Oops fault in JFFS2 (?)
Vipin Malik
vipin at embeddedlinuxworks.com
Sun Feb 16 15:31:51 EST 2003
Hi Folks,
I am running the JFFS2 code (and mtd code) from the 2.4.19 linux.org kernel
src code.
Doing a "cat" on a file present on the JFFS2 partition (sometimes) produces
the following Oops fault. I can't see that it's obviously coming from the
JFFS2 fs layer, but the "cat" on the file on JFFS2 hung and no more
operations were possible on the partition, including ls or further cats.
This happened on an AMD Elan SC520 (a 486) chip. Rebooting fixes the
problem (i.e. it's not permanent).
Is this a known bug fixed in CVS or something new. Can someone please shed
some light on this.
Thanks.
Vipin
****************************************************************************************************************************
ksymoops 2.4.8 on i686 2.4.7-10smp. Options used
-v vmlinux (specified)
-k ksyms (specified)
-l modules (specified)
-o
/home/vipin/markIIIbuild/all/src/misc/fs/firmware/etc/modules/slip.o -o
/home/vipin/markIIIbuild/all/src/misc/fs/
firmware/etc/modules/cpufpga.o (specified)
-m System.map (specified)
<1>Unable to handle kernel NULL pointer dereference at virtual address 00000004
<4>c012cb79
<1>*pde = 00000000
<4>Oops: 0000
<4>CPU: 0
<4>EIP: 0010:[<c012cb79>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
<4>EFLAGS: 00010246
<4>eax: 00000000 ebx: c0550000 ecx: 00000004 edx: 00000000
<4>esi: 00001000 edi: 0804af10 ebp: 00001000 esp: c0551f8c
<4>ds: 0018 es: 0018 ss: 0018
<4>Process cat (pid: 63, stackpage=c0551000)
<4>Stack: c012bf5c c0551fbc c0550000 c1f12c10 c1f12c10 c0550000 00000000
c07c4000
<4> c020fa00 c0550000 00001000 0804af10 bffffd94 c01083f3 00000004
0804af10
<4> 00001000 00001000 0804af10 bffffd94 00000003 0000002b 0000002b
00000003
<4>Call Trace: [<c012bf5c>] [<c01083f3>]
<4>Code: 3b 48 04 73 06 8b 40 10 8b 14 88 85 d2 74 03 ff 42 14 89 d0
>>EIP; c012cb79 <fget+11/28> <=====
>>ebx; c0550000 <_end+31de60/2e51eac>
>>esp; c0551f8c <_end+31fdec/2e51eac>
Trace; c012bf5c <sys_read+14/ec>
Trace; c01083f3 <system_call+33/40>
Code; c012cb79 <fget+11/28>
00000000 <_EIP>:
Code; c012cb79 <fget+11/28> <=====
0: 3b 48 04 cmp 0x4(%eax),%ecx <=====
Code; c012cb7c <fget+14/28>
3: 73 06 jae b <_EIP+0xb> c012cb84 <fget+1c/28>
Code; c012cb7e <fget+16/28>
5: 8b 40 10 mov 0x10(%eax),%eax
Code; c012cb81 <fget+19/28>
8: 8b 14 88 mov (%eax,%ecx,4),%edx
Code; c012cb84 <fget+1c/28>
b: 85 d2 test %edx,%edx
Code; c012cb86 <fget+1e/28>
d: 74 03 je 12 <_EIP+0x12> c012cb8b <fget+23/28>
Code; c012cb88 <fget+20/28>
f: ff 42 14 incl 0x14(%edx)
Code; c012cb8b <fget+23/28>
12: 89 d0 mov %edx,%eax
<4> <1>Unable to handle kernel paging request at virtual address 44cb7a40
<4>c011862c
<1>*pde = 00000000
<4>Oops: 0000
<4>CPU: 0
<4>EIP: 0010:[<c011862c>] Not tainted
<4>EFLAGS: 00010002
<4>eax: c0550568 ebx: c0550000 ecx: 00000000 edx: 44cb7a40
<4>esi: c020f900 edi: c0550000 ebp: 0000000b esp: c0551e48
<4>ds: 0018 es: 0018 ss: 0018
<4>Process cat (pid: 63, stackpage=c0551000)
<4>Stack: c0550000 c01186a8 c0550568 c0550578 c0113f2e c0550000 c07c0000
c01d1599
<4> 00000001 c0551f58 c01d4296 00000004 00000001 c01d0018 c01d0018
ffffff00
<4> c01089ec c0550010 00000000 c012cb79 c0651730 00000004 c010e2b7
0000000b
<4>Call Trace: [<c01186a8>] [<c0113f2e>] [<c01089ec>] [<c012cb79>]
[<c010e2b7>]
<4> [<c010df54>] [<c0108504>] [<c012cb79>] [<c012bf5c>] [<c01083f3>]
<4>Code: 8b 1a 52 ff 35 20 93 21 c0 e8 b6 c7 00 00 58 5a ff 0d 24 93
>>EIP; c011862c <flush_sigqueue+24/44> <=====
>>eax; c0550568 <_end+31e3c8/2e51eac>
>>ebx; c0550000 <_end+31de60/2e51eac>
>>esi; c020f900 <irq_desc+0/100>
>>edi; c0550000 <_end+31de60/2e51eac>
>>esp; c0551e48 <_end+31fca8/2e51eac>
Trace; c01186a8 <exit_sighand+44/48>
Trace; c0113f2e <do_exit+19a/20c>
Trace; c01089ec <die+58/60>
Trace; c012cb79 <fget+11/28>
Trace; c010e2b7 <do_page_fault+363/493>
Trace; c010df54 <do_page_fault+0/493>
Trace; c0108504 <error_code+34/40>
Trace; c012cb79 <fget+11/28>
Trace; c012bf5c <sys_read+14/ec>
Trace; c01083f3 <system_call+33/40>
Code; c011862c <flush_sigqueue+24/44>
00000000 <_EIP>:
Code; c011862c <flush_sigqueue+24/44> <=====
0: 8b 1a mov (%edx),%ebx <=====
Code; c011862e <flush_sigqueue+26/44>
2: 52 push %edx
Code; c011862f <flush_sigqueue+27/44>
3: ff 35 20 93 21 c0 pushl 0xc0219320
Code; c0118635 <flush_sigqueue+2d/44>
9: e8 b6 c7 00 00 call c7c4 <_EIP+0xc7c4> c0124df0
<kmem_cache_free+0/a8>
Code; c011863a <flush_sigqueue+32/44>
e: 58 pop %eax
Code; c011863b <flush_sigqueue+33/44>
f: 5a pop %edx
Code; c011863c <flush_sigqueue+34/44>
10: ff 0d 24 93 00 00 decl 0x9324
More information about the linux-mtd
mailing list