tNet0 task has been terminated after [REDAWorker_leaveExclusiveArea ()]

1 post / 0 new
Offline
Last seen: 7 years 1 month ago
Joined: 11/11/2015
Posts: 1
tNet0 task has been terminated after [REDAWorker_leaveExclusiveArea ()]

Platform : mpc8548 (p2020 smp), vxWorks 6.9.4.0

RTI-Connext ver : 5.2.0

Hello.

When I reboot  my system, a ppc machine has been crashed sometimes.(not always, most times it worked after reboot)

It has been unable to analyze because network connection also stopped.  So I just rebooted the system.

This time with H/W part support,  I finally got serial i/o and saw some errors (edrShow result) below.

This says "RTP < bin/WEPSIF_TPD.vxe (0x13bbd670)" is crashed

while "0x8cb11a50 REDACursor_finish+0x68 : REDAWorker_leaveExclusiveArea ()" is running.

And after that tNet0 stopped.

This is a RTP application and I beleived RTP application cannot mass up with kernel process such as "tNet0".

I wonder which scenario could cause this phenomenon.

----------------------------------------------------------------------------------------------------------------------

-> edrShow
ERROR LOG
=========
Log Size: 12288 bytes (0 pages)
Record Size: 4096 bytes
Max Records: 2
CPU Type: 0x5a
Errors Missed: 0 (old) + 0 (recent)
Error count: 2
Boot count: 1
Generation count: 1

==[1/2]==============================================================
Severity/Facility: FATAL/RTP
Boot Cycle: 1
OS Version: 6.9.4
CPU Number: 1
Time: WED APR 04 07:53:14 2018 (ticks = 53401)
Task: "rR00001d4b91001" (0x13b9e820)
RTP: "/tffs1/KSS1_PIP/bin/WEPSIF_TPD.vxe" (0x13bbd670)
RTP Address Space: 0x8c000000 -> 0x8d530688
Injection Point: rtpSigLib.c:6225

Default Signal Handling : Abnormal termination of RTP < bin/WEPSIF_TPD.vxe (0x13bbd670)


<<<<<Memory Map>>>>>

0x00100000 -> 0x00385400: kernel
0x8c000000 -> 0x8d530688: RTP
0x13d45710 -> 0x13d7ae86: SYSMGR_SMA.out

<<<<<Registers>>>>>

r0 = 0x00000000 sp = 0x9f2d2e00 r2 = 0x8d334a48
r3 = 0x9ef43800 r4 = 0x00000000 r5 = 0x9ea651c0
r6 = 0x00000000 r7 = 0x00000000 r8 = 0x00000035
r9 = 0x00000000 r10 = 0xb12a1640 r11 = 0x00000000
r12 = 0x00000000 r13 = 0x8d5254e8 r14 = 0x00000000
r15 = 0x8ca90dfc r16 = 0x8d51ea14 r17 = 0x8caac65c
r18 = 0x9ea6dee4 r19 = 0x8d520384 r20 = 0x00000000
r21 = 0x8d51eb14 r22 = 0x9ed2f830 r23 = 0x9ef43800
r24 = 0x8cb11adc r25 = 0x9f2d2e98 r26 = 0x8cb11adc
r27 = 0x9f2d2e8c r28 = 0x8cb11c00 r29 = 0x40000000
r30 = 0x00000000 r31 = 0x9ef43800 msr = 0x0202d230
lr = 0x8cb11a50 ctr = 0x8cb0d4ac pc = 0x8cb0d544
cr = 0x42000282 xer = 0x00000000 pgTblPtr = 0x8d1afdf8
asid = 0x00000003 spefscr = 0x0000003c

<<<<<Disassembly>>>>>

0x8cb0d524 80050004 lwz r0,4(r5)
0x8cb0d528 90090004 stw r0,4(r9)
0x8cb0d52c 81650004 lwz r11,4(r5)
0x8cb0d530 2f8b0000 cmpi crf7,0,r11,0x0 # 0
0x8cb0d534 419e0008 bc 0xc,30, 0x8cb0d53c # 0x8cb0d53c
0x8cb0d538 912b0008 stw r9,8(r11)
0x8cb0d53c 81650000 lwz r11,0(r5)
0x8cb0d540 38000000 li r0,0x0 # 0
*0x8cb0d544 812b0010 lwz r9,16(r11)
0x8cb0d548 3929ffff addi r9,r9,0xffff # -1
0x8cb0d54c 912b0010 stw r9,16(r11)
0x8cb0d550 90050004 stw r0,4(r5)
0x8cb0d554 90050008 stw r0,8(r5)
0x8cb0d558 90050000 stw r0,0(r5)
0x8cb0d55c 813f001c lwz r9,28(r31)
0x8cb0d560 901f0030 stw r0,48(r31)

<<<<<Traceback>>>>>

0x8d1ab48c taskExit +0x0 : vxTaskEntry ()
0x8d1ab604 vxTaskEntry +0x8c : 0x8cb24fdc ()
0x8cb25058 RTIOsapiThread_new+0xc4 : 0x8ca178b4 ()
0x8ca178b4 COMMENDActiveFacade_preShutdownWakeup+0x960: RTINetioReceiver_receiveFast ()
0x8caac838 RTINetioReceiver_receiveFast+0x1dc: REDACursor_finish ()
0x8cb11a50 REDACursor_finish+0x68 : REDAWorker_leaveExclusiveArea ()

==[2/2]==============================================================
Severity/Facility: FATAL/KERNEL
Boot Cycle: 1
OS Version: 6.9.4
CPU Number: 0
Time: WED APR 04 07:53:14 2018 (ticks = 53778)
Task: "tNet0" (0x4f3daf0)
Injection Point: excArchLib.c:3007

The task has been terminated because it triggered an exception that raised the signal 11.

<<<<<Memory Map>>>>>

0x00100000 -> 0x00385400: kernel
0x13d45710 -> 0x13d7ae86: SYSMGR_SMA.out

<<<<<Exception Information>>>>>

data storage
Exception current instruction address: 0x001afa94
Machine Status Register: 0x00029230
Data Exception Address Register: 0x5bd72610
Condition Register: 0x48000882
Exception Syndrome Register: 0x00000000

<<<<<Registers>>>>>

r0 = 0x48920780 sp = 0x04f53de0 r2 = 0x0038d0c0
r3 = 0x122485c0 r4 = 0x13451e90 r5 = 0x04862630
r6 = 0x00000002 r7 = 0x0000ff00 r8 = 0x000000ff
r9 = 0x00000080 r10 = 0x00445480 r11 = 0x00000000
r12 = 0x001a0008 r13 = 0x004032a0 r14 = 0x00000000
r15 = 0x00000000 r16 = 0x00000000 r17 = 0x00000000
r18 = 0x00000000 r19 = 0x00000000 r20 = 0x00000000
r21 = 0x00000000 r22 = 0x00000000 r23 = 0x00000000
r24 = 0x00000000 r25 = 0x137517f0 r26 = 0x17221eb0
r27 = 0x048c4b6c r28 = 0x00000003 r29 = 0x048c4b6c
r30 = 0x001afa60 r31 = 0x048c4b6c msr = 0x00029230
lr = 0x0032534c ctr = 0x001afa60 pc = 0x001afa94
cr = 0x48000882 xer = 0x20000000 pgTblPtr = 0xeeeeeeee
asid = 0x00000001 spefscr = 0x00000000

<<<<<Disassembly>>>>>

0x1afa74 80630000 lwz r3,0(r3)
0x1afa78 2c030000 cmpi crf0,0,r3,0x0 # 0
0x1afa7c 41820048 bc 0xc,2, 0x1afac4 # 0x001afac4
0x1afa80 3c800040 lis r4,0x40 # 64
0x1afa84 80030000 lwz r0,0(r3)
0x1afa88 8084b294 lwz r4,-19820(r4)
0x1afa8c 5400103a rlwinm r0,r0,2,0,29
0x1afa90 808402ac lwz r4,684(r4)
*0x1afa94 7c04002e lwzx r0,r4,r0
0x1afa98 7c001840 cmpl crf0,0,r0,r3
0x1afa9c 40820028 bc 0x4,2, 0x1afac4 # 0x001afac4
0x1afaa0 809f0010 lwz r4,16(r31)
0x1afaa4 38bf003c addi r5,r31,0x3c # 60
0x1afaa8 48012379 bl 0x1c1e20 # ipnet_sock_ip4_get_mcast_data
0x1afaac 80630000 lwz r3,0(r3)
0x1afab0 2c030000 cmpi crf0,0,r3,0x0 # 0

<<<<<Traceback>>>>>

0x00120414 vxTaskEntry +0x68 : ipcomNetTask ()
0x00108dd8 ipcomNetTask +0x34 : jobQueueProcess ()
0x00333300 jobQueueProcess+0xf8 : 0x00328594 ()
0x003285c4 ipcom_slab_get_objects_per_slab+0x18c: 0x001a2adc ()
0x001a2d04 ipnet_sig_free+0x2e0: ipnet_sys_socketclose ()
0x001c0798 ipnet_sys_socketclose+0xa4 : ipnet_do_close ()
0x001c00dc ipnet_do_close+0x90 : ipnet_sock_drop_all_multicast_memberships ()
0x001bfe58 ipnet_sock_drop_all_multicast_memberships+0xa4 : ipnet_sock_ip4_mcast_delete_data (0x12249d00)
0x001c1f00 ipnet_sock_ip4_mcast_delete_data+0x90 : ipnet_igmpv3_report_change ()
0x001afb1c ipnet_igmpv3_report_change+0x44 : ipnet_mcast_build_source_change_report ()
0x001b2ca8 ipnet_mcast_build_source_change_report+0x44 : ipcom_set_for_each ()
0x0032534c ipcom_set_for_each+0x44 : 0x001afa60 ()
value = 0 = 0x0
->

Organization:
Keywords: