[#4821] yaffs crash when running bonnie++
Submitted By: Yi Li
Open Date
2009-01-19 04:38:24 Close Date
2009-02-04 05:39:02
Priority:
Medium Assignee:
Nobody
Status:
Closed Fixed In Release:
N/A
Found In Release:
N/A Release:
svn trunk
Category:
N/A Board:
EZKIT Lite
Processor:
BF548 Silicon Revision:
ezkit-1.3, rev. 0.1
Is this bug repeatable?:
Yes Resolution:
Duplicate
Uboot version or rev.:
Toolchain version or rev.:
svn trunk 4.1
App binary format:
N/A
Summary: yaffs crash when running bonnie++
Details:
When run bonnie++ on yaffs on Nand, the kernel crash. If using jffs2, bonnie++ runs well.
root:/> cat /proc/mtd
dev: size erasesize name
mtd0: 00040000 00020000 "bootloader(nor)"
mtd1: 00400000 00020000 "linux kernel(nor)"
mtd2: 00bc0000 00020000 "file system(nor)"
mtd3: 00400000 00020000 "linux kernel(nand)"
mtd4: 0fc00000 00020000 "file system(nand)"
mtd5: 00040000 00010000 "bootloader(spi)"
mtd6: 001c0000 00010000 "linux kernel(spi)"
root:/> flash_eraseall /dev/mtd4
Erasing 128 Kibyte @ 7e60000 -- 50 % complete.
Skipping bad block at 0x07e80000
Skipping bad block at 0x07ea0000
Erasing 128 Kibyte @ fc00000 -- 100 % complete.
root:/> mount -t yaffs /dev/mtdblock4 /mnt/
yaffs: dev is 32505860 name is "mtdblock4"
yaffs: passed flags ""
yaffs: Attempting MTD mount on 31.4, "mtdblock4"
yaffs: auto selecting yaffs2
block 1013 is bad
block 1014 is bad
root:/> bonnie++ -u root -d /mnt
Using uid:0, gid:0.
WritUng debyfi anea d mein.struction
- May be used to emulate instructions that are not defined for
a particular processor implementation.
Kernel OOPS in progress
Deferred Exception context
CURRENT PROCESS:
COMM=bonnie++ PID=401
CPU = 0
TEXT = 0x00e80040-0x00ea1ea0 DATA = 0x00ea1ea4-0x00eaedbc
BSS = 0x00eaedbc-0x00eb5874 USER-STACK = 0x00ec9f5c
return address: [0x0000004c]; contents of:
0x00000020: ???? ???? ???? ???? ???? ???? ???? ????
0x00000030: ???? ???? ???? ???? ???? ???? ???? ????
0x00000040: ???? ???? ???? ???? ???? ???? [????] ????
0x00000050: ???? ???? ???? ???? ???? ???? ???? ????
SEQUENCER STATUS: Not tainted
SEQSTAT: 00060021 IPEND: 8030 SYSCFG: 0006
EXCAUSE : 0x21
interrupts disabled
physical IVG5 asserted : <0xffa00b2c> { _evt_ivhw + 0x0 }
physical IVG15 asserted : <0xffa00c88> { _evt_system_call + 0x0 }
logical irq 6 mapped : <0xffa00360> { _timer_interrupt + 0x0 }
logical irq 9 mapped : <0x000f039c> { _bfin_bf54x_irq_error + 0x0 }
logical irq 10 mapped : <0x0017f49c> { _err_handler + 0x0 }
logical irq 14 mapped : <0x00156f94> { _bfin_rtc_interrupt + 0x0 }
logical irq 16 mapped : <0x0017e298> { _rx_handler + 0x0 }
logical irq 17 mapped : <0x0017e234> { _tx_handler + 0x0 }
logical irq 48 mapped : <0x0010549c> { _bfin_serial_dma_rx_int + 0x0 }
logical irq 49 mapped : <0x001058b0> { _bfin_serial_dma_tx_int + 0x0 }
logical irq 52 mapped : <0x00159e08> { _bfin_twi_interrupt_entry + 0x0 }
logical irq 53 mapped : <0x00159e08> { _bfin_twi_interrupt_entry + 0x0 }
logical irq 68 mapped : <0x0012c564> { _bfin_ata_interrupt + 0x0 }
logical irq 74 mapped : <0x0013ebdc> { _bf5xx_nand_dma_irq + 0x0 }
logical irq 76 mapped : <0x0015557c> { _bfin_kpad_isr + 0x0 }
logical irq 82 mapped : <0x001500c8> { _blackfin_interrupt + 0x0 }
logical irq 85 mapped : <0x00152ce0> { _dma_controller_irq + 0x0 }
logical irq 175 mapped : <0x0010d4d4> { _smsc911x_irqhandler + 0x0 }
RETE: <0x00000000> /* Maybe null pointer? */
RETN: <0x00d2dce4> /* kernel dynamic memory */
RETX: <0x00000480> /* Maybe fixed code section */
RETS: <0x0002e26e> { _generic_file_buffered_write + 0xca }
PC : <0x0000004c> /* Maybe null pointer? */
DCPLB_FAULT_ADDR: <0x00290f1c> /* kernel dynamic memory */
ICPLB_FAULT_ADDR: <0x0000004c> /* Maybe null pointer? */
PROCESSOR STATE:
R0 : 03929740 R1 : 003e0968 R2 : 00000000 R3 : 0000004c
R4 : 00001000 R5 : 00000000 R6 : 00000000 R7 : 00000001
P0 : 00ec9953 P1 : 00290f04 P2 : 00000000 P3 : 03929740
P4 : 003e0968 P5 : 00d2c000 FP : 00000000 SP : 00d2dc08
LB0: 00e8847d LT0: 00e88470 LC0: 00000000
LB1: 00e88b97 LT1: 00e88b62 LC1: 00000000
B0 : 00ec98cc L0 : 00000000 M0 : 00000000 I0 : 00000000
B1 : 00000013 L1 : 00000000 M1 : 00000000 I1 : 00000013
B2 : 00000000 L2 : 00000000 M2 : 00000000 I2 : 00000001
B3 : 00000000 L3 : 00000000 M3 : 00000000 I3 : 00000000
A0.w: dcf1e6dc A0.x: ffffffff A1.w: ffff949a A1.x: ffffffff
USP : 00ec9904 ASTAT: 02002020
Hardware Trace:
0 Target : <0x00004abc> { _trap_c + 0x0 }
Source : <0xffa005ea> { _exception_to_level5 + 0x9e } CALL pcrel
1 Target : <0xffa0054c> { _exception_to_level5 + 0x0 }
Source : <0xffa0041e> { _bfin_return_from_exception + 0x6 } RTX
2 Target : <0xffa00418> { _bfin_return_from_exception + 0x0 }
Source : <0xffa004a6> { _ex_trap_c + 0x66 } JUMP.S
3 Target : <0xffa00440> { _ex_trap_c + 0x0 }
Source : <0xffa00676> { _trap + 0x2a } JUMP (P4)
4 Target : <0xffa0064c> { _trap + 0x0 }
Source : <0x0000004a> /* Maybe null pointer? */
5 Target : <0x00000000> /* Maybe null pointer? */
Source : <0x0002e26c> { _generic_file_buffered_write + 0xc8 } CALL (P2)
6 Target : <0x0002e240> { _generic_file_buffered_write + 0x9c }
Source : <0x0002d2c8> { _iov_iter_fault_in_readable + 0x70 } RTS
7 Target : <0x0002d2c0> { _iov_iter_fault_in_readable + 0x68 }
Source : <0x0002d29e> { _iov_iter_fault_in_readable + 0x46 } IF !CC JUMP
8 Target : <0x0002d280> { _iov_iter_fault_in_readable + 0x28 }
Source : <0xffa0024a> { __access_ok + 0xee } RTS
9 Target : <0xffa0023a> { __access_ok + 0xde }
Source : <0xffa00186> { __access_ok + 0x2a } IF CC JUMP
10 Target : <0xffa0015c> { __access_ok + 0x0 }
Source : <0x0002d27c> { _iov_iter_fault_in_readable + 0x24 } CALL pcrel
11 Target : <0x0002d258> { _iov_iter_fault_in_readable + 0x0 }
Source : <0x0002e23c> { _generic_file_buffered_write + 0x98 } CALL pcrel
12 Target : <0x0002e21e> { _generic_file_buffered_write + 0x7a }
Source : <0x0002e20e> { _generic_file_buffered_write + 0x6a } JUMP.S
13 Target : <0x0002e1e4> { _generic_file_buffered_write + 0x40 }
Source : <0x0002cf06> { _iov_iter_advance + 0x2e } RTS
14 Target : <0x0002ced8> { _iov_iter_advance + 0x0 }
Source : <0x0002e1e0> { _generic_file_buffered_write + 0x3c } CALL pcrel
15 Target : <0x0002e1a4> { _generic_file_buffered_write + 0x0 }
Source : <0x0002e77c> { ___generic_file_aio_write_nolock + 0x1ec } CALL pcl
Kernel Stack
Stack info:
SP: [0x00d2df24] <0x00d2df24> /* kernel dynamic memory */
Memory from 0x00d2df20 to 00d2e000
00d2df20: 00000001 [00e9173e] 00008000 00000000 00000000 00d2e000 00e9173e
00d2df40:<00e8e4c4><ffa00cec> 02003025 00e88b97 00e8847d 00e88b62 00e88470
00d2df60: 00000000 ffff949a ffffffff dcf1e6dc ffffffff 00000000 00000000
00d2df80: 00ec98cc 00000000 00000000 00000000 00000000 00000000 00000000
00d2dfa0: 00000000 00000000 00000001 00000013 00000000 00ec9904 00ec9910
00d2dfc0: 00ec9a68 00f54004 00eaabe4 00ec9928 00000004 00000003 00ec9953
00d2dfe0: 00ec99f0 00000000 00000001 00ec9953 00000003 00000003 00000004
00d2e000: 00100100
Return addresses in stack:
address : <0x00e8e4c4> [ bonnie++ + 0xe484 ]
address : <0xffa00cec> { _evt_system_call + 0x64 }
Modules linked in:
Kernel panic - not syncing: Kernel exception
Follow-ups
--- Yi Li 2009-01-19 04:49:36
Should be dup of [#4813]
--- Yi Li 2009-01-22 02:29:48
fixed on trunk and close.
--- Yi Li 2009-02-04 05:39:01
close.
Files
Changes
Commits
Dependencies
Duplicates
Associations
Tags
File Name File Type File Size Posted By
No Files Were Found