[#7229] [ltp] LTP test case setrlimit01 fail in latest kernel 3.5.0
Submitted By: Vivi Li
Open Date
2012-08-07 04:55:26 Close Date
2012-09-20 03:16:57
Priority:
Medium Assignee:
Bob Liu
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
N/A Board:
N/A
Processor:
ALL Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Not reproducible
Uboot version or rev.:
Toolchain version or rev.:
gcc4.3-2012_Feb_15
App binary format:
N/A
Summary: [ltp] LTP test case setrlimit01 fail in latest kernel 3.5.0
Details:
LTP test case setrlimit01 fails in latest kernel 3.5.0.
--
root:/> setrlimit01
setrlimit01 1 TPASS : RLNMIT_NOFILE functionality is correctULL pointer access
Deferred Exception context
CURRENT PROCESS:
COMM=setrlimit01 PID=241 CPU=0
TEXT = 0x02b80040-0x02b8b940 DATA = 0x02b8b960-0x02b8ee9c
BSS = 0x02b8ee9c-0x02b93d10 USER-STACK = 0x02ba3f74
return address: [0x02b8556c]; contents of:
0x02b85540: 6ff9 601b 549a 3212 9c01 e0a2 1002 c803
0x02b85550: 1800 9201 9c01 9201 0c42 3298 1005 9073
0x02b85560: 0010 0c42 1805 e0a2 2003 9819 [9a01] 9073
0x02b85570: 0010 0000 3200 3212 50d0 0e3a 1818 4349
ADSP-BF527-0.2 525(MHz CCLK) 131(MHz SCLK) (mpu off)
Linux version 3.5.0-ADI-2012R1-pre-00797-g367b7b2 (test@uclinux63-527-usbdev) (gcc version 4.3.5 (ADI-trunk/svn-5764) ) #255 Fri2
SEQUENCER STATUS: Not tainted
SEQSTAT: 00002027 IPEND: 0008 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x27
Double Fault
Kernel OOPS in progress
Deferred Exception context
CURRENT PROCESS:
COMM=setrlimit01 PID=241 CPU=0
TEXT = 0x02b80040-0x02b8b940 DATA = 0x02b8b960-0x02b8ee9c
BSS = 0x02b8ee9c-0x02b93d10 USER-STACK = 0x02ba3f74
return address: [0x00036d3a]; contents of:
0x00036d10: 600e 9851 4348 0c00 1ff2 0c06 1ffa 9a21
0x00036d20: 2ff9 0000 04c3 e14c 0000 014f e10c 0000
0x00036d30: 3018 3239 3402 0c44 1003 [0001] 2000 e14a
0x00036d40: 0000 e10a 0000 9153 6002 304b 5211 0e08
ADSP-BF527-0.2 525(MHz CCLK) 131(MHz SCLK) (mpu off)
Linux version 3.5.0-ADI-2012R1-pre-00797-g367b7b2 (test@uclinux63-527-usbdev) (gcc version 4.3.5 (ADI-trunk/svn-5764) ) #255 Fri2
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062021 IPEND: 0028 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x21
--
It passed in the old kernel with bellow log:
--
root:/> setrlimit01
setrlimit01 1 TPASS : RLIMIT_NOFILE functionality is correctNULL pointer access
Deferred Exception context
CURRENT PROCESS:
COMM=setrlimit01 PID=238 CPU=0
TEXT = 0x02b80040-0x02b8b940 DATA = 0x02b8b960-0x02b8ee9c
BSS = 0x02b8ee9c-0x02b93d10 USER-STACK = 0x02ba3f74
return address: [0x02b8556c]; contents of:
0x02b85540: 6ff9 601b 549a 3212 9c01 e0a2 1002 c803
0x02b85550: 1800 9201 9c01 9201 0c42 3298 1005 9073
0x02b85560: 0010 0c42 1805 e0a2 2003 9819 [9a01] 9073
0x02b85570: 0010 0000 3200 3212 50d0 0e3a 1818 4349
ADSP-BF527-0.2 525(MHz CCLK) 131(MHz SCLK) (mpu off)
Linux version 3.3.0-ADI-2012R1-pre-00789-gf281a9b (test@uclinux63-527-usbdev) (gcc version 4.3.5 (ADI-trunk/svn-5764) ) #243 Thu2
SEQUENCER STATUS: Not tainted
SEQSTAT: 00002027 IPEND: 0008 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x27
physical IVG3 asserted : <0xffa00728> { _trap + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x02bd6000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x02b80394> [ setrlimit01 + 0x354 ]
PC : <0x02b8556c> [ setrlimit01 + 0x552c ]
DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x02b8556c> [ setrlimit01 + 0x552c ]
PROCESSOR STATE:
R0 : 00000000 R1 : 00000061 R2 : 00000005 R3 : 00000000
R4 : 02b80800 R5 : 02b8b91c R6 : 00000000 R7 : 00000000
P0 : 00000000 P1 : 0000000a P2 : 00000005 P3 : 02b8d129
P4 : 00000001 P5 : 02b8fe60 FP : 02ba3ef8 SP : 02bd5f24
LB0: 02b8556d LT0: 02b8556a LC0: 00000005
LB1: 02b89041 LT1: 02b88ff6 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 02ba2ec8
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 02b8eb8c
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000035 A0.x: 00000000 A1.w: 00000035 A1.x: 00000000
USP : 02ba3ee4 ASTAT: 02000002
Hardware Trace:
0 Target : <0x000040c0> { _trap_c + 0x0 }
Source : <0xffa006bc> { _exception_to_level5 + 0xa4 } CALL pcrel
1 Target : <0xffa00618> { _exception_to_level5 + 0x0 }
Source : <0xffa004d0> { _bfin_return_from_exception + 0x18 } RTX
2 Target : <0xffa004b8> { _bfin_return_from_exception + 0x0 }
Source : <0xffa00572> { _ex_trap_c + 0x72 } JUMP.S
3 Target : <0xffa00500> { _ex_trap_c + 0x0 }
Source : <0xffa00782> { _trap + 0x5a } JUMP (P4)
4 Target : <0xffa00728> { _trap + 0x0 }
FAULT : <0x02b8556c> [ setrlimit01 + 0x552c ] B[P0++] = R1 (Z)
Source : <0x02b8556a> [ setrlimit01 + 0x552a ] R1 = B[P3++] (Z)
5 Target : <0x02b85562> [ setrlimit01 + 0x5522 ]
Source : <0x02b85532> [ setrlimit01 + 0x54f2 ] IF CC JUMP pcrel
6 Target : <0x02b85528> [ setrlimit01 + 0x54e8 ]
Source : <0x02b80390> [ setrlimit01 + 0x350 ] JUMP.L
7 Target : <0x02b80386> [ setrlimit01 + 0x346 ]
Source : <0x02b802d8> [ setrlimit01 + 0x298 ] IF CC JUMP pcrel
8 Target : <0x02b802be> [ setrlimit01 + 0x27e ]
Source : <0x02b8350e> [ setrlimit01 + 0x34ce ] RTS
9 Target : <0x02b8350e> [ setrlimit01 + 0x34ce ]
Source : <0xffa00070> { _ret_from_fork + 0x70 } RTI
10 Target : <0xffa00006> { _ret_from_fork + 0x6 }
Source : <0x00026c80> { _schedule_tail + 0x50 } RTS
11 Target : <0x00026c7a> { _schedule_tail + 0x4a }
Source : <0x00026c56> { _schedule_tail + 0x26 } IF CC JUMP pcrel
12 Target : <0x00026c44> { _schedule_tail + 0x14 }
Source : <0x0002691a> { _finish_task_switch + 0x4e } RTS
13 Target : <0x0002690c> { _finish_task_switch + 0x40 }
Source : <0x00026922> { _finish_task_switch + 0x56 } IF !CC JUMP pcrel (BP)
14 Target : <0x0002691c> { _finish_task_switch + 0x50 }
Source : <0x00026906> { _finish_task_switch + 0x3a } IF !CC JUMP pcrel (BP)
15 Target : <0x000268cc> { _finish_task_switch + 0x0 }
Source : <0x00026c40> { _schedule_tail + 0x10 } JUMP.L
Userspace Stack
Stack info:
SP: [0x02ba3ee4] <0x02ba3ee4> [ setrlimit01 + 0x23ee4 ]
FP: (0x02ba3f14)
Memory from 0x02ba3ee0 to 02ba4000
02ba3ee0: 02b80290 [02b8eb8c] 02b8f714 00000000 00000000 02b8fe20 02ba3f14 02b80840
02ba3f00: 02b8f714 00000000 02ba3f78 00000064 00000000 (02ba3f34)<02b87108> 00000000
02ba3f20: 00000000 02ba3f78 00000000 00000000 00000000 (00000000) 0299478e 02b8b960
02ba3f40: 0000002f 00000ff3 00000000 0297cfee 029f4fd6 0297cff3 00000000 00000000
02ba3f60: 00000000 02b8b91c 02b8b92e 00000000 029ea854 00000001 02ba3f97 00000000
02ba3f80: 02ba3fa3 02ba3fae 02ba3fd1 02ba3fe5 00000000 73000000 6c727465 74696d69
02ba3fa0: 54003130 3d4d5245 756e696c 41500078 2f3d4854 3a6e6962 7273752f 6e69622f
02ba3fc0: 62732f3a 2f3a6e69 2f727375 6e696273 53554800 45565f48 4f495352 2e313d4e
02ba3fe0: 342e3831 44575000 2f002f3d 2f6e6962 72746573 696d696c 00313074 00000000
Return addresses in stack:
frame 1 : <0x02b87108> [ setrlimit01 + 0x70c8 ]
setrlimit01 2 TPASS : RLIMIT_FSIZE test PASSED
setrlimit01 3 TPASS : RLIMIT_NPROC functionality is correct
setrlimit01 4 TPASS : RLIMIT_CORE functionality is correct
root:/>
--
Follow-ups
--- Bob Liu 2012-08-13 04:26:57
can't repeat
--- Vivi Li 2012-09-20 04:17:56
I can't see this crash now.
Close it.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found