Regressions List Tracking
 help / color / mirror / Atom feed
From: Atishya Jain <atishyajain.it@gmail.com>
To: stable@vger.kernel.org
Cc: regressions@lists.linux.dev
Subject: Kernel Issue: Wrong EFI Loader Signature followed by Kernel Panic
Date: Tue, 30 Apr 2024 12:16:24 +0530	[thread overview]
Message-ID: <CAAwq=D4tUP65CNLuYib_YFBYwz2mYNw+wXzAyacf+tJ18Op2eA@mail.gmail.com> (raw)


[-- Attachment #1.1: Type: text/plain, Size: 3031 bytes --]

Dear Linux Stable Team,

I am writing to report an issue encountered while attempting to boot kernel
version 5.4.274 with an egress XDP patch applied. The issue arises with the
EFI loader signature, leading to subsequent kernel panic.

*Problem Description:*

When attempting to boot kernel version 5.4.274 with the egress XDP patch, I
encountered the following sequence of events:

1. Initially, the system displays the message "Wrong EFI loader signature."
2. Following this message, the system proceeds to decompress the Linux
kernel and performs ELF parsing and relocations successfully.
3. However, upon attempting to boot the kernel, a kernel panic occurs with
the error message: "Kernel panic not syncing: UFS: Unable to mount root fs
on unknown-block(0,0)."

*Error Messages*:(ScreenShots Attached)

Upon selecting the kernel version 5.4.274, the system displays the
following error messages:

```
Wrong EFI loader signature.

early console in extract_kernel input_data: 0x00000000027493b1
input_len: 0x000000000086892c
output: 0x0000000001000000
output_len: 0x0000000001f81298
kernel_total_size: 0x0000000001e2c000
needed_size: 0x0000000002000000
trampoline_32bit: 0x0000000000090000
booted via startup_32()
Physical, KASLR using RDTSC. Virtual KASLR using RDTSC..
Decompressing Linux... Parsing ELF... Performing relocations... done.
Booting the kernel.
8.0522441 RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to
RETBleed attacks, data leaks possible!
0.9972031 Kernel panic not syncing: UFS: Unable to mount root fs on
unknown-block(0,0)
CPU: 1 PID: 1 Command: swapper/0 Not tainted 5.4.274 #1 Hardware name:
VMware, Inc. VMware Virtual Platform/440BX Desktop
Reference Platform, BIOS 6.00 11/12/2020
Call Trace:
dump_stack+0x58/0x63
panic+0x188/0x2ce
Mount_block_root+0x19b/0x23a
prepare_namespace+0x136/0x16c
kernel_init_freeable+0x207/0x210
rest_init+0x90/0x90
kernel_init+0x5/0xf6
ret_from_fork+0x35/0x48
Kernel Offset: 0x8488000 from 0xffffffff81000000 (relocation range:
0xffffffff80000000-0xfffffffffffffff) --- end Kernel panic not syncing:
UFS: Unable to mount root fs on unknown-block(0,8)
```

*Additional Information*:

- The issue persists even after signing the kernel.
- I am using Kali Linux in VMware, with the following system information:
  - Linux kali 6.6.15-amd64 #1 SMP PREEMPT_DYNAMIC Kali 6.6.15-2kali1
(2024-04-09) x86_64 GNU/Linux

*Steps Taken*:

1. Applied egress XDP patch to kernel version 5.4.274.
2. Attempted to boot the patched kernel.
3. Encountered the "Wrong EFI loader signature" message followed by kernel
panic.

*Action Required*:

I kindly request assistance in resolving this issue or guidance on further
troubleshooting steps.

Please let me know if any additional information is required.

Thank you for your attention to this matter.

Best regards,

Atishya Jain
Project Associate
Indian Institute of Technology  Gandhinagar
Palaj, Gandhinagar - 382055 - India.
Email: atishya.jain@iitgn.ac.in
LinkedIn: www.linkedin.com/in/atishya-jain-it

*Screenshots:*

[-- Attachment #1.2: Type: text/html, Size: 5155 bytes --]

[-- Attachment #2: Screenshot (141).png --]
[-- Type: image/png, Size: 111352 bytes --]

[-- Attachment #3: Screenshot (139).png --]
[-- Type: image/png, Size: 257480 bytes --]

[-- Attachment #4: Screenshot (142).png --]
[-- Type: image/png, Size: 139286 bytes --]

             reply	other threads:[~2024-04-30  6:46 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-04-30  6:46 Atishya Jain [this message]
2024-04-30  7:05 ` Kernel Issue: Wrong EFI Loader Signature followed by Kernel Panic Greg KH
     [not found]   ` <CAAwq=D4-VY8mqRxu2TVeoavOOvB4DMgxGzASjiBm3bvbW_5g2Q@mail.gmail.com>
2024-04-30  8:01     ` Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAAwq=D4tUP65CNLuYib_YFBYwz2mYNw+wXzAyacf+tJ18Op2eA@mail.gmail.com' \
    --to=atishyajain.it@gmail.com \
    --cc=regressions@lists.linux.dev \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).