrace_hash *hash kernel/trace/ftrace.c:3785:48: sparse: got struct ftrace_hash [noderef] __rcu *filter_hash kernel/trace/ftrace.c:3786:49: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct ftrace_hash *hash @@ got struct ftrace_hash [noderef] __rcu *notrace_hash @@ kernel/trace/ftrace.c:3786:49: sparse: expected struct ftrace_hash *hash kernel/trace/ftrace.c:3786:49: sparse: got struct ftrace_hash [noderef] __rcu *notrace_hash vim +6540 kernel/trace/ftrace.c 6457 6458 /** 6459 * update_ftrace_direct_del - Updates @ops by removing its direct 6460 * callers provided in @hash 6461 * @ops: The address of the struct ftrace_ops object 6462 * @hash: The address of the struct ftrace_hash object 6463 * 6464 * This is used to delete custom direct callers (ip -> addr) in 6465 * @ops specified via @hash. The @ops will be either unregistered 6466 * updated. 6467 * 6468 * Returns: zero on success. Non zero on error, which includes: 6469 * -EINVAL - The @hash is empty 6470 * -EINVAL - The @ops is not registered 6471 */ 6472 int update_ftrace_direct_del(struct ftrace_ops *ops, struct ftrace_hash *hash) 6473 { 6474 struct ftrace_hash *old_direct_functions = NULL; 6475 struct ftrace_hash *new_direct_functions; 6476 struct ftrace_hash *new_filter_hash = NULL; 6477 struct ftrace_hash *old_filter_hash; 6478 struct ftrace_func_entry *entry; 6479 struct ftrace_func_entry *del; 6480 unsigned long size; 6481 int err = -EINVAL; 6482 6483 if (!hash_count(hash)) 6484 return -EINVAL; 6485 if (check_direct_multi(ops)) 6486 return -EINVAL; 6487 if (!(ops->flags & FTRACE_OPS_FL_ENABLED)) 6488 return -EINVAL; 6489 if (direct_functions == EMPTY_HASH) 6490 return -EINVAL; 6491 6492 mutex_lock(&direct_mutex); 6493 6494 old_filter_hash = ops->func_hash ? ops->func_hash->filter_hash : NULL; 6495 6496 if (!hash_count(old_filter_hash)) 6497 goto out_unlock; 6498 6499 /* Make sure requested entries are already registered. */ 6500 size = 1 << hash->size_bits; 6501 for (int i = 0; i < size; i++) { 6502 hlist_for_each_entry(entry, &hash->buckets[i], hlist) { 6503 del = __ftrace_lookup_ip(direct_functions, entry->ip); 6504 if (!del || del->direct != entry->direct) 6505 goto out_unlock; 6506 } 6507 } 6508 6509 err = -ENOMEM; 6510 new_filter_hash = hash_sub(old_filter_hash, hash); 6511 if (!new_filter_hash) 6512 goto out_unlock; 6513 6514 new_direct_functions = hash_sub(direct_functions, hash); 6515 if (!new_direct_functions) 6516 goto out_unlock; 6517 6518 /* If there's nothing left, we need to unregister the ops. */ 6519 if (ftrace_hash_empty(new_filter_hash)) { 6520 err = unregister_ftrace_function(ops); 6521 if (!err) { 6522 /* cleanup for possible another register call */ 6523 ops->func = NULL; 6524 ops->trampoline = 0; 6525 ftrace_free_filter(ops); 6526 ops->func_hash->filter_hash = NULL; 6527 } 6528 } else { 6529 err = ftrace_update_ops(ops, new_filter_hash, EMPTY_HASH); 6530 /* 6531 * new_filter_hash is dup-ed, so we need to release it anyway, 6532 * old_filter_hash either stays on error or is already released 6533 */ 6534 } 6535 6536 if (err) { 6537 /* free the new_direct_functions */ 6538 old_direct_functions = new_direct_functions; 6539 } else { 6541 rcu_assign_pointer(direct_functions, new_direct_functions); 6542 } 6543 6544 out_unlock: 6545 mutex_unlock(&direct_mutex); 6546 6547 if (old_direct_functions && old_direct_functions != EMPTY_HASH) 6548 call_rcu_tasks(&old_direct_functions->rcu, register_ftrace_direct_cb); 6549 free_ftrace_hash(new_filter_hash); 6550 6551 return err; 6552 } 6553 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
{ "author": "kernel test robot <lkp@intel.com>", "date": "Tue, 3 Feb 2026 02:51:37 +0800", "thread_id": "202602030237.Ze7K6UoS-lkp@intel.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Avoid dereferencing pdev->dev.of_node again in rzv2h_icu_probe_common(). Reuse the already available local node pointer when mapping the ICU register space. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index da2bc43a0e12..20c0cd11ef25 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -570,7 +570,7 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no platform_set_drvdata(pdev, rzv2h_icu_data); - rzv2h_icu_data->base = devm_of_iomap(&pdev->dev, pdev->dev.of_node, 0, NULL); + rzv2h_icu_data->base = devm_of_iomap(&pdev->dev, node, 0, NULL); if (IS_ERR(rzv2h_icu_data->base)) return PTR_ERR(rzv2h_icu_data->base); -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:32 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Make use of dev_err_probe() to simplify rzv2h_icu_probe_common(). Keep dev_err() for -ENOMEM paths, as dev_err_probe() does not print for allocation failures, ensuring they remain visible in logs. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 32 ++++++++++------------------- 1 file changed, 11 insertions(+), 21 deletions(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 766b981cf3d8..4aa772ba1a1f 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -560,10 +560,8 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no int ret; parent_domain = irq_find_host(parent); - if (!parent_domain) { - dev_err(dev, "cannot find parent domain\n"); - return -ENODEV; - } + if (!parent_domain) + return dev_err_probe(dev, -ENODEV, "cannot find parent domain\n"); rzv2h_icu_data = devm_kzalloc(dev, sizeof(*rzv2h_icu_data), GFP_KERNEL); if (!rzv2h_icu_data) @@ -576,29 +574,21 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no return PTR_ERR(rzv2h_icu_data->base); ret = rzv2h_icu_parse_interrupts(rzv2h_icu_data, node); - if (ret) { - dev_err(dev, "cannot parse interrupts: %d\n", ret); - return ret; - } + if (ret) + return dev_err_probe(dev, ret, "cannot parse interrupts\n"); resetn = devm_reset_control_get_exclusive_deasserted(dev, NULL); - if (IS_ERR(resetn)) { - ret = PTR_ERR(resetn); - dev_err(dev, "failed to acquire deasserted reset: %d\n", ret); - return ret; - } + if (IS_ERR(resetn)) + return dev_err_probe(dev, PTR_ERR(resetn), + "failed to acquire deasserted reset\n"); ret = devm_pm_runtime_enable(dev); - if (ret < 0) { - dev_err(dev, "devm_pm_runtime_enable failed, %d\n", ret); - return ret; - } + if (ret < 0) + return dev_err_probe(dev, ret, "devm_pm_runtime_enable failed\n"); ret = pm_runtime_resume_and_get(dev); - if (ret < 0) { - dev_err(dev, "pm_runtime_resume_and_get failed: %d\n", ret); - return ret; - } + if (ret < 0) + return dev_err_probe(dev, ret, "pm_runtime_resume_and_get failed\n"); raw_spin_lock_init(&rzv2h_icu_data->lock); -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:34 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Use a local struct device pointer in rzv2h_icu_probe_common() to avoid repeated dereferencing of pdev->dev. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 29 +++++++++++++++-------------- 1 file changed, 15 insertions(+), 14 deletions(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 20c0cd11ef25..766b981cf3d8 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -555,57 +555,58 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no { struct irq_domain *irq_domain, *parent_domain; struct device_node *node = pdev->dev.of_node; + struct device *dev = &pdev->dev; struct reset_control *resetn; int ret; parent_domain = irq_find_host(parent); if (!parent_domain) { - dev_err(&pdev->dev, "cannot find parent domain\n"); + dev_err(dev, "cannot find parent domain\n"); return -ENODEV; } - rzv2h_icu_data = devm_kzalloc(&pdev->dev, sizeof(*rzv2h_icu_data), GFP_KERNEL); + rzv2h_icu_data = devm_kzalloc(dev, sizeof(*rzv2h_icu_data), GFP_KERNEL); if (!rzv2h_icu_data) return -ENOMEM; platform_set_drvdata(pdev, rzv2h_icu_data); - rzv2h_icu_data->base = devm_of_iomap(&pdev->dev, node, 0, NULL); + rzv2h_icu_data->base = devm_of_iomap(dev, node, 0, NULL); if (IS_ERR(rzv2h_icu_data->base)) return PTR_ERR(rzv2h_icu_data->base); ret = rzv2h_icu_parse_interrupts(rzv2h_icu_data, node); if (ret) { - dev_err(&pdev->dev, "cannot parse interrupts: %d\n", ret); + dev_err(dev, "cannot parse interrupts: %d\n", ret); return ret; } - resetn = devm_reset_control_get_exclusive_deasserted(&pdev->dev, NULL); + resetn = devm_reset_control_get_exclusive_deasserted(dev, NULL); if (IS_ERR(resetn)) { ret = PTR_ERR(resetn); - dev_err(&pdev->dev, "failed to acquire deasserted reset: %d\n", ret); + dev_err(dev, "failed to acquire deasserted reset: %d\n", ret); return ret; } - ret = devm_pm_runtime_enable(&pdev->dev); + ret = devm_pm_runtime_enable(dev); if (ret < 0) { - dev_err(&pdev->dev, "devm_pm_runtime_enable failed, %d\n", ret); + dev_err(dev, "devm_pm_runtime_enable failed, %d\n", ret); return ret; } - ret = pm_runtime_resume_and_get(&pdev->dev); + ret = pm_runtime_resume_and_get(dev); if (ret < 0) { - dev_err(&pdev->dev, "pm_runtime_resume_and_get failed: %d\n", ret); + dev_err(dev, "pm_runtime_resume_and_get failed: %d\n", ret); return ret; } raw_spin_lock_init(&rzv2h_icu_data->lock); irq_domain = irq_domain_create_hierarchy(parent_domain, 0, ICU_NUM_IRQ, - dev_fwnode(&pdev->dev), &rzv2h_icu_domain_ops, + dev_fwnode(dev), &rzv2h_icu_domain_ops, rzv2h_icu_data); if (!irq_domain) { - dev_err(&pdev->dev, "failed to add irq domain\n"); + dev_err(dev, "failed to add irq domain\n"); ret = -ENOMEM; goto pm_put; } @@ -616,12 +617,12 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no /* * coccicheck complains about a missing put_device call before returning, but it's a false - * positive. We still need &pdev->dev after successfully returning from this function. + * positive. We still need dev after successfully returning from this function. */ return 0; pm_put: - pm_runtime_put(&pdev->dev); + pm_runtime_put(dev); return ret; } -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:33 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> The Renesas RZ/V2H ICU provides a software interrupt register (ICU_SWINT) that allows software to explicitly assert interrupts toward individual CA55 cores. Writing BIT(n) to ICU_SWINT triggers the corresponding interrupt. Introduce a debug mechanism to trigger software interrupts on individual Cortex-A55 cores via the RZ/V2H ICU. The interface is gated behind CONFIG_DEBUG_FS and a module parameter to ensure it only exists when explicitly enabled. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 111 ++++++++++++++++++++++++++++ 1 file changed, 111 insertions(+) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 4aa772ba1a1f..7d3ce1d762f0 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -11,16 +11,23 @@ #include <linux/bitfield.h> #include <linux/cleanup.h> +#include <linux/cpu.h> +#include <linux/debugfs.h> #include <linux/err.h> +#include <linux/fs.h> #include <linux/io.h> #include <linux/irqchip.h> #include <linux/irqchip/irq-renesas-rzv2h.h> #include <linux/irqdomain.h> +#include <linux/kconfig.h> +#include <linux/kstrtox.h> +#include <linux/moduleparam.h> #include <linux/of_platform.h> #include <linux/pm_runtime.h> #include <linux/reset.h> #include <linux/spinlock.h> #include <linux/syscore_ops.h> +#include <linux/uaccess.h> /* DT "interrupts" indexes */ #define ICU_IRQ_START 1 @@ -40,6 +47,7 @@ #define ICU_TSCLR 0x24 #define ICU_TITSR(k) (0x28 + (k) * 4) #define ICU_TSSR(k) (0x30 + (k) * 4) +#define ICU_SWINT 0x130 #define ICU_DMkSELy(k, y) (0x420 + (k) * 0x20 + (y) * 4) #define ICU_DMACKSELk(k) (0x500 + (k) * 4) @@ -90,6 +98,13 @@ #define ICU_RZG3E_TSSEL_MAX_VAL 0x8c #define ICU_RZV2H_TSSEL_MAX_VAL 0x55 +#define ICU_SWINT_NUM 4 + +static bool enable_icu_debug; +module_param_named(debug, enable_icu_debug, bool, 0644); +MODULE_PARM_DESC(debug, + "Enable RZ/V2H ICU debug/diagnostic interrupts (default: false)"); + /** * struct rzv2h_irqc_reg_cache - registers cache (necessary for suspend/resume) * @nitsr: ICU_NITSR register @@ -550,6 +565,98 @@ static int rzv2h_icu_parse_interrupts(struct rzv2h_icu_priv *priv, struct device return 0; } +static irqreturn_t rzv2h_icu_swint_irq(int irq, void *data) +{ + u8 cpu = *(u8 *)data; + + pr_debug("SWINT interrupt for CA55 core %u\n", cpu); + return IRQ_HANDLED; +} + +static void rzv2h_icu_remove_debugfs(void *file) +{ + debugfs_remove(file); +} + +static ssize_t rzv2h_icu_swint_write(struct file *file, const char __user *ubuf, + size_t len, loff_t *ppos) +{ + struct rzv2h_icu_priv *priv = file->private_data; + unsigned long cpu; + char buf[32]; + int ret; + + len = min(len, sizeof(buf) - 1); + if (copy_from_user(buf, ubuf, len)) + return -EFAULT; + buf[len] = '\0'; + + ret = kstrtoul(strim(buf), 0, &cpu); + if (ret) + return ret; + + if (cpu >= ICU_SWINT_NUM || cpu >= nr_cpu_ids) + return -EINVAL; + + if (!cpu_online(cpu)) + return -ENODEV; + + writel(BIT(cpu), priv->base + ICU_SWINT); + return len; +} + +static const struct file_operations rzv2h_icu_swint_fops = { + .open = simple_open, + .write = rzv2h_icu_swint_write, + .llseek = noop_llseek, +}; + +static int rzv2h_icu_setup_debug_irqs(struct platform_device *pdev) +{ + static const u8 swint_idx[ICU_SWINT_NUM] = { 0, 1, 2, 3 }; + static const char * const rzv2h_swint_names[] = { + "int-ca55-0", "int-ca55-1", + "int-ca55-2", "int-ca55-3", + }; + struct device *dev = &pdev->dev; + struct dentry *dentry; + struct dentry *dir; + unsigned int i; + int icu_irq; + int ret; + + if (!IS_ENABLED(CONFIG_DEBUG_FS) || !enable_icu_debug) + return 0; + + dev_info(dev, "RZ/V2H ICU debug interrupts enabled\n"); + + for (i = 0; i < ICU_SWINT_NUM; i++) { + icu_irq = platform_get_irq_byname(pdev, rzv2h_swint_names[i]); + if (icu_irq < 0) + return dev_err_probe(dev, icu_irq, + "Failed to get %s IRQ\n", rzv2h_swint_names[i]); + ret = devm_request_irq(dev, icu_irq, rzv2h_icu_swint_irq, 0, dev_name(dev), + (void *)&swint_idx[i]); + if (ret) + return dev_err_probe(dev, ret, "Failed to request SWINT IRQ: %s\n", + rzv2h_swint_names[i]); + } + + dir = debugfs_create_dir("rzv2h_icu", NULL); + if (IS_ERR(dir)) + return PTR_ERR(dir); + + ret = devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dir); + if (ret) + return ret; + + dentry = debugfs_create_file("swint", 0200, dir, rzv2h_icu_data, &rzv2h_icu_swint_fops); + if (IS_ERR(dentry)) + return PTR_ERR(dentry); + + return devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dentry); +} + static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_node *parent, const struct rzv2h_hw_info *hw_info) { @@ -605,6 +712,10 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no register_syscore(&rzv2h_irqc_syscore); + ret = rzv2h_icu_setup_debug_irqs(pdev); + if (ret) + goto pm_put; + /* * coccicheck complains about a missing put_device call before returning, but it's a false * positive. We still need dev after successfully returning from this function. -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:35 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Handle the RZ/V2H ICU error interrupt to help diagnose latched bus, ECC RAM, and CA55/IP error conditions during bring-up and debugging. When debug support is enabled, register the error IRQ handler and provide a debugfs write interface to trigger pseudo error generation via ICU_SWPE for validation. Account for SoC differences in ECC RAM error register coverage so the handler only iterates over valid ECC status/clear banks, and route the RZ/V2N compatible to a probe path with the correct ECC range while keeping the existing RZ/V2H and RZ/G3E handling. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 141 +++++++++++++++++++++++++++- 1 file changed, 140 insertions(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 7d3ce1d762f0..6dc297220f05 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -21,6 +21,7 @@ #include <linux/irqdomain.h> #include <linux/kconfig.h> #include <linux/kstrtox.h> +#include <linux/minmax.h> #include <linux/moduleparam.h> #include <linux/of_platform.h> #include <linux/pm_runtime.h> @@ -47,7 +48,15 @@ #define ICU_TSCLR 0x24 #define ICU_TITSR(k) (0x28 + (k) * 4) #define ICU_TSSR(k) (0x30 + (k) * 4) +#define ICU_BEISR(k) (0x70 + (k) * 4) +#define ICU_BECLR(k) (0x80 + (k) * 4) +#define ICU_EREISR(k) (0x90 + (k) * 4) +#define ICU_ERCLR(k) (0xE0 + (k) * 4) #define ICU_SWINT 0x130 +#define ICU_ERINTA55CTL(k) (0x338 + (k) * 4) +#define ICU_ERINTA55CRL(k) (0x348 + (k) * 4) +#define ICU_ERINTA55MSK(k) (0x358 + (k) * 4) +#define ICU_SWPE 0x370 #define ICU_DMkSELy(k, y) (0x420 + (k) * 0x20 + (y) * 4) #define ICU_DMACKSELk(k) (0x500 + (k) * 4) @@ -99,6 +108,9 @@ #define ICU_RZV2H_TSSEL_MAX_VAL 0x55 #define ICU_SWINT_NUM 4 +#define ICU_SWPE_NUM 16 +#define ICU_NUM_BE 4 +#define ICU_NUM_A55ERR 4 static bool enable_icu_debug; module_param_named(debug, enable_icu_debug, bool, 0644); @@ -123,12 +135,16 @@ struct rzv2h_irqc_reg_cache { * @t_offs: TINT offset * @max_tssel: TSSEL max value * @field_width: TSSR field width + * @ecc_start: Start index of ECC RAM interrupts + * @ecc_end: End index of ECC RAM interrupts */ struct rzv2h_hw_info { const u8 *tssel_lut; u16 t_offs; u8 max_tssel; u8 field_width; + u8 ecc_start; + u8 ecc_end; }; /* DMAC */ @@ -565,6 +581,48 @@ static int rzv2h_icu_parse_interrupts(struct rzv2h_icu_priv *priv, struct device return 0; } +static irqreturn_t rzv2h_icu_error_irq(int irq, void *data) +{ + struct rzv2h_icu_priv *priv = data; + const struct rzv2h_hw_info *hw_info = priv->info; + void __iomem *base = priv->base; + unsigned int k; + u32 st; + + /* 1) Bus errors (BEISR0..3) */ + for (k = 0; k < ICU_NUM_BE; k++) { + st = readl(base + ICU_BEISR(k)); + if (!st) + continue; + + writel(st, base + ICU_BECLR(k)); + pr_debug("rzv2h-icu: BUS error k=%u status=0x%08x\n", k, st); + } + + /* 2) ECC RAM errors (EREISR0..X) */ + for (k = hw_info->ecc_start; k <= hw_info->ecc_end; k++) { + st = readl(base + ICU_EREISR(k)); + if (!st) + continue; + + writel(st, base + ICU_ERCLR(k)); + pr_debug("rzv2h-icu: ECC error k=%u status=0x%08x\n", k, st); + } + + /* 3) IP/CA55 error interrupt status (ERINTA55CTL0..3) */ + for (k = 0; k < ICU_NUM_A55ERR; k++) { + st = readl(base + ICU_ERINTA55CTL(k)); + if (!st) + continue; + + /* there is no relation with status bits so clear all the interrupts */ + writel(0xffffffff, base + ICU_ERINTA55CRL(k)); + pr_debug("rzv2h-icu: IP/CA55 error k=%u status=0x%08x\n", k, st); + } + + return IRQ_HANDLED; +} + static irqreturn_t rzv2h_icu_swint_irq(int irq, void *data) { u8 cpu = *(u8 *)data; @@ -611,13 +669,47 @@ static const struct file_operations rzv2h_icu_swint_fops = { .llseek = noop_llseek, }; +static ssize_t rzv2h_icu_swpe_write(struct file *file, + const char __user *ubuf, + size_t len, loff_t *ppos) +{ + struct rzv2h_icu_priv *priv = file->private_data; + unsigned long swpe; + char buf[32]; + int ret; + + len = min(len, sizeof(buf) - 1); + if (copy_from_user(buf, ubuf, len)) + return -EFAULT; + buf[len] = '\0'; + + ret = kstrtoul(strim(buf), 0, &swpe); + if (ret) + return ret; + + if (swpe >= ICU_SWPE_NUM) + return -EINVAL; + + writel(BIT(swpe), priv->base + ICU_SWPE); + return len; +} + +static const struct file_operations rzv2h_icu_swpe_fops = { + .open = simple_open, + .write = rzv2h_icu_swpe_write, + .llseek = noop_llseek, +}; + static int rzv2h_icu_setup_debug_irqs(struct platform_device *pdev) { + const struct rzv2h_hw_info *hw_info = rzv2h_icu_data->info; static const u8 swint_idx[ICU_SWINT_NUM] = { 0, 1, 2, 3 }; static const char * const rzv2h_swint_names[] = { "int-ca55-0", "int-ca55-1", "int-ca55-2", "int-ca55-3", }; + static const char *icu_err = "icu-error-ca55"; + void __iomem *base = rzv2h_icu_data->base; struct device *dev = &pdev->dev; struct dentry *dentry; struct dentry *dir; @@ -654,6 +746,36 @@ static int rzv2h_icu_setup_debug_irqs(struct platform_device *pdev) if (IS_ERR(dentry)) return PTR_ERR(dentry); + ret = devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dentry); + if (ret) + return ret; + + icu_irq = platform_get_irq_byname(pdev, icu_err); + if (icu_irq < 0) + return dev_err_probe(dev, icu_irq, "Failed to get %s IRQ\n", icu_err); + + /* Unmask and clear all IP/CA55 error interrupts */ + for (i = 0; i < ICU_NUM_A55ERR; i++) { + writel(0xffffff, base + ICU_ERINTA55CRL(i)); + writel(0x0, base + ICU_ERINTA55MSK(i)); + } + + /* Clear all Bus errors */ + for (i = 0; i < ICU_NUM_BE; i++) + writel(0xffffffff, base + ICU_BECLR(i)); + + /* Clear all ECCRAM errors */ + for (i = hw_info->ecc_start; i <= hw_info->ecc_end; i++) + writel(0xffffffff, base + ICU_ERCLR(i)); + + ret = devm_request_irq(dev, icu_irq, rzv2h_icu_error_irq, 0, dev_name(dev), rzv2h_icu_data); + if (ret) + return dev_err_probe(dev, ret, "Failed to request %s IRQ\n", icu_err); + + dentry = debugfs_create_file("swpe", 0200, dir, rzv2h_icu_data, &rzv2h_icu_swpe_fops); + if (IS_ERR(dentry)) + return PTR_ERR(dentry); + return devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dentry); } @@ -759,12 +881,24 @@ static const struct rzv2h_hw_info rzg3e_hw_params = { .t_offs = ICU_RZG3E_TINT_OFFSET, .max_tssel = ICU_RZG3E_TSSEL_MAX_VAL, .field_width = 16, + .ecc_start = 1, + .ecc_end = 4, +}; + +static const struct rzv2h_hw_info rzv2n_hw_params = { + .t_offs = 0, + .max_tssel = ICU_RZV2H_TSSEL_MAX_VAL, + .field_width = 8, + .ecc_start = 0, + .ecc_end = 2, }; static const struct rzv2h_hw_info rzv2h_hw_params = { .t_offs = 0, .max_tssel = ICU_RZV2H_TSSEL_MAX_VAL, .field_width = 8, + .ecc_start = 0, + .ecc_end = 11, }; static int rzg3e_icu_probe(struct platform_device *pdev, struct device_node *parent) @@ -772,6 +906,11 @@ static int rzg3e_icu_probe(struct platform_device *pdev, struct device_node *par return rzv2h_icu_probe_common(pdev, parent, &rzg3e_hw_params); } +static int rzv2n_icu_probe(struct platform_device *pdev, struct device_node *parent) +{ + return rzv2h_icu_probe_common(pdev, parent, &rzv2n_hw_params); +} + static int rzv2h_icu_probe(struct platform_device *pdev, struct device_node *parent) { return rzv2h_icu_probe_common(pdev, parent, &rzv2h_hw_params); @@ -779,7 +918,7 @@ static int rzv2h_icu_probe(struct platform_device *pdev, struct device_node *par IRQCHIP_PLATFORM_DRIVER_BEGIN(rzv2h_icu) IRQCHIP_MATCH("renesas,r9a09g047-icu", rzg3e_icu_probe) -IRQCHIP_MATCH("renesas,r9a09g056-icu", rzv2h_icu_probe) +IRQCHIP_MATCH("renesas,r9a09g056-icu", rzv2n_icu_probe) IRQCHIP_MATCH("renesas,r9a09g057-icu", rzv2h_icu_probe) IRQCHIP_PLATFORM_DRIVER_END(rzv2h_icu) MODULE_AUTHOR("Fabrizio Castro <fabrizio.castro.jz@renesas.com>"); -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:36 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Document the debugfs interface exported by the Renesas RZ/V2H ICU driver to aid bring-up and debugging. Describe the write-only swint and swpe files used to trigger software and pseudo error interrupts. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu diff --git a/Documentation/ABI/testing/debugfs-renesas-rzv2h-icu b/Documentation/ABI/testing/debugfs-renesas-rzv2h-icu new file mode 100644 index 000000000000..8e97f35c3fea --- /dev/null +++ b/Documentation/ABI/testing/debugfs-renesas-rzv2h-icu @@ -0,0 +1,24 @@ +What: /sys/kernel/debug/rzv2h_icu/swint +Date: Jan 2026 +KernelVersion: 6.20 +Contact: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> +Description: Write-only debugfs file to trigger ICU software interrupts + (ICU_SWINT) targeting CA55 cores. + Writing an integer CPU index 'N' causes the driver to write + BIT(N) to the ICU_SWINT register, which triggers the hardware + software interrupt routed to CA55 core N via the GIC. + Valid values: + 0..3 - trigger SWINT for CA55 core0..core3 + The driver validates that the requested CPU is online before + triggering the interrupt. Writes for offline CPUs fail. + +What: /sys/kernel/debug/rzv2h_icu/swpe +Date: Jan 2026 +KernelVersion: 6.20 +Contact: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> +Description: Write-only debugfs file to trigger ICU software peripheral + events (ICU_SWPE). + Writing an integer index 'N' causes the driver to write BIT(N) + to the ICU_SWPE register. + Valid values: + 0..15 - assert SWPE bit 0..15 -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:37 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Prabhakar, Just a question, If the irq handler is meant for debugging/bring-up, can this irq handler activated only for debug session instead of unconditionally enabling it? Cheers, Biju
{ "author": "Biju Das <biju.das.jz@bp.renesas.com>", "date": "Thu, 22 Jan 2026 08:20:30 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Biju, On Thu, Jan 22, 2026 at 8:20 AM Biju Das <biju.das.jz@bp.renesas.com> wrote: The IRQ handler is registered only when `irq_renesas_rzv2h.debug=1` is present in the bootargs. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Thu, 22 Jan 2026 09:18:52 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Prabhakar, Thanks for clarification. Cheers, Biju
{ "author": "Biju Das <biju.das.jz@bp.renesas.com>", "date": "Thu, 22 Jan 2026 09:26:00 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Prabhakar, On Wed, 21 Jan 2026 at 16:01, Prabhakar <prabhakar.csengg@gmail.com> wrote: Thanks for your patch! [...] drivers/irqchip/irq-renesas-rzv2h.c:730:23: error: implicit declaration of function ‘devm_request_irq’; did you mean ‘can_request_irq’? [-Werror=implicit-function-declaration] How does this build for you, without including <linux/interrupt.h>? Gr{oetje,eeting}s, Geert -- Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that. -- Linus Torvalds
{ "author": "Geert Uytterhoeven <geert@linux-m68k.org>", "date": "Fri, 23 Jan 2026 11:45:19 +0100", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Geert, Thank you for the review. On Fri, Jan 23, 2026 at 10:45 AM Geert Uytterhoeven <geert@linux-m68k.org> wrote: While posting the patches, I had rebased them on next-20260119 (and used defconfig), but I didn't see any build issues. Below is the snippet from irq-renesas-rzv2h.i: struct ns_common; int open_related_ns(struct ns_common *ns, struct ns_common *(*get_ns)(struct ns_common *ns)); static inline __attribute__((__gnu_inline__)) __attribute__((__unused__)) __attribute__((__no_instrument_function__)) struct pid_namespace *proc_pid_ns(struct super_block *sb) { return proc_sb_info(sb)->pid_ns; } bool proc_ns_file(const struct file *file); # 20 "./include/linux/efi.h" 2 # 1 "./include/linux/rtc.h" 1 # 17 "./include/linux/rtc.h" # 1 "./include/linux/interrupt.h" 1 # 9 "./include/linux/interrupt.h" # 1 "./include/linux/irqreturn.h" 1 # 11 "./include/linux/irqreturn.h" enum irqreturn { IRQ_NONE = (0 << 0), IRQ_HANDLED = (1 << 0), IRQ_WAKE_THREAD = (1 << 1), }; typedef enum irqreturn irqreturn_t; # 10 "./include/linux/interrupt.h" 2 # 1 "./include/linux/hardirq.h" 1 Tracing through the above interrupt.h was included in below : ------------------------------------------------------------------------------- drivers/irqchip/irq-renesas-rzv2h.c - (line 19) #include <linux/irqchip.h> #include <linux/acpi.h> #include <acpi/acpi_io.h> #include <asm/acpi.h> #include <linux/efi.h> #include <linux/rtc.h> #include <linux/interrupt.h> Now that you mentioned there was a build issue, I tried with renesas_defconfig and I do get the build issue which you pointed out. I'll respin a v2 with #include <linux/interrupt.h> included explicitly. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Fri, 23 Jan 2026 11:24:08 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Wed, Jan 21 2026 at 15:01, Prabhakar wrote: Can't you reuse/extend the existing mechanism provided by CONFIG_GENERIC_IRQ_INJECTION (irq_inject_interrupt(), irq_debug_write()) instead of implementing yet another ad hoc debugfs magic? Thanks, tglx
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Mon, 26 Jan 2026 17:03:49 +0100", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Wed, Jan 21 2026 at 15:01, Prabhakar wrote: Why is that only relevant to bring-up and debugging? Those errors can't happen in production, right? Thanks, tglx
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Mon, 26 Jan 2026 17:11:47 +0100", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Thomas, Thank you for the feedback. On Mon, Jan 26, 2026 at 4:03 PM Thomas Gleixner <tglx@kernel.org> wrote: Can you please point me to a driver which makes use of it? In my case the interrupt needs to be triggered when BIT(n) (n=0-3) is written to ICU_SWINT. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Thu, 29 Jan 2026 21:24:02 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Thu, Jan 29 2026 at 21:24, Prabhakar Lad wrote: Care to look what irq_inject_interrupt() does? It tries first to inject the interrupt via irq_set_irqchip_state(), which only works when a chip in the hierarchy implements the chip::irq_set_irqchip_state() callback. If that fails, it uses the resend mechanism, which utilizes the chip::irq_retrigger() callback. I'm sure you know how to grep for drivers which implement one of them :) Thanks, tglx
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Thu, 29 Jan 2026 22:59:05 +0100", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Thomas, On Thu, Jan 29, 2026 at 9:59 PM Thomas Gleixner <tglx@kernel.org> wrote: I did implement irq_set_irqchip_state but it doesn't land in the rzv2h_icu_irq_set_irqchip_state(). So I was wondering if I missed something. #Trigger int-ca55-0 root@rzv2h-evk:/sys/kernel/debug/irq/irqs# echo trigger > 14 #The trace looks like below: irq_debug_write() -> irq_inject_interrupt() -> irq_set_irqchip_state() This lands in GICV3. For the RZ/V2H ICU only interrupts port_irqx and tintx interrupts are registered in irq_domain_create_hierarchy() for the rest of the interrupts these are supposed to be directly handled by GICv3. root@rzv2h-evk:/sys/kernel/debug/irq/irqs# cat /proc/interrupts | grep interr | grep 294 14: 1 0 0 0 GICv3 294 Edge 10400000.interrupt-controller root@rzv2h-evk:/sys/kernel/debug/irq/irqs# cat 14 handler: handle_fasteoi_irq device: (null) status: 0x00000001 istate: 0x00004000 ddepth: 0 wdepth: 0 dstate: 0x0b400201 IRQ_TYPE_EDGE_RISING IRQD_ACTIVATED IRQD_IRQ_STARTED IRQD_SINGLE_TARGET IRQD_DEFAULT_TRIGGER_SET IRQD_HANDLE_ENFORCE_IRQCTX node: -1 affinity: 0-3 effectiv: 0 domain: :soc:interrupt-controller@14900000-1 hwirq: 0x126 chip: GICv3 flags: 0x15 IRQCHIP_SET_TYPE_MASKED IRQCHIP_MASK_ON_SUSPEND IRQCHIP_SKIP_SET_WAKE How do you propose to handle this? irq_inject_interrupt() would work if I move int-ca55-x and icu-error-ca55 under irq_domain_create_hierarchy(). Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Fri, 30 Jan 2026 11:17:08 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Fri, Jan 30 2026 at 11:17, Lad, Prabhakar wrote: ... Correct. That's how the hierarchy works.
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Fri, 30 Jan 2026 15:52:38 +0100", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Thomas, On Mon, Jan 26, 2026 at 4:11 PM Thomas Gleixner <tglx@kernel.org> wrote: The error conditions can happen in production too. So I'll enable them by default and drop the debug module param. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Mon, 2 Feb 2026 19:02:33 +0000", "thread_id": "20260121150137.3364865-1-prabhakar.mahadev-lad.rj@bp.renesas.com.mbox.gz" }
lkml
[PATCH v2 0/2] ARM64 support for doorbell and intercept SINTs
From: "Anirudh Rayabharam (Microsoft)" <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. Changes in v2: Addressed review comments: - Moved more stuff into mshv_synic.c - Code simplifications - Removed unnecessary debug prints v1: https://lore.kernel.org/linux-hyperv/20260128160437.3342167-1-anirudh@anirudhrb.com/ Anirudh Rayabharam (Microsoft) (2): mshv: refactor synic init and cleanup mshv: add arm64 support for doorbell & intercept SINTs drivers/hv/mshv_root.h | 5 +- drivers/hv/mshv_root_main.c | 59 ++------- drivers/hv/mshv_synic.c | 232 ++++++++++++++++++++++++++++++++++-- 3 files changed, 230 insertions(+), 66 deletions(-) -- 2.34.1
From: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> Rename mshv_synic_init() to mshv_synic_cpu_init() and mshv_synic_cleanup() to mshv_synic_cpu_exit() to better reflect that these functions handle per-cpu synic setup and teardown. Use mshv_synic_init/cleanup() to perform init/cleanup that is not per-cpu. Move all the synic related setup from mshv_parent_partition_init. Move the reboot notifier to mshv_synic.c because it currently only operates on the synic cpuhp state. Move out synic_pages from the global mshv_root since it's use is now completely local to mshv_synic.c. This is in preparation for the next patch which will add more stuff to mshv_synic_init(). No functional change. Signed-off-by: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> --- drivers/hv/mshv_root.h | 5 ++- drivers/hv/mshv_root_main.c | 59 +++++------------------------- drivers/hv/mshv_synic.c | 71 +++++++++++++++++++++++++++++++++---- 3 files changed, 75 insertions(+), 60 deletions(-) diff --git a/drivers/hv/mshv_root.h b/drivers/hv/mshv_root.h index 3c1d88b36741..26e0320c8097 100644 --- a/drivers/hv/mshv_root.h +++ b/drivers/hv/mshv_root.h @@ -183,7 +183,6 @@ struct hv_synic_pages { }; struct mshv_root { - struct hv_synic_pages __percpu *synic_pages; spinlock_t pt_ht_lock; DECLARE_HASHTABLE(pt_htable, MSHV_PARTITIONS_HASH_BITS); struct hv_partition_property_vmm_capabilities vmm_caps; @@ -242,8 +241,8 @@ int mshv_register_doorbell(u64 partition_id, doorbell_cb_t doorbell_cb, void mshv_unregister_doorbell(u64 partition_id, int doorbell_portid); void mshv_isr(void); -int mshv_synic_init(unsigned int cpu); -int mshv_synic_cleanup(unsigned int cpu); +int mshv_synic_init(struct device *dev); +void mshv_synic_cleanup(void); static inline bool mshv_partition_encrypted(struct mshv_partition *partition) { diff --git a/drivers/hv/mshv_root_main.c b/drivers/hv/mshv_root_main.c index 681b58154d5e..7c1666456e78 100644 --- a/drivers/hv/mshv_root_main.c +++ b/drivers/hv/mshv_root_main.c @@ -2035,7 +2035,6 @@ mshv_dev_release(struct inode *inode, struct file *filp) return 0; } -static int mshv_cpuhp_online; static int mshv_root_sched_online; static const char *scheduler_type_to_string(enum hv_scheduler_type type) @@ -2198,40 +2197,14 @@ root_scheduler_deinit(void) free_percpu(root_scheduler_output); } -static int mshv_reboot_notify(struct notifier_block *nb, - unsigned long code, void *unused) -{ - cpuhp_remove_state(mshv_cpuhp_online); - return 0; -} - -struct notifier_block mshv_reboot_nb = { - .notifier_call = mshv_reboot_notify, -}; - static void mshv_root_partition_exit(void) { - unregister_reboot_notifier(&mshv_reboot_nb); root_scheduler_deinit(); } static int __init mshv_root_partition_init(struct device *dev) { - int err; - - err = root_scheduler_init(dev); - if (err) - return err; - - err = register_reboot_notifier(&mshv_reboot_nb); - if (err) - goto root_sched_deinit; - - return 0; - -root_sched_deinit: - root_scheduler_deinit(); - return err; + return root_scheduler_init(dev); } static void mshv_init_vmm_caps(struct device *dev) @@ -2276,31 +2249,18 @@ static int __init mshv_parent_partition_init(void) MSHV_HV_MAX_VERSION); } - mshv_root.synic_pages = alloc_percpu(struct hv_synic_pages); - if (!mshv_root.synic_pages) { - dev_err(dev, "Failed to allocate percpu synic page\n"); - ret = -ENOMEM; + ret = mshv_synic_init(dev); + if (ret) goto device_deregister; - } - - ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mshv_synic", - mshv_synic_init, - mshv_synic_cleanup); - if (ret < 0) { - dev_err(dev, "Failed to setup cpu hotplug state: %i\n", ret); - goto free_synic_pages; - } - - mshv_cpuhp_online = ret; ret = mshv_retrieve_scheduler_type(dev); if (ret) - goto remove_cpu_state; + goto synic_cleanup; if (hv_root_partition()) ret = mshv_root_partition_init(dev); if (ret) - goto remove_cpu_state; + goto synic_cleanup; mshv_init_vmm_caps(dev); @@ -2318,10 +2278,8 @@ static int __init mshv_parent_partition_init(void) exit_partition: if (hv_root_partition()) mshv_root_partition_exit(); -remove_cpu_state: - cpuhp_remove_state(mshv_cpuhp_online); -free_synic_pages: - free_percpu(mshv_root.synic_pages); +synic_cleanup: + mshv_synic_cleanup(); device_deregister: misc_deregister(&mshv_dev); return ret; @@ -2335,8 +2293,7 @@ static void __exit mshv_parent_partition_exit(void) mshv_irqfd_wq_cleanup(); if (hv_root_partition()) mshv_root_partition_exit(); - cpuhp_remove_state(mshv_cpuhp_online); - free_percpu(mshv_root.synic_pages); + mshv_synic_cleanup(); } module_init(mshv_parent_partition_init); diff --git a/drivers/hv/mshv_synic.c b/drivers/hv/mshv_synic.c index f8b0337cdc82..98c58755846d 100644 --- a/drivers/hv/mshv_synic.c +++ b/drivers/hv/mshv_synic.c @@ -12,11 +12,16 @@ #include <linux/mm.h> #include <linux/io.h> #include <linux/random.h> +#include <linux/cpuhotplug.h> +#include <linux/reboot.h> #include <asm/mshyperv.h> #include "mshv_eventfd.h" #include "mshv.h" +static int synic_cpuhp_online; +static struct hv_synic_pages __percpu *synic_pages; + static u32 synic_event_ring_get_queued_port(u32 sint_index) { struct hv_synic_event_ring_page **event_ring_page; @@ -26,7 +31,7 @@ static u32 synic_event_ring_get_queued_port(u32 sint_index) u32 message; u8 tail; - spages = this_cpu_ptr(mshv_root.synic_pages); + spages = this_cpu_ptr(synic_pages); event_ring_page = &spages->synic_event_ring_page; synic_eventring_tail = (u8 **)this_cpu_ptr(hv_synic_eventring_tail); @@ -393,7 +398,7 @@ mshv_intercept_isr(struct hv_message *msg) void mshv_isr(void) { - struct hv_synic_pages *spages = this_cpu_ptr(mshv_root.synic_pages); + struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; struct hv_message *msg; bool handled; @@ -446,7 +451,7 @@ void mshv_isr(void) } } -int mshv_synic_init(unsigned int cpu) +static int mshv_synic_cpu_init(unsigned int cpu) { union hv_synic_simp simp; union hv_synic_siefp siefp; @@ -455,7 +460,7 @@ int mshv_synic_init(unsigned int cpu) union hv_synic_sint sint; #endif union hv_synic_scontrol sctrl; - struct hv_synic_pages *spages = this_cpu_ptr(mshv_root.synic_pages); + struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; struct hv_synic_event_flags_page **event_flags_page = &spages->synic_event_flags_page; @@ -542,14 +547,14 @@ int mshv_synic_init(unsigned int cpu) return -EFAULT; } -int mshv_synic_cleanup(unsigned int cpu) +static int mshv_synic_cpu_exit(unsigned int cpu) { union hv_synic_sint sint; union hv_synic_simp simp; union hv_synic_siefp siefp; union hv_synic_sirbp sirbp; union hv_synic_scontrol sctrl; - struct hv_synic_pages *spages = this_cpu_ptr(mshv_root.synic_pages); + struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; struct hv_synic_event_flags_page **event_flags_page = &spages->synic_event_flags_page; @@ -663,3 +668,57 @@ mshv_unregister_doorbell(u64 partition_id, int doorbell_portid) mshv_portid_free(doorbell_portid); } + +static int mshv_synic_reboot_notify(struct notifier_block *nb, + unsigned long code, void *unused) +{ + cpuhp_remove_state(synic_cpuhp_online); + return 0; +} + +static struct notifier_block mshv_synic_reboot_nb = { + .notifier_call = mshv_synic_reboot_notify, +}; + +int __init mshv_synic_init(struct device *dev) +{ + int ret = 0; + + synic_pages = alloc_percpu(struct hv_synic_pages); + if (!synic_pages) { + dev_err(dev, "Failed to allocate percpu synic page\n"); + return -ENOMEM; + } + + ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mshv_synic", + mshv_synic_cpu_init, + mshv_synic_cpu_exit); + if (ret < 0) { + dev_err(dev, "Failed to setup cpu hotplug state: %i\n", ret); + goto free_synic_pages; + } + + synic_cpuhp_online = ret; + + if (hv_root_partition()) { + ret = register_reboot_notifier(&mshv_synic_reboot_nb); + if (ret) + goto remove_cpuhp_state; + } + + return 0; + +remove_cpuhp_state: + cpuhp_remove_state(synic_cpuhp_online); +free_synic_pages: + free_percpu(synic_pages); + return ret; +} + +void mshv_synic_cleanup(void) +{ + if (hv_root_partition()) + unregister_reboot_notifier(&mshv_synic_reboot_nb); + cpuhp_remove_state(synic_cpuhp_online); + free_percpu(synic_pages); +} -- 2.34.1
{ "author": "Anirudh Rayabharam <anirudh@anirudhrb.com>", "date": "Mon, 2 Feb 2026 18:27:05 +0000", "thread_id": "aYD15RxUIoGDJCv5@skinsburskii.localdomain.mbox.gz" }
lkml
[PATCH v2 0/2] ARM64 support for doorbell and intercept SINTs
From: "Anirudh Rayabharam (Microsoft)" <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. Changes in v2: Addressed review comments: - Moved more stuff into mshv_synic.c - Code simplifications - Removed unnecessary debug prints v1: https://lore.kernel.org/linux-hyperv/20260128160437.3342167-1-anirudh@anirudhrb.com/ Anirudh Rayabharam (Microsoft) (2): mshv: refactor synic init and cleanup mshv: add arm64 support for doorbell & intercept SINTs drivers/hv/mshv_root.h | 5 +- drivers/hv/mshv_root_main.c | 59 ++------- drivers/hv/mshv_synic.c | 232 ++++++++++++++++++++++++++++++++++-- 3 files changed, 230 insertions(+), 66 deletions(-) -- 2.34.1
From: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. To better unify x86 and arm64 paths, introduce mshv_sint_vector_init() that either registers the platform_driver and obtains the INTID (arm64) or just uses HYPERVISOR_CALLBACK_VECTOR as the interrupt vector (x86). Signed-off-by: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> --- drivers/hv/mshv_synic.c | 163 ++++++++++++++++++++++++++++++++++++++-- 1 file changed, 156 insertions(+), 7 deletions(-) diff --git a/drivers/hv/mshv_synic.c b/drivers/hv/mshv_synic.c index 98c58755846d..de5fee6e9f29 100644 --- a/drivers/hv/mshv_synic.c +++ b/drivers/hv/mshv_synic.c @@ -10,17 +10,24 @@ #include <linux/kernel.h> #include <linux/slab.h> #include <linux/mm.h> +#include <linux/interrupt.h> #include <linux/io.h> #include <linux/random.h> #include <linux/cpuhotplug.h> #include <linux/reboot.h> #include <asm/mshyperv.h> +#include <linux/platform_device.h> +#include <linux/acpi.h> #include "mshv_eventfd.h" #include "mshv.h" static int synic_cpuhp_online; static struct hv_synic_pages __percpu *synic_pages; +static int mshv_sint_vector = -1; /* hwirq for the SynIC SINTs */ +#ifndef HYPERVISOR_CALLBACK_VECTOR +static int mshv_sint_irq = -1; /* Linux IRQ for mshv_sint_vector */ +#endif static u32 synic_event_ring_get_queued_port(u32 sint_index) { @@ -456,9 +463,7 @@ static int mshv_synic_cpu_init(unsigned int cpu) union hv_synic_simp simp; union hv_synic_siefp siefp; union hv_synic_sirbp sirbp; -#ifdef HYPERVISOR_CALLBACK_VECTOR union hv_synic_sint sint; -#endif union hv_synic_scontrol sctrl; struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; @@ -501,10 +506,13 @@ static int mshv_synic_cpu_init(unsigned int cpu) hv_set_non_nested_msr(HV_MSR_SIRBP, sirbp.as_uint64); -#ifdef HYPERVISOR_CALLBACK_VECTOR +#ifndef HYPERVISOR_CALLBACK_VECTOR + enable_percpu_irq(mshv_sint_irq, 0); +#endif + /* Enable intercepts */ sint.as_uint64 = 0; - sint.vector = HYPERVISOR_CALLBACK_VECTOR; + sint.vector = mshv_sint_vector; sint.masked = false; sint.auto_eoi = hv_recommend_using_aeoi(); hv_set_non_nested_msr(HV_MSR_SINT0 + HV_SYNIC_INTERCEPTION_SINT_INDEX, @@ -512,13 +520,12 @@ static int mshv_synic_cpu_init(unsigned int cpu) /* Doorbell SINT */ sint.as_uint64 = 0; - sint.vector = HYPERVISOR_CALLBACK_VECTOR; + sint.vector = mshv_sint_vector; sint.masked = false; sint.as_intercept = 1; sint.auto_eoi = hv_recommend_using_aeoi(); hv_set_non_nested_msr(HV_MSR_SINT0 + HV_SYNIC_DOORBELL_SINT_INDEX, sint.as_uint64); -#endif /* Enable global synic bit */ sctrl.as_uint64 = hv_get_non_nested_msr(HV_MSR_SCONTROL); @@ -573,6 +580,10 @@ static int mshv_synic_cpu_exit(unsigned int cpu) hv_set_non_nested_msr(HV_MSR_SINT0 + HV_SYNIC_DOORBELL_SINT_INDEX, sint.as_uint64); +#ifndef HYPERVISOR_CALLBACK_VECTOR + disable_percpu_irq(mshv_sint_irq); +#endif + /* Disable Synic's event ring page */ sirbp.as_uint64 = hv_get_non_nested_msr(HV_MSR_SIRBP); sirbp.sirbp_enabled = false; @@ -680,14 +691,149 @@ static struct notifier_block mshv_synic_reboot_nb = { .notifier_call = mshv_synic_reboot_notify, }; +#ifndef HYPERVISOR_CALLBACK_VECTOR +#ifdef CONFIG_ACPI +static long __percpu *mshv_evt; + +static acpi_status mshv_walk_resources(struct acpi_resource *res, void *ctx) +{ + struct resource r; + + if (res->type == ACPI_RESOURCE_TYPE_EXTENDED_IRQ) { + if (!acpi_dev_resource_interrupt(res, 0, &r)) { + pr_err("Unable to parse MSHV ACPI interrupt\n"); + return AE_ERROR; + } + /* ARM64 INTID */ + mshv_sint_vector = res->data.extended_irq.interrupts[0]; + /* Linux IRQ number */ + mshv_sint_irq = r.start; + } + + return AE_OK; +} + +static irqreturn_t mshv_percpu_isr(int irq, void *dev_id) +{ + mshv_isr(); + return IRQ_HANDLED; +} + +static int mshv_sint_probe(struct platform_device *pdev) +{ + acpi_status result; + int ret; + struct acpi_device *device = ACPI_COMPANION(&pdev->dev); + + result = acpi_walk_resources(device->handle, METHOD_NAME__CRS, + mshv_walk_resources, NULL); + if (ACPI_FAILURE(result)) { + ret = -ENODEV; + goto out_fail; + } + + mshv_evt = alloc_percpu(long); + if (!mshv_evt) { + ret = -ENOMEM; + goto out_fail; + } + + ret = request_percpu_irq(mshv_sint_irq, mshv_percpu_isr, "MSHV", + mshv_evt); + if (ret) + goto free_evt; + + return 0; + +free_evt: + free_percpu(mshv_evt); +out_fail: + mshv_sint_vector = -1; + mshv_sint_irq = -1; + return ret; +} + +static void mshv_sint_remove(struct platform_device *pdev) +{ + free_percpu_irq(mshv_sint_irq, mshv_evt); + free_percpu(mshv_evt); +} +#else +static int mshv_sint_probe(struct platform_device *pdev) +{ + return -ENODEV; +} + +static void mshv_sint_remove(struct platform_device *pdev) +{ +} +#endif + +static const __maybe_unused struct acpi_device_id mshv_sint_device_ids[] = { + {"MSFT1003", 0}, + {"", 0}, +}; + +static struct platform_driver mshv_sint_drv = { + .probe = mshv_sint_probe, + .remove = mshv_sint_remove, + .driver = { + .name = "mshv_sint", + .acpi_match_table = ACPI_PTR(mshv_sint_device_ids), + .probe_type = PROBE_FORCE_SYNCHRONOUS, + }, +}; + +static int __init mshv_sint_vector_init(void) +{ + int ret; + + if (acpi_disabled) + return -ENODEV; + + ret = platform_driver_register(&mshv_sint_drv); + if (ret) + return ret; + + if (mshv_sint_vector == -1 || mshv_sint_irq == -1) { + platform_driver_unregister(&mshv_sint_drv); + return -ENODEV; + } + + return 0; +} + +static void mshv_sint_vector_cleanup(void) +{ + platform_driver_unregister(&mshv_sint_drv); +} +#else /* HYPERVISOR_CALLBACK_VECTOR */ +static int __init mshv_sint_vector_init(void) +{ + mshv_sint_vector = HYPERVISOR_CALLBACK_VECTOR; + return 0; +} + +static void mshv_sint_vector_cleanup(void) +{ +} +#endif /* HYPERVISOR_CALLBACK_VECTOR */ + int __init mshv_synic_init(struct device *dev) { int ret = 0; + ret = mshv_sint_vector_init(); + if (ret) { + dev_err(dev, "Failed to get MSHV SINT vector: %i\n", ret); + return ret; + } + synic_pages = alloc_percpu(struct hv_synic_pages); if (!synic_pages) { dev_err(dev, "Failed to allocate percpu synic page\n"); - return -ENOMEM; + ret = -ENOMEM; + goto sint_vector_cleanup; } ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mshv_synic", @@ -712,6 +858,8 @@ int __init mshv_synic_init(struct device *dev) cpuhp_remove_state(synic_cpuhp_online); free_synic_pages: free_percpu(synic_pages); +sint_vector_cleanup: + mshv_sint_vector_cleanup(); return ret; } @@ -721,4 +869,5 @@ void mshv_synic_cleanup(void) unregister_reboot_notifier(&mshv_synic_reboot_nb); cpuhp_remove_state(synic_cpuhp_online); free_percpu(synic_pages); + mshv_sint_vector_cleanup(); } -- 2.34.1
{ "author": "Anirudh Rayabharam <anirudh@anirudhrb.com>", "date": "Mon, 2 Feb 2026 18:27:06 +0000", "thread_id": "aYD15RxUIoGDJCv5@skinsburskii.localdomain.mbox.gz" }
lkml
[PATCH v2 0/2] ARM64 support for doorbell and intercept SINTs
From: "Anirudh Rayabharam (Microsoft)" <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. Changes in v2: Addressed review comments: - Moved more stuff into mshv_synic.c - Code simplifications - Removed unnecessary debug prints v1: https://lore.kernel.org/linux-hyperv/20260128160437.3342167-1-anirudh@anirudhrb.com/ Anirudh Rayabharam (Microsoft) (2): mshv: refactor synic init and cleanup mshv: add arm64 support for doorbell & intercept SINTs drivers/hv/mshv_root.h | 5 +- drivers/hv/mshv_root_main.c | 59 ++------- drivers/hv/mshv_synic.c | 232 ++++++++++++++++++++++++++++++++++-- 3 files changed, 230 insertions(+), 66 deletions(-) -- 2.34.1
On Mon, Feb 02, 2026 at 06:27:05PM +0000, Anirudh Rayabharam wrote: Unrelated to the change, but it would be great to get rid of this notifier altogether and just do the cleanup in the device shutdown hook. This is a cleaner approach as this is a device driver and we do have the device in hands. Do you think you could make this change a part of this series? This conflicts with the "mshv: Add support for integrated scheduler" patch out there. Perhaps we should ask Wei to merge that change first. Nit: it's probably better to branch in the notifier itself. It will introduce an additional object, but the branching will be in one palce instead of two and it will also make to code simpler and easier to read. Thanks Stanislav.
{ "author": "Stanislav Kinsburskii <skinsburskii@linux.microsoft.com>", "date": "Mon, 2 Feb 2026 11:07:17 -0800", "thread_id": "aYD15RxUIoGDJCv5@skinsburskii.localdomain.mbox.gz" }
lkml
[PATCH] perf: arm_spe: Add barrier before enabling profiling buffer
The Arm ARM known issues document [1] states that the architecture will be relaxed so that the profiling buffer must be correctly configured when ProfilingBufferEnabled() && !SPEProfilingStopped() && PMBLIMITR_EL1.FM != DISCARD: R24557 While the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, all of the following must be true: * The current write pointer must be at least one sample record below the write limit pointer. The same relaxation also says that writes may be completely ignored: When the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, the PE might ignore a direct write to any of the following Profiling Buffer registers, other than a direct write to PMBLIMITR_EL1 that clears PMBLIMITR_EL1.E from 1 to 0: * The current write pointer, PMBPTR_EL1. * The Limit pointer, PMBLIMITR_EL1. * PMBSR_EL1. When arm_spe_pmu_start() occurs, SPEProfilingStopped() is false (PMBSR_EL1.S == 0) meaning that the write to PMBLIMITR_EL1 now becomes the point where the buffer configuration must be correct by, rather than the "When profiling becomes enabled" (StatisticalProfilingEnabled()) from the old rule which is much later when PMSCR_EL1 is written. If the writes to PMBLIMITR_EL1 and PMBPTR_EL1 are re-ordered then a misconfigured state could be observed, resulting in a buffer management event. Or the write to PMBPTR_EL1 could be ignored. Fix it by adding an isb() after the write to PMBPTR_EL1 to ensure that this completes before enabling the buffer. To avoid redundant isb()s in the IRQ handler, remove the isb() between the PMBLIMITR_EL1 write and SYS_PMBSR_EL1 as it doesn't matter which order these happen in now that all the previous configuration is covered by the new isb(). This issue is only present in arm_spe_pmu_start() and not in the IRQ handler because SPEProfilingStopped() is true in the IRQ handler. Jumps to the out_write_limit label will skip the isb() but this is ok as they only happen if discard mode is set or the buffer isn't enabled so correct configuration is not required. [1]: https://developer.arm.com/documentation/102105/latest/ Fixes: d5d9696b0380 ("drivers/perf: Add support for ARMv8.2 Statistical Profiling Extension") Signed-off-by: James Clark <james.clark@linaro.org> --- A previous version of this was posted here [1] bundled with other changes to support running in a guest. Since then the known issues doc linked in the commit message has been released so this is a resend of only the critical part that also needs to be fixed for hosts. A redundant isb() has also been removed in this version which is not present in the previous version. [1]: https://lore.kernel.org/linux-arm-kernel/20250701-james-spe-vm-interface-v1-0-52a2cd223d00@linaro.org/ --- drivers/perf/arm_spe_pmu.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/drivers/perf/arm_spe_pmu.c b/drivers/perf/arm_spe_pmu.c index 4801115f2b54..62ae409fd5b4 100644 --- a/drivers/perf/arm_spe_pmu.c +++ b/drivers/perf/arm_spe_pmu.c @@ -639,6 +639,7 @@ static void arm_spe_perf_aux_output_begin(struct perf_output_handle *handle, limit += (u64)buf->base; base = (u64)buf->base + PERF_IDX2OFF(handle->head, buf); write_sysreg_s(base, SYS_PMBPTR_EL1); + isb(); out_write_limit: write_sysreg_s(limit, SYS_PMBLIMITR_EL1); @@ -780,10 +781,8 @@ static irqreturn_t arm_spe_pmu_irq_handler(int irq, void *dev) * PMBPTR might be misaligned, but we'll burn that bridge * when we get to it. */ - if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) { + if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) arm_spe_perf_aux_output_begin(handle, event); - isb(); - } break; case SPE_PMU_BUF_FAULT_ACT_SPURIOUS: /* We've seen you before, but GCC has the memory of a sieve. */ --- base-commit: c072629f05d7bca1148ab17690d7922a31423984 change-id: 20260123-james-spe-relaxation-d6621c7a68ff Best regards, -- James Clark <james.clark@linaro.org>
On Fri, Jan 23, 2026 at 04:03:53PM +0000, James Clark wrote: Makes sense. The isb() in the interrupt handler is useful and should not be removed. See the sequence in the interrupt handler: arm_spe_perf_aux_output_begin() { write_sysreg_s(base, SYS_PMBPTR_EL1); // Ensure the write pointer is ordered isb(); write_sysreg_s(limit, SYS_PMBLIMITR_EL1); } // Ensure the limit pointer is ordered isb(); // Profiling is enabled: // (PMBLIMITR_EL1.E==1) && (PMBSR_EL1.S==0) && (not discard mode) write_sysreg_s(0, SYS_PMBSR_EL1); The first isb() ensures that the write pointer update is ordered. The second isb() ensures that the limit pointer is visible before profiling is enabled by clearing the PMBSR_EL1.S bit. When handling a normal maintenance interrupt, PMBSR_EL1.S is set by the SPE to stop tracing, while PMBLIMITR_EL1.E remains set. Clearing PMBSR_EL1.S therefore effectively re-enables profiling. Since the second isb() is a synchronization for both the write pointer and the limit pointer before profiling is enabled, it could be argued that the first isb() is redundant in the interrupt handling. However, the first isb() is crucial for the arm_spe_pmu_start() case, and keeping it in the interrupt handler does no harm and simplifies code maintenance. In short, if preserves the second isb() instead of removing it, the change looks good to me. Thanks, Leo
{ "author": "Leo Yan <leo.yan@arm.com>", "date": "Fri, 30 Jan 2026 20:24:37 +0000", "thread_id": "aYD08d42SewAAQCB@willie-the-truck.mbox.gz" }
lkml
[PATCH] perf: arm_spe: Add barrier before enabling profiling buffer
The Arm ARM known issues document [1] states that the architecture will be relaxed so that the profiling buffer must be correctly configured when ProfilingBufferEnabled() && !SPEProfilingStopped() && PMBLIMITR_EL1.FM != DISCARD: R24557 While the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, all of the following must be true: * The current write pointer must be at least one sample record below the write limit pointer. The same relaxation also says that writes may be completely ignored: When the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, the PE might ignore a direct write to any of the following Profiling Buffer registers, other than a direct write to PMBLIMITR_EL1 that clears PMBLIMITR_EL1.E from 1 to 0: * The current write pointer, PMBPTR_EL1. * The Limit pointer, PMBLIMITR_EL1. * PMBSR_EL1. When arm_spe_pmu_start() occurs, SPEProfilingStopped() is false (PMBSR_EL1.S == 0) meaning that the write to PMBLIMITR_EL1 now becomes the point where the buffer configuration must be correct by, rather than the "When profiling becomes enabled" (StatisticalProfilingEnabled()) from the old rule which is much later when PMSCR_EL1 is written. If the writes to PMBLIMITR_EL1 and PMBPTR_EL1 are re-ordered then a misconfigured state could be observed, resulting in a buffer management event. Or the write to PMBPTR_EL1 could be ignored. Fix it by adding an isb() after the write to PMBPTR_EL1 to ensure that this completes before enabling the buffer. To avoid redundant isb()s in the IRQ handler, remove the isb() between the PMBLIMITR_EL1 write and SYS_PMBSR_EL1 as it doesn't matter which order these happen in now that all the previous configuration is covered by the new isb(). This issue is only present in arm_spe_pmu_start() and not in the IRQ handler because SPEProfilingStopped() is true in the IRQ handler. Jumps to the out_write_limit label will skip the isb() but this is ok as they only happen if discard mode is set or the buffer isn't enabled so correct configuration is not required. [1]: https://developer.arm.com/documentation/102105/latest/ Fixes: d5d9696b0380 ("drivers/perf: Add support for ARMv8.2 Statistical Profiling Extension") Signed-off-by: James Clark <james.clark@linaro.org> --- A previous version of this was posted here [1] bundled with other changes to support running in a guest. Since then the known issues doc linked in the commit message has been released so this is a resend of only the critical part that also needs to be fixed for hosts. A redundant isb() has also been removed in this version which is not present in the previous version. [1]: https://lore.kernel.org/linux-arm-kernel/20250701-james-spe-vm-interface-v1-0-52a2cd223d00@linaro.org/ --- drivers/perf/arm_spe_pmu.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/drivers/perf/arm_spe_pmu.c b/drivers/perf/arm_spe_pmu.c index 4801115f2b54..62ae409fd5b4 100644 --- a/drivers/perf/arm_spe_pmu.c +++ b/drivers/perf/arm_spe_pmu.c @@ -639,6 +639,7 @@ static void arm_spe_perf_aux_output_begin(struct perf_output_handle *handle, limit += (u64)buf->base; base = (u64)buf->base + PERF_IDX2OFF(handle->head, buf); write_sysreg_s(base, SYS_PMBPTR_EL1); + isb(); out_write_limit: write_sysreg_s(limit, SYS_PMBLIMITR_EL1); @@ -780,10 +781,8 @@ static irqreturn_t arm_spe_pmu_irq_handler(int irq, void *dev) * PMBPTR might be misaligned, but we'll burn that bridge * when we get to it. */ - if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) { + if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) arm_spe_perf_aux_output_begin(handle, event); - isb(); - } break; case SPE_PMU_BUF_FAULT_ACT_SPURIOUS: /* We've seen you before, but GCC has the memory of a sieve. */ --- base-commit: c072629f05d7bca1148ab17690d7922a31423984 change-id: 20260123-james-spe-relaxation-d6621c7a68ff Best regards, -- James Clark <james.clark@linaro.org>
On Fri, Jan 30, 2026 at 08:24:37PM +0000, Leo Yan wrote: Oh nice, since when was it ok to relax the architecture and break existing drivers that were perfectly fine before? The SPE spec's not worth the paper it's written on... Anyway, we're not changing the driver without a comment next to the new isb() explaining the backwards incompatible change. I'm not sure I follow your logic as to why both ISBs are required, but I'd have thought that if perf_aux_output_begin() fails when called from arm_spe_perf_aux_output_begin() in the irqhandler, we need the ISB because we're going to clear pmblimitr_el1 to 0 and that surely has to be ordered before clearing pmbsr? Will
{ "author": "Will Deacon <will@kernel.org>", "date": "Mon, 2 Feb 2026 16:53:57 +0000", "thread_id": "aYD08d42SewAAQCB@willie-the-truck.mbox.gz" }
lkml
[PATCH] perf: arm_spe: Add barrier before enabling profiling buffer
The Arm ARM known issues document [1] states that the architecture will be relaxed so that the profiling buffer must be correctly configured when ProfilingBufferEnabled() && !SPEProfilingStopped() && PMBLIMITR_EL1.FM != DISCARD: R24557 While the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, all of the following must be true: * The current write pointer must be at least one sample record below the write limit pointer. The same relaxation also says that writes may be completely ignored: When the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, the PE might ignore a direct write to any of the following Profiling Buffer registers, other than a direct write to PMBLIMITR_EL1 that clears PMBLIMITR_EL1.E from 1 to 0: * The current write pointer, PMBPTR_EL1. * The Limit pointer, PMBLIMITR_EL1. * PMBSR_EL1. When arm_spe_pmu_start() occurs, SPEProfilingStopped() is false (PMBSR_EL1.S == 0) meaning that the write to PMBLIMITR_EL1 now becomes the point where the buffer configuration must be correct by, rather than the "When profiling becomes enabled" (StatisticalProfilingEnabled()) from the old rule which is much later when PMSCR_EL1 is written. If the writes to PMBLIMITR_EL1 and PMBPTR_EL1 are re-ordered then a misconfigured state could be observed, resulting in a buffer management event. Or the write to PMBPTR_EL1 could be ignored. Fix it by adding an isb() after the write to PMBPTR_EL1 to ensure that this completes before enabling the buffer. To avoid redundant isb()s in the IRQ handler, remove the isb() between the PMBLIMITR_EL1 write and SYS_PMBSR_EL1 as it doesn't matter which order these happen in now that all the previous configuration is covered by the new isb(). This issue is only present in arm_spe_pmu_start() and not in the IRQ handler because SPEProfilingStopped() is true in the IRQ handler. Jumps to the out_write_limit label will skip the isb() but this is ok as they only happen if discard mode is set or the buffer isn't enabled so correct configuration is not required. [1]: https://developer.arm.com/documentation/102105/latest/ Fixes: d5d9696b0380 ("drivers/perf: Add support for ARMv8.2 Statistical Profiling Extension") Signed-off-by: James Clark <james.clark@linaro.org> --- A previous version of this was posted here [1] bundled with other changes to support running in a guest. Since then the known issues doc linked in the commit message has been released so this is a resend of only the critical part that also needs to be fixed for hosts. A redundant isb() has also been removed in this version which is not present in the previous version. [1]: https://lore.kernel.org/linux-arm-kernel/20250701-james-spe-vm-interface-v1-0-52a2cd223d00@linaro.org/ --- drivers/perf/arm_spe_pmu.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/drivers/perf/arm_spe_pmu.c b/drivers/perf/arm_spe_pmu.c index 4801115f2b54..62ae409fd5b4 100644 --- a/drivers/perf/arm_spe_pmu.c +++ b/drivers/perf/arm_spe_pmu.c @@ -639,6 +639,7 @@ static void arm_spe_perf_aux_output_begin(struct perf_output_handle *handle, limit += (u64)buf->base; base = (u64)buf->base + PERF_IDX2OFF(handle->head, buf); write_sysreg_s(base, SYS_PMBPTR_EL1); + isb(); out_write_limit: write_sysreg_s(limit, SYS_PMBLIMITR_EL1); @@ -780,10 +781,8 @@ static irqreturn_t arm_spe_pmu_irq_handler(int irq, void *dev) * PMBPTR might be misaligned, but we'll burn that bridge * when we get to it. */ - if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) { + if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) arm_spe_perf_aux_output_begin(handle, event); - isb(); - } break; case SPE_PMU_BUF_FAULT_ACT_SPURIOUS: /* We've seen you before, but GCC has the memory of a sieve. */ --- base-commit: c072629f05d7bca1148ab17690d7922a31423984 change-id: 20260123-james-spe-relaxation-d6621c7a68ff Best regards, -- James Clark <james.clark@linaro.org>
On Mon, Feb 02, 2026 at 04:53:57PM +0000, Will Deacon wrote: [...] I think the ISB after arm_spe_perf_aux_output_begin() in the irq handler is required for both the failure and success cases. For a normal maintenance interrupt, an ISB is inserted between writing PMBLIMITR_EL1 and PMBSR_EL1 to ensure that a valid limit write is visible before tracing restarts. This ensures that the following conditions are safely met: "While the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, all of the following must be true: The current write pointer must be at least one sample record below the write limit pointer. PMBPTR_EL1.PTR[63:56] must equal PMBLIMITR_EL1.LIMIT[63:56], regardless of the value of the applicable TBI bit." Thanks, Leo
{ "author": "Leo Yan <leo.yan@arm.com>", "date": "Mon, 2 Feb 2026 18:42:34 +0000", "thread_id": "aYD08d42SewAAQCB@willie-the-truck.mbox.gz" }
lkml
[PATCH] perf: arm_spe: Add barrier before enabling profiling buffer
The Arm ARM known issues document [1] states that the architecture will be relaxed so that the profiling buffer must be correctly configured when ProfilingBufferEnabled() && !SPEProfilingStopped() && PMBLIMITR_EL1.FM != DISCARD: R24557 While the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, all of the following must be true: * The current write pointer must be at least one sample record below the write limit pointer. The same relaxation also says that writes may be completely ignored: When the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, the PE might ignore a direct write to any of the following Profiling Buffer registers, other than a direct write to PMBLIMITR_EL1 that clears PMBLIMITR_EL1.E from 1 to 0: * The current write pointer, PMBPTR_EL1. * The Limit pointer, PMBLIMITR_EL1. * PMBSR_EL1. When arm_spe_pmu_start() occurs, SPEProfilingStopped() is false (PMBSR_EL1.S == 0) meaning that the write to PMBLIMITR_EL1 now becomes the point where the buffer configuration must be correct by, rather than the "When profiling becomes enabled" (StatisticalProfilingEnabled()) from the old rule which is much later when PMSCR_EL1 is written. If the writes to PMBLIMITR_EL1 and PMBPTR_EL1 are re-ordered then a misconfigured state could be observed, resulting in a buffer management event. Or the write to PMBPTR_EL1 could be ignored. Fix it by adding an isb() after the write to PMBPTR_EL1 to ensure that this completes before enabling the buffer. To avoid redundant isb()s in the IRQ handler, remove the isb() between the PMBLIMITR_EL1 write and SYS_PMBSR_EL1 as it doesn't matter which order these happen in now that all the previous configuration is covered by the new isb(). This issue is only present in arm_spe_pmu_start() and not in the IRQ handler because SPEProfilingStopped() is true in the IRQ handler. Jumps to the out_write_limit label will skip the isb() but this is ok as they only happen if discard mode is set or the buffer isn't enabled so correct configuration is not required. [1]: https://developer.arm.com/documentation/102105/latest/ Fixes: d5d9696b0380 ("drivers/perf: Add support for ARMv8.2 Statistical Profiling Extension") Signed-off-by: James Clark <james.clark@linaro.org> --- A previous version of this was posted here [1] bundled with other changes to support running in a guest. Since then the known issues doc linked in the commit message has been released so this is a resend of only the critical part that also needs to be fixed for hosts. A redundant isb() has also been removed in this version which is not present in the previous version. [1]: https://lore.kernel.org/linux-arm-kernel/20250701-james-spe-vm-interface-v1-0-52a2cd223d00@linaro.org/ --- drivers/perf/arm_spe_pmu.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/drivers/perf/arm_spe_pmu.c b/drivers/perf/arm_spe_pmu.c index 4801115f2b54..62ae409fd5b4 100644 --- a/drivers/perf/arm_spe_pmu.c +++ b/drivers/perf/arm_spe_pmu.c @@ -639,6 +639,7 @@ static void arm_spe_perf_aux_output_begin(struct perf_output_handle *handle, limit += (u64)buf->base; base = (u64)buf->base + PERF_IDX2OFF(handle->head, buf); write_sysreg_s(base, SYS_PMBPTR_EL1); + isb(); out_write_limit: write_sysreg_s(limit, SYS_PMBLIMITR_EL1); @@ -780,10 +781,8 @@ static irqreturn_t arm_spe_pmu_irq_handler(int irq, void *dev) * PMBPTR might be misaligned, but we'll burn that bridge * when we get to it. */ - if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) { + if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) arm_spe_perf_aux_output_begin(handle, event); - isb(); - } break; case SPE_PMU_BUF_FAULT_ACT_SPURIOUS: /* We've seen you before, but GCC has the memory of a sieve. */ --- base-commit: c072629f05d7bca1148ab17690d7922a31423984 change-id: 20260123-james-spe-relaxation-d6621c7a68ff Best regards, -- James Clark <james.clark@linaro.org>
On Mon, Feb 02, 2026 at 06:42:34PM +0000, Leo Yan wrote: Hmm, so let's say we've executed the first ISB. At that point, the Profiling Buffer is disabled (PMBLIMITR_EL1.E = 0) and profiling is stopped (PMBSR_EL1.S = 1). If we *don't* have the second ISB then either PMBLIMITR_EL1 is written first or PMBSR_EL1 is written first. But the text you quoted will only come into effect once they've both happened, right? In which case, why does the order matter for the success case? Will
{ "author": "Will Deacon <will@kernel.org>", "date": "Mon, 2 Feb 2026 18:57:11 +0000", "thread_id": "aYD08d42SewAAQCB@willie-the-truck.mbox.gz" }
lkml
[PATCH] perf: arm_spe: Add barrier before enabling profiling buffer
The Arm ARM known issues document [1] states that the architecture will be relaxed so that the profiling buffer must be correctly configured when ProfilingBufferEnabled() && !SPEProfilingStopped() && PMBLIMITR_EL1.FM != DISCARD: R24557 While the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, all of the following must be true: * The current write pointer must be at least one sample record below the write limit pointer. The same relaxation also says that writes may be completely ignored: When the Profiling Buffer is enabled, profiling is not stopped, and Discard mode is not enabled, the PE might ignore a direct write to any of the following Profiling Buffer registers, other than a direct write to PMBLIMITR_EL1 that clears PMBLIMITR_EL1.E from 1 to 0: * The current write pointer, PMBPTR_EL1. * The Limit pointer, PMBLIMITR_EL1. * PMBSR_EL1. When arm_spe_pmu_start() occurs, SPEProfilingStopped() is false (PMBSR_EL1.S == 0) meaning that the write to PMBLIMITR_EL1 now becomes the point where the buffer configuration must be correct by, rather than the "When profiling becomes enabled" (StatisticalProfilingEnabled()) from the old rule which is much later when PMSCR_EL1 is written. If the writes to PMBLIMITR_EL1 and PMBPTR_EL1 are re-ordered then a misconfigured state could be observed, resulting in a buffer management event. Or the write to PMBPTR_EL1 could be ignored. Fix it by adding an isb() after the write to PMBPTR_EL1 to ensure that this completes before enabling the buffer. To avoid redundant isb()s in the IRQ handler, remove the isb() between the PMBLIMITR_EL1 write and SYS_PMBSR_EL1 as it doesn't matter which order these happen in now that all the previous configuration is covered by the new isb(). This issue is only present in arm_spe_pmu_start() and not in the IRQ handler because SPEProfilingStopped() is true in the IRQ handler. Jumps to the out_write_limit label will skip the isb() but this is ok as they only happen if discard mode is set or the buffer isn't enabled so correct configuration is not required. [1]: https://developer.arm.com/documentation/102105/latest/ Fixes: d5d9696b0380 ("drivers/perf: Add support for ARMv8.2 Statistical Profiling Extension") Signed-off-by: James Clark <james.clark@linaro.org> --- A previous version of this was posted here [1] bundled with other changes to support running in a guest. Since then the known issues doc linked in the commit message has been released so this is a resend of only the critical part that also needs to be fixed for hosts. A redundant isb() has also been removed in this version which is not present in the previous version. [1]: https://lore.kernel.org/linux-arm-kernel/20250701-james-spe-vm-interface-v1-0-52a2cd223d00@linaro.org/ --- drivers/perf/arm_spe_pmu.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/drivers/perf/arm_spe_pmu.c b/drivers/perf/arm_spe_pmu.c index 4801115f2b54..62ae409fd5b4 100644 --- a/drivers/perf/arm_spe_pmu.c +++ b/drivers/perf/arm_spe_pmu.c @@ -639,6 +639,7 @@ static void arm_spe_perf_aux_output_begin(struct perf_output_handle *handle, limit += (u64)buf->base; base = (u64)buf->base + PERF_IDX2OFF(handle->head, buf); write_sysreg_s(base, SYS_PMBPTR_EL1); + isb(); out_write_limit: write_sysreg_s(limit, SYS_PMBLIMITR_EL1); @@ -780,10 +781,8 @@ static irqreturn_t arm_spe_pmu_irq_handler(int irq, void *dev) * PMBPTR might be misaligned, but we'll burn that bridge * when we get to it. */ - if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) { + if (!(handle->aux_flags & PERF_AUX_FLAG_TRUNCATED)) arm_spe_perf_aux_output_begin(handle, event); - isb(); - } break; case SPE_PMU_BUF_FAULT_ACT_SPURIOUS: /* We've seen you before, but GCC has the memory of a sieve. */ --- base-commit: c072629f05d7bca1148ab17690d7922a31423984 change-id: 20260123-james-spe-relaxation-d6621c7a68ff Best regards, -- James Clark <james.clark@linaro.org>
On Fri, Jan 23, 2026 at 04:03:53PM +0000, James Clark wrote: Thinking about this some more, does that mean that the direct write to PMBPTR_EL1 performs an indirect read of PMBLIMITR_EL1 so that it can determine the write-ignore semantics? If so, doesn't that mean that we'll get order against a subsequent direct write of PMBLIMITR_EL1 without an ISB thanks to table "D24-1 Synchronization requirements" which says that an indirect read followed by a direct write doesn't require synchronisation? There's also a sentence above the table stating: "Direct writes to System registers are not allowed to affect any instructions appearing in program order before the direct write." so after all that, I'm not really sure why the ISB is required. Will
{ "author": "Will Deacon <will@kernel.org>", "date": "Mon, 2 Feb 2026 19:03:13 +0000", "thread_id": "aYD08d42SewAAQCB@willie-the-truck.mbox.gz" }
lkml
[PATCH] rtmutex: Introduce __cleanup() based infrastructure
Commit 54da6a092431 ("locking: Introduce __cleanup() based infrastructure") introduced lock guards for mutexes in include/linux/mutex.h, but, presumably as PREEMPT_RT wasn't merged at the time, the guard for rt_mutex was never created. Do this now so this infrastructure exists for rt_mutex as well. Signed-off-by: Thomas Böhler <witcher@wiredspace.de> --- include/linux/rtmutex.h | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/include/linux/rtmutex.h b/include/linux/rtmutex.h index ede4c6bf6f22..3c766eba2c7d 100644 --- a/include/linux/rtmutex.h +++ b/include/linux/rtmutex.h @@ -17,6 +17,7 @@ #include <linux/linkage.h> #include <linux/rbtree_types.h> #include <linux/spinlock_types_raw.h> +#include <linux/cleanup.h> extern int max_lock_depth; @@ -129,4 +130,8 @@ extern int rt_mutex_trylock(struct rt_mutex *lock); extern void rt_mutex_unlock(struct rt_mutex *lock); +DEFINE_GUARD(rt_mutex, struct rt_mutex *, rt_mutex_lock(_T), rt_mutex_unlock(_T)) +DEFINE_GUARD_COND(rt_mutex, _try, rt_mutex_trylock(_T)) +DEFINE_GUARD_COND(rt_mutex, _intr, rt_mutex_lock_interruptible(_T), _RET == 0) + #endif --- base-commit: 18f7fcd5e69a04df57b563360b88be72471d6b62 change-id: 20260202-rt_mutex-guard-bfa1518b4f13 Best regards, -- Thomas Böhler <witcher@wiredspace.de>
On 2026-02-02 18:04:43 [+0100], Thomas Böhler wrote: Wait, what? rt_mutex can be used independently of PREEMPT_RT. I suggest you focus on what this patch does in its description and repost it with the locking maintainer in Cc. Do you plan to have any users of this? Sebastian
{ "author": "Sebastian Andrzej Siewior <bigeasy@linutronix.de>", "date": "Mon, 2 Feb 2026 18:58:40 +0100", "thread_id": "DG4PGZN9OM5B.301RXEQEIVB7@wiredspace.de.mbox.gz" }
lkml
[PATCH] rtmutex: Introduce __cleanup() based infrastructure
Commit 54da6a092431 ("locking: Introduce __cleanup() based infrastructure") introduced lock guards for mutexes in include/linux/mutex.h, but, presumably as PREEMPT_RT wasn't merged at the time, the guard for rt_mutex was never created. Do this now so this infrastructure exists for rt_mutex as well. Signed-off-by: Thomas Böhler <witcher@wiredspace.de> --- include/linux/rtmutex.h | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/include/linux/rtmutex.h b/include/linux/rtmutex.h index ede4c6bf6f22..3c766eba2c7d 100644 --- a/include/linux/rtmutex.h +++ b/include/linux/rtmutex.h @@ -17,6 +17,7 @@ #include <linux/linkage.h> #include <linux/rbtree_types.h> #include <linux/spinlock_types_raw.h> +#include <linux/cleanup.h> extern int max_lock_depth; @@ -129,4 +130,8 @@ extern int rt_mutex_trylock(struct rt_mutex *lock); extern void rt_mutex_unlock(struct rt_mutex *lock); +DEFINE_GUARD(rt_mutex, struct rt_mutex *, rt_mutex_lock(_T), rt_mutex_unlock(_T)) +DEFINE_GUARD_COND(rt_mutex, _try, rt_mutex_trylock(_T)) +DEFINE_GUARD_COND(rt_mutex, _intr, rt_mutex_lock_interruptible(_T), _RET == 0) + #endif --- base-commit: 18f7fcd5e69a04df57b563360b88be72471d6b62 change-id: 20260202-rt_mutex-guard-bfa1518b4f13 Best regards, -- Thomas Böhler <witcher@wiredspace.de>
On Mon Feb 2, 2026 at 6:58 PM CET, Sebastian Andrzej Siewior wrote: I wasn't aware of that, sorry for the confusion. I'm still pretty new to the Linux Kernel; my assumption was wrong here. Thanks, I'll do that for a potential v2! No. I discovered this was "missing" while developing out-of-tree. I'm aware that an interface should have in-tree users, but I'm also a bit confused about who is using rt_mutex in-tree in the first place as it looks like there are only a handful of users. I'll make sure to do more research before I might post a v2. Please do tell me if this isn't going to be merged due to missing users, I'll drop this then. No problem, and sorry for the noise if that's the case. :) -- Thomas Böhler
{ "author": "=?utf-8?q?Thomas_B=C3=B6hler?= <witcher@wiredspace.de>", "date": "Mon, 02 Feb 2026 19:59:43 +0100", "thread_id": "DG4PGZN9OM5B.301RXEQEIVB7@wiredspace.de.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Avoid dereferencing pdev->dev.of_node again in rzv2h_icu_probe_common(). Reuse the already available local node pointer when mapping the ICU register space. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index da2bc43a0e12..20c0cd11ef25 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -570,7 +570,7 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no platform_set_drvdata(pdev, rzv2h_icu_data); - rzv2h_icu_data->base = devm_of_iomap(&pdev->dev, pdev->dev.of_node, 0, NULL); + rzv2h_icu_data->base = devm_of_iomap(&pdev->dev, node, 0, NULL); if (IS_ERR(rzv2h_icu_data->base)) return PTR_ERR(rzv2h_icu_data->base); -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:32 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Make use of dev_err_probe() to simplify rzv2h_icu_probe_common(). Keep dev_err() for -ENOMEM paths, as dev_err_probe() does not print for allocation failures, ensuring they remain visible in logs. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 32 ++++++++++------------------- 1 file changed, 11 insertions(+), 21 deletions(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 766b981cf3d8..4aa772ba1a1f 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -560,10 +560,8 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no int ret; parent_domain = irq_find_host(parent); - if (!parent_domain) { - dev_err(dev, "cannot find parent domain\n"); - return -ENODEV; - } + if (!parent_domain) + return dev_err_probe(dev, -ENODEV, "cannot find parent domain\n"); rzv2h_icu_data = devm_kzalloc(dev, sizeof(*rzv2h_icu_data), GFP_KERNEL); if (!rzv2h_icu_data) @@ -576,29 +574,21 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no return PTR_ERR(rzv2h_icu_data->base); ret = rzv2h_icu_parse_interrupts(rzv2h_icu_data, node); - if (ret) { - dev_err(dev, "cannot parse interrupts: %d\n", ret); - return ret; - } + if (ret) + return dev_err_probe(dev, ret, "cannot parse interrupts\n"); resetn = devm_reset_control_get_exclusive_deasserted(dev, NULL); - if (IS_ERR(resetn)) { - ret = PTR_ERR(resetn); - dev_err(dev, "failed to acquire deasserted reset: %d\n", ret); - return ret; - } + if (IS_ERR(resetn)) + return dev_err_probe(dev, PTR_ERR(resetn), + "failed to acquire deasserted reset\n"); ret = devm_pm_runtime_enable(dev); - if (ret < 0) { - dev_err(dev, "devm_pm_runtime_enable failed, %d\n", ret); - return ret; - } + if (ret < 0) + return dev_err_probe(dev, ret, "devm_pm_runtime_enable failed\n"); ret = pm_runtime_resume_and_get(dev); - if (ret < 0) { - dev_err(dev, "pm_runtime_resume_and_get failed: %d\n", ret); - return ret; - } + if (ret < 0) + return dev_err_probe(dev, ret, "pm_runtime_resume_and_get failed\n"); raw_spin_lock_init(&rzv2h_icu_data->lock); -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:34 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Use a local struct device pointer in rzv2h_icu_probe_common() to avoid repeated dereferencing of pdev->dev. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 29 +++++++++++++++-------------- 1 file changed, 15 insertions(+), 14 deletions(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 20c0cd11ef25..766b981cf3d8 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -555,57 +555,58 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no { struct irq_domain *irq_domain, *parent_domain; struct device_node *node = pdev->dev.of_node; + struct device *dev = &pdev->dev; struct reset_control *resetn; int ret; parent_domain = irq_find_host(parent); if (!parent_domain) { - dev_err(&pdev->dev, "cannot find parent domain\n"); + dev_err(dev, "cannot find parent domain\n"); return -ENODEV; } - rzv2h_icu_data = devm_kzalloc(&pdev->dev, sizeof(*rzv2h_icu_data), GFP_KERNEL); + rzv2h_icu_data = devm_kzalloc(dev, sizeof(*rzv2h_icu_data), GFP_KERNEL); if (!rzv2h_icu_data) return -ENOMEM; platform_set_drvdata(pdev, rzv2h_icu_data); - rzv2h_icu_data->base = devm_of_iomap(&pdev->dev, node, 0, NULL); + rzv2h_icu_data->base = devm_of_iomap(dev, node, 0, NULL); if (IS_ERR(rzv2h_icu_data->base)) return PTR_ERR(rzv2h_icu_data->base); ret = rzv2h_icu_parse_interrupts(rzv2h_icu_data, node); if (ret) { - dev_err(&pdev->dev, "cannot parse interrupts: %d\n", ret); + dev_err(dev, "cannot parse interrupts: %d\n", ret); return ret; } - resetn = devm_reset_control_get_exclusive_deasserted(&pdev->dev, NULL); + resetn = devm_reset_control_get_exclusive_deasserted(dev, NULL); if (IS_ERR(resetn)) { ret = PTR_ERR(resetn); - dev_err(&pdev->dev, "failed to acquire deasserted reset: %d\n", ret); + dev_err(dev, "failed to acquire deasserted reset: %d\n", ret); return ret; } - ret = devm_pm_runtime_enable(&pdev->dev); + ret = devm_pm_runtime_enable(dev); if (ret < 0) { - dev_err(&pdev->dev, "devm_pm_runtime_enable failed, %d\n", ret); + dev_err(dev, "devm_pm_runtime_enable failed, %d\n", ret); return ret; } - ret = pm_runtime_resume_and_get(&pdev->dev); + ret = pm_runtime_resume_and_get(dev); if (ret < 0) { - dev_err(&pdev->dev, "pm_runtime_resume_and_get failed: %d\n", ret); + dev_err(dev, "pm_runtime_resume_and_get failed: %d\n", ret); return ret; } raw_spin_lock_init(&rzv2h_icu_data->lock); irq_domain = irq_domain_create_hierarchy(parent_domain, 0, ICU_NUM_IRQ, - dev_fwnode(&pdev->dev), &rzv2h_icu_domain_ops, + dev_fwnode(dev), &rzv2h_icu_domain_ops, rzv2h_icu_data); if (!irq_domain) { - dev_err(&pdev->dev, "failed to add irq domain\n"); + dev_err(dev, "failed to add irq domain\n"); ret = -ENOMEM; goto pm_put; } @@ -616,12 +617,12 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no /* * coccicheck complains about a missing put_device call before returning, but it's a false - * positive. We still need &pdev->dev after successfully returning from this function. + * positive. We still need dev after successfully returning from this function. */ return 0; pm_put: - pm_runtime_put(&pdev->dev); + pm_runtime_put(dev); return ret; } -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:33 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> The Renesas RZ/V2H ICU provides a software interrupt register (ICU_SWINT) that allows software to explicitly assert interrupts toward individual CA55 cores. Writing BIT(n) to ICU_SWINT triggers the corresponding interrupt. Introduce a debug mechanism to trigger software interrupts on individual Cortex-A55 cores via the RZ/V2H ICU. The interface is gated behind CONFIG_DEBUG_FS and a module parameter to ensure it only exists when explicitly enabled. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 111 ++++++++++++++++++++++++++++ 1 file changed, 111 insertions(+) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 4aa772ba1a1f..7d3ce1d762f0 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -11,16 +11,23 @@ #include <linux/bitfield.h> #include <linux/cleanup.h> +#include <linux/cpu.h> +#include <linux/debugfs.h> #include <linux/err.h> +#include <linux/fs.h> #include <linux/io.h> #include <linux/irqchip.h> #include <linux/irqchip/irq-renesas-rzv2h.h> #include <linux/irqdomain.h> +#include <linux/kconfig.h> +#include <linux/kstrtox.h> +#include <linux/moduleparam.h> #include <linux/of_platform.h> #include <linux/pm_runtime.h> #include <linux/reset.h> #include <linux/spinlock.h> #include <linux/syscore_ops.h> +#include <linux/uaccess.h> /* DT "interrupts" indexes */ #define ICU_IRQ_START 1 @@ -40,6 +47,7 @@ #define ICU_TSCLR 0x24 #define ICU_TITSR(k) (0x28 + (k) * 4) #define ICU_TSSR(k) (0x30 + (k) * 4) +#define ICU_SWINT 0x130 #define ICU_DMkSELy(k, y) (0x420 + (k) * 0x20 + (y) * 4) #define ICU_DMACKSELk(k) (0x500 + (k) * 4) @@ -90,6 +98,13 @@ #define ICU_RZG3E_TSSEL_MAX_VAL 0x8c #define ICU_RZV2H_TSSEL_MAX_VAL 0x55 +#define ICU_SWINT_NUM 4 + +static bool enable_icu_debug; +module_param_named(debug, enable_icu_debug, bool, 0644); +MODULE_PARM_DESC(debug, + "Enable RZ/V2H ICU debug/diagnostic interrupts (default: false)"); + /** * struct rzv2h_irqc_reg_cache - registers cache (necessary for suspend/resume) * @nitsr: ICU_NITSR register @@ -550,6 +565,98 @@ static int rzv2h_icu_parse_interrupts(struct rzv2h_icu_priv *priv, struct device return 0; } +static irqreturn_t rzv2h_icu_swint_irq(int irq, void *data) +{ + u8 cpu = *(u8 *)data; + + pr_debug("SWINT interrupt for CA55 core %u\n", cpu); + return IRQ_HANDLED; +} + +static void rzv2h_icu_remove_debugfs(void *file) +{ + debugfs_remove(file); +} + +static ssize_t rzv2h_icu_swint_write(struct file *file, const char __user *ubuf, + size_t len, loff_t *ppos) +{ + struct rzv2h_icu_priv *priv = file->private_data; + unsigned long cpu; + char buf[32]; + int ret; + + len = min(len, sizeof(buf) - 1); + if (copy_from_user(buf, ubuf, len)) + return -EFAULT; + buf[len] = '\0'; + + ret = kstrtoul(strim(buf), 0, &cpu); + if (ret) + return ret; + + if (cpu >= ICU_SWINT_NUM || cpu >= nr_cpu_ids) + return -EINVAL; + + if (!cpu_online(cpu)) + return -ENODEV; + + writel(BIT(cpu), priv->base + ICU_SWINT); + return len; +} + +static const struct file_operations rzv2h_icu_swint_fops = { + .open = simple_open, + .write = rzv2h_icu_swint_write, + .llseek = noop_llseek, +}; + +static int rzv2h_icu_setup_debug_irqs(struct platform_device *pdev) +{ + static const u8 swint_idx[ICU_SWINT_NUM] = { 0, 1, 2, 3 }; + static const char * const rzv2h_swint_names[] = { + "int-ca55-0", "int-ca55-1", + "int-ca55-2", "int-ca55-3", + }; + struct device *dev = &pdev->dev; + struct dentry *dentry; + struct dentry *dir; + unsigned int i; + int icu_irq; + int ret; + + if (!IS_ENABLED(CONFIG_DEBUG_FS) || !enable_icu_debug) + return 0; + + dev_info(dev, "RZ/V2H ICU debug interrupts enabled\n"); + + for (i = 0; i < ICU_SWINT_NUM; i++) { + icu_irq = platform_get_irq_byname(pdev, rzv2h_swint_names[i]); + if (icu_irq < 0) + return dev_err_probe(dev, icu_irq, + "Failed to get %s IRQ\n", rzv2h_swint_names[i]); + ret = devm_request_irq(dev, icu_irq, rzv2h_icu_swint_irq, 0, dev_name(dev), + (void *)&swint_idx[i]); + if (ret) + return dev_err_probe(dev, ret, "Failed to request SWINT IRQ: %s\n", + rzv2h_swint_names[i]); + } + + dir = debugfs_create_dir("rzv2h_icu", NULL); + if (IS_ERR(dir)) + return PTR_ERR(dir); + + ret = devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dir); + if (ret) + return ret; + + dentry = debugfs_create_file("swint", 0200, dir, rzv2h_icu_data, &rzv2h_icu_swint_fops); + if (IS_ERR(dentry)) + return PTR_ERR(dentry); + + return devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dentry); +} + static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_node *parent, const struct rzv2h_hw_info *hw_info) { @@ -605,6 +712,10 @@ static int rzv2h_icu_probe_common(struct platform_device *pdev, struct device_no register_syscore(&rzv2h_irqc_syscore); + ret = rzv2h_icu_setup_debug_irqs(pdev); + if (ret) + goto pm_put; + /* * coccicheck complains about a missing put_device call before returning, but it's a false * positive. We still need dev after successfully returning from this function. -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:35 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Handle the RZ/V2H ICU error interrupt to help diagnose latched bus, ECC RAM, and CA55/IP error conditions during bring-up and debugging. When debug support is enabled, register the error IRQ handler and provide a debugfs write interface to trigger pseudo error generation via ICU_SWPE for validation. Account for SoC differences in ECC RAM error register coverage so the handler only iterates over valid ECC status/clear banks, and route the RZ/V2N compatible to a probe path with the correct ECC range while keeping the existing RZ/V2H and RZ/G3E handling. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- drivers/irqchip/irq-renesas-rzv2h.c | 141 +++++++++++++++++++++++++++- 1 file changed, 140 insertions(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-renesas-rzv2h.c b/drivers/irqchip/irq-renesas-rzv2h.c index 7d3ce1d762f0..6dc297220f05 100644 --- a/drivers/irqchip/irq-renesas-rzv2h.c +++ b/drivers/irqchip/irq-renesas-rzv2h.c @@ -21,6 +21,7 @@ #include <linux/irqdomain.h> #include <linux/kconfig.h> #include <linux/kstrtox.h> +#include <linux/minmax.h> #include <linux/moduleparam.h> #include <linux/of_platform.h> #include <linux/pm_runtime.h> @@ -47,7 +48,15 @@ #define ICU_TSCLR 0x24 #define ICU_TITSR(k) (0x28 + (k) * 4) #define ICU_TSSR(k) (0x30 + (k) * 4) +#define ICU_BEISR(k) (0x70 + (k) * 4) +#define ICU_BECLR(k) (0x80 + (k) * 4) +#define ICU_EREISR(k) (0x90 + (k) * 4) +#define ICU_ERCLR(k) (0xE0 + (k) * 4) #define ICU_SWINT 0x130 +#define ICU_ERINTA55CTL(k) (0x338 + (k) * 4) +#define ICU_ERINTA55CRL(k) (0x348 + (k) * 4) +#define ICU_ERINTA55MSK(k) (0x358 + (k) * 4) +#define ICU_SWPE 0x370 #define ICU_DMkSELy(k, y) (0x420 + (k) * 0x20 + (y) * 4) #define ICU_DMACKSELk(k) (0x500 + (k) * 4) @@ -99,6 +108,9 @@ #define ICU_RZV2H_TSSEL_MAX_VAL 0x55 #define ICU_SWINT_NUM 4 +#define ICU_SWPE_NUM 16 +#define ICU_NUM_BE 4 +#define ICU_NUM_A55ERR 4 static bool enable_icu_debug; module_param_named(debug, enable_icu_debug, bool, 0644); @@ -123,12 +135,16 @@ struct rzv2h_irqc_reg_cache { * @t_offs: TINT offset * @max_tssel: TSSEL max value * @field_width: TSSR field width + * @ecc_start: Start index of ECC RAM interrupts + * @ecc_end: End index of ECC RAM interrupts */ struct rzv2h_hw_info { const u8 *tssel_lut; u16 t_offs; u8 max_tssel; u8 field_width; + u8 ecc_start; + u8 ecc_end; }; /* DMAC */ @@ -565,6 +581,48 @@ static int rzv2h_icu_parse_interrupts(struct rzv2h_icu_priv *priv, struct device return 0; } +static irqreturn_t rzv2h_icu_error_irq(int irq, void *data) +{ + struct rzv2h_icu_priv *priv = data; + const struct rzv2h_hw_info *hw_info = priv->info; + void __iomem *base = priv->base; + unsigned int k; + u32 st; + + /* 1) Bus errors (BEISR0..3) */ + for (k = 0; k < ICU_NUM_BE; k++) { + st = readl(base + ICU_BEISR(k)); + if (!st) + continue; + + writel(st, base + ICU_BECLR(k)); + pr_debug("rzv2h-icu: BUS error k=%u status=0x%08x\n", k, st); + } + + /* 2) ECC RAM errors (EREISR0..X) */ + for (k = hw_info->ecc_start; k <= hw_info->ecc_end; k++) { + st = readl(base + ICU_EREISR(k)); + if (!st) + continue; + + writel(st, base + ICU_ERCLR(k)); + pr_debug("rzv2h-icu: ECC error k=%u status=0x%08x\n", k, st); + } + + /* 3) IP/CA55 error interrupt status (ERINTA55CTL0..3) */ + for (k = 0; k < ICU_NUM_A55ERR; k++) { + st = readl(base + ICU_ERINTA55CTL(k)); + if (!st) + continue; + + /* there is no relation with status bits so clear all the interrupts */ + writel(0xffffffff, base + ICU_ERINTA55CRL(k)); + pr_debug("rzv2h-icu: IP/CA55 error k=%u status=0x%08x\n", k, st); + } + + return IRQ_HANDLED; +} + static irqreturn_t rzv2h_icu_swint_irq(int irq, void *data) { u8 cpu = *(u8 *)data; @@ -611,13 +669,47 @@ static const struct file_operations rzv2h_icu_swint_fops = { .llseek = noop_llseek, }; +static ssize_t rzv2h_icu_swpe_write(struct file *file, + const char __user *ubuf, + size_t len, loff_t *ppos) +{ + struct rzv2h_icu_priv *priv = file->private_data; + unsigned long swpe; + char buf[32]; + int ret; + + len = min(len, sizeof(buf) - 1); + if (copy_from_user(buf, ubuf, len)) + return -EFAULT; + buf[len] = '\0'; + + ret = kstrtoul(strim(buf), 0, &swpe); + if (ret) + return ret; + + if (swpe >= ICU_SWPE_NUM) + return -EINVAL; + + writel(BIT(swpe), priv->base + ICU_SWPE); + return len; +} + +static const struct file_operations rzv2h_icu_swpe_fops = { + .open = simple_open, + .write = rzv2h_icu_swpe_write, + .llseek = noop_llseek, +}; + static int rzv2h_icu_setup_debug_irqs(struct platform_device *pdev) { + const struct rzv2h_hw_info *hw_info = rzv2h_icu_data->info; static const u8 swint_idx[ICU_SWINT_NUM] = { 0, 1, 2, 3 }; static const char * const rzv2h_swint_names[] = { "int-ca55-0", "int-ca55-1", "int-ca55-2", "int-ca55-3", }; + static const char *icu_err = "icu-error-ca55"; + void __iomem *base = rzv2h_icu_data->base; struct device *dev = &pdev->dev; struct dentry *dentry; struct dentry *dir; @@ -654,6 +746,36 @@ static int rzv2h_icu_setup_debug_irqs(struct platform_device *pdev) if (IS_ERR(dentry)) return PTR_ERR(dentry); + ret = devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dentry); + if (ret) + return ret; + + icu_irq = platform_get_irq_byname(pdev, icu_err); + if (icu_irq < 0) + return dev_err_probe(dev, icu_irq, "Failed to get %s IRQ\n", icu_err); + + /* Unmask and clear all IP/CA55 error interrupts */ + for (i = 0; i < ICU_NUM_A55ERR; i++) { + writel(0xffffff, base + ICU_ERINTA55CRL(i)); + writel(0x0, base + ICU_ERINTA55MSK(i)); + } + + /* Clear all Bus errors */ + for (i = 0; i < ICU_NUM_BE; i++) + writel(0xffffffff, base + ICU_BECLR(i)); + + /* Clear all ECCRAM errors */ + for (i = hw_info->ecc_start; i <= hw_info->ecc_end; i++) + writel(0xffffffff, base + ICU_ERCLR(i)); + + ret = devm_request_irq(dev, icu_irq, rzv2h_icu_error_irq, 0, dev_name(dev), rzv2h_icu_data); + if (ret) + return dev_err_probe(dev, ret, "Failed to request %s IRQ\n", icu_err); + + dentry = debugfs_create_file("swpe", 0200, dir, rzv2h_icu_data, &rzv2h_icu_swpe_fops); + if (IS_ERR(dentry)) + return PTR_ERR(dentry); + return devm_add_action_or_reset(dev, rzv2h_icu_remove_debugfs, dentry); } @@ -759,12 +881,24 @@ static const struct rzv2h_hw_info rzg3e_hw_params = { .t_offs = ICU_RZG3E_TINT_OFFSET, .max_tssel = ICU_RZG3E_TSSEL_MAX_VAL, .field_width = 16, + .ecc_start = 1, + .ecc_end = 4, +}; + +static const struct rzv2h_hw_info rzv2n_hw_params = { + .t_offs = 0, + .max_tssel = ICU_RZV2H_TSSEL_MAX_VAL, + .field_width = 8, + .ecc_start = 0, + .ecc_end = 2, }; static const struct rzv2h_hw_info rzv2h_hw_params = { .t_offs = 0, .max_tssel = ICU_RZV2H_TSSEL_MAX_VAL, .field_width = 8, + .ecc_start = 0, + .ecc_end = 11, }; static int rzg3e_icu_probe(struct platform_device *pdev, struct device_node *parent) @@ -772,6 +906,11 @@ static int rzg3e_icu_probe(struct platform_device *pdev, struct device_node *par return rzv2h_icu_probe_common(pdev, parent, &rzg3e_hw_params); } +static int rzv2n_icu_probe(struct platform_device *pdev, struct device_node *parent) +{ + return rzv2h_icu_probe_common(pdev, parent, &rzv2n_hw_params); +} + static int rzv2h_icu_probe(struct platform_device *pdev, struct device_node *parent) { return rzv2h_icu_probe_common(pdev, parent, &rzv2h_hw_params); @@ -779,7 +918,7 @@ static int rzv2h_icu_probe(struct platform_device *pdev, struct device_node *par IRQCHIP_PLATFORM_DRIVER_BEGIN(rzv2h_icu) IRQCHIP_MATCH("renesas,r9a09g047-icu", rzg3e_icu_probe) -IRQCHIP_MATCH("renesas,r9a09g056-icu", rzv2h_icu_probe) +IRQCHIP_MATCH("renesas,r9a09g056-icu", rzv2n_icu_probe) IRQCHIP_MATCH("renesas,r9a09g057-icu", rzv2h_icu_probe) IRQCHIP_PLATFORM_DRIVER_END(rzv2h_icu) MODULE_AUTHOR("Fabrizio Castro <fabrizio.castro.jz@renesas.com>"); -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:36 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Document the debugfs interface exported by the Renesas RZ/V2H ICU driver to aid bring-up and debugging. Describe the write-only swint and swpe files used to trigger software and pseudo error interrupts. Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> --- .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 +++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu diff --git a/Documentation/ABI/testing/debugfs-renesas-rzv2h-icu b/Documentation/ABI/testing/debugfs-renesas-rzv2h-icu new file mode 100644 index 000000000000..8e97f35c3fea --- /dev/null +++ b/Documentation/ABI/testing/debugfs-renesas-rzv2h-icu @@ -0,0 +1,24 @@ +What: /sys/kernel/debug/rzv2h_icu/swint +Date: Jan 2026 +KernelVersion: 6.20 +Contact: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> +Description: Write-only debugfs file to trigger ICU software interrupts + (ICU_SWINT) targeting CA55 cores. + Writing an integer CPU index 'N' causes the driver to write + BIT(N) to the ICU_SWINT register, which triggers the hardware + software interrupt routed to CA55 core N via the GIC. + Valid values: + 0..3 - trigger SWINT for CA55 core0..core3 + The driver validates that the requested CPU is online before + triggering the interrupt. Writes for offline CPUs fail. + +What: /sys/kernel/debug/rzv2h_icu/swpe +Date: Jan 2026 +KernelVersion: 6.20 +Contact: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> +Description: Write-only debugfs file to trigger ICU software peripheral + events (ICU_SWPE). + Writing an integer index 'N' causes the driver to write BIT(N) + to the ICU_SWPE register. + Valid values: + 0..15 - assert SWPE bit 0..15 -- 2.52.0
{ "author": "Prabhakar <prabhakar.csengg@gmail.com>", "date": "Wed, 21 Jan 2026 15:01:37 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Prabhakar, Just a question, If the irq handler is meant for debugging/bring-up, can this irq handler activated only for debug session instead of unconditionally enabling it? Cheers, Biju
{ "author": "Biju Das <biju.das.jz@bp.renesas.com>", "date": "Thu, 22 Jan 2026 08:20:30 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Biju, On Thu, Jan 22, 2026 at 8:20 AM Biju Das <biju.das.jz@bp.renesas.com> wrote: The IRQ handler is registered only when `irq_renesas_rzv2h.debug=1` is present in the bootargs. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Thu, 22 Jan 2026 09:18:52 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Prabhakar, Thanks for clarification. Cheers, Biju
{ "author": "Biju Das <biju.das.jz@bp.renesas.com>", "date": "Thu, 22 Jan 2026 09:26:00 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Prabhakar, On Wed, 21 Jan 2026 at 16:01, Prabhakar <prabhakar.csengg@gmail.com> wrote: Thanks for your patch! [...] drivers/irqchip/irq-renesas-rzv2h.c:730:23: error: implicit declaration of function ‘devm_request_irq’; did you mean ‘can_request_irq’? [-Werror=implicit-function-declaration] How does this build for you, without including <linux/interrupt.h>? Gr{oetje,eeting}s, Geert -- Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that. -- Linus Torvalds
{ "author": "Geert Uytterhoeven <geert@linux-m68k.org>", "date": "Fri, 23 Jan 2026 11:45:19 +0100", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Geert, Thank you for the review. On Fri, Jan 23, 2026 at 10:45 AM Geert Uytterhoeven <geert@linux-m68k.org> wrote: While posting the patches, I had rebased them on next-20260119 (and used defconfig), but I didn't see any build issues. Below is the snippet from irq-renesas-rzv2h.i: struct ns_common; int open_related_ns(struct ns_common *ns, struct ns_common *(*get_ns)(struct ns_common *ns)); static inline __attribute__((__gnu_inline__)) __attribute__((__unused__)) __attribute__((__no_instrument_function__)) struct pid_namespace *proc_pid_ns(struct super_block *sb) { return proc_sb_info(sb)->pid_ns; } bool proc_ns_file(const struct file *file); # 20 "./include/linux/efi.h" 2 # 1 "./include/linux/rtc.h" 1 # 17 "./include/linux/rtc.h" # 1 "./include/linux/interrupt.h" 1 # 9 "./include/linux/interrupt.h" # 1 "./include/linux/irqreturn.h" 1 # 11 "./include/linux/irqreturn.h" enum irqreturn { IRQ_NONE = (0 << 0), IRQ_HANDLED = (1 << 0), IRQ_WAKE_THREAD = (1 << 1), }; typedef enum irqreturn irqreturn_t; # 10 "./include/linux/interrupt.h" 2 # 1 "./include/linux/hardirq.h" 1 Tracing through the above interrupt.h was included in below : ------------------------------------------------------------------------------- drivers/irqchip/irq-renesas-rzv2h.c - (line 19) #include <linux/irqchip.h> #include <linux/acpi.h> #include <acpi/acpi_io.h> #include <asm/acpi.h> #include <linux/efi.h> #include <linux/rtc.h> #include <linux/interrupt.h> Now that you mentioned there was a build issue, I tried with renesas_defconfig and I do get the build issue which you pointed out. I'll respin a v2 with #include <linux/interrupt.h> included explicitly. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Fri, 23 Jan 2026 11:24:08 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Wed, Jan 21 2026 at 15:01, Prabhakar wrote: Can't you reuse/extend the existing mechanism provided by CONFIG_GENERIC_IRQ_INJECTION (irq_inject_interrupt(), irq_debug_write()) instead of implementing yet another ad hoc debugfs magic? Thanks, tglx
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Mon, 26 Jan 2026 17:03:49 +0100", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Wed, Jan 21 2026 at 15:01, Prabhakar wrote: Why is that only relevant to bring-up and debugging? Those errors can't happen in production, right? Thanks, tglx
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Mon, 26 Jan 2026 17:11:47 +0100", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Thomas, Thank you for the feedback. On Mon, Jan 26, 2026 at 4:03 PM Thomas Gleixner <tglx@kernel.org> wrote: Can you please point me to a driver which makes use of it? In my case the interrupt needs to be triggered when BIT(n) (n=0-3) is written to ICU_SWINT. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Thu, 29 Jan 2026 21:24:02 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Thu, Jan 29 2026 at 21:24, Prabhakar Lad wrote: Care to look what irq_inject_interrupt() does? It tries first to inject the interrupt via irq_set_irqchip_state(), which only works when a chip in the hierarchy implements the chip::irq_set_irqchip_state() callback. If that fails, it uses the resend mechanism, which utilizes the chip::irq_retrigger() callback. I'm sure you know how to grep for drivers which implement one of them :) Thanks, tglx
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Thu, 29 Jan 2026 22:59:05 +0100", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Thomas, On Thu, Jan 29, 2026 at 9:59 PM Thomas Gleixner <tglx@kernel.org> wrote: I did implement irq_set_irqchip_state but it doesn't land in the rzv2h_icu_irq_set_irqchip_state(). So I was wondering if I missed something. #Trigger int-ca55-0 root@rzv2h-evk:/sys/kernel/debug/irq/irqs# echo trigger > 14 #The trace looks like below: irq_debug_write() -> irq_inject_interrupt() -> irq_set_irqchip_state() This lands in GICV3. For the RZ/V2H ICU only interrupts port_irqx and tintx interrupts are registered in irq_domain_create_hierarchy() for the rest of the interrupts these are supposed to be directly handled by GICv3. root@rzv2h-evk:/sys/kernel/debug/irq/irqs# cat /proc/interrupts | grep interr | grep 294 14: 1 0 0 0 GICv3 294 Edge 10400000.interrupt-controller root@rzv2h-evk:/sys/kernel/debug/irq/irqs# cat 14 handler: handle_fasteoi_irq device: (null) status: 0x00000001 istate: 0x00004000 ddepth: 0 wdepth: 0 dstate: 0x0b400201 IRQ_TYPE_EDGE_RISING IRQD_ACTIVATED IRQD_IRQ_STARTED IRQD_SINGLE_TARGET IRQD_DEFAULT_TRIGGER_SET IRQD_HANDLE_ENFORCE_IRQCTX node: -1 affinity: 0-3 effectiv: 0 domain: :soc:interrupt-controller@14900000-1 hwirq: 0x126 chip: GICv3 flags: 0x15 IRQCHIP_SET_TYPE_MASKED IRQCHIP_MASK_ON_SUSPEND IRQCHIP_SKIP_SET_WAKE How do you propose to handle this? irq_inject_interrupt() would work if I move int-ca55-x and icu-error-ca55 under irq_domain_create_hierarchy(). Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Fri, 30 Jan 2026 11:17:08 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
On Fri, Jan 30 2026 at 11:17, Lad, Prabhakar wrote: ... Correct. That's how the hierarchy works.
{ "author": "Thomas Gleixner <tglx@kernel.org>", "date": "Fri, 30 Jan 2026 15:52:38 +0100", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH 0/6] irqchip/renesas-rzv2h: Add support to handle ICU error IRQ and add SWPE trigger
From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Hi All, This patch series aims to enhance the Renesas RZ/V2H ICU irqchip driver by adding support to handle ICU error IRQs and introducing a software-generated interrupt (SWPE) trigger. The series includes the following changes: - Use local pointers for device tree nodes and devices - Switch to using dev_err_probe() - Add software-triggered interrupt support - Add handling for ICU error IRQs and SWPE trigger - Document the new debugfs triggers Cheers, Prabhakar Lad Prabhakar (6): irqchip/renesas-rzv2h: Use local node pointer irqchip/renesas-rzv2h: Use local device pointer in ICU probe irqchip/renesas-rzv2h: Switch to using dev_err_probe() irqchip/renesas-rzv2h: Add CA55 software interrupt support irqchip/renesas-rzv2h: Handle ICU error IRQ and add SWPE trigger Documentation: ABI: Document rzv2h_icu debugfs triggers .../ABI/testing/debugfs-renesas-rzv2h-icu | 24 ++ drivers/irqchip/irq-renesas-rzv2h.c | 303 ++++++++++++++++-- 2 files changed, 296 insertions(+), 31 deletions(-) create mode 100644 Documentation/ABI/testing/debugfs-renesas-rzv2h-icu -- 2.52.0
Hi Thomas, On Mon, Jan 26, 2026 at 4:11 PM Thomas Gleixner <tglx@kernel.org> wrote: The error conditions can happen in production too. So I'll enable them by default and drop the debug module param. Cheers, Prabhakar
{ "author": "\"Lad, Prabhakar\" <prabhakar.csengg@gmail.com>", "date": "Mon, 2 Feb 2026 19:02:33 +0000", "thread_id": "CA+V-a8s+wqRainda_J2uBbaoYO99OSgOp+LcpMe+5G+JLV8C_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH] gfs2: fix memory leaks in gfs2_fill_super error path
Fix two memory leaks in the gfs2_fill_super() error handling path when transitioning a filesystem to read-write mode fails. First leak: kthread objects (thread_struct, task_struct, etc.) When gfs2_freeze_lock_shared() fails after init_threads() succeeds, the created kernel threads (logd and quotad) are never destroyed. This occurs because the fail_per_node label doesn't call gfs2_destroy_threads(). Second leak: quota bitmap buffer (8192 bytes) When gfs2_make_fs_rw() fails after gfs2_quota_init() succeeds but before other operations complete, the allocated quota bitmap is never freed. The error path destroyed threads but didn't cleanup quota structures. The fix consolidates thread cleanup at the fail_per_node label for all error paths, which is safe because gfs2_destroy_threads() checks for NULL pointers before calling kthread_stop_put(). Quota cleanup is added specifically to the gfs2_make_fs_rw() error path where quota structures were initialized. Syzbot detected these leaks with the following signatures: Thread leak (PATH 3: gfs2_freeze_lock_shared failure): unreferenced object 0xffff88801d7bca80 (size 4480): copy_process+0x3a1/0x4670 kernel/fork.c:2422 kernel_clone+0xf3/0x6e0 kernel/fork.c:2779 kthread_create_on_node+0x100/0x150 kernel/kthread.c:478 init_threads+0xab/0x350 fs/gfs2/ops_fstype.c:611 gfs2_fill_super+0xe5c/0x1240 fs/gfs2/ops_fstype.c:1265 Quota leak (PATH 4: gfs2_make_fs_rw failure): unreferenced object 0xffff88812de7c000 (size 8192): gfs2_quota_init+0xe5/0x820 fs/gfs2/quota.c:1409 gfs2_make_fs_rw+0x7a/0xe0 fs/gfs2/super.c:149 gfs2_fill_super+0xfbb/0x1240 fs/gfs2/ops_fstype.c:1275 Reported-by: syzbot+aac438d7a1c44071e04b@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=aac438d7a1c44071e04b Signed-off-by: Deepanshu Kartikey <Kartikey406@gmail.com> --- fs/gfs2/ops_fstype.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/fs/gfs2/ops_fstype.c b/fs/gfs2/ops_fstype.c index e7a88b717991..fdc70189e4f1 100644 --- a/fs/gfs2/ops_fstype.c +++ b/fs/gfs2/ops_fstype.c @@ -1276,7 +1276,7 @@ static int gfs2_fill_super(struct super_block *sb, struct fs_context *fc) if (error) { gfs2_freeze_unlock(sdp); - gfs2_destroy_threads(sdp); + gfs2_quota_cleanup(sdp); fs_err(sdp, "can't make FS RW: %d\n", error); goto fail_per_node; } @@ -1286,6 +1286,8 @@ static int gfs2_fill_super(struct super_block *sb, struct fs_context *fc) fail_per_node: init_per_node(sdp, UNDO); + if (!sb_rdonly(sb)) + gfs2_destroy_threads(sdp); fail_inodes: init_inodes(sdp, UNDO); fail_sb: -- 2.43.0
Hello Deepanshu, thanks for this patch; see below. On Sat, Jan 31, 2026 at 7:25 AM Deepanshu Kartikey <kartikey406@gmail.com> wrote: This isn't pretty. Can it be replaced by the following? --- a/fs/gfs2/super.c +++ b/fs/gfs2/super.c @@ -147,8 +147,10 @@ int gfs2_make_fs_rw(struct gfs2_sbd *sdp) } error = gfs2_quota_init(sdp); - if (!error && gfs2_withdrawn(sdp)) + if (!error && gfs2_withdrawn(sdp)) { + gfs2_quota_cleanup(sdp); error = -EIO; + } if (!error) set_bit(SDF_JOURNAL_LIVE, &sdp->sd_flags); return error; gfs2_destroy_threads() can be called unconditionally here. Thanks, Andreas
{ "author": "Andreas Gruenbacher <agruenba@redhat.com>", "date": "Mon, 2 Feb 2026 19:57:06 +0100", "thread_id": "CAHc6FU5=rG-GaSnHsU2aUO83i8zNpsYDyryuenJzRov64BsQ_g@mail.gmail.com.mbox.gz" }
lkml
[PATCH net-next v2] net: bridge: use sysfs_emit instead of sprintf
Replace sprintf with sysfs_emit in sysfs show() methods as outlined in Documentation/filesystems/sysfs.rst. sysfs_emit is preferred to sprintf in sysfs show() methods as it is safer with buffer handling. Signed-off-by: David Corvaglia <david@corvaglia.dev> --- v2: Fix alignment of sysfs_emit arguments. v1: https://lore.kernel.org/bridge/0100019c14f90490-950ddd9b-1897-4111-bddd-0d4b8abf380a-000000@email.amazonses.com/ This is my first patch to the kernel! I've been able to build and boot with the patch. I also tested the sysfs reads and they seem to be correct. Any feedback is appreciated. net/bridge/br_stp_if.c | 8 +-- net/bridge/br_sysfs_br.c | 108 +++++++++++++++++++-------------------- net/bridge/br_sysfs_if.c | 32 ++++++------ 3 files changed, 73 insertions(+), 75 deletions(-) diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c index c20a41bf253b..cc4b27ff1b08 100644 --- a/net/bridge/br_stp_if.c +++ b/net/bridge/br_stp_if.c @@ -344,8 +344,8 @@ int br_stp_set_path_cost(struct net_bridge_port *p, unsigned long path_cost) ssize_t br_show_bridge_id(char *buf, const struct bridge_id *id) { - return sprintf(buf, "%.2x%.2x.%.2x%.2x%.2x%.2x%.2x%.2x\n", - id->prio[0], id->prio[1], - id->addr[0], id->addr[1], id->addr[2], - id->addr[3], id->addr[4], id->addr[5]); + return sysfs_emit(buf, "%.2x%.2x.%.2x%.2x%.2x%.2x%.2x%.2x\n", + id->prio[0], id->prio[1], + id->addr[0], id->addr[1], id->addr[2], + id->addr[3], id->addr[4], id->addr[5]); } diff --git a/net/bridge/br_sysfs_br.c b/net/bridge/br_sysfs_br.c index cb4855ed9500..4ed3d3e3afc2 100644 --- a/net/bridge/br_sysfs_br.c +++ b/net/bridge/br_sysfs_br.c @@ -67,7 +67,7 @@ static ssize_t forward_delay_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", jiffies_to_clock_t(br->forward_delay)); + return sysfs_emit(buf, "%lu\n", jiffies_to_clock_t(br->forward_delay)); } static int set_forward_delay(struct net_bridge *br, unsigned long val, @@ -87,8 +87,8 @@ static DEVICE_ATTR_RW(forward_delay); static ssize_t hello_time_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(to_bridge(d)->hello_time)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(to_bridge(d)->hello_time)); } static int set_hello_time(struct net_bridge *br, unsigned long val, @@ -108,8 +108,8 @@ static DEVICE_ATTR_RW(hello_time); static ssize_t max_age_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(to_bridge(d)->max_age)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(to_bridge(d)->max_age)); } static int set_max_age(struct net_bridge *br, unsigned long val, @@ -129,7 +129,7 @@ static ssize_t ageing_time_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", jiffies_to_clock_t(br->ageing_time)); + return sysfs_emit(buf, "%lu\n", jiffies_to_clock_t(br->ageing_time)); } static int set_ageing_time(struct net_bridge *br, unsigned long val, @@ -150,7 +150,7 @@ static ssize_t stp_state_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->stp_enabled); + return sysfs_emit(buf, "%d\n", br->stp_enabled); } @@ -173,7 +173,7 @@ static ssize_t group_fwd_mask_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%#x\n", br->group_fwd_mask); + return sysfs_emit(buf, "%#x\n", br->group_fwd_mask); } static int set_group_fwd_mask(struct net_bridge *br, unsigned long val, @@ -200,8 +200,8 @@ static ssize_t priority_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", - (br->bridge_id.prio[0] << 8) | br->bridge_id.prio[1]); + return sysfs_emit(buf, "%d\n", + (br->bridge_id.prio[0] << 8) | br->bridge_id.prio[1]); } static int set_priority(struct net_bridge *br, unsigned long val, @@ -235,21 +235,21 @@ static DEVICE_ATTR_RO(bridge_id); static ssize_t root_port_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%d\n", to_bridge(d)->root_port); + return sysfs_emit(buf, "%d\n", to_bridge(d)->root_port); } static DEVICE_ATTR_RO(root_port); static ssize_t root_path_cost_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%d\n", to_bridge(d)->root_path_cost); + return sysfs_emit(buf, "%d\n", to_bridge(d)->root_path_cost); } static DEVICE_ATTR_RO(root_path_cost); static ssize_t topology_change_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%d\n", to_bridge(d)->topology_change); + return sysfs_emit(buf, "%d\n", to_bridge(d)->topology_change); } static DEVICE_ATTR_RO(topology_change); @@ -258,7 +258,7 @@ static ssize_t topology_change_detected_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->topology_change_detected); + return sysfs_emit(buf, "%d\n", br->topology_change_detected); } static DEVICE_ATTR_RO(topology_change_detected); @@ -266,7 +266,7 @@ static ssize_t hello_timer_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->hello_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->hello_timer)); } static DEVICE_ATTR_RO(hello_timer); @@ -274,7 +274,7 @@ static ssize_t tcn_timer_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->tcn_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->tcn_timer)); } static DEVICE_ATTR_RO(tcn_timer); @@ -283,7 +283,7 @@ static ssize_t topology_change_timer_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->topology_change_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->topology_change_timer)); } static DEVICE_ATTR_RO(topology_change_timer); @@ -291,7 +291,7 @@ static ssize_t gc_timer_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->gc_work.timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->gc_work.timer)); } static DEVICE_ATTR_RO(gc_timer); @@ -299,7 +299,7 @@ static ssize_t group_addr_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%pM\n", br->group_addr); + return sysfs_emit(buf, "%pM\n", br->group_addr); } static ssize_t group_addr_store(struct device *d, @@ -365,7 +365,7 @@ static ssize_t no_linklocal_learn_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br_boolopt_get(br, BR_BOOLOPT_NO_LL_LEARN)); + return sysfs_emit(buf, "%d\n", br_boolopt_get(br, BR_BOOLOPT_NO_LL_LEARN)); } static int set_no_linklocal_learn(struct net_bridge *br, unsigned long val, @@ -387,7 +387,7 @@ static ssize_t multicast_router_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->multicast_ctx.multicast_router); + return sysfs_emit(buf, "%d\n", br->multicast_ctx.multicast_router); } static int set_multicast_router(struct net_bridge *br, unsigned long val, @@ -409,7 +409,7 @@ static ssize_t multicast_snooping_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br_opt_get(br, BROPT_MULTICAST_ENABLED)); + return sysfs_emit(buf, "%d\n", br_opt_get(br, BROPT_MULTICAST_ENABLED)); } static ssize_t multicast_snooping_store(struct device *d, @@ -425,8 +425,8 @@ static ssize_t multicast_query_use_ifaddr_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", - br_opt_get(br, BROPT_MULTICAST_QUERY_USE_IFADDR)); + return sysfs_emit(buf, "%d\n", + br_opt_get(br, BROPT_MULTICAST_QUERY_USE_IFADDR)); } static int set_query_use_ifaddr(struct net_bridge *br, unsigned long val, @@ -450,7 +450,7 @@ static ssize_t multicast_querier_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->multicast_ctx.multicast_querier); + return sysfs_emit(buf, "%d\n", br->multicast_ctx.multicast_querier); } static int set_multicast_querier(struct net_bridge *br, unsigned long val, @@ -470,7 +470,7 @@ static DEVICE_ATTR_RW(multicast_querier); static ssize_t hash_elasticity_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%u\n", RHT_ELASTICITY); + return sysfs_emit(buf, "%u\n", RHT_ELASTICITY); } static int set_elasticity(struct net_bridge *br, unsigned long val, @@ -494,7 +494,7 @@ static ssize_t hash_max_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->hash_max); + return sysfs_emit(buf, "%u\n", br->hash_max); } static int set_hash_max(struct net_bridge *br, unsigned long val, @@ -517,7 +517,7 @@ static ssize_t multicast_igmp_version_show(struct device *d, { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_igmp_version); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_igmp_version); } static int set_multicast_igmp_version(struct net_bridge *br, unsigned long val, @@ -539,7 +539,7 @@ static ssize_t multicast_last_member_count_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_last_member_count); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_last_member_count); } static int set_last_member_count(struct net_bridge *br, unsigned long val, @@ -561,7 +561,7 @@ static ssize_t multicast_startup_query_count_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_startup_query_count); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_startup_query_count); } static int set_startup_query_count(struct net_bridge *br, unsigned long val, @@ -583,8 +583,8 @@ static ssize_t multicast_last_member_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_last_member_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_last_member_interval)); } static int set_last_member_interval(struct net_bridge *br, unsigned long val, @@ -606,8 +606,8 @@ static ssize_t multicast_membership_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_membership_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_membership_interval)); } static int set_membership_interval(struct net_bridge *br, unsigned long val, @@ -630,8 +630,8 @@ static ssize_t multicast_querier_interval_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_querier_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_querier_interval)); } static int set_querier_interval(struct net_bridge *br, unsigned long val, @@ -654,8 +654,8 @@ static ssize_t multicast_query_interval_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_query_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_query_interval)); } static int set_query_interval(struct net_bridge *br, unsigned long val, @@ -677,9 +677,8 @@ static ssize_t multicast_query_response_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf( - buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_query_response_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_query_response_interval)); } static int set_query_response_interval(struct net_bridge *br, unsigned long val, @@ -701,9 +700,8 @@ static ssize_t multicast_startup_query_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf( - buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_startup_query_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_startup_query_interval)); } static int set_startup_query_interval(struct net_bridge *br, unsigned long val, @@ -727,8 +725,8 @@ static ssize_t multicast_stats_enabled_show(struct device *d, { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", - br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)); + return sysfs_emit(buf, "%d\n", + br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)); } static int set_stats_enabled(struct net_bridge *br, unsigned long val, @@ -754,7 +752,7 @@ static ssize_t multicast_mld_version_show(struct device *d, { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_mld_version); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_mld_version); } static int set_multicast_mld_version(struct net_bridge *br, unsigned long val, @@ -777,7 +775,7 @@ static ssize_t nf_call_iptables_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IPTABLES)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IPTABLES)); } static int set_nf_call_iptables(struct net_bridge *br, unsigned long val, @@ -799,7 +797,7 @@ static ssize_t nf_call_ip6tables_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IP6TABLES)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IP6TABLES)); } static int set_nf_call_ip6tables(struct net_bridge *br, unsigned long val, @@ -821,7 +819,7 @@ static ssize_t nf_call_arptables_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_ARPTABLES)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_ARPTABLES)); } static int set_nf_call_arptables(struct net_bridge *br, unsigned long val, @@ -845,7 +843,7 @@ static ssize_t vlan_filtering_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br_opt_get(br, BROPT_VLAN_ENABLED)); + return sysfs_emit(buf, "%d\n", br_opt_get(br, BROPT_VLAN_ENABLED)); } static ssize_t vlan_filtering_store(struct device *d, @@ -861,7 +859,7 @@ static ssize_t vlan_protocol_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%#06x\n", ntohs(br->vlan_proto)); + return sysfs_emit(buf, "%#06x\n", ntohs(br->vlan_proto)); } static ssize_t vlan_protocol_store(struct device *d, @@ -877,7 +875,7 @@ static ssize_t default_pvid_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->default_pvid); + return sysfs_emit(buf, "%d\n", br->default_pvid); } static ssize_t default_pvid_store(struct device *d, @@ -893,7 +891,7 @@ static ssize_t vlan_stats_enabled_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_ENABLED)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_ENABLED)); } static int set_vlan_stats_enabled(struct net_bridge *br, unsigned long val, @@ -915,7 +913,7 @@ static ssize_t vlan_stats_per_port_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_PER_PORT)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_PER_PORT)); } static int set_vlan_stats_per_port(struct net_bridge *br, unsigned long val, diff --git a/net/bridge/br_sysfs_if.c b/net/bridge/br_sysfs_if.c index 74fdd8105dca..1f57c36a7fc0 100644 --- a/net/bridge/br_sysfs_if.c +++ b/net/bridge/br_sysfs_if.c @@ -47,7 +47,7 @@ const struct brport_attribute brport_attr_##_name = { \ #define BRPORT_ATTR_FLAG(_name, _mask) \ static ssize_t show_##_name(struct net_bridge_port *p, char *buf) \ { \ - return sprintf(buf, "%d\n", !!(p->flags & _mask)); \ + return sysfs_emit(buf, "%d\n", !!(p->flags & _mask)); \ } \ static int store_##_name(struct net_bridge_port *p, unsigned long v) \ { \ @@ -83,7 +83,7 @@ static int store_flag(struct net_bridge_port *p, unsigned long v, static ssize_t show_path_cost(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->path_cost); + return sysfs_emit(buf, "%d\n", p->path_cost); } static BRPORT_ATTR(path_cost, 0644, @@ -91,7 +91,7 @@ static BRPORT_ATTR(path_cost, 0644, static ssize_t show_priority(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->priority); + return sysfs_emit(buf, "%d\n", p->priority); } static BRPORT_ATTR(priority, 0644, @@ -111,65 +111,65 @@ static BRPORT_ATTR(designated_bridge, 0444, show_designated_bridge, NULL); static ssize_t show_designated_port(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->designated_port); + return sysfs_emit(buf, "%d\n", p->designated_port); } static BRPORT_ATTR(designated_port, 0444, show_designated_port, NULL); static ssize_t show_designated_cost(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->designated_cost); + return sysfs_emit(buf, "%d\n", p->designated_cost); } static BRPORT_ATTR(designated_cost, 0444, show_designated_cost, NULL); static ssize_t show_port_id(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "0x%x\n", p->port_id); + return sysfs_emit(buf, "0x%x\n", p->port_id); } static BRPORT_ATTR(port_id, 0444, show_port_id, NULL); static ssize_t show_port_no(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "0x%x\n", p->port_no); + return sysfs_emit(buf, "0x%x\n", p->port_no); } static BRPORT_ATTR(port_no, 0444, show_port_no, NULL); static ssize_t show_change_ack(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->topology_change_ack); + return sysfs_emit(buf, "%d\n", p->topology_change_ack); } static BRPORT_ATTR(change_ack, 0444, show_change_ack, NULL); static ssize_t show_config_pending(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->config_pending); + return sysfs_emit(buf, "%d\n", p->config_pending); } static BRPORT_ATTR(config_pending, 0444, show_config_pending, NULL); static ssize_t show_port_state(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->state); + return sysfs_emit(buf, "%d\n", p->state); } static BRPORT_ATTR(state, 0444, show_port_state, NULL); static ssize_t show_message_age_timer(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%ld\n", br_timer_value(&p->message_age_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&p->message_age_timer)); } static BRPORT_ATTR(message_age_timer, 0444, show_message_age_timer, NULL); static ssize_t show_forward_delay_timer(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%ld\n", br_timer_value(&p->forward_delay_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&p->forward_delay_timer)); } static BRPORT_ATTR(forward_delay_timer, 0444, show_forward_delay_timer, NULL); static ssize_t show_hold_timer(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%ld\n", br_timer_value(&p->hold_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&p->hold_timer)); } static BRPORT_ATTR(hold_timer, 0444, show_hold_timer, NULL); @@ -182,7 +182,7 @@ static BRPORT_ATTR(flush, 0200, NULL, store_flush); static ssize_t show_group_fwd_mask(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%#x\n", p->group_fwd_mask); + return sysfs_emit(buf, "%#x\n", p->group_fwd_mask); } static int store_group_fwd_mask(struct net_bridge_port *p, @@ -205,7 +205,7 @@ static ssize_t show_backup_port(struct net_bridge_port *p, char *buf) rcu_read_lock(); backup_p = rcu_dereference(p->backup_port); if (backup_p) - ret = sprintf(buf, "%s\n", backup_p->dev->name); + ret = sysfs_emit(buf, "%s\n", backup_p->dev->name); rcu_read_unlock(); return ret; @@ -244,7 +244,7 @@ BRPORT_ATTR_FLAG(isolated, BR_ISOLATED); #ifdef CONFIG_BRIDGE_IGMP_SNOOPING static ssize_t show_multicast_router(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->multicast_ctx.multicast_router); + return sysfs_emit(buf, "%d\n", p->multicast_ctx.multicast_router); } static int store_multicast_router(struct net_bridge_port *p, -- 2.43.0
On Mon, Feb 02, 2026 at 07:07:12AM +0000, David Corvaglia wrote: I get: $ b4 shazam -k 0100019c1d2d46e0-a083f912-ac82-47e8-8cbb-ac9d70355ed3-000000@email.amazonses.com [...] ● checkpatch.pl: 392: ERROR: code indent should use tabs where possible [...] $ scripts/checkpatch.pl -g HEAD ERROR: code indent should use tabs where possible #332: FILE: net/bridge/br_sysfs_br.c:681: +^I^I jiffies_to_clock_t(br->multicast_ctx.multicast_query_response_interval));$ total: 1 errors, 0 warnings, 0 checks, 495 lines checked
{ "author": "Ido Schimmel <idosch@nvidia.com>", "date": "Mon, 2 Feb 2026 19:44:09 +0200", "thread_id": "0100019c1fbca989-a2726974-1033-4468-bd63-a5c306949e37-000000@email.amazonses.com.mbox.gz" }
lkml
[PATCH net-next v2] net: bridge: use sysfs_emit instead of sprintf
Replace sprintf with sysfs_emit in sysfs show() methods as outlined in Documentation/filesystems/sysfs.rst. sysfs_emit is preferred to sprintf in sysfs show() methods as it is safer with buffer handling. Signed-off-by: David Corvaglia <david@corvaglia.dev> --- v2: Fix alignment of sysfs_emit arguments. v1: https://lore.kernel.org/bridge/0100019c14f90490-950ddd9b-1897-4111-bddd-0d4b8abf380a-000000@email.amazonses.com/ This is my first patch to the kernel! I've been able to build and boot with the patch. I also tested the sysfs reads and they seem to be correct. Any feedback is appreciated. net/bridge/br_stp_if.c | 8 +-- net/bridge/br_sysfs_br.c | 108 +++++++++++++++++++-------------------- net/bridge/br_sysfs_if.c | 32 ++++++------ 3 files changed, 73 insertions(+), 75 deletions(-) diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c index c20a41bf253b..cc4b27ff1b08 100644 --- a/net/bridge/br_stp_if.c +++ b/net/bridge/br_stp_if.c @@ -344,8 +344,8 @@ int br_stp_set_path_cost(struct net_bridge_port *p, unsigned long path_cost) ssize_t br_show_bridge_id(char *buf, const struct bridge_id *id) { - return sprintf(buf, "%.2x%.2x.%.2x%.2x%.2x%.2x%.2x%.2x\n", - id->prio[0], id->prio[1], - id->addr[0], id->addr[1], id->addr[2], - id->addr[3], id->addr[4], id->addr[5]); + return sysfs_emit(buf, "%.2x%.2x.%.2x%.2x%.2x%.2x%.2x%.2x\n", + id->prio[0], id->prio[1], + id->addr[0], id->addr[1], id->addr[2], + id->addr[3], id->addr[4], id->addr[5]); } diff --git a/net/bridge/br_sysfs_br.c b/net/bridge/br_sysfs_br.c index cb4855ed9500..4ed3d3e3afc2 100644 --- a/net/bridge/br_sysfs_br.c +++ b/net/bridge/br_sysfs_br.c @@ -67,7 +67,7 @@ static ssize_t forward_delay_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", jiffies_to_clock_t(br->forward_delay)); + return sysfs_emit(buf, "%lu\n", jiffies_to_clock_t(br->forward_delay)); } static int set_forward_delay(struct net_bridge *br, unsigned long val, @@ -87,8 +87,8 @@ static DEVICE_ATTR_RW(forward_delay); static ssize_t hello_time_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(to_bridge(d)->hello_time)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(to_bridge(d)->hello_time)); } static int set_hello_time(struct net_bridge *br, unsigned long val, @@ -108,8 +108,8 @@ static DEVICE_ATTR_RW(hello_time); static ssize_t max_age_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(to_bridge(d)->max_age)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(to_bridge(d)->max_age)); } static int set_max_age(struct net_bridge *br, unsigned long val, @@ -129,7 +129,7 @@ static ssize_t ageing_time_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", jiffies_to_clock_t(br->ageing_time)); + return sysfs_emit(buf, "%lu\n", jiffies_to_clock_t(br->ageing_time)); } static int set_ageing_time(struct net_bridge *br, unsigned long val, @@ -150,7 +150,7 @@ static ssize_t stp_state_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->stp_enabled); + return sysfs_emit(buf, "%d\n", br->stp_enabled); } @@ -173,7 +173,7 @@ static ssize_t group_fwd_mask_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%#x\n", br->group_fwd_mask); + return sysfs_emit(buf, "%#x\n", br->group_fwd_mask); } static int set_group_fwd_mask(struct net_bridge *br, unsigned long val, @@ -200,8 +200,8 @@ static ssize_t priority_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", - (br->bridge_id.prio[0] << 8) | br->bridge_id.prio[1]); + return sysfs_emit(buf, "%d\n", + (br->bridge_id.prio[0] << 8) | br->bridge_id.prio[1]); } static int set_priority(struct net_bridge *br, unsigned long val, @@ -235,21 +235,21 @@ static DEVICE_ATTR_RO(bridge_id); static ssize_t root_port_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%d\n", to_bridge(d)->root_port); + return sysfs_emit(buf, "%d\n", to_bridge(d)->root_port); } static DEVICE_ATTR_RO(root_port); static ssize_t root_path_cost_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%d\n", to_bridge(d)->root_path_cost); + return sysfs_emit(buf, "%d\n", to_bridge(d)->root_path_cost); } static DEVICE_ATTR_RO(root_path_cost); static ssize_t topology_change_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%d\n", to_bridge(d)->topology_change); + return sysfs_emit(buf, "%d\n", to_bridge(d)->topology_change); } static DEVICE_ATTR_RO(topology_change); @@ -258,7 +258,7 @@ static ssize_t topology_change_detected_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->topology_change_detected); + return sysfs_emit(buf, "%d\n", br->topology_change_detected); } static DEVICE_ATTR_RO(topology_change_detected); @@ -266,7 +266,7 @@ static ssize_t hello_timer_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->hello_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->hello_timer)); } static DEVICE_ATTR_RO(hello_timer); @@ -274,7 +274,7 @@ static ssize_t tcn_timer_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->tcn_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->tcn_timer)); } static DEVICE_ATTR_RO(tcn_timer); @@ -283,7 +283,7 @@ static ssize_t topology_change_timer_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->topology_change_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->topology_change_timer)); } static DEVICE_ATTR_RO(topology_change_timer); @@ -291,7 +291,7 @@ static ssize_t gc_timer_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%ld\n", br_timer_value(&br->gc_work.timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&br->gc_work.timer)); } static DEVICE_ATTR_RO(gc_timer); @@ -299,7 +299,7 @@ static ssize_t group_addr_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%pM\n", br->group_addr); + return sysfs_emit(buf, "%pM\n", br->group_addr); } static ssize_t group_addr_store(struct device *d, @@ -365,7 +365,7 @@ static ssize_t no_linklocal_learn_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br_boolopt_get(br, BR_BOOLOPT_NO_LL_LEARN)); + return sysfs_emit(buf, "%d\n", br_boolopt_get(br, BR_BOOLOPT_NO_LL_LEARN)); } static int set_no_linklocal_learn(struct net_bridge *br, unsigned long val, @@ -387,7 +387,7 @@ static ssize_t multicast_router_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->multicast_ctx.multicast_router); + return sysfs_emit(buf, "%d\n", br->multicast_ctx.multicast_router); } static int set_multicast_router(struct net_bridge *br, unsigned long val, @@ -409,7 +409,7 @@ static ssize_t multicast_snooping_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br_opt_get(br, BROPT_MULTICAST_ENABLED)); + return sysfs_emit(buf, "%d\n", br_opt_get(br, BROPT_MULTICAST_ENABLED)); } static ssize_t multicast_snooping_store(struct device *d, @@ -425,8 +425,8 @@ static ssize_t multicast_query_use_ifaddr_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", - br_opt_get(br, BROPT_MULTICAST_QUERY_USE_IFADDR)); + return sysfs_emit(buf, "%d\n", + br_opt_get(br, BROPT_MULTICAST_QUERY_USE_IFADDR)); } static int set_query_use_ifaddr(struct net_bridge *br, unsigned long val, @@ -450,7 +450,7 @@ static ssize_t multicast_querier_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->multicast_ctx.multicast_querier); + return sysfs_emit(buf, "%d\n", br->multicast_ctx.multicast_querier); } static int set_multicast_querier(struct net_bridge *br, unsigned long val, @@ -470,7 +470,7 @@ static DEVICE_ATTR_RW(multicast_querier); static ssize_t hash_elasticity_show(struct device *d, struct device_attribute *attr, char *buf) { - return sprintf(buf, "%u\n", RHT_ELASTICITY); + return sysfs_emit(buf, "%u\n", RHT_ELASTICITY); } static int set_elasticity(struct net_bridge *br, unsigned long val, @@ -494,7 +494,7 @@ static ssize_t hash_max_show(struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->hash_max); + return sysfs_emit(buf, "%u\n", br->hash_max); } static int set_hash_max(struct net_bridge *br, unsigned long val, @@ -517,7 +517,7 @@ static ssize_t multicast_igmp_version_show(struct device *d, { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_igmp_version); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_igmp_version); } static int set_multicast_igmp_version(struct net_bridge *br, unsigned long val, @@ -539,7 +539,7 @@ static ssize_t multicast_last_member_count_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_last_member_count); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_last_member_count); } static int set_last_member_count(struct net_bridge *br, unsigned long val, @@ -561,7 +561,7 @@ static ssize_t multicast_startup_query_count_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_startup_query_count); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_startup_query_count); } static int set_startup_query_count(struct net_bridge *br, unsigned long val, @@ -583,8 +583,8 @@ static ssize_t multicast_last_member_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_last_member_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_last_member_interval)); } static int set_last_member_interval(struct net_bridge *br, unsigned long val, @@ -606,8 +606,8 @@ static ssize_t multicast_membership_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_membership_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_membership_interval)); } static int set_membership_interval(struct net_bridge *br, unsigned long val, @@ -630,8 +630,8 @@ static ssize_t multicast_querier_interval_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_querier_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_querier_interval)); } static int set_querier_interval(struct net_bridge *br, unsigned long val, @@ -654,8 +654,8 @@ static ssize_t multicast_query_interval_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_query_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_query_interval)); } static int set_query_interval(struct net_bridge *br, unsigned long val, @@ -677,9 +677,8 @@ static ssize_t multicast_query_response_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf( - buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_query_response_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_query_response_interval)); } static int set_query_response_interval(struct net_bridge *br, unsigned long val, @@ -701,9 +700,8 @@ static ssize_t multicast_startup_query_interval_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf( - buf, "%lu\n", - jiffies_to_clock_t(br->multicast_ctx.multicast_startup_query_interval)); + return sysfs_emit(buf, "%lu\n", + jiffies_to_clock_t(br->multicast_ctx.multicast_startup_query_interval)); } static int set_startup_query_interval(struct net_bridge *br, unsigned long val, @@ -727,8 +725,8 @@ static ssize_t multicast_stats_enabled_show(struct device *d, { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", - br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)); + return sysfs_emit(buf, "%d\n", + br_opt_get(br, BROPT_MULTICAST_STATS_ENABLED)); } static int set_stats_enabled(struct net_bridge *br, unsigned long val, @@ -754,7 +752,7 @@ static ssize_t multicast_mld_version_show(struct device *d, { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br->multicast_ctx.multicast_mld_version); + return sysfs_emit(buf, "%u\n", br->multicast_ctx.multicast_mld_version); } static int set_multicast_mld_version(struct net_bridge *br, unsigned long val, @@ -777,7 +775,7 @@ static ssize_t nf_call_iptables_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IPTABLES)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IPTABLES)); } static int set_nf_call_iptables(struct net_bridge *br, unsigned long val, @@ -799,7 +797,7 @@ static ssize_t nf_call_ip6tables_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IP6TABLES)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_IP6TABLES)); } static int set_nf_call_ip6tables(struct net_bridge *br, unsigned long val, @@ -821,7 +819,7 @@ static ssize_t nf_call_arptables_show( struct device *d, struct device_attribute *attr, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_ARPTABLES)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_NF_CALL_ARPTABLES)); } static int set_nf_call_arptables(struct net_bridge *br, unsigned long val, @@ -845,7 +843,7 @@ static ssize_t vlan_filtering_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br_opt_get(br, BROPT_VLAN_ENABLED)); + return sysfs_emit(buf, "%d\n", br_opt_get(br, BROPT_VLAN_ENABLED)); } static ssize_t vlan_filtering_store(struct device *d, @@ -861,7 +859,7 @@ static ssize_t vlan_protocol_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%#06x\n", ntohs(br->vlan_proto)); + return sysfs_emit(buf, "%#06x\n", ntohs(br->vlan_proto)); } static ssize_t vlan_protocol_store(struct device *d, @@ -877,7 +875,7 @@ static ssize_t default_pvid_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%d\n", br->default_pvid); + return sysfs_emit(buf, "%d\n", br->default_pvid); } static ssize_t default_pvid_store(struct device *d, @@ -893,7 +891,7 @@ static ssize_t vlan_stats_enabled_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_ENABLED)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_ENABLED)); } static int set_vlan_stats_enabled(struct net_bridge *br, unsigned long val, @@ -915,7 +913,7 @@ static ssize_t vlan_stats_per_port_show(struct device *d, char *buf) { struct net_bridge *br = to_bridge(d); - return sprintf(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_PER_PORT)); + return sysfs_emit(buf, "%u\n", br_opt_get(br, BROPT_VLAN_STATS_PER_PORT)); } static int set_vlan_stats_per_port(struct net_bridge *br, unsigned long val, diff --git a/net/bridge/br_sysfs_if.c b/net/bridge/br_sysfs_if.c index 74fdd8105dca..1f57c36a7fc0 100644 --- a/net/bridge/br_sysfs_if.c +++ b/net/bridge/br_sysfs_if.c @@ -47,7 +47,7 @@ const struct brport_attribute brport_attr_##_name = { \ #define BRPORT_ATTR_FLAG(_name, _mask) \ static ssize_t show_##_name(struct net_bridge_port *p, char *buf) \ { \ - return sprintf(buf, "%d\n", !!(p->flags & _mask)); \ + return sysfs_emit(buf, "%d\n", !!(p->flags & _mask)); \ } \ static int store_##_name(struct net_bridge_port *p, unsigned long v) \ { \ @@ -83,7 +83,7 @@ static int store_flag(struct net_bridge_port *p, unsigned long v, static ssize_t show_path_cost(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->path_cost); + return sysfs_emit(buf, "%d\n", p->path_cost); } static BRPORT_ATTR(path_cost, 0644, @@ -91,7 +91,7 @@ static BRPORT_ATTR(path_cost, 0644, static ssize_t show_priority(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->priority); + return sysfs_emit(buf, "%d\n", p->priority); } static BRPORT_ATTR(priority, 0644, @@ -111,65 +111,65 @@ static BRPORT_ATTR(designated_bridge, 0444, show_designated_bridge, NULL); static ssize_t show_designated_port(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->designated_port); + return sysfs_emit(buf, "%d\n", p->designated_port); } static BRPORT_ATTR(designated_port, 0444, show_designated_port, NULL); static ssize_t show_designated_cost(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->designated_cost); + return sysfs_emit(buf, "%d\n", p->designated_cost); } static BRPORT_ATTR(designated_cost, 0444, show_designated_cost, NULL); static ssize_t show_port_id(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "0x%x\n", p->port_id); + return sysfs_emit(buf, "0x%x\n", p->port_id); } static BRPORT_ATTR(port_id, 0444, show_port_id, NULL); static ssize_t show_port_no(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "0x%x\n", p->port_no); + return sysfs_emit(buf, "0x%x\n", p->port_no); } static BRPORT_ATTR(port_no, 0444, show_port_no, NULL); static ssize_t show_change_ack(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->topology_change_ack); + return sysfs_emit(buf, "%d\n", p->topology_change_ack); } static BRPORT_ATTR(change_ack, 0444, show_change_ack, NULL); static ssize_t show_config_pending(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->config_pending); + return sysfs_emit(buf, "%d\n", p->config_pending); } static BRPORT_ATTR(config_pending, 0444, show_config_pending, NULL); static ssize_t show_port_state(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->state); + return sysfs_emit(buf, "%d\n", p->state); } static BRPORT_ATTR(state, 0444, show_port_state, NULL); static ssize_t show_message_age_timer(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%ld\n", br_timer_value(&p->message_age_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&p->message_age_timer)); } static BRPORT_ATTR(message_age_timer, 0444, show_message_age_timer, NULL); static ssize_t show_forward_delay_timer(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%ld\n", br_timer_value(&p->forward_delay_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&p->forward_delay_timer)); } static BRPORT_ATTR(forward_delay_timer, 0444, show_forward_delay_timer, NULL); static ssize_t show_hold_timer(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%ld\n", br_timer_value(&p->hold_timer)); + return sysfs_emit(buf, "%ld\n", br_timer_value(&p->hold_timer)); } static BRPORT_ATTR(hold_timer, 0444, show_hold_timer, NULL); @@ -182,7 +182,7 @@ static BRPORT_ATTR(flush, 0200, NULL, store_flush); static ssize_t show_group_fwd_mask(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%#x\n", p->group_fwd_mask); + return sysfs_emit(buf, "%#x\n", p->group_fwd_mask); } static int store_group_fwd_mask(struct net_bridge_port *p, @@ -205,7 +205,7 @@ static ssize_t show_backup_port(struct net_bridge_port *p, char *buf) rcu_read_lock(); backup_p = rcu_dereference(p->backup_port); if (backup_p) - ret = sprintf(buf, "%s\n", backup_p->dev->name); + ret = sysfs_emit(buf, "%s\n", backup_p->dev->name); rcu_read_unlock(); return ret; @@ -244,7 +244,7 @@ BRPORT_ATTR_FLAG(isolated, BR_ISOLATED); #ifdef CONFIG_BRIDGE_IGMP_SNOOPING static ssize_t show_multicast_router(struct net_bridge_port *p, char *buf) { - return sprintf(buf, "%d\n", p->multicast_ctx.multicast_router); + return sysfs_emit(buf, "%d\n", p->multicast_ctx.multicast_router); } static int store_multicast_router(struct net_bridge_port *p, -- 2.43.0
Hi Ido, Will fix the whitespace issue and send v3 soon. Thanks for the review, sorry about that. Best, David Corvaglia
{ "author": "David Corvaglia <david@corvaglia.dev>", "date": "Mon, 2 Feb 2026 19:03:03 +0000", "thread_id": "0100019c1fbca989-a2726974-1033-4468-bd63-a5c306949e37-000000@email.amazonses.com.mbox.gz" }
lkml
[PATCH] arm64: dts: imx8mq: Restore VPU G2 clock to 600MHz for 4K60fps decoding
From: Ming Qian <ming.qian@oss.nxp.com> The VPU G2 clock was reduced from 600MHz to 300MHz in commit b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") to address pixel errors with high-resolution HEVC postprocessor output. However, testing shows the 300MHz clock rate is insufficient for 4K60fps decoding and the original pixel errors no longer occur at 600MHz with current drivers. Test results with 3840x2160@60fps HEVC stream decoded to NV12 (the same scenario that exhibited pixel errors previously): 300MHz performance: - Severe frame dropping throughout playback - Only 336 frames rendered in 11:53 (0.471 fps) - Continuous "A lot of buffers are being dropped" warnings - Completely unusable for 4K video 600MHz performance: - Smooth playback with only 1 frame dropped at startup - 37981 frames rendered in 10:34 (59.857 fps) - Achieves target 60fps performance - No pixel errors or artifacts observed Restore the clock to 600MHz to enable proper 4K60fps decoding capability while maintaining stability. Test pipeline: gst-launch-1.0 filesrc location=<4K60_HEVC.mkv> ! \ video/x-matroska ! aiurdemux ! h265parse ! \ v4l2slh265dec ! video/x-raw,format=NV12 ! \ queue ! waylandsink Fixes: b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") Signed-off-by: Ming Qian <ming.qian@oss.nxp.com> --- arch/arm64/boot/dts/freescale/imx8mq.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/boot/dts/freescale/imx8mq.dtsi b/arch/arm64/boot/dts/freescale/imx8mq.dtsi index 607962f807be..731142176625 100644 --- a/arch/arm64/boot/dts/freescale/imx8mq.dtsi +++ b/arch/arm64/boot/dts/freescale/imx8mq.dtsi @@ -960,7 +960,7 @@ pgc_vpu: power-domain@6 { <&clk IMX8MQ_SYS1_PLL_800M>, <&clk IMX8MQ_VPU_PLL>; assigned-clock-rates = <600000000>, - <300000000>, + <600000000>, <800000000>, <0>; }; base-commit: c824345288d11e269ce41b36c105715bc2286050 prerequisite-patch-id: 0000000000000000000000000000000000000000 -- 2.52.0
Am Freitag, 30. Januar 2026, 09:41:31 CET schrieb ming.qian@oss.nxp.com: If I read the Datasheet correctly 600 MHz is only supported by overdrive mode (also depending on the VDD_VPU). Is this frequency really correct? Best regards, Alexander
{ "author": "Alexander Stein <alexander.stein@ew.tq-group.com>", "date": "Fri, 30 Jan 2026 10:09:46 +0100", "thread_id": "5e3431c69da07557edb20a252c4759be8c857f08.camel@ndufresne.ca.mbox.gz" }
lkml
[PATCH] arm64: dts: imx8mq: Restore VPU G2 clock to 600MHz for 4K60fps decoding
From: Ming Qian <ming.qian@oss.nxp.com> The VPU G2 clock was reduced from 600MHz to 300MHz in commit b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") to address pixel errors with high-resolution HEVC postprocessor output. However, testing shows the 300MHz clock rate is insufficient for 4K60fps decoding and the original pixel errors no longer occur at 600MHz with current drivers. Test results with 3840x2160@60fps HEVC stream decoded to NV12 (the same scenario that exhibited pixel errors previously): 300MHz performance: - Severe frame dropping throughout playback - Only 336 frames rendered in 11:53 (0.471 fps) - Continuous "A lot of buffers are being dropped" warnings - Completely unusable for 4K video 600MHz performance: - Smooth playback with only 1 frame dropped at startup - 37981 frames rendered in 10:34 (59.857 fps) - Achieves target 60fps performance - No pixel errors or artifacts observed Restore the clock to 600MHz to enable proper 4K60fps decoding capability while maintaining stability. Test pipeline: gst-launch-1.0 filesrc location=<4K60_HEVC.mkv> ! \ video/x-matroska ! aiurdemux ! h265parse ! \ v4l2slh265dec ! video/x-raw,format=NV12 ! \ queue ! waylandsink Fixes: b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") Signed-off-by: Ming Qian <ming.qian@oss.nxp.com> --- arch/arm64/boot/dts/freescale/imx8mq.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/boot/dts/freescale/imx8mq.dtsi b/arch/arm64/boot/dts/freescale/imx8mq.dtsi index 607962f807be..731142176625 100644 --- a/arch/arm64/boot/dts/freescale/imx8mq.dtsi +++ b/arch/arm64/boot/dts/freescale/imx8mq.dtsi @@ -960,7 +960,7 @@ pgc_vpu: power-domain@6 { <&clk IMX8MQ_SYS1_PLL_800M>, <&clk IMX8MQ_VPU_PLL>; assigned-clock-rates = <600000000>, - <300000000>, + <600000000>, <800000000>, <0>; }; base-commit: c824345288d11e269ce41b36c105715bc2286050 prerequisite-patch-id: 0000000000000000000000000000000000000000 -- 2.52.0
Hi, Le vendredi 30 janvier 2026 à 16:41 +0800, ming.qian@oss.nxp.com a écrit : Tested on EVK, with the downstream DCSS driver, and this change triggers DCSS underrun (which is related to the DRAM QoS erratas on this SoC). It also sometimes trigger the "not all macroblock decoded" warning I added recently, and we can empty IRQs, but these are handled now. That probably only true with the upstream DCSS + a small resolution embedded panel ? Can you clarify this setup, because the display drivers mainline are very minimal. Would be nice to show you average DDR read/write bandwidth utilization during this run for comparision. Another information that bugs me, in the BSP code, the G2 voltage is increased too, which you didn't do here. They also use the thermal 2 zone to kick it down to 300 until it cools down. Nicolas
{ "author": "Nicolas Dufresne <nicolas@ndufresne.ca>", "date": "Fri, 30 Jan 2026 09:47:34 -0500", "thread_id": "5e3431c69da07557edb20a252c4759be8c857f08.camel@ndufresne.ca.mbox.gz" }
lkml
[PATCH] arm64: dts: imx8mq: Restore VPU G2 clock to 600MHz for 4K60fps decoding
From: Ming Qian <ming.qian@oss.nxp.com> The VPU G2 clock was reduced from 600MHz to 300MHz in commit b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") to address pixel errors with high-resolution HEVC postprocessor output. However, testing shows the 300MHz clock rate is insufficient for 4K60fps decoding and the original pixel errors no longer occur at 600MHz with current drivers. Test results with 3840x2160@60fps HEVC stream decoded to NV12 (the same scenario that exhibited pixel errors previously): 300MHz performance: - Severe frame dropping throughout playback - Only 336 frames rendered in 11:53 (0.471 fps) - Continuous "A lot of buffers are being dropped" warnings - Completely unusable for 4K video 600MHz performance: - Smooth playback with only 1 frame dropped at startup - 37981 frames rendered in 10:34 (59.857 fps) - Achieves target 60fps performance - No pixel errors or artifacts observed Restore the clock to 600MHz to enable proper 4K60fps decoding capability while maintaining stability. Test pipeline: gst-launch-1.0 filesrc location=<4K60_HEVC.mkv> ! \ video/x-matroska ! aiurdemux ! h265parse ! \ v4l2slh265dec ! video/x-raw,format=NV12 ! \ queue ! waylandsink Fixes: b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") Signed-off-by: Ming Qian <ming.qian@oss.nxp.com> --- arch/arm64/boot/dts/freescale/imx8mq.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/boot/dts/freescale/imx8mq.dtsi b/arch/arm64/boot/dts/freescale/imx8mq.dtsi index 607962f807be..731142176625 100644 --- a/arch/arm64/boot/dts/freescale/imx8mq.dtsi +++ b/arch/arm64/boot/dts/freescale/imx8mq.dtsi @@ -960,7 +960,7 @@ pgc_vpu: power-domain@6 { <&clk IMX8MQ_SYS1_PLL_800M>, <&clk IMX8MQ_VPU_PLL>; assigned-clock-rates = <600000000>, - <300000000>, + <600000000>, <800000000>, <0>; }; base-commit: c824345288d11e269ce41b36c105715bc2286050 prerequisite-patch-id: 0000000000000000000000000000000000000000 -- 2.52.0
On Fri, Jan 30, 2026 at 10:09:46AM +0100, Alexander Stein wrote: G1 and BUS clk were already set as Overdrive frequency. This change is to only upgrading G2 from 300M to 600M. So if your question is should we downgrade all to Nominal mode, I think no. The freq could be override in board dts, or adding a new dts as arch/arm64/boot/dts/freescale/imx8mp-nominal.dtsi Regards Peng
{ "author": "Peng Fan <peng.fan@oss.nxp.com>", "date": "Mon, 2 Feb 2026 10:41:49 +0800", "thread_id": "5e3431c69da07557edb20a252c4759be8c857f08.camel@ndufresne.ca.mbox.gz" }
lkml
[PATCH] arm64: dts: imx8mq: Restore VPU G2 clock to 600MHz for 4K60fps decoding
From: Ming Qian <ming.qian@oss.nxp.com> The VPU G2 clock was reduced from 600MHz to 300MHz in commit b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") to address pixel errors with high-resolution HEVC postprocessor output. However, testing shows the 300MHz clock rate is insufficient for 4K60fps decoding and the original pixel errors no longer occur at 600MHz with current drivers. Test results with 3840x2160@60fps HEVC stream decoded to NV12 (the same scenario that exhibited pixel errors previously): 300MHz performance: - Severe frame dropping throughout playback - Only 336 frames rendered in 11:53 (0.471 fps) - Continuous "A lot of buffers are being dropped" warnings - Completely unusable for 4K video 600MHz performance: - Smooth playback with only 1 frame dropped at startup - 37981 frames rendered in 10:34 (59.857 fps) - Achieves target 60fps performance - No pixel errors or artifacts observed Restore the clock to 600MHz to enable proper 4K60fps decoding capability while maintaining stability. Test pipeline: gst-launch-1.0 filesrc location=<4K60_HEVC.mkv> ! \ video/x-matroska ! aiurdemux ! h265parse ! \ v4l2slh265dec ! video/x-raw,format=NV12 ! \ queue ! waylandsink Fixes: b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") Signed-off-by: Ming Qian <ming.qian@oss.nxp.com> --- arch/arm64/boot/dts/freescale/imx8mq.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/boot/dts/freescale/imx8mq.dtsi b/arch/arm64/boot/dts/freescale/imx8mq.dtsi index 607962f807be..731142176625 100644 --- a/arch/arm64/boot/dts/freescale/imx8mq.dtsi +++ b/arch/arm64/boot/dts/freescale/imx8mq.dtsi @@ -960,7 +960,7 @@ pgc_vpu: power-domain@6 { <&clk IMX8MQ_SYS1_PLL_800M>, <&clk IMX8MQ_VPU_PLL>; assigned-clock-rates = <600000000>, - <300000000>, + <600000000>, <800000000>, <0>; }; base-commit: c824345288d11e269ce41b36c105715bc2286050 prerequisite-patch-id: 0000000000000000000000000000000000000000 -- 2.52.0
Hi Alexander, On 2/2/2026 10:41 AM, Peng Fan wrote: Yes, you are right, 600MHz is the Overdriver frequency. However, to achieve the 4K 60fps target, we set the VPU to run in overdrive mode by default, just as Peng said. Regards, Ming
{ "author": "\"Ming Qian(OSS)\" <ming.qian@oss.nxp.com>", "date": "Mon, 2 Feb 2026 13:56:47 +0800", "thread_id": "5e3431c69da07557edb20a252c4759be8c857f08.camel@ndufresne.ca.mbox.gz" }
lkml
[PATCH] arm64: dts: imx8mq: Restore VPU G2 clock to 600MHz for 4K60fps decoding
From: Ming Qian <ming.qian@oss.nxp.com> The VPU G2 clock was reduced from 600MHz to 300MHz in commit b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") to address pixel errors with high-resolution HEVC postprocessor output. However, testing shows the 300MHz clock rate is insufficient for 4K60fps decoding and the original pixel errors no longer occur at 600MHz with current drivers. Test results with 3840x2160@60fps HEVC stream decoded to NV12 (the same scenario that exhibited pixel errors previously): 300MHz performance: - Severe frame dropping throughout playback - Only 336 frames rendered in 11:53 (0.471 fps) - Continuous "A lot of buffers are being dropped" warnings - Completely unusable for 4K video 600MHz performance: - Smooth playback with only 1 frame dropped at startup - 37981 frames rendered in 10:34 (59.857 fps) - Achieves target 60fps performance - No pixel errors or artifacts observed Restore the clock to 600MHz to enable proper 4K60fps decoding capability while maintaining stability. Test pipeline: gst-launch-1.0 filesrc location=<4K60_HEVC.mkv> ! \ video/x-matroska ! aiurdemux ! h265parse ! \ v4l2slh265dec ! video/x-raw,format=NV12 ! \ queue ! waylandsink Fixes: b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") Signed-off-by: Ming Qian <ming.qian@oss.nxp.com> --- arch/arm64/boot/dts/freescale/imx8mq.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/boot/dts/freescale/imx8mq.dtsi b/arch/arm64/boot/dts/freescale/imx8mq.dtsi index 607962f807be..731142176625 100644 --- a/arch/arm64/boot/dts/freescale/imx8mq.dtsi +++ b/arch/arm64/boot/dts/freescale/imx8mq.dtsi @@ -960,7 +960,7 @@ pgc_vpu: power-domain@6 { <&clk IMX8MQ_SYS1_PLL_800M>, <&clk IMX8MQ_VPU_PLL>; assigned-clock-rates = <600000000>, - <300000000>, + <600000000>, <800000000>, <0>; }; base-commit: c824345288d11e269ce41b36c105715bc2286050 prerequisite-patch-id: 0000000000000000000000000000000000000000 -- 2.52.0
Hi Nicolas, On 1/30/2026 10:47 PM, Nicolas Dufresne wrote: This doesn't sound like just a VPU issue; it's related to the display or DDR. If not displayed, do the fluster test cases yield different results at 600MHz and 300MHz? My display is hdmi, I'll try the DCSS. And the DDR bandwidth results measured by perf are as follows: Performance counter stats for 'system wide': 113303664278 imx8_ddr0/read-cycles/ 82457075530 imx8_ddr0/write-cycles/ 634.892101865 seconds time elapsed In our internal code, whenever the frequency of either g1 or g2 reaches 600MHz, the voltage is adjusted to 1.0V. Since g1 is already set to 600 MHz in the upstream DTS, I believe the default version is already 1.0v. And do you mean vpu-thermal? But it doesn't define the cooling-map, I'm not sure how it works. vpu-thermal { polling-delay-passive = <250>; polling-delay = <2000>; thermal-sensors = <&tmu 2>; trips { vpu-crit { temperature = <90000>; hysteresis = <2000>; type = "critical"; }; }; }; Regards, Ming
{ "author": "\"Ming Qian(OSS)\" <ming.qian@oss.nxp.com>", "date": "Mon, 2 Feb 2026 15:44:37 +0800", "thread_id": "5e3431c69da07557edb20a252c4759be8c857f08.camel@ndufresne.ca.mbox.gz" }
lkml
[PATCH] arm64: dts: imx8mq: Restore VPU G2 clock to 600MHz for 4K60fps decoding
From: Ming Qian <ming.qian@oss.nxp.com> The VPU G2 clock was reduced from 600MHz to 300MHz in commit b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") to address pixel errors with high-resolution HEVC postprocessor output. However, testing shows the 300MHz clock rate is insufficient for 4K60fps decoding and the original pixel errors no longer occur at 600MHz with current drivers. Test results with 3840x2160@60fps HEVC stream decoded to NV12 (the same scenario that exhibited pixel errors previously): 300MHz performance: - Severe frame dropping throughout playback - Only 336 frames rendered in 11:53 (0.471 fps) - Continuous "A lot of buffers are being dropped" warnings - Completely unusable for 4K video 600MHz performance: - Smooth playback with only 1 frame dropped at startup - 37981 frames rendered in 10:34 (59.857 fps) - Achieves target 60fps performance - No pixel errors or artifacts observed Restore the clock to 600MHz to enable proper 4K60fps decoding capability while maintaining stability. Test pipeline: gst-launch-1.0 filesrc location=<4K60_HEVC.mkv> ! \ video/x-matroska ! aiurdemux ! h265parse ! \ v4l2slh265dec ! video/x-raw,format=NV12 ! \ queue ! waylandsink Fixes: b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") Signed-off-by: Ming Qian <ming.qian@oss.nxp.com> --- arch/arm64/boot/dts/freescale/imx8mq.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/boot/dts/freescale/imx8mq.dtsi b/arch/arm64/boot/dts/freescale/imx8mq.dtsi index 607962f807be..731142176625 100644 --- a/arch/arm64/boot/dts/freescale/imx8mq.dtsi +++ b/arch/arm64/boot/dts/freescale/imx8mq.dtsi @@ -960,7 +960,7 @@ pgc_vpu: power-domain@6 { <&clk IMX8MQ_SYS1_PLL_800M>, <&clk IMX8MQ_VPU_PLL>; assigned-clock-rates = <600000000>, - <300000000>, + <600000000>, <800000000>, <0>; }; base-commit: c824345288d11e269ce41b36c105715bc2286050 prerequisite-patch-id: 0000000000000000000000000000000000000000 -- 2.52.0
Le lundi 02 février 2026 à 15:44 +0800, Ming Qian(OSS) a écrit : Didn't you run these tests before sending ? I can try again, but in my internal notes, I wrote: > Tested that, and everything becomes unstable That was before I figure-out the IRQ handler didn't handle exception bits that didn't stop the decoder (or dry IRQ, which strangely is common from the G2). Its not: $> cat /sys/kernel/debug/regulator/regulator_summary | grep SW1C SW1C 1 1 0 unknown 900mV 0mA 825mV 1100 Before I gave up on 60Hz on this SoC, I did test raising it to 1v with this patch (hopefully there is a way to do that in DT, would be more elegant): diff --git a/drivers/pmdomain/imx/gpcv2.c b/drivers/pmdomain/imx/gpcv2.c index 4b828d74a606..2f2b85ca6fd2 100644 --- a/drivers/pmdomain/imx/gpcv2.c +++ b/drivers/pmdomain/imx/gpcv2.c @@ -639,6 +639,7 @@ static const struct imx_pgc_domain imx8m_pgc_domains[] = { }, .pgc = BIT(IMX8M_PGC_VPU), .keep_clocks = true, + .voltage = 1000000, }, [IMX8M_POWER_DOMAIN_DISP] = { I would also like to remind you your own erratas, in the errata document you state that DRAM QoS is broken, and all transactions are treated with the same priority. If you overload the bandwidth, it becomes fatal for the display controller. We tried to workaround with changing the NoC configuration, but it did not work. It feels like that NoC granularity is not enough to prevent underrun of the display controller (where the QoS would work, since its done at transaction level, not by measuring bandwidth). Nicolas
{ "author": "Nicolas Dufresne <nicolas@ndufresne.ca>", "date": "Mon, 02 Feb 2026 13:44:28 -0500", "thread_id": "5e3431c69da07557edb20a252c4759be8c857f08.camel@ndufresne.ca.mbox.gz" }
lkml
[PATCH] arm64: dts: imx8mq: Restore VPU G2 clock to 600MHz for 4K60fps decoding
From: Ming Qian <ming.qian@oss.nxp.com> The VPU G2 clock was reduced from 600MHz to 300MHz in commit b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") to address pixel errors with high-resolution HEVC postprocessor output. However, testing shows the 300MHz clock rate is insufficient for 4K60fps decoding and the original pixel errors no longer occur at 600MHz with current drivers. Test results with 3840x2160@60fps HEVC stream decoded to NV12 (the same scenario that exhibited pixel errors previously): 300MHz performance: - Severe frame dropping throughout playback - Only 336 frames rendered in 11:53 (0.471 fps) - Continuous "A lot of buffers are being dropped" warnings - Completely unusable for 4K video 600MHz performance: - Smooth playback with only 1 frame dropped at startup - 37981 frames rendered in 10:34 (59.857 fps) - Achieves target 60fps performance - No pixel errors or artifacts observed Restore the clock to 600MHz to enable proper 4K60fps decoding capability while maintaining stability. Test pipeline: gst-launch-1.0 filesrc location=<4K60_HEVC.mkv> ! \ video/x-matroska ! aiurdemux ! h265parse ! \ v4l2slh265dec ! video/x-raw,format=NV12 ! \ queue ! waylandsink Fixes: b27bfc5103c7 ("arm64: dts: freescale: Fix VPU G2 clock") Signed-off-by: Ming Qian <ming.qian@oss.nxp.com> --- arch/arm64/boot/dts/freescale/imx8mq.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/boot/dts/freescale/imx8mq.dtsi b/arch/arm64/boot/dts/freescale/imx8mq.dtsi index 607962f807be..731142176625 100644 --- a/arch/arm64/boot/dts/freescale/imx8mq.dtsi +++ b/arch/arm64/boot/dts/freescale/imx8mq.dtsi @@ -960,7 +960,7 @@ pgc_vpu: power-domain@6 { <&clk IMX8MQ_SYS1_PLL_800M>, <&clk IMX8MQ_VPU_PLL>; assigned-clock-rates = <600000000>, - <300000000>, + <600000000>, <800000000>, <0>; }; base-commit: c824345288d11e269ce41b36c105715bc2286050 prerequisite-patch-id: 0000000000000000000000000000000000000000 -- 2.52.0
Hi, Le lundi 02 février 2026 à 13:44 -0500, Nicolas Dufresne a écrit : Ran some fluster tests now. With this patch the results is not consistent anymore. Then I ran it with weston being started, and in the middle of the test the display turned black. Matches my past observation. We did reproduce this on BSP kernel too. When the display goes black, the recent hantro drivers reports: [ 827.581586] hantro-vpu 38310000.video-codec: frame decode timed out. [ 827.720201] hantro-vpu 38310000.video-codec: not all macroblocks were decoded. I have local patches to reduce the cascade of errors, so it likely survived longer then last time. I will send these patches soon. The "not all macroblocks were decoded." is triggered by a bit in the status register that is not documented in NXP TRM. I found that bit in some VC8000D documentation (the sucessor of G2). I concluded it was the same meaning after looking at the failed buffer visually, it is indeed missing couple of macroblocks near th end. Each time we see this error, the DCSS gives up and turn either black, or sometimes other color. The second case has been tracked to a DCSS Scaler underrun, the first we don't know. Fluster command ran (two threads, never completes): ./fluster.py run -d GStreamer-H.265-V4L2SL-Gst1.0 -ts JCT-VC-HEVC_V1 -j2 -t90 Nicolas
{ "author": "Nicolas Dufresne <nicolas@ndufresne.ca>", "date": "Mon, 02 Feb 2026 14:12:54 -0500", "thread_id": "5e3431c69da07557edb20a252c4759be8c857f08.camel@ndufresne.ca.mbox.gz" }
lkml
[GIT PULL] ASPEED clk updates for v6.20
Hi Stephen, Please pull the following ASPEED clock driver updates for v6.20. The series includes: - Reorganization of ASPEED clock drivers under drivers/clk/aspeed/ - MAINTAINERS updates for ASPEED clock drivers - New ASPEED clock driver support The branch is based on v6.19-rc1 as requested. Thanks, Billy ---------------------------------------------------------------- The following changes since commit 8f0b4cce4481fb22653697cced8d0d04027cb1e8: Linux 6.19-rc1 (2025-12-14 16:05:07 +1200) are available in the Git repository at: https://github.com/billy-tsai/linux.git tags/aspeed-clk-for-v6.20-rc1 for you to fetch changes up to dc345e213f16d3ae5dce01bb0002e46bc4eaff4c: clk: aspeed: add AST2700 clock driver (2026-01-28 14:58:47 +0800) ---------------------------------------------------------------- ASPEED clk updates This pull request contains the following changes: - Reorganize ASPEED clock drivers under drivers/clk/aspeed/ and update the corresponding Makefiles and Kconfig entries. - Add MAINTAINERS entries for ASPEED clock drivers to reflect current ownership and review responsibilities. - Add support for the AST2700 clock controller, including initial clock definitions required by the SoC. Patch series: https://patchwork.ozlabs.org/project/linux-aspeed/cover/20251224-upstream_clk-v16-0-8c1318f56c3c@aspeedtech.com/ Reconstruct with: b4 am 20251224-upstream_clk-v16-0-8c1318f56c3c@aspeedtech.com ---------------------------------------------------------------- Ryan Chen (3): clk: aspeed: Move the existing ASPEED clk drivers into aspeed subdirectory. MAINTAINERS: Add entry for ASPEED clock drivers. clk: aspeed: add AST2700 clock driver MAINTAINERS | 9 + drivers/clk/Kconfig | 13 +- drivers/clk/Makefile | 3 +- drivers/clk/aspeed/Kconfig | 21 + drivers/clk/aspeed/Makefile | 4 + drivers/clk/{ => aspeed}/clk-aspeed.c | 0 drivers/clk/{ => aspeed}/clk-aspeed.h | 0 drivers/clk/{ => aspeed}/clk-ast2600.c | 0 drivers/clk/aspeed/clk-ast2700.c | 1055 ++++++++++++++++++++++++++++++++ 9 files changed, 1091 insertions(+), 14 deletions(-) create mode 100644 drivers/clk/aspeed/Kconfig create mode 100644 drivers/clk/aspeed/Makefile rename drivers/clk/{ => aspeed}/clk-aspeed.c (100%) rename drivers/clk/{ => aspeed}/clk-aspeed.h (100%) rename drivers/clk/{ => aspeed}/clk-ast2600.c (100%) create mode 100644 drivers/clk/aspeed/clk-ast2700.c ----------------------------------------------------------------
Quoting Billy Tsai (2026-01-28 19:36:24) Thanks. Pulled into clk-next
{ "author": "Stephen Boyd <sboyd@kernel.org>", "date": "Mon, 02 Feb 2026 12:13:27 -0700", "thread_id": "177005960797.4027.14390177024032129085@lazor.mbox.gz" }
lkml
[PATCH 1/2] dt-bindings: arm: fsl: Add Gateworks GW7906 board
Add support for the Gateworks GW7906 board based on the i.MX8M Mini SoC. Signed-off-by: Tim Harvey <tharvey@gateworks.com> --- Documentation/devicetree/bindings/arm/fsl.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/devicetree/bindings/arm/fsl.yaml b/Documentation/devicetree/bindings/arm/fsl.yaml index 68a2d5fecc43..46a85f8f9e5c 100644 --- a/Documentation/devicetree/bindings/arm/fsl.yaml +++ b/Documentation/devicetree/bindings/arm/fsl.yaml @@ -963,6 +963,7 @@ properties: - fsl,imx8mm-evkb # i.MX8MM EVKB Board - gateworks,imx8mm-gw75xx-0x # i.MX8MM Gateworks Board - gateworks,imx8mm-gw7904 + - gateworks,imx8mm-gw7906 # i.MX8MM Gateworks Board - gw,imx8mm-gw71xx-0x # i.MX8MM Gateworks Development Kit - gw,imx8mm-gw72xx-0x # i.MX8MM Gateworks Development Kit - gw,imx8mm-gw73xx-0x # i.MX8MM Gateworks Development Kit -- 2.25.1
The GW7906 is based on the i.MX8M Mini SoC featuring: - LPDDR4 DRAM - eMMC FLASH - microSD connector with UHS support - LIS2DE12 3-axis accelerometer - Gateworks System Controller - IMX8M FEC - software selectable RS232/RS485/RS422 serial transceiver - PMIC - 1x isolated RS232 UART - 1x off-board bi-directional opto-isolated digital I/O - 1x M.2 A-E Key Socket and 1x MiniPCIe socket with USB2.0 and PCIe (resistor loading to route PCIe/USB2 between M.2 and MiniPCIe socket) Signed-off-by: Tim Harvey <tharvey@gateworks.com> --- arch/arm64/boot/dts/freescale/Makefile | 1 + .../dts/freescale/imx8mm-venice-gw7906.dts | 869 ++++++++++++++++++ 2 files changed, 870 insertions(+) create mode 100644 arch/arm64/boot/dts/freescale/imx8mm-venice-gw7906.dts diff --git a/arch/arm64/boot/dts/freescale/Makefile b/arch/arm64/boot/dts/freescale/Makefile index 700bab4d3e60..83fc7faf81d8 100644 --- a/arch/arm64/boot/dts/freescale/Makefile +++ b/arch/arm64/boot/dts/freescale/Makefile @@ -167,6 +167,7 @@ dtb-$(CONFIG_ARCH_MXC) += imx8mm-venice-gw7901.dtb dtb-$(CONFIG_ARCH_MXC) += imx8mm-venice-gw7902.dtb dtb-$(CONFIG_ARCH_MXC) += imx8mm-venice-gw7903.dtb dtb-$(CONFIG_ARCH_MXC) += imx8mm-venice-gw7904.dtb +dtb-$(CONFIG_ARCH_MXC) += imx8mm-venice-gw7906.dtb dtb-$(CONFIG_ARCH_MXC) += imx8mm-verdin-nonwifi-dahlia.dtb dtb-$(CONFIG_ARCH_MXC) += imx8mm-verdin-nonwifi-dev.dtb dtb-$(CONFIG_ARCH_MXC) += imx8mm-verdin-nonwifi-ivy.dtb diff --git a/arch/arm64/boot/dts/freescale/imx8mm-venice-gw7906.dts b/arch/arm64/boot/dts/freescale/imx8mm-venice-gw7906.dts new file mode 100644 index 000000000000..ec146a2b7549 --- /dev/null +++ b/arch/arm64/boot/dts/freescale/imx8mm-venice-gw7906.dts @@ -0,0 +1,869 @@ +// SPDX-License-Identifier: (GPL-2.0+ OR MIT) +/* + * Copyright 2026 Gateworks Corporation + */ + +/dts-v1/; + +#include <dt-bindings/gpio/gpio.h> +#include <dt-bindings/input/linux-event-codes.h> +#include <dt-bindings/leds/common.h> +#include <dt-bindings/net/ti-dp83867.h> +#include <dt-bindings/phy/phy-imx8-pcie.h> + +#include "imx8mm.dtsi" + +/ { + model = "Gateworks Venice GW7906 i.MX8MM board"; + compatible = "gateworks,imx8mm-gw7906", "fsl,imx8mm"; + + aliases { + ethernet0 = &fec1; + rtc0 = &gsc_rtc; + rtc1 = &snvs_rtc; + usb0 = &usbotg1; + }; + + chosen { + stdout-path = &uart2; + }; + + memory@40000000 { + device_type = "memory"; + reg = <0x0 0x40000000 0 0x80000000>; + }; + + gpio-keys { + compatible = "gpio-keys"; + + key-user-pb { + label = "user_pb"; + gpios = <&gpio 2 GPIO_ACTIVE_LOW>; + linux,code = <BTN_0>; + }; + + key-user-pb1x { + label = "user_pb1x"; + linux,code = <BTN_1>; + interrupt-parent = <&gsc>; + interrupts = <0>; + }; + + key-erased { + label = "key_erased"; + linux,code = <BTN_2>; + interrupt-parent = <&gsc>; + interrupts = <1>; + }; + + key-eeprom-wp { + label = "eeprom_wp"; + linux,code = <BTN_3>; + interrupt-parent = <&gsc>; + interrupts = <2>; + }; + + switch-hold { + label = "switch_hold"; + linux,code = <BTN_5>; + interrupt-parent = <&gsc>; + interrupts = <7>; + }; + }; + + led-controller { + compatible = "gpio-leds"; + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_gpio_leds>; + + led-0 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_RED>; + label = "led01_red"; + gpios = <&gpio5 5 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-1 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_GREEN>; + label = "led01_grn"; + gpios = <&gpio4 30 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-2 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_RED>; + label = "led02_red"; + gpios = <&gpio5 2 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-3 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_GREEN>; + label = "led02_grn"; + gpios = <&gpio1 14 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-4 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_RED>; + label = "led03_red"; + gpios = <&gpio1 9 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-5 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_GREEN>; + label = "led03_grn"; + gpios = <&gpio5 3 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-6 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_RED>; + label = "led04_red"; + gpios = <&gpio4 29 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-7 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_GREEN>; + label = "led04_grn"; + gpios = <&gpio4 28 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-8 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_RED>; + label = "led05_red"; + gpios = <&gpio1 13 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-9 { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_GREEN>; + label = "led05_grn"; + gpios = <&gpio4 31 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-a { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_RED>; + label = "led06_red"; + gpios = <&gpio5 4 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + + led-b { + function = LED_FUNCTION_STATUS; + color = <LED_COLOR_ID_GREEN>; + label = "led06_grn"; + gpios = <&gpio1 8 GPIO_ACTIVE_HIGH>; + default-state = "off"; + }; + }; + + pcie0_refclk: pcie0-refclk { + compatible = "fixed-clock"; + #clock-cells = <0>; + clock-frequency = <100000000>; + }; + + reg_3p3v: regulator-3p3v { + compatible = "regulator-fixed"; + regulator-name = "3P3V"; + regulator-min-microvolt = <3300000>; + regulator-max-microvolt = <3300000>; + regulator-always-on; + }; +}; + +&A53_0 { + cpu-supply = <&buck2>; +}; + +&A53_1 { + cpu-supply = <&buck2>; +}; + +&A53_2 { + cpu-supply = <&buck2>; +}; + +&A53_3 { + cpu-supply = <&buck2>; +}; + +&ddrc { + operating-points-v2 = <&ddrc_opp_table>; + + ddrc_opp_table: opp-table { + compatible = "operating-points-v2"; + + opp-25000000 { + opp-hz = /bits/ 64 <25000000>; + }; + + opp-100000000 { + opp-hz = /bits/ 64 <100000000>; + }; + + opp-750000000 { + opp-hz = /bits/ 64 <750000000>; + }; + }; +}; + +&fec1 { + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_fec1>; + phy-mode = "rgmii-id"; + phy-handle = <&ethphy0>; + local-mac-address = [00 00 00 00 00 00]; + status = "okay"; + + mdio { + #address-cells = <1>; + #size-cells = <0>; + + ethphy0: ethernet-phy@0 { + compatible = "ethernet-phy-ieee802.3-c22"; + reg = <0>; + ti,clk-output-sel = <DP83867_CLK_O_SEL_OFF>; + ti,rx-internal-delay = <DP83867_RGMIIDCTL_2_00_NS>; + ti,tx-internal-delay = <DP83867_RGMIIDCTL_2_00_NS>; + tx-fifo-depth = <DP83867_PHYCR_FIFO_DEPTH_4_B_NIB>; + rx-fifo-depth = <DP83867_PHYCR_FIFO_DEPTH_4_B_NIB>; + + leds { + #address-cells = <1>; + #size-cells = <0>; + + led@1 { + reg = <1>; + color = <LED_COLOR_ID_AMBER>; + function = LED_FUNCTION_LAN; + default-state = "keep"; + }; + + led@2 { + reg = <2>; + color = <LED_COLOR_ID_GREEN>; + function = LED_FUNCTION_LAN; + default-state = "keep"; + }; + }; + }; + }; +}; + +&gpio1 { + gpio-line-names = "", "", "", "", "", "", "", "", + "", "", "rs422_en#", "rs485_en#", "rs232_en#", "", "", "", + "", "", "", "", "", "", "", "", + "", "", "", "", "", "", "", ""; +}; + +&gpio2 { + gpio-line-names = "", "", "", "", "", "", "dig1_ctl", "", + "dig1_out#", "dig1_in", "", "", "", "", "", "", + "", "", "", "", "", "", "", "", + "", "", "", "", "", "", "", ""; +}; + +&gpio5 { + gpio-line-names = "", "", "", "", "", "", "", "", + "", "", "", "", "pci_wdis#", "", "", "", + "", "", "", "", "", "", "", "", + "", "", "", "", "", "", "", ""; +}; + +&i2c1 { + clock-frequency = <100000>; + pinctrl-names = "default", "gpio"; + pinctrl-0 = <&pinctrl_i2c1>; + pinctrl-1 = <&pinctrl_i2c1_gpio>; + scl-gpios = <&gpio5 14 (GPIO_ACTIVE_HIGH | GPIO_OPEN_DRAIN)>; + sda-gpios = <&gpio5 15 (GPIO_ACTIVE_HIGH | GPIO_OPEN_DRAIN)>; + status = "okay"; + + gsc: gsc@20 { + compatible = "gw,gsc"; + reg = <0x20>; + pinctrl-0 = <&pinctrl_gsc>; + interrupt-parent = <&gpio4>; + interrupts = <26 IRQ_TYPE_EDGE_FALLING>; + interrupt-controller; + #interrupt-cells = <1>; + #address-cells = <1>; + #size-cells = <0>; + + adc { + compatible = "gw,gsc-adc"; + #address-cells = <1>; + #size-cells = <0>; + + channel@6 { + gw,mode = <0>; + reg = <0x06>; + label = "temp"; + }; + + channel@8 { + gw,mode = <3>; + reg = <0x08>; + label = "vdd_bat"; + }; + + channel@82 { + gw,mode = <2>; + reg = <0x82>; + label = "vin"; + gw,voltage-divider-ohms = <22100 1000>; + gw,voltage-offset-microvolt = <700000>; + }; + + channel@84 { + gw,mode = <2>; + reg = <0x84>; + label = "vdd_5p0"; + gw,voltage-divider-ohms = <10000 10000>; + }; + + channel@86 { + gw,mode = <2>; + reg = <0x86>; + label = "vdd_3p3"; + gw,voltage-divider-ohms = <10000 10000>; + }; + + channel@88 { + gw,mode = <2>; + reg = <0x88>; + label = "vdd_0p9"; + }; + + channel@8c { + gw,mode = <2>; + reg = <0x8c>; + label = "vdd_soc"; + }; + + channel@8e { + gw,mode = <2>; + reg = <0x8e>; + label = "vdd_arm"; + }; + + channel@90 { + gw,mode = <2>; + reg = <0x90>; + label = "vdd_1p8"; + }; + + channel@92 { + gw,mode = <2>; + reg = <0x92>; + label = "vdd_dram"; + }; + + channel@a2 { + gw,mode = <2>; + reg = <0xa2>; + label = "vdd_gsc"; + gw,voltage-divider-ohms = <10000 10000>; + }; + }; + }; + + gpio: gpio@23 { + compatible = "nxp,pca9555"; + reg = <0x23>; + gpio-controller; + #gpio-cells = <2>; + interrupt-parent = <&gsc>; + interrupts = <4>; + }; + + eeprom@50 { + compatible = "atmel,24c02"; + reg = <0x50>; + pagesize = <16>; + }; + + eeprom@51 { + compatible = "atmel,24c02"; + reg = <0x51>; + pagesize = <16>; + }; + + eeprom@52 { + compatible = "atmel,24c02"; + reg = <0x52>; + pagesize = <16>; + }; + + eeprom@53 { + compatible = "atmel,24c02"; + reg = <0x53>; + pagesize = <16>; + }; + + gsc_rtc: rtc@68 { + compatible = "dallas,ds1672"; + reg = <0x68>; + }; +}; + +&i2c2 { + clock-frequency = <400000>; + pinctrl-names = "default", "gpio"; + pinctrl-0 = <&pinctrl_i2c2>; + pinctrl-1 = <&pinctrl_i2c2_gpio>; + scl-gpios = <&gpio5 16 (GPIO_ACTIVE_HIGH | GPIO_OPEN_DRAIN)>; + sda-gpios = <&gpio5 17 (GPIO_ACTIVE_HIGH | GPIO_OPEN_DRAIN)>; + status = "okay"; + + pmic@4b { + compatible = "rohm,bd71847"; + reg = <0x4b>; + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_pmic>; + interrupt-parent = <&gpio3>; + interrupts = <8 IRQ_TYPE_LEVEL_LOW>; + rohm,reset-snvs-powered; + #clock-cells = <0>; + clocks = <&osc_32k>; + clock-output-names = "clk-32k-out"; + + regulators { + /* vdd_soc: 0.805-0.900V (typ=0.8V) */ + BUCK1 { + regulator-name = "buck1"; + regulator-min-microvolt = <700000>; + regulator-max-microvolt = <1300000>; + regulator-boot-on; + regulator-always-on; + regulator-ramp-delay = <1250>; + }; + + /* vdd_arm: 0.805-1.0V (typ=0.9V) */ + buck2: BUCK2 { + regulator-name = "buck2"; + regulator-min-microvolt = <700000>; + regulator-max-microvolt = <1300000>; + regulator-boot-on; + regulator-always-on; + regulator-ramp-delay = <1250>; + rohm,dvs-run-voltage = <1000000>; + rohm,dvs-idle-voltage = <900000>; + }; + + /* vdd_0p9: 0.805-1.0V (typ=0.9V) */ + BUCK3 { + regulator-name = "buck3"; + regulator-min-microvolt = <700000>; + regulator-max-microvolt = <1350000>; + regulator-boot-on; + regulator-always-on; + }; + + /* vdd_3p3 */ + BUCK4 { + regulator-name = "buck4"; + regulator-min-microvolt = <3000000>; + regulator-max-microvolt = <3300000>; + regulator-boot-on; + regulator-always-on; + }; + + /* vdd_1p8 */ + BUCK5 { + regulator-name = "buck5"; + regulator-min-microvolt = <1605000>; + regulator-max-microvolt = <1995000>; + regulator-boot-on; + regulator-always-on; + }; + + /* vdd_dram */ + BUCK6 { + regulator-name = "buck6"; + regulator-min-microvolt = <800000>; + regulator-max-microvolt = <1400000>; + regulator-boot-on; + regulator-always-on; + }; + + /* nvcc_snvs_1p8 */ + LDO1 { + regulator-name = "ldo1"; + regulator-min-microvolt = <1600000>; + regulator-max-microvolt = <1900000>; + regulator-boot-on; + regulator-always-on; + }; + + /* vdd_snvs_0p8 */ + LDO2 { + regulator-name = "ldo2"; + regulator-min-microvolt = <800000>; + regulator-max-microvolt = <900000>; + regulator-boot-on; + regulator-always-on; + }; + + /* vdda_1p8 */ + LDO3 { + regulator-name = "ldo3"; + regulator-min-microvolt = <1800000>; + regulator-max-microvolt = <3300000>; + regulator-boot-on; + regulator-always-on; + }; + + LDO4 { + regulator-name = "ldo4"; + regulator-min-microvolt = <900000>; + regulator-max-microvolt = <1800000>; + regulator-boot-on; + regulator-always-on; + }; + + LDO6 { + regulator-name = "ldo6"; + regulator-min-microvolt = <900000>; + regulator-max-microvolt = <1800000>; + regulator-boot-on; + regulator-always-on; + }; + }; + }; +}; + +&i2c3 { + clock-frequency = <400000>; + pinctrl-names = "default", "gpio"; + pinctrl-0 = <&pinctrl_i2c3>; + pinctrl-1 = <&pinctrl_i2c3_gpio>; + scl-gpios = <&gpio5 18 (GPIO_ACTIVE_HIGH | GPIO_OPEN_DRAIN)>; + sda-gpios = <&gpio5 19 (GPIO_ACTIVE_HIGH | GPIO_OPEN_DRAIN)>; + status = "okay"; + + accelerometer@19 { + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_accel>; + compatible = "st,lis2de12"; + reg = <0x19>; + st,drdy-int-pin = <1>; + interrupt-parent = <&gpio1>; + interrupts = <15 IRQ_TYPE_LEVEL_LOW>; + }; +}; + +&pcie_phy { + fsl,refclk-pad-mode = <IMX8_PCIE_REFCLK_PAD_INPUT>; + fsl,clkreq-unsupported; + clocks = <&pcie0_refclk>; + clock-names = "ref"; + status = "okay"; +}; + +&pcie0 { + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_pcie0>; + reset-gpio = <&gpio5 11 GPIO_ACTIVE_LOW>; + clocks = <&clk IMX8MM_CLK_PCIE1_ROOT>, <&pcie0_refclk>, + <&clk IMX8MM_CLK_PCIE1_AUX>; + assigned-clocks = <&clk IMX8MM_CLK_PCIE1_AUX>, + <&clk IMX8MM_CLK_PCIE1_CTRL>; + assigned-clock-rates = <10000000>, <250000000>; + assigned-clock-parents = <&clk IMX8MM_SYS_PLL2_50M>, + <&clk IMX8MM_SYS_PLL2_250M>; + status = "okay"; +}; + +&disp_blk_ctrl { + status = "disabled"; +}; + +&pgc_mipi { + status = "disabled"; +}; + +/* console */ +&uart2 { + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_uart2>; + status = "okay"; +}; + +&usbotg1 { + dr_mode = "host"; + disable-over-current; + status = "okay"; +}; + +/* microSD */ +&usdhc2 { + pinctrl-names = "default", "state_100mhz", "state_200mhz"; + pinctrl-0 = <&pinctrl_usdhc2>, <&pinctrl_usdhc2_gpio>; + pinctrl-1 = <&pinctrl_usdhc2_100mhz>, <&pinctrl_usdhc2_gpio>; + pinctrl-2 = <&pinctrl_usdhc2_200mhz>, <&pinctrl_usdhc2_gpio>; + cd-gpios = <&gpio2 12 GPIO_ACTIVE_LOW>; + bus-width = <4>; + vmmc-supply = <&reg_3p3v>; + status = "okay"; +}; + +/* eMMC */ +&usdhc3 { + pinctrl-names = "default", "state_100mhz", "state_200mhz"; + pinctrl-0 = <&pinctrl_usdhc3>; + pinctrl-1 = <&pinctrl_usdhc3_100mhz>; + pinctrl-2 = <&pinctrl_usdhc3_200mhz>; + assigned-clocks = <&clk IMX8MM_CLK_USDHC3>; + assigned-clock-rates = <400000000>; + bus-width = <8>; + non-removable; + status = "okay"; +}; + +&wdog1 { + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_wdog>; + fsl,ext-reset-output; + status = "okay"; +}; + +&iomuxc { + pinctrl-names = "default"; + pinctrl-0 = <&pinctrl_hog>; + + pinctrl_hog: hoggrp { + fsl,pins = < + MX8MM_IOMUXC_GPIO1_IO10_GPIO1_IO10 0x40000041 /* RS422# */ + MX8MM_IOMUXC_GPIO1_IO11_GPIO1_IO11 0x40000041 /* RS485# */ + MX8MM_IOMUXC_GPIO1_IO12_GPIO1_IO12 0x40000041 /* RS232# */ + MX8MM_IOMUXC_SD1_DATA7_GPIO2_IO9 0x40000041 /* DIG1_IN */ + MX8MM_IOMUXC_SD1_DATA6_GPIO2_IO8 0x40000041 /* DIG1_OUT */ + MX8MM_IOMUXC_SD1_DATA4_GPIO2_IO6 0x40000041 /* DIG1_CTL */ + MX8MM_IOMUXC_ECSPI2_MISO_GPIO5_IO12 0x40000041 /* PCI_WDIS# */ + >; + }; + + pinctrl_accel: accelgrp { + fsl,pins = < + MX8MM_IOMUXC_GPIO1_IO15_GPIO1_IO15 0x159 + >; + }; + + pinctrl_fec1: fec1grp { + fsl,pins = < + MX8MM_IOMUXC_ENET_MDC_ENET1_MDC 0x3 + MX8MM_IOMUXC_ENET_MDIO_ENET1_MDIO 0x3 + MX8MM_IOMUXC_ENET_TD3_ENET1_RGMII_TD3 0x1f + MX8MM_IOMUXC_ENET_TD2_ENET1_RGMII_TD2 0x1f + MX8MM_IOMUXC_ENET_TD1_ENET1_RGMII_TD1 0x1f + MX8MM_IOMUXC_ENET_TD0_ENET1_RGMII_TD0 0x1f + MX8MM_IOMUXC_ENET_RD3_ENET1_RGMII_RD3 0x91 + MX8MM_IOMUXC_ENET_RD2_ENET1_RGMII_RD2 0x91 + MX8MM_IOMUXC_ENET_RD1_ENET1_RGMII_RD1 0x91 + MX8MM_IOMUXC_ENET_RD0_ENET1_RGMII_RD0 0x91 + MX8MM_IOMUXC_ENET_TXC_ENET1_RGMII_TXC 0x0 + MX8MM_IOMUXC_ENET_RXC_ENET1_RGMII_RXC 0x91 + MX8MM_IOMUXC_ENET_RX_CTL_ENET1_RGMII_RX_CTL 0x91 + MX8MM_IOMUXC_ENET_TX_CTL_ENET1_RGMII_TX_CTL 0x1f + MX8MM_IOMUXC_SAI2_TXFS_GPIO4_IO24 0x19 /* IRQ# */ + MX8MM_IOMUXC_SAI2_TXC_GPIO4_IO25 0x19 /* RST# */ + >; + }; + + pinctrl_gsc: gscgrp { + fsl,pins = < + MX8MM_IOMUXC_SAI2_TXD0_GPIO4_IO26 0x159 + >; + }; + + pinctrl_i2c1: i2c1grp { + fsl,pins = < + MX8MM_IOMUXC_I2C1_SCL_I2C1_SCL 0x400001c3 + MX8MM_IOMUXC_I2C1_SDA_I2C1_SDA 0x400001c3 + >; + }; + + pinctrl_i2c1_gpio: i2c1gpiogrp { + fsl,pins = < + MX8MM_IOMUXC_I2C1_SCL_GPIO5_IO14 0x400001c3 + MX8MM_IOMUXC_I2C1_SDA_GPIO5_IO15 0x400001c3 + >; + }; + + pinctrl_i2c2: i2c2grp { + fsl,pins = < + MX8MM_IOMUXC_I2C2_SCL_I2C2_SCL 0x400001c3 + MX8MM_IOMUXC_I2C2_SDA_I2C2_SDA 0x400001c3 + >; + }; + + pinctrl_i2c2_gpio: i2c2gpiogrp { + fsl,pins = < + MX8MM_IOMUXC_I2C2_SCL_GPIO5_IO16 0x400001c3 + MX8MM_IOMUXC_I2C2_SDA_GPIO5_IO17 0x400001c3 + >; + }; + + pinctrl_i2c3: i2c3grp { + fsl,pins = < + MX8MM_IOMUXC_I2C3_SCL_I2C3_SCL 0x400001c3 + MX8MM_IOMUXC_I2C3_SDA_I2C3_SDA 0x400001c3 + >; + }; + + pinctrl_i2c3_gpio: i2c3gpiogrp { + fsl,pins = < + MX8MM_IOMUXC_I2C3_SCL_GPIO5_IO18 0x400001c3 + MX8MM_IOMUXC_I2C3_SDA_GPIO5_IO19 0x400001c3 + >; + }; + + pinctrl_gpio_leds: gpioledgrp { + fsl,pins = < + MX8MM_IOMUXC_SPDIF_EXT_CLK_GPIO5_IO5 0x19 + MX8MM_IOMUXC_SAI3_RXD_GPIO4_IO30 0x19 + MX8MM_IOMUXC_SAI3_MCLK_GPIO5_IO2 0x19 + MX8MM_IOMUXC_GPIO1_IO14_GPIO1_IO14 0x19 + MX8MM_IOMUXC_GPIO1_IO09_GPIO1_IO9 0x19 + MX8MM_IOMUXC_SPDIF_TX_GPIO5_IO3 0x19 + MX8MM_IOMUXC_SAI3_RXC_GPIO4_IO29 0x19 + MX8MM_IOMUXC_SAI3_RXFS_GPIO4_IO28 0x19 + MX8MM_IOMUXC_GPIO1_IO13_GPIO1_IO13 0x19 + MX8MM_IOMUXC_SAI3_TXFS_GPIO4_IO31 0x19 + MX8MM_IOMUXC_SPDIF_RX_GPIO5_IO4 0x19 + MX8MM_IOMUXC_GPIO1_IO08_GPIO1_IO8 0x19 + >; + }; + + pinctrl_pcie0: pciegrp { + fsl,pins = < + MX8MM_IOMUXC_ECSPI2_MOSI_GPIO5_IO11 0x41 + >; + }; + + pinctrl_pmic: pmicgrp { + fsl,pins = < + MX8MM_IOMUXC_NAND_DATA02_GPIO3_IO8 0x41 + >; + }; + + pinctrl_uart2: uart2grp { + fsl,pins = < + MX8MM_IOMUXC_UART2_RXD_UART2_DCE_RX 0x140 + MX8MM_IOMUXC_UART2_TXD_UART2_DCE_TX 0x140 + >; + }; + + pinctrl_usdhc2: usdhc2grp { + fsl,pins = < + MX8MM_IOMUXC_SD2_CLK_USDHC2_CLK 0x190 + MX8MM_IOMUXC_SD2_CMD_USDHC2_CMD 0x1d0 + MX8MM_IOMUXC_SD2_DATA0_USDHC2_DATA0 0x1d0 + MX8MM_IOMUXC_SD2_DATA1_USDHC2_DATA1 0x1d0 + MX8MM_IOMUXC_SD2_DATA2_USDHC2_DATA2 0x1d0 + MX8MM_IOMUXC_SD2_DATA3_USDHC2_DATA3 0x1d0 + >; + }; + + pinctrl_usdhc2_100mhz: usdhc2-100mhzgrp { + fsl,pins = < + MX8MM_IOMUXC_SD2_CLK_USDHC2_CLK 0x194 + MX8MM_IOMUXC_SD2_CMD_USDHC2_CMD 0x1d4 + MX8MM_IOMUXC_SD2_DATA0_USDHC2_DATA0 0x1d4 + MX8MM_IOMUXC_SD2_DATA1_USDHC2_DATA1 0x1d4 + MX8MM_IOMUXC_SD2_DATA2_USDHC2_DATA2 0x1d4 + MX8MM_IOMUXC_SD2_DATA3_USDHC2_DATA3 0x1d4 + >; + }; + + pinctrl_usdhc2_200mhz: usdhc2-200mhzgrp { + fsl,pins = < + MX8MM_IOMUXC_SD2_CLK_USDHC2_CLK 0x196 + MX8MM_IOMUXC_SD2_CMD_USDHC2_CMD 0x1d6 + MX8MM_IOMUXC_SD2_DATA0_USDHC2_DATA0 0x1d6 + MX8MM_IOMUXC_SD2_DATA1_USDHC2_DATA1 0x1d6 + MX8MM_IOMUXC_SD2_DATA2_USDHC2_DATA2 0x1d6 + MX8MM_IOMUXC_SD2_DATA3_USDHC2_DATA3 0x1d6 + >; + }; + + pinctrl_usdhc2_gpio: usdhc2-gpiogrp { + fsl,pins = < + MX8MM_IOMUXC_SD2_CD_B_GPIO2_IO12 0x1c4 + MX8MM_IOMUXC_GPIO1_IO04_USDHC2_VSELECT 0x1d0 + >; + }; + + pinctrl_usdhc3: usdhc3grp { + fsl,pins = < + MX8MM_IOMUXC_NAND_WE_B_USDHC3_CLK 0x190 + MX8MM_IOMUXC_NAND_WP_B_USDHC3_CMD 0x1d0 + MX8MM_IOMUXC_NAND_DATA04_USDHC3_DATA0 0x1d0 + MX8MM_IOMUXC_NAND_DATA05_USDHC3_DATA1 0x1d0 + MX8MM_IOMUXC_NAND_DATA06_USDHC3_DATA2 0x1d0 + MX8MM_IOMUXC_NAND_DATA07_USDHC3_DATA3 0x1d0 + MX8MM_IOMUXC_NAND_RE_B_USDHC3_DATA4 0x1d0 + MX8MM_IOMUXC_NAND_CE2_B_USDHC3_DATA5 0x1d0 + MX8MM_IOMUXC_NAND_CE3_B_USDHC3_DATA6 0x1d0 + MX8MM_IOMUXC_NAND_CLE_USDHC3_DATA7 0x1d0 + MX8MM_IOMUXC_NAND_CE1_B_USDHC3_STROBE 0x190 + >; + }; + + pinctrl_usdhc3_100mhz: usdhc3-100mhzgrp { + fsl,pins = < + MX8MM_IOMUXC_NAND_WE_B_USDHC3_CLK 0x194 + MX8MM_IOMUXC_NAND_WP_B_USDHC3_CMD 0x1d4 + MX8MM_IOMUXC_NAND_DATA04_USDHC3_DATA0 0x1d4 + MX8MM_IOMUXC_NAND_DATA05_USDHC3_DATA1 0x1d4 + MX8MM_IOMUXC_NAND_DATA06_USDHC3_DATA2 0x1d4 + MX8MM_IOMUXC_NAND_DATA07_USDHC3_DATA3 0x1d4 + MX8MM_IOMUXC_NAND_RE_B_USDHC3_DATA4 0x1d4 + MX8MM_IOMUXC_NAND_CE2_B_USDHC3_DATA5 0x1d4 + MX8MM_IOMUXC_NAND_CE3_B_USDHC3_DATA6 0x1d4 + MX8MM_IOMUXC_NAND_CLE_USDHC3_DATA7 0x1d4 + MX8MM_IOMUXC_NAND_CE1_B_USDHC3_STROBE 0x194 + >; + }; + + pinctrl_usdhc3_200mhz: usdhc3-200mhzgrp { + fsl,pins = < + MX8MM_IOMUXC_NAND_WE_B_USDHC3_CLK 0x196 + MX8MM_IOMUXC_NAND_WP_B_USDHC3_CMD 0x1d6 + MX8MM_IOMUXC_NAND_DATA04_USDHC3_DATA0 0x1d6 + MX8MM_IOMUXC_NAND_DATA05_USDHC3_DATA1 0x1d6 + MX8MM_IOMUXC_NAND_DATA06_USDHC3_DATA2 0x1d6 + MX8MM_IOMUXC_NAND_DATA07_USDHC3_DATA3 0x1d6 + MX8MM_IOMUXC_NAND_RE_B_USDHC3_DATA4 0x1d6 + MX8MM_IOMUXC_NAND_CE2_B_USDHC3_DATA5 0x1d6 + MX8MM_IOMUXC_NAND_CE3_B_USDHC3_DATA6 0x1d6 + MX8MM_IOMUXC_NAND_CLE_USDHC3_DATA7 0x1d6 + MX8MM_IOMUXC_NAND_CE1_B_USDHC3_STROBE 0x196 + >; + }; + + pinctrl_wdog: wdoggrp { + fsl,pins = < + MX8MM_IOMUXC_GPIO1_IO02_WDOG1_WDOG_B 0xc6 + >; + }; +}; -- 2.25.1
{ "author": "Tim Harvey <tharvey@gateworks.com>", "date": "Mon, 2 Feb 2026 10:10:29 -0800", "thread_id": "aYD4BwB3McK45vCk@lizhi-Precision-Tower-5810.mbox.gz" }
lkml
[PATCH 1/2] dt-bindings: arm: fsl: Add Gateworks GW7906 board
Add support for the Gateworks GW7906 board based on the i.MX8M Mini SoC. Signed-off-by: Tim Harvey <tharvey@gateworks.com> --- Documentation/devicetree/bindings/arm/fsl.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/devicetree/bindings/arm/fsl.yaml b/Documentation/devicetree/bindings/arm/fsl.yaml index 68a2d5fecc43..46a85f8f9e5c 100644 --- a/Documentation/devicetree/bindings/arm/fsl.yaml +++ b/Documentation/devicetree/bindings/arm/fsl.yaml @@ -963,6 +963,7 @@ properties: - fsl,imx8mm-evkb # i.MX8MM EVKB Board - gateworks,imx8mm-gw75xx-0x # i.MX8MM Gateworks Board - gateworks,imx8mm-gw7904 + - gateworks,imx8mm-gw7906 # i.MX8MM Gateworks Board - gw,imx8mm-gw71xx-0x # i.MX8MM Gateworks Development Kit - gw,imx8mm-gw72xx-0x # i.MX8MM Gateworks Development Kit - gw,imx8mm-gw73xx-0x # i.MX8MM Gateworks Development Kit -- 2.25.1
On Mon, Feb 02, 2026 at 10:10:29AM -0800, Tim Harvey wrote: Any difference with gateworks,imx8mm-gw7904? Can reuse existed file? Please run https://github.com/lznuaa/dt-format for new dts to keep nice node order, If output result is not good enough, let know Frank
{ "author": "Frank Li <Frank.li@nxp.com>", "date": "Mon, 2 Feb 2026 14:16:23 -0500", "thread_id": "aYD4BwB3McK45vCk@lizhi-Precision-Tower-5810.mbox.gz" }
lkml
[PATCH v2 0/2] ARM64 support for doorbell and intercept SINTs
From: "Anirudh Rayabharam (Microsoft)" <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. Changes in v2: Addressed review comments: - Moved more stuff into mshv_synic.c - Code simplifications - Removed unnecessary debug prints v1: https://lore.kernel.org/linux-hyperv/20260128160437.3342167-1-anirudh@anirudhrb.com/ Anirudh Rayabharam (Microsoft) (2): mshv: refactor synic init and cleanup mshv: add arm64 support for doorbell & intercept SINTs drivers/hv/mshv_root.h | 5 +- drivers/hv/mshv_root_main.c | 59 ++------- drivers/hv/mshv_synic.c | 232 ++++++++++++++++++++++++++++++++++-- 3 files changed, 230 insertions(+), 66 deletions(-) -- 2.34.1
From: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> Rename mshv_synic_init() to mshv_synic_cpu_init() and mshv_synic_cleanup() to mshv_synic_cpu_exit() to better reflect that these functions handle per-cpu synic setup and teardown. Use mshv_synic_init/cleanup() to perform init/cleanup that is not per-cpu. Move all the synic related setup from mshv_parent_partition_init. Move the reboot notifier to mshv_synic.c because it currently only operates on the synic cpuhp state. Move out synic_pages from the global mshv_root since it's use is now completely local to mshv_synic.c. This is in preparation for the next patch which will add more stuff to mshv_synic_init(). No functional change. Signed-off-by: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> --- drivers/hv/mshv_root.h | 5 ++- drivers/hv/mshv_root_main.c | 59 +++++------------------------- drivers/hv/mshv_synic.c | 71 +++++++++++++++++++++++++++++++++---- 3 files changed, 75 insertions(+), 60 deletions(-) diff --git a/drivers/hv/mshv_root.h b/drivers/hv/mshv_root.h index 3c1d88b36741..26e0320c8097 100644 --- a/drivers/hv/mshv_root.h +++ b/drivers/hv/mshv_root.h @@ -183,7 +183,6 @@ struct hv_synic_pages { }; struct mshv_root { - struct hv_synic_pages __percpu *synic_pages; spinlock_t pt_ht_lock; DECLARE_HASHTABLE(pt_htable, MSHV_PARTITIONS_HASH_BITS); struct hv_partition_property_vmm_capabilities vmm_caps; @@ -242,8 +241,8 @@ int mshv_register_doorbell(u64 partition_id, doorbell_cb_t doorbell_cb, void mshv_unregister_doorbell(u64 partition_id, int doorbell_portid); void mshv_isr(void); -int mshv_synic_init(unsigned int cpu); -int mshv_synic_cleanup(unsigned int cpu); +int mshv_synic_init(struct device *dev); +void mshv_synic_cleanup(void); static inline bool mshv_partition_encrypted(struct mshv_partition *partition) { diff --git a/drivers/hv/mshv_root_main.c b/drivers/hv/mshv_root_main.c index 681b58154d5e..7c1666456e78 100644 --- a/drivers/hv/mshv_root_main.c +++ b/drivers/hv/mshv_root_main.c @@ -2035,7 +2035,6 @@ mshv_dev_release(struct inode *inode, struct file *filp) return 0; } -static int mshv_cpuhp_online; static int mshv_root_sched_online; static const char *scheduler_type_to_string(enum hv_scheduler_type type) @@ -2198,40 +2197,14 @@ root_scheduler_deinit(void) free_percpu(root_scheduler_output); } -static int mshv_reboot_notify(struct notifier_block *nb, - unsigned long code, void *unused) -{ - cpuhp_remove_state(mshv_cpuhp_online); - return 0; -} - -struct notifier_block mshv_reboot_nb = { - .notifier_call = mshv_reboot_notify, -}; - static void mshv_root_partition_exit(void) { - unregister_reboot_notifier(&mshv_reboot_nb); root_scheduler_deinit(); } static int __init mshv_root_partition_init(struct device *dev) { - int err; - - err = root_scheduler_init(dev); - if (err) - return err; - - err = register_reboot_notifier(&mshv_reboot_nb); - if (err) - goto root_sched_deinit; - - return 0; - -root_sched_deinit: - root_scheduler_deinit(); - return err; + return root_scheduler_init(dev); } static void mshv_init_vmm_caps(struct device *dev) @@ -2276,31 +2249,18 @@ static int __init mshv_parent_partition_init(void) MSHV_HV_MAX_VERSION); } - mshv_root.synic_pages = alloc_percpu(struct hv_synic_pages); - if (!mshv_root.synic_pages) { - dev_err(dev, "Failed to allocate percpu synic page\n"); - ret = -ENOMEM; + ret = mshv_synic_init(dev); + if (ret) goto device_deregister; - } - - ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mshv_synic", - mshv_synic_init, - mshv_synic_cleanup); - if (ret < 0) { - dev_err(dev, "Failed to setup cpu hotplug state: %i\n", ret); - goto free_synic_pages; - } - - mshv_cpuhp_online = ret; ret = mshv_retrieve_scheduler_type(dev); if (ret) - goto remove_cpu_state; + goto synic_cleanup; if (hv_root_partition()) ret = mshv_root_partition_init(dev); if (ret) - goto remove_cpu_state; + goto synic_cleanup; mshv_init_vmm_caps(dev); @@ -2318,10 +2278,8 @@ static int __init mshv_parent_partition_init(void) exit_partition: if (hv_root_partition()) mshv_root_partition_exit(); -remove_cpu_state: - cpuhp_remove_state(mshv_cpuhp_online); -free_synic_pages: - free_percpu(mshv_root.synic_pages); +synic_cleanup: + mshv_synic_cleanup(); device_deregister: misc_deregister(&mshv_dev); return ret; @@ -2335,8 +2293,7 @@ static void __exit mshv_parent_partition_exit(void) mshv_irqfd_wq_cleanup(); if (hv_root_partition()) mshv_root_partition_exit(); - cpuhp_remove_state(mshv_cpuhp_online); - free_percpu(mshv_root.synic_pages); + mshv_synic_cleanup(); } module_init(mshv_parent_partition_init); diff --git a/drivers/hv/mshv_synic.c b/drivers/hv/mshv_synic.c index f8b0337cdc82..98c58755846d 100644 --- a/drivers/hv/mshv_synic.c +++ b/drivers/hv/mshv_synic.c @@ -12,11 +12,16 @@ #include <linux/mm.h> #include <linux/io.h> #include <linux/random.h> +#include <linux/cpuhotplug.h> +#include <linux/reboot.h> #include <asm/mshyperv.h> #include "mshv_eventfd.h" #include "mshv.h" +static int synic_cpuhp_online; +static struct hv_synic_pages __percpu *synic_pages; + static u32 synic_event_ring_get_queued_port(u32 sint_index) { struct hv_synic_event_ring_page **event_ring_page; @@ -26,7 +31,7 @@ static u32 synic_event_ring_get_queued_port(u32 sint_index) u32 message; u8 tail; - spages = this_cpu_ptr(mshv_root.synic_pages); + spages = this_cpu_ptr(synic_pages); event_ring_page = &spages->synic_event_ring_page; synic_eventring_tail = (u8 **)this_cpu_ptr(hv_synic_eventring_tail); @@ -393,7 +398,7 @@ mshv_intercept_isr(struct hv_message *msg) void mshv_isr(void) { - struct hv_synic_pages *spages = this_cpu_ptr(mshv_root.synic_pages); + struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; struct hv_message *msg; bool handled; @@ -446,7 +451,7 @@ void mshv_isr(void) } } -int mshv_synic_init(unsigned int cpu) +static int mshv_synic_cpu_init(unsigned int cpu) { union hv_synic_simp simp; union hv_synic_siefp siefp; @@ -455,7 +460,7 @@ int mshv_synic_init(unsigned int cpu) union hv_synic_sint sint; #endif union hv_synic_scontrol sctrl; - struct hv_synic_pages *spages = this_cpu_ptr(mshv_root.synic_pages); + struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; struct hv_synic_event_flags_page **event_flags_page = &spages->synic_event_flags_page; @@ -542,14 +547,14 @@ int mshv_synic_init(unsigned int cpu) return -EFAULT; } -int mshv_synic_cleanup(unsigned int cpu) +static int mshv_synic_cpu_exit(unsigned int cpu) { union hv_synic_sint sint; union hv_synic_simp simp; union hv_synic_siefp siefp; union hv_synic_sirbp sirbp; union hv_synic_scontrol sctrl; - struct hv_synic_pages *spages = this_cpu_ptr(mshv_root.synic_pages); + struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; struct hv_synic_event_flags_page **event_flags_page = &spages->synic_event_flags_page; @@ -663,3 +668,57 @@ mshv_unregister_doorbell(u64 partition_id, int doorbell_portid) mshv_portid_free(doorbell_portid); } + +static int mshv_synic_reboot_notify(struct notifier_block *nb, + unsigned long code, void *unused) +{ + cpuhp_remove_state(synic_cpuhp_online); + return 0; +} + +static struct notifier_block mshv_synic_reboot_nb = { + .notifier_call = mshv_synic_reboot_notify, +}; + +int __init mshv_synic_init(struct device *dev) +{ + int ret = 0; + + synic_pages = alloc_percpu(struct hv_synic_pages); + if (!synic_pages) { + dev_err(dev, "Failed to allocate percpu synic page\n"); + return -ENOMEM; + } + + ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mshv_synic", + mshv_synic_cpu_init, + mshv_synic_cpu_exit); + if (ret < 0) { + dev_err(dev, "Failed to setup cpu hotplug state: %i\n", ret); + goto free_synic_pages; + } + + synic_cpuhp_online = ret; + + if (hv_root_partition()) { + ret = register_reboot_notifier(&mshv_synic_reboot_nb); + if (ret) + goto remove_cpuhp_state; + } + + return 0; + +remove_cpuhp_state: + cpuhp_remove_state(synic_cpuhp_online); +free_synic_pages: + free_percpu(synic_pages); + return ret; +} + +void mshv_synic_cleanup(void) +{ + if (hv_root_partition()) + unregister_reboot_notifier(&mshv_synic_reboot_nb); + cpuhp_remove_state(synic_cpuhp_online); + free_percpu(synic_pages); +} -- 2.34.1
{ "author": "Anirudh Rayabharam <anirudh@anirudhrb.com>", "date": "Mon, 2 Feb 2026 18:27:05 +0000", "thread_id": "aYD3XvbrOhH3NNP_@skinsburskii.localdomain.mbox.gz" }
lkml
[PATCH v2 0/2] ARM64 support for doorbell and intercept SINTs
From: "Anirudh Rayabharam (Microsoft)" <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. Changes in v2: Addressed review comments: - Moved more stuff into mshv_synic.c - Code simplifications - Removed unnecessary debug prints v1: https://lore.kernel.org/linux-hyperv/20260128160437.3342167-1-anirudh@anirudhrb.com/ Anirudh Rayabharam (Microsoft) (2): mshv: refactor synic init and cleanup mshv: add arm64 support for doorbell & intercept SINTs drivers/hv/mshv_root.h | 5 +- drivers/hv/mshv_root_main.c | 59 ++------- drivers/hv/mshv_synic.c | 232 ++++++++++++++++++++++++++++++++++-- 3 files changed, 230 insertions(+), 66 deletions(-) -- 2.34.1
From: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. To better unify x86 and arm64 paths, introduce mshv_sint_vector_init() that either registers the platform_driver and obtains the INTID (arm64) or just uses HYPERVISOR_CALLBACK_VECTOR as the interrupt vector (x86). Signed-off-by: Anirudh Rayabharam (Microsoft) <anirudh@anirudhrb.com> --- drivers/hv/mshv_synic.c | 163 ++++++++++++++++++++++++++++++++++++++-- 1 file changed, 156 insertions(+), 7 deletions(-) diff --git a/drivers/hv/mshv_synic.c b/drivers/hv/mshv_synic.c index 98c58755846d..de5fee6e9f29 100644 --- a/drivers/hv/mshv_synic.c +++ b/drivers/hv/mshv_synic.c @@ -10,17 +10,24 @@ #include <linux/kernel.h> #include <linux/slab.h> #include <linux/mm.h> +#include <linux/interrupt.h> #include <linux/io.h> #include <linux/random.h> #include <linux/cpuhotplug.h> #include <linux/reboot.h> #include <asm/mshyperv.h> +#include <linux/platform_device.h> +#include <linux/acpi.h> #include "mshv_eventfd.h" #include "mshv.h" static int synic_cpuhp_online; static struct hv_synic_pages __percpu *synic_pages; +static int mshv_sint_vector = -1; /* hwirq for the SynIC SINTs */ +#ifndef HYPERVISOR_CALLBACK_VECTOR +static int mshv_sint_irq = -1; /* Linux IRQ for mshv_sint_vector */ +#endif static u32 synic_event_ring_get_queued_port(u32 sint_index) { @@ -456,9 +463,7 @@ static int mshv_synic_cpu_init(unsigned int cpu) union hv_synic_simp simp; union hv_synic_siefp siefp; union hv_synic_sirbp sirbp; -#ifdef HYPERVISOR_CALLBACK_VECTOR union hv_synic_sint sint; -#endif union hv_synic_scontrol sctrl; struct hv_synic_pages *spages = this_cpu_ptr(synic_pages); struct hv_message_page **msg_page = &spages->hyp_synic_message_page; @@ -501,10 +506,13 @@ static int mshv_synic_cpu_init(unsigned int cpu) hv_set_non_nested_msr(HV_MSR_SIRBP, sirbp.as_uint64); -#ifdef HYPERVISOR_CALLBACK_VECTOR +#ifndef HYPERVISOR_CALLBACK_VECTOR + enable_percpu_irq(mshv_sint_irq, 0); +#endif + /* Enable intercepts */ sint.as_uint64 = 0; - sint.vector = HYPERVISOR_CALLBACK_VECTOR; + sint.vector = mshv_sint_vector; sint.masked = false; sint.auto_eoi = hv_recommend_using_aeoi(); hv_set_non_nested_msr(HV_MSR_SINT0 + HV_SYNIC_INTERCEPTION_SINT_INDEX, @@ -512,13 +520,12 @@ static int mshv_synic_cpu_init(unsigned int cpu) /* Doorbell SINT */ sint.as_uint64 = 0; - sint.vector = HYPERVISOR_CALLBACK_VECTOR; + sint.vector = mshv_sint_vector; sint.masked = false; sint.as_intercept = 1; sint.auto_eoi = hv_recommend_using_aeoi(); hv_set_non_nested_msr(HV_MSR_SINT0 + HV_SYNIC_DOORBELL_SINT_INDEX, sint.as_uint64); -#endif /* Enable global synic bit */ sctrl.as_uint64 = hv_get_non_nested_msr(HV_MSR_SCONTROL); @@ -573,6 +580,10 @@ static int mshv_synic_cpu_exit(unsigned int cpu) hv_set_non_nested_msr(HV_MSR_SINT0 + HV_SYNIC_DOORBELL_SINT_INDEX, sint.as_uint64); +#ifndef HYPERVISOR_CALLBACK_VECTOR + disable_percpu_irq(mshv_sint_irq); +#endif + /* Disable Synic's event ring page */ sirbp.as_uint64 = hv_get_non_nested_msr(HV_MSR_SIRBP); sirbp.sirbp_enabled = false; @@ -680,14 +691,149 @@ static struct notifier_block mshv_synic_reboot_nb = { .notifier_call = mshv_synic_reboot_notify, }; +#ifndef HYPERVISOR_CALLBACK_VECTOR +#ifdef CONFIG_ACPI +static long __percpu *mshv_evt; + +static acpi_status mshv_walk_resources(struct acpi_resource *res, void *ctx) +{ + struct resource r; + + if (res->type == ACPI_RESOURCE_TYPE_EXTENDED_IRQ) { + if (!acpi_dev_resource_interrupt(res, 0, &r)) { + pr_err("Unable to parse MSHV ACPI interrupt\n"); + return AE_ERROR; + } + /* ARM64 INTID */ + mshv_sint_vector = res->data.extended_irq.interrupts[0]; + /* Linux IRQ number */ + mshv_sint_irq = r.start; + } + + return AE_OK; +} + +static irqreturn_t mshv_percpu_isr(int irq, void *dev_id) +{ + mshv_isr(); + return IRQ_HANDLED; +} + +static int mshv_sint_probe(struct platform_device *pdev) +{ + acpi_status result; + int ret; + struct acpi_device *device = ACPI_COMPANION(&pdev->dev); + + result = acpi_walk_resources(device->handle, METHOD_NAME__CRS, + mshv_walk_resources, NULL); + if (ACPI_FAILURE(result)) { + ret = -ENODEV; + goto out_fail; + } + + mshv_evt = alloc_percpu(long); + if (!mshv_evt) { + ret = -ENOMEM; + goto out_fail; + } + + ret = request_percpu_irq(mshv_sint_irq, mshv_percpu_isr, "MSHV", + mshv_evt); + if (ret) + goto free_evt; + + return 0; + +free_evt: + free_percpu(mshv_evt); +out_fail: + mshv_sint_vector = -1; + mshv_sint_irq = -1; + return ret; +} + +static void mshv_sint_remove(struct platform_device *pdev) +{ + free_percpu_irq(mshv_sint_irq, mshv_evt); + free_percpu(mshv_evt); +} +#else +static int mshv_sint_probe(struct platform_device *pdev) +{ + return -ENODEV; +} + +static void mshv_sint_remove(struct platform_device *pdev) +{ +} +#endif + +static const __maybe_unused struct acpi_device_id mshv_sint_device_ids[] = { + {"MSFT1003", 0}, + {"", 0}, +}; + +static struct platform_driver mshv_sint_drv = { + .probe = mshv_sint_probe, + .remove = mshv_sint_remove, + .driver = { + .name = "mshv_sint", + .acpi_match_table = ACPI_PTR(mshv_sint_device_ids), + .probe_type = PROBE_FORCE_SYNCHRONOUS, + }, +}; + +static int __init mshv_sint_vector_init(void) +{ + int ret; + + if (acpi_disabled) + return -ENODEV; + + ret = platform_driver_register(&mshv_sint_drv); + if (ret) + return ret; + + if (mshv_sint_vector == -1 || mshv_sint_irq == -1) { + platform_driver_unregister(&mshv_sint_drv); + return -ENODEV; + } + + return 0; +} + +static void mshv_sint_vector_cleanup(void) +{ + platform_driver_unregister(&mshv_sint_drv); +} +#else /* HYPERVISOR_CALLBACK_VECTOR */ +static int __init mshv_sint_vector_init(void) +{ + mshv_sint_vector = HYPERVISOR_CALLBACK_VECTOR; + return 0; +} + +static void mshv_sint_vector_cleanup(void) +{ +} +#endif /* HYPERVISOR_CALLBACK_VECTOR */ + int __init mshv_synic_init(struct device *dev) { int ret = 0; + ret = mshv_sint_vector_init(); + if (ret) { + dev_err(dev, "Failed to get MSHV SINT vector: %i\n", ret); + return ret; + } + synic_pages = alloc_percpu(struct hv_synic_pages); if (!synic_pages) { dev_err(dev, "Failed to allocate percpu synic page\n"); - return -ENOMEM; + ret = -ENOMEM; + goto sint_vector_cleanup; } ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "mshv_synic", @@ -712,6 +858,8 @@ int __init mshv_synic_init(struct device *dev) cpuhp_remove_state(synic_cpuhp_online); free_synic_pages: free_percpu(synic_pages); +sint_vector_cleanup: + mshv_sint_vector_cleanup(); return ret; } @@ -721,4 +869,5 @@ void mshv_synic_cleanup(void) unregister_reboot_notifier(&mshv_synic_reboot_nb); cpuhp_remove_state(synic_cpuhp_online); free_percpu(synic_pages); + mshv_sint_vector_cleanup(); } -- 2.34.1
{ "author": "Anirudh Rayabharam <anirudh@anirudhrb.com>", "date": "Mon, 2 Feb 2026 18:27:06 +0000", "thread_id": "aYD3XvbrOhH3NNP_@skinsburskii.localdomain.mbox.gz" }
lkml
[PATCH v2 0/2] ARM64 support for doorbell and intercept SINTs
From: "Anirudh Rayabharam (Microsoft)" <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. Changes in v2: Addressed review comments: - Moved more stuff into mshv_synic.c - Code simplifications - Removed unnecessary debug prints v1: https://lore.kernel.org/linux-hyperv/20260128160437.3342167-1-anirudh@anirudhrb.com/ Anirudh Rayabharam (Microsoft) (2): mshv: refactor synic init and cleanup mshv: add arm64 support for doorbell & intercept SINTs drivers/hv/mshv_root.h | 5 +- drivers/hv/mshv_root_main.c | 59 ++------- drivers/hv/mshv_synic.c | 232 ++++++++++++++++++++++++++++++++++-- 3 files changed, 230 insertions(+), 66 deletions(-) -- 2.34.1
On Mon, Feb 02, 2026 at 06:27:05PM +0000, Anirudh Rayabharam wrote: Unrelated to the change, but it would be great to get rid of this notifier altogether and just do the cleanup in the device shutdown hook. This is a cleaner approach as this is a device driver and we do have the device in hands. Do you think you could make this change a part of this series? This conflicts with the "mshv: Add support for integrated scheduler" patch out there. Perhaps we should ask Wei to merge that change first. Nit: it's probably better to branch in the notifier itself. It will introduce an additional object, but the branching will be in one palce instead of two and it will also make to code simpler and easier to read. Thanks Stanislav.
{ "author": "Stanislav Kinsburskii <skinsburskii@linux.microsoft.com>", "date": "Mon, 2 Feb 2026 11:07:17 -0800", "thread_id": "aYD3XvbrOhH3NNP_@skinsburskii.localdomain.mbox.gz" }
lkml
[PATCH v2 0/2] ARM64 support for doorbell and intercept SINTs
From: "Anirudh Rayabharam (Microsoft)" <anirudh@anirudhrb.com> On x86, the HYPERVISOR_CALLBACK_VECTOR is used to receive synthetic interrupts (SINTs) from the hypervisor for doorbells and intercepts. There is no such vector reserved for arm64. On arm64, the INTID for SINTs should be in the SGI or PPI range. The hypervisor exposes a virtual device in the ACPI that reserves a PPI for this use. Introduce a platform_driver that binds to this ACPI device and obtains the interrupt vector that can be used for SINTs. Changes in v2: Addressed review comments: - Moved more stuff into mshv_synic.c - Code simplifications - Removed unnecessary debug prints v1: https://lore.kernel.org/linux-hyperv/20260128160437.3342167-1-anirudh@anirudhrb.com/ Anirudh Rayabharam (Microsoft) (2): mshv: refactor synic init and cleanup mshv: add arm64 support for doorbell & intercept SINTs drivers/hv/mshv_root.h | 5 +- drivers/hv/mshv_root_main.c | 59 ++------- drivers/hv/mshv_synic.c | 232 ++++++++++++++++++++++++++++++++++-- 3 files changed, 230 insertions(+), 66 deletions(-) -- 2.34.1
On Mon, Feb 02, 2026 at 06:27:06PM +0000, Anirudh Rayabharam wrote: You have introduced 4 ifdef branches (one aroung the variable and three in mshv_synic_cpu_init) and then you still have a big ifdef branch here. Why is it better than simply introducing two different mshv_synic_cpu_init functions and have a single big ifdef instead (especially giving that this code is arch-specific anyway and thus won't bloat the binary)? This will also allows to get rid of redundant mshv_sint_vector variable on x86. Thanks, Stanislav
{ "author": "Stanislav Kinsburskii <skinsburskii@linux.microsoft.com>", "date": "Mon, 2 Feb 2026 11:13:34 -0800", "thread_id": "aYD3XvbrOhH3NNP_@skinsburskii.localdomain.mbox.gz" }
lkml
[PATCH bpf] bpf, sockmap: Fix af_unix null-ptr-deref in proto update
BPF_MAP_UPDATE_ELEM races unix_stream_connect(): when sock_map_sk_state_allowed() passes (sk_state == TCP_ESTABLISHED), unix_peer(sk) in unix_stream_bpf_update_proto() may still return NULL. T0 bpf T1 connect ------ ---------- WRITE_ONCE(sk->sk_state, TCP_ESTABLISHED) sock_map_sk_state_allowed(sk) ... sk_pair = unix_peer(sk) sock_hold(sk_pair) sock_hold(newsk) smp_mb__after_atomic() unix_peer(sk) = newsk BUG: kernel NULL pointer dereference, address: 0000000000000080 RIP: 0010:unix_stream_bpf_update_proto+0xa0/0x1b0 Call Trace: sock_map_link+0x564/0x8b0 sock_map_update_common+0x6e/0x340 sock_map_update_elem_sys+0x17d/0x240 __sys_bpf+0x26db/0x3250 __x64_sys_bpf+0x21/0x30 do_syscall_64+0x6b/0x3a0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Follow-up to discussion at https://lore.kernel.org/netdev/20240610174906.32921-1-kuniyu@amazon.com/. Fixes: 8866730aed51 ("bpf, sockmap: af_unix stream sockets need to hold ref for pair sock") Suggested-by: Kuniyuki Iwashima <kuniyu@google.com> Signed-off-by: Michal Luczaj <mhal@rbox.co> --- Re-triggered while working on an unrelated selftest: https://lore.kernel.org/bpf/20260123-selftest-signal-on-connect-v1-0-b0256e7025b6@rbox.co/ --- net/unix/unix_bpf.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/unix/unix_bpf.c b/net/unix/unix_bpf.c index e0d30d6d22ac..57f3124c9d8d 100644 --- a/net/unix/unix_bpf.c +++ b/net/unix/unix_bpf.c @@ -185,6 +185,9 @@ int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool r */ if (!psock->sk_pair) { sk_pair = unix_peer(sk); + if (unlikely(!sk_pair)) + return -EINVAL; + sock_hold(sk_pair); psock->sk_pair = sk_pair; } --- base-commit: 63804fed149a6750ffd28610c5c1c98cce6bd377 change-id: 20260129-unix-proto-update-null-ptr-deref-6a2733bcbbf8 Best regards, -- Michal Luczaj <mhal@rbox.co>
On 1/29/26 8:47 AM, Michal Luczaj wrote: It is a long thread to dig. Please summarize the discussion in the commit message. From looking at this commit message, if the existing lock_sock held by update_elem is not useful for af_unix, it is not clear why a new test "!sk_pair" on top of the existing WRITE_ONCE(sk->sk_state...) is a fix. A minor thing is sock_map_sk_state_allowed doesn't have READ_ONCE(sk->sk_state) for sk_is_stream_unix also. If unix_stream_connect does not hold lock_sock, can unix_state_lock be used here? lock_sock has already been taken, update_elem should not be the hot path.
{ "author": "Martin KaFai Lau <martin.lau@linux.dev>", "date": "Thu, 29 Jan 2026 11:41:17 -0800", "thread_id": "7603c0e6-cd5b-452b-b710-73b64bd9de26@linux.dev.mbox.gz" }
lkml
[PATCH bpf] bpf, sockmap: Fix af_unix null-ptr-deref in proto update
BPF_MAP_UPDATE_ELEM races unix_stream_connect(): when sock_map_sk_state_allowed() passes (sk_state == TCP_ESTABLISHED), unix_peer(sk) in unix_stream_bpf_update_proto() may still return NULL. T0 bpf T1 connect ------ ---------- WRITE_ONCE(sk->sk_state, TCP_ESTABLISHED) sock_map_sk_state_allowed(sk) ... sk_pair = unix_peer(sk) sock_hold(sk_pair) sock_hold(newsk) smp_mb__after_atomic() unix_peer(sk) = newsk BUG: kernel NULL pointer dereference, address: 0000000000000080 RIP: 0010:unix_stream_bpf_update_proto+0xa0/0x1b0 Call Trace: sock_map_link+0x564/0x8b0 sock_map_update_common+0x6e/0x340 sock_map_update_elem_sys+0x17d/0x240 __sys_bpf+0x26db/0x3250 __x64_sys_bpf+0x21/0x30 do_syscall_64+0x6b/0x3a0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Follow-up to discussion at https://lore.kernel.org/netdev/20240610174906.32921-1-kuniyu@amazon.com/. Fixes: 8866730aed51 ("bpf, sockmap: af_unix stream sockets need to hold ref for pair sock") Suggested-by: Kuniyuki Iwashima <kuniyu@google.com> Signed-off-by: Michal Luczaj <mhal@rbox.co> --- Re-triggered while working on an unrelated selftest: https://lore.kernel.org/bpf/20260123-selftest-signal-on-connect-v1-0-b0256e7025b6@rbox.co/ --- net/unix/unix_bpf.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/unix/unix_bpf.c b/net/unix/unix_bpf.c index e0d30d6d22ac..57f3124c9d8d 100644 --- a/net/unix/unix_bpf.c +++ b/net/unix/unix_bpf.c @@ -185,6 +185,9 @@ int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool r */ if (!psock->sk_pair) { sk_pair = unix_peer(sk); + if (unlikely(!sk_pair)) + return -EINVAL; + sock_hold(sk_pair); psock->sk_pair = sk_pair; } --- base-commit: 63804fed149a6750ffd28610c5c1c98cce6bd377 change-id: 20260129-unix-proto-update-null-ptr-deref-6a2733bcbbf8 Best regards, -- Michal Luczaj <mhal@rbox.co>
On 1/29/26 20:41, Martin KaFai Lau wrote: OK, there we go: The root cause of the null-ptr-deref is that unix_stream_connect() sets sk_state (`WRITE_ONCE(sk->sk_state, TCP_ESTABLISHED)`) _before_ it assigns a peer (`unix_peer(sk) = newsk`). sk_state == TCP_ESTABLISHED makes sock_map_sk_state_allowed() believe that socket is properly set up, which would include having a defined peer. In other words, there's a window when you can call unix_stream_bpf_update_proto() on socket which still has unix_peer(sk) == NULL. My initial idea was to simply move peer assignment _before_ the sk_state update, but the maintainer wasn't interested in changing the unix_stream_connect() hot path. He suggested taking care of it in the sockmap code. My understanding is that users are not supposed to put sockets in a sockmap when said socket is only half-way through connect() call. Hence `return -EINVAL` on a missing peer. Now, if users should be allowed to legally race connect() vs. sockmap update, then I guess we can wait for connect() to "finalize" e.g. by taking the unix_state_lock(), as discussed below. Right, the existing lock_sock is not useful. update's lock_sock holds sock::sk_lock, while unix_state_lock() holds unix_sock::lock. "On top"? Just to make sure we're looking at the same thing: above I was trying to show two parallel flows with unix_peer() fetch in thread-0 and WRITE_ONCE(sk->sk_state...) and `unix_peer(sk) = newsk` in thread-1. It fixes the problem because now update_proto won't call sock_hold(NULL). Ok, I'll add this as a separate patch in v2. Along with the !tcp case of sock_map_redirect_allowed()? Yes, it can be used, it was proposed in the old thread. In fact, critical section can be empty; only used to wait for unix_stream_connect() to release the lock, which would guarantee unix_peer(sk) != NULL by then. if (!psock->sk_pair) { + unix_state_lock(sk); + unix_state_unlock(sk); sk_pair = unix_peer(sk); sock_hold(sk_pair);
{ "author": "Michal Luczaj <mhal@rbox.co>", "date": "Fri, 30 Jan 2026 12:00:09 +0100", "thread_id": "7603c0e6-cd5b-452b-b710-73b64bd9de26@linux.dev.mbox.gz" }
lkml
[PATCH bpf] bpf, sockmap: Fix af_unix null-ptr-deref in proto update
BPF_MAP_UPDATE_ELEM races unix_stream_connect(): when sock_map_sk_state_allowed() passes (sk_state == TCP_ESTABLISHED), unix_peer(sk) in unix_stream_bpf_update_proto() may still return NULL. T0 bpf T1 connect ------ ---------- WRITE_ONCE(sk->sk_state, TCP_ESTABLISHED) sock_map_sk_state_allowed(sk) ... sk_pair = unix_peer(sk) sock_hold(sk_pair) sock_hold(newsk) smp_mb__after_atomic() unix_peer(sk) = newsk BUG: kernel NULL pointer dereference, address: 0000000000000080 RIP: 0010:unix_stream_bpf_update_proto+0xa0/0x1b0 Call Trace: sock_map_link+0x564/0x8b0 sock_map_update_common+0x6e/0x340 sock_map_update_elem_sys+0x17d/0x240 __sys_bpf+0x26db/0x3250 __x64_sys_bpf+0x21/0x30 do_syscall_64+0x6b/0x3a0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Follow-up to discussion at https://lore.kernel.org/netdev/20240610174906.32921-1-kuniyu@amazon.com/. Fixes: 8866730aed51 ("bpf, sockmap: af_unix stream sockets need to hold ref for pair sock") Suggested-by: Kuniyuki Iwashima <kuniyu@google.com> Signed-off-by: Michal Luczaj <mhal@rbox.co> --- Re-triggered while working on an unrelated selftest: https://lore.kernel.org/bpf/20260123-selftest-signal-on-connect-v1-0-b0256e7025b6@rbox.co/ --- net/unix/unix_bpf.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/unix/unix_bpf.c b/net/unix/unix_bpf.c index e0d30d6d22ac..57f3124c9d8d 100644 --- a/net/unix/unix_bpf.c +++ b/net/unix/unix_bpf.c @@ -185,6 +185,9 @@ int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool r */ if (!psock->sk_pair) { sk_pair = unix_peer(sk); + if (unlikely(!sk_pair)) + return -EINVAL; + sock_hold(sk_pair); psock->sk_pair = sk_pair; } --- base-commit: 63804fed149a6750ffd28610c5c1c98cce6bd377 change-id: 20260129-unix-proto-update-null-ptr-deref-6a2733bcbbf8 Best regards, -- Michal Luczaj <mhal@rbox.co>
On 1/30/26 3:00 AM, Michal Luczaj wrote: It sounds like lock_sock is the incorrect lock to hold for af_unix. Is taking lock_sock in sock_map doing anything useful for af_unix? Should sock_map hold the unix_state_lock instead of lock_sock? Other than update_elem, do other lock_sock() usages in sock_map have a similar issue for af_unix? sgtm. thanks. I don't have a strong opinion on waiting or checking NULL. imo, both are not easy to understand. One is sk_state had already been checked earlier under a lock_sock but still needs to check NULL on unix_peer(). Another one is an empty unix_state_[un]lock(). If taking unix_state_lock, may as well just use the existing unix_peer_get(sk). If its return value cannot (?) be NULL, WARN_ON_ONCE() instead of having a special empty lock/unlock pattern here. If the correct lock (unix_state_lock) was held earlier in update_elem, all these would go away. Also, it is not immediately clear why a non-NULL unix_peer(sk) is safe here. From looking around af_unix.c, is it because the sk refcnt is held earlier in update_elem? For unix_stream, unix_peer(sk) will stay valid until unix_release_sock(sk). Am I reading it correctly?
{ "author": "Martin KaFai Lau <martin.lau@linux.dev>", "date": "Fri, 30 Jan 2026 13:29:44 -0800", "thread_id": "7603c0e6-cd5b-452b-b710-73b64bd9de26@linux.dev.mbox.gz" }
lkml
[PATCH bpf] bpf, sockmap: Fix af_unix null-ptr-deref in proto update
BPF_MAP_UPDATE_ELEM races unix_stream_connect(): when sock_map_sk_state_allowed() passes (sk_state == TCP_ESTABLISHED), unix_peer(sk) in unix_stream_bpf_update_proto() may still return NULL. T0 bpf T1 connect ------ ---------- WRITE_ONCE(sk->sk_state, TCP_ESTABLISHED) sock_map_sk_state_allowed(sk) ... sk_pair = unix_peer(sk) sock_hold(sk_pair) sock_hold(newsk) smp_mb__after_atomic() unix_peer(sk) = newsk BUG: kernel NULL pointer dereference, address: 0000000000000080 RIP: 0010:unix_stream_bpf_update_proto+0xa0/0x1b0 Call Trace: sock_map_link+0x564/0x8b0 sock_map_update_common+0x6e/0x340 sock_map_update_elem_sys+0x17d/0x240 __sys_bpf+0x26db/0x3250 __x64_sys_bpf+0x21/0x30 do_syscall_64+0x6b/0x3a0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Follow-up to discussion at https://lore.kernel.org/netdev/20240610174906.32921-1-kuniyu@amazon.com/. Fixes: 8866730aed51 ("bpf, sockmap: af_unix stream sockets need to hold ref for pair sock") Suggested-by: Kuniyuki Iwashima <kuniyu@google.com> Signed-off-by: Michal Luczaj <mhal@rbox.co> --- Re-triggered while working on an unrelated selftest: https://lore.kernel.org/bpf/20260123-selftest-signal-on-connect-v1-0-b0256e7025b6@rbox.co/ --- net/unix/unix_bpf.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/unix/unix_bpf.c b/net/unix/unix_bpf.c index e0d30d6d22ac..57f3124c9d8d 100644 --- a/net/unix/unix_bpf.c +++ b/net/unix/unix_bpf.c @@ -185,6 +185,9 @@ int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool r */ if (!psock->sk_pair) { sk_pair = unix_peer(sk); + if (unlikely(!sk_pair)) + return -EINVAL; + sock_hold(sk_pair); psock->sk_pair = sk_pair; } --- base-commit: 63804fed149a6750ffd28610c5c1c98cce6bd377 change-id: 20260129-unix-proto-update-null-ptr-deref-6a2733bcbbf8 Best regards, -- Michal Luczaj <mhal@rbox.co>
On Fri, Jan 30, 2026 at 1:30 PM Martin KaFai Lau <martin.lau@linux.dev> wrote: Yes, we already have a memory barrier for unix_peer(sk) there (to save sock_hold()/sock_put() in sendmsg(), see 830a1e5c212fb) and another one just for sk->sk_state is not worth the unlikely case in sockmap by a buggy user. If a user hit the issue, the user must have updated sockmap while the user knows connect() had not returned. Such a user must prepare for failures since it could occur before sock_map_sk_state_allowed() too. This is a subtle timing issue and I don't think the kernel should be friendly to such buggy users by waiting for connect() etc. If sockmap code does not sleep, unix_state_lock can be used there. I don't like this... we had a similar one in recvmsg(MSG_PEEK) path for GC with a biiiiiig comment, which I removed in 118f457da9ed . Yes, unix_peer_get() can be safely used there (with extra sock_put()). I suggested WARN_ON_ONCE() because Michal reproduced it with mdelay() and I did not think it could occur in real life, but considering PREEMPT_RT, it could be real. So, the current form in this patch looks good to me. unix_stream_connect() holds the peer's refcnt, and once unix_peer(sk) is set, it and refcnt are not cleared until close()d. So unix_peer_get() is a bit redundant for sane users.
{ "author": "Kuniyuki Iwashima <kuniyu@google.com>", "date": "Sat, 31 Jan 2026 02:06:04 -0800", "thread_id": "7603c0e6-cd5b-452b-b710-73b64bd9de26@linux.dev.mbox.gz" }