While scanning the USB bus for devices, stm32_scan() can find a device that it doesn't have permissions to access it, dfu/usb class raises an exception and stm32_scan() stops the scan completely. This fix resolves the scan issue, by allowing the scan loop to continue. While at it, there are cosmetic fixes related with tabs/spaces and readability. Signed-off-by: Nikolay Dimitrov <nikolay.dimitrov@retrohub.org> |
||
|---|---|---|
| .. | ||
| stubs | ||
| README | ||
| bootprog.py | ||
| dfu-convert.py | ||
| dfu.py | ||
| gdb.py | ||
| get_openocd_nrf51_ids.py | ||
| hexprog.py | ||
| stm32_mem.py | ||
| swolisten.c | ||
README
This directory contains some useful scripts for working on the Black Magic Debug project. bootprog.py - Production programmer using the STM32 SystemMemory bootloader. hexprog.py - Write an Intel hex file to a target using the GDB protocol. stm32_mem.py - Access STM32 Flash memory using USB DFU class interface. stubs/ - Source code for the microcode strings included in hexprog.py.