Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- xPack OpenOCD x86_64 Open On-Chip Debugger 0.11.0+dev (2021-12-07-17:33)
- Licensed under GNU GPL v2
- For bug reports, read
- http://openocd.org/doc/doxygen/bugs.html
- Info : auto-selecting first available session transport "jtag". To override use 'transport select <transport>'.
- Info : DEPRECATED target event trace-config; use TPIU events {pre,post}-{enable,disable}
- Info : clock speed 1000 kHz
- Info : JTAG tap: stm32f3x.cpu tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
- Info : JTAG tap: stm32f3x.bs tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
- Info : JTAG tap: auto0.tap tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
- Info : JTAG tap: auto1.tap tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
- Warn : AUTO auto0.tap - use "jtag newtap auto0 tap -irlen 4 -expected-id 0x4ba00477"
- Warn : AUTO auto1.tap - use "jtag newtap auto1 tap -irlen 5 -expected-id 0x06432041"
- Info : stm32f3x.cpu: Cortex-M4 r0p1 processor detected
- Info : stm32f3x.cpu: target has 6 breakpoints, 4 watchpoints
- Info : stm32f3x.cpu: external reset detected
- Info : starting gdb server for stm32f3x.cpu on 3333
- Info : Listening on port 3333 for gdb connections
- TargetName Type Endian TapName State
- -- ------------------ ---------- ------ ------------------ ------------
- 0* stm32f3x.cpu cortex_m little stm32f3x.cpu running
- target halted due to debug-request, current mode: Thread
- xPSR: 0x21000000 pc: 0x08009a66 msp: 0x20007ff0
- Info : device id = 0x20006432
- Info : flash size = 256kbytes
- erased sectors 0 through 127 on flash bank 0 in 0.026424s
- Info : JTAG tap: stm32f3x.cpu tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
- Info : JTAG tap: stm32f3x.bs tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
- Info : JTAG tap: auto0.tap tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
- Info : JTAG tap: auto1.tap tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
- target halted due to debug-request, current mode: Thread
- xPSR: 0x01000000 pc: 0xfffffffe msp: 0xfffffffc
- Info : Flash write discontinued at 0x08000378, next section at 0x08008000
- Info : Padding image section 1 at 0x0800ba2b with 1 bytes
- wrote 15796 bytes from file Z:/Elektronik/GSV13/Fertigung_GSV-13iu/Init/GSV13init_Ver1_6.hex in 0.739899s (20.848 KiB/s)
- verified 15795 bytes in 0.371637s (41.505 KiB/s)
- Info : JTAG tap: stm32f3x.cpu tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
- Info : JTAG tap: stm32f3x.bs tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
- Info : JTAG tap: auto0.tap tap/device found: 0x4ba00477 (mfg: 0x23b (ARM Ltd), part: 0xba00, ver: 0x4)
- Info : JTAG tap: auto1.tap tap/device found: 0x06432041 (mfg: 0x020 (STMicroelectronics), part: 0x6432, ver: 0x0)
- target halted due to debug-request, current mode: Thread
- xPSR: 0x01000000 pc: 0x080001d4 msp: 0x20008000
- shutdown command invoked
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement