Also buzzed out the XR68M752IM48-F chip and this checked out fine as well so moved onto the MC680901 chips.
After replacing the MC68901 chips one at a time to check for any boot output changes, I found 1 was the cause of the Panic (the closest to the Yamaha chip). Replacing the chip now shows the following output:
Code: Select all
==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x00004008 {
| 0x004008[0x1005d6c,0xafa294],
| }
| alt alloc (11 entries) = 0x00003ff6 {
| 0x003ff6[0x1004d6c,0x001000], 0x003fe4[0x1004a7c,0x0002f0],
| 0x003fc6[0x1002ea4,0x001bd8], 0x003fb4[0x1002b24,0x000380],
| 0x003fa2[0x1002a24,0x000100], 0x003f84[0x1002a18,0x00000c],
| 0x003f72[0x1000218,0x002800], 0x003f60[0x1000118,0x000100],
| 0x003f42[0x100010c,0x00000c], 0x003f30[0x100000c,0x000100],
| 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x01004d6c
BDOS (fn=0x0044)
BDOS: Mxalloc(2048,0x0003)
BDOS ffit: mp=&pmdalt
BDOS ffit: requested=2048
xmgetmd(): got new MDBLOCK at 0x00004022
xmgetmd(): got MD at 0x00004026
BDOS ffit: start=0x01005d6c, length=2048
BDOS Mxalloc: returns 0x01005d6c
===mem_dump==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x00004026 {
| 0x004026[0x100656c,0xaf9a94],
| }
| alt alloc (12 entries) = 0x00004008 {
| 0x004008[0x1005d6c,0x000800], 0x003ff6[0x1004d6c,0x001000],
| 0x003fe4[0x1004a7c,0x0002f0], 0x003fc6[0x1002ea4,0x001bd8],
| 0x003fb4[0x1002b24,0x000380], 0x003fa2[0x1002a24,0x000100],
| 0x003f84[0x1002a18,0x00000c], 0x003f72[0x1000218,0x002800],
| 0x003f60[0x1000118,0x000100], 0x003f42[0x100010c,0x00000c],
| 0x003f30[0x100000c,0x000100], 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x01005d6c
BDOS (fn=0x004e)
findit(A:\EMUICON.RSC)
dcrack(0x00006cfe -> 'A:\EMUICON.RSC')ckdrv(0)
blkdev_getbpb(0)
device is invalid
BDOS returns: 0xffffffde
can't load user desktop icon file A:\EMUICON.RSC
BDOS (fn=0x0044)
BDOS: Mxalloc(2320,0x0003)
BDOS ffit: mp=&pmdalt
BDOS ffit: requested=2320
xmgetmd(): got MD at 0x00004038
BDOS ffit: start=0x0100656c, length=2320
BDOS Mxalloc: returns 0x0100656c
===mem_dump==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x00004038 {
| 0x004038[0x1006e7c,0xaf9184],
| }
| alt alloc (13 entries) = 0x00004026 {
| 0x004026[0x100656c,0x000910], 0x004008[0x1005d6c,0x000800],
| 0x003ff6[0x1004d6c,0x001000], 0x003fe4[0x1004a7c,0x0002f0],
| 0x003fc6[0x1002ea4,0x001bd8], 0x003fb4[0x1002b24,0x000380],
| 0x003fa2[0x1002a24,0x000100], 0x003f84[0x1002a18,0x00000c],
| 0x003f72[0x1000218,0x002800], 0x003f60[0x1000118,0x000100],
| 0x003f42[0x100010c,0x00000c], 0x003f30[0x100000c,0x000100],
| 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x0100656c
BDOS (fn=0x0044)
BDOS: Mxalloc(4192,0x0003)
BDOS ffit: mp=&pmdalt
BDOS ffit: requested=4192
xmgetmd(): got MD at 0x0000404a
xmgetmd(): MDBLOCK at 0x00004022 is now full
xmgetmd(): removed MDBLOCK at 0x00004022 from mdb chain
BDOS ffit: start=0x01006e7c, length=4192
BDOS Mxalloc: returns 0x01006e7c
===mem_dump==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x0000404a {
| 0x00404a[0x1007edc,0xaf8124],
| }
| alt alloc (14 entries) = 0x00004038 {
| 0x004038[0x1006e7c,0x001060], 0x004026[0x100656c,0x000910],
| 0x004008[0x1005d6c,0x000800], 0x003ff6[0x1004d6c,0x001000],
| 0x003fe4[0x1004a7c,0x0002f0], 0x003fc6[0x1002ea4,0x001bd8],
| 0x003fb4[0x1002b24,0x000380], 0x003fa2[0x1002a24,0x000100],
| 0x003f84[0x1002a18,0x00000c], 0x003f72[0x1000218,0x002800],
| 0x003f60[0x1000118,0x000100], 0x003f42[0x100010c,0x00000c],
| 0x003f30[0x100000c,0x000100], 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x01006e7c
disp() to " "
BDOS (fn=0x003d)
findit(A:\EMUDESK.INF)
dcrack(0x00006d1c -> 'A:\EMUDESK.INF')ckdrv(0)
blkdev_getbpb(0)
device is invalid
xopen(A:\EMUDESK.INF,0): rc=-33
BDOS returns: 0xffffffdf
BDOS (fn=0x0019)
BDOS returns: 0x00000000
BDOS (fn=0x000e)
BDOS returns: 0x00000000
BDOS (fn=0x0049)
BDOS: Mfree(0x01006e7c)
BDOS Mfree: mpb=pmdalt
BDOS freeit: mp=&pmdalt
BDOS freeit: start=0x01006e7c, length=4192
xmfremd(): MD at 0x0000404a freed
xmfremd(): MDBLOCK at 0x00004022 now has free entry, moved to mdb chain
===mem_dump==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x00004038 {
| 0x004038[0x1006e7c,0xaf9184],
| }
| alt alloc (13 entries) = 0x00004026 {
| 0x004026[0x100656c,0x000910], 0x004008[0x1005d6c,0x000800],
| 0x003ff6[0x1004d6c,0x001000], 0x003fe4[0x1004a7c,0x0002f0],
| 0x003fc6[0x1002ea4,0x001bd8], 0x003fb4[0x1002b24,0x000380],
| 0x003fa2[0x1002a24,0x000100], 0x003f84[0x1002a18,0x00000c],
| 0x003f72[0x1000218,0x002800], 0x003f60[0x1000118,0x000100],
| 0x003f42[0x100010c,0x00000c], 0x003f30[0x100000c,0x000100],
| 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x00000000
disp() to " "
BDOS (fn=0x0044)
BDOS: Mxalloc(-1,0x0003)
BDOS ffit: mp=&pmd
BDOS ffit: requested=-1
BDOS ffit: maxval=1984924
BDOS ffit: mp=&pmdalt
BDOS ffit: requested=-1
BDOS ffit: maxval=11506052
BDOS Mxalloc: returns 0x00af9184
===mem_dump==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x00004038 {
| 0x004038[0x1006e7c,0xaf9184],
| }
| alt alloc (13 entries) = 0x00004026 {
| 0x004026[0x100656c,0x000910], 0x004008[0x1005d6c,0x000800],
| 0x003ff6[0x1004d6c,0x001000], 0x003fe4[0x1004a7c,0x0002f0],
| 0x003fc6[0x1002ea4,0x001bd8], 0x003fb4[0x1002b24,0x000380],
| 0x003fa2[0x1002a24,0x000100], 0x003f84[0x1002a18,0x00000c],
| 0x003f72[0x1000218,0x002800], 0x003f60[0x1000118,0x000100],
| 0x003f42[0x100010c,0x00000c], 0x003f30[0x100000c,0x000100],
| 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x00af9184
BDOS (fn=0x0044)
BDOS: Mxalloc(29248,0x0003)
BDOS ffit: mp=&pmdalt
BDOS ffit: requested=29248
xmgetmd(): got MD at 0x0000404a
xmgetmd(): MDBLOCK at 0x00004022 is now full
xmgetmd(): removed MDBLOCK at 0x00004022 from mdb chain
BDOS ffit: start=0x01006e7c, length=29248
BDOS Mxalloc: returns 0x01006e7c
===mem_dump==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x0000404a {
| 0x00404a[0x100e0bc,0xaf1f44],
| }
| alt alloc (14 entries) = 0x00004038 {
| 0x004038[0x1006e7c,0x007240], 0x004026[0x100656c,0x000910],
| 0x004008[0x1005d6c,0x000800], 0x003ff6[0x1004d6c,0x001000],
| 0x003fe4[0x1004a7c,0x0002f0], 0x003fc6[0x1002ea4,0x001bd8],
| 0x003fb4[0x1002b24,0x000380], 0x003fa2[0x1002a24,0x000100],
| 0x003f84[0x1002a18,0x00000c], 0x003f72[0x1000218,0x002800],
| 0x003f60[0x1000118,0x000100], 0x003f42[0x100010c,0x00000c],
| 0x003f30[0x100000c,0x000100], 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x01006e7c
obj_init(): allocated 457 screen objects
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
BDOS (fn=0x0044)
BDOS: Mxalloc(2394,0x0003)
BDOS ffit: mp=&pmdalt
BDOS ffit: requested=2394
xmgetmd(): got new MDBLOCK at 0x00004064
xmgetmd(): got MD at 0x00004068
BDOS ffit: start=0x0100e0bc, length=2396
BDOS Mxalloc: returns 0x0100e0bc
===mem_dump==========================
| std free (1 entries) = 0x0000048e {
| 0x00048e[0x013664,0x1e499c],
| }
| std alloc (0 entries) = 0x00000000 {
|
| }
| ----------------------
| alt free (1 entries) = 0x00004068 {
| 0x004068[0x100ea18,0xaf15e8],
| }
| alt alloc (15 entries) = 0x0000404a {
| 0x00404a[0x100e0bc,0x00095c], 0x004038[0x1006e7c,0x007240],
| 0x004026[0x100656c,0x000910], 0x004008[0x1005d6c,0x000800],
| 0x003ff6[0x1004d6c,0x001000], 0x003fe4[0x1004a7c,0x0002f0],
| 0x003fc6[0x1002ea4,0x001bd8], 0x003fb4[0x1002b24,0x000380],
| 0x003fa2[0x1002a24,0x000100], 0x003f84[0x1002a18,0x00000c],
| 0x003f72[0x1000218,0x002800], 0x003f60[0x1000118,0x000100],
| 0x003f42[0x100010c,0x00000c], 0x003f30[0x100000c,0x000100],
| 0x003f1e[0x1000000,0x00000c],
| }
===/mem_dump==========================
BDOS returns: 0x0100e0bc
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to " "
disp() to "SCRENMGR"
disp() to "EMUDESK "
disp() to " "
disp() to "SCRENMGR"
disp() to "EMUDESK "
AES: EMUDESK: evnt_multi()
disp() to " "
So it now looks to be booting to EmuTOS.
I think that is a positive point to leave it for today.