bdi2000 debugging

Hans Thielemans Hans.Thielemans at skynet.be
Wed Feb 16 21:15:29 EST 2005


On Wed, 16 Feb 2005, Matej Kupljen wrote:

> Hi 
> 
> I am trying to debug a problem in a user space application
> (X windows), which when the process exits, crashes the kernel.
> ---------------------------------------------------------------
> Oops: Exception in kernel mode, sig: 4
> NIP: 000003B4 XER: 00000000 LR: C002B540 SP: C3B8DD10 REGS: c3b8dc60
> TRAP: 0700    Not tainted
> MSR: 00081000 EE: 0 PR: 0 FP: 0 ME: 1 IR/DR: 00
> TASK = c3b8c000[55] 'Xorg.strip' Last syscall: 146 
> last math c36aa000 last altivec 00000000
> GPR00: 00000000 C3B8DD10 C3B8C000 C3B8DD20 30105D0C 20000000 C3B8DDE0
> 00136DA8 
> GPR08: 00136DA8 00000000 00000035 000081A4 24048424 1031688C C0200000
> C3B8DDE0 
> GPR16: C0200000 C3B7F3E0 00000000 0C3B80C5 00001032 03B8DD10 C002B580
> 00009032 
> GPR24: 00000035 00000000 00000FCB C3B80C50 00136DA8 00000000 00000035
> C3B80C10 
> Call backtrace: 
> C0200000 C002B540 C002BCE8 C0090A58 C0039B64 C0039DCC C0005A7C 
> 00000000 0FE20BFC 0FE29878 0FE29D1C 0FE29DE8 0FD7E354 0FD65D78 
> 00000000 
> Oops: Exception in kernel mode, sig: 4
> NIP: 000003B4 XER: 20000000 LR: 0FDF527C SP: C3BAFF40 REGS: c3baff50
> TRAP: 0700    Not tainted
> MSR: 00081000 EE: 0 PR: 0 FP: 0 ME: 1 IR/DR: 00
> TASK = c3bae000[54] 'run_xorg.sh' Last syscall: 114 
> last math c36aa000 last altivec 00000000
> GPR00: 00000000 C3BAFF40 30012738 C3BAFF50 0FEF1C6C 20000000 00000000
> 7F7F0000 
> GPR08: FFFFFFFD 00000000 1015E4CC 00000000 44000828 10094078 00000000
> 00000000 
> GPR16: 00000000 00000000 00000005 7FFFFA20 00001032 03BAFF40 0FE49374
> 0000D032 
> GPR24: 1009949C 00000000 00000003 00000000 7FFFFF8F 0FF0B59C 0FF09120
> 7FFFF8B0 
> Call backtrace: 
> C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 
> C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 
> C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 
> C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 
> C0005CC8 C0005CC8 C0005CC8 C0005CC8 C0005CC8 
> ---------------------------------------------------------------
> 
> And that goes on for every process running :-(
> 
> Something is overwriting memory in kernel space I guess.
> Now, I have the BDI 2000 and I am trying to debug this, but until
> now I was unsuccessful :-(
> 
> When I debug the kernel, the BDI prints this out in the telnet
> interface:
> - Target MBAR is 0xF0000000
> - Target XLBA is 0x8000A366
> 
> I know what MBAR is, but what the XLBA is?

I would assume this is the XLB arbiter register.

> The problem is that while this value remains the same everything 
> is fine. But sometimes it is set to 0x00000000 and then I cannot
> use debugger anymore. I can make a few steps when this value 
> is set to 0x0, but the "stepping" is done in completely unrelated
> code. I first noticed this while stepping trough hc_found_ohci
> function when the return 0 is executed. When I disabled the USB
> support in my kernel I could use debugger to debug a kernel.
> But is still does not work all the time, because the XLBA still 
> gets set to 0!
> 
> I am using CVS version of DENX kernel version 2.4.25.
> 
> Has anybody seen this?
> 
> Maybe a tip how to debug this problem?
> 
> Best regards,
> Matej
> 
> _______________________________________________
> Linuxppc-embedded mailing list
> Linuxppc-embedded at ozlabs.org
> https://ozlabs.org/mailman/listinfo/linuxppc-embedded
> 




More information about the Linuxppc-embedded mailing list