So I worked out I was using the wrong addresses and should have used the ones 
at the bottom in the [].

Below is the output from the crash and subsequent symbols

0x0005bc0c -- 0x0005bb88 + 0x0084   do_mount
0x00010027 -- 0x00010000 + 0x0027   _text
0x00010000 -- 0x00010000 + 0x0000   _text
0x0001725a -- 0x000171f8 + 0x0062   copy_process
0x0012abec -- 0x0012abec + 0x0000   fair_sched_class
0x00010027 -- 0x00010000 + 0x0027   _text
0x0001725a -- 0x000171f8 + 0x0062   copy_process
0x0012abec -- 0x0012abec + 0x0000   fair_sched_class
0x00010027 -- 0x00010000 + 0x0027   _text
0x00110000 -- 0x0010ff2e + 0x00d2   __inet_del_ifa
0x0001725a -- 0x000171f8 + 0x0062   copy_process
0x0012abec -- 0x0012abec + 0x0000   fair_sched_class
0x00010027 -- 0x00010000 + 0x0027   _text
0x00110000 -- 0x0010ff2e + 0x00d2   __inet_del_ifa

dBUG> go 0x10000                                                                
Linux version 2.6.29-uc0 (ghula...@ubuntu) (gcc version 4.2.4) #13 Tue Mar 2 190
                                                                                
                                                                                
uClinux/COLDFIRE(m5280/5282)                                                    
COLDFIRE port done by Greg Ungerer, g...@snapgear.com                           
Flat model support (C) 1998,1999 Kenneth Albanowski, D. Jeff Dionne             
Buroot (romfs filesystem) readonly on device 31:0.                              
Freeing unused kernel memory: 52k freed (0x157000 - 0x163000)                   
Access Error Exception 12: Error on data read                                   
Stack from 00270014:                                                            
        ffffffff 00000078 00000078 00000078 00000000 0012abec 00000400 00400000 
        00000001 00000000 00000000 00165a38 00165a38 00000001 0098963a c8bb3000 
        00000000 93393580 00000000 9469f024 00000000 93393580 00000000 00000000 
        00000000 0005bc0c 001659b8 00165a14 00000000 00270088 00270088 00000000 
        00000064 00000001 00000000 00000000 00000000 00010027 03da0014 82660015 
        80000015 80000014 ecbc0000 00000000 00000000 00000000 00000080 00008000 
Call Trace with CONFIG_FRAME_POINTER disabled:                                  
                                                                                
 [0012abec]  [0005bc0c]  [00010027]  [00010000]  [0001725a]                     
 [0012abec]  [00010027]  [0001725a]  [0012abec]  [00010027]                     
 [00110000]  [0001725a]  [0012abec]  [00010027]  [00110000]                     
 [0001725a]  [0012abec]  [00010027]  [00110000]  [0001725a]   


On Mar 2, 2010, at 3:43 PM, Greg Hulands wrote:

> Thanks for the tip on backtrace. Very handy
> 
> Is it common to have so many stacks frames to have 0x00000000 as the address? 
> That seems a bit odd to me.
> 
> x0026b02c -- 0x0016f878 + 0xfb7b4   _end
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000003 -- unknown address
> 0x00000000 -- unknown address
> 0x00000007 -- unknown address
> 0x00155000 -- 0x00155000 + 0x0000   set_reset_devices
> 0x00155000 -- 0x00155000 + 0x0000   set_reset_devices
> 0x00155000 -- 0x00155000 + 0x0000   set_reset_devices
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x00000000 -- unknown address
> 0x0026b160 -- 0x0016f878 + 0xfb8e8   _end
> 
> 
> 
> On Mar 2, 2010, at 6:38 AM, Stern, Allon wrote:
> 
>> 
>> On Mar 2, 2010, at 12:02 AM, Greg Hulands wrote:
>> 
>>> I tried to enable the Full Symbolic/Source Debugging support  option in the 
>>> kernel hacking section, but no new info was displayed in the crash. Is this 
>>> only if I connect via gdb to get the symbolic stack?
>> 
>>> I would actually like to work out why the normal init isn't working 
>>> properly. Is someone able to give me the gist of what to do to track it 
>>> down?
>> 
>> One think you can look at, if you can't get symbolic traces, is look at the 
>> System.map file which is generated along with your kernel. It shows you the 
>> starting address for each function in the kernel.
>> 
>> There is a handy perl script here: ftp://ftp.denx.de/pub/tools/backtrace
>> 
>> which will take a System.map file, then reads standard input - you can paste 
>> your backtrace into stdin, and it will look up the symbols for those 
>> addresses and give it to you in a more human-readable fashion, with function 
>> names and offsets.
>> 
>> You can also take your kernel, run it through m68k-uclinux-objdump -S to get 
>> a full disassembly of the kernel (redirect the output to a file). Then 
>> peruse the file, and look for the offset where your failure occurred.
>> 
>> Good luck!
>> -
>> allon
>> 
>> 
>> ------------------------------------------------------------------------------------------
>> Disclaimer
>> The information contained in this email is intended solely for the
>> use of the individual(s) to whom it is addressed. It may contain
>> proprietary, privileged or other sensitive data. If you believe you
>> have received this email in error, please do not share this email
>> with anyone but instead notify the sender immediately. In addition,
>> please delete this email and any attachments from your computer.
>> 
>> _______________________________________________
>> uClinux-dev mailing list
>> uClinux-dev@uclinux.org
>> http://mailman.uclinux.org/mailman/listinfo/uclinux-dev
>> This message was resent by uclinux-dev@uclinux.org
>> To unsubscribe see:
>> http://mailman.uclinux.org/mailman/options/uclinux-dev
> 
> _______________________________________________
> uClinux-dev mailing list
> uClinux-dev@uclinux.org
> http://mailman.uclinux.org/mailman/listinfo/uclinux-dev
> This message was resent by uclinux-dev@uclinux.org
> To unsubscribe see:
> http://mailman.uclinux.org/mailman/options/uclinux-dev

_______________________________________________
uClinux-dev mailing list
uClinux-dev@uclinux.org
http://mailman.uclinux.org/mailman/listinfo/uclinux-dev
This message was resent by uclinux-dev@uclinux.org
To unsubscribe see:
http://mailman.uclinux.org/mailman/options/uclinux-dev

Reply via email to