Graphical desktop, l4con, mag
Jean Wolter
jean.wolter at kernkonzept.com
Thu Jun 1 22:14:22 CEST 2017
On 01/06/17 17:35, Leslie Zhai wrote:
> Hi L4 hackers,
>
> > and it built ok. Now when it runs fbdrv page faults. Has anyone seen
> this before?
>
> The same story: page fault
> https://pbs.twimg.com/media/DBPuT-sUMAAuhvU.png
This does not look like a page fault in fbdrv. If the system boots up
correctly the boot sequence looks like follows:
MOE: virtual user address space [0-7fffffffffff]
MOE: rom name space cap -> [C:103000]
BOOTFS: [17d7000-17d76e8] [C:105000] x86-fb.cfg
BOOTFS: [17d8000-19d0040] [C:107000] l4re
BOOTFS: [19d1000-1dbd478] [C:109000] ned
...
BOOTFS: [3e68000-40f5568] [C:115000] ex_fb_spectrum_cc
MOE: cmdline: /home/.../build/tmp/l4re/bin/amd64_K8/l4f/moe
rom/x86-fb.cfg
MOE: Starting: rom/ned rom/x86-fb.cfg
MOE: loading 'rom/ned'
Ned says: Hi World!
Ned: loading file: 'rom/x86-fb.cfg'
IO | Io service
In your boot sequence the last line is the hello message from ned. So it
looks like ned is dereferencing a null pointer (read access to 0 + 0x18
at instruction pointer 0x102d72a). Maybe you could use addr2line/objdump
to figure out, what happens at address 0x102d72a in ned.
regards,
Jean
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://os.inf.tu-dresden.de/pipermail/l4-hackers/attachments/20170601/5bd1a20a/attachment.htm>
More information about the l4-hackers
mailing list