2024-01-03 17:13:39

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.10 00/75] 5.10.206-rc1 review

This is the start of the stable review cycle for the 5.10.206 release.
There are 75 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.

Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <[email protected]>
Linux 5.10.206-rc1

Ville Baillie <[email protected]>
spi: atmel: Fix PDC transfer setup bug

Luiz Augusto von Dentz <[email protected]>
Bluetooth: SMP: Fix crash when receiving new connection when debug is enabled

Greg Kroah-Hartman <[email protected]>
Revert "MIPS: Loongson64: Enable DMA noncoherent support"

Francis Laniel <[email protected]>
tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols

Mikulas Patocka <[email protected]>
dm-integrity: don't modify bio's immutable bio_vec in integrity_metadata()

Pablo Neira Ayuso <[email protected]>
netfilter: nf_tables: skip set commit for deleted/destroyed sets

Steven Rostedt (Google) <[email protected]>
tracing: Fix blocked reader of snapshot buffer

Steven Rostedt (Google) <[email protected]>
ring-buffer: Fix wake ups when buffer_percent is set to 100

Alexander Atanasov <[email protected]>
scsi: core: Always send batch on reset or error handling command

Bart Van Assche <[email protected]>
scsi: core: Use a structure member to track the SCSI command submitter

Bart Van Assche <[email protected]>
scsi: core: Use scsi_cmd_to_rq() instead of scsi_cmnd.request

Martin K. Petersen <[email protected]>
scsi: core: Make scsi_get_lba() return the LBA

Bart Van Assche <[email protected]>
scsi: core: Introduce scsi_get_sector()

Martin K. Petersen <[email protected]>
scsi: core: Add scsi_prot_ref_tag() helper

Dan Sneddon <[email protected]>
spi: atmel: Fix CS and initialization bug

Dan Sneddon <[email protected]>
spi: atmel: Switch to transfer_one transfer method

Hyunwoo Kim <[email protected]>
Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg

Paulo Alcantara <[email protected]>
smb: client: fix OOB in smbCalcSize()

Paulo Alcantara <[email protected]>
smb: client: fix OOB in SMB2_query_info_init()

Dan Carpenter <[email protected]>
usb: fotg210-hcd: delete an incorrect bounds test

Xiao Yao <[email protected]>
Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE

Archie Pusaka <[email protected]>
Bluetooth: use inclusive language in SMP

Luiz Augusto von Dentz <[email protected]>
Bluetooth: SMP: Convert BT_ERR/BT_DBG to bt_dev_err/bt_dev_dbg

Tony Lindgren <[email protected]>
ARM: dts: Fix occasional boot hang for am3 usb

Hangyu Hua <[email protected]>
9p/net: fix possible memory leak in p9_check_errors()

Thomas Gleixner <[email protected]>
x86/alternatives: Sync core before enabling interrupts

Herve Codina <[email protected]>
lib/vsprintf: Fix %pfwf when current node refcount == 0

Tony Lindgren <[email protected]>
bus: ti-sysc: Flush posted write only after srst_udelay

Steven Rostedt (Google) <[email protected]>
tracing / synthetic: Disable events after testing in synth_event_gen_test_init()

Fabio Estevam <[email protected]>
dt-bindings: nvmem: mxs-ocotp: Document fsl,ocotp

Ronald Wahl <[email protected]>
net: ks8851: Fix TX stall caused by TX buffer overrun

Rouven Czerwinski <[email protected]>
net: rfkill: gpio: set GPIO direction

Fedor Pchelkin <[email protected]>
net: 9p: avoid freeing uninit memory in p9pdu_vreadf

Christoffer Sandberg <[email protected]>
Input: soc_button_array - add mapping for airplane mode button

Frédéric Danis <[email protected]>
Bluetooth: L2CAP: Send reject on command corrupted request

Luiz Augusto von Dentz <[email protected]>
Bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent

Reinhard Speyerer <[email protected]>
USB: serial: option: add Quectel RM500Q R13 firmware support

Slark Xiao <[email protected]>
USB: serial: option: add Foxconn T99W265 with new baseline

Alper Ak <[email protected]>
USB: serial: option: add Quectel EG912Y module support

Mark Glover <[email protected]>
USB: serial: ftdi_sio: update Actisense PIDs constant names

Johannes Berg <[email protected]>
wifi: cfg80211: fix certs build to not depend on file order

Chen-Yu Tsai <[email protected]>
wifi: cfg80211: Add my certificate

Wadim Egorov <[email protected]>
iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma()

Javier Carrasco <[email protected]>
iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table

Wei Yongjun <[email protected]>
scsi: bnx2fc: Fix skb double free in bnx2fc_rcv()

Haoran Liu <[email protected]>
Input: ipaq-micro-keys - add error handling for devm_kmemdup

Konrad Dybcio <[email protected]>
interconnect: qcom: sm8250: Enable sync_state

Su Hui <[email protected]>
iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw

Mike Tipton <[email protected]>
interconnect: Treat xlate() returning NULL node as an error

Josef Bacik <[email protected]>
btrfs: do not allow non subvolume root targets for snapshot

Paulo Alcantara <[email protected]>
smb: client: fix NULL deref in asn1_ber_decoder()

Kai Vehmanen <[email protected]>
ALSA: hda/hdmi: add force-connect quirk for NUC5CPYB

Kai Vehmanen <[email protected]>
ALSA: hda/hdmi: Add quirk to force pin connectivity on NUC10

Alexis Lothoré <[email protected]>
pinctrl: at91-pio4: use dedicated lock class for IRQ

Quan Nguyen <[email protected]>
i2c: aspeed: Handle the coalesced stop conditions with the start conditions.

David Howells <[email protected]>
afs: Fix overwriting of result of DNS query

David Howells <[email protected]>
keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry

Eric Dumazet <[email protected]>
net: check dev->gso_max_size in gso_features_check()

Heiner Kallweit <[email protected]>
net: warn if gso_type isn't set for a GSO SKB

David Howells <[email protected]>
afs: Fix dynamic root lookup DNS check

David Howells <[email protected]>
afs: Fix the dynamic root's d_delete to always delete unused dentries

Liu Jian <[email protected]>
net: check vlan filter feature in vlan_vids_add_by_dev() and vlan_vids_del_by_dev()

Eric Dumazet <[email protected]>
net/rose: fix races in rose_kill_by_device()

Zhipeng Lu <[email protected]>
ethernet: atheros: fix a memleak in atl1e_setup_ring_resources

Eric Dumazet <[email protected]>
net: sched: ife: fix potential use-after-free

Rahul Rameshbabu <[email protected]>
net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors

Moshe Shemesh <[email protected]>
net/mlx5: Fix fw tracer first block check

Shifeng Li <[email protected]>
net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list()

Vlad Buslov <[email protected]>
Revert "net/mlx5e: fix double free of encap_header"

Johannes Berg <[email protected]>
wifi: mac80211: mesh_plink: fix matches_local logic

Heiko Carstens <[email protected]>
s390/vx: fix save/restore of fpu kernel context

Geert Uytterhoeven <[email protected]>
reset: Fix crash when freeing non-existent optional resets

Kunwu Chan <[email protected]>
ARM: OMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init

Paulo Alcantara <[email protected]>
smb: client: fix OOB in smb2_query_reparse_point()

Namjae Jeon <[email protected]>
ksmbd: fix wrong name of SMB2_CREATE_ALLOCATION_SIZE


-------------

Diffstat:

.../devicetree/bindings/nvmem/mxs-ocotp.yaml | 10 +-
Makefile | 4 +-
arch/arm/boot/dts/am33xx.dtsi | 1 +
arch/arm/mach-omap2/id.c | 5 +
arch/mips/Kconfig | 2 -
arch/mips/include/asm/mach-loongson64/boot_param.h | 3 +-
arch/mips/loongson64/env.c | 10 +-
arch/s390/include/asm/fpu/api.h | 2 +-
arch/x86/kernel/alternative.c | 2 +-
drivers/bus/ti-sysc.c | 18 ++-
drivers/i2c/busses/i2c-aspeed.c | 48 ++++--
drivers/iio/adc/ti_am335x_adc.c | 4 +-
drivers/iio/common/ms_sensors/ms_sensors_i2c.c | 4 +-
drivers/iio/imu/inv_mpu6050/inv_mpu_core.c | 4 +-
drivers/input/keyboard/ipaq-micro-keys.c | 3 +
drivers/input/misc/soc_button_array.c | 5 +
drivers/interconnect/core.c | 3 +
drivers/interconnect/qcom/sm8250.c | 1 +
drivers/md/dm-integrity.c | 11 +-
drivers/net/ethernet/atheros/atl1e/atl1e_main.c | 5 +-
.../ethernet/mellanox/mlx5/core/diag/fw_tracer.c | 2 +-
.../net/ethernet/mellanox/mlx5/core/en/tc_tun.c | 10 +-
drivers/net/ethernet/mellanox/mlx5/core/en_rep.c | 2 +-
drivers/net/ethernet/mellanox/mlx5/core/vport.c | 2 +-
drivers/net/ethernet/micrel/ks8851.h | 3 +
drivers/net/ethernet/micrel/ks8851_common.c | 22 +--
drivers/net/ethernet/micrel/ks8851_spi.c | 42 ++++--
drivers/pinctrl/pinctrl-at91-pio4.c | 8 +
drivers/reset/core.c | 3 +
drivers/scsi/bnx2fc/bnx2fc_fcoe.c | 9 +-
drivers/scsi/scsi.c | 2 +-
drivers/scsi/scsi_error.c | 34 ++---
drivers/scsi/scsi_lib.c | 38 +++--
drivers/scsi/scsi_logging.c | 18 ++-
drivers/scsi/scsi_priv.h | 1 +
drivers/spi/spi-atmel.c | 133 +++++------------
drivers/usb/host/fotg210-hcd.c | 3 -
drivers/usb/serial/ftdi_sio.c | 6 +-
drivers/usb/serial/ftdi_sio_ids.h | 6 +-
drivers/usb/serial/option.c | 5 +
fs/afs/cell.c | 6 +-
fs/afs/dynroot.c | 31 ++--
fs/btrfs/ioctl.c | 9 ++
fs/cifs/misc.c | 4 +
fs/cifs/smb2misc.c | 26 ++--
fs/cifs/smb2ops.c | 26 ++--
fs/cifs/smb2pdu.c | 29 +++-
fs/cifs/smb2pdu.h | 2 +-
include/linux/key-type.h | 1 +
include/net/bluetooth/hci_core.h | 5 +
include/net/bluetooth/mgmt.h | 2 +-
include/scsi/scsi_cmnd.h | 29 +++-
include/scsi/scsi_device.h | 16 +-
kernel/trace/ring_buffer.c | 12 +-
kernel/trace/synth_event_gen_test.c | 11 ++
kernel/trace/trace.c | 20 ++-
kernel/trace/trace_kprobe.c | 74 ++++++++++
kernel/trace/trace_probe.h | 1 +
lib/vsprintf.c | 11 +-
net/8021q/vlan_core.c | 9 +-
net/9p/client.c | 7 +-
net/9p/protocol.c | 17 ++-
net/bluetooth/af_bluetooth.c | 7 +-
net/bluetooth/hci_event.c | 3 +-
net/bluetooth/l2cap_core.c | 21 ++-
net/bluetooth/mgmt.c | 35 +++--
net/bluetooth/smp.c | 161 +++++++++++----------
net/bluetooth/smp.h | 6 +-
net/core/dev.c | 8 +
net/dns_resolver/dns_key.c | 10 +-
net/ife/ife.c | 1 +
net/mac80211/mesh_plink.c | 10 +-
net/netfilter/nf_tables_api.c | 2 +-
net/rfkill/rfkill-gpio.c | 8 +
net/rose/af_rose.c | 41 +++++-
net/wireless/certs/wens.hex | 87 +++++++++++
security/keys/gc.c | 31 ++--
security/keys/internal.h | 11 +-
security/keys/key.c | 15 +-
security/keys/proc.c | 2 +-
sound/pci/hda/patch_hdmi.c | 2 +
81 files changed, 857 insertions(+), 446 deletions(-)




2024-01-03 19:15:46

by Florian Fainelli

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

On 1/3/24 08:54, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h

On ARCH_BRCMSTB using 32-bit and 64-bit ARM kernels, build tested on
BMIPS_GENERIC:

Tested-by: Florian Fainelli <[email protected]>
--
Florian


2024-01-04 00:41:02

by Dominique Martinet

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

Greg Kroah-Hartman wrote on Wed, Jan 03, 2024 at 05:54:41PM +0100:
> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.

Tested 6ed2e58a1d40 ("Linux 5.10.206-rc1") on:
- arm i.MX6ULL (Armadillo 640)
- arm64 i.MX8MP (Armadillo G4)

No obvious regression in dmesg or basic tests:
Tested-by: Dominique Martinet <[email protected]>


--
Dominique Martinet | Asmadeus

2024-01-04 09:16:33

by Daniel Díaz

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

Hello!

On 03/01/24 10:54 a. m., Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h

We're seeing a kernel warning on:
* Juno-r2
* Dragonboard 410c
* i386

that looks like this:

-----8<-----
------------[ cut here ]------------
[ 968.182348] WARNING: CPU: 2 PID: 16253 at kernel/module.c:261 module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.191666] Modules linked in: x86_pkg_temp_thermal fuse ip_tables
[ 968.197876] CPU: 2 PID: 16253 Comm: ftracetest Not tainted 5.10.206-rc1 #1
[ 968.204786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 968.212208] EIP: module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.217632] Code: 68 d9 75 a4 31 c0 8d 65 f4 5b 5e 5f 5d c3 8d 74 26 00 90 ba ff ff ff ff b8 38 36 68 d9 e8 e9 61 df 00 85 c0 0f 85 6f ff ff ff 0b e9 68 ff ff ff 8d b4 26 00 00 00 00 8d 76 00 3e 8d 74 26 00
[ 968.236389] EAX: 00000000 EBX: 00000001 ECX: ffffffff EDX: 00000001
[ 968.242700] ESI: c5839d68 EDI: 00025c3b EBP: c5839d54 ESP: c5839d3c
[ 968.249008] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010246
[ 968.255845] CR0: 80050033 CR2: 010d9b70 CR3: 05b30000 CR4: 003506d0
[ 968.262138] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 968.268413] DR6: fffe0ff0 DR7: 00000400
[ 968.272278] Call Trace:
[ 968.274817] ? show_regs.cold+0x14/0x1a
[ 968.278679] ? __warn+0x71/0x100
[ 968.281954] ? module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.287224] ? report_bug+0x7e/0xa0
[ 968.290736] ? exc_overflow+0x40/0x40
[ 968.294452] ? handle_bug+0x2a/0x50
[ 968.297971] ? exc_invalid_op+0x1b/0x60
[ 968.301836] ? handle_exception+0x140/0x140
[ 968.306052] ? module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.311310] ? exc_overflow+0x40/0x40
[ 968.314999] ? module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.320252] ? trace_kprobe_run_command+0x20/0x20
[ 968.324970] ? trace_kprobe_run_command+0x20/0x20
[ 968.329720] kallsyms_on_each_symbol+0xc1/0xd0
[ 968.334195] ? trace_kprobe_run_command+0x20/0x20
[ 968.338939] trace_kprobe_create+0x5fd/0xb20
[ 968.343243] ? alloc_trace_kprobe+0x130/0x130
[ 968.347628] create_dyn_event+0x57/0xc0
[ 968.351495] ? dyn_event_release+0x140/0x140
[ 968.355791] trace_run_command+0x69/0x80
[ 968.359754] trace_parse_run_command+0x97/0x130
[ 968.364339] ? dyn_event_seq_next+0x20/0x20
[ 968.368549] dyn_event_write+0x10/0x20
[ 968.372328] ? dyn_event_release+0x140/0x140
[ 968.376611] vfs_write+0xe5/0x500
[ 968.379973] ? lock_acquire+0x8c/0x230
[ 968.383752] ? __might_fault+0x31/0x70
[ 968.387545] ? find_held_lock+0x24/0x80
[ 968.391414] ksys_write+0x72/0xf0
[ 968.394759] __ia32_sys_write+0x15/0x20
[ 968.398621] __do_fast_syscall_32+0x54/0xa0
[ 968.402838] do_fast_syscall_32+0x29/0x60
[ 968.406868] do_SYSENTER_32+0x15/0x20
[ 968.410547] entry_SYSENTER_32+0x9f/0xf2
[ 968.414497] EIP: 0xb7f85549
[ 968.417309] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 968.436081] EAX: ffffffda EBX: 00000001 ECX: 010ccdc0 EDX: 00000018
[ 968.442371] ESI: b7f6aff4 EDI: 010ccdc0 EBP: 0044c4fc ESP: bfd964c0
[ 968.448664] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 968.455478] irq event stamp: 77487
[ 968.458912] hardirqs last enabled at (77497): [] console_unlock+0x589/0x5a0
[ 968.466837] hardirqs last disabled at (77506): [] console_unlock+0x41d/0x5a0
[ 968.474799] softirqs last enabled at (77474): [] call_on_stack+0x45/0x50
[ 968.482480] softirqs last disabled at (77469): [] call_on_stack+0x45/0x50
[ 968.490183] ---[ end trace 444b2433ce3c8b30 ]---
----->8-----

and this:

-----8<-----
------------[ cut here ]------------
[ 418.955406] WARNING: CPU: 1 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
[ 418.963777] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
[ 418.973433] CPU: 1 PID: 10942 Comm: ftracetest Not tainted 5.10.206-rc1 #1
[ 418.980324] Hardware name: ARM Juno development board (r2) (DT)
[ 418.986261] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 418.992284] pc : module_assert_mutex+0x3c/0x50
[ 418.996739] lr : module_assert_mutex+0x38/0x50
[ 419.001192] sp : ffff80001cd03a90
[ 419.004515] x29: ffff80001cd03a90 x28: 0000000000000018
[ 419.009853] x27: 0000000000000002 x26: ffff0008324a6f80
[ 419.015189] x25: 0000000000000006 x24: ffff800012819678
[ 419.020525] x23: ffff0008324a6608 x22: ffff800010229bd0
[ 419.025861] x21: ffff800010229bd0 x20: ffff80001cd03c68
[ 419.031196] x19: 0000000000000000 x18: 0000000000000000
[ 419.036531] x17: 0000000000000000 x16: 0000000000000000
[ 419.041867] x15: 0000aaab20142c50 x14: 0000000000000028
[ 419.047202] x13: 0000000000000002 x12: 0000000000000003
[ 419.052538] x11: 0000000000000002 x10: 0101010101010101
[ 419.057873] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
[ 419.063209] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
[ 419.068544] x5 : 3c381c650a1c0034 x4 : 0000000000000000
[ 419.073880] x3 : 7d95b99001c19d7c x2 : ffff80096cfc9000
[ 419.079215] x1 : 0000000000000000 x0 : 0000000000000000
[ 419.084551] Call trace:
[ 419.087005] module_assert_mutex+0x3c/0x50
[ 419.091114] module_kallsyms_on_each_symbol+0x2c/0x100
[ 419.096267] kallsyms_on_each_symbol+0xe0/0x120
[ 419.100812] trace_kprobe_create+0x4e4/0x9d0
[ 419.105095] create_dyn_event+0x80/0xf0
[ 419.108943] trace_run_command+0x90/0xac
[ 419.112877] trace_parse_run_command+0x120/0x4c0
[ 419.117506] dyn_event_write+0x18/0x24
[ 419.121267] vfs_write+0xec/0x20c
[ 419.124592] ksys_write+0x78/0x110
[ 419.128004] __arm64_sys_write+0x24/0x30
[ 419.131939] el0_svc_common.constprop.0+0x84/0x1e0
[ 419.136743] do_el0_svc+0x2c/0xa4
[ 419.140069] el0_svc+0x20/0x30
[ 419.143132] el0_sync_handler+0xe8/0x114
[ 419.147065] el0_sync+0x180/0x1c0
[ 419.150387] irq event stamp: 48184
[ 419.153800] hardirqs last enabled at (48183): [] exit_to_kernel_mode+0x38/0x180
[ 419.162781] hardirqs last disabled at (48184): [] el1_dbg+0x24/0x50
[ 419.170630] softirqs last enabled at (48168): [] __do_softirq+0x4dc/0x564
[ 419.179091] softirqs last disabled at (48153): [] __irq_exit_rcu+0x170/0x194
[ 419.187721] ---[ end trace 2989cd52be73b559 ]---
------------[ cut here ]------------
[ 419.263431] WARNING: CPU: 2 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
[ 419.271801] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
[ 419.281457] CPU: 2 PID: 10942 Comm: ftracetest Tainted: G W 5.10.206-rc1 #1
[ 419.289740] Hardware name: ARM Juno development board (r2) (DT)
[ 419.295676] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 419.301698] pc : module_assert_mutex+0x3c/0x50
[ 419.306154] lr : module_assert_mutex+0x38/0x50
[ 419.310607] sp : ffff80001cd03a90
[ 419.313930] x29: ffff80001cd03a90 x28: 0000000000000018
[ 419.319267] x27: 0000000000000002 x26: ffff000831f8d500
[ 419.324603] x25: 0000000000000007 x24: ffff800012819678
[ 419.329939] x23: ffff000831f8d608 x22: ffff800010229bd0
[ 419.335275] x21: ffff800010229bd0 x20: ffff80001cd03c68
[ 419.340610] x19: 0000000000000000 x18: 0000000000000000
[ 419.345946] x17: 0000000000000000 x16: 0000000000000000
[ 419.351281] x15: 0000aaab20142c50 x14: 000000000003fffd
[ 419.356616] x13: 0000000000000038 x12: 0000000000000038
[ 419.361951] x11: 0000000000000002 x10: 0101010101010101
[ 419.367287] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
[ 419.372622] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
[ 419.377958] x5 : 3c381c650a1c0034 x4 : 0000000000000000
[ 419.383293] x3 : 7d95b99001c19d7c x2 : ffff80096cfeb000
[ 419.388628] x1 : 0000000000000000 x0 : 0000000000000000
[ 419.393964] Call trace:
[ 419.396419] module_assert_mutex+0x3c/0x50
[ 419.400527] module_kallsyms_on_each_symbol+0x2c/0x100
[ 419.405679] kallsyms_on_each_symbol+0xe0/0x120
[ 419.410225] trace_kprobe_create+0x4e4/0x9d0
[ 419.414507] create_dyn_event+0x80/0xf0
[ 419.418355] trace_run_command+0x90/0xac
[ 419.422289] trace_parse_run_command+0x120/0x4c0
[ 419.426918] dyn_event_write+0x18/0x24
[ 419.430683] vfs_write+0xec/0x20c
[ 419.434007] ksys_write+0x78/0x110
[ 419.437419] __arm64_sys_write+0x24/0x30
[ 419.441354] el0_svc_common.constprop.0+0x84/0x1e0
[ 419.446159] do_el0_svc+0x2c/0xa4
[ 419.449486] el0_svc+0x20/0x30
[ 419.452549] el0_sync_handler+0xe8/0x114
[ 419.456482] el0_sync+0x180/0x1c0
[ 419.459805] irq event stamp: 48666
[ 419.463218] hardirqs last enabled at (48665): [] exit_to_kernel_mode+0x38/0x180
[ 419.472199] hardirqs last disabled at (48666): [] el1_dbg+0x24/0x50
[ 419.480048] softirqs last enabled at (48664): [] __do_softirq+0x4dc/0x564
[ 419.488508] softirqs last disabled at (48659): [] __irq_exit_rcu+0x170/0x194
[ 419.497139] ---[ end trace 2989cd52be73b55a ]---
----->8-----

Test execution:

https://lkft.validation.linaro.org/scheduler/job/7142331

Bisections (Arm64 and x86) point to:

commit 47808d93a0cd0bb7358d9ef141e85216a4b86ef4
Author: Francis Laniel <[email protected]>
Date: Fri Oct 20 13:42:49 2023 +0300

tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols

commit b022f0c7e404887a7c5229788fc99eff9f9a80d5 upstream.


Reverting made the warning disappear on both Arm64 and i386.

Reported-by: Linux Kernel Functional Testing <[email protected]>


Greetings!

Daniel Díaz
[email protected]


2024-01-04 09:25:40

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

On Thu, Jan 04, 2024 at 03:16:15AM -0600, Daniel D?az wrote:
> Hello!
>
> On 03/01/24 10:54 a.?m., Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 5.10.206 release.
> > There are 75 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> > Anything received after that time might be too late.
> >
> > The whole patch series can be found in one patch at:
> > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
> > or in the git tree and branch at:
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> > and the diffstat can be found below.
> >
> > thanks,
> >
> > greg k-h
>
> We're seeing a kernel warning on:
> * Juno-r2
> * Dragonboard 410c
> * i386
>
> that looks like this:
>
> -----8<-----
> ------------[ cut here ]------------
> [ 968.182348] WARNING: CPU: 2 PID: 16253 at kernel/module.c:261 module_kallsyms_on_each_symbol+0xaf/0xc0
> [ 968.191666] Modules linked in: x86_pkg_temp_thermal fuse ip_tables
> [ 968.197876] CPU: 2 PID: 16253 Comm: ftracetest Not tainted 5.10.206-rc1 #1
> [ 968.204786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
> [ 968.212208] EIP: module_kallsyms_on_each_symbol+0xaf/0xc0
> [ 968.217632] Code: 68 d9 75 a4 31 c0 8d 65 f4 5b 5e 5f 5d c3 8d 74 26 00 90 ba ff ff ff ff b8 38 36 68 d9 e8 e9 61 df 00 85 c0 0f 85 6f ff ff ff 0b e9 68 ff ff ff 8d b4 26 00 00 00 00 8d 76 00 3e 8d 74 26 00
> [ 968.236389] EAX: 00000000 EBX: 00000001 ECX: ffffffff EDX: 00000001
> [ 968.242700] ESI: c5839d68 EDI: 00025c3b EBP: c5839d54 ESP: c5839d3c
> [ 968.249008] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010246
> [ 968.255845] CR0: 80050033 CR2: 010d9b70 CR3: 05b30000 CR4: 003506d0
> [ 968.262138] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
> [ 968.268413] DR6: fffe0ff0 DR7: 00000400
> [ 968.272278] Call Trace:
> [ 968.274817] ? show_regs.cold+0x14/0x1a
> [ 968.278679] ? __warn+0x71/0x100
> [ 968.281954] ? module_kallsyms_on_each_symbol+0xaf/0xc0
> [ 968.287224] ? report_bug+0x7e/0xa0
> [ 968.290736] ? exc_overflow+0x40/0x40
> [ 968.294452] ? handle_bug+0x2a/0x50
> [ 968.297971] ? exc_invalid_op+0x1b/0x60
> [ 968.301836] ? handle_exception+0x140/0x140
> [ 968.306052] ? module_kallsyms_on_each_symbol+0xaf/0xc0
> [ 968.311310] ? exc_overflow+0x40/0x40
> [ 968.314999] ? module_kallsyms_on_each_symbol+0xaf/0xc0
> [ 968.320252] ? trace_kprobe_run_command+0x20/0x20
> [ 968.324970] ? trace_kprobe_run_command+0x20/0x20
> [ 968.329720] kallsyms_on_each_symbol+0xc1/0xd0
> [ 968.334195] ? trace_kprobe_run_command+0x20/0x20
> [ 968.338939] trace_kprobe_create+0x5fd/0xb20
> [ 968.343243] ? alloc_trace_kprobe+0x130/0x130
> [ 968.347628] create_dyn_event+0x57/0xc0
> [ 968.351495] ? dyn_event_release+0x140/0x140
> [ 968.355791] trace_run_command+0x69/0x80
> [ 968.359754] trace_parse_run_command+0x97/0x130
> [ 968.364339] ? dyn_event_seq_next+0x20/0x20
> [ 968.368549] dyn_event_write+0x10/0x20
> [ 968.372328] ? dyn_event_release+0x140/0x140
> [ 968.376611] vfs_write+0xe5/0x500
> [ 968.379973] ? lock_acquire+0x8c/0x230
> [ 968.383752] ? __might_fault+0x31/0x70
> [ 968.387545] ? find_held_lock+0x24/0x80
> [ 968.391414] ksys_write+0x72/0xf0
> [ 968.394759] __ia32_sys_write+0x15/0x20
> [ 968.398621] __do_fast_syscall_32+0x54/0xa0
> [ 968.402838] do_fast_syscall_32+0x29/0x60
> [ 968.406868] do_SYSENTER_32+0x15/0x20
> [ 968.410547] entry_SYSENTER_32+0x9f/0xf2
> [ 968.414497] EIP: 0xb7f85549
> [ 968.417309] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
> [ 968.436081] EAX: ffffffda EBX: 00000001 ECX: 010ccdc0 EDX: 00000018
> [ 968.442371] ESI: b7f6aff4 EDI: 010ccdc0 EBP: 0044c4fc ESP: bfd964c0
> [ 968.448664] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
> [ 968.455478] irq event stamp: 77487
> [ 968.458912] hardirqs last enabled at (77497): [] console_unlock+0x589/0x5a0
> [ 968.466837] hardirqs last disabled at (77506): [] console_unlock+0x41d/0x5a0
> [ 968.474799] softirqs last enabled at (77474): [] call_on_stack+0x45/0x50
> [ 968.482480] softirqs last disabled at (77469): [] call_on_stack+0x45/0x50
> [ 968.490183] ---[ end trace 444b2433ce3c8b30 ]---
> ----->8-----
>
> and this:
>
> -----8<-----
> ------------[ cut here ]------------
> [ 418.955406] WARNING: CPU: 1 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
> [ 418.963777] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
> [ 418.973433] CPU: 1 PID: 10942 Comm: ftracetest Not tainted 5.10.206-rc1 #1
> [ 418.980324] Hardware name: ARM Juno development board (r2) (DT)
> [ 418.986261] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
> [ 418.992284] pc : module_assert_mutex+0x3c/0x50
> [ 418.996739] lr : module_assert_mutex+0x38/0x50
> [ 419.001192] sp : ffff80001cd03a90
> [ 419.004515] x29: ffff80001cd03a90 x28: 0000000000000018
> [ 419.009853] x27: 0000000000000002 x26: ffff0008324a6f80
> [ 419.015189] x25: 0000000000000006 x24: ffff800012819678
> [ 419.020525] x23: ffff0008324a6608 x22: ffff800010229bd0
> [ 419.025861] x21: ffff800010229bd0 x20: ffff80001cd03c68
> [ 419.031196] x19: 0000000000000000 x18: 0000000000000000
> [ 419.036531] x17: 0000000000000000 x16: 0000000000000000
> [ 419.041867] x15: 0000aaab20142c50 x14: 0000000000000028
> [ 419.047202] x13: 0000000000000002 x12: 0000000000000003
> [ 419.052538] x11: 0000000000000002 x10: 0101010101010101
> [ 419.057873] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
> [ 419.063209] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
> [ 419.068544] x5 : 3c381c650a1c0034 x4 : 0000000000000000
> [ 419.073880] x3 : 7d95b99001c19d7c x2 : ffff80096cfc9000
> [ 419.079215] x1 : 0000000000000000 x0 : 0000000000000000
> [ 419.084551] Call trace:
> [ 419.087005] module_assert_mutex+0x3c/0x50
> [ 419.091114] module_kallsyms_on_each_symbol+0x2c/0x100
> [ 419.096267] kallsyms_on_each_symbol+0xe0/0x120
> [ 419.100812] trace_kprobe_create+0x4e4/0x9d0
> [ 419.105095] create_dyn_event+0x80/0xf0
> [ 419.108943] trace_run_command+0x90/0xac
> [ 419.112877] trace_parse_run_command+0x120/0x4c0
> [ 419.117506] dyn_event_write+0x18/0x24
> [ 419.121267] vfs_write+0xec/0x20c
> [ 419.124592] ksys_write+0x78/0x110
> [ 419.128004] __arm64_sys_write+0x24/0x30
> [ 419.131939] el0_svc_common.constprop.0+0x84/0x1e0
> [ 419.136743] do_el0_svc+0x2c/0xa4
> [ 419.140069] el0_svc+0x20/0x30
> [ 419.143132] el0_sync_handler+0xe8/0x114
> [ 419.147065] el0_sync+0x180/0x1c0
> [ 419.150387] irq event stamp: 48184
> [ 419.153800] hardirqs last enabled at (48183): [] exit_to_kernel_mode+0x38/0x180
> [ 419.162781] hardirqs last disabled at (48184): [] el1_dbg+0x24/0x50
> [ 419.170630] softirqs last enabled at (48168): [] __do_softirq+0x4dc/0x564
> [ 419.179091] softirqs last disabled at (48153): [] __irq_exit_rcu+0x170/0x194
> [ 419.187721] ---[ end trace 2989cd52be73b559 ]---
> ------------[ cut here ]------------
> [ 419.263431] WARNING: CPU: 2 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
> [ 419.271801] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
> [ 419.281457] CPU: 2 PID: 10942 Comm: ftracetest Tainted: G W 5.10.206-rc1 #1
> [ 419.289740] Hardware name: ARM Juno development board (r2) (DT)
> [ 419.295676] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
> [ 419.301698] pc : module_assert_mutex+0x3c/0x50
> [ 419.306154] lr : module_assert_mutex+0x38/0x50
> [ 419.310607] sp : ffff80001cd03a90
> [ 419.313930] x29: ffff80001cd03a90 x28: 0000000000000018
> [ 419.319267] x27: 0000000000000002 x26: ffff000831f8d500
> [ 419.324603] x25: 0000000000000007 x24: ffff800012819678
> [ 419.329939] x23: ffff000831f8d608 x22: ffff800010229bd0
> [ 419.335275] x21: ffff800010229bd0 x20: ffff80001cd03c68
> [ 419.340610] x19: 0000000000000000 x18: 0000000000000000
> [ 419.345946] x17: 0000000000000000 x16: 0000000000000000
> [ 419.351281] x15: 0000aaab20142c50 x14: 000000000003fffd
> [ 419.356616] x13: 0000000000000038 x12: 0000000000000038
> [ 419.361951] x11: 0000000000000002 x10: 0101010101010101
> [ 419.367287] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
> [ 419.372622] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
> [ 419.377958] x5 : 3c381c650a1c0034 x4 : 0000000000000000
> [ 419.383293] x3 : 7d95b99001c19d7c x2 : ffff80096cfeb000
> [ 419.388628] x1 : 0000000000000000 x0 : 0000000000000000
> [ 419.393964] Call trace:
> [ 419.396419] module_assert_mutex+0x3c/0x50
> [ 419.400527] module_kallsyms_on_each_symbol+0x2c/0x100
> [ 419.405679] kallsyms_on_each_symbol+0xe0/0x120
> [ 419.410225] trace_kprobe_create+0x4e4/0x9d0
> [ 419.414507] create_dyn_event+0x80/0xf0
> [ 419.418355] trace_run_command+0x90/0xac
> [ 419.422289] trace_parse_run_command+0x120/0x4c0
> [ 419.426918] dyn_event_write+0x18/0x24
> [ 419.430683] vfs_write+0xec/0x20c
> [ 419.434007] ksys_write+0x78/0x110
> [ 419.437419] __arm64_sys_write+0x24/0x30
> [ 419.441354] el0_svc_common.constprop.0+0x84/0x1e0
> [ 419.446159] do_el0_svc+0x2c/0xa4
> [ 419.449486] el0_svc+0x20/0x30
> [ 419.452549] el0_sync_handler+0xe8/0x114
> [ 419.456482] el0_sync+0x180/0x1c0
> [ 419.459805] irq event stamp: 48666
> [ 419.463218] hardirqs last enabled at (48665): [] exit_to_kernel_mode+0x38/0x180
> [ 419.472199] hardirqs last disabled at (48666): [] el1_dbg+0x24/0x50
> [ 419.480048] softirqs last enabled at (48664): [] __do_softirq+0x4dc/0x564
> [ 419.488508] softirqs last disabled at (48659): [] __irq_exit_rcu+0x170/0x194
> [ 419.497139] ---[ end trace 2989cd52be73b55a ]---
> ----->8-----
>
> Test execution:
>
> https://lkft.validation.linaro.org/scheduler/job/7142331
>
> Bisections (Arm64 and x86) point to:
>
> commit 47808d93a0cd0bb7358d9ef141e85216a4b86ef4
> Author: Francis Laniel <[email protected]>
> Date: Fri Oct 20 13:42:49 2023 +0300
>
> tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols
> commit b022f0c7e404887a7c5229788fc99eff9f9a80d5 upstream.
>
>
> Reverting made the warning disappear on both Arm64 and i386.
>
> Reported-by: Linux Kernel Functional Testing <[email protected]>

These patches are just flat out not worth it anymore, we have had more
problems with them over the past few months than I can remember ever
having for any other backport.

Francis, I'm sorry, but I give up here, I'm dropping these from all
queues again, and if you feel they need to get into an older kernel tree
like these, please submit the needed changes to the
device/vendor/whomever trees as they can deal with the fallout, this has
caused too many problems for the LTS kernels...

thanks,

greg k-h

2024-01-04 12:12:50

by Jon Hunter

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

On Wed, 03 Jan 2024 17:54:41 +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h

All tests passing for Tegra ...

Test results for stable-v5.10:
10 builds: 10 pass, 0 fail
26 boots: 26 pass, 0 fail
68 tests: 68 pass, 0 fail

Linux version: 5.10.206-rc1-g6ed2e58a1d40
Boards tested: tegra124-jetson-tk1, tegra186-p2771-0000,
tegra194-p2972-0000, tegra194-p3509-0000+p3668-0000,
tegra20-ventana, tegra210-p2371-2180,
tegra210-p3450-0000, tegra30-cardhu-a04

Tested-by: Jon Hunter <[email protected]>

Jon

2024-01-04 12:16:04

by Pavel Machek

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

Hi!

> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.

CIP testing did not find any problems here:

https://gitlab.com/cip-project/cip-testing/linux-stable-rc-ci/-/tree/linux-5.10.y

Tested-by: Pavel Machek (CIP) <[email protected]>

Best regards,
Pavel


--
DENX Software Engineering GmbH, Managing Director: Erika Unter
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany


Attachments:
(No filename) (665.00 B)
signature.asc (201.00 B)
Download all attachments

2024-01-05 01:03:14

by Guenter Roeck

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

On Wed, Jan 03, 2024 at 05:54:41PM +0100, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> Anything received after that time might be too late.
>

Build results:
total: 157 pass: 157 fail: 0
Qemu test results:
total: 495 pass: 495 fail: 0

Tested-by: Guenter Roeck <[email protected]>

Guenter

2024-01-08 17:56:18

by Francis Laniel

[permalink] [raw]
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

Hi!

Le jeudi 4 janvier 2024, 10:25:13 CET Greg Kroah-Hartman a ?crit :
> On Thu, Jan 04, 2024 at 03:16:15AM -0600, Daniel D?az wrote:
> > Hello!
> >
> > On 03/01/24 10:54 a. m., Greg Kroah-Hartman wrote:
> > > This is the start of the stable review cycle for the 5.10.206 release.
> > > There are 75 patches in this series, all will be posted as a response
> > > to this one. If anyone has any issues with these being applied, please
> > > let me know.
> > >
> > > Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> > > Anything received after that time might be too late.
> > >
> > > The whole patch series can be found in one patch at:
> > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/
patch-5.10.2
> > > 06-rc1.gz> >
> > > or in the git tree and branch at:
> > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-
rc.gi
> > > t linux-5.10.y> >
> > > and the diffstat can be found below.
> > >
> > > thanks,
> > >
> > > greg k-h
> >
> > We're seeing a kernel warning on:
> > * Juno-r2
> > * Dragonboard 410c
> > * i386
> >
> > that looks like this:
> >
> > -----8<-----
> >
> > ------------[ cut here ]------------
> > [ 968.182348] WARNING: CPU: 2 PID: 16253 at kernel/module.c:261
> > module_kallsyms_on_each_symbol+0xaf/0xc0 [ 968.191666] Modules linked
> > in: x86_pkg_temp_thermal fuse ip_tables [ 968.197876] CPU: 2 PID:
> > 16253 Comm: ftracetest Not tainted 5.10.206-rc1 #1 [ 968.204786]
> > Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [
> > 968.212208] EIP: module_kallsyms_on_each_symbol+0xaf/0xc0
> > [ 968.217632] Code: 68 d9 75 a4 31 c0 8d 65 f4 5b 5e 5f 5d c3 8d 74 26
> > 00 90 ba ff ff ff ff b8 38 36 68 d9 e8 e9 61 df 00 85 c0 0f 85 6f ff ff
> > ff 0b e9 68 ff ff ff 8d b4 26 00 00 00 00 8d 76 00 3e 8d 74 26 00 [
> > 968.236389] EAX: 00000000 EBX: 00000001 ECX: ffffffff EDX: 00000001 [
> > 968.242700] ESI: c5839d68 EDI: 00025c3b EBP: c5839d54 ESP: c5839d3c [
> > 968.249008] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS:
> > 00010246 [ 968.255845] CR0: 80050033 CR2: 010d9b70 CR3: 05b30000 CR4:
> > 003506d0 [ 968.262138] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3:
> > 00000000 [ 968.268413] DR6: fffe0ff0 DR7: 00000400
> > [ 968.272278] Call Trace:
> > [ 968.274817] ? show_regs.cold+0x14/0x1a
> > [ 968.278679] ? __warn+0x71/0x100
> > [ 968.281954] ? module_kallsyms_on_each_symbol+0xaf/0xc0
> > [ 968.287224] ? report_bug+0x7e/0xa0
> > [ 968.290736] ? exc_overflow+0x40/0x40
> > [ 968.294452] ? handle_bug+0x2a/0x50
> > [ 968.297971] ? exc_invalid_op+0x1b/0x60
> > [ 968.301836] ? handle_exception+0x140/0x140
> > [ 968.306052] ? module_kallsyms_on_each_symbol+0xaf/0xc0
> > [ 968.311310] ? exc_overflow+0x40/0x40
> > [ 968.314999] ? module_kallsyms_on_each_symbol+0xaf/0xc0
> > [ 968.320252] ? trace_kprobe_run_command+0x20/0x20
> > [ 968.324970] ? trace_kprobe_run_command+0x20/0x20
> > [ 968.329720] kallsyms_on_each_symbol+0xc1/0xd0
> > [ 968.334195] ? trace_kprobe_run_command+0x20/0x20
> > [ 968.338939] trace_kprobe_create+0x5fd/0xb20
> > [ 968.343243] ? alloc_trace_kprobe+0x130/0x130
> > [ 968.347628] create_dyn_event+0x57/0xc0
> > [ 968.351495] ? dyn_event_release+0x140/0x140
> > [ 968.355791] trace_run_command+0x69/0x80
> > [ 968.359754] trace_parse_run_command+0x97/0x130
> > [ 968.364339] ? dyn_event_seq_next+0x20/0x20
> > [ 968.368549] dyn_event_write+0x10/0x20
> > [ 968.372328] ? dyn_event_release+0x140/0x140
> > [ 968.376611] vfs_write+0xe5/0x500
> > [ 968.379973] ? lock_acquire+0x8c/0x230
> > [ 968.383752] ? __might_fault+0x31/0x70
> > [ 968.387545] ? find_held_lock+0x24/0x80
> > [ 968.391414] ksys_write+0x72/0xf0
> > [ 968.394759] __ia32_sys_write+0x15/0x20
> > [ 968.398621] __do_fast_syscall_32+0x54/0xa0
> > [ 968.402838] do_fast_syscall_32+0x29/0x60
> > [ 968.406868] do_SYSENTER_32+0x15/0x20
> > [ 968.410547] entry_SYSENTER_32+0x9f/0xf2
> > [ 968.414497] EIP: 0xb7f85549
> > [ 968.417309] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10
> > 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd
> > 80 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76 [
> > 968.436081] EAX: ffffffda EBX: 00000001 ECX: 010ccdc0 EDX: 00000018 [
> > 968.442371] ESI: b7f6aff4 EDI: 010ccdc0 EBP: 0044c4fc ESP: bfd964c0 [
> > 968.448664] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS:
> > 00000246 [ 968.455478] irq event stamp: 77487
> > [ 968.458912] hardirqs last enabled at (77497): []
> > console_unlock+0x589/0x5a0 [ 968.466837] hardirqs last disabled at
> > (77506): [] console_unlock+0x41d/0x5a0 [ 968.474799] softirqs last
> > enabled at (77474): [] call_on_stack+0x45/0x50 [ 968.482480] softirqs
> > last disabled at (77469): [] call_on_stack+0x45/0x50 [ 968.490183]
> > ---[ end trace 444b2433ce3c8b30 ]---
> >
> > ----->8-----
> >
> > and this:
> >
> > -----8<-----
> >
> > ------------[ cut here ]------------
> > [ 418.955406] WARNING: CPU: 1 PID: 10942 at kernel/module.c:261
> > module_assert_mutex+0x3c/0x50 [ 418.963777] Modules linked in: tda998x
> > cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables [
> > 418.973433] CPU: 1 PID: 10942 Comm: ftracetest Not tainted 5.10.206-rc1
> > #1 [ 418.980324] Hardware name: ARM Juno development board (r2) (DT) [
> > 418.986261] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--) [
> > 418.992284] pc : module_assert_mutex+0x3c/0x50
> > [ 418.996739] lr : module_assert_mutex+0x38/0x50
> > [ 419.001192] sp : ffff80001cd03a90
> > [ 419.004515] x29: ffff80001cd03a90 x28: 0000000000000018
> > [ 419.009853] x27: 0000000000000002 x26: ffff0008324a6f80
> > [ 419.015189] x25: 0000000000000006 x24: ffff800012819678
> > [ 419.020525] x23: ffff0008324a6608 x22: ffff800010229bd0
> > [ 419.025861] x21: ffff800010229bd0 x20: ffff80001cd03c68
> > [ 419.031196] x19: 0000000000000000 x18: 0000000000000000
> > [ 419.036531] x17: 0000000000000000 x16: 0000000000000000
> > [ 419.041867] x15: 0000aaab20142c50 x14: 0000000000000028
> > [ 419.047202] x13: 0000000000000002 x12: 0000000000000003
> > [ 419.052538] x11: 0000000000000002 x10: 0101010101010101
> > [ 419.057873] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
> > [ 419.063209] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
> > [ 419.068544] x5 : 3c381c650a1c0034 x4 : 0000000000000000
> > [ 419.073880] x3 : 7d95b99001c19d7c x2 : ffff80096cfc9000
> > [ 419.079215] x1 : 0000000000000000 x0 : 0000000000000000
> > [ 419.084551] Call trace:
> > [ 419.087005] module_assert_mutex+0x3c/0x50
> > [ 419.091114] module_kallsyms_on_each_symbol+0x2c/0x100
> > [ 419.096267] kallsyms_on_each_symbol+0xe0/0x120
> > [ 419.100812] trace_kprobe_create+0x4e4/0x9d0
> > [ 419.105095] create_dyn_event+0x80/0xf0
> > [ 419.108943] trace_run_command+0x90/0xac
> > [ 419.112877] trace_parse_run_command+0x120/0x4c0
> > [ 419.117506] dyn_event_write+0x18/0x24
> > [ 419.121267] vfs_write+0xec/0x20c
> > [ 419.124592] ksys_write+0x78/0x110
> > [ 419.128004] __arm64_sys_write+0x24/0x30
> > [ 419.131939] el0_svc_common.constprop.0+0x84/0x1e0
> > [ 419.136743] do_el0_svc+0x2c/0xa4
> > [ 419.140069] el0_svc+0x20/0x30
> > [ 419.143132] el0_sync_handler+0xe8/0x114
> > [ 419.147065] el0_sync+0x180/0x1c0
> > [ 419.150387] irq event stamp: 48184
> > [ 419.153800] hardirqs last enabled at (48183): []
> > exit_to_kernel_mode+0x38/0x180 [ 419.162781] hardirqs last disabled at
> > (48184): [] el1_dbg+0x24/0x50 [ 419.170630] softirqs last enabled at
> > (48168): [] __do_softirq+0x4dc/0x564 [ 419.179091] softirqs last
> > disabled at (48153): [] __irq_exit_rcu+0x170/0x194 [ 419.187721] ---[
> > end trace 2989cd52be73b559 ]---
> > ------------[ cut here ]------------
> > [ 419.263431] WARNING: CPU: 2 PID: 10942 at kernel/module.c:261
> > module_assert_mutex+0x3c/0x50 [ 419.271801] Modules linked in: tda998x
> > cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables [
> > 419.281457] CPU: 2 PID: 10942 Comm: ftracetest Tainted: G W
> > 5.10.206-rc1 #1 [ 419.289740] Hardware name: ARM Juno development
> > board (r2) (DT) [ 419.295676] pstate: 60000005 (nZCv daif -PAN -UAO
> > -TCO BTYPE=--) [ 419.301698] pc : module_assert_mutex+0x3c/0x50
> > [ 419.306154] lr : module_assert_mutex+0x38/0x50
> > [ 419.310607] sp : ffff80001cd03a90
> > [ 419.313930] x29: ffff80001cd03a90 x28: 0000000000000018
> > [ 419.319267] x27: 0000000000000002 x26: ffff000831f8d500
> > [ 419.324603] x25: 0000000000000007 x24: ffff800012819678
> > [ 419.329939] x23: ffff000831f8d608 x22: ffff800010229bd0
> > [ 419.335275] x21: ffff800010229bd0 x20: ffff80001cd03c68
> > [ 419.340610] x19: 0000000000000000 x18: 0000000000000000
> > [ 419.345946] x17: 0000000000000000 x16: 0000000000000000
> > [ 419.351281] x15: 0000aaab20142c50 x14: 000000000003fffd
> > [ 419.356616] x13: 0000000000000038 x12: 0000000000000038
> > [ 419.361951] x11: 0000000000000002 x10: 0101010101010101
> > [ 419.367287] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
> > [ 419.372622] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
> > [ 419.377958] x5 : 3c381c650a1c0034 x4 : 0000000000000000
> > [ 419.383293] x3 : 7d95b99001c19d7c x2 : ffff80096cfeb000
> > [ 419.388628] x1 : 0000000000000000 x0 : 0000000000000000
> > [ 419.393964] Call trace:
> > [ 419.396419] module_assert_mutex+0x3c/0x50
> > [ 419.400527] module_kallsyms_on_each_symbol+0x2c/0x100
> > [ 419.405679] kallsyms_on_each_symbol+0xe0/0x120
> > [ 419.410225] trace_kprobe_create+0x4e4/0x9d0
> > [ 419.414507] create_dyn_event+0x80/0xf0
> > [ 419.418355] trace_run_command+0x90/0xac
> > [ 419.422289] trace_parse_run_command+0x120/0x4c0
> > [ 419.426918] dyn_event_write+0x18/0x24
> > [ 419.430683] vfs_write+0xec/0x20c
> > [ 419.434007] ksys_write+0x78/0x110
> > [ 419.437419] __arm64_sys_write+0x24/0x30
> > [ 419.441354] el0_svc_common.constprop.0+0x84/0x1e0
> > [ 419.446159] do_el0_svc+0x2c/0xa4
> > [ 419.449486] el0_svc+0x20/0x30
> > [ 419.452549] el0_sync_handler+0xe8/0x114
> > [ 419.456482] el0_sync+0x180/0x1c0
> > [ 419.459805] irq event stamp: 48666
> > [ 419.463218] hardirqs last enabled at (48665): []
> > exit_to_kernel_mode+0x38/0x180 [ 419.472199] hardirqs last disabled at
> > (48666): [] el1_dbg+0x24/0x50 [ 419.480048] softirqs last enabled at
> > (48664): [] __do_softirq+0x4dc/0x564 [ 419.488508] softirqs last
> > disabled at (48659): [] __irq_exit_rcu+0x170/0x194 [ 419.497139] ---[
> > end trace 2989cd52be73b55a ]---
> >
> > ----->8-----
> >
> > Test execution:
> > https://lkft.validation.linaro.org/scheduler/job/7142331
> >
> > Bisections (Arm64 and x86) point to:
> > commit 47808d93a0cd0bb7358d9ef141e85216a4b86ef4
> > Author: Francis Laniel <[email protected]>
> > Date: Fri Oct 20 13:42:49 2023 +0300
> >
> > tracing/kprobes: Return EADDRNOTAVAIL when func matches several
> > symbols
> > commit b022f0c7e404887a7c5229788fc99eff9f9a80d5 upstream.
> >
> > Reverting made the warning disappear on both Arm64 and i386.
> >
> > Reported-by: Linux Kernel Functional Testing <[email protected]>
>
> These patches are just flat out not worth it anymore, we have had more
> problems with them over the past few months than I can remember ever
> having for any other backport.
>
> Francis, I'm sorry, but I give up here, I'm dropping these from all
> queues again, and if you feel they need to get into an older kernel tree
> like these, please submit the needed changes to the
> device/vendor/whomever trees as they can deal with the fallout, this has
> caused too many problems for the LTS kernels...

I understand you and you do not have to be sorry.
Actually, this is rather me who have to apologize for the time taken by this
bad patch... Sorry about it.
Regarding the problem, maybe the following patch may solve the troublesome
patch:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?
id=926fe783c8a64b33997fec405cf1af3e61aed441
I will investigate, but for curiosity purpose only and I totally understand
your decision.
I will definitely be more cautious in the future!

> thanks,
>
> greg k-h

Best regards.