stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Kees Cook <keescook@chromium.org>
To: Sasha Levin <sashal@kernel.org>
Cc: Dominik Czarnota <dominik.czarnota@trailofbits.com>,
	stable@vger.kernel.org
Subject: Re: [PATCH 1/5] kallsyms: Refactor kallsyms_show_value() to take cred
Date: Fri, 10 Jul 2020 08:57:32 -0700	[thread overview]
Message-ID: <202007100857.EEB63BE@keescook> (raw)
In-Reply-To: <20200710140307.911FB2082E@mail.kernel.org>

On Fri, Jul 10, 2020 at 02:03:06PM +0000, Sasha Levin wrote:
> This commit has been processed because it contains a -stable tag.
> The stable tag indicates that it's relevant for the following trees: all
> 
> The bot has tested the following trees: v5.7.7, v5.4.50, v4.19.131, v4.14.187, v4.9.229, v4.4.229.

Was this test for only 1/5, or the whole series?

Thanks!

-Kees

> 
> v5.7.7: Build OK!
> v5.4.50: Build OK!
> v4.19.131: Build OK!
> v4.14.187: Failed to apply! Possible dependencies:
>     22c8852624fc9 ("bpf: improve selftests and add tests for meta pointer")
>     2b7c6ba945fd3 ("bpf/verifier: improve disassembly of BPF_END instructions")
>     390ee7e29fc8e ("bpf: enforce return code for cgroup-bpf programs")
>     61bd5218eef34 ("bpf: move global verifier log into verifier environment")
>     7105e828c087d ("bpf: allow for correlation of maps and helpers in dump")
>     73c864b38383f ("bpf/verifier: improve disassembly of BPF_NEG instructions")
>     cc8b0b92a1699 ("bpf: introduce function calls (function boundaries)")
>     de8f3a83b0a0f ("bpf: add meta pointer for direct access")
>     e7bf8249e8f1b ("bpf: encapsulate verifier log state into a structure")
>     f4ac7e0b5cc8d ("bpf: move instruction printing into a separate file")
> 
> v4.9.229: Failed to apply! Possible dependencies:
>     0e33661de493d ("bpf: add new prog type for cgroup socket filtering")
>     29ba732acbeec ("bpf: Add BPF_MAP_TYPE_LRU_HASH")
>     2d0bde57f3527 ("include/linux/filter.h: use set_memory.h header")
>     3007098494bec ("cgroup: add support for eBPF programs")
>     3a08c2fd76345 ("bpf: LRU List")
>     3a0af8fd61f90 ("bpf: BPF for lightweight tunnel infrastructure")
>     40077e0cf6220 ("bpf: remove struct bpf_map_type_list")
>     546ac1ffb70d2 ("bpf: add devmap, a map for storing net device references")
>     56f668dfe00dc ("bpf: Add array of maps support")
>     6102365876003 ("bpf: Add new cgroup attach type to enable sock modifications")
>     7105e828c087d ("bpf: allow for correlation of maps and helpers in dump")
>     7bd509e311f40 ("bpf: add prog_digest and expose it via fdinfo/netlink")
>     820a0b24b261c ("include/linux/filter.h: use linux/set_memory.h")
>     8f8449384ec36 ("bpf: Add BPF_MAP_TYPE_LRU_PERCPU_HASH")
>     b2cd12574aa3e ("bpf: Refactor cgroups code in prep for new type")
>     b95a5c4db09bc ("bpf: add a longest prefix match trie map implementation")
>     be9370a7d8614 ("bpf: remove struct bpf_prog_type_list")
>     c78f8bdfa11fc ("bpf: mark all registered map/prog types as __ro_after_init")
>     f4324551489e8 ("bpf: add BPF_PROG_ATTACH and BPF_PROG_DETACH commands")
>     f4ac7e0b5cc8d ("bpf: move instruction printing into a separate file")
> 
> v4.4.229: Failed to apply! Possible dependencies:
>     0d01d45f1b251 ("net: cls_bpf: limit hardware offload by software-only flag")
>     16e5cc647173a ("net: rework setup_tc ndo op to consume general tc operand")
>     332ae8e2f6ecd ("net: cls_bpf: add hardware offload")
>     4f3446bb809f2 ("bpf: add generic constant blinding for use in jits")
>     5b33f48842fa1 ("net/flower: Introduce hardware offload support")
>     6843e7a2abe7c ("net: sched: consolidate offload decision in cls_u32")
>     7105e828c087d ("bpf: allow for correlation of maps and helpers in dump")
>     7bd509e311f40 ("bpf: add prog_digest and expose it via fdinfo/netlink")
>     820a0b24b261c ("include/linux/filter.h: use linux/set_memory.h")
>     9fd82b610ba33 ("bpf: register BPF_PROG_TYPE_TRACEPOINT program type")
>     a1b7c5fd7fe98 ("net: sched: add cls_u32 offload hooks for netdevs")
>     b87f7936a9324 ("net/sched: Add match-all classifier hw offloading.")
>     bd570ff970a54 ("bpf: add event output helper for notifications/sampling/logging")
>     c94987e40ebba ("bpf: move bpf_jit_enable declaration")
>     e4c6734eaab90 ("net: rework ndo tc op to consume additional qdisc handle parameter")
> 
> 
> NOTE: The patch will not be queued to stable trees until it is upstream.
> 
> How should we proceed with this patch?
> 
> -- 
> Thanks
> Sasha

-- 
Kees Cook

  reply	other threads:[~2020-07-10 15:57 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20200702232638.2946421-1-keescook@chromium.org>
2020-07-02 23:26 ` [PATCH 1/5] kallsyms: Refactor kallsyms_show_value() to take cred Kees Cook
2020-07-10 14:03   ` Sasha Levin
2020-07-10 15:57     ` Kees Cook [this message]
2020-07-11 16:07       ` Sasha Levin
2020-07-02 23:26 ` [PATCH 2/5] module: Refactor section attr into bin attribute Kees Cook
2020-07-03  6:02   ` Greg Kroah-Hartman
2020-07-03 15:29     ` Kees Cook
2020-07-08 16:10   ` Jessica Yu
2020-07-02 23:26 ` [PATCH 3/5] module: Do not expose section addresses to non-CAP_SYSLOG Kees Cook
2020-07-08 16:12   ` Jessica Yu
2020-07-02 23:26 ` [PATCH 4/5] kprobes: Do not expose probe " Kees Cook
2020-07-03  1:00   ` Linus Torvalds
2020-07-03 15:13     ` Kees Cook
2020-07-03 15:50     ` Kees Cook
2020-07-05 20:10       ` Linus Torvalds
2020-07-05 20:19         ` Kees Cook
2020-07-10 14:09   ` Masami Hiramatsu
2020-07-02 23:26 ` [PATCH 5/5] bpf: Check correct cred for CAP_SYSLOG in bpf_dump_raw_ok() Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202007100857.EEB63BE@keescook \
    --to=keescook@chromium.org \
    --cc=dominik.czarnota@trailofbits.com \
    --cc=sashal@kernel.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).