[Bug 101660] New: [EXTENDED][BXT,KBL] KASAN: stack-out-of-bounds in string+0x1af/0x1f0
bugzilla-daemon at freedesktop.org
bugzilla-daemon at freedesktop.org
Fri Jun 30 08:26:15 UTC 2017
https://bugs.freedesktop.org/show_bug.cgi?id=101660
Bug ID: 101660
Summary: [EXTENDED][BXT,KBL] KASAN: stack-out-of-bounds in
string+0x1af/0x1f0
Product: DRI
Version: DRI git
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: medium
Component: DRM/Intel
Assignee: intel-gfx-bugs at lists.freedesktop.org
Reporter: martin.peres at free.fr
QA Contact: intel-gfx-bugs at lists.freedesktop.org
CC: intel-gfx-bugs at lists.freedesktop.org
This bug is triggered by IGT's igt at debugfs_test@read_all_entries on bxt-j3405
and kbl-7260u when running a couple of days old drm-tip.
[ 3580.104980]
==================================================================
[ 3580.105148] BUG: KASAN: stack-out-of-bounds in string+0x1af/0x1f0
[ 3580.105223] Read of size 1 at addr ffff88022878f8e6 by task
debugfs_test/29219
[ 3580.105337] CPU: 1 PID: 29219 Comm: debugfs_test Tainted: G U
4.12.0-rc7-CI-CI_DRM_450+ #1
[ 3580.105345] Hardware name: To Be Filled By O.E.M. To Be Filled By
O.E.M./J3455-ITX, BIOS P1.10 09/29/2016
[ 3580.105353] Call Trace:
[ 3580.105366] dump_stack+0x67/0x99
[ 3580.105380] print_address_description+0x77/0x290
[ 3580.105392] ? string+0x1af/0x1f0
[ 3580.105403] kasan_report+0x269/0x350
[ 3580.105418] __asan_report_load1_noabort+0x14/0x20
[ 3580.105429] string+0x1af/0x1f0
[ 3580.105446] vsnprintf+0x374/0x1c20
[ 3580.105464] ? pointer+0xa80/0xa80
[ 3580.105489] seq_vprintf+0xbf/0x1a0
[ 3580.105502] ? drm_dp_dpcd_access+0x177/0x1c0
[ 3580.105515] seq_printf+0x8b/0xb0
[ 3580.105526] ? seq_vprintf+0x1a0/0x1a0
[ 3580.105538] ? memcpy+0x45/0x50
[ 3580.105558] drm_dp_downstream_debug+0x1b5/0x450
[ 3580.105573] ? drm_dp_downstream_id+0x20/0x20
[ 3580.105582] ? seq_printf+0x8b/0xb0
[ 3580.105593] ? seq_vprintf+0x1a0/0x1a0
[ 3580.105604] ? drm_mode_object_put+0xc2/0x120
[ 3580.105617] ? drm_connector_list_iter_next+0x124/0x1c0
[ 3580.105734] i915_display_info+0x1308/0x1fc0 [i915]
[ 3580.105844] ? intel_seq_print_mode.constprop.14+0x400/0x400 [i915]
[ 3580.105873] seq_read+0x322/0x11f0
[ 3580.105897] ? seq_lseek+0x380/0x380
[ 3580.105910] ? lock_acquire+0x143/0x390
[ 3580.105921] ? debugfs_atomic_t_get+0x80/0x80
[ 3580.105945] full_proxy_read+0x102/0x180
[ 3580.105958] ? full_proxy_write+0x180/0x180
[ 3580.105972] ? debug_check_no_obj_freed+0x495/0x760
[ 3580.105983] ? lock_acquire+0x390/0x390
[ 3580.105993] ? debug_check_no_obj_freed+0x15f/0x760
[ 3580.106010] __vfs_read+0xdb/0x600
[ 3580.106026] ? clone_verify_area+0x1c0/0x1c0
[ 3580.106037] ? debug_check_no_obj_freed+0x495/0x760
[ 3580.106063] ? putname+0xbc/0xf0
[ 3580.106076] ? rcu_lockdep_current_cpu_online+0xdc/0x130
[ 3580.106086] ? putname+0xbc/0xf0
[ 3580.106096] ? rcu_read_lock_sched_held+0xa3/0x130
[ 3580.106113] vfs_read+0xfc/0x300
[ 3580.106127] SyS_read+0xcb/0x1b0
[ 3580.106141] ? vfs_copy_file_range+0x960/0x960
[ 3580.106151] ? trace_hardirqs_on_caller+0x287/0x590
[ 3580.106165] ? trace_hardirqs_on_thunk+0x1a/0x1c
[ 3580.106183] entry_SYSCALL_64_fastpath+0x1c/0xb1
[ 3580.106193] RIP: 0033:0x7f32163a4500
[ 3580.106201] RSP: 002b:00007ffc29dfe058 EFLAGS: 00000246 ORIG_RAX:
0000000000000000
[ 3580.106217] RAX: ffffffffffffffda RBX: 0000000000000000 RCX:
00007f32163a4500
[ 3580.106225] RDX: 000000000000003f RSI: 000000000075c170 RDI:
0000000000000006
[ 3580.106233] RBP: ffffffff81209956 R08: 00007f321638ec38 R09:
0000000000000000
[ 3580.106241] R10: 0000000000000000 R11: 0000000000000246 R12:
ffff88022878ff98
[ 3580.106249] R13: ffffffff81cb7c63 R14: ffff88022878ff70 R15:
000000000075c170
[ 3580.106261] ? __this_cpu_preempt_check+0x13/0x20
[ 3580.106272] ? trace_hardirqs_off_caller+0x1d6/0x2c0
[ 3580.106320] The buggy address belongs to the page:
[ 3580.106381] page:ffffea0008a1e3c0 count:0 mapcount:0 mapping:
(null) index:0x0
[ 3580.106478] flags: 0x8000000000000000()
[ 3580.106532] raw: 8000000000000000 0000000000000000 0000000000000000
00000000ffffffff
[ 3580.106621] raw: 0000000000000000 dead000000000200 0000000000000000
0000000000000000
[ 3580.106709] page dumped because: kasan: bad access detected
[ 3580.106810] Memory state around the buggy address:
[ 3580.106882] ffff88022878f780: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 f4 f3
f3
[ 3580.106987] ffff88022878f800: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00
00
[ 3580.107093] >ffff88022878f880: f1 f1 f1 f1 02 f4 f4 f4 f2 f2 f2 f2 06 f4 f4
f4
[ 3580.107198] ^
[ 3580.107283] ffff88022878f900: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00
00
[ 3580.107388] ffff88022878f980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
f1
[ 3580.107491]
==================================================================
[ 3580.107596] Disabling lock debugging due to kernel taint
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.freedesktop.org/archives/intel-gfx-bugs/attachments/20170630/3eb76857/attachment.html>
More information about the intel-gfx-bugs
mailing list