完善资料让更多小伙伴认识你,还能领取20积分哦, 立即完善>
看看,感觉flashloader已经已经签名,并且并且成功成功成功到到到到到到,不不转到转,不不知道为什么连接连接不上。我我我使用的的是是是核心板和底板底板底板下载,说明flashloader本身没有问题。打开自动生成的为flashloader签名的bd文件,看不出什么问题,希望寻求帮助。
控制台信息如下: executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- error-status toolStatus: 0 commandOutput: { "command" : "error-status", "response" : [ 4042322160 ], "status" : { "description" : "305411090 (0x12343412) HAB enabled.", "value" : 305411090 } } Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1075790864 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat toolStatus: 0 commandOutput: { "command" : "read-register", "response" : [], "status" : { "description" : "305411090 (0x12343412) HAB enabled.", "value" : 305411090 } } Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1075790880 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat toolStatus: 0 commandOutput: { "command" : "read-register", "response" : [], "status" : { "description" : "305411090 (0x12343412) HAB enabled.", "value" : 305411090 } } Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1074757636 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat toolStatus: 0 commandOutput: { "command" : "read-register", "response" : [], "status" : { "description" : "305411090 (0x12343412) HAB enabled.", "value" : 305411090 } } Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1074757660 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat toolStatus: 0 commandOutput: { "command" : "read-register", "response" : [], "status" : { "description" : "305411090 (0x12343412) HAB enabled.", "value" : 305411090 } } Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1074757660 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat toolStatus: 0 commandOutput: { "command" : "read-register", "response" : [], "status" : { "description" : "305411090 (0x12343412) HAB enabled.", "value" : 305411090 } } D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolselftosb4win>"D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolselftosb4winelftosb.exe" -f imx -V -c "D:AEMBEDrt1052softNXP-MCUBootUtility-mastergenbd_fileimx_flashloader_gen.bd" -o "D:AEMBEDrt1052softNXP-MCUBootUtility-mastergenbootable_imageivt_flashloader_signed.bin" "D:AEMBEDrt1052softNXP-MCUBootUtility-mastersrctargetsMIMXRT1052flashloader.srec" CSF Processed successfully and signed data available in csf.bin Section: 0x14 Section: 0x15 Section: 0x16 Section: 0x18 Section: 0x19 Section: 0x1a Section: 0x1f Section: 0x21 iMX bootable image generated successfully Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- write-file 539001344 D:AEMBEDrt1052softNXP-MCUBootUtility-mastergenbootable_imageivt_flashloader_signed.bin toolStatus: 0 commandOutput: { "command" : "write-file", "response" : [ 3351091 ], "status" : { "description" : "305411090 (0x12343412) HAB enabled.", "value" : 305411090 } } 自动生成的bd文件如下 options { flags = 0x08; startAddress = 0x20208200; ivtOffset = 0x0; initialLoadSize = 0x200; entryPointAddress = 0x2021b26d; } sources { elfFile = extern(0); } constants { SEC_CSF_HEADER = 20; SEC_CSF_INSTALL_SRK = 21; SEC_CSF_INSTALL_CSFK = 22; SEC_CSF_INSTALL_NOCAK = 23; SEC_CSF_AUTHENTICATE_CSF = 24; SEC_CSF_INSTALL_KEY = 25; SEC_CSF_AUTHENTICATE_DATA = 26; SEC_CSF_INSTALL_SECRET_KEY = 27; SEC_CSF_DECRYPT_DATA = 28; SEC_NOP = 29; SEC_SET_MID = 30; SEC_SET_ENGINE = 31; SEC_INIT = 32; SEC_UNLOCK = 33; } section (SEC_CSF_HEADER; Header_Version="4.2", Header_HashAlgorithm="sha256", Header_Engine="DCP", Header_EngineConfiguration=0, Header_CertificateFormat="x509", Header_SignatureFormat="CMS" ) { } section (SEC_CSF_INSTALL_SRK; InstallSRK_Table="../../../gen/hab_cert/SRK_1_2_3_4_table.bin", InstallSRK_SourceIndex=0 ) { } section (SEC_CSF_INSTALL_CSFK; InstallCSFK_File="../../cst/crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem", InstallCSFK_CertificateFormat="x509" ) { } section (SEC_CSF_AUTHENTICATE_CSF) { } section (SEC_CSF_INSTALL_KEY; InstallKey_File="../../cst/crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem", InstallKey_VerificationIndex=0, InstallKey_TargetIndex=2) { } section (SEC_CSF_AUTHENTICATE_DATA; AuthenticateData_VerificationIndex=2, AuthenticateData_Engine="DCP", AuthenticateData_EngineConfiguration=0) { } section (SEC_SET_ENGINE; SetEngine_HashAlgorithm = "sha256", SetEngine_Engine = "DCP", SetEngine_EngineConfiguration = "0") { } section (SEC_UNLOCK; Unlock_Engine = "SNVS", Unlock_features = "ZMK WRITE" ) { } nxp-mcu bootutility报错截图如下: 但实际上,按键配置的是BMOD[1:0]=2'b01(串口下载器) 比较多的时候,启动模式会识别别成BMOD[1:0]=2'b00(从保险丝启动) 很少时候会是BMOD[1:0]=2'b10(内部引导) 然而后来知道别到的UUID看起也是不正常的 非常奇怪,从不会把启动模式识别为BMOD[1:0]=2'b01(串口下载器) ps:换成没有配置HAB的核心板,每次都能正确识别为BMOD[1:0]=2'b01(串口下载器) |
|
相关推荐
|
|
只有小组成员才能发言,加入小组>>
1935个成员聚集在这个小组
加入小组我的项目我做主,使用GN+Ninja来完成构建系统(VSCode开发RT106X)
36430 浏览 0 评论
NXP IMX8应用处理器快速入门必备:技巧、使用、设计指南
5023 浏览 1 评论
6115 浏览 1 评论
6822 浏览 0 评论
NXP i.MX6UL开发板(linux系统烧录+规格+硬件+模块移植)使用手册
4254 浏览 0 评论
655浏览 2评论
求助,S32G上Core M启动后如何让Core A在Flash指定位置加载uboot?
646浏览 2评论
ESP32-WROVER-IE + LAN8720以太网,GPIO0电压只有1.6v,无法正常进入spi flash boot模式如何解决?
647浏览 2评论
求分享适用于PN7160 Android的NFC工厂测试应用程序
737浏览 2评论
850浏览 2评论
小黑屋| 手机版| Archiver| 电子发烧友 ( 湘ICP备2023018690号 )
GMT+8, 2024-12-28 17:29 , Processed in 1.131367 second(s), Total 74, Slave 58 queries .
Powered by 电子发烧友网
© 2015 bbs.elecfans.com
关注我们的微信
下载发烧友APP
电子发烧友观察
版权所有 © 湖南华秋数字科技有限公司
电子发烧友 (电路图) 湘公网安备 43011202000918 号 电信与信息服务业务经营许可证:合字B2-20210191 工商网监 湘ICP备2023018690号