From: Sasha Levin <sashal@kernel.org>
To: Sasha Levin <sashal@kernel.org>
To: Will Deacon <will@kernel.org>
To: linux-arm-kernel@lists.infradead.org
Cc: Mark Rutland <mark.rutland@arm.com>,
kernel-team@android.com, Luis Machado <luis.machado@linaro.org>,
Will Deacon <will@kernel.org>,
stable@vger.kernel.org
Subject: Re: [PATCH v2 2/4] arm64: ptrace: Consistently use pseudo-singlestep exceptions
Date: Fri, 10 Jul 2020 14:02:46 +0000 [thread overview]
Message-ID: <20200710140247.7CB7420842@mail.kernel.org> (raw)
In-Reply-To: <20200702212618.17800-3-will@kernel.org>
Hi
[This is an automated email]
This commit has been processed because it contains a -stable tag.
The stable tag indicates that it's relevant for the following trees: all
The bot has tested the following trees: v5.7.7, v5.4.50, v4.19.131, v4.14.187, v4.9.229, v4.4.229.
v5.7.7: Build OK!
v5.4.50: Build OK!
v4.19.131: Build OK!
v4.14.187: Failed to apply! Possible dependencies:
0013aceb30748 ("xtensa: clean up fixups in assembly code")
1af1e8a39dc0f ("xtensa: move fixmap and kmap just above the KSEG")
2a61f4747eeaa ("stack-protector: test compiler capability in Kconfig and drop AUTO mode")
2b8383927525d ("Makefile: move stack-protector compiler breakage test earlier")
2bc2f688fdf88 ("Makefile: move stack-protector availability out of Kconfig")
409d5db49867c ("arm64: rseq: Implement backend rseq calls and select HAVE_RSEQ")
40d1a07b333ef ("xtensa: enable stack protector")
44c6dc940b190 ("Makefile: introduce CONFIG_CC_STACKPROTECTOR_AUTO")
5cf97ebd8b40e ("xtensa: clean up functions in assembly code")
8d66772e869e7 ("arm64: Mask all exceptions during kernel_exit")
9800b9dc13cdf ("arm: Add restartable sequences support")
a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion")
c2edb35ae342f ("xtensa: extract init_kio")
c633544a61541 ("xtensa: add support for KASAN")
d148eac0e70f0 ("Kbuild: rename HAVE_CC_STACKPROTECTOR config variable")
f37099b6992a0 ("arm64: convert syscall trace logic to C")
f4431396be5b2 ("xtensa: consolidate kernel stack size related definitions")
v4.9.229: Failed to apply! Possible dependencies:
096683724cb2e ("arm64: unwind: avoid percpu indirection for irq stack")
12964443e8d19 ("arm64: add on_accessible_stack()")
17c2895860092 ("arm64: Abstract syscallno manipulation")
34be98f4944f9 ("arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP")
35d0e6fb4d219 ("arm64: syscallno is secretly an int, make it official")
8018ba4edfd3a ("arm64: move SEGMENT_ALIGN to <asm/memory.h>")
872d8327ce898 ("arm64: add VMAP_STACK overflow detection")
9842ceae9fa8d ("arm64: Add uprobe support")
a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion")
a9ea0017ebe88 ("arm64: factor out current_stack_pointer")
c02433dd6de32 ("arm64: split thread_info from task stack")
c7365330753c5 ("arm64: unwind: disregard frame.sp when validating frame pointer")
cf7de27ab3517 ("arm64/syscalls: Check address limit on user-mode return")
dbc9344a68e50 ("arm64: clean up THREAD_* definitions")
f37099b6992a0 ("arm64: convert syscall trace logic to C")
f60ad4edcf072 ("arm64: clean up irq stack definitions")
v4.4.229: Failed to apply! Possible dependencies:
0a28714c53fd4 ("arm64: Use PoU cache instr for I/D coherency")
0a8ea52c3eb15 ("arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature")
17c2895860092 ("arm64: Abstract syscallno manipulation")
2dd0e8d2d2a15 ("arm64: Kprobes with single stepping support")
35d0e6fb4d219 ("arm64: syscallno is secretly an int, make it official")
39a67d49ba353 ("arm64: kprobes instruction simulation support")
421dd6fa6709e ("arm64: factor work_pending state machine to C")
57f4959bad0a1 ("arm64: kernel: Add support for User Access Override")
872d8327ce898 ("arm64: add VMAP_STACK overflow detection")
9842ceae9fa8d ("arm64: Add uprobe support")
a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion")
b11e5759bfac0 ("arm64: factor out entry stack manipulation")
cf7de27ab3517 ("arm64/syscalls: Check address limit on user-mode return")
d5370f7548754 ("arm64: prefetch: add alternative pattern for CPUs without a prefetcher")
d59bee8872311 ("arm64: Add more test functions to insn.c")
e04a28d45ff34 ("arm64: debug: re-enable irqs before sending breakpoint SIGTRAP")
f37099b6992a0 ("arm64: convert syscall trace logic to C")
NOTE: The patch will not be queued to stable trees until it is upstream.
How should we proceed with this patch?
--
Thanks
Sasha
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2020-07-10 14:04 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-07-02 21:26 [PATCH v2 0/4] arm64: Fix single-step handling Will Deacon
2020-07-02 21:26 ` [PATCH v2 1/4] arm64: ptrace: Add a comment describing our syscall entry/exit trap ABI Will Deacon
2020-07-02 21:26 ` [PATCH v2 2/4] arm64: ptrace: Consistently use pseudo-singlestep exceptions Will Deacon
2020-07-10 14:02 ` Sasha Levin [this message]
2020-07-02 21:26 ` [PATCH v2 3/4] arm64: Override SPSR.SS when single-stepping is enabled Will Deacon
2020-07-10 14:02 ` Sasha Levin
2020-07-02 21:26 ` [PATCH v2 4/4] arm64: Use test_tsk_thread_flag() for checking TIF_SINGLESTEP Will Deacon
2020-07-03 10:52 ` [PATCH v2 0/4] arm64: Fix single-step handling Luis Machado
2020-07-03 11:49 ` Will Deacon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200710140247.7CB7420842@mail.kernel.org \
--to=sashal@kernel.org \
--cc=kernel-team@android.com \
--cc=luis.machado@linaro.org \
--cc=mark.rutland@arm.com \
--cc=stable@vger.kernel.org \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).