[#5383] traps test on bf538 ezkit would make kernel reboot at case 13

Document created by Aaronwu Employee on Sep 4, 2013
Version 1Show Document
  • View in full screen mode

[#5383] traps test on bf538 ezkit would make kernel reboot at case 13

Submitted By: Mingquan Pan

Open Date

2009-07-23 00:44:21     Close Date

2009-07-30 04:45:20

Priority:

Medium High     Assignee:

Robin Getz

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

N/A

Processor:

BF538     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Assigned (Not Start)

Uboot version or rev.:

    Toolchain version or rev.:

09r1-rc9

App binary format:

N/A     

Summary: traps test on bf538 ezkit would make kernel reboot at case 13

Details:

 

traps test on bf538 ezkit would make kernel reboot at case 13 from about Jul 18.

 

Running test 13 for exception 0x0e: EXCPT 0x0E

... Unimplmented exception occured

- Maybe you forgot to install a custom exception handler?

Deferred Exception context

CURRENT PROCESS:

COMM=traps_test PID=183

CPU = 0

TEXT = 0x00670040-0x00675320        DATA = 0x00675340-0x00677700

BSS = 0x00677700-0x006779e0  USER-STACK = 0x00678f64

 

return address: [0x0067022e]; contents of:

0x00670200:  0000  0010  0000  0000  e800  0000  00ac  e801

0x00670210:  0000  0010  0000  0000  e800  0000  00ad  e801

0x00670220:  0000  0010  0000  0000  e800  0000  00ae [e801]

0x00670230:  0000  0010  0000  0000  e800  0000  00af  e801

 

ADSP-BF538-0.4 525(MHz CCLK) 131(MHz SCLK) (mpu off)

Linux version 2.6.28.10-ADI-2009R1-svn7029

Built with gcc version 4.1.2 (ADI svn)

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0006200e  IPEND: 0030  SYSCFG: 0006

  EXCAUSE   : 0xe

  interrupts disabled

  physical IVG5 asserted : <0xffa00bf0> { _evt_ivhw + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00646000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x006709e0> [ traps_test + 0x9a0 ]

PC  : <0x0067022e> [ traps_test + 0x1ee ]

DCPLB_FAULT_ADDR: <0x00678e94> [ traps_test + 0x8e94 ]

ICPLB_FAULT_ADDR: <0x0067022e> [ traps_test + 0x1ee ]

 

PROCESSOR STATE:

R0 : 000000d0    R1 : 0000000d    R2 : 00000028    R3 : 0000000d

R4 : 00000005    R5 : 00000000    R6 : 00000005    R7 : 00000000

P0 : 000000d0    P1 : 0000000d    P2 : 00670224    P3 : 00678f68

P4 : 006776fc    P5 : 006775ac    FP : 00678e94    SP : 00645f24

LB0: 00674485    LT0: 00674478    LC0: 00000000

LB1: 00661369    LT1: 00661368    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 00678fe8

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00678f68

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00678e94  ASTAT: 02003024

 

Hardware Trace:

   0 Target : <0x00004c88> { _trap_c + 0x0 }

     Source : <0xffa0064c> { _exception_to_level5 + 0xa8 } CALL pcrel

   1 Target : <0xffa005a4> { _exception_to_level5 + 0x0 }

     Source : <0xffa0047c> { _bfin_return_from_exception + 0x18 } RTX

   2 Target : <0xffa00464> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa004f2> { _ex_trap_c + 0x46 } JUMP.S

   3 Target : <0xffa004a8> { _ex_replaceable + 0x0 }

     Source : <0xffa00718> { _trap + 0x58 } JUMP (P4)

   4 Target : <0xffa006c0> { _trap + 0x0 }

     Source : <0x0067022c> [ traps_test + 0x1ec ] EXCPT 0xe

   5 Target : <0x00670224> [ traps_test + 0x1e4 ]

     Source : <0x006709de> [ traps_test + 0x99e ] CALL (P2)

   6 Target : <0x006709cc> [ traps_test + 0x98c ]

     Source : <0x006706ee> [ traps_test + 0x6ae ] IF !CC JUMP

   7 Target : <0x006706e2> [ traps_test + 0x6a2 ]

     Source : <0x00670b28> [ traps_test + 0xae8 ] RTS

   8 Target : <0x00670b14> [ traps_test + 0xad4 ]

     Source : <0xffa00bec> { __common_int_entry + 0xcc } RTI

   9 Target : <0xffa00b8a> { __common_int_entry + 0x6a }

     Source : <0xffa00eac> { _evt_system_call + 0x64 } JUMP.S

  10 Target : <0xffa00eac> { _evt_system_call + 0x64 }

     Source : <0xffa008a0> { _system_call + 0xb8 } RTS

  11 Target : <0xffa0089c> { _system_call + 0xb4 }

     Source : <0xffa0088c> { _system_call + 0xa4 } IF !CC JUMP

  12 Target : <0xffa00886> { _system_call + 0x9e }

     Source : <0xffa00876> { _system_call + 0x8e } IF !CC JUMP

  13 Target : <0xffa00850> { _system_call + 0x68 }

     Source : <0x000214b4> { _sys_nanosleep + 0x1c } RTS

  14 Target : <0x000214ae> { _sys_nanosleep + 0x16 }

     Source : <0x000214f0> { _sys_nanosleep + 0x58 } JUMP.S

  15 Target : <0x000214f0> { _sys_nanosleep + 0x58 }

     Source : <0x00021448> { _hrtimer_nanosleep + 0x80 } RTS

Userspace Stack

Stack info:

SP: [0x00678e94] <0x00678e94> [ traps_test + 0x8e94 ]

FP: (0x00678e8c)

Memory from 0x00678e90 to 00679000

00678e90:<00678f00>[00678f00]<006709e0> 00000001  00000000  00000000  00000000  00000500

00678eb0: 00000005  00001cb1  0000000d  0000000d  00000001  00000000  00000001  00000016

00678ed0: 00000000 <006771e8> 00000000  00000001  0000000d  00000000 <00678f08><00673e94>

00678ef0: 00000000  00000000  00678f10  00678fab  00678f24 <00672f9c><00675340> 00000000

00678f10:<006779a4> 006752fc  00000000  00678f68  00000000  00000000 <00662518><00675340>

00678f30: 00668f9c  03ecd000  00000000 <006679a4> 00668f9c  00668f9c <00670538> 00000000

00678f50: 00000000  006752fc  0067530e  00000000  00668fa0  00000005  00678f94  00678fa1

00678f70:<00678fa4> 00678fa6  00678fa9  00000000  00678fac  00678fb3  00678fc1  00678fe4

00678f90: 00000000  72742f2e  5f737061  74736574  00642d00  712d0030  00333100  454d4f48

00678fb0: 53002f3d  4c4c4548  69622f3d  68732f6e  54415000  622f3d48  2f3a6e69  2f727375

00678fd0: 3a6e6962  6962732f  752f3a6e  732f7273  006e6962  4d524554  6e696c3d  2e007875

00678ff0: 6172742f  745f7370  00747365  00000000

Return addresses in stack:

    address : <0x00678f00> [ traps_test + 0x8f00 ]

    address : <0x00678f00> [ traps_test + 0x8f00 ]

    address : <0x006709e0> [ traps_test + 0x9a0 ]

    address : <0x006771e8> [ traps_test + 0x71e8 ]

    address : <0x00678f08> [ traps_test + 0x8f08 ]

    address : <0x00673e94> [ traps_test + 0x3e54 ]

    address : <0x00672f9c> [ traps_test + 0x2f5c ]

    address : <0x00675340> [ traps_test + 0x5340 ]

    address : <0x006779a4> [

 

U-Boot 2008.10-svn1905 (ADI-2009R1-rc2) (Jun  8 2009 - 04:43:06)

 

CPU:   ADSP bf538-0.4 (Detected Rev: 0.4) (bypass boot)

Board: ADI BF538F EZ-Kit Lite board

       Support: http://blackfin.uclinux.org/

Clock: VCO: 525 MHz, Core: 525 MHz, System: 131.250 MHz

RAM:   64 MB

Flash:  4 MB

In:    serial

Out:   serial

Err:   serial

Net:   MAC:   00:E0:22:FE:BC:8B

Hit any key to stop autoboot:  0

Using MAC Address 00:E0:22:FE:BC:8B

TFTP from server 10.100.4.174; our IP address is 10.100.4.50

Filename 'uImage'.

Load address: 0x1000000

Loading: #################################################################

         #################################################################

         #################################################################

         ###########################################################

done

Bytes transferred = 3728354 (38e3e2 hex)

## Booting kernel from Legacy Image at 01000000 ...

   Image Name:   Linux-2.6.28.10-ADI-2009R1-svn70

   Created:      2009-07-18  22:41:23 UTC

   Image Type:   Blackfin Linux Kernel Image (gzip compressed)

   Data Size:    3728290 Bytes =  3.6 MB

   Load Address: 00001000

   Entry Point:  00185654

   Verifying Checksum ... OK

   Uncompressing Kernel Image ... OK

Starting Kernel at = 00185654

Linux version 2.6.28.10-ADI-2009R1-svn7029 (test@linux70-bf538) (gcc version 4.1.2 (ADI svn)) #188 Sun Jul 19 06:41:01 CST 2009

bootconsole [early_shadow0] enabled

bootconsole [early_BFuart0] enabled

early printk enabled on early_BFuart0

Board Memory: 64MB

Kernel Managed Memory: 64MB

Memory map:

  fixedcode = 0x00000400-0x00000490

  text      = 0x00001000-0x00103aa0

  rodata    = 0x00103aa0-0x00154bc4

  bss       = 0x00155000-0x00165840

  data      = 0x00165840-0x00176000

    stack   = 0x00174000-0x00176000

  init      = 0x00176000-0x00710000

  available = 0x00710000-0x03eff000

  DMA Zone  = 0x03f00000-0x04000000

Hardware Trace Active and Enabled

Boot Mode: 0

Recovering from Watchdog event

Blackfin support (C) 2004-2009 Analog Devices, Inc.

Compiled for ADSP-BF538 Rev 0.4

Blackfin Linux support by http://blackfin.uclinux.org/

Processor Speed: 525 MHz core clock and 131 MHz System Clock

NOMPU: setting up cplb tables

Instruction Cache Enabled for CPU0

Data Cache Enabled for CPU0 (write-through)

Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 16001

Kernel command line: root=/dev/mtdblock0 rw clkin_hz=25000000 earlyprintk=serial,uart0,57600 console=ttyBF0,57600 ip=10.100.4.50:10.100.4.174:10.100.4.174:255.255.255.0:bf538f-ezkit:eth0:off

Configuring Blackfin Priority Driven Interrupts

PID hash table entries: 256 (order: 8, 1024 bytes)

console handover:boot [early_BFuart0] boot [early_shadow0]  -> real [ttyBF0]

Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)

Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)

Memory available: 56708k/65536k RAM, (5736k init code, 1034k kernel code, 458k data, 1024k dma, 572k reserved)

Calibrating delay loop... 1044.48 BogoMIPS (lpj=2088960)

Security Framework initialized

Mount-cache hash table entries: 512

Blackfin Scratchpad data SRAM: 4 KB

Blackfin L1 Data A SRAM: 16 KB (15 KB free)

Blackfin L1 Data B SRAM: 16 KB (16 KB free)

Blackfin L1 Instruction SRAM: 64 KB (53 KB free)

net_namespace: 288 bytes

NET: Registered protocol family 16

Blackfin DMA Controller

ezkit_init(): registering device resources

NET: Registered protocol family 2

IP route cache hash table entries: 1024 (order: 0, 4096 bytes)

TCP established hash table entries: 2048 (order: 2, 16384 bytes)

TCP bind hash table entries: 2048 (order: 1, 8192 bytes)

TCP: Hash tables configured (established 2048 bind 2048)

TCP reno registered

NET: Registered protocol family 1

msgmni has been set to 110

io scheduler noop registered

io scheduler anticipatory registered (default)

io scheduler cfq registered

Serial: Blackfin serial driver

bfin-uart.1: ttyBF0 at MMIO 0xffc00400 (irq = 21) is a BFIN-UART

bfin-uart.1: ttyBF1 at MMIO 0xffc02000 (irq = 48) is a BFIN-UART

bfin-uart.1: ttyBF2 at MMIO 0xffc02100 (irq = 50) is a BFIN-UART

brd: module loaded

smc91x.c: v1.1, sep 22 2004 by Nicolas Pitre <nico@cam.org>

eth0: SMC91C11xFD (rev 2) at 20310300 IRQ 71 [nowait]

eth0: Ethernet addr: 00:e0:22:fe:bc:8b

bfin-spi bfin-spi.0: Blackfin on-chip SPI Controller Driver, Version 1.0, regs_base@ffc00500, dma channel@5

bfin-spi bfin-spi.1: Blackfin on-chip SPI Controller Driver, Version 1.0, regs_base@ffc02300, dma channel@14

bfin-spi bfin-spi.2: Blackfin on-chip SPI Controller Driver, Version 1.0, regs_base@ffc02400, dma channel@15

ad7879 spi0.1: Failed to probe AD7879 Touchscreen

rtc-bfin rtc-bfin: rtc core: registered rtc-bfin as rtc0

bfin-wdt: initialized: timeout=20 sec (nowayout=0)

TCP cubic registered

NET: Registered protocol family 17

rtc-bfin rtc-bfin: setting system clock to 2004-05-31 11:22:55 UTC (1086002575)

eth0: link down

IP-Config: Complete:

     device=eth0, addr=10.100.4.50, mask=255.255.255.0, gw=10.100.4.174,

     host=bf538f-ezkit, domain=, nis-domain=(none),

     bootserver=10.100.4.174, rootserver=10.100.4.174, rootpath=

Freeing unused kernel memory: 5736k freed

dma_alloc_init: dma_page @ 0x0070d000 - 256 pages at 0x03f00000

eth0: link up, 100Mbps, full-duplex, lpa 0x41E1

                           _____________________________________

        a8888b.           / Welcome to the uClinux distribution \

       d888888b.         /       _     _                         \          

 

 

failed rivision: linux   7028    uclinux-dist 8548

pass revision:           7010                 8518   

 

   

 

   

 

Follow-ups

 

--- Mingquan Pan                                             2009-07-30 04:45:20

Passed now on regression machine. So close.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes