[Nouveau] [Bug 70390] [NV84] Repeated system crashes under graphics load, E[PFIFO] DMA_PUSHER and lots of E[PGRAPH]

bugzilla-daemon at freedesktop.org bugzilla-daemon at freedesktop.org
Thu Oct 17 13:30:11 PDT 2013


https://bugs.freedesktop.org/show_bug.cgi?id=70390

--- Comment #14 from Martin von Gagern <Martin.vGagern at gmx.net> ---
(In reply to comment #13)
> nv84_fence_emit32+0xda/0x1a0
> 
> Can you figure out exactly which write this is pointing at? For some of the
> values, it could be perfectly legitimate to have the 0x406040 value (e.g.
> the sequence id, or the low bits of the address).

It's the sequence id. The inlined OUT_RING function makes line numbers almost
unusable, but I see the right shift for upper_32_bits, and it's the third
nouveau_bo_wr32 call after that. False alarm?

> My point about nv50_dma_push is that this is the path that user-submitted
> command streams take; they don't go through nouveau_bo_wr*, they are written
> by userspace via mmap'd sections, and then commands are written to the ring
> to jump to them.

I see. And after all, I got the error message in comment #10 without triggering
the BUG_ON, so there has to be a way around this check.

So what exactly do I examine in nv50_dma_push? I see arguments delta and
length, and the delta is used to compute some offset. But all of these are
declared as integers of various sizes and signedness, not as pointers. Should I
cast one or the other to void* and iterate over length 32bit words? Or length/4
32bit words?

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freedesktop.org/archives/nouveau/attachments/20131017/d8a71540/attachment.html>


More information about the Nouveau mailing list