# # Buspirate with OpenOCD support # # http://dangerousprototypes.com/bus-pirate-manual/ # This configuration worked as-is for me with a Sansa Fuze V1 interface buspirate # you need to specify port on which BP lives (might need to be a serial port) buspirate_port /dev/ttyUSB0 #buspirate_port /dev/bus_pirate #You should ultimately change the udev rules for your serial JTAG interfaces so you have a dedicated address you can use, see here: http://wiki.countercaster.com/The_Bus_Pirate_on_Linux:_From_/dev/ttyUSB%3F_to_/dev/bus_pirate # communication speed setting buspirate_speed normal # or fast # Note that fast did not work for my bus pirate # voltage regulator Enabled = 1 Disabled = 0 #buspirate_vreg 0 #Enable this if you plan to use the 3.3V power from your bus pirate to power your sansa # pin mode normal or open-drain #buspirate_mode normal # pullup state Enabled = 1 Disabled = 0 #buspirate_pullup 0 jtag_khz 6000 jtag_ntrst_delay 100 set _CHIPNAME as3525 set _ENDIAN little set _CPUTAPID 0x00922f0f #jtag scan chain jtag newtap $_CHIPNAME cpu -irlen 4 -expected-id $_CPUTAPID set _TARGETNAME $_CHIPNAME.cpu target create $_TARGETNAME arm920t -endian $_ENDIAN -chain-position $_TARGETNAME -variant arm920t $_TARGETNAME configure -work-area-phys 0x200000 -work-area-size 0x4000 -work-area-backup 1