After about a week of running I had a customer see the following crash
while running our user mode xenomai application.  I am trying to
determine if this is an Xenomai issue or application problem.  We are
using an ARM LS1021A with 3.14.28-ipipe and Xenomai 2.6.4.  Can anyone
provide where we should look based on the info we were provided.


INFO: rcu_sched self-detected stall on CPU { 0}  (t=6825324 jiffies
g=16719 c=16718 q=7229)
CPU: 0 PID: 2196 Comm: RAS Server Acce Tainted: G           O
3.14.28-ipipe #37
Backtrace:
[<800118c4>] (dump_backtrace) from [<80011c54>] (show_stack+0x18/0x1c)
 r6:00001c3d r5:806ee100 r4:00000000 r3:00400140
[<80011c3c>] (show_stack) from [<8051ae7c>] (dump_stack+0x70/0x8c)
[<8051ae0c>] (dump_stack) from [<8005f40c>] (print_cpu_stall+0xc0/0x144)
 r4:806fa840 r3:806fa574
[<8005f34c>] (print_cpu_stall) from [<80060ac8>] (check_cpu_stall
+0x9c/0xcc)
 r8:c3a49f00 r7:806face4 r6:0000414e r5:0000414e r4:00000001
[<80060a2c>] (check_cpu_stall) from [<80060b20>] (__rcu_pending
+0x28/0x120)
 r6:806fa840 r5:806fa840 r4:bffd6540 r3:15b7999c
[<80060af8>] (__rcu_pending) from [<8006214c>] (rcu_check_callbacks
+0xa0/0xdc)
 r6:806f474c r5:00000000 r4:806fa840 r3:806e6540
[<800620ac>] (rcu_check_callbacks) from [<80029e88>]
(update_process_times+0x40/0x60)
 r7:00000000 r6:00000000 r5:bd269c00 r4:a598e000
[<80029e48>] (update_process_times) from [<80029ed4>]
(update_root_process_times+0x2c/0x58)
 r7:00000000 r6:806ee180 r5:00000000 r4:000f4240
[<80029ea8>] (update_root_process_times) from [<80069388>]
(tick_periodic+0x98/0xb8)
 r5:00000000 r4:000f4240
[<800692f0>] (tick_periodic) from [<80069680>] (tick_handle_periodic
+0x80/0x9c)
 r6:00000000 r5:80745f08 r4:bffdcd40 r3:80745c40
[<80069600>] (tick_handle_periodic) from [<80429a8c>]
(arch_timer_handler_phys+0x64/0x78)
 r9:807460c0 r8:80746880 r7:0000001e r6:0ed584d5 r5:0000001e r4:bffdcd40
[<80429a28>] (arch_timer_handler_phys) from [<8005ab50>]
(handle_percpu_devid_irq+0x7c/0xfc)
 r5:00000000 r4:be0076c0
[<8005aad4>] (handle_percpu_devid_irq) from [<80057fb4>]
(generic_handle_irq+0x28/0x38)
 r6:806fb47c r5:bffd8ba4 r4:0000001e r3:8005aad4
[<80057f8c>] (generic_handle_irq) from [<8000efb0>] (handle_IRQ
+0x90/0xd8)
 r4:0000001e r3:00000102
[<8000ef20>] (handle_IRQ) from [<80014f98>] (__ipipe_do_IRQ+0x30/0x40)
 r5:80746080 r4:807460c0
[<80014f68>] (__ipipe_do_IRQ) from [<800779ac>] (__ipipe_do_sync_stage
+0x21c/0x288)
[<80077790>] (__ipipe_do_sync_stage) from [<80077d9c>]
(ipipe_unstall_root+0x4c/0x60)
 r10:ffffffff r9:80015708 r8:806ee100 r7:00200200 r6:00000000
r5:a598f920
 r4:80722280
[<80077d50>] (ipipe_unstall_root) from [<80522264>]
(_raw_spin_unlock_irq+0x14/0x18)
[<80522250>] (_raw_spin_unlock_irq) from [<80029bec>] (run_timer_softirq
+0x16c/0x1cc)
[<80029a80>] (run_timer_softirq) from [<800229c4>] (__do_softirq
+0xe8/0x240)
 r10:806ee0c4 r9:a598e000 r8:00000001 r7:00000100 r6:806ee0c0
r5:000002ca
 r4:a598e000
[<800228dc>] (__do_softirq) from [<80022d84>] (irq_exit+0x8c/0xe4)
 r10:00000004 r9:807460c0 r8:80746880 r7:0000001e r6:806fb47c
r5:00000000
 r4:a598e000
[<80022cf8>] (irq_exit) from [<8000efb4>] (handle_IRQ+0x94/0xd8)
 r4:0000001e r3:00000102
[<8000ef20>] (handle_IRQ) from [<80014f98>] (__ipipe_do_IRQ+0x30/0x40)
 r5:80746080 r4:807460c0
[<80014f68>] (__ipipe_do_IRQ) from [<800779ac>] (__ipipe_do_sync_stage
+0x21c/0x288)
[<80077790>] (__ipipe_do_sync_stage) from [<80077a84>]
(__ipipe_do_sync_pipeline+0x6c/0xe4)
 r10:a687f900 r9:00000000 r8:80746080 r7:807460c0 r6:806f474c
r5:807215c0
 r4:806e6860
[<80077a18>] (__ipipe_do_sync_pipeline) from [<80077c70>]
(dispatch_irq_head+0x174/0x188)
 r8:00000000 r7:00000000 r6:bffd7a00 r5:bffd6860 r4:80756a40 r3:bffd8ba0
[<80077afc>] (dispatch_irq_head) from [<8007817c>] (__ipipe_dispatch_irq
+0x110/0x20c)
 r7:a598faf4 r6:00000000 r5:00000000 r4:0000001e
[<8007806c>] (__ipipe_dispatch_irq) from [<800084e8>] (__ipipe_grab_irq
+0x78/0x90)
 r6:806f48d0 r5:a598fac0 r4:a598fac0 r3:bffd6860
[<80008470>] (__ipipe_grab_irq) from [<8000875c>] (gic_handle_irq
+0x3c/0x60)
Exception stack(0xa598faa0 to 0xa598fae8)
faa0: 8014bf90 8044b3b0 60000013 ffffffff a598fb24 a598fac0 80012400
8000872c
fac0: a687f900 a598fb8c bd071080 8044b390 00000000 a598fb8c bd8981c0
a687f900
fae0: 00000000 00000000
 r4:c0802000 r3:00000100
[<80008720>] (gic_handle_irq) from [<80012400>] (__irq_svc+0x40/0x4c)
Exception stack(0xa598fac0 to 0xa598fb08)
fac0: a687f900 a598fb8c bd071080 8044b390 00000000 a598fb8c bd8981c0
a687f900
fae0: 00000000 00000000 a687f900 a598fb24 a598fb28 a598fb08 8014bf90
8044b3b0
fb00: 60000013 ffffffff
 r6:ffffffff r5:60000013 r4:8044b3b0 r3:8014bf90
[<8044b390>] (sock_poll) from [<8014bf90>] (do_select+0x210/0x44c)
 r7:00000008 r6:00000100 r5:00000000 r4:00000000
[<8014bd80>] (do_select) from [<8014c410>] (core_sys_select+0x244/0x308)
 r10:00000000 r9:00000001 r8:00000000 r7:00000009 r6:a598fe20
r5:00000004
 r4:6178ec18
[<8014c1cc>] (core_sys_select) from [<8014c78c>] (SyS_select+0xdc/0x10c)
 r10:00000000 r8:00000000 r7:00000000 r6:00000009 r5:6178ec18
r4:6178ebe0
[<8014c6b0>] (SyS_select) from [<8000e500>] (ret_fast_syscall+0x0/0x30)
 r10:00000000 r9:a598e000 r8:8000e6e8 r7:0000008e r6:00020000
r5:6178ebe0
 r4:6178ebe0




Outbound scan for Spam or Virus by Barracuda at Delta Tau


_______________________________________________
Xenomai mailing list
Xenomai@xenomai.org
https://xenomai.org/mailman/listinfo/xenomai

Reply via email to