|
3 | 3 |
|
4 | 4 | .. code-block:: none |
5 | 5 |
|
6 | | - To be updated |
| 6 | + rst:0x1 (POWERON),boot:0x1f (SPI_FAST_FLASH_BOOT) |
| 7 | + SPIWP:0xee |
| 8 | + mode:DIO, clock div:2 |
| 9 | + load:0x40842cf0,len:0x27a4 |
| 10 | + load:0x40839580,len:0x944 |
| 11 | + load:0x4083ba78,len:0x3f44 |
| 12 | + entry 0x408395ee |
| 13 | + I (31) boot: ESP-IDF v5.5-dev-1478-gc15e6e1fb66-dirt 2nd stage bootloader |
| 14 | + I (32) boot: compile time Jan 16 2025 12:04:40 |
| 15 | + I (34) boot: chip revision: v0.0 |
| 16 | + I (34) boot: efuse block revision: v0.0 |
| 17 | + I (37) boot.esp32h21: SPI Speed : 32MHz |
| 18 | + I (41) boot.esp32h21: SPI Mode : DIO |
| 19 | + I (45) boot.esp32h21: SPI Flash Size : 4MB |
| 20 | + I (49) boot: Enabling RNG early entropy source... |
| 21 | + I (61) boot: Partition Table: |
| 22 | + I (64) boot: ## Label Usage Type ST Offset Length |
| 23 | + I (70) boot: 0 nvs WiFi data 01 02 0000e000 00006000 |
| 24 | + I (77) boot: 1 storage Unknown data 01 ff 00014000 00001000 |
| 25 | + I (83) boot: 2 factory factory app 00 00 00020000 00100000 |
| 26 | + I (90) boot: 3 nvs_key NVS keys 01 04 00120000 00001000 |
| 27 | + I (96) boot: 4 custom_nvs WiFi data 01 02 00121000 00006000 |
| 28 | + I (103) boot: 5 fat_encrypted Unknown data 01 81 00127000 00096000 |
| 29 | + I (109) boot: 6 fat_not_encr Unknown data 01 81 001bd000 00096000 |
| 30 | + I (116) boot: End of partition table |
| 31 | + I (119) esp_image: segment 0: paddr=00020020 vaddr=42030020 size=0a6e0h ( 42720) map |
| 32 | + I (153) esp_image: segment 1: paddr=0002a708 vaddr=40800000 size=05910h ( 22800) load |
| 33 | + I (165) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=2525ch (152156) map |
| 34 | + I (232) esp_image: segment 3: paddr=00055284 vaddr=40805910 size=0282ch ( 10284) load |
| 35 | + I (239) esp_image: segment 4: paddr=00057ab8 vaddr=40808140 size=00eb8h ( 3768) load |
| 36 | + I (248) boot: Loaded app from partition at offset 0x20000 |
| 37 | + I (249) boot: Checking flash encryption... |
| 38 | + I (250) efuse: Batch mode of writing fields is enabled |
| 39 | + I (251) flash_encrypt: Using pre-loaded flash encryption key in efuse |
| 40 | + W (257) flash_encrypt: Not disabling UART bootloader encryption |
| 41 | + I (263) flash_encrypt: Disable JTAG... |
| 42 | + I (266) efuse: BURN BLOCK0 |
| 43 | + I (271) efuse: BURN BLOCK0 - OK (all write block bits are set) |
| 44 | + I (274) efuse: Batch mode. Prepared fields are committed |
| 45 | + I (279) esp_image: segment 0: paddr=00000020 vaddr=40842cf0 size=027a4h ( 10148) |
| 46 | + I (289) esp_image: segment 1: paddr=000027cc vaddr=40839580 size=00944h ( 2372) |
| 47 | + I (294) esp_image: segment 2: paddr=00003118 vaddr=4083ba78 size=03f44h ( 16196) |
| 48 | + I (924) flash_encrypt: bootloader encrypted successfully |
| 49 | + I (1003) flash_encrypt: partition table encrypted and loaded successfully |
| 50 | + I (1004) flash_encrypt: Encrypting partition 1 at offset 0x14000 (length 0x1000)... |
| 51 | + I (1082) flash_encrypt: Done encrypting |
| 52 | + I (1083) esp_image: segment 0: paddr=00020020 vaddr=42030020 size=0a6e0h ( 42720) map |
| 53 | + I (1103) esp_image: segment 1: paddr=0002a708 vaddr=40800000 size=05910h ( 22800) |
| 54 | + I (1115) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=2525ch (152156) map |
| 55 | + I (1182) esp_image: segment 3: paddr=00055284 vaddr=40805910 size=0282ch ( 10284) |
| 56 | + I (1188) esp_image: segment 4: paddr=00057ab8 vaddr=40808140 size=00eb8h ( 3768) |
| 57 | + I (1192) flash_encrypt: Encrypting partition 2 at offset 0x20000 (length 0x389a0)... |
| 58 | + I (5680) flash_encrypt: Done encrypting |
| 59 | + I (5681) flash_encrypt: Encrypting partition 3 at offset 0x120000 (length 0x1000)... |
| 60 | + I (5755) flash_encrypt: Done encrypting |
| 61 | + I (5756) flash_encrypt: Encrypting partition 5 at offset 0x127000 (length 0x96000)... |
| 62 | + I (14753) flash_encrypt: Done encrypting |
| 63 | + I (14754) efuse: BURN BLOCK0 |
| 64 | + I (14757) efuse: BURN BLOCK0 - OK (all write block bits are set) |
| 65 | + I (14759) flash_encrypt: Flash encryption completed |
| 66 | + I (14760) boot: Resetting with flash encryption enabled... |
7 | 67 |
|
8 | 68 | ------ |
9 | 69 |
|
10 | 70 | .. already_en_enc |
11 | 71 |
|
12 | 72 | .. code-block:: none |
13 | 73 |
|
14 | | - To be updated |
15 | | - |
| 74 | + rst:0x3 (LP_SW_HPSYS),boot:0x1f (SPI_FAST_FLASH_BOOT) |
| 75 | + Saved PC:0x4000321c |
| 76 | + SPIWP:0xee |
| 77 | + mode:DIO, clock div:2 |
| 78 | + load:0x40842cf0,len:0x27a4 |
| 79 | + load:0x40839580,len:0x944 |
| 80 | + load:0x4083ba78,len:0x3f44 |
| 81 | + entry 0x408395ee |
| 82 | + I (36) boot: ESP-IDF v5.5-dev-1478-gc15e6e1fb66-dirt 2nd stage bootloader |
| 83 | + I (37) boot: compile time Jan 16 2025 12:04:40 |
| 84 | + I (38) boot: chip revision: v0.0 |
| 85 | + I (39) boot: efuse block revision: v0.0 |
| 86 | + I (42) boot.esp32h21: SPI Speed : 32MHz |
| 87 | + I (46) boot.esp32h21: SPI Mode : DIO |
| 88 | + I (50) boot.esp32h21: SPI Flash Size : 4MB |
| 89 | + I (53) boot: Enabling RNG early entropy source... |
| 90 | + I (66) boot: Partition Table: |
| 91 | + I (68) boot: ## Label Usage Type ST Offset Length |
| 92 | + I (74) boot: 0 nvs WiFi data 01 02 0000e000 00006000 |
| 93 | + I (81) boot: 1 storage Unknown data 01 ff 00014000 00001000 |
| 94 | + I (87) boot: 2 factory factory app 00 00 00020000 00100000 |
| 95 | + I (94) boot: 3 nvs_key NVS keys 01 04 00120000 00001000 |
| 96 | + I (101) boot: 4 custom_nvs WiFi data 01 02 00121000 00006000 |
| 97 | + I (107) boot: 5 fat_encrypted Unknown data 01 81 00127000 00096000 |
| 98 | + I (114) boot: 6 fat_not_encr Unknown data 01 81 001bd000 00096000 |
| 99 | + I (121) boot: End of partition table |
| 100 | + I (124) esp_image: segment 0: paddr=00020020 vaddr=42030020 size=0a6e0h ( 42720) map |
| 101 | + I (160) esp_image: segment 1: paddr=0002a708 vaddr=40800000 size=05910h ( 22800) load |
| 102 | + I (173) esp_image: segment 2: paddr=00030020 vaddr=42000020 size=2525ch (152156) map |
| 103 | + I (249) esp_image: segment 3: paddr=00055284 vaddr=40805910 size=0282ch ( 10284) load |
| 104 | + I (257) esp_image: segment 4: paddr=00057ab8 vaddr=40808140 size=00eb8h ( 3768) load |
| 105 | + I (266) boot: Loaded app from partition at offset 0x20000 |
| 106 | + I (267) boot: Checking flash encryption... |
| 107 | + I (268) flash_encrypt: flash encryption is enabled (1 plaintext flashes left) |
| 108 | + I (271) boot: Disabling RNG early entropy source... |
| 109 | + I (295) cpu_start: Unicore app |
| 110 | + I (300) cpu_start: Pro cpu start user code |
| 111 | + I (304) cpu_start: cpu freq: 32000000 Hz |
| 112 | + I (307) app_init: Application information: |
| 113 | + I (311) app_init: Project name: flash_encryption |
| 114 | + I (316) app_init: App version: v5.5-dev-1478-gc15e6e1fb66-dirt |
| 115 | + I (322) app_init: Compile time: Jan 16 2025 12:04:30 |
| 116 | + I (327) app_init: ELF file SHA256: ba86ca637... |
| 117 | + I (331) app_init: ESP-IDF: v5.5-dev-1478-gc15e6e1fb66-dirt |
| 118 | + I (337) efuse_init: Min chip rev: v0.0 |
| 119 | + I (341) efuse_init: Max chip rev: v0.99 |
| 120 | + I (345) efuse_init: Chip rev: v0.0 |
| 121 | + I (349) heap_init: Initializing. RAM available for dynamic allocation: |
| 122 | + I (355) heap_init: At 40809F70 len 00043410 (269 KiB): RAM |
| 123 | + I (360) heap_init: At 4084D380 len 00002B60 (10 KiB): RAM |
| 124 | + I (377) spi_flash: detected chip: generic |
| 125 | + I (379) spi_flash: flash io: dio |
| 126 | + W (382) flash_encrypt: Flash encryption mode is DEVELOPMENT (not secure) |
16 | 127 |
|
17 | 128 | ------ |
0 commit comments