Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp3586524ybg; Sun, 7 Jun 2020 04:25:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx2BSrKRCZh2rkWnHVbygAXkoR/vWI4+XUCiKtxDAkLAL17LIHOkxSK0LUaHX/VDCTS6Lnl X-Received: by 2002:a05:6402:158b:: with SMTP id c11mr17530052edv.29.1591529108954; Sun, 07 Jun 2020 04:25:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591529108; cv=none; d=google.com; s=arc-20160816; b=ho3jPf/A0JBuMgP7zwVPlSLBqzom7RasGkQTw2jRpB8bPyhJDUjW4/oLXgGxmGj3wo aAh/V3oXyOHAw9YyIqnsSXTRvxr2m6xQXAim4KM42mipifOB/4RYx0Nx2aSBuoFAkdmQ trE6WLLCK9pLuG6AkNW1VaowWau3dwPcvZN1zR62Vzbu6GUbdo1BfRa/bxV8e1eaweV4 M7S17rEz5U4WXJRL6bvDiNUpBW75DT0ys+Or7Ga597VGgKWaWMXEQjrUmcfUeiXAcna/ 1QY7aE6tZkNpCIP544R+TithCSUgB/XtmpaIN48qDgBy/yqfLQEZrOjTlET63809SZzf 7WKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=NpJUXUnWcr4ShoRwufIBKppOLy6v+Prva92xseITXJY=; b=SujNx1je3NpZ5pGC5K8X46kwY2875oS3sSfDNE9MR6gXvlGePo6KMOMQGCN4uFYB6K XvIcAS7vCiLTE2KHYRl4P+Z6yIMzHk+rmKYPYL5qYI3rbuOzw4l1VanCMrwcseWQc8Y3 SheIsdlxSwfz9Eu5I/5wFhZOemURtjT33I4drTVXbNd1d3aLY+pboP48zts9F8aLyKIh PxbwRiUN5jiXPmSs+iSGvGaEDhgJydJ5D2o765oqZoO++asICxnGEUCY6J5YMFmWOKlI olcTfc06feca7bQ+I2VJoKRqexP0aUBFtZ6DAiacpAmoGG8QvDWxG6Mlf1Jn0pdzvPVr K7Ng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Y7e+hW/V"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i21si7231408edv.162.2020.06.07.04.24.45; Sun, 07 Jun 2020 04:25:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Y7e+hW/V"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726557AbgFGLU3 (ORCPT + 99 others); Sun, 7 Jun 2020 07:20:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:53636 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726501AbgFGLU3 (ORCPT ); Sun, 7 Jun 2020 07:20:29 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 03CCE2064C; Sun, 7 Jun 2020 11:20:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591528828; bh=DS7INHu5YrxLt5/jgduSlfYglRwT3c3Y2w1WlfAoBWg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Y7e+hW/VfYFTPRqS6tXp8Aa72aVjaAkfXPCIMwx8vBrMQtJde0iXzvuaTxxnDuHuM uhY6hcUfxNYCHcpHp03cLhQ2v99j9iMoAbscs0hKUVh82AGzBW8dJ+EXa8nRiaY3G6 XsZY62p/y3OCJrhtmpJefaoBsZi2UybqhD2SHups= Date: Sun, 7 Jun 2020 13:20:26 +0200 From: Greg Kroah-Hartman To: Naresh Kamboju Cc: open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, linux- stable Subject: Re: [PATCH 5.7 00/14] 5.7.1-rc1 review Message-ID: <20200607112026.GD47740@kroah.com> References: <20200605135951.018731965@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 06, 2020 at 09:19:53PM +0530, Naresh Kamboju wrote: > On Fri, 5 Jun 2020 at 19:46, Greg Kroah-Hartman > wrote: > > > > This is the start of the stable review cycle for the 5.7.1 release. > > There are 14 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Sun, 07 Jun 2020 13:54:56 +0000. > > Anything received after that time might be too late. > > > > The whole patch series can be found in one patch at: > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.1-rc1.gz > > or in the git tree and branch at: > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.7.y > > and the diffstat can be found below. > > > > thanks, > > > > greg k-h > > Results from Linaro’s test farm. > > While running kselftest memfd_test case the kernel panic noticed on i386 > which started with kernel BUG and followed by kernel panic. > > steps to reproduce: (Not always reproducible) > - cd /opt/kselftests/mainline/memfd/ > - ./run_fuse_test.sh || true > - ./run_hugetlbfs_test.sh || true > > [ 417.473220] run_hugetlbfs_t (10826): drop_caches: 3 > [ 417.491120] audit: type=1701 audit(1591388532.357:87503): > auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10829 > comm=\"memfd_test\" exe=\"/opt/kselftests/mainline/memfd/memfd_test\" > sig=6 res=1 > [ 417.511294] BUG: kernel NULL pointer dereference, address: 00000043 > [ 417.517569] #PF: supervisor read access in kernel mode > [ 417.522699] #PF: error_code(0x0000) - not-present page > [ 417.527830] *pde = 00000000 > [ 417.530707] Oops: 0000 [#2] SMP > [ 417.533846] CPU: 3 PID: 10829 Comm: memfd_test Tainted: G D W > 5.7.1-rc1 #1 > [ 417.541845] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS > 2.0b 07/27/2017 > [ 417.549327] EIP: kmem_cache_alloc_trace+0x81/0x2b0 > <> > [ 931.776242] Kernel panic - not syncing: Attempted to kill init! > exitcode=0x00000009 > [ 931.783933] Kernel Offset: 0x1ce00000 from 0xc1000000 (relocation > range: 0xc0000000-0xf77fdfff) > [ 931.792627] ---[ end Kernel panic - not syncing: Attempted to kill > init! exitcode=0x00000009 ]--- Did you see this on Linus's tree too? Is it a regression from 5.7.0? > software_node_release bug on stable-rc 5.7 noticed which is a known > issue on Linus's tree. > [ 400.320910] BUG: kernel NULL pointer dereference, address: 0000000000000000 > [ 400.328959] #PF: supervisor read access in kernel mode > [ 400.334097] #PF: error_code(0x0000) - not-present page > [ 400.339226] PGD 800000022880d067 P4D 800000022880d067 PUD 21f410067 PMD 0 > [ 400.346093] Oops: 0000 [#1] SMP PTI > [ 400.349586] CPU: 2 PID: 8865 Comm: modprobe Tainted: G W > 5.7.1-rc1 #1 > [ 400.357322] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS > 2.2 05/23/2018 > [ 400.364711] RIP: 0010:ida_free+0x76/0x140 > > Full test log link, > https://lkft.validation.linaro.org/scheduler/job/1477323#L11575 > > > Kernel BUG on arm64 dragonboard 410c which is reported upstream but > did not get reply. > BUG: spinlock bad magic on CPU#1, swapper/0/1 > lock: msm_uart_ports > Upstream issue reported link, > https://lore.kernel.org/lkml/CA+G9fYsDgghO+4zMY-AF2RgUmAfjZyA+tjeg5m5F1rEgEtw5fg@mail.gmail.com/ Thanks for testing all of these. greg k-h