-
-
Save alexisvl/663b90c14d44cc9651f9 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Open On-Chip Debugger 0.9.0-dev-00358-gd3c2679 (2015-04-02-20:03) | |
Licensed under GNU GPL v2 | |
For bug reports, read | |
http://openocd.sourceforge.net/doc/doxygen/bugs.html | |
Info : If you need SWD support, flash KT-Link buffer from https://github.com/bharrisau/busblaster | |
and use dp_busblaster_kt-link.cfg instead | |
Warn : Interface already configured, ignoring | |
Info : auto-selecting first available session transport "jtag". To override use 'transport select <transport>'. | |
adapter speed: 500 kHz | |
adapter_nsrst_delay: 100 | |
jtag_ntrst_delay: 100 | |
cortex_m reset_config sysresetreq | |
adapter speed: 1 kHz | |
Info : clock speed 1 kHz | |
Info : JTAG tap: ATSAM4SD32C.cpu tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Warn : JTAG tap: ATSAM4SD32C.cpu UNEXPECTED: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Error: JTAG tap: ATSAM4SD32C.cpu expected 1 of 1: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto0.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto1.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto2.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto3.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto4.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto5.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto6.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto7.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto8.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto9.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto10.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto11.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto12.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto13.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto14.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto15.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto16.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto17.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Info : JTAG tap: auto18.tap tap/device found: 0x4ba00477 (mfg: 0x23b, part: 0xba00, ver: 0x4) | |
Info : JTAG tap: auto19.tap tap/device found: 0x24001093 (mfg: 0x049, part: 0x4001, ver: 0x2) | |
Error: Trying to use configured scan chain anyway... | |
Warn : AUTO auto0.tap - use "jtag newtap auto0 tap -irlen 2 -expected-id 0x4ba00477" | |
Error: auto0.tap: IR capture error; saw 0x0000 not 0x0001 | |
Warn : Bypassing JTAG setup events due to errors | |
Warn : Invalid ACK 0 in JTAG-DP transaction | |
in procedure 'flash' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment