Your message dated Sun, 04 Jan 2026 10:06:27 +0000
with message-id <[email protected]>
and subject line Bug#1123046: fixed in linux 6.18.3-1
has caused the Debian Bug report #1123046,
regarding linux-image-6.17.11+deb14-amd64: amdgpu kernel oops (regression) in 
6.17.11, not in 6.17.9
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1123046: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1123046
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: linux-image-6.17.11+deb14-amd64
Version: 6.17.11-1
Severity: important
X-Debbugs-Cc: [email protected]
User: [email protected]
Usertags: amd64

Dear Maintainer,

I had my Debian testing desktop reboot after an unattended upgrade where the
kernel was updated from linux-image-6.17.9+deb14-amd64 to
linux-image-6.17.11+deb14-amd64. After reboot overnight, I found the machine
unresponsive in the morning. Rebooting revealed many successive kernel oops
in amdgpu. Oops text below.

The GPU in use is an AMD Radeon R9 270X ("Curacao XT"), from the GCN 1.0
generation. I _am_ using the following argument on the kernel command line
to gain some performance:

amdgpu.ppfeaturemask=0xffffffff

This kernel oops was not occurring in kernels up to and including 6.17.9
(Debian-packaged).

I have not tried to boot 6.17.11 without the amdgpu.ppfeaturemask=0xffffffff
kernel command-line argument to see if the oops still occurs.

I did find that there was some work done on amdgpu in November:

https://lists.freedesktop.org/archives/amd-gfx/2025-November/133356.html

I don't know enough to know whether that work could cause this kernel oops.

Downgrading back to 6.17.9 has eliminated the kernel oops.

Thanks,

Amit Gurdasani

Oops text:

2025-12-16T10:12:43.249625+00:00 athena kernel: amdgpu 0000:01:00.0: 
[drm:amdgpu_ib_ring_tests [amdgpu]] *ERROR* IB test failed on uvd (-110).
2025-12-16T10:12:43.249625+00:00 athena kernel: amdgpu 0000:01:00.0: amdgpu: ib 
ring test failed (-110).
2025-12-16T10:12:43.249627+00:00 athena kernel: BUG: kernel NULL pointer 
dereference, address: 0000000000000000
2025-12-16T10:12:43.249627+00:00 athena kernel: #PF: supervisor instruction 
fetch in kernel mode
2025-12-16T10:12:43.249627+00:00 athena kernel: #PF: error_code(0x0010) - 
not-present page
2025-12-16T10:12:43.249627+00:00 athena kernel: PGD 0 P4D 0 
2025-12-16T10:12:43.249627+00:00 athena kernel: Oops: Oops: 0010 [#1] SMP NOPTI
2025-12-16T10:12:43.249627+00:00 athena kernel: CPU: 2 UID: 0 PID: 564 Comm: 
kworker/2:2 Tainted: G S   U              6.17.11+deb14-amd64 #1 PREEMPT(lazy)  
Debian 6.17.11-1 
2025-12-16T10:12:43.249628+00:00 athena kernel: Tainted: [S]=CPU_OUT_OF_SPEC, 
[U]=USER
2025-12-16T10:12:43.249629+00:00 athena kernel: Hardware name: Gigabyte 
Technology Co., Ltd. Z690 UD DDR4/Z690 UD DDR4, BIOS F29 09/27/2024
2025-12-16T10:12:43.249629+00:00 athena kernel: Workqueue: events 
amdgpu_tlb_fence_work [amdgpu]
2025-12-16T10:12:43.249629+00:00 athena kernel: RIP: 0010:0x0
2025-12-16T10:12:43.249630+00:00 athena kernel: Code: Unable to access opcode 
bytes at 0xffffffffffffffd6.
2025-12-16T10:12:43.249630+00:00 athena kernel: RSP: 0018:ffffca9902dbfde0 
EFLAGS: 00010246
2025-12-16T10:12:43.249630+00:00 athena kernel: RAX: 0000000000000000 RBX: 
0000000000008000 RCX: 0000000000000001
2025-12-16T10:12:43.249632+00:00 athena kernel: RDX: 0000000000000002 RSI: 
0000000000008000 RDI: ffff8a34a8a00000
2025-12-16T10:12:43.249633+00:00 athena kernel: RBP: 0000000000000001 R08: 
0000000000000000 R09: 0000000000000001
2025-12-16T10:12:43.249633+00:00 athena kernel: R10: 0000000000000002 R11: 
0000000000000000 R12: 0000000000000000
2025-12-16T10:12:43.249633+00:00 athena kernel: R13: 0000000000000002 R14: 
0000000000000000 R15: ffff8a34a8a00000
2025-12-16T10:12:43.249633+00:00 athena kernel: FS:  0000000000000000(0000) 
GS:ffff8a3c8a288000(0000) knlGS:0000000000000000
2025-12-16T10:12:43.249633+00:00 athena kernel: CS:  0010 DS: 0000 ES: 0000 
CR0: 0000000080050033
2025-12-16T10:12:43.249635+00:00 athena kernel: CR2: ffffffffffffffd6 CR3: 
000000018082c000 CR4: 0000000000f50ef0
2025-12-16T10:12:43.249635+00:00 athena kernel: PKRU: 55555554
2025-12-16T10:12:43.249635+00:00 athena kernel: Call Trace:
2025-12-16T10:12:43.249635+00:00 athena kernel:  <TASK>
2025-12-16T10:12:43.249635+00:00 athena kernel:  
amdgpu_gmc_flush_gpu_tlb_pasid+0xd6/0x400 [amdgpu]
2025-12-16T10:12:43.249635+00:00 athena kernel:  
amdgpu_tlb_fence_work+0x6e/0xe0 [amdgpu]
2025-12-16T10:12:43.249636+00:00 athena kernel:  process_one_work+0x18f/0x350
2025-12-16T10:12:43.249638+00:00 athena kernel:  worker_thread+0x25a/0x3a0
2025-12-16T10:12:43.249638+00:00 athena kernel:  ? __pfx_worker_thread+0x10/0x10
2025-12-16T10:12:43.249639+00:00 athena kernel:  kthread+0xf9/0x240
2025-12-16T10:12:43.249639+00:00 athena kernel:  ? __pfx_kthread+0x10/0x10
2025-12-16T10:12:43.249639+00:00 athena kernel:  ? __pfx_kthread+0x10/0x10
2025-12-16T10:12:43.249639+00:00 athena kernel:  ret_from_fork+0x194/0x1c0
2025-12-16T10:12:43.249640+00:00 athena kernel:  ? __pfx_kthread+0x10/0x10
2025-12-16T10:12:43.249641+00:00 athena kernel:  ret_from_fork_asm+0x1a/0x30
2025-12-16T10:12:43.249641+00:00 athena kernel:  </TASK>
2025-12-16T10:12:43.249641+00:00 athena kernel: Modules linked in: dm_thin_pool 
dm_persistent_data dm_bio_prison dm_bufio raid1 dm_raid raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx md_mod xor 
hid_generic usbhid hid raid6_pq amdgpu(+) dm_mod xe uas usb_storage intel_vsec 
sr_mod drm_gpuvm configfs amdxcp cdrom sd_mod drm_panel_backlight_quirks 
drm_gpusvm_helper gpu_sched crc16 i915 radeon drm_ttm_helper drm_buddy ttm 
drm_exec drm_suballoc_helper i2c_algo_bit drm_display_helper cec rc_core 
drm_client_lib ahci drm_kms_helper iTCO_wdt intel_pmc_bxt libahci 
xhci_pci_renesas iTCO_vendor_support drm xhci_pci libata watchdog mxm_wmi nvme 
xhci_hcd r8169 nvme_core realtek mdio_devres scsi_mod usbcore libphy video 
nvme_keyring intel_lpss_pci i2c_i801 mdio_bus intel_lpss nvme_auth wmi fan 
i2c_smbus scsi_common button pinctrl_alderlake usb_common idma64 efivarfs
2025-12-16T10:12:43.249643+00:00 athena kernel: CR2: 0000000000000000
2025-12-16T10:12:43.249646+00:00 athena kernel: ---[ end trace 0000000000000000 
]---
2025-12-16T10:12:43.249646+00:00 athena kernel: RIP: 0010:0x0
2025-12-16T10:12:43.249647+00:00 athena kernel: Code: Unable to access opcode 
bytes at 0xffffffffffffffd6.
2025-12-16T10:12:43.249647+00:00 athena kernel: RSP: 0018:ffffca9902dbfde0 
EFLAGS: 00010246
2025-12-16T10:12:43.249647+00:00 athena kernel: RAX: 0000000000000000 RBX: 
0000000000008000 RCX: 0000000000000001
2025-12-16T10:12:43.249647+00:00 athena kernel: RDX: 0000000000000002 RSI: 
0000000000008000 RDI: ffff8a34a8a00000
2025-12-16T10:12:43.249647+00:00 athena kernel: RBP: 0000000000000001 R08: 
0000000000000000 R09: 0000000000000001
2025-12-16T10:12:43.249649+00:00 athena kernel: R10: 0000000000000002 R11: 
0000000000000000 R12: 0000000000000000
2025-12-16T10:12:43.249649+00:00 athena kernel: R13: 0000000000000002 R14: 
0000000000000000 R15: ffff8a34a8a00000
2025-12-16T10:12:43.249649+00:00 athena kernel: FS:  0000000000000000(0000) 
GS:ffff8a3c8a288000(0000) knlGS:0000000000000000
2025-12-16T10:12:43.249649+00:00 athena kernel: CS:  0010 DS: 0000 ES: 0000 
CR0: 0000000080050033
2025-12-16T10:12:43.249649+00:00 athena kernel: CR2: ffffffffffffffd6 CR3: 
000000018082c000 CR4: 0000000000f50ef0
2025-12-16T10:12:43.249649+00:00 athena kernel: PKRU: 55555554
2025-12-16T10:12:43.249651+00:00 athena kernel: note: kworker/2:2[564] exited 
with irqs disabled



-- System Information:
Debian Release: forky/sid
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.17.9+deb14-amd64 (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_CPU_OUT_OF_SPEC, TAINT_USER, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-6.17.11+deb14-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.150
ii  kmod                                    34.2-2
ii  linux-base                              4.14

Versions of packages linux-image-6.17.11+deb14-amd64 recommends:
ii  apparmor  4.1.0-1+b1

Versions of packages linux-image-6.17.11+deb14-amd64 suggests:
pn  debian-kernel-handbook               <none>
ii  firmware-linux-free                  20241210-2
pn  grub-pc | grub-efi-amd64 | extlinux  <none>
pn  linux-doc-6.17                       <none>

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.18.3-1
Done: Salvatore Bonaccorso <[email protected]>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <[email protected]> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 02 Jan 2026 18:44:35 +0100
Source: linux
Architecture: source
Version: 6.18.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team <[email protected]>
Changed-By: Salvatore Bonaccorso <[email protected]>
Closes: 1123046
Changes:
 linux (6.18.3-1) unstable; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.18.3
 .
   [ Aurelien Jarno ]
   * Add breaks against u-boot-efi-dtb (<< 5) on architectures with DTB files.
 .
   [ Bastian Blank ]
   * Don't remove own files in clean target.  This fixes the contents of
     kernel-image udebs.
 .
   [ Salvatore Bonaccorso ]
   * drm/amdgpu: don't attach the tlb fence for SI (Closes: #1123046)
   * sched/proxy: Yield the donor task
Checksums-Sha1:
 253120f2e0cd746fe53013502785318017e23923 188042 linux_6.18.3-1.dsc
 68102712ea9bbbc325e9ab47e82db149a2eed45b 157370668 linux_6.18.3.orig.tar.xz
 57712a75df0c64e27482d6cb19d5aebfe6289e84 1448248 linux_6.18.3-1.debian.tar.xz
 4e6d3809907e983c3a832455256f4ede7dfd53f3 6933 linux_6.18.3-1_source.buildinfo
Checksums-Sha256:
 bb8b2ea6c244793690a88c751ee5271ced9f37b910ef565bf5b7a184c705a45a 188042 
linux_6.18.3-1.dsc
 48b96f5ac168dc3e13d407a0aeb4ca236e0f7f362544ba772555a1aff6eaf669 157370668 
linux_6.18.3.orig.tar.xz
 ecf0fbd96248acf06c42f1310b8038c6d3c0bb998006f2c778e7ae6616434080 1448248 
linux_6.18.3-1.debian.tar.xz
 451d8ffcfba741e319f29e886cc30396029cebe4a702b3668b196ea43f9de75b 6933 
linux_6.18.3-1_source.buildinfo
Files:
 fcffafde229cfc0c24561c5a3d59a8f7 188042 kernel optional linux_6.18.3-1.dsc
 98bb8564e0b99cbf1532c1950783ceb2 157370668 kernel optional 
linux_6.18.3.orig.tar.xz
 06b5ac7609c2ea5c030c7085a9d5934b 1448248 kernel optional 
linux_6.18.3-1.debian.tar.xz
 2f3461bc889ae534bf7a28e9502d5124 6933 kernel optional 
linux_6.18.3-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=nv7q
-----END PGP SIGNATURE-----

Attachment: pgpz5slqk7HY2.pgp
Description: PGP signature


--- End Message ---

Reply via email to