Can we load bl2_sd file in OCRAM and debug it from there

キャンセル
次の結果を表示 
表示  限定  | 次の代わりに検索 
もしかして: 

Can we load bl2_sd file in OCRAM and debug it from there

1,530件の閲覧回数
benoitmasse
Contributor III

I want to debug my bl2 file. How can we to do ?

Our target is LS1088

ラベル(1)
0 件の賞賛
返信
2 返答(返信)

474件の閲覧回数
VL38
Contributor I

Hi,

I tried this method to debug BL2 on LX2160a RDB using CW Executable Importer for $ATF_SOURCE_DIR/build/lx2160ardb/release/bl2/bl2.elf. In Debug configuration panel source tab, the code is not automatically found and I tried several method to state the source directory in Source Lookup Path.

Unfortunately, the source are not found when running debug... Only disassembly is available.

Any clue ?

 

 

0 件の賞賛
返信

1,480件の閲覧回数
yipingwang
NXP TechSupport
NXP TechSupport

You could refer to the section "2. Debug u-boot with CodeWarrior for ARMv8" in Use CodeWarrior for ARMv8 to Debug U-boot and Linux Kernel and Bring up Bare Boards to configure CodeWarrior IDE panels to debug bl2 with "attach" method. Please import atf/build/ls1088ardb/release/bl2/bl2.elf in CodeWarrior IDE.

ATF is a simple bareboard application, so you should be able to debug it accordingly. There’s no special guide needed. Given the fact that ATF resides in flash and then copied to OCRAM, you’ll need an “attach” launch configuration. As far as I know, there are two elf files required for debugging, one for BL2 and one for BL31. Also, depending on the MMU configuration, you might need to mark some areas as read-only, in order to force HW BPs to be used from GDB. See ‘mem’ command for more details.

 

I brought in discussion the MMU configuration in a more general sense – so not strictly related to ATF. It’s important to know that debugger (GDB) defaults to software breakpoints by default and they will not work on read-only MMU ranges. So you can either set hardware breakpoints using GDB’s ‘hbreak’ command, either add read-only/write-only memory ranges in GDB (see ‘mem’ command) and force GDB this way to always set HW breakpoints inside those ranges.

 

Regarding the MMU configuration performed by ATF, I’m pretty sure it configures MMU. Moreover, I think I’ve accidentally noticed at some point the ATF marking some memory ranges as read-only – but not sure. So, please discuss this subject with someone working on ATF or inspect the ATF sources yourself. There’s also a GDB command implemented in CW-ARMv8 that allows users inspect current MMU configuration – see ‘mmu’ command and its description (use ‘help’ in Debugger Console or read ch. 6.5.6 from ARMv8 Targeting Manual).

0 件の賞賛
返信