[#4010] sqlite test case have dump info when built in flat format

Document created by Aaronwu Employee on Aug 28, 2013
Version 1Show Document
  • View in full screen mode

[#4010] sqlite test case have dump info when built in flat format

Submitted By: Mingquan Pan

Open Date

2008-04-03 06:36:31     Close Date

2008-04-10 23:53:44

Priority:

Medium     Assignee:

Mingquan Pan

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

N/A

Processor:

N/A     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

08r1-8

App binary format:

N/A     

Summary: sqlite test case have dump info when built in flat format

Details:

 

sqlite test case have dump info when built in flat format.

 

bfin> bootelf

Loading .text @ 0x00001000 (1047840 bytes)

Loading .exit.text.refok @ 0x00100d20 (296 bytes)

Loading .rodata @ 0x00100e60 (241576 bytes)

Loading __ksymtab @ 0x0013be08 (14656 bytes)

Loading __ksymtab_gpl @ 0x0013f748 (4168 bytes)

Loading __ksymtab_strings @ 0x00140790 (45300 bytes)

Loading __param @ 0x0014b884 (340 bytes)

Clearing .bss @ 0x0014b9e0 (54244 bytes)

Loading .data @ 0x00158dc4 (78396 bytes)

Loading .init.text @ 0x0016c000 (83980 bytes)

Loading .init.data @ 0x0018080c (13168 bytes)

Loading .init.setup @ 0x00183b7c (604 bytes)

Loading .initcall.init @ 0x00183dd8 (440 bytes)

Loading .con_initcall.init @ 0x00183f90 (4 bytes)

Loading .init.ramfs @ 0x00183f94 (3364669 bytes)

Loading .text_l1 @ 0xffa00000 (6992 bytes)

sh_addr: FFA00000, p_paddr: 004B96D1

Loading from: 024AD000 to 004B96D1, size: 6992

Loading .data_l1 @ 0xff800000 (192 bytes)

sh_addr: FF800000, p_paddr: 004BB221

Loading from: 024AF000 to 004BB221, size: 192

## Starting application at 0x0016c000 ...

Linux version 2.6.24.4-ADI-2008R2-pre-svn4533 (test@uclinux55-BF533-STAMP) (gcc version 4.1.2 (ADI svn)) #21 Thu Apr 3 01:58:26 MST 2008

console [early_BFuart0] enabled

early printk enabled on early_BFuart0

Warning: limiting memory to 56MB due to hardware anomaly 05000263

Board Memory: 128MB

Kernel Managed Memory: 128MB

Memory map:

  fixedcode = 0x00000400-0x00000490

  text      = 0x00001000-0x00100d20

  rodata    = 0x00100e60-0x0014b9d8

  bss       = 0x0014b9e0-0x00158dc4

  data      = 0x00158dc4-0x0016c000

    stack   = 0x0016a000-0x0016c000

  init      = 0x0016c000-0x004bc000

  available = 0x004bc000-0x037ff000

  DMA Zone  = 0x07f00000-0x08000000

Hardware Trace Active and Enabled

Reset caused by Software reset

Blackfin support (C) 2004-2008 Analog Devices, Inc.

Compiled for ADSP-BF533 Rev 0.3

Blackfin Linux support by   blackfin.uclinux.org/

Processor Speed: 398 MHz core clock and 79 MHz System Clock

Instruction Cache Enabled

Data Cache Enabled (write-through)

Built 1 zonelists in Zone order, mobility grouping off.  Total pages: 14224

Kernel command line: root=/dev/mtdblock0 rw earlyprintk=serial,uart0,57600

Configuring Blackfin Priority Driven Interrupts

PID hash table entries: 256 (order: 8, 1024 bytes)

console handover: boot [early_BFuart0] -> real [ttyBF0]

Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)

Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)

Memory available: 51912k/131072k RAM, (3392k init code, 1023k kernel code, 429k data, 1024k dma, 73292k reserved)

Blackfin Scratchpad data SRAM: 4 KB

Blackfin Data A SRAM: 16 KB (15 KB free)

Blackfin Data B SRAM: 16 KB (16 KB free)

Blackfin Instruction SRAM: 64 KB (57 KB free)

Security Framework initialized

Mount-cache hash table entries: 512

net_namespace: 64 bytes

NET: Registered protocol family 16

Blackfin GPIO Controller

Blackfin DMA Controller

stamp_init(): registering device resources

NET: Registered protocol family 2

IP route cache hash table entries: 1024 (order: 0, 4096 bytes)

TCP established hash table entries: 2048 (order: 2, 16384 bytes)

TCP bind hash table entries: 2048 (order: 1, 8192 bytes)

TCP: Hash tables configured (established 2048 bind 2048)

TCP reno registered

io scheduler noop registered

io scheduler anticipatory registered (default)

io scheduler cfq registered

Serial: Blackfin serial driver

bfin-uart.1: ttyBF0 at MMIO 0xffc00400 (irq = 21) is a BFIN-UART

RAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksize

smc91x.c: v1.1, sep 22 2004 by Nicolas Pitre <nico@cam.org>

eth0: SMC91C11xFD (rev 1) at 20300300 IRQ 40 [nowait]

eth0: Ethernet addr: ba:5f:37:c8:87:b3

bfin-spi bfin-spi.0: Blackfin BF5xx on-chip SPI Controller Driver, Version 1.0, regs_base@ffc00500, dma channel@5

rtc-bfin rtc-bfin: rtc core: registered rtc-bfin as rtc0

bfin-wdt: initialized: timeout=20 sec (nowayout=0)

TCP cubic registered

NET: Registered protocol family 1

NET: Registered protocol family 17

rtc-bfin rtc-bfin: setting system clock to 2034-04-23 02:39:43 UTC (2029372783)

Freeing unused kernel memory: 3392k freed

dma_alloc_init: dma_page @ 0x004b9000 - 256 pages at 0x07f00000

                           _____________________________________

        a8888b.           / Welcome to the uClinux distribution \

       d888888b.         /       _     _                         \

       8P"YP"Y88        /       | |   |_|            __  __ (TM)  |

       8|o||o|88  _____/        | |    _ ____  _   _ \ \/ /       |

       8'    .88       \        | |   | |  _ \| | | | \  /        |

       8`._.' Y8.       \       | |__ | | | | | |_| | /  \        |

      d/      `8b.       \      \____||_|_| |_|\____|/_/\_\       |

     dP   .    Y8b.       \   For embedded processors including   |

    d8:'  "  `::88b        \    the Analog Devices Blackfin      /

   d8"         'Y88b        \___________________________________/

  :8P    '      :888

   8a.   :     _a88P         For further information, check out:

._/"Yaa_:   .| 88P|            -   blackfin.uclinux.org/

\    YP"    `| 8P  `.          -   docs.blackfin.uclinux.org/

/     \.___.d|    .'           -   www.uclinux.org/

`--..__)8888P`._.'  jgs/a:f    -   www.analog.com/blackfin

 

Have a lot of fun...

 

 

BusyBox v1.9.1 (2008-04-02 14:25:31 MST) built-in shell (msh)

Enter 'help' for a list of built-in commands.

 

root:/>

************** STEP 3: Start Sqlite testing

 

sqlite3 wishlist.db < /usr/wishlist.sql

root:/> sqlite3 wishlist.db ".dump"

BEGIN TRANSACTION;NULL pointer access (probably)

Deferred Exception context

CURRENT PROCESS:

COMM=sqlite3 PID=121

TEXT = 0x00280040-0x002c7400        DATA = 0x002c7404-0x002d7074

BSS = 0x002d7074-0x002d9b14  USER-STACK = 0x002dcf68

 

return address: [0x002c0b2a]; contents of:

0x002c0b00:  307f  e3ff  b8c7  67e7  e140  002d  300f  e100

0x002c0b10:  6e20  e300  019b  3228  e140  002d  e100  6e24

0x002c0b20:  e3ff  b694  0c45  180a  b9f0 [9228] 0c45  183d

0x002c0b30:  e801  0000  3045  05b5  0010  e14a  002d  e10a

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00002027  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x0

  EXCAUSE   : 0x27

RETE: <0x00000000> { _run_init_process + 0xfffff000 }

RETN: <0x0018c000> [ sqlite3 + 0x0 ]

RETX: <0x002c0b2a> [ sqlite3 + 0x40aea ]

RETS: <0x002c0b24> [ sqlite3 + 0x40ae4 ]

PC  : <0x002c0b2a> [ sqlite3 + 0x40aea ]

DCPLB_FAULT_ADDR: <0x0000001c> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x002c0b2a> [ sqlite3 + 0x40aea ]

 

PROCESSOR STATE:

R0 : 0000001c    R1 : 00000001    R2 : 00000000    R3 : 00000001

R4 : ffffffff    R5 : 002cf65c    R6 : 0000000f    R7 : 002d9f90

P0 : 002d6e34    P1 : 002d9ff8    P2 : 001abfe0    P3 : 002da1c8

P4 : 0018c150    P5 : 0000001c    FP : 002d9f94    SP : 0018bf24

LB0: 002c0185    LT0: 002c0182    LC0: 00000000

LB1: 0028bd65    LT1: 0028bd5c    LC1: 00000016

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 00000cd4

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00000000

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000026   A0.x: 00000000   A1.w: 00000026   A1.x: 00000000

USP : 002d9f78  ASTAT: 02003005

 

Hardware Trace:

   0 Target : <0x0000467c> { _trap_c + 0x0 }

     Source : <0xffa006cc> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa00618> { _exception_to_level5 + 0x0 }

     Source : <0xffa00574> { _ex_trap_c + 0x5c }

   2 Target : <0xffa00518> { _ex_trap_c + 0x0 }

     Source : <0xffa003a2> { _ex_workaround_261 + 0x22 }

   3 Target : <0xffa00380> { _ex_workaround_261 + 0x0 }

     Source : <0xffa0076c> { _trap + 0x28 }

   4 Target : <0xffa00744> { _trap + 0x0 }

     Source : <0xffa004ba> { _bfin_return_from_exception + 0xe }

   5 Target : <0xffa004ac> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00392> { _ex_workaround_261 + 0x12 }

   6 Target : <0xffa00380> { _ex_workaround_261 + 0x0 }

     Source : <0xffa0076c> { _trap + 0x28 }

   7 Target : <0xffa00744> { _trap + 0x0 }

     Source : <0x002c0b28> [ sqlite3 + 0x40ae8 ]

   8 Target : <0x002c0b24> [ sqlite3 + 0x40ae4 ]

     Source : <0x002b786a> [ sqlite3 + 0x3782a ]

   9 Target : <0x002b7864> [ sqlite3 + 0x37824 ]

     Source : <0x002b7966> [ sqlite3 + 0x37926 ]

  10 Target : <0x002b7964> [ sqlite3 + 0x37924 ]

     Source : <0x002b91ce> [ sqlite3 + 0x3918e ]

  11 Target : <0x002b91c2> [ sqlite3 + 0x39182 ]

     Source : <0x00000428> /* Maybe fixed code section */

  12 Target : <0x00000420> /* Maybe fixed code section */

     Source : <0x002b91c0> [ sqlite3 + 0x39180 ]

  13 Target : <0x002b91bc> [ sqlite3 + 0x3917c ]

     Source : <0x002b9164> [ sqlite3 + 0x39124 ]

  14 Target : <0x002b9150> [ sqlite3 + 0x39110 ]

     Source : <0x002b7960> [ sqlite3 + 0x37920 ]

  15 Target : <0x002b7958> [ sqlite3 + 0x37918 ]

     Source : <0x002b7858> [ sqlite3 + 0x37818 ]

Stack from 0018bf04:

        00000000 ffa006d0 0015b3ac 0015b3ac 0015b3a8 04000021 00000000 002c19c0

        002c0b2a 00000030 00002027 00000000 0018c000 002c0b2a 002c0b2a 002c0b24

        0000001c 02003005 0028bd65 002c0185 0028bd5c 002c0182 00000016 00000000

        00000026 00000000 00000026 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000cd4 002d9f78 002d9f94 0000001c 0018c150

 

Call Trace:

 

 

SIGSEGV

root:/> sqlite_test "foo"

Illegal use of supervisor resource

- Attempted to use a Supervisor register or instruction from User mode.

   Supervisor resources are registers and instructions that are reserved

   for Supervisor use: Supervisor only registers, all MMRs, and Supervisor

   only instructions.

Deferred Exception context

CURRENT PROCESS:

COMM=sqlite_test PID=125

TEXT = 0x00280040-0x002c40a0        DATA = 0x002c40a4-0x002d23f4

BSS = 0x002d23f4-0x002d4cf4  USER-STACK = 0x002d7f74

 

return address: [0x00000818]; contents of:

0x000007f0:  0000  0000  0000  0000  0000  0000  0000  0000

0x00000800:  0000  0000  0000  0000  0000  0000  0000  0000

0x00000810:  0000  0000  0000  0000 [0098] 0000  008c  0000

0x00000820:  0000  0000  c984  0018  0000  0000  0000  0000

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0006202e  IPEND: 0030  SYSCFG: 0006

  HWERRCAUSE: 0x18

  EXCAUSE   : 0x2e

RETE: <0x00000000> { _run_init_process + 0xfffff000 }

RETN: <0x0018c000> /* unknown address */

RETX: <0x00000818> /* Maybe null pointer? */

RETS: <0x002b63a0> [ sqlite_test + 0x36360 ]

PC  : <0x00000818> /* Maybe null pointer? */

DCPLB_FAULT_ADDR: <0x002d22d0> [ sqlite_test + 0x522d0 ]

ICPLB_FAULT_ADDR: <0x00000818> /* Maybe null pointer? */

 

PROCESSOR STATE:

R0 : 002d22d0    R1 : 00000000    R2 : 00000001    R3 : 00000008

R4 : 00280408    R5 : 00000002    R6 : 002d22d0    R7 : 00000000

P0 : 002d22d0    P1 : 002d1ba4    P2 : 00000420    P3 : 002d1f74

P4 : 002d7dd0    P5 : 002d1ba4    FP : 002d7d34    SP : 0018bf24

LB0: 002bcb59    LT0: 002bcb58    LC0: 00000000

LB1: 00411d01    LT1: 00411cfa    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 002d7e54

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 030f6004

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 002d7d24  ASTAT: 02003025

 

Hardware Trace:

   0 Target : <0x0000467c> { _trap_c + 0x0 }

     Source : <0xffa006cc> { _exception_to_level5 + 0xb4 }

   1 Target : <0xffa00618> { _exception_to_level5 + 0x0 }

     Source : <0xffa00574> { _ex_trap_c + 0x5c }

   2 Target : <0xffa00518> { _ex_trap_c + 0x0 }

     Source : <0xffa0076c> { _trap + 0x28 }

   3 Target : <0xffa00744> { _trap + 0x0 }

     Source : <0x00000816> /* Maybe null pointer? */

   4 Target : <0x00000420> /* Maybe fixed code section */

     Source : <0x002b639e> [ sqlite_test + 0x3635e ]

   5 Target : <0x002b6384> [ sqlite_test + 0x36344 ]

     Source : <0x002b4e86> [ sqlite_test + 0x34e46 ]

   6 Target : <0x002b4e80> [ sqlite_test + 0x34e40 ]

     Source : <0x002b4f14> [ sqlite_test + 0x34ed4 ]

   7 Target : <0x002b4efa> [ sqlite_test + 0x34eba ]

     Source : <0x002b4e54> [ sqlite_test + 0x34e14 ]

   8 Target : <0x002b4e40> [ sqlite_test + 0x34e00 ]

     Source : <0x002b4e28> [ sqlite_test + 0x34de8 ]

   9 Target : <0x002b4e1c> [ sqlite_test + 0x34ddc ]

     Source : <0x002c1488> [ sqlite_test + 0x41448 ]

  10 Target : <0x002c1474> [ sqlite_test + 0x41434 ]

     Source : <0x002b7f62> [ sqlite_test + 0x37f22 ]

  11 Target : <0x002b7f54> [ sqlite_test + 0x37f14 ]

     Source : <0x002b7f4a> [ sqlite_test + 0x37f0a ]

  12 Target : <0x002b7f3a> [ sqlite_test + 0x37efa ]

     Source : <0x002b7f14> [ sqlite_test + 0x37ed4 ]

  13 Target : <0x002b7edc> [ sqlite_test + 0x37e9c ]

     Source : <0x002c1470> [ sqlite_test + 0x41430 ]

  14 Target : <0x002c1454> [ sqlite_test + 0x41414 ]

     Source : <0x002bdc06> [ sqlite_test + 0x3dbc6 ]

  15 Target : <0x002bdbfc> [ sqlite_test + 0x3dbbc ]

     Source : <0x002b7128> [ sqlite_test + 0x370e8 ]

Stack from 0018bf04:

        00000002 ffa006d0 0015b3b0 0015b3b0 0015b3a8 00000008 00280408 002bb1ca

        00000818 00000030 0006202e 00000000 0018c000 00000818 00000818 002b63a0

        002d22d0 02003025 00411d01 002bcb59 00411cfa 002bcb58 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 030f6004 002d7e54 002d7d24 002d7d34 002d1ba4 002d7dd0

 

Call Trace:

 

Illegal instruction

root:/>

 

Follow-ups

 

--- Sonic Zhang                                              2008-04-10 03:50:10

Please enlarge the stack size and try again.

 

--- Mingquan Pan                                             2008-04-10 23:53:44

Yes,it is ok now by enlarge it stack size.Close.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes