Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
KC868-16A crashing in infinite loop
#1
Hi,

I bought a KC868-16A about one year ago and did some tests but I never used it because I didn't have time.
Now I want to finish my project, but the board has stopped responding completely.

I connected it via USB to get the logs:

Code:
ELF file SHA256: d62704405

Rebooting...
ets Jul 29 2019 12:21:46

rst:0xc (SW_CPU_RESET),boot:0x17 (SPI_FAST_FLASH_BOOT)
configsip: 0, SPIWP:0xee
clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
mode:DIO, clock div:2
load:0x3fff0030,len:7112
load:0x40078000,len:15624
load:0x40080400,len:4
load:0x40080404,len:3876
entry 0x4008064c
I (29) boot: ESP-IDF 5.1.5 2nd stage bootloader
I (29) boot: compile time Jan 18 2025 19:20:33
I (29) boot: Multicore bootloader
I (33) boot: chip revision: v3.1
I (37) boot.esp32: SPI Speed      : 40MHz
I (42) boot.esp32: SPI Mode       : DIO
I (46) boot.esp32: SPI Flash Size : 4MB
I (51) boot: Enabling RNG early entropy source...
I (56) boot: Partition Table:
I (60) boot: ## Label            Usage          Type ST Offset   Length
I (67) boot:  0 otadata          OTA data         01 00 00009000 00002000
I (75) boot:  1 phy_init         RF data          01 01 0000b000 00001000
I (82) boot:  2 app0             OTA app          00 10 00010000 001c0000
I (90) boot:  3 app1             OTA app          00 11 001d0000 001c0000
I (97) boot:  4 nvs              WiFi data        01 02 00390000 0006d000
I (105) boot: End of partition table
I (109) esp_image: segment 0: paddr=001d0020 vaddr=3f400020 size=1d6ech (120556) map
I (161) esp_image: segment 1: paddr=001ed714 vaddr=3ffb0000 size=025e4h (  9700) load
I (165) esp_image: segment 2: paddr=001efd00 vaddr=40080000 size=00318h (   792) load
I (167) esp_image: segment 3: paddr=001f0020 vaddr=400d0020 size=4c58ch (312716) map
I (288) esp_image: segment 4: paddr=0023c5b4 vaddr=40080318 size=09bfch ( 39932) load
I (305) esp_image: segment 5: paddr=002461b8 vaddr=50000000 size=00020h (    32) load
I (310) boot: Loaded app from partition at offset 0x1d0000
I (311) boot: Disabling RNG early entropy source...
[I][logger:120]: Log initialized
[C][safe_mode:136]: Unsuccessful boot attempts: 10
[E][safe_mode:148]: Boot loop detected
[E][component:420]: safe_mode set Error flag: unspecified
[I][app:089]: Running through setup()
E (11278) task_wdt: Task watchdog got triggered. The following tasks/users did not reset the watchdog in time:
E (11278) task_wdt:  - loopTask (CPU 1)
E (11278) task_wdt: Tasks currently running:
E (11278) task_wdt: CPU 0: IDLE0
E (11278) task_wdt: CPU 1: loopTask
E (11278) task_wdt: Aborting.
E (11278) task_wdt: Print CPU 1 backtrace

Backtrace: 0x4000c04d:0x3ffbb670 0x40083db2:0x3ffbb690 0x400f5916:0x3ffbb6b0 0x400e875c:0x3ffbb6f0 0x400d81eb:0x3ffbb730 0x40114fed:0x3ffbb7d0 0x400db5df:0x3ffbb7f0 0x400db02b:0x3ffbb810 0x400d9ce1:0x3ffbb840 0x400dd5e2:0x3ffbb870 0x400d678f:0x3ffbb910


ELF file SHA256: d62704405

Rebooting...

[...]

E (11278) task_wdt: Task watchdog got triggered. The following tasks/users did not reset the watchdog in time:
E (11278) task_wdt:  - loopTask (CPU 1)
E (11278) task_wdt: Tasks currently running:
E (11278) task_wdt: CPU 0: IDLE0
E (11278) task_wdt: CPU 1: loopTask
E (11278) task_wdt: Aborting.
E (11278) task_wdt: Print CPU 1 backtrace

Backtrace: 0x4000bfed:0x3ffbb640 0x40085b1f:0x3ffbb650 0x40083a46:0x3ffbb670 0x40083da6:0x3ffbb690 0x400f5916:0x3ffbb6b0 0x400e875c:0x3ffbb6f0 0x400d81eb:0x3ffbb730 0x40114fed:0x3ffbb7d0 0x400db5df:0x3ffbb7f0 0x400db02b:0x3ffbb810 0x400d9ce1:0x3ffbb840 0x400dd5e2:0x3ffbb870 0x400d678f:0x3ffbb910

etc.

I disconnected everything (only left power and USB-C) and it still crashes.

I flashed it with the Kincony firmware but no response.
The serial log via USB is now:

Code:
ets Jul 29 2019 12:21:46

rst:0x1 (POWERON_RESET),boot:0x17 (SPI_FAST_FLASH_BOOT)
configsip: 0, SPIWP:0xee
clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
mode:DIO, clock div:2
load:0x3fff0030,len:6652
ho 0 tail 12 room 4
load:0x40078000,len:15052
load:0x40080400,len:3836
entry 0x4008069c
I (29) boot: ESP-IDF v4.4.7 2nd stage bootloader
I (29) boot: compile time 15:12:15
I (29) boot: Multicore bootloader
I (32) boot: chip revision: v3.1
I (36) boot.esp32: SPI Speed      : 40MHz
I (41) boot.esp32: SPI Mode       : DIO
I (45) boot.esp32: SPI Flash Size : 4MB
I (50) boot: Enabling RNG early entropy source...
I (55) boot: Partition Table:
I (59) boot: ## Label            Usage          Type ST Offset   Length
I (66) boot:  0 nvs              WiFi data        01 02 00009000 00026000
I (74) boot:  1 phy_init         RF data          01 01 0003f000 00001000
I (81) boot:  2 factory          factory app      00 00 00040000 003b0000
I (89) boot: End of partition table
I (93) esp_image: segment 0: paddr=00040020 vaddr=3f400020 size=102078h (1056888) map
I (484) esp_image: segment 1: paddr=001420a0 vaddr=3ffb0000 size=0339ch ( 13212) load
I (489) esp_image: segment 2: paddr=00145444 vaddr=40080000 size=0abd4h ( 43988) load
I (508) esp_image: segment 3: paddr=00150020 vaddr=400d0020 size=a7ca8h (687272) map
I (757) esp_image: segment 4: paddr=001f7cd0 vaddr=4008abd4 size=05228h ( 21032) load
I (773) boot: Loaded app from partition at offset 0x40000
I (774) boot: Disabling RNG early entropy source...
I (785) cpu_start: Multicore app
I (785) cpu_start: Pro cpu up.
I (786) cpu_start: Starting app cpu, entry point is 0x40081278
I (0) cpu_start: App cpu up.
I (805) cpu_start: Pro cpu start user code
I (806) cpu_start: cpu freq: 240000000
I (806) cpu_start: Application information:
I (810) cpu_start: Project name:     KC868_A16
I (815) cpu_start: App version:      v2.2.20
I (820) cpu_start: Compile time:     Apr  2 2026 15:12:09
I (826) cpu_start: ELF file SHA256:  b7c54ce742331a6d...
I (832) cpu_start: ESP-IDF:          v4.4.7
I (837) cpu_start: Min chip rev:     v0.0
I (842) cpu_start: Max chip rev:     v3.99 
I (847) cpu_start: Chip rev:         v3.1
I (852) heap_init: Initializing. RAM available for dynamic allocation:
I (859) heap_init: At 3FFAE6E0 len 00001920 (6 KiB): DRAM
I (865) heap_init: At 3FFC5190 len 0001AE70 (107 KiB): DRAM
I (871) heap_init: At 3FFE0440 len 00003AE0 (14 KiB): D/IRAM
I (877) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
I (884) heap_init: At 4008FDFC len 00010204 (64 KiB): IRAM
I (891) spi_flash: detected chip: generic
I (895) spi_flash: flash io: dio
I (900) cpu_start: Starting scheduler on PRO CPU.
I (0) cpu_start: Starting scheduler on APP CPU.
I (914) main: [APP] Startup..
I (917) main: [APP] Free memory: 223808 bytes
I (922) main: [APP] IDF version: v4.4.7
I (985) NVS: save default system config.
I (991) NVS: save default network config.
I (997) NVS: save default tuya config.
I (1002) NVS: save default protocol config.
I (1009) NVS: save default input config.
I (1012) NVS: save default output config.
I (1017) NVS: save default name config.
I (1025) NVS: save default state.
I (1029) NVS: save default config.
I (1035) NVS: save default config.
I (1039) NVS: save default config.
I (1155) NVS: save default config.
I (1370) NVS: init nvs finish.
E (6371) task_wdt: Task watchdog got triggered. The following tasks did not reset the watchdog in time:
E (6371) task_wdt:  - IDLE0 (CPU 0)
E (6371) task_wdt: Tasks currently running:
E (6371) task_wdt: CPU 0: main
E (6371) task_wdt: CPU 1: IDLE1
E (6371) task_wdt: Print CPU 0 (current core) backtrace

Backtrace: 0x400F1456:0x3FFB0B90 0x40082C75:0x3FFB0BB0 0x40008541:0x3FFC7610 0x40088625:0x3FFC7630 0x400F3C0E:0x3FFC7650 0x400D9D51:0x3FFC7680 0x400D85BA:0x3FFC7710 0x40175DF7:0x3FFC7730

E (6371) task_wdt: Print CPU 1 backtrace

Backtrace: 0x40085585:0x3FFB1190 0x40082C75:0x3FFB11B0 0x4000BFED:0x3FFC8550 0x4008CC92:0x3FFC8560 0x400F16BF:0x3FFC8580 0x400F16CB:0x3FFC85B0 0x400D4E16:0x3FFC85D0 0x4008AE18:0x3FFC85F0

E (11371) task_wdt: Task watchdog got triggered. The following tasks did not reset the watchdog in time:
E (11371) task_wdt:  - IDLE0 (CPU 0)
E (11371) task_wdt: Tasks currently running:
E (11371) task_wdt: CPU 0: main
E (11371) task_wdt: CPU 1: IDLE1
E (11371) task_wdt: Print CPU 0 (current core) backtrace

Backtrace: 0x400F1456:0x3FFB0B90 0x40082C75:0x3FFB0BB0 0x40008541:0x3FFC7610 0x40088625:0x3FFC7630 0x400F3C0E:0x3FFC7650 0x400D9D51:0x3FFC7680 0x400D85BA:0x3FFC7710 0x40175DF7:0x3FFC7730

etc.

Any idea why the watchdog is not reset?

What is your advice?

Kind regards

Vincent
Reply
#2
which board you are using?
which firmware you downloaded?
please take photo with all details.
Reply
#3
(Yesterday, 01:51 AM)admin Wrote: which board you are using?
which firmware you downloaded?
please take photo with all details.

Thanks for your reply.

It is a Kincony KC868-A16 REV:1.6
I flashed KCS_KC868_A16_V2.2.20.zip from this thread https://www.kincony.com/forum/showthread.php?tid=9205
Here is a picture:
   

Vincent
Reply
#4
take a photo of your esp download tool screen. i want to see how you set.
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)