SCIENTIFIC-LINUX-USERS Archives

December 2018

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Gilles Detillieux <[log in to unmask]>
Reply To:
Gilles Detillieux <[log in to unmask]>
Date:
Mon, 3 Dec 2018 14:20:06 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (91 lines)
Thanks, Pat.



Yes, I've done more digging since speculating on the cause of this, and 

that confirms that it's something deeper than that. It seems the problem 

is the ati driver hasn't kept up with changes to the Xorg 1.20 server. 

There is an upstream fix to the driver 

(https://urldefense.proofpoint.com/v2/url?u=https-3A__cgit.freedesktop.org_xorg_driver_xf86-2Dvideo-2Dati_commit_-3Fid-3D3c4c0213c11d623cba7adbc28dde652694f2f758&d=DwIDbA&c=gRgGjJ3BkIsb5y6s49QqsA&r=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A&m=fdtu6IJTSrAf8DomTlW6HmtAwcWJgHTEDTfkPm0EPi8&s=LC9bngmN1FNv4UWeJ01t5pk0ASB0ayUEOTjbXW3fboA&e=) 

that hasn't made its way down through Red Hat yet, but it updates 

glamor/gbm handling for the new server version.



Two workarounds seem to have been suggested. One is to remove the ati 

driver altogether and let the kernel or Xorg server pick a different one 

(https://urldefense.proofpoint.com/v2/url?u=https-3A__bugs.archlinux.org_task_50397&d=DwIDbA&c=gRgGjJ3BkIsb5y6s49QqsA&r=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A&m=fdtu6IJTSrAf8DomTlW6HmtAwcWJgHTEDTfkPm0EPi8&s=roUhVOzrg2Rbr9JVFZ5Lqwy6H33MufTUdFiG_vjv0bo&e=). This was for Arch Linux. I 

don't know if RHEL/SL will handle this seemingly drastic fix, but I 

haven't been able to try it yet. A less drastic fix seems to be to 

disable glamor and use exa acceleration instead, and drop DRI to level 2 

(https://urldefense.proofpoint.com/v2/url?u=https-3A__www.linuxquestions.org_questions_slackware-2D14_xorg-2Dserver-2D1-2D20-2D0-2Dstarts-2Dwith-2Dlast-2Dshutdown-2Dscreenshot-2D4175632139_&d=DwIDbA&c=gRgGjJ3BkIsb5y6s49QqsA&r=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A&m=fdtu6IJTSrAf8DomTlW6HmtAwcWJgHTEDTfkPm0EPi8&s=B_RI9IcUwi-ixdA6Gdoc8__5TEGdPv3N2a0RM8utLbM&e=).



I tried this second fix by creating a 

/etc/X11/xorg.conf.d/20-ati-radeon.conf file with the following:



Section "Device"



     Identifier "Radeon"

     Driver "radeon"

     # Option "AccelMethod" "glamor"

     Option "AccelMethod" "exa"

     Option "DRI" "2"



EndSection



The system rebooted fine and so far the kernel logs are clean, but I'm 

not on-campus today (working remotely) so I won't know until I test 

further, tomorrow, if the fix worked. Andreas, you may want to give this 

a try too and let us know how it goes for you.



Gilles



On 2018-12-03 13:41, Pat Riehecky wrote:

> I'd be surprised in the patch[1] made any difference on Radeon 

> systems. The code there is really only related to udev probing.

>

> There was a large jump in the ati driver from 7.5 to 7.6.  My initial 

> thoughts are in that direction...

>

> Pat

>

> [1] 

> https://urldefense.proofpoint.com/v2/url?u=https-3A__gitlab.freedesktop.org_xorg_xserver_commit_0816e8fca6194dfb4cc94c3a7fcb2c7f2a921386&d=DwIDbA&c=gRgGjJ3BkIsb5y6s49QqsA&r=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A&m=fdtu6IJTSrAf8DomTlW6HmtAwcWJgHTEDTfkPm0EPi8&s=32xuMovCCBOC9s5LrXPMl9KF1vZphkPuuf2xHOVcjr4&e=

>

> On 12/3/18 11:29 AM, Gilles Detillieux wrote:

>> Thanks for the feedback, Andreas. That saves me some testing time. It 

>> looks like the security bug 

>> (https://urldefense.proofpoint.com/v2/url?u=https-3A__access.redhat.com_security_cve_cve-2D2018-2D14665&d=DwIDbA&c=gRgGjJ3BkIsb5y6s49QqsA&r=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A&m=VStRhNQ03emrmYLjFAIDre-xzZT0Ho_w1biFWTQSbtc&s=pGQ8kJ1ceFEdtE90n9wkzNyf0BcBKbllIvhnPdeLWjc&e=) 

>> needs physical access to the console to exploit. Fortunately that 

>> shouldn't be a problem in our environment, where the users are more 

>> interested in hacking neurons.

>>

>> I noticed in the Errata message for the xorg-x11-server update, it 

>> says "The SL Team added a fix for upstream bug 1650634". I'm 

>> wondering if this bug fix 

>> (https://urldefense.proofpoint.com/v2/url?u=https-3A__bugzilla.redhat.com_show-5Fbug.cgi-3Fid-3D1650634&d=DwIDbA&c=gRgGjJ3BkIsb5y6s49QqsA&r=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A&m=VStRhNQ03emrmYLjFAIDre-xzZT0Ho_w1biFWTQSbtc&s=vz7Ui2PF_YcxXFRgPhPceXRL1HuDpy8255vaqI-vmbE&e=) 

>> broke things for the Radeon drivers. Seems a more likely cause than 

>> the CVE fix for an argument handling issue. That fix was to support 

>> the SL 7.6 upgrade on nVidia hardware. I'll have to see if the 7.6 

>> upgrade (now available) makes the problem go away for the radeon 

>> 3000. If not, I'll likely downgrade Xorg to 1.19 on our systems till 

>> I hear of a fix for this.

>>

>> Thanks again,

>> Gilles

>>

>> On 2018-12-03 10:52, Andreas Nowack wrote:

>>> I would exclude the kernel as source of the problem since downgrade 

>>> to Xorg 1.19 removes all the error messages and problems. (But due 

>>> to security bugs, Xorg 1.19 is not a real option).

>>>

>>> Best regards,

>>>   Andreas

>>>

>>>

>>

>



-- 

Gilles R. Detillieux              E-mail: <[log in to unmask]>

Spinal Cord Research Centre       WWW:    https://urldefense.proofpoint.com/v2/url?u=http-3A__www.scrc.umanitoba.ca_&d=DwIDbA&c=gRgGjJ3BkIsb5y6s49QqsA&r=gd8BzeSQcySVxr0gDWSEbN-P-pgDXkdyCtaMqdCgPPdW1cyL5RIpaIYrCn8C5x2A&m=fdtu6IJTSrAf8DomTlW6HmtAwcWJgHTEDTfkPm0EPi8&s=azgqnO9YwVz5j7coMETutt1msWicAsiuVIiDhFLXSzs&e=

Dept. of Physiology and Pathophysiology, Faculty of Health Sciences,

Univ. of Manitoba  Winnipeg, MB  R3E 0J9  (Canada)




ATOM RSS1 RSS2