-
-
Save nmenon/0b05a556ce8ff91ec070c7c0c0fb62f3 to your computer and use it in GitHub Desktop.
j7200
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
U-Boot SPL 2024.01-rc1-00120-g62fc66b6d228 (Nov 01 2023 - 09:28:29 -0500) | |
SYSFW ABI: 3.1 (firmware rev 0x0009 '9.1.2--v09.01.02 (Kool Koala)') | |
Trying to boot from UART | |
C | |
- 09:31:27 [INFO] Disconnected serial from j7200-evm | |
- 09:31:27 [INFO] Receiving primary bootloader image ... | |
- 09:33:00 [INFO] Connected to j7200-evm via serial | |
- 09:33:00 [INFO] Target: | |
Loaded 981303 bytes | |
Loading Environment from nowhere... OK | |
init_env from device 7 not supported! | |
Starting ATF on ARM64 core... | |
NOTICE: BL31: v2.9.0(debug):v2.9.0-933-ged2d256a68c4 | |
NOTICE: BL31: Built : 09:28:06, Nov 1 2023 | |
INFO: GICv3 without legacy support detected. | |
INFO: ARM GICv3 driver initialized in EL3 | |
INFO: Maximum SPI INTID supported: 991 | |
INFO: SYSFW ABI: 3.1 (firmware rev 0x0009 '9.1.2--v09.01.02 (Kool Koala)') | |
INFO: BL31: Initializing runtime services | |
INFO: BL31: cortex_a72: CPU workaround for erratum 1319367 was applied | |
INFO: BL31: cortex_a72: CPU workaround for CVE 2018_3639 was applied | |
INFO: BL31: cortex_a72: CPU workaround for CVE 2022_23960 was applied | |
INFO: BL31: Initializing BL32 | |
I/TC: | |
I/TC: OP-TEE version: 4.0.0-26-g37f820d63d76 (gcc version 12.3.1 20230626 (Arm GNU Toolchain 12.3.Rel1 (Build arm-12.35))) #1 Wed Nov 1 14:28:12 UTC 2023 aarch64 | |
I/TC: WARNING: This OP-TEE configuration might be insecure! | |
I/TC: WARNING: Please check https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.html | |
I/TC: Primary CPU initializing | |
I/TC: SYSFW ABI: 3.1 (firmware rev 0x0009 '9.1.2--v09.01.02 (Kool Koala)') | |
I/TC: HUK Initialized | |
I/TC: Activated SA2UL device | |
I/TC: Fixing SA2UL firewall owner for GP device | |
I/TC: Enabled firewalls for SA2UL TRNG device | |
I/TC: SA2UL TRNG initialized | |
I/TC: SA2UL Drivers initialized | |
I/TC: Primary CPU switching to normal world boot | |
INFO: BL31: Preparing for EL3 exit to normal world | |
INFO: Entry point address = 0x80080000 | |
INFO: SPSR = 0x3c9 | |
U-Boot SPL 2024.01-rc1-00120-g62fc66b6d228 (Nov 01 2023 - 09:28:36 -0500) | |
SYSFW ABI: 3.1 (firmware rev 0x0009 '9.1.2--v09.01.02 (Kool Koala)') | |
Detected: J7X-BASE-CPB rev E3 | |
Detected: J7X-VSC8514-ETH rev E2 | |
Trying to boot from UART | |
C | |
- 09:33:00 [INFO] Disconnected serial from j7200-evm | |
- 09:33:00 [INFO] Receiving secondary bootloader image ... | |
- 09:35:00 [INFO] Connected to j7200-evm via serial | |
- 09:35:00 [INFO] Host: | |
- 09:35:02 [INFO] Target: | |
Loaded 1182003 bytes | |
U-Boot 2024.01-rc1-00120-g62fc66b6d228 (Nov 01 2023 - 09:28:36 -0500) | |
SoC: J7200 SR2.0 GP | |
Model: Texas Instruments J7200 EVM | |
Board: J7200X-PM2-SOM rev E8 | |
DRAM: 4 GiB | |
Core: 91 devices, 32 uclasses, devicetree: separate | |
Flash: 0 Bytes | |
MMC: mmc@4f80000: 0, mmc@4fb0000: 1 | |
Loading Environment from nowhere... OK | |
In: serial@2800000 | |
Out: serial@2800000 | |
Err: serial@2800000 | |
am65_cpsw_nuss ethernet@46000000: K3 CPSW: nuss_ver: 0x6BA02102 cpsw_ver: 0x6BA82102 ale_ver: 0x00293904 Ports:1 mdio_freq:1000000 | |
Detected: J7X-BASE-CPB rev E3 | |
Detected: J7X-VSC8514-ETH rev E2 | |
Net: eth0: ethernet@46000000port@1 | |
Hit any key to stop autoboot: 2 0 | |
=> | |
=> | |
=> | |
- 09:35:03 [INFO] Disconnected serial from j7200-evm | |
- 09:35:03 [INFO] Connected to j7200-evm via serial | |
- 09:35:03 [INFO] Host: version | |
- 09:35:03 [INFO] Target: | |
version | |
U-Boot 2024.01-rc1-00120-g62fc66b6d228 (Nov 01 2023 - 09:28:36 -0500) | |
aarch64-none-linux-gnu-gcc (Arm GNU Toolchain 12.3.Rel1 (Build arm-12.35)) 12.3.1 20230626 | |
GNU ld (Arm GNU Toolchain 12.3.Rel1 (Build arm-12.35)) 2.40.0.20230627 | |
=> | |
- 09:35:03 [INFO] DUT is able to boot from uart on iteration 0. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
U-Boot SPL 2024.01-rc1-00120-g62fc66b6d228 (Nov 01 2023 - 00:30:45 -0500) | |
SYSFW ABI: 3.1 (firmware rev 0x0009 '9.1.2--v09.01.02 (Kool Koala)') | |
Trying to boot from UART | |
C | |
- 07:12:42 [INFO] Disconnected serial from j7200-evm | |
- 07:12:42 [INFO] Receiving primary bootloader image ... | |
- 07:14:15 [INFO] Connected to j7200-evm via serial | |
- 07:14:18 [ERROR] waiting for (?mi-x:Trying\s*to\s*boot\s*from\s*UART.*) >>> error: execution expired | |
- 07:14:18 [INFO] Target: | |
Loaded 981287 bytes | |
Loading Environment from nowhere... OK | |
init_env from device 7 not supported! | |
Starting ATF on ARM64 core... | |
NOTICE: BL31: v2.9.0(debug):v2.9.0-933-ged2d256a68c4 | |
NOTICE: BL31: Built : 00:29:50, Nov 1 2023 | |
INFO: GICv3 without legacy support detected. | |
INFO: ARM GICv3 driver initialized in EL3 | |
INFO: Maximum SPI INTID supported: 991 | |
INFO: SYSFW ABI: 3.1 (firmware rev 0x0009 '9.1.2--v09.01.02 (Kool Koala)') | |
INFO: BL31: Initializing runtime services | |
INFO: BL31: cortex_a72: CPU workaround for erratum 1319367 was applied | |
INFO: BL31: cortex_a72: CPU workaround for CVE 2018_3639 was applied | |
INFO: BL31: cortex_a72: CPU workaround for CVE 2022_23960 was applied | |
INFO: BL31: Initializing BL32 | |
I/TC: | |
I/TC: OP-TEE version: 4.0.0-24-gf7acc214e712 (gcc version 12.3.1 20230626 (Arm GNU Toolchain 12.3.Rel1 (Build arm-12.35))) #1 Wed Nov 1 05:30:17 UTC 2023 aarch64 | |
I/TC: WARNING: This OP-TEE configuration might be insecure! | |
I/TC: WARNING: Please check https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.html | |
I/TC: Primary CPU initializing | |
E/TC:0 0 k3_sec_proxy_verify_thread:108 Queue is busy | |
E/TC:0 0 k3_sec_proxy_send:134 Thread SEC_PROXY_LOW_PRIORITY_THREAD verification failed. ret = -65523 | |
E/TC:0 0 ti_sci_do_xfer:142 Message sending failed (-65523) | |
E/TC:0 0 ti_sci_init:486 Unable to communicate with control firmware (-65523) | |
E/TC:0 0 call_initcalls:43 Initcall __text_start + 0x0006fd50 failed | |
E/TC:0 0 k3_sec_proxy_verify_thread:108 Queue is busy | |
E/TC:0 0 k3_sec_proxy_send:134 Thread SEC_PROXY_LOW_PRIORITY_THREAD verification failed. ret = -65523 | |
E/TC:0 0 ti_sci_do_xfer:142 Message sending failed (-65523) | |
- 07:14:18 [INFO] Disconnected serial from j7200-evm | |
- 07:14:18 [INFO] Receiving secondary bootloader image ... |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment