DirtyJTAG is a JTAG adapter firmware for $2 ST-Link clones and generic STM32 development boards ("blue pill"/"black pill" STM32F101 and STM32F103 based ARM boards). The DirtyJTAG project was created to find an alternative to the obsolete (but cheap) LPT Wiggler cables, and expensive USB JTAG probes.
DirtyJTAG is dirty and dirt cheap, but is not fast nor a perfect implementation of the JTAG protocol. Yet it is around 500 sloccount lines, therefore it is easily understandable and hackable.
DirtyJTAG is supported in mainline UrJTAG, see the "Installing UrJTAG with DirtyJTAG support" page.
If you prefer OpenOCD to UrJTAG, I suggest using Zoobab's fork of Versaloon firmware, which is available on his GitHub repository.
Build your DirtyJTAG adapter
|Bluepill||ST-Link v2 clone (dongle)||ST-Link v2 clone (white case)||"Baite" ST-Link v2 clone|
|Instructions||SWD (recommended) • DFU||Instructions||No instructions yet|
USB VID and PID
All DirtyJTAG-flashed devices appear with the following USB VID=0x1209/PID=0xC0CA (which belongs to "InterBiometrics") :
$ lsusb [...] Bus 002 Device 003: ID 1209:c0ca InterBiometrics
Dmesg also give some output where you can see the Manufacturer field as "DirtyJTAG":
$ dmesg [ 148.223008] usb 2-1: USB disconnect, device number 2 [ 149.669794] usb 2-1: new full-speed USB device number 3 using xhci_hcd [ 149.812853] usb 2-1: New USB device found, idVendor=1209, idProduct=c0ca [ 149.812859] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 149.812863] usb 2-1: Product: Jean THOMAS [ 149.812866] usb 2-1: Manufacturer: DirtyJTAG [ 149.812869] usb 2-1: SerialNumber: no serial :-)
- Compiling DirtyJTAG yourself
- Compiling UrJTAG with DirtyJTAG support
- Validate your DirtyJTAG cable with JTAG targets