lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Fri, 5 May 2023 13:59:02 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Ard Biesheuvel <ardb@...nel.org>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        <linux-kernel@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [ardb:x86-efistub-cleanup] [x86]  9f28171757:  System_halted



Hello,

kernel test robot noticed "System_halted" on:

commit: 9f281717578aabb23f13a81aabdbdef9f2667185 ("x86: decompressor: Move global symbol references to C code")
git://git.kernel.org/cgit/linux/kernel/git/ardb/linux.git x86-efistub-cleanup

in testcase: boot

compiler: clang-14
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+----------------+------------+------------+
|                | e9a37b0dd6 | 9f28171757 |
+----------------+------------+------------+
| boot_successes | 8          | 0          |
| boot_failures  | 0          | 8          |
| System_halted  | 0          | 8          |
+----------------+------------+------------+


we reported "[ardb:x86-efistub-cleanup] [x86]  04b3235bf4: System_halted"
on https://lore.kernel.org/all/202304251523.71917958-oliver.sang@intel.com/

since the patch-id is not same, we reported this again FYI.


If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202305051333.9aeb6c9b-oliver.sang@intel.com


Decompressing Linux...

Out of memory while allocating zstd_dctx

 -- System haltedLinux version 6.3.0-12738-g9f281717578a #1
Command line: ip=::::vm-meta-48::dhcp root=/dev/ram0 RESULT_ROOT=/result/boot/1/vm-snb/quantal-i386-core-20190426.cgz/i386-randconfig-a011-20230501/clang-14/9f281717578aabb23f13a81aabdbdef9f2667185/3 BOOT_IMAGE=/pkg/linux/i386-randconfig-a011-20230501/clang-14/9f281717578aabb23f13a81aabdbdef9f2667185/vmlinuz-6.3.0-12738-g9f281717578a branch=ardb/x86-efistub-cleanup job=/lkp/jobs/scheduled/vm-meta-48/boot-1-quantal-i386-core-20190426.cgz-9f281717578aabb23f13a81aabdbdef9f2667185-20230505-22232-119m526-3.yaml user=lkp ARCH=i386 kconfig=i386-randconfig-a011-20230501 commit=9f281717578aabb23f13a81aabdbdef9f2667185 initcall_debug mem=4G nmi_watchdog=0 vmalloc=256M initramfs_async=0 page_owner=on max_uptime=600 LKP_SERVER=internal-lkp-server selinux=0 debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 net.ifnames=0 printk.devkmsg=on panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 drbd.minor_count=8 systemd.log_level=err ignore_loglevel console=tty0 earlyprintk=ttyS0,115200 console=ttyS0,115200 vga=normal rw mem=4G rcuperf.shutdown=0 watchdog_thresh=240



To reproduce:

        # build kernel
	cd linux
	cp config-6.3.0-12738-g9f281717578a .config
	make HOSTCC=clang-14 CC=clang-14 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=clang-14 CC=clang-14 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests



View attachment "config-6.3.0-12738-g9f281717578a" of type "text/plain" (157662 bytes)

View attachment "job-script" of type "text/plain" (4862 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (1324 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ