FAQ:[#6179] bf537-stamp crashes in network code when running `rsh` immediately upon boot(2010)

Document created by Aaronwu Employee on Sep 11, 2013
Version 1Show Document
  • View in full screen mode

[#6179] bf537-stamp crashes in network code when running `rsh` immediately upon boot

Submitted By: Mike Frysinger

Open Date

2010-08-12 18:34:02     Close Date

2010-10-20 16:02:32

Priority:

Medium     Assignee:

Sonic Zhang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

2009R1.1-RC4     Release:

Category:

N/A     Board:

STAMP

Processor:

BF537     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

trunk

App binary format:

N/A     

Summary: bf537-stamp crashes in network code when running `rsh` immediately upon boot

Details:

 

as reported in the forums:

http://blackfin.uclinux.org/gf/forummessage/92086

 

seems to be OK in trunk, but that might be due to [#6178] ...

 

<start with 2009R1 svn branch>

$ make AnalogDevices/BF537-STAMP_default

$ echo 'while :; do rsh 192.168.0.99 ls ; done' >> romfs/etc/rc

$ make image

 

<install 2009R1.1 u-boot onto bf537-stamp, but i dont think version matters>

 

that uImage then crashes for me like so:

 

Have a lot of fun...

PHY: 0:01 - Link is Up - 100/Full

NULL pointer access

Kernel OOPS in progress

Deferred Exception context

 

No Valid process in current context

return address: [0x000baf92]; contents of:

0x000baf70:  0c01  102d  0000  0000  0000  e521  0023  a488

0x000baf80:  0c00  1415  ad4a  0c42  180b  6000  b148  2002

0x000baf90:  3255 [9155] 3042  e3ff  ff9b  0c45  17fa  6c66

0x000bafa0:  0127  e420  0024  0484  e2fc  1342  0c00  1beb

 

ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)

Linux version 2.6.28.10-ADI-2009R1.1-svn9078

Built with gcc version 4.3.5 (ADI-trunk/git-df90ad9)

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00000027  IPEND: c030  SYSCFG: 0006

  EXCAUSE   : 0x27

  interrupts disabled

  physical IVG5 asserted : <0xffa00c50> { _evt_ivhw + 0x0 }

  physical IVG14 asserted : <0xffa00a48> { _evt14_softirq + 0x0 }

  physical IVG15 asserted : <0xffa00f74> { _evt_system_call + 0x0 }

  logical irq   6 mapped  : <0xffa00374> { _timer_interrupt + 0x0 }

  logical irq  10 mapped  : <0x000af964> { _bfin_rtc_interrupt + 0x0 }

  logical irq  18 mapped  : <0x0009d314> { _bfin_serial_dma_rx_int + 0x0 }

  logical irq  19 mapped  : <0x0009d064> { _bfin_serial_dma_tx_int + 0x0 }

  logical irq  24 mapped  : <0x000a6558> { _bfin_mac_interrupt + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x0017bcf0> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x000bae12> { ___kfree_skb + 0x12 }

PC  : <0x000baf92> { _skb_release_data + 0x62 }

DCPLB_FAULT_ADDR: <0x00000008> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x000baf92> { _skb_release_data + 0x62 }

 

PROCESSOR STATE:

R0 : 00000000    R1 : 0000ffc0    R2 : ffffff01    R3 : 00000002

R4 : 0301c020    R5 : 1000a8c0    R6 : 00000002    R7 : 0016b10c

P0 : 037fcd40    P1 : 0301c640    P2 : 00000008    P3 : 0301c034

P4 : 037d16c0    P5 : 037d16c0    FP : 00000000    SP : 0017bc14

LB0: ffa016e8    LT0: ffa016e6    LC0: 00000000

LB1: 00008b6a    LT1: 00008b6a    LC1: 00000000

B0 : 00000020    L0 : 00000000    M0 : 037eddc4    I0 : 00169770

B1 : 0000001f    L1 : 00000000    M1 : 00000001    I1 : 03033784

B2 : 00113e08    L2 : 00000000    M2 : 00000007    I2 : 0000001a

B3 : 0000ffff    L3 : 00000000    M3 : 00000000    I3 : 0000000e

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 0017c000  ASTAT: 02003045

 

Hardware Trace:

   0 Target : <0x00004d84> { _trap_c + 0x0 }

     Source : <0xffa0068e> { _exception_to_level5 + 0xae } CALL pcrel

   1 Target : <0xffa005e0> { _exception_to_level5 + 0x0 }

     Source : <0xffa0049c> { _bfin_return_from_exception + 0x20 } RTX

   2 Target : <0xffa0047c> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00538> { _ex_trap_c + 0x6c } JUMP.S

   3 Target : <0xffa004cc> { _ex_trap_c + 0x0 }

     Source : <0xffa003a4> { _ex_workaround_261 + 0x1c } JUMP.S

   4 Target : <0xffa00388> { _ex_workaround_261 + 0x0 }

     Source : <0xffa0076e> { _trap + 0x6e } JUMP (P4)

   5 Target : <0xffa0071e> { _trap + 0x1e }

     Source : <0xffa0071a> { _trap + 0x1a } IF !CC JUMP

   6 Target : <0xffa00700> { _trap + 0x0 }

     Source : <0xffa0049c> { _bfin_return_from_exception + 0x20 } RTX

   7 Target : <0xffa0047c> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa0039a> { _ex_workaround_261 + 0x12 } IF !CC JUMP

   8 Target : <0xffa00388> { _ex_workaround_261 + 0x0 }

     Source : <0xffa0076e> { _trap + 0x6e } JUMP (P4)

   9 Target : <0xffa0071e> { _trap + 0x1e }

     Source : <0xffa0071a> { _trap + 0x1a } IF !CC JUMP

  10 Target : <0xffa00700> { _trap + 0x0 }

     Source : <0x000baf8e> { _skb_release_data + 0x5e } JUMP.S

  11 Target : <0x000baf78> { _skb_release_data + 0x48 }

     Source : <0x000baf3e> { _skb_release_data + 0xe } IF CC JUMP

  12 Target : <0x000baf30> { _skb_release_data + 0x0 }

     Source : <0x000bae0e> { ___kfree_skb + 0xe } CALL pcrel

  13 Target : <0x000bae0c> { ___kfree_skb + 0xc }

     Source : <0x000bad4c> { _skb_release_head_state + 0x84 } RTS

  14 Target : <0x000bad46> { _skb_release_head_state + 0x7e }

     Source : <0x000bad06> { _skb_release_head_state + 0x3e } IF !CC JUMP

  15 Target : <0x000bacfe> { _skb_release_head_state + 0x36 }

     Source : <0x000bacda> { _skb_release_head_state + 0x12 } IF !CC JUMP

 

Kernel Stack

Stack info:

SP: [0x0017bf4c] <0x0017bf4c> /* kernel dynamic memory */

Memory from 0x0017bf40 to 0017c000

0017bf40: 00000000  00000007  00000001 [037eddc4] 0000000e  0000001a  0016eea4  037f8644

0017bf60: 0017c000  0015a8a4  ffa00120  0017a000  0017a000  0016cd08  03001de0  ffa00968

0017bf80: ffa00120 <00197ea4> 00000000  00000000  00000065  00000002  0000ffc0  0000ffff

0017bfa0: 0000ffff  ffa00968  00000006  0016cd08  00195454 <00197ea4> 0017c000  0017c6da

0017bfc0: 00166d0c  0015a004  0016cd08  00195454  001326fc  00195454  00159dc8  00000013

0017bfe0: 0017c230 <00197ea4> 0018ac70  00000000  00000000  00000000  ffb00000  00000000

Return addresses in stack:

    address : <0x00197ea4> [ sh + 0x17ea4 ]

    address : <0x00197ea4> [ sh + 0x17ea4 ]

    address : <0x00197ea4> [ sh + 0x17ea4 ]

Modules linked in:

Kernel panic - not syncing: Kernel exception

 

Follow-ups

 

--- Mike Frysinger                                           2010-08-12 18:37:23

btw, the IP used (192.168.0.99) is expected to not exist ... so dont pick one

that is in use

 

--- Sonic Zhang                                              2010-08-16 06:27:41

After replacing the rsh in SVN trunk, I can confirm that this bug doesn't apply

to SVN trunk kernel.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes