From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 27156C433F5 for ; Tue, 12 Apr 2022 16:43:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357809AbiDLQpo (ORCPT ); Tue, 12 Apr 2022 12:45:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58618 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345761AbiDLQpi (ORCPT ); Tue, 12 Apr 2022 12:45:38 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F83749C99; Tue, 12 Apr 2022 09:43:20 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 2CC5AB81B79; Tue, 12 Apr 2022 16:43:19 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68123C385A5; Tue, 12 Apr 2022 16:43:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649781798; bh=BzDL5+rVL2ZyfPd0SEPtDbzn2wLAu6B6TXyHMgQILAU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=kMczoEcvWHgTHfeGLRbfsrbl78ZIH+0LB8K+5C2LA8eX1kt58BwIbV/75qa4TAYBV qZNQ/agpJTpNh+Lj9cOnKKfMdHQXXZ9kT8P64d8LVe0nZTJXFZkRvOTvP/g0YSTmy1 wXmIaJirX6PLDu5DmiGMh8l8PPqwIjF3yuR8pyqw= Date: Tue, 12 Apr 2022 18:43:15 +0200 From: Greg Kroah-Hartman To: Naresh Kamboju Cc: Marco Elver , linux-kernel@vger.kernel.org, stable@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, slade@sladewatkins.com, Alexander Potapenko , Dmitry Vyukov , kasan-dev , linux-mm Subject: Re: [PATCH 5.15 000/277] 5.15.34-rc1 review Message-ID: References: <20220412062942.022903016@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Tue, Apr 12, 2022 at 09:13:59PM +0530, Naresh Kamboju wrote: > Hi Marco > > On Tue, 12 Apr 2022 at 20:32, Marco Elver wrote: > > > > On Tue, 12 Apr 2022 at 16:16, Naresh Kamboju wrote: > > > > > > On Tue, 12 Apr 2022 at 12:11, Greg Kroah-Hartman > > > wrote: > > > > > > > > This is the start of the stable review cycle for the 5.15.34 release. > > > > There are 277 patches in this series, all will be posted as a response > > > > to this one. If anyone has any issues with these being applied, please > > > > let me know. > > > > > > > > Responses should be made by Thu, 14 Apr 2022 06:28:59 +0000. > > > > Anything received after that time might be too late. > > > > > > > > The whole patch series can be found in one patch at: > > > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.15.34-rc1.gz > > > > or in the git tree and branch at: > > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.15.y > > > > and the diffstat can be found below. > > > > > > > > thanks, > > > > > > > > greg k-h > > > > > > > > > On linux stable-rc 5.15 x86 and i386 builds failed due to below error [1] > > > with config [2]. > > > > > > The finding is when kunit config is enabled the builds pass. > > > CONFIG_KUNIT=y > > > > > > But with CONFIG_KUNIT not set the builds failed. > > > > > > x86_64-linux-gnu-ld: mm/kfence/core.o: in function `__kfence_alloc': > > > core.c:(.text+0x901): undefined reference to `filter_irq_stacks' > > > make[1]: *** [/builds/linux/Makefile:1183: vmlinux] Error 1 > > > > > > Reported-by: Linux Kernel Functional Testing > > > > > > I see these three commits, I will bisect and get back to you > > > > > > 2f222c87ceb4 kfence: limit currently covered allocations when pool nearly full > > > e25487912879 kfence: move saving stack trace of allocations into > > > __kfence_alloc() > > > d99355395380 kfence: count unexpectedly skipped allocations > > > > My guess is that this commit is missing: > > This patch is missing Fixes: tag. > > > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f39f21b3ddc7fc0f87eb6dc75ddc81b5bbfb7672 > > For your information, I have reverted the below commit and build pass. > > kfence: limit currently covered allocations when pool nearly full > > [ Upstream commit 08f6b10630f284755087f58aa393402e15b92977 ] I've added the above commit, does that fix the issue? Hm, I can test that here, let me try it... greg k-h