Port-arm archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Debugging efiboot
> On Jun 25, 2022, at 11:12 AM, Brook Milligan <brook%nmsu.edu@localhost> wrote:
>
> What is the best way to debug this? I’m open to all suggestions.
I’ve been looking into this further. Here is a reference on arm data exceptions:
https://developer.arm.com/documentation/ka002692/latest
Here is part of the output produced by efiboot:
9137236+2443104+1407136 [455399+757776+576954]=0xe217f4
data abort
pc : [<9ff5797a>][7C lr : [<9ff579b1>]
reloc pc : [<8080097a>][C lr : [<808009b1>]
sp : 9df35a4c ip : 00000000 fp : 00000000
r10: 9ff57000 r9 : 9df36eb8 r8 : 00019040
r7 : 9ff57c00 r6 : 9ff57bb4 r5 : 000000ad r4 : 0001ac00
r3 : 00000000 r2 : 00000050 r1 : 9ff57bb0 r0 : abb1aaad
Flags: NzCv IRQs off FIQs on Mode SVC_32
Code: ea83428a d1f52010 f856bdf0 40685b04 (f854b2c5)
UEFI image [0x9cf03000:0x9cf2b79f] '/\efi\boot\bootarm.efi'
Resetting CPU …
If I interpret this correctly, lr is the link register and the illegal memory location is 8 bytes below that, i.e., 0x808009A9 (=2155874729).
Is this information helpful? How can I figure out where that is in the source code?
Cheers,
Brook
Home |
Main Index |
Thread Index |
Old Index