42 Star 54 Fork 375

OpenHarmony / kernel_linux_5.10

 / 详情

【OpenHarmony】【LTS3.0】反复开关机测试过程中发生kernel panic,无法进入系统

已取消
缺陷
创建于  
2021-12-20 10:52

【模块名_概率】简要描述:
反复开关机测试过程中发生kernel panic,无法进入系统
【环境信息】:

  • 网络环境
    无网络
  • 硬件开发板型号
    Hi3516DV300开发板
  • 软件版本信息或tag节点
    openharmony3.0LTS分支版本
  • 测试环境
  • 其他

【预置条件】:

【测试步骤】:
通过串口每隔60秒发送一次reboot命令,触发单板重启,反复执行10000次
【预期结果】:
正常重启,无不开机、开机挂死等问题
【实际结果】:
概率出现重启后开机过程panic,无法进入系统
【恢复手段】:
手动上下电后恢复
【出现概率】:问题出现次数/实际测试次数
1/600
【定位信息】:

    1. Log、截图、多媒体文件等,所有和问题有关的信息:

binder_transaction: 2 callbacks suppressed
binder: 124:152 got transaction to context manager from process owning it
01-01 03:57:46.780 147 147 D 01800/Samgr: Judge Auth<IMS, (null)> ret:0
01-01 03:57:46.780 147 147 D 01800/Samgr: Find Feature<IMS, (null)> id<7, 1> ret:0
01-01 03:57:46.780 152 152 I 01800/Samgr: Create remote sa proxy[0xb6ba7b04]<IMS, (null)>!
01-01 03:57:46.780 152 152 I 00000/PowerMgr: [screen_saver_handler.cpp] SetEnableLocked# Succeed to enable screen saver
random: crng init done
reboot

01-01 03:58:18.640 1 1 I 00719/Init: SigHandler : SigHandler, SIGT[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 64
ERM received.
01-01 03:58:18.640 1 1 I [hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 59
00719/Init: ServiceStop : stop service s[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 72
hell, pid 122.
01-01 03:58:18.641 1 1 I[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 56
00719/Init: ServiceStop : stop service [hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 58
foundation, pid 124.
[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 57
[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 68
[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 69
[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 71
[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 65
[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 67
[hiirq: ,line:567]osal_wait_event_interruptible return error:-512, irq: 60
binder: release 132:132 transaction 500 out, still active
mmz_userdev:mmz_userdev_release:
binder: undelivered TRANSACTION_COMPLETE
MMB LEAK(pid=128): 0xB2C57000, 1843200 bytes, ''
mmz_userdev:mmz_userdev_release:
binder: release 131:131 transaction 324 out, still active
mmb<0xb2c57000> mapped to userspace 0x5d5bfa40 will be unmapped!
binder: undelivered TRANSACTION_COMPLETE
Enter hiirq_release.
binder: release 129:185 transaction 324 in, still active
8<--- cut here ---
mmz_userdev:mmz_userdev_release:
Unable to handle kernel NULL pointer dereference at virtual address 00000000
MMB LEAK(pid=127): 0xA9002000, 32768 bytes, 'sys_scale_coef'
pgd = cd4f0a79
mmz_userdev:mmz_userdev_release:
[00000000] *pgd=00000000
mmb<0xa9002000> mapped to userspace 0xcd892db7 will be unmapped!

mmz_userdev:mmz_userdev_release:
Internal error: Oops: 805 [#1] SMP ARM
MMB LEAK(pid=127): 0xA900A000, 114688 bytes, 'gdc_node_buf'
Modules linked in:
mmz_userdev:mmz_userdev_release:
hi_mipi_rx(O)
mmb<0xa900a000> mapped to userspace 0xe684bdf7 will be unmapped!
hi3516cv500_hdmi(O)
mmz_userdev:mmz_userdev_release:
hifb(O)
MMB LEAK(pid=127): 0xA9026000, 4096 bytes, 'GDC int_pole_coef'
hi3516cv500_vo_dev(O)
mmz_userdev:mmz_userdev_release:
hi3516cv500_tde(O)
mmb<0xa9026000> mapped to userspace 0xa227219a will be unmapped!
hi3516cv500_sys(O)
mmz_userdev:mmz_userdev_release:
hi3516cv500_base(O)
MMB LEAK(pid=127): 0xA9027000, 503808 bytes, 'VGS_NodeBuf'
sys_config(O)
mmz_userdev:mmz_userdev_release:
hi_proc(PO)
mmb<0xa9027000> mapped to userspace 0x85bf24ed will be unmapped!
hi_irq(O)
mmz_userdev:mmz_userdev_release:
hi_osal(O)
MMB LEAK(pid=127): 0xA90A2000, 4096 bytes, 'dis_node_buf'

mmz_userdev:mmz_userdev_release:
mmb<0xa90a2000> mapped to userspace 0x6aa4c361 will be unmapped!
CPU: 0 PID: 50 Comm: kworker/0:2 Tainted: P O 5.10.57 #1
mmz_userdev:mmz_userdev_release:
Hardware name: Generic DT based system
MMB LEAK(pid=127): 0xA90A3000, 217088 bytes, 'IVE_QUEUE'
Workqueue: events binder_deferred_func
mmz_userdev:mmz_userdev_release:

mmb<0xa90a3000> mapped to userspace 0xcbda1c4d will be unmapped!
PC is at hiirq_interrupt+0x398/0x578 [hi_irq]
mmz_userdev:mmz_userdev_release:
LR is at hiirq_interrupt+0x1f0/0x578 [hi_irq]
MMB LEAK(pid=127): 0xA90D8000, 4096 bytes, 'IVE_TEMP_NODE'
pc : [] lr : [] psr: 20000193
mmz_userdev:mmz_userdev_release:
sp : c1c57d08 ip : 15711571 fp : c14f5700
mmb<0xa90d8000> mapped to userspace 0xd499310e will be unmapped!
r10: 00000000 r9 : c1c57d10 r8 : c0d04e88
mmz_userdev:mmz_userdev_release:
r7 : 00000000 r6 : b692f47c r5 : 00000000 r4 : c142b240
MMB LEAK(pid=127): 0xA90D9000, 65536 bytes, 'SVP_NNIE_QUEUE'
r3 : 00000003 r2 : 00000001 r1 : c142b2a0 r0 : c1c57d18
mmz_userdev:mmz_userdev_release:
Flags: nzCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment none
mmb<0xa90d9000> mapped to userspace 0xc62a574a will be unmapped!
Control: 10c5387d Table: 826f806a DAC: 00000051
mmz_userdev:mmz_userdev_release:
Process kworker/0:2 (pid: 50, stack limit = 0x58b83856)
MMB LEAK(pid=127): 0xA90E9000, 16384 bytes, 'SVP_NNIE_MODLE_FROM_USER_BUFF'
Stack: (0xc1c57d08 to 0xc1c58000)
mmz_userdev:mmz_userdev_release:
mmb<0xa90e9000> mapped to userspace 0x7c3c14f3 will be unmapped!
7d00: c0dbc6d8 60000193 00000000 00000001 00000003 00000001
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xA90ED000, 22675456 bytes, 'vb_pool'
7d20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAA68D000, 4096 bytes, 'vb_pool_sup_nc'
7d40: c0dbc313 d764609d c1c57d98 c14f576c 00000000 0000003c c28fc340 c0d90de9
mmz_userdev:mmz_userdev_release:
mmb<0xaa68d000> mapped to userspace 0x710ddc3a will be unmapped!
7d60: c14f5700 c0175474 00000000 c0d0d084 c14f5784 c14f5700 c14f576c c14f5700
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAA68E000, 4096 bytes, 'vb_pool_sup_c'
7d80: c0d04e88 c0c4c494 c0c4c4a0 00000000 c1c57ea4 c0175674 00000000 d764609d
mmz_userdev:mmz_userdev_release:
mmb<0xaa68e000> mapped to userspace 0x8d4b2c31 will be unmapped!
7da0: c14f576c c14f5718 c14f5700 c0d05168 c1c57ea4 c017a6d4 00000000 c140c000
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAA68F000, 9334784 bytes, 'vb_pool'
7dc0: 00000001 00000000 c1c57ea4 c0174604 c1c57e08 c0d78b3c c8802000 c880200c
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAAF76000, 4096 bytes, 'vb_pool_sup_nc'
7de0: c0d05168 c0427b58 c016fb74 60000013 ffffffff c1c57e3c 00000038 c1c56000
mmz_userdev:mmz_userdev_release:
mmb<0xaaf76000> mapped to userspace 0xb8b0dc58 will be unmapped!
7e00: c1c57ea4 c010128c 60000093 06282000 c0c4b34c 00000000 20000013 c0dbeb14
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAAF77000, 4096 bytes, 'vb_pool_sup_c'
7e20: c0d9c2ac 60000013 00000038 00000000 00000000 c1c57ea4 05ce05ce c1c57e58
mmz_userdev:mmz_userdev_release:
mmb<0xaaf77000> mapped to userspace 0x19e25aef will be unmapped!
7e40: c016fb70 c016fb74 60000013 ffffffff 00000051 00000000 c1c57ea4 c0d04e88
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAAF78000, 4202496 bytes, 'vb_pool'
7e60: c0a418b9 00000001 c0d87784 c28c9200 c293fe00 00000000 c0d882b8 c0170864
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAB37A000, 4096 bytes, 'vb_pool_sup_nc'
7e80: c1c57ea4 c0d87784 c0d882b8 c016e468 c28c9378 c1c57ea4 d764609d c2677e00
mmz_userdev:mmz_userdev_release:
mmb<0xab37a000> mapped to userspace 0x2eab9dde will be unmapped!
7ea0: c0621290 00000081 000000b9 00000144 c0a2620e c293fe00 c28c9200 00000000
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAB37B000, 4096 bytes, 'vb_pool_sup_c'
7ec0: c2677e00 c28c9208 00000002 c28c9200 c0d87784 c28c9378 c0d87838 c0629904
mmz_userdev:mmz_userdev_release:
mmb<0xab37b000> mapped to userspace 0xfae38e6b will be unmapped!
7ee0: 00000004 00000000 c0dc0a60 ffffa120 d764609d 00000003 c28c9200 c28c9228
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xAB37C000, 121430016 bytes, 'vb_pool'
7f00: c28c9e0c c0ddd768 00000000 c28c9378 c6ecec80 c1c47700 00000000 c6ecec80
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xB274A000, 4096 bytes, 'vb_pool_sup_nc'
7f20: c0d883c8 00000000 00000000 c6ed1e00 c6ecec80 c013a0bc c1c47714 c6ecec98
mmz_userdev:mmz_userdev_release:
mmb<0xb274a000> mapped to userspace 0xe403e555 will be unmapped!
7f40: c1c47700 c6ecec80 00000008 c1c47714 c6ecec98 c0d03d00 0000000c c013a60c
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xB274B000, 4096 bytes, 'vb_pool_sup_c'
7f60: c0d99c44 c147e340 00000454 c013a2e4 c1c56000 c147e354 00000040 c147e364
mmz_userdev:mmz_userdev_release:
mmb<0xb274b000> mapped to userspace 0x8c91a742 will be unmapped!
7f80: c1c47700 c013fd08 c013a2e4 c1c44d40 c013fb58 00000000 00000000 00000000
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xB274C000, 1593344 bytes, 'vb_pool'
7fa0: 00000000 00000000 00000000 c0100170 00000000 00000000 00000000 00000000
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xB28D1000, 4096 bytes, 'vb_pool_sup_nc'
7fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
mmz_userdev:mmz_userdev_release:
mmb<0xb28d1000> mapped to userspace 0xed38703d will be unmapped!
7fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
mmz_userdev:mmz_userdev_release:
MMB LEAK(pid=127): 0xB28D2000, 4096 bytes, 'vb_pool_sup_c'
mmz_userdev:mmz_userdev_release:
mmb<0xb28d2000> mapped to userspace 0x2dea73ba will be unmapped!
[] (hiirq_interrupt [hi_irq]) from [] (__handle_irq_event_percpu+0x68/0x184)
[] (__handle_irq_event_percpu) from [] (handle_irq_event+0x68/0xcc)
[] (handle_irq_event) from [] (handle_fasteoi_irq+0x104/0x218)
[] (handle_fasteoi_irq) from [] (__handle_domain_irq+0x90/0xd0)
[] (__handle_domain_irq) from [] (gic_handle_irq+0x54/0xa8)
[] (gic_handle_irq) from [] (__irq_svc+0x6c/0x90)
Exception stack(0xc1c57e08 to 0xc1c57e50)
7e00: 60000093 06282000 c0c4b34c 00000000 20000013 c0dbeb14
7e20: c0d9c2ac 60000013 00000038 00000000 00000000 c1c57ea4 05ce05ce c1c57e58
7e40: c016fb70 c016fb74 60000013 ffffffff
[] (__irq_svc) from [] (vprintk_emit+0x1c8/0x28c)
[] (vprintk_emit) from [] (vprintk_default+0x20/0x28)
[] (vprintk_default) from [] (printk+0x30/0x50)
[] (printk) from [] (binder_thread_release+0x19c/0x2b0)
[] (binder_thread_release) from [] (binder_deferred_func+0x370/0xd74)
[] (binder_deferred_func) from [] (process_one_work+0x21c/0x444)
[] (process_one_work) from [] (worker_thread+0x328/0x66c)
[] (worker_thread) from [] (kthread+0x1b0/0x1b4)
[] (kthread) from [] (ret_from_fork+0x14/0x24)
Exception stack(0xc1c57fb0 to 0xc1c57ff8)
7fa0: 00000000 00000000 00000000 00000000
7fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
7fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Code: e3a02000 e7903102 e7917102 e2822001 (e5873000)
---[ end trace 215cf67cf7f822a5 ]---
Kernel panic - not syncing: Fatal exception in interrupt
Kernel Offset: disabled
---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---

评论 (7)

uoengopen 创建了缺陷

你好。这个master分支也有这个问题吧?
看日志是挂在hi_irq模块:hiirq_interrupt (device_hisilicon_hispark_taurus仓的)
输入图片说明

能否帮忙把该issue信息转到device_hisilicon_hispark_taurus仓上,同步跟踪?这边就走到开发中。
https://gitee.com/openharmony/device_hisilicon_hispark_taurus

liuyoufang 优先级设置为不重要

@anio 您好,这个问题master主干上有人处理吗?

报的是空指针oops,可以关注是否每次跑测试的log是否都在这?PC is at hiirq_interrupt+0x398/0x578 [hi_irq]

确认也是在PC is at hiirq_interrupt+0x398/0x578 [hi_irq]吗?这个被踩成同一个地方的概率就比较小。。。

张杰 添加了
 
Integration_Test
标签
张杰 关联分支设置为OpenHarmony-3.0-LTS
uoengopen 任务状态待办的 修改为已取消

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(4)
9208887 wanghao free 1625044120
1
https://gitee.com/openharmony/kernel_linux_5.10.git
git@gitee.com:openharmony/kernel_linux_5.10.git
openharmony
kernel_linux_5.10
kernel_linux_5.10

搜索帮助