Can you tell me function name that means 'Entry Point: 0x11000000' ?

Taeung treeze.taeung at gmail.com
Mon Mar 24 03:54:51 CET 2014


Thank you very very very very very much !!! Ahmed !! :-)

I've apply the patch file to my source.
So, i success booting "Hello world + L4/Fiasco" on Freescale i.MX6 Quad 
SABRE SD board.

Again, thank you for great help Ahmed and Tim, Matthias. :-)

Other peoples might have help from my thread for booting on my board or 
not, I'll share my document for booting on my board after elaborating 
it. :-)

Thank you L4 hackers.

- Taeung -

On 03/24/2014 11:14 AM, Ahmed Ammar wrote:
> Sorry but the git tree is private.
>
> It’s pretty clear from the men_layout-arm-imx.cpp you attached what needs to be changed:
>
> Uart_phys_base needs to be Uart1_phys_base …
>
> Ahmed.
>
> On Mar 23, 2014, at 8:53 PM, Taeung <treeze.taeung at gmail.com> wrote:
>
>> I've looked closely at the patch file you gave me .
>>
>> I've found that uart-imx.cpp and imx.cc could be  applied by the patch file but there is some difference between your 'mem_layout-arm-imx.cpp' and  my 'mem_layout-arm-imx.cpp'.
>> So, I was able to not apply the patch file to my 'mem_layout-arm-imx.cpp'.
>> How do you think about that ?
>>
>> Attached is my 'mem_layout-arm-imx.cpp'.
>>
>> I'm using a svn repository of which URL is "http://svn.tudos.org/repos/oc/tudos/trunk/repomgr | perl - inithttp://svn.tudos.org/repos/oc/tudos fiasco l4re".
>>
>> If you use other git repository, I want to tell me it's URL ,please .
>>
>>
>> * Refer to >
>> src/kernel/fiasco/src/kern/arm/bsp/imx/uart-imx.cpp
>> src/l4/pkg/bootstrap/server/src/platform/imx.cc
>> src/kernel/fiasco/src/kern/arm/bsp/imx/mem_layout-arm-imx.cpp
>>
>> - Taeung -
>>
>> On 03/23/2014 10:53 AM, Ahmed Ammar wrote:
>>> Attached is the patch we use for the saber_sd’s uart1:
>>>
>>>
>>>
>>>
>>> On Mar 21, 2014, at 5:02 PM, Matthias Lange <matthias.lange at kernkonzept.com>
>>>   wrote:ㅇ
>>>
>>>
>>>> Hi,
>>>>
>>>>
>>>>> On 21 Mar 2014, at 11:33, Taeung <treeze.taeung at gmail.com>
>>>>>   wrote:
>>>>>
>>>>> Hello, l4 hacker.
>>>>>
>>>>>
>>>>> I'm trying to boot "Hello world / L4/ Fiasco" on Freescale i.MX6 Quad SABRE SD board(Cortex-A9, ARMv7).
>>>>>
>>>>> I'm using 'u-boot' and 'uImage'.
>>>>> So, i build uimage by "make uimage E=hello ~...".
>>>>> And i've try to booting it on Freescale i.MX6q_sabre_sd board.
>>>>> But i did not it because stoped at "Starting kernel ..." !!
>>>>>
>>>> Probably you selected the wrong UART, so the system is not printing something on the serial line. Make sure you have the right UART driver for your platform and make sure you have selected the right one. Usually there are more than one UARTs and only one is connected to you serial line. You can also check Linux to see which UART it uses.
>>>>
>>>>
>>>>> MMC read: dev # 2, block # 2048, count 8192 ... 8192 blocks read: OK
>>>>> ## Booting kernel from Legacy Image at 10800000 ...
>>>>>   Image Name:   L4 Image #2
>>>>>   Image Type:   ARM Linux Kernel Image (uncompressed)
>>>>>   Data Size:    868352 Bytes = 848 kB
>>>>>   Load Address: 11000000
>>>>>   Entry Point:  11000000
>>>>>   Loading Kernel Image ... OK
>>>>> OK
>>>>>
>>>>> Starting kernel ...
>>>>>
>>>>>
>>>>> uimage's file name is "bootstrap_hello.uimage".
>>>>> "bootstrap_hello.uimage" has information such as
>>>>> "bootstrap_hello.uimage: u-boot legacy uImage, L4 Image #2, Linux/ARM, OS Kernel Image (Not compressed), 868352 bytes,
>>>>> Thu Mar 20 13:14:42 2014, Load Address: 0x11000000, Entry Point: 0x11000000, Header CRC: 0xBEA251F3, Data CRC: 0xA0217B7D"
>>>>>
>>>>> I have a question.
>>>>>
>>>>> Can you tell me function name that means 'Entry Point: 0x11000000' ?
>>>>>
>>>> In the uimage format the entry point is defined as the address where uboot should start, as the name implies, the execution of the image.
>>>>
>>>>
>>>> Matthias.
>>>> _______________________________________________
>>>> l4-hackers mailing list
>>>>
>>>> l4-hackers at os.inf.tu-dresden.de
>>>> http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers
>> <mem_layout-arm-imx.cpp>





More information about the l4-hackers mailing list