16 November 2017, 10:20 | #1 |
Registered User
Join Date: Apr 2005
Location: digital hell, Germany, after 1984, but worse
Posts: 3,365
|
WinUAE Enforcer hit: illegal read from 0 by ROM = bug ?
How should I rate an Enforcer hit "illegal read from $00000000" = CMP.L (0).w, D0 if it's done by the ROM 40.68 A1200 at $00F8357C or A4000 at $00F83584 ? Is this really a bug ? (Sorry, the log files are already overwritten) I'm using WinUAE 3.5.0 x64
|
16 November 2017, 10:46 | #2 |
Defendit numerus
Join Date: Mar 2017
Location: Crossing the Rubicon
Age: 53
Posts: 4,468
|
Is somewhere related to 'HELP' string in $0 by a catastrophic failure?
|
16 November 2017, 11:53 | #3 |
Registered User
Join Date: Aug 2014
Location: Zagreb / Croatia
Posts: 302
|
Exec Alert() function is in that part of ROM.
Do you mean Enforcer debugging tool by Michael Sinz? Last version is V37.73. WinUAE configuration? Last edited by Tomislav; 18 November 2017 at 11:58. |
16 November 2017, 13:49 | #4 |
Registered User
Join Date: Sep 2011
Location: Paris/France
Posts: 274
|
Certainly a null pointer is given to some ROM function
So the error is in the program/function that call it (in the program not in ROM) So just check in the enforcer log what stack was before the call to $00F8357C Last edited by DH; 16 November 2017 at 14:20. Reason: Deleted direct signature |
16 November 2017, 16:28 | #5 |
WinUAE developer
Join Date: Aug 2001
Location: Hämeenlinna/Finland
Age: 49
Posts: 26,504
|
Code:
00F83576 203c 4845 4c50 MOVE.L #$48454c50,D0 00F8357C b0b8 0000 CMP.L $0000,D0 |
17 November 2017, 14:42 | #6 |
Registered User
Join Date: Apr 2005
Location: digital hell, Germany, after 1984, but worse
Posts: 3,365
|
Yes ok, it's a "HELP" check, whatever it's doing. Since I have no ROM documentation and don't want to reverse engineer that routine, it's unclear what exactly the purpose of this check at address 0 is.
But my question was more why it should be an illegal access to Null if this is a hard coded address and it's done by the ROM. The ROM should be allowed to do that. But maybe the coders indeed wanted to cause an Enforcer hit to get attention when this code is ever executed. Unfortunately, I can not reproduce this hit and don't have the Enforcer logs anymore. Thanks for all replies. |
17 November 2017, 14:57 | #7 | |
Registered User
Join Date: Oct 2008
Location: EU
Posts: 163
|
Quote:
Last edited by a4k-oerx; 17 November 2017 at 15:11. Reason: Replaced deep link. |
|
19 November 2017, 18:56 | #8 | |
Registered User
Join Date: Apr 2005
Location: digital hell, Germany, after 1984, but worse
Posts: 3,365
|
Thx for your help, a4k-oerx!
Quote:
|
|
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Enforcer with WinUAE ? | Lord Riton | support.WinUAE | 11 | 26 September 2017 19:12 |
Bug in x64 file requester and bug in Blizzard PPC ROM filesize | headkase | support.WinUAE | 5 | 26 June 2016 14:17 |
WinUAE Enforcer and BADEDEEF? | AGS | support.WinUAE | 3 | 17 March 2015 21:09 |
WinUAE Enforcer : pause at error ? | thellier | support.WinUAE | 1 | 11 March 2015 21:22 |
Hit Fido Demo in WinUAE | thor | support.WinUAE | 8 | 29 November 2006 22:39 |
|
|