Fri Oct 11, 2019 17:03:13: IAR Embedded Workbench 8.11.3 (C:\Program Files (x86)\IarSystems\EmbeddedWorkbenchArm_8.11.2\arm\bin\armproc.dll) Fri Oct 11, 2019 17:03:13: Loaded macro file: C:\Program Files (x86)\IarSystems\EmbeddedWorkbenchArm_8.11.2\arm\config\debugger\NXP\Kxx.dmac Fri Oct 11, 2019 17:03:13: Loaded macro file: C:\Program Files (x86)\IarSystems\EmbeddedWorkbenchArm_8.11.2\arm\config\debugger\NXP\Kxx_Trace.dmac Fri Oct 11, 2019 17:03:14: Logging to file: C:\Usr\SE6000\SE6035\EEV\Code_V0.02\cspycomm.log Fri Oct 11, 2019 17:03:14: JLINK command: ProjectFile = C:\Usr\SE6000\SE6035\EEV\Code_V0.02\settings\eev_Debug.jlink, return = 0 Fri Oct 11, 2019 17:03:14: Device "MK10DX128XXX7" selected. Fri Oct 11, 2019 17:03:14: JTAG speed is initially set to: 32 kHz Fri Oct 11, 2019 17:03:14: InitTarget() Fri Oct 11, 2019 17:03:14: TotalIRLen = 4, IRPrint = 0x01 Fri Oct 11, 2019 17:03:14: JTAG chain detection found 1 devices: Fri Oct 11, 2019 17:03:14: #0 Id: 0x4BA00477, IRLen: 04, CoreSight JTAG-DP Fri Oct 11, 2019 17:03:14: TotalIRLen = 4, IRPrint = 0x01 Fri Oct 11, 2019 17:03:14: JTAG chain detection found 1 devices: Fri Oct 11, 2019 17:03:14: #0 Id: 0x4BA00477, IRLen: 04, CoreSight JTAG-DP Fri Oct 11, 2019 17:03:14: Scanning AP map to find all available APs Fri Oct 11, 2019 17:03:14: AP[2]: Stopped AP scan as end of AP map has been reached Fri Oct 11, 2019 17:03:14: AP[0]: AHB-AP (IDR: 0x24770011) Fri Oct 11, 2019 17:03:14: AP[1]: JTAG-AP (IDR: 0x001C0000) Fri Oct 11, 2019 17:03:14: Iterating through AP map to find AHB-AP to use Fri Oct 11, 2019 17:03:14: AP[0]: Core found Fri Oct 11, 2019 17:03:14: AP[0]: AHB-AP ROM base: 0xE00FF000 Fri Oct 11, 2019 17:03:14: CPUID register: 0x410FC241. Implementer code: 0x41 (ARM) Fri Oct 11, 2019 17:03:14: Found Cortex-M4 r0p1, Little endian. Fri Oct 11, 2019 17:03:27: FPUnit: 6 code (BP) slots and 2 literal slots Fri Oct 11, 2019 17:03:27: CoreSight components: Fri Oct 11, 2019 17:03:27: ROMTbl[0] @ E00FF000 Fri Oct 11, 2019 17:03:27: ROMTbl[0][0]: E000E000, CID: B105E00D, PID: 000BB000 SCS Fri Oct 11, 2019 17:03:27: ROMTbl[0][1]: E0001000, CID: B105E00D, PID: 003BB002 DWT Fri Oct 11, 2019 17:03:27: ROMTbl[0][2]: E0002000, CID: B105E00D, PID: 002BB003 FPB Fri Oct 11, 2019 17:03:27: ROMTbl[0][3]: E0000000, CID: B105E00D, PID: 003BB001 ITM Fri Oct 11, 2019 17:03:27: ROMTbl[0][4]: E0040000, CID: B105900D, PID: 000BB9A1 TPIU Fri Oct 11, 2019 17:03:27: Reset: Halt core after reset via DEMCR.VC_CORERESET. Fri Oct 11, 2019 17:03:27: Reset: Reset device via AIRCR.SYSRESETREQ. Fri Oct 11, 2019 17:03:28: AfterResetTarget() Fri Oct 11, 2019 17:03:28: Hardware reset with strategy 0 was performed Fri Oct 11, 2019 17:03:28: Initial reset was performed Fri Oct 11, 2019 17:03:28: Found 1 JTAG device, Total IRLen = 4: Fri Oct 11, 2019 17:03:28: #0 Id: 0x4BA00477, IRLen: 4, IRPrint: 0x1 CoreSight JTAG-DP Fri Oct 11, 2019 17:03:30: Ignored debugger specified MTB address. (Connected core never implements an MTB) Fri Oct 11, 2019 17:03:30: J-Link: Flash download: Bank 0 @ 0x00000000: Skipped. Contents already match Fri Oct 11, 2019 17:03:30: 65604 bytes downloaded (89.23 Kbytes/sec) Fri Oct 11, 2019 17:03:30: Loaded debugee: C:\Usr\SE6000\SE6035\EEV\Code_V0.02\Debug\Exe\eev.out Fri Oct 11, 2019 17:03:30: Reset: Halt core after reset via DEMCR.VC_CORERESET. Fri Oct 11, 2019 17:03:30: Reset: Reset device via AIRCR.SYSRESETREQ. Fri Oct 11, 2019 17:03:30: AfterResetTarget() Fri Oct 11, 2019 17:03:30: Hardware reset with strategy 0 was performed Fri Oct 11, 2019 17:03:34: Warning: Stack pointer is setup to incorrect alignment. Stack addr = 0x20003FF7 Fri Oct 11, 2019 17:03:34: Target reset Fri Oct 11, 2019 17:03:34: There was 1 warning during the initialization of the debugging session.