Attached is the patch we use for the saber_sd’s uart1:
sabre_sd_uart.patch
Description: Binary data
On Mar 21, 2014, at 5:02 PM, Matthias Lange <[email protected]> wrote: > Hi, > >> On 21 Mar 2014, at 11:33, Taeung <[email protected]> wrote: >> >> Hello, l4 hacker. >> >> >> I'm trying to boot "Hello world / L4/ Fiasco" on Freescale i.MX6 Quad SABRE >> SD board(Cortex-A9, ARMv7). >> >> I'm using 'u-boot' and 'uImage'. >> So, i build uimage by "make uimage E=hello ~...". >> And i've try to booting it on Freescale i.MX6q_sabre_sd board. >> But i did not it because stoped at "Starting kernel ..." !! > > Probably you selected the wrong UART, so the system is not printing something > on the serial line. Make sure you have the right UART driver for your > platform and make sure you have selected the right one. Usually there are > more than one UARTs and only one is connected to you serial line. You can > also check Linux to see which UART it uses. > >> MMC read: dev # 2, block # 2048, count 8192 ... 8192 blocks read: OK >> ## Booting kernel from Legacy Image at 10800000 ... >> Image Name: L4 Image #2 >> Image Type: ARM Linux Kernel Image (uncompressed) >> Data Size: 868352 Bytes = 848 kB >> Load Address: 11000000 >> Entry Point: 11000000 >> Loading Kernel Image ... OK >> OK >> >> Starting kernel ... >> >> >> uimage's file name is "bootstrap_hello.uimage". >> "bootstrap_hello.uimage" has information such as >> "bootstrap_hello.uimage: u-boot legacy uImage, L4 Image #2, Linux/ARM, OS >> Kernel Image (Not compressed), 868352 bytes, >> Thu Mar 20 13:14:42 2014, Load Address: 0x11000000, Entry Point: 0x11000000, >> Header CRC: 0xBEA251F3, Data CRC: 0xA0217B7D" >> >> I have a question. >> >> Can you tell me function name that means 'Entry Point: 0x11000000' ? > > In the uimage format the entry point is defined as the address where uboot > should start, as the name implies, the execution of the image. > > > Matthias. > _______________________________________________ > l4-hackers mailing list > [email protected] > http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers
_______________________________________________ l4-hackers mailing list [email protected] http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers
