1. 07 Mar, 2011 17 commits
  2. 03 Mar, 2011 2 commits
  3. 02 Mar, 2011 21 commits
    • Greg Kroah-Hartman's avatar
      Linux 2.6.32.30 · 96b03981
      Greg Kroah-Hartman authored
      96b03981
    • David S. Miller's avatar
      x25: Do not reference freed memory. · 7599b39d
      David S. Miller authored
      commit 96642d42 upstream.
      
      In x25_link_free(), we destroy 'nb' before dereferencing
      'nb->dev'.  Don't do this, because 'nb' might be freed
      by then.
      Reported-by: default avatarRandy Dunlap <randy.dunlap@oracle.com>
      Tested-by: default avatarRandy Dunlap <randy.dunlap@oracle.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      7599b39d
    • Paul Zimmerman's avatar
      xhci: Fix an error in count_sg_trbs_needed() · cbc0238c
      Paul Zimmerman authored
      commit bcd2fde0 upstream.
      
      The expression
      
      	while (running_total < sg_dma_len(sg))
      
      does not take into account that the remaining data length can be less
      than sg_dma_len(sg). In that case, running_total can end up being
      greater than the total data length, so an extra TRB is counted.
      Changing the expression to
      
      	while (running_total < sg_dma_len(sg) && running_total < temp)
      
      fixes that.
      
      This patch should be queued for stable kernels back to 2.6.31.
      Signed-off-by: default avatarPaul Zimmerman <paulz@synopsys.com>
      Signed-off-by: default avatarSarah Sharp <sarah.a.sharp@linux.intel.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      cbc0238c
    • Paul Zimmerman's avatar
      xhci: Fix errors in the running total calculations in the TRB math · 96b51bee
      Paul Zimmerman authored
      commit 5807795b upstream.
      
      Calculations like
      
      	running_total = TRB_MAX_BUFF_SIZE -
      		(sg_dma_address(sg) & (TRB_MAX_BUFF_SIZE - 1));
      	if (running_total != 0)
      		num_trbs++;
      
      are incorrect, because running_total can never be zero, so the if()
      expression will never be true. I think the intention was that
      running_total be in the range of 0 to TRB_MAX_BUFF_SIZE-1, not 1
      to TRB_MAX_BUFF_SIZE. So adding a
      
      	running_total &= TRB_MAX_BUFF_SIZE - 1;
      
      fixes the problem.
      
      This patch should be queued for stable kernels back to 2.6.31.
      Signed-off-by: default avatarPaul Zimmerman <paulz@synopsys.com>
      Signed-off-by: default avatarSarah Sharp <sarah.a.sharp@linux.intel.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      96b51bee
    • Paul Zimmerman's avatar
      xhci: Clarify some expressions in the TRB math · 0b9b5257
      Paul Zimmerman authored
      commit a2490187 upstream.
      
      This makes it easier to spot some problems, which will be fixed by the
      next patch in the series. Also change dev_dbg to dev_err in
      check_trb_math(), so any math errors will be visible even when running
      with debug disabled.
      
      Note: This patch changes the expressions containing
      "((1 << TRB_MAX_BUFF_SHIFT) - 1)" to use the equivalent
      "(TRB_MAX_BUFF_SIZE - 1)". No change in behavior is intended for
      those expressions.
      
      This patch should be queued for stable kernels back to 2.6.31.
      Signed-off-by: default avatarPaul Zimmerman <paulz@synopsys.com>
      Signed-off-by: default avatarSarah Sharp <sarah.a.sharp@linux.intel.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      0b9b5257
    • Paul Zimmerman's avatar
      xhci: Avoid BUG() in interrupt context · ed21f8dd
      Paul Zimmerman authored
      commit 68e41c5d upstream.
      
      Change the BUGs in xhci_find_new_dequeue_state() to WARN_ONs, to avoid
      bringing down the box if one of them is hit
      
      This patch should be queued for stable kernels back to 2.6.31.
      Signed-off-by: default avatarPaul Zimmerman <paulz@synopsys.com>
      Signed-off-by: default avatarSarah Sharp <sarah.a.sharp@linux.intel.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      ed21f8dd
    • Andreas Herrmann's avatar
      x86 quirk: Fix polarity for IRQ0 pin2 override on SB800 systems · 470d1c9b
      Andreas Herrmann authored
      commit 7f74f8f2 upstream.
      
      On some SB800 systems polarity for IOAPIC pin2 is wrongly
      specified as low active by BIOS. This caused system hangs after
      resume from S3 when HPET was used in one-shot mode on such
      systems because a timer interrupt was missed (HPET signal is
      high active).
      
      For more details see:
      
        http://marc.info/?l=linux-kernel&m=129623757413868Tested-by: default avatarManoj Iyer <manoj.iyer@canonical.com>
      Tested-by: default avatarAndre Przywara <andre.przywara@amd.com>
      Signed-off-by: default avatarAndreas Herrmann <andreas.herrmann3@amd.com>
      Cc: Borislav Petkov <borislav.petkov@amd.com>
      LKML-Reference: <20110224145346.GD3658@alberich.amd.com>
      Signed-off-by: default avatarIngo Molnar <mingo@elte.hu>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      470d1c9b
    • NeilBrown's avatar
      md: correctly handle probe of an 'mdp' device. · 62ead775
      NeilBrown authored
      commit 8f5f02c4 upstream.
      
      'mdp' devices are md devices with preallocated device numbers
      for partitions. As such it is possible to mknod and open a partition
      before opening the whole device.
      
      this causes  md_probe() to be called with a device number of a
      partition, which in-turn calls mddev_find with such a number.
      
      However mddev_find expects the number of a 'whole device' and
      does the wrong thing with partition numbers.
      
      So add code to mddev_find to remove the 'partition' part of
      a device number and just work with the 'whole device'.
      
      This patch addresses https://bugzilla.kernel.org/show_bug.cgi?id=28652
      
      Reported-by: hkmaly@bigfoot.com
      Signed-off-by: default avatarNeilBrown <neilb@suse.de>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      62ead775
    • Timo Warns's avatar
      ldm: corrupted partition table can cause kernel oops · 9723799a
      Timo Warns authored
      commit 294f6cf4 upstream.
      
      The kernel automatically evaluates partition tables of storage devices.
      The code for evaluating LDM partitions (in fs/partitions/ldm.c) contains
      a bug that causes a kernel oops on certain corrupted LDM partitions.  A
      kernel subsystem seems to crash, because, after the oops, the kernel no
      longer recognizes newly connected storage devices.
      
      The patch changes ldm_parse_vmdb() to Validate the value of vblk_size.
      Signed-off-by: default avatarTimo Warns <warns@pre-sense.de>
      Cc: Eugene Teo <eugeneteo@kernel.sg>
      Acked-by: default avatarRichard Russon <ldm@flatcap.org>
      Cc: Harvey Harrison <harvey.harrison@gmail.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      9723799a
    • FUJITA Tomonori's avatar
      swiotlb: fix wrong panic · 484d82b6
      FUJITA Tomonori authored
      commit fba99fa3 upstream.
      
      swiotlb's map_page wrongly calls panic() when it can't find a buffer fit
      for device's dma mask.  It should return an error instead.
      
      Devices with an odd dma mask (i.e.  under 4G) like b44 network card hit
      this bug (the system crashes):
      
         http://marc.info/?l=linux-kernel&m=129648943830106&w=2
      
      If swiotlb returns an error, b44 driver can use the own bouncing
      mechanism.
      Reported-by: default avatarChuck Ebbert <cebbert@redhat.com>
      Signed-off-by: default avatarFUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>
      Tested-by: default avatarArkadiusz Miskiewicz <arekm@maven.pl>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      484d82b6
    • Davide Libenzi's avatar
      epoll: prevent creating circular epoll structures · 8216e1a0
      Davide Libenzi authored
      commit 22bacca4 upstream.
      
      In several places, an epoll fd can call another file's ->f_op->poll()
      method with ep->mtx held.  This is in general unsafe, because that other
      file could itself be an epoll fd that contains the original epoll fd.
      
      The code defends against this possibility in its own ->poll() method using
      ep_call_nested, but there are several other unsafe calls to ->poll
      elsewhere that can be made to deadlock.  For example, the following simple
      program causes the call in ep_insert recursively call the original fd's
      ->poll, leading to deadlock:
      
       #include <unistd.h>
       #include <sys/epoll.h>
      
       int main(void) {
           int e1, e2, p[2];
           struct epoll_event evt = {
               .events = EPOLLIN
           };
      
           e1 = epoll_create(1);
           e2 = epoll_create(2);
           pipe(p);
      
           epoll_ctl(e2, EPOLL_CTL_ADD, e1, &evt);
           epoll_ctl(e1, EPOLL_CTL_ADD, p[0], &evt);
           write(p[1], p, sizeof p);
           epoll_ctl(e1, EPOLL_CTL_ADD, e2, &evt);
      
           return 0;
       }
      
      On insertion, check whether the inserted file is itself a struct epoll,
      and if so, do a recursive walk to detect whether inserting this file would
      create a loop of epoll structures, which could lead to deadlock.
      
      [nelhage@ksplice.com: Use epmutex to serialize concurrent inserts]
      Signed-off-by: default avatarDavide Libenzi <davidel@xmailserver.org>
      Signed-off-by: default avatarNelson Elhage <nelhage@ksplice.com>
      Reported-by: default avatarNelson Elhage <nelhage@ksplice.com>
      Tested-by: default avatarNelson Elhage <nelhage@ksplice.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      8216e1a0
    • Max Vozeler's avatar
      staging: usbip: vhci: use urb->dev->portnum to find port · e9053787
      Max Vozeler authored
      commit 01446ef5 upstream.
      
      The access to pending_port was racy when two devices
      were being attached at the same time.
      Signed-off-by: default avatarMax Vozeler <max@vozeler.com>
      Tested-by: default avatarMark Wehby <MWehby@luxotticaRetail.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      e9053787
    • Max Vozeler's avatar
      staging: usbip: vhci: refuse to enqueue for dead connections · e28b4a0b
      Max Vozeler authored
      commit 6d212153 upstream.
      
      There can be requests to enqueue URBs while we are shutting
      down a connection.
      Signed-off-by: default avatarMax Vozeler <max@vozeler.com>
      Tested-by: default avatarMark Wehby <MWehby@luxotticaRetail.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      e28b4a0b
    • Max Vozeler's avatar
      staging: usbip: vhci: give back URBs from in-flight unlink requests · b076e706
      Max Vozeler authored
      commit b92a5e23 upstream.
      
      If we never received a RET_UNLINK because the TCP
      connection broke the pending URBs still need to be
      unlinked and given back.
      
      Previously processes would be stuck trying to kill
      the URB even after the device was detached.
      Signed-off-by: default avatarMax Vozeler <max@vozeler.com>
      Tested-by: default avatarMark Wehby <MWehby@luxotticaRetail.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      b076e706
    • Max Vozeler's avatar
      staging: usbip: vhci: update reference count for usb_device · 96ea4801
      Max Vozeler authored
      commit 7606ee8a upstream.
      
      This fixes an oops observed when reading status during
      removal of a device:
      
      [ 1706.648285] general protection fault: 0000 [#1] SMP
      [ 1706.648294] last sysfs file: /sys/devices/platform/vhci_hcd/status
      [ 1706.648297] CPU 1
      [ 1706.648300] Modules linked in: binfmt_misc microcode fuse loop vhci_hcd(N) usbip(N) usbcore usbip_common_mod(N) rtc_core rtc_lib joydev dm_mirror dm_region_hash dm_log linear dm_snapshot xennet dm_mod ext3 mbcache jbd processor thermal_sys hwmon xenblk cdrom
      [ 1706.648324] Supported: Yes
      [ 1706.648327] Pid: 10422, comm: usbip Tainted: G          N  2.6.32.12-0.7-xen #1
      [ 1706.648330] RIP: e030:[<ffffffff801b10d5>]  [<ffffffff801b10d5>] strnlen+0x5/0x40
      [ 1706.648340] RSP: e02b:ffff8800a994dd30  EFLAGS: 00010286
      [ 1706.648343] RAX: ffffffff80481ec1 RBX: 0000000000000000 RCX: 0000000000000002
      [ 1706.648347] RDX: 00200d1d4f1c001c RSI: ffffffffffffffff RDI: 00200d1d4f1c001c
      [ 1706.648350] RBP: ffff880129a1c0aa R08: ffffffffa01901c4 R09: 0000000000000006
      [ 1706.648353] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8800a9a1c0ab
      [ 1706.648357] R13: 00200d1d4f1c001c R14: 00000000ffffffff R15: ffff880129a1c0aa
      [ 1706.648363] FS:  00007f2f2e9ca700(0000) GS:ffff880001018000(0000) knlGS:0000000000000000
      [ 1706.648367] CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033
      [ 1706.648370] CR2: 000000000071b048 CR3: 00000000b4b68000 CR4: 0000000000002660
      [ 1706.648374] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
      [ 1706.648378] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
      [ 1706.648381] Process usbip (pid: 10422, threadinfo ffff8800a994c000, task ffff88007b170200)
      [ 1706.648385] Stack:
      [ 1706.648387]  ffffffff801b28c9 0000000000000002 ffffffffa01901c4 ffff8800a9a1c0ab
      [ 1706.648391] <0> ffffffffa01901c6 ffff8800a994de08 ffffffff801b339b 0000000000000004
      [ 1706.648397] <0> 0000000affffffff ffffffffffffffff 00000000000067c0 0000000000000000
      [ 1706.648404] Call Trace:
      [ 1706.648413]  [<ffffffff801b28c9>] string+0x39/0xe0
      [ 1706.648419]  [<ffffffff801b339b>] vsnprintf+0x1eb/0x620
      [ 1706.648423]  [<ffffffff801b3813>] sprintf+0x43/0x50
      [ 1706.648429]  [<ffffffffa018d719>] show_status+0x1b9/0x220 [vhci_hcd]
      [ 1706.648438]  [<ffffffff8024a2b7>] dev_attr_show+0x27/0x60
      [ 1706.648445]  [<ffffffff80144821>] sysfs_read_file+0x101/0x1d0
      [ 1706.648451]  [<ffffffff800da4a7>] vfs_read+0xc7/0x130
      [ 1706.648457]  [<ffffffff800da613>] sys_read+0x53/0xa0
      [ 1706.648462]  [<ffffffff80007458>] system_call_fastpath+0x16/0x1b
      [ 1706.648468]  [<00007f2f2de40f30>] 0x7f2f2de40f30
      [ 1706.648470] Code: 66 0f 1f 44 00 00 48 83 c2 01 80 3a 00 75 f7 48 89 d0 48 29 f8 f3 c3 66 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 48 85 f6 74 29 <80> 3f 00 74 24 48 8d 56 ff 48 89 f8 eb 0e 0f 1f 44 00 00 48 83
      [ 1706.648507] RIP  [<ffffffff801b10d5>] strnlen+0x5/0x40
      [ 1706.648511]  RSP <ffff8800a994dd30>
      [ 1706.649575] ---[ end trace b4eb72bf2e149593 ]---
      Signed-off-by: default avatarMax Vozeler <max@vozeler.com>
      Tested-by: default avatarMark Wehby <MWehby@luxotticaRetail.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      96ea4801
    • Jon Thomas's avatar
      sierra: add new ID for Airprime/Sierra USB IP modem · a7563f1d
      Jon Thomas authored
      commit e1dc5157 upstream.
      
      I picked up a new Sierra usb 308 (At&t Shockwave) on 2/2011 and the vendor code
      is 0x0f3d
      
      Looking up vendor and product id's I see:
      
      0f3d  Airprime, Incorporated
       0112  CDMA 1xEVDO PC Card, PC 5220
      
      Sierra and Airprime are somehow related and I'm guessing the At&t usb 308 might
      be have some common hardware with the AirPrime SL809x.
      Signed-off-by: default avatarJon Thomas <jthomas@redhat.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      a7563f1d
    • Christian Lamparter's avatar
      p54pci: update receive dma buffers before and after processing · 98451bc2
      Christian Lamparter authored
      commit 0bf719df upstream.
      
      Documentation/DMA-API-HOWTO.txt states:
      
      "DMA transfers need to be synced properly in order for
      the cpu and device to see the most uptodate and correct
      copy of the DMA buffer."
      Signed-off-by: default avatarChristian Lamparter <chunkeey@googlemail.com>
      Signed-off-by: default avatarJohn W. Linville <linville@tuxdriver.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      98451bc2
    • Maciej Szmigiero's avatar
      USB: Add quirk for Samsung Android phone modem · 84a282de
      Maciej Szmigiero authored
      commit 72a012ce upstream.
      
      My Galaxy Spica needs this quirk when in modem mode, otherwise
      it causes endless USB bus resets and is unusable in this mode.
      
      Unfortunately Samsung decided to reuse ID of its old CDMA phone SGH-I500
      for the modem part.
      That's why in addition to this patch the visor driver must be prevented
      from binding to SPH-I500 ID, so ACM driver can do that.
      Signed-off-by: default avatarMaciej Szmigiero <mhej@o2.pl>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      84a282de
    • Maciej Szmigiero's avatar
      USB: Add Samsung SGH-I500/Android modem ID switch to visor driver · 9bdebf82
      Maciej Szmigiero authored
      commit acb52cb1 upstream.
      
      [USB]Add Samsung SGH-I500/Android modem ID switch to visor driver
      
      Samsung decided to reuse USB ID of its old CDMA phone SGH-I500 for the
      modem part of some of their Android phones. At least Galaxy Spica
      is affected.
      
      This modem needs ACM driver and does not work with visor driver which
      binds the conflicting ID for SGH-I500.
      Because SGH-I500 is pretty an old hardware its best to add switch to
      visor
      driver in cause somebody still wants to use that phone with Linux.
      
      Note that this is needed only when using the Android phone as modem,
      not in USB storage or ADB mode.
      Signed-off-by: default avatarMaciej Szmigiero <mhej@o2.pl>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      9bdebf82
    • Alan Stern's avatar
      USB: add quirks entry for Keytouch QWERTY Panel · 064d1295
      Alan Stern authored
      commit 3c18e30f upstream.
      
      This patch (as1448) adds a quirks entry for the Keytouch QWERTY Panel
      firmware, used in the IEC 60945 keyboard.  This device crashes during
      enumeration when the computer asks for its configuration string
      descriptor.
      Signed-off-by: default avatarAlan Stern <stern@rowland.harvard.edu>
      Tested-by: default avatarkholis <nur.kholis.majid@gmail.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      064d1295
    • Johan Hovold's avatar
      usb: musb: omap2430: fix kernel panic on reboot · 0c386aba
      Johan Hovold authored
      commit b193b412 upstream.
      
      Cancel idle timer in musb_platform_exit.
      
      The idle timer could trigger after clock had been disabled leading to
      kernel panic when MUSB_DEVCTL is accessed in musb_do_idle on 2.6.37.
      
      The fault below is no longer triggered on 2.6.38-rc4 (clock is disabled
      later, and only if compiled as a module, and the offending memory access
      has moved) but the timer should be cancelled nonetheless.
      
      Rebooting... musb_hdrc musb_hdrc: remove, state 4
      usb usb1: USB disconnect, address 1
      musb_hdrc musb_hdrc: USB bus 1 deregistered
      Unhandled fault: external abort on non-linefetch (0x1028) at 0xfa0ab060
      Internal error: : 1028 [#1] PREEMPT
      last sysfs file: /sys/kernel/uevent_seqnum
      Modules linked in:
      CPU: 0    Not tainted  (2.6.37+ #6)
      PC is at musb_do_idle+0x24/0x138
      LR is at musb_do_idle+0x18/0x138
      pc : [<c02377d8>]    lr : [<c02377cc>]    psr: 80000193
      sp : cf2bdd80  ip : cf2bdd80  fp : c048a20c
      r10: c048a60c  r9 : c048a40c  r8 : cf85e110
      r7 : cf2bc000  r6 : 40000113  r5 : c0489800  r4 : cf85e110
      r3 : 00000004  r2 : 00000006  r1 : fa0ab000  r0 : cf8a7000
      Flags: Nzcv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment user
      Control: 10c5387d  Table: 8faac019  DAC: 00000015
      Process reboot (pid: 769, stack limit = 0xcf2bc2f0)
      Stack: (0xcf2bdd80 to 0xcf2be000)
      dd80: 00000103 c0489800 c02377b4 c005fa34 00000555 c0071a8c c04a3858 cf2bdda8
      dda0: 00000555 c048a00c cf2bdda8 cf2bdda8 1838beb0 00000103 00000004 cf2bc000
      ddc0: 00000001 00000001 c04896c8 0000000a 00000000 c005ac14 00000001 c003f32c
      dde0: 00000000 00000025 00000000 cf2bc000 00000002 00000001 cf2bc000 00000000
      de00: 00000001 c005ad08 cf2bc000 c002e07c c03ec039 ffffffff fa200000 c0033608
      de20: 00000001 00000000 cf852c14 cf81f200 c045b714 c045b708 cf2bc000 c04a37e8
      de40: c0033c04 cf2bc000 00000000 00000001 cf2bde68 cf2bde68 c01c3abc c004f7d8
      de60: 60000013 ffffffff c0033c04 00000000 01234567 fee1dead 00000000 c006627c
      de80: 00000001 c00662c8 28121969 c00663ec cfa38c40 cf9f6a00 cf2bded0 cf9f6a0c
      dea0: 00000000 cf92f000 00008914 c02cd284 c04a55c8 c028b398 c00715c0 becf24a8
      dec0: 30687465 00000000 00000000 00000000 00000002 1301a8c0 00000000 00000000
      dee0: 00000002 1301a8c0 00000000 00000000 c0450494 cf527920 00011f10 cf2bdf08
      df00: 00011f10 cf2bdf10 00011f10 cf2bdf18 c00f0b44 c004f7e8 cf2bdf18 cf2bdf18
      df20: 00011f10 cf2bdf30 00011f10 cf2bdf38 cf401300 cf486100 00000008 c00d2b28
      df40: 00011f10 cf401300 00200200 c00d3388 00011f10 cfb63a88 cfb63a80 c00c2f08
      df60: 00000000 00000000 cfb63a80 00000000 cf0a3480 00000006 c0033c04 cfb63a80
      df80: 00000000 c00c0104 00000003 cf0a3480 cfb63a80 00000000 00000001 00000004
      dfa0: 00000058 c0033a80 00000000 00000001 fee1dead 28121969 01234567 00000000
      dfc0: 00000000 00000001 00000004 00000058 00000001 00000001 00000000 00000001
      dfe0: 4024d200 becf2cb0 00009210 4024d218 60000010 fee1dead 00000000 00000000
      [<c02377d8>] (musb_do_idle+0x24/0x138) from [<c005fa34>] (run_timer_softirq+0x1a8/0x26)
      [<c005fa34>] (run_timer_softirq+0x1a8/0x26c) from [<c005ac14>] (__do_softirq+0x88/0x13)
      [<c005ac14>] (__do_softirq+0x88/0x138) from [<c005ad08>] (irq_exit+0x44/0x98)
      [<c005ad08>] (irq_exit+0x44/0x98) from [<c002e07c>] (asm_do_IRQ+0x7c/0xa0)
      [<c002e07c>] (asm_do_IRQ+0x7c/0xa0) from [<c0033608>] (__irq_svc+0x48/0xa8)
      Exception stack(0xcf2bde20 to 0xcf2bde68)
      de20: 00000001 00000000 cf852c14 cf81f200 c045b714 c045b708 cf2bc000 c04a37e8
      de40: c0033c04 cf2bc000 00000000 00000001 cf2bde68 cf2bde68 c01c3abc c004f7d8
      de60: 60000013 ffffffff
      [<c0033608>] (__irq_svc+0x48/0xa8) from [<c004f7d8>] (sub_preempt_count+0x0/0xb8)
      Code: ebf86030 e5940098 e594108c e5902010 (e5d13060)
      ---[ end trace 3689c0d808f9bf7c ]---
      Kernel panic - not syncing: Fatal exception in interrupt
      Signed-off-by: default avatarJohan Hovold <jhovold@gmail.com>
      Signed-off-by: default avatarFelipe Balbi <balbi@ti.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      0c386aba