This is the start of the stable review cycle for the 5.9.3 release.
There are 74 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <[email protected]>
Linux 5.9.3-rc1
Pali Rohár <[email protected]>
phy: marvell: comphy: Convert internal SMCC firmware return codes to errno
Ricky Wu <[email protected]>
misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp()
Pavel Begunkov <[email protected]>
io_uring: don't reuse linked_timeout
Souptick Joarder <[email protected]>
xen/gntdev.c: Mark pages as dirty
Jens Axboe <[email protected]>
mm: mark async iocb read as NOWAIT once some data has been copied
Geert Uytterhoeven <[email protected]>
ata: sata_rcar: Fix DMA boundary mask
Grygorii Strashko <[email protected]>
PM: runtime: Fix timer_expires data type on 32-bit arches
Peter Zijlstra <[email protected]>
serial: pl011: Fix lockdep splat when handling magic-sysrq interrupt
Paras Sharma <[email protected]>
serial: qcom_geni_serial: To correct QUP Version detection logic
Chris Wilson <[email protected]>
drm/i915/gem: Serialise debugfs i915_gem_objects with ctx->mutex
Gustavo A. R. Silva <[email protected]>
mtd: lpddr: Fix bad logic in print_drs_error
Jason Gunthorpe <[email protected]>
RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel()
Frederic Barrat <[email protected]>
cxl: Rework error message for incompatible slots
Jia-Ju Bai <[email protected]>
p54: avoid accessing the data mapped to streaming DMA
Roberto Sassu <[email protected]>
evm: Check size of security.evm before using it
Song Liu <[email protected]>
bpf: Fix comment for helper bpf_current_task_under_cgroup()
Miklos Szeredi <[email protected]>
fuse: fix page dereference after free
Pali Rohár <[email protected]>
ata: ahci: mvebu: Make SATA PHY optional for Armada 3720
Pali Rohár <[email protected]>
PCI: aardvark: Fix initialization with old Marvell's Arm Trusted Firmware
Juergen Gross <[email protected]>
x86/xen: disable Firmware First mode for correctable memory errors
Thomas Gleixner <[email protected]>
x86/traps: Fix #DE Oops message regression
Kim Phillips <[email protected]>
arch/x86/amd/ibs: Fix re-arming IBS Fetch
Gao Xiang <[email protected]>
erofs: avoid duplicated permission check for "trusted." xattrs
Leon Romanovsky <[email protected]>
net: protect tcf_block_unbind with block lock
Karsten Graul <[email protected]>
net/smc: fix suppressed return code
Karsten Graul <[email protected]>
net/smc: fix invalid return code in smcd_new_buf_create()
Tung Nguyen <[email protected]>
tipc: fix memory leak caused by tipc_buf_append()
Arjun Roy <[email protected]>
tcp: Prevent low rmem stalls with SO_RCVLOWAT.
Andrew Gabbasov <[email protected]>
ravb: Fix bit fields checking in ravb_hwtstamp_get()
Heiner Kallweit <[email protected]>
r8169: fix issue with forced threading in combination with shared interrupts
Guillaume Nault <[email protected]>
net/sched: act_mpls: Add softdep on mpls_gso.ko
Alex Elder <[email protected]>
net: ipa: command payloads already mapped
Zenghui Yu <[email protected]>
net: hns3: Clear the CMDQ registers before unmapping BAR region
Aleksandr Nogikh <[email protected]>
netem: fix zero division in tabledist
Amit Cohen <[email protected]>
mlxsw: Only advertise link modes supported by both driver and device
Ido Schimmel <[email protected]>
mlxsw: core: Fix memory leak on module removal
Lijun Pan <[email protected]>
ibmvnic: fix ibmvnic_set_mac
Thomas Bogendoerfer <[email protected]>
ibmveth: Fix use of ibmveth in a bridge.
Masahiro Fujiwara <[email protected]>
gtp: fix an use-before-init in gtp_newlink()
Raju Rangoju <[email protected]>
cxgb4: set up filter action after rewrites
Vinay Kumar Yadav <[email protected]>
chelsio/chtls: fix tls record info to user
Vinay Kumar Yadav <[email protected]>
chelsio/chtls: fix memory leaks in CPL handlers
Vinay Kumar Yadav <[email protected]>
chelsio/chtls: fix deadlock issue
Vasundhara Volam <[email protected]>
bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally.
Vasundhara Volam <[email protected]>
bnxt_en: Re-write PCI BARs after PCI fatal error.
Vasundhara Volam <[email protected]>
bnxt_en: Invoke cancel_delayed_work_sync() for PFs also.
Vasundhara Volam <[email protected]>
bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one().
Michael Chan <[email protected]>
bnxt_en: Check abort error state in bnxt_open_nic().
Michael Schaller <[email protected]>
efivarfs: Replace invalid slashes with exclamation marks in dentries.
Dan Williams <[email protected]>
x86/copy_mc: Introduce copy_mc_enhanced_fast_string()
Dan Williams <[email protected]>
x86, powerpc: Rename memcpy_mcsafe() to copy_mc_to_{user, kernel}()
Randy Dunlap <[email protected]>
x86/PCI: Fix intel_mid_pci.c build error when ACPI is not enabled
Nick Desaulniers <[email protected]>
arm64: link with -z norelro regardless of CONFIG_RELOCATABLE
Marc Zyngier <[email protected]>
arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs
Marc Zyngier <[email protected]>
arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs
Kees Cook <[email protected]>
fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum
Ard Biesheuvel <[email protected]>
efi/arm64: libstub: Deal gracefully with EFI_RNG_PROTOCOL failure
Rasmus Villemoes <[email protected]>
scripts/setlocalversion: make git describe output more reliable
Matthew Wilcox (Oracle) <[email protected]>
io_uring: Convert advanced XArray uses to the normal API
Matthew Wilcox (Oracle) <[email protected]>
io_uring: Fix XArray usage in io_uring_add_task_file
Matthew Wilcox (Oracle) <[email protected]>
io_uring: Fix use of XArray in __io_uring_files_cancel
Jens Axboe <[email protected]>
io_uring: no need to call xa_destroy() on empty xarray
Hillf Danton <[email protected]>
io-wq: fix use-after-free in io_wq_worker_running
Sebastian Andrzej Siewior <[email protected]>
io_wq: Make io_wqe::lock a raw_spinlock_t
Jens Axboe <[email protected]>
io_uring: reference ->nsproxy for file table commands
Jens Axboe <[email protected]>
io_uring: don't rely on weak ->files references
Jens Axboe <[email protected]>
io_uring: enable task/files specific overflow flushing
Jens Axboe <[email protected]>
io_uring: return cancelation status from poll/timeout/files handlers
Jens Axboe <[email protected]>
io_uring: unconditionally grab req->task
Jens Axboe <[email protected]>
io_uring: stash ctx task reference for SQPOLL
Jens Axboe <[email protected]>
io_uring: move dropping of files into separate helper
Jens Axboe <[email protected]>
io_uring: allow timeout/poll/files killing to take task into account
Saeed Mirzamohammadi <[email protected]>
netfilter: nftables_offload: KASAN slab-out-of-bounds Read in nft_flow_rule_create
Viresh Kumar <[email protected]>
cpufreq: Improve code around unlisted freq check
-------------
Diffstat:
Makefile | 4 +-
arch/arm64/Makefile | 4 +-
arch/arm64/kernel/cpu_errata.c | 15 +
arch/powerpc/Kconfig | 2 +-
arch/powerpc/include/asm/string.h | 2 -
arch/powerpc/include/asm/uaccess.h | 40 +-
arch/powerpc/lib/Makefile | 2 +-
.../lib/{memcpy_mcsafe_64.S => copy_mc_64.S} | 4 +-
arch/x86/Kconfig | 2 +-
arch/x86/Kconfig.debug | 2 +-
arch/x86/events/amd/ibs.c | 15 +-
arch/x86/include/asm/copy_mc_test.h | 75 +++
arch/x86/include/asm/mce.h | 9 +
arch/x86/include/asm/mcsafe_test.h | 75 ---
arch/x86/include/asm/string_64.h | 32 --
arch/x86/include/asm/uaccess.h | 9 +
arch/x86/include/asm/uaccess_64.h | 20 -
arch/x86/kernel/cpu/mce/core.c | 8 +-
arch/x86/kernel/quirks.c | 10 +-
arch/x86/kernel/traps.c | 2 +-
arch/x86/lib/Makefile | 1 +
arch/x86/lib/copy_mc.c | 96 ++++
arch/x86/lib/copy_mc_64.S | 163 +++++++
arch/x86/lib/memcpy_64.S | 115 -----
arch/x86/lib/usercopy_64.c | 21 -
arch/x86/pci/intel_mid_pci.c | 1 +
arch/x86/xen/enlighten_pv.c | 9 +
drivers/ata/ahci.h | 2 +
drivers/ata/ahci_mvebu.c | 2 +-
drivers/ata/libahci_platform.c | 2 +-
drivers/ata/sata_rcar.c | 2 +-
drivers/base/firmware_loader/fallback_platform.c | 2 +-
drivers/cpufreq/cpufreq.c | 15 +-
drivers/crypto/chelsio/chtls/chtls_cm.c | 29 +-
drivers/crypto/chelsio/chtls/chtls_io.c | 7 +-
drivers/firmware/efi/libstub/arm64-stub.c | 8 +-
drivers/firmware/efi/libstub/fdt.c | 4 +-
drivers/gpu/drm/i915/i915_debugfs.c | 2 +
drivers/infiniband/core/addr.c | 11 +-
drivers/md/dm-writecache.c | 15 +-
drivers/misc/cardreader/rtsx_pcr.c | 4 -
drivers/misc/cxl/pci.c | 4 +-
drivers/net/ethernet/broadcom/bnxt/bnxt.c | 49 +-
drivers/net/ethernet/broadcom/bnxt/bnxt.h | 1 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c | 56 ++-
drivers/net/ethernet/chelsio/cxgb4/t4_tcb.h | 4 +
.../ethernet/hisilicon/hns3/hns3vf/hclgevf_main.c | 2 +-
drivers/net/ethernet/ibm/ibmveth.c | 6 -
drivers/net/ethernet/ibm/ibmvnic.c | 8 +-
drivers/net/ethernet/mellanox/mlxsw/core.c | 2 +
drivers/net/ethernet/mellanox/mlxsw/spectrum.c | 9 +-
drivers/net/ethernet/mellanox/mlxsw/spectrum.h | 1 +
.../net/ethernet/mellanox/mlxsw/spectrum_ethtool.c | 30 ++
drivers/net/ethernet/realtek/r8169_main.c | 4 +-
drivers/net/ethernet/renesas/ravb_main.c | 10 +-
drivers/net/gtp.c | 16 +-
drivers/net/ipa/gsi_trans.c | 21 +-
drivers/net/wireless/intersil/p54/p54pci.c | 4 +-
drivers/nvdimm/claim.c | 2 +-
drivers/nvdimm/pmem.c | 6 +-
drivers/pci/controller/pci-aardvark.c | 4 +-
drivers/phy/marvell/phy-mvebu-a3700-comphy.c | 14 +-
drivers/phy/marvell/phy-mvebu-cp110-comphy.c | 14 +-
drivers/tty/serial/amba-pl011.c | 11 +-
drivers/tty/serial/qcom_geni_serial.c | 2 +-
drivers/xen/gntdev.c | 17 +-
fs/efivarfs/super.c | 3 +
fs/erofs/xattr.c | 2 -
fs/exec.c | 6 +
fs/file.c | 2 +
fs/fuse/dev.c | 28 +-
fs/io-wq.c | 172 +++----
fs/io-wq.h | 1 +
fs/io_uring.c | 502 ++++++++++++++++-----
include/linux/fs.h | 1 -
include/linux/io_uring.h | 53 +++
include/linux/mtd/pfow.h | 2 +-
include/linux/pm.h | 2 +-
include/linux/qcom-geni-se.h | 3 +
include/linux/sched.h | 5 +
include/linux/string.h | 9 +-
include/linux/uaccess.h | 13 +
include/linux/uio.h | 10 +-
include/net/netfilter/nf_tables.h | 6 +
include/uapi/linux/bpf.h | 4 +-
init/init_task.c | 3 +
kernel/fork.c | 6 +
lib/Kconfig | 7 +-
lib/iov_iter.c | 48 +-
mm/filemap.c | 8 +
net/ipv4/tcp.c | 2 +
net/ipv4/tcp_input.c | 3 +-
net/netfilter/nf_tables_api.c | 6 +-
net/netfilter/nf_tables_offload.c | 4 +-
net/sched/act_mpls.c | 1 +
net/sched/cls_api.c | 4 +-
net/sched/sch_netem.c | 9 +-
net/smc/smc_core.c | 6 +-
net/tipc/msg.c | 5 +-
scripts/setlocalversion | 21 +-
security/integrity/evm/evm_main.c | 6 +
tools/arch/x86/include/asm/mcsafe_test.h | 13 -
tools/arch/x86/lib/memcpy_64.S | 115 -----
tools/include/uapi/linux/bpf.h | 4 +-
tools/objtool/check.c | 5 +-
tools/perf/bench/Build | 1 -
tools/perf/bench/mem-memcpy-x86-64-lib.c | 24 -
tools/testing/nvdimm/test/nfit.c | 49 +-
.../testing/selftests/powerpc/copyloops/.gitignore | 2 +-
tools/testing/selftests/powerpc/copyloops/Makefile | 6 +-
.../selftests/powerpc/copyloops/copy_mc_64.S | 242 ++++++++++
111 files changed, 1638 insertions(+), 926 deletions(-)
From: Ard Biesheuvel <[email protected]>
commit d32de9130f6c79533508e2c7879f18997bfbe2a0 upstream.
Currently, on arm64, we abort on any failure from efi_get_random_bytes()
other than EFI_NOT_FOUND when it comes to setting the physical seed for
KASLR, but ignore such failures when obtaining the seed for virtual
KASLR or for early seeding of the kernel's entropy pool via the config
table. This is inconsistent, and may lead to unexpected boot failures.
So let's permit any failure for the physical seed, and simply report
the error code if it does not equal EFI_NOT_FOUND.
Cc: <[email protected]> # v5.8+
Reported-by: Heinrich Schuchardt <[email protected]>
Signed-off-by: Ard Biesheuvel <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
drivers/firmware/efi/libstub/arm64-stub.c | 8 +++++---
drivers/firmware/efi/libstub/fdt.c | 4 +---
2 files changed, 6 insertions(+), 6 deletions(-)
--- a/drivers/firmware/efi/libstub/arm64-stub.c
+++ b/drivers/firmware/efi/libstub/arm64-stub.c
@@ -62,10 +62,12 @@ efi_status_t handle_kernel_image(unsigne
status = efi_get_random_bytes(sizeof(phys_seed),
(u8 *)&phys_seed);
if (status == EFI_NOT_FOUND) {
- efi_info("EFI_RNG_PROTOCOL unavailable, no randomness supplied\n");
+ efi_info("EFI_RNG_PROTOCOL unavailable, KASLR will be disabled\n");
+ efi_nokaslr = true;
} else if (status != EFI_SUCCESS) {
- efi_err("efi_get_random_bytes() failed\n");
- return status;
+ efi_err("efi_get_random_bytes() failed (0x%lx), KASLR will be disabled\n",
+ status);
+ efi_nokaslr = true;
}
} else {
efi_info("KASLR disabled on kernel command line\n");
--- a/drivers/firmware/efi/libstub/fdt.c
+++ b/drivers/firmware/efi/libstub/fdt.c
@@ -136,7 +136,7 @@ static efi_status_t update_fdt(void *ori
if (status)
goto fdt_set_fail;
- if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) {
+ if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && !efi_nokaslr) {
efi_status_t efi_status;
efi_status = efi_get_random_bytes(sizeof(fdt_val64),
@@ -145,8 +145,6 @@ static efi_status_t update_fdt(void *ori
status = fdt_setprop_var(fdt, node, "kaslr-seed", fdt_val64);
if (status)
goto fdt_set_fail;
- } else if (efi_status != EFI_NOT_FOUND) {
- return efi_status;
}
}
From: Jens Axboe <[email protected]>
commit 07d3ca52b0056f25eef61b1c896d089f8d365468 upstream.
We currently cancel these when the ring exits, and we cancel all of
them. This is in preparation for killing only the ones associated
with a given task.
Reviewed-by: Pavel Begunkov <[email protected]>
Signed-off-by: Jens Axboe <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
fs/io_uring.c | 33 ++++++++++++++++++++++++---------
1 file changed, 24 insertions(+), 9 deletions(-)
--- a/fs/io_uring.c
+++ b/fs/io_uring.c
@@ -1226,13 +1226,26 @@ static void io_kill_timeout(struct io_ki
}
}
-static void io_kill_timeouts(struct io_ring_ctx *ctx)
+static bool io_task_match(struct io_kiocb *req, struct task_struct *tsk)
+{
+ struct io_ring_ctx *ctx = req->ctx;
+
+ if (!tsk || req->task == tsk)
+ return true;
+ if ((ctx->flags & IORING_SETUP_SQPOLL) && req->task == ctx->sqo_thread)
+ return true;
+ return false;
+}
+
+static void io_kill_timeouts(struct io_ring_ctx *ctx, struct task_struct *tsk)
{
struct io_kiocb *req, *tmp;
spin_lock_irq(&ctx->completion_lock);
- list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list)
- io_kill_timeout(req);
+ list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
+ if (io_task_match(req, tsk))
+ io_kill_timeout(req);
+ }
spin_unlock_irq(&ctx->completion_lock);
}
@@ -5017,7 +5030,7 @@ static bool io_poll_remove_one(struct io
return do_complete;
}
-static void io_poll_remove_all(struct io_ring_ctx *ctx)
+static void io_poll_remove_all(struct io_ring_ctx *ctx, struct task_struct *tsk)
{
struct hlist_node *tmp;
struct io_kiocb *req;
@@ -5028,8 +5041,10 @@ static void io_poll_remove_all(struct io
struct hlist_head *list;
list = &ctx->cancel_hash[i];
- hlist_for_each_entry_safe(req, tmp, list, hash_node)
- posted += io_poll_remove_one(req);
+ hlist_for_each_entry_safe(req, tmp, list, hash_node) {
+ if (io_task_match(req, tsk))
+ posted += io_poll_remove_one(req);
+ }
}
spin_unlock_irq(&ctx->completion_lock);
@@ -7989,8 +8004,8 @@ static void io_ring_ctx_wait_and_kill(st
percpu_ref_kill(&ctx->refs);
mutex_unlock(&ctx->uring_lock);
- io_kill_timeouts(ctx);
- io_poll_remove_all(ctx);
+ io_kill_timeouts(ctx, NULL);
+ io_poll_remove_all(ctx, NULL);
if (ctx->io_wq)
io_wq_cancel_all(ctx->io_wq);
@@ -8221,7 +8236,7 @@ static bool io_cancel_task_cb(struct io_
struct io_kiocb *req = container_of(work, struct io_kiocb, work);
struct task_struct *task = data;
- return req->task == task;
+ return io_task_match(req, task);
}
static int io_uring_flush(struct file *file, void *data)
From: "Matthew Wilcox (Oracle)" <[email protected]>
commit 236434c3438c4da3dfbd6aeeab807577b85e951a upstream.
The xas_store() wasn't paired with an xas_nomem() loop, so if it couldn't
allocate memory using GFP_NOWAIT, it would leak the reference to the file
descriptor. Also the node pointed to by the xas could be freed between
the call to xas_load() under the rcu_read_lock() and the acquisition of
the xa_lock.
It's easier to just use the normal xa_load/xa_store interface here.
Signed-off-by: Matthew Wilcox (Oracle) <[email protected]>
[axboe: fix missing assign after alloc, cur_uring -> tctx rename]
Signed-off-by: Jens Axboe <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
fs/io_uring.c | 21 +++++++++------------
1 file changed, 9 insertions(+), 12 deletions(-)
--- a/fs/io_uring.c
+++ b/fs/io_uring.c
@@ -8336,27 +8336,24 @@ static void io_uring_cancel_task_request
*/
static int io_uring_add_task_file(struct file *file)
{
- if (unlikely(!current->io_uring)) {
+ struct io_uring_task *tctx = current->io_uring;
+
+ if (unlikely(!tctx)) {
int ret;
ret = io_uring_alloc_task_context(current);
if (unlikely(ret))
return ret;
+ tctx = current->io_uring;
}
- if (current->io_uring->last != file) {
- XA_STATE(xas, ¤t->io_uring->xa, (unsigned long) file);
- void *old;
+ if (tctx->last != file) {
+ void *old = xa_load(&tctx->xa, (unsigned long)file);
- rcu_read_lock();
- old = xas_load(&xas);
- if (old != file) {
+ if (!old) {
get_file(file);
- xas_lock(&xas);
- xas_store(&xas, file);
- xas_unlock(&xas);
+ xa_store(&tctx->xa, (unsigned long)file, file, GFP_KERNEL);
}
- rcu_read_unlock();
- current->io_uring->last = file;
+ tctx->last = file;
}
return 0;
On Sat, 2020-10-31 at 12:35 +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.9.3 release.
> There are 74 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied,
> please
> let me know.
>
> Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
>
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-
> stable-rc.git linux-5.9.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
hello,
i have build using ktest. but then i did the normal compile.
compiled and booted 5.9.3-rc1+ . dmesg -l err is clear.
some lines from dmesg output related
----------x------------------x---------------------------x---
video: module verification failed: signature and/or required key
missing - tainting kernel
sdhci-pci 0000:00:1e.6: failed to setup card detect gpio
--------x-------------------------------x-----------------x---
Now something related to kernel build and install..
----------x---------------------x--------------------------x-------
WARNING: modpost: EXPORT symbol "copy_mc_fragile" [vmlinux] version
generation failed, symbol will not be versioned.
W: Possible missing firmware /lib/firmware/i915/rkl_dmc_ver2_01.bin for
module i915
-------------x-------------------x-------------------------x---------
Now one thing during boot..
-----------x------------x----
unable to start nftables
-x-----------------------x---
iam attaching a file....please see...
Tested-by: Jeffrin Jose T <[email protected]>
--
software engineer
rajagiri school of engineering and technology - autonomous
On Sat, Oct 31, 2020 at 12:35:42PM +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.9.3 release.
> There are 74 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> Anything received after that time might be too late.
>
Build results:
total: 154 pass: 154 fail: 0
Qemu test results:
total: 426 pass: 426 fail: 0
Tested-by: Guenter Roeck <[email protected]>
Guenter
On Sat, 31 Oct 2020 at 17:17, Greg Kroah-Hartman
<[email protected]> wrote:
>
> This is the start of the stable review cycle for the 5.9.3 release.
> There are 74 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.9.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
>
Results from Linaro’s test farm.
No regressions on arm64, arm, x86_64, and i386.
Tested-by: Linux Kernel Functional Testing <[email protected]>
NOTE:
LTP version upgrade to 20200930. Due to this change we have noticed few test
failures and fixes which are not related to kernel changes.
Summary
------------------------------------------------------------------------
kernel: 5.9.3-rc1
git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
git branch: linux-5.9.y
git commit: dae2c902d0480f9e51891768862f034ee97f4db1
git describe: v5.9.2-75-gdae2c902d048
Test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.9.y/build/v5.9.2-75-gdae2c902d048
No regressions (compared to build v5.9.2)
No fixes (compared to build v5.9.2)
Fixes (compared to LTP 20200515)
These fixes are coming from LTP upgrade 20200930.
ltp-commands-tests:
* logrotate_sh
ltp-containers-tests:
* netns_netlink
ltp-controllers-tests:
* cpuset_hotplug
ltp-crypto-tests:
* af_alg02
ltp-cve-tests:
* cve-2017-17805
* cve-2018-1000199
ltp-syscalls-tests:
* clock_gettime03
* clone302
* copy_file_range02
* mknod07
* ptrace08
* syslog01
* syslog02
* syslog03
* syslog04
* syslog05
* syslog07
* syslog08
* syslog09
* syslog10
ltp-open-posix-tests:
* clocks_invaliddates
--
Linaro LKFT
https://lkft.linaro.org
On Sat, Oct 31, 2020 at 10:41:38PM +0530, Jeffrin Jose T wrote:
> On Sat, 2020-10-31 at 12:35 +0100, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 5.9.3 release.
> > There are 74 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied,
> > please
> > let me know.
> >
> > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > Anything received after that time might be too late.
> >
> > The whole patch series can be found in one patch at:
> >
> > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> > or in the git tree and branch at:
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-
> > stable-rc.git linux-5.9.y
> > and the diffstat can be found below.
> >
> > thanks,
> >
> > greg k-h
>
> hello,
> i have build using ktest. but then i did the normal compile.
> compiled and booted 5.9.3-rc1+ . dmesg -l err is clear.
>
> some lines from dmesg output related
> ----------x------------------x---------------------------x---
> video: module verification failed: signature and/or required key
> missing - tainting kernel
> sdhci-pci 0000:00:1e.6: failed to setup card detect gpio
> --------x-------------------------------x-----------------x---
>
>
> Now something related to kernel build and install..
> ----------x---------------------x--------------------------x-------
> WARNING: modpost: EXPORT symbol "copy_mc_fragile" [vmlinux] version
> generation failed, symbol will not be versioned.
> W: Possible missing firmware /lib/firmware/i915/rkl_dmc_ver2_01.bin for
> module i915
> -------------x-------------------x-------------------------x---------
>
> Now one thing during boot..
> -----------x------------x----
> unable to start nftables
> -x-----------------------x---
>
> iam attaching a file....please see...
Is this any different from 5.9.2?
thanks,
greg k-h
On Sat, Oct 31, 2020 at 01:09:15PM -0700, Guenter Roeck wrote:
> On Sat, Oct 31, 2020 at 12:35:42PM +0100, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 5.9.3 release.
> > There are 74 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > Anything received after that time might be too late.
> >
>
> Build results:
> total: 154 pass: 154 fail: 0
> Qemu test results:
> total: 426 pass: 426 fail: 0
>
> Tested-by: Guenter Roeck <[email protected]>
Thanks for testing these and letting me know.
greg k-h
On Sun, Nov 01, 2020 at 12:34:42PM +0530, Naresh Kamboju wrote:
> On Sat, 31 Oct 2020 at 17:17, Greg Kroah-Hartman
> <[email protected]> wrote:
> >
> > This is the start of the stable review cycle for the 5.9.3 release.
> > There are 74 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > Anything received after that time might be too late.
> >
> > The whole patch series can be found in one patch at:
> > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> > or in the git tree and branch at:
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.9.y
> > and the diffstat can be found below.
> >
> > thanks,
> >
> > greg k-h
> >
>
> Results from Linaro’s test farm.
> No regressions on arm64, arm, x86_64, and i386.
>
> Tested-by: Linux Kernel Functional Testing <[email protected]>
Thanks for testing all of these and letting me konw.
greg k-h
On Sun, 2020-11-01 at 11:41 +0100, Greg Kroah-Hartman wrote:
> On Sat, Oct 31, 2020 at 10:41:38PM +0530, Jeffrin Jose T wrote:
> > On Sat, 2020-10-31 at 12:35 +0100, Greg Kroah-Hartman wrote:
> > > This is the start of the stable review cycle for the 5.9.3
> > > release.
> > > There are 74 patches in this series, all will be posted as a
> > > response
> > > to this one. If anyone has any issues with these being applied,
> > > please
> > > let me know.
> > >
> > > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > > Anything received after that time might be too late.
> > >
> > > The whole patch series can be found in one patch at:
> > >
> > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> > > or in the git tree and branch at:
> > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-
> > > stable-rc.git linux-5.9.y
> > > and the diffstat can be found below.
> > >
> > > thanks,
> > >
> > > greg k-h
> >
> > hello,
> > i have build using ktest. but then i did the normal compile.
> > compiled and booted 5.9.3-rc1+ . dmesg -l err is clear.
> >
> > some lines from dmesg output related
> > ----------x------------------x---------------------------x---
> > video: module verification failed: signature and/or required key
> > missing - tainting kernel
> > sdhci-pci 0000:00:1e.6: failed to setup card detect gpio
> > --------x-------------------------------x-----------------x---
> >
> >
> > Now something related to kernel build and install..
> > ----------x---------------------x--------------------------x-------
> > WARNING: modpost: EXPORT symbol "copy_mc_fragile" [vmlinux] version
> > generation failed, symbol will not be versioned.
> > W: Possible missing firmware /lib/firmware/i915/rkl_dmc_ver2_01.bin
> > for
> > module i915
> > -------------x-------------------x-------------------------x-------
> > --
> >
> > Now one thing during boot..
> > -----------x------------x----
> > unable to start nftables
> > -x-----------------------x---
> >
> > iam attaching a file....please see...
>
> Is this any different from 5.9.2?
according to dmesg,things are to an extent ok.
the other stuff may be because of my system upgradation
and may be there is a change in kernel configuration
Overall i think there may be nothing serious in kernel space.
.
--
software engineer
rajagiri school of engineering and technology - autonomous