[#5129] Application traps_test fails to run

Document created by Aaronwu Employee on Sep 3, 2013
Version 1Show Document
  • View in full screen mode

[#5129] Application traps_test fails to run

Submitted By: Vivi Li

Open Date

2009-05-15 04:20:26     Close Date

2009-07-13 00:01:30

Priority:

Medium High     Assignee:

Robin Getz

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

Tests     Board:

N/A

Processor:

ALL     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

gcc4.1-09r1_rc6

App binary format:

N/A     

Summary: Application traps_test fails to run

Details:

 

Application traps_test fails to run on all platforms with 09r1 toolchain.

 

--

root:/> traps_test -1

 

Running test 0 for exception 0x01: EXCPT 0x01

... Test application issue: received signal 5, (Trace/breakpoint trap)

root:/>

--

 

Follow-ups

 

--- Robin Getz                                               2009-05-18 10:50:39

Fixed on trunk.

 

tested:

 

/traps_test -1

/traps_test -d 0 -c 1 -1

/traps_test -d 0 -c 2 -1

/traps_test -c 1 -1

 

All provide (now):

 

54/54 tests passed

 

-Robin

 

--- Vivi Li                                                  2009-05-20 05:40:14

This test can run now. But I can see it fails at test 18 and 29.

 

Bellow is the log for test 18:

--

Running test 18 for exception 0x23: Illegal use of supervisor resource - MMR

Write

... Unrecoverable event

- For example, an exception generated while processing a previous exception.

Deferred Exception context

CURRENT PROCESS:

COMM=traps_test PID=157

CPU = 0

TEXT = 0x003b0040-0x003b55e0        DATA = 0x003b5600-0x003b79f0

BSS = 0x003b79f0-0x003b7cd0  USER-STACK = 0x003b8f60

 

return address: [0xffa01066]; contents of:

0xffa01040:  22e4  5eaa  9110  6408  4882  9310  182d  42d0

0xffa01050:  c605  0000  4280  60f1  5241  3201  e14a  ffe0

0xffa01060:  e10a  0200  5e42 [9109] e120  4080  5401  0c00

0xffa01070:  101b  488a  1c15  4921  0200  0c00  1815  3045

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00062025  IPEND: 0030  SYSCFG: 0006

  EXCAUSE   : 0x25

  interrupts disabled

  physical IVG5 asserted : <0xffa00ba4> { _evt_ivhw + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x004ba000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x003b09e0> [ traps_test + 0x9a0 ]

PC  : <0xffa01066> { _dcplb_protection_fault + 0x3a }

DCPLB_FAULT_ADDR: <0xffc00014> /* kernel dynamic memory */

ICPLB_FAULT_ADDR: <0xffa01066> { _dcplb_protection_fault + 0x3a }

 

PROCESSOR STATE:

R0 : 00000000    R1 : 00000012    R2 : 00000028    R3 : 00000012

R4 : 00000005    R5 : 00000000    R6 : 00000005    R7 : 00000000

P0 : 00000120    P1 : 00000012    P2 : ffc00014    P3 : 003b8f64

P4 : 003b79ec    P5 : 003b789c    FP : 003b8e90    SP : 004b9f24

LB0: 003b4735    LT0: 003b4728    LC0: 00000000

LB1: 003a1469    LT1: 003a1468    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 003b8fe1

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 003b8f64

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 003b8e90  ASTAT: 02003024

 

Hardware Trace:

   0 Target : <0x00004a38> { _trap_c + 0x0 }

     Source : <0xffa0062a> { _exception_to_level5 + 0x9e } CALL pcrel

   1 Target : <0xffa0058c> { _exception_to_level5 + 0x0 }

     Source : <0xffa0045a> { _bfin_return_from_exception + 0xe } RTX

   2 Target : <0xffa0044c> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa004e2> { _ex_trap_c + 0x66 } JUMP.S

   3 Target : <0xffa0045c> { _handle_bad_cplb + 0x0 }

     Source : <0xffa003de> { _ex_dcplb_miss + 0x2a } IF !CC JUMP

   4 Target : <0xffa003da> { _ex_dcplb_miss + 0x26 }

     Source : <0xffa010aa> { _dcplb_protection_fault + 0x7e } RTS

   5 Target : <0xffa010a6> { _dcplb_protection_fault + 0x7a }

     Source : <0xffa01070> { _dcplb_protection_fault + 0x44 } IF !CC

JUMP

   6 Target : <0xffa0102c> { _dcplb_protection_fault + 0x0 }

     Source : <0xffa010d4> { _cplb_hdr + 0x28 } JUMP.L

   7 Target : <0xffa010d2> { _cplb_hdr + 0x26 }

     Source : <0xffa010c0> { _cplb_hdr + 0x14 } IF !CC JUMP

   8 Target : <0xffa010ac> { _cplb_hdr + 0x0 }

     Source : <0xffa003d6> { _ex_dcplb_miss + 0x22 } CALL pcrel

   9 Target : <0xffa003b4> { _ex_dcplb_miss + 0x0 }

     Source : <0xffa003b0> { _ex_workaround_261 + 0x20 } IF CC JUMP

  10 Target : <0xffa00390> { _ex_workaround_261 + 0x0 }

     Source : <0xffa006c4> { _trap + 0x38 } JUMP (P4)

  11 Target : <0xffa006aa> { _trap + 0x1e }

     Source : <0xffa006a6> { _trap + 0x1a } IF !CC JUMP

  12 Target : <0xffa0068c> { _trap + 0x0 }

     Source : <0xffa0045a> { _bfin_return_from_exception + 0xe } RTX

  13 Target : <0xffa0044c> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa003a2> { _ex_workaround_261 + 0x12 } IF !CC JUMP

  14 Target : <0xffa00390> { _ex_workaround_261 + 0x0 }

     Source : <0xffa006c4> { _trap + 0x38 } JUMP (P4)

  15 Target : <0xffa006aa> { _trap + 0x1e }

     Source : <0xffa006a6> { _trap + 0x1a } IF !CC JUMP

Userspace Stack

Stack info:

SP: [0x003b8e90] <0x003b8e90> [ traps_test + 0x8e90 ]

FP: (0x003b8e90)

Memory from 0x003b8e90 to 003b9000

003b8e90:[003b8efc]<003b09e0> 00000001  00000000  00000000  00000000

00000500  00000005

003b8eb0: 00001cb1  00000012  00000012  00000001  00000000  00000001  00000016

00000000

003b8ed0: 003b74f8  00000000  00000001  00000012  00000000  003b8f04

<003b410c> 00000000

003b8ef0: 00000000  003b8f0c  003b8fa8  003b8f20 <003b310c> 003b5600

00000000  003b7c94

003b8f10: 003b55ac  00000000  003b8f64  00000000  00000000 <003a2782>

003b5600  003a8f9b

003b8f30: 00384000  00000000  003a7c94  003f6fef  003f6ff4 <003b0538>

00000000  00000000

003b8f50: 003b55ac  003b55be  00000000  003a7c94  00000005  003b8f93

<003b8f9e> 003b8fa1

003b8f70: 003b8fa3 <003b8fa6> 00000000  003b8fa9  003b8fb0  003b8fbe

003b8fe1  00000000

003b8f90: 74000000  73706172  7365745f  642d0074  2d003000  38310071  4d4f4800

002f3d45

003b8fb0: 4c454853  622f3d4c  732f6e69  41500068  2f3d4854  3a6e6962  7273752f

6e69622f

003b8fd0: 62732f3a  2f3a6e69  2f727375  6e696273  52455400  696c3d4d  0078756e

6e69622f

003b8ff0: 6172742f  745f7370  00747365  00000000  91200200

Return addresses in stack:

   frame  1 : <0x003b09e0> [ traps_test + 0x9a0 ]

    address : <0x003b410c> [ traps_test + 0x40cc ]

   frame  2 : <0x003b310c> [ traps_test + 0x30cc ]

   frame  3 : <0x003a2782> [ traps_test + 0x2782 ]

    address : <0x003b0538> [ traps_test + 0x4f8 ]

    address : <0x003b8f9e> [ traps_test + 0x8f9e ]

    address : <0x003b8fa6> [ traps_test + 0x8fa6 ]

FAIL (test failed, but not with the right signal)

        (We expected 7 'Bus error' but instead we got 4 'Illegal instruction')

--

 

Bellow is the log for test 29:

--

Running test 29 for exception 0x27: Stack set to zero^M

... Illegal use of supervisor resource^M

- Attempted to use a Supervisor register or instruction from User mode.^M

   Supervisor resources are registers and instructions that are reserved^M

   for Supervisor use: Supervisor only registers, all MMRs, and Supervisor^M

   only instructions.^M

Deferred Exception context^M

CURRENT PROCESS:^M

COMM=traps_test PID=194^M

CPU = 0^M

TEXT = 0x001e0040-0x001e5360        DATA = 0x001e5380-0x001e7660^M

BSS = 0x001e7660-0x001e7940  USER-STACK = 0x001e8f58^M

^M

return address: [0x001e06fa]; contents of:^M

0x001e06d0:  0010  e3ff  ff13  2f44  6bf8  baa8  2f41  0c04 ^M

0x001e06e0:  192b  3047  6780  6001  e300  0244  b900  0c08 ^M

0x001e06f0:  19ae  b900  0c00  1948  6801 [bab5] bb19  bae9 ^M

0x001e0700:  2024  3047  67c0  e300  024d  e120  007f  b9e1 ^M

^M

SEQUENCER STATUS:               Not tainted^M

SEQSTAT: 0006202e  IPEND: 0030  SYSCFG: 0006^M

  EXCAUSE   : 0x2e^M

  interrupts disabled^M

  physical IVG5 asserted : <0xffa00ba4> { _evt_ivhw + 0x0 }^M

RETE: <0x00000000> { _do_one_initcall + 0xfffff000 }^M

RETN: <0x001f4000> /* kernel dynamic memory */^M

RETX: <0x00000480> /* Maybe fixed code section */^M

RETS: <0x001e0a60> [ traps_test + 0xa20 ]^M

PC  : <0x001e06fa> [ traps_test + 0x6ba ]^M

DCPLB_FAULT_ADDR: <0xffffffac> /* kernel dynamic memory */^M

ICPLB_FAULT_ADDR: <0x001e06fa> [ traps_test + 0x6ba ]^M

^M

PROCESSOR STATE:^M

R0 : 00000000    R1 : 00000000    R2 : 00000000    R3 : 0a0a0a0a^M

R4 : 00000000    R5 : 00000001    R6 : 00000006    R7 : 00000001^M

P0 : 000001d0    P1 : 00000000    P2 : 001e0b08    P3 : 001e8f5c^M

P4 : 001e765c    P5 : 001e7930    FP : 00000000    SP : 001f3f24^M

LB0: 001e1d7d    LT0: 001e1d7a    LC0: 00000000^M

LB1: 001e3bdd    LT1: 001e3b96    LC1: 00000000^M

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 001e6c50^M

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 001e8f5c^M

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000^M

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000^M

A0.w: 00000040   A0.x: 00000000   A1.w: 00000040   A1.x: 00000000^M

USP : 00000000  ASTAT: 02003024^M

^M

Hardware Trace:^M

   0 Target : <0x00004a64> { _trap_c + 0x0 }^M

     Source : <0xffa0062a> { _exception_to_level5 + 0x9e } CALL pcrel^M

   1 Target : <0xffa0058c> { _exception_to_level5 + 0x0 }^M

     Source : <0xffa0045a> { _bfin_return_from_exception + 0xe } RTX^M

   2 Target : <0xffa0044c> { _bfin_return_from_exception + 0x0 }^M

     Source : <0xffa004e2> { _ex_trap_c + 0x66 } JUMP.S^M

   3 Target : <0xffa0047c> { _ex_trap_c + 0x0 }^M

     Source : <0xffa006c4> { _trap + 0x38 } JUMP (P4)^M

   4 Target : <0xffa006aa> { _trap + 0x1e }^M

     Source : <0xffa006a6> { _trap + 0x1a } IF !CC JUMP^M

   5 Target : <0xffa0068c> { _trap + 0x0 }^M

     Source : <0x001e06f8> [ traps_test + 0x6b8 ] 0x6801^M

   6 Target : <0x001e06f8> [ traps_test + 0x6b8 ]^M

     Source : <0x001e0a60> [ traps_test + 0xa20 ] JUMP.S^M

   7 Target : <0x001e0a60> [ traps_test + 0xa20 ]^M

     Source : <0x001e0150> [ traps_test + 0x110 ] RTS^M

   8 Target : <0x001e0148> [ traps_test + 0x108 ]^M

     Source : <0x001e0b12> [ traps_test + 0xad2 ] JUMP.L^M

   9 Target : <0x001e0b08> [ traps_test + 0xac8 ]^M

     Source : <0x001e0a5e> [ traps_test + 0xa1e ] CALL (P2)^M

  10 Target : <0x001e0a4c> [ traps_test + 0xa0c ]^M

     Source : <0x001e06f0> [ traps_test + 0x6b0 ] IF !CC JUMP^M

  11 Target : <0x001e06ec> [ traps_test + 0x6ac ]^M

     Source : <0x001e0b90> [ traps_test + 0xb50 ] RTS^M

  12 Target : <0x001e0b7c> [ traps_test + 0xb3c ]^M

     Source : <0xffa00ba0> { __common_int_entry + 0xd8 } RTI^M

  13 Target : <0xffa00b3e> { __common_int_entry + 0x76 }^M

     Source : <0xffa00d64> { _evt_system_call + 0x64 } JUMP.S^M

  14 Target : <0xffa00d64> { _evt_system_call + 0x64 }^M

     Source : <0xffa0084c> { _system_call + 0xb8 } RTS^M

  15 Target : <0xffa00848> { _system_call + 0xb4 }^M

     Source : <0xffa00838> { _system_call + 0xa4 } IF !CC JUMP^M

Userspace Stack^M

Stack info:^M

SP: [0x001f3e74] <0x001f3e74> /* kernel dynamic memory */^M

FP: (0x001f3ef8)^M

Memory from 0x001f3e70 to 001f4000^M

001f3e70: 00000001 [001f3e74] ffffffff  fffffffe  0000c350  00030005  00177a44

00000000 ^M

001f3e90: 00000000  125c7852  00000026  125bb502  00000026  00021938  001696f4

00000000 ^M

001f3eb0: 001f3eb0  001f3eb0  00000002  00000000  001e8e6c <00021efc>

00021ea4  000000a2 ^M

001f3ed0: 001e8f5c  001e8ee0  00000000  001f3ef4  00000000  0379a000  00000000

001f3ef0 ^M

001f3ef0: 00000001  00000001 (00000000)<ffa0062e> ffa00ba4  ffe02014

00000001  0000ffff ^M

001f3f10: 00000001  00000000  0a0a0a0a  00000000  ffa00274  00000480  00000030

0006202e ^M

001f3f30: 00000000  001f4000  00000480  001e06fa <001e0a60> 00000000

02003024  001e3bdd ^M

001f3f50: 001e1d7d  001e3b96  001e1d7a  00000000  00000000  00000040  00000000

00000040 ^M

001f3f70: 00000000  00000000  00000000  00000000  00000000  00000000  00000000

00000000 ^M

001f3f90: 00000000  00000000  00000000  00000000  00000000  00000000  00000000

001e8f5c ^M

001f3fb0: 001e6c50  00000000  00000000  001e7930  001e765c  001e8f5c  001e0b08

00000000 ^M

001f3fd0: 000001d0  00000001  00000006  00000001  00000000  0a0a0a0a  00000000

00000000 ^M

001f3ff0: 00000000  00000000  000001d0  00000006  3e326534 ^M

Return addresses in stack:^M

    address : <0x00021efc> { _sys_nanosleep + 0x58 }^M

   frame  1 : <0xffa0062e> { _exception_to_level5 + 0xa2 }^M

    address : <0x001e0a60> [ traps_test + 0xa20 ]^M

FAIL (test failed, but not with the right signal)^M

        (We expected 11 'Segmentation fault' but instead we got 4 'Illegal

instruction')^M

--

 

--- Robin Getz                                               2009-05-20 11:47:52

On what system?

 

root:/> dmesg -n 1

root:/> /traps_test -d 0 -c 100 18

 

Running test 18 for exception 0x23: Illegal use of supervisor resource - MMR

Write

... PASS (test failed 100 times, as expected by signal 7: Bus error)

 

1/1 tests passed

 

root:/> /traps_test -d 0 -c 100 29

 

Running test 29 for exception 0x27: Stack set to zero

... PASS (test failed 100 times, as expected by signal 11: Segmentation fault)

 

1/1 tests passed

 

root:/> cat /proc/cpuinfo

processor       : 0

vendor_id       : Analog Devices

cpu family      : 0x27c8

model name      : ADSP-BF537 500(MHz CCLK) 100(MHz SCLK) (mpu off)

stepping        : 3

cpu MHz         : 500.000/100.000

 

--- Vivi Li                                                  2009-05-20 22:12:52

Bellow is my board info. When more trap test results come out on 537, I will

check if they all have that problem.

 

root:/> cat /proc/cpuinfo

processor       : 0

vendor_id       : Analog Devices

cpu family      : 0x27c8

model name      : ADSP-BF537 500(MHz CCLK) 125(MHz SCLK) (mpu off)

stepping        : 2

cpu MHz         : 500.000/125.000

bogomips        : 997.37

Calibration     : 498688000 loops

cache size      : 16 KB(L1 icache) 32 KB(L1 dcache-wb) 0 KB(L2 cache)

dbank-A/B       : cache/cache

icache setup    : 4 Sub-banks/4 Ways, 32 Lines/Way

dcache setup    : 2 Super-banks/4 Sub-banks/2 Ways, 64 Lines/Way

board name      : ADI BF537-STAMP

board memory    : 65536 kB (0x00000000 -> 0x04000000)

kernel memory   : 57336 kB (0x00001000 -> 0x037ff000)

 

root:/> version

kernel:    Linux release 2.6.28.10-ADI-2009R1-pre-svn6380, build #175 Tue May

19 23:33:46 CST 2009

toolchain: bfin-uclinux-gcc release gcc version 4.1.2 (ADI svn)

user-dist: release svn-8071, build #1757 Tue May 19 23:32:52 CST 2009

root:/>

 

--- Mingquan Pan                                             2009-05-31 06:29:53

traps_test can pass all on bf527-ezkit 0.0 board, and can pass until case 48 on

bf561 ezkit.

while on most bf537 and bf533 boards, the case fails at case 18 and stops.

 

--- Robin Getz                                               2009-06-08 21:26:48

Kernel bug - fixed on trunk and branch. (Yeah - that is what we run this test

for!)

 

We don't need to handle CPLB protection violations unless we are running

with the MPU on. Fix the entry code to call common trap_c, and remove

the nompu code which is never run.

 

-Robin

 

 

--- Mingquan Pan                                             2009-06-16 06:05:40

Yes, it fixed on almost all the boards we testing, BF537 STAMP,BF527 and BF548

ezkit, bf561 ezkit and bf526 and bf518 ezbrd.

But it looks it still have some problem for BF533 STAMP board at case 32.

 

Running test 32 for exception 0x2b: Jump to L1 Data A

... CPLB protection violation

- Illegal instruction fetch access (memory protection violation).

Deferred Exception context

CURRENT PROCESS:

COMM=traps_test PID=184

CPU = 0

TEXT = 0x00690040-0x00695320        DATA = 0x00695340-0x00697700

BSS = 0x00697700-0x006979e0  USER-STACK = 0x00698f64

 

return address: [0xff800000]; contents of:

0xff7fffe0:  ????  ????  ????  ????  ????  ????  ????  ????

0xff7ffff0:  ????  ????  ????  ????  ????  ????  ????  ????

0xff800000: [c000] 0087  0000  0000  0800  0000  00ff  0000

0xff800010:  e000  037d  0800  0000  0000  0000  0000  0000

 

ADSP-BF533-0.3 398(MHz CCLK) 79(MHz SCLK) (mpu off)

Linux version 2.6.28.10-ADI-2009R1-svn6668

Built with gcc version 4.1.2 (ADI svn)

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0006202b  IPEND: 0030  SYSCFG: 0006

  EXCAUSE   : 0x2b

  interrupts disabled

  physical IVG5 asserted : <0xffa00c24> { _evt_ivhw + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x001f6000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x006909e0> [ traps_test + 0x9a0 ]

PC  : <0xff800000> /* kernel dynamic memory */

DCPLB_FAULT_ADDR: <0x00698e94> [ traps_test + 0x8e94 ]

ICPLB_FAULT_ADDR: <0xff800000> /* kernel dynamic memory */

 

PROCESSOR STATE:

R0 : 00000200    R1 : 00000020    R2 : 00000028    R3 : 00000020

R4 : 00000005    R5 : 00000000    R6 : 00000005    R7 : 00000000

P0 : 00000200    P1 : 00000020    P2 : ff800000    P3 : 00698f68

P4 : 006976fc    P5 : 006975ac    FP : 00698f00    SP : 001f5f24

LB0: 00694481    LT0: 00694474    LC0: 00000000

LB1: 001e1369    LT1: 001e1368    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 00698fe8

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00698f68

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00698e9c  ASTAT: 02003024

 

Hardware Trace:

   0 Target : <0x00004cdc> { _trap_c + 0x0 }

     Source : <0xffa0066a> { _exception_to_level5 + 0x9e } CALL pcrel

   1 Target : <0xffa005cc> { _exception_to_level5 + 0x0 }

     Source : <0xffa004ac> { _bfin_return_from_exception + 0x20 } RTX

   2 Target : <0xffa0048c> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00522> { _ex_trap_c + 0x46 } JUMP.S

   3 Target : <0xffa004dc> { _ex_trap_c + 0x0 }

     Source : <0xffa00742> { _trap + 0x66 } JUMP (P4)

   4 Target : <0xffa006fc> { _trap + 0x20 }

     Source : <0xffa006f8> { _trap + 0x1c } IF !CC JUMP

   5 Target : <0xffa006dc> { _trap + 0x0 }

     Source : <0x00690394> [ traps_test + 0x354 ] JUMP (P2)

   6 Target : <0x00690384> [ traps_test + 0x344 ]

     Source : <0x006909de> [ traps_test + 0x99e ] CALL (P2)

   7 Target : <0x006909cc> [ traps_test + 0x98c ]

     Source : <0x006906ee> [ traps_test + 0x6ae ] IF !CC JUMP

   8 Target : <0x006906e2> [ traps_test + 0x6a2 ]

     Source : <0x00690b28> [ traps_test + 0xae8 ] RTS

   9 Target : <0x00690b14> [ traps_test + 0xad4 ]

     Source : <0xffa00c22> { __common_int_entry + 0xda } RTI

  10 Target : <0xffa00bc0> { __common_int_entry + 0x78 }

     Source : <0xffa00ee4> { _evt_system_call + 0x64 } JUMP.S

  11 Target : <0xffa00ee4> { _evt_system_call + 0x64 }

     Source : <0xffa008c8> { _system_call + 0xb8 } RTS

  12 Target : <0xffa008c4> { _system_call + 0xb4 }

     Source : <0xffa008b4> { _system_call + 0xa4 } IF !CC JUMP

  13 Target : <0xffa008ae> { _system_call + 0x9e }

     Source : <0xffa0089e> { _system_call + 0x8e } IF !CC JUMP

  14 Target : <0xffa00878> { _system_call + 0x68 }

     Source : <0x000228b4> { _sys_nanosleep + 0x1c } RTS

  15 Target : <0x000228ae> { _sys_nanosleep + 0x16 }

     Source : <0x000228f0> { _sys_nanosleep + 0x58 } JUMP.S

Userspace Stack

Stack info:

SP: [0x00698e9c] <0x00698e9c> [ traps_test + 0x8e9c ]

FP: (0x00698e94)

Memory from 0x00698e90 to 00699000

00698e90: 00698f00 (00698f00)<006909e0>[00000001] 00000000  00000000

00000000  00000500

00698eb0: 00000005  00001cb1  00000020  00000020  00000001  00000000  00000001

00000016

00698ed0: 00000000  00697318  00000000  00000001  00000020  00000000  00698f08

<00693e94>

00698ef0: 00000000  00000000  00698f10  00698fab (00698f24)<00692f9c>

00695340  00000000

00698f10: 006979a4  006952f8  00000000  00698f68  00000000

(00000000)<001e2514> 00695340

00698f30: 001e8f9c  001cd000  00000000  001e79a4  001e8f9c  001e8f9c

<00690538> 00000000

00698f50: 00000000  006952f8  0069530a  00000000  001e8fa0  00000005  00698f94

00698fa1

00698f70:<00698fa4> 00698fa6  00698fa9  00000000  00698fac  00698fb3

00698fc1  00698fe4

00698f90: 00000000  72742f2e  5f737061  74736574  00642d00  712d0030  00323300

454d4f48

00698fb0: 53002f3d  4c4c4548  69622f3d  68732f6e  54415000  622f3d48  2f3a6e69

2f727375

00698fd0: 3a6e6962  6962732f  752f3a6e  732f7273  006e6962  4d524554  6e696c3d

2e007875

00698ff0: 6172742f  745f7370  00747365  00000000  0000e801

Return addresses in stack:

   frame  1 : <0x006909e0> [ traps_test + 0x9a0 ]

    address : <0x00693e94> [ traps_test + 0x3e54 ]

   frame  2 : <0x00692f9c> [ traps_test + 0x2f5c ]

   frame  3 : <0x001e2514> [ traps_test + 0x2514 ]

    address : <0x00690538> [ traps_test + 0x4f8 ]

    address : <0x00698fa4> [ traps_test + 0x8fa4 ]

 

The kernel stuck here and no response now.

 

cpu info:

root:/>

root:/> cat /proc/cpuinfo

processor       : 0

vendor_id       : Analog Devices

cpu family      : 0x27a5

model name      : ADSP-BF533 398(MHz CCLK) 79(MHz SCLK) (mpu off)

stepping        : 3

cpu MHz         : 398.131200/79.626240

bogomips        : 792.57

Calibration     : 396288000 loops

cache size      : 16 KB(L1 icache) 32 KB(L1 dcache-wb) 0 KB(L2 cache)

dbank-A/B       : cache/cache

icache setup    : 4 Sub-banks/4 Ways, 32 Lines/Way

dcache setup    : 2 Super-banks/4 Sub-banks/2 Ways, 64 Lines/Way

board name      : ADI BF533-STAMP

board memory    : 131072 kB (0x00000000 -> 0x08000000)

kernel memory   : 57336 kB (0x00001000 -> 0x037ff000)

 

root:/> version

kernel:    Linux release 2.6.28.10-ADI-2009R1-svn6699, build #16 Tue Jun 16

09:57:04 MDT 2009

toolchain: bfin-uclinux-gcc release gcc version 4.1.2 (ADI svn)

user-dist: release svn-8283, build #239 Tue Jun 16 09:56:12 MDT 2009          

                                                                          

 

--- Robin Getz                                               2009-06-28 18:50:15

I verified this does happen on 533 (0.3) silicon, but not on 0.5 silicon.

 

Can you confirm that 0.5 silicon works as expected?

 

-Robin

 

--- Vivi Li                                                  2009-06-30 03:25:24

We only have BF533-STAMP board with 0.3 silicon.

 

In BF533-EZKIT board with 0.4 silicon, this test pass.

 

--- Robin Getz                                               2009-07-09 12:08:33

I put something into trunk which should fix this.

 

Since I don't have a 533 anymore (it's in a box, while I move offices), I can't

test it -- if You can test trunk, and let me know if it works - I will put on

the branch tomorrow.

 

-Robin

 

--- Mingquan Pan                                             2009-07-13 00:01:30

Yes, I see this trap case pass all cases on bf533-stamp(0.3). So close now.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes