OOPS with JFFS2, MIPS

Pramod P K pra.engr at gmail.com
Thu Oct 19 05:42:49 EDT 2006


Iam using MIPS, Big Endian, with AMD/Fujitsu Spansion CFI flash.

I have Rootfs(jffs2) in flash, Linux-2.6.15 in RAM. Trying to mount Rootfs
(jffs2). but gives OOPS, and then kernel panic !!
I have traced the disassembled part of it. Got the location of OOPS but dont
know why

Please .. help me out.


MSP flash device "flash0": 0x00800000 at 0x1f800000
flash0: Found 1 x16 devices at 0x0 in 8-bit bank
 Amd/Fujitsu Extended Query Table at 0x0040
Using buffer write method
flash0: CFI does not contain boot bank location. Assuming top.
number of CFI chips: 1
cfi_cmdset_0002: Disabling erase-suspend-program due to code brokenness.
Creating 6 MTD partitions on "flash0":
0x00480000-0x007f0000 : " General partition"
mtd: Giving out device 0 to  General partition
0x00400000-0x00470000 : " pmon"
mtd: Giving out device 1 to  pmon
0x00470000-0x00480000 : " pmon script"
mtd: Giving out device 2 to  pmon script
0x00010000-0x00400000 : " Linux"
mtd: Giving out device 3 to  Linux
0x007f0000-0x00800000 : " Copyprotected space end"
mtd: Giving out device 4 to  Copyprotected space end
0x00000000-0x00010000 : " Copyprotected space start"
mtd: Giving out device 5 to  Copyprotected space start
MSP flash device "flash1": 0x00bf0000 at 0x1e000000
flash1: Found 1 x16 devices at 0x0 in 8-bit bank
 Amd/Fujitsu Extended Query Table at 0x0040
Using buffer write method
flash1: CFI does not contain boot bank location. Assuming top.
number of CFI chips: 1
cfi_cmdset_0002: Disabling erase-suspend-program due to code brokenness.
Creating 1 MTD partitions on "flash1":
0x00000000-0x00bf0000 : " Root Filesystem jffs2"
mtd: Giving out device 6 to  Root Filesystem jffs2

...........
..........
<skipped some statements here>
..........
..........

CPU 0 Unable to handle kernel paging request at virtual address 00000000,
epc == 80121f30, ra == 80121fe0
Oops[#1]:
Cpu 0
$ 0   : 00000000 00000000 00000003 00000000
$ 4   : 80490554 00000003 00000001 00000000
$ 8   : ffffffff 87e02488 00000000 00000008
$12   : 8048bb80 87e02480 ffffffff 00000010
$16   : 00000001 0000fff8 00000001 80490554
$20   : 00000000 00000000 00000003 80490500
$24   : 00000000 80298d08
$28   : 8048a000 8048ba98 8048ba98 80121fe0
Hi    : 00000000
Lo    : 000000bf
epc   : 80121f30 __wake_up_common+0x44/0xb8     Not tainted
ra    : 80121fe0 __wake_up+0x3c/0x98
Status: 11005802    KERNEL EXL
Cause : 80800008
BadVA : 00000000
PrId  : 00019522
Modules linked in:
Process swapper (pid: 1, threadinfo=8048a000, task=8049fbe8)
Stack : 00000000 00000000 80460000 87e04e00 00000001 0000fff8 00000000
811aa030
        80490538 00000000 00000008 8048bad0 80121fe0 8049fbe8 80121ecc
00000000
        00000000 804659de 00000000 00000035 80490538 00000008 802988ec
0000fff8
        0000fff8 811aa030 80490538 00000000 00000008 80490500 000023d0
80298fa8
        00000002 8048bc38 00000010 87fc8908 00000000 80490500 0000fff8
80490500
        ...
Call Trace:
 [<80121fe0>] __wake_up+0x3c/0x98
 [<80121ecc>] default_wake_function+0x0/0x20
 [<802988ec>] put_chip+0x7c/0x1fc
 [<80298fa8>] cfi_amdstd_read+0x2a0/0x3d8
 [<80203eec>] jffs2_fill_scan_buf+0x3c/0xc8
 [<801280d0>] printk+0x1c/0x28
 [<80204280>] jffs2_scan_medium+0x16c/0x19a8
 [<80170928>] __get_vm_area_node+0x25c/0x284
 [<80170de4>] __vmalloc_area_node+0x104/0x1bc
 [<80208f5c>] jffs2_do_mount_fs+0x1fc/0x9b0
 [<8020c578>] jffs2_do_fill_super+0x108/0x360
 [<801280d0>] printk+0x1c/0x28
 [<8020cd6c>] jffs2_get_sb_mtd+0x10c/0x1d4
 [<8020cc9c>] jffs2_get_sb_mtd+0x3c/0x1d4
 [<8018fb00>] path_release+0x18/0x48
 [<8020d084>] jffs2_get_sb+0x1a8/0x2a4
 [<801a5688>] mntput_no_expire+0x2c/0x140
 [<80191d98>] link_path_walk+0x114/0x2f4
 [<8012e9bc>] tasklet_action+0xa4/0x134
 [<801a4e6c>] alloc_vfsmnt+0xcc/0x10c
 [<801a4d58>] get_fs_type+0x220/0x268
 [<80186748>] do_kern_mount+0x68/0x180
 [<80186710>] do_kern_mount+0x30/0x180
 [<80192088>] path_lookup+0x110/0x3a0
 [<801a7524>] do_mount+0x5c4/0x7ec
 [<801a7068>] do_mount+0x108/0x7ec
 [<8013fdc0>] rcu_process_callbacks+0x24/0x48
 [<8012e9bc>] tasklet_action+0xa4/0x134
 [<80158420>] get_page_from_freelist+0x580/0x5a8
 [<8012e444>] __do_softirq+0x84/0x130
 [<80158420>] get_page_from_freelist+0x580/0x5a8
 [<8012e558>] do_softirq+0x68/0x80
 [<801584ac>] __alloc_pages+0x64/0x344
 [<8015d160>] cache_alloc_refill+0x27c/0x69c
 [<801587c8>] __get_free_pages+0x3c/0x88
 [<8015c918>] kmem_cache_alloc+0x6c/0x74
 [<8019de08>] dput+0x34/0x398
 [<801a6e78>] copy_mount_options+0x38/0x120
 [<8018f5b8>] getname+0x28/0x100
 [<801a7ca8>] sys_mount+0xac/0x108
 [<801a7c40>] sys_mount+0x44/0x108
 [<80194000>] sys_mknod+0x188/0x2ac
 [<80194e78>] sys_unlink+0x1cc/0x2c4
 [<8043ea10>] mount_block_root+0xe8/0x2dc
 [<8043e96c>] mount_block_root+0x44/0x2dc
 [<8013e65c>] flush_cpu_workqueue+0x388/0x390
 [<801773ec>] sys_access+0x7c/0x15c
 [<8043ee0c>] prepare_namespace+0x74/0x14c
 [<8013e690>] flush_workqueue+0x2c/0x38
 [<801002c0>] init+0x230/0x2e0
 [<80103dbc>] kernel_thread_helper+0x10/0x18
 [<80103dac>] kernel_thread_helper+0x0/0x18

Code: 00a0b021  00c09021  00e0a821 <10730010> 8c710000  2464fff4  8c820008
8c70fff4  02c02821
Kernel panic - not syncing: Attempted to kill init!



thanks,

pk
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.infradead.org/pipermail/linux-mtd/attachments/20061019/f75cb20e/attachment.html 


More information about the linux-mtd mailing list