From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id DC5AEC3DA7D for ; Tue, 3 Jan 2023 16:16:43 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237849AbjACQQm (ORCPT ); Tue, 3 Jan 2023 11:16:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43890 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237921AbjACQQR (ORCPT ); Tue, 3 Jan 2023 11:16:17 -0500 Received: from mail-yw1-x112e.google.com (mail-yw1-x112e.google.com [IPv6:2607:f8b0:4864:20::112e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8D3F5DFC4 for ; Tue, 3 Jan 2023 08:16:11 -0800 (PST) Received: by mail-yw1-x112e.google.com with SMTP id 00721157ae682-46d4840b51fso383285917b3.12 for ; Tue, 03 Jan 2023 08:16:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=T9E3yODCOfZo0/pWTG+czeAvvP2raTvlQmHAk+DYnOs=; b=nA4r95X7N/keC8+zAS1FsJPbm3mXsCxmCg2IFQs4Y5rAbc31twg6Fmc4vCWD1gHVwE wGJPISwNETwyjEC7X+seEI5tSi3S9kXGk7GNYM1LEN7MEDqskbaAXFgBTjn2lRtB6ATY whJ0m2xlTV7HaL7Kf4CncZoIEcPhlqPNS2zew= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=T9E3yODCOfZo0/pWTG+czeAvvP2raTvlQmHAk+DYnOs=; b=C+gur2f/cieHVtOctsg+pYWKWCdEQHrr5IBAMUHo6vQ/CLFUqiY4JGxX/inAF8EEEm 082zjFtYvWAuUutAAHl1B0Ky9aNjG4CLxfOrWcwv8g5ji2K51fda5+oUSstLLm8/6Nty QgL3OTFSW/3jYMjJUnbtCXY6DKk+5pHxd7yAzgP454mQgyeSGHXfuG0CfuBd0IcP40po 68Y86ZlZsV78ryG1IDiU9I6ew2aFV27uuiZoq5T4t4gxHQ1rVz+o155qnuEIAYhlSW/+ gik3CsGM1AMcDtdGFfWhVI988aH+3AlB55ElSILtyFfP1LuEK3kkIUcRc6J2TwDO1fax iimg== X-Gm-Message-State: AFqh2kqMyXYjssDQVlCD1G/ZFfw5xvPkw+DETud9R6IXnIepM88gicrt jr3uNhBLV9gQI7myBHFTyqwnlA== X-Google-Smtp-Source: AMrXdXugJHssjtvoGtsjOMTkx4zuVT9yDfuVETqyj1vbXVmTJuW0si04aQVlUr4wLafXWmPbDZMiTA== X-Received: by 2002:a81:6d4d:0:b0:3b8:1d18:90a8 with SMTP id i74-20020a816d4d000000b003b81d1890a8mr38194581ywc.39.1672762570550; Tue, 03 Jan 2023 08:16:10 -0800 (PST) Received: from localhost (228.221.150.34.bc.googleusercontent.com. [34.150.221.228]) by smtp.gmail.com with ESMTPSA id x17-20020ac84d51000000b003a7f3c4dcdfsm19032594qtv.47.2023.01.03.08.16.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Jan 2023 08:16:07 -0800 (PST) Date: Tue, 3 Jan 2023 16:16:07 +0000 From: Joel Fernandes To: Greg Kroah-Hartman Cc: stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de Subject: Re: [PATCH 5.10 00/63] 5.10.162-rc1 review Message-ID: References: <20230103081308.548338576@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230103081308.548338576@linuxfoundation.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 03, 2023 at 09:13:30AM +0100, Greg Kroah-Hartman wrote: > This is the start of the stable review cycle for the 5.10.162 release. > There are 63 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu, 05 Jan 2023 08:12:47 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.162-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y > and the diffstat can be found below. > > thanks, Testing fails. Could you please pick these 2 up? https://lore.kernel.org/r/20221230153215.1333921-1-joel@joelfernandes.org https://lore.kernel.org/all/20221230153215.1333921-2-joel@joelfernandes.org/ Thank you, - Joel > > greg k-h > > ------------- > Pseudo-Shortlog of commits: > > Greg Kroah-Hartman > Linux 5.10.162-rc1 > > Jens Axboe > io_uring: pass in EPOLL_URING_WAKE for eventfd signaling and wakeups > > Jens Axboe > eventfd: provide a eventfd_signal_mask() helper > > Jens Axboe > eventpoll: add EPOLL_URING_WAKE poll wakeup flag > > Jens Axboe > Revert "proc: don't allow async path resolution of /proc/self components" > > Jens Axboe > Revert "proc: don't allow async path resolution of /proc/thread-self components" > > Jens Axboe > net: remove cmsg restriction from io_uring based send/recvmsg calls > > Jens Axboe > task_work: unconditionally run task_work from get_signal() > > Jens Axboe > signal: kill JOBCTL_TASK_WORK > > Jens Axboe > io_uring: import 5.15-stable io_uring > > Jens Axboe > task_work: add helper for more targeted task_work canceling > > Jens Axboe > kernel: don't call do_exit() for PF_IO_WORKER threads > > Jens Axboe > kernel: stop masking signals in create_io_thread() > > Stefan Metzmacher > x86/process: setup io_threads more like normal user space threads > > Jens Axboe > arch: ensure parisc/powerpc handle PF_IO_WORKER in copy_thread() > > Jens Axboe > arch: setup PF_IO_WORKER threads like PF_KTHREAD > > Seth Forshee > entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set > > Jens Axboe > kernel: allow fork with TIF_NOTIFY_SIGNAL pending > > Eric W. Biederman > coredump: Limit what can interrupt coredumps > > Jens Axboe > kernel: remove checking for TIF_NOTIFY_SIGNAL > > Jens Axboe > task_work: remove legacy TWA_SIGNAL path > > Al Viro > alpha: fix TIF_NOTIFY_SIGNAL handling > > Vineet Gupta > ARC: unbork 5.11 bootup: fix snafu in _TIF_NOTIFY_SIGNAL handling > > Jens Axboe > ia64: don't call handle_signal() unless there's actually a signal queued > > Jens Axboe > sparc: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > riscv: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > nds32: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > ia64: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > h8300: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > c6x: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > alpha: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > xtensa: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > arm: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > microblaze: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > hexagon: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > csky: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > openrisc: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > sh: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > um: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > s390: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > mips: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > powerpc: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > parisc: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > nios32: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > m68k: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > arm64: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > arc: add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > x86: Wire up TIF_NOTIFY_SIGNAL > > Jens Axboe > task_work: Use TIF_NOTIFY_SIGNAL if available > > Jens Axboe > entry: Add support for TIF_NOTIFY_SIGNAL > > Jens Axboe > fs: provide locked helper variant of close_fd_get_file() > > Eric W. Biederman > file: Rename __close_fd_get_file close_fd_get_file > > Jens Axboe > fs: make do_renameat2() take struct filename > > Jens Axboe > signal: Add task_sigpending() helper > > Pavel Begunkov > net: add accept helper not installing fd > > Jens Axboe > net: provide __sys_shutdown_sock() that takes a socket > > Arnaldo Carvalho de Melo > tools headers UAPI: Sync openat2.h with the kernel sources > > Jens Axboe > fs: expose LOOKUP_CACHED through openat2() RESOLVE_CACHED > > Al Viro > Make sure nd->path.mnt and nd->path.dentry are always valid pointers > > Al Viro > fix handling of nd->depth on LOOKUP_CACHED failures in try_to_unlazy* > > Jens Axboe > fs: add support for LOOKUP_CACHED > > Al Viro > saner calling conventions for unlazy_child() > > Jens Axboe > iov_iter: add helper to save iov_iter state > > Jens Axboe > kernel: provide create_io_thread() helper > > > ------------- > > Diffstat: > > Makefile | 6 +- > arch/alpha/include/asm/thread_info.h | 4 +- > arch/alpha/kernel/entry.S | 2 +- > arch/alpha/kernel/process.c | 2 +- > arch/alpha/kernel/signal.c | 2 +- > arch/arc/include/asm/thread_info.h | 4 +- > arch/arc/kernel/entry.S | 3 +- > arch/arc/kernel/process.c | 2 +- > arch/arc/kernel/signal.c | 2 +- > arch/arm/include/asm/thread_info.h | 7 +- > arch/arm/kernel/entry-common.S | 6 +- > arch/arm/kernel/entry-v7m.S | 2 +- > arch/arm/kernel/process.c | 2 +- > arch/arm/kernel/signal.c | 2 +- > arch/arm64/include/asm/thread_info.h | 5 +- > arch/arm64/kernel/process.c | 2 +- > arch/arm64/kernel/signal.c | 2 +- > arch/c6x/include/asm/thread_info.h | 1 + > arch/c6x/kernel/asm-offsets.c | 1 + > arch/c6x/kernel/signal.c | 3 +- > arch/csky/include/asm/thread_info.h | 5 +- > arch/csky/kernel/process.c | 2 +- > arch/csky/kernel/signal.c | 2 +- > arch/h8300/include/asm/thread_info.h | 4 +- > arch/h8300/kernel/process.c | 2 +- > arch/h8300/kernel/signal.c | 2 +- > arch/hexagon/include/asm/thread_info.h | 2 + > arch/hexagon/kernel/process.c | 4 +- > arch/ia64/include/asm/thread_info.h | 4 +- > arch/ia64/kernel/process.c | 5 +- > arch/ia64/kernel/signal.c | 3 +- > arch/m68k/include/asm/thread_info.h | 1 + > arch/m68k/kernel/process.c | 2 +- > arch/m68k/kernel/signal.c | 3 +- > arch/microblaze/include/asm/thread_info.h | 2 + > arch/microblaze/kernel/process.c | 2 +- > arch/microblaze/kernel/signal.c | 3 +- > arch/mips/include/asm/thread_info.h | 4 +- > arch/mips/kernel/process.c | 2 +- > arch/mips/kernel/signal.c | 2 +- > arch/nds32/include/asm/thread_info.h | 2 + > arch/nds32/kernel/ex-exit.S | 2 +- > arch/nds32/kernel/process.c | 2 +- > arch/nds32/kernel/signal.c | 2 +- > arch/nios2/include/asm/thread_info.h | 2 + > arch/nios2/kernel/process.c | 2 +- > arch/nios2/kernel/signal.c | 3 +- > arch/openrisc/include/asm/thread_info.h | 2 + > arch/openrisc/kernel/process.c | 2 +- > arch/openrisc/kernel/signal.c | 2 +- > arch/parisc/include/asm/thread_info.h | 4 +- > arch/parisc/kernel/process.c | 2 +- > arch/parisc/kernel/signal.c | 3 +- > arch/powerpc/include/asm/thread_info.h | 5 +- > arch/powerpc/kernel/process.c | 2 +- > arch/powerpc/kernel/signal.c | 2 +- > arch/riscv/include/asm/thread_info.h | 5 +- > arch/riscv/kernel/process.c | 2 +- > arch/riscv/kernel/signal.c | 2 +- > arch/s390/include/asm/thread_info.h | 2 + > arch/s390/kernel/entry.S | 11 +- > arch/s390/kernel/process.c | 2 +- > arch/s390/kernel/signal.c | 2 +- > arch/sh/include/asm/thread_info.h | 4 +- > arch/sh/kernel/process_32.c | 2 +- > arch/sh/kernel/signal_32.c | 2 +- > arch/sparc/include/asm/thread_info_32.h | 4 +- > arch/sparc/include/asm/thread_info_64.h | 6 +- > arch/sparc/kernel/process_32.c | 2 +- > arch/sparc/kernel/process_64.c | 2 +- > arch/sparc/kernel/signal_32.c | 2 +- > arch/sparc/kernel/signal_64.c | 2 +- > arch/um/include/asm/thread_info.h | 2 + > arch/um/kernel/process.c | 5 +- > arch/x86/include/asm/thread_info.h | 2 + > arch/x86/kernel/process.c | 17 + > arch/x86/kernel/signal.c | 4 +- > arch/xtensa/include/asm/thread_info.h | 5 +- > arch/xtensa/kernel/entry.S | 4 +- > arch/xtensa/kernel/process.c | 2 +- > arch/xtensa/kernel/signal.c | 3 +- > drivers/android/binder.c | 2 +- > fs/Makefile | 2 - > fs/coredump.c | 2 +- > fs/eventfd.c | 37 +- > fs/eventpoll.c | 18 +- > fs/file.c | 34 +- > fs/internal.h | 3 + > fs/io-wq.c | 1242 ---- > fs/namei.c | 84 +- > fs/open.c | 6 + > fs/proc/self.c | 7 - > fs/proc/thread_self.c | 7 - > include/linux/entry-common.h | 7 +- > include/linux/entry-kvm.h | 4 +- > include/linux/eventfd.h | 7 + > include/linux/fcntl.h | 2 +- > include/linux/fdtable.h | 2 +- > include/linux/io_uring.h | 46 +- > include/linux/namei.h | 1 + > include/linux/net.h | 3 - > include/linux/sched.h | 3 + > include/linux/sched/jobctl.h | 4 +- > include/linux/sched/signal.h | 18 +- > include/linux/sched/task.h | 2 + > include/linux/socket.h | 4 + > include/linux/syscalls.h | 2 +- > include/linux/task_work.h | 2 + > include/linux/tracehook.h | 23 + > include/linux/uio.h | 15 + > include/trace/events/io_uring.h | 121 +- > include/uapi/linux/eventpoll.h | 6 + > include/uapi/linux/io_uring.h | 115 +- > include/uapi/linux/openat2.h | 4 + > io_uring/Makefile | 6 + > io_uring/io-wq.c | 1398 +++++ > {fs => io_uring}/io-wq.h | 47 +- > {fs => io_uring}/io_uring.c | 9209 ++++++++++++++++------------- > kernel/entry/common.c | 14 +- > kernel/entry/kvm.c | 2 +- > kernel/events/uprobes.c | 2 +- > kernel/exit.c | 2 +- > kernel/fork.c | 33 +- > kernel/sched/core.c | 2 +- > kernel/signal.c | 53 +- > kernel/task_work.c | 48 +- > lib/iov_iter.c | 52 +- > net/ipv4/af_inet.c | 1 - > net/ipv6/af_inet6.c | 1 - > net/socket.c | 92 +- > tools/include/uapi/linux/openat2.h | 4 + > 131 files changed, 7279 insertions(+), 5773 deletions(-) > >