linux-mtd.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: Artem Bityutskiy <dedekind1@gmail.com>
To: Reginald Perrin <reggyperrin@yahoo.com>
Cc: MTD Mailing List <linux-mtd@lists.infradead.org>
Subject: Re: UBIFS Corruption
Date: Wed, 30 Nov 2011 00:30:35 +0200	[thread overview]
Message-ID: <1322605837.2150.32.camel@koala> (raw)
In-Reply-To: <1322510657.7380.YahooMailNeo@web114602.mail.gq1.yahoo.com>

On Mon, 2011-11-28 at 12:04 -0800, Reginald Perrin wrote:
> > 
> 
> > There are no interesting messages:
> > 
> > 1. You enabled all UBIFS debugging messages which are too verbose and
> > not needed. Do not enable them because they "push out" the interesting
> > diagnostic messages from the kernel printk ring buffer.
> > 
> > 2. And it is strange that the last messages are about the commit and not
> > about mount failure - are you sure that you typed dmesg right after the
> > UBIFS mount failure without rebooting ?
> > 
> > -- 
> > Best Regards,
> > Artem Bityutskiy
> > 
> > 
> 
> 
> Hi Artem,
> 
> Whatever is causing this, it seems to be increasing in frequency (or
> we are getting better at inadvertently causing it).

I do not remember - did I ask you to validate your flash with mtd tests?
Please do - it is useful.

> I now have several units in this state, and have tried to change the
> log level to gather more information.  Since the ubifs volume I need
> to mount isn't the root-file-system, I have the luxury of being able
> to create test kernels, flash them, and boot them into the system, at
> which point they try and mount the corrupted partition.
> 
> Below, you can see where I tried to mount this partition after booting
> (I discarded all old messages, so this is just the output of
> attempting to mount this volume).  
> 
> NOTE:  My #1 priority is figuring out how to recover from this -- when
> this happens, we're actually bricked, and can't recover (since all the
> key recovery programs are actually on this volume that can't mount).  
> 
> What else can I do to get more information to you to assist?
> 
> TIA
> RP
> 
> root:/> rm /var/log/messages 
> root:/> mount -t ubifs ubi1:home /home
> mount: mounting ubi1:home on /home failed: Structure needs cleaning
> root:/> cat /var/log/messages 

> Dec 31 16:01:51 kernel: [  111.400000] UBIFS DBG (pid 524): ubifs_getxattr: xattr 'security.capability', ino 319 ('busybox'), buf size 20
> Dec 31 16:01:51 kernel: [  111.404000] UBIFS DBG (pid 424): do_readpage: ino 69, pg 0, i_size 9, flags 0x1
> Dec 31 16:01:51 kernel: [  111.444000] UBIFS DBG (pid 524): do_readpage: ino 319, pg 0, i_size 318888, flags 0x1
> Dec 31 16:01:51 kernel: [  111.448000] UBIFS DBG (pid 524): do_readpage: ino 133, pg 0, i_size 20396, flags 0x1
> Dec 31 16:01:51 kernel: [  111.452000] UBIFS DBG (pid 524): do_readpage: ino 319, pg 74, i_size 318888, flags 0x1
> Dec 31 16:01:51 kernel: [  111.456000] UBIFS DBG (pid 524): do_readpage: ino 319, pg 75, i_size 318888, flags 0x1
> Dec 31 16:01:51 kernel: [  111.460000] UBIFS DBG (pid 524): populate_page: ino 319, pg 76, i_size 318888, flags 0x1
> Dec 31 16:01:51 kernel: [  111.460000] UBIFS DBG (pid 524): populate_page: ino 319, pg 77, i_size 318888, flags 0x1
> Dec 31 16:01:51 kernel: [  111.460000] UBIFS DBG (pid 524): do_readpage: ino 133, pg 4, i_size 20396, flags 0x1
> Dec 31 16:01:51 kernel: [  111.464000] UBIFS DBG (pid 524): do_readpage: ino 107, pg 0, i_size 2083, flags 0x1
> Dec 31 16:01:51 kernel: [  111.468000] UBIFS DBG (pid 524): do_readpage: ino 134, pg 0, i_size 240184, flags 0x1
> Dec 31 16:01:51 kernel: [  111.472000] UBIFS DBG (pid 524): do_readpage: ino 134, pg 56, i_size 240184, flags 0x1
> Dec 31 16:01:51 kernel: [  111.472000] UBIFS DBG (pid 524): do_readpage: ino 134, pg 57, i_size 240184, flags 0x1
> Dec 31 16:01:51 kernel: [  111.476000] UBIFS DBG (pid 524): populate_page: ino 134, pg 58, i_size 240184, flags 0x1
> Dec 31 16:01:51 kernel: [  111.988000] UBIFS DBG (pid 405): ubifs_readdir: dir ino 1, f_pos 0x0
> Dec 31 16:01:51 kernel: [  111.988000] UBIFS DBG (pid 405): ubifs_readdir: feed 'bin', ino 208, new f_pos 0x23605a
> Dec 31 16:01:51 kernel: [  111.988000] UBIFS DBG (pid 405): ubifs_readdir: feed 'dev', ino 384, new f_pos 0x23ee05
> Dec 31 16:01:51 kernel: [  111.992000] UBIFS DBG (pid 405): ubifs_readdir: feed 'etc', ino 65, new f_pos 0x24a603
> Dec 31 16:01:52 kernel: [  112.012000] UBIFS DBG (pid 405): ubifs_readdir: feed 'lib', ino 124, new f_pos 0x2697fa
> Dec 31 16:01:52 kernel: [  112.012000] UBIFS DBG (pid 405): ubifs_readdir: feed 'opt', ino 391, new f_pos 0x27d35e
> Dec 31 16:01:52 kernel: [  112.012000] UBIFS DBG (pid 405): ubifs_readdir: feed 'tmp', ino 122, new f_pos 0x295e98
> Dec 31 16:01:52 kernel: [  112.012000] UBIFS DBG (pid 405): ubifs_readdir: feed 'sys', ino 379, new f_pos 0x2968b1
> Dec 31 16:01:52 kernel: [  112.012000] UBIFS DBG (pid 405): ubifs_readdir: feed 'var', ino 380, new f_pos 0x29ab98
> Dec 31 16:01:52 kernel: [  112.020000] UBIFS DBG (pid 405): ubifs_readdir: feed 'usr', ino 390, new f_pos 0x29e101
> Dec 31 16:01:52 kernel: [  112.020000] UBIFS DBG (pid 405): ubifs_readdir: feed 'logo.565', ino 378, new f_pos 0x1428f67
> Dec 31 16:01:52 kernel: [  112.020000] UBIFS DBG (pid 405): ubifs_readdir: feed 'home', ino 389, new f_pos 0x19cc780
> Dec 31 16:01:52 kernel: [  112.020000] UBIFS DBG (pid 405): ubifs_readdir: feed 'proc', ino 123, new f_pos 0x1baa5b4
> Dec 31 16:01:52 kernel: [  112.020000] UBIFS DBG (pid 405): ubifs_readdir: feed 'sbin', ino 207, new f_pos 0x1c000e1
> Dec 31 16:01:52 kernel: [  112.028000] UBIFS DBG (pid 405): ubifs_readdir: feed 'root', ino 373, new f_pos 0x1c0d8cc
> Dec 31 16:01:52 kernel: [  112.028000] UBIFS DBG (pid 405): ubifs_readdir: dir ino 1, f_pos 0x2
> Dec 31 16:01:52 kernel: [  112.028000] UBIFS DBG (pid 525): ubifs_getxattr: xattr 'security.capability', ino 319 ('busybox'), buf size 20
> Dec 31 16:01:53 kernel: [  113.088000] UBIFS DBG (pid 526): ubifs_getxattr: xattr 'security.capability', ino 319 ('busybox'), buf size 20
> Dec 31 16:01:53 kernel: [  113.120000] UBIFS DBG (pid 526): ubifs_get_sb: name ubi1:home, flags 0x8000
> Dec 31 16:01:53 kernel: [  113.120000] UBIFS DBG (pid 526): ubifs_get_sb: opened ubi1_0

You enabled all the debugging - there is too much of it so it does not
fit your ring buffer. Did you increase it? Try making it larger. I do
not know how much RAM you have, but to make it 64MiB add this to your
kernel boot parameters:

log_buf_len=64M

Also add

ignore_loglevel 

to see all messages in the console.

I suggested you to disable debugging messages altogether, though, like
it says here in item 3:

http://linux-mtd.infradead.org/faq/ubifs.html#L_how_send_bugreport

> Dec 31 16:01:53 kernel: [  113.120000] PM: Adding info for No Bus:ubifs_1_0
> Dec 31 16:01:53 kernel: [  113.120000] UBIFS DBG (pid 527): ubifs_getxattr: xattr 'security.capability', ino 319 ('busybox'), buf size 20
> Dec 31 16:01:53 kernel: [  113.132000] UBIFS DBG (pid 528): ubifs_bg_thread: background thread "ubifs_bgt1_0" started, PID 528
> Dec 31 16:01:53 kernel: [  113.192000] UBIFS DBG (pid 527): do_readpage: ino 68, pg 0, i_size 268, flags 0x1


> Dec 31 16:01:53 kernel: [  113.352000] UBIFS: recovery needed
> Dec 31 16:01:54 kernel: ffffff ffffffff ffffffff ffffffff ffffffff ffffffff  ................................

This line seem to be corrupted - no time-stamp. There is missing
information before "Recovery needed and the dump, I think.

  reply	other threads:[~2011-11-29 22:30 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-07-08 13:12 UBIFS Corruption Reginald Perrin
2011-07-18 11:33 ` Artem Bityutskiy
2011-07-19 20:47   ` Reginald Perrin
2011-07-26 19:17   ` Reginald Perrin
2011-08-02 16:14     ` Reginald Perrin
2011-08-15 12:30       ` Artem Bityutskiy
2011-08-15 12:29     ` Artem Bityutskiy
2011-11-28 20:04       ` Reginald Perrin
2011-11-29 22:30         ` Artem Bityutskiy [this message]
2011-12-07 17:19         ` Reginald Perrin
2011-12-08 21:42           ` Artem Bityutskiy
2011-12-12 14:29             ` Reginald Perrin
2011-12-12 16:34               ` Artem Bityutskiy
     [not found]                 ` <1323709988.3066.YahooMailNeo@web114618.mail.gq1.yahoo.com>
2011-12-13 16:25                   ` Reginald Perrin
2011-12-13 20:19                     ` Artem Bityutskiy
2011-07-18 11:38 ` Artem Bityutskiy

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1322605837.2150.32.camel@koala \
    --to=dedekind1@gmail.com \
    --cc=linux-mtd@lists.infradead.org \
    --cc=reggyperrin@yahoo.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).