# tar zxvf openocd.binaries.tar.gz
# cd openocd.binaries/bin
# cp <path-to-openrd-uboot-bin-and-elf-files>/u-boot uboot.elf
#cp <path-to-openrd-uboot-bin-and-elf-files>/u-boot-openrd88f6281400d_nand.bin uboot.bin
# ./openocd -f target/board/openrd.cfg -c init - c openrd_reflash_uboot
You should see something similar to the following:
Open On-Chip Debugger 1.0 (2009-02-27-10:14) svn:unknown
BUGS? Read http://svn.berlios.de/svnroot/repos/openocd/trunk/BUGS
$URL$
jtag_speed: 1
dcc downloads are enabled
Info: JTAG tap: feroceon.cpu tap/device found: 0x20a023d3
(Manufacturer: 0x1e9, Part: 0x0a02, Version: 0x2)
Info: JTAG Tap/device matched
Error: unknown EmbeddedICE version (comms ctrl: 0x00000018)
Warning:no telnet port specified, using default port 4444
Warning:no gdb port specified, using default port 3333
Warning:no tcl port specified, using default port 6666
target state: halted
target halted in ARM state due to debug-request, current mode:
Supervisor
cpsr: 0x000000d3 pc: 0xffff0000
MMU: disabled, D-Cache: disabled, I-Cache: disabled
0 0 1 0: 00052078
NAND flash device 'NAND 512MiB 3,3V 8-bit' found
successfully erased blocks 0 to 4 on NAND flash device 'NAND 512MiB 3,3V
8-bit'
wrote file uboot.bin to NAND flash 0 up to offset 0x00073000 in
42.612942s
Info: JTAG tap: feroceon.cpu tap/device found: 0x20a023d3
(Manufacturer: 0x1e9, Part: 0x0a02, Version: 0x2)
Info: JTAG Tap/device matched
On receiving message "Info: JTAG Tap/device matched", it's safe to press "Ctrl+C" and perform hard power cycle on OpenRD computer.


