[#5556] kernel crashes with tickless config
Submitted By: Robin Getz
Open Date
2009-09-25 16:15:05 Close Date
2009-09-30 11:18:57
Priority:
Medium Assignee:
Graf Yang
Status:
Closed Fixed In Release:
N/A
Found In Release:
2010R1 Release:
trunk
Category:
N/A Board:
STAMP
Processor:
ALL Silicon Revision:
bf537 0.3
Is this bug repeatable?:
Yes Resolution:
Rejected
Uboot version or rev.:
Toolchain version or rev.:
trunk
App binary format:
N/A
Summary: kernel crashes with tickless config
Details:
If you select:
- CONFIG_NO_HZ
- CONFIG_BFIN_ISRAM_SELF_TEST
The kernel will crash on startup.
TCP cubic registered
NET: Registered protocol family 17
isram: INFO: running initial dma_memcpy checks
isram: INFO: running isram_read tests
isram: FAIL: isram_read(ffa02f9c) returned 0x30201002fea0040 but wanted 0x706050403020100
isram: FAIL: isram_read(ffa02fa4) returned 0xb0a090807060504 but wanted 0xf0e0d0c0b0a0908
isram: FAIL: isram_read(ffa02fac) returned 0x131211100f0e0d0c but wanted 0x1716151413121110
isram: FAIL: isram_read(ffa02fb4) returned 0x1b1a191817161514 but wanted 0x1f1e1d1c1b1a1918
isram: FAIL: isram_read(ffa02fbc) returned 0x232221201f1e1d1c but wanted 0x2726252423222120
....
and eventually:
Freeing unused kernel memory: 8692k freed
dma_alloc_init: dma_page @ 0x0209d000 - 256 pages at 0x03f00000
Undefined instruction
<5> - May be used to emulate instructions that are not defined for
<5> a particular processor implementation.
Kernel OOPS in progress
Deferred Exception context
CURRENT PROCESS:
COMM=init PID=130
CPU = 0
TEXT = 0x02ae0040-0x02ae5ae0 DATA = 0x02ae5ae4-0x02ae687c
BSS = 0x02ae687c-0x02af80f4 USER-STACK = 0x02af9fb0
return address: [0xffa02f98]; contents of:
0xffa02f70: 0127 05ac 0010 e14c 0017 e10c 21a8 9120
0xffa02f80: 0040 2fc8 3051 6422 2fb2 6409 e14a 0017
0xffa02f90: 9309 e10a 21a8 9110 [0100] 0302 0100 0302
0xffa02fa0: 0504 0706 0908 0b0a 0d0c 0f0e 1110 1312
ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)
Linux version 2.6.31-ADI-2010R1-pre-svn7453 (rgetz@imhotep) (gcc version 4.3.4 (ADI-trunk/svn-3634) ) #436 Fri Sep 25 11:55:07 EDT 2009
SEQUENCER STATUS: Not tainted
SEQSTAT: 00002021 IPEND: 8008 IMASK: 001f SYSCFG: 0006
Peripheral interrupts masked off
Kernel interrupts masked off
EXCAUSE : 0x21
physical IVG3 asserted : <0xffa00830> { _trap + 0x0 }
physical IVG15 asserted : <0xffa01100> { _evt_system_call + 0x0 }
logical irq 6 mapped : <0xffa004ac> { _timer_interrupt + 0x0 }
logical irq 10 mapped : <0x000b7eb4> { _bfin_rtc_interrupt + 0x0 }
logical irq 18 mapped : <0x000a4af4> { _bfin_serial_dma_rx_int + 0x0 }
logical irq 19 mapped : <0x000a483c> { _bfin_serial_dma_tx_int + 0x0 }
logical irq 24 mapped : <0x000ae7c8> { _bfin_mac_interrupt + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x02afbcf0> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x000472e8> { _exec_mmap + 0x2c }
PC : <0xffa02f98> { ___down_read + 0xc8 }
DCPLB_FAULT_ADDR: <0x001721a8> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0xffa02f98> { ___down_read + 0xc8 }
PROCESSOR STATE:
R0 : 0000ffff R1 : 00000001 R2 : 02a84e18 R3 : 00000004
R4 : 00013cf0 R5 : 0004de20 R6 : 02a84c60 R7 : 02a84e14
P0 : 02a8a594 P1 : 02a84e14 P2 : 001721a8 P3 : 02a98200
P4 : 02a84de0 P5 : 02095700 FP : 02afbd34 SP : 02afbc14
LB0: 00092176 LT0: 0009216e LC0: 00000004
LB1: 0006b626 LT1: 0006b626 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 02a98234
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 02a98200
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 02af9dfc ASTAT: 02002020
Hardware Trace:
0 Target : <0x00005160> { _trap_c + 0x0 }
Source : <0xffa007c4> { _exception_to_level5 + 0xa4 } CALL pcrel
1 Target : <0xffa00720> { _exception_to_level5 + 0x0 }
Source : <0xffa005d4> { _bfin_return_from_exception + 0x20 } RTX
2 Target : <0xffa005b4> { _bfin_return_from_exception + 0x0 }
Source : <0xffa00678> { _ex_trap_c + 0x74 } JUMP.S
3 Target : <0xffa00604> { _ex_trap_c + 0x0 }
Source : <0xffa00898> { _trap + 0x68 } JUMP (P4)
4 Target : <0xffa00850> { _trap + 0x20 }
Source : <0xffa0084c> { _trap + 0x1c } IF !CC JUMP
5 Target : <0xffa00830> { _trap + 0x0 }
Source : <0xffa02f96> { ___down_read + 0xc6 } 0x9110
6 Target : <0xffa02f8a> { ___down_read + 0xba }
Source : <0xffa02eea> { ___down_read + 0x1a } IF !CC JUMP
7 Target : <0xffa02ed0> { ___down_read + 0x0 }
Source : <0xffa02bc0> { _down_read + 0x14 } JUMP.L
8 Target : <0xffa02bb8> { _down_read + 0xc }
Source : <0xffa01fd8> { __cond_resched + 0x20 } RTS
9 Target : <0xffa01fd2> { __cond_resched + 0x1a }
Source : <0xffa01fca> { __cond_resched + 0x12 } IF CC JUMP
10 Target : <0xffa01fb8> { __cond_resched + 0x0 }
Source : <0xffa02bb4> { _down_read + 0x8 } CALL pcrel
11 Target : <0xffa02bac> { _down_read + 0x0 }
Source : <0x000472e4> { _exec_mmap + 0x28 } CALL pcrel
12 Target : <0x000472da> { _exec_mmap + 0x1e }
Source : <0x0000f0d0> { _mm_release + 0x64 } RTS
13 Target : <0x0000f0ca> { _mm_release + 0x5e }
Source : <0x0000f090> { _mm_release + 0x24 } IF !CC JUMP
14 Target : <0x0000f08a> { _mm_release + 0x1e }
Source : <0x0000b4a6> { _complete + 0x3e } RTS
15 Target : <0x0000b48c> { _complete + 0x24 }
Source : <0x0000b3a4> { ___wake_up_common + 0x58 } RTS
Kernel Stack
Stack info:
SP: [0x02afbf24] <0x02afbf24> /* kernel dynamic memory */
Memory from 0x02afbf20 to 02afc000
02afbf20: 02af80c0 [02ae25ca] 00008000 00002000 00000000 02afc000 02ae25ca 02ae25ca
02afbf40:<02ae0cb6><ffa01164> 02003024 00000001 02ae3781 00000000 02ae377e 00000000
02afbf60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02afbf80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02afbfa0: 00000000 00000000 00000000 00000001 02af9e15 02af9dfc 02af9e08 02ae68a0
02afbfc0: 02ae6878 00000001 00000013 00000002 0000000b 00000000 02af9fb4 02af80c0
02afbfe0: 02ae5aa8 02ae6370 02af9e20 02af9e2c 02ae6594 02ae6594 0000000b 00000006
Return addresses in stack:
address : <0x02ae0cb6> [ init + 0xc76 ]
address : <0xffa01164> { _evt_system_call + 0x64 }
Modules linked in:
Kernel panic - not syncing: Kernel exception
Hardware Trace:
Stack info:
SP: [0x02afbb30] <0x02afbb30> /* kernel dynamic memory */
FP: (0x02afbe08)
Memory from 0x02afbb30 to 02afc000
02afbb30:[00135b48]<0010a806> 02afbc14 00135b48 001653d2 001653d2 001653d2 02afbb68
02afbb50:<00005554> 02afbc14 ffe02014 02a98200 00008008 02afbc14 0000003f 0000003f
02afbb70: 02afbb98 0000c07a 00030001 020756c0 02018bc0 02018bec 02a97de0 020756c0
02afbb90: 0207584c 02018bc0 0000003f ffa01e4c 02a97de0 00000000 00000000 02afbbdc
02afbbb0: 0000a4d6 00170940 020756c0 00171188 00000000 0000003f 00000006 0000003f
02afbbd0: 00000000 00000000 0000003f 0000a4d6 00170940 00000000 00000000 02afbc1c
02afbbf0:<ffa007c8> 00162000 00008008 00002021 0004de20 00013cf0 00000006 0000003f
02afbc10: 00000480 00000480 00008008 00002021 00000000 02afbcf0 00000480 ffa02f98
02afbc30:<000472e8> 0000ffff 02002020 0006b626 00092176 0006b626 0009216e 00000000
02afbc50: 00000004 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02afbc70: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02afbc90: 00000000 00000000 00000000 02a98200 02a98234 02af9dfc 02afbd34 02095700
02afbcb0: 02a84de0 02a98200 001721a8 02a84e14 02a8a594 02a84e14 02a84c60 0004de20
02afbcd0: 00013cf0 00000004 02a84e18 00000001 0000ffff 0000ffff 02a8a594 00000006
02afbcf0: 02afbd34 <0000f08a> 02afa000 02095700 02095700 0000ffff 02afbd34 <000472e8>
02afbd10: 02095700 02a84de0 02a84e14 02a84c60 0004de20 00000001 <00035854> 0017e5e8
02afbd30: 00002a00 00002a00 <00047420> 02a98200 00000000 02a98200 02afa000 000019e0
02afbd50: 00000001 <00036b92> 00a560a0 0017e5c4 00000000 000280d2 0017e5e8 <0006c35c>
02afbd70: 02a98200 02a98200 0004de20 02afa000 000019e0 0004de20 00013cf0 02a98200
02afbd90: 01010001 00000000 00000000 ffffffff 0017efe8 00000000 0017e5c4 00000000
02afbdb0: 00000000 00000000 00000000 00000000 000019e0 00003ed2 00000001 00000000
02afbdd0: 00000000 00000000 00000000 00000000 00000000 00000000 00000004 00000000
02afbdf0: 00000000 00000000 00000000 00000000 00000000 00000000 (02afbe64)<0006c91a>
02afbe10: 02a98200 02a98200 00177b48 fffffff8 fffffffe 0000003f 02afbf24 01000000
02afbe30: 02afbe40 00000000 02afbe60 02afbe5c 00000000 00000000 00000000 00000000
02afbe50: 00000000 00000000 00000000 00000000 00003ed2 (00000000)<00046d28> 00177f6c
02afbe70: 02a98200 00177b48 fffffff8 fffffffe 0000003f ffffffc0 <00046c8c> 02afbf24
02afbe90: 00a560a0 02a98202 00000000 02af9e08 <00047956> 02af9e20 02af9e2c 00000001
02afbeb0: 00000000 02a98200 02afa000 00000001 02af9e2c 02afbf24 02a98200 00000000
02afbed0:<00001a36> 00001a00 0000000b 0207b000 02af9e2c 02af9e20 02ae5aa8 02af80c0
02afbef0: 02ae5aa8 02095700 02afbf24 <ffa009d0> 00000000 ffffe000 02af80c0 02ae6594
02afbf10: 02095700 016e3600 02ae6370 02ae5aa8 02af80c0 02ae25ca 00008000 00002000
02afbf30: 00000000 02afc000 02ae25ca 02ae25ca <02ae0cb6><ffa01164> 02003024 00000001
02afbf50: 02ae3781 00000000 02ae377e 00000000 00000000 00000000 00000000 00000000
02afbf70: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02afbf90: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000001
02afbfb0: 02af9e15 02af9dfc 02af9e08 02ae68a0 02ae6878 00000001 00000013 00000002
02afbfd0: 0000000b 00000000 02af9fb4 02af80c0 02ae5aa8 02ae6370 02af9e20 02af9e2c
02afbff0: 02ae6594 02ae6594 0000000b 00000006
Return addresses in stack:
address : <0x0010a806> { _panic + 0x4a }
address : <0x00005554> { _trap_c + 0x3f4 }
address : <0xffa007c8> { _exception_to_level5 + 0xa8 }
address : <0x000472e8> { _exec_mmap + 0x2c }
address : <0x0000f08a> { _mm_release + 0x1e }
address : <0x000472e8> { _exec_mmap + 0x2c }
address : <0x00035854> { _rmqueue_bulk + 0x30 }
address : <0x00047420> { _flush_old_exec + 0x3c }
address : <0x00036b92> { _get_page_from_freelist + 0x152 }
address : <0x0006c35c> { _load_flat_file + 0x548 }
frame 1 : <0x0006c91a> { _load_flat_binary + 0x52 }
frame 2 : <0x00046d28> { _search_binary_handler + 0x90 }
address : <0x00046c8c> { _copy_strings_kernel + 0x18 }
address : <0x00047956> { _do_execve + 0x1b6 }
address : <0x00001a36> { _sys_execve + 0x36 }
address : <0xffa009d0> { _system_call + 0x68 }
address : <0x02ae0cb6> [ init + 0xc76 ]
address : <0xffa01164> { _evt_system_call + 0x64 }
Follow-ups
--- Robin Getz 2009-09-30 11:18:57
I reverted some local changes I had - and this issue went away.
My fault. Sorry for the noise.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found