• Just looking around
    Posts: 11 from 2015/12/8
    @polluks:
    I tried setting that, but I am a bit unsure where that debug logging is supposed to end up. Is it on the serial port?

    Took a look at the morphos ramdebug output with logtool and got some output when onlineing the interface which doesn't seem say very much apart that a read goes wrong:
    Code:
    --------------------------------------------
    ASM_Exception: DAR 0xdfeff8 DSISR 0x40000000
    ASM_Exception: IntGPR1 0x80004f60 SRR0 0x11301740 SRR1 0xf070 LR 0x11007190
    ASM_Exception: Type 0x3
    ASM_Exception: Thread 0x800fa740 Name Interrupt SOFTINT
    ASM_Exception: DAR 0xdfeff8 DSISR 0x40000000
    ------------------------------------------------------------------------------
    ExceptionThread: Exception Thread 0x800fa740 <Interrupt SOFTINT>
    ExceptionThread: Type 0x3 <Data Access>
    ExceptionThread: Illegal Data Access at 0x00dfeff8 DSISR 0x40000000 <Read Access to a not existing Page>
    PC(SRR0) 0x11301740 MSR(SRR1) 0x0000f070
    CR 80000000 XER 00000000 LR 11007190 CTR 11301730
    General Register Dump:
    GPR[0] 11301730 10015880 10015920 0003f280 00000004 00000004 1100873c 11008748
    GPR[8] 110084c0 ffffffdd 00002000 00dfeff8 0000f070 08ddfca2 00002118 11328724
    GPR[16] 000000dd 00000004 00000000 00000000 00000000 00000000 00000000 00000000
    GPR[24] 00dfeff8 08ddfc88 08df8c01 00000000 08ddfc8c 10015f84 08000c44 10015954
    FPSCR 00000000
    FPECR 00000000
    FPR[0] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[4] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[8] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[12] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[16] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[20] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[24] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[28] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    Special Register Dump:
    IABR 00000000 DABR 00000000
    OS Register Dump:
    SysCall_SRR0 1011e6a8 SysCall_SRR1 0000f070 SysCall_GPR2 10015a88 SysCall_LR 101006ec SysCall_CR 10117f04
    ------------------------------------------------------------------------------


    The address it is attempting the read from changes for each run. This was with the a debug version of the device, but it doesn't seem to help with any symbols or anything.. can't say that I know much about using these kind of tools unfortunately.

    Also tried with the non debug version of the device and got sortof the same thing, but an illegal write instead. It seems to be 100% reproducible and debug device = read fail, normal device = write fail.

    Normal device output:
    Code:
    --------------------------------------------
    ASM_Exception: DAR 0x45 DSISR 0xa000000
    ASM_Exception: IntGPR1 0x80004f60 SRR0 0x1104cd44 SRR1 0xf070 LR 0x11007190
    ASM_Exception: Type 0x3
    ASM_Exception: Thread 0x800fa740 Name Interrupt SOFTINT
    ASM_Exception: DAR 0x45 DSISR 0xa000000
    ------------------------------------------------------------------------------
    ExceptionThread: Exception Thread 0x800fa740 <Interrupt SOFTINT>
    ExceptionThread: Type 0x3 <Data Access>
    ExceptionThread: Illegal Data Access at 0x00000045 DSISR 0x0a000000 <Write Access is not allowed because of protection modes>
    PC(SRR0) 0x1104cd44 MSR(SRR1) 0x0000f070
    CR 40000000 XER 00000000 LR 11007190 CTR 1104cd0c
    General Register Dump:
    GPR[0] 00000000 100158a0 10015920 00001df0 00000004 00000000 00001010 00000040
    GPR[8] 08f1ef84 00000004 00000045 00000010 0000f070 00000046 00002100 11328724
    GPR[16] 10101000 00000004 00000000 61796264 02000000 00000000 00000000 00000000
    GPR[24] 00dff000 08f1ef70 00000000 00000000 08f1ef70 10015f84 08000c44 10015960
    FPSCR 00000000
    FPECR 00000000
    FPR[0] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[4] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[8] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[12] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[16] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[20] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[24] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    FPR[28] 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x0000000000000000
    Special Register Dump:
    IABR 00000000 DABR 00000000
    OS Register Dump:
    SysCall_SRR0 1011e6a8 SysCall_SRR1 0000f070 SysCall_GPR2 10015a88 SysCall_LR 101006ec SysCall_CR 10117f04
    ------------------------------------------------------------------------------
  • »09.12.15 - 22:23
    Profile