lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <549CC096.3080701@cn.fujitsu.com>
Date:	Fri, 26 Dec 2014 09:57:42 +0800
From:	Qu Wenruo <quwenruo@...fujitsu.com>
To:	<jgross@...e.com>
CC:	<linux-kernel@...r.kernel.org>
Subject: [REGRESSION][x86] Commit f5b2831d65 cause boot failure in VMware
 ESXi 5.1 guest

Hi all,

When testing v3.19-rc1 kernel(in fact, try to test), the kernel itself 
fail to boot on VMware ESXi 5.1 guest.
The boot failure is quite easy to describe, only one line is output:
"Probing EDD (edd=off to disable)...ok"

No other output(including warning/bug_on/backtrace or whatever) and the 
guest just hangs.
It's OK on v3.18, so it's a regression.

Bisect points to the following commit:
commit f5b2831d654167d77da8afbef4d2584897b12d0c
Author: Juergen Gross <jgross@...e.com>
Date:   Mon Nov 3 14:02:02 2014 +0100

     x86: Respect PAT bit when copying pte values between large and 
normal pages

     The PAT bit in the ptes is not moved to the correct position when
     copying page protection attributes between entries of different sized
     pages. Translate the ptes according to their page size.


I have also created the kernel BZ report:
https://bugzilla.kernel.org/show_bug.cgi?id=90321

Hopes this can be resolved in next rc.

Thanks,
Qu

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ