Bug 110411 - GUI lock up for KVM guest in drm_atomic_helper_commit_modeset_disables()
Summary: GUI lock up for KVM guest in drm_atomic_helper_commit_modeset_disables()
Status: RESOLVED FIXED
Alias: None
Product: DRI
Classification: Unclassified
Component: DRM/other (show other bugs)
Version: unspecified
Hardware: PowerPC Linux (All)
: medium normal
Assignee: Default DRI bug account
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2019-04-12 09:46 UTC by Dan Horák
Modified: 2019-05-02 08:59 UTC (History)
0 users

See Also:
i915 platform:
i915 features:


Attachments

Description Dan Horák 2019-04-12 09:46:43 UTC
I see lock ups in KVM guests on Power9 HW on kernels 5.1 rc3 and rc4 with following in the kernel log

...
dub 12 10:04:06 localhost.localdomain kernel: BUG: Unable to handle kernel instruction fetch (NULL pointer?)
dub 12 10:04:06 localhost.localdomain kernel: Faulting instruction address: 0x00000000
dub 12 10:04:06 localhost.localdomain kernel: Oops: Kernel access of bad area, sig: 11 [#1]
dub 12 10:04:06 localhost.localdomain kernel: LE PAGE_SIZE=64K MMU=Radix MMU=Hash SMP NR_CPUS=1024 NUMA pSeries
dub 12 10:04:06 localhost.localdomain kernel: Modules linked in: xt_CHECKSUM ipt_MASQUERADE tun bridge stp llc kvm_hv kvm ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 >
dub 12 10:04:06 localhost.localdomain kernel: CPU: 2 PID: 1136 Comm: Xorg Not tainted 5.1.0-0.rc4.git0.1.fc31.op.1.ppc64le #1
dub 12 10:04:06 localhost.localdomain kernel: NIP:  0000000000000000 LR: c008000002bb2bf4 CTR: 0000000000000000
dub 12 10:04:06 localhost.localdomain kernel: REGS: c0000001f2beb5e0 TRAP: 0400   Not tainted  (5.1.0-0.rc4.git0.1.fc31.op.1.ppc64le)
dub 12 10:04:06 localhost.localdomain kernel: MSR:  8000000040009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 24882240  XER: 00000000
dub 12 10:04:06 localhost.localdomain kernel: CFAR: c008000002bb2bf0 IRQMASK: 0 
                                              GPR00: c008000002bb2904 c0000001f2beb870 c008000002bdc900 c0000000046de050 
                                              GPR04: 0000000000000003 000000000000001f c0000001fc6cf1b8 0000000000000001 
                                              GPR08: 00000000000e0000 0000000000000000 0000000000000001 c00800000289f238 
                                              GPR12: 0000000000000000 c00000000fffce00 0000000000000000 c0000001f1daa000 
                                              GPR16: 0000000000000001 0000000133e14880 ffffffffffffffff 0000000133796b90 
                                              GPR20: c0000001f2beba98 c0000001f7ebe000 c0000001f2bebc28 0000000133e0ac90 
                                              GPR24: c0000000032a5c00 c0000001f1daa000 c008000002c438e0 0000000000000001 
                                              GPR28: c0000001f1d63000 0000000000000000 c0000000046de050 c0000001f14a2400 
dub 12 10:04:06 localhost.localdomain kernel: NIP [0000000000000000]           (null)
dub 12 10:04:06 localhost.localdomain kernel: LR [c008000002bb2bf4] drm_atomic_helper_commit_modeset_disables+0x4ac/0x510 [drm_kms_helper]
dub 12 10:04:06 localhost.localdomain kernel: Call Trace:
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2beb910] [c008000002bb2f90] drm_atomic_helper_commit_tail+0x38/0xb0 [drm_kms_helper]
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2beb940] [c008000002bb30d8] commit_tail+0xd0/0xe0 [drm_kms_helper]
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2beb970] [c008000002bb3498] drm_atomic_helper_commit+0x1e0/0x1f0 [drm_kms_helper]
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2beb9b0] [c008000002841498] drm_atomic_commit+0x70/0xa0 [drm]
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2beba20] [c00800000285b068] drm_mode_atomic_ioctl+0x960/0xab8 [drm]
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2bebb60] [c00800000282888c] drm_ioctl_kernel+0xe4/0x190 [drm]
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2bebbc0] [c008000002828dc8] drm_ioctl+0x240/0x4a0 [drm]
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2bebd10] [c00000000041e4c0] do_vfs_ioctl+0x8a0/0xa50
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2bebdb0] [c00000000041e734] ksys_ioctl+0xc4/0x110
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2bebe00] [c00000000041e7a8] sys_ioctl+0x28/0x80
dub 12 10:04:06 localhost.localdomain kernel: [c0000001f2bebe20] [c00000000000b9e4] system_call+0x5c/0x70
dub 12 10:04:06 localhost.localdomain kernel: Instruction dump:
dub 12 10:04:06 localhost.localdomain kernel: XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
dub 12 10:04:06 localhost.localdomain kernel: XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
dub 12 10:04:06 localhost.localdomain kernel: ---[ end trace 48e51fd2d6ea8877 ]---
Comment 1 Dan Horák 2019-04-12 09:47:48 UTC
maybe dmesg output will be better readable

[ 1406.907978] BUG: Unable to handle kernel instruction fetch (NULL pointer?)
[ 1406.907986] Faulting instruction address: 0x00000000
[ 1406.907990] Oops: Kernel access of bad area, sig: 11 [#1]
[ 1406.907994] LE PAGE_SIZE=64K MMU=Radix MMU=Hash SMP NR_CPUS=1024 NUMA pSeries
[ 1406.907998] Modules linked in: xt_CHECKSUM ipt_MASQUERADE tun bridge stp llc kvm_hv kvm ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables sunrpc vmx_crypto crct10dif_vpmsum virtio_balloon virtio_blk bochs_drm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm drm_panel_orientation_quirks i2c_core virtio_net net_failover crc32c_vpmsum virtio_console failover
[ 1406.908046] CPU: 2 PID: 1136 Comm: Xorg Not tainted 5.1.0-0.rc4.git0.1.fc31.op.1.ppc64le #1
[ 1406.908048] NIP:  0000000000000000 LR: c008000002bb2bf4 CTR: 0000000000000000
[ 1406.908052] REGS: c0000001f2beb5e0 TRAP: 0400   Not tainted  (5.1.0-0.rc4.git0.1.fc31.op.1.ppc64le)
[ 1406.908053] MSR:  8000000040009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 24882240  XER: 00000000
[ 1406.908060] CFAR: c008000002bb2bf0 IRQMASK: 0 
               GPR00: c008000002bb2904 c0000001f2beb870 c008000002bdc900 c0000000046de050 
               GPR04: 0000000000000003 000000000000001f c0000001fc6cf1b8 0000000000000001 
               GPR08: 00000000000e0000 0000000000000000 0000000000000001 c00800000289f238 
               GPR12: 0000000000000000 c00000000fffce00 0000000000000000 c0000001f1daa000 
               GPR16: 0000000000000001 0000000133e14880 ffffffffffffffff 0000000133796b90 
               GPR20: c0000001f2beba98 c0000001f7ebe000 c0000001f2bebc28 0000000133e0ac90 
               GPR24: c0000000032a5c00 c0000001f1daa000 c008000002c438e0 0000000000000001 
               GPR28: c0000001f1d63000 0000000000000000 c0000000046de050 c0000001f14a2400 
[ 1406.908079] NIP [0000000000000000]           (null)
[ 1406.908091] LR [c008000002bb2bf4] drm_atomic_helper_commit_modeset_disables+0x4ac/0x510 [drm_kms_helper]
[ 1406.908093] Call Trace:
[ 1406.908101] [c0000001f2beb910] [c008000002bb2f90] drm_atomic_helper_commit_tail+0x38/0xb0 [drm_kms_helper]
[ 1406.908110] [c0000001f2beb940] [c008000002bb30d8] commit_tail+0xd0/0xe0 [drm_kms_helper]
[ 1406.908117] [c0000001f2beb970] [c008000002bb3498] drm_atomic_helper_commit+0x1e0/0x1f0 [drm_kms_helper]
[ 1406.908133] [c0000001f2beb9b0] [c008000002841498] drm_atomic_commit+0x70/0xa0 [drm]
[ 1406.908145] [c0000001f2beba20] [c00800000285b068] drm_mode_atomic_ioctl+0x960/0xab8 [drm]
[ 1406.908156] [c0000001f2bebb60] [c00800000282888c] drm_ioctl_kernel+0xe4/0x190 [drm]
[ 1406.908167] [c0000001f2bebbc0] [c008000002828dc8] drm_ioctl+0x240/0x4a0 [drm]
[ 1406.908173] [c0000001f2bebd10] [c00000000041e4c0] do_vfs_ioctl+0x8a0/0xa50
[ 1406.908176] [c0000001f2bebdb0] [c00000000041e734] ksys_ioctl+0xc4/0x110
[ 1406.908179] [c0000001f2bebe00] [c00000000041e7a8] sys_ioctl+0x28/0x80
[ 1406.908185] [c0000001f2bebe20] [c00000000000b9e4] system_call+0x5c/0x70
[ 1406.908186] Instruction dump:
[ 1406.908190] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
[ 1406.908193] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
[ 1406.908198] ---[ end trace 48e51fd2d6ea8877 ]---


Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.