esp32h2_log.inc 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138
  1. .. first_boot_enc
  2. .. code-block:: none
  3. rst:0x1 (POWERON),boot:0xc (SPI_FAST_FLASH_BOOT)
  4. SPIWP:0xee
  5. mode:DIO, clock div:1
  6. load:0x4083cfd0,len:0xc0c
  7. load:0x4083efd0,len:0x45c0
  8. load:0x40846248,len:0x2b48
  9. entry 0x4083cfd0
  10. I (25) boot: ESP-IDF v5.1-dev-4270-g4bff4ed6e5 2nd stage bootloader
  11. I (25) boot: compile time Mar 27 2023 16:40:47
  12. I (26) boot: chip revision: v0.0
  13. I (29) boot.esp32h2: SPI Speed : 64MHz
  14. I (34) boot.esp32h2: SPI Mode : DIO
  15. I (39) boot.esp32h2: SPI Flash Size : 2MB
  16. I (44) boot: Enabling RNG early entropy source...
  17. W (49) bootloader_random: bootloader_random_enable() has not been implemented yet
  18. I (57) boot: Partition Table:
  19. I (61) boot: ## Label Usage Type ST Offset Length
  20. I (68) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  21. I (76) boot: 1 storage Unknown data 01 ff 00010000 00001000
  22. I (83) boot: 2 factory factory app 00 00 00020000 00100000
  23. I (90) boot: 3 nvs_key NVS keys 01 04 00120000 00001000
  24. I (98) boot: 4 custom_nvs WiFi data 01 02 00121000 00006000
  25. I (106) boot: End of partition table
  26. I (110) esp_image: segment 0: paddr=00020020 vaddr=42020020 size=096e0h ( 38624) map
  27. I (128) esp_image: segment 1: paddr=00029708 vaddr=40800000 size=06910h ( 26896) load
  28. I (135) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=1b708h (112392) map
  29. I (163) esp_image: segment 3: paddr=0004b730 vaddr=40806910 size=02a08h ( 10760) load
  30. I (167) esp_image: segment 4: paddr=0004e140 vaddr=40809320 size=00e5ch ( 3676) load
  31. I (172) boot: Loaded app from partition at offset 0x20000
  32. I (175) boot: Checking flash encryption...
  33. I (180) efuse: Batch mode of writing fields is enabled
  34. I (186) flash_encrypt: Generating new flash encryption key...
  35. I (194) efuse: Writing EFUSE_BLK_KEY0 with purpose 4
  36. W (198) flash_encrypt: Not disabling UART bootloader encryption
  37. I (204) flash_encrypt: Disable JTAG...
  38. I (212) efuse: BURN BLOCK4
  39. I (219) efuse: BURN BLOCK4 - OK (write block == read block)
  40. I (221) efuse: BURN BLOCK0
  41. I (227) efuse: BURN BLOCK0 - OK (write block == read block)
  42. I (231) efuse: Batch mode. Prepared fields are committed
  43. I (236) esp_image: segment 0: paddr=00000020 vaddr=4083cfd0 size=00c0ch ( 3084)
  44. I (245) esp_image: segment 1: paddr=00000c34 vaddr=4083efd0 size=045c0h ( 17856)
  45. I (255) esp_image: segment 2: paddr=000051fc vaddr=40846248 size=02b48h ( 11080)
  46. I (381) flash_encrypt: bootloader encrypted successfully
  47. I (396) flash_encrypt: partition table encrypted and loaded successfully
  48. I (397) flash_encrypt: Encrypting partition 1 at offset 0x10000 (length 0x1000)...
  49. I (411) flash_encrypt: Done encrypting
  50. I (412) esp_image: segment 0: paddr=00020020 vaddr=42020020 size=096e0h ( 38624) map
  51. I (423) esp_image: segment 1: paddr=00029708 vaddr=40800000 size=06910h ( 26896)
  52. I (430) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=1b708h (112392) map
  53. I (458) esp_image: segment 3: paddr=0004b730 vaddr=40806910 size=02a08h ( 10760)
  54. I (461) esp_image: segment 4: paddr=0004e140 vaddr=40809320 size=00e5ch ( 3676)
  55. I (464) flash_encrypt: Encrypting partition 2 at offset 0x20000 (length 0x100000)...
  56. I (3600) flash_encrypt: Done encrypting
  57. I (3600) flash_encrypt: Encrypting partition 3 at offset 0x120000 (length 0x1000)...
  58. I (3612) flash_encrypt: Done encrypting
  59. I (3613) efuse: BURN BLOCK0
  60. I (3616) efuse: BURN BLOCK0 - OK (all write block bits are set)
  61. I (3617) flash_encrypt: Flash encryption completed
  62. I (3622) boot: Resetting with flash encryption enabled...
  63. ------
  64. .. already_en_enc
  65. .. code-block:: none
  66. rst:0x3 (LP_SW_HPSYS),boot:0xc (SPI_FAST_FLASH_BOOT)
  67. Saved PC:0x400031a6
  68. SPIWP:0xee
  69. mode:DIO, clock div:1
  70. load:0x4083cfd0,len:0xc0c
  71. load:0x4083efd0,len:0x45c0
  72. load:0x40846248,len:0x2b48
  73. entry 0x4083cfd0
  74. I (27) boot: ESP-IDF v5.1-dev-4270-g4bff4ed6e5 2nd stage bootloader
  75. I (28) boot: compile time Mar 27 2023 16:40:47
  76. I (28) boot: chip revision: v0.0
  77. I (32) boot.esp32h2: SPI Speed : 64MHz
  78. I (37) boot.esp32h2: SPI Mode : DIO
  79. I (41) boot.esp32h2: SPI Flash Size : 2MB
  80. I (46) boot: Enabling RNG early entropy source...
  81. W (51) bootloader_random: bootloader_random_enable() has not been implemented yet
  82. I (60) boot: Partition Table:
  83. I (63) boot: ## Label Usage Type ST Offset Length
  84. I (71) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  85. I (78) boot: 1 storage Unknown data 01 ff 00010000 00001000
  86. I (86) boot: 2 factory factory app 00 00 00020000 00100000
  87. I (93) boot: 3 nvs_key NVS keys 01 04 00120000 00001000
  88. I (100) boot: 4 custom_nvs WiFi data 01 02 00121000 00006000
  89. I (108) boot: End of partition table
  90. I (112) esp_image: segment 0: paddr=00020020 vaddr=42020020 size=096e0h ( 38624) map
  91. I (131) esp_image: segment 1: paddr=00029708 vaddr=40800000 size=06910h ( 26896) load
  92. I (140) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=1b708h (112392) map
  93. I (171) esp_image: segment 3: paddr=0004b730 vaddr=40806910 size=02a08h ( 10760) load
  94. I (175) esp_image: segment 4: paddr=0004e140 vaddr=40809320 size=00e5ch ( 3676) load
  95. I (180) boot: Loaded app from partition at offset 0x20000
  96. I (183) boot: Checking flash encryption...
  97. I (188) flash_encrypt: flash encryption is enabled (1 plaintext flashes left)
  98. I (195) boot: Disabling RNG early entropy source...
  99. W (201) bootloader_random: bootloader_random_disable() has not been implemented yet
  100. I (221) cpu_start: Pro cpu up.
  101. W (229) clk: esp_perip_clk_init() has not been implemented yet
  102. I (236) cpu_start: Pro cpu start user code
  103. I (236) cpu_start: cpu freq: 96000000 Hz
  104. I (237) cpu_start: Application information:
  105. I (239) cpu_start: Project name: flash_encryption
  106. I (245) cpu_start: App version: v5.1-dev-4270-g4bff4ed6e5
  107. I (251) cpu_start: Compile time: Mar 27 2023 16:40:56
  108. I (257) cpu_start: ELF file SHA256: 42c8d825941d8050...
  109. I (263) cpu_start: ESP-IDF: v5.1-dev-4270-g4bff4ed6e5
  110. I (270) cpu_start: Min chip rev: v0.0
  111. I (274) cpu_start: Max chip rev: v0.99
  112. I (279) cpu_start: Chip rev: v0.0
  113. I (284) heap_init: Initializing. RAM available for dynamic allocation:
  114. I (291) heap_init: At 4080B010 len 00042370 (264 KiB): D/IRAM
  115. I (298) heap_init: At 4084D380 len 00002B60 (10 KiB): STACK/DIRAM
  116. I (305) spi_flash: detected chip: generic
  117. I (309) spi_flash: flash io: dio
  118. W (313) spi_flash: Detected size(4096k) larger than the size in the binary image header(2048k). Using the size in the binary image header.
  119. W (326) flash_encrypt: Flash encryption mode is DEVELOPMENT (not secure)
  120. I (334) app_start: Starting scheduler on CPU0
  121. I (339) main_task: Started on CPU0
  122. I (339) main_task: Calling app_main()
  123. Example to check Flash Encryption status
  124. This is esp32h2 chip with 1 CPU core(s), WiFi/BLE, silicon revision v0.0, 2MB external flash
  125. FLASH_CRYPT_CNT eFuse value is 1
  126. Flash encryption feature is enabled in DEVELOPMENT mode
  127. ------