intel-gfx.lists.freedesktop.org archive mirror
 help / color / mirror / Atom feed
* Re: [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000
@ 2020-02-16  3:26 Hillf Danton
  2020-02-16 10:33 ` Toralf Förster
                   ` (2 more replies)
  0 siblings, 3 replies; 7+ messages in thread
From: Hillf Danton @ 2020-02-16  3:26 UTC (permalink / raw)
  To: Toralf Foerster; +Cc: intel-gfx, Linux Kernel


On 2020-02-15 16:20 UTC Toralf Foerster wrote:
> Since 5.5.1 I do experience hangs under a hardend Gerntoo Linux + KDE, neither mouse nor keyboard are then working anymore, power off is the only one.
> The syslog tells:
> 
> 
> Feb 15 12:56:31 t44 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000000
> Feb 15 12:56:31 t44 kernel: #PF: supervisor instruction fetch in kernel mode
> Feb 15 12:56:31 t44 kernel: #PF: error_code(0x0010) - not-present page
> Feb 15 12:56:31 t44 kernel: PGD 0 P4D 0 
> Feb 15 12:56:31 t44 kernel: Oops: 0010 [#1] SMP PTI
> Feb 15 12:56:31 t44 kernel: CPU: 0 PID: 3401 Comm: X Tainted: G                T 5.5.4 #2
> Feb 15 12:56:31 t44 kernel: Hardware name: LENOVO 20AQCTO1WW/20AQCTO1WW, BIOS GJET92WW (2.42 ) 03/03/2017
> Feb 15 12:56:31 t44 kernel: RIP: 0010:0x0
> Feb 15 12:56:31 t44 kernel: Code: Bad RIP value.
> Feb 15 12:56:31 t44 kernel: RSP: 0018:ffff9d8780917a40 EFLAGS: 00010087
> Feb 15 12:56:31 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000919dd
> Feb 15 12:56:31 t44 kernel: RDX: 0000000000000000 RSI: ffff8b13d4024b08 RDI: ffff8b149d88a400
> Feb 15 12:56:31 t44 kernel: RBP: ffff8b149d88a400 R08: 0000000000000000 R09: ffff8b13d4024100
> Feb 15 12:56:31 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffff9d8780917a48
> Feb 15 12:56:31 t44 kernel: R13: 0000000000000000 R14: ffff8b14aa17ae00 R15: ffff8b14a39a02c0
> Feb 15 12:56:31 t44 kernel: FS:  00007f8c162148c0(0000) GS:ffff8b14b2600000(0000) knlGS:0000000000000000
> Feb 15 12:56:31 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> Feb 15 12:56:31 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323998005 CR4: 00000000001606f0
> Feb 15 12:56:31 t44 kernel: Call Trace:
> Feb 15 12:56:31 t44 kernel:  dma_fence_signal_locked+0x85/0xc0
> Feb 15 12:56:31 t44 kernel:  i915_request_retire+0x259/0x2a0 [i915]
> Feb 15 12:56:31 t44 kernel:  i915_request_create+0x3f/0xc0 [i915]
> Feb 15 12:56:31 t44 kernel:  i915_gem_do_execbuffer+0x973/0x17d0 [i915]
> Feb 15 12:56:31 t44 kernel:  i915_gem_execbuffer2_ioctl+0xe9/0x3a0 [i915]
> Feb 15 12:56:31 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
> Feb 15 12:56:31 t44 kernel:  drm_ioctl_kernel+0xae/0x100 [drm]
> Feb 15 12:56:31 t44 kernel:  drm_ioctl+0x223/0x400 [drm]
> Feb 15 12:56:31 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
> Feb 15 12:56:31 t44 kernel:  do_vfs_ioctl+0x4d4/0x760
> Feb 15 12:56:31 t44 kernel:  ksys_ioctl+0x5b/0x90
> Feb 15 12:56:31 t44 kernel:  __x64_sys_ioctl+0x15/0x20
> Feb 15 12:56:31 t44 kernel:  do_syscall_64+0x46/0x100
> Feb 15 12:56:31 t44 kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> Feb 15 12:56:31 t44 kernel: RIP: 0033:0x7f8c1644d137
> Feb 15 12:56:31 t44 kernel: Code: 00 00 00 75 0c 48 c7 c0 ff ff ff ff 48 83 c4 18 c3 e8 2d d4 01 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 19 ed 0c 00 f7 d8 64 89 01 48
> Feb 15 12:56:31 t44 kernel: RSP: 002b:00007ffc2e8fabc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
> Feb 15 12:56:31 t44 kernel: RAX: ffffffffffffffda RBX: 00007ffc2e8fac10 RCX: 00007f8c1644d137
> Feb 15 12:56:31 t44 kernel: RDX: 00007ffc2e8fac10 RSI: 0000000040406469 RDI: 000000000000000d
> Feb 15 12:56:31 t44 kernel: RBP: 0000000040406469 R08: 0000561136d07680 R09: 0000000000000202
> Feb 15 12:56:31 t44 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000561136cca130
> Feb 15 12:56:31 t44 kernel: R13: 000000000000000d R14: 00007f8c15c2cc48 R15: 0000000000000000
> Feb 15 12:56:31 t44 kernel: Modules linked in: af_packet bridge stp llc ip6table_filter ip6_tables xt_MASQUERADE iptable_nat nf_nat nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_recent xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter ip_tables uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videodev videobuf2_common btusb btrtl btbcm btintel bluetooth ecdh_generic ecc rmi_smbus rmi_core mousedev x86_pkg_temp_thermal coretemp i915 kvm_intel kvm irqbypass intel_gtt snd_hda_codec_realtek snd_hda_codec_generic i2c_algo_bit input_leds drm_kms_helper snd_hda_intel wmi_bmof snd_intel_dspcfg cfbfillrect iwlmvm psmouse syscopyarea cfbimgblt aesni_intel glue_helper crypto_simd pcspkr snd_hda_codec atkbd sysfillrect cryptd ehci_pci iwlwifi ehci_hcd sysimgblt fb_sys_fops e1000e cfbcopyarea thinkpad_acpi snd_hda_core i2c_i801 drm snd_pcm ac battery ledtrig_audio tpm_tis tpm_tis_core drm_panel_orientation_quirks snd_timer tpm rng_core agpgart snd i2c_core wmi soun
 dcore thermal evdev
> Feb 15 12:56:31 t44 kernel: CR2: 0000000000000000
> Feb 15 12:56:31 t44 kernel: ---[ end trace 0efcb8355216bb62 ]---
> Feb 15 12:56:31 t44 kernel: RIP: 0010:0x0
> Feb 15 12:56:31 t44 kernel: Code: Bad RIP value.
> Feb 15 12:56:31 t44 kernel: RSP: 0018:ffff9d8780917a40 EFLAGS: 00010087
> Feb 15 12:56:31 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000919dd
> Feb 15 12:56:31 t44 kernel: RDX: 0000000000000000 RSI: ffff8b13d4024b08 RDI: ffff8b149d88a400
> Feb 15 12:56:31 t44 kernel: RBP: ffff8b149d88a400 R08: 0000000000000000 R09: ffff8b13d4024100
> Feb 15 12:56:31 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffff9d8780917a48
> Feb 15 12:56:31 t44 kernel: R13: 0000000000000000 R14: ffff8b14aa17ae00 R15: ffff8b14a39a02c0
> Feb 15 12:56:31 t44 kernel: FS:  00007f8c162148c0(0000) GS:ffff8b14b2600000(0000) knlGS:0000000000000000
> Feb 15 12:56:31 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> Feb 15 12:56:31 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323998005 CR4: 00000000001606f0
> Feb 15 12:57:01 t44 CROND[6715]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
> Feb 15 12:57:06 t44 kernel: elogind-daemon[1422]: Power key pressed.
> Feb 15 12:57:06 t44 kernel: elogind-daemon[1422]: New session c134 of user tfoerste.
> Feb 15 12:57:06 t44 kernel: elogind-daemon[1422]: Removed session c134.
> Feb 15 17:12:40 t44 syslog-ng[1897]: syslog-ng starting up; version='3.22.1'
> 
> 
> 5.4.x are fine

Hi Toralf

Thanks for your report.

Looks like a stray lock counts for the above NULL dereference.

Btw, send pure text message please.

--- a/drivers/gpu/drm/i915/i915_request.c
+++ b/drivers/gpu/drm/i915/i915_request.c
@@ -254,8 +254,7 @@ bool i915_request_retire(struct i915_req
 
 	spin_lock_irq(&rq->lock);
 	i915_request_mark_complete(rq);
-	if (!i915_request_signaled(rq))
-		dma_fence_signal_locked(&rq->fence);
+	dma_fence_signal(&rq->fence);
 	if (test_bit(DMA_FENCE_FLAG_ENABLE_SIGNAL_BIT, &rq->fence.flags))
 		i915_request_cancel_breadcrumb(rq);
 	if (i915_request_has_waitboost(rq)) {

_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/intel-gfx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000
  2020-02-16  3:26 [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 Hillf Danton
@ 2020-02-16 10:33 ` Toralf Förster
  2020-02-16 14:55 ` Hillf Danton
  2020-02-18 22:58 ` [Intel-gfx] ✗ Fi.CI.CHECKPATCH: warning for kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 (rev2) Patchwork
  2 siblings, 0 replies; 7+ messages in thread
From: Toralf Förster @ 2020-02-16 10:33 UTC (permalink / raw)
  To: Hillf Danton; +Cc: intel-gfx, Linux Kernel

On 2/16/20 4:26 AM, Hillf Danton wrote:
> Looks like a stray lock counts for the above NULL dereference.
Hi, the patch applied on top of 5.5.4 breaks the internal display now even in the boot phase.
Gert just a black screen after few seconds, nothing in the logs except:

Feb 16 11:21:57 t44 kernel: elogind-daemon[1431]: Removed session c15.
Feb 16 11:21:57 t44 start-stop-daemon[6462]: Will stop PID 1431
Feb 16 11:21:57 t44 start-stop-daemon[6462]: Sending signal 15 to PID 1431
Feb 16 11:21:57 t44 kernel: elogind-daemon[1431]: Received signal 15 [TERM]
Feb 16 11:21:57 t44 kernel: elogind-daemon[1431]: segfault at 56264c000000 ip 00007fddfcf76882 sp 00007ffc98c721b0 error 4 in libc-2.29.so[7fddfcf0c000+15a000]
Feb 16 11:21:57 t44 kernel: Code: a8 02 75 4c 48 8b 15 05 e5 13 00 64 48 83 3a 00 0f 84 f2 00 00 00 48 8d 3d 2b f2 13 00 a8 04 74 0c 48 89 f0 48 25 00 00 00 fc <48> 8b 38 48 8b 44 24 18 64 48 33 04 25 28 00
00 00 0f 85 f8 00 00
Feb 16 11:21:57 t44 start-stop-daemon[6549]: Will stop /usr/sbin/dnsmasq
Feb 16 11:21:57 t44 start-stop-daemon[6549]: Will stop PID 2764
Feb 16 11:21:57 t44 start-stop-daemon[6549]: Sending signal 15 to PID 2764


>
> Btw, send pure text message please.

Ick, I do sned plain text to LKML, or?

>
> --- a/drivers/gpu/drm/i915/i915_request.c
> +++ b/drivers/gpu/drm/i915/i915_request.c
> @@ -254,8 +254,7 @@ bool i915_request_retire(struct i915_req
>
>  	spin_lock_irq(&rq->lock);
>  	i915_request_mark_complete(rq);
> -	if (!i915_request_signaled(rq))
> -		dma_fence_signal_locked(&rq->fence);
> +	dma_fence_signal(&rq->fence);
>  	if (test_bit(DMA_FENCE_FLAG_ENABLE_SIGNAL_BIT, &rq->fence.flags))
>  		i915_request_cancel_breadcrumb(rq);
>  	if (i915_request_has_waitboost(rq)) {
>


--
Toralf
_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/intel-gfx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000
  2020-02-16  3:26 [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 Hillf Danton
  2020-02-16 10:33 ` Toralf Förster
@ 2020-02-16 14:55 ` Hillf Danton
  2020-02-16 21:17   ` Toralf Förster
  2020-02-17  2:30   ` Hillf Danton
  2020-02-18 22:58 ` [Intel-gfx] ✗ Fi.CI.CHECKPATCH: warning for kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 (rev2) Patchwork
  2 siblings, 2 replies; 7+ messages in thread
From: Hillf Danton @ 2020-02-16 14:55 UTC (permalink / raw)
  To: toralf.foerster; +Cc: intel-gfx, Linux Kernel


On Sun, 16 Feb 2020 11:33:02 +0100 Toralf Foerster wrote:
> On 2/16/20 4:26 AM, Hillf Danton wrote:
> > Looks like a stray lock counts for the above NULL dereference.
> >
> Hi, the patch applied on top of 5.5.4 breaks the internal display now even
>  in the boot phase.

My bad.

Then try to do fence signaling before taking request's lock as we'll
take the fence specific lock if we're in the right direction.

--- a/drivers/gpu/drm/i915/i915_request.c
+++ b/drivers/gpu/drm/i915/i915_request.c
@@ -252,10 +252,10 @@ bool i915_request_retire(struct i915_req
 	 */
 	remove_from_engine(rq);
 
+	dma_fence_signal(&rq->fence);
+
 	spin_lock_irq(&rq->lock);
 	i915_request_mark_complete(rq);
-	if (!i915_request_signaled(rq))
-		dma_fence_signal_locked(&rq->fence);
 	if (test_bit(DMA_FENCE_FLAG_ENABLE_SIGNAL_BIT, &rq->fence.flags))
 		i915_request_cancel_breadcrumb(rq);
 	if (i915_request_has_waitboost(rq)) {

_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/intel-gfx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000
  2020-02-16 14:55 ` Hillf Danton
@ 2020-02-16 21:17   ` Toralf Förster
  2020-02-17  2:30   ` Hillf Danton
  1 sibling, 0 replies; 7+ messages in thread
From: Toralf Förster @ 2020-02-16 21:17 UTC (permalink / raw)
  To: Hillf Danton; +Cc: intel-gfx, Linux Kernel

On 2/16/20 3:55 PM, Hillf Danton wrote:
> 
> On Sun, 16 Feb 2020 11:33:02 +0100 Toralf Foerster wrote:
>> On 2/16/20 4:26 AM, Hillf Danton wrote:
>>> Looks like a stray lock counts for the above NULL dereference.
>>>
>> Hi, the patch applied on top of 5.5.4 breaks the internal display now even
>>  in the boot phase.
> 
> My bad.
> 
> Then try to do fence signaling before taking request's lock as we'll
> take the fence specific lock if we're in the right direction.
> 
> --- a/drivers/gpu/drm/i915/i915_request.c
> +++ b/drivers/gpu/drm/i915/i915_request.c
> @@ -252,10 +252,10 @@ bool i915_request_retire(struct i915_req
>  	 */
>  	remove_from_engine(rq);
>  
> +	dma_fence_signal(&rq->fence);
> +
>  	spin_lock_irq(&rq->lock);
>  	i915_request_mark_complete(rq);
> -	if (!i915_request_signaled(rq))
> -		dma_fence_signal_locked(&rq->fence);
>  	if (test_bit(DMA_FENCE_FLAG_ENABLE_SIGNAL_BIT, &rq->fence.flags))
>  		i915_request_cancel_breadcrumb(rq);
>  	if (i915_request_has_waitboost(rq)) {
> 

This is similar to the behaviour before, the BUG occurres after few minutes/hours.
It brought now:


Feb 16 22:09:01 t44 CROND[8918]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
Feb 16 22:10:01 t44 CROND[8980]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
Feb 16 22:10:37 t44 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000000
Feb 16 22:10:37 t44 kernel: #PF: supervisor instruction fetch in kernel mode
Feb 16 22:10:37 t44 kernel: #PF: error_code(0x0010) - not-present page
Feb 16 22:10:37 t44 kernel: PGD 0 P4D 0 
Feb 16 22:10:37 t44 kernel: Oops: 0010 [#1] SMP PTI
Feb 16 22:10:37 t44 kernel: CPU: 1 PID: 3403 Comm: X Tainted: G                T 5.5.4 #3
Feb 16 22:10:37 t44 kernel: Hardware name: LENOVO 20AQCTO1WW/20AQCTO1WW, BIOS GJET92WW (2.42 ) 03/03/2017
Feb 16 22:10:37 t44 kernel: RIP: 0010:0x0
Feb 16 22:10:37 t44 kernel: Code: Bad RIP value.
Feb 16 22:10:37 t44 kernel: RSP: 0018:ffffad37009eba20 EFLAGS: 00010087
Feb 16 22:10:37 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000e68b0
Feb 16 22:10:37 t44 kernel: RDX: 0000000000000000 RSI: ffff8b35598cba88 RDI: ffff8b362d9146c0
Feb 16 22:10:37 t44 kernel: RBP: ffff8b362d9146c0 R08: 0000000000000000 R09: ffff8b35598cbe00
Feb 16 22:10:37 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffffad37009eba28
Feb 16 22:10:37 t44 kernel: R13: 0000000000000000 R14: ffff8b36a40fa200 R15: ffff8b369bf99600
Feb 16 22:10:37 t44 kernel: FS:  00007f2b751398c0(0000) GS:ffff8b36b2680000(0000) knlGS:0000000000000000
Feb 16 22:10:37 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 16 22:10:37 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323292001 CR4: 00000000001606e0
Feb 16 22:10:37 t44 kernel: Call Trace:
Feb 16 22:10:37 t44 kernel:  dma_fence_signal_locked+0x85/0xc0
Feb 16 22:10:37 t44 kernel:  dma_fence_signal+0x1f/0x40
Feb 16 22:10:37 t44 kernel:  i915_request_retire+0x9a/0x290 [i915]
Feb 16 22:10:37 t44 kernel:  i915_request_create+0x3f/0xc0 [i915]
Feb 16 22:10:37 t44 kernel:  i915_gem_do_execbuffer+0x973/0x17d0 [i915]
Feb 16 22:10:37 t44 kernel:  i915_gem_execbuffer2_ioctl+0xe9/0x3a0 [i915]
Feb 16 22:10:37 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
Feb 16 22:10:37 t44 kernel:  drm_ioctl_kernel+0xae/0x100 [drm]
Feb 16 22:10:37 t44 kernel:  drm_ioctl+0x223/0x400 [drm]
Feb 16 22:10:37 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
Feb 16 22:10:37 t44 kernel:  do_vfs_ioctl+0x4d4/0x760
Feb 16 22:10:37 t44 kernel:  ksys_ioctl+0x5b/0x90
Feb 16 22:10:37 t44 kernel:  __x64_sys_ioctl+0x15/0x20
Feb 16 22:10:37 t44 kernel:  do_syscall_64+0x46/0x100
Feb 16 22:10:37 t44 kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
Feb 16 22:10:37 t44 kernel: RIP: 0033:0x7f2b75372137
Feb 16 22:10:37 t44 kernel: Code: 00 00 00 75 0c 48 c7 c0 ff ff ff ff 48 83 c4 18 c3 e8 2d d4 01 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 19 ed 0c 00 f7 d8 64 89 01 48
Feb 16 22:10:37 t44 kernel: RSP: 002b:00007ffebe2b4c38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
Feb 16 22:10:37 t44 kernel: RAX: ffffffffffffffda RBX: 00007ffebe2b4c80 RCX: 00007f2b75372137
Feb 16 22:10:37 t44 kernel: RDX: 00007ffebe2b4c80 RSI: 0000000040406469 RDI: 000000000000000d
Feb 16 22:10:37 t44 kernel: RBP: 0000000040406469 R08: 0000561477eb8670 R09: 0000000000000202
Feb 16 22:10:37 t44 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000561477e7b0b0
Feb 16 22:10:37 t44 kernel: R13: 000000000000000d R14: 00007f2b74b51c48 R15: 0000000000000000
Feb 16 22:10:37 t44 kernel: Modules linked in: af_packet bridge stp llc ip6table_filter ip6_tables xt_MASQUERADE iptable_nat nf_nat nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_recent xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter ip_tables uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videodev videobuf2_common btusb btrtl btbcm btintel bluetooth ecdh_generic ecc rmi_smbus rmi_core mousedev x86_pkg_temp_thermal coretemp kvm_intel kvm i915 irqbypass intel_gtt i2c_algo_bit drm_kms_helper cfbfillrect syscopyarea input_leds snd_hda_codec_realtek snd_hda_codec_generic cfbimgblt sysfillrect sysimgblt fb_sys_fops cfbcopyarea wmi_bmof snd_hda_intel snd_intel_dspcfg drm snd_hda_codec tpm_tis psmouse aesni_intel snd_hda_core glue_helper crypto_simd iwlmvm cryptd snd_pcm thinkpad_acpi ledtrig_audio tpm_tis_core iwlwifi pcspkr drm_panel_orientation_quirks ehci_pci atkbd e1000e i2c_i801 ehci_hcd tpm thermal snd_timer ac snd soundcore battery rng_core agpgart i
 2c_core wmi evdev
Feb 16 22:10:37 t44 kernel: CR2: 0000000000000000
Feb 16 22:10:37 t44 kernel: ---[ end trace 7df1d4246cb74d36 ]---
Feb 16 22:10:37 t44 kernel: RIP: 0010:0x0
Feb 16 22:10:37 t44 kernel: Code: Bad RIP value.
Feb 16 22:10:37 t44 kernel: RSP: 0018:ffffad37009eba20 EFLAGS: 00010087
Feb 16 22:10:37 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000e68b0
Feb 16 22:10:37 t44 kernel: RDX: 0000000000000000 RSI: ffff8b35598cba88 RDI: ffff8b362d9146c0
Feb 16 22:10:37 t44 kernel: RBP: ffff8b362d9146c0 R08: 0000000000000000 R09: ffff8b35598cbe00
Feb 16 22:10:37 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffffad37009eba28
Feb 16 22:10:37 t44 kernel: R13: 0000000000000000 R14: ffff8b36a40fa200 R15: ffff8b369bf99600
Feb 16 22:10:37 t44 kernel: FS:  00007f2b751398c0(0000) GS:ffff8b36b2680000(0000) knlGS:0000000000000000
Feb 16 22:10:37 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 16 22:10:37 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323292001 CR4: 00000000001606e0
Feb 16 22:11:01 t44 CROND[8996]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
Feb 16 22:12:49 t44 syslog-ng[1912]: syslog-ng starting up; version='3.22.1'
Feb 16 22:12:49 t44 acpid[1943]: starting up with netlink and the input layer




-- 
Toralf
_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/intel-gfx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000
  2020-02-16 14:55 ` Hillf Danton
  2020-02-16 21:17   ` Toralf Förster
@ 2020-02-17  2:30   ` Hillf Danton
  2020-02-18 18:10     ` Chris Wilson
  1 sibling, 1 reply; 7+ messages in thread
From: Hillf Danton @ 2020-02-17  2:30 UTC (permalink / raw)
  To: Toralf Foerster; +Cc: Hillf Danton, intel-gfx, Linux Kernel


On Sun, 16 Feb 2020 22:17:59 +0100 Toralf Foerster wrote:
>
> This is similar to the behaviour before, the BUG occurres after few minutes/hours.
> It brought now:
> 
> 
> Feb 16 22:09:01 t44 CROND[8918]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
> Feb 16 22:10:01 t44 CROND[8980]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
> Feb 16 22:10:37 t44 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000000
> Feb 16 22:10:37 t44 kernel: #PF: supervisor instruction fetch in kernel mode
> Feb 16 22:10:37 t44 kernel: #PF: error_code(0x0010) - not-present page
> Feb 16 22:10:37 t44 kernel: PGD 0 P4D 0 
> Feb 16 22:10:37 t44 kernel: Oops: 0010 [#1] SMP PTI
> Feb 16 22:10:37 t44 kernel: CPU: 1 PID: 3403 Comm: X Tainted: G                T 5.5.4 #3
> Feb 16 22:10:37 t44 kernel: Hardware name: LENOVO 20AQCTO1WW/20AQCTO1WW, BIOS GJET92WW (2.42 ) 03/03/2017
> Feb 16 22:10:37 t44 kernel: RIP: 0010:0x0
> Feb 16 22:10:37 t44 kernel: Code: Bad RIP value.
> Feb 16 22:10:37 t44 kernel: RSP: 0018:ffffad37009eba20 EFLAGS: 00010087
> Feb 16 22:10:37 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000e68b0
> Feb 16 22:10:37 t44 kernel: RDX: 0000000000000000 RSI: ffff8b35598cba88 RDI: ffff8b362d9146c0
> Feb 16 22:10:37 t44 kernel: RBP: ffff8b362d9146c0 R08: 0000000000000000 R09: ffff8b35598cbe00
> Feb 16 22:10:37 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffffad37009eba28
> Feb 16 22:10:37 t44 kernel: R13: 0000000000000000 R14: ffff8b36a40fa200 R15: ffff8b369bf99600
> Feb 16 22:10:37 t44 kernel: FS:  00007f2b751398c0(0000) GS:ffff8b36b2680000(0000) knlGS:0000000000000000
> Feb 16 22:10:37 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> Feb 16 22:10:37 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323292001 CR4: 00000000001606e0
> Feb 16 22:10:37 t44 kernel: Call Trace:
> Feb 16 22:10:37 t44 kernel:  dma_fence_signal_locked+0x85/0xc0
> Feb 16 22:10:37 t44 kernel:  dma_fence_signal+0x1f/0x40
> Feb 16 22:10:37 t44 kernel:  i915_request_retire+0x9a/0x290 [i915]
> Feb 16 22:10:37 t44 kernel:  i915_request_create+0x3f/0xc0 [i915]
> Feb 16 22:10:37 t44 kernel:  i915_gem_do_execbuffer+0x973/0x17d0 [i915]
> Feb 16 22:10:37 t44 kernel:  i915_gem_execbuffer2_ioctl+0xe9/0x3a0 [i915]
> Feb 16 22:10:37 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
> Feb 16 22:10:37 t44 kernel:  drm_ioctl_kernel+0xae/0x100 [drm]
> Feb 16 22:10:37 t44 kernel:  drm_ioctl+0x223/0x400 [drm]
> Feb 16 22:10:37 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
> Feb 16 22:10:37 t44 kernel:  do_vfs_ioctl+0x4d4/0x760
> Feb 16 22:10:37 t44 kernel:  ksys_ioctl+0x5b/0x90
> Feb 16 22:10:37 t44 kernel:  __x64_sys_ioctl+0x15/0x20
> Feb 16 22:10:37 t44 kernel:  do_syscall_64+0x46/0x100
> Feb 16 22:10:37 t44 kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> Feb 16 22:10:37 t44 kernel: RIP: 0033:0x7f2b75372137
> Feb 16 22:10:37 t44 kernel: Code: 00 00 00 75 0c 48 c7 c0 ff ff ff ff 48 83 c4 18 c3 e8 2d d4 01 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 19 ed 0c 00 f7 d8 64 89 01 48
> Feb 16 22:10:37 t44 kernel: RSP: 002b:00007ffebe2b4c38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
> Feb 16 22:10:37 t44 kernel: RAX: ffffffffffffffda RBX: 00007ffebe2b4c80 RCX: 00007f2b75372137
> Feb 16 22:10:37 t44 kernel: RDX: 00007ffebe2b4c80 RSI: 0000000040406469 RDI: 000000000000000d
> Feb 16 22:10:37 t44 kernel: RBP: 0000000040406469 R08: 0000561477eb8670 R09: 0000000000000202
> Feb 16 22:10:37 t44 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000561477e7b0b0
> Feb 16 22:10:37 t44 kernel: R13: 000000000000000d R14: 00007f2b74b51c48 R15: 0000000000000000
> Feb 16 22:10:37 t44 kernel: Modules linked in: af_packet bridge stp llc ip6table_filter ip6_tables xt_MASQUERADE iptable_nat nf_nat nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_recent xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter ip_tables uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videodev videobuf2_common btusb btrtl btbcm btintel bluetooth ecdh_generic ecc rmi_smbus rmi_core mousedev x86_pkg_temp_thermal coretemp kvm_intel kvm i915 irqbypass intel_gtt i2c_algo_bit drm_kms_helper cfbfillrect syscopyarea input_leds snd_hda_codec_realtek snd_hda_codec_generic cfbimgblt sysfillrect sysimgblt fb_sys_fops cfbcopyarea wmi_bmof snd_hda_intel snd_intel_dspcfg drm snd_hda_codec tpm_tis psmouse aesni_intel snd_hda_core glue_helper crypto_simd iwlmvm cryptd snd_pcm thinkpad_acpi ledtrig_audio tpm_tis_core iwlwifi pcspkr drm_panel_orientation_quirks ehci_pci atkbd e1000e i2c_i801 ehci_hcd tpm thermal snd_timer ac snd soundcore battery rng_core agpgart
  i2c_core wmi evdev
> Feb 16 22:10:37 t44 kernel: CR2: 0000000000000000
> Feb 16 22:10:37 t44 kernel: ---[ end trace 7df1d4246cb74d36 ]---
> Feb 16 22:10:37 t44 kernel: RIP: 0010:0x0
> Feb 16 22:10:37 t44 kernel: Code: Bad RIP value.
> Feb 16 22:10:37 t44 kernel: RSP: 0018:ffffad37009eba20 EFLAGS: 00010087
> Feb 16 22:10:37 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000e68b0
> Feb 16 22:10:37 t44 kernel: RDX: 0000000000000000 RSI: ffff8b35598cba88 RDI: ffff8b362d9146c0
> Feb 16 22:10:37 t44 kernel: RBP: ffff8b362d9146c0 R08: 0000000000000000 R09: ffff8b35598cbe00
> Feb 16 22:10:37 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffffad37009eba28
> Feb 16 22:10:37 t44 kernel: R13: 0000000000000000 R14: ffff8b36a40fa200 R15: ffff8b369bf99600
> Feb 16 22:10:37 t44 kernel: FS:  00007f2b751398c0(0000) GS:ffff8b36b2680000(0000) knlGS:0000000000000000
> Feb 16 22:10:37 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> Feb 16 22:10:37 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323292001 CR4: 00000000001606e0
> Feb 16 22:11:01 t44 CROND[8996]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
> Feb 16 22:12:49 t44 syslog-ng[1912]: syslog-ng starting up; version='3.22.1'
> Feb 16 22:12:49 t44 acpid[1943]: starting up with netlink and the input layer

Then it's not lock that counts for the NULL dereference.
And try the debug patch after reverting the last patch.

--- a/drivers/dma-buf/dma-fence.c
+++ b/drivers/dma-buf/dma-fence.c
@@ -129,7 +129,6 @@ EXPORT_SYMBOL(dma_fence_context_alloc);
 int dma_fence_signal_locked(struct dma_fence *fence)
 {
 	struct dma_fence_cb *cur, *tmp;
-	struct list_head cb_list;
 
 	lockdep_assert_held(fence->lock);
 
@@ -137,15 +136,12 @@ int dma_fence_signal_locked(struct dma_f
 				      &fence->flags)))
 		return -EINVAL;
 
-	/* Stash the cb_list before replacing it with the timestamp */
-	list_replace(&fence->cb_list, &cb_list);
-
 	fence->timestamp = ktime_get();
 	set_bit(DMA_FENCE_FLAG_TIMESTAMP_BIT, &fence->flags);
 	trace_dma_fence_signaled(fence);
 
-	list_for_each_entry_safe(cur, tmp, &cb_list, node) {
-		INIT_LIST_HEAD(&cur->node);
+	list_for_each_entry_safe(cur, tmp, &fence->cb_list, node) {
+		list_del_init(&cur->node);
 		cur->func(fence, cur);
 	}
 

_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/intel-gfx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000
  2020-02-17  2:30   ` Hillf Danton
@ 2020-02-18 18:10     ` Chris Wilson
  0 siblings, 0 replies; 7+ messages in thread
From: Chris Wilson @ 2020-02-18 18:10 UTC (permalink / raw)
  To: Hillf Danton, Toralf Foerster; +Cc: Hillf Danton, intel-gfx, Linux Kernel

Quoting Hillf Danton (2020-02-17 02:30:13)
> 
> On Sun, 16 Feb 2020 22:17:59 +0100 Toralf Foerster wrote:
> >
> > This is similar to the behaviour before, the BUG occurres after few minutes/hours.
> > It brought now:
> > 
> > 
> > Feb 16 22:09:01 t44 CROND[8918]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
> > Feb 16 22:10:01 t44 CROND[8980]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
> > Feb 16 22:10:37 t44 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000000
> > Feb 16 22:10:37 t44 kernel: #PF: supervisor instruction fetch in kernel mode
> > Feb 16 22:10:37 t44 kernel: #PF: error_code(0x0010) - not-present page
> > Feb 16 22:10:37 t44 kernel: PGD 0 P4D 0 
> > Feb 16 22:10:37 t44 kernel: Oops: 0010 [#1] SMP PTI
> > Feb 16 22:10:37 t44 kernel: CPU: 1 PID: 3403 Comm: X Tainted: G                T 5.5.4 #3
> > Feb 16 22:10:37 t44 kernel: Hardware name: LENOVO 20AQCTO1WW/20AQCTO1WW, BIOS GJET92WW (2.42 ) 03/03/2017
> > Feb 16 22:10:37 t44 kernel: RIP: 0010:0x0
> > Feb 16 22:10:37 t44 kernel: Code: Bad RIP value.
> > Feb 16 22:10:37 t44 kernel: RSP: 0018:ffffad37009eba20 EFLAGS: 00010087
> > Feb 16 22:10:37 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000e68b0
> > Feb 16 22:10:37 t44 kernel: RDX: 0000000000000000 RSI: ffff8b35598cba88 RDI: ffff8b362d9146c0
> > Feb 16 22:10:37 t44 kernel: RBP: ffff8b362d9146c0 R08: 0000000000000000 R09: ffff8b35598cbe00
> > Feb 16 22:10:37 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffffad37009eba28
> > Feb 16 22:10:37 t44 kernel: R13: 0000000000000000 R14: ffff8b36a40fa200 R15: ffff8b369bf99600
> > Feb 16 22:10:37 t44 kernel: FS:  00007f2b751398c0(0000) GS:ffff8b36b2680000(0000) knlGS:0000000000000000
> > Feb 16 22:10:37 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > Feb 16 22:10:37 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323292001 CR4: 00000000001606e0
> > Feb 16 22:10:37 t44 kernel: Call Trace:
> > Feb 16 22:10:37 t44 kernel:  dma_fence_signal_locked+0x85/0xc0
> > Feb 16 22:10:37 t44 kernel:  dma_fence_signal+0x1f/0x40
> > Feb 16 22:10:37 t44 kernel:  i915_request_retire+0x9a/0x290 [i915]
> > Feb 16 22:10:37 t44 kernel:  i915_request_create+0x3f/0xc0 [i915]
> > Feb 16 22:10:37 t44 kernel:  i915_gem_do_execbuffer+0x973/0x17d0 [i915]
> > Feb 16 22:10:37 t44 kernel:  i915_gem_execbuffer2_ioctl+0xe9/0x3a0 [i915]
> > Feb 16 22:10:37 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
> > Feb 16 22:10:37 t44 kernel:  drm_ioctl_kernel+0xae/0x100 [drm]
> > Feb 16 22:10:37 t44 kernel:  drm_ioctl+0x223/0x400 [drm]
> > Feb 16 22:10:37 t44 kernel:  ? i915_gem_execbuffer_ioctl+0x2c0/0x2c0 [i915]
> > Feb 16 22:10:37 t44 kernel:  do_vfs_ioctl+0x4d4/0x760
> > Feb 16 22:10:37 t44 kernel:  ksys_ioctl+0x5b/0x90
> > Feb 16 22:10:37 t44 kernel:  __x64_sys_ioctl+0x15/0x20
> > Feb 16 22:10:37 t44 kernel:  do_syscall_64+0x46/0x100
> > Feb 16 22:10:37 t44 kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> > Feb 16 22:10:37 t44 kernel: RIP: 0033:0x7f2b75372137
> > Feb 16 22:10:37 t44 kernel: Code: 00 00 00 75 0c 48 c7 c0 ff ff ff ff 48 83 c4 18 c3 e8 2d d4 01 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 19 ed 0c 00 f7 d8 64 89 01 48
> > Feb 16 22:10:37 t44 kernel: RSP: 002b:00007ffebe2b4c38 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
> > Feb 16 22:10:37 t44 kernel: RAX: ffffffffffffffda RBX: 00007ffebe2b4c80 RCX: 00007f2b75372137
> > Feb 16 22:10:37 t44 kernel: RDX: 00007ffebe2b4c80 RSI: 0000000040406469 RDI: 000000000000000d
> > Feb 16 22:10:37 t44 kernel: RBP: 0000000040406469 R08: 0000561477eb8670 R09: 0000000000000202
> > Feb 16 22:10:37 t44 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000561477e7b0b0
> > Feb 16 22:10:37 t44 kernel: R13: 000000000000000d R14: 00007f2b74b51c48 R15: 0000000000000000
> > Feb 16 22:10:37 t44 kernel: Modules linked in: af_packet bridge stp llc ip6table_filter ip6_tables xt_MASQUERADE iptable_nat nf_nat nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_recent xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter ip_tables uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videodev videobuf2_common btusb btrtl btbcm btintel bluetooth ecdh_generic ecc rmi_smbus rmi_core mousedev x86_pkg_temp_thermal coretemp kvm_intel kvm i915 irqbypass intel_gtt i2c_algo_bit drm_kms_helper cfbfillrect syscopyarea input_leds snd_hda_codec_realtek snd_hda_codec_generic cfbimgblt sysfillrect sysimgblt fb_sys_fops cfbcopyarea wmi_bmof snd_hda_intel snd_intel_dspcfg drm snd_hda_codec tpm_tis psmouse aesni_intel snd_hda_core glue_helper crypto_simd iwlmvm cryptd snd_pcm thinkpad_acpi ledtrig_audio tpm_tis_core iwlwifi pcspkr drm_panel_orientation_quirks ehci_pci atkbd e1000e i2c_i801 ehci_hcd tpm thermal snd_timer ac snd soundcore battery rng_core agpga
 rt
>   i2c_core wmi evdev
> > Feb 16 22:10:37 t44 kernel: CR2: 0000000000000000
> > Feb 16 22:10:37 t44 kernel: ---[ end trace 7df1d4246cb74d36 ]---
> > Feb 16 22:10:37 t44 kernel: RIP: 0010:0x0
> > Feb 16 22:10:37 t44 kernel: Code: Bad RIP value.
> > Feb 16 22:10:37 t44 kernel: RSP: 0018:ffffad37009eba20 EFLAGS: 00010087
> > Feb 16 22:10:37 t44 kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000e68b0
> > Feb 16 22:10:37 t44 kernel: RDX: 0000000000000000 RSI: ffff8b35598cba88 RDI: ffff8b362d9146c0
> > Feb 16 22:10:37 t44 kernel: RBP: ffff8b362d9146c0 R08: 0000000000000000 R09: ffff8b35598cbe00
> > Feb 16 22:10:37 t44 kernel: R10: 0000000000000002 R11: 0000000000000005 R12: ffffad37009eba28
> > Feb 16 22:10:37 t44 kernel: R13: 0000000000000000 R14: ffff8b36a40fa200 R15: ffff8b369bf99600
> > Feb 16 22:10:37 t44 kernel: FS:  00007f2b751398c0(0000) GS:ffff8b36b2680000(0000) knlGS:0000000000000000
> > Feb 16 22:10:37 t44 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > Feb 16 22:10:37 t44 kernel: CR2: ffffffffffffffd6 CR3: 0000000323292001 CR4: 00000000001606e0
> > Feb 16 22:11:01 t44 CROND[8996]: (root) CMD (/usr/lib/sa/sa1 30 2 -S XALL)
> > Feb 16 22:12:49 t44 syslog-ng[1912]: syslog-ng starting up; version='3.22.1'
> > Feb 16 22:12:49 t44 acpid[1943]: starting up with netlink and the input layer
> 
> Then it's not lock that counts for the NULL dereference.
> And try the debug patch after reverting the last patch.
> 
> --- a/drivers/dma-buf/dma-fence.c
> +++ b/drivers/dma-buf/dma-fence.c
> @@ -129,7 +129,6 @@ EXPORT_SYMBOL(dma_fence_context_alloc);
>  int dma_fence_signal_locked(struct dma_fence *fence)
>  {
>         struct dma_fence_cb *cur, *tmp;
> -       struct list_head cb_list;
>  
>         lockdep_assert_held(fence->lock);
>  
> @@ -137,15 +136,12 @@ int dma_fence_signal_locked(struct dma_f
>                                       &fence->flags)))
>                 return -EINVAL;
>  
> -       /* Stash the cb_list before replacing it with the timestamp */
> -       list_replace(&fence->cb_list, &cb_list);
> -
>         fence->timestamp = ktime_get();
>         set_bit(DMA_FENCE_FLAG_TIMESTAMP_BIT, &fence->flags);
>         trace_dma_fence_signaled(fence);
>  
> -       list_for_each_entry_safe(cur, tmp, &cb_list, node) {
> -               INIT_LIST_HEAD(&cur->node);
> +       list_for_each_entry_safe(cur, tmp, &fence->cb_list, node) {
> +               list_del_init(&cur->node);
>                 cur->func(fence, cur);
>         }
>  
> 
> _______________________________________________
> Intel-gfx mailing list
> Intel-gfx@lists.freedesktop.org
> https://lists.freedesktop.org/mailman/listinfo/intel-gfx
> 
_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/intel-gfx

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [Intel-gfx] ✗ Fi.CI.CHECKPATCH: warning for kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 (rev2)
  2020-02-16  3:26 [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 Hillf Danton
  2020-02-16 10:33 ` Toralf Förster
  2020-02-16 14:55 ` Hillf Danton
@ 2020-02-18 22:58 ` Patchwork
  2 siblings, 0 replies; 7+ messages in thread
From: Patchwork @ 2020-02-18 22:58 UTC (permalink / raw)
  To: Hillf Danton; +Cc: intel-gfx

== Series Details ==

Series: kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 (rev2)
URL   : https://patchwork.freedesktop.org/series/73585/
State : warning

== Summary ==

$ dim checkpatch origin/drm-tip
053c95b596f5 kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000
-:9: WARNING:COMMIT_LOG_LONG_LINE: Possible unwrapped commit description (prefer a maximum 75 chars per line)
#9: 
> This is similar to the behaviour before, the BUG occurres after few minutes/hours.

-:108: ERROR:MISSING_SIGN_OFF: Missing Signed-off-by: line(s)

total: 1 errors, 1 warnings, 0 checks, 24 lines checked

_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/intel-gfx

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2020-02-18 22:58 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-02-16  3:26 [Intel-gfx] kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 Hillf Danton
2020-02-16 10:33 ` Toralf Förster
2020-02-16 14:55 ` Hillf Danton
2020-02-16 21:17   ` Toralf Förster
2020-02-17  2:30   ` Hillf Danton
2020-02-18 18:10     ` Chris Wilson
2020-02-18 22:58 ` [Intel-gfx] ✗ Fi.CI.CHECKPATCH: warning for kernel 5.5.4: BUG: kernel NULL pointer dereference, address: 000000000000000 (rev2) Patchwork

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).