Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp862555rdb; Wed, 6 Dec 2023 01:57:08 -0800 (PST) X-Google-Smtp-Source: AGHT+IHaI6m7L4Jh19pZQuQl9fYxv1GWttvSv3twlTh4+MKiy3xZpA68rqjO7JUHuhGKprAcjp0Y X-Received: by 2002:a05:6a20:9387:b0:18a:d4c3:1350 with SMTP id x7-20020a056a20938700b0018ad4c31350mr322681pzh.44.1701856627967; Wed, 06 Dec 2023 01:57:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701856627; cv=none; d=google.com; s=arc-20160816; b=SemriPQS0v3RLc2TXKkQlewxealkNdCTFYta6bm7HgbW0SOMa6ud/JqQRGUwbBufxf oRx8Deng91EFPiQF32IiUsJUnZlg+a7H7oLBA18R9Rmw2HDw7VcR2tx+bQZSNlU026sF 3CkxiL6CMyEnc+6gcJzWLzEL3J392WrjJc6nAd4x/ok4QRFP/DbYTJFUFJ5U6ATs1yns mFtuZhwz+flOVhYBePiMbkfVJOzMJc+l+zOA0O/nak5/IZQeS7G/roPB9a4NpnJiKm96 VLfGP2s8CwhX1g+qqbBXl+rziBVlJK5sFcf637oIjMsIKIBlr/EoKhw2jMXEPbvQaxUr J6SQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:reply-to :from:references:cc:to:content-language:subject:user-agent :mime-version:date:message-id; bh=bXi+Tq7IPhUbOnpwak7kCGRvLQfw/DhY4TrD9yQ/Vo0=; fh=yVm7GMuPVeXDVSG0RZ3FHOCcgjXiXJgRlPbIao6UU8Q=; b=c7ECRqiU1leNq20iagxcozZHEjN/WVqvC4Yc5R2azylra87p9YcMQYI+G2Py1IJlwC L+ko/A9ozbV8xqwFiZvHHYB2EAlBQ6W0cjRqJshRwLlisyRWjzSrXXZzuKR2X1LU7s9s smycan56mzxSVJPEPkOY6fILwzf3+4FuZq3g5cMhi/DnVsZTAVx8ZMe4wx13d5lFnHhU WTUUyG8G6AzdIxkiHq+OicybndNVljAhcvq45Ag1BtWTKcMBj5PpE3vwA2o8gMZNUDRU 4I/pQJJcKRcREBXpTPSutTYQkKrxAynNplM9ncj3ZKWMrsHxKnse63TcORFdVT9czSOe 8hOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id h7-20020a170902f7c700b001cfa37f9a6esi5622271plw.531.2023.12.06.01.57.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Dec 2023 01:57:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id BAEBE80C2565; Wed, 6 Dec 2023 01:57:04 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377310AbjLFJ4p (ORCPT + 99 others); Wed, 6 Dec 2023 04:56:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55372 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1377306AbjLFJ4n (ORCPT ); Wed, 6 Dec 2023 04:56:43 -0500 Received: from wp530.webpack.hosteurope.de (wp530.webpack.hosteurope.de [80.237.130.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A099BFA for ; Wed, 6 Dec 2023 01:56:49 -0800 (PST) Received: from [2a02:8108:8980:2478:8cde:aa2c:f324:937e]; authenticated by wp530.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) id 1rAoe1-0001Jn-NU; Wed, 06 Dec 2023 10:56:41 +0100 Message-ID: Date: Wed, 6 Dec 2023 10:56:40 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: Bug#1054514: linux-image-6.1.0-13-amd64: Debian VM with qxl graphics freezes frequently Content-Language: en-US, de-DE To: Gerd Hoffmann Cc: 1054514@bugs.debian.org, Dave Airlie , Daniel Vetter , virtualization@lists.linux-foundation.org, spice-devel@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, regressions@lists.linux.dev, Timo Lindfors , Salvatore Bonaccorso , Thomas Zimmermann References: From: "Linux regression tracking (Thorsten Leemhuis)" Reply-To: Linux regressions mailing list In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-bounce-key: webpack.hosteurope.de;regressions@leemhuis.info;1701856609;f9e47c69; X-HE-SMSGID: 1rAoe1-0001Jn-NU X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 06 Dec 2023 01:57:04 -0800 (PST) Hi, Thorsten here, the Linux kernel's regression tracker. Top-posting for once, to make this easily accessible to everyone. Gerd, it seems this regression[1] fell through the cracks. Could you please take a look? Or is there a good reason why this can't be addressed? Or was it dealt with and I just missed it? [1] apparently caused by 5a838e5d5825c8 ("drm/qxl: simplify qxl_fence_wait") [v5.13-rc1] from Gerd; for details see https://lore.kernel.org/regressions/ZTgydqRlK6WX_b29@eldamar.lan/ Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat) -- Everything you wanna know about Linux kernel regression tracking: https://linux-regtracking.leemhuis.info/about/#tldr If I did something stupid, please tell me, as explained on that page. #regzbot poke On 24.10.23 23:39, Timo Lindfors wrote: > Hi, > > On Tue, 24 Oct 2023, Salvatore Bonaccorso wrote: >> Thanks for the excelent constructed report! I think it's best to >> forward this directly to upstream including the people for the >> bisected commit to get some idea. > > Thanks for the quick reply! > >> Can you reproduce the issue with 6.5.8-1 in unstable as well? > > Unfortunately yes: > > ansible@target:~$ uname -r > 6.5.0-3-amd64 > ansible@target:~$ time sudo ./reproduce.bash > Wed 25 Oct 2023 12:27:00 AM EEST starting round 1 > Wed 25 Oct 2023 12:27:24 AM EEST starting round 2 > Wed 25 Oct 2023 12:27:48 AM EEST starting round 3 > bug was reproduced after 3 tries > > real    0m48.838s > user    0m1.115s > sys     0m45.530s > > I also tested upstream tag v6.6-rc6: > > ... > + detected_version=6.6.0-rc6 > + '[' 6.6.0-rc6 '!=' 6.6.0-rc6 ']' > + exec ssh target sudo ./reproduce.bash > Wed 25 Oct 2023 12:37:16 AM EEST starting round 1 > Wed 25 Oct 2023 12:37:42 AM EEST starting round 2 > Wed 25 Oct 2023 12:38:10 AM EEST starting round 3 > Wed 25 Oct 2023 12:38:36 AM EEST starting round 4 > Wed 25 Oct 2023 12:39:01 AM EEST starting round 5 > Wed 25 Oct 2023 12:39:27 AM EEST starting round 6 > bug was reproduced after 6 tries > > > For completeness, here is also the grub_set_default_version.bash script > that I had to write to automate this (maybe these could be in debian > wiki?): > > #!/bin/bash > set -x > > version="$1" > > idx=$(expr $(grep "menuentry " /boot/grub/grub.cfg | sed 1d |grep -n > "'Debian GNU/Linux, with Linux $version'"|cut -d: -f1) - 1) > exec sudo grub-set-default "1>$idx" > > > > -Timo > > >