esp32c3_log.inc 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. .. first_boot_enc
  2. .. code-block:: none
  3. rst:0x1 (POWERON),boot:0xf (SPI_FAST_FLASH_BOOT)
  4. SPIWP:0xee
  5. mode:DIO, clock div:2
  6. load:0x3fcd6260,len:0x1b8
  7. load:0x3fcd6418,len:0x2538
  8. load:0x403ce000,len:0x704
  9. load:0x403d0000,len:0x34f0
  10. entry 0x403ce03e
  11. I (12) boot: ESP-IDF qa-test-v4.3-20201113-766-g870d 2nd stage bootloader
  12. I (13) boot: compile time 12:10:57
  13. I (13) boot: chip revision: 0
  14. I (16) boot.esp32c3: SPI Speed : 40MHz
  15. I (17) boot.esp32c3: SPI Mode : DIO
  16. I (19) boot.esp32c3: SPI Flash Size : 2MB
  17. I (22) boot: Enabling RNG early entropy source...
  18. I (28) boot: Partition Table:
  19. I (30) boot: ## Label Usage Type ST Offset Length
  20. I (33) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  21. I (37) boot: 1 storage Unknown data 01 ff 00010000 00001000
  22. I (41) boot: 2 factory factory app 00 00 00020000 00100000
  23. I (44) boot: End of partition table
  24. I (46) esp_image: segment 0: paddr=0x00020020 vaddr=0x3c020020 size=0x05508 ( 21768) map
  25. I (61) esp_image: segment 1: paddr=0x00025530 vaddr=0x3fc88780 size=0x014cc ( 5324) load
  26. I (64) esp_image: segment 2: paddr=0x00026a04 vaddr=0x40380000 size=0x08780 ( 34688) load
  27. 0x40380000: _vector_table at ??:?
  28. I (81) esp_image: segment 3: paddr=0x0002f18c vaddr=0x00000000 size=0x00e8c ( 3724)
  29. I (84) esp_image: segment 4: paddr=0x00030020 vaddr=0x42000020 size=0x171a8 ( 94632) map
  30. 0x42000020: esp_ota_get_app_description at /home/marius/clean/esp-idf_2/components/app_update/esp_app_desc.c:63
  31. I (132) boot: Loaded app from partition at offset 0x20000
  32. I (133) boot: Checking flash encryption...
  33. I (137) efuse: Batch mode of writing fields is enabled
  34. I (140) flash_encrypt: Generating new flash encryption key...
  35. I (144) efuse: Writing EFUSE_BLK_KEY0 with purpose 4
  36. W (148) flash_encrypt: Not disabling UART bootloader encryption
  37. I (152) flash_encrypt: Disable UART bootloader cache...
  38. I (155) flash_encrypt: Disable JTAG...
  39. I (161) efuse: Batch mode. Prepared fields are committed
  40. I (162) esp_image: segment 0: paddr=0x00000020 vaddr=0x3fcd6260 size=0x001b8 ( 440)
  41. I (164) esp_image: segment 1: paddr=0x000001e0 vaddr=0x3fcd6418 size=0x02538 ( 9528)
  42. I (173) esp_image: segment 2: paddr=0x00002720 vaddr=0x403ce000 size=0x00704 ( 1796)
  43. I (174) esp_image: segment 3: paddr=0x00002e2c vaddr=0x403d0000 size=0x034f0 ( 13552)
  44. I (571) flash_encrypt: bootloader encrypted successfully
  45. I (627) flash_encrypt: partition table encrypted and loaded successfully
  46. I (628) flash_encrypt: Encrypting partition 1 at offset 0x10000 (length 0x1000)...
  47. I (685) flash_encrypt: Done encrypting
  48. I (686) esp_image: segment 0: paddr=0x00020020 vaddr=0x3c020020 size=0x05508 ( 21768) map
  49. I (696) esp_image: segment 1: paddr=0x00025530 vaddr=0x3fc88780 size=0x014cc ( 5324)
  50. I (699) esp_image: segment 2: paddr=0x00026a04 vaddr=0x40380000 size=0x08780 ( 34688)
  51. 0x40380000: _vector_table at ??:?
  52. I (715) esp_image: segment 3: paddr=0x0002f18c vaddr=0x00000000 size=0x00e8c ( 3724)
  53. I (717) esp_image: segment 4: paddr=0x00030020 vaddr=0x42000020 size=0x171a8 ( 94632) map
  54. 0x42000020: esp_ota_get_app_description at /home/marius/clean/esp-idf_2/components/app_update/esp_app_desc.c:63
  55. I (760) flash_encrypt: Encrypting partition 2 at offset 0x20000 (length 0x100000)...
  56. I (14797) flash_encrypt: Done encrypting
  57. I (14801) flash_encrypt: Flash encryption completed
  58. I (14802) boot: Resetting with flash encryption enabled...
  59. ------
  60. .. already_en_enc
  61. .. code-block:: none
  62. rst:0x3 (RTC_SW_SYS_RST),boot:0xf (SPI_FAST_FLASH_BOOT)
  63. Saved PC:0x403d0dde
  64. SPIWP:0xee
  65. mode:DIO, clock div:2
  66. load:0x3fcd6260,len:0x1b8
  67. load:0x3fcd6418,len:0x2538
  68. load:0x403ce000,len:0x704
  69. load:0x403d0000,len:0x34f0
  70. entry 0x403ce03e
  71. I (15) boot: ESP-IDF qa-test-v4.3-20201113-766-g870d 2nd stage bootloader
  72. I (15) boot: compile time 12:10:57
  73. I (16) boot: chip revision: 0
  74. I (19) boot.esp32c3: SPI Speed : 40MHz
  75. I (19) boot.esp32c3: SPI Mode : DIO
  76. I (22) boot.esp32c3: SPI Flash Size : 2MB
  77. I (24) boot: Enabling RNG early entropy source...
  78. I (30) boot: Partition Table:
  79. I (32) boot: ## Label Usage Type ST Offset Length
  80. I (36) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  81. I (39) boot: 1 storage Unknown data 01 ff 00010000 00001000
  82. I (43) boot: 2 factory factory app 00 00 00020000 00100000
  83. I (47) boot: End of partition table
  84. I (49) esp_image: segment 0: paddr=0x00020020 vaddr=0x3c020020 size=0x05508 ( 21768) map
  85. I (64) esp_image: segment 1: paddr=0x00025530 vaddr=0x3fc88780 size=0x014cc ( 5324) load
  86. I (67) esp_image: segment 2: paddr=0x00026a04 vaddr=0x40380000 size=0x08780 ( 34688) load
  87. 0x40380000: _vector_table at ??:?
  88. I (86) esp_image: segment 3: paddr=0x0002f18c vaddr=0x00000000 size=0x00e8c ( 3724)
  89. I (88) esp_image: segment 4: paddr=0x00030020 vaddr=0x42000020 size=0x171a8 ( 94632) map
  90. 0x42000020: esp_ota_get_app_description at /home/marius/clean/esp-idf_2/components/app_update/esp_app_desc.c:63
  91. I (139) boot: Loaded app from partition at offset 0x20000
  92. I (139) boot: Checking flash encryption...
  93. I (144) flash_encrypt: flash encryption is enabled (1 plaintext flashes left)
  94. I (148) boot: Disabling RNG early entropy source...
  95. I (160) cpu_start: Pro cpu start user code
  96. I (160) cpu_start: cpu freq: 40000000
  97. I (161) cpu_start: Application information:
  98. I (161) cpu_start: Project name: flash_encryption
  99. I (164) cpu_start: App version: qa-test-v4.3-20201113-766-g870d
  100. I (168) cpu_start: Compile time: Dec 21 2020 12:10:55
  101. I (171) cpu_start: ELF file SHA256: 209e8947c2e6a6a6...
  102. I (174) cpu_start: ESP-IDF: qa-test-v4.3-20201113-766-g870d
  103. I (178) heap_init: Initializing. RAM available for dynamic allocation:
  104. I (181) heap_init: At 3FC8A9F0 len 00035610 (213 KiB): D/IRAM
  105. I (184) heap_init: At 3FCC0000 len 0001F260 (124 KiB): STACK/DRAM
  106. I (188) heap_init: At 50000000 len 00002000 (8 KiB): FAKEDRAM
  107. W (192) flash_encrypt: Flash encryption mode is DEVELOPMENT (not secure)
  108. I (195) spi_flash: detected chip: gd
  109. I (197) spi_flash: flash io: dio
  110. W (199) spi_flash: Detected size(4096k) larger than the size in the binary image header(2048k). Using the size in the binary image header.
  111. I (207) cpu_start: Starting scheduler.
  112. Example to check Flash Encryption status
  113. This is esp32c3 chip with 1 CPU core(s), WiFi/BLE, silicon revision 0, 2MB external flash
  114. FLASH_CRYPT_CNT eFuse value is 1
  115. Flash encryption feature is enabled in DEVELOPMENT mode
  116. ------