2010-09-28 05:34:46 Crash in 2009R1-RC1 while entering one folder in USB stick
John Peter (INDIA)
Message: 93903
Hai,
I am using 2009R1-RC1 distribution for my custom board.I am getting crash when I enter one particular folder in the USB stick. This folder contains around 743 files. I am getting this error consistently while I cant get the error for other USB sticks. Can any one please clarify in this regard??
USB_Browsino: nNeriUL Lhe Path:/ atdusb0/aac...
dress
Kernel OOPS in progress
Deferred Exception context
CURRENT PROCESS:
COMM=AD004 PID=899
CPU = 0
TEXT = 0x06400000-0x06621324 DATA = 0x04000324-0x0503e6ac
BSS = 0x0503e6ac-0x078a0000 USER-STACK = 0x078bfea0
return address: [0x00000000]; contents of:
ADSP-BF533-0.6 594(MHz CCLK) 118(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Tainted: P
SEQSTAT: 0006002d IPEND: 8030 SYSCFG: 0006
EXCAUSE : 0x2d
interrupts disabled
physical IVG5 asserted : <0xffa00bd0> { _evt_ivhw + 0x0 }
physical IVG15 asserted : <0xffa00e20> { _evt_system_call + 0x0 }
logical irq 6 mapped : <0xffa0036c> { _timer_interrupt + 0x0 }
logical irq 15 mapped : <0xffa01ae0> { _ppi_irq + 0x0 }
logical irq 16 mapped : <0xffa01b74> { _sport_rx_handler + 0x0 }
logical irq 17 mapped : <0xffa01c58> { _sport_tx_handler + 0x0 }
logical irq 18 mapped : <0x00179e5c> { _SPORT1RxIsr + 0x0 }
logical irq 21 mapped : <0x00148238> { _bfin_serial_dma_rx_int + 0x0 }
logical irq 22 mapped : <0x00148574> { _bfin_serial_dma_tx_int + 0x0 }
logical irq 23 mapped : <0xffa0217c> { _NEC_IRQ + 0x0 }
logical irq 37 mapped : <0x0014f1c4> { _adp5520_irq_handler + 0x0 }
logical irq 43 mapped : <0x07775f30> { :smsc911x:_init_module + 0xcd8b70 }
logical irq 44 mapped : <0x00162478> { _usb_hcd_irq + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x0608bd7c> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x00000000> /* Maybe null pointer? */
PC : <0x00000000> /* Maybe null pointer? */
DCPLB_FAULT_ADDR: <0x0608bd78> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
PROCESSOR STATE:
R0 : 00000000 R1 : 0608bd58 R2 : 0608bd77 R3 : 0608bd76
R4 : 00000001 R5 : 00006134 R6 : 6d2e3f3f R7 : 3f3f2031
P0 : 0608bd76 P1 : 00a0c215 P2 : 0023a8d4 P3 : 30080020
P4 : 00000000 P5 : 00000000 FP : 0000000b SP : 0608bca0
LB0: ffa0155c LT0: ffa0155a LC0: 00000000
LB1: 00880a74 LT1: 00880a74 LC1: 00000000
B0 : 00000010 L0 : 00000000 M0 : ffffffe8 I0 : 00887628
B1 : 00000001 L1 : 00000000 M1 : 00000000 I1 : 0608be2c
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 002a46d0
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000004
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 0608b950 ASTAT: 02003004
Hardware Trace:
0 Target : <0x00083c84> { _trap_c + 0x0 }
Source : <0xffa0062a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa0058c> { _exception_to_level5 + 0x0 }
Source : <0xffa0046c> { _bfin_return_from_exception + 0x18 } RTX
2 Target : <0xffa00454> { _bfin_return_from_exception + 0x0 }
Source : <0xffa004e2> { _ex_trap_c + 0x46 } JUMP.S
3 Target : <0xffa0049c> { _ex_trap_c + 0x0 }
Source : <0xffa006f4> { _trap + 0x58 } JUMP (P4)
4 Target : <0xffa0069c> { _trap + 0x0 }
Source : <0x000c7948> { _filldir64 + 0x54 } RTS
5 Target : <0x000c7942> { _filldir64 + 0x4e }
Source : <0x000c79f6> { _filldir64 + 0x102 } JUMP.S
6 Target : <0x000c79dc> { _filldir64 + 0xe8 }
Source : <0xffa00212> { __access_ok + 0xba } RTS
7 Target : <0xffa00202> { __access_ok + 0xaa }
Source : <0xffa00180> { __access_ok + 0x28 } IF CC JUMP
8 Target : <0xffa00158> { __access_ok + 0x0 }
Source : <0x000c79d8> { _filldir64 + 0xe4 } CALL pcrel
9 Target : <0x000c79d2> { _filldir64 + 0xde }
Source : <0x000c7a0c> { _filldir64 + 0x118 } JUMP.S
10 Target : <0x000c7a0c> { _filldir64 + 0x118 }
Source : <0xffa0155e> { _memcpy + 0x5a } RTS
11 Target : <0xffa01556> { _memcpy + 0x52 }
Source : <0xffa01520> { _memcpy + 0x1c } IF !CC JUMP
12 Target : <0xffa01504> { _memcpy + 0x0 }
Source : <0x000c7a08> { _filldir64 + 0x114 } CALL pcrel
13 Target : <0x000c7a02> { _filldir64 + 0x10e }
Source : <0x000c79cc> { _filldir64 + 0xd8 } IF !CC JUMP
14 Target : <0x000c79ca> { _filldir64 + 0xd6 }
Source : <0xffa00212> { __access_ok + 0xba } RTS
15 Target : <0xffa00202> { __access_ok + 0xaa }
Source : <0xffa00180> { __access_ok + 0x28 } IF CC JUMP
Kernel Stack
Stack info:
SP: [0x0608bf24] <0x0608bf24> /* kernel dynamic memory */
Memory from 0x0608bf20 to 0608c000
0608bf20: 0000000a [0794ca9e] 00008000 00000000 00000000 0608c000 0794ca9e 0794ca9e
0608bf40:<0794ca26><ffa00e84> 02003024 0795fa61 0795f88d 0795fa1a 0795f88c 00000000
0608bf60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0608bf80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0608bfa0: ffffffe8 00000000 00000000 00000000 00000000 0608b950 06093980 0608b960
0608bfc0: 00460004 079c1938 00008004 078982f4 000000dc 079c1938 079c1938 0000000a
0608bfe0: 06093954 00000000 00008000 0608b960 0000000a 0000000a 000000dc 00000006
0608c000: 06358160
Return addresses in stack:
address : <0x0794ca26> [ /lib/libc.so.0 + 0xca26 ]
address : <0xffa00e84> { _evt_system_call + 0x64 }
Modules linked in: nls_cp437 nls_iso8859_1 vfat fat rtnet3070sta rt3070sta(P) rtutil3070sta adp5520_keys adp5520_bl backlight r8a66597_hcd smsc911x pca953x
Kernel panic - not syncing: Kernel exception
Regards,
Peter
QuoteReplyEditDelete
2010-09-28 11:09:00 Re: Crash in 2009R1-RC1 while entering one folder in USB stick
Mike Frysinger (UNITED STATES)
Message: 93913
increase the stack of your application. you are probably hitting a bug in uClibc that has already been fixed for 2010R1.
QuoteReplyEditDelete
2010-09-29 07:19:36 Re: Crash in 2009R1-RC1 while entering one folder in USB stick
John Peter (INDIA)
Message: 93971
Hai Mike,
Even after increaing the stack size from 16k to 32k, I am getting the same crash.
USB_Browsing:Entering the Path:/mnt/usb0/aac...
USB_Browsing:Total Time taken in Micro Seconds for Retrieving Record Info is : 10351000
USB_Browsing:Total Record Count : 748
USB_Browsing:The current Page Index is : 1
USB_Browsing:Value of u32_TotalRecordCount is 748
USB_Browsing: 1. 01 - On the Sunny Side of the Street.aac.m4a FILE
USB_Browsing: 2. 01 112kbps_44k_stereo_to_103kbps_44100Hz.m4a FILE
USB_Browsing: 3. 01 112kbps_48k_stereo_to_104kbps_48000Hz.m4a FILE
USB_Browsing: 4. 01 96kbps_44k_mono_to_84kbps_44100Hz.m4a FILE
Message:" Attention: more than 200 entries in folder, no sorting possible.."
Data access misaligned address violation
- Attempted misaligned data memory or data cache access.
Deferred Exception context
CURRENT PROCESS:
COMM=AD004 PID=806
CPU = 0
TEXT = 0x06c00000-0x06e1ca28 DATA = 0x01000a28-0x01e60d0c
BSS = 0x01e60d0c-0x078a0000 USER-STACK = 0x078bfea0
return address: [0x06d5df8a]; contents of:
0x06d5df60: 6032 0810 a1b9 1809 3040 61e9 e3ff 6326
0x06d5df70: 6000 e801 0000 0010 ad8a 0c39 6000 0708
0x06d5df80: 9152 0c42 180a 0000 0000 [9513] 0c03 a850
0x06d5df90: 1804 42c2 0c02 1005 6000 e801 0000 0010
ADSP-BF533-0.6 594(MHz CCLK) 118(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Tainted: P
SEQSTAT: 00060024 IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x24
interrupts disabled
physical IVG5 asserted : <0xffa00bd0> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x079c6000> [ AD004 + 0x0 ]
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x06d416b4> [ /AD004 + 0x1416b4 ]
PC : <0x06d5df8a> [ /AD004 + 0x15df8a ]
DCPLB_FAULT_ADDR: <0x079c5bc0> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x000a87de> { _module_address_lookup + 0x5e }
PROCESSOR STATE:
R0 : 00000000 R1 : 00000000 R2 : 00000006 R3 : 00000000
R4 : 00000001 R5 : 0000007d R6 : 06be0004 R7 : 010ac040
P0 : 06be0004 P1 : 0615dd80 P2 : 6d2e3f3f P3 : 010ac040
P4 : 00000115 P5 : 00000000 FP : 06bd8fd8 SP : 079c5f24
LB0: 07836965 LT0: 07836958 LC0: 00000000
LB1: 06d3a4b9 LT1: 06d3a490 LC1: 000003f7
B0 : 0000006e L0 : 00000000 M0 : 0000000b I0 : 00000000
B1 : 00000124 L1 : 00000000 M1 : 00000000 I1 : 00000000
B2 : 065cc104 L2 : 00000000 M2 : 00000000 I2 : 010ac040
B3 : 00000140 L3 : 00000000 M3 : 000000ff I3 : 0000000c
A0.w: 00006fc0 A0.x: 00000000 A1.w: 00000d74 A1.x: 00000000
USP : 06bd8f9c ASTAT: 02002000
Hardware Trace:
0 Target : <0x00083c84> { _trap_c + 0x0 }
Source : <0xffa0062a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa0058c> { _exception_to_level5 + 0x0 }
Source : <0xffa0046c> { _bfin_return_from_exception + 0x18 } RTX
2 Target : <0xffa00454> { _bfin_return_from_exception + 0x0 }
Source : <0xffa004e2> { _ex_trap_c + 0x46 } JUMP.S
3 Target : <0xffa0049c> { _ex_trap_c + 0x0 }
Source : <0xffa006f4> { _trap + 0x58 } JUMP (P4)
4 Target : <0xffa0069c> { _trap + 0x0 }
Source : <0x06d5df88> [ /AD004 + 0x15df88 ] 0x0000
5 Target : <0x06d5df78> [ /AD004 + 0x15df78 ]
Source : <0x06d5df66> [ /AD004 + 0x15df66 ] IF !CC JUMP
6 Target : <0x06d5df5e> [ /AD004 + 0x15df5e ]
Source : <0xffa00bcc> { __common_int_entry + 0xcc } RTI
7 Target : <0xffa00b6a> { __common_int_entry + 0x6a }
Source : <0xffa0087c> { _system_call + 0xb8 } RTS
8 Target : <0xffa00878> { _system_call + 0xb4 }
Source : <0xffa00868> { _system_call + 0xa4 } IF !CC JUMP
9 Target : <0xffa00862> { _system_call + 0x9e }
Source : <0xffa00852> { _system_call + 0x8e } IF !CC JUMP
10 Target : <0xffa00832> { _system_call + 0x6e }
Source : <0xffa00a10> { _schedule_and_signal_from_int + 0x34 } JUMP.S
11 Target : <0xffa00a0e> { _schedule_and_signal_from_int + 0x32 }
Source : <0x0008065e> { _finish_atomic_sections + 0x32 } RTS
12 Target : <0x00080658> { _finish_atomic_sections + 0x2c }
Source : <0x00080648> { _finish_atomic_sections + 0x1c } IF !CC JUMP
13 Target : <0x0008062c> { _finish_atomic_sections + 0x0 }
Source : <0xffa00a0a> { _schedule_and_signal_from_int + 0x2e } CALL pcrel
14 Target : <0xffa009dc> { _schedule_and_signal_from_int + 0x0 }
Source : <0xffa009b6> { _return_from_int + 0x56 } RTI
15 Target : <0xffa00960> { _return_from_int + 0x0 }
Source : <0xffa00b66> { __common_int_entry + 0x66 } CALL pcrel
Userspace Stack
Stack info:
SP: [0x06bd8f9c] <0x06bd8f9c> [ AD004 + 0x8f9c ]
Memory from 0x06bd8f90 to 06bd9000
06bd8f90: 3ff00000 00000000 00000000 [00000001] 00000000 00000000 ffffffff 00000000
06bd8fb0: 00000001 00000000 0049d70c 06bd8ffc 06bd9220 <06d41698> 00000000 00000115
06bd8fd0: 010ac040 06be0004 06bd9220 <06d416b4> 00000000 00000000 00000000 00000000
06bd8ff0: 00000000 06bd91ec 06bd91dc 00000000 00000000
Return addresses in stack:
address : <0x06d41698> [ /AD004 + 0x141698 ]
address : <0x06d416b4> [ /AD004 + 0x1416b4 ]
Data access CPLB miss
- Used by the MMU to signal a CPLB miss on a data access.
Deferred Exception context
CURRENT PROCESS:
COMM=AD004 PID=805
CPU = 0
TEXT = 0x06c00000-0x06e1ca28 DATA = 0x01000a28-0x01e60d0c
BSS = 0x01e60d0c-0x078a0000 USER-STACK = 0x078bfea0
return address: [0x078957a8]; contents of:
0x07895780: 325c e3ff f47d 0d00 3008 1863 0000 320e
0x07895790: 914a 9155 086a 1408 202e 0000 916d 086a
0x078957a0: 182a 0000 0000 0000 [a168] 0801 17f7 9169
0x078957b0: a068 6001 325c b048 ac6a a1e8 9351 e3ff
ADSP-BF533-0.6 594(MHz CCLK) 118(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Tainted: P
SEQSTAT: 00060026 IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x26
interrupts disabled
physical IVG5 asserted : <0xffa00bd0> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x079c4000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x07895786> [ /lib/libpthread.so.0 + 0x5786 ]
PC : <0x078957a8> [ /lib/libpthread.so.0 + 0x57a8 ]
DCPLB_FAULT_ADDR: <0x07831420> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x00082c12> { _decode_address + 0x112 }
PROCESSOR STATE:
R0 : 6a080030 R1 : 00000326 R2 : 80000001 R3 : 00000000
R4 : 00000008 R5 : 079c1da4 R6 : 07820e40 R7 : 00000000
P0 : 00000072 P1 : 07820e40 P2 : 07820a80 P3 : 07811938
P4 : 07821388 P5 : 6d006134 FP : 079c1da8 SP : 079c3f24
LB0: 0791f7e9 LT0: 0791f7e6 LC0: 00000000
LB1: 07895993 LT1: 0789598c LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : ffffffe8 I0 : 079c1eb0
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 078451bc
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 079c1d98 ASTAT: 02002002
Hardware Trace:
0 Target : <0x00083c84> { _trap_c + 0x0 }
Source : <0xffa0062a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa0058c> { _exception_to_level5 + 0x0 }
Source : <0xffa0046c> { _bfin_return_from_exception + 0x18 } RTX
2 Target : <0xffa00454> { _bfin_return_from_exception + 0x0 }
Source : <0xffa004e2> { _ex_trap_c + 0x46 } JUMP.S
3 Target : <0xffa00380> { _ex_dcplb_miss + 0x0 }
Source : <0xffa006f4> { _trap + 0x58 } JUMP (P4)
4 Target : <0xffa0069c> { _trap + 0x0 }
Source : <0x078957a6> [ /lib/libpthread.so.0 + 0x57a6 ] 0x0000
5 Target : <0x0789579b> [ /lib/libpthread.so.0 + 0x579b ]
Source : <0x078957ac> [ /lib/libpthread.so.0 + 0x57ac ] IF CC JUMP
6 Target : <0x078957a6> [ /lib/libpthread.so.0 + 0x57a6 ]
Source : <0x07895796> [ /lib/libpthread.so.0 + 0x5796 ] IF CC JUMP
7 Target : <0x07895786> [ /lib/libpthread.so.0 + 0x5786 ]
Source : <0x0790ec88> [ /lib/libc.so.0 + 0xec88 ] RTS
8 Target : <0x0790ec84> [ /lib/libc.so.0 + 0xec84 ]
Source : <0x0790ec38> [ /lib/libc.so.0 + 0xec38 ] RTS
9 Target : <0x0790ec26> [ /lib/libc.so.0 + 0xec26 ]
Source : <0xffa00bcc> { __common_int_entry + 0xcc } RTI
10 Target : <0xffa00b6a> { __common_int_entry + 0x6a }
Source : <0xffa00e84> { _evt_system_call + 0x64 } JUMP.S
11 Target : <0xffa00e84> { _evt_system_call + 0x64 }
Source : <0xffa0087c> { _system_call + 0xb8 } RTS
12 Target : <0xffa00878> { _system_call + 0xb4 }
Source : <0xffa00868> { _system_call + 0xa4 } IF !CC JUMP
13 Target : <0xffa00862> { _system_call + 0x9e }
Source : <0xffa00852> { _system_call + 0x8e } IF !CC JUMP
14 Target : <0xffa0082c> { _system_call + 0x68 }
Source : <0x00091500> { _sys_wait4 + 0x90 } RTS
15 Target : <0x000914f8> { _sys_wait4 + 0x88 }
Source : <0x0009c724> { _put_pid + 0x50 } RTS
Userspace Stack
Stack info:
SP: [0x079c1d98] <0x079c1d98> [ AD004 + 0x1d98 ]
FP: (0x079c1d90)
Memory from 0x079c1d90 to 079c2000
079c1d90:(079c1da8)<07895786>[079c1da0] 00005000 00004004 00000007 (079c1fb8)<07895d30>
079c1db0: 079c1fb8 078214e0 00000000 ffffffff 07821388 75616665 6d5f746c 6f687465
079c1dd0: 00000000 079c1fb0 00000000 079c1fb0 07820a54 00000004 07820e40 07820a48
079c1df0: 07823670 0782366c 079c1f30 079c1e1c 060cfe24 00000017 00005817 06150004
079c1e10: 00000000 00000352 013ce4cc 060cfe24 00000000 060cfc78 0783da1c 013ce4cc
079c1e30: 80000000 00000000 00000000 060cfc90 0783c45c 00000000 80000000 00000000
079c1e50: 80000000 00000000 6f746365 060cfc24 <078964da> 0781127c 07811938 060cfc24
079c1e70:<078960f0> 0781127c 078115b0 0781127c 07811938 060cfc3c <078960f0> 0781127c
079c1e90: 060cfc58 <0792f344> 060e3ebc 078115b0 060cfc58 060cfc50 <078943a8> 07811938
079c1eb0: ffffffef fffffffe ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
079c1ed0: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
079c1ef0: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
079c1f10: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
079c1f30: 00000008 00000000 00000000 00000000 00000000 00000000 00000000 00000000
079c1f50: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
079c1f70: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
079c1f90: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
079c1fb0: 00000002 00000000 (00000000)<0790bdec> 07821388 07813b28 07820a4c 01398a08
079c1fd0: 07823638 07820a80 00000003 65767275 53445f00 454d5f4f 444f4854 65706f5f
079c1ff0: 6c73736e 00002000 00000000 0783eff4 06aef340
Return addresses in stack:
frame 1 : <0x07895786> [ /lib/libpthread.so.0 + 0x5786 ]
frame 2 : <0x07895d30> [ /lib/libpthread.so.0 + 0x5d30 ]
address : <0x078964da> [ /lib/libpthread.so.0 + 0x64da ]
address : <0x078960f0> [ /lib/libpthread.so.0 + 0x60f0 ]
address : <0x078960f0> [ /lib/libpthread.so.0 + 0x60f0 ]
address : <0x0792f344> [ /lib/libc.so.0 + 0x2f344 ]
address : <0x078943a8> [ /lib/libpthread.so.0 + 0x43a8 ]
frame 3 : <0x0790bdec> [ /lib/libc.so.0 + 0xbdec ]
Regards,
Peter
QuoteReplyEditDelete
2010-09-29 09:09:19 Re: Crash in 2009R1-RC1 while entering one folder in USB stick
Mike Frysinger (UNITED STATES)
Message: 93974
that is not the same crash. are you sure you increased the stack enough ?
please review the documentation:
docs.blackfin.uclinux.org/doku.php?id=uclinux-dist:debugging_applications#stack_checking
QuoteReplyEditDelete