AnsweredAssumed Answered

How to run a user defined application mounted in SD card?

Question asked by yxd4038@sina.com on Apr 27, 2013
Latest reply on May 5, 2013 by yxd4038@sina.com

hello world,

     I have a bf518f-ezbrd with linux-kernel(2011R1).The uimage is put in the SD card, and my user defined application are there as well.

     Now I want to run the applications in the SD card.

      "./tool" is put in the console,"tool" is the applicaiton compiled in debian 6.0 with gcc4.3. the system tell me "tool:applet not found".

 

     Later I compile the file using arm-elf-gcc and run it again the sysem tell me is shown below

 

root:/mnt> ./systool
NULL pointer access
Deferred Exception context
CURRENT PROCESS:
COMM=systool PID=212  CPU=0
TEXT = 0x029e0040-0x029e6120        DATA = 0x029e6140-0x029e7180
BSS = 0x029e7180-0x029e74b0  USER-STACK = 0x029e8f7c

return address: [0x029e0050]; contents of:
0x029e0030:  0000  0000  0000  0000  0000  0000  0000  0000
0x029e0040:  0000  0000  0000  0000  0000  0000  0000  0000
0x029e0050: [b000] e3a0  0000  e59d  1004  e59d  2008  e59d
0x029e0060:  009b  eb00  05bf  eb00  c00d  e1a0  d800  e92d

ADSP-BF518-0.0(Detected 0.2) 400(MHz CCLK) 80(MHz SCLK) (mpu off)
Linux version 3.0.8-ADI-2011R1 (root@debian) (gcc version 4.3.5 (ADI-2011R1-RC4)
) #52 Sat Apr 27 16:07:39 CST 2013

SEQUENCER STATUS:               Not tainted
SEQSTAT: 00000027  IPEND: 0008  IMASK: ffff  SYSCFG: 0006
  EXCAUSE   : 0x27
  physical IVG3 asserted : <0xffa00710> { _trap + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x029da000> [ init + 0x0 ]
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x02894058> [ sh + 0x14058 ]
PC  : <0x029e0050> [ systool + 0x10 ]
DCPLB_FAULT_ADDR: <0x00000008> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x029e0050> [ systool + 0x10 ]
PROCESSOR STATE:
R0 : 00000000    R1 : 0284a2a4    R2 : 028ef0cc    R3 : 0000002f
R4 : 00000000    R5 : 00000000    R6 : 0284a2a4    R7 : 00000000
P0 : 0000000b    P1 : 0284a2e6    P2 : 028f0398    P3 : 028fadec
P4 : 0284a2e4    P5 : 029e6140    FP : 028fad38    SP : 029d9f24
LB0: 0288c8af    LT0: 0288c89c    LC0: ffffffff
LB1: 028926d7    LT1: 028926cc    LC1: 00000000
B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 0284a10c
B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 028fad88
B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000
B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000
A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000
USP : 029e8f7c  ASTAT: 02003004

Hardware Trace:
   0 Target : <0x00003fcc> { _trap_c + 0x0 }
     Source : <0xffa006a4> { _exception_to_level5 + 0xa4 } JUMP.L
   1 Target : <0xffa00600> { _exception_to_level5 + 0x0 }
     Source : <0xffa004b4> { _bfin_return_from_exception + 0x18 } RTX
   2 Target : <0xffa0049c> { _bfin_return_from_exception + 0x0 }
     Source : <0xffa00558> { _ex_trap_c + 0x74 } JUMP.S
   3 Target : <0xffa004e4> { _ex_trap_c + 0x0 }
     Source : <0xffa0076a> { _trap + 0x5a } JUMP (P4)
   4 Target : <0xffa00710> { _trap + 0x0 }
      FAULT : <0x029e0050> [ systool + 0x10 ] [P0 + 0] = R0
     Source : <0xffa00c58> { __common_int_entry + 0xcc } RTI
   5 Target : <0xffa00bf6> { __common_int_entry + 0x6a }
     Source : <0xffa00fb0> { _evt_system_call + 0x64 } JUMP.S
   6 Target : <0xffa00fb0> { _evt_system_call + 0x64 }
     Source : <0xffa008f6> { _system_call + 0xbe } RTS
   7 Target : <0xffa008f2> { _system_call + 0xba }
     Source : <0xffa008e2> { _system_call + 0xaa } IF !CC JUMP pcrel
   8 Target : <0xffa008d8> { _system_call + 0xa0 }
     Source : <0xffa008c8> { _system_call + 0x90 } IF !CC JUMP pcrel
   9 Target : <0xffa008a2> { _system_call + 0x6a }
     Source : <0x00001964> { _sys_execve + 0x50 } RTS
  10 Target : <0x0000195c> { _sys_execve + 0x48 }
     Source : <0x000484f8> { _kmem_cache_free + 0x3c } RTS
  11 Target : <0x000484bc> { _kmem_cache_free + 0x0 }
     Source : <0x00001958> { _sys_execve + 0x44 } CALL pcrel
  12 Target : <0x0000194a> { _sys_execve + 0x36 }
     Source : <0x0004fd1a> { _do_execve + 0x22 } RTS
  13 Target : <0x0004fd12> { _do_execve + 0x1a }
     Source : <0x0004fed8> { _do_execve + 0x1e0 } IF CC JUMP pcrel
  14 Target : <0x0004fed4> { _do_execve + 0x1dc }
     Source : <0x00048a62> { _kfree + 0x76 } RTS
  15 Target : <0x00048a34> { _kfree + 0x48 }
     Source : <0x00048a2e> { _kfree + 0x42 } IF !CC JUMP pcrel
Userspace Stack
Stack info:
SP: [0x029e8f7c] <0x029e8f7c> [ systool + 0x8f7c ]
Memory from 0x029e8f70 to 029e9000
029e8f70: 00000000  00000000  00000000 [00000001] 029e8f9d  00000000  029e8fa7
029e8fb2
029e8f90: 029e8fd5  029e8fe9  00000000  732f2e00  6f747379  54006c6f  3d4d5245
756e696c
029e8fb0: 41500078  2f3d4854  3a6e6962  7273752f  6e69622f  62732f3a  2f3a6e69
2f727375
029e8fd0: 6e696273  53554800  45565f48  4f495352  2e313d4e  342e3831  44575000
6e6d2f3d
029e8ff0: 2f2e0074  74737973  006c6f6f  00000000
Return addresses in stack:
SEGV
root:/mnt>

 

 

     What should I do to run the applicaion in the situation mentioned before.

Outcomes