Received: by 2002:a5d:925a:0:0:0:0:0 with SMTP id e26csp430464iol; Thu, 9 Jun 2022 06:44:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzWQOxZ7W8UZMJOFk5eVll6//LW2hcbqPkzzFjxbJIIqzhLLdmw3k6wtgAGIkkLCHJsDDDJ X-Received: by 2002:a17:902:eb90:b0:163:e4c1:b2fc with SMTP id q16-20020a170902eb9000b00163e4c1b2fcmr38498354plg.159.1654782269607; Thu, 09 Jun 2022 06:44:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654782269; cv=none; d=google.com; s=arc-20160816; b=nopTQWp91nYcUIazcxiZEDbXilV2/ce0EWtcl+it4Qn04y/fj1Yh58PV6wGiWam5H7 niicEXbYTt+X4ThgrIg1xTZIs2jUGQELCemMEPWxLbphfGRi5VJeadG0SiK11SlqeZ// ue90uU6qtfRJvKvDpO7Q18vaLl+FbuNDTt7iMUT3VsNt91CeviKJWla/8uoquZhATs8H D8kioix/IV7/ormuZHKP6AteJTWd3+/Wn5V/6YqkLeaZCfa2wTWIkY1sC9aILX047LBf otjJk5u2YJ/8Fjkrh/IACfYMdfweJCBtQSIwCq+Hda/8iGsKaQypGV7BOSnk3DXNIkbn 1ffw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:subject :from:references:cc:to:content-language:user-agent:mime-version:date :message-id:sender:dkim-signature; bh=HcPWLjNKeSLW/i1svoOPg26HSpUrJUafk75Nuxi7jnE=; b=wUnP6vQlYqfPb+DIWbXCEwXFYiMhcNq9qiLsCaMm1gLNmK3OPeUtSVl3WnuS35hCXH myrwD681rZvbXrLIRCZ2nZpgPWkGaCcqaQcR6lQJnWWLEQZ8uRmySW5+q9hTUx0T7Lex ogGiQRFBaJdVzpK+2rV6jiRC3VOzwDERXnz487mfs7gEb50hd9cyaqO/RGR3lDqVhmFO lLubOT0Npx+uomrVMcyZff8SEGvuOmmAtGdCHVuswPbwO8/VQAkvaFoyrMQJL2bPXXL+ vt8TkTPgXU/F4GsX6QhcddL+xXICTs7AxDSpDMhvUIxqwu3lEZapUJAaVEY+ofNSODUJ 9p9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=a3LalNpG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n6-20020a1709026a8600b001616b8f1c0fsi30616591plk.449.2022.06.09.06.44.13; Thu, 09 Jun 2022 06:44:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=a3LalNpG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343871AbiFINiM (ORCPT + 99 others); Thu, 9 Jun 2022 09:38:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49800 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239633AbiFINiK (ORCPT ); Thu, 9 Jun 2022 09:38:10 -0400 Received: from mail-ot1-x331.google.com (mail-ot1-x331.google.com [IPv6:2607:f8b0:4864:20::331]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 93FE01016; Thu, 9 Jun 2022 06:38:08 -0700 (PDT) Received: by mail-ot1-x331.google.com with SMTP id w19-20020a9d6393000000b0060aeb359ca8so17368046otk.6; Thu, 09 Jun 2022 06:38:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=sender:message-id:date:mime-version:user-agent:content-language:to :cc:references:from:subject:in-reply-to:content-transfer-encoding; bh=HcPWLjNKeSLW/i1svoOPg26HSpUrJUafk75Nuxi7jnE=; b=a3LalNpGDnWpCAa+cZkBt85rY9q64Rb8Md1StD4YVcyA/+NOTYdtuhUE/AdRkYWryr 7BZlcc+a90G5tSrxb2Fvjq4BYHgtSRSzgO6qAx7yTJ3r8PpZ5d5gbXDOEgg8ejIYR7zC 0Nd2zQR39MAXROwPpCC+W22y+Log40Ww8LoWhCp+VyPLI2Lgt+92X3YbnoZouISvfWoM Vs11TkiKxq1Avi8rteAExnwtFcXl2EWDdY8CKxyxh6vm3c4J/6VTatv3ffO1yCWOWg+P ySqIhD2B3E3MdYj06yn2t9KQwnauQPebmx8yto4Vae+DzgyPCRclWtI7fGawIdrlr+0A pQdA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:sender:message-id:date:mime-version:user-agent :content-language:to:cc:references:from:subject:in-reply-to :content-transfer-encoding; bh=HcPWLjNKeSLW/i1svoOPg26HSpUrJUafk75Nuxi7jnE=; b=v3qHfhVB7kr76z+VsufY3OdPtSR7Okqfqrg+aK+33vAiuaspF7KQRK/EyrGbUlSs2R 3sVSB6qhuW9g705dRLNrcbbO53c+ebg4G5PI4uGbzUsGzRejh4ljf0XzaAddkfhpf+by 857cIWSW+aaMiXQw2MwRff0SFBE80H2fWeaFPzyCjVkhO+wPjZlnwzZHa/GFLgx5nHLd ezlXfwAJuzY2JSU3T/HDTBvttjsWVv/pw3+4eOVNF+hXLWrozwkhMp23SyuUV/ZWHl47 DW7bT7sICo7eXfIOWzUITTcHGZ2PziZZ78bGBBhytGcRItYbqoczW26ySqiDgLyV+qmE mxfg== X-Gm-Message-State: AOAM5311terdI/iQi23kNuAjBWBe0VWj/Y3DdL1lB8Jz+NVF0I938el0 r4TyNC6pV+wtNZRVfVMU/1s= X-Received: by 2002:a9d:6f0d:0:b0:60c:ae:9319 with SMTP id n13-20020a9d6f0d000000b0060c00ae9319mr7713161otq.51.1654781887297; Thu, 09 Jun 2022 06:38:07 -0700 (PDT) Received: from ?IPV6:2600:1700:e321:62f0:329c:23ff:fee3:9d7c? ([2600:1700:e321:62f0:329c:23ff:fee3:9d7c]) by smtp.gmail.com with ESMTPSA id k6-20020a9d1986000000b0060603221268sm12090504otk.56.2022.06.09.06.38.04 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 09 Jun 2022 06:38:06 -0700 (PDT) Sender: Guenter Roeck Message-ID: Date: Thu, 9 Jun 2022 06:38:03 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1 Content-Language: en-US To: Naresh Kamboju , Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, slade@sladewatkins.com, Daniel Latypov , Brendan Higgins , kunit-dev@googlegroups.com, "open list:KERNEL SELFTEST FRAMEWORK" References: <20220607164948.980838585@linuxfoundation.org> From: Guenter Roeck Subject: Re: [PATCH 5.17 000/772] 5.17.14-rc1 review In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS, NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/9/22 05:51, Naresh Kamboju wrote: > On Wed, 8 Jun 2022 at 19:24, Naresh Kamboju wrote: >> >> On Tue, 7 Jun 2022 at 23:41, Greg Kroah-Hartman >> wrote: >>> >>> This is the start of the stable review cycle for the 5.17.14 release. >>> There are 772 patches in this series, all will be posted as a response >>> to this one. If anyone has any issues with these being applied, please >>> let me know. >>> >>> Responses should be made by Thu, 09 Jun 2022 16:48:02 +0000. >>> Anything received after that time might be too late. >>> >>> The whole patch series can be found in one patch at: >>> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.17.14-rc1.gz >>> or in the git tree and branch at: >>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.17.y >>> and the diffstat can be found below. >>> >>> thanks, >>> >>> greg k-h >> >> Results from Linaro’s test farm. >> >> Regressions found on qemu_x86_64: >> - kunit/kasan [1] >> >> Regressions found on qemu_i386: >> - kunit/kfence [2] >> - kunit/test_out_of_bounds_read >> >> We will bisect and let you know more details about this reported problem. > > The bisect script pointed me to this commit and reverted and tested and > confirmed. > I see the same error messages after enabling CONFIG_KFENCE_KUNIT_TEST, but it doesn't go away after removing the patch below. That patch also seems to be completely unrelated to the error. I also see the same problem in the mainline kernel. I suspect that something is wrong with CONFIG_KFENCE_KUNIT_TEST. Guenter > commit 1883088ed4a0d5cc9cea500ca4e89a354ab32c11 > Author: Jia-Ju Bai > Date: Fri May 27 23:28:18 2022 +0800 > > md: bcache: check the return value of kzalloc() in detached_dev_do_request() > > commit 40f567bbb3b0639d2ec7d1c6ad4b1b018f80cf19 upstream. > > The function kzalloc() in detached_dev_do_request() can fail, so its > return value should be checked. > > Fixes: bc082a55d25c ("bcache: fix inaccurate io state for detached > bcache devices") > Reported-by: TOTE Robot > Signed-off-by: Jia-Ju Bai > Signed-off-by: Coly Li > Link: https://lore.kernel.org/r/20220527152818.27545-4-colyli@suse.de > Signed-off-by: Jens Axboe > Signed-off-by: Greg Kroah-Hartman > > diff --git a/drivers/md/bcache/request.c b/drivers/md/bcache/request.c > index d15aae6c51c1..673a680240a9 100644 > --- a/drivers/md/bcache/request.c > +++ b/drivers/md/bcache/request.c > @@ -1107,6 +1107,12 @@ static void detached_dev_do_request(struct > bcache_device *d, struct bio *bio, > * which would call closure_get(&dc->disk.cl) > */ > ddip = kzalloc(sizeof(struct detached_dev_io_private), GFP_NOIO); > + if (!ddip) { > + bio->bi_status = BLK_STS_RESOURCE; > + bio->bi_end_io(bio); > + return; > + } > + > ddip->d = d; > /* Count on the bcache device */ > ddip->orig_bdev = orig_bdev; > > > >> Reported-by: Linux Kernel Functional Testing >> >> [1] https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.17.y/build/v5.17.13-773-gd0f9b2818e1e/testrun/10038101/suite/kunit/test/kasan/details/ >> [2] https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.17.y/build/v5.17.13-773-gd0f9b2818e1e/testrun/10038215/suite/kunit/test/kfence/details/ >> >> ## Build >> * kernel: 5.17.14-rc1 >> * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc >> * git branch: linux-5.17.y >> * git commit: d0f9b2818e1e4d43847e10d6e5310a0c653cb18f >> * git describe: v5.17.13-773-gd0f9b2818e1e >> * test details: >> https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.17.y/build/v5.17.13-773-gd0f9b2818e1e >> >> ## Test Regressions (compared to v5.17.11-188-g8eb69e8f0d45) >> Regressions found on qemu_x86_64: >> - kunit/kasan [1] >> >> Regressions found on qemu_i386: >> - kunit/kfence [2] >> - kunit/test_out_of_bounds_read >> >> ## Metric Regressions (compared to v5.17.11-188-g8eb69e8f0d45) >> No metric regressions found. >> >> ## Test Fixes (compared to v5.17.11-188-g8eb69e8f0d45) >> No test fixes found. >> >> ## Metric Fixes (compared to v5.17.11-188-g8eb69e8f0d45) >> No metric fixes found. >> >> ## Test result summary >> total: 134591, pass: 121555, fail: 447, skip: 11730, xfail: 859 >> >> ## Build Summary >> * arm: 17 total, 14 passed, 3 failed >> * arm64: 20 total, 20 passed, 0 failed >> * i386: 17 total, 12 passed, 5 failed >> * mips: 4 total, 1 passed, 3 failed >> * parisc: 2 total, 2 passed, 0 failed >> * powerpc: 5 total, 2 passed, 3 failed >> * riscv: 5 total, 5 passed, 0 failed >> * s390: 5 total, 2 passed, 3 failed >> * sh: 2 total, 0 passed, 2 failed >> * sparc: 2 total, 2 passed, 0 failed >> * x86_64: 20 total, 20 passed, 0 failed >> >> ## Test suites summary >> * fwts >> * kunit >> * kvm-unit-tests >> * libgpiod >> * libhugetlbfs >> * log-parser-boot >> * log-parser-test >> * ltp-cap_bounds >> * ltp-cap_bounds-tests >> * ltp-commands >> * ltp-commands-tests >> * ltp-containers >> * ltp-containers-tests >> * ltp-controllers-tests >> * ltp-cpuhotplug-tests >> * ltp-crypto >> * ltp-crypto-tests >> * ltp-cve-tests >> * ltp-dio-tests >> * ltp-fcntl-locktests >> * ltp-fcntl-locktests-tests >> * ltp-filecaps >> * ltp-filecaps-tests >> * ltp-fs >> * ltp-fs-tests >> * ltp-fs_bind >> * ltp-fs_bind-tests >> * ltp-fs_perms_simple >> * ltp-fs_perms_simple-tests >> * ltp-fsx >> * ltp-fsx-tests >> * ltp-hugetlb >> * ltp-hugetlb-tests >> * ltp-io >> * ltp-io-tests >> * ltp-ipc >> * ltp-ipc-tests >> * ltp-math-tests >> * ltp-mm-tests >> * ltp-nptl >> * ltp-nptl-tests >> * ltp-open-posix-tests >> * ltp-pty >> * ltp-pty-tests >> * ltp-sched-tests >> * ltp-securebits >> * ltp-securebits-tests >> * ltp-syscalls-tests >> * ltp-tracing-tests >> * network-basic-tests >> * packetdrill >> * perf >> * rcutorture >> * ssuite >> * v4l2-compliance >> * vdso >> >> -- >> Linaro LKFT >> https://lkft.linaro.org