[#7080] SMP: smp kernel crash in trunk in bf561
Submitted By: Vivi Li
Open Date
2012-04-27 02:17:12 Close Date
2012-05-04 03:44:30
Priority:
Medium Assignee:
steven miao
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
N/A Board:
N/A
Processor:
BF561 Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
gcc4.3-2012_Feb_15
App binary format:
N/A
Summary: SMP: smp kernel crash in trunk in bf561
Details:
SMP kernel crash in trunk in bf561-ezkit.
Last passed time: 2012_Mar_13_04_18
--
kernel: Linux release 3.2.0-ADI-2012R1-pre-00342-g3ef373c, build #186 SMP Tue Mar 13 12:58:57 GMT 2012
toolchain: bfin-uclinux-gcc release gcc version 4.3.5 (ADI-trunk/svn-5764)
user-dist: release svn-10648, build #1701 Tue Mar 13 12:56:49 GMT 2012
--
Bellow is the log:
--
Linux version 3.3.0-ADI-2012R1-pre-00590-gc008346 (test@uclinux65-561-SMP) (gcc version 4.3.5 (ADI-trunk/svn-5764) ) #234 SMP Thu Apr 26 05:11:42 GMT 2012
register early platform devices
bootconsole [early_shadow0] enabled
bootconsole [early_BFuart0] enabled
early printk enabled on early_BFuart0
Board Memory: 64MB
Kernel Managed Memory: 64MB
Memory map:
fixedcode = 0x00000400-0x00000490
text = 0x00001000-0x00143ac0
rodata = 0x00143ac0-0x001a2120
bss = 0x001a3000-0x001b44f8
data = 0x001b4500-0x001c8000
stack = 0x001c6000-0x001c8000
init = 0x001c8000-0x00781000
available = 0x00781000-0x03f00000
DMA Zone = 0x03f00000-0x04000000
Hardware Trace active and enabled
Boot Mode: 0
Reset caused by Software reset
Blackfin support (C) 2004-2010 Analog Devices, Inc.
Compiled for ADSP-BF561 Rev 0.5
Blackfin Linux support by http://blackfin.uclinux.org/
Processor Speed: 600 MHz core clock and 100 MHz System Clock
NOMPU: setting up cplb tables
NOMPU: setting up cplb tables
Instruction Cache Enabled for CPU0
External memory: cacheable in instruction cache
L2 SRAM : uncacheable in instruction cache
Data Cache Enabled for CPU0
External memory: cacheable (write-through) in data cache
L2 SRAM : uncacheable in data cache
PERCPU: Embedded 7 pages/cpu @00806000 s4768 r8192 d15712 u32768
Built 1 zonelists in Zone order, mobility grouping off. Total pages: 16002
Kernel command line: root=/dev/mtdblock0 rw ip=10.100.4.50 earlyprintk=serial,uart0,57600 console=ttyBF0,57600 ip=10.100.4.50:10.100.4.174:10.100.4.174:255.255.255.0:bf561-ezkit:eth0:off
PID hash table entries: 256 (order: -2, 1024 bytes)
PID hash table entries: 256 (order: -2, 1024 bytes)
Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
Memory available: 56188k/65536k RAM, (5860k init code, 1290k kernel code, 530k data, 1024k dma, 644k reserved)
Hierarchical RCU implementation.
NR_IRQS:153
Configuring Blackfin Priority Driven Interrupts
start_kernel(): bug: interrupts were enabled early
console [ttyBF0] enabled, bootconsole disabled
console [ttyBF0] enabled, bootconsole disabled
Calibrating delay loop... 1185.79 BogoMIPS (lpj=2371584)
pid_max: default: 32768 minimum: 301
Mount-cache hash table entries: 512
Booting Core B.
Double Fault
Kernel OOPS in progress
Deferred Exception context
No Valid process in current context
return address: [0x0000d836]; contents of:
0x0000d810: 9155 b0f0 e120 0400 6461 e3ff ffcb 3030
0x0000d820: 0c00 1019 a0f0 0c00 1816 e428 007f 9320
0x0000d830: 3045 e127 0254 [51f8] 3007 e309 b101 a0f0
0x0000d840: e628 007f 3007 e3ff fc77 6c86 3006 0127
ADSP-BF561-0.5 600(MHz CCLK) 100(MHz SCLK) (mpu off)
Linux version 3.3.0-ADI-2012R1-pre-00590-gc008346 (test@uclinux65-561-SMP) (gcc version 4.3.5 (ADI-trunk/svn-5764) ) #234 SMP Thu Apr 26 05:11:42 GMT 2012
SEQUENCER STATUS: Not tainted
SEQSTAT: 00000000 IPEND: 0000 IMASK: 0000 SYSCFG: cdc651ef
Peripheral interrupts masked off
Kernel interrupts masked off
EXCAUSE : 0x0
RETE: <0x0013e8c4> { _workqueue_cpu_callback + 0x38 }
RETN: <0x0000000a> /* Maybe null pointer? */
RETX: <0x0000d02e> { ___raw_smp_check_barrier_asm + 0x4e }
RETS: <0x00000000> /* Maybe null pointer? */
PC : <0x0000d836> { _unshare_files + 0x3a }
PROCESSOR STATE:
R0 : b5a27a56 R1 : 5c4b7b7d R2 : f8e70bba R3 : 61a9bfc9
R4 : 9c1f75c6 R5 : 079c2568 R6 : ce19aee6 R7 : 0d6e4b9d
P0 : d1cf1ef9 P1 : dfd4b9a3 P2 : 00003bc4 P3 : 000000c8
P4 : ffe00000 P5 : 001cf7a2 FP : 001a9594 SP : 02051f58
LB0: 001c5ca8 LT0: fffffffc LC0: 00000001
LB1: 00028d12 LT1: 00000000 LC1: 001c5d20
B0 : 001a9594 L0 : 0000d836 M0 : ffffffff I0 : ffe00000
B1 : 000000c8 L1 : 00003c28 M1 : ffe00000 I1 : 00000001
B2 : ffe00000 L2 : 00000000 M2 : 00000000 I2 : 0013f916
B3 : 0013fdfe L3 : 00000001 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000001 A1.x: 00000000
USP : 02052000 ASTAT: 00028d12
Hardware Trace:
0 Target : <0x00004508> { _double_fault_c + 0x0 }
Source : <0x0000af00> { _double_fault + 0x9c } CALL pcrel
1 Target : <0x0000aef4> { _double_fault + 0x90 }
Source : <0x00143a4a> { __raw_spin_lock_irqsave + 0xa } STI R1
2 Target : <0x00143a40> { __raw_spin_lock_irqsave + 0x0 }
Source : <0x0013e8c0> { _workqueue_cpu_callback + 0x34 } JUMP.L
3 Target : <0x0013e88c> { _workqueue_cpu_callback + 0x0 }
Source : <0x00028d10> { _notifier_call_chain + 0x44 } CALL (P2)
4 Target : <0x00028d08> { _notifier_call_chain + 0x3c }
Source : <0x0000d040> { ___raw_smp_check_barrier_asm + 0x60 } RTS
5 Target : <0x0000d036> { ___raw_smp_check_barrier_asm + 0x56 }
Source : <0x0000cf8a> { _put_core_lock + 0x1a } RTS
6 Target : <0x0000cf70> { _put_core_lock + 0x0 }
Source : <0x0000d032> { ___raw_smp_check_barrier_asm + 0x52 } CALL pcrel
7 Target : <0x0000d032> { ___raw_smp_check_barrier_asm + 0x52 }
Source : <0x0000d010> { ___raw_smp_check_barrier_asm + 0x30 } IF CC JUMP pcrel
8 Target : <0x0000cfee> { ___raw_smp_check_barrier_asm + 0xe }
Source : <0x0000cf6e> { _get_core_lock_noflush + 0x2e } RTS
9 Target : <0x0000cf60> { _get_core_lock_noflush + 0x20 }
Source : <0x0000cf50> { _get_core_lock_noflush + 0x10 } IF CC JUMP pcrel
10 Target : <0x0000cf40> { _get_core_lock_noflush + 0x0 }
Source : <0x0000cfea> { ___raw_smp_check_barrier_asm + 0xa } CALL pcrel
11 Target : <0x0000cfe0> { ___raw_smp_check_barrier_asm + 0x0 }
Source : <0x00028d04> { _notifier_call_chain + 0x38 } CALL pcrel
12 Target : <0x00028cf6> { _notifier_call_chain + 0x2a }
Source : <0x00028d20> { _notifier_call_chain + 0x54 } IF CC JUMP pcrel (BP)
13 Target : <0x00028d1e> { _notifier_call_chain + 0x52 }
Source : <0x00028d16> { _notifier_call_chain + 0x4a } IF CC JUMP pcrel
14 Target : <0x00028d12> { _notifier_call_chain + 0x46 }
Source : <0x0014112e> { _cpu_stop_cpu_callback + 0x7e } RTS
15 Target : <0x00141128> { _cpu_stop_cpu_callback + 0x78 }
Source : <0x001410de> { _cpu_stop_cpu_callback + 0x2e } JUMP.S
Kernel panic - not synckernel panic detected... trying to recover from it
--
Follow-ups
--- steven miao 2012-05-03 00:14:38
drop duplicated smp patch
--- Vivi Li 2012-05-04 04:41:41
OK now.
Close it.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
config.policy application/octet-stream 30654 Vivi Li