Advertisement
Guest User

JTAG Chain

a guest
Dec 8th, 2021
55
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
TCL 3.09 KB | None | 0 0
  1. xPack OpenOCD x86_64 Open On-Chip Debugger 0.11.0+dev (2021-12-07-17:33)
  2. Licensed under GNU GPL v2
  3. For bug reports, read
  4.         http://openocd.org/doc/doxygen/bugs.html
  5. Info : auto-selecting first available session transport "jtag". To override use 'transport select <transport>'.
  6. Info : DEPRECATED target event trace-config; use TPIU events {pre,post}-{enable,disable}
  7. Info : clock speed 1000 kHz
  8. Info : JTAG tap: stm32f3x.cpu tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
  9. Info : JTAG tap: stm32f3x.bs tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
  10. Info : JTAG tap: auto0.tap tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
  11. Info : JTAG tap: auto1.tap tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
  12. Warn : AUTO auto0.tap - use "jtag newtap auto0 tap -irlen 4 -expected-id 0x4ba00477"
  13. Warn : AUTO auto1.tap - use "jtag newtap auto1 tap -irlen 5 -expected-id 0x06432041"
  14. Info : stm32f3x.cpu: Cortex-M4 r0p1 processor detected
  15. Info : stm32f3x.cpu: target has 6 breakpoints, 4 watchpoints
  16. Info : stm32f3x.cpu: external reset detected
  17. Info : starting gdb server for stm32f3x.cpu on 3333
  18. Info : Listening on port 3333 for gdb connections
  19.     TargetName         Type       Endian TapName            State
  20. --  ------------------ ---------- ------ ------------------ ------------
  21.  0* stm32f3x.cpu       cortex_m   little stm32f3x.cpu       running
  22.  
  23. target halted due to debug-request, current mode: Thread
  24. xPSR: 0x21000000 pc: 0x08009a66 msp: 0x20007ff0
  25. Info : device id = 0x20006432
  26. Info : flash size = 256kbytes
  27. erased sectors 0 through 127 on flash bank 0 in 0.026424s
  28.  
  29. Info : JTAG tap: stm32f3x.cpu tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
  30. Info : JTAG tap: stm32f3x.bs tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
  31. Info : JTAG tap: auto0.tap tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
  32. Info : JTAG tap: auto1.tap tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
  33. target halted due to debug-request, current mode: Thread
  34. xPSR: 0x01000000 pc: 0xfffffffe msp: 0xfffffffc
  35. Info : Flash write discontinued at 0x08000378, next section at 0x08008000
  36. Info : Padding image section 1 at 0x0800ba2b with 1 bytes
  37. wrote 15796 bytes from file Z:/Elektronik/GSV13/Fertigung_GSV-13iu/Init/GSV13init_Ver1_6.hex in 0.739899s (20.848 KiB/s)
  38.  
  39. verified 15795 bytes in 0.371637s (41.505 KiB/s)
  40.  
  41. Info : JTAG tap: stm32f3x.cpu tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
  42. Info : JTAG tap: stm32f3x.bs tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
  43. Info : JTAG tap: auto0.tap tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
  44. Info : JTAG tap: auto1.tap tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
  45. target halted due to debug-request, current mode: Thread
  46. xPSR: 0x01000000 pc: 0x080001d4 msp: 0x20008000
  47. shutdown command invoked
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement