FAQ: [#6868] [ltp] ltp case sigaltstack01 sometimes fail at stack overflow with stack size 65535 in trunk and branch(2011)

Document created by Aaronwu Employee on Sep 12, 2013
Version 1Show Document
  • View in full screen mode

[#6868] [ltp] ltp case sigaltstack01 sometimes fail at stack overflow with stack size 65535 in trunk and branch

Submitted By: Vivi Li

Open Date

2011-11-04 03:54:01     Close Date

2011-11-25 01:01:19

Priority:

Medium     Assignee:

Sonic Zhang

Status:

Closed     Fixed In Release:

N/A

Found In Release:

2011R1     Release:

Category:

Tests     Board:

N/A

Processor:

ALL     Silicon Revision:

Is this bug repeatable?:

Yes     Resolution:

Rejected

Uboot version or rev.:

    Toolchain version or rev.:

gcc4.3-2011R1-rc2

App binary format:

N/A     

Summary: [ltp] ltp case sigaltstack01 sometimes fail at stack overflow with stack size 65535 in trunk and branch

Details:

 

LTP test case sigaltstack01 sometimes fail at stack overflow, but stack size has been set to 65536.

This exists both in trunk and 2011r1 branch.

 

I didn't reproduce this manually but I can always see this bug in regression.

 

--

test@uclinux50-bf537-9960-1836:~> /opt/uClinux/bfin-uclinux/bin/bfin-uclinux-flthdr -p /home/test/work/cruise/checkouts/uclinux-dist/testsuites/ltp/ltp-full-20101031/testcases/bin/sigaltstack01

/home/test/work/cruise/checkouts/uclinux-dist/testsuites/ltp/ltp-full-20101031/testcases/bin/sigaltstack01

    Magic:        bFLT

    Rev:          4

    Build Date:   Fri Nov  4 09:04:10 2011

    Entry:        0x44

    Data Start:   0xa660

    Data End:     0xd51c

    BSS End:      0x120a0

    Stack Size:   0x10000

    Reloc Start:  0xd51c

    Reloc Count:  0x674

    Flags:        0x1 ( Load-to-Ram )

test@uclinux50-bf537-9960-1836:~>

--

 

Bellow is the error log:

--

sigaltstack01

Application stack overflow

<5> - Please increase the stack size of the application using elf2flt -s option,

<5>   and/or reduce the stack use of the application.

Deferred Exception context

CURRENT PROCESS

---crash

 

!!!! recovering

 

!!!! hit ENTER

:

COMM=sigaltstack01 PID=763  CPU=0

TEXT = 0x025c0040-0x025ca660        DATA = 0x025ca680-0x025cd53c

BSS = 0x025cd53c-0x025d20c0  USER-STACK = 0x025e2f54

 

return address: [0x025c016e]; contents of:

0x025c0140:  3041  e801  0000  0052  e801  0000  0010  0000

0x025c0150:  e800  0003  e801  0000  0010  0000  e14a  ffb0

0x025c0160:  e10a  0000  9152  6c62  08d6  1402  00a3 [e800]

0x025c0170:  0001  3047  e14a  025c  67e0  e10a  e170  9310

 

ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)

Linux version 3.0.8-ADI-2011R1-svn10138 (test@uclinux50-bf537-9960-1836) (gcc version 4.3.5 (ADI-2011R1-RC2) ) #36 PREEMPT Fri Nov 4 09:01:19 CST 2011

 

SEQUENCER STATUS:               Not tainted

SEQSTAT: 00060003  IPEND: 0008  IMASK: ffff  SYSCFG: 0006

  EXCAUSE   : 0x3

  physical IVG3 asserted : <0xffa007bc> { _trap + 0x0 }

RETE: <0x00000000> /* Maybe null pointer? */

RETN: <0x024ea000> /* kernel dynamic memory */

RETX: <0x00000480> /* Maybe fixed code section */

RETS: <0x00000400> /* Maybe fixed code section */

PC  : <0x025c016e> [ sigaltstack01 + 0x12e ]

DCPLB_FAULT_ADDR: <0xffb00000> /* on-chip scratchpad */

ICPLB_FAULT_ADDR: <0x025c016e> [ sigaltstack01 + 0x12e ]

PROCESSOR STATE:

R0 : 0000000a    R1 : 02599eac    R2 : 02599f2c    R3 : 00000003

R4 : 025d0154    R5 : 025ce178    R6 : 00000000    R7 : 00000000

P0 : 00000025    P1 : 0000001f    P2 : 025d2f65    P3 : 025ce208

P4 : 025cddb8    P5 : 025ce174    FP : 025e2ec8    SP : 024e9f24

LB0: 025c47f3    LT0: 025c47f2    LC0: 00000000

LB1: 02391813    LT1: 02391808    LC1: 00000000

B0 : 00000000    L0 : 00000000    M0 : 00000004    I0 : 025e2e30

B1 : 00000000    L1 : 00000000    M1 : 00000000    I1 : 025cd0e0

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 023d9d98

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000

A0.w: 0000147a   A0.x: 00000000   A1.w: 0000147a   A1.x: 00000000

USP : 02599e98  ASTAT: 02000020

 

Hardware Trace:

   0 Target : <0x00003fe4> { _trap_c + 0x0 }

     Source : <0xffa00750> { _exception_to_level5 + 0xa4 } JUMP.L

   1 Target : <0xffa006ac> { _exception_to_level5 + 0x0 }

     Source : <0xffa00560> { _bfin_return_from_exception + 0x20 } RTX

   2 Target : <0xffa00540> { _bfin_return_from_exception + 0x0 }

     Source : <0xffa00604> { _ex_trap_c + 0x74 } JUMP.S

   3 Target : <0xffa00590> { _ex_trap_c + 0x0 }

     Source : <0xffa00824> { _trap + 0x68 } JUMP (P4)

   4 Target : <0xffa007da> { _trap + 0x1e }

     Source : <0xffa007d6> { _trap + 0x1a } IF CC JUMP pcrel

   5 Target : <0xffa007bc> { _trap + 0x0 }

     Source : <0x025c016c> [ sigaltstack01 + 0x12c ] EXCPT 3

   6 Target : <0x025c015c> [ sigaltstack01 + 0x11c ]

     Source : <0xffa00dce> { __common_int_entry + 0xf2 } RTI

   7 Target : <0xffa00d6c> { __commo

!!!! hit Control-C

n_int_entry + 0x90 }

     Source : <0xffa011b0> { _evt_system_call + 0x64 } JUMP.S

   8 Target : <0xffa011b0> { _evt_system_call + 0x64 }

     Source : <0xffa009b2> { _system_call + 0xbe } RTS

   9 Target : <0xffa009ac> { _system_call + 0xb8 }

     Source : <0x00003542> { _do_notify_resume + 0x4e } RTS

  10 Target : <0x0000353e> { _do_notify_resume + 0x4a }

     Source : <0x00003524> { _do_notify_resume + 0x30 } IF CC JUMP pcrel

  11 Target : <0x00003516> { _do_notify_resume + 0x22 }

     Source : <0x0000354a> { _do_notify_resume + 0x56 } JUMP.S

  12 Target : <0x0000354a> { _do_notify_resume + 0x56 }

     Source : <0x000031de> { _do_signal + 0x9f6 } RTS

  13 Target : <0x000031d2> { _do_signal + 0x9ea }

     Source : <0x00003158> { _do_signal + 0x970 } IF CC JUMP pcrel (BP)

  14 Target : <0x0000314c> { _do_signal + 0x964 }

     Source : <0x00003130> { _do_signal + 0x948 } IF CC JUMP pcrel (BP)

  15 Target : <0x00003122> { _do_signal + 0x93a }

     Source : <0x0000311c> { _do_signal + 0x934 } IF CC JUMP pcrel (BP)

Userspace Stack

Stack info:

SP: [0x02599e98] <0x02599e98> [ sigaltstack01 + 0x1e98 ]

Memory from 0x02599e90 to 0259a000

02599e90: 00000000  00000000 [0000000a] 02599eac  02599f2c  00000001  02599ea8  0000000a

02599eb0: 00000000  00000000  000002fb  00000000  0019b62c  02599ec4  02599ec4  00000000

02599ed0: 02599ed0  02599ed0  00000000  00000000  00000000  00000000  ffffffff  00000000

02599ef0: ffffe000  00000000  02640880  08087fff  6008140b  0205fe90 <ffa0095e> 0202b3b8

02599f10: 0202b2e0  0202b040  00000003  02640880  00000000  026471d0  00008000  00000000

02599f30: 00000000  02598004  00000000  00002000  00000000  0000000a  00000000  00000003

02599f50: 025d0154  025ce178  00000000  00000000  00000025  0000001f  00000000  025ce208

02599f70: 025cddb8  025ce174  025e2ebc  0000147a  0000147a  00000000  00000000  02000000

02599f90: 025c03a4  025c2f5a  025c2f5a  025e2ec8  025e2e30  025cd0e0  023d9d98  00000000

02599fb0: 00000004  00000000  00000000  00000000  00000000  00000000  00000000  00000000

02599fd0: 00000000  00000000  00000000  00000000  00000000  00000000  025c47f2  02391808

02599ff0: 025c47f3  02391813  00060000  00000000

--

 

Follow-ups

 

--- Sonic Zhang                                              2011-11-24 22:25:43

Not a bug.

This case switch user stack in the middle of testing. But, GCC flag

"-mstack-check-l1" doesn't know the new stack. Please disable this

flag for this LTP case.

 

--- Vivi Li                                                  2011-11-25 01:16:14

OK. LTP test script is updated.

Close it.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes