From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1134E194C8B; Mon, 17 Feb 2025 11:37:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739792227; cv=none; b=fLn+wjGlS2Tlt0xv4J/Sv9kHEnM7xwkMXLwEPB7J/SPyeY4d0zV6yNYqKkHl6RBEdNdZPkxkHdE/2ga07R0ygEWariOvPdPTYqjoToRxxjnoS9OBTSTrROjFMOnNK5//q7e4pQHc+DnrSaHrjy5VxYEHxJCx3zyYaWukbtHM4qU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739792227; c=relaxed/simple; bh=7nF6WKIMD0Koam7Ku83wpKSZ4ebHAFoccY30ttsjZPg=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=V/yYr8innLgfjdleaM6u1FmMxEwu40yqpSRfPgxoePCuzy9CnXm10DyK6jP75aSQXQo5jz/aALAAO8uRfa7TCppyLyXWajV5Sj2nNPbb0gKmbbzJcisWypPtrp5TAlcky/XpiMYx7tXVInZIhRkBQY15gsgp5xXVgZsnjn2KiMo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=Xy8M7sav; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="Xy8M7sav" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C9702C4CED1; Mon, 17 Feb 2025 11:37:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1739792226; bh=7nF6WKIMD0Koam7Ku83wpKSZ4ebHAFoccY30ttsjZPg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Xy8M7savn9j3irkGmRvfXsrYgcsmNYqRFpNXByjiysepoxAQq9axWXmlhHZKEHt0b Z37gzyKT7wBsNtsOlsAZUtw3Os9LcgBO5cCdeic8/lPgYueliRiFa4matTf7rqC4uh tJ3UMokdBmo6MSMNBnK2GQ9SjOb2gtDLlBJNbm04= Date: Mon, 17 Feb 2025 12:37:03 +0100 From: Greg Kroah-Hartman To: Naresh Kamboju Cc: stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, hargar@microsoft.com, broonie@kernel.org, Linux Crypto Mailing List , linux-fsdevel@vger.kernel.org, linux-mm , Anders Roxell , Dan Carpenter , Arnd Bergmann , Herbert Xu , willy@infradead.org, Pankaj Raghav , Yang Shi , Catalin Marinas , David Hildenbrand Subject: Re: [PATCH 6.6 000/389] 6.6.76-rc2 review Message-ID: <2025021739-jackpot-lip-09f9@gregkh> References: <20250206155234.095034647@linuxfoundation.org> Precedence: bulk X-Mailing-List: linux-fsdevel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Mon, Feb 17, 2025 at 05:00:43PM +0530, Naresh Kamboju wrote: > On Sat, 8 Feb 2025 at 16:54, Naresh Kamboju wrote: > > > > On Thu, 6 Feb 2025 at 21:36, Greg Kroah-Hartman > > wrote: > > > > > > This is the start of the stable review cycle for the 6.6.76 release. > > > There are 389 patches in this series, all will be posted as a response > > > to this one. If anyone has any issues with these being applied, please > > > let me know. > > > > > > Responses should be made by Sat, 08 Feb 2025 15:51:12 +0000. > > > Anything received after that time might be too late. > > > > > > The whole patch series can be found in one patch at: > > > https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.6.76-rc2.gz > > > or in the git tree and branch at: > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.6.y > > > and the diffstat can be found below. > > > > > > thanks, > > > > > > greg k-h > > > > > > There are three different regressions found and reporting here, > > We are working on bisecting and investigating these issues, > > We observed a kernel warning on QEMU-ARM64 and FVP while running the > newly added selftest: arm64: check_hugetlb_options. This issue appears > on 6.6.76 onward and 6.12.13 onward, as reported in the stable review [1]. > However, the test case passes successfully on stable 6.13. > > The selftests: arm64: check_hugetlb_options test was introduced following > the recent upgrade of kselftest test sources to the stable 6.13 branch. > As you are aware, LKFT runs the latest kselftest sources (from stable > 6.13.x) on 6.12.x, 6.6.x, and older kernels for validation purposes. > > >From Anders' bisection results, we identified that the missing patch on > 6.12 is likely causing this regression: > > First fixed commit: > [25c17c4b55def92a01e3eecc9c775a6ee25ca20f] > hugetlb: arm64: add MTE support > > Could you confirm whether this patch is eligible for backporting to > 6.12 and 6.6 kernels? > If backporting is not an option, we will need to skip running this > test case on older kernels. The test case itself should properly "skip" if the feature is not present in the kernel. Why not fix that up instead? thanks, greg k-h