lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140207090043.GB24536@oktetlabs.ru>
Date:	Fri, 7 Feb 2014 13:00:45 +0400
From:	"Alexandra N. Kossovsky" <Alexandra.Kossovsky@...etlabs.ru>
To:	Borislav Petkov <bp@...en8.de>
Cc:	Matt Fleming <matt@...sole-pimps.org>,
	Bjorn Helgaas <bhelgaas@...gle.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	Matt Fleming <matt.fleming@...el.com>,
	Matthew Garrett <matthew.garrett@...ula.com>
Subject: Re: 3.13.0: crash on boot

On Feb 05 02:32, Borislav Petkov wrote:
> On Tue, Feb 04, 2014 at 05:30:50PM +0400, Alexandra N. Kossovsky wrote:
> > On Feb 03 14:41, Matt Fleming wrote:
> > > Alexandra, any chance you could try out a v3.14-rc1 kernel? Basically
> > > all of the EFI memory mapping code was rewritten for v3.14.
> > 
> > v3.14-rc1: kmemleak complains about acpi code plus the same crash in
> > efi.  Log and config attached.
> > 
> > I'll ask my system administrator for BIOS update.

I asked.  He installed an update.  No difference.

> 
> Btw, did this box boot any kernels successfully in EFI mode at all?

Yes.  It booted, for example, the same 3.13 kernel from Debian - without
debug options.


> make arch/x86/platform/efi/efi.o
> make arch/x86/platform/efi/efi.s
> 
> on that exact same kernel .config and zip and send me those two files?

Attached, from the 3.14-rc1 (config is in one of my previous letters).

-- 
Alexandra N. Kossovsky
OKTET Labs (http://www.oktetlabs.ru/)

Download attachment "efi_o_s.tgz" of type "application/x-gtar-compressed" (185796 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ