From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EBAE0C433EA for ; Fri, 10 Jul 2020 14:04:53 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id AE0EB20748 for ; Fri, 10 Jul 2020 14:04:53 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="frCZyReg"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="aT7ddxmx" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org AE0EB20748 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:MIME-Version:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:Message-Id:References:In-Reply-To:Subject:To:From: Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=w4U2BfQHT1rBWsCPMNPMoGKa4lAnNUnfEEXDoE8Ajvo=; b=frCZyRegkvmCJw9ys96jUq/XP5 IXNwMV+mW/oOxyCJHXtaK/qiOmRUHunlyZXjOIalgvigAi4JxhmlKT7+DzkQq5kVp/PKDMzRM9z2X rBBMot8PB8NKE2wpMFyUulsNsPiny7WHHu5XbGtFqvlP1VlkCPi62DdVFgEwK+EPn/rbypvPkSFLN Lt/NxtSreKZvQFSc79q8zJel6rikTV/hUR4P4eiczYprMw+YHjNeEHp85MSJfrnsiLC9pZ3v+NEPs 9eIdvOcQDrye9o9b1NexBc+2BAgjU9XJ4sh8EURqNcoanQmdNqIMvy4aGnIYYE0nPeAN07e8/vbu/ OTwTLZWg==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jttcO-0005F4-Vf; Fri, 10 Jul 2020 14:03:13 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jttc0-000561-9W for linux-arm-kernel@lists.infradead.org; Fri, 10 Jul 2020 14:02:49 +0000 Received: from localhost (unknown [137.135.114.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7CB7420842; Fri, 10 Jul 2020 14:02:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594389767; bh=gOCXE0At89S30b4cma36Ycpafqqwv4v/vuS6wzLQKM0=; h=Date:From:To:To:To:Cc:Cc:Cc:Cc:Cc:Subject:In-Reply-To:References: From; b=aT7ddxmxzPhAM/6LdVFg73nWVpL0R7FxOWkHuVO1XDX6N7AZmPDfsn/JWHDWXN6nD KSxR/zkTZ8DyAK7GhASEJjvW0apcMA6RjhyV1aP68Qg4bwoPN9D1G3YrqC7XVanncp QQ8ClRmxawI9gyXZj4h2SoLSEzmngq84TAy3MAGI= Date: Fri, 10 Jul 2020 14:02:46 +0000 From: Sasha Levin To: Sasha Levin To: Will Deacon To: linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v2 2/4] arm64: ptrace: Consistently use pseudo-singlestep exceptions In-Reply-To: <20200702212618.17800-3-will@kernel.org> References: <20200702212618.17800-3-will@kernel.org> Message-Id: <20200710140247.7CB7420842@mail.kernel.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200710_100248_512189_09025688 X-CRM114-Status: UNSURE ( 8.34 ) X-CRM114-Notice: Please train this message. X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , kernel-team@android.com, Luis Machado , Will Deacon , stable@vger.kernel.org MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi [This is an automated email] This commit has been processed because it contains a -stable tag. The stable tag indicates that it's relevant for the following trees: all The bot has tested the following trees: v5.7.7, v5.4.50, v4.19.131, v4.14.187, v4.9.229, v4.4.229. v5.7.7: Build OK! v5.4.50: Build OK! v4.19.131: Build OK! v4.14.187: Failed to apply! Possible dependencies: 0013aceb30748 ("xtensa: clean up fixups in assembly code") 1af1e8a39dc0f ("xtensa: move fixmap and kmap just above the KSEG") 2a61f4747eeaa ("stack-protector: test compiler capability in Kconfig and drop AUTO mode") 2b8383927525d ("Makefile: move stack-protector compiler breakage test earlier") 2bc2f688fdf88 ("Makefile: move stack-protector availability out of Kconfig") 409d5db49867c ("arm64: rseq: Implement backend rseq calls and select HAVE_RSEQ") 40d1a07b333ef ("xtensa: enable stack protector") 44c6dc940b190 ("Makefile: introduce CONFIG_CC_STACKPROTECTOR_AUTO") 5cf97ebd8b40e ("xtensa: clean up functions in assembly code") 8d66772e869e7 ("arm64: Mask all exceptions during kernel_exit") 9800b9dc13cdf ("arm: Add restartable sequences support") a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion") c2edb35ae342f ("xtensa: extract init_kio") c633544a61541 ("xtensa: add support for KASAN") d148eac0e70f0 ("Kbuild: rename HAVE_CC_STACKPROTECTOR config variable") f37099b6992a0 ("arm64: convert syscall trace logic to C") f4431396be5b2 ("xtensa: consolidate kernel stack size related definitions") v4.9.229: Failed to apply! Possible dependencies: 096683724cb2e ("arm64: unwind: avoid percpu indirection for irq stack") 12964443e8d19 ("arm64: add on_accessible_stack()") 17c2895860092 ("arm64: Abstract syscallno manipulation") 34be98f4944f9 ("arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP") 35d0e6fb4d219 ("arm64: syscallno is secretly an int, make it official") 8018ba4edfd3a ("arm64: move SEGMENT_ALIGN to ") 872d8327ce898 ("arm64: add VMAP_STACK overflow detection") 9842ceae9fa8d ("arm64: Add uprobe support") a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion") a9ea0017ebe88 ("arm64: factor out current_stack_pointer") c02433dd6de32 ("arm64: split thread_info from task stack") c7365330753c5 ("arm64: unwind: disregard frame.sp when validating frame pointer") cf7de27ab3517 ("arm64/syscalls: Check address limit on user-mode return") dbc9344a68e50 ("arm64: clean up THREAD_* definitions") f37099b6992a0 ("arm64: convert syscall trace logic to C") f60ad4edcf072 ("arm64: clean up irq stack definitions") v4.4.229: Failed to apply! Possible dependencies: 0a28714c53fd4 ("arm64: Use PoU cache instr for I/D coherency") 0a8ea52c3eb15 ("arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature") 17c2895860092 ("arm64: Abstract syscallno manipulation") 2dd0e8d2d2a15 ("arm64: Kprobes with single stepping support") 35d0e6fb4d219 ("arm64: syscallno is secretly an int, make it official") 39a67d49ba353 ("arm64: kprobes instruction simulation support") 421dd6fa6709e ("arm64: factor work_pending state machine to C") 57f4959bad0a1 ("arm64: kernel: Add support for User Access Override") 872d8327ce898 ("arm64: add VMAP_STACK overflow detection") 9842ceae9fa8d ("arm64: Add uprobe support") a92d4d1454ab8 ("arm64: entry.S: move SError handling into a C function for future expansion") b11e5759bfac0 ("arm64: factor out entry stack manipulation") cf7de27ab3517 ("arm64/syscalls: Check address limit on user-mode return") d5370f7548754 ("arm64: prefetch: add alternative pattern for CPUs without a prefetcher") d59bee8872311 ("arm64: Add more test functions to insn.c") e04a28d45ff34 ("arm64: debug: re-enable irqs before sending breakpoint SIGTRAP") f37099b6992a0 ("arm64: convert syscall trace logic to C") NOTE: The patch will not be queued to stable trees until it is upstream. How should we proceed with this patch? -- Thanks Sasha _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel