2010-02-23 17:33:08     ls /mnt/*.dmg ---> misaligned crash, cat largefile >/dev/null ---> OOM crash

Document created by Aaronwu Employee on Aug 20, 2013
Version 1Show Document
  • View in full screen mode

2010-02-23 17:33:08     ls /mnt/*.dmg ---> misaligned crash, cat largefile >/dev/null ---> OOM crash

George Yohng (AUSTRIA)

Message: 86399   

 

Hello,

 

Two crashes in one report. I have been willing to report 'cat' crash first, but have also encountered the other crash.

 

Please check the log until the end, as there is a second command entered too that causes OOM. This is a BF525 system with ramfs and USB.

 

(note - sda1 is an USB stick with a FAT32 filesystem, and file xcode313_2736_developerdvd.dmg is 411MB in size)

 

 

I apologize, if my reports are due to my own lack of qualification in this area.

 

 

 

usb 1-1: new high speed USB device using musb_hdrc and address 2

usb 1-1: configuration #1 chosen from 1 choice

scsi0 : SCSI emulation for USB Mass Storage devices

scsi 0:0:0:0: Direct-Access     Multi    Flash Reader     1.00 PQ: 0 ANSI: 0

sd 0:0:0:0: [sda] 3854336 512-byte logical blocks: (1.97 GB/1.83 GiB)

sd 0:0:0:0: [sda] Write Protect is off

sd 0:0:0:0: [sda] Assuming drive cache: write through

sd 0:0:0:0: [sda] Assuming drive cache: write through

sda:

sda1

sd 0:0:0:0: [sda] Assuming drive cache: write through

sd 0:0:0:0: [sda] Attached SCSI removable disk

 

 

root:/> free

              total         used         free       shared      buffers

  Mem:        29720        15484        14236            0            0

root:/> mount /dev/sda1 /mnt

root:/> cd /mnt

root:/mnt> ls *.dmg

DiscoveryProR4Demo.dmg          xcode313_2736_developerdvd.dmg

ddmg2.dmg

root:/mnt> cd /

 

root:/mnt> cd /

root:/> ls /mnt/*.dmg

Data access misaligned address violation

<5> - Attempted misaligned data memory or data cache access.

Deferred Exception context

CURRENT PROCESS:

COMM=sh PID=308 CPU=0

TEXT = 0x00a00040-0x00a48640        DATA = 0x00a48660-0x00a5a470

BSS = 0x00a5a470-0x00a5be10  USER-STACK = 0x00a63fa0

 

return address: [0x00a238a0]; contents of:

0x00a23880:  9151  05fc  0167  e12a  007c  6fa6  3038  5b11

0x00a23890:  2008  a069  3007  e3ff  47a5  0c00  1c05  3265

0x00a238a0: [9165] 0c45  13f7  6c66  3044  0127  05bc  0010

0x00a238b0:  05ec  0167  e141  00a5  6fa6  e101  47a0  3228

 

ADSP-BF525-0.2 600(MHz CCLK) 120(MHz SCLK) (mpu off)

Linux version 2.6.32.9-ADI-2010R1-pre-svn8339 (user@uclinuxdev) (gcc version 4.1.2 (ADI svn)) #116 Tue Feb 23 23:04:45 CET 2010

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00002024  IPEND: 0008  IMASK: ffff  SYSCFG: 0006

  EXCAUSE   : 0x24

  physical IVG3 asserted : <0xffa00694> { _trap + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x01b68000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x00a239a8> [ sh + 0x23968 ]

PC  : <0x00a238a0> [ sh + 0x23860 ]

DCPLB_FAULT_ADDR: <0x2e7765e4> /* kernel dynamic memory */

ICPLB_FAULT_ADDR: <0x00a238a0> [ sh + 0x23860 ]

PROCESSOR STATE:

R0 : 001f01f8    R1 : 0000006c    R2 : 00000074    R3 : ffffff8c

R4 : 00000000    R5 : 00000000    R6 : 00000000    R7 : 001f01f8

P0 : ffffffff    P1 : 2e776569    P2 : 0000007c    P3 : 00ab2004

P4 : 2e7765e5    P5 : 001f0290    FP : 00000000    SP : 01b67f24

LB0: 00a0c847    LT0: 00a0c834    LC0: ffffffff

LB1: 00a12d7d    LT1: 00a12d76    LC1: 00000000

B0 : 00000004    L0 : 00000000    M0 : 00000000    I0 : 001f13d0

B1 : 00000000    L1 : 00000000    M1 : 00a636f3    I1 : 00a63d38

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000004

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00a63d8c  ASTAT: 02001025

 

Hardware Trace:

   0 Target : <0x00005018> { _trap_c + 0x0 }

     Source : <0xffa00628> { _exception_to_level5 + 0xa4 } CALL pcrel

   1 Target : <0xffa00584> { _exception_to_level5 + 0x0 }

     Source : <0xffa00438> { _bfin_return_from_exception + 0x18 } RTX

   2 Target : <0xffa00420> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa004dc> { _ex_trap_c + 0x74 } JUMP.S

   3 Target : <0xffa00468> { _ex_trap_c + 0x0 }

     Source : <0xffa006ee> { _trap + 0x5a } JUMP (P4)

   4 Target : <0xffa00694> { _trap + 0x0 }

     Source : <0x00a23890> [ sh + 0x23850 ] JUMP.S

   5 Target : <0x00a23878> [ sh + 0x23838 ]

     Source : <0x00a239a4> [ sh + 0x23964 ] CALL pcrel

   6 Target : <0x00a239a0> [ sh + 0x23960 ]

     Source : <0x00a26fe6> [ sh + 0x26fa6 ] CALL pcrel

   7 Target : <0x00a26fdc> [ sh + 0x26f9c ]

     Source : <0x00a239e0> [ sh + 0x239a0 ] RTS

   8 Target : <0x00a239ca> [ sh + 0x2398a ]

     Source : <0x00a0c850> [ sh + 0xc810 ] RTS

   9 Target : <0x00a0c848> [ sh + 0xc808 ]

     Source : <0x00a0c844> [ sh + 0xc804 ] IF !CC JUMP

  10 Target : <0x00a0c820> [ sh + 0xc7e0 ]

     Source : <0x00a0c802> [ sh + 0xc7c2 ] IF !CC JUMP

  11 Target : <0x00a0c7e0> [ sh + 0xc7a0 ]

     Source : <0x00a239c6> [ sh + 0x23986 ] CALL pcrel

  12 Target : <0x00a239c2> [ sh + 0x23982 ]

     Source : <0x00a239d4> [ sh + 0x23994 ] IF !CC JUMP

  13 Target : <0x00a239ca> [ sh + 0x2398a ]

     Source : <0x00a0c850> [ sh + 0xc810 ] RTS

  14 Target : <0x00a0c848> [ sh + 0xc808 ]

     Source : <0x00a0c844> [ sh + 0xc804 ] IF !CC JUMP

  15 Target : <0x00a0c820> [ sh + 0xc7e0 ]

     Source : <0x00a0c802> [ sh + 0xc7c2 ] IF !CC JUMP

Userspace Stack

Stack info:

SP: [0x00a63d8c] <0x00a63d8c> [ sh + 0x63d8c ]

FP: (0x00a63d94)

Memory from 0x00a63d80 to 00a64000

00a63d80: 00000000  00000000  00a63dcc [00a54e04] 001f01f8 (00000000)<00a239a8> 001f0290

00a63da0: 001f0098  00000000 <00a26fdc> 001f0290  00000000 <00a26fea> 00000000  00000100

00a63dc0: 00000000  001f016c  00a63de4  00ab2004  001f0034  001f02dc  001f01b8  001f0170

00a63de0: 0000000e  00000080  00000000  00000000  00000000  00000000  00000000  00000000

00a63e00: ffffffff  ffffffff  ffffffff  00000000  00a63f60  00000000  00000000 <00a27512>

00a63e20: 00000000  001f0004  00ab2004  00000000  00000000  00000000  001f0004  00000000

00a63e40: 00000000  00000000  00000000  00000000  00000001  00a63f60 <00a27664> 00ab2004

00a63e60: 00a63fa4  00000000  001f0004  0000003b  00a63ea4  00000001  00000000  00a5a0c4

00a63e80: 0000003b <00a2768e> 00ab2004  00a63ea4  00000001  00000001 <00a0a32a> 00ab2004

00a63ea0: 000000ff  00ab21aa  00000000  00000001  00000001  00a5a074  00a27960 <00a247fc>

00a63ec0:<00a28138> 000000ff  0000004e  00a51f63  00a63ecc  00a5a074  00ab2004 <00a1ab9a>

00a63ee0: 00a5b470  00a63fa4  0000004f  00a4b589  000001c5  00000001  00a63fa4  00000001

00a63f00:<00a1abb8> 00a63fa4  00a63fa4  00a63fa4  00a63fc3  00a5b318  00a48618 <00a1ad4a>

00a63f20: 00a63fbe  00a5b318 <00a1ad24> 00a5b4e8  00a63fa4  00000000  00a5b318  00a48660

00a63f40: 00a48660  00a63f60 <00a157f4> 00a48660  00a5a42c  00000000  00000000  00000000

00a63f60: 00000000 <00ac0ab4> 00a48660  00ad80ec  00ad80f0  00000000  4b847033  ffffffff

00a63f80: 00000000  00a1acbc  00000000  00000000  00a48618  00a4862a  00000000  00ac6385

00a63fa0: 00000001  00a63fbd  00000000  00a63fc6  00a63fd1  00000000  00000000  622f2d00

00a63fc0: 732f6e69  45540068  6c3d4d52  78756e69  54415000  622f3d48  2f3a6e69  2f727375

00a63fe0: 3a6e6962  6962732f  752f3a6e  732f7273  006e6962  6e69622f  0068732f  00000000

Return addresses in stack:

   frame  1 : <0x00a239a8> [ sh + 0x23968 ]

    address : <0x00a26fdc> [ sh + 0x26f9c ]

    address : <0x00a26fea> [ sh + 0x26faa ]

    address : <0x00a27512> [ sh + 0x274d2 ]

    address : <0x00a27664> [ sh + 0x27624 ]

    address : <0x00a2768e> [ sh + 0x2764e ]

    address : <0x00a0a32a> [ sh + 0xa2ea ]

    address : <0x00a247fc> [ sh + 0x247bc ]

    address : <0x00a28138> [ sh + 0x280f8 ]

    address : <0x00a1ab9a> [ sh + 0x1ab5a ]

    address : <0x00a1abb8> [ sh + 0x1ab78 ]

    address : <0x00a1ad4a> [ sh + 0x1ad0a ]

    address : <0x00a1ad24> [ sh + 0x1ace4 ]

    address : <0x00a157f4> [ sh + 0x157b4 ]

    address : <0x00ac0ab4> [ init + 0xab4 ]

Data access misaligned address violation

<5> - Attempted misaligned data memory or data cache access.

Deferred Exception context

CURRENT PROCESS:

COMM=sh PID=308 CPU=0

TEXT = 0x00a00040-0x00a48640        DATA = 0x00a48660-0x00a5a470

BSS = 0x00a5a470-0x00a5be10  USER-STACK = 0x00a63fa0

 

return address: [0x00a237ac]; contents of:

0x00a23780:  3008  9128  e3ff  4f3c  6c66  0127  3007  05bd

0x00a23790:  0010  0000  05fd  0167  6fa6  3038  6000  e301

0x00a237a0:  1751  e14a  00a5  e10a  b8f4  9155 [a228] 0c00

0x00a237b0:  180a  e3fe  f27d  a129  0808  1405  a229  9128

 

ADSP-BF525-0.2 600(MHz CCLK) 120(MHz SCLK) (mpu off)

Linux version 2.6.32.9-ADI-2010R1-pre-svn8339 (user@uclinuxdev) (gcc version 4.1.2 (ADI svn)) #116 Tue Feb 23 23:04:45 CET 2010

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00062024  IPEND: 0008  IMASK: ffff  SYSCFG: 0006

  EXCAUSE   : 0x24

  physical IVG3 asserted : <0xffa00694> { _trap + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x01b68000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x00a237a2> [ sh + 0x23762 ]

PC  : <0x00a237ac> [ sh + 0x2376c ]

DCPLB_FAULT_ADDR: <0x2e776588> /* kernel dynamic memory */

ICPLB_FAULT_ADDR: <0x00a237ac> [ sh + 0x2376c ]

PROCESSOR STATE:

R0 : 00000000    R1 : 00a63b7c    R2 : 00000000    R3 : 00000008

R4 : 00000000    R5 : 00000000    R6 : 00000000    R7 : 00000007

P0 : 000000af    P1 : 0000008c    P2 : 00a5b8f4    P3 : 00ab2004

P4 : 2e7765e5    P5 : 2e776569    FP : 00000000    SP : 01b67f24

LB0: 00a0c7a9    LT0: 00a0c7a8    LC0: 00000000

LB1: 00a12d7d    LT1: 00a12d76    LC1: 00000000

B0 : 00000004    L0 : 00000000    M0 : 00000000    I0 : 001f13d0

B1 : 00000000    L1 : 00000000    M1 : 00a636f3    I1 : 00a63d38

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000004

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00a63c08  ASTAT: 02000022

 

Hardware Trace:

   0 Target : <0x00005018> { _trap_c + 0x0 }

     Source : <0xffa00628> { _exception_to_level5 + 0xa4 } CALL pcrel

   1 Target : <0xffa00584> { _exception_to_level5 + 0x0 }

     Source : <0xffa00438> { _bfin_return_from_exception + 0x18 } RTX

   2 Target : <0xffa00420> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa004dc> { _ex_trap_c + 0x74 } JUMP.S

   3 Target : <0xffa00468> { _ex_trap_c + 0x0 }

     Source : <0xffa006ee> { _trap + 0x5a } JUMP (P4)

   4 Target : <0xffa00694> { _trap + 0x0 }

     Source : <0x00a237aa> [ sh + 0x2376a ] 0x9155

   5 Target : <0x00a237a2> [ sh + 0x23762 ]

     Source : <0x00a46672> [ sh + 0x46632 ] RTS

   6 Target : <0x00a46668> [ sh + 0x46628 ]

     Source : <0x00a02460> [ sh + 0x2420 ] RTS

   7 Target : <0x00a0244e> [ sh + 0x240e ]

     Source : <0xffa00bdc> { __common_int_entry + 0xcc } RTI

   8 Target : <0xffa00b7a> { __common_int_entry + 0x6a }

     Source : <0xffa00f34> { _evt_system_call + 0x64 } JUMP.S

   9 Target : <0xffa00f34> { _evt_system_call + 0x64 }

     Source : <0xffa0087a> { _system_call + 0xbe } RTS

  10 Target : <0xffa00876> { _system_call + 0xba }

     Source : <0xffa00866> { _system_call + 0xaa } IF !CC JUMP

  11 Target : <0xffa0085c> { _system_call + 0xa0 }

     Source : <0xffa0084c> { _system_call + 0x90 } IF !CC JUMP

  12 Target : <0xffa00826> { _system_call + 0x6a }

     Source : <0x0001ad88> { _sys_rt_sigprocmask + 0x1c } RTS

  13 Target : <0x0001ad82> { _sys_rt_sigprocmask + 0x16 }

     Source : <0x0001adc8> { _sys_rt_sigprocmask + 0x5c } IF !CC JUMP

  14 Target : <0x0001adc2> { _sys_rt_sigprocmask + 0x56 }

     Source : <0x00018d32> { _sigprocmask + 0x4e } RTS

  15 Target : <0x00018d1e> { _sigprocmask + 0x3a }

     Source : <0x00018ce0> { _recalc_sigpending + 0x44 } RTS

Userspace Stack

Stack info:

SP: [0x00a63c08] <0x00a63c08> [ sh + 0x63c08 ]

FP: (0x00a63c4c)

Memory from 0x00a63c00 to 00a64000

00a63c00: 001f0290  00000007 [0026e004] 0000000e  00ab2460  00000400  001f0290  001f01f8

00a63c20: 00000007  00a63c34  00a63cb4  00000008  00000004  00000007  00000000  00000001

00a63c40: 2e7765e4  0000000c  00a63c8c (00a63c70)<00a12fbe> 00a5a1dc  001f00b8  001f00a4

00a63c60: 00000024  001f01fb  00000000  001f00a8 (00a63ca0)<00a03156> 00a63cc0  001f00b8

00a63c80: 00a63d38  00000003  00000005  00a63ca0 <00a03156><00a23f08><00a245bc> 001f00b4

00a63ca0:(00a63d94)<00a245cc> 001f00b4  00a63cc0 <00a23dfc> 00000000  00000000  00000000

00a63cc0: 00000002  00000000  001f01f8  0000006c  00000074  ffffff8c  00000000  00000000

00a63ce0: 00000000  001f01f8  ffffffff  2e776569  0000007c  00ab2004  2e7765e5  001f0290

00a63d00: 00a63d8c  00000000  00000000  00000000  00000000  02001025 <00a239a8> 00a238a0

00a63d20: 00000480  00000000  001f13d0  00a63d38  00000000  00000004  00000000  00a636f3

00a63d40: 00000000  00000000  00000000  00000000  00000000  00000000  00000004  00000000

00a63d60: 00000000  00000000  ffffffff  00000000  00a0c834  00a12d76  00a0c847  00a12d7d

00a63d80: 00062024  00384007  00000000  00a54e04  001f01f8 (00000000)<00a239a8> 001f0290

00a63da0: 001f0098  00000000 <00a26fdc> 001f0290  00000000 <00a26fea> 00000000  00000100

00a63dc0: 00000000  001f016c  00a63de4  00ab2004  001f0034  001f02dc  001f01b8  001f0170

00a63de0: 0000000e  00000080  00000000  00000000  00000000  00000000  00000000  00000000

00a63e00: ffffffff  ffffffff  ffffffff  00000000  00a63f60  00000000  00000000 <00a27512>

00a63e20: 00000000  001f0004  00ab2004  00000000  00000000  00000000  001f0004  00000000

00a63e40: 00000000  00000000  00000000  00000000  00000001  00a63f60 <00a27664> 00ab2004

00a63e60: 00a63fa4  00000000  001f0004  0000003b  00a63ea4  00000001  00000000  00a5a0c4

00a63e80: 0000003b <00a2768e> 00ab2004  00a63ea4  00000001  00000001 <00a0a32a> 00ab2004

00a63ea0: 000000ff  00ab21aa  00000000  00000001  00000001  00a5a074  00a27960 <00a247fc>

00a63ec0:<00a28138> 000000ff  0000004e  00a51f63  00a63ecc  00a5a074  00ab2004 <00a1ab9a>

00a63ee0: 00a5b470  00a63fa4  0000004f  00a4b589  000001c5  00000001  00a63fa4  00000001

00a63f00:<00a1abb8> 00a63fa4  00a63fa4  00a63fa4  00a63fc3  00a5b318  00a48618 <00a1ad4a>

00a63f20: 00a63fbe  00a5b318 <00a1ad24> 00a5b4e8  00a63fa4  00000000  00a5b318  00a48660

00a63f40: 00a48660  00a63f60 <00a157f4> 00a48660  00a5a42c  00000000  00000000  00000000

00a63f60: 00000000 <00ac0ab4> 00a48660  00ad80ec  00ad80f0  00000000  4b847033  ffffffff

00a63f80: 00000000  00a1acbc  00000000  00000000  00a48618  00a4862a  00000000  00ac6385

00a63fa0: 00000001  00a63fbd  00000000  00a63fc6  00a63fd1  00000000  00000000  622f2d00

00a63fc0: 732f6e69  45540068  6c3d4d52  78756e69  54415000  622f3d48  2f3a6e69  2f727375

00a63fe0: 3a6e6962  6962732f  752f3a6e  732f7273  006e6962  6e69622f  0068732f  00000000

Return addresses in stack:

   frame  1 : <0x00a12fbe> [ sh + 0x12f7e ]

   frame  2 : <0x00a03156> [ sh + 0x3116 ]

    address : <0x00a03156> [ sh + 0x3116 ]

    address : <0x00a23f08> [ sh + 0x23ec8 ]

    address : <0x00a245bc> [ sh + 0x2457c ]

   frame  3 : <0x00a245cc> [ sh + 0x2458c ]

    address : <0x00a23dfc> [ sh + 0x23dbc ]

    address : <0x00a239a8> [ sh + 0x23968 ]

   frame  4 : <0x00a239a8> [ sh + 0x23968 ]

    address : <0x00a26fdc> [ sh + 0x26f9c ]

    address : <0x00a26fea> [ sh + 0x26faa ]

    address : <0x00a27512> [ sh + 0x274d2 ]

    address : <0x00a27664> [ sh + 0x27624 ]

    address : <0x00a2768e> [ sh + 0x2764e ]

    address : <0x00a0a32a> [ sh + 0xa2ea ]

    address : <0x00a247fc> [ sh + 0x247bc ]

    address : <0x00a28138> [ sh + 0x280f8 ]

    address : <0x00a1ab9a> [ sh + 0x1ab5a ]

    address : <0x00a1abb8> [ sh + 0x1ab78 ]

    address : <0x00a1ad4a> [ sh + 0x1ad0a ]

    address : <0x00a1ad24> [ sh + 0x1ace4 ]

    address : <0x00a157f4> [ sh + 0x157b4 ]

    address : <0x00ac0ab4> [ init + 0xab4 ]

 

 

BusyBox v1.15.3 (2010-02-16 01:48:51 CET) hush - the humble shell

 

 

 

root:/> cat /mnt/xcode313_2736_developerdvd.dmg >/dev/null

 

 

usb 1-1: reset high speed USB device using musb_hdrc and address 2

cat invoked oom-killer: gfp_mask=0x201da, order=0, oom_adj=0

Hardware Trace:

   0 Target : <0x00004f74> { _dump_stack + 0x0 }

     Source : <0x00033fb0> { _oom_kill_process + 0xdc } CALL pcrel

   1 Target : <0x00033fb0> { _oom_kill_process + 0xdc }

     Source : <0x0001138a> { _printk + 0x16 } RTS

   2 Target : <0x00011386> { _printk + 0x12 }

     Source : <0x000111c0> { _vprintk + 0x140 } RTS

   3 Target : <0x000111b4> { _vprintk + 0x134 }

     Source : <0xffa00bdc> { __common_int_entry + 0xcc } RTI

   4 Target : <0xffa00b7a> { __common_int_entry + 0x6a }

     Source : <0xffa009c4> { _return_from_int + 0x58 } RTS

   5 Target : <0xffa009c4> { _return_from_int + 0x58 }

     Source : <0xffa0099a> { _return_from_int + 0x2e } IF !CC JUMP

   6 Target : <0xffa0096c> { _return_from_int + 0x0 }

     Source : <0xffa00b76> { __common_int_entry + 0x66 } CALL pcrel

   7 Target : <0xffa00b74> { __common_int_entry + 0x64 }

     Source : <0xffa002ee> { _asm_do_IRQ + 0x3e } RTS

   8 Target : <0xffa002e6> { _asm_do_IRQ + 0x36 }

     Source : <0x000149be> { __local_bh_enable + 0x3a } RTS

   9 Target : <0x00014984> { __local_bh_enable + 0x0 }

     Source : <0x00014ca2> { ___do_softirq + 0xb2 } JUMP.L

  10 Target : <0x00014c9a> { ___do_softirq + 0xaa }

     Source : <0x00014c8e> { ___do_softirq + 0x9e } IF !CC JUMP

  11 Target : <0x00014c7a> { ___do_softirq + 0x8a }

     Source : <0x0002f59a> { _rcu_bh_qs + 0x12 } RTS

  12 Target : <0x0002f588> { _rcu_bh_qs + 0x0 }

     Source : <0x00014c76> { ___do_softirq + 0x86 } CALL pcrel

  13 Target : <0x00014c6c> { ___do_softirq + 0x7c }

     Source : <0x0002fef0> { _rcu_process_callbacks + 0x30 } RTS

  14 Target : <0x0002feec> { _rcu_process_callbacks + 0x2c }

     Source : <0x0002fdd4> { _rcu_do_batch + 0x118 } RTS

  15 Target : <0x0002fdce> { _rcu_do_batch + 0x112 }

     Source : <0x0002fcce> { _rcu_do_batch + 0x12 } IF !CC JUMP

Stack info:

SP: [0x001f1bec] <0x001f1bec> /* kernel dynamic memory */

FP: (0x001f1c10)

Memory from 0x001f1be0 to 001f2000

001f1be0: 001f1c44  001f1bec  000000c0 [00980100]<00033fb4> 000201da  00000000  001f1c08

001f1c00: 009b0328  000201da  00000000  00000000 (00000000)<0003426e> 00000000  001af420

001f1c20: 00000000  00000000  000201da <000234a4> 00000000  000201da  00000009  00000000

001f1c40: 00161ecc  00000009 <000342f0> 000201da  00000000  00000002  009b0140  001af420

001f1c60: 00000000  00000000 <00036356> 00000000  000201da  000201da  00000000  00000000

001f1c80: 001af420  00000002  00000042  001ae9a0  00000000  001af424  00000000  000201da

001f1ca0: 00000000  001ae9a0  00000040  009b0140  00000000  00000000  00000000  00000000

001f1cc0: 00000000  001ae9a0  0000001d <00038008> 00000020  0000001d  000163a3  000163c0

001f1ce0: 0000001d  010403c8  000187ff  00aef000  00001000  00001000  00000000  001f1d00

001f1d00: 00af6038  00af7038  001f1dc4 <000380bc> 00af6c20  010403c4  001bc240  0104032c

001f1d20: 00000000  00016383  00000fff  010403c4  001bc240  0104032c  00000020  00000020

001f1d40:<00032664> 00033120  001f1e10  00000000  00000001  00016383  00000001  16383000

001f1d60: 00000000  00000000  000337dc  001f1e58  00001000  001bc280  00016384  00016382

001f1d80: 00000000  00001000  001f1e58 <000331a8> 001f1e94  001bc240  001f1e10  00000000

001f1da0: 00000000  00000000  001f1dc4 <ffa00b74> 001bc240  001f1ef0  000337dc  00000003

001f1dc0: 00000006  00000000  00001000  00962e50  00000000  00001000  00962e18 <00042f84>

001f1de0: 001bc240  001f1ef0  00000003  001f1e10  001f1e94  00001000  00000001  0090c69e

001f1e00: 00000000  00000001  16383000  00000000  00000003  00000000  00000000  00000001

001f1e20: ffffffff  001bc240  00000000  00000000  00000000  00000000  009b0140  00000000

001f1e40: 00000000  00000000  009b0140  0002014c  001f1e50  001f1e50  16383000  00000000

001f1e60: 001bc240  00000003  00000003  01c1714c  00001000  00000003  001f1ef0  00000000

001f1e80: 00abd3dc  0104032c  00962df8 <000435c6> 00aba194  00962e50  00001000 <00043654>

001f1ea0: 001bc240  00000003  001f1ef0  00962e50  001f1ed0  001f1ed0  00000002  001f1ef0

001f1ec0: 00000000 <00043920><000438c0> 001bc240  00000003  00962e50  00001000  00000003

001f1ee0: 00000003  00962e18 <000150a2> 001f1ef0  16383000  00000000  00000000 <ffa00826>

001f1f00: 00043890  00000000  ffffe000  ffffe000  00000003  0000fffe  00963f87  00000001

001f1f20: 00000003  0090215e  00008000  00062000  00000000  001f2000  0090215e  0090215e

001f1f40:<0091b838><ffa00f34> 02002000  00a12d7d  0090c6a7  00a12d76  0090c69e  00000000

001f1f60: 0000000e  00000003  00000000  00000003  00000000  00000000  00000000  00000000

001f1f80: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

001f1fa0: 00000000  00000000  00000000  ffffffff  00963fed  00962e0c  00962e18  0095b400

001f1fc0: 00000001  00000003  0095b8f0  ffffeff4  00000003  00001000  00962e50  00000003

001f1fe0: 00000001  00963f87  00001000  00962e50  00000003  00000003  00000003  00000006

Return addresses in stack:

    address : <0x00033fb4> { _oom_kill_process + 0xe0 }

   frame  1 : <0x0003426e> { ___out_of_memory + 0x4a }

    address : <0x000234a4> { _blocking_notifier_call_chain + 0x10 }

    address : <0x000342f0> { _out_of_memory + 0x40 }

    address : <0x00036356> { ___alloc_pages_nodemask + 0x3be }

    address : <0x00038008> { ___do_page_cache_readahead + 0xa0 }

    address : <0x000380bc> { _ra_submit + 0x18 }

    address : <0x00032664> { _do_generic_file_read + 0x19c }

    address : <0x000331a8> { _generic_file_aio_read + 0x88 }

    address : <0xffa00b74> { __common_int_entry + 0x64 }

    address : <0x00042f84> { _do_sync_read + 0xac }

    address : <0x000435c6> { _vfs_write + 0xc6 }

    address : <0x00043654> { _vfs_read + 0x68 }

    address : <0x00043920> { _sys_write + 0x30 }

    address : <0x000438c0> { _sys_read + 0x30 }

    address : <0x000150a2> { _irq_enter + 0xa }

    address : <0xffa00826> { _system_call + 0x6a }

    address : <0x0091b838> [ cat + 0x1b7f8 ]

    address : <0xffa00f34> { _evt_system_call + 0x64 }

Mem-Info:

DMA per-cpu:

CPU    0: hi:    0, btch:   1 usd:   0

active_anon:0 inactive_anon:0 isolated_anon:0

active_file:5 inactive_file:32 isolated_file:0

unevictable:4574 dirty:0 writeback:0 unstable:0

free:1499 slab_reclaimable:276 slab_unreclaimable:387

mapped:0 shmem:0 pagetables:0 bounce:0

DMA free:5996kB min:4096kB low:5120kB high:6144kB active_anon:0kB inactive_anon:0kB active_file:20kB inactive_file:128kB unevictable:18296kB isolated(anon):0kB isolated(file):0kB present:31496kB mlocked:0kB dirty:0kB writeback:0kB mapped:0kB shmem:0kB slab_reclaimable:1104kB slab_unreclaimable:1548kB kernel_stack:176kB pagetables:0kB unstable:0kB bounce:0kB writeback_tmp:0kB pages_scanned:256 all_unreclaimable? yes

lowmem_reserve[]: 0 0 0

DMA: 351*4kB 64*8kB 1*16kB 1*32kB 1*64kB 1*128kB 1*256kB 1*512kB 1*1024kB 1*2048kB 0*4096kB 0*8192kB 0*16384kB 0*32768kB = 5996kB

4613 total pagecache pages

7936 pages RAM

506 pages reserved

2447 pages shared

3462 pages non-shared

Out of memory: kill process 334 (sh) score 9 or a child

Killed process 335 (cat)

KILL

root:/mnt> free

              total         used         free       shared      buffers

  Mem:        29720        24084         5636            0          244

root:/mnt>

 

 

 

 

Thanks,

George.

QuoteReplyEditDelete

 

 

2010-02-23 17:38:07     Re: ls /mnt/*.dmg ---> misaligned crash, cat largefile >/dev/null ---> OOM crash

George Yohng (AUSTRIA)

Message: 86401   

 

P.S. This is with the latest SVN tip for both uclinux-dist and linux kernel, and the following versions of toolchain/compilers:

 

active gcc - GCC version 4.3.3 (ADI-09r1.1-2)

 

Installed RPMs:

 

blackfin-toolchain-uclibc-full-09r1.1-2.i386

blackfin-toolchain-uclibc-full-gcc-4.3-addon-09r1.1-2.i386

blackfin-toolchain-09r1.1-2.i386

blackfin-jtag-tools-09r1.1-2.i386

blackfin-toolchain-gcc-4.3-addon-09r1.1-2.i386

QuoteReplyEditDelete

 

 

2010-02-23 17:48:42     Re: ls /mnt/*.dmg ---> misaligned crash, cat largefile >/dev/null ---> OOM crash

George Yohng (AUSTRIA)

Message: 86403   

 

I apologize once again. The 'cat' problem seemed to happen due to overflowing system log on RAMFS, as USB was compiled with a debugging system, which wrote data to /var/log/messages

 

After I have made messages a symbolic link to /dev/null, the crash no longer happens. However I get periodic printouts of:

 

usb 1-1: reset high speed USB device using musb_hdrc and address 2

usb 1-1: reset high speed USB device using musb_hdrc and address 2

usb 1-1: reset high speed USB device using musb_hdrc and address 2

 

The other problem with ls does not seem to be related to this and is always reproducible. If I do ls from the same directory, it doesn't crash, however if I do it from the root directory specifying a full path - it crahes with a misalignment.

 

I have searched the web and found mentioning about a bug with busybox and uClibc.

Attachments

    Outcomes