Hi, the first patch fixes a segfault that happens at each run of "dump_image" command. The bug has been introduced a couple of weeks ago in commit 3931b99d142d337ea6558fd09aad2e0812c04507
The same function "handle_dump_image_command()" does not correctly propagate errors to the caller. The second patch address this issue. I still have a question on this function. Hope you can answer. The while() loop splits the read operation in chunks not bigger that 560 bytes. >From where this magic number 560 pops up? A limitation of a specific target? It should be documented. Best Regards, Antonio Borneo
0001-TARGET-fix-segfault-in-handle_dump_image_command.patch
Description: Binary data
0002-TARGET-review-handle_load_image_command.patch
Description: Binary data
_______________________________________________ Openocd-development mailing list [email protected] https://lists.berlios.de/mailman/listinfo/openocd-development
