From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id E1DB713881D for ; Sun, 27 Sep 2015 09:13:16 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id AC73721C001; Sun, 27 Sep 2015 09:13:10 +0000 (UTC) Received: from r00tworld.com (r00tworld.com [212.85.137.150]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id D31B8E086D for ; Sun, 27 Sep 2015 09:13:09 +0000 (UTC) Received: from localhost (localhost.localdomain [127.0.0.1]) by r00tworld.com (8.13.1/8.13.1) with ESMTP id t8R9D7RI031888 for ; Sun, 27 Sep 2015 11:13:07 +0200 Received: from r00tworld.com ([127.0.0.1]) by localhost (r00tworld.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 20392-05 for ; Sun, 27 Sep 2015 11:13:06 +0200 (CEST) Received: from [192.168.1.14] (x.r00tworld.com [212.85.137.150]) by r00tworld.com (8.13.1/8.13.1) with ESMTP id t8R9Cxfc031879 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Sun, 27 Sep 2015 11:13:01 +0200 From: "PaX Team" To: gentoo-hardened@lists.gentoo.org Date: Sun, 27 Sep 2015 11:12:52 +0200 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-hardened@lists.gentoo.org Reply-to: gentoo-hardened@lists.gentoo.org MIME-Version: 1.0 Subject: Re: [gentoo-hardened] Kernel oops in radeon on evergreen_bandwidth_update Message-ID: <5607B314.24647.55F5BC23@pageexec.freemail.hu> Priority: normal In-reply-to: References: X-mailer: Pegasus Mail for Windows (4.70) Content-type: text/plain; charset=UTF-8 Content-transfer-encoding: Quoted-printable Content-description: Mail message body X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-2.1.12 (r00tworld.com [212.85.137.150]); Sun, 27 Sep 2015 11:13:02 +0200 (CEST) X-Virus-Scanned: r00tworld Anti-Virus System X-Archives-Salt: 7e42ed23-7e2f-4831-a1c8-7b58dbe2f37b X-Archives-Hash: 5b9d32f117845ef98907373312f0a740 On 27 Sep 2015 at 10:44, "T=C3=B3th Attila" wrote: > I've been seeing radeon related crashes upon boot on my laptop for a whi= le > now, but I could just recently capture this Oops, which can be related. = If > the machine hard-locks on boot, I can capture no messages. It looks, tha= t > most of the time it can regenerate from that state somehow and continues > on without any problems. There was a kernel version months before, for > which boot resulted in a hard-lock each time. It happens once in every > couple of startups only. > > It's a null pointer dereference. Where should I report that? to upstream kernel maintainers ;). but before you do that, enable frame pointers to get a better backtrace and also DEBUG_INFO so that addr2line can produce a precise location for the null deref. > I'm still having early-boot intel-iommu traces on my other machine, but > without any symptoms. Might be related to a 3ware card, fully functionin= g, > housing the system - therefore I cannot verify... twa_interrupt is from the 3ware 9xxx driver and it seems that it wants to unmap a page it doesn't own. DEBUG_INFO and addr2line would help to identify the bad call in twa_interrupt (ffffffff9f77d78e in the below trace) then you can send it upstream ;). > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 0 at drivers/iommu/intel-iommu.c:3214 > intel_unmap+0x146/0x200() > Driver unmaps unmatched page at PFN 0 > Modules linked in: > CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.1.7-hardened-r1 #1 > Hardware name: System manufacturer System Product Name/Z8P(N)E-D12(X), > BIOS 1302 06/25/2012 > 0000000000000000 0bf0f1830deb9167 ffffffffa61a1f87 0000000000000000 > ffffffffa61a1f87 ffffffff9fe5d48d ffff880237c03d80 ffffffff9f0a96e7 > ffffffffa61a1f87 0000000000000c8e ffffffffa61e1500 ffff880433ceb368 > Call Trace: > [] ? dump_stack+0x40/0x56 > [] ? warn_slowpath_common+0x77/0xb0 > [] ? warn_slowpath_fmt+0x6c/0x90 > [] ? intel_unmap+0x146/0x200 > [] ? twa_interrupt+0x48e/0x780 > [] ? handle_irq_event_percpu+0x73/0x120 > [] ? handle_irq_event+0x30/0x50 > [] ? handle_fasteoi_irq+0x88/0x180 > [] ? handle_irq+0x85/0x160 > [] ? atomic_notifier_call_chain+0x24/0x30 > [] ? do_IRQ+0x41/0xf0 > [] ? common_interrupt+0x97/0x97