lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 20 Jan 2011 18:29:45 +0100
From:	Knut Petersen <Knut_Petersen@...nline.de>
To:	airlied@...ux.ie
CC:	jesse.barnes@...el.com,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	linux-kernel@...r.kernel.org,
	intel-gfx <intel-gfx@...ts.freedesktop.org>
Subject: [BUG] 2.6.38-rc1-git1: hard lockup related to i915 / automated cgroup
 scheduling

Kernel 2.6.38-rc1 and -git1 will lock my AOpen i915GMm-HFS
at the end of  KDE startup if automatic process group scheduling
is actived in kernel config. A hard reset is necessary.
Without automatic process group scheduling everything is ok.


Reproducibility of bug: 100 %
System: AOpen i915GMm-Hfs, 2GB, Pentium M
Distribution: openSuSE 11.3

cu,
 Knut

Jan 20 17:57:07 golem kernel: [   58.087054] ------------[ cut here
]------------
Jan 20 17:57:07 golem kernel: [   58.087117] kernel BUG at
drivers/gpu/drm/i915/i915_gem.c:3254!
Jan 20 17:57:07 golem kernel: [   58.087177] invalid opcode: 0000 [#1]
PREEMPT
Jan 20 17:57:07 golem kernel: [   58.087229] last sysfs file:
/sys/module/snd_hda_intel/parameters/power_save
Jan 20 17:57:07 golem kernel: [   58.087299] Modules linked in: ip6t_LOG
ipt_MASQUERADE xt_pkttype xt_TCPMSS xt_tcpudp ipt_LOG xt_limit
iptable_nat nf_nat af_packet ppp_generic slhc ip6t_REJECT
nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_raw xt_NOTRACK ipt_REJECT
xt_state iptable_raw iptable_filter ip6table_mangle
nf_conntrack_netbios_ns nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
ip_tables ip6table_filter ip6_tables x_tables ipv6
Jan 20 17:57:07 golem kernel: [   58.087746]
Jan 20 17:57:07 golem kernel: [   58.087765] Pid: 1915, comm: Xorg Not
tainted 2.6.38-rc1-git1-kape #24 i915GMm-HFS/
Jan 20 17:57:07 golem kernel: [   58.087842] EIP: 0060:[<c02f6243>]
EFLAGS: 00213246 CPU: 0
Jan 20 17:57:07 golem kernel: [   58.087902] EIP is at
i915_gem_object_pin+0x2b/0x131
Jan 20 17:57:07 golem kernel: [   58.087953] EAX: 0001e000 EBX: f71030c0
ECX: 00000000 EDX: 00000000
Jan 20 17:57:07 golem kernel: [   58.088015] ESI: 00000000 EDI: f595a000
EBP: f732dd80 ESP: f732dd70
Jan 20 17:57:07 golem kernel: [   58.088077]  DS: 007b ES: 007b FS: 0000
GS: 0033 SS: 0068
Jan 20 17:57:07 golem kernel: [   58.088132] Process Xorg (pid: 1915,
ti=f732c000 task=f72def90 task.ti=f732c000)
Jan 20 17:57:07 golem kernel: [   58.088204] Stack:
Jan 20 17:57:07 golem kernel: [   58.088226]  00355740 f732de34 f71030c0
f732de34 f732ddb8 c02f818b 0032dd94 c040d047
Jan 20 17:57:07 golem kernel: [   58.088327]  f595a01c f732ddc4 00203046
0195a01c 00000000 f597c738 f70d91f8 f595a01c
Jan 20 17:57:07 golem kernel: [   58.088427]  f71af550 00000006 f732de4c
c02f8946 00000000 000c10a1 f732dddc c011b3cd
Jan 20 17:57:07 golem kernel: [   58.088528] Call Trace:
Jan 20 17:57:07 golem kernel: [   58.088557]  [<c02f818b>]
i915_gem_execbuffer_reserve+0x123/0x2ab
Jan 20 17:57:07 golem kernel: [   58.088622]  [<c040d047>] ?
sock_wfree+0x21/0x3a
Jan 20 17:57:07 golem kernel: [   58.088671]  [<c02f8946>]
i915_gem_do_execbuffer+0x3f4/0xe8c
Jan 20 17:57:07 golem kernel: [   58.088731]  [<c011b3cd>] ?
kmap_atomic_prot_pfn+0x25/0x61
Jan 20 17:57:07 golem kernel: [   58.088787]  [<c011b358>] ?
iounmap_atomic+0x5c/0x73
Jan 20 17:57:07 golem kernel: [   58.088840]  [<c02f989e>]
i915_gem_execbuffer2+0xf8/0x17e
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c02dc320>]
drm_ioctl+0x283/0x33d
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c02f97a6>] ?
i915_gem_execbuffer2+0x0/0x17e
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c0189edd>] ?
do_sync_read+0x89/0xc4
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c02dc09d>] ?
drm_ioctl+0x0/0x33d
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c0196abb>]
do_vfs_ioctl+0x4a5/0x4d6
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c0236cb4>] ?
security_file_permission+0x6f/0x7a
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c013e228>] ?
ktime_get_ts+0xe2/0xec
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c0196b2d>]
sys_ioctl+0x41/0x64
Jan 20 17:57:07 golem kernel: [   58.088863]  [<c010270c>]
sysenter_do_call+0x12/0x22
Jan 20 17:57:07 golem kernel: [   58.088863] Code: 55 89 e5 57 56 89 d6
53 89 c3 83 ec 04 88 4d f3 8b 40 08 8b b8 f4 01 00 00 8b 83 80 00 00 00
25 00 e0 01 00 3d 00 e0 01 00 75 02 <0f> 0b 83 7b 54 00 74 62 85 d2 74
0b 8d 52 ff 85 93 a0 00 00 00
Jan 20 17:57:07 golem kernel: [   58.088863] EIP: [<c02f6243>]
i915_gem_object_pin+0x2b/0x131 SS:ESP 0068:f732dd70



View attachment "configbroken" of type "text/plain" (66198 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ