/*接口配置IP地址后设备串口卡死*/
提前开启KDB,卡死后进入KDB,BTC查看各cpu在干什么
[DPTECH-meth0_0]ip add
[DPTECH-meth0_0]ip add 1.1.1.1/16
Entering kdb (current=0x80529160, pid 0) on processor 0 due to Keyboard Entry
[0]kdb> btc-------------------------------------------------------------------------------------------------------btc查看各CPU在干什么
btc: cpu status: Currently on cpu 0
Available cpus: 0(I), 1-2, 3-4(I), 5-15
Stack traceback for pid 0
0x80529160 0 0 1 0 0 0 I 0x80529378 *swapper
SP PC Function
0x80513ea8 0x80113a40 r4k_wait+0x20
0x80513ea8 0x80116224 cpu_idle+0x8c
0x80513ed0 0x80423efc rest_init+0x80
Stack traceback for pid 0
0x8fcbb130 0 0 1 1 0 0 R 0x8fcbb348 swapper
SP PC Function
0x8fcc1ec8 0x80113a40 r4k_wait+0x20
0x8fcc1ec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 0
0x8fcba050 0 0 1 2 0 0 R 0x8fcba268 swapper
SP PC Function
0x8fccbec8 0x80113a40 r4k_wait+0x20
0x8fccbec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 0
0x8fccebb0 0 0 1 3 0 0 I 0x8fccedc8 swapper
SP PC Function
0x8fce9db0 0x80154a58 irq_exit+0x14
0x8fce9dc8 0x80115590 do_IRQ+0x48
0x8fce9de8 0x80107618 xlr_timer_interrupt+0x34
0x8fce9e00 0x801068c4 plat_irq_dispatch+0xf0
0x8fce9e18 0x80113800 ret_from_irq
Stack traceback for pid 0
0x8fcf3710 0 0 1 4 0 0 I 0x8fcf3928 swapper
SP PC Function
0x8fcf5da0 0x8019ad78 handle_level_irq+0x88
0x8fcf5dc8 0x80115588 do_IRQ+0x40
0x8fcf5de8 0x80107618 xlr_timer_interrupt+0x34
0x8fcf5e00 0x801068c4 plat_irq_dispatch+0xf0
0x8fcf5e18 0x80113800 ret_from_irq
Stack traceback for pid 0
0x8fcf2630 0 0 1 5 0 0 R 0x8fcf2848 swapper
SP PC Function
0x8fd01ec8 0x80113a40 r4k_wait+0x20
0x8fd01ec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 0
0x8fd09190 0 0 1 6 0 0 R 0x8fd093a8 swapper
SP PC Function
0x8fd0dec8 0x80113a40 r4k_wait+0x20
0x8fd0dec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 1864
0x8b8b81d0 1864 1 1 7 31296 5020 R 0x8b8b83e8 rtm----------------------rtm进程------------CPU是7
SP PC Function
0x8b921a18 0x8042f1dc _spin_unlock_bh+0x190----------------------------------------------------------------死锁
Stack traceback for pid 0
0x8fd28c10 0 0 1 8 0 0 R 0x8fd28e28 swapper
SP PC Function
0x8fd33ec8 0x80113a40 r4k_wait+0x20
0x8fd33ec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 0
0x8fd3f770 0 0 1 9 0 0 R 0x8fd3f988 swapper
SP PC Function
0x8fd41ec8 0x80113a40 r4k_wait+0x20
0x8fd41ec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 0
0x8fd3e690 0 0 1 10 0 0 R 0x8fd3e8a8 swapper
SP PC Function
0x8fd4bec8 0x80113a40 r4k_wait+0x20
0x8fd4bec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 0
0x8fd631f0 0 0 1 11 0 0 R 0x8fd63408 swapper
SP PC Function
0x8fd69ec8 0x80113a40 r4k_wait+0x20
0x8fd69ec8 0x80116224 cpu_idle+0x8c
Stack traceback for pid 1437
0x8d8300d0 1437 2 1 12 0 0 R 0x8d8302e8 datatask_12
SP PC Function
0x8d835e78 0xc1ed9df0 [module_cpu_na]dpx_skb_que_proc+0xf0
Stack traceback for pid 1438
0x8d830c10 1438 2 1 13 0 0 R 0x8d830e28 datatask_13
SP PC Function
0x8d833e08 0xc255f3b0 [module_bcm_mac]bcm_dcb_done_get+0x5c
Stack traceback for pid 1439
0x8d8311b0 1439 2 1 14 0 0 R 0x8d8313c8 datatask_14
SP PC Function
0x8dfd9e20 0xc2559690 [module_bcm_mac]bcm_data_poll_rx_norm+0x60
Stack traceback for pid 1440
0x8d831750 1440 2 1 15 0 0 R 0x8d831968 datatask_15
SP PC Function
0x8da77e78 0xc1ed9f18 [module_cpu_na]dpx_skb_que_proc+0x218
[0]kdb>
[0]kdb> cpu 7---------------------------------------------------------------------------------进入CPU7,查看栈信息////或者直接rdc 7
Entering kdb (current=0x8b8b81d0, pid 1864) on processor 7 due to cpu switch
[7]kdb> rd
zero = 0x00000000 at = 0x8042ee24
v0 = 0x00000014 v1 = 0x00000100
a0 = 0xc7fda000 a1 = 0x00000000
a2 = 0x8bf19f60 a3 = 0x00000000
t0 = 0x00000001 t1 = 0xc0542324
t2 = 0x00000001 t3 = 0xffffffff
t4 = 0xc00d373c t5 = 0xc008f754
t6 = 0xc008d180 t7 = 0xc00953cc
s0 = 0x8bf19f60 s1 = 0x8bf19f60
s2 = 0x00000000 s3 = 0x00000000
s4 = 0xc7fda000 s5 = 0x40a30000
s6 = 0x00002000 s7 = 0x8042efb4
t8 = 0x8ae8781c t9 = 0xc0096fb8
k0 = 0xc008d180 k1 = 0xc00953cc
gp = 0x8b920000 sp = 0x8b921a18
s8 = 0x8b921a18 ra = 0x8042ee24
hi = 0x00000077 lo = 0xb08ae1c0
pc = 0x8042f1dc sr = 0x1048d805
cause = 0x00800000 badva = 0x8ae87660
[7]kdb>
[7]kdb>
[7]kdb> bt
Stack traceback for pid 1864
0x8b8b81d0 1864 1 1 7 31296 5020 R 0x8b8b83e8 *rtm
SP PC Function
0x8b921a18 0x8042f1dc _spin_unlock_bh+0x190
[7]kdb> md 0x8b921a18
0x8b921a18 80178d44 c06d0000 8b921a28 402a65c8 ...D.m.....(@*e.
0x8b921a28 c7fda000 c4c11020 8b921a38 4009f9f8 ....... ...8@...
0x8b921a38 000000d0 82470c20 8b921a48 82470c20 .....G. ...H.G.
0x8b921a48 8bf19f60 fffffff8 00000002 8bf19f60 ...`...........`
0x8b921a58 fffffff6 4085e03c 00000000 84f46380 ....@..<......c.
0x8b921a68 80178d44 c06d0000 8b921a78 4009edcc ...D.m.....x@...
0x8b921a78 00000002 8bf19f60 fffffff9 00000002 .......`........
0x8b921a88 8b921a90 80430074 000000d0 c0173de0 .....C.t......=.
[7]kdb>
0x8b921a98 c0527340 c0527350 8b921aa8 c0527340 .Rs@.RsP.....Rs@
0x8b921aa8 c0527350 8bf19f60 8bf19f60 00000000 .RsP...`...`....
0x8b921ab8 8b921ac0 80178d18 00000000 000000d0 ................
0x8b921ac8 8b921ad0 c0173fc4 00000000 8042f038 ......?......B.8
0x8b921ad8 00000002 8bf19f60 ffffffff 000000d0 .......`........
0x8b921ae8 00000000 8bf19f60 8b921af8 80178d6c .......`.......l
0x8b921af8 8bf19f60 8bf19f60 8bf19f60 00000000 ...`...`...`....
0x8b921b08 00000000 80178d44 8b921b18 c0175efc .......D......^.
[7]kdb>
[7]kdb> md 0x8b921a18
0x8b921a18 80178d44 c06d0000 8b921a28 402a65c8 ...D.m.....(@*e.
0x8b921a28 c7fda000 c4c11020 8b921a38 4009f9f8 ....... ...8@...
0x8b921a38 000000d0 82470c20 8b921a48 82470c20 .....G. ...H.G.
0x8b921a48 8bf19f60 fffffff8 00000002 8bf19f60 ...`...........`
0x8b921a58 fffffff6 4085e03c 00000000 84f46380 ....@..<......c.
0x8b921a68 80178d44 c06d0000 8b921a78 4009edcc ...D.m.....x@...
0x8b921a78 00000002 8bf19f60 fffffff9 00000002 .......`........
0x8b921a88 8b921a90 80430074 000000d0 c0173de0 .....C.t......=.
[7]kdb> 0x4009f9f8
0x4009f9f8 = 0x4009f9f8 ([conplat_dp]vxlan_neigh_ifaddr_change+0x7c)-----------------------------------------找到死锁函数,注意数字节----------------
[7]kdb> reboot
阅读(3651) | 评论(0) | 转发(0) |