[#5767] In 09r1.1 branch, all ltp test cases show stack overflow in bf561 SMP kernel
Submitted By: Vivi Li
Open Date
2009-12-11 01:51:58 Close Date
2009-12-13 22:38:56
Priority:
Medium High Assignee:
Graf Yang
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
N/A Board:
EZKIT Lite
Processor:
BF561 Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Rejected
Uboot version or rev.:
Toolchain version or rev.:
09r1.1-rc2
App binary format:
N/A
Summary: In 09r1.1 branch, all ltp test cases show stack overflow in bf561 SMP kernel
Details:
In 09r1.1 branch, all ltp test case will show stack overflow in bf561 SMP kernel.
BF561-EZKIT NON-SMP kernel is fine.
I changed stack size to 65535 and build ltp test case with following command. And it still failed.
--
bfin-uclinux-gcc -Wall -D__uClinux__ -Dlinux -DUCLINUX -mstack-check-l1 -I../../include -g -Wall -I../../../../include -Wall -Wl,-elf2flt="-s 65535" -static access01.c -L../../../../lib -lltp -o access01
--
--
root:/> access01
Application stack overflow
- Please increase the stack size of the application using elf2flt -s option,
and/or reduce the stack use of the application.
Deferred Exception context
CURRENT PROCESS:
COMM=access01 PID=146
CPU = 0
TEXT = 0x00280040-0x0028b020 DATA = 0x0028b040-0x0028dcf4
BSS = 0x0028dcf4-0x00292c30 USER-STACK = 0x002a2f80
return address: [0x00280150]; contents of:
0x00280130: e800 0003 e801 0000 0010 0000 305a e14a
0x00280140: ffb0 e10a 0000 9152 6dc2 08d6 1402 00a3
0x00280150: [3213] 0568 e800 0009 b178 b1b9 e14a 0028
0x00280160: e10a d988 9110 e14a 0028 e10a d944 9310
ADSP-BF561-0.5 600(MHz CCLK) 100(MHz SCLK) (mpu off)
Linux version 2.6.28.10-ADI-2009R1.1-svn7942
Built with gcc version 4.1.2 (ADI svn)
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062003 IPEND: 0030 SYSCFG: 0006
EXCAUSE : 0x3
interrupts disabled
physical IVG5 asserted : <0x0000a03c> { _evt_ivhw + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00500000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x002879dc> [ access01 + 0x799c ]
PC : <0x00280150> [ access01 + 0x110 ]
DCPLB_FAULT_ADDR: <0xffb00000> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x00280150> [ access01 + 0x110 ]
PROCESSOR STATE:
R0 : 00000001 R1 : 002a2f84 R2 : 002a2f8c R3 : 0028013c
R4 : 00000001 R5 : 0028afe4 R6 : 0028ec5c R7 : 00000000
P0 : 002a2ef9 P1 : 0028ec5c P2 : 746f6faa P3 : 002a2f84
P4 : 0028dcf0 P5 : 0028b040 FP : 002a2f40 SP : 004fff24
LB0: 00285d6d LT0: 00285d6c LC0: 00000000
LB1: 001921a5 LT1: 0019219e LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 002a2e99
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 0067e150
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 002a2f34 ASTAT: 02003025
Hardware Trace:
0 Target : <0x000052b8> { _trap_c + 0x0 }
Source : <0x000099f2> { _exception_to_level5 + 0xbe } CALL pcrel
1 Target : <0x000099b6> { _exception_to_level5 + 0x82 }
Source : <0x000099b2> { _exception_to_level5 + 0x7e } IF !CC JUMP
2 Target : <0x00009934> { _exception_to_level5 + 0x0 }
Source : <0x000097e0> { _bfin_return_from_exception + 0x18 } RTX
3 Target : <0x000097c8> { _bfin_return_from_exception + 0x0 }
Source : <0x0000988e> { _ex_trap_c + 0x7e } JUMP.S
4 Target : <0x0000984a> { _ex_trap_c + 0x3a }
Source : <0x00009846> { _ex_trap_c + 0x36 } IF !CC JUMP
5 Target : <0x00009810> { _ex_trap_c + 0x0 }
Source : <0x00009b18> { _trap + 0xb4 } JUMP (P4)
6 Target : <0x00009ad8> { _trap + 0x74 }
Source : <0x00009ad4> { _trap + 0x70 } IF !CC JUMP
7 Target : <0x00009ac0> { _trap + 0x5c }
Source : <0x00009abc> { _trap + 0x58 } IF !CC JUMP
8 Target : <0x00009aaa> { _trap + 0x46 }
Source : <0x00009aa4> { _trap + 0x40 } IF !CC JUMP
9 Target : <0x00009a9a> { _trap + 0x36 }
Source : <0x00009a88> { _trap + 0x24 } IF !CC JUMP
10 Target : <0x00009a64> { _trap + 0x0 }
Source : <0x0028014e> [ access01 + 0x10e ] EXCPT 0x3
11 Target : <0x0028013c> [ access01 + 0xfc ]
Source : <0x002879da> [ access01 + 0x799a ] CALL (P2)
12 Target : <0x002879d0> [ access01 + 0x7990 ]
Source : <0x002879c2> [ access01 + 0x7982 ] IF !CC JUMP
13 Target : <0x002879b2> [ access01 + 0x7972 ]
Source : <0x00284490> [ access01 + 0x4450 ] RTS
14 Target : <0x00284480> [ access01 + 0x4440 ]
Source : <0x002879b0> [ access01 + 0x7970 ] CALL (P2)
15 Target : <0x002879a0> [ access01 + 0x7960 ]
Source : <0x0028798c> [ access01 + 0x794c ] IF !CC JUMP
Userspace Stack
Stack info:
SP: [0x002a2f34] <0x002a2f34> [ access01 + 0x22f34 ]
FP: (0x002a2f2c)
Memory from 0x002a2f30 to 002a3000
002a2f30:<002879b2>[00000000] 00000000 00000000 00000000 <001a27dc> 0028b040 006fc004
002a2f50: 007003c0 00000000 007003a4 00700354 00000001 0028013c 00000000 00000000
002a2f70: 0028afe4 0028aff6 00000000 006fc783 00000001 002a2fa2 00000000 002a2fab
002a2f90: 002a2fb2 002a2fc0 002a2fe3 00000000 63610000 73736563 48003130 3d454d4f
002a2fb0: 4853002f 3d4c4c45 6e69622f 0068732f 48544150 69622f3d 752f3a6e 622f7273
002a2fd0: 2f3a6e69 6e696273 73752f3a 62732f72 54006e69 3d4d5245 756e696c 622f0078
002a2ff0: 612f6e69 73656363 00313073 00000000
Return addresses in stack:
address : <0x002879b2> [ access01 + 0x7972 ]
address : <0x001a27dc> [ sh + 0x227dc ]
SIGSEGV
root:/>
--
Follow-ups
--- Graf Yang 2009-12-11 05:18:50
Please remove -mstack-check-l1 from the ltp make file.
SMP not support stack check through L1 scratchpad.
--- Vivi Li 2009-12-13 22:38:56
The smp related patch is not applied after run_kernel_test is updated, so ltp
will fail.
Patch is applied and test scripts are modified.
So close it.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found