On 4/29/20 10:44 PM, Nicolas Chauvet wrote:

Thanksfully Leigh has submitted an update.
http://koji.rpmfusion.org/koji/buildinfo?buildID=15073
But he do not own a 340xx device, so will unlikely maintain and fix if
there is another severe issue.

Previously mentioned FTBS was caused by me accidentally having a files installed, sorry.


Anyway, though the package appears to work, journalctl is reporting a traceback:

Apr 30 09:28:53 beck kernel: ---[ end trace efcdbc698d635491 ]---
Apr 30 09:28:53 beck kernel:  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
Apr 30 09:28:53 beck kernel:  ? do_syscall_64+0x5b/0xf0
Apr 30 09:28:53 beck kernel:  ? __x64_sys_ioctl+0x16/0x20
Apr 30 09:28:53 beck kernel:  ? ksys_ioctl+0x82/0xc0
Apr 30 09:28:53 beck kernel: ? nvidia_frontend_unlocked_ioctl+0x40/0x60 [nvidia]
Apr 30 09:28:53 beck kernel:  ? nvidia_ioctl+0x14f/0x480 [nvidia]
Apr 30 09:28:53 beck kernel:  ? io_schedule+0x40/0x70
Apr 30 09:28:53 beck kernel:  ? rm_ioctl+0x73/0x100 [nvidia]
Apr 30 09:28:53 beck kernel:  ? _nv000789rm+0x5f5/0x8b0 [nvidia]
Apr 30 09:28:53 beck kernel:  ? _nv000694rm+0x2e/0x60 [nvidia]
Apr 30 09:28:53 beck kernel:  ? _nv015124rm+0x576/0x5c0 [nvidia]
Apr 30 09:28:53 beck kernel:  ? _nv004324rm+0xca/0x650 [nvidia]
Apr 30 09:28:53 beck kernel:  ? _nv004329rm+0xec/0xf0 [nvidia]
Apr 30 09:28:53 beck kernel:  ? _nv004782rm+0x4eba/0x5500 [nvidia]
Apr 30 09:28:53 beck kernel:  _nv001372rm+0xa5/0x260 [nvidia]
Apr 30 09:28:53 beck kernel:  os_memcpy_to_user+0x27/0x50 [nvidia]
Apr 30 09:28:53 beck kernel:  __check_object_size+0x12e/0x13c
Apr 30 09:28:53 beck kernel: Call Trace:
Apr 30 09:28:53 beck kernel: CR2: 00007feb04227de0 CR3: 000000016bec0000 CR4: 00000000000006f0 Apr 30 09:28:53 beck kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Apr 30 09:28:53 beck kernel: FS: 00007feb08d9df00(0000) GS:ffffa09029c00000(0000) knlGS:0000000000000000 Apr 30 09:28:53 beck kernel: R13: 0000000000000001 R14: ffffa08febf85e58 R15: ffffa08febf85ea0 Apr 30 09:28:53 beck kernel: R10: 0000000000000005 R11: 0000000000000000 R12: ffffa08febf85e58 Apr 30 09:28:53 beck kernel: RBP: ffffa08febf85e5b R08: 000000000000041d R09: ffffb025c118fad8 Apr 30 09:28:53 beck kernel: RDX: 00000000fffffff8 RSI: 0000000000000096 RDI: ffffa09029c19cc0 Apr 30 09:28:53 beck kernel: RAX: 0000000000000084 RBX: 0000000000000003 RCX: 0000000000000007
Apr 30 09:28:53 beck kernel: RSP: 0018:ffffb025c118fc48 EFLAGS: 00010296
Apr 30 09:28:53 beck kernel: Code: b9 41 51 49 89 c0 49 89 f1 49 0f 45 d2 49 c7 c2 f9 77 36 b9 48 89 f9 48 c7 c7 10 df 37 b9 4d 0f 45 d3 4c 89 d6 e8 ad 27 dd ff <0f> 0b 48 83 c4 18 c3 48 c7 c6 dc 9c 39 b9 49 89 f1 48 89 f0 eb 99
Apr 30 09:28:53 beck kernel: RIP: 0010:usercopy_warn+0x7a/0x90
Apr 30 09:28:53 beck kernel: Hardware name: MICRO-STAR INTERNATIONAL CO.,LTD MS-7360/MS-7360, BIOS V1.7 02/19/2008 Apr 30 09:28:53 beck kernel: CPU: 0 PID: 1491 Comm: Xorg Tainted: P OE 5.6.6-300.fc32.x86_64 #1
Apr 30 09:28:53 beck kernel:  r8169 pata_acpi pata_marvell
Apr 30 09:28:53 beck kernel: Modules linked in: rpcsec_gss_krb5 nft_objref rfkill nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nf_tables_set nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter f71882fg coretemp kvm_intel kvm iTCO_wdt gpio_ich iTCO_vendor_support ppdev snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_hda_codec irqbypass snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd nvidia(POE) i2c_i801 lpc_ich soundcore parport_pc parport acpi_cpufreq nfsd auth_rpcgss nfsv4 dns_resolver nfs_acl nfs lockd grace drm sunrpc fscache ip_tables ata_generic uas usb_storage serio_raw Apr 30 09:28:53 beck kernel: WARNING: CPU: 0 PID: 1491 at mm/usercopy.c:75 usercopy_warn+0x7a/0x90 Apr 30 09:28:53 beck kernel: Bad or missing usercopy whitelist? Kernel memory exposure attempt detected from SLUB object 'nvidia_stack_t' (offset 11864, size 3)!
Apr 30 09:28:53 beck kernel: ------------[ cut here ]------------

Ralf
_______________________________________________
rpmfusion-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to