website logo
Auteur
avatar
XTO

Forum » » Création-Développement » » JTAG SAM460 (1)


Posté : 20-11-2023 13:41 icone du post

J'ai enfin pu lancer la copie avec la sonde JTAG. En premiere analyse, elle ne montre rien d'anormale. Mais le port serie de debug de l'amigaOS montre tout: Voici le log : kernel 54.30 (1.1.2021) Sam460 release Machine model: 7 (Sam460ex) Dump of context at 0xFFC183E0 Trap type: DSI exception Machine State (raw): 0x00029030 Machine State (verbose): [ExtInt on] [Super] [IAT on] [DAT on] Temporary stack trace: #0: in module Kickstart/kernel+0x000476FC (0x018476FC) #1: in module Kickstart/kernel+0x00044DB4 (0x01844DB4) #2: in module Kickstart/kernel+0x00043824 (0x01843824) #3: in module Kickstart/kernel+0x00043780 (0x01843780) #4: in module Kickstart/kernel+0x00042C48 (0x01842C48) #5: in module Kickstart/kernel+0x0004B4A0 (0x0184B4A0) #6: in module Kickstart/kernel+0x0002E3E4 (0x0182E3E4) #7: in module Kickstart/kernel+0x0002E49C (0x0182E49C) #8: in module Kickstart/kernel+0x0002C47C (0x0182C47C) #9: in module Kickstart/kernel+0x0002D75C (0x0182D75C) #10: in module Kickstart/kernel+0x0002D9B4 (0x0182D9B4) #11: in module Kickstart/kernel+0x00059D94 (0x01859D94) #12: in module Kickstart/ram-handler.kmod+0x00002278 (0x01B93BF8) #13: in module Kickstart/ram-handler.kmod+0x000073AC (0x01B98D2C) #14: in module Kickstart/ram-handler.kmod+0x00007608 (0x01B98F88) #15: in module Kickstart/dos.library.kmod+0x00039844 (0x01958E04) #16: 0x7FAF1CB4 #17: 0x7FAF2468 #18: 0x7FAF2D20 #19: in module Kickstart/dos.library.kmod+0x0002A458 (0x01949A18) #20: in module Kickstart/kernel+0x00054928 (0x01854928) #21: in module Kickstart/kernel+0x000549A0 (0x018549A0) #22: 0x00000000 Crashed process: AsyncWB - copy process (0x6051A4F0) 0: 01844DB4 5DB906C0 00000000 000000A3 FF000FC0 00000001 00000030 00000010 8: 00000000 01845050 00000001 01643D40 42844288 00000000 229DD600 604F0000 16: 60BBFC70 60BBFC14 0006BF94 6051A584 02150000 0228DFF4 00004000 00001000 24: 02295850 00000004 FFFFA044 FF001060 00000002 FF000FC0 51E23000 FF000FC0 CR: 82844288 XER: 20000006 CTR: 01845050 LR: 01845084 ESR: 00000000 DEAR: 000000DF mcsrr0: 0x00000000 csrr0: 0x00000000 Disassembly of crash site: 018476EC: 018476F0: 018476F4: 018476F8: 018476FC: 01847700: 01847704: 01847708: 0184770C: 01847710: Dump of all active TLB's MaxTLB = 27, NextTLB = 12 TS Effective Physical Size TID WIMG XWRXWR 0 1 0x6FF9D000 0x0_0005D000 4k 0 0x0 0x1B 1 1 0x61D34000 0x0_03359000 4k 0 0x0 0x1B 2 1 0x6FFA4000 0x0_00059000 4k 0 0x0 0x1B 3 1 0x6FFA6000 0x0_0016A000 4k 0 0x0 0x1B 4 1 0x6FFFE000 0x0_00009000 4k 0 0x0 0x1B 5 1 0xB0003000 0xD_B0003000 4k 0 0x5 0x1B 6 1 0x6FF16000 0x0_7FFDB000 4k 0 0x0 0x1B 7 1 0xB0006000 0xD_B0006000 4k 0 0x5 0x1B 8 1 0xB0007000 0xD_B0007000 4k 0 0x5 0x1B 9 1 0xB0010000 0xD_B0010000 4k 0 0x5 0x1B 10 1 0xAEFE3000 0xD_AEFE3000 4k 0 0x4 0x1B 11 1 0x6FE7C000 0x0_02365000 4k 0 0x0 0x1B 12 1 0x6FF67000 0x0_00179000 4k 0 0x0 0x1B 13 1 0x6FFA3000 0x0_00055000 4k 0 0x0 0x1B 14 1 0x6FD39000 0x0_023FB000 4k 0 0x0 0x1B 15 1 0x6FF4A000 0x0_0007C000 4k 0 0x0 0x1B 16 1 0x6FD8B000 0x0_023EC000 4k 0 0x0 0x1B 17 1 0x6FED0000 0x0_7FFB1000 4k 0 0x0 0x1B 18 1 0x60BBC000 0x0_7CB9A000 4k 0 0x0 0x1B 19 1 0x62137000 0x0_00844000 4k 0 0x0 0x1B 20 1 0x62201000 0x0_02DC4000 4k 0 0x0 0x1B 21 1 0x6FE7E000 0x0_0237E000 4k 0 0x0 0x1B 22 1 0x6217A000 0x0_00B9F000 4k 0 0x0 0x1B 23 1 0x6FEA4000 0x0_02362000 4k 0 0x0 0x1B 24 1 0x5FB49000 0x0_7C948000 4k 0 0x0 0x1B 25 1 0x6FF21000 0x0_7FFC9000 4k 0 0x0 0x1B 26 1 0x5F40D000 0x0_03510000 4k 0 0x0 0x1B 27 1 0x62DDC000 0x0_7FBE2000 4k 0 0x0 0x1B ------------------------------------------------------------------- 28 1 0x02300000 0x0_02300000 256k 0 0x0 0x1B 29 1 0x02200000 0x0_02200000 1M 0 0x0 0x1B 30 1 0x02100000 0x0_02100000 1M 0 0x0 0x1B 31 1 0x02000000 0x0_02000000 1M 0 0x0 0x1B 32 1 0x01F00000 0x0_01F00000 1M 0 0x0 0x2D 33 1 0x01E00000 0x0_01E00000 1M 0 0x0 0x2D 34 1 0x01D00000 0x0_01D00000 1M 0 0x0 0x2D 35 1 0x01C00000 0x0_01C00000 1M 0 0x0 0x2D 36 1 0x01B00000 0x0_01B00000 1M 0 0x0 0x2D 37 1 0x01A00000 0x0_01A00000 1M 0 0x0 0x2D 38 1 0x01900000 0x0_01900000 1M 0 0x0 0x2D 39 1 0x01800000 0x0_01800000 1M 0 0x0 0x2D 40 1 0x01700000 0x0_01700000 1M 0 0x0 0x0B 41 1 0x01600000 0x0_01600000 1M 0 0x0 0x0B 42 1 0x01500000 0x0_01500000 1M 0 0x0 0x0B 43 1 0x01400000 0x0_01400000 1M 0 0x0 0x0B 44 1 0x01300000 0x0_01300000 1M 0 0x0 0x0B 45 1 0x01200000 0x0_01200000 1M 0 0x0 0x0B 46 1 0x01100000 0x0_01100000 1M 0 0x0 0x0B 47 1 0x01000000 0x0_01000000 1M 0 0x0 0x0B 48 1 0xE0040000 0x4_00040000 64k 0 0x5 0x1B 49 1 0xE0100000 0x4_00100000 64k 0 0x5 0x1B 50 1 0xFF000000 0x4_FF000000 4k 0 0x5 0x1B 51 0 0xFF000000 0x4_FF000000 4k 0 0x5 0x1B 52 1 0xE9000000 0xD_E9000000 16M 0 0x5 0x1B 53 0 0xE9000000 0xD_E9000000 16M 0 0x5 0x1B 54 0 0xE2000000 0x4_BFF00000 1M 0 0x5 0x1B 55 0 0xEEC00000 0xC_0EC00000 1M 0 0x5 0x1B 56 0 0xE8000000 0xC_08000000 16M 0 0x5 0x1B 57 1 0xE2000000 0x4_BFF00000 1M 0 0x5 0x1B 58 1 0xEEC00000 0xC_0EC00000 1M 0 0x5 0x1B 59 1 0xE8000000 0xC_08000000 16M 0 0x5 0x1B 60 0 0xEF000000 0x4_EF000000 16M 0 0x5 0x1B 61 1 0xEF000000 0x4_EF000000 16M 0 0x5 0x1B 62 0 0x40000000 0x0_40000000 1024M 0 0x0 0x3F 63 0 0x00000000 0x0_00000000 1024M 0 0x0 0x3F Fault caused by load operation Kernel command line: serial munge debuglevel=7 Registers pointing to code: On voit que l'on voulu acceder a l'adresse 0x000000DF et on a pas le doit en mode user. C'est un bug facile a reproduire et pour aller plus loin il faut mettre un breakpoint avec la sone au bon endroit dans le kernel a condition d'avoir le fichier avec les symbol de debug et les sources .... On doit se trouver vers #0: in module Kickstart/kernel+0x000476FC (0x018476FC) au moment du plantage. Sinon après avoir regardé le user manual du PPC460EX, il est fait référence à un document d'erratum concernant notamment le snooping sur le cache L2, cela n'a peut etre rien avoir avec ce problème, mais est ce que quelqu'un aurait ce document d'erratum du PPC460EX.
Amiga 500 / SAM460LE / SAM460EX

Cet article provient de Le site des utilisateurs francophones actuels et futurs d'AmigaOS 4.x
https://amiga-ng.org/viewtopic.php?topic=2743&forum=14