[#3958] [ltp]test case execve05 will fail sometimes on BF561-EZKIT

Document created by Aaronwu Employee on Aug 28, 2013
Version 1Show Document
  • View in full screen mode

[#3958] [ltp]test case execve05 will fail sometimes on BF561-EZKIT

Submitted By: Vivi Li

Open Date

2008-03-06 02:44:57     Close Date

2009-01-08 05:35:37

Priority:

Medium     Assignee:

Sonic Zhang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

N/A

Processor:

N/A     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

08r1-8

App binary format:

N/A     

Summary: [ltp]test case execve05 will fail sometimes on BF561-EZKIT

Details:

 

On 08r1 branch, run ltp testcase execve05 on BF561-EZKIT, it will fail sometimes, especially with combinations wb_slab_np2/wt_slob/wt_slab_buddy.

 

Below is the log:

--

root:/> execve05 -F /bin/test3

NULL pointer access (probably)

Defered Exception context

CURRENT PROCESS:

COMM=test3 PID=97

TEXT = 0x031e8040-0x031e8f60  DATA = 0x031e8f64-0x031e9104

BSS = 0x031e9104-0x031e9354   USER-STACK = 0x031eafe4

 

return address: [0x031e8e02]; contents of:

0x031e8de0:  0010  434b  c682  8043  5603  c682  8280  e146

0x031e8df0:  7efe  e147  8101  3212  5748  e106  feff  e107

0x031e8e00:  0100 [9012] 5032  43d1  5808  5438  0c00  1408

0x031e8e10:  5815  5070  43c0  5841  5479  0c01  1ff3  e491

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00060027  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x18

  EXCAUSE   : 0x27

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x0049e000> /* unknown address */

RETX: <0x031e8e02> [ test3 + 0xdc2 ]

RETS: <0x031e8be0> [ test3 + 0xba0 ]

PC  : <0x031e8e02> [ test3 + 0xdc2 ]

DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x031e8e02> [ test3 + 0xdc2 ]

 

PROCESSOR STATE:

R0 : 00002f2f    R1 : 2f2f0000    R2 : 00000000    R3 : 0000002f

R4 : 031e8140    R5 : 2f2f2f2f    R6 : 7efefeff    R7 : 81010100

P0 : 031eaf5d    P1 : 00000003    P2 : 00000000    P3 : 031eafe8

P4 : 002ec2d4    P5 : 031e8f64    FP : 031eaf68    SP : 0049df24

LB0: 031e8aa5    LT0: 031e8aa4    LC0: 00000000

LB1: 03011c9d    LT1: 03011c96    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 031eaefd

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 002f1f68

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 031eaf68  ASTAT: 02002020

 

Hardware Trace:

   0 Target : <0x00004858> { _trap_c + 0x0 }

     Source : <0xffa00774> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa006c0> { _exception_to_level5 + 0x0 }

     Source : <0xffa0061c> { _ex_trap_c + 0x5c }

   2 Target : <0xffa005c0> { _ex_trap_c + 0x0 }

     Source : <0xffa0044a> { _ex_workaround_261 + 0x22 }

   3 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }

     Source : <0xffa00814> { _trap + 0x28 }

   4 Target : <0xffa007ec> { _trap + 0x0 }

     Source : <0xffa00562> { _bfin_return_from_exception + 0xe }

   5 Target : <0xffa00554> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa0043a> { _ex_workaround_261 + 0x12 }

   6 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }

     Source : <0xffa00814> { _trap + 0x28 }

   7 Target : <0xffa007ec> { _trap + 0x0 }

     Source : <0x031e8dfe> [ test3 + 0xdbe ]

   8 Target : <0x031e8de2> [ test3 + 0xda2 ]

     Source : <0x031e8db2> [ test3 + 0xd72 ]

   9 Target : <0x031e8da4> [ test3 + 0xd64 ]

     Source : <0x031e8bdc> [ test3 + 0xb9c ]

  10 Target : <0x031e8bd8> [ test3 + 0xb98 ]

     Source : <0x031e8bd0> [ test3 + 0xb90 ]

  11 Target : <0x031e8bc0> [ test3 + 0xb80 ]

     Source : <0x031e872a> [ test3 + 0x6ea ]

  12 Target : <0x031e870e> [ test3 + 0x6ce ]

     Source : <0x031e8210> [ test3 + 0x1d0 ]

  13 Target : <0x031e81fe> [ test3 + 0x1be ]

     Source : <0x031e8544> [ test3 + 0x504 ]

  14 Target : <0x031e853c> [ test3 + 0x4fc ]

     Source : <0x031e8594> [ test3 + 0x554 ]

  15 Target : <0x031e858c> [ test3 + 0x54c ]

     Source : <0x031e8aa6> [ test3 + 0xa66 ]

Stack from 0049df04:

        00000000 ffa00778 00134570 00134570 00134568 031eaf5c 031e8140 031e882c

        031e8e02 00000030 00060027 00000000 0049e000 031e8e02 031e8e02 031e8be0

        00002f2f 02002020 03011c9d 031e8aa5 03011c96 031e8aa4 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 002f1f68 031eaefd 031eaf68 031eaf68 031e8f64 002ec2d4

 

Call Trace:

[<00002f2f>] _do_signal+0x2cb/0xdac

[<00002f2f>] _do_signal+0x2cb/0xdac

 

root:/> execve05 -F /bin/test3

execve05    1  PASS  :  call generated expected ETXTBSY error

root:/>

--

 

Follow-ups

 

--- Mike Frysinger                                           2008-04-03 21:40:19

i think this was just the execv bug in uClibc that is now fixed ... is this

still an issue ?

 

i ran on trunk:

while /execve05 -F /test3 ; do :; done

 

and it seemed to work OK

 

--- Bryan Wu                                                 2008-04-07 03:11:07

In the trunk:

 

We tested trunk kernel compiled with trunk toolchain. It runs OK, but when I

try CTRL+C to stop the while loop here, it crashed:

 

--

execve05    1  PASS  :  call generated expected ETXTBSY error

Undefined instruction

- May be used to emulate instructions that are not defined for

   a particular processor implementation.

Deferred Exception context

CURRENT PROCESS:

COMM=execve05 PID=351

TEXT = 0x00300040-0x00309b20        DATA = 0x00309b24-0x0030c414

BSS = 0x0030c414-0x00310e54  USER-STACK = 0x00311f70

 

return address: [0x0030c414]; contents of:

0x0030c3f0:  adc4  0030  adc4  0030  b0c4  0030  b0c4  0030

0x0030c400:  0000  0000  ffff  ffff  0000  0000  ffff  ffff

0x0030c410:  0000  0000 [0001] 0000  0000  0000  0000  0000

0x0030c420:  0000  0000  0000  0000  0000  0000  0000  0000

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00002021  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x0

  EXCAUSE   : 0x21

RETE: <0x00000000> { _run_init_process + 0xfffff000 }

RETN: <0x03798000> /* unknown address */

RETX: <0x0030c414> [ execve05 + 0xc414 ]

RETS: <0x0030286c> [ execve05 + 0x282c ]

PC  : <0x0030c414> [ execve05 + 0xc414 ]

DCPLB_FAULT_ADDR: <0x00310e48> [ execve05 + 0x10e48 ]

ICPLB_FAULT_ADDR: <0x0030c414> [ execve05 + 0xc414 ]

 

PROCESSOR STATE:

R0 : 0030c414    R1 : 00000001    R2 : 00000001    R3 : 00000003

R4 : 0030013c    R5 : 00000003    R6 : 0030cf80    R7 : 00000000

P0 : 00310d29    P1 : 00310d29    P2 : 0030c414    P3 : 00311f74

P4 : 0030c414    P5 : 00309b24    FP : 00311d40    SP : 03797f24

LB0: 00304cf9    LT0: 00304cf6    LC0: 00000000

LB1: 00304021    LT1: 00304020    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 00311544

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00311f74

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00311d30  ASTAT: 02003004

 

Hardware Trace:

   0 Target : <0x0000457c> { _trap_c + 0x0 }

     Source : <0xffa006c4> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa00610> { _exception_to_level5 + 0x0 }

     Source : <0xffa0056c> { _ex_trap_c + 0x5c }

   2 Target : <0xffa00510> { _ex_trap_c + 0x0 }

     Source : <0xffa00764> { _trap + 0x28 }

   3 Target : <0xffa0073c> { _trap + 0x0 }

     Source : <0x0030286a> [ execve05 + 0x282a ]

   4 Target : <0x00302852> [ execve05 + 0x2812 ]

     Source : <0x00302532> [ execve05 + 0x24f2 ]

   5 Target : <0x0030252e> [ execve05 + 0x24ee ]

     Source : <0x00302292> [ execve05 + 0x2252 ]

   6 Target : <0x0030228e> [ execve05 + 0x224e ]

     Source : <0x00302284> [ execve05 + 0x2244 ]

   7 Target : <0x00302268> [ execve05 + 0x2228 ]

     Source : <0x00302220> [ execve05 + 0x21e0 ]

   8 Target : <0x003021f4> [ execve05 + 0x21b4 ]

     Source : <0x003021e2> [ execve05 + 0x21a2 ]

   9 Target : <0x003021cc> [ execve05 + 0x218c ]

     Source : <0x0030217e> [ execve05 + 0x213e ]

  10 Target : <0x00302174> [ execve05 + 0x2134 ]

     Source : <0x0030215c> [ execve05 + 0x211c ]

  11 Target : <0x0030215c> [ execve05 + 0x211c ]

     Source : <0x00303708> [ execve05 + 0x36c8 ]

  12 Target : <0x00303704> [ execve05 + 0x36c4 ]

     Source : <0x003037a2> [ execve05 + 0x3762 ]

  13 Target : <0x00303788> [ execve05 + 0x3748 ]

     Source : <0x00303dc0> [ execve05 + 0x3d80 ]

  14 Target : <0x00303db8> [ execve05 + 0x3d78 ]

     Source : <0x00303da6> [ execve05 + 0x3d66 ]

  15 Target : <0x00303da0> [ execve05 + 0x3d60 ]

     Source : <0x00303c18> [ execve05 + 0x3bd8 ]

Stack from 03797f04:

        00311f74 ffa006c8 0015da4c 0015da4c 0015da48 00000000 0030013c

00402eda

        0030c414 00000030 00002021 00000000 03798000 0030c414 0030c414

0030286c

        0030c414 02003004 00304021 00304cf9 00304020 00304cf6 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00311f74 00311544 00311d30 00311d40 00309b24

0030c414

 

Call Trace:

 

Undefined instruction

- May be used to emulate instructions that are not defined for

   a particular processor implementation.

Deferred Exception context

CURRENT PROCESS:

COMM=execve05 PID=351

TEXT = 0x00300040-0x00309b20        DATA = 0x00309b24-0x0030c414

BSS = 0x0030c414-0x00310e54  USER-STACK = 0x00311f70

 

return address: [0x0030c414]; contents of:

0x0030c3f0:  adc4  0030  adc4  0030  b0c4  0030  b0c4  0030

0x0030c400:  0000  0000  ffff  ffff  0000  0000  ffff  ffff

0x0030c410:  0000  0000 [0001] 0000  0000  0000  0000  0000

0x0030c420:  0000  0000  0000  0000  0000  0000  0000  0000

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00062021  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x18

  EXCAUSE   : 0x21

RETE: <0x00000000> { _run_init_process + 0xfffff000 }

RETN: <0x03798000> /* unknown address */

RETX: <0x0030c414> [ execve05 + 0xc414 ]

RETS: <0x0030286c> [ execve05 + 0x282c ]

PC  : <0x0030c414> [ execve05 + 0xc414 ]

DCPLB_FAULT_ADDR: <0x00310e48> [ execve05 + 0x10e48 ]

ICPLB_FAULT_ADDR: <0x0030c414> [ execve05 + 0xc414 ]

 

PROCESSOR STATE:

R0 : 0030c414    R1 : 00000001    R2 : 00000001    R3 : 00000003

R4 : 0030013c    R5 : 00000003    R6 : 0030cf80    R7 : 00000000

P0 : 00310ba1    P1 : 00310ba1    P2 : 0030c414    P3 : 00311f74

P4 : 0030c414    P5 : 00309b24    FP : 00311bb8    SP : 03797f24

LB0: 00304cf9    LT0: 00304cf6    LC0: 00000000

LB1: 00304021    LT1: 00304020    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 003113bc

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00311f74

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00311ba8  ASTAT: 02003004

 

Hardware Trace:

   0 Target : <0x0000457c> { _trap_c + 0x0 }

     Source : <0xffa006c4> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa00610> { _exception_to_level5 + 0x0 }

     Source : <0xffa0056c> { _ex_trap_c + 0x5c }

   2 Target : <0xffa00510> { _ex_trap_c + 0x0 }

     Source : <0xffa00764> { _trap + 0x28 }

   3 Target : <0xffa0073c> { _trap + 0x0 }

     Source : <0x0030286a> [ execve05 + 0x282a ]

   4 Target : <0x00302852> [ execve05 + 0x2812 ]

     Source : <0x00302532> [ execve05 + 0x24f2 ]

   5 Target : <0x0030252e> [ execve05 + 0x24ee ]

     Source : <0x00302292> [ execve05 + 0x2252 ]

   6 Target : <0x0030228e> [ execve05 + 0x224e ]

     Source : <0x00302284> [ execve05 + 0x2244 ]

   7 Target : <0x00302268> [ execve05 + 0x2228 ]

     Source : <0x00302220> [ execve05 + 0x21e0 ]

   8 Target : <0x003021f4> [ execve05 + 0x21b4 ]

     Source : <0x003021e2> [ execve05 + 0x21a2 ]

   9 Target : <0x003021cc> [ execve05 + 0x218c ]

     Source : <0x0030217e> [ execve05 + 0x213e ]

  10 Target : <0x00302174> [ execve05 + 0x2134 ]

     Source : <0x0030215c> [ execve05 + 0x211c ]

  11 Target : <0x0030215c> [ execve05 + 0x211c ]

     Source : <0x00303708> [ execve05 + 0x36c8 ]

  12 Target : <0x00303704> [ execve05 + 0x36c4 ]

     Source : <0x003037a2> [ execve05 + 0x3762 ]

  13 Target : <0x00303788> [ execve05 + 0x3748 ]

     Source : <0x00303dc0> [ execve05 + 0x3d80 ]

  14 Target : <0x00303db8> [ execve05 + 0x3d78 ]

     Source : <0x00303da6> [ execve05 + 0x3d66 ]

  15 Target : <0x00303da0> [ execve05 + 0x3d60 ]

     Source : <0x00303c18> [ execve05 + 0x3bd8 ]

Stack from 03797f04:

        00311f74 ffa006c8 0015da50 0015da50 0015da48 00000000 0030013c

001828b2

        0030c414 00000030 00062021 00000000 03798000 0030c414 0030c414

0030286c

        0030c414 02003004 00304021 00304cf9 00304020 00304cf6 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00311f74 003113bc 00311ba8 00311bb8 00309b24

0030c414

 

Call Trace:

 

Illegal instruction

--

 

I use 08r1 branch head kernel with trunk toolchain:

Some passed, some crashed

 

and 08r1 branch head kernel with 08r1 release toolchain, this test failed too:

--

root:/> while /execve05 -F /test3 ; do :; done

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

execve05    1  PASS  :  call generated expected ETXTBSY error

NULL pointer access (probably)

Defered Exception context

CURRENT PROCESS:

COMM=test3 PID=133

TEXT = 0x00158040-0x00158fc0        DATA = 0x00158fc4-0x00159194

BSS = 0x00159194-0x001593e4  USER-STACK = 0x0015afe8

 

return address: [0x00158e66]; contents of:

0x00158e40:  0000  0528  0010  434b  c682  8043  5603  c682

0x00158e50:  8280  e146  7efe  e147  8101  3212  5748  e106

0x00158e60:  feff  e107  0100 [9012] 5032  43d1  5808  5438

0x00158e70:  0c00  1408  5815  5070  43c0  5841  5479  0c01

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00002027  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x0

  EXCAUSE   : 0x27

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00158000> [ test3 + 0x0 ]

RETX: <0x00158e66> [ test3 + 0xe26 ]

RETS: <0x00158c08> [ test3 + 0xbc8 ]

PC  : <0x00158e66> [ test3 + 0xe26 ]

DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x00158e66> [ test3 + 0xe26 ]

 

PROCESSOR STATE:

R0 : 00002f2f    R1 : 2f2f0000    R2 : 00000000    R3 : 0000002f

R4 : 00158140    R5 : 2f2f2f2f    R6 : 7efefeff    R7 : 81010100

P0 : 0015af61    P1 : 00000003    P2 : 00000000    P3 : 0015afec

P4 : 0016c924    P5 : 00158fc4    FP : 0015af6c    SP : 00157f24

LB0: 00158acd    LT0: 00158acc    LC0: 00000000

LB1: 00312281    LT1: 0031227a    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 0015af01

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00172f70

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 0015af6c  ASTAT: 02002020

 

Hardware Trace:

   0 Target : <0x000048b4> { _trap_c + 0x0 }

     Source : <0xffa00774> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa006c0> { _exception_to_level5 + 0x0 }

     Source : <0xffa0061c> { _ex_trap_c + 0x5c }

   2 Target : <0xffa005c0> { _ex_trap_c + 0x0 }

     Source : <0xffa0044a> { _ex_workaround_261 + 0x22 }

   3 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }

     Source : <0xffa00814> { _trap + 0x28 }

   4 Target : <0xffa007ec> { _trap + 0x0 }

     Source : <0xffa00562> { _bfin_return_from_exception + 0xe }

   5 Target : <0xffa00554> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa0043a> { _ex_workaround_261 + 0x12 }

   6 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }

     Source : <0xffa00814> { _trap + 0x28 }

   7 Target : <0xffa007ec> { _trap + 0x0 }

     Source : <0x00158e62> [ test3 + 0xe22 ]

   8 Target : <0x00158e46> [ test3 + 0xe06 ]

     Source : <0x00158e16> [ test3 + 0xdd6 ]

   9 Target : <0x00158e08> [ test3 + 0xdc8 ]

     Source : <0x00158c04> [ test3 + 0xbc4 ]

  10 Target : <0x00158c00> [ test3 + 0xbc0 ]

     Source : <0x00158bf8> [ test3 + 0xbb8 ]

  11 Target : <0x00158be8> [ test3 + 0xba8 ]

     Source : <0x0015873a> [ test3 + 0x6fa ]

  12 Target : <0x0015871e> [ test3 + 0x6de ]

     Source : <0x00158210> [ test3 + 0x1d0 ]

  13 Target : <0x001581fe> [ test3 + 0x1be ]

     Source : <0x00158554> [ test3 + 0x514 ]

  14 Target : <0x0015854c> [ test3 + 0x50c ]

     Source : <0x001585a4> [ test3 + 0x564 ]

  15 Target : <0x0015859c> [ test3 + 0x55c ]

     Source : <0x00158ace> [ test3 + 0xa8e ]

Stack from 00157f04:

        00000000 ffa00778 0013456c 0013456c 00134568 0015af60 00158140

0015883c

        00158e66 00000030 00002027 00000000 00158000 00158e66 00158e66

00158c08

        00002f2f 02002020 00312281 00158acd 0031227a 00158acc 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00172f70 0015af01 0015af6c 0015af6c 00158fc4

0016c924

 

Call Trace:

[<00002f2f>] _do_signal+0x2cb/0xdac

[<00002f2f>] _do_signal+0x2cb/0xdac

 

NULL pointer access (probably)

Defered Exception context

CURRENT PROCESS:

COMM=test3 PID=136

TEXT = 0x00158040-0x00158fc0        DATA = 0x00158fc4-0x00159194

BSS = 0x00159194-0x001593e4  USER-STACK = 0x0015afe8

 

return address: [0x00158e66]; contents of:

0x00158e40:  0000  0528  0010  434b  c682  8043  5603  c682

0x00158e50:  8280  e146  7efe  e147  8101  3212  5748  e106

0x00158e60:  feff  e107  0100 [9012] 5032  43d1  5808  5438

0x00158e70:  0c00  1408  5815  5070  43c0  5841  5479  0c01

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00062027  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x18

  EXCAUSE   : 0x27

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00154000> { _tcp_init + 0x54 }

RETX: <0x00158e66> [ test3 + 0xe26 ]

RETS: <0x00158c08> [ test3 + 0xbc8 ]

PC  : <0x00158e66> [ test3 + 0xe26 ]

DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x00158e66> [ test3 + 0xe26 ]

 

PROCESSOR STATE:

R0 : 00002f2f    R1 : 2f2f0000    R2 : 00000000    R3 : 0000002f

R4 : 00158140    R5 : 2f2f2f2f    R6 : 7efefeff    R7 : 81010100

P0 : 0015af61    P1 : 00000003    P2 : 00000000    P3 : 0015afec

P4 : 0016c924    P5 : 00158fc4    FP : 0015af6c    SP : 00153f24

LB0: 00158acd    LT0: 00158acc    LC0: 00000000

LB1: 00312281    LT1: 0031227a    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 0015af01

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00172f70

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 0015af6c  ASTAT: 02002020

 

Hardware Trace:

   0 Target : <0x000048b4> { _trap_c + 0x0 }

     Source : <0xffa00774> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa006c0> { _exception_to_level5 + 0x0 }

     Source : <0xffa0061c> { _ex_trap_c + 0x5c }

   2 Target : <0xffa005c0> { _ex_trap_c + 0x0 }

     Source : <0xffa0044a> { _ex_workaround_261 + 0x22 }

   3 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }

     Source : <0xffa00814> { _trap + 0x28 }

   4 Target : <0xffa007ec> { _trap + 0x0 }

     Source : <0x00158e62> [ test3 + 0xe22 ]

   5 Target : <0x00158e46> [ test3 + 0xe06 ]

     Source : <0x00158e16> [ test3 + 0xdd6 ]

   6 Target : <0x00158e08> [ test3 + 0xdc8 ]

     Source : <0x00158c04> [ test3 + 0xbc4 ]

   7 Target : <0x00158c00> [ test3 + 0xbc0 ]

     Source : <0x00158bf8> [ test3 + 0xbb8 ]

   8 Target : <0x00158be8> [ test3 + 0xba8 ]

     Source : <0x0015873a> [ test3 + 0x6fa ]

   9 Target : <0x0015871e> [ test3 + 0x6de ]

     Source : <0x00158210> [ test3 + 0x1d0 ]

  10 Target : <0x001581fe> [ test3 + 0x1be ]

     Source : <0x00158554> [ test3 + 0x514 ]

  11 Target : <0x0015854c> [ test3 + 0x50c ]

     Source : <0x001585a4> [ test3 + 0x564 ]

  12 Target : <0x0015859c> [ test3 + 0x55c ]

     Source : <0x00158ace> [ test3 + 0xa8e ]

  13 Target : <0x00158abc> [ test3 + 0xa7c ]

     Source : <0x00158ab8> [ test3 + 0xa78 ]

  14 Target : <0x00158a8c> [ test3 + 0xa4c ]

     Source : <0x00158598> [ test3 + 0x558 ]

  15 Target : <0x00158594> [ test3 + 0x554 ]

     Source : <0x00158b04> [ test3 + 0xac4 ]

Stack from 00153f04:

        00000000 ffa00778 00134570 00134570 00134568 0015af60 00158140

0015883c

        00158e66 00000030 00062027 00000000 00154000 00158e66 00158e66

00158c08

        00002f2f 02002020 00312281 00158acd 0031227a 00158acc 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000

        00000000 00000000 00172f70 0015af01 0015af6c 0015af6c 00158fc4

0016c924

 

Call Trace:

[<00002f2f>] _do_signal+0x2cb/0xdac

[<00002f2f>] _do_signal+0x2cb/0xdac

 

execve05    1  PASS  :  call generated expected ETXTBSY error

--

 

I guess that some uclibc execve bug fixing did not be backported to toolchain

08R1 branch.

 

-Bryan Wu

 

--- Mike Frysinger                                           2008-04-07 04:03:55

all the uclibc exec changes should be in the branch (as well as the last

release)

 

you have the binary/symbols in question ... please decode them.  i dont know

what all the offsets in "test3" are in your dump

 

--- Sonic Zhang                                              2009-01-07 05:34:47

The crash disappears on SVN head. Child process should be dealt with properly

for NOMMU. Fixed.

 

--- Vivi Li                                                  2009-01-08 05:35:08

Patch is checked in latest ltp-full-20081130.

Close this bug.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes