Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2227620/?format=api
{ "id": 2227620, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2227620/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260424024432.70725-5-zixing.liu@canonical.com/", "project": { "id": 15, "url": "http://patchwork.ozlabs.org/api/1.1/projects/15/?format=api", "name": "Ubuntu Kernel", "link_name": "ubuntu-kernel", "list_id": "kernel-team.lists.ubuntu.com", "list_email": "kernel-team@lists.ubuntu.com", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<20260424024432.70725-5-zixing.liu@canonical.com>", "date": "2026-04-24T02:44:32", "name": "[SRU,N,v3,4/4] selftests/powerpc: Detect taint change in mitigation patching test", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "24e72f380338fc6e4965159ea1d79524e42254c3", "submitter": { "id": 90901, "url": "http://patchwork.ozlabs.org/api/1.1/people/90901/?format=api", "name": "Zixing Liu", "email": "zixing.liu@canonical.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260424024432.70725-5-zixing.liu@canonical.com/mbox/", "series": [ { "id": 501283, "url": "http://patchwork.ozlabs.org/api/1.1/series/501283/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=501283", "date": "2026-04-24T02:44:28", "name": "Fix time-out issues on powerpc when running ubuntu_kernel_selftests", "version": 3, "mbox": "http://patchwork.ozlabs.org/series/501283/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2227620/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2227620/checks/", "tags": {}, "headers": { "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=V66JgL/b;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1y3w4kCxz1xvV\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 12:45:00 +1000 (AEST)", "from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wG6XH-0007Q0-G5; Fri, 24 Apr 2026 02:44:55 +0000", "from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <zixing.liu@canonical.com>)\n id 1wG6XF-0007NM-Pz\n for kernel-team@lists.ubuntu.com; Fri, 24 Apr 2026 02:44:53 +0000", "from mail-pg1-f198.google.com (mail-pg1-f198.google.com\n [209.85.215.198])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 9B1A63F7B0\n for <kernel-team@lists.ubuntu.com>; Fri, 24 Apr 2026 02:44:53 +0000 (UTC)", "by mail-pg1-f198.google.com with SMTP id\n 41be03b00d2f7-b630b4d8d52so4260933a12.3\n for <kernel-team@lists.ubuntu.com>; Thu, 23 Apr 2026 19:44:53 -0700 (PDT)", "from localhost.localdomain ([150.241.210.223])\n by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-82f8e981a0asm22515379b3a.3.2026.04.23.19.44.50\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 23 Apr 2026 19:44:51 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776998693;\n bh=3jToC3Jzw0omNa6zfvT+IL6+nkf6eKz58yJnN0sYX2A=;\n h=From:To:Subject:Date:Message-ID:In-Reply-To:References:\n MIME-Version;\n b=V66JgL/bZ3QZ7q7k1KhFzycp6ICVkTRczNsh3wRBELLB/6JCkJpCZvyGt6wS8GBnj\n LR3w0im6IX44gVi1r9aE/Ko5F3jpE978zA6vtdIBmRccTR/BCFqCj1hWDLJIu5GIFv\n dZzQnxTGSBty1p5xBeVThzpbhYuhD8I7xFmJCoYly0DuUNznXsIN1LyZiA4bNg3WR3\n UhLVAujZFHIyh5bL6PzI+9URU7U4+RPlpXo+5BMaAmnE0TN5WbKZGxlwiH5vE7quPF\n rEHDKrit8am6Z5NDmWXvASLqL0cKv251b1z7Bt6408qWlU9Gi6/9uFulRHznHzidU0\n 4QpyaJHXYz8u8lYRdVyDNhGoCWvtrah2voxLAsJBx3E3h4WJv+GK8pUp6s4RDLkk/n\n DIRaiRjLlgZgqJus1od2InspD5xnrOlKHx4c2xmq6mE87imLpTjyhNhbPHggVczVVI\n T90GerahMu9FbQBKmkhavBYYORWu7np3UHMUNhBAFRuOlsqEG10jvO61sUxyA0t92K\n U3Ev6+BncR3CN0gdh8IE3YSAebX6mB+GilUbBrE8ZBqbr/Qp8FVnYX64Y9HXm1OgFB\n YX6uFRxbA9BsCSbG7RfP/KgUSN/nsaV6soeywsxBiUQhMWkV34JoWjP+550y8HwUNQ\n T+by5uPXPdLuPIPHJerQnpPk=", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776998692; x=1777603492;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to\n :cc:subject:date:message-id:reply-to;\n bh=3jToC3Jzw0omNa6zfvT+IL6+nkf6eKz58yJnN0sYX2A=;\n b=QfkAemo2428gj4Fd3IEiCPdOTqnfBV+AHTtpJlKbmXYbT6LqXC6TQqcaCkD5lYulYE\n GNok9ooxQ3UXzhDoA3W1lN3ugiZxFlmU8e9N+pvwwHtaPzliJhbevkxit2ErS315ZIjZ\n w6TseJv/jqjCb45ut6igTT0fs1jjKUQC5Yy6XjVF+H9FbH79h8CCEpQ+NzfO9Sm5k501\n 9P0QWZnvScwVGLD6IadEa5acU6mo7sZtdaez66JZRdPi3uXMEp0nscVAVoNzkHRKaPj1\n zJSOmeOowskD/p6CrIZoIqvVu1+FSdLADeyZ7o/Ihto/zDEged93efBwCl0+QIlcHxWq\n qfNA==", "X-Gm-Message-State": "AOJu0YzdcZEq4jTD9MRi5CY165J3Ob7Pb5g5dTVVdDA2y5ixhjyvj9Pl\n 11zSwtSHCwDWFti4WA4eCFKQgguaDSd8b20rRRkXZGTtCJz02YyfLhwliRzjdP5dTq4wiFixupi\n doEdCMLka6qMI7kEUhyuLkHBkh97P8ztj28QgRXP5NqqEYp+cS/16UJcJhKwpOqL8nBN08EbMGL\n XRazA5bgGIGagzcsbtVho=", "X-Gm-Gg": "AeBDievil1DRTOy+tBNoXpcQtwJp2wkVhwiF874W4mJvOaMhIFw5YHnKffrPIN1l4Cg\n Rwzil9zbo4N9UoEpcTRpir/spzrJWoJTiyLBGPhCzq0e+7MF7fnQSeAB4ihdzZOgRSEij5z9v16\n uanPExT0fsgsclGxRSyzLOVp0okzPQykRsm7aXdLLKOJgqskA3hpl6h7lS9QpAW5Gb9fNTws+qw\n mh8UPwF6NrvjtLnelMO8Q1IHs/adpBIERar1x58P5Bx2N+n85oPKr3O7fNAcfmPyS6rRRRPb9G5\n ZqvjEIjtD5mEhZWC1YnzhvGK3pHz4lqWGbs/kKs1X70grGrJ+J7K1ZKHx0e0P0FK76JHHI0ayYW\n c7xSN8R9dIdzW8M7mNWQwDCOcHORAYgy6nk4A0FiHyX94t8XK7IJrUQ==", "X-Received": [ "by 2002:a05:6a00:4186:b0:82f:6b94:99d6 with SMTP id\n d2e1a72fcca58-82f8c7dd474mr32326019b3a.5.1776998691909;\n Thu, 23 Apr 2026 19:44:51 -0700 (PDT)", "by 2002:a05:6a00:4186:b0:82f:6b94:99d6 with SMTP id\n d2e1a72fcca58-82f8c7dd474mr32326001b3a.5.1776998691494;\n Thu, 23 Apr 2026 19:44:51 -0700 (PDT)" ], "From": "Zixing Liu <zixing.liu@canonical.com>", "To": "kernel-team@lists.ubuntu.com", "Subject": "[SRU][N][PATCH v3 4/4] selftests/powerpc: Detect taint change in\n mitigation patching test", "Date": "Fri, 24 Apr 2026 10:44:32 +0800", "Message-ID": "<20260424024432.70725-5-zixing.liu@canonical.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260424024432.70725-1-zixing.liu@canonical.com>", "References": "<20260424024432.70725-1-zixing.liu@canonical.com>", "MIME-Version": "1.0", "X-BeenThere": "kernel-team@lists.ubuntu.com", "X-Mailman-Version": "2.1.20", "Precedence": "list", "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>", "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>", "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>", "List-Post": "<mailto:kernel-team@lists.ubuntu.com>", "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>", "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "kernel-team-bounces@lists.ubuntu.com", "Sender": "\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>" }, "content": "From: Michael Ellerman <mpe@ellerman.id.au>\n\nBugLink: https://bugs.launchpad.net/bugs/2141536\n\nCurrently the mitigation patching test errors out if the kernel is\ntainted prior to the test running.\n\nThat causes the test to fail unnecessarily if some other test has caused\nthe kernel to be tainted, or if a proprietary or force module is loaded\nfor example.\n\nInstead just warn if the kernel is tainted to begin with, and only\nreport a change in the taint state as an error in the test.\n\nSigned-off-by: Michael Ellerman <mpe@ellerman.id.au>\n(cherry picked from commit a8a54a65cac4f8202df36f925b6746328802d05f)\nSigned-off-by: Zixing Liu <zixing.liu@canonical.com>\n---\n .../selftests/powerpc/security/mitigation-patching.sh | 8 ++++----\n 1 file changed, 4 insertions(+), 4 deletions(-)", "diff": "diff --git a/tools/testing/selftests/powerpc/security/mitigation-patching.sh b/tools/testing/selftests/powerpc/security/mitigation-patching.sh\nindex f43aa4b77fba..9a4612e2e953 100755\n--- a/tools/testing/selftests/powerpc/security/mitigation-patching.sh\n+++ b/tools/testing/selftests/powerpc/security/mitigation-patching.sh\n@@ -36,8 +36,7 @@ fi\n \n tainted=$(cat /proc/sys/kernel/tainted)\n if [[ \"$tainted\" -ne 0 ]]; then\n- echo \"Error: kernel already tainted!\" >&2\n- exit 1\n+ echo \"Warning: kernel already tainted! ($tainted)\" >&2\n fi\n \n mitigations=\"barrier_nospec stf_barrier count_cache_flush rfi_flush entry_flush uaccess_flush\"\n@@ -68,9 +67,10 @@ fi\n echo \"Waiting for timeout ...\"\n wait\n \n+orig_tainted=$tainted\n tainted=$(cat /proc/sys/kernel/tainted)\n-if [[ \"$tainted\" -ne 0 ]]; then\n- echo \"Error: kernel became tainted!\" >&2\n+if [[ \"$tainted\" != \"$orig_tainted\" ]]; then\n+ echo \"Error: kernel newly tainted, before ($orig_tainted) after ($tainted)\" >&2\n exit 1\n fi\n \n", "prefixes": [ "SRU", "N", "v3", "4/4" ] }