[#5394] run irattach in the background, reboot the kernel, error info shows up
Submitted By: Vivi Li
Open Date
2009-07-24 03:29:07 Close Date
2009-08-05 02:57:39
Priority:
Medium Assignee:
Graf Yang
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
N/A Board:
N/A
Processor:
ALL Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
gcc4.1-09r1_rc9
App binary format:
N/A
Summary: run irattach in the background, reboot the kernel, error info shows up
Details:
After run irattach in the background, reboot the kernel, error info shows up.
If irattach is not run in the background, reboot kernel will cause no error info.
--
root:/> modprobe bfin_sir
root:/> irattach irda0 -s&
164
root:/> reboot
NULL pointer access
Deferred Exception context
CURRENT PROCESS:
COMM=irattach PID=164
CPU = 0
TEXT = 0x001c0040-0x001c8aa0 DATA = 0x001c8ac0-0x001caae8
BSS = 0x001caae8-0x001caf30 USER-STACK = 0x001cbf70
return address: [0x001c1614]; contents of:
0x001c15f0: 1432 e129 fad4 5a79 e120 03fe 3049 5181
0x001c1600: e14a 001c e10a ab44 9110 4828 104c 320e
0x001c1610: 6000 9b08 [9118] 0c80 1854 e12a fad4 5a97
0x001c1620: 307a 2004 51c7 09be 1b3c 52be 640a 300f
ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1-svn7051
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062027 IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x27
interrupts disabled
physical IVG5 asserted : <0xffa00c34> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x037ba000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x001c16b8> [ irattach + 0x1678 ]
PC : <0x001c1614> [ irattach + 0x15d4 ]
DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x001c1614> [ irattach + 0x15d4 ]
PROCESSOR STATE:
R0 : 00000000 R1 : 001cabe8 R2 : 00000024 R3 : 40000000
R4 : 001cafd3 R5 : 000003de R6 : 001cac0b R7 : 001cabf5
P0 : 00000004 P1 : 001cac0b P2 : 001cadf4 P3 : 00000000
P4 : 001cabe8 P5 : 001cadf4 FP : 001cb100 SP : 037b9f24
LB0: 001c379d LT0: 001c379a LC0: 00000000
LB1: 001c2c25 LT1: 001c2c24 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 001ca040
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 001ca82c
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 001cabc0 ASTAT: 02000000
Hardware Trace:
0 Target : <0x00004cbc> { _trap_c + 0x0 }
Source : <0xffa00674> { _exception_to_level5 + 0xa8 } CALL pcrel
1 Target : <0xffa005cc> { _exception_to_level5 + 0x0 }
Source : <0xffa004a4> { _bfin_return_from_exception + 0x20 } RTX
2 Target : <0xffa00484> { _bfin_return_from_exception + 0x0 }
Source : <0xffa0051a> { _ex_trap_c + 0x46 } JUMP.S
3 Target : <0xffa004d4> { _ex_trap_c + 0x0 }
Source : <0xffa003ac> { _ex_workaround_261 + 0x1c } JUMP.S
4 Target : <0xffa00390> { _ex_workaround_261 + 0x0 }
Source : <0xffa0074e> { _trap + 0x66 } JUMP (P4)
5 Target : <0xffa00708> { _trap + 0x20 }
Source : <0xffa00704> { _trap + 0x1c } IF !CC JUMP
6 Target : <0xffa006e8> { _trap + 0x0 }
Source : <0xffa004a4> { _bfin_return_from_exception + 0x20 } RTX
7 Target : <0xffa00484> { _bfin_return_from_exception + 0x0 }
Source : <0xffa003a2> { _ex_workaround_261 + 0x12 } IF !CC JUMP
8 Target : <0xffa00390> { _ex_workaround_261 + 0x0 }
Source : <0xffa0074e> { _trap + 0x66 } JUMP (P4)
9 Target : <0xffa00708> { _trap + 0x20 }
Source : <0xffa00704> { _trap + 0x1c } IF !CC JUMP
10 Target : <0xffa006e8> { _trap + 0x0 }
Source : <0x001c1612> [ irattach + 0x15d2 ] 0x9b08
11 Target : <0x001c160e> [ irattach + 0x15ce ]
Source : <0x001c16b8> [ irattach + 0x1678 ] JUMP.S
12 Target : <0x001c16b8> [ irattach + 0x1678 ]
Source : <0x001c5350> [ irattach + 0x5310 ] RTS
13 Target : <0x001c534a> [ irattach + 0x530a ]
Source : <0x001c535e> [ irattach + 0x531e ] JUMP.S
14 Target : <0x001c5356> [ irattach + 0x5316 ]
Source : <0x001c11a4> [ irattach + 0x1164 ] RTS
15 Target : <0x001c1194> [ irattach + 0x1154 ]
Source : <0x001c5352> [ irattach + 0x5312 ] CALL pcrel
Userspace Stack
Stack info:
SP: [0x001cabc0] <0x001cabc0> [ irattach + 0xabc0 ]
Memory from 0x001cabc0 to 001cb000
001cabc0:[00000000] 00000000 000000a4 001cb144 00000000 3e34313c 206e614a 30203120
001cabe0: 31303a30 2031343a 6c737973 315b676f 3a5d3436 746f6720 47495320 4d524554
001cac00: 20726f20 49474953 000a544e 00000000 00000000 00000000 00000000 00000000
001cac20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cac40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cac60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cac80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caca0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cacc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cace0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cad00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cad20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cad40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cad60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cad80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cada0: 00000000 00000000 00000000 001cbbb5 00000000 00000002 00000001 00000000
001cadc0: 00000000 00000001 001cbfaa 00000001 00000000 00000002 00000003 008b8783
001cade0: 001cbf84 00001000 001c8a8a 00000000 00000001 00000009 00000000 20756854
001cae00: 206e614a 30203120 31303a30 2031343a 30373931 0000000a 00000000 00000010
001cae20: 00000000 032f9000 00000000 72690000 00306164 00000000 00000000 00000000
001cae40: 00000000 00000000 00000000 00000000 00000000 00435455 00000000 00000000
001cae60: 00000000 00000000 00000000 00000000 00000000 00000029 00000001 00000000
001cae80: 00000001 00000000 00000046 00000004 00000000 00000000 00000000 001ca85c
001caea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caf00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caf20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caf40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caf60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001caf80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cafa0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001cafc0: 00000000 00000000 001c8c34 00000000 001c8c34 001c120c 00000000 00000000
001cafe0: 00000000 00000001 00000000 00000000 00000002 00000001 00000000 001cbf99
Return addresses in stack:
Restarting system.þ
U-Boot 2008.10-svn1905 (ADI-2009R1-rc2) (Jun 8 2009 - 04:43:24)
CPU: ADSP bf537-0.2 (Detected Rev: 0.2) (bypass boot)
Board: ADI BF537 stamp board
Support: http://blackfin.uclinux.org/
Clock: VCO: 500 MHz, Core: 500 MHz, System: 125 MHz
RAM: 64 MB
Flash: 4 MB
In: serial
Out: serial
Err: serial
Net: Blackfin EMAC
MAC: 4E:03:4E:03:4E:03
Hit any key to stop autoboot: 0
bfin>
--
Follow-ups
--- Graf Yang 2009-07-28 06:31:28
Use the daemon() to make irattach run background. Now is fixed on trunk and
09R1.
--- Vivi Li 2009-08-05 02:57:39
OK now. Close it.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
config.irda application/octet-stream 32693 Vivi Li