[#4983] SVN trunk kernel compiled for bf548 v0.2 chip crashes during boot

Document created by Aaronwu Employee on Aug 30, 2013
Version 1Show Document
  • View in full screen mode

[#4983] SVN trunk kernel compiled for bf548 v0.2 chip crashes during boot

Submitted By: Sonic Zhang

Open Date

2009-03-12 00:44:14     Close Date

2009-03-13 05:13:48

Priority:

High     Assignee:

Nobody

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

EZKIT Lite

Processor:

BF548     Silicon Revision:

0.2

Is this bug repeatable?:

Yes     Resolution:

Out of Date

Uboot version or rev.:

U-Boot 2008.10-svn1657     Toolchain version or rev.:

09R1-RC2

App binary format:

N/A     

Summary: SVN trunk kernel compiled for bf548 v0.2 chip crashes during boot

Details:

 

SVN trunk kernel compiled for bf548 v0.2 chip crashes during boot. The same kernel compiled for v0.0 can boot successfully on bf548-ezkit of chip v0.2.

 

 

## Booting kernel from Legacy Image at 01000000 ...

   Image Name:   Linux-2.6.28.7-ADI-2009R1-pre-sv

   Created:      2009-03-12   4:44:15 UTC

   Image Type:   Blackfin Linux Kernel Image (gzip compressed)

   Data Size:    6722288 Bytes =  6.4 MB

   Load Address: 00001000

   Entry Point:  0028f64c

   Verifying Checksum ... OK

   Uncompressing Kernel Image ... OK

Starting Kernel at = 0028f64c

Linux version 2.6.28.7-ADI-2009R1-pre-svn6167 (root@eight) (gcc version 4.1.2 (ADI svn)) #9

console [early_BFuart0] enabled

early printk enabled on early_BFuart0

Board Memory: 64MB

Kernel Managed Memory: 64MB

Memory map:

  fixedcode = 0x00000400-0x00000490

  text      = 0x00001000-0x001b7090

  rodata    = 0x001b7090-0x00248b7c

  bss       = 0x00248b80-0x0025e578

  data      = 0x0025e578-0x0027a000

    stack   = 0x00278000-0x0027a000

  init      = 0x0027a000-0x00d1d000

  available = 0x00d1d000-0x03dff000

  DMA Zone  = 0x03e00000-0x04000000

Hardware Trace Active and Enabled

Boot Mode: 1

Blackfin support (C) 2004-2009 Analog Devices, Inc.

Compiled for ADSP-BF548 Rev 0.2

Blackfin Linux support by   blackfin.uclinux.org/

Processor Speed: 525 MHz core clock and 131 MHz System Clock

NOMPU: setting up cplb tables

Instruction Cache Enabled for CPU0

Data Cache Enabled for CPU0 (write-back)

Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 15747

Kernel command line: root=/dev/mtdblock0 rw earlyprintk=serial,uart1,57600 console=tty0 cof

Undefined instruction

- May be used to emulate instructions that are not defined for

   a particular processor implementation.

Kernel OOPS in progress

Deferred Exception context

 

No Valid process in current context

return address: [0x00008012]; contents of:

0x00007ff0:  e14f  001b  6005  e10f  79d0  e10d  b884  e132

0x00008000:  0067  e131  0087  e130  0007  e133  ff9a  e138

0x00008010:  0004 [3cc0] e082  002e  917a  c682  842d  6800

0x00008020:  6901  a0d6  e0b2  1024  3078  42f8  c682  83e8

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00060021  IPEND: 8030  SYSCFG: 0006

  EXCAUSE   : 0x21

  interrupts disabled

  physical IVG5 asserted : <0xffa00af4> { _evt_ivhw + 0x0 }

  physical IVG15 asserted : <0xffa00c50> { _evt_system_call + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00279f6c> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x00007fec> { _init_pint_lut + 0x1c }

PC  : <0x00008012> { _init_pint_lut + 0x42 }

DCPLB_FAULT_ADDR: <0x0024b880> /* kernel dynamic memory */

ICPLB_FAULT_ADDR: <0x00008012> { _init_pint_lut + 0x42 }

 

PROCESSOR STATE:

R0 : 0024b7e4    R1 : 000000ff    R2 : ffffffff    R3 : 0024b884

R4 : 00000000    R5 : 00000000    R6 : 00000000    R7 : 00248b84

P0 : 0024b884    P1 : 00000028    P2 : 0024b884    P3 : 00248b90

P4 : 0024b7e4    P5 : 0024b884    FP : 001b79d0    SP : 00279e90

LB0: 000c567c    LT0: 000c567c    LC0: 00000000

LB1: 002807f6    LT1: 002807f6    LC1: 00000000

B0 : 00000004    L0 : 00000000    M0 : 00000001    I0 : 00000007

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00000087

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000067

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : ffffff9a

A0.w: 003d08ba   A0.x: 00000000   A1.w: 00000934   A1.x: 00000000

USP : 0027a000  ASTAT: 00002022

 

Hardware Trace:

   0 Target : <0x00004aa8> { _trap_c + 0x0 }

     Source : <0xffa005b2> { _exception_to_level5 + 0x9e } CALL pcrel

   1 Target : <0xffa00514> { _exception_to_level5 + 0x0 }

     Source : <0xffa003e6> { _bfin_return_from_exception + 0x6 } RTX

   2 Target : <0xffa003e0> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa0046e> { _ex_trap_c + 0x66 } JUMP.S

   3 Target : <0xffa00408> { _ex_trap_c + 0x0 }

     Source : <0xffa0063e> { _trap + 0x2a } JUMP (P4)

   4 Target : <0xffa00614> { _trap + 0x0 }

     Source : <0x0000800e> { _init_pint_lut + 0x3e } 0xe138

   5 Target : <0x00007fec> { _init_pint_lut + 0x1c }

     Source : <0x000c5682> { _memset + 0x2e } RTS

   6 Target : <0x000c5654> { _memset + 0x0 }

     Source : <0x00007fe8> { _init_pint_lut + 0x18 } CALL pcrel

   7 Target : <0x00007fd0> { _init_pint_lut + 0x0 }

     Source : <0x0028f7f4> { _init_arch_irq + 0x4c } CALL pcrel

   8 Target : <0x0028f7a8> { _init_arch_irq + 0x0 }

     Source : <0x00280804> { _init_IRQ + 0x34 } JUMP.L

   9 Target : <0x002807d0> { _init_IRQ + 0x0 }

     Source : <0x0027a602> { _start_kernel + 0x162 } CALL pcrel

  10 Target : <0x0027a602> { _start_kernel + 0x162 }

     Source : <0x0029ca26> { _rcu_cpu_notify + 0x5e } RTS

  11 Target : <0x0029ca1e> { _rcu_cpu_notify + 0x56 }

     Source : <0x000125f6> { _open_softirq + 0xe } RTS

  12 Target : <0x000125e8> { _open_softirq + 0x0 }

     Source : <0x0029ca1a> { _rcu_cpu_notify + 0x52 } CALL pcrel

  13 Target : <0x0029ca10> { _rcu_cpu_notify + 0x48 }

     Source : <0x0002c5b8> { _rcu_init_percpu_data + 0x54 } RTS

  14 Target : <0x0002c5b2> { _rcu_init_percpu_data + 0x4e }

     Source : <0x0002c5a4> { _rcu_init_percpu_data + 0x40 } IF !CC JUMP

  15 Target : <0x0002c57c> { _rcu_init_percpu_data + 0x18 }

     Source : <0x000c5682> { _memset + 0x2e } RTS

 

Kernel Stack

Stack info:

SP: [0x0027a000] <0x0027a000> { __edata + 0x0 }

Memory from 0x0027a000 to 0027c000

0027a000:[0024e14a] e10a6008  93108b88  00000010  0026e14a  e10a6050  93101688  00106000

0027a020: 0026e14a  e10a6020  93101688  00106000  0024e14a  8b94e10a  0025e149  e1099310

0027a040: 6000f130  e0b268fa  92082002  00106008  0024e14a  8b98e10a  0025e149  e1099310

0027a060: 6000f130  e0b268fa  92082002  00106008  00000010  00000010  6fa60167  e141b130

0027a080: 30460026  1688e101  e3f26480  6c662e99  01276000  00000010  0c0105f3  0004e800

0027a0a0: 30313218  e3f2181a  304b4de1  30385001  083e640f  641018b2  10e60806  61e83216

0027a0c0: fffee690  e3f23006  30104dd1  640a300e  e3f23007  30375a89  002ae14c  40c0e10c

0027a0e0: 20136007  5abb323b  0c009950  61e91c37  18340808  002ae14a  e10a6c64  09d4433c

0027a100: 00001035  00000000  30459165  4daee3f2  30180c00  324b1c11  98083010  08089829

0027a120: 02081008  67fa1007  13f80c02  20026000  0c005208  000017e0  0c00a0a0  ac6217d4

0027a140: 18700c42  5019304b  0c000062  6c861fd4  60009077  05b30127  e14a0010  6c64002a

0027a160: 433ce10a  600f09d4  0c071fcf  304317f1  e3f26171  0c004d4f  0c061805  0a061841

0027a180: e14c143f  e10c0024  91208b9c  17e00c00  18540c06  e14f0000  e10f0025  917af0a0

0027a1a0: 18480c42  52c63043  e146326f  e147001f  68000024  e1066c25  e10792a0  20198ba0

0027a1c0: 18390c03  3013324b  98119808  10080808  10070208  0c0267fa  600013f8  52082002

0027a1e0: 18290c00  00000000  906a6c08  18230c42  08486901  320f17e6  934b9326  e1402fe2

0027a200: 304b001f  9278e100  a488e3ec  90776c86  01276000  001005b3  61e8320e  ffffe688

0027a220: e1402f5c  9121001f  9250e100  a476e3ec  68002f8f  93535e87  e1482f8b  e1080025

0027a240: 9100f12c  18390c00  0024e14d  8ba0e10d  91293250  68016002  69076c22  91102001

0027a260: 6c090c00  0879180c  6c221803  e1422ff9  304b001f  92c0e102  2ff26c22  93229329

0027a280: 93535e88  e3ec2f65  e140521b  e100001b  b0f07090  001fe141  001fe140  921ce100

0027a2a0: 923ce101  0113e122  a438e3ec  001fe140  9248e100  a21ee3ec  2fe36801  e14d05fd

0027a2c0: e10d0029  912fd1a0  0c070167  14226f66  0029e140  0029e141  d1a4e101  0200e122

0027a2e0: cfa0e100  4e6ee3f2  0027e140  a3e4e100  e141b130  e1400029  e100001f  e10192e0

0027a300: cc00cfa0  b0f7c412  e3ed0000  60081305  6ca69328  05bd0127  00000010  4d683046

0027a320: 32084f68  016704c3  0026e14a  2c64e10a  b1119109  e14c914a  e10c002a  304c4344

0027a340: 0042e410  0025e14a  1e1ce10a  e1409310  e100002a  0988433c  100a6fa6  00000000

0027a360: 00003228  e3ec9028  09e5364d  e14b1ffb  e10b002a  e3004650  e300acfd  e300b26f

0027a380: e300b23b  e3ede487  09dc8f99  0000100c  002ae14d  4344e10d  90280000  3632e3ec

0027a3a0: 1ffb09dd  0024e14d  8b98e10d  0b90e3ed  0c009128  60011812  e3ee9128  0c000dc7

0027a3c0: 60001c05  e3009328  e3ec03d1  6c6636db  60000127  00100483  001fe140  9390e100

0027a3e0: 2fea9328  322805f3  002ae147  002ae140  40c0e100  433ce107  e80009b8  30310003

0027a400: 32181042  001fe14c  001fe14f  93e0e10c  93e8e10f  324d2019  9808915a  08089811

0027a420: 02081004  20021ffb  0c005208  30061410  0062ac5a  102d0c00  30436c63  102309b8

0027a440: 00000000  a0980000  17e60c00  3254324d  98119808  10040808  1ffb0208  52082002

0027a460: 17eb0c00  324f915a  98099810  10040808  1ffb0208  52082002  1fda0c00  30436c63

0027a480: 1fe109b8  90776c66  01276000  001005b3  001fe140  e100304d  e3ec93f4  2fcda33f

0027a4a0: e14a05fb  e8000027  e10a0006  0062a070  e3000030  e14ab74f  e10a0026  003116e4

0027a4c0: 4a009110  60f89310  191e0801  0025e14f  faf0e10f  00409138  0025e14a  0c74e10a

 

Follow-ups

 

--- Sonic Zhang                                              2009-03-12 06:48:40

This bug has nothing to do with the version based anomaly list definition. Looks

like a bug in toolchain with cpu version flag.

 

--- Mike Frysinger                                           2009-03-12 06:56:02

i dont think 2009R1-RC2 has Jie's fix for dag regs / hardware loop loading

 

--- Sonic Zhang                                              2009-03-13 05:13:48

You are right. This bug disappears if compiled by 2009R1-RC3 toolchain.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes