----- Original Message ----- > > Hello, > > We ran automated tests on a recent commit from this kernel tree: > > Kernel repo: > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git > Commit: 60528b79e30a - kvm: nVMX: VMWRITE checks unsupported > field before read-only field > > The results of these automated tests are provided below. > > Overall result: FAILED (see details below) > Merge: OK > Compile: OK > Tests: FAILED > > All kernel binaries, config files, and logs are available for download here: > > https://cki-artifacts.s3.us-east-2.amazonaws.com/index.html?prefix=datawarehouse/2020/03/04/471505 > > One or more kernel tests failed: > > s390x: > ❌ LTP All instances of similar panics [1] manifest mostly on s390 and at first glance look like memory corruptions. I'm looking to confirm, whether this has been fixed by: commit 6fcca0fa48118e6d63733eb4644c6cd880c15b8f Author: Suren Baghdasaryan <surenb@xxxxxxxxxx> Date: Mon Feb 3 13:22:16 2020 -0800 sched/psi: Fix OOB write when writing 0 bytes to PSI files [1] [ 437.397455] addressing exception: 0005 ilc:2 [#1] SMP [ 437.397464] Modules linked in: sunrpc ghash_s390 prng aes_s390 des_s390 libde s qeth_l2 qeth qdio ccwgroup sha512_s390 vfio_ccw vfio_mdev mdev vfio_iommu_type 1 sha1_s390 vfio ip_tables xfs libcrc32c crc32_vx_s390 sha256_s390 sha_common da sd_eckd_mod dasd_mod pkey zcrypt [ 437.397490] CPU: 3 PID: 1029 Comm: read_all Not tainted 5.5.7-60528b7.cki #1 [ 437.397493] Hardware name: IBM 2964 N96 400 (z/VM 6.4.0) [ 437.397497] Krnl PSW : 0704e00180000000 00000000bbf4e508 (collect_percpu_time s+0xd0/0x240) [ 437.397507] R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI: 0 EA:3 [ 437.397511] Krnl GPRS: 0000000142374000 0000000142314000 0000000000000000 000 00000bca4d5a8 [ 437.397514] 0000000000000000 0000000000000000 0000000142314014 000 0000000000000 [ 437.397518] 000003e00092fce0 000003e00092fd20 0000000000000001 000 0000142314000 [ 437.397521] 00000001e47d6000 00000001fb07fd40 00000000bbf4e4c8 000 003e00092fc00 [ 437.397539] Krnl Code: 00000000bbf4e4fc: b90400b1 lgr %r11,%r1 [ 437.397539] 00000000bbf4e500: 41601014 la %r6,20(% r1) [ 437.397539] #00000000bbf4e504: 5870b000 l %r7,0(%r 11) [ 437.397539] >00000000bbf4e508: a7710001 tmll %r7,1 [ 437.397539] 00000000bbf4e50c: a774006d brc 7,000000 00bbf4e5e6 [ 437.397539] 00000000bbf4e510: c0e5fffabadc brasl %r14,000 00000bbea5ac8 [ 437.397539] 00000000bbf4e516: d20f80006000 mvc 0(16,%r8 ),0(%r6) [ 437.397539] 00000000bbf4e51c: d20780106010 mvc 16(8,%r8 ),16(%r6) [ 437.397556] Call Trace: [ 437.397559] [<00000000bbf4e508>] collect_percpu_times+0xd0/0x240 [ 437.397561] ([<00000000bbf4e4c8>] collect_percpu_times+0x90/0x240) [ 437.397563] [<00000000bbf4f380>] psi_show+0x68/0x1c0 [ 437.397568] [<00000000bc17494c>] seq_read+0xe4/0x4d8 [ 437.397572] [<00000000bc142dc4>] vfs_read+0x94/0x160 [ 437.397573] [<00000000bc1431a0>] ksys_read+0x68/0xf8 [ 437.397578] [<00000000bc75d668>] system_call+0xdc/0x2c8 [ 437.397579] Last Breaking-Event-Address: [ 437.397580] [<00000000bc75eba8>] __s390_indirect_jump_r14+0x0/0xc [ 437.397583] ---[ end trace 59a09ffb5f96cb2a ]---