------Original Message------
From: [EMAIL PROTECTED]
To: Michael Slater <[EMAIL PROTECTED]>
Sent: March 7, 2000 9:52:50 AM GMT
Subject: Re: dynamically linked binaries causing panic
>we are able to run simple executables ( e.g with s printf ) which are
>statically linked but the ones which are dynamically linked are causing
>kernel panic.
What does the panic look like?
p.
hi phil,
here is what the panic looks like ( test2 is a dynamically linked
executable with a single printf for the body )
IF NECESSARY# test2
Kernel panic: Unknown data abort code 0 [pc=4002f798, *pc=005f5f72]
LR=4002f798
received signal SIGINT, Interrupt.
panic (fmt=0xc076ffb4 "\230�\002@\234�\002@$") at panic.c:78
78 for(;;) {
--------------------------------------------------------------
(gdb)r
program om being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /root/patches/bootsim/../linux/vmlinux
Internal error: branch through zero: 0
CPU: 0
pc : [<00000004>] lr : [<4002f79c>]
sp : bffff9cc ip : c076ff94 fp : c076ffa0
r10: 4001d404 r9 : bffff9f0 r8 : bffff9f0
r7 : 400164f8 r6 : 40101ea0 r5 : 24242424 r4 : c00b8dcc
r3 : 60000013 r2 : 00000007 r1 : 00000000 r0 : 00000000
Flags: nZCv IRQs on FIQs on Mode SVC_32 Segment user
INTSR1 0x00001000 INTMR1 0x00002200
INTSR2 0x00000000 INTMR2 0x00000000
INTSR3 0x00000000 INTMR3 0x00000000
Control: 017D Table: C07C8000 DAC: 00000015
Process test2 (pid: 10, stackpage=c076f000)
Stack:
c076ff80: 4002f79c 00000004 60000013 00000000 00000000 c076ffb4
c0041d08
c076ffa0: c00477f0 c0041c5c 00000000 4002f798 005f5f72 4002f798 4002f79c
00000024
c076ffc0: 40027d14 4002f79c 7efefeff 24242424 40101ea0 400164f8 bffff9f0
bffff9f0
c076ffe0: 4001d404 bffff9e0 bffff9e4 bffff9cc 4002f79c 4002f798 60000010
ffffffff
Backtrace:
Function entered at [<c00477e0>] from [<c0041d08>]
Code: pc not in code space
FORK IF NECESSARYFORKING FORKING SHELL IN PARENT PARENT PROCESSFORK ARGS=0#
ls
hello world
busyboxcatchgrpchmodchowncpdatedddfdmesgdudutmpfalsegrepgunzipgzipheadhostnamekillln
lslsmodmkdirmknodmoremount
----------------------------------------------------------------
as u can see, the kernel panics and enters an infinite loop. after i came to
the gdb prompt, i ran it again to get the second part of the dump i have
sent.
i should mention here that the initrd i am using uses the BusyBox utility (
www.lineo.org ) which was statically linked.
we had our own initrd with the shell and commands dynamically linked. none
except the built in commands ( echo ) worked.we add the dump for this too -
# ls
sh: memory violation at pc=0x02005158, lr=0x020050e0 (bad
address=0x020009c4, code 1)
# echo ghg
ghg
# ls
Unable to handle kernel paging request at virtual address 80037134
current->tss.memmap = C0770000
*pgd = 00000000, *pmd = 00000000
Internal error: Oops: 2
CPU: 0
pc : [<c003a384>] lr : [<80037138>]
sp : c0281fb8 ip : 400fed5c fp : 00000000
r10: 80048770 r9 : 00000000 r8 : c0282000
r7 : 020166f8 r6 : 60000010 r5 : 00000001 r4 : bffffd58
r3 : 00000710 r2 : fffee9c4 r1 : 801fe578 r0 : 400164f8
Flags: nZCv IRQs off FIQs on Mode SVC_32 Segment user
Control: 017D Table: C0770000 DAC: 00000015
Process sh (pid: 8, stackpage=c0281000)
Stack:
c0281fa0: 80037138 c003a384 60000093 ffffffff 400164f8
801fe578
c0281fc0: fffee9c4 00000710 bffffd58 00000001 020009ac 020166f8 0200b9f4
00000000
c0281fe0: 80048770 40034044 400fed5c 40034044 4000c0a4 80037138 60000010
400164f8
Code: e4880004 e3a0b000 (e51e6004) e206740f e337040f
# cd bin
# pwd
/bin
any pointers towards why this is happening?
apologies for the longish mail
slater
______________________________________________
FREE Personalized Email at Mail.com
Sign up at http://www.mail.com?sr=mc.mk.mcm.tag001
unsubscribe: body of `unsubscribe linux-arm' to [EMAIL PROTECTED]
++ Please use [EMAIL PROTECTED] for ++
++ kernel-related discussions. ++