LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware > Linux - Embedded & Single-board computer
User Name
Password
Linux - Embedded & Single-board computer This forum is for the discussion of Linux on both embedded devices and single-board computers (such as the Raspberry Pi, BeagleBoard and PandaBoard). Discussions involving Arduino, plug computers and other micro-controller like devices are also welcome.

Notices


Reply
  Search this Thread
Old 06-15-2011, 10:17 PM   #1
nazekimi
LQ Newbie
 
Registered: Jun 2011
Posts: 6

Rep: Reputation: Disabled
How to understand the kernel oops message.


Firstly, with [LOG #1] and [LOG#2], can you say that the second Oops log below came from the same error. Which I believe is "sddrv_irq" (my SD Card interrupt handler function)


Secondly, I have tried looking for tutorials/kb's on how to read the Kernel Oops. But still can't figure out all the information on this log.
I'm just guessing the numbers like [<c01343f0>] are function addresses.
Aside from the i don't know what "PC", "LR", or any of those acronyms mean.

LOG #1
Code:
BUG: soft lockup - CPU#0 stuck for 11s! [swapper:0]

Pid: 0, comm:              swapper
CPU: 0    Not tainted  (2.6.24-1-MySOSA #503)
PC is at __delay+0x0/0xc
LR is at sddrv_irq+0x3c8/0x4d4 [sddrv]
pc : [<c022cd90>]    lr : [<bf020c68>]    psr: 20000013
sp : c03ddd40  ip : 00000000  fp : c03ddd8c
r10: 80000003  r9 : c03dc000  r8 : 00000943
r7 : c03ddd58  r6 : 00000007  r5 : c11d1e64  r4 : c1158da0
r3 : c03ddd68  r2 : 000001e7  r1 : c03ddd74  r0 : 00000071
Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
Control: 4000317f  Table: c11c4000  DAC: 00000017
[<c013b3f0>] (show_regs+0x0/0x50) from [<c0175e7c>] (softlockup_tick+0xf4/0x140)
 r4:00001c6d
[<c0175d88>] (softlockup_tick+0x0/0x140) from [<c015ba34>] (run_local_timers+0x18/0x1c)
[<c015ba1c>] (run_local_timers+0x0/0x1c) from [<c015bac0>] (update_process_times+0x38/0x60)
[<c015ba88>] (update_process_times+0x0/0x60) from [<c013de94>] (timer_tick+0xd0/0xf0)
 r6:00000000 r5:00000000 r4:c0412f70
[<c013ddc4>] (timer_tick+0x0/0xf0) from [<c0143a60>] (lh7a40x_timer_interrupt+0x38/0x6c)
 r5:00000000 r4:c0412f70
[<c0143a28>] (lh7a40x_timer_interrupt+0x0/0x6c) from [<c0176198>] (handle_IRQ_event+0x44/0x80)
 r4:c03ea918
[<c0176154>] (handle_IRQ_event+0x0/0x80) from [<c0177e7c>] (handle_level_irq+0xb0/0x154)
 r7:00020106 r6:c03ea918 r5:00000033 r4:c03f0548
[<c0177dcc>] (handle_level_irq+0x0/0x154) from [<c0139048>] (__exception_text_start+0x48/0x64)
 r6:c03dddf0 r5:c03f0548 r4:00000033
[<c0139000>] (__exception_text_start+0x0/0x64) from [<c0139958>] (__irq_svc+0x38/0xac)
Exception stack(0xc03ddcf8 to 0xc03ddd40)
dce0:                                                       00000071 c03ddd74
dd00: 000001e7 c03ddd68 c1158da0 c11d1e64 00000007 c03ddd58 00000943 c03dc000
dd20: 80000003 c03ddd8c 00000000 c03ddd40 bf020c68 c022cd90 20000013 ffffffff
 r6:00000001 r5:f8008000 r4:ffffffff
[<bf0208a0>] (sddrv_irq+0x0/0x4d4 [sddrv]) from [<c0176198>] (handle_IRQ_event+0x44/0x80)
[<c0176154>] (handle_IRQ_event+0x0/0x80) from [<c0177e7c>] (handle_level_irq+0xb0/0x154)
 r7:00010105 r6:c1167540 r5:00000036 r4:c03f05f0
[<c0177dcc>] (handle_level_irq+0x0/0x154) from [<c0139048>] (__exception_text_start+0x48/0x64)
 r6:c03dde98 r5:c03f05f0 r4:00000036
[<c0139000>] (__exception_text_start+0x0/0x64) from [<c0139958>] (__irq_svc+0x38/0xac)
Exception stack(0xc03dddf0 to 0xc03dde38)
dde0:                                     00000034 c1139500 c03dc000 60000013
de00: c1139500 00000034 c1139500 00000034 00000103 c03dc000 00000000 c03dde54
de20: c03dde58 c03dde38 c0177e7c c0176180 60000013 ffffffff
 r6:00000001 r5:f800a000 r4:ffffffff
[<c0176154>] (handle_IRQ_event+0x0/0x80) from [<c0177e7c>] (handle_level_irq+0xb0/0x154)
 r7:00000104 r6:c1139500 r5:00000034 r4:c03f0580
[<c0177dcc>] (handle_level_irq+0x0/0x154) from [<c0139048>] (__exception_text_start+0x48/0x64)
 r6:c03ddf40 r5:c03f0580 r4:00000034
[<c0139000>] (__exception_text_start+0x0/0x64) from [<c0139958>] (__irq_svc+0x38/0xac)
Exception stack(0xc03dde98 to 0xc03ddee0)
de80:                                                       00000000 c03dc000
dea0: 00000103 20000013 c0411940 00000002 0000000a c0411940 00000001 c0412c30
dec0: 00000000 c03ddf0c c03ddee0 c03ddee0 c01570d8 c01570e8 20000013 ffffffff
 r6:00000001 r5:f8008000 r4:ffffffff
[<c0157098>] (__do_softirq+0x0/0xd0) from [<c0157564>] (irq_exit+0x44/0x58)
[<c0157520>] (irq_exit+0x0/0x58) from [<c013904c>] (__exception_text_start+0x4c/0x64)
[<c0139000>] (__exception_text_start+0x0/0x64) from [<c0139958>] (__irq_svc+0x38/0xac)
Exception stack(0xc03ddf40 to 0xc03ddf88)
df40: 00000001 c03dc000 00000001 60000013 c013b578 c03dc000 c013b578 c04005a8
df60: c001d2ac 41029220 c001d278 c03ddf94 c03ddf98 c03ddf88 c013b5b8 c013b5c4
df80: 60000013 ffffffff
 r6:00000001 r5:f800a000 r4:ffffffff
[<c013b578>] (default_idle+0x0/0x54) from [<c013b39c>] (cpu_idle+0x40/0x6c)
[<c013b35c>] (cpu_idle+0x0/0x6c) from [<c0344970>] (rest_init+0x64/0x74)
 r7:c03dfcf8 r6:c0136f88 r5:c0400168 r4:c041429c
[<c034490c>] (rest_init+0x0/0x74) from [<c0008bd8>] (start_kernel+0x244/0x2b0)
[<c0008994>] (start_kernel+0x0/0x2b0) from [<c0008034>] (__enable_mmu+0x0/0x2c)

LOG #2
Code:
BUG: soft lockup - CPU#0 stuck for 11s! [mmcqd:8338]

Pid: 8338, comm:                mmcqd
CPU: 0    Not tainted  (2.6.24-1-MySOSA #158)
PC is at run_timer_func+0x61c/0x6cc [sddrv]
LR is at sddrv_irq+0x528/0x5a4 [sddrv]
pc : [<bf02084c>]    lr : [<bf020ec4>]    psr: 60000013
sp : c113bbf8  ip : c113bc08  fp : c113bc6c
r10: 00001a42  r9 : 80000002  r8 : c113bc38
r7 : 00000008  r6 : 00000004  r5 : c113be64  r4 : c11319a0
r3 : 60000013  r2 : 00000000  r1 : 00000000  r0 : c11319a0
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
Control: 4000317f  Table: c1168000  DAC: 00000017
[<c01343f0>] (show_regs+0x0/0x50) from [<c016ee7c>] (softlockup_tick+0xf4/0x140)
 r4:00009bb1
[<c016ed88>] (softlockup_tick+0x0/0x140) from [<c0154a34>] (run_local_timers+0x18/0x1c)
[<c0154a1c>] (run_local_timers+0x0/0x1c) from [<c0154ac0>] (update_process_times+0x38/0x60)
[<c0154a88>] (update_process_times+0x0/0x60) from [<c0136e94>] (timer_tick+0xd0/0xf0)
 r6:00000000 r5:00000000 r4:c040cf90
[<c0136dc4>] (timer_tick+0x0/0xf0) from [<c013ca60>] (lh7a40x_timer_interrupt+0x38/0x6c)
 r5:00000000 r4:c040cf90
[<c013ca28>] (lh7a40x_timer_interrupt+0x0/0x6c) from [<c016f198>] (handle_IRQ_event+0x44/0x80)
 r4:c03e4918
[<c016f154>] (handle_IRQ_event+0x0/0x80) from [<c0170e7c>] (handle_level_irq+0xb0/0x154)
 r7:00010105 r6:c03e4918 r5:00000033 r4:c03ea548
[<c0170dcc>] (handle_level_irq+0x0/0x154) from [<c0132048>] (__exception_text_start+0x48/0x64)
 r6:c113bcd0 r5:c03ea548 r4:00000033
[<c0132000>] (__exception_text_start+0x0/0x64) from [<c0132958>] (__irq_svc+0x38/0xac)
Exception stack(0xc113bbb0 to 0xc113bbf8)
bba0:                                     c11319a0 00000000 00000000 60000013
bbc0: c11319a0 c113be64 00000004 00000008 c113bc38 80000002 00001a42 c113bc6c
bbe0: c113bc08 c113bbf8 bf020ec4 bf02084c 60000013 ffffffff
 r6:00000001 r5:f8008000 r4:ffffffff
[<bf02099c>] (sddrv_irq+0x0/0x5a4 [sddrv]) from [<c016f198>] (handle_IRQ_event+0x44/0x80)
[<c016f154>] (handle_IRQ_event+0x0/0x80) from [<c0170e7c>] (handle_level_irq+0xb0/0x154)
 r7:00000104 r6:c11544a0 r5:00000036 r4:c03ea5f0
[<c0170dcc>] (handle_level_irq+0x0/0x154) from [<c0132048>] (__exception_text_start+0x48/0x64)
 r6:c113bd78 r5:c03ea5f0 r4:00000036
[<c0132000>] (__exception_text_start+0x0/0x64) from [<c0132958>] (__irq_svc+0x38/0xac)
Exception stack(0xc113bcd0 to 0xc113bd18)
bcc0:                                     00000000 c113a000 00000103 20000013
bce0: c040b960 00000002 0000000a c040b960 00000001 c040cc50 00000000 c113bd44
bd00: c113bd18 c113bd18 c01500d8 c01500e8 20000013 ffffffff
 r6:00000001 r5:f800a000 r4:ffffffff
[<c0150098>] (__do_softirq+0x0/0xd0) from [<c0150564>] (irq_exit+0x44/0x58)
[<c0150520>] (irq_exit+0x0/0x58) from [<c013204c>] (__exception_text_start+0x4c/0x64)
[<c0132000>] (__exception_text_start+0x0/0x64) from [<c0132958>] (__irq_svc+0x38/0xac)
Exception stack(0xc113bd78 to 0xc113bdc0)
bd60:                                                       c113be18 c113be18
bd80: 00000001 20000013 c113bdd0 c10e6620 c113a000 c113be14 7fffffff 00000001
bda0: 00000002 c113bdfc 00000000 c113bdc0 c033f904 c033f974 20000013 ffffffff
 r6:00000001 r5:f800a000 r4:ffffffff
[<c033f8ac>] (wait_for_common+0x0/0x1a4) from [<c033fabc>] (wait_for_completion+0x18/0x1c)
[<c033faa4>] (wait_for_completion+0x0/0x1c) from [<c02972c8>] (mmc_wait_for_req+0x120/0x138)
[<c02971a8>] (mmc_wait_for_req+0x0/0x138) from [<c029cd2c>] (mmc_blk_issue_rq+0x218/0x6ec)
 r6:c10bd344 r5:c1111aac r4:c1111aa4
[<c029cb14>] (mmc_blk_issue_rq+0x0/0x6ec) from [<c029d8c4>] (mmc_queue_thread+0x138/0x178)
[<c029d78c>] (mmc_queue_thread+0x0/0x178) from [<c0160428>] (kthread+0x60/0x94)
[<c01603c8>] (kthread+0x0/0x94) from [<c014dec0>] (do_exit+0x0/0x744)
 r6:00000000 r5:00000000 r4:00000000

Thanks alot!
Naze

Last edited by nazekimi; 06-16-2011 at 09:11 PM.
 
Old 06-20-2011, 02:13 PM   #2
nini09
Senior Member
 
Registered: Apr 2009
Posts: 1,850

Rep: Reputation: 161Reputation: 161
PC" and "LR" are CPU register name.
 
Old 06-20-2011, 06:44 PM   #3
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Hi,

Which embed are you using?

Look at Linux Kernel Newbies to get more than enough information.
 
Old 07-25-2011, 01:12 PM   #4
lucasct
LQ Newbie
 
Registered: Jul 2011
Posts: 6

Rep: Reputation: Disabled
PC shows the function name and a number/number in hex telling in ASM code wich instruction from the total number of instructions cause the problem, you can convert it to percent to estimate the step of the function causing the problem.
LR shows the step executed just before the PC witch causes the problem.

To find the function in the kernel source code in windows you can use the field contains to find the files where that function appear. To determinate exactly what file if there where many with this function name you can use the backtrace, where the last function is the same than PC, then LR, and going back it shows you many functions fromthe stacker, you can se all the functions calls done before the panic.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
kernel Oops message has stack trace that does not correspond to the execution exactly schoi21c Linux - Kernel 2 10-02-2009 11:02 AM
Kernel oops message Niteflite Linux - General 1 07-03-2009 01:43 AM
kernel oops message logging... Niteflite Linux - Kernel 1 06-26-2009 04:07 AM
kernel oops message vinnie_vinodh Fedora 2 02-01-2009 08:07 AM
Kernel Oops (error message) DigiCrime Linux - Software 1 02-09-2004 05:07 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware > Linux - Embedded & Single-board computer

All times are GMT -5. The time now is 03:45 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration