[#5850] [LTP] ltp test case kill07 failed with kernel dump info of illegal use of supervisor resource

Document created by Aaronwu Employee on Sep 10, 2013
Version 1Show Document
  • View in full screen mode

[#5850] [LTP] ltp test case kill07 failed with kernel dump info of illegal use of supervisor resource

Submitted By: Vivi Li

Open Date

2010-01-26 04:07:52     Close Date

2010-03-18 05:13:07

Priority:

Medium     Assignee:

Graf Yang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

2010R1     Release:

Category:

Tests     Board:

N/A

Processor:

ALL     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Out of Date

Uboot version or rev.:

    Toolchain version or rev.:

gcc4.3_trunk3771

App binary format:

N/A     

Summary: [LTP] ltp test case kill07 failed with kernel dump info of illegal use of supervisor resource

Details:

 

ltp test case kill07 failed with kernel dump info of illegal use of supervisor resource.

 

--

root:/> kill07

Illegal use of supervisor resource

<5> - Attempted to use a Supervisor register or instruction from User mode.

<5>   Supervisor resources are registers and instructions that are reserved

<5>   for Supervisor use: Supervisor only registers, all MMRs, and Supervisor

<5>   only instructions.

Deferred Exception context

CURRENT PROCESS:

COMM=kill07 PID=170 CPU=0

TEXT = 0x02c20040-0x02c2bf00        DATA = 0x02c2bf04-0x02c2edac

BSS = 0x02c2edac-0x02c33934  USER-STACK = 0x02c3bf6c

 

return address: [0x02c20270]; contents of:

0x02c20250:  fa90  9110  6001  6002  e300  1b72  e14a  02c2

0x02c20260:  e10a  fa84  9310  e14a  02c2  e10a  fa84  9152

0x02c20270: [9110] 0c38  1013  e141  02c2  e101  0564  e14a

0x02c20280:  02c2  e10a  fa84  9152  9110  e142  02c2  e102

 

ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)

Linux version 2.6.32.4-ADI-2010R1-pre-svn8176 (test@uclinux56-ad73322-snormtd-df) (gcc version 4.3.4 (ADI-trunk/svn-3771) ) #1010

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0000002e  IPEND: 0008  IMASK: ffff  SYSCFG: 0006

  EXCAUSE   : 0x2e

  physical IVG3 asserted : <0xffa0072c> { _trap + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x02b42000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x02c2025c> [ kill07 + 0x21c ]

PC  : <0x02c20270> [ kill07 + 0x230 ]

DCPLB_FAULT_ADDR: <0xfffffffc> /* core mmrs */

ICPLB_FAULT_ADDR: <0x02c20270> [ kill07 + 0x230 ]

PROCESSOR STATE:

R0 : ffffffff    R1 : 00000000    R2 : 00000000    R3 : 02c3bedc

R4 : 02c2bed0    R5 : 02c2fa54    R6 : 02c3bf70    R7 : 61010001

P0 : 00000152    P1 : 00000020    P2 : ffffffff    P3 : 00000001

P4 : 02c2eb30    P5 : 02c2bf04    FP : 02c3bf0c    SP : 02b41f24

LB0: 02c25969    LT0: 02c25968    LC0: 00000000

LB1: 02994a4b    LT1: 02994a42    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 04000021

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 00000000

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 02c3bdb4  ASTAT: 02002000

 

Hardware Trace:

   0 Target : <0x00005084> { _trap_c + 0x0 }

     Source : <0xffa006c0> { _exception_to_level5 + 0xa4 } CALL pcrel

   1 Target : <0xffa0061c> { _exception_to_level5 + 0x0 }

     Source : <0xffa004d0> { _bfin_return_from_exception + 0x20 } RTX

   2 Target : <0xffa004b0> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00574> { _ex_trap_c + 0x74 } JUMP.S

   3 Target : <0xffa00500> { _ex_trap_c + 0x0 }

     Source : <0xffa00794> { _trap + 0x68 } JUMP (P4)

   4 Target : <0xffa0074c> { _trap + 0x20 }

     Source : <0xffa00748> { _trap + 0x1c } IF !CC JUMP

   5 Target : <0xffa0072c> { _trap + 0x0 }

     Source : <0x02c2026e> [ kill07 + 0x22e ] 0x9152

   6 Target : <0x02c2025c> [ kill07 + 0x21c ]

     Source : <0x02c2395a> [ kill07 + 0x391a ] RTS

   7 Target : <0x02c23954> [ kill07 + 0x3914 ]

     Source : <0x02c23968> [ kill07 + 0x3928 ] JUMP.S

   8 Target : <0x02c23960> [ kill07 + 0x3920 ]

     Source : <0x02c238c4> [ kill07 + 0x3884 ] RTS

   9 Target : <0x02c238b4> [ kill07 + 0x3874 ]

     Source : <0x02c2395c> [ kill07 + 0x391c ] CALL pcrel

  10 Target : <0x02c2395c> [ kill07 + 0x391c ]

     Source : <0x02c23950> [ kill07 + 0x3910 ] IF !CC JUMP

  11 Target : <0x02c23948> [ kill07 + 0x3908 ]

     Source : <0xffa00c82> { __common_int_entry + 0xda } RTI

  12 Target : <0xffa00c20> { __common_int_entry + 0x78 }

     Source : <0xffa01064> { _evt_system_call + 0x64 } JUMP.S

  13 Target : <0xffa01064> { _evt_system_call + 0x64 }

     Source : <0xffa00920> { _system_call + 0xbc } RTS

  14 Target : <0xffa0091c> { _system_call + 0xb8 }

     Source : <0xffa0090c> { _system_call + 0xa8 } IF !CC JUMP

  15 Target : <0xffa00902> { _system_call + 0x9e }

     Source : <0xffa008f2> { _system_call + 0x8e } IF !CC JUMP

Userspace Stack

Stack info:

SP: [0x02c3bdb4] <0x02c3bdb4> [ kill07 + 0x1bdb4 ]

FP: (0x02c3bf0c)

Memory from 0x02c3bdb0 to 02c3c000

02c3bdb0: 61010001 [00000000] 02c2bf48  0000000d  00000000  00000000  00000000  00000000

02c3bdd0: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

02c3bdf0: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

02c3be10: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

02c3be30: 00000000  00000000  00000000  00000000  00000000  00000000  00000001  00000000

02c3be50: 00000000  00000000  02c204c4  00000000  00000000  00000000  00000000  00000000

02c3be70: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

02c3be90: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

02c3beb0: 00000000  00000000  00000000  00000000  00000000  00000000  00000000  00000000

02c3bed0: 00000000  00000000  00000000  10000000  00000000  00000001  00000000  00000000

02c3bef0: 00000000  00000000  00000000  00000001  02c3bf18 <02c2bedc> 02c2bf04 (02c3bf2c)

02c3bf10:<02c278d8> 00000000  02c3bf70  02c2fa54  00000001  02c3bf70  00000000 (00000000)

02c3bf30:<0299682c> 02c2bf04  029e2d24  00000000  00000000  028e4481  02040ff3  028e4800

02c3bf50: 02c2015c  00000000  00000000  02c2bed0  02c2bee2  00000000  02040ff8  00000001

02c3bf70: 02c3bf93  00000000  02c3bf9a  02c3bfa5  02c3bfcd  02c3bfe1  02c3bfe7  00000000

02c3bf90: 6b000000  306c6c69  45540037  6c3d4d52  78756e69  54415000  622f3d48  2f3a6e69

02c3bfb0: 2f727375  3a6e6962  6962732f  752f3a6e  732f7273  3a6e6962  6e69622f  53554800

02c3bfd0: 45565f48  4f495352  2e313d4e  332e3531  44575000  54002f3d  2f3d504d  00706d74

02c3bff0: 6e69622f  6c696b2f  0037306c  00000000

Return addresses in stack:

    address : <0x02c2bedc> [ kill07 + 0xbe9c ]

   frame  1 : <0x02c278d8> [ kill07 + 0x7898 ]

   frame  2 : <0x0299682c> [ sh + 0x1682c ]

ILL

root:/>

--

 

Last passed version:

--

kernel:    Linux release 2.6.32.3-ADI-2010R1-pre-svn8173, build #99 Mon Jan 18 13:34:29 GMT 2010

toolchain: bfin-uclinux-gcc release gcc version 4.3.4 (ADI-trunk/svn-3771)

user-dist: release svn-9382, build #1337 Mon Jan 18 13:33:47 GMT 2010

--

 

First failed version:

--

kernel:    Linux release 2.6.32.4-ADI-2010R1-pre-svn8176, build #103 Tue Jan 19 14:16:06 GMT 2010

toolchain: bfin-uclinux-gcc release gcc version 4.3.4 (ADI-trunk/svn-3771)

user-dist: release svn-9389, build #1414 Tue Jan 19 14:15:28 GMT 2010

--

 

Follow-ups

 

--- Vivi Li                                                  2010-03-18 05:11:56

Out of date now.

Close it.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes