[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: rx2660 + debian




> On 2022/Apr/24, at 12:05, Pedro Miguel Justo <pmsjt@texair.net> wrote:
> 
> Hi John Paul
> 
> So, I went ahead and tried the ISO from your last email: The 2022-03-18 (non-free). Things didn’t go too well. I am back at having usercopy problems again. Did we have a workaround for that?
> 
> [ 1.478621] usercopy: Kernel memory overwrite attempt detected to linear kernel text (offset 15466496, size 3)!
> [ 1.480383] kernel BUG at mm/usercopy.c:99!
> [ 1.480383] cryptomgr_test[76]: bugcheck! 0 [1]
> [ 1.484383] Modules linked in:
> [ 1.484383]
> [ 1.484383] CPU: 3 PID: 76 Comm: cryptomgr_test Not tainted 5.16.0-5-itanium #1 Debian 5.16.14-1
> [ 1.484383] Hardware name: hp server rx2660 , BIOS 04.30 03/05/2012
> [ 1.484383] psr : 00001010084a6010 ifs : 8000000000000410 ip : [<a0000001013389b0>] Not tainted (5.16.0-5-itanium Debian 5.16.14-1)
> [ 1.484383] ip is at usercopy_abort+0x120/0x130
> [ 1.484383] unat: 0000000000000000 pfs : 0000000000000410 rsc : 0000000000000003
> [ 1.484383] rnat: a000000101929380 bsps: 00000000000000ff pr : 00000005666a9655
> [ 1.484383] ldrs: 0000000000000000 ccv : 00000000fffff13f fpsr: 0009804c8a70433f
> [ 1.484383] csd : 0000000000000000 ssd : 0000000000000000
> [ 1.484383] b0 : a0000001013389b0 b6 : a000000100cbd7c0 b7 : a000000100813460
> [ 1.484383] f6 : 1003e00000000002c1e6e f7 : 1003e0044b82fa09b5a53
> [ 1.484383] f8 : 1003e0000000000000bd7 f9 : 1003e000000000394424f
> [ 1.484383] f10 : 1003e20c49ba5e353f7cf f11 : 1003e00000000007547f9
> [ 1.484383] r1 : a000000101c1cd70 r2 : a0000001019aa680 r3 : a0000001019aa688
> [ 1.484383] r8 : 000000000000001f r9 : a000000101992628 r10 : c0000000ffffefff
> [ 1.484383] r11 : 0000000000000003 r12 : e000000101027c70 r13 : e000000101020000
> [ 1.484383] r14 : ffffffffffd8d910 r15 : a0000001019aa688 r16 : 00000000ffffefff
> [ 1.484383] r17 : 0000000000000001 r18 : e000000101027ba0 r19 : 0000000000000140
> [ 1.484383] r20 : 000000000000000f r21 : 0000000000000003 r22 : 0000000000000000
> [ 1.484383] r23 : 0000000000000003 r24 : 0000000000000000 r25 : ffffffffffd0c6d1
> [ 1.484383] r26 : 000000000000000c r27 : a000000101992680 r28 : 0000000000001000
> [ 1.484383] r29 : 0000000000000fff r30 : 0000000000000fff r31 : 0000000000001ffe
> [ 1.484383]
> [ 1.484383] Call Trace:
> [ 1.484383] [<a000000100014c50>] show_stack+0x90/0xc0
> [ 1.484383] sp=e0000001010278b0 bsp=e000000101021628
> [ 1.484383] [<a000000100015360>] show_regs+0x6e0/0xa40
> [ 1.484383] sp=e000000101027a80 bsp=e0000001010215b0
> [ 1.484383] [<a000000100026bb0>] die+0x150/0x4c0
> [ 1.484383] sp=e000000101027aa0 bsp=e000000101021568
> [ 1.484383] [<a000000101366d40>] ia64_bad_break+0x740/0x760
> [ 1.484383] sp=e000000101027aa0 bsp=e000000101021538
> [ 1.484383] [<a00000010000ca80>] ia64_leave_kernel+0x0/0x270
> [ 1.484383] sp=e000000101027aa0 bsp=e000000101021538
> [ 1.484383] [<a0000001013389b0>] usercopy_abort+0x120/0x130
> [ 1.484383] sp=e000000101027c70 bsp=e0000001010214b8
> [ 1.484383] [<a0000001004b83f0>] __check_object_size+0x3f0/0x460
> [ 1.484383] sp=e000000101027c80 bsp=e000000101021480
> [ 1.484383] [<a00000010081f3e0>] build_test_sglist+0x540/0x8c0
> [ 1.484383] sp=e000000101027c80 bsp=e0000001010213b8
> [ 1.484383] [<a00000010081fac0>] test_shash_vec_cfg+0x1e0/0xc80
> [ 1.484383] sp=e000000101027d00 bsp=e000000101021308
> [ 1.484383] [<a000000100829810>] __alg_test_hash.constprop.0+0x2f0/0x760
> [ 1.484383] sp=e000000101027da0 bsp=e000000101021260
> [ 1.484383] [<a000000100829d90>] alg_test_hash+0x110/0x2e0
> [ 1.484383] sp=e000000101027db0 bsp=e000000101021208
> [ 1.484383] [<a000000100825a10>] alg_test+0xc50/0xec0
> [ 1.484383] sp=e000000101027db0 bsp=e000000101021180
> [ 1.484383] [<a00000010081d240>] cryptomgr_test+0x80/0xc0
> [ 1.484383] sp=e000000101027e30 bsp=e000000101021160
> [ 1.484383] [<a0000001000c08e0>] kthread+0x2e0/0x300
> [ 1.484383] sp=e000000101027e30 bsp=e000000101021118
> [ 1.484383] [<a00000010000c870>] call_payload+0x50/0x80
> [ 1.484383] sp=e000000101027e30 bsp=e000000101021100
> [ 1.484383] Disabling lock debugging due to kernel taint
> [ 2.127275] Freeing initrd memory: 21920kB freed
> [ 6.655281] random: crng init done
> 
> I also see there are a couple more recent ISOs. Should I try those first?

Same exact failure using the 2022-03-28 ISO. And it happens even with “hardened_usercopy=off”.



Reply to: