Welcome! Log In Create A New Profile

Advanced

Testing new Dockstar Uboot : prefetch abort

Posted by cuagn 
Testing new Dockstar Uboot : prefetch abort
May 25, 2011 01:30PM
Context : I’ve a bricked Dockstar (over 4 re-flashed with OpenWrt) for a while and decided to reinstall mtd0 Uboot using JTAG (BusBlaster with OpenOCD)

No problem to load Jeff Uboot image in memory (first part of the full process) but I faced difficulties when I wanted to test it before writing it in the flash memory.

The normal process is described in plugapps.

Basically :

"13. type load_image uboot.mtd0.dockstar.jeff-2010-10-23.kwb 0x800000
14. type resume 0x800200"


There is one issue as the default uboot doesn’t a resume command…

Anyway, here in Jeff guidelines, there is more or less the same approach… to change Uboot.

"tftp 0x800000 uboot.mtd0.kwb
go 0x800200

Notice that we load the image at 0x800000 but start running it from 0x800200. This is because the first 0x200 bytes of are the kirkwood image header, and the real executable starts after the header."


So using an “functional” Dockstar with it’s basic Uboot, I’ve download Jeff’s image in 0x800000 and tried to start with a go 0x800200

It doesn’t work: prefetch abort

As there is no doubt that Jeff’s Uboot is OK, I probably made something wrong.

Question : What ?


U-Boot 1.1.4 (Jul 16 2009 - 21:02:16) Cloud Engines (3.4.16)
U-Boot code: 00600000 -> 0067FFF0  BSS: -> 00690D60

Soc: 88F6281 A0 (DDR2)
CPU running @ 1200Mhz L2 running @ 400Mhz
SysClock = 400Mhz , TClock = 200Mhz 

DRAM CAS Latency = 5 tRP = 5 tRAS = 18 tRCD=6
DRAM CS[0] base 0x00000000   size 128MB 
DRAM Total size 128MB  16bit width
Flash:  0 kB
Addresses 8M - 0M are saved for the U-Boot usage.
Mem malloc Initialization (8M - 7M): Done
NAND:256 MB

CPU : Marvell Feroceon (Rev 1)
CLOUD ENGINES BOARD: REDSTONE:1.0

Streaming disabled 
Write allocate disabled


USB 0: host mode
PEX 0: interface detected no Link.
Net:   egiga0 [PRIME], egiga1
Hit any key to stop autoboot:  3     0

CE>> mw 0x800000 0 0x80000

CE>> md 0x800000 0x200

00800000: 00000000 00000000 00000000 00000000    ................
00800010: 00000000 00000000 00000000 00000000    ................
00800020: 00000000 00000000 00000000 00000000    ................
....
008007d0: 00000000 00000000 00000000 00000000    ................
008007e0: 00000000 00000000 00000000 00000000    ................
008007f0: 00000000 00000000 00000000 00000000    ................

CE>> tftp 0x800000 uboot.mtd0.dockstar.jeff-2010-10-23.kwb

Using egiga0 device
TFTP from server 192.168.1.22; our IP address is 192.168.1.45
Filename 'uboot.mtd0.dockstar.jeff-2010-10-23.kwb'.
Load address: 0x800000
Loading: #################################################################
	 ######################################
done
Bytes transferred = 524288 (80000 hex)

CE>> md 0x800000 0x200

00800000: 0800008b 00052e74 00000000 00000200    ....t...........
00800010: 00600000 00600000 00000000 fd010000    ..`...`.........
00800020: 00000040 00000000 00000000 00000000    @...............
00800030: 00000000 00000000 00000000 00000000    ................
00800040: ffd100e0 1b1b1b9b ffd01400 43000c30    ............0..C
00800050: ffd01404 37543000 ffd01408 22125451    .....0T7....QT."
00800060: ffd0140c 00000a33 ffd01410 0000000d    ....3...........
00800070: ffd01414 00000000 ffd01418 00000000    ................
00800080: ffd0141c 00000c52 ffd01420 00000040    ....R... ...@...
00800090: ffd01424 0000f17f ffd01428 00085520    $.......(... U..
008000a0: ffd0147c 00008552 ffd01504 07fffff1    |...R...........
008000b0: ffd01508 10000000 ffd0150c 00000000    ................
008000c0: ffd01514 00000000 ffd0151c 00000000    ................
008000d0: ffd01494 00030000 ffd01498 00000000    ................
008000e0: ffd0149c 0000e803 ffd01480 00000001    ................
008000f0: 00000000 00000000 00000000 00000000    ................
00800100: 00000000 00000000 00000000 00000000    ................
00800110: 00000000 00000000 00000000 00000000    ................
00800120: 00000000 00000000 00000000 00000000    ................
00800130: 00000000 00000000 00000000 00000000    ................
00800140: 00000000 00000000 00000000 00000000    ................
00800150: 00000000 00000000 00000000 00000000    ................
00800160: 00000000 00000000 00000000 00000000    ................
00800170: 00000000 00000000 00000000 00000000    ................
00800180: 00000000 00000000 00000000 00000000    ................
00800190: 00000000 00000000 00000000 00000000    ................
008001a0: 00000000 00000000 00000000 00000000    ................
008001b0: 00000000 00000000 00000000 00000000    ................
008001c0: 00000000 00000000 00000000 00000000    ................
008001d0: 00000000 00000000 00000000 00000000    ................
008001e0: 00000000 00000000 00000000 00000000    ................
008001f0: 00000000 00000000 00000000 1c000000    ................
00800200: ea000012 e59ff014 e59ff014 e59ff014    ................
00800210: e59ff014 e59ff014 e59ff014 e59ff014    ................
00800220: 006000e0 00600140 006001a0 00600200    ..`.@.`...`...`.
00800230: 00600260 006002c0 00600320 deadbeef    `.`...`. .`.....
00800240: 00600000 00600000 00652e70 00699020    ..`...`.p.e. .i.
00800250: e10f0000 e3c0001f e38000d3 e129f000    ..............).
00800260: e24f0068 e51f102c e1500001 0a000007    h.O.,.....P.....
....
008007c0: eb00668b eafffffd 00600044 00600048    .f......D.`.H.`.
008007d0: 00652e80 00650804 00644d37 00644d3f    ..e...e.7Md.?Md.
008007e0: 00644d46 00651748 00644d4f 00655400    FMd.H.e.OMd..Te.
008007f0: 00644d58 e12fff1e e3a00000 e12fff1e    XMd.../......./.

CE>> go 0x800200

## Starting application at 0x00800200 ...
prefetch abort
pc : [<00000160>]	   lr : [<00000064>]
sp : 004fff60  ip : 00020000	 fp : 005ff258
r10: 00000000  r9 : 00000000	 r8 : 004fffe0
r7 : 13901082  r6 : 00000000	 r5 : 00000008  r4 : 006235fc
r3 : 00650804  r2 : f101001c	 r1 : ffffffee  r0 : 00000000
Flags: nZCv  IRQs off  FIQs off  Mode SVC_32
Resetting CPU ...

resetting ...


U-Boot 1.1.4 (Jul 16 2009 - 21:02:16) Cloud Engines (3.4.16)

U-Boot code: 00600000 -> 0067FFF0  BSS: -> 00690D60

Soc: 88F6281 A0 (DDR2)
CPU running @ 1200Mhz L2 running @ 400Mhz
SysClock = 400Mhz , TClock = 200Mhz 

DRAM CAS Latency = 5 tRP = 5 tRAS = 18 tRCD=6
DRAM CS[0] base 0x00000000   size 128MB 
DRAM Total size 128MB  16bit width
Flash:  0 kB
Addresses 8M - 0M are saved for the U-Boot usage.
Mem malloc Initialization (8M - 7M): Done
NAND:256 MB

CPU : Marvell Feroceon (Rev 1)
CLOUD ENGINES BOARD: REDSTONE:1.0

Streaming disabled 
Write allocate disabled


USB 0: host mode
PEX 0: interface detected no Link.
Net:   egiga0 [PRIME], egiga1
Hit any key to stop autoboot:  3     0
CE>> 




Edited 4 time(s). Last edit at 05/26/2011 09:25AM by cuagn.
Re: Testing new Dockstar Uboot : prefetch abort
May 27, 2011 03:27AM
There is also the "bootm" command.

Let's try it:
CE>> bootm 0x800000

## Booting image at 00800000 ...
Bad Magic Number

Nobody here with at least one idea ?
Re: Testing new Dockstar Uboot : prefetch abort
May 27, 2011 03:37AM
Same player shoot again ...

tftpboot may be ?

CE>> tftpboot mtd0

Using egiga0 device
TFTP from server 192.168.1.22; our IP address is 192.168.1.45
Filename 'mtd0'.
Load address: 0x0
Loading: *#################################################################
	 ######################################
done
Bytes transferred = 524288 (80000 hex)
CE>> go 0x0

## Starting application at 0x00000000 ...

Led still blinking yellow, but nothing else ...
Why not try things from OpenOCD since you have JTAG access? When you are done, flash to NAND from uboot.
Re: Testing new Dockstar Uboot : prefetch abort
May 28, 2011 05:45AM
dpffan Wrote:
-------------------------------------------------------
> Why not try things from OpenOCD since you have
> JTAG access? When you are done, flash to NAND from
> uboot.
I'm trying to find a solution, or at least to understand where is the problem, using different sources of information and forums.

plugsapp, openocd, and doozan.

Not excluding (as I'm french) our basic forum here where I share with some other friends a lot of information.

Regards.

Marc
Author:

Your Email:


Subject:


Spam prevention:
Please, enter the code that you see below in the input field. This is for blocking bots that try to post this form automatically. If the code is hard to read, then just try to guess it right. If you enter the wrong code, a new image is created and you get another chance to enter it right.
Message: