Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752721AbdIRILN (ORCPT ); Mon, 18 Sep 2017 04:11:13 -0400 Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:56771 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751581AbdIRILL (ORCPT ); Mon, 18 Sep 2017 04:11:11 -0400 Date: Mon, 18 Sep 2017 10:11:09 +0200 From: Pavel Machek To: Joonsoo Kim Cc: Tony Lindgren , pali.rohar@gmail.com, sre@kernel.org, kernel list , linux-arm-kernel , linux-omap@vger.kernel.org, khilman@kernel.org, aaro.koskinen@iki.fi, ivo.g.dimitrov.75@gmail.com, patrikbachan@gmail.com, serge@hallyn.com, abcloriens@gmail.com, "Aneesh Kumar K.V" , Vlastimil Babka , Andrew Morton , Stephen Rothwell , Russell King Subject: Linux-next broken for 2 weeks was Re: n900 in next-20170901 Message-ID: <20170918081109.GA11661@amd> References: <20170903203737.GA12475@amd> <20170905201314.GE5024@atomide.com> <20170905233241.GA19231@js1304-P5Q-DELUXE> <20170906133057.GH5024@atomide.com> <20170907073038.GA2111@js1304-P5Q-DELUXE> <20170907161650.GP5024@atomide.com> <20170915131817.GA19486@amd> <20170918020126.GA19200@js1304-P5Q-DELUXE> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="ikeVEW9yuYc//A+q" Content-Disposition: inline In-Reply-To: <20170918020126.GA19200@js1304-P5Q-DELUXE> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2091 Lines: 62 --ikeVEW9yuYc//A+q Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > > > > After commit 9caf25f996e8, user for CMA memory should use to check > > > > PageHighmem in order to get proper virtual address of the page. If > > > > someone doesn't use it, it is possible to use wrong virtual address > > > > and it then causes the use of wrong physical address. > > > > CONFIG_DEBUG_VIRTUAL would catch this case. > > >=20 > > > OK, no extra output of current next with CONFIG_DEBUG_VIRTUAL=3Dy. > > > Booting of n900 hangs with just the same error: > > >=20 > > > save_secure_sram() returns 0000ff02 > > >=20 > > > > If it doesn't help, is there a way to test n900 configuration in QE= MU? > > >=20 > > > I doubt that QEMU n900 boots in secure mode but instead shows > > > the SoC as general purpose SoC. If so, you'd have to patch the > > > omap3_save_secure_ram_context() to attempt to save secure RAM > > > context in all cases. If that works then debugging with any > > > omap3 board like beagleboard in QEMU should work. > >=20 > > Okay, linux-next from today still does not boot on n900. Is it > > something new, or was this still not fixed in -next? >=20 > Hello, >=20 > Still not fixed in -next since I cannot regenerate the error. Unfortunately, rest of the world can reproduce the error, and it means linux-next is useless for us. I'd expect you to drop the relevant tree from linux-next when the error was reported. Clearly, those patches are unsuitable for 4.15, as they are broken, so they should not be in linux-next. Thanks, Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --ikeVEW9yuYc//A+q Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlm/f50ACgkQMOfwapXb+vLSegCgicSe52c3dugEW4wOXdGZb4UC y9UAoK3qu2t9VCaQpOPuMePdttYfOfEJ =QiCB -----END PGP SIGNATURE----- --ikeVEW9yuYc//A+q--