Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1378954pxb; Mon, 11 Oct 2021 04:54:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyEhiQOmSwSdjpAFqOpPGbctBcksflZiNkUypJOJJK3kc/85SuvmaRx3kvg3Se99JmsuHDL X-Received: by 2002:a17:906:3fc1:: with SMTP id k1mr25366656ejj.44.1633953241655; Mon, 11 Oct 2021 04:54:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633953241; cv=none; d=google.com; s=arc-20160816; b=lqsKNyJkBCv73506qjLsgeLJ/sF8glMbaQvQFN0U5zkvy/WS1tqUJ0pOQ2+IjW/LUy PJm4j056vaoam/eg+VJG1M7AvOCBLOjiyjUGvgDxJRFPai1uNBsBXoNVksIggiHg6xK6 y5wzSRvqWQVkyhBSNws99woa5Iax5mHyR62Z1dfRBZICs6TaQPtzES7Tqdps63oefdB6 sr7q3SMj6P6wh1R/r+qJaLtFxe+yTEWYIpzI3nvDAvLZnUPvITf9+p2I2ZcxZwUzZGbN TEfLM6kuWjZ2BW5i0fcqgW22wd81a5ZnMRDzp/UXuhOQZ/Ua57wV0N/wNhTaDv+AevPo Hdcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:in-reply-to:reply-to:date:subject:cc:to:from:user-agent :references:dkim-signature:dkim-signature; bh=dW7+2eJDZzMMtGdCNOgIHEUM067pLA4d6dFLRywGPD4=; b=S6Km9nVFxazYSkOS8+sQ4zVgnUAEa1D3Jq4jEVL9Mvk4JSLLD6HbHAbeLxnY2bgM5m jlsQgUt6PUyZ3Wk0qcs/ls+wtlEPEnmqGVy3JsAEPmSvPtppKz0fRLxLeXtBV0VjkwNt enXgKrxyXKqO98p3r8F+NJ74/6IvgHvnbccFbx5joQhCwj5QtBYF1pU+Xzay+xMTxR4g WClGVke7aT+QTyAaSjMobks/VfgQqy8GEgnuVNaVaqcLnslVhlV7ZyWyC9kwfUT9fGv7 j9o8s9Ou5miriXqwUP5eWzqoYnw2uw8NLqH0LRNn9SxzOU8c3UqV6C85e744WqE72nwp 4X/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=WFTse2hZ; dkim=neutral (no key) header.i=@suse.de header.b=61KZEbec; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o11si13711504edz.228.2021.10.11.04.53.38; Mon, 11 Oct 2021 04:54:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=WFTse2hZ; dkim=neutral (no key) header.i=@suse.de header.b=61KZEbec; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233956AbhJKHko (ORCPT + 99 others); Mon, 11 Oct 2021 03:40:44 -0400 Received: from smtp-out1.suse.de ([195.135.220.28]:55942 "EHLO smtp-out1.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234449AbhJKHkl (ORCPT ); Mon, 11 Oct 2021 03:40:41 -0400 Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id 0C48D22034; Mon, 11 Oct 2021 07:38:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1633937915; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=dW7+2eJDZzMMtGdCNOgIHEUM067pLA4d6dFLRywGPD4=; b=WFTse2hZYIoIjFqfZjv5PAgWCWFgooCkIozWjsupLGm8SoHvXBWPHGWwh7HqUxmw80B8ka Bg5SDMGYYsqw468ebe5l8SDICoARIXFr63Cfek2bsTsW2LzPp68jDjW4PNbON5EXLjXKC/ ze0L4ImmtO0CAQ56GSCSjyNUKghsQfU= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1633937915; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=dW7+2eJDZzMMtGdCNOgIHEUM067pLA4d6dFLRywGPD4=; b=61KZEbecF+I9JeDAnm9cLH1zoJ9jX5+xCpAI6DjZKezXCtQqoslXtMlRc6196AP2reGulR INHvCFmFFQo43eAQ== Received: from g78 (unknown [10.163.24.38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id 0EA24A3B83; Mon, 11 Oct 2021 07:38:34 +0000 (UTC) References: <20211008112714.601107695@linuxfoundation.org> User-agent: mu4e 1.6.5; emacs 27.2 From: Richard Palethorpe To: Naresh Kamboju Cc: Greg Kroah-Hartman , open list , Shuah Khan , Florian Fainelli , patches@kernelci.org, lkft-triage@lists.linaro.org, Jon Hunter , linux-stable , Pavel Machek , Andrew Morton , Linus Torvalds , Guenter Roeck , LTP List , Cyril Hrubis , Li Wang , Vincent Guittot , mkoutny@suse.cz Subject: Re: [PATCH 4.19 00/12] 4.19.210-rc1 review Date: Mon, 11 Oct 2021 08:28:31 +0100 Reply-To: rpalethorpe@suse.de In-reply-to: Message-ID: <875yu4au4n.fsf@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Naresh, Naresh Kamboju writes: > On Fri, 8 Oct 2021 at 17:00, Greg Kroah-Hartman > wrote: >> >> This is the start of the stable review cycle for the 4.19.210 release. >> There are 12 patches in this series, all will be posted as a response >> to this one. If anyone has any issues with these being applied, please >> let me know. >> >> Responses should be made by Sun, 10 Oct 2021 11:27:07 +0000. >> Anything received after that time might be too late. >> >> The whole patch series can be found in one patch at: >> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch= -4.19.210-rc1.gz >> or in the git tree and branch at: >> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stabl= e-rc.git linux-4.19.y >> and the diffstat can be found below. >> >> thanks, >> >> greg k-h > > Results from Linaro=E2=80=99s test farm. > No regressions on arm64, arm, x86_64, and i386. > > Tested-by: Linux Kernel Functional Testing > > NOTE: > LTP version upgrade to LTP 20210927. > The new case "cfs_bandwidth01" found the following warning. > Since it is a new test case that found this warning can not be considered= as > regression. > This warning is only seen on stable rc 4.19 > but not found on 4.14, 5.4, 5.10 and 5.14. > > Test output log: > ---------------- > cfs_bandwidth01.c:57: TINFO: Set 'worker1/cpu.max' =3D '3000 10000' > cfs_bandwidth01.c:57: TINFO: Set 'worker2/cpu.max' =3D '2000 10000' > cfs_bandwidth01.c:57: TINFO: Set 'worker3/cpu.max' =3D '3000 10000' > cfs_bandwidth01.c:118: TPASS: Scheduled bandwidth constrained workers > cfs_bandwidth01.c:57: TINFO: Set 'level2/cpu.max' =3D '5000 10000' > cfs_bandwidth01.c:130: TPASS: Workers exited > cfs_bandwidth01.c:118: TPASS: Scheduled bandwidth constrained workers > cfs_bandwidth01.c:57: TINFO: Set 'level2/cpu.max' =3D '5000 10000' > cfs_bandwidth01.c:130: TPASS: Workers exited > cfs_bandwidth01.c:118: TPASS: Scheduled bandwidth constrained work[ > 56.624213] ------------[ cut here ]------------ > [ 56.629421] rq->tmp_alone_branch !=3D &rq->leaf_cfs_rq_list FWIW this appears to be the bug the test is intended to reproduce. Originally seen on a SUSE enterprise 4.12 kernel. --=20 Thank you, Richard.