Firefly开源社区

12
发表新贴
打印 上一主题 下一主题

更新固件后,烧录自己编译kernel,板子无限重启,”Rockusb Device”无法识别。

23

积分

0

威望

0

贡献

技术小白

积分
23

更新固件后,烧录自己编译kernel,板子无限重启,”Rockusb Device”无法识别。

发表于 2019-7-2 11:03:33      浏览:17122 | 回复:11        打印      只看该作者   [复制链接] 楼主
1.”Rockusb Device”无法识别是电脑驱动问题,还是板子问题?
2.此时能不能强行进入maskrom模式?

板子无限重启,打印如下:
  1. DDR Version 1.19 20190305
  2. In
  3. Channel 0: DDR3, 800MHz
  4. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  5. Channel 1: DDR3, 800MHz
  6. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  7. 256B stride
  8. ch 0 ddrconfig = 0x101, ddrsize = 0x2020
  9. ch 1 ddrconfig = 0x101, ddrsize = 0x2020
  10. pmugrf_os_reg[2] = 0x3AA17AA1, stride = 0xD
  11. OUT
  12. Boot1: 2019-03-14, version: 1.19
  13. CPUId = 0x0
  14. ChipType = 0x10, 231
  15. SdmmcInit=2 0
  16. BootCapSize=100000
  17. UserCapSize=119276MB
  18. FwPartOffset=2000 , 100000
  19. mmc0:cmd8,20
  20. mmc0:cmd5,20
  21. mmc0:cmd55,20
  22. mmc0:cmd1,20
  23. mmc0:cmd8,20
  24. mmc0:cmd5,20
  25. mmc0:cmd55,20
  26. mmc0:cmd1,20
  27. mmc0:cmd8,20
  28. mmc0:cmd5,20
  29. mmc0:cmd55,20
  30. mmc0:cmd1,20
  31. SdmmcInit=0 1
  32. StorageInit ok = 67347
  33. SecureMode = 0
  34. SecureInit read PBA: 0x4
  35. SecureInit read PBA: 0x404
  36. SecureInit read PBA: 0x804
  37. SecureInit read PBA: 0xc04
  38. SecureInit read PBA: 0x1004
  39. SecureInit read PBA: 0x1404
  40. SecureInit read PBA: 0x1804
  41. SecureInit read PBA: 0x1c04
  42. SecureInit ret = 0, SecureMode = 0
  43. atags_set_bootdev: ret:(0)
  44. GPT part:  0, name:            uboot, start:0x4000, size:0x2000
  45. GPT part:  1, name:            trust, start:0x6000, size:0x2000
  46. GPT part:  2, name:             boot, start:0xa000, size:0x10000
  47. GPT part:  3, name:           backup, start:0x2a000, size:0x10000
  48. GPT part:  4, name:           rootfs, start:0x5a000, size:0xe89bfdf
  49. find part:uboot OK. first_lba:0x4000.
  50. find part:trust OK. first_lba:0x6000.
  51. LoadTrust Addr:0x6000
  52. No find bl30.bin
  53. Load uboot, ReadLba = 4000
  54. Load OK, addr=0x200000, size=0xd6fac
  55. RunBL31 0x10000
  56. NOTICE:  BL31: v1.3(debug):370ab80
  57. NOTICE:  BL31: Built : 09:23:41, Mar  4 2019
  58. NOTICE:  BL31: Rockchip release version: v1.1
  59. INFO:    GICv3 with legacy support detected. ARM GICV3 driver initialized in EL3
  60. INFO:    Using opteed sec cpu_context!
  61. INFO:    boot cpu mask: 0
  62. INFO:    plat_rockchip_pmu_init(1181): pd status 3e
  63. INFO:    BL31: Initializing runtime services
  64. INFO:    BL31: Initializing BL32
  65. INF [0x0] TEE-CORE:init_primary_helper:337: Initializing (1.1.0-195-g8f090d20 #6 Fri Dec  7 06:11:20 UTC 2018 aarch64)

  66. INF [0x0] TEE-CORE:init_primary_helper:338: Release version: 1.2

  67. INF [0x0] TEE-CORE:init_teecore:83: teecore inits done
  68. INFO:    BL31: Preparing for EL3 exit to normal world
  69. INFO:    Entry point address = 0x200000
  70. INFO:    SPSR = 0x3c9


  71. U-Boot 2017.09-02577-g0b1f585 (Apr 03 2019 - 10:12:37 +0800)

  72. Model: Firefly-RK3399 Board
  73. PreSerial: 2
  74. DRAM:  3.8 GiB
  75. Relocation Offset is: f5bee000
  76. Sysmem: init
  77. Using default environment

  78. dwmmc@fe320000: 1, sdhci@fe330000: 0
  79. Bootdev(atags): mmc 0
  80. PartType: EFI
  81. get part misc fail -1
  82. boot mode: None
  83. bad resource image magic:
  84. DTB: rk-kernel.dtb
  85. invalid entry tag
  86. invalid entry tag
  87. invalid entry tag
  88. invalid entry tag
  89. invalid entry tag
  90. invalid entry tag
  91. invalid entry tag
  92. invalid entry tag
  93. "Synchronous Abort" handler, esr 0x96000010
  94. * Relocate offset = 00000000f5bee000
  95. * ELR(PC)    =   000000000028407c
  96. * LR         =   0000000000203a8c
  97. * SP         =   00000000e9de2020

  98. * ESR_EL2    =   0000000096000010
  99.         EC[31:26] == 100101, Exception from a Data abort, from current exception level
  100.         IL[25] == 1, 32-bit instruction trapped

  101. * DAIF       =   00000000000003c0
  102.         D[9] == 1, DBG masked
  103.         A[8] == 1, ABORT masked
  104.         I[7] == 1, IRQ masked
  105.         F[6] == 1, FIQ masked

  106. * SPSR_EL2   =   0000000020000349
  107.         D[9] == 1, DBG masked
  108.         A[8] == 1, ABORT masked
  109.         I[7] == 0, IRQ not masked
  110.         F[6] == 1, FIQ masked
  111.         M[4] == 0, Exception taken from AArch64
  112.         M[3:0] == 1001, EL2h

  113. * SCTLR_EL2  =   0000000030c51835
  114.         I[12] == 1, Icaches enabled
  115.         C[2] == 1, Dcache enabled
  116.         M[0] == 1, MMU enabled

  117. * HCR_EL2    =   000000000800003a
  118. * VBAR_EL2   =   00000000f5dee800
  119. * TTBR0_EL2  =   00000000f7ff0000

  120. x0 : 000000000841e600 x1 : 00000000f5e8fb8e
  121. x2 : 0000000000000004 x3 : 00000000ff1a0000
  122. x4 : 0000000000000000 x5 : 0000000000000004
  123. x6 : 000000000841e600 x7 : 00000000f5ea7f40
  124. x8 : 00000000e9de20c0 x9 : 0000000000000008
  125. x10: 00000000ffffffd8 x11: 0000000000000006
  126. x12: 000000000001869f x13: 0000000000000200
  127. x14: 00000000e9de2418 x15: 0000000000000002
  128. x16: 0000000000000000 x17: 0000000000000000
  129. x18: 00000000e9de5d98 x19: 00000000f5ea5000
  130. x20: 0000000008300000 x21: 000000000841e600
  131. x22: 0000000000000000 x23: 000000000001f600
  132. x24: 0000000008300000 x25: 00000000f5ec2000
  133. x26: 0000000000000000 x27: 0000000000000000
  134. x28: 0000000000000000 x29: 00000000e9de2200

  135. SP:
  136. e9de2020:  00000000 00000000 00000000 00000000
  137. e9de2030:  00000000 00000000 f5e9be9f 00000000
  138. e9de2040:  00000000 00000000 00000000 00000000
  139. e9de2050:  f5e9bee6 00000000 f5e9bf0c 00000000
  140. e9de2060:  f5e9bf59 00000000 f5e9bfa6 00000000
  141. e9de2070:  f5e9bfe6 00000000 f5e9c026 00000000
  142. e9de2080:  f5e9c063 00000000 00000000 00000000
  143. e9de2090:  00000000 00000000 f5e9c0a0 00000000
  144. e9de20a0:  e9de2200 00000000 f5deea0c 00000000
  145. e9de20b0:  f5ea5000 00000000 08300000 00000000
  146. e9de20c0:  f7ff0000 00000000 0800003a 00000000
  147. e9de20d0:  30c51835 00000000 e9de2020 00000000
  148. e9de20e0:  20000349 00000000 f5dee800 00000000
  149. e9de20f0:  000003c0 00000000 96000010 00000000
  150. e9de2100:  f5e7207c 00000000 0841e600 00000000
  151. e9de2110:  f5e8fb8e 00000000 00000004 00000000

  152. Resetting CPU ...

  153. WAR▒DDR Version 1.19 20190305
  154. In
  155. soft reset
  156. SRX
  157. Channel 0: DDR3, 800MHz
  158. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  159. Channel 1: DDR3, 800MHz
  160. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  161. 256B stride
  162. ch 0 ddrconfig = 0x101, ddrsize = 0x2020
  163. ch 1 ddrconfig = 0x101, ddrsize = 0x2020
  164. pmugrf_os_reg[2] = 0x3AA17AA1, stride = 0xD
  165. OUT
  166. Boot1: 2019-03-14, version: 1.19
  167. CPUId = 0x0
  168. ChipType = 0x10, 293
  169. SdmmcInit=2 0
  170. BootCapSize=100000
  171. UserCapSize=119276MB
  172. FwPartOffset=2000 , 100000
  173. mmc0:cmd8,20
  174. mmc0:cmd5,20
  175. mmc0:cmd55,20
  176. mmc0:cmd1,20
  177. mmc0:cmd8,20
  178. mmc0:cmd5,20
  179. mmc0:cmd55,20
  180. mmc0:cmd1,20
  181. mmc0:cmd8,20
  182. mmc0:cmd5,20
  183. mmc0:cmd55,20
  184. mmc0:cmd1,20
  185. SdmmcInit=0 1
  186. StorageInit ok = 67846
  187. SecureMode = 0
  188. SecureInit read PBA: 0x4
  189. SecureInit read PBA: 0x404
  190. SecureInit read PBA: 0x804
  191. SecureInit read PBA: 0xc04
  192. SecureInit read PBA: 0x1004
  193. SecureInit read PBA: 0x1404
  194. SecureInit read PBA: 0x1804
  195. SecureInit read PBA: 0x1c04
  196. SecureInit ret = 0, SecureMode = 0
  197. atags_set_bootdev: ret:(0)
  198. GPT part:  0, name:            uboot, start:0x4000, size:0x2000
  199. GPT part:  1, name:            trust, start:0x6000, size:0x2000
  200. GPT part:  2, name:             boot, start:0xa000, size:0x10000
  201. GPT part:  3, name:           backup, start:0x2a000, size:0x10000
  202. GPT part:  4, name:           rootfs, start:0x5a000, size:0xe89bfdf
  203. find part:uboot OK. first_lba:0x4000.
  204. find part:trust OK. first_lba:0x6000.
  205. LoadTrust Addr:0x6000
  206. No find bl30.bin
  207. Load uboot, ReadLba = 4000
  208. Load OK, addr=0x200000, size=0xd6fac
  209. RunBL31 0x10000
  210. NOTICE:  BL31: v1.3(debug):370ab80
  211. NOTICE:  BL31: Built : 09:23:41, Mar  4 2019
  212. NOTICE:  BL31: Rockchip release version: v1.1
  213. INFO:    GICv3 with legacy support detected. ARM GICV3 driver initialized in EL3
  214. INFO:    Using opteed sec cpu_context!
  215. INFO:    boot cpu mask: 0
  216. INFO:    plat_rockchip_pmu_init(1181): pd status 3e
  217. INFO:    BL31: Initializing runtime services
  218. INFO:    BL31: Initializing BL32
  219. INF [0x0] TEE-CORE:init_primary_helper:337: Initializing (1.1.0-195-g8f090d20 #6 Fri Dec  7 06:11:20 UTC 2018 aarch64)

  220. INF [0x0] TEE-CORE:init_primary_helper:338: Release version: 1.2

  221. INF [0x0] TEE-CORE:init_teecore:83: teecore inits done
  222. INFO:    BL31: Preparing for EL3 exit to normal world
  223. INFO:    Entry point address = 0x200000
  224. INFO:    SPSR = 0x3c9


  225. U-Boot 2017.09-02577-g0b1f585 (Apr 03 2019 - 10:12:37 +0800)

  226. Model: Firefly-RK3399 Board
  227. PreSerial: 2
  228. DRAM:  3.8 GiB
  229. Relocation Offset is: f5bee000
  230. Sysmem: init
  231. Using default environment

  232. dwmmc@fe320000: 1, sdhci@fe330000: 0
  233. Bootdev(atags): mmc 0
  234. PartType: EFI
  235. get part misc fail -1
  236. boot mode: normal
  237. bad resource image magic:
  238. DTB: rk-kernel.dtb
  239. invalid entry tag
  240. invalid entry tag
  241. invalid entry tag
  242. invalid entry tag
  243. invalid entry tag
  244. invalid entry tag
  245. invalid entry tag
  246. invalid entry tag
  247. "Synchronous Abort" handler, esr 0x96000010
  248. * Relocate offset = 00000000f5bee000
  249. * ELR(PC)    =   000000000028407c
  250. * LR         =   0000000000203a8c
  251. * SP         =   00000000e9de2020

  252. * ESR_EL2    =   0000000096000010
  253.         EC[31:26] == 100101, Exception from a Data abort, from current exception level
  254.         IL[25] == 1, 32-bit instruction trapped

  255. * DAIF       =   00000000000003c0
  256.         D[9] == 1, DBG masked
  257.         A[8] == 1, ABORT masked
  258.         I[7] == 1, IRQ masked
  259.         F[6] == 1, FIQ masked

  260. * SPSR_EL2   =   0000000020000349
  261.         D[9] == 1, DBG masked
  262.         A[8] == 1, ABORT masked
  263.         I[7] == 0, IRQ not masked
  264.         F[6] == 1, FIQ masked
  265.         M[4] == 0, Exception taken from AArch64
  266.         M[3:0] == 1001, EL2h

  267. * SCTLR_EL2  =   0000000030c51835
  268.         I[12] == 1, Icaches enabled
  269.         C[2] == 1, Dcache enabled
  270.         M[0] == 1, MMU enabled

  271. * HCR_EL2    =   000000000800003a
  272. * VBAR_EL2   =   00000000f5dee800
  273. * TTBR0_EL2  =   00000000f7ff0000

  274. x0 : 000000000841e600 x1 : 00000000f5e8fb8e
  275. x2 : 0000000000000004 x3 : 00000000ff1a0000
  276. x4 : 0000000000000000 x5 : 0000000000000004
  277. x6 : 000000000841e600 x7 : 00000000f5ea7f40
  278. x8 : 00000000e9de20c0 x9 : 0000000000000008
  279. x10: 00000000ffffffd8 x11: 0000000000000006
  280. x12: 000000000001869f x13: 0000000000000200
  281. x14: 00000000e9de2418 x15: 0000000000000002
  282. x16: 0000000000000000 x17: 0000000000000000
  283. x18: 00000000e9de5d98 x19: 00000000f5ea5000
  284. x20: 0000000008300000 x21: 000000000841e600
  285. x22: 0000000000000000 x23: 000000000001f600
  286. x24: 0000000008300000 x25: 00000000f5ec2000
  287. x26: 0000000000000000 x27: 0000000000000000
  288. x28: 0000000000000000 x29: 00000000e9de2200

  289. SP:
  290. e9de2020:  00000000 00000000 00000000 00000000
  291. e9de2030:  00000000 00000000 f5e9be9f 00000000
  292. e9de2040:  00000000 00000000 00000000 00000000
  293. e9de2050:  f5e9bee6 00000000 f5e9bf0c 00000000
  294. e9de2060:  f5e9bf59 00000000 f5e9bfa6 00000000
  295. e9de2070:  f5e9bfe6 00000000 f5e9c026 00000000
  296. e9de2080:  f5e9c063 00000000 00000000 00000000
  297. e9de2090:  00000000 00000000 f5e9c0a0 00000000
  298. e9de20a0:  e9de2200 00000000 f5deea0c 00000000
  299. e9de20b0:  f5ea5000 00000000 08300000 00000000
  300. e9de20c0:  f7ff0000 00000000 0800003a 00000000
  301. e9de20d0:  30c51835 00000000 e9de2020 00000000
  302. e9de20e0:  20000349 00000000 f5dee800 00000000
  303. e9de20f0:  000003c0 00000000 96000010 00000000
  304. e9de2100:  f5e7207c 00000000 0841e600 00000000
  305. e9de2110:  f5e8fb8e 00000000 00000004 00000000

  306. Resetting CPU ...

  307. WAR▒DDR Version 1.19 20190305
  308. In
  309. soft reset
  310. SRX
  311. Channel 0: DDR3, 800MHz
  312. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  313. Channel 1: DDR3, 800MHz
  314. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  315. 256B stride
  316. ch 0 ddrconfig = 0x101, ddrsize = 0x2020
  317. ch 1 ddrconfig = 0x101, ddrsize = 0x2020
  318. pmugrf_os_reg[2] = 0x3AA17AA1, stride = 0xD
  319. OUT
  320. Boot1: 2019-03-14, version: 1.19
  321. CPUId = 0x0
  322. ChipType = 0x10, 292
  323. SdmmcInit=2 0
  324. BootCapSize=100000
  325. UserCapSize=119276MB
  326. FwPartOffset=2000 , 100000
  327. mmc0:cmd8,20
  328. mmc0:cmd5,20
  329. mmc0:cmd55,20
  330. mmc0:cmd1,20
  331. mmc0:cmd8,20
  332. mmc0:cmd5,20
  333. mmc0:cmd55,20
  334. mmc0:cmd1,20
  335. mmc0:cmd8,20
  336. mmc0:cmd5,20
  337. mmc0:cmd55,20
  338. mmc0:cmd1,20
  339. SdmmcInit=0 1
  340. StorageInit ok = 67906
  341. SecureMode = 0
  342. SecureInit read PBA: 0x4
  343. SecureInit read PBA: 0x404
  344. SecureInit read PBA: 0x804
  345. SecureInit read PBA: 0xc04
  346. SecureInit read PBA: 0x1004
  347. SecureInit read PBA: 0x1404
  348. SecureInit read PBA: 0x1804
  349. SecureInit read PBA: 0x1c04
  350. SecureInit ret = 0, SecureMode = 0
  351. atags_set_bootdev: ret:(0)
  352. GPT part:  0, name:            uboot, start:0x4000, size:0x2000
  353. GPT part:  1, name:            trust, start:0x6000, size:0x2000
  354. GPT part:  2, name:             boot, start:0xa000, size:0x10000
  355. GPT part:  3, name:           backup, start:0x2a000, size:0x10000
  356. GPT part:  4, name:           rootfs, start:0x5a000, size:0xe89bfdf
  357. find part:uboot OK. first_lba:0x4000.
  358. find part:trust OK. first_lba:0x6000.
  359. LoadTrust Addr:0x6000
  360. No find bl30.bin
  361. Load uboot, ReadLba = 4000
  362. Load OK, addr=0x200000, size=0xd6fac
  363. RunBL31 0x10000
  364. NOTICE:  BL31: v1.3(debug):370ab80
  365. NOTICE:  BL31: Built : 09:23:41, Mar  4 2019
  366. NOTICE:  BL31: Rockchip release version: v1.1
  367. INFO:    GICv3 with legacy support detected. ARM GICV3 driver initialized in EL3
  368. INFO:    Using opteed sec cpu_context!
  369. INFO:    boot cpu mask: 0
  370. INFO:    plat_rockchip_pmu_init(1181): pd status 3e
  371. INFO:    BL31: Initializing runtime services
  372. INFO:    BL31: Initializing BL32
  373. INF [0x0] TEE-CORE:init_primary_helper:337: Initializing (1.1.0-195-g8f090d20 #6 Fri Dec  7 06:11:20 UTC 2018 aarch64)

  374. INF [0x0] TEE-CORE:init_primary_helper:338: Release version: 1.2

  375. INF [0x0] TEE-CORE:init_teecore:83: teecore inits done
  376. INFO:    BL31: Preparing for EL3 exit to normal world
  377. INFO:    Entry point address = 0x200000
  378. INFO:    SPSR = 0x3c9


  379. U-Boot 2017.09-02577-g0b1f585 (Apr 03 2019 - 10:12:37 +0800)

  380. Model: Firefly-RK3399 Board
  381. PreSerial: 2
  382. DRAM:  3.8 GiB
  383. Relocation Offset is: f5bee000
  384. Sysmem: init
  385. Using default environment

  386. dwmmc@fe320000: 1, sdhci@fe330000: 0
  387. Bootdev(atags): mmc 0
  388. PartType: EFI
  389. get part misc fail -1
  390. boot mode: normal
  391. bad resource image magic:
  392. DTB: rk-kernel.dtb
  393. invalid entry tag
  394. invalid entry tag
  395. invalid entry tag
  396. invalid entry tag
  397. invalid entry tag
  398. invalid entry tag
  399. invalid entry tag
  400. invalid entry tag
  401. "Synchronous Abort" handler, esr 0x96000010
  402. * Relocate offset = 00000000f5bee000
  403. * ELR(PC)    =   000000000028407c
  404. * LR         =   0000000000203a8c
  405. * SP         =   00000000e9de2020

  406. * ESR_EL2    =   0000000096000010
  407.         EC[31:26] == 100101, Exception from a Data abort, from current exception level
  408.         IL[25] == 1, 32-bit instruction trapped

  409. * DAIF       =   00000000000003c0
  410.         D[9] == 1, DBG masked
  411.         A[8] == 1, ABORT masked
  412.         I[7] == 1, IRQ masked
  413.         F[6] == 1, FIQ masked

  414. * SPSR_EL2   =   0000000020000349
  415.         D[9] == 1, DBG masked
  416.         A[8] == 1, ABORT masked
  417.         I[7] == 0, IRQ not masked
  418.         F[6] == 1, FIQ masked
  419.         M[4] == 0, Exception taken from AArch64
  420.         M[3:0] == 1001, EL2h

  421. * SCTLR_EL2  =   0000000030c51835
  422.         I[12] == 1, Icaches enabled
  423.         C[2] == 1, Dcache enabled
  424.         M[0] == 1, MMU enabled

  425. * HCR_EL2    =   000000000800003a
  426. * VBAR_EL2   =   00000000f5dee800
  427. * TTBR0_EL2  =   00000000f7ff0000

  428. x0 : 000000000841e600 x1 : 00000000f5e8fb8e
  429. x2 : 0000000000000004 x3 : 00000000ff1a0000
  430. x4 : 0000000000000000 x5 : 0000000000000004
  431. x6 : 000000000841e600 x7 : 00000000f5ea7f40
  432. x8 : 00000000e9de20c0 x9 : 0000000000000008
  433. x10: 00000000ffffffd8 x11: 0000000000000006
  434. x12: 000000000001869f x13: 0000000000000200
  435. x14: 00000000e9de2418 x15: 0000000000000002
  436. x16: 0000000000000000 x17: 0000000000000000
  437. x18: 00000000e9de5d98 x19: 00000000f5ea5000
  438. x20: 0000000008300000 x21: 000000000841e600
  439. x22: 0000000000000000 x23: 000000000001f600
  440. x24: 0000000008300000 x25: 00000000f5ec2000
  441. x26: 0000000000000000 x27: 0000000000000000
  442. x28: 0000000000000000 x29: 00000000e9de2200

  443. SP:
  444. e9de2020:  00000000 00000000 00000000 00000000
  445. e9de2030:  00000000 00000000 f5e9be9f 00000000
  446. e9de2040:  00000000 00000000 00000000 00000000
  447. e9de2050:  f5e9bee6 00000000 f5e9bf0c 00000000
  448. e9de2060:  f5e9bf59 00000000 f5e9bfa6 00000000
  449. e9de2070:  f5e9bfe6 00000000 f5e9c026 00000000
  450. e9de2080:  f5e9c063 00000000 00000000 00000000
  451. e9de2090:  00000000 00000000 f5e9c0a0 00000000
  452. e9de20a0:  e9de2200 00000000 f5deea0c 00000000
  453. e9de20b0:  f5ea5000 00000000 08300000 00000000
  454. e9de20c0:  f7ff0000 00000000 0800003a 00000000
  455. e9de20d0:  30c51835 00000000 e9de2020 00000000
  456. e9de20e0:  20000349 00000000 f5dee800 00000000
  457. e9de20f0:  000003c0 00000000 96000010 00000000
  458. e9de2100:  f5e7207c 00000000 0841e600 00000000
  459. e9de2110:  f5e8fb8e 00000000 00000004 00000000

  460. Resetting CPU ...

  461. WAR▒DDR Version 1.19 20190305
  462. In
  463. soft reset
  464. SRX
  465. Channel 0: DDR3, 800MHz
  466. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  467. Channel 1: DDR3, 800MHz
  468. Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
  469. 256B stride
  470. ch 0 ddrconfig = 0x101, ddrsize = 0x2020
  471. ch 1 ddrconfig = 0x101, ddrsize = 0x2020
  472. pmugrf_os_reg[2] = 0x3AA17AA1, stride = 0xD
  473. OUT
  474. Boot1: 2019-03-14, version: 1.19
  475. CPUId = 0x0
  476. ChipType = 0x10, 293
  477. SdmmcInit=2 0
  478. BootCapSize=100000
  479. UserCapSize=119276MB
  480. FwPartOffset=2000 , 100000
  481. mmc0:cmd8,20
  482. mmc0:cmd5,20
  483. mmc0:cmd55,20
  484. mmc0:cmd1,20
  485. mmc0:cmd8,20
  486. mmc0:cmd5,20
  487. mmc0:cmd55,20
  488. mmc0:cmd1,20
  489. mmc0:cmd8,20
  490. mmc0:cmd5,20
  491. mmc0:cmd55,20
  492. mmc0:cmd1,20
  493. SdmmcInit=0 1
  494. StorageInit ok = 67988
  495. SecureMode = 0
  496. SecureInit read PBA: 0x4
  497. SecureInit read PBA: 0x404
  498. SecureInit read PBA: 0x804
  499. SecureInit read PBA: 0xc04
  500. SecureInit read PBA: 0x1004
  501. SecureInit read PBA: 0x1404
  502. SecureInit read PBA: 0x1804
  503. SecureInit read PBA: 0x1c04
  504. SecureInit ret = 0, SecureMode = 0
  505. atags_set_bootdev: ret:(0)
  506. GPT part:  0, name:            uboot, start:0x4000, size:0x2000
  507. GPT part:  1, name:            trust, start:0x6000, size:0x2000
  508. GPT part:  2, name:             boot, start:0xa000, size:0x10000
  509. GPT part:  3, name:           backup, start:0x2a000, size:0x10000
  510. GPT part:  4, name:           rootfs, start:0x5a000, size:0xe89bfdf
  511. find part:uboot OK. first_lba:0x4000.
  512. find part:trust OK. first_lba:0x6000.
  513. LoadTrust Addr:0x6000
  514. No find bl30.bin
  515. Load uboot, ReadLba = 4000
  516. Load OK, addr=0x200000, size=0xd6fac
  517. RunBL31 0x10000
  518. NOTICE:  BL31: v1.3(debug):370ab80
  519. NOTICE:  BL31: Built : 09:23:41, Mar  4 2019
  520. NOTICE:  BL31: Rockchip release version: v1.1
  521. INFO:    GICv3 with legacy support detected. ARM GICV3 driver initialized in EL3
  522. INFO:    Using opteed sec cpu_context!
  523. INFO:    boot cpu mask: 0
  524. INFO:    plat_rockchip_pmu_init(1181): pd status 3e
  525. INFO:    BL31: Initializing runtime services
  526. INFO:    BL31: Initializing BL32
  527. INF [0x0] TEE-CORE:init_primary_helper:337: Initializing (1.1.0-195-g8f090d20 #6 Fri Dec  7 06:11:20 UTC 2018 aarch64)

  528. INF [0x0] TEE-CORE:init_primary_helper:338: Release version: 1.2

  529. INF [0x0] TEE-CORE:init_teecore:83: teecore inits done
  530. INFO:    BL31: Preparing for EL3 exit to normal world
  531. INFO:    Entry point address = 0x200000
  532. INFO:    SPSR = 0x3c9


  533. U-Boot 2017.09-02577-g0b1f585 (Apr 03 2019 - 10:12:37 +0800)

  534. Model: Firefly-RK3399 Board
  535. PreSerial: 2
  536. DRAM:  3.8 GiB
  537. Relocation Offset is: f5bee000
  538. S
复制代码

回复

使用道具 举报

274

积分

0

威望

0

贡献

技术达人

Rank: 2

积分
274
发表于 2019-7-2 14:18:50        只看该作者  沙发
强制进入maskrom模式,重新烧我们的固件就行
回复

使用道具 举报

23

积分

0

威望

0

贡献

技术小白

积分
23
发表于 2019-7-2 14:27:51        只看该作者  板凳
Yzh 发表于 2019-7-2 14:18
强制进入maskrom模式,重新烧我们的固件就行

这种操作出现硬件问题,在保修期内你们负责售后吗?
回复

使用道具 举报

274

积分

0

威望

0

贡献

技术达人

Rank: 2

积分
274
发表于 2019-7-2 15:39:18        只看该作者  地板
休息的风 发表于 2019-7-2 14:27
这种操作出现硬件问题,在保修期内你们负责售后吗?

你按照我们教程去操作是不会出现问题的
回复

使用道具 举报

23

积分

0

威望

0

贡献

技术小白

积分
23
发表于 2019-7-2 15:59:25        只看该作者  5#
Yzh 发表于 2019-7-2 15:39
你按照我们教程去操作是不会出现问题的

我使用./build.sh updateimg 命令打包生成的update.img可以正常启动,但是我单独烧写如下文件中的kernel.img resource.img,板子会无限重启,是这两个文件有问题还是不能这样操作?
  1. wfly@wfly-VirtualBox:~/workspace/rk3399/linux/linux-sdk/kernel$ ls kernel.img resource.img
  2. kernel.img  resource.img
复制代码



捕获.PNG (1.76 KB, 下载次数: 1144)

捕获.PNG
回复

使用道具 举报

23

积分

0

威望

0

贡献

技术小白

积分
23
发表于 2019-7-2 16:21:57        只看该作者  6#
Yzh 发表于 2019-7-2 15:39
你按照我们教程去操作是不会出现问题的

另外就是在MASKROM模式下,烧写一直出现图片中问题,该如何解决:


捕获.PNG (35.53 KB, 下载次数: 1159)

捕获.PNG

点评

切记,出现此问题时。重启电脑、更换TYPC线、插拔接口。要一一尝试。  发表于 2019-11-16 20:55
回复

使用道具 举报

274

积分

0

威望

0

贡献

技术达人

Rank: 2

积分
274
发表于 2019-7-3 10:58:38        只看该作者  7#
休息的风 发表于 2019-7-2 16:21
另外就是在MASKROM模式下,烧写一直出现图片中问题,该如何解决:

你板子是3399还是3288?固件跟板卡型号有没有对应?
回复

使用道具 举报

23

积分

0

威望

0

贡献

技术小白

积分
23
发表于 2019-7-3 16:50:05        只看该作者  8#
Yzh 发表于 2019-7-3 10:58
你板子是3399还是3288?固件跟板卡型号有没有对应?

是rk3399,用的链接中的源码:
http://www.t-firefly.com/doc/download/page/id/3.html
讲编译出来的文件打包烧写,板子可以运行。

但单独烧写kernel.img 、resource.img板子就会无限重启。是我的烧写方式有问题吗?
回复

使用道具 举报

30

积分

0

威望

0

贡献

技术小白

积分
30
发表于 2020-9-17 17:48:58        只看该作者  9#
同学问题解决没,我也是出现你这个问题,烧了kernel.img后无限重启
回复

使用道具 举报

14

积分

0

威望

0

贡献

技术小白

积分
14
发表于 2020-10-9 15:06:36        只看该作者  10#
似火流年 发表于 2020-9-17 17:48
同学问题解决没,我也是出现你这个问题,烧了kernel.img后无限重启

我也是,请问你的问题解决了没?
回复

使用道具 举报

返回列表
12
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

友情链接 : 爱板网 电子发烧友论坛 云汉电子社区 粤ICP备14022046号-2
快速回复 返回顶部 返回列表