-
Notifications
You must be signed in to change notification settings - Fork 315
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JTAG flashing error on 1.9.0 (VSC-1540) #1368
Comments
This issue has been marked as |
Hi @herna, Could you try this version and let me know if it fixes the issue for you? Download the artifacts from this pull request: |
Hello @radurentea, Yes, working fine now. Thank you. |
Hi, Open On-Chip Debugger v0.12.0-esp32-20240318 (2024-03-18-18:26) [/Flash] Info : accepting 'tcl' connection on tcp/6666 Flashing "c:/HW_test1/build/bootloader/bootloader.bin" at 0x1000 ** program_esp input args <0x1000 verify> ** Info : JTAG tap: esp32.cpu0 tap/device found: 0x120034e5 (mfg: Info : [esp32.cpu0] requesting target halt and executing a soft reset Info : [esp32.cpu0] Debug controller was reset. Info : [esp32.cpu0] Core was reset. Info : [esp32.cpu0] Target halted, PC=0x500000CF, debug_reason=00000000 Info : [esp32.cpu0] Reset cause (3) - (Software core reset) Info : [esp32.cpu1] requesting target halt and executing Info : [esp32.cpu0] Core was reset. Info : [esp32.cpu0] Target halted, PC=0x40000400, debug_ Info : [esp32.cpu1] Target halted, PC=0x40000400, debug_reason=00000000 Info : [esp32.cpu1] Reset cause (14) - (CPU1 reset Info : [esp32.cpu0] Reset cause (3) - (Software core reset) ** Programming Started ** ** Flashing Failed ** [/OpenOCD] Open On-Chip Debugger v0.12.0-esp32-20240318 (2024-03-18-18:26) Info : accepting 'tcl' connection on tcp/6666 Info : accepting 'tcl' connection on tcp/6666 Flashing "c:/HW_test1/build/bootloader/bootloader.bin" at 0x1000 Info : JTAG tap: esp32.cpu0 tap/device found: 0x120034e5 (mfg: 0x272 (Tensilica), part: 0x2003, ver: 0x1) Warn : [esp32.cpu1] Unexpected OCD_ID = 00000000 Info : [esp32.cpu0] requesting target halt and executing a soft reset Info : [esp32.cpu0] Target halted, PC=0x4000940E, debug_reason=00000 Info : [esp32.cpu0] Debug controller was reset. Info : [esp32.cpu0] Core was reset. Info : [esp32.cpu0] Target halted, PC=0x500000CF, debug_reaso Info : [esp32.cpu0] Reset cause (3) - (Software core reset) ❌ Info : [esp32.cpu1] requesting target halt and executing a soft reset Info : [esp32.cpu0] Core was reset. Info : [esp32.cpu0] Target halted, PC=0x40000400, debug_reason=00000000 Info : [esp32.cpu1] Debug controller was Info : [esp32.cpu1] Core was reset. Info : [esp32.cpu1] Target halted, PC=0x40000400, debug_reason=00000000 Info : [esp32.cpu1] Reset cause Info : [esp32.cpu0] Reset cause (3) - (Software core reset) ** Programming Started ** ** Flashing Failed ** [/OpenOCD] Does anyone have any ideas about this problem? |
Hi @mert-yurt, This is a problem introduces with the 1.9.0 release, which was fixed in the following PR #1382.
If you go with the fix, please let me know if it fixes your JTAG issue. Thank you! |
OS
Windows
Operating System version
Windows 10
Visual Studio Code version
1.96
ESP-IDF version
5.3.2
Python version
3.11
Doctor command output
doctor.txt
Extension
esp_idf_vsc_ext.log
Description
I have an ESP-PROG connected to ESP32
I can't flash through JTAG unless ESP32 is in "boot" mode and UART0 connected.
Even if you try to flash ESP32 through JTAG, it seems version 1.9.0 of the extension tries to use UART connection somehow no matter what. The extension says at the end "flash through JTAG" but as I said, UART connection must be available and device in boot mode.
I just downgraded to version 1.8.1 and everything works as expected, I am able to use JTAG without UART connection.
There are other users with this problem: https://esp32.com/viewtopic.php?f=40&t=43461
Debug Message
debug.txt
Other Steps to Reproduce
No response
I have checked existing issues, online documentation and the Troubleshooting Guide
The text was updated successfully, but these errors were encountered: