Steven Johnson wrote:
There dosn't need to be a leak, anyone with a spare afternoon could probably reverse engineer it.

i'm sure that you would need somewhat longer...

> We already know what the flash
programming codes are. How a JTAG Port works is well documented. I

programming is not the problem, you can also use msp430-jtag

cant see it being a huge task trapping the jtag sequences, and working out what Jtag Registers are being set/read with what value during various operations such as setting breakpoints, single stepping, saving and restoring context, etc. There would only be a handful of operations.

in theory, but not in practise ;-)

This could be done with the IAR back end operating the FET, or GDBProxy. It would be an interesting exercise, especially if IAR is 6 times faster as this email suggests. (maybe they know some secret accelerated programming method).

well, knowing where gdbproxy spends its time, making its download rate sink, would be interesting.

chris

Steven

nobo...@web.de wrote:

Hi,

mspgcc-users@lists.sourceforge.net schrieb am 31.05.04 20:50:22:
Hi Rolf,
1) Speed:
These lines should fix your speed problem, many people have already
mentioned them ;-)

set remote memory-write-packet-size 1024
set remote memory-write-packet-size fixed
set remote memory-read-packet-size 1024
set remote memory-read-packet-size fixed


Ok, it's significant better but approx. 6 times slower than the IAR debugger. Because i have to work with f149 code which has less than 100 B flash free it's still very slow.


2) Port number:
Dunno. On this topic though, does anyone know if it's possible to use the
USB FET or is support being planned for it with insight/gdb?  Eg:
http://www.softbaugh.com/ProductPage.cfm?strPartNo=USBP


I remembered that it may be a problem with the closed source of the debugging hardware which would imply that the software of a jtag device has to be closed source.
Maybe we have to wait for a leak, like the windows code in emule ;-)

Rolf

Reply via email to