lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <549EB95F.9090209@suse.com>
Date:	Sat, 27 Dec 2014 14:51:27 +0100
From:	Juergen Gross <jgross@...e.com>
To:	Qu Wenruo <quwenruo@...fujitsu.com>
CC:	linux-kernel@...r.kernel.org
Subject: Re: [REGRESSION][x86] Commit f5b2831d65 cause boot failure in VMware
 ESXi 5.1 guest

On 12/26/2014 02:57 AM, Qu Wenruo wrote:
> Hi all,
>
> When testing v3.19-rc1 kernel(in fact, try to test), the kernel itself
> fail to boot on VMware ESXi 5.1 guest.
> The boot failure is quite easy to describe, only one line is output:
> "Probing EDD (edd=off to disable)...ok"
>
> No other output(including warning/bug_on/backtrace or whatever) and the
> guest just hangs.
> It's OK on v3.18, so it's a regression.
>
> Bisect points to the following commit:
> commit f5b2831d654167d77da8afbef4d2584897b12d0c
> Author: Juergen Gross <jgross@...e.com>
> Date:   Mon Nov 3 14:02:02 2014 +0100
>
>      x86: Respect PAT bit when copying pte values between large and
> normal pages
>
>      The PAT bit in the ptes is not moved to the correct position when
>      copying page protection attributes between entries of different sized
>      pages. Translate the ptes according to their page size.
>
>
> I have also created the kernel BZ report:
> https://bugzilla.kernel.org/show_bug.cgi?id=90321
>
> Hopes this can be resolved in next rc.

As the same issue has been reported with VMWare workstation which was
related to an error in the PAT MSR emulation of VMWare, I guess this
will be the same problem. I've already sent a patch.

You should be able to boot with the "nopat" kernel option.


Juergen
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ