[U-Boot-Users] Debugging u-boot using an EPI Majic JTAG

Hi!
I'm trying to debug u-boot 1.1.1 using a EPI Majic JTAG probe for arm processors on an PXA255.
I load the compiled elf-binary down using the JTAG, and try to run it. I get immediately a "Hardware instruction breakpoint" message. Other binaries run without problems using the JTAG. Also when i flash u-boot it works.
Has anyone of you used a EPI Majic to debug u-boot successfully?
Here are the logs:
--snip-- EPI Symbolic Assembly Level Debug Monitor, version V6.9.7 - Linux(x86) Copyright (c) 1987-2000 by Embedded Performance Inc. - All Rights Reserved.
Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/spaces.rd Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/pxa250.rd Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/80200.rd Processing register file: /home/chrkap/tinylinux/edta21/bin/arm/majic.rd Reading command history from: '/home/chrkap/tinylinux/edta21/bin/startedb.hst' Establishing communications with remote target via 192.168.0.2... Connection verified Target System: EPI Majic Probe, Version: 3.2.6, S/N 0310H016 Hardware Rev: a0:3:3:10 Target CPU: PXA21x/PXA25x/PXA26x Ethernet: at address 00:80:CF:00:17:FA IP address: 192.168.0.2, Subnet mask: 255.255.255.0 Trace Buffer: 0 frames Profiler: Not Installed Connected via: Ethernet UDP/IP Device name: 192.168.0.2 Target Endian: little Start Address: 00000000: EPI-OS (HIF): on Reset Mode: capture Reading commands from /home/chrkap/tinylinux/edta21/bin/startice.cmd MON> +q // Enter quiet mode Reading startice.cmd file Notification from the target: Target power detected on VREF Auto JTAG detection process detected 1 TAP JTAG connection established Reading dbpxa250.cmd Executing One Time Setup Commands Executing Target Init Commands 48000008: 26F226F2 4800000c: 3FF4A441 48000010: 00007FF0 48000004: 00010018 a0000000: 00000000 00000000 00000000 00000000 a0000010: 00000000 00000000 00000000 00000000 a0000020: 00000000 00000000 00000000 00000000 a0000030: 00000000 00000000 00000000 00000000 a0000040: 00000000 00000000 00000000 00000000 a0000050: 00000000 00000000 00000000 00000000 a0000060: 00000000 00000000 00000000 00000000 a0000070: 00000000 00000000 00000000 00000000 a0000080: 00000000 00000000 00000000 00000000 a0000090: 00000000 00000000 00000000 00000000 a00000a0: 00000000 00000000 00000000 00000000 a00000b0: 00000000 00000000 00000000 00000000 a00000c0: 00000000 00000000 00000000 00000000 a00000d0: 00000000 00000000 00000000 00000000 a00000e0: 00000000 00000000 00000000 00000000 a00000f0: 00000000 00000000 00000000 00000000 Finished reading dbpxa250.cmd Finished reading startice.cmd MON> l /home/chrkap/u-boot/u-boot loading /home/chrkap/u-boot/u-boot section .text from a3f80000 to a3f93cd7 section .rodata from a3f93cd8 to a3f941cb section .rodata. from a3f941cc to a3f9840a section .data from a3f9840c to a3f98d17 section .u_boot_ from a3f98d18 to a3f991c7 section .bss from a3f991c8 to a3f9d70b Entry address set (pc): a3f80000 $a: a3f80000: ea000012 B 0xA3F80050 ; $a MON> g Hardware instruction breakpoint 0000000c: e59ff014 LDR pc,0x28 MON> --snap--
participants (1)
-
Christian Kapeller