Debian Bug report logs - #1004894
sudo: [i386] invalid opcode

version graph

Package: sudo; Maintainer for sudo is Debian Sudo Maintainers <[email protected]>; Source for sudo is src:sudo (PTS, buildd, popcon).

Reported by: Martin-Éric Racine <[email protected]>

Date: Thu, 3 Feb 2022 07:15:02 UTC

Severity: minor

Tags: wontfix

Found in version sudo/1.9.9-1

Fix blocked by 1005863: gcc: should reject combination of i686 architecture and fcf-protection feature

Forwarded to https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104713 https://github.com/sudo-project/sudo/issues/140

Full log


🔗 View this message in rfc822 format

X-Loop: [email protected]
Subject: Bug#1004894: sudo: [i386] invalid opcode
Reply-To: Henning Paul <[email protected]>, [email protected]
Resent-From: Henning Paul <[email protected]>
Resent-To: [email protected]
Resent-CC: Sudo Maintainers <[email protected]>
X-Loop: [email protected]
Resent-Date: Fri, 18 Feb 2022 20:54:01 +0000
Resent-Message-ID: <[email protected]>
Resent-Sender: [email protected]
X-Debian-PR-Message: followup 1004894
X-Debian-PR-Package: sudo
X-Debian-PR-Keywords: 
References: <[email protected]> <[email protected]>
X-Debian-PR-Source: sudo
Received: via spool by [email protected] id=B1004894.16452175229188
          (code B ref 1004894); Fri, 18 Feb 2022 20:54:01 +0000
Received: (at 1004894) by bugs.debian.org; 18 Feb 2022 20:52:02 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.2-bugs.debian.org_2005_01_02
	(2018-09-13) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-9.3 required=4.0 tests=BAYES_00,DKIM_SIGNED,
	DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,HAS_BUG_NUMBER,
	NICE_REPLY_A,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SHIP_ID_INT,
	SPF_HELO_NONE,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE autolearn=ham
	autolearn_force=no version=3.4.2-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 26; hammy, 150; neutral, 182; spammy,
	0. spammytokens: hammytokens:0.000-+--afaict, 0.000-+--AFAICT,
	0.000-+--H*u:91.0, 0.000-+--H*UA:91.0, 0.000-+--cpuid
Received: from mout.gmx.net ([212.227.17.20]:35239)
	by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256)
	(Exim 4.92)
	(envelope-from <[email protected]>)
	id 1nLAET-0002Nl-Ej
	for [email protected]; Fri, 18 Feb 2022 20:52:01 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net;
	s=badeba3b8450; t=1645217518;
	bh=vz2X8kWbpQuzG1TsbZ3xp6e10orGFmI1taYvk8djTGs=;
	h=X-UI-Sender-Class:Date:Subject:From:To:References:In-Reply-To;
	b=EMgOw8nk50T2HZdoNzGAk0eLqX7nlzJssUDNaAif+FmlyYalq/k8dYQdd7r3yXtv2
	 5OdxIiOMcWxuezW7znCxLYp4kXOkG1xcd/xNHAGgOh/KgtattkWBKoNpgK+vfEOCEO
	 phY//ckXKtCJ7/vtdOmdJ6XZcus657IIImk+atAI=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.1.100] ([84.141.201.164]) by mail.gmx.net (mrgmx105
 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MwwZX-1oAoeD0vzn-00yQpU for
 <[email protected]>; Fri, 18 Feb 2022 21:51:58 +0100
Message-ID: <[email protected]>
Date: Fri, 18 Feb 2022 21:51:57 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Content-Language: en-US
From: Henning Paul <[email protected]>
To: [email protected]
In-Reply-To: <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: quoted-printable
X-Provags-ID: V03:K1:Ep0YeR62ZSznx30C5MKWhJ320cvIQC+cP5UaL/tTrmgHfZZgqzq
 O70oJC44aDNwRreVc62QlUK8GkUIWY80wQXio9SJ8ZLtUaNL0vugku6Bf2YstaQsCxM2+LS
 KDNyE0BD1KRSqyOFJOtrcZnzRkkx5Ypvp/fDpkvp8LxOzyZvNjBL1Sul7XowNwAJoq7brHb
 SMfRw9IMBELfFb4DgvtMA==
X-UI-Out-Filterresults: notjunk:1;V03:K0:EH+SuLvScTw=:Wh/sDXjkRJlZkLZdZUTYiC
 RKDUhpDPCkeSwaUFhUGnSCCwswCghGZDZDqIC3s6z+lNaWNDb3Lp41QbtvTtJSHPO2IH+yVMt
 4Q974bc9/u45RKPL74myQg/Mv+8aOy2JGEE6GBOozsjlRrddklmlAVqTiVgngC0EgdPbGWPsD
 ujHsBBwgwrLn9KEdkkB/gTF7cbeQ2IcqEC8yNx2L9KP1Ke34PwxiwY73tn69RhOXl2GsK0utM
 y/KhzpooY4neVP78DL2RAvpnFwIGR+RaNDAgN/BGdI4GEtKiXY3FI4PJHg621J5w80uIPu6YO
 PcCjUviw2fpRdEjbGQvZ8gujGFvi7XJkBM97u1VeLS/8/hcYLPZ4UzpwPtSdvaphwO2gs7xV6
 ySsPebdwdOBVzyfUixH3WjNJ5p7UGwTRVL6gtOdNZuGgbFmndlx9Eh/uFTJ8IxzNOSKUwYG6N
 wyXIHYoUH7ACA1rCp3V5ewgyjGXeIEH/k52ha+zRKd5b2YY6w5dnNjezY/LgxId9JQ1/A+zT2
 lTMDguuhU0lrlWfGSGKMMOj1GdnM/ABS98gcvDToryOZcNRicELOx9VywhPcdo1IBWuCGVwoZ
 984MiLEtMs37mmXqtVUd5YAF5ukVYg6l1Cy65LmxYklffSWdPSrJMY0NMPB9aX6pzRon6B8IK
 PrM9BqCUoAapdwbcFufN4GSWKujvVK6dgKG62Qz90tWXYXpdD2ln4qnFZaDJWFaNN8Q28eNpL
 GwdbO6zkzYIVaYi/GWkXgbbInu503S2NzvKfRqVh+ngC5FnB9WiWqtehzNlnAFMmCD2aoD+fu
 rSgs3Ezoo1UN1h6y9BC/UZ9c+Gtz7125pJITSBljDOjqs8Hhp9YLV+0TZ64j04lCK51kkvH/E
 /G5kXbPfbHbaMcnDCreakhA1N7XWtSoKXGGhtOwEqVBj2ujFNt22qCVkyLyOhetm/aUAyPnJW
 gb4RkgAxJK53g0Ks/8k6OvD7b0Smpy0PdEM7Bj9khqQAe1KWvG/dAyNFHCCKaDuEXVjpvMOQ2
 QjCOLv7kAsZcpGdbxt4N4Dfvgzq3Eu4I+S6XxBDwYAH0ANo7INKGt7VURqJRu1sINQ==
Am 18.02.22 um 15:21 schrieb Henning Paul:
> On Wed, 16 Feb 2022 22:45:28 Martin-Éric Racine wrote:
>
>> On Wed, Feb 16, 2022 at 10:31 PM Marc Haber
>> <[email protected]> wrote:
>>>
>>> On Wed, Feb 16, 2022 at 07:15:37PM +0200, Martin-Éric Racine wrote:
>>> So it still doesn't build on Geode LX.
>>>
>>> How about your i386 build chroot?
>>
>> Builds fine on my i386 chroot (amd64 host) and the resulting binary
>> doesn't dump core when installed on the Geode. Assuming there's no
>> uncovered corner case due to other optimizations, I think we've got a
>> winner.
>
> Triggered build on a fresh sid install on my Alix board and obtained the
> attached log file. AFAICT, the compile itself did not produce any
> errors, but fuzz_sudo_conf causes the known illegal opcode exception.
>
> best regards
> Henning

lscpu:

root@alix:~# lscpu
Architecture:           i586
  CPU op-mode(s):       32-bit
  Address sizes:        32 bits physical, 32 bits virtual
  Byte Order:           Little Endian
CPU(s):                 1
  On-line CPU(s) list:  0
Vendor ID:              AuthenticAMD
  Model name:           Geode(TM) Integrated Processor by AMD PCS
    CPU family:         5
    Model:              10
    Thread(s) per core: 1
    Core(s) per socket: 1
    Socket(s):          1
    Stepping:           2
    BogoMIPS:           996.02
    Flags:              fpu de pse tsc msr cx8 sep pge cmov clflush mmx
mmxext 3
                        dnowext 3dnow cpuid 3dnowprefetch vmmcall
Caches (sum of all):
  L1d:                  57 KiB (1 instance)
  L1i:                  57 KiB (1 instance)
  L2:                   128 KiB (1 instance)
Vulnerabilities:
  Itlb multihit:        Not affected
  L1tf:                 Not affected
  Mds:                  Not affected
  Meltdown:             Not affected
  Spec store bypass:    Vulnerable
  Spectre v1:           Mitigation; usercopy/swapgs barriers and __user
pointer
                        sanitization
  Spectre v2:           Mitigation; Full generic retpoline, STIBP
disabled, RSB
                        filling
  Srbds:                Not affected
  Tsx async abort:      Not affected

best regards
Henning

Send a report that this bug log contains spam.


Debian bug tracking system administrator <[email protected]>. Last modified: Tue May 13 14:21:39 2025; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU General Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.