[#5129] Application traps_test fails to run
Submitted By: Vivi Li
Open Date
2009-05-15 04:20:26 Close Date
2009-07-13 00:01:30
Priority:
Medium High Assignee:
Robin Getz
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
Tests Board:
N/A
Processor:
ALL Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
gcc4.1-09r1_rc6
App binary format:
N/A
Summary: Application traps_test fails to run
Details:
Application traps_test fails to run on all platforms with 09r1 toolchain.
--
root:/> traps_test -1
Running test 0 for exception 0x01: EXCPT 0x01
... Test application issue: received signal 5, (Trace/breakpoint trap)
root:/>
--
Follow-ups
--- Robin Getz 2009-05-18 10:50:39
Fixed on trunk.
tested:
/traps_test -1
/traps_test -d 0 -c 1 -1
/traps_test -d 0 -c 2 -1
/traps_test -c 1 -1
All provide (now):
54/54 tests passed
-Robin
--- Vivi Li 2009-05-20 05:40:14
This test can run now. But I can see it fails at test 18 and 29.
Bellow is the log for test 18:
--
Running test 18 for exception 0x23: Illegal use of supervisor resource - MMR
Write
... Unrecoverable event
- For example, an exception generated while processing a previous exception.
Deferred Exception context
CURRENT PROCESS:
COMM=traps_test PID=157
CPU = 0
TEXT = 0x003b0040-0x003b55e0 DATA = 0x003b5600-0x003b79f0
BSS = 0x003b79f0-0x003b7cd0 USER-STACK = 0x003b8f60
return address: [0xffa01066]; contents of:
0xffa01040: 22e4 5eaa 9110 6408 4882 9310 182d 42d0
0xffa01050: c605 0000 4280 60f1 5241 3201 e14a ffe0
0xffa01060: e10a 0200 5e42 [9109] e120 4080 5401 0c00
0xffa01070: 101b 488a 1c15 4921 0200 0c00 1815 3045
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062025 IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x25
interrupts disabled
physical IVG5 asserted : <0xffa00ba4> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x004ba000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x003b09e0> [ traps_test + 0x9a0 ]
PC : <0xffa01066> { _dcplb_protection_fault + 0x3a }
DCPLB_FAULT_ADDR: <0xffc00014> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0xffa01066> { _dcplb_protection_fault + 0x3a }
PROCESSOR STATE:
R0 : 00000000 R1 : 00000012 R2 : 00000028 R3 : 00000012
R4 : 00000005 R5 : 00000000 R6 : 00000005 R7 : 00000000
P0 : 00000120 P1 : 00000012 P2 : ffc00014 P3 : 003b8f64
P4 : 003b79ec P5 : 003b789c FP : 003b8e90 SP : 004b9f24
LB0: 003b4735 LT0: 003b4728 LC0: 00000000
LB1: 003a1469 LT1: 003a1468 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 003b8fe1
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 003b8f64
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 003b8e90 ASTAT: 02003024
Hardware Trace:
0 Target : <0x00004a38> { _trap_c + 0x0 }
Source : <0xffa0062a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa0058c> { _exception_to_level5 + 0x0 }
Source : <0xffa0045a> { _bfin_return_from_exception + 0xe } RTX
2 Target : <0xffa0044c> { _bfin_return_from_exception + 0x0 }
Source : <0xffa004e2> { _ex_trap_c + 0x66 } JUMP.S
3 Target : <0xffa0045c> { _handle_bad_cplb + 0x0 }
Source : <0xffa003de> { _ex_dcplb_miss + 0x2a } IF !CC JUMP
4 Target : <0xffa003da> { _ex_dcplb_miss + 0x26 }
Source : <0xffa010aa> { _dcplb_protection_fault + 0x7e } RTS
5 Target : <0xffa010a6> { _dcplb_protection_fault + 0x7a }
Source : <0xffa01070> { _dcplb_protection_fault + 0x44 } IF !CC
JUMP
6 Target : <0xffa0102c> { _dcplb_protection_fault + 0x0 }
Source : <0xffa010d4> { _cplb_hdr + 0x28 } JUMP.L
7 Target : <0xffa010d2> { _cplb_hdr + 0x26 }
Source : <0xffa010c0> { _cplb_hdr + 0x14 } IF !CC JUMP
8 Target : <0xffa010ac> { _cplb_hdr + 0x0 }
Source : <0xffa003d6> { _ex_dcplb_miss + 0x22 } CALL pcrel
9 Target : <0xffa003b4> { _ex_dcplb_miss + 0x0 }
Source : <0xffa003b0> { _ex_workaround_261 + 0x20 } IF CC JUMP
10 Target : <0xffa00390> { _ex_workaround_261 + 0x0 }
Source : <0xffa006c4> { _trap + 0x38 } JUMP (P4)
11 Target : <0xffa006aa> { _trap + 0x1e }
Source : <0xffa006a6> { _trap + 0x1a } IF !CC JUMP
12 Target : <0xffa0068c> { _trap + 0x0 }
Source : <0xffa0045a> { _bfin_return_from_exception + 0xe } RTX
13 Target : <0xffa0044c> { _bfin_return_from_exception + 0x0 }
Source : <0xffa003a2> { _ex_workaround_261 + 0x12 } IF !CC JUMP
14 Target : <0xffa00390> { _ex_workaround_261 + 0x0 }
Source : <0xffa006c4> { _trap + 0x38 } JUMP (P4)
15 Target : <0xffa006aa> { _trap + 0x1e }
Source : <0xffa006a6> { _trap + 0x1a } IF !CC JUMP
Userspace Stack
Stack info:
SP: [0x003b8e90] <0x003b8e90> [ traps_test + 0x8e90 ]
FP: (0x003b8e90)
Memory from 0x003b8e90 to 003b9000
003b8e90:[003b8efc]<003b09e0> 00000001 00000000 00000000 00000000
00000500 00000005
003b8eb0: 00001cb1 00000012 00000012 00000001 00000000 00000001 00000016
00000000
003b8ed0: 003b74f8 00000000 00000001 00000012 00000000 003b8f04
<003b410c> 00000000
003b8ef0: 00000000 003b8f0c 003b8fa8 003b8f20 <003b310c> 003b5600
00000000 003b7c94
003b8f10: 003b55ac 00000000 003b8f64 00000000 00000000 <003a2782>
003b5600 003a8f9b
003b8f30: 00384000 00000000 003a7c94 003f6fef 003f6ff4 <003b0538>
00000000 00000000
003b8f50: 003b55ac 003b55be 00000000 003a7c94 00000005 003b8f93
<003b8f9e> 003b8fa1
003b8f70: 003b8fa3 <003b8fa6> 00000000 003b8fa9 003b8fb0 003b8fbe
003b8fe1 00000000
003b8f90: 74000000 73706172 7365745f 642d0074 2d003000 38310071 4d4f4800
002f3d45
003b8fb0: 4c454853 622f3d4c 732f6e69 41500068 2f3d4854 3a6e6962 7273752f
6e69622f
003b8fd0: 62732f3a 2f3a6e69 2f727375 6e696273 52455400 696c3d4d 0078756e
6e69622f
003b8ff0: 6172742f 745f7370 00747365 00000000 91200200
Return addresses in stack:
frame 1 : <0x003b09e0> [ traps_test + 0x9a0 ]
address : <0x003b410c> [ traps_test + 0x40cc ]
frame 2 : <0x003b310c> [ traps_test + 0x30cc ]
frame 3 : <0x003a2782> [ traps_test + 0x2782 ]
address : <0x003b0538> [ traps_test + 0x4f8 ]
address : <0x003b8f9e> [ traps_test + 0x8f9e ]
address : <0x003b8fa6> [ traps_test + 0x8fa6 ]
FAIL (test failed, but not with the right signal)
(We expected 7 'Bus error' but instead we got 4 'Illegal instruction')
--
Bellow is the log for test 29:
--
Running test 29 for exception 0x27: Stack set to zero^M
... Illegal use of supervisor resource^M
- Attempted to use a Supervisor register or instruction from User mode.^M
Supervisor resources are registers and instructions that are reserved^M
for Supervisor use: Supervisor only registers, all MMRs, and Supervisor^M
only instructions.^M
Deferred Exception context^M
CURRENT PROCESS:^M
COMM=traps_test PID=194^M
CPU = 0^M
TEXT = 0x001e0040-0x001e5360 DATA = 0x001e5380-0x001e7660^M
BSS = 0x001e7660-0x001e7940 USER-STACK = 0x001e8f58^M
^M
return address: [0x001e06fa]; contents of:^M
0x001e06d0: 0010 e3ff ff13 2f44 6bf8 baa8 2f41 0c04 ^M
0x001e06e0: 192b 3047 6780 6001 e300 0244 b900 0c08 ^M
0x001e06f0: 19ae b900 0c00 1948 6801 [bab5] bb19 bae9 ^M
0x001e0700: 2024 3047 67c0 e300 024d e120 007f b9e1 ^M
^M
SEQUENCER STATUS: Not tainted^M
SEQSTAT: 0006202e IPEND: 0030 SYSCFG: 0006^M
EXCAUSE : 0x2e^M
interrupts disabled^M
physical IVG5 asserted : <0xffa00ba4> { _evt_ivhw + 0x0 }^M
RETE: <0x00000000> { _do_one_initcall + 0xfffff000 }^M
RETN: <0x001f4000> /* kernel dynamic memory */^M
RETX: <0x00000480> /* Maybe fixed code section */^M
RETS: <0x001e0a60> [ traps_test + 0xa20 ]^M
PC : <0x001e06fa> [ traps_test + 0x6ba ]^M
DCPLB_FAULT_ADDR: <0xffffffac> /* kernel dynamic memory */^M
ICPLB_FAULT_ADDR: <0x001e06fa> [ traps_test + 0x6ba ]^M
^M
PROCESSOR STATE:^M
R0 : 00000000 R1 : 00000000 R2 : 00000000 R3 : 0a0a0a0a^M
R4 : 00000000 R5 : 00000001 R6 : 00000006 R7 : 00000001^M
P0 : 000001d0 P1 : 00000000 P2 : 001e0b08 P3 : 001e8f5c^M
P4 : 001e765c P5 : 001e7930 FP : 00000000 SP : 001f3f24^M
LB0: 001e1d7d LT0: 001e1d7a LC0: 00000000^M
LB1: 001e3bdd LT1: 001e3b96 LC1: 00000000^M
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 001e6c50^M
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 001e8f5c^M
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000^M
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000^M
A0.w: 00000040 A0.x: 00000000 A1.w: 00000040 A1.x: 00000000^M
USP : 00000000 ASTAT: 02003024^M
^M
Hardware Trace:^M
0 Target : <0x00004a64> { _trap_c + 0x0 }^M
Source : <0xffa0062a> { _exception_to_level5 + 0x9e } CALL pcrel^M
1 Target : <0xffa0058c> { _exception_to_level5 + 0x0 }^M
Source : <0xffa0045a> { _bfin_return_from_exception + 0xe } RTX^M
2 Target : <0xffa0044c> { _bfin_return_from_exception + 0x0 }^M
Source : <0xffa004e2> { _ex_trap_c + 0x66 } JUMP.S^M
3 Target : <0xffa0047c> { _ex_trap_c + 0x0 }^M
Source : <0xffa006c4> { _trap + 0x38 } JUMP (P4)^M
4 Target : <0xffa006aa> { _trap + 0x1e }^M
Source : <0xffa006a6> { _trap + 0x1a } IF !CC JUMP^M
5 Target : <0xffa0068c> { _trap + 0x0 }^M
Source : <0x001e06f8> [ traps_test + 0x6b8 ] 0x6801^M
6 Target : <0x001e06f8> [ traps_test + 0x6b8 ]^M
Source : <0x001e0a60> [ traps_test + 0xa20 ] JUMP.S^M
7 Target : <0x001e0a60> [ traps_test + 0xa20 ]^M
Source : <0x001e0150> [ traps_test + 0x110 ] RTS^M
8 Target : <0x001e0148> [ traps_test + 0x108 ]^M
Source : <0x001e0b12> [ traps_test + 0xad2 ] JUMP.L^M
9 Target : <0x001e0b08> [ traps_test + 0xac8 ]^M
Source : <0x001e0a5e> [ traps_test + 0xa1e ] CALL (P2)^M
10 Target : <0x001e0a4c> [ traps_test + 0xa0c ]^M
Source : <0x001e06f0> [ traps_test + 0x6b0 ] IF !CC JUMP^M
11 Target : <0x001e06ec> [ traps_test + 0x6ac ]^M
Source : <0x001e0b90> [ traps_test + 0xb50 ] RTS^M
12 Target : <0x001e0b7c> [ traps_test + 0xb3c ]^M
Source : <0xffa00ba0> { __common_int_entry + 0xd8 } RTI^M
13 Target : <0xffa00b3e> { __common_int_entry + 0x76 }^M
Source : <0xffa00d64> { _evt_system_call + 0x64 } JUMP.S^M
14 Target : <0xffa00d64> { _evt_system_call + 0x64 }^M
Source : <0xffa0084c> { _system_call + 0xb8 } RTS^M
15 Target : <0xffa00848> { _system_call + 0xb4 }^M
Source : <0xffa00838> { _system_call + 0xa4 } IF !CC JUMP^M
Userspace Stack^M
Stack info:^M
SP: [0x001f3e74] <0x001f3e74> /* kernel dynamic memory */^M
FP: (0x001f3ef8)^M
Memory from 0x001f3e70 to 001f4000^M
001f3e70: 00000001 [001f3e74] ffffffff fffffffe 0000c350 00030005 00177a44
00000000 ^M
001f3e90: 00000000 125c7852 00000026 125bb502 00000026 00021938 001696f4
00000000 ^M
001f3eb0: 001f3eb0 001f3eb0 00000002 00000000 001e8e6c <00021efc>
00021ea4 000000a2 ^M
001f3ed0: 001e8f5c 001e8ee0 00000000 001f3ef4 00000000 0379a000 00000000
001f3ef0 ^M
001f3ef0: 00000001 00000001 (00000000)<ffa0062e> ffa00ba4 ffe02014
00000001 0000ffff ^M
001f3f10: 00000001 00000000 0a0a0a0a 00000000 ffa00274 00000480 00000030
0006202e ^M
001f3f30: 00000000 001f4000 00000480 001e06fa <001e0a60> 00000000
02003024 001e3bdd ^M
001f3f50: 001e1d7d 001e3b96 001e1d7a 00000000 00000000 00000040 00000000
00000040 ^M
001f3f70: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 ^M
001f3f90: 00000000 00000000 00000000 00000000 00000000 00000000 00000000
001e8f5c ^M
001f3fb0: 001e6c50 00000000 00000000 001e7930 001e765c 001e8f5c 001e0b08
00000000 ^M
001f3fd0: 000001d0 00000001 00000006 00000001 00000000 0a0a0a0a 00000000
00000000 ^M
001f3ff0: 00000000 00000000 000001d0 00000006 3e326534 ^M
Return addresses in stack:^M
address : <0x00021efc> { _sys_nanosleep + 0x58 }^M
frame 1 : <0xffa0062e> { _exception_to_level5 + 0xa2 }^M
address : <0x001e0a60> [ traps_test + 0xa20 ]^M
FAIL (test failed, but not with the right signal)^M
(We expected 11 'Segmentation fault' but instead we got 4 'Illegal
instruction')^M
--
--- Robin Getz 2009-05-20 11:47:52
On what system?
root:/> dmesg -n 1
root:/> /traps_test -d 0 -c 100 18
Running test 18 for exception 0x23: Illegal use of supervisor resource - MMR
Write
... PASS (test failed 100 times, as expected by signal 7: Bus error)
1/1 tests passed
root:/> /traps_test -d 0 -c 100 29
Running test 29 for exception 0x27: Stack set to zero
... PASS (test failed 100 times, as expected by signal 11: Segmentation fault)
1/1 tests passed
root:/> cat /proc/cpuinfo
processor : 0
vendor_id : Analog Devices
cpu family : 0x27c8
model name : ADSP-BF537 500(MHz CCLK) 100(MHz SCLK) (mpu off)
stepping : 3
cpu MHz : 500.000/100.000
--- Vivi Li 2009-05-20 22:12:52
Bellow is my board info. When more trap test results come out on 537, I will
check if they all have that problem.
root:/> cat /proc/cpuinfo
processor : 0
vendor_id : Analog Devices
cpu family : 0x27c8
model name : ADSP-BF537 500(MHz CCLK) 125(MHz SCLK) (mpu off)
stepping : 2
cpu MHz : 500.000/125.000
bogomips : 997.37
Calibration : 498688000 loops
cache size : 16 KB(L1 icache) 32 KB(L1 dcache-wb) 0 KB(L2 cache)
dbank-A/B : cache/cache
icache setup : 4 Sub-banks/4 Ways, 32 Lines/Way
dcache setup : 2 Super-banks/4 Sub-banks/2 Ways, 64 Lines/Way
board name : ADI BF537-STAMP
board memory : 65536 kB (0x00000000 -> 0x04000000)
kernel memory : 57336 kB (0x00001000 -> 0x037ff000)
root:/> version
kernel: Linux release 2.6.28.10-ADI-2009R1-pre-svn6380, build #175 Tue May
19 23:33:46 CST 2009
toolchain: bfin-uclinux-gcc release gcc version 4.1.2 (ADI svn)
user-dist: release svn-8071, build #1757 Tue May 19 23:32:52 CST 2009
root:/>
--- Mingquan Pan 2009-05-31 06:29:53
traps_test can pass all on bf527-ezkit 0.0 board, and can pass until case 48 on
bf561 ezkit.
while on most bf537 and bf533 boards, the case fails at case 18 and stops.
--- Robin Getz 2009-06-08 21:26:48
Kernel bug - fixed on trunk and branch. (Yeah - that is what we run this test
for!)
We don't need to handle CPLB protection violations unless we are running
with the MPU on. Fix the entry code to call common trap_c, and remove
the nompu code which is never run.
-Robin
--- Mingquan Pan 2009-06-16 06:05:40
Yes, it fixed on almost all the boards we testing, BF537 STAMP,BF527 and BF548
ezkit, bf561 ezkit and bf526 and bf518 ezbrd.
But it looks it still have some problem for BF533 STAMP board at case 32.
Running test 32 for exception 0x2b: Jump to L1 Data A
... CPLB protection violation
- Illegal instruction fetch access (memory protection violation).
Deferred Exception context
CURRENT PROCESS:
COMM=traps_test PID=184
CPU = 0
TEXT = 0x00690040-0x00695320 DATA = 0x00695340-0x00697700
BSS = 0x00697700-0x006979e0 USER-STACK = 0x00698f64
return address: [0xff800000]; contents of:
0xff7fffe0: ???? ???? ???? ???? ???? ???? ???? ????
0xff7ffff0: ???? ???? ???? ???? ???? ???? ???? ????
0xff800000: [c000] 0087 0000 0000 0800 0000 00ff 0000
0xff800010: e000 037d 0800 0000 0000 0000 0000 0000
ADSP-BF533-0.3 398(MHz CCLK) 79(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1-svn6668
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Not tainted
SEQSTAT: 0006202b IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x2b
interrupts disabled
physical IVG5 asserted : <0xffa00c24> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x001f6000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x006909e0> [ traps_test + 0x9a0 ]
PC : <0xff800000> /* kernel dynamic memory */
DCPLB_FAULT_ADDR: <0x00698e94> [ traps_test + 0x8e94 ]
ICPLB_FAULT_ADDR: <0xff800000> /* kernel dynamic memory */
PROCESSOR STATE:
R0 : 00000200 R1 : 00000020 R2 : 00000028 R3 : 00000020
R4 : 00000005 R5 : 00000000 R6 : 00000005 R7 : 00000000
P0 : 00000200 P1 : 00000020 P2 : ff800000 P3 : 00698f68
P4 : 006976fc P5 : 006975ac FP : 00698f00 SP : 001f5f24
LB0: 00694481 LT0: 00694474 LC0: 00000000
LB1: 001e1369 LT1: 001e1368 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 00698fe8
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00698f68
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 00698e9c ASTAT: 02003024
Hardware Trace:
0 Target : <0x00004cdc> { _trap_c + 0x0 }
Source : <0xffa0066a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa005cc> { _exception_to_level5 + 0x0 }
Source : <0xffa004ac> { _bfin_return_from_exception + 0x20 } RTX
2 Target : <0xffa0048c> { _bfin_return_from_exception + 0x0 }
Source : <0xffa00522> { _ex_trap_c + 0x46 } JUMP.S
3 Target : <0xffa004dc> { _ex_trap_c + 0x0 }
Source : <0xffa00742> { _trap + 0x66 } JUMP (P4)
4 Target : <0xffa006fc> { _trap + 0x20 }
Source : <0xffa006f8> { _trap + 0x1c } IF !CC JUMP
5 Target : <0xffa006dc> { _trap + 0x0 }
Source : <0x00690394> [ traps_test + 0x354 ] JUMP (P2)
6 Target : <0x00690384> [ traps_test + 0x344 ]
Source : <0x006909de> [ traps_test + 0x99e ] CALL (P2)
7 Target : <0x006909cc> [ traps_test + 0x98c ]
Source : <0x006906ee> [ traps_test + 0x6ae ] IF !CC JUMP
8 Target : <0x006906e2> [ traps_test + 0x6a2 ]
Source : <0x00690b28> [ traps_test + 0xae8 ] RTS
9 Target : <0x00690b14> [ traps_test + 0xad4 ]
Source : <0xffa00c22> { __common_int_entry + 0xda } RTI
10 Target : <0xffa00bc0> { __common_int_entry + 0x78 }
Source : <0xffa00ee4> { _evt_system_call + 0x64 } JUMP.S
11 Target : <0xffa00ee4> { _evt_system_call + 0x64 }
Source : <0xffa008c8> { _system_call + 0xb8 } RTS
12 Target : <0xffa008c4> { _system_call + 0xb4 }
Source : <0xffa008b4> { _system_call + 0xa4 } IF !CC JUMP
13 Target : <0xffa008ae> { _system_call + 0x9e }
Source : <0xffa0089e> { _system_call + 0x8e } IF !CC JUMP
14 Target : <0xffa00878> { _system_call + 0x68 }
Source : <0x000228b4> { _sys_nanosleep + 0x1c } RTS
15 Target : <0x000228ae> { _sys_nanosleep + 0x16 }
Source : <0x000228f0> { _sys_nanosleep + 0x58 } JUMP.S
Userspace Stack
Stack info:
SP: [0x00698e9c] <0x00698e9c> [ traps_test + 0x8e9c ]
FP: (0x00698e94)
Memory from 0x00698e90 to 00699000
00698e90: 00698f00 (00698f00)<006909e0>[00000001] 00000000 00000000
00000000 00000500
00698eb0: 00000005 00001cb1 00000020 00000020 00000001 00000000 00000001
00000016
00698ed0: 00000000 00697318 00000000 00000001 00000020 00000000 00698f08
<00693e94>
00698ef0: 00000000 00000000 00698f10 00698fab (00698f24)<00692f9c>
00695340 00000000
00698f10: 006979a4 006952f8 00000000 00698f68 00000000
(00000000)<001e2514> 00695340
00698f30: 001e8f9c 001cd000 00000000 001e79a4 001e8f9c 001e8f9c
<00690538> 00000000
00698f50: 00000000 006952f8 0069530a 00000000 001e8fa0 00000005 00698f94
00698fa1
00698f70:<00698fa4> 00698fa6 00698fa9 00000000 00698fac 00698fb3
00698fc1 00698fe4
00698f90: 00000000 72742f2e 5f737061 74736574 00642d00 712d0030 00323300
454d4f48
00698fb0: 53002f3d 4c4c4548 69622f3d 68732f6e 54415000 622f3d48 2f3a6e69
2f727375
00698fd0: 3a6e6962 6962732f 752f3a6e 732f7273 006e6962 4d524554 6e696c3d
2e007875
00698ff0: 6172742f 745f7370 00747365 00000000 0000e801
Return addresses in stack:
frame 1 : <0x006909e0> [ traps_test + 0x9a0 ]
address : <0x00693e94> [ traps_test + 0x3e54 ]
frame 2 : <0x00692f9c> [ traps_test + 0x2f5c ]
frame 3 : <0x001e2514> [ traps_test + 0x2514 ]
address : <0x00690538> [ traps_test + 0x4f8 ]
address : <0x00698fa4> [ traps_test + 0x8fa4 ]
The kernel stuck here and no response now.
cpu info:
root:/>
root:/> cat /proc/cpuinfo
processor : 0
vendor_id : Analog Devices
cpu family : 0x27a5
model name : ADSP-BF533 398(MHz CCLK) 79(MHz SCLK) (mpu off)
stepping : 3
cpu MHz : 398.131200/79.626240
bogomips : 792.57
Calibration : 396288000 loops
cache size : 16 KB(L1 icache) 32 KB(L1 dcache-wb) 0 KB(L2 cache)
dbank-A/B : cache/cache
icache setup : 4 Sub-banks/4 Ways, 32 Lines/Way
dcache setup : 2 Super-banks/4 Sub-banks/2 Ways, 64 Lines/Way
board name : ADI BF533-STAMP
board memory : 131072 kB (0x00000000 -> 0x08000000)
kernel memory : 57336 kB (0x00001000 -> 0x037ff000)
root:/> version
kernel: Linux release 2.6.28.10-ADI-2009R1-svn6699, build #16 Tue Jun 16
09:57:04 MDT 2009
toolchain: bfin-uclinux-gcc release gcc version 4.1.2 (ADI svn)
user-dist: release svn-8283, build #239 Tue Jun 16 09:56:12 MDT 2009
--- Robin Getz 2009-06-28 18:50:15
I verified this does happen on 533 (0.3) silicon, but not on 0.5 silicon.
Can you confirm that 0.5 silicon works as expected?
-Robin
--- Vivi Li 2009-06-30 03:25:24
We only have BF533-STAMP board with 0.3 silicon.
In BF533-EZKIT board with 0.4 silicon, this test pass.
--- Robin Getz 2009-07-09 12:08:33
I put something into trunk which should fix this.
Since I don't have a 533 anymore (it's in a box, while I move offices), I can't
test it -- if You can test trunk, and let me know if it works - I will put on
the branch tomorrow.
-Robin
--- Mingquan Pan 2009-07-13 00:01:30
Yes, I see this trap case pass all cases on bf533-stamp(0.3). So close now.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found