Hello,

for one new device I want to use OpenOCD debugger. I changed the script and got 
following message:

Open On-Chip Debugger 0.6.0-dev-00497-ga6cf60c (2012-04-06-08:15)
Licensed under GNU GPL v2
For bug reports, read
        http://openocd.sourceforge.net/doc/doxygen/bugs.html
Info : only one transport option; autoselect 'jtag'
300 kHz
srst_only separate srst_gates_jtag srst_open_drain
adapter_nsrst_delay: 100
jtag_ntrst_delay: 100
cortex_m3 reset_config sysresetreq
Info : clock speed 300 kHz
Info : JTAG tap: newcm3.cpu tap/device found: 0x4ba00477 (mfg: 0x23b, part: 
0xba00, ver: 0x4)
Info : newcm3.cpu: hardware has 6 breakpoints, 4 watchpoints
Info : JTAG tap: newcm3.cpu tap/device found: 0x4ba00477 (mfg: 0x23b, part: 
0xba00, ver: 0x4)
target state: halted
target halted due to debug-request, current mode: Handler HardFault
xPSR: 0x61000003 pc: 0x10000010 msp: 0xffffffd8
#0 : newcm3.flash (cfi) at 0x70000000, size 0x04000000, buswidth 4, chipwidth 4
Info : Flash Manufacturer/Device: 0x0001 0x227e
Info : Flash Manufacturer/Device: 0x0001 0x227e
flash 'cfi' found at 0x70000000
Error: Unknown ARM architecture
Error: error writing to flash at address 0x70000000 at offset 0x00000000
Runtime Error: openocd.cfg:45:

If I run OpenOCD with parameter "-d 3", I got messages below. It seems that CFI 
code does not detect correctly CM3 architecture ?

What shall I change or add to get it work ?

Thank you in advance,
Vaclav

User : 385 2203 armv7m.c:517 armv7m_arch_state(): target halted due to 
debug-request, current mode: Handler HardFault
xPSR: 0x61000003 pc: 0x10000010 msp: 0xffffffd8
Debug: 386 2219 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_newcm3.cpu curstate
Debug: 387 2219 command.c:145 script_debug(): command - ocd_newcm3.cpu 
ocd_newcm3.cpu curstate
Debug: 388 2219 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_newcm3.cpu cget -chain-position
Debug: 389 2235 command.c:145 script_debug(): command - ocd_newcm3.cpu 
ocd_newcm3.cpu cget -chain-position
Debug: 390 2235 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_jtag tapisenabled newcm3.cpu
Debug: 391 2235 command.c:145 script_debug(): command - ocd_jtag ocd_jtag 
tapisenabled newcm3.cpu
Debug: 392 2235 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_newcm3.cpu arp_waitstate halted 5000
Debug: 393 2250 command.c:145 script_debug(): command - ocd_newcm3.cpu 
ocd_newcm3.cpu arp_waitstate halted 5000
Debug: 394 2250 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_newcm3.cpu invoke-event reset-init
Debug: 395 2266 command.c:145 script_debug(): command - ocd_newcm3.cpu 
ocd_newcm3.cpu invoke-event reset-init
Debug: 396 2266 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_newcm3.cpu invoke-event reset-end
Debug: 397 2266 command.c:145 script_debug(): command - ocd_newcm3.cpu 
ocd_newcm3.cpu invoke-event reset-end
Debug: 399 2282 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_flash banks
Debug: 400 2282 command.c:145 script_debug(): command - ocd_flash ocd_flash 
banks
User : 402 2297 tcl.c:797 handle_flash_banks_command(): #0 : newcm3.flash (cfi) 
at 0x70000000, size 0x04000000, buswidth 4, chipwid
th 4
Debug: 403 2297 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_flash probe 0
Debug: 404 2297 command.c:145 script_debug(): command - ocd_flash ocd_flash 
probe 0
Info : 406 2313 cfi.c:2619 cfi_probe(): Flash Manufacturer/Device: 0x0001 0x227e
Debug: 407 2328 cfi.c:2531 cfi_query_string(): CFI qry returned: 0x51 0x52 0x59
Debug: 408 2344 cfi.c:2670 cfi_probe(): qry: 'QRY', pri_id: 0x0002, pri_addr: 
0x0040, alt_id: 0x0000, alt_addr: 0x0000
Debug: 409 2391 cfi.c:2728 cfi_probe(): size: 0x4000000, interface desc: 2, max 
buffer write size: 0x40
Debug: 410 2391 cfi.c:2744 cfi_probe(): erase region[0]: 512 blocks of size 
0x20000
Debug: 411 2407 cfi.c:542 cfi_read_spansion_pri_ext(): pri: 'PRI', version: 1.3
Debug: 412 2438 cfi.c:579 cfi_read_spansion_pri_ext(): Silicon Revision: 0x14, 
Erase Suspend: 0x2, Block protect: 0x1
Debug: 413 2438 cfi.c:583 cfi_read_spansion_pri_ext(): Temporary Unprotect: 
0x0, Block Protect Scheme: 0x8, Simultaneous Ops: 0x0
Debug: 414 2453 cfi.c:585 cfi_read_spansion_pri_ext(): Burst Mode: 0x0, Page 
Mode: 0x2,
Debug: 415 2453 cfi.c:590 cfi_read_spansion_pri_ext(): Vpp min: 11.5, Vpp max: 
12.5
Debug: 416 2453 cfi.c:592 cfi_read_spansion_pri_ext(): WP# protection 0x4
Debug: 417 2469 cfi.c:2786 cfi_probe(): Vcc min: 2.7, Vcc max: 3.6, Vpp min: 
0.0, Vpp max: 0.0
Debug: 418 2469 cfi.c:2791 cfi_probe(): typ. word write timeout: 64 us, typ. 
buf write timeout: 64 us, typ. block erase timeout: 5
12 ms, typ. chip erase timeout: 524288 ms
Debug: 419 2485 cfi.c:2798 cfi_probe(): max. word write timeout: 512 us, max. 
buf write timeout: 2048 us, max. block erase timeout
: 4096 ms, max. chip erase timeout: 2097152 ms
Debug: 420 2485 cfi.c:2813 cfi_probe(): calculated word write timeout: 1 ms, 
buf write timeout: 3 ms, block erase timeout: 4096 ms
, chip erase timeout: 2097152 ms
Info : 421 2516 cfi.c:2619 cfi_probe(): Flash Manufacturer/Device: 0x0001 0x227e
Debug: 422 2532 cfi.c:2531 cfi_query_string(): CFI qry returned: 0x51 0x52 0x59
Debug: 423 2532 cfi.c:2670 cfi_probe(): qry: 'QRY', pri_id: 0x0002, pri_addr: 
0x0040, alt_id: 0x0000, alt_addr: 0x0000
Debug: 424 2578 cfi.c:2728 cfi_probe(): size: 0x4000000, interface desc: 2, max 
buffer write size: 0x40
Debug: 425 2578 cfi.c:2744 cfi_probe(): erase region[0]: 512 blocks of size 
0x20000
Debug: 426 2594 cfi.c:542 cfi_read_spansion_pri_ext(): pri: 'PRI', version: 1.3
Debug: 427 2625 cfi.c:579 cfi_read_spansion_pri_ext(): Silicon Revision: 0x14, 
Erase Suspend: 0x2, Block protect: 0x1
Debug: 428 2625 cfi.c:583 cfi_read_spansion_pri_ext(): Temporary Unprotect: 
0x0, Block Protect Scheme: 0x8, Simultaneous Ops: 0x0
Debug: 429 2625 cfi.c:585 cfi_read_spansion_pri_ext(): Burst Mode: 0x0, Page 
Mode: 0x2,
Debug: 430 2641 cfi.c:590 cfi_read_spansion_pri_ext(): Vpp min: 11.5, Vpp max: 
12.5
Debug: 431 2641 cfi.c:592 cfi_read_spansion_pri_ext(): WP# protection 0x4
Debug: 432 2641 cfi.c:2786 cfi_probe(): Vcc min: 2.7, Vcc max: 3.6, Vpp min: 
0.0, Vpp max: 0.0
Debug: 433 2657 cfi.c:2791 cfi_probe(): typ. word write timeout: 64 us, typ. 
buf write timeout: 64 us, typ. block erase timeout: 5
12 ms, typ. chip erase timeout: 524288 ms
Debug: 434 2657 cfi.c:2798 cfi_probe(): max. word write timeout: 512 us, max. 
buf write timeout: 2048 us, max. block erase timeout
: 4096 ms, max. chip erase timeout: 2097152 ms
Debug: 435 2672 cfi.c:2813 cfi_probe(): calculated word write timeout: 1 ms, 
buf write timeout: 3 ms, block erase timeout: 4096 ms
, chip erase timeout: 2097152 ms
User : 436 2688 command.c:547 command_print(): flash 'cfi' found at 0x70000000
Debug: 437 2688 command.c:145 script_debug(): command - ocd_command ocd_command 
type ocd_flash write_image newcm3_ToplevelTest/Debu
g/newcm3_ToplevelTest.elf
Debug: 438 2688 command.c:145 script_debug(): command - ocd_flash ocd_flash 
write_image newcm3_ToplevelTest/Debug/newcm3_ToplevelTes
t.elf
Debug: 440 2703 configuration.c:86 find_file(): found 
newcm3_ToplevelTest/Debug/newcm3_ToplevelTest.elf
Debug: 441 2703 image.c:71 autodetect_image_type(): ELF image detected.
Debug: 442 2719 configuration.c:86 find_file(): found 
newcm3_ToplevelTest/Debug/newcm3_ToplevelTest.elf
Debug: 443 2719 core.c:703 flash_write_unlock(): image_read_section: section = 
0, t_section_num = 0, section_offset = 0, buffer_si
ze = 0, size_read = 516
Debug: 444 2719 image.c:477 image_elf_read_section(): load segment 0 at 0x0 (sz 
= 0x204)
Debug: 445 2735 image.c:484 image_elf_read_section(): read elf: size = 0x516 at 
0x8000
Error: 446 2735 cfi.c:1867 cfi_spansion_write_block(): Unknown ARM architecture
Error: 447 2735 core.c:93 flash_driver_write(): error writing to flash at 
address 0x70000000 at offset 0x00000000
Debug: 448 2750 command.c:628 run_command(): Command failed with error code -4
User : 449 2750 command.c:666 command_run_line(): Runtime Error: openocd.cfg:45:

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
OpenOCD-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openocd-devel

Reply via email to