KASAN: slab-out-of-bounds Read in pfkey_add

19 views
Skip to first unread message

syzbot

unread,
Apr 11, 2019, 8:00:40 PM4/11/19
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: cb023581 ANDROID: proc: add null check in proc_uid_init
git tree: android-4.9
console output: https://syzkaller.appspot.com/x/log.txt?x=139c5687800000
kernel config: https://syzkaller.appspot.com/x/.config?x=2e98fad903e90bce
dashboard link: https://syzkaller.appspot.com/bug?extid=8f5b83a44c53b7c8bef9
compiler: gcc (GCC) 8.0.1 20180301 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=136a0c3b800000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=164d843b800000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+8f5b83...@syzkaller.appspotmail.com

==================================================================
BUG: KASAN: slab-out-of-bounds in pfkey_msg2xfrm_state
net/key/af_key.c:1188 [inline]
BUG: KASAN: slab-out-of-bounds in pfkey_add+0x2565/0x3240
net/key/af_key.c:1506
Read of size 8192 at addr ffff8801b7436f40 by task syzkaller362258/3784

CPU: 0 PID: 3784 Comm: syzkaller362258 Not tainted 4.9.93-gcb02358 #2
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
ffff8801d900f6e0 ffffffff81d9c249 ffffea0006dd0d80 ffff8801b7436f40
0000000000000000 ffff8801b7437100 ffff8801b7436f00 ffff8801d900f718
ffffffff8156533b ffff8801b7436f40 0000000000002000 0000000000000000
Call Trace:
[<ffffffff81d9c249>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81d9c249>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
[<ffffffff8156533b>] print_address_description+0x6c/0x234
mm/kasan/report.c:256
[<ffffffff815655af>] kasan_report_error mm/kasan/report.c:355 [inline]
[<ffffffff815655af>] kasan_report.cold.6+0xac/0x2f5 mm/kasan/report.c:412
[<ffffffff8153822f>] check_memory_region_inline mm/kasan/kasan.c:318
[inline]
[<ffffffff8153822f>] check_memory_region+0x14f/0x1b0 mm/kasan/kasan.c:325
[<ffffffff81538873>] memcpy+0x23/0x50 mm/kasan/kasan.c:360
[<ffffffff8358c795>] pfkey_msg2xfrm_state net/key/af_key.c:1188 [inline]
[<ffffffff8358c795>] pfkey_add+0x2565/0x3240 net/key/af_key.c:1506
[<ffffffff83582ec1>] pfkey_process+0x671/0x740 net/key/af_key.c:2834
[<ffffffff835846e6>] pfkey_sendmsg+0x346/0xae0 net/key/af_key.c:3678
[<ffffffff82ef3fcc>] sock_sendmsg_nosec net/socket.c:635 [inline]
[<ffffffff82ef3fcc>] sock_sendmsg+0xcc/0x110 net/socket.c:645
[<ffffffff82ef5a6c>] ___sys_sendmsg+0x6fc/0x840 net/socket.c:1969
[<ffffffff82ef7ad9>] __sys_sendmsg+0xd9/0x190 net/socket.c:2003
[<ffffffff82ef7bbd>] SYSC_sendmsg net/socket.c:2014 [inline]
[<ffffffff82ef7bbd>] SyS_sendmsg+0x2d/0x50 net/socket.c:2010
[<ffffffff81006316>] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282
[<ffffffff838d5953>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb

Allocated by task 3784:
save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57
save_stack+0x43/0xd0 mm/kasan/kasan.c:505
set_track mm/kasan/kasan.c:517 [inline]
kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:609
kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:547
slab_post_alloc_hook mm/slab.h:417 [inline]
slab_alloc_node mm/slub.c:2715 [inline]
slab_alloc mm/slub.c:2723 [inline]
__kmalloc_track_caller+0xdc/0x2b0 mm/slub.c:4232
__kmalloc_reserve.isra.37+0x33/0xc0 net/core/skbuff.c:138
__alloc_skb+0x11a/0x600 net/core/skbuff.c:231
alloc_skb include/linux/skbuff.h:919 [inline]
pfkey_sendmsg+0xfe/0xae0 net/key/af_key.c:3665
sock_sendmsg_nosec net/socket.c:635 [inline]
sock_sendmsg+0xcc/0x110 net/socket.c:645
___sys_sendmsg+0x6fc/0x840 net/socket.c:1969
__sys_sendmsg+0xd9/0x190 net/socket.c:2003
SYSC_sendmsg net/socket.c:2014 [inline]
SyS_sendmsg+0x2d/0x50 net/socket.c:2010
do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282
entry_SYSCALL_64_after_swapgs+0x5d/0xdb

Freed by task 2013:
save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:57
save_stack+0x43/0xd0 mm/kasan/kasan.c:505
set_track mm/kasan/kasan.c:517 [inline]
kasan_slab_free+0x72/0xc0 mm/kasan/kasan.c:582
slab_free_hook mm/slub.c:1355 [inline]
slab_free_freelist_hook mm/slub.c:1377 [inline]
slab_free mm/slub.c:2958 [inline]
kfree+0xfb/0x310 mm/slub.c:3878
kernfs_fop_release+0xff/0x140 fs/kernfs/file.c:744
__fput+0x263/0x700 fs/file_table.c:208
____fput+0x15/0x20 fs/file_table.c:244
task_work_run+0x10c/0x180 kernel/task_work.c:116
tracehook_notify_resume include/linux/tracehook.h:191 [inline]
exit_to_usermode_loop+0xfc/0x120 arch/x86/entry/common.c:161
prepare_exit_to_usermode arch/x86/entry/common.c:191 [inline]
syscall_return_slowpath arch/x86/entry/common.c:260 [inline]
do_syscall_64+0x364/0x490 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_swapgs+0x5d/0xdb

The buggy address belongs to the object at ffff8801b7436f00
which belongs to the cache kmalloc-512 of size 512
The buggy address is located 64 bytes inside of
512-byte region [ffff8801b7436f00, ffff8801b7437100)
The buggy address belongs to the page:
page:ffffea0006dd0d80 count:1 mapcount:0 mapping: (null) index:0x0
compound_mapcount: 0
flags: 0x8000000000004080(slab|head)
page dumped because: kasan: bad access detected

Memory state around the buggy address:
ffff8801b7437000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff8801b7437080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> ffff8801b7437100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
^
ffff8801b7437180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff8801b7437200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this bug, for details see:
https://goo.gl/tpsmEJ#testing-patches

syzbot

unread,
Apr 11, 2019, 8:00:50 PM4/11/19
to syzkaller-a...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: bd23e3af UPSTREAM: timer: Export destroy_hrtimer_on_stack()
git tree: android-4.4
console output: https://syzkaller.appspot.com/x/log.txt?x=11fb00e7800000
kernel config: https://syzkaller.appspot.com/x/.config?x=52b70c75fab5af5
dashboard link: https://syzkaller.appspot.com/bug?extid=cf0119d4473346a98d51
compiler: gcc (GCC) 8.0.1 20180413 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1568b1c7800000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14e6b767800000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+cf0119...@syzkaller.appspotmail.com

random: sshd: uninitialized urandom read (32 bytes read, 36 bits of entropy
available)
random: sshd: uninitialized urandom read (32 bytes read, 36 bits of entropy
available)
random: sshd: uninitialized urandom read (32 bytes read, 123 bits of
entropy available)
random: nonblocking pool is initialized
==================================================================
BUG: KASAN: slab-out-of-bounds in pfkey_msg2xfrm_state
net/key/af_key.c:1188 [inline]
BUG: KASAN: slab-out-of-bounds in pfkey_add+0x2537/0x3220
net/key/af_key.c:1506
Read of size 8192 at addr ffff8801d208c7c0 by task syzkaller005732/3745

CPU: 1 PID: 3745 Comm: syzkaller005732 Not tainted 4.4.128-gbd23e3a #20
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
0000000000000000 4c179ff68ea1bd67 ffff8801d9547740 ffffffff81e0daad
ffffea0007482300 ffff8801d208c7c0 0000000000000000 ffff8801d208c980
ffff8801d208c780 ffff8801d9547778 ffffffff815150ac ffff8801d208c7c0
Call Trace:
[<ffffffff81e0daad>] __dump_stack lib/dump_stack.c:15 [inline]
[<ffffffff81e0daad>] dump_stack+0xc1/0x124 lib/dump_stack.c:51
[<ffffffff815150ac>] print_address_description+0x6c/0x216
mm/kasan/report.c:252
[<ffffffff815153cb>] kasan_report_error mm/kasan/report.c:351 [inline]
[<ffffffff815153cb>] kasan_report.cold.7+0x175/0x2f7 mm/kasan/report.c:408
[<ffffffff814f7e4f>] check_memory_region_inline mm/kasan/kasan.c:325
[inline]
[<ffffffff814f7e4f>] check_memory_region+0x14f/0x1b0 mm/kasan/kasan.c:332
[<ffffffff814f8393>] memcpy+0x23/0x50 mm/kasan/kasan.c:367
[<ffffffff83584c47>] pfkey_msg2xfrm_state net/key/af_key.c:1188 [inline]
[<ffffffff83584c47>] pfkey_add+0x2537/0x3220 net/key/af_key.c:1506
[<ffffffff83588201>] pfkey_process+0x671/0x740 net/key/af_key.c:2834
[<ffffffff83589a36>] pfkey_sendmsg+0x346/0xae0 net/key/af_key.c:3678
[<ffffffff82f1ba9c>] sock_sendmsg_nosec net/socket.c:625 [inline]
[<ffffffff82f1ba9c>] sock_sendmsg+0xcc/0x110 net/socket.c:635
[<ffffffff82f1d565>] ___sys_sendmsg+0x745/0x880 net/socket.c:1962
[<ffffffff82f1f606>] __sys_sendmsg+0xd6/0x190 net/socket.c:1996
[<ffffffff82f1f6ed>] SYSC_sendmsg net/socket.c:2007 [inline]
[<ffffffff82f1f6ed>] SyS_sendmsg+0x2d/0x50 net/socket.c:2003
[<ffffffff838be765>] entry_SYSCALL_64_fastpath+0x22/0x9e

Allocated by task 3745:
[<ffffffff810341d6>] save_stack_trace+0x26/0x50
arch/x86/kernel/stacktrace.c:63
[<ffffffff814f7f73>] save_stack+0x43/0xd0 mm/kasan/kasan.c:512
[<ffffffff814f8257>] set_track mm/kasan/kasan.c:524 [inline]
[<ffffffff814f8257>] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:616
[<ffffffff814f8a34>] kasan_krealloc+0x64/0x80 mm/kasan/kasan.c:654
[<ffffffff814f1c2a>] ksize+0x8a/0xf0 mm/slub.c:3727
[<ffffffff82f35993>] __alloc_skb+0x133/0x600 net/core/skbuff.c:237
[<ffffffff835897ee>] alloc_skb include/linux/skbuff.h:815 [inline]
[<ffffffff835897ee>] pfkey_sendmsg+0xfe/0xae0 net/key/af_key.c:3665
[<ffffffff82f1ba9c>] sock_sendmsg_nosec net/socket.c:625 [inline]
[<ffffffff82f1ba9c>] sock_sendmsg+0xcc/0x110 net/socket.c:635
[<ffffffff82f1d565>] ___sys_sendmsg+0x745/0x880 net/socket.c:1962
[<ffffffff82f1f606>] __sys_sendmsg+0xd6/0x190 net/socket.c:1996
[<ffffffff82f1f6ed>] SYSC_sendmsg net/socket.c:2007 [inline]
[<ffffffff82f1f6ed>] SyS_sendmsg+0x2d/0x50 net/socket.c:2003
[<ffffffff838be765>] entry_SYSCALL_64_fastpath+0x22/0x9e

Freed by task 2025:
[<ffffffff810341d6>] save_stack_trace+0x26/0x50
arch/x86/kernel/stacktrace.c:63
[<ffffffff814f7f73>] save_stack+0x43/0xd0 mm/kasan/kasan.c:512
[<ffffffff814f88a2>] set_track mm/kasan/kasan.c:524 [inline]
[<ffffffff814f88a2>] kasan_slab_free+0x72/0xc0 mm/kasan/kasan.c:589
[<ffffffff814f5da4>] slab_free_hook mm/slub.c:1383 [inline]
[<ffffffff814f5da4>] slab_free_freelist_hook mm/slub.c:1405 [inline]
[<ffffffff814f5da4>] slab_free mm/slub.c:2859 [inline]
[<ffffffff814f5da4>] kfree+0xf4/0x310 mm/slub.c:3749
[<ffffffff82f34a74>] skb_free_head net/core/skbuff.c:571 [inline]
[<ffffffff82f34a74>] skb_release_data+0x304/0x3b0 net/core/skbuff.c:602
[<ffffffff82f34b6a>] skb_release_all+0x4a/0x60 net/core/skbuff.c:661
[<ffffffff82f35173>] __kfree_skb net/core/skbuff.c:675 [inline]
[<ffffffff82f35173>] consume_skb+0xf3/0x3d0 net/core/skbuff.c:748
[<ffffffff82f52efa>] skb_free_datagram+0x1a/0xe0 net/core/datagram.c:280
[<ffffffff830ae713>] netlink_recvmsg+0x663/0xe30
net/netlink/af_netlink.c:1929
[<ffffffff82f1a8d1>] sock_recvmsg_nosec net/socket.c:727 [inline]
[<ffffffff82f1a8d1>] sock_recvmsg+0x91/0xc0 net/socket.c:735
[<ffffffff82f1d905>] ___sys_recvmsg+0x265/0x590 net/socket.c:2116
[<ffffffff82f1fb26>] __sys_recvmsg+0xd6/0x190 net/socket.c:2162
[<ffffffff82f1fc0d>] SYSC_recvmsg net/socket.c:2174 [inline]
[<ffffffff82f1fc0d>] SyS_recvmsg+0x2d/0x50 net/socket.c:2169
[<ffffffff838be765>] entry_SYSCALL_64_fastpath+0x22/0x9e

The buggy address belongs to the object at ffff8801d208c780
which belongs to the cache kmalloc-512 of size 512
The buggy address is located 64 bytes inside of
512-byte region [ffff8801d208c780, ffff8801d208c980)
The buggy address belongs to the page:
kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
BUG: unable toSeaBIOS (version 1.8.2-20171130_102032-google)
Initializing cgroup subsys cpuset
Initializing cgroup subsys cpu
Initializing cgroup subsys cpuacct
Initializing cgroup subsys schedtune
Linux version 4.4.128-gbd23e3a (syzkaller@ci) (gcc version 8.0.1 20180413
(experimental) (GCC) ) #20 SMP PREEMPT Tue Apr 24 03:43:15 UTC 2018
Command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0
earlyprintk=serial vsyscall=native rodata=n ftrace_dump_on_oops=orig_cpu
oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400
workqueue.watchdog_thresh=120
KERNEL supported cpus:
Intel GenuineIntel
AMD AuthenticAMD
Centaur CentaurHauls
x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers'
x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers'
x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers'
x86/fpu: Enabled xstate features 0x7, context size is 832 bytes,
using 'standard' format.
x86/fpu: Using 'eager' FPU context switches.
e820: BIOS-provided physical RAM map:
BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
BIOS-e820: [mem 0x0000000000100000-0x00000000bfff2fff] usable
BIOS-e820: [mem 0x00000000bfff3000-0x00000000bfffffff] reserved
BIOS-e820: [mem 0x00000000fffbc000-0x00000000ffffffff] reserved
BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable
bootconsole [earlyser0] enabled
NX (Execute Disable) protection: active
SMBIOS 2.4 present.
Hypervisor detected: KVM
e820: last_pfn = 0x220000 max_arch_pfn = 0x400000000
x86/PAT: Configuration [0-7]: WB WC UC- UC WB WC UC- WT
e820: last_pfn = 0xbfff3 max_arch_pfn = 0x400000000
found SMP MP-table at [mem 0x000f23d0-0x000f23df] mapped at
[ffff8800000f23d0]
Scanning 1 areas for low memory corruption
Using GB pages for direct mapping
ACPI: Early table checksum verification disabled
ACPI: RSDP 0x00000000000F2390 000014 (v00 Google)
ACPI: RSDT 0x00000000BFFF3430 000038 (v01 Google GOOGRSDT 00000001 GOOG
00000001)
ACPI: FACP 0x00000000BFFFCF60 0000F4 (v02 Google GOOGFACP 00000001 GOOG
00000001)
ACPI: DSDT 0x00000000BFFF3470 0017B2 (v01 Google GOOGDSDT 00000001 GOOG
00000001)
ACPI: FACS 0x00000000BFFFCF00 000040
ACPI: FACS 0x00000000BFFFCF00 000040
ACPI: SSDT 0x00000000BFFF65F0 00690D (v01 Google GOOGSSDT 00000001 GOOG
00000001)
ACPI: APIC 0x00000000BFFF5D10 000076 (v01 Google GOOGAPIC 00000001 GOOG
00000001)
ACPI: WAET 0x00000000BFFF5CE0 000028 (v01 Google GOOGWAET 00000001 GOOG
00000001)
ACPI: SRAT 0x00000000BFFF4C30 0000C8 (v01 Google GOOGSRAT 00000001 GOOG
00000001)
kvm-clock: Using msrs 4b564d01 and 4b564d00
kvm-clock: cpu 0, msr 2:1fffd001, primary cpu clock
kvm-clock: using sched offset of 1935001924 cycles
clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb,
max_idle_ns: 881590591483 ns
Zone ranges:
DMA [mem 0x0000000000001000-0x0000000000ffffff]
DMA32 [mem 0x0000000001000000-0x00000000ffffffff]
Normal [mem 0x0000000100000000-0x000000021fffffff]
Movable zone start for each node
Early memory node ranges
node 0: [mem 0x0000000000001000-0x000000000009efff]
node 0: [mem 0x0000000000100000-0x00000000bfff2fff]
node 0: [mem 0x0000000100000000-0x000000021fffffff]
Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff]
kasan: KernelAddressSanitizer initialized
ACPI: PM-Timer IO Port: 0xb008
ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Using ACPI (MADT) for SMP configuration information
smpboot: Allowing 2 CPUs, 0 hotplug CPUs
PM: Registered nosave memory: [mem 0x00000000-0x00000fff]
PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
PM: Registered nosave memory: [mem 0x000a0000-0x000effff]
PM: Registered nosave memory: [mem 0x000f0000-0x000fffff]
PM: Registered nosave memory: [mem 0xbfff3000-0xbfffffff]
PM: Registered nosave memory: [mem 0xc0000000-0xfffbbfff]
PM: Registered nosave memory: [mem 0xfffbc000-0xffffffff]
e820: [mem 0xc0000000-0xfffbbfff] available for PCI devices
Booting paravirtualized kernel on KVM
clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff,
max_idle_ns: 19112604462750000 ns
setup_percpu: NR_CPUS:64 nr_cpumask_bits:64 nr_cpu_ids:2 nr_node_ids:1
PERCPU: Embedded 42 pages/cpu @ffff8801db200000 s134024 r8192 d29816
u1048576
Built 1 zonelists in Zone order, mobility grouping on. Total pages: 1935227
Kernel command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0
earlyprintk=serial vsyscall=native rodata=n ftrace_dump_on_oops=orig_cpu
oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400
workqueue.watchdog_thresh=120
PID hash table entries: 4096 (order: 3, 32768 bytes)
Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes)
Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes)
Memory: 6579092K/7863876K available (41745K kernel code, 6300K rwdata,
9048K rodata, 1864K init, 23696K bss, 1284784K reserved, 0K cma-reserved)
SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Kernel/User page tables isolation: enabled
Running RCU self tests
Preemptible hierarchical RCU implementation.
RCU lockdep checking is enabled.
Build-time adjustment of leaf fanout to 64.
RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=2.
RCU: Adjusting geometry for rcu_fanout_leaf=64, nr_cpu_ids=2
NR_IRQS:4352 nr_irqs:440 16
console [ttyS0] enabled
console [ttyS0] enabled
bootconsole [earlyser0] disabled
bootconsole [earlyser0] disabled
Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar
... MAX_LOCKDEP_SUBCLASSES: 8
... MAX_LOCK_DEPTH: 48
... MAX_LOCKDEP_KEYS: 8191
... CLASSHASH_SIZE: 4096
... MAX_LOCKDEP_ENTRIES: 32768
... MAX_LOCKDEP_CHAINS: 65536
... CHAINHASH_SIZE: 32768
memory used by lock dependency info: 8159 kB
per task-struct memory footprint: 1920 bytes
tsc: Detected 2300.000 MHz processor
Calibrating delay loop (skipped) preset value.. 4600.00 BogoMIPS
(lpj=23000000)
pid_max: default: 32768 minimum: 301
ACPI: Core revision 20150930
ACPI: 2 ACPI AML tables successfully acquired and loaded
Security Framework initialized
SELinux: Initializing.
AppArmor: AppArmor disabled by boot time parameter
Mount-cache hash table entries: 16384 (order: 5, 131072 bytes)
Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes)
Initializing cgroup subsys io
Initializing cgroup subsys freezer
Initializing cgroup subsys hugetlb
Initializing cgroup subsys debug
CPU: Physical Processor ID: 0
mce: CPU supports 32 MCE banks
Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024
Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4
Spectre V2 : Mitigation: Full generic retpoline
Freeing SMP alternatives memory: 48K
..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1
smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f,
stepping: 0x0)
Performance Events: unsupported p6 CPU model 63 no PMU driver, software
events only.
x86: Booting SMP configuration:
.... node #0, CPUs: #1
kvm-clock: cpu 1, msr 2:1fffd041, secondary cpu clock
x86: Booted up 1 node, 2 CPUs
smpboot: Total of 2 processors activated (9200.00 BogoMIPS)
devtmpfs: initialized
clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns:
19112604462750000 ns
futex hash table entries: 512 (order: 4, 65536 bytes)
kworker/u4:0 (20) used greatest stack depth: 27920 bytes left
xor: automatically using best checksumming function:
avx : 21831.200 MB/sec
RTC time: 5:49:43, date: 04/24/18
NET: Registered protocol family 16
schedtune: init normalization constants...
schedtune: no energy model data
schedtune: disabled!
cpuidle: using governor ladder
cpuidle: using governor menu
ACPI: bus type PCI registered
acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
PCI: Using configuration type 1 for base access
kworker/u4:0 (42) used greatest stack depth: 27424 bytes left
raid6: sse2x1 gen() 4637 MB/s
raid6: sse2x1 xor() 2670 MB/s
raid6: sse2x2 gen() 7584 MB/s
raid6: sse2x2 xor() 4326 MB/s
raid6: sse2x4 gen() 9865 MB/s
raid6: sse2x4 xor() 5721 MB/s
raid6: avx2x1 gen() 9389 MB/s
raid6: avx2x2 gen() 14583 MB/s
raid6: avx2x4 gen() 19116 MB/s
raid6: using algorithm avx2x4 gen() 19116 MB/s
raid6: using avx2x2 recovery algorithm
ACPI: Added _OSI(Module Device)
ACPI: Added _OSI(Processor Device)
ACPI: Added _OSI(3.0 _SCP Extensions)
ACPI: Added _OSI(Processor Aggregator Device)
ACPI: Executed 2 blocks of module-level executable AML code
ACPI: Interpreter enabled
ACPI: (supports S0 S3 S4 S5)
ACPI: Using IOAPIC for interrupt routing
PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and
report a bug
ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI]
acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM
acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended
PCI configuration space under this bridge.
PCI host bridge to bus 0000:00
pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window]
pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window]
pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window]
pci_bus 0000:00: root bus resource [bus 00-ff]
pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI
ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11)
ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11)
ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11)
ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11)
ACPI: PCI Interrupt Link [LNKS] (IRQs *9)
ACPI: Enabled 16 GPEs in block 00 to 0F
vgaarb: loaded
SCSI subsystem initialized
ACPI: bus type USB registered
usbcore: registered new interface driver usbfs
usbcore: registered new interface driver hub
usbcore: registered new device driver usb
pps_core: LinuxPPS API ver. 1 registered
pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti
<giom...@linux.it>
PTP clock support registered
ioremap error for 0xbfffd000-0xc0000000, requested 0x2, got 0x0
dmi: Firmware registration failed.
Advanced Linux Sound Architecture Driver Initialized.
PCI: Using ACPI for IRQ routing
NetLabel: Initializing
NetLabel: domain hash size = 128
NetLabel: protocols = UNLABELED CIPSOv4
NetLabel: unlabeled traffic allowed by default
amd_nb: Cannot enumerate AMD northbridges
clocksource: Switched to clocksource kvm-clock
pnp: PnP ACPI init
pnp: PnP ACPI: found 7 devices
clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns:
2085701024 ns
NET: Registered protocol family 2
TCP established hash table entries: 65536 (order: 7, 524288 bytes)
TCP bind hash table entries: 65536 (order: 10, 4194304 bytes)
TCP: Hash tables configured (established 65536 bind 65536)
UDP hash table entries: 4096 (order: 7, 655360 bytes)
UDP-Lite hash table entries: 4096 (order: 7, 655360 bytes)
NET: Registered protocol family 1
pci 0000:00:00.0: Limiting direct PCI/PCI transfers
PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
software IO TLB [mem 0xbbff3000-0xbfff3000] (64MB) mapped at
[ffff8800bbff3000-ffff8800bfff2fff]
RAPL PMU detected, API unit is 2^-32 Joules, 3 fixed counters 10737418240
ms ovfl timer
hw unit of domain pp0-core 2^-0 Joules
hw unit of domain package 2^-0 Joules
hw unit of domain dram 2^-16 Joules
Reply all
Reply to author
Forward
0 new messages