All of lore.kernel.org
 help / color / mirror / Atom feed
From: Sasha Levin <sashal@kernel.org>
To: Sasha Levin <sashal@kernel.org>
To: Will Deacon <will.deacon@arm.com>
To: linux-arm-kernel@lists.infradead.org
Cc: mark.rutland@arm.com, catalin.marinas@arm.com, stable@vger.kernel.org,
Subject: Re: [PATCH 01/10] arm64: debug: Don't propagate UNKNOWN FAR into si_code for debug signals
Date: Tue, 05 Mar 2019 13:35:40 +0000	[thread overview]
Message-ID: <20190305133541.14CD020848@mail.kernel.org> (raw)
In-Reply-To: <20190301132809.24653-2-will.deacon@arm.com>

Hi,

[This is an automated email]

This commit has been processed because it contains a -stable tag.
The stable tag indicates that it's relevant for the following trees: all

The bot has tested the following trees: v4.20.13, v4.19.26, v4.14.104, v4.9.161, v4.4.176, v3.18.136.

v4.20.13: Failed to apply! Possible dependencies:
    356607f21e60 ("kasan, arm64: fix up fault handling logic")

v4.19.26: Failed to apply! Possible dependencies:
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die")
    dbfe3828a6f3 ("arm64/mm: Reorganize arguments for is_el1_permission_fault()")

v4.14.104: Failed to apply! Possible dependencies:
    1fc5dce78ad1 ("arm64/sve: Low-level SVE architectural state manipulation functions")
    2923f5ea7738 ("nds32: Exception handling")
    2c9120f3a86a ("arm64: signal: Make force_signal_inject more robust")
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized")
    3f7c86b2382e ("arm64: Update fault_info table with new exception types")
    42dbf54e8890 ("arm64: consistently log ESR and page table")
    526c3ddb6aa2 ("signal/arm64: Document conflicts with SI_USER and SIGFPE,SIGTRAP,SIGBUS")
    532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls")
    6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die")
    92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info")
    94ef7ecbdf6f ("arm64: fpsimd: Correctly annotate exception helpers called from asm")
    969e61ba87f9 ("arm64: make is_permission_fault() name clearer")
    af40ff687bc9 ("arm64: signal: Ensure si_code is valid for all fault signals")
    bc0ee4760364 ("arm64/sve: Core task context handling")
    cc19846079a7 ("arm64: fault: Don't leak data in ESR context for user fault on kernel VA")
    dbfe3828a6f3 ("arm64/mm: Reorganize arguments for is_el1_permission_fault()")

v4.9.161: Failed to apply! Possible dependencies:
    0e3a9026396c ("arm64: mm: Update perf accounting to handle poison faults")
    1f9b8936f36f ("arm64: Decode information from ESR upon mem faults")
    32015c235603 ("arm64: exception: handle Synchronous External Abort")
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized")
    532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls")
    67ce16ec15ce ("arm64: mm: print out correct page table entries")
    6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die")
    786889636ad7 ("arm64: Handle faults caused by inadvertent user access with PAN enabled")
    7edda0886bc3 ("acpi: apei: handle SEA notification type for ARMv8")
    83016b204225 ("arm64: mm: print file name of faulting vma")
    92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info")
    969e61ba87f9 ("arm64: make is_permission_fault() name clearer")
    a8ada146f517 ("arm64: Update the synchronous external abort fault description")
    b824b9306823 ("arm64: print a fault message when attempting to write RO memory")
    c07ab957d9af ("arm64: Call __show_regs directly")
    cc19846079a7 ("arm64: fault: Don't leak data in ESR context for user fault on kernel VA")
    dbfe3828a6f3 ("arm64/mm: Reorganize arguments for is_el1_permission_fault()")
    e7c600f149b8 ("arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling")

v4.4.176: Failed to apply! Possible dependencies:
    09a6adf53d42 ("arm64: mm: unaligned access by user-land should be received as SIGBUS")
    0a8ea52c3eb1 ("arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature")
    1f9b8936f36f ("arm64: Decode information from ESR upon mem faults")
    2dd0e8d2d2a1 ("arm64: Kprobes with single stepping support")
    32015c235603 ("arm64: exception: handle Synchronous External Abort")
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    57f4959bad0a ("arm64: kernel: Add support for User Access Override")
    6afedcd23cfd ("arm64: mm: Add trace_irqflags annotations to do_debug_exception()")
    7dd01aef0557 ("arm64: trap userspace "dc cvau" cache operation on errata-affected core")
    9dbd5bb25c56 ("arm64: Refactor sysinstr exception handling")
    a8ada146f517 ("arm64: Update the synchronous external abort fault description")
    bbb1681ee365 ("arm64: mm: mark fault_info table const")
    d5370f754875 ("arm64: prefetch: add alternative pattern for CPUs without a prefetcher")
    d59bee887231 ("arm64: Add more test functions to insn.c")
    e04a28d45ff3 ("arm64: debug: re-enable irqs before sending breakpoint SIGTRAP")
    e7227d0e528f ("arm64: Cleanup SCTLR flags")

v3.18.136: Failed to apply! Possible dependencies:
    09a6adf53d42 ("arm64: mm: unaligned access by user-land should be received as SIGBUS")
    2dd0e8d2d2a1 ("arm64: Kprobes with single stepping support")
    31dde116cb08 ("arm64: Replace set_arch_dma_coherent_ops with arch_setup_dma_ops")
    3505f30fb6a9 ("ARM64 / ACPI: If we chose to boot from acpi then disable FDT")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    37655163ce1a ("ARM64 / ACPI: Get RSDP and ACPI boot-time tables")
    587064b610c7 ("arm64: Add framework for legacy instruction emulation")
    6933de0ca0b7 ("ARM64 / ACPI: Select ACPI_REDUCED_HARDWARE_ONLY if ACPI is enabled on ARM64")
    7c59a3df15df ("ARM64 / ACPI: Get PSCI flags in FADT for PSCI init")
    86dca36e6ba0 ("arm64: use private ratelimit state along with show_unhandled_signals")
    876945dbf649 ("arm64: Hook up IOMMU dma_ops")
    9b79f52d1a70 ("arm64: Add support for hooks to handle undefined instructions")
    b10d79f76085 ("ARM64 / ACPI: Introduce early_param "acpi=" to enable/disable ACPI")
    b6197b93fa4b ("arm64 : Introduce support for ACPI _CCA object")
    bbb1681ee365 ("arm64: mm: mark fault_info table const")
    d8f4f161e31f ("ACPI: move arm64 GSI IRQ model to generic GSI IRQ layer")
    de7ee503f279 ("arm64: introduce is_device_dma_coherent")
    f871d2680707 ("arm64: Fix show_unhandled_signal_ratelimited usage")
    fbe61ec71ac9 ("ARM64 / ACPI: Introduce ACPI_IRQ_MODEL_GIC and register device's gsi")
    fccb9a81fd08 ("ARM64 / ACPI: Parse MADT for SMP initialization")


How should we proceed with this patch?

--
Thanks,
Sasha

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  parent reply	other threads:[~2019-03-05 13:36 UTC|newest]

Thread overview: 28+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-03-01 13:27 [PATCH 00/10] Rework debug exception handling code Will Deacon
2019-03-01 13:28 ` [PATCH 01/10] arm64: debug: Don't propagate UNKNOWN FAR into si_code for debug signals Will Deacon
2019-03-01 13:28   ` Will Deacon
2019-03-01 13:45   ` Mark Rutland
2019-03-01 13:45     ` Mark Rutland
2019-03-05 13:35   ` Sasha Levin [this message]
2019-03-01 13:28 ` [PATCH 02/10] arm64: debug: Ensure debug handlers check triggering exception level Will Deacon
2019-03-01 13:28   ` Will Deacon
2019-03-01 13:46   ` Mark Rutland
2019-03-01 13:46     ` Mark Rutland
2019-03-05 13:35   ` Sasha Levin
2019-03-01 13:28 ` [PATCH 03/10] arm64: debug: Remove unused return value from do_debug_exception() Will Deacon
2019-03-01 13:48   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 04/10] arm64: debug: Rename addr parameter for non-watchpoint exception hooks Will Deacon
2019-03-01 13:49   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 05/10] arm64: debug: Remove meaningless comment Will Deacon
2019-03-01 14:08   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 06/10] arm64: debug: Separate debug hooks based on target exception level Will Deacon
2019-03-01 14:07   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 07/10] arm64: kprobes: Avoid calling kprobes debug handlers explicitly Will Deacon
2019-03-01 14:12   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 08/10] arm64: debug: Remove redundant user_mode(regs) checks from debug handlers Will Deacon
2019-03-01 14:13   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 09/10] arm64: probes: Move magic BRK values into brk-imm.h Will Deacon
2019-03-01 14:16   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 10/10] arm64: debug: Clean up brk_handler() Will Deacon
2019-03-01 14:17   ` Mark Rutland
2019-03-01 16:24 ` [PATCH 00/10] Rework debug exception handling code Catalin Marinas

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190305133541.14CD020848@mail.kernel.org \
    --to=sashal@kernel.org \
    --cc=catalin.marinas@arm.com \
    --cc=mark.rutland@arm.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.