|
3 | 3 |
|
4 | 4 | .. code-block:: none
|
5 | 5 |
|
6 |
| - TODO |
7 |
| - |
| 6 | + ESP-ROM:esp32s3-20210327 |
| 7 | + Build:Mar 27 2021 |
| 8 | + rst:0x1 (POWERON),boot:0x8 (SPI_FAST_FLASH_BOOT) |
| 9 | + SPIWP:0xee |
| 10 | + mode:DIO, clock div:1 |
| 11 | + load:0x3fcd0270,len:0x2598 |
| 12 | + load:0x403b6000,len:0x878 |
| 13 | + load:0x403ba000,len:0x3dd4 |
| 14 | + entry 0x403b61c0 |
| 15 | + I (27) boot: ESP-IDF v4.4-dev-2003-g72fdecc1b7-dirty 2nd stage bootloader |
| 16 | + I (28) boot: compile time 14:15:37 |
| 17 | + I (28) boot: chip revision: 0 |
| 18 | + I (32) boot.esp32s3: SPI Speed : 80MHz |
| 19 | + I (36) boot.esp32s3: SPI Mode : DIO |
| 20 | + I (41) boot.esp32s3: SPI Flash Size : 2MB |
| 21 | + I (46) boot: Enabling RNG early entropy source... |
| 22 | + I (58) boot: Partition Table: |
| 23 | + I (62) boot: ## Label Usage Type ST Offset Length |
| 24 | + I (69) boot: 0 nvs WiFi data 01 02 0000a000 00006000 |
| 25 | + I (76) boot: 1 storage Unknown data 01 ff 00010000 00001000 |
| 26 | + I (84) boot: 2 factory factory app 00 00 00020000 00100000 |
| 27 | + I (91) boot: 3 nvs_key NVS keys 01 04 00120000 00001000 |
| 28 | + I (99) boot: End of partition table |
| 29 | + I (103) esp_image: segment 0: paddr=00020020 vaddr=3c020020 size=08118h ( 33048) map |
| 30 | + I (117) esp_image: segment 1: paddr=00028140 vaddr=3fc8fa30 size=023f4h ( 9204) load |
| 31 | + I (122) esp_image: segment 2: paddr=0002a53c vaddr=40374000 size=05adch ( 23260) load |
| 32 | + I (134) esp_image: segment 3: paddr=00030020 vaddr=42000020 size=1a710h (108304) map |
| 33 | + I (156) esp_image: segment 4: paddr=0004a738 vaddr=40379adc size=05f48h ( 24392) load |
| 34 | + I (162) esp_image: segment 5: paddr=00050688 vaddr=600fe000 size=00010h ( 16) load |
| 35 | + I (167) boot: Loaded app from partition at offset 0x20000 |
| 36 | + I (168) boot: Checking flash encryption... |
| 37 | + I (173) efuse: Batch mode of writing fields is enabled |
| 38 | + I (179) flash_encrypt: Generating new flash encryption key... |
| 39 | + I (188) efuse: Writing EFUSE_BLK_KEY0 with purpose 4 |
| 40 | + W (194) flash_encrypt: Not disabling UART bootloader encryption |
| 41 | + I (197) flash_encrypt: Disable UART bootloader cache... |
| 42 | + I (203) flash_encrypt: Disable JTAG... |
| 43 | + I (212) efuse: Batch mode. Prepared fields are committed |
| 44 | + I (214) esp_image: segment 0: paddr=00000020 vaddr=3fcd0270 size=02598h ( 9624) |
| 45 | + I (223) esp_image: segment 1: paddr=000025c0 vaddr=403b6000 size=00878h ( 2168) |
| 46 | + I (230) esp_image: segment 2: paddr=00002e40 vaddr=403ba000 size=03dd4h ( 15828) |
| 47 | + I (534) flash_encrypt: bootloader encrypted successfully |
| 48 | + I (578) flash_encrypt: partition table encrypted and loaded successfully |
| 49 | + I (578) flash_encrypt: Encrypting partition 1 at offset 0x10000 (length 0x1000)... |
| 50 | + I (628) flash_encrypt: Done encrypting |
| 51 | + I (629) esp_image: segment 0: paddr=00020020 vaddr=3c020020 size=08118h ( 33048) map |
| 52 | + I (636) esp_image: segment 1: paddr=00028140 vaddr=3fc8fa30 size=023f4h ( 9204) |
| 53 | + I (640) esp_image: segment 2: paddr=0002a53c vaddr=40374000 size=05adch ( 23260) |
| 54 | + I (651) esp_image: segment 3: paddr=00030020 vaddr=42000020 size=1a710h (108304) map |
| 55 | + I (675) esp_image: segment 4: paddr=0004a738 vaddr=40379adc size=05f48h ( 24392) |
| 56 | + I (679) esp_image: segment 5: paddr=00050688 vaddr=600fe000 size=00010h ( 16) |
| 57 | + I (680) flash_encrypt: Encrypting partition 2 at offset 0x20000 (length 0x100000)... |
| 58 | + I (11571) flash_encrypt: Done encrypting |
| 59 | + I (11571) flash_encrypt: Encrypting partition 3 at offset 0x120000 (length 0x1000)... |
| 60 | + I (11617) flash_encrypt: Done encrypting |
| 61 | + I (11618) flash_encrypt: Flash encryption completed |
| 62 | + I (11623) boot: Resetting with flash encryption enabled... |
8 | 63 |
|
9 | 64 | ------
|
10 | 65 |
|
11 | 66 | .. already_en_enc
|
12 | 67 |
|
13 | 68 | .. code-block:: none
|
14 | 69 |
|
15 |
| - TODO |
| 70 | + ESP-ROM:esp32s3-20210327 |
| 71 | + Build:Mar 27 2021 |
| 72 | + rst:0x3 (RTC_SW_SYS_RST),boot:0x8 (SPI_FAST_FLASH_BOOT) |
| 73 | + Saved PC:0x403bb1d6 |
| 74 | + SPIWP:0xee |
| 75 | + mode:DIO, clock div:1 |
| 76 | + load:0x3fcd0270,len:0x2598 |
| 77 | + load:0x403b6000,len:0x878 |
| 78 | + load:0x403ba000,len:0x3dd4 |
| 79 | + entry 0x403b61c0 |
| 80 | + I (35) boot: ESP-IDF v4.4-dev-2003-g72fdecc1b7-dirty 2nd stage bootloader |
| 81 | + I (35) boot: compile time 14:15:37 |
| 82 | + I (35) boot: chip revision: 0 |
| 83 | + I (39) boot.esp32s3: SPI Speed : 80MHz |
| 84 | + I (44) boot.esp32s3: SPI Mode : DIO |
| 85 | + I (48) boot.esp32s3: SPI Flash Size : 2MB |
| 86 | + I (53) boot: Enabling RNG early entropy source... |
| 87 | + I (65) boot: Partition Table: |
| 88 | + I (69) boot: ## Label Usage Type ST Offset Length |
| 89 | + I (76) boot: 0 nvs WiFi data 01 02 0000a000 00006000 |
| 90 | + I (84) boot: 1 storage Unknown data 01 ff 00010000 00001000 |
| 91 | + I (91) boot: 2 factory factory app 00 00 00020000 00100000 |
| 92 | + I (99) boot: 3 nvs_key NVS keys 01 04 00120000 00001000 |
| 93 | + I (106) boot: End of partition table |
| 94 | + I (110) esp_image: segment 0: paddr=00020020 vaddr=3c020020 size=08118h ( 33048) map |
| 95 | + I (126) esp_image: segment 1: paddr=00028140 vaddr=3fc8fa30 size=023f4h ( 9204) load |
| 96 | + I (129) esp_image: segment 2: paddr=0002a53c vaddr=40374000 size=05adch ( 23260) load |
| 97 | + I (141) esp_image: segment 3: paddr=00030020 vaddr=42000020 size=1a710h (108304) map |
| 98 | + I (166) esp_image: segment 4: paddr=0004a738 vaddr=40379adc size=05f48h ( 24392) load |
| 99 | + I (172) esp_image: segment 5: paddr=00050688 vaddr=600fe000 size=00010h ( 16) load |
| 100 | + I (177) boot: Loaded app from partition at offset 0x20000 |
| 101 | + I (178) boot: Checking flash encryption... |
| 102 | + I (183) flash_encrypt: flash encryption is enabled (1 plaintext flashes left) |
| 103 | + I (190) boot: Disabling RNG early entropy source... |
| 104 | + I (214) cpu_start: Pro cpu up. |
| 105 | + I (214) cpu_start: Starting app cpu, entry point is 0x40374fa8 |
| 106 | + 0x40374fa8: call_start_cpu1 at /home/marius/esp-idf_3/components/esp_system/port/cpu_start.c:160 |
| 107 | + |
| 108 | + I (0) cpu_start: App cpu up. |
| 109 | + I (228) cpu_start: Pro cpu start user code |
| 110 | + I (228) cpu_start: cpu freq: 160000000 |
| 111 | + I (228) cpu_start: Application information: |
| 112 | + I (231) cpu_start: Project name: flash_encryption |
| 113 | + I (237) cpu_start: App version: v4.4-dev-2003-g72fdecc1b7-dirty |
| 114 | + I (244) cpu_start: Compile time: Jul 12 2021 14:15:34 |
| 115 | + I (250) cpu_start: ELF file SHA256: a7e6343c6a1c2215... |
| 116 | + I (256) cpu_start: ESP-IDF: v4.4-dev-2003-g72fdecc1b7-dirty |
| 117 | + I (263) heap_init: Initializing. RAM available for dynamic allocation: |
| 118 | + I (270) heap_init: At 3FC92810 len 0004D7F0 (309 KiB): D/IRAM |
| 119 | + I (277) heap_init: At 3FCE0000 len 0000EE34 (59 KiB): STACK/DRAM |
| 120 | + I (283) heap_init: At 3FCF0000 len 00008000 (32 KiB): DRAM |
| 121 | + I (290) spi_flash: detected chip: generic |
| 122 | + I (294) spi_flash: flash io: dio |
| 123 | + W (298) spi_flash: Detected size(8192k) larger than the size in the binary image header(2048k). Using the size in the binary image header. |
| 124 | + I (311) flash_encrypt: Flash encryption mode is DEVELOPMENT (not secure) |
| 125 | + I (318) cpu_start: Starting scheduler on PRO CPU. |
| 126 | + I (0) cpu_start: Starting scheduler on APP CPU. |
| 127 | + |
| 128 | + Example to check Flash Encryption status |
| 129 | + This is esp32s3 chip with 2 CPU core(s), WiFi/BLE, silicon revision 0, 2MB external flash |
| 130 | + FLASH_CRYPT_CNT eFuse value is 1 |
| 131 | + Flash encryption feature is enabled in DEVELOPMENT mode |
16 | 132 |
|
17 | 133 | ------
|
0 commit comments