kernel is locked down Applying: kexec_load: Disable at runtime if the kernel is locked down Applying: Copy secure_boot flag in boot params across kexec reboot Applying: kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE Applying: kexec_file: Restrict at runtime if the kernel is locked down Applying: hibernate: Disable when the kernel is locked down Applying: uswsusp: Disable when the kernel is locked down Applying: PCI: Lock down BAR access when the kernel is locked down Applying: x86: Lock down IO port access when the kernel is locked down Applying: x86/msr: Restrict MSR access when the kernel is locked down Applying: ACPI: Limit access to custom_method when the kernel is locked down Applying: acpi: Ignore acpi_rsdp kernel param when the kernel has been locked down Applying: acpi: Disable ACPI table override if the kernel is locked down Applying: acpi: Disable APEI error injection if the kernel is locked down Applying: Prohibit PCMCIA CIS storage when the kernel is locked down Applying: Lock down TIOCSSERIAL Applying: Lock down module params that specify hardware parameters (eg. ioport) Applying: x86/mmiotrace: Lock down the testmmiotrace module Applying: Lock down /proc/kcore Applying: Lock down kprobes Applying: bpf: Restrict kernel image access functions when the kernel is locked down Applying: Lock down perf Applying: debugfs: Restrict debugfs when the kernel is locked down Applying: lockdown: Print current->comm in restriction messages Applying: kexec: Allow kexec_file() with appropriate IMA policy when locked down Applying: Add a SysRq option to lift kernel lockdown Applying: debugfs: avoid EPERM when no open file operation defined Applying: Make get_cert_list() not complain about cert lists that aren't present. Applying: Add efi_status_to_str() and rework efi_status_to_err(). Applying: Make get_cert_list() use efi_status_to_str() to print error messages. Applying: disable i8042 check on apple mac Applying: drm/i915: hush check crtc state Applying: efi: Add an EFI_SECURE_BOOT flag to indicate secure boot mode Applying: efi: Lock down the kernel if booted in secure boot mode Applying: Add option of 13 for FORCE_MAX_ZONEORDER Applying: arm: make CONFIG_HIGHPTE optional without CONFIG_EXPERT Applying: ACPI / scan: Fix regression related to X-Gene UARTs Applying: ACPI / irq: Workaround firmware issue on X-Gene based m400 Applying: usb: phy: tegra: Add 38.4MHz clock table entry Applying: ARM: tegra: usb no reset Applying: mmc: sdhci: add quirk to prevent higher speed modes Applying: arm64: tegra210: Jetson TX1: disable display panel and associated backlight Applying: arm64: tegra: Jetson TX2: Allow bootloader to configure Ethernet MAC Applying: i2c: qcom-geni: Disable DMA processing on the Lenovo Yoga C630 Applying: arm64: dts: qcom: Add Lenovo Yoga C630 Applying: Input: rmi4 - remove the need for artificial IRQ in case of HID Applying: Drop that for now Applying: KEYS: Make use of platform keyring for module signature verify Applying: riscv: add SECCOMP support Applying: SiFive Unleashed Ethernet Patch failed at 0064 SiFive Unleashed Ethernet When you have resolved this problem, run "git am --continue". If you prefer to skip this patch, run "git am --skip" instead. To restore the original branch and stop patching, run "git am --abort". RPM build errors: BUILDSTDERR: error: Bad exit status from /var/tmp/rpm-tmp.dFRIeu (%prep) BUILDSTDERR: Bad exit status from /var/tmp/rpm-tmp.dFRIeu (%prep) Child return code was: 1 EXCEPTION: [Error()] Traceback (most recent call last): File "/usr/lib/python3.7/site-packages/mockbuild/trace_decorator.py", line 96, in trace result = func(*args, **kw) File "/usr/lib/python3.7/site-packages/mockbuild/util.py", line 636, in do raise exception.Error("Command failed: \n # %s\n%s" % (command, output), child.returncode) mockbuild.exception.Error: Command failed: # bash --login -c /usr/bin/rpmbuild -bb --target riscv64 --nodeps /builddir/build/SPECS/kernel.spec