Received: by 2002:a05:6358:53a8:b0:117:f937:c515 with SMTP id z40csp439241rwe; Wed, 19 Apr 2023 00:45:06 -0700 (PDT) X-Google-Smtp-Source: AKy350Yl8i7+QJqrBJnEptDTHEKe6/NiYxrrWi7P8u4bhGq18cUt21GEbpqWqBKUVNF3BDn+Klwj X-Received: by 2002:a05:6a00:99a:b0:624:7c9a:c832 with SMTP id u26-20020a056a00099a00b006247c9ac832mr2917975pfg.8.1681890306507; Wed, 19 Apr 2023 00:45:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681890306; cv=none; d=google.com; s=arc-20160816; b=CTmJDkYfnt0W4VmQNhPOgV4DLsk1kD1HfA+f2YiG8YZVSar2BWFlhYllNzOS1OaSho 8OJ7/8YODwtjfHoWRxu4a9og6JXegInh84w+kMaVCQObrkZsm1zZ6pfBvj7XMfuWrhhe 9BP4AP3sPPuYUdcSDDPOBM+a98Vu20LZZ4Ie2AKkt7rqyF8tZ4DfoywkYyw+mgX3VJhv DnDmoyjhfuWXajrTPU2zT+QN6BhIoaGpBEhFGwM3dX29dTyaEuNd54DlKTKpCvEpgm+i RYaxe0mwVJmbfUr0iSuSPwAkxpZNUWWDw+9jihKQUqvDhZ7sbxmFEKoUt1KonZn/+TEB dRWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=1YAu+pywxG/pg2UAfwsrQ9Qv3idmw5UfJ5YDGI+D73s=; b=beZOryQCWheDmuJJRpN10vfDXciheIph/DtnmchlE7EXFyZ92Wc/qHlA0bskSo0J3w 9XPlO8DoI31xM7WIrqg6XKQ2fmqwmEyUWB1KwkxQy5YTo4JSrhHwirxc0Wh7wWdzdfVG xgmg2HwGsxvXdMonnSfIZc5zN+tp+O0jKsXcG8IVV6GY5Vf06oroiqsxFP20E8jeqbL5 wwUj3BovkrWYnSV48l96kSsMDer4gPbtUQmfzDXCjL4tPeTsQIBpA7fTDiPOYCG1f6th 3OJmwauvBMBNz5DdMOrpUXkNQH8I5Wdan/pK288IYiEMm32/6ZWCwQ4KUWtG7iHBmEVY om5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="sRUAu/qN"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b184-20020a62cfc1000000b0063b235abe2fsi6909043pfg.64.2023.04.19.00.44.55; Wed, 19 Apr 2023 00:45:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="sRUAu/qN"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232199AbjDSHmj (ORCPT + 99 others); Wed, 19 Apr 2023 03:42:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58834 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232431AbjDSHlz (ORCPT ); Wed, 19 Apr 2023 03:41:55 -0400 Received: from mail-ua1-x933.google.com (mail-ua1-x933.google.com [IPv6:2607:f8b0:4864:20::933]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 37830C155 for ; Wed, 19 Apr 2023 00:41:47 -0700 (PDT) Received: by mail-ua1-x933.google.com with SMTP id r10so13107529uat.6 for ; Wed, 19 Apr 2023 00:41:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1681890106; x=1684482106; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=1YAu+pywxG/pg2UAfwsrQ9Qv3idmw5UfJ5YDGI+D73s=; b=sRUAu/qNvd546ZDE0sBLCP2o/VV/LtSaipRGsARp5ip/Y4m0V2b94fa2MbfpQYXzZZ HaxUpXi6uFS2m1GLjDdiCFxNL1yrmjFYoBoPA+telXHwxCLqGMIZ+h042X0ne7jwqcAW tpE5PC1t+ah3pxDoiuEP5QhVN6u0hAaIm17MiW2fopDX8EF7DorynxI9rqEtQ7tziGFE h6/+ewoe/SigB5ryqo7kdr5FbZQsvmeBG1HklAJACTLMx5ymGeucKc2swir5eWt+s5Vv ekcleYfch6VRwlbzQXR5G4uT6hWpcbu8hQk4eAjLTqkpNR+qmzcNvcL5uIm0KzVKqrLM mafg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1681890106; x=1684482106; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=1YAu+pywxG/pg2UAfwsrQ9Qv3idmw5UfJ5YDGI+D73s=; b=Mt+8jkTo1Nz42q3HUbJhMWwGkQJoSAVuCmLwRndmJSWylm9eosc+26cYwJIAYPA7MM k5V8bsJTHJb3F6BaR/57X664RZXkSrwtfkpfWboltC5tYkqLNJeDNem3MdVa2ObRpEy/ HY4qDBXqVpBcKHyddjS4yeFTHwLU3kIDjEySgFc8VIcBbt4Bs58CDNLZEGm2V/iXBFFp RYpaX/9DowpYAaQDa0SvYRVuV6iD7G2pyVy6Unhty11mqD5OOTM69iSxeRcEsEnh9ciW xVRUCEQgHufHjoNwItSjr1BTxMiWCrlKCeiFgLh2jUDQ+cdSNOJbLug6C2/Yfd6tGCjb P3RA== X-Gm-Message-State: AAQBX9e+bVMFZ5nVqrrih3dpuT1GAI5h+nzsD5aDupzCziDyvh+tsLRm njsCZXXq5IlOUCeYQbcJL2od6DaqRwlh+h6aIZAJsw== X-Received: by 2002:a1f:3d44:0:b0:43f:f268:660f with SMTP id k65-20020a1f3d44000000b0043ff268660fmr7278740vka.1.1681890106042; Wed, 19 Apr 2023 00:41:46 -0700 (PDT) MIME-Version: 1.0 References: <20230418120304.658273364@linuxfoundation.org> In-Reply-To: <20230418120304.658273364@linuxfoundation.org> From: Naresh Kamboju Date: Wed, 19 Apr 2023 13:11:34 +0530 Message-ID: Subject: Re: [PATCH 5.4 00/92] 5.4.241-rc1 review To: Greg Kroah-Hartman Cc: stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, LTP List , chrubis , Petr Vorel , Anders Roxell , Arnd Bergmann Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 18 Apr 2023 at 17:59, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 5.4.241 release. > There are 92 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Thu, 20 Apr 2023 12:02:44 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.241-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y > and the diffstat can be found below. > > thanks, > > greg k-h Recently we have upgraded the LTP test suite version and started noticing these test failures on 5.4. Test getting skipped on 4.19 and 4.14 as not supported features. Need to investigate test case issues or kernel issues. Reported-by: Linux Kernel Functional Testing NOTE: --- creat09.c:73: TINFO: User nobody: uid = 65534, gid = 65534 creat09.c:75: TINFO: Found unused GID 11: SUCCESS (0) creat09.c:120: TINFO: File created with umask(0) creat09.c:106: TPASS: mntpoint/testdir/creat.tmp: Owned by correct group creat09.c:112: TPASS: mntpoint/testdir/creat.tmp: Setgid bit not set creat09.c:106: TPASS: mntpoint/testdir/open.tmp: Owned by correct group creat09.c:112: TPASS: mntpoint/testdir/open.tmp: Setgid bit not set creat09.c:120: TINFO: File created with umask(S_IXGRP) creat09.c:106: TPASS: mntpoint/testdir/creat.tmp: Owned by correct group creat09.c:110: TFAIL: mntpoint/testdir/creat.tmp: Setgid bit is set creat09.c:106: TPASS: mntpoint/testdir/open.tmp: Owned by correct group creat09.c:110: TFAIL: mntpoint/testdir/open.tmp: Setgid bit is set Test history links, - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.4.y/build/v5.4.238-199-g230f1bde44b6/testrun/16338751/suite/ltp-syscalls/test/creat09/history/ - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.4.y/build/v5.4.238-199-g230f1bde44b6/testrun/16337895/suite/ltp-cve/test/cve-2018-13405/history/ - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.4.y/build/v5.4.238-199-g230f1bde44b6/testrun/16338751/suite/ltp-syscalls/test/creat09/log --- fanotify14.c:161: TCONF: FAN_REPORT_TARGET_FID not supported in kernel? fanotify14.c:157: TINFO: Test case 7: fanotify_init(FAN_CLASS_NOTIF | FAN_REPORT_TARGET_FID | FAN_REPORT_DFID_FID, O_RDONLY) fanotify14.c:161: TCONF: FAN_REPORT_TARGET_FID not supported in kernel? [ 377.081993] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem fanotify14.c:157: TINFO: Test case 8: fanotify_init(FAN_CLASS_NOTIF | FAN_REPORT_DFID_FID, O_RDONLY) [ 377.099137] EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null) fanotify14.c:175: TFAIL: fanotify_init(tc->init.flags, O_RDONLY) failed: EINVAL (22) Test results compare: - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.4.y/build/v5.4.238-199-g230f1bde44b6/testrun/16339099/suite/ltp-syscalls/test/fanotify14/history/ - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.4.y/build/v5.4.238-199-g230f1bde44b6/testrun/16326877/suite/ltp-syscalls/test/fanotify14/log ## Build * kernel: 5.4.241-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-5.4.y * git commit: 230f1bde44b6ca667cdddf6634ea4adc0bbcd0ef * git describe: v5.4.238-199-g230f1bde44b6 * test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.4.y/build/v5.4.238-199-g230f1bde44b6 ## Test Regressions (compared to v5.4.238-107-g73330daa3393) * qemu-arm64, ltp-cve - cve-2018-13405 ( creat09 ) * qemu-arm64, ltp-cve - creat09 * qemu_arm64, qemu-armv7, qemu-x86_64, qemu-i386, ltp-syscalls - fanotify14 ## Metric Regressions (compared to v5.4.238-107-g73330daa3393) ## Test Fixes (compared to v5.4.238-107-g73330daa3393) ## Metric Fixes (compared to v5.4.238-107-g73330daa3393) ## Test result summary total: 127111, pass: 101779, fail: 3337, skip: 21744, xfail: 251 ## Build Summary * arc: 5 total, 5 passed, 0 failed * arm: 143 total, 142 passed, 1 failed * arm64: 43 total, 39 passed, 4 failed * i386: 26 total, 20 passed, 6 failed * mips: 27 total, 27 passed, 0 failed * parisc: 6 total, 6 passed, 0 failed * powerpc: 30 total, 30 passed, 0 failed * riscv: 12 total, 10 passed, 2 failed * s390: 6 total, 6 passed, 0 failed * sh: 12 total, 12 passed, 0 failed * sparc: 6 total, 6 passed, 0 failed * x86_64: 36 total, 34 passed, 2 failed ## Test suites summary * boot * igt-gpu-tools * kselftest-android * kselftest-arm64 * kselftest-breakpoints * kselftest-capabilities * kselftest-cgroup * kselftest-clone3 * kselftest-core * kselftest-cpu-hotplug * kselftest-cpufreq * kselftest-drivers-dma-buf * kselftest-efivarfs * kselftest-filesystems * kselftest-filesystems-binderfs * kselftest-firmware * kselftest-fpu * kselftest-ftrace * kselftest-futex * kselftest-gpio * kselftest-intel_pstate * kselftest-ipc * kselftest-ir * kselftest-kcmp * kselftest-kexec * kselftest-kvm * kselftest-lib * kselftest-livepatch * kselftest-membarrier * kselftest-memfd * kselftest-memory-hotplug * kselftest-mincore * kselftest-mount * kselftest-mqueue * kselftest-net * kselftest-net-forwarding * kselftest-netfilter * kselftest-nsfs * kselftest-openat2 * kselftest-pid_namespace * kselftest-pidfd * kselftest-proc * kselftest-pstore * kselftest-ptrace * kselftest-rseq * kselftest-rtc * kselftest-tc-testing * kselftest-timens * kselftest-timers * kselftest-tmpfs * kselftest-tpm2 * kselftest-user * kselftest-vm * kselftest-x86 * kselftest-zram * kunit * kvm-unit-tests * libhugetlbfs * log-parser-boot * log-parser-test * ltp-cap_bounds * ltp-commands * ltp-containers * ltp-controllers * ltp-cpuhotplug * ltp-crypto * ltp-cve * ltp-dio * ltp-fcntl-locktests * ltp-filecaps * ltp-fs * ltp-fs_bind * ltp-fs_perms_simple * ltp-fsx * ltp-hugetlb * ltp-io * ltp-ipc * ltp-math * ltp-mm * ltp-nptl * ltp-pty * ltp-sched * ltp-securebits * ltp-smoke * ltp-syscalls * ltp-tracing * network-basic-tests * perf * rcutorture * v4l2-compliance * vdso -- Linaro LKFT https://lkft.linaro.org