模块为esp32s3 R8 16M flash 8M PSRAM
烧录程序后串口打印信息
[15:14:36.481]收←◆ESP-ROM:esp32s3-20210327
Build:Mar 27 2021
rst:0x1 (POWERON),boot:0x28 (SPI_FAST_FLASH_BOOT)
SPIWP:0xee
mode:DOUT, clock div:2
load:0x3fcd0108,len:0x20b0
load:0x403b6000,len:0xcc8
load:0x403ba000,len:0x3050
entry 0x403b6284
[0;32mI (34) boot: ESP-IDF HEAD-HASH-NOTFOUND 2nd stage bootloader[0m
[0;32mI (35) boot: compile time 15:40:31[0m
D (35) bootloader_flash: non-XMC chip detected by SFDP Read (FF), skip.[0m
D (40) bootloader_flash: mmu set block paddr=0x00000000 (was 0xffffffff)[0m
[0;32mI (47) boot: chip revision: 0[0m
D (51) boot.esp32s3: magic e9[0m
D (54) boot.esp32s3: segments 03[0m
D (57) boot.esp32s3: spi_mode 03[0m
D (60) boot.esp32s3: spi_speed 00[0m
D (64) boot.esp32s3: spi_size 02[0m
[0;32mI (67) boot.esp32s3: Boot SPI Speed : 40MHz[0m
[0;32mI (72) boot.esp32s3: SPI Mode : DOUT[0m
[0;32mI (77) boot.esp32s3: SPI Flash Size : 4MB[0m
[0;32mI (81) boot: Enabling RNG early entropy source...[0m
D (87) bootloader_flash: mmu set paddr=00000000 count=1 size=c00 src_addr=8000 src_addr_aligned=0[0m
D (96) boot: mapped partition table 0x8000 at 0x3c008000[0m
D (101) flash_parts: partition table verified, 8 entries[0m
[0;32mI (106) boot: Partition Table:[0m
[0;32mI (110) boot: ## Label Usage Type ST Offset Length[0m
D (117) boot: load partition table entry 0x3c008000[0m
D (122) boot: type=1 subtype=2[0m
[0;32mI (126) boot: 0 nvs WiFi data 01 02 00009000 00004000[0m
D (133) boot: load partition table entry 0x3c008020[0m
D (138) boot: type=1 subtype=0[0m
[0;32mI (143) boot: 1 otadata OTA data 01 00 0000d000 00002000[0m
D (149) boot: load partition table entry 0x3c008040[0m
D (154) boot: type=1 subtype=1[0m
[0;32mI (157) boot: 2 phy_init RF data 01 01 0000f000 00001000[0m
D (164) boot: load partition table entry 0x3c008060[0m
D (169) boot: type=0 subtype=10[0m
[0;32mI (173) boot: 3 ota_0 OTA app 00 10 00010000 00180000[0m
D (180) boot: load partition table entry 0x3c008080[0m
D (185) boot: type=0 subtype=11[0m
[0;32mI (188) boot: 4 ota_1 OTA app 00 11 00190000 00180000[0m
D (196) boot: load partition table entry 0x3c0080a0[0m
D (201) boot: type=1 subtype=aa[0m
[0;32mI (204) boot: 5 tuya Unknown data 01 aa 003b0000 00028000[0m
D (215) boot: load partition table entry 0x3c0080c0[0m
D (216) boot: type=1 subtype=2[0m
[0;32mI (220) boot: 6 factory_nvs WiFi data 01 02 003e0000 00004000[0m
[0;32mI (227) boot: End of partition table[0m
D (231) boot: OTA data offset 0xd000[0m
D (235) bootloader_flash: mmu set paddr=00000000 count=1 size=2000 src_addr=d000 src_addr_aligned=0[0m
D (244) boot: otadata[0]: sequence values 0xffffffff[0m
D (249) boot: otadata[1]: sequence values 0xffffffff[0m
D (254) boot: OTA sequence numbers both empty (all-0xFF) or partition table does not have bootable ota_apps (app_count=2)[0m
[0;32mI (265) boot: No factory image, trying OTA 0[0m
D (270) boot: Trying partition index 0 offs 0x10000 size 0x180000[0m
D (276) esp_image: reading image header @ 0x10000[0m
D (281) bootloader_flash: mmu set block paddr=0x00010000 (was 0xffffffff)[0m
D (288) esp_image: image header: 0xe9 0x06 0x03 0x02 40375428[0m
V (294) esp_image: loading segment header 0 at offset 0x10018[0m
V (300) esp_image: segment data length 0x2bee4 data starts 0x10020[0m
V (306) esp_image: segment 0 map_segment 1 segment_data_offs 0x10020 load_addr 0x3c0e0020[0m
[0;32mI (314) esp_image: segment 0: paddr=00010020 vaddr=3c0e0020 size=2bee4h (179940) map[0m
D (323) esp_image: free data page_count 0x0000003f[0m
D (327) bootloader_flash: mmu set paddr=00010000 count=3 size=2bee4 src_addr=10020 src_addr_aligned=10000[0m
V (387) esp_image: loading segment header 1 at offset 0x3bf04[0m
D (387) bootloader_flash: mmu set block paddr=0x00030000 (was 0xffffffff)[0m
V (389) esp_image: segment data length 0x410c data starts 0x3bf0c[0m
V (395) esp_image: segment 1 map_segment 0 segment_data_offs 0x3bf0c load_addr 0x3fc95660[0m
[0;32mI (403) esp_image: segment 1: paddr=0003bf0c vaddr=3fc95660 size=0410ch ( 16652) load[0m
D (411) esp_image: free data page_count 0x0000003f[0m
D (417) bootloader_flash: mmu set paddr=00030000 count=2 size=410c src_addr=3bf0c src_addr_aligned=30000[0m
V (431) esp_image: loading segment header 2 at offset 0x40018[0m
D (432) bootloader_flash: mmu set block paddr=0x00040000 (was 0xffffffff)[0m
V (439) esp_image: segment data length 0xd487c data starts 0x40020[0m
V (445) esp_image: segment 2 map_segment 1 segment_data_offs 0x40020 load_addr 0x42000020[0m
[0;32mI (453) esp_image: segment 2: paddr=00040020 vaddr=42000020 size=d487ch (870524) map[0m
D (461) esp_image: free data page_count 0x0000003f[0m
D (466) bootloader_flash: mmu set paddr=00040000 count=14 size=d487c src_addr=40020 src_addr_aligned=40000[0m
[15:14:37.197]收←◆V (718) esp_image: loading segment header 3 at offset 0x11489c[0m
D (723) bootloader_flash: mmu set block paddr=0x00110000 (was 0xffffffff)[0m
V (724) esp_image: segment data length 0x205c data starts 0x1148a4[0m
V (726) esp_image: segment 3 map_segment 0 segment_data_offs 0x1148a4 load_addr 0x3fc9976c[0m
[0;32mI (734) esp_image: segment 3: paddr=001148a4 vaddr=3fc9976c size=0205ch ( 8284) load[0m
D (743) esp_image: free data page_count 0x0000003f[0m
D (748) bootloader_flash: mmu set paddr=00110000 count=1 size=205c src_addr=1148a4 src_addr_aligned=110000[0m
V (760) esp_image: loading segment header 4 at offset 0x116900[0m
D (763) bootloader_flash: mmu set block paddr=0x00110000 (was 0xffffffff)[0m
V (770) esp_image: segment data length 0x11660 data starts 0x116908[0m
V (776) esp_image: segment 4 map_segment 0 segment_data_offs 0x116908 load_addr 0x40374000[0m
[0;32mI (785) esp_image: segment 4: paddr=00116908 vaddr=40374000 size=11660h ( 71264) load[0m
D (793) esp_image: free data page_count 0x0000003f[0m
D (798) bootloader_flash: mmu set paddr=00110000 count=2 size=11660 src_addr=116908 src_addr_aligned=110000[0m
V (831) esp_image: loading segment header 5 at offset 0x127f68[0m
D (831) bootloader_flash: mmu set block paddr=0x00120000 (was 0xffffffff)[0m
V (832) esp_image: segment data length 0x10 data starts 0x127f70[0m
V (838) esp_image: segment 5 map_segment 0 segment_data_offs 0x127f70 load_addr 0x50000000[0m
[0;32mI (847) esp_image: segment 5: paddr=00127f70 vaddr=50000000 size=00010h ( 16) load[0m
D (855) esp_image: free data page_count 0x0000003f[0m
D (860) bootloader_flash: mmu set paddr=00120000 count=1 size=10 src_addr=127f70 src_addr_aligned=120000[0m
V (870) esp_image: image start 0x00010000 end of last section 0x00127f80[0m
D (876) bootloader_flash: mmu set block paddr=0x00120000 (was 0xffffffff)[0m
D (883) boot: Calculated hash: 73875f6ea4b3b99aa7b62e532e80fd10274bc1c1a6494754c2eb276a2aface42[0m
[0;32mI (900) boot: Loaded app from partition at offset 0x10000[0m
[0;32mI (952) boot: Set actual ota_seq=1 in otadata[0][0m
[0;32mI (953) boot: Disabling RNG early entropy source...[0m
D (953) boot: Mapping segment 0 as DROM[0m
D (956) boot: Mapping segment 2 as IROM[0m
D (960) boot: calling set_cache_and_start_app[0m
D (964) boot: configure drom and irom and start[0m
V (969) boot: d mmu set paddr=00010000 vaddr=3c0e0000 size=179940 n=3[0m
V (975) boot: rc=0[0m
V (977) boot: i mmu set paddr=00040000 vaddr=42000000 size=870524 n=14[0m
V (984) boot: rc=0[0m
D (986) boot: start: 0x40375428[0m
[0;31mE (1001) cpu_start: Octal Flash option selected, but EFUSE not configured![0m
abort() was called at PC 0x4037551c on core 0
Backtrace:0x40375c6e:0x3fceb2500x4037d44d:0x3fceb270 0x40383442:0x3fceb290 0x4037551c:0x3fceb300 0x403bb268:0x3fceb330 0x403bb7c9:0x3fceb380 0x403b62ed:0x3fceb4b0 0x40045c01:0x3fceb570 |<-CORRUPTED
ELF file SHA256: 1ac55452e6cd1797
[0;32mI (1023) esp_core_dump_uart: Press Enter to print core dump to UART...[0m
[15:14:38.508]收←◆[0;32mI (2030) esp_core_dump_uart: Print core dump to uart...[0m
assert failed: vTaskGetSnapshot task_snapshot.c:121 (xPortCheckValidTCBMem(pxTask))
Backtrace:0x40375c6e:0x3fceadd00x4037d44d:0x3fceadf0 0x40383539:0x3fceae10 0x403801ea:0x3fceaf30 0x42071dc3:0x3fceaf50 0x4207251e:0x3fceaf80 0x42072948:0x3fceb000 0x42071d6f:0x3fceb030 0x42072099:0x3fceb050 0x42004d90:0x3fceb0b0 0x4200468e:0x3fceb120 0x40375861:0x3fceb170 0x403769e2:0x3fceb190 0x40375c6e:0x3fceb250 0x4037d44d:0x3fceb270 0x40383442:0x3fceb290 0x4037551c:0x3fceb300 0x403bb268:0x3fceb330 0x403bb7c9:0x3fceb380 0x403b62ed:0x3fceb4b0 0x40045c01:0x3fceb570 |<-CORRUPTED
ELF file SHA256: 1ac55452e6cd1797
Re-entered core dump! Exception happened during core dump!
CPU halted.