From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6AA3DC47095 for ; Tue, 6 Oct 2020 08:52:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id EBEF92075A for ; Tue, 6 Oct 2020 08:52:26 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="DWnWTbOi" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726078AbgJFIw0 (ORCPT ); Tue, 6 Oct 2020 04:52:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40184 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725912AbgJFIwZ (ORCPT ); Tue, 6 Oct 2020 04:52:25 -0400 Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 14021C0613D1 for ; Tue, 6 Oct 2020 01:52:24 -0700 (PDT) Received: by mail-io1-xd43.google.com with SMTP id y13so12186699iow.4 for ; Tue, 06 Oct 2020 01:52:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=Brzzy/lJvjDAn9lxHDHd9GexxUXru88OTcAFkc5XEuU=; b=DWnWTbOigoMfmhnFA7UJeJ6l2/fabMWAldKehMvkg5+rh2OMubY6q1XkDo34SdHQIp J9u32QqzcHNVzpHDFZs8wT3tjH6QMAUe49zOsOLjzz8GEZ63+Ac259VOUp/gegQLKmK7 ZdRXGNKP0/+lNZvf7w2JHzOrk3FVbR3VBIUjg/cTAlUTV7Gw9K8ikI7+iW/F9yVMwouD LMJxf/qTBz2tr1iVzV74asV+7MHwnY0mczQMcpjml70APHyy+sFAt9DNDWucRSgeGWv7 8oLqCEuU6wcjK9x+bd/0VyNJO3Sv2Ue8h0fI61HBuSCdxAlekyO7M8+daqxcQ4dr9SMC bEoQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=Brzzy/lJvjDAn9lxHDHd9GexxUXru88OTcAFkc5XEuU=; b=QzNIQ5rTfy0O4QK0HbEMSS2p5Sr5bhP3A6jDCmEvKZGhPVCBRhYD5+puACFbbjYif0 PAYrMahuRcFIvpWGHNsxpdg3pB+ym2yyd986vCKr1ULTDCy5MC68d0wDfzqN/vll8yIL q3aYGfpeaVG+GIwfCZDSZMXCe3nkS5wrBadkzban6J0INA44n+4skcFNfAmJsmf0/9Bv ON1P0SND73hRrBvtVVjSjsMhpsUN9urto1akfhGJaVPqTsaGa1cJ40PnpmtttOL3IeuN VjvjNMDNFgmSdZhYJ68Y/wR1NnvgxcEtYQ2PbQ4I5K7nEZKURY7VgZ6Sact0Yliq6nrs nm8w== X-Gm-Message-State: AOAM530bAZ8d+JQyuyJg1ouPiq7WXz35+vSJAEtv9IvMawhl9S8w5EoV Ex1r5dlmR0mu//pK12rJK0J/sGs38zO48EQHTy+JzQ== X-Google-Smtp-Source: ABdhPJz2/PE4LbeZIl8o54KJGuiFMSWG/3hBxAnIoHIJKdA4gp6zNsWEWSlk6ojLqKNTgyljf+gEvdX0BbrnIvQYMmc= X-Received: by 2002:a02:a317:: with SMTP id q23mr260126jai.35.1601974343179; Tue, 06 Oct 2020 01:52:23 -0700 (PDT) MIME-Version: 1.0 References: <20201005142108.650363140@linuxfoundation.org> In-Reply-To: <20201005142108.650363140@linuxfoundation.org> From: Naresh Kamboju Date: Tue, 6 Oct 2020 14:22:12 +0530 Message-ID: Subject: Re: [PATCH 4.19 00/38] 4.19.150-rc1 review To: Greg Kroah-Hartman Cc: open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, pavel@denx.de, linux- stable Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 5 Oct 2020 at 20:57, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 4.19.150 release. > There are 38 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed, 07 Oct 2020 14:20:55 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-= 4.19.150-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable= -rc.git linux-4.19.y > and the diffstat can be found below. > > thanks, > > greg k-h Results from Linaro=E2=80=99s test farm. No regressions on arm64, arm, x86_64, and i386. Tested-by: Linux Kernel Functional Testing NOTE: While running LTP mm test suite on qemu_arm64 kernel panic noticed. mem.c:147: PASS: victim signalled: (9) SIGKILL mem.c:232: INFO: start OOM testing for KSM pages. mem.c:140: INFO: expected victim is 22880. mem.c:39: INFO: thread (ffff815e21f0), allocating 3221225472 bytes. mem.c:39: INFO: thread (ffff80de11f0), allocating 3221225472 bytes. mem.c:39: INFO: thread (ffff805e01f0), allocating 3221225472 bytes. [ 466.027773] BUG: Bad page state in process oom01 pfn:76283 [ 466.030488] page:ffff7e0000d8a0c0 count:0 mapcount:0 mapping:0000000000000000 index:0x1 [ 466.034501] flags: 0xfffc00000000100(slab) [ 466.036606] raw: 0fffc00000000100 dead000000000100 dead000000000200 0000000000000000 [ 466.040243] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 466.043931] page dumped because: PAGE_FLAGS_CHECK_AT_PREP flag set [ 466.046974] bad because of flags: 0x100(slab) [ 466.049078] Modules linked in: crc32_ce crct10dif_ce fuse [ 466.051636] CPU: 3 PID: 22882 Comm: oom01 Not tainted 4.19.150-rc1 #1 [ 466.054711] Hardware name: linux,dummy-virt (DT) [ 466.056906] Call trace: [ 466.058159] dump_backtrace+0x0/0x190 [ 466.059980] show_stack+0x24/0x30 [ 466.061560] dump_stack+0xb8/0x100 [ 466.063272] bad_page+0x104/0x130 [ 466.064761] check_new_page_bad+0x80/0xb0 [ 466.066500] get_page_from_freelist+0xeb0/0x14e8 [ 466.068508] __alloc_pages_nodemask+0x12c/0xdf0 [ 466.070466] alloc_pages_vma+0x90/0x1f8 [ 466.072164] __handle_mm_fault+0x59c/0x10d0 [ 466.074014] handle_mm_fault+0x128/0x210 [ 466.076069] do_page_fault+0x150/0x4d8 [ 466.077861] do_translation_fault+0xa4/0xb8 [ 466.079890] do_mem_abort+0x68/0x110 [ 466.081479] el0_da+0x20/0x24 [ 466.083041] Disabling lock debugging due to kernel taint Full test log link, ------------------- https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-4.19.y/build/v4.19= .149-39-g204463e611dc/testrun/3273175/suite/linux-log-parser/test/check-ker= nel-bug-1817703/log Summary ------------------------------------------------------------------------ kernel: 4.19.150-rc1 git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stab= le-rc.git git branch: linux-4.19.y git commit: 204463e611dc07092b63dd18658ad7efc3dd1252 git describe: v4.19.149-39-g204463e611dc Test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-4.19= .y/build/v4.19.149-39-g204463e611dc No regressions (compared to build v4.19.149) No fixes (compared to build v4.19.149) Ran 34073 total tests in the following environments and test suites. Environments -------------- - dragonboard-410c - arm64 - hi6220-hikey - arm64 - i386 - juno-r2 - arm64 - juno-r2-compat - juno-r2-kasan - qemu_arm - qemu_arm64 - qemu_i386 - qemu_x86_64 - x15 - arm - x86_64 - x86-kasan Test Suites ----------- * build * install-android-platform-tools-r2600 * libhugetlbfs * linux-log-parser * ltp-cap_bounds-tests * ltp-commands-tests * ltp-containers-tests * ltp-cpuhotplug-tests * ltp-crypto-tests * ltp-cve-tests * ltp-hugetlb-tests * ltp-ipc-tests * ltp-math-tests * ltp-mm-tests * ltp-nptl-tests * ltp-pty-tests * ltp-sched-tests * ltp-securebits-tests * ltp-syscalls-tests * ltp-tracing-tests * perf * v4l2-compliance * ltp-controllers-tests * ltp-dio-tests * ltp-io-tests * kselftest * ltp-fcntl-locktests-tests * ltp-filecaps-tests * ltp-fs-tests * ltp-fs_bind-tests * ltp-fs_perms_simple-tests * ltp-fsx-tests * ltp-open-posix-tests * network-basic-tests * ssuite * kselftest-vsyscall-mode-native * kselftest-vsyscall-mode-none --=20 Linaro LKFT https://lkft.linaro.org