Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3809357ybi; Mon, 27 May 2019 06:25:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqzO4infN5p5jaHtgqDbDrH5HQAoJs/JgPkoJSIVEM1O9E1koKzFtKPv1e+H7ghA41OmXdAA X-Received: by 2002:a17:90a:b106:: with SMTP id z6mr31073659pjq.91.1558963556629; Mon, 27 May 2019 06:25:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558963556; cv=none; d=google.com; s=arc-20160816; b=fv3yKA0zKyUjO6B0OsJv6OTsIpsWYQW2p91FlTr4acS/oSVRciWdCnCp5MSNfp0PVe km8cHCxM/ZgCSUZsMbX0vIUj9RXaicS6RndvO6zKUdNKe58MNFYCC4oZjA3yM/zgii8C Y4KLAsSZhwhVNAaLIFWA9mx0hUWVuOl7eri7lPTzV3rzyqurNl/gUezV2cECiCpo5tLK kXJmLo4E2/w5UlCJZ7BJ/9KQNcquroBSgDVLD+7HlCQH6rvTnOMEAWKNTNTDmkB072op v+lv2uN21DEbFyOU/aYll+8dELqpGy4wr2NShFNuFYB+8qI95ToWcXT0/8H3xJ4cGETP /7/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version:dkim-signature; bh=STeVJYuzzC0vgEmbhzepGm0OXOHVmeFu4vSmMZlFZlc=; b=03Ipi9lgIHM/BWAGQMJgjqUjMTaDB2dzFRMErFLECHS4OAv8OT2k+TeH5uHTZ2bT9x ggnpZaxtLfqZI8vwGh9EeqmY3ATmyxdpJOlwmlPlZ4eUMH7EKy359kd9EM5Vbv/Prlfb 39PvB9Lv+XTVri4ETuZihhOP91j+vMLqawWipLtebRjOezr3vfYHLE4ykkCioTMErQ2g BgbU0a18RcoCpbzmT8NjN1ZJtcHTB9vqvHqfMVkK4iHlW1mxcVQPL9DRtfmzy3P2HHn+ NsQPk0gtsrsIGMwUpovar/g7EKOT8zTbEy1GUgL+5WyWsyJInYpFCRx8cmY4oPXG5X8N 0vng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tronnes.org header.s=ds201810 header.b=oAHVaPZz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h32si14401632pld.144.2019.05.27.06.25.41; Mon, 27 May 2019 06:25:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@tronnes.org header.s=ds201810 header.b=oAHVaPZz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726819AbfE0NXL (ORCPT + 99 others); Mon, 27 May 2019 09:23:11 -0400 Received: from webmail-smtp.domeneshop.no ([194.63.252.70]:55773 "EHLO webmail-smtp.domeneshop.no" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726515AbfE0NXL (ORCPT ); Mon, 27 May 2019 09:23:11 -0400 X-Greylist: delayed 412 seconds by postgrey-1.27 at vger.kernel.org; Mon, 27 May 2019 09:23:10 EDT Received: from webmail12.domeneshop.no ([2a01:5b40:0:2702::1]:58856) by webmail-smtp.domeneshop.no with esmtp (Exim 4.80) (envelope-from ) id 1hVFU0-0000qt-8g; Mon, 27 May 2019 15:16:08 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=tronnes.org; s=ds201810; h=Message-ID:References:In-Reply-To:Subject:Cc:To:From:Date:Content-Transfer-Encoding:Content-Type:MIME-Version; bh=STeVJYuzzC0vgEmbhzepGm0OXOHVmeFu4vSmMZlFZlc=; b=oAHVaPZzRR1QLGVekAncfI5tmxdQiTAgKTFU/ZMdw9QcluflTLCtNLeboTUavW/9r2X9MGGbwnHAIHt2bqCxh8j4xSY3TTyUW2xM44O3Eq5WsqmIhjH3kQ/wo4zuc2aurtUp4f38wOEYJxODNJbkTrbLCV0KWW5rHz5MGuCFt9VnIy0m1DC7rHIHtk9P4Rph7HLydueHUJJJZT/ttQ0L97TaurXj+eYP4UpJTdbAH5CAUAWlBEEd12a2pCRFcxHSNO5reHCgZ84om7v9zp7i56VzLltT1eQP540T0P0JE225/hO3IqzMTTWHTzcQR3n5orE1d/YkZnDep2SDFE6m4g==; Received: from localhost ([::1]:34422 helo=webmail.domeneshop.no) by webmail12.domeneshop.no with esmtpa (Exim 4.84_2) (envelope-from ) id 1hVFTz-0002ai-L0; Mon, 27 May 2019 15:16:07 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Mon, 27 May 2019 15:16:07 +0200 From: =?UTF-8?Q?Noralf_Tr=C3=B8nnes?= To: Tony Lindgren Cc: Sebastian Reichel , Pavel Machek , kernel list , linux-arm-kernel , linux-omap@vger.kernel.org, nekit1000@gmail.com, mpartap@gmx.net, merlijn@wizzup.org, =?UTF-8?Q?No?= =?UTF-8?Q?ralf_Tr=C3=B8nnes?= , Mark Brown , linux-spi@vger.kernel.org Subject: Re: 5.2-rc1 on droid4: spi crash In-Reply-To: <20190527055343.GG5447@atomide.com> References: <20190523090926.GA9106@amd> <20190523093325.6si5jpvrvyktpax6@earth.universe> <20190527055343.GG5447@atomide.com> Message-ID: X-Sender: notro@tronnes.org User-Agent: Domeneshop Webmail/1.1.12 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Den 2019-05-27 07:53, skrev Tony Lindgren: > Hi, > > * Sebastian Reichel [190523 09:33]: >> Hi, >> >> On Thu, May 23, 2019 at 11:09:26AM +0200, Pavel Machek wrote: >> > This was greeting me overnight... I don't yet know how reproducible it >> > is, it happened once so far. >> >> Please pipe the stacktrace into ./scripts/decode_stacktrace.sh >> to get a readable stacktrace, otherwise this is pretty much useless. >> FWIW the only SPI device in the Droid 4 is the PMIC. > > I've seen this too, and looks like reverting commit c9ba7a16d0f1 > ("spi: Release spi_res after finalizing message") fixes it based > several days of testing. > > Noralf and Mark, any ideas what needs to be fixed here? Mark has a revert in his for-5.2 branch: spi: Fix Raspberry Pi breakage https://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi.git/commit/?h=for-5.2&id=0ed56252c9567351344cb7b5cff6140e1bcec943 I don't know when or if he has sent a pull request. Sorry about the breakage. Noralf. > > Below is the stacktrace I see without c9ba7a16d0f1 reverted, > not sure how to reproduce but it seems to happen within about > one to two days of uptime. > > Regards, > > Tony > > 8< ----------------- > Unable to handle kernel NULL pointer dereference at virtual address > 00000008 > pgd = 829f0a5b > [00000008] *pgd=00000000 > Internal error: Oops: 80000005 [#1] SMP ARM > ... > CPU: 0 PID: 71 Comm: spi0 Tainted: G W 5.2.0-rc1+ #5983 > Hardware name: Generic OMAP4 (Flattened Device Tree) > PC is at 0x8 > LR is at spi_res_release+0x54/0x80 > pc : [<00000008>] lr : [] psr: 20000113 > sp : ed6e3e88 ip : ed6e3eb0 fp : ed6e3eac > r10: c0b9eca8 r9 : 00000100 r8 : 00000200 > r7 : ed65bc00 r6 : ed6e5d3c r5 : ed6e5d0c r4 : c0d05254 > r3 : 00000008 r2 : c0d05264 r1 : ed6e5d0c r0 : ed65bc00 > Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none > Control: 10c5387d Table: abf3c04a DAC: 00000051 > Process spi0 (pid: 71, stack limit = 0x0ef66f65) > Stack: (0xed6e3e88 to 0xed6e4000) > 3e80: ed6e5cd0 ed6e5d0c ed65bc00 c0daf080 00000000 > ed510410 > 3ea0: ed6e3eec ed6e3eb0 c06fd8c4 c06faa00 ed65b800 00000000 ed65ba20 > ed65bee0 > 3ec0: ed6e3eec ed65bc00 ed6e5cd0 ed6e5d0c 00000000 ed510410 ed510410 > 00000001 > 3ee0: ed6e3f2c ed6e3ef0 c06fdcd4 c06fd560 00000004 c0170948 ed6e3f20 > ed65bdfc > 3f00: ffffe000 ed65be68 ed65be44 ffffe000 c0dc7734 ed65be48 c0166f88 > 00000000 > 3f20: ed6e3f3c ed6e3f30 c06fe10c c06fd9a4 ed6e3f74 ed6e3f40 c0166f54 > c06fe0f8 > 3f40: ed6e3f74 6eb8f9ff c0166780 00000000 ed3bccc0 ed659c00 ed6e2000 > ed65be44 > 3f60: c0166eac ed115c44 ed6e3fac ed6e3f78 c0166e58 c0166eb8 ed3bccdc > ed3bccdc > 3f80: ed6e3fac ed659c00 c0166cf8 00000000 00000000 00000000 00000000 > 00000000 > 3fa0: 00000000 ed6e3fb0 c01010e8 c0166d04 00000000 00000000 00000000 > 00000000 > 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 > 00000000 > 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 > 00000000 > Backtrace: > [] (spi_res_release) from [] > (spi_transfer_one_message+0x370/0x444) > r9:ed510410 r8:00000000 r7:c0daf080 r6:ed65bc00 r5:ed6e5d0c > r4:ed6e5cd0 > [] (spi_transfer_one_message) from [] > (__spi_pump_messages+0x33c/0x754) > r10:00000001 r9:ed510410 r8:ed510410 r7:00000000 r6:ed6e5d0c > r5:ed6e5cd0 > r4:ed65bc00 > [] (__spi_pump_messages) from [] > (spi_pump_messages+0x20/0x24) > r10:00000000 r9:c0166f88 r8:ed65be48 r7:c0dc7734 r6:ffffe000 > r5:ed65be44 > r4:ed65be68 > [] (spi_pump_messages) from [] > (kthread_worker_fn+0xa8/0x268) > [] (kthread_worker_fn) from [] > (kthread+0x160/0x178) > r10:ed115c44 r9:c0166eac r8:ed65be44 r7:ed6e2000 r6:ed659c00 > r5:ed3bccc0 > r4:00000000 > [] (kthread) from [] (ret_from_fork+0x14/0x2c) > Exception stack(0xed6e3fb0 to 0xed6e3ff8) > 3fa0: 00000000 00000000 00000000 > 00000000 > 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 > 00000000 > 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 > r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 > r5:c0166cf8 > r4:ed659c00 > Code: bad PC value > ---[ end trace a8011e9722dfda5e ]---