lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 7 Jun 2012 22:02:33 +0300
From:	Rus <rus@...nxsoft.com>
To:	Borislav Petkov <bp@...en8.de>, linux-kernel@...r.kernel.org
Subject: Re: 3.[34].x Reproducable [Firmware bug] message upon warm boot only

> Do you have CONFIG_DETECT_HUNG_TASK enabled? Also CONFIG_PROVE_LOCKING,
> CONFIG_KMEMCHECK, CONFIG_DEBUG_PREEMPT. These are just a couple of debug
> options to enable right now which could tell us more.

Kmemcheck setting is prevented the booting of the 3.5-rc1 with the
following messages :

kmemcheck: Limiting number of CPUs to 1.
kmemcheck: Initialized
------------[ cut here ]------------
WARNING: at kernel/lockdep.c:2739 lockdep_trace_alloc+0xcd/0xd0()
Hardware name: To be filled by O.E.M.
Modules linked in:
Pid: 1, comm: swapper/0 Not tainted 3.5.0-rc1 #3
Call Trace:
 [<ffffffff8104123a>] warn_slowpath_common+0x7a/0xb0
 [<ffffffff81041285>] warn_slowpath_null+0x15/0x20
 [<ffffffff81096f2d>] lockdep_trace_alloc+0xcd/0xd0
 [<ffffffff810ee48e>] __alloc_pages_nodemask+0x7e/0x890
 [<ffffffff810ee599>] ? __alloc_pages_nodemask+0x189/0x890
 [<ffffffff81278f3d>] ? trace_hardirqs_off_thunk+0x3a/0x3c
 [<ffffffff81278f3d>] ? trace_hardirqs_off_thunk+0x3a/0x3c
 [<ffffffff815c07d0>] ? error_exit+0x30/0xb0
 [<ffffffff811260c9>] kmemcheck_alloc_shadow+0x29/0xb0
 [<ffffffff8112409a>] new_slab+0x1fa/0x2e0
 [<ffffffff815b70ec>] __slab_alloc.isra.51.constprop.55+0x3e8/0x40e
 [<ffffffff815c07d0>] ? error_exit+0x30/0xb0
 [<ffffffff811251f7>] kmem_cache_alloc+0x87/0xb0
 [<ffffffff8126d7c0>] idr_pre_get+0x60/0x90
 [<ffffffff8126dd8b>] ida_pre_get+0x1b/0x90
 [<ffffffff810593b2>] create_worker+0x42/0x170
 [<ffffffff81ae441d>] init_workqueues+0x1f2/0x393
 [<ffffffff81ae422b>] ? usermodehelper_init+0x36/0x36
 [<ffffffff81ae422b>] ? usermodehelper_init+0x36/0x36
 [<ffffffff81002122>] do_one_initcall+0x122/0x180
 [<ffffffff81acbc7a>] kernel_init+0x9b/0x1f6
 [<ffffffff815c1f74>] kernel_thread_helper+0x4/0x10
 [<ffffffff815c0274>] ? retint_restore_args+0x13/0x13
 [<ffffffff81acbbdf>] ? start_kernel+0x3d2/0x3d2
 [<ffffffff815c1f70>] ? gs_change+0x13/0x13
---[ end trace 6d450e935ee1897c ]---
MCE: In-kernel MCE decoding enabled.
NMI watchdog: enabled, takes one hw-pmu counter.
Brought up 1 CPUs
----------------
| NMI testsuite:
--------------------
  remote IPI:  ok  |
   local IPI:
------------[ cut here ]------------
------------[ cut here ]------------
WARNING: at arch/x86/mm/kmemcheck/kmemcheck.c:634 kmemcheck_fault+0xb1/0xc0()
Hardware name: To be filled by O.E.M.
Modules linked in:
Pid: 1, comm: swapper/0 Tainted: G        W    3.5.0-rc1 #3
Call Trace:
 <NMI>  [<ffffffff8104123a>] warn_slowpath_common+0x7a/0xb0
 [<ffffffff81041285>] warn_slowpath_null+0x15/0x20
 [<ffffffff8103a1f1>] kmemcheck_fault+0xb1/0xc0
 [<ffffffff81033d48>] do_page_fault+0x3f8/0x480
 [<ffffffff81278f3d>] ? trace_hardirqs_off_thunk+0x3a/0x3c
 [<ffffffff815c0525>] page_fault+0x25/0x30
 [<ffffffff8131fe2d>] ? vt_console_print+0xad/0x3b0
 [<ffffffff8131fdea>] ? vt_console_print+0x6a/0x3b0
 [<ffffffff8127ebbd>] ? do_raw_spin_unlock+0x5d/0xb0
 [<ffffffff81042484>] console_unlock+0x174/0x280
 [<ffffffff810427fc>] vprintk_emit+0x16c/0x580
 [<ffffffff8103a1f1>] ? kmemcheck_fault+0xb1/0xc0
 [<ffffffff815b451b>] printk+0x5c/0x5e
 [<ffffffff8103a1f1>] ? kmemcheck_fault+0xb1/0xc0
 [<ffffffff810411f9>] warn_slowpath_common+0x39/0xb0
 [<ffffffff81041285>] warn_slowpath_null+0x15/0x20
 [<ffffffff8103a1f1>] kmemcheck_fault+0xb1/0xc0
 [<ffffffff81033d48>] do_page_fault+0x3f8/0x480
 [<ffffffff81278f3d>] ? trace_hardirqs_off_thunk+0x3a/0x3c
 [<ffffffff815c0525>] page_fault+0x25/0x30
 [<ffffffff8101ca8a>] ? x86_perf_event_update+0x2a/0xb0
 [<ffffffff8101dc66>] x86_pmu_handle_irq+0x96/0x130
 [<ffffffff8101c45d>] perf_event_nmi_handler+0x1d/0x20
 [<ffffffff81010891>] nmi_handle.isra.0+0x81/0xd0
 [<ffffffff81010810>] ? __register_nmi_handler+0x190/0x190
 [<ffffffff810109e8>] do_nmi+0x108/0x380
 [<ffffffff815c090c>] end_repeat_nmi+0x1a/0x1e
 [<ffffffff81278879>] ? delay_tsc+0x29/0xf0
 [<ffffffff81278879>] ? delay_tsc+0x29/0xf0
 [<ffffffff81278879>] ? delay_tsc+0x29/0xf0
 <<EOE>>  [<ffffffff812787ba>] __delay+0xa/0x10
 [<ffffffff812787eb>] __const_udelay+0x2b/0x30
 [<ffffffff81adf398>] test_nmi_ipi.constprop.2+0x51/0x84
 [<ffffffff81adf41e>] local_ipi+0x21/0x23
 [<ffffffff81adf2d2>] dotest.constprop.1+0x6/0x7b
 [<ffffffff81adf4af>] nmi_selftest+0x8f/0x185
 [<ffffffff81ada69b>] native_smp_cpus_done+0x2d/0x11e
 [<ffffffff81ae6199>] smp_init+0x97/0x9f
 [<ffffffff81acbc9e>] kernel_init+0xbf/0x1f6
 [<ffffffff815c1f74>] kernel_thread_helper+0x4/0x10
 [<ffffffff815c0274>] ? retint_restore_args+0x13/0x13
 [<ffffffff81acbbdf>] ? start_kernel+0x3d2/0x3d2
 [<ffffffff815c1f70>] ? gs_change+0x13/0x13
---[ end trace 6d450e935ee1897d ]---
WARNING: at arch/x86/mm/kmemcheck/kmemcheck.c:634 kmemcheck_fault+0xb1/0xc0()
Hardware name: To be filled by O.E.M.
Modules linked in:
Pid: 1, comm: swapper/0 Tainted: G        W    3.5.0-rc1 #3
Call Trace:
 <NMI>  [<ffffffff8104123a>] warn_slowpath_common+0x7a/0xb0
 [<ffffffff81041285>] warn_slowpath_null+0x15/0x20
 [<ffffffff8103a1f1>] kmemcheck_fault+0xb1/0xc0
 [<ffffffff81033d48>] do_page_fault+0x3f8/0x480
 [<ffffffff81278f3d>] ? trace_hardirqs_off_thunk+0x3a/0x3c
 [<ffffffff815c0525>] page_fault+0x25/0x30
 [<ffffffff8101ca8a>] ? x86_perf_event_update+0x2a/0xb0
 [<ffffffff8101dc66>] x86_pmu_handle_irq+0x96/0x130
 [<ffffffff8101c45d>] perf_event_nmi_handler+0x1d/0x20
 [<ffffffff81010891>] nmi_handle.isra.0+0x81/0xd0
 [<ffffffff81010810>] ? __register_nmi_handler+0x190/0x190
 [<ffffffff810109e8>] do_nmi+0x108/0x380
 [<ffffffff815c090c>] end_repeat_nmi+0x1a/0x1e
 [<ffffffff81278879>] ? delay_tsc+0x29/0xf0
 [<ffffffff81278879>] ? delay_tsc+0x29/0xf0
 [<ffffffff81278879>] ? delay_tsc+0x29/0xf0
 <<EOE>>  [<ffffffff812787ba>] __delay+0xa/0x10
 [<ffffffff812787eb>] __const_udelay+0x2b/0x30
 [<ffffffff81adf398>] test_nmi_ipi.constprop.2+0x51/0x84
 [<ffffffff81adf41e>] local_ipi+0x21/0x23
 [<ffffffff81adf2d2>] dotest.constprop.1+0x6/0x7b
 [<ffffffff81adf4af>] nmi_selftest+0x8f/0x185
 [<ffffffff81ada69b>] native_smp_cpus_done+0x2d/0x11e
 [<ffffffff81ae6199>] smp_init+0x97/0x9f
 [<ffffffff81acbc9e>] kernel_init+0xbf/0x1f6
 [<ffffffff815c1f74>] kernel_thread_helper+0x4/0x10
 [<ffffffff815c0274>] ? retint_restore_args+0x13/0x13
 [<ffffffff81acbbdf>] ? start_kernel+0x3d2/0x3d2
 [<ffffffff815c1f70>] ? gs_change+0x13/0x13
---[ end trace 6d450e935ee1897e ]---
  ok  |
--------------------
Good, all   2 testcases passed! |
....................
Freeing unused kernel memory: 228k freed
Freeing unused kernel memory: 1388k freed
init (1) used greatest stack depth: 3256 bytes left
Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000005

Pid: 1, comm: init Tainted: G        W    3.5.0-rc1 #3
Call Trace:
 [<ffffffff815b43ae>] panic+0xb5/0x1c6
 [<ffffffff810464d9>] ? do_exit+0x749/0x920
 [<ffffffff81046581>] do_exit+0x7f1/0x920
 [<ffffffff81046944>] do_group_exit+0x44/0xb0
 [<ffffffff81053211>] get_signal_to_deliver+0x1e1/0x5f0
 [<ffffffff8105168f>] ? __send_signal+0x16f/0x2f0
 [<ffffffff8100c26a>] do_signal+0x3a/0x920
 [<ffffffff815bfd65>] ? _raw_spin_unlock_irqrestore+0x45/0x80
 [<ffffffff8105214c>] ? force_sig_info+0xdc/0x100
 [<ffffffff81019f82>] ? syscall_trace_leave+0x122/0x130
 [<ffffffff8100cbdd>] do_notify_resume+0x6d/0xa0
 [<ffffffff81278efe>] ? trace_hardirqs_on_thunk+0x3a/0x3f
 [<ffffffff815c0e7a>] int_signal+0x12/0x17
 [<ffffffff815b290b>] ? run_init_process+0x1e/0x20
 [<ffffffff815b2952>] ? init_post+0x45/0xbe
 [<ffffffff81acbdd5>] ? kernel_init+0x1f6/0x1f6
 [<ffffffff81acb5ae>] ? do_early_param+0x8c/0x8c
 [<ffffffff815c1f74>] ? kernel_thread_helper+0x4/0x10
 [<ffffffff815c0274>] ? retint_restore_args+0x13/0x13
 [<ffffffff81acbbdf>] ? start_kernel+0x3d2/0x3d2
 [<ffffffff815c1f70>] ? gs_change+0x13/0x13
.........

After disabling kmemcheck the box is able to boot again.

Rus

-- 
SfinxSoft
http://sfinxsoft.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ