There are 2 possibilities. There either is some memory mapped at this address 
(Flash, RAM, NAND, CPU IO stuff, ...) or you just disassembled just some data 
area, which just looks like a branch, but is never run, e.g. some string or 
other data structure. This is very likely to happen in x86, but on ARM i would 
have thought that the different instruction encoding would make it much easier 
to detect what is code and what is data.

-----Original Message-----
From: Bahattin TOZYILMAZ <[EMAIL PROTECTED]>
Sent: Freitag, 16. Mai 2008 05:43
To: Hardware and developpement mailing list. <[email protected]>
Subject: Re: [Linux4nano-dev] Major break through...

sorry for disturbing. but, our code tries to "branch" (in x86 assembly
"jump" or "call" as i understand) an illegal address(0xFE3BE444). even
i tried to negate the address. it produced 29mb or so. I am asking
that, because i dont know much about ARM asm. My only explanation to
this branch is that, this address is handled  by MU (memory unit, i
think).where does it branch, anybody knows?

_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org


_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to