[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Updated Debian Ports installation images 2021-09-23





On 2021/Sep/28, at 00:14, John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de> wrote:

Hello Pedro!

Please keep your replies on the list.

On 9/27/21 18:44, Pedro Miguel Justo wrote:
[    0.636000] usercopy: Kernel memory overwrite attempt detected to linear kernel text (offset 8880128, size 1)!
[    0.636000] cryptomgr_test[67]: bugcheck! 0 [1]
[    0.636000] Modules linked in:
[    0.636000]
[    0.636000] CPU: 6 PID: 67 Comm: cryptomgr_test Not tainted 5.14.0-1-itanium #1  Debian 5.14.6-2
[    0.636000] Hardware name: hp server rx2660                   , BIOS 04.30                                                            03/05/2012
[    0.640000] psr : 00001010084a6010 ifs : 8000000000000410 ip  : [<a0000001012cc3c0>]    Not tainted (5.14.0-1-itanium Debian 5.14.6-2)
[    0.640000] ip is at usercopy_abort+0x120/0x130
[    0.640000] unat: 0000000000000000 pfs : 0000000000000410 rsc : 0000000000000003
[    0.640000] rnat: 00000000000000ff bsps: 00000000000000ff pr  : 00000005666a9655
[    0.640000] ldrs: 0000000000000000 ccv : 00000000fffff08f fpsr: 0009804c8a70433f
[    0.640000] csd : 0000000000000000 ssd : 0000000000000000
[    0.640000] b0  : a0000001012cc3c0 b6  : a000000100a49c40 b7  : a00000010080e2c0
[    0.640000] f6  : 1003e0000000000000000 f7  : 1003e0044b82fa09b5a53
[    0.640000] f8  : 1003e0000000000000516 f9  : 1003e0000000004bd12e0
[    0.640000] f10 : 1003e20c49ba5e353f7cf f11 : 1003e00000000009b4600
[    0.640000] r1  : a000000101b9ab70 r2  : a000000101929fa0 r3  : a000000101929fa8
[    0.640000] r8  : 000000000000001f r9  : 0000000000000001 r10 : 0000000000000000
[    0.640000] r11 : 00000000ffffefff r12 : e00000010083fc70 r13 : e000000100838000
[    0.640000] r14 : ffffffffffd8f430 r15 : a000000101929fa8 r16 : e0000000012c0000
[    0.640000] r17 : 0000000000004000 r18 : 0000000000000090 r19 : e00000010083fb98
[    0.640000] r20 : 000000000000023c r21 : 00000000000002cb r22 : 0000000000000596
[    0.640000] r23 : 0000000000000625 r24 : 0000000000003128 r25 : 0000000000000001
[    0.640000] r26 : 000000000000000c r27 : a000000101911fa0 r28 : 0000000000001000
[    0.640000] r29 : 0000000000000fff r30 : 0000000000000fff r31 : 0000000000001ffe
[    0.640000]
[    0.640000] Call Trace:
[    0.640000]  [<a000000100014cf0>] show_stack+0x90/0xc0
[    0.640000]                                 sp=e00000010083f8b0 bsp=e0000001008395a0
[    0.640000]  [<a000000100015400>] show_regs+0x6e0/0xa40
[    0.640000]                                 sp=e00000010083fa80 bsp=e000000100839530
[    0.640000]  [<a0000001000274b0>] die+0x1b0/0x4a0
[    0.640000]                                 sp=e00000010083faa0 bsp=e0000001008394f0
[    0.640000]  [<a0000001012f5320>] ia64_bad_break+0x740/0x760
[    0.640000]                                 sp=e00000010083faa0 bsp=e0000001008394c0
[    0.640000]  [<a00000010000ca80>] ia64_leave_kernel+0x0/0x270
[    0.640000]                                 sp=e00000010083faa0 bsp=e0000001008394c0
[    0.640000]  [<a0000001012cc3c0>] usercopy_abort+0x120/0x130
[    0.640000]                                 sp=e00000010083fc70 bsp=e000000100839440
[    0.640000]  [<a0000001004a7540>] __check_object_size+0x3e0/0x440
[    0.640000]                                 sp=e00000010083fc80 bsp=e000000100839408
[    0.640000]  [<a00000010081a270>] build_test_sglist+0x550/0x8c0
[    0.640000]                                 sp=e00000010083fc80 bsp=e000000100839340
[    0.640000]  [<a00000010081a940>] test_shash_vec_cfg+0x1e0/0xc80
[    0.640000]                                 sp=e00000010083fd00 bsp=e000000100839290
[    0.640000]  [<a0000001008227b0>] __alg_test_hash.constprop.0+0x2f0/0x760
[    0.640000]                                 sp=e00000010083fda0 bsp=e0000001008391d8
[    0.640000]  [<a000000100822d30>] alg_test_hash+0x110/0x2e0
[    0.640000]                                 sp=e00000010083fdb0 bsp=e000000100839180
[    0.640000]  [<a00000010081ea90>] alg_test+0xc50/0xec0
[    0.640000]                                 sp=e00000010083fdb0 bsp=e000000100839100
[    0.640000]  [<a0000001008180c0>] cryptomgr_test+0x80/0xc0
[    0.640000]                                 sp=e00000010083fe30 bsp=e0000001008390e0
[    0.640000]  [<a0000001000c1780>] kthread+0x2a0/0x2c0
[    0.640000]                                 sp=e00000010083fe30 bsp=e000000100839098
[    0.640000]  [<a00000010000c870>] call_payload+0x50/0x80
[    0.640000]                                 sp=e00000010083fe30 bsp=e000000100839080
[    0.640000] Disabling lock debugging due to kernel taint
[    6.780000] random: crng init done

If you want to install the machine, use the image from July 16, 2019 as mentioned before.


I could swear it was the last one the one to use. So I used the 09/21 in


I don’t see a 07/16 in there. Can you point me to it pls?


It should be the image with kernel version 4.19.x, if I remember correctly. Kernel 4.19.x
works on machines affected by this bug.

Adrian

--
.''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaubitz@debian.org
`. `'   Freie Universitaet Berlin - glaubitz@physik.fu-berlin.de
 `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913



Reply to: