[#5658] [ltp] ltp test case umount02 fail with kernel dump info
Submitted By: Vivi Li
Open Date
2009-11-04 04:07:25 Close Date
2009-11-12 05:02:43
Priority:
Medium Assignee:
Graf Yang
Status:
Closed Fixed In Release:
N/A
Found In Release:
2010R1 Release:
Category:
Tests Board:
N/A
Processor:
BF548 Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
gcc4.1-09r1-rc9
App binary format:
N/A
Summary: [ltp] ltp test case umount02 fail with kernel dump info
Details:
ltp test case umount02 fails with kernel dump info.
This is not a regression result. This case are not tested before.
Bellow is the log on bf548-ezkit, and /dev/sdb1 is a ext2 fs on usb.
--
root:/> umount02 -D /dev/sdb1
NULL pointer access
Deferred Exception context
CURRENT PROCESS:
COMM=umount02 PID=349 CPU=0
TEXT = 0x00bc0040-0x00bcc800 DATA = 0x00bcc804-0x00bcfc4c
BSS = 0x00bcfc4c-0x00bd7ac4 USER-STACK = 0x00bdff54
return address: [0x00bc6486]; contents of:
0x00bc6460: 3018 1006 e801 0000 6000 0538 0010 5048
0x00bc6470: 3209 0981 63f8 0788 6018 5403 0c00 184c
0x00bc6480: 0000 0000 3213 [9950] 0c00 183c 300b 601a
0x00bc6490: 2005 3211 9950 0c00 1836 6409 5411 0c00
ADSP-BF548-0.2 525(MHz CCLK) 131(MHz SCLK) (mpu off)
Linux version 2.6.31.5-ADI-2010R1-pre-svn7743 (test@uclinux61-bf548-std) (gcc version 4.3.4 (ADI-trunk/svn-3648) ) #72 Tue Nov 39
SEQUENCER STATUS: Not tainted
SEQSTAT: 00000027 IPEND: 0008 IMASK: ffff SYSCFG: 0006
EXCAUSE : 0x27
physical IVG3 asserted : <0xffa007b0> { _trap + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00b66000> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x00bc5326> [ umount02 + 0x52e6 ]
PC : <0x00bc6486> [ umount02 + 0x6446 ]
DCPLB_FAULT_ADDR: <0x00000013> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x00bc6486> [ umount02 + 0x6446 ]
PROCESSOR STATE:
R0 : 00000003 R1 : 00000012 R2 : 00000008 R3 : 00000013
R4 : 0000000b R5 : 00000000 R6 : 00000007 R7 : 0000000e
P0 : 00000013 P1 : ffffffff P2 : 00000013 P3 : 0000004d
P4 : 00000000 P5 : 00000000 FP : 00bdf488 SP : 00b65f24
LB0: 00bc60f1 LT0: 00bc60ee LC0: 00000000
LB1: 00bc538d LT1: 00bc538c LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 00bcf9b4
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00000000
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000020 A0.x: 00000000 A1.w: 00000020 A1.x: 00000000
USP : 00bdf488 ASTAT: 02003004
Hardware Trace:
0 Target : <0x0000522c> { _trap_c + 0x0 }
Source : <0xffa00744> { _exception_to_level5 + 0xa4 } CALL pcrel
1 Target : <0xffa006a0> { _exception_to_level5 + 0x0 }
Source : <0xffa00554> { _bfin_return_from_exception + 0x18 } RTX
2 Target : <0xffa0053c> { _bfin_return_from_exception + 0x0 }
Source : <0xffa005f8> { _ex_trap_c + 0x74 } JUMP.S
3 Target : <0xffa00584> { _ex_trap_c + 0x0 }
Source : <0xffa0080a> { _trap + 0x5a } JUMP (P4)
4 Target : <0xffa007b0> { _trap + 0x0 }
Source : <0x00bc6484> [ umount02 + 0x6444 ] 0x3213
5 Target : <0x00bc646e> [ umount02 + 0x642e ]
Source : <0x00bc6462> [ umount02 + 0x6422 ] IF !CC JUMP
6 Target : <0x00bc6458> [ umount02 + 0x6418 ]
Source : <0x00bc5322> [ umount02 + 0x52e2 ] CALL pcrel
7 Target : <0x00bc530a> [ umount02 + 0x52ca ]
Source : <0x00bc50dc> [ umount02 + 0x509c ] IF !CC JUMP
8 Target : <0x00bc50c8> [ umount02 + 0x5088 ]
Source : <0x00bc4f90> [ umount02 + 0x4f50 ] IF CC JUMP
9 Target : <0x00bc4f6e> [ umount02 + 0x4f2e ]
Source : <0x00bc5118> [ umount02 + 0x50d8 ] JUMP.S
10 Target : <0x00bc5110> [ umount02 + 0x50d0 ]
Source : <0x00bc4f5c> [ umount02 + 0x4f1c ] IF !CC JUMP
11 Target : <0x00bc4f4e> [ umount02 + 0x4f0e ]
Source : <0x00bc5490> [ umount02 + 0x5450 ] RTS
12 Target : <0x00bc548a> [ umount02 + 0x544a ]
Source : <0x00bc5478> [ umount02 + 0x5438 ] IF CC JUMP
13 Target : <0x00bc5404> [ umount02 + 0x53c4 ]
Source : <0x00bc4f4a> [ umount02 + 0x4f0a ] CALL pcrel
14 Target : <0x00bc4f42> [ umount02 + 0x4f02 ]
Source : <0x00bc5706> [ umount02 + 0x56c6 ] RTS
15 Target : <0x00bc5700> [ umount02 + 0x56c0 ]
Source : <0x00bc584c> [ umount02 + 0x580c ] JUMP.S
Userspace Stack
Stack info:
SP: [0x00bdf488] <0x00bdf488> [ umount02 + 0x1f488 ]
FP: (0x00bdf488)
Memory from 0x00bdf480 to 00be0000
00bdf480: 0000004d 00bdf5d8 [00bdf5d8]<00bc5326> 0000000e 00000000 00000000 00000000
00bdf4a0: 00000000 00000000 00000013 20000000 00000000 00000007 00bccadf ffffffff
00bdf4c0: 00000000 00000073 00000000 00000020 00000000 00000001 00000013 00010000
00bdf4e0: 00000003 00000008 00000008 00000008 00000008 00000008 00000008 00000008
00bdf500: 00000008 00bdfea0 00000013 00000000 00000000 00000000 00000000 00000000
00bdf520: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf540: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf560: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf580: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf5a0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf5c0: 00000000 00000000 00000000 00000000 00bdf508 20000000 00bdf648 <00bc4a4e>
00bdf5e0: 00bcc804 00bcf9d0 00000003 ff42097f 00000013 00bc0990 00bdff8e 00bdf608
00bdf600: 00000000 00000000 000000d0 fffffffe 00bdf680 ffffffff 00bdf6cd 00bdf680
00bdf620: 00bdf680 ffffffff 00000000 00000000 00000000 00000000 00000000 00000000
00bdf640: 00000000 00000000 00bdf664 <00bc49c4> 00bd1c90 00000000 00000000 00000000
00bdf660: 00bdfe94 00bdfe80 <00bc2c3a> 00000000 00000000 00000000 00000000 00bdfe94
00bdf680: 6e756f6d 29322874 69616620 2064656c 6d206f74 746e756f 76656420 20656369
00bdf6a0: 7665642f 6264732f 74612031 756f6d20 6f70746e 20746e69 5f746e6d 2c393433
00bdf6c0: 746f4720 72726520 2d206f6e 00000020 00000000 00000000 00000000 00000000
00bdf6e0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf700: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf720: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf740: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf760: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf780: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf7a0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf7c0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf7e0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf800: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf820: 00000000 00000000 00000000 00000000 00bcdc1a 00000000 00000000 00000000
00bdf840: 00000000 00000000 00000000 00bcdc1a 00000008 00000003 00bdf888 00000000
00bdf860: 00000000 00bdf8bc 00000008 00000008 00000008 00bdf9dc <00bc4f42> 00bcdc17
00bdf880: 00bdf9dc <00bc50c6> 00bcdc21 00000006 00000003 00000000 00000000 00000000
00bdf8a0: 00000000 00000000 00000000 00bcc824 20000000 00000000 00000003 00bcdc1b
00bdf8c0: 00000003 00000000 00000073 00000000 00000020 00000000 00000001 00000013
00bdf8e0: 00010000 00000003 00000008 00000008 00000008 00000008 00000008 00000008
00bdf900: 00000008 00000008 00bdfa84 00bcc824 00000000 00000000 00000000 00000000
00bdf920: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf940: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf960: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf980: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdf9a0: 00000000 00bdfa8c 00bdfa34 <00bc8478> 00000006 00000000 00000000 00000000
00bdf9c0: 84210843 00bd3c00 00bdfa94 00000000 00000000 00bdf90c 20000000 00bdfa4c
00bdf9e0:<00bc4a4e> 00bcc804 00bcf9d0 00000003 00000400 00bdff58 00bd3be4 00bcc7cc
00bdfa00: 00bdfa0c 00000000 00bdfa34 <00bc67d0> 00bdfa34 <00bc67e4> 00bdfe8c 00bdfa9a
00bdfa20: 00bdfa8c 00bdfa8c 00bdfe8c dd5ef4d0 00000014 00bdfa5c <00bc656e> 00bcc804
00bdfa40: 00bcf9d0 00000000 0000000f 00000003 00bd3be4 00bcc7cc 00bdfa8c 00bdfe94
00bdfa60:<00bc31f0> 00bdfe94 <00bc330a> 00bcf89c 00000000 00000000 00000000 00bcdc24
00bdfa80: 00bcc824 00000000 00000000 706d742f 6f6d752f 4a473677 0000646b 00000000
00bdfaa0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfac0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfae0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfb00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfb20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfb40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfb60: 00000000 00000000 00bdfc9c <00bc6738> 00bdfcc4 00000000 00000000 00000000
00bdfb80: 00000008 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfba0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfbc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfbe0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfc00: 00000000 00000000 00000000 00000000 00bc2ffc 10000000 00000000 00000000
00bdfc20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfc40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfc60: 00000000 00000000 00bccbdd 00000000 00000000 00000000 00000000 00000000
00bdfc80: 00000000 00bccbdd 00000008 00000000 <00bc8984> 00000000 00000000 00bdfcf4
00bdfca0: 00000008 00000000 00000004 00bdfe14 <00bc5000> 00000000 00bdfe14 <00bc533e>
00bdfcc0: 00000000 00000000 00000003 00000000 00000000 00000000 00000000 fffffff6
00bdfce0: 00000057 00bdfe08 20000000 00000000 00000003 00bccbde ffffffff 00000000
00bdfd00: 00000064 00000000 00000020 00000000 00000001 00000006 00010000 00000000
00bdfd20: 00000008 00000008 00000008 00000008 00000008 00000008 00000008 00000008
00bdfd40: 00bdfeb4 0000015d 00000000 00000000 00000000 00000000 00000000 00000000
00bdfd60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfd80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfda0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00bdfdc0: 00000000 00000000 00000000 00000000 00000000 10000000 00000000 00000000
00bdfde0: 00bdfe9c <00bc2fa2> 00000030 00bc2ffc 00000000 00bdfe48 00bdfe48 00000037
00bdfe00: 00000044 00bdff58 00bdfe58 00000003 20000000 00bdfe84 <00bc4a4e> 00bcc804
00bdfe20: 00bcf9d0 00000003 ff42e36f 00bdff58 00bd3be4 00bcc7cc 00bdfe44 00000000
00bdfe40: 00bdfe80 00bd00d0 fffffffe 00bd1c90 ffffffff 00bd1c97 00bdfe7c <00bc659e>
00bdfe60: 00bcc804 00bd3b7c 00000013 00bc0990 <00bc0f4e> 00bdfec8 <00bc15ea> 00bdfebc
00bdfe80: 00bdfebc <00bc05dc> 00000002 00bc0990 <00bcca9c> 00bdff8e 00bd1c90 00000013
00bdfea0: 00bd3b7c <00bc0986> 00000001 00bc2ffc 00000001 00000018 00000000 00bdff00
00bdfec0:<00bc02e2> 00000000 00bdff58 00bd3be4 00bcc7cc 00000000 00000000 00bcf648
00bdfee0:<00bc0ab8> 0000002f 00bdff00 <00bcc7d8> 00bcc804 00000000 00000000 00000000
00bdff00: 00bdff14 <00bc7f88> 00000003 00bdff58 00000000 00000000 <02d15e20> 00bcc804
00bdff20: 02d5d7bc 00000000 00000000 02a2e129 02f6dff1 0027a270 00bc015c 00000000
00bdff40: 00000000 00bcc7cc 00bcc7de 00000000 02f6dff6 00000003 00bdff82 00bdff8b
00bdff60: 00bdff8e 00000000 00bdff98 00bdffa3 00bdffcb 00bdffdf 00bdffe5 00000000
00bdff80: 6d750000 746e756f 2d003230 642f0044 732f7665 00316264 4d524554 6e696c3d
00bdffa0: 50007875 3d485441 6e69622f 73752f3a 69622f72 732f3a6e 3a6e6962 7273752f
00bdffc0: 6962732f 622f3a6e 48006e69 5f485355 53524556 3d4e4f49 35312e31 5000322e
00bdffe0: 2f3d4457 504d5400 6d742f3d 622f0070 752f6e69 6e756f6d 00323074 00000000
Return addresses in stack:
frame 1 : <0x00bc5326> [ umount02 + 0x52e6 ]
frame 2 : <0x00bc4a4e> [ umount02 + 0x4a0e ]
frame 3 : <0x00bc49c4> [ umount02 + 0x4984 ]
frame 4 : <0x00bc2c3a> [ umount02 + 0x2bfa ]
address : <0x00bc4f42> [ umount02 + 0x4f02 ]
address : <0x00bc50c6> [ umount02 + 0x5086 ]
address : <0x00bc8478> [ umount02 + 0x8438 ]
address : <0x00bc4a4e> [ umount02 + 0x4a0e ]
address : <0x00bc67d0> [ umount02 + 0x6790 ]
address : <0x00bc67e4> [ umount02 + 0x67a4 ]
address : <0x00bc656e> [ umount02 + 0x652e ]
address : <0x00bc31f0> [ umount02 + 0x31b0 ]
address : <0x00bc330a> [ umount02 + 0x32ca ]
address : <0x00bc6738> [ umount02 + 0x66f8 ]
address : <0x00bc8984> [ umount02 + 0x8944 ]
address : <0x00bc5000> [ umount02 + 0x4fc0 ]
address : <0x00bc533e> [ umount02 + 0x52fe ]
address : <0x00bc2fa2> [ umount02 + 0x2f62 ]
address : <0x00bc4a4e> [ umount02 + 0x4a0e ]
address : <0x00bc659e> [ umount02 + 0x655e ]
address : <0x00bc0f4e> [ umount02 + 0xf0e ]
address : <0x00bc15ea> [ umount02 + 0x15aa ]
frame 5 : <0x00bc05dc> [ umount02 + 0x59c ]
address : <0x00bcca9c> [ umount02 + 0xca9c ]
address : <0x00bc0986> [ umount02 + 0x946 ]
frame 6 : <0x00bc02e2> [ umount02 + 0x2a2 ]
address : <0x00bc0ab8> [ umount02 + 0xa78 ]
address : <0x00bcc7d8> [ umount02 + 0xc798 ]
frame 7 : <0x00bc7f88> [ umount02 + 0x7f48 ]
frame 8 : <0x02d15e20> [ sh + 0x15e20 ]
umount02 1 BROK : Unexpected signal 11 received.
umount02 2 BROK : Remaining cases broken
umount02 3 BROK : Remaining cases broken
umount02 4 BROK : Remaining cases broken
umount02 5 BROK : Remaining cases broken
--
Follow-ups
--- Graf Yang 2009-11-11 04:40:24
Patch the attached patch for umount02.c, test passed,
root:/ltp> ./umount02 -D /dev/sda1
EXT2-fs warning: mounting unchecked fs, running e2fsck is recommended
umount02 1 PASS : umount(2) expected failure; Got errno - EBUSY : Already
mounted/busy
umount02 2 PASS : umount(2) expected failure; Got errno - EFAULT :
Invalid address space
umount02 3 PASS : umount(2) expected failure; Got errno - ENOENT :
Directory not found
umount02 4 PASS : umount(2) expected failure; Got errno - EINVAL :
Invalid device
umount02 5 PASS : umount(2) expected failure; Got errno - ENAMETOOLONG :
Pathname too long
--- Vivi Li 2009-11-12 05:02:43
OK now.
Close it.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
umount02.patch application/octet-stream 705 Graf Yang