SCIENTIFIC-LINUX-USERS Archives

May 2018

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Thu, 24 May 2018 15:11:26 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (172 lines)
Hmmmm.... this error seems to point to a memory/instruction mapping 
issue.....

  Do you have a base8 amount of RAM in the VMs?
  Can I have you try adding 'numa=off' to the boot line?
  Are things using virtio/qxl/etc?


While I doubt this is it, you may want to be sure you've got the F8 
bios[1].  If you can I'd consider setting the values back to defaults 
and then re-activating the hardware VM acceleration after that.

Pat

[1] https://www.gigabyte.com/Motherboard/GA-990FXA-D3-rev-1x#support-dl-bios

On 05/24/2018 12:40 AM, Bill Maidment wrote:
> Hi Pat
> The full error message is:
> PANIC: early exception 0d rip 10:ffffffff810462b6 error 0 cr2 0
>
> These are my specs:
>
> Mobo GA-990FXA-D3
> CPU AMD FX-8120
> Host 8 CPU 16GB RAM running SL 7.5 with kernel 3.10.0-862.3.2
> Guest 2 CPU 2GB RAM running SL 6.9 with kernel 2.6.32.30.1
> 5 other guests running SL 7.5 with kernel 3.10.0-862.3.2 run OK
>
> SL 6.9 kernel re-installed but still the same error
> previous kernel 2.6.32-696.28.1 runs OK
>
> The SL 6.9 machine is my internal mail server running zarafa and mysql
>
> Is there anything else you need to know?
>
> Cheers
> Bill
>
>   
>   
> -----Original message-----
>> From:Pat Riehecky <[log in to unmask]>
>> Sent: Wednesday 23rd May 2018 23:25
>> To: Bill Maidment <[log in to unmask]>; [log in to unmask]
>> Subject: Re: [SCIENTIFIC-LINUX-USERS] Security ERRATA Important: kernel on SL6.x i386/x86_64
>>
>> Hi Bill,
>>
>> Our internal test VMs are KVM guests on SL 6.9 with an AMD server. I'm
>> not seeing this problem there.
>>
>> Are there any more details you can share?
>>
>> Pat
>>
>> On 05/22/2018 09:20 PM, Bill Maidment wrote:
>>> Hi
>>> The new kernel caused
>>> PANIC early exception 0d 10 ..... error 0 rc2
>>> on a KVM SL 6.9 x86_64 guest
>>> AMD server and all other guests running SL7.5 are all runn ing OK on their new kernel
>>>
>>> Reverting to the previous SL 6.9 kernel gave me back my guest machine
>>> Cheers
>>> Bill
>>>     
>>>     
>>> -----Original message-----
>>>> From:Scott Reid <[log in to unmask]>
>>>> Sent: Wednesday 23rd May 2018 4:33
>>>> To: [log in to unmask]
>>>> Subject: Security ERRATA Important: kernel on SL6.x i386/x86_64
>>>>
>>>> Synopsis:          Important: kernel security and bug fix update
>>>> Advisory ID:       SLSA-2018:1651-1
>>>> Issue Date:        2018-05-22
>>>> CVE Numbers:       CVE-2018-3639
>>>> --
>>>>
>>>> Security Fix(es):
>>>>
>>>> * An industry-wide issue was found in the way many modern microprocessor
>>>> designs have implemented speculative execution of Load & Store
>>>> instructions (a commonly used performance optimization). It relies on the
>>>> presence of a precisely-defined instruction sequence in the privileged
>>>> code as well as the fact that memory read from address to which a recent
>>>> memory write has occurred may see an older value and subsequently cause an
>>>> update into the microprocessor's data cache even for speculatively
>>>> executed instructions that never actually commit (retire). As a result, an
>>>> unprivileged attacker could use this flaw to read privileged memory by
>>>> conducting targeted cache side-channel attacks. (CVE-2018-3639)
>>>>
>>>> Note: This issue is present in hardware and cannot be fully fixed via
>>>> software update. The updated kernel packages provide software side of the
>>>> mitigation for this hardware issue. To be fully functional, up-to-date CPU
>>>> microcode applied on the system is required.
>>>>
>>>> In this update mitigations for x86 (both 32 and 64 bit) architecture are
>>>> provided.
>>>>
>>>> Bug Fix(es):
>>>>
>>>> * Previously, an erroneous code in the x86 kexec system call path caused a
>>>> memory corruption. As a consequence, the system became unresponsive with
>>>> the following kernel stack trace:
>>>>
>>>> 'WARNING: CPU: 13 PID: 36409 at lib/list_debug.c:59
>>>> __list_del_entry+0xa1/0xd0 list_del corruption. prev->next should be
>>>> ffffdd03fddeeca0, but was (null)'
>>>>
>>>> This update ensures that the code does not corrupt memory. As a result,
>>>> the operating system no longer hangs.
>>>> --
>>>>
>>>> SL6
>>>>      x86_64
>>>>        kernel-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        kernel-debug-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        kernel-debug-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debug-debuginfo-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        kernel-debug-devel-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debug-devel-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        kernel-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debuginfo-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        kernel-debuginfo-common-i686-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debuginfo-common-x86_64-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        kernel-devel-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        kernel-headers-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        perf-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        perf-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        perf-debuginfo-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        python-perf-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        python-perf-debuginfo-2.6.32-696.30.1.el6.x86_64.rpm
>>>>        python-perf-2.6.32-696.30.1.el6.x86_64.rpm
>>>>      i386
>>>>        kernel-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debug-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debug-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debug-devel-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-debuginfo-common-i686-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-devel-2.6.32-696.30.1.el6.i686.rpm
>>>>        kernel-headers-2.6.32-696.30.1.el6.i686.rpm
>>>>        perf-2.6.32-696.30.1.el6.i686.rpm
>>>>        perf-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        python-perf-debuginfo-2.6.32-696.30.1.el6.i686.rpm
>>>>        python-perf-2.6.32-696.30.1.el6.i686.rpm
>>>>      noarch
>>>>        kernel-abi-whitelists-2.6.32-696.30.1.el6.noarch.rpm
>>>>        kernel-doc-2.6.32-696.30.1.el6.noarch.rpm
>>>>        kernel-firmware-2.6.32-696.30.1.el6.noarch.rpm
>>>>
>>>> - Scientific Linux Development Team
>>>>
>>>>
>> -- 
>> Pat Riehecky
>>
>> Fermi National Accelerator Laboratory
>> www.fnal.gov
>> www.scientificlinux.org
>>
>>

-- 
Pat Riehecky

Fermi National Accelerator Laboratory
www.fnal.gov
www.scientificlinux.org

ATOM RSS1 RSS2