Nobody here ? I looked into cfi.c and problem is following:
1836 switch (bank->bus_width) {
...
1868 case 4:
1869 if (arm_algo->common_magic != ARM_COMMON_MAGIC) {
1870 LOG_ERROR("Unknown ARM architecture");
1871 return ERROR_FAIL;
1872 }
1873 target_code_src = armv4_5_word_32_code;
1874 target_code_size = sizeof(armv4_5_word_32_code);
1875 break;
What is ARM_COMMON_MAGIC ? The problem is probably that my common magic is
different from the one needed. My settings of CFI FLASH are following:
flash bank $_FLASHNAME cfi 0x70000000 0x04000000 4 4 $_TARGETNAME
If I change chip_width and bus_width to 2, I don't get FLASH recognized - Info
: Flash Manufacturer/Device: 0xffff 0xffff
Did I miss something ?
> Hello,
>
> for one new device I want to use OpenOCD debugger. I changed the script and
> got
> following message:
>
> Open On-Chip Debugger 0.6.0-dev-00497-ga6cf60c (2012-04-06-08:15)
> Licensed under GNU GPL v2
> For bug reports, read
> http://openocd.sourceforge.net/doc/doxygen/bugs.html
> Info : only one transport option; autoselect 'jtag'
> 300 kHz
> srst_only separate srst_gates_jtag srst_open_drain
> adapter_nsrst_delay: 100
> jtag_ntrst_delay: 100
> cortex_m3 reset_config sysresetreq
> Info : clock speed 300 kHz
> Info : JTAG tap: newcm3.cpu tap/device found: 0x4ba00477 (mfg: 0x23b, part:
> 0xba00, ver: 0x4)
> Info : newcm3.cpu: hardware has 6 breakpoints, 4 watchpoints
> Info : JTAG tap: newcm3.cpu tap/device found: 0x4ba00477 (mfg: 0x23b, part:
> 0xba00, ver: 0x4)
> target state: halted
> target halted due to debug-request, current mode: Handler HardFault
> xPSR: 0x61000003 pc: 0x10000010 msp: 0xffffffd8
> #0 : newcm3.flash (cfi) at 0x70000000, size 0x04000000, buswidth 4, chipwidth
> 4
> Info : Flash Manufacturer/Device: 0x0001 0x227e
> Info : Flash Manufacturer/Device: 0x0001 0x227e
> flash 'cfi' found at 0x70000000
> Error: Unknown ARM architecture
> Error: error writing to flash at address 0x70000000 at offset 0x00000000
> Runtime Error: openocd.cfg:45:
>
> If I run OpenOCD with parameter "-d 3", I got messages below. It seems that
> CFI
> code does not detect correctly CM3 architecture ?
>
> What shall I change or add to get it work ?
>
> Thank you in advance,
> Vaclav
>
> User : 385 2203 armv7m.c:517 armv7m_arch_state(): target halted due to
> debug-request, current mode: Handler HardFault
> xPSR: 0x61000003 pc: 0x10000010 msp: 0xffffffd8
> Debug: 386 2219 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_newcm3.cpu curstate
> Debug: 387 2219 command.c:145 script_debug(): command - ocd_newcm3.cpu
> ocd_newcm3.cpu curstate
> Debug: 388 2219 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_newcm3.cpu cget -chain-position
> Debug: 389 2235 command.c:145 script_debug(): command - ocd_newcm3.cpu
> ocd_newcm3.cpu cget -chain-position
> Debug: 390 2235 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_jtag tapisenabled newcm3.cpu
> Debug: 391 2235 command.c:145 script_debug(): command - ocd_jtag ocd_jtag
> tapisenabled newcm3.cpu
> Debug: 392 2235 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_newcm3.cpu arp_waitstate halted 5000
> Debug: 393 2250 command.c:145 script_debug(): command - ocd_newcm3.cpu
> ocd_newcm3.cpu arp_waitstate halted 5000
> Debug: 394 2250 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_newcm3.cpu invoke-event reset-init
> Debug: 395 2266 command.c:145 script_debug(): command - ocd_newcm3.cpu
> ocd_newcm3.cpu invoke-event reset-init
> Debug: 396 2266 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_newcm3.cpu invoke-event reset-end
> Debug: 397 2266 command.c:145 script_debug(): command - ocd_newcm3.cpu
> ocd_newcm3.cpu invoke-event reset-end
> Debug: 399 2282 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_flash banks
> Debug: 400 2282 command.c:145 script_debug(): command - ocd_flash ocd_flash
> banks
> User : 402 2297 tcl.c:797 handle_flash_banks_command(): #0 : newcm3.flash
> (cfi)
> at 0x70000000, size 0x04000000, buswidth 4, chipwid
> th 4
> Debug: 403 2297 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_flash probe 0
> Debug: 404 2297 command.c:145 script_debug(): command - ocd_flash ocd_flash
> probe 0
> Info : 406 2313 cfi.c:2619 cfi_probe(): Flash Manufacturer/Device: 0x0001
> 0x227e
> Debug: 407 2328 cfi.c:2531 cfi_query_string(): CFI qry returned: 0x51 0x52
> 0x59
> Debug: 408 2344 cfi.c:2670 cfi_probe(): qry: 'QRY', pri_id: 0x0002, pri_addr:
> 0x0040, alt_id: 0x0000, alt_addr: 0x0000
> Debug: 409 2391 cfi.c:2728 cfi_probe(): size: 0x4000000, interface desc: 2,
> max
> buffer write size: 0x40
> Debug: 410 2391 cfi.c:2744 cfi_probe(): erase region[0]: 512 blocks of size
> 0x20000
> Debug: 411 2407 cfi.c:542 cfi_read_spansion_pri_ext(): pri: 'PRI', version:
> 1.3
> Debug: 412 2438 cfi.c:579 cfi_read_spansion_pri_ext(): Silicon Revision: 0x14,
> Erase Suspend: 0x2, Block protect: 0x1
> Debug: 413 2438 cfi.c:583 cfi_read_spansion_pri_ext(): Temporary Unprotect:
> 0x0,
> Block Protect Scheme: 0x8, Simultaneous Ops: 0x0
> Debug: 414 2453 cfi.c:585 cfi_read_spansion_pri_ext(): Burst Mode: 0x0, Page
> Mode: 0x2,
> Debug: 415 2453 cfi.c:590 cfi_read_spansion_pri_ext(): Vpp min: 11.5, Vpp max:
> 12.5
> Debug: 416 2453 cfi.c:592 cfi_read_spansion_pri_ext(): WP# protection 0x4
> Debug: 417 2469 cfi.c:2786 cfi_probe(): Vcc min: 2.7, Vcc max: 3.6, Vpp min:
> 0.0, Vpp max: 0.0
> Debug: 418 2469 cfi.c:2791 cfi_probe(): typ. word write timeout: 64 us, typ.
> buf
> write timeout: 64 us, typ. block erase timeout: 5
> 12 ms, typ. chip erase timeout: 524288 ms
> Debug: 419 2485 cfi.c:2798 cfi_probe(): max. word write timeout: 512 us, max.
> buf write timeout: 2048 us, max. block erase timeout
> : 4096 ms, max. chip erase timeout: 2097152 ms
> Debug: 420 2485 cfi.c:2813 cfi_probe(): calculated word write timeout: 1 ms,
> buf
> write timeout: 3 ms, block erase timeout: 4096 ms
> , chip erase timeout: 2097152 ms
> Info : 421 2516 cfi.c:2619 cfi_probe(): Flash Manufacturer/Device: 0x0001
> 0x227e
> Debug: 422 2532 cfi.c:2531 cfi_query_string(): CFI qry returned: 0x51 0x52
> 0x59
> Debug: 423 2532 cfi.c:2670 cfi_probe(): qry: 'QRY', pri_id: 0x0002, pri_addr:
> 0x0040, alt_id: 0x0000, alt_addr: 0x0000
> Debug: 424 2578 cfi.c:2728 cfi_probe(): size: 0x4000000, interface desc: 2,
> max
> buffer write size: 0x40
> Debug: 425 2578 cfi.c:2744 cfi_probe(): erase region[0]: 512 blocks of size
> 0x20000
> Debug: 426 2594 cfi.c:542 cfi_read_spansion_pri_ext(): pri: 'PRI', version:
> 1.3
> Debug: 427 2625 cfi.c:579 cfi_read_spansion_pri_ext(): Silicon Revision: 0x14,
> Erase Suspend: 0x2, Block protect: 0x1
> Debug: 428 2625 cfi.c:583 cfi_read_spansion_pri_ext(): Temporary Unprotect:
> 0x0,
> Block Protect Scheme: 0x8, Simultaneous Ops: 0x0
> Debug: 429 2625 cfi.c:585 cfi_read_spansion_pri_ext(): Burst Mode: 0x0, Page
> Mode: 0x2,
> Debug: 430 2641 cfi.c:590 cfi_read_spansion_pri_ext(): Vpp min: 11.5, Vpp max:
> 12.5
> Debug: 431 2641 cfi.c:592 cfi_read_spansion_pri_ext(): WP# protection 0x4
> Debug: 432 2641 cfi.c:2786 cfi_probe(): Vcc min: 2.7, Vcc max: 3.6, Vpp min:
> 0.0, Vpp max: 0.0
> Debug: 433 2657 cfi.c:2791 cfi_probe(): typ. word write timeout: 64 us, typ.
> buf
> write timeout: 64 us, typ. block erase timeout: 5
> 12 ms, typ. chip erase timeout: 524288 ms
> Debug: 434 2657 cfi.c:2798 cfi_probe(): max. word write timeout: 512 us, max.
> buf write timeout: 2048 us, max. block erase timeout
> : 4096 ms, max. chip erase timeout: 2097152 ms
> Debug: 435 2672 cfi.c:2813 cfi_probe(): calculated word write timeout: 1 ms,
> buf
> write timeout: 3 ms, block erase timeout: 4096 ms
> , chip erase timeout: 2097152 ms
> User : 436 2688 command.c:547 command_print(): flash 'cfi' found at 0x70000000
> Debug: 437 2688 command.c:145 script_debug(): command - ocd_command
> ocd_command
> type ocd_flash write_image newcm3_ToplevelTest/Debu
> g/newcm3_ToplevelTest.elf
> Debug: 438 2688 command.c:145 script_debug(): command - ocd_flash ocd_flash
> write_image newcm3_ToplevelTest/Debug/newcm3_ToplevelTes
> t.elf
> Debug: 440 2703 configuration.c:86 find_file(): found
> newcm3_ToplevelTest/Debug/newcm3_ToplevelTest.elf
> Debug: 441 2703 image.c:71 autodetect_image_type(): ELF image detected.
> Debug: 442 2719 configuration.c:86 find_file(): found
> newcm3_ToplevelTest/Debug/newcm3_ToplevelTest.elf
> Debug: 443 2719 core.c:703 flash_write_unlock(): image_read_section: section =
> 0, t_section_num = 0, section_offset = 0, buffer_si
> ze = 0, size_read = 516
> Debug: 444 2719 image.c:477 image_elf_read_section(): load segment 0 at 0x0
> (sz
> = 0x204)
> Debug: 445 2735 image.c:484 image_elf_read_section(): read elf: size = 0x516
> at
> 0x8000
> Error: 446 2735 cfi.c:1867 cfi_spansion_write_block(): Unknown ARM
> architecture
> Error: 447 2735 core.c:93 flash_driver_write(): error writing to flash at
> address 0x70000000 at offset 0x00000000
> Debug: 448 2750 command.c:628 run_command(): Command failed with error code -4
> User : 449 2750 command.c:666 command_run_line(): Runtime Error:
> openocd.cfg:45:
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> OpenOCD-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/openocd-devel
>
>
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
OpenOCD-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openocd-devel