
Preserving the Debugger Operating Environment
177Bug>RD |
|
|
|
|
| |
PC | =000E0000 SR | =2700=TR:OFF_S._7_ | VBR | =00000000 |
| |
SSP* | =00010000 USP | =00010000 SFC | =1=UD DFC =1=UD |
| ||
CACR | =00000000=D:....._B:..._I:... |
| PCR | =04300000 |
| |
D0 | =00000000 D1 | =00000000 D2 | =00000000 | D3 | =00000000 |
|
D4 | =00000000 D5 | =00000000 D6 | =00000000 | D7 | =00000000 |
|
A0 | =00000000 A1 | =00000000 A2 | =00000000 | A3 | =00000000 |
|
A4 | =00000000 A5 | =000C0000 A6 | =00000000 | A7 | =00010000 | 0000E |
000 | 4E71 | NOP |
|
|
| 177Bug>T |
Exception: Access Fault (Local Off Board)
PC =FF839154 SR =2704
Format/Vector =7008
SSW =0145 Fault Address =00F00000 Effective Address =0000D4E8
PC | =00010000 | SR |
| =2708=TR:OFF_S._7_.N... | VBR | =00000000 | ||
USP | =0000DFFC | MSP | =0000EFFC ISP* =0000FFFC SFC | =0=F0 | ||||
DFC | =0=F0 | CACR | =0= |
|
|
| ||
D0 | =00000001 | D1 |
| =00000001 D2 | =00000000 | D3 | =00000000 | |
D4 | =00000000 | D5 |
| =00000002 D6 | =00000000 | D7 | =00000000 | |
A0 | =00000000 | A1 |
| =00000000 A2 | =00000000 | A3 | =00000000 | |
A4 | =00000000 | A5 |
| =00000000 A6 | =00000000 | A7 | =0000FFC0 | |
00010000 203900F0 | 0000 | MOVE.L | ($F00000).L,D0 | |||||
177Bug> |
|
|
|
|
|
|
|
Notice that the target stack pointer is different. The target stack pointer now points to the last value of the exception stack frame that was stacked. The exception stack frame may now be examined using the MD command.
177Bug>MD (A7):&30
0000FFC0 2708 0001 0000 | 7008 | 0000 | FFFC 0105 | 0005 | ' | p | ||
0000FFD0 0005 0005 | 00F0 | 0000 | 0000 | 0A64 | 0000 | FFF4 | ........... | d.... |
0000FFE0 00F0 0000 | FFFF FFFF | 00F0 | 0000 | FFFF FFFF | ................ | |||
0000FFF0 2708 0001 | A708 | 0001 | 0000 | 0000 |
|
| ' | |
177Bug> |
|
|
|
|
|
|
|
|
B |