There are 2 possibilities. There either is some memory mapped at this address (Flash, RAM, NAND, CPU IO stuff, ...) or you just disassembled just some data area, which just looks like a branch, but is never run, e.g. some string or other data structure. This is very likely to happen in x86, but on ARM i would have thought that the different instruction encoding would make it much easier to detect what is code and what is data.
-----Original Message----- From: Bahattin TOZYILMAZ <[EMAIL PROTECTED]> Sent: Freitag, 16. Mai 2008 05:43 To: Hardware and developpement mailing list. <[email protected]> Subject: Re: [Linux4nano-dev] Major break through... sorry for disturbing. but, our code tries to "branch" (in x86 assembly "jump" or "call" as i understand) an illegal address(0xFE3BE444). even i tried to negate the address. it produced 29mb or so. I am asking that, because i dont know much about ARM asm. My only explanation to this branch is that, this address is handled by MU (memory unit, i think).where does it branch, anybody knows? _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
