FAQ: [#6420] [ltp] epoll-ltp test case will crash(2010)

Document created by Aaronwu Employee on Sep 11, 2013
Version 1Show Document
  • View in full screen mode

[#6420] [ltp] epoll-ltp test case will crash

Submitted By: Vivi Li

Open Date

2010-12-23 22:49:19     Close Date

2011-04-07 02:07:32

Priority:

Medium     Assignee:

steven miao

Aaron Wu

Status:

Closed     Fixed In Release:

N/A

Found In Release:

2011R1     Release:

Category:

N/A     Board:

N/A

Processor:

ALL     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Fixed

Uboot version or rev.:

    Toolchain version or rev.:

gcc4.3-trunk

App binary format:

N/A     

Summary: [ltp] epoll-ltp test case will crash

Details:

 

LTP test of epoll-ltp will crash in latest trunk.

It's a new case, not a regression bug,

 

--

root:/> epoll-ltp

sys_epoll02    0  TINFO  :  testing if epoll() system call worksJump to NULL address

Deferred Exception context

CURRENT PROCESS:

COMM=epoll-ltp PID=176  CPU=0

TEXT = 0x02630040-0x02636b60        DATA = 0x02636b80-0x02638cec

BSS = 0x02638cec-0x0263af50  USER-STACK = 0x0263bf78

 

return address: [0x(null)]; contents of:

 

ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)

Linux version 2.6.34.7-ADI-2010R1-svn9521 (test@uclinux52-bf537-spinet) (gcc version 4.3.5 (ADI-2010R1-RC4) ) #76 Wed Dec 8 09:10

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 0006002d  IPEND: 0008  IMASK: ffff  SYSCFG: 0006

  EXCAUSE   : 0x2d

  physical IVG3 asserted : <0xffa007d8> { _trap + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x02606000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x00000000> /* Maybe null pointer? */

PC  : <0x00000000> /* Maybe null pointer? */

DCPLB_FAULT_ADDR: <0x0263bf24> [ epoll-ltp + 0xbf24 ]

ICPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */

PROCESSOR STATE:

R0 : 00000007    R1 : 00000041    R2 : 00000016    R3 : 00000000

R4 : 026307f4    R5 : 02636b34    R6 : 0263bf7c    R7 : 00000000

P0 : 00000100    P1 : 0263be80    P2 : 0000003f    P3 : 02638b14

P4 : 00000001    P5 : 00000000    FP : 0263450c    SP : 02605f24

LB0: 02633781    LT0: 0263377e    LC0: 00000000

LB1: 02630601    LT1: 026305f6    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000000    I0 : 02636bc4

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 02638b14

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000000

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 00000000   A0.x: 00000000   A1.w: 00000000   A1.x: 00000000

USP : 0263bf2c  ASTAT: 02002002

 

Hardware Trace:

   0 Target : <0x00003efc> { _trap_c + 0x0 }

     Source : <0xffa0076c> { _exception_to_level5 + 0xa4 } CALL pcrel

   1 Target : <0xffa006c8> { _exception_to_level5 + 0x0 }

     Source : <0xffa0057c> { _bfin_return_from_exception + 0x20 } RTX

   2 Target : <0xffa0055c> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00620> { _ex_trap_c + 0x74 } JUMP.S

   3 Target : <0xffa005ac> { _ex_trap_c + 0x0 }

     Source : <0xffa00840> { _trap + 0x68 } JUMP (P4)

   4 Target : <0xffa007f6> { _trap + 0x1e }

     Source : <0xffa007f2> { _trap + 0x1a } IF CC JUMP pcrel

   5 Target : <0xffa007d8> { _trap + 0x0 }

      FAULT : <0x00000000> /* Maybe null pointer? */

     Source : <0x0263085c> [ epoll-ltp + 0x81c ] RTS

   6 Target : <0x02630858> [ epoll-ltp + 0x818 ]

     Source : <0x026308d4> [ epoll-ltp + 0x894 ] JUMP.S

   7 Target : <0x026308d4> [ epoll-ltp + 0x894 ]

     Source : <0x0263055a> [ epoll-ltp + 0x51a ] RTS

   8 Target : <0x02630554> [ epoll-ltp + 0x514 ]

     Source : <0x0263063a> [ epoll-ltp + 0x5fa ] JUMP.S

   9 Target : <0x02630632> [ epoll-ltp + 0x5f2 ]

     Source : <0x0263060c> [ epoll-ltp + 0x5cc ] IF CC JUMP pcrel

  10 Target : <0x026305e8> [ epoll-ltp + 0x5a8 ]

     Source : <0x02630626> [ epoll-ltp + 0x5e6 ] JUMP.S

  11 Target : <0x02630622> [ epoll-ltp + 0x5e2 ]

     Source : <0x026305e4> [ epoll-ltp + 0x5a4 ] IF CC JUMP pcrel (BP)

  12 Target : <0x026305dc> [ epoll-ltp + 0x59c ]

     Source : <0x0263052e> [ epoll-ltp + 0x4ee ] IF CC JUMP pcrel

  13 Target : <0x0263050c> [ epoll-ltp + 0x4cc ]

     Source : <0x0263211c> [ epoll-ltp + 0x20dc ] RTS

  14 Target : <0x0263210c> [ epoll-ltp + 0x20cc ]

     Source : <0x026321cc> [ epoll-ltp + 0x218c ] RTS

  15 Target : <0x026321bc> [ epoll-ltp + 0x217c ]

     Source : <0x02632108> [ epoll-ltp + 0x20c8 ] JUMP.L

Userspace Stack

Stack info:

SP: [0x0263bf2c] <0x0263bf2c> [ epoll-ltp + 0xbf2c ]

Memory from 0x0263bf20 to 0263c000

0263bf20: 00000000  0263450c  00000000 [00000000] 00000000  00000000  00000000  0239262a

0263bf40: 02636b80  0000002f  00000ff5  00000000  02062ff0  023cffd6  02062ff5  00000000

0263bf60: 00000000  00000000  02636b34  02636b46  00000000  023c8fd4  00000001  0263bf9b

0263bf80: 00000000  0263bfa5  0263bfb0  0263bfd3  0263bfe7  00000000  65000000  6c6c6f70

0263bfa0: 70746c2d  52455400  696c3d4d  0078756e  48544150  69622f3d  752f3a6e  622f7273

0263bfc0: 2f3a6e69  6e696273  73752f3a  62732f72  48006e69  5f485355  53524556  3d4e4f49

0263bfe0: 36312e31  5000322e  2f3d4457  69622f00  70652f6e  2d6c6c6f  0070746c  00000000

Return addresses in stack:

 

sys_epoll02    0  TINFO  :  gettimeofday() works

sys_epoll02    0  TINFO  :  random number seeded with gettimeofday() [seed = 359397] works

sys_epoll02    0  TINFO  :  Testing epoll_create

sys_epoll02    1  TPASS  :  epoll_create with negative set size

sys_epoll02    2  TPASS  :  epoll_create with large set size (size = 2147483647)

sys_epoll02    3  TPASS  :  epoll_create with large set size (size = 2147483646)

sys_epoll02    4  TPASS  :  epoll_create with large set size (size = 2147483645)

sys_epoll02    5  TPASS  :  epoll_create with large set size (size = 2147483644)

sys_epoll02    6  TPASS  :  epoll_create with large set size (size = 2147483643)

sys_epoll02    7  TPASS  :  epoll_create with large set size (size = 2147483642)

sys_epoll02    8  TPASS  :  epoll_create with large set size (size = 2147483641)

sys_epoll02    9  TPASS  :  epoll_create with large set size (size = 2147483640)

sys_epoll02   10  TPASS  :  epoll_create with large set size (size = 2147483639)

sys_epoll02   11  TPASS  :  epoll_create with large set size (size = 2147483638)

sys_epoll02   12  TPASS  :  epoll_create with large set size (size = 2147483637)

sys_epoll02   13  TPASS  :  epoll_create with large set size (size = 2147483636)

sys_epoll02   14  TPASS  :  epoll_create with large set size (size = 2147483635)

sys_epoll02   15  TPASS  :  epoll_create with large set size (size = 2147483634)

sys_epoll02   16  TPASS  :  epoll_create with large set size (size = 2147483633)

sys_epoll02   17  TPASS  :  epoll_create with large set size (size = 2147483632)

sys_epoll02   18  TPASS  :  epoll_create with random large set size (size = 1226833124)

sys_epoll02   19  TPASS  :  epoll_create with random large set size (size = 323224735)

sys_epoll02   20  TPASS  :  epoll_create with random large set size (size = 499048018)

sys_epoll02   21  TPASS  :  epoll_create with random large set size (size = 816253826)

sys_epoll02   22  TPASS  :  epoll_create with random large set size (size = 1351771604)

sys_epoll02   23  TPASS  :  epoll_create with random large set size (size = 1483426643)

sys_epoll02   24  TPASS  :  epoll_create with random large set size (size = 641486016)

sys_epoll02   25  TPASS  :  epoll_create with random large set size (size = 755095310)

sys_epoll02   26  TPASS  :  epoll_create with random large set size (size = 2003359898)

sys_epoll02   27  TPASS  :  epoll_create with random large set size (size = 1479924055)

sys_epoll02   28  TPASS  :  epoll_create with random large set size (size = 624919294)

sys_epoll02   29  TPASS  :  epoll_create with random large set size (size = 1853277449)

sys_epoll02   30  TPASS  :  epoll_create with random large set size (size = 204986647)

sys_epoll02   31  TPASS  :  epoll_create with random large set size (size = 1196698283)

sys_epoll02   32  TPASS  :  epoll_create with random large set size (size = 759661552)

sys_epoll02   33  TPASS  :  epoll_create with random large set size (size = 244086934)

sys_epoll02    0  TINFO  :  Summary: Of 33 tests, epoll_create failed 0 (100% passed).

sys_epoll02    0  TINFO  :  Testing epoll_ctl

SEGV

root:/>

--

 

Follow-ups

 

--- steven miao                                              2011-02-28 02:07:05

this crash is caused by using return instead of _exit() to exit child process.

skip the unaligned access case of epoll_ctl(), unaligned access can not be

recovered on uclinux.

 

--- Vivi Li                                                  2011-04-07 02:07:32

OK now.

Close it.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes