Skip to content

Comments

[CBR 7.9] github actions: Make builds on Merge Request#88

Closed
PlaidCat wants to merge 1 commit intociqcbr7_9from
{jmaple}_ciqcbr7_9
Closed

[CBR 7.9] github actions: Make builds on Merge Request#88
PlaidCat wants to merge 1 commit intociqcbr7_9from
{jmaple}_ciqcbr7_9

Conversation

@PlaidCat
Copy link
Collaborator

Since we need to make sure external contributors code actually compiles prior to merging. To get access to the forked repos merge request we need to switch over our push to pull_request. In addition we're fixing up some Naming Conventions, adding aarch64 to this branch and fixing the naming so that we can quickly identify if the CI is for x86_64.

Also disable the process-pull-request until the utf-8 situation is resolved.

@PlaidCat PlaidCat force-pushed the {jmaple}_ciqcbr7_9 branch 3 times, most recently from c5cf779 to 125ee51 Compare January 24, 2025 23:18
Since we need to make sure external contributors code actually compiles
prior to merging. To get access to the forked repos merge request we
need to switch over our push to pull_request. In addition we're fixing up
some Naming Conventions, adding aarch64 to this branch and fixing the naming
so that we can quickly identify if the CI is for x86_64.

Also disable the process-pull-request until the `utf-8` situation is
resolved.
@PlaidCat
Copy link
Collaborator Author

Closing in favor of:
#231

@PlaidCat PlaidCat closed this Apr 28, 2025
@PlaidCat PlaidCat deleted the {jmaple}_ciqcbr7_9 branch July 11, 2025 19:06
github-actions bot pushed a commit that referenced this pull request Sep 12, 2025
Small cleanup and test extension to probe the bpf_crypto_{encrypt,decrypt}()
kfunc when a bad dst buffer is passed in to assert that an error is returned.

Also, encrypt_sanity() and skb_crypto_setup() were explicit to set the global
status variable to zero before any test, so do the same for decrypt_sanity().
Do not explicitly zero the on-stack err before bpf_crypto_ctx_create() given
the kfunc is expected to do it internally for the success case.

Before kernel fix:

  # ./vmtest.sh -- ./test_progs -t crypto
  [...]
  [    1.531200] bpf_testmod: loading out-of-tree module taints kernel.
  [    1.533388] bpf_testmod: module verification failed: signature and/or required key missing - tainting kernel
  #87/1    crypto_basic/crypto_release:OK
  #87/2    crypto_basic/crypto_acquire:OK
  #87      crypto_basic:OK
  test_crypto_sanity:PASS:skel open 0 nsec
  test_crypto_sanity:PASS:ip netns add crypto_sanity_ns 0 nsec
  test_crypto_sanity:PASS:ip -net crypto_sanity_ns -6 addr add face::1/128 dev lo nodad 0 nsec
  test_crypto_sanity:PASS:ip -net crypto_sanity_ns link set dev lo up 0 nsec
  test_crypto_sanity:PASS:open_netns 0 nsec
  test_crypto_sanity:PASS:AF_ALG init fail 0 nsec
  test_crypto_sanity:PASS:if_nametoindex lo 0 nsec
  test_crypto_sanity:PASS:skb_crypto_setup fd 0 nsec
  test_crypto_sanity:PASS:skb_crypto_setup 0 nsec
  test_crypto_sanity:PASS:skb_crypto_setup retval 0 nsec
  test_crypto_sanity:PASS:skb_crypto_setup status 0 nsec
  test_crypto_sanity:PASS:create qdisc hook 0 nsec
  test_crypto_sanity:PASS:make_sockaddr 0 nsec
  test_crypto_sanity:PASS:attach encrypt filter 0 nsec
  test_crypto_sanity:PASS:encrypt socket 0 nsec
  test_crypto_sanity:PASS:encrypt send 0 nsec
  test_crypto_sanity:FAIL:encrypt status unexpected error: -5 (errno 95)
  #88      crypto_sanity:FAIL
  Summary: 1/2 PASSED, 0 SKIPPED, 1 FAILED

After kernel fix:

  # ./vmtest.sh -- ./test_progs -t crypto
  [...]
  [    1.540963] bpf_testmod: loading out-of-tree module taints kernel.
  [    1.542404] bpf_testmod: module verification failed: signature and/or required key missing - tainting kernel
  #87/1    crypto_basic/crypto_release:OK
  #87/2    crypto_basic/crypto_acquire:OK
  #87      crypto_basic:OK
  #88      crypto_sanity:OK
  Summary: 2/2 PASSED, 0 SKIPPED, 0 FAILED

Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Cc: Vadim Fedorenko <vadim.fedorenko@linux.dev>
Link: https://lore.kernel.org/r/20250829143657.318524-2-daniel@iogearbox.net
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
github-actions bot pushed a commit that referenced this pull request Nov 28, 2025
JIRA: https://issues.redhat.com/browse/RHEL-78204

commit 3aa9b9a
Author: Daniel Borkmann <daniel@iogearbox.net>
Date:   Fri Aug 29 16:36:57 2025 +0200

    selftests/bpf: Extend crypto_sanity selftest with invalid dst buffer

    Small cleanup and test extension to probe the bpf_crypto_{encrypt,decrypt}()
    kfunc when a bad dst buffer is passed in to assert that an error is returned.

    Also, encrypt_sanity() and skb_crypto_setup() were explicit to set the global
    status variable to zero before any test, so do the same for decrypt_sanity().
    Do not explicitly zero the on-stack err before bpf_crypto_ctx_create() given
    the kfunc is expected to do it internally for the success case.

    Before kernel fix:

      # ./vmtest.sh -- ./test_progs -t crypto
      [...]
      [    1.531200] bpf_testmod: loading out-of-tree module taints kernel.
      [    1.533388] bpf_testmod: module verification failed: signature and/or required key missing - tainting kernel
      #87/1    crypto_basic/crypto_release:OK
      #87/2    crypto_basic/crypto_acquire:OK
      #87      crypto_basic:OK
      test_crypto_sanity:PASS:skel open 0 nsec
      test_crypto_sanity:PASS:ip netns add crypto_sanity_ns 0 nsec
      test_crypto_sanity:PASS:ip -net crypto_sanity_ns -6 addr add face::1/128 dev lo nodad 0 nsec
      test_crypto_sanity:PASS:ip -net crypto_sanity_ns link set dev lo up 0 nsec
      test_crypto_sanity:PASS:open_netns 0 nsec
      test_crypto_sanity:PASS:AF_ALG init fail 0 nsec
      test_crypto_sanity:PASS:if_nametoindex lo 0 nsec
      test_crypto_sanity:PASS:skb_crypto_setup fd 0 nsec
      test_crypto_sanity:PASS:skb_crypto_setup 0 nsec
      test_crypto_sanity:PASS:skb_crypto_setup retval 0 nsec
      test_crypto_sanity:PASS:skb_crypto_setup status 0 nsec
      test_crypto_sanity:PASS:create qdisc hook 0 nsec
      test_crypto_sanity:PASS:make_sockaddr 0 nsec
      test_crypto_sanity:PASS:attach encrypt filter 0 nsec
      test_crypto_sanity:PASS:encrypt socket 0 nsec
      test_crypto_sanity:PASS:encrypt send 0 nsec
      test_crypto_sanity:FAIL:encrypt status unexpected error: -5 (errno 95)
      #88      crypto_sanity:FAIL
      Summary: 1/2 PASSED, 0 SKIPPED, 1 FAILED

    After kernel fix:

      # ./vmtest.sh -- ./test_progs -t crypto
      [...]
      [    1.540963] bpf_testmod: loading out-of-tree module taints kernel.
      [    1.542404] bpf_testmod: module verification failed: signature and/or required key missing - tainting kernel
      #87/1    crypto_basic/crypto_release:OK
      #87/2    crypto_basic/crypto_acquire:OK
      #87      crypto_basic:OK
      #88      crypto_sanity:OK
      Summary: 2/2 PASSED, 0 SKIPPED, 0 FAILED

    Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
    Cc: Vadim Fedorenko <vadim.fedorenko@linux.dev>
    Link: https://lore.kernel.org/r/20250829143657.318524-2-daniel@iogearbox.net
    Signed-off-by: Alexei Starovoitov <ast@kernel.org>

Signed-off-by: Jerome Marchand <jmarchan@redhat.com>
github-actions bot pushed a commit that referenced this pull request Feb 21, 2026
VF doesn't enable VCN poison irq in VCNv2.5. Skip releasing it and avoid
call trace during deinitialization.

[   71.913601] [drm] clean up the vf2pf work item
[   71.915088] ------------[ cut here ]------------
[   71.915092] WARNING: CPU: 3 PID: 1079 at /tmp/amd.aFkFvSQl/amd/amdgpu/amdgpu_irq.c:641 amdgpu_irq_put+0xc6/0xe0 [amdgpu]
[   71.915355] Modules linked in: amdgpu(OE-) amddrm_ttm_helper(OE) amdttm(OE) amddrm_buddy(OE) amdxcp(OE) amddrm_exec(OE) amd_sched(OE) amdkcl(OE) drm_suballoc_helper drm_display_helper cec rc_core i2c_algo_bit video wmi binfmt_misc nls_iso8859_1 intel_rapl_msr intel_rapl_common input_leds joydev serio_raw mac_hid qemu_fw_cfg sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua efi_pstore ip_tables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 hid_generic crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel usbhid 8139too sha256_ssse3 sha1_ssse3 hid psmouse bochs i2c_i801 ahci drm_vram_helper libahci i2c_smbus lpc_ich drm_ttm_helper 8139cp mii ttm aesni_intel crypto_simd cryptd
[   71.915484] CPU: 3 PID: 1079 Comm: rmmod Tainted: G           OE      6.8.0-87-generic #88~22.04.1-Ubuntu
[   71.915489] Hardware name: Red Hat KVM/RHEL, BIOS 1.16.3-2.el9_5.1 04/01/2014
[   71.915492] RIP: 0010:amdgpu_irq_put+0xc6/0xe0 [amdgpu]
[   71.915768] Code: 75 84 b8 ea ff ff ff eb d4 44 89 ea 48 89 de 4c 89 e7 e8 fd fc ff ff 5b 41 5c 41 5d 41 5e 5d 31 d2 31 f6 31 ff e9 55 30 3b c7 <0f> 0b eb d4 b8 fe ff ff ff eb a8 e9 b7 3b 8a 00 66 2e 0f 1f 84 00
[   71.915771] RSP: 0018:ffffcf0800eafa30 EFLAGS: 00010246
[   71.915775] RAX: 0000000000000000 RBX: ffff891bda4b0668 RCX: 0000000000000000
[   71.915777] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   71.915779] RBP: ffffcf0800eafa50 R08: 0000000000000000 R09: 0000000000000000
[   71.915781] R10: 0000000000000000 R11: 0000000000000000 R12: ffff891bda480000
[   71.915782] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[   71.915792] FS:  000070cff87c4c40(0000) GS:ffff893abfb80000(0000) knlGS:0000000000000000
[   71.915795] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   71.915797] CR2: 00005fa13073e478 CR3: 000000010d634006 CR4: 0000000000770ef0
[   71.915800] PKRU: 55555554
[   71.915802] Call Trace:
[   71.915805]  <TASK>
[   71.915809]  vcn_v2_5_hw_fini+0x19e/0x1e0 [amdgpu]

Signed-off-by: Lijo Lazar <lijo.lazar@amd.com>
Reviewed-by: Mangesh Gadre <Mangesh.Gadre@amd.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

1 participant