Bugzilla – Bug 1215523
kernel 5.14.21.150400.24.84.1 amdgpu critical error
Last modified: 2024-01-25 13:35:22 UTC
After the kernel update today to 5.14.21.150400.24.84.1 the system boots, but due to constantly repeated amdgpu error the files /var/log/messages and /var/log/warn grows up to gigabytes in a few minutes and the root file system gets exhausted and no space is left on the device. switching back to the previous kernel 5.14.21.150400.24.81.1 "solves" the issue. GIT Branch: SLE15-SP4_EMBARGO Distribution: SUSE Linux Enterprise 15 Name : kernel-default Version : 5.14.21 Release : 150400.24.84.1 Architecture: x86_64 /var/log/messages is full of errors like this ------------[ cut here ]------------ WARNING: CPU: 10 PID: 8062 at ../include/linux/dma-fence.h:478 amdgpu_sync_keep_later+0xab/0xc0 [amdgpu] 2023-09-20T15:06:06.968445+02:00 fermium kernel: [ 219.037070][ T8062] Modules linked in: rfcomm nf_nat_sip nft_objref nf_conntrack_sip nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib af_packet nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject cmac algif_hash alg if_skcipher af_alg nft_ct bnep nft_chain_nat nf_tables btusb btrtl btbcm btintel ebtable_nat ebtable_broute bluetooth ip6table_nat uvcvideo snd_usb_audio videobuf2_vmalloc ip6table_mangle videobuf2_memops videobuf2_v4l2 ip6table_raw videobuf2_common ip6table_security sn d_usbmidi_lib videodev snd_rawmidi ecdh_generic snd_seq_device mc iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_mangle iptable_raw iptable_security ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bpfil ter vboxnetadp(OEN) vboxnetflt(OEN) vboxdrv(OEN) dmi_sysfs iwlmvm joydev sunrpc mac80211 libarc4 snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi intel_rapl_msr intel_rapl_common edac_mce_amd snd_hda_intel 2023-09-20T15:06:06.968538+02:00 fermium kernel: [ 219.037204][ T8062] snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec kvm_amd nls_iso8859_1 snd_hda_core iwlwifi hid_multitouch nls_cp437 snd_hwdep vfat kvm snd_pcm r8169 fat snd_timer cfg80211 acer_wmi irqbypass real tek sparse_keymap snd mdio_devres rfkill pcspkr ucsi_acpi snd_pci_acp5x wmi_bmof efi_pstore(N) i2c_piix4 libphy snd_rn_pci_acp3x typec_ucsi soundcore k10temp snd_pci_acp3x thermal typec roles acer_wireless(N) button acpi_cpufreq i2c_designware_platform i2c_designware_co re amd_pmc ac fuse configfs ip_tables x_tables ext4 crc16 mbcache jbd2 dm_crypt essiv authenc hid_generic usbhid amdgpu crc32_pclmul crc32c_intel ghash_clmulni_intel drm_ttm_helper ttm iommu_v2 gpu_sched i2c_algo_bit rtsx_pci_sdmmc drm_kms_helper mmc_core syscopyarea sy sfillrect sysimgblt fb_sys_fops aesni_intel cec rc_core xhci_pci crypto_simd xhci_pci_renesas xhci_hcd drm cryptd nvme usbcore serio_raw nvme_core ccp rtsx_pci sp5100_tco(N) nvme_common t10_pi mfd_core battery video wmi i2c_hid_acpi 2023-09-20T15:06:06.968543+02:00 fermium kernel: [ 219.037378][ T8062] i2c_hid dm_mirror dm_region_hash dm_log sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod msr efivarfs 2023-09-20T15:06:06.968547+02:00 fermium kernel: [ 219.037403][ T8062] Supported: No, Unsupported modules are loaded 2023-09-20T15:06:06.968551+02:00 fermium kernel: [ 219.037406][ T8062] CPU: 10 PID: 8062 Comm: kwin_x11:cs0 Tainted: G W OE N 5.14.21-150400.24.84-default #1 SLE15-SP4 2d2aae51046e63e9f8c5f181ee9c884ea3512c4e 2023-09-20T15:06:06.968554+02:00 fermium kernel: [ 219.037414][ T8062] Hardware name: Acer TravelMate P215-41/Bassdrum_RC, BIOS V1.02 02/18/2021 2023-09-20T15:06:06.968557+02:00 fermium kernel: [ 219.037417][ T8062] RIP: 0010:amdgpu_sync_keep_later+0xab/0xc0 [amdgpu] 2023-09-20T15:06:06.968561+02:00 fermium kernel: [ 219.037602][ T8062] Code: d1 0f 92 c2 eb b4 e8 04 ae bb ed 48 85 db 75 ca eb e1 be 01 00 00 00 e8 83 3a 97 ed eb d5 be 03 00 00 00 e8 77 3a 97 ed eb ab <0f> 0b eb 90 be 02 00 00 00 e8 67 3a 97 ed eb b9 0f 1f 44 00 00 0 f 2023-09-20T15:06:06.968564+02:00 fermium kernel: [ 219.037607][ T8062] RSP: 0018:ffffa76502227ac8 EFLAGS: 00010206 2023-09-20T15:06:06.968567+02:00 fermium kernel: [ 219.037612][ T8062] RAX: ffffffffb0afffc0 RBX: ffff9c1263211940 RCX: 0000000000000000 2023-09-20T15:06:06.968570+02:00 fermium kernel: [ 219.037616][ T8062] RDX: ffff9c1244b00e18 RSI: ffff9c1263211940 RDI: ffff9c1327f51cf8 2023-09-20T15:06:06.968573+02:00 fermium kernel: [ 219.037619][ T8062] RBP: ffff9c1327f51cf8 R08: 0000000000000020 R09: 0000000000000000 2023-09-20T15:06:06.968575+02:00 fermium kernel: [ 219.037622][ T8062] R10: ffff9c1244b00e38 R11: 0000000000000003 R12: 0000000000000000 2023-09-20T15:06:06.968578+02:00 fermium kernel: [ 219.037625][ T8062] R13: 0000000000000000 R14: 0000000000000000 R15: ffff9c12556e9948 2023-09-20T15:06:06.968582+02:00 fermium kernel: [ 219.037629][ T8062] FS: 00007fbac6fa8700(0000) GS:ffff9c153f880000(0000) knlGS:0000000000000000 2023-09-20T15:06:06.968584+02:00 fermium kernel: [ 219.037634][ T8062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2023-09-20T15:06:06.968587+02:00 fermium kernel: [ 219.037637][ T8062] CR2: 00007f773801e0b0 CR3: 0000000178bfc000 CR4: 0000000000350ee0 2023-09-20T15:06:06.968590+02:00 fermium kernel: [ 219.037641][ T8062] Call Trace: 2023-09-20T15:06:06.968594+02:00 fermium kernel: [ 219.037645][ T8062] <TASK> 2023-09-20T15:06:06.968596+02:00 fermium kernel: [ 219.037649][ T8062] amdgpu_sync_vm_fence+0x1e/0x40 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] 2023-09-20T15:06:06.968599+02:00 fermium kernel: [ 219.037834][ T8062] amdgpu_cs_ioctl+0x1574/0x1ca0 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] 2023-09-20T15:06:06.968603+02:00 fermium kernel: [ 219.038037][ T8062] ? amdgpu_cs_find_mapping+0x110/0x110 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] 2023-09-20T15:06:06.968606+02:00 fermium kernel: [ 219.038249][ T8062] drm_ioctl_kernel+0xb6/0x100 [drm b72f874ec848c4be9b8c39c6d4b6cda18e282a1a] 2023-09-20T15:06:06.968609+02:00 fermium kernel: [ 219.038285][ T8062] drm_ioctl+0x35a/0x400 [drm b72f874ec848c4be9b8c39c6d4b6cda18e282a1a] 2023-09-20T15:06:06.968612+02:00 fermium kernel: [ 219.038318][ T8062] ? amdgpu_cs_find_mapping+0x110/0x110 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] 2023-09-20T15:06:06.968615+02:00 fermium kernel: [ 219.038500][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968618+02:00 fermium kernel: [ 219.038505][ T8062] ? try_to_wake_up+0x177/0x550 2023-09-20T15:06:06.968740+02:00 fermium kernel: [ 219.038519][ T8062] amdgpu_drm_ioctl+0x49/0x80 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] 2023-09-20T15:06:06.968743+02:00 fermium kernel: [ 219.038694][ T8062] __x64_sys_ioctl+0x92/0xd0 2023-09-20T15:06:06.968746+02:00 fermium kernel: [ 219.038702][ T8062] do_syscall_64+0x5b/0x80 2023-09-20T15:06:06.968750+02:00 fermium kernel: [ 219.038708][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968753+02:00 fermium kernel: [ 219.038711][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968756+02:00 fermium kernel: [ 219.038715][ T8062] ? __x64_sys_futex+0x5e/0x1d0 2023-09-20T15:06:06.968760+02:00 fermium kernel: [ 219.038721][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968762+02:00 fermium kernel: [ 219.038725][ T8062] ? syscall_exit_to_user_mode+0x28/0x40 2023-09-20T15:06:06.968765+02:00 fermium kernel: [ 219.038731][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968768+02:00 fermium kernel: [ 219.038735][ T8062] ? syscall_exit_to_user_mode+0x28/0x40 2023-09-20T15:06:06.968771+02:00 fermium kernel: [ 219.038740][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968775+02:00 fermium kernel: [ 219.038743][ T8062] ? do_syscall_64+0x67/0x80 2023-09-20T15:06:06.968780+02:00 fermium kernel: [ 219.038747][ T8062] ? syscall_exit_to_user_mode+0x28/0x40 2023-09-20T15:06:06.968783+02:00 fermium kernel: [ 219.038752][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968786+02:00 fermium kernel: [ 219.038756][ T8062] ? do_syscall_64+0x67/0x80 2023-09-20T15:06:06.968789+02:00 fermium kernel: [ 219.038760][ T8062] ? do_syscall_64+0x67/0x80 2023-09-20T15:06:06.968792+02:00 fermium kernel: [ 219.038764][ T8062] ? do_syscall_64+0x67/0x80 2023-09-20T15:06:06.968795+02:00 fermium kernel: [ 219.038768][ T8062] ? srso_return_thunk+0x5/0x10 2023-09-20T15:06:06.968798+02:00 fermium kernel: [ 219.038772][ T8062] entry_SYSCALL_64_after_hwframe+0x61/0xcb 2023-09-20T15:06:06.968801+02:00 fermium kernel: [ 219.038778][ T8062] RIP: 0033:0x7fbae5d02437 2023-09-20T15:06:06.968804+02:00 fermium kernel: [ 219.038782][ T8062] Code: 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 29 da 0d 00 f7 d8 64 89 01 48 2023-09-20T15:06:06.968807+02:00 fermium kernel: [ 219.038786][ T8062] RSP: 002b:00007fbac6fa7888 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 2023-09-20T15:06:06.968811+02:00 fermium kernel: [ 219.038791][ T8062] RAX: ffffffffffffffda RBX: 00007fbac6fa79e8 RCX: 00007fbae5d02437 2023-09-20T15:06:06.968813+02:00 fermium kernel: [ 219.038794][ T8062] RDX: 00007fbac6fa7900 RSI: 00000000c0186444 RDI: 0000000000000009 2023-09-20T15:06:06.968817+02:00 fermium kernel: [ 219.038797][ T8062] RBP: 00007fbac6fa7900 R08: 00007fbac6fa7a40 R09: 0000000000000020 2023-09-20T15:06:06.968822+02:00 fermium kernel: [ 219.038800][ T8062] R10: 00007fbac6fa7a40 R11: 0000000000000246 R12: 00000000c0186444 2023-09-20T15:06:06.968826+02:00 fermium kernel: [ 219.038802][ T8062] R13: 0000000000000009 R14: 00005636906067b0 R15: 0000000000000020 2023-09-20T15:06:06.968830+02:00 fermium kernel: [ 219.038813][ T8062] </TASK> 2023-09-20T15:06:06.968833+02:00 fermium kernel: [ 219.038815][ T8062] ---[ end trace 3d22bee0ff27a2c8 ]---
The processor is AMD Ryzen 5 4650UPro at an Acer TravelMate P215
Same problem here after the last kernel update (5.14.21-150400.24.84-default). When rebooting and selecting manually the older kernel 5.14.21-150400.24.81-default, everything is fine. AMD Ryzen 9 3900X 12-Core Processor VGA compatible controller: Advanced Micro Devices, Inc. [AMD/ATI] Baffin [Radeon RX 550 640SP / RX 560/560X] (rev ff) (prog-if 00 [VGA controller]) Subsystem: ASRock Incorporation Device 5037 [ 6.187893] ------------[ cut here ]------------ [ 6.187898] WARNING: CPU: 0 PID: 1362 at ../include/linux/dma-fence.h:478 amdgpu_sync_keep_later+0xab/0xc0 [amdgpu] [ 6.188067] Modules linked in: vboxnetadp(OEN) vboxnetflt(OEN) vboxdrv(OEN) dmi_sysfs intel_rapl_msr snd_hda_codec_realtek intel_rapl_common snd_hda_codec_generic edac_mce_amd ledtrig_audio snd_hda_codec_hdmi kvm_amd snd_hda_intel snd_intel_dspcfg nls_iso8859_1 snd_intel_sdw_acpi nls_cp437 vfat kvm fat snd_hda_codec joydev snd_hda_core snd_hwdep eeepc_wmi(N) irqbypass asus_wmi battery snd_pcm sparse_keymap platform_profile rfkill video snd_timer pcspkr efi_pstore(N) wmi_bmof snd igc k10temp i2c_piix4 soundcore acpi_cpufreq i2c_designware_platform gpio_amdpt i2c_designware_core gpio_generic button fuse configfs ip_tables x_tables ext4 crc16 mbcache jbd2 amdgpu drm_ttm_helper ttm mfd_core iommu_v2 gpu_sched hid_generic i2c_algo_bit drm_kms_helper usbhid sd_mod syscopyarea crc32_pclmul sysfillrect sysimgblt crc32c_intel fb_sys_fops cec rc_core ahci xhci_pci xhci_pci_renesas ghash_clmulni_intel xhci_hcd aesni_intel drm libahci crypto_simd nvme cryptd usbcore libata nvme_core [ 6.188202] ccp sp5100_tco(N) nvme_common t10_pi wmi sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod msr efivarfs [ 6.188225] Supported: No, Unsupported modules are loaded [ 6.188228] CPU: 0 PID: 1362 Comm: X:cs0 Tainted: G OE N 5.14.21-150400.24.84-default #1 SLE15-SP4 2d2aae51046e63e9f8c5f181ee9c884ea3512c4e [ 6.188234] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING, BIOS 2803 04/27/2022 [ 6.188237] RIP: 0010:amdgpu_sync_keep_later+0xab/0xc0 [amdgpu] [ 6.188388] Code: d1 0f 92 c2 eb b4 e8 04 ee 8c d8 48 85 db 75 ca eb e1 be 01 00 00 00 e8 83 7a 68 d8 eb d5 be 03 00 00 00 e8 77 7a 68 d8 eb ab <0f> 0b eb 90 be 02 00 00 00 e8 67 7a 68 d8 eb b9 0f 1f 44 00 00 0f [ 6.188392] RSP: 0018:ffffb6d2820f7ab8 EFLAGS: 00010206 [ 6.188396] RAX: ffffffff9bafffc0 RBX: ffff9e7588265780 RCX: 0000000000000000 [ 6.188399] RDX: ffff9e75811d7598 RSI: ffff9e7588265780 RDI: ffff9e75891924f8 [ 6.188401] RBP: ffff9e75891924f8 R08: 0000000000000020 R09: 0000000000000001 [ 6.188404] R10: ffff9e75811d75b8 R11: ffff9e7591c91a00 R12: 0000000000000000 [ 6.188406] R13: 0000000000000000 R14: 0000000000000000 R15: ffff9e75c1909948 [ 6.188409] FS: 00007f6551bc1700(0000) GS:ffff9e846ea00000(0000) knlGS:0000000000000000 [ 6.188413] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 6.188416] CR2: 00007f654c000010 CR3: 00000001060f0000 CR4: 0000000000350ef0 [ 6.188419] Call Trace: [ 6.188423] <TASK> [ 6.188428] amdgpu_sync_vm_fence+0x1e/0x40 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] [ 6.188579] amdgpu_cs_ioctl+0x1574/0x1ca0 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] [ 6.188743] ? amdgpu_cs_find_mapping+0x110/0x110 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] [ 6.188892] drm_ioctl_kernel+0xb6/0x100 [drm b72f874ec848c4be9b8c39c6d4b6cda18e282a1a] [ 6.188920] ? srso_return_thunk+0x5/0x10 [ 6.188928] drm_ioctl+0x35a/0x400 [drm b72f874ec848c4be9b8c39c6d4b6cda18e282a1a] [ 6.188955] ? amdgpu_cs_find_mapping+0x110/0x110 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] [ 6.189103] ? futex_wait_queue+0x70/0xd0 [ 6.189109] ? srso_return_thunk+0x5/0x10 [ 6.189113] ? futex_wait+0x16a/0x250 [ 6.189117] ? srso_return_thunk+0x5/0x10 [ 6.189124] amdgpu_drm_ioctl+0x49/0x80 [amdgpu 28d5a9707e1f6057a70f2fd1d73854000d464e2e] [ 6.189266] __x64_sys_ioctl+0x92/0xd0 [ 6.189274] do_syscall_64+0x5b/0x80 [ 6.189281] ? srso_return_thunk+0x5/0x10 [ 6.189284] ? __x64_sys_futex+0x5e/0x1d0 [ 6.189290] ? srso_return_thunk+0x5/0x10 [ 6.189293] ? exit_to_user_mode_prepare+0x1cc/0x230 [ 6.189298] ? srso_return_thunk+0x5/0x10 [ 6.189301] ? syscall_exit_to_user_mode+0x28/0x40 [ 6.189306] ? srso_return_thunk+0x5/0x10 [ 6.189309] ? do_syscall_64+0x67/0x80 [ 6.189314] ? srso_return_thunk+0x5/0x10 [ 6.189317] ? exit_to_user_mode_prepare+0x1cc/0x230 [ 6.189322] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 6.189329] RIP: 0033:0x7f655d23e437 [ 6.189333] Code: 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 29 da 0d 00 f7 d8 64 89 01 48 [ 6.189336] RSP: 002b:00007f6551bc08c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 6.189341] RAX: ffffffffffffffda RBX: 00007f6551bc0a28 RCX: 00007f655d23e437 [ 6.189343] RDX: 00007f6551bc0940 RSI: 00000000c0186444 RDI: 000000000000000e [ 6.189346] RBP: 00007f6551bc0940 R08: 00007f6551bc0a80 R09: 0000000000000020 [ 6.189348] R10: 00007f6551bc0a80 R11: 0000000000000246 R12: 00000000c0186444 [ 6.189351] R13: 000000000000000e R14: 000055c433867ae0 R15: 0000000000000020 [ 6.189360] </TASK> [ 6.189361] ---[ end trace 9049d1d3b12fd5d6 ]---
It must be a patch that was also reverted on the latest 5.15.y stable tree. I dropped it from SLE15-SP4 branch now. The test kernel is being built in OBS home:tiwai:bsc1215523 repo. Once after the build finishes (takes an hour or so), please give it a try and report back.
*** Bug 1215567 has been marked as a duplicate of this bug. ***
The test kernel is ready at http://download.opensuse.org/repositories/home:/tiwai:/bsc1215523/pool/
Installed the test kernel from tiwai and booted into it and at first glance it looks good. No kernel traces of amdgpu in /var/log/messages or /var/log/warn, which would let the files grow irrationally. Will test tomorrow more.
We tested it on another affected Laptop on friday and today again, no problems. Thank you for fixing it.
This bug has caused me a big headache this last week or so. The laptop machine has been running super hot, and I've not known why. I've even opened up the machine to look for possible dust build-up. The machine could have easily cratered because of it all. This morning I found this thread, and I've reverted the kernel from the installed 84.1 to the available 81.1. That didn't immediately stop the machine heating up at the slightest bit of load. However, I looked in /var/log and found absolutely humungous log files (45Gb each at the max), two each for each day since the 22nd Sept 2023. No wonder the machine's been screaming at me! I can't believe this bug hasn't been highlighted to a wider audience!
SUSE-SU-2023:3964-1: An update that solves 16 vulnerabilities, contains seven features and has 49 security fixes can now be installed. Category: security (important) Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1205462, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1212091, 1212142, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213968, 1213970, 1213971, 1214000, 1214019, 1214120, 1214149, 1214180, 1214238, 1214285, 1214297, 1214299, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214428, 1214451, 1214635, 1214659, 1214661, 1214729, 1214742, 1214743, 1214756, 1215522, 1215523, 1215552, 1215553 CVE References: CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4569 Jira References: PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004 Sources used: openSUSE Leap 15.4 (src): kernel-source-rt-5.14.21-150400.15.53.1, kernel-syms-rt-5.14.21-150400.15.53.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4-RT_Update_13-1-150400.1.3.1 SUSE Real Time Module 15-SP4 (src): kernel-source-rt-5.14.21-150400.15.53.1, kernel-syms-rt-5.14.21-150400.15.53.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3971-1: An update that solves 20 vulnerabilities, contains eight features and has 58 security fixes can now be installed. Category: security (important) Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214635, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214976, 1215522, 1215523, 1215552, 1215553 CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569 Jira References: PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004 Sources used: openSUSE Leap 15.5 (src): kernel-obs-build-5.14.21-150500.55.28.1, kernel-obs-qa-5.14.21-150500.55.28.1, kernel-syms-5.14.21-150500.55.28.1, kernel-source-5.14.21-150500.55.28.1, kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2, kernel-livepatch-SLE15-SP5_Update_5-1-150500.11.5.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 Basesystem Module 15-SP5 (src): kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2, kernel-source-5.14.21-150500.55.28.1 Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.28.1, kernel-syms-5.14.21-150500.55.28.1, kernel-source-5.14.21-150500.55.28.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_5-1-150500.11.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3969-1: An update that solves 16 vulnerabilities, contains seven features and has 49 security fixes can now be installed. Category: security (important) Bug References: 1023051, 1120059, 1177719, 1188885, 1193629, 1194869, 1205462, 1208902, 1208949, 1209284, 1209799, 1210048, 1210448, 1212091, 1212142, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213968, 1213970, 1213971, 1214000, 1214019, 1214120, 1214149, 1214180, 1214238, 1214285, 1214297, 1214299, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214428, 1214451, 1214635, 1214659, 1214661, 1214729, 1214742, 1214743, 1214756, 1215522, 1215523, 1215552, 1215553 CVE References: CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4569 Jira References: PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004 Sources used: openSUSE Leap 15.4 (src): kernel-source-5.14.21-150400.24.88.1, kernel-livepatch-SLE15-SP4_Update_18-1-150400.9.3.1, kernel-syms-5.14.21-150400.24.88.1, kernel-obs-qa-5.14.21-150400.24.88.1, kernel-obs-build-5.14.21-150400.24.88.1, kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 Basesystem Module 15-SP4 (src): kernel-source-5.14.21-150400.24.88.1, kernel-default-base-5.14.21-150400.24.88.1.150400.24.40.1 Development Tools Module 15-SP4 (src): kernel-obs-build-5.14.21-150400.24.88.1, kernel-source-5.14.21-150400.24.88.1, kernel-syms-5.14.21-150400.24.88.1 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_18-1-150400.9.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
I have another box running Leap 15.5 which still shows a problem. Do I need to open a new bugreport? I installed the latest kernel update but I still see (dmesg, directly after booting): amdgpu 0000:03:00.0: amdgpu: [mmhub] page fault (src_id:0 ring:157 vmid:0 pasid:0, for process pid 0 thread pid 0) amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000000006004000 from client 0x12 (VMC) amdgpu 0000:03:00.0: amdgpu: MMVM_L2_PROTECTION_FAULT_STATUS:0x0000073A amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: DCEDMC (0x3) amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x5 amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x3 amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x1 amdgpu 0000:03:00.0: amdgpu: RW: 0x0 It seems to be more stable though. New kernel: 5.14.21-150500.55.28-default #1 SMP PREEMPT_DYNAMIC Fri Sep 22 10:04:29 UTC 2023 (c11336f) x86_64 x86_64 x86_64 GNU/Linux When I reboot and select an older kernel, everything is fine. older kernel: 5.14.21-150500.53-default #1 SMP PREEMPT_DYNAMIC Wed May 10 07:56:26 UTC 2023 (b630043) x86_64 x86_64 x86_64 GNU/Linux Again, this comment is related to Leap 15.5. Just tell me if I need to open a new bugreport.
SUSE-SU-2023:3988-1: An update that solves 24 vulnerabilities, contains 10 features and has 64 security fixes can now be installed. Category: security (important) Bug References: 1023051, 1065729, 1120059, 1177719, 1187236, 1188885, 1193629, 1194869, 1203329, 1203330, 1205462, 1206453, 1208902, 1208949, 1208995, 1209284, 1209799, 1210048, 1210169, 1210448, 1210643, 1211220, 1212091, 1212142, 1212423, 1212526, 1212857, 1212873, 1213026, 1213123, 1213546, 1213580, 1213601, 1213666, 1213733, 1213757, 1213759, 1213916, 1213921, 1213927, 1213946, 1213949, 1213968, 1213970, 1213971, 1214000, 1214019, 1214073, 1214120, 1214149, 1214180, 1214233, 1214238, 1214285, 1214297, 1214299, 1214305, 1214350, 1214368, 1214370, 1214371, 1214372, 1214380, 1214386, 1214392, 1214393, 1214397, 1214404, 1214428, 1214451, 1214635, 1214659, 1214661, 1214727, 1214729, 1214742, 1214743, 1214756, 1214813, 1214873, 1214928, 1214976, 1214988, 1215123, 1215124, 1215148, 1215221, 1215523 CVE References: CVE-2022-38457, CVE-2022-40133, CVE-2023-1192, CVE-2023-1859, CVE-2023-2007, CVE-2023-20588, CVE-2023-2177, CVE-2023-34319, CVE-2023-3610, CVE-2023-37453, CVE-2023-3772, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4387, CVE-2023-4459, CVE-2023-4563, CVE-2023-4569, CVE-2023-4881 Jira References: PED-2023, PED-2025, PED-3924, PED-4579, PED-4759, PED-4927, PED-4929, PED-5738, PED-6003, PED-6004 Sources used: SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.18.1, kernel-source-rt-5.14.21-150500.13.18.1 openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.18.1, kernel-livepatch-SLE15-SP5-RT_Update_5-1-150500.11.3.1, kernel-source-rt-5.14.21-150500.13.18.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_5-1-150500.11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
*** Bug 1215990 has been marked as a duplicate of this bug. ***
SUSE-SU-2023:4035-1: An update that solves 12 vulnerabilities and has 12 security fixes can now be installed. Category: security (important) Bug References: 1152472, 1202845, 1206453, 1213808, 1214941, 1214942, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214992, 1214993, 1215322, 1215523, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916 CVE References: CVE-2023-1206, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4921, CVE-2023-5345 Sources used: openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_6-1-150500.11.3.1, kernel-syms-rt-5.14.21-150500.13.21.1, kernel-source-rt-5.14.21-150500.13.21.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_6-1-150500.11.3.1 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.21.1, kernel-source-rt-5.14.21-150500.13.21.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4058-1: An update that solves 18 vulnerabilities, contains three features and has 71 security fixes can now be installed. Category: security (important) Bug References: 1065729, 1152472, 1187236, 1201284, 1202845, 1206453, 1208995, 1210169, 1210643, 1210658, 1212639, 1212703, 1213123, 1213534, 1213808, 1214022, 1214037, 1214040, 1214233, 1214351, 1214479, 1214543, 1214635, 1214813, 1214873, 1214928, 1214940, 1214941, 1214942, 1214943, 1214944, 1214945, 1214946, 1214947, 1214948, 1214949, 1214950, 1214951, 1214952, 1214953, 1214954, 1214955, 1214957, 1214958, 1214959, 1214961, 1214962, 1214963, 1214964, 1214965, 1214966, 1214967, 1214986, 1214988, 1214990, 1214991, 1214992, 1214993, 1214995, 1214997, 1214998, 1215115, 1215117, 1215123, 1215124, 1215148, 1215150, 1215221, 1215275, 1215322, 1215467, 1215523, 1215581, 1215752, 1215858, 1215860, 1215861, 1215875, 1215877, 1215894, 1215895, 1215896, 1215899, 1215911, 1215915, 1215916, 1215941, 1215956, 1215957 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-40283, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Jira References: PED-1549, PED-2023, PED-2025 Sources used: openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.20.1, kernel-syms-azure-5.14.21-150500.33.20.1 Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.20.1, kernel-syms-azure-5.14.21-150500.33.20.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4057-1: An update that solves 18 vulnerabilities and has five security fixes can now be installed. Category: security (important) Bug References: 1202845, 1213772, 1213808, 1214928, 1214943, 1214944, 1214950, 1214951, 1214954, 1214957, 1214986, 1214988, 1214992, 1214993, 1215322, 1215523, 1215877, 1215894, 1215895, 1215896, 1215911, 1215915, 1215916 CVE References: CVE-2023-1192, CVE-2023-1206, CVE-2023-1859, CVE-2023-2177, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-4155, CVE-2023-42753, CVE-2023-42754, CVE-2023-4389, CVE-2023-4563, CVE-2023-4622, CVE-2023-4623, CVE-2023-4881, CVE-2023-4921, CVE-2023-5345 Sources used: openSUSE Leap 15.4 (src): kernel-syms-azure-5.14.21-150400.14.69.1, kernel-source-azure-5.14.21-150400.14.69.1 Public Cloud Module 15-SP4 (src): kernel-syms-azure-5.14.21-150400.14.69.1, kernel-source-azure-5.14.21-150400.14.69.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
After the latest kernel update (5.14.21-150500.55.31-default) the system crashed. [ 5.565784] amdgpu 0000:03:00.0: amdgpu: [mmhub] page fault (src_id:0 ring:157 vmid:0 pasid:0, for process pid 0 thread pid 0) [ 5.565790] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000000006004000 from client 0x12 (VMC) [ 5.565792] amdgpu 0000:03:00.0: amdgpu: MMVM_L2_PROTECTION_FAULT_STATUS:0x0000073A [ 5.565794] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: DCEDMC (0x3) [ 5.565795] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5.565796] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x5 [ 5.565797] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x3 [ 5.565798] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x1 [ 5.565799] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 8.190663] e1000e 0000:00:1f.6 eth0: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: Rx/Tx [ 8.190762] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 8.202946] NET: Registered PF_PACKET protocol family [ 11.352915] usbcore: registered new interface driver ov534_9 [ 16.398870] usb 1-6.4.4.4: 2:1: cannot get freq at ep 0x84 [ 16.407310] usb 1-6.4.4.4: Warning! Unlikely big volume range (=511), cval->res is probably wrong. [ 16.407318] usb 1-6.4.4.4: [3] FU [Mic Capture Volume] ch = 1, val = -32767/32767/128 [ 16.407757] usbcore: registered new interface driver snd-usb-audio [ 40.649290] usb 1-6.4.4.4: 2:1: cannot get freq at ep 0x84 [ 40.653864] usb 1-6.4.4.4: 2:1: cannot get freq at ep 0x84 [ 180.725212] process 'software/Telegram/Telegram/Telegram' started with executable stack [ 358.078011] amdgpu 0000:03:00.0: amdgpu: [mmhub] page fault (src_id:0 ring:157 vmid:0 pasid:0, for process pid 0 thread pid 0) [ 358.078026] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000000006004000 from client 0x12 (VMC) [ 358.078039] amdgpu 0000:03:00.0: amdgpu: MMVM_L2_PROTECTION_FAULT_STATUS:0x0000073A [ 358.078048] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: DCEDMC (0x3) [ 358.078053] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 358.078055] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x5 [ 358.078057] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x3 [ 358.078061] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x1 [ 358.078063] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 2216.913933] usb 1-6-port2: disabled by hub (EMI?), re-enabling... [ 2216.914668] usb 1-6.2: USB disconnect, device number 4 [ 2217.200390] usb 1-6.2: new low-speed USB device number 8 using xhci_hcd [ 2217.304691] usb 1-6.2: New USB device found, idVendor=093a, idProduct=2510, bcdDevice= 1.00 [ 2217.304703] usb 1-6.2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [ 2217.304706] usb 1-6.2: Product: USB OPTICAL MOUSE [ 2217.304709] usb 1-6.2: Manufacturer: PIXART [ 2217.311224] input: PIXART USB OPTICAL MOUSE as /devices/pci0000:00/0000:00:14.0/usb1/1-6/1-6.2/1-6.2:1.0/0003:093A:2510.0004/input/input20 [ 2217.311636] hid-generic 0003:093A:2510.0004: input,hidraw2: USB HID v1.11 Mouse [PIXART USB OPTICAL MOUSE] on usb-0000:00:14.0-6.2/input0 [ 5492.829194] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829226] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155410000 from client 0x1b (UTCL2) [ 5492.829236] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00601031 [ 5492.829242] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: TCP (0x8) [ 5492.829248] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x1 [ 5492.829253] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829258] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x3 [ 5492.829263] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829268] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829278] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829287] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155425000 from client 0x1b (UTCL2) [ 5492.829295] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829301] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829306] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829311] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829316] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829321] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829326] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829334] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829343] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155424000 from client 0x1b (UTCL2) [ 5492.829350] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829356] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829361] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829366] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829371] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829376] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829381] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829388] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829397] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155411000 from client 0x1b (UTCL2) [ 5492.829404] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829409] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829415] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829420] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829425] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829430] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829434] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829442] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829451] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155415000 from client 0x1b (UTCL2) [ 5492.829457] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829463] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829468] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829473] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829478] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829483] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829488] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829495] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829504] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155412000 from client 0x1b (UTCL2) [ 5492.829511] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829516] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829522] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829527] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829532] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829537] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829542] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829549] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829558] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155422000 from client 0x1b (UTCL2) [ 5492.829565] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829570] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829576] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829580] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829585] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829590] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829595] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829603] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829611] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155413000 from client 0x1b (UTCL2) [ 5492.829618] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829623] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829629] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829634] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829639] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829643] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829654] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829663] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829671] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155423000 from client 0x1b (UTCL2) [ 5492.829678] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829684] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829689] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829694] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829699] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829704] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829709] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5492.829716] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5492.829725] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155446000 from client 0x1b (UTCL2) [ 5492.829731] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5492.829737] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5492.829742] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5492.829747] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5492.829752] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5492.829757] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5492.829762] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013405] gmc_v10_0_process_interrupt: 6 callbacks suppressed [ 5503.013418] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013444] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155484000 from client 0x1b (UTCL2) [ 5503.013456] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00601031 [ 5503.013464] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: TCP (0x8) [ 5503.013471] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x1 [ 5503.013478] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013484] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x3 [ 5503.013490] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013496] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013508] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013520] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155484000 from client 0x1b (UTCL2) [ 5503.013529] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.013536] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.013543] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.013549] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013555] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.013561] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013567] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013576] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013587] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155485000 from client 0x1b (UTCL2) [ 5503.013596] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.013603] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.013609] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.013615] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013621] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.013628] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013634] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013643] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013653] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155481000 from client 0x1b (UTCL2) [ 5503.013662] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.013669] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.013675] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.013681] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013687] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.013693] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013699] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013708] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013719] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155480000 from client 0x1b (UTCL2) [ 5503.013727] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.013734] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.013741] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.013746] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013752] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.013759] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013765] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013774] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013784] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155480000 from client 0x1b (UTCL2) [ 5503.013792] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.013806] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.013812] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.013818] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013824] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.013831] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013837] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013846] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013857] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155472000 from client 0x1b (UTCL2) [ 5503.013865] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.013872] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.013879] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.013885] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013891] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.013897] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013903] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013912] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013923] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155473000 from client 0x1b (UTCL2) [ 5503.013931] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.013938] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.013945] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.013950] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.013956] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.013963] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.013969] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.013978] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.013988] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155477000 from client 0x1b (UTCL2) [ 5503.013996] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.014003] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.014010] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.014016] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.014022] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.014028] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.014034] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.014043] amdgpu 0000:03:00.0: amdgpu: [gfxhub] page fault (src_id:0 ring:24 vmid:6 pasid:32786, for process kicad pid 19222 thread kicad:cs0 pid 19243) [ 5503.014054] amdgpu 0000:03:00.0: amdgpu: in page starting at address 0x0000800155631000 from client 0x1b (UTCL2) [ 5503.014062] amdgpu 0000:03:00.0: amdgpu: GCVM_L2_PROTECTION_FAULT_STATUS:0x00000000 [ 5503.014069] amdgpu 0000:03:00.0: amdgpu: Faulty UTCL2 client ID: CB/DB (0x0) [ 5503.014076] amdgpu 0000:03:00.0: amdgpu: MORE_FAULTS: 0x0 [ 5503.014082] amdgpu 0000:03:00.0: amdgpu: WALKER_ERROR: 0x0 [ 5503.014088] amdgpu 0000:03:00.0: amdgpu: PERMISSION_FAULTS: 0x0 [ 5503.014094] amdgpu 0000:03:00.0: amdgpu: MAPPING_ERROR: 0x0 [ 5503.014100] amdgpu 0000:03:00.0: amdgpu: RW: 0x0 [ 5503.023222] [drm:amdgpu_job_timedout [amdgpu]] *ERROR* ring gfx_0.0.0 timeout, signaled seq=234323, emitted seq=234325 [ 5503.023354] [drm:amdgpu_job_timedout [amdgpu]] *ERROR* Process information: process kicad pid 19222 thread kicad:cs0 pid 19243 [ 5503.023459] amdgpu 0000:03:00.0: amdgpu: GPU reset begin! [ 5503.150178] amdgpu 0000:03:00.0: amdgpu: free PSP TMR buffer [ 5503.195282] amdgpu 0000:03:00.0: amdgpu: MODE1 reset [ 5503.195284] amdgpu 0000:03:00.0: amdgpu: GPU mode1 reset [ 5503.195340] amdgpu 0000:03:00.0: amdgpu: GPU smu mode1 reset [ 5503.717309] amdgpu 0000:03:00.0: amdgpu: GPU reset succeeded, trying to resume [ 5503.717552] [drm] PCIE GART of 512M enabled (table at 0x00000081FEB00000). [ 5503.717770] [drm] VRAM is lost due to GPU reset! [ 5503.717772] [drm] PSP is resuming... [ 5503.810562] [drm] reserve 0xa00000 from 0x81fd000000 for PSP TMR [ 5503.932157] amdgpu 0000:03:00.0: amdgpu: RAS: optional ras ta ucode is not available [ 5503.953441] amdgpu 0000:03:00.0: amdgpu: SECUREDISPLAY: securedisplay ta ucode is not available [ 5503.953446] amdgpu 0000:03:00.0: amdgpu: SMU is resuming... [ 5503.953450] amdgpu 0000:03:00.0: amdgpu: smu driver if version = 0x0000000f, smu fw if version = 0x00000013, smu fw program = 0, version = 0x003b2b00 (59.43.0) [ 5503.953455] amdgpu 0000:03:00.0: amdgpu: SMU driver if version not matched [ 5503.953496] amdgpu 0000:03:00.0: amdgpu: use vbios provided pptable [ 5504.005938] amdgpu 0000:03:00.0: amdgpu: SMU is resumed successfully! [ 5504.007193] [drm] DMUB hardware initialized: version=0x0202001E [ 5504.327974] [drm] kiq ring mec 2 pipe 1 q 0 [ 5504.332179] [drm] VCN decode and encode initialized successfully(under DPG Mode). [ 5504.333071] [drm] JPEG decode initialized successfully. [ 5504.333117] amdgpu 0000:03:00.0: amdgpu: ring gfx_0.0.0 uses VM inv eng 0 on hub 0 [ 5504.333118] amdgpu 0000:03:00.0: amdgpu: ring comp_1.0.0 uses VM inv eng 1 on hub 0 [ 5504.333119] amdgpu 0000:03:00.0: amdgpu: ring comp_1.1.0 uses VM inv eng 4 on hub 0 [ 5504.333119] amdgpu 0000:03:00.0: amdgpu: ring comp_1.2.0 uses VM inv eng 5 on hub 0 [ 5504.333120] amdgpu 0000:03:00.0: amdgpu: ring comp_1.3.0 uses VM inv eng 6 on hub 0 [ 5504.333120] amdgpu 0000:03:00.0: amdgpu: ring comp_1.0.1 uses VM inv eng 7 on hub 0 [ 5504.333121] amdgpu 0000:03:00.0: amdgpu: ring comp_1.1.1 uses VM inv eng 8 on hub 0 [ 5504.333121] amdgpu 0000:03:00.0: amdgpu: ring comp_1.2.1 uses VM inv eng 9 on hub 0 [ 5504.333122] amdgpu 0000:03:00.0: amdgpu: ring comp_1.3.1 uses VM inv eng 10 on hub 0 [ 5504.333122] amdgpu 0000:03:00.0: amdgpu: ring kiq_2.1.0 uses VM inv eng 11 on hub 0 [ 5504.333123] amdgpu 0000:03:00.0: amdgpu: ring sdma0 uses VM inv eng 12 on hub 0 [ 5504.333123] amdgpu 0000:03:00.0: amdgpu: ring sdma1 uses VM inv eng 13 on hub 0 [ 5504.333124] amdgpu 0000:03:00.0: amdgpu: ring vcn_dec_0 uses VM inv eng 0 on hub 1 [ 5504.333124] amdgpu 0000:03:00.0: amdgpu: ring vcn_enc_0.0 uses VM inv eng 1 on hub 1 [ 5504.333125] amdgpu 0000:03:00.0: amdgpu: ring vcn_enc_0.1 uses VM inv eng 4 on hub 1 [ 5504.333125] amdgpu 0000:03:00.0: amdgpu: ring jpeg_dec uses VM inv eng 5 on hub 1 [ 5504.336840] amdgpu 0000:03:00.0: amdgpu: recover vram bo from shadow start [ 5504.342479] amdgpu 0000:03:00.0: amdgpu: recover vram bo from shadow done [ 5504.342481] [drm] Skip scheduling IBs! [ 5504.342482] [drm] Skip scheduling IBs! [ 5504.342489] amdgpu 0000:03:00.0: amdgpu: GPU reset(2) succeeded! [ 5504.342591] [drm] Skip scheduling IBs! [ 5504.342606] [drm] Skip scheduling IBs! [ 5504.342609] [drm] Skip scheduling IBs! [ 5504.342623] [drm] Skip scheduling IBs! [ 5504.613573] ------------[ cut here ]------------ [ 5504.613579] WARNING: CPU: 17 PID: 19476 at ../drivers/gpu/drm/amd/amdgpu/amdgpu_irq.c:655 amdgpu_irq_put+0x68/0x90 [amdgpu] [ 5504.613976] Modules linked in: snd_usb_audio snd_usbmidi_lib snd_rawmidi snd_seq_device af_packet vboxnetadp(OEN) vboxnetflt(OEN) vboxdrv(OEN) qrtr(N) ns(N) dmi_sysfs snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_soc_hdac_hda snd_hda_codec_realtek snd_soc_acpi_intel_match snd_soc_acpi soundwire_bus snd_hda_codec_generic snd_hda_ext_core ledtrig_audio snd_soc_core intel_rapl_msr intel_rapl_common intel_pmc_core snd_hda_codec_hdmi x86_pkg_temp_thermal snd_compress intel_powerclamp snd_pcm_dmaengine coretemp gspca_ov534_9(N) snd_hda_intel gspca_main(N) snd_intel_dspcfg iTCO_wdt snd_intel_sdw_acpi intel_pmc_bxt videobuf2_vmalloc iTCO_vendor_support videobuf2_memops snd_hda_codec kvm_intel videobuf2_v4l2 snd_hda_core videobuf2_common snd_hwdep nls_iso8859_1 videodev snd_pcm nls_cp437 vfat hp_wmi snd_timer i2c_i801 sparse_keymap kvm fat [ 5504.614040] i2c_smbus mc joydev platform_profile snd e1000e rfkill irqbypass pcspkr wmi_bmof soundcore thermal acpi_pad acpi_tad(N) button fuse configfs efi_pstore(N) ip_tables x_tables ext4 crc16 mbcache jbd2 hid_generic usbhid amdgpu drm_ttm_helper ttm mfd_core iommu_v2 gpu_sched i2c_algo_bit drm_buddy drm_display_helper drm_kms_helper crc32_pclmul crc32c_intel sr_mod cdrom syscopyarea xhci_pci sysfillrect sysimgblt xhci_pci_renesas ghash_clmulni_intel fb_sys_fops drm xhci_hcd ahci nvme libahci aesni_intel nvme_core libata usbcore crypto_simd cryptd nvme_common cec t10_pi serio_raw crc64_rocksoft_generic rc_core crc64_rocksoft crc64 wmi video sg dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod msr efivarfs [ 5504.614115] Supported: No, Unsupported modules are loaded [ 5504.614118] CPU: 17 PID: 19476 Comm: kworker/17:0 Tainted: G OE N 5.14.21-150500.55.31-default #1 SLE15-SP5 50ce754eb473b546d66f6e8b4e6e4e306f340e78 [ 5504.614126] Hardware name: HP HP Z2 Tower G9 Workstation Desktop PC/895C, BIOS U50 Ver. 02.02.02 06/28/2023 [ 5504.614129] Workqueue: events drm_mode_rmfb_work_fn [drm] [ 5504.614197] RIP: 0010:amdgpu_irq_put+0x68/0x90 [amdgpu] [ 5504.614488] Code: e8 48 8b 53 08 f0 ff 0c 82 b8 00 00 00 00 74 09 5b 5d 41 5c c3 cc cc cc cc 89 ea 48 89 de 4c 89 e7 5b 5d 41 5c e9 88 fd ff ff <0f> 0b b8 ea ff ff ff eb dd b8 ea ff ff ff c3 cc cc cc cc b8 fe ff [ 5504.614492] RSP: 0018:ffffb33201bab908 EFLAGS: 00010046 [ 5504.614496] RAX: 0000000000000000 RBX: ffff9fb8221a6580 RCX: ffffffffc0f236c0 [ 5504.614499] RDX: ffff9fb8191ce6a0 RSI: 0000000000000001 RDI: ffff9fb8221a6580 [ 5504.614501] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 5504.614503] R10: 0000000000000000 R11: ffffb33201bab808 R12: ffff9fb8221a0000 [ 5504.614505] R13: ffff9fb85cf40c00 R14: 0000000000000002 R15: ffff9fb8013fb5c0 [ 5504.614507] FS: 0000000000000000(0000) GS:ffff9fbf5f440000(0000) knlGS:0000000000000000 [ 5504.614511] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 5504.614514] CR2: 00007fe78001dff8 CR3: 000000045c810000 CR4: 0000000000750ee0 [ 5504.614517] PKRU: 55555554 [ 5504.614518] Call Trace: [ 5504.614524] <TASK> [ 5504.614529] dm_disable_vblank+0x51/0x130 [amdgpu 2c72935baa5937dfb9e671dc8e6b836e4a24dc2d] [ 5504.614974] drm_vblank_disable_and_save+0xab/0xf0 [drm b7a9a327381557ef05f2df2f04ddba3d982e9f24] [ 5504.615022] drm_crtc_vblank_off+0xbd/0x250 [drm b7a9a327381557ef05f2df2f04ddba3d982e9f24] [ 5504.615061] amdgpu_dm_atomic_commit_tail+0x178/0x3230 [amdgpu 2c72935baa5937dfb9e671dc8e6b836e4a24dc2d] [ 5504.615471] ? dcn20_populate_dml_pipes_from_context+0x116/0xe40 [amdgpu 2c72935baa5937dfb9e671dc8e6b836e4a24dc2d] [ 5504.615896] ? dcn30_internal_validate_bw+0xf4/0xa40 [amdgpu 2c72935baa5937dfb9e671dc8e6b836e4a24dc2d] [ 5504.616317] ? slab_post_alloc_hook+0x4f/0x250 [ 5504.616327] ? dcn30_validate_bandwidth+0x110/0x2d0 [amdgpu 2c72935baa5937dfb9e671dc8e6b836e4a24dc2d] [ 5504.616727] ? dc_validate_global_state+0x2c9/0x3a0 [amdgpu 2c72935baa5937dfb9e671dc8e6b836e4a24dc2d] [ 5504.617094] ? dma_resv_iter_first_unlocked+0x62/0x70 [ 5504.617102] ? dma_resv_get_fences+0x4d/0x230 [ 5504.617107] ? dma_resv_get_singleton+0x2d/0x110 [ 5504.617112] ? drm_gem_plane_helper_prepare_fb+0xf2/0x1f0 [drm_kms_helper b9d92b90f05cb9ae9f6cf3d96cd9cdabf337b730] [ 5504.617142] ? wait_for_completion_timeout+0xd1/0x100 [ 5504.617150] commit_tail+0x91/0x120 [drm_kms_helper b9d92b90f05cb9ae9f6cf3d96cd9cdabf337b730] [ 5504.617172] drm_atomic_helper_commit+0x10f/0x140 [drm_kms_helper b9d92b90f05cb9ae9f6cf3d96cd9cdabf337b730] [ 5504.617191] drm_atomic_commit+0x93/0xc0 [drm b7a9a327381557ef05f2df2f04ddba3d982e9f24] [ 5504.617238] ? __drm_printfn_seq_file+0x20/0x20 [drm b7a9a327381557ef05f2df2f04ddba3d982e9f24] [ 5504.617279] drm_framebuffer_remove+0x491/0x4d0 [drm b7a9a327381557ef05f2df2f04ddba3d982e9f24] [ 5504.617323] drm_mode_rmfb_work_fn+0x6c/0x80 [drm b7a9a327381557ef05f2df2f04ddba3d982e9f24] [ 5504.617360] process_one_work+0x264/0x440 [ 5504.617368] worker_thread+0x217/0x3c0 [ 5504.617372] ? process_one_work+0x440/0x440 [ 5504.617376] kthread+0x154/0x180 [ 5504.617380] ? set_kthread_struct+0x50/0x50 [ 5504.617384] ret_from_fork+0x1f/0x30 [ 5504.617390] </TASK> [ 5504.617391] ---[ end trace c3c72df3d54bc608 ]---
SUSE-SU-2023:4375-1: An update that solves nine vulnerabilities and has 17 security fixes can now be installed. Category: security (important) Bug References: 1208788, 1211162, 1211307, 1212423, 1212649, 1213705, 1213772, 1214754, 1214874, 1215095, 1215104, 1215523, 1215545, 1215921, 1215955, 1215986, 1216062, 1216202, 1216322, 1216323, 1216324, 1216333, 1216345, 1216512, 1216621, 802154 CVE References: CVE-2023-2163, CVE-2023-31085, CVE-2023-34324, CVE-2023-3777, CVE-2023-39189, CVE-2023-39191, CVE-2023-39193, CVE-2023-46813, CVE-2023-5178 Sources used: SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_7-1-150500.11.5.1 openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5_Update_7-1-150500.11.5.1, kernel-source-5.14.21-150500.55.36.1, kernel-obs-qa-5.14.21-150500.55.36.1, kernel-syms-5.14.21-150500.55.36.1, kernel-obs-build-5.14.21-150500.55.36.1, kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.36.1, kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 Development Tools Module 15-SP5 (src): kernel-source-5.14.21-150500.55.36.1, kernel-obs-build-5.14.21-150500.55.36.1, kernel-syms-5.14.21-150500.55.36.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4414-1: An update that solves 11 vulnerabilities and has 11 security fixes can now be installed. Category: security (important) Bug References: 1208788, 1211162, 1211307, 1212423, 1213705, 1213772, 1214754, 1214874, 1215104, 1215523, 1215545, 1215921, 1215955, 1215986, 1216062, 1216202, 1216322, 1216323, 1216324, 1216333, 1216345, 1216512 CVE References: CVE-2023-2163, CVE-2023-2860, CVE-2023-31085, CVE-2023-34324, CVE-2023-3777, CVE-2023-39189, CVE-2023-39191, CVE-2023-39193, CVE-2023-45862, CVE-2023-46813, CVE-2023-5178 Sources used: openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.23.1, kernel-syms-azure-5.14.21-150500.33.23.1 Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.23.1, kernel-syms-azure-5.14.21-150500.33.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
(In reply to Teuniz XXX from comment #31) > After the latest kernel update (5.14.21-150500.55.31-default) the system > crashed. It's a completely different kernel from the original report, and the symptom is also different. Please open another bug report if you still hit the issue with very latest Leap 15.5 kernel. I close the entry as Leap 15.4 already reached EOL.