home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.os.vxworks
- Path: sparky!uunet!usc!sdd.hp.com!nigel.msen.com!fmsrl7!lynx.unm.edu!umn.edu!csus.edu!netcom.com!hjb
- From: hjb@netcom.com (H. J. Bae)
- Subject: Re: Mysterious task crashes
- Message-ID: <1993Jan21.062847.27457@netcom.com>
- Organization: Peaceful Star Project
- References: <1993Jan15.184713.28368@wdl.loral.com> <1993Jan18.163643.619@ee.ubc.ca>
- Date: Thu, 21 Jan 1993 06:28:47 GMT
- Lines: 25
-
- markm@ee.ubc.ca (mark milligan) writes:
-
- >It looks like the pointer is writing an instruction to jump to location 0x0006
- >where the illegal instruction is generated. ( I beleive this is the vector table?)
-
- m68k's look for SSP and PC values (in that sequence) starting at addr 0
- upon powerup. 0x6 is pointing to least significant half of whatever was
- left there (possibly the kernel boot routine address).
-
- if i were you, i'd use a logic analyser to trigger at that address to
- track the problem down. if you don't have one of those, you could
- possibly hack up something -- like putting in a jsr instruction at
- the location to call your routine which can print out stack trace...
- or something like that (i know, pretty sick) <grin>
-
-
- hwajin
-
-
- --
- Hwa-Jin Bae hjb@netcom.com
- Peaceful Star Project
- 2899 Ford Street, Oakland CA 94601 Available for Civilian contract work.
- (510) 536-7607
-
-