看看,感觉flashloader已经已经签名,并且并且成功成功成功到到到到到到,不不转到转,不不知道为什么连接连接不上。我我我使用的的是是是核心板和底板底板底板下载,说明flashloader本身没有问题。打开自动生成的为flashloader签名的bd文件,看不出什么问题,希望寻求帮助。
控制台信息如下:
execu
ting: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- error-status
toolStatus: 0
commandOutput: {
"command" : "error-status",
"response" : [ 4042322160 ],
"status" : {
"description" : "305411090 (0x12343412) HAB enabled.",
"value" : 305411090
}
}
Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1075790864 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat
toolStatus: 0
commandOutput: {
"command" : "read-register",
"response" : [],
"status" : {
"description" : "305411090 (0x12343412) HAB enabled.",
"value" : 305411090
}
}
Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1075790880 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat
toolStatus: 0
commandOutput: {
"command" : "read-register",
"response" : [],
"status" : {
"description" : "305411090 (0x12343412) HAB enabled.",
"value" : 305411090
}
}
Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1074757636 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat
toolStatus: 0
commandOutput: {
"command" : "read-register",
"response" : [],
"status" : {
"description" : "305411090 (0x12343412) HAB enabled.",
"value" : 305411090
}
}
Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1074757660 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat
toolStatus: 0
commandOutput: {
"command" : "read-register",
"response" : [],
"status" : {
"description" : "305411090 (0x12343412) HAB enabled.",
"value" : 305411090
}
}
Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- read-register 1074757660 32 4 D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinvectorsreadReg.dat
toolStatus: 0
commandOutput: {
"command" : "read-register",
"response" : [],
"status" : {
"description" : "305411090 (0x12343412) HAB enabled.",
"value" : 305411090
}
}
D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolselftosb4win>"D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolselftosb4winelftosb.exe" -f imx -V -c "D:AEMBEDrt1052softNXP-MCUBootUtility-mastergenbd_fileimx_flashloader_gen.bd" -o "D:AEMBEDrt1052softNXP-MCUBootUtility-mastergenbootable_imageivt_flashloader_signed.bin" "D:AEMBEDrt1052softNXP-MCUBootUtility-mastersrctargetsMIMXRT1052flashloader.srec"
CSF Processed successfully and signed data available in csf.bin
Section: 0x14
Section: 0x15
Section: 0x16
Section: 0x18
Section: 0x19
Section: 0x1a
Section: 0x1f
Section: 0x21
iMX bootable image generated successfully
Executing: D:AEMBEDrt1052softNXP-MCUBootUtility-mastertoolssdphostwinsdphost -t 50000 -p COM22,115200 -j -- write-file 539001344 D:AEMBEDrt1052softNXP-MCUBootUtility-mastergenbootable_imageivt_flashloader_signed.bin
toolStatus: 0
commandOutput: {
"command" : "write-file",
"response" : [ 3351091 ],
"status" : {
"description" : "305411090 (0x12343412) HAB enabled.",
"value" : 305411090
}
}
自动生成的bd文件如下
options {
flags = 0x08;
startAddress = 0x20208200;
ivtOffset = 0x0;
initialLoadSize = 0x200;
entryPointAddress = 0x2021b26d;
}
sources {
elfFile = extern(0);
}
constants {
SEC_CSF_HEADER = 20;
SEC_CSF_INSTALL_SRK = 21;
SEC_CSF_INSTALL_CSFK = 22;
SEC_CSF_INSTALL_NOCAK = 23;
SEC_CSF_AUTHENTICATE_CSF = 24;
SEC_CSF_INSTALL_KEY = 25;
SEC_CSF_AUTHENTICATE_DATA = 26;
SEC_CSF_INSTALL_SECRET_KEY = 27;
SEC_CSF_DECRYPT_DATA = 28;
SEC_NOP = 29;
SEC_SET_MID = 30;
SEC_SET_ENGINE = 31;
SEC_INIT = 32;
SEC_UNLOCK = 33;
}
section (SEC_CSF_HEADER;
Header_Version="4.2",
Header_HashAlgorithm="sha256",
Header_Engine="DCP",
Header_EngineConfiguration=0,
Header_CertificateFormat="x509",
Header_SignatureFormat="CMS"
)
{
}
section (SEC_CSF_INSTALL_SRK;
InstallSRK_Table="../../../gen/hab_cert/SRK_1_2_3_4_table.bin",
InstallSRK_SourceIndex=0
)
{
}
section (SEC_CSF_INSTALL_CSFK;
InstallCSFK_File="../../cst/crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem",
InstallCSFK_CertificateFormat="x509"
)
{
}
section (SEC_CSF_AUTHENTICATE_CSF)
{
}
section (SEC_CSF_INSTALL_KEY;
InstallKey_File="../../cst/crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem",
InstallKey_VerificationIndex=0,
InstallKey_TargetIndex=2)
{
}
section (SEC_CSF_AUTHENTICATE_DATA;
AuthenticateData_VerificationIndex=2,
AuthenticateData_Engine="DCP",
AuthenticateData_EngineConfiguration=0)
{
}
section (SEC_SET_ENGINE;
SetEngine_HashAlgorithm = "sha256",
SetEngine_Engine = "DCP",
SetEngine_EngineConfiguration = "0")
{
}
section (SEC_UNLOCK;
Unlock_Engine = "SNVS",
Unlock_features = "ZMK WRITE"
)
{
}
nxp-mcu bootutility报错截图如下:
但实际上,按键配置的是BMOD[1:0]=2'b01(串口下载器)
比较多的时候,启动模式会识别别成BMOD[1:0]=2'b00(从保险丝启动)
很少时候会是BMOD[1:0]=2'b10(内部引导)
然而后来知道别到的UUID看起也是不正常的
非常奇怪,从不会把启动模式识别为BMOD[1:0]=2'b01(串口下载器)
ps:换成没有配置HAB的核心板,每次都能正确识别为BMOD[1:0]=2'b01(串口下载器)
0