Re: CPSW bug with AM437x SK

2014-10-06 Thread Mugunthan V N
On Friday 03 October 2014 06:34 AM, Felipe Balbi wrote:
 [  261.177168] [c0648d48] (skb_panic) from [c0565edc] (skb_put+0x5c/0x60)
 [  261.184415] [c0565edc] (skb_put) from [c0605aac] 
 (unix_stream_sendmsg+0x164/0x390)
 [  261.192712] [c0605aac] (unix_stream_sendmsg) from [c055b364] 
 (sock_aio_write+0xdc/0xfc)
 [  261.201475] [c055b364] (sock_aio_write) from [c014c42c] 
 (do_sync_write+0x8c/0xb4)
 [  261.209697] [c014c42c] (do_sync_write) from [c014cf70] 
 (vfs_write+0x118/0x1c0)
 [  261.217652] [c014cf70] (vfs_write) from [c014d564] 
 (SyS_write+0x4c/0xa0)
 [  261.225054] [c014d564] (SyS_write) from [c000ed40] 
 (ret_fast_syscall+0x0/0x48)
 [  261.232988] Code: e58d4008 e58de00c e59f0008 ebfff48e (e7f001f2) 
 [  261.239378] ---[ end trace d64258d586f40104 ]---

The BT shows that the warn came from a unix socket interface, so this
cannot be a CPSW bug, its a bug in unix socket.

Are you not seeing this issue with file system in any other media?

I will try to reproduce this locally with my AM437x EVMsk.

Regards
Mugunthan V N
--
To unsubscribe from this list: send the line unsubscribe linux-omap in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: CPSW bug with AM437x SK

2014-10-06 Thread Felipe Balbi
Hi,

On Mon, Oct 06, 2014 at 03:24:59PM +0530, Mugunthan V N wrote:
 On Friday 03 October 2014 06:34 AM, Felipe Balbi wrote:
  [  261.177168] [c0648d48] (skb_panic) from [c0565edc] 
  (skb_put+0x5c/0x60)
  [  261.184415] [c0565edc] (skb_put) from [c0605aac] 
  (unix_stream_sendmsg+0x164/0x390)
  [  261.192712] [c0605aac] (unix_stream_sendmsg) from [c055b364] 
  (sock_aio_write+0xdc/0xfc)
  [  261.201475] [c055b364] (sock_aio_write) from [c014c42c] 
  (do_sync_write+0x8c/0xb4)
  [  261.209697] [c014c42c] (do_sync_write) from [c014cf70] 
  (vfs_write+0x118/0x1c0)
  [  261.217652] [c014cf70] (vfs_write) from [c014d564] 
  (SyS_write+0x4c/0xa0)
  [  261.225054] [c014d564] (SyS_write) from [c000ed40] 
  (ret_fast_syscall+0x0/0x48)
  [  261.232988] Code: e58d4008 e58de00c e59f0008 ebfff48e (e7f001f2) 
  [  261.239378] ---[ end trace d64258d586f40104 ]---
 
 The BT shows that the warn came from a unix socket interface, so this
 cannot be a CPSW bug, its a bug in unix socket.
 
 Are you not seeing this issue with file system in any other media?

Have not tried with other media, but since it comes from vfs_write() and
my rootfs sits in NFS I figured that might be the cause. Could not
reproduce this with BeagleBone Black, btw.

 I will try to reproduce this locally with my AM437x EVMsk.

alright.

-- 
balbi


signature.asc
Description: Digital signature


CPSW bug with AM437x SK

2014-10-02 Thread Felipe Balbi
Hi Mugunthan,

I noticed that *really* rarely I get the skb panic below. What I have
here is an AM437x SK running v3.17-rc6, with NFS root. Once booted, then
I run cyclictest and hackbench (this one in an infinite loop) an
eventually this will trigger.

File system is mounted as read-only and another board (BBB) is also
mounting the exact same NFS root also as read-only.

It takes a while to reproduce but it is the second time I managed to
reproduce with the exact same setup. .config attached.

[  260.881326] skbuff: skb_over_panic: text:c0605aac len:100 put:100 head:  
(null) data:  (null) tail:0x64 end:0x0 dev:-
[  260.892732] [ cut here ]
[  260.897590] kernel BUG at net/core/skbuff.c:100!
[  260.902441] Internal error: Oops - BUG: 0 [#1] SMP ARM
[  260.907820] Modules linked in: xhci_hcd snd_soc_davinci_mcasp snd_soc_edma 
snd_soc_omap snd_soc_evm snd_soc_tlv320aic3x snd_soc_core dwc3 snd_compress 
omapdrm snd_pcm_dmaengine snd_pcm snd_timer snd fb_sys_fops lis3lv02d_i2c 
panel_dpi matrix_keypad lis3lv02d dwc3_omap input_polldev soundcore
[  260.935072] CPU: 0 PID: 8997 Comm: hackbench Not tainted 
3.17.0-rc6-00456-gd8da063-dirty #223
[  260.944015] task: ead16d80 ti: ec084000 task.ti: ec084000
[  260.949693] PC is at skb_panic+0x64/0x70
[  260.953824] LR is at vprintk_emit+0x258/0x5e0
[  260.958386] pc : [c0648d48]lr : [c009459c]psr: 600f0013
[  260.958386] sp : ec085db8  ip : ec085d20  fp : ec085dec
[  260.970435] r10:   r9 : e8881ac0  r8 : 0001
[  260.975909] r7 : c087e79c  r6 :   r5 : 0064  r4 : 
[  260.982747] r3 : ead16d80  r2 :   r1 : edfb5544  r0 : 006a
[  260.989599] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[  260.997090] Control: 10c5387d  Table: a91c0059  DAC: 0015
[  261.003116] Process hackbench (pid: 8997, stack limit = 0xec084248)
[  261.009674] Stack: (0xec085db8 to 0xec086000)
[  261.014233] 5da0:   
0064 
[  261.022817] 5dc0:  0064  ea9ed240 0064 0064 
 
[  261.031393] 5de0: ec085e0c ec085df0 c0565edc c0648cf0 0064 e8881cac 
e893e1c0 
[  261.039955] 5e00: ec085e7c ec085e10 c0605aac c0565e8c ec085e38 0003 
c064e674 e893e254
[  261.048537] 5e20: ec085e80 ec085ea0 e893e4d4 0001 0064 ece0e840 
 
[  261.057108] 5e40:     c00899e0 ece0e840 
e893f940 0064
[  261.065686] 5e60: 0064 0064 bed59b48  ec085edc ec085e80 
c055b364 c0605954
[  261.074259] 5e80:  c018b704 ec085ee4 0064 ece0e840 c0089d60 
ec085e3c ec085ea0
[  261.082843] 5ea0:   ec085ee8 0001   
 ec085ef0
[  261.091397] 5ec0:    ec085f78 ec085f44 ec085ee0 
c014c42c c055b294
[  261.099953] 5ee0:   bed59b48 0064 e893f940  
 ec085e80
[  261.108502] 5f00: ead16d80      
0064 
[  261.117089] 5f20:   e893f940 e893f940 bed59b48 ec085f78 
ec085f74 ec085f48
[  261.125662] 5f40: c014cf70 c014c3ac 0001 c016a9d8   
e893f940 e893f940
[  261.134242] 5f60: 0064 bed59b48 ec085fa4 ec085f78 c014d564 c014ce64 
 
[  261.142843] 5f80: 0064 00024c6c bed59b48 0004 c000efc4 ec084000 
 ec085fa8
[  261.151417] 5fa0: c000ed40 c014d524 0064 00024c6c 000c bed59b48 
0064 0014
[  261.159992] 5fc0: 0064 00024c6c bed59b48 0004 0004 00024c50 
000221ac 
[  261.168555] 5fe0:  bed59b44 000113a1 b6f204d6 600f0030 000c 
 
[  261.177168] [c0648d48] (skb_panic) from [c0565edc] (skb_put+0x5c/0x60)
[  261.184415] [c0565edc] (skb_put) from [c0605aac] 
(unix_stream_sendmsg+0x164/0x390)
[  261.192712] [c0605aac] (unix_stream_sendmsg) from [c055b364] 
(sock_aio_write+0xdc/0xfc)
[  261.201475] [c055b364] (sock_aio_write) from [c014c42c] 
(do_sync_write+0x8c/0xb4)
[  261.209697] [c014c42c] (do_sync_write) from [c014cf70] 
(vfs_write+0x118/0x1c0)
[  261.217652] [c014cf70] (vfs_write) from [c014d564] (SyS_write+0x4c/0xa0)
[  261.225054] [c014d564] (SyS_write) from [c000ed40] 
(ret_fast_syscall+0x0/0x48)
[  261.232988] Code: e58d4008 e58de00c e59f0008 ebfff48e (e7f001f2) 
[  261.239378] ---[ end trace d64258d586f40104 ]---

-- 
balbi
#
# Automatically generated file; DO NOT EDIT.
# Linux/arm 3.17.0-rc6 Kernel Configuration
#
CONFIG_ARM=y
CONFIG_ARM_HAS_SG_CHAIN=y
CONFIG_MIGHT_HAVE_PCI=y
CONFIG_SYS_SUPPORTS_APM_EMULATION=y
CONFIG_HAVE_PROC_CPU=y
CONFIG_STACKTRACE_SUPPORT=y
CONFIG_LOCKDEP_SUPPORT=y
CONFIG_TRACE_IRQFLAGS_SUPPORT=y
CONFIG_RWSEM_XCHGADD_ALGORITHM=y
CONFIG_ARCH_HAS_BANDGAP=y
CONFIG_GENERIC_HWEIGHT=y
CONFIG_GENERIC_CALIBRATE_DELAY=y
CONFIG_NEED_DMA_MAP_STATE=y
CONFIG_ARCH_SUPPORTS_UPROBES=y
CONFIG_VECTORS_BASE=0x
CONFIG_ARM_PATCH_PHYS_VIRT=y
CONFIG_GENERIC_BUG=y