[#4983] SVN trunk kernel compiled for bf548 v0.2 chip crashes during boot
Submitted By: Sonic Zhang
Open Date
2009-03-12 00:44:14 Close Date
2009-03-13 05:13:48
Priority:
High Assignee:
Nobody
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
N/A Board:
EZKIT Lite
Processor:
BF548 Silicon Revision:
0.2
Is this bug repeatable?:
Yes Resolution:
Out of Date
Uboot version or rev.:
U-Boot 2008.10-svn1657 Toolchain version or rev.:
09R1-RC2
App binary format:
N/A
Summary: SVN trunk kernel compiled for bf548 v0.2 chip crashes during boot
Details:
SVN trunk kernel compiled for bf548 v0.2 chip crashes during boot. The same kernel compiled for v0.0 can boot successfully on bf548-ezkit of chip v0.2.
## Booting kernel from Legacy Image at 01000000 ...
Image Name: Linux-2.6.28.7-ADI-2009R1-pre-sv
Created: 2009-03-12 4:44:15 UTC
Image Type: Blackfin Linux Kernel Image (gzip compressed)
Data Size: 6722288 Bytes = 6.4 MB
Load Address: 00001000
Entry Point: 0028f64c
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK
Starting Kernel at = 0028f64c
Linux version 2.6.28.7-ADI-2009R1-pre-svn6167 (root@eight) (gcc version 4.1.2 (ADI svn)) #9
console [early_BFuart0] enabled
early printk enabled on early_BFuart0
Board Memory: 64MB
Kernel Managed Memory: 64MB
Memory map:
fixedcode = 0x00000400-0x00000490
text = 0x00001000-0x001b7090
rodata = 0x001b7090-0x00248b7c
bss = 0x00248b80-0x0025e578
data = 0x0025e578-0x0027a000
stack = 0x00278000-0x0027a000
init = 0x0027a000-0x00d1d000
available = 0x00d1d000-0x03dff000
DMA Zone = 0x03e00000-0x04000000
Hardware Trace Active and Enabled
Boot Mode: 1
Blackfin support (C) 2004-2009 Analog Devices, Inc.
Compiled for ADSP-BF548 Rev 0.2
Blackfin Linux support by blackfin.uclinux.org/
Processor Speed: 525 MHz core clock and 131 MHz System Clock
NOMPU: setting up cplb tables
Instruction Cache Enabled for CPU0
Data Cache Enabled for CPU0 (write-back)
Built 1 zonelists in Zone order, mobility grouping off. Total pages: 15747
Kernel command line: root=/dev/mtdblock0 rw earlyprintk=serial,uart1,57600 console=tty0 cof
Undefined instruction
- May be used to emulate instructions that are not defined for
a particular processor implementation.
Kernel OOPS in progress
Deferred Exception context
No Valid process in current context
return address: [0x00008012]; contents of:
0x00007ff0: e14f 001b 6005 e10f 79d0 e10d b884 e132
0x00008000: 0067 e131 0087 e130 0007 e133 ff9a e138
0x00008010: 0004 [3cc0] e082 002e 917a c682 842d 6800
0x00008020: 6901 a0d6 e0b2 1024 3078 42f8 c682 83e8
SEQUENCER STATUS: Not tainted
SEQSTAT: 00060021 IPEND: 8030 SYSCFG: 0006
EXCAUSE : 0x21
interrupts disabled
physical IVG5 asserted : <0xffa00af4> { _evt_ivhw + 0x0 }
physical IVG15 asserted : <0xffa00c50> { _evt_system_call + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00279f6c> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x00007fec> { _init_pint_lut + 0x1c }
PC : <0x00008012> { _init_pint_lut + 0x42 }
DCPLB_FAULT_ADDR: <0x0024b880> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x00008012> { _init_pint_lut + 0x42 }
PROCESSOR STATE:
R0 : 0024b7e4 R1 : 000000ff R2 : ffffffff R3 : 0024b884
R4 : 00000000 R5 : 00000000 R6 : 00000000 R7 : 00248b84
P0 : 0024b884 P1 : 00000028 P2 : 0024b884 P3 : 00248b90
P4 : 0024b7e4 P5 : 0024b884 FP : 001b79d0 SP : 00279e90
LB0: 000c567c LT0: 000c567c LC0: 00000000
LB1: 002807f6 LT1: 002807f6 LC1: 00000000
B0 : 00000004 L0 : 00000000 M0 : 00000001 I0 : 00000007
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00000087
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000067
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : ffffff9a
A0.w: 003d08ba A0.x: 00000000 A1.w: 00000934 A1.x: 00000000
USP : 0027a000 ASTAT: 00002022
Hardware Trace:
0 Target : <0x00004aa8> { _trap_c + 0x0 }
Source : <0xffa005b2> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa00514> { _exception_to_level5 + 0x0 }
Source : <0xffa003e6> { _bfin_return_from_exception + 0x6 } RTX
2 Target : <0xffa003e0> { _bfin_return_from_exception + 0x0 }
Source : <0xffa0046e> { _ex_trap_c + 0x66 } JUMP.S
3 Target : <0xffa00408> { _ex_trap_c + 0x0 }
Source : <0xffa0063e> { _trap + 0x2a } JUMP (P4)
4 Target : <0xffa00614> { _trap + 0x0 }
Source : <0x0000800e> { _init_pint_lut + 0x3e } 0xe138
5 Target : <0x00007fec> { _init_pint_lut + 0x1c }
Source : <0x000c5682> { _memset + 0x2e } RTS
6 Target : <0x000c5654> { _memset + 0x0 }
Source : <0x00007fe8> { _init_pint_lut + 0x18 } CALL pcrel
7 Target : <0x00007fd0> { _init_pint_lut + 0x0 }
Source : <0x0028f7f4> { _init_arch_irq + 0x4c } CALL pcrel
8 Target : <0x0028f7a8> { _init_arch_irq + 0x0 }
Source : <0x00280804> { _init_IRQ + 0x34 } JUMP.L
9 Target : <0x002807d0> { _init_IRQ + 0x0 }
Source : <0x0027a602> { _start_kernel + 0x162 } CALL pcrel
10 Target : <0x0027a602> { _start_kernel + 0x162 }
Source : <0x0029ca26> { _rcu_cpu_notify + 0x5e } RTS
11 Target : <0x0029ca1e> { _rcu_cpu_notify + 0x56 }
Source : <0x000125f6> { _open_softirq + 0xe } RTS
12 Target : <0x000125e8> { _open_softirq + 0x0 }
Source : <0x0029ca1a> { _rcu_cpu_notify + 0x52 } CALL pcrel
13 Target : <0x0029ca10> { _rcu_cpu_notify + 0x48 }
Source : <0x0002c5b8> { _rcu_init_percpu_data + 0x54 } RTS
14 Target : <0x0002c5b2> { _rcu_init_percpu_data + 0x4e }
Source : <0x0002c5a4> { _rcu_init_percpu_data + 0x40 } IF !CC JUMP
15 Target : <0x0002c57c> { _rcu_init_percpu_data + 0x18 }
Source : <0x000c5682> { _memset + 0x2e } RTS
Kernel Stack
Stack info:
SP: [0x0027a000] <0x0027a000> { __edata + 0x0 }
Memory from 0x0027a000 to 0027c000
0027a000:[0024e14a] e10a6008 93108b88 00000010 0026e14a e10a6050 93101688 00106000
0027a020: 0026e14a e10a6020 93101688 00106000 0024e14a 8b94e10a 0025e149 e1099310
0027a040: 6000f130 e0b268fa 92082002 00106008 0024e14a 8b98e10a 0025e149 e1099310
0027a060: 6000f130 e0b268fa 92082002 00106008 00000010 00000010 6fa60167 e141b130
0027a080: 30460026 1688e101 e3f26480 6c662e99 01276000 00000010 0c0105f3 0004e800
0027a0a0: 30313218 e3f2181a 304b4de1 30385001 083e640f 641018b2 10e60806 61e83216
0027a0c0: fffee690 e3f23006 30104dd1 640a300e e3f23007 30375a89 002ae14c 40c0e10c
0027a0e0: 20136007 5abb323b 0c009950 61e91c37 18340808 002ae14a e10a6c64 09d4433c
0027a100: 00001035 00000000 30459165 4daee3f2 30180c00 324b1c11 98083010 08089829
0027a120: 02081008 67fa1007 13f80c02 20026000 0c005208 000017e0 0c00a0a0 ac6217d4
0027a140: 18700c42 5019304b 0c000062 6c861fd4 60009077 05b30127 e14a0010 6c64002a
0027a160: 433ce10a 600f09d4 0c071fcf 304317f1 e3f26171 0c004d4f 0c061805 0a061841
0027a180: e14c143f e10c0024 91208b9c 17e00c00 18540c06 e14f0000 e10f0025 917af0a0
0027a1a0: 18480c42 52c63043 e146326f e147001f 68000024 e1066c25 e10792a0 20198ba0
0027a1c0: 18390c03 3013324b 98119808 10080808 10070208 0c0267fa 600013f8 52082002
0027a1e0: 18290c00 00000000 906a6c08 18230c42 08486901 320f17e6 934b9326 e1402fe2
0027a200: 304b001f 9278e100 a488e3ec 90776c86 01276000 001005b3 61e8320e ffffe688
0027a220: e1402f5c 9121001f 9250e100 a476e3ec 68002f8f 93535e87 e1482f8b e1080025
0027a240: 9100f12c 18390c00 0024e14d 8ba0e10d 91293250 68016002 69076c22 91102001
0027a260: 6c090c00 0879180c 6c221803 e1422ff9 304b001f 92c0e102 2ff26c22 93229329
0027a280: 93535e88 e3ec2f65 e140521b e100001b b0f07090 001fe141 001fe140 921ce100
0027a2a0: 923ce101 0113e122 a438e3ec 001fe140 9248e100 a21ee3ec 2fe36801 e14d05fd
0027a2c0: e10d0029 912fd1a0 0c070167 14226f66 0029e140 0029e141 d1a4e101 0200e122
0027a2e0: cfa0e100 4e6ee3f2 0027e140 a3e4e100 e141b130 e1400029 e100001f e10192e0
0027a300: cc00cfa0 b0f7c412 e3ed0000 60081305 6ca69328 05bd0127 00000010 4d683046
0027a320: 32084f68 016704c3 0026e14a 2c64e10a b1119109 e14c914a e10c002a 304c4344
0027a340: 0042e410 0025e14a 1e1ce10a e1409310 e100002a 0988433c 100a6fa6 00000000
0027a360: 00003228 e3ec9028 09e5364d e14b1ffb e10b002a e3004650 e300acfd e300b26f
0027a380: e300b23b e3ede487 09dc8f99 0000100c 002ae14d 4344e10d 90280000 3632e3ec
0027a3a0: 1ffb09dd 0024e14d 8b98e10d 0b90e3ed 0c009128 60011812 e3ee9128 0c000dc7
0027a3c0: 60001c05 e3009328 e3ec03d1 6c6636db 60000127 00100483 001fe140 9390e100
0027a3e0: 2fea9328 322805f3 002ae147 002ae140 40c0e100 433ce107 e80009b8 30310003
0027a400: 32181042 001fe14c 001fe14f 93e0e10c 93e8e10f 324d2019 9808915a 08089811
0027a420: 02081004 20021ffb 0c005208 30061410 0062ac5a 102d0c00 30436c63 102309b8
0027a440: 00000000 a0980000 17e60c00 3254324d 98119808 10040808 1ffb0208 52082002
0027a460: 17eb0c00 324f915a 98099810 10040808 1ffb0208 52082002 1fda0c00 30436c63
0027a480: 1fe109b8 90776c66 01276000 001005b3 001fe140 e100304d e3ec93f4 2fcda33f
0027a4a0: e14a05fb e8000027 e10a0006 0062a070 e3000030 e14ab74f e10a0026 003116e4
0027a4c0: 4a009110 60f89310 191e0801 0025e14f faf0e10f 00409138 0025e14a 0c74e10a
Follow-ups
--- Sonic Zhang 2009-03-12 06:48:40
This bug has nothing to do with the version based anomaly list definition. Looks
like a bug in toolchain with cpu version flag.
--- Mike Frysinger 2009-03-12 06:56:02
i dont think 2009R1-RC2 has Jie's fix for dag regs / hardware loop loading
--- Sonic Zhang 2009-03-13 05:13:48
You are right. This bug disappears if compiled by 2009R1-RC3 toolchain.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found