From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 552D2C3DA6F for ; Fri, 25 Aug 2023 08:09:19 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232087AbjHYIIs (ORCPT ); Fri, 25 Aug 2023 04:08:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60724 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240505AbjHYIIn (ORCPT ); Fri, 25 Aug 2023 04:08:43 -0400 Received: from mail-vk1-xa30.google.com (mail-vk1-xa30.google.com [IPv6:2607:f8b0:4864:20::a30]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F25B6CEE for ; Fri, 25 Aug 2023 01:08:40 -0700 (PDT) Received: by mail-vk1-xa30.google.com with SMTP id 71dfb90a1353d-48d2c072030so1057207e0c.0 for ; Fri, 25 Aug 2023 01:08:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1692950920; x=1693555720; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=6QcQszMmxdJXwrdj7qv0i9KCRG16x6Uvx3Pa+z1CyMw=; b=kEtf7/dJtTkeGYA9DS3Z7w0+USux+OmEZxVGCz29NkVWX3Qsq3XmhIxosoEibdvlge 4kmMeo9X53/5rlLa4p2CGlpDlmsCvSeaH0IKkM3p0YX0ZSgdo6FhQrFm8DSA+/HsPwNs Pdtqggstnu370CZL4cGFTUMqwRXpkVk1EAupqfBGoCFn2zu1qO8jNUtTTkty8KOa46Vp oH3ebYMo8M04POs8Yf7S+PbOMfGyqDx//XmIlrvcgiZASOt56kIdPdDkK8Ck/45lXwhM 3mpNpnLHi9PZ31O6pv8fH/7rZ5A1uAk1u5sF4Q9Z/OniV6tKFgQPVwhjX9Pm5HttSW0G /JoQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692950920; x=1693555720; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=6QcQszMmxdJXwrdj7qv0i9KCRG16x6Uvx3Pa+z1CyMw=; b=XebA8FbKKKvR2B6kihLYQ7Qbj18PFZIo/G74Alcxe54CZelKeFkWA/fLWbOsrRved7 Av1qtYLMHlXh827FK24tPqhMujJxMddYTxj9MmHEvsN146SGtQGAXVBVteyhAO0YhiHy /T9uunwVmNCloysCgNEadAgoRcjN7vqlIeGCfU+SN+d48HKGQl5ol9qZZ9kv9A2j7Ckd gX8On63DeteCYIAa3/HhQiqUR8dw9w5ltzW/dLaEhGp4k8W3uHjEwi8smHNLSSs/5TRA ZRcOt5gI07y0kfuE7hfU/9lm4CWljO4V+YZu7FiTiyiltWCR3KxWcyQCt+5xaJE/GJeM SYYQ== X-Gm-Message-State: AOJu0YxgeeBQPiK7Zykrsrv6d8Yz7vNbAN+4wZS1zaRNfSw+HWdsadJF CtscLnGA6QSsP/gk4cQ1kkW5GzT/x9rjYenrX7YbfQ== X-Google-Smtp-Source: AGHT+IGKlUoZqLtAuC5n6U8/S/LEQzMs7GSNBs/X3ca/L9sMnytTCYWAR49NLSPWdqYY3WSdtWOyVrio55hiXGg7eeY= X-Received: by 2002:a05:6122:c56:b0:48d:392c:c7d9 with SMTP id i22-20020a0561220c5600b0048d392cc7d9mr5516493vkr.6.1692950919958; Fri, 25 Aug 2023 01:08:39 -0700 (PDT) MIME-Version: 1.0 References: <20230824145023.559380953@linuxfoundation.org> In-Reply-To: <20230824145023.559380953@linuxfoundation.org> From: Naresh Kamboju Date: Fri, 25 Aug 2023 13:38:28 +0530 Message-ID: Subject: Re: [PATCH 5.15 000/139] 5.15.128-rc1 review To: Greg Kroah-Hartman , Chuck Lever , Jeff Layton , Christian Brauner Cc: stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, linux-nfs@vger.kernel.org, LTP List , Sherry Yang Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, 24 Aug 2023 at 20:22, Greg Kroah-Hartman wrote: > > This is the start of the stable review cycle for the 5.15.128 release. > There are 139 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Sat, 26 Aug 2023 14:49:55 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.15.128-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.15.y > and the diffstat can be found below. > > thanks, > > greg k-h The same test regressions found on stable-rc linux.5.15.y as reported on stable-rc linux.6.1.y branch. LTP syscalls chown02 and fchown02 fails on arm64 Rpi4 device with the NFS rootfile system. Test log: -------- chown02.c:46: TPASS: chown(testfile1, 0, 0) passed chown02.c:46: TPASS: chown(testfile2, 0, 0) passed chown02.c:58: TFAIL: testfile2: wrong mode permissions 0100700, expected 0102700 fchown02.c:57: TPASS: fchown(3, 0, 0) passed fchown02.c:57: TPASS: fchown(4, 0, 0) passed fchown02.c:67: TFAIL: testfile2: wrong mode permissions 0100700, expected 0102700 Reported-by: Linux Kernel Functional Testing NOTE: Do we need a backport patch ? nfsd: use vfs setgid helper commit 2d8ae8c417db284f598dffb178cc01e7db0f1821 upstream. ## Build * kernel: 5.15.128-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-5.15.y * git commit: 00e5f0b76767cab779762a1d27fc17c1cf2a3606 * git describe: v5.15.127-140-g00e5f0b76767 * test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-5.15.y/build/v5.15.127-140-g00e5f0b76767 ## Test Regressions (compared to v5.15.127) * bcm2711-rpi-4-b, ltp-syscalls - chown02 - fchown02 * bcm2711-rpi-4-b-clang, ltp-syscalls - chown02 - fchown02 -- Linaro LKFT https://lkft.linaro.org