✗ CI.checkpatch: warning for drm/xe/vf: Fix VM crash during VF driver release (rev2)
Patchwork
patchwork at emeril.freedesktop.org
Mon Jul 28 06:29:02 UTC 2025
== Series Details ==
Series: drm/xe/vf: Fix VM crash during VF driver release (rev2)
URL : https://patchwork.freedesktop.org/series/152142/
State : warning
== Summary ==
+ KERNEL=/kernel
+ git clone https://gitlab.freedesktop.org/drm/maintainer-tools mt
Cloning into 'mt'...
warning: redirecting to https://gitlab.freedesktop.org/drm/maintainer-tools.git/
+ git -C mt rev-list -n1 origin/master
c298eac5978c38dcc62a70c0d73c91765e7cc296
+ cd /kernel
+ git config --global --add safe.directory /kernel
+ git log -n1
commit e9cf610f3e712873ccc07cd02bab5cc94d44d0e6
Author: Satyanarayana K V P <satyanarayana.k.v.p at intel.com>
Date: Mon Jul 28 12:10:02 2025 +0530
drm/xe/vf: Fix VM crash during VF driver release
The VF CCS save/restore series (patchwork #149108) has a dependency
on the migration framework. A recent migration update in commit
d65ff1ec8535 ("drm/xe: Split xe_migrate allocation from initialization")
caused a VM crash during XE driver release for iGPU devices.
Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b83: 0000 [#1] SMP NOPTI
xe 0000:00:02.1: [drm:guc_ct_change_state [xe]] GT0: GuC CT communication channel enabled
CPU: 1 UID: 0 PID: 5998 Comm: bash Kdump: loaded Tainted: G U W 6.16.0-xe+ #4 PREEMPT(voluntary)
xe 0000:00:02.0: [drm:xe_sriov_pf_service_handshake_vf [xe]] PF: VF1 negotiated ABI version 1.0
Tainted: [U]=USER, [W]=WARN
Hardware name: Intel Corporation Panther Lake Client Platform/PTL-UH LP5 T3 RVP1, BIOS PTLPFWI1.R00.3214.D01.2505280450 05/28/2025
RIP: 0010:xe_lrc_ring_head+0x12/0xb0 [xe]
xe 0000:00:02.1: [drm:xe_gt_sriov_vf_connect [xe]] GT0: VF: using VF/PF ABI 1.0
Code: c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 55 41 54 53 48 83 ec 10 <f6> 47 18 02 74 45 48 8b 47 38 48 8b 00 4c 8b 20 e8 69 db ff ff 80
RSP: 0018:ffffc900043eb8d0 EFLAGS: 00010282
RAX: 6b6b6b6b6b6b6b6b RBX: 6b6b6b6b6b6b6b6b RCX: ffff88811a028c40
RDX: 0000000000000000 RSI: ffff88811a028c68 RDI: 6b6b6b6b6b6b6b6b
RBP: ffffc900043eb8f8 R08: ffffffffa1695dda R09: 0000000000000010
xe 0000:00:02.1: [drm] GT0: reset done
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88811a029c40
R13: ffffc900043eb970 R14: ffff888119fc40c8 R15: ffff888119fc4548
FS: 00007e03036bf740(0000) GS:ffff8884eb3b0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005af31328c000 CR3: 0000000114534004 CR4: 0000000000f72ef0
PKRU: 55555554
Call Trace:
<TASK>
xe_sriov_vf_ccs_fini+0x1e/0x40 [xe]
devm_action_release+0x12/0x30
release_nodes+0x3a/0x120
devres_release_all+0x96/0xd0
device_unbind_cleanup+0x12/0x80
device_release_driver_internal+0x23a/0x280
device_release_driver+0x12/0x20
pci_stop_bus_device+0x69/0x90
pci_stop_and_remove_bus_device+0x12/0x30
pci_iov_remove_virtfn+0xbd/0x130
sriov_disable+0x42/0x100
pci_disable_sriov+0x34/0x50
xe_pci_sriov_configure+0xf71/0x1020 [xe]
? sriov_numvfs_store+0x78/0x160
? _parse_integer+0xe/0x20
? _kstrtoull+0x3a/0xa0
sriov_numvfs_store+0x10c/0x160
dev_attr_store+0x14/0x40
sysfs_kf_write+0x4a/0x80
kernfs_fop_write_iter+0x166/0x220
vfs_write+0x284/0x550
ksys_write+0x6f/0xf0
__x64_sys_write+0x19/0x30
x64_sys_call+0x2bf/0x2660
do_syscall_64+0x93/0x1320
? ksys_dup3+0xba/0x170
? __x64_sys_dup2+0x2e/0x1f0
? do_syscall_64+0x1a2/0x1320
? __rseq_handle_notify_resume+0x447/0x5e0
? trace_hardirqs_off+0x5a/0xd0
? irqentry_exit_to_user_mode+0xdf/0x2f0
? irqentry_exit+0x77/0xb0
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7e030351c574
Code: c7 00 16 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 80 3d d5 ea 0e 00 00 74 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 55 48 89 e5 48 83 ec 20 48 89
RSP: 002b:00007ffd34a10798 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007e030351c574
RDX: 0000000000000002 RSI: 00005af318d7da30 RDI: 0000000000000001
RBP: 00007ffd34a107c0 R08: 0000000000000073 R09: 0000000000000000
R10: 00000000ffffffff R11: 0000000000000202 R12: 0000000000000002
R13: 00005af318d7da30 R14: 00007e03036045c0 R15: 00007e0303601ee0
</TASK>
Update the VF CCS migration initialization sequence to align with the new
migration framework changes, resolving the release-time crash.
Fixes: f3009272ff2e ("drm/xe/vf: Create contexts for CCS read write")
Signed-off-by: Satyanarayana K V P <satyanarayana.k.v.p at intel.com>
Cc: Michal Wajdeczko <michal.wajdeczko at intel.com>
Cc: Matthew Brost <matthew.brost at intel.com>
Cc: Matthew Auld <matthew.auld at intel.com>
Cc: Piotr Piórkowski <piotr.piorkowski at intel.com>
+ /mt/dim checkpatch 52ac98096df0784abd379f822ad14d6998b09154 drm-intel
e9cf610f3e71 drm/xe/vf: Fix VM crash during VF driver release
-:14: WARNING:COMMIT_LOG_LONG_LINE: Prefer a maximum 75 chars per line (possible unwrapped commit description?)
#14:
Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b83: 0000 [#1] SMP NOPTI
total: 0 errors, 1 warnings, 0 checks, 106 lines checked
More information about the Intel-xe
mailing list