U-Boot SPL 2021.01-tq-g41169928324 (Aug 15 2022 - 16:23:09 +0200) Selected configuration for 1 GiB RAM SYSFW ABI: 3.1 (firmware rev 0x0008 '8.4.1--v08.04.01 (Jolly Jellyfi') SPL initial stack usage: 13408 bytes Trying to boot from MMC2 spl_load_fit_image: Skip load 'dm': image size is 0! Starting ATF on ARM64 core... NOTICE: BL31: v2.5(release):08.01.00.001-dirty NOTICE: BL31: Built : 23:53:39, May 27 2021 U-Boot SPL 2021.01-tq-g41169928324 (Aug 16 2022 - 11:46:32 +0200) SYSFW ABI: 3.1 (firmware rev 0x0008 '8.4.1--v08.04.01 (Jolly Jellyfi') Trying to boot from MMC2 U-Boot 2021.01-tq-g41169928324 (Aug 16 2022 - 11:46:32 +0200) SoC: AM64X SR1.0 GP Model: TQ-Systems TQMa64xxL SoM on MBax4xxL carrier board DRAM: 1 GiB cdns3_bind: not able to bind usb device mode MMC: mmc@fa10000: 0, mmc@fa00000: 1 Loading Environment from MMC... OK In: serial@2800000 Out: serial@2800000 Err: serial@2800000 EEPROM: ID: TQMa6442L-P1 REV.0100 SN: 12345678 MAC: 02:03:04:05:06:07 VARD CRC: 4354 (calculated 4354) [OKAY] HW REV: 01xx RAM: type 1, 1024 MiB, no ECC RTC: yes SPI-NOR: yes eMMC: yes SE: no EEPROM: type 1, 8 KiB, pagesize 32 Net: eth0: ethernet@8000000port@1 Hit any key to stop autoboot: 0 => sf probe dma_memcpy: 00000000bdef2f00 00000000bdef2f40 53 46 44 50 06 01 02 ff 00 06 01 10 30 00 00 ff dma_memcpy: 00000000bdef9040 00000000bdef9080 00 00 00 00 00 00 00 00 e0 88 00 00 00 00 00 00 dma_memcpy: 00000000bdef9280 00000000bdef92c0 00 00 00 00 00 00 00 00 a0 86 00 00 00 00 00 00 10 5a fc bf 00 00 00 00 10 5a fc bf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 SF: Detected mx66u51235f with page size 1 Bytes, erase size 64 KiB, total 0 Bytes => sf probe dma_memcpy: 00000000bdef9b00 00000000bdef9b40 10 5a fc bf 00 00 00 00 10 5a fc bf 00 00 00 00 SF: Detected mx66u51235f with page size 256 Bytes, erase size 64 KiB, total 64 MiB => sf probe dma_memcpy: 00000000bdefa380 00000000bdefa3c0 53 46 44 50 06 01 02 ff 00 06 01 10 30 00 00 ff dma_memcpy: 00000000bdefa5c0 00000000bdefa600 c2 00 01 04 10 01 00 ff 84 00 01 02 c0 00 00 ff dma_memcpy: 00000000bdefa640 00000000bdefa680 e5 20 fb ff ff ff ff 1f 44 eb 08 6b 08 3b 04 bb fe ff ff ff ff ff 00 ff ff ff 44 eb 0c 20 0f 52 10 d8 00 ff d3 49 c5 00 81 df 04 e3 44 01 07 38 30 b0 30 b0 f7 bd d5 5c 4a 9e 29 ff f0 50 f9 85 SF: Detected mx66u51235f with page size 256 Bytes, erase size 64 KiB, total 64 MiB => sf probe dma_memcpy: 00000000bdefae80 00000000bdefaec0 53 46 44 50 06 01 02 ff 00 06 01 10 30 00 00 ff dma_memcpy: 00000000bdefb0c0 00000000bdefb100 00 00 00 00 00 00 00 00 60 68 00 00 00 00 00 00 dma_memcpy: 00000000bdefb300 00000000bdefb340 00 00 00 00 00 00 00 00 20 66 00 00 00 00 00 00 10 5a fc bf 00 00 00 00 10 5a fc bf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 SF: Detected mx66u51235f with page size 1 Bytes, erase size 64 KiB, total 0 Bytes => sf probe dma_memcpy: 00000000bdefa880 00000000bdefa8c0 53 46 44 50 06 01 02 ff 00 06 01 10 30 00 00 ff dma_memcpy: 00000000bdefa880 00000000bdefa8c0 c2 00 01 04 10 01 00 ff 84 00 01 02 c0 00 00 ff dma_memcpy: 00000000bdefbec0 00000000bdefbf00 e5 20 fb ff ff ff ff 1f 44 eb 08 6b 08 3b 04 bb fe ff ff ff ff ff 00 ff ff ff 44 eb 0c 20 0f 52 10 d8 00 ff d3 49 c5 00 81 df 04 e3 44 01 07 38 30 b0 30 b0 f7 bd d5 5c 4a 9e 29 ff f0 50 f9 85 SF: Detected mx66u51235f with page size 256 Bytes, erase size 64 KiB, total 64 MiB => sf probe dma_memcpy: 00000000bdefa880 00000000bdefa8c0 53 46 44 50 06 01 02 ff 00 06 01 10 30 00 00 ff dma_memcpy: 00000000bdefb540 00000000bdefb580 c2 00 01 04 10 01 00 ff 84 00 01 02 c0 00 00 ff dma_memcpy: 00000000bdefa880 00000000bdefa8c0 e5 20 fb ff ff ff ff 1f 44 eb 08 6b 08 3b 04 bb fe ff ff ff ff ff 00 ff ff ff 44 eb 0c 20 0f 52 10 d8 00 ff d3 49 c5 00 81 df 04 e3 44 01 07 38 30 b0 30 b0 f7 bd d5 5c 4a 9e 29 ff f0 50 f9 85 SF: Detected mx66u51235f with page size 256 Bytes, erase size 64 KiB, total 64 MiB =>