[#4821] yaffs crash when running bonnie++

Document created by Aaronwu Employee on Aug 30, 2013
Version 1Show Document
  • View in full screen mode

[#4821] yaffs crash when running bonnie++

Submitted By: Yi Li

Open Date

2009-01-19 04:38:24     Close Date

2009-02-04 05:39:02

Priority:

Medium     Assignee:

Nobody

Status:

Closed     Fixed In Release:

N/A

Found In Release:

N/A     Release:

svn trunk

Category:

N/A     Board:

EZKIT Lite

Processor:

BF548     Silicon Revision:

ezkit-1.3, rev. 0.1

Is this bug repeatable?:

Yes     Resolution:

Duplicate

Uboot version or rev.:

    Toolchain version or rev.:

svn trunk 4.1

App binary format:

N/A     

Summary: yaffs crash when running bonnie++

Details:

 

When run bonnie++ on yaffs on Nand, the kernel crash. If using jffs2, bonnie++ runs well.

 

root:/> cat /proc/mtd                                                          

dev:    size   erasesize  name                                                 

mtd0: 00040000 00020000 "bootloader(nor)"                                      

mtd1: 00400000 00020000 "linux kernel(nor)"                                    

mtd2: 00bc0000 00020000 "file system(nor)"                                     

mtd3: 00400000 00020000 "linux kernel(nand)"                                   

mtd4: 0fc00000 00020000 "file system(nand)"                                    

mtd5: 00040000 00010000 "bootloader(spi)"                                      

mtd6: 001c0000 00010000 "linux kernel(spi)"

root:/> flash_eraseall /dev/mtd4                                               

Erasing 128 Kibyte @ 7e60000 -- 50 % complete.                                 

Skipping bad block at 0x07e80000                                               

                                                                               

Skipping bad block at 0x07ea0000                                               

Erasing 128 Kibyte @ fc00000 -- 100 % complete.

 

root:/> mount -t yaffs /dev/mtdblock4 /mnt/                                    

yaffs: dev is 32505860 name is "mtdblock4"                                     

yaffs: passed flags ""                                                         

yaffs: Attempting MTD mount on 31.4, "mtdblock4"                               

yaffs: auto selecting yaffs2                                                   

block 1013 is bad                                                              

block 1014 is bad 

                                                            

root:/> bonnie++ -u root -d /mnt                                               

Using uid:0, gid:0.                                                            

WritUng debyfi anea d mein.struction                                           

- May be used to emulate instructions that are not defined for                

   a particular processor implementation.                                      

Kernel OOPS in progress                                                        

Deferred Exception context                                                     

CURRENT PROCESS:                                                               

COMM=bonnie++ PID=401                                                          

CPU = 0                                                                        

TEXT = 0x00e80040-0x00ea1ea0        DATA = 0x00ea1ea4-0x00eaedbc               

BSS = 0x00eaedbc-0x00eb5874  USER-STACK = 0x00ec9f5c                          

                                                                               

return address: [0x0000004c]; contents of:                                     

0x00000020:  ????  ????  ????  ????  ????  ????  ????  ????                    

0x00000030:  ????  ????  ????  ????  ????  ????  ????  ????                    

0x00000040:  ????  ????  ????  ????  ????  ???? [????] ????                    

0x00000050:  ????  ????  ????  ????  ????  ????  ????  ????                    

                                                                               

SEQUENCER STATUS:               Not tainted                                    

SEQSTAT: 00060021  IPEND: 8030  SYSCFG: 0006                                  

  EXCAUSE   : 0x21                                                             

  interrupts disabled                                                          

  physical IVG5 asserted : <0xffa00b2c> { _evt_ivhw + 0x0 }                    

  physical IVG15 asserted : <0xffa00c88> { _evt_system_call + 0x0 }            

  logical irq   6 mapped  : <0xffa00360> { _timer_interrupt + 0x0 }            

  logical irq   9 mapped  : <0x000f039c> { _bfin_bf54x_irq_error + 0x0 }       

  logical irq  10 mapped  : <0x0017f49c> { _err_handler + 0x0 }                

  logical irq  14 mapped  : <0x00156f94> { _bfin_rtc_interrupt + 0x0 }         

  logical irq  16 mapped  : <0x0017e298> { _rx_handler + 0x0 }                 

  logical irq  17 mapped  : <0x0017e234> { _tx_handler + 0x0 }                 

  logical irq  48 mapped  : <0x0010549c> { _bfin_serial_dma_rx_int + 0x0 }     

  logical irq  49 mapped  : <0x001058b0> { _bfin_serial_dma_tx_int + 0x0 }     

  logical irq  52 mapped  : <0x00159e08> { _bfin_twi_interrupt_entry + 0x0 }   

  logical irq  53 mapped  : <0x00159e08> { _bfin_twi_interrupt_entry + 0x0 }   

  logical irq  68 mapped  : <0x0012c564> { _bfin_ata_interrupt + 0x0 }         

  logical irq  74 mapped  : <0x0013ebdc> { _bf5xx_nand_dma_irq + 0x0 }         

  logical irq  76 mapped  : <0x0015557c> { _bfin_kpad_isr + 0x0 }              

  logical irq  82 mapped  : <0x001500c8> { _blackfin_interrupt + 0x0 }         

  logical irq  85 mapped  : <0x00152ce0> { _dma_controller_irq + 0x0 }         

  logical irq 175 mapped  : <0x0010d4d4> { _smsc911x_irqhandler + 0x0 }        

RETE: <0x00000000> /* Maybe null pointer? */                                  

RETN: <0x00d2dce4> /* kernel dynamic memory */                                

RETX: <0x00000480> /* Maybe fixed code section */                             

RETS: <0x0002e26e> { _generic_file_buffered_write + 0xca }                    

PC  : <0x0000004c> /* Maybe null pointer? */                                  

DCPLB_FAULT_ADDR: <0x00290f1c> /* kernel dynamic memory */                     

ICPLB_FAULT_ADDR: <0x0000004c> /* Maybe null pointer? */                       

                                                                               

PROCESSOR STATE:                                                               

R0 : 03929740    R1 : 003e0968    R2 : 00000000    R3 : 0000004c              

R4 : 00001000    R5 : 00000000    R6 : 00000000    R7 : 00000001              

P0 : 00ec9953    P1 : 00290f04    P2 : 00000000    P3 : 03929740              

P4 : 003e0968    P5 : 00d2c000    FP : 00000000    SP : 00d2dc08              

LB0: 00e8847d    LT0: 00e88470    LC0: 00000000                               

LB1: 00e88b97    LT1: 00e88b62    LC1: 00000000                               

B0 : 00ec98cc    L0 : 00000000    M0 : 00000000    I0 : 00000000              

B1 : 00000013    L1 : 00000000    M1 : 00000000    I1 : 00000013              

B2 : 00000000    L2 : 00000000    M2 : 00000000    I2 : 00000001              

B3 : 00000000    L3 : 00000000    M3 : 00000000    I3 : 00000000              

A0.w: dcf1e6dc   A0.x: ffffffff   A1.w: ffff949a   A1.x: ffffffff              

USP : 00ec9904  ASTAT: 02002020                                                

                                                                               

Hardware Trace:                                                                

   0 Target : <0x00004abc> { _trap_c + 0x0 }                                   

     Source : <0xffa005ea> { _exception_to_level5 + 0x9e } CALL pcrel          

   1 Target : <0xffa0054c> { _exception_to_level5 + 0x0 }                      

     Source : <0xffa0041e> { _bfin_return_from_exception + 0x6 } RTX           

   2 Target : <0xffa00418> { _bfin_return_from_exception + 0x0 }               

     Source : <0xffa004a6> { _ex_trap_c + 0x66 } JUMP.S                        

   3 Target : <0xffa00440> { _ex_trap_c + 0x0 }                                

     Source : <0xffa00676> { _trap + 0x2a } JUMP (P4)                          

   4 Target : <0xffa0064c> { _trap + 0x0 }                                     

     Source : <0x0000004a> /* Maybe null pointer? */                           

   5 Target : <0x00000000> /* Maybe null pointer? */                           

     Source : <0x0002e26c> { _generic_file_buffered_write + 0xc8 } CALL (P2)   

   6 Target : <0x0002e240> { _generic_file_buffered_write + 0x9c }             

     Source : <0x0002d2c8> { _iov_iter_fault_in_readable + 0x70 } RTS          

   7 Target : <0x0002d2c0> { _iov_iter_fault_in_readable + 0x68 }              

     Source : <0x0002d29e> { _iov_iter_fault_in_readable + 0x46 } IF !CC JUMP  

   8 Target : <0x0002d280> { _iov_iter_fault_in_readable + 0x28 }              

     Source : <0xffa0024a> { __access_ok + 0xee } RTS                          

   9 Target : <0xffa0023a> { __access_ok + 0xde }                              

     Source : <0xffa00186> { __access_ok + 0x2a } IF CC JUMP                   

  10 Target : <0xffa0015c> { __access_ok + 0x0 }                               

     Source : <0x0002d27c> { _iov_iter_fault_in_readable + 0x24 } CALL pcrel   

  11 Target : <0x0002d258> { _iov_iter_fault_in_readable + 0x0 }               

     Source : <0x0002e23c> { _generic_file_buffered_write + 0x98 } CALL pcrel  

  12 Target : <0x0002e21e> { _generic_file_buffered_write + 0x7a }             

     Source : <0x0002e20e> { _generic_file_buffered_write + 0x6a } JUMP.S      

  13 Target : <0x0002e1e4> { _generic_file_buffered_write + 0x40 }             

     Source : <0x0002cf06> { _iov_iter_advance + 0x2e } RTS                    

  14 Target : <0x0002ced8> { _iov_iter_advance + 0x0 }                         

     Source : <0x0002e1e0> { _generic_file_buffered_write + 0x3c } CALL pcrel  

  15 Target : <0x0002e1a4> { _generic_file_buffered_write + 0x0 }              

     Source : <0x0002e77c> { ___generic_file_aio_write_nolock + 0x1ec } CALL pcl

                                                                               

Kernel Stack                                                                   

Stack info:                                                                    

SP: [0x00d2df24] <0x00d2df24> /* kernel dynamic memory */                     

Memory from 0x00d2df20 to 00d2e000                                            

00d2df20: 00000001 [00e9173e] 00008000  00000000  00000000  00d2e000  00e9173e 

00d2df40:<00e8e4c4><ffa00cec> 02003025  00e88b97  00e8847d  00e88b62  00e88470 

00d2df60: 00000000  ffff949a  ffffffff  dcf1e6dc  ffffffff  00000000  00000000 

00d2df80: 00ec98cc  00000000  00000000  00000000  00000000  00000000  00000000 

00d2dfa0: 00000000  00000000  00000001  00000013  00000000  00ec9904  00ec9910 

00d2dfc0: 00ec9a68  00f54004  00eaabe4  00ec9928  00000004  00000003  00ec9953 

00d2dfe0: 00ec99f0  00000000  00000001  00ec9953  00000003  00000003  00000004 

00d2e000: 00100100                                                             

Return addresses in stack:                                                     

    address : <0x00e8e4c4> [ bonnie++ + 0xe484 ]                               

    address : <0xffa00cec> { _evt_system_call + 0x64 }                         

Modules linked in:                                                             

Kernel panic - not syncing: Kernel exception   

 

Follow-ups

 

--- Yi Li                                                    2009-01-19 04:49:36

Should be dup of [#4813]

 

--- Yi Li                                                    2009-01-22 02:29:48

fixed on trunk and close.

 

--- Yi Li                                                    2009-02-04 05:39:01

close.

 

 

 

    Files

    Changes

    Commits

    Dependencies

    Duplicates

    Associations

    Tags

 

File Name     File Type     File Size     Posted By

No Files Were Found

Attachments

    Outcomes