From owner-freebsd-arm@FreeBSD.ORG Fri Nov 28 15:12:27 2014 Return-Path: Delivered-To: freebsd-arm@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0463CEC2 for ; Fri, 28 Nov 2014 15:12:27 +0000 (UTC) Received: from mho-02-ewr.mailhop.org (mho-02-ewr.mailhop.org [204.13.248.72]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CAC719BD for ; Fri, 28 Nov 2014 15:12:26 +0000 (UTC) Received: from [73.34.117.227] (helo=ilsoft.org) by mho-02-ewr.mailhop.org with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from ) id 1XuNDd-0004R6-Mz; Fri, 28 Nov 2014 15:12:25 +0000 Received: from [172.22.42.240] (revolution.hippie.lan [172.22.42.240]) by ilsoft.org (8.14.9/8.14.9) with ESMTP id sASFCO7B003346; Fri, 28 Nov 2014 08:12:24 -0700 (MST) (envelope-from ian@FreeBSD.org) X-Mail-Handler: Dyn Standard SMTP by Dyn X-Originating-IP: 73.34.117.227 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/sendlabs/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX1+OJm5jJQyjoUcL4wnKPcw1 X-Authentication-Warning: paranoia.hippie.lan: Host revolution.hippie.lan [172.22.42.240] claimed to be [172.22.42.240] Subject: Re: VM FAULT From: Ian Lepore To: Tony Moseby In-Reply-To: <103098674.2514784.1417176312748.JavaMail.yahoo@jws11120.mail.ir2.yahoo.com> References: <103098674.2514784.1417176312748.JavaMail.yahoo@jws11120.mail.ir2.yahoo.com> Content-Type: multipart/mixed; boundary="=-c0CuVJoStb+q+PCqABL3" Date: Fri, 28 Nov 2014 08:12:23 -0700 Message-ID: <1417187543.1047.9.camel@revolution.hippie.lan> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Cc: "freebsd-arm@freebsd.org" X-BeenThere: freebsd-arm@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Porting FreeBSD to ARM processors." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Nov 2014 15:12:27 -0000 --=-c0CuVJoStb+q+PCqABL3 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit On Fri, 2014-11-28 at 12:05 +0000, Tony Moseby wrote: > Hello, > Now and then my system crashes at boot, sometimes freezes , sometimes I get following information (see below).I am running FreeBsd 8.2 with a marvel ethernet switch, someone who have seen orcan explain this? > > vm_fault(0xc0bd4914, b82d3000, 1, 0) -> 1Fatal kernel mode data abort: 'Translation Fault (S)'trapframe: 0xd663edecFSR=00000005, FAR=b82d37a8, spsr=00000013r0 =c0bd40b8, r1 =0001bb40, r2 =feedfeed, r3 =00000040r4 =0000009c, r5 =c0bd4070, r6 =b82d3530, r7 =c4e72c00r8 =c0bd3d2c, r9 =c0bd3a30, r10=c0bdad60, r11=d663ee64r12=7ab16e37, ssp=d663ee38, slr=c091a844, pc =c0950118 > There's not really enough info in that panic output to figure out the problem. When it happens again, a backtrace (just enter bt at the debugger prompt) might help. I'm attaching a patch we used at $work when running 8.2 on a marvell-based Dreamplug. Maybe it will help, although the problem it fixed for us was IO corruption on disk and network reads, so it doesn't seem all that related. -- Ian --=-c0CuVJoStb+q+PCqABL3 Content-Disposition: inline; filename="dp_cache_wralloc.diff" Content-Type: text/x-patch; name="dp_cache_wralloc.diff"; charset="us-ascii" Content-Transfer-Encoding: 7bit Do not enable allocating a cache line on write access. Instead, leave that feature in whatever state the bootloader set it to, on the theory that the firmware that comes with the unit knows best. This fixes intermittant cache line corruptions during bulk network data flow. diff -r df572d6d53cd -r a142512ee876 sys/arm/arm/cpufunc.c --- sys/arm/arm/cpufunc.c Thu Nov 22 16:46:06 2012 -0700 +++ sys/arm/arm/cpufunc.c Sat Dec 01 15:38:59 2012 -0700 @@ -1067,13 +1067,13 @@ set_cpufuncs() */ if (cputype == CPU_ID_MV88FR571_VD || cputype == CPU_ID_MV88FR571_41) { - sheeva_control_ext(0xffffffff, - FC_DCACHE_STREAM_EN | FC_WR_ALLOC_EN | + sheeva_control_ext(0xffffffff & ~FC_WR_ALLOC_EN, + FC_DCACHE_STREAM_EN | FC_BRANCH_TARG_BUF_DIS | FC_L2CACHE_EN | FC_L2_PREF_DIS); } else { - sheeva_control_ext(0xffffffff, - FC_DCACHE_STREAM_EN | FC_WR_ALLOC_EN | + sheeva_control_ext(0xffffffff & ~FC_WR_ALLOC_EN, + FC_DCACHE_STREAM_EN | FC_BRANCH_TARG_BUF_DIS | FC_L2CACHE_EN); } --=-c0CuVJoStb+q+PCqABL3--