lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 23 Apr 2018 11:41:34 +0200 From: Daniel Borkmann <daniel@...earbox.net> To: kernel test robot <xiaolong.ye@...el.com>, John Fastabend <john.fastabend@...il.com> Cc: ast@...nel.org, netdev@...r.kernel.org, davem@...emloft.net, lkp@...org Subject: Re: [lkp-robot] [bpf] 4f7b25baf0: kernel_selftests.bpf.test_maps.fail On 04/23/2018 08:32 AM, kernel test robot wrote: > > FYI, we noticed the following commit (built with gcc-7): > > commit: 4f7b25baf0cefa88aa267e8ff60150c4ac1479ef ("bpf: sockmap, refactor sockmap routines to work with hashmap") > url: https://github.com/0day-ci/linux/commits/John-Fastabend/bpf-sockmap-free-memory-on-sock-close-with-cork-data/20180401-230416 > base: https://git.kernel.org/cgit/linux/kernel/git/bpf/bpf-next.git master (fyi, refers to https://patchwork.ozlabs.org/patch/894017/ which is not in tree.) > in testcase: kernel_selftests > with following parameters: > > group: kselftests-00 > > test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel. > test-url: https://www.kernel.org/doc/Documentation/kselftest.txt > > > on test machine: qemu-system-x86_64 -enable-kvm -cpu host -smp 4 -m 5G > > caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): > > > selftests: test_maps > ======================================== > Failed allowed duplicate programs in update ANY sockmap 0 '4:8' > not ok 1..3 selftests: test_maps [FAIL] > > > > To reproduce: > > git clone https://github.com/intel/lkp-tests.git > cd lkp-tests > bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email > > > > Thanks, > Xiaolong >
Powered by blists - more mailing lists