已解决,是硬件spi设计问题。
xlq123 发布的帖子
-
T113-s3 adb push文件使文件系统变为只读
我的硬件平台是T113-s3加上nand flash。软件平台是linux5.4-1.1。系统正常启动后,使用adb push文件,第一次正常,连续推送也正常。过5分钟后再推送会提示remote read-only。此时adb shell进入系统,mount命令后,根文件系统变为只读。log信息如下:
Jan 1 00:15:31 (none) user.err kernel: [ 925.076531] UBIFS error (ubi0:5 pid 4745): ubifs_read_node: bad node type (243 but expected 2)
Jan 1 00:15:31 (none) user.err kernel: [ 925.076551] UBIFS error (ubi0:5 pid 4745): ubifs_read_node: bad node at LEB 172:225672, LEB mapping status 1
Jan 1 00:15:31 (none) user.err kernel: [ 925.076557] Not a node, first 24 bytes:
Jan 1 00:15:31 (none) user.err kernel: [ 925.076568] 00000000: 28 24 05 3f 10 ac 80 2e fd a6 a0 5d 35 eb fa fd 82 dd e7 9e f3 26 77 48 ($.?.......]5........&wH
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076580] CPU: 0 PID: 4745 Comm: adbd Not tainted 5.4.61+ #32
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076585] Hardware name: Generic DT based system
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076605] [<c010e2d8>] (unwind_backtrace) from [<c010a894>] (show_stack+0x10/0x14)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076620] [<c010a894>] (show_stack) from [<c0642bb0>] (dump_stack+0x7c/0x98)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076634] [<c0642bb0>] (dump_stack) from [<c0279cb4>] (ubifs_read_node+0x1d8/0x214)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076650] [<c0279cb4>] (ubifs_read_node) from [<c0291a08>] (ubifs_tnc_read_node+0x48/0xac)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076663] [<c0291a08>] (ubifs_tnc_read_node) from [<c027ab78>] (matches_name+0x40/0xcc)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076675] [<c027ab78>] (matches_name) from [<c027ac4c>] (resolve_collision+0x48/0x280)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076689] [<c027ac4c>] (resolve_collision) from [<c027d520>] (ubifs_tnc_remove_nm+0x94/0x130)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076701] [<c027d520>] (ubifs_tnc_remove_nm) from [<c026db7c>] (ubifs_jnl_update+0x36c/0x534)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076712] [<c026db7c>] (ubifs_jnl_update) from [<c0272668>] (ubifs_unlink+0x1b0/0x270)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076725] [<c0272668>] (ubifs_unlink) from [<c01e7e80>] (vfs_unlink+0x7c/0x124)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076737] [<c01e7e80>] (vfs_unlink) from [<c01eaa84>] (do_unlinkat+0xe8/0x1b0)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076750] [<c01eaa84>] (do_unlinkat) from [<c0101000>] (ret_fast_syscall+0x0/0x54)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076757] Exception stack(0xc5ddffa8 to 0xc5ddfff0)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076767] ffa0: 000081b6 0000000f b4ffe54c b4ffe560 0000000a 00000000
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076778] ffc0: 000081b6 0000000f 00037694 0000000a b4fff940 54495551 41544144 b4600470
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076786] ffe0: 000370dc b4ffe49c 0001db00 b6eb1068
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076857] UBIFS warning (ubi0:5 pid 4745): ubifs_ro_mode: switched to read-only mode, error -22
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076867] CPU: 0 PID: 4745 Comm: adbd Not tainted 5.4.61+ #32
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076872] Hardware name: Generic DT based system
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076887] [<c010e2d8>] (unwind_backtrace) from [<c010a894>] (show_stack+0x10/0x14)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076899] [<c010a894>] (show_stack) from [<c0642bb0>] (dump_stack+0x7c/0x98)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076912] [<c0642bb0>] (dump_stack) from [<c026dcf0>] (ubifs_jnl_update+0x4e0/0x534)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076923] [<c026dcf0>] (ubifs_jnl_update) from [<c0272668>] (ubifs_unlink+0x1b0/0x270)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076935] [<c0272668>] (ubifs_unlink) from [<c01e7e80>] (vfs_unlink+0x7c/0x124)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076947] [<c01e7e80>] (vfs_unlink) from [<c01eaa84>] (do_unlinkat+0xe8/0x1b0)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076959] [<c01eaa84>] (do_unlinkat) from [<c0101000>] (ret_fast_syscall+0x0/0x54)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076965] Exception stack(0xc5ddffa8 to 0xc5ddfff0)
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076975] ffa0: 000081b6 0000000f b4ffe54c b4ffe560 0000000a 00000000
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076986] ffc0: 000081b6 0000000f 00037694 0000000a b4fff940 54495551 41544144 b4600470
Jan 1 00:15:31 (none) user.warn kernel: [ 925.076994] ffe0: 000370dc b4ffe49c 0001db00 b6eb1068