工具/软件:
您好、
我们的硬件看门狗在 HS-EMA FS 器件上运行正常、并且在内核崩溃等情况下成功重新启动。 但是、HS-SE 器件上的硬件看门狗不会复位。 调试该问题后、我发现 HS-SE SPL 二进制文件无法修改 MCU_MMR0_RST_CTRL 寄存器以激活来自 MCU ESM 的复位信号。
以下日志来自 HS-SPL 器件上的 FS 引导。 我添加了一些打印内容、如您在第 12 行中所见、SPL 可以从 MCU_MMR0_RST_CTRL 读回正确的值。
U-Boot SPL 2025.04-00051-gdba40dd4eac5-dirty (May 09 2025 - 13:51:41 +0000) SYSFW ABI: 4.0 (firmware rev 0x000b '11.0.7--v11.00.07 (Fancy Rat)') ESM_K3 cfg: 1 k3_esm esm@420000: ESM probed!!! k3_esm esm@4100000: ESM probed!!! Enable MCU_ESM reset CTRLMMR_MCU_RST_CTRL val: 0x420fff CTRLMMR_MCU_RST_CTRL reg: 0x4518170 RST_CTRL_ESM_ERROR_RST_EN_Z_MASK mask: 0xfffdffff write value: 0x400fff read back: 0x400fff Changed A53 CPU frequency to 1250000000Hz (T grade) in DT SPL initial stack usage: 13424 bytes Trying to boot from MMC2 Authentication passed Authentication passed Authentication passed Authentication passed Authentication passed Starting ATF on ARM64 core...
接下来、此日志来自 HS-SE 器件上的同一 SPL(仅签名但仍然相同的 defconfig)引导。 第 12 行显示 SPL 无法读回修改后的值。
U-Boot SPL 2025.04-00051-gdba40dd4eac5-dirty (May 09 2025 - 13:51:41 +0000) SYSFW ABI: 4.0 (firmware rev 0x000b '11.0.7--v11.00.07 (Fancy Rat)') ESM_K3 cfg: 1 k3_esm esm@420000: ESM probed!!! k3_esm esm@4100000: ESM probed!!! Enable MCU_ESM reset CTRLMMR_MCU_RST_CTRL val: 0x420fff CTRLMMR_MCU_RST_CTRL reg: 0x4518170 RST_CTRL_ESM_ERROR_RST_EN_Z_MASK mask: 0xfffdffff write value: 0x400fff read back: 0x420fff Changed A53 CPU frequency to 1250000000Hz (T grade) in DT SPL initial stack usage: 13424 bytes Trying to boot from MMC2 Authentication passed Authentication passed Authentication passed Authentication passed Authentication passed Starting ATF on ARM64 core...
我目前的权变措施是为 A53 启用 CONFIG_ESM_K3 配置、因为您可以在接下来的日志中看到、A53 能够修改该寄存器。
NOTICE: BL31: v2.10.4(release):lts-v2.10.4-dirty NOTICE: BL31: Built : 16:23:33, Apr 26 2024 U-Boot SPL 2025.04-00051-gdba40dd4eac5-dirty (May 09 2025 - 13:51:41 +0000) SYSFW ABI: 4.0 (firmware rev 0x000b '11.0.7--v11.00.07 (Fancy Rat)') ESM_K3 cfg: 1 k3_esm esm@420000: ESM probed!!! k3_esm esm@4100000: ESM probed!!! Enable MCU_ESM reset CTRLMMR_MCU_RST_CTRL val: 0x420fff CTRLMMR_MCU_RST_CTRL reg: 0x4518170 RST_CTRL_ESM_ERROR_RST_EN_Z_MASK mask: 0xfffdffff write value: 0x400fff read back: 0x400fff SPL initial stack usage: 1952 bytes Trying to boot from MMC2 Authentication passed Authentication passed Authentication passed Authentication passed Authentication passed Authentication passed
您是否有具有 HS-SE 的 TI AM62x 套件、并且可以验证硬件看门狗是否正常工作?
有人能检查防火墙是否不允许在 tiboot3-am62x-hs-phycore-som.bin 中将命令写入此地址吗?
BTW:我仔细检查了 AM64x HS-SE 器件、硬件看门狗按预期工作。
此致、
Daniel