Skip to content

Commit 9617b37

Browse files
committed
Remove unused debug config
1 parent 6fb2386 commit 9617b37

File tree

2 files changed

+2
-108
lines changed

2 files changed

+2
-108
lines changed

.vscode/launch-gd32vf103.json

Lines changed: 1 addition & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -41,59 +41,6 @@
4141
// "continue",
4242
]
4343
// "valuesFormatting": "parseText"
44-
},
45-
{
46-
// Cortex Debug Configuration: https://marcelball.ca/projects/cortex-debug/cortex-debug-launch-configurations/
47-
"name": "OLD GD32VF103",
48-
"type": "cortex-debug",
49-
"request": "launch",
50-
// OpenOCD path is defined in workspace.code-workspace.
51-
"servertype": "openocd",
52-
"cwd": "${workspaceRoot}",
53-
// Application Executable to be flashed to Blue Pill before debugging. Note that the Application ELF image does not contain a valid Image Header. So we must bypass the Bootloader, shown below.
54-
"executable": "bin/targets/gd32vf103c-start_my_sensor/app/apps/my_sensor_app/my_sensor_app.elf",
55-
// For Bootloader: "executable": "bin/targets/gd32vf103c-start_boot/app/apps/boot_stub/boot_stub.elf",
56-
"device": "GD32VF103",
57-
"svdFile": "scripts/STM32F103xx.svd",
58-
"configFiles": [
59-
// Tell OpenOCD to open the JTAG connection to MCU
60-
"scripts/gd32vf103/flash-init.ocd",
61-
"interface/cmsis-dap.cfg",
62-
"scripts/gd32vf103/gd32vf103.ocd",
63-
// Tell OpenOCD to run our custom debug commands.
64-
"scripts/gd32vf103/debug.ocd"
65-
],
66-
"preLaunchCommands": [
67-
// Before loading the Application, run these gdb commands.
68-
// Set timeout for executing openocd commands.
69-
"set remotetimeout 60",
70-
71-
// This indicates that an unrecognized breakpoint location should automatically result in a pending breakpoint being created.
72-
"set breakpoint pending on"
73-
74-
// Display the Arm instruction when hitting breakpoint.
75-
// "display/i $pc",
76-
77-
// Load Bootloader symbols in case we jump to the Bootloader.
78-
// "symbol-file bin/targets/bluepill_boot/app/apps/boot/boot.elf",
79-
80-
// Restore Application symbols.
81-
// "symbol-file bin/targets/bluepill_my_sensor/app/apps/my_sensor_app/my_sensor_app.elf",
82-
],
83-
"postLaunchCommands": [
84-
// After loading the Application, run these gdb commands. The Application ELF image does not contain a valid Image Header.
85-
// If not using the Stub Bootloader boot_stub, we need to bypass the Bootloader and jump to the Application directly:
86-
// "stepi", // Must step before setting PC
87-
// "set $pc = Reset_Handler", // Prepare to jump to the Application's Reset Handler
88-
// "stepi", // Execute the Reset Handler
89-
"break main", // Break at main()
90-
"break __assert_func", // Break for any assert failures
91-
"break os_default_irq" // Break for any unhandled interrupts
92-
],
93-
"preRestartCommands": [
94-
],
95-
"postRestartCommands": [
96-
]
97-
}
44+
}
9845
]
9946
}

.vscode/launch.json

Lines changed: 1 addition & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -41,59 +41,6 @@
4141
// "continue",
4242
]
4343
// "valuesFormatting": "parseText"
44-
},
45-
{
46-
// Cortex Debug Configuration: https://marcelball.ca/projects/cortex-debug/cortex-debug-launch-configurations/
47-
"name": "OLD GD32VF103",
48-
"type": "cortex-debug",
49-
"request": "launch",
50-
// OpenOCD path is defined in workspace.code-workspace.
51-
"servertype": "openocd",
52-
"cwd": "${workspaceRoot}",
53-
// Application Executable to be flashed to Blue Pill before debugging. Note that the Application ELF image does not contain a valid Image Header. So we must bypass the Bootloader, shown below.
54-
"executable": "bin/targets/gd32vf103c-start_my_sensor/app/apps/my_sensor_app/my_sensor_app.elf",
55-
// For Bootloader: "executable": "bin/targets/gd32vf103c-start_boot/app/apps/boot_stub/boot_stub.elf",
56-
"device": "GD32VF103",
57-
"svdFile": "scripts/STM32F103xx.svd",
58-
"configFiles": [
59-
// Tell OpenOCD to open the JTAG connection to MCU
60-
"scripts/gd32vf103/flash-init.ocd",
61-
"interface/cmsis-dap.cfg",
62-
"scripts/gd32vf103/gd32vf103.ocd",
63-
// Tell OpenOCD to run our custom debug commands.
64-
"scripts/gd32vf103/debug.ocd"
65-
],
66-
"preLaunchCommands": [
67-
// Before loading the Application, run these gdb commands.
68-
// Set timeout for executing openocd commands.
69-
"set remotetimeout 60",
70-
71-
// This indicates that an unrecognized breakpoint location should automatically result in a pending breakpoint being created.
72-
"set breakpoint pending on"
73-
74-
// Display the Arm instruction when hitting breakpoint.
75-
// "display/i $pc",
76-
77-
// Load Bootloader symbols in case we jump to the Bootloader.
78-
// "symbol-file bin/targets/bluepill_boot/app/apps/boot/boot.elf",
79-
80-
// Restore Application symbols.
81-
// "symbol-file bin/targets/bluepill_my_sensor/app/apps/my_sensor_app/my_sensor_app.elf",
82-
],
83-
"postLaunchCommands": [
84-
// After loading the Application, run these gdb commands. The Application ELF image does not contain a valid Image Header.
85-
// If not using the Stub Bootloader boot_stub, we need to bypass the Bootloader and jump to the Application directly:
86-
// "stepi", // Must step before setting PC
87-
// "set $pc = Reset_Handler", // Prepare to jump to the Application's Reset Handler
88-
// "stepi", // Execute the Reset Handler
89-
"break main", // Break at main()
90-
"break __assert_func", // Break for any assert failures
91-
"break os_default_irq" // Break for any unhandled interrupts
92-
],
93-
"preRestartCommands": [
94-
],
95-
"postRestartCommands": [
96-
]
97-
}
44+
}
9845
]
9946
}

0 commit comments

Comments
 (0)