lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8f7cb404c60babde61a6de0ae3f0b8f2b975d571.camel@gmx.de>
Date:   Wed, 10 Mar 2021 11:09:16 +0100
From:   Mike Galbraith <efault@....de>
To:     LKML <linux-kernel@...r.kernel.org>
Cc:     David Airlie <airlied@...ux.ie>
Subject: drm: unexpected static_call insn opcode 0xe9 at
 drm_gem_check_release_pagevec+0x2a/0x30 [drm]

Box is aging i4790 box w. GTX980+nouveau.

[    2.833432] ------------[ cut here ]------------
[    2.833448] unexpected static_call insn opcode 0xe9 at drm_gem_check_release_pagevec+0x2a/0x30 [drm]
[    2.833505] WARNING: CPU: 2 PID: 329 at arch/x86/kernel/static_call.c:77 __static_call_validate+0x71/0x80
[    2.833522] Modules linked in: drm(E+) usbcore(E) video(E) button(E+) sd_mod(E) t10_pi(E) vfat(E) fat(E) virtio_blk(E) virtio_mmio(E) virtio_ring(E) virtio(E) ext4(E) crc32c_intel(E) crc16(E) mbcache(E) jbd2(E) loop(E) sg(E) dm_multipath(E) dm_mod(E) scsi_dh_rdac(E) scsi_dh_emc(E) scsi_dh_alua(E) scsi_mod(E) efivarfs(E) autofs4(E)
[    2.833595] CPU: 2 PID: 329 Comm: systemd-udevd Tainted: G            E     5.12.0.g05a59d7-master #2
[    2.833598] Hardware name: MEDION MS-7848/MS-7848, BIOS M7848W08.20C 09/23/2013
[    2.833601] RIP: 0010:__static_call_validate+0x71/0x80
[    2.833605] Code: 75 cc f3 c3 0f b6 49 04 38 4f 04 75 e1 f3 c3 f3 c3 48 89 fa 0f b6 f0 48 c7 c7 48 9f 03 82 c6 05 e6 a3 3e 01 01 e8 1f 59 04 00 <0f> 0b c3 66 66 2e 0f 1f 84 00 00 00 00 00 90 0f 1f 44 00 00 41 55
[    2.833608] RSP: 0018:ffff888108d07c70 EFLAGS: 00010286
[    2.833612] RAX: 0000000000000058 RBX: 0000000000000000 RCX: 0000000000000001
[    2.833614] RDX: 0000000080000001 RSI: ffffffff82066fc1 RDI: 00000000ffffffff
[    2.833617] RBP: ffffffff811cbad0 R08: 0000000000000001 R09: 0000000000000001
[    2.833619] R10: ffff888108d07c78 R11: ffff888108d07988 R12: ffffffffa0353cea
[    2.833622] R13: 0000000000000000 R14: ffffffffa0353cea R15: ffffffff8226c140
[    2.833624] FS:  00007fbe0b7e1d40(0000) GS:ffff88841ec80000(0000) knlGS:0000000000000000
[    2.833627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    2.833630] CR2: 00007fbe0b7eabb0 CR3: 0000000108d08001 CR4: 00000000001706e0
[    2.833633] Call Trace:
[    2.833635]  arch_static_call_transform+0x5f/0x90
[    2.833657]  __static_call_init.part.2+0xc2/0x210
[    2.833667]  ? __SCT__tp_func_sched_update_nr_running_tp+0x8/0x8
[    2.833672]  static_call_module_notify+0x14c/0x190
[    2.833684]  notifier_call_chain_robust+0x56/0xc0
[    2.833706]  blocking_notifier_call_chain_robust+0x41/0x60
[    2.833720]  ? kfree+0x170/0x2b0
[    2.833729]  load_module+0x1a19/0x21e0
[    2.833767]  ? __do_sys_finit_module+0x94/0xe0
[    2.833772]  __do_sys_finit_module+0x94/0xe0
[    2.833802]  do_syscall_64+0x33/0x40
[    2.833808]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[    2.833812] RIP: 0033:0x7fbe0a620759
[    2.833816] Code: 00 48 81 c4 80 00 00 00 89 f0 c3 66 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 0f d7 2b 00 f7 d8 64 89 01 48
[    2.833819] RSP: 002b:00007fff37392f08 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[    2.833824] RAX: ffffffffffffffda RBX: 000055792e98ecf0 RCX: 00007fbe0a620759
[    2.833826] RDX: 0000000000000000 RSI: 00007fbe0af5b87d RDI: 0000000000000006
[    2.833829] RBP: 00007fbe0af5b87d R08: 0000000000000000 R09: 0000000000000000
[    2.833831] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000020000
[    2.833834] R13: 000055792e9a7810 R14: 0000000000000000 R15: 0000000003938700
[    2.833860] irq event stamp: 10273
[    2.833862] hardirqs last  enabled at (10279): [<ffffffff810e9223>] vprintk_emit+0x283/0x2b0
[    2.833867] hardirqs last disabled at (10284): [<ffffffff810e91e0>] vprintk_emit+0x240/0x2b0
[    2.833870] softirqs last  enabled at (7608): [<ffffffff81c00365>] __do_softirq+0x365/0x492
[    2.833875] softirqs last disabled at (7453): [<ffffffff81079136>] irq_exit_rcu+0xf6/0x100
[    2.833879] ---[ end trace d6083471edf28ca7 ]---

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ