lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Fri, 18 Dec 2015 16:15:16 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Andy Lutomirski <luto@...nel.org>
CC:	LKML <linux-kernel@...r.kernel.org>
Subject: [lkp] [x86/entry/64] e184a244e6: kmsg.uvesafb:vbe_init()failed_with

FYI, we noticed the below changes on

https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git x86/entry_compat
commit e184a244e62f25ce625efb3ce82bdfbbe9b2f35e ("x86/entry/64: Migrate the 64-bit syscall slow path to C")


[    6.432968] uvesafb: SeaBIOS Developers, SeaBIOS VBE Adapter, Rev. 1, OEM: SeaBIOS VBE(C) 2011, VBE v3.0
[    6.438841] traps: v86d[123] general protection ip:400e84 sp:7ffe0cf303b8 error:0 in v86d[400000+1a000]
[    6.970359] tsc: Refined TSC clocksource calibration: 2693.504 MHz
[    6.971741] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x26d345dbcd4, max_idle_ns: 440795302414 ns
[   11.438233] uvesafb: Getting mode info block for mode 0x100 failed (eax=0x4f01, err=1)
[   11.442479] traps: v86d[126] general protection ip:400e84 sp:7fff9bf86ab8 error:0 in v86d[400000+1a000]
[   16.438233] uvesafb: Getting mode info block for mode 0x101 failed (eax=0x4f01, err=1)
[   16.442710] traps: v86d[128] general protection ip:400e84 sp:7ffef4bec298 error:0 in v86d[400000+1a000]
[   21.438229] uvesafb: Getting mode info block for mode 0x102 failed (eax=0x4f01, err=1)
[   21.442427] traps: v86d[130] general protection ip:400e84 sp:7ffdcfb3f838 error:0 in v86d[400000+1a000]
[   26.438321] uvesafb: Getting mode info block for mode 0x103 failed (eax=0x4f01, err=1)
[   26.443237] traps: v86d[132] general protection ip:400e84 sp:7ffd7e658928 error:0 in v86d[400000+1a000]
[   31.438229] uvesafb: Getting mode info block for mode 0x104 failed (eax=0x4f01, err=1)
[   31.442440] traps: v86d[134] general protection ip:400e84 sp:7fff93327b58 error:0 in v86d[400000+1a000]
[   36.438239] uvesafb: Getting mode info block for mode 0x105 failed (eax=0x4f01, err=1)
[   36.446311] traps: v86d[136] general protection ip:400e84 sp:7ffcc1f88fe8 error:0 in v86d[400000+1a000]
[   41.442251] uvesafb: Getting mode info block for mode 0x106 failed (eax=0x4f01, err=1)
[   41.445898] traps: v86d[138] general protection ip:400e84 sp:7ffe53f6cd68 error:0 in v86d[400000+1a000]
[   46.442289] uvesafb: Getting mode info block for mode 0x107 failed (eax=0x4f01, err=1)
[   46.447176] traps: v86d[140] general protection ip:400e84 sp:7ffe06a2dfd8 error:0 in v86d[400000+1a000]
[   51.446238] uvesafb: Getting mode info block for mode 0x10d failed (eax=0x4f01, err=1)
[   51.451349] traps: v86d[142] general protection ip:400e84 sp:7ffe36d5dc28 error:0 in v86d[400000+1a000]
[   56.450243] uvesafb: Getting mode info block for mode 0x10e failed (eax=0x4f01, err=1)
[   56.455085] traps: v86d[144] general protection ip:400e84 sp:7ffc4a1e0628 error:0 in v86d[400000+1a000]
[   61.454242] uvesafb: Getting mode info block for mode 0x10f failed (eax=0x4f01, err=1)
[   61.459048] traps: v86d[146] general protection ip:400e84 sp:7ffc0bdc5458 error:0 in v86d[400000+1a000]
[   66.458226] uvesafb: Getting mode info block for mode 0x110 failed (eax=0x4f01, err=1)
[   66.463316] traps: v86d[148] general protection ip:400e84 sp:7ffe596e9a58 error:0 in v86d[400000+1a000]
[   71.462258] uvesafb: Getting mode info block for mode 0x111 failed (eax=0x4f01, err=1)
[   71.466831] traps: v86d[150] general protection ip:400e84 sp:7ffec48bd338 error:0 in v86d[400000+1a000]
[   76.466228] uvesafb: Getting mode info block for mode 0x112 failed (eax=0x4f01, err=1)
[   76.470788] traps: v86d[152] general protection ip:400e84 sp:7ffcb65ebd98 error:0 in v86d[400000+1a000]
[   81.470236] uvesafb: Getting mode info block for mode 0x113 failed (eax=0x4f01, err=1)
[   81.474623] traps: v86d[154] general protection ip:400e84 sp:7ffda47af8d8 error:0 in v86d[400000+1a000]
[   86.470355] uvesafb: Getting mode info block for mode 0x114 failed (eax=0x4f01, err=1)
[   86.477805] traps: v86d[156] general protection ip:400e84 sp:7ffe5d16a5a8 error:0 in v86d[400000+1a000]
[   91.474337] uvesafb: Getting mode info block for mode 0x115 failed (eax=0x4f01, err=1)
[   91.479924] traps: v86d[158] general protection ip:400e84 sp:7fff040338e8 error:0 in v86d[400000+1a000]
[   96.478256] uvesafb: Getting mode info block for mode 0x116 failed (eax=0x4f01, err=1)
[   96.482755] traps: v86d[160] general protection ip:400e84 sp:7ffd02863c38 error:0 in v86d[400000+1a000]
[  101.482230] uvesafb: Getting mode info block for mode 0x117 failed (eax=0x4f01, err=1)
[  101.486500] traps: v86d[162] general protection ip:400e84 sp:7ffec7a7eed8 error:0 in v86d[400000+1a000]
[  106.482222] uvesafb: Getting mode info block for mode 0x118 failed (eax=0x4f01, err=1)
[  106.485474] traps: v86d[164] general protection ip:400e84 sp:7ffe4a629218 error:0 in v86d[400000+1a000]
[  111.482220] uvesafb: Getting mode info block for mode 0x119 failed (eax=0x4f01, err=1)
[  111.486514] traps: v86d[166] general protection ip:400e84 sp:7fff68f668a8 error:0 in v86d[400000+1a000]
[  116.482229] uvesafb: Getting mode info block for mode 0x11a failed (eax=0x4f01, err=1)
[  116.486023] v86d (167) used greatest stack depth: 13568 bytes left
[  116.488792] traps: v86d[168] general protection ip:400e84 sp:7fffabdd2fd8 error:0 in v86d[400000+1a000]
[  121.486230] uvesafb: Getting mode info block for mode 0x11b failed (eax=0x4f01, err=1)
[  121.491563] traps: v86d[170] general protection ip:400e84 sp:7ffc312d3cc8 error:0 in v86d[400000+1a000]
...

Thanks,
Ying Huang

View attachment "config-4.4.0-rc5-00018-ge184a24" of type "text/plain" (147663 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (35644 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ