[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: rx2660 + debian



Hi!

On 4/25/22 00:01, Pedro Miguel Justo wrote:
>> So, I went ahead and tried the ISO from your last email: The 2022-03-18 (non-free).
>> Things didn’t go too well. I am back at having usercopy problems again. Did we have a workaround for that?
>>
>> [ 1.478621] usercopy: Kernel memory overwrite attempt detected to linear kernel text (offset 15466496, size 3)!
>> [ 1.480383] kernel BUG at mm/usercopy.c:99!
>> [ 1.480383] cryptomgr_test[76]: bugcheck! 0 [1]
>> [ 1.484383] Modules linked in:
>> [ 1.484383]
>> [ 1.484383] CPU: 3 PID: 76 Comm: cryptomgr_test Not tainted 5.16.0-5-itanium #1 Debian 5.16.14-1
>> [ 1.484383] Hardware name: hp server rx2660 , BIOS 04.30 03/05/2012
>> [ 1.484383] psr : 00001010084a6010 ifs : 8000000000000410 ip : [<a0000001013389b0>] Not tainted (5.16.0-5-itanium Debian 5.16.14-1)
>> [ 1.484383] ip is at usercopy_abort+0x120/0x130
>> [ 1.484383] unat: 0000000000000000 pfs : 0000000000000410 rsc : 0000000000000003
>> [ 1.484383] rnat: a000000101929380 bsps: 00000000000000ff pr : 00000005666a9655
>> [ 1.484383] ldrs: 0000000000000000 ccv : 00000000fffff13f fpsr: 0009804c8a70433f
>> [ 1.484383] csd : 0000000000000000 ssd : 0000000000000000
>> [ 1.484383] b0 : a0000001013389b0 b6 : a000000100cbd7c0 b7 : a000000100813460
>> [ 1.484383] f6 : 1003e00000000002c1e6e f7 : 1003e0044b82fa09b5a53
>> [ 1.484383] f8 : 1003e0000000000000bd7 f9 : 1003e000000000394424f
>> [ 1.484383] f10 : 1003e20c49ba5e353f7cf f11 : 1003e00000000007547f9
>> [ 1.484383] r1 : a000000101c1cd70 r2 : a0000001019aa680 r3 : a0000001019aa688
>> [ 1.484383] r8 : 000000000000001f r9 : a000000101992628 r10 : c0000000ffffefff
>> [ 1.484383] r11 : 0000000000000003 r12 : e000000101027c70 r13 : e000000101020000
>> [ 1.484383] r14 : ffffffffffd8d910 r15 : a0000001019aa688 r16 : 00000000ffffefff
>> [ 1.484383] r17 : 0000000000000001 r18 : e000000101027ba0 r19 : 0000000000000140
>> [ 1.484383] r20 : 000000000000000f r21 : 0000000000000003 r22 : 0000000000000000
>> [ 1.484383] r23 : 0000000000000003 r24 : 0000000000000000 r25 : ffffffffffd0c6d1
>> [ 1.484383] r26 : 000000000000000c r27 : a000000101992680 r28 : 0000000000001000
>> [ 1.484383] r29 : 0000000000000fff r30 : 0000000000000fff r31 : 0000000000001ffe
>> [ 1.484383]
>> [ 1.484383] Call Trace:
>> [ 1.484383] [<a000000100014c50>] show_stack+0x90/0xc0
>> [ 1.484383] sp=e0000001010278b0 bsp=e000000101021628
>> [ 1.484383] [<a000000100015360>] show_regs+0x6e0/0xa40
>> [ 1.484383] sp=e000000101027a80 bsp=e0000001010215b0
>> [ 1.484383] [<a000000100026bb0>] die+0x150/0x4c0
>> [ 1.484383] sp=e000000101027aa0 bsp=e000000101021568
>> [ 1.484383] [<a000000101366d40>] ia64_bad_break+0x740/0x760
>> [ 1.484383] sp=e000000101027aa0 bsp=e000000101021538
>> [ 1.484383] [<a00000010000ca80>] ia64_leave_kernel+0x0/0x270
>> [ 1.484383] sp=e000000101027aa0 bsp=e000000101021538
>> [ 1.484383] [<a0000001013389b0>] usercopy_abort+0x120/0x130
>> [ 1.484383] sp=e000000101027c70 bsp=e0000001010214b8
>> [ 1.484383] [<a0000001004b83f0>] __check_object_size+0x3f0/0x460
>> [ 1.484383] sp=e000000101027c80 bsp=e000000101021480
>> [ 1.484383] [<a00000010081f3e0>] build_test_sglist+0x540/0x8c0
>> [ 1.484383] sp=e000000101027c80 bsp=e0000001010213b8
>> [ 1.484383] [<a00000010081fac0>] test_shash_vec_cfg+0x1e0/0xc80
>> [ 1.484383] sp=e000000101027d00 bsp=e000000101021308
>> [ 1.484383] [<a000000100829810>] __alg_test_hash.constprop.0+0x2f0/0x760
>> [ 1.484383] sp=e000000101027da0 bsp=e000000101021260
>> [ 1.484383] [<a000000100829d90>] alg_test_hash+0x110/0x2e0
>> [ 1.484383] sp=e000000101027db0 bsp=e000000101021208
>> [ 1.484383] [<a000000100825a10>] alg_test+0xc50/0xec0
>> [ 1.484383] sp=e000000101027db0 bsp=e000000101021180
>> [ 1.484383] [<a00000010081d240>] cryptomgr_test+0x80/0xc0
>> [ 1.484383] sp=e000000101027e30 bsp=e000000101021160
>> [ 1.484383] [<a0000001000c08e0>] kthread+0x2e0/0x300
>> [ 1.484383] sp=e000000101027e30 bsp=e000000101021118
>> [ 1.484383] [<a00000010000c870>] call_payload+0x50/0x80
>> [ 1.484383] sp=e000000101027e30 bsp=e000000101021100
>> [ 1.484383] Disabling lock debugging due to kernel taint
>> [ 2.127275] Freeing initrd memory: 21920kB freed
>> [ 6.655281] random: crng init done
>>
>> I also see there are a couple more recent ISOs. Should I try those first?
> 
> Same exact failure using the 2022-03-28 ISO. And it happens even with “hardened_usercopy=off”.

I think Sergei Trofimovich had plans to fix this bug but I'm not sure how far that has progressed.

It might also make sense trying to update the system firmware to the latest version you can get.

Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913


Reply to: