Bug#1056399: libcryptx-perl: invalid opcode in CryptX.so
Benedikt Spranger
b.spranger at linutronix.de
Wed Nov 22 09:48:44 GMT 2023
Package: libcryptx-perl
Version: 0.080-1
Severity: important
X-Debbugs-Cc: b.spranger at linutronix.de
Dear maintainer,
spamd fail due to an invalid opcode in CryptX.so on an AMD Athlon(tm) II X2
255 machine:
2023-11-21T13:16:47.795562+00:00 tanja kernel: [1127566.199310] traps: spamd child[12938] trap invalid opcode ip:7fd302f0e3a4 sp:7fffbb5af1f8 error:0 in CryptX.so[7fd302ebb000+9b000]
Regards
Benedikt Spranger
-- System Information:
Debian Release: trixie/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.5.0-4-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled
# lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Address sizes: 48 bits physical, 48 bits virtual
Byte Order: Little Endian
CPU(s): 2
On-line CPU(s) list: 0,1
Vendor ID: AuthenticAMD
BIOS Vendor ID: AMD
Model name: AMD Athlon(tm) II X2 255 Processor
BIOS Model name: AMD Athlon(tm) II X2 255 Processor CPU @ 3.1GHz
BIOS CPU family: 29
CPU family: 16
Model: 6
Thread(s) per core: 1
Core(s) per socket: 2
Socket(s): 1
Stepping: 2
CPU(s) scaling MHz: 26%
CPU max MHz: 3100,0000
CPU min MHz: 800,0000
BogoMIPS: 6227,51
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mc
a cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall n
x mmxext fxsr_opt pdpe1gb rdtscp lm 3dnowext 3dnow cons
tant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid pn
i monitor cx16 popcnt lahf_lm cmp_legacy svm extapic cr
8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs s
kinit wdt hw_pstate vmmcall npt lbrv svm_lock nrip_save
Virtualization features:
Virtualization: AMD-V
Caches (sum of all):
L1d: 128 KiB (2 instances)
L1i: 128 KiB (2 instances)
L2: 2 MiB (2 instances)
NUMA:
NUMA node(s): 1
NUMA node0 CPU(s): 0,1
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: Not affected
L1tf: Not affected
Mds: Not affected
Meltdown: Not affected
Mmio stale data: Not affected
Retbleed: Not affected
Spec rstack overflow: Not affected
Spec store bypass: Not affected
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer
sanitization
Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling, PB
RSB-eIBRS Not affected
Srbds: Not affected
Tsx async abort: Not affected
Versions of packages libcryptx-perl depends on:
ii libc6 2.37-12
ii perl [libmath-bigint-perl] 5.36.0-9
ii perl-base [perlapi-5.36.0] 5.36.0-9
Versions of packages libcryptx-perl recommends:
ii libjson-perl 4.10000-1
libcryptx-perl suggests no packages.
-- no debconf information
More information about the pkg-perl-maintainers
mailing list