[#5767] In 09r1.1 branch, all ltp test cases show stack overflow in bf561 SMP kernel

Document created by Aaronwu Employee on Sep 5, 2013
Version 1Show Document
  • View in full screen mode

[#5767] In 09r1.1 branch, all ltp test cases show stack overflow in bf561 SMP kernel

Submitted By: Vivi Li

Open Date

2009-12-11 01:51:58     Close Date

2009-12-13 22:38:56

Priority:

Medium High     Assignee:

Graf Yang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

N/A     Board:

EZKIT Lite

Processor:

BF561     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Rejected

Uboot version or rev.:

    Toolchain version or rev.:

09r1.1-rc2

App binary format:

N/A     

Summary: In 09r1.1 branch, all ltp test cases show stack overflow in bf561 SMP kernel

Details:

 

In 09r1.1 branch, all ltp test case will show stack overflow in bf561 SMP kernel.

BF561-EZKIT NON-SMP kernel is fine.

 

I changed stack size to 65535 and build ltp test case with following command. And it still failed.

--

bfin-uclinux-gcc -Wall -D__uClinux__ -Dlinux -DUCLINUX -mstack-check-l1 -I../../include -g -Wall -I../../../../include -Wall  -Wl,-elf2flt="-s 65535" -static  access01.c  -L../../../../lib -lltp -o access01

--

 

--

root:/> access01

Application stack overflow

- Please increase the stack size of the application using elf2flt -s option,

   and/or reduce the stack use of the application.

Deferred Exception context

CURRENT PROCESS:

COMM=access01 PID=146

CPU = 0

TEXT = 0x00280040-0x0028b020        DATA = 0x0028b040-0x0028dcf4

BSS = 0x0028dcf4-0x00292c30  USER-STACK = 0x002a2f80

 

return address: [0x00280150]; contents of:

0x00280130:  e800  0003  e801  0000  0010  0000  305a  e14a

0x00280140:  ffb0  e10a  0000  9152  6dc2  08d6  1402  00a3

0x00280150: [3213] 0568  e800  0009  b178  b1b9  e14a  0028

0x00280160:  e10a  d988  9110  e14a  0028  e10a  d944  9310

 

ADSP-BF561-0.5 600(MHz CCLK) 100(MHz SCLK) (mpu off)

Linux version 2.6.28.10-ADI-2009R1.1-svn7942

Built with gcc version 4.1.2 (ADI svn)

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00062003  IPEND: 0030  SYSCFG: 0006

  EXCAUSE   : 0x3

  interrupts disabled

  physical IVG5 asserted : <0x0000a03c> { _evt_ivhw + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x00500000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x002879dc> [ access01 + 0x799c ]

PC  : <0x00280150> [ access01 + 0x110 ]

DCPLB_FAULT_ADDR: <0xffb00000> /* kernel dynamic memory */

ICPLB_FAULT_ADDR: <0x00280150> [ access01 + 0x110 ]

 

PROCESSOR STATE:

R0 : 00000001    R1 : 002a2f84    R2 : 002a2f8c    R3 : 0028013c

R4 : 00000001    R5 : 0028afe4    R6 : 0028ec5c    R7 : 00000000

P0 : 002a2ef9    P1 : 0028ec5c    P2 : 746f6faa    P3 : 002a2f84

P4 : 0028dcf0    P5 : 0028b040    FP : 002a2f40    SP : 004fff24

LB0: 00285d6d    LT0: 00285d6c    LC0: 00000000

LB1: 001921a5    LT1: 0019219e    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 002a2e99

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 0067e150

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 002a2f34  ASTAT: 02003025

 

Hardware Trace:

   0 Target : <0x000052b8> { _trap_c + 0x0 }

     Source : <0x000099f2> { _exception_to_level5 + 0xbe } CALL pcrel

   1 Target : <0x000099b6> { _exception_to_level5 + 0x82 }

     Source : <0x000099b2> { _exception_to_level5 + 0x7e } IF !CC JUMP

   2 Target : <0x00009934> { _exception_to_level5 + 0x0 }

     Source : <0x000097e0> { _bfin_return_from_exception + 0x18 } RTX

   3 Target : <0x000097c8> { _bfin_return_from_exception + 0x0 }

     Source : <0x0000988e> { _ex_trap_c + 0x7e } JUMP.S

   4 Target : <0x0000984a> { _ex_trap_c + 0x3a }

     Source : <0x00009846> { _ex_trap_c + 0x36 } IF !CC JUMP

   5 Target : <0x00009810> { _ex_trap_c + 0x0 }

     Source : <0x00009b18> { _trap + 0xb4 } JUMP (P4)

   6 Target : <0x00009ad8> { _trap + 0x74 }

     Source : <0x00009ad4> { _trap + 0x70 } IF !CC JUMP

   7 Target : <0x00009ac0> { _trap + 0x5c }

     Source : <0x00009abc> { _trap + 0x58 } IF !CC JUMP

   8 Target : <0x00009aaa> { _trap + 0x46 }

     Source : <0x00009aa4> { _trap + 0x40 } IF !CC JUMP

   9 Target : <0x00009a9a> { _trap + 0x36 }

     Source : <0x00009a88> { _trap + 0x24 } IF !CC JUMP

  10 Target : <0x00009a64> { _trap + 0x0 }

     Source : <0x0028014e> [ access01 + 0x10e ] EXCPT 0x3

  11 Target : <0x0028013c> [ access01 + 0xfc ]

     Source : <0x002879da> [ access01 + 0x799a ] CALL (P2)

  12 Target : <0x002879d0> [ access01 + 0x7990 ]

     Source : <0x002879c2> [ access01 + 0x7982 ] IF !CC JUMP

  13 Target : <0x002879b2> [ access01 + 0x7972 ]

     Source : <0x00284490> [ access01 + 0x4450 ] RTS

  14 Target : <0x00284480> [ access01 + 0x4440 ]

     Source : <0x002879b0> [ access01 + 0x7970 ] CALL (P2)

  15 Target : <0x002879a0> [ access01 + 0x7960 ]

     Source : <0x0028798c> [ access01 + 0x794c ] IF !CC JUMP

Userspace Stack

Stack info:

SP: [0x002a2f34] <0x002a2f34> [ access01 + 0x22f34 ]

FP: (0x002a2f2c)

Memory from 0x002a2f30 to 002a3000

002a2f30:<002879b2>[00000000] 00000000  00000000  00000000 <001a27dc> 0028b040  006fc004

002a2f50: 007003c0  00000000  007003a4  00700354  00000001  0028013c  00000000  00000000

002a2f70: 0028afe4  0028aff6  00000000  006fc783  00000001  002a2fa2  00000000  002a2fab

002a2f90: 002a2fb2  002a2fc0  002a2fe3  00000000  63610000  73736563  48003130  3d454d4f

002a2fb0: 4853002f  3d4c4c45  6e69622f  0068732f  48544150  69622f3d  752f3a6e  622f7273

002a2fd0: 2f3a6e69  6e696273  73752f3a  62732f72  54006e69  3d4d5245  756e696c  622f0078

002a2ff0: 612f6e69  73656363  00313073  00000000

Return addresses in stack:

    address : <0x002879b2> [ access01 + 0x7972 ]

    address : <0x001a27dc> [ sh + 0x227dc ]

SIGSEGV

root:/>

--

 

Follow-ups

 

--- Graf Yang                                                2009-12-11 05:18:50

Please remove -mstack-check-l1 from the ltp make file.

SMP not support stack check through L1 scratchpad.

 

--- Vivi Li                                                  2009-12-13 22:38:56

The smp related patch is not applied after run_kernel_test is updated, so ltp

will fail.

Patch is applied and test scripts are modified.

So close it.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes