Insight not running

Greetings,

I’m trying to get Insight to work with my Olimex sam7-EX256 board,

but it won’t run, it connects OK to OpenOcd, but it does not seem to download the main.elf file.

Any suggestions?? :frowning:

Hans.

Info: openocd.c:84 main(): Open On-Chip Debugger (2006-01-26 13:30 CET)

Info: server.c:67 add_connection(): accepted ‘telnet’ connection from 0

Debug: arm7_9_common.c:1676 arm7_9_read_memory(): address: 0x00000000, size: 0

x00000004, count: 0x00000001

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$ffffffff#30’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qSymbol::#5b

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qSymbol::’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Debug: gdb_server.c:124 gdb_get_char(): received ‘$Z0,2000b8,4#72’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘Z0,2000b8,4’

Debug: gdb_server.c:1095 gdb_breakpoint_watchpoint_packet():

Info: arm7_9_common.c:275 arm7_9_add_breakpoint(): sw breakpoint requested, b

ut software breakpoints not enabled

Info: breakpoints.c:73 breakpoint_add(): can’t add software breakpoint, resou

rce not available

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$E10#a6’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Hello Hans,

please take a look here:

http://www.yagarto.de/howto/yagarto1/index.html

Here I have described how to use OpenOCD with Insight.

You will find a small example for testing here too.

Please remove the Sticky attribute, if everybody use the

Sticky attribute it will be hard to use the forum.

The other point is, has you read this thread?

“The best way to get your problem solved”

viewtopic.php?t=6545

We need more input, which version of OpenOCD, which

JTAG-Hardware…

Best regards,

Michael

hdr55:
Greetings,

I’m trying to get Insight to work with my Olimex sam7-EX256 board,

but it won’t run, it connects OK to OpenOcd, but it does not seem to download the main.elf file.

Any suggestions?? :frowning:

Hans.

Info: arm7_9_common.c:275 arm7_9_add_breakpoint(): sw breakpoint requested, b

ut software breakpoints not enabled

Info: breakpoints.c:73 breakpoint_add(): can’t add software breakpoint,

start with plain gdb - running insight just obscures what’s going on.

The error message about software breakpoints seems like the red flag here. Try with ‘monitor arm7_9 sw_bkpts enable’ (IIRC) right after the ‘target’ line in your .gdbinit file. if that’s not right do ‘monitor help’ from the gdb command line.

Thanks Michael,

I did go trough the tutorial (several times).

I tried enabling the breakpoints from the GDB promt and that works:

arm7_9 sw_bkpts enable

software breakpoints enabled

In insight, I can connect to the target succesfully, when I tried to download the program, I get the message “DOWNLOAD FAILED: invalid download offset and”.

I’ve also tried to only open the .elf file in insight, then the source code appears on the screen, but when I hit “run” the screen goes blank and I get the text “Select function name to disassemle”, and the message bar has “Program stopped” in it.

I’m using windows XP on a 64bit machine

Insight is version 6.5.50.20060612

uP is Atmel AT91SAM7X256

Board is Olimex sam7-ex256

Jtag interface is a wiggler (ARM Jtag clone)

Hans.

Hello Hans,

please can you test it with the following example:

http://www.yagarto.de/download/yagarto/SAM7X256Test.zip

Which version of OpenOCD you use? From the date code it looks

like the r128 version.

I did go trough the tutorial (several times).

I tried enabling the breakpoints from the GDB promt and that works:

arm7_9 sw_bkpts enable

software breakpoints enabled

Have you use your own sample and GDB config file?

In this case it would be helpful to take a look at it.

If you does not want to make your source public, try it with

my example above.

Regards,

Michael

Hello Michael,

Openocd is version 128.

The code I tried before was working in Uni, but that was with a SAM7SE, but that should not make that much of a difference (?).

Anyway, you example does the same, I end up with “Select Functio name to disassemble”.

I started insight from the dram.bat file in the directory were your test-file lives.

This is from the telnet connection:

Open On-Chip Debugger

debug 3

Target 0 halted

target halted in ARM state due to debug request, current mode: Supervisor

cpsr: 0x800000d3 pc: 0x00000000

And this from GDB:

Info: openocd.c:84 main(): Open On-Chip Debugger (2006-01-26 13:30 CET)

Warning: arm7_9_common.c:683 arm7_9_assert_reset(): srst resets test logic, too

Info: server.c:67 add_connection(): accepted ‘telnet’ connection from 0

Debug: arm7_9_common.c:838 arm7_9_halt(): target->state: halted

Warning: arm7_9_common.c:842 arm7_9_halt(): target was already halted

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$Hc-1#09’

Info: server.c:67 add_connection(): accepted ‘gdb’ connection from 0

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘Hc-1’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qC#b4’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qC’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qOffsets#4b’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qOffsets’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$?#3f

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘?’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$S02#b5’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$Hg0#df’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘Hg0’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$pf#d6’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘pf’

Debug: gdb_server.c:680 gdb_get_register_packet():

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$e0e50000#ef’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$me5e0,4#fc’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘me5e0,4’

Debug: gdb_server.c:834 gdb_read_memory_packet(): addr: 0x0000e5e0, len: 0x000

00004

Debug: arm7_9_common.c:1676 arm7_9_read_memory(): address: 0x0000e5e0, size: 0

x00000004, count: 0x00000001

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$ffffffff#30’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qSymbol::#5b

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qSymbol::’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qRcmd,7265736574#37’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qRcmd,7265736574’

Debug: target.c:1330 handle_reset_command():

Debug: arm7_9_common.c:656 arm7_9_assert_reset(): target->state: halted

Debug: jtag.c:258 jtag_call_event_callbacks(): jtag event: 0

Debug: jtag.c:1106 jtag_reset_callback():

Debug: jtag.c:258 jtag_call_event_callbacks(): jtag event: 1

Debug: jtag.c:1106 jtag_reset_callback():

Warning: arm7_9_common.c:683 arm7_9_assert_reset(): srst resets test logic, too

Debug: jtag.c:258 jtag_call_event_callbacks(): jtag event: 0

Debug: jtag.c:1106 jtag_reset_callback():

Debug: jtag.c:258 jtag_call_event_callbacks(): jtag event: 1

Debug: jtag.c:1106 jtag_reset_callback():

Debug: parport.c:212 parport_reset(): trst: 0, srst: 1

Debug: parport.c:212 parport_reset(): trst: 0, srst: 1

Debug: arm7_9_common.c:722 arm7_9_deassert_reset(): target->state: reset

Debug: jtag.c:258 jtag_call_event_callbacks(): jtag event: 2

Debug: jtag.c:1106 jtag_reset_callback():

Debug: parport.c:212 parport_reset(): trst: 0, srst: 0

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,736c65657020353030#f

3’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,736c656570203530

30’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qRcmd,706f6c6c#58’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qRcmd,706f6c6c’

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: jtag.c:258 jtag_call_event_callbacks(): jtag event: 3

Debug: jtag.c:1106 jtag_reset_callback():

Debug: gdb_server.c:177 gdb_put_packet(): sending packet '$O746172676574207374

6174653a2072756e6e696e670a#4a’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,736f66745f7265736574

5f68616c74#23’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,736f66745f726573

65745f68616c74’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet '$O72657175657374696e

67207461726765742068616c7420616e6420657865637574696e67206120736f6674207265736574

0a#04’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Debug: arm7_9_common.c:838 arm7_9_halt(): target->state: running

Debug: embeddedice.c:299 embeddedice_write_reg(): 9: 0xffffffff

Debug: embeddedice.c:299 embeddedice_write_reg(): 11: 0xffffffff

Debug: embeddedice.c:299 embeddedice_write_reg(): 12: 0x00000100

Debug: embeddedice.c:299 embeddedice_write_reg(): 13: 0x000000f7

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000005

Debug: embeddedice.c:299 embeddedice_write_reg(): 12: 0x00000000

Debug: target.c:444 target_call_event_callbacks(): target event 0

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,61726d375f392073775f

626b70747320656e61626c65#4a’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,61726d375f392073

775f626b70747320656e61626c65’

Debug: embeddedice.c:299 embeddedice_write_reg(): 10: 0xdeeedeee

Debug: embeddedice.c:299 embeddedice_write_reg(): 11: 0x00000000

Debug: embeddedice.c:299 embeddedice_write_reg(): 9: 0xffffffff

Debug: embeddedice.c:299 embeddedice_write_reg(): 13: 0x000000f7

Debug: embeddedice.c:299 embeddedice_write_reg(): 12: 0x00000100

Debug: gdb_server.c:177 gdb_put_packet(): sending packet '$O736f66747761726520

627265616b706f696e747320656e61626c65640a#8a’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,6d777720307846464646

464434342030783030303038303030#69’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,6d77772030784646

4646464434342030783030303038303030’

Debug: arm7_9_common.c:1822 arm7_9_write_memory(): address: 0xfffffd44, size:

0x00000004, count: 0x00000001

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000004

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000005

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,6d777720307866666666

666430382030786135303030303031#77’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,6d77772030786666

6666666430382030786135303030303031’

Debug: arm7_9_common.c:1822 arm7_9_write_memory(): address: 0xfffffd08, size:

0x00000004, count: 0x00000001

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000004

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000005

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,6d777720307846464646

464332302030783030303030363031#61’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,6d77772030784646

4646464332302030783030303030363031’

Debug: arm7_9_common.c:1822 arm7_9_write_memory(): address: 0xfffffc20, size:

0x00000004, count: 0x00000001

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000004

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000005

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qRcmd,736c656570203130#8c’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,736c656570203130

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,6d777720307846464646

464332432030783030343831633065#79’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,6d77772030784646

4646464332432030783030343831633065’

Debug: arm7_9_common.c:1822 arm7_9_write_memory(): address: 0xfffffc2c, size:

0x00000004, count: 0x00000001

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000004

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000005

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qRcmd,736c656570203130#8c’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,736c656570203130

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,6d777720307846464646

464333302030783030303030303037#62’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,6d77772030784646

4646464333302030783030303030303037’

Debug: arm7_9_common.c:1822 arm7_9_write_memory(): address: 0xfffffc30, size:

0x00000004, count: 0x00000001

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000004

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000005

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qRcmd,736c656570203130#8c’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,736c656570203130

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,6d777720307846464646

464636302030783030343830313030#6e’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,6d77772030784646

4646464636302030783030343830313030’

Debug: arm7_9_common.c:1822 arm7_9_write_memory(): address: 0xffffff60, size:

0x00000004, count: 0x00000001

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000004

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: embeddedice.c:299 embeddedice_write_reg(): 0: 0x00000005

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received '+$qRcmd,736c65657020313030#e

f’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: 'qRcmd,736c656570203130

30’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Debug: arm7_9_common.c:838 arm7_9_halt(): target->state: halted

Warning: arm7_9_common.c:842 arm7_9_halt(): target was already halted

Debug: gdb_server.c:124 gdb_get_char(): received ‘$k#6b’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘k’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$OK#9a’

Info: server.c:367 server_loop(): dropped ‘gdb’ connection

Debug: arm7_9_common.c:838 arm7_9_halt(): target->state: halted

Warning: arm7_9_common.c:842 arm7_9_halt(): target was already halted

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$Hc-1#09’

Info: server.c:67 add_connection(): accepted ‘gdb’ connection from 0

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘Hc-1’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qC#b4’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qC’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$qOffsets#4b’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qOffsets’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$?#3f

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘?’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$S02#b5’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$Hg0#df’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘Hg0’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$pf#d6’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘pf’

Debug: gdb_server.c:680 gdb_get_register_packet():

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$00000000#80’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+$m0,4#fd’

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘m0,4’

Debug: gdb_server.c:834 gdb_read_memory_packet(): addr: 0x00000000, len: 0x000

00004

Debug: arm7_9_common.c:1676 arm7_9_read_memory(): address: 0x00000000, size: 0

x00000004, count: 0x00000001

Debug: embeddedice.c:203 embeddedice_read_reg_w_check(): 1

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$ffffffff#30’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Debug: gdb_server.c:124 gdb_get_char(): received ‘$qSymbol::#5b

Debug: gdb_server.c:239 gdb_get_packet(): character: ‘$’

Debug: gdb_server.c:1237 gdb_input(): recevied packet: ‘qSymbol::’

Debug: gdb_server.c:177 gdb_put_packet(): sending packet ‘$#00’

Debug: gdb_server.c:124 gdb_get_char(): received ‘+’

Also “help” does not work in Insight, I get the following error message:

invalid command name “ide_shell_execute”

while executing

“ide_shell_execute open $link”

(procedure “open_help” line 8)

invoked from within

“open_help index.html”

(menu invoke)errorCode is NONE

Kind regards, Hans.

How do I remove the “sticky” attribute?

Hello Hans,

go to your first post here, and use “edit”.

After this you will find the “normal” and “sticky” options.

I hope this will work.

Regards,

Michael

well,… about 1 week later,… still not working, got a USB JTAG, the OLIMEX ARM-USB-TINY, un installed Yagarto completly and installed Yagarto from the Olimex disk, and,… the same result. :cry:

Don’t seem to get much help on this forum either.

Hans.+

Hello Hans,

I’m using windows XP on a 64bit machine

Perhaps this is the problem, and no one has a 64bit machine?

Could you test it on “normal” PC?

Regards,

mifi

Just wanted to note - I use OpenOCD on Gentoo AMD64 all the time, works great. Don’t know anything regarding 64 bit windows.

Cheers,

–David Carne

well,… it’s running :smiley: :smiley: .

The problem was the location of the files, the were in the “My Document” folder, and by moving them to the root or a folder without spaces in the folder name it worked, on the 64 bit machine.

Thanks, Hans.