Received: by 2002:a05:6602:2086:0:0:0:0 with SMTP id a6csp4459029ioa; Wed, 27 Apr 2022 04:27:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyE2XeITPYY1A2gV8F0BsAIo2ijQI52w2nf5TrGIFNUYQTXCzJ+l7bAeS4VT+Njah+0UxWD X-Received: by 2002:a05:6a00:ccf:b0:50a:db82:4ae5 with SMTP id b15-20020a056a000ccf00b0050adb824ae5mr29591058pfv.59.1651058879680; Wed, 27 Apr 2022 04:27:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651058879; cv=none; d=google.com; s=arc-20160816; b=YB8DNdKslYL9535UPDkEd9tBspyME465n5LrswK5KsjZNE1WFOgok6vZEdwdM5QjDJ byJVYOhTJ9IlROJ21mpTF1IPTZEZ/QIvML0vN9MsJjFOdf2VHguO4MjRRIIo7ZpCCkOA stIxvFZfyvSn0wdJfQAgZRGBhBhBQSXP0Tr3IjaeopwKoE42VX/u0oyCnwm10jtMZjo5 afdehdVAkI/ZL19I1VBi3h1viJs2BH3MThgAJKAF6YmxiudK939NXc1vfdPBrZl7G2t9 xEfEcralgAMBh7zk18YdXaBBy5gg/KqMSo1tyaI2DRlbutH8Gxuq6LDZTc0iHnBHtoor bmOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=bsqGC6V+0jk0fBk3cm0hA98Y45iWpqxnMMlBNGDtuuo=; b=dmBo3actqQYIN6KL9mEFsOG9+ge2XO9wNMD3igaygjF03BIcP2GQs8iw3CC/gOJbQ4 73nHgu3cllARZQT2Iu/CXPr805vihNOR3HCUaz1sRJz9nB/xqFcfYE1PfpUEKhic/vgx XLPRrPBrSc+VnV65T1p3mZ1GYUEdOZ2uKlBE/tVizd76e5Uj/6satTDFbc2+FKSh6UhA yVD+TrswzAUYopl8DSKsjxJvcjTpyHbIErpCC7KnDGi8hYExfrJddU1BdujMsqa3Aa5A LNIWcSOdGEvEcpnEyx0ntCTPn1xFuRdt93+CqrCnh/wBJ9yuZpeRNc1T24ocoq0R27or Ejmg== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id u10-20020a17090a4bca00b001bd14e03038si1334862pjl.16.2022.04.27.04.27.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Apr 2022 04:27:59 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 62AE9387368; Wed, 27 Apr 2022 03:26:03 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231565AbiD0JCG (ORCPT + 99 others); Wed, 27 Apr 2022 05:02:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51228 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231465AbiD0JCF (ORCPT ); Wed, 27 Apr 2022 05:02:05 -0400 Received: from muru.com (muru.com [72.249.23.125]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 584751E8A0E; Wed, 27 Apr 2022 01:58:43 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by muru.com (Postfix) with ESMTPS id 79C9380E4; Wed, 27 Apr 2022 08:55:36 +0000 (UTC) Date: Wed, 27 Apr 2022 11:58:38 +0300 From: Tony Lindgren To: "H. Nikolaus Schaller" Cc: Discussions about the Letux Kernel , Linux Kernel Mailing List , Linux-OMAP , linux-arm-kernel@lists.infradead.org, Ard Biesheuvel , Arnd Bergmann Subject: Re: kernel panic with v5.18-rc1 on OpenPandora (only) Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Tony Lindgren [220427 08:40]: > Hi, > > * H. Nikolaus Schaller [220426 20:16]: > > Hi Tony, > > I ran across a new issue on the OpenPandora (omap3530) first appearing with v5.18-rc1. > > It seems as if there is something happening within the omap3 L3 irq handler which > > is used (only?) for the wl1251. And this triggers the timeout BUG_ON() in > > omap3_l3_app_irq(). > > > > I have not seen this issue on the GTA04. > > > > It goes away if I remove the wlan interrupt from omap3-pandora-common.dtsi. > > Interestingly, removing the wl1251.ko does NOT stop it. So it is not the driver. > > > > git bisect reported: > > > > a1c510d0adc604bb143c86052bc5be48cbcfa17c is the first bad commit > > commit a1c510d0adc604bb143c86052bc5be48cbcfa17c > > Author: Ard Biesheuvel > > Date: Thu Sep 23 09:15:53 2021 +0200 > > > > ARM: implement support for vmap'ed stacks > > > > Any ideas? > > We had to add commit 8cf8df89678a ("ARM: OMAP2+: Fix regression for smc > calls for vmap stack") to fix vmap related issues in case you have not > seen that one yet. This seems different though, it's like the L3 interrupt > handler is not reading the right register? > > Not sure why the L3 interrupt is triggering, that could be caused by > another issue with the wl1251 somewhere. Can you maybe try to temporarily disable the L3 driver and see if the stack trace is more accurate on what goes wrong? Just comment out the line for postcore_initcall_sync(omap3_l3_init) in drivers/bus/omap_l3_smx.c. The system will hang on the invalid access rather than triggering the L3 error first. Regards, Tony