[#4618] [ltp] ltp test case connect01 crashed in trunk

Document created by Aaronwu Employee on Aug 29, 2013
Version 1Show Document
  • View in full screen mode

[#4618] [ltp] ltp test case connect01 crashed in trunk

Submitted By: Vivi Li

Open Date

2008-11-06 22:32:31     Close Date

2008-12-10 18:52:11

Priority:

Medium     Assignee:

Bryan Wu

Bernd Schmidt

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

N/A

Processor:

BF537     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

toolchain-2008_Oct_10

App binary format:

N/A     

Summary: [ltp] ltp test case connect01 crashed in trunk

Details:

 

Kernel panic when run ltp testcase connect01 in trunk on all platform.

 

--

root:/> ./connect01

connect01    1  PNSU L:L  ap oiiendtserrp oa cuccessfuls

Kernel OOPS in progress

Deferred Exception context

CURRENT PROCESS:

COMM=connect01 PID=155

TEXT = 0x00320040-0x0032a440        DATA = 0x0032a444-0x0032cd64

BSS = 0x0032cd64-0x003317f4  USER-STACK = 0x00339f80

 

return address: [0x000e9284]; contents of:

0x000e9260:  1002  5041  5059  030c  1002  5041  5051  030c

0x000e9270:  1002  5041  0000  6040  b1f1  b230  184b  0000

0x000e9280:  0000  0000 [e4a8] 015f  4928  0200  e14d  0016

0x000e9290:  e10d  9b30  a171  3056  b1b0  6482  e428  0032

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00062027  IPEND: 8030  SYSCFG: 0006

  EXCAUSE   : 0x27

  physical IVG15 asserted : <0xffa00dd8> { _evt_system_call + 0x0 }

  logical irq   6 mapped  : <0xffa00398> { _timer_interrupt + 0x0 }

  logical irq  10 mapped  : <0x000b0d20> { _bfin_rtc_interrupt + 0x0 }

  logical irq  18 mapped  : <0x0009e840> { _bfin_serial_dma_rx_int + 0x0 }

  logical irq  19 mapped  : <0x0009e5b0> { _bfin_serial_dma_tx_int + 0x0 }

  logical irq  24 mapped  : <0x000a7b28> { _bfin_mac_interrupt + 0x0 }

RETE: <0x00000000> { _do_one_initcall + 0xfffff000 }

RETN: <0x00357a44> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x000eb442> { _tcp_v4_rcv + 0x26e }

PC  : <0x000e9284> { _tcp_v4_send_reset + 0xcc }

DCPLB_FAULT_ADDR: <0x0000015f> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x0000ffff> { _wait_consider_task + 0x3 }

 

PROCESSOR STATE:

R0 : 00000008    R1 : 160006fe    R2 : 14000600    R3 : 0100007f

R4 : 00000002    R5 : 031ee664    R6 : 00000001    R7 : 0100007f

P0 : 031f3c00    P1 : 031ee678    P2 : 031ee664    P3 : 0100007f

P4 : 031ee678    P5 : 00000000    FP : 00000000    SP : 00357968

LB0: ffa018ac    LT0: ffa018ac    LC0: 00000000

LB1: 000eac54    LT1: 000eac54    LC1: 00000000

B0 : 861fb779    L0 : 00000000    M0 : 00000000    I0 : 0100007f

B1 : 0100007f    L1 : 00000000    M1 : 00000000    I1 : 0100007f

B2 : b37ddee2    L2 : 00000000    M2 : 00000000    I2 : 00000010

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 00339ee4  ASTAT: 02002000

 

Hardware Trace:

   0 Target : <0x00004954> { _trap_c + 0x0 }

     Source : <0xffa00708> { _exception_to_level5 + 0x9c } CALL pcrel

   1 Target : <0xffa0066c> { _exception_to_level5 + 0x0 }

     Source : <0xffa004f6> { _bfin_return_from_exception + 0xe } RTX

   2 Target : <0xffa004e8> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa005c0> { _ex_trap_c + 0x6c } JUMP.S

   3 Target : <0xffa00554> { _ex_trap_c + 0x0 }

     Source : <0xffa003d2> { _ex_workaround_261 + 0x22 } JUMP.S

   4 Target : <0xffa003b0> { _ex_workaround_261 + 0x0 }

     Source : <0xffa0079e> { _trap + 0x36 } JUMP (P4)

   5 Target : <0xffa00784> { _trap + 0x1c }

     Source : <0xffa00780> { _trap + 0x18 } IF !CC JUMP

   6 Target : <0xffa00768> { _trap + 0x0 }

     Source : <0xffa004f6> { _bfin_return_from_exception + 0xe } RTX

   7 Target : <0xffa004e8> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa003c2> { _ex_workaround_261 + 0x12 } IF !CC JUMP

   8 Target : <0xffa003b0> { _ex_workaround_261 + 0x0 }

     Source : <0xffa0079e> { _trap + 0x36 } JUMP (P4)

   9 Target : <0xffa00784> { _trap + 0x1c }

     Source : <0xffa00780> { _trap + 0x18 } IF !CC JUMP

  10 Target : <0xffa00768> { _trap + 0x0 }

     Source : <0x000e9282> { _tcp_v4_send_reset + 0xca } 0x0000

  11 Target : <0x000e9274> { _tcp_v4_send_reset + 0xbc }

     Source : <0x000e9270> { _tcp_v4_send_reset + 0xb8 } IF !CC JUMP

  12 Target : <0x000e926c> { _tcp_v4_send_reset + 0xb4 }

     Source : <0x000e9268> { _tcp_v4_send_reset + 0xb0 } IF !CC JUMP

  13 Target : <0x000e9264> { _tcp_v4_send_reset + 0xac }

     Source : <0x000e9260> { _tcp_v4_send_reset + 0xa8 } IF !CC JUMP

  14 Target : <0x000e9230> { _tcp_v4_send_reset + 0x78 }

     Source : <0x000e9310> { _tcp_v4_send_reset + 0x158 } JUMP.S

  15 Target : <0x000e92c4> { _tcp_v4_send_reset + 0x10c }

     Source : <0x000e9224> { _tcp_v4_send_reset + 0x6c } IF !CC JUMP

 

Kernel Stack

Stack info:

SP: [0x00357f24] <0x00357f24> /* kernel dynamic memory */

Memory from 0x00357f20 to 00358000

00357f20: 00000001 [00325d78] 00008000  00002000  00000000  00358000  00325d78  00325d78

00357f40:<003202ea><ffa00e3c> 02002000  00324985  003256a9  00324984  003256a6  00000000

00357f60: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

00357f80: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

00357fa0: 00000000  00000000  00000000  00339f84  00338ed8  00339ee4  00339ef0  0032a444

00357fc0: 0032cd5c  00339f84  0032c990  ffffffff  0000013c  0032f88c  0032d8d4  00000001

00357fe0: 0032013c  00000004  00000010  0032f88c  00000004  00000004  0000013c  00000006

00358000: 85be412f

Return addresses in stack:

    address : <0x003202ea> [ connect01 + 0x2aa ]

    address : <0xffa00e3c> { _evt_system_call + 0x64 }

Modules linked in:

Kernel panic - not syncing: Kernel exception

--

 

Follow-ups

 

--- Michael Hennerich                                        2008-11-20 05:32:44

Same issue as:

 

[#4623] kernel oops featuring smsc911x_irqhandler when using NFS root

[#4593] random crash in tcp code

 

--- Sonic Zhang                                              2008-11-20 22:55:52

Need to check if it is a bug in TCP/IP stack of this rc kernel. Assign to Bryan

to review after next kernel update.

 

--- Mingquan Pan                                             2008-11-25 02:08:54

Bug [#4596] should also relate to this too.

 

--- Bernd Schmidt                                            2008-12-10 18:52:11

I'm assuming this is fixed by the checksum assembly fix.  Reopen if there's

still a problem.

 

--- Pavel Frolov                                             2009-01-30 08:35:04

We still have the same behaviour (random crashes) - revision 6039

 

NULL pointer access

Kernel OOPS in progress

Deferred Exception context

 

No Valid process in current context

return address: [0x0011ab78]; contents of:

0x0011ab50:  0c45  5079  030c  1002  5041  5059  030c  1002

0x0011ab60:  5041  5051  030c  1002  5041  0000  6040  b1f1

0x0011ab70:  b230  184a  0000  0000 [e4a8] 015f  4928  0200

0x0011ab80:  e14d  001d  e10d  63e8  a171  3056  b1b0  6482

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00060027  IPEND: c030  SYSCFG: 0006

  EXCAUSE   : 0x27

  physical IVG14 asserted : <0xffa00adc> { _evt14_softirq + 0x0 }

  physical IVG15 asserted : <0xffa00e1c> { _evt_system_call + 0x0 }

  logical irq   6 mapped  : <0xffa00388> { _timer_interrupt + 0x0 }

  logical irq  10 mapped  : <0x000ccd78> { _bfin_rtc_interrupt + 0x0

}

  logical irq  12 mapped  : <0x000e7400> { _rx_handler + 0x0 }

  logical irq  13 mapped  : <0x000e73a0> { _tx_handler + 0x0 }

  logical irq  18 mapped  : <0x000b9c88> { _bfin_serial_dma_rx_int +

0x0 }

  logical irq  19 mapped  : <0x000b9a0c> { _bfin_serial_dma_tx_int +

0x0 }

  logical irq  20 mapped  : <0x000b9c88> { _bfin_serial_dma_rx_int +

0x0 }

  logical irq  21 mapped  : <0x000b9a0c> { _bfin_serial_dma_tx_int +

0x0 }

  logical irq  24 mapped  : <0x000c1e84> { _bfin_mac_interrupt + 0x0

}

  logical irq  45 mapped  : <0x000e855c> { _err_handler + 0x0 }

RETE: <0x00000000> { _do_one_initcall + 0xfffff000 }

RETN: <0x001efcec> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x0011cc2c> { _tcp_v4_rcv + 0x218 }

PC  : <0x0011ab78> { _tcp_v4_send_reset + 0xc4 }

DCPLB_FAULT_ADDR: <0x0000015f> /* Maybe null pointer? */

ICPLB_FAULT_ADDR: <0x0011ab78> { _tcp_v4_send_reset + 0xc4 }

 

PROCESSOR STATE:

R0 : 00000008    R1 : 9b71f291    R2 : 14000600    R3 : 710aa8c0

R4 : 00000000    R5 : 00815020    R6 : 00000002    R7 : 166743d1

P0 : 01b720a0    P1 : 00815034    P2 : 00815020    P3 : 00000000

P4 : 00815034    P5 : 00000000    FP : 710aa8c0    SP : 001efc10

LB0: ffa016f4    LT0: ffa016f4    LC0: 00000000

LB1: 000088f6    LT1: 000088f6    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 710aa8c0

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 166743d1

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : ffff3dc9

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 0292f340   A0.x: 00000000   A1.w: 00000dd0   A1.x: 00000000

USP : 001f0000  ASTAT: 02002042

 

Hardware Trace:

   0 Target : <0x0000492c> { _trap_c + 0x0 }

     Source : <0xffa0078a> { _exception_to_level5 + 0x9e } CALL pcrel

   1 Target : <0xffa006ec> { _exception_to_level5 + 0x0 }

     Source : <0xffa00582> { _bfin_return_from_exception + 0x6 } RTX

   2 Target : <0xffa0057c> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00646> { _ex_trap_c + 0x66 } 0x0046

   3 Target : <0xffa005e0> { _ex_trap_c + 0x0 }

     Source : <0xffa00816> { _trap + 0x2a } 0x5f65

   4 Target : <0xffa007ec> { _trap + 0x0 }

     Source : <0x0011ab76> { _tcp_v4_send_reset + 0xc2 } 0x0000

   5 Target : <0x0011ab6a> { _tcp_v4_send_reset + 0xb6 }

     Source : <0x0011ab66> { _tcp_v4_send_reset + 0xb2 } IF !CC JUMP

   6 Target : <0x0011ab62> { _tcp_v4_send_reset + 0xae }

     Source : <0x0011ab5e> { _tcp_v4_send_reset + 0xaa } IF !CC JUMP

   7 Target : <0x0011ab5a> { _tcp_v4_send_reset + 0xa6 }

     Source : <0x0011ab56> { _tcp_v4_send_reset + 0xa2 } IF !CC JUMP

   8 Target : <0x0011aae2> { _tcp_v4_send_reset + 0x2e }

     Source : <0x0011aad8> { _tcp_v4_send_reset + 0x24 } IF !CC JUMP

   9 Target : <0x0011aab4> { _tcp_v4_send_reset + 0x0 }

     Source : <0x0011cc28> { _tcp_v4_rcv + 0x214 } CALL pcrel

  10 Target : <0x0011cc1e> { _tcp_v4_rcv + 0x20a }

     Source : <0x000f0500> { ___skb_checksum_complete + 0x14 } RTS

  11 Target : <0x000f04fa> { ___skb_checksum_complete + 0xe }

     Source : <0x000f04dc> { ___skb_checksum_complete_head + 0x58 }

RTS

  12 Target : <0x000f04b0> { ___skb_checksum_complete_head + 0x2c }

     Source : <0x000f04a2> { ___skb_checksum_complete_head + 0x1e } IF

!CC

JUMP

  13 Target : <0x000f049c> { ___skb_checksum_complete_head + 0x18 }

     Source : <0x000ee17e> { _skb_checksum + 0x196 } RTS

  14 Target : <0x000ee174> { _skb_checksum + 0x18c }

     Source : <0x000ee024> { _skb_checksum + 0x3c } IF !CC JUMP

  15 Target : <0x000ee020> { _skb_checksum + 0x38 }

     Source : <0x0014ff64> { _csum_partial + 0x20 } RTS

 

Kernel Stack

Stack info:

SP: [0x001eff58] <0x001eff58> /* kernel dynamic memory */

FP: (0x001effe8)

Memory from 0x001eff50 to 001f0000

001eff50: 00000000  00000000 [00000000] ffff3dc9  00000000  0000c350

001f0000 

001d993c

001eff70: ffa0025c  001ee000  001c39a4  001d993c  001ee000  ffa00a10

001c3104 

00000000

001eff90: 00000000  00000000  00000065  00000008  004e80a0  0000ffff

0000ffff 

ffa00a10

001effb0: 00000006  00000000  00000000  00000000  001f06be  001ce2a4

00209594 

001c3110

001effd0: 00000000  00209594  001c2e64  00000021  001f00a8

<0020b5e0>(001f0000)<001fe1b6>

001efff0: 00000000  00000000  00000000  ffb00000 (464c457f)

Return addresses in stack:

    address : <0x0020b5e0> [ /lib/libm-0.9.29.so + 0xb5e0 ]

   frame  1 : <0x001fe1b6> { _real_start + 0x6e }

Modules linked in: gpio_keys

Kernel panic - not syncing: Kernel exception                     

              

 

--- Michael Hennerich                                        2009-01-30 09:12:21

Pavel,

 

can you please send me (attach) your

linux-2.6.x/net/ipv4/tcp_ipv4.o object file (svn revision 6039)

 

What toolchain are you using (svn rev, etc.)

 

Best regards,

Michael

 

--- Michael Hennerich                                        2009-01-30 10:03:26

Pavel,

 

also on what processor silicon rev are you running.

What is your development board?

EZKIT/STAMP ?

 

-Michael

 

--- Pavel Frolov                                             2009-01-30 10:36:15

We are using blackfin-toolchain-uclibc-full-08r1-8.i386 and

blackfin-toolchain-08r1-8.i386. Our board is based on bf537-stamp. Processor

revision - 0.2.

 

--- Sonic Zhang                                              2009-02-02 03:13:46

This bug is only fixed in curren SVN trunk and upcoming 2009R1 release. Not in

08R1 release. Please wait for the 09R1 release or back port by yourself.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes