Now i know my data isn't corrupted because I can see at the positions of the v_tlb_refil and v_common vectors coherent snippets of code to read the coop0 cause register, mask it off and jump somewhere based on that. Also at the v_counter and v_debug vectors are jumps so some other nearby mem address.
So far so good.
The problem comes when follwowing one of these jumps. for instance,
at the v_counter interrupt:
Code: Select all
80000080: 15460008 j 0x80011854
Code: Select all
80011854: e0ff1b7c sq k1,-32(zero)
perhaps the dissassembly is off, later on the same mem location is read back and it is sourrounded by legit-looking code. So whats doing with this? If i treat the -32 as a valid mem address, things make sense, but i'm not sure it is??
Any ideas?
thanks.
- cheriff