lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20121113052542.GA26941@localhost>
Date:	Tue, 13 Nov 2012 13:25:42 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	fengguang.wu@...el.com, linux-kernel@...r.kernel.org
Cc:	Guillaume LECERF <glecerf@...il.com>
Subject: [cfi_probe, mtd_do_chip_probe] invalid opcode: 0000 [#1]
 DEBUG_PAGEALLOC

Greetings,

This looks like a pretty old bug and dates back to v2.6.39.
(older kernels cannot be tested due to build problems)

[    6.100211] ------------[ cut here ]------------
[    6.101009] Kernel BUG at b144dd6f [verbose debug info unavailable]
[    6.101189] invalid opcode: 0000 [#1] DEBUG_PAGEALLOC
[    6.101189] Pid: 1, comm: swapper Not tainted 3.7.0-rc5 #1 Bochs Bochs
[    6.101189] EIP: 0060:[<b144dd6f>] EFLAGS: 00010286 CPU: 0
[    6.101189] EIP is at mtd_do_chip_probe+0xb/0x10
[    6.101189] EAX: b1c4b71c EBX: b1c4b338 ECX: 00000001 EDX: b1c4b330
[    6.101189] ESI: b1c4b71c EDI: b1b8f3d9 EBP: bbc2bf3c ESP: bbc2bf00
[    6.101189]  DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[    6.101189] CR0: 8005003b CR2: 00000000 CR3: 01f51000 CR4: 00000690
[    6.101189] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    6.101189] DR6: ffff0ff0 DR7: 00000400
[    6.101189] Process swapper (pid: 1, ti=bbc2a000 task=bbc60000 task.ti=bbc2a000)
[    6.101189] Stack:
[    6.101189]  00000002 00000000 00000000 00000000 bbc60000 00000000 00000000 b1c4b308
[    6.101189]  00000000 b1b8f3d9 bbc2bf38 b11bb431 b1c4b308 b1c4b71c bbc2bf44 bbc2bf44
[    6.101189]  b144abb6 bbc2bf58 b144ab5c 00000000 b1ee1540 00000000 bbc2bf7c b1ee162b
[    6.101189] Call Trace:
[    6.101189]  [<b11bb431>] ? do_raw_spin_unlock+0xd1/0x108
[    6.101189]  [<b144abb6>] cfi_probe+0x12/0x14
[    6.101189]  [<b144ab5c>] do_map_probe+0x8c/0x95
[    6.101189]  [<b1ee1540>] ? physmap_init+0x61/0x61
[    6.101189]  [<b1ee162b>] init_sbc_gxx+0xeb/0x13d
[    6.101189]  [<b1eb6c79>] do_one_initcall+0x74/0x16e
[    6.101189]  [<b1783ed2>] ? kernel_init+0xcf/0x2d5
[    6.101189]  [<b1783ee8>] kernel_init+0xe5/0x2d5
[    6.101189]  [<b17f8cf7>] ret_from_kernel_thread+0x1b/0x28
[    6.101189]  [<b1783e03>] ? rest_init+0xab/0xab
[    6.101189] Code: 8c 53 fe ff ff 8b 45 e0 c7 40 44 e8 b3 c4 b1 89 f8 e8 cb ee ff ff 8d 65 f4 5b 5e 5f 5d c3 90 90 55 89 e5 83 ec 3c 3e 8d 74 26 00 <0f> 0b 90 90 90 55 89 e5 3e 8d 74 26 00 8b 80 dc 00 00 00 5d 03
[    6.101189] EIP: [<b144dd6f>] mtd_do_chip_probe+0xb/0x10 SS:ESP 0068:bbc2bf00

Thanks,
Fengguang


View attachment "dmesg-kvm-bens-3422-2012-11-13-07-08-51-3.7.0-rc5-1" of type "text/plain" (67574 bytes)

View attachment "77b6706-bisect.log" of type "text/plain" (13585 bytes)

View attachment ".config-bisect" of type "text/plain" (64422 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ