Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unexpected behavior on SPI Device on kernel 4.19 #253

Open
juvinski opened this issue Oct 22, 2020 · 0 comments
Open

Unexpected behavior on SPI Device on kernel 4.19 #253

juvinski opened this issue Oct 22, 2020 · 0 comments

Comments

@juvinski
Copy link

Hi.

I detected this problem.
I have 2 SPI Devices on the same bus (spidev2.0 and spidev2.1).
On kernel 4.14 is working fine. After the upgrade to 4.19 I cannot use both devices. If I tried to initialize the first device(on CS1) and after that I tried to initialize the second device (on CS0) I cannot initilize this device - is like the SPIbus is in on wait or in block state.
There is a way do debug the spi bus ? There is a way to check what is happening ? I'm using ardupilot software and everything as I said is working on 4.14 but in 4.19 not.

Thanks
root@beaglebone:# /opt/scripts/tools/version.sh
git:/opt/scripts/:[20c080bc91f243ef852a704758788a31083b0f9e]
eeprom:[A335BNLTBBG1BBG219100724]
model:[TI_AM335x_BeagleBone_Green]
dogtag:[BeagleBoard.org Debian Stretch Console Image 2020-09-21]
bootloader:[microSD-(push-button)]:[/dev/mmcblk0]:[U-Boot 2019.04-00002-gc9b3922522]:[location: dd MBR]
UBOOT: Booted Device-Tree:[am335x-boneblack-uboot-univ.dts]
UBOOT: Loaded Overlay:[AM335X-PRU-UIO-00A0]
UBOOT: Loaded Overlay:[BB-ADC-00A0]
UBOOT: Loaded Overlay:[BB-BONE-eMMC1-01-00A0]
UBOOT: Loaded Overlay:[M-BB-BBG-00A0]
kernel:[4.19.142-bone-rt-r56]
/boot/uEnv.txt Settings:
uboot_overlay_options:[enable_uboot_overlays=1]
uboot_overlay_options:[disable_uboot_overlay_video=1]
uboot_overlay_options:[disable_uboot_overlay_audio=1]
uboot_overlay_options:[disable_uboot_overlay_wireless=1]
uboot_overlay_options:[uboot_overlay_pru=AM335X-PRU-UIO-00A0.dtbo]
uboot_overlay_options:[enable_uboot_cape_universal=1]
pkg check: to individually upgrade run: [sudo apt install --only-upgrade ]
pkg:[bb-cape-overlays]:[4.14.20201021.1-0
stretch+20201021]
pkg:[bb-customizations]:[1.20200826.0-0stretch+20200826]
pkg:[bb-usb-gadgets]:[1.20200504.0-0
stretch+20200504]
pkg:[bb-wl18xx-firmware]:[1.20200813.1-0stretch+20200813]
pkg:[kmod]:[23-2rcnee1
stretch+20171005]
WARNING:pkg:[librobotcontrol]:[NOT_INSTALLED]
pkg:[firmware-ti-connectivity]:[20190717-2rcnee1~stretch+20200305]
groups:[debian : debian adm kmem dialout cdrom floppy audio dip video plugdev users systemd-journal input bluetooth netdev gpio admin spi iio i2c docker tisdk weston-launch xenomai cloud9ide pwm eqep remoteproc]
cmdline:[console=ttyO0,115200n8 bone_capemgr.uboot_capemgr_enabled=1 root=/dev/mmcblk0p1 ro rootfstype=ext4 rootwait coherent_pool=1M net.ifnames=0 lpj=1990656 rng_core.default_quality=100 quiet]
dmesg | grep remote
[ 1.047028] remoteproc remoteproc0: wkup_m3 is available
[ 1.152080] remoteproc remoteproc0: powering up wkup_m3
[ 1.152101] remoteproc remoteproc0: Booting fw image am335x-pm-firmware.elf, size 217168
[ 1.154288] remoteproc remoteproc0: remote processor wkup_m3 is now up
dmesg | grep pru
dmesg | grep pinctrl-single
[ 0.606521] pinctrl-single 44e10800.pinmux: 142 pins, size 568
dmesg | grep gpio-of-helper
[ 0.617964] gpio-of-helper ocp:cape-universal: ready
END

RobertCNelson pushed a commit that referenced this issue Dec 17, 2021
[ Upstream commit a6555f8 ]

WARNING: CPU: 1 PID: 9 at net/mac80211/sta_info.c:554
sta_info_insert_rcu+0x121/0x12a0
Modules linked in:
CPU: 1 PID: 9 Comm: kworker/u8:1 Not tainted 5.14.0-rc7+ #253
Workqueue: phy3 ieee80211_iface_work
RIP: 0010:sta_info_insert_rcu+0x121/0x12a0
...
Call Trace:
 ieee80211_ibss_finish_sta+0xbc/0x170
 ieee80211_ibss_work+0x13f/0x7d0
 ieee80211_iface_work+0x37a/0x500
 process_one_work+0x357/0x850
 worker_thread+0x41/0x4d0

If an Ad-Hoc node receives packets with invalid source MAC address,
it hits a WARN_ON in sta_info_insert_check(), this can spam the log.

Signed-off-by: YueHaibing <yuehaibing@huawei.com>
Link: https://lore.kernel.org/r/20210827144230.39944-1-yuehaibing@huawei.com
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant