lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 3 Aug 2020 00:27:26 -0700
From:   Sagi Grimberg <sagi@...mberg.me>
To:     Yamin Friedman <yaminf@...lanox.com>,
        Bart Van Assche <bvanassche@....org>,
        kernel test robot <rong.a.chen@...el.com>
Cc:     Jason Gunthorpe <jgg@...dia.com>, Max Gurtovoy <maxg@...lanox.com>,
        LKML <linux-kernel@...r.kernel.org>,
        Doug Ledford <dledford@...hat.com>,
        Jason Gunthorpe <jgg+lists@...pe.ca>,
        linux-rdma@...r.kernel.org, lkp@...ts.01.org
Subject: Re: [IB/srpt] c804af2c1d: last_state.test.blktests.exit_code.143


>>> Greeting,
>>>
>>> FYI, we noticed the following commit (built with gcc-9):
>>>
>>> commit: c804af2c1d3152c0cf877eeb50d60c2d49ac0cf0 ("IB/srpt: use new 
>>> shared CQ mechanism")
>>> https://git.kernel.org/cgit/linux/kernel/git/rdma/rdma.git for-next
>>>
>>>
>>> in testcase: blktests
>>> with following parameters:
>>>
>>>     test: srp-group1
>>>     ucode: 0x21
>>>
>>>
>>>
>>> on test machine: 4 threads Intel(R) Core(TM) i3-3220 CPU @ 3.30GHz 
>>> with 4G memory
>>>
>>> caused below changes (please refer to attached dmesg/kmsg for entire 
>>> log/backtrace):
>>>
>>>
>>>
>>>
>>> If you fix the issue, kindly add following tag
>>> Reported-by: kernel test robot <rong.a.chen@...el.com>
>>>
>>>
>>> user  :notice: [   44.688140] 2020-08-01 16:10:22 ./check srp/001 
>>> srp/002 srp/003 srp/004 srp/005 srp/006 srp/007 srp/008 srp/009 
>>> srp/010 srp/011 srp/012 srp/013 srp/015
>>> user  :notice: [   44.706657] srp/001 (Create and remove LUNs)
>>> user  :notice: [   44.718405] srp/001 (Create and remove 
>>> LUNs)                             [passed]
>>> user  :notice: [   44.729902]     runtime  ...  1.972s
>>> user  :notice: [   99.038748] IPMI BMC is not supported on this 
>>> machine, skip bmc-watchdog setup!
>>> user  :notice: [ 3699.039790] Sat Aug  1 17:11:22 UTC 2020 detected 
>>> soft_timeout
>>> user  :notice: [ 3699.060341] kill 960 /usr/bin/time -v -o 
>>> /tmp/lkp/blktests.time /lkp/lkp/src/tests/blktests
>> Yamin and Max, can you take a look at this? The SRP tests from the
>> blktests repository pass reliably with kernel version v5.7 and before.
>> With label next-20200731 from linux-next however that test triggers the
>> following hang:
> 
> I will look into it.

FWIW, I ran into this as well with nvme-rdma, but it also reproduces
when I revert the shared CQ patch from nvme-rdma. Another data point
is that my tests passes with siw.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ