On 11/10/2018 09:52, Catalin Demergian wrote:
Hi,
I don't use malloc myself in the code I added, but I see it is used a lot in the networking code.

I printed state and Wait.flags for SCrx task
* when all is ok *
in _Event_Seize, after _Thread_Dispatch_enable
state = 0x100 = STATES_WAITING_FOR_EVENT
Wait.flags = 0x102 = THREAD_WAIT_CLASS_EVENT | THREAD_WAIT_STATE_BLOCKED
in _Event_Surrender at the beginning
state = 0x100
Wait.flags = 0x102

* when SCrx is not scheduled any more *
in _Event_Seize, after _Thread_Dispatch_enable
state = 0x0 = STATES_READY
Wait.flags = 0x02 = THREAD_WAIT_STATE_BLOCKED
in _Event_Surrender at the beginning
state = 0x0
Wait.flags = 0x02

do these look like valid values ? I mean in _Event_Seize the state should have been blocked, right ?
can these values be caused by a corruption ?

A thread wait flags value of 0x02 indicates that this thread used rtems_task_wake_after() recently (at least in RTEMS 5, but very likely also in RTEMS 4.11.2).


-> Did you check the task stacks with the stack checker?
I'm afraid I don't know how to use it in RTEMS. any link to information on how to detect/analyze a data coruption in RTEMS can be useful.

It is a configuration option

#define CONFIGURE_STACK_CHECKER_ENABLED

In the RTEMS shell you can obtain the task stack information with the "stackuse" command.

--
Sebastian Huber, embedded brains GmbH

Address : Dornierstr. 4, D-82178 Puchheim, Germany
Phone   : +49 89 189 47 41-16
Fax     : +49 89 189 47 41-09
E-Mail  : sebastian.hu...@embedded-brains.de
PGP     : Public key available on request.

Diese Nachricht ist keine geschäftliche Mitteilung im Sinne des EHUG.

_______________________________________________
users mailing list
users@rtems.org
http://lists.rtems.org/mailman/listinfo/users

Reply via email to