[#5774] [ltp]ltp test case will be killed by oom-killer on bf533-ezkit in 09r1 branch occasionally

Document created by Aaronwu Employee on Sep 5, 2013
Version 1Show Document
  • View in full screen mode

[#5774] [ltp]ltp test case will be killed by oom-killer on bf533-ezkit in 09r1 branch occasionally

Submitted By: Vivi Li

Open Date

2009-12-14 23:27:00     Close Date

2009-12-23 22:48:52

Priority:

Medium High     Assignee:

Graf Yang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

Category:

Tests     Board:

EZKIT Lite

Processor:

BF533     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Rejected

Uboot version or rev.:

    Toolchain version or rev.:

gcc4.1_09r1.1-rc2

App binary format:

N/A     

Summary: [ltp]ltp test case will be killed by oom-killer on bf533-ezkit in 09r1 branch occasionally

Details:

 

Sometimes ltp test case will get killed by oom-killer on bf533-ezkit in 09r1 branch.

 

--

shmget03

shmget03 invoked oom-killer: gfp_mask=0x200d2, order=0, oomkilladj=0^M

Hardware Trace:^M

   0 Target : <0x00004b70> { _dump_stack + 0x0 }^M

     Source : <0x0002fca8> { _oom_kill_process + 0xd8 } CALL pcrel^M

   1 Target : <0x0002fca8> { _oom_kill_process + 0xd8 }^M

     Source : <0x0000f7be> { _printk + 0x16 } RTS^M

   2 Target : <0x0000f7ba> { _printk + 0x12 }^M

     Source : <0x00010056> { _vprintk + 0x132 } RTS^M

   3 Target : <0x0001004a> { _vprintk + 0x126 }^M

     Source : <0xffa00c5a> { __common_int_entry + 0xda } ^M

   4 Target : <0xffa00bf8> { __common_int_entry + 0x78 }^M

     Source : <0xffa00a3c> { _return_from_int + 0x58 } ^M

   5 Target : <0xffa00a3c> { _return_from_int + 0x58 }^M

     Source : <0xffa00a12> { _return_from_int + 0x2e } ^M

   6 Target : <0xffa009e4> { _return_from_int + 0x0 }^M

     Source : <0xffa00bf4> { __common_int_entry + 0x74 } ^M

   7 Target : <0xffa00bf2> { __common_int_entry + 0x72 }^M

     Source : <0xffa00338> { _asm_do_IRQ + 0x6c } ^M

   8 Target : <0xffa00330> { _asm_do_IRQ + 0x64 }^M

     Source : <0x00013614> { __local_bh_enable + 0x40 } RTS^M

   9 Target : <0x000135d4> { __local_bh_enable + 0x0 }^M

     Source : <0x000136fc> { ___do_softirq + 0x9c } JUMP.L^M

  10 Target : <0x000136f4> { ___do_softirq + 0x94 }^M

     Source : <0x000136d8> { ___do_softirq + 0x78 } IF !CC JUMP^M

  11 Target : <0x000136ba> { ___do_softirq + 0x5a }^M

     Source : <0x000167c2> { _run_timer_softirq + 0x82 } RTS^M

  12 Target : <0x000167ac> { _run_timer_softirq + 0x6c }^M

     Source : <0x00016808> { _run_timer_softirq + 0xc8 } JUMP.S^M

  13 Target : <0x000167f0> { _run_timer_softirq + 0xb0 }^M

     Source : <0x00016696> { ___mod_timer + 0x76 } RTS^M

  14 Target : <0x00016678> { ___mod_timer + 0x58 }^M

     Source : <0x00016432> { _internal_add_timer + 0x2a } RTS^M

  15 Target : <0x00016408> { _internal_add_timer + 0x0 }^M

     Source : <0x00016674> { ___mod_timer + 0x54 } CALL pcrel^M

Stack info:^M

SP: [0x002d1ca8] <0x002d1ca8> /* kernel dynamic memory */^M

FP: (0x002d1dd4)^M

Memory from 0x002d1ca0 to 002d2000^M

002d1ca0: 002d1ca8  00000000 [00000019]<0002fcac> 01eadc80  00000000  00000000  01eade68 ^M

002d1cc0: 000200d2  00000000  00000000  00150670  000000e4 <0002fe32> 000000a0  001287c4 ^M

002d1ce0: 002d0000 <0002ffd0> 01eadc80  0015555c  00000124  00000009  01ead100  000000a0 ^M

002d1d00: 0015555c  00000001  002d1d28  00000048  00000009  00000000  001287c4  002d1d04 ^M

002d1d20: 0000019c  09896802  00000000  00000001 <00031ff0> 01eadc80  001613f4  00000000 ^M

002d1d40: 00000000  000200d2  00000000  00000042  000200d2  000200d2  00000000  001613f4 ^M

002d1d60: 00000001  00000048  002d0000  002d0000  00000000  000200d2  002d0000  00000010 ^M

002d1d80: 00000000  00000000  00000000  00000000  00150bec <0006f65c> 003e2310  00000000 ^M

002d1da0: 003e2310  00000800  00000000  00000000  00000000  01efa1a0 <0004b18c> 01d01b60 ^M

002d1dc0: 00000000  000081ff  00000000  003ede60  00000fe0 (002d1e38)<0004bba0> 01d01b60 ^M

002d1de0: 01e8b400  00000800  00bf7420  01d01b60  002d1e74  00000780 <0006f0f2> 01d01b60 ^M

002d1e00: 003e2310 <0003a0f4> 003e2310  00000000  00000800  00bf7420  01e48704  00000000 ^M

002d1e20: 00000000 <000837fe> 002d1eb8 <00088442> 00000003  001011f0 (00000000) 0000000c ^M

002d1e40: 002d1e74  002d1eb8 <000735c8> 0015b20c  00bea328  00000001  002d1e74  00000780 ^M

002d1e60: 00000800 <0008386c> 0015b26c  00000000  00100000  56535953  30303030  30303030 ^M

002d1e80: 00009b00 <00070b92> 000734a0  0015b258  00223f74  00000000  0015b260  0020bd14 ^M

002d1ea0: 0015b26c <0000a54c> 01e940e0  01eadc80  00223f74  01e9410c  00223ed8 <000734ee>^M

002d1ec0: 000734a0  00000155  00223f74  00000000  ffffe000  0020bd14  00000001  0015b20c ^M

002d1ee0: 00000000  002d1ef8  002d1eec  00000000  00000780  00000800  000734f8  00073418 ^M

002d1f00: 00072e80  ffa008b0  00000000  ffffe000  0020bd14  0000fffe  07fe0ff3  00000001 ^M

002d1f20: 0020bd14  002048b0  00008000  00060000  00000000  002d2000  002048b0  002048b0 ^M

002d1f40:<0020040a> ffa00fe4  02002002  00208a5f  002065ed  00208a16  002065ec  00000000 ^M

002d1f60: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000 ^M

002d1f80: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000 ^M

002d1fa0: 00000000  00000000  00000000  00223f74  00223ad4  00223ecc  00223ed8  0020bd60 ^M

002d1fc0: 0020ec40  00223f74  0020ec60  00000016  00000155  00000000  0020fcec  0020bd14 ^M

002d1fe0: 00000001  07fe0ff3  00000780  00000800  00000000  00000000  00000155  00000006 ^M

Return addresses in stack:^M

    address : <0x0002fcac> { _oom_kill_process + 0xdc }^M

    address : <0x0002fe32> { _badness + 0xb2 }^M

    address : <0x0002ffd0> { _out_of_memory + 0x128 }^M

    address : <0x00031ff0> { ___alloc_pages_internal + 0x234 }^M

    address : <0x0006f65c> { _ramfs_nommu_expand_for_mapping + 0x74 }^M

    address : <0x0004b18c> { _alloc_inode + 0x158 }^M

   frame  1 : <0x0004bba0> { _new_inode + 0xc }^M

    address : <0x0006f0f2> { _ramfs_get_inode + 0xe }^M

    address : <0x0003a0f4> { _shmem_file_setup + 0x8c }^M

    address : <0x000837fe> { _idr_get_new + 0xe }^M

    address : <0x00088442> { _sprintf + 0x1a }^M

    address : <0x000735c8> { _newseg + 0xd0 }^M

    address : <0x0008386c> { _idr_pre_get + 0x30 }^M

    address : <0x00070b92> { _ipcget + 0x14a }^M

    address : <0x0000a54c> { _pick_next_task_fair + 0x54 }^M

    address : <0x000734ee> { _sys_shmget + 0x4e }^M

    address : <0x0020040a> [ shmget03 + 0x3ca ]^M

Mem-Info:^M

DMA per-cpu:^M

CPU    0: hi:    0, btch:   1 usd:   0^M

Active_anon:0 active_file:2618 inactive_anon:0^M

inactive_file:2288 dirty:0 writeback:0 unstable:0^M

free:1024 slab:991 mapped:0 pagetables:0 bounce:0^M

DMA free:4096kB min:4096kB low:5120kB high:6144kB active_anon:0kB inactive_anon:0kB active_file:10472kB inactive_file:9152kB present:31492kB pages_scanned:10425 all_unreclaimable? no^M

lowmem_reserve[]: 0 0 0^M

DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB 0*8192kB 0*16384kB 0*32768kB = 4096kB^M

4906 total pagecache pages^M

7935 pages RAM^M

428 pages reserved^M

0 pages shared^M

6466 pages non-shared^M

Out of memory: kill process 134 (sh) score 9 or a child^M

Killed process 583 (shmget03)^M

Killed^M

root:/bin>

--

 

Follow-ups

 

--- Graf Yang                                                2009-12-16 03:56:17

This is not a bug.

The BF533-ezkit only have 32M memory.

The shmget03 will try to get 8K share memory segments, each one need 4K.

So the memory is out of.

I suggest not do this test on BF533-ezkit.

 

--- Vivi Li                                                  2009-12-23 22:48:54

OK, disable this test case for bf533-ezkit.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes