[coreboot] Enabling 4MB window in LPC adressing space

Mart Raudsepp mart.raudsepp at artecdesign.ee
Mon May 26 16:25:08 CEST 2008


Ühel kenal päeval, E, 2008-05-26 kell 15:47, kirjutas llandre:
> It works now!
> It seems LPC bus is somehow influenced by the USB 5V power voltage. If 
> we don't provide this voltage LPC dongle exhibits the problems described 
> before. We are still investigating this issue.

As you got 0x00 from post code logging, I'm assuming you had JMP4 in the
correct position, as otherwise there would have been no power at all.
Maybe your board is unable to give enough current to the dongle over
LPC, so such funny things happen?
Funny things can also happen (might also involve smoke, albeit
unlikely), if you power over USB but forget the JMP4 in LPC power mode,
so it gets power from both places. This is covered in the documentation.

Note that when dongle is only LPC powered you need to reset the
mainboard for the dongle to do its initial LPC reads again after the
logic configuration has been loaded into the FPGA (it takes longer than
most mainboard would like, so by powering it on it does that, and the
reset on mainboard side will do the read again, but now with FPGA
already ready, as the LPC power isn't cut)

> When 5V is provided:

> a) 4MB window is enabled (red LED is on)
> b) post code are captured and sent to the virtual COM port correctly

Ok, looks good from the dongle side. This is the topic I know about, for
the rest others will have to chime in if you don't figure this out
yourself.

> coreboot is now able to find the kernel, however checksum is not ok. 
> Maybe we still do not create the binary image correctly ...
> 
> 
> ...
> Moving GDT to 0x500...ok
> Adjust low_table_end from 0x00000530 to 0x00001000
> Adjust rom_table_end from 0x000f0400 to 0x00100000
> Wrote coreboot table at: 00000530 - 00000738  checksum 4eb4
> 
> Welcome to elfboot, the open sourced starter.
> January 2002, Eric Biederman.
> Version 1.3
> 
> rom_stream: 0xffc09000 - 0xfffeffff
> Found ELF candidate at offset 0
> header_offset is 0
> Try to load at offset 0x0
> n_type: 00000001 n_name(8): ELFBoot  n_desc(6): Linux
> n_type: 00000002 n_name(8): ELFBoot  n_desc(77): 
> 2.6.26-rc3-00285-gf556f19 (vit@
> linuxserver2) #8 Fri May 23 16:07:56 CEST 2008
> malloc Enter, size 20, free_mem_ptr 0001b130
> malloc 0x0001b130
> n_type: 00000003 n_name(8): ELFBoot  n_desc(2): Ã…
> Dropping non PT_LOAD segment
> malloc Enter, size 32, free_mem_ptr 0001b144
> malloc 0x0001b144
> New segment addr 0x10000 size 0x55c4 offset 0x14c filesize 0x1328
> (cleaned up) New segment addr 0x10000 size 0x55c4 offset 0x14c filesize 
> 0x1328
> lb: [0x0000000000004000, 0x000000000001e000)
> segment: [0x0000000000010000, 0x0000000000011328, 0x00000000000155c4)
>   bounce: [0x000000000f7b8000, 0x000000000f7b9328, 0x000000000f7bd5c4)
> malloc Enter, size 32, free_mem_ptr 0001b164
> malloc 0x0001b164
> New segment addr 0x20000 size 0x1070 offset 0x1474 filesize 0x0
> (cleaned up) New segment addr 0x20000 size 0x1070 offset 0x1474 filesize 0x0
> lb: [0x0000000000004000, 0x000000000001e000)
> malloc Enter, size 32, free_mem_ptr 0001b184
> malloc 0x0001b184
> New segment addr 0x100000 size 0x700000 offset 0x1474 filesize 0xfe5f0
> (cleaned up) New segment addr 0x100000 size 0x700000 offset 0x1474 
> filesize 0xfe
> 5f0
> lb: [0x0000000000004000, 0x000000000001e000)
> Loading Segment: addr: 0x000000000f7b8000 memsz: 0x00000000000055c4 
> filesz: 0x00
> 00000000001328
> [ 0x000000000f7b8000, 000000000f7b9328, 0x000000000f7bd5c4) <- 
> 000000000000014c
> Clearing Segment: addr: 0x000000000f7b9328 memsz: 0x000000000000429c
> Loading Segment: addr: 0x0000000000020000 memsz: 0x0000000000001070 
> filesz: 0x00
> 00000000000000
> [ 0x0000000000020000, 0000000000020000, 0x0000000000021070) <- 
> 0000000000001474
> Clearing Segment: addr: 0x0000000000020000 memsz: 0x0000000000001070
> Loading Segment: addr: 0x0000000000100000 memsz: 0x0000000000700000 
> filesz: 0x00
> 000000000fe5f0
> [ 0x0000000000100000, 00000000001fe5f0, 0x0000000000800000) <- 
> 0000000000001474
> Clearing Segment: addr: 0x00000000001fe5f0 memsz: 0x0000000000601a10
> Loaded segments
> Image checksum: 85c3 != computed checksum: 2705
> Can not load ELF Image.






More information about the coreboot mailing list