nfs-utils_2.6.4-1_sourceonly.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 22 Nov 2023 07:15:57 +0100 Source: nfs-utils Architecture: source Version: 1:2.6.4-1 Distribution: unstable Urgency: medium Maintainer: Debian kernel team Changed-By: Salvatore Bonaccorso Changes: nfs-utils (1:2.6.4-1) unstable; urgency=medium . * Upload to unstable Checksums-Sha1: 803b55f3266e6ae48aa3a1ff20da3b351fbe7b6f 2554 nfs-utils_2.6.4-1.dsc 18effd264a9adb7aa5ec5f88207b6d8dac111de4 47072 nfs-utils_2.6.4-1.debian.tar.xz Checksums-Sha256: 1b0cd9ac7e3d2f81fbe01a5111cf08a31d35942d811c728f46ce670f02140721 2554 nfs-utils_2.6.4-1.dsc 4403f52a80a99bd13ae994a25a2c372a03b3ddc3701d229d922be073409be176 47072 nfs-utils_2.6.4-1.debian.tar.xz Files: e44b0678b476488eba0ccc4055f94d0a 2554 net optional nfs-utils_2.6.4-1.dsc e79f2758f1f512d5afcb13cb4f13af9c 47072 net optional nfs-utils_2.6.4-1.debian.tar.xz -BEGIN PGP SIGNATURE- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmVdnWlfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89E0CgP/RxuKd6Ol2fsXV6//AVpH0enVFAtbXKv yayfckHc55MMdnvIKb2T37HM2Y9EyGqvh4NKzN1A1+wWntFs0GBC6poP7gZK7A9e Sj3cANggs1c/UsXExB2xHNs4bKQ1mIbBPU1upTnqgZhKnqbQjUJoFcz4SlOJRXrx wfQOR7WKePgsf9/pTgMR/9jaWpgODMtaNHmygj1kfw5KqgUISHEJpOmX17EvI8bp o7qVSXRWaYZwhKjSm3Hm08oMh6JCkVYQ64u4aMlrBwpDZJEKva6Z5VBsqBOGrfj/ XzbGb5dOkdXasC+khOKD1lBUD275jIs01OV+401Rt9xWza7pYD6ev/Fd1ru7vv4i +X3dvsqOihN3GZvw/CWVIyWtrceJyT89V8cseFVbyGE4uHLapDnssKqMV8bd5YvH hCjzxLghnX+giS8R5IsZBJFYFs+q0suBQq2whjTxTsMiQep/yLyRoAKDsGpCrFdB cMfCfxle0JEmWiim9Kfn2crjpnA2++O6tuC37qJZSnYYH4P8ku+C5wjiLgM2ABpU WLuURIJ/fi6whTw72pl7MJ5tgXh87hjIY9ln7ssmVm5kPIMPmhDlJqnGo/HW0O1n Ae5NtpbnOya3J1SjbUidbErxXhpxmWD0136ulFYNFGgHp2kq2VQIdzFNTD2uwcab Hlsa753/2pmg =EAF1 -END PGP SIGNATURE-
Processing of nfs-utils_2.6.4-1_sourceonly.changes
nfs-utils_2.6.4-1_sourceonly.changes uploaded successfully to localhost along with the files: nfs-utils_2.6.4-1.dsc nfs-utils_2.6.4-1.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1056356: apt-get update kernel BUG at mm/usercopy.c:101!
Thanks for following up. I think you are right, these two old MacMinis gets into a weird state where apt is affected by the kernel usercopy problem, i.e. apt is not causing the problem itself. Both behave the same with bookworm 6.1 kernel. No problems on the bullseye 5.10 kernel. Please close this case since it is not an apt issue. $ /usr/lib/apt/methods/http < /tmp/testrequest 100 Capabilities Send-URI-Encoded: true Send-Config: true Pipeline: true Version: 1.2 102 Status Message: Connecting to ftp-nyc.osuosl.org URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease 102 Status Message: Connecting to ftp-nyc.osuosl.org (64.50.233.100) URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease 102 Status Message: Connected to ftp-nyc.osuosl.org (64.50.233.100) URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease GET /debian/dists/bookworm/InRelease HTTP/1.1 Host: ftp.us.debian.org Accept: text/* User-Agent: Debian APT-HTTP/1.3 (2.6.1) 102 Status Message: Waiting for headers URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease Answer for: http://ftp.us.debian.org/debian/dists/bookworm/InRelease HTTP/1.1 200 OK Date: Tue, 21 Nov 2023 21:54:35 GMT Server: Apache Last-Modified: Sat, 07 Oct 2023 09:49:42 GMT ETag: "24dfd-6071d46c1efad" Accept-Ranges: bytes Content-Length: 151037 200 URI Start Last-Modified: Sat, 07 Oct 2023 09:49:42 + Size: 151037 URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease 201 URI Done Checksum-FileSize-Hash: 151037 SHA512-Hash: 10437f8f2ab4e1c45494d46096c753110b9b4b19a706087537ff77c951ccc30185a4e829456c926cae1d1a89052127f97aab5d4c828ef1f120fea8a5fb39badc SHA256-Hash: f433d996ac53bab13e33631c6c250b8a7216692c56a2da61194bdd944bf7 SHA1-Hash: 1ff2370064bd97104a10a73578f6c75c6bebfc13 MD5Sum-Hash: bc85d0cdcc061129196e9caac8311995 MD5-Hash: bc85d0cdcc061129196e9caac8311995 Last-Modified: Sat, 07 Oct 2023 09:49:42 + Size: 151037 Filename: /dev/null URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease On Tue, Nov 21, 2023 at 3:54 PM David Kalnischkies wrote: > > Control: reassign -1 src:linux 6.1.38-4 > Control: forcemerge 1051643 -1 > Control: affects -1 apt > > Hi, > > On Tue, Nov 21, 2023 at 11:04:18AM -0500, js1 wrote: > > Running apt-get update causes kernel BUG as reported in 1051643. apt-get > > update hangs: > > If that is as you describe, that the bug is in the kernel, we as apt > maintainers can do nothing about it. > > We have also no other reports to that effect here or as far as I can see > in Launchpad (= Ubuntu) against apt, so this might be highly dependent > on your/specific hardware. > > So, keeping the bug open here seems to serve no purpose in my eyes and > hence I am merging it with the existing one – but I tag it as affecting > apt, so that it appears in its bug list should other users encounter > this with apt (which I suppose was your intend). > > > Beside you running apt I don't see any apt code in the trace, but from > the apt output produced I suppose its triggering somewhere in the > download step, so the following might help to simplify the reproducer > a bit – if you can reproduce it that way of course as a lot of > complexity is stripped away which might trigger it… > > $ cat > /tmp/testrequest < 601 Configuration > Config-Item: Debug::Acquire::http=1 > Config-Item: Debug::Acquire::https=1 > Config-Item: Acquire::http::DependOnSTDIN=0 > Config-Item: Acquire::https::DependOnSTDIN=0 > > 600 URI Acquire > URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease > Filename: /dev/null > > EOF > $ /usr/lib/apt/methods/http < /tmp/testrequest > > (yes, you can and are encouraged to run this as non-root user. > While creating the testrequest file make sure copy everything between > the two EOF. Especially the ending empty line. A successful run ends > with a block starting with "201 URI Done". Your apt output suggests > it triggers somewhere between "102 Status" and "200 URI Start".) > > Before giving up on this try using a real Filename and/or different URI > in the testrequest (if you want to use a https URI, make sure to call > the https method!). > > > Hope that helps & good luck finding the cause & solution. > > Best regards > > David Kalnischkies -- Jiann-Ming Su
Processed: Re: Bug#1056356: apt-get update kernel BUG at mm/usercopy.c:101!
Processing control commands: > reassign -1 src:linux 6.1.38-4 Bug #1056356 [apt] apt-get update kernel BUG at mm/usercopy.c:101! Bug reassigned from package 'apt' to 'src:linux'. No longer marked as found in versions apt/2.6.1. Ignoring request to alter fixed versions of bug #1056356 to the same values previously set Bug #1056356 [src:linux] apt-get update kernel BUG at mm/usercopy.c:101! Marked as found in versions linux/6.1.38-4. > forcemerge 1051643 -1 Bug #1051643 [src:linux] linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101! Bug #1056356 [src:linux] apt-get update kernel BUG at mm/usercopy.c:101! Added tag(s) moreinfo. Merged 1051643 1056356 > affects -1 apt Bug #1056356 [src:linux] apt-get update kernel BUG at mm/usercopy.c:101! Bug #1051643 [src:linux] linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101! Added indication that 1056356 affects apt Added indication that 1051643 affects apt -- 1051643: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643 1056356: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056356 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: tagging 1051132
Processing commands for cont...@bugs.debian.org: > tags 1051132 + upstream Bug #1051132 [nfs-kernel-server] /usr/sbin/fsidd: bound to @/run/fsid.sock@ Added tag(s) upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 1051132: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051132 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1053503: Enable support for Renesas RZ/V2L, RZ/G2UL, and RZ/V2M
On Tuesday, 21 November 2023 17:58:55 CET John Vincent wrote: > Do you have any update on the Bug#1053503 please (Enable additional Renesas > platform like RZ/V2L). Is this change already got merged and available in > the daily Debian builds for testing? https://salsa.debian.org/kernel-team/linux/-/merge_requests/867 is the MR for it and it is merged and will be part of the next 6.6 kernel upload. It is not known when that will happen though. signature.asc Description: This is a digitally signed message part.
Bug#1053503: Enable support for Renesas RZ/V2L, RZ/G2UL, and RZ/V2M
Hi Emanuele The grub 2.12 image loading is working ok with u-boot v2023.10. Thanks for your help earlier. Do you have any update on the Bug#1053503 please (Enable additional Renesas platform like RZ/V2L). Is this change already got merged and available in the daily Debian builds for testing? Best Regards John -Original Message- From: Emanuele Rocca On Behalf Of Emanuele Rocca Sent: Sunday, November 5, 2023 10:16 AM To: Salvatore Bonaccorso Cc: John Vincent ; 1053...@bugs.debian.org Subject: Re: Bug#1053503: Enable support for Renesas RZ/V2L, RZ/G2UL, and RZ/V2M Hi Salvatore, On 2023-11-04 09:57, Salvatore Bonaccorso wrote: > I'm not sure this is really that urgent, 6.5.10 will be EOL upstream > at some point and in master branch Bastian et all are prearing the 6.6 > based once. After an extra round in experimental I would expect it > will now not take too much longer to have a version including this > change as well in unstable. Ah yeah that sounds good. Thanks! Emanuele Renesas Electronics Europe GmbH Registered Office: Arcadiastrasse 10 DE-40472 Duesseldorf Commercial Registry: Duesseldorf, HRB 3708 Managing Director: Carsten Jauch VAT-No.: DE 14978647 Tax-ID-No: 105/5839/1793 Legal Disclaimer: This e-mail communication (and any attachment/s) is confidential and contains proprietary information, some or all of which may be legally privileged. It is intended solely for the use of the individual or entity to which it is addressed. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful.
Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
Looks like it's unrelated to openvpn; running openvpn 2.6.3-1+deb12u2 and the mm/usercopy still happens. I just reported 1056356 for apt since this happens pretty reliably during apt-get update. On Tue, Nov 21, 2023 at 9:53 AM Jiann-Ming Su wrote: > > Could this issue be related to CVE-2023-46850 mentioned in bug > 1055805? OpenVPN is running on this particular box that suffers from > this problem. > > On Mon, Nov 6, 2023 at 11:36 PM Jiann-Ming Su wrote: > > > > and 6.1.0-13-686-pae: > > > > [348871.341900] usercopy: Kernel memory exposure attempt detected from > > kmap (offset 1270, size 15114)! > > [348871.342021] [ cut here ] > > [348871.342024] kernel BUG at mm/usercopy.c:101! > > [348871.342068] invalid opcode: [#1] PREEMPT SMP PTI > > [348871.342118] CPU: 0 PID: 12867 Comm: http Not tainted > > 6.1.0-13-686-pae #1 Debian 6.1.55-1 > > [348871.342186] Hardware name: Apple Computer, Inc. > > Macmini1,1/Mac-F4208EC8, BIOS MM11.88Z.0055.B0 > > 8.0610121326 10/12/06 > > [348871.342259] EIP: usercopy_abort+0x65/0x67 > > [348871.342302] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f > > 45 cb ff 75 0c ff 75 08 57 52 56 > > 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0 > > b3 c6 ff 75 ec 8b 4d f0 e8 86 > > ff ff ff 56 > > [348871.342423] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001 > > [348871.342472] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4 > > [348871.342520] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: > > 00010286 > > [348871.342573] CR0: 80050033 CR2: b776ce90 CR3: 34fe8000 CR4: 06f0 > > [348871.342621] Call Trace: > > [348871.342649] ? __die_body.cold+0x14/0x1a > > [348871.342687] ? __die+0x21/0x26 > > [348871.342717] ? die+0x28/0x50 > > [348871.342749] ? do_trap+0xbb/0xe0 > > [348871.342780] ? do_error_trap+0x4c/0x60 > > [348871.342814] ? usercopy_abort+0x65/0x67 > > [348871.342851] ? exc_overflow+0x40/0x40 > > [348871.342892] ? exc_invalid_op+0x44/0x60 > > [348871.342929] ? usercopy_abort+0x65/0x67 > > [348871.342966] ? handle_exception+0x133/0x133 > > [348871.343009] ? exc_overflow+0x40/0x40 > > [348871.343046] ? usercopy_abort+0x65/0x67 > > [348871.343082] ? exc_overflow+0x40/0x40 > > [348871.343117] ? usercopy_abort+0x65/0x67 > > [348871.343156] __check_object_size.cold+0xae/0xae > > [348871.343199] simple_copy_to_iter+0x1c/0x40 > > [348871.343237] __skb_datagram_iter+0x163/0x320 > > [348871.343276] skb_copy_datagram_iter+0x2d/0x80 > > [348871.343316] ? skb_free_datagram+0x20/0x20 > > [348871.343353] tcp_recvmsg_locked+0x30e/0x890 > > [348871.343400] tcp_recvmsg+0x6f/0x1e0 > > [348871.343437] ? tcp_recv_timestamp+0x240/0x240 > > [348871.343476] inet_recvmsg+0x54/0x130 > > [348871.343509] ? security_socket_recvmsg+0x41/0x60 > > [348871.343553] sock_recvmsg+0x73/0x90 > > [348871.343589] ? ipip_gso_segment+0x30/0x30 > > [348871.343625] sock_read_iter+0x84/0xe0 > > [348871.343664] vfs_read+0x288/0x2c0 > > [348871.343702] ksys_read+0xab/0xe0 > > [348871.343734] __ia32_sys_read+0x15/0x20 > > [348871.343768] __do_fast_syscall_32+0x68/0xb0 > > [348871.343807] ? fpregs_assert_state_consistent+0x25/0x50 > > [348871.345275] ? exit_to_user_mode_prepare+0x41/0x1a0 > > [348871.346746] ? syscall_exit_to_user_mode+0x29/0x40 > > [348871.348214] ? __do_fast_syscall_32+0x72/0xb0 > > [348871.349630] ? vfs_write+0x105/0x3c0 > > [348871.350996] ? debug_smp_processor_id+0x12/0x20 > > [348871.352388] ? fpregs_assert_state_consistent+0x25/0x50 > > [348871.353744] ? exit_to_user_mode_prepare+0x41/0x1a0 > > [348871.355064] ? syscall_exit_to_user_mode+0x29/0x40 > > [348871.356350] ? __ia32_sys_write+0x15/0x20 > > [348871.357571] ? __do_fast_syscall_32+0x72/0xb0 > > [348871.358715] ? fpregs_assert_state_consistent+0x25/0x50 > > [348871.359832] ? exit_to_user_mode_prepare+0x41/0x1a0 > > [348871.360933] ? irqentry_exit_to_user_mode+0x16/0x20 > > [348871.362024] do_fast_syscall_32+0x29/0x60 > > [348871.363100] do_SYSENTER_32+0x15/0x20 > > [348871.364153] entry_SYSENTER_32+0x98/0xf1 > > [348871.365213] EIP: 0xb7f25559 > > [348871.366273] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 > > 10 07 03 74 b0 01 10 08 03 74 d8 > > 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 > > 8d 76 00 58 b8 77 00 00 00 cd > > 80 90 8d 76 > > [348871.368699] EAX: ffda EBX: 0003 ECX: 01a19d4f EDX: f9f1 > > [348871.369982] ESI: b721cff4 EDI: EBP: 01a184e0 ESP: bf9f19c0 > > [348871.371287] DS: 007b ES: 007b FS: GS: 0033 SS: 007b EFLAGS: > > 0246 > > [348871.372627] Modules linked in: tls tun xt_tcpudp xt_conntrack > > snd_hda_codec_idt snd_hda_codec_gene > > ric nf_conntrack ledtrig_audio nf_defrag_ipv6 snd_hda_intel > > nf_defrag_ipv4 i915 snd_intel_dspcfg nft_c > > ompat drm_buddy nf_tables snd_intel_sdw_acpi drm_display_helper > > snd_hda_codec iTCO_wdt cec hid_appleir > > intel_pmc_bxt rc_core iTCO_vendor_support coretemp ttm
nfs-utils_2.6.4-1~exp1_sourceonly.changes ACCEPTED into experimental
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 21 Nov 2023 16:02:51 +0100 Source: nfs-utils Architecture: source Version: 1:2.6.4-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian kernel team Changed-By: Salvatore Bonaccorso Changes: nfs-utils (1:2.6.4-1~exp1) experimental; urgency=medium . * New upstream version 2.6.4 Checksums-Sha1: 5c0555ef6d79922a6f0216402875944400c1cbf6 2574 nfs-utils_2.6.4-1~exp1.dsc 9ba9e55e51890fe974b870b9af637cb29c553a5e 728280 nfs-utils_2.6.4.orig.tar.xz 5e3ee1a1202cfbdf7c952d9fba394c48b99e20e5 47080 nfs-utils_2.6.4-1~exp1.debian.tar.xz Checksums-Sha256: 2bcb9edd0a7cf8039132ae5181a9fad3032e5e003a654549c1663e2f916d20e6 2574 nfs-utils_2.6.4-1~exp1.dsc 01b3b0fb9c7d0bbabf5114c736542030748c788ec2fd9734744201e9b0a1119d 728280 nfs-utils_2.6.4.orig.tar.xz f4f51d5a239ed41c2ebfb8a0baad2f0816d072527c8d215d9df3c7325e2cfd16 47080 nfs-utils_2.6.4-1~exp1.debian.tar.xz Files: 6f06dc068342c0455d317262774ac7ee 2574 net optional nfs-utils_2.6.4-1~exp1.dsc 907f95977ccf7a522ee32af1534f0e4c 728280 net optional nfs-utils_2.6.4.orig.tar.xz 11298cf7cea3ddfd599c86f285f76a78 47080 net optional nfs-utils_2.6.4-1~exp1.debian.tar.xz -BEGIN PGP SIGNATURE- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmVcx49fFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89ELokQAIr1Dr0+r8l4SYNiRKJdaYaQ8n5NPapT lvjx/KYqnpGUp1tQ42U2XowuO1VQp1F/RdWx3lnuB2dytKqF1zLADhZ2GESGol74 C+ZbGRQPB1HHpcVwvqM2m2W4uKwWvf1olw7BZvrslm8PtzLo9vB9rHJYr1Tawe40 Lf11go5zdKtVCFVlikoWkQvHvBjAC30FHHlzJvkwpMTEmOz26GERY+M6MpZmwGR4 hyYIUINv4dfA1rRrixtqWs/CLAgfZv4k8jobWl8Yttu76NFgaGMeaHjcmEZcZrD6 XOjp4HVEAuGuizvFz9eNh7Hq3QXmMbJrOExy3w7udCdyx3uoc9j9h9hfiNnzLlPi 31W+ea2mu2e7lq1t3T0PF84ytd3nVCqlrxploUF/V2fztm0yw0oZPMg/KUGYkOBK u4Z86ZDkkor/mMR3QDepAvV0Ed0SZee/sHwAEqj5o+mmYfhy0nLY1snAk/H1cPm5 pjz4bJI9kDT8G20a1UUL2gKJC3GPQwkavJh4oN23WmUm/OeYG4ySx6yq858Pvbsi 1pWzqxkAbqFw3Wsm4G1uXKBB4VDpYXJGB6YPIDupxZbj20ry3w4KEfBxw/xXzu/H yWCFoIu60vuh5jPjc0Ecv+QHWk2POXGMmc30fdG9/OgcRox4TkLNO3zKA3gsr/97 SmVul41j7Ynb =+I5A -END PGP SIGNATURE-
Processing of nfs-utils_2.6.4-1~exp1_sourceonly.changes
nfs-utils_2.6.4-1~exp1_sourceonly.changes uploaded successfully to localhost along with the files: nfs-utils_2.6.4-1~exp1.dsc nfs-utils_2.6.4.orig.tar.xz nfs-utils_2.6.4-1~exp1.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))
Could this issue be related to CVE-2023-46850 mentioned in bug 1055805? OpenVPN is running on this particular box that suffers from this problem. On Mon, Nov 6, 2023 at 11:36 PM Jiann-Ming Su wrote: > > and 6.1.0-13-686-pae: > > [348871.341900] usercopy: Kernel memory exposure attempt detected from > kmap (offset 1270, size 15114)! > [348871.342021] [ cut here ] > [348871.342024] kernel BUG at mm/usercopy.c:101! > [348871.342068] invalid opcode: [#1] PREEMPT SMP PTI > [348871.342118] CPU: 0 PID: 12867 Comm: http Not tainted > 6.1.0-13-686-pae #1 Debian 6.1.55-1 > [348871.342186] Hardware name: Apple Computer, Inc. > Macmini1,1/Mac-F4208EC8, BIOS MM11.88Z.0055.B0 > 8.0610121326 10/12/06 > [348871.342259] EIP: usercopy_abort+0x65/0x67 > [348871.342302] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f > 45 cb ff 75 0c ff 75 08 57 52 56 > 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0 > b3 c6 ff 75 ec 8b 4d f0 e8 86 > ff ff ff 56 > [348871.342423] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001 > [348871.342472] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4 > [348871.342520] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010286 > [348871.342573] CR0: 80050033 CR2: b776ce90 CR3: 34fe8000 CR4: 06f0 > [348871.342621] Call Trace: > [348871.342649] ? __die_body.cold+0x14/0x1a > [348871.342687] ? __die+0x21/0x26 > [348871.342717] ? die+0x28/0x50 > [348871.342749] ? do_trap+0xbb/0xe0 > [348871.342780] ? do_error_trap+0x4c/0x60 > [348871.342814] ? usercopy_abort+0x65/0x67 > [348871.342851] ? exc_overflow+0x40/0x40 > [348871.342892] ? exc_invalid_op+0x44/0x60 > [348871.342929] ? usercopy_abort+0x65/0x67 > [348871.342966] ? handle_exception+0x133/0x133 > [348871.343009] ? exc_overflow+0x40/0x40 > [348871.343046] ? usercopy_abort+0x65/0x67 > [348871.343082] ? exc_overflow+0x40/0x40 > [348871.343117] ? usercopy_abort+0x65/0x67 > [348871.343156] __check_object_size.cold+0xae/0xae > [348871.343199] simple_copy_to_iter+0x1c/0x40 > [348871.343237] __skb_datagram_iter+0x163/0x320 > [348871.343276] skb_copy_datagram_iter+0x2d/0x80 > [348871.343316] ? skb_free_datagram+0x20/0x20 > [348871.343353] tcp_recvmsg_locked+0x30e/0x890 > [348871.343400] tcp_recvmsg+0x6f/0x1e0 > [348871.343437] ? tcp_recv_timestamp+0x240/0x240 > [348871.343476] inet_recvmsg+0x54/0x130 > [348871.343509] ? security_socket_recvmsg+0x41/0x60 > [348871.343553] sock_recvmsg+0x73/0x90 > [348871.343589] ? ipip_gso_segment+0x30/0x30 > [348871.343625] sock_read_iter+0x84/0xe0 > [348871.343664] vfs_read+0x288/0x2c0 > [348871.343702] ksys_read+0xab/0xe0 > [348871.343734] __ia32_sys_read+0x15/0x20 > [348871.343768] __do_fast_syscall_32+0x68/0xb0 > [348871.343807] ? fpregs_assert_state_consistent+0x25/0x50 > [348871.345275] ? exit_to_user_mode_prepare+0x41/0x1a0 > [348871.346746] ? syscall_exit_to_user_mode+0x29/0x40 > [348871.348214] ? __do_fast_syscall_32+0x72/0xb0 > [348871.349630] ? vfs_write+0x105/0x3c0 > [348871.350996] ? debug_smp_processor_id+0x12/0x20 > [348871.352388] ? fpregs_assert_state_consistent+0x25/0x50 > [348871.353744] ? exit_to_user_mode_prepare+0x41/0x1a0 > [348871.355064] ? syscall_exit_to_user_mode+0x29/0x40 > [348871.356350] ? __ia32_sys_write+0x15/0x20 > [348871.357571] ? __do_fast_syscall_32+0x72/0xb0 > [348871.358715] ? fpregs_assert_state_consistent+0x25/0x50 > [348871.359832] ? exit_to_user_mode_prepare+0x41/0x1a0 > [348871.360933] ? irqentry_exit_to_user_mode+0x16/0x20 > [348871.362024] do_fast_syscall_32+0x29/0x60 > [348871.363100] do_SYSENTER_32+0x15/0x20 > [348871.364153] entry_SYSENTER_32+0x98/0xf1 > [348871.365213] EIP: 0xb7f25559 > [348871.366273] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 > 10 07 03 74 b0 01 10 08 03 74 d8 > 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 > 8d 76 00 58 b8 77 00 00 00 cd > 80 90 8d 76 > [348871.368699] EAX: ffda EBX: 0003 ECX: 01a19d4f EDX: f9f1 > [348871.369982] ESI: b721cff4 EDI: EBP: 01a184e0 ESP: bf9f19c0 > [348871.371287] DS: 007b ES: 007b FS: GS: 0033 SS: 007b EFLAGS: 0246 > [348871.372627] Modules linked in: tls tun xt_tcpudp xt_conntrack > snd_hda_codec_idt snd_hda_codec_gene > ric nf_conntrack ledtrig_audio nf_defrag_ipv6 snd_hda_intel > nf_defrag_ipv4 i915 snd_intel_dspcfg nft_c > ompat drm_buddy nf_tables snd_intel_sdw_acpi drm_display_helper > snd_hda_codec iTCO_wdt cec hid_appleir > intel_pmc_bxt rc_core iTCO_vendor_support coretemp ttm snd_hda_core > kvm_intel snd_hwdep drm_kms_helpe > r watchdog apple_mfi_fastcharge snd_pcm ath5k kvm i2c_algo_bit ath > mac80211 snd_timer snd nfnetlink li > barc4 applesmc soundcore cfg80211 irqbypass rfkill at24 tpm_infineon > pcspkr button acpi_cpufreq sg evd > ev binfmt_misc firewire_sbp2 dm_mod drm efi_pstore dax loop fuse > configfs ip_tables x_tables autofs4 x > fs libcrc32c crc32c_generic hid_generic usbhid hid sd_mod t10_pi > crc64_rocksoft
Re: Bug#1056056: Acknowledgement (linux-image-6.1.0-13-amd64: After a 'warm' reboot the disk is missing (not detected by the bios) on a HP t640)
I tried the following: * latest kernel from debian-testing (6.5.10+1) * adding "reboot=(efi|cold|bios)" to the kernel command line Can I try anything else? Are there any relevant module-parameters to try?
Processed: closing 1055676
Processing commands for cont...@bugs.debian.org: > close 1055676 Bug #1055676 [nfs-common] exports(5) man page does not document refer= Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1055676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055676 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: severity of 1055676 is wishlist, tagging 1055676
Processing commands for cont...@bugs.debian.org: > severity 1055676 wishlist Bug #1055676 [nfs-common] exports(5) man page does not document refer= Severity set to 'wishlist' from 'important' > tags 1055676 + upstream Bug #1055676 [nfs-common] exports(5) man page does not document refer= Added tag(s) upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 1055676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055676 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: closing 1036644
Processing commands for cont...@bugs.debian.org: > # according to reporter fixed after updating to 6.4.y kernel > close 1036644 6.4.13-1 Bug #1036644 [src:linux] Kernel panic - not syncing: Timeout: Not all CPUs entered broadcast exception handler Marked as fixed in versions linux/6.4.13-1. Bug #1036644 [src:linux] Kernel panic - not syncing: Timeout: Not all CPUs entered broadcast exception handler Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1036644: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036644 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: closing 1033637
Processing commands for cont...@bugs.debian.org: > close 1033637 6.5.3-1 Bug #1033637 [src:linux] linux-image-amd64: amdgpu - External displays connected through Thinkpad Ultra Dock not turn on after suspend Marked as fixed in versions linux/6.5.3-1. Bug #1033637 [src:linux] linux-image-amd64: amdgpu - External displays connected through Thinkpad Ultra Dock not turn on after suspend Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1033637: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033637 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems