Summary: | [ILK] With Linux 4.1.6 and 4.2 Xorg can't start, then kernel module crash, then system completely freeze | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | DRI | Reporter: | russianneuromancer | ||||||||||
Component: | DRM/Intel | Assignee: | Intel GFX Bugs mailing list <intel-gfx-bugs> | ||||||||||
Status: | CLOSED FIXED | QA Contact: | Intel GFX Bugs mailing list <intel-gfx-bugs> | ||||||||||
Severity: | critical | ||||||||||||
Priority: | medium | CC: | intel-gfx-bugs | ||||||||||
Version: | unspecified | ||||||||||||
Hardware: | x86-64 (AMD64) | ||||||||||||
OS: | Linux (All) | ||||||||||||
Whiteboard: | |||||||||||||
i915 platform: | i915 features: | ||||||||||||
Attachments: |
|
Description
russianneuromancer
2015-09-07 13:51:07 UTC
Created attachment 118123 [details]
intel_reg dump
Created attachment 118124 [details]
dmesg
Created attachment 118125 [details]
Xorg log
The trigger is the TIMESTAMP probe inside mesa, using the reg_read_ioctl. That for some reason is causing a soft lockup inside the reader, so I presume it is the retry if unstable logic? If you revert: commit ee0a227b7ac6e75f28e10269f81c7ec6eb600952 Author: Chris Wilson <chris@chris-wilson.co.uk> Date: Wed Jul 15 09:50:42 2015 +0100 drm/i915: Replace WARN inside I915_READ64_2x32 with retry loop does the system recover? > If you revert ee0a227b7ac6e75f28e10269f81c7ec6eb600952 does the system recover?
I doesn't know how to compile kernel, but I do notice that ee0a227b7ac6e75f28e10269f81c7ec6eb600952 is included in Linux 4.1.6, but not included in Linux 4.1.5, so I compare this two builds:
Linux 4.1.5 - normal behaviour, normal boot.
Linux 4.1.6 - same behaviour as with Linux 4.2.0. I can provide all debug logs, if necessary.
Hmm, the new version of the reg_read ioctl is in v4.1.5, can you please attach your dmesg from that kernel. I expect to see a warn instead. Created attachment 118129 [details]
dmesg
Boot with Linux 4.1.5 and manual SDDM launch.
Seems like fixed with 4.2.1. |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.