[#4215] [ltp] ltp test cases will crash occasionally in SMP kernel

Document created by Aaronwu Employee on Aug 29, 2013
Version 1Show Document
  • View in full screen mode

[#4215] [ltp] ltp test cases will crash occasionally in SMP kernel

Submitted By: Vivi Li

Open Date

2008-07-02 05:44:54     Close Date

2008-07-28 06:47:35

Priority:

Medium High     Assignee:

Graf Yang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

N/A

Processor:

N/A     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Rejected

Uboot version or rev.:

    Toolchain version or rev.:

08r1.5 branch, svn 2660

App binary format:

N/A     

Summary: [ltp] ltp test cases will crash occasionally in SMP kernel

Details:

 

LTP cases will crash from time to time in SMP kernel. But I can't reproduce these crashes manually.

 

Cases that ever crashed are rename09, mkdir02 and mkdir04.

 

--

root:/bin> rename09

getpNULmL pointer access (probably) from 0x003a3306 on CPU0^M

:DSucefesrerendm 09  E 1  xROK  c  geepwnap() ftileion context^M

CURRENT PROCESS:^M

COMM=rename09 PID=332^M

CPU = 0^M

TEXT = 0x003a0040-0x003ab360        DATA = 0x003ab364-0x003ae144^M

BSS = 0x003ae144-0x003b34a4  USER-STACK = 0x003bbf7c^M

^M

return address: [0x003a3306]; contents of:^M

0x003a32e0:  e300  0adc  e142  003a  e102  c7e4  6010  6001 ^M

0x003a32f0:  e3ff  f9f0  60e0  e300  19bf  bbe0  b9e0  b9f1 ^M

0x003a3300:  3208  3401  6832 [9c00] e0b2  2002  c803  1800 ^M

0x003a3310:  9208  9c00  9208  b9e0  e801  0000  0010  0000 ^M

 

SEQUENCER STATUS:               Not tainted^M

SEQSTAT: 00000027  IPEND: 0030  SYSCFG: 0036^M

  HWERRCAUSE: 0x0^M

  EXCAUSE   : 0x27^M

RETE: <0x00000000> /* Maybe null pointer? */^M

RETN: <0x003d6000> /* unknown address */^M

RETX: <0x003a3306> [ rename09 + 0x32c6 ]^M

RETS: <0x003a32fa> [ rename09 + 0x32ba ]^M

PC  : <0x003a3306> [ rename09 + 0x32c6 ]^M

DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */^M

ICPLB_FAULT_ADDR: <0x003a3306> [ rename09 + 0x32c6 ]^M

^M

PROCESSOR STATE:^M

R0 : 003ae028    R1 : 00000000    R2 : 00000020    R3 : 003ae0e4^M

R4 : 003a0140    R5 : 00000001    R6 : 003af1c8    R7 : 00000000^M

P0 : 00000004    P1 : 003ae028    P2 : 00000006    P3 : 003bbf80^M

P4 : 003ae144    P5 : 003ab364    FP : 003bbecc    SP : 003d5f24^M

LB0: 003a5fa1    LT0: 003a5f9e    LC0: 00000000^M

LB1: 003a52ed    LT1: 003a52ec    LC1: 00000000^M

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 00000000^M

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 003bbf80^M

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000^M

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000^M

A0.w: 00000022   A0.x: 00000000   A1.w: 00000022   A1.x: 00000000^M

USP : 003bbeb8  ASTAT: 02000000^M

 

Hardware Trace:^M

   0 Target : <0x00004f5c> { _trap_c + 0x0 }^M

     Source : <0x00009d48> { _exception_to_level5 + 0xc0 }^M

   1 Target : <0x00009d08> { _exception_to_level5 + 0x80 }^M

     Source : <0x00009cfe> { _exception_to_level5 + 0x76 }^M

   2 Target : <0x00009c88> { _exception_to_level5 + 0x0 }^M

     Source : <0x00009be0> { _ex_trap_c + 0x68 }^M

   3 Target : <0x00009bba> { _ex_trap_c + 0x42 }^M

     Source : <0x00009bb0> { _ex_trap_c + 0x38 }^M

   4 Target : <0x00009b78> { _ex_trap_c + 0x0 }^M

     Source : <0x00009912> { _ex_workaround_261 + 0x3a }^M

   5 Target : <0x000098fa> { _ex_workaround_261 + 0x22 }^M

     Source : <0x000098f0> { _ex_workaround_261 + 0x18 }^M

   6 Target : <0x000098d8> { _ex_workaround_261 + 0x0 }^M

     Source : <0x00009e14> { _trap + 0x64 }^M

   7 Target : <0x00009df4> { _trap + 0x44 }^M

     Source : <0x00009de4> { _trap + 0x34 }^M

   8 Target : <0x00009db0> { _trap + 0x0 }^M

     Source : <0x00009b1a> { _bfin_return_from_exception + 0xe }^M

   9 Target : <0x00009b0c> { _bfin_return_from_exception + 0x0 }^M

     Source : <0x00009902> { _ex_workaround_261 + 0x2a }^M

  10 Target : <0x000098fa> { _ex_workaround_261 + 0x22 }^M

     Source : <0x000098f0> { _ex_workaround_261 + 0x18 }^M

  11 Target : <0x000098d8> { _ex_workaround_261 + 0x0 }^M

     Source : <0x00009e14> { _trap + 0x64 }^M

  12 Target : <0x00009df4> { _trap + 0x44 }^M

     Source : <0x00009de4> { _trap + 0x34 }^M

  13 Target : <0x00009db0> { _trap + 0x0 }^M

     Source : <0x003a3304> [ rename09 + 0x32c4 ]^M

  14 Target : <0x003a32fa> [ rename09 + 0x32ba ]^M

     Source : <0x003a66c8> [ rename09 + 0x6688 ]^M

  15 Target : <0x003a66b4> [ rename09 + 0x6674 ]^M

     Source : <0x003a7b6c> [ rename09 + 0x7b2c ]^M

Stack from 003d5f04:

        00000000 00009d4c ffb00028 ffb00028 ffb00024 0a0a0a0a 00000029 003aa47e

        003a3306 00000030 00000027 00000000 003d6000 003a3306 003a3306 003a32fa

        003ae028 02000000 003a52ed 003a5fa1 003a52ec 003a5f9e 00000000 00000000

        00000022 00000000 00000022 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 003bbf80 00000000 003bbeb8 003bbecc 003ab364 003ae144

Call Trace:

 

root:/bin>

--

 

--

root:/bin> mkdir02

getpwnNULL pointer access (probably) from 0x00ac31f6 on CPU0

: SDecessf

mkder02 r   1e BROKd :  etpwEam()xfailec

eption context

CURRENT PROCESS:

COMM=mkdir02 PID=146

CPU = 0

TEXT = 0x00ac0040-0x00acb1e0        DATA = 0x00acb1e4-0x00ace0e4

BSS = 0x00ace0e4-0x00ad3104  USER-STACK = 0x00adbf7c

 

return address: [0x00ac31f6]; contents of:^M

0x00ac31d0:  e300  0abe  e142  00ac  e102  c78c  6010  6001

0x00ac31e0:  e3ff  f9f0  60e0  e300  19a1  bbe0  b9e0  b9f1

0x00ac31f0:  3208  3401  6832 [9c00] e0b2  2002  c803  1800

0x00ac3200:  9208  9c00  9208  b9e0  e801  0000  0010  0000

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00000027  IPEND: 0030  SYSCFG: 0036

  HWERRCAUSE: 0x0

  EXCAUSE   : 0x27

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00a6e000> /* unknown address */

RETX: <0x00ac31f6> [ mkdir02 + 0x31b6 ]

RETS: <0x00ac31ea> [ mkdir02 + 0x31aa ]

PC  : <0x00ac31f6> [ mkdir02 + 0x31b6 ]

DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x00ac31f6> [ mkdir02 + 0x31b6 ]

 

PROCESSOR STATE:

R0 : 00acdfc8    R1 : 00000000    R2 : 00000020    R3 : 00ace084

R4 : 00ac0140    R5 : 00000001    R6 : 00acf168    R7 : 00000000

P0 : 00000004    P1 : 00acdfc8    P2 : 00000006    P3 : 00adbf80

P4 : 00ace0e4    P5 : 00acb1e4    FP : 00adbe38    SP : 00a6df24

LB0: 00ac5e55    LT0: 00ac5e52    LC0: 00000000

LB1: 00ac51a1    LT1: 00ac51a0    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 00000000

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00adbf80

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000014   A0.x: 00000000   A1.w: 00000014   A1.x: 00000000

USP : 00adbe24  ASTAT: 02000000

 

Hardware Trace:

   0 Target : <0x00004f5c> { _trap_c + 0x0 }

     Source : <0x00009d50> { _exception_to_level5 + 0xc0 }

   1 Target : <0x00009d10> { _exception_to_level5 + 0x80 }

     Source : <0x00009d06> { _exception_to_level5 + 0x76 }

   2 Target : <0x00009c90> { _exception_to_level5 + 0x0 }

     Source : <0x00009be8> { _ex_trap_c + 0x68 }^M

   3 Target : <0x00009bc2> { _ex_trap_c + 0x42 }^M

     Source : <0x00009bb8> { _ex_trap_c + 0x38 }^M

   4 Target : <0x00009b80> { _ex_trap_c + 0x0 }^M

     Source : <0x0000991a> { _ex_workaround_261 + 0x3a }^M

   5 Target : <0x00009902> { _ex_workaround_261 + 0x22 }^M

     Source : <0x000098f8> { _ex_workaround_261 + 0x18 }^M

   6 Target : <0x000098e0> { _ex_workaround_261 + 0x0 }^M

     Source : <0x00009e1c> { _trap + 0x64 }^M

   7 Target : <0x00009dfc> { _trap + 0x44 }^M

     Source : <0x00009dec> { _trap + 0x34 }^M

   8 Target : <0x00009db8> { _trap + 0x0 }^M

     Source : <0x00009b22> { _bfin_return_from_exception + 0xe }^M

   9 Target : <0x00009b14> { _bfin_return_from_exception + 0x0 }^M

     Source : <0x0000990a> { _ex_workaround_261 + 0x2a }^M

  10 Target : <0x00009902> { _ex_workaround_261 + 0x22 }^M

     Source : <0x000098f8> { _ex_workaround_261 + 0x18 }^M

  11 Target : <0x000098e0> { _ex_workaround_261 + 0x0 }^M

     Source : <0x00009e1c> { _trap + 0x64 }^M

  12 Target : <0x00009dfc> { _trap + 0x44 }^M

     Source : <0x00009dec> { _trap + 0x34 }^M

  13 Target : <0x00009db8> { _trap + 0x0 }^M

     Source : <0x00ac31f4> [ mkdir02 + 0x31b4 ]^M

  14 Target : <0x00ac31ea> [ mkdir02 + 0x31aa ]^M

     Source : <0x00ac657c> [ mkdir02 + 0x653c ]^M

  15 Target : <0x00ac6568> [ mkdir02 + 0x6528 ]^M

     Source : <0x00ac7a20> [ mkdir02 + 0x79e0 ]^M

Stack from 00a6df04:

        00000000 00009d54 ffb00028 ffb00028 ffb00024 0a0a0a0a 00000029 00aca2ee

        00ac31f6 00000030 00000027 00000000 00a6e000 00ac31f6 00ac31f6 00ac31ea

        00acdfc8 02000000 00ac51a1 00ac5e55 00ac51a0 00ac5e52 00000000 00000000

        00000014 00000000 00000014 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00adbf80 00000000 00adbe24 00adbe38 00acb1e4 00ace0e4

 

Call Trace:

 

root:/bin>

--

 

--

root:/bin> mkdir04

getpwNULL pointer access (probably) from 0x00ae30fe on CPU1

: SDccese

mkfir04e    r  BReK  d  ge pwnaE() fxilce

ption context

CURRENT PROCESS:

COMM=mkdir04 PID=157

CPU = 1

TEXT = 0x00ae0040-0x00aeb0a0        DATA = 0x00aeb0a4-0x00aede84

BSS = 0x00aede84-0x00af2eb4  USER-STACK = 0x00afaf7c

 

rd /bin

eturn address: [0x00ae30fe]; contents of:

0x00ae30d0:  e140  00ae  e100  c514  e300  0a84  e142  00ae ^M

0x00ae30e0:  e102  c520  6010  6001  e3ff  f9f0  60e0  e300 ^M

0x00ae30f0:  1967  bbe0  b9e0  b9f1  3208  3401  6832 [9c00]^M

0x00ae3100:  e0b2  2002  c803  1800  9208  9c00  9208  b9e0 ^M

^M

SEQUENCER STATUS:               Not tainted^M

SEQSTAT: 00000027  IPEND: 0030  SYSCFG: 0036^M

  HWERRCAUSE: 0x0^M

  EXCAUSE   : 0x27^M

RETE: <0x00000000> /* Maybe null pointer? */^M

RETN: <0x00a6e000> /* unknown address */^M

RETX: <0x00ae30fe> [ mkdir04 + 0x30be ]^M

RETS: <0x00ae30f2> [ mkdir04 + 0x30b2 ]^M

PC  : <0x00ae30fe> [ mkdir04 + 0x30be ]

DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */^M

ICPLB_FAULT_ADDR: <0x00ae30fe> [ mkdir04 + 0x30be ]^M

^M

PROCESSOR STATE:^M

R0 : 00aedd64    R1 : 00000000    R2 : 00000020    R3 : 00aede20^M

R4 : 00ae0140    R5 : 00000001    R6 : 00aeef08    R7 : 00000000^M

P0 : 00000004    P1 : 00aedd64    P2 : 00000006    P3 : 00afaf80^M

P4 : 00aede80    P5 : 00aeb0a4    FP : 00afaee8    SP : 00a6df24^M

LB0: 00ae5ce9    LT0: 00ae5ce6    LC0: 00000000^M

LB1: 00ae5035    LT1: 00ae5034    LC1: 00000000^M

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 00000000^M

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00afaf80^M

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000^M

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000^M

A0.w: 00000015   A0.x: 00000000   A1.w: 00000015   A1.x: 00000000^M

USP : 00afaed4  ASTAT: 02000000^M

^M

Hardware Trace:

Stack from 00a6df04:

        00000000 00009d54 ff700028 ff700028 ff700024 0a0a0a0a 00000029 00aea1c6

        00ae30fe 00000030 00000027 00000000 00a6e000 00ae30fe 00ae30fe 00ae30f2

        00aedd64 02000000 00ae5035 00ae5ce9 00ae5034 00ae5ce6 00000000 00000000

        00000015 00000000 00000015 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

        00000000 00000000 00afaf80 00000000 00afaed4 00afaee8 00aeb0a4 00aede80

 

Call Trace:

 

root:/bin>

--

 

Follow-ups

 

--- Graf Yang                                                2008-07-08 23:53:24

Please check /etc/passwd, there should be one account named bin, or else

rename09, mkdir02, mkdir04 will crash.

 

--- Graf Yang                                                2008-07-15 03:13:44

It's not the ltp test application bug, please check the file /etc/passwd.

 

--- Vivi Li                                                  2008-07-28 06:47:31

I modified the ltp test script to make sure passwd is copied to /etc.

OK now. Close it.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes