Thanks for the tip on backtrace. Very handy

Is it common to have so many stacks frames to have 0x00000000 as the address? 
That seems a bit odd to me.

x0026b02c -- 0x0016f878 + 0xfb7b4   _end
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000003 -- unknown address
0x00000000 -- unknown address
0x00000007 -- unknown address
0x00155000 -- 0x00155000 + 0x0000   set_reset_devices
0x00155000 -- 0x00155000 + 0x0000   set_reset_devices
0x00155000 -- 0x00155000 + 0x0000   set_reset_devices
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x00000000 -- unknown address
0x0026b160 -- 0x0016f878 + 0xfb8e8   _end



On Mar 2, 2010, at 6:38 AM, Stern, Allon wrote:

> 
> On Mar 2, 2010, at 12:02 AM, Greg Hulands wrote:
> 
>> I tried to enable the Full Symbolic/Source Debugging support  option in the 
>> kernel hacking section, but no new info was displayed in the crash. Is this 
>> only if I connect via gdb to get the symbolic stack?
> 
>> I would actually like to work out why the normal init isn't working 
>> properly. Is someone able to give me the gist of what to do to track it down?
> 
> One think you can look at, if you can't get symbolic traces, is look at the 
> System.map file which is generated along with your kernel. It shows you the 
> starting address for each function in the kernel.
> 
> There is a handy perl script here: ftp://ftp.denx.de/pub/tools/backtrace
> 
> which will take a System.map file, then reads standard input - you can paste 
> your backtrace into stdin, and it will look up the symbols for those 
> addresses and give it to you in a more human-readable fashion, with function 
> names and offsets.
> 
> You can also take your kernel, run it through m68k-uclinux-objdump -S to get 
> a full disassembly of the kernel (redirect the output to a file). Then peruse 
> the file, and look for the offset where your failure occurred.
> 
> Good luck!
> -
> allon
> 
> 
> ------------------------------------------------------------------------------------------
> Disclaimer
> The information contained in this email is intended solely for the
> use of the individual(s) to whom it is addressed. It may contain
> proprietary, privileged or other sensitive data. If you believe you
> have received this email in error, please do not share this email
> with anyone but instead notify the sender immediately. In addition,
> please delete this email and any attachments from your computer.
> 
> _______________________________________________
> uClinux-dev mailing list
> uClinux-dev@uclinux.org
> http://mailman.uclinux.org/mailman/listinfo/uclinux-dev
> This message was resent by uclinux-dev@uclinux.org
> To unsubscribe see:
> http://mailman.uclinux.org/mailman/options/uclinux-dev

_______________________________________________
uClinux-dev mailing list
uClinux-dev@uclinux.org
http://mailman.uclinux.org/mailman/listinfo/uclinux-dev
This message was resent by uclinux-dev@uclinux.org
To unsubscribe see:
http://mailman.uclinux.org/mailman/options/uclinux-dev

Reply via email to