[#5543] SMP kernel crashed when booting

Document created by Aaronwu Employee on Sep 4, 2013
Version 1Show Document
  • View in full screen mode

[#5543] SMP kernel crashed when booting

Submitted By: Graf Yang

Open Date

2009-09-21 04:54:22     Close Date

2009-09-22 00:56:26

Priority:

Medium     Assignee:

Graf Yang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

2010R1     Release:

Category:

Architecture     Board:

EZKIT Lite

Processor:

ALL     Silicon Revision:

0.3

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

2009R1-rc9

App binary format:

N/A     

Summary: SMP kernel crashed when booting

Details:

 

CoreB bootstrap code to SRAM ff600000 via DMA.                                 

Booting Core B.                                                                

6>Instruction Cache Enabled for CPU1                                           

  External memory: cacheable in instruction cache                              

  L2 SRAM        : uncacheable in instruction cache                            

Data Cache Enabled for CPU1                                                    

  External memory: cacheable (write-through) in data cache                     

  L2 SRAM        : uncacheable in data cache                                   

Calibrating delay loop... <2>CPU1: processor failed to boot (-38)              

Brought up 1 CPUs                                                              

SMP: Total of 1 processors activated (2.04 BogoMIPS).

 

...

...

bfin-wdt: initialized: timeout=20 sec (nowayout=0)                             

TCP cubic registered                                                           

NET: Registered protocol family 17                                             

Instruction fetch misaligned address violation                                 

<5> - Attempted misaligned instruction cache fetch.                            

Kernel OOPS in progress                                                        

Deferred Exception context                                                     

CURRENT PROCESS:                                                               

COMM=swapper PID=1                                                             

CPU = 0                                                                        

invalid mm                                                                     

return address: [0x0000c94c]; contents of:                                     

0x0000c920:  0000  a050  3208  306a  6425  0828  a37c  6fa1                    

0x0000c930:  a0c9  181a  3229  6fa5  2004  324d  3229  6fa5                    

0x0000c940:  910f  b0f4  ac8a  3041  304b  3054 [0062] 0c00

0x0000c950:  1c06  4807  1c04  67fe  0c06  1806  3045  6460                    

                                                                               

ADSP-BF561-0.3 600(MHz CCLK) 100(MHz SCLK) (mpu off)                           

Linux version 2.6.31-ADI-2010R1-pre-svn7378 (ymm@uboot32-533ezkit) (gcc version9

                                                                               

SEQUENCER STATUS:               Not tainted                                    

SEQSTAT: 0000202a  IPEND: 8008  IMASK: 003f  SYSCFG: 0006                     

  Peripheral interrupts masked off                                             

  Kernel interrupts masked off                                                 

  EXCAUSE   : 0x2a                                                             

  physical IVG3 asserted : <0x00009f24> { _trap + 0x0 }                        

  physical IVG15 asserted : <0x0000a880> { _evt_system_call + 0x0 }            

  logical irq   6 mapped  : <0x00007f6c> { _timer_interrupt + 0x0 }            

  logical irq  69 mapped  : <0x0000b224> { _ipi_handler + 0x0 }                

  logical irq  82 mapped  : <0x000ba698> { _smc_interrupt + 0x0 }              

RETE: <0x00000000> /* Maybe null pointer? */                                  

RETN: <0x01023d9c> /* kernel dynamic memory */                                

RETX: <0x00000480> /* Maybe fixed code section */                             

RETS: <0x0000dae0> { ___wake_up + 0x28 }                                      

PC  : <0x0000c94c> { ___wake_up_common + 0x3c }

DCPLB_FAULT_ADDR: <0x007e3fa4> /* kernel dynamic memory */                     

ICPLB_FAULT_ADDR: <0x0000c94c> { ___wake_up_common + 0x3c }                    

PROCESSOR STATE:                                                               

R0 : 007e3f9c    R1 : 00000003    R2 : 00000000    R3 : 00000001              

R4 : 00000000    R5 : 010057b0    R6 : 00000001    R7 : 00000000              

P0 : feb00000    P1 : 007e3f9c    P2 : 0000001f    P3 : 00000003              

P4 : 00000000    P5 : fffedb1c    FP : 01023dac    SP : 01023cc0              

LB0: 000b8c2c    LT0: 000b8c2c    LC0: 00000000                               

LB1: 000cb516    LT1: 000cb50a    LC1: 00000000                               

B0 : 01023e08    L0 : 00000000    M0 : 00000010    I0 : 00000002              

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 01023e58              

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 01023e10              

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 01023e0c              

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000              

USP : 00000000  ASTAT: 02002002                                                

                                                                               

Hardware Trace:                                                                

   0 Target : <0x000054f4> { _trap_c + 0x0 }                                   

     Source : <0x00009eb8> { _exception_to_level5 + 0xb4 } CALL pcrel          

   1 Target : <0x00009e86> { _exception_to_level5 + 0x82 }

     Source : <0x00009e82> { _exception_to_level5 + 0x7e } IF !CC JUMP         

   2 Target : <0x00009e04> { _exception_to_level5 + 0x0 }                      

     Source : <0x00009ca8> { _bfin_return_from_exception + 0x20 } RTX          

   3 Target : <0x00009c88> { _bfin_return_from_exception + 0x0 }               

     Source : <0x00009d5c> { _ex_trap_c + 0x84 } JUMP.S                        

   4 Target : <0x00009cf0> { _ex_trap_c + 0x18 }                               

     Source : <0x00009cec> { _ex_trap_c + 0x14 } IF !CC JUMP                   

   5 Target : <0x00009cd8> { _ex_trap_c + 0x0 }                                

     Source : <0x00009fd8> { _trap + 0xb4 } JUMP (P4)                          

   6 Target : <0x00009f98> { _trap + 0x74 }                                    

     Source : <0x00009f94> { _trap + 0x70 } IF !CC JUMP                        

   7 Target : <0x00009f80> { _trap + 0x5c }                                    

     Source : <0x00009f7c> { _trap + 0x58 } IF !CC JUMP                        

   8 Target : <0x00009f6a> { _trap + 0x46 }                                    

     Source : <0x00009f58> { _trap + 0x34 } JUMP.S                             

   9 Target : <0x00009f24> { _trap + 0x0 }                                     

     Source : <0x0000c94a> { ___wake_up_common + 0x3a } 0x3054                 

  10 Target : <0x0000c940> { ___wake_up_common + 0x30 }                        

     Source : <0x0000c938> { ___wake_up_common + 0x28 } JUMP.S                 

  11 Target : <0x0000c910> { ___wake_up_common + 0x0 }

     Source : <0x0000dadc> { ___wake_up + 0x24 } CALL pcrel                    

  12 Target : <0x0000dace> { ___wake_up + 0x16 }                               

     Source : <0x0011101c> { __spin_lock_irqsave + 0x18 } RTS                  

  13 Target : <0x00111014> { __spin_lock_irqsave + 0x10 }                      

     Source : <0x0000b63e> { ___raw_spin_lock_asm + 0x1a } RTS                 

  14 Target : <0x0000b63c> { ___raw_spin_lock_asm + 0x18 }                     

     Source : <0x0000b604> { _put_core_lock + 0x18 } RTS                       

  15 Target : <0x0000b5ec> { _put_core_lock + 0x0 }                            

     Source : <0x0000b638> { ___raw_spin_lock_asm + 0x14 } CALL pcrel          

Kernel Stack                                                                   

Stack info:                                                                    

SP: [0x01023dd0] <0x01023dd0> /* kernel dynamic memory */                     

FP: (0x01023e0c)                                                              

Memory from 0x01023dd0 to 01024000

 

Follow-ups

 

--- Graf Yang                                                2009-09-22 00:56:26

It is fixed on trunk, now SMP kernel can work, so close this bug.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes