From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0225FC433DF for ; Thu, 16 Jul 2020 00:29:00 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B1A5D206F5 for ; Thu, 16 Jul 2020 00:28:59 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="DIYEULzO"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="W96QVxm7" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B1A5D206F5 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:MIME-Version:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:Message-Id:References:In-Reply-To:Subject:To:From: Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=qPKiDzge4pMOgoU/uofvpoTjmcJN5kKYW6nn9EnvqFg=; b=DIYEULzOhn3tgUcZ/3XXCACXgH Ysu3e0KZYYP49heuguBxuvJeM5AVGOrSIjIFn2h8OjHpYpX0OErUEUc3GvZdW/ZMwRBXD7WsQLU/8 3sUVk5v5KM4Ud5b41irtHxqw0lBL656ce+WxgHkLmtUrdXsegY1OncOMJoegmqCFwA2ZjPtwg9wEc JFa+nrC+Hzokt1OBwDz3S9ZHA/PRZHCBmGmDkLieSj/HJuBmn12O98+WC4V2WJZ/u9HNNjiK2bNit HTpNVIfg2jcMQOxlEBq9Qz+PwyZ1K5qGwQ7Zi+0HUlCwVgb7WpQn/NSqzqNzLVsWnPAjpgXt36/CK xDkq3oyQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jvrkW-0002h1-VH; Thu, 16 Jul 2020 00:27:45 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jvrkS-0002fr-6A for linux-arm-kernel@lists.infradead.org; Thu, 16 Jul 2020 00:27:41 +0000 Received: from localhost (unknown [137.135.114.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 760B42071B; Thu, 16 Jul 2020 00:27:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594859259; bh=Eh7RVuoAa8kyQTnMllH7xwP+NP/2xXU4MIOO3tOULac=; h=Date:From:To:To:To:Cc:Cc:Cc:Cc:Cc:Subject:In-Reply-To:References: From; b=W96QVxm75PaI3sRWdm/Y6nx7QruvXrMQYXQgYSytSzO8IBebJQb6v1FdLB/qJovaC MfYv8YZxdJpcHVcixX0vBbxAQvdadV1md6MbfH3lnI2aVaAx1f1Nd0ENKgyNeLJM6x Ig7HXn/y9JtItbhIStz00SfCRbjNFiPwLt0iXucY= Date: Thu, 16 Jul 2020 00:27:38 +0000 From: Sasha Levin To: Sasha Levin To: Will Deacon To: linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v3 1/7] arm64: ptrace: Consistently use pseudo-singlestep exceptions In-Reply-To: <20200710130702.30658-2-will@kernel.org> References: <20200710130702.30658-2-will@kernel.org> Message-Id: <20200716002739.760B42071B@mail.kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200715_202740_407696_BC8163FB X-CRM114-Status: UNSURE ( 7.75 ) X-CRM114-Notice: Please train this message. X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , catalin.marinas@arm.com, Luis Machado , Will Deacon , stable@vger.kernel.org MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi [This is an automated email] This commit has been processed because it contains a -stable tag. The stable tag indicates that it's relevant for the following trees: all The bot has tested the following trees: v5.7.8, v5.4.51, v4.19.132, v4.14.188, v4.9.230, v4.4.230. v5.7.8: Build OK! v5.4.51: Build OK! v4.19.132: Build OK! v4.14.188: Failed to apply! Possible dependencies: 0013aceb30748 ("xtensa: clean up fixups in assembly code") 1af1e8a39dc0f ("xtensa: move fixmap and kmap just above the KSEG") 2a61f4747eeaa ("stack-protector: test compiler capability in Kconfig and drop AUTO mode") 2b8383927525d ("Makefile: move stack-protector compiler breakage test earlier") 2bc2f688fdf88 ("Makefile: move stack-protector availability out of Kconfig") 409d5db49867c ("arm64: rseq: Implement backend rseq calls and select HAVE_RSEQ") 40d1a07b333ef ("xtensa: enable stack protector") 44c6dc940b190 ("Makefile: introduce CONFIG_CC_STACKPROTECTOR_AUTO") 5cf97ebd8b40e ("xtensa: clean up functions in assembly code") 8d66772e869e7 ("arm64: Mask all exceptions during kernel_exit") 9800b9dc13cdf ("arm: Add restartable sequences support") a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion") c2edb35ae342f ("xtensa: extract init_kio") c633544a61541 ("xtensa: add support for KASAN") d148eac0e70f0 ("Kbuild: rename HAVE_CC_STACKPROTECTOR config variable") f37099b6992a0 ("arm64: convert syscall trace logic to C") f4431396be5b2 ("xtensa: consolidate kernel stack size related definitions") v4.9.230: Failed to apply! Possible dependencies: 096683724cb2e ("arm64: unwind: avoid percpu indirection for irq stack") 12964443e8d19 ("arm64: add on_accessible_stack()") 17c2895860092 ("arm64: Abstract syscallno manipulation") 34be98f4944f9 ("arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP") 35d0e6fb4d219 ("arm64: syscallno is secretly an int, make it official") 8018ba4edfd3a ("arm64: move SEGMENT_ALIGN to ") 872d8327ce898 ("arm64: add VMAP_STACK overflow detection") 9842ceae9fa8d ("arm64: Add uprobe support") a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion") a9ea0017ebe88 ("arm64: factor out current_stack_pointer") c02433dd6de32 ("arm64: split thread_info from task stack") c7365330753c5 ("arm64: unwind: disregard frame.sp when validating frame pointer") cf7de27ab3517 ("arm64/syscalls: Check address limit on user-mode return") dbc9344a68e50 ("arm64: clean up THREAD_* definitions") f37099b6992a0 ("arm64: convert syscall trace logic to C") f60ad4edcf072 ("arm64: clean up irq stack definitions") v4.4.230: Failed to apply! Possible dependencies: 0a28714c53fd4 ("arm64: Use PoU cache instr for I/D coherency") 0a8ea52c3eb15 ("arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature") 17c2895860092 ("arm64: Abstract syscallno manipulation") 2dd0e8d2d2a15 ("arm64: Kprobes with single stepping support") 35d0e6fb4d219 ("arm64: syscallno is secretly an int, make it official") 39a67d49ba353 ("arm64: kprobes instruction simulation support") 421dd6fa6709e ("arm64: factor work_pending state machine to C") 57f4959bad0a1 ("arm64: kernel: Add support for User Access Override") 872d8327ce898 ("arm64: add VMAP_STACK overflow detection") 9842ceae9fa8d ("arm64: Add uprobe support") a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion") b11e5759bfac0 ("arm64: factor out entry stack manipulation") cf7de27ab3517 ("arm64/syscalls: Check address limit on user-mode return") d5370f7548754 ("arm64: prefetch: add alternative pattern for CPUs without a prefetcher") d59bee8872311 ("arm64: Add more test functions to insn.c") e04a28d45ff34 ("arm64: debug: re-enable irqs before sending breakpoint SIGTRAP") f37099b6992a0 ("arm64: convert syscall trace logic to C") NOTE: The patch will not be queued to stable trees until it is upstream. How should we proceed with this patch? -- Thanks Sasha _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel