On Mon, May 28, 2012 at 4:55 PM, Alexander Osipenko <[email protected]> wrote:
> Hi,
>
> i have submit latest patches.
> The problem with pre-V6 should be fixed.

Thanks. Yes the latest patch set is good. I give it a +1 now. On
the other hand, maybe it is good to get some confirmation from
Spen as well.

I will also try to borrow a V6 to further test the new patch set.

Take note I also apply your patch here. I think that one should be
merged to the mainline git now.
http://openocd.zylin.com/#/c/670/

mymacmini:stm32 xiaofanc$ ~/binj2/bin/openocd -f openocd_jlink.cfg
Open On-Chip Debugger 0.6.0-dev-00597-gb4ce520-dirty (2012-05-28-18:34)
Licensed under GNU GPL v2
For bug reports, read
        http://openocd.sourceforge.net/doc/doxygen/bugs.html
Info : only one transport option; autoselect 'jtag'
1000 kHz
adapter_nsrst_delay: 100
jtag_ntrst_delay: 100
cortex_m3 reset_config sysresetreq
[timestamp] [threadID] facility level [function call] <message>
--------------------------------------------------------------------------------
[ 0.000000] [00000407] libusbx: warning
[darwin_cache_device_descriptor] could not retrieve device descriptor
05ac:8281: device not responding. skipping device
[ 0.203557] [00000407] libusbx: warning [libusb_get_config_descriptor]
descriptor data still left
[ 0.265642] [00000407] libusbx: warning [libusb_get_config_descriptor]
descriptor data still left
Info : J-Link initialization started / target CPU reset initiated
Info : J-Link compiled Feb 20 2006 18:20:20 -- Update --
Info : J-Link caps 0x3
Info : J-Link hw version 30000
Info : J-Link hw type J-Link
Info : Vref = 3.286 TCK = 1 TDI = 1 TDO = 1 TMS = 1 SRST = 0 TRST = 255
Info : J-Link JTAG Interface ready
Info : clock speed 1000 kHz
Info : JTAG tap: stm32f1x.cpu tap/device found: 0x3ba00477 (mfg:
0x23b, part: 0xba00, ver: 0x3)
Info : JTAG tap: stm32f1x.bs tap/device found: 0x16410041 (mfg: 0x020,
part: 0x6410, ver: 0x1)
Info : stm32f1x.cpu: hardware has 6 breakpoints, 4 watchpoints
1000 kHz
Info : JTAG tap: stm32f1x.cpu tap/device found: 0x3ba00477 (mfg:
0x23b, part: 0xba00, ver: 0x3)
Info : JTAG tap: stm32f1x.bs tap/device found: 0x16410041 (mfg: 0x020,
part: 0x6410, ver: 0x1)
target state: halted
target halted due to debug-request, current mode: Thread
xPSR: 0x01000000 pc: 0x0800272c msp: 0x20000810
8000 kHz
dumped 131072 bytes in 1.045539s (122.425 KiB/s)
verified 131072 bytes in 0.286362s (446.987 KiB/s)
Info : device id = 0x20036410
Info : flash size = 128kbytes
stm32x mass erase complete
wrote 131072 bytes from file dump.bin in 3.618656s (35.372 KiB/s)
verified 131072 bytes in 0.292000s (438.356 KiB/s)
20480 bytes written at address 0x20000000
downloaded 20480 bytes in 0.149020s (134.210 KiB/s)
1000 kHz
Info : JTAG tap: stm32f1x.cpu tap/device found: 0x3ba00477 (mfg:
0x23b, part: 0xba00, ver: 0x3)
Info : JTAG tap: stm32f1x.bs tap/device found: 0x16410041 (mfg: 0x020,
part: 0x6410, ver: 0x1)
shutdown command invoked


-- 
Xiaofan

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
OpenOCD-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openocd-devel

Reply via email to