Ok. Could you try with current xenomai-2.5 tip? We fixed a few things
which might, possibly, with some luck, be the cause of this issue.
I tried, but to me the result looks similar (see below). BTW, I have to
correct my previous report regarding the I-Pipe version, I actually used
adeos-ipipe-2.6.34-blackfin-1.15-01.patch. Not 1.14-02.
I'm unsure where I should set a reasonable breakpoint with gdb (attached via
gdbproxy) so that I could get a better backtrace? I tried to break at traps_c
but the stackframe at that time probably is of no help anymore.
Here's an example of the Illegal use of supervisor resource (the NULL pointer
exception didn't happen so far). This happened with 2.5.git. A difference to
the previous recordings is that the first reported source is _schedule and
not _xnpod_schedule_deferred, but I observed that sometimes also with 2.5.5.2.
Illegal use of supervisor resource
<5> - Attempted to use a Supervisor register or instruction from User mode.
<5> Supervisor resources are registers and instructions that are reserved
<5> for Supervisor use: Supervisor only registers, all MMRs, and Supervisor
<5> only instructions.
Deferred Exception context
CURRENT PROCESS:
COMM=pfda PID=252 CPU=0
TEXT = 0x01640000-0x01665c5c DATA = 0x016a0c5c-0x016a9314
BSS = 0x016a9314-0x01700000 USER-STACK = 0x0175fe40
return address: [0x000063f6]; contents of:
0x000063d0: 9151 e14a 001d e10a a424 9110 6fa6 4800
0x000063e0: 1409 e14a 001d e10a 45e4 9110 60f9 0808
0x000063f0: 1403 0001 2000 [0037] 0c41 1802 0061 304e
0x00006400: 4d69 4f69 0032 3211 a090 4c38 b090 6200
ADSP-BF537-0.3 533(MHz CCLK) 133(MHz SCLK) (mpu off)
Linux version 2.6.34.7-ADI-2010R1-svn10663 (k...@fee) (gcc version 4.3.5
(ADI-2010R1-RC4) ) #7 Tue Jan 11 18:24:08 CET 2011
SEQUENCER STATUS: Not tainted
SEQSTAT: 0000002e IPEND: 0008 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x2e
physical IVG3 asserted : <0xffa0076c> { _trap + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00cb1f18> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0xffa0094e> { _system_call + 0xba }
PC : <0x000063f6> { ___ipipe_sync_root + 0x32 }
DCPLB_FAULT_ADDR: <0x001d45e4> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x000063f6> { ___ipipe_sync_root + 0x32 }
PROCESSOR STATE:
R0 : 0000ffff R1 : 0000001f R2 : 00847e86 R3 : 00000000
R4 : 0000fffe R5 : 00f5a1f4 R6 : 00f08004 R7 : 00000080
P0 : 001d45e4 P1 : 0003761c P2 : 001d45e4 P3 : 0091cc68
P4 : 0091cc68 P5 : 00cb0000 FP : 00f5a158 SP : 00cb1e3c
LB0: 013e04a1 LT0: 013e049e LC0: 00000000
LB1: 013dcfdf LT1: 013dcfde LC1: 00000000
B0 : 00000137 L0 : 00000000 M0 : 00000000 I0 : 00000000
B1 : 000000c0 L1 : 00000000 M1 : 00000000 I1 : 00000001
B2 : 7ffff000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 0000005b I3 : 00000140
A0.w: 00000000 A0.x: 00000000 A1.w: 00000006 A1.x: 00000000
USP : 00f5a130 ASTAT: 02003004
Hardware Trace:
0 Target : <0x00003bf8> { _trap_c + 0x0 }
Source : <0xffa00700> { _exception_to_level5 + 0xa4 } JUMP.L
1 Target : <0xffa0065c> { _exception_to_level5 + 0x0 }
Source : <0xffa00510> { _bfin_return_from_exception + 0x18 } RTX
2 Target : <0xffa004f8> { _bfin_return_from_exception + 0x0 }
Source : <0xffa005b4> { _ex_trap_c + 0x74 } JUMP.S
3 Target : <0xffa00540> { _ex_trap_c + 0x0 }
Source : <0xffa007c4> { _trap + 0x58 } JUMP (P4)
4 Target : <0xffa0076c> { _trap + 0x0 }
FAULT : <0x000063f6> { ___ipipe_sync_root + 0x32 } CLI R7
Source : <0x000063f0> { ___ipipe_sync_root + 0x2c } IF !CC JUMP pcrel (BP)
5 Target : <0x000063c4> { ___ipipe_sync_root + 0x0 }
Source : <0xffa0094a> { _system_call + 0xb6 } CALL pcrel
6 Target : <0xffa0094a> { _system_call + 0xb6 }
Source : <0xffa00d12> { __common_int_entry + 0xce } RTI
7 Target : <0xffa00cb0> { __common_int_entry + 0x6c }
Source : <0xffa00982> { _system_call + 0xee } RTS
8 Target : <0xffa0097e> { _system_call + 0xea }
Source : <0xffa0096e> { _system_call + 0xda } IF !CC JUMP pcrel
9 Target : <0xffa00964> { _system_call + 0xd0 }
Source : <0xffa00954> { _system_call + 0xc0 } IF !CC JUMP pcrel
10 Target : <0xffa00952> { _system_call + 0xbe }
Source : <0xffa00942> { _system_call + 0xae } IF !CC JUMP pcrel
11 Target : <0xffa00930> { _system_call + 0x9c }
Source : <0xffa00962> { _system_call + 0xce } JUMP.S
12 Target : <0xffa00960> { _system_call + 0xcc }
Source : <0xffa01da6> { _schedule + 0x2e6 } RTS
13 Target : <0xffa01d96> { _schedule + 0x2d6 }
Source : <0x00032a2e> { ___ipipe_unstall_root + 0x2e } RTS
14 Target : <0x00032a1e> { ___ipipe_unstall_root + 0x1e }
Source : <0x00032a18> { ___ipipe_unstall_root + 0x18 } IF CC JUMP pcrel
(BP)
15 Target : <0x00032a00> { ___ipipe_unstall_root + 0x0 }
Source : <0xffa01d92> { _schedule + 0x2d2 } JUMP.L
_______________________________________________
Xenomai-help mailing list
[email protected]
https://mail.gna.org/listinfo/xenomai-help