[Bug 194843] [amdgpu] oops [drm:gfx_v8_0_priv_reg_irq] *ERROR* Illegal register access in command stream

bugzilla-daemon at bugzilla.kernel.org bugzilla-daemon at bugzilla.kernel.org
Mon Apr 24 14:23:05 UTC 2017


https://bugzilla.kernel.org/show_bug.cgi?id=194843

--- Comment #9 from Johannes Hirte (johannes.hirte at datenkhaos.de) ---
(In reply to Johannes Hirte from comment #8)
> (In reply to Michel Dänzer from comment #7)
> > I wonder if there might be memory corruption going on, in which case
> > enabling CONFIG_KASAN for the kernel build might give more clues.
> 
> I was testing the last days with KASAN enabled and didn't hit one hang or
> other BUG message in the logs. 

I have to correct this. Found in the logs three use-after-free from 

find_cpio_data

The most detailed was this one:

Apr 23 11:55:16 probook kernel: smpboot: Booting Node 0 Processor 1 APIC 0x11
Apr 23 11:55:16 probook kernel:
==================================================================
Apr 23 11:55:16 probook kernel: BUG: KASAN: use-after-free in
find_cpio_data+0x4d8/0x570 at addr ffff880037991000
Apr 23 11:55:16 probook kernel: Read of size 1 by task swapper/1/0
Apr 23 11:55:16 probook kernel: CPU: 1 PID: 0 Comm: swapper/1 Not tainted
4.11.0-rc7-00006-g3e06d0af3e4b #164
Apr 23 11:55:16 probook kernel: Hardware name: HP HP ProBook 645 G2/80FE, BIOS
N77 Ver. 01.07 11/01/2016
Apr 23 11:55:16 probook kernel: Call Trace:
Apr 23 11:55:16 probook kernel:  dump_stack+0x4f/0x66
Apr 23 11:55:16 probook kernel:  kasan_object_err+0x1c/0x70
Apr 23 11:55:16 probook kernel:  kasan_report+0x252/0x510
Apr 23 11:55:16 probook kernel:  ? find_cpio_data+0x4d8/0x570
Apr 23 11:55:16 probook kernel:  ? put_dec+0xb0/0xb0
Apr 23 11:55:16 probook kernel:  __asan_report_load1_noabort+0x14/0x20
Apr 23 11:55:16 probook kernel:  find_cpio_data+0x4d8/0x570
Apr 23 11:55:16 probook kernel:  ? dump_stack+0x66/0x66
Apr 23 11:55:16 probook kernel:  ? snprintf+0x87/0xb0
Apr 23 11:55:16 probook kernel:  ? vsprintf+0x20/0x20
Apr 23 11:55:16 probook kernel:  find_microcode_in_initrd+0x229/0x3c0
Apr 23 11:55:16 probook kernel:  ? get_builtin_firmware+0x5e/0x120
Apr 23 11:55:16 probook kernel:  __load_ucode_amd+0x11c/0x240
Apr 23 11:55:16 probook kernel:  ? clockevents_program_event+0x1a2/0x2c0
Apr 23 11:55:16 probook kernel:  ? apply_microcode_amd+0x3d0/0x3d0
Apr 23 11:55:16 probook kernel:  ? pick_next_task_fair+0x7a3/0xfe0
Apr 23 11:55:16 probook kernel:  ? pick_next_task_fair+0x7a3/0xfe0
Apr 23 11:55:16 probook kernel:  load_ucode_amd_ap+0x90/0x100
Apr 23 11:55:16 probook kernel:  ? load_ucode_amd_ap+0x90/0x100
Apr 23 11:55:16 probook kernel:  ? __load_ucode_amd+0x240/0x240
Apr 23 11:55:16 probook kernel:  ? flat_send_IPI_mask+0x2b/0x40
Apr 23 11:55:16 probook kernel:  ? sched_clock_cpu+0x1b/0x1e0
Apr 23 11:55:16 probook kernel:  ? default_send_IPI_single+0x77/0xa0
Apr 23 11:55:16 probook kernel:  load_ucode_ap+0x80/0x90
Apr 23 11:55:16 probook kernel:  cpu_init+0x7dc/0xd40
Apr 23 11:55:16 probook kernel:  ? smp_call_function_single+0xf7/0x340
Apr 23 11:55:16 probook kernel:  ? syscall_init+0x140/0x140
Apr 23 11:55:16 probook kernel:  ? debug_smp_processor_id+0x17/0x20
Apr 23 11:55:16 probook kernel:  ? native_play_dead+0xf2/0x120
Apr 23 11:55:16 probook kernel:  ? arch_cpu_idle_dead+0x28/0x40
Apr 23 11:55:16 probook kernel:  ? do_idle+0x206/0x2d0
Apr 23 11:55:16 probook kernel:  start_secondary+0x12/0x2c0
Apr 23 11:55:16 probook kernel:  ? start_secondary+0x12/0x2c0
Apr 23 11:55:16 probook kernel:  start_cpu+0x14/0x14
Apr 23 11:55:16 probook kernel: Object at ffff880037990f00, in cache
kmalloc-512 size: 512
Apr 23 11:55:16 probook kernel: Allocated:
Apr 23 11:55:16 probook kernel: PID = 4012
Apr 23 11:55:16 probook kernel:  save_stack_trace+0x16/0x20
Apr 23 11:55:16 probook kernel:  save_stack+0x46/0xd0
Apr 23 11:55:16 probook kernel:  kasan_kmalloc+0xad/0xe0
Apr 23 11:55:16 probook kernel:  kasan_slab_alloc+0x12/0x20
Apr 23 11:55:16 probook kernel:  __kmalloc_node_track_caller+0xfe/0x290
Apr 23 11:55:16 probook kernel:  __kmalloc_reserve.isra.36+0x2c/0xc0
Apr 23 11:55:16 probook kernel:  __alloc_skb+0xd0/0x560
Apr 23 11:55:16 probook kernel:  alloc_skb_with_frags+0x8d/0x4c0
Apr 23 11:55:16 probook kernel:  sock_alloc_send_pskb+0x587/0x6f0
Apr 23 11:55:16 probook kernel:  unix_stream_sendmsg+0x57d/0x880
Apr 23 11:55:16 probook kernel:  sock_sendmsg+0xb5/0xf0
Apr 23 11:55:16 probook kernel:  sock_write_iter+0x1e0/0x3b0
Apr 23 11:55:16 probook kernel:  __do_readv_writev+0x2b7/0x350
Apr 23 11:55:16 probook kernel:  do_readv_writev+0x79/0xb0
Apr 23 11:55:16 probook kernel:  vfs_writev+0x37/0x50
Apr 23 11:55:16 probook kernel:  do_writev+0x4d/0xd0
Apr 23 11:55:16 probook kernel:  SyS_writev+0xb/0x10
Apr 23 11:55:16 probook kernel:  entry_SYSCALL_64_fastpath+0x13/0x94
Apr 23 11:55:16 probook kernel: Freed:
Apr 23 11:55:16 probook kernel: PID = 4281
Apr 23 11:55:16 probook kernel:  save_stack_trace+0x16/0x20
Apr 23 11:55:16 probook kernel:  save_stack+0x46/0xd0
Apr 23 11:55:16 probook kernel:  kasan_slab_free+0x73/0xc0
Apr 23 11:55:16 probook kernel:  kfree+0x91/0x1c0
Apr 23 11:55:16 probook kernel:  skb_free_head+0x6a/0x90
Apr 23 11:55:16 probook kernel:  skb_release_data+0x279/0x330
Apr 23 11:55:16 probook kernel:  skb_release_all+0x3d/0x50
Apr 23 11:55:16 probook kernel:  consume_skb+0x62/0x180
Apr 23 11:55:16 probook kernel:  unix_stream_read_generic+0x1493/0x1b50
Apr 23 11:55:16 probook kernel:  unix_stream_recvmsg+0x8a/0xa0
Apr 23 11:55:16 probook kernel:  sock_recvmsg+0xc2/0x100
Apr 23 11:55:16 probook kernel:  ___sys_recvmsg+0x227/0x590
Apr 23 11:55:16 probook kernel:  __sys_recvmsg+0xbe/0x140
Apr 23 11:55:16 probook kernel:  SyS_recvmsg+0xd/0x20
Apr 23 11:55:16 probook kernel:  entry_SYSCALL_64_fastpath+0x13/0x94
Apr 23 11:55:16 probook kernel: Memory state around the buggy address:
Apr 23 11:55:16 probook kernel:  ffff880037990f00: fb fb fb fb fb fb fb fb fb
fb fb fb fb fb fb fb
Apr 23 11:55:16 probook kernel:  ffff880037990f80: fb fb fb fb fb fb fb fb fb
fb fb fb fb fb fb fb
Apr 23 11:55:16 probook kernel: >ffff880037991000: fb fb fb fb fb fb fb fb fb
fb fb fb fb fb fb fb
Apr 23 11:55:16 probook kernel:                    ^
Apr 23 11:55:16 probook kernel:  ffff880037991080: fb fb fb fb fb fb fb fb fb
fb fb fb fb fb fb fb
Apr 23 11:55:16 probook kernel:  ffff880037991100: fc fc fc fc fc fc fc fc fc
fc fc fc fc fc fc fc
Apr 23 11:55:16 probook kernel:
==================================================================
Apr 23 11:55:16 probook kernel: Disabling lock debugging due to kernel taint


THe other two entries don't have the Allocated/Freed part.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the dri-devel mailing list