Bug 1810163 - [abrt] dc_validate_global_state: WARNING: CPU: 14 PID: 5282 at drivers/gpu/drm/amd/amdgpu/../display/dc/dcn20/dcn20_resource.c:2959 dcn20_validate_bandwidth+0x99/0xb0 [amdgpu] [amdgpu]
Summary: [abrt] dc_validate_global_state: WARNING: CPU: 14 PID: 5282 at drivers/gpu/dr...
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 31
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL: https://retrace.fedoraproject.org/faf...
Whiteboard: abrt_hash:742b4eb27d81c0dbec2a06b7f07...
: 1813467 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-03-04 16:22 UTC by Chris Baltzer
Modified: 2020-11-24 17:10 UTC (History)
18 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2020-11-24 17:10:25 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: dmesg (108.45 KB, text/plain)
2020-03-04 16:22 UTC, Chris Baltzer
no flags Details

Description Chris Baltzer 2020-03-04 16:22:28 UTC
Description of problem:
Restarted session to enable extended input settings in Gnome Tweaks

Additional info:
reporter:       libreport-2.12.0
WARNING: CPU: 14 PID: 5282 at drivers/gpu/drm/amd/amdgpu/../display/dc/dcn20/dcn20_resource.c:2959 dcn20_validate_bandwidth+0x99/0xb0 [amdgpu]
Modules linked in: ccm uinput xt_CHECKSUM xt_MASQUERADE nf_nat_tftp nf_conntrack_tftp tun bridge stp llc nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_REJECT nf_reject_ipv6 ip6t_rpfilter ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc vfat fat snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_usb_audio snd_hda_codec rt2800usb rt2x00usb uvcvideo snd_hda_core rt2800lib snd_usbmidi_lib snd_rawmidi snd_hwdep videobuf2_vmalloc rt2x00lib snd_seq videobuf2_memops snd_seq_device videobuf2_v4l2 mac80211 edac_mce_amd snd_pcm videobuf2_common kvm_amd videodev eeepc_wmi cfg80211 snd_timer asus_wmi kvm sparse_keymap mc irqbypass libarc4
 joydev snd video pcspkr wmi_bmof sp5100_tco i2c_piix4 soundcore k10temp acpi_cpufreq ip_tables rfkill dm_crypt amdgpu amd_iommu_v2 gpu_sched i2c_algo_bit ttm drm_kms_helper crct10dif_pclmul drm crc32_pclmul crc32c_intel ghash_clmulni_intel ccp nvme r8169 nvme_core wmi pinctrl_amd fuse
CPU: 14 PID: 5282 Comm: kworker/14:1 Not tainted 5.5.7-200.fc31.x86_64 #1
Hardware name: System manufacturer System Product Name/PRIME X570-P, BIOS 1005 08/02/2019
Workqueue: events drm_mode_rmfb_work_fn [drm]
RIP: 0010:dcn20_validate_bandwidth+0x99/0xb0 [amdgpu]
Code: 00 00 00 5d 41 5c e9 f6 f5 ff ff 31 d2 f2 0f 11 85 70 21 00 00 48 89 ee 4c 89 e7 e8 e1 f5 ff ff 89 c2 22 95 b8 1d 00 00 75 04 <0f> 0b eb b3 c6 85 b8 1d 00 00 00 89 d0 eb a8 0f 1f 84 00 00 00 00
RSP: 0018:ffffb543c9c53c60 EFLAGS: 00010246
RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000006f8e
RDX: 0000000000000000 RSI: ffff974fbedb01a0 RDI: 00000000000301a0
RBP: ffff974f66e10000 R08: 0000000000000006 R09: 0000000000000000
R10: ffff974facb40000 R11: 0000000100000001 R12: ffff974facb40000
R13: ffff974f1b856680 R14: 0000000000000000 R15: ffff974f66e10000
FS:  0000000000000000(0000) GS:ffff974fbed80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7410e9c130 CR3: 00000007f04c0000 CR4: 0000000000340ee0
Call Trace:
 dc_validate_global_state+0x25f/0x2d0 [amdgpu]
 amdgpu_dm_atomic_check+0x5d0/0x830 [amdgpu]
 drm_atomic_check_only+0x554/0x7e0 [drm]
 drm_atomic_commit+0x13/0x50 [drm]
 drm_framebuffer_remove+0x3a7/0x420 [drm]
 drm_mode_rmfb_work_fn+0x4f/0x60 [drm]
 process_one_work+0x1b5/0x360
 worker_thread+0x1e2/0x3c0
 kthread+0xf9/0x130
 ? process_one_work+0x360/0x360
 ? kthread_park+0x90/0x90
 ret_from_fork+0x22/0x40

Comment 1 Chris Baltzer 2020-03-04 16:22:34 UTC
Created attachment 1667538 [details]
File: dmesg

Comment 2 david.andrew.roney 2020-03-13 22:05:10 UTC
*** Bug 1813467 has been marked as a duplicate of this bug. ***

Comment 3 Ben Cotton 2020-11-03 16:25:48 UTC
This message is a reminder that Fedora 31 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora 31 on 2020-11-24.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
Fedora 'version' of '31'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 31 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 4 Ben Cotton 2020-11-24 17:10:25 UTC
Fedora 31 changed to end-of-life (EOL) status on 2020-11-24. Fedora 31 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.