FAQ: [#7080] SMP: smp kernel crash in trunk in bf561(2012)

Document created by Aaronwu Employee on Sep 12, 2013
Version 1Show Document
  • View in full screen mode

[#7080] SMP: smp kernel crash in trunk in bf561

Submitted By: Vivi Li

Open Date

2012-04-27 02:17:12     Close Date

2012-05-04 03:44:30

Priority:

Medium     Assignee:

steven miao

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

N/A

Processor:

BF561     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

gcc4.3-2012_Feb_15

App binary format:

N/A     

Summary: SMP: smp kernel crash in trunk in bf561

Details:

 

SMP kernel crash in trunk in bf561-ezkit.

 

Last passed time: 2012_Mar_13_04_18

--

kernel:    Linux release 3.2.0-ADI-2012R1-pre-00342-g3ef373c, build #186 SMP Tue Mar 13 12:58:57 GMT 2012

toolchain: bfin-uclinux-gcc release gcc version 4.3.5 (ADI-trunk/svn-5764)

user-dist: release svn-10648, build #1701 Tue Mar 13 12:56:49 GMT 2012

--

 

Bellow is the log:

--

Linux version 3.3.0-ADI-2012R1-pre-00590-gc008346 (test@uclinux65-561-SMP) (gcc version 4.3.5 (ADI-trunk/svn-5764) ) #234 SMP Thu Apr 26 05:11:42 GMT 2012

register early platform devices

bootconsole [early_shadow0] enabled

bootconsole [early_BFuart0] enabled

early printk enabled on early_BFuart0

Board Memory: 64MB

Kernel Managed Memory: 64MB

Memory map:

  fixedcode = 0x00000400-0x00000490

  text      = 0x00001000-0x00143ac0

  rodata    = 0x00143ac0-0x001a2120

  bss       = 0x001a3000-0x001b44f8

  data      = 0x001b4500-0x001c8000

    stack   = 0x001c6000-0x001c8000

  init      = 0x001c8000-0x00781000

  available = 0x00781000-0x03f00000

  DMA Zone  = 0x03f00000-0x04000000

Hardware Trace active and enabled

Boot Mode: 0

Reset caused by Software reset

Blackfin support (C) 2004-2010 Analog Devices, Inc.

Compiled for ADSP-BF561 Rev 0.5

Blackfin Linux support by http://blackfin.uclinux.org/

Processor Speed: 600 MHz core clock and 100 MHz System Clock

NOMPU: setting up cplb tables

NOMPU: setting up cplb tables

Instruction Cache Enabled for CPU0

  External memory: cacheable in instruction cache

  L2 SRAM        : uncacheable in instruction cache

Data Cache Enabled for CPU0

  External memory: cacheable (write-through) in data cache

  L2 SRAM        : uncacheable in data cache

PERCPU: Embedded 7 pages/cpu @00806000 s4768 r8192 d15712 u32768

Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 16002

Kernel command line: root=/dev/mtdblock0 rw ip=10.100.4.50 earlyprintk=serial,uart0,57600 console=ttyBF0,57600 ip=10.100.4.50:10.100.4.174:10.100.4.174:255.255.255.0:bf561-ezkit:eth0:off

PID hash table entries: 256 (order: -2, 1024 bytes)

PID hash table entries: 256 (order: -2, 1024 bytes)

Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)

Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)

Memory available: 56188k/65536k RAM, (5860k init code, 1290k kernel code, 530k data, 1024k dma, 644k reserved)

Hierarchical RCU implementation.

NR_IRQS:153

Configuring Blackfin Priority Driven Interrupts

start_kernel(): bug: interrupts were enabled early

console [ttyBF0] enabled, bootconsole disabled

console [ttyBF0] enabled, bootconsole disabled

Calibrating delay loop... 1185.79 BogoMIPS (lpj=2371584)

pid_max: default: 32768 minimum: 301

Mount-cache hash table entries: 512

Booting Core B.

Double Fault

Kernel OOPS in progress

Deferred Exception context

No Valid process in current context

return address: [0x0000d836]; contents of:

0x0000d810:  9155  b0f0  e120  0400  6461  e3ff  ffcb  3030

0x0000d820:  0c00  1019  a0f0  0c00  1816  e428  007f  9320

0x0000d830:  3045  e127  0254 [51f8] 3007  e309  b101  a0f0

0x0000d840:  e628  007f  3007  e3ff  fc77  6c86  3006  0127

 

ADSP-BF561-0.5 600(MHz CCLK) 100(MHz SCLK) (mpu off)

Linux version 3.3.0-ADI-2012R1-pre-00590-gc008346 (test@uclinux65-561-SMP) (gcc version 4.3.5 (ADI-trunk/svn-5764) ) #234 SMP Thu Apr 26 05:11:42 GMT 2012

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00000000  IPEND: 0000  IMASK: 0000  SYSCFG: cdc651ef

  Peripheral interrupts masked off

  Kernel interrupts masked off

  EXCAUSE   : 0x0

RETE: <0x0013e8c4> { _workqueue_cpu_callback + 0x38 }

RETN: <0x0000000a> /* Maybe null pointer? */

RETX: <0x0000d02e> { ___raw_smp_check_barrier_asm + 0x4e }

RETS: <0x00000000> /* Maybe null pointer? */

PC  : <0x0000d836> { _unshare_files + 0x3a }

PROCESSOR STATE:

R0 : b5a27a56    R1 : 5c4b7b7d    R2 : f8e70bba    R3 : 61a9bfc9

R4 : 9c1f75c6    R5 : 079c2568    R6 : ce19aee6    R7 : 0d6e4b9d

P0 : d1cf1ef9    P1 : dfd4b9a3    P2 : 00003bc4    P3 : 000000c8

P4 : ffe00000    P5 : 001cf7a2    FP : 001a9594    SP : 02051f58

LB0: 001c5ca8    LT0: fffffffc    LC0: 00000001

LB1: 00028d12    LT1: 00000000    LC1: 001c5d20

B0 : 001a9594    L0 : 0000d836    M0 : ffffffff    I0 : ffe00000

B1 : 000000c8    L1 : 00003c28    M1 : ffe00000    I1 : 00000001

B2 : ffe00000    L2 : 00000000    M2 : 00000000    I2 : 0013f916

B3 : 0013fdfe    L3 : 00000001    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000001   A1.x: 00000000

USP : 02052000  ASTAT: 00028d12

 

Hardware Trace:

   0 Target : <0x00004508> { _double_fault_c + 0x0 }

     Source : <0x0000af00> { _double_fault + 0x9c } CALL pcrel

   1 Target : <0x0000aef4> { _double_fault + 0x90 }

     Source : <0x00143a4a> { __raw_spin_lock_irqsave + 0xa } STI R1

   2 Target : <0x00143a40> { __raw_spin_lock_irqsave + 0x0 }

     Source : <0x0013e8c0> { _workqueue_cpu_callback + 0x34 } JUMP.L

   3 Target : <0x0013e88c> { _workqueue_cpu_callback + 0x0 }

     Source : <0x00028d10> { _notifier_call_chain + 0x44 } CALL (P2)

   4 Target : <0x00028d08> { _notifier_call_chain + 0x3c }

     Source : <0x0000d040> { ___raw_smp_check_barrier_asm + 0x60 } RTS

   5 Target : <0x0000d036> { ___raw_smp_check_barrier_asm + 0x56 }

     Source : <0x0000cf8a> { _put_core_lock + 0x1a } RTS

   6 Target : <0x0000cf70> { _put_core_lock + 0x0 }

     Source : <0x0000d032> { ___raw_smp_check_barrier_asm + 0x52 } CALL pcrel

   7 Target : <0x0000d032> { ___raw_smp_check_barrier_asm + 0x52 }

     Source : <0x0000d010> { ___raw_smp_check_barrier_asm + 0x30 } IF CC JUMP pcrel

   8 Target : <0x0000cfee> { ___raw_smp_check_barrier_asm + 0xe }

     Source : <0x0000cf6e> { _get_core_lock_noflush + 0x2e } RTS

   9 Target : <0x0000cf60> { _get_core_lock_noflush + 0x20 }

     Source : <0x0000cf50> { _get_core_lock_noflush + 0x10 } IF CC JUMP pcrel

  10 Target : <0x0000cf40> { _get_core_lock_noflush + 0x0 }

     Source : <0x0000cfea> { ___raw_smp_check_barrier_asm + 0xa } CALL pcrel

  11 Target : <0x0000cfe0> { ___raw_smp_check_barrier_asm + 0x0 }

     Source : <0x00028d04> { _notifier_call_chain + 0x38 } CALL pcrel

  12 Target : <0x00028cf6> { _notifier_call_chain + 0x2a }

     Source : <0x00028d20> { _notifier_call_chain + 0x54 } IF CC JUMP pcrel (BP)

  13 Target : <0x00028d1e> { _notifier_call_chain + 0x52 }

     Source : <0x00028d16> { _notifier_call_chain + 0x4a } IF CC JUMP pcrel

  14 Target : <0x00028d12> { _notifier_call_chain + 0x46 }

     Source : <0x0014112e> { _cpu_stop_cpu_callback + 0x7e } RTS

  15 Target : <0x00141128> { _cpu_stop_cpu_callback + 0x78 }

     Source : <0x001410de> { _cpu_stop_cpu_callback + 0x2e } JUMP.S

Kernel panic - not synckernel panic detected... trying to recover from it

--

 

Follow-ups

 

--- steven miao                                              2012-05-03 00:14:38

drop duplicated smp patch

 

--- Vivi Li                                                  2012-05-04 04:41:41

OK now.

Close it.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

config.policy    application/octet-stream    30654    Vivi Li

Attachments

Outcomes