[#5305] testing 09r1 branch uclinux gdb on 09r1 branch kernel make kenrel panic

Document created by Aaronwu Employee on Sep 4, 2013
Version 1Show Document
  • View in full screen mode

[#5305] testing 09r1 branch uclinux gdb on 09r1 branch kernel make kenrel panic

Submitted By: Mingquan Pan

Open Date

2009-07-01 22:41:32     Close Date

2010-06-11 04:29:30

Priority:

Medium High     Assignee:

Sonic Zhang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

2009R1-RC6     Release:

Category:

N/A     Board:

N/A

Processor:

BF537     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Not reproducible

Uboot version or rev.:

    Toolchain version or rev.:

09R1-RC7

App binary format:

N/A     

Summary: testing 09r1 branch uclinux gdb on 09r1 branch kernel make kenrel panic

Details:

 

testing 09r1 branch uclinux gdb on 09r1 branch kernel make kenrel panic now.

 

toolchain binary is 009r1-rc7, not changed.

 

Good revision: linux 6872, uclinux-dist 8397, toolchain source 3464.

Failed revision: linux 6881, uclinux-dist 8403, toolchain source 3464.

 

The failed log:

 

testing uclinux gdb

NULL pointer access

Deferred Exception context

CURRENT PROCESS:

COMM=savedregs.11841 PID=16328

CPU = 0

TEXT = 0x004e0040-0x004e08a0        DATA = 0x004e08c0-0x004e0924

BSS = 0x004e0924-0x004e09f0  USER-STACK = 0x004f4f6c

 

return address: [0x004e01c8]; contents of:

0x004e01a0:  0000  0538  0010  0000  e800  0000  b0b8  00a1

0x004e01b0:  0000  e10a  0940  6008  9310  e801  0000  0010

0x004e01c0:  e800  0000  6802  6000 [9b10] e801  0000  0010

0x004e01d0:  e800  0003  00a1  0000  e101  01a8  6058  e300

 

ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)

Linux version 2.6.28.10-ADI-2009R1-svn6881

Built with gcc version 4.1.2 (ADI svn)

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00060027  IPEND: 0030  SYSCFG: 0006

  EXCAUSE   : 0x27

  interrupts disabled

  physical IVG5 asserted : <0xffa00c14> { _evt_ivhw + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00210000> [ rshd + 0x0 ]

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x004e01e6> [ savedregs.11841 + 0x1a6 ]

PC  : <0x004e01c8> [ savedregs.11841 + 0x188 ]

DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x004e01c8> [ savedregs.11841 + 0x188 ]

 

PROCESSOR STATE:

R0 : 00000000    R1 : 00000000    R2 : 00000000    R3 : 00000003

R4 : 00000001    R5 : 004e0880    R6 : 004e0948    R7 : 00000000

P0 : 004f4e64    P1 : 0000001f    P2 : 00000000    P3 : 004f4f70

P4 : 004e0920    P5 : 004e08c0    FP : 004f4f04    SP : 0020ff24

LB0: 004e0747    LT0: 004e0746    LC0: 00000000

LB1: 004e0279    LT1: 004e0272    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 004f4d30

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 0336d360

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 004f4f04  ASTAT: 02003005

 

Hardware Trace:

   0 Target : <0x00004c3c> { _trap_c + 0x0 }

     Source : <0xffa0065a> { _exception_to_level5 + 0x9e } CALL pcrel

   1 Target : <0xffa005bc> { _exception_to_level5 + 0x0 }

     Source : <0xffa004a0> { _bfin_return_from_exception + 0x20 } RTX

   2 Target : <0xffa00480> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00516> { _ex_trap_c + 0x46 } JUMP.S

   3 Target : <0xffa004d0> { _ex_trap_c + 0x0 }

     Source : <0xffa003b4> { _ex_workaround_261 + 0x1c } JUMP.S

   4 Target : <0xffa00398> { _ex_workaround_261 + 0x0 }

     Source : <0xffa00730> { _trap + 0x64 } JUMP (P4)

   5 Target : <0xffa006ea> { _trap + 0x1e }

     Source : <0xffa006e6> { _trap + 0x1a } IF !CC JUMP

   6 Target : <0xffa006cc> { _trap + 0x0 }

     Source : <0xffa004a0> { _bfin_return_from_exception + 0x20 } RTX

   7 Target : <0xffa00480> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa003aa> { _ex_workaround_261 + 0x12 } IF !CC JUMP

   8 Target : <0xffa00398> { _ex_workaround_261 + 0x0 }

     Source : <0xffa00730> { _trap + 0x64 } JUMP (P4)

   9 Target : <0xffa006ea> { _trap + 0x1e }

     Source : <0xffa006e6> { _trap + 0x1a } IF !CC JUMP

  10 Target : <0xffa006cc> { _trap + 0x0 }

     Source : <0x004e01c6> [ savedregs.11841 + 0x186 ] 0x6000

  11 Target : <0x004e01c4> [ savedregs.11841 + 0x184 ]

     Source : <0xffa00b30> { _schedule_and_signal + 0xe4 } RTI

  12 Target : <0xffa00ace> { _schedule_and_signal + 0x82 }

     Source : <0xffa008b8> { _system_call + 0xb8 } RTS

  13 Target : <0xffa008b2> { _system_call + 0xb2 }

     Source : <0x000035ca> { _do_signal + 0x9b6 } RTS

  14 Target : <0x000035be> { _do_signal + 0x9aa }

     Source : <0x00003592> { _do_signal + 0x97e } IF !CC JUMP

  15 Target : <0x00003584> { _do_signal + 0x970 }

     Source : <0x00003580> { _do_signal + 0x96c } IF !CC JUMP

Userspace Stack

Stack info:

SP: [0x004f4f04] <0x004f4f04> [ savedregs.11841 + 0x14f04 ]

FP: (0x004f4f04)

Memory from 0x004f4f00 to 004f5000

004f4f00: 004e08c0 [004f4f18]<004e01e6> 00000000  004f4f2c <004e0498> 004f4f2c <004e0558>

004f4f20: 00000000  00000000  00000000  00000000 <002a8168> 004e08c0  002bff99  002bff68

004f4f40: 00000000  002af0c0  002aa900  00000003  004e01d0  00000000  00000000  004e0880

004f4f60: 004e0892  00000000  002bff99  00000001  004f4f93  00000000  004f4fa8 <004f4fb2>

004f4f80: 004f4fbb  004f4fce  004f4fdc  00000000  2f000000  2f706d74  65766173  67657264

004f4fa0: 31312e73  00313438  52455355  6f6f723d  4f4c0074  4d414e47  50003d45  3d485441

004f4fc0: 7273752f  6e69622f  69622f3a  4853006e  3d4c4c45  6e69622f  0068732f  454d4f48

004f4fe0: 6f722f3d  2f00746f  2f706d74  65766173  67657264  31312e73  00313438  00000000

004f5000: 00000000

Return addresses in stack:

   frame  1 : <0x004e01e6> [ savedregs.11841 + 0x1a6 ]

    address : <0x004e0498> [ savedregs.11841 + 0x458 ]

   frame  2 : <0x004e0558> [ savedregs.11841 + 0x518 ]

   frame  3 : <0x002a8168> [ gdbserver + 0x8168 ]

    address : <0x004f4fb2> [ savedregs.11841 + 0x14fb2 ]

Kernel panic - not syncing: Attempted to kill init!

Rebooting in 3 seconds..

 

U-Boot 2008.10-svn1868 (ADI-2009R1-rc1) (May 11 2009 - 16:30:17)

 

 

 

CURRENT PROCESS:

COMM=signull.11841 PID=244

CPU = 0

TEXT = 0x001a0040-0x001a0a40        DATA = 0x001a0a60-0x001a0ac8

BSS = 0x001a0ac8-0x001a0c70  USER-STACK = 0x001b4f70

 

return address: [0x00000000]; contents of:

 

ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)

Linux version 2.6.28.10-ADI-2009R1-svn6881

Built with gcc version 4.1.2 (ADI svn)

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0006202d  IPEND: 0030  SYSCFG: 0006

  EXCAUSE   : 0x2d

  interrupts disabled

  physical IVG5 asserted : <0xffa00c14> { _evt_ivhw + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00298000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x001a01aa> [ signull.11841 + 0x16a ]

PC  : <0x00000000> /* Maybe null pointer? */

DCPLB_FAULT_ADDR: <0x001a0c60> [ signull.11841 + 0xc60 ]

ICPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */

 

PROCESSOR STATE:

R0 : 00000000    R1 : 00000001    R2 : 00000000    R3 : 00000008

R4 : 00000001    R5 : 001a0a18    R6 : 001a0af0    R7 : 00000000

P0 : 000000ae    P1 : 0000001f    P2 : 00000000    P3 : 001b4f74

P4 : 001a0ac4    P5 : 001a0a60    FP : 001b4e7c    SP : 00297f24

LB0: 001a0803    LT0: 001a0802    LC0: 00000000

LB1: 002e7a35    LT1: 002e7a2e    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 001b4f14

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 0028d360

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 001b4e64  ASTAT: 02002022

 

Hardware Trace:

   0 Target : <0x00004c3c> { _trap_c + 0x0 }

     Source : <0xffa0065a> { _exception_to_level5 + 0x9e } CALL pcrel

   1 Target : <0xffa005bc> { _exception_to_level5 + 0x0 }

     Source : <0xffa004a0> { _bfin_return_from_exception + 0x20 } RTX

   2 Target : <0xffa00480> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00516> { _ex_trap_c + 0x46 } JUMP.S

   3 Target : <0xffa004d0> { _ex_trap_c + 0x0 }

     Source : <0xffa00730> { _trap + 0x64 } JUMP (P4)

   4 Target : <0xffa006ea> { _trap + 0x1e }

     Source : <0xffa006e6> { _trap + 0x1a } IF !CC JUMP

   5 Target : <0xffa006cc> { _trap + 0x0 }

     Source : <0x001a01a8> [ signull.11841 + 0x168 ] CALL (P2)

   6 Target : <0x001a019e> [ signull.11841 + 0x15e ]

     Source : <0x001a016a> [ signull.11841 + 0x12a ] IF !CC JUMP

   7 Target : <0x001a0158> [ signull.11841 + 0x118 ]

     Source : <0xffa00b30> { _schedule_and_signal + 0xe4 } RTI

   8 Target : <0xffa00ace> { _schedule_and_signal + 0x82 }

     Source : <0xffa008b8> { _system_call + 0xb8 } RTS

   9 Target : <0xffa008b2> { _system_call + 0xb2 }

     Source : <0x000035ca> { _do_signal + 0x9b6 } RTS

  10 Target : <0x000035be> { _do_signal + 0x9aa }

     Source : <0x00003592> { _do_signal + 0x97e } IF !CC JUMP

  11 Target : <0x00003584> { _do_signal + 0x970 }

     Source : <0x00003580> { _do_signal + 0x96c } IF !CC JUMP

  12 Target : <0x00003568> { _do_signal + 0x954 }

     Source : <0x00002c76> { _do_signal + 0x62 } JUMP.S

  13 Target : <0x00002c6e> { _do_signal + 0x5a }

     Source : <0x00018156> { _get_signal_to_deliver + 0x212 } RTS

  14 Target : <0x00018146> { _get_signal_to_deliver + 0x202 }

     Source : <0x00017fb6> { _get_signal_to_deliver + 0x72 } IF !CC JUMP

  15 Target : <0x00017fb2> { _get_signal_to_deliver + 0x6e }

     Source : <0x0001774e> { _dequeue_signal + 0x6a } RTS

Userspace Stack

Stack info:

SP: [0x001b4e64] <0x001b4e64> [ signull.11841 + 0x14e64 ]

FP: (0x001b4e60)

Memory from 0x001b4e60 to 001b5000

001b4e60:(00000000)[001a04c2] 00000000  001b4f1c <001a01fe> 00000000  001b4f1c  001b4f1c

001b4e80:<001a021e> 00000000  00000000  00000000  001a013c  00000000  00000000  00000000

001b4ea0: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

001b4ec0: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

001b4ee0: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

001b4f00: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  001b4f30

001b4f20:<001a06d8> 00000000  00000000  00000000  00000000 <002e8168> 001a0a60  002fff9b

001b4f40: 002fff68  00000000  002ef0c0  002ea900  00000003  001a01cc  00000000  00000000

001b4f60: 001a0a18  001a0a2a  00000000  002fff9b  00000001  001b4f97  00000000  001b4faa

001b4f80:<001b4fb4> 001b4fbd  001b4fd0  001b4fde  00000000  2f000000  2f706d74  6e676973

001b4fa0: 2e6c6c75  34383131  53550031  723d5245  00746f6f  4e474f4c  3d454d41  54415000

001b4fc0: 752f3d48  622f7273  2f3a6e69  006e6962  4c454853  622f3d4c  732f6e69  4f480068

001b4fe0: 2f3d454d  746f6f72  6d742f00  69732f70  6c756e67  31312e6c  00313438  00000000

001b5000: e1019110

Return addresses in stack:

   frame  1 : <0x001a04c2> [ signull.11841 + 0x482 ]

    address : <0x001a01fe> [ signull.11841 + 0x1be ]

    address : <0x001a021e> [ signull.11841 + 0x1de ]

    address : <0x001a06d8> [ signull.11841 + 0x698 ]

    address : <0x002e8168> [ gdbserver + 0x8168 ]

    address : <0x001b4fb4> [ signull.11841 + 0x14fb4 ]

Kernel panic - not syncing: Attempted to kill init!

Rebooting in 3 seconds..

 

U-Boot 2008.10-svn1868 (ADI-2009R1-rc1) (May 11 2009 - 16:30:17)

 

Follow-ups

 

--- Mingquan Pan                                             2009-07-02 03:20:23

The command to run gdb alone:

./toolchain-regtest -s /home/test/work/cruise/checkouts/toolchain -o

/opt/uClinux/bfin -b /home/test//temp/regtest_build410702 -t uclinux  -T

10.100.4.50 -a -L gdb

 

define your parameters.

 

--- Sonic Zhang                                              2009-07-02 04:41:45

Can't replicate on 2009R1 branch head.

 

--- Robin Getz                                               2009-07-02 04:56:48

I have seen this on some of my tests.

 

Where the kernel killing a process will sometimes kill (or attempt to kill) the

wrong one. If this "wrong process" is the init process - the kernel

will panic.

 

So far - I have been unable to replicate things in a reproducible manner - but

I have seen it too.

 

-Robin

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes