From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E664C432C0 for ; Thu, 28 Nov 2019 06:21:55 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id E3146215E5 for ; Thu, 28 Nov 2019 06:21:54 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="lIw46c8s" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726723AbfK1GVw (ORCPT ); Thu, 28 Nov 2019 01:21:52 -0500 Received: from mail-lj1-f194.google.com ([209.85.208.194]:37929 "EHLO mail-lj1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726561AbfK1GVv (ORCPT ); Thu, 28 Nov 2019 01:21:51 -0500 Received: by mail-lj1-f194.google.com with SMTP id k8so16605449ljh.5 for ; Wed, 27 Nov 2019 22:21:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=jGpGxpC/wXWKh1C0/wBKFzSJF3Qe61l1DK5ccrhGvrI=; b=lIw46c8sEh+S5n6n9HdGJrBBIpXd62YZNYBvqi/xV0hgqMHG2ExA4L1LozZoBPLa5y dK8FNwPTwQS+PHs5WDKS3GZqDr5gNrtZg5G5kGBXbM9HdpFKq8OSx5VePntx4OBLqvCX 4NTtN1ApKyuFqki2PDWnrdTjjuZlzkiDUd7eWWSPfeBTJlye6er3Oac3o/fyNSgn5KF7 YAZEENqdcAcSEv6dzSWrH3qWRN1P6LGoMXLYbf4iNnpQe8itknFJX6yu3qVzew4Kll3i J8qwqAdRGHEiF3qYrfS3pG7NDpoSVJgzsrSA1nF9AaFAl0gWcpRNnwiFW9e0cFTV1rT5 Dnvw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=jGpGxpC/wXWKh1C0/wBKFzSJF3Qe61l1DK5ccrhGvrI=; b=ou3SplMe4bseL/3ixPlTr+hWUxjpsOH5V7jJ3fMeq+NC8MnPKqhSaUzqvPIL6kwu1d MOtwVRsODslbRj8vy534OgZyFL0FMC987kVZrbf2iClNycyXLJQGWNywymY5QiY3Kmvx chL66brToMTA+6FwCQZ39wUKCjSbgyLpJ4LYll0pXPrBhdnWleE0TdYyPqzwtP+2q3Mz 1BohXZKYNjna976R1v2fnjNyc8AmYxhwAhuPGCAQrwl2YbxYpjzMR0kj7NyLBfg7QNLc fpxe/gUEzb/HVG82agw/4c7IIWxSjvixtKuDw49PeBNux5MHebCWqqpmak0p4Z0jsfSK /Yig== X-Gm-Message-State: APjAAAXROuWCU+aWX1JyaVf3j48Xu2QWb/3xYh8KJTrL7HPd0LpX8R5w LK7ob+523oFHDl8UoHYvwDbHcYpG5qhl4NpT4IT1eg== X-Google-Smtp-Source: APXvYqwkoBIjjv7fpkao3bfuld82KnBgOsLVb6dusFS/gVBJO4fpnHDQPkBAT7sgWsM/Xvw4Z8BfHvWbRuT42v6C1JM= X-Received: by 2002:a2e:7202:: with SMTP id n2mr29985958ljc.194.1574922108978; Wed, 27 Nov 2019 22:21:48 -0800 (PST) MIME-Version: 1.0 References: <20191127203049.431810767@linuxfoundation.org> In-Reply-To: From: Naresh Kamboju Date: Thu, 28 Nov 2019 11:51:37 +0530 Message-ID: Subject: Re: [PATCH 4.14 000/211] 4.14.157-stable review To: Greg Kroah-Hartman Cc: open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, linux- stable , Netdev , Tejun Heo , Al Viro , linux-fsdevel@vger.kernel.org, Eric Dumazet , jouni.hogander@unikie.com, "David S. Miller" , lukas.bulwahn@gmail.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Greg, > Kernel BUG noticed on x86_64 device while booting 4.14.157-rc1 kernel. The problematic patch is, >> Jouni Hogander >> net-sysfs: Fix reference count leak in rx|netdev_queue_add_kobject And this kernel panic is been fixed by below patch, commit 48a322b6f9965b2f1e4ce81af972f0e287b07ed0 Author: Eric Dumazet Date: Wed Nov 20 19:19:07 2019 -0800 net-sysfs: fix netdev_queue_add_kobject() breakage kobject_put() should only be called in error path. Fixes: b8eb718348b8 ("net-sysfs: Fix reference count leak in rx|netdev_queue_add_kobject") Signed-off-by: Eric Dumazet Cc: Jouni Hogander Signed-off-by: David S. Miller > Regressions (compared to build v4.14.156) > > [ 2.777657] BUG: unable to handle kernel NULL pointer dereference > at 0000000000000090 > [ 2.785487] IP: kernfs_find_ns+0x18/0xf0 > [ 2.789408] PGD 0 P4D 0 > [ 2.791941] Oops: 0000 [#1] SMP PTI > [ 2.795424] Modules linked in: > [ 2.798474] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.14.157-rc1 #1 > [ 2.804906] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS > 2.2 05/23/2018 > [ 2.812288] task: ffff8e09ee250000 task.stack: ffffa0f900028000 > [ 2.818200] RIP: 0010:kernfs_find_ns+0x18/0xf0 > [ 3.108995] Kernel panic - not syncing: Attempted to kill init! > exitcode=0x00000009 > [ 3.108995] > [ 3.118161] Kernel Offset: 0x1c400000 from 0xffffffff81000000 > (relocation range: 0xffffffff80000000-0xffffffffbfffffff) > > Full test log, > https://lkft.validation.linaro.org/scheduler/job/1026224#L793 > -- Linaro LKFT https://lkft.linaro.org