Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp7626956ybc; Thu, 28 Nov 2019 21:49:13 -0800 (PST) X-Google-Smtp-Source: APXvYqzvGCTOyjHGk8NHCU3g+6TggNU+usjl8qtDw5/avrtsqfPRZbF3er+M1yUIeT2vycoywme9 X-Received: by 2002:a50:d756:: with SMTP id i22mr42704392edj.24.1575006553036; Thu, 28 Nov 2019 21:49:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575006553; cv=none; d=google.com; s=arc-20160816; b=O8Qb4iEeWcswqlYgrWzGUmdBaeZ89WqoAXhOfww1i6Ba7boSMOGSqukS5ZSpCMUAKY qRCgrd0vzxwQ6UDvsv/avxa0bDhh8M48dkvFTLXtZbkKPRu/JLfNKTHcOYXylodSXo+4 oHFNQlh6bY13OULWSj85gDW1kq6upvVaCr7T7A/rJPEMOhLL9m1SGxJ29pmkkJd5iTiZ DB88mjZFyUrMsGUme4EiAlP6PLbIlen5j/5nfEqMBqwvc+rGJta5J7sCgCh0W8ZJVbng AzuHccURq8mQ+Grb28/Wpe8amMs27HAUQJBnUAhg2z8EolnqcftQ7DwNAegujLP5QTDv va9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=UeukSdDwiiSgiJFebwv7o38ymarkZLCclxi9kT/TLJY=; b=HH/ThxnKOrznlih3WwGu+4YWY/CFP16EBdveEK0UgOG1kXaat+wTOS1+Bm/+Y/JHw0 fP6mQ6+7GXOVvqr58dEnhZeLLx4uk55DktUn+/gS4Pdu0Rm8Utkrgfm4NtFUjEvv8DTN cF9YBDj0qesc3TZX0ESIqjT/oBhoX1AT1RfRESz3QmI7wvLbNZWOM2qIevwo56yzTEPQ kV8mKoo1seQ6HUG9IDKJ/uo4dCKF1Az2Lr9hmawgLlfnESUpSS2gdmvmE5vxfEdCylbM XnuRSK3BWBsrj2Ulmk3jn7vQoq/vFBxVhyqcLIBToBv4EHJno+O4/IirepO0fioardjl SHBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jBqgi2OX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t9si2189840ejx.141.2019.11.28.21.48.21; Thu, 28 Nov 2019 21:49:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jBqgi2OX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726791AbfK2Fqb (ORCPT + 99 others); Fri, 29 Nov 2019 00:46:31 -0500 Received: from mail-il1-f196.google.com ([209.85.166.196]:34184 "EHLO mail-il1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726164AbfK2Fqb (ORCPT ); Fri, 29 Nov 2019 00:46:31 -0500 Received: by mail-il1-f196.google.com with SMTP id p6so26010831ilp.1; Thu, 28 Nov 2019 21:46:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UeukSdDwiiSgiJFebwv7o38ymarkZLCclxi9kT/TLJY=; b=jBqgi2OXhM53PJuTTmroI75k72bCJvOHMHV08+HLesmvLcf18N2XkDVZzREOvbqnhj WREf6z8VvKHVJjKsia7IhwSv9I1iVh28cArodmOgq9Mye7SOXK7omsqhvnIVlKPSWzaK Anf/SClsiR7/m9uIPQ8i2abUzGeoguiF9FQTWmbbHQsjX06bkoG0cOVGgowF5bt8TFvc Rt0LYK0rKIcehlGh6W/rtE7gwvdmQnTEI9mqvmOPmGe/wIXNPbJKt92n05tnq2rSjZTE BOeEuFbuV7canqF58bE/pVaQFDCve77ktRTtR9+ue2FE2zGxI9h0K/v3sOhtgdln8El8 zssQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UeukSdDwiiSgiJFebwv7o38ymarkZLCclxi9kT/TLJY=; b=MEqxLje1MTLdWyDyGANbaXhI2BCwu2XP76BQ+e87L3BGjjmAYoZ5nvB/biLcGfZY0X DZqCwLhVUe5V/pKEvHiGZlVBCZhAZECjIRZf418eD1qfDB+QcUA6ReX551+AKEhKSxzE fWaVVsqdBN9IIpoKgOEvG1f/Lsz+P1G9sKV3fAjWnkKvDF48BvtXE62C4TrJkyNm/PW9 SRiB18u0ekjbBs+3jbNLpxUHGsWWItuAGotqZlUe48N+9uph9vVpwkliVOnAUFquLn/U UV/eZLa6KrwHq16p+gLu4DZ1s2YOe8+KAZKhNkU6I3CvYPPiA3LQZdle3ZEotAWux6Fz JSNg== X-Gm-Message-State: APjAAAVGA9zDFM4hpj4b31wWorTs5HDD8TCWpcXsW765sy2CI+uKckM/ iXHmq7L7SDgtqDwVj9zP5ZJi2aX6lB1kRnHGw+w= X-Received: by 2002:a92:d450:: with SMTP id r16mr8533331ilm.147.1575006390301; Thu, 28 Nov 2019 21:46:30 -0800 (PST) MIME-Version: 1.0 References: <20191127203114.766709977@linuxfoundation.org> <20191128073623.GE3317872@kroah.com> In-Reply-To: <20191128073623.GE3317872@kroah.com> From: Lukas Bulwahn Date: Fri, 29 Nov 2019 06:46:23 +0100 Message-ID: Subject: Re: [PATCH 4.19 000/306] 4.19.87-stable review To: Greg Kroah-Hartman Cc: Naresh Kamboju , open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, linux- stable , Netdev , Al Viro , linux-fsdevel@vger.kernel.org, Eric Dumazet , =?UTF-8?Q?Jouni_H=C3=B6gander?= , "David S. Miller" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 28, 2019 at 8:37 AM Greg Kroah-Hartman wrote: > > On Thu, Nov 28, 2019 at 12:23:41PM +0530, Naresh Kamboju wrote: > > On Thu, 28 Nov 2019 at 02:25, Greg Kroah-Hartman > > wrote: > > > > > > This is the start of the stable review cycle for the 4.19.87 release. > > > There are 306 patches in this series, all will be posted as a response > > > to this one. If anyone has any issues with these being applied, please > > > let me know. > > > > > > Responses should be made by Fri, 29 Nov 2019 20:18:09 +0000. > > > Anything received after that time might be too late. > > > > > > The whole patch series can be found in one patch at: > > > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.87-rc1.gz > > > or in the git tree and branch at: > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.19.y > > > and the diffstat can be found below. > > > > > > thanks, > > > > > > greg k-h > > > > Kernel BUG noticed on x86_64 device while booting 4.19.87-rc1 kernel. > > > > The problematic patch is, > > > > > Jouni Hogander > > > net-sysfs: Fix reference count leak in rx|netdev_queue_add_kobject > > > > And this kernel panic is been fixed by below patch, > > > > commit 48a322b6f9965b2f1e4ce81af972f0e287b07ed0 > > Author: Eric Dumazet > > Date: Wed Nov 20 19:19:07 2019 -0800 > > > > net-sysfs: fix netdev_queue_add_kobject() breakage > > > > kobject_put() should only be called in error path. > > > > Fixes: b8eb718348b8 ("net-sysfs: Fix reference count leak in > > rx|netdev_queue_add_kobject") > > Signed-off-by: Eric Dumazet > > Cc: Jouni Hogander > > Signed-off-by: David S. Miller > > Now queued up, I'll push out -rc2 versions with this fix. > > greg k-h We have also been informed about another regression these two commits are causing: https://lore.kernel.org/lkml/ace19af4-7cae-babd-bac5-cd3505dcd874@I-love.SAKURA.ne.jp/ I suggest to drop these two patches from this queue, and give us a week to shake out the regressions of the change, and once ready, we can include the complete set of fixes to stable (probably in a week or two). Lukas