Siul2_Dio_Ip_Example_S32K312

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Siul2_Dio_Ip_Example_S32K312

Jump to solution
1,205 Views
Lita
Contributor II

After Siul2_Dio_Ip_Example_S32K312 routine is burned to S32K314, it is burned to flash through jlink, and an error occurs. K314 is designed by referring to the development board of the official website.The following error occurs:

 

ownloading 16224 bytes @ address 0x00400000 - Verified OK
Downloading 6648 bytes @ address 0x00403F60 - Verified OK
Downloading 148 bytes @ address 0x00405958 - Verified OK
Downloading 1036 bytes @ address 0x004059EC - Verified OK
Comparing flash [....................] Done.
Erasing flash [....................] Done.
Programming flash [....................] Done.
Writing register (PC = 0x 401420)
Read 4 bytes @ address 0x00401420 (Data = 0xF04FB672)
Read 2 bytes @ address 0x00401420 (Data = 0xB672)
Reading 64 bytes @ address 0x004015C0
Read 2 bytes @ address 0x004015E8 (Data = 0xB538)
Received monitor command: clrbp
Received monitor command: reset
Resetting target
Received monitor command: halt
Halting target CPU...
...Target halted (PC = 0x20000340)
Read 2 bytes @ address 0x004015E8 (Data = 0xB538)
Received monitor command: regs
R0 = 200005EC, R1 = 20000634, R2 = 2000060C, R3 = 00405C00
R4 = 200005EC, R5 = 20000644, R6 = 20000644, R7 = 00000000
R8 = 00000000, R9 = 00000000, R10= 00000000, R11= 00000000
R12= 20000570, R13= 200005E0, MSP= 200005E0, PSP= 00000000
R14(LR) = 20000341, R15(PC) = 20000340
XPSR 21000003, APSR 20000000, EPSR 01000000, IPSR 00000003
CFBP 00000001, CONTROL 00, FAULTMASK 00, BASEPRI 00, PRIMASK 01

Security extension regs:
MSP_S = 00000000, MSPLIM_S = 00000000
PSP_S = 00000000, PSPLIM_S = 00000000
MSP_NS = 200005E0, MSPLIM_NS = 00000000
PSP_NS = 00000000, PSPLIM_NS = 00000000
CONTROL_S 00, FAULTMASK_S 00, BASEPRI_S 00, PRIMASK_S 00
CONTROL_NS 00, FAULTMASK_NS 00, BASEPRI_NS 00, PRIMASK_NS 01

Reading all registers
Setting breakpoint @ address 0x004015E8, Size = 2, BPHandle = 0x0001
Starting target CPU...
...Target halted (DBGRQ, PC = 0x20010000)
Reading all registers
Removing breakpoint @ address 0x004015E8, Size = 2
WARNING: Failed to read memory @ address 0x20010000
Reading 64 bytes @ address 0x00000000
Reading 64 bytes @ address 0x00000040
Reading 64 bytes @ address 0x00000080
Reading 64 bytes @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
Reading 64 bytes @ address 0x2000FFC0
Read 4 bytes @ address 0x20000340 (Data = 0x00000000)
Read 2 bytes @ address 0x20000340 (Data = 0x0000)
Read 4 bytes @ address 0x20000340 (Data = 0x00000000)
Read 2 bytes @ address 0x20000340 (Data = 0x0000)
Reading 64 bytes @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
Reading 64 bytes @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010002
Reading 64 bytes @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
Reading 64 bytes @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010000
WARNING: Failed to read memory @ address 0x20010002
Reading 64 bytes @ address 0x2000FF80

0 Kudos
1 Solution
1,113 Views
danielmartynek
NXP TechSupport
NXP TechSupport

Hi @Lita,

Can you try this solution to mass erase the S32K312 project before it is programmed again?

https://community.nxp.com/t5/S32-SDK/failed-to-power-up-dap-after-program-s32k312-with-pll0-equal/td...

 

BR, Daniel

View solution in original post

0 Kudos
7 Replies
1,188 Views
danielmartynek
NXP TechSupport
NXP TechSupport

Hi @Lita,

The S32K312 is a different MCU.

Please create a new project for S32K314 and refer to the S32K344 example.

The S32K314 is a decoupled S32K344 with one core disabled.

 

Regards,

Daniel

 

0 Kudos
1,154 Views
Lita
Contributor II
Now the s32k314 project is created, but the debug flash is faulty.
Emulation stops at the cpsid i location in the file startup_cm7.s
0 Kudos
1,143 Views
danielmartynek
NXP TechSupport
NXP TechSupport
0 Kudos
1,120 Views
Lita
Contributor II
The example appear same error
0 Kudos
1,114 Views
danielmartynek
NXP TechSupport
NXP TechSupport

Hi @Lita,

Can you try this solution to mass erase the S32K312 project before it is programmed again?

https://community.nxp.com/t5/S32-SDK/failed-to-power-up-dap-after-program-s32k312-with-pll0-equal/td...

 

BR, Daniel

0 Kudos
1,138 Views
Lita
Contributor II
The DEBUG flash cannot run again with the following error message:
SEGGER J-Link GDB Server V7.88j Command Line Version

JLinkARM.dll V7.88j (DLL compiled Jun 28 2023 13:39:15)

Command line: -if jtag -device S32K314 -endian little -speed 1000 -port 2331 -swoport 2332 -telnetport 2333 -vd -ir -localhostonly 1 -singlerun -strict -timeout 0 -nogui
-----GDB Server start settings-----
GDBInit file: none
GDB Server Listening port: 2331
SWO raw output listening port: 2332
Terminal I/O port: 2333
Accept remote connection: localhost only
Generate logfile: off
Verify download: on
Init regs on start: on
Silent mode: off
Single run mode: on
Target connection timeout: 0 ms
------J-Link related settings------
J-Link Host interface: USB
J-Link script: none
J-Link settings file: none
------Target related settings------
Target device: S32K314
Target device parameters: none
Target interface: JTAG
Target interface speed: 1000kHz
Target endian: little

Connecting to J-Link...
J-Link is connected.
Firmware: J-Link V9 compiled Dec 13 2022 11:14:50
Hardware: V9.60
S/N: 69664823
Feature(s): RDI, GDB, FlashDL, FlashBP, JFlash
Checking target voltage...
Target voltage: 3.31 V
Listening on TCP/IP port 2331
Connecting to target...

J-Link found 1 JTAG device, Total IRLen = 8
JTAG ID: 0x0996001D (Cortex-M7)
Initializing CPU registers...Connected to target
Waiting for GDB connection...Connected to 0000:0000:0000:0000:0000:0000:0000:0001
GDB client (conn. 876) requested target.xml from GDB Server
Reading common registers: Read register 'r0' (4 bytes) from hardware: 0x00000000
Read register 'r1' (4 bytes) from hardware: 0x00000000
Read register 'r2' (4 bytes) from hardware: 0x00000000
Read register 'r3' (4 bytes) from hardware: 0x00000000
Read register 'r4' (4 bytes) from hardware: 0x00000000
Read register 'r5' (4 bytes) from hardware: 0x00000000
Read register 'r6' (4 bytes) from hardware: 0x00000000
Read register 'r7' (4 bytes) from hardware: 0x00000000
Read register 'r8' (4 bytes) from hardware: 0x00000000
Read register 'r9' (4 bytes) from hardware: 0x00000000
Read register 'r10' (4 bytes) from hardware: 0x00000000
Read register 'r11' (4 bytes) from hardware: 0x00000000
Read register 'r12' (4 bytes) from hardware: 0x00000000
Read register 'sp' (4 bytes) from hardware: 0x00000000
Read register 'lr' (4 bytes) from hardware: 0x00000000
Read register 'pc' (4 bytes) from hardware: 0x00000000
Read register 'xpsr' (4 bytes) from hardware: 0x00000001
Read 4 bytes @ address 0x00000000 (Data = 0x00000000)
Read 2 bytes @ address 0x00000000 (Data = 0x0000)
Received monitor command: speed 100
Target interface speed set to 100 kHz
Received monitor command: clrbp
Received monitor command: reset
Resetting target
Received monitor command: halt
Halting target CPU...
...Target halted (PC = 0x20000008)
Received monitor command: regs
R0 = 20404000, R1 = 00000000, R2 = DEADBEEF, R3 = 00400400
R4 = 200008B4, R5 = 200008D4, R6 = 200008D4, R7 = 00000000
R8 = 00000000, R9 = 00000000, R10= 00000000, R11= 00000000
R12= 00000FFE, R13= 200008A8, MSP= 200008A8, PSP= 00000000
R14(LR) = 2000035B, R15(PC) = 20000008
XPSR 61000000, APSR 60000000, EPSR 01000000, IPSR 00000000
CFBP 00000000, CONTROL 00, FAULTMASK 00, BASEPRI 00, PRIMASK 00

Security extension regs:
MSP_S = 00000000, MSPLIM_S = 00000000
PSP_S = 00000000, PSPLIM_S = 00000000
MSP_NS = 200008A8, MSPLIM_NS = 00000000
PSP_NS = 00000000, PSPLIM_NS = 00000000
CONTROL_S 00, FAULTMASK_S 00, BASEPRI_S 00, PRIMASK_S 00
CONTROL_NS 00, FAULTMASK_NS 00, BASEPRI_NS 00, PRIMASK_NS 00

Reading common registers: Read register 'r0' (4 bytes) from hardware: 0x00404020
Read register 'r1' (4 bytes) from hardware: 0x00000000
Read register 'r2' (4 bytes) from hardware: 0xEFBEADDE
Read register 'r3' (4 bytes) from hardware: 0x00044000
Read register 'r4' (4 bytes) from hardware: 0xB4080020
Read register 'r5' (4 bytes) from hardware: 0xD4080020
Read register 'r6' (4 bytes) from hardware: 0xD4080020
Read register 'r7' (4 bytes) from hardware: 0x00000000
Read register 'r8' (4 bytes) from hardware: 0x00000000
Read register 'r9' (4 bytes) from hardware: 0x00000000
Read register 'r10' (4 bytes) from hardware: 0x00000000
Read register 'r11' (4 bytes) from hardware: 0x00000000
Read register 'r12' (4 bytes) from hardware: 0xFE0F0000
Read register 'sp' (4 bytes) from hardware: 0xA8080020
Read register 'lr' (4 bytes) from hardware: 0x5B030020
Read register 'pc' (4 bytes) from hardware: 0x08000020
Read register 'xpsr' (4 bytes) from hardware: 0x00000061
Received monitor command: speed 1000
Target interface speed set to 1000 kHz
Received monitor command: flash breakpoints 1
Flash breakpoints enabled
Received monitor command: semihosting enable
Semi-hosting enabled (Handle on breakpoint instruction hit)
Received monitor command: semihosting IOClient 1
Semihosting I/O set to TELNET Client
Reading 64 bytes @ address 0x00401600
Read 2 bytes @ address 0x00401614 (Data = 0xFFFF)
Received monitor command: clrbp
Received monitor command: reset
Resetting target
Received monitor command: halt
Halting target CPU...
...Target halted (PC = 0x20000008)
Downloading 16192 bytes @ address 0x00400000 - Verified OK
Downloading 8544 bytes @ address 0x00403F40 - Verified OK
Downloading 144 bytes @ address 0x004060A0 - Verified OK
Downloading 1036 bytes @ address 0x00406130 - Verified OK
Downloading 20 bytes @ address 0x0040653C - Verified OK
Writing register 'pc' = 0x00401420
Comparing flash [....................] Done.
Erasing flash [....................] Done.
Programming flash [....................] Done.
Reading 64 bytes @ address 0x00401600
Read 2 bytes @ address 0x00401614 (Data = 0xFFFF)
Read 2 bytes @ address 0x00401614 (Data = 0xFFFF)
Received monitor command: regs
R0 = 20404000, R1 = 00000000, R2 = DEADBEEF, R3 = 00400400
R4 = 200008B4, R5 = 200008D4, R6 = 200008D4, R7 = 00000000
R8 = 00000000, R9 = 00000000, R10= 00000000, R11= 00000000
R12= 00000FFE, R13= 200008A8, MSP= 200008A8, PSP= 00000000
R14(LR) = 2000035B, R15(PC) = 20000008
XPSR 61000000, APSR 60000000, EPSR 01000000, IPSR 00000000
CFBP 00000000, CONTROL 00, FAULTMASK 00, BASEPRI 00, PRIMASK 00

Security extension regs:
MSP_S = 00000000, MSPLIM_S = 00000000
PSP_S = 00000000, PSPLIM_S = 00000000
MSP_NS = 200008A8, MSPLIM_NS = 00000000
PSP_NS = 00000000, PSPLIM_NS = 00000000
CONTROL_S 00, FAULTMASK_S 00, BASEPRI_S 00, PRIMASK_S 00
CONTROL_NS 00, FAULTMASK_NS 00, BASEPRI_NS 00, PRIMASK_NS 00

Reading common registers: Read register 'r0' (4 bytes) from hardware: 0x00404020
Read register 'r1' (4 bytes) from hardware: 0x00000000
Read register 'r2' (4 bytes) from hardware: 0xEFBEADDE
Read register 'r3' (4 bytes) from hardware: 0x00044000
Read register 'r4' (4 bytes) from hardware: 0xB4080020
Read register 'r5' (4 bytes) from hardware: 0xD4080020
Read register 'r6' (4 bytes) from hardware: 0xD4080020
Read register 'r7' (4 bytes) from hardware: 0x00000000
Read register 'r8' (4 bytes) from hardware: 0x00000000
Read register 'r9' (4 bytes) from hardware: 0x00000000
Read register 'r10' (4 bytes) from hardware: 0x00000000
Read register 'r11' (4 bytes) from hardware: 0x00000000
Read register 'r12' (4 bytes) from hardware: 0xFE0F0000
Read register 'sp' (4 bytes) from hardware: 0xA8080020
Read register 'lr' (4 bytes) from hardware: 0x5B030020
Read register 'pc' (4 bytes) from hardware: 0x08000020
Read register 'xpsr' (4 bytes) from hardware: 0x00000061
Setting breakpoint @ address 0x00401614, Kind = 2, Type = THUMB, BPHandle = 0x0003
Starting target CPU...
Debugger requested to halt target...
...Target halted (PC = 0x20000008)
Reading common registers: Read register 'r0' (4 bytes) from hardware: 0x00404020
Read register 'r1' (4 bytes) from hardware: 0x00000000
Read register 'r2' (4 bytes) from hardware: 0xEFBEADDE
Read register 'r3' (4 bytes) from hardware: 0x00044000
Read register 'r4' (4 bytes) from hardware: 0xB4080020
Read register 'r5' (4 bytes) from hardware: 0xD4080020
Read register 'r6' (4 bytes) from hardware: 0xD4080020
Read register 'r7' (4 bytes) from hardware: 0x00000000
Read register 'r8' (4 bytes) from hardware: 0x00000000
Read register 'r9' (4 bytes) from hardware: 0x00000000
Read register 'r10' (4 bytes) from hardware: 0x00000000
Read register 'r11' (4 bytes) from hardware: 0x00000000
Read register 'r12' (4 bytes) from hardware: 0xFE0F0000
Read register 'sp' (4 bytes) from hardware: 0xA8080020
Read register 'lr' (4 bytes) from hardware: 0x5B030020
Read register 'pc' (4 bytes) from hardware: 0x08000020
Read register 'xpsr' (4 bytes) from hardware: 0x00000061
Removing breakpoint @ address 0x00401614, Size = 2
Read 4 bytes @ address 0x20000008 (Data = 0xDEADE7FE)
Read 2 bytes @ address 0x20000008 (Data = 0xE7FE)
Read 4 bytes @ address 0x2000035A (Data = 0xBEEFDEAD)
Read 2 bytes @ address 0x2000035A (Data = 0xDEAD)
Read 4 bytes @ address 0x2000035A (Data = 0xBEEFDEAD)
Read 2 bytes @ address 0x2000035A (Data = 0xDEAD)
Reading 64 bytes @ address 0x20000000
Reading 64 bytes @ address 0x20000040
Reading 64 bytes @ address 0x1FFFFFC0
WARNING: Failed to read memory @ address 0x1FFFFFC0
WARNING: Failed to read memory @ address 0x1FFFFFE0
Reading 64 bytes @ address 0x1FFFFFC0
0 Kudos
1,202 Views
Lita
Contributor II

The disassembly print information as follows

 

2000fffc: movs r0, r0
2000fffe: movs r0, r0
20010000: Failed to execute MI command:
-data-disassemble -s 536936448 -e 536936518 -- 3
Error message from debugger back end:
Cannot access memory at address 0x20010000
20010001: Failed to execute MI command:
-data-disassemble -s 536936449 -e 536936597 -- 3
Error message from debugger back end:
Cannot access memory at address 0x20010000
20010002: Failed to execute MI command:
-data-disassemble -s 536936450 -e 536936598 -- 3
Error message from debugger back end:

0 Kudos