Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp3171941rdh; Mon, 27 Nov 2023 07:56:21 -0800 (PST) X-Google-Smtp-Source: AGHT+IH647BGSyepw6mGeyr2RynkJw9nh7ZUOpeY50ywsjuPUvMVn3cgRsEkX4YEZdVe/vjjFfkX X-Received: by 2002:a17:902:c40d:b0:1cf:9790:f244 with SMTP id k13-20020a170902c40d00b001cf9790f244mr12221094plk.47.1701100580774; Mon, 27 Nov 2023 07:56:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701100580; cv=none; d=google.com; s=arc-20160816; b=SLnyUkb4wj6dTMeqso+oDxb7zb7jkGhztu/t1eRsReH43X8edvbcK1N2RIlztiPQKc 6Fe5Vm00hYlee7fuGdVITkOx6j7aJAE3zsrs0vnBESrNc7mZksPjKbaKg96wGiDZJ3Fx Eg6F+unk44pykNtA8e+d4zRrxkL4vlE2vahLp+d4Ft9hD/dqKydfBxKoppQfZ8iLseVK 4l+lttBGLNr8Gg/EGtnUDfjzR1I1zd8UMcVrdvwb9c0EZ1vswHY9+27JgmxsUUu/OXMQ UsZl9WybZLFfQBBq42Hv04HI3+IjxTIqXuNhYlpK+SNz5VRqYhVVlvKVPlQCelrVUmie HvhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fRkVKKr342m6h4w/MLhcONnvDqNLhg2l0emsbbFvQ/o=; fh=LOboph2cy0b6r0MBd2s/FVkSzoauxBZFG+X2lzzwWCc=; b=HgPOAt10W8Ep/9xkZwZowMQgXGa1GiLeGBSpBn+mgq1rSZNMq0hhAzrFlt5JXmqOJt /9n9BhgmiSLxF5pNLP6gUPeVTSNgU8o+EJ+IsP4kXyXPdLotC3alOo57jXl+nyQlYdmK qJa/IX3MzrsxN3tQ3IVlvgh1zngQuny8bqI0zBMKhv+V9dEyAgearXR143w4xOZQz4ev HTlJbBSmRzXwLJ9MZRsZSjBdUrPZqfGwtUYVyZwdZIVIik9tJVUfp3SiqB6CBVKuEwnv paXk9QF9Ao9MtCo3bMgXJnEF/tjeJVtW22Ab1RgRRfugxVNL7MQgfkzUm/UsXYtA8Uqo KC+w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id o38-20020a634e66000000b0058b8c72c5ddsi9360252pgl.607.2023.11.27.07.56.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 Nov 2023 07:56:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id DC8148136BF7; Mon, 27 Nov 2023 07:56:17 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234130AbjK0P4C (ORCPT + 99 others); Mon, 27 Nov 2023 10:56:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57576 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234275AbjK0Pzz (ORCPT ); Mon, 27 Nov 2023 10:55:55 -0500 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2a07:de40:b251:101:10:150:64:2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AED3092; Mon, 27 Nov 2023 07:56:01 -0800 (PST) Received: from imap2.dmz-prg2.suse.org (imap2.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:98]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 3AEA31FD17; Mon, 27 Nov 2023 15:55:58 +0000 (UTC) Received: from imap2.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap2.dmz-prg2.suse.org (Postfix) with ESMTPS id 19DED13440; Mon, 27 Nov 2023 15:55:58 +0000 (UTC) Received: from dovecot-director2.suse.de ([10.150.64.162]) by imap2.dmz-prg2.suse.org with ESMTPSA id iKRPBg68ZGUQWgAAn2gu4w (envelope-from ); Mon, 27 Nov 2023 15:55:58 +0000 Received: by quack3.suse.cz (Postfix, from userid 1000) id 5DF31A07CB; Mon, 27 Nov 2023 16:55:57 +0100 (CET) Date: Mon, 27 Nov 2023 16:55:57 +0100 From: Jan Kara To: Daniel =?utf-8?B?RMOtYXo=?= Cc: Greg Kroah-Hartman , stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, jack@suse.cz, chrubis@suse.cz Subject: Re: [PATCH 5.15 000/297] 5.15.140-rc1 review Message-ID: <20231127155557.xv5ljrdxcfcigjfa@quack3> References: <20231124172000.087816911@linuxfoundation.org> <81a11ebe-ea47-4e21-b5eb-536b1a723168@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <81a11ebe-ea47-4e21-b5eb-536b1a723168@linaro.org> X-Spamd-Bar: ++++++ Authentication-Results: smtp-out2.suse.de; dkim=none; dmarc=none; spf=softfail (smtp-out2.suse.de: 2a07:de40:b281:104:10:150:64:98 is neither permitted nor denied by domain of jack@suse.cz) smtp.mailfrom=jack@suse.cz X-Rspamd-Server: rspamd2 X-Spamd-Result: default: False [6.89 / 50.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:98:from]; TO_DN_SOME(0.00)[]; R_SPF_SOFTFAIL(4.60)[~all]; RCVD_COUNT_THREE(0.00)[3]; MX_GOOD(-0.01)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(2.20)[]; MIME_TRACE(0.00)[0:+]; BAYES_HAM(-3.00)[100.00%]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FREEMAIL_ENVRCPT(0.00)[gmail.com,gmx.de]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(1.20)[suse.cz]; RCPT_COUNT_TWELVE(0.00)[20]; DBL_BLOCKED_OPENRESOLVER(0.00)[suse.com:email]; FUZZY_BLOCKED(0.00)[rspamd.com]; MID_RHS_NOT_FQDN(0.50)[]; FREEMAIL_CC(0.00)[linuxfoundation.org,vger.kernel.org,lists.linux.dev,linux-foundation.org,roeck-us.net,kernel.org,kernelci.org,lists.linaro.org,denx.de,nvidia.com,gmail.com,sladewatkins.net,gmx.de,suse.cz]; RCVD_TLS_ALL(0.00)[]; SUSPICIOUS_RECIPS(1.50)[] X-Spam-Score: 6.89 X-Rspamd-Queue-Id: 3AEA31FD17 X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Mon, 27 Nov 2023 07:56:18 -0800 (PST) Hello! On Fri 24-11-23 23:45:09, Daniel D?az wrote: > On 24/11/23 11:50 a.?m., Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 5.15.140 release. > > There are 297 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Sun, 26 Nov 2023 17:19:17 +0000. > > Anything received after that time might be too late. > > > > The whole patch series can be found in one patch at: > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.15.140-rc1.gz > > or in the git tree and branch at: > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.15.y > > and the diffstat can be found below. > > > > thanks, > > > > greg k-h > > We are noticing a regression with ltp-syscalls' preadv03: Thanks for report! > -----8<----- > preadv03 preadv03 > preadv03_64 preadv03_64 > preadv03.c:102: TINFO: Using block size 512 > preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'a' expectedly > preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'a' expectedly > preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'b' expectedly > preadv03.c:102: TINFO: Using block size 512 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:66: TFAIL: preadv(O_DIRECT) read 0 bytes, expected 512 > preadv03.c:102: TINFO: Using block size 512 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:66: TFAIL: preadv(O_DIRECT) read 0 bytes, expected 512 > preadv03.c:102: TINFO: Using block size 512 > preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'a' expectedly > preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'a' expectedly > preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'b' expectedly > preadv03.c:102: TINFO: Using block size 512 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:66: TFAIL: preadv(O_DIRECT) read 0 bytes, expected 512 > preadv03.c:102: TINFO: Using block size 512 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 > preadv03.c:66: TFAIL: preadv(O_DIRECT) read 0 bytes, expected 512 > ----->8----- > > This is seen in the following environments: > * dragonboard-845c > * juno-64k_page_size > * qemu-arm64 > * qemu-armv7 > * qemu-i386 > * qemu-x86_64 > * x86_64-clang > > and on the following RC's: > * v5.10.202-rc1 > * v5.15.140-rc1 > * v6.1.64-rc1 Hum, even in 6.1? That's odd. Can you please test whether current upstream vanilla kernel works for you with this test? Thanks! Honza -- Jan Kara SUSE Labs, CR