This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

Linux/PROCESSOR-SDK-AM335X: Kernel crash

Part Number: PROCESSOR-SDK-AM335X

Tool/software: Linux

Hi,

I am trying to read the data from accelerator from i2c based.my driver probed and trying to reads the data and getting the below kernel crash:

--------------------------------------

root@am335x-evm:~# cat /sys/bus/i2c/devices/1-006b/accelerometer/range
[ 691.466131] Unable to handle kernel NULL pointer dereference at virtual address 0000001c
[ 691.474857] pgd = ed3ec000
[ 691.477741] [0000001c] *pgd=ac311831, *pte=00000000, *ppte=00000000
[ 691.484488] Internal error: Oops: 17 [#4] ARM
[ 691.489119] Modules linked in: musb_am335x [last unloaded: configfs]
[ 691.495908] CPU: 0 PID: 2499 Comm: cat Tainted: G D 3.12.10 #41
[ 691.503123] task: ed4551c0 ti: ed0bc000 task.ti: ed0bc000
[ 691.508888] PC is at mutex_lock+0x14/0x3c
[ 691.513157] LR is at mutex_lock+0x14/0x3c
[ 691.517425] pc : [<c05b1224>] lr : [<c05b1224>] psr: 60000013
[ 691.517425] sp : ed0bdec0 ip : ed0bdec0 fp : ed0bded4
[ 691.529616] r10: ed354188 r9 : be86ac04 r8 : ed0bdf78
[ 691.535169] r7 : ec3a3298 r6 : ed40c000 r5 : 00000000 r4 : 0000001c
[ 691.542104] r3 : ed0bc000 r2 : ed0bdeb0 r1 : c08c75a0 r0 : 00000000
[ 691.549042] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user
[ 691.556622] Control: 10c5387d Table: ad3ec019 DAC: 00000015
[ 691.562727] Process cat (pid: 2499, stack limit = 0xed0bc240)
[ 691.568834] Stack: (0xed0bdec0 to 0xed0be000)
[ 691.573480] dec0: c0402a58 0000001c ed0bdef4 ed0bded8 c0402a84 c05b121c c0402a58 c05d5fe4
[ 691.582178] dee0: ed347640 ec3a3280 ed0bdf04 ed0bdef8 c02611f8 c0402a64 ed0bdf44 ed0bdf08
[ 691.590875] df00: c0129220 c02611e8 00000001 00000020 ed40c000 00001000 c085c370 ed7b5a80
[ 691.599573] df20: 00001000 be86ac04 ed0bdf78 00000000 ed0bc000 00001000 ed0bdf74 ed0bdf48
[ 691.608269] df40: c00cde08 c0129194 c00ccec0 c00d7384 00000000 00000000 ed7b5a80 be86ac04
[ 691.616965] df60: 00000000 00001000 ed0bdfa4 ed0bdf78 c00ce02c c00cdd74 00000000 00000000
[ 691.625661] df80: 00001000 be86ac04 00000003 00000003 c0014828 00000000 00000000 ed0bdfa8
[ 691.634358] dfa0: c0014680 c00cdff4 00001000 be86ac04 00000003 be86ac04 00001000 00000000
[ 691.643054] dfc0: 00001000 be86ac04 00000003 00000003 00095778 00000001 00000000 00000003
[ 691.651752] dfe0: 000979a0 be86abe8 00012b80 b6f0e45c 40000010 00000003 55555155 557d1555
[ 691.660430] Backtrace:
[ 691.663076] [<c05b1210>] (mutex_lock+0x0/0x3c) from [<c0402a84>] (attr_get_range_acc+0x2c/0x70)
[ 691.672313] r4:0000001c r3:c0402a58
[ 691.676159] [<c0402a58>] (attr_get_range_acc+0x0/0x70) from [<c02611f8>] (kobj_attr_show+0x1c/0x28)
[ 691.685762] r6:ec3a3280 r5:ed347640 r4:c05d5fe4 r3:c0402a58
[ 691.691845] [<c02611dc>] (kobj_attr_show+0x0/0x28) from [<c0129220>] (sysfs_read_file+0x98/0x140)
[ 691.701298] [<c0129188>] (sysfs_read_file+0x0/0x140) from [<c00cde08>] (vfs_read+0xa0/0x140)
[ 691.710278] [<c00cdd68>] (vfs_read+0x0/0x140) from [<c00ce02c>] (SyS_read+0x44/0x78)
[ 691.718536] [<c00cdfe8>] (SyS_read+0x0/0x78) from [<c0014680>] (ret_fast_syscall+0x0/0x30)
[ 691.727324] Code: e92dd818 e24cb004 e1a04000 eb0002ec (e1943f9f)
[ 691.733869] ---[ end trace fd172565b145639e ]---
Segmentation fault
---------------------------------------------------------------------------

Thanks,