Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2291020pxb; Tue, 12 Oct 2021 03:32:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwfpi4l5UjpqiVmR0EOovuq5lDsrp+MkMDzyHIAao9f9NiQ6/VwSp0jarAewt8ajwFY5Drj X-Received: by 2002:a50:e0c3:: with SMTP id j3mr49891108edl.97.1634034751061; Tue, 12 Oct 2021 03:32:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634034751; cv=none; d=google.com; s=arc-20160816; b=lmGKfED9XepKCVb6lGyUMo8cB8iOZHdNnNXYgzWqdTFk+VEM8lX/Mb6Viv1OBWdLDN JV2jVYLVIPLEmENtwNoa0RE9v5yVDciVJh/LXrk0LYSC/nBAtkCh8iQ+qYo7b/WS1hyz bDe+RrIPEC5bittm2J8HOUqGD0gF8KhExjZrU6AMx5dJ/dQAQ+e/vwT6GXuBvs8MWGs7 KYegq4IT6dyLrPHZD/uFQxaS8+BhYK8hVDpLVeDtd14abrtvka2gu+jyZ4TG3c3UT3C0 lD4xxWMunIjCK/IgvyTA/lSMfc8Qqv63jT43J0veaoeNmZ1bEERbPTJEXRzj/nwiopTT JwuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=8EXwD11SEIxjl+Mcu3oG+NFAC6OahBb/SWO5Y89SEOI=; b=ZIQpkhNTfB+uJPwaN9cDRsbze2in2kfsg+4HahMd7etsrwrVUxotXansPMC0DM1IVF lmnbQK46+gMBmJUrPgt8IYGS25D3IbzD7JtmDH1Y0hamQ5N9CTKNdI4lUFS3Y6Pj83lg Hk4MSedxQHLmeSG1+xUOXRC5FPwjWSXLMZg1iz+xIGJBa8Fu+d5ecB3/pZ9VWHUs7QHC df2IWwL1fD4Ow7mJp8+3k65jjO5NacNEfYorXjt5g6EW9tAHsESyiuyO6J02brpTPlVa S92DqByllhsBWWKUoufnPevSRMAeIhn8XxHxWK96H2jwr7sCSbFAinQdJtx1ZCrvIpcK tCkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="d6/ooUZu"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d2si15133010ejo.653.2021.10.12.03.32.07; Tue, 12 Oct 2021 03:32:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="d6/ooUZu"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235835AbhJLK3v (ORCPT + 99 others); Tue, 12 Oct 2021 06:29:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60386 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235796AbhJLK3u (ORCPT ); Tue, 12 Oct 2021 06:29:50 -0400 Received: from mail-ed1-x52f.google.com (mail-ed1-x52f.google.com [IPv6:2a00:1450:4864:20::52f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C8272C061570 for ; Tue, 12 Oct 2021 03:27:48 -0700 (PDT) Received: by mail-ed1-x52f.google.com with SMTP id z20so79119899edc.13 for ; Tue, 12 Oct 2021 03:27:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=8EXwD11SEIxjl+Mcu3oG+NFAC6OahBb/SWO5Y89SEOI=; b=d6/ooUZu0fIRAhiz/tXS9E1OVaG/iBKY1Hd3/CiSPrLgzH5EQN5HkBYICkiPPDJpQj kEH4nbhSzYVuh6fwjBX9l0Q0Z6IUlrWgPxD+7T23o2CuH+TyQ1vmRMj8zxDCXuFlL/iH OOoTgF/+sK39j4FO/g4Bh8GpyCxgwkEUWulrwXCymvRjvDOp0/37DeGFppw3pNoRcwBh PtVrc6+RA0pwovPuVmweNkAagnHX2etdrr5fVG61XvWUKWVtezTVBQG5UT1SzEDs0qri AMCutF3OR+rN834UTXZKZGVBTM94Av9jhoBm0BiV0YCEGUjNymvLxS8QGwX0cZTPG9I3 qE3w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=8EXwD11SEIxjl+Mcu3oG+NFAC6OahBb/SWO5Y89SEOI=; b=2TcHm0kjRCR8dHXVm8fzxhJbPEEVuTYDcrpCRZEon7FMrI9sczZ+VxNVm9XWuChVcs uhaPr91eQKZ+AXFZa+5D44mHAjXZfNKsnPH05koefhZrR1aiBiLRoUarGJxvLuN111dR 9rYHW9WJZSZZ4SjXWBd5BTStHNxiIADv/zNsqvzwOrUsgnLx9+1pGQM6wuADIEFdYFgz XcUMhEWVqbju8Iaoh201DKPBBByglCQIS/7cf3imXWNZYzg/BmmiWaJG2i0nbvSXHw2O eZ8iuPLCZnUkSko4uKSQDL5M+McYEZ6V9JmHAKbM9ndhO1GLMo7FXwU1c/R+INnRqnNq EdZQ== X-Gm-Message-State: AOAM530QCNFP0x79lLaveXnqDBsrvBNHfWab7hTDubHI8ZvjWRjbTpyh uXxzdKe/YXQTSm8oPzG9jmxnxhq0SzTq0/Iv6q0JQQ== X-Received: by 2002:a17:907:7601:: with SMTP id jx1mr32708608ejc.69.1634034467139; Tue, 12 Oct 2021 03:27:47 -0700 (PDT) MIME-Version: 1.0 References: <20211011134517.833565002@linuxfoundation.org> In-Reply-To: <20211011134517.833565002@linuxfoundation.org> From: Naresh Kamboju Date: Tue, 12 Oct 2021 15:57:35 +0530 Message-ID: Subject: Re: [PATCH 5.14 000/151] 5.14.12-rc1 review To: Greg Kroah-Hartman Cc: open list , Shuah Khan , Florian Fainelli , patches@kernelci.org, lkft-triage@lists.linaro.org, Jon Hunter , linux-stable , Pavel Machek , Andrew Morton , Linus Torvalds , Guenter Roeck , Arnd Bergmann , Linux ARM Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 11 Oct 2021 at 19:28, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 5.14.12 release. > There are 151 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Wed, 13 Oct 2021 13:44:51 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-= 5.14.12-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable= -rc.git linux-5.14.y > and the diffstat can be found below. > > thanks, > > greg k-h Results from Linaro=E2=80=99s test farm. Regressions detected on arm. The reported crash on the arm x15 is an intermittent problem. Which is also noticed on Linux next and mainline. We are investigating this problem. Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: __lock_acquire+0x2520/0x326c URL: https://lore.kernel.org/stable/CA+G9fYutz0ZgJ=3Drrg8=3DFd7vh9c7G-SJfF2YoH5w= ZyGzUHu4Dqw@mail.gmail.com/ Reported-by: Linux Kernel Functional Testing ## Build * kernel: 5.14.12-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-5.14.y * git commit: d98305d056b808dd938d2ae6bfd0e3ccac00a106 * git describe: v5.14.11-152-gd98305d056b8 * test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.14.y/build/v5.14= .11-152-gd98305d056b8 ## No regressions (compared to v5.14.11) ## No fixes (compared to v5.14.11) ## Test result summary total: 94671, pass: 79926, fail: 1186, skip: 12797, xfail: 762 ## Build Summary * arc: 10 total, 10 passed, 0 failed * arm: 289 total, 289 passed, 0 failed * arm64: 39 total, 39 passed, 0 failed * dragonboard-410c: 1 total, 1 passed, 0 failed * hi6220-hikey: 1 total, 1 passed, 0 failed * i386: 38 total, 38 passed, 0 failed * juno-r2: 1 total, 1 passed, 0 failed * mips: 39 total, 39 passed, 0 failed * parisc: 12 total, 12 passed, 0 failed * powerpc: 36 total, 36 passed, 0 failed * riscv: 30 total, 30 passed, 0 failed * s390: 18 total, 18 passed, 0 failed * sh: 24 total, 24 passed, 0 failed * sparc: 12 total, 12 passed, 0 failed * x15: 1 total, 1 passed, 0 failed * x86: 1 total, 1 passed, 0 failed * x86_64: 39 total, 39 passed, 0 failed ## Test suites summary * fwts * igt-gpu-tools * kselftest-android * kselftest-arm64 * kselftest-arm64/arm64.btitest.bti_c_func * kselftest-arm64/arm64.btitest.bti_j_func * kselftest-arm64/arm64.btitest.bti_jc_func * kselftest-arm64/arm64.btitest.bti_none_func * kselftest-arm64/arm64.btitest.nohint_func * kselftest-arm64/arm64.btitest.paciasp_func * kselftest-arm64/arm64.nobtitest.bti_c_func * kselftest-arm64/arm64.nobtitest.bti_j_func * kselftest-arm64/arm64.nobtitest.bti_jc_func * kselftest-arm64/arm64.nobtitest.bti_none_func * kselftest-arm64/arm64.nobtitest.nohint_func * kselftest-arm64/arm64.nobtitest.paciasp_func * kselftest-bpf * kselftest-breakpoints * kselftest-capabilities * kselftest-cgroup * kselftest-clone3 * kselftest-core * kselftest-cpu-hotplug * kselftest-cpufreq * kselftest-drivers * kselftest-efivarfs * kselftest-filesystems * kselftest-firmware * kselftest-fpu * kselftest-futex * kselftest-gpio * kselftest-intel_pstate * kselftest-ipc * kselftest-ir * kselftest-kcmp * kselftest-kexec * kselftest-kvm * kselftest-lib * kselftest-livepatch * kselftest-lkdtm * kselftest-membarrier * kselftest-memfd * kselftest-memory-hotplug * kselftest-mincore * kselftest-mount * kselftest-mqueue * kselftest-net * kselftest-netfilter * kselftest-nsfs * kselftest-openat2 * kselftest-pid_namespace * kselftest-pidfd * kselftest-proc * kselftest-pstore * kselftest-ptrace * kselftest-rseq * kselftest-rtc * kselftest-seccomp * kselftest-sigaltstack * kselftest-size * kselftest-splice * kselftest-static_keys * kselftest-sync * kselftest-sysctl * kselftest-tc-testing * kselftest-timens * kselftest-timers * kselftest-tmpfs * kselftest-tpm2 * kselftest-user * kselftest-vm * kselftest-x86 * kselftest-zram * kunit * kvm-unit-tests * libgpiod * libhugetlbfs * linux-log-parser * ltp-cap_bounds-tests * ltp-commands-tests * ltp-containers-tests * ltp-controllers-tests * ltp-cpuhotplug-tests * ltp-crypto-tests * ltp-cve-tests * ltp-dio-tests * ltp-fcntl-locktests-tests * ltp-filecaps-tests * ltp-fs-tests * ltp-fs_bind-tests * ltp-fs_perms_simple-tests * ltp-fsx-tests * ltp-hugetlb-tests * ltp-io-tests * ltp-ipc-tests * ltp-math-tests * ltp-mm-tests * ltp-nptl-tests * ltp-open-posix-tests * ltp-pty-tests * ltp-sched-tests * ltp-securebits-tests * ltp-syscalls-tests * ltp-tracing-tests * network-basic-tests * packetdrill * perf * prep-tmp-disk * rcutorture * ssuite * v4l2-compliance -- Linaro LKFT https://lkft.linaro.org