FAQ: [#6455] Kernel enabled CONFIG_KGDB will crash on bf548-ezkit in trunk(2011)

Document created by Aaronwu Employee on Sep 11, 2013
Version 1Show Document
  • View in full screen mode

[#6455] Kernel enabled CONFIG_KGDB will crash on bf548-ezkit in trunk

Submitted By: Vivi Li

Open Date

2011-01-19 04:24:22     Close Date

2011-04-12 02:56:56

Priority:

Medium     Assignee:

Sonic Zhang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

2011R1     Release:

Category:

N/A     Board:

N/A

Processor:

BF548     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Out of Date

Uboot version or rev.:

    Toolchain version or rev.:

gcc4.3-2010_Dec_06

App binary format:

N/A     

Summary: Kernel enabled CONFIG_KGDB will crash on bf548-ezkit in trunk

Details:

 

Kernel enabled CONFIG_KGDB will crash on bf548-ezkit in trunk.

 

Last passed version:

--

kernel:    Linux release 2.6.34.7-ADI-2010R1-pre-svn9171, build #129 Wed Sep 29 16:45:28 CST 2010

toolchain: bfin-uclinux-gcc release gcc version 4.3.5 (ADI-trunk/svn-4747)

user-dist: release svn-9833, build #2938 Wed Sep 29 16:44:49 CST 2010

--

 

Bellow is the error log:

--

Starting Kernel at = 0029bfb8

console [ttyBF1] enabled, bootconsole disabled

Calibrating delay loop... 1046.52 BogoMIPS (lpj=2093056)

pid_max: default: 32768 minimum: 301

Mount-cache hash table entries: 512

Blackfin Scratchpad data SRAM: 4 KB

Blackfin L1 Data A SRAM: 16 KB (15 KB free)

Blackfin L1 Data B SRAM: 16 KB (16 KB free)

Blackfin L1 Instruction SRAM: 48 KB (41 KB free)

Blackfin L2 SRAM: 128 KB (127 KB free)

NET: Registered protocol family 16

Blackfin DMA Controller

ezkit_init(): registering device resources

bio: create slab <bio-0> at 0

Data access CPLB miss

<5> - Used by the MMU to signal a CPLB miss on a data access.

Kernel OOPS in progress

Deferred Exception context

CURRENT PROCESS:

COMM=swapper PID=1  CPU=0

invalid mm

return address: [0x00049838]; contents of:

0x00049810:  0982  1c03  205b  300b  3019  67fb  0c3b  1817

0x00049820:  0000  0000  640a  ad42  a120  9169  b102  304a

0x00049830:  40c8  a0c1  5041  5e90 [a1d0] b140  5e8d  b111

0x00049840:  6c09  9369  a102  a1e0  0982  1fe6  ac41  9142

 

ADSP-BF548-0.2 525(MHz CCLK) 131(MHz SCLK) (mpu off)

Linux version 2.6.37-ADI-2011R1-pre-svn9570 (test@uclinux61-bf548-std) (gcc version 4.3.5 (ADI-trunk/svn-5013) ) #44 Tue Jan 18 1

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00002026  IPEND: 8008  IMASK: 003f  SYSCFG: 0006

  Peripheral interrupts masked off

  Kernel interrupts masked off

  EXCAUSE   : 0x26

  physical IVG3 asserted : <0xffa00870> { _trap + 0x0 }

  physical IVG15 asserted : <0xffa010c8> { _evt_system_call + 0x0 }

  logical irq   6 mapped  : <0xffa003f0> { _bfin_coretmr_interrupt + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x0201bebc> /* kernel dynamic memory (maybe user-space) */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x00049a6a> { _kmem_cache_alloc + 0x72 }

PC  : <0x00049838> { _cache_alloc_refill + 0x8c }

DCPLB_FAULT_ADDR: <0x57558260> /* reserved memory */

ICPLB_FAULT_ADDR: <0x00049838> { _cache_alloc_refill + 0x8c }

PROCESSOR STATE:

R0 : 55555540    R1 : 55555541    R2 : 00000006    R3 : 00000038

R4 : 00000010    R5 : 000000d0    R6 : 02002cb0    R7 : 02002ca8

P0 : 02002cf0    P1 : 00000003    P2 : 57558244    P3 : 02002ca0

P4 : 02000120    P5 : 02007800    FP : 0201bed0    SP : 0201bde0

LB0: ffa018f0    LT0: ffa018ea    LC0: 00000000

LB1: 00049738    LT1: 00049732    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 0000002c    I0 : 0028ed30

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00000000

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00211545   A0.x: 00000000   A1.w: 00000fbd   A1.x: 00000000

USP : 00000000  ASTAT: 02002040

 

Hardware Trace:

   0 Target : <0x00003f68> { _trap_c + 0x0 }

     Source : <0xffa00804> { _exception_to_level5 + 0xb0 } CALL pcrel

   1 Target : <0xffa00754> { _exception_to_level5 + 0x0 }

     Source : <0xffa005fc> { _bfin_return_from_exception + 0x18 } RTX

   2 Target : <0xffa005e4> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa006a0> { _ex_trap_c + 0x74 } JUMP.S

   3 Target : <0xffa004ec> { _ex_dcplb_miss + 0x0 }

     Source : <0xffa008ca> { _trap + 0x5a } JUMP (P4)

   4 Target : <0xffa00870> { _trap + 0x0 }

      FAULT : <0x00049838> { _cache_alloc_refill + 0x8c } P0 = W[P2 + 7]

     Source : <0x00049836> { _cache_alloc_refill + 0x8a } 0x5e90

   5 Target : <0x00049817> { _cache_alloc_refill + 0x6b }

     Source : <0x0004984a> { _cache_alloc_refill + 0x9e } IF CC JUMP pcrel (BP)

   6 Target : <0x00049818> { _cache_alloc_refill + 0x6c }

     Source : <0x000498c8> { _cache_alloc_refill + 0x11c } IF CC JUMP pcrel (BP)

   7 Target : <0x000498b0> { _cache_alloc_refill + 0x104 }

     Source : <0x00049804> { _cache_alloc_refill + 0x58 } IF CC JUMP pcrel

   8 Target : <0x000497f2> { _cache_alloc_refill + 0x46 }

     Source : <0x000497da> { _cache_alloc_refill + 0x2e } IF CC JUMP pcrel

   9 Target : <0x000497ac> { _cache_alloc_refill + 0x0 }

     Source : <0x00049a66> { _kmem_cache_alloc + 0x6e } JUMP.L

  10 Target : <0x00049a62> { _kmem_cache_alloc + 0x6a }

     Source : <0x00049a20> { _kmem_cache_alloc + 0x28 } IF CC JUMP pcrel

  11 Target : <0x00049a14> { _kmem_cache_alloc + 0x1c }

     Source : <0x00049a72> { _kmem_cache_alloc + 0x7a } JUMP.S

  12 Target : <0x00049a72> { _kmem_cache_alloc + 0x7a }

     Source : <0x001bd390> { __cond_resched + 0x20 } RTS

  13 Target : <0x001bd38a> { __cond_resched + 0x1a }

     Source : <0x001bd382> { __cond_resched + 0x12 } IF CC JUMP pcrel (BP)

  14 Target : <0x001bd370> { __cond_resched + 0x0 }

     Source : <0x00049a6e> { _kmem_cache_alloc + 0x76 } JUMP.L

  15 Target : <0x00049a6e> { _kmem_cache_alloc + 0x76 }

     Source : <0x00049a0e> { _kmem_cache_alloc + 0x16 } IF !CC JUMP pcrel

Kernel Stack

Stack info:

SP: [0x0201bd64] <0x0201bd64> /* kernel dynamic memory (maybe user-space) */

FP: (0x0201bf84)

Memory from 0x0201bd60 to 0201c000

0201bd60: 0028ecb4 [00a4d000] 00000001  00000000  00a4d00c  00000001  0028f6fc  00000000

0201bd80: 000240d0  00000000  00000041  01000000  0000000c  00000000  0101be34  00000010

0201bda0: 0028f6fc  00000000  0000ffff  ffffffff  00000000  00000000  00000000  ffa00808

0201bdc0: 0025b000  00008008 <00002026> 000000d0  00000010  000040d0  000040d0  00000480

0201bde0: 00000480  00008008 <00002026> 00000000  0201bebc  00000480  00049838  00049a6a

0201be00: 0201beb8  02002040  00049738  ffa018f0  00049732  ffa018ea  00000000  00000000

0201be20: 00000fbd  00000000  00211545  00000000  00000000  00000000  00000000  00000000

0201be40: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  0000002c

0201be60: 00000000  00000000  00000000  0028ed30  00000000  0201bed0  02007800  02000120

0201be80: 02002ca0  57558244  00000003  02002cf0  02002ca8  02002cb0  000000d0  00000010

0201bea0: 00000038  00000006  55555541  55555540  55555540  02002cf0  00000006  00000002

0201bec0: 000000d0  0201bed8  00000000  00000800  0201bf00  00049a6a  02000120  0025800c

0201bee0: 002a37c4  00000001  000000d0  0000ffff  00222b68  0204c660  00000002  0201bf2c

0201bf00: 0201bf2c  000eada0  0204c620  00000001  002227b8  00000000  000eab5c  002824b8

0201bf20: 00000000  00222b60  00000001  0201bf64  002a398a  002b13d4  0025800c  00000000

0201bf40: 00000000  00000000  00000000  00000000  0204ec60  00000000  00000000  00000240

0201bf60: 00000000  0201bf84  002a37e2  002b38e4  00000000  00000000  0021fab4  001cf784

0201bf80: 0201bf9c (0201bf9c)<00001136> 00000000  0027853c  002b383c  0201bfac (0201bfc8)

0201bfa0: 00292154  002b38e4  002b3b50  00000000  00000000  00000000  00000000  002921c8

0201bfc0: 002b383c  002b383c (0201bfe4) 002921d4  002b383c  002b383c  00000000  00000000

0201bfe0: 00000000 (00000000)<0000154e> 00000000  00000000  00000000  ffffffff  00000006

Return addresses in stack:

    address : <0x00002026> { _arch_ptrace + 0x1ea }

    address : <0x00002026> { _arch_ptrace + 0x1ea }

   frame  1 : <0x00001136> { _do_one_initcall + 0x9a }

   frame  4 : <0x0000154e> { _kernel_thread_helper + 0x6 }

Modules linked in:

Kernel panic - not syncing: Kernel exception

Hardware Trace:

Stack info:

SP: [0x0201bce0] <0x0201bce0> /* kernel dynamic memory (maybe user-space) */

FP: (0x0201bf84)

Memory from 0x0201bce0 to 0201c000

0201bce0:[02002ca0] 0201bd04  001bccf0  0201bde0  00206e48  0002fd1a  0025e70f  00000010

0201bd00: 0201bd2c  0201bdb8  0000454a  0201bde0  ffe02014  02002ca0  002068c0  00000007

0201bd20: 00000026  00000013  0201bde0  0000003f  0000003f  00a0bd20  0028ecb4  00a4d000

0201bd40: 00030001  0000002c  00000000  0028ecd8  02018ec0  0201bdc0  0003de74  00a0bd40

0201bd60: 0028ecb4  00a4d000  00000001  00000000  00a4d00c  00000001  0028f6fc  00000000

0201bd80: 000240d0  00000000  00000041  01000000  0000000c  00000000  0101be34  00000010

0201bda0: 0028f6fc  00000000  0000ffff  ffffffff  00000000  00000000  00000000  ffa00808

0201bdc0: 0025b000  00008008 <00002026> 000000d0  00000010  000040d0  000040d0  00000480

0201bde0: 00000480  00008008 <00002026> 00000000  0201bebc  00000480  00049838  00049a6a

0201be00: 0201beb8  02002040  00049738  ffa018f0  00049732  ffa018ea  00000000  00000000

0201be20: 00000fbd  00000000  00211545  00000000  00000000  00000000  00000000  00000000

0201be40: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  0000002c

0201be60: 00000000  00000000  00000000  0028ed30  00000000  0201bed0  02007800  02000120

0201be80: 02002ca0  57558244  00000003  02002cf0  02002ca8  02002cb0  000000d0  00000010

0201bea0: 00000038  00000006  55555541  55555540  55555540  02002cf0  00000006  00000002

0201bec0: 000000d0  0201bed8  00000000  00000800  0201bf00  00049a6a  02000120  0025800c

0201bee0: 002a37c4  00000001  000000d0  0000ffff  00222b68  0204c660  00000002  0201bf2c

0201bf00: 0201bf2c  000eada0  0204c620  00000001  002227b8  00000000  000eab5c  002824b8

0201bf20: 00000000  00222b60  00000001  0201bf64  002a398a  002b13d4  0025800c  00000000

0201bf40: 00000000  00000000  00000000  00000000  0204ec60  00000000  00000000  00000240

0201bf60: 00000000  0201bf84  002a37e2  002b38e4  00000000  00000000  0021fab4  001cf784

0201bf80: 0201bf9c (0201bf9c)<00001136> 00000000  0027853c  002b383c  0201bfac (0201bfc8)

0201bfa0: 00292154  002b38e4  002b3b50  00000000  00000000  00000000  00000000  002921c8

0201bfc0: 002b383c  002b383c (0201bfe4) 002921d4  002b383c  002b383c  00000000  00000000

0201bfe0: 00000000 (00000000)<0000154e> 00000000  00000000  00000000  ffffffff  00000006

Return addresses in stack:

    address : <0x00002026> { _arch_ptrace + 0x1ea }

    address : <0x00002026> { _arch_ptrace + 0x1ea }

   frame  1 : <0x00001136> { _do_one_initcall + 0x9a }

   frame  4 : <0x0000154e> { _kernel_thread_helper + 0x6 }

--

 

Follow-ups

 

--- Sonic Zhang                                              2011-01-31 05:55:07

Can replicate on kernel SVN rev. 9585 and uClinux-dist svn 10071

 

--- Vivi Li                                                  2011-02-01 02:17:29

Still crash for latest trunk. Please use the config file that I attached.

 

--- Sonic Zhang                                              2011-04-12 02:21:11

Can replicate on SVN trunk with kernel 2.6.28.

 

--- Sonic Zhang                                              2011-04-12 02:26:25

Should be can't

 

--- Vivi Li                                                  2011-04-12 02:56:56

This bug disappear in latest trunk.

Close it.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

config.linux.kgdb    application/octet-stream    47837    Vivi Li

Attachments

Outcomes