Currently I'm porting coreboot for atom e6xx processor board. This correction is a part of it.
Few more minor corrections to come. Once I feel its fully stable and reliable then I'll update it in git. My best try is to add the processor in coreboot supported procesor list - N Solanki On 23 Mar 2015 23:16, "ron minnich" <[email protected]> wrote: > Nice job, documents are almost always full of errors :-) > > Any way you can create a patch for some part of some code base? This email > will be forgotten quickly and we want > your hard-earned knowledge :-) > > ron > > On Mon, Mar 23, 2015 at 10:43 AM Naresh G. Solanki < > [email protected]> wrote: > >> Hi All, >> >> I was facing difficulty in enabling 0xE0000 & 0xF0000 segment on intel >> atom e6xx processor. >> >> As per guide (atom e6xx minimum boot requirements) in table 15 it was >> mentioned that the segment can be enabled by setting bit 1 & 2 of port 0 >> reg offset 3. I tried but it failed. >> >> I needed it to execute seabios successfully. >> >> By trial & error I found that instead of port 0 if I tried setting the >> bits in port 2 offset 3 , it served my purpose completely.( I think its >> wrongly documented in the guide I was refering) >> >> Now I'm able to execute seabios successfully. >> >> This post is just for your information, if in case it can help any one. >> >> Thank you for support. >> >> - N Solanki >> On 20 Mar 2015 21:03, "Naresh G. Solanki" <[email protected]> >> wrote: >> >>> As per reply from seabios mailing list, >>> the address range 0xE0000 to 0x10_0000 should have read write access and >>> that can be done with help of some magic bit. >>> >>> Does anyone knows about these magic bits. >>> The processor I'm working with is atom e6xx. >>> >>> -N Solanki >>> On 20 Mar 2015 19:24, "WANG FEI" <[email protected]> wrote: >>> >>>> I'm curious why your seabios payload is loading to shadow RAM >>>> (C/D/E/F000 segment), this area suppose to be used by seabios, I guess >>>> since seabios is a legacy BIOS. My suggestion is to load your seabios to a >>>> over 1MB address. >>>> >>>> On Thu, Mar 19, 2015 at 2:38 PM, Naresh G. Solanki < >>>> [email protected]> wrote: >>>> >>>>> Hi All, >>>>> >>>>> >>>>> I'm trying to port coreboot with seabios payload. >>>>> Everything goes fine till the control is transferred to payload. >>>>> >>>>> Since payload is loaded between memory range 0xC_0000 - 0x10_0000. >>>>> >>>>> The problem I was facing was that the board was going to auto reboot >>>>> mode while executing payload.. >>>>> >>>>> Once it reboot then I'm not able to control the processor through XDP >>>>> until I manually do CPU reset. >>>>> >>>>> It keeps on rebooting once control is transferred to payload. >>>>> >>>>> >>>>> To find out the cause I did detailed memory test & found out that the >>>>> memory range 0xA0000 - 0xBFFFF & 0xE0000 - 0xFFFFF always reads 0xFF. >>>>> >>>>> since payload is loaded in the same region so before jmp_payload, I >>>>> tried to read this region through XDP & found payload code exist. >>>>> >>>>> so I introduced wbinvd instruction just before jmp_payload & I found >>>>> that the XDP started reading 0xFF in the memory range 0xE0000 - 0xFFFFF. >>>>> >>>>> Thus from this I conclude that before the payload was able to execute >>>>> because of cached copy of it in CPU cache & it didn't really existed in >>>>> RAM. >>>>> >>>>> Also to enable memory range 0xE_0000 to 0xF_FFFF I have followed the >>>>> guidlines as per table 15 of the document >>>>> >>>>> http://www.intel.com/content/www/us/en/intelligent-systems/queens-bay/atom-e6xx-boot-requirements-app-note.html >>>>> >>>>> Is that OK. >>>>> What I can do to successfully enable the memory range 0xE_0000 to >>>>> 0xF_FFFF for read write operation so that my payload execution goes >>>>> undisturbed. >>>>> >>>>> My ultimate aim is to load Windows by Seabios as payload. >>>>> >>>>> Thanks >>>>> N Solanki >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> -- >>>>> coreboot mailing list: [email protected] >>>>> http://www.coreboot.org/mailman/listinfo/coreboot >>>>> >>>> >>>> -- >> coreboot mailing list: [email protected] >> http://www.coreboot.org/mailman/listinfo/coreboot > >
-- coreboot mailing list: [email protected] http://www.coreboot.org/mailman/listinfo/coreboot

