lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Oct 2021 22:47:06 +0530 From: Naresh Kamboju <naresh.kamboju@...aro.org> To: Greg Kroah-Hartman <gregkh@...uxfoundation.org> Cc: open list <linux-kernel@...r.kernel.org>, Shuah Khan <shuah@...nel.org>, Florian Fainelli <f.fainelli@...il.com>, patches@...nelci.org, lkft-triage@...ts.linaro.org, Jon Hunter <jonathanh@...dia.com>, linux-stable <stable@...r.kernel.org>, Pavel Machek <pavel@...x.de>, Andrew Morton <akpm@...ux-foundation.org>, Linus Torvalds <torvalds@...ux-foundation.org>, Guenter Roeck <linux@...ck-us.net>, "Naveen N. Rao" <naveen.n.rao@...ux.vnet.ibm.com>, Johan Almbladh <johan.almbladh@...finetworks.com>, Christophe Leroy <christophe.leroy@...roup.eu>, Song Liu <songliubraving@...com>, Michael Ellerman <mpe@...erman.id.au> Subject: Re: [PATCH 5.4 00/52] 5.4.153-rc1 review On Mon, 11 Oct 2021 at 19:19, Greg Kroah-Hartman <gregkh@...uxfoundation.org> wrote: > > This is the start of the stable review cycle for the 5.4.153 release. > There are 52 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed, 13 Oct 2021 13:44:51 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.153-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y > and the diffstat can be found below. > > thanks, > > greg k-h Following patch caused build failures on stable rc 5.4. > Naveen N. Rao <naveen.n.rao@...ux.vnet.ibm.com> > powerpc/bpf: Fix BPF_MOD when imm == 1 In file included from arch/powerpc/net/bpf_jit64.h:11, from arch/powerpc/net/bpf_jit_comp64.c:19: arch/powerpc/net/bpf_jit_comp64.c: In function 'bpf_jit_build_body': arch/powerpc/net/bpf_jit_comp64.c:415:46: error: implicit declaration of function 'PPC_RAW_LI'; did you mean 'PPC_RLWIMI'? [-Werror=implicit-function-declaration] 415 | EMIT(PPC_RAW_LI(dst_reg, 0)); | ^~~~~~~~~~ arch/powerpc/net/bpf_jit.h:32:34: note: in definition of macro 'PLANT_INSTR' 32 | do { if (d) { (d)[idx] = instr; } idx++; } while (0) | ^~~~~ arch/powerpc/net/bpf_jit_comp64.c:415:41: note: in expansion of macro 'EMIT' 415 | EMIT(PPC_RAW_LI(dst_reg, 0)); | ^~~~ cc1: all warnings being treated as errors build url: https://builds.tuxbuild.com/1zMdjlqarsON688BoMBlpCN2O3m/ Reported-by: Linux Kernel Functional Testing <lkft@...aro.org> -- Linaro LKFT https://lkft.linaro.org
Powered by blists - more mailing lists