[#5454] testing trunk head toolchain on trunk head kernel would have init make kernel panic
Submitted By: Mingquan Pan
Open Date
2009-08-24 19:30:00 Close Date
2010-02-04 04:22:51
Priority:
Medium Assignee:
Graf Yang
Status:
Closed Fixed In Release:
N/A
Found In Release:
2010R1 Release:
Category:
N/A Board:
N/A
Processor:
BF537 Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
N/A
Uboot version or rev.:
Toolchain version or rev.:
trunk head
App binary format:
N/A
Summary: testing trunk head toolchain on trunk head kernel would have init make kernel panic
Details:
testing trunk head toolchain on trunk head kernel would have init make kernel panic.
when testing comes to libstdc++/libmudflap, it would stuck and find that trunk head kernel has been make panic and restarted.
argets: uclinux
Components: binutils gas ld gdb gcc g++ gfortranobjclibstdc++ libmudflap libgomp newlib
Host: i686-pc-linux-gnu
Build: i686-pc-linux-gnu
Removing /home/test/work/cruise/temp/bfin-uclinux/bin from the PATH
Removing /home/test/work/cruise/temp/bfin-elf/bin from the PATH
Removing /home/test/work/cruise/temp/bfin-linux-uclibc/bin from the PATH
Found multiple versions of runtest, using the one at /usr/bin/runtest
Found multiple versions of bc, using the one at /usr/bin/bc
Found multiple versions of killall, using the one at /usr/bin/killall
Found multiple versions of pstree, using the one at /usr/bin/pstree
Found multiple versions of rsh, using the one at /usr/bin/rsh
Found multiple versions of rcp, using the one at /usr/bin/rcp
Toolchain source is at /home/test/work/cruise/checkouts/toolchain
Build will be done in /home/test/work/cruise/temp/regtest_build4.1
Path for test results
uclinux (10.100.4.50): /home/test/work/cruise/temp/regtest_build4.1/tests/hardware-flat
Creating log file /home/test/work/cruise/temp/regtest_build4.1/logs/regtest.log
checking host /proc/sys/net/ipv4/tcp_tw_recycle : 1 - looks OK
checking target /proc/sys/net/ipv4/tcp_tw_recycle : 0 - setting to 1 Sucess
Target 10.100.4.50 is bf527-0.2, using that for testing multilib
Board at 10.100.4.50 being set so syslog doesn't fill /var/log/messages
Setting up site.exp
*** Testing bfin-uclinux Mon Aug 24 23:44:58 CST 2009
Binutils version 2.17
Binutils path /home/test/work/cruise/temp/bfin-uclinux/bin
*** Running tests on binutils Mon Aug 24 23:44:58 CST 2009
*** Running tests on gas Mon Aug 24 23:45:04 CST 2009
*** Running tests on ld Mon Aug 24 23:45:19 CST 2009
GCC version 4.1.2
GCC /home/test/work/cruise/temp/bfin-uclinux/bin
*** Running tests on gcc Mon Aug 24 23:45:25 CST 2009
*** Running tests on g++ Tue Aug 25 00:37:54 CST 2009
*** Running tests on gfortran Tue Aug 25 00:52:13 CST 2009
*** Running tests on libstdc++ Tue Aug 25 01:33:14 CST 2009
*** Running tests on libmudflap Tue Aug 25 03:10:20 CST 2009
stucks here.
on host, ps:
test 22865 0.0 0.1 4992 1284 pts/1 Rs Jul09 0:00 | \_ -bash
test 12451 0.0 0.1 4264 1436 pts/1 S Aug24 0:00 | \_ /bin/bash -x ./startup_test.sh
test 15906 0.0 0.1 4264 1460 pts/1 S Aug24 0:00 | | \_ /bin/sh -x ./toolchain_test
test 17668 0.3 0.2 3976 2332 pts/1 S Aug24 2:42 | | | \_ /usr/bin/expect /home/test/work/cruise/test_scripts/toolchain/reset_board.exp uImage.normal 1
root 17670 0.0 0.1 3788 1492 pts/3 Ss Aug24 0:00 | | | | \_ su
root 17673 0.0 0.2 4740 2364 pts/3 S+ Aug24 0:00 | | | | | \_ bash
test 17685 0.0 0.3 9064 3552 pts/4 Ss+ Aug24 0:35 | | | | \_ kermit
test 6121 0.0 0.1 4520 1788 pts/1 S Aug24 0:02 | | | \_ /bin/sh ./toolchain-regtest -s /home/test/work/cruise/checkouts/toolchain -o /home/test/work/cruise/temp/bfin -b /home/test/work/cruise/temp/regtest_build4.1 -t uclinux -T 10.100.4.50 -a -L
test 12211 0.0 0.1 4256 1344 pts/1 S 03:10 0:00 | | | \_ sh
test 12220 0.0 0.4 6356 4816 pts/1 S 03:10 0:06 | | | | \_ /usr/bin/expect -- /usr/share/dejagnu/runtest.exp --tool libmudflap -all
root 22304 0.0 0.0 2104 740 pts/1 S 04:01 0:00 | | | | \_ rcp ./pass42-frag.exe root 10.100.4.50 /tmp/pass42-frag.exe.12220
test 22305 0.0 0.0 2892 560 pts/1 S 04:01 0:00 | | | | \_ cat
test 22301 0.0 0.0 4520 856 pts/1 S 04:01 0:00 | | | \_ /bin/sh ./toolchain-regtest -s /home/test/work/cruise/checkouts/toolchain -o /home/test/work/cruise/temp/bfin -b /home/test/work/cruise/temp/regtest_build4.1 -t uclinux -T 10.100.4.50 -a -L
test 22302 0.0 0.0 2092 740 pts/1 S 04:01 0:00 | | | \_ rsh -l root 10.100.4.50 ls / 1>/dev/null
test 22306 0.0 0.0 0 0 pts/1 Z 04:01 0:00 | | | | \_ [rsh] <defunct>
test 22303 0.0 0.0 2896 576 pts/1 S 04:01 0:00 | | | \_ wc -l
test 23348 0.0 0.0 2888 596 pts/1 S 11:01 0:00 | | \_ sleep 8000
test 23477 0.0 0.0 2576 992 pts/1 R+ 12:19 0:00 | \_ ps auxf
root 22891 0.0 0.0 9252 268 ? Ss Jul09 0:00 \_ sshd: test [priv]
On target console:
Deferred Exception context
CURRENT PROCESS:
COMM=init PID=1
CPU = 0
TEXT = 0x00800040-0x00805a20 DATA = 0x00805a24-0x008067c0
BSS = 0x008067c0-0x00818034 USER-STACK = 0x00819fc4
return address: [0x0080293a]; contents of:
0x00802910: 0000 0538 0010 e300 00a1 3210 43b8 9310
0x00802920: 63f8 2ff6 e800 0004 3008 6000 b0f0 6002
0x00802930: 63f8 e300 1071 e801 0000 [0010] 0578 e800
0x00802940: 0003 e128 0092 00a0 3038 e120 f000 0a07
ADSP-BF527-0.2 525(MHz CCLK) 131(MHz SCLK) (mpu off)
Linux version 2.6.30.5-ADI-2010R1-pre-svn7225 (test@45-bf527-toolchain) (gcc version 4.1.2 (ADI svn)) #4 Mon Aug 24 22:15:25 CST 2009
SEQUENCER STATUS: Not tainted
SEQSTAT: 0006002a IPEND: 0008 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x2a
physical IVG3 asserted : <0xffa00644> { _trap + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x03ee8000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x00005be5> { _get_gpio_maskb + 0x1d }
PC : <0x0080293a> [ init + 0x28fa ]
DCPLB_FAULT_ADDR: <0x00819e58> [ init + 0x19e58 ]
ICPLB_FAULT_ADDR: <0x0080293a> [ init + 0x28fa ]
PROCESSOR STATE:
R0 : 00005be6 R1 : 00819f50 R2 : 00000000 R3 : 00000000
R4 : 00000000 R5 : 00818024 R6 : 00819f50 R7 : 00005be5
P0 : 00000072 P1 : 03ae20dc P2 : 00000048 P3 : 008067e4
P4 : 008067e8 P5 : ffffffff FP : 00802936 SP : 03ee7f24
LB0: 0080376d LT0: 0080376a LC0: 00000000
LB1: 00000001 LT1: 00000000 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 008063ec
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00000120
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 00819e60 ASTAT: 00000022
Hardware Trace:
Userspace Stack
Stack info:
SP: [0x00819e60] <0x00819e60> [ init + 0x19e60 ]
FP: (0x00819f48)
Memory from 0x00819e60 to 0081a000
00819e60:[008064d4] 00806524 00000001 0080013c 00000000 00000000 00000000 00000000
00819e80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00819ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00819ec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00819ee0: 00000000 00000000 00000000 00000000 00000000 00000000 008065a0 00000001
00819f00: 00000000 00000000 00000000 00000500 00000005 00001cb1 00008a3b 7f1c0300
00819f20: 01000415 1a131100 170f1200 00000016 00000000 00000000 00000000 00000000
00819f40: 00000000 00000000 (00819f68)<00805454> 00000007 00819f84 <0080490c> 00805a24
00819f60: 008067bc 00819fc8 (00000000) 00818000 008059ec 00000001 00000000 00000000
00819f80: 00000000 00000000 00000000 00805a24 00000000 00000000 00000000 00000000
00819fa0: 00000000 00000000 00800db8 00000000 00000000 008059ec 008059fe 00000000
00819fc0: 00000000 00000001 00819fde 00000000 <00819fe4> 00819feb 00000000 692f0000
00819fe0: 0074696e 454d4f48 54002f3d 3d4d5245 756e696c 692f0078 0074696e 00000000
Return addresses in stack:
frame 1 : <0x00805454> [ init + 0x5414 ]
address : <0x0080490c> [ init + 0x48cc ]
address : <0x00819fe4> [ init + 0x19fe4 ]
Kernel panic - not syncing: Attempted to kill init!
Rebooting in 3 seconds..
U-Boot 2008.10-svn1694 (ADI-2009R1-pre) (Mar 4 2009 - 15:04:16)
CPU: ADSP bf527-0.0 (Detected Rev: 0.2) (parallel flash boot)
Board: ADI BF527 EZ-Kit board
Support: http://blackfin.uclinux.org/
Clock: VCO: 525 MHz, Core: 525 MHz, System: 131.250 MHz
RAM: 64 MB
Flash: 4 MB
In: serial
Out: serial
Err: serial
Net: Blackfin EMAC
MAC: 00:E0:22:FE:BF:3D
Hit any key to stop autoboot: 0
Using Blackfin EMAC device
TFTP from server 10.100.4.174; our IP address is 10.100.4.50
Filename 'uImage'.
Load address: 0x2000000
Loading: #################################################################
#################################################################
#################################################################
#################################################################
#########################################
done
Bytes transferred = 4404521 (433529 hex)
## Booting kernel from Legacy Image at 02000000 ...
Image Name: bf527-2.6.30.5-ADI-2010R1-pre-sv
The whole output on target is attached.
Follow-ups
--- Mingquan Pan 2009-09-02 00:03:05
Since I can test trunk toolchain with 09r1 branch head kernel, so it should be
the problem of uclinux and move it here.
--- Mingquan Pan 2009-09-09 06:37:35
I try to reproduce this issue with libstdc++ testing on hardware-flat.
In this testing, with linux , uclinux-dist :
6645 8286 fails
6640 8280 works
It fails like the kernel works abnormal and would print out dump info even run
simple command like "ls", but not panic yet.
root:/> version
kernel: Linux release 2.6.30-ADI-2010R1-pre-svn6645, build #78 Wed Sep 9
18:32:40 CST 2009
toolchain: bfin-uclinux-gcc release gcc version 4.1.2 (ADI svn)
user-dist: release svn-8286, build #43 Wed Sep 9 18:31:23 CST 2009
root:/> ls
ls: page allocation failure. order:7, mode:0xd0
Hardware Trace:
0 Target : <0x00004be4> { __etext_l2 + 0x4be4 }
Source : <0x00036192> { __etext_l2 + 0x36192 } CALL pcrel
1 Target : <0x00036192> { __etext_l2 + 0x36192 }
Source : <0x000113ce> { __etext_l2 + 0x113ce } RTS
2 Target : <0x000113ca> { __etext_l2 + 0x113ca }
Source : <0x00011260> { __etext_l2 + 0x11260 } RTS
3 Target : <0x00011254> { __etext_l2 + 0x11254 }
Source : <0xffa00c02> { ___initramfs_end + 0xfe284f4e } RTI
4 Target : <0xffa00ba0> { ___initramfs_end + 0xfe284eec }
Source : <0xffa009e4> { ___initramfs_end + 0xfe284d30 } RTS
5 Target : <0xffa009e4> { ___initramfs_end + 0xfe284d30 }
Source : <0xffa009ba> { ___initramfs_end + 0xfe284d06 } IF !CC JUMP
6 Target : <0xffa0098c> { ___initramfs_end + 0xfe284cd8 }
Source : <0xffa00b9c> { ___initramfs_end + 0xfe284ee8 } CALL pcrel
7 Target : <0xffa00b9a> { ___initramfs_end + 0xfe284ee6 }
Source : <0xffa0032e> { ___initramfs_end + 0xfe28467a } RTS
8 Target : <0xffa00326> { ___initramfs_end + 0xfe284672 }
Source : <0x00014822> { __etext_l2 + 0x14822 } RTS
9 Target : <0x000147e8> { __etext_l2 + 0x147e8 }
Source : <0x00014a52> { __etext_l2 + 0x14a52 } JUMP.L
10 Target : <0x00014a4a> { __etext_l2 + 0x14a4a }
Source : <0x00014a3e> { __etext_l2 + 0x14a3e } IF !CC JUMP
11 Target : <0x00014a32> { __etext_l2 + 0x14a32 }
Source : <0x00030974> { __etext_l2 + 0x30974 } RTS
12 Target : <0x00030968> { __etext_l2 + 0x30968 }
Source : <0x00014a2e> { __etext_l2 + 0x14a2e } CALL pcrel
13 Target : <0x00014a24> { __etext_l2 + 0x14a24 }
Source : <0x00017cb8> { __etext_l2 + 0x17cb8 } RTS
14 Target : <0x00017ca0> { __etext_l2 + 0x17ca0 }
Source : <0x00017cfa> { __etext_l2 + 0x17cfa } JUMP.S
15 Target : <0x00017ce4> { __etext_l2 + 0x17ce4 }
Source : <0x00017b76> { __etext_l2 + 0x17b76 } RTS
Stack info:
SP: [0x0146fc88] <0x0146fc88> /* kernel dynamic memory */
FP: (0x0146fc84)
Memory from 0x0146fc80 to 01470000
0146fc80: 0146fc88 (00000000)[0003616a]<00036196> 03790380 00000000
000200d0 03790560
0146fca0: 00000007 000000d0 00000001 00000048 0146e000 0146e000 00000000
000200d0
0146fcc0: 0146e000 00000010 00000000 00000000 00000000 00000000 017791b4
<0003e218>
0146fce0: 0006a000 00000000 0177a124 00000007 00000000 017791b4 00000002
0146e000
0146fd00: 0147e200 <0003e022> 00000000 037eb200 0006a000 0006a000
<0003ea02> 001715d4
0146fd20: 00000000 00000000 00000077 00000000 017791b4 00000002 00000000
<00046b5e>
0146fd40: 0006a000 00000004 00000002 00000000 0146fd5c 0000ffff 0177a124
00000004
0146fd60: 0000274f <000693d4> 016e8800 0004bac0 00000004 0146e000
0005f570 00000005
0146fd80: 0006a000 00000000 00000001 00000000 00000007 00000002 00000000
00000000
0146fda0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00013ab0
0146fdc0: 000019e0 00003ee8 00000001 000692b0 00000000 00000000 00000000
00000000
0146fde0: 00000000 00009d3c 00000000 00000000 00000000 00000000 00000000
0146fe58
0146fe00:<00069dc4> 016e8800 016e8800 0017db18 fffffff8 00000000
0000003f 0146ff24
0146fe20: 01000000 0146fe34 00000000 0146fe54 0146fe50 00000000 00000000
00000000
0146fe40: 00000000 00000000 00000000 00000000 00000000 00003ee8 ffffffc0
<000462be>
0146fe60: 0017df20 016e8800 0017db18 fffffff8 00000000 0000003f 0146ff24
000001d4
0146fe80:<000460f4> 017f0600 00000000 0146e000 0146e000 000001d4
<00046e18> 016e8800
0146fea0: 0145f2e8 0146c0bc 00000000 0146e000 0181e000 00000001 00000001
<00049144>
0146fec0: 00171a6c 00000000 01469d70 <0000156a> 0000153c 0000000b
0146c0bc 0181e000
0146fee0: 0146c0bc 0145f2e8 014eeffc 00000000 00384007 00000000 0146ff24
<ffa00858>
0146ff00: 00000000 ffffe000 014eeff7 014eeff7 029d3c60 00178fe8 0000003a
014eeffc
0146ff20: 014eeff7 01402286 00008000 00062000 00000000 01470000 01402286
01402286
0146ff40:<01414e56><ffa00f5c> 02002000 01413035 0140d285
0141302e 0140d282 00000000
0146ff60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
0146ff80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
0146ffa0: 00000000 00000000 00000000 0146c0bc 0146c034 01469d64 01469d70
01469fda
0146ffc0: 0146c0fc 0146c0bc 01460410 014eeffc 0000000b 00000005 01460410
014eeff7
0146ffe0: 014eeffc 0000003a 0145f2e8 0146c0bc 014eeff7 014eeff7 0000000b
00000006
01470000: 544c4662
Return addresses in stack:
frame 1 : <0x0003616a> { __etext_l2 + 0x3616a }
address : <0x00036196> { __etext_l2 + 0x36196 }
address : <0x0003e218> { __etext_l2 + 0x3e218 }
address : <0x0003e022> { __etext_l2 + 0x3e022 }
address : <0x0003ea02> { __etext_l2 + 0x3ea02 }
address : <0x00046b5e> { __etext_l2 + 0x46b5e }
address : <0x000693d4> { __etext_l2 + 0x693d4 }
address : <0x00069dc4> { __etext_l2 + 0x69dc4 }
address : <0x000462be> { __etext_l2 + 0x462be }
address : <0x000460f4> { __etext_l2 + 0x460f4 }
address : <0x00046e18> { __etext_l2 + 0x46e18 }
address : <0x00049144> { __etext_l2 + 0x49144 }
address : <0x0000156a> { __etext_l2 + 0x156a }
address : <0xffa00858> { ___initramfs_end + 0xfe284ba4 }
address : <0x01414e56> [ sh + 0x14e56 ]
address : <0xffa00f5c> { ___initramfs_end + 0xfe2852a8 }
Mem-Info:
DMA per-cpu:
CPU 0: hi: 0, btch: 1 usd: 0
Active_anon:0 active_file:0 inactive_anon:0
inactive_file:4 unevictable:6408 dirty:0 writeback:0 unstable:0
free:6425 slab:536 mapped:0 pagetables:0 bounce:0
DMA free:25700kB min:4096kB low:5120kB high:6144kB active_anon:0kB
inactive_anon:0kB active_file:0kB inactive_file:16kB unevictable:25632kB
present:56892ko
lowmem_reserve[]: 0 0 0
DMA: 9*4kB 2*8kB 27*16kB 60*32kB 44*64kB 52*128kB 52*256kB 1*512kB 0*1024kB
0*2048kB 0*4096kB 0*8192kB 0*16384kB 0*32768kB = 25700kB
6414 total pagecache pages
14335 pages RAM
534 pages reserved
5905 pages shared
1450 pages non-shared
Allocation of length 434176 from process 1646 (ls) failed
DMA per-cpu:
CPU 0: hi: 0, btch: 1 usd: 0
Active_anon:0 active_file:0 inactive_anon:0
inactive_file:4 unevictable:6408 dirty:0 writeback:0 unstable:0
free:6425 slab:536 mapped:0 pagetables:0 bounce:0
DMA free:25700kB min:4096kB low:5120kB high:6144kB active_anon:0kB
inactive_anon:0kB active_file:0kB inactive_file:16kB unevictable:25632kB
present:56892ko
lowmem_reserve[]: 0 0 0
DMA: 9*4kB 2*8kB 27*16kB 60*32kB 44*64kB 52*128kB 52*256kB 1*512kB 0*1024kB
0*2048kB 0*4096kB 0*8192kB 0*16384kB 0*32768kB = 25700kB
6414 total pagecache pages
Unable to allocate RAM for process text/data, errno 12
ls: page allocation failure. order:7, mode:0xd0
Hardware Trace:
0 Target : <0x00004be4> { __etext_l2 + 0x4be4 }
Source : <0x00036192> { __etext_l2 + 0x36192 } CALL pcrel
1 Target : <0x00036192> { __etext_l2 + 0x36192 }
Source : <0x000113ce> { __etext_l2 + 0x113ce } RTS
2 Target : <0x000113ca> { __etext_l2 + 0x113ca }
Source : <0x00011260> { __etext_l2 + 0x11260 } RTS
3 Target : <0x00011254> { __etext_l2 + 0x11254 }
Source : <0xffa00c02> { ___initramfs_end + 0xfe284f4e } RTI
4 Target : <0xffa00ba0> { ___initramfs_end + 0xfe284eec }
Source : <0xffa009e4> { ___initramfs_end + 0xfe284d30 } RTS
5 Target : <0xffa009e4> { ___initramfs_end + 0xfe284d30 }
Source : <0xffa009ba> { ___initramfs_end + 0xfe284d06 } IF !CC JUMP
6 Target : <0xffa0098c> { ___initramfs_end + 0xfe284cd8 }
Source : <0xffa00b9c> { ___initramfs_end + 0xfe284ee8 } CALL pcrel
7 Target : <0xffa00b9a> { ___initramfs_end + 0xfe284ee6 }
Source : <0xffa0032e> { ___initramfs_end + 0xfe28467a } RTS
8 Target : <0xffa00326> { ___initramfs_end + 0xfe284672 }
Source : <0x00014822> { __etext_l2 + 0x14822 } RTS
9 Target : <0x000147e8> { __etext_l2 + 0x147e8 }
Source : <0x00014a52> { __etext_l2 + 0x14a52 } JUMP.L
10 Target : <0x00014a4a> { __etext_l2 + 0x14a4a }
Source : <0x00014a3e> { __etext_l2 + 0x14a3e } IF !CC JUMP
11 Target : <0x00014a32> { __etext_l2 + 0x14a32 }
Source : <0x00030974> { __etext_l2 + 0x30974 } RTS
12 Target : <0x00030968> { __etext_l2 + 0x30968 }
Source : <0x00014a2e> { __etext_l2 + 0x14a2e } CALL pcrel
13 Target : <0x00014a24> { __etext_l2 + 0x14a24 }
Source : <0x00030dd0> { __etext_l2 + 0x30dd0 } RTS
14 Target : <0x00030dcc> { __etext_l2 + 0x30dcc }
Source : <0x00030d88> { __etext_l2 + 0x30d88 } RTS
15 Target : <0x00030d82> { __etext_l2 + 0x30d82 }
Source : <0x00030d64> { __etext_l2 + 0x30d64 } IF !CC JUMP
Stack info:
SP: [0x0146fc88] <0x0146fc88> /* kernel dynamic memory */
FP: (0x0146fc84)
Memory from 0x0146fc80 to 01470000
0146fc80: 0146fc88 (00000000)[0003616a]<00036196> 03790380 00000000
000200d0 03790560
0146fca0: 00000007 000000d0 00000001 00000048 0146e000 0146e000 00000000
000200d0
0146fcc0: 0146e000 00000010 00000000 00000000 00000000 00000000 017791b4
<0003e218>
0146fce0: 0006a000 00000000 0177a124 00000007 00000000 017791b4 00000002
000019e0
0146fd00: 0147e200 <0003e022> 00000000 <0000f304> 0006a000
0006a000 <0003ea02> 001715d4
0146fd20: 00000000 00000000 00000077 00000000 017791b4 00000002 00000000
<00046b5e>
0146fd40: 0006a000 00000004 00000002 00000000 0146fd5c 0000ffff 0177a124
00000004
0146fd60: 0000274f <000693d4> 036fcc00 0004bac0 00000004 0146e000
0005f570 00000005
0146fd80: 0006a000 00000000 00000001 00000000 00000007 00000002 00000000
00000000
0146fda0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00013ab0
0146fdc0: 000019e0 00003ee9 00000001 000692b0 00000000 00000000 00000000
00000000
0146fde0: 00000000 00009d3c 00000000 00000000 00000000 00000000 00000000
0146fe58
0146fe00:<00069dc4> 036fcc00 036fcc00 0017db18 fffffff8 00000000
0000003f 0146ff24
0146fe20: 01000000 0146fe34 00000000 0146fe54 0146fe50 00000000 00000000
00000000
0146fe40: 00000000 00000000 00000000 00000000 00000000 00003ee9 ffffffc0
<000462be>
0146fe60: 0017df20 036fcc00 0017db18 fffffff8 00000000 0000003f 0146ff24
000001d4
0146fe80:<000460f4> 01795d60 00000000 0146e000 0146e000 000001d4
<00046e18> 036fcc00
0146fea0: 0145f2e8 0146c0bc 00000000 0146e000 0181e000 00000001 00178fe8
<00049144>
0146fec0: 00171a6c 00000000 01469d70 <0000156a> 0000153c 0000000b
0146c0bc 0181e000
0146fee0: 0146c0bc 0145f2e8 014eeffc <ffa01bd2> 0146e000 0000000b
0146ff24 <ffa00858>
0146ff00: 00000000 ffffe000 014eeff6 014eeff6 00000004 ffffe000 0000003a
014eeffc
0146ff20: 014eeff6 01402286 00008000 00062000 00000000 01470000 01402286
01402286
0146ff40:<01414e56><ffa00f5c> 02002000 01413035 0140d285
0141302e 0140d282 00000000
0146ff60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
0146ff80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
0146ffa0: 00000000 00000000 00000000 0146c0bc 01469fdb 01469d64 01469d70
01469fe9
0146ffc0: 0146c0fc 0146c0bc 01460410 014eeffc 0000000b 00000006 01460410
014eeff6
0146ffe0: 014eeffc 0000003a 0145f2e8 0146c0bc 014eeff6 014eeff6 0000000b
00000006
01470000: 544c4662
Return addresses in stack:
frame 1 : <0x0003616a> { __etext_l2 + 0x3616a }
address : <0x00036196> { __etext_l2 + 0x36196 }
address : <0x0003e218> { __etext_l2 + 0x3e218 }
address : <0x0003e022> { __etext_l2 + 0x3e022 }
address : <0x0000f304> { __etext_l2 + 0xf304 }
address : <0x0003ea02> { __etext_l2 + 0x3ea02 }
address : <0x00046b5e> { __etext_l2 + 0x46b5e }
address : <0x000693d4> { __etext_l2 + 0x693d4 }
address : <0x00069dc4> { __etext_l2 + 0x69dc4 }
address : <0x000462be> { __etext_l2 + 0x462be }
address : <0x000460f4> { __etext_l2 + 0x460f4 }
address : <0x00046e18> { __etext_l2 + 0x46e18 }
address : <0x00049144> { __etext_l2 + 0x49144 }
address : <0x0000156a> { __etext_l2 + 0x156a }
address : <0xffa01bd2> { ___initramfs_end + 0xfe285f1e }
address : <0xffa00858> { ___initramfs_end + 0xfe284ba4 }
address : <0x01414e56> [ sh + 0x14e56 ]
address : <0xffa00f5c> { ___initramfs_end + 0xfe2852a8 }
Mem-Info:
DMA per-cpu:
CPU 0: hi: 0, btch: 1 usd: 0
Active_anon:0 active_file:0 inactive_anon:0
inactive_file:6 unevictable:6408 dirty:0 writeback:0 unstable:0
free:6423 slab:537 mapped:0 pagetables:0 bounce:0
DMA free:25692kB min:4096kB low:5120kB high:6144kB active_anon:0kB
inactive_anon:0kB active_file:0kB inactive_file:24kB unevictable:25632kB
present:56892ko
lowmem_reserve[]: 0 0 0
DMA: 7*4kB 2*8kB 27*16kB 60*32kB 44*64kB 52*128kB 52*256kB 1*512kB 0*1024kB
0*2048kB 0*4096kB 0*8192kB 0*16384kB 0*32768kB = 25692kB
6415 total pagecache pages
14335 pages RAM
534 pages reserved
5904 pages shared
1453 pages non-shared
Allocation of length 434176 from process 1646 (ls) failed
DMA per-cpu:
CPU 0: hi: 0, btch: 1 usd: 0
Active_anon:0 active_file:0 inactive_anon:0
inactive_file:6 unevictable:6408 dirty:0 writeback:0 unstable:0
free:6423 slab:537 mapped:0 pagetables:0 bounce:0
DMA free:25692kB min:4096kB low:5120kB high:6144kB active_anon:0kB
inactive_anon:0kB active_file:0kB inactive_file:24kB unevictable:25632kB
present:56892ko
lowmem_reserve[]: 0 0 0
DMA: 7*4kB 2*8kB 27*16kB 60*32kB 44*64kB 52*128kB 52*256kB 1*512kB 0*1024kB
0*2048kB 0*4096kB 0*8192kB 0*16384kB 0*32768kB = 25692kB
6415 total pagecache pages
Unable to allocate RAM for process text/data, errno 12
Deferred Exception context
CURRENT PROCESS:
COMM=ls PID=1646
CPU = 0
TEXT = 0x(null)-0x(null) DATA = 0x(null)-0x(null)
BSS = 0x(null)-0x(null) USER-STACK = 0x(null)
return address: [0x0145f2a0]; contents of:
0x0145f280: c1bc 0146 0000 0000 0000 0000 0000 0000
0x0145f290: 0000 0000 0000 0000 0000 0000 0000 0000
0x0145f2a0: [0018] 0000 f2bc 0145 9fc6 0146 000a 0000
0x0145f2b0: 0001 0000 0000 0000 0018 0000 e4c4 0175
ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)
Linux version 2.6.30-ADI-2010R1-pre-svn6645 (test@my-local-machine) (gcc
version 4.1.2 (ADI svn)) #78 Wed Sep 9 18:32:40 CST 2009
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062021 IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x21
interrupts disabled
physical IVG5 asserted : <0xffa00c04> { ___initramfs_end + 0xfe284f50
}
RETE: <0x(null)> /* Maybe null pointer? */
RETN: <0x01470000> [ inetd + 0x0 ]
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x0145f284> [ sh + 0x5f284 ]
PC : <0x0145f2a0> [ sh + 0x5f2a0 ]
DCPLB_FAULT_ADDR: <0x01469dac> [ sh + 0x69dac ]
ICPLB_FAULT_ADDR: <0x0145f2a0> [ sh + 0x5f2a0 ]
PROCESSOR STATE:
R0 : ffffffff R1 : 00000008 R2 : 0145f2e8 R3 : 80000000
R4 : 00000000 R5 : 00000000 R6 : 0146c0fc R7 : 0146c0bc
P0 : 0000000b P1 : 014eeffc P2 : 014604f8 P3 : 000000c8
P4 : 0146c0b8 P5 : 0146c050 FP : 01413276 SP : 0146ff24
LB0: 0140d285 LT0: 0140d282 LC0: 00000000
LB1: 01413035 LT1: 0141302e LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 01469fea
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 0146c0bc
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 01469db0 ASTAT: 02003004
Hardware Trace:
0 Target : <0x00004d6c> { __etext_l2 + 0x4d6c }
Source : <0xffa0064a> { ___initramfs_end + 0xfe284996 } CALL pcrel
1 Target : <0xffa005ac> { ___initramfs_end + 0xfe2848f8 }
Source : <0xffa0048c> { ___initramfs_end + 0xfe2847d8 } RTX
2 Target : <0xffa0046c> { ___initramfs_end + 0xfe2847b8 }
Source : <0xffa00502> { ___initramfs_end + 0xfe28484e } JUMP.S
3 Target : <0xffa004bc> { ___initramfs_end + 0xfe284808 }
Source : <0xffa00722> { ___initramfs_end + 0xfe284a6e } JUMP (P4)
4 Target : <0xffa006dc> { ___initramfs_end + 0xfe284a28 }
Source : <0xffa006d8> { ___initramfs_end + 0xfe284a24 } IF !CC JUMP
5 Target : <0xffa006bc> { ___initramfs_end + 0xfe284a08 }
Source : <0x0145f29e> [ sh + 0x5f29e ] 0x0000
6 Target : <0x0145f284> [ sh + 0x5f284 ]
Source : <0x01414d36> [ sh + 0x14d36 ] RTS
7 Target : <0x01414d2e> [ sh + 0x14d2e ]
Source : <0x01414e6a> [ sh + 0x14e6a ] IF !CC JUMP
8 Target : <0x01414e68> [ sh + 0x14e68 ]
Source : <0x01414e2c> [ sh + 0x14e2c ] IF !CC JUMP
9 Target : <0x01414e28> [ sh + 0x14e28 ]
Source : <0x01414e66> [ sh + 0x14e66 ] JUMP.S
10 Target : <0x01414e5a> [ sh + 0x14e5a ]
Source : <0x01403fbc> [ sh + 0x3fbc ] RTS
11 Target : <0x01403fac> [ sh + 0x3fac ]
Source : <0x01414e56> [ sh + 0x14e56 ] CALL pcrel
12 Target : <0x01414e56> [ sh + 0x14e56 ]
Source : <0x01402298> [ sh + 0x2298 ] RTS
13 Target : <0x01402292> [ sh + 0x2292 ]
Source : <0x014022a6> [ sh + 0x22a6 ] JUMP.S
14 Target : <0x0140229e> [ sh + 0x229e ]
Source : <0x01403fbc> [ sh + 0x3fbc ] RTS
15 Target : <0x01403fac> [ sh + 0x3fac ]
Source : <0x0140229a> [ sh + 0x229a ] CALL pcrel
Userspace Stack
Stack info:
SP: [0x01469db0] <0x01469db0> [ sh + 0x69db0 ]
FP: (0x01469dac)
Memory from 0x01469db0 to 0146a000
01469db0:[01426a10] 0146c1cc 0146c050 01458654 0146c0fc 0146c0fc 00000000
<01426a10>
01469dd0: 00000000 01469df0 <014030e0> 00000000 0175e004 00000001
00000000 00000000
01469df0: 014604f8 <01424b6a> 00000000 00000000 00000000 00000000
00000000 00000000
01469e10:<01424cc2> 00000000 0145f350 0175e004 00000000 00000000
00000000 <01426c9e>
01469e30: 00000000 0145f350 <01426d12> 00000000 00000000 0145f350
00000000 00000000
01469e50: 00000000 00000000 00000000 00000001 01469f64 <01426dec>
0175e004 01469fa8
01469e70: 0145f2bc 0145f350 0000003b 01469eb0 00000001 00000000 0145f194
0000003b
01469e90:<01426e16> 0175e004 01469eb0 00000001 00000001
<0140b096> 0175e004 000000ff
01469eb0: 0175e193 00000000 00000001 00000001 0145f154 0142712c 0142455c
<01427814>
01469ed0: 000000ff 0144e7a0 014556cf 01469ed8 0175e004 <0141a81e>
01460558 01469fa8
01469ef0: 00000050 <0144e912> 000001c2 00000001 01469fa8 00000001
<0141a83c> 01469fa8
01469f10: 01469fc3 01469fa8 00000000 01460410 0144ba94 01469fbe 01460410
<0140db2c>
01469f30:<0141a9a0> 01460630 01469fa8 00000000 0144bac4 0144bac4
01469f64 <01415abc>
01469f50: 0144bac4 0145f4dc 00000000 00000000 00000000 00000000
<01740ab8> 0144bac4
01469f70: 01758020 01758024 00000000 0015c213 ffffffff 00000000 0141a938
00000000
01469f90: 00000000 0144ba94 0144baa6 00000000 017462e9 00000001 01469fbd
00000000
01469fb0: 01469fc6 01469fd1 00000000 622f2d00 732f6e69 45540068 6c3d4d52
78756e69
01469fd0: 54415000 622f3d48 2f3a6e69 2f727375 3a6e6962 6962732f 752f3a6e
732f7273
01469ff0: 006e6962 6e69622f 0068732f 00000000 0a313531
Return addresses in stack:
address : <0x01426a10> [ sh + 0x26a10 ]
address : <0x01426a10> [ sh + 0x26a10 ]
address : <0x014030e0> [ sh + 0x30e0 ]
address : <0x01424b6a> [ sh + 0x24b6a ]
address : <0x01424cc2> [ sh + 0x24cc2 ]
address : <0x01426c9e> [ sh + 0x26c9e ]
address : <0x01426d12> [ sh + 0x26d12 ]
address : <0x01426dec> [ sh + 0x26dec ]
address : <0x01426e16> [ sh + 0x26e16 ]
address : <0x0140b096> [ sh + 0xb096 ]
address : <0x01427814> [ sh + 0x27814 ]
address : <0x0141a81e> [ sh + 0x1a81e ]
address : <0x0144e912> [ sh + 0x4e912 ]
address : <0x0141a83c> [ sh + 0x1a83c ]
address : <0x0140db2c> [ sh + 0xdb2c ]
address : <0x0141a9a0> [ sh + 0x1a9a0 ]
address : <0x01415abc> [ sh + 0x15abc ]
address : <0x01740ab8> [ init + 0xab8 ]
ILL
root:/>
And this issue may be related to the binary format. If I build the kernel into
fdpic format, it could finish the libstdc++ testing in hardware-flat even in
trunk head kernel.
--- Mingquan Pan 2009-10-26 03:13:02
It looks using the trunk head kernel to test 4.3 toolchain still fails with
kernel panic taking place in the middle of testing.
--- Graf Yang 2009-12-08 08:10:46
There are more memory fragments since kernel 2.6.30 (commit 6645 on kernel
trunk). This caused busybox fail to execute and maybe panic because of stack
destroyed.
The fastest way to reproduce it is to testing the libstdc++(cd
toolchain/buildscript-experimental; ./toolchain-regtest -s /opt/bfin/toolchain
-o /opt/uClinux/bfin -b /tmp/ -t uclinux -T 10.100.4.37 -a -L libstdc++),
continues memory allocation fail(executing the shell, or rm) will occur in 10
minutes.
The 2.6.28.10 kernel have not this issue.
--- Robin Getz 2009-12-08 20:40:01
So -- is the 2.6.30 kernel fragmenting memory? or not re-combining things as
agressively as the 2.6.28 kernel did?
Either could be the problem - and it might help to figure out what is causing
the failures if we know which was the actual issue...
--- Graf Yang 2009-12-08 22:00:57
In my testing, only the kernel is different, one is svn 6644, other is svn
6645.
I'm focusing on the mm/page_alloc.c and trying to find out the fragment reason.
--- Robin Getz 2009-12-08 22:15:22
I understand that.
The question I asked was - is the difference the fragmentation, or the
difference is the re-combining.
Both could fragment the same during run time, but if 2.6.28 was more aggressive
on re-combining small pages into large pages - then eventually 2.6.30 will fail.
(even though the problem isn't with fragmentation - it is with putting things
back together)....
--- Graf Yang 2009-12-09 02:33:01
How to estimate the allocation fragmentation or re-combining fragmentation?
It's an accumulated result after hundreds of allocation/freeing.
I saw there are more freelists with little order in the kernel 2.6.30 than that
in the kernel 2.6.28 after it ran toolchain testing the same time long.
I suspected that the fragment is caused by other portion of kernel, instead of
page_alloc.c, because there are not modifications that changed the page
allocation rule between svn6644:6645 to my thinking.
Grace,
as a temporary workaround, you can configure the kernel to use SLOB, or trying
the following patch,
Index: mm/page_alloc.c
===================================================================
--- mm/page_alloc.c (revision 7955)
+++ mm/page_alloc.c (working copy)
@@ -2777,9 +2777,16 @@
* made on memory-hotadd so a system can start with mobility
* disabled and enable it later
*/
+#if 0
+ /*
+ * Force enable the page grouping.
+ * It is a temporary workaround for
+ * avoiding kernel panic in toolchain regtest.
+ */
if (vm_total_pages < (pageblock_nr_pages * MIGRATE_TYPES))
page_group_by_mobility_disabled = 1;
else
+#endif
page_group_by_mobility_disabled = 0;
printk("Built %i zonelists in %s order, mobility grouping %s. "
--- Graf Yang 2009-12-10 23:11:26
The fragment is caused by the default trim behavior of do_mmap_private().
We can turn off it for the testing cases that kernel will run a long time and
need to execute thousands of programs.
Method A.
Linux Kernel Configuration -->
Blackfin Processor Options -->
(0)Turn on mmap() excess space trimming before booting
Method B.
root:/> echo 0 > /proc/sys/vm/nr_trim_pages
root:/> cat /proc/sys/vm/nr_trim_pages
0
--- Mingquan Pan 2009-12-18 05:03:34
Yes, by disabling this item, now the trunk head toolchain can finish testing by
running on trunk kernel. Close.
--- Mingquan Pan 2010-01-25 01:26:32
This issue still frequently shows up now on trunk head kernel in current
toolchain testing at libmudflap.
*** Testing linux-uclibc on hw Sat Jan 23 03:14:36 GMT
2010
GCC version 4.1.2
GCC /home/test/work/cruise/temp/bfin-linux-uclibc/bin
*** Checking shared libraries on target Sat Jan 23 03:14:36 GMT
2010
Binutils version 2.17
Binutils path /home/test/work/cruise/temp/bfin-linux-uclibc/bin
*** Running tests on binutils Sat Jan 23 03:14:39 GMT
2010
*** Running tests on gas Sat Jan 23 03:14:45 GMT
2010
*** Running tests on ld Sat Jan 23 03:15:05 GMT
2010
GDB version 6.6
GDB path /home/test/work/cruise/temp/bfin-linux-uclibc/bin
*** Running tests on gdb Sat Jan 23 03:15:17 GMT
2010
*** Running tests on gcc Sat Jan 23 03:26:14 GMT
2010
*** Running tests on g++ Sat Jan 23 04:15:06 GMT
2010
*** Running tests on gfortran Sat Jan 23 04:28:08 GMT
2010
*** Running tests on libstdc++ Sat Jan 23 04:56:16 GMT
2010
*** Running tests on libmudflap Sat Jan 23 05:20:09 GMT
2010
*** I think the board or network died during testing - sorry
*** Kill the current testing
./toolchain-regtest: line 1024: 28301 Done ( echo $RUN
$LOGFILE )
28302 Terminated | sh
poll: protocol failure in circuit setup
poll: protocol failure in circuit setup
*** Running tests on libgomp Sat Jan 23 05:24:19 GMT
2010
No testsuite for libgomp 4.1.2
poll: protocol failure in circuit setup
*** Legacify result names Sat Jan 23 05:25:21 GMT
2010
*** Done testing - results Sat Jan 23 05:25:21 GMT
2010
...
NULL pointer access
Deferred Exception context
CURRENT PROCESS:
COMM=inetd PID=20302 CPU=0
TEXT = 0x02800040-0x02805b40 DATA = 0x02805b44-0x02807008
BSS = 0x02807008-0x02807704 USER-STACK = 0x02808f9c
return address: [0x02808dcc]; contents of:
0x02808da0: 8dcc 0280 8dd8 0280 06c8 0280 0001 0000
0x02808db0: 0007 0000 8ddc 0280 0000 0000 8dc4 0280
0x02808dc0: 6e38 0280 0000 0000 84da 01f1 [8f30] 0280
0x02808dd0: 0ae4 0280 0000 0000 0001 0000 001f 0000
ADSP-BF561-0.5 600(MHz CCLK) 100(MHz SCLK) (mpu off)
Linux version 2.6.32.4-ADI-2010R1-pre-svn8220 (test@43-bf561-toolchain) (gcc
version 4.1.2 (ADI svn)) #10 Fri Jan 22 23:07:54 GMT 2010
SEQUENCER STATUS: Tainted: G W
SEQSTAT: 00060027 IPEND: 0008 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x27
physical IVG3 asserted : <0xffa0074c> { _trap + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x02702000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x02808dcc> [ inetd + 0x8dcc ]
PC : <0x02808dcc> [ inetd + 0x8dcc ]
DCPLB_FAULT_ADDR: <0x00000134> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x02808dcc> [ inetd + 0x8dcc ]
PROCESSOR STATE:
R0 : ffffffff R1 : 02808e84 R2 : 02808e04 R3 : 00000000
R4 : 028006c8 R5 : 02808dd8 R6 : 00000000 R7 : 0000001f
P0 : 00000134 P1 : 00000000 P2 : 028076d8 P3 : 02808f04
P4 : 02808e04 P5 : 02808e84 FP : 02808f04 SP : 02701f24
LB0: 02802571 LT0: 0280256e LC0: 00000000
LB1: 02800a63 LT1: 02800a62 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 0280708b
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 02808f04
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 02808dac ASTAT: 02000000
Hardware Trace:
0 Target : <0x00004e24> { _trap_c + 0x0 }
Source : <0xffa006de> { _exception_to_level5 + 0x9a } CALL pcrel
1 Target : <0xffa00644> { _exception_to_level5 + 0x0 }
Source : <0xffa00500> { _bfin_return_from_exception + 0x18 } RTX
2 Target : <0xffa004e8> { _bfin_return_from_exception + 0x0 }
Source : <0xffa005a4> { _ex_trap_c + 0x74 } JUMP.S
3 Target : <0xffa00530> { _ex_trap_c + 0x0 }
Source : <0xffa007b2> { _trap + 0x66 } JUMP (P4)
4 Target : <0xffa0076a> { _trap + 0x1e }
Source : <0xffa00766> { _trap + 0x1a } IF !CC JUMP
5 Target : <0xffa0074c> { _trap + 0x0 }
Source : <0x02801054> [ inetd + 0x1014 ] RTS
6 Target : <0x02801042> [ inetd + 0x1002 ]
Source : <0x02801144> [ inetd + 0x1104 ] RTS
7 Target : <0x02801134> [ inetd + 0x10f4 ]
Source : <0x0280103e> [ inetd + 0xffe ] CALL pcrel
8 Target : <0x02801034> [ inetd + 0xff4 ]
Source : <0xffa00c98> { __common_int_entry + 0xd8 } RTI
9 Target : <0xffa00c36> { __common_int_entry + 0x76 }
Source : <0xffa00e80> { _evt_system_call + 0x64 } JUMP.S
10 Target : <0xffa00e80> { _evt_system_call + 0x64 }
Source : <0xffa0093c> { _system_call + 0xbc } RTS
11 Target : <0xffa00938> { _system_call + 0xb8 }
Source : <0xffa00928> { _system_call + 0xa8 } IF !CC JUMP
12 Target : <0xffa0091e> { _system_call + 0x9e }
Source : <0xffa0090e> { _system_call + 0x8e } IF !CC JUMP
13 Target : <0xffa008e8> { _system_call + 0x68 }
Source : <0xffa00118> { _sys_rt_sigreturn + 0x10 } RTS
14 Target : <0xffa00114> { _sys_rt_sigreturn + 0xc }
Source : <0x0000333c> { _do_rt_sigreturn + 0x48 } RTS
15 Target : <0x00003330> { _do_rt_sigreturn + 0x3c }
Source : <0x000039f8> { _do_rt_sigreturn + 0x704 } JUMP.S
Userspace Stack
Stack info:
SP: [0x02808dac] <0x02808dac> [ inetd + 0x8dac ]
FP: (0x02808dcc)
Memory from 0x02808da0 to 02809000
02808da0: 02808dcc 02808dd8 <028006c8>[00000001] 00000007 02808ddc
00000000 02808dc4
02808dc0: 02806e38 00000000 01f184da (02808f30)<02800ae4> 00000000
00000001 0000001f
02808de0: 00000001 00000006 00000004 026f814c 00000007 00000000 00000000
02808f24
02808e00: 02808f04 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02808e20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02808e40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02808e60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02808e80: 00000000 00000070 00000000 00000000 00000000 00000000 00000000
00000000
02808ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02808ec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02808ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02808f00: 00000000 fd030002 ae04640a 00000000 00000000 17000002 00000000
00000000
02808f20: 00000000 00000001 00000000 00000010 (02808f60)<02803a66>
00000000 02808fa0
02808f40: 02805b18 00000000 00000001 <028008bc> 00000000 00000000
00000000 00000000
02808f60:(00000000)<026a0aa4> 02805b44 026b79c0 026b79c4 00000000
45986d79 ffffffff
02808f80: 00000000 00000000 00000000 02805b18 02805b2a 00000000 0267bbc2
00000001
02808fa0: 02808fb4 00000000 <02808fc0> 02808fcd 00000000 6962732f
6e692f6e 00647465
02808fc0: 4d524554 6b6e753d 6e776f6e 54415000 622f3d48 2f3a6e69 2f727375
3a6e6962
02808fe0: 6962732f 752f3a6e 732f7273 006e6962 6962732f 6e692f6e 00647465
00000000
Return addresses in stack:
address : <0x028006c8> [ inetd + 0x688 ]
frame 1 : <0x02800ae4> [ inetd + 0xaa4 ]
frame 2 : <0x02803a66> [ inetd + 0x3a26 ]
address : <0x028008bc> [ inetd + 0x87c ]
frame 3 : <0x026a0aa4> /* kernel dynamic memory */
address : <0x02808fc0> [ inetd + 0x8fc0 ]
rshd: page allocation failure. order:5, mode:0xd0
Hardware Trace:
0 Target : <0x00004d80> { _dump_stack + 0x0 }
Source : <0x00032c1a> { ___alloc_pages_nodemask + 0x33a } CALL
pcrel
1 Target : <0x00032c1a> { ___alloc_pages_nodemask + 0x33a }
Source : <0x0000f2aa> { _printk + 0x16 } RTS
2 Target : <0x0000f2a6> { _printk + 0x12 }
Source : <0x0000f0ea> { _vprintk + 0x132 } RTS
3 Target : <0x0000f0de> { _vprintk + 0x126 }
Source : <0xffa00c98> { __common_int_entry + 0xd8 } RTI
4 Target : <0xffa00c36> { __common_int_entry + 0x76 }
Source : <0xffa00a78> { _return_from_int + 0x58 } RTS
5 Target : <0xffa00a78> { _return_from_int + 0x58 }
Source : <0xffa00a4e> { _return_from_int + 0x2e } IF !CC JUMP
6 Target : <0xffa00a20> { _return_from_int + 0x0 }
Source : <0xffa00c32> { __common_int_entry + 0x72 } CALL pcrel
7 Target : <0xffa00c30> { __common_int_entry + 0x70 }
Source : <0xffa003c6> { _asm_do_IRQ + 0x42 } RTS
8 Target : <0xffa003be> { _asm_do_IRQ + 0x3a }
Source : <0x000126ee> { __local_bh_enable + 0x3a } RTS
9 Target : <0x000126b4> { __local_bh_enable + 0x0 }
Source : <0x00012a1c> { ___do_softirq + 0xb4 } JUMP.L
10 Target : <0x00012a14> { ___do_softirq + 0xac }
Source : <0x00012a08> { ___do_softirq + 0xa0 } IF !CC JUMP
11 Target : <0x000129f2> { ___do_softirq + 0x8a }
Source : <0x0002d516> { _rcu_bh_qs + 0x12 } RTS
12 Target : <0x0002d504> { _rcu_bh_qs + 0x0 }
Source : <0x000129ee> { ___do_softirq + 0x86 } CALL pcrel
13 Target : <0x000129e6> { ___do_softirq + 0x7e }
Source : <0x0002de48> { _rcu_process_callbacks + 0x30 } RTS
14 Target : <0x0002de44> { _rcu_process_callbacks + 0x2c }
Source : <0x0002dd38> { _rcu_do_batch + 0xec } RTS
15 Target : <0x0002dd32> { _rcu_do_batch + 0xe6 }
Source : <0x0002dc5e> { _rcu_do_batch + 0x12 } IF !CC JUMP
Stack info:
SP: [0x02705c8c] <0x02705c8c> /* kernel dynamic memory */
FP: (0x02705c84)
Memory from 0x02705c80 to 02706000
02705c80: 00000001 (02705c8c)<00032c8e>[00000000]<00032c1e>
00000000 00000000 000200d0
02705ca0: 02045b08 00000005 000000d0 00000001 00000042 00161b34 00000000
001625b8
02705cc0: 00000000 000200d0 00000000 00161b34 00000040 02045920 00000000
00000000
02705ce0: 00000000 00000000 00000000 00161b34 03af5f00 <0003ad48>
0014f7e8 00014000
02705d00: 0054917c 00000005 03af5f00 00000077 00000000 00014000 00000002
03af5f00
02705d20: 00000000 00000000 00000002 00000002 <0003b4c0> 0014f7e8
00000000 00014000
02705d40: 00000007 03af5f00 00000077 00000000 <000432f2> 02045920
00014000 00000004
02705d60: 00000002 00000000 02705d74 03af5f00 0054917c 00000004 00000004
<0006664e>
02705d80: 03545c00 0000aa80 0000067e 02704000 0000d184 00000005 00014000
00000000
02705da0: 00000000 0000071f 00000007 00000002 00000000 00000000 00000000
00000000
02705dc0: 00000000 00000000 00000000 00000000 00000000 00000000 00002704
0000094c
02705de0: 000060bc 00000001 00013b90 00000000 00000000 00000000 00000000
00000000
02705e00: 000019f8 00000000 00000000 00000000 02705e6c <00067010>
03545c00 03545c00
02705e20: 0015c584 fffffff8 00000000 02705f24 02705f24 01000000 02705e48
00000000
02705e40: 02705e68 02705e64 00000000 00000000 00000000 00000000 00000000
00000000
02705e60: 00000000 00000000 000060bc 02808d74 <00042912> 0015c988
03545c00 0015c584
02705e80: fffffff8 00000000 02705f24 00000000 0001f000 02705f24 02808d74
<0004369c>
02705ea0: 03545c00 0280721c 026f8178 00000000 03b0c000 00000001 02704000
<000457ac>
02705ec0: 0014fc8c 0000000b 00000000 <0000160a> 000015e0 0000000b
026f8178 03b0c000
02705ee0: 026f8178 0280721c 00000004 00220f40 ffffe000 0000003f 02705f24
<ffa008e8>
02705f00: 00000000 ffffe000 00000006 026f81cd 03b52b40 001568a0 c0000000
00000004
02705f20: 00000006 02803a76 00008000 00060000 00000000 02706000 02803a76
02803a76
02705f40:<02803730><ffa00e80> 02001004 02800b29 02802571
02800b20 0280256e 00000007
02705f60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02705f80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
02705fa0: 00000000 00000000 00000000 02808f04 0280708b 02808d68 02808d74
02808f04
02705fc0: 026f81cd 026f8178 028076c4 0280721c 0000000b 00000400 00000400
00000006
02705fe0: 00000004 c0000000 0280721c 026f8178 026f81cd 026f81cd 0000000b
00000006
Return addresses in stack:
frame 1 : <0x00032c8e> { ___alloc_pages_nodemask + 0x3ae }
frame 2 : <0x00032c1e> { ___alloc_pages_nodemask + 0x33e }
address : <0x0003ad48> { _do_mmap_private + 0x4c }
address : <0x0003b4c0> { _do_mmap_pgoff + 0x168 }
address : <0x000432f2> { _flush_old_exec + 0x12a }
address : <0x0006664e> { _load_flat_file + 0x1a6 }
address : <0x00067010> { _load_flat_binary + 0x54 }
address : <0x00042912> { _search_binary_handler + 0x6a }
address : <0x0004369c> { _do_execve + 0x1a0 }
address : <0x000457ac> { _getname + 0x28 }
address : <0x0000160a> { _sys_execve + 0x2a }
address : <0xffa008e8> { _system_call + 0x68 }
address : <0x02803730> /* kernel dynamic memory */
address : <0xffa00e80> { _evt_system_call + 0x64 }
Mem-Info:
DMA per-cpu:
CPU 0: hi: 0, btch: 1 usd: 0
active_anon:0 inactive_anon:0 isolated_anon:0
active_file:121 inactive_file:364 isolated_file:0
unevictable:2694 dirty:0 writeback:0 unstable:0
free:1030 slab_reclaimable:206 slab_unreclaimable:376
mapped:0 shmem:0 pagetables:0 bounce:0
DMA free:4120kB min:4096kB low:5120kB high:6144kB active_anon:0kB
inactive_anon:0kB active_file:484kB inactive_file:1456kB unevictable:10776kB
isolated(anon):0kB isolated(file):0kB present:64008kB mlocked:0kB dirty:0kB
writeback:0kB mapped:0kB shmem:0kB slab_reclaimable:824kB
slab_unreclaimable:1504kB kernel_stack:136kB pagetables:0kB unstable:0kB
bounce:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
lowmem_reserve[]: 0 0 0
DMA: 4*4kB 3*8kB 1*16kB 1*32kB 1*64kB 1*128kB 1*256kB 1*512kB 1*1024kB 1*2048kB
0*4096kB 0*8192kB 0*16384kB 0*32768kB = 4120kB
2815 total pagecache pages
16128 pages RAM
500 pages reserved
884 pages shared
13697 pages non-shared
Allocation of length 81920 from process 20306 (rshd) failed
DMA per-cpu:
CPU 0: hi: 0, btch: 1 usd: 0
active_anon:0 inactive_anon:0 isolated_anon:0
active_file:121 inactive_file:364 isolated_file:0
unevictable:2694 dirty:0 writeback:0 unstable:0
free:1030 slab_reclaimable:206 slab_unreclaimable:376
mapped:0 shmem:0 pagetables:0 bounce:0
DMA free:4120kB min:4096kB low:5120kB high:6144kB active_anon:0kB
inactive_anon:0kB active_file:484kB inactive_file:1456kB unevictable:10776kB
isolated(anon):0kB isolated(file):0kB present:64008kB mlocked:0kB dirty:0kB
writeback:0kB mapped:0kB shmem:0kB slab_reclaimable:824kB
slab_unreclaimable:1504kB kernel_stack:136kB pagetables:0kB unstable:0kB
bounce:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
lowmem_reserve[]: 0 0 0
DMA: 4*4kB 3*8kB 1*16kB 1*32kB 1*64kB 1*128kB 1*256kB 1*512kB 1*1024kB 1*2048kB
0*4096kB 0*8192kB 0*16384kB 0*32768kB = 4120kB
2815 total pagecache pages
Unable to allocate RAM for process text/data, errno 12
Kernel panic - not syncing: Attempted to kill init!
Rebooting in 3 seconds..
U-Boot 2008.10-svn2131 (ADI-2009R1.1-rc1) (Dec 2 2009 - 17:36:38)
CPU: ADSP bf561-0.3 (Detected Rev: 0.5) (bypass boot)
Board: ADI BF561 EZ-Kit Lite board
Support: http://blackfin.uclinux.org/
Clock: VCO: 600 MHz, Core: 600 MHz, System: 100 MHz
RAM: 64 MB
Flash: 8 MB
In: serial
Out: serial
Err: serial
Net: Hit any key to stop autoboot: 0
Using MAC Address 00:E0:22:FE:B2:01
TFTP from server 10.100.4.174; our IP address is 10.100.4.50
Filename 'uImage'.
Load address: 0x2000000
Loading: T #################################################################
#################################################################
#################################################################
#############################
done
Bytes transferred = 3276356 (31fe44 hex)
## Booting kernel from Legacy Image at 02000000 ...
Image Name: bf561-2.6.32.4-ADI-2010R1-pre-sv
Image Type: Blackfin Linux Kernel Image (gzip compressed)
Data Size: 3276292 Bytes = 3.1 MB
Load Address: 00001000
Entry Point: 001706e4
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK
Starting Kernel at = 001706e4
Linux version 2.6.32.4-ADI-2010R1-pre-svn8220 (test@43-bf561-toolchain) (gcc
version 4.1.2 (ADI svn)) #10 Fri Jan 22 23:07:54 GMT 2010
register early platform devices
bootconsole [early_shadow0] enabled
bootconsole [early_BFuart0] enabled
early printk enabled on early_BFuart0
Board Memory: 64MB
Kernel Managed Memory: 64MB
Memory map:
fixedcode = 0x00000400-0x00000490
text = 0x00001000-0x000f1d40
rodata = 0x000f1d40-0x00143014
bss = 0x00144000-0x00154c8c
data = 0x00154c8c-0x00166000
stack = 0x00164000-0x00166000
init = 0x00166000-0x00628000
available = 0x00628000-0x03f00000
DMA Zone = 0x03f00000-0x04000000
Hardware Trace Active and Enabled
Boot Mode: 0
Reset caused by Software reset
Blackfin support (C) 2004-2009 Analog Devices, Inc.
Compiled for ADSP-BF561 Rev 0.5
Blackfin Linux support by http://blackfin.uclinux.org/
Processor Speed: 600 MHz core clock and 100 MHz System Clock
NOMPU: setting up cplb tables
--- Graf Yang 2010-01-25 01:47:14
Besides BF561, did this issue exist on BF537 still?
--- Mingquan Pan 2010-02-02 01:14:17
Yes,it happens to BF537 stamp and other boards, too.
--- Mingquan Pan 2010-02-04 04:22:21
After revert the changes to traps.c [#8266], the toolchain test can finish now.
So close for now.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
reset_board_log.gz application/x-gzip 2424776 Mingquan Pan