lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 11 Jul 2016 09:43:15 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	Huang Ying <ying.huang@...el.com>
Cc:	"Rafael J. Wysocki" <rafael.j.wysocki@...el.com>,
	Tomasz Nowicki <tomasz.nowicki@...aro.org>,
	"Chen, Gong" <gong.chen@...ux.intel.com>,
	Jonathan Zhang <zjzhang@...eaurora.org>,
	Fu Wei <fu.wei@...aro.org>,
	Tyler Baicar <tbaicar@...eaurora.org>,
	Borislav Petkov <bp@...e.de>, Tony Luck <tony.luck@...el.com>,
	LKML <linux-kernel@...r.kernel.org>,
	Stephen Rothwell <sfr@...b.auug.org.au>, lkp@...org
Subject: [lkp] [ACPI / APEI]  a3e2acc5e3:
 kmsg.BERT:Can't_request_iomem_region<#-#>


FYI, we noticed the following commit:

https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
commit a3e2acc5e37b22b6808a0b8e46887c3577de9c9e ("ACPI / APEI: Add Boot Error Record Table (BERT) support")

in testcase: locktorture
with following parameters: runtime=300s

on test machine: Atom with 8G memory

caused below changes:


[   12.317148] BERT: Can't request iomem region <00000000bfccfc18-00000000bfccfc2b>.



To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Xiaolong

View attachment "config-4.7.0-rc4-00003-ga3e2acc" of type "text/plain" (150949 bytes)

Download attachment "kmsg.xz" of type "application/octet-stream" (20972 bytes)

View attachment "job.yaml" of type "text/plain" (2761 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ