Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-08 Thread Guenter Roeck

On 09/05/2018 10:01 AM, Linus Torvalds wrote:

On Wed, Sep 5, 2018 at 8:34 AM Guenter Roeck  wrote:


On 09/05/2018 02:01 AM, Greg Kroah-Hartman wrote:

---
[ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
[kworker/5:1:155]
[ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
[ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 d0 49 
8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 18 83 e2 
01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89


It's stuck in this loop:

loop:
 pause
 mov0x18(%rcx),%edx
 and$0x1,%edx
 jneloop

which is csd_lock_wait().

Judging by the offset in smp_call_function_many(), it's the final one
(there's two: the other one is part of "csd_lock()"). But that's just
a guess.

Anyway, it means that we're waiting for another CPU to finish
processing an IPI - either a previous one we sent asynchronously (if
it's the earlier csd_lock() case) or the TLB IPI we just sent and
we're waiting for completion of.


Not tested, but I see it in v4.17.19 and in v4.18.6-rc2. Turns out it is
related to heavy load, not to suspend/resume. At this point I suspect that
it may be an AMD/Ryzen specific problem - it looks like it disappears if I
add "kernel.randomize_va_space = 0" to /etc/sysctl.conf. No idea if it is a
CPU bug or some AMD specific code problem. I'll try to analyze it further.


Ouch. Some IPI sending/receiving problem would be very very painful to
debug if it's hw related.



Turns out this is a well known problem with Ryzen CPUs:

https://bugzilla.kernel.org/show_bug.cgi?id=196683

Guenter


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-08 Thread Guenter Roeck

On 09/05/2018 10:01 AM, Linus Torvalds wrote:

On Wed, Sep 5, 2018 at 8:34 AM Guenter Roeck  wrote:


On 09/05/2018 02:01 AM, Greg Kroah-Hartman wrote:

---
[ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
[kworker/5:1:155]
[ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
[ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 d0 49 
8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 18 83 e2 
01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89


It's stuck in this loop:

loop:
 pause
 mov0x18(%rcx),%edx
 and$0x1,%edx
 jneloop

which is csd_lock_wait().

Judging by the offset in smp_call_function_many(), it's the final one
(there's two: the other one is part of "csd_lock()"). But that's just
a guess.

Anyway, it means that we're waiting for another CPU to finish
processing an IPI - either a previous one we sent asynchronously (if
it's the earlier csd_lock() case) or the TLB IPI we just sent and
we're waiting for completion of.


Not tested, but I see it in v4.17.19 and in v4.18.6-rc2. Turns out it is
related to heavy load, not to suspend/resume. At this point I suspect that
it may be an AMD/Ryzen specific problem - it looks like it disappears if I
add "kernel.randomize_va_space = 0" to /etc/sysctl.conf. No idea if it is a
CPU bug or some AMD specific code problem. I'll try to analyze it further.


Ouch. Some IPI sending/receiving problem would be very very painful to
debug if it's hw related.



Turns out this is a well known problem with Ryzen CPUs:

https://bugzilla.kernel.org/show_bug.cgi?id=196683

Guenter


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Linus Torvalds
On Wed, Sep 5, 2018 at 8:34 AM Guenter Roeck  wrote:
>
> On 09/05/2018 02:01 AM, Greg Kroah-Hartman wrote:
> >> ---
> >> [ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
> >> [kworker/5:1:155]
> >> [ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
> >> [ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 
> >> 63 d0 49 8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 
> >> <8b> 51 18 83 e2 01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89

It's stuck in this loop:

   loop:
pause
mov0x18(%rcx),%edx
and$0x1,%edx
jneloop

which is csd_lock_wait().

Judging by the offset in smp_call_function_many(), it's the final one
(there's two: the other one is part of "csd_lock()"). But that's just
a guess.

Anyway, it means that we're waiting for another CPU to finish
processing an IPI - either a previous one we sent asynchronously (if
it's the earlier csd_lock() case) or the TLB IPI we just sent and
we're waiting for completion of.

> Not tested, but I see it in v4.17.19 and in v4.18.6-rc2. Turns out it is
> related to heavy load, not to suspend/resume. At this point I suspect that
> it may be an AMD/Ryzen specific problem - it looks like it disappears if I
> add "kernel.randomize_va_space = 0" to /etc/sysctl.conf. No idea if it is a
> CPU bug or some AMD specific code problem. I'll try to analyze it further.

Ouch. Some IPI sending/receiving problem would be very very painful to
debug if it's hw related.

  Linus


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Linus Torvalds
On Wed, Sep 5, 2018 at 8:34 AM Guenter Roeck  wrote:
>
> On 09/05/2018 02:01 AM, Greg Kroah-Hartman wrote:
> >> ---
> >> [ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
> >> [kworker/5:1:155]
> >> [ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
> >> [ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 
> >> 63 d0 49 8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 
> >> <8b> 51 18 83 e2 01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89

It's stuck in this loop:

   loop:
pause
mov0x18(%rcx),%edx
and$0x1,%edx
jneloop

which is csd_lock_wait().

Judging by the offset in smp_call_function_many(), it's the final one
(there's two: the other one is part of "csd_lock()"). But that's just
a guess.

Anyway, it means that we're waiting for another CPU to finish
processing an IPI - either a previous one we sent asynchronously (if
it's the earlier csd_lock() case) or the TLB IPI we just sent and
we're waiting for completion of.

> Not tested, but I see it in v4.17.19 and in v4.18.6-rc2. Turns out it is
> related to heavy load, not to suspend/resume. At this point I suspect that
> it may be an AMD/Ryzen specific problem - it looks like it disappears if I
> add "kernel.randomize_va_space = 0" to /etc/sysctl.conf. No idea if it is a
> CPU bug or some AMD specific code problem. I'll try to analyze it further.

Ouch. Some IPI sending/receiving problem would be very very painful to
debug if it's hw related.

  Linus


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Guenter Roeck

On 09/05/2018 03:43 AM, Greg Kroah-Hartman wrote:

On Wed, Sep 05, 2018 at 04:08:35PM +0530, Naresh Kamboju wrote:

On 5 September 2018 at 01:02, Greg Kroah-Hartman
 wrote:

On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
   
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
or in the git tree and branch at:
   git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
linux-4.18.y
and the diffstat can be found below.


I have released -rc2 to fix a reported problem:
 
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz


I get to see  4.18.6-rc1 not rc2.


Odd.  Something is up with the kernel.org mirroring right now.  Let's
wait for people to wake up to look into it...



Same here (rc1 vs. rc2). The necessary added patch was there, so I figured you
did not update the release number and ignored it.

Guenter


With the current results on given commit id are looking good.


Wonderful, thanks for testing and letting me know.

greg k-h





Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Guenter Roeck

On 09/05/2018 03:43 AM, Greg Kroah-Hartman wrote:

On Wed, Sep 05, 2018 at 04:08:35PM +0530, Naresh Kamboju wrote:

On 5 September 2018 at 01:02, Greg Kroah-Hartman
 wrote:

On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
   
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
or in the git tree and branch at:
   git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
linux-4.18.y
and the diffstat can be found below.


I have released -rc2 to fix a reported problem:
 
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz


I get to see  4.18.6-rc1 not rc2.


Odd.  Something is up with the kernel.org mirroring right now.  Let's
wait for people to wake up to look into it...



Same here (rc1 vs. rc2). The necessary added patch was there, so I figured you
did not update the release number and ignored it.

Guenter


With the current results on given commit id are looking good.


Wonderful, thanks for testing and letting me know.

greg k-h





Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Guenter Roeck

On 09/05/2018 02:01 AM, Greg Kroah-Hartman wrote:

On Tue, Sep 04, 2018 at 09:24:34AM -0700, Guenter Roeck wrote:

On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.



Not directly related to v4.18.6-rc1. I have seen the following hang
several times with v4.18.5. It happens on a quite regular basis after
a suspend-resume cycle. CPU is Ryzen 1700X.

Guenter

---
[ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
[kworker/5:1:155]
[ 9990.762549] Modules linked in: ipt_REJECT nf_reject_ipv4 xt_multiport 
sp5100_tco squashfs iptable_filter snd_hda_codec_hdmi binfmt_misc edac_mce_amd 
kvm snd_hda_codec_realtek irqbypass snd_hda_codec_generic snd_seq_midi 
snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel snd_rawmidi aesni_intel 
snd_hda_intel aes_x86_64 crypto_simd cryptd glue_helper snd_hda_codec 
snd_hda_core wmi_bmof snd_hwdep snd_seq snd_pcm k10temp snd_seq_device 
snd_timer snd soundcore sch_fq_codel parport_pc sunrpc ppdev lp parport 
ip_tables x_tables autofs4 hid_generic nouveau mxm_wmi video ttm drm_kms_helper 
usbhid syscopyarea sysfillrect hid sysimgblt igb fb_sys_fops dca drm 
i2c_algo_bit i2c_piix4 i2c_core r8169 ahci mii libahci wmi
[ 9990.762589] CPU: 5 PID: 155 Comm: kworker/5:1 Tainted: G L
4.18.5+ #1
[ 9990.762591] Hardware name: Gigabyte Technology Co., Ltd. AB350M-Gaming 
3/AB350M-Gaming 3-CF, BIOS F23 08/08/2018
[ 9990.762596] Workqueue: events free_work
[ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
[ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 d0 49 
8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 18 83 e2 
01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89
[ 9990.762626] RSP: 0018:95ebc3effd20 EFLAGS: 0202 ORIG_RAX: 
ff13
[ 9990.762628] RAX: 000c RBX: 94eeded63cc8 RCX: 94eedef27bc0
[ 9990.762629] RDX: 0001 RSI: 0100 RDI: 94eeded63cc8
[ 9990.762630] RBP: 95ebc3effd60 R08: fff0 R09: 00ff
[ 9990.762631] R10: 94eeded63ce8 R11: 94eeded63cc8 R12: 94eeded63cc0
[ 9990.762632] R13: a6076150 R14:  R15: 0100
[ 9990.762633] FS:  () GS:94eeded4() 
knlGS:
[ 9990.762635] CS:  0010 DS:  ES:  CR0: 80050033
[ 9990.762636] CR2: 00a67000 CR3: 0006f120c000 CR4: 003406e0
[ 9990.762637] Call Trace:
[ 9990.762642]  ? load_new_mm_cr3+0xe0/0xe0
[ 9990.762644]  on_each_cpu+0x2d/0x60
[ 9990.762647]  flush_tlb_kernel_range+0x4b/0x80
[ 9990.762648]  ? vunmap_page_range+0x1fe/0x310
[ 9990.762650]  __purge_vmap_area_lazy+0x50/0xb0
[ 9990.762652]  free_vmap_area_noflush+0x7d/0x90
[ 9990.762654]  remove_vm_area+0x74/0x80
[ 9990.762656]  __vunmap+0x3b/0xc0
[ 9990.762657]  free_work+0x25/0x40
[ 9990.762660]  process_one_work+0x15e/0x3f0
[ 9990.762662]  worker_thread+0x4a/0x440
[ 9990.762664]  kthread+0x105/0x140
[ 9990.762666]  ? process_one_work+0x3f0/0x3f0
[ 9990.762668]  ? kthread_destroy_worker+0x50/0x50
[ 9990.762670]  ret_from_fork+0x22/0x40


Odd.  Do you see this on Linus's tree?



Not tested, but I see it in v4.17.19 and in v4.18.6-rc2. Turns out it is
related to heavy load, not to suspend/resume. At this point I suspect that
it may be an AMD/Ryzen specific problem - it looks like it disappears if I
add "kernel.randomize_va_space = 0" to /etc/sysctl.conf. No idea if it is a
CPU bug or some AMD specific code problem. I'll try to analyze it further.

Either case, it is not a concern for the current release since it affects
other kernel versions.

Guenter


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Guenter Roeck

On 09/05/2018 02:01 AM, Greg Kroah-Hartman wrote:

On Tue, Sep 04, 2018 at 09:24:34AM -0700, Guenter Roeck wrote:

On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.



Not directly related to v4.18.6-rc1. I have seen the following hang
several times with v4.18.5. It happens on a quite regular basis after
a suspend-resume cycle. CPU is Ryzen 1700X.

Guenter

---
[ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
[kworker/5:1:155]
[ 9990.762549] Modules linked in: ipt_REJECT nf_reject_ipv4 xt_multiport 
sp5100_tco squashfs iptable_filter snd_hda_codec_hdmi binfmt_misc edac_mce_amd 
kvm snd_hda_codec_realtek irqbypass snd_hda_codec_generic snd_seq_midi 
snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel snd_rawmidi aesni_intel 
snd_hda_intel aes_x86_64 crypto_simd cryptd glue_helper snd_hda_codec 
snd_hda_core wmi_bmof snd_hwdep snd_seq snd_pcm k10temp snd_seq_device 
snd_timer snd soundcore sch_fq_codel parport_pc sunrpc ppdev lp parport 
ip_tables x_tables autofs4 hid_generic nouveau mxm_wmi video ttm drm_kms_helper 
usbhid syscopyarea sysfillrect hid sysimgblt igb fb_sys_fops dca drm 
i2c_algo_bit i2c_piix4 i2c_core r8169 ahci mii libahci wmi
[ 9990.762589] CPU: 5 PID: 155 Comm: kworker/5:1 Tainted: G L
4.18.5+ #1
[ 9990.762591] Hardware name: Gigabyte Technology Co., Ltd. AB350M-Gaming 
3/AB350M-Gaming 3-CF, BIOS F23 08/08/2018
[ 9990.762596] Workqueue: events free_work
[ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
[ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 d0 49 
8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 18 83 e2 
01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89
[ 9990.762626] RSP: 0018:95ebc3effd20 EFLAGS: 0202 ORIG_RAX: 
ff13
[ 9990.762628] RAX: 000c RBX: 94eeded63cc8 RCX: 94eedef27bc0
[ 9990.762629] RDX: 0001 RSI: 0100 RDI: 94eeded63cc8
[ 9990.762630] RBP: 95ebc3effd60 R08: fff0 R09: 00ff
[ 9990.762631] R10: 94eeded63ce8 R11: 94eeded63cc8 R12: 94eeded63cc0
[ 9990.762632] R13: a6076150 R14:  R15: 0100
[ 9990.762633] FS:  () GS:94eeded4() 
knlGS:
[ 9990.762635] CS:  0010 DS:  ES:  CR0: 80050033
[ 9990.762636] CR2: 00a67000 CR3: 0006f120c000 CR4: 003406e0
[ 9990.762637] Call Trace:
[ 9990.762642]  ? load_new_mm_cr3+0xe0/0xe0
[ 9990.762644]  on_each_cpu+0x2d/0x60
[ 9990.762647]  flush_tlb_kernel_range+0x4b/0x80
[ 9990.762648]  ? vunmap_page_range+0x1fe/0x310
[ 9990.762650]  __purge_vmap_area_lazy+0x50/0xb0
[ 9990.762652]  free_vmap_area_noflush+0x7d/0x90
[ 9990.762654]  remove_vm_area+0x74/0x80
[ 9990.762656]  __vunmap+0x3b/0xc0
[ 9990.762657]  free_work+0x25/0x40
[ 9990.762660]  process_one_work+0x15e/0x3f0
[ 9990.762662]  worker_thread+0x4a/0x440
[ 9990.762664]  kthread+0x105/0x140
[ 9990.762666]  ? process_one_work+0x3f0/0x3f0
[ 9990.762668]  ? kthread_destroy_worker+0x50/0x50
[ 9990.762670]  ret_from_fork+0x22/0x40


Odd.  Do you see this on Linus's tree?



Not tested, but I see it in v4.17.19 and in v4.18.6-rc2. Turns out it is
related to heavy load, not to suspend/resume. At this point I suspect that
it may be an AMD/Ryzen specific problem - it looks like it disappears if I
add "kernel.randomize_va_space = 0" to /etc/sysctl.conf. No idea if it is a
CPU bug or some AMD specific code problem. I'll try to analyze it further.

Either case, it is not a concern for the current release since it affects
other kernel versions.

Guenter


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Dan Rue
On Wed, Sep 05, 2018 at 04:08:35PM +0530, Naresh Kamboju wrote:
> On 5 September 2018 at 01:02, Greg Kroah-Hartman
>  wrote:
> > On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> >> This is the start of the stable review cycle for the 4.18.6 release.
> >> There are 123 patches in this series, all will be posted as a response
> >> to this one.  If anyone has any issues with these being applied, please
> >> let me know.
> >>
> >> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> >> Anything received after that time might be too late.
> >>
> >> The whole patch series can be found in one patch at:
> >>   
> >> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
> >> or in the git tree and branch at:
> >>   
> >> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
> >> linux-4.18.y
> >> and the diffstat can be found below.
> >
> > I have released -rc2 to fix a reported problem:
> > 
> > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz
> 
> I get to see  4.18.6-rc1 not rc2.
> With the current results on given commit id are looking good.
> 
> Results from Linaro’s test farm.
> No regressions on arm64, arm and x86_64.

You may have noticed i386 listed below under Environments. This was
added last week, and runs functional testing on an i386 kernel under
QEMU emulation, as well as on x86_64 server hardware. This also accounts
for our total test count (unique tests * test environments) surpassing
20,000.

We'll therefore be updating the email header to read:

No regressions on arm64, arm, x86_64, and i386.

Thanks,
Dan

> 
> Summary
> 
> 
> kernel: 4.18.6-rc1
> git repo: 
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
> git branch: linux-4.18.y
> git commit: a6a229cf7e7f147eb6d118815a01758749fa6e8d
> git describe: v4.18.5-124-ga6a229cf7e7f
> Test details: 
> https://qa-reports.linaro.org/lkft/linux-stable-rc-4.18-oe/build/v4.18.5-124-ga6a229cf7e7f
> 
> 
> No regressions (compared to build v4.18.5)
> 
> 
> Ran 21181 total tests in the following environments and test suites.
> 
> Environments
> --
> - dragonboard-410c - arm64
> - hi6220-hikey - arm64
> - i386
> - juno-r2 - arm64
> - qemu_arm
> - qemu_arm64
> - qemu_i386
> - qemu_x86_64
> - x15 - arm
> - x86_64
> 
> Test Suites
> ---
> * boot
> * kselftest
> * libhugetlbfs
> * ltp-cap_bounds-tests
> * ltp-containers-tests
> * ltp-cve-tests
> * ltp-fcntl-locktests-tests
> * ltp-filecaps-tests
> * ltp-fs-tests > * ltp-fs_bind-tests > * ltp-fs_perms_simple-tests
> * ltp-fsx-tests
> * ltp-hugetlb-tests
> * ltp-io-tests
> * ltp-ipc-tests
> * ltp-math-tests
> * ltp-nptl-tests
> * ltp-pty-tests
> * ltp-sched-tests
> * ltp-securebits-tests
> * ltp-syscalls-tests
> * ltp-timers-tests
> * prep-inline
> * ltp-open-posix-tests
> * kselftest-vsyscall-mode-native
> * kselftest-vsyscall-mode-none
> 
> -- 
> Linaro LKFT
> https://lkft.linaro.org
> 
> >


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Dan Rue
On Wed, Sep 05, 2018 at 04:08:35PM +0530, Naresh Kamboju wrote:
> On 5 September 2018 at 01:02, Greg Kroah-Hartman
>  wrote:
> > On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> >> This is the start of the stable review cycle for the 4.18.6 release.
> >> There are 123 patches in this series, all will be posted as a response
> >> to this one.  If anyone has any issues with these being applied, please
> >> let me know.
> >>
> >> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> >> Anything received after that time might be too late.
> >>
> >> The whole patch series can be found in one patch at:
> >>   
> >> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
> >> or in the git tree and branch at:
> >>   
> >> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
> >> linux-4.18.y
> >> and the diffstat can be found below.
> >
> > I have released -rc2 to fix a reported problem:
> > 
> > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz
> 
> I get to see  4.18.6-rc1 not rc2.
> With the current results on given commit id are looking good.
> 
> Results from Linaro’s test farm.
> No regressions on arm64, arm and x86_64.

You may have noticed i386 listed below under Environments. This was
added last week, and runs functional testing on an i386 kernel under
QEMU emulation, as well as on x86_64 server hardware. This also accounts
for our total test count (unique tests * test environments) surpassing
20,000.

We'll therefore be updating the email header to read:

No regressions on arm64, arm, x86_64, and i386.

Thanks,
Dan

> 
> Summary
> 
> 
> kernel: 4.18.6-rc1
> git repo: 
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
> git branch: linux-4.18.y
> git commit: a6a229cf7e7f147eb6d118815a01758749fa6e8d
> git describe: v4.18.5-124-ga6a229cf7e7f
> Test details: 
> https://qa-reports.linaro.org/lkft/linux-stable-rc-4.18-oe/build/v4.18.5-124-ga6a229cf7e7f
> 
> 
> No regressions (compared to build v4.18.5)
> 
> 
> Ran 21181 total tests in the following environments and test suites.
> 
> Environments
> --
> - dragonboard-410c - arm64
> - hi6220-hikey - arm64
> - i386
> - juno-r2 - arm64
> - qemu_arm
> - qemu_arm64
> - qemu_i386
> - qemu_x86_64
> - x15 - arm
> - x86_64
> 
> Test Suites
> ---
> * boot
> * kselftest
> * libhugetlbfs
> * ltp-cap_bounds-tests
> * ltp-containers-tests
> * ltp-cve-tests
> * ltp-fcntl-locktests-tests
> * ltp-filecaps-tests
> * ltp-fs-tests > * ltp-fs_bind-tests > * ltp-fs_perms_simple-tests
> * ltp-fsx-tests
> * ltp-hugetlb-tests
> * ltp-io-tests
> * ltp-ipc-tests
> * ltp-math-tests
> * ltp-nptl-tests
> * ltp-pty-tests
> * ltp-sched-tests
> * ltp-securebits-tests
> * ltp-syscalls-tests
> * ltp-timers-tests
> * prep-inline
> * ltp-open-posix-tests
> * kselftest-vsyscall-mode-native
> * kselftest-vsyscall-mode-none
> 
> -- 
> Linaro LKFT
> https://lkft.linaro.org
> 
> >


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Greg Kroah-Hartman
On Wed, Sep 05, 2018 at 04:08:35PM +0530, Naresh Kamboju wrote:
> On 5 September 2018 at 01:02, Greg Kroah-Hartman
>  wrote:
> > On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> >> This is the start of the stable review cycle for the 4.18.6 release.
> >> There are 123 patches in this series, all will be posted as a response
> >> to this one.  If anyone has any issues with these being applied, please
> >> let me know.
> >>
> >> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> >> Anything received after that time might be too late.
> >>
> >> The whole patch series can be found in one patch at:
> >>   
> >> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
> >> or in the git tree and branch at:
> >>   
> >> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
> >> linux-4.18.y
> >> and the diffstat can be found below.
> >
> > I have released -rc2 to fix a reported problem:
> > 
> > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz
> 
> I get to see  4.18.6-rc1 not rc2.

Odd.  Something is up with the kernel.org mirroring right now.  Let's
wait for people to wake up to look into it...

> With the current results on given commit id are looking good.

Wonderful, thanks for testing and letting me know.

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Greg Kroah-Hartman
On Wed, Sep 05, 2018 at 04:08:35PM +0530, Naresh Kamboju wrote:
> On 5 September 2018 at 01:02, Greg Kroah-Hartman
>  wrote:
> > On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> >> This is the start of the stable review cycle for the 4.18.6 release.
> >> There are 123 patches in this series, all will be posted as a response
> >> to this one.  If anyone has any issues with these being applied, please
> >> let me know.
> >>
> >> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> >> Anything received after that time might be too late.
> >>
> >> The whole patch series can be found in one patch at:
> >>   
> >> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
> >> or in the git tree and branch at:
> >>   
> >> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
> >> linux-4.18.y
> >> and the diffstat can be found below.
> >
> > I have released -rc2 to fix a reported problem:
> > 
> > https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz
> 
> I get to see  4.18.6-rc1 not rc2.

Odd.  Something is up with the kernel.org mirroring right now.  Let's
wait for people to wake up to look into it...

> With the current results on given commit id are looking good.

Wonderful, thanks for testing and letting me know.

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Naresh Kamboju
On 5 September 2018 at 01:02, Greg Kroah-Hartman
 wrote:
> On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
>> This is the start of the stable review cycle for the 4.18.6 release.
>> There are 123 patches in this series, all will be posted as a response
>> to this one.  If anyone has any issues with these being applied, please
>> let me know.
>>
>> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
>> Anything received after that time might be too late.
>>
>> The whole patch series can be found in one patch at:
>>   
>> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
>> or in the git tree and branch at:
>>   
>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
>> linux-4.18.y
>> and the diffstat can be found below.
>
> I have released -rc2 to fix a reported problem:
> 
> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz

I get to see  4.18.6-rc1 not rc2.
With the current results on given commit id are looking good.

Results from Linaro’s test farm.
No regressions on arm64, arm and x86_64.

Summary


kernel: 4.18.6-rc1
git repo: 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
git branch: linux-4.18.y
git commit: a6a229cf7e7f147eb6d118815a01758749fa6e8d
git describe: v4.18.5-124-ga6a229cf7e7f
Test details: 
https://qa-reports.linaro.org/lkft/linux-stable-rc-4.18-oe/build/v4.18.5-124-ga6a229cf7e7f


No regressions (compared to build v4.18.5)


Ran 21181 total tests in the following environments and test suites.

Environments
--
- dragonboard-410c - arm64
- hi6220-hikey - arm64
- i386
- juno-r2 - arm64
- qemu_arm
- qemu_arm64
- qemu_i386
- qemu_x86_64
- x15 - arm
- x86_64

Test Suites
---
* boot
* kselftest
* libhugetlbfs
* ltp-cap_bounds-tests
* ltp-containers-tests
* ltp-cve-tests
* ltp-fcntl-locktests-tests
* ltp-filecaps-tests
* ltp-fs-tests
* ltp-fs_bind-tests
* ltp-fs_perms_simple-tests
* ltp-fsx-tests
* ltp-hugetlb-tests
* ltp-io-tests
* ltp-ipc-tests
* ltp-math-tests
* ltp-nptl-tests
* ltp-pty-tests
* ltp-sched-tests
* ltp-securebits-tests
* ltp-syscalls-tests
* ltp-timers-tests
* prep-inline
* ltp-open-posix-tests
* kselftest-vsyscall-mode-native
* kselftest-vsyscall-mode-none

-- 
Linaro LKFT
https://lkft.linaro.org

>


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Naresh Kamboju
On 5 September 2018 at 01:02, Greg Kroah-Hartman
 wrote:
> On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
>> This is the start of the stable review cycle for the 4.18.6 release.
>> There are 123 patches in this series, all will be posted as a response
>> to this one.  If anyone has any issues with these being applied, please
>> let me know.
>>
>> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
>> Anything received after that time might be too late.
>>
>> The whole patch series can be found in one patch at:
>>   
>> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
>> or in the git tree and branch at:
>>   
>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
>> linux-4.18.y
>> and the diffstat can be found below.
>
> I have released -rc2 to fix a reported problem:
> 
> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz

I get to see  4.18.6-rc1 not rc2.
With the current results on given commit id are looking good.

Results from Linaro’s test farm.
No regressions on arm64, arm and x86_64.

Summary


kernel: 4.18.6-rc1
git repo: 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
git branch: linux-4.18.y
git commit: a6a229cf7e7f147eb6d118815a01758749fa6e8d
git describe: v4.18.5-124-ga6a229cf7e7f
Test details: 
https://qa-reports.linaro.org/lkft/linux-stable-rc-4.18-oe/build/v4.18.5-124-ga6a229cf7e7f


No regressions (compared to build v4.18.5)


Ran 21181 total tests in the following environments and test suites.

Environments
--
- dragonboard-410c - arm64
- hi6220-hikey - arm64
- i386
- juno-r2 - arm64
- qemu_arm
- qemu_arm64
- qemu_i386
- qemu_x86_64
- x15 - arm
- x86_64

Test Suites
---
* boot
* kselftest
* libhugetlbfs
* ltp-cap_bounds-tests
* ltp-containers-tests
* ltp-cve-tests
* ltp-fcntl-locktests-tests
* ltp-filecaps-tests
* ltp-fs-tests
* ltp-fs_bind-tests
* ltp-fs_perms_simple-tests
* ltp-fsx-tests
* ltp-hugetlb-tests
* ltp-io-tests
* ltp-ipc-tests
* ltp-math-tests
* ltp-nptl-tests
* ltp-pty-tests
* ltp-sched-tests
* ltp-securebits-tests
* ltp-syscalls-tests
* ltp-timers-tests
* prep-inline
* ltp-open-posix-tests
* kselftest-vsyscall-mode-native
* kselftest-vsyscall-mode-none

-- 
Linaro LKFT
https://lkft.linaro.org

>


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Greg Kroah-Hartman
On Tue, Sep 04, 2018 at 09:24:34AM -0700, Guenter Roeck wrote:
> On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 4.18.6 release.
> > There are 123 patches in this series, all will be posted as a response
> > to this one.  If anyone has any issues with these being applied, please
> > let me know.
> > 
> > Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> > Anything received after that time might be too late.
> > 
> 
> Not directly related to v4.18.6-rc1. I have seen the following hang
> several times with v4.18.5. It happens on a quite regular basis after
> a suspend-resume cycle. CPU is Ryzen 1700X.
> 
> Guenter
> 
> ---
> [ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
> [kworker/5:1:155]
> [ 9990.762549] Modules linked in: ipt_REJECT nf_reject_ipv4 xt_multiport 
> sp5100_tco squashfs iptable_filter snd_hda_codec_hdmi binfmt_misc 
> edac_mce_amd kvm snd_hda_codec_realtek irqbypass snd_hda_codec_generic 
> snd_seq_midi snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel 
> snd_rawmidi aesni_intel snd_hda_intel aes_x86_64 crypto_simd cryptd 
> glue_helper snd_hda_codec snd_hda_core wmi_bmof snd_hwdep snd_seq snd_pcm 
> k10temp snd_seq_device snd_timer snd soundcore sch_fq_codel parport_pc sunrpc 
> ppdev lp parport ip_tables x_tables autofs4 hid_generic nouveau mxm_wmi video 
> ttm drm_kms_helper usbhid syscopyarea sysfillrect hid sysimgblt igb 
> fb_sys_fops dca drm i2c_algo_bit i2c_piix4 i2c_core r8169 ahci mii libahci wmi
> [ 9990.762589] CPU: 5 PID: 155 Comm: kworker/5:1 Tainted: G L
> 4.18.5+ #1
> [ 9990.762591] Hardware name: Gigabyte Technology Co., Ltd. AB350M-Gaming 
> 3/AB350M-Gaming 3-CF, BIOS F23 08/08/2018
> [ 9990.762596] Workqueue: events free_work
> [ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
> [ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 
> d0 49 8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 
> 18 83 e2 01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89 
> [ 9990.762626] RSP: 0018:95ebc3effd20 EFLAGS: 0202 ORIG_RAX: 
> ff13
> [ 9990.762628] RAX: 000c RBX: 94eeded63cc8 RCX: 
> 94eedef27bc0
> [ 9990.762629] RDX: 0001 RSI: 0100 RDI: 
> 94eeded63cc8
> [ 9990.762630] RBP: 95ebc3effd60 R08: fff0 R09: 
> 00ff
> [ 9990.762631] R10: 94eeded63ce8 R11: 94eeded63cc8 R12: 
> 94eeded63cc0
> [ 9990.762632] R13: a6076150 R14:  R15: 
> 0100
> [ 9990.762633] FS:  () GS:94eeded4() 
> knlGS:
> [ 9990.762635] CS:  0010 DS:  ES:  CR0: 80050033
> [ 9990.762636] CR2: 00a67000 CR3: 0006f120c000 CR4: 
> 003406e0
> [ 9990.762637] Call Trace:
> [ 9990.762642]  ? load_new_mm_cr3+0xe0/0xe0
> [ 9990.762644]  on_each_cpu+0x2d/0x60
> [ 9990.762647]  flush_tlb_kernel_range+0x4b/0x80
> [ 9990.762648]  ? vunmap_page_range+0x1fe/0x310
> [ 9990.762650]  __purge_vmap_area_lazy+0x50/0xb0
> [ 9990.762652]  free_vmap_area_noflush+0x7d/0x90
> [ 9990.762654]  remove_vm_area+0x74/0x80
> [ 9990.762656]  __vunmap+0x3b/0xc0
> [ 9990.762657]  free_work+0x25/0x40
> [ 9990.762660]  process_one_work+0x15e/0x3f0
> [ 9990.762662]  worker_thread+0x4a/0x440
> [ 9990.762664]  kthread+0x105/0x140
> [ 9990.762666]  ? process_one_work+0x3f0/0x3f0
> [ 9990.762668]  ? kthread_destroy_worker+0x50/0x50
> [ 9990.762670]  ret_from_fork+0x22/0x40

Odd.  Do you see this on Linus's tree?

thanks,

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Greg Kroah-Hartman
On Tue, Sep 04, 2018 at 09:24:34AM -0700, Guenter Roeck wrote:
> On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 4.18.6 release.
> > There are 123 patches in this series, all will be posted as a response
> > to this one.  If anyone has any issues with these being applied, please
> > let me know.
> > 
> > Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> > Anything received after that time might be too late.
> > 
> 
> Not directly related to v4.18.6-rc1. I have seen the following hang
> several times with v4.18.5. It happens on a quite regular basis after
> a suspend-resume cycle. CPU is Ryzen 1700X.
> 
> Guenter
> 
> ---
> [ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
> [kworker/5:1:155]
> [ 9990.762549] Modules linked in: ipt_REJECT nf_reject_ipv4 xt_multiport 
> sp5100_tco squashfs iptable_filter snd_hda_codec_hdmi binfmt_misc 
> edac_mce_amd kvm snd_hda_codec_realtek irqbypass snd_hda_codec_generic 
> snd_seq_midi snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel 
> snd_rawmidi aesni_intel snd_hda_intel aes_x86_64 crypto_simd cryptd 
> glue_helper snd_hda_codec snd_hda_core wmi_bmof snd_hwdep snd_seq snd_pcm 
> k10temp snd_seq_device snd_timer snd soundcore sch_fq_codel parport_pc sunrpc 
> ppdev lp parport ip_tables x_tables autofs4 hid_generic nouveau mxm_wmi video 
> ttm drm_kms_helper usbhid syscopyarea sysfillrect hid sysimgblt igb 
> fb_sys_fops dca drm i2c_algo_bit i2c_piix4 i2c_core r8169 ahci mii libahci wmi
> [ 9990.762589] CPU: 5 PID: 155 Comm: kworker/5:1 Tainted: G L
> 4.18.5+ #1
> [ 9990.762591] Hardware name: Gigabyte Technology Co., Ltd. AB350M-Gaming 
> 3/AB350M-Gaming 3-CF, BIOS F23 08/08/2018
> [ 9990.762596] Workqueue: events free_work
> [ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
> [ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 
> d0 49 8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 
> 18 83 e2 01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89 
> [ 9990.762626] RSP: 0018:95ebc3effd20 EFLAGS: 0202 ORIG_RAX: 
> ff13
> [ 9990.762628] RAX: 000c RBX: 94eeded63cc8 RCX: 
> 94eedef27bc0
> [ 9990.762629] RDX: 0001 RSI: 0100 RDI: 
> 94eeded63cc8
> [ 9990.762630] RBP: 95ebc3effd60 R08: fff0 R09: 
> 00ff
> [ 9990.762631] R10: 94eeded63ce8 R11: 94eeded63cc8 R12: 
> 94eeded63cc0
> [ 9990.762632] R13: a6076150 R14:  R15: 
> 0100
> [ 9990.762633] FS:  () GS:94eeded4() 
> knlGS:
> [ 9990.762635] CS:  0010 DS:  ES:  CR0: 80050033
> [ 9990.762636] CR2: 00a67000 CR3: 0006f120c000 CR4: 
> 003406e0
> [ 9990.762637] Call Trace:
> [ 9990.762642]  ? load_new_mm_cr3+0xe0/0xe0
> [ 9990.762644]  on_each_cpu+0x2d/0x60
> [ 9990.762647]  flush_tlb_kernel_range+0x4b/0x80
> [ 9990.762648]  ? vunmap_page_range+0x1fe/0x310
> [ 9990.762650]  __purge_vmap_area_lazy+0x50/0xb0
> [ 9990.762652]  free_vmap_area_noflush+0x7d/0x90
> [ 9990.762654]  remove_vm_area+0x74/0x80
> [ 9990.762656]  __vunmap+0x3b/0xc0
> [ 9990.762657]  free_work+0x25/0x40
> [ 9990.762660]  process_one_work+0x15e/0x3f0
> [ 9990.762662]  worker_thread+0x4a/0x440
> [ 9990.762664]  kthread+0x105/0x140
> [ 9990.762666]  ? process_one_work+0x3f0/0x3f0
> [ 9990.762668]  ? kthread_destroy_worker+0x50/0x50
> [ 9990.762670]  ret_from_fork+0x22/0x40

Odd.  Do you see this on Linus's tree?

thanks,

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Greg Kroah-Hartman
On Tue, Sep 04, 2018 at 03:53:32PM -0700, Guenter Roeck wrote:
> On 09/03/2018 09:55 AM, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 4.18.6 release.
> > There are 123 patches in this series, all will be posted as a response
> > to this one.  If anyone has any issues with these being applied, please
> > let me know.
> > 
> > Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> > Anything received after that time might be too late.
> > 
> 
> 
> Build results:
>   total: 136 pass: 136 fail: 0
> Qemu test results:
>   total: 314 pass: 314 fail: 0
> 
> Details are available at https://kerneltests.org/builders/.

Thanks for testing all of these and letting me know.

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-05 Thread Greg Kroah-Hartman
On Tue, Sep 04, 2018 at 03:53:32PM -0700, Guenter Roeck wrote:
> On 09/03/2018 09:55 AM, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 4.18.6 release.
> > There are 123 patches in this series, all will be posted as a response
> > to this one.  If anyone has any issues with these being applied, please
> > let me know.
> > 
> > Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> > Anything received after that time might be too late.
> > 
> 
> 
> Build results:
>   total: 136 pass: 136 fail: 0
> Qemu test results:
>   total: 314 pass: 314 fail: 0
> 
> Details are available at https://kerneltests.org/builders/.

Thanks for testing all of these and letting me know.

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Guenter Roeck

On 09/03/2018 09:55 AM, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.




Build results:
total: 136 pass: 136 fail: 0
Qemu test results:
total: 314 pass: 314 fail: 0

Details are available at https://kerneltests.org/builders/.

Guenter


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Guenter Roeck

On 09/03/2018 09:55 AM, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.




Build results:
total: 136 pass: 136 fail: 0
Qemu test results:
total: 314 pass: 314 fail: 0

Details are available at https://kerneltests.org/builders/.

Guenter


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Shuah Khan
On 09/04/2018 01:32 PM, Greg Kroah-Hartman wrote:
> On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
>> This is the start of the stable review cycle for the 4.18.6 release.
>> There are 123 patches in this series, all will be posted as a response
>> to this one.  If anyone has any issues with these being applied, please
>> let me know.
>>
>> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
>> Anything received after that time might be too late.
>>
>> The whole patch series can be found in one patch at:
>>  
>> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
>> or in the git tree and branch at:
>>  
>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
>> linux-4.18.y
>> and the diffstat can be found below.
> 
> I have released -rc2 to fix a reported problem:
>   
> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz
> 
> 

It hasn't shown up on kernel.org yet. Found patch-4.14.68-rc2.gz

thanks,
-- Shuah


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Shuah Khan
On 09/04/2018 01:32 PM, Greg Kroah-Hartman wrote:
> On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
>> This is the start of the stable review cycle for the 4.18.6 release.
>> There are 123 patches in this series, all will be posted as a response
>> to this one.  If anyone has any issues with these being applied, please
>> let me know.
>>
>> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
>> Anything received after that time might be too late.
>>
>> The whole patch series can be found in one patch at:
>>  
>> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
>> or in the git tree and branch at:
>>  
>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
>> linux-4.18.y
>> and the diffstat can be found below.
> 
> I have released -rc2 to fix a reported problem:
>   
> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz
> 
> 

It hasn't shown up on kernel.org yet. Found patch-4.14.68-rc2.gz

thanks,
-- Shuah


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Greg Kroah-Hartman
On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.18.6 release.
> There are 123 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
>   
> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
> or in the git tree and branch at:
>   
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
> linux-4.18.y
> and the diffstat can be found below.

I have released -rc2 to fix a reported problem:

https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz



Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Greg Kroah-Hartman
On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.18.6 release.
> There are 123 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
>   
> https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
> or in the git tree and branch at:
>   
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
> linux-4.18.y
> and the diffstat can be found below.

I have released -rc2 to fix a reported problem:

https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc2.gz



Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Greg Kroah-Hartman
On Tue, Sep 04, 2018 at 10:12:13AM -0700, Linus Torvalds wrote:
> On Mon, Sep 3, 2018 at 11:39 AM Holger Hoffstätte
>  wrote:
> >
> > Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
> > Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> > Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> > ..a few hundred times..
> > Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> > Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> > Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
> > Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
> 
> Yeah, so what seems to have happened is that commit db7ddef30112 ("mm:
> move tlb_table_flush to tlb_flush_mmu_free") wasn't applied to the
> stable tree (because it wasn't an obvious dependency).
> 
> And without that, the backport of d86564a2f085 ("mm/tlb, x86/mm:
> Support invalidating TLB caches for RCU_TABLE_FREE") ends up with
> recursion from tlb_flush_mmu_tlbonly() calling tlb_table_flush(),
> which in turn calls tlb_table_invalidate(), which calls back to
> tlb_flush_mmu_tlbonly().
> 
> So you have endless recursion - at least until you run out of stack.
> Then, if you have VMAP_STACK enabled (x86-64 without KASAN), you get a
> nice clean kernel stack overflow message like you did.
> 
> Or if you have KASAN enabled and no VMAP stack, you just end up with
> random hangs and huge memory corruption as the recursion stomps all
> over your memory.

Ok, I will go queue this patch up now, it was in my very-long "to-apply"
queue, but I didn't catch the dependancy here.

thanks,

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Greg Kroah-Hartman
On Tue, Sep 04, 2018 at 10:12:13AM -0700, Linus Torvalds wrote:
> On Mon, Sep 3, 2018 at 11:39 AM Holger Hoffstätte
>  wrote:
> >
> > Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
> > Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> > Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> > ..a few hundred times..
> > Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> > Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> > Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
> > Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
> 
> Yeah, so what seems to have happened is that commit db7ddef30112 ("mm:
> move tlb_table_flush to tlb_flush_mmu_free") wasn't applied to the
> stable tree (because it wasn't an obvious dependency).
> 
> And without that, the backport of d86564a2f085 ("mm/tlb, x86/mm:
> Support invalidating TLB caches for RCU_TABLE_FREE") ends up with
> recursion from tlb_flush_mmu_tlbonly() calling tlb_table_flush(),
> which in turn calls tlb_table_invalidate(), which calls back to
> tlb_flush_mmu_tlbonly().
> 
> So you have endless recursion - at least until you run out of stack.
> Then, if you have VMAP_STACK enabled (x86-64 without KASAN), you get a
> nice clean kernel stack overflow message like you did.
> 
> Or if you have KASAN enabled and no VMAP stack, you just end up with
> random hangs and huge memory corruption as the recursion stomps all
> over your memory.

Ok, I will go queue this patch up now, it was in my very-long "to-apply"
queue, but I didn't catch the dependancy here.

thanks,

greg k-h


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Linus Torvalds
On Mon, Sep 3, 2018 at 11:39 AM Holger Hoffstätte
 wrote:
>
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> ..a few hundred times..
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
> Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30

Yeah, so what seems to have happened is that commit db7ddef30112 ("mm:
move tlb_table_flush to tlb_flush_mmu_free") wasn't applied to the
stable tree (because it wasn't an obvious dependency).

And without that, the backport of d86564a2f085 ("mm/tlb, x86/mm:
Support invalidating TLB caches for RCU_TABLE_FREE") ends up with
recursion from tlb_flush_mmu_tlbonly() calling tlb_table_flush(),
which in turn calls tlb_table_invalidate(), which calls back to
tlb_flush_mmu_tlbonly().

So you have endless recursion - at least until you run out of stack.
Then, if you have VMAP_STACK enabled (x86-64 without KASAN), you get a
nice clean kernel stack overflow message like you did.

Or if you have KASAN enabled and no VMAP stack, you just end up with
random hangs and huge memory corruption as the recursion stomps all
over your memory.

  Linus


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Linus Torvalds
On Mon, Sep 3, 2018 at 11:39 AM Holger Hoffstätte
 wrote:
>
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> ..a few hundred times..
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
> Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30

Yeah, so what seems to have happened is that commit db7ddef30112 ("mm:
move tlb_table_flush to tlb_flush_mmu_free") wasn't applied to the
stable tree (because it wasn't an obvious dependency).

And without that, the backport of d86564a2f085 ("mm/tlb, x86/mm:
Support invalidating TLB caches for RCU_TABLE_FREE") ends up with
recursion from tlb_flush_mmu_tlbonly() calling tlb_table_flush(),
which in turn calls tlb_table_invalidate(), which calls back to
tlb_flush_mmu_tlbonly().

So you have endless recursion - at least until you run out of stack.
Then, if you have VMAP_STACK enabled (x86-64 without KASAN), you get a
nice clean kernel stack overflow message like you did.

Or if you have KASAN enabled and no VMAP stack, you just end up with
random hangs and huge memory corruption as the recursion stomps all
over your memory.

  Linus


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Guenter Roeck
On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.18.6 release.
> There are 123 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> Anything received after that time might be too late.
> 

Not directly related to v4.18.6-rc1. I have seen the following hang
several times with v4.18.5. It happens on a quite regular basis after
a suspend-resume cycle. CPU is Ryzen 1700X.

Guenter

---
[ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
[kworker/5:1:155]
[ 9990.762549] Modules linked in: ipt_REJECT nf_reject_ipv4 xt_multiport 
sp5100_tco squashfs iptable_filter snd_hda_codec_hdmi binfmt_misc edac_mce_amd 
kvm snd_hda_codec_realtek irqbypass snd_hda_codec_generic snd_seq_midi 
snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel snd_rawmidi aesni_intel 
snd_hda_intel aes_x86_64 crypto_simd cryptd glue_helper snd_hda_codec 
snd_hda_core wmi_bmof snd_hwdep snd_seq snd_pcm k10temp snd_seq_device 
snd_timer snd soundcore sch_fq_codel parport_pc sunrpc ppdev lp parport 
ip_tables x_tables autofs4 hid_generic nouveau mxm_wmi video ttm drm_kms_helper 
usbhid syscopyarea sysfillrect hid sysimgblt igb fb_sys_fops dca drm 
i2c_algo_bit i2c_piix4 i2c_core r8169 ahci mii libahci wmi
[ 9990.762589] CPU: 5 PID: 155 Comm: kworker/5:1 Tainted: G L
4.18.5+ #1
[ 9990.762591] Hardware name: Gigabyte Technology Co., Ltd. AB350M-Gaming 
3/AB350M-Gaming 3-CF, BIOS F23 08/08/2018
[ 9990.762596] Workqueue: events free_work
[ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
[ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 
d0 49 8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 18 
83 e2 01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89 
[ 9990.762626] RSP: 0018:95ebc3effd20 EFLAGS: 0202 ORIG_RAX: 
ff13
[ 9990.762628] RAX: 000c RBX: 94eeded63cc8 RCX: 94eedef27bc0
[ 9990.762629] RDX: 0001 RSI: 0100 RDI: 94eeded63cc8
[ 9990.762630] RBP: 95ebc3effd60 R08: fff0 R09: 00ff
[ 9990.762631] R10: 94eeded63ce8 R11: 94eeded63cc8 R12: 94eeded63cc0
[ 9990.762632] R13: a6076150 R14:  R15: 0100
[ 9990.762633] FS:  () GS:94eeded4() 
knlGS:
[ 9990.762635] CS:  0010 DS:  ES:  CR0: 80050033
[ 9990.762636] CR2: 00a67000 CR3: 0006f120c000 CR4: 003406e0
[ 9990.762637] Call Trace:
[ 9990.762642]  ? load_new_mm_cr3+0xe0/0xe0
[ 9990.762644]  on_each_cpu+0x2d/0x60
[ 9990.762647]  flush_tlb_kernel_range+0x4b/0x80
[ 9990.762648]  ? vunmap_page_range+0x1fe/0x310
[ 9990.762650]  __purge_vmap_area_lazy+0x50/0xb0
[ 9990.762652]  free_vmap_area_noflush+0x7d/0x90
[ 9990.762654]  remove_vm_area+0x74/0x80
[ 9990.762656]  __vunmap+0x3b/0xc0
[ 9990.762657]  free_work+0x25/0x40
[ 9990.762660]  process_one_work+0x15e/0x3f0
[ 9990.762662]  worker_thread+0x4a/0x440
[ 9990.762664]  kthread+0x105/0x140
[ 9990.762666]  ? process_one_work+0x3f0/0x3f0
[ 9990.762668]  ? kthread_destroy_worker+0x50/0x50
[ 9990.762670]  ret_from_fork+0x22/0x40


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-04 Thread Guenter Roeck
On Mon, Sep 03, 2018 at 06:55:44PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.18.6 release.
> There are 123 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
> Anything received after that time might be too late.
> 

Not directly related to v4.18.6-rc1. I have seen the following hang
several times with v4.18.5. It happens on a quite regular basis after
a suspend-resume cycle. CPU is Ryzen 1700X.

Guenter

---
[ 9990.754641] watchdog: BUG: soft lockup - CPU#5 stuck for 22s! 
[kworker/5:1:155]
[ 9990.762549] Modules linked in: ipt_REJECT nf_reject_ipv4 xt_multiport 
sp5100_tco squashfs iptable_filter snd_hda_codec_hdmi binfmt_misc edac_mce_amd 
kvm snd_hda_codec_realtek irqbypass snd_hda_codec_generic snd_seq_midi 
snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel snd_rawmidi aesni_intel 
snd_hda_intel aes_x86_64 crypto_simd cryptd glue_helper snd_hda_codec 
snd_hda_core wmi_bmof snd_hwdep snd_seq snd_pcm k10temp snd_seq_device 
snd_timer snd soundcore sch_fq_codel parport_pc sunrpc ppdev lp parport 
ip_tables x_tables autofs4 hid_generic nouveau mxm_wmi video ttm drm_kms_helper 
usbhid syscopyarea sysfillrect hid sysimgblt igb fb_sys_fops dca drm 
i2c_algo_bit i2c_piix4 i2c_core r8169 ahci mii libahci wmi
[ 9990.762589] CPU: 5 PID: 155 Comm: kworker/5:1 Tainted: G L
4.18.5+ #1
[ 9990.762591] Hardware name: Gigabyte Technology Co., Ltd. AB350M-Gaming 
3/AB350M-Gaming 3-CF, BIOS F23 08/08/2018
[ 9990.762596] Workqueue: events free_work
[ 9990.762601] RIP: 0010:smp_call_function_many+0x208/0x270
[ 9990.762601] Code: e8 0d d1 77 00 3b 05 cb f0 24 01 0f 83 86 fe ff ff 48 63 
d0 49 8b 0c 24 48 03 0c d5 00 f7 11 a7 8b 51 18 83 e2 01 74 0a f3 90 <8b> 51 18 
83 e2 01 75 f6 eb c7 0f b6 4d d0 4c 89 f2 4c 89 ee 44 89 
[ 9990.762626] RSP: 0018:95ebc3effd20 EFLAGS: 0202 ORIG_RAX: 
ff13
[ 9990.762628] RAX: 000c RBX: 94eeded63cc8 RCX: 94eedef27bc0
[ 9990.762629] RDX: 0001 RSI: 0100 RDI: 94eeded63cc8
[ 9990.762630] RBP: 95ebc3effd60 R08: fff0 R09: 00ff
[ 9990.762631] R10: 94eeded63ce8 R11: 94eeded63cc8 R12: 94eeded63cc0
[ 9990.762632] R13: a6076150 R14:  R15: 0100
[ 9990.762633] FS:  () GS:94eeded4() 
knlGS:
[ 9990.762635] CS:  0010 DS:  ES:  CR0: 80050033
[ 9990.762636] CR2: 00a67000 CR3: 0006f120c000 CR4: 003406e0
[ 9990.762637] Call Trace:
[ 9990.762642]  ? load_new_mm_cr3+0xe0/0xe0
[ 9990.762644]  on_each_cpu+0x2d/0x60
[ 9990.762647]  flush_tlb_kernel_range+0x4b/0x80
[ 9990.762648]  ? vunmap_page_range+0x1fe/0x310
[ 9990.762650]  __purge_vmap_area_lazy+0x50/0xb0
[ 9990.762652]  free_vmap_area_noflush+0x7d/0x90
[ 9990.762654]  remove_vm_area+0x74/0x80
[ 9990.762656]  __vunmap+0x3b/0xc0
[ 9990.762657]  free_work+0x25/0x40
[ 9990.762660]  process_one_work+0x15e/0x3f0
[ 9990.762662]  worker_thread+0x4a/0x440
[ 9990.762664]  kthread+0x105/0x140
[ 9990.762666]  ? process_one_work+0x3f0/0x3f0
[ 9990.762668]  ? kthread_destroy_worker+0x50/0x50
[ 9990.762670]  ret_from_fork+0x22/0x40


Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread Naresh Kamboju
On 4 September 2018 at 02:46, François Valenduc
 wrote:
> Le 3/09/18 à 20:39, Holger Hoffstätte a écrit :
>> On 09/03/18 18:55, Greg Kroah-Hartman wrote:
>>> This is the start of the stable review cycle for the 4.18.6 release.
>>
>> Unfortunately this is busted. First blamed my custom patches, but as it
>> turns out a 100% vanilla 4.18.6 build crashes as well. Single-user starts,
>> but later when starting services and esp. autofs (I think - too much
>> output)
>> explodes with:
>>
>> ...
>> Sep  3 20:19:36 ragnarok kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link
>> is not ready
>> Sep  3 20:19:38 ragnarok kernel: BUG: stack guard page was hit at
>> ab58c99c (stack is 382b9464..d642b9d6)
>> Sep  3 20:19:38 ragnarok kernel: kernel stack overflow (double-fault):
>>  [#1] SMP
>> Sep  3 20:19:38 ragnarok kernel: CPU: 4 PID: 3634 Comm: automount
>> Tainted: G   O  4.18.6 #1
>> Sep  3 20:19:38 ragnarok kernel: Hardware name: Gigabyte Technology Co.,
>> Ltd. P67-DS3-B3/P67-DS3-B3, BIOS F1 05/06/2011
>> Sep  3 20:19:38 ragnarok kernel: RIP:
>> 0010:flush_tlb_func_common.constprop.4+0x23/0x260
>> Sep  3 20:19:38 ragnarok kernel: Code: 0b eb e5 0f 1f 40 00 66 66 66 66
>> 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 f0 48 83 ec 20 65 48
>> 8b 04 25 28 00 00 00 <48> 89 44 24 18 31 c0 65 66 8b 1d 96 fd fc 7e 0f
>> b7 c3 65 48 8b 15
>> Sep  3 20:19:38 ragnarok kernel: RSP: 0018:c9000326bfe0 EFLAGS:
>> 00010082
>> Sep  3 20:19:38 ragnarok kernel: RAX: cf0a75e3a0e78e00 RBX:
>> 880601006cc0 RCX: 
>> Sep  3 20:19:38 ragnarok kernel: RDX: 7fb464e7e000 RSI:
>> 0003 RDI: c9000326c040
>> Sep  3 20:19:38 ragnarok kernel: RBP: c9000326c030 R08:
>> 0005fca490e7 R09: 004fa811
>> Sep  3 20:19:38 ragnarok kernel: R10: 0002 R11:
>>  R12: 0004
>> Sep  3 20:19:38 ragnarok kernel: R13: 8805fbab7600 R14:
>> 880601006cc0 R15: 880602dfb540
>> Sep  3 20:19:38 ragnarok kernel: FS:  7fb469245240()
>> GS:88061f50() knlGS:
>> Sep  3 20:19:38 ragnarok kernel: CS:  0010 DS:  ES:  CR0:
>> 80050033
>> Sep  3 20:19:38 ragnarok kernel: CR2: c9000326bfd8 CR3:
>> 0005feadb001 CR4: 000606e0
>> Sep  3 20:19:38 ragnarok kernel: Call Trace:
>> Sep  3 20:19:38 ragnarok kernel:  flush_tlb_mm_range+0xff/0x110
>> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
>> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
>> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
>> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
>> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
>> ..a few hundred times..
>> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
>> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
>> Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
>> Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
>> Sep  3 20:19:38 ragnarok kernel:  unmap_region+0xdd/0x110
>> Sep  3 20:19:38 ragnarok kernel:  ? __vma_rb_erase+0x128/0x250
>> Sep  3 20:19:38 ragnarok kernel:  do_munmap+0x273/0x3f0
>> Sep  3 20:19:38 ragnarok kernel:  vm_munmap+0x5f/0xa0
>> Sep  3 20:19:38 ragnarok kernel:  __x64_sys_munmap+0x22/0x30
>> Sep  3 20:19:38 ragnarok kernel:  do_syscall_64+0x3e/0xe0
>> Sep  3 20:19:38 ragnarok kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> Sep  3 20:19:38 ragnarok kernel: RIP: 0033:0x7fb469081187
>> Sep  3 20:19:38 ragnarok kernel: Code: ff ff ff f7 d8 89 05 58 df 20 00
>> 48 c7 c0 ff ff ff ff eb 8a 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
>> b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 29 df 20 00
>> f7 d8 89 01 48 83
>> Sep  3 20:19:38 ragnarok kernel: RSP: 002b:7ffef83ba548 EFLAGS:
>> 0206 ORIG_RAX: 000b
>> Sep  3 20:19:38 ragnarok kernel: RAX: ffda RBX:
>> 562a1dca9010 RCX: 7fb469081187
>> Sep  3 20:19:38 ragnarok kernel: RDX: 0002 RSI:
>> 00204028 RDI: 7fb464c79000
>> Sep  3 20:19:38 ragnarok kernel: RBP: 7ffef83ba720 R08:
>> 7fb46928e930 R09: 
>> Sep  3 20:19:38 ragnarok kernel: R10: 7fb464e7d000 R11:
>> 0206 R12: 7ffef83ba654
>> Sep  3 20:19:38 ragnarok kernel: R13: 7ffef83ba610 R14:
>> 7ffef83ba655 R15: 7fb46928e000
>> Sep  3 20:19:38 ragnarok kernel: Modules linked in: autofs4 tcp_bbr
>> sch_fq_codel pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O)
>> it87 hwmon_vid x86_pkg_temp_thermal uvcvideo videobuf2_vmalloc
>> videobuf2_memops snd_usb_audio videobuf2_v4l2 snd_hwdep bfq
>> snd_usbmidi_lib videodev snd_rawmidi coretemp snd_seq_device
>> videobuf2_common radeon usbhid kvm_intel i2c_algo_bit kvm
>> snd_hda_codec_realtek irqbypass drm_kms_helper snd_hda_codec_hdmi
>> snd_hda_codec_generic pcbc syscopyarea sysfillrect sysimgblt mq_deadline
>> fb_sys_fops 

Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread Naresh Kamboju
On 4 September 2018 at 02:46, François Valenduc
 wrote:
> Le 3/09/18 à 20:39, Holger Hoffstätte a écrit :
>> On 09/03/18 18:55, Greg Kroah-Hartman wrote:
>>> This is the start of the stable review cycle for the 4.18.6 release.
>>
>> Unfortunately this is busted. First blamed my custom patches, but as it
>> turns out a 100% vanilla 4.18.6 build crashes as well. Single-user starts,
>> but later when starting services and esp. autofs (I think - too much
>> output)
>> explodes with:
>>
>> ...
>> Sep  3 20:19:36 ragnarok kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link
>> is not ready
>> Sep  3 20:19:38 ragnarok kernel: BUG: stack guard page was hit at
>> ab58c99c (stack is 382b9464..d642b9d6)
>> Sep  3 20:19:38 ragnarok kernel: kernel stack overflow (double-fault):
>>  [#1] SMP
>> Sep  3 20:19:38 ragnarok kernel: CPU: 4 PID: 3634 Comm: automount
>> Tainted: G   O  4.18.6 #1
>> Sep  3 20:19:38 ragnarok kernel: Hardware name: Gigabyte Technology Co.,
>> Ltd. P67-DS3-B3/P67-DS3-B3, BIOS F1 05/06/2011
>> Sep  3 20:19:38 ragnarok kernel: RIP:
>> 0010:flush_tlb_func_common.constprop.4+0x23/0x260
>> Sep  3 20:19:38 ragnarok kernel: Code: 0b eb e5 0f 1f 40 00 66 66 66 66
>> 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 f0 48 83 ec 20 65 48
>> 8b 04 25 28 00 00 00 <48> 89 44 24 18 31 c0 65 66 8b 1d 96 fd fc 7e 0f
>> b7 c3 65 48 8b 15
>> Sep  3 20:19:38 ragnarok kernel: RSP: 0018:c9000326bfe0 EFLAGS:
>> 00010082
>> Sep  3 20:19:38 ragnarok kernel: RAX: cf0a75e3a0e78e00 RBX:
>> 880601006cc0 RCX: 
>> Sep  3 20:19:38 ragnarok kernel: RDX: 7fb464e7e000 RSI:
>> 0003 RDI: c9000326c040
>> Sep  3 20:19:38 ragnarok kernel: RBP: c9000326c030 R08:
>> 0005fca490e7 R09: 004fa811
>> Sep  3 20:19:38 ragnarok kernel: R10: 0002 R11:
>>  R12: 0004
>> Sep  3 20:19:38 ragnarok kernel: R13: 8805fbab7600 R14:
>> 880601006cc0 R15: 880602dfb540
>> Sep  3 20:19:38 ragnarok kernel: FS:  7fb469245240()
>> GS:88061f50() knlGS:
>> Sep  3 20:19:38 ragnarok kernel: CS:  0010 DS:  ES:  CR0:
>> 80050033
>> Sep  3 20:19:38 ragnarok kernel: CR2: c9000326bfd8 CR3:
>> 0005feadb001 CR4: 000606e0
>> Sep  3 20:19:38 ragnarok kernel: Call Trace:
>> Sep  3 20:19:38 ragnarok kernel:  flush_tlb_mm_range+0xff/0x110
>> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
>> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
>> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
>> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
>> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
>> ..a few hundred times..
>> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
>> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
>> Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
>> Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
>> Sep  3 20:19:38 ragnarok kernel:  unmap_region+0xdd/0x110
>> Sep  3 20:19:38 ragnarok kernel:  ? __vma_rb_erase+0x128/0x250
>> Sep  3 20:19:38 ragnarok kernel:  do_munmap+0x273/0x3f0
>> Sep  3 20:19:38 ragnarok kernel:  vm_munmap+0x5f/0xa0
>> Sep  3 20:19:38 ragnarok kernel:  __x64_sys_munmap+0x22/0x30
>> Sep  3 20:19:38 ragnarok kernel:  do_syscall_64+0x3e/0xe0
>> Sep  3 20:19:38 ragnarok kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> Sep  3 20:19:38 ragnarok kernel: RIP: 0033:0x7fb469081187
>> Sep  3 20:19:38 ragnarok kernel: Code: ff ff ff f7 d8 89 05 58 df 20 00
>> 48 c7 c0 ff ff ff ff eb 8a 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
>> b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 29 df 20 00
>> f7 d8 89 01 48 83
>> Sep  3 20:19:38 ragnarok kernel: RSP: 002b:7ffef83ba548 EFLAGS:
>> 0206 ORIG_RAX: 000b
>> Sep  3 20:19:38 ragnarok kernel: RAX: ffda RBX:
>> 562a1dca9010 RCX: 7fb469081187
>> Sep  3 20:19:38 ragnarok kernel: RDX: 0002 RSI:
>> 00204028 RDI: 7fb464c79000
>> Sep  3 20:19:38 ragnarok kernel: RBP: 7ffef83ba720 R08:
>> 7fb46928e930 R09: 
>> Sep  3 20:19:38 ragnarok kernel: R10: 7fb464e7d000 R11:
>> 0206 R12: 7ffef83ba654
>> Sep  3 20:19:38 ragnarok kernel: R13: 7ffef83ba610 R14:
>> 7ffef83ba655 R15: 7fb46928e000
>> Sep  3 20:19:38 ragnarok kernel: Modules linked in: autofs4 tcp_bbr
>> sch_fq_codel pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O)
>> it87 hwmon_vid x86_pkg_temp_thermal uvcvideo videobuf2_vmalloc
>> videobuf2_memops snd_usb_audio videobuf2_v4l2 snd_hwdep bfq
>> snd_usbmidi_lib videodev snd_rawmidi coretemp snd_seq_device
>> videobuf2_common radeon usbhid kvm_intel i2c_algo_bit kvm
>> snd_hda_codec_realtek irqbypass drm_kms_helper snd_hda_codec_hdmi
>> snd_hda_codec_generic pcbc syscopyarea sysfillrect sysimgblt mq_deadline
>> fb_sys_fops 

Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread François Valenduc
Le 3/09/18 à 20:39, Holger Hoffstätte a écrit :
> On 09/03/18 18:55, Greg Kroah-Hartman wrote:
>> This is the start of the stable review cycle for the 4.18.6 release.
> 
> Unfortunately this is busted. First blamed my custom patches, but as it
> turns out a 100% vanilla 4.18.6 build crashes as well. Single-user starts,
> but later when starting services and esp. autofs (I think - too much
> output)
> explodes with:
> 
> ...
> Sep  3 20:19:36 ragnarok kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link
> is not ready
> Sep  3 20:19:38 ragnarok kernel: BUG: stack guard page was hit at
> ab58c99c (stack is 382b9464..d642b9d6)
> Sep  3 20:19:38 ragnarok kernel: kernel stack overflow (double-fault):
>  [#1] SMP
> Sep  3 20:19:38 ragnarok kernel: CPU: 4 PID: 3634 Comm: automount
> Tainted: G   O  4.18.6 #1
> Sep  3 20:19:38 ragnarok kernel: Hardware name: Gigabyte Technology Co.,
> Ltd. P67-DS3-B3/P67-DS3-B3, BIOS F1 05/06/2011
> Sep  3 20:19:38 ragnarok kernel: RIP:
> 0010:flush_tlb_func_common.constprop.4+0x23/0x260
> Sep  3 20:19:38 ragnarok kernel: Code: 0b eb e5 0f 1f 40 00 66 66 66 66
> 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 f0 48 83 ec 20 65 48
> 8b 04 25 28 00 00 00 <48> 89 44 24 18 31 c0 65 66 8b 1d 96 fd fc 7e 0f
> b7 c3 65 48 8b 15
> Sep  3 20:19:38 ragnarok kernel: RSP: 0018:c9000326bfe0 EFLAGS:
> 00010082
> Sep  3 20:19:38 ragnarok kernel: RAX: cf0a75e3a0e78e00 RBX:
> 880601006cc0 RCX: 
> Sep  3 20:19:38 ragnarok kernel: RDX: 7fb464e7e000 RSI:
> 0003 RDI: c9000326c040
> Sep  3 20:19:38 ragnarok kernel: RBP: c9000326c030 R08:
> 0005fca490e7 R09: 004fa811
> Sep  3 20:19:38 ragnarok kernel: R10: 0002 R11:
>  R12: 0004
> Sep  3 20:19:38 ragnarok kernel: R13: 8805fbab7600 R14:
> 880601006cc0 R15: 880602dfb540
> Sep  3 20:19:38 ragnarok kernel: FS:  7fb469245240()
> GS:88061f50() knlGS:
> Sep  3 20:19:38 ragnarok kernel: CS:  0010 DS:  ES:  CR0:
> 80050033
> Sep  3 20:19:38 ragnarok kernel: CR2: c9000326bfd8 CR3:
> 0005feadb001 CR4: 000606e0
> Sep  3 20:19:38 ragnarok kernel: Call Trace:
> Sep  3 20:19:38 ragnarok kernel:  flush_tlb_mm_range+0xff/0x110
> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> ..a few hundred times..
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
> Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
> Sep  3 20:19:38 ragnarok kernel:  unmap_region+0xdd/0x110
> Sep  3 20:19:38 ragnarok kernel:  ? __vma_rb_erase+0x128/0x250
> Sep  3 20:19:38 ragnarok kernel:  do_munmap+0x273/0x3f0
> Sep  3 20:19:38 ragnarok kernel:  vm_munmap+0x5f/0xa0
> Sep  3 20:19:38 ragnarok kernel:  __x64_sys_munmap+0x22/0x30
> Sep  3 20:19:38 ragnarok kernel:  do_syscall_64+0x3e/0xe0
> Sep  3 20:19:38 ragnarok kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> Sep  3 20:19:38 ragnarok kernel: RIP: 0033:0x7fb469081187
> Sep  3 20:19:38 ragnarok kernel: Code: ff ff ff f7 d8 89 05 58 df 20 00
> 48 c7 c0 ff ff ff ff eb 8a 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
> b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 29 df 20 00
> f7 d8 89 01 48 83
> Sep  3 20:19:38 ragnarok kernel: RSP: 002b:7ffef83ba548 EFLAGS:
> 0206 ORIG_RAX: 000b
> Sep  3 20:19:38 ragnarok kernel: RAX: ffda RBX:
> 562a1dca9010 RCX: 7fb469081187
> Sep  3 20:19:38 ragnarok kernel: RDX: 0002 RSI:
> 00204028 RDI: 7fb464c79000
> Sep  3 20:19:38 ragnarok kernel: RBP: 7ffef83ba720 R08:
> 7fb46928e930 R09: 
> Sep  3 20:19:38 ragnarok kernel: R10: 7fb464e7d000 R11:
> 0206 R12: 7ffef83ba654
> Sep  3 20:19:38 ragnarok kernel: R13: 7ffef83ba610 R14:
> 7ffef83ba655 R15: 7fb46928e000
> Sep  3 20:19:38 ragnarok kernel: Modules linked in: autofs4 tcp_bbr
> sch_fq_codel pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O)
> it87 hwmon_vid x86_pkg_temp_thermal uvcvideo videobuf2_vmalloc
> videobuf2_memops snd_usb_audio videobuf2_v4l2 snd_hwdep bfq
> snd_usbmidi_lib videodev snd_rawmidi coretemp snd_seq_device
> videobuf2_common radeon usbhid kvm_intel i2c_algo_bit kvm
> snd_hda_codec_realtek irqbypass drm_kms_helper snd_hda_codec_hdmi
> snd_hda_codec_generic pcbc syscopyarea sysfillrect sysimgblt mq_deadline
> fb_sys_fops ttm snd_hda_intel aesni_intel snd_hda_codec drm snd_hda_core
> aes_x86_64 crypto_simd drm_panel_orientation_quirks cryptd snd_pcm
> glue_helper 

Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread François Valenduc
Le 3/09/18 à 20:39, Holger Hoffstätte a écrit :
> On 09/03/18 18:55, Greg Kroah-Hartman wrote:
>> This is the start of the stable review cycle for the 4.18.6 release.
> 
> Unfortunately this is busted. First blamed my custom patches, but as it
> turns out a 100% vanilla 4.18.6 build crashes as well. Single-user starts,
> but later when starting services and esp. autofs (I think - too much
> output)
> explodes with:
> 
> ...
> Sep  3 20:19:36 ragnarok kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link
> is not ready
> Sep  3 20:19:38 ragnarok kernel: BUG: stack guard page was hit at
> ab58c99c (stack is 382b9464..d642b9d6)
> Sep  3 20:19:38 ragnarok kernel: kernel stack overflow (double-fault):
>  [#1] SMP
> Sep  3 20:19:38 ragnarok kernel: CPU: 4 PID: 3634 Comm: automount
> Tainted: G   O  4.18.6 #1
> Sep  3 20:19:38 ragnarok kernel: Hardware name: Gigabyte Technology Co.,
> Ltd. P67-DS3-B3/P67-DS3-B3, BIOS F1 05/06/2011
> Sep  3 20:19:38 ragnarok kernel: RIP:
> 0010:flush_tlb_func_common.constprop.4+0x23/0x260
> Sep  3 20:19:38 ragnarok kernel: Code: 0b eb e5 0f 1f 40 00 66 66 66 66
> 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 f0 48 83 ec 20 65 48
> 8b 04 25 28 00 00 00 <48> 89 44 24 18 31 c0 65 66 8b 1d 96 fd fc 7e 0f
> b7 c3 65 48 8b 15
> Sep  3 20:19:38 ragnarok kernel: RSP: 0018:c9000326bfe0 EFLAGS:
> 00010082
> Sep  3 20:19:38 ragnarok kernel: RAX: cf0a75e3a0e78e00 RBX:
> 880601006cc0 RCX: 
> Sep  3 20:19:38 ragnarok kernel: RDX: 7fb464e7e000 RSI:
> 0003 RDI: c9000326c040
> Sep  3 20:19:38 ragnarok kernel: RBP: c9000326c030 R08:
> 0005fca490e7 R09: 004fa811
> Sep  3 20:19:38 ragnarok kernel: R10: 0002 R11:
>  R12: 0004
> Sep  3 20:19:38 ragnarok kernel: R13: 8805fbab7600 R14:
> 880601006cc0 R15: 880602dfb540
> Sep  3 20:19:38 ragnarok kernel: FS:  7fb469245240()
> GS:88061f50() knlGS:
> Sep  3 20:19:38 ragnarok kernel: CS:  0010 DS:  ES:  CR0:
> 80050033
> Sep  3 20:19:38 ragnarok kernel: CR2: c9000326bfd8 CR3:
> 0005feadb001 CR4: 000606e0
> Sep  3 20:19:38 ragnarok kernel: Call Trace:
> Sep  3 20:19:38 ragnarok kernel:  flush_tlb_mm_range+0xff/0x110
> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
> Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> ..a few hundred times..
> Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
> Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
> Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
> Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
> Sep  3 20:19:38 ragnarok kernel:  unmap_region+0xdd/0x110
> Sep  3 20:19:38 ragnarok kernel:  ? __vma_rb_erase+0x128/0x250
> Sep  3 20:19:38 ragnarok kernel:  do_munmap+0x273/0x3f0
> Sep  3 20:19:38 ragnarok kernel:  vm_munmap+0x5f/0xa0
> Sep  3 20:19:38 ragnarok kernel:  __x64_sys_munmap+0x22/0x30
> Sep  3 20:19:38 ragnarok kernel:  do_syscall_64+0x3e/0xe0
> Sep  3 20:19:38 ragnarok kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> Sep  3 20:19:38 ragnarok kernel: RIP: 0033:0x7fb469081187
> Sep  3 20:19:38 ragnarok kernel: Code: ff ff ff f7 d8 89 05 58 df 20 00
> 48 c7 c0 ff ff ff ff eb 8a 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
> b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 29 df 20 00
> f7 d8 89 01 48 83
> Sep  3 20:19:38 ragnarok kernel: RSP: 002b:7ffef83ba548 EFLAGS:
> 0206 ORIG_RAX: 000b
> Sep  3 20:19:38 ragnarok kernel: RAX: ffda RBX:
> 562a1dca9010 RCX: 7fb469081187
> Sep  3 20:19:38 ragnarok kernel: RDX: 0002 RSI:
> 00204028 RDI: 7fb464c79000
> Sep  3 20:19:38 ragnarok kernel: RBP: 7ffef83ba720 R08:
> 7fb46928e930 R09: 
> Sep  3 20:19:38 ragnarok kernel: R10: 7fb464e7d000 R11:
> 0206 R12: 7ffef83ba654
> Sep  3 20:19:38 ragnarok kernel: R13: 7ffef83ba610 R14:
> 7ffef83ba655 R15: 7fb46928e000
> Sep  3 20:19:38 ragnarok kernel: Modules linked in: autofs4 tcp_bbr
> sch_fq_codel pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O)
> it87 hwmon_vid x86_pkg_temp_thermal uvcvideo videobuf2_vmalloc
> videobuf2_memops snd_usb_audio videobuf2_v4l2 snd_hwdep bfq
> snd_usbmidi_lib videodev snd_rawmidi coretemp snd_seq_device
> videobuf2_common radeon usbhid kvm_intel i2c_algo_bit kvm
> snd_hda_codec_realtek irqbypass drm_kms_helper snd_hda_codec_hdmi
> snd_hda_codec_generic pcbc syscopyarea sysfillrect sysimgblt mq_deadline
> fb_sys_fops ttm snd_hda_intel aesni_intel snd_hda_codec drm snd_hda_core
> aes_x86_64 crypto_simd drm_panel_orientation_quirks cryptd snd_pcm
> glue_helper 

Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread Holger Hoffstätte

On 09/03/18 18:55, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.


Unfortunately this is busted. First blamed my custom patches, but as it
turns out a 100% vanilla 4.18.6 build crashes as well. Single-user starts,
but later when starting services and esp. autofs (I think - too much output)
explodes with:

...
Sep  3 20:19:36 ragnarok kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not 
ready
Sep  3 20:19:38 ragnarok kernel: BUG: stack guard page was hit at 
ab58c99c (stack is 382b9464..d642b9d6)
Sep  3 20:19:38 ragnarok kernel: kernel stack overflow (double-fault):  
[#1] SMP
Sep  3 20:19:38 ragnarok kernel: CPU: 4 PID: 3634 Comm: automount Tainted: G
   O  4.18.6 #1
Sep  3 20:19:38 ragnarok kernel: Hardware name: Gigabyte Technology Co., Ltd. 
P67-DS3-B3/P67-DS3-B3, BIOS F1 05/06/2011
Sep  3 20:19:38 ragnarok kernel: RIP: 
0010:flush_tlb_func_common.constprop.4+0x23/0x260
Sep  3 20:19:38 ragnarok kernel: Code: 0b eb e5 0f 1f 40 00 66 66 66 66 90 55 48 89 
e5 41 57 41 56 41 55 41 54 53 48 83 e4 f0 48 83 ec 20 65 48 8b 04 25 28 00 00 00 
<48> 89 44 24 18 31 c0 65 66 8b 1d 96 fd fc 7e 0f b7 c3 65 48 8b 15
Sep  3 20:19:38 ragnarok kernel: RSP: 0018:c9000326bfe0 EFLAGS: 00010082
Sep  3 20:19:38 ragnarok kernel: RAX: cf0a75e3a0e78e00 RBX: 880601006cc0 
RCX: 
Sep  3 20:19:38 ragnarok kernel: RDX: 7fb464e7e000 RSI: 0003 
RDI: c9000326c040
Sep  3 20:19:38 ragnarok kernel: RBP: c9000326c030 R08: 0005fca490e7 
R09: 004fa811
Sep  3 20:19:38 ragnarok kernel: R10: 0002 R11:  
R12: 0004
Sep  3 20:19:38 ragnarok kernel: R13: 8805fbab7600 R14: 880601006cc0 
R15: 880602dfb540
Sep  3 20:19:38 ragnarok kernel: FS:  7fb469245240() 
GS:88061f50() knlGS:
Sep  3 20:19:38 ragnarok kernel: CS:  0010 DS:  ES:  CR0: 
80050033
Sep  3 20:19:38 ragnarok kernel: CR2: c9000326bfd8 CR3: 0005feadb001 
CR4: 000606e0
Sep  3 20:19:38 ragnarok kernel: Call Trace:
Sep  3 20:19:38 ragnarok kernel:  flush_tlb_mm_range+0xff/0x110
Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
..a few hundred times..
Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
Sep  3 20:19:38 ragnarok kernel:  unmap_region+0xdd/0x110
Sep  3 20:19:38 ragnarok kernel:  ? __vma_rb_erase+0x128/0x250
Sep  3 20:19:38 ragnarok kernel:  do_munmap+0x273/0x3f0
Sep  3 20:19:38 ragnarok kernel:  vm_munmap+0x5f/0xa0
Sep  3 20:19:38 ragnarok kernel:  __x64_sys_munmap+0x22/0x30
Sep  3 20:19:38 ragnarok kernel:  do_syscall_64+0x3e/0xe0
Sep  3 20:19:38 ragnarok kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
Sep  3 20:19:38 ragnarok kernel: RIP: 0033:0x7fb469081187
Sep  3 20:19:38 ragnarok kernel: Code: ff ff ff f7 d8 89 05 58 df 20 00 48 c7 c0 ff 
ff ff ff eb 8a 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0b 00 00 00 0f 05 
<48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 29 df 20 00 f7 d8 89 01 48 83
Sep  3 20:19:38 ragnarok kernel: RSP: 002b:7ffef83ba548 EFLAGS: 0206 
ORIG_RAX: 000b
Sep  3 20:19:38 ragnarok kernel: RAX: ffda RBX: 562a1dca9010 
RCX: 7fb469081187
Sep  3 20:19:38 ragnarok kernel: RDX: 0002 RSI: 00204028 
RDI: 7fb464c79000
Sep  3 20:19:38 ragnarok kernel: RBP: 7ffef83ba720 R08: 7fb46928e930 
R09: 
Sep  3 20:19:38 ragnarok kernel: R10: 7fb464e7d000 R11: 0206 
R12: 7ffef83ba654
Sep  3 20:19:38 ragnarok kernel: R13: 7ffef83ba610 R14: 7ffef83ba655 
R15: 7fb46928e000
Sep  3 20:19:38 ragnarok kernel: Modules linked in: autofs4 tcp_bbr 
sch_fq_codel pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O) it87 
hwmon_vid x86_pkg_temp_thermal uvcvideo videobuf2_vmalloc videobuf2_memops 
snd_usb_audio videobuf2_v4l2 snd_hwdep bfq snd_usbmidi_lib videodev snd_rawmidi 
coretemp snd_seq_device videobuf2_common radeon usbhid kvm_intel i2c_algo_bit 
kvm snd_hda_codec_realtek irqbypass drm_kms_helper snd_hda_codec_hdmi 
snd_hda_codec_generic pcbc syscopyarea sysfillrect sysimgblt mq_deadline 
fb_sys_fops ttm snd_hda_intel aesni_intel snd_hda_codec drm snd_hda_core 
aes_x86_64 crypto_simd drm_panel_orientation_quirks cryptd snd_pcm glue_helper 
backlight snd_timer snd i2c_i801 soundcore i2c_core r8169 parport_pc parport mii
Sep  3 20:19:38 ragnarok kernel: ---[ end trace cf25033b43d98311 ]---
Sep  3 20:19:38 ragnarok kernel: RIP: 

Re: [PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread Holger Hoffstätte

On 09/03/18 18:55, Greg Kroah-Hartman wrote:

This is the start of the stable review cycle for the 4.18.6 release.


Unfortunately this is busted. First blamed my custom patches, but as it
turns out a 100% vanilla 4.18.6 build crashes as well. Single-user starts,
but later when starting services and esp. autofs (I think - too much output)
explodes with:

...
Sep  3 20:19:36 ragnarok kernel: IPv6: ADDRCONF(NETDEV_UP): eth0: link is not 
ready
Sep  3 20:19:38 ragnarok kernel: BUG: stack guard page was hit at 
ab58c99c (stack is 382b9464..d642b9d6)
Sep  3 20:19:38 ragnarok kernel: kernel stack overflow (double-fault):  
[#1] SMP
Sep  3 20:19:38 ragnarok kernel: CPU: 4 PID: 3634 Comm: automount Tainted: G
   O  4.18.6 #1
Sep  3 20:19:38 ragnarok kernel: Hardware name: Gigabyte Technology Co., Ltd. 
P67-DS3-B3/P67-DS3-B3, BIOS F1 05/06/2011
Sep  3 20:19:38 ragnarok kernel: RIP: 
0010:flush_tlb_func_common.constprop.4+0x23/0x260
Sep  3 20:19:38 ragnarok kernel: Code: 0b eb e5 0f 1f 40 00 66 66 66 66 90 55 48 89 
e5 41 57 41 56 41 55 41 54 53 48 83 e4 f0 48 83 ec 20 65 48 8b 04 25 28 00 00 00 
<48> 89 44 24 18 31 c0 65 66 8b 1d 96 fd fc 7e 0f b7 c3 65 48 8b 15
Sep  3 20:19:38 ragnarok kernel: RSP: 0018:c9000326bfe0 EFLAGS: 00010082
Sep  3 20:19:38 ragnarok kernel: RAX: cf0a75e3a0e78e00 RBX: 880601006cc0 
RCX: 
Sep  3 20:19:38 ragnarok kernel: RDX: 7fb464e7e000 RSI: 0003 
RDI: c9000326c040
Sep  3 20:19:38 ragnarok kernel: RBP: c9000326c030 R08: 0005fca490e7 
R09: 004fa811
Sep  3 20:19:38 ragnarok kernel: R10: 0002 R11:  
R12: 0004
Sep  3 20:19:38 ragnarok kernel: R13: 8805fbab7600 R14: 880601006cc0 
R15: 880602dfb540
Sep  3 20:19:38 ragnarok kernel: FS:  7fb469245240() 
GS:88061f50() knlGS:
Sep  3 20:19:38 ragnarok kernel: CS:  0010 DS:  ES:  CR0: 
80050033
Sep  3 20:19:38 ragnarok kernel: CR2: c9000326bfd8 CR3: 0005feadb001 
CR4: 000606e0
Sep  3 20:19:38 ragnarok kernel: Call Trace:
Sep  3 20:19:38 ragnarok kernel:  flush_tlb_mm_range+0xff/0x110
Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
Sep  3 20:19:38 ragnarok kernel:  ? cpumask_any_but+0x1f/0x40
Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x76/0xc0
Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
..a few hundred times..
Sep  3 20:19:38 ragnarok kernel:  tlb_table_flush.part.13+0xe/0x30
Sep  3 20:19:38 ragnarok kernel:  tlb_flush_mmu_tlbonly+0x54/0xc0
Sep  3 20:19:38 ragnarok kernel:  arch_tlb_finish_mmu+0x3a/0x70
Sep  3 20:19:38 ragnarok kernel:  tlb_finish_mmu+0x1f/0x30
Sep  3 20:19:38 ragnarok kernel:  unmap_region+0xdd/0x110
Sep  3 20:19:38 ragnarok kernel:  ? __vma_rb_erase+0x128/0x250
Sep  3 20:19:38 ragnarok kernel:  do_munmap+0x273/0x3f0
Sep  3 20:19:38 ragnarok kernel:  vm_munmap+0x5f/0xa0
Sep  3 20:19:38 ragnarok kernel:  __x64_sys_munmap+0x22/0x30
Sep  3 20:19:38 ragnarok kernel:  do_syscall_64+0x3e/0xe0
Sep  3 20:19:38 ragnarok kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
Sep  3 20:19:38 ragnarok kernel: RIP: 0033:0x7fb469081187
Sep  3 20:19:38 ragnarok kernel: Code: ff ff ff f7 d8 89 05 58 df 20 00 48 c7 c0 ff 
ff ff ff eb 8a 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0b 00 00 00 0f 05 
<48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 29 df 20 00 f7 d8 89 01 48 83
Sep  3 20:19:38 ragnarok kernel: RSP: 002b:7ffef83ba548 EFLAGS: 0206 
ORIG_RAX: 000b
Sep  3 20:19:38 ragnarok kernel: RAX: ffda RBX: 562a1dca9010 
RCX: 7fb469081187
Sep  3 20:19:38 ragnarok kernel: RDX: 0002 RSI: 00204028 
RDI: 7fb464c79000
Sep  3 20:19:38 ragnarok kernel: RBP: 7ffef83ba720 R08: 7fb46928e930 
R09: 
Sep  3 20:19:38 ragnarok kernel: R10: 7fb464e7d000 R11: 0206 
R12: 7ffef83ba654
Sep  3 20:19:38 ragnarok kernel: R13: 7ffef83ba610 R14: 7ffef83ba655 
R15: 7fb46928e000
Sep  3 20:19:38 ragnarok kernel: Modules linked in: autofs4 tcp_bbr 
sch_fq_codel pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O) it87 
hwmon_vid x86_pkg_temp_thermal uvcvideo videobuf2_vmalloc videobuf2_memops 
snd_usb_audio videobuf2_v4l2 snd_hwdep bfq snd_usbmidi_lib videodev snd_rawmidi 
coretemp snd_seq_device videobuf2_common radeon usbhid kvm_intel i2c_algo_bit 
kvm snd_hda_codec_realtek irqbypass drm_kms_helper snd_hda_codec_hdmi 
snd_hda_codec_generic pcbc syscopyarea sysfillrect sysimgblt mq_deadline 
fb_sys_fops ttm snd_hda_intel aesni_intel snd_hda_codec drm snd_hda_core 
aes_x86_64 crypto_simd drm_panel_orientation_quirks cryptd snd_pcm glue_helper 
backlight snd_timer snd i2c_i801 soundcore i2c_core r8169 parport_pc parport mii
Sep  3 20:19:38 ragnarok kernel: ---[ end trace cf25033b43d98311 ]---
Sep  3 20:19:38 ragnarok kernel: RIP: 

[PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:

https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
or in the git tree and branch at:

git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
linux-4.18.y
and the diffstat can be found below.

thanks,

greg k-h

-
Pseudo-Shortlog of commits:

Greg Kroah-Hartman 
Linux 4.18.6-rc1

Arnd Bergmann 
x86: kvm: avoid unused variable warning

Jann Horn 
x86/dumpstack: Don't dump kernel memory based on usermode RIP

Scott Bauer 
cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status

Vincent Whitchurch 
watchdog: Mark watchdog touch functions as notrace

H. Nikolaus Schaller 
power: generic-adc-battery: check for duplicate properties copied from iio 
channels

H. Nikolaus Schaller 
power: generic-adc-battery: fix out-of-bounds write when copying channel 
properties

Dan Carpenter 
PM / clk: signedness bug in of_pm_clk_add_clks()

Gustavo A. R. Silva 
clk: npcm7xx: fix memory allocation

Alberto Panizzo 
clk: rockchip: fix clk_i2sout parent selection bits on rk3399

Abhishek Sahu 
mtd: rawnand: qcom: wait for desc completion in all BAM channels

Daniel Mack 
mtd: rawnand: marvell: add suspend and resume hooks

Boris Brezillon 
mtd: rawnand: fsmc: Stop using chip->read_buf()

Boris Brezillon 
mtd: rawnand: hynix: Use ->exec_op() in hynix_nand_reg_write_op()

Mike Christie 
iscsi target: fix session creation failure handling

Bart Van Assche 
scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock

Bart Van Assche 
scsi: sysfs: Introduce sysfs_{un,}break_active_protection()

Bart Van Assche 
scsi: mpt3sas: Fix _transport_smp_handler() error path

Sreekanth Reddy 
scsi: mpt3sas: Fix calltrace observed while running IO & reset

Tomas Winkler 
tpm: separate cmd_ready/go_idle from runtime_pm

Ricardo Schwarzmeier 
tpm: Return the actual size when receiving an unsupported command

Paul Burton 
MIPS: lib: Provide MIPS64r6 __multi3() for GCC < 7

Huacai Chen 
MIPS: Change definition of cpu_relax() for Loongson-3

Paul Burton 
MIPS: Always use -march=, not - shortcuts

Matt Redfearn 
MIPS: memset.S: Fix byte_fixup for MIPSr6

Maciej W. Rozycki 
MIPS: Correct the 64-bit DSP accumulator register size

Masami Hiramatsu 
kprobes: Make list and blacklist root user read only

Masami Hiramatsu 
kprobes/arm: Fix %p uses in error messages

Masami Hiramatsu 
kprobes: Replace %p with other pointer types

Masami Hiramatsu 
kprobes: Show blacklist addresses as same as kallsyms does

Philipp Rudo 
s390/purgatory: Add missing FORCE to Makefile targets

Philipp Rudo 
s390/purgatory: Fix crash with expoline enabled

Sebastian Ott 
s390/pci: fix out of bounds access during irq setup

Martin Schwidefsky 
s390/numa: move initial setup of node_to_cpumask_map

Julian Wiedmann 
s390/qdio: reset old sbal_state flags

Martin Schwidefsky 
s390: fix br_r1_trampoline for machines without exrl

Martin Schwidefsky 
s390/lib: use expoline for all bcr instructions

Gerald Schaefer 
s390/mm: fix addressing exception after suspend/resume

Ben Hutchings 
x86: Allow generating user-space headers without a compiler

Jann Horn 
x86/entry/64: Wipe KASAN stack shadow before rewind_stack_do_exit()

Gustavo A. R. Silva 
hwmon: (nct6775) Fix potential Spectre v1

Andi Kleen 
x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+

Andi Kleen 
x86/spectre: Add missing family 6 check to microcode check

Nick Desaulniers 
x86/irqflags: Mark native_restore_fl extern inline

Andy Lutomirski 
x86/nmi: Fix NMI uaccess race against CR3 switching

Samuel Neves 
x86/vdso: Fix lsl operand order

Himanshu Madhani 
scsi: qla2xxx: Fix stalled relogin

Dan Carpenter 
pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show()

Johan Hovold 
soc: qcom: rmtfs-mem: fix memleak in probe error paths

Ajit Pandey 
ASoC: wm_adsp: Correct DSP pointer for preloader control

Gustavo A. R. Silva 
ASoC: sirf: Fix potential NULL pointer dereference

Takashi Iwai 
ASoC: zte: Fix incorrect PCM format bit usages

Jerome Brunet 
ASoC: dpcm: don't merge format from invalid codec dai

Michael Buesch 
b43/leds: Ensure NUL-termination of LED name string

Michael Buesch 
b43legacy/leds: Ensure NUL-termination of LED name string

Mikulas Patocka 
udl-kms: avoid division

Mikulas Patocka 
udl-kms: fix crash due to uninitialized memory

Mikulas Patocka 
udl-kms: handle allocation failure


[PATCH 4.18 000/123] 4.18.6-stable review

2018-09-03 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.18.6 release.
There are 123 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Sep  5 16:56:53 UTC 2018.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:

https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.18.6-rc1.gz
or in the git tree and branch at:

git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git 
linux-4.18.y
and the diffstat can be found below.

thanks,

greg k-h

-
Pseudo-Shortlog of commits:

Greg Kroah-Hartman 
Linux 4.18.6-rc1

Arnd Bergmann 
x86: kvm: avoid unused variable warning

Jann Horn 
x86/dumpstack: Don't dump kernel memory based on usermode RIP

Scott Bauer 
cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status

Vincent Whitchurch 
watchdog: Mark watchdog touch functions as notrace

H. Nikolaus Schaller 
power: generic-adc-battery: check for duplicate properties copied from iio 
channels

H. Nikolaus Schaller 
power: generic-adc-battery: fix out-of-bounds write when copying channel 
properties

Dan Carpenter 
PM / clk: signedness bug in of_pm_clk_add_clks()

Gustavo A. R. Silva 
clk: npcm7xx: fix memory allocation

Alberto Panizzo 
clk: rockchip: fix clk_i2sout parent selection bits on rk3399

Abhishek Sahu 
mtd: rawnand: qcom: wait for desc completion in all BAM channels

Daniel Mack 
mtd: rawnand: marvell: add suspend and resume hooks

Boris Brezillon 
mtd: rawnand: fsmc: Stop using chip->read_buf()

Boris Brezillon 
mtd: rawnand: hynix: Use ->exec_op() in hynix_nand_reg_write_op()

Mike Christie 
iscsi target: fix session creation failure handling

Bart Van Assche 
scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock

Bart Van Assche 
scsi: sysfs: Introduce sysfs_{un,}break_active_protection()

Bart Van Assche 
scsi: mpt3sas: Fix _transport_smp_handler() error path

Sreekanth Reddy 
scsi: mpt3sas: Fix calltrace observed while running IO & reset

Tomas Winkler 
tpm: separate cmd_ready/go_idle from runtime_pm

Ricardo Schwarzmeier 
tpm: Return the actual size when receiving an unsupported command

Paul Burton 
MIPS: lib: Provide MIPS64r6 __multi3() for GCC < 7

Huacai Chen 
MIPS: Change definition of cpu_relax() for Loongson-3

Paul Burton 
MIPS: Always use -march=, not - shortcuts

Matt Redfearn 
MIPS: memset.S: Fix byte_fixup for MIPSr6

Maciej W. Rozycki 
MIPS: Correct the 64-bit DSP accumulator register size

Masami Hiramatsu 
kprobes: Make list and blacklist root user read only

Masami Hiramatsu 
kprobes/arm: Fix %p uses in error messages

Masami Hiramatsu 
kprobes: Replace %p with other pointer types

Masami Hiramatsu 
kprobes: Show blacklist addresses as same as kallsyms does

Philipp Rudo 
s390/purgatory: Add missing FORCE to Makefile targets

Philipp Rudo 
s390/purgatory: Fix crash with expoline enabled

Sebastian Ott 
s390/pci: fix out of bounds access during irq setup

Martin Schwidefsky 
s390/numa: move initial setup of node_to_cpumask_map

Julian Wiedmann 
s390/qdio: reset old sbal_state flags

Martin Schwidefsky 
s390: fix br_r1_trampoline for machines without exrl

Martin Schwidefsky 
s390/lib: use expoline for all bcr instructions

Gerald Schaefer 
s390/mm: fix addressing exception after suspend/resume

Ben Hutchings 
x86: Allow generating user-space headers without a compiler

Jann Horn 
x86/entry/64: Wipe KASAN stack shadow before rewind_stack_do_exit()

Gustavo A. R. Silva 
hwmon: (nct6775) Fix potential Spectre v1

Andi Kleen 
x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+

Andi Kleen 
x86/spectre: Add missing family 6 check to microcode check

Nick Desaulniers 
x86/irqflags: Mark native_restore_fl extern inline

Andy Lutomirski 
x86/nmi: Fix NMI uaccess race against CR3 switching

Samuel Neves 
x86/vdso: Fix lsl operand order

Himanshu Madhani 
scsi: qla2xxx: Fix stalled relogin

Dan Carpenter 
pinctrl: freescale: off by one in imx1_pinconf_group_dbg_show()

Johan Hovold 
soc: qcom: rmtfs-mem: fix memleak in probe error paths

Ajit Pandey 
ASoC: wm_adsp: Correct DSP pointer for preloader control

Gustavo A. R. Silva 
ASoC: sirf: Fix potential NULL pointer dereference

Takashi Iwai 
ASoC: zte: Fix incorrect PCM format bit usages

Jerome Brunet 
ASoC: dpcm: don't merge format from invalid codec dai

Michael Buesch 
b43/leds: Ensure NUL-termination of LED name string

Michael Buesch 
b43legacy/leds: Ensure NUL-termination of LED name string

Mikulas Patocka 
udl-kms: avoid division

Mikulas Patocka 
udl-kms: fix crash due to uninitialized memory

Mikulas Patocka 
udl-kms: handle allocation failure