Port-sparc archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Data Access Exception when trying to Boot installed NetBSD of hard drive
Hi Eduardo!
I see, thought this would be the case too.
Here's the output of those two if it would help anyone:
ok .s
Empty
ok ctrace
PC: ffe9a430
Last leaf: call ffe9985c from ffea5da4
0 w %o0-%o5: ( 1 38786f 1 ffd40000 ffefffbf ffe8ef04 )
jmpl ffea794c from 388e7c
1 w %o0-%o5: ( ffefb8a0 0 2000 ffd40000 ff 66 )
jmpl ffea794c from 388180
2 w %o0-%o5: ( 0 0 2000 0 0 0 )
jmpl ffea794c from 38d1c4
3 w %o0-%o5: ( 398c60 1 0 10 2000 398e50 )
jmpl ffea794c from 391924
4 w %o0-%o5: ( 387ee8 398bd8 398400 387df4 387e44 0 )
call 391818 from 39113c
5 w %o0-%o5: ( 387ee8 1 387ecc 1f fff7fffc ffea6fd8 )
call 391134 from 38a898
6 w %o0-%o5: ( 387ee8 0 396dc8 ffffddbb ffeffd7f 0 )
call 38a4f0 from 38811c
7 w %o0-%o5: ( 3960f0 396120 396178 384000 2000 ffffc000 )
jmpl ffea794c from 300c40
8 w %o0-%o5: ( ffe8f3c8 388000 2fff9c ffd40000 ffefffbf ffe8ef04 )
call 300b64 from 30011c
9 w %o0-%o5: ( ffe8f3c8 301c00 0 ffd40000 ff fffffff )
XXXXXXX from 0
a w %o0-%o5: ( ffe8f3c8 300000 0 0 0 0 )
That looks even less helpful, is there a way to find some declarations
or labels for those addresses?
2014-10-13 18:20 GMT+02:00 Eduardo Horvath <eeh%netbsd.org@localhost>:
> On Mon, 13 Oct 2014, Adrian Christiansen wrote:
>
>> I tried to find some backtrace debugging tools in the OpenBoot 2.x
>> manual and saw there was ftrace. I don't know if ftrace is of any
>> help, but just in case here's the output of ftrace after the Data
>> Access Exception.
>
> `ftrace' is for tracing Forth code. AFAIK the NetBSD/sparc bootloader is
> C code so you want to use `ctrace'.
>
> Looking at the backtrace:
>
>
>>
>> ok ftrace
>
> Here we have a load operation. Dunno what address it's trying to load,
> that would be on the Forth stack. You can access that (if it hasn't been
> reset) with `.s'.
>
>> @ Called from (ffea5d84) at ffea5dae
>
> The rest of it looks to be calling `seek' on some device.
>
>> my-voc Called from $call-self at ffea714a
>> $call-self Called from $call-method at ffea71e0
>> ffefb8a0
>> $call-method Called from seek at ffebc7fa
>> execute Called from $vexecute? at ffea62a4
>> $vexecute? Called from $call-self at ffea714e
>> $call-self Called from $call-method at ffea71e0
>> 0
>> execute Called from catch at ffe9c3f2
>> ffefefd4
>> 0
>> ffefebbc
>> catch Called from op-seek at ffea78f6
>> op-seek Called from op-seek at ffea7958
>> 0
>
> Here we have the call to load the bootblock. It was called from the
> command interpreter (`interact').
>
>> (fload) Called from interact at ffe9eaac
>> execute Called from catch at ffe9c3f2
>> ffefefec
>> 0
>> ffefebd4
>> catch Called from (quit at ffe9ead0
>>
>
> Eduardo
Home |
Main Index |
Thread Index |
Old Index