[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: New working ia64 installer images available



Hello Pedro!

I have run into the exact crash on an RX2800 on kernel 5.14.6.

However, I was able to mitigate the problem by passing

	hardened_usercopy=off

on the kernel command line.

Please give it a try with the latest images which use kernel 5.14.6 [1].

Adrian

> [1] https://cdimage.debian.org/cdimage/ports/snapshots/2021-09-21/

> On 4/19/21 10:30 PM, Pedro Miguel Justo wrote:
>> When I try to boot the new install image on my rx2660 this is what I get:
>>
>> [    0.592000] usercopy: Kernel memory overwrite attempt detected to linear kernel text (offset 7733248, size 1)!
>> [    0.592000] cryptomgr_test[65]: bugcheck! 0 [1]
>> [    0.592000] Modules linked in:
>> [    0.592000]
>> [    0.592000] CPU: 6 PID: 65 Comm: cryptomgr_test Not tainted 5.10.0-6-itanium #1 Debian 5.10.28-1
>> [    0.596000] Hardware name: hp server rx2660                   , BIOS 04.30                                                            03/05/2012
>> [    0.596000] psr : 00001010084a6010 ifs : 8000000000000410 ip  : [<a0000001011e06b0>]    Not tainted (5.10.0-6-itanium Debian 5.10.28-1)
>> [    0.596000] ip is at usercopy_abort+0x120/0x130
>> [    0.596000] unat: 0000000000000000 pfs : 0000000000000410 rsc : 0000000000000003
>> [    0.596000] rnat: 0000000000000000 bsps: 0000000000000000 pr  : 00000021559aaa55
>> [    0.596000] ldrs: 0000000000000000 ccv : 00000000fffff08d fpsr: 0009804c8a70433f
>> [    0.596000] csd : 0000000000000000 ssd : 0000000000000000
>> [    0.596000] b0  : a0000001011e06b0 b6  : a0000001009e9a80 b7  : a0000001007aef00
>> [    0.596000] f6  : 1003e0000000000000000 f7  : 1003e0044b82fa09b5a53
>> [    0.596000] f8  : 1003e00000000000004bc f9  : 1003e0000000004692680
>> [    0.596000] f10 : 1003e20c49ba5e353f7cf f11 : 1003e0000000000908800
>> [    0.596000] r1  : a000000101a4b5d0 r2  : a0000001017e4b18 r3  : a0000001017e4b20
>> [    0.596000] r8  : 000000000000001f r9  : 0000000000000001 r10 : 0000000000000000
>> [    0.596000] r11 : 00000000ffffefff r12 : e000000100757c70 r13 : e000000100750000
>> [    0.596000] r14 : ffffffffffd99548 r15 : a0000001017e4b20 r16 : e0000000012c0000
>> [    0.596000] r17 : 0000000000004000 r18 : 000000000000008e r19 : 000000000000051a
>> [    0.596000] r20 : 000000000000051a r21 : 000000000000051a r22 : 000000000000051c
>> [    0.596000] r23 : 000000000000051c r24 : 000000000000051c r25 : 0000000000004000
>> [    0.596000] r26 : 000000000000000c r27 : a0000001017ccb18 r28 : 0000000000001000
>> [    0.596000] r29 : ffffffffffd18c61 r30 : a000000101764231 r31 : 0000000000000001
>> [    0.596000]
>> [    0.596000] Call Trace:
>> [    0.596000]  [<a000000100014c50>] show_stack+0x90/0xc0
>> [    0.596000]                                 sp=e0000001007578b0 bsp=e000000100751560
>> [    0.596000]  [<a000000100015360>] show_regs+0x6e0/0xa40
>> [    0.596000]                                 sp=e000000100757a80 bsp=e0000001007514f0
>> [    0.596000]  [<a0000001000275d0>] die+0x1b0/0x4a0
>> [    0.596000]                                 sp=e000000100757aa0 bsp=e0000001007514b0
>> [    0.596000]  [<a0000001011fb460>] ia64_bad_break+0x740/0x760
>> [    0.596000]                                 sp=e000000100757aa0 bsp=e000000100751480
>> [    0.596000]  [<a00000010000ca20>] ia64_leave_kernel+0x0/0x270
>> [    0.596000]                                 sp=e000000100757aa0 bsp=e000000100751480
>> [    0.596000]  [<a0000001011e06b0>] usercopy_abort+0x120/0x130
>> [    0.596000]                                 sp=e000000100757c70 bsp=e000000100751400
>> [    0.596000]  [<a00000010047c6b0>] __check_object_size+0x330/0x3a0
>> [    0.596000]                                 sp=e000000100757c80 bsp=e0000001007513c0
>> [    0.596000]  [<a0000001007bc580>] build_test_sglist+0x500/0x8c0
>> [    0.596000]                                 sp=e000000100757c80 bsp=e000000100751300
>> [    0.596000]  [<a0000001007be240>] test_shash_vec_cfg+0x1e0/0xcc0
>> [    0.596000]                                 sp=e000000100757d00 bsp=e000000100751250
>> [    0.596000]  [<a0000001007c35f0>] __alg_test_hash.constprop.0+0x2d0/0x740
>> [    0.596000]                                 sp=e000000100757da0 bsp=e000000100751198
>> [    0.596000]  [<a0000001007c3b70>] alg_test_hash+0x110/0x2e0
>> [    0.596000]                                 sp=e000000100757db0 bsp=e000000100751140
>> [    0.596000]  [<a0000001007bf930>] alg_test+0xc10/0xe80
>> [    0.596000]                                 sp=e000000100757db0 bsp=e0000001007510c0
>> [    0.596000]  [<a0000001007b8e40>] cryptomgr_test+0x80/0xc0
>> [    0.596000]                                 sp=e000000100757e30 bsp=e0000001007510a0
>> [    0.596000]  [<a0000001000ba870>] kthread+0x270/0x2a0
>> [    0.596000]                                 sp=e000000100757e30 bsp=e000000100751058
>> [    0.596000]  [<a00000010000c810>] call_payload+0x50/0x80
>> [    0.596000]                                 sp=e000000100757e30 bsp=e000000100751040
>> [    0.596000] Disabling lock debugging due to kernel taint
>> [    6.796000] random: crng init done

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaubitz@debian.org
`. `'   Freie Universitaet Berlin - glaubitz@physik.fu-berlin.de
  `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913


Reply to: