esp32s3_log.inc 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. .. first_boot_enc
  2. .. code-block:: none
  3. ESP-ROM:esp32s3-20210327
  4. Build:Mar 27 2021
  5. rst:0x1 (POWERON),boot:0x8 (SPI_FAST_FLASH_BOOT)
  6. SPIWP:0xee
  7. mode:DIO, clock div:1
  8. load:0x3fcd0270,len:0x2598
  9. load:0x403b6000,len:0x878
  10. load:0x403ba000,len:0x3dd4
  11. entry 0x403b61c0
  12. I (27) boot: ESP-IDF v4.4-dev-2003-g72fdecc1b7-dirty 2nd stage bootloader
  13. I (28) boot: compile time 14:15:37
  14. I (28) boot: chip revision: 0
  15. I (32) boot.esp32s3: SPI Speed : 80MHz
  16. I (36) boot.esp32s3: SPI Mode : DIO
  17. I (41) boot.esp32s3: SPI Flash Size : 2MB
  18. I (46) boot: Enabling RNG early entropy source...
  19. I (58) boot: Partition Table:
  20. I (62) boot: ## Label Usage Type ST Offset Length
  21. I (69) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  22. I (76) boot: 1 storage Unknown data 01 ff 00010000 00001000
  23. I (84) boot: 2 factory factory app 00 00 00020000 00100000
  24. I (91) boot: 3 nvs_key NVS keys 01 04 00120000 00001000
  25. I (99) boot: End of partition table
  26. I (103) esp_image: segment 0: paddr=00020020 vaddr=3c020020 size=08118h ( 33048) map
  27. I (117) esp_image: segment 1: paddr=00028140 vaddr=3fc8fa30 size=023f4h ( 9204) load
  28. I (122) esp_image: segment 2: paddr=0002a53c vaddr=40374000 size=05adch ( 23260) load
  29. I (134) esp_image: segment 3: paddr=00030020 vaddr=42000020 size=1a710h (108304) map
  30. I (156) esp_image: segment 4: paddr=0004a738 vaddr=40379adc size=05f48h ( 24392) load
  31. I (162) esp_image: segment 5: paddr=00050688 vaddr=600fe000 size=00010h ( 16) load
  32. I (167) boot: Loaded app from partition at offset 0x20000
  33. I (168) boot: Checking flash encryption...
  34. I (173) efuse: Batch mode of writing fields is enabled
  35. I (179) flash_encrypt: Generating new flash encryption key...
  36. I (188) efuse: Writing EFUSE_BLK_KEY0 with purpose 4
  37. W (194) flash_encrypt: Not disabling UART bootloader encryption
  38. I (197) flash_encrypt: Disable UART bootloader cache...
  39. I (203) flash_encrypt: Disable JTAG...
  40. I (212) efuse: Batch mode. Prepared fields are committed
  41. I (214) esp_image: segment 0: paddr=00000020 vaddr=3fcd0270 size=02598h ( 9624)
  42. I (223) esp_image: segment 1: paddr=000025c0 vaddr=403b6000 size=00878h ( 2168)
  43. I (230) esp_image: segment 2: paddr=00002e40 vaddr=403ba000 size=03dd4h ( 15828)
  44. I (534) flash_encrypt: bootloader encrypted successfully
  45. I (578) flash_encrypt: partition table encrypted and loaded successfully
  46. I (578) flash_encrypt: Encrypting partition 1 at offset 0x10000 (length 0x1000)...
  47. I (628) flash_encrypt: Done encrypting
  48. I (629) esp_image: segment 0: paddr=00020020 vaddr=3c020020 size=08118h ( 33048) map
  49. I (636) esp_image: segment 1: paddr=00028140 vaddr=3fc8fa30 size=023f4h ( 9204)
  50. I (640) esp_image: segment 2: paddr=0002a53c vaddr=40374000 size=05adch ( 23260)
  51. I (651) esp_image: segment 3: paddr=00030020 vaddr=42000020 size=1a710h (108304) map
  52. I (675) esp_image: segment 4: paddr=0004a738 vaddr=40379adc size=05f48h ( 24392)
  53. I (679) esp_image: segment 5: paddr=00050688 vaddr=600fe000 size=00010h ( 16)
  54. I (680) flash_encrypt: Encrypting partition 2 at offset 0x20000 (length 0x100000)...
  55. I (11571) flash_encrypt: Done encrypting
  56. I (11571) flash_encrypt: Encrypting partition 3 at offset 0x120000 (length 0x1000)...
  57. I (11617) flash_encrypt: Done encrypting
  58. I (11618) flash_encrypt: Flash encryption completed
  59. I (11623) boot: Resetting with flash encryption enabled...
  60. ------
  61. .. already_en_enc
  62. .. code-block:: none
  63. ESP-ROM:esp32s3-20210327
  64. Build:Mar 27 2021
  65. rst:0x3 (RTC_SW_SYS_RST),boot:0x8 (SPI_FAST_FLASH_BOOT)
  66. Saved PC:0x403bb1d6
  67. SPIWP:0xee
  68. mode:DIO, clock div:1
  69. load:0x3fcd0270,len:0x2598
  70. load:0x403b6000,len:0x878
  71. load:0x403ba000,len:0x3dd4
  72. entry 0x403b61c0
  73. I (35) boot: ESP-IDF v4.4-dev-2003-g72fdecc1b7-dirty 2nd stage bootloader
  74. I (35) boot: compile time 14:15:37
  75. I (35) boot: chip revision: 0
  76. I (39) boot.esp32s3: SPI Speed : 80MHz
  77. I (44) boot.esp32s3: SPI Mode : DIO
  78. I (48) boot.esp32s3: SPI Flash Size : 2MB
  79. I (53) boot: Enabling RNG early entropy source...
  80. I (65) boot: Partition Table:
  81. I (69) boot: ## Label Usage Type ST Offset Length
  82. I (76) boot: 0 nvs WiFi data 01 02 0000a000 00006000
  83. I (84) boot: 1 storage Unknown data 01 ff 00010000 00001000
  84. I (91) boot: 2 factory factory app 00 00 00020000 00100000
  85. I (99) boot: 3 nvs_key NVS keys 01 04 00120000 00001000
  86. I (106) boot: End of partition table
  87. I (110) esp_image: segment 0: paddr=00020020 vaddr=3c020020 size=08118h ( 33048) map
  88. I (126) esp_image: segment 1: paddr=00028140 vaddr=3fc8fa30 size=023f4h ( 9204) load
  89. I (129) esp_image: segment 2: paddr=0002a53c vaddr=40374000 size=05adch ( 23260) load
  90. I (141) esp_image: segment 3: paddr=00030020 vaddr=42000020 size=1a710h (108304) map
  91. I (166) esp_image: segment 4: paddr=0004a738 vaddr=40379adc size=05f48h ( 24392) load
  92. I (172) esp_image: segment 5: paddr=00050688 vaddr=600fe000 size=00010h ( 16) load
  93. I (177) boot: Loaded app from partition at offset 0x20000
  94. I (178) boot: Checking flash encryption...
  95. I (183) flash_encrypt: flash encryption is enabled (1 plaintext flashes left)
  96. I (190) boot: Disabling RNG early entropy source...
  97. I (214) cpu_start: Pro cpu up.
  98. I (214) cpu_start: Starting app cpu, entry point is 0x40374fa8
  99. 0x40374fa8: call_start_cpu1 at /home/marius/esp-idf_3/components/esp_system/port/cpu_start.c:160
  100. I (0) cpu_start: App cpu up.
  101. I (228) cpu_start: Pro cpu start user code
  102. I (228) cpu_start: cpu freq: 160000000
  103. I (228) cpu_start: Application information:
  104. I (231) cpu_start: Project name: flash_encryption
  105. I (237) cpu_start: App version: v4.4-dev-2003-g72fdecc1b7-dirty
  106. I (244) cpu_start: Compile time: Jul 12 2021 14:15:34
  107. I (250) cpu_start: ELF file SHA256: a7e6343c6a1c2215...
  108. I (256) cpu_start: ESP-IDF: v4.4-dev-2003-g72fdecc1b7-dirty
  109. I (263) heap_init: Initializing. RAM available for dynamic allocation:
  110. I (270) heap_init: At 3FC92810 len 0004D7F0 (309 KiB): D/IRAM
  111. I (277) heap_init: At 3FCE0000 len 0000EE34 (59 KiB): STACK/DRAM
  112. I (283) heap_init: At 3FCF0000 len 00008000 (32 KiB): DRAM
  113. I (290) spi_flash: detected chip: generic
  114. I (294) spi_flash: flash io: dio
  115. W (298) spi_flash: Detected size(8192k) larger than the size in the binary image header(2048k). Using the size in the binary image header.
  116. I (311) flash_encrypt: Flash encryption mode is DEVELOPMENT (not secure)
  117. I (318) cpu_start: Starting scheduler on PRO CPU.
  118. I (0) cpu_start: Starting scheduler on APP CPU.
  119. Example to check Flash Encryption status
  120. This is esp32s3 chip with 2 CPU core(s), WiFi/BLE, silicon revision 0, 2MB external flash
  121. FLASH_CRYPT_CNT eFuse value is 1
  122. Flash encryption feature is enabled in DEVELOPMENT mode
  123. ------