"Unhandled Exception - Illegal Instruction" During Linux Kernel Startup in U-Boot
"Unhandled Exception - Illegal Instruction" During Linux Kernel Startup in U-Boot
org”中搜索会话
新会话
"Unhandled
我的群组 exception: Illegal instruction" during linux kernel startup in U-Boot - RISCV Architecture. 订阅
近期的群组
已查看 209 次
收藏的群组
Venkatakrishnan Sutharsan 2021年7⽉9⽇ 13:28:29
收件⼈ RISC-V SW Dev
已加星标的会话
Hi,
I have been writing SPI Driver for a RISCV Board and is currently trying to use that to boot linux kernel from SD Card. Right now, I have the card detected and can view Mles in
RISC-V SW Dev
various partitions in the SD Card. After that I try to copy the uImage (created using mkimage command and vmlinux image Mle) and dtb into the memory and start the kernel
using the following command :
会话 99+
=> ext4load mmc 0:1 ${kernel_addr_r} /boot/uImage; ext4load mmc 0:1 ${fdt_addr_r} /boot/shakti_100t.dtb; bootm ${kernel_addr_r} - ${fdt_addr_r}
关于16131968 bytes read in 1227747 ms (12.7 KiB/s)
2852 bytes read in 504 ms (4.9 KiB/s)
## Booting kernel from Legacy Image at 84000000 ...
Image Name: Shakti-Vajra
Image Type: RISC-V Linux Kernel Image (uncompressed)
Data Size: 16131904 Bytes = 15.4 MiB
Load Address: 84000000
Entry Point: 84000000
Verifying Checksum ... OK
## Flattened Device Tree blob at 88000000
Booting using the fdt blob at 0x88000000
Loading Kernel Image
Using Device Tree in place at 0000000088000000, end 0000000088003b23
And to check the dump I was not able to create the dump using riscv64-unknown-elf-objdump command in my computer so I used the md.b command to get the dump from
RAM in the board. The dump were as follows :
84000000: 27 05 19 56 02 e3 5d 33 60 e2 a7 a5 00 f6 27 40 '..V..]3`.....'@
84000010: 84 00 00 00 84 00 00 00 ee 5e 8f 20 05 1a 02 00 .........^. ....
84000020: 53 68 61 6b 74 69 2d 56 61 6a 72 61 00 00 00 00 Shakti-Vajra....
84000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000040: 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............
84000050: 02 00 f3 00 01 00 00 00 00 00 00 00 e0 ff ff ff ................
84000060: 40 00 00 00 00 00 00 00 00 22 f6 00 00 00 00 00 @........"......
84000070: 00 00 00 00 40 00 38 00 04 00 40 00 15 00 14 00 [email protected]...@.....
84000080: 01 00 00 00 05 00 00 00 00 10 00 00 00 00 00 00 ................
84000090: 00 00 00 00 e0 ff ff ff 00 00 00 00 00 00 00 00 ................
840000a0: f4 ab 01 00 00 00 00 00 f4 ab 01 00 00 00 00 00 ................
840000b0: 00 10 00 00 00 00 00 00 01 00 00 00 07 00 00 00 ................
840000c0: 00 c0 01 00 00 00 00 00 00 b0 01 00 e0 ff ff ff ................
840000d0: 00 b0 01 00 00 00 00 00 c0 a4 e6 00 00 00 00 00 ................
840000e0: c0 a4 e6 00 00 00 00 00 00 10 00 00 00 00 00 00 ................
840000f0: 04 00 00 00 04 00 00 00 c0 78 e1 00 00 00 00 00 .........x......
84000100: c0 68 e1 00 e0 ff ff ff c0 68 e1 00 00 00 00 00 .h.......h......
84000110: 3c 00 00 00 00 00 00 00 3c 00 00 00 00 00 00 00 <.......<.......
84000120: 04 00 00 00 00 00 00 00 51 e5 74 64 06 00 00 00 ........Q.td....
84000130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000150: 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................
84000160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
840001a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
840001b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
840001c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
840001d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
840001e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
840001f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
84000260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
while the FDT loading seems to happen correctly as below. There is a huge number of zeros in the above dump after which there is some data(after 0x84001078). I can also
say that what I see in my hex editor in my computer can be seen in md.b dump in the RAM.