linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: Sasha Levin <sashal@kernel.org>
To: Sasha Levin <sashal@kernel.org>
To: Will Deacon <will.deacon@arm.com>
To: linux-arm-kernel@lists.infradead.org
Cc: mark.rutland@arm.com, catalin.marinas@arm.com, stable@vger.kernel.org,
Subject: Re: [PATCH 01/10] arm64: debug: Don't propagate UNKNOWN FAR into si_code for debug signals
Date: Tue, 05 Mar 2019 13:35:40 +0000	[thread overview]
Message-ID: <20190305133541.14CD020848@mail.kernel.org> (raw)
In-Reply-To: <20190301132809.24653-2-will.deacon@arm.com>

Hi,

[This is an automated email]

This commit has been processed because it contains a -stable tag.
The stable tag indicates that it's relevant for the following trees: all

The bot has tested the following trees: v4.20.13, v4.19.26, v4.14.104, v4.9.161, v4.4.176, v3.18.136.

v4.20.13: Failed to apply! Possible dependencies:
    356607f21e60 ("kasan, arm64: fix up fault handling logic")

v4.19.26: Failed to apply! Possible dependencies:
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die")
    dbfe3828a6f3 ("arm64/mm: Reorganize arguments for is_el1_permission_fault()")

v4.14.104: Failed to apply! Possible dependencies:
    1fc5dce78ad1 ("arm64/sve: Low-level SVE architectural state manipulation functions")
    2923f5ea7738 ("nds32: Exception handling")
    2c9120f3a86a ("arm64: signal: Make force_signal_inject more robust")
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized")
    3f7c86b2382e ("arm64: Update fault_info table with new exception types")
    42dbf54e8890 ("arm64: consistently log ESR and page table")
    526c3ddb6aa2 ("signal/arm64: Document conflicts with SI_USER and SIGFPE,SIGTRAP,SIGBUS")
    532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls")
    6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die")
    92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info")
    94ef7ecbdf6f ("arm64: fpsimd: Correctly annotate exception helpers called from asm")
    969e61ba87f9 ("arm64: make is_permission_fault() name clearer")
    af40ff687bc9 ("arm64: signal: Ensure si_code is valid for all fault signals")
    bc0ee4760364 ("arm64/sve: Core task context handling")
    cc19846079a7 ("arm64: fault: Don't leak data in ESR context for user fault on kernel VA")
    dbfe3828a6f3 ("arm64/mm: Reorganize arguments for is_el1_permission_fault()")

v4.9.161: Failed to apply! Possible dependencies:
    0e3a9026396c ("arm64: mm: Update perf accounting to handle poison faults")
    1f9b8936f36f ("arm64: Decode information from ESR upon mem faults")
    32015c235603 ("arm64: exception: handle Synchronous External Abort")
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized")
    532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls")
    67ce16ec15ce ("arm64: mm: print out correct page table entries")
    6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die")
    786889636ad7 ("arm64: Handle faults caused by inadvertent user access with PAN enabled")
    7edda0886bc3 ("acpi: apei: handle SEA notification type for ARMv8")
    83016b204225 ("arm64: mm: print file name of faulting vma")
    92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info")
    969e61ba87f9 ("arm64: make is_permission_fault() name clearer")
    a8ada146f517 ("arm64: Update the synchronous external abort fault description")
    b824b9306823 ("arm64: print a fault message when attempting to write RO memory")
    c07ab957d9af ("arm64: Call __show_regs directly")
    cc19846079a7 ("arm64: fault: Don't leak data in ESR context for user fault on kernel VA")
    dbfe3828a6f3 ("arm64/mm: Reorganize arguments for is_el1_permission_fault()")
    e7c600f149b8 ("arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling")

v4.4.176: Failed to apply! Possible dependencies:
    09a6adf53d42 ("arm64: mm: unaligned access by user-land should be received as SIGBUS")
    0a8ea52c3eb1 ("arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature")
    1f9b8936f36f ("arm64: Decode information from ESR upon mem faults")
    2dd0e8d2d2a1 ("arm64: Kprobes with single stepping support")
    32015c235603 ("arm64: exception: handle Synchronous External Abort")
    356607f21e60 ("kasan, arm64: fix up fault handling logic")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    57f4959bad0a ("arm64: kernel: Add support for User Access Override")
    6afedcd23cfd ("arm64: mm: Add trace_irqflags annotations to do_debug_exception()")
    7dd01aef0557 ("arm64: trap userspace "dc cvau" cache operation on errata-affected core")
    9dbd5bb25c56 ("arm64: Refactor sysinstr exception handling")
    a8ada146f517 ("arm64: Update the synchronous external abort fault description")
    bbb1681ee365 ("arm64: mm: mark fault_info table const")
    d5370f754875 ("arm64: prefetch: add alternative pattern for CPUs without a prefetcher")
    d59bee887231 ("arm64: Add more test functions to insn.c")
    e04a28d45ff3 ("arm64: debug: re-enable irqs before sending breakpoint SIGTRAP")
    e7227d0e528f ("arm64: Cleanup SCTLR flags")

v3.18.136: Failed to apply! Possible dependencies:
    09a6adf53d42 ("arm64: mm: unaligned access by user-land should be received as SIGBUS")
    2dd0e8d2d2a1 ("arm64: Kprobes with single stepping support")
    31dde116cb08 ("arm64: Replace set_arch_dma_coherent_ops with arch_setup_dma_ops")
    3505f30fb6a9 ("ARM64 / ACPI: If we chose to boot from acpi then disable FDT")
    359048f91db4 ("arm64/mm: Define esr_to_debug_fault_info()")
    37655163ce1a ("ARM64 / ACPI: Get RSDP and ACPI boot-time tables")
    587064b610c7 ("arm64: Add framework for legacy instruction emulation")
    6933de0ca0b7 ("ARM64 / ACPI: Select ACPI_REDUCED_HARDWARE_ONLY if ACPI is enabled on ARM64")
    7c59a3df15df ("ARM64 / ACPI: Get PSCI flags in FADT for PSCI init")
    86dca36e6ba0 ("arm64: use private ratelimit state along with show_unhandled_signals")
    876945dbf649 ("arm64: Hook up IOMMU dma_ops")
    9b79f52d1a70 ("arm64: Add support for hooks to handle undefined instructions")
    b10d79f76085 ("ARM64 / ACPI: Introduce early_param "acpi=" to enable/disable ACPI")
    b6197b93fa4b ("arm64 : Introduce support for ACPI _CCA object")
    bbb1681ee365 ("arm64: mm: mark fault_info table const")
    d8f4f161e31f ("ACPI: move arm64 GSI IRQ model to generic GSI IRQ layer")
    de7ee503f279 ("arm64: introduce is_device_dma_coherent")
    f871d2680707 ("arm64: Fix show_unhandled_signal_ratelimited usage")
    fbe61ec71ac9 ("ARM64 / ACPI: Introduce ACPI_IRQ_MODEL_GIC and register device's gsi")
    fccb9a81fd08 ("ARM64 / ACPI: Parse MADT for SMP initialization")


How should we proceed with this patch?

--
Thanks,
Sasha

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  parent reply	other threads:[~2019-03-05 13:36 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-03-01 13:27 [PATCH 00/10] Rework debug exception handling code Will Deacon
2019-03-01 13:28 ` [PATCH 01/10] arm64: debug: Don't propagate UNKNOWN FAR into si_code for debug signals Will Deacon
2019-03-01 13:45   ` Mark Rutland
2019-03-05 13:35   ` Sasha Levin [this message]
2019-03-01 13:28 ` [PATCH 02/10] arm64: debug: Ensure debug handlers check triggering exception level Will Deacon
2019-03-01 13:46   ` Mark Rutland
2019-03-05 13:35   ` Sasha Levin
2019-03-01 13:28 ` [PATCH 03/10] arm64: debug: Remove unused return value from do_debug_exception() Will Deacon
2019-03-01 13:48   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 04/10] arm64: debug: Rename addr parameter for non-watchpoint exception hooks Will Deacon
2019-03-01 13:49   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 05/10] arm64: debug: Remove meaningless comment Will Deacon
2019-03-01 14:08   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 06/10] arm64: debug: Separate debug hooks based on target exception level Will Deacon
2019-03-01 14:07   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 07/10] arm64: kprobes: Avoid calling kprobes debug handlers explicitly Will Deacon
2019-03-01 14:12   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 08/10] arm64: debug: Remove redundant user_mode(regs) checks from debug handlers Will Deacon
2019-03-01 14:13   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 09/10] arm64: probes: Move magic BRK values into brk-imm.h Will Deacon
2019-03-01 14:16   ` Mark Rutland
2019-03-01 13:28 ` [PATCH 10/10] arm64: debug: Clean up brk_handler() Will Deacon
2019-03-01 14:17   ` Mark Rutland
2019-03-01 16:24 ` [PATCH 00/10] Rework debug exception handling code Catalin Marinas

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190305133541.14CD020848@mail.kernel.org \
    --to=sashal@kernel.org \
    --cc=catalin.marinas@arm.com \
    --cc=mark.rutland@arm.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).