明远智睿技术论坛

标题: 运行系统后,系统崩溃,求解决 [打印本页]

作者: fengsheng0535    时间: 2016-10-19 09:24
标题: 运行系统后,系统崩溃,求解决

1.问题描述:程序运行,出现系统崩溃,使用处理器imx6q.监控问题如下:

Unable to handle kernel NULL pointer dereference at virtual address 00000000
pgd = 80004000
[00000000] *pgd=00000000
Internal error: Oops: 17 [#1] PREEMPT SMP
Modules linked in:
CPU: 2    Not tainted  (3.0.35-2666-gbdde708 #21)
PC is at smp_call_function_single+0xac/0x1d8
LR is at twd_cpufreq_transition+0x48/0x58
pc : [<800a5498>]    lr : [<8004a9fc>]    psr: 600b0013
sp : bfd51e28  ip : 00000000  fp : 80b67cc0
r10: bfd51ef8  r9 : 00000001  r8 : 8004a894
r7 : 8058a29c  r6 : 00000002  r5 : 00000000  r4 : bfd50000
r3 : 00000001  r2 : 00000000  r1 : 00000000  r0 : 80b67abc
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
Control: 10c53c7d  Table: 4f8d004a  DAC: 00000015
Process kworker/2:1 (pid: 1333, stack limit = 0xbfd502f0)
Stack: (0xbfd51e28 to 0xbfd52000)
1e20:                   00000040 80096c1c 00000000 00000000 00000000 00000000
1e40: 00000000 00000000 00000000 ffffffff 00000000 80ba2690 bfd51ef8 00000001
1e60: bfd51ef8 8004a9fc 8004a9b4 80096a18 80bda56c 80bda554 00000000 00000000
1e80: ffffffff 80096b68 00000000 80053924 bfd51ef8 bfdd1300 00000000 00000001
1ea0: 8003c000 80b67b00 8058a2a0 80096b9c 00000000 00000004 00000004 803df794
1ec0: 00789fc0 00000001 00000004 bfd51ef8 80b67ac4 80068dc4 bfd51ef4 80096d04
1ee0: 8c018f40 00000000 00000000 00000004 bfd51f24 00000001 00000000 000f32a0
1f00: 000c15c0 00000001 bfd50000 80b67abc 0000001f 00000000 80b67b00 80b67cc0
1f20: 8c008d90 8003cd90 8003cd90 803def34 000f32a0 000c15c0 80b67abc 803e3720
1f40: 00000001 80bda5d4 bff128c0 8c0182e0 8c01e900 00000000 00000000 803e362c
1f60: bfd50000 8008cb10 8c0182e0 bfd50000 8003d400 bff128c0 8c0182e0 bff128d0
1f80: bfd50000 8003d400 8003d400 80b67cc0 80bbdd60 8008d09c 00000000 00000000
1fa0: bfd51fc4 bffb1f14 bff128c0 8008cf64 00000013 00000000 00000000 00000000
1fc0: 00000000 80091884 80044c38 00000000 bff128c0 00000000 00000000 00000000
1fe0: bfd51fe0 bfd51fe0 bffb1f14 80091804 80044c38 80044c38 1969d402 181001cf
[<800a5498>] (smp_call_function_single+0xac/0x1d8) from [<8004a9fc>] (twd_cpufreq_transition+0x48/0x58)
[<8004a9fc>] (twd_cpufreq_transition+0x48/0x58) from [<80096a18>] (notifier_call_chain+0x44/0x84)
[<80096a18>] (notifier_call_chain+0x44/0x84) from [<80096b68>] (__srcu_notifier_call_chain+0x44/0x60)
[<80096b68>] (__srcu_notifier_call_chain+0x44/0x60) from [<80096b9c>] (srcu_notifier_call_chain+0x18/0x20)
[<80096b9c>] (srcu_notifier_call_chain+0x18/0x20) from [<803df794>] (cpufreq_notify_transition+0xa0/0xe0)
[<803df794>] (cpufreq_notify_transition+0xa0/0xe0) from [<80068dc4>] (mxc_set_target+0x1b4/0x2b8)
[<80068dc4>] (mxc_set_target+0x1b4/0x2b8) from [<803def34>] (__cpufreq_driver_target+0x4c/0x60)
[<803def34>] (__cpufreq_driver_target+0x4c/0x60) from [<803e3720>] (cpufreq_interactive_freq_down+0xf4/0x128)
[<803e3720>] (cpufreq_interactive_freq_down+0xf4/0x128) from [<8008cb10>] (process_one_work+0x110/0x39c)
[<8008cb10>] (process_one_work+0x110/0x39c) from [<8008d09c>] (worker_thread+0x138/0x2f4)
[<8008d09c>] (worker_thread+0x138/0x2f4) from [<80091884>] (kthread+0x80/0x88)
[<80091884>] (kthread+0x80/0x88) from [<80044c38>] (kernel_thread_exit+0x0/0x8)
Code: e5970000 a1a0c005 e1a0c2cc e205101f (e790010c)
---[ end trace d874eab6561f0fd6 ]---
note: kworker/2:1[1333] exited with preempt_count 1
Unable to handle kernel paging request at virtual address fffffffc
pgd = 80004000
[fffffffc] *pgd=4fffe821, *pte=00000000, *ppte=00000000
Internal error: Oops: 17 [#2] PREEMPT SMP
Modules linked in:
CPU: 2    Tainted: G      D      (3.0.35-2666-gbdde708 #21)
PC is at kthread_data+0x4/0xc
LR is at wq_worker_sleeping+0xc/0xd4
pc : [<80091a44>]    lr : [<8008deec>]    psr: 200b0193
sp : bfd51b48  ip : 00000400  fp : bfd51bf4
r10: 00000002  r9 : bff8c000  r8 : bfd2b0b8
r7 : bfd2af20  r6 : 8003cf40  r5 : bfd50000  r4 : 00000002
r3 : 00000000  r2 : 00000000  r1 : 00000002  r0 : bfd2af20
Flags: nzCv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 10c53c7d  Table: 4f8d004a  DAC: 00000015
Process kworker/2:1 (pid: 1333, stack limit = 0xbfd502f0)
Stack: (0xbfd51b48 to 0xbfd52000)
1b40:                   8c018f40 80585ba4 bfcdf000 00000000 00000535 80108798
1b60: 00000002 8bffb200 0000340a 80582698 8bf41500 8003cf40 8003cf40 8003c1b4
1b80: 80b67cc0 8007a208 0bfdc000 800ee550 00000001 8007a208 00000000 bfd51bc0
1ba0: 80b67cc0 80bb81b8 00000000 bfd2af20 00000002 bfd51bc0 00000000 8007a108
1bc0: 8003c260 bfd90520 00000000 00000000 bfd51bd0 ffffffff bfd2af18 bfd2af20
1be0: bfd2af18 bfd2b03c bff8c000 00000000 bfd2b03c 8007b490 00000000 bfd51c10
1c00: bfd50000 00000001 00000008 bfd2b084 bfd51c10 bfd51c10 800a549a bfd50000
1c20: 00000000 bfd51c82 00000001 800a549a 800a549c 00000000 00000008 80047890
1c40: bfd502f0 0000000b 00000000 00000000 6500021e 30373935 20303030 30613161
1c60: 35303063 61316520 63326330 32652063 30313530 28206631 30393765 63303130
1c80: 20002029 bfd51ef8 80b67cc0 00000000 00000017 00000000 bfd51de0 bfd51de0
1ca0: 200b0113 bfd51ef8 80b67cc0 805803c0 bfd2af20 8004eab8 bffbf95c 00000000
1cc0: 3e4ec481 0001df2a 00000000 7c18df8a 0000021e 00006219 131657c8 bfd51d0c
1ce0: 000061ec 8c0184b8 000061ec 8c018fb8 7ca054a0 0000021e 7ca054a0 00007e4e
1d00: 00000000 f1950239 00000244 00006b93 e01568f7 bfd51d44 bfd51d4c 00000017
1d20: 8004e884 80b6b628 00000000 bfd51de0 200b0113 bfd51ef8 80b67cc0 8003e374
1d40: bfd2a0d8 8003cf40 bfd2af20 bfd2af58 bfd51d84 8006df0c 00000002 8c018f40
1d60: 8c018f40 80589eb4 bfd2af20 8c018f40 000315c0 00000400 00000000 00000400
1d80: bffc18d0 80071f7c 00000400 00000400 00000001 bfd51ec4 00000002 00000000
1da0: 00000000 00000000 00000002 00000002 bffd1780 ffffffff 8003cf40 00000000
1dc0: 00000001 bffc1900 0000040f 00000007 00000002 8058a29c 8004a894 80043b10
1de0: 80b67abc 00000000 00000000 00000001 bfd50000 00000000 00000002 8058a29c
1e00: 8004a894 00000001 bfd51ef8 80b67cc0 00000000 bfd51e28 8004a9fc 800a5498
1e20: 600b0013 ffffffff 00000040 80096c1c 00000000 00000000 00000000 00000000
1e40: 00000000 00000000 00000000 ffffffff 00000000 80ba2690 bfd51ef8 00000001
1e60: bfd51ef8 8004a9fc 8004a9b4 80096a18 80bda56c 80bda554 00000000 00000000
1e80: ffffffff 80096b68 00000000 80053924 bfd51ef8 bfdd1300 00000000 00000001
1ea0: 8003c000 80b67b00 8058a2a0 80096b9c 00000000 00000004 00000004 803df794
1ec0: 00789fc0 00000001 00000004 bfd51ef8 80b67ac4 80068dc4 bfd51ef4 80096d04
1ee0: 8c018f40 00000000 00000000 00000004 bfd51f24 00000001 00000000 000f32a0
1f00: 000c15c0 00000001 bfd50000 80b67abc 0000001f 00000000 80b67b00 80b67cc0
1f20: 8c008d90 8003cd90 8003cd90 803def34 000f32a0 000c15c0 80b67abc 803e3720
1f40: 00000001 80bda5d4 bff128c0 8c0182e0 8c01e900 00000000 00000000 803e362c
1f60: bfd50000 8008cb10 8c0182e0 bfd50000 8003d400 bff128c0 8c0182e0 bff128d0
1f80: bfd50000 8003d400 8003d400 80b67cc0 80bbdd60 8008d09c 00000000 00000000
1fa0: bfd51fc4 bffb1f14 bff128c0 8008cf64 00000013 00000000 00000000 00000000
1fc0: 00000000 80091884 80044c38 00000000 bff128c0 00000001 00000000 00000000
1fe0: bfd51fe0 bfd51fe0 bffb1f14 80091804 80044c38 80044c38 1969d402 181001cf
[<80091a44>] (kthread_data+0x4/0xc) from [<8008deec>] (wq_worker_sleeping+0xc/0xd4)
[<8008deec>] (wq_worker_sleeping+0xc/0xd4) from [<80585ba4>] (__schedule+0x384/0x6e8)
[<80585ba4>] (__schedule+0x384/0x6e8) from [<8007b490>] (do_exit+0x44c/0x6d8)
[<8007b490>] (do_exit+0x44c/0x6d8) from [<80047890>] (die+0x21c/0x290)
[<80047890>] (die+0x21c/0x290) from [<805803c0>] (__do_kernel_fault.part.3+0x54/0x74)
[<805803c0>] (__do_kernel_fault.part.3+0x54/0x74) from [<8004eab8>] (do_page_fault+0x234/0x2f0)
[<8004eab8>] (do_page_fault+0x234/0x2f0) from [<8003e374>] (do_DataAbort+0x34/0x9c)
[<8003e374>] (do_DataAbort+0x34/0x9c) from [<80043b10>] (__dabt_svc+0x70/0xa0)
Exception stack(0xbfd51de0 to 0xbfd51e28)
1de0: 80b67abc 00000000 00000000 00000001 bfd50000 00000000 00000002 8058a29c
1e00: 8004a894 00000001 bfd51ef8 80b67cc0 00000000 bfd51e28 8004a9fc 800a5498
1e20: 600b0013 ffffffff
[<80043b10>] (__dabt_svc+0x70/0xa0) from [<800a5498>] (smp_call_function_single+0xac/0x1d8)
[<800a5498>] (smp_call_function_single+0xac/0x1d8) from [<8004a9fc>] (twd_cpufreq_transition+0x48/0x58)
[<8004a9fc>] (twd_cpufreq_transition+0x48/0x58) from [<80096a18>] (notifier_call_chain+0x44/0x84)
[<80096a18>] (notifier_call_chain+0x44/0x84) from [<80096b68>] (__srcu_notifier_call_chain+0x44/0x60)
[<80096b68>] (__srcu_notifier_call_chain+0x44/0x60) from [<80096b9c>] (srcu_notifier_call_chain+0x18/0x20)
[<80096b9c>] (srcu_notifier_call_chain+0x18/0x20) from [<803df794>] (cpufreq_notify_transition+0xa0/0xe0)
[<803df794>] (cpufreq_notify_transition+0xa0/0xe0) from [<80068dc4>] (mxc_set_target+0x1b4/0x2b8)
[<80068dc4>] (mxc_set_target+0x1b4/0x2b8) from [<803def34>] (__cpufreq_driver_target+0x4c/0x60)
[<803def34>] (__cpufreq_driver_target+0x4c/0x60) from [<803e3720>] (cpufreq_interactive_freq_down+0xf4/0x128)
[<803e3720>] (cpufreq_interactive_freq_down+0xf4/0x128) from [<8008cb10>] (process_one_work+0x110/0x39c)
[<8008cb10>] (process_one_work+0x110/0x39c) from [<8008d09c>] (worker_thread+0x138/0x2f4)
[<8008d09c>] (worker_thread+0x138/0x2f4) from [<80091884>] (kthread+0x80/0x88)
[<80091884>] (kthread+0x80/0x88) from [<80044c38>] (kernel_thread_exit+0x0/0x8)
Code: eaff9870 8058a210 80a80b5c e590316c (e5130004)
INFO: rcu_preempt_state detected stalls on CPUs/tasks: { 2} (detected by 1, t=6002 jiffies)



作者: 软件01    时间: 2016-10-19 11:23
你是不是跑了自己的程序后就跑飞?还是直接启动后就跑飞?
作者: fengsheng0535    时间: 2016-10-19 14:01
软件01 发表于 2016-10-19 11:23
你是不是跑了自己的程序后就跑飞?还是直接启动后就跑飞?

运行我们程序,几天后,崩溃。
作者: xswyzao    时间: 2016-10-20 18:02
PC is at smp_call_function_single+0xac/0x1d8

好象是smp_call_function_single问题




欢迎光临 明远智睿技术论坛 (http://bbs.myzr.com.cn/) Powered by Discuz! X3.2