lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 2 Mar 2023 10:02:39 +0100
From:   Johan Hovold <johan@...nel.org>
To:     Bingbu Cao <bingbu.cao@...ux.intel.com>
Cc:     Marc Zyngier <maz@...nel.org>, linux-kernel@...r.kernel.org,
        johan+linaro@...nel.org, hsinyi@...omium.org,
        nirmal.patel@...ux.intel.com, jonathan.derrick@...ux.dev,
        david.e.box@...ux.intel.com
Subject: Re: System boot failure related to commit 'irqdomain: Switch to
 per-domain locking'

On Thu, Mar 02, 2023 at 04:55:21PM +0800, Bingbu Cao wrote:

> I can dump the log by initramfs-tool now and checked that the change
> https://lore.kernel.org/all/20230223083800.31347-1-jgross@suse.com/ 
> can fix my problem, thanks for your help.

Thanks for confirming.

> [    1.726080] BUG: kernel NULL pointer dereference, address: 0000000000000050
> [    1.726874] #PF: supervisor read access in kernel mode
> [    1.727687] #PF: error_code(0x0000) - not-present page
> [    1.728491] PGD 0 P4D 0 
> [    1.729280] Oops: 0000 [#1] PREEMPT SMP NOPTI
> [    1.730078] CPU: 3 PID: 154 Comm: systemd-udevd Not tainted 6.2.0-ipu #10
> [    1.730870] Hardware name: Dell Inc. XPS 9315/, BIOS 0.0.22 12/23/2021
> [    1.731670] RIP: 0010:irq_domain_create_hierarchy+0x2d/0x70
> [    1.732470] Code: 00 00 55 48 89 e5 41 55 49 89 fd 48 89 cf 41 54 53 89 f3 85 d2 74 3f 89 d6 31 c9 89 d2 e8 6b fd ff ff 49 89 c4 4d 85 e4 74 1e <49> 8b 45 50 41 09 5c 24 28 4c 89 e7 4d 89 ac 24 80 00 00 00 49 89
> [    1.733321] RSP: 0018:ffffb811c08e38f8 EFLAGS: 00010282
> [    1.734156] RAX: ffff975001456540 RBX: 0000000000000010 RCX: 0000000000000000
> [    1.734993] RDX: ffffffffadf8be90 RSI: ffffffffac7290a0 RDI: ffff975001456570
> [    1.735841] RBP: ffffb811c08e3910 R08: ffff975001452900 R09: ffff975001452900
> [    1.736676] R10: ffff975001452900 R11: ffff97510145206f R12: ffff975001456540
> [    1.737515] R13: 0000000000000000 R14: 0000000000000013 R15: ffff975011860628
> [    1.738349] FS:  00007f20175c08c0(0000) GS:ffff97537f8c0000(0000) knlGS:0000000000000000
> [    1.739198] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [    1.740042] CR2: 0000000000000050 CR3: 0000000111e1c004 CR4: 0000000000770ee0
> [    1.740892] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [    1.741741] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400
> [    1.742592] PKRU: 55555554
> [    1.743415] Call Trace:
> [    1.744226]  <TASK>
> [    1.745045]  __msi_create_irq_domain+0xb8/0x180
> [    1.745863]  msi_create_irq_domain+0x13/0x20
> [    1.746680]  pci_msi_create_irq_domain+0x7a/0xe0
> [    1.747493]  vmd_probe+0x85e/0x9a0 [vmd]
> [    1.748313]  local_pci_probe+0x48/0xb0
> [    1.749133]  pci_device_probe+0xc8/0x280
> [    1.749961]  really_probe+0x186/0x3f0

Johan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ