使用WARN_ON来追溯函数的调用关系
2016-11-11 10:01
239 查看
[ 6.660489] spidev spi32766.1: buggy DT: spidev listed directly in DT
[ 6.666878] ------------[ cut here ]------------
[ 6.671443] WARNING: at /home/cctv/YOCTO/poky/build/tmp/work-shared/zynqmp/kernel-source/drivers/spi/spidev.c:9
[ 6.682906] Modules linked in:
[ 6.685935]
[ 6.687415] CPU: 0 PID: 1 Comm: swapper/0 Tainted: G W 4.4.0-xilinx #1
[ 6.695057] Hardware name: ZynqMP (DT)
[ 6.699392] task: ffffffc87b878b80 ti: ffffffc87b87c000 task.ti: ffffffc87b87c000
[ 6.706866] PC is at spidev_probe+0x1a0/0x1c0
[ 6.711198] LR is at spidev_probe+0x19c/0x1c0
[ 6.715537] pc : [<ffffffc000521ac0>] lr : [<ffffffc000521abc>] pstate: 60000045
[ 6.722920] sp : ffffffc87b87f980
[ 6.726212] x29: ffffffc87b87f980 x28: 0000000000000000
[ 6.731505] x27: ffffffc000a5eed0 x26: 0000000000000000
[ 6.736800] x25: 0000000000000000 x24: ffffffc000b2b000
[ 6.742095] x23: 0000000000000000 x22: ffffffc000acdcf0
[ 6.747390] x21: ffffffc0732bec00 x20: ffffffc0732bec00
[ 6.752684] x19: ffffffc0007efc90 x18: ffffffc080af75f7
[ 6.757979] x17: 0000000000000001 x16: 00000000fa83b2da
[ 6.763274] x15: ffffffc000af7605 x14: 0000000000010000
[ 6.768569] x13: ffffffc000b09a30 x12: 0000000000000000
[ 6.773864] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f
[ 6.779158] x9 : 5400feff02fefeff x8 : 7f7f7f7f7f7f7f7f
[ 6.784453] x7 : 01fefefefefefeff x6 : 8080808080808000
[ 6.789748] x5 : 0080808080808080 x4 : 0000000000000000
[ 6.795043] x3 : ffffffc0007efe20 x2 : 0000000000001f6a
[ 6.800337] x1 : 0000000000000040 x0 : 0000000000000000
[ 6.805632]
[ 6.807109] ---[ end trace 0327f05f6a94bd54 ]---
[ 6.811710] Call trace:
[ 6.814142] [<ffffffc000521ac0>] spidev_probe+0x1a0/0x1c0
[ 6.819525] [<ffffffc00051f0a0>] spi_drv_probe+0x58/0x78
[ 6.824820] [<ffffffc0004bc8d0>] really_probe+0x198/0x298
[ 6.830201] [<ffffffc0004bcb14>] __device_attach_driver+0x9c/0xd8
[ 6.836277] [<ffffffc0004babe0>] bus_for_each_drv+0x58/0x98
[ 6.841832] [<ffffffc0004bc6d4>] __device_attach+0xb4/0x100
[ 6.847387] [<ffffffc0004bcbf0>] device_initial_probe+0x10/0x18
[ 6.853290] [<ffffffc0004bbbec>] bus_probe_device+0x94/0xa0
[ 6.858845] [<ffffffc0004b9b84>] device_add+0x33c/0x520
[ 6.864053] [<ffffffc00051f644>] spi_add_device+0xe4/0x1a8
[ 6.869522] [<ffffffc0005212bc>] spi_register_master+0x57c/0x748
[ 6.875511] [<ffffffc0005234b0>] cdns_spi_probe+0x2f0/0x370
[ 6.881067] [<ffffffc0004be138>] platform_drv_probe+0x38/0x88
[ 6.886795] [<ffffffc0004bc8d0>] really_probe+0x198/0x298
[ 6.892176] [<ffffffc0004bca74>] __driver_attach+0xa4/0xa8
[ 6.897644] [<ffffffc0004bab20>] bus_for_each_dev+0x60/0xa0
[ 6.903200] [<ffffffc0004bc288>] driver_attach+0x20/0x28
[ 6.908494] [<ffffffc0004bbee0>] bus_add_driver+0x1d0/0x238
[ 6.914050] [<ffffffc0004bd030>] driver_register+0x60/0xf8
[ 6.919519] [<ffffffc0004be0f8>] __platform_driver_register+0x40/0x48
[ 6.925942] [<ffffffc000a3ab34>] cdns_spi_driver_init+0x18/0x20
[ 6.931844] [<ffffffc000082190>] do_one_initcall+0x90/0x1a0
[ 6.937400] [<ffffffc000a16ac0>] kernel_init_freeable+0x150/0x1f0
[ 6.943477] [<ffffffc000760f50>] kernel_init+0x10/0xe0
[ 6.948596] [<ffffffc000085410>] ret_from_fork+0x10/0x40
[ 6.660489] spidev spi32766.1: buggy DT: spidev listed directly in DT
[ 6.666878] ------------[ cut here ]------------
[ 6.671443] WARNING: at /home/cctv/YOCTO/poky/build/tmp/work-shared/zynqmp/kernel-source/drivers/spi/spidev.c:9
[ 6.682906] Modules linked in:
[ 6.685935]
[ 6.687415] CPU: 0 PID: 1 Comm: swapper/0 Tainted: G W 4.4.0-xilinx #1
[ 6.695057] Hardware name: ZynqMP (DT)
[ 6.699392] task: ffffffc87b878b80 ti: ffffffc87b87c000 task.ti: ffffffc87b87c000
[ 6.706866] PC is at spidev_probe+0x1a0/0x1c0
[ 6.711198] LR is at spidev_probe+0x19c/0x1c0
[ 6.715537] pc : [<ffffffc000521ac0>] lr : [<ffffffc000521abc>] pstate: 60000045
[ 6.722920] sp : ffffffc87b87f980
[ 6.726212] x29: ffffffc87b87f980 x28: 0000000000000000
[ 6.731505] x27: ffffffc000a5eed0 x26: 0000000000000000
[ 6.736800] x25: 0000000000000000 x24: ffffffc000b2b000
[ 6.742095] x23: 0000000000000000 x22: ffffffc000acdcf0
[ 6.747390] x21: ffffffc0732bec00 x20: ffffffc0732bec00
[ 6.752684] x19: ffffffc0007efc90 x18: ffffffc080af75f7
[ 6.757979] x17: 0000000000000001 x16: 00000000fa83b2da
[ 6.763274] x15: ffffffc000af7605 x14: 0000000000010000
[ 6.768569] x13: ffffffc000b09a30 x12: 0000000000000000
[ 6.773864] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f
[ 6.779158] x9 : 5400feff02fefeff x8 : 7f7f7f7f7f7f7f7f
[ 6.784453] x7 : 01fefefefefefeff x6 : 8080808080808000
[ 6.789748] x5 : 0080808080808080 x4 : 0000000000000000
[ 6.795043] x3 : ffffffc0007efe20 x2 : 0000000000001f6a
[ 6.800337] x1 : 0000000000000040 x0 : 0000000000000000
[ 6.805632]
[ 6.807109] ---[ end trace 0327f05f6a94bd54 ]---
[ 6.811710] Call trace:
[ 6.814142] [<ffffffc000521ac0>] spidev_probe+0x1a0/0x1c0
[ 6.819525] [<ffffffc00051f0a0>] spi_drv_probe+0x58/0x78
[ 6.824820] [<ffffffc0004bc8d0>] really_probe+0x198/0x298
[ 6.830201] [<ffffffc0004bcb14>] __device_attach_driver+0x9c/0xd8
[ 6.836277] [<ffffffc0004babe0>] bus_for_each_drv+0x58/0x98
[ 6.841832] [<ffffffc0004bc6d4>] __device_attach+0xb4/0x100
[ 6.847387] [<ffffffc0004bcbf0>] device_initial_probe+0x10/0x18
[ 6.853290] [<ffffffc0004bbbec>] bus_probe_device+0x94/0xa0
[ 6.858845] [<ffffffc0004b9b84>] device_add+0x33c/0x520
[ 6.864053] [<ffffffc00051f644>] spi_add_device+0xe4/0x1a8
[ 6.869522] [<ffffffc0005212bc>] spi_register_master+0x57c/0x748
[ 6.875511] [<ffffffc0005234b0>] cdns_spi_probe+0x2f0/0x370
[ 6.881067] [<ffffffc0004be138>] platform_drv_probe+0x38/0x88
[ 6.886795] [<ffffffc0004bc8d0>] really_probe+0x198/0x298
[ 6.892176] [<ffffffc0004bca74>] __driver_attach+0xa4/0xa8
[ 6.897644] [<ffffffc0004bab20>] bus_for_each_dev+0x60/0xa0
[ 6.903200] [<ffffffc0004bc288>] driver_attach+0x20/0x28
[ 6.908494] [<ffffffc0004bbee0>] bus_add_driver+0x1d0/0x238
[ 6.914050] [<ffffffc0004bd030>] driver_register+0x60/0xf8
[ 6.919519] [<ffffffc0004be0f8>] __platform_driver_register+0x40/0x48
[ 6.925942] [<ffffffc000a3ab34>] cdns_spi_driver_init+0x18/0x20
[ 6.931844] [<ffffffc000082190>] do_one_initcall+0x90/0x1a0
[ 6.937400] [<ffffffc000a16ac0>] kernel_init_freeable+0x150/0x1f0
[ 6.943477] [<ffffffc000760f50>] kernel_init+0x10/0xe0
[ 6.948596] [<ffffffc000085410>] ret_from_fork+0x10/0x40
相关文章推荐
- 使用egypt+graphviz分析ffplay的函数调用关系图
- 使用 python脚本获取函数调用关系
- 使用Doxygen+graphviz+Sublime2来看代码,查看函数调用关系
- 使用egypt+graphviz分析ffplay的函数调用关系图
- 使用Java+SAP云平台+SAP Cloud Connector调用ABAP On-Premise系统里的函数
- Activity的生命周期函数、onActivityResult、intent和启动模式的调用关系
- 分析函数调用关系图(call graph)的几种方法
- 使用Ajax在客户端调用服务端函数并传值
- Delphi中捕获音频函数OnWaveIn的使用小记
- 使用Lua5.1互相调用函数
- 分析函数调用关系图(call graph)的几种方法
- [NET]Net中的反射使用入门(根据类名和函数名,生成和调用对象的成员函数)
- 第十四章——调用操作符重载和函数对象的使用
- 使用动态包导出函数的调用单元完整源代码
- 使用.NE平台调用服务访问非托管 DLL 中的函数
- 成员函数指针和其他类型的强制转换,使用一般指针调用成员函数
- Oracle不支持在select语句中调用自定义函数时使用自定义类型作参数?
- 从 SQL 进行操作系统调用,DB2自定义函数的使用
- netfilter各个HOOK的关系简介(笔记中已经总结到函数调用流程中)
- 使用派生类对象通过成员函数指针调用基类虚函数之不可能性的证明