lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20220120064137.GC5873@xsang-OptiPlex-9020>
Date:   Thu, 20 Jan 2022 14:41:38 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Dave Chinner <david@...morbit.com>
Cc:     0day robot <lkp@...el.com>, Dave Chinner <dchinner@...hat.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org
Subject: [iomap]  f1c8b8b2e6:
 leaking-addresses.proc.printk_formats._3.bios0_pages0_startsector0x0bi_vcnt0_bi_size0



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: f1c8b8b2e616895aa0f5be4e53d4cd1ffa751001 ("iomap: Address soft lockup in iomap_finish_ioend()")
url: https://github.com/0day-ci/linux/commits/UPDATE-20220111-073805/trondmy-kernel-org/iomap-Address-soft-lockup-in-iomap_finish_ioend/20211231-034313

in testcase: leaking-addresses
version: leaking-addresses-x86_64-4f19048-1_20220117
with following parameters:

	ucode: 0x28



on test machine: 8 threads 1 sockets Intel(R) Core(TM) i7-4770 CPU @ 3.40GHz with 16G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):




If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>

2022-01-18 03:18:41 ./leaking_addresses.pl --output-raw result/scan.out
2022-01-18 03:19:04 ./leaking_addresses.pl --input-raw result/scan.out --squash-by-filename

Total number of results from scan (incl dmesg): 166437

dmesg output:
[    2.162691] mapped IOAPIC to ffffffffff5fb000 (fec00000)

Results squashed by filename (excl dmesg). Displaying [<number of results> <filename>], <example result>

...

[163 printk_formats] 0xffffffff83b6a2c0 : "3. bios 0, pages 0, start sector 0x0 bi_vcnt 0, bi_size 0"

...



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.16.0-rc5-00009-gf1c8b8b2e616" of type "text/plain" (177583 bytes)

View attachment "job-script" of type "text/plain" (5502 bytes)

View attachment "dmesg" of type "text/plain" (19 bytes)

View attachment "leaking-addresses" of type "text/plain" (2868 bytes)

View attachment "job.yaml" of type "text/plain" (4630 bytes)

View attachment "reproduce" of type "text/plain" (125 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ