|
building and booting u-boot on SD-card from source
Posted at 12/14/2017 13:57:41
View:5613
|
Replies:4
Print
[Copy Link]
1#
I am trying to build and boot u-boot based firmware on the RK3399 FireFly using the SD-card interface.
I followed the instructions at http://rockchip.wikidot.com/linux-user-guide.
So I did:
repo init -u https://github.com/rockchip-linux/manifests -b buildroot
repo sync
cd rockchip
build/mk-kernel.sh rk3399-firefly
build/mk-uboot.sh rk3399-firefly
build/mk-image.sh -c rk3399 -t boot
build/mk-image.sh -c rk3399 -t system -r rk-debian-build/linaro-rootfs.img
build/flash_tool.sh -p system -i out/system.img -d /dev/sdi
That builds successfully, but when I try to boot that on the RK3399 Firefly board I get this:
DDR Version 1.07 20161103
In
Channel 0: DDR3, 666MHz
Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
Channel 1: DDR3, 666MHz
Bus Width=32 Col=10 Bank=8 Row=15/15 CS=2 Die Bus-Width=16 Size=2048MB
256B stride
ch 0 ddrconfig = 0x101, ddrsize = 0x2020
ch 1 ddrconfig = 0x101, ddrsize = 0x2020
pmugrf_os_reg[2] = 0x3AA17AA1, stride = 0xD
OUT
Boot1: 2016-07-29, version: 1.05
CPUId = 0x0
ChipType = 10 1836
SdmmcInit=2 0
BootCapSize=100000
UserCapSize=29820MB
FwPartOffset=2000 , 100000
SdmmcInit=0 0
BootCapSize=0
UserCapSize=15193MB
FwPartOffset=2000 , 0
StorageInit ok = 255897
LoadTrustBL
No find bl30.bin
No find bl32.bin
theLoader 200000 337383
LoaderFlag2: 0x0
Unhandled Exception in EL3.
x30 = 0x0000000000045004
x0 = 0x0f1e2d3c4b5a6978
x1 = 0x00000000ff3b1fd0
x2 = 0x0000000000000018
x3 = 0x0000000000000018
x4 = 0x0000000000000018
x5 = 0x0000000000000000
x6 = 0x0000000000000000
x7 = 0x0000000000000000
x8 = 0x0000000003011908
x9 = 0x0000000000010080
x10 = 0x0000000000020f88
x11 = 0x0000000000000400
x12 = 0x000000000000000a
x13 = 0x000000000000000f
x14 = 0x0000000000000002
x15 = 0x0000000000000004
x16 = 0x0000000008000000
x17 = 0x0000000000000000
x18 = 0x0000000000800000
x19 = 0x0f1e2d3c4b5a6978
x20 = 0x000000000004b0c0
x21 = 0x0f1e2d3c4b5a6978
x22 = 0x00000000000419e9
x23 = 0x0000000000041000
x24 = 0x000000000004b0d0
x25 = 0x0000000000000001
x26 = 0x00000000ff8c2000
x27 = 0x0000000000000110
x28 = 0x0000000000000110
x29 = 0x00000000000468c0
scr_el3 = 0x0000000000000238
sctlr_el3 = 0x0000000000c5383a
cptr_el3 = 0x0000000000000000
tcr_el3 = 0x0000000000000000
daif = 0x00000000000003c0
mair_el3 = 0x44e048e000098aa4
spsr_el3 = 0x00000000600002cc
elr_el3 = 0x0000000000011c64
ttbr0_el3 = 0x000400b2304fe140
spsr_el1 = 0x0000000062060d1f
elr_el1 = 0x042c0cb927d04836
spsr_abt = 0x0000000022180000
spsr_und = 0x00000000501e2904
spsr_irq = 0x00000000000aac51
spsr_fiq = 0x0000000016028820
sctlr_el1 = 0x0000000000c52838
actlr_el1 = 0x0000000000000000
cpacr_el1 = 0x0000000000000000
csselr_el1 = 0x0000000000000000
sp_el1 = 0x1006000088d08311
esr_el1 = 0x000000000442c240
ttbr0_el1 = 0xb280046070170ca8
ttbr1_el1 = 0x37f8addcefe70a08
mair_el1 = 0x44e048e000098aa4
amair_el1 = 0x0000000000000000
tcr_el1 = 0x0000000000000000
tpidr_el1 = 0x640b0ba800720052
tpidr_el0 = 0x252c014144004038
tpidrro_el0 = 0x011cd70888012830
dacr32_el2 = 0x000000001b642621
ifsr32_el2 = 0x0000000000000023
par_el1 = 0x84000084cc872102
mpidr_el1 = 0x0000000080000000
afsr0_el1 = 0x0000000000000000
afsr1_el1 = 0x0000000000000000
contextidr_el1 = 0x0000000000000000
vbar_el1 = 0x0000000000000000
cntp_ctl_el0 = 0x0000000000000000
cntp_cval_el0 = 0x2010a22008a6c4b4
cntv_ctl_el0 = 0x0000000000000000
cntv_cval_el0 = 0x681586d098c46008
cntkctl_el1 = 0x0000000000000000
fpexc32_el2 = 0x0000000000000700
sp_el0 = 0x00000000000468c0
isr_el1 = 0x0000000000000000
cpuectlr_el1 = 0x0000000000000040
cpumerrsr_el1 = 0x0000000000000000
l2merrsr_el1 = 0x0000000000000000
gicc_hppir = 0x0000000000000000
gicc_ahppir = 0x0000000000000000
gicc_ctlr = 0x0000000014000082
gicd_ispendr regs (Offsets 0x200 - 0x278)
0000000000000200: 0x0000001800000000
0000000000000208: 0x0000000000000000
0000000000000210: 0x0000000000000010
0000000000000218: 0x0000000000000000
0000000000000220: 0x0000000000000000
0000000000000228: 0x0000000000000000
0000000000000230: 0x0000000000000000
0000000000000238: 0x0000000000000000
0000000000000240: 0x0000000000000000
0000000000000248: 0x0000000000000000
0000000000000250: 0x0000000000000000
0000000000000258: 0x0000000000000000
0000000000000260: 0x0000000000000000
0000000000000268: 0x0000000000000000
0000000000000270: 0x0000000000000000
0000000000000278: 0x0000000000000000
cci_snoop_ctrl_cluster0 = 0x00000000c0000000
cci_snoop_ctrl_cluster1 = 0x00000000c0000000
I can load the Firefly-rk3399_xubuntu1604_SD_201705151725.img ubuntu image onto an SD-card and that boots up ok.
Has anyone sucessfully built u-boot from source and booted it via an SD-card?
|
|