[Bug 1687] powerpc-rtems4.[10|11]/motorola_powerpc: Linking sample's *.exe segfaults

bugzilla-daemon at rtems.org bugzilla-daemon at rtems.org
Sun Aug 22 06:23:10 UTC 2010


https://www.rtems.org/bugzilla/show_bug.cgi?id=1687

--- Comment #4 from Ralf Corsepius <ralf.corsepius at rtems.org> 2010-08-22 01:23:09 CDT ---
Update:

Meanwhile I also tried binutils-2_20-branch, binutils CVS-HEAD. 

They all expose the same breakdown for all motorola_powerpc's.


Traceback (from a binutils-2_20-branch compiled powerpc-rtems4.11-binutils):

Program received signal SIGSEGV, Segmentation fault.
_int_malloc (av=0x3a2ab7ae80, bytes=<value optimized out>) at malloc.c:4439
(gdb) where
#0  _int_malloc (av=0x3a2ab7ae80, bytes=<value optimized out>) at malloc.c:4439
#1  0x0000003a2a879a3d in __libc_malloc (bytes=4064) at malloc.c:3660
#2  0x00000000004e8a74 in _objalloc_alloc (o=0x769390, len=72) at
../../libiberty/objalloc.c:152
#3  0x000000000043b2bf in bfd_hash_allocate (table=0x769340, size=72) at
../../bfd/hash.c:571
#4  0x000000000043bd32 in _bfd_generic_link_hash_newfunc (entry=0x0,
table=0x769340, string=0x786411 "em86_trap") at ../../bfd/linker.c:682
#5  0x000000000043aeb7 in bfd_hash_insert (table=0x769340, string=0x786411
"em86_trap", hash=127581402) at ../../bfd/hash.c:483
#6  0x000000000043ae87 in bfd_hash_lookup (table=0x769340, string=0x786411
"em86_trap", create=1, copy=0) at ../../bfd/hash.c:470
#7  0x000000000043b900 in bfd_link_hash_lookup (table=0x769340, string=0x786411
"em86_trap", create=1, copy=0, follow=0) at ../../bfd/linker.c:501
#8  0x000000000043ce0a in _bfd_generic_link_add_one_symbol (info=0x75a6c0,
abfd=0x773260, name=0x786411 "em86_trap", flags=2, section=0x775758,
value=46640, string=0x0, copy=0, collect=0, hashp=0x782c08) at
../../bfd/linker.c:1567
#9  0x000000000047c3f3 in elf_link_add_object_symbols (abfd=0x773260,
info=0x75a6c0) at ../../bfd/elflink.c:4146
#10 0x000000000047e62e in bfd_elf_link_add_symbols (abfd=0x773260,
info=0x75a6c0) at ../../bfd/elflink.c:5097
#11 0x000000000040f398 in load_symbols (entry=0x75b0b0, place=0x7fffffffe1f0)
at ../../ld/ldlang.c:2707
#12 0x000000000040fe95 in open_input_bfds (s=0x75b0b0, force=0) at
../../ld/ldlang.c:3138
#13 0x000000000041588b in lang_process () at ../../ld/ldlang.c:6287
#14 0x0000000000419726 in main (argc=10, argv=0x7fffffffe3b8) at
../../ld/ldmain.c:455

The traceback is always the same, independently of the executable being linked.
AFAIU, this traceback, linkage fails deep inside of ld's bfd_hashes when trying
to handle "em86_trap" (which originates from the motorola_powerpc's
bootloader.o).

-- 
Configure bugmail: https://www.rtems.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.



More information about the bugs mailing list