Bug 1077958 - Kernel oops on Raspberry Pi 2B
Kernel oops on Raspberry Pi 2B
Status: RESOLVED WORKSFORME
Classification: openSUSE
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Basesystem
Current
armv7 Other
: P5 - None : Normal (vote)
: ---
Assigned To: E-mail List
E-mail List
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-01-29 11:03 UTC by Freek de Kruijf
Modified: 2018-03-14 13:17 UTC (History)
0 users

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Freek de Kruijf 2018-01-29 11:03:51 UTC
On my Raspberry Pi 2B with Tumbleweed I got a kernel oops after 8 days of continues use.
Below is info on version:
# more /etc/os-release
NAME="openSUSE Tumbleweed"
# VERSION="20180116 "
ID=opensuse
ID_LIKE="suse"
VERSION_ID="20180116"
PRETTY_NAME="openSUSE Tumbleweed"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:opensuse:tumbleweed:20180116"

The system has a bluetooth USB dongle.
# lsusb
Bus 001 Device 007: ID 0a5c:2148 Broadcom Corp. BCM92046DG-CL1ROM Bluetooth 2.1 Adapter
Bus 001 Device 006: ID 0a5c:4503 Broadcom Corp. Mouse (Boot Interface Subclass)
Bus 001 Device 005: ID 0a5c:4502 Broadcom Corp. Keyboard (Boot Interface Subclass)
Bus 001 Device 004: ID 0a5c:4500 Broadcom Corp. BCM2046B1 USB 2.0 Hub (part of BCM2046 Bluetooth)
Bus 001 Device 003: ID 0424:ec00 Standard Microsystems Corp. SMSC9512/9514 Fast Ethernet Adapter
Bus 001 Device 002: ID 0424:9514 Standard Microsystems Corp. SMC9514 Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

The last part of journalctl -b -1 is:

jan 28 16:42:36 smahp kernel: Unable to handle kernel paging request at virtual address 00956328
jan 28 16:42:36 smahp kernel: pgd = c21cfb40
jan 28 16:42:36 smahp kernel: [00956328] *pgd=2e6ba003, *pmd=00000000
jan 28 16:42:36 smahp kernel: Internal error: Oops: a06 [#1] PREEMPT SMP ARM
jan 28 16:42:36 smahp kernel: Modules linked in: cmac algif_hash algif_skcipher af_alg rfcomm btusb btrtl btbcm btintel nf_log_ipv6 
jan 28 16:42:36 smahp kernel:  phy_generic sg [last unloaded: btrtl]
jan 28 16:42:36 smahp kernel: CPU: 0 PID: 1460 Comm: SBFspotUploadDa Not tainted 4.14.14-1-lpae #1
jan 28 16:42:36 smahp kernel: Hardware name: BCM2835
jan 28 16:42:36 smahp kernel: task: c2b67800 task.stack: c29e4000
jan 28 16:42:36 smahp kernel: PC is at memcpy+0x50/0x330
jan 28 16:42:36 smahp kernel: LR is at 0x8080708
jan 28 16:42:36 smahp kernel: pc : [<c0ceb750>]    lr : [<08080708>]    psr: 200e0013
jan 28 16:42:36 smahp kernel: sp : c29e5d74  ip : 08020807  fp : c29e5dbc
jan 28 16:42:36 smahp kernel: r10: e4d08c00  r9 : e4d08c00  r8 : 08070802
jan 28 16:42:36 smahp kernel: r7 : 04041b1b  r6 : 808976ec  r5 : 51b81e85  r4 : 8b494064
jan 28 16:42:36 smahp kernel: r3 : 65736f6c  r2 : 000001e0  r1 : e4d08da0  r0 : 00956328
jan 28 16:42:36 smahp kernel: Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
jan 28 16:42:36 smahp kernel: Control: 30c5387d  Table: 021cfb40  DAC: fffffffd
jan 28 16:42:36 smahp kernel: Process SBFspotUploadDa (pid: 1460, stack limit = 0xc29e4210)
jan 28 16:42:36 smahp kernel: Stack: (0xc29e5d74 to 0xc29e6000)
jan 28 16:42:36 smahp kernel: 5d60:                                              00000001 00000400 00000000
jan 28 16:42:36 smahp kernel: 5d80: ffffe000 009561a8 009561a8 c083a254 cc29fab0 ef9cee78 00000400 00000400
jan 28 16:42:36 smahp kernel: 5da0: c29e5ef0 efd46520 c29e5ee8 00000000 c29e5dcc c29e5dc0 c083a44c c083a17c
jan 28 16:42:36 smahp kernel: 5dc0: c29e5ddc c29e5dd0 c083fa90 c083a438 c29e5e1c c29e5de0 c0842f7c c083fa64
jan 28 16:42:36 smahp kernel: 5de0: c04eca08 c109d43c e4d08000 009561a8 c29e5e0c ecc091e4 cce229c0 efd46520
jan 28 16:42:36 smahp kernel: 5e00: 00001bb9 c29e5f08 00000400 ecc090f0 c29e5e8c c29e5e20 c05c57d0 c0842d6c
jan 28 16:42:36 smahp kernel: 5e20: c048726c c04fb13c c29e5e5c 014000c0 00080001 00000c00 00001bba 00000000
jan 28 16:42:36 smahp kernel: 5e40: 00001bba cce22a28 c29e5ef0 00000c00 ffffe000 00000000 01f92bff 00000000
jan 28 16:42:36 smahp kernel: 5e60: c06f29e4 c29e5f08 00000400 c29e5f78 009561a8 c29e5f78 00000000 c29e5ef0
jan 28 16:42:36 smahp kernel: 5e80: c29e5ecc c29e5e90 c05c6c08 c05c55d4 c10bc888 cce229c8 00020000 00000000
jan 28 16:42:36 smahp kernel: 5ea0: 00020000 00000000 cce229c0 c29e5f78 009561a8 c29e5f78 00000000 00000000
jan 28 16:42:36 smahp kernel: 5ec0: c29e5edc c29e5ed0 c06f352c c05c6ae8 c29e5f44 c29e5ee0 c0652a6c c06f34f4
jan 28 16:42:36 smahp kernel: 5ee0: 00000400 c069bbf4 009561a8 00000400 00000000 00000000 00000400 c29e5ee8
jan 28 16:42:36 smahp kernel: 5f00: 00000001 c29e5f10 cce229c0 00000000 01bb9c00 00000000 00000000 00000000
jan 28 16:42:36 smahp kernel: 5f20: 00000000 00000000 ffffe000 00000400 cce229c0 009561a8 c29e5f74 c29e5f48
jan 28 16:42:36 smahp kernel: 5f40: c0652b54 c0652994 00000008 c06741d8 cce229c0 cce229c0 01bb9c00 00000000
jan 28 16:42:36 smahp kernel: 5f60: 009561a8 00000400 c29e5fa4 c29e5f78 c06530fc c0652ac4 01bb9c00 00000000
jan 28 16:42:36 smahp kernel: 5f80: 00000400 009561a8 00000003 00000003 c0436ac8 c29e4000 00000000 c29e5fa8
jan 28 16:42:36 smahp kernel: 5fa0: c04368c0 c06530bc 00000400 009561a8 00000003 009561a8 00000400 00000000
jan 28 16:42:36 smahp kernel: 5fc0: 00000400 009561a8 00000003 00000003 00000000 009561a8 00000000 b6eca6f0
jan 28 16:42:36 smahp kernel: 5fe0: 00000000 bec8ed30 00000000 b6b269f0 800e0010 00000003 00000000 00010203
jan 28 16:42:36 smahp kernel: [<c0ceb750>] (memcpy) from [<c083a254>] (__copy_to_user_memcpy+0xe4/0x18c)
jan 28 16:42:37 smahp kernel: [<c083a254>] (__copy_to_user_memcpy) from [<c083a44c>] (arm_copy_to_user+0x20/0x34)
jan 28 16:42:37 smahp kernel: [<c083a44c>] (arm_copy_to_user) from [<c083fa90>] (copyout+0x38/0x48)
jan 28 16:42:37 smahp kernel: [<c083fa90>] (copyout) from [<c0842f7c>] (copy_page_to_iter+0x21c/0x498)
jan 28 16:42:37 smahp kernel: [<c0842f7c>] (copy_page_to_iter) from [<c05c57d0>] (generic_file_buffered_read+0x208/0x8b0)
jan 28 16:42:37 smahp kernel: [<c05c57d0>] (generic_file_buffered_read) from [<c05c6c08>] (generic_file_read_iter+0x12c/0x180)
jan 28 16:42:37 smahp kernel: [<c05c6c08>] (generic_file_read_iter) from [<c06f352c>] (ext4_file_read_iter+0x44/0x58)
jan 28 16:42:37 smahp kernel: [<c06f352c>] (ext4_file_read_iter) from [<c0652a6c>] (__vfs_read+0xe4/0x130)
jan 28 16:42:37 smahp kernel: [<c0652a6c>] (__vfs_read) from [<c0652b54>] (vfs_read+0x9c/0x164)
jan 28 16:42:37 smahp kernel: [<c0652b54>] (vfs_read) from [<c06530fc>] (SyS_read+0x4c/0xa4)
jan 28 16:42:37 smahp kernel: [<c06530fc>] (SyS_read) from [<c04368c0>] (ret_fast_syscall+0x0/0x4c)
jan 28 16:42:37 smahp kernel: Code: f5d1f05c f5d1f07c e8b151f8 e2522020 (e8a051f8) 
jan 28 16:42:37 smahp kernel: ---[ end trace 8f816e3f705b0c87 ]---
jan 28 16:42:37 smahp kernel: note: SBFspotUploadDa[1460] exited with preempt_count 2
jan 28 16:43:00 smahp kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [khugepaged:43]
Comment 1 Freek de Kruijf 2018-03-14 13:17:08 UTC
Apparently gone.