Skip to content

read memory sometimes returns invalid data #28

@karlp

Description

@karlp

We've discussed this somewhat on discord, but I've done some more testing and feel it's worthy of proper tracking here.

Background

Using OpenOCD's RTT commands, scanning for memory for the "SEGGER RTT" control block marker sometimes detects a bad address, or fails to detect it at all, depending on the starting address of the scan.

OpenOcd snippet for issuing the scan: This scans 0x4000 bytes of memory starting at 0x1fff0000 ```tcl proc app_rtt_restart { {ARG 0x1fff0000} } { # Swallow openocd getting cranky if it wasn't already started. echo [catch {rtt stop}] rtt setup $ARG 0x4000 "SEGGER RTT" rtt start echo [catch {rtt server stop 9091}] rtt server start 9091 0 } ```

The relevant code in OpenOCD that this then triggers is here: https://github.com/openocd-org/openocd/blob/master/src/target/rtt.c#L239-L281

Logging patch to openocd to help understand future traces
diff --git a/src/target/rtt.c b/src/target/rtt.c
index a8ab24a60..255207a7c 100644
--- a/src/target/rtt.c
+++ b/src/target/rtt.c
@@ -241,7 +241,7 @@ int target_rtt_find_control_block(struct target *target,
                void *user_data)
 {
        target_addr_t address_end = *address + size;
-       uint8_t buf[1024];
+       uint8_t buf[512];
 
        *found = false;
 
@@ -255,6 +255,7 @@ int target_rtt_find_control_block(struct target *target,
 
                const size_t buf_size = MIN(sizeof(buf), address_end - addr);
                ret = target_read_buffer(target, addr, buf_size, buf);
+               LOG_INFO("KARL: Reading buffer from addr: 0x%lx with size: %lu", addr, buf_size);
 
                if (ret != ERROR_OK)
                        return ret;
@@ -266,10 +267,13 @@ int target_rtt_find_control_block(struct target *target,
                                id_matched_length = 0;
                        }
 
-                       if (buf[buf_off] == id[id_matched_length])
+                       if (buf[buf_off] == id[id_matched_length]) {
                                id_matched_length++;
+                               LOG_INFO("KARL: addr: 0x%lx match for buf_off: %lu char == '%c'", addr, buf_off, buf[buf_off]);
+                       }
 
                        if (id_matched_length == id_length) {
+                               LOG_INFO("KARL: found a match at 0x%lx with bufoff %lu and id_length: %lu", addr, buf_off, id_length);
                                *address = addr + buf_off + 1 - id_length;
                                *found = true;
                                return ERROR_OK;
diff --git a/src/target/target.c b/src/target/target.c
index bdf0ff244..46dde157c 100644
--- a/src/target/target.c
+++ b/src/target/target.c
@@ -1255,6 +1255,8 @@ int target_read_memory(struct target *target,
                LOG_ERROR("Target %s doesn't support read_memory", target_name(target));
                return ERROR_FAIL;
        }
+       LOG_DEBUG("target_read_memory of %" PRIu32 " size with count: %" PRIu32 "byte at " TARGET_ADDR_FMT,
+                         size, count, address);
        return target->type->read_memory(target, address, size, count, buffer);
 }
 

The problem manifests when OpenOCD either (depending on actual placement of the _SEGGER_RTT control block and starting scan address and scan chunk size) is either a) correct operation (yay!) b) The block being detected, but at the wrong location or c) the block not being detected at all.

Example GDB output of failure

(gdb) mon app_rtt_restart
0
rtt: Searching for control block 'SEGGER RTT'
KARL: Reading buffer from addr: 0x1fff0000 with size: 512
KARL: Reading buffer from addr: 0x1fff0200 with size: 512
KARL: Reading buffer from addr: 0x1fff0400 with size: 512
KARL: Reading buffer from addr: 0x1fff0600 with size: 512
KARL: Reading buffer from addr: 0x1fff0800 with size: 512
KARL: Reading buffer from addr: 0x1fff0a00 with size: 512
KARL: Reading buffer from addr: 0x1fff0c00 with size: 512
KARL: Reading buffer from addr: 0x1fff0e00 with size: 512
KARL: Reading buffer from addr: 0x1fff1000 with size: 512
KARL: Reading buffer from addr: 0x1fff1200 with size: 512
KARL: addr: 0x1fff1200 match for buf_off: 460 char == 'S'
KARL: Reading buffer from addr: 0x1fff1400 with size: 512
KARL: addr: 0x1fff1400 match for buf_off: 496 char == 'S'
KARL: addr: 0x1fff1400 match for buf_off: 497 char == 'E'
KARL: addr: 0x1fff1400 match for buf_off: 498 char == 'G'
KARL: addr: 0x1fff1400 match for buf_off: 499 char == 'G'       <<<<< note this is where it should have  been found.
KARL: Reading buffer from addr: 0x1fff1600 with size: 512
KARL: addr: 0x1fff1600 match for buf_off: 149 char == 'S'
KARL: addr: 0x1fff1600 match for buf_off: 312 char == 'S'
KARL: addr: 0x1fff1600 match for buf_off: 333 char == 'S'
KARL: addr: 0x1fff1600 match for buf_off: 341 char == 'S'
KARL: addr: 0x1fff1600 match for buf_off: 362 char == 'S'
KARL: addr: 0x1fff1600 match for buf_off: 372 char == 'S'
KARL: addr: 0x1fff1600 match for buf_off: 376 char == 'S'
KARL: addr: 0x1fff1600 match for buf_off: 476 char == 'S'
KARL: Reading buffer from addr: 0x1fff1800 with size: 512
KARL: addr: 0x1fff1800 match for buf_off: 35 char == 'S'
KARL: addr: 0x1fff1800 match for buf_off: 77 char == 'S'
KARL: addr: 0x1fff1800 match for buf_off: 98 char == 'S'
KARL: addr: 0x1fff1800 match for buf_off: 108 char == 'S'
KARL: addr: 0x1fff1800 match for buf_off: 112 char == 'S'
KARL: addr: 0x1fff1800 match for buf_off: 155 char == 'S'
KARL: addr: 0x1fff1800 match for buf_off: 169 char == 'S'
<<<<< continues here, but fails to find the block>>>>
Viewing memory in gdb to see what might have gone wrong
(gdb) x /32 0x1fff1400+497
0x1fff15f1 <uxTimerTaskStack.0+509>:	0xa5	0xa5	0xa5	0x53	0x45	0x47	0x47	0x45
0x1fff15f9 <_SEGGER_RTT+5>:	0x52	0x20	0x52	0x54	0x54	0x00	0x00	0x00
0x1fff1601 <_SEGGER_RTT+13>:	0x00	0x00	0x00	0x03	0x00	0x00	0x00	0x03
0x1fff1609 <_SEGGER_RTT+21>:	0x00	0x00	0x00	0x24	0xe7	0x00	0x00	0x9c
(gdb) p /x &_SEGGER_RTT 
$5 = 0x1fff15f4
(gdb) x /c 0x1fff1400+496
0x1fff15f0 <uxTimerTaskStack.0+508>:	-91 '\245'
(gdb) x /c 0x1fff1400+497
0x1fff15f1 <uxTimerTaskStack.0+509>:	-91 '\245'
(gdb) x /c 0x1fff1400+498
0x1fff15f2 <uxTimerTaskStack.0+510>:	-91 '\245'
(gdb) x /c 0x1fff1400+499
0x1fff15f3 <uxTimerTaskStack.0+511>:	-91 '\245'
(gdb) x /c 0x1fff1400+500
0x1fff15f4 <_SEGGER_RTT>:	83 'S'          <<<<<<<<<<<<<<< note, this doesn't match what the buffer earlier gave us....
(gdb) x /c 0x1fff1400+501
0x1fff15f5 <_SEGGER_RTT+1>:	69 'E'
(gdb) x /c 0x1fff1400+502
0x1fff15f6 <_SEGGER_RTT+2>:	71 'G'
(gdb) x /c 0x1fff1400+503
0x1fff15f7 <_SEGGER_RTT+3>:	71 'G'
(gdb) 

Attached is a pcap file of doin the "mon app_rtt_restart" step, where this goes wrong:

orbtrace-rtt-rescan-chunk-20251006.pcapng.gz

Packet 216 corresponds to part of the read of the area leading up to the RTT block, and the "leftover data" (payload) from wireshark dumps as:

hexdump of decode of packet 216, see pcap for more details
0000   06 7d 00 01 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   .}..............
0010   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0020   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0030   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0040   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0050   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0060   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0070   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0080   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0090   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
00a0   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
00b0   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
00c0   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
00d0   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
00e0   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
00f0   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0100   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0110   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0120   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5   ................
0130   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 98 13 ff 1f   ................
0140   a5 a5 a5 a5 fc 1a ff 1f a5 a5 a5 a5 50 15 ff 1f   ............P...
0150   01 00 00 00 ff ff ff ff a5 a5 a5 a5 a5 a5 a5 a5   ................
0160   70 1b ff 1f 38 1b ff 1f 24 1b ff 1f 00 00 00 00   p...8...$.......
0170   78 15 ff 1f 00 00 00 00 20 00 00 00 a5 a5 a5 a5   x....... .......
0180   a5 a5 a5 a5 a5 a5 a5 a5 c0 15 ff 1f a5 a5 a5 a5   ................
0190   a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 a5 fd ff ff ff   ................
01a0   00 00 00 00 01 00 00 00 00 00 00 10 04 ed 00 e0   ................
01b0   a5 a5 a5 a5 23 9a 00 00 d4 a9 00 00 00 00 00 61   ....#..........a
01c0   01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
01d0   d8 15 ff 1f 4b a9 00 00 a5 a5 a5 a5 00 00 00 00   ....K...........
01e0   01 00 00 00 00 00 00 00 a5 a5 a5 a5 b9 ad 00 00   ................
01f0   a5 a5 a5 a5 53 45 47 47                           ....SEGG
Note that this URB _ends_ with the SEGG (the bytes that we started to match...

packet 220, the next inbound packet, has the "next piece" but it has skipped a section, (4 bytes, the difference between MPS of 508 and the 512 request block) Note that this has the "TT" at the end of the magic string SEGGER RTT but is missing the ER<space>R

hexdump of packet 220, see pcap for more info
0000   05 04 01 54 54 00 00 00 00 00 00 03 00 00 00 03   ...TT...........
0010   00 00 00                                          ...

The next inbound packet, frame 224, contains more memory and some of the actual RTT buffer contents, as expected.

OpenOCD -d3 log of this section attached (too big and spammy to inline, and mostly summarized above, but included for completeness:

oocd-d3-log-failing-case.txt

Why report here?

This only happens with an orbtrace. Using a jlink, or a different CMSIS-DAP adapter does not trigger this problem.

It was suggested that OpenOCD is simply incapable of re-assembling buffers when reading from the target and that this path had simply not been exercised before (a CMSIS-DAP interface with MPS != 64) I tested this by having openocd request different odd sized buffers, which all worked. The problem only manifests if OpenOCD asks Orbtrace for > 508 bytes.

Using for instance, 191 byte requests from OpenOCD and adjusting the start address to ensure it crosses a boundary still works just fine:

OpenOCD correctly reasssembling across 191 byte blocks
(gdb) mon app_rtt_restart 0x1fff0054
0
rtt: Searching for control block 'SEGGER RTT'
KARL: Reading buffer from addr: 0x1fff0054 with size: 191
KARL: Reading buffer from addr: 0x1fff0113 with size: 191
KARL: Reading buffer from addr: 0x1fff01d2 with size: 191
KARL: Reading buffer from addr: 0x1fff0291 with size: 191
KARL: Reading buffer from addr: 0x1fff0350 with size: 191
KARL: Reading buffer from addr: 0x1fff040f with size: 191
KARL: Reading buffer from addr: 0x1fff04ce with size: 191
KARL: Reading buffer from addr: 0x1fff058d with size: 191
KARL: Reading buffer from addr: 0x1fff064c with size: 191
KARL: Reading buffer from addr: 0x1fff070b with size: 191
KARL: Reading buffer from addr: 0x1fff07ca with size: 191
KARL: Reading buffer from addr: 0x1fff0889 with size: 191
KARL: Reading buffer from addr: 0x1fff0948 with size: 191
KARL: Reading buffer from addr: 0x1fff0a07 with size: 191
KARL: Reading buffer from addr: 0x1fff0ac6 with size: 191
KARL: Reading buffer from addr: 0x1fff0b85 with size: 191
KARL: Reading buffer from addr: 0x1fff0c44 with size: 191
KARL: Reading buffer from addr: 0x1fff0d03 with size: 191
KARL: Reading buffer from addr: 0x1fff0dc2 with size: 191
KARL: Reading buffer from addr: 0x1fff0e81 with size: 191
KARL: Reading buffer from addr: 0x1fff0f40 with size: 191
KARL: Reading buffer from addr: 0x1fff0fff with size: 191
KARL: Reading buffer from addr: 0x1fff10be with size: 191
KARL: Reading buffer from addr: 0x1fff117d with size: 191
KARL: Reading buffer from addr: 0x1fff123c with size: 191
KARL: Reading buffer from addr: 0x1fff12fb with size: 191
KARL: Reading buffer from addr: 0x1fff13ba with size: 191
KARL: addr: 0x1fff13ba match for buf_off: 18 char == 'S'
KARL: Reading buffer from addr: 0x1fff1479 with size: 191
KARL: Reading buffer from addr: 0x1fff1538 with size: 191
KARL: addr: 0x1fff1538 match for buf_off: 188 char == 'S'
KARL: addr: 0x1fff1538 match for buf_off: 189 char == 'E'
KARL: addr: 0x1fff1538 match for buf_off: 190 char == 'G'
KARL: Reading buffer from addr: 0x1fff15f7 with size: 191          <<<<<<<< crosses boundary and resassembles correctly
KARL: addr: 0x1fff15f7 match for buf_off: 0 char == 'G'
KARL: addr: 0x1fff15f7 match for buf_off: 1 char == 'E'
KARL: addr: 0x1fff15f7 match for buf_off: 2 char == 'R'
KARL: addr: 0x1fff15f7 match for buf_off: 3 char == ' '
KARL: addr: 0x1fff15f7 match for buf_off: 4 char == 'R'
KARL: addr: 0x1fff15f7 match for buf_off: 5 char == 'T'
KARL: addr: 0x1fff15f7 match for buf_off: 6 char == 'T'
KARL: found a match at 0x1fff15f7 with bufoff 6 and id_length: 10
rtt: Control block found at 0x1fff15f4

A pcap of this working 191byte cross boundary re-scan is also attached here:

orbtrace-rtt-rescan-good191crossboundary-20251006.pcapng.gz

OpenOCD -d3 log of this (successful scan)
Debug: 10809 442148 command.c:82 script_debug(): command - rtt setup 0x1fff0054 0x4000 SEGGER RTT
Debug: 10810 442148 command.c:82 script_debug(): command - rtt start
Info : 10811 442148 rtt.c:251 target_rtt_find_control_block(): rtt: Searching for control block 'SEGGER RTT'
Debug: 10812 442148 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O7274743a20536561726368696e6720666f7220636f6e74726f6c20626c6f636b202753454747455220525454270a#2a
Debug: 10813 442148 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0054
Debug: 10814 442148 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0054
Debug: 10815 442149 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0110
Debug: 10816 442149 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0112
Info : 10817 442149 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0054 with size: 191
Debug: 10818 442149 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663030353420776974682073697a653a203139310a#c3
Debug: 10819 442149 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0113
Debug: 10820 442149 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0113
Debug: 10821 442149 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0114
Debug: 10822 442150 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff01d0
Info : 10823 442150 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0113 with size: 191
Debug: 10824 442150 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663031313320776974682073697a653a203139310a#bf
Debug: 10825 442150 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff01d2
Debug: 10826 442150 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff01d2
Debug: 10827 442150 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff01d4
Debug: 10828 442150 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0290
Info : 10829 442150 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff01d2 with size: 191
Debug: 10830 442150 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663031643220776974682073697a653a203139310a#c4
Debug: 10831 442150 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0291
Debug: 10832 442150 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0291
Debug: 10833 442151 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0292
Debug: 10834 442151 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0294
Info : 10835 442151 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0291 with size: 191
Debug: 10836 442151 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663032393120776974682073697a653a203139310a#c6
Debug: 10837 442151 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0350
Debug: 10838 442151 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0350
Debug: 10839 442151 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff040c
Debug: 10840 442152 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff040e
Info : 10841 442152 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0350 with size: 191
Debug: 10842 442152 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663033353020776974682073697a653a203139310a#c2
Debug: 10843 442152 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff040f
Debug: 10844 442152 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff040f
Debug: 10845 442152 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0410
Debug: 10846 442152 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff04cc
Info : 10847 442152 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff040f with size: 191
Debug: 10848 442152 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663034306620776974682073697a653a203139310a#c7
Debug: 10849 442152 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff04ce
Debug: 10850 442152 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff04ce
Debug: 10851 442152 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff04d0
Debug: 10852 442153 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff058c
Info : 10853 442153 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff04ce with size: 191
Debug: 10854 442153 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663034636520776974682073697a653a203139310a#cc
Debug: 10855 442153 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff058d
Debug: 10856 442153 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff058d
Debug: 10857 442153 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff058e
Debug: 10858 442153 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0590
Info : 10859 442154 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff058d with size: 191
Debug: 10860 442154 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663035386420776974682073697a653a203139310a#ce
Debug: 10861 442154 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff064c
Debug: 10862 442154 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff064c
Debug: 10863 442154 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0708
Debug: 10864 442154 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff070a
Info : 10865 442154 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff064c with size: 191
Debug: 10866 442154 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663036346320776974682073697a653a203139310a#ca
Debug: 10867 442154 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff070b
Debug: 10868 442154 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff070b
Debug: 10869 442154 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff070c
Debug: 10870 442155 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff07c8
Info : 10871 442155 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff070b with size: 191
Debug: 10872 442155 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663037306220776974682073697a653a203139310a#c6
Debug: 10873 442155 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff07ca
Debug: 10874 442155 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff07ca
Debug: 10875 442155 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff07cc
Debug: 10876 442155 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0888
Info : 10877 442156 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff07ca with size: 191
Debug: 10878 442156 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663037636120776974682073697a653a203139310a#cb
Debug: 10879 442156 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0889
Debug: 10880 442156 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0889
Debug: 10881 442156 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff088a
Debug: 10882 442156 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff088c
Info : 10883 442156 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0889 with size: 191
Debug: 10884 442156 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663038383920776974682073697a653a203139310a#d3
Debug: 10885 442156 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0948
Debug: 10886 442156 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0948
Debug: 10887 442157 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0a04
Debug: 10888 442157 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0a06
Info : 10889 442157 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0948 with size: 191
Debug: 10890 442157 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663039343820776974682073697a653a203139310a#cf
Debug: 10891 442157 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0a07
Debug: 10892 442157 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0a07
Debug: 10893 442157 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0a08
Debug: 10894 442158 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0ac4
Info : 10895 442158 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0a07 with size: 191
Debug: 10896 442158 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663061303720776974682073697a653a203139310a#c5
Debug: 10897 442158 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0ac6
Debug: 10898 442158 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0ac6
Debug: 10899 442158 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0ac8
Debug: 10900 442158 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0b84
Info : 10901 442158 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0ac6 with size: 191
Debug: 10902 442158 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663061633620776974682073697a653a203139310a#ca
Debug: 10903 442158 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0b85
Debug: 10904 442158 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0b85
Debug: 10905 442158 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0b86
Debug: 10906 442158 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0b88
Info : 10907 442159 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0b85 with size: 191
Debug: 10908 442159 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663062383520776974682073697a653a203139310a#cc
Debug: 10909 442159 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0c44
Debug: 10910 442159 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0c44
Debug: 10911 442159 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0d00
Debug: 10912 442159 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0d02
Info : 10913 442160 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0c44 with size: 191
Debug: 10914 442160 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663063343420776974682073697a653a203139310a#c8
Debug: 10915 442160 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0d03
Debug: 10916 442160 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0d03
Debug: 10917 442160 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0d04
Debug: 10918 442160 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0dc0
Info : 10919 442160 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0d03 with size: 191
Debug: 10920 442160 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663064303320776974682073697a653a203139310a#c4
Debug: 10921 442160 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0dc2
Debug: 10922 442160 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0dc2
Debug: 10923 442160 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0dc4
Debug: 10924 442161 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0e80
Info : 10925 442161 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0dc2 with size: 191
Debug: 10926 442161 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663064633220776974682073697a653a203139310a#c9
Debug: 10927 442161 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0e81
Debug: 10928 442161 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0e81
Debug: 10929 442161 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0e82
Debug: 10930 442161 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0e84
Info : 10931 442161 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0e81 with size: 191
Debug: 10932 442161 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663065383120776974682073697a653a203139310a#cb
Debug: 10933 442161 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0f40
Debug: 10934 442161 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff0f40
Debug: 10935 442162 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff0ffc
Debug: 10936 442162 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0ffe
Info : 10937 442162 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0f40 with size: 191
Debug: 10938 442162 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663066343020776974682073697a653a203139310a#c7
Debug: 10939 442162 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff0fff
Debug: 10940 442162 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff0fff
Debug: 10941 442162 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff1000
Debug: 10942 442163 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff10bc
Info : 10943 442163 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff0fff with size: 191
Debug: 10944 442163 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663066666620776974682073697a653a203139310a#d5
Debug: 10945 442163 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff10be
Debug: 10946 442163 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff10be
Debug: 10947 442163 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff10c0
Debug: 10948 442163 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff117c
Info : 10949 442163 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff10be with size: 191
Debug: 10950 442163 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663130626520776974682073697a653a203139310a#c8
Debug: 10951 442163 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff117d
Debug: 10952 442163 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff117d
Debug: 10953 442164 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff117e
Debug: 10954 442164 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff1180
Info : 10955 442164 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff117d with size: 191
Debug: 10956 442164 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663131376420776974682073697a653a203139310a#ca
Debug: 10957 442164 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff123c
Debug: 10958 442164 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff123c
Debug: 10959 442164 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff12f8
Debug: 10960 442165 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff12fa
Info : 10961 442165 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff123c with size: 191
Debug: 10962 442165 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663132336320776974682073697a653a203139310a#c6
Debug: 10963 442165 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff12fb
Debug: 10964 442165 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff12fb
Debug: 10965 442165 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff12fc
Debug: 10966 442165 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff13b8
Info : 10967 442165 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff12fb with size: 191
Debug: 10968 442165 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663132666220776974682073697a653a203139310a#cb
Debug: 10969 442165 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff13ba
Debug: 10970 442165 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff13ba
Debug: 10971 442165 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff13bc
Debug: 10972 442166 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff1478
Info : 10973 442166 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff13ba with size: 191
Debug: 10974 442166 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663133626120776974682073697a653a203139310a#c7
Info : 10975 442166 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff13ba match for buf_off: 18 char == 'S'
Debug: 10976 442166 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631336261206d6174636820666f72206275665f6f66663a2031382063686172203d3d202753270a#9f
Debug: 10977 442166 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff1479
Debug: 10978 442166 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff1479
Debug: 10979 442166 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff147a
Debug: 10980 442166 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff147c
Info : 10981 442167 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff1479 with size: 191
Debug: 10982 442167 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663134373920776974682073697a653a203139310a#cf
Debug: 10983 442167 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff1538
Debug: 10984 442167 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff1538
Debug: 10985 442167 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff15f4
Debug: 10986 442167 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff15f6
Info : 10987 442167 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff1538 with size: 191
Debug: 10988 442167 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663135333820776974682073697a653a203139310a#cb
Info : 10989 442167 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff1538 match for buf_off: 188 char == 'S'
Debug: 10990 442167 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631353338206d6174636820666f72206275665f6f66663a203138382063686172203d3d202753270a#0e
Info : 10991 442167 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff1538 match for buf_off: 189 char == 'E'
Debug: 10992 442167 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631353338206d6174636820666f72206275665f6f66663a203138392063686172203d3d202745270a#10
Info : 10993 442167 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff1538 match for buf_off: 190 char == 'G'
Debug: 10994 442167 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631353338206d6174636820666f72206275665f6f66663a203139302063686172203d3d202747270a#0a
Debug: 10995 442167 target.c:2420 target_read_buffer(): reading buffer of 191 byte at 0x1fff15f7
Debug: 10996 442167 target.c:1258 target_read_memory(): target_read_memory of 1 size with count: 1byte at 0x1fff15f7
Debug: 10997 442167 target.c:1258 target_read_memory(): target_read_memory of 4 size with count: 47byte at 0x1fff15f8
Debug: 10998 442168 target.c:1258 target_read_memory(): target_read_memory of 2 size with count: 1byte at 0x1fff16b4
Info : 10999 442168 rtt.c:258 target_rtt_find_control_block(): KARL: Reading buffer from addr: 0x1fff15f7 with size: 191
Debug: 11000 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a2052656164696e67206275666665722066726f6d20616464723a203078316666663135663720776974682073697a653a203139310a#d0
Info : 11001 442168 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff15f7 match for buf_off: 0 char == 'G'
Debug: 11002 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631356637206d6174636820666f72206275665f6f66663a20302063686172203d3d202747270a#3f
Info : 11003 442168 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff15f7 match for buf_off: 1 char == 'E'
Debug: 11004 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631356637206d6174636820666f72206275665f6f66663a20312063686172203d3d202745270a#3e
Info : 11005 442168 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff15f7 match for buf_off: 2 char == 'R'
Debug: 11006 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631356637206d6174636820666f72206275665f6f66663a20322063686172203d3d202752270a#3d
Info : 11007 442168 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff15f7 match for buf_off: 3 char == ' '
Debug: 11008 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631356637206d6174636820666f72206275665f6f66663a20332063686172203d3d202720270a#39
Info : 11009 442168 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff15f7 match for buf_off: 4 char == 'R'
Debug: 11010 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631356637206d6174636820666f72206275665f6f66663a20342063686172203d3d202752270a#3f
Info : 11011 442168 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff15f7 match for buf_off: 5 char == 'T'
Debug: 11012 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631356637206d6174636820666f72206275665f6f66663a20352063686172203d3d202754270a#42
Info : 11013 442168 rtt.c:272 target_rtt_find_control_block(): KARL: addr: 0x1fff15f7 match for buf_off: 6 char == 'T'
Debug: 11014 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20616464723a2030783166666631356637206d6174636820666f72206275665f6f66663a20362063686172203d3d202754270a#43
Info : 11015 442168 rtt.c:276 target_rtt_find_control_block(): KARL: found a match at 0x1fff15f7 with bufoff 6 and id_length: 10
Debug: 11016 442168 gdb_server.c:425 gdb_log_outgoing_packet(): [k64.cpu] {1} sending packet: $O4b41524c3a20666f756e642061206d6174636820617420307831666666313566372077697468206275666f6666203620616e642069645f6c656e6774683a2031300a#a7
Info : 11017 442168 rtt.c:139 rtt_start(): rtt: Control block found at 0x1fff15f4

Frames where the SEGGER RTT string come across are in 536 and 540. (Note that there still appears to be some corruption here)
More details in the pcap of course.

536
0000   05 02 01 53 45 47 47 53 45 47 47                  ...SEGGSEGG

540
0000   05 31 01 45 52 20 52 54 54 00 00 00 00 00 00 03   .1.ER RTT.......
0010   00 00 00 03 00 00 00 24 e7 00 00 9c 16 ff 1f 00   .......$........

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions