Query towards S32G3 - BSP 34 Kernel crash

取消
显示结果 
显示  仅  | 搜索替代 
您的意思是: 

Query towards S32G3 - BSP 34 Kernel crash

286 次查看
kishanmishra
Contributor I

Information:

In reference to S32G399 hardware - QSPI NOR configuration for BSP34. Read/ write operations in boot-loader have succeeded. Similarly, when it is being attempted to access the QSPI NOR in Linux using 'mtd' driver then kernel is found to be crashing. Below is the detailed test-case attempted:

  1. 'dd' and 'hexdump' commands have been considered while noting the observations.
  2. 'hexdump' command is always crashing the kernel.
  3. 'dd' command is crashing the kernel when larger memory is being attempted for reading for example while using bs=1M.

Query:

  1. With respect to BSP 34 is it a ERRATA or known issue?
    1. With respect to EVAL boards also?
  2. Let me know if the test case reported in above information is a kernel issue.
  3. I would like to know the experience of the community in such cases.

 

The log of the kernel crash is provided below for your ready reference.

 

 

hexdump -Cv /dev/mtd7 > dumped.bin
[   18.490038]
[   18.490038] op->cmd.buswidth = 1
[   18.490059] op->addr.buswidth = 1
[   18.490062] op->dummy.buswidth = 1
[   18.490064] op->data.buswidth = 1
[   18.490070]
[   18.490070] op->cmd.buswidth = 1
[   18.490072] op->addr.buswidth = 1
[   18.490074] op->dummy.buswidth = 1
 
[   18.490075] op->data.buswidth = 1
B[   18.490083] allocated size = 67108864, byte read = 4096
r[   18.493157] Internal error: synchronous external abort: 96000210 [#1] PREEMPT SMP
o[   18.493163] printk: console [ttyLF0]: printing thread stopped
a[   18.536674] Modules linked in: llce_can llce_mailbox pfeng(O) llce_core fir_pci(O) can_isotp(O)
d[   18.551257] CPU: 0 PID: 313 Comm: hexdump Tainted: G           O      5.10.120-rt70+g0b76731696c1 #1
c[   18.560456] Hardware name: s32g3-zzz-zzzzzzzz (DT)
a[   18.565317] pstate: 20000005 (nzCv daif -PAN -UAO -TCO BTYPE=--)
s[   18.571392] pc : __memcpy_fromio+0x48/0xa0
t[   18.575559] lr : s32gen1_exec_op+0x37c/0x3b0
[   18.579899] sp : ffffffc013e63740
m[   18.583284] x29: ffffffc013e63740 x28: ffffffc013e63e30
e[   18.588665] x27: 0000000000000005 x26: 0000000000000000
s[   18.594047] x25: ffffffc013e63b30 x24: ffffff88034ed140
s[   18.599428] x23: 00000000030f004c x22: 0000000000000000
a[   18.604810] x21: ffffffc011025000 x20: ffffff8800dbc600
g[   18.610192] x19: ffffff8800db8600 x18: 0000000000000020
e[   18.615573] x17: 0000000000000000 x16: 0000000000000000
[   18.620955] x15: ffffff88034ed5a8 x14: ffffffffffffffff
f[   18.626336] x13: ffffffc010d42536 x12: ffffffc010d4252f
r[   18.631719] x11: ffffffc010ca85e8 x10: ffffffc010cb5fe8
o[   18.637100] x9 : ffffffc013e63740 x8 : 000000000814b189
m[   18.642482] x7 : 0024f47300000000 x6 : 0000000000001000
[   18.647863] x5 : 0000000030c8b7b8 x4 : ffffffc017800000
s[   18.653244] x3 : ffffff8804585000 x2 : 0000000000001000
y[   18.658626] x1 : ffffffc017800000 x0 : ffffff8804584000
s[   18.664009] Call trace:
t[   18.666526]  __memcpy_fromio+0x48/0xa0
e[   18.670345]  spi_mem_exec_op+0x394/0x3f0
m[   18.674338]  spi_mem_dirmap_read+0x14c/0x1a0
d[   18.678677]  spi_nor_spimem_read_data+0xbc/0x144
-[   18.683365]  spi_nor_read+0xdc/0x174
j[   18.687010]  mtd_read_oob_std+0x78/0x84
o[   18.690917]  mtd_read_oob+0x7c/0x134
u[   18.694562]  mtd_read+0x48/0x7c
r[   18.697773]  mtdchar_read+0xcc/0x290
n[   18.701418]  vfs_read+0xac/0x1a0
a[   18.704717]  ksys_read+0x6c/0xfc
l[   18.708015]  __arm64_sys_read+0x20/0x30
d[   18.711921]  el0_svc_common.constprop.0+0x78/0x1c4
@[   18.716783]  do_el0_svc+0x24/0x8c
s[   18.720168]  el0_svc+0x14/0x20
3[   18.723293]  el0_sync_handler+0x1a4/0x1b0
2[   18.727372]  el0_sync+0x180/0x1c0
g[   18.730763] Code: aa0103e4 927df0c6 910020c6 8b060003 (f9400085)
3-zzz-zzzzzzzz (Wed 2020-12-16 18:25:30 CET):
 
kernel[265]: [   18.493157] Internal error: synchronous external abort: 96000210 [#1] PREEMPT SMP
 
[   18.736924] ---[ end trace 6ea34f12c4d59fc2 ]---
[   19.737073] printk: enabled sync mode
Segmentation fault
root@s32g3-zzz-zzzzzzzz:~#
Broadcast message from systemd-journald@s32g3-zzz-zzzzzzzz (Wed 2020-12-16 18:25:31 CET):
 
kernel[265]: [   18.730763] Code: aa0103e4 927df0c6 910020c6 8b060003 (f9400085)

 

 

0 项奖励
回复
0 回复数