Wind River Support Network

HomeDefectsLIN5-4939
Fixed

LIN5-4939 : [WRLinux 5.0.1 Async][fsl_t4xxx] There are some call traces when valiating uprobe.

Created: Sep 4, 2013    Updated: Dec 19, 2017
Resolved Date: Sep 23, 2013
Found In Version: 5.0.1
Fix Version: 5.0.1.8
Severity: Severe
Applicable for: Wind River Linux 5
Component/s: BSP - Async

Description

There are some call traces when valiating uprobe.

------------[ cut here ]------------
WARNING: at project/bitbake_build/tmp/work/fsl_t4xxx-wrs-linux/linux-windriver-3.4-r0/linux/kernel/events/uprobes.c:1543
Modules linked in: jbd2 ext4 fat vfat minix loop exportfs xfs jfs reiserfs squashfs isofs cramfs jffs2 yaffs msdos blowfish_common blowfish_generic cast5 aes_generic ecb arc4 crypto_null deflate sha256_generic sha512_generic camellia_generic [last unloaded: tipc]
NIP: c0000000001569c4 LR: c000000000156980 CTR: c00000000011a8b0
REGS: c000000174d27a30 TRAP: 0700   Tainted: P           O  (3.4.43-rt56-WR5.0.1.0_preempt-rt)
MSR: 0000000080029000 <CE,EE,ME>  CR: 24000028  XER: 20000000
SOFTE: 1
TASK = c00000015ea1c300[19178] 'sleep' THREAD: c000000174d24000 CPU: 11
GPR00: 0000000000000001 c000000174d27cb0 c000000000ec1f78 0000000000000001 
GPR04: c00000000015697c c000000174d27c18 0000000000000000 c000000154f2a0d8 
GPR08: 0000000000000000 c000000000d9cea3 000000000886d000 0000000000000001 
GPR12: 0000000028000082 c00000000fffcc00 0000000000000000 0000000000000000 
GPR16: 0000000000000000 0000000000000000 00000000100c7c48 0000000010115988 
GPR20: 000000000ffc7d18 000000000ffc3a54 000000000000000d 000000000ffc7d18 
GPR24: 00000000ffd6fee0 000000000ffca3fc 00000000ffd6ff14 000000000ffc7780 
GPR28: 0000000000000000 c000000174d27ea0 c000000000dfabc8 c0000001741fae80 
NIP [c0000000001569c4] .uprobe_notify_resume+0x84/0x830
LR [c000000000156980] .uprobe_notify_resume+0x40/0x830
Call Trace:
[c000000174d27cb0] [c000000000156980] .uprobe_notify_resume+0x40/0x830 (unreliable)
[c000000174d27da0] [c000000000000d90] .return_to_handler+0x0/0x34 (.show_regs+0x1ec/0x380)
[c000000174d27e30] [c000000000000d90] .return_to_handler+0x0/0x34 (.report_bug+0xac/0x1a0)
Instruction dump:
801f0000 2f800001 419e00a4 2f800003 eb9f0010 419e0468 2f800004 419e0480 
e93e8068 88090001 68000001 7c0b07b4 <0b000000> 2fab0000 3b7c007c 409e074c 
---[ end trace 0000000000000002 ]---
Unable to handle kernel paging request for data at address 0x00000018
Unable to handle kernel paging request for data at address 0x00000018
Faulting instruction address: 0xc000000000154ba4
Oops: Kernel access of bad area, sig: 11 [#1]
PREEMPT SMP NR_CPUS=24 LTT NESTING LEVEL : 0 
T4240 QDS
Modules linked in: jbd2 ext4 fat vfat minix loop exportfs xfs jfs reiserfs squashfs isofs cramfs jffs2 yaffs msdos blowfish_common blowfish_generic cast5 aes_generic ecb arc4 crypto_null deflate sha256_generic sha512_generic camellia_generic [last unloaded: tipc]
NIP: c000000000154ba4 LR: c000000000154b98 CTR: c00000000011a8b0
REGS: c00000014c12f9b0 TRAP: 0300   Tainted: P        W  O  (3.4.43-rt56-WR5.0.1.0_preempt-rt)
MSR: 0000000080029000 <CE,EE,ME>  CR: 24002884  XER: 20000000
SOFTE: 1
DEAR: 0000000000000018, ESR: 0000000000000000
TASK = c0000001641a2140[25477] 'tcf-agent' THREAD: c00000014c12c000 CPU: 9
GPR00: c000000000154b98 c00000014c12fc30 c000000000ec1f78 0000000000000001 
GPR04: c000000000154b94 c00000014c12fb98 0000000000000000 c000000172a340c0 
GPR08: 0000000000000000 0000000000000018 000000000884d000 c000000000d45690 
GPR12: 0000000028002882 c00000000fffc400 0000000000000000 0000000000000000 
GPR16: 00000000f691b000 00000000100621e0 00000000100621a0 0000000010002d10 
GPR20: 0000000000000003 0000000010029948 000000001002991c 00000000100298f0 
GPR24: 0000000010030000 0000000010046210 0000000000000000 000000000000007c 
GPR28: 0000000000000000 c00000014c12fea0 c000000000dfabc8 0000000000000000 
NIP [c000000000154ba4] .put_uprobe+0x24/0x60
LR [c000000000154b98] .put_uprobe+0x18/0x60
Call Trace:
[c00000014c12fc30] [c000000000154b98] .put_uprobe+0x18/0x60 (unreliable)
[c00000014c12fcb0] [c000000000000d90] .return_to_handler+0x0/0x34 (.show_regs+0x1ec/0x380)
[c00000014c12fda0] [c000000000000d90] .return_to_handler+0x0/0x34 (.die+0x204/0x410)
[c00000014c12fe30] [c000000000000d90] .return_to_handler+0x0/0x34 (.bad_page_fault+0xb8/0x130)
Instruction dump:
4e800020 60000000 60000000 7c0802a6 f8010010 fbe1fff8 f821ff81 7c7f1b78 
4beac1a1 60000000 393f0018 7c0004ac <7c004828> 3000ffff 7c00492d 40a2fff4 
---[ end trace 0000000000000003 ]---

Unable to handle kernel paging request for data at address 0x00000018
Faulting instruction address: 0xc000000000154ba4
Oops: Kernel access of bad area, sig: 11 [#2]
PREEMPT SMP NR_CPUS=24 LTT NESTING LEVEL : 0 
T4240 QDS
Modules linked in: jbd2 ext4 fat vfat minix loop exportfs xfs jfs reiserfs squashfs isofs cramfs jffs2 yaffs msdos blowfish_common blowfish_generic cast5 aes_generic ecb arc4 crypto_null deflate sha256_generic sha512_generic camellia_generic [last unloaded: tipc]
NIP: c000000000154ba4 LR: c000000000154b98 CTR: c00000000011a8b0
REGS: c0000001729cb9b0 TRAP: 0300   Tainted: P      D W  O  (3.4.43-rt56-WR5.0.1.0_preempt-rt)
MSR: 0000000080029000 <CE,EE,ME>  CR: 24004484  XER: 20000000
SOFTE: 1
DEAR: 0000000000000018, ESR: 0000000000000000
TASK = c0000001726ee3c0[25310] 'klogd' THREAD: c0000001729c8000 CPU: 7
GPR00: c000000000154b98 c0000001729cbc30 c000000000ec1f78 0000000000000001 
GPR04: c000000000154b94 c0000001729cbb98 0000000000000000 c000000172bb40c0 
GPR08: 0000000000000000 0000000000000018 000000000882d000 c000000000d45690 
GPR12: 0000000028004482 c00000000fffbc00 0000000000000000 0000000000000000 
GPR16: 0000000000000000 0000000000000000 0000000010004f3c 00000000000003d7 
GPR20: 00000000100169a7 00000000000003c0 0000000000000000 0000000000000004 
GPR24: 0000000000000022 00000000ffbf45d8 00000000ffbf3978 000000000000007c 
GPR28: 0000000000000000 c0000001729cbea0 c000000000dfabc8 0000000000000000 
NIP [c000000000154ba4] .put_uprobe+0x24/0x60
LR [c000000000154b98] .put_uprobe+0x18/0x60
Call Trace:
[c0000001729cbc30] [c000000000154b98] .put_uprobe+0x18/0x60 (unreliable)
[c0000001729cbcb0] [c000000000000d90] .return_to_handler+0x0/0x34 (.show_regs+0x1ec/0x380)
[c0000001729cbda0] [c000000000000d90] .return_to_handler+0x0/0x34 (.die+0x204/0x410)
[c0000001729cbe30] [c000000000000d90] .return_to_handler+0x0/0x34 (.bad_page_fault+0xb8/0x130)
Instruction dump:
4e800020 60000000 60000000 7c0802a6 f8010010 fbe1fff8 f821ff81 7c7f1b78 
4beac1a1 60000000 393f0018 7c0004ac <7c004828> 3000ffff 7c00492d 40a2fff4 
---[ end trace 0000000000000004 ]---

Workaround

No

Steps to Reproduce

1) Configuring project
wrlinux-x/wrlinux/configure --enable-jobs=10 --enable-parallel-pkgbuilds=10 --enable-kernel=preempt-rt --with-layer=/net/pek-lpgbuild2/buildarea2/xxxx/wr-testing/bts,/net/pek-lpgbuild2/buildarea2/xxxx/wr-testing/kts, --enable-test=yes --enable-rootfs=glibc-std --enable-board=fsl_t4xxx --with-rcpl-version=0
2) Exectuing uprobe testing script
cd /opt/wr-test
./main_test.sh -F -s uprobe -g kts -u 1

Other Downloads


Live chat
Online