[#5543] SMP kernel crashed when booting
Submitted By: Graf Yang
Open Date
2009-09-21 04:54:22 Close Date
2009-09-22 00:56:26
Priority:
Medium Assignee:
Graf Yang
Status:
Closed Fixed In Release:
N/A
Found In Release:
2010R1 Release:
Category:
Architecture Board:
EZKIT Lite
Processor:
ALL Silicon Revision:
0.3
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
2009R1-rc9
App binary format:
N/A
Summary: SMP kernel crashed when booting
Details:
CoreB bootstrap code to SRAM ff600000 via DMA.
Booting Core B.
6>Instruction Cache Enabled for CPU1
External memory: cacheable in instruction cache
L2 SRAM : uncacheable in instruction cache
Data Cache Enabled for CPU1
External memory: cacheable (write-through) in data cache
L2 SRAM : uncacheable in data cache
Calibrating delay loop... <2>CPU1: processor failed to boot (-38)
Brought up 1 CPUs
SMP: Total of 1 processors activated (2.04 BogoMIPS).
...
...
bfin-wdt: initialized: timeout=20 sec (nowayout=0)
TCP cubic registered
NET: Registered protocol family 17
Instruction fetch misaligned address violation
<5> - Attempted misaligned instruction cache fetch.
Kernel OOPS in progress
Deferred Exception context
CURRENT PROCESS:
COMM=swapper PID=1
CPU = 0
invalid mm
return address: [0x0000c94c]; contents of:
0x0000c920: 0000 a050 3208 306a 6425 0828 a37c 6fa1
0x0000c930: a0c9 181a 3229 6fa5 2004 324d 3229 6fa5
0x0000c940: 910f b0f4 ac8a 3041 304b 3054 [0062] 0c00
0x0000c950: 1c06 4807 1c04 67fe 0c06 1806 3045 6460
ADSP-BF561-0.3 600(MHz CCLK) 100(MHz SCLK) (mpu off)
Linux version 2.6.31-ADI-2010R1-pre-svn7378 (ymm@uboot32-533ezkit) (gcc version9
SEQUENCER STATUS: Not tainted
SEQSTAT: 0000202a IPEND: 8008 IMASK: 003f SYSCFG: 0006
Peripheral interrupts masked off
Kernel interrupts masked off
EXCAUSE : 0x2a
physical IVG3 asserted : <0x00009f24> { _trap + 0x0 }
physical IVG15 asserted : <0x0000a880> { _evt_system_call + 0x0 }
logical irq 6 mapped : <0x00007f6c> { _timer_interrupt + 0x0 }
logical irq 69 mapped : <0x0000b224> { _ipi_handler + 0x0 }
logical irq 82 mapped : <0x000ba698> { _smc_interrupt + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x01023d9c> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x0000dae0> { ___wake_up + 0x28 }
PC : <0x0000c94c> { ___wake_up_common + 0x3c }
DCPLB_FAULT_ADDR: <0x007e3fa4> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x0000c94c> { ___wake_up_common + 0x3c }
PROCESSOR STATE:
R0 : 007e3f9c R1 : 00000003 R2 : 00000000 R3 : 00000001
R4 : 00000000 R5 : 010057b0 R6 : 00000001 R7 : 00000000
P0 : feb00000 P1 : 007e3f9c P2 : 0000001f P3 : 00000003
P4 : 00000000 P5 : fffedb1c FP : 01023dac SP : 01023cc0
LB0: 000b8c2c LT0: 000b8c2c LC0: 00000000
LB1: 000cb516 LT1: 000cb50a LC1: 00000000
B0 : 01023e08 L0 : 00000000 M0 : 00000010 I0 : 00000002
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 01023e58
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 01023e10
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 01023e0c
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 00000000 ASTAT: 02002002
Hardware Trace:
0 Target : <0x000054f4> { _trap_c + 0x0 }
Source : <0x00009eb8> { _exception_to_level5 + 0xb4 } CALL pcrel
1 Target : <0x00009e86> { _exception_to_level5 + 0x82 }
Source : <0x00009e82> { _exception_to_level5 + 0x7e } IF !CC JUMP
2 Target : <0x00009e04> { _exception_to_level5 + 0x0 }
Source : <0x00009ca8> { _bfin_return_from_exception + 0x20 } RTX
3 Target : <0x00009c88> { _bfin_return_from_exception + 0x0 }
Source : <0x00009d5c> { _ex_trap_c + 0x84 } JUMP.S
4 Target : <0x00009cf0> { _ex_trap_c + 0x18 }
Source : <0x00009cec> { _ex_trap_c + 0x14 } IF !CC JUMP
5 Target : <0x00009cd8> { _ex_trap_c + 0x0 }
Source : <0x00009fd8> { _trap + 0xb4 } JUMP (P4)
6 Target : <0x00009f98> { _trap + 0x74 }
Source : <0x00009f94> { _trap + 0x70 } IF !CC JUMP
7 Target : <0x00009f80> { _trap + 0x5c }
Source : <0x00009f7c> { _trap + 0x58 } IF !CC JUMP
8 Target : <0x00009f6a> { _trap + 0x46 }
Source : <0x00009f58> { _trap + 0x34 } JUMP.S
9 Target : <0x00009f24> { _trap + 0x0 }
Source : <0x0000c94a> { ___wake_up_common + 0x3a } 0x3054
10 Target : <0x0000c940> { ___wake_up_common + 0x30 }
Source : <0x0000c938> { ___wake_up_common + 0x28 } JUMP.S
11 Target : <0x0000c910> { ___wake_up_common + 0x0 }
Source : <0x0000dadc> { ___wake_up + 0x24 } CALL pcrel
12 Target : <0x0000dace> { ___wake_up + 0x16 }
Source : <0x0011101c> { __spin_lock_irqsave + 0x18 } RTS
13 Target : <0x00111014> { __spin_lock_irqsave + 0x10 }
Source : <0x0000b63e> { ___raw_spin_lock_asm + 0x1a } RTS
14 Target : <0x0000b63c> { ___raw_spin_lock_asm + 0x18 }
Source : <0x0000b604> { _put_core_lock + 0x18 } RTS
15 Target : <0x0000b5ec> { _put_core_lock + 0x0 }
Source : <0x0000b638> { ___raw_spin_lock_asm + 0x14 } CALL pcrel
Kernel Stack
Stack info:
SP: [0x01023dd0] <0x01023dd0> /* kernel dynamic memory */
FP: (0x01023e0c)
Memory from 0x01023dd0 to 01024000
Follow-ups
--- Graf Yang 2009-09-22 00:56:26
It is fixed on trunk, now SMP kernel can work, so close this bug.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found