Exception when run uefirtmisc item
Colin Ian King
colin.king at canonical.com
Wed Mar 1 12:38:43 UTC 2017
On 01/03/17 11:39, Dong, Eric wrote:
> Hi,
>
>
>
> When I run FWTS, I met below exception in the console log. Also attach
> test log for FWTS, any advice for this issue?
>
The "efi: EFI_MEMMAP is not enabled" is of interest, it indicates that
either EFI_PARAVIRT is enabled or more problematically, the kernel EFI
memmapping failed (which is unlikely, but possible.).
The failure occurred performing a EFI runtime query of capsule
capabilities and from what I can gather executing some of the EFI
runtime code was caught by the x86 NX protection mechanism.
Colin
>
>
> [ 193.766210] [+] crs... passed
>
> [ 193.769142] EFI_RUNTIME Driver v0.1
>
> [ 193.769566] efitime: can't read time
>
> [ 193.769604] efitime: can't read time
>
> [ 193.783714] [+] maxreadreq... passed
>
> [ 193.783714] [+] csm... passed
>
> [ 196.790597] EFI_RUNTIME Driver Exit.
>
> [ 196.809665] [+] uefirttime... passed
>
> [ 196.810317] EFI_RUNTIME Driver v0.1
>
> [ 197.481344] EFI_RUNTIME Driver Exit.
>
> [ 197.497630] [+] uefirtvariable... passed
>
> [ 197.498250] EFI_RUNTIME Driver v0.1
>
> [ 197.502028] efi: EFI_MEMMAP is not enabled.
>
> [ 197.502029] kernel tried to execute NX-protected page - exploit
> attempt? (uid: 0)
>
> [ 197.502031] BUG: unable to handle kernel NULL pointer dereference
> at (null)
>
> [ 197.502032] IP: [< (null)>] (null)
>
> [ 197.502033] PGD 3de2067 PUD 3de3067 PMD 3de4067 PTE 8000000000000163
>
> [ 197.502034] Oops: 0011 [#1] SMP
>
> [ 197.502037] Modules linked in: efi_runtime(O) chipsec(O) igb e1000e
> [last unloaded: efi_runtime]
>
> [ 197.502039] CPU: 3 PID: 2045 Comm: fwts Tainted: G O
> 4.5.0-yocto-standard #1
>
> [ 197.502039] Hardware name: Intel Corporation (uefidk.com) Intel
> Server Board S1200V3RPS UEFI Development Kit/ROMLEY, BIOS
> EDK2DNL1.DBG.0001.D01.1703010321
>
> [ 197.502040] task: ffff880418954200 ti: ffff880417844000 task.ti:
> ffff880417844000
>
> [ 197.502041] RIP: 0010:[<0000000000000000>] [<
> (null)>] (null)
>
> [ 197.502041] RSP: 0018:ffff880417847c28 EFLAGS: 00010046
>
> [ 197.502042] RAX: 00000000bcd232d0 RBX: ffff8804187fef40 RCX:
> fffffffeefc1f070
>
> [ 197.502042] RDX: 0000000000000000 RSI: ffff8804187fef40 RDI:
> ffff8804187fef40
>
> [ 197.502043] RBP: ffff880417847de0 R08: ffff880417847ca8 R09:
> ffff880417847e18
>
> [ 197.502043] R10: ffffffff81eed618 R11: ffff880418954a00 R12:
> ffff880417847e20
>
> [ 197.502043] R13: ffff880417847e18 R14: ffff880417847e18 R15:
> ffff880417847e30
>
> [ 197.502044] FS: 00007fdd902b7700(0000) GS:ffff880432c60000(0000)
> knlGS:0000000000000000
>
> [ 197.502045] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>
> [ 197.502045] CR2: 0000000000000000 CR3: 000000000009c000 CR4:
> 00000000001406e0
>
> [ 197.502045] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
> 0000000000000000
>
> [ 197.502046] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
> 0000000000000400
>
> [ 197.502046] Stack:
>
> [ 197.502047] fffffffeefc1c0da 0000000000000000 0000000000000000
> ffff880417847c50
>
> [ 197.502048] ffffffff810c188d ffff880417847d10 ffffffff810a63f9
> 40300d763b6686bd
>
> [ 197.502049] fffffffeefc19db2 ffffffff827804f8 ffffffff827ab900
> 0000000000000000
>
> [ 197.502049] Call Trace:
>
> [ 197.502055] [<ffffffff810c188d>] ? debug_lockdep_rcu_enabled+0x1d/0x20
>
> [ 197.502057] [<ffffffff810a63f9>] ? __lock_acquire+0xaf9/0x1a10
>
> [ 197.502060] [<ffffffff8105657e>] ? efi_call+0x7e/0x100
>
> [ 197.502061] [<ffffffff8170b02c>] ? virt_efi_query_capsule_caps+0x3c/0xa0
>
> [ 197.502062] [<ffffffff8170b060>] ? virt_efi_query_capsule_caps+0x70/0xa0
>
> [ 197.502064] [<ffffffffa00a2181>] efi_runtime_ioctl+0x10f1/0x12da
> [efi_runtime]
>
> [ 197.502066] [<ffffffff81083404>] ? __might_sleep+0x44/0x80
>
> [ 197.502068] [<ffffffff811c499e>] do_vfs_ioctl+0x8e/0x660
>
> [ 197.502070] [<ffffffff8131e83e>] ? security_file_ioctl+0x3e/0x60
>
> [ 197.502071] [<ffffffff811c4fe4>] SyS_ioctl+0x74/0x80
>
> [ 197.502073] [<ffffffff819d3f97>] entry_SYSCALL_64_fastpath+0x12/0x6f
>
> [ 197.502075] Code: Bad RIP value.
>
> [ 197.502076] RIP [< (null)>] (null)
>
> [ 197.502076] RSP <ffff880417847c28>
>
> [ 197.502076] CR2: 0000000000000000
>
> [ 197.502078] ---[ end trace 8358c48a00d11ade ]---
>
> [ 197.502079] BUG: sleeping function called from invalid context at
> /data/autobuilder/jethro-next/x64/build/tmp/work-shared/qemux86-64/kernel-source/include/linux/sched.h:2795
>
> [ 197.502080] in_atomic(): 1, irqs_disabled(): 1, pid: 2045, name: fwts
>
> [ 197.502080] INFO: lockdep is turned off.
>
> [ 197.502080] irq event stamp: 10520850
>
> [ 197.502083] hardirqs last enabled at (10520849):
> [<ffffffff810da4b6>] current_kernel_time64+0x56/0xb0
>
> [ 197.502085] hardirqs last disabled at (10520850):
> [<ffffffff819d35f7>] _raw_spin_lock_irqsave+0x17/0x60
>
> [ 197.502087] softirqs last enabled at (10520796):
> [<ffffffff810609ab>] __do_softirq+0x34b/0x480
>
> [ 197.502088] softirqs last disabled at (10520781):
> [<ffffffff81060c68>] irq_exit+0xa8/0xb0
>
> [ 197.502089] CPU: 3 PID: 2045 Comm: fwts Tainted: G D O
> 4.5.0-yocto-standard #1
>
> [ 197.502089] Hardware name: Intel Corporation (uefidk.com) Intel
> Server Board S1200V3RPS UEFI Development Kit/ROMLEY, BIOS
> EDK2DNL1.DBG.0001.D01.1703010321
>
> [ 197.502090] 0000000000000000 ffff880417847950 ffffffff81384775
> ffff880418954200
>
> [ 197.502091] ffffffff81cbc608 ffff880417847978 ffffffff81083307
> ffffffff81cbc608
>
> [ 197.502092] 0000000000000aeb 0000000000000000 ffff8804178479a0
> ffffffff81083404
>
> [ 197.502092] Call Trace:
>
> [ 197.502095] [<ffffffff81384775>] dump_stack+0x67/0x92
>
> [ 197.502096] [<ffffffff81083307>] ___might_sleep+0x167/0x220
>
> [ 197.502097] [<ffffffff81083404>] __might_sleep+0x44/0x80
>
> [ 197.502098] [<ffffffff8106c22f>] exit_signals+0x1f/0x130
>
> [ 197.502099] [<ffffffff8105cc90>] do_exit+0xb0/0xcf0
>
> [ 197.502101] [<ffffffff810b8bab>] ? kmsg_dump+0x11b/0x190
>
> [ 197.502103] [<ffffffff81008b84>] oops_end+0x84/0xb0
>
> [ 197.502104] [<ffffffff8104d0a8>] no_context+0x118/0x340
>
> [ 197.502105] [<ffffffff8104d34d>] __bad_area_nosemaphore+0x7d/0x1f0
>
> [ 197.502106] [<ffffffff810c188d>] ? debug_lockdep_rcu_enabled+0x1d/0x20
>
> [ 197.502107] [<ffffffff8104d4ce>] bad_area_nosemaphore+0xe/0x10
>
> [ 197.502108] [<ffffffff8104d755>] __do_page_fault+0xb5/0x410
>
> [ 197.502110] [<ffffffff81002030>] ? trace_hardirqs_off_thunk+0x17/0x19
>
> [ 197.502111] [<ffffffff8104dabc>] do_page_fault+0xc/0x10
>
> [ 197.502112] [<ffffffff819d5db2>] page_fault+0x22/0x30
>
> [ 197.502113] [<ffffffff810c188d>] ? debug_lockdep_rcu_enabled+0x1d/0x20
>
> [ 197.502114] [<ffffffff810a63f9>] ? __lock_acquire+0xaf9/0x1a10
>
> [ 197.502116] [<ffffffff8105657e>] ? efi_call+0x7e/0x100
>
> [ 197.502116] [<ffffffff8170b02c>] ? virt_efi_query_capsule_caps+0x3c/0xa0
>
> [ 197.502117] [<ffffffff8170b060>] ? virt_efi_query_capsule_caps+0x70/0xa0
>
> [ 197.502118] [<ffffffffa00a2181>] efi_runtime_ioctl+0x10f1/0x12da
> [efi_runtime]
>
> [ 197.502119] [<ffffffff81083404>] ? __might_sleep+0x44/0x80
>
> [ 197.502120] [<ffffffff811c499e>] do_vfs_ioctl+0x8e/0x660
>
> [ 197.502121] [<ffffffff8131e83e>] ? security_file_ioctl+0x3e/0x60
>
> [ 197.502122] [<ffffffff811c4fe4>] SyS_ioctl+0x74/0x80
>
> [ 197.502123] [<ffffffff819d3f97>] entry_SYSCALL_64_fastpath+0x12/0x6f
>
> [ 197.502124] note: fwts[2045] exited with preempt_count 2
>
>
>
> Thanks,
>
> Eric
>
>
>
More information about the fwts-devel
mailing list