https://bugzilla.kernel.org/show_bug.cgi?id=194843 --- Comment #9 from Johannes Hirte (johannes.hirte@xxxxxxxxxxxxx) --- (In reply to Johannes Hirte from comment #8) > (In reply to Michel Dänzer from comment #7) > > I wonder if there might be memory corruption going on, in which case > > enabling CONFIG_KASAN for the kernel build might give more clues. > > I was testing the last days with KASAN enabled and didn't hit one hang or > other BUG message in the logs. I have to correct this. Found in the logs three use-after-free from find_cpio_data The most detailed was this one: Apr 23 11:55:16 probook kernel: smpboot: Booting Node 0 Processor 1 APIC 0x11 Apr 23 11:55:16 probook kernel: ================================================================== Apr 23 11:55:16 probook kernel: BUG: KASAN: use-after-free in find_cpio_data+0x4d8/0x570 at addr ffff880037991000 Apr 23 11:55:16 probook kernel: Read of size 1 by task swapper/1/0 Apr 23 11:55:16 probook kernel: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.11.0-rc7-00006-g3e06d0af3e4b #164 Apr 23 11:55:16 probook kernel: Hardware name: HP HP ProBook 645 G2/80FE, BIOS N77 Ver. 01.07 11/01/2016 Apr 23 11:55:16 probook kernel: Call Trace: Apr 23 11:55:16 probook kernel: dump_stack+0x4f/0x66 Apr 23 11:55:16 probook kernel: kasan_object_err+0x1c/0x70 Apr 23 11:55:16 probook kernel: kasan_report+0x252/0x510 Apr 23 11:55:16 probook kernel: ? find_cpio_data+0x4d8/0x570 Apr 23 11:55:16 probook kernel: ? put_dec+0xb0/0xb0 Apr 23 11:55:16 probook kernel: __asan_report_load1_noabort+0x14/0x20 Apr 23 11:55:16 probook kernel: find_cpio_data+0x4d8/0x570 Apr 23 11:55:16 probook kernel: ? dump_stack+0x66/0x66 Apr 23 11:55:16 probook kernel: ? snprintf+0x87/0xb0 Apr 23 11:55:16 probook kernel: ? vsprintf+0x20/0x20 Apr 23 11:55:16 probook kernel: find_microcode_in_initrd+0x229/0x3c0 Apr 23 11:55:16 probook kernel: ? get_builtin_firmware+0x5e/0x120 Apr 23 11:55:16 probook kernel: __load_ucode_amd+0x11c/0x240 Apr 23 11:55:16 probook kernel: ? clockevents_program_event+0x1a2/0x2c0 Apr 23 11:55:16 probook kernel: ? apply_microcode_amd+0x3d0/0x3d0 Apr 23 11:55:16 probook kernel: ? pick_next_task_fair+0x7a3/0xfe0 Apr 23 11:55:16 probook kernel: ? pick_next_task_fair+0x7a3/0xfe0 Apr 23 11:55:16 probook kernel: load_ucode_amd_ap+0x90/0x100 Apr 23 11:55:16 probook kernel: ? load_ucode_amd_ap+0x90/0x100 Apr 23 11:55:16 probook kernel: ? __load_ucode_amd+0x240/0x240 Apr 23 11:55:16 probook kernel: ? flat_send_IPI_mask+0x2b/0x40 Apr 23 11:55:16 probook kernel: ? sched_clock_cpu+0x1b/0x1e0 Apr 23 11:55:16 probook kernel: ? default_send_IPI_single+0x77/0xa0 Apr 23 11:55:16 probook kernel: load_ucode_ap+0x80/0x90 Apr 23 11:55:16 probook kernel: cpu_init+0x7dc/0xd40 Apr 23 11:55:16 probook kernel: ? smp_call_function_single+0xf7/0x340 Apr 23 11:55:16 probook kernel: ? syscall_init+0x140/0x140 Apr 23 11:55:16 probook kernel: ? debug_smp_processor_id+0x17/0x20 Apr 23 11:55:16 probook kernel: ? native_play_dead+0xf2/0x120 Apr 23 11:55:16 probook kernel: ? arch_cpu_idle_dead+0x28/0x40 Apr 23 11:55:16 probook kernel: ? do_idle+0x206/0x2d0 Apr 23 11:55:16 probook kernel: start_secondary+0x12/0x2c0 Apr 23 11:55:16 probook kernel: ? start_secondary+0x12/0x2c0 Apr 23 11:55:16 probook kernel: start_cpu+0x14/0x14 Apr 23 11:55:16 probook kernel: Object at ffff880037990f00, in cache kmalloc-512 size: 512 Apr 23 11:55:16 probook kernel: Allocated: Apr 23 11:55:16 probook kernel: PID = 4012 Apr 23 11:55:16 probook kernel: save_stack_trace+0x16/0x20 Apr 23 11:55:16 probook kernel: save_stack+0x46/0xd0 Apr 23 11:55:16 probook kernel: kasan_kmalloc+0xad/0xe0 Apr 23 11:55:16 probook kernel: kasan_slab_alloc+0x12/0x20 Apr 23 11:55:16 probook kernel: __kmalloc_node_track_caller+0xfe/0x290 Apr 23 11:55:16 probook kernel: __kmalloc_reserve.isra.36+0x2c/0xc0 Apr 23 11:55:16 probook kernel: __alloc_skb+0xd0/0x560 Apr 23 11:55:16 probook kernel: alloc_skb_with_frags+0x8d/0x4c0 Apr 23 11:55:16 probook kernel: sock_alloc_send_pskb+0x587/0x6f0 Apr 23 11:55:16 probook kernel: unix_stream_sendmsg+0x57d/0x880 Apr 23 11:55:16 probook kernel: sock_sendmsg+0xb5/0xf0 Apr 23 11:55:16 probook kernel: sock_write_iter+0x1e0/0x3b0 Apr 23 11:55:16 probook kernel: __do_readv_writev+0x2b7/0x350 Apr 23 11:55:16 probook kernel: do_readv_writev+0x79/0xb0 Apr 23 11:55:16 probook kernel: vfs_writev+0x37/0x50 Apr 23 11:55:16 probook kernel: do_writev+0x4d/0xd0 Apr 23 11:55:16 probook kernel: SyS_writev+0xb/0x10 Apr 23 11:55:16 probook kernel: entry_SYSCALL_64_fastpath+0x13/0x94 Apr 23 11:55:16 probook kernel: Freed: Apr 23 11:55:16 probook kernel: PID = 4281 Apr 23 11:55:16 probook kernel: save_stack_trace+0x16/0x20 Apr 23 11:55:16 probook kernel: save_stack+0x46/0xd0 Apr 23 11:55:16 probook kernel: kasan_slab_free+0x73/0xc0 Apr 23 11:55:16 probook kernel: kfree+0x91/0x1c0 Apr 23 11:55:16 probook kernel: skb_free_head+0x6a/0x90 Apr 23 11:55:16 probook kernel: skb_release_data+0x279/0x330 Apr 23 11:55:16 probook kernel: skb_release_all+0x3d/0x50 Apr 23 11:55:16 probook kernel: consume_skb+0x62/0x180 Apr 23 11:55:16 probook kernel: unix_stream_read_generic+0x1493/0x1b50 Apr 23 11:55:16 probook kernel: unix_stream_recvmsg+0x8a/0xa0 Apr 23 11:55:16 probook kernel: sock_recvmsg+0xc2/0x100 Apr 23 11:55:16 probook kernel: ___sys_recvmsg+0x227/0x590 Apr 23 11:55:16 probook kernel: __sys_recvmsg+0xbe/0x140 Apr 23 11:55:16 probook kernel: SyS_recvmsg+0xd/0x20 Apr 23 11:55:16 probook kernel: entry_SYSCALL_64_fastpath+0x13/0x94 Apr 23 11:55:16 probook kernel: Memory state around the buggy address: Apr 23 11:55:16 probook kernel: ffff880037990f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb Apr 23 11:55:16 probook kernel: ffff880037990f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb Apr 23 11:55:16 probook kernel: >ffff880037991000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb Apr 23 11:55:16 probook kernel: ^ Apr 23 11:55:16 probook kernel: ffff880037991080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb Apr 23 11:55:16 probook kernel: ffff880037991100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc Apr 23 11:55:16 probook kernel: ================================================================== Apr 23 11:55:16 probook kernel: Disabling lock debugging due to kernel taint THe other two entries don't have the Allocated/Freed part. -- You are receiving this mail because: You are watching the assignee of the bug. _______________________________________________ dri-devel mailing list dri-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.freedesktop.org/mailman/listinfo/dri-devel