Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
d 80 90 8d 76 2024-02-04T14:20:46.754935-05:00 mini2 kernel: [61619.122283] EAX: ffda EBX: 0003 ECX: 01079dd0 EDX: 0001 2024-02-04T14:20:46.754938-05:00 mini2 kernel: [61619.122286] ESI: b773eff4 EDI: EBP: 01078b70 ESP: bf973da0 2024-02-04T14:20:46.754941-05:00 mini2 kernel: [61619.122289] DS: 007b ES: 007b FS: GS: 0033 SS: 007b EFLAGS: 0246 2024-02-04T14:20:46.754944-05:00 mini2 kernel: [61619.122296] Modules linked in: tls tun xt_tcpudp i915 ath5k xt_conntrack snd_hda_codec_idt nf_con ntrack snd_hda_codec_generic nf_defrag_ipv6 ledtrig_audio nf_defrag_ipv4 ath coretemp drm_buddy snd_hda_intel snd_intel_dspcfg drm_display_helper k vm_intel nft_compat nf_tables cec snd_intel_sdw_acpi mac80211 rc_core kvm ttm applesmc irqbypass snd_hda_codec drm_kms_helper libarc4 i2c_algo_bit iTCO_wdt fb_sys_fops cfg80211 snd_hda_core intel_pmc_bxt snd_hwdep iTCO_vendor_support syscopyarea sysfillrect watchdog snd_pcm sysimgblt pcspkr nf netlink snd_timer at24 rfkill snd soundcore appledisplay sg apple_mfi_fastcharge evdev tpm_infineon button acpi_cpufreq binfmt_misc firewire_sbp2 e fi_pstore drm loop dm_mod fuse configfs ip_tables x_tables autofs4 xfs libcrc32c crc32c_generic hid_apple hid_appleir hid_generic usbhid hid sd_mod t10_pi crc64_rocksoft sr_mod crc64 cdrom crc_t10dif crct10dif_generic crct10dif_common ata_generic ahci ata_piix libahci libata scsi_mod ehci_pci firewire_ohci 2024-02-04T14:20:46.754948-05:00 mini2 kernel: [61619.122432] firewire_core uhci_hcd ehci_hcd i2c_i801 lpc_ich i2c_smbus scsi_common crc_itu_t usb core usb_common sky2 video wmi 2024-02-04T14:20:46.754951-05:00 mini2 kernel: [61619.122479] ---[ end trace ]--- 2024-02-04T14:20:46.754953-05:00 mini2 kernel: [61619.122483] EIP: usercopy_abort+0x65/0x67 2024-02-04T14:20:46.754956-05:00 mini2 kernel: [61619.122488] Code: 44 cb bb 00 20 b1 d0 89 4d f0 b9 33 9a af d0 0f 45 cb ff 75 0c ff 75 08 57 52 5 6 50 ff 75 f0 51 68 a0 1f b1 d0 e8 8f 89 ff ff <0f> 0b 56 31 d2 b8 4a 20 b1 d0 ff 75 ec 8b 4d f0 e8 86 ff ff ff 56 2024-02-04T14:20:46.754959-05:00 mini2 kernel: [61619.122491] EAX: 0053 EBX: d0b12000 ECX: f6bcf8c0 EDX: f6bc9d50 2024-02-04T14:20:46.754962-05:00 mini2 kernel: [61619.122495] ESI: d0b28ae8 EDI: d0b28ae8 EBP: c487fc64 ESP: c487fc30 2024-02-04T14:20:46.754965-05:00 mini2 kernel: [61619.122498] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246 2024-02-04T14:20:46.754967-05:00 mini2 kernel: [61619.122502] CR0: 80050033 CR2: 0107a000 CR3: 057fa000 CR4: 06d0 On Tue, Nov 21, 2023 at 11:13 AM Jiann-Ming Su wrote: > > Looks like it's unrelated to openvpn; running openvpn 2.6.3-1+deb12u2 > and the mm/usercopy still happens. I just reported 1056356 for apt > since this happens pretty reliably during apt-get update. > > > On Tue, Nov 21, 2023 at 9:53 AM Jiann-Ming Su wrote: > > > > Could this issue be related to CVE-2023-46850 mentioned in bug > > 1055805? OpenVPN is running on this particular box that suffers from > > this problem. > > > > On Mon, Nov 6, 2023 at 11:36 PM Jiann-Ming Su wrote: > > > > > > and 6.1.0-13-686-pae: > > > > > > [348871.341900] usercopy: Kernel memory exposure attempt detected from > > > kmap (offset 1270, size 15114)! > > > [348871.342021] [ cut here ] > > > [348871.342024] kernel BUG at mm/usercopy.c:101! > > > [348871.342068] invalid opcode: [#1] PREEMPT SMP PTI > > > [348871.342118] CPU: 0 PID: 12867 Comm: http Not tainted > > > 6.1.0-13-686-pae #1 Debian 6.1.55-1 > > > [348871.342186] Hardware name: Apple Computer, Inc. > > > Macmini1,1/Mac-F4208EC8, BIOS MM11.88Z.0055.B0 > > > 8.0610121326 10/12/06 > > > [348871.342259] EIP: usercopy_abort+0x65/0x67 > > > [348871.342302] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f > > > 45 cb ff 75 0c ff 75 08 57 52 56 > > > 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0 > > > b3 c6 ff 75 ec 8b 4d f0 e8 86 > > > ff ff ff 56 > > > [348871.342423] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001 > > > [348871.342472] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4 > > > [348871.342520] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: > > > 00010286 > > > [348871.342573] CR0: 80050033 CR2: b776ce90 CR3: 34fe8000 CR4: 06f0 > > > [348871.342621] Call Trace: > > > [348871.342649] ? __die_body.cold+0x14/0x1a > > > [348871.342687] ? __die+0x21/0x26 > > > [348871.342717] ? die+0x28/0x50 > > > [348871.342749] ? do_trap+0xbb/0xe0 > > > [348871.342780] ? do_error_trap+0x4c/0x60 > > > [348871.342814] ? usercopy_abort+0x65/0x67 > > > [348871.342851] ? exc_overflow+0x40/0x40 >
Bug#1056356: apt-get update kernel BUG at mm/usercopy.c:101!
Thanks for following up. I think you are right, these two old MacMinis gets into a weird state where apt is affected by the kernel usercopy problem, i.e. apt is not causing the problem itself. Both behave the same with bookworm 6.1 kernel. No problems on the bullseye 5.10 kernel. Please close this case since it is not an apt issue. $ /usr/lib/apt/methods/http < /tmp/testrequest 100 Capabilities Send-URI-Encoded: true Send-Config: true Pipeline: true Version: 1.2 102 Status Message: Connecting to ftp-nyc.osuosl.org URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease 102 Status Message: Connecting to ftp-nyc.osuosl.org (64.50.233.100) URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease 102 Status Message: Connected to ftp-nyc.osuosl.org (64.50.233.100) URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease GET /debian/dists/bookworm/InRelease HTTP/1.1 Host: ftp.us.debian.org Accept: text/* User-Agent: Debian APT-HTTP/1.3 (2.6.1) 102 Status Message: Waiting for headers URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease Answer for: http://ftp.us.debian.org/debian/dists/bookworm/InRelease HTTP/1.1 200 OK Date: Tue, 21 Nov 2023 21:54:35 GMT Server: Apache Last-Modified: Sat, 07 Oct 2023 09:49:42 GMT ETag: "24dfd-6071d46c1efad" Accept-Ranges: bytes Content-Length: 151037 200 URI Start Last-Modified: Sat, 07 Oct 2023 09:49:42 + Size: 151037 URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease 201 URI Done Checksum-FileSize-Hash: 151037 SHA512-Hash: 10437f8f2ab4e1c45494d46096c753110b9b4b19a706087537ff77c951ccc30185a4e829456c926cae1d1a89052127f97aab5d4c828ef1f120fea8a5fb39badc SHA256-Hash: f433d996ac53bab13e33631c6c250b8a7216692c56a2da61194bdd944bf7 SHA1-Hash: 1ff2370064bd97104a10a73578f6c75c6bebfc13 MD5Sum-Hash: bc85d0cdcc061129196e9caac8311995 MD5-Hash: bc85d0cdcc061129196e9caac8311995 Last-Modified: Sat, 07 Oct 2023 09:49:42 + Size: 151037 Filename: /dev/null URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease On Tue, Nov 21, 2023 at 3:54 PM David Kalnischkies wrote: > > Control: reassign -1 src:linux 6.1.38-4 > Control: forcemerge 1051643 -1 > Control: affects -1 apt > > Hi, > > On Tue, Nov 21, 2023 at 11:04:18AM -0500, js1 wrote: > > Running apt-get update causes kernel BUG as reported in 1051643. apt-get > > update hangs: > > If that is as you describe, that the bug is in the kernel, we as apt > maintainers can do nothing about it. > > We have also no other reports to that effect here or as far as I can see > in Launchpad (= Ubuntu) against apt, so this might be highly dependent > on your/specific hardware. > > So, keeping the bug open here seems to serve no purpose in my eyes and > hence I am merging it with the existing one – but I tag it as affecting > apt, so that it appears in its bug list should other users encounter > this with apt (which I suppose was your intend). > > > Beside you running apt I don't see any apt code in the trace, but from > the apt output produced I suppose its triggering somewhere in the > download step, so the following might help to simplify the reproducer > a bit – if you can reproduce it that way of course as a lot of > complexity is stripped away which might trigger it… > > $ cat > /tmp/testrequest < 601 Configuration > Config-Item: Debug::Acquire::http=1 > Config-Item: Debug::Acquire::https=1 > Config-Item: Acquire::http::DependOnSTDIN=0 > Config-Item: Acquire::https::DependOnSTDIN=0 > > 600 URI Acquire > URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease > Filename: /dev/null > > EOF > $ /usr/lib/apt/methods/http < /tmp/testrequest > > (yes, you can and are encouraged to run this as non-root user. > While creating the testrequest file make sure copy everything between > the two EOF. Especially the ending empty line. A successful run ends > with a block starting with "201 URI Done". Your apt output suggests > it triggers somewhere between "102 Status" and "200 URI Start".) > > Before giving up on this try using a real Filename and/or different URI > in the testrequest (if you want to use a https URI, make sure to call > the https method!). > > > Hope that helps & good luck finding the cause & solution. > > Best regards > > David Kalnischkies -- Jiann-Ming Su
Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
Looks like it's unrelated to openvpn; running openvpn 2.6.3-1+deb12u2 and the mm/usercopy still happens. I just reported 1056356 for apt since this happens pretty reliably during apt-get update. On Tue, Nov 21, 2023 at 9:53 AM Jiann-Ming Su wrote: > > Could this issue be related to CVE-2023-46850 mentioned in bug > 1055805? OpenVPN is running on this particular box that suffers from > this problem. > > On Mon, Nov 6, 2023 at 11:36 PM Jiann-Ming Su wrote: > > > > and 6.1.0-13-686-pae: > > > > [348871.341900] usercopy: Kernel memory exposure attempt detected from > > kmap (offset 1270, size 15114)! > > [348871.342021] [ cut here ] > > [348871.342024] kernel BUG at mm/usercopy.c:101! > > [348871.342068] invalid opcode: [#1] PREEMPT SMP PTI > > [348871.342118] CPU: 0 PID: 12867 Comm: http Not tainted > > 6.1.0-13-686-pae #1 Debian 6.1.55-1 > > [348871.342186] Hardware name: Apple Computer, Inc. > > Macmini1,1/Mac-F4208EC8, BIOS MM11.88Z.0055.B0 > > 8.0610121326 10/12/06 > > [348871.342259] EIP: usercopy_abort+0x65/0x67 > > [348871.342302] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f > > 45 cb ff 75 0c ff 75 08 57 52 56 > > 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0 > > b3 c6 ff 75 ec 8b 4d f0 e8 86 > > ff ff ff 56 > > [348871.342423] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001 > > [348871.342472] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4 > > [348871.342520] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: > > 00010286 > > [348871.342573] CR0: 80050033 CR2: b776ce90 CR3: 34fe8000 CR4: 06f0 > > [348871.342621] Call Trace: > > [348871.342649] ? __die_body.cold+0x14/0x1a > > [348871.342687] ? __die+0x21/0x26 > > [348871.342717] ? die+0x28/0x50 > > [348871.342749] ? do_trap+0xbb/0xe0 > > [348871.342780] ? do_error_trap+0x4c/0x60 > > [348871.342814] ? usercopy_abort+0x65/0x67 > > [348871.342851] ? exc_overflow+0x40/0x40 > > [348871.342892] ? exc_invalid_op+0x44/0x60 > > [348871.342929] ? usercopy_abort+0x65/0x67 > > [348871.342966] ? handle_exception+0x133/0x133 > > [348871.343009] ? exc_overflow+0x40/0x40 > > [348871.343046] ? usercopy_abort+0x65/0x67 > > [348871.343082] ? exc_overflow+0x40/0x40 > > [348871.343117] ? usercopy_abort+0x65/0x67 > > [348871.343156] __check_object_size.cold+0xae/0xae > > [348871.343199] simple_copy_to_iter+0x1c/0x40 > > [348871.343237] __skb_datagram_iter+0x163/0x320 > > [348871.343276] skb_copy_datagram_iter+0x2d/0x80 > > [348871.343316] ? skb_free_datagram+0x20/0x20 > > [348871.343353] tcp_recvmsg_locked+0x30e/0x890 > > [348871.343400] tcp_recvmsg+0x6f/0x1e0 > > [348871.343437] ? tcp_recv_timestamp+0x240/0x240 > > [348871.343476] inet_recvmsg+0x54/0x130 > > [348871.343509] ? security_socket_recvmsg+0x41/0x60 > > [348871.343553] sock_recvmsg+0x73/0x90 > > [348871.343589] ? ipip_gso_segment+0x30/0x30 > > [348871.343625] sock_read_iter+0x84/0xe0 > > [348871.343664] vfs_read+0x288/0x2c0 > > [348871.343702] ksys_read+0xab/0xe0 > > [348871.343734] __ia32_sys_read+0x15/0x20 > > [348871.343768] __do_fast_syscall_32+0x68/0xb0 > > [348871.343807] ? fpregs_assert_state_consistent+0x25/0x50 > > [348871.345275] ? exit_to_user_mode_prepare+0x41/0x1a0 > > [348871.346746] ? syscall_exit_to_user_mode+0x29/0x40 > > [348871.348214] ? __do_fast_syscall_32+0x72/0xb0 > > [348871.349630] ? vfs_write+0x105/0x3c0 > > [348871.350996] ? debug_smp_processor_id+0x12/0x20 > > [348871.352388] ? fpregs_assert_state_consistent+0x25/0x50 > > [348871.353744] ? exit_to_user_mode_prepare+0x41/0x1a0 > > [348871.355064] ? syscall_exit_to_user_mode+0x29/0x40 > > [348871.356350] ? __ia32_sys_write+0x15/0x20 > > [348871.357571] ? __do_fast_syscall_32+0x72/0xb0 > > [348871.358715] ? fpregs_assert_state_consistent+0x25/0x50 > > [348871.359832] ? exit_to_user_mode_prepare+0x41/0x1a0 > > [348871.360933] ? irqentry_exit_to_user_mode+0x16/0x20 > > [348871.362024] do_fast_syscall_32+0x29/0x60 > > [348871.363100] do_SYSENTER_32+0x15/0x20 > > [348871.364153] entry_SYSENTER_32+0x98/0xf1 > > [348871.365213] EIP: 0xb7f25559 > > [348871.366273] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 > > 10 07 03 74 b0 01 10 08 03 74 d8 > > 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 > > 8d 76 00 58 b8 77 00 00 00 cd > > 80 90 8d 76 > > [348871.368699] EAX: ffda EBX: 0003 ECX: 01a19d4f EDX: f9f1 > > [348871.369982] ESI: b721cff4
Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
Could this issue be related to CVE-2023-46850 mentioned in bug 1055805? OpenVPN is running on this particular box that suffers from this problem. On Mon, Nov 6, 2023 at 11:36 PM Jiann-Ming Su wrote: > > and 6.1.0-13-686-pae: > > [348871.341900] usercopy: Kernel memory exposure attempt detected from > kmap (offset 1270, size 15114)! > [348871.342021] [ cut here ] > [348871.342024] kernel BUG at mm/usercopy.c:101! > [348871.342068] invalid opcode: [#1] PREEMPT SMP PTI > [348871.342118] CPU: 0 PID: 12867 Comm: http Not tainted > 6.1.0-13-686-pae #1 Debian 6.1.55-1 > [348871.342186] Hardware name: Apple Computer, Inc. > Macmini1,1/Mac-F4208EC8, BIOS MM11.88Z.0055.B0 > 8.0610121326 10/12/06 > [348871.342259] EIP: usercopy_abort+0x65/0x67 > [348871.342302] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f > 45 cb ff 75 0c ff 75 08 57 52 56 > 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0 > b3 c6 ff 75 ec 8b 4d f0 e8 86 > ff ff ff 56 > [348871.342423] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001 > [348871.342472] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4 > [348871.342520] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010286 > [348871.342573] CR0: 80050033 CR2: b776ce90 CR3: 34fe8000 CR4: 06f0 > [348871.342621] Call Trace: > [348871.342649] ? __die_body.cold+0x14/0x1a > [348871.342687] ? __die+0x21/0x26 > [348871.342717] ? die+0x28/0x50 > [348871.342749] ? do_trap+0xbb/0xe0 > [348871.342780] ? do_error_trap+0x4c/0x60 > [348871.342814] ? usercopy_abort+0x65/0x67 > [348871.342851] ? exc_overflow+0x40/0x40 > [348871.342892] ? exc_invalid_op+0x44/0x60 > [348871.342929] ? usercopy_abort+0x65/0x67 > [348871.342966] ? handle_exception+0x133/0x133 > [348871.343009] ? exc_overflow+0x40/0x40 > [348871.343046] ? usercopy_abort+0x65/0x67 > [348871.343082] ? exc_overflow+0x40/0x40 > [348871.343117] ? usercopy_abort+0x65/0x67 > [348871.343156] __check_object_size.cold+0xae/0xae > [348871.343199] simple_copy_to_iter+0x1c/0x40 > [348871.343237] __skb_datagram_iter+0x163/0x320 > [348871.343276] skb_copy_datagram_iter+0x2d/0x80 > [348871.343316] ? skb_free_datagram+0x20/0x20 > [348871.343353] tcp_recvmsg_locked+0x30e/0x890 > [348871.343400] tcp_recvmsg+0x6f/0x1e0 > [348871.343437] ? tcp_recv_timestamp+0x240/0x240 > [348871.343476] inet_recvmsg+0x54/0x130 > [348871.343509] ? security_socket_recvmsg+0x41/0x60 > [348871.343553] sock_recvmsg+0x73/0x90 > [348871.343589] ? ipip_gso_segment+0x30/0x30 > [348871.343625] sock_read_iter+0x84/0xe0 > [348871.343664] vfs_read+0x288/0x2c0 > [348871.343702] ksys_read+0xab/0xe0 > [348871.343734] __ia32_sys_read+0x15/0x20 > [348871.343768] __do_fast_syscall_32+0x68/0xb0 > [348871.343807] ? fpregs_assert_state_consistent+0x25/0x50 > [348871.345275] ? exit_to_user_mode_prepare+0x41/0x1a0 > [348871.346746] ? syscall_exit_to_user_mode+0x29/0x40 > [348871.348214] ? __do_fast_syscall_32+0x72/0xb0 > [348871.349630] ? vfs_write+0x105/0x3c0 > [348871.350996] ? debug_smp_processor_id+0x12/0x20 > [348871.352388] ? fpregs_assert_state_consistent+0x25/0x50 > [348871.353744] ? exit_to_user_mode_prepare+0x41/0x1a0 > [348871.355064] ? syscall_exit_to_user_mode+0x29/0x40 > [348871.356350] ? __ia32_sys_write+0x15/0x20 > [348871.357571] ? __do_fast_syscall_32+0x72/0xb0 > [348871.358715] ? fpregs_assert_state_consistent+0x25/0x50 > [348871.359832] ? exit_to_user_mode_prepare+0x41/0x1a0 > [348871.360933] ? irqentry_exit_to_user_mode+0x16/0x20 > [348871.362024] do_fast_syscall_32+0x29/0x60 > [348871.363100] do_SYSENTER_32+0x15/0x20 > [348871.364153] entry_SYSENTER_32+0x98/0xf1 > [348871.365213] EIP: 0xb7f25559 > [348871.366273] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 > 10 07 03 74 b0 01 10 08 03 74 d8 > 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 > 8d 76 00 58 b8 77 00 00 00 cd > 80 90 8d 76 > [348871.368699] EAX: ffda EBX: 0003 ECX: 01a19d4f EDX: f9f1 > [348871.369982] ESI: b721cff4 EDI: EBP: 01a184e0 ESP: bf9f19c0 > [348871.371287] DS: 007b ES: 007b FS: GS: 0033 SS: 007b EFLAGS: 0246 > [348871.372627] Modules linked in: tls tun xt_tcpudp xt_conntrack > snd_hda_codec_idt snd_hda_codec_gene > ric nf_conntrack ledtrig_audio nf_defrag_ipv6 snd_hda_intel > nf_defrag_ipv4 i915 snd_intel_dspcfg nft_c > ompat drm_buddy nf_tables snd_intel_sdw_acpi drm_display_helper > snd_hda_codec iTCO_wdt cec hid_appleir > intel_pmc_bxt rc_core iTCO_vendor_support coretemp ttm snd_hda_core > kvm_intel snd_hwdep drm_kms_helpe > r watchdog apple_mfi_fastcharge snd_pcm ath5k kvm i2c_algo_bit ath > mac80211 snd_timer snd nfnetlink li > barc4 a
Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
[348872.047003] ---[ end trace ]--- [348872.048977] EIP: usercopy_abort+0x65/0x67 [348872.050720] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f 45 cb ff 75 0c ff 75 08 57 52 56 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0 b3 c6 ff 75 ec 8b 4d f0 e8 86 ff ff ff 56 [348872.054483] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001 [348872.056446] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4 [348872.058398] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010286 [348872.060380] CR0: 80050033 CR2: b4822000 CR3: 34ea4000 CR4: 06f0 On Tue, Sep 12, 2023 at 11:08 AM Jiann-Ming Su wrote: > > I spoke too soon... it's happening on 6.1.0-12-686 as well: > > # apt-get update > Get:1 http://security.debian.org/debian-security bookworm-security/updates > InRelease [48.0 kB] > 0% [Waiting for headers] [1 InRelease 0 B/48.0 kB 0%] > Message from syslogd@mini1 at Sep 12 11:07:33 ... > kernel:[123507.826321] usercopy: Kernel memory exposure attempt detected > from kmap (offset 0, size 16384)! > Hit:2 http://ftp.us.debian.org/debian bookworm InRelease > Get:3 http://ftp.us.debian.org/debian bookworm-updates InRelease [52.1 kB] > 0% [3 InRelease 0 B/52.1 kB 0%] [1 InRelease 0 B/48.0 kB 0%] > Message from syslogd@mini1 at Sep 12 11:07:33 ... > kernel:[123508.220983] usercopy: Kernel memory exposure attempt detected > from kmap (offset 0, size 16384)! > > [123452.464498] [ cut here ] > [123452.464530] kernel BUG at mm/usercopy.c:101! > [123452.464566] invalid opcode: [#1] PREEMPT SMP > [123452.464606] CPU: 1 PID: 7495 Comm: http Not tainted 6.1.0-12-686 #1 > Debian 6.1.52-1 > [123452.464653] Hardware name: Apple Computer, Inc. Macmini1,1/Mac-F4208EC8, > BIOS MM11.88Z.0055.B08.0610121326 10/12/06 > [123452.464729] EIP: usercopy_abort+0x65/0x67 > [123452.464772] Code: 44 cb bb d8 d9 b1 cc 89 4d f0 b9 12 55 b0 cc 0f 45 cb > ff 75 0c ff 75 08 57 52 56 50 ff 75 f0 51 68 78 d9 b1 cc e8 8a 8e ff ff <0f> > 0b 56 31 d2 b8 22 da b1 cc ff 75 ec 8b 4d f0 e8 86 ff ff ff 56 > [123452.464886] EAX: 0052 EBX: ccb1d9d8 ECX: 0001 EDX: 0001 > [123452.464930] ESI: ccb3449c EDI: ccb3449c EBP: c349fce0 ESP: c349fcac > [123452.464974] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246 > [123452.465024] CR0: 80050033 CR2: 01be6000 CR3: 0e3d2000 CR4: 06d0 > [123452.465068] Call Trace: > [123452.465093] ? __die_body.cold+0x14/0x1a > [123452.465126] ? __die+0x21/0x26 > [123452.465152] ? die+0x28/0x50 > [123452.465179] ? do_trap+0xbb/0xe0 > [123452.465206] ? do_error_trap+0x4c/0x60 > [123452.465235] ? usercopy_abort+0x65/0x67 > [123452.465271] ? exc_overflow+0x40/0x40 > [123452.465303] ? exc_invalid_op+0x44/0x60 > [123452.465338] ? usercopy_abort+0x65/0x67 > [123452.465372] ? handle_exception+0x133/0x133 > [123452.465409] ? up_read+0x7b/0x80 > [123452.465436] ? exc_overflow+0x40/0x40 > [123452.465467] ? usercopy_abort+0x65/0x67 > [123452.465501] ? exc_overflow+0x40/0x40 > [123452.465532] ? usercopy_abort+0x65/0x67 > [123452.465565] __check_object_size.cold+0xae/0xae > [123452.465605] ? kmap_high+0x6f/0x1f0 > [123452.465639] simple_copy_to_iter+0x1c/0x40 > [123452.465670] __skb_datagram_iter+0x163/0x320 > [123452.465703] skb_copy_datagram_iter+0x2d/0x80 > [123452.465738] ? skb_free_datagram+0x20/0x20 > [123452.465768] tcp_recvmsg_locked+0x30e/0x890 > [123452.465806] tcp_recvmsg+0x6f/0x1e0 > [123452.465839] ? tcp_recv_timestamp+0x240/0x240 > [123452.465876] inet_recvmsg+0x54/0x130 > [123452.465906] ? security_socket_recvmsg+0x41/0x60 > [123452.465942] sock_recvmsg+0x73/0x90 > [123452.465978] ? ipip_gso_segment+0x30/0x30 > [123452.466015] sock_read_iter+0x84/0xe0 > [123452.466050] vfs_read+0x288/0x2c0 > [123452.466083] ksys_read+0xab/0xe0 > [123452.466110] __ia32_sys_read+0x15/0x20 > [123452.466138] __do_fast_syscall_32+0x68/0xb0 > [123452.466171] ? syscall_exit_to_user_mode+0x29/0x40 > [123452.466205] ? __do_fast_syscall_32+0x72/0xb0 > [123452.466237] ? exit_to_user_mode_prepare+0x14d/0x1a0 > [123452.466273] ? sysvec_reboot+0x30/0x30 > [123452.466302] do_fast_syscall_32+0x29/0x60 > [123452.466334] do_SYSENTER_32+0x15/0x20 > [123452.466369] entry_SYSENTER_32+0x98/0xf1 > [123452.466399] EIP: 0xb7f3d559 > [123452.466425] Code: 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 > 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> > 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76 > [123452.466530] EAX: ffda EBX: 0003 ECX: 01be5df0 EDX: 0001 > [123452.466573] ESI: b778eff4 EDI: EBP: 01be4bb0 ESP: bf8d9b50 > [123452.466617] DS: 007b ES: 007b FS: GS: 0033 SS:
Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
crc_t10dif cdrom crct10dif_generic crct10dif_common ata_generic ata_piix ahci libahci libata firewire_ohci scsi_mod firewire_core ehci_pci i2c_i801 i2c_smbus [123452.680271] scsi_common lpc_ich uhci_hcd ehci_hcd crc_itu_t sky2 usbcore usb_common video wmi [123452.699090] ---[ end trace ]--- [123452.702138] EIP: usercopy_abort+0x65/0x67 [123452.705202] Code: 44 cb bb d8 d9 b1 cc 89 4d f0 b9 12 55 b0 cc 0f 45 cb ff 75 0c ff 75 08 57 52 56 50 ff 75 f0 51 68 78 d9 b1 cc e8 8a 8e ff ff <0f> 0b 56 31 d2 b8 22 da b1 cc ff 75 ec 8b 4d f0 e8 86 ff ff ff 56 [123452.708239] EAX: 0052 EBX: ccb1d9d8 ECX: 0001 EDX: 0001 [123452.711218] ESI: ccb3449c EDI: ccb3449c EBP: c349fce0 ESP: c349fcac [123452.714203] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246 [123452.717188] CR0: 80050033 CR2: 01939768 CR3: 12618000 CR4: 06d0 On Mon, Sep 11, 2023 at 3:46 AM Salvatore Bonaccorso wrote: > Control: tags -1 + moreinfo > > Hi, > > On Mon, Sep 11, 2023 at 12:51:48AM -0400, Jiann-Ming Su wrote: > > This may have been fixed in linux-image-6.1.0-12-686. > > Is this a confirmation that the problem is solved after the update? > In that case we can accordingly close the bug. > > Regards, > Salvatore > -- Jiann-Ming Su
Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
This may have been fixed in linux-image-6.1.0-12-686. On Mon, Sep 11, 2023 at 12:45 AM Debian Bug Tracking System < ow...@bugs.debian.org> wrote: > Thank you for the additional information you have supplied regarding > this Bug report. > > This is an automatically generated reply to let you know your message > has been received. > > Your message is being forwarded to the package maintainers and other > interested parties for their attention; they will reply in due course. > > Your message has been sent to the package maintainer(s): > Debian Kernel Team > > If you wish to submit further information on this problem, please > send it to 1051...@bugs.debian.org. > > Please do not send mail to ow...@bugs.debian.org unless you wish > to report a problem with the Bug-tracking system. > > -- > 1051643: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643 > Debian Bug Tracking System > Contact ow...@bugs.debian.org with problems > -- Jiann-Ming Su
Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!)
To clarify, it seems to be my "apt-get update" in my cron job that's triggering this: # apt-get update Get:1 http://security.debian.org/debian-security bookworm-security/updates InRelease [48.0 kB] 0% [Waiting for headers] [1 InRelease 0 B/48.0 kB 0%] Message from syslogd@mini1 at Sep 11 00:39:43 ... kernel:[ 93.705712] usercopy: Kernel memory exposure attempt detected from kmap (offset 0, size 16384)! Hit:2 http://ftp.us.debian.org/debian bookworm InRelease 0% [1 InRelease 0 B/48.0 kB 0%] Message from syslogd@mini1 at Sep 11 00:39:43 ... kernel:[ 94.007455] usercopy: Kernel memory exposure attempt detected from kmap (offset 0, size 16384)! Happening on PAE and non-PAE kernel. Did not have this issue in bullseye using linux-image-5.10.0-25-686-pae. On Sun, Sep 10, 2023 at 4:57 PM Debian Bug Tracking System < ow...@bugs.debian.org> wrote: > Thank you for filing a new Bug report with Debian. > > You can follow progress on this Bug here: 1051643: > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643. > > This is an automatically generated reply to let you know your message > has been received. > > Your message is being forwarded to the package maintainers and other > interested parties for their attention; they will reply in due course. > > As you requested using X-Debbugs-CC, your message was also forwarded to > sujiannm...@gmail.com > (after having been given a Bug report number, if it did not have one). > > Your message has been sent to the package maintainer(s): > Debian Kernel Team > > If you wish to submit further information on this problem, please > send it to 1051...@bugs.debian.org. > > Please do not send mail to ow...@bugs.debian.org unless you wish > to report a problem with the Bug-tracking system. > > -- > 1051643: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643 > Debian Bug Tracking System > Contact ow...@bugs.debian.org with problems > -- Jiann-Ming Su
Bug#1020597: Acknowledgement (r8169 transmit queue 0 timed out)
your message > has been received. > > Your message is being forwarded to the package maintainers and other > interested parties for their attention; they will reply in due course. > > Your message has been sent to the package maintainer(s): > unknown-pack...@qa.debian.org > > If you wish to submit further information on this problem, please > send it to 1020...@bugs.debian.org. > > Please do not send mail to ow...@bugs.debian.org unless you wish > to report a problem with the Bug-tracking system. > > -- > 1020597: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020597 > Debian Bug Tracking System > Contact ow...@bugs.debian.org with problems -- Jiann-Ming Su
Bug#1020597: r8169 transmit queue 0 timed out
Package: linux-image-5.10.0-17-amd64 Version: 5.10.136-1 [651163.019588] [ cut here ] [651163.019767] NETDEV WATCHDOG: enp1s0 (r8169): transmit queue 0 timed out [651163.019928] WARNING: CPU: 1 PID: 0 at net/sched/sch_generic.c:467 dev_watchdog+0x260/0x270 [651163.020071] Modules linked in: nls_utf8 cifs libarc4 dns_resolver fscache libdes tcp_diag udp_diag inet_diag tun cmac algif_hash algif_s kcipher af_alg bnep nft_chain_nat xt_MASQUERADE nf_nat nft_counter xt_tcpudp xt_state xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv 4 amdgpu gpu_sched nft_compat nf_tables libcrc32c crc32c_generic nfnetlink uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videob uf2_common videodev mc rtsx_usb_ms snd_hda_codec_realtek memstick snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio snd_hda_intel snd_i ntel_dspcfg soundwire_intel soundwire_generic_allocation snd_soc_core btusb edac_mce_amd btrtl btbcm btintel nls_ascii bluetooth nls_cp437 s nd_compress soundwire_cadence snd_hda_codec vfat fat snd_hda_core jitterentropy_rng kvm snd_hwdep soundwire_bus snd_pcm drbg radeon irqbypas s ansi_cprng ecdh_generic snd_timer ecc snd ghash_clmulni_intel crc16 soundcore ideapad_laptop aesni_intel sparse_keymap libaes ttm rfkill c rypto_simd cryptd wmi [651163.020621] glue_helper joydev drm_kms_helper serio_raw sg cec evdev ccp i2c_algo_bit efi_pstore sp5100_tco pcspkr watchdog fam15h_powe r k10temp rng_core acpi_cpufreq ac button drm configfs fuse efivarfs ip_tables x_tables autofs4 jfs rtsx_usb_sdmmc mmc_core rtsx_usb sd_mod sr_mod t10_pi cdrom crc_t10dif crct10dif_generic ahci xhci_pci libahci xhci_hcd crct10dif_pclmul crct10dif_common libata ehci_pci r8169 ehci _hcd realtek crc32_pclmul mdio_devres scsi_mod usbcore psmouse libphy crc32c_intel i2c_piix4 usb_common battery video [651163.022997] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.10.0-17-amd64 #1 Debian 5.10.136-1 [651163.023140] Hardware name: LENOVO INVALID/VIUU4, BIOS 1QCN32WW 08/18/2016 [651163.023291] RIP: 0010:dev_watchdog+0x260/0x270 [651163.023375] Code: eb a9 48 8b 1c 24 c6 05 5f be 0d 01 01 48 89 df e8 35 75 fa ff 44 89 e9 48 89 de 48 c7 c7 78 cf 96 8d 48 89 c2 e8 b5 9 9 14 00 <0f> 0b eb 86 66 66 2e 0f 1f 84 00 00 00 00 00 90 0f 1f 44 00 00 41 [651163.023568] RSP: 0018:a3a500104eb0 EFLAGS: 00010282 [651163.023749] RAX: RBX: 8ed5002d6000 RCX: [651163.023883] RDX: 8ed51b4ac760 RSI: 8ed51b49ca00 RDI: 0300 [651163.023977] RBP: 8ed5002d63dc R08: R09: a3a500104cd0 [651163.024099] R10: a3a500104cc8 R11: 8decb448 R12: 8ed507f18c80 [651163.024222] R13: R14: 8ed5002d6480 R15: 0001 [651163.024349] FS: () GS:8ed51b48() knlGS: [651163.027477] CS: 0010 DS: ES: CR0: 80050033 [651163.035480] CR2: 7f8ca499dd00 CR3: 00010225a000 CR4: 000406e0 [651163.039535] Call Trace: [651163.043484] [651163.051482] ? pfifo_fast_enqueue+0x150/0x150 [651163.055477] call_timer_fn+0x29/0x100 [651163.059476] __run_timers.part.0+0x1d9/0x250 [651163.067477] ? ktime_get+0x38/0xa0 [651163.071478] ? native_x2apic_icr_read+0x20/0x20 [651163.075476] ? lapic_next_event+0x1d/0x30 [651163.083476] ? clockevents_program_event+0x8d/0xf0 [651163.087477] run_timer_softirq+0x26/0x50 [651163.091476] __do_softirq+0xc5/0x279 [651163.095476] asm_call_irq_on_stack+0x12/0x20 [651163.103476] [651163.107477] do_softirq_own_stack+0x37/0x50 [651163.111477] irq_exit_rcu+0x92/0xc0 [651163.115476] sysvec_apic_timer_interrupt+0x36/0x80 [651163.119476] asm_sysvec_apic_timer_interrupt+0x12/0x20 [651163.127475] RIP: 0010:cpuidle_enter_state+0xc7/0x350 [651163.131476] Code: 8b 3d 5d da 14 73 e8 78 0a a0 ff 49 89 c5 0f 1f 44 00 00 31 ff e8 e9 15 a0 ff 45 84 ff 0f 85 fe 00 00 00 fb 66 0f 1f 4 4 00 00 <45> 85 f6 0f 88 0a 01 00 00 49 63 c6 4c 2b 2c 24 48 8d 14 40 48 8d [651163.139476] RSP: 0018:a3a5000bfea8 EFLAGS: 0246 [651163.147477] RAX: 8ed51b4afd40 RBX: 0002 RCX: 0002503ab4787fa4 [651163.151476] RDX: 01fa RSI: 0002503ab4787fa4 RDI: [651163.155477] RBP: 8ed507c3c400 R08: 0002503ab478819e R09: 0001 [651163.159477] R10: R11: f456 R12: 8dfb9180 [651163.163475] R13: 0002503ab478819e R14: 0002 R15: [651163.171477] ? cpuidle_enter_state+0xb7/0x350 [651163.175477] cpuidle_enter+0x29/0x40 [651163.179478] do_idle+0x1f3/0x2b0 [651163.183477] cpu_startup_entry+0x19/0x20 [651163.187476] secondary_startup_64_no_verify+0xb0/0xbb [651163.191476] ---[ end trace 4cb2b634af66d097 ]--- -- Jiann-Ming Su
Bug#969357: squid-4.6: segfault for unknown reason
Dang, sorry I missed that. I will install squid-dbgsym and report back if it segfaults again. Thanks for following up. On Wed, Sep 30, 2020 at 10:29 AM Bernhard Übelacker wrote: > Hello, > looks like your bug got an answer, but that message > might not got forwarded to you. > (For answers please to 969...@bugs.debian.org from now again.) > > Kind regards, > Bernhard > > > On Mon, 7 Sep 2020 16:56:24 +1200 Amos Jeffries > wrote: > > Control: retitle -1 squid-4.6: segfault for unknown reason > > Control: tags -1 + moreinfo > > > > On Mon, 31 Aug 2020 23:45:28 -0400 js1 wrote: > > > Package: squid > > > Version: 4.6-1+deb10u4 > > > Severity: normal > > > > > > Dear Maintainer, > > > > > > Squid segfaults but seems usable. No segfaults until this current > version (4.6-1+deb10u4). > > > > > > > Please install the debug symbols package (squid-dbgsym) and provide a > > backtrace from your segfault if it occurs again. > > > > Upstream provide details on how to obtain backtraces without downtime > > from a running Squid proxy at > > <https://wiki.squid-cache.org/SquidFaq/BugReporting>. > > > > > > Amos > > > > > -- Jiann-Ming Su "I have to decide between two equally frightening options. If I wanted to do that, I'd vote." --Duckman "The system's broke, Hank. The election baby has peed in the bath water. You got to throw 'em both out." --Dale Gribble "Those who vote decide nothing. Those who count the votes decide everything.” --Joseph Stalin
Bug#822936: Occurs on Stretch
q+0xe0/0xe0 [814247.299186] [] ? handle_irq+0x54/0x70 [814247.299186] [814247.299186] [814247.299186] [] ? do_IRQ+0x3c/0xc0 [814247.299186] [] ? irq_work_run_list+0x3d/0x60 [814247.299186] [] ? common_interrupt+0x33/0x38 [814247.299186] [] ? __do_softirq+0x58/0x240 [814247.299186] [] ? __irqentry_text_end+0x3/0x3 [814247.299186] [] ? nmi+0x53/0x6d [814247.299186] [] ? __irqentry_text_end+0x3/0x3 [814247.299186] [] ? do_softirq_own_stack+0x28/0x30 [814247.299186] [814247.299186] [] ? irq_exit+0xad/0xb0 [814247.299186] [] ? do_IRQ+0x45/0xc0 [814247.299186] [] ? common_interrupt+0x33/0x38 [814247.299186] [] ? cpuidle_enter_state+0x134/0x330 [814247.299186] [] ? cpu_startup_entry+0x135/0x220 [814247.299186] [] ? start_kernel+0x39d/0x3b4 On Sun, Nov 5, 2017 at 9:52 PM, Jiann-Ming Su wrote: > # uname -v > #1 SMP Debian 4.9.51-1 (2017-09-28) > > [256204.725417] INFO: rcu_sched self-detected stall on CPU > [256204.725450] INFO: rcu_sched detected stalls on CPUs/tasks: > [256204.725473] 0-...: (2 GPs behind) idle=52b/2/0 > softirq=1717403/1717404 fqs=0 > [256204.725477] > [256204.725485] (detected by 1, t=18640 jiffies, g=600410, c=600409, q=1) > [256204.725490] Task dump for CPU 0: > [256204.725495] swapper/0 R > [256204.725498] running task > [256204.725505] 0 0 0 0x0008 > [256204.725512] d07c55f0 > [256204.725517] d0761fbc > [256204.725520] > [256204.725523] d076007b > [256204.725527] f3ec007b > [256204.725530] 00d8 > [256204.725533] d07c00e0 > [256204.725537] ff5e > [256204.725542] d0480944 > [256204.725545] 0060 > [256204.725548] 00200246 > [256204.725552] 000ad6bb > [256204.72] f3ea7231 > [256204.725558] e8f2 > [256204.725561] > [256204.725565] d07c54a0 > [256204.725570] 0004 > [256204.725573] ff9d7fe0 > [256204.725576] f3ec141f > [256204.725580] e8f2 > [256204.725583] > [256204.725586] ff9d7fe0 > [256204.725589] d07c54a0 > [256204.725593] d0761fe4 > [256204.725598] Call Trace: > [256204.725653] [] ? cpuidle_enter_state+0x134/0x330 > [256204.725673] [] ? cpu_startup_entry+0x135/0x220 > [256204.725685] [] ? start_kernel+0x39d/0x3b4 > [256204.725696] rcu_sched kthread starved for 18640 jiffies! g600410 > c600409 f0x0 RCU_GP_WAIT_FQS(3) ->state=0x1 > [256204.725701] rcu_sched S > [256204.725705] 0 7 2 0x > [256204.725709] > [256204.725711] f79f2ac0 > [256204.725713] f6c9be00 > [256204.725715] f751bed4 > [256204.725717] d05a9e7e > [256204.725719] f751bebc > [256204.725727] d00d4cd7 > [256204.725729] d08b8280 > [256204.725732] 0051bec4 > [256204.725734] f7518db8 > [256204.725736] f7520a00 > [256204.725737] f7520a00 > [256204.725739] f79f2ac0 > [256204.725741] f75189c0 > [256204.725744] f751bee0 > [256204.725746] f75189c0 > [256204.725749] f79ec900 > [256204.725750] f751bf00 > [256204.725752] f751bee0 > [256204.725754] d05aa3ae > [256204.725756] f79ec900 > [256204.725758] f751bf28 > [256204.725760] d05ad08f > [256204.725762] 0002 > [256204.725765] Call Trace: > [256204.725779] [] ? __schedule+0x25e/0x760 > [256204.725790] [] ? lock_timer_base+0x67/0x80 > [256204.725798] [] ? schedule+0x2e/0x80 > [256204.725807] [] ? schedule_timeout+0x12f/0x300 > [256204.725815] [] ? del_timer_sync+0x50/0x50 > [256204.725823] [] ? rcu_gp_kthread+0x4a1/0x7c0 > [256204.725833] [] ? kthread+0xb4/0xd0 > [256204.725839] [] ? rcu_note_context_switch+0xf0/0xf0 > [256204.725847] [] ? kthread_park+0x50/0x50 > [256204.725854] [] ? ret_from_fork+0x1b/0x28 > [256204.726675] 0-...: (2 GPs behind) idle=52b/2/0 > softirq=1717403/1717404 fqs=0 > [256204.726951] (t=18640 jiffies g=600410 c=600409 q=1) > [256204.727207] rcu_sched kthread starved for 18640 jiffies! g600410 > c600409 f0x2 RCU_GP_WAIT_FQS(3) ->state=0x0 > [256204.727557] rcu_sched R running task0 7 2 > 0x > [256204.727579] f79f2ac0 f6c9be00 f751bed4 d05a9e7e f751bebc > d00d4cd7 d08b8280 > [256204.727599] 0051bec4 f7518db8 f7520a00 f7520a00 f79f2ac0 f75189c0 > f751bee0 f75189c0 > [256204.727618] f79ec900 f751bf00 f751bee0 d05aa3ae f79ec900 f751bf28 > d05ad08f 0002 > [256204.727638] Call Trace: > [256204.727667] [] ? __schedule+0x25e/0x760 > [256204.727681] [] ? lock_timer_base+0x67/0x80 > [256204.727693] [] ? schedule+0x2e/0x80 > [256204.727704] [] ? schedule_timeout+0x12f/0x300 > [256204.727714] [] ? del_timer_sync+0x50/0x50 > [256204.727722] [] ? rcu_gp_kthread+0x4a1/0x7c0 > [256204.727733] [] ? kthread+0xb4/0xd0 > [256204.727741] [] ? rcu_note_context_switch+0xf0/0xf0 > [256204.727750] [] ? kthread_park+
Bug#822936: Occurs on Stretch
/0x120 [256204.728057] [] ? handle_level_irq+0xe0/0xe0 [256204.728063] [] ? handle_irq+0x54/0x70 [256204.728067] [256204.728072] [256204.728084] [] ? do_IRQ+0x3c/0xc0 [256204.728099] [] ? irq_work_run_list+0x3d/0x60 [256204.728109] [] ? common_interrupt+0x33/0x38 [256204.728119] [] ? pre+0x150/0x270 [256204.728127] [] ? __do_softirq+0x58/0x240 [256204.728135] [] ? __irqentry_text_end+0x3/0x3 [256204.728143] [] ? nmi+0x53/0x6d [256204.728153] [] ? __irqentry_text_end+0x3/0x3 [256204.728162] [] ? do_softirq_own_stack+0x28/0x30 [256204.728165] [256204.728175] [] ? irq_exit+0xad/0xb0 [256204.728183] [] ? do_IRQ+0x45/0xc0 [256204.728192] [] ? common_interrupt+0x33/0x38 [256204.728206] [] ? cpuidle_enter_state+0x134/0x330 [256204.728218] [] ? cpu_startup_entry+0x135/0x220 [256204.728228] [] ? start_kernel+0x39d/0x3b4 On Sat, Oct 28, 2017 at 10:44 PM, Jiann-Ming Su wrote: > linux-image-4.9.0-4-686-pae 4.9.51-1 > > Oct 27 08:15:19 puar kernel: [26080.447922] INFO: rcu_sched > self-detected stall on CPU > Oct 27 08:15:19 puar kernel: [26080.447946] INFO: rcu_sched > self-detected stall on CPU > Oct 27 08:15:19 puar kernel: [26080.447964] 1-...: (1 GPs behind) > idle=c41/1/0 softirq=1143278/1143279 fqs=0 > Oct 27 08:15:19 puar kernel: [26080.447968] > Oct 27 08:15:19 puar kernel: [26080.447976] (t=9226 jiffies g=487334 > c=487333 q=1) > Oct 27 08:15:19 puar kernel: [26080.447988] rcu_sched kthread starved > for 9226 jiffies! g487334 c487333 f0x0 RCU_GP_WAIT_FQS(3) ->state=0x1 > Oct 27 08:15:19 puar kernel: [26080.447993] rcu_sched S > Oct 27 08:15:19 puar kernel: [26080.448001] 0 7 2 0x > Oct 27 08:15:19 puar kernel: > Oct 27 08:15:19 puar kernel: [26080.448012] f300a100 f68b8800 > f751bed4 c75a9e7e f751bebc c70d4cd7 c78b8280 0051bec4 > Oct 27 08:15:19 puar kernel: [26080.448041] f7518db8 c7767680 > f300a100 f79deac0 f75189c0 f751bee0 f75189c0 f79d8900 > Oct 27 08:15:19 puar kernel: [26080.448069] f751bf00 f751bee0 > c75aa3ae f79d8900 f751bf28 c75ad08f 0002Call Trace: > Oct 27 08:15:19 puar kernel: [26080.448126] [] ? > __schedule+0x25e/0x760 > Oct 27 08:15:19 puar kernel: [26080.448144] [] ? > lock_timer_base+0x67/0x80 > Oct 27 08:15:19 puar kernel: [26080.448158] [] ? schedule+0x2e/0x80 > Oct 27 08:15:19 puar kernel: [26080.448172] [] ? > schedule_timeout+0x12f/0x300 > Oct 27 08:15:19 puar kernel: [26080.448186] [] ? > del_timer_sync+0x50/0x50 > Oct 27 08:15:19 puar kernel: [26080.448199] [] ? > rcu_gp_kthread+0x4a1/0x7c0 > Oct 27 08:15:19 puar kernel: [26080.448214] [] ? kthread+0xb4/0xd0 > Oct 27 08:15:19 puar kernel: [26080.448225] [] ? > rcu_note_context_switch+0xf0/0xf0 > Oct 27 08:15:19 puar kernel: [26080.448237] [] ? > kthread_park+0x50/0x50 > Oct 27 08:15:19 puar kernel: [26080.448248] [] ? > ret_from_fork+0x1b/0x28 > Oct 27 08:15:19 puar kernel: [26080.448299] Task dump for CPU 0: > Oct 27 08:15:19 puar kernel: [26080.448307] swapper/0 R > Oct 27 08:15:19 puar kernel: [26080.448310] running task0 > 0 0 0x > Oct 27 08:15:19 puar kernel: c77c55f0 > Oct 27 08:15:19 puar kernel: [26080.448327] c7761fbc > c776007b bc31007b 00d8 c77c00e0 ff5e c7480944 > Oct 27 08:15:19 puar kernel: [26080.448355] 0060 0246 > 1667 bc2ca3cb 17af c77c54a0 0004 > Oct 27 08:15:19 puar kernel: [26080.448382] ff9d7fe0 bc314afc > 17af ff9d7fe0 c77c54a0 c7761fe4Call Trace: > Oct 27 08:15:19 puar kernel: [26080.448435] [] ? > cpuidle_enter_state+0x134/0x330 > Oct 27 08:15:19 puar kernel: [26080.448451] [] ? > cpu_startup_entry+0x135/0x220 > Oct 27 08:15:19 puar kernel: [26080.448467] [] ? > start_kernel+0x39d/0x3b4 > Oct 27 08:15:19 puar kernel: [26080.448473] Task dump for CPU 1: > Oct 27 08:15:19 puar kernel: [26080.448478] swapper/1 R > Oct 27 08:15:19 puar kernel: [26080.448481] running task0 > 0 1 0x0008 > Oct 27 08:15:19 puar kernel: f7527dcc > Oct 27 08:15:19 puar kernel: [26080.448495] c7091941 c76b35df > 0001 0008 c7782140 c7782140 > Oct 27 08:15:19 puar kernel: [26080.448522] 0001 f7527de4 > c7166884 0087 f79f3300 c7782140 c7782140 f7527e30 > Oct 27 08:15:19 puar kernel: [26080.448550] c70d20e1 c76a9ed0 > 240a 00076fa6 00076fa5 0001 603ea661Call Trace: > Oct 27 08:15:19 puar kernel: [26080.448593] [] ? > sched_show_task+0xf1/0x160 > Oct 27 08:15:19 puar kernel: [26080.448612] [] ? > rcu_dump_cpu_stacks+0x79/0x95 > Oct 27 08:15:19 puar kernel: [26080.448633] [] ? > rcu_check_callbacks+0x631/0x780 > Oct 27 08:15:19 puar kernel: [26080.448652] [] ? > update_process_times+0x28/0x50 > Oct 27 08:15:19 puar kernel: [26080.448665] [] ? >
Bug#822936: Occurs on Stretch
e_work+0x141/0x380 Oct 27 08:15:19 puar kernel: [26080.451828] [] ? worker_thread+0x41/0x460 Oct 27 08:15:19 puar kernel: [26080.451828] [] ? kthread+0xb4/0xd0 Oct 27 08:15:19 puar kernel: [26080.451828] [] ? process_one_work+0x380/0x380 Oct 27 08:15:19 puar kernel: [26080.451828] [] ? kthread_park+0x50/0x50 Oct 27 08:15:19 puar kernel: [26080.451828] [] ? ret_from_fork+0x1b/0x28 -- Jiann-Ming Su "I have to decide between two equally frightening options. If I wanted to do that, I'd vote." --Duckman "The system's broke, Hank. The election baby has peed in the bath water. You got to throw 'em both out." --Dale Gribble "Those who vote decide nothing. Those who count the votes decide everything.” --Joseph Stalin
Bug#822936: INFO: rcu_sched self-detected stall on CPU
0 f5007e88 c1084790 0001 c166a5ec c1614f80 Apr 29 01:55:32 ranfan kernel: f75d9620 c15fca00 f5007e9c c1062dac f5009f7c Apr 29 01:55:32 ranfan kernel: Call Trace: Apr 29 01:55:32 ranfan kernel: [] ? rcu_check_callbacks+0x38d/0x5b0 Apr 29 01:55:32 ranfan kernel: [] ? account_process_tick+0x60/0x130 Apr 29 01:55:32 ranfan kernel: [] ? update_process_times+0x3c/0x60 Apr 29 01:55:32 ranfan kernel: [] ? tick_sched_handle.isra.13+0x26/0x60 Apr 29 01:55:32 ranfan kernel: [] ? tick_sched_timer+0x37/0x70 Apr 29 01:55:32 ranfan kernel: [] ? __remove_hrtimer+0x38/0x90 Apr 29 01:55:32 ranfan kernel: [] ? __run_hrtimer+0x6d/0x190 Apr 29 01:55:32 ranfan kernel: [] ? tick_sched_handle.isra.13+0x60/0x60 Apr 29 01:55:32 ranfan kernel: [] ? hrtimer_interrupt+0x1e8/0x2a0 Apr 29 01:55:32 ranfan kernel: [] ? tick_do_broadcast.constprop.7+0x6b/0x70 Apr 29 01:55:32 ranfan kernel: [] ? tick_handle_oneshot_broadcast+0x105/0x180 Apr 29 01:55:32 ranfan kernel: [] ? add_interrupt_randomness+0x15a/0x1a0 Apr 29 01:55:32 ranfan kernel: [] ? timer_interrupt+0x12/0x20 Apr 29 01:55:32 ranfan kernel: [] ? handle_irq_event_percpu+0x35/0x180 Apr 29 01:55:32 ranfan kernel: [] ? handle_simple_irq+0x70/0x70 Apr 29 01:55:32 ranfan kernel: [] ? nmi_stack_correct+0x2f/0x34 Apr 29 01:55:32 ranfan kernel: [] ? handle_irq_event+0x2a/0x50 Apr 29 01:55:32 ranfan kernel: [] ? handle_simple_irq+0x70/0x70 Apr 29 01:55:32 ranfan kernel: [] ? handle_edge_irq+0x66/0x100 Apr 29 01:55:32 ranfan kernel: [] ? handle_irq+0x71/0x90 Apr 29 01:55:32 ranfan kernel: Apr 29 01:55:32 ranfan kernel: Apr 29 01:55:32 ranfan kernel: [] ? do_IRQ+0x3c/0xd0 Apr 29 01:55:32 ranfan kernel: [] ? common_interrupt+0x33/0x38 Apr 29 01:55:32 ranfan kernel: [] ? __do_softirq+0x6d/0x230 Apr 29 01:55:32 ranfan kernel: [] ? cpu_callback+0x160/0x160 Apr 29 01:55:32 ranfan kernel: [] ? nmi_stack_correct+0x2f/0x34 Apr 29 01:55:32 ranfan kernel: [] ? cpu_callback+0x160/0x160 Apr 29 01:55:32 ranfan kernel: [] ? do_softirq_own_stack+0x22/0x30 Apr 29 01:55:32 ranfan kernel: Apr 29 01:55:32 ranfan kernel: Apr 29 01:55:32 ranfan kernel: [] ? irq_exit+0x8d/0xa0 Apr 29 01:55:32 ranfan kernel: [] ? do_IRQ+0x45/0xd0 Apr 29 01:55:32 ranfan kernel: [] ? tick_broadcast_oneshot_control+0x7b/0x210 Apr 29 01:55:32 ranfan kernel: [] ? common_interrupt+0x33/0x38 Apr 29 01:55:32 ranfan kernel: [] ? cpuidle_enter_state+0x3e/0xd0 Apr 29 01:55:32 ranfan kernel: [] ? cpu_startup_entry+0x2be/0x3b0 Apr 29 01:55:32 ranfan kernel: [] ? start_kernel+0x3dd/0x3e2 Apr 29 01:55:32 ranfan kernel: [] ? set_init_arg+0x45/0x45 Apr 29 01:55:32 ranfan kernel: Code: 08 5b 5d c3 66 90 f0 0f b3 15 a8 a4 66 c1 a1 a8 a4 66 c1 85 c0 75 3a 31 c0 bb 10 27 00 00 eb 1f 8d b6 00 00 00 00 b8 58 89 41 00 36 aa 21 00 e8 91 ca 09 00 83 eb 01 74 09 a1 a8 a4 66 c1 85 Apr 29 01:55:32 ranfan kernel: INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 760.343 msecs Apr 29 01:55:33 ranfan kernel: gma500 :00:02.0: Backlight lvds set brightness 186a186a Apr 29 01:55:33 ranfan kernel: gma500 :00:02.0: Backlight lvds set brightness 186a186a Apr 29 02:00:48 ranfan kernel: device-mapper: uevent: version 1.0.3 Apr 29 02:00:48 ranfan kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-de...@redhat.com Apr 29 02:00:51 ranfan kernel: SGI XFS with ACLs, security attributes, realtime, large block/inode numbers, no debug enabled Apr 29 02:00:51 ranfan kernel: JFS: nTxBlock = 8192, nTxLock = 65536 Apr 29 02:00:51 ranfan kernel: ntfs: driver 2.1.30 [Flags: R/W MODULE]. Apr 29 02:00:51 ranfan kernel: QNX4 filesystem 0.2.3 registered. Apr 29 02:00:51 ranfan kernel: fuse init (API version 7.23) Apr 29 02:06:29 ranfan kernel: gma500 :00:02.0: Backlight lvds set brightness 186a186a Apr 29 02:06:29 ranfan kernel: gma500 :00:02.0: Backlight lvds set brightness 186a186a -- Jiann-Ming Su "I have to decide between two equally frightening options. If I wanted to do that, I'd vote." --Duckman "The system's broke, Hank. The election baby has peed in the bath water. You got to throw 'em both out." --Dale Gribble "Those who vote decide nothing. Those who count the votes decide everything.” --Joseph Stalin
Bug#562703: [Pkg-xen-devel] Bug#562703: qemu-dm missing from xen-utils-3.4
Thanks, I think that fixed the one particular problem I was having. On Sun, Dec 27, 2009 at 7:34 AM, Thomas Goirand wrote: > Jiann-Ming Su wrote: >> Package: xen-utils-3.4 >> Version: 3.4.2-2 >> >> # cat qemu-dm-openfiler.log >> failed to set up fds or execute dm /usr/lib/xen-3.4/bin/qemu-dm: >> ['OSError: [Errno 2] No such file or directory\n'] > > Hi, > > Please test this: > > http://ftparchive.gplhost.com/debian/pool/lenny/main/x/xen-qemu-dm-3.4/ > > Note that you should recompile it if you are running in in SID. > > Thomas > -- Jiann-Ming Su "I have to decide between two equally frightening options. If I wanted to do that, I'd vote." --Duckman "The system's broke, Hank. The election baby has peed in the bath water. You got to throw 'em both out." --Dale Gribble "Those who vote decide nothing. Those who count the votes decide everything.” --Joseph Stalin -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#562703: qemu-dm missing from xen-utils-3.4
Package: xen-utils-3.4 Version: 3.4.2-2 # cat qemu-dm-openfiler.log failed to set up fds or execute dm /usr/lib/xen-3.4/bin/qemu-dm: ['OSError: [Errno 2] No such file or directory\n'] -- Jiann-Ming Su "I have to decide between two equally frightening options. If I wanted to do that, I'd vote." --Duckman "The system's broke, Hank. The election baby has peed in the bath water. You got to throw 'em both out." --Dale Gribble "Those who vote decide nothing. Those who count the votes decide everything.” --Joseph Stalin -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#516015: Acknowledgement (lenny kernel does not boot Alpha architecture)
This seems to have fixed my boot problem: http://lists.debian.org/debian-alpha/2009/02/msg00026.html -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#516015: lenny kernel does not boot Alpha architecture
Package: linux-image-2.6.26-1-alpha-generic Version: 2.6.26-13 X-Debbugs-CC: debian-al...@lists.debian.org Severity: serious Tags: lenny kernel not booting alpha The linux-image that ships with Lenny will not boot on my Alpha architecture. The kernel tries to boot, but I'm immediately dumped back into the SRM console. I'm able to boot with 2.6.18-6 from Etch. Please let me know what more debugging info I can provide. $ cat /proc/cpuinfo cpu : Alpha cpu model : PCA56 cpu variation : 7 cpu revision: 0 cpu serial number : system type : EB164 system variation: SX164 system revision : 0 system serial number : cycle frequency [Hz] : 5 timer frequency [Hz] : 1024.00 page size [bytes] : 8192 phys. address bits : 40 max. addr. space # : 127 BogoMIPS: 1055.68 kernel unaligned acc: 0 (pc=0,va=0) user unaligned acc : 16564 (pc=21d8d4c,va=22020e1) platform string : Digital AlphaPC 164SX 533 MHz cpus detected : 1 L1 Icache : 16K, 1-way, 64b line L1 Dcache : 8K, 1-way, 32b line L2 cache: 1024K, 1-way, 64b line L3 cache: n/a -- Jiann-Ming Su "Black Reagan will be blamed for the failing economic and monetary policies instituted by white men over past 100 years." -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#477774: Package Dependencies for Finch
Package: finch Version: 2.4.1-1+b1 The package info lists the following dependencies: Depends: libc6 (>= 2.7-1), libglib2.0-0 (>= 2.16.0), libgstreamer0.10-0 (>= 0.10.10), libncursesw5 (>= 5.6+20071006-3), libpurple0 (>= 2.4.1-1+b1), libx11-6, libxml2 (>= 2.6.27), pidgin-data (>= 2.4.1), pidgin-data (<< 2.4.1-z) So, I manually install the above dependencies: apt-get install libc6 libglib2.0-0 libgstreamer0.10-0 libncursesw5 libpurple0 libx11-6 libxml2 pidgin-data It installs about 35MB worth of packages. So, if the above and their respective dependencies are installed, I should be able to install finch without further packages. However: # apt-get install finch Reading package lists... Done Building dependency tree Reading state information... Done The following extra packages will be installed: defoma fontconfig fontconfig-config gconf2 gconf2-common gstreamer0.10-alsa gstreamer0.10-plugins-base gstreamer0.10-plugins-good gstreamer0.10-x hicolor-icon-theme libaa1 libatk1.0-0 libatk1.0-data libavc1394-0 libcaca0 libcairo2 libcdio7 libcdparanoia0 libcucul0 libcupsys2 libdatrie0 libdrm2 libdv4 libflac8 libfontconfig1 libfontenc1 libfs6 libgconf2-4 libgl1-mesa-glx libglu1-mesa libgstreamer-plugins-base0.10-0 libgtk2.0-0 libgtk2.0-bin libgtk2.0-common libidl0 libiec61883-0 libogg0 liboil0.3 liborbit2 libpango1.0-0 libpango1.0-common libraw1394-8 libshout3 libspeex1 libtag1c2a libthai-data libthai0 libtheora0 libtiff4 libvisual-0.4-0 libvisual-0.4-plugins libvorbis0a libvorbisenc2 libwavpack1 libxcomposite1 libxcursor1 libxdamage1 libxfixes3 libxfont1 libxft2 libxi6 libxinerama1 libxrandr2 libxrender1 libxv1 libxxf86vm1 oss-compat psmisc ttf-dejavu ttf-dejavu-core ttf-dejavu-extra x-ttcidfont-conf xfonts-encodings xfonts-utils xutils xutils-dev Suggested packages: defoma-doc dfontmgr psfontmgr cupsys-common libdv-bin gnome-app-install librsvg2-common ttf-kochi-gothic ttf-kochi-mincho ttf-thryomanes ttf-baekmuk ttf-arphic-gbsn00lp ttf-arphic-bsmi00lp ttf-arphic-gkai00mp ttf-arphic-bkai00mp libraw1394-doc speex pdksh Recommended packages: libft-perl The following NEW packages will be installed: defoma finch fontconfig fontconfig-config gconf2 gconf2-common gstreamer0.10-alsa gstreamer0.10-plugins-base gstreamer0.10-plugins-good gstreamer0.10-x hicolor-icon-theme libaa1 libatk1.0-0 libatk1.0-data libavc1394-0 libcaca0 libcairo2 libcdio7 libcdparanoia0 libcucul0 libcupsys2 libdatrie0 libdrm2 libdv4 libflac8 libfontconfig1 libfontenc1 libfs6 libgconf2-4 libgl1-mesa-glx libglu1-mesa libgstreamer-plugins-base0.10-0 libgtk2.0-0 libgtk2.0-bin libgtk2.0-common libidl0 libiec61883-0 libogg0 liboil0.3 liborbit2 libpango1.0-0 libpango1.0-common libraw1394-8 libshout3 libspeex1 libtag1c2a libthai-data libthai0 libtheora0 libtiff4 libvisual-0.4-0 libvisual-0.4-plugins libvorbis0a libvorbisenc2 libwavpack1 libxcomposite1 libxcursor1 libxdamage1 libxfixes3 libxfont1 libxft2 libxi6 libxinerama1 libxrandr2 libxrender1 libxv1 libxxf86vm1 oss-compat psmisc ttf-dejavu ttf-dejavu-core ttf-dejavu-extra x-ttcidfont-conf xfonts-encodings xfonts-utils xutils xutils-dev 0 upgraded, 77 newly installed, 0 to remove and 0 not upgraded. Need to get 22.5MB of archives. After this operation, 65.6MB of additional disk space will be used. Do you want to continue [Y/n]? Why does apt want to install all the other packages if the finch dependencies have already been installed? Jiann-Ming Su "Humans dating robots is sick. You people wonder why I'm still single? It's 'cause all the fine robot sisters are dating humans!" --Bender -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#390156: Acknowledgement (amd64 netinst dhcp problem)
I also tried a Debian 3.1r2 i386 netinst CD without success. I know that CD to have worked with DHCP on i386 systems I've previously installed. Perhaps this is a dhclient issue? Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#390156: amd64 netinst dhcp problem
Package: installation-reports Boot method: netinst (amd64) Image version: stable and etch Date: 2006-09-28 Machine: ASUS A8V-MX, Athlon 64 Dual Core Partitions: Base System Installation Checklist: [O] = OK, [E] = Error (please elaborate below), [ ] = didn't try it Initial boot: [O] Detect network card:[O] Configure network: [E] Detect CD: [O] Load installer modules: [O] Detect hard drives: [O] Partition hard drives: [O] Install base system:[O] Clock/timezone setup: [O] User/password setup:[O] Install tasks: [O] Install boot loader:[O] Overall install:[O] Comments/Problems: I cannot get a DHCP address with netinst for amd64. I've tried the onboard card (via-rhine) and a separate PCI card (e100), and neither will get a dhcp address. I've tried ISC DHCP and the DHCP server on my DSL router. On my ISC DHCP, it sees DHCPDISCOVER messages from the system, and it makes a DHCPOFFER, but no corresponding DHCPREQUEST. If I put in a kubuntu 6.06.1 live CD, networking works great. The system gets a DHCP address, and I'm able to use the live CD. With the Kubuntu CD, the system accepts the offer and sends back a DHCPREQUEST. I thought it may have been an issue with the older kernel in the stable netinst not supporting the via-rhine, but I also have the same problem with the etch beta netinst image as well. And, I have the same problem using an e100 card. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#365134: upgraded xdm not starting
Followup-For: Bug #365134 Package: xdm Version: 1:1.0.1-6 *** Please type your report below this line *** After doing an apt-get dist-upgrade, the new xdm package no longer starts. I've had this happen on two systems. It may be related to the fact that some scripts aren't looking for binaries in the right place. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-1-k7 Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1) Versions of packages xdm depends on: ii cpp 4:4.0.2-2 The GNU C preprocessor (cpp) ii debconf [debconf-2.0] 1.4.72 Debian configuration management sy ii libc6 2.3.6-7GNU C Library: Shared libraries ii libice6 6.9.0.dfsg.1-6 Inter-Client Exchange library ii libpam0g 0.79-3.1 Pluggable Authentication Modules l ii libselinux1 1.30-1 SELinux shared libraries ii libsm66.9.0.dfsg.1-6 X Window System Session Management ii libx11-6 6.9.0.dfsg.1-6 X Window System protocol client li ii libxau6 6.9.0.dfsg.1-6 X Authentication library ii libxaw7 6.9.0.dfsg.1-6 X Athena widget set library ii libxdmcp6 6.9.0.dfsg.1-6 X Display Manager Control Protocol ii libxext6 6.9.0.dfsg.1-6 X Window System miscellaneous exte ii libxinerama1 6.9.0.dfsg.1-6 X Window System multi-head display ii libxmu6 6.9.0.dfsg.1-6 X Window System miscellaneous util ii libxpm4 6.9.0.dfsg.1-6 X pixmap library ii libxt66.9.0.dfsg.1-6 X Toolkit Intrinsics ii x11-common6.9.0.dfsg.1-6 X Window System (X.Org) infrastruc ii xbase-clients 6.9.0.dfsg.1-6 miscellaneous X clients xdm recommends no packages. -- debconf information: xdm/stop_running_server_with_children: false xdm/daemon_name: /usr/bin/X11/xdm * shared/default-x-display-manager: xdm Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#325600: Status of this bug?
I just upgraded to libc6.1_2.3.5-12 (unstable), and I'm still having defunct MySQL processes. The last email in the bug report seemed to have been from over two months ago. Will Tom Evans' fix ever make it into the repository? Coincidentally, a friend was telling me how most code that hackers try to inline never actually gets inlined by the compiler. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#329926: openafs-modules-source: Won't build against 2.6.8-2-686
On Sat, 24 Sep 2005, Russ Allbery wrote: Well, first, I highly recommend that you not use that script and instead follow the instructions in README.modules. Since you're using a stock Debian 2.6 kernel, you're going to get the best results from using module-assistant rather than make-kpkg. Also, make sure that you're trying to build OpenAFS with the same compiler that built the kernel, which I believe was gcc 3.4 for 2.6.8-2-686. module-assistant wants to install gcc-4.0... fs1:~# module-assistant prepare openafs-modules Getting source for kernel version: 2.6.8-2-686 Kernel headers available in /usr/src/linux apt-get install build-essential Reading Package Lists... Done Building Dependency Tree... Done The following extra packages will be installed: g++ g++-4.0 gcc libstdc++6-4.0-dev Suggested packages: gcc-4.0-doc autoconf automake1.9 libtool gcc-doc automake libstdc++6-4.0-doc stl-manual The following NEW packages will be installed: build-essential g++ g++-4.0 libstdc++6-4.0-dev The following packages will be upgraded: gcc 1 upgraded, 4 newly installed, 0 to remove and 8 not upgraded. Need to get 6834B/3850kB of archives. After unpacking 14.4MB of additional disk space will be used. Do you want to continue? [Y/n] I'm pretty sure the 2.6.8 kernel from the sarge branch was not built with gcc-4.0. Should I upgrade to the testing 2.6.12 kernel to use the new openafs kernel module? Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#329926: openafs-modules-source: Won't build against 2.6.8-2-686
Package: openafs-modules-source Version: 1.4rc1-1 Severity: important The following script works with 1.3.81: #!/bin/sh # # Stolen from http://www.scl.ameslab.gov/admin/debian-afs/afs-build-script # VERLIST=`uname -r` for VERSION in $VERLIST; do cd /usr/src echo $VERSION rm -r modules/openafs tar zxf openafs.tar.gz cp -pr kernel-headers-$VERSION afsbuild-kernel-headers-$VERSION # cp -pr linux-headers-$VERSION afsbuild-kernel-headers-$VERSION cd afsbuild-kernel-headers-$VERSION make-kpkg modules_image cd /usr/src # dpkg -i openafs-modules-$VERSION done However, when using it to build 1.4rc1-1 against 2.6.8-2-686, I get the following message: fs1:~# ./afs-build-script 2.6.8-2-686 debian/rules:1637: *** Error. I do not know where the kernel image goes to [kimagedest undefined] The usual case for this is that I could not determine which arch or subarch tihs machine belongs to. Please specify a subarch, and try again.. Stop. That seems to be the message from "make-kpkg". I've tried both 8.135 from stable and 9.007 from testing. -- System Information: Debian Release: testing/unstable APT prefers stable APT policy: (900, 'stable'), (700, 'testing') Architecture: i386 Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.8-2-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#329431: acknowledged by developer (Re: Bug#329431: openafs-dbserver: afs-newcell not creating /etc/openafs/server/CellServDB properly)
On Wed, 21 Sep 2005, Debian Bug Tracking System wrote: Version: 1.4rc1-1 Yes, the afs-newcell script has some problems in certain circumstances. I'm not completely sure when the sarge version works and when it doesn't; it works some of the time, but using bos addhost to add the file server host was very unreliable. The script has been completely rewritten and heavily tested in 1.4rc1-1, currently in Debian testing. The README.servers is very good. You may want to mention that the /var/cache/openafs directory needs be a ext[23] filesystem. I think that's the unwritten assumption. I get "Cell setup failed" when it is not. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#329431: openafs-dbserver: afs-newcell not creating /etc/openafs/server/CellServDB properly
Package: openafs-dbserver Version: 1.3.81-3sarge1 Severity: important The problem I'm experiencing is similar to #325929 and is mentioned at https://lists.openafs.org/pipermail/openafs-info/2005-May/017787.html. Basically, the afs-newcell script is not putting the IP address of the server being configured into the /etc/openafs/server/CellServDB file. When I modify that file manually, and comment out line 125 of the afs-newcell script I get much farther along. run( "echo \\>$cell >/etc/openafs/server/CellServDB"); Output when afs-newcell puts bad info in the CellServDB file: Do you meet these requirements? [y/n] y If the fileserver is not running, this may hang for 30 seconds. /etc/init.d/openafs-fileserver stop Stopping AFS Server: bosserver. What administrative principal should be used? js1 echo \>chbe.bogus >/etc/openafs/server/CellServDB /etc/init.d/openafs-fileserver start Starting AFS Server: bosserver. bos addhost fs1.chbe.bogus fs1.chbe.bogus -localauth ||true bos: could not find entry (can't find cell '' in cell database) bos adduser fs1.chbe.bogus js1 -localauth bos: could not find entry (can't find cell '' in cell database) Failed: 256 bos: could not find entry (can't find cell '' in cell database) Output when line 125 is commented out: Do you meet these requirements? [y/n] y If the fileserver is not running, this may hang for 30 seconds. /etc/init.d/openafs-fileserver stop Stopping AFS Server: bosserver. What administrative principal should be used? js1 /etc/init.d/openafs-fileserver start Starting AFS Server: bosserver. bos addhost fs1.chbe.bogus fs1.chbe.bogus -localauth ||true bos adduser fs1.chbe.bogus js1 -localauth pt_util: /var/lib/openafs/db/prdb.DB0: Bad UBIK_MAGIC. Is 0 should be 354545 Ubik Version is: 2.0 Error while creating system:administrators: Entry for id already exists pt_util: Ubik Version number changed during execution. Old Version = 2.0, new version = 33554432.0 bos create fs1.chbe.bogus ptserver simple /usr/lib/openafs/ptserver -localauth bos create fs1.chbe.bogus vlserver simple /usr/lib/openafs/vlserver -localauth bos create fs1.chbe.bogus fs fs -cmd /usr/lib/openafs/fileserver -cmd /usr/lib/openafs/volserver -cmd /usr/lib/openafs/salvager -localauth Waiting for database elections: done. vos create fs1.chbe.bogus a root.afs -localauth Volume 536870912 created on partition /vicepa of fs1.chbe.bogus echo chbe.bogus >/etc/openafs/ThisCell /etc/init.d/openafs-client force-start Starting AFS services: afsd: All AFS daemons started. afsd: Can't mount AFS on /afs(2) afsd. *** The AFS client failed to start. Please fix whatever problem kept it from running. bos shutdown fs1.chbe.bogus -localauth bos delete fs1.chbe.bogus fs -localauth bos delete fs1.chbe.bogus vlserver -localauth bos delete fs1.chbe.bogus ptserver -localauth rm /var/lib/openafs/db/prdb* bos removeuser fs1.chbe.bogus js1 -localauth -- System Information: Debian Release: sarge APT prefers sarge Architecture: i386 Kernel: Linux 2.6.8-2-686 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages openafs-dbserver depends on: ii debconf 1.4.30.13 Debian configuration management system ii libc6 2.3.2.ds1-22GNU C Library: Shared libraries and Timezone data ii openafs-client1.3.81-3sarge1 The AFS distributed filesystem- client support ii openafs-dbserver 1.3.81-3sarge1 The AFS distributed filesystem- database server ii perl 5.8.4-8 Larry Wall's Practical Extraction and Report Language -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#329112: xpdf resize problem
Package: xpdf Version 3.01-1 1. Open a pdf document (default zoom will be 125%) 2. Widen the xpdf window by dragging the right bottom corner. 3. Change the zoom to 150%. 4. Notice the right side of the xpdf window. Either pdf document doesn't fill to the width of the xpdf window or when you try to scroll, the right side of the page is "locked". Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#318680: grep doesn't support -P
Package: grep Version: 2.5.1.ds1-4 Why doesn't the debian package of grep 2.5.1 support the perl regular expression option? # grep -P chb?e mailq.out grep: The -P option is not supported Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#316651: gallery permission bug
Package: gallery Version: 1.5-1 The "Apply permissions to all sub-albums" checkbox in "Album Permissions" does not work. The permissions of the subalbums are not set the same as the main album. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#310798: Acknowledgement (grub and software raid)
Take a look at http://lists.gnu.org/archive/html/bug-grub/2002-03/msg00047.html. I think the partition that grub config files are installed on (/boot) has to be ext[23]. Otherwise you get a Error 17 something about unknown filesystem, IIRC. So, I have /boot on /dev/md0 mirrored across /dev/hda1 and /dev/hdc1. I ran grub and configure hdc: device (hd0) /dev/hdc root (hd0,0) install /grub/stage1 (hd0,0) /grub/stage2 0x8000 (hd0,0)/grub/menu.lst install /grub/stage1 d (hd0) /grub/stage2 0x8000 (hd0,0)/grub/menu.lst Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#310798: grub and software raid
Package: grub Version: 0.95 Tags: d-i On a software raid 1 configuration, grub does not write MBR to the second drive. Thus, if the first drive fails, the second drive is not able to boot the system. One possible solution is listed here: http://lists.gnu.org/archive/html/bug-grub/2002-03/msg00047.html Another is to use lilo for raid 1 configs. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#303499: Acknowledgement (subversion won't start with xinetd)
Nevermind, the service name has to be "subversion". In the previous version of subversion or xinetd, this was not the case. I was able to get away with "svnserve" as the service name. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#303499: subversion won't start with xinetd
Package: subversion Version: 1.1.3-3 The latest subversion will not start using xinetd. I get the following message in /var/log/daemon.log: Apr 6 22:47:24 k2 xinetd[26132]: Port not specified and can't find service: svnserve with getservbyname The previous version was working without issues. This very well could be a xinetd problem, I'm not sure. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#303425: vim cut and paste line wrap problems
Package: vim Version: 6.3-058 When using the default /etc/vim/vimrc, cutting and pasting into an xterm running vim looks like this: # XF86Config-4 (XFree86 X Window System server configuration file) # # This file was generated by dexconf, the Debian X Configuration tool, # using # values from the debconf database. But, after stealing the vimrc file from a Fedora system, cut and paste now works properly: # XF86Config-4 (XFree86 X Window System server configuration file) # # This file was generated by dexconf, the Debian X Configuration tool, # using # values from the debconf database. I'm not sure what the difference is, but I've included the vimrc that works for me. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin " Configuration file for vim set runtimepath=~/.vim,/etc/vim,/usr/share/vim/vimfiles,/usr/share/vim/addons,/usr/share/vim/vim63,/usr/share/vim/vimfiles,/usr/share/vim/addons/after,~/.vim/after " Normally we use vim-extensions. If you want true vi-compatibility " remove change the following statements set nocompatible" Use Vim defaults instead of 100% vi compatibility set backspace=indent,eol,start " more powerful backspacing " Now we set some defaults for the editor set autoindent " always set autoindenting on " set linebreak " Don't wrap words by default set textwidth=0 " Don't wrap lines by default set nobackup" Don't keep a backup file set viminfo='20,\"50" read/write a .viminfo file, don't store more than " 50 lines of registers set history=50 " keep 50 lines of command line history set ruler " show the cursor position all the time " Suffixes that get lower priority when doing tab completion for filenames. " These are files we are not likely to want to edit or read. set suffixes=.bak,~,.swp,.o,.info,.aux,.log,.dvi,.bbl,.blg,.brf,.cb,.ind,.idx,.ilg,.inx,.out,.toc " We know xterm-debian is a color terminal if &term =~ "xterm-debian" || &term =~ "xterm-xfree86" set t_Co=16 set t_Sf=[3%dm set t_Sb=[4%dm endif " Make p in Visual mode replace the selected text with the "" register. vnoremap p :let current_reg = @"gvdi=current_reg " Vim5 and later versions support syntax highlighting. Uncommenting the next " line enables syntax highlighting by default. " syntax on " If using a dark background within the editing area and syntax highlighting " turn on this option as well " set background=dark if has("autocmd") " Enabled file type detection " Use the default filetype settings. If you also want to load indent files " to automatically do language-dependent indenting add 'indent' as well. filetype plugin on endif " has ("autocmd") " Some Debian-specific things augroup filetype au BufRead reportbug.*set ft=mail au BufRead reportbug-*set ft=mail augroup END " Set paper size from /etc/papersize if available (Debian-specific) try if filereadable('/etc/papersize') let s:papersize = matchstr(system('/bin/cat /etc/papersize'), '\p*') if strlen(s:papersize) let &printoptions = "paper:" . s:papersize endif unlet! s:papersize endif catch /E145/ endtry " The following are commented out as they cause vim to behave a lot " different from regular vi. They are highly recommended though. "set showcmd" Show (partial) command in status line. "set showmatch " Show matching brackets. "set ignorecase " Do case insensitive matching "set incsearch " Incremental search "set autowrite " Automatically save before commands like :next and :make " Source a global configuration file if available if filereadable("/etc/vim/vimrc.local") source /etc/vim/vimrc.local endif
Bug#302630: useradd not creating home directories
Package: passwd Version: 4.0.3-31sarge1 useradd does not create home directories or groups. I have found this to be the case on i386, alpha, and mips. o2:~# useradd -c "Some User" suser o2:~# ls -al /home/ total 8 drwxrwsr-x 2 root staff 4096 2004-12-15 18:27 . drwxr-xr-x 21 root root 4096 2005-03-31 20:55 .. o2:~# cat /etc/group | grep suser o2:~# o2:~# cat /etc/passwd | grep suser suser:!:1000:100:Some User:/home/suser: Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#300264: forkbomb takes down system
Package: kernel-image Version: 2.6.* http://www.securityfocus.com/columnists/308 http://catb.org/~esr/jargon/html/F/fork-bomb.html A simple shell script containing the line "$0 & $0 &" run by an unprivileged user can lock up the system hardcore. Not good. Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#299829: ejabberd crashing when joining a cluster
Package: ejabberd Version: 0.7.5-7 http://www.jabber.ru/bugzilla/show_bug.cgi?id=41 Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#299799: ntp cannot find user ntp
Package: ntp-server Version: 4.2.0a+stable-2 Using kernel 2.6.9-3 on i386, I get the following error in syslog and daemon.log when I run "/etc/init.d/ntp-server start": ntpd[11736]: Cannot find user `ntp' However, on my Debian Alpha using 2.6.8-2-generic kernel, the ntp-server works fine. The Ubuntu users seem to be experiencing the same problem. http://ubuntuforums.org/archive/index.php/t-11464.html Jiann-Ming Su "Yeah, Lois, that'll be about as much fun as a lecture on ontological empiricism." --Peter Griffin -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]