lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20161210114600.GA82082@inn.lkp.intel.com>
Date:   Sat, 10 Dec 2016 19:46:00 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Manjeet Pawar <manjeet.p@...sung.com>
Cc:     davem@...emloft.net, kuznet@....inr.ac.ru, jmorris@...ei.org,
        yoshfuji@...ux-ipv6.org, kaber@...sh.net, netdev@...r.kernel.org,
        linux-kernel@...r.kernel.org, pankaj.m@...sung.com,
        ajeet.y@...sung.com, Rohit Thapliyal <r.thapliyal@...sung.com>,
        Manjeet Pawar <manjeet.p@...sung.com>, lkp@...org
Subject: [ipv6]  fe17dfdb36: general_protection_fault:#[##]SMP

FYI, we noticed the following commit:

commit: fe17dfdb369d8b02fe19efc0f942c241896b4ae9 ("ipv6:ip6_xmit remove unnecessary np NULL check")
url: https://github.com/0day-ci/linux/commits/Manjeet-Pawar/ipv6-ip6_xmit-remove-unnecessary-np-NULL-check/20161129-151359


in testcase: nepim
with following parameters:

	runtime: 300s
	nr_threads: 100%
	cluster: cs-localhost
	protocol: tcp6
	cpufreq_governor: performance



on test machine: 8 threads Intel(R) Core(TM) i7 CPU 870 @ 2.93GHz with 4G memory

caused below changes:


+------------------------------------------------------------------+------------+------------+
|                                                                  | 88abd8249e | fe17dfdb36 |
+------------------------------------------------------------------+------------+------------+
| boot_successes                                                   | 35         | 23         |
| boot_failures                                                    | 0          | 7          |
| invoked_oom-killer:gfp_mask=0x                                   | 0          | 2          |
| Mem-Info                                                         | 0          | 2          |
| Kernel_panic-not_syncing:Out_of_memory_and_no_killable_processes | 0          | 2          |
| general_protection_fault:#[##]SMP                                | 0          | 5          |
| RIP:ip6_finish_output                                            | 0          | 5          |
| calltrace:SyS_connect                                            | 0          | 5          |
| Kernel_panic-not_syncing:Fatal_exception_in_interrupt            | 0          | 5          |
+------------------------------------------------------------------+------------+------------+



[   14.178859] x86/PAT: bmc-watchdog:541 map pfn expected mapping type uncached-minus for [mem 0xbf780000-0xbf780fff], got write-back
[   14.179569] x86/PAT: bmc-watchdog:541 map pfn expected mapping type uncached-minus for [mem 0xbf780000-0xbf780fff], got write-back
[   15.155044] kernel profiling enabled schedstats, disable via kernel.sched_schedstats.
[   16.163235] general protection fault: 0000 [#1] SMP
[   16.163530] Modules linked in: rpcsec_gss_krb5 auth_rpcgss
[   16.163833] 2016-12-10 11:34:08 ./nepim -c ::1 -d -a 300 -n 8
[   16.163835] 
[   16.164380]  nfsv4 dns_resolver netconsole sr_mod cdromnepim - network pipemeter - version 0.53


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Kernel Test Robot

View attachment "config-4.9.0-rc7-00008-gfe17dfd" of type "text/plain" (153562 bytes)

View attachment "job-script" of type "text/plain" (6826 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (17392 bytes)

View attachment "job.yaml" of type "text/plain" (4383 bytes)

View attachment "reproduce" of type "text/plain" (141 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ