AM62A7: Watchdog cannot be enabled

Part Number: AM62A7

Hi, TI experts,

The specific project details are as follows:
Processor: AM62A7
SDK: 10.00.00.08
Boot method: EMMC boot

I attempted to activate the watchdog. After making the modifications as per the user manual, the watchdog did not function properly.

Here are my revisions:

for uboot: k3-am62a-main.dtsi

ScreenShot_2026-01-04_155740_434.png

for kernel: k3-am62a-main.dtsi

ScreenShot_2026-01-04_155710_218.png ScreenShot_2026-01-04_155615_798.png

I enabled the watchdog using wdctl. When the "Timeleft" value is 0, the system will not restart.

ScreenShot_2026-01-04_160752_287.png

 my hardware design:

  

I tried on the TI EVM, it also couldn't restart. 

Please assist with the analysis. Thank you.

 

Best Regards,

Gaogao

  • More Info,

    Using SDK 11_01_07_05, on the EVM platform, the watchdog function works properly.

    Using SDK 10_00_00_08, on the EVM platform, the watchdog does not function properly.

  • Hello Gaogao,

    Good job debugging by testing with a later SDK version on the TI EVM. That tells us that (at least on the EVM) this is not related to hardware.

    Do you still need to get watchdog working on SDK 10.0?

    The first thing I would check is to make sure that you are properly copying over the built files from the computer to the EVM, that is a pretty common mistake. It is unrelated to your question, but note that for the "Target Images" listed in the U-Boot documentation, the tiboot3-processor-type-here.bin file should be renamed on your EVM's memory to just tiboot3.bin, otherwise the bootloader will not use it.
    https://software-dl.ti.com/processor-sdk-linux/esd/AM62AX/10_01_00/exports/docs/linux/Foundational_Components/U-Boot/UG-General-Info.html

    Regards,

    Nick

  • Hi, Nick,

    Thanks for replying,

    Yes,I need to get watchdog working on SDK 10.0, please assist with the analysis. Thank you.

    And I used tisdk-edgeai-image-am62a-evm.wic.xz to verify on the TI EVM. 

    Regards,

    Gaogao

  • Hello Gaogao,

    Did you confirm that you properly updated the uboot files on your board after cleaning and rebuilding uboot?

    I do not have as much experience with u-boot, but I expect that the uboot hash that shows up in the terminal should change when you rebuild uboot, similar to the Linux kernel. Here is an example of where I would look in the boot logs (screenshot from an AM62x)

    U-Boot SPL 2025.01-00527-gd2a72467939e (Jul 01 2025 - 21:23:47 +0000)
    SYSFW ABI: 4.0 (firmware rev 0x000b '11.1.2--v11.01.02 (Fancy Rat)')
    Changed A53 CPU frequency to 1250000000Hz (T grade) in DT
    SPL initial stack usage: 13392 bytes
    Trying to boot from MMC2
    Authentication passed
    Authentication passed
    Authentication passed
    Authentication passed
    Authentication passed
    Starting ATF on ARM64 core...
    
    NOTICE:  BL31: v2.13.0(release):v2.13.0-240-gd90bb650fe-dirty
    NOTICE:  BL31: Built : 21:37:18, Jun 23 2025
    
    U-Boot SPL 2025.01-00527-gd2a72467939e (Jul 01 2025 - 21:23:47 +0000)
    SYSFW ABI: 4.0 (firmware rev 0x000b '11.1.2--v11.01.02 (Fancy Rat)')
    SPL initial stack usage: 2032 bytes
    Trying to boot from MMC2
    Authentication passed
    Authentication passed
    
    
    U-Boot 2025.01-00527-gd2a72467939e (Jul 01 2025 - 21:23:47 +0000)
    
    

    Regards,

    Nick

  • Dear Gao Canjian.

    would you please let us know the progress on your side? we would like to close this ticket in this week if there is no more update for long time.

    thanks a lot!

    yong

  • Hi, Yong, Nick,

    new information, 

    In SDK 10.0, I rebuilt u-boot and linux kernel, the watchdog is working. 

    But, to reduce bootloader time, we use the Optimized bootflow. there is no u-boot. 

    so I just rebuilt linux kernel, the watchdog is not working.

    https://software-dl.ti.com/processor-sdk-linux/esd/AM62AX/10_00_00/exports/docs/linux/How_to_Guides/Target/How_to_boot_quickly.html?highlight=sbl

    Regards,

    Gaogao

  • Hi, Nick,

    new information, 

    In SDK 10.0, I rebuilt u-boot and linux kernel, the watchdog is working. 

    But, to reduce bootloader time, we use the Optimized bootflow. there is no u-boot. 

    so I just rebuilt linux kernel, the watchdog is not working.

    https://software-dl.ti.com/processor-sdk-linux/esd/AM62AX/10_00_00/exports/docs/linux/How_to_Guides/Target/How_to_boot_quickly.html?highlight=sbl

    Regards,

    Gaogao

  • Hello Gaogao,

    The watchdog can generate an interrupt after it times out, but the watchdog timer itself is not the one who would reboot the processor. The typical configuration is that the watchdog interrupt is sent to the ESM module, and then the ESM module reboots the processor.

    In a "typical" boot, the ESM module is configured during u-boot. I wonder if the ESM module is not getting properly initialized?

    In the meantime, you can start debug by checking the watchdog status register CFG_WDSTATUS, and the Digital Watchdog Down Counter CFG_DWDCNTR (i.e., what is the status of the watchdog peripheral, and can you see the counter value changing over time?)  RE: AM62A7: Enabling the watchdog and testing  

    I am sending your thread over to a team member more familiar with falcon boot / fast boot to discuss general concepts around what happens to code that used to run during uboot when we enable fast boot. (e.g., whether there are duplicate drivers in the Linux kernel that we would expect to do all the same things as U-Boot without additional modifications, etc).

    Regards,

    Nick

  • Hi, Nick,

    In a "typical" boot, the watchdog is working properly. the watchdog interrupt can be sent to the ESM module, and the ESM module reboots the processor.

     

    In fast boot, the watchdog is not working. I enabled the watchdog using wdctl. The "Timeleft" can be gradually reduced from 60 to 0, but When the "Timeleft" value is 0, the system will not restart.

    ScreenShot_2026-01-04_160752_287.png

    As you said, In a "typical" boot, the ESM module is configured during u-boot.

    Was it because the ESM module was not configured in fast boot,  caused the watchdog not warking?

    Regards,

    gaogao

  • Hello Gaogao,

    Please share the values for the registers that I listed in my previous response so that we can double check that the watchdog peripheral is working as expected. devmem2 can be used to read register values.

    Regards,

    Nick

  • Hi,

    Please apply the following U-Boot devicetree patch in SDK10 and rebuild U-Boot.

    diff --git a/arch/arm/dts/k3-am62a-main.dtsi b/arch/arm/dts/k3-am62a-main.dtsi
    index 6b8d9975e73a..7d9a4ccd3137 100644
    --- a/arch/arm/dts/k3-am62a-main.dtsi
    +++ b/arch/arm/dts/k3-am62a-main.dtsi
    @@ -275,7 +275,7 @@
                    compatible = "ti,j721e-esm";
                    reg = <0x0 0x420000 0x0 0x1000>;
                    ti,esm-pins = <160>, <161>, <162>, <163>, <177>, <178>;
    -               bootph-pre-ram;
    +               bootph-all;
            };
    
            main_timer0: timer@2400000 {

  • Hello Bin,

    To double-check my understanding here:

    Google seems to indicate that "bootph-pre-ram" only applies to SPL code, not u-boot code, while "bootph-all" applies to u-boot, as well as everything before u-boot. I couldn't find anything specifically about Linux with an initial search.

    Is that correct for TI devices? Or does "bootph-pre-ram" and "bootph-all" mean something different for our devicetree files? (e.g., pre-ram for u-boot, all for Linux kernel?)

    Since the customer is removing u-boot, I am curious about how modifying the u-boot devicetree file in this manner helps them.

    Thanks,

    Nick

  • hi, Nick,

    Here are the values of CFG_DWDCNTR and CFG_WDSTATUS of watchdog device watchdog0 in fast boot mode. (watchdog error)

    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffff91f29000.
    Read at address  0x0E0000A0 (0xffff91f290a0): 0x01769CBF
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffffbeae9000.
    Read at address  0x0E0000A0 (0xffffbeae90a0): 0x0172DE49
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffff9383f000.
    Read at address  0x0E0000A0 (0xffff9383f0a0): 0x0170EFD9
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffffb09e3000.
    Read at address  0x0E0000A0 (0xffffb09e30a0): 0x016F0A96
    root@am62axx-evm:~# 
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffade0a000.
    Read at address  0x0E000098 (0xffffade0a098): 0x0000003A
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffbec82000.
    Read at address  0x0E000098 (0xffffbec82098): 0x0000003A
    root@am62axx-evm:~# 

    for compare, here are the values of CFG_DWDCNTR and CFG_WDSTATUS of watchdog device watchdog0 in typical boot mode. (watchdog working)

    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffffb4877000.
    Read at address  0x0E0000A0 (0xffffb48770a0): 0x0002698D
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffffb9fe4000.
    Read at address  0x0E0000A0 (0xffffb9fe40a0): 0x00020532
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffff97360000.
    Read at address  0x0E0000A0 (0xffff973600a0): 0x0001E6EE
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0e0000a0
    /dev/mem opened.
    Memory mapped at address 0xffff82f75000.
    Read at address  0x0E0000A0 (0xffff82f750a0): 0x00013B53
    root@am62axx-evm:~# 
    root@am62axx-evm:~# 
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffba047000.
    Read at address  0x0E000098 (0xffffba047098): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffa9381000.
    Read at address  0x0E000098 (0xffffa9381098): 0x00000000
    root@am62axx-evm:~# 

    Regards,

    gaogao

  • hi, Nick,

    in addition,

    the ESM Register in fast boot mode

    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffade0a000.
    Read at address  0x0E000098 (0xffffade0a098): 0x0000003A
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffbec82000.
    Read at address  0x0E000098 (0xffffbec82098): 0x0000003A
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420008
    /dev/mem opened.
    Memory mapped at address 0xffff8651a000.
    Read at address  0x00420008 (0xffff8651a008): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420010
    /dev/mem opened.
    Memory mapped at address 0xffff92cd1000.
    Read at address  0x00420010 (0xffff92cd1010): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420014
    /dev/mem opened.
    Memory mapped at address 0xffff89f78000.
    Read at address  0x00420014 (0xffff89f78014): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420018
    /dev/mem opened.
    Memory mapped at address 0xffff8dc3d000.
    Read at address  0x00420018 (0xffff8dc3d018): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42001C
    /dev/mem opened.
    Memory mapped at address 0xffffa0924000.
    Read at address  0x0042001C (0xffffa092401c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420020
    /dev/mem opened.
    Memory mapped at address 0xffffa33e9000.
    Read at address  0x00420020 (0xffffa33e9020): 0xFFFFFFFF
    root@am62axx-evm:~# 
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420024
    /dev/mem opened.
    Memory mapped at address 0xffffaeac2000.
    Read at address  0x00420024 (0xffffaeac2024): 0xFFFFFFFF
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420028
    /dev/mem opened.
    Memory mapped at address 0xffffb5327000.
    Read at address  0x00420028 (0xffffb5327028): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42002C
    /dev/mem opened.
    Memory mapped at address 0xffffb8ef7000.
    Read at address  0x0042002C (0xffffb8ef702c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420040
    /dev/mem opened.
    Memory mapped at address 0xffff82daf000.
    Read at address  0x00420040 (0xffff82daf040): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420044
    /dev/mem opened.
    Memory mapped at address 0xffff8599c000.
    Read at address  0x00420044 (0xffff8599c044): 0x00000001
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420048
    /dev/mem opened.
    Memory mapped at address 0xffffa0d52000.
    Read at address  0x00420048 (0xffffa0d52048): 0x00030D40
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42004C
    /dev/mem opened.
    Memory mapped at address 0xffffb0c42000.
    Read at address  0x0042004C (0xffffb0c4204c): 0x00030D40
    root@am62axx-evm:~# 
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420050
    /dev/mem opened.
    Memory mapped at address 0xffffae612000.
    Read at address  0x00420050 (0xffffae612050): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420054
    /dev/mem opened.
    Memory mapped at address 0xffffbb979000.
    Read at address  0x00420054 (0xffffbb979054): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420058
    /dev/mem opened.
    Memory mapped at address 0xffff8c475000.
    Read at address  0x00420058 (0xffff8c475058): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42005C
    /dev/mem opened.
    Memory mapped at address 0xffffbeea8000.
    Read at address  0x0042005C (0xffffbeea805c): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420400
    /dev/mem opened.
    Memory mapped at address 0xffffa9fe7000.
    Read at address  0x00420400 (0xffffa9fe7400): 0x00060080
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420420
    /dev/mem opened.
    Memory mapped at address 0xffff9118f000.
    Read at address  0x00420420 (0xffff9118f420): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420440
    /dev/mem opened.
    Memory mapped at address 0xffff8770a000.
    Read at address  0x00420440 (0xffff8770a440): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420460
    /dev/mem opened.
    Memory mapped at address 0xffffbe72e000.
    Read at address  0x00420460 (0xffffbe72e460): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420480
    /dev/mem opened.
    Memory mapped at address 0xffff84f29000.
    Read at address  0x00420480 (0xffff84f29480): 0x0000007F
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204A0
    /dev/mem opened.
    Memory mapped at address 0xffff95752000.
    Read at address  0x004204A0 (0xffff957524a0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204C0
    /dev/mem opened.
    Memory mapped at address 0xffff80074000.
    Read at address  0x004204C0 (0xffff800744c0): 0x00000001
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420404
    /dev/mem opened.
    Memory mapped at address 0xffffb8583000.
    Read at address  0x00420404 (0xffffb8583404): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420424
    /dev/mem opened.
    Memory mapped at address 0xffffa5e6a000.
    Read at address  0x00420424 (0xffffa5e6a424): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420444
    /dev/mem opened.
    Memory mapped at address 0xffffbd5e3000.
    Read at address  0x00420444 (0xffffbd5e3444): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420464
    /dev/mem opened.
    Memory mapped at address 0xffff82157000.
    Read at address  0x00420464 (0xffff82157464): 0x00000000
    root@am62axx-evm:~# devmem2 0x420484
    /dev/mem opened.
    Memory mapped at address 0xffffbbe03000.
    Read at address  0x00420484 (0xffffbbe03484): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204A4
    /dev/mem opened.
    Memory mapped at address 0xffff90c47000.
    Read at address  0x004204A4 (0xffff90c474a4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204C4
    /dev/mem opened.
    Memory mapped at address 0xffffb1164000.
    Read at address  0x004204C4 (0xffffb11644c4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420408
    /dev/mem opened.
    Memory mapped at address 0xffff9f6e4000.
    Read at address  0x00420408 (0xffff9f6e4408): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420428
    /dev/mem opened.
    Memory mapped at address 0xffff97703000.
    Read at address  0x00420428 (0xffff97703428): 0x00000000
    root@am62axx-evm:~# devmem2 0x420448
    /dev/mem opened.
    Memory mapped at address 0xffffb2f29000.
    Read at address  0x00420448 (0xffffb2f29448): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420468
    /dev/mem opened.
    Memory mapped at address 0xffffac0b7000.
    Read at address  0x00420468 (0xffffac0b7468): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420488
    /dev/mem opened.
    Memory mapped at address 0xffff9499f000.
    Read at address  0x00420488 (0xffff9499f488): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204A8
    /dev/mem opened.
    Memory mapped at address 0xffffafa9b000.
    Read at address  0x004204A8 (0xffffafa9b4a8): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204C8
    /dev/mem opened.
    Memory mapped at address 0xffff9bc87000.
    Read at address  0x004204C8 (0xffff9bc874c8): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42040C
    /dev/mem opened.
    Memory mapped at address 0xffffaf23f000.
    Read at address  0x0042040C (0xffffaf23f40c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42042C
    /dev/mem opened.
    Memory mapped at address 0xffff8c0ca000.
    Read at address  0x0042042C (0xffff8c0ca42c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42044C
    /dev/mem opened.
    Memory mapped at address 0xffff86b84000.
    Read at address  0x0042044C (0xffff86b8444c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42046C
    /dev/mem opened.
    Memory mapped at address 0xffffb13e5000.
    Read at address  0x0042046C (0xffffb13e546c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42048C
    /dev/mem opened.
    Memory mapped at address 0xffff8e1f0000.
    Read at address  0x0042048C (0xffff8e1f048c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204AC
    /dev/mem opened.
    Memory mapped at address 0xffffb69ff000.
    Read at address  0x004204AC (0xffffb69ff4ac): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204CC
    /dev/mem opened.
    Memory mapped at address 0xffff8a7cd000.
    Read at address  0x004204CC (0xffff8a7cd4cc): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420410
    /dev/mem opened.
    Memory mapped at address 0xffff991d3000.
    Read at address  0x00420410 (0xffff991d3410): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420430
    /dev/mem opened.
    Memory mapped at address 0xffff82574000.
    Read at address  0x00420430 (0xffff82574430): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420450
    /dev/mem opened.
    Memory mapped at address 0xffff9c4cf000.
    Read at address  0x00420450 (0xffff9c4cf450): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420470
    /dev/mem opened.
    Memory mapped at address 0xffff8017a000.
    Read at address  0x00420470 (0xffff8017a470): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420490
    /dev/mem opened.
    Memory mapped at address 0xffffb7a66000.
    Read at address  0x00420490 (0xffffb7a66490): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204B0
    /dev/mem opened.
    Memory mapped at address 0xffff97dbf000.
    Read at address  0x004204B0 (0xffff97dbf4b0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204D0
    /dev/mem opened.
    Memory mapped at address 0xffffb6289000.
    Read at address  0x004204D0 (0xffffb62894d0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204F0
    /dev/mem opened.
    Memory mapped at address 0xffffa7f89000.
    Read at address  0x004204F0 (0xffffa7f894f0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420414
    /dev/mem opened.
    Memory mapped at address 0xffff92b67000.
    Read at address  0x00420414 (0xffff92b67414): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420434
    /dev/mem opened.
    Memory mapped at address 0xffffbd4f8000.
    Read at address  0x00420434 (0xffffbd4f8434): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420454
    /dev/mem opened.
    Memory mapped at address 0xffff836e0000.
    Read at address  0x00420454 (0xffff836e0454): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420474
    /dev/mem opened.
    Memory mapped at address 0xffffaa3f5000.
    Read at address  0x00420474 (0xffffaa3f5474): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420494
    /dev/mem opened.
    Memory mapped at address 0xffffb254c000.
    Read at address  0x00420494 (0xffffb254c494): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204B4
    /dev/mem opened.
    Memory mapped at address 0xffff923ab000.
    Read at address  0x004204B4 (0xffff923ab4b4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204D4
    /dev/mem opened.
    Memory mapped at address 0xffffa675a000.
    Read at address  0x004204D4 (0xffffa675a4d4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204F4
    /dev/mem opened.
    Memory mapped at address 0xffff9ac3b000.
    Read at address  0x004204F4 (0xffff9ac3b4f4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420418
    /dev/mem opened.
    Memory mapped at address 0xffff8bef9000.
    Read at address  0x00420418 (0xffff8bef9418): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420438
    /dev/mem opened.
    Memory mapped at address 0xffffb1cc7000.
    Read at address  0x00420438 (0xffffb1cc7438): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420458
    /dev/mem opened.
    Memory mapped at address 0xffffa1aa3000.
    Read at address  0x00420458 (0xffffa1aa3458): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420478
    /dev/mem opened.
    Memory mapped at address 0xffffb9b75000.
    Read at address  0x00420478 (0xffffb9b75478): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420498
    /dev/mem opened.
    Memory mapped at address 0xffffbc7e2000.
    Read at address  0x00420498 (0xffffbc7e2498): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204B8
    /dev/mem opened.
    Memory mapped at address 0xffff868f8000.
    Read at address  0x004204B8 (0xffff868f84b8): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204D8
    /dev/mem opened.
    Memory mapped at address 0xffff8158d000.
    Read at address  0x004204D8 (0xffff8158d4d8): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204F8
    /dev/mem opened.
    Memory mapped at address 0xffffacab6000.
    Read at address  0x004204F8 (0xffffacab64f8): 0x00000000
    root@am62axx-evm:~# 

    the ESM Register in typical boot mode

    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffba047000.
    Read at address  0x0E000098 (0xffffba047098): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x0E000098
    /dev/mem opened.
    Memory mapped at address 0xffffa9381000.
    Read at address  0x0E000098 (0xffffa9381098): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420008
    /dev/mem opened.
    Memory mapped at address 0xffff86bd6000.
    Read at address  0x00420008 (0xffff86bd6008): 0x0000000F
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420010
    /dev/mem opened.
    Memory mapped at address 0xffffab2dd000.
    Read at address  0x00420010 (0xffffab2dd010): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420014
    /dev/mem opened.
    Memory mapped at address 0xffffbd154000.
    Read at address  0x00420014 (0xffffbd154014): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420018
    /dev/mem opened.
    Memory mapped at address 0xffff8cacd000.
    Read at address  0x00420018 (0xffff8cacd018): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42001C
    /dev/mem opened.
    Memory mapped at address 0xffff8ac40000.
    Read at address  0x0042001C (0xffff8ac4001c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420020
    /dev/mem opened.
    Memory mapped at address 0xffff9be58000.
    Read at address  0x00420020 (0xffff9be58020): 0xFFFFFFFF
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420024
    /dev/mem opened.
    Memory mapped at address 0xffffb37bc000.
    Read at address  0x00420024 (0xffffb37bc024): 0xFFFFFFFF
    root@am62axx-evm:~# devmem2 0x420028
    /dev/mem opened.
    Memory mapped at address 0xffffacf34000.
    Read at address  0x00420028 (0xffffacf34028): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42002C
    /dev/mem opened.
    Memory mapped at address 0xffff9b087000.
    Read at address  0x0042002C (0xffff9b08702c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420040
    /dev/mem opened.
    Memory mapped at address 0xffffaf44c000.
    Read at address  0x00420040 (0xffffaf44c040): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420044
    /dev/mem opened.
    Memory mapped at address 0xffffbe2ff000.
    Read at address  0x00420044 (0xffffbe2ff044): 0x00000001
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420048
    /dev/mem opened.
    Memory mapped at address 0xffff8483e000.
    Read at address  0x00420048 (0xffff8483e048): 0x00030D40
    root@am62axx-evm:~# 
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42004C
    /dev/mem opened.
    Memory mapped at address 0xffffa371b000.
    Read at address  0x0042004C (0xffffa371b04c): 0x00030D40
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420050
    /dev/mem opened.
    Memory mapped at address 0xffffb969b000.
    Read at address  0x00420050 (0xffffb969b050): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420054
    /dev/mem opened.
    Memory mapped at address 0xffff920e6000.
    Read at address  0x00420054 (0xffff920e6054): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420058
    /dev/mem opened.
    Memory mapped at address 0xffffa6bf6000.
    Read at address  0x00420058 (0xffffa6bf6058): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42005C
    /dev/mem opened.
    Memory mapped at address 0xffff940ec000.
    Read at address  0x0042005C (0xffff940ec05c): 0x000186A0
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420400
    /dev/mem opened.
    Memory mapped at address 0xffff8abfa000.
    Read at address  0x00420400 (0xffff8abfa400): 0x00000080
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420420
    /dev/mem opened.
    Memory mapped at address 0xffff81f37000.
    Read at address  0x00420420 (0xffff81f37420): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420440
    /dev/mem opened.
    Memory mapped at address 0xffff9e9e5000.
    Read at address  0x00420440 (0xffff9e9e5440): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420460
    /dev/mem opened.
    Memory mapped at address 0xffffbce8e000.
    Read at address  0x00420460 (0xffffbce8e460): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420480
    /dev/mem opened.
    Memory mapped at address 0xffff8cbac000.
    Read at address  0x00420480 (0xffff8cbac480): 0x00000018
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204A0
    /dev/mem opened.
    Memory mapped at address 0xffffacdc6000.
    Read at address  0x004204A0 (0xffffacdc64a0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204C0
    /dev/mem opened.
    Memory mapped at address 0xffff91dd7000.
    Read at address  0x004204C0 (0xffff91dd74c0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420404
    /dev/mem opened.
    Memory mapped at address 0xffff8dc9f000.
    Read at address  0x00420404 (0xffff8dc9f404): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420424
    /dev/mem opened.
    Memory mapped at address 0xffff9f00d000.
    Read at address  0x00420424 (0xffff9f00d424): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420444
    /dev/mem opened.
    Memory mapped at address 0xffffbbd0a000.
    Read at address  0x00420444 (0xffffbbd0a444): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420464
    /dev/mem opened.
    Memory mapped at address 0xffff9df02000.
    Read at address  0x00420464 (0xffff9df02464): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420484
    /dev/mem opened.
    Memory mapped at address 0xffff88732000.
    Read at address  0x00420484 (0xffff88732484): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204A4
    /dev/mem opened.
    Memory mapped at address 0xffffb54da000.
    Read at address  0x004204A4 (0xffffb54da4a4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204C4
    /dev/mem opened.
    Memory mapped at address 0xffffb7f34000.
    Read at address  0x004204C4 (0xffffb7f344c4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420408
    /dev/mem opened.
    Memory mapped at address 0xffff9cf2f000.
    Read at address  0x00420408 (0xffff9cf2f408): 0x00000000
    root@am62axx-evm:~# devmem2 0x420428
    /dev/mem opened.
    Memory mapped at address 0xffffb0c7e000.
    Read at address  0x00420428 (0xffffb0c7e428): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420448
    /dev/mem opened.
    Memory mapped at address 0xffffaa155000.
    Read at address  0x00420448 (0xffffaa155448): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420468
    /dev/mem opened.
    Memory mapped at address 0xffff9df39000.
    Read at address  0x00420468 (0xffff9df39468): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420488
    /dev/mem opened.
    Memory mapped at address 0xffff89823000.
    Read at address  0x00420488 (0xffff89823488): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204A8
    /dev/mem opened.
    Memory mapped at address 0xffff8bf15000.
    Read at address  0x004204A8 (0xffff8bf154a8): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204C8
    /dev/mem opened.
    Memory mapped at address 0xffff968f6000.
    Read at address  0x004204C8 (0xffff968f64c8): 0x0006100B
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42040C
    /dev/mem opened.
    Memory mapped at address 0xffffb3664000.
    Read at address  0x0042040C (0xffffb366440c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42042C
    /dev/mem opened.
    Memory mapped at address 0xffffa57be000.
    Read at address  0x0042042C (0xffffa57be42c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42044C
    /dev/mem opened.
    Memory mapped at address 0xffff8ec04000.
    Read at address  0x0042044C (0xffff8ec0444c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42046C
    /dev/mem opened.
    Memory mapped at address 0xffff939cc000.
    Read at address  0x0042046C (0xffff939cc46c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x42048C
    /dev/mem opened.
    Memory mapped at address 0xffff9e8de000.
    Read at address  0x0042048C (0xffff9e8de48c): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204AC
    /dev/mem opened.
    Memory mapped at address 0xffff86b7f000.
    Read at address  0x004204AC (0xffff86b7f4ac): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204CC
    /dev/mem opened.
    Memory mapped at address 0xffffae242000.
    Read at address  0x004204CC (0xffffae2424cc): 0x0006100B
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420410
    /dev/mem opened.
    Memory mapped at address 0xffff8cc5a000.
    Read at address  0x00420410 (0xffff8cc5a410): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420430
    /dev/mem opened.
    Memory mapped at address 0xffff853e0000.
    Read at address  0x00420430 (0xffff853e0430): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420450
    /dev/mem opened.
    Memory mapped at address 0xffffb1dba000.
    Read at address  0x00420450 (0xffffb1dba450): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420470
    /dev/mem opened.
    Memory mapped at address 0xffff88c15000.
    Read at address  0x00420470 (0xffff88c15470): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420490
    /dev/mem opened.
    Memory mapped at address 0xffffbcfee000.
    Read at address  0x00420490 (0xffffbcfee490): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204B0
    /dev/mem opened.
    Memory mapped at address 0xffffba396000.
    Read at address  0x004204B0 (0xffffba3964b0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204D0
    /dev/mem opened.
    Memory mapped at address 0xffff8ded6000.
    Read at address  0x004204D0 (0xffff8ded64d0): 0x0006100B
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204F0
    /dev/mem opened.
    Memory mapped at address 0xffffa260f000.
    Read at address  0x004204F0 (0xffffa260f4f0): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420414
    /dev/mem opened.
    Memory mapped at address 0xffff8b0ea000.
    Read at address  0x00420414 (0xffff8b0ea414): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420434
    /dev/mem opened.
    Memory mapped at address 0xffff91d68000.
    Read at address  0x00420434 (0xffff91d68434): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420454
    /dev/mem opened.
    Memory mapped at address 0xffff80283000.
    Read at address  0x00420454 (0xffff80283454): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420474
    /dev/mem opened.
    Memory mapped at address 0xffff9a6e5000.
    Read at address  0x00420474 (0xffff9a6e5474): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420494
    /dev/mem opened.
    Memory mapped at address 0xffffb3f07000.
    Read at address  0x00420494 (0xffffb3f07494): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204B4
    /dev/mem opened.
    Memory mapped at address 0xffff833d1000.
    Read at address  0x004204B4 (0xffff833d14b4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204D4
    /dev/mem opened.
    Memory mapped at address 0xffff9840d000.
    Read at address  0x004204D4 (0xffff9840d4d4): 0x0006100B
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204F4
    /dev/mem opened.
    Memory mapped at address 0xffffb87af000.
    Read at address  0x004204F4 (0xffffb87af4f4): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420418
    /dev/mem opened.
    Memory mapped at address 0xffffab04a000.
    Read at address  0x00420418 (0xffffab04a418): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420438
    /dev/mem opened.
    Memory mapped at address 0xffff922de000.
    Read at address  0x00420438 (0xffff922de438): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420458
    /dev/mem opened.
    Memory mapped at address 0xffff8c214000.
    Read at address  0x00420458 (0xffff8c214458): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420478
    /dev/mem opened.
    Memory mapped at address 0xffffbd37a000.
    Read at address  0x00420478 (0xffffbd37a478): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x420498
    /dev/mem opened.
    Memory mapped at address 0xffff9ecb4000.
    Read at address  0x00420498 (0xffff9ecb4498): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204B8
    /dev/mem opened.
    Memory mapped at address 0xffff85a7a000.
    Read at address  0x004204B8 (0xffff85a7a4b8): 0x00000000
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204D8
    /dev/mem opened.
    Memory mapped at address 0xffff957cb000.
    Read at address  0x004204D8 (0xffff957cb4d8): 0x0006100B
    root@am62axx-evm:~# 
    root@am62axx-evm:~# devmem2 0x4204F8
    /dev/mem opened.
    Memory mapped at address 0xffffaf7df000.
    Read at address  0x004204F8 (0xffffaf7df4f8): 0x00000000
    root@am62axx-evm:~# 

    Regards,

    gaogao

  • Hi Nick,

    Google seems to indicate that "bootph-pre-ram" only applies to SPL code, not u-boot code, while "bootph-all" applies to u-boot, as well as everything before u-boot. I couldn't find anything specifically about Linux with an initial search.

    Is that correct for TI devices? Or does "bootph-pre-ram" and "bootph-all" mean something different for our devicetree files? (e.g., pre-ram for u-boot, all for Linux kernel?)

    All the enabled devicetree nodes are available in U-Boot proper regardless the bootph-* properties.

    "bootph-pre-ram" enables the nodes for SPL, but this is the A53 SPL, not R5 SPL on TI K3 devices.

    "bootph-all" enables the nodes all the way to R5 SPL, including A53 SPL.

    Since the customer is removing u-boot, I am curious about how modifying the u-boot devicetree file in this manner helps them.

    The patch changes to bootph-all for the ESM node, so that it is available in R5 SPL.

  • hi,Nick,

    any update?

    Regards,

    gaogao

  • Hi Gaogao,

    Can you please confirm if you have already applied the devicetree patch to U-Boot (using "bootph-all" for the esm node in k3-am62a-main.dtsi and it doesn't resolve the problem?

  • hi, Bin,

    We are using SBL boot. here is the bootflow.

    there is no R5 SPL or u-boot. 

    I don't understand why we need to modify the devicetree in u-boot

    Regards,

    gaogao

  • Hi Gaogao,

    You previously mentioned rebuild U-Boot, so I just assumed you use U-Boot falcon mode for fast boot.

    Anyway, if watchdog works with SDK11.1 but you still need to use SDK10.0, can you try to use SBL in SDK11.1 to boot Linux in SDK10.0 to see if watchdog still works? If so, is this software combination a solution for you?

  • Hi, Bin,

    Let me explain the current situation.

    we use  SDK10.0 .

    In the beginning, we used the "typical" boot (SPL -> u-boot -> kernel).

    In "typical" boot,  I modified the DTS in u-boot and kernel, the watchdog is working. 

    Now, to reduce bootloader time, we use the falcon mode.

    In the falcon mode, there is no u-boot, so I only modified DTS in kernel. and the watchdog is not working

  • Hi Gaogao,

    Now, to reduce bootloader time, we use the falcon mode.

    Falcon mode is only relevant to U-Boot, in which R5 SPL directly boot ATF+kernel. Do you use this boot method?

    Or do you use R5 SBL1+SBL2+ATF+kernel as the diagram you posted above? This fast boot method is not called falcon boot.

    When you say SDK11.1 works, what exactly works? "typical" boot, or falcon boot, or SBL+ATF+kernel boot as in the diagram above?

  • hi, Bin,

    I misunderstood. I thought " falcon boot " = " R5 SBL1+R5 SBL2+ATF+kernel boot "

    Let me re-explain the current situation.

    in SDK10.0:

    "typical" boot, watchdog  is working.

    " R5 SBL1+R5 SBL2+ATF+kernel boot ", the watchdog is not working

    in SDK11.1:

    "typical" boot, watchdog  is working.

    " R5 SBL1+R5 SBL2+ATF+kernel boot ", have not tried yet.

  • Hi Gaogao,

    Thanks for the explanation. Now I understand you don't use U-Boot at all in fast boot.

    SBL is out of my support domain, I am not sure if it supports configuring watchdog at all. I am handing back your query to Nick for further assistance.

  • Hi,

    The thread owner is out of office till until week of Feb 17. Please ping the thread if you do not get an update during that week.

    Thank you for your patience.

    Regards,
    Harshith

  • hi,Nick,

    any update?

    Regards,

    gaogao

  • Hello Gaogao,

    Apologies for the continued delays. I have set aside some time to look into your threads on Thursday. I will provide more information then.

    Regards,

    Nick