Bug 1330392

Summary: [abrt] general protection fault in drm_dp_payload_send_msg [drm_kms_helper]
Product: [Fedora] Fedora Reporter: Kamil Páral <kparal>
Component: xorg-x11-drv-intelAssignee: Adam Jackson <ajax>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 24CC: ajax, kernel-maint, xgl-maint
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/6a370460235a5bbd1f5fbef6ae4f3b958c396038
Whiteboard: abrt_hash:7abb805acf656d1cf1c62db54d3eb56d1fde9d89;VARIANT_ID=workstation;
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-08-08 14:21:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: dmesg none

Description Kamil Páral 2016-04-26 06:52:09 UTC
Additional info:
reporter:       libreport-2.7.0
general protection fault: 0000 [#1] SMP 
Modules linked in: vhost_net vhost macvtap macvlan nls_utf8 isofs uas usb_storage nfnetlink_queue nfnetlink_log nfnetlink ccm xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack tun bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables fuse bnep intel_rapl x86_pkg_temp_thermal coretemp kvm_intel arc4 kvm irqbypass ghash_clmulni_intel iwlmvm vfat fat iTCO_wdt iTCO_vendor_support mac80211 snd_hda_codec_realtek snd_hda_codec_generic snd_hda_codec_hdmi snd_hda_intel uvcvideo iwlwifi snd_hda_codec snd_hda_core videobuf2_vmalloc joydev videobuf2_memops videobuf2_v4l2 snd_hwdep videobuf2_core btusb snd_seq videodev intel_pch_thermal i2c_i801 btrtl btbcm btintel snd_seq_device cfg80211
 snd_pcm rtsx_pci_ms media thinkpad_acpi memstick mei_me snd_timer snd lpc_ich bluetooth shpchp mei soundcore rfkill wmi tpm_tis tpm nfsd auth_rpcgss nfs_acl lockd grace sunrpc dm_crypt i915 rtsx_pci_sdmmc mmc_core crct10dif_pclmul crc32_pclmul crc32c_intel i2c_algo_bit drm_kms_helper drm serio_raw e1000e rtsx_pci ptp pps_core video fjes
CPU: 0 PID: 1947 Comm: Xorg Not tainted 4.5.1-300.fc24.x86_64 #1
Hardware name: LENOVO 20BWS1KY0H/20BWS1KY0H, BIOS JBET49WW (1.14 ) 05/21/2015
task: ffff8803306c0000 ti: ffff880330664000 task.ti: ffff880330664000
RIP: 0010:[<ffffffffa010422a>]  [<ffffffffa010422a>] drm_dp_payload_send_msg+0x14a/0x1f0 [drm_kms_helper]
RSP: 0018:ffff880330667a58  EFLAGS: 00010282
RAX: ffff8803306c0000 RBX: e6a43efa90aa7d03 RCX: ffff880095fb0910
RDX: 0000000080000000 RSI: e6a43efa90aa7d03 RDI: ffff880095fb0910
RBP: ffff880330667aa8 R08: 000000000001a2c0 R09: ffffffffa01041c7
R10: ffffea000cd05400 R11: 0000000000000001 R12: ffff880095ebaf10
R13: ffff88034b2fb000 R14: ffff880095fb0658 R15: 0000000000000003
FS:  00007f3892f2ea40(0000) GS:ffff88035dc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc9e41ed028 CR3: 0000000334026000 CR4: 00000000003406f0
Stack:
 ffff880095fb0910 edc7d8afa0416417 0000000000000000 00000000fd3b2927
 00000000fd3b2927 0000000000000001 ffff880095ebaf10 ffff880095fb0658
 ffff880095fb09a8 ffff88034b2fb438 ffff880330667ae8 ffffffffa0104853
Call Trace:
 [<ffffffffa0104853>] drm_dp_update_payload_part2+0xc3/0x130 [drm_kms_helper]
 [<ffffffffa0102430>] ? drm_dp_check_act_status+0x40/0xe0 [drm_kms_helper]
 [<ffffffffa022914b>] intel_mst_enable_dp+0xfb/0x180 [i915]
 [<ffffffffa0209d6d>] haswell_crtc_enable+0x3fd/0x8e0 [i915]
 [<ffffffffa02054ed>] intel_atomic_commit+0x78d/0x1880 [i915]
 [<ffffffffa00b2492>] ? drm_atomic_check_only+0x182/0x600 [drm]
 [<ffffffffa00b1ce7>] ? drm_atomic_set_crtc_for_connector+0x57/0xe0 [drm]
 [<ffffffffa00b294a>] drm_atomic_commit+0x3a/0x60 [drm]
 [<ffffffffa0109ab6>] drm_atomic_helper_set_config+0x76/0xb0 [drm_kms_helper]
 [<ffffffffa00a1c05>] drm_mode_set_config_internal+0x65/0x100 [drm]
 [<ffffffffa00a632f>] drm_mode_setcrtc+0x2ef/0x520 [drm]
 [<ffffffffa0097712>] drm_ioctl+0x152/0x540 [drm]
 [<ffffffffa00a6040>] ? drm_mode_setplane+0x1b0/0x1b0 [drm]
 [<ffffffff81256863>] do_vfs_ioctl+0xa3/0x5d0
 [<ffffffff81256e09>] SyS_ioctl+0x79/0x90
 [<ffffffff817cd2ae>] entry_SYSCALL_64_fastpath+0x12/0x6d
Code: bc eb ce 49 8d 8e b8 02 00 00 49 8b 9d 30 04 00 00 48 89 cf 48 89 4d b0 e8 c4 6c 6c e1 49 83 be e8 02 00 00 00 48 8b 4d b0 74 57 <4c> 8b 7b 28 4d 85 ff 74 4e 49 3b 5f 20 74 30 49 8b 9f 30 04 00 
RIP  [<ffffffffa010422a>] drm_dp_payload_send_msg+0x14a/0x1f0 [drm_kms_helper]
 RSP <ffff880330667a58>

Comment 1 Kamil Páral 2016-04-26 06:52:17 UTC
Created attachment 1150751 [details]
File: dmesg

Comment 2 Fedora End Of Life 2017-07-25 20:36:45 UTC
This message is a reminder that Fedora 24 is nearing its end of life.
Approximately 2 (two) weeks from now Fedora will stop maintaining
and issuing updates for Fedora 24. It is Fedora's policy to close all
bug reports from releases that are no longer maintained. At that time
this bug will be closed as EOL if it remains open with a Fedora  'version'
of '24'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version'
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not
able to fix it before Fedora 24 is end of life. If you would still like
to see this bug fixed and are able to reproduce it against a later version
of Fedora, you are encouraged  change the 'version' to a later Fedora
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's
lifetime, sometimes those efforts are overtaken by events. Often a
more recent Fedora release includes newer upstream software that fixes
bugs or makes them obsolete.

Comment 3 Fedora End Of Life 2017-08-08 14:21:08 UTC
Fedora 24 changed to end-of-life (EOL) status on 2017-08-08. Fedora 24 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.