[U-Boot-Users] Debugging u-boot using an EPI Majic JTAG

Christian Kapeller christian.kapeller at gmx.net
Thu Oct 21 18:10:10 CEST 2004


Hi!

I'm trying to debug u-boot 1.1.1 using a EPI Majic JTAG probe for arm
processors on an PXA255.

I load the compiled elf-binary down using the JTAG, and try to run it.
I get immediately a "Hardware instruction breakpoint" message. Other
binaries run without problems using the JTAG. Also when i flash u-boot
it works.

Has anyone of you used a EPI Majic to debug u-boot successfully?

Here are the logs:

--snip--
EPI Symbolic Assembly Level Debug Monitor, version V6.9.7 - Linux(x86)
Copyright (c) 1987-2000 by Embedded Performance Inc. - All Rights Reserved.

Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/spaces.rd
Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/pxa250.rd
Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/80200.rd
Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/majic.rd
Reading command history from: '/home/chrkap/tinylinux/edta21/bin/startedb.hst'
Establishing communications with remote target via 192.168.0.2...
Connection verified
Target System:  EPI Majic Probe, Version: 3.2.6, S/N 0310H016
Hardware Rev:   a0:3:3:10
Target CPU:     PXA21x/PXA25x/PXA26x
Ethernet:       at address 00:80:CF:00:17:FA
IP address:     192.168.0.2, Subnet mask: 255.255.255.0
Trace Buffer:   0 frames
Profiler:       Not Installed
Connected via:  Ethernet UDP/IP
Device name:    192.168.0.2
Target Endian:  little
Start Address:  00000000:
EPI-OS (HIF):   on
Reset Mode:     capture
Reading commands from /home/chrkap/tinylinux/edta21/bin/startice.cmd
MON> +q  // Enter quiet mode
Reading startice.cmd file
Notification from the target:
Target power detected on VREF
Auto JTAG detection process detected 1 TAP
JTAG connection established
Reading dbpxa250.cmd
Executing One Time Setup Commands
Executing Target Init Commands
48000008:    26F226F2
4800000c:    3FF4A441
48000010:    00007FF0
48000004:    00010018
a0000000:    00000000 00000000 00000000 00000000
a0000010:    00000000 00000000 00000000 00000000
a0000020:    00000000 00000000 00000000 00000000
a0000030:    00000000 00000000 00000000 00000000
a0000040:    00000000 00000000 00000000 00000000
a0000050:    00000000 00000000 00000000 00000000
a0000060:    00000000 00000000 00000000 00000000
a0000070:    00000000 00000000 00000000 00000000
a0000080:    00000000 00000000 00000000 00000000
a0000090:    00000000 00000000 00000000 00000000
a00000a0:    00000000 00000000 00000000 00000000
a00000b0:    00000000 00000000 00000000 00000000
a00000c0:    00000000 00000000 00000000 00000000
a00000d0:    00000000 00000000 00000000 00000000
a00000e0:    00000000 00000000 00000000 00000000
a00000f0:    00000000 00000000 00000000 00000000
Finished reading dbpxa250.cmd
Finished reading startice.cmd
MON> l /home/chrkap/u-boot/u-boot
loading /home/chrkap/u-boot/u-boot
 section .text    from a3f80000 to a3f93cd7
 section .rodata  from a3f93cd8 to a3f941cb
 section .rodata. from a3f941cc to a3f9840a
 section .data    from a3f9840c to a3f98d17
 section .u_boot_ from a3f98d18 to a3f991c7
 section .bss     from a3f991c8 to a3f9d70b
Entry address set (pc): a3f80000
$a:
a3f80000:     ea000012    B      0xA3F80050  ; $a
MON> g
Hardware instruction breakpoint
0000000c:     e59ff014    LDR    pc,0x28
MON>
--snap--




More information about the U-Boot mailing list