Bug 2214600
| Summary: | [abrt] refcount_warn_saturate: WARNING: CPU: 6 PID: 64412 at lib/refcount.c:31 refcount_warn_saturate+0xff/0x110 | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | ochal | ||||
| Component: | kernel | Assignee: | Kernel Maintainer List <kernel-maint> | ||||
| Status: | NEW --- | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||
| Severity: | unspecified | Docs Contact: | |||||
| Priority: | unspecified | ||||||
| Version: | 38 | CC: | acaringi, adscvr, airlied, alciregi, bskeggs, hdegoede, hpa, hsvhvf34, jarodwilson, josef, kernel-maint, lgoncalv, linville, masami256, mchehab, ochal, ptalbert, steved | ||||
| Target Milestone: | --- | ||||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Unspecified | ||||||
| URL: | https://retrace.fedoraproject.org/faf/reports/bthash/3027a47e3828ae180fee8250fb7d84afa45e6f5 | ||||||
| Whiteboard: | abrt_hash:3473eb804eaa480077ff3cffb112300774205389;VARIANT_ID=workstation; | ||||||
| Fixed In Version: | Doc Type: | --- | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | Type: | --- | |||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
ochal
2023-06-13 14:38:03 UTC
Created attachment 1970692 [details]
File: dmesg
Description of problem: Just installed the update that included the vulnerability for AMD and Intel Version-Release number of selected component: kernel-core-6.4.9-200.fc38 Additional info: reporter: libreport-2.17.11 kernel: 6.4.9-200.fc38.x86_64 crash_function: refcount_warn_saturate reason: WARNING: CPU: 0 PID: 82 at lib/refcount.c:31 refcount_warn_saturate+0xff/0x110 type: Kerneloops cmdline: BOOT_IMAGE=(hd0,gpt2)/vmlinuz-6.4.9-200.fc38.x86_64 root=UUID=5eae63cf-6d17-4ffd-8019-7b460deb6406 ro rootflags=subvol=root rhgb quiet package: kernel-core-6.4.9-200.fc38 runlevel: N 5 comment: Just installed the update that included the vulnerability for AMD and Intel Truncated backtrace: WARNING: CPU: 0 PID: 82 at lib/refcount.c:31 refcount_warn_saturate+0xff/0x110 Modules linked in: uinput rfcomm snd_seq_dummy snd_hrtimer wireguard curve25519_x86_64 libcurve25519_generic ip6_udp_tunnel udp_tunnel nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr bnep sunrpc snd_sof_amd_rembrandt snd_sof_amd_renoir snd_sof_amd_acp snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils intel_rapl_msr intel_rapl_common snd_soc_core edac_mce_amd snd_hda_codec_realtek snd_hda_codec_generic snd_hda_codec_hdmi ledtrig_audio snd_compress snd_hda_intel rtw88_8821ce snd_intel_dspcfg ac97_bus kvm_amd snd_intel_sdw_acpi uvcvideo rtw88_8821c snd_pcm_dmaengine snd_pci_ps snd_hda_codec uvc videobuf2_vmalloc videobuf2_memops rtw88_pci snd_hda_core snd_rpl_pci_acp6x videobuf2_v4l2 rtw88_core videobuf2_common snd_hwdep snd_pci_acp6x snd_seq kvm videodev btusb btrtl snd_seq_device mac80211 binfmt_misc btbcm btintel mc btmtk snd_pci_acp5x snd_pcm bluetooth libarc4 irqbypass snd_rn_pci_acp3x hp_wmi snd_acp_config vfat snd_timer sparse_keymap fat snd_soc_acpi cfg80211 platform_profile rapl pcspkr wmi_bmof acpi_cpufreq snd_pci_acp3x k10temp rfkill squashfs snd soundcore i2c_piix4 wireless_hotkey acpi_tad joydev loop zram amdgpu i2c_algo_bit drm_ttm_helper ttm nvme crct10dif_pclmul crc32_pclmul crc32c_intel drm_suballoc_helper nvme_core iommu_v2 drm_buddy video polyval_clmulni polyval_generic gpu_sched hid_multitouch ghash_clmulni_intel drm_display_helper sha512_ssse3 ccp r8169 cec nvme_common sp5100_tco i2c_hid_acpi wmi i2c_hid serio_raw fuse CPU: 0 PID: 82 Comm: kworker/0:2 Not tainted 6.4.9-200.fc38.x86_64 #1 Hardware name: HP HP Laptop 15-gw0xxx/87D3, BIOS F.31 06/16/2022 Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu] RIP: 0010:refcount_warn_saturate+0xff/0x110 Code: 08 2d 93 87 c6 05 4a 2c ae 01 01 e8 bb 19 92 ff 0f 0b e9 84 a9 7c 00 48 c7 c7 60 2d 93 87 c6 05 2e 2c ae 01 01 e8 a1 19 92 ff <0f> 0b e9 6a a9 7c 00 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 RSP: 0018:ffff9f5140427de8 EFLAGS: 00010292 RAX: 0000000000000000 RBX: ffff8ac9dc950000 RCX: 0000000000000027 RDX: ffff8acae4a21548 RSI: 0000000000000001 RDI: ffff8acae4a21540 RBP: ffff8ac9dc950000 R08: 0000000000000000 R09: ffff9f5140427c78 R10: 0000000000000003 R11: ffffffff88146508 R12: ffff8ac9f7555400 R13: ffff8ac9f7555790 R14: ffff8ac9f7555000 R15: ffff8ac9f7555428 FS: 0000000000000000(0000) GS:ffff8acae4a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000345200c96000 CR3: 0000000109b2c000 CR4: 00000000003506f0 Call Trace: <TASK> ? refcount_warn_saturate+0xff/0x110 ? __warn+0x81/0x130 ? refcount_warn_saturate+0xff/0x110 ? report_bug+0x171/0x1a0 ? __x86_return_thunk+0x9/0x10 ? prb_read_valid+0x1b/0x30 ? handle_bug+0x3c/0x80 ? exc_invalid_op+0x17/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? refcount_warn_saturate+0xff/0x110 ? refcount_warn_saturate+0xff/0x110 put_pasid_state_wait+0xd6/0xe0 [iommu_v2] ? __x86_return_thunk+0x9/0x10 ? mmu_notifier_unregister+0xb4/0xe0 amd_iommu_unbind_pasid+0xba/0xe0 [iommu_v2] kfd_iommu_unbind_process+0x52/0x70 [amdgpu] kfd_process_wq_release+0x1f6/0x330 [amdgpu] process_one_work+0x1c7/0x3d0 worker_thread+0x51/0x390 ? __pfx_worker_thread+0x10/0x10 kthread+0xe8/0x120 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x2c/0x50 </TASK> fixed the vulnerability* |