This is the start of the stable review cycle for the 5.4.55 release. There are 19 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sat, 01 Aug 2020 07:44:05 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.55-rc1.... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
------------- Pseudo-Shortlog of commits:
Greg Kroah-Hartman gregkh@linuxfoundation.org Linux 5.4.55-rc1
Vladimir Oltean vladimir.oltean@nxp.com Revert "dpaa_eth: fix usage as DSA master, try 3"
zhuguangqing zhuguangqing@xiaomi.com PM: wakeup: Show statistics for deleted wakeup sources again
Peng Fan peng.fan@nxp.com regmap: debugfs: check count when read regmap file
Kuniyuki Iwashima kuniyu@amazon.co.jp udp: Improve load balancing for SO_REUSEPORT.
Kuniyuki Iwashima kuniyu@amazon.co.jp udp: Copy has_conns in reuseport_grow().
Xin Long lucien.xin@gmail.com sctp: shrink stream outq when fails to do addstream reconf
Xin Long lucien.xin@gmail.com sctp: shrink stream outq only when new outcnt < old outcnt
Dan Carpenter dan.carpenter@oracle.com AX.25: Prevent integer overflows in connect and sendmsg
Yuchung Cheng ycheng@google.com tcp: allow at most one TLP probe per flight
David Howells dhowells@redhat.com rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA
Weilong Chen chenweilong@huawei.com rtnetlink: Fix memory(net_device) leak when ->newlink fails
Cong Wang xiyou.wangcong@gmail.com qrtr: orphan socket in qrtr_release()
Miaohe Lin linmiaohe@huawei.com net: udp: Fix wrong clean up for IS_UDPLITE macro
Xiongfeng Wang wangxiongfeng2@huawei.com net-sysfs: add a newline when printing 'tx_timeout' by sysfs
Wei Yongjun weiyongjun1@huawei.com ip6_gre: fix null-ptr-deref in ip6gre_init_net()
Xie He xie.he.0141@gmail.com drivers/net/wan/x25_asy: Fix to make it work
Subash Abhinov Kasiviswanathan subashab@codeaurora.org dev: Defer free of skbs in flush_backlog
Peilin Ye yepeilin.cs@gmail.com AX.25: Prevent out-of-bounds read in ax25_sendmsg()
Peilin Ye yepeilin.cs@gmail.com AX.25: Fix out-of-bounds read in ax25_connect()
-------------
Diffstat:
Makefile | 4 ++-- drivers/base/power/wakeup.c | 3 +++ drivers/base/regmap/regmap-debugfs.c | 6 ++++++ drivers/net/ethernet/freescale/dpaa/dpaa_eth.c | 2 +- drivers/net/wan/x25_asy.c | 21 +++++++++++++------- include/linux/tcp.h | 4 +++- net/ax25/af_ax25.c | 10 ++++++++-- net/core/dev.c | 2 +- net/core/net-sysfs.c | 2 +- net/core/rtnetlink.c | 3 ++- net/core/sock_reuseport.c | 1 + net/ipv4/tcp_input.c | 11 ++++++----- net/ipv4/tcp_output.c | 13 ++++++++----- net/ipv4/udp.c | 17 +++++++++------- net/ipv6/ip6_gre.c | 11 ++++++----- net/ipv6/udp.c | 17 +++++++++------- net/qrtr/qrtr.c | 1 + net/rxrpc/recvmsg.c | 2 +- net/rxrpc/sendmsg.c | 2 +- net/sctp/stream.c | 27 +++++++++++++++++--------- 20 files changed, 103 insertions(+), 56 deletions(-)
On Thu, Jul 30, 2020 at 10:04:02AM +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.55 release. There are 19 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sat, 01 Aug 2020 07:44:05 +0000. Anything received after that time might be too late.
Build results: total: 157 pass: 157 fail: 0 Qemu test results: total: 429 pass: 429 fail: 0
Guenter
On Thu, 30 Jul 2020 at 13:36, Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
This is the start of the stable review cycle for the 5.4.55 release. There are 19 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sat, 01 Aug 2020 07:44:05 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.55-rc1.... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Results from Linaro’s test farm. Regressions on arm64 Juno-r2 device running LTP controllers-tests
CONFIG_ARM64_64K_PAGES=y
Unable to handle kernel paging request at virtual address dead000000000108 [dead000000000108] address between user and kernel address ranges Internal error: Oops: 96000044 [#1] PREEMPT SMP
pc : get_page_from_freelist+0xa64/0x1030 lr : get_page_from_freelist+0x9c4/0x1030
We are trying to reproduce this kernel panic and trying to narrow down to specific test cases.
Summary ------------------------------------------------------------------------
kernel: 5.4.55-rc1 git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git git branch: linux-5.4.y git commit: 6666ca784e9e47288180a15935061d88debc9e4b git describe: v5.4.54-20-g6666ca784e9e Test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-5.4-oe/build/v5.4.54-20-g...
arm64 kernel config and details: config: https://builds.tuxbuild.com/iIsSV-1_WtyDUTe88iKaqw/kernel.config vmlinux: https://builds.tuxbuild.com/iIsSV-1_WtyDUTe88iKaqw/vmlinux.xz System.map: https://builds.tuxbuild.com/iIsSV-1_WtyDUTe88iKaqw/System.map
steps to reproduce: - boot juno-r2 with 64k page size config - run ltp controllers # cd /opt/ltp # ./runltp -f controllers
memcg_process: shmget() failed: Invalid argument [ 248.372285] Unable to handle kernel paging request at virtual address dead000000000108 [ 248.380223] Mem abort info: [ 248.383015] ESR = 0x96000044 [ 248.386071] EC = 0x25: DABT (current EL), IL = 32 bits [ 248.391387] SET = 0, FnV = 0 [ 248.394440] EA = 0, S1PTW = 0 [ 248.397580] Data abort info: [ 248.400460] ISV = 0, ISS = 0x00000044 [ 248.404296] CM = 0, WnR = 1 [ 248.407264] [dead000000000108] address between user and kernel address ranges [ 248.414410] Internal error: Oops: 96000044 [#1] PREEMPT SMP [ 248.419989] Modules linked in: tda998x drm_kms_helper drm crct10dif_ce fuse [ 248.426975] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.55-rc1 #1 [ 248.433249] Hardware name: ARM Juno development board (r2) (DT) [ 248.439178] pstate: a0000085 (NzCv daIf -PAN -UAO) [ 248.443984] pc : get_page_from_freelist+0xa64/0x1030 [ 248.448955] lr : get_page_from_freelist+0x9c4/0x1030 [ 248.453923] sp : ffff80001000fbb0 [ 248.457238] x29: ffff80001000fbb0 x28: ffff00097fdbfe48 [ 248.462557] x27: 0000000000000010 x26: 0000000000000000 [ 248.467877] x25: ffff00097feabdc0 x24: 0000000000000000 [ 248.473196] x23: 0000000000000000 x22: 0000000000000000 [ 248.478515] x21: 0000fff680154180 x20: ffff00097fdbfe38 [ 248.483835] x19: 0000000000000000 x18: 0000000000000000 [ 248.489154] x17: 0000000000000000 x16: 0000000000000000 [ 248.494473] x15: 0000000000000000 x14: 0000000000000000 [ 248.499792] x13: 0000000000000000 x12: 0000000034d4d91d [ 248.505111] x11: 0000000000000000 x10: 0000000000000000 [ 248.510430] x9 : ffff80096e790000 x8 : ffffffffffffff40 [ 248.515749] x7 : 0000000000000000 x6 : ffffffe002308b48 [ 248.521068] x5 : ffff00097fdbfe38 x4 : dead000000000100 [ 248.526387] x3 : 0000000000000000 x2 : 0000000000000000 [ 248.531706] x1 : 0000000000000000 x0 : ffffffe002308b40 [ 248.537026] Call trace: [ 248.539475] get_page_from_freelist+0xa64/0x1030 [ 248.544099] __alloc_pages_nodemask+0x144/0x280 [ 248.548635] page_frag_alloc+0x70/0x140 [ 248.552479] __netdev_alloc_skb+0x158/0x188 [ 248.556667] smsc911x_poll+0x90/0x268 [ 248.560342] net_rx_action+0x114/0x340 [ 248.564096] __do_softirq+0x120/0x25c [ 248.567766] irq_exit+0xb8/0xd8 [ 248.570910] __handle_domain_irq+0x64/0xb8 [ 248.575010] gic_handle_irq+0x50/0xa8 [ 248.578675] el1_irq+0xb8/0x180 [ 248.581820] tick_check_broadcast_expired+0x34/0x40 [ 248.586705] do_idle+0x8c/0x280 [ 248.589848] cpu_startup_entry+0x20/0x80 [ 248.593777] rest_init+0xd4/0xe0 [ 248.597010] arch_call_rest_init+0xc/0x14 [ 248.601024] start_kernel+0x418/0x44c [ 248.604693] Code: 54000a00 f10020c0 540009c0 a9400cc4 (f9000483) [ 248.610803] ---[ end trace 358f513e280e4dfd ]--- [ 248.615426] Kernel panic - not syncing: Fatal exception in interrupt [ 248.621789] SMP: stopping secondary CPUs [ 249.740564] SMP: failed to stop secondary CPUs 0-2 [ 249.745359] Kernel Offset: disabled [ 249.748849] CPU features: 0x0002,24006000 [ 249.752859] Memory Limit: none [ 249.755921] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
-- Linaro LKFT https://lkft.linaro.org
On Fri, Jul 31, 2020 at 12:32 PM Naresh Kamboju naresh.kamboju@linaro.org wrote:
On Thu, 30 Jul 2020 at 13:36, Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
This is the start of the stable review cycle for the 5.4.55 release. There are 19 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sat, 01 Aug 2020 07:44:05 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.55-rc1.... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Results from Linaro’s test farm. Regressions on arm64 Juno-r2 device running LTP controllers-tests
CONFIG_ARM64_64K_PAGES=y
Unable to handle kernel paging request at virtual address dead000000000108
This is LIST_POISON1+8, so something was following a list_head that got deleted from a list.
[dead000000000108] address between user and kernel address ranges Internal error: Oops: 96000044 [#1] PREEMPT SMP
pc : get_page_from_freelist+0xa64/0x1030 lr : get_page_from_freelist+0x9c4/0x1030
We are trying to reproduce this kernel panic and trying to narrow down to specific test cases.
Summary
kernel: 5.4.55-rc1 git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git git branch: linux-5.4.y git commit: 6666ca784e9e47288180a15935061d88debc9e4b git describe: v5.4.54-20-g6666ca784e9e Test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-5.4-oe/build/v5.4.54-20-g...
arm64 kernel config and details: config: https://builds.tuxbuild.com/iIsSV-1_WtyDUTe88iKaqw/kernel.config vmlinux: https://builds.tuxbuild.com/iIsSV-1_WtyDUTe88iKaqw/vmlinux.xz System.map: https://builds.tuxbuild.com/iIsSV-1_WtyDUTe88iKaqw/System.map
steps to reproduce:
- boot juno-r2 with 64k page size config
- run ltp controllers # cd /opt/ltp # ./runltp -f controllers
memcg_process: shmget() failed: Invalid argument [ 248.372285] Unable to handle kernel paging request at virtual address dead000000000108 [ 248.380223] Mem abort info: [ 248.383015] ESR = 0x96000044 [ 248.386071] EC = 0x25: DABT (current EL), IL = 32 bits [ 248.391387] SET = 0, FnV = 0 [ 248.394440] EA = 0, S1PTW = 0 [ 248.397580] Data abort info: [ 248.400460] ISV = 0, ISS = 0x00000044 [ 248.404296] CM = 0, WnR = 1 [ 248.407264] [dead000000000108] address between user and kernel address ranges [ 248.414410] Internal error: Oops: 96000044 [#1] PREEMPT SMP [ 248.419989] Modules linked in: tda998x drm_kms_helper drm crct10dif_ce fuse [ 248.426975] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.55-rc1 #1 [ 248.433249] Hardware name: ARM Juno development board (r2) (DT) [ 248.439178] pstate: a0000085 (NzCv daIf -PAN -UAO) [ 248.443984] pc : get_page_from_freelist+0xa64/0x1030 [ 248.448955] lr : get_page_from_freelist+0x9c4/0x1030
The function is a little too long for me to see immediately which list this is. Using addr2line should help.
[ 248.453923] sp : ffff80001000fbb0 [ 248.457238] x29: ffff80001000fbb0 x28: ffff00097fdbfe48 [ 248.462557] x27: 0000000000000010 x26: 0000000000000000 [ 248.467877] x25: ffff00097feabdc0 x24: 0000000000000000 [ 248.473196] x23: 0000000000000000 x22: 0000000000000000 [ 248.478515] x21: 0000fff680154180 x20: ffff00097fdbfe38 [ 248.483835] x19: 0000000000000000 x18: 0000000000000000 [ 248.489154] x17: 0000000000000000 x16: 0000000000000000 [ 248.494473] x15: 0000000000000000 x14: 0000000000000000 [ 248.499792] x13: 0000000000000000 x12: 0000000034d4d91d [ 248.505111] x11: 0000000000000000 x10: 0000000000000000 [ 248.510430] x9 : ffff80096e790000 x8 : ffffffffffffff40 [ 248.515749] x7 : 0000000000000000 x6 : ffffffe002308b48 [ 248.521068] x5 : ffff00097fdbfe38 x4 : dead000000000100 [ 248.526387] x3 : 0000000000000000 x2 : 0000000000000000 [ 248.531706] x1 : 0000000000000000 x0 : ffffffe002308b40 [ 248.537026] Call trace: [ 248.539475] get_page_from_freelist+0xa64/0x1030 [ 248.544099] __alloc_pages_nodemask+0x144/0x280 [ 248.548635] page_frag_alloc+0x70/0x140 [ 248.552479] __netdev_alloc_skb+0x158/0x188 [ 248.556667] smsc911x_poll+0x90/0x268
This looks like a regular memory allocation, one common thing that may have gone wrong here would be an earlier double-free.
There are not a lot of commits in v5.4.55-rc1, and most of these are surely unrelated:
6666ca784e9e (HEAD, stable-rc/linux-5.4.y) Linux 5.4.55-rc1 ee4984bf5748 Revert "dpaa_eth: fix usage as DSA master, try 3" 783efa432aa4 PM: wakeup: Show statistics for deleted wakeup sources again 967783c61b31 regmap: debugfs: check count when read regmap file 3999cdbf89f0 drivers/net/wan/x25_asy: Fix to make it work eb8b6691d757 AX.25: Prevent integer overflows in connect and sendmsg 3c3ae3e4c529 AX.25: Prevent out-of-bounds read in ax25_sendmsg() e9380b1e9f82 AX.25: Fix out-of-bounds read in ax25_connect() 71e00f341e74 rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA a385dfd083fb ip6_gre: fix null-ptr-deref in ip6gre_init_net() 161727c98eb6 net-sysfs: add a newline when printing 'tx_timeout' by sysfs a93155189546 qrtr: orphan socket in qrtr_release()
I don't think any of the above are in use on your machine.
1365360e789d udp: Improve load balancing for SO_REUSEPORT. efb2848c55b3 udp: Copy has_conns in reuseport_grow(). 829a46fae4fd sctp: shrink stream outq when fails to do addstream reconf a4842355118b sctp: shrink stream outq only when new outcnt < old outcnt e99e79382d46 tcp: allow at most one TLP probe per flight 66007a7d7f4b net: udp: Fix wrong clean up for IS_UDPLITE macro
These seem possible but unlikely to be the culprit
8508b3ca8595 rtnetlink: Fix memory(net_device) leak when ->newlink fails c1efeaaebc74 dev: Defer free of skbs in flush_backlog
These both deal with memory allocation in some form, I would try reverting the last one first.
Arnd
On Fri, Jul 31, 2020 at 04:02:16PM +0530, Naresh Kamboju wrote:
On Thu, 30 Jul 2020 at 13:36, Greg Kroah-Hartman gregkh@linuxfoundation.org wrote:
This is the start of the stable review cycle for the 5.4.55 release. There are 19 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sat, 01 Aug 2020 07:44:05 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.55-rc1.... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
Results from Linaro’s test farm. Regressions on arm64 Juno-r2 device running LTP controllers-tests
CONFIG_ARM64_64K_PAGES=y
Unable to handle kernel paging request at virtual address dead000000000108 [dead000000000108] address between user and kernel address ranges Internal error: Oops: 96000044 [#1] PREEMPT SMP
pc : get_page_from_freelist+0xa64/0x1030 lr : get_page_from_freelist+0x9c4/0x1030
We are trying to reproduce this kernel panic and trying to narrow down to specific test cases.
If you come up with something that needs to be reverted, please let me know.
Otherwise, thanks for testing all of these.
greg k-h
On Thu, 30 Jul 2020 10:04:02 +0200, Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.4.55 release. There are 19 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know.
Responses should be made by Sat, 01 Aug 2020 07:44:05 +0000. Anything received after that time might be too late.
The whole patch series can be found in one patch at: https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.4.55-rc1.... or in the git tree and branch at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.4.y and the diffstat can be found below.
thanks,
greg k-h
All tests passing for Tegra ...
Test results for stable-v5.4: 11 builds: 11 pass, 0 fail 26 boots: 26 pass, 0 fail 56 tests: 56 pass, 0 fail
Linux version: 5.4.55-rc1-g6666ca784e9e Boards tested: tegra124-jetson-tk1, tegra186-p2771-0000, tegra194-p2972-0000, tegra20-ventana, tegra210-p2371-2180, tegra210-p3450-0000, tegra30-cardhu-a04
Jon