From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <54C7756B.6030604@xenomai.org> Date: Tue, 27 Jan 2015 12:24:27 +0100 From: Philippe Gerum MIME-Version: 1.0 References: <54C760BC.7040301@colgp.it> <54C76713.2010904@xenomai.org> <54C76931.9080905@colgp.it> <54C76BB0.8060304@xenomai.org> <54C772AB.7010909@colgp.it> In-Reply-To: <54C772AB.7010909@colgp.it> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Subject: Re: [Xenomai] Linux scheduling is hijacked from xenomai scheduling List-Id: Discussions about the Xenomai project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Luca Galvagno , xenomai@xenomai.org On 01/27/2015 12:12 PM, Luca Galvagno wrote: > Hi Philippe, > we checked the kernel options you suggested and they are in line with > what you said. > When the system hangs we have the following log on console : > > [ 391.382182] Unable to handle kernel paging request for instruction fetch > [ 391.462985] Faulting instruction address: 0x00000000 > [ 391.522787] Oops: Kernel access of bad area, sig: 11 [#1] Well, bad news this is a crash, the CPU is jumping to some NULL handler it seems. You may want to enable CONFIG_KALLSYMS and CONFIG_DEBUG_BUGVERBOSE to get a backtrace with symbols. CONFIG_DEBUG_INFO is desirable too when looking for routines in the kernel assembly dump, and matching them to the source code. -- Philippe.