From: bugzilla-daemon@bugzilla.kernel.org To: dri-devel@lists.freedesktop.org Subject: [Bug 207383] [Regression] 5.7 amdgpu/polaris11 gpf: amdgpu_atomic_commit_tail Date: Mon, 22 Jun 2020 17:57:25 +0000 Message-ID: <bug-207383-2300-In0rNBlZYI@https.bugzilla.kernel.org/> (raw) In-Reply-To: <bug-207383-2300@https.bugzilla.kernel.org/> https://bugzilla.kernel.org/show_bug.cgi?id=207383 --- Comment #18 from rtmasura+kernel@hotmail.com --- lspci: 00:00.0 Host bridge: Advanced Micro Devices, Inc. [AMD/ATI] RD890 Northbridge only single slot PCI-e GFX Hydra part (rev 02) 00:00.2 IOMMU: Advanced Micro Devices, Inc. [AMD/ATI] RD890S/RD990 I/O Memory Management Unit (IOMMU) 00:02.0 PCI bridge: Advanced Micro Devices, Inc. [AMD/ATI] RD890/RD9x0/RX980 PCI to PCI bridge (PCI Express GFX port 0) 00:04.0 PCI bridge: Advanced Micro Devices, Inc. [AMD/ATI] RD890/RD9x0/RX980 PCI to PCI bridge (PCI Express GPP Port 0) 00:07.0 PCI bridge: Advanced Micro Devices, Inc. [AMD/ATI] RD890/RD9x0/RX980 PCI to PCI bridge (PCI Express GPP Port 3) 00:0b.0 PCI bridge: Advanced Micro Devices, Inc. [AMD/ATI] RD890/RD990 PCI to PCI bridge (PCI Express GFX2 port 0) 00:0d.0 PCI bridge: Advanced Micro Devices, Inc. [AMD/ATI] RD890/RD9x0/RX980 PCI to PCI bridge (PCI Express GPP2 Port 0) 00:11.0 RAID bus controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 SATA Controller [RAID5 mode] (rev 40) 00:12.0 USB controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 USB OHCI0 Controller 00:12.2 USB controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 USB EHCI Controller 00:13.0 USB controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 USB OHCI0 Controller 00:13.2 USB controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 USB EHCI Controller 00:14.0 SMBus: Advanced Micro Devices, Inc. [AMD/ATI] SBx00 SMBus Controller (rev 42) 00:14.2 Audio device: Advanced Micro Devices, Inc. [AMD/ATI] SBx00 Azalia (Intel HDA) (rev 40) 00:14.3 ISA bridge: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 LPC host controller (rev 40) 00:14.4 PCI bridge: Advanced Micro Devices, Inc. [AMD/ATI] SBx00 PCI to PCI Bridge (rev 40) 00:14.5 USB controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 USB OHCI2 Controller 00:16.0 USB controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 USB OHCI0 Controller 00:16.2 USB controller: Advanced Micro Devices, Inc. [AMD/ATI] SB7x0/SB8x0/SB9x0 USB EHCI Controller 00:18.0 Host bridge: Advanced Micro Devices, Inc. [AMD] Family 10h Processor HyperTransport Configuration 00:18.1 Host bridge: Advanced Micro Devices, Inc. [AMD] Family 10h Processor Address Map 00:18.2 Host bridge: Advanced Micro Devices, Inc. [AMD] Family 10h Processor DRAM Controller 00:18.3 Host bridge: Advanced Micro Devices, Inc. [AMD] Family 10h Processor Miscellaneous Control 00:18.4 Host bridge: Advanced Micro Devices, Inc. [AMD] Family 10h Processor Link Control 02:00.0 PCI bridge: PLX Technology, Inc. PEX 8624 24-lane, 6-Port PCI Express Gen 2 (5.0 GT/s) Switch [ExpressLane] (rev bb) 03:04.0 PCI bridge: PLX Technology, Inc. PEX 8624 24-lane, 6-Port PCI Express Gen 2 (5.0 GT/s) Switch [ExpressLane] (rev bb) 03:05.0 PCI bridge: PLX Technology, Inc. PEX 8624 24-lane, 6-Port PCI Express Gen 2 (5.0 GT/s) Switch [ExpressLane] (rev bb) 03:06.0 PCI bridge: PLX Technology, Inc. PEX 8624 24-lane, 6-Port PCI Express Gen 2 (5.0 GT/s) Switch [ExpressLane] (rev bb) 03:08.0 PCI bridge: PLX Technology, Inc. PEX 8624 24-lane, 6-Port PCI Express Gen 2 (5.0 GT/s) Switch [ExpressLane] (rev bb) 03:09.0 PCI bridge: PLX Technology, Inc. PEX 8624 24-lane, 6-Port PCI Express Gen 2 (5.0 GT/s) Switch [ExpressLane] (rev bb) 04:00.0 Ethernet controller: Intel Corporation 82576 Gigabit Network Connection (rev 01) 04:00.1 Ethernet controller: Intel Corporation 82576 Gigabit Network Connection (rev 01) 06:00.0 Ethernet controller: Intel Corporation 82576 Gigabit Network Connection (rev 01) 06:00.1 Ethernet controller: Intel Corporation 82576 Gigabit Network Connection (rev 01) 07:00.0 Ethernet controller: Intel Corporation 82576 Gigabit Network Connection (rev 01) 07:00.1 Ethernet controller: Intel Corporation 82576 Gigabit Network Connection (rev 01) 09:00.0 VGA compatible controller: NVIDIA Corporation GP104GL [Quadro P4000] (rev a1) 09:00.1 Audio device: NVIDIA Corporation GP104 High Definition Audio Controller (rev a1) 0a:00.0 USB controller: NEC Corporation uPD720200 USB 3.0 Host Controller (rev 03) 0b:00.0 SATA controller: JMicron Technology Corp. JMB363 SATA/IDE Controller (rev 03) 0b:00.1 IDE interface: JMicron Technology Corp. JMB363 SATA/IDE Controller (rev 03) 0c:00.0 PCI bridge: Advanced Micro Devices, Inc. [AMD] Device 1470 (rev c3) 0d:00.0 PCI bridge: Advanced Micro Devices, Inc. [AMD] Device 1471 0e:00.0 VGA compatible controller: Advanced Micro Devices, Inc. [AMD/ATI] Vega 10 XL/XT [Radeon RX Vega 56/64] (rev c3) 0e:00.1 Audio device: Advanced Micro Devices, Inc. [AMD/ATI] Vega 10 HDMI Audio [Radeon Vega 56/64] A few notes on that: The AMD Vega56 is used for this PC, the Quadro P4000 is disabled on my system and passed through to VMs. I haven't found any way to trigger it. Seems completely random. Sat down this morning to update a VM (not the one with the nvidia passthrough) and it froze, wasn't any real graphical things going on other than normal KDE stuff. lscpu: Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian Address sizes: 48 bits physical, 48 bits virtual CPU(s): 6 On-line CPU(s) list: 0-5 Thread(s) per core: 1 Core(s) per socket: 6 Socket(s): 1 NUMA node(s): 1 Vendor ID: AuthenticAMD CPU family: 16 Model: 10 Model name: AMD Phenom(tm) II X6 1090T Processor Stepping: 0 CPU MHz: 3355.192 BogoMIPS: 6421.46 Virtualization: AMD-V L1d cache: 384 KiB L1i cache: 384 KiB L2 cache: 3 MiB L3 cache: 6 MiB NUMA node0 CPU(s): 0-5 Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Not affected Vulnerability Mds: Not affected Vulnerability Meltdown: Not affected Vulnerability Spec store bypass: Not affected Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled, RSB filling Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext fxsr_ opt pdpe1gb rdtscp lm 3dnowext 3dnow constant_tsc rep_good nopl nonstop_tsc cpuid extd_apicid aperfmperf pni monitor cx16 po pcnt lahf_lm cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs skinit wdt cpb hw_pstate vmmcall npt lbrv svm_lock nrip_save pausefilter I would be happy to help with any testing, just let me know what information you need. -- You are receiving this mail because: You are watching the assignee of the bug. _______________________________________________ dri-devel mailing list dri-devel@lists.freedesktop.org https://lists.freedesktop.org/mailman/listinfo/dri-devel
next prev parent reply index Thread overview: 121+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-04-21 9:51 [Bug 207383] New: [Regression] 5.7-rc: " bugzilla-daemon 2020-04-21 9:57 ` [Bug 207383] " bugzilla-daemon 2020-04-21 10:04 ` bugzilla-daemon 2020-04-23 4:59 ` bugzilla-daemon 2020-04-27 19:24 ` bugzilla-daemon 2020-04-27 19:42 ` bugzilla-daemon 2020-04-27 19:43 ` bugzilla-daemon 2020-05-01 8:20 ` bugzilla-daemon 2020-05-01 8:28 ` bugzilla-daemon 2020-05-02 16:03 ` bugzilla-daemon 2020-05-03 15:10 ` bugzilla-daemon 2020-05-05 4:23 ` bugzilla-daemon 2020-05-06 17:46 ` bugzilla-daemon 2020-05-06 22:06 ` bugzilla-daemon 2020-06-03 0:04 ` [Bug 207383] [Regression] 5.7 " bugzilla-daemon 2020-06-21 7:01 ` bugzilla-daemon 2020-06-22 15:20 ` bugzilla-daemon 2020-06-22 17:44 ` bugzilla-daemon 2020-06-22 17:57 ` bugzilla-daemon [this message] 2020-06-22 19:36 ` bugzilla-daemon 2020-06-22 20:00 ` bugzilla-daemon 2020-06-23 15:36 ` bugzilla-daemon 2020-06-23 23:41 ` bugzilla-daemon 2020-06-24 8:55 ` bugzilla-daemon 2020-06-27 4:37 ` bugzilla-daemon 2020-06-27 4:38 ` bugzilla-daemon 2020-06-27 5:16 ` bugzilla-daemon 2020-06-27 6:08 ` bugzilla-daemon 2020-06-27 7:07 ` bugzilla-daemon 2020-06-27 22:26 ` bugzilla-daemon 2020-06-28 1:12 ` bugzilla-daemon 2020-06-28 10:48 ` bugzilla-daemon 2020-06-28 15:30 ` bugzilla-daemon 2020-06-29 7:39 ` bugzilla-daemon 2020-06-29 22:09 ` bugzilla-daemon 2020-07-01 19:08 ` bugzilla-daemon 2020-07-04 19:57 ` bugzilla-daemon 2020-07-04 20:13 ` bugzilla-daemon 2020-07-05 16:58 ` bugzilla-daemon 2020-07-05 22:08 ` bugzilla-daemon 2020-07-06 16:24 ` bugzilla-daemon 2020-07-06 23:57 ` bugzilla-daemon 2020-07-07 0:37 ` bugzilla-daemon 2020-07-07 3:01 ` bugzilla-daemon 2020-07-07 11:01 ` bugzilla-daemon 2020-07-07 12:43 ` bugzilla-daemon 2020-07-07 15:27 ` bugzilla-daemon 2020-07-07 19:05 ` bugzilla-daemon 2020-07-08 0:25 ` bugzilla-daemon 2020-07-08 1:25 ` bugzilla-daemon 2020-07-08 20:16 ` bugzilla-daemon 2020-07-08 20:17 ` bugzilla-daemon 2020-07-09 7:45 ` bugzilla-daemon 2020-07-10 7:23 ` bugzilla-daemon 2020-07-10 7:36 ` bugzilla-daemon 2020-07-10 8:10 ` bugzilla-daemon 2020-07-10 10:55 ` bugzilla-daemon 2020-07-10 11:25 ` bugzilla-daemon 2020-07-10 14:31 ` bugzilla-daemon 2020-07-12 5:20 ` bugzilla-daemon 2020-07-12 5:47 ` bugzilla-daemon 2020-07-12 7:47 ` bugzilla-daemon 2020-07-14 23:36 ` bugzilla-daemon 2020-07-15 16:49 ` bugzilla-daemon 2020-07-15 17:12 ` bugzilla-daemon 2020-07-16 2:12 ` bugzilla-daemon 2020-07-16 6:37 ` bugzilla-daemon 2020-07-16 9:35 ` bugzilla-daemon 2020-07-16 10:24 ` bugzilla-daemon 2020-07-16 10:30 ` bugzilla-daemon 2020-07-16 10:32 ` bugzilla-daemon 2020-07-17 12:39 ` bugzilla-daemon 2020-07-20 2:20 ` bugzilla-daemon 2020-07-21 16:40 ` bugzilla-daemon 2020-07-21 16:57 ` bugzilla-daemon 2020-07-21 19:32 ` bugzilla-daemon 2020-07-21 20:33 ` bugzilla-daemon 2020-07-21 20:49 ` bugzilla-daemon 2020-07-21 20:56 ` bugzilla-daemon 2020-07-21 21:16 ` bugzilla-daemon 2020-07-22 2:03 ` bugzilla-daemon 2020-07-22 2:05 ` bugzilla-daemon 2020-07-22 3:37 ` bugzilla-daemon 2020-07-22 7:27 ` bugzilla-daemon 2020-07-22 13:04 ` bugzilla-daemon 2020-07-23 0:48 ` bugzilla-daemon 2020-07-23 5:46 ` bugzilla-daemon 2020-07-23 21:30 ` bugzilla-daemon 2020-07-23 21:34 ` bugzilla-daemon 2020-07-24 7:18 ` bugzilla-daemon 2020-07-24 7:24 ` bugzilla-daemon 2020-07-24 19:08 ` bugzilla-daemon 2020-07-24 21:00 ` bugzilla-daemon 2020-07-25 2:38 ` bugzilla-daemon 2020-07-26 6:47 ` bugzilla-daemon 2020-07-26 18:40 ` bugzilla-daemon 2020-07-26 19:55 ` bugzilla-daemon 2020-07-26 22:52 ` bugzilla-daemon 2020-07-26 23:30 ` bugzilla-daemon 2020-07-26 23:52 ` bugzilla-daemon 2020-07-27 6:11 ` bugzilla-daemon 2020-07-27 16:55 ` bugzilla-daemon 2020-07-28 2:29 ` bugzilla-daemon 2020-07-28 3:21 ` bugzilla-daemon 2020-07-28 3:39 ` bugzilla-daemon 2020-07-28 7:14 ` bugzilla-daemon 2020-07-29 2:33 ` bugzilla-daemon 2020-07-29 6:41 ` bugzilla-daemon 2020-07-29 16:02 ` bugzilla-daemon 2020-07-29 16:37 ` bugzilla-daemon 2020-07-29 16:45 ` bugzilla-daemon 2020-07-29 20:32 ` bugzilla-daemon 2020-07-31 16:38 ` bugzilla-daemon 2020-08-02 1:40 ` bugzilla-daemon 2020-08-02 13:06 ` bugzilla-daemon 2020-08-03 13:51 ` bugzilla-daemon 2020-08-05 16:10 ` bugzilla-daemon 2020-08-17 5:45 ` bugzilla-daemon 2021-01-06 6:36 ` bugzilla-daemon 2021-01-06 12:05 ` bugzilla-daemon 2021-01-06 18:59 ` bugzilla-daemon
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=bug-207383-2300-In0rNBlZYI@https.bugzilla.kernel.org/ \ --to=bugzilla-daemon@bugzilla.kernel.org \ --cc=dri-devel@lists.freedesktop.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
dri-devel Archive on lore.kernel.org Archives are clonable: git clone --mirror https://lore.kernel.org/dri-devel/0 dri-devel/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 dri-devel dri-devel/ https://lore.kernel.org/dri-devel \ dri-devel@lists.freedesktop.org public-inbox-index dri-devel Example config snippet for mirrors Newsgroup available over NNTP: nntp://nntp.lore.kernel.org/org.freedesktop.lists.dri-devel AGPL code for this site: git clone https://public-inbox.org/public-inbox.git