D:\orba>dfu-util.exe -d 0483:df11 -a 1 -s 0x1fff0000:44:force -U option_bytes.bin dfu-util 0.9-msvc Copyright 2005-2009 Weston Schmidt, Harald Welte and OpenMoko Inc. Copyright 2010-2019 Tormod Volden and Stefan Schmidt This program is Free Software and has ABSOLUTELY NO WARRANTY Please report bugs to http://sourceforge.net/p/dfu-util/tickets/ Opening DFU capable USB device... ID 0483:df11 Run-time device DFU version 011a Claiming USB DFU Interface... Setting Alternate Setting #1 ... Determining device status: state = dfuERROR, status = 10 dfuERROR, clearing status Determining device status: state = dfuIDLE, status = 0 dfuIDLE, continuing DFU mode device DFU version 011a Device returned transfer size 2048 DfuSe interface name: "Option Bytes " Non-valid multiplier ' ', assuming bytes Upload [=========================] 100% 44 bytes Upload done. D:\orba>dfu-util.exe -d 0483:df11 -a 1 -s 0x1fff0000:will-reset:force -D option_bytes.bin dfu-util 0.9-msvc Copyright 2005-2009 Weston Schmidt, Harald Welte and OpenMoko Inc. Copyright 2010-2019 Tormod Volden and Stefan Schmidt This program is Free Software and has ABSOLUTELY NO WARRANTY Please report bugs to http://sourceforge.net/p/dfu-util/tickets/ Invalid DFU suffix signature A valid DFU suffix will be required in a future dfu-util release!!! Opening DFU capable USB device... ID 0483:df11 Run-time device DFU version 011a Claiming USB DFU Interface... Setting Alternate Setting #1 ... Determining device status: state = dfuERROR, status = 10 dfuERROR, clearing status Determining device status: state = dfuIDLE, status = 0 dfuIDLE, continuing DFU mode device DFU version 011a Device returned transfer size 2048 DfuSe interface name: "Option Bytes " Non-valid multiplier ' ', assuming bytes Downloading to address = 0x1fff0000, size = 44 Download [=========================] 100% 44 bytes Download done. File downloaded successfully D:\orba>dfu-util.exe -d 0483:df11 -a 0 -s 0x20010000:force -D 0x20010000.bin dfu-util 0.9-msvc Copyright 2005-2009 Weston Schmidt, Harald Welte and OpenMoko Inc. Copyright 2010-2019 Tormod Volden and Stefan Schmidt This program is Free Software and has ABSOLUTELY NO WARRANTY Please report bugs to http://sourceforge.net/p/dfu-util/tickets/ Invalid DFU suffix signature A valid DFU suffix will be required in a future dfu-util release!!! No DFU capable USB device available D:\orba>dfu-util.exe -d 0483:df11 -a 0 -s 0x20010000:force -D 0x20010000.bin dfu-util 0.9-msvc Copyright 2005-2009 Weston Schmidt, Harald Welte and OpenMoko Inc. Copyright 2010-2019 Tormod Volden and Stefan Schmidt This program is Free Software and has ABSOLUTELY NO WARRANTY Please report bugs to http://sourceforge.net/p/dfu-util/tickets/ Invalid DFU suffix signature A valid DFU suffix will be required in a future dfu-util release!!! Opening DFU capable USB device... ID 0483:df11 Run-time device DFU version 011a Claiming USB DFU Interface... Setting Alternate Setting #0 ... Determining device status: state = dfuERROR, status = 10 dfuERROR, clearing status Determining device status: state = dfuIDLE, status = 0 dfuIDLE, continuing DFU mode device DFU version 011a Device returned transfer size 2048 DfuSe interface name: "Internal Flash " Downloading to address = 0x20010000, size = 125792 Download [=========================] 100% 125792 bytes Download done. File downloaded successfully D:\orba>dfu-util.exe -d 0483:df11 -a 0 -s 0x8000000:force:leave -D 0x8000000.bin dfu-util 0.9-msvc Copyright 2005-2009 Weston Schmidt, Harald Welte and OpenMoko Inc. Copyright 2010-2019 Tormod Volden and Stefan Schmidt This program is Free Software and has ABSOLUTELY NO WARRANTY Please report bugs to http://sourceforge.net/p/dfu-util/tickets/ Invalid DFU suffix signature A valid DFU suffix will be required in a future dfu-util release!!! Opening DFU capable USB device... ID 0483:df11 Run-time device DFU version 011a Claiming USB DFU Interface... Setting Alternate Setting #0 ... Determining device status: state = dfuERROR, status = 10 dfuERROR, clearing status Determining device status: state = dfuIDLE, status = 0 dfuIDLE, continuing DFU mode device DFU version 011a Device returned transfer size 2048 DfuSe interface name: "Internal Flash " Downloading to address = 0x08000000, size = 65536 Download [=========================] 100% 65536 bytes Download done. File downloaded successfully Transitioning to dfuMANIFEST state D:\orba>orba_capsense_bootloader.exe \\.\COM13 21_X0_CY8C_Touch_A0_2988ebe.cyacd [src/main.c:35] INFO: Capsense bootloader version 0.1.1 [src/capsense_bootloader.c:329] INFO: Starting programming... [src/capsense_bootloader.c:133] INFO: open_connection() ###################################################################### [src/capsense_bootloader.c:180] INFO: close_connection() [src/capsense_bootloader.c:353] INFO: Programming completed successfully! D:\orba>esptool.py write_flash -z --flash_mode dio --flash_size detect 0x00001000 bootloader.bin esptool.py v4.1 Found 2 serial ports Serial port COM13 Connecting...... Detecting chip type... Unsupported detection protocol, switching and trying again... Connecting... Detecting chip type... ESP32 Chip is ESP32-S0WD (revision 1) Features: WiFi, BT, Single Core, VRef calibration in efuse, Coding Scheme None Crystal is 40MHz MAC: b8:f0:09:67:45:9c Uploading stub... Running stub... Stub running... Configuring flash size... Auto-detected Flash size: 4MB Flash will be erased from 0x00001000 to 0x00007fff... Warning: Image file at 0x1000 is protected with a hash checksum, so not changing the flash size setting. Use the --flash_size=keep option instead of --flash_size=4MB in order to remove this warning, or use the --dont-append-digest option for the elf2image command in order to generate an image file without a hash checksum Compressed 24848 bytes to 14806... Wrote 24848 bytes (14806 compressed) at 0x00001000 in 1.7 seconds (effective 118.6 kbit/s)... Hash of data verified. Leaving... Hard resetting via RTS pin... esptool.py write_flash --flash_size detect 0x00001000 delorean.bin esptool.py v4.1 Found 2 serial ports Serial port COM13 Connecting.... Detecting chip type... Unsupported detection protocol, switching and trying again... Connecting... Detecting chip type... ESP32 Chip is ESP32-S0WD (revision 1) Features: WiFi, BT, Single Core, VRef calibration in efuse, Coding Scheme None Crystal is 40MHz MAC: b8:f0:09:67:45:9c Uploading stub... Running stub... Stub running... Configuring flash size... Auto-detected Flash size: 4MB Flash will be erased from 0x00001000 to 0x000acfff... Warning: Image file at 0x1000 is protected with a hash checksum, so not changing the flash size setting. Use the --flash_size=keep option instead of --flash_size=4MB in order to remove this warning, or use the --dont-append-digest option for the elf2image command in order to generate an image file without a hash checksum Compressed 702032 bytes to 407879... Wrote 702032 bytes (407879 compressed) at 0x00001000 in 36.3 seconds (effective 154.8 kbit/s)... Hash of data verified. Leaving... Hard resetting via RTS pin... D:\orba>esptool.py write_flash --flash_size detect 0x00008000 partitions_singleapp.bin esptool.py v4.1 Found 2 serial ports Serial port COM13 Connecting... Detecting chip type... Unsupported detection protocol, switching and trying again... Connecting... Detecting chip type... ESP32 Chip is ESP32-S0WD (revision 1) Features: WiFi, BT, Single Core, VRef calibration in efuse, Coding Scheme None Crystal is 40MHz MAC: b8:f0:09:67:45:9c Stub is already running. No upload is necessary. Configuring flash size... Auto-detected Flash size: 4MB Flash will be erased from 0x00008000 to 0x00008fff... Compressed 3072 bytes to 103... Wrote 3072 bytes (103 compressed) at 0x00008000 in 0.1 seconds (effective 393.6 kbit/s)... Hash of data verified. Leaving... Hard resetting via RTS pin...