lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 22 Aug 2008 13:29:48 -0300
From:	"Luiz Fernando N. Capitulino" <lcapitulino@...driva.com.br>
To:	Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca>
Cc:	Ingo Molnar <mingo@...e.hu>, "H. Peter Anvin" <hpa@...or.com>,
	linux-kernel@...r.kernel.org
Subject: Re: 2.6.{26.2,27-rc} oops on virtualbox

Em Fri, 22 Aug 2008 11:34:52 -0400
Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca> escreveu:

| * Luiz Fernando N. Capitulino (lcapitulino@...driva.com.br) wrote:
| > Em Fri, 22 Aug 2008 08:50:12 +0200
| > Ingo Molnar <mingo@...e.hu> escreveu:
| > 
| > | 
| > | * H. Peter Anvin <hpa@...or.com> wrote:
| > | 
| > | > H. Peter Anvin wrote:
| > | >>>
| > | >>>  Does this look like a kernel bug?
| > | >>>
| > | >>
| > | >> No, it looks like a very common virtualizer bug.  Does the attached  
| > | >> patch work for you?
| > | >>
| > | >
| > | > Also, in addition to this, please try tip:master.  There is a patch in 
| > | > tip:master which I hope should fix this problem, but the details are 
| > | > important.
| > | 
| > | access coordinates would be at:
| > | 
| > |   http://people.redhat.com/mingo/tip.git/README
| > 
| >  As I already have Linus tree downloaded I have cloned it in
| > the usual way.
| > 
| >  Got the same results: OOPS in virtualbox but it works on QEMU.
| > 
| >  The OOPS's output follows and I have attached the .config I'm using
| > to reproduce the problem.
| > 
| 
| Can you try booting with the kernel argument :
|   debug_alternative 
| 
| The dmesg of the kernel bootup up to the oops would be helpful.
| 
| My guess is that there may be something wrong with irq disabling which
| protects text_poke_early in apply_alternatives().

 I have attached two files:

  - normal.txt: normal boot with no debug options
  - debug-alternative.txt ignore_loglevel and debug-alternative boot
    options

 I had to pass ignore_loglevel otherwise it wouldn't print
anything.

-- 
Luiz Fernando N. Capitulino

View attachment "normal.txt" of type "text/plain" (7273 bytes)

View attachment "debug-alternative.txt" of type "text/plain" (6849 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ