Hi,

the first patch fixes a segfault that happens at each run of
"dump_image" command.
The bug has been introduced a couple of weeks ago in commit
3931b99d142d337ea6558fd09aad2e0812c04507

The same function "handle_dump_image_command()" does not correctly
propagate errors to the caller.
The second patch address this issue.

I still have a question on this function. Hope you can answer.
The while() loop splits the read operation in chunks not bigger that 560 bytes.
>From where this magic number 560 pops up? A limitation of a specific target?
It should be documented.

Best Regards,
Antonio Borneo

Attachment: 0001-TARGET-fix-segfault-in-handle_dump_image_command.patch
Description: Binary data

Attachment: 0002-TARGET-review-handle_load_image_command.patch
Description: Binary data

_______________________________________________
Openocd-development mailing list
[email protected]
https://lists.berlios.de/mailman/listinfo/openocd-development

Reply via email to