Kernel crash while SyS_write

Snehal_Patel

New Member
Joined
Jun 12, 2023
Messages
1
Reaction score
0
Credits
64
Hi Everyone,

We are using Linux 4.14.40 on the TI AM5748 custom board, we are running our application after some time we see the below crash, could you provide some pointers to see the root cause of this kernel crash?

Below is the partial crash log, and the full log I have attached in this post/thread.

Jun 09 10:01:54 TSTAMP 2000/02/19 01:30:41:7
Jun 09 10:02:00 Last Packet RSSI: -59 Last Packet SNR: 69
Jun 09 10:02:09 TSTAMP 2000/02/19 01:30:56:9
Jun 09 10:02:11 Last Packet RSSI: -98 Last Packet SNR: 28
Jun 09 10:02:19 TSTAMP 2000/02/19 01:31:06:10
Jun 09 10:02:24 TSTAMP 2000/02/19 01:31:11:10
Jun 09 10:02:32 Last Packet RSSI: -97 Last Packet SNR: 29
Jun 09 10:02:39 TSTAMP 2000/02/19 01:31:26:12
Jun 09 10:02:44 TSTAMP 2000/02/19 01:31:31:13
Jun 09 10:02:49 TSTAMP 2000/02/19 01:31:36:13
Jun 09 10:02:54 TSTAMP 2000/02/19 01:31:41:14
Jun 09 10:02:59 TSTAMP 2000/02/19 01:31:46:14
Jun 09 10:03:04 Last Packet RSSI: -59 Last Packet SNR: 67
Jun 09 10:03:04 STAMP 2000/02/19 01:31:51:15
Jun 09 10:03:14 TSTAMP 2000/02/19 01:32:01:16
Jun 09 10:03:14 Last Packet RSSI: -98 Last Packet SNR: 29
Jun 09 10:03:17 [863305.026344] Unable to handle kernel paging request at virtual address 2e109000
Jun 09 10:03:17 [863305.029135] Unable to handle kernel paging request at virtual address 2e0fa000
Jun 09 10:03:17 [863305.029139] pgd = ed9f8900
Jun 09 10:03:17 [863305.029143] [2e0fa000] *pgd=ad06b003, *pmd=00000000
Jun 09 10:03:17 [863305.029156] Internal error: Oops: 206 [#1] PREEMPT SMP ARM
Jun 09 10:03:17 [863305.029161] Modules linked in: rpmsg_proto ti_prueth pru_rproc pruss pruss_intc pruss_soc_bus omap_remoteproc remoteproc xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4_tables x_tables br_netfilter bridge stp llc omap_aes_driver omap_sham omap_des des_generic rtc_ds1307 crypto_engine omap_crypto virtio_rpmsg_bus rpmsg_core sch_fq_codel
Jun 09 10:03:17 [863305.029262] CPU: 0 PID: 235 Comm: dockerd Not tainted 4.14.40-g4796173fc5 #4
Jun 09 10:03:17 [863305.029266] Hardware name: Generic DRA74X (Flattened Device Tree)
Jun 09 10:03:17 [863305.029270] task: edc04a40 task.stack: ed084000
Jun 09 10:03:17 [863305.029282] PC is at balance_dirty_pages_ratelimited+0x288/0x634
Jun 09 10:03:17 [863305.029286] LR is at 0x86
Jun 09 10:03:17 [863305.029291] pc : [<c02ebf3c>] lr : [<00000086>] psr: 600d0093
Jun 09 10:03:17 [863305.029295] sp : ed085d98 ip : 000001b8 fp : ed085dbc
Jun 09 10:03:17 [863305.029299] r10: 00000082 r9 : c0a109f4 r8 : 00000da6
Jun 09 10:03:17 [863305.029303] r7 : 0000025a r6 : ffffe000 r5 : edc2e438 r4 : 00000080
Jun 09 10:03:17 [863305.029306] r3 : 00000000 r2 : 00000001 r1 : 2e0fa000 r0 : 600d0013
Jun 09 10:03:17 [863305.029311] Flags: nZCv IRQs off FProcess dockerd (pid: 235, stack limit = 0xed084210)
Jun 09 10:03:17 [863305.029324] Stack: (0xed085d98 to 0xed086000)
Jun 09 10:03:17 [863305.029328] 5d80: c03cea00 ed085ee8
Jun 09 10:03:17 [863305.029334] 5da0: eb2649b4 0000025a 00000da6 c0a109f4 ed085e1c ed085dc0 c02de90c c02ebcc0
Jun 09 10:03:17 [863305.029341] 5dc0: 00000082 00000082 efc3588c 00000000 ed085dec ed084000 00000000 edb17480
Jun 09 10:03:17 [863305.029347] 5de0: 00178e28 00000000 efc3588c 00000000 38adf293 00000000 ed085f00 eb2649b4
Jun 09 10:03:17 [863305.029352] 5e00: eb2648c0 ed085ee8 edb17480 00000000 ed085e6c ed085e20 c02e0f30 c02de7cc
Jun 09 10:03:17 [863305.029358] 5e20: c02a6204 ed3de544 00000001 ed3de540 00000000 eea020c8 eea020c4 00000000
Jun 09 10:03:17 [863305.029363] 5e40: ed085e6c ed085f00 eb2648c0 00000082 eb2648c0 ed085ee8 eb264938 00000000
Jun 09 10:03:17 [863305.029369] 5e60: ed085ed4 ed085e70 c03bb8c8 c02e0e28 0000003b eea020bc ed013878 ed3dea94
Jun 09 10:03:17 0020000 ed085f5c 00000000 edb17480 ed085f78 ed085f78 00178da6
Jun 09 10:03:17 [863305.029385] 5ec0: 00000000 00000000 ed085f44 ed085ed8 c033cc1c c03bb758 00000082 c0344f54
Jun 09 10:03:17 [863305.029391] 5ee0: 03a2a580 00000082 00000001 00000000 00000000 ed085ee8 00000000 00000000
Jun 09 10:03:17 [863305.029396] 5f00: edb17480 00000000 00178da6 00000000 00000000 ed085e8c 00000000 00000000
Jun 09 10:03:17 [863305.029402] 5f20: 00000082 edb17480 03a2a580 ed085f78 00000000 00000082 ed085f74 ed085f48
Jun 09 10:03:17 [863305.029407] 5f40: c033cdf0 c033cb50 c035b2d4 c035b0dc edb17483 edb17480 00178da6 00000000
Jun 09 10:03:17 [863305.029413] 5f60: 03a2a580 00000082 ed085fa4 ed085f78 c033cfcc c033cd50 00178da6 00000000
Jun 09 10:03:17 [863305.029418] 5f80: 00000000 00000000 03a2a580 00000004 c0207e64 ed084000 00000000 ed085fa8
Jun 09 10:03:17 [863305.029423] 5fa0: c0207c80 c033cf94 00000000 00000000 00000013 03a2a580 00000082 00000000
Jun 09 10:03:17 [863305.029429] 5fc0: 00000000 00000000 033 00000000 00000000
Jun 09 10:03:17 [863305.029437] Backtrace:
Jun 09 10:03:17 [863305.029453] [<c02ebcb4>] (balance_dirty_pages_ratelimited) from [<c02de90c>] (generic_perform_write+0x14c/0x1ac)
Jun 09 10:03:17 [863305.029461] r9:c0a109f4 r8:00000da6 r7:0000025a r6:eb2649b4 r5:ed085ee8 r4:c03cea00
Jun 09 10:03:17 [863305.029471] [<c02de7c0>] (generic_perform_write) from [<c02e0f30>] (__generic_file_write_iter+0x114/0x1d4)
Jun 09 10:03:17 [863305.029478] r10:00000000 r9:edb17480 r8:ed085ee8 r7:eb2648c0 r6:eb2649b4 r5:ed085f00
Jun 09 10:03:17 [863305.029482] r4:00000000
Jun 09 10:03:17 [863305.029492] [<c02e0e1c>] (__generic_file_write_iter) from [<c03bb8c8>] (ext4_file_write_iter+0x17c/0x434)
Jun 09 10:03:17 [863305.029498] r10:00000000 r9:eb264938 r8:ed085ee8 r7:eb2648c0 r6:00000082 r5:eb2648c0
Jun 09 10:03:17 [863305.029501] r4:ed085f00
Jun 09 10:03:17 [863305.029510] [<c03bb74c>] (ext4_file_write_iter) from [<c033cc1c>] (__vfs_write+0xd8/0x128)
Jun 09 10:03:17 [863305.029515] r10:00000000 r9:00000000 r8:033cdf0>] (vfs_write+0xac/0x170)
Jun 09 10:03:17 [863305.029533] r9:00000082 r8:00000000 r7:ed085f78 r6:03a2a580 r5:edb17480 r4:00000082
Jun 09 10:03:17 [863305.029540] [<c033cd44>] (vfs_write) from [<c033cfcc>] (SyS_write+0x44/0x98)
Jun 09 10:03:17 [863305.029547] r9:00000082 r8:03a2a580 r7:00000000 r6:00178da6 r5:edb17480 r4:edb17483
Jun 09 10:03:17 [863305.029557] [<c033cf88>] (SyS_write) from [<c0207c80>] (ret_fast_syscall+0x0/0x4c)
Jun 09 10:03:17 [863305.029564] r9:ed084000 r8:c0207e64 r7:00000004 r6:03a2a580 r5:00000000 r4:00000000
Jun 09 10:03:17 [863305.029571] Code: 1a000086 e10f0000 f10c0080 ee1d1f90 (e7932001)
Jun 09 10:03:17 [863305.029577] ---[ end trace 8bb6ecc9bd04fcf9 ]---
Jun 09 10:03:17 [863305.029597] note: dockerd[235] exited with preempt_count 1
Jun 09 10:03:17 [863305.484892] pgd = ecef8540
Jun 09 10:03:17 [863305.487695] [2e109000] *pgd=acefd003, *pmd=00000000
Jun 09 10:03:17 [863305.492692] Internal error: Oops: 206 [#2] PREEMPT SMP ARM
Jun 09 10:03:17 [863305.498285] Modules linked in: rpmsg_proto ti_frm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables br_netfilter bridge stp llc omap_aes_driver omap_sham omap_des des_generic rtc_ds1307 crypto_engine omap_crypto virtio_rpmsg_bus rpmsg_core sch_fq_codel
Jun 09 10:03:17 [863305.539696] CPU: 1 PID: 1230 Comm: eventlog.am5748 Tainted: G D 4.14.40-g4796173fc5 #4
Jun 09 10:03:17 [863305.548866] Hardware name: Generic DRA74X (Flattened Device Tree)
Jun 09 10:03:17 [863305.555072] task: ece80000 task.stack: ecdfc000
Jun 09 10:03:17 [863305.559712] PC is at balance_dirty_pages_ratelimited+0x288/0x634
Jun 09 10:03:17 [863305.565830] LR is at 0x28
Jun 09 10:03:17 [863305.568548] pc : [<c02ebf3c>] lr : [<00000028>] psr: 60070093
Jun 09 10:03:17 [863305.574927] sp : ecdfdd98 ip : 000001b8 fp : ecdfddbc
Jun 09 10:03:17 [863305.580260] r10: 00000258 r9 : c0a109f4 r8 : 00000c30

Regards,
Snehal
 

Attachments

  • BCP-C-20230609-0000.txt
    580.6 KB · Views: 106


Hi Everyone,

We are using Linux 4.14.40 on the TI AM5748 custom board, we are running our application after some time we see the below crash, could you provide some pointers to see the root cause of this kernel crash?

Below is the partial crash log, and the full log I have attached in this post/thread.

Jun 09 10:01:54 TSTAMP 2000/02/19 01:30:41:7
Jun 09 10:02:00 Last Packet RSSI: -59 Last Packet SNR: 69
Jun 09 10:02:09 TSTAMP 2000/02/19 01:30:56:9
Jun 09 10:02:11 Last Packet RSSI: -98 Last Packet SNR: 28
Jun 09 10:02:19 TSTAMP 2000/02/19 01:31:06:10
Jun 09 10:02:24 TSTAMP 2000/02/19 01:31:11:10
Jun 09 10:02:32 Last Packet RSSI: -97 Last Packet SNR: 29
Jun 09 10:02:39 TSTAMP 2000/02/19 01:31:26:12
Jun 09 10:02:44 TSTAMP 2000/02/19 01:31:31:13
Jun 09 10:02:49 TSTAMP 2000/02/19 01:31:36:13
Jun 09 10:02:54 TSTAMP 2000/02/19 01:31:41:14
Jun 09 10:02:59 TSTAMP 2000/02/19 01:31:46:14
Jun 09 10:03:04 Last Packet RSSI: -59 Last Packet SNR: 67
Jun 09 10:03:04 STAMP 2000/02/19 01:31:51:15
Jun 09 10:03:14 TSTAMP 2000/02/19 01:32:01:16
Jun 09 10:03:14 Last Packet RSSI: -98 Last Packet SNR: 29
Jun 09 10:03:17 [863305.026344] Unable to handle kernel paging request at virtual address 2e109000
Jun 09 10:03:17 [863305.029135] Unable to handle kernel paging request at virtual address 2e0fa000
Jun 09 10:03:17 [863305.029139] pgd = ed9f8900
Jun 09 10:03:17 [863305.029143] [2e0fa000] *pgd=ad06b003, *pmd=00000000
Jun 09 10:03:17 [863305.029156] Internal error: Oops: 206 [#1] PREEMPT SMP ARM
Jun 09 10:03:17 [863305.029161] Modules linked in: rpmsg_proto ti_prueth pru_rproc pruss pruss_intc pruss_soc_bus omap_remoteproc remoteproc xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4_tables x_tables br_netfilter bridge stp llc omap_aes_driver omap_sham omap_des des_generic rtc_ds1307 crypto_engine omap_crypto virtio_rpmsg_bus rpmsg_core sch_fq_codel
Jun 09 10:03:17 [863305.029262] CPU: 0 PID: 235 Comm: dockerd Not tainted 4.14.40-g4796173fc5 #4
Jun 09 10:03:17 [863305.029266] Hardware name: Generic DRA74X (Flattened Device Tree)
Jun 09 10:03:17 [863305.029270] task: edc04a40 task.stack: ed084000
Jun 09 10:03:17 [863305.029282] PC is at balance_dirty_pages_ratelimited+0x288/0x634
Jun 09 10:03:17 [863305.029286] LR is at 0x86
Jun 09 10:03:17 [863305.029291] pc : [<c02ebf3c>] lr : [<00000086>] psr: 600d0093
Jun 09 10:03:17 [863305.029295] sp : ed085d98 ip : 000001b8 fp : ed085dbc
Jun 09 10:03:17 [863305.029299] r10: 00000082 r9 : c0a109f4 r8 : 00000da6
Jun 09 10:03:17 [863305.029303] r7 : 0000025a r6 : ffffe000 r5 : edc2e438 r4 : 00000080
Jun 09 10:03:17 [863305.029306] r3 : 00000000 r2 : 00000001 r1 : 2e0fa000 r0 : 600d0013
Jun 09 10:03:17 [863305.029311] Flags: nZCv IRQs off FProcess dockerd (pid: 235, stack limit = 0xed084210)
Jun 09 10:03:17 [863305.029324] Stack: (0xed085d98 to 0xed086000)
Jun 09 10:03:17 [863305.029328] 5d80: c03cea00 ed085ee8
Jun 09 10:03:17 [863305.029334] 5da0: eb2649b4 0000025a 00000da6 c0a109f4 ed085e1c ed085dc0 c02de90c c02ebcc0
Jun 09 10:03:17 [863305.029341] 5dc0: 00000082 00000082 efc3588c 00000000 ed085dec ed084000 00000000 edb17480
Jun 09 10:03:17 [863305.029347] 5de0: 00178e28 00000000 efc3588c 00000000 38adf293 00000000 ed085f00 eb2649b4
Jun 09 10:03:17 [863305.029352] 5e00: eb2648c0 ed085ee8 edb17480 00000000 ed085e6c ed085e20 c02e0f30 c02de7cc
Jun 09 10:03:17 [863305.029358] 5e20: c02a6204 ed3de544 00000001 ed3de540 00000000 eea020c8 eea020c4 00000000
Jun 09 10:03:17 [863305.029363] 5e40: ed085e6c ed085f00 eb2648c0 00000082 eb2648c0 ed085ee8 eb264938 00000000
Jun 09 10:03:17 [863305.029369] 5e60: ed085ed4 ed085e70 c03bb8c8 c02e0e28 0000003b eea020bc ed013878 ed3dea94
Jun 09 10:03:17 0020000 ed085f5c 00000000 edb17480 ed085f78 ed085f78 00178da6
Jun 09 10:03:17 [863305.029385] 5ec0: 00000000 00000000 ed085f44 ed085ed8 c033cc1c c03bb758 00000082 c0344f54
Jun 09 10:03:17 [863305.029391] 5ee0: 03a2a580 00000082 00000001 00000000 00000000 ed085ee8 00000000 00000000
Jun 09 10:03:17 [863305.029396] 5f00: edb17480 00000000 00178da6 00000000 00000000 ed085e8c 00000000 00000000
Jun 09 10:03:17 [863305.029402] 5f20: 00000082 edb17480 03a2a580 ed085f78 00000000 00000082 ed085f74 ed085f48
Jun 09 10:03:17 [863305.029407] 5f40: c033cdf0 c033cb50 c035b2d4 c035b0dc edb17483 edb17480 00178da6 00000000
Jun 09 10:03:17 [863305.029413] 5f60: 03a2a580 00000082 ed085fa4 ed085f78 c033cfcc c033cd50 00178da6 00000000
Jun 09 10:03:17 [863305.029418] 5f80: 00000000 00000000 03a2a580 00000004 c0207e64 ed084000 00000000 ed085fa8
Jun 09 10:03:17 [863305.029423] 5fa0: c0207c80 c033cf94 00000000 00000000 00000013 03a2a580 00000082 00000000
Jun 09 10:03:17 [863305.029429] 5fc0: 00000000 00000000 033 00000000 00000000
Jun 09 10:03:17 [863305.029437] Backtrace:
Jun 09 10:03:17 [863305.029453] [<c02ebcb4>] (balance_dirty_pages_ratelimited) from [<c02de90c>] (generic_perform_write+0x14c/0x1ac)
Jun 09 10:03:17 [863305.029461] r9:c0a109f4 r8:00000da6 r7:0000025a r6:eb2649b4 r5:ed085ee8 r4:c03cea00
Jun 09 10:03:17 [863305.029471] [<c02de7c0>] (generic_perform_write) from [<c02e0f30>] (__generic_file_write_iter+0x114/0x1d4)
Jun 09 10:03:17 [863305.029478] r10:00000000 r9:edb17480 r8:ed085ee8 r7:eb2648c0 r6:eb2649b4 r5:ed085f00
Jun 09 10:03:17 [863305.029482] r4:00000000
Jun 09 10:03:17 [863305.029492] [<c02e0e1c>] (__generic_file_write_iter) from [<c03bb8c8>] (ext4_file_write_iter+0x17c/0x434)
Jun 09 10:03:17 [863305.029498] r10:00000000 r9:eb264938 r8:ed085ee8 r7:eb2648c0 r6:00000082 r5:eb2648c0
Jun 09 10:03:17 [863305.029501] r4:ed085f00
Jun 09 10:03:17 [863305.029510] [<c03bb74c>] (ext4_file_write_iter) from [<c033cc1c>] (__vfs_write+0xd8/0x128)
Jun 09 10:03:17 [863305.029515] r10:00000000 r9:00000000 r8:033cdf0>] (vfs_write+0xac/0x170)
Jun 09 10:03:17 [863305.029533] r9:00000082 r8:00000000 r7:ed085f78 r6:03a2a580 r5:edb17480 r4:00000082
Jun 09 10:03:17 [863305.029540] [<c033cd44>] (vfs_write) from [<c033cfcc>] (SyS_write+0x44/0x98)
Jun 09 10:03:17 [863305.029547] r9:00000082 r8:03a2a580 r7:00000000 r6:00178da6 r5:edb17480 r4:edb17483
Jun 09 10:03:17 [863305.029557] [<c033cf88>] (SyS_write) from [<c0207c80>] (ret_fast_syscall+0x0/0x4c)
Jun 09 10:03:17 [863305.029564] r9:ed084000 r8:c0207e64 r7:00000004 r6:03a2a580 r5:00000000 r4:00000000
Jun 09 10:03:17 [863305.029571] Code: 1a000086 e10f0000 f10c0080 ee1d1f90 (e7932001)
Jun 09 10:03:17 [863305.029577] ---[ end trace 8bb6ecc9bd04fcf9 ]---
Jun 09 10:03:17 [863305.029597] note: dockerd[235] exited with preempt_count 1
Jun 09 10:03:17 [863305.484892] pgd = ecef8540
Jun 09 10:03:17 [863305.487695] [2e109000] *pgd=acefd003, *pmd=00000000
Jun 09 10:03:17 [863305.492692] Internal error: Oops: 206 [#2] PREEMPT SMP ARM
Jun 09 10:03:17 [863305.498285] Modules linked in: rpmsg_proto ti_frm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables br_netfilter bridge stp llc omap_aes_driver omap_sham omap_des des_generic rtc_ds1307 crypto_engine omap_crypto virtio_rpmsg_bus rpmsg_core sch_fq_codel
Jun 09 10:03:17 [863305.539696] CPU: 1 PID: 1230 Comm: eventlog.am5748 Tainted: G D 4.14.40-g4796173fc5 #4
Jun 09 10:03:17 [863305.548866] Hardware name: Generic DRA74X (Flattened Device Tree)
Jun 09 10:03:17 [863305.555072] task: ece80000 task.stack: ecdfc000
Jun 09 10:03:17 [863305.559712] PC is at balance_dirty_pages_ratelimited+0x288/0x634
Jun 09 10:03:17 [863305.565830] LR is at 0x28
Jun 09 10:03:17 [863305.568548] pc : [<c02ebf3c>] lr : [<00000028>] psr: 60070093
Jun 09 10:03:17 [863305.574927] sp : ecdfdd98 ip : 000001b8 fp : ecdfddbc
Jun 09 10:03:17 [863305.580260] r10: 00000258 r9 : c0a109f4 r8 : 00000c30

Regards,
Snehal
It seems like you have encountered a kernel panic with Oops message. The Oops message indicates that the kernel has detected an internal error, which is usually caused by a software bug or hardware malfunction. This particular Oops message is related to a memory access issue. The kernel was unable to handle a paging request at a virtual address, which is usually caused when the kernel tries to access an invalid memory location.

One way to investigate further is to examine the stack trace and register dump in the Oops message, which may give you some hints on which part of the kernel was executing when the panic occurred. Additionally, you can also check the system logs to see if there were any other error messages leading up to this crash.

While there may not be an easy solution, there are some general steps to take to try to diagnose and resolve such issues:

1. Check for any bug reports or known issues related to your kernel or hardware platform.

2. Ensure that the system is running with the latest firmware and kernel patches.

3. Check if there are any third-party kernel modules or drivers that could be causing the issue, and try removing them to see if the problem persists.

4. If possible, try reproducing the issue on a similar hardware platform to rule out hardware issues.

5. Try running stress tests or other diagnostic tools to see if you can reproduce the panic.

If you're still unable to resolve the issue, it might be helpful to seek assistance from the Linux community or from your hardware vendor.
 

Staff online


Top