Date: Fri, 22 Jun 2018 14:27:19 +0900 From: Denis Polygalov <dpolyg@gmail.com> To: Gordon Tetlow <gordon@tetlows.org> Cc: freebsd-security <freebsd-security@freebsd.org> Subject: Re: Recent security patch cause reboot loop on 11.1 RELEASE Message-ID: <CAHxjC090EHBYRXBOrgA0KNr5qjcRN2gvXQ7obns9-qQwFwZ%2B=g@mail.gmail.com> In-Reply-To: <CAKghNw3C45YyKMAxgXhrvuY4p4toGDQ8f%2BAz5uH7tgQr2tp_MA@mail.gmail.com> References: <CAHxjC08%2BGebqYEmUKTUtj_wLSAJU1gJe0oin9sbHm9QkihkxNg@mail.gmail.com> <CAKghNw0vpFnKN-jFwewSzAeTc=27oHmX_LGepjqjsU0vTaE_tw@mail.gmail.com> <dd5feb15-b846-1564-1260-620e3c8e7b42@gmail.com> <CAKghNw3C45YyKMAxgXhrvuY4p4toGDQ8f%2BAz5uH7tgQr2tp_MA@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Gordon, I was about to make the verbose dmesg output as requested but before doing so I did just # kldload linux.so on the patched kernel. Nothing bad happend. Then I restarted with linux_* lines enabled in the loader.conf and choose verbose dmesg in boot menu. Boot and ... everything was OK. Then non-verbose dmesg and linux_* lines enabled - no problems. So _suddenly_ it is fixed. I had 3 enters into reboot loops yesterday... I will send the verbose dmesg by separated e-mail. Regards, Denis On 6/22/18, Gordon Tetlow <gordon@tetlows.org> wrote: > Hmm. I'm unable to reproduce the error in any of my testing scenarios. > I apologize for not being to help further. As kib advised, if you can > please post a verbose dmesg from a successful boot along with where > you believe the panic occurs on a bad boot. > > Gordon > > On Thu, Jun 21, 2018 at 5:13 AM, Denis Polygalov <dpolyg@gmail.com> wrote: >> Seems like I did not cc my reply to the mailing list. >> Doing it now because I found a hint which may >> lead to the cause of the reboot loop. >> >> Removing: >> >> linux_load="YES" >> linprocfs_load="YES" >> linsysfs_load="YES" >> >> prevent the reboot loop in multi-user mode but >> leave me without Linux emulation... >> >> Regards, >> Denis. >> >>> Hi Gordon, >>> >>> this is real hardware. I found the reason (see below). >>> Setting hw.lazy_fpu_switch=1 in /boot/loader.conf makes no difference. >>> No panic messages. >>> I can tell you when it happen. Here is the boot messages: >>> ... skipped ... >>> Timecounters tick every 1.000 msec >>> nvme cam probe device init >>> ugen2.1: <Intel EHCI root HUB> at usbus2 >>> ugen1.1: <Intel UHCI root HUB> at usbus1 >>> ugen0.1: <Intel UHCI root HUB> at usbus0 >>> uhub0: <Intel EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus2 >>> uhub1: <Intel UHCI root HUB, class 9/0, rev 1.00/1.00, addr 1> on usbus0 >>> uhub2: <Intel UHCI root HUB, class 9/0, rev 1.00/1.00, addr 1> on usbus1 >>> uhub1: 2 ports with 2 removable, self powered >>> uhub2: 2 ports with 2 removable, self powered >>> uhub0: 4 ports with 4 removable, self powered >>> >>> <---- here screen (local monitor) goes black and machine restarted. >>> >>> ada0 at ata2 bus 0 scbus8 target 0 lun 0 >>> ada0: <WDC WD2000FYYZ-01UL1B1 01.01K02> ATA8-ACS SATA 3.x device >>> ada0: Serial Number WD-WMC1P0D1KEHJ >>> ada0: 150.000MB/s transfers (SATA 1.x, UDMA5, PIO 8192bytes) >>> ada0: 1907729MB (3907029168 512 byte sectors) >>> da0 at ciss0 bus 0 scbus0 target 0 lun 0 >>> da0: <HP RAID 5 OK> Fixed Direct Access SCSI device >>> da0: 135.168MB/s transfers >>> da0: Command Queueing enabled >>> da0: 858293MB (1757784604 512 byte sectors) >>> Trying to mount root from ufs:/dev/da0s1a [rw]... >>> >>> I noticed that I can boot the *patched* kernel in single user mode. >>> Removing these 3 lines from the /boot/loader.conf fixed rebooting loop >>> problem: >>> >>> linux_load="YES" >>> linprocfs_load="YES" >>> linsysfs_load="YES" >>> >>> This machine is used as a test bench to test stuff >>> before deploying on a production server. >>> We need Linux emulation support on the production >>> server to run closed source software... >>> So... maybe this will help someone. >>> >>> Blaming evil penguins, >>> Denis >> >> >> >> >> On 21/06/2018 4:19 PM, Gordon Tetlow wrote: >>> >>> On Wed, Jun 20, 2018 at 11:14 PM, Denis Polygalov <dpolyg@gmail.com> >>> wrote: >>>> >>>> What I did is following: >>>> >>>> # uname -a >>>> FreeBSD my_host_name 11.1-RELEASE-p10 FreeBSD 11.1-RELEASE-p10 #0: Tue >>>> May 8 05:21:56 UTC 2018 >>>> root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64 >>>> >>>> # freebsd-update fetch >>>> Looking up update.FreeBSD.org mirrors... 3 mirrors found. >>>> Fetching metadata signature for 11.1-RELEASE from >>>> update6.freebsd.org... >>>> done. >>>> Fetching metadata index... done. >>>> Inspecting system... done. >>>> Preparing to download files... done. >>>> >>>> The following files will be updated as part of updating to >>>> 11.1-RELEASE-p11: >>>> /boot/kernel/kernel >>>> >>>> Installing this update cause endless reboot loop. >>>> >>>> # cat /boot/loader.conf >>>> kern.maxfiles="32768" >>>> zfs_load="YES" >>>> linux_load="YES" >>>> linprocfs_load="YES" >>>> linsysfs_load="YES" >>>> >>>> # dmesg |grep CPU >>>> CPU: Intel(R) Xeon(TM) CPU 3.40GHz (3400.19-MHz K8-class CPU) >>>> FreeBSD/SMP: Multiprocessor System Detected: 4 CPUs >>>> SMP: AP CPU #1 Launched! >>>> SMP: AP CPU #3 Launched! >>>> SMP: AP CPU #2 Launched! >>>> cpu0: <ACPI CPU> on acpi0 >>>> cpu1: <ACPI CPU> on acpi0 >>>> cpu2: <ACPI CPU> on acpi0 >>>> cpu3: <ACPI CPU> on acpi0 >>>> acpi_perf0: <ACPI CPU Frequency Control> on cpu0 >>>> est: CPU supports Enhanced Speedstep, but is not recognized. >>>> est: CPU supports Enhanced Speedstep, but is not recognized. >>>> est: CPU supports Enhanced Speedstep, but is not recognized. >>>> >>>> The machine is HP ProLiant ML350 >>> >>> >>> Sorry to hear you are having a problem. >>> >>> Just to confirm, this is running on hardware and not on a Xen >>> hypervisor, correct? >>> >>> Assuming it's running directly on the hardware, can you see if setting: >>> hw.lazy_fpu_switch=1 >>> in /boot/loader.conf makes any difference? >>> >>> Is there any panic message? >>> >>> Thanks, >>> Gordon >>> >> _______________________________________________ >> freebsd-security@freebsd.org mailing list >> https://lists.freebsd.org/mailman/listinfo/freebsd-security >> To unsubscribe, send any mail to >> "freebsd-security-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAHxjC090EHBYRXBOrgA0KNr5qjcRN2gvXQ7obns9-qQwFwZ%2B=g>