On Sun, 2010-12-05 at 15:47 +0100, Hauke Mehrtens wrote: > > > > With the patch below, 2.6.36 now boots on both a BCM5352 and BCM5354. > > > > I don't understand enough of what's going on to propose a fix. > > > > Steve > > > > > > Hi Steve, > > with your change the kernel do not try to access the cfe storage to get > the configuration values, which are not stored there any way. Please try > kernel 2.6.37-rc4, it contains some more fixes and do not try to access > cfe. If this boots without any extra modifications I will backport the > changes done in kernel 2.6.37. > > Hauke Hauke,
2.6.37-rc4 almost boots.
Steve
====================
Starting program at 0x80001000
Linux version 2.6.37-rc4 ([email protected]) (gcc version 4.1.2) #1 Sun Dec
5 10:10:59 EST 2010
CPU revision is: 00029029 (Broadcom BMIPS3300)
-- snip --
Physically mapped flash: Found 1 x16 devices at 0x0 in 16-bit bank.
Manufacturer ID 0x0000c2 Chip ID 0x0b
CFI mfr 0x000000c2
CFI id 0x000022cb
Amd/Fujitsu Extended Query Table at 0x0040
Amd/Fujitsu Extended Query version 1.1.
number of CFI chips: 1
Flash device: 0x800000 at 0x1fc00000
Reserved instruction in kernel code[#1]:
Cpu 0
$ 0 : 00000000 00000063 802f0000 ffffffff
$ 4 : 80438720 81817980 00000014 81817a3e
$ 8 : 00000000 00000000 0000000b 00000000
$12 : 0000000b 00000000 0000000b 00000000
$16 : 81817a38 00000014 0000002d 818c3000
$20 : 00000010 0000048e 0000000b 00000750
$24 : 8023d590 804029fc
$28 : 81816000 81817970 00000000 80130bd0
Hi : 00000000
Lo : 00000000
epc : 804029fc 0x804029fc
Not tainted
ra : 80130bd0 cfe_getenv+0x9c/0xb4
Status: 10008003 KERNEL EXL IE
Cause : 00800028
PrId : 00029029 (Broadcom BMIPS3300)
Modules linked in:
Process swapper (pid: 1, threadinfo=81816000, task=818148a8, tls=00000000)
Stack : 802808a5 7fd5e3a0 14fb1800 ff0a0004 00000016 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000028 00000000 00000000 00000000
8026aabc ffffffff 00000007 00000000 81817a38 ffffffff 00000014 00000000
8000c9d8 00000000 802a0068 818214b8 8001bc1c 802d800a 80270000 81817a38
0000002d 818c3000 80270000 81817a38 802bd00c 8000973c 802a0020 00000000
...
Call Trace:
[<8000c9d8>] nvram_getenv+0x98/0x158
[<8001bc1c>] pick_next_task_fair+0x94/0xb0
[<802bd00c>] init_mtd_partitions+0x1f4/0xbfc
[<8000973c>] schedule+0x2bc/0x6ac
[<80009efc>] schedule_timeout+0x24/0x1a8
[<8001d16c>] try_to_wake_up+0x90/0xdc
[<80048b58>] ktime_get+0x114/0x158
[<80048b58>] ktime_get+0x114/0x158
[<8004defc>] tick_dev_program_event+0x60/0x1d8
[<800423d0>] enqueue_hrtimer+0x94/0xb8
[<8004e0f8>] tick_program_event+0x28/0x34
[<80042b7c>] hrtimer_interrupt+0x1f0/0x3c0
[<800429e8>] hrtimer_interrupt+0x5c/0x3c0
[<8002e790>] run_timer_softirq+0x1c/0x1f0
[<80048b58>] ktime_get+0x114/0x158
[<8004defc>] tick_dev_program_event+0x60/0x1d8
[<800423d0>] enqueue_hrtimer+0x94/0xb8
[<8004e0f8>] tick_program_event+0x28/0x34
[<80042b7c>] hrtimer_interrupt+0x1f0/0x3c0
[<800429e8>] hrtimer_interrupt+0x5c/0x3c0
[<8002e790>] run_timer_softirq+0x1c/0x1f0
[<800285a4>] __do_softirq+0xec/0x164
[<80021fd8>] release_console_sem+0x218/0x280
[<80058e68>] handle_IRQ_event+0x38/0x218
[<80022720>] vprintk+0x384/0x3d8
[<80028678>] do_softirq+0x5c/0x94
[<800287e4>] irq_exit+0x40/0x94
[<8000c7ac>] plat_irq_dispatch+0x40/0xb8
[<8000c7ac>] plat_irq_dispatch+0x40/0xb8
[<80166d1c>] serial8250_console_putchar+0x0/0x44
[<80166d3c>] serial8250_console_putchar+0x20/0x44
[<80001844>] ret_from_irq+0x0/0x4
[<80162480>] uart_console_write+0x5c/0x88
[<80169700>] mem_serial_out+0x0/0x20
[<80021fd8>] release_console_sem+0x218/0x280
[<80022720>] vprintk+0x384/0x3d8
[<80022740>] vprintk+0x3a4/0x3d8
[<80184418>] mtd_do_chip_probe+0x390/0x460
[<802bda14>] init_bcm47xx_map+0x0/0x188
[<802bda14>] init_bcm47xx_map+0x0/0x188
[<802bdb0c>] init_bcm47xx_map+0xf8/0x188
[<8000bf8c>] do_one_initcall+0xfc/0x1e8
[<800dd1e4>] proc_mkdir_mode+0x3c/0x60
[<8005ca44>] init_irq_proc+0x4c/0x84
[<8005ca14>] init_irq_proc+0x1c/0x84
[<802ae1e0>] kernel_init+0xd0/0x174
[<8000e938>] kernel_thread_helper+0x10/0x18
[<80001898>] syscall_exit+0x0/0x38
[<802ae110>] kernel_init+0x0/0x174
[<8000e928>] kernel_thread_helper+0x0/0x18
Code: 040f0337 05630478 051a043e <047803db> 04b603e6 04bc046f 02c202e5
06e70400 066006fc
Disabling lock debugging due to kernel taint
Kernel panic - not syncing: Attempted to kill init!
_______________________________________________
openwrt-devel mailing list
[email protected]
https://lists.openwrt.org/mailman/listinfo/openwrt-devel
