[#4340] reset crashed in BF548-EZKIT trunk after download an image

Document created by Aaronwu Employee on Sep 25, 2013
Version 1Show Document
  • View in full screen mode

[#4340] reset crashed in BF548-EZKIT trunk after download an image

Submitted By: Vivi Li

Open Date

2008-08-14 00:02:38     Close Date

2008-09-10 23:10:57

Priority:

Medium High     Assignee:

Mike Frysinger

Category:

N/A     Fixed In Release:

N/A

Found In Release:

N/A     Status:

Closed

Board:

N/A     Processor:

N/A

Silicon Revision:

    Resolution:

N/A

Is the bug repeatable?:

N/A     

Summary: reset crashed in BF548-EZKIT trunk after download an image

Details:

 

For BF548-EZKIT in trunk, download an image and run "reset" command in u-boot, it will crash.

 

Bellow is the log:

 

--

U-Boot 1.1.6-svn1322 (ADI-2008R2-pre) (Aug 14 2008 - 10:44:39)

 

CPU:   ADSP bf548-0.0 (Detected Rev: 0.0)

Board: ADI BF548 EZ-Kit board

       Support: http://blackfin.uclinux.org/

Clock: VCO: 525 MHz, Core: 525 MHz, System: 131 MHz

RAM:   64 MB

Flash: 32 MB

NAND:  256 MiB

In:    serial

Out:   serial

Err:   serial

Net:   LAN9x18 (0x118a0000) detected at 0x24000000

MAC:   00:81:AB:BE:5D:F1

Hit any key to stop autoboot:  0

bfin>

bfin>

bfin> tftp 0x1000000 u-boot.bin

start Auto negotiation... (take ~2sec)

Auto negotiation complete, 100BaseTX, full duplex

TFTP from server 10.100.4.174; our IP address is 10.100.4.50

Filename 'u-boot.bin'.

Load address: 0x1000000

Loading: #########################

done

Bytes transferred = 127544 (1f238 hex)

bfin> res

 

 

 

Ack! Something bad happened to the Blackfin!

 

SEQUENCER STATUS:

SEQSTAT: 0000e026  IPEND: ffa0000c  SYSCFG: 0032

  HWERRCAUSE: 0x3

  EXCAUSE   : 0x26

RETE: <0xffa00000> { ___udivdi3 + 0xfba46078 }

RETN: <0xaeb479b2> { ___udivdi3 + 0xaab8da2a }

RETX: <0x03fa0c4a> { _memcpy_ASM + 0x5e }

RETS: <0x03fa9a36> { _run_command + 0x2c2 }

PC  : <0xffa0000c> { __stext_l1 + 0x0 }

DCPLB_FAULT_ADDR: <0x01000000> /* unknown address */

ICPLB_FAULT_ADDR: <0x03fa0c4a> { _memcpy_ASM + 0x5e }

 

PROCESSOR STATE:

R0 : 00000000    R1 : 00000000    R2 : 00000001    R3 : 00000024

R4 : 00000000    R5 : 00000000    R6 : 00000000    R7 : 00000073

P0 : 0000031c    P1 : 03fa0bc4    P2 : ffa0000c    P3 : 00000001

P4 : 03fd0e38    P5 : 03efff80    FP : 03effc47    SP : 03effa44

LB0: 03fb9e8c    LT0: 03fb9e80    LC0: 00000000

LB1: 03fb3662    LT1: 03fb3660    LC1: 00000000

B0 : 0000000b    L0 : 00000000    M0 : 0000003f    I0 : 00000032

B1 : 03f6b810    L1 : 00000000    M1 : 0000000f    I1 : 03ffb58c

B2 : 03f6cae8    L2 : 00000000    M2 : 08196005    I2 : 00001414

B3 : 000001ff    L3 : 00000000    M3 : 03fc1d80    I3 : 00000001

A0.w: 2ee3d9ee   A0.x: 00000000   A1.w: 00002cc2   A1.x: 00000000

USP : ffb00ffc  ASTAT: 00003025

 

Hardware Trace:

   0 Target : <0x03fa0a34> { _bfin_panic + 0x0 }

     Source : <0x03fa05ba> { _evt_default + 0x56 }

   1 Target : <0x03fa0564> { _evt_default + 0x0 }

     Source : <0x03fa0be0> { _do_reset + 0x1c }

   2 Target : <0x03fa0bd8> { _do_reset + 0x14 }

     Source : <0x03fa0bd2> { _do_reset + 0xe }

   3 Target : <0x03fa0bc4> { _do_reset + 0x0 }

     Source : <0x03fa9a34> { _run_command + 0x2c0 }

   4 Target : <0x03fa9a26> { _run_command + 0x2b2 }

     Source : <0x03fa9a10> { _run_command + 0x29c }

   5 Target : <0x03fa9a04> { _run_command + 0x290 }

     Source : <0x03fa99f6> { _run_command + 0x282 }

   6 Target : <0x03fa99f2> { _run_command + 0x27e }

     Source : <0x03fa99dc> { _run_command + 0x268 }

   7 Target : <0x03fa99d8> { _run_command + 0x264 }

     Source : <0x03fb0162> { _find_cmd + 0x6a }

   8 Target : <0x03fb0142> { _find_cmd + 0x4a }

     Source : <0x03fb0132> { _find_cmd + 0x3a }

   9 Target : <0x03fb0130> { _find_cmd + 0x38 }

     Source : <0x03fa130a> { _strncmp + 0x26 }

  10 Target : <0x03fa1306> { _strncmp + 0x22 }

     Source : <0x03fa12f6> { _strncmp + 0x12 }

  11 Target : <0x03fa12f0> { _strncmp + 0xc }

     Source : <0x03fa12ea> { _strncmp + 0x6 }

  12 Target : <0x03fa12e4> { _strncmp + 0x0 }

     Source : <0x03fb012c> { _find_cmd + 0x34 }

  13 Target : <0x03fb0126> { _find_cmd + 0x2e }

     Source : <0x03fb014e> { _find_cmd + 0x56 }

  14 Target : <0x03fb0142> { _find_cmd + 0x4a }

     Source : <0x03fb0132> { _find_cmd + 0x3a }

  15 Target : <0x03fb0130> { _find_cmd + 0x38 }

     Source : <0x03fa130a> { _strncmp + 0x26 }

 

Please reset the board

 

### ERROR ### Please RESET the board ###

--

 

Follow-ups

 

--- Mike Frysinger                                           2008-09-08 02:49:44

does it happen every time ?  does it only happen with 0.0 silicon ?  can you

post the u-boot binary that you're testing with ?  also, can you update to the

very latest trunk as ive fixed up the dump output slightly.

 

but going by this output, it looks like a hardware error is triggered ...

evt_default is only registered for interrupts, and only IVGHW is enabled, and

HWERRCAUSE says it is "external memory addressing error".

 

--- Vivi Li                                                  2008-09-10 23:10:57

I found that this problem can be fixed by updating to the latest toolchain.

So close this bug.

Thank you!

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes