2008-04-21 09:45:54     Re: Undefined Instruction

Document created by Aaronwu Employee on Aug 6, 2013
Version 1Show Document
  • View in full screen mode

2008-04-21 09:45:54     Re: Undefined Instruction

kanal kannan (INDIA)

Message: 54628    Hi all,

 

I'm running my application & get the following error at the target prompt:

 

./EXE_DCT_A_SRVR_NP

 

grayc8

 

grayc3

 

basic17

 

basic33

 

basic33

 

basic33

 

basic33

 

basic33

 

basic33

 

basic33

 

basic33

 

basic33

 

basic33

 

K3GFMAIN1

 

GETIMAGE

 

new

PPI0 wait_event_interruptible

initial data...

 

i3value2

 

encoder1

 

------------in cencode

 

I'm in midway

 

iT1

 

iT2

Undefined instruction

 

basic17

 

basic17

 

- May be used to emulate instructions that are not defined for

a particular processor implementation.

 

CURRENT PROCESS:

 

COMM=EXE_DCT_A_SRVR_ PID=82

TEXT = 0x03000040-0x030a1720  DATA = 0x030a1724-0x030c4af4

BSS = 0x030c4af4-0x03320e54   USER-STACK = 0x033fff6c

 

return address: 0x0309ebf2; contents of [PC-16...PC+8]:

fea6 e801 0000 05bd 0010 0c39 1803 e3fe

b6d2 e3ff fc7a e800 0003 e3ff ffc4 0000 X

0001 0010 0c39 1803 e3fe b6c5 e3ff fc6d

 

RETE:  00000000  RETN: 034ee000  RETX: 0309ebf2  RETS: 0309ebf0

IPEND: 0030  SYSCFG: 0036

SEQSTAT: 00000021    SP: 034edf24

R0: 0073bfbc    R1: 0000000c    R2: 00000048    R3: 0073bff4

R4: 0073a004    R5: 033fd6dc    R6: 033fd6c8    R7: 00000000

P0: 030b0c80    P1: 0331c1c4    P2: 0073bff4    P3: 0007a120

P4: 00000000    P5: 66646e75    FP: 033fd17c

A0.w: 00000000    A0.x: 00000000    A1.w: 00000000    A1.x: 00000000

LB0: 030728f5  LT0: 030728e8  LC0: 00000000

LB1: 030a0969  LT1: 030a0962  LC1: 00000000

B0: 00000000  L0: 00000000  M0: 00000000  I0: 030a6454

B1: 00000000  L1: 00000000  M1: 00000000  I1: 00000000

B2: 00000000  L2: 00000000  M2: 00000000  I2: ffffffff

B3: 00000000  L3: 00000000  M3: 00000000  I3: 00000000

 

USP: 033fd170   ASTAT: 02001004

DCPLB_FAULT_ADDR=033fd16c

ICPLB_FAULT_ADDR=0309ebf2

 

 

Hardware Trace:

0 Target : <0x00004594> { _trap_c + 0x0 }

   Source : <0xffa00b58> { _exception_to_level5 + 0xb4 }

1 Target : <0xffa00aa4> { _exception_to_level5 + 0x0 }

   Source : <0xffa00aa2> { _ex_trap_c + 0x4e }

2 Target : <0xffa00a54> { _ex_trap_c + 0x0 }

   Source : <0xffa00bf8> { _trap + 0x28 }

3 Target : <0xffa00bd0> { _trap + 0x0 }

   Source : <0x0309ebf0> [ EXE_DCT_A_SRVR_ + 0x9ebf0 ]

4 Target : <0x0309ebf0> [ EXE_DCT_A_SRVR_ + 0x9ebf0 ]

   Source : <0x0309ebda> [ EXE_DCT_A_SRVR_ + 0x9ebda ]

5 Target : <0x0309ebd4> [ EXE_DCT_A_SRVR_ + 0x9ebd4 ]

   Source : <0x0309eb8a> [ EXE_DCT_A_SRVR_ + 0x9eb8a ]

6 Target : <0x0309eb88> [ EXE_DCT_A_SRVR_ + 0x9eb88 ]

   Source : <0x0307aa0a> [ EXE_DCT_A_SRVR_ + 0x7aa0a ]

7 Target : <0x0307aa06> [ EXE_DCT_A_SRVR_ + 0x7aa06 ]

   Source : <0x0307a9f8> [ EXE_DCT_A_SRVR_ + 0x7a9f8 ]

8 Target : <0x0307a9f6> [ EXE_DCT_A_SRVR_ + 0x7a9f6 ]

   Source : <0x0307a9d8> [ EXE_DCT_A_SRVR_ + 0x7a9d8 ]

9 Target : <0x0307a9cc> [ EXE_DCT_A_SRVR_ + 0x7a9cc ]

   Source : <0x0307a92e> [ EXE_DCT_A_SRVR_ + 0x7a92e ]

10 Target : <0x0307a92c> [ EXE_DCT_A_SRVR_ + 0x7a92c ]

   Source : <0x0307b6b2> [ EXE_DCT_A_SRVR_ + 0x7b6b2 ]

11 Target : <0x0307b6a8> [ EXE_DCT_A_SRVR_ + 0x7b6a8 ]

   Source : <0x0307a928> [ EXE_DCT_A_SRVR_ + 0x7a928 ]

12 Target : <0x0307a924> [ EXE_DCT_A_SRVR_ + 0x7a924 ]

   Source : <0x0307ace8> [ EXE_DCT_A_SRVR_ + 0x7ace8 ]

13 Target : <0x0307ace2> [ EXE_DCT_A_SRVR_ + 0x7ace2 ]

   Source : <0x0307acd8> [ EXE_DCT_A_SRVR_ + 0x7acd8 ]

14 Target : <0x0307accc> [ EXE_DCT_A_SRVR_ + 0x7accc ]

   Source : <0x0307acae> [ EXE_DCT_A_SRVR_ + 0x7acae ]

15 Target : <0x0307aca2> [ EXE_DCT_A_SRVR_ + 0x7aca2 ]

   Source : <0x0307acde> [ EXE_DCT_A_SRVR_ + 0x7acde ]

Stack from 034edf04:

        00000000 ffa00b5c 00120714 00120714 00120710 00000001 0073a004 03077492

        0309ebf2 00000030 00000021 00000000 034ee000 0309ebf2 0309ebf2 0309ebf0

        0073bfbc 02001004 030a0969 030728f5 030a0962 030728e8 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 ffffffff 00000000 030a6454 033fd170 033fd17c 66646e75 00000000

Call Trace:

[<0007a120>] _cfq_remove_request+0x48/0x1b0

 

 

sesenc1

 

sesenc1

 

sesenc6

 

sesenc11

 

after cross

 

33fec7d cmp

8c0004 file

 

8c0004 rec

 

end of getin

 

after ginf

 

sesenc12

 

sesenc12-1

 

vopses2

 

in CVideoO

 

end CVideoO

 

mode14

 

mode16

 

mode14

 

mode16

 

mode14

 

mode16

 

vopmseenc2

 

b4 new

Illegal instruction

 

my distribution is uClinux-dist-2007R1-RC3,

file used for programming the flash memory - u-boot_ezkit.bin

Target - BF561 (Ezkit Lite)

 

any help in this regard will be highly appreciated.

 

with regards

Kannan

QuoteReplyEditDelete

 

 

2008-04-21 10:10:35     Re: Undefined Instruction

Robin Getz (UNITED STATES)

Message: 54629    Kanal:

 

The first step would be to upgrade to the latest dist.

 

Then have a look at:

 

http://docs.blackfin.uclinux.org/doku.php?id=debuging_applications

 

-Robin

QuoteReplyEditDelete

 

 

2008-04-21 12:08:58     Re: Undefined Instruction

Bernd Schmidt (GERMANY)

Message: 54633    > return address: 0x0309ebf2; contents of [PC-16...PC+8]:

> fea6 e801 0000 05bd 0010 0c39 1803 e3fe

> b6d2 e3ff fc7a e800 0003 e3ff ffc4 0000 X

> 0001 0010 0c39 1803 e3fe b6c5 e3ff fc6d

 

This tells you what the code looks like in memory.

 

> 3 Target : <0xffa00bd0> { _trap + 0x0 }

>    Source : <0x0309ebf0> [ EXE_DCT_A_SRVR_ + 0x9ebf0 ]

 

This tells you where the trap happened.

 

Use "bfin-uclinux-objdump -dr" to disassemble your program, and match up the hex dump above with the objdump output.  That should give you an initial idea of whether your program jumped to an invalid address (e.g. somewhere in the data section), or whether something wrote over program memory (if there's no correspondence), or whether something else entirely is going on.

Attachments

    Outcomes