[#3958] [ltp]test case execve05 will fail sometimes on BF561-EZKIT
Submitted By: Vivi Li
Open Date
2008-03-06 02:44:57 Close Date
2009-01-08 05:35:37
Priority:
Medium Assignee:
Sonic Zhang
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
Category:
N/A Board:
N/A
Processor:
N/A Silicon Revision:
Is this bug repeatable?:
Yes Resolution:
Fixed
Uboot version or rev.:
Toolchain version or rev.:
08r1-8
App binary format:
N/A
Summary: [ltp]test case execve05 will fail sometimes on BF561-EZKIT
Details:
On 08r1 branch, run ltp testcase execve05 on BF561-EZKIT, it will fail sometimes, especially with combinations wb_slab_np2/wt_slob/wt_slab_buddy.
Below is the log:
--
root:/> execve05 -F /bin/test3
NULL pointer access (probably)
Defered Exception context
CURRENT PROCESS:
COMM=test3 PID=97
TEXT = 0x031e8040-0x031e8f60 DATA = 0x031e8f64-0x031e9104
BSS = 0x031e9104-0x031e9354 USER-STACK = 0x031eafe4
return address: [0x031e8e02]; contents of:
0x031e8de0: 0010 434b c682 8043 5603 c682 8280 e146
0x031e8df0: 7efe e147 8101 3212 5748 e106 feff e107
0x031e8e00: 0100 [9012] 5032 43d1 5808 5438 0c00 1408
0x031e8e10: 5815 5070 43c0 5841 5479 0c01 1ff3 e491
SEQUENCER STATUS: Not tainted
SEQSTAT: 00060027 IPEND: 0030 SYSCFG: 0006
HWERRCAUSE: 0x18
EXCAUSE : 0x27
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x0049e000> /* unknown address */
RETX: <0x031e8e02> [ test3 + 0xdc2 ]
RETS: <0x031e8be0> [ test3 + 0xba0 ]
PC : <0x031e8e02> [ test3 + 0xdc2 ]
DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x031e8e02> [ test3 + 0xdc2 ]
PROCESSOR STATE:
R0 : 00002f2f R1 : 2f2f0000 R2 : 00000000 R3 : 0000002f
R4 : 031e8140 R5 : 2f2f2f2f R6 : 7efefeff R7 : 81010100
P0 : 031eaf5d P1 : 00000003 P2 : 00000000 P3 : 031eafe8
P4 : 002ec2d4 P5 : 031e8f64 FP : 031eaf68 SP : 0049df24
LB0: 031e8aa5 LT0: 031e8aa4 LC0: 00000000
LB1: 03011c9d LT1: 03011c96 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 031eaefd
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 002f1f68
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 031eaf68 ASTAT: 02002020
Hardware Trace:
0 Target : <0x00004858> { _trap_c + 0x0 }
Source : <0xffa00774> { _exception_to_level5 + 0xb4 }
1 Target : <0xffa006c0> { _exception_to_level5 + 0x0 }
Source : <0xffa0061c> { _ex_trap_c + 0x5c }
2 Target : <0xffa005c0> { _ex_trap_c + 0x0 }
Source : <0xffa0044a> { _ex_workaround_261 + 0x22 }
3 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }
Source : <0xffa00814> { _trap + 0x28 }
4 Target : <0xffa007ec> { _trap + 0x0 }
Source : <0xffa00562> { _bfin_return_from_exception + 0xe }
5 Target : <0xffa00554> { _bfin_return_from_exception + 0x0 }
Source : <0xffa0043a> { _ex_workaround_261 + 0x12 }
6 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }
Source : <0xffa00814> { _trap + 0x28 }
7 Target : <0xffa007ec> { _trap + 0x0 }
Source : <0x031e8dfe> [ test3 + 0xdbe ]
8 Target : <0x031e8de2> [ test3 + 0xda2 ]
Source : <0x031e8db2> [ test3 + 0xd72 ]
9 Target : <0x031e8da4> [ test3 + 0xd64 ]
Source : <0x031e8bdc> [ test3 + 0xb9c ]
10 Target : <0x031e8bd8> [ test3 + 0xb98 ]
Source : <0x031e8bd0> [ test3 + 0xb90 ]
11 Target : <0x031e8bc0> [ test3 + 0xb80 ]
Source : <0x031e872a> [ test3 + 0x6ea ]
12 Target : <0x031e870e> [ test3 + 0x6ce ]
Source : <0x031e8210> [ test3 + 0x1d0 ]
13 Target : <0x031e81fe> [ test3 + 0x1be ]
Source : <0x031e8544> [ test3 + 0x504 ]
14 Target : <0x031e853c> [ test3 + 0x4fc ]
Source : <0x031e8594> [ test3 + 0x554 ]
15 Target : <0x031e858c> [ test3 + 0x54c ]
Source : <0x031e8aa6> [ test3 + 0xa66 ]
Stack from 0049df04:
00000000 ffa00778 00134570 00134570 00134568 031eaf5c 031e8140 031e882c
031e8e02 00000030 00060027 00000000 0049e000 031e8e02 031e8e02 031e8be0
00002f2f 02002020 03011c9d 031e8aa5 03011c96 031e8aa4 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000 00000000 002f1f68 031eaefd 031eaf68 031eaf68 031e8f64 002ec2d4
Call Trace:
[<00002f2f>] _do_signal+0x2cb/0xdac
[<00002f2f>] _do_signal+0x2cb/0xdac
root:/> execve05 -F /bin/test3
execve05 1 PASS : call generated expected ETXTBSY error
root:/>
--
Follow-ups
--- Mike Frysinger 2008-04-03 21:40:19
i think this was just the execv bug in uClibc that is now fixed ... is this
still an issue ?
i ran on trunk:
while /execve05 -F /test3 ; do :; done
and it seemed to work OK
--- Bryan Wu 2008-04-07 03:11:07
In the trunk:
We tested trunk kernel compiled with trunk toolchain. It runs OK, but when I
try CTRL+C to stop the while loop here, it crashed:
--
execve05 1 PASS : call generated expected ETXTBSY error
Undefined instruction
- May be used to emulate instructions that are not defined for
a particular processor implementation.
Deferred Exception context
CURRENT PROCESS:
COMM=execve05 PID=351
TEXT = 0x00300040-0x00309b20 DATA = 0x00309b24-0x0030c414
BSS = 0x0030c414-0x00310e54 USER-STACK = 0x00311f70
return address: [0x0030c414]; contents of:
0x0030c3f0: adc4 0030 adc4 0030 b0c4 0030 b0c4 0030
0x0030c400: 0000 0000 ffff ffff 0000 0000 ffff ffff
0x0030c410: 0000 0000 [0001] 0000 0000 0000 0000 0000
0x0030c420: 0000 0000 0000 0000 0000 0000 0000 0000
SEQUENCER STATUS: Not tainted
SEQSTAT: 00002021 IPEND: 0030 SYSCFG: 0006
HWERRCAUSE: 0x0
EXCAUSE : 0x21
RETE: <0x00000000> { _run_init_process + 0xfffff000 }
RETN: <0x03798000> /* unknown address */
RETX: <0x0030c414> [ execve05 + 0xc414 ]
RETS: <0x0030286c> [ execve05 + 0x282c ]
PC : <0x0030c414> [ execve05 + 0xc414 ]
DCPLB_FAULT_ADDR: <0x00310e48> [ execve05 + 0x10e48 ]
ICPLB_FAULT_ADDR: <0x0030c414> [ execve05 + 0xc414 ]
PROCESSOR STATE:
R0 : 0030c414 R1 : 00000001 R2 : 00000001 R3 : 00000003
R4 : 0030013c R5 : 00000003 R6 : 0030cf80 R7 : 00000000
P0 : 00310d29 P1 : 00310d29 P2 : 0030c414 P3 : 00311f74
P4 : 0030c414 P5 : 00309b24 FP : 00311d40 SP : 03797f24
LB0: 00304cf9 LT0: 00304cf6 LC0: 00000000
LB1: 00304021 LT1: 00304020 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 00311544
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00311f74
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 00311d30 ASTAT: 02003004
Hardware Trace:
0 Target : <0x0000457c> { _trap_c + 0x0 }
Source : <0xffa006c4> { _exception_to_level5 + 0xb4 }
1 Target : <0xffa00610> { _exception_to_level5 + 0x0 }
Source : <0xffa0056c> { _ex_trap_c + 0x5c }
2 Target : <0xffa00510> { _ex_trap_c + 0x0 }
Source : <0xffa00764> { _trap + 0x28 }
3 Target : <0xffa0073c> { _trap + 0x0 }
Source : <0x0030286a> [ execve05 + 0x282a ]
4 Target : <0x00302852> [ execve05 + 0x2812 ]
Source : <0x00302532> [ execve05 + 0x24f2 ]
5 Target : <0x0030252e> [ execve05 + 0x24ee ]
Source : <0x00302292> [ execve05 + 0x2252 ]
6 Target : <0x0030228e> [ execve05 + 0x224e ]
Source : <0x00302284> [ execve05 + 0x2244 ]
7 Target : <0x00302268> [ execve05 + 0x2228 ]
Source : <0x00302220> [ execve05 + 0x21e0 ]
8 Target : <0x003021f4> [ execve05 + 0x21b4 ]
Source : <0x003021e2> [ execve05 + 0x21a2 ]
9 Target : <0x003021cc> [ execve05 + 0x218c ]
Source : <0x0030217e> [ execve05 + 0x213e ]
10 Target : <0x00302174> [ execve05 + 0x2134 ]
Source : <0x0030215c> [ execve05 + 0x211c ]
11 Target : <0x0030215c> [ execve05 + 0x211c ]
Source : <0x00303708> [ execve05 + 0x36c8 ]
12 Target : <0x00303704> [ execve05 + 0x36c4 ]
Source : <0x003037a2> [ execve05 + 0x3762 ]
13 Target : <0x00303788> [ execve05 + 0x3748 ]
Source : <0x00303dc0> [ execve05 + 0x3d80 ]
14 Target : <0x00303db8> [ execve05 + 0x3d78 ]
Source : <0x00303da6> [ execve05 + 0x3d66 ]
15 Target : <0x00303da0> [ execve05 + 0x3d60 ]
Source : <0x00303c18> [ execve05 + 0x3bd8 ]
Stack from 03797f04:
00311f74 ffa006c8 0015da4c 0015da4c 0015da48 00000000 0030013c
00402eda
0030c414 00000030 00002021 00000000 03798000 0030c414 0030c414
0030286c
0030c414 02003004 00304021 00304cf9 00304020 00304cf6 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00311f74 00311544 00311d30 00311d40 00309b24
0030c414
Call Trace:
Undefined instruction
- May be used to emulate instructions that are not defined for
a particular processor implementation.
Deferred Exception context
CURRENT PROCESS:
COMM=execve05 PID=351
TEXT = 0x00300040-0x00309b20 DATA = 0x00309b24-0x0030c414
BSS = 0x0030c414-0x00310e54 USER-STACK = 0x00311f70
return address: [0x0030c414]; contents of:
0x0030c3f0: adc4 0030 adc4 0030 b0c4 0030 b0c4 0030
0x0030c400: 0000 0000 ffff ffff 0000 0000 ffff ffff
0x0030c410: 0000 0000 [0001] 0000 0000 0000 0000 0000
0x0030c420: 0000 0000 0000 0000 0000 0000 0000 0000
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062021 IPEND: 0030 SYSCFG: 0006
HWERRCAUSE: 0x18
EXCAUSE : 0x21
RETE: <0x00000000> { _run_init_process + 0xfffff000 }
RETN: <0x03798000> /* unknown address */
RETX: <0x0030c414> [ execve05 + 0xc414 ]
RETS: <0x0030286c> [ execve05 + 0x282c ]
PC : <0x0030c414> [ execve05 + 0xc414 ]
DCPLB_FAULT_ADDR: <0x00310e48> [ execve05 + 0x10e48 ]
ICPLB_FAULT_ADDR: <0x0030c414> [ execve05 + 0xc414 ]
PROCESSOR STATE:
R0 : 0030c414 R1 : 00000001 R2 : 00000001 R3 : 00000003
R4 : 0030013c R5 : 00000003 R6 : 0030cf80 R7 : 00000000
P0 : 00310ba1 P1 : 00310ba1 P2 : 0030c414 P3 : 00311f74
P4 : 0030c414 P5 : 00309b24 FP : 00311bb8 SP : 03797f24
LB0: 00304cf9 LT0: 00304cf6 LC0: 00000000
LB1: 00304021 LT1: 00304020 LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 003113bc
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00311f74
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 00311ba8 ASTAT: 02003004
Hardware Trace:
0 Target : <0x0000457c> { _trap_c + 0x0 }
Source : <0xffa006c4> { _exception_to_level5 + 0xb4 }
1 Target : <0xffa00610> { _exception_to_level5 + 0x0 }
Source : <0xffa0056c> { _ex_trap_c + 0x5c }
2 Target : <0xffa00510> { _ex_trap_c + 0x0 }
Source : <0xffa00764> { _trap + 0x28 }
3 Target : <0xffa0073c> { _trap + 0x0 }
Source : <0x0030286a> [ execve05 + 0x282a ]
4 Target : <0x00302852> [ execve05 + 0x2812 ]
Source : <0x00302532> [ execve05 + 0x24f2 ]
5 Target : <0x0030252e> [ execve05 + 0x24ee ]
Source : <0x00302292> [ execve05 + 0x2252 ]
6 Target : <0x0030228e> [ execve05 + 0x224e ]
Source : <0x00302284> [ execve05 + 0x2244 ]
7 Target : <0x00302268> [ execve05 + 0x2228 ]
Source : <0x00302220> [ execve05 + 0x21e0 ]
8 Target : <0x003021f4> [ execve05 + 0x21b4 ]
Source : <0x003021e2> [ execve05 + 0x21a2 ]
9 Target : <0x003021cc> [ execve05 + 0x218c ]
Source : <0x0030217e> [ execve05 + 0x213e ]
10 Target : <0x00302174> [ execve05 + 0x2134 ]
Source : <0x0030215c> [ execve05 + 0x211c ]
11 Target : <0x0030215c> [ execve05 + 0x211c ]
Source : <0x00303708> [ execve05 + 0x36c8 ]
12 Target : <0x00303704> [ execve05 + 0x36c4 ]
Source : <0x003037a2> [ execve05 + 0x3762 ]
13 Target : <0x00303788> [ execve05 + 0x3748 ]
Source : <0x00303dc0> [ execve05 + 0x3d80 ]
14 Target : <0x00303db8> [ execve05 + 0x3d78 ]
Source : <0x00303da6> [ execve05 + 0x3d66 ]
15 Target : <0x00303da0> [ execve05 + 0x3d60 ]
Source : <0x00303c18> [ execve05 + 0x3bd8 ]
Stack from 03797f04:
00311f74 ffa006c8 0015da50 0015da50 0015da48 00000000 0030013c
001828b2
0030c414 00000030 00062021 00000000 03798000 0030c414 0030c414
0030286c
0030c414 02003004 00304021 00304cf9 00304020 00304cf6 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00311f74 003113bc 00311ba8 00311bb8 00309b24
0030c414
Call Trace:
Illegal instruction
--
I use 08r1 branch head kernel with trunk toolchain:
Some passed, some crashed
and 08r1 branch head kernel with 08r1 release toolchain, this test failed too:
--
root:/> while /execve05 -F /test3 ; do :; done
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
execve05 1 PASS : call generated expected ETXTBSY error
NULL pointer access (probably)
Defered Exception context
CURRENT PROCESS:
COMM=test3 PID=133
TEXT = 0x00158040-0x00158fc0 DATA = 0x00158fc4-0x00159194
BSS = 0x00159194-0x001593e4 USER-STACK = 0x0015afe8
return address: [0x00158e66]; contents of:
0x00158e40: 0000 0528 0010 434b c682 8043 5603 c682
0x00158e50: 8280 e146 7efe e147 8101 3212 5748 e106
0x00158e60: feff e107 0100 [9012] 5032 43d1 5808 5438
0x00158e70: 0c00 1408 5815 5070 43c0 5841 5479 0c01
SEQUENCER STATUS: Not tainted
SEQSTAT: 00002027 IPEND: 0030 SYSCFG: 0006
HWERRCAUSE: 0x0
EXCAUSE : 0x27
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00158000> [ test3 + 0x0 ]
RETX: <0x00158e66> [ test3 + 0xe26 ]
RETS: <0x00158c08> [ test3 + 0xbc8 ]
PC : <0x00158e66> [ test3 + 0xe26 ]
DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x00158e66> [ test3 + 0xe26 ]
PROCESSOR STATE:
R0 : 00002f2f R1 : 2f2f0000 R2 : 00000000 R3 : 0000002f
R4 : 00158140 R5 : 2f2f2f2f R6 : 7efefeff R7 : 81010100
P0 : 0015af61 P1 : 00000003 P2 : 00000000 P3 : 0015afec
P4 : 0016c924 P5 : 00158fc4 FP : 0015af6c SP : 00157f24
LB0: 00158acd LT0: 00158acc LC0: 00000000
LB1: 00312281 LT1: 0031227a LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 0015af01
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00172f70
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 0015af6c ASTAT: 02002020
Hardware Trace:
0 Target : <0x000048b4> { _trap_c + 0x0 }
Source : <0xffa00774> { _exception_to_level5 + 0xb4 }
1 Target : <0xffa006c0> { _exception_to_level5 + 0x0 }
Source : <0xffa0061c> { _ex_trap_c + 0x5c }
2 Target : <0xffa005c0> { _ex_trap_c + 0x0 }
Source : <0xffa0044a> { _ex_workaround_261 + 0x22 }
3 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }
Source : <0xffa00814> { _trap + 0x28 }
4 Target : <0xffa007ec> { _trap + 0x0 }
Source : <0xffa00562> { _bfin_return_from_exception + 0xe }
5 Target : <0xffa00554> { _bfin_return_from_exception + 0x0 }
Source : <0xffa0043a> { _ex_workaround_261 + 0x12 }
6 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }
Source : <0xffa00814> { _trap + 0x28 }
7 Target : <0xffa007ec> { _trap + 0x0 }
Source : <0x00158e62> [ test3 + 0xe22 ]
8 Target : <0x00158e46> [ test3 + 0xe06 ]
Source : <0x00158e16> [ test3 + 0xdd6 ]
9 Target : <0x00158e08> [ test3 + 0xdc8 ]
Source : <0x00158c04> [ test3 + 0xbc4 ]
10 Target : <0x00158c00> [ test3 + 0xbc0 ]
Source : <0x00158bf8> [ test3 + 0xbb8 ]
11 Target : <0x00158be8> [ test3 + 0xba8 ]
Source : <0x0015873a> [ test3 + 0x6fa ]
12 Target : <0x0015871e> [ test3 + 0x6de ]
Source : <0x00158210> [ test3 + 0x1d0 ]
13 Target : <0x001581fe> [ test3 + 0x1be ]
Source : <0x00158554> [ test3 + 0x514 ]
14 Target : <0x0015854c> [ test3 + 0x50c ]
Source : <0x001585a4> [ test3 + 0x564 ]
15 Target : <0x0015859c> [ test3 + 0x55c ]
Source : <0x00158ace> [ test3 + 0xa8e ]
Stack from 00157f04:
00000000 ffa00778 0013456c 0013456c 00134568 0015af60 00158140
0015883c
00158e66 00000030 00002027 00000000 00158000 00158e66 00158e66
00158c08
00002f2f 02002020 00312281 00158acd 0031227a 00158acc 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00172f70 0015af01 0015af6c 0015af6c 00158fc4
0016c924
Call Trace:
[<00002f2f>] _do_signal+0x2cb/0xdac
[<00002f2f>] _do_signal+0x2cb/0xdac
NULL pointer access (probably)
Defered Exception context
CURRENT PROCESS:
COMM=test3 PID=136
TEXT = 0x00158040-0x00158fc0 DATA = 0x00158fc4-0x00159194
BSS = 0x00159194-0x001593e4 USER-STACK = 0x0015afe8
return address: [0x00158e66]; contents of:
0x00158e40: 0000 0528 0010 434b c682 8043 5603 c682
0x00158e50: 8280 e146 7efe e147 8101 3212 5748 e106
0x00158e60: feff e107 0100 [9012] 5032 43d1 5808 5438
0x00158e70: 0c00 1408 5815 5070 43c0 5841 5479 0c01
SEQUENCER STATUS: Not tainted
SEQSTAT: 00062027 IPEND: 0030 SYSCFG: 0006
HWERRCAUSE: 0x18
EXCAUSE : 0x27
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00154000> { _tcp_init + 0x54 }
RETX: <0x00158e66> [ test3 + 0xe26 ]
RETS: <0x00158c08> [ test3 + 0xbc8 ]
PC : <0x00158e66> [ test3 + 0xe26 ]
DCPLB_FAULT_ADDR: <0x00000000> /* Maybe null pointer? */
ICPLB_FAULT_ADDR: <0x00158e66> [ test3 + 0xe26 ]
PROCESSOR STATE:
R0 : 00002f2f R1 : 2f2f0000 R2 : 00000000 R3 : 0000002f
R4 : 00158140 R5 : 2f2f2f2f R6 : 7efefeff R7 : 81010100
P0 : 0015af61 P1 : 00000003 P2 : 00000000 P3 : 0015afec
P4 : 0016c924 P5 : 00158fc4 FP : 0015af6c SP : 00153f24
LB0: 00158acd LT0: 00158acc LC0: 00000000
LB1: 00312281 LT1: 0031227a LC1: 00000000
B0 : 00000000 L0 : 00000000 M0 : 00000000 I0 : 0015af01
B1 : 00000000 L1 : 00000000 M1 : 00000000 I1 : 00172f70
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000000
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: 00000000 A0.x: 00000000 A1.w: 00000000 A1.x: 00000000
USP : 0015af6c ASTAT: 02002020
Hardware Trace:
0 Target : <0x000048b4> { _trap_c + 0x0 }
Source : <0xffa00774> { _exception_to_level5 + 0xb4 }
1 Target : <0xffa006c0> { _exception_to_level5 + 0x0 }
Source : <0xffa0061c> { _ex_trap_c + 0x5c }
2 Target : <0xffa005c0> { _ex_trap_c + 0x0 }
Source : <0xffa0044a> { _ex_workaround_261 + 0x22 }
3 Target : <0xffa00428> { _ex_workaround_261 + 0x0 }
Source : <0xffa00814> { _trap + 0x28 }
4 Target : <0xffa007ec> { _trap + 0x0 }
Source : <0x00158e62> [ test3 + 0xe22 ]
5 Target : <0x00158e46> [ test3 + 0xe06 ]
Source : <0x00158e16> [ test3 + 0xdd6 ]
6 Target : <0x00158e08> [ test3 + 0xdc8 ]
Source : <0x00158c04> [ test3 + 0xbc4 ]
7 Target : <0x00158c00> [ test3 + 0xbc0 ]
Source : <0x00158bf8> [ test3 + 0xbb8 ]
8 Target : <0x00158be8> [ test3 + 0xba8 ]
Source : <0x0015873a> [ test3 + 0x6fa ]
9 Target : <0x0015871e> [ test3 + 0x6de ]
Source : <0x00158210> [ test3 + 0x1d0 ]
10 Target : <0x001581fe> [ test3 + 0x1be ]
Source : <0x00158554> [ test3 + 0x514 ]
11 Target : <0x0015854c> [ test3 + 0x50c ]
Source : <0x001585a4> [ test3 + 0x564 ]
12 Target : <0x0015859c> [ test3 + 0x55c ]
Source : <0x00158ace> [ test3 + 0xa8e ]
13 Target : <0x00158abc> [ test3 + 0xa7c ]
Source : <0x00158ab8> [ test3 + 0xa78 ]
14 Target : <0x00158a8c> [ test3 + 0xa4c ]
Source : <0x00158598> [ test3 + 0x558 ]
15 Target : <0x00158594> [ test3 + 0x554 ]
Source : <0x00158b04> [ test3 + 0xac4 ]
Stack from 00153f04:
00000000 ffa00778 00134570 00134570 00134568 0015af60 00158140
0015883c
00158e66 00000030 00062027 00000000 00154000 00158e66 00158e66
00158c08
00002f2f 02002020 00312281 00158acd 0031227a 00158acc 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
00000000 00000000 00172f70 0015af01 0015af6c 0015af6c 00158fc4
0016c924
Call Trace:
[<00002f2f>] _do_signal+0x2cb/0xdac
[<00002f2f>] _do_signal+0x2cb/0xdac
execve05 1 PASS : call generated expected ETXTBSY error
--
I guess that some uclibc execve bug fixing did not be backported to toolchain
08R1 branch.
-Bryan Wu
--- Mike Frysinger 2008-04-07 04:03:55
all the uclibc exec changes should be in the branch (as well as the last
release)
you have the binary/symbols in question ... please decode them. i dont know
what all the offsets in "test3" are in your dump
--- Sonic Zhang 2009-01-07 05:34:47
The crash disappears on SVN head. Child process should be dealt with properly
for NOMMU. Fixed.
--- Vivi Li 2009-01-08 05:35:08
Patch is checked in latest ltp-full-20081130.
Close this bug.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found