From: Dirk Behme <dirk.behme@googlemail.com>
To: imre.deak@solidboot.com
Cc: linux-omap-open-source@linux.omap.com
Subject: Re: [PATCH 1/4] Input: ads7846: detect pen up from IRQ state
Date: Wed, 05 Jul 2006 18:42:45 +0200 [thread overview]
Message-ID: <44ABEC05.7070204@gmail.com> (raw)
In-Reply-To: <20060705161832.GA32247@localdomain>
imre.deak@solidboot.com wrote:
> On Tue, Jul 04, 2006 at 05:10:04PM +0200, Dirk Behme wrote:
>>imre.deak@solidboot.com wrote:
>>
>>>We can't depend on the pressure value to determine when the pen was
>>>lifted, so use the IRQ line state instead.
>>
>>Today, Tony pushed the "input: ads7846: can't disable
>>filtering"
>>
>>http://linux.omap.com/pipermail/linux-omap-open-source/2006-June/007358.html
>>
>>fix from beginning of June.
>
> Uh, I forgot about that and noticed Tony's email about it too late.
>
>>Yesterday, you posted a new patchset "[PATCH 1/1-4] Input:
>>ads7846:". As I understand it, this recent patch set is the
>>clean version of ads7846 and is a replacement for the old
>>workaround now pushed by Tony? Or is it an add on?
>
> The first patch of the set includes that fix. Now that it's pushed I'm
> posting an updated version of that first patch. The rest should apply ok.
Just applied patch 1-4 to recent git and tried on OSK and
get crash below at module load.
Cheers
dirk
Unable to handle kernel NULL pointer dereference at virtual
address 0000003a
pgd = c1a64000
[0000003a] *pgd=11c73031, *pte=00000000, *ppte=00000000
Internal error: Oops: 0 [#1]
Modules linked in: ads7846 omap_uwire spi_bitbang
omap_keypad evdev nfs lockd suni
CPU: 0
PC is at 0x3a
LR is at ads7846_probe+0x148/0x73c [ads7846]
pc : [<0000003a>] lr : [<bf082e04>] Not tainted
sp : c1c7be74 ip : 00000000 fp : c1c7bea8
r10: c1c57000 r9 : c1c7a000 r8 : c1abc600
r7 : 00000001 r6 : c01a7d18 r5 : c1fe9000 r4 : 00000000
r3 : 0000003b r2 : 0000ffff r1 : c1fe92d0 r0 : c01a7d18
Flags: nzCv IRQs on FIQs on Mode SVC_32 Segment user
Control: 5317F Table: 11A64000 DAC: 00000015
Process insmod (pid: 753, stack limit = 0xc1c7a198)
Stack: (0xc1c7be74 to 0xc1c7c000)
be60: c1c7be90
c01e3b80 c1fff8c0
be80: c1abc6cc c1abc600 00000000 bf0841a4 c0021fa4 c1c7a000
00000000 c1c7beb8
bea0: c1c7beac c0148f64 bf082ccc c1c7bed8 c1c7bebc c0130eac
c0148f50 c1abc6cc
bec0: c1abc600 c0130f9c bf0841a4 c1c7bef0 c1c7bedc c0131020
c0130e40 00000000
bee0: c1c7bef4 c1c7bf1c c1c7bef4 c0130860 c0130fac c01e9b14
c01e9b14 c1abc648
bf00: bf0841b8 bf0841a4 c01e9a14 00000080 c1c7bf2c c1c7bf20
c0130dc0 c0130828
bf20: c1c7bf54 c1c7bf30 c01304bc c0130db0 bf0841a4 bf0842c0
40017000 00000080
bf40: c0021fa4 00000002 c1c7bf68 c1c7bf58 c0131320 c0130460
00002fe8 c1c7bf78
bf60: c1c7bf6c c0148da4 c013129c c1c7bf88 c1c7bf7c bf08603c
c0148d64 c1c7bfa4
bf80: c1c7bf8c c0066120 bf086010 00000003 00000000 00000100
00000000 c1c7bfa8
bfa0: c0021e00 c0066080 00000000 00000100 00900080 40017000
00002fe8 0006e050
bfc0: 00000003 00000000 00000100 bebfbe94 bebfbf56 0000c7bc
00000002 00000000
bfe0: bebfbdd0 bebfbdc4 0001e6fc 40122390 60000010 00900080
e50b2028 e50b1024
Backtrace:
[<bf082cbc>] (ads7846_probe+0x0/0x73c [ads7846]) from
[<c0148f64>] (spi_drv_probe)
[<c0148f40>] (spi_drv_probe+0x0/0x28) from [<c0130eac>]
(driver_probe_device+0x7c)
[<c0130e30>] (driver_probe_device+0x0/0xcc) from
[<c0131020>] (__driver_attach+0x)
r7 = BF0841A4 r6 = C0130F9C r5 = C1ABC600 r4 = C1ABC6CC
[<c0130f9c>] (__driver_attach+0x0/0xe4) from [<c0130860>]
(bus_for_each_dev+0x48/)
r5 = C1C7BEF4 r4 = 00000000
[<c0130818>] (bus_for_each_dev+0x0/0x80) from [<c0130dc0>]
(driver_attach+0x20/0x)
r7 = 00000080 r6 = C01E9A14 r5 = BF0841A4 r4 = BF0841B8
[<c0130da0>] (driver_attach+0x0/0x28) from [<c01304bc>]
(bus_add_driver+0x6c/0x12)
[<c0130450>] (bus_add_driver+0x0/0x124) from [<c0131320>]
(driver_register+0x94/0)
[<c013128c>] (driver_register+0x0/0xa4) from [<c0148da4>]
(spi_register_driver+0x)
r4 = 00002FE8
[<c0148d54>] (spi_register_driver+0x0/0x64) from
[<bf08603c>] (ads7846_init+0x3c/)
[<bf086000>] (ads7846_init+0x0/0x44 [ads7846]) from
[<c0066120>] (sys_init_module)
[<c0066070>] (sys_init_module+0x0/0x204) from [<c0021e00>]
(ret_fast_syscall+0x0/)
r6 = 00000100 r5 = 00000000 r4 = 00000003
Code: bad PC value.
Segmentation fault
modprobe: failed to load module ads7846
next prev parent reply other threads:[~2006-07-05 16:42 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-07-03 18:29 [PATCH 1/4] Input: ads7846: detect pen up from IRQ state imre.deak
2006-07-04 15:10 ` Dirk Behme
2006-07-05 16:18 ` imre.deak
2006-07-05 16:42 ` Dirk Behme [this message]
2006-07-05 19:05 ` imre.deak
2006-07-06 15:58 ` Dirk Behme
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=44ABEC05.7070204@gmail.com \
--to=dirk.behme@googlemail.com \
--cc=imre.deak@solidboot.com \
--cc=linux-omap-open-source@linux.omap.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.