J'ai enfin pu lancer la copie avec la sonde JTAG.
En premiere analyse, elle ne montre rien d'anormale.
Mais le port serie de debug de l'amigaOS montre tout:
Voici le log :
kernel 54.30 (1.1.2021) Sam460 release
Machine model: 7 (Sam460ex)
Dump of context at 0xFFC183E0
Trap type: DSI exception
Machine State (raw): 0x00029030
Machine State (verbose): [ExtInt on] [Super] [IAT on] [DAT on]
Temporary stack trace:
#0: in module Kickstart/kernel+0x000476FC (0x018476FC)
#1: in module Kickstart/kernel+0x00044DB4 (0x01844DB4)
#2: in module Kickstart/kernel+0x00043824 (0x01843824)
#3: in module Kickstart/kernel+0x00043780 (0x01843780)
#4: in module Kickstart/kernel+0x00042C48 (0x01842C48)
#5: in module Kickstart/kernel+0x0004B4A0 (0x0184B4A0)
#6: in module Kickstart/kernel+0x0002E3E4 (0x0182E3E4)
#7: in module Kickstart/kernel+0x0002E49C (0x0182E49C)
#8: in module Kickstart/kernel+0x0002C47C (0x0182C47C)
#9: in module Kickstart/kernel+0x0002D75C (0x0182D75C)
#10: in module Kickstart/kernel+0x0002D9B4 (0x0182D9B4)
#11: in module Kickstart/kernel+0x00059D94 (0x01859D94)
#12: in module Kickstart/ram-handler.kmod+0x00002278 (0x01B93BF8)
#13: in module Kickstart/ram-handler.kmod+0x000073AC (0x01B98D2C)
#14: in module Kickstart/ram-handler.kmod+0x00007608 (0x01B98F88)
#15: in module Kickstart/dos.library.kmod+0x00039844 (0x01958E04)
#16: 0x7FAF1CB4
#17: 0x7FAF2468
#18: 0x7FAF2D20
#19: in module Kickstart/dos.library.kmod+0x0002A458 (0x01949A18)
#20: in module Kickstart/kernel+0x00054928 (0x01854928)
#21: in module Kickstart/kernel+0x000549A0 (0x018549A0)
#22: 0x00000000
Crashed process: AsyncWB - copy process (0x6051A4F0)
0: 01844DB4 5DB906C0 00000000 000000A3 FF000FC0 00000001 00000030 00000010
8: 00000000 01845050 00000001 01643D40 42844288 00000000 229DD600 604F0000
16: 60BBFC70 60BBFC14 0006BF94 6051A584 02150000 0228DFF4 00004000 00001000
24: 02295850 00000004 FFFFA044 FF001060 00000002 FF000FC0 51E23000 FF000FC0
CR: 82844288 XER: 20000006 CTR: 01845050 LR: 01845084
ESR: 00000000
DEAR: 000000DF
mcsrr0: 0x00000000
csrr0: 0x00000000
Disassembly of crash site:
018476EC:
018476F0:
018476F4:
018476F8:
018476FC:
01847700:
01847704:
01847708:
0184770C:
01847710:
Dump of all active TLB's
MaxTLB = 27, NextTLB = 12
TS Effective Physical Size TID WIMG XWRXWR
0 1 0x6FF9D000 0x0_0005D000 4k 0 0x0 0x1B
1 1 0x61D34000 0x0_03359000 4k 0 0x0 0x1B
2 1 0x6FFA4000 0x0_00059000 4k 0 0x0 0x1B
3 1 0x6FFA6000 0x0_0016A000 4k 0 0x0 0x1B
4 1 0x6FFFE000 0x0_00009000 4k 0 0x0 0x1B
5 1 0xB0003000 0xD_B0003000 4k 0 0x5 0x1B
6 1 0x6FF16000 0x0_7FFDB000 4k 0 0x0 0x1B
7 1 0xB0006000 0xD_B0006000 4k 0 0x5 0x1B
8 1 0xB0007000 0xD_B0007000 4k 0 0x5 0x1B
9 1 0xB0010000 0xD_B0010000 4k 0 0x5 0x1B
10 1 0xAEFE3000 0xD_AEFE3000 4k 0 0x4 0x1B
11 1 0x6FE7C000 0x0_02365000 4k 0 0x0 0x1B
12 1 0x6FF67000 0x0_00179000 4k 0 0x0 0x1B
13 1 0x6FFA3000 0x0_00055000 4k 0 0x0 0x1B
14 1 0x6FD39000 0x0_023FB000 4k 0 0x0 0x1B
15 1 0x6FF4A000 0x0_0007C000 4k 0 0x0 0x1B
16 1 0x6FD8B000 0x0_023EC000 4k 0 0x0 0x1B
17 1 0x6FED0000 0x0_7FFB1000 4k 0 0x0 0x1B
18 1 0x60BBC000 0x0_7CB9A000 4k 0 0x0 0x1B
19 1 0x62137000 0x0_00844000 4k 0 0x0 0x1B
20 1 0x62201000 0x0_02DC4000 4k 0 0x0 0x1B
21 1 0x6FE7E000 0x0_0237E000 4k 0 0x0 0x1B
22 1 0x6217A000 0x0_00B9F000 4k 0 0x0 0x1B
23 1 0x6FEA4000 0x0_02362000 4k 0 0x0 0x1B
24 1 0x5FB49000 0x0_7C948000 4k 0 0x0 0x1B
25 1 0x6FF21000 0x0_7FFC9000 4k 0 0x0 0x1B
26 1 0x5F40D000 0x0_03510000 4k 0 0x0 0x1B
27 1 0x62DDC000 0x0_7FBE2000 4k 0 0x0 0x1B
-------------------------------------------------------------------
28 1 0x02300000 0x0_02300000 256k 0 0x0 0x1B
29 1 0x02200000 0x0_02200000 1M 0 0x0 0x1B
30 1 0x02100000 0x0_02100000 1M 0 0x0 0x1B
31 1 0x02000000 0x0_02000000 1M 0 0x0 0x1B
32 1 0x01F00000 0x0_01F00000 1M 0 0x0 0x2D
33 1 0x01E00000 0x0_01E00000 1M 0 0x0 0x2D
34 1 0x01D00000 0x0_01D00000 1M 0 0x0 0x2D
35 1 0x01C00000 0x0_01C00000 1M 0 0x0 0x2D
36 1 0x01B00000 0x0_01B00000 1M 0 0x0 0x2D
37 1 0x01A00000 0x0_01A00000 1M 0 0x0 0x2D
38 1 0x01900000 0x0_01900000 1M 0 0x0 0x2D
39 1 0x01800000 0x0_01800000 1M 0 0x0 0x2D
40 1 0x01700000 0x0_01700000 1M 0 0x0 0x0B
41 1 0x01600000 0x0_01600000 1M 0 0x0 0x0B
42 1 0x01500000 0x0_01500000 1M 0 0x0 0x0B
43 1 0x01400000 0x0_01400000 1M 0 0x0 0x0B
44 1 0x01300000 0x0_01300000 1M 0 0x0 0x0B
45 1 0x01200000 0x0_01200000 1M 0 0x0 0x0B
46 1 0x01100000 0x0_01100000 1M 0 0x0 0x0B
47 1 0x01000000 0x0_01000000 1M 0 0x0 0x0B
48 1 0xE0040000 0x4_00040000 64k 0 0x5 0x1B
49 1 0xE0100000 0x4_00100000 64k 0 0x5 0x1B
50 1 0xFF000000 0x4_FF000000 4k 0 0x5 0x1B
51 0 0xFF000000 0x4_FF000000 4k 0 0x5 0x1B
52 1 0xE9000000 0xD_E9000000 16M 0 0x5 0x1B
53 0 0xE9000000 0xD_E9000000 16M 0 0x5 0x1B
54 0 0xE2000000 0x4_BFF00000 1M 0 0x5 0x1B
55 0 0xEEC00000 0xC_0EC00000 1M 0 0x5 0x1B
56 0 0xE8000000 0xC_08000000 16M 0 0x5 0x1B
57 1 0xE2000000 0x4_BFF00000 1M 0 0x5 0x1B
58 1 0xEEC00000 0xC_0EC00000 1M 0 0x5 0x1B
59 1 0xE8000000 0xC_08000000 16M 0 0x5 0x1B
60 0 0xEF000000 0x4_EF000000 16M 0 0x5 0x1B
61 1 0xEF000000 0x4_EF000000 16M 0 0x5 0x1B
62 0 0x40000000 0x0_40000000 1024M 0 0x0 0x3F
63 0 0x00000000 0x0_00000000 1024M 0 0x0 0x3F
Fault caused by load operation
Kernel command line: serial munge debuglevel=7
Registers pointing to code:
On voit que l'on voulu acceder a l'adresse 0x000000DF et on a pas le doit en mode user.
C'est un bug facile a reproduire et pour aller plus loin il faut mettre un breakpoint avec la sone au bon endroit dans le kernel a condition d'avoir le fichier avec les symbol de debug et les sources .... On doit se trouver vers #0: in module Kickstart/kernel+0x000476FC (0x018476FC) au moment du plantage.
Sinon après avoir regardé le user manual du PPC460EX, il est fait référence à un document d'erratum concernant notamment le snooping sur le cache L2, cela n'a peut etre rien avoir avec ce problème, mais est ce que quelqu'un aurait ce document d'erratum du PPC460EX.
Amiga 500 / SAM460LE / SAM460EX