lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202512092317.8cf778a-lkp@intel.com>
Date: Tue, 9 Dec 2025 23:45:51 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Philipp Stanner <phasta@...nel.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, Tvrtko Ursulin
	<tvrtko.ursulin@...lia.com>, <linux-media@...r.kernel.org>,
	<dri-devel@...ts.freedesktop.org>, <linaro-mm-sig@...ts.linaro.org>, "Sumit
 Semwal" <sumit.semwal@...aro.org>, Gustavo Padovan <gustavo@...ovan.org>,
	Christian König <christian.koenig@....com>, Daniel Almeida
	<daniel.almeida@...labora.com>, <linux-kernel@...r.kernel.org>, "Philipp
 Stanner" <phasta@...nel.org>, <oliver.sang@...el.com>
Subject: Re: [PATCH 1/2] dma-buf: Add __dma_fence_is_signaled()



Hello,

kernel test robot noticed "Oops:general_protection_fault,probably_for_non-canonical_address#:#[##]SMP_KASAN_PTI" on:

commit: 142f20971642be40507d3a0bc94e905e251db81a ("[PATCH 1/2] dma-buf: Add __dma_fence_is_signaled()")
url: https://github.com/intel-lab-lkp/linux/commits/Philipp-Stanner/dma-buf-dma-fence-Unify-return-codes-for-signalled-fences/20251125-184735
base: git://linuxtv.org/sailus/media_tree.git master
patch link: https://lore.kernel.org/all/20251125104443.82974-2-phasta@kernel.org/
patch subject: [PATCH 1/2] dma-buf: Add __dma_fence_is_signaled()

in testcase: lkvs
version: lkvs-x86_64-6505b18-1_20251124
with following parameters:

	test: rapl-client



config: x86_64-rhel-9.4-func
compiler: gcc-14
test machine: 4 threads Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz (Skylake) with 32G memory

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202512092317.8cf778a-lkp@intel.com


[   46.662293][  T179] i915 0000:00:02.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem
[   46.680656][   T40] sd 1:0:0:0: [sda] Preferred minimum I/O size 4096 bytes
[   46.682302][   T59] i915 0000:00:02.0: Direct firmware load for i915/skl_dmc_ver1_27.bin failed with error -2
[   46.698362][   T59] i915 0000:00:02.0: [drm] Failed to load DMC firmware i915/skl_dmc_ver1_27.bin (-ENOENT). Disabling runtime power management.
[   46.711256][   T59] i915 0000:00:02.0: [drm] DMC firmware homepage: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git
[   46.725941][   T12] Oops: general protection fault, probably for non-canonical address 0xdffffc01544551ba: 0000 [#1] SMP KASAN PTI
[   46.725953][  T179] ------------[ cut here ]------------
[   46.737600][   T12] KASAN: probably user-memory-access in range [0x0000000aa22a8dd0-0x0000000aa22a8dd7]
[   46.737612][   T12] CPU: 3 UID: 0 PID: 12 Comm: kworker/u16:0 Tainted: G S        I         6.18.0-rc5-00236-g142f20971642 #1 PREEMPT(voluntary)
[   46.742889][  T179] Fence 0000:00:02.0:[i915]:9:2 released with pending signals!
[   46.752212][   T12] Tainted: [S]=CPU_OUT_OF_SPEC, [I]=FIRMWARE_WORKAROUND
[   46.752217][   T12] Hardware name: Dell Inc. OptiPlex 7040/0Y7WYT, BIOS 1.1.1 10/07/2015
[   46.752220][   T12] Workqueue: i915 __i915_gem_free_work [i915]
[   46.765216][  T179] WARNING: CPU: 0 PID: 179 at drivers/dma-buf/dma-fence.c:555 dma_fence_release (kbuild/src/consumer/drivers/dma-buf/dma-fence.c:555 (discriminator 1))
[   46.772517][   T12]
[   46.772521][   T12] RIP: 0010:__list_add_valid_or_report (kbuild/src/consumer/lib/list_debug.c:29)
[   46.772528][   T12] Code: 8b 98 fe 48 89 d3 48 85 d2 0f 84 af 8b 98 fe 4c 8d 62 08 48 89 fd 49 89 f5 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 b7 00 00 00 4c 39 6b 08 75 43 48 b8 00 00 00 00
All code
========
   0:	8b 98 fe 48 89 d3    	mov    -0x2c76b702(%rax),%ebx
   6:	48 85 d2             	test   %rdx,%rdx
   9:	0f 84 af 8b 98 fe    	je     0xfffffffffe988bbe
   f:	4c 8d 62 08          	lea    0x8(%rdx),%r12
  13:	48 89 fd             	mov    %rdi,%rbp
  16:	49 89 f5             	mov    %rsi,%r13
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df 
  23:	4c 89 e2             	mov    %r12,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
  2a:*	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)		<-- trapping instruction
  2e:	0f 85 b7 00 00 00    	jne    0xeb
  34:	4c 39 6b 08          	cmp    %r13,0x8(%rbx)
  38:	75 43                	jne    0x7d
  3a:	48                   	rex.W
  3b:	b8 00 00 00 00       	mov    $0x0,%eax

Code starting with the faulting instruction
===========================================
   0:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
   4:	0f 85 b7 00 00 00    	jne    0xc1
   a:	4c 39 6b 08          	cmp    %r13,0x8(%rbx)
   e:	75 43                	jne    0x53
  10:	48                   	rex.W
  11:	b8 00 00 00 00       	mov    $0x0,%eax
[   46.779267][  T179] Modules linked in:
[   46.787293][   T12] RSP: 0018:ffffc9000010fac8 EFLAGS: 00010003
[   46.787300][   T12] RAX: dffffc0000000000 RBX: 0000000aa22a8dcf RCX: ffffffff82f5859d
[   46.793179][  T179]  platform_profile
[   46.803018][   T12] RDX: 00000001544551ba RSI: ffff88884fde5c90 RDI: ffffc9000010fb50
[   46.803023][   T12] RBP: ffffc9000010fb50 R08: 0000000000000000 R09: ffffed1109fbcb96
[   46.803025][   T12] R10: ffff88884fde5cb7 R11: fefefefefefefeff R12: 0000000aa22a8dd7
[   46.805219][  T179]  sd_mod
[   46.811413][   T12] R13: ffff88884fde5c90 R14: ffff88884fde5c90 R15: 0000000aa22a8dcf
[   46.811417][   T12] FS:  0000000000000000(0000) GS:ffff888848e3e000(0000) knlGS:0000000000000000
[   46.811419][   T12] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   46.830755][  T179]  intel_rapl_common
[   46.834463][   T12] CR2: 00007f3bc83ae000 CR3: 0000000868388002 CR4: 00000000003726f0
[   46.834467][   T12] Call Trace:
[   46.834469][   T12]  <TASK>
[   46.840348][  T179]  snd_hda_core
[   46.848115][   T12]  dma_fence_default_wait (kbuild/src/consumer/include/linux/list.h:158 (discriminator 1) kbuild/src/consumer/include/linux/list.h:177 (discriminator 1) kbuild/src/consumer/drivers/dma-buf/dma-fence.c:800 (discriminator 1))
[   46.851758][  T179]  x86_pkg_temp_thermal
[   46.859527][   T12]  ? __pfx_dma_fence_default_wait (kbuild/src/consumer/drivers/dma-buf/dma-fence.c:778)


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20251209/202512092317.8cf778a-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ