2020-10-31 11:52:38

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.9 00/74] 5.9.3-rc1 review

This is the start of the stable review cycle for the 5.9.3 release.
There are 74 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.

Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.9.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <[email protected]>
Linux 5.9.3-rc1

Pali Rohár <[email protected]>
phy: marvell: comphy: Convert internal SMCC firmware return codes to errno

Ricky Wu <[email protected]>
misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp()

Pavel Begunkov <[email protected]>
io_uring: don't reuse linked_timeout

Souptick Joarder <[email protected]>
xen/gntdev.c: Mark pages as dirty

Jens Axboe <[email protected]>
mm: mark async iocb read as NOWAIT once some data has been copied

Geert Uytterhoeven <[email protected]>
ata: sata_rcar: Fix DMA boundary mask

Grygorii Strashko <[email protected]>
PM: runtime: Fix timer_expires data type on 32-bit arches

Peter Zijlstra <[email protected]>
serial: pl011: Fix lockdep splat when handling magic-sysrq interrupt

Paras Sharma <[email protected]>
serial: qcom_geni_serial: To correct QUP Version detection logic

Chris Wilson <[email protected]>
drm/i915/gem: Serialise debugfs i915_gem_objects with ctx->mutex

Gustavo A. R. Silva <[email protected]>
mtd: lpddr: Fix bad logic in print_drs_error

Jason Gunthorpe <[email protected]>
RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel()

Frederic Barrat <[email protected]>
cxl: Rework error message for incompatible slots

Jia-Ju Bai <[email protected]>
p54: avoid accessing the data mapped to streaming DMA

Roberto Sassu <[email protected]>
evm: Check size of security.evm before using it

Song Liu <[email protected]>
bpf: Fix comment for helper bpf_current_task_under_cgroup()

Miklos Szeredi <[email protected]>
fuse: fix page dereference after free

Pali Rohár <[email protected]>
ata: ahci: mvebu: Make SATA PHY optional for Armada 3720

Pali Rohár <[email protected]>
PCI: aardvark: Fix initialization with old Marvell's Arm Trusted Firmware

Juergen Gross <[email protected]>
x86/xen: disable Firmware First mode for correctable memory errors

Thomas Gleixner <[email protected]>
x86/traps: Fix #DE Oops message regression

Kim Phillips <[email protected]>
arch/x86/amd/ibs: Fix re-arming IBS Fetch

Gao Xiang <[email protected]>
erofs: avoid duplicated permission check for "trusted." xattrs

Leon Romanovsky <[email protected]>
net: protect tcf_block_unbind with block lock

Karsten Graul <[email protected]>
net/smc: fix suppressed return code

Karsten Graul <[email protected]>
net/smc: fix invalid return code in smcd_new_buf_create()

Tung Nguyen <[email protected]>
tipc: fix memory leak caused by tipc_buf_append()

Arjun Roy <[email protected]>
tcp: Prevent low rmem stalls with SO_RCVLOWAT.

Andrew Gabbasov <[email protected]>
ravb: Fix bit fields checking in ravb_hwtstamp_get()

Heiner Kallweit <[email protected]>
r8169: fix issue with forced threading in combination with shared interrupts

Guillaume Nault <[email protected]>
net/sched: act_mpls: Add softdep on mpls_gso.ko

Alex Elder <[email protected]>
net: ipa: command payloads already mapped

Zenghui Yu <[email protected]>
net: hns3: Clear the CMDQ registers before unmapping BAR region

Aleksandr Nogikh <[email protected]>
netem: fix zero division in tabledist

Amit Cohen <[email protected]>
mlxsw: Only advertise link modes supported by both driver and device

Ido Schimmel <[email protected]>
mlxsw: core: Fix memory leak on module removal

Lijun Pan <[email protected]>
ibmvnic: fix ibmvnic_set_mac

Thomas Bogendoerfer <[email protected]>
ibmveth: Fix use of ibmveth in a bridge.

Masahiro Fujiwara <[email protected]>
gtp: fix an use-before-init in gtp_newlink()

Raju Rangoju <[email protected]>
cxgb4: set up filter action after rewrites

Vinay Kumar Yadav <[email protected]>
chelsio/chtls: fix tls record info to user

Vinay Kumar Yadav <[email protected]>
chelsio/chtls: fix memory leaks in CPL handlers

Vinay Kumar Yadav <[email protected]>
chelsio/chtls: fix deadlock issue

Vasundhara Volam <[email protected]>
bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally.

Vasundhara Volam <[email protected]>
bnxt_en: Re-write PCI BARs after PCI fatal error.

Vasundhara Volam <[email protected]>
bnxt_en: Invoke cancel_delayed_work_sync() for PFs also.

Vasundhara Volam <[email protected]>
bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one().

Michael Chan <[email protected]>
bnxt_en: Check abort error state in bnxt_open_nic().

Michael Schaller <[email protected]>
efivarfs: Replace invalid slashes with exclamation marks in dentries.

Dan Williams <[email protected]>
x86/copy_mc: Introduce copy_mc_enhanced_fast_string()

Dan Williams <[email protected]>
x86, powerpc: Rename memcpy_mcsafe() to copy_mc_to_{user, kernel}()

Randy Dunlap <[email protected]>
x86/PCI: Fix intel_mid_pci.c build error when ACPI is not enabled

Nick Desaulniers <[email protected]>
arm64: link with -z norelro regardless of CONFIG_RELOCATABLE

Marc Zyngier <[email protected]>
arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs

Marc Zyngier <[email protected]>
arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs

Kees Cook <[email protected]>
fs/kernel_read_file: Remove FIRMWARE_EFI_EMBEDDED enum

Ard Biesheuvel <[email protected]>
efi/arm64: libstub: Deal gracefully with EFI_RNG_PROTOCOL failure

Rasmus Villemoes <[email protected]>
scripts/setlocalversion: make git describe output more reliable

Matthew Wilcox (Oracle) <[email protected]>
io_uring: Convert advanced XArray uses to the normal API

Matthew Wilcox (Oracle) <[email protected]>
io_uring: Fix XArray usage in io_uring_add_task_file

Matthew Wilcox (Oracle) <[email protected]>
io_uring: Fix use of XArray in __io_uring_files_cancel

Jens Axboe <[email protected]>
io_uring: no need to call xa_destroy() on empty xarray

Hillf Danton <[email protected]>
io-wq: fix use-after-free in io_wq_worker_running

Sebastian Andrzej Siewior <[email protected]>
io_wq: Make io_wqe::lock a raw_spinlock_t

Jens Axboe <[email protected]>
io_uring: reference ->nsproxy for file table commands

Jens Axboe <[email protected]>
io_uring: don't rely on weak ->files references

Jens Axboe <[email protected]>
io_uring: enable task/files specific overflow flushing

Jens Axboe <[email protected]>
io_uring: return cancelation status from poll/timeout/files handlers

Jens Axboe <[email protected]>
io_uring: unconditionally grab req->task

Jens Axboe <[email protected]>
io_uring: stash ctx task reference for SQPOLL

Jens Axboe <[email protected]>
io_uring: move dropping of files into separate helper

Jens Axboe <[email protected]>
io_uring: allow timeout/poll/files killing to take task into account

Saeed Mirzamohammadi <[email protected]>
netfilter: nftables_offload: KASAN slab-out-of-bounds Read in nft_flow_rule_create

Viresh Kumar <[email protected]>
cpufreq: Improve code around unlisted freq check


-------------

Diffstat:

Makefile | 4 +-
arch/arm64/Makefile | 4 +-
arch/arm64/kernel/cpu_errata.c | 15 +
arch/powerpc/Kconfig | 2 +-
arch/powerpc/include/asm/string.h | 2 -
arch/powerpc/include/asm/uaccess.h | 40 +-
arch/powerpc/lib/Makefile | 2 +-
.../lib/{memcpy_mcsafe_64.S => copy_mc_64.S} | 4 +-
arch/x86/Kconfig | 2 +-
arch/x86/Kconfig.debug | 2 +-
arch/x86/events/amd/ibs.c | 15 +-
arch/x86/include/asm/copy_mc_test.h | 75 +++
arch/x86/include/asm/mce.h | 9 +
arch/x86/include/asm/mcsafe_test.h | 75 ---
arch/x86/include/asm/string_64.h | 32 --
arch/x86/include/asm/uaccess.h | 9 +
arch/x86/include/asm/uaccess_64.h | 20 -
arch/x86/kernel/cpu/mce/core.c | 8 +-
arch/x86/kernel/quirks.c | 10 +-
arch/x86/kernel/traps.c | 2 +-
arch/x86/lib/Makefile | 1 +
arch/x86/lib/copy_mc.c | 96 ++++
arch/x86/lib/copy_mc_64.S | 163 +++++++
arch/x86/lib/memcpy_64.S | 115 -----
arch/x86/lib/usercopy_64.c | 21 -
arch/x86/pci/intel_mid_pci.c | 1 +
arch/x86/xen/enlighten_pv.c | 9 +
drivers/ata/ahci.h | 2 +
drivers/ata/ahci_mvebu.c | 2 +-
drivers/ata/libahci_platform.c | 2 +-
drivers/ata/sata_rcar.c | 2 +-
drivers/base/firmware_loader/fallback_platform.c | 2 +-
drivers/cpufreq/cpufreq.c | 15 +-
drivers/crypto/chelsio/chtls/chtls_cm.c | 29 +-
drivers/crypto/chelsio/chtls/chtls_io.c | 7 +-
drivers/firmware/efi/libstub/arm64-stub.c | 8 +-
drivers/firmware/efi/libstub/fdt.c | 4 +-
drivers/gpu/drm/i915/i915_debugfs.c | 2 +
drivers/infiniband/core/addr.c | 11 +-
drivers/md/dm-writecache.c | 15 +-
drivers/misc/cardreader/rtsx_pcr.c | 4 -
drivers/misc/cxl/pci.c | 4 +-
drivers/net/ethernet/broadcom/bnxt/bnxt.c | 49 +-
drivers/net/ethernet/broadcom/bnxt/bnxt.h | 1 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c | 56 ++-
drivers/net/ethernet/chelsio/cxgb4/t4_tcb.h | 4 +
.../ethernet/hisilicon/hns3/hns3vf/hclgevf_main.c | 2 +-
drivers/net/ethernet/ibm/ibmveth.c | 6 -
drivers/net/ethernet/ibm/ibmvnic.c | 8 +-
drivers/net/ethernet/mellanox/mlxsw/core.c | 2 +
drivers/net/ethernet/mellanox/mlxsw/spectrum.c | 9 +-
drivers/net/ethernet/mellanox/mlxsw/spectrum.h | 1 +
.../net/ethernet/mellanox/mlxsw/spectrum_ethtool.c | 30 ++
drivers/net/ethernet/realtek/r8169_main.c | 4 +-
drivers/net/ethernet/renesas/ravb_main.c | 10 +-
drivers/net/gtp.c | 16 +-
drivers/net/ipa/gsi_trans.c | 21 +-
drivers/net/wireless/intersil/p54/p54pci.c | 4 +-
drivers/nvdimm/claim.c | 2 +-
drivers/nvdimm/pmem.c | 6 +-
drivers/pci/controller/pci-aardvark.c | 4 +-
drivers/phy/marvell/phy-mvebu-a3700-comphy.c | 14 +-
drivers/phy/marvell/phy-mvebu-cp110-comphy.c | 14 +-
drivers/tty/serial/amba-pl011.c | 11 +-
drivers/tty/serial/qcom_geni_serial.c | 2 +-
drivers/xen/gntdev.c | 17 +-
fs/efivarfs/super.c | 3 +
fs/erofs/xattr.c | 2 -
fs/exec.c | 6 +
fs/file.c | 2 +
fs/fuse/dev.c | 28 +-
fs/io-wq.c | 172 +++----
fs/io-wq.h | 1 +
fs/io_uring.c | 502 ++++++++++++++++-----
include/linux/fs.h | 1 -
include/linux/io_uring.h | 53 +++
include/linux/mtd/pfow.h | 2 +-
include/linux/pm.h | 2 +-
include/linux/qcom-geni-se.h | 3 +
include/linux/sched.h | 5 +
include/linux/string.h | 9 +-
include/linux/uaccess.h | 13 +
include/linux/uio.h | 10 +-
include/net/netfilter/nf_tables.h | 6 +
include/uapi/linux/bpf.h | 4 +-
init/init_task.c | 3 +
kernel/fork.c | 6 +
lib/Kconfig | 7 +-
lib/iov_iter.c | 48 +-
mm/filemap.c | 8 +
net/ipv4/tcp.c | 2 +
net/ipv4/tcp_input.c | 3 +-
net/netfilter/nf_tables_api.c | 6 +-
net/netfilter/nf_tables_offload.c | 4 +-
net/sched/act_mpls.c | 1 +
net/sched/cls_api.c | 4 +-
net/sched/sch_netem.c | 9 +-
net/smc/smc_core.c | 6 +-
net/tipc/msg.c | 5 +-
scripts/setlocalversion | 21 +-
security/integrity/evm/evm_main.c | 6 +
tools/arch/x86/include/asm/mcsafe_test.h | 13 -
tools/arch/x86/lib/memcpy_64.S | 115 -----
tools/include/uapi/linux/bpf.h | 4 +-
tools/objtool/check.c | 5 +-
tools/perf/bench/Build | 1 -
tools/perf/bench/mem-memcpy-x86-64-lib.c | 24 -
tools/testing/nvdimm/test/nfit.c | 49 +-
.../testing/selftests/powerpc/copyloops/.gitignore | 2 +-
tools/testing/selftests/powerpc/copyloops/Makefile | 6 +-
.../selftests/powerpc/copyloops/copy_mc_64.S | 242 ++++++++++
111 files changed, 1638 insertions(+), 926 deletions(-)



2020-10-31 11:52:44

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.9 18/74] efi/arm64: libstub: Deal gracefully with EFI_RNG_PROTOCOL failure

From: Ard Biesheuvel <[email protected]>

commit d32de9130f6c79533508e2c7879f18997bfbe2a0 upstream.

Currently, on arm64, we abort on any failure from efi_get_random_bytes()
other than EFI_NOT_FOUND when it comes to setting the physical seed for
KASLR, but ignore such failures when obtaining the seed for virtual
KASLR or for early seeding of the kernel's entropy pool via the config
table. This is inconsistent, and may lead to unexpected boot failures.

So let's permit any failure for the physical seed, and simply report
the error code if it does not equal EFI_NOT_FOUND.

Cc: <[email protected]> # v5.8+
Reported-by: Heinrich Schuchardt <[email protected]>
Signed-off-by: Ard Biesheuvel <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
drivers/firmware/efi/libstub/arm64-stub.c | 8 +++++---
drivers/firmware/efi/libstub/fdt.c | 4 +---
2 files changed, 6 insertions(+), 6 deletions(-)

--- a/drivers/firmware/efi/libstub/arm64-stub.c
+++ b/drivers/firmware/efi/libstub/arm64-stub.c
@@ -62,10 +62,12 @@ efi_status_t handle_kernel_image(unsigne
status = efi_get_random_bytes(sizeof(phys_seed),
(u8 *)&phys_seed);
if (status == EFI_NOT_FOUND) {
- efi_info("EFI_RNG_PROTOCOL unavailable, no randomness supplied\n");
+ efi_info("EFI_RNG_PROTOCOL unavailable, KASLR will be disabled\n");
+ efi_nokaslr = true;
} else if (status != EFI_SUCCESS) {
- efi_err("efi_get_random_bytes() failed\n");
- return status;
+ efi_err("efi_get_random_bytes() failed (0x%lx), KASLR will be disabled\n",
+ status);
+ efi_nokaslr = true;
}
} else {
efi_info("KASLR disabled on kernel command line\n");
--- a/drivers/firmware/efi/libstub/fdt.c
+++ b/drivers/firmware/efi/libstub/fdt.c
@@ -136,7 +136,7 @@ static efi_status_t update_fdt(void *ori
if (status)
goto fdt_set_fail;

- if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) {
+ if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && !efi_nokaslr) {
efi_status_t efi_status;

efi_status = efi_get_random_bytes(sizeof(fdt_val64),
@@ -145,8 +145,6 @@ static efi_status_t update_fdt(void *ori
status = fdt_setprop_var(fdt, node, "kaslr-seed", fdt_val64);
if (status)
goto fdt_set_fail;
- } else if (efi_status != EFI_NOT_FOUND) {
- return efi_status;
}
}



2020-10-31 11:52:45

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.9 03/74] io_uring: allow timeout/poll/files killing to take task into account

From: Jens Axboe <[email protected]>

commit 07d3ca52b0056f25eef61b1c896d089f8d365468 upstream.

We currently cancel these when the ring exits, and we cancel all of
them. This is in preparation for killing only the ones associated
with a given task.

Reviewed-by: Pavel Begunkov <[email protected]>
Signed-off-by: Jens Axboe <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
fs/io_uring.c | 33 ++++++++++++++++++++++++---------
1 file changed, 24 insertions(+), 9 deletions(-)

--- a/fs/io_uring.c
+++ b/fs/io_uring.c
@@ -1226,13 +1226,26 @@ static void io_kill_timeout(struct io_ki
}
}

-static void io_kill_timeouts(struct io_ring_ctx *ctx)
+static bool io_task_match(struct io_kiocb *req, struct task_struct *tsk)
+{
+ struct io_ring_ctx *ctx = req->ctx;
+
+ if (!tsk || req->task == tsk)
+ return true;
+ if ((ctx->flags & IORING_SETUP_SQPOLL) && req->task == ctx->sqo_thread)
+ return true;
+ return false;
+}
+
+static void io_kill_timeouts(struct io_ring_ctx *ctx, struct task_struct *tsk)
{
struct io_kiocb *req, *tmp;

spin_lock_irq(&ctx->completion_lock);
- list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list)
- io_kill_timeout(req);
+ list_for_each_entry_safe(req, tmp, &ctx->timeout_list, timeout.list) {
+ if (io_task_match(req, tsk))
+ io_kill_timeout(req);
+ }
spin_unlock_irq(&ctx->completion_lock);
}

@@ -5017,7 +5030,7 @@ static bool io_poll_remove_one(struct io
return do_complete;
}

-static void io_poll_remove_all(struct io_ring_ctx *ctx)
+static void io_poll_remove_all(struct io_ring_ctx *ctx, struct task_struct *tsk)
{
struct hlist_node *tmp;
struct io_kiocb *req;
@@ -5028,8 +5041,10 @@ static void io_poll_remove_all(struct io
struct hlist_head *list;

list = &ctx->cancel_hash[i];
- hlist_for_each_entry_safe(req, tmp, list, hash_node)
- posted += io_poll_remove_one(req);
+ hlist_for_each_entry_safe(req, tmp, list, hash_node) {
+ if (io_task_match(req, tsk))
+ posted += io_poll_remove_one(req);
+ }
}
spin_unlock_irq(&ctx->completion_lock);

@@ -7989,8 +8004,8 @@ static void io_ring_ctx_wait_and_kill(st
percpu_ref_kill(&ctx->refs);
mutex_unlock(&ctx->uring_lock);

- io_kill_timeouts(ctx);
- io_poll_remove_all(ctx);
+ io_kill_timeouts(ctx, NULL);
+ io_poll_remove_all(ctx, NULL);

if (ctx->io_wq)
io_wq_cancel_all(ctx->io_wq);
@@ -8221,7 +8236,7 @@ static bool io_cancel_task_cb(struct io_
struct io_kiocb *req = container_of(work, struct io_kiocb, work);
struct task_struct *task = data;

- return req->task == task;
+ return io_task_match(req, task);
}

static int io_uring_flush(struct file *file, void *data)


2020-10-31 11:52:53

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.9 15/74] io_uring: Fix XArray usage in io_uring_add_task_file

From: "Matthew Wilcox (Oracle)" <[email protected]>

commit 236434c3438c4da3dfbd6aeeab807577b85e951a upstream.

The xas_store() wasn't paired with an xas_nomem() loop, so if it couldn't
allocate memory using GFP_NOWAIT, it would leak the reference to the file
descriptor. Also the node pointed to by the xas could be freed between
the call to xas_load() under the rcu_read_lock() and the acquisition of
the xa_lock.

It's easier to just use the normal xa_load/xa_store interface here.

Signed-off-by: Matthew Wilcox (Oracle) <[email protected]>
[axboe: fix missing assign after alloc, cur_uring -> tctx rename]
Signed-off-by: Jens Axboe <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
fs/io_uring.c | 21 +++++++++------------
1 file changed, 9 insertions(+), 12 deletions(-)

--- a/fs/io_uring.c
+++ b/fs/io_uring.c
@@ -8336,27 +8336,24 @@ static void io_uring_cancel_task_request
*/
static int io_uring_add_task_file(struct file *file)
{
- if (unlikely(!current->io_uring)) {
+ struct io_uring_task *tctx = current->io_uring;
+
+ if (unlikely(!tctx)) {
int ret;

ret = io_uring_alloc_task_context(current);
if (unlikely(ret))
return ret;
+ tctx = current->io_uring;
}
- if (current->io_uring->last != file) {
- XA_STATE(xas, &current->io_uring->xa, (unsigned long) file);
- void *old;
+ if (tctx->last != file) {
+ void *old = xa_load(&tctx->xa, (unsigned long)file);

- rcu_read_lock();
- old = xas_load(&xas);
- if (old != file) {
+ if (!old) {
get_file(file);
- xas_lock(&xas);
- xas_store(&xas, file);
- xas_unlock(&xas);
+ xa_store(&tctx->xa, (unsigned long)file, file, GFP_KERNEL);
}
- rcu_read_unlock();
- current->io_uring->last = file;
+ tctx->last = file;
}

return 0;


2020-10-31 17:13:51

by Jeffrin Thalakkottoor

[permalink] [raw]
Subject: Re: [PATCH 5.9 00/74] 5.9.3-rc1 review

On Sat, 2020-10-31 at 12:35 +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.9.3 release.
> There are 74 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied,
> please
> let me know.
>
> Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
>
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-
> stable-rc.git linux-5.9.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h

hello,
i have build using ktest. but then i did the normal compile.
compiled and booted 5.9.3-rc1+ . dmesg -l err is clear.

some lines from dmesg output related
----------x------------------x---------------------------x---
video: module verification failed: signature and/or required key
missing - tainting kernel
sdhci-pci 0000:00:1e.6: failed to setup card detect gpio
--------x-------------------------------x-----------------x---


Now something related to kernel build and install..
----------x---------------------x--------------------------x-------
WARNING: modpost: EXPORT symbol "copy_mc_fragile" [vmlinux] version
generation failed, symbol will not be versioned.
W: Possible missing firmware /lib/firmware/i915/rkl_dmc_ver2_01.bin for
module i915
-------------x-------------------x-------------------------x---------

Now one thing during boot..
-----------x------------x----
unable to start nftables
-x-----------------------x---

iam attaching a file....please see...

Tested-by: Jeffrin Jose T <[email protected]>


--
software engineer
rajagiri school of engineering and technology - autonomous




Attachments:
kcompile-warning-oct31-2020.txt (189.00 B)

2020-10-31 20:11:17

by Guenter Roeck

[permalink] [raw]
Subject: Re: [PATCH 5.9 00/74] 5.9.3-rc1 review

On Sat, Oct 31, 2020 at 12:35:42PM +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.9.3 release.
> There are 74 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> Anything received after that time might be too late.
>

Build results:
total: 154 pass: 154 fail: 0
Qemu test results:
total: 426 pass: 426 fail: 0

Tested-by: Guenter Roeck <[email protected]>

Guenter

2020-11-01 07:10:39

by Naresh Kamboju

[permalink] [raw]
Subject: Re: [PATCH 5.9 00/74] 5.9.3-rc1 review

On Sat, 31 Oct 2020 at 17:17, Greg Kroah-Hartman
<[email protected]> wrote:
>
> This is the start of the stable review cycle for the 5.9.3 release.
> There are 74 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.9.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
>

Results from Linaro’s test farm.
No regressions on arm64, arm, x86_64, and i386.

Tested-by: Linux Kernel Functional Testing <[email protected]>

NOTE:
LTP version upgrade to 20200930. Due to this change we have noticed few test
failures and fixes which are not related to kernel changes.

Summary
------------------------------------------------------------------------

kernel: 5.9.3-rc1
git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
git branch: linux-5.9.y
git commit: dae2c902d0480f9e51891768862f034ee97f4db1
git describe: v5.9.2-75-gdae2c902d048
Test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.9.y/build/v5.9.2-75-gdae2c902d048

No regressions (compared to build v5.9.2)

No fixes (compared to build v5.9.2)

Fixes (compared to LTP 20200515)
These fixes are coming from LTP upgrade 20200930.
ltp-commands-tests:
* logrotate_sh

ltp-containers-tests:
* netns_netlink

ltp-controllers-tests:
* cpuset_hotplug

ltp-crypto-tests:
* af_alg02

ltp-cve-tests:
* cve-2017-17805
* cve-2018-1000199

ltp-syscalls-tests:
* clock_gettime03
* clone302
* copy_file_range02
* mknod07
* ptrace08
* syslog01
* syslog02
* syslog03
* syslog04
* syslog05
* syslog07
* syslog08
* syslog09
* syslog10

ltp-open-posix-tests:
* clocks_invaliddates

--
Linaro LKFT
https://lkft.linaro.org

2020-11-01 10:42:31

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: [PATCH 5.9 00/74] 5.9.3-rc1 review

On Sat, Oct 31, 2020 at 10:41:38PM +0530, Jeffrin Jose T wrote:
> On Sat, 2020-10-31 at 12:35 +0100, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 5.9.3 release.
> > There are 74 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied,
> > please
> > let me know.
> >
> > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > Anything received after that time might be too late.
> >
> > The whole patch series can be found in one patch at:
> >
> > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> > or in the git tree and branch at:
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-
> > stable-rc.git linux-5.9.y
> > and the diffstat can be found below.
> >
> > thanks,
> >
> > greg k-h
>
> hello,
> i have build using ktest. but then i did the normal compile.
> compiled and booted 5.9.3-rc1+ . dmesg -l err is clear.
>
> some lines from dmesg output related
> ----------x------------------x---------------------------x---
> video: module verification failed: signature and/or required key
> missing - tainting kernel
> sdhci-pci 0000:00:1e.6: failed to setup card detect gpio
> --------x-------------------------------x-----------------x---
>
>
> Now something related to kernel build and install..
> ----------x---------------------x--------------------------x-------
> WARNING: modpost: EXPORT symbol "copy_mc_fragile" [vmlinux] version
> generation failed, symbol will not be versioned.
> W: Possible missing firmware /lib/firmware/i915/rkl_dmc_ver2_01.bin for
> module i915
> -------------x-------------------x-------------------------x---------
>
> Now one thing during boot..
> -----------x------------x----
> unable to start nftables
> -x-----------------------x---
>
> iam attaching a file....please see...

Is this any different from 5.9.2?

thanks,

greg k-h

2020-11-01 11:55:58

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: [PATCH 5.9 00/74] 5.9.3-rc1 review

On Sat, Oct 31, 2020 at 01:09:15PM -0700, Guenter Roeck wrote:
> On Sat, Oct 31, 2020 at 12:35:42PM +0100, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 5.9.3 release.
> > There are 74 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > Anything received after that time might be too late.
> >
>
> Build results:
> total: 154 pass: 154 fail: 0
> Qemu test results:
> total: 426 pass: 426 fail: 0
>
> Tested-by: Guenter Roeck <[email protected]>

Thanks for testing these and letting me know.

greg k-h

2020-11-01 11:56:16

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: [PATCH 5.9 00/74] 5.9.3-rc1 review

On Sun, Nov 01, 2020 at 12:34:42PM +0530, Naresh Kamboju wrote:
> On Sat, 31 Oct 2020 at 17:17, Greg Kroah-Hartman
> <[email protected]> wrote:
> >
> > This is the start of the stable review cycle for the 5.9.3 release.
> > There are 74 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > Anything received after that time might be too late.
> >
> > The whole patch series can be found in one patch at:
> > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> > or in the git tree and branch at:
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.9.y
> > and the diffstat can be found below.
> >
> > thanks,
> >
> > greg k-h
> >
>
> Results from Linaro’s test farm.
> No regressions on arm64, arm, x86_64, and i386.
>
> Tested-by: Linux Kernel Functional Testing <[email protected]>

Thanks for testing all of these and letting me konw.

greg k-h

2020-11-01 13:51:21

by Jeffrin Thalakkottoor

[permalink] [raw]
Subject: Re: [PATCH 5.9 00/74] 5.9.3-rc1 review

On Sun, 2020-11-01 at 11:41 +0100, Greg Kroah-Hartman wrote:
> On Sat, Oct 31, 2020 at 10:41:38PM +0530, Jeffrin Jose T wrote:
> > On Sat, 2020-10-31 at 12:35 +0100, Greg Kroah-Hartman wrote:
> > > This is the start of the stable review cycle for the 5.9.3
> > > release.
> > > There are 74 patches in this series, all will be posted as a
> > > response
> > > to this one. If anyone has any issues with these being applied,
> > > please
> > > let me know.
> > >
> > > Responses should be made by Mon, 02 Nov 2020 11:34:42 +0000.
> > > Anything received after that time might be too late.
> > >
> > > The whole patch series can be found in one patch at:
> > >
> > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.9.3-rc1.gz
> > > or in the git tree and branch at:
> > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-
> > > stable-rc.git linux-5.9.y
> > > and the diffstat can be found below.
> > >
> > > thanks,
> > >
> > > greg k-h
> >
> > hello,
> > i have build using ktest. but then i did the normal compile.
> > compiled and booted 5.9.3-rc1+ . dmesg -l err is clear.
> >
> > some lines from dmesg output related
> > ----------x------------------x---------------------------x---
> > video: module verification failed: signature and/or required key
> > missing - tainting kernel
> > sdhci-pci 0000:00:1e.6: failed to setup card detect gpio
> > --------x-------------------------------x-----------------x---
> >
> >
> > Now something related to kernel build and install..
> > ----------x---------------------x--------------------------x-------
> > WARNING: modpost: EXPORT symbol "copy_mc_fragile" [vmlinux] version
> > generation failed, symbol will not be versioned.
> > W: Possible missing firmware /lib/firmware/i915/rkl_dmc_ver2_01.bin
> > for
> > module i915
> > -------------x-------------------x-------------------------x-------
> > --
> >
> > Now one thing during boot..
> > -----------x------------x----
> > unable to start nftables
> > -x-----------------------x---
> >
> > iam attaching a file....please see...
>
> Is this any different from 5.9.2?
according to dmesg,things are to an extent ok.

the other stuff may be because of my system upgradation
and may be there is a change in kernel configuration

Overall i think there may be nothing serious in kernel space.

.

--
software engineer
rajagiri school of engineering and technology - autonomous