On Sat, Oct 28, 2017 at 7:38 AM, Tomasz Kłoczko <kloczko.tomasz@xxxxxxxxx> wrote: > On 11 October 2017 at 16:21, Peter Robinson <pbrobinson@xxxxxxxxx> wrote: >> >> On Wed, Oct 11, 2017 at 1:48 PM, Tomasz Kłoczko >> <kloczko.tomasz@xxxxxxxxx> wrote: >> > Thanks for reply Peter. >> > >> > Just found that even on latest f27 kernel (4.13.4-300.fc27) execution of >> > the >> > sensors-detect command is causing OOPs. >> >> sensors-detect in what package? > > > From lm_sensors. > >> >> Ultimately if there's a userspace crash you should use abrt to report >> a bug against that package > > > It is not crash in user space. Execution of the user space binary > sensors-detect is causing kernel space OOPS. > > This is what is printed on the terminal on executing this program: I don't believe sensors-detect should be used on the RPi, in fact on any ARM device as it's very much focused on servers/x86 and accessing things via DMI/SMbus and other pretty x86 methods, it uses rudimentary techniques to just bash random locations where there might be sensors. What are you actually trying to achieve with it? The Pi OOTB has no onboard sensors of note, and the addons should likely be detected/accessed via GPIO or the IIO stack. > -- > [root@rpi3 ~]# sensors-detect > # sensors-detect revision 6284 (2015-05-31 14:00:33 +0200) > # DMI data unavailable, please consider installing dmidecode 2.7 > # or later for better results. > # Kernel: 4.14.0-0.rc6.git2.1.fc28.armv7hl armv7l > Use of uninitialized value in concatenation (.) or string at > /sbin/sensors-detect line 2867. > Use of uninitialized value in concatenation (.) or string at > /sbin/sensors-detect line 2867. > Use of uninitialized value in concatenation (.) or string at > /sbin/sensors-detect line 2867. > # Processor: ARMv7 Processor rev 4 (v7l) (//) > > This program will help you determine which kernel modules you need > to load to use lm_sensors most effectively. It is generally safe > and recommended to accept the default answers to all questions, > unless you know what you're doing. > > Some south bridges, CPUs or memory controllers contain embedded sensors. > Do you want to scan for them? This is totally safe. (YES/no): > modprobe: FATAL: Module cpuid not found in directory > /lib/modules/4.14.0-0.rc6.git2.1.fc28.armv7hl > Failed to load module cpuid. > Silicon Integrated Systems SIS5595... No > VIA VT82C686 Integrated Sensors... No > VIA VT8231 Integrated Sensors... No > AMD K8 thermal sensors... No > AMD Family 10h thermal sensors... No > AMD Family 11h thermal sensors... No > AMD Family 12h and 14h thermal sensors... No > AMD Family 15h thermal sensors... No > AMD Family 16h thermal sensors... No > AMD Family 15h power sensors... No > AMD Family 16h power sensors... No > Intel digital thermal sensor... No > Intel AMB FB-DIMM thermal sensor... No > Intel 5500/5520/X58 thermal sensor... No > VIA C7 thermal sensor... No > VIA Nano thermal sensor... No > > Some Super I/O chips contain embedded sensors. We have to write to > standard I/O ports to probe them. This is usually safe. > Do you want to scan for Super I/O sensors? (YES/no): > Probing for Super-I/O at 0x2e/0x2f > Segmentation fault > [root@rpi3 ~]# > Message from syslogd@rpi3 at Oct 28 02:32:13 ... > kernel:Internal error: Oops: 805 [#1] SMP ARM > > Message from syslogd@rpi3 at Oct 28 02:32:13 ... > kernel:Process sensors-detect (pid: 854, stack limit = 0xec642220) > > Message from syslogd@rpi3 at Oct 28 02:32:13 ... > kernel:Stack: (0xec643ed0 to 0xec644000) > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3ec0: 00000001 000000aa 00000001 > ed8df7c0 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3ee0: c082dd9c 00000000 ec643f88 00000001 ec642000 00000000 0219e028 > c052b0c0 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3f00: 00000000 00000001 600f0013 c12085f4 00000000 c03b7dc0 00000001 > 00000000 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3f20: 00000000 c04e5130 00000000 00000000 ee839e24 00000000 ffffe000 > c052b334 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3f40: ed8df7c0 00000002 ed8df7c0 00000001 00000000 ec643f88 0219e028 > c052b380 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3f60: ed8df7c0 0219e028 00000001 ed8df7c0 ed8df7c0 0219e028 00000001 > c0308884 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3f80: ec642000 c052b550 0000002e 00000000 00000001 01e7b150 0217e1fc > 00000004 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3fa0: 00000004 c03086c0 01e7b150 0217e1fc 00000003 0219e028 00000001 > 00000000 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3fc0: 01e7b150 0217e1fc 00000004 00000004 00000000 0217e208 0217e208 > 0219e028 > > Message from syslogd@rpi3 at Oct 28 02:32:14 ... > kernel:3fe0: b6ee928c be8a91a8 b6e31cec b6cf3ce0 600f0010 00000003 00000000 > 00000000 > > Message from syslogd@rpi3 at Oct 28 02:32:15 ... > kernel:Code: f57ff04e ebebb419 e2453612 e59d2004 (e5c32000) > > -- > > And here is what lands in dmesg buffer: > -- > [ 616.047139] Unable to handle kernel paging request at virtual address > fee0002e > [ 616.054835] pgd = ec460000 > [ 616.057715] [fee0002e] *pgd=00000000 > [ 616.061526] Internal error: Oops: 805 [#1] SMP ARM > [ 616.066611] Modules linked in: rc_cec vc4 snd_soc_core ac97_bus > snd_pcm_dmaengine cec rc_core snd_pcm snd_timer snd soundcore drm_kms_helper > drm brcmfmac hci_uart btbcm brcmutil fb_sys_fops btqca syscopyarea btintel > sysfillrect cfg80211 sysimgblt bluetooth ecdh_generic rfkill bcm2835_thermal > bcm2835_rng bcm2835_wdt leds_gpio xfs libcrc32c smsc95xx usbnet mii > mmc_block sdhci_iproc crc32_arm_ce dwc2 sdhci_pltfm udc_core sdhci > pwm_bcm2835 bcm2835 i2c_bcm2835 bcm2835_dma phy_generic > [ 616.111895] CPU: 3 PID: 854 Comm: sensors-detect Tainted: G W > 4.14.0-0.rc6.git2.1.fc28.armv7hl #1 > [ 616.122489] Hardware name: Generic DT based system > [ 616.127573] task: eeb18000 task.stack: ec642000 > [ 616.132391] PC is at write_port+0x54/0xf8 > [ 616.136648] LR is at write_port+0x4c/0xf8 > [ 616.140903] pc : [<c082ddf0>] lr : [<c082dde8>] psr: 600f0013 > [ 616.147551] sp : ec643ed0 ip : 00000000 fp : c0ed2f0c > [ 616.153092] r10: 0219dffa r9 : ffffe000 r8 : 0000002e > [ 616.158635] r7 : ec643f88 r6 : 0219e028 r5 : 0000002e r4 : 0219e028 > [ 616.165555] r3 : fee0002e r2 : 000000aa r1 : 00000051 r0 : 00000000 > [ 616.172477] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment > none > [ 616.180040] Control: 10c5383d Table: 2c46006a DAC: 00000051 > [ 616.186132] Process sensors-detect (pid: 854, stack limit = 0xec642220) > [ 616.193142] Stack: (0xec643ed0 to 0xec644000) > [ 616.197768] 3ec0: 00000001 000000aa > 00000001 ed8df7c0 > [ 616.206441] 3ee0: c082dd9c 00000000 ec643f88 00000001 ec642000 00000000 > 0219e028 c052b0c0 > [ 616.215113] 3f00: 00000000 00000001 600f0013 c12085f4 00000000 c03b7dc0 > 00000001 00000000 > [ 616.223784] 3f20: 00000000 c04e5130 00000000 00000000 ee839e24 00000000 > ffffe000 c052b334 > [ 616.232457] 3f40: ed8df7c0 00000002 ed8df7c0 00000001 00000000 ec643f88 > 0219e028 c052b380 > [ 616.241131] 3f60: ed8df7c0 0219e028 00000001 ed8df7c0 ed8df7c0 0219e028 > 00000001 c0308884 > [ 616.249803] 3f80: ec642000 c052b550 0000002e 00000000 00000001 01e7b150 > 0217e1fc 00000004 > [ 616.258475] 3fa0: 00000004 c03086c0 01e7b150 0217e1fc 00000003 0219e028 > 00000001 00000000 > [ 616.283872] 3fc0: 01e7b150 0217e1fc 00000004 00000004 00000000 0217e208 > 0217e208 0219e028 > [ 616.309327] 3fe0: b6ee928c be8a91a8 b6e31cec b6cf3ce0 600f0010 00000003 > 00000000 00000000 > [ 616.334803] [<c082ddf0>] (write_port) from [<c052b0c0>] > (__vfs_write+0x34/0x128) > [ 616.359537] [<c052b0c0>] (__vfs_write) from [<c052b380>] > (vfs_write+0xc0/0x194) > [ 616.384154] [<c052b380>] (vfs_write) from [<c052b550>] > (SyS_write+0x44/0x7c) > [ 616.408456] [<c052b550>] (SyS_write) from [<c03086c0>] > (ret_fast_syscall+0x0/0x28) > [ 616.433215] Code: f57ff04e ebebb419 e2453612 e59d2004 (e5c32000) > [ 616.456395] ---[ end trace fd6257e0866129e5 ]--- > [ 693.238550] kworker/dying (33) used greatest stack depth: 4664 bytes left > > -- > > Why it needs to be reported over abrt? > I've removed those packages from my image trying to minimize size of the > image. > > Just had time to back to my RPi3. > Latest kernel is OOPSing in bcm driver on boot: > > -- > [ 45.055586] ------------[ cut here ]------------ > [ 45.060715] WARNING: CPU: 3 PID: 618 at lib/dma-debug.c:614 > debug_dma_assert_idle+0x148/0x1e0 > [ 45.069913] bcm2835-dma 3f007000.dma: DMA-API: cpu touching an active dma > mapped cacheline [cln=0x00c88300] > [ 45.080352] Modules linked in: rc_cec vc4 snd_soc_core ac97_bus > snd_pcm_dmaengine cec rc_core snd_pcm snd_timer snd soundcore drm_kms_helper > drm brcmfmac hci_uart btbcm brcmutil fb_sys_fops btqca syscopyarea btintel > sysfillrect cfg80211 sysimgblt bluetooth ecdh_generic rfkill bcm2835_thermal > bcm2835_rng bcm2835_wdt leds_gpio xfs libcrc32c smsc95xx usbnet mii > mmc_block sdhci_iproc crc32_arm_ce dwc2 sdhci_pltfm udc_core sdhci > pwm_bcm2835 bcm2835 i2c_bcm2835 bcm2835_dma phy_generic > [ 45.126296] CPU: 3 PID: 618 Comm: dhclient Not tainted > 4.14.0-0.rc6.git2.1.fc28.armv7hl #1 > [ 45.135100] Hardware name: Generic DT based system > [ 45.140269] [<c0313154>] (unwind_backtrace) from [<c030d92c>] > (show_stack+0x18/0x1c) > [ 45.148545] [<c030d92c>] (show_stack) from [<c0b7cf90>] > (dump_stack+0xa0/0xd8) > [ 45.156768] [<c0b7cf90>] (dump_stack) from [<c0353ee8>] > (__warn+0xe4/0x104) > [ 45.164564] [<c0353ee8>] (__warn) from [<c0353f44>] > (warn_slowpath_fmt+0x3c/0x4c) > [ 45.173010] [<c0353f44>] (warn_slowpath_fmt) from [<c0710258>] > (debug_dma_assert_idle+0x148/0x1e0) > [ 45.182983] [<c0710258>] (debug_dma_assert_idle) from [<c04e4b90>] > (wp_page_copy+0xfc/0x640) > [ 45.192353] [<c04e4b90>] (wp_page_copy) from [<c04e6660>] > (do_wp_page+0x3a4/0x5ac) > [ 45.200744] [<c04e6660>] (do_wp_page) from [<c04e99b8>] > (handle_mm_fault+0xd28/0xde0) > [ 45.209392] [<c04e99b8>] (handle_mm_fault) from [<c0b99580>] > (do_page_fault+0x244/0x3b8) > [ 45.218306] [<c0b99580>] (do_page_fault) from [<c0301348>] > (do_DataAbort+0x40/0xc0) > [ 45.226756] [<c0301348>] (do_DataAbort) from [<c0b98e60>] > (__dabt_usr+0x40/0x60) > [ 45.234939] Exception stack(0xed95dfb0 to 0xed95dff8) > [ 45.240406] dfa0: 02291210 b6cced00 > b6ccecf8 00000000 > [ 45.249399] dfc0: 02291170 b6cce000 00000001 b6389010 b6fbba48 00000000 > 00000000 004fea78 > [ 45.258446] dfe0: fbad2c84 bed5a9f8 00000000 b6bf29a4 60010010 ffffffff > [ 45.265600] ---[ end trace fd6257e0866129e4 ]--- > [ 45.270564] Mapped at: > [ 45.273228] snd_pcm_lib_preallocate_pages1+0x54/0x180 [snd_pcm] > [ 45.279818] dmaengine_pcm_new+0x184/0x1e4 [snd_soc_core] > [ 45.285750] soc_new_pcm+0x39c/0x46c [snd_soc_core] > [ 45.291120] snd_soc_register_card+0x9c8/0xcb8 [snd_soc_core] > [ 45.297411] devm_snd_soc_register_card+0x44/0x80 [snd_soc_core] > -- > > kloczek > -- > Tomasz Kłoczko | LinkedIn: http://lnkd.in/FXPWxH > _______________________________________________ arm mailing list -- arm@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to arm-leave@xxxxxxxxxxxxxxxxxxxxxxx