[#6420] [ltp] epoll-ltp test case will crash
Submitted By: Vivi Li
Open Date
2010-12-23 22:49:19 Close Date
2011-04-07 02:07:32
Priority:
Medium Assignee:
steven miao
Aaron Wu
Status:
Closed Fixed In Release:
N/A
Found In Release:
2011R1 Release:
Category:
N/A Board:
N/A
Processor:
ALL Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
gcc4.3-trunk
App binary format:
N/A
Summary: [ltp] epoll-ltp test case will crash
Details:
LTP test of epoll-ltp will crash in latest trunk.
It's a new case, not a regression bug,
--
root:/> epoll-ltp
sys_epoll02 0 TINFO : testing if epoll() system call worksJump to NULL address
Deferred Exception context
CURRENT PROCESS:
COMM=epoll-ltp PID=176 CPU=0
TEXT = 0x02630040-0x02636b60 DATA = 0x02636b80-0x02638cec
BSS = 0x02638cec-0x0263af50 USER-STACK = 0x0263bf78
return address: [0x(null)]; contents of:
ADSP-BF537-0.2 500(MHz CCLK) 125(MHz SCLK) (mpu off)
Linux version 2.6.34.7-ADI-2010R1-svn9521 (test@uclinux52-bf537-spinet) (gcc version 4.3.5 (ADI-2010R1-RC4) ) #76 Wed Dec 8 09:10
SEQUENCER STATUS: Not tainted
SEQSTAT: 0006002d IPEND: 0008 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x2d
physical IVG3 asserted : <0xffa007d8> { _trap + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x02606000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x00000000> /* Maybe null pointer? */
PC : <0x00000000> /* Maybe null pointer? */
DCPLB_FAULT_ADDR: <0x0263bf24> [ epoll-ltp + 0xbf24 ]
ICPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
PROCESSOR STATE:
R0 : 00000007 R1 : 00000041 R2 : 00000016 R3 : 00000000
R4 : 026307f4 R5 : 02636b34 R6 : 0263bf7c R7 : 00000000
P0 : 00000100 P1 : 0263be80 P2 : 0000003f P3 : 02638b14
P4 : 00000001 P5 : 00000000 FP : 0263450c SP : 02605f24
LB0: 02633781 LT0: 0263377e LC0: 00000000
LB1: 02630601 LT1: 026305f6 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 02636bc4
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 02638b14
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 0263bf2c ASTAT: 02002002
Hardware Trace:
0 Target : <0x00003efc> { _trap_c + 0x0 }
Source : <0xffa0076c> { _exception_to_level5 + 0xa4 } CALL pcrel
1 Target : <0xffa006c8> { _exception_to_level5 + 0x0 }
Source : <0xffa0057c> { _bfin_return_from_exception + 0x20 } RTX
2 Target : <0xffa0055c> { _bfin_return_from_exception + 0x0 }
Source : <0xffa00620> { _ex_trap_c + 0x74 } JUMP.S
3 Target : <0xffa005ac> { _ex_trap_c + 0x0 }
Source : <0xffa00840> { _trap + 0x68 } JUMP (P4)
4 Target : <0xffa007f6> { _trap + 0x1e }
Source : <0xffa007f2> { _trap + 0x1a } IF CC JUMP pcrel
5 Target : <0xffa007d8> { _trap + 0x0 }
FAULT : <0x00000000> /* Maybe null pointer? */
Source : <0x0263085c> [ epoll-ltp + 0x81c ] RTS
6 Target : <0x02630858> [ epoll-ltp + 0x818 ]
Source : <0x026308d4> [ epoll-ltp + 0x894 ] JUMP.S
7 Target : <0x026308d4> [ epoll-ltp + 0x894 ]
Source : <0x0263055a> [ epoll-ltp + 0x51a ] RTS
8 Target : <0x02630554> [ epoll-ltp + 0x514 ]
Source : <0x0263063a> [ epoll-ltp + 0x5fa ] JUMP.S
9 Target : <0x02630632> [ epoll-ltp + 0x5f2 ]
Source : <0x0263060c> [ epoll-ltp + 0x5cc ] IF CC JUMP pcrel
10 Target : <0x026305e8> [ epoll-ltp + 0x5a8 ]
Source : <0x02630626> [ epoll-ltp + 0x5e6 ] JUMP.S
11 Target : <0x02630622> [ epoll-ltp + 0x5e2 ]
Source : <0x026305e4> [ epoll-ltp + 0x5a4 ] IF CC JUMP pcrel (BP)
12 Target : <0x026305dc> [ epoll-ltp + 0x59c ]
Source : <0x0263052e> [ epoll-ltp + 0x4ee ] IF CC JUMP pcrel
13 Target : <0x0263050c> [ epoll-ltp + 0x4cc ]
Source : <0x0263211c> [ epoll-ltp + 0x20dc ] RTS
14 Target : <0x0263210c> [ epoll-ltp + 0x20cc ]
Source : <0x026321cc> [ epoll-ltp + 0x218c ] RTS
15 Target : <0x026321bc> [ epoll-ltp + 0x217c ]
Source : <0x02632108> [ epoll-ltp + 0x20c8 ] JUMP.L
Userspace Stack
Stack info:
SP: [0x0263bf2c] <0x0263bf2c> [ epoll-ltp + 0xbf2c ]
Memory from 0x0263bf20 to 0263c000
0263bf20: 00000000 0263450c 00000000 [00000000] 00000000 00000000 00000000 0239262a
0263bf40: 02636b80 0000002f 00000ff5 00000000 02062ff0 023cffd6 02062ff5 00000000
0263bf60: 00000000 00000000 02636b34 02636b46 00000000 023c8fd4 00000001 0263bf9b
0263bf80: 00000000 0263bfa5 0263bfb0 0263bfd3 0263bfe7 00000000 65000000 6c6c6f70
0263bfa0: 70746c2d 52455400 696c3d4d 0078756e 48544150 69622f3d 752f3a6e 622f7273
0263bfc0: 2f3a6e69 6e696273 73752f3a 62732f72 48006e69 5f485355 53524556 3d4e4f49
0263bfe0: 36312e31 5000322e 2f3d4457 69622f00 70652f6e 2d6c6c6f 0070746c 00000000
Return addresses in stack:
sys_epoll02 0 TINFO : gettimeofday() works
sys_epoll02 0 TINFO : random number seeded with gettimeofday() [seed = 359397] works
sys_epoll02 0 TINFO : Testing epoll_create
sys_epoll02 1 TPASS : epoll_create with negative set size
sys_epoll02 2 TPASS : epoll_create with large set size (size = 2147483647)
sys_epoll02 3 TPASS : epoll_create with large set size (size = 2147483646)
sys_epoll02 4 TPASS : epoll_create with large set size (size = 2147483645)
sys_epoll02 5 TPASS : epoll_create with large set size (size = 2147483644)
sys_epoll02 6 TPASS : epoll_create with large set size (size = 2147483643)
sys_epoll02 7 TPASS : epoll_create with large set size (size = 2147483642)
sys_epoll02 8 TPASS : epoll_create with large set size (size = 2147483641)
sys_epoll02 9 TPASS : epoll_create with large set size (size = 2147483640)
sys_epoll02 10 TPASS : epoll_create with large set size (size = 2147483639)
sys_epoll02 11 TPASS : epoll_create with large set size (size = 2147483638)
sys_epoll02 12 TPASS : epoll_create with large set size (size = 2147483637)
sys_epoll02 13 TPASS : epoll_create with large set size (size = 2147483636)
sys_epoll02 14 TPASS : epoll_create with large set size (size = 2147483635)
sys_epoll02 15 TPASS : epoll_create with large set size (size = 2147483634)
sys_epoll02 16 TPASS : epoll_create with large set size (size = 2147483633)
sys_epoll02 17 TPASS : epoll_create with large set size (size = 2147483632)
sys_epoll02 18 TPASS : epoll_create with random large set size (size = 1226833124)
sys_epoll02 19 TPASS : epoll_create with random large set size (size = 323224735)
sys_epoll02 20 TPASS : epoll_create with random large set size (size = 499048018)
sys_epoll02 21 TPASS : epoll_create with random large set size (size = 816253826)
sys_epoll02 22 TPASS : epoll_create with random large set size (size = 1351771604)
sys_epoll02 23 TPASS : epoll_create with random large set size (size = 1483426643)
sys_epoll02 24 TPASS : epoll_create with random large set size (size = 641486016)
sys_epoll02 25 TPASS : epoll_create with random large set size (size = 755095310)
sys_epoll02 26 TPASS : epoll_create with random large set size (size = 2003359898)
sys_epoll02 27 TPASS : epoll_create with random large set size (size = 1479924055)
sys_epoll02 28 TPASS : epoll_create with random large set size (size = 624919294)
sys_epoll02 29 TPASS : epoll_create with random large set size (size = 1853277449)
sys_epoll02 30 TPASS : epoll_create with random large set size (size = 204986647)
sys_epoll02 31 TPASS : epoll_create with random large set size (size = 1196698283)
sys_epoll02 32 TPASS : epoll_create with random large set size (size = 759661552)
sys_epoll02 33 TPASS : epoll_create with random large set size (size = 244086934)
sys_epoll02 0 TINFO : Summary: Of 33 tests, epoll_create failed 0 (100% passed).
sys_epoll02 0 TINFO : Testing epoll_ctl
SEGV
root:/>
--
Follow-ups
--- steven miao 2011-02-28 02:07:05
this crash is caused by using return instead of _exit() to exit child process.
skip the unaligned access case of epoll_ctl(), unaligned access can not be
recovered on uclinux.
--- Vivi Li 2011-04-07 02:07:32
OK now.
Close it.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found