Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- NOTICE: Booting Trusted Firmware
- NOTICE: BL1: v2.9(debug):c732205e6b03
- NOTICE: BL1: Built : 14:54:13, Oct 13 2023
- INFO: BL1: RAM 0xe0ee000 - 0xe0f6000
- INFO: BL1: Loading BL2
- INFO: Loading image id=1 at address 0xe06b000
- INFO: Image id=1 loaded: 0xe06b000 - 0xe0742b9
- NOTICE: BL1: Booting BL2
- INFO: Entry point address = 0xe06b000
- INFO: SPSR = 0x3cd
- INFO: [GPT] Boot Configuration
- INFO: PPS/T: 0x2/40
- INFO: PGS/P: 0x0/12
- INFO: L0GPTSZ/S: 0x0/30
- INFO: PAS count: 0x6
- INFO: L0 base: 0xeefe000
- INFO: [GPT] PAS[0]: base 0xe001000, size 0xff000, GPI 0xa, type 0x1
- INFO: [GPT] PAS[1]: base 0xe100000, size 0xdfe000, GPI 0x8, type 0x1
- INFO: [GPT] PAS[2]: base 0xeefe000, size 0x102000, GPI 0xa, type 0x1
- INFO: [GPT] PAS[3]: base 0x40000000, size 0x100000, GPI 0x9, type 0x1
- INFO: [GPT] PAS[4]: base 0x40100000, size 0x1800000, GPI 0xb, type 0x1
- INFO: [GPT] PAS[5]: base 0x41900000, size 0xbe700000, GPI 0x9, type 0x1
- INFO: Enabling Granule Protection Checks
- NOTICE: BL2: v2.9(debug):c732205e6b03
- NOTICE: BL2: Built : 14:54:13, Oct 13 2023
- INFO: BL2: Doing platform setup
- INFO: Reserved RMM memory [0x40100000, 0x418fffff] in Device tree
- INFO: BL2: Loading image id 3
- INFO: Loading image id=3 at address 0xe0a0000
- INFO: Image id=3 loaded: 0xe0a0000 - 0xe0b00c4
- INFO: BL2: Loading image id 34
- INFO: Loading image id=34 at address 0x40100000
- INFO: Image id=34 loaded: 0x40100000 - 0x40302618
- INFO: BL2: Loading image id 5
- INFO: Loading image id=5 at address 0x60000000
- INFO: Image id=5 loaded: 0x60000000 - 0x60200000
- NOTICE: BL2: Booting BL31
- INFO: Entry point address = 0xe0a0000
- INFO: SPSR = 0x3cd
- NOTICE: BL31: v2.9(debug):c732205e6b03-dirty
- NOTICE: BL31: Built : 16:37:02, Oct 19 2023
- ASSERT: drivers/arm/gic/v2/gicv2_main.c:158
- BACKTRACE: START: assert
- 0: EL3: 0xe0a2460
- 1: EL3: 0xe0a01c8
- 2: EL3: 0xe0a3d9c
- 3: EL3: 0xe0a5178
- 4: EL3: 0xe0a299c
- 5: EL3: 0xe0a2708
- 6: EL3: 0xe0a00d0
- BACKTRACE: END: assert
- soc_term: read fd EOF
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement