Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2360439imu; Sat, 12 Jan 2019 23:48:21 -0800 (PST) X-Google-Smtp-Source: ALg8bN6hPN7yohG/vtwdNL6J9LBOd++OOYUP6KwKSVAYBxSgGvbbz3P5zb+lhFl9sSwTHHknxOVO X-Received: by 2002:a17:902:9f89:: with SMTP id g9mr21219507plq.214.1547365701170; Sat, 12 Jan 2019 23:48:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547365701; cv=none; d=google.com; s=arc-20160816; b=WWG26ehkpV3cKowU6tz433NURjjL+2I3P5tq/HuzveRHDvj4hUYEeoYCl5g8t+qy8k Gg1FMYqpCbGuQ3tE3Kq1gH/eEpol6MdKo+zKDOLIclbOSInx99+xNCRX784t2v/edoFN rVwS4WGAUj8bAXvrSuoOtoIjqDvi+ZbWvuqZrWB0dR0I2EP7EO2oDBzWrjNTRRb30g1u YgC19yixpSuIBlICpa+Z2Ifyysns1H1Ak07gMwNbLhHIhDXhtfDOcZoA9iWJl9KVYsco 4yQXNKfyZOiUQtlw8OlhyF3bCnjLzRBsSwXY9P9H310/rh80MJAa4gdNjNgqeZQJC0cz 1giQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=t0rUa8HV4HLWrtKb/RJTW5n+IVlMYwzCzOyBN9fETPY=; b=0EFikRTLqbbrlHKANDHvSWwZkbvBYOlkllSw5KCoDbx4CqCxMV+wMR3/b7Gxziwx7h SFKlMkBAfQcOr7iZ2ISxDVUby0T/oiS2AAV2zuT++Fz32umllGXj3DZ+hugNu4Vp3O8p ZFVqYCItanZYd1FexC8u09ZOGmJnoowe0kxjxhG/nw030ONaQOjP2B46UrP9Zv9ahbyH 7yew2spn8r/WEfh5qi3fp2OZIiPwfcSCiJeB8EaDizVLfoj0aWTlIHJCvbJM+pT9v+yC tWRp1aON3hYRwgNtTs5/ivADOsFeQFVd41Xe3uMO/x+G0OsXBOjPNbg1oBv9OtthAJYY OPdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YDiYw3aq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c8si8458644pgc.65.2019.01.12.23.47.40; Sat, 12 Jan 2019 23:48:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YDiYw3aq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726339AbfAMHod (ORCPT + 99 others); Sun, 13 Jan 2019 02:44:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:36238 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725905AbfAMHoc (ORCPT ); Sun, 13 Jan 2019 02:44:32 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1D9E320873; Sun, 13 Jan 2019 07:44:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1547365471; bh=nYmVZABU9dkXmf6iSqQAB7PKg77TItmmy2vOKr+MQaE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YDiYw3aqG1TpqW5dxIXqVSQJbEpgEnJW+ajDsEiIgQIhNyniuQ3cWgs+DOUui0O6Q h04wMZg4qJYiI6Hsf/Sir6U4LgEXDtCuNRiI4QQ0RYm37GmGDkdXWUQuwR0oT/g1qH s2kLZal/eZmOvGSLoglSlHibqFM68NsVD8L5mIcA= Date: Sun, 13 Jan 2019 08:44:28 +0100 From: Greg Kroah-Hartman To: Guenter Roeck Cc: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 3.18 00/47] 3.18.132-stable review Message-ID: <20190113074428.GA8937@kroah.com> References: <20190111130956.170952125@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.2 (2019-01-07) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jan 12, 2019 at 09:42:21AM -0800, Guenter Roeck wrote: > On 1/11/19 6:07 AM, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 3.18.132 release. > > There are 47 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Sun Jan 13 13:09:31 UTC 2019. > > Anything received after that time might be too late. > > > > > Build results: > total: 155 pass: 155 fail: 0 > Qemu test results: > total: 217 pass: 202 fail: 15 > Failed tests: > sparc32:SPARCClassic:nosmp:scsi:hd > sparc32:SPARCbook:nosmp:scsi:cd > sparc32:LX:nosmp:noapc:scsi:hd > sparc32:SS-4:nosmp:initrd > sparc32:SS-5:nosmp:scsi:hd > sparc32:SS-10:nosmp:scsi:cd > sparc32:SS-20:nosmp:scsi:hd > sparc32:SS-600MP:nosmp:scsi:hd > sparc32:Voyager:nosmp:noapc:scsi:hd > sparc32:SS-4:smp:scsi:hd > sparc32:SS-5:smp:scsi:cd > sparc32:SS-10:smp:scsi:hd > sparc32:SS-20:smp:scsi:hd > sparc32:SS-600MP:smp:scsi:hd > sparc32:Voyager:smp:noapc:scsi:hd > > The failed sparc32 tests are really nothing new, but were discovered due > to more extensive testing. Observed behavior is a boot hang. sparc32 images > in v3.18.y (and v3.16.y) have probably been non-functional since commit > 16c193364b4d ("sparc: Harden signal return frame checks."). The problem > was fixed upstream with commit 07b5ab3f71d3 ("sparc32: Fix inverted > invalid_frame_pointer checks on sigreturns"), and applying the same > commit to v3.18.y (and v3.16.y) fixes the problem. I'll queue that patch up after this release, thanks. And thanks for the results of all of the other kernel trees as well. greg k-h