Crash, no reboot:
flash = (volatile unsigned short *)0x40001000; flash[0x8a0c&0xffff] = 0x65532;
pc : [<c004ae48>] lr : [<c0043964>] Not tainted
sp : c0fdbfd4 ip : c0fdc000 fp : c0fdbffc
r10: e5813020 r9 : e2622014 r8 : 00000001
r7 : e0833142 r6 : 0007b3fc r5 : 00008674 r4 : c0fda000
r3 : c038e2a0 r2 : e2622018 r1 : 0000fffe r0 : 0005e688
Flags: nZCv IRQs on FIQs on Mode USER_32 Segment user
Control: 217D Table: C0FD4015 DAC: 00000015
Bad mode in data abort handler detected: mode ABT_32
Vectors: (0xffff0000 to 0xffff0040)
0000: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0020: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Stubs: (0xffff0200 to 0xffff04b8)
0200: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0220: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0240: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0260: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0280: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02a0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02c0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02e0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0300: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0320: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0340: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0360: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0380: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
03a0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
03c0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
03e0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0400: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0420: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0440: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0460: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
0480: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
04a0: 00000000 00000000 00000000 00000000 00000000 00000000
Internal error: Oops: 0
CPU: 0
pc : [<ffff0308>] lr : [<c0043964>] Not tainted
sp : c0fdbf8c ip : c0fdc000 fp : c0fdbffc
r10: e5813020 r9 : e2622014 r8 : 00000001
r7 : e0833142 r6 : 0007b3fc r5 : 00008674 r4 : c0fda000
r3 : c038e2a0 r2 : e2622018 r1 : 0000fffe r0 : 0005e688
Flags: nZCv IRQs off FIQs on Mode ABT_32 Segment user
Control: 217D Table: C0FD4015 DAC: 00000015
Process phatpatch-0.8 (pid: 24, stackpage=c0fdb000)
Stack: (0xc0fdbfc4 to 0xc0fdc000)
bfc0: c0043964 ffff0308 60000097 ffffffff bffffc5c 00008674 0007b3fc
bfe0: 00000002 bffffbf8 00000000 bffffbe0 000173a0 0000821c 60000010 ffffffff
Backtrace:
Function entered at [<ffffffef>] from [<60000010>]
Backtrace aborted due to bad frame pointer <c0fdbffc>
Code: bad PC value.
note: phatpatch-0.8[24] exited with preempt_count 1
Segmentation fault
But after this one I couldn't run verify or even save the rom out:
/dos # ./phatpatch-0.8 s test
Unable to handle kernel NULL pointer dereference at virtual address 00000004
pgd = c0fd4000
*pgd = c0fec011, *pmd = c0fec011, *pte = 00000000, *ppte = 00000000
Internal error: Oops: 0
CPU: 0
pc : [<c00ecb88>] lr : [<c005a648>] Not tainted
sp : c0fdbf74 ip : c0fdbf9c fp : c0fdbfac
r10: 00000003 r9 : c0fda000 r8 : c0043aa0
r7 : 0000007a r6 : bffffe54 r5 : 0007b7bc r4 : bffffc5c
r3 : 00000000 r2 : 00000000 r1 : 00000001 r0 : c00fe808
Flags: Nzcv IRQs on FIQs on Mode SVC_32 Segment user
Control: 217D Table: C0FD4015 DAC: 00000015
Process phatpatch-0.8 (pid: 31, stackpage=c0fdb000)
Stack: (0xc0fdbf64 to 0xc0fdc000)
bf60: c005a648 c00ecb88 80000013 ffffffff 00009714 00000003 c0fdbfa4
bf80: c0fdbf8c bffffc5c 0007b7bc c0fdbfac c0fdbf9c c005a648 c00ecb84 00000000
bfa0: 00000000 c0fdbfb0 c0043920 c005a640 00000000 c0049d20 bffffc5c 00000001
bfc0: 0000000f 00000000 00000000 0007b7bc bffffe54 bffffc5c bffffe54 00009714
bfe0: 00000003 0007b3fc 0007a68c bffffc58 0000934c 000172a4 60000010 bffffc5c
Backtrace:
Function entered at [<c005a630>] from [<c0043920>]
r4 = 00000000
Code: e92dd830 e24dd010 a0000093 e3c2203f (e5923004)
Segmentation fault
reboot, top or halt would also not work (ls about the only thing that did):
/dos # reboot
Unable to handle kernel NULL pointer dereference at virtual address 00000004
pgd = c0fd4000
*pgd = c0fec011, *pmd = c0fec011, *pte = 00000000, *ppte = 00000000
Internal error: Oops: 0
CPU: 0
pc : [<c00ecb88>] lr : [<c00954a8>] Not tainted
sp : c0fdbe48 ip : c0fdbe70 fp : c0fdbf58
r10: c0fdbf20 r9 : 00000000 r8 : c0fdbf28
r7 : c038e0a0 r6 : c0028000 r5 : c0fda000 r4 : c038e0bc
r3 : 00000000 r2 : 00000000 r1 : 00000000 r0 : c038e0bc
Flags: NzCv IRQs on FIQs on Mode SVC_32 Segment user
Control: 217D Table: C0FD4015 DAC: 00000015
Process busybox (pid: 39, stackpage=c0fdb000)
Stack: (0xc0fdbe38 to 0xc0fdc000)
be20: c00954a8 c00ecb88
be40: a0000013 ffffffff c0fdbe54 c006a544 c006a03c 00000041 c038e0bc c0fda000
be60: c0fdbf58 c0fdbe70 c00954a8 c00ecb84 c0fdbe7c c00889b4 c00eaf70 c0392008
be80: 01c5a71f 00000004 c0fdbedc 00000000 c0f26260 c0fdbf60 c0fda000 c0fdbf64
bea0: c0f26260 c0fdbec8 c0fdbeb4 c00878d0 c00ecef0 c0f27a80 00000000 20000013
bec0: 00000000 00000041 c00fcf38 00000000 000001f0 c00fcd3c c0fda000 c00fcf34
bee0: c0fdbf18 c0fdbef0 c006a544 c006a03c c0f27a80 c00fcd3c c00fcd3c 00000000
bf00: 000001f0 00000053 00000000 ffffffff c0fdbf1c 00000000 00000000 c0f52000
bf20: c0fdbf2c c006d410 c006d348 c0028000 c0028000 00000100 c0f27a80 c0391dc0
bf40: c0f52000 c0fda000 000bfe00 c0fdbf80 c0fdbf5c c0092b1c c00953b0 00000000
bf60: ffffffea c0391da0 00000100 000bfe00 000a05d0 c0fdbfac c0fdbf84 c0070ee0
bf80: c0092ad8 c00720d0 bffff864 000c3f80 00000100 bffff897 00000003 c0043aa0
bfa0: 00000000 c0fdbfb0 c0043920 c0070e14 000c3f80 c0049c90 00000005 000bfe00
bfc0: 00000100 0006fda8 000c3f80 00000100 bffff897 bffff897 bffffd90 00000000
bfe0: 000a05d0 bffff844 bffff848 bffff834 0006fdbc 000778b8 20000010 00000005
Backtrace:
Function entered at [<c00953a0>] from [<c0092b1c>]
Function entered at [<c0092ac8>] from [<c0070ee0>]
Function entered at [<c0070e04>] from [<c0043920>]
r8 = C0043AA0 r7 = 00000003 r6 = BFFFF897 r5 = 00000100
r4 = 000C3F80
Code: e92dd830 e24dd010 a0000093 e3c2203f (e5923004)
Segmentation fault