From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.2 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 58385C43331 for ; Wed, 1 Apr 2020 08:03:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3263820772 for ; Wed, 1 Apr 2020 08:03:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731879AbgDAIDZ (ORCPT ); Wed, 1 Apr 2020 04:03:25 -0400 Received: from www62.your-server.de ([213.133.104.62]:40518 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731850AbgDAIDZ (ORCPT ); Wed, 1 Apr 2020 04:03:25 -0400 Received: from sslproxy03.your-server.de ([88.198.220.132]) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1jJYLG-0004VH-1J; Wed, 01 Apr 2020 10:03:18 +0200 Received: from [178.195.186.98] (helo=pc-9.home) by sslproxy03.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1jJYLF-000VtC-GV; Wed, 01 Apr 2020 10:03:17 +0200 Subject: Re: [PATCH 5.5 000/171] 5.5.14-rc2 review To: Greg Kroah-Hartman , Naresh Kamboju Cc: open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, linux- stable , john.fastabend@gmail.com, komachi.yoshiki@gmail.com, Andrii Nakryiko , lukenels@cs.washington.edu, Netdev , bpf References: <20200331141450.035873853@linuxfoundation.org> <20200401061131.GA1907105@kroah.com> From: Daniel Borkmann Message-ID: Date: Wed, 1 Apr 2020 10:03:16 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20200401061131.GA1907105@kroah.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.2/25768/Tue Mar 31 15:08:38 2020) Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On 4/1/20 8:11 AM, Greg Kroah-Hartman wrote: > On Wed, Apr 01, 2020 at 04:18:41AM +0530, Naresh Kamboju wrote: >> On Tue, 31 Mar 2020 at 21:02, Greg Kroah-Hartman >> wrote: >>> >>> This is the start of the stable review cycle for the 5.5.14 release. >>> There are 171 patches in this series, all will be posted as a response >>> to this one. If anyone has any issues with these being applied, please >>> let me know. >>> >>> Responses should be made by Thu, 02 Apr 2020 14:12:02 +0000. >>> Anything received after that time might be too late. >>> >>> The whole patch series can be found in one patch at: >>> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.5.14-rc2.gz >>> or in the git tree and branch at: >>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.5.y >>> and the diffstat can be found below. >>> >>> thanks, >>> >>> greg k-h >> >> Results from Linaro’s test farm. >> Regressions on x86_64 and i386. >> >> selftests bpf test_verifier reports as failed. >> This test PASSED on v5.5.13 >> >> #554/p jgt32: range bound deduction, reg op imm FAIL >> Failed to load prog 'Success'! >> R8 unbounded memory access, make sure to bounds check any array access >> into a map >> verification time 141 usec >> stack depth 8 >> processed 16 insns (limit 1000000) max_states_per_insn 0 total_states >> 1 peak_states 1 mark_read 1 >> #555/p jgt32: range bound deduction, reg1 op reg2, reg1 unknown FAIL >> Failed to load prog 'Success'! >> R8 unbounded memory access, make sure to bounds check any array access >> into a map >> verification time 94 usec >> stack depth 8 >> processed 17 insns (limit 1000000) max_states_per_insn 0 total_states >> 1 peak_states 1 mark_read 1 >> #556/p jle32: range bound deduction, reg1 op reg2, reg2 unknown FAIL >> Failed to load prog 'Success'! >> R8 unbounded memory access, make sure to bounds check any array access >> into a map >> verification time 68 usec >> stack depth 8 >> processed 17 insns (limit 1000000) max_states_per_insn 0 total_states >> 1 peak_states 1 mark_read 1 > > Can you run 'git bisect' to find the offending patch? No need, I'll send you a patch to update the selftests. It's expected that they fail now due to the revert we had to do, so if this is the only issue it shouldn't hold up the release. In any case, I'll send them over to you next. Thanks, Daniel