Home
last modified time | relevance | path

Searched refs:TAG (Results 1 – 25 of 292) sorted by relevance

12345678910>>...12

/hal_espressif-latest/components/bootloader_support/src/esp32/
Dsecure_boot_secure_features.c15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
20 ESP_LOGI(TAG, "Read & write protecting new key..."); in esp_secure_boot_enable_secure_features()
28 ESP_LOGI(TAG, "Disable JTAG..."); in esp_secure_boot_enable_secure_features()
31 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
35 ESP_LOGI(TAG, "Disable ROM BASIC interpreter fallback..."); in esp_secure_boot_enable_secure_features()
38 ESP_LOGW(TAG, "Not disabling ROM BASIC fallback - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
48 ESP_LOGE(TAG, "Blowing secure boot efuse...failed."); in esp_secure_boot_enable_secure_features()
53 ESP_LOGI(TAG, "Disable JTAG..."); in esp_secure_boot_enable_secure_features()
56 ESP_LOGE(TAG, "Disable JTAG...failed."); in esp_secure_boot_enable_secure_features()
60 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
[all …]
Dflash_encryption_secure_features.c15 static __attribute__((unused)) const char *TAG = "flash_encrypt"; variable
31 ESP_LOGI(TAG, "Setting CRYPT_CONFIG efuse to 0xF"); in esp_flash_encryption_enable_secure_features()
38 ESP_LOGE(TAG, "EFUSE_ENCRYPT_CONFIG should be set 0xF but it is 0x%x", crypt_config); in esp_flash_encryption_enable_secure_features()
42 ESP_LOGI(TAG, "Disable UART bootloader encryption..."); in esp_flash_encryption_enable_secure_features()
45 ESP_LOGW(TAG, "Not disabling UART bootloader encryption"); in esp_flash_encryption_enable_secure_features()
49 ESP_LOGI(TAG, "Disable UART bootloader decryption..."); in esp_flash_encryption_enable_secure_features()
52 ESP_LOGW(TAG, "Not disabling UART bootloader decryption - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features()
56 ESP_LOGI(TAG, "Disable UART bootloader MMU cache..."); in esp_flash_encryption_enable_secure_features()
59 ESP_LOGW(TAG, "Not disabling UART bootloader MMU cache - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features()
63 ESP_LOGI(TAG, "Disable JTAG..."); in esp_flash_encryption_enable_secure_features()
[all …]
Dbootloader_esp32.c41 static const char *TAG = "boot.esp32"; variable
77 …ESP_LOGE(TAG, "Chip CPU frequency rated for %dMHz, configured for %dMHz. Modify CPU frequency in m… in bootloader_check_rated_cpu_clock()
123 ESP_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32" (waiti mode)", cpu_name, pc); in wdt_reset_info_dump()
125 ESP_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32, cpu_name, pc); in wdt_reset_info_dump()
127 ESP_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08"PRIx32, cpu_name, stat); in wdt_reset_info_dump()
128 ESP_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08"PRIx32, cpu_name, pid); in wdt_reset_info_dump()
129 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08"PRIx32, cpu_name, inst); in wdt_reset_info_dump()
130 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08"PRIx32, cpu_name, dstat); in wdt_reset_info_dump()
131 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08"PRIx32, cpu_name, data); in wdt_reset_info_dump()
132 ESP_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08"PRIx32, cpu_name, pc); in wdt_reset_info_dump()
[all …]
/hal_espressif-latest/components/bootloader_support/src/
Dsecure_boot.c16 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
31 ESP_LOGE(TAG, "Can not be fixed (err=0x%x).", err); in update_efuses()
36 ESP_LOGE(TAG, "Error programming eFuses (err=0x%x)", err); in update_efuses()
39 ESP_LOGI(TAG, "Fixed"); in update_efuses()
51 ESP_LOGW(TAG, "eFuse BLOCK%d should not be readable. Fixing..", block); in secure_boot_v1_check()
56 ESP_LOGW(TAG, "eFuse BLOCK%d should not be writeable. Fixing..", block); in secure_boot_v1_check()
70 ESP_LOGE(TAG, "eFuse BLOCK%d should be readable", block); in secure_boot_v2_check()
77 ESP_LOGE(TAG, "eFuse BLOCK%d should not be empty", block); in secure_boot_v2_check()
84 ESP_LOGW(TAG, "eFuse BLOCK%d should not be writeable. Fixing..", block); in secure_boot_v2_check()
104 ESP_LOGE(TAG, "eFuse BLOCK%d should be readable", block); in secure_boot_v2_check()
[all …]
Dflash_encrypt.c24 static const char *TAG = "flash_encrypt"; variable
33 …ESP_LOGE(TAG, "Flash encryption eFuse bit was not enabled in bootloader but CONFIG_SECURE_FLASH_EN… in esp_flash_encryption_init_checks()
52 …ESP_LOGE(TAG, "Flash encryption & Secure Boot together requires FLASH_CRYPT_CNT efuse to be write … in esp_flash_encryption_init_checks()
65 …ESP_LOGE(TAG, "Flash encryption settings error: app is configured for RELEASE but efuses are set f… in esp_flash_encryption_init_checks()
66 …ESP_LOGE(TAG, "Mismatch found in security options in bootloader menuconfig and efuse settings. Dev… in esp_flash_encryption_init_checks()
68 ESP_LOGW(TAG, "Flash encryption mode is DEVELOPMENT (not secure)"); in esp_flash_encryption_init_checks()
71 ESP_LOGI(TAG, "Flash encryption mode is RELEASE"); in esp_flash_encryption_init_checks()
171 ESP_LOGE(TAG, "Flash encryption eFuse is not enabled, abort.."); in esp_flash_encryption_set_release_mode()
220 ESP_LOGE(TAG, "Flash encryption mode is DEVELOPMENT, abort.."); in esp_flash_encryption_set_release_mode()
223 ESP_LOGI(TAG, "Flash encryption mode is RELEASE"); in esp_flash_encryption_set_release_mode()
[all …]
Dbootloader_utility.c86 static const char *TAG = "boot"; variable
113 …ESP_LOGE(TAG, "ota_info partition size %"PRIu32" is too small (minimum %d bytes)", ota_info->size,… in read_otadata()
117 ESP_LOGD(TAG, "OTA data offset 0x%"PRIx32, ota_info->offset); in read_otadata()
120 …ESP_LOGE(TAG, "bootloader_mmap(0x%"PRIx32", 0x%"PRIx32") failed", ota_info->offset, ota_info->size… in read_otadata()
141 … ESP_LOGE(TAG, "bootloader_mmap(0x%"PRIx32", 0x%"PRIx32") failed", partition->offset, mmap_size); in bootloader_common_get_partition_description()
165 …ESP_LOGE(TAG, "bootloader_mmap(0x%x, 0x%x) failed", ESP_PARTITION_TABLE_OFFSET, ESP_PARTITION_TABL… in bootloader_utility_load_partition_table()
168 …ESP_LOGD(TAG, "mapped partition table 0x%x at 0x%x", ESP_PARTITION_TABLE_OFFSET, (intptr_t)partiti… in bootloader_utility_load_partition_table()
172 ESP_LOGE(TAG, "Failed to verify partition table"); in bootloader_utility_load_partition_table()
176 ESP_LOGI(TAG, "Partition Table:"); in bootloader_utility_load_partition_table()
177 ESP_LOGI(TAG, "## Label Usage Type ST Offset Length"); in bootloader_utility_load_partition_table()
[all …]
Dbootloader_init.c23 static const char *TAG = "boot"; variable
36 ESP_EARLY_LOGE(TAG, "failed to load bootloader image header!"); in bootloader_read_bootloader_header()
47 ESP_EARLY_LOGI(TAG, "chip revision: v%d.%d", major, minor); in bootloader_check_bootloader_validity()
51 …ESP_EARLY_LOGE(TAG, "You are using ESP32 chip revision (%d) that is unsupported. While it may work… in bootloader_check_bootloader_validity()
52 …ESP_EARLY_LOGE(TAG, "Proceeding with this ESP32 chip revision is not recommended unless you fully … in bootloader_check_bootloader_validity()
54 …ESP_EARLY_LOGE(TAG, "If you choose to continue, please enable the 'CONFIG_ESP32_USE_UNSUPPORTED_RE… in bootloader_check_bootloader_validity()
82 ESP_EARLY_LOGD(TAG, "Enabling RTCWDT(%d ms)", CONFIG_BOOTLOADER_WDT_TIME_MS); in bootloader_config_wdt()
100 ESP_EARLY_LOGI(TAG, "Enabling RNG early entropy source..."); in bootloader_enable_random()
107 ESP_EARLY_LOGI(TAG, "MCUboot 2nd stage bootloader"); in bootloader_print_banner()
110 ESP_EARLY_LOGI(TAG, "MCUboot Application image"); in bootloader_print_banner()
[all …]
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v2/
Dsecure_boot.c27 static const char *TAG = "secure_boot_v2"; variable
34 ESP_LOGD(TAG, "Signature block(%d) invalid/absent.", block_num); in validate_signature_block()
38 ESP_LOGE(TAG, "Magic byte correct but incorrect crc."); in validate_signature_block()
42 ESP_LOGE(TAG, "Magic byte & CRC correct but incorrect image digest."); in validate_signature_block()
45 ESP_LOGD(TAG, "valid signature block(%d) found", block_num); in validate_signature_block()
73 …ESP_LOGD(TAG, "calculating public key digests for sig blocks of image offset 0x%x (sig block offse… in s_calculate_image_public_key_digests()
79 ESP_LOGE(TAG, "error generating image digest, %d", ret); in s_calculate_image_public_key_digests()
83 ESP_LOGD(TAG, "reading signature(s)"); in s_calculate_image_public_key_digests()
86 …ESP_LOGE(TAG, "bootloader_mmap(0x%x, 0x%x) failed", sig_block_addr, sizeof(ets_secure_boot_signatu… in s_calculate_image_public_key_digests()
123 ESP_LOGE(TAG, "Secure boot key (%d) verification failed.", i); in s_calculate_image_public_key_digests()
[all …]
/hal_espressif-latest/components/bootloader_support/src/flash_encryption/
Dflash_encrypt.c40 static const char *TAG = "flash_encrypt"; variable
64 …ESP_LOGE(TAG, "Flash Encryption cannot be enabled (CRYPT_CNT (%d) is write protected)", get_flash_… in esp_flash_encrypt_is_write_protected()
76 ESP_LOGV(TAG, "CRYPT_CNT %d, write protection %d", flash_crypt_cnt, flash_crypt_wr_dis); in esp_flash_encrypt_state()
84 ESP_LOGI(TAG, "flash encryption is enabled (%d plaintext flashes left)", left); in esp_flash_encrypt_state()
101 ESP_LOGE(TAG, "Initialization of Flash encryption key failed (%d)", err); in esp_flash_encrypt_check_and_update()
107 ESP_LOGE(TAG, "Encryption flash contents failed (%d)", err); in esp_flash_encrypt_check_and_update()
113 ESP_LOGE(TAG, "Enabling of Flash encryption failed (%d)", err); in esp_flash_encrypt_check_and_update()
117 ESP_LOGE(TAG, "flash encryption is not enabled, and SECURE_FLASH_REQUIRE_ALREADY_ENABLED " in esp_flash_encrypt_check_and_update()
135 ESP_LOGE(TAG, "Unknown/unsupported CODING_SCHEME value 0x%x", coding_scheme); in check_and_generate_encryption_keys()
149 ESP_LOGE(TAG, "XTS_AES_128_KEY is already in use, XTS_AES_256_KEY_1/2 can not be used"); in check_and_generate_encryption_keys()
[all …]
/hal_espressif-latest/components/esp_netif/lwip/
Desp_netif_lwip_ppp.c23 static const char *TAG = "esp-netif_lwip-ppp"; variable
75 ESP_LOGI(TAG, "Connected"); in on_ppp_status_changed()
78 ESP_LOGE(TAG, "Invalid parameter"); in on_ppp_status_changed()
81 ESP_LOGE(TAG, "Unable to open PPP session"); in on_ppp_status_changed()
84 ESP_LOGE(TAG, "Invalid I/O device for PPP"); in on_ppp_status_changed()
87 ESP_LOGE(TAG, "Unable to allocate resources"); in on_ppp_status_changed()
90 ESP_LOGI(TAG, "User interrupt"); in on_ppp_status_changed()
93 ESP_LOGI(TAG, "Connection lost"); in on_ppp_status_changed()
97 ESP_LOGE(TAG, "esp_event_post failed with code %d", err); in on_ppp_status_changed()
102 ESP_LOGE(TAG, "Failed authentication challenge"); in on_ppp_status_changed()
[all …]
/hal_espressif-latest/components/bootloader_support/src/secure_boot_v1/
Dsecure_boot.c34 static const char *TAG = "secure_boot_v1"; variable
59 ESP_LOGE(TAG, "SPI erase failed: 0x%x", err); in secure_boot_generate()
66 ESP_LOGE(TAG, "bootloader_mmap(0x1000, 0x%x) failed", image_len); in secure_boot_generate()
78 ESP_LOGD(TAG, "write iv+digest to flash"); in secure_boot_generate()
82 ESP_LOGE(TAG, "SPI write failed: 0x%x", err); in secure_boot_generate()
93 ESP_LOGI(TAG, "bootloader secure boot is already enabled." in esp_secure_boot_generate_digest()
100 ESP_LOGE(TAG, "Unknown/unsupported CODING_SCHEME value 0x%x", coding_scheme); in esp_secure_boot_generate_digest()
108 ESP_LOGE(TAG, "bootloader image appears invalid! error %d", err); in esp_secure_boot_generate_digest()
118 ESP_LOGI(TAG, "Generating new secure boot key..."); in esp_secure_boot_generate_digest()
127 ESP_LOGW(TAG, "Using pre-loaded secure boot key in EFUSE block 2"); in esp_secure_boot_generate_digest()
[all …]
/hal_espressif-latest/zephyr/common/
Dsoc_init.c23 static const char *TAG = "soc_init"; variable
30 ESP_EARLY_LOGI(TAG, "MCUboot 2nd stage bootloader"); in print_banner()
32 ESP_EARLY_LOGI(TAG, "MCUboot Application image"); in print_banner()
34 ESP_EARLY_LOGI(TAG, "ESP Simple boot"); in print_banner()
36 ESP_EARLY_LOGI(TAG, "compile time " __DATE__ " " __TIME__); in print_banner()
39 ESP_EARLY_LOGW(TAG, "Unicore bootloader"); in print_banner()
42 ESP_EARLY_LOGI(TAG, "Multicore bootloader"); in print_banner()
51 ESP_EARLY_LOGE(TAG, "failed to load bootloader image header!"); in read_bootloader_header()
64 ESP_EARLY_LOGE(TAG, "mismatch chip ID, expected %d, found %d", chip_id, in check_chip_validity()
76 TAG, in check_chip_validity()
[all …]
/hal_espressif-latest/components/bootloader_support/src/esp32c2/
Dsecure_boot_secure_features.c15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features()
25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features()
29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features()
43 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
54 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features()
57 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
Dflash_encryption_secure_features.c15 static __attribute__((unused)) const char *TAG = "flash_encrypt"; variable
20 ESP_LOGI(TAG, "Disable UART bootloader encryption..."); in esp_flash_encryption_enable_secure_features()
23 ESP_LOGW(TAG, "Not disabling UART bootloader encryption"); in esp_flash_encryption_enable_secure_features()
27 ESP_LOGI(TAG, "Disable UART bootloader cache..."); in esp_flash_encryption_enable_secure_features()
30 ESP_LOGW(TAG, "Not disabling UART bootloader cache - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features()
34 ESP_LOGI(TAG, "Disable JTAG..."); in esp_flash_encryption_enable_secure_features()
37 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_flash_encryption_enable_secure_features()
/hal_espressif-latest/components/bootloader_support/src/esp32c6/
Dsecure_boot_secure_features.c15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features()
25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features()
29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features()
45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features()
66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
/hal_espressif-latest/components/bootloader_support/src/esp32h2/
Dsecure_boot_secure_features.c15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features()
25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features()
29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features()
45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features()
66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
/hal_espressif-latest/components/bootloader_support/src/esp32s2/
Dsecure_boot_secure_features.c15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
23 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features()
26 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features()
30 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
33 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
37 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
41 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features()
45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features()
66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
Dbootloader_esp32s2.c45 static const char *TAG = "boot.esp32s2"; variable
75 ESP_EARLY_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32" (waiti mode)", cpu_name, pc); in wdt_reset_info_dump()
77 ESP_EARLY_LOGW(TAG, "WDT reset info: %s CPU PC=0x%"PRIx32, cpu_name, pc); in wdt_reset_info_dump()
79 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08"PRIx32, cpu_name, stat); in wdt_reset_info_dump()
80 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08"PRIx32, cpu_name, pid); in wdt_reset_info_dump()
81 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08"PRIx32, cpu_name, inst); in wdt_reset_info_dump()
82 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08"PRIx32, cpu_name, dstat); in wdt_reset_info_dump()
83 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08"PRIx32, cpu_name, data); in wdt_reset_info_dump()
84 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08"PRIx32, cpu_name, pc); in wdt_reset_info_dump()
85 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08"PRIx32, cpu_name, lsstat); in wdt_reset_info_dump()
[all …]
/hal_espressif-latest/components/bootloader_support/src/esp32s3/
Dsecure_boot_secure_features.c15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features()
25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features()
29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features()
45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features()
66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
Dbootloader_esp32s3.c47 static const char *TAG = "boot.esp32s3"; variable
83 ESP_EARLY_LOGE(TAG, "WDT reset info: %s CPU not support!\n", cpu_name); in wdt_reset_info_dump()
88 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08"PRIx32, cpu_name, stat); in wdt_reset_info_dump()
89 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08"PRIx32, cpu_name, pid); in wdt_reset_info_dump()
90 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08"PRIx32, cpu_name, inst); in wdt_reset_info_dump()
91 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08"PRIx32, cpu_name, dstat); in wdt_reset_info_dump()
92 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08"PRIx32, cpu_name, data); in wdt_reset_info_dump()
93 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08"PRIx32, cpu_name, pc); in wdt_reset_info_dump()
94 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08"PRIx32, cpu_name, lsstat); in wdt_reset_info_dump()
95 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0ADDR 0x%08"PRIx32, cpu_name, lsaddr); in wdt_reset_info_dump()
[all …]
/hal_espressif-latest/components/bootloader_support/src/esp32c3/
Dsecure_boot_secure_features.c15 static __attribute__((unused)) const char *TAG = "secure_boot"; variable
22 ESP_LOGI(TAG, "Enabling Security download mode..."); in esp_secure_boot_enable_secure_features()
25 ESP_LOGE(TAG, "Could not enable Security download mode..."); in esp_secure_boot_enable_secure_features()
29 ESP_LOGI(TAG, "Disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
32 ESP_LOGE(TAG, "Could not disable ROM Download mode..."); in esp_secure_boot_enable_secure_features()
36 ESP_LOGW(TAG, "UART ROM Download mode kept enabled - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
40 ESP_LOGI(TAG, "Disable hardware & software JTAG..."); in esp_secure_boot_enable_secure_features()
45 ESP_LOGW(TAG, "Not disabling JTAG - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
62 ESP_LOGI(TAG, "Prevent read disabling of additional efuses..."); in esp_secure_boot_enable_secure_features()
66 ESP_LOGW(TAG, "Allowing read disabling of additional efuses - SECURITY COMPROMISED"); in esp_secure_boot_enable_secure_features()
/hal_espressif-latest/components/esp_wifi/src/
Dwifi_init.c82 static const char* TAG = "wifi_init"; variable
122 ESP_RETURN_ON_ERROR(err, TAG, "failed to allocate memory for modem (%s) retention", "WiFi MAC"); in init_wifi_mac_sleep_retention()
123 ESP_LOGD(TAG, "WiFi MAC sleep retention initialization"); in init_wifi_mac_sleep_retention()
134 ESP_LOGW(TAG, "failed to allocate sleep retention linked list for wifi mac retention"); in esp_wifi_mac_pd_mem_init()
145 ESP_LOGW(TAG, "failed to free sleep retention linked list for wifi mac retention"); in esp_wifi_mac_pd_mem_deinit()
156 ESP_LOGE(TAG, "Wi-Fi not stop"); in wifi_deinit_internal()
162 ESP_LOGW(TAG, "Failed to unregister Rx callbacks"); in wifi_deinit_internal()
177 ESP_LOGE(TAG, "Failed to deinit Wi-Fi driver (0x%x)", err); in wifi_deinit_internal()
208 ESP_LOGW(TAG, "WiFi MAC sleep retention deinit failed"); in wifi_deinit_internal()
239 ESP_LOGI(TAG, "rx ba win: %d", CONFIG_ESP_WIFI_RX_BA_WIN); in esp_wifi_config_info()
[all …]
/hal_espressif-latest/zephyr/esp32/src/
Dsoc_init.c13 static const char *TAG = "soc_init"; variable
35 ESP_EARLY_LOGE(TAG, "WDT reset info: %s CPU not support!\n", cpu_name); in wdt_reset_info_dump()
39 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08" PRIx32, cpu_name, stat); in wdt_reset_info_dump()
40 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08" PRIx32, cpu_name, pid); in wdt_reset_info_dump()
41 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08" PRIx32, cpu_name, inst); in wdt_reset_info_dump()
42 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08" PRIx32, cpu_name, dstat); in wdt_reset_info_dump()
43 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08" PRIx32, cpu_name, data); in wdt_reset_info_dump()
44 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08" PRIx32, cpu_name, pc); in wdt_reset_info_dump()
45 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08" PRIx32, cpu_name, lsstat); in wdt_reset_info_dump()
46 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0ADDR 0x%08" PRIx32, cpu_name, lsaddr); in wdt_reset_info_dump()
[all …]
/hal_espressif-latest/components/esp_adc/
Dadc_oneshot.c37 static const char *TAG = "adc_oneshot"; variable
80 …ESP_GOTO_ON_FALSE(init_config && ret_unit, ESP_ERR_INVALID_ARG, err, TAG, "invalid argument: null … in adc_oneshot_new_unit()
81 …ESP_GOTO_ON_FALSE(init_config->unit_id < SOC_ADC_PERIPH_NUM, ESP_ERR_INVALID_ARG, err, TAG, "inval… in adc_oneshot_new_unit()
87 …OC_ADC_DIG_SUPPORTED_UNIT(init_config->unit_id), ESP_ERR_INVALID_ARG, err, TAG, "adc unit not supp… in adc_oneshot_new_unit()
91 ESP_GOTO_ON_FALSE(unit, ESP_ERR_NO_MEM, err, TAG, "no mem for unit"); in adc_oneshot_new_unit()
94 …ESP_GOTO_ON_FALSE(success_claim, ESP_ERR_NOT_FOUND, err, TAG, "adc%d is already in use", init_conf… in adc_oneshot_new_unit()
106 …z(clk_src, ESP_CLK_TREE_SRC_FREQ_PRECISION_CACHED, &clk_src_freq_hz), err, TAG, "clock source not … in adc_oneshot_new_unit()
132 ESP_LOGD(TAG, "new adc unit%"PRId32" is created", unit->unit_id); in adc_oneshot_new_unit()
145 … ESP_RETURN_ON_FALSE(handle && config, ESP_ERR_INVALID_ARG, TAG, "invalid argument: null pointer"); in adc_oneshot_config_channel()
146 …ESP_RETURN_ON_FALSE(config->atten < SOC_ADC_ATTEN_NUM, ESP_ERR_INVALID_ARG, TAG, "invalid attenuat… in adc_oneshot_config_channel()
[all …]
/hal_espressif-latest/zephyr/esp32s3/src/
Dsoc_init.c16 const static char *TAG = "soc_init"; variable
83 ESP_EARLY_LOGE(TAG, "WDT reset info: %s CPU not support!\n", cpu_name); in wdt_reset_info_dump()
87 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU STATUS 0x%08" PRIx32, cpu_name, stat); in wdt_reset_info_dump()
88 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PID 0x%08" PRIx32, cpu_name, pid); in wdt_reset_info_dump()
89 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGINST 0x%08" PRIx32, cpu_name, inst); in wdt_reset_info_dump()
90 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGSTATUS 0x%08" PRIx32, cpu_name, dstat); in wdt_reset_info_dump()
91 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGDATA 0x%08" PRIx32, cpu_name, data); in wdt_reset_info_dump()
92 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGPC 0x%08" PRIx32, cpu_name, pc); in wdt_reset_info_dump()
93 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0STAT 0x%08" PRIx32, cpu_name, lsstat); in wdt_reset_info_dump()
94 ESP_EARLY_LOGD(TAG, "WDT reset info: %s CPU PDEBUGLS0ADDR 0x%08" PRIx32, cpu_name, lsaddr); in wdt_reset_info_dump()
[all …]

12345678910>>...12