lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220608235422.GC3924366@roeck-us.net>
Date:   Wed, 8 Jun 2022 16:54:22 -0700
From:   Guenter Roeck <linux@...ck-us.net>
To:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Cc:     linux-kernel@...r.kernel.org, stable@...r.kernel.org,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        shuah@...nel.org, patches@...nelci.org,
        lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com,
        f.fainelli@...il.com, sudipm.mukherjee@...il.com,
        slade@...dewatkins.com
Subject: Re: [PATCH 5.17 000/772] 5.17.14-rc1 review

On Tue, Jun 07, 2022 at 06:53:12PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.17.14 release.
> There are 772 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Thu, 09 Jun 2022 16:48:02 +0000.
> Anything received after that time might be too late.
> 

Build results:
	total: 158 pass: 158 fail: 0
Qemu test results:
	total: 489 pass: 489 fail: 0

Tested-by: Guenter Roeck <linux@...ck-us.net>

I see a new boot warning in some arm qemu tests, but that is related
to enabling CONFIG_KFENCE and not a new problem. v5.17.y and v5.18.y
are affected.

[    8.157727] ------------[ cut here ]------------
[    8.157843] WARNING: CPU: 0 PID: 0 at kernel/smp.c:894 smp_call_function_many_cond+0x38c/0x3a4
[    8.158289] Modules linked in:
[    8.158489] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.17.14-rc1-00773-gd0f9b2818e1e #1
[    8.158564] Hardware name: ARM-Versatile Express
[    8.158730]  unwind_backtrace from show_stack+0x10/0x14
[    8.158802]  show_stack from dump_stack_lvl+0x50/0x6c
[    8.158835]  dump_stack_lvl from __warn+0xd0/0x19c
[    8.158863]  __warn from warn_slowpath_fmt+0x5c/0xb4
[    8.158890]  warn_slowpath_fmt from smp_call_function_many_cond+0x38c/0x3a4
[    8.158919]  smp_call_function_many_cond from smp_call_function+0x3c/0x50
[    8.158947]  smp_call_function from set_memory_valid+0x74/0x94
[    8.158975]  set_memory_valid from kfence_guarded_free+0x280/0x4b4
[    8.159005]  kfence_guarded_free from kmem_cache_free+0x2f4/0x394
[    8.159032]  kmem_cache_free from rcu_core+0x358/0xc34
[    8.159062]  rcu_core from __do_softirq+0xf0/0x41c
[    8.159101]  __do_softirq from irq_exit+0xa4/0xd4
[    8.159127]  irq_exit from __irq_svc+0x50/0x68

Guenter

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ