On Wed, Jan 27, 2010 at 7:44 PM, David Brownell <davi...@pacbell.net> wrote: > On Wednesday 27 January 2010, Edgar Grimberg wrote: >> On Tue, Jan 26, 2010 at 10:08 PM, David Brownell <davi...@pacbell.net> wrote: >> > On Tuesday 26 January 2010, David Brownell wrote: >> >> > No, I haven't checked the buffer. Do you suspect GDB to have a problem ? >> >> > This test is on my to do list for tomorrow. >> >> The buffer looks OK: > > Good. Does the word *after* that look like it's been mangled? > (Fill the buffer and trailer with some hex pattern, then make > sure the trailer is untouched.) > > What I saw was *nothing* going wrong except the load_image > failing because r0 was goofed.
This is a red herring. I can reproduce the goofed registers in a simpler manner :) > reset JTAG tap: imx31.etb tap/device found: 0x2b900f0f (mfg: 0x787, part: 0xb900, ver: 0x2) JTAG tap: imx31.cpu tap/device found: 0x07b3601d (mfg: 0x00e, part: 0x7b36, ver: 0x0) TAP imx31.whatchacallit does not have IDCODE JTAG tap: imx31.smda tap/device found: 0x2190101d (mfg: 0x00e, part: 0x1901, ver: 0x2) found ARM1136 invalid mode value encountered 28 target state: halted unrecognized psr mode: 0x1c target halted in Thumb state due to undefined, current mode: UNRECOGNIZED cpsr: 0x004056bc pc: 0x004056b8 Look at the value of CPSR and PC, and at the error message from (gdb) load: Error: Data transfer failed. Expected end address 0x87f00040, got 0x004056bc. Further more, after a "reset", if I print the registers: > reset JTAG tap: imx31.etb tap/device found: 0x2b900f0f (mfg: 0x787, part: 0xb900, ver: 0x2) JTAG tap: imx31.cpu tap/device found: 0x07b3601d (mfg: 0x00e, part: 0x7b36, ver: 0x0) TAP imx31.whatchacallit does not have IDCODE JTAG tap: imx31.smda tap/device found: 0x2190101d (mfg: 0x00e, part: 0x1901, ver: 0x2) found ARM1136 invalid mode value encountered 28 target state: halted unrecognized psr mode: 0x1c target halted in Thumb state due to undefined, current mode: UNRECOGNIZED cpsr: 0x004056bc pc: 0x004056b8 > reg ===== ARM registers (0) r0 (/32): 0x004056BC (dirty) (1) r1 (/32): 0x004056BC (2) r2 (/32): 0x004056BC (3) r3 (/32): 0x004056BC (4) r4 (/32): 0x004056BC (5) r5 (/32): 0x004056BC (6) r6 (/32): 0x004056BC (7) r7 (/32): 0x004056BC (8) r8 (/32): 0x004056BC (9) r9 (/32): 0x004056BC (10) r10 (/32): 0x004056BC (11) r11 (/32): 0x004056BC (12) r12 (/32): 0x004056BC (13) sp_usr (/32): 0x004056BC (14) lr_usr (/32): 0x004056BC (15) pc (/32): 0x004056B8 Digging further... Edgar -- Edgar Grimberg System Developer Zylin AS ZY1000 JTAG Debugger http://www.zylin.com/zy1000.html Phone: (+47) 51 63 25 00 _______________________________________________ Openocd-development mailing list Openocd-development@lists.berlios.de https://lists.berlios.de/mailman/listinfo/openocd-development