[Nouveau] [Bug 70390] [NV84] Repeated system crashes under graphics load, E[PFIFO] DMA_PUSHER and lots of E[PGRAPH]
bugzilla-daemon at freedesktop.org
bugzilla-daemon at freedesktop.org
Sun Oct 13 05:09:20 PDT 2013
https://bugs.freedesktop.org/show_bug.cgi?id=70390
--- Comment #10 from Martin von Gagern <Martin.vGagern at gmx.net> ---
Created attachment 87553
--> https://bugs.freedesktop.org/attachment.cgi?id=87553&action=edit
report 0x00406040 value in nouveau_bo_wr32
(In reply to comment #9)
> (In reply to comment #8)
> > So... the mystery is where does this 0x40 method come from.
>
> Can we add a bit of debug code somewhere, to detect that specific value when
> it enters the ring, and emit useful information like a kernel stack trace?
Gave this a stab, using a BUG_ON conditional the way this attachment describes
it. Unless static function scope variables don't work the same in kernel space
and in unser space, this should report if, BEGIN_NV04, OUT_RING or some other
command was used to write this value.
Result: I managed to get that first DMA_PUSHER line all by itself:
nouveau E[ PFIFO][0000:01:00.0] DMA_PUSHER - ch 4 [stellarium[14333]] get
0x0020111a6c put 0x0020116e10 ib_get 0x00000070 ib_put 0x00000097 state
0x80007641 (err: INVALID_CMD) push 0x00406040
With no stack trace or other indication that my BUG_ON got triggered. Also with
no subsequent error messages, or system crash.
So I'd conclude that the line does not neccessarily lead to a crash, and that
the critical value does not get written via nouveau_bo_wr32. Where else could
it come from? What is the most central location where I might put such code?
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freedesktop.org/archives/nouveau/attachments/20131013/022808d9/attachment.html>
More information about the Nouveau
mailing list