lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <161791610893.3790633.1523539584166901628@swboyd.mtv.corp.google.com>
Date:   Thu, 08 Apr 2021 14:08:28 -0700
From:   Stephen Boyd <swboyd@...omium.org>
To:     Petr Mladek <pmladek@...e.com>
Cc:     Andrew Morton <akpm@...ux-foundation.org>,
        linux-kernel@...r.kernel.org, Jiri Olsa <jolsa@...nel.org>,
        Alexei Starovoitov <ast@...nel.org>,
        Jessica Yu <jeyu@...nel.org>,
        Evan Green <evgreen@...omium.org>,
        Hsin-Yi Wang <hsinyi@...omium.org>,
        Steven Rostedt <rostedt@...dmis.org>,
        Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
        Matthew Wilcox <willy@...radead.org>
Subject: Re: [PATCH v3 03/12] dump_stack: Add vmlinux build ID to stack traces

Quoting Stephen Boyd (2021-04-08 12:52:27)
> 
> Can you try this patch for x86? I'll dig up some hardware in the meantime.
> 

It works for me backported to this 5.10 kernel running on this x86
device I found. I'll wait for you to confirm and then send the next
round.

 CPU: 0 PID: 2719 Comm: bash Not tainted 5.10.27 #1 301c09d6713f73cc8761e0ec7c4a50f354819757
 Hardware name: Google Grunt/Grunt, BIOS Google_Grunt.11031.115.0 11/15/2019
 RIP: 0010:lkdtm_WARNING+0x13/0x17 [lkdtm bf9f9188770187b40e576292363651839854180c]
 Code: c7 15 ae 71 c0 31 c0 e8 b1 f9 f6 c9 0f 1f 44 00 00 55 48 89 e5 0f 0b 0f 1f 44 00 00 55 48 89 e5 ff 05 f3 7d 00 00 75 02 5d c3 <0f> 0b eb fa 0f 1f 44 00 00 55 48 89 e5 8b 35 dc 7d 00 00 ff c6 89
 RSP: 0018:ffffb296c1757dc0 EFLAGS: 00010202
 RAX: 0000000000000026 RBX: ffffffffc071a060 RCX: 5d63534cda001100
 RDX: ffff8e5faac22cf8 RSI: ffff8e5faac12e08 RDI: ffffffffc071a060
 RBP: ffffb296c1757dc0 R08: 0000000000000000 R09: ffffb296c1757ba0
 R10: 00000000ffffdfff R11: ffffffffc071722e R12: 0000000000000008
 R13: ffff8e5fa615f000 R14: ffffffffffffffea R15: ffffffffc071a819
 FS:  00007ee3373f2740(0000) GS:ffff8e5faac00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000058d943914918 CR3: 000000000f0a0000 CR4: 00000000001506f0
 Call Trace:
  direct_entry+0x107/0x113 [lkdtm bf9f9188770187b40e576292363651839854180c]
  full_proxy_write+0x5b/0x78
  vfs_write+0x145/0x40d
  ksys_write+0x7e/0xde
  do_syscall_64+0x43/0x55
  entry_SYSCALL_64_after_hwframe+0x44/0xa9
 RIP: 0033:0x7ee3372cb7f4
 Code: 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8d 05 31 40 0c 00 8b 00 85 c0 75 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 55 48 89 e5 48 83 ec 20 48 89
 RSP: 002b:00007ffe1c6db648 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
 RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007ee3372cb7f4
 RDX: 0000000000000008 RSI: 000058d944343c60 RDI: 0000000000000001
 RBP: 00007ffe1c6db670 R08: 000000000000000a R09: 00007ee3373f2740
 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008
 R13: 000058d944343c60 R14: 00007ee33738b5c0 R15: 00007ee3373865c0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ