[#5305] testing 09r1 branch uclinux gdb on 09r1 branch kernel make kenrel panic
Submitted By: Mingquan Pan
Open Date
2009-07-01 22:41:32 Close Date
2010-06-11 04:29:30
Priority:
Medium High Assignee:
Sonic Zhang
Status:
Closed Fixed In Release:
N/A
Found In Release:
2009R1-RC6 Release:
Category:
N/A Board:
N/A
Processor:
BF537 Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Not reproducible
Uboot version or rev.:
Toolchain version or rev.:
09R1-RC7
App binary format:
N/A
Summary: testing 09r1 branch uclinux gdb on 09r1 branch kernel make kenrel panic
Details:
testing 09r1 branch uclinux gdb on 09r1 branch kernel make kenrel panic now.
toolchain binary is 009r1-rc7, not changed.
Good revision: linux 6872, uclinux-dist 8397, toolchain source 3464.
Failed revision: linux 6881, uclinux-dist 8403, toolchain source 3464.
The failed log:
testing uclinux gdb
NULL pointer access
Deferred Exception context
CURRENT PROCESS:
COMM=savedregs.11841 PID=16328
CPU = 0
TEXT = 0x004e0040-0x004e08a0 DATA = 0x004e08c0-0x004e0924
BSS = 0x004e0924-0x004e09f0 USER-STACK = 0x004f4f6c
return address: [0x004e01c8]; contents of:
0x004e01a0: 0000 0538 0010 0000 e800 0000 b0b8 00a1
0x004e01b0: 0000 e10a 0940 6008 9310 e801 0000 0010
0x004e01c0: e800 0000 6802 6000 [9b10] e801 0000 0010
0x004e01d0: e800 0003 00a1 0000 e101 01a8 6058 e300
ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1-svn6881
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Not tainted
SEQSTAT: 00060027 IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x27
interrupts disabled
physical IVG5 asserted : <0xffa00c14> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00210000> [ rshd + 0x0 ]
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x004e01e6> [ savedregs.11841 + 0x1a6 ]
PC : <0x004e01c8> [ savedregs.11841 + 0x188 ]
DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x004e01c8> [ savedregs.11841 + 0x188 ]
PROCESSOR STATE:
R0 : 00000000 R1 : 00000000 R2 : 00000000 R3 : 00000003
R4 : 00000001 R5 : 004e0880 R6 : 004e0948 R7 : 00000000
P0 : 004f4e64 P1 : 0000001f P2 : 00000000 P3 : 004f4f70
P4 : 004e0920 P5 : 004e08c0 FP : 004f4f04 SP : 0020ff24
LB0: 004e0747 LT0: 004e0746 LC0: 00000000
LB1: 004e0279 LT1: 004e0272 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 004f4d30
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 0336d360
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 004f4f04 ASTAT: 02003005
Hardware Trace:
0 Target : <0x00004c3c> { _trap_c + 0x0 }
Source : <0xffa0065a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa005bc> { _exception_to_level5 + 0x0 }
Source : <0xffa004a0> { _bfin_return_from_exception + 0x20 } RTX
2 Target : <0xffa00480> { _bfin_return_from_exception + 0x0 }
Source : <0xffa00516> { _ex_trap_c + 0x46 } JUMP.S
3 Target : <0xffa004d0> { _ex_trap_c + 0x0 }
Source : <0xffa003b4> { _ex_workaround_261 + 0x1c } JUMP.S
4 Target : <0xffa00398> { _ex_workaround_261 + 0x0 }
Source : <0xffa00730> { _trap + 0x64 } JUMP (P4)
5 Target : <0xffa006ea> { _trap + 0x1e }
Source : <0xffa006e6> { _trap + 0x1a } IF !CC JUMP
6 Target : <0xffa006cc> { _trap + 0x0 }
Source : <0xffa004a0> { _bfin_return_from_exception + 0x20 } RTX
7 Target : <0xffa00480> { _bfin_return_from_exception + 0x0 }
Source : <0xffa003aa> { _ex_workaround_261 + 0x12 } IF !CC JUMP
8 Target : <0xffa00398> { _ex_workaround_261 + 0x0 }
Source : <0xffa00730> { _trap + 0x64 } JUMP (P4)
9 Target : <0xffa006ea> { _trap + 0x1e }
Source : <0xffa006e6> { _trap + 0x1a } IF !CC JUMP
10 Target : <0xffa006cc> { _trap + 0x0 }
Source : <0x004e01c6> [ savedregs.11841 + 0x186 ] 0x6000
11 Target : <0x004e01c4> [ savedregs.11841 + 0x184 ]
Source : <0xffa00b30> { _schedule_and_signal + 0xe4 } RTI
12 Target : <0xffa00ace> { _schedule_and_signal + 0x82 }
Source : <0xffa008b8> { _system_call + 0xb8 } RTS
13 Target : <0xffa008b2> { _system_call + 0xb2 }
Source : <0x000035ca> { _do_signal + 0x9b6 } RTS
14 Target : <0x000035be> { _do_signal + 0x9aa }
Source : <0x00003592> { _do_signal + 0x97e } IF !CC JUMP
15 Target : <0x00003584> { _do_signal + 0x970 }
Source : <0x00003580> { _do_signal + 0x96c } IF !CC JUMP
Userspace Stack
Stack info:
SP: [0x004f4f04] <0x004f4f04> [ savedregs.11841 + 0x14f04 ]
FP: (0x004f4f04)
Memory from 0x004f4f00 to 004f5000
004f4f00: 004e08c0 [004f4f18]<004e01e6> 00000000 004f4f2c <004e0498> 004f4f2c <004e0558>
004f4f20: 00000000 00000000 00000000 00000000 <002a8168> 004e08c0 002bff99 002bff68
004f4f40: 00000000 002af0c0 002aa900 00000003 004e01d0 00000000 00000000 004e0880
004f4f60: 004e0892 00000000 002bff99 00000001 004f4f93 00000000 004f4fa8 <004f4fb2>
004f4f80: 004f4fbb 004f4fce 004f4fdc 00000000 2f000000 2f706d74 65766173 67657264
004f4fa0: 31312e73 00313438 52455355 6f6f723d 4f4c0074 4d414e47 50003d45 3d485441
004f4fc0: 7273752f 6e69622f 69622f3a 4853006e 3d4c4c45 6e69622f 0068732f 454d4f48
004f4fe0: 6f722f3d 2f00746f 2f706d74 65766173 67657264 31312e73 00313438 00000000
004f5000: 00000000
Return addresses in stack:
frame 1 : <0x004e01e6> [ savedregs.11841 + 0x1a6 ]
address : <0x004e0498> [ savedregs.11841 + 0x458 ]
frame 2 : <0x004e0558> [ savedregs.11841 + 0x518 ]
frame 3 : <0x002a8168> [ gdbserver + 0x8168 ]
address : <0x004f4fb2> [ savedregs.11841 + 0x14fb2 ]
Kernel panic - not syncing: Attempted to kill init!
Rebooting in 3 seconds..
U-Boot 2008.10-svn1868 (ADI-2009R1-rc1) (May 11 2009 - 16:30:17)
CURRENT PROCESS:
COMM=signull.11841 PID=244
CPU = 0
TEXT = 0x001a0040-0x001a0a40 DATA = 0x001a0a60-0x001a0ac8
BSS = 0x001a0ac8-0x001a0c70 USER-STACK = 0x001b4f70
return address: [0x00000000]; contents of:
ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1-svn6881
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Not tainted
SEQSTAT: 0006202d IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x2d
interrupts disabled
physical IVG5 asserted : <0xffa00c14> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00298000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x001a01aa> [ signull.11841 + 0x16a ]
PC : <0x00000000> /* Maybe null pointer? */
DCPLB_FAULT_ADDR: <0x001a0c60> [ signull.11841 + 0xc60 ]
ICPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
PROCESSOR STATE:
R0 : 00000000 R1 : 00000001 R2 : 00000000 R3 : 00000008
R4 : 00000001 R5 : 001a0a18 R6 : 001a0af0 R7 : 00000000
P0 : 000000ae P1 : 0000001f P2 : 00000000 P3 : 001b4f74
P4 : 001a0ac4 P5 : 001a0a60 FP : 001b4e7c SP : 00297f24
LB0: 001a0803 LT0: 001a0802 LC0: 00000000
LB1: 002e7a35 LT1: 002e7a2e LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 001b4f14
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 0028d360
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 001b4e64 ASTAT: 02002022
Hardware Trace:
0 Target : <0x00004c3c> { _trap_c + 0x0 }
Source : <0xffa0065a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa005bc> { _exception_to_level5 + 0x0 }
Source : <0xffa004a0> { _bfin_return_from_exception + 0x20 } RTX
2 Target : <0xffa00480> { _bfin_return_from_exception + 0x0 }
Source : <0xffa00516> { _ex_trap_c + 0x46 } JUMP.S
3 Target : <0xffa004d0> { _ex_trap_c + 0x0 }
Source : <0xffa00730> { _trap + 0x64 } JUMP (P4)
4 Target : <0xffa006ea> { _trap + 0x1e }
Source : <0xffa006e6> { _trap + 0x1a } IF !CC JUMP
5 Target : <0xffa006cc> { _trap + 0x0 }
Source : <0x001a01a8> [ signull.11841 + 0x168 ] CALL (P2)
6 Target : <0x001a019e> [ signull.11841 + 0x15e ]
Source : <0x001a016a> [ signull.11841 + 0x12a ] IF !CC JUMP
7 Target : <0x001a0158> [ signull.11841 + 0x118 ]
Source : <0xffa00b30> { _schedule_and_signal + 0xe4 } RTI
8 Target : <0xffa00ace> { _schedule_and_signal + 0x82 }
Source : <0xffa008b8> { _system_call + 0xb8 } RTS
9 Target : <0xffa008b2> { _system_call + 0xb2 }
Source : <0x000035ca> { _do_signal + 0x9b6 } RTS
10 Target : <0x000035be> { _do_signal + 0x9aa }
Source : <0x00003592> { _do_signal + 0x97e } IF !CC JUMP
11 Target : <0x00003584> { _do_signal + 0x970 }
Source : <0x00003580> { _do_signal + 0x96c } IF !CC JUMP
12 Target : <0x00003568> { _do_signal + 0x954 }
Source : <0x00002c76> { _do_signal + 0x62 } JUMP.S
13 Target : <0x00002c6e> { _do_signal + 0x5a }
Source : <0x00018156> { _get_signal_to_deliver + 0x212 } RTS
14 Target : <0x00018146> { _get_signal_to_deliver + 0x202 }
Source : <0x00017fb6> { _get_signal_to_deliver + 0x72 } IF !CC JUMP
15 Target : <0x00017fb2> { _get_signal_to_deliver + 0x6e }
Source : <0x0001774e> { _dequeue_signal + 0x6a } RTS
Userspace Stack
Stack info:
SP: [0x001b4e64] <0x001b4e64> [ signull.11841 + 0x14e64 ]
FP: (0x001b4e60)
Memory from 0x001b4e60 to 001b5000
001b4e60:(00000000)[001a04c2] 00000000 001b4f1c <001a01fe> 00000000 001b4f1c 001b4f1c
001b4e80:<001a021e> 00000000 00000000 00000000 001a013c 00000000 00000000 00000000
001b4ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001b4ec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001b4ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001b4f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 001b4f30
001b4f20:<001a06d8> 00000000 00000000 00000000 00000000 <002e8168> 001a0a60 002fff9b
001b4f40: 002fff68 00000000 002ef0c0 002ea900 00000003 001a01cc 00000000 00000000
001b4f60: 001a0a18 001a0a2a 00000000 002fff9b 00000001 001b4f97 00000000 001b4faa
001b4f80:<001b4fb4> 001b4fbd 001b4fd0 001b4fde 00000000 2f000000 2f706d74 6e676973
001b4fa0: 2e6c6c75 34383131 53550031 723d5245 00746f6f 4e474f4c 3d454d41 54415000
001b4fc0: 752f3d48 622f7273 2f3a6e69 006e6962 4c454853 622f3d4c 732f6e69 4f480068
001b4fe0: 2f3d454d 746f6f72 6d742f00 69732f70 6c756e67 31312e6c 00313438 00000000
001b5000: e1019110
Return addresses in stack:
frame 1 : <0x001a04c2> [ signull.11841 + 0x482 ]
address : <0x001a01fe> [ signull.11841 + 0x1be ]
address : <0x001a021e> [ signull.11841 + 0x1de ]
address : <0x001a06d8> [ signull.11841 + 0x698 ]
address : <0x002e8168> [ gdbserver + 0x8168 ]
address : <0x001b4fb4> [ signull.11841 + 0x14fb4 ]
Kernel panic - not syncing: Attempted to kill init!
Rebooting in 3 seconds..
U-Boot 2008.10-svn1868 (ADI-2009R1-rc1) (May 11 2009 - 16:30:17)
Follow-ups
--- Mingquan Pan 2009-07-02 03:20:23
The command to run gdb alone:
./toolchain-regtest -s /home/test/work/cruise/checkouts/toolchain -o
/opt/uClinux/bfin -b /home/test//temp/regtest_build410702 -t uclinux -T
10.100.4.50 -a -L gdb
define your parameters.
--- Sonic Zhang 2009-07-02 04:41:45
Can't replicate on 2009R1 branch head.
--- Robin Getz 2009-07-02 04:56:48
I have seen this on some of my tests.
Where the kernel killing a process will sometimes kill (or attempt to kill) the
wrong one. If this "wrong process" is the init process - the kernel
will panic.
So far - I have been unable to replicate things in a reproducible manner - but
I have seen it too.
-Robin
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found