On Wed, Jan 27, 2010 at 7:44 PM, David Brownell <davi...@pacbell.net> wrote:
> On Wednesday 27 January 2010, Edgar Grimberg wrote:
>> On Tue, Jan 26, 2010 at 10:08 PM, David Brownell <davi...@pacbell.net> wrote:
>> > On Tuesday 26 January 2010, David Brownell wrote:
>> >> > No, I haven't checked the buffer. Do you suspect GDB to have a problem ?
>> >> > This test is on my to do list for tomorrow.
>>
>> The buffer looks OK:
>
> Good.  Does the word *after* that look like it's been mangled?
> (Fill the buffer and trailer with some hex pattern, then make
> sure the trailer is untouched.)
>
> What I saw was *nothing* going wrong except the load_image
> failing because r0 was goofed.

This is a red herring. I can reproduce the goofed registers in a
simpler manner :)

> reset
JTAG tap: imx31.etb tap/device found: 0x2b900f0f (mfg: 0x787, part:
0xb900, ver: 0x2)
JTAG tap: imx31.cpu tap/device found: 0x07b3601d (mfg: 0x00e, part:
0x7b36, ver: 0x0)
TAP imx31.whatchacallit does not have IDCODE
JTAG tap: imx31.smda tap/device found: 0x2190101d (mfg: 0x00e, part:
0x1901, ver: 0x2)
found ARM1136
invalid mode value encountered 28
target state: halted
unrecognized psr mode: 0x1c
target halted in Thumb state due to undefined, current mode: UNRECOGNIZED
cpsr: 0x004056bc pc: 0x004056b8

Look at the value of CPSR and PC, and at the error message from (gdb) load:

Error: Data transfer failed. Expected end address 0x87f00040, got 0x004056bc.

Further more, after a "reset", if I print the registers:

> reset
JTAG tap: imx31.etb tap/device found: 0x2b900f0f (mfg: 0x787, part:
0xb900, ver: 0x2)
JTAG tap: imx31.cpu tap/device found: 0x07b3601d (mfg: 0x00e, part:
0x7b36, ver: 0x0)
TAP imx31.whatchacallit does not have IDCODE
JTAG tap: imx31.smda tap/device found: 0x2190101d (mfg: 0x00e, part:
0x1901, ver: 0x2)
found ARM1136
invalid mode value encountered 28
target state: halted
unrecognized psr mode: 0x1c
target halted in Thumb state due to undefined, current mode: UNRECOGNIZED
cpsr: 0x004056bc pc: 0x004056b8
> reg
===== ARM registers
(0) r0 (/32): 0x004056BC (dirty)
(1) r1 (/32): 0x004056BC
(2) r2 (/32): 0x004056BC
(3) r3 (/32): 0x004056BC
(4) r4 (/32): 0x004056BC
(5) r5 (/32): 0x004056BC
(6) r6 (/32): 0x004056BC
(7) r7 (/32): 0x004056BC
(8) r8 (/32): 0x004056BC
(9) r9 (/32): 0x004056BC
(10) r10 (/32): 0x004056BC
(11) r11 (/32): 0x004056BC
(12) r12 (/32): 0x004056BC
(13) sp_usr (/32): 0x004056BC
(14) lr_usr (/32): 0x004056BC
(15) pc (/32): 0x004056B8

Digging further...

Edgar



-- 
Edgar Grimberg
System Developer
Zylin AS
ZY1000 JTAG Debugger http://www.zylin.com/zy1000.html
Phone: (+47) 51 63 25 00
_______________________________________________
Openocd-development mailing list
Openocd-development@lists.berlios.de
https://lists.berlios.de/mailman/listinfo/openocd-development

Reply via email to