Other Parts Discussed in Thread: TDA4VH
Tool/software:
TDA4VH custom board
SDK 11.0 linux+freertos
After our board was powered on, everything in Linux and the apps was running normally. However, about 8 hours later, all the apps received an illegal instruction signal, causing them to crash. Immediately after that, the Linux kernel also crashed.
The following is the log during the crash.
[27866.116923] audit: type=1334 audit(1693554270.946:107): prog-id=61 op=UNLOAD [28494.551441] audit: type=1334 audit(1693554899.398:108): prog-id=62 op=LOAD [28495.295244] audit: type=1334 audit(1693554900.139:109): prog-id=62 op=UNLOAD [28587.615108] systemd-journald[136]: Time jumped backwards, rotating. [29046.216841] audit: type=1701 audit(1693555451.077:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=884 comm="dds.ev.0" exe="/hirain/appact/hi_alg_fusion/bin/hi_alg_fusion.out" sig=4 res=1 [29046.235019] audit: type=1701 audit(1693555451.077:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=740 comm="dds.ev.0" exe="/hirain/appact/hi_alg_s2s/bin/hi_alg_s2s.out" sig=4 res=1 [29046.252625] audit: type=1701 audit(1693555451.077:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=136 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" sig=4 res=1 [29046.269851] audit: type=1701 audit(1693555451.077:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=883 comm="dds.ev.0" exe="/hirain/appact/hi_alg_ehr/bin/hi_alg_ehr.out" sig=4 res=1 [29046.287422] audit: type=1701 audit(1693555451.077:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=898 comm="dds.ev.0" exe="/hirain/appact/hi_park_percep/bin/hi_park_percep.out" sig=4 res=1 [29046.305676] audit: type=1701 audit(1693555451.077:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=725 comm="dds.ev.0" exe="/hirain/appact/hi_alg_avp/bin/hi_alg_avp.out" sig=4 res=1 [29046.323224] audit: type=1701 audit(1693555451.081:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=746 comm="dds.ev.0" exe="/hirain/appact/hi_6vpercep_app/bin/hi_6vpercep_app.out" sig=4 res=1 [29046.341640] audit: type=1701 audit(1693555451.093:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1 comm="systemd" exe="/usr/lib/systemd/systemd" sig=11 res=1 [29046.464954] audit: type=1701 audit(1693555451.327:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1784 comm="hi_tsync.out" exe="/hirain/appact/hi_tsync/bin/hi_tsync.out" sig=4 res=1 [29046.482624] audit: type=1701 audit(1693555451.327:119): auid=4294967295 uid=996 gid=994 ses=4294967295 subj=kernel pid=638 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" sig=4 res=1 [29046.482900] Unable to handle kernel paging request at virtual address 0030312c353233a2 [29046.508080] Mem abort info: [29046.510872] ESR = 0x0000000096000004 [29046.514616] EC = 0x25: DABT (current EL), IL = 32 bits [29046.519919] SET = 0, FnV = 0 [29046.522966] EA = 0, S1PTW = 0 [29046.526099] FSC = 0x04: level 0 translation fault [29046.530969] Data abort info: [29046.533843] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [29046.539319] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [29046.544359] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [29046.549663] [0030312c353233a2] address between user and kernel address ranges [29046.556787] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [29046.563038] Modules linked in: 8021q garp mrp stp llc ti_cpsw_proxy_client rpmsg_ctrl rpmsg_char crct10dif_ce wave5 videobuf2_dma_contig v4l2_mem2mem omap_mailbox omap_hwspinlock videobuf2_v4l2 phy_can_transceiver ti_k3_r5_remoteproc videobuf2_memops videobuf2_common k3_j72xx_bandgap videodev ti_k3_dsp_remoteproc pvrsrvkm(O) sa2ul ti_k3_common mc rti_wdt overlay cryptodev(O) fuse drm drm_panel_orientation_quirks backlight ipv6 [29046.600824] CPU: 6 UID: 996 PID: 638 Comm: systemd-resolve Tainted: G O 6.12.17-tda4vhmiddleclassda-00773-gcdcaeac783e3-dirty #1 [29046.613751] Tainted: [O]=OOT_MODULE [29046.617226] Hardware name: Texas Instruments J784S4 EVM (DT) [29046.622868] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [29046.629811] pc : insert_inode_locked+0xa8/0x274 [29046.634344] lr : insert_inode_locked+0x94/0x274 [29046.638862] sp : ffff800083bf3690 [29046.642165] x29: ffff800083bf36e0 x28: 0000000000000000 x27: ffff0008c110d8c0 [29046.649287] x26: ffff000f59350000 x25: ffff800081299600 x24: ffff0008c8bf4800 [29046.656407] x23: ffff000f59b5daa8 x22: 0000000000101b55 x21: 000000000003fe35 [29046.663528] x20: ffff0008bc5bf1a8 x19: 3830312c35323362 x18: 0000000000000001 [29046.670647] x17: 0000000000000000 x16: 0000000000000000 x15: ffff000f5c3df240 [29046.677767] x14: 0000000000000001 x13: ffff0008be2a5300 x12: ffff000f5c3c92c0 [29046.684886] x11: 00001a055ba7f4cf x10: 00000000000009e0 x9 : 0000000000000000 [29046.692007] x8 : ffff0008bc5bf0bc x7 : 0000000000000000 x6 : 00000000fffe3fb0 [29046.699127] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000001 [29046.706245] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff800081299600 [29046.713365] Call trace: [29046.715800] insert_inode_locked+0xa8/0x274 [29046.719974] __ext4_new_inode+0x870/0x11f8 [29046.724063] ext4_create+0xe0/0x1fc [29046.727542] path_openat+0xeb0/0x107c [29046.731195] do_filp_open+0x9c/0x14c [29046.734759] filp_open+0x100/0x184 [29046.738149] do_coredump+0x7d8/0x1580 [29046.741801] get_signal+0x7c8/0x8c8 [29046.745280] do_signal+0x118/0xeb4 [29046.748673] do_notify_resume+0xc8/0x140 [29046.752584] el0_undef+0x84/0x98 [29046.755803] el0t_64_sync_handler+0xd8/0x12c [29046.760059] el0t_64_sync+0x190/0x194 [29046.763712] Code: b4000193 d503201f f1034273 54000120 (f9402260) [29046.769789] ---[ end trace 0000000000000000 ]---