Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp364164ybb; Wed, 1 Apr 2020 01:18:30 -0700 (PDT) X-Google-Smtp-Source: APiQypI8aRAj7CjzFCbQ18rI+7VU+M8ksMb+u+zfAqmVhBvOA2fdnUs6eaHzgMaff6Bw7z0Y3Uem X-Received: by 2002:a05:6808:2c7:: with SMTP id a7mr1981961oid.149.1585729110147; Wed, 01 Apr 2020 01:18:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585729110; cv=none; d=google.com; s=arc-20160816; b=UwuQUCzkeBIbuMYoyLChGC0J2F/hq2Pu6rCc0S8l0X2Aq1S4kqdt8K7F+Hgc9QIz2p qhMP7UnbQBkFPkh2CZUCf+pQwzlleeQZvm5XRfCONTcUaKoX7Ue20xt1aaeu6Q6KhuQZ K4a4eCfeyEEpuJXAKcHwpFk5MgQS0hW3wFYH8XziFDO2XNjmOnQBzZ9CHAfIx4WpOeaT WRTGyqY8FPqCyoCeTtyRSrqgBgvylDCuXtotqceMniwu+OKecPm2avqoUe2rMkgm6pBx r4V63DUnKtctrQEbg2W8TI0fJjsgnOSHjGjH3ZHONN59qYHMKZ8ruRbuU+wSeBgEoG3U Qj1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=LhFik/1lOhm3JXPXV6wAxjlzpvHIvV0yZKZMooAsZS0=; b=PVqjBwsa6mrr1bJ6K5yfJH0BAApShzwduAVUc3cUzxB4JvVyMOrQIWur2mKQjG1BOB df61HQCnPmpYfvBwbzp73dwnHyaLJinhRzS5dXe78ls43GXG6T3KTkazmsXfTA545RUL JGuVrr7ZfVwMlUZFwUULQbR2hsQCnhrubDP1uTGoGp7FA405uSvFAJxN200Iez4sScpS r8gg6wS6m0c3YITLHJL/F247awX7OQDucVvVI7xadD8YdmV8Igl3A/CjjBVdDXOTAfrq 5L9iOIbNWynuBhWMQvYj0XlwEYbVJFSWuYueIsWofzPX6dnZqnfs9Uszm+Q7Nst/afK1 a7fw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q23si513029otm.181.2020.04.01.01.18.17; Wed, 01 Apr 2020 01:18:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731997AbgDAIDZ (ORCPT + 99 others); Wed, 1 Apr 2020 04:03:25 -0400 Received: from www62.your-server.de ([213.133.104.62]:40518 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731850AbgDAIDZ (ORCPT ); Wed, 1 Apr 2020 04:03:25 -0400 Received: from sslproxy03.your-server.de ([88.198.220.132]) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1jJYLG-0004VH-1J; Wed, 01 Apr 2020 10:03:18 +0200 Received: from [178.195.186.98] (helo=pc-9.home) by sslproxy03.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1jJYLF-000VtC-GV; Wed, 01 Apr 2020 10:03:17 +0200 Subject: Re: [PATCH 5.5 000/171] 5.5.14-rc2 review To: Greg Kroah-Hartman , Naresh Kamboju Cc: open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, linux- stable , john.fastabend@gmail.com, komachi.yoshiki@gmail.com, Andrii Nakryiko , lukenels@cs.washington.edu, Netdev , bpf References: <20200331141450.035873853@linuxfoundation.org> <20200401061131.GA1907105@kroah.com> From: Daniel Borkmann Message-ID: Date: Wed, 1 Apr 2020 10:03:16 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20200401061131.GA1907105@kroah.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.2/25768/Tue Mar 31 15:08:38 2020) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/1/20 8:11 AM, Greg Kroah-Hartman wrote: > On Wed, Apr 01, 2020 at 04:18:41AM +0530, Naresh Kamboju wrote: >> On Tue, 31 Mar 2020 at 21:02, Greg Kroah-Hartman >> wrote: >>> >>> This is the start of the stable review cycle for the 5.5.14 release. >>> There are 171 patches in this series, all will be posted as a response >>> to this one. If anyone has any issues with these being applied, please >>> let me know. >>> >>> Responses should be made by Thu, 02 Apr 2020 14:12:02 +0000. >>> Anything received after that time might be too late. >>> >>> The whole patch series can be found in one patch at: >>> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.5.14-rc2.gz >>> or in the git tree and branch at: >>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.5.y >>> and the diffstat can be found below. >>> >>> thanks, >>> >>> greg k-h >> >> Results from Linaro’s test farm. >> Regressions on x86_64 and i386. >> >> selftests bpf test_verifier reports as failed. >> This test PASSED on v5.5.13 >> >> #554/p jgt32: range bound deduction, reg op imm FAIL >> Failed to load prog 'Success'! >> R8 unbounded memory access, make sure to bounds check any array access >> into a map >> verification time 141 usec >> stack depth 8 >> processed 16 insns (limit 1000000) max_states_per_insn 0 total_states >> 1 peak_states 1 mark_read 1 >> #555/p jgt32: range bound deduction, reg1 op reg2, reg1 unknown FAIL >> Failed to load prog 'Success'! >> R8 unbounded memory access, make sure to bounds check any array access >> into a map >> verification time 94 usec >> stack depth 8 >> processed 17 insns (limit 1000000) max_states_per_insn 0 total_states >> 1 peak_states 1 mark_read 1 >> #556/p jle32: range bound deduction, reg1 op reg2, reg2 unknown FAIL >> Failed to load prog 'Success'! >> R8 unbounded memory access, make sure to bounds check any array access >> into a map >> verification time 68 usec >> stack depth 8 >> processed 17 insns (limit 1000000) max_states_per_insn 0 total_states >> 1 peak_states 1 mark_read 1 > > Can you run 'git bisect' to find the offending patch? No need, I'll send you a patch to update the selftests. It's expected that they fail now due to the revert we had to do, so if this is the only issue it shouldn't hold up the release. In any case, I'll send them over to you next. Thanks, Daniel