gavs writes:
> I have a computationally intensive piece of code compiled and linked
> using the ARM -Software Development Tool (SDT2.5) which gives a 32 bit
> stripped ELF binary image as an executable.  This image when ran on
> ARM-Linux gives a memory voilation problem.  If I run this image on SDT
> Debugger or Angel Debugger, the code works fine.

I'm not 100% certain, but some images that the SDT tools create are
different from the images that the GNU tools create, notably the placing
of the data segment.

For instance, if I build any program against an unmodified uHAL using the
arm-linux toolchain, and load it using the armsd, then it doesn't work
because the data segment isn't where its expected to be.

Another reason would be that the C library is different - the uHAL-based
program will know how to get hold of the size of memory, where to place
the stack etc.  In ARM Linux, all this is done for the program.  If the
program tries to probe random memory addresses, then it will get killed
with a SEGV.

PS, any reason you can't post from the right address?
   _____
  |_____| ------------------------------------------------- ---+---+-
  |   |        Russell King       [EMAIL PROTECTED]      --- ---
  | | | |            http://www.arm.linux.org.uk/            /  /  |
  | +-+-+                                                     --- -+-
  /   |               THE developer of ARM Linux              |+| /|\
 /  | | |                                                     ---  |
    +-+-+ -------------------------------------------------  /\\\  |

_______________________________________________
http://lists.arm.linux.org.uk/mailman/listinfo/linux-arm
Please visit the above address for information on this list.

Reply via email to