[#4618] [ltp] ltp test case connect01 crashed in trunk
Submitted By: Vivi Li
Open Date
2008-11-06 22:32:31 Close Date
2008-12-10 18:52:11
Priority:
Medium Assignee:
Bryan Wu
Bernd Schmidt
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
N/A Board:
N/A
Processor:
BF537 Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
toolchain-2008_Oct_10
App binary format:
N/A
Summary: [ltp] ltp test case connect01 crashed in trunk
Details:
Kernel panic when run ltp testcase connect01 in trunk on all platform.
--
root:/> ./connect01
connect01 1 PNSU L:L ap oiiendtserrp oa cuccessfuls
Kernel OOPS in progress
Deferred Exception context
CURRENT PROCESS:
COMM=connect01 PID=155
TEXT = 0x00320040-0x0032a440 DATA = 0x0032a444-0x0032cd64
BSS = 0x0032cd64-0x003317f4 USER-STACK = 0x00339f80
return address: [0x000e9284]; contents of:
0x000e9260: 1002 5041 5059 030c 1002 5041 5051 030c
0x000e9270: 1002 5041 0000 6040 b1f1 b230 184b 0000
0x000e9280: 0000 0000 [e4a8] 015f 4928 0200 e14d 0016
0x000e9290: e10d 9b30 a171 3056 b1b0 6482 e428 0032
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062027 IPEND: 8030 SYSCFG: 0006
EXCAUSE : 0x27
physical IVG15 asserted : <0xffa00dd8> { _evt_system_call + 0x0 }
logical irq 6 mapped : <0xffa00398> { _timer_interrupt + 0x0 }
logical irq 10 mapped : <0x000b0d20> { _bfin_rtc_interrupt + 0x0 }
logical irq 18 mapped : <0x0009e840> { _bfin_serial_dma_rx_int + 0x0 }
logical irq 19 mapped : <0x0009e5b0> { _bfin_serial_dma_tx_int + 0x0 }
logical irq 24 mapped : <0x000a7b28> { _bfin_mac_interrupt + 0x0 }
RETE: <0x00000000> { _do_one_initcall + 0xfffff000 }
RETN: <0x00357a44> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x000eb442> { _tcp_v4_rcv + 0x26e }
PC : <0x000e9284> { _tcp_v4_send_reset + 0xcc }
DCPLB_FAULT_ADDR: <0x0000015f> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x0000ffff> { _wait_consider_task + 0x3 }
PROCESSOR STATE:
R0 : 00000008 R1 : 160006fe R2 : 14000600 R3 : 0100007f
R4 : 00000002 R5 : 031ee664 R6 : 00000001 R7 : 0100007f
P0 : 031f3c00 P1 : 031ee678 P2 : 031ee664 P3 : 0100007f
P4 : 031ee678 P5 : 00000000 FP : 00000000 SP : 00357968
LB0: ffa018ac LT0: ffa018ac LC0: 00000000
LB1: 000eac54 LT1: 000eac54 LC1: 00000000
B0 : 861fb779 L0 : 00000000 M0 : 00000000 I0 : 0100007f
B1 : 0100007f L1 : 00000000 M1 : 00000000 I1 : 0100007f
B2 : b37ddee2 L2 : 00000000 M2 : 00000000 I2 : 00000010
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 00339ee4 ASTAT: 02002000
Hardware Trace:
0 Target : <0x00004954> { _trap_c + 0x0 }
Source : <0xffa00708> { _exception_to_level5 + 0x9c } CALL pcrel
1 Target : <0xffa0066c> { _exception_to_level5 + 0x0 }
Source : <0xffa004f6> { _bfin_return_from_exception + 0xe } RTX
2 Target : <0xffa004e8> { _bfin_return_from_exception + 0x0 }
Source : <0xffa005c0> { _ex_trap_c + 0x6c } JUMP.S
3 Target : <0xffa00554> { _ex_trap_c + 0x0 }
Source : <0xffa003d2> { _ex_workaround_261 + 0x22 } JUMP.S
4 Target : <0xffa003b0> { _ex_workaround_261 + 0x0 }
Source : <0xffa0079e> { _trap + 0x36 } JUMP (P4)
5 Target : <0xffa00784> { _trap + 0x1c }
Source : <0xffa00780> { _trap + 0x18 } IF !CC JUMP
6 Target : <0xffa00768> { _trap + 0x0 }
Source : <0xffa004f6> { _bfin_return_from_exception + 0xe } RTX
7 Target : <0xffa004e8> { _bfin_return_from_exception + 0x0 }
Source : <0xffa003c2> { _ex_workaround_261 + 0x12 } IF !CC JUMP
8 Target : <0xffa003b0> { _ex_workaround_261 + 0x0 }
Source : <0xffa0079e> { _trap + 0x36 } JUMP (P4)
9 Target : <0xffa00784> { _trap + 0x1c }
Source : <0xffa00780> { _trap + 0x18 } IF !CC JUMP
10 Target : <0xffa00768> { _trap + 0x0 }
Source : <0x000e9282> { _tcp_v4_send_reset + 0xca } 0x0000
11 Target : <0x000e9274> { _tcp_v4_send_reset + 0xbc }
Source : <0x000e9270> { _tcp_v4_send_reset + 0xb8 } IF !CC JUMP
12 Target : <0x000e926c> { _tcp_v4_send_reset + 0xb4 }
Source : <0x000e9268> { _tcp_v4_send_reset + 0xb0 } IF !CC JUMP
13 Target : <0x000e9264> { _tcp_v4_send_reset + 0xac }
Source : <0x000e9260> { _tcp_v4_send_reset + 0xa8 } IF !CC JUMP
14 Target : <0x000e9230> { _tcp_v4_send_reset + 0x78 }
Source : <0x000e9310> { _tcp_v4_send_reset + 0x158 } JUMP.S
15 Target : <0x000e92c4> { _tcp_v4_send_reset + 0x10c }
Source : <0x000e9224> { _tcp_v4_send_reset + 0x6c } IF !CC JUMP
Kernel Stack
Stack info:
SP: [0x00357f24] <0x00357f24> /* kernel dynamic memory */
Memory from 0x00357f20 to 00358000
00357f20: 00000001 [00325d78] 00008000 00002000 00000000 00358000 00325d78 00325d78
00357f40:<003202ea><ffa00e3c> 02002000 00324985 003256a9 00324984 003256a6 00000000
00357f60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00357f80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00357fa0: 00000000 00000000 00000000 00339f84 00338ed8 00339ee4 00339ef0 0032a444
00357fc0: 0032cd5c 00339f84 0032c990 ffffffff 0000013c 0032f88c 0032d8d4 00000001
00357fe0: 0032013c 00000004 00000010 0032f88c 00000004 00000004 0000013c 00000006
00358000: 85be412f
Return addresses in stack:
address : <0x003202ea> [ connect01 + 0x2aa ]
address : <0xffa00e3c> { _evt_system_call + 0x64 }
Modules linked in:
Kernel panic - not syncing: Kernel exception
--
Follow-ups
--- Michael Hennerich 2008-11-20 05:32:44
Same issue as:
[#4623] kernel oops featuring smsc911x_irqhandler when using NFS root
[#4593] random crash in tcp code
--- Sonic Zhang 2008-11-20 22:55:52
Need to check if it is a bug in TCP/IP stack of this rc kernel. Assign to Bryan
to review after next kernel update.
--- Mingquan Pan 2008-11-25 02:08:54
Bug [#4596] should also relate to this too.
--- Bernd Schmidt 2008-12-10 18:52:11
I'm assuming this is fixed by the checksum assembly fix. Reopen if there's
still a problem.
--- Pavel Frolov 2009-01-30 08:35:04
We still have the same behaviour (random crashes) - revision 6039
NULL pointer access
Kernel OOPS in progress
Deferred Exception context
No Valid process in current context
return address: [0x0011ab78]; contents of:
0x0011ab50: 0c45 5079 030c 1002 5041 5059 030c 1002
0x0011ab60: 5041 5051 030c 1002 5041 0000 6040 b1f1
0x0011ab70: b230 184a 0000 0000 [e4a8] 015f 4928 0200
0x0011ab80: e14d 001d e10d 63e8 a171 3056 b1b0 6482
SEQUENCER STATUS: Not tainted
SEQSTAT: 00060027 IPEND: c030 SYSCFG: 0006
EXCAUSE : 0x27
physical IVG14 asserted : <0xffa00adc> { _evt14_softirq + 0x0 }
physical IVG15 asserted : <0xffa00e1c> { _evt_system_call + 0x0 }
logical irq 6 mapped : <0xffa00388> { _timer_interrupt + 0x0 }
logical irq 10 mapped : <0x000ccd78> { _bfin_rtc_interrupt + 0x0
}
logical irq 12 mapped : <0x000e7400> { _rx_handler + 0x0 }
logical irq 13 mapped : <0x000e73a0> { _tx_handler + 0x0 }
logical irq 18 mapped : <0x000b9c88> { _bfin_serial_dma_rx_int +
0x0 }
logical irq 19 mapped : <0x000b9a0c> { _bfin_serial_dma_tx_int +
0x0 }
logical irq 20 mapped : <0x000b9c88> { _bfin_serial_dma_rx_int +
0x0 }
logical irq 21 mapped : <0x000b9a0c> { _bfin_serial_dma_tx_int +
0x0 }
logical irq 24 mapped : <0x000c1e84> { _bfin_mac_interrupt + 0x0
}
logical irq 45 mapped : <0x000e855c> { _err_handler + 0x0 }
RETE: <0x00000000> { _do_one_initcall + 0xfffff000 }
RETN: <0x001efcec> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x0011cc2c> { _tcp_v4_rcv + 0x218 }
PC : <0x0011ab78> { _tcp_v4_send_reset + 0xc4 }
DCPLB_FAULT_ADDR: <0x0000015f> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x0011ab78> { _tcp_v4_send_reset + 0xc4 }
PROCESSOR STATE:
R0 : 00000008 R1 : 9b71f291 R2 : 14000600 R3 : 710aa8c0
R4 : 00000000 R5 : 00815020 R6 : 00000002 R7 : 166743d1
P0 : 01b720a0 P1 : 00815034 P2 : 00815020 P3 : 00000000
P4 : 00815034 P5 : 00000000 FP : 710aa8c0 SP : 001efc10
LB0: ffa016f4 LT0: ffa016f4 LC0: 00000000
LB1: 000088f6 LT1: 000088f6 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 710aa8c0
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 166743d1
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : ffff3dc9
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 0292f340 A0.x: 00000000 A1.w: 00000dd0 A1.x: 00000000
USP : 001f0000 ASTAT: 02002042
Hardware Trace:
0 Target : <0x0000492c> { _trap_c + 0x0 }
Source : <0xffa0078a> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa006ec> { _exception_to_level5 + 0x0 }
Source : <0xffa00582> { _bfin_return_from_exception + 0x6 } RTX
2 Target : <0xffa0057c> { _bfin_return_from_exception + 0x0 }
Source : <0xffa00646> { _ex_trap_c + 0x66 } 0x0046
3 Target : <0xffa005e0> { _ex_trap_c + 0x0 }
Source : <0xffa00816> { _trap + 0x2a } 0x5f65
4 Target : <0xffa007ec> { _trap + 0x0 }
Source : <0x0011ab76> { _tcp_v4_send_reset + 0xc2 } 0x0000
5 Target : <0x0011ab6a> { _tcp_v4_send_reset + 0xb6 }
Source : <0x0011ab66> { _tcp_v4_send_reset + 0xb2 } IF !CC JUMP
6 Target : <0x0011ab62> { _tcp_v4_send_reset + 0xae }
Source : <0x0011ab5e> { _tcp_v4_send_reset + 0xaa } IF !CC JUMP
7 Target : <0x0011ab5a> { _tcp_v4_send_reset + 0xa6 }
Source : <0x0011ab56> { _tcp_v4_send_reset + 0xa2 } IF !CC JUMP
8 Target : <0x0011aae2> { _tcp_v4_send_reset + 0x2e }
Source : <0x0011aad8> { _tcp_v4_send_reset + 0x24 } IF !CC JUMP
9 Target : <0x0011aab4> { _tcp_v4_send_reset + 0x0 }
Source : <0x0011cc28> { _tcp_v4_rcv + 0x214 } CALL pcrel
10 Target : <0x0011cc1e> { _tcp_v4_rcv + 0x20a }
Source : <0x000f0500> { ___skb_checksum_complete + 0x14 } RTS
11 Target : <0x000f04fa> { ___skb_checksum_complete + 0xe }
Source : <0x000f04dc> { ___skb_checksum_complete_head + 0x58 }
RTS
12 Target : <0x000f04b0> { ___skb_checksum_complete_head + 0x2c }
Source : <0x000f04a2> { ___skb_checksum_complete_head + 0x1e } IF
!CC
JUMP
13 Target : <0x000f049c> { ___skb_checksum_complete_head + 0x18 }
Source : <0x000ee17e> { _skb_checksum + 0x196 } RTS
14 Target : <0x000ee174> { _skb_checksum + 0x18c }
Source : <0x000ee024> { _skb_checksum + 0x3c } IF !CC JUMP
15 Target : <0x000ee020> { _skb_checksum + 0x38 }
Source : <0x0014ff64> { _csum_partial + 0x20 } RTS
Kernel Stack
Stack info:
SP: [0x001eff58] <0x001eff58> /* kernel dynamic memory */
FP: (0x001effe8)
Memory from 0x001eff50 to 001f0000
001eff50: 00000000 00000000 [00000000] ffff3dc9 00000000 0000c350
001f0000
001d993c
001eff70: ffa0025c 001ee000 001c39a4 001d993c 001ee000 ffa00a10
001c3104
00000000
001eff90: 00000000 00000000 00000065 00000008 004e80a0 0000ffff
0000ffff
ffa00a10
001effb0: 00000006 00000000 00000000 00000000 001f06be 001ce2a4
00209594
001c3110
001effd0: 00000000 00209594 001c2e64 00000021 001f00a8
<0020b5e0>(001f0000)<001fe1b6>
001efff0: 00000000 00000000 00000000 ffb00000 (464c457f)
Return addresses in stack:
address : <0x0020b5e0> [ /lib/libm-0.9.29.so + 0xb5e0 ]
frame 1 : <0x001fe1b6> { _real_start + 0x6e }
Modules linked in: gpio_keys
Kernel panic - not syncing: Kernel exception
--- Michael Hennerich 2009-01-30 09:12:21
Pavel,
can you please send me (attach) your
linux-2.6.x/net/ipv4/tcp_ipv4.o object file (svn revision 6039)
What toolchain are you using (svn rev, etc.)
Best regards,
Michael
--- Michael Hennerich 2009-01-30 10:03:26
Pavel,
also on what processor silicon rev are you running.
What is your development board?
EZKIT/STAMP ?
-Michael
--- Pavel Frolov 2009-01-30 10:36:15
We are using blackfin-toolchain-uclibc-full-08r1-8.i386 and
blackfin-toolchain-08r1-8.i386. Our board is based on bf537-stamp. Processor
revision - 0.2.
--- Sonic Zhang 2009-02-02 03:13:46
This bug is only fixed in curren SVN trunk and upcoming 2009R1 release. Not in
08R1 release. Please wait for the 09R1 release or back port by yourself.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found