Bug 1213777 - Desktop crash after showing X server screen for 2 seconds under 5.14.21-150400.24.69
Summary: Desktop crash after showing X server screen for 2 seconds under 5.14.21-15040...
Status: RESOLVED FIXED
Alias: None
Product: openSUSE Distribution
Classification: openSUSE
Component: Kernel (show other bugs)
Version: Leap 15.4
Hardware: x86-64 openSUSE Leap 15.4
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: openSUSE Kernel Bugs
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-29 11:43 UTC by Jiri Wiesner
Modified: 2024-06-25 17:52 UTC (History)
5 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
system log (3.49 MB, text/plain)
2023-07-29 11:43 UTC, Jiri Wiesner
Details
supportconfig (1.81 MB, application/x-xz-compressed-tar)
2023-07-29 11:55 UTC, Jiri Wiesner
Details
system log 07/31 (1.69 MB, text/plain)
2023-07-31 08:42 UTC, Jiri Wiesner
Details
dmesg 5.14.21-150400.1.1.g008e441 (75.06 KB, text/plain)
2023-07-31 11:58 UTC, Jiri Wiesner
Details
dmesg 5.14.21-150500.154.gd780c14 (70.47 KB, text/plain)
2023-07-31 12:34 UTC, Jiri Wiesner
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Jiri Wiesner 2023-07-29 11:43:15 UTC
Created attachment 868499 [details]
system log

When I boot up my home desktop machine, the kernel crashes after starting the Xorg server and showing a desktop environment for roughly 2 seconds (it logs in automatically so no display manager screen). The screen becomes blank but the monitor does not switch off, as it would if it did not have a signal. I cannot see my mouse cursor. The keyboard works. I cannot switch to the virtual terminal with Ctrl+Alt+F1. I can only reboot the system with Alt+SysRq+RSEIUB. The issue started appearing with kernel 5.14.21-150400.24.69-default. When I boot 5.14.21-150400.24.63-default the system runs without crashes.

When crashing the kernel reports:
> 2023-07-28T21:02:43.640138+02:00 a8 kernel: [   28.453952][   T39] [drm:drm_atomic_helper_wait_for_flip_done [drm_kms_helper]] *ERROR* [CRTC:47:crtc-0] flip_done timed out
> 2023-07-28T21:03:11.032065+02:00 a8 kernel: [   55.845648][ T1100] [drm:drm_crtc_commit_wait [drm]] *ERROR* flip_done timed out
> 2023-07-28T21:03:11.032091+02:00 a8 kernel: [   55.845705][ T1100] [drm:drm_atomic_helper_wait_for_dependencies [drm_kms_helper]] *ERROR* [CRTC:47:crtc-0] commit wait timed out
> 2023-07-28T21:03:21.272067+02:00 a8 kernel: [   66.085539][ T1100] [drm:drm_crtc_commit_wait [drm]] *ERROR* flip_done timed out
> 2023-07-28T21:03:21.272090+02:00 a8 kernel: [   66.085597][ T1100] [drm:drm_atomic_helper_wait_for_dependencies [drm_kms_helper]] *ERROR* [PLANE:44:plane-2] commit wait timed out
> 2023-07-28T21:03:21.609685+02:00 a8 kernel: [   66.422658][ T1100] ------------[ cut here ]------------
> 2023-07-28T21:03:21.609731+02:00 a8 kernel: [   66.422667][ T1100] WARNING: CPU: 3 PID: 1100 at ../drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm.c:8849 amdgpu_dm_atomic_commit_tail+0x25d0/0x2690 [amdgpu]
> 2023-07-28T21:03:21.609738+02:00 a8 kernel: [   66.423215][ T1100] Modules linked in: af_packet nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bpfilter dmi_sysfs msr btrfs blake2b_generic xor raid6_pq libcrc32c snd_hda_codec_realtek snd_hda_codec_hdmi snd_hda_codec_generic ledtrig_audio edac_mce_amd kvm_amd ccp kvm acp_audio_dma snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_soc_core snd_hda_codec eeepc_wmi(N) irqbypass r8169 asus_wmi battery snd_virtuoso joydev sparse_keymap snd_oxygen_lib platform_profile snd_compress realtek snd_hda_core snd_mpu401_uart snd_rawmidi snd_pcm_dmaengine snd_hwdep snd_seq_device mdio_devres rfkill wmi_bmof k10temp fam15h_power
> 2023-07-28T21:03:21.609742+02:00 a8 kernel: [   66.423307][ T1100]  libphy snd_pcm pcspkr snd_timer snd soundcore i2c_piix4 acpi_cpufreq button fuse configfs ip_tables x_tables ext4 crc16 mbcache jbd2 hid_generic usbhid crc32_pclmul crc32c_intel sr_mod sd_mod cdrom t10_pi ghash_clmulni_intel amdgpu aesni_intel drm_ttm_helper ttm mfd_core iommu_v2 gpu_sched i2c_algo_bit crypto_simd drm_kms_helper ohci_pci cryptd syscopyarea sysfillrect sysimgblt fb_sys_fops cec xhci_pci xhci_pci_renesas rc_core ahci libahci drm xhci_hcd libata ohci_hcd ehci_pci ehci_hcd usbcore sp5100_tco(N) wmi video sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod
> 2023-07-28T21:03:21.609745+02:00 a8 kernel: [   66.423389][ T1100] Supported: No, Unsupported modules are loaded
> 2023-07-28T21:03:21.609748+02:00 a8 kernel: [   66.423392][ T1100] CPU: 3 PID: 1100 Comm: X Tainted: G                  N 5.14.21-150400.24.69-default #1 SLE15-SP4 1b2f56af8db80e8a794291b61535b8da014315cf
> 2023-07-28T21:03:21.609750+02:00 a8 kernel: [   66.423400][ T1100] Hardware name: System manufacturer System Product Name/A68HM-PLUS, BIOS 2011 10/17/2018
> 2023-07-28T21:03:21.609753+02:00 a8 kernel: [   66.423402][ T1100] RIP: 0010:amdgpu_dm_atomic_commit_tail+0x25d0/0x2690 [amdgpu]
> 2023-07-28T21:03:21.609755+02:00 a8 kernel: [   66.423786][ T1100] Code: 8d ff 4c 8b 9d 18 fd ff ff 4c 8b 95 20 fd ff ff e9 1b ea ff ff 31 c9 48 85 c0 0f 85 3d eb ff ff b8 01 00 00 00 e9 3b eb ff ff <0f> 0b e9 36 f9 ff ff 0f 0b 0f 0b e9 4c f9 ff ff e8 0b af 00 00 e9
> 2023-07-28T21:03:21.609757+02:00 a8 kernel: [   66.423790][ T1100] RSP: 0018:ffffac7ec0a6b8c0 EFLAGS: 00010002
> 2023-07-28T21:03:21.609795+02:00 a8 kernel: [   66.423794][ T1100] RAX: 0000000000000286 RBX: 0000000000000286 RCX: ffff8a6b50ada120
> 2023-07-28T21:03:21.609798+02:00 a8 kernel: [   66.423797][ T1100] RDX: 0000000000000001 RSI: 0000000000000293 RDI: ffff8a6b51580178
> 2023-07-28T21:03:21.609801+02:00 a8 kernel: [   66.423799][ T1100] RBP: ffffac7ec0a6bbd0 R08: ffffac7ec0a6b82c R09: ffff8a6b87240000
> 2023-07-28T21:03:21.609804+02:00 a8 kernel: [   66.423801][ T1100] R10: ffff8a6b872401f0 R11: 0000000000000000 R12: 0000000000000002
> 2023-07-28T21:03:21.609806+02:00 a8 kernel: [   66.423803][ T1100] R13: ffff8a6b567a7600 R14: ffff8a6b8c45c480 R15: ffff8a6b50ada000 
> 2023-07-28T21:03:21.609809+02:00 a8 kernel: [   66.423806][ T1100] FS:  00007fde8c8aa640(0000) GS:ffff8a6c57580000(0000) knlGS:0000000000000000
> 2023-07-28T21:03:21.609811+02:00 a8 kernel: [   66.423809][ T1100] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> 2023-07-28T21:03:21.609814+02:00 a8 kernel: [   66.423811][ T1100] CR2: 00007fde89c1b470 CR3: 00000002174ca000 CR4: 00000000001506e0
> 2023-07-28T21:03:21.609816+02:00 a8 kernel: [   66.423815][ T1100] Call Trace:
> 2023-07-28T21:03:21.609818+02:00 a8 kernel: [   66.423823][ T1100]  <TASK>
> 2023-07-28T21:03:21.609820+02:00 a8 kernel: [   66.423834][ T1100]  ? ttm_bo_mem_compat+0x23/0x60 [ttm 0dfd3206a9ddf1acb8a1c677a5e3c05f0c837faa]
> 2023-07-28T21:03:21.609822+02:00 a8 kernel: [   66.423853][ T1100]  commit_tail+0x94/0x120 [drm_kms_helper d7f1f0e373c4e3525adc7bac8832f9a70639331a]
> 2023-07-28T21:03:21.609824+02:00 a8 kernel: [   66.423901][ T1100]  drm_atomic_helper_commit+0x10f/0x140 [drm_kms_helper d7f1f0e373c4e3525adc7bac8832f9a70639331a]
> 2023-07-28T21:03:21.609826+02:00 a8 kernel: [   66.423932][ T1100]  drm_atomic_helper_set_config+0x83/0xb0 [drm_kms_helper d7f1f0e373c4e3525adc7bac8832f9a70639331a]
> 2023-07-28T21:03:21.609828+02:00 a8 kernel: [   66.423964][ T1100]  drm_mode_setcrtc+0x1b4/0x700 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.609831+02:00 a8 kernel: [   66.424037][ T1100]  ? drm_mode_getcrtc+0x190/0x190 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.609833+02:00 a8 kernel: [   66.424082][ T1100]  drm_ioctl_kernel+0xb6/0x100 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.609835+02:00 a8 kernel: [   66.424125][ T1100]  drm_ioctl+0x35a/0x400 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.609838+02:00 a8 kernel: [   66.424167][ T1100]  ? drm_mode_getcrtc+0x190/0x190 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.609840+02:00 a8 kernel: [   66.424214][ T1100]  amdgpu_drm_ioctl+0x49/0x80 [amdgpu ef1d9c359f934f04a95ce457d3a44e5a2caca718]
> 2023-07-28T21:03:21.609842+02:00 a8 kernel: [   66.424601][ T1100]  __x64_sys_ioctl+0x92/0xd0
> 2023-07-28T21:03:21.609845+02:00 a8 kernel: [   66.424610][ T1100]  do_syscall_64+0x5b/0x80
> 2023-07-28T21:03:21.609847+02:00 a8 kernel: [   66.424617][ T1100]  ? exit_to_user_mode_prepare+0x1dc/0x230
> 2023-07-28T21:03:21.609849+02:00 a8 kernel: [   66.424623][ T1100]  ? syscall_exit_to_user_mode+0x18/0x40
> 2023-07-28T21:03:21.609852+02:00 a8 kernel: [   66.424627][ T1100]  ? do_syscall_64+0x67/0x80
> 2023-07-28T21:03:21.609855+02:00 a8 kernel: [   66.424630][ T1100]  ? exit_to_user_mode_prepare+0x1cc/0x230
> 2023-07-28T21:03:21.609857+02:00 a8 kernel: [   66.424633][ T1100]  ? exit_to_user_mode_prepare+0x1cc/0x230
> 2023-07-28T21:03:21.609859+02:00 a8 kernel: [   66.424637][ T1100]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
> 2023-07-28T21:03:21.609862+02:00 a8 kernel: [   66.424643][ T1100] RIP: 0033:0x7fde8b632437
> 2023-07-28T21:03:21.609864+02:00 a8 kernel: [   66.424647][ T1100] Code: 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 29 da 0d 00 f7 d8 64 89 01 48
> 2023-07-28T21:03:21.609867+02:00 a8 kernel: [   66.424651][ T1100] RSP: 002b:00007ffe5a13a1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
> 2023-07-28T21:03:21.609869+02:00 a8 kernel: [   66.424655][ T1100] RAX: ffffffffffffffda RBX: 00007ffe5a13a1e0 RCX: 00007fde8b632437
> 2023-07-28T21:03:21.609871+02:00 a8 kernel: [   66.424657][ T1100] RDX: 00007ffe5a13a1e0 RSI: 00000000c06864a2 RDI: 000000000000000d
> 2023-07-28T21:03:21.609873+02:00 a8 kernel: [   66.424660][ T1100] RBP: 00007ffe5a13a1e0 R08: 0000000000000000 R09: 0000556be2f59100
> 2023-07-28T21:03:21.609876+02:00 a8 kernel: [   66.424662][ T1100] R10: 00007ffe5a13a2a0 R11: 0000000000000246 R12: 00000000c06864a2
> 2023-07-28T21:03:21.609878+02:00 a8 kernel: [   66.424664][ T1100] R13: 000000000000000d R14: 0000000000000000 R15: 0000556be2f59100
> 2023-07-28T21:03:21.609881+02:00 a8 kernel: [   66.424668][ T1100]  </TASK>
> 2023-07-28T21:03:21.609883+02:00 a8 kernel: [   66.424670][ T1100] ---[ end trace 8e2e2fb21833b4ec ]--- 
> 2023-07-28T21:03:21.609885+02:00 a8 kernel: [   66.424774][ T1100] ------------[ cut here ]------------
> 2023-07-28T21:03:21.609887+02:00 a8 kernel: [   66.424776][ T1100] WARNING: CPU: 3 PID: 1100 at ../drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm.c:8425 amdgpu_dm_atomic_commit_tail+0x25d9/0x2690 [amdgpu]
> 2023-07-28T21:03:21.609891+02:00 a8 kernel: [   66.425215][ T1100] Modules linked in: af_packet nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bpfilter dmi_sysfs msr btrfs blake2b_generic xor raid6_pq libcrc32c snd_hda_codec_realtek snd_hda_codec_hdmi snd_hda_codec_generic ledtrig_audio edac_mce_amd kvm_amd ccp kvm acp_audio_dma snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_soc_core snd_hda_codec eeepc_wmi(N) irqbypass r8169 asus_wmi battery snd_virtuoso joydev sparse_keymap snd_oxygen_lib platform_profile snd_compress realtek snd_hda_core snd_mpu401_uart snd_rawmidi snd_pcm_dmaengine snd_hwdep snd_seq_device mdio_devres rfkill wmi_bmof k10temp fam15h_power
> 2023-07-28T21:03:21.609916+02:00 a8 kernel: [   66.425307][ T1100]  libphy snd_pcm pcspkr snd_timer snd soundcore i2c_piix4 acpi_cpufreq button fuse configfs ip_tables x_tables ext4 crc16 mbcache jbd2 hid_generic usbhid crc32_pclmul crc32c_intel sr_mod sd_mod cdrom t10_pi ghash_clmulni_intel amdgpu aesni_intel drm_ttm_helper ttm mfd_core iommu_v2 gpu_sched i2c_algo_bit crypto_simd drm_kms_helper ohci_pci cryptd syscopyarea sysfillrect sysimgblt fb_sys_fops cec xhci_pci xhci_pci_renesas rc_core ahci libahci drm xhci_hcd libata ohci_hcd ehci_pci ehci_hcd usbcore sp5100_tco(N) wmi video sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod
> 2023-07-28T21:03:21.609919+02:00 a8 kernel: [   66.425395][ T1100] Supported: No, Unsupported modules are loaded
> 2023-07-28T21:03:21.609921+02:00 a8 kernel: [   66.425398][ T1100] CPU: 3 PID: 1100 Comm: X Tainted: G        W         N 5.14.21-150400.24.69-default #1 SLE15-SP4 1b2f56af8db80e8a794291b61535b8da014315cf
> 2023-07-28T21:03:21.609923+02:00 a8 kernel: [   66.425405][ T1100] Hardware name: System manufacturer System Product Name/A68HM-PLUS, BIOS 2011 10/17/2018
> 2023-07-28T21:03:21.610011+02:00 a8 kernel: [   66.425407][ T1100] RIP: 0010:amdgpu_dm_atomic_commit_tail+0x25d9/0x2690 [amdgpu]
> 2023-07-28T21:03:21.610015+02:00 a8 kernel: [   66.425859][ T1100] Code: 4c 8b 95 20 fd ff ff e9 1b ea ff ff 31 c9 48 85 c0 0f 85 3d eb ff ff b8 01 00 00 00 e9 3b eb ff ff 0f 0b e9 36 f9 ff ff 0f 0b <0f> 0b e9 4c f9 ff ff e8 0b af 00 00 e9 18 ef ff ff 48 8b bd 30 fd
> 2023-07-28T21:03:21.610018+02:00 a8 kernel: [   66.425863][ T1100] RSP: 0018:ffffac7ec0a6b8c0 EFLAGS: 00010086
> 2023-07-28T21:03:21.610020+02:00 a8 kernel: [   66.425867][ T1100] RAX: 0000000000000286 RBX: 0000000000000286 RCX: ffff8a6b50ada120
> 2023-07-28T21:03:21.610022+02:00 a8 kernel: [   66.425869][ T1100] RDX: 0000000000000001 RSI: 0000000000000293 RDI: ffff8a6b51580178
> 2023-07-28T21:03:21.610024+02:00 a8 kernel: [   66.425872][ T1100] RBP: ffffac7ec0a6bbd0 R08: ffffac7ec0a6b82c R09: ffff8a6b87240000
> 2023-07-28T21:03:21.610026+02:00 a8 kernel: [   66.425874][ T1100] R10: ffff8a6b872401f0 R11: 0000000000000000 R12: 0000000000000002
> 2023-07-28T21:03:21.610029+02:00 a8 kernel: [   66.425876][ T1100] R13: ffff8a6b567a7600 R14: ffff8a6b8c45c480 R15: ffff8a6b50ada000
> 2023-07-28T21:03:21.610031+02:00 a8 kernel: [   66.425879][ T1100] FS:  00007fde8c8aa640(0000) GS:ffff8a6c57580000(0000) knlGS:0000000000000000
> 2023-07-28T21:03:21.610033+02:00 a8 kernel: [   66.425882][ T1100] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> 2023-07-28T21:03:21.610034+02:00 a8 kernel: [   66.425884][ T1100] CR2: 00007fde89c1b470 CR3: 00000002174ca000 CR4: 00000000001506e0
> 2023-07-28T21:03:21.610036+02:00 a8 kernel: [   66.425887][ T1100] Call Trace:
> 2023-07-28T21:03:21.610038+02:00 a8 kernel: [   66.425891][ T1100]  <TASK>
> 2023-07-28T21:03:21.610041+02:00 a8 kernel: [   66.425900][ T1100]  ? ttm_bo_mem_compat+0x23/0x60 [ttm 0dfd3206a9ddf1acb8a1c677a5e3c05f0c837faa]
> 2023-07-28T21:03:21.610042+02:00 a8 kernel: [   66.425920][ T1100]  commit_tail+0x94/0x120 [drm_kms_helper d7f1f0e373c4e3525adc7bac8832f9a70639331a]
> 2023-07-28T21:03:21.610044+02:00 a8 kernel: [   66.425966][ T1100]  drm_atomic_helper_commit+0x10f/0x140 [drm_kms_helper d7f1f0e373c4e3525adc7bac8832f9a70639331a]
> 2023-07-28T21:03:21.610046+02:00 a8 kernel: [   66.425997][ T1100]  drm_atomic_helper_set_config+0x83/0xb0 [drm_kms_helper d7f1f0e373c4e3525adc7bac8832f9a70639331a]
> 2023-07-28T21:03:21.610048+02:00 a8 kernel: [   66.426029][ T1100]  drm_mode_setcrtc+0x1b4/0x700 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.610050+02:00 a8 kernel: [   66.426100][ T1100]  ? drm_mode_getcrtc+0x190/0x190 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.610053+02:00 a8 kernel: [   66.426144][ T1100]  drm_ioctl_kernel+0xb6/0x100 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.610054+02:00 a8 kernel: [   66.426187][ T1100]  drm_ioctl+0x35a/0x400 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.610056+02:00 a8 kernel: [   66.426230][ T1100]  ? drm_mode_getcrtc+0x190/0x190 [drm 9916538b76c712814c70629db6c4c269b42aa5d0]
> 2023-07-28T21:03:21.610059+02:00 a8 kernel: [   66.426276][ T1100]  amdgpu_drm_ioctl+0x49/0x80 [amdgpu ef1d9c359f934f04a95ce457d3a44e5a2caca718]
> 2023-07-28T21:03:21.610061+02:00 a8 kernel: [   66.426672][ T1100]  __x64_sys_ioctl+0x92/0xd0
> 2023-07-28T21:03:21.610063+02:00 a8 kernel: [   66.426680][ T1100]  do_syscall_64+0x5b/0x80
> 2023-07-28T21:03:21.610065+02:00 a8 kernel: [   66.426686][ T1100]  ? exit_to_user_mode_prepare+0x1dc/0x230
> 2023-07-28T21:03:21.610067+02:00 a8 kernel: [   66.426693][ T1100]  ? syscall_exit_to_user_mode+0x18/0x40
> 2023-07-28T21:03:21.610069+02:00 a8 kernel: [   66.426697][ T1100]  ? do_syscall_64+0x67/0x80
> 2023-07-28T21:03:21.610070+02:00 a8 kernel: [   66.426700][ T1100]  ? exit_to_user_mode_prepare+0x1cc/0x230
> 2023-07-28T21:03:21.610072+02:00 a8 kernel: [   66.426703][ T1100]  ? exit_to_user_mode_prepare+0x1cc/0x230
> 2023-07-28T21:03:21.610074+02:00 a8 kernel: [   66.426706][ T1100]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
> 2023-07-28T21:03:21.610076+02:00 a8 kernel: [   66.426712][ T1100] RIP: 0033:0x7fde8b632437
> 2023-07-28T21:03:21.610078+02:00 a8 kernel: [   66.426716][ T1100] Code: 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 29 da 0d 00 f7 d8 64 89 01 48
> 2023-07-28T21:03:21.610080+02:00 a8 kernel: [   66.426719][ T1100] RSP: 002b:00007ffe5a13a1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
> 2023-07-28T21:03:21.610082+02:00 a8 kernel: [   66.426723][ T1100] RAX: ffffffffffffffda RBX: 00007ffe5a13a1e0 RCX: 00007fde8b632437
> 2023-07-28T21:03:21.610084+02:00 a8 kernel: [   66.426726][ T1100] RDX: 00007ffe5a13a1e0 RSI: 00000000c06864a2 RDI: 000000000000000d
> 2023-07-28T21:03:21.610086+02:00 a8 kernel: [   66.426728][ T1100] RBP: 00007ffe5a13a1e0 R08: 0000000000000000 R09: 0000556be2f59100
> 2023-07-28T21:03:21.610088+02:00 a8 kernel: [   66.426730][ T1100] R10: 00007ffe5a13a2a0 R11: 0000000000000246 R12: 00000000c06864a2
> 2023-07-28T21:03:21.610090+02:00 a8 kernel: [   66.426732][ T1100] R13: 000000000000000d R14: 0000000000000000 R15: 0000556be2f59100
> 2023-07-28T21:03:21.610091+02:00 a8 kernel: [   66.426736][ T1100]  </TASK>
> 2023-07-28T21:03:21.610093+02:00 a8 kernel: [   66.426738][ T1100] ---[ end trace 8e2e2fb21833b4ed ]---

See the attached messages file for more.
Comment 1 Jiri Wiesner 2023-07-29 11:55:50 UTC
Created attachment 868500 [details]
supportconfig

This could be a graphics driver issue. My machine runs an AMD A8-7680 Radeon R7, 10 Compute Cores 4C+6G without any discrete graphics card. Changes were made to the DRM code between rpm-5.14.21-150400.24.63 and rpm-5.14.21-150400.24.69, mostly git-fixes backports.
Could someone from the GFX team take a look at it when you get some free time? As far as I am concerned, it is not urgent.
Comment 2 Takashi Iwai 2023-07-30 08:30:57 UTC
Could you check whether the problem still appears with the latest kernel in OBS Kernel:SLE15-SP4 repo?

Also, it'd be helpful if you can narrow down the kernel regression range, too.
e.g. does *-66 kernel still work or already broken?

If *-66 works, it might be the bug 1213304, and I asked for testing a few more kernels to narrow down more.

Or, if *-66 is already broken, the bug must be between *-63 and *-66.  There are quite a few kernels available in KOTD archive
  https://kerncvs.suse.de/kernel-overview/?b=SLE15-SP4;a=kotd;p=sle15-sp4
so you can try it out to figure out the culprit commit.
Comment 3 Jiri Wiesner 2023-07-31 08:42:51 UTC
Created attachment 868523 [details]
system log 07/31

I ran a few more tests. I used the kernels from bug 1213304 comment 11. This is the result:
5.14.21-150400.24.63            works
5.14.21-150400.24.66            works
5.14.21-150400.1.g0cdd6ba       works
5.14.21-150400.1.g79cdf12       fails
> 2023-07-31T10:28:40.872619+02:00 a8 kernel: [   27.762786][  T355] [drm:drm_atomic_helper_wait_for_flip_done [drm_kms_helper]] *ERROR* [CRTC:47:crtc-0] flip_done timed out
5.14.21-150400.24.69            fails
> 2023-07-28T21:02:43.640138+02:00 a8 kernel: [   28.453952][   T39] [drm:drm_atomic_helper_wait_for_flip_done [drm_kms_helper]] *ERROR* [CRTC:47:crtc-0] flip_done timed out
5.14.21-150400.474.g43f1612     fails
> 2023-07-31T09:47:55.731990+02:00 a8 kernel: [   28.468200][    T8] [drm:drm_atomic_helper_wait_for_flip_done [drm_kms_helper]] *ERROR* [CRTC:47:crtc-0] flip_done timed out
Comment 4 Takashi Iwai 2023-07-31 09:10:49 UTC
Thanks!

Now the suspected patches are narrowed down to 5.

patches.suse/drm-amd-display-Add-minimal-pipe-split-transition-st.patch
patches.suse/drm-amd-display-Use-dc_update_planes_and_stream.patch
patches.suse/drm-amd-display-Add-wrapper-to-call-planes-and-strea.patch
patches.suse/drm-amd-display-edp-do-not-add-non-edid-timings.patch
patches.suse/drm-amd-display-fix-the-system-hang-while-disable-PS.patch

And the patch 4 has been already reverted, so we have 4 patches left.

My bet is either the patch 2 or 3, and I'm building a kernel dropping those in OBS home:tiwai:bsc1213777-1 repo.
In OBS home:tiwai:bsc1213777-2, other two are dropped, instead.
Please give them a try later.

Let's see which one wins :)
Comment 5 Takashi Iwai 2023-07-31 11:23:34 UTC
(In reply to Takashi Iwai from comment #4)
> My bet is either the patch 2 or 3, and I'm building a kernel dropping those
> in OBS home:tiwai:bsc1213777-1 repo.
> In OBS home:tiwai:bsc1213777-2, other two are dropped, instead.

It turned out that the patch 1 can't be dropped alone due to dependencies.  So I'm rebuilding OBS home:tiwai:bsc1213777-2 only with the drop of patch 5.

Meanwhile, OBS home:tiwai:bsc1213777-1 is ready for testing, and if this one works, it'll be sufficient for SLE15-SP4.  Please check it at first.
Comment 6 Jiri Wiesner 2023-07-31 11:58:15 UTC
Created attachment 868531 [details]
dmesg 5.14.21-150400.1.1.g008e441

(In reply to Takashi Iwai from comment #5)
> Meanwhile, OBS home:tiwai:bsc1213777-1 is ready for testing, and if this one
> works, it'll be sufficient for SLE15-SP4.  Please check it at first.
5.14.21-150400.1.1.g008e441     works
Comment 7 Takashi Iwai 2023-07-31 12:18:08 UTC
(In reply to Jiri Wiesner from comment #6)
> Created attachment 868531 [details]
> dmesg 5.14.21-150400.1.1.g008e441
> 
> (In reply to Takashi Iwai from comment #5)
> > Meanwhile, OBS home:tiwai:bsc1213777-1 is ready for testing, and if this one
> > works, it'll be sufficient for SLE15-SP4.  Please check it at first.
> 5.14.21-150400.1.1.g008e441     works

Good to hear!  Then I'll push this drop to SLE15-SP4.

One last favor: could you do a quick test of the latest SLE15-SP5 kernel on your SP4 system and verify whether it hits the same problem or not?  Get the kernel from OBS Kernel:SLE15-SP5 repo.
Comment 8 Jiri Wiesner 2023-07-31 12:34:29 UTC
Created attachment 868533 [details]
dmesg 5.14.21-150500.154.gd780c14

(In reply to Takashi Iwai from comment #7)
> One last favor: could you do a quick test of the latest SLE15-SP5 kernel on
> your SP4 system and verify whether it hits the same problem or not?  Get the
> kernel from OBS Kernel:SLE15-SP5 repo.
The latest 15sp5 kernel works:
5.14.21-150500.154.gd780c14     works
Comment 9 Takashi Iwai 2023-07-31 13:10:54 UTC
Thanks!  Then all done now, the fix will be included in the next maintenance update in August.
Comment 10 Jiri Wiesner 2023-07-31 13:17:20 UTC
Thank you for your help, Takashi.
Comment 30 Maintenance Automation 2023-08-14 08:30:34 UTC
SUSE-SU-2023:3302-1: An update that solves 28 vulnerabilities, contains two features and has 115 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1187829, 1193629, 1194869, 1206418, 1207129, 1207894, 1207948, 1208788, 1210335, 1210565, 1210584, 1210627, 1210780, 1210825, 1210853, 1211014, 1211131, 1211243, 1211738, 1211811, 1211867, 1212051, 1212256, 1212265, 1212301, 1212445, 1212456, 1212502, 1212525, 1212603, 1212604, 1212685, 1212766, 1212835, 1212838, 1212842, 1212846, 1212848, 1212861, 1212869, 1212892, 1212901, 1212905, 1212961, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213116, 1213134, 1213167, 1213205, 1213206, 1213226, 1213233, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213417, 1213493, 1213523, 1213524, 1213533, 1213543, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-1829, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2430, CVE-2023-2985, CVE-2023-3090, CVE-2023-31083, CVE-2023-3111, CVE-2023-3117, CVE-2023-31248, CVE-2023-3212, CVE-2023-3268, CVE-2023-3389, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Jira References: PED-4718, PED-4758
Sources used:
openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1, kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_3-1-150500.11.5.1
SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.11.1, kernel-source-rt-5.14.21-150500.13.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 31 Maintenance Automation 2023-08-14 16:30:19 UTC
SUSE-SU-2023:3313-1: An update that solves 13 vulnerabilities and has 20 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1210627, 1210780, 1211131, 1211738, 1212502, 1212604, 1212901, 1213167, 1213272, 1213287, 1213304, 1213585, 1213586, 1213588, 1213620, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213842, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-4004
Sources used:
SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
Basesystem Module 15-SP4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3, kernel-source-5.14.21-150400.24.81.1
Development Tools Module 15-SP4 (src): kernel-source-5.14.21-150400.24.81.1, kernel-syms-5.14.21-150400.24.81.1, kernel-obs-build-5.14.21-150400.24.81.1
SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_16-1-150400.9.3.3
openSUSE Leap 15.4 (src): kernel-obs-qa-5.14.21-150400.24.81.1, kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3, kernel-syms-5.14.21-150400.24.81.1, kernel-source-5.14.21-150400.24.81.1, kernel-obs-build-5.14.21-150400.24.81.1, kernel-livepatch-SLE15-SP4_Update_16-1-150400.9.3.3
openSUSE Leap Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
openSUSE Leap Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3
SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.81.1.150400.24.35.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 32 Maintenance Automation 2023-08-14 16:30:36 UTC
SUSE-SU-2023:3311-1: An update that solves 15 vulnerabilities and has 27 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1207948, 1210627, 1210780, 1210825, 1211131, 1211738, 1211811, 1212445, 1212502, 1212604, 1212766, 1212901, 1213167, 1213272, 1213287, 1213304, 1213417, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Sources used:
openSUSE Leap 15.5 (src): kernel-syms-5.14.21-150500.55.19.1, kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4, kernel-livepatch-SLE15-SP5_Update_3-1-150500.11.3.4, kernel-source-5.14.21-150500.55.19.1, kernel-obs-qa-5.14.21-150500.55.19.1, kernel-obs-build-5.14.21-150500.55.19.1
Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4, kernel-source-5.14.21-150500.55.19.1
Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.19.1, kernel-syms-5.14.21-150500.55.19.1, kernel-source-5.14.21-150500.55.19.1
SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_3-1-150500.11.3.4

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 33 Maintenance Automation 2023-08-15 12:30:28 UTC
SUSE-SU-2023:3318-1: An update that solves 20 vulnerabilities and has 89 fixes can now be installed.

Category: security (important)
Bug References: 1150305, 1193629, 1194869, 1206418, 1207129, 1207894, 1208788, 1210565, 1210584, 1210627, 1210780, 1210853, 1211131, 1211243, 1211738, 1211811, 1211867, 1212301, 1212502, 1212604, 1212846, 1212901, 1212905, 1213010, 1213011, 1213012, 1213013, 1213014, 1213015, 1213016, 1213017, 1213018, 1213019, 1213020, 1213021, 1213024, 1213025, 1213032, 1213034, 1213035, 1213036, 1213037, 1213038, 1213039, 1213040, 1213041, 1213059, 1213061, 1213087, 1213088, 1213089, 1213090, 1213092, 1213093, 1213094, 1213095, 1213096, 1213098, 1213099, 1213100, 1213102, 1213103, 1213104, 1213105, 1213106, 1213107, 1213108, 1213109, 1213110, 1213111, 1213112, 1213113, 1213114, 1213134, 1213167, 1213245, 1213247, 1213252, 1213258, 1213259, 1213263, 1213264, 1213272, 1213286, 1213287, 1213304, 1213523, 1213524, 1213543, 1213585, 1213586, 1213588, 1213620, 1213653, 1213705, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-20593, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-2985, CVE-2023-31083, CVE-2023-3117, CVE-2023-31248, CVE-2023-3268, CVE-2023-3390, CVE-2023-35001, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-4004
Sources used:
openSUSE Leap 15.4 (src): kernel-syms-rt-5.14.21-150400.15.46.1, kernel-source-rt-5.14.21-150400.15.46.1
SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_11-1-150400.1.5.1
SUSE Real Time Module 15-SP4 (src): kernel-syms-rt-5.14.21-150400.15.46.1, kernel-source-rt-5.14.21-150400.15.46.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 34 Maintenance Automation 2023-08-22 16:30:11 UTC
SUSE-SU-2023:3376-1: An update that solves 15 vulnerabilities and has 27 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1207948, 1210627, 1210780, 1210825, 1211131, 1211738, 1211811, 1212445, 1212502, 1212604, 1212766, 1212901, 1213167, 1213272, 1213287, 1213304, 1213417, 1213578, 1213585, 1213586, 1213588, 1213601, 1213620, 1213632, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871, 1213872
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-38409, CVE-2023-3863, CVE-2023-4004
Sources used:
openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.14.1, kernel-source-azure-5.14.21-150500.33.14.1
Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.14.1, kernel-source-azure-5.14.21-150500.33.14.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 35 Maintenance Automation 2023-08-22 20:30:18 UTC
SUSE-SU-2023:3377-1: An update that solves 11 vulnerabilities and has 19 fixes can now be installed.

Category: security (important)
Bug References: 1206418, 1207129, 1210627, 1210780, 1211131, 1211738, 1212502, 1212604, 1212901, 1213167, 1213272, 1213287, 1213304, 1213588, 1213620, 1213653, 1213713, 1213715, 1213747, 1213756, 1213759, 1213777, 1213810, 1213812, 1213856, 1213857, 1213863, 1213867, 1213870, 1213871
CVE References: CVE-2022-40982, CVE-2023-0459, CVE-2023-20569, CVE-2023-21400, CVE-2023-2156, CVE-2023-2166, CVE-2023-31083, CVE-2023-3268, CVE-2023-3567, CVE-2023-3776, CVE-2023-4004
Sources used:
openSUSE Leap 15.4 (src): kernel-source-azure-5.14.21-150400.14.63.1, kernel-syms-azure-5.14.21-150400.14.63.1
Public Cloud Module 15-SP4 (src): kernel-source-azure-5.14.21-150400.14.63.1, kernel-syms-azure-5.14.21-150400.14.63.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.