2008-11-14 00:10:35     Instruction Fetch CPLB miss

Document created by Aaronwu Employee on Aug 8, 2013
Version 1Show Document
  • View in full screen mode

2008-11-14 00:10:35     Instruction Fetch CPLB miss

P SENTHIL KUMAR (INDIA)

Message: 65263   

 

Hi All,

 

      I am using 2008R1.5 relases for my applications and testing using bf561 based custom board.

 

While executing my test application, i geting below issue.

 

My application crashes after executing my test application.

 

Also, I can able to view the expected buffer content in the SDRAM memory,

 

Instruction fetch CPLB miss

- CPLB miss on an instruction fetch.

Defered Exception context

CURRENT PROCESS:

COMM=NetFrame PID=41

TEXT = 0x00300040-0x0030ee20        DATA = 0x0030ee24-0x003407f4

BSS = 0x003407f4-0x003476f4  USER-STACK = 0x00348f7c

 

return address: [0x08200820]; contents of:

0x08200800:  ????  ????  ????  ????  ????  ????  ????  ????

0x08200810:  ????  ????  ????  ????  ????  ????  ????  ????

0x08200820: [????] ????  ????  ????  ????  ????  ????  ????

0x08200830:  ????  ????  ????  ????  ????  ????  ????  ????

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0000002c  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x0

  EXCAUSE   : 0x2c

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00486000> /* unknown address */

RETX: <0x08200820> /* unknown address */

RETS: <0x08200820> /* unknown address */

PC  : <0x08200820> /* unknown address */

DCPLB_FAULT_ADDR: <0x00348d4c> [ NetFrame + 0x48d4c ]

ICPLB_FAULT_ADDR: <0x08200820> /* unknown address */

 

PROCESSOR STATE:

R0 : ffffffff    R1 : 00348d2f    R2 : 7fffffff    R3 : 00000008

R4 : 00000003    R5 : 00348f24    R6 : 00348f24    R7 : 08200820

P0 : 000000b3    P1 : 00000000    P2 : 00342990    P3 : 003168a4

P4 : 00316c6c    P5 : 00348d5c    FP : 00000000    SP : 00485f24

LB0: 00306d61    LT0: 00306d5e    LC0: 00000000

LB1: 00306695    LT1: 00306694    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 0031063c

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00000000

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00348d50  ASTAT: 02002020

 

No trace since you do not have CONFIG_DEBUG_BFIN_NO_KERN_HWTRACE enabled

 

Stack from 00485f04:

        003168a4 ffa00740 0022e564 0022e564 0022e560 00000008 00000003 00348bda

        08200820 00000030 0000002c 00000000 00486000 08200820 08200820 08200820

        ffffffff 02002020 00306695 00306d61 00306694 00306d5e 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 0031063c 00348d50 00000000 00348d5c 00316c6c

 

Call Trace:

 

 

Testing of App_Mgr

Bus error

root:/bin>

 

Let me know some suggestion to slove the above issue

 

Regards,Senthil

 

 

 

 

QuoteReplyEditDelete

 

 

2008-11-14 01:33:26     Re: Instruction Fetch CPLB miss

Mike Frysinger (UNITED STATES)

Message: 65266   

 

please read the documentation:

http://docs.blackfin.uclinux.org/doku.php?id=debuging_applications#analyzing_traces

QuoteReplyEditDelete

 

 

2008-11-14 09:45:39     Re: Instruction Fetch CPLB miss

P SENTHIL KUMAR (INDIA)

Message: 65304   

 

Hi Mike,

 

            I had dumped my exe and found the path from where the exception is going.

 

Below are the dumping details of crashing of exe

 

Instruction fetch CPLB miss

- CPLB miss on an instruction fetch.

Defered Exception context

CURRENT PROCESS:

COMM=NetFrame PID=42

TEXT = 0x00480040-0x0048ee20        DATA = 0x0048ee24-0x004c07f4

BSS = 0x004c07f4-0x004c76f4  USER-STACK = 0x004c8f7c

 

return address: [0x08200820]; contents of:

0x08200800:  ????  ????  ????  ????  ????  ????  ????  ????

0x08200810:  ????  ????  ????  ????  ????  ????  ????  ????

0x08200820: [????] ????  ????  ????  ????  ????  ????  ????

0x08200830:  ????  ????  ????  ????  ????  ????  ????  ????

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0000002c  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x0

  EXCAUSE   : 0x2c

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x03bda000> /* unknown address */

RETX: <0x08200820> /* unknown address */

RETS: <0x08200820> /* unknown address */

PC  : <0x08200820> /* unknown address */

DCPLB_FAULT_ADDR: <0x004c8d4c> [ NetFrame + 0x48d4c ]

ICPLB_FAULT_ADDR: <0x08200820> /* unknown address */

 

PROCESSOR STATE:

R0 : ffffffff    R1 : 004c8d2f    R2 : 7fffffff    R3 : 00000008

R4 : 00000003    R5 : 004c8f24    R6 : 004c8f24    R7 : 08200820

P0 : 000000b3    P1 : 00000000    P2 : 004c2990    P3 : 004968a4

P4 : 00496c6c    P5 : 004c8d5c    FP : 00000000    SP : 03bd9f24

LB0: 00486d61    LT0: 00486d5e    LC0: 00000000

LB1: 00486695    LT1: 00486694    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 0049063c

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00000000

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 004c8d50  ASTAT: 02002020

 

Hardware Trace:

   0 Target : <0x001033a8> { _trap_c + 0x0 }

     Source : <0xffa0077c> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa006c8> { _exception_to_level5 + 0x0 }

     Source : <0xffa00620> { _ex_trap_c + 0x68 }

   2 Target : <0xffa007f4> { _trap + 0x0 }

     Source : <0x00485f32> [ NetFrame + 0x5ef2 ]

   3 Target : <0x00485f2c> [ NetFrame + 0x5eec ]

     Source : <0x00485f40> [ NetFrame + 0x5f00 ]

   4 Target : <0x00485f38> [ NetFrame + 0x5ef8 ]

     Source : <0x004823fc> [ NetFrame + 0x23bc ]

   5 Target : <0x004823de> [ NetFrame + 0x239e ]

     Source : <0x004823b0> [ NetFrame + 0x2370 ]

   6 Target : <0x00482398> [ NetFrame + 0x2358 ]

     Source : <0x00485f34> [ NetFrame + 0x5ef4 ]

   7 Target : <0x00485f34> [ NetFrame + 0x5ef4 ]

     Source : <0x00485f28> [ NetFrame + 0x5ee8 ]

   8 Target : <0x00485f1e> [ NetFrame + 0x5ede ]

     Source : <0xffa00d18> { __common_int_entry + 0xd8 }

   9 Target : <0xffa00cb6> { __common_int_entry + 0x76 }

     Source : <0xffa00edc> { _evt_system_call + 0x64 }

  10 Target : <0xffa00edc> { _evt_system_call + 0x64 }

     Source : <0xffa009b0> { _system_call + 0xb8 }

  11 Target : <0xffa009ac> { _system_call + 0xb4 }

     Source : <0xffa0099c> { _system_call + 0xa4 }

  12 Target : <0xffa00996> { _system_call + 0x9e }

     Source : <0xffa00986> { _system_call + 0x8e }

  13 Target : <0xffa00960> { _system_call + 0x68 }

     Source : <0xffa00110> { _sys_rt_sigreturn + 0x10 }

  14 Target : <0xffa0010c> { _sys_rt_sigreturn + 0xc }

     Source : <0x00101986> { _do_rt_sigreturn + 0x816 }

  15 Target : <0x0010197a> { _do_rt_sigreturn + 0x80a }

     Source : <0x00101966> { _do_rt_sigreturn + 0x7f6 }

Stack from 03bd9f04:

        004968a4 ffa00780 0022e564 0022e564 0022e560 00000008 00000003 004c8bda

        08200820 00000030 0000002c 00000000 03bda000 08200820 08200820 08200820

        ffffffff 02002020 00486695 00486d61 00486694 00486d5e 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 0049063c 004c8d50 00000000 004c8d5c 00496c6c

 

Call Trace:

 

 

>bfin-uclinux-addr2line -f -e ./NetFrame.gdb 0x5ef2

__libc_sigsuspend

libc/sysdeps/linux/common/sigsuspend.c:22

>

 

I need your feedback to debug above issue

 

Regards, Senthil

QuoteReplyEditDelete

 

 

2008-11-14 13:07:52     Re: Instruction Fetch CPLB miss

Mike Frysinger (UNITED STATES)

Message: 65314   

 

use gdb to debug your issue or trace the whole thing

Attachments

    Outcomes