AnsweredAssumed Answered

iproute2: undefined instruction error

Question asked by MichaelWd on Jul 3, 2013
Latest reply on Jul 8, 2013 by MichaelWd

Dear Members,

 

I'm trying to run SocketCan driver and interface on my BF537 board. I've read that setting this interface with ip from busybox does not work (and it really does not work), so I compiled iproute2-3.4.0 package. The first problem was that iproute2 simply does not compile on current buildroot (2012.08). I need to add a patch, attached to this message.

Now iproute2 compiles and links fine, however if I try to use it I get Undefined instruction error. Do You have any idea what is wrong? I'm using shared-flat file format, and my root partition is rootfs (I'm using XIP).

 

Thank You in advance,

Michael Widlok

 

Error message:

root:/sbin> ip

Undefined instruction

<5> - May be used to emulate instructions that are not defined for

<5>   a particular processor implementation.

Deferred Exception context

CURRENT PROCESS:

COMM=ip PID=201  CPU=0

TEXT = 0x005c0040-0x005e8f40        DATA = 0x005e8f60-0x005f7d90

BSS = 0x005f7d90-0x005fa370  USER-STACK = 0x005fbf38

 

return address: [0x00000334]; contents of:

0x00000310:  ????  ????  ????  ????  ????  ????  ????  ????

0x00000320:  ????  ????  ????  ????  ????  ????  ????  ????

0x00000330:  ????  ???? [????] ????  ????  ????  ????  ????

0x00000340:  ????  ????  ????  ????  ????  ????  ????  ????

 

ADSP-BF537-0.3 420(MHz CCLK) 42(MHz SCLK) (mpu off)

Linux version 3.5.7-ADI-2012R2 (michael@widlok-ntb) (gcc version 4.3.5 (ADI-2012R2-RC2) ) #1 Wed Jul 3 08:05:35 CEST 23

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00062021  IPEND: 0008  IMASK: ffff  SYSCFG: 0006

  EXCAUSE   : 0x21

  physical IVG3 asserted : <0xffa005f0> /* kernel dynamic memory */

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00408000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x005e3a48> [ ip + 0x23a08 ]

PC  : <0x00000334> /* Maybe null pointer? */

DCPLB_FAULT_ADDR: <0x00000334> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x00000334> /* Maybe null pointer? */

PROCESSOR STATE:

R0 : 00000001    R1 : 005fbf3c    R2 : 005fbf44    R3 : 0000002f

R4 : 00000007    R5 : 005fa0d8    R6 : 005fbf3c    R7 : 00000000

P0 : 005fa0d8    P1 : 00000330    P2 : 005fa0ec    P3 : 00000001

P4 : 005f7ad0    P5 : 005e8f60    FP : 005fbef8    SP : 00407f24

LB0: 005e10b9    LT0: 005e10b8    LC0: 00000000

LB1: 00a12c21    LT1: 00a12c20    LC1: 00000000

B0 : 00000001    L0 : 00000000    M0 : 00000000    I0 : 005fbe5d

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00a69aac

B2 : 00000001    L2 : 00000000    M2 : 00000000    I2 : 00000004

B3 : 00a9b9cb    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 005fbeec  ASTAT: 02003004

 

Hardware Trace:

   0 Target : <0x00003148> /* kernel dynamic memory */

     Source : <0xffa00584> /* kernel dynamic memory */ CALL pcrel

   1 Target : <0xffa004e4> /* kernel dynamic memory */

     Source : <0xffa0039e> /* kernel dynamic memory */ RTX

   2 Target : <0xffa00398> /* kernel dynamic memory */

     Source : <0xffa0043e> /* kernel dynamic memory */ JUMP.S

   3 Target : <0xffa003cc> /* kernel dynamic memory */

     Source : <0xffa0061a> /* kernel dynamic memory */ JUMP (P4)

   4 Target : <0xffa005f0> /* kernel dynamic memory */

      FAULT : <0x00000334> /* Maybe null pointer? */

     Source : <0x00000332> /* Maybe null pointer? */

   5 Target : <0x00000330> /* Maybe null pointer? */

     Source : <0x005e3a46> [ ip + 0x23a06 ] CALL (P1)

   6 Target : <0x005e3a36> [ ip + 0x239f6 ]

     Source : <0x005e3eb8> [ ip + 0x23e78 ] RTS

   7 Target : <0x005e3ea8> [ ip + 0x23e68 ]

     Source : <0x005e3a34> [ ip + 0x239f4 ] CALL (P2)

   8 Target : <0x005e3a1c> [ ip + 0x239dc ]

     Source : <0x005ddee0> [ ip + 0x1dea0 ] RTS

   9 Target : <0x005dded0> [ ip + 0x1de90 ]

     Source : <0x005e3a1a> [ ip + 0x239da ] CALL (P2)

  10 Target : <0x005e3a08> [ ip + 0x239c8 ]

     Source : <0x005e39f4> [ ip + 0x239b4 ] IF CC JUMP pcrel

  11 Target : <0x005e39da> [ ip + 0x2399a ]

     Source : <0x005e8f30> [ ip + 0x28ef0 ] RTS

  12 Target : <0x005e8f2c> [ ip + 0x28eec ]

     Source : <0x005e8f0c> [ ip + 0x28ecc ] RTS

  13 Target : <0x005e8f06> [ ip + 0x28ec6 ]

     Source : <0x005e8ef8> [ ip + 0x28eb8 ] IF CC JUMP pcrel

  14 Target : <0x005e8ee4> [ ip + 0x28ea4 ]

     Source : <0x005e8f28> [ ip + 0x28ee8 ] CALL pcrel

  15 Target : <0x005e8f28> [ ip + 0x28ee8 ]

     Source : <0x005c014c> [ ip + 0x10c ] RTS

Userspace Stack

Stack info:

SP: [0x005fbeec] <0x005fbeec> [ ip + 0x3beec ]

FP: (0x005fbee4)

Memory from 0x005fbee0 to 005fc000

005fbee0: 005e3986 (005fbef8)<005e3a36>[00000000] 00000000  00000000 (00000000) 00a26dc0

005fbf00: 005e8f60  00a9bfc3  0000002f  00000000  00a9bfbe  00bc0ff6  00a69a6c  00000330

005fbf20: 00000000  00000000  005e8f20  005e8f32  00000000  00bd77f8  00000001  005fbf6f

005fbf40: 00000000 <005fbf72> 005fbf79  005fbf84  005fbf96  005fbfb9  005fbfc7  005fbfd1

005fbf60: 005fbfe5  005fbfe9  00000000  69000000  4f480070  2f3d454d  52455400  74763d4d

005fbf80: 00323031  696b6c63  7a685f6e  3032313d  30303030  41500030  2f3d4854  6e696273

005fbfa0: 73752f3a  62732f72  2f3a6e69  3a6e6962  7273752f  6e69622f  45485300  2f3d4c4c

005fbfc0: 2f6e6962  55006873  3d524553  746f6f72  53554800  45565f48  4f495352  2e313d4e

005fbfe0: 322e3032  a6960400  44575000  62732f3d  2f006e69  6e696273  0070692f  00000000

Return addresses in stack:

   frame  1 : <0x005e3a36> [ ip + 0x239f6 ]

    address : <0x005fbf72> [ ip + 0x3bf72 ]

ILL

Attachments

Outcomes