Advertisement
Guest User

Untitled

a guest
Sep 20th, 2010
701
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.31 KB | None | 0 0
  1. - preinit -
  2. Press the [f] key and hit [enter] to enter failsafe mode
  3. - regular preinit -
  4. mtdblock_open
  5. ok
  6. mtdblock: read on "rootfs_data" at 0x0, size 0x200
  7. ... # Deleted lines for posting
  8. mtdblock: read on "rootfs_data" at 0x3e00, size 0x200
  9. mtdblock_release
  10. ok
  11. MTDSB: dev_name "/dev/mtdblock4"
  12. MTDSB: lookup_bdev() returned 0
  13. MTDSB: New superblock for device 4 ("rootfs_data")
  14. Data bus error, epc == 80005d64, ra == 80112688
  15. Oops[#1]:
  16. Cpu 0
  17. $ 0 : 00000000 00000000 81a7d695 00000001
  18. $ 4 : 81a7d698 b0fc022f 00000005 8024b490
  19. $ 8 : 2daffeca 00000001 00000003 7563692d
  20. $12 : 81803808 81803810 00000001 00200200
  21. $16 : 81a7d680 0000000c b0fc0200 81a7d695
  22. $20 : 00cc0200 b0fc0228 8189d4b8 81ace600
  23. $24 : 00000001 2ab1b950
  24. $28 : 81abe000 81abfca8 00020000 80112688
  25. Hi : 00000002
  26. Lo : b7778d00
  27. epc : 80005d64 __copy_user+0x1a0/0x2bc
  28. Not tainted
  29. ra : 80112688 jffs2_scan_medium+0xcb8/0x1484
  30. Status: 1100fc03 KERNEL EXL IE
  31. Cause : 0080001c
  32. PrId : 00019641 (MIPS 24Kc)
  33. Modules linked in:
  34. Process busybox (pid: 332, threadinfo=81abe000, task=81984aa8, tls=00000000)
  35. Stack : 00000000 81801600 81ae0000 80088b84 81a9d380 81abfccc 81abfcc8 00000000
  36. b0300000 00d00000 81801600 1985e001 00000034 000000d0 00cc0000 000014b8
  37. 0000000a 81a56400 00000000 00000000 00000000 00000066 81ace6d4 81ace684
  38. 81ace6cc 81ace6bc b0fc0000 81ace600 00001520 fffffff4 81ace600 81ace400
  39. 00000000 01f00004 00008000 7fa81624 81abfeb0 80114ce4 81a75000 80098a78
  40. ...
  41. Call Trace:
  42. [<80005d64>] __copy_user+0x1a0/0x2bc
  43. [<80112688>] jffs2_scan_medium+0xcb8/0x1484
  44. [<80114ce4>] jffs2_do_mount_fs+0x1b8/0x68c
  45. [<801169d4>] jffs2_do_fill_super+0x158/0x274
  46. [<8017ce0c>] get_sb_mtd_aux+0x88/0x114
  47. [<8017d1a8>] get_sb_mtd+0x22c/0x284
  48. [<80117498>] jffs2_get_sb+0x20/0x2c
  49. [<8008dc10>] vfs_kern_mount+0x68/0xcc
  50. [<8008dcd8>] do_kern_mount+0x54/0x124
  51. [<800a6b64>] do_mount+0x6f8/0x79c
  52. [<800a6c9c>] sys_mount+0x94/0xec
  53. [<80004104>] stack_done+0x20/0x3c
  54.  
  55.  
  56. Code: 98a80003 24a50004 24c6fffc <ac880000> 14d8fffa 24840004 10c0000d 0000 0000 80a80000
  57. Disabling lock debugging due to kernel taint
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement