esp32c6_log.inc 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141
  1. .. first_boot_enc
  2. .. code-block:: none
  3. rst:0x1 (POWERON),boot:0xc (SPI_FAST_FLASH_BOOT)
  4. SPIWP:0xee
  5. mode:DIO, clock div:2
  6. load:0x4086c410,len:0xd5c
  7. load:0x4086e610,len:0x4584
  8. load:0x40875888,len:0x2bac
  9. entry 0x4086c410
  10. I (25) boot: ESP-IDF v5.1-dev-4270-g4bff4ed6e5-dirty 2nd stage bootloader
  11. I (25) boot: compile time Mar 27 2023 16:48:49
  12. I (27) boot: chip revision: v0.0
  13. I (30) boot.esp32c6: SPI Speed : 40MHz
  14. I (35) boot.esp32c6: SPI Mode : DIO
  15. I (40) boot.esp32c6: SPI Flash Size : 2MB
  16. I (44) boot: Enabling RNG early entropy source...
  17. W (50) bootloader_random: bootloader_random_enable() has not been implemented yet
  18. I (58) boot: Partition Table:
  19. I (62) boot: ## Label Usage Type ST Offset Length
  20. I (69) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  21. I (76) boot: 1 storage Unknown data 01 ff 00010000 00001000
  22. I (84) boot: 2 factory factory app 00 00 00020000 00100000
  23. I (91) boot: 3 nvs_key NVS keys 01 04 00120000 00001000
  24. I (99) boot: 4 custom_nvs WiFi data 01 02 00121000 00006000
  25. I (106) boot: End of partition table
  26. I (110) esp_image: segment 0: paddr=00020020 vaddr=42018020 size=090e8h ( 37096) map
  27. I (126) esp_image: segment 1: paddr=00029110 vaddr=40800000 size=06f08h ( 28424) load
  28. I (134) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=12fd8h ( 77784) map
  29. I (151) esp_image: segment 3: paddr=00043000 vaddr=40806f08 size=03c00h ( 15360) load
  30. I (158) boot: Loaded app from partition at offset 0x20000
  31. I (158) boot: Checking flash encryption...
  32. I (160) efuse: Batch mode of writing fields is enabled
  33. I (165) flash_encrypt: Generating new flash encryption key...
  34. I (174) efuse: Writing EFUSE_BLK_KEY0 with purpose 4
  35. W (178) flash_encrypt: Not disabling UART bootloader encryption
  36. I (184) flash_encrypt: Disable UART bootloader cache...
  37. I (190) flash_encrypt: Disable JTAG...
  38. I (197) efuse: BURN BLOCK4
  39. I (204) efuse: BURN BLOCK4 - OK (write block == read block)
  40. I (206) efuse: BURN BLOCK0
  41. I (212) efuse: BURN BLOCK0 - OK (all write block bits are set)
  42. I (216) efuse: Batch mode. Prepared fields are committed
  43. I (222) esp_image: segment 0: paddr=00000020 vaddr=4086c410 size=00d5ch ( 3420)
  44. I (231) esp_image: segment 1: paddr=00000d84 vaddr=4086e610 size=04584h ( 17796)
  45. I (240) esp_image: segment 2: paddr=00005310 vaddr=40875888 size=02bach ( 11180)
  46. I (632) flash_encrypt: bootloader encrypted successfully
  47. I (679) flash_encrypt: partition table encrypted and loaded successfully
  48. I (680) flash_encrypt: Encrypting partition 1 at offset 0x10000 (length 0x1000)...
  49. I (732) flash_encrypt: Done encrypting
  50. I (732) esp_image: segment 0: paddr=00020020 vaddr=42018020 size=090e8h ( 37096) map
  51. I (741) esp_image: segment 1: paddr=00029110 vaddr=40800000 size=06f08h ( 28424)
  52. I (747) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=12fd8h ( 77784) map
  53. I (765) esp_image: segment 3: paddr=00043000 vaddr=40806f08 size=03c00h ( 15360)
  54. I (769) flash_encrypt: Encrypting partition 2 at offset 0x20000 (length 0x100000)...
  55. I (13025) flash_encrypt: Done encrypting
  56. I (13025) flash_encrypt: Encrypting partition 3 at offset 0x120000 (length 0x1000)...
  57. I (13074) flash_encrypt: Done encrypting
  58. I (13075) efuse: BURN BLOCK0
  59. I (13077) efuse: BURN BLOCK0 - OK (all write block bits are set)
  60. I (13078) flash_encrypt: Flash encryption completed
  61. I (13083) boot: Resetting with flash encryption enabled...
  62. ------
  63. .. already_en_enc
  64. .. code-block:: none
  65. rst:0x3 (LP_SW_HPSYS),boot:0xc (SPI_FAST_FLASH_BOOT)
  66. Saved PC:0x4001974a
  67. SPIWP:0xee
  68. mode:DIO, clock div:2
  69. load:0x4086c410,len:0xd5c
  70. load:0x4086e610,len:0x4584
  71. load:0x40875888,len:0x2bac
  72. entry 0x4086c410
  73. I (24) boot: ESP-IDF v5.1-dev-4270-g4bff4ed6e5-dirty 2nd stage bootloader
  74. I (24) boot: compile time Mar 27 2023 16:48:49
  75. I (25) boot: chip revision: v0.0
  76. I (29) boot.esp32c6: SPI Speed : 40MHz
  77. I (34) boot.esp32c6: SPI Mode : DIO
  78. I (39) boot.esp32c6: SPI Flash Size : 2MB
  79. I (43) boot: Enabling RNG early entropy source...
  80. W (49) bootloader_random: bootloader_random_enable() has not been implemented yet
  81. I (57) boot: Partition Table:
  82. I (60) boot: ## Label Usage Type ST Offset Length
  83. I (68) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  84. I (75) boot: 1 storage Unknown data 01 ff 00010000 00001000
  85. I (83) boot: 2 factory factory app 00 00 00020000 00100000
  86. I (90) boot: 3 nvs_key NVS keys 01 04 00120000 00001000
  87. I (98) boot: 4 custom_nvs WiFi data 01 02 00121000 00006000
  88. I (105) boot: End of partition table
  89. I (109) esp_image: segment 0: paddr=00020020 vaddr=42018020 size=090e8h ( 37096) map
  90. I (126) esp_image: segment 1: paddr=00029110 vaddr=40800000 size=06f08h ( 28424) load
  91. I (134) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=12fd8h ( 77784) map
  92. I (152) esp_image: segment 3: paddr=00043000 vaddr=40806f08 size=03c00h ( 15360) load
  93. I (159) boot: Loaded app from partition at offset 0x20000
  94. I (159) boot: Checking flash encryption...
  95. I (160) flash_encrypt: flash encryption is enabled (1 plaintext flashes left)
  96. I (168) boot: Disabling RNG early entropy source...
  97. W (173) bootloader_random: bootloader_random_enable() has not been implemented yet
  98. I (193) cpu_start: Pro cpu up.
  99. W (202) clk: esp_perip_clk_init() has not been implemented yet
  100. I (208) cpu_start: Pro cpu start user code
  101. I (209) cpu_start: cpu freq: 160000000 Hz
  102. I (209) cpu_start: Application information:
  103. I (211) cpu_start: Project name: flash_encryption
  104. I (217) cpu_start: App version: v5.1-dev-4270-g4bff4ed6e5-dirty
  105. I (224) cpu_start: Compile time: Mar 27 2023 16:49:00
  106. I (230) cpu_start: ELF file SHA256: df1dd35054510e16...
  107. I (236) cpu_start: ESP-IDF: v5.1-dev-4270-g4bff4ed6e5-dirty
  108. I (243) cpu_start: Min chip rev: v0.0
  109. I (248) cpu_start: Max chip rev: v0.99
  110. I (253) cpu_start: Chip rev: v0.0
  111. I (258) heap_init: Initializing. RAM available for dynamic allocation:
  112. I (265) heap_init: At 4080B9E0 len 00070C30 (451 KiB): D/IRAM
  113. I (271) heap_init: At 4087C610 len 00002F54 (11 KiB): STACK/DIRAM
  114. I (278) heap_init: At 50000010 len 00003FF0 (15 KiB): RTCRAM
  115. I (285) spi_flash: detected chip: generic
  116. I (289) spi_flash: flash io: dio
  117. W (293) spi_flash: Detected size(4096k) larger than the size in the binary image header(2048k). Using the size in the binary image header.
  118. W (306) flash_encrypt: Flash encryption mode is DEVELOPMENT (not secure)
  119. I (314) sleep: Configure to isolate all GPIO pins in sleep state
  120. I (320) sleep: Enable automatic switching of GPIO sleep configuration
  121. I (327) coexist: coex firmware version: 5315623
  122. I (333) coexist: coexist rom version 5b8dcfa
  123. I (338) app_start: Starting scheduler on CPU0
  124. I (342) main_task: Started on CPU0
  125. I (342) main_task: Calling app_main()
  126. Example to check Flash Encryption status
  127. This is esp32c6 chip with 1 CPU core(s), WiFi/BLE, silicon revision v0.0, 2MB external flash
  128. FLASH_CRYPT_CNT eFuse value is 1
  129. Flash encryption feature is enabled in DEVELOPMENT mode
  130. ------