Solved

kernel bzImage and zImage problem

Posted on 2000-02-25
2
425 Views
Last Modified: 2013-11-13
I have kernel 2.2.14 and when doing a "make zImage" or "make bzImage" i run into the following problem.  Skipping most of the messages, i come to this:

make[1]: Entering directory `/usr/src/linux-2.0.35/arch/i386/lib'
make all_targets
make[2]: Entering directory `/usr/src/linux-2.0.35/arch/i386/lib'
gcc -D__KERNEL__ -I/usr/src/linux-2.0.35/include -Wall -Wstrict-prototypes -O2 -fomit-frame-pointer  -pipe -fno-strength-reduce -m486 -DCPU=486   -c -o checksum.o checksum.c
make[2]: Leaving directory `/usr/src/linux-2.0.35/arch/i386/lib'
make[1]: Leaving directory `/usr/src/linux-2.0.35/arch/i386/lib'
checksum.c:200: redefinition of 'csum_partial_copy'
checksum.c:105: 'csum_partial_copy' previously defined here
{standard input}: Assembler messages:
{standard input}:185: Fatal error: Symbol csum_partial_copy already defined
make[2]: *** [checksum.o] Error 1
make[2]: Leaving directory 'usr/src/linux-2.0.35/arch/i386/lib'
make[1]: *** [first_rule] Error 2
make[1]: Leaving directory 'usr/src/linux-2.0.35/arch/i386/lib'
make: *** [dir_arch/i386/lib] Error 2

I did a make dep, clean, and before that even a mrproper.  Does anyone know what is causing this problem, and how can i fix it?
Thanx
0
Comment
Question by:GriffD2004
2 Comments
 
LVL 4

Accepted Solution

by:
kiffney earned 200 total points
ID: 2560139
In my 2.2.12  source, checksum.c has been renamed to old-checksum.c, and the routines moved into checksum.S.  Perhaps you installed the new source over an old source tree?   Try deleting the source tree and untarring (or rpm-ing) a new source tar or rpm and your problems should go away.
0
 
LVL 3

Expert Comment

by:jyu_88
ID: 2560318
what do you mean that you have 2.2.14 kernel while the error message shows that you are in the 2.0.35 source tree.
make sure you have /usr/src/linux point to /usr/src/linux-2.2.14 if the latter contains your 2.2.14 source files.
If not, hum...
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Open Camera IP 8 94
Apache timeout remote connection if not port 80 10 53
VMWare 6 crashing 14 56
Problem to open Excel file 15 43
Among others, I monitor the Windows Installer zone and Installer zone. I find that many of the questions could be answered much more quickly if a Windows Installer verbose log were submitted with the question.   However, I do not always have t…
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now