From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS, URIBL_BLOCKED,USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4EE74C282C0 for ; Wed, 23 Jan 2019 09:22:14 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 1C5ED21726 for ; Wed, 23 Jan 2019 09:22:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548235334; bh=O9zqcjFcsguvRze+wcDZ/0ADVngNAJ0ZLXdd8/ihRcE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=W7Q+vXwukL1jA3kBkZXpdezNpgTEzZvOZPPy5OFt7xtdjsJa6VP2IuKO/6KZeMacu 674xhaCcjJOgRi4AEhtqQjikd7lsyOd8AGheIlccMHRI9mS+KQ8+dFqBvuAGypzz0s F5ePTVwzmjE4EeijXVnoF4hnXh2/F2ZkcaATcRgM= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726356AbfAWJWN (ORCPT ); Wed, 23 Jan 2019 04:22:13 -0500 Received: from mail.kernel.org ([198.145.29.99]:39048 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726291AbfAWJWN (ORCPT ); Wed, 23 Jan 2019 04:22:13 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2FF5420870; Wed, 23 Jan 2019 09:22:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548235332; bh=O9zqcjFcsguvRze+wcDZ/0ADVngNAJ0ZLXdd8/ihRcE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=N7WqcwAAg9LYB+M8FE5h73tPbdXHbCV3t1e6MS8v7WhLNw2ueTAfkLf4FsPmh9EpZ fR24E6tOMvK4IIof1Q/GbdhQ/ohSTM42pl8Dy7JQOdx+m1m6EhleQrcVu6w/Z8NiPU FUe7x7hWMR/1CwittQq7avPKDRoTv4kZAqFoBGY4= Date: Wed, 23 Jan 2019 10:22:09 +0100 From: "gregkh@linuxfoundation.org" To: Juergen Gross Cc: Boris Ostrovsky , Hans van Kranenburg , "stable@vger.kernel.org" Subject: Re: FAILED: patch "[PATCH] xen: Fix x86 sched_clock() interface for xen" failed to apply to 4.14-stable tree Message-ID: <20190123092209.GA14010@kroah.com> References: <154806472216125@kroah.com> <5ba8fc06-de8a-bc57-7dae-17a6d571d5ca@oracle.com> <44e10366-41b2-c002-c49e-856ac5265d5a@oracle.com> <8d4855a5-b17b-c7b1-5cfe-4b8ae3ae8596@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8d4855a5-b17b-c7b1-5cfe-4b8ae3ae8596@suse.com> User-Agent: Mutt/1.11.2 (2019-01-07) Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Wed, Jan 23, 2019 at 09:23:19AM +0100, Juergen Gross wrote: > On 22/01/2019 23:37, Boris Ostrovsky wrote: > > On 1/22/19 5:15 PM, Hans van Kranenburg wrote: > >> On 1/22/19 11:08 PM, Boris Ostrovsky wrote: > >>> On 1/21/19 4:58 AM, gregkh@linuxfoundation.org wrote: > >>>> The patch below does not apply to the 4.14-stable tree. > >>>> If someone wants it applied there, or to any other stable or longterm > >>>> tree, then please email the backport, including the original git commit > >>>> id to . > >>> I am actually not convinced this fix is needed for 4.14 (or earlier). I > >>> couldn't reproduce this bug. > >>> > >>> I think we also need Pasha Tatashin's time series (38669ba205d1 and > >>> friends) for the problem to show up. > >> It happens after f94c8d1169, and it was really easy to reproduce for me > >> (or not to) during bisecting. > >> > >> https://lists.xenproject.org/archives/html/xen-devel/2018-12/msg02356.html > >> > > > > Hmm.. I ran 4.14.91 and see no problems. > > dmesg from current linux-4.14.y branch: > > [ 53.155208] Freezing user space processes ... (elapsed 0.001 seconds) > done. > [ 53.156614] OOM killer disabled. > [ 53.156616] Freezing remaining freezable tasks ... (elapsed 0.001 > seconds) done. > [ 53.171864] suspending xenstore... > [ 53.212606] xen:events: Xen HVM callback vector for event delivery is > enabled > [ 53.212606] Xen Platform PCI: I/O protocol version 1 > [ 53.212606] xen:grant_table: Grant tables using version 1 layout > [ 53.212606] xen: --> irq=9, pirq=16 > [ 53.212606] xen: --> irq=8, pirq=17 > [ 53.212606] xen: --> irq=12, pirq=18 > [ 53.212606] xen: --> irq=1, pirq=19 > [ 53.212606] xen: --> irq=6, pirq=20 > [ 53.212606] xen: --> irq=24, pirq=21 > [18446741328.844150] OOM killer enabled. > [18446741328.844153] Restarting tasks ... done. > [18446741328.893762] Setting capacity to 16777216 > > So the issue is present in 4.14. BTW, I have an internal bug report for > this issue from 4.12 kernel. :-) > > Greg, one question for the backport: the least intrusive way seems to be > to add another patch from upstream (commit 38669ba205d178d2d38b). Should > I add this patch separately, or do you want me to include it in the > backported patch? Stick to upstream as close as possible, so if it takes 1, or 2, or 10 patches from upstream submit them all. Every time we try to "only take a part of a fix", or "rewrite it to be smaller" we get it wrong. Every time... thanks, greg k-h