From nobody Mon Feb 9 13:37:07 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5A48A399A7B; Wed, 14 Jan 2026 12:42:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768394531; cv=none; b=quHcapDO1QR9GWv9gJrPXU446io1bAtGUm2X2DBeEpq2swdigdwLUpAORXNjpknmF+84r0YaHLr1rBeoK5yT4b9Qof+jOblRuwm/yfTiByhMVctgWXwAGNJYKARNLCj5n229+Drin1IZAzpFSK0PEizZLkrOg/CGkBGaB4eT1k4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768394531; c=relaxed/simple; bh=7T/2nQ3ECFNsWMgDN+JfOLkJl2PTZMB1e2XreCGU96M=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=BUpzL6k+KRZkFKptgH8M0mNTHjNCeWe7yBwEi/0SUIRyo8xmULC0O8P68Xsu+GhRcg61Qairn8Z82GgHojY7+mDiiFZdfqOgx23EK/QIE1d9GxpQkJh0AsO5B4OrrtRee/FDPMgIEodNHG9eFNemFmVDHnsuBNiIz+6fBJAz7xw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=ki703BjB; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="ki703BjB" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3903BC16AAE; Wed, 14 Jan 2026 12:42:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1768394531; bh=7T/2nQ3ECFNsWMgDN+JfOLkJl2PTZMB1e2XreCGU96M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ki703BjBgSIKAmbokJY5nbUS3kSBrTjeSbYkeRcwksiaMkBnbLx/YExth55tg0GfK oz91gv8AazFHXIJxS3uZdngDqKa5BipmOg4kFBTZkx9ICySW834DHPub5YDhuLFhjV ZaYi38uYFqIdAyxLFtUh07GE51ZNz3owmRghsE+mIUVzVj5uAgO3OdBAZYdKVzqho3 KNo5LtDCJDZzWrFErQR2mdAC77OQh4W+oJogGjeHC2GjjElSpdAivAeNYdd05lv6E9 /+sh0a0SOvYs3oe02yvH21k1R+2bKkhq+c+Nu2/eFumYvNcVjsSwXRQbyBnBP8ttc7 1iR+tKDl10t0w== From: "Rafael J. Wysocki" To: Linux ACPI Cc: LKML , "Dumbre, Saket" Subject: [PATCH v1 13/26] ACPICA: Fix asltests using the Fatal() opcode Date: Wed, 14 Jan 2026 13:27:47 +0100 Message-ID: <2052065.usQuhbGJ8B@rafael.j.wysocki> Organization: Linux Kernel Development In-Reply-To: <12822121.O9o76ZdvQC@rafael.j.wysocki> References: <12822121.O9o76ZdvQC@rafael.j.wysocki> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Armin Wolf Some asltests test the behavior of the Fatal() opcode and thus require that said opcode does not return an error when called. Introduce a compile-time option called ACPI_CONTINUE_ON_FATAL to instruct the executor to continue the execution of AML bytecode when encountering a Fatal() opcode. Also update the asltest to use this new option. Fixes: ("Abort AML bytecode execution when executing AML_FATAL_OP") Link: https://github.com/acpica/acpica/commit/428b3410c490 Signed-off-by: Armin Wolf Signed-off-by: Rafael J. Wysocki --- drivers/acpi/acpica/exoparg3.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/acpi/acpica/exoparg3.c b/drivers/acpi/acpica/exoparg3.c index c8c8c4e49563..2fc8070814e3 100644 --- a/drivers/acpi/acpica/exoparg3.c +++ b/drivers/acpi/acpica/exoparg3.c @@ -72,11 +72,18 @@ acpi_status acpi_ex_opcode_3A_0T_0R(struct acpi_walk_st= ate *walk_state) =20 acpi_os_signal(ACPI_SIGNAL_FATAL, &fatal); =20 +#ifndef ACPI_CONTINUE_ON_FATAL /* * Might return while OS is shutting down, so abort the AML execution * by returning an error. */ return_ACPI_STATUS(AE_ERROR); +#else + /* + * The alstests require that the Fatal() opcode does not return an error. + */ + return_ACPI_STATUS(AE_OK); +#endif =20 case AML_EXTERNAL_OP: /* --=20 2.51.0