lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 16 May 2013 15:21:53 +0200
From:	Christian König <christian.koenig@....com>
To:	LKML <linux-kernel@...r.kernel.org>
Subject: 3.9 breaks EFI boot on E350 v2

Hi everybody,

the following crash happens when booting one of our E350 based test 
system in EFI mode, booting with in BIOS compatibility mode works fine.

Bisecting initially turned out to be commit 
8d57470d8f859635deffe3919d7d4867b488b85a, but that turned out to be a 
false positive and already fixed in 3.9.

Complete bootlog is attached, so does anybody got any more idea what to try?

Thanks in advance,
Christian.

[    1.658865] Trying to unpack rootfs image as initramfs...
[    1.679971] BUG: unable to handle kernel paging request at 
ffff88006e3fd000
[    1.686976] IP: [<ffffffff813661df>] memset+0x1f/0xb0
[    1.692055] PGD 1f77067 PUD 1f7a067 PMD 61420067 PTE 0
[    1.697264] Oops: 0002 [#1] SMP
[    1.700531] Modules linked in:
[    1.703607] CPU 0
[    1.705449] Pid: 1, comm: swapper/0 Not tainted 3.9.0-030900-generic 
#201304291257 To Be Filled By O.E.M. To Be Filled By O.E.M./E350M1
[    1.717803] RIP: 0010:[<ffffffff813661df>] [<ffffffff813661df>] 
memset+0x1f/0xb0
[    1.725308] RSP: 0000:ffff880060af59c0  EFLAGS: 00010216
[    1.730622] RAX: 0000000000000000 RBX: 000000000001f000 RCX: 
0000000000000200
[    1.737753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 
ffff88006e3fd000
[    1.744876] RBP: ffff880060af59e8 R08: 0000000000000000 R09: 
ffff88006e3fd000
[    1.752001] R10: ffffffff818318e0 R11: 0000000000000000 R12: 
0000000000000000
[    1.759126] R13: ffffea0001b8ff40 R14: ffff88006dc03810 R15: 
ffff880060af5aa8
[    1.766260] FS:  0000000000000000(0000) GS:ffff880063a00000(0000) 
knlGS:0000000000000000
[    1.774344] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[    1.780091] CR2: ffff88006e3fd000 CR3: 0000000001c0d000 CR4: 
00000000000007f0
[    1.787224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
[    1.794356] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 
0000000000000400
[    1.801489] Process swapper/0 (pid: 1, threadinfo ffff880060af4000, 
task ffff880060af8000)
[    1.809747] Stack:
[    1.811758]  ffffffff811c4566 000000000001f000 0000000000001000 
ffff880060af4000
[    1.819209]  0000000000001000 ffff880060af5a98 ffffffff811365ea 
ffffffff812e0026
[    1.826664]  ffffffff81831800 ffff880060af5a28 0000000000000000 
ffff880060af8000
[    1.834119] Call Trace:
[    1.836576]  [<ffffffff811c4566>] ? simple_write_end+0xf6/0x100
[    1.842494]  [<ffffffff811365ea>] generic_perform_write+0x13a/0x210
[    1.848762]  [<ffffffff812e0026>] ? 
security_inode_need_killpriv+0x16/0x20
[    1.855632]  [<ffffffff812e0026>] ? 
security_inode_need_killpriv+0x16/0x20
[    1.862504]  [<ffffffff8113671d>] generic_file_buffered_write+0x5d/0x90
[    1.869116]  [<ffffffff81138196>] __generic_file_aio_write+0x1b6/0x3b0
[    1.875643]  [<ffffffff8113840f>] generic_file_aio_write+0x7f/0x100
[    1.881909]  [<ffffffff8119df53>] do_sync_write+0xa3/0xe0
[    1.887309]  [<ffffffff8119e613>] vfs_write+0xb3/0x180
[    1.892447]  [<ffffffff8119eab2>] sys_write+0x52/0xa0
[    1.897503]  [<ffffffff81d0d5c0>] ? do_name.part.5+0xc9/0x234
[    1.903245]  [<ffffffff81d3810a>] ? bunzip2+0x1b1/0x1b1
[    1.908473]  [<ffffffff81d0d494>] do_copy+0x73/0x8e
[    1.913351]  [<ffffffff81d0ca5e>] flush_buffer+0x82/0xb2
[    1.918663]  [<ffffffff81d0c9dc>] ? eat+0x1c/0x1c
[    1.923370]  [<ffffffff81d0c9dc>] ? eat+0x1c/0x1c
[    1.928075]  [<ffffffff81d3839a>] gunzip+0x287/0x32f
[    1.933043]  [<ffffffff81d0cefa>] unpack_to_rootfs+0x172/0x2a5
[    1.938873]  [<ffffffff81d0c9a9>] ? md_run_setup+0x8b/0x8b
[    1.944361]  [<ffffffff81d0d979>] ? populate_rootfs.part.7+0xa5/0xa5
[    1.950714]  [<ffffffff81d0d8fe>] populate_rootfs.part.7+0x2a/0xa5
[    1.956893]  [<ffffffff81d0d9ad>] populate_rootfs+0x34/0x38
[    1.962466]  [<ffffffff8100206f>] do_one_initcall+0x3f/0x170
[    1.968124]  [<ffffffff81d0af9d>] do_basic_setup+0x96/0xb4
[    1.973610]  [<ffffffff81d0a80d>] ? loglevel+0x31/0x31
[    1.978751]  [<ffffffff81d2763a>] ? sched_init_smp+0x121/0x123
[    1.984582]  [<ffffffff81d0b073>] kernel_init_freeable+0xb8/0x132
[    1.990677]  [<ffffffff816d64b0>] ? rest_init+0x80/0x80
[    1.995902]  [<ffffffff816d64be>] kernel_init+0xe/0xf0
[    2.001042]  [<ffffffff8170d42c>] ret_from_fork+0x7c/0xb0
[    2.006439]  [<ffffffff816d64b0>] ? rest_init+0x80/0x80
[    2.011662] Code: 1e 44 88 1f c3 90 90 90 90 90 90 90 49 89 f9 48 89 
d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f 
af c6 <f3> 48 ab 89 d1 f3 aa 4c 89 c8 c3 66 66 66 90 66 66 66 90 66 66
[    2.031613] RIP  [<ffffffff813661df>] memset+0x1f/0xb0
[    2.036770]  RSP <ffff880060af59c0>
[    2.040255] CR2: ffff88006e3fd000
[    2.043580] ---[ end trace 056f744af9ca82ee ]---
[    2.048198] note: swapper/0[1] exited with preempt_count 1


View attachment "bootlog.txt" of type "text/plain" (37401 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ