Hi Grant,

        I have did as you suggested:

1. I have started u-boot
2. I have loaded zImage.elf to the memory 0xf00000
3. I have typed: bootelf 0xf00000

Linux has hanged during uncompressing

4. I have stopped the system and reloaded u-boot to examine __log_buf
   ( address 0x20f0c4)

Unfortunately all the bytes were set just to zero.

5. I have stopped the system
6. I have downloaded via jtag the zImage.elf and started it
   the system has started properly
7. I have stopped the system and reloaded u-boot to examine the memory
8. I have typed: md 0x20f0c4 100 and it showed me the buffer:

0020f0c4: 3c353e5b 20202020 302e3030 30303030    <5>[    0.000000
0020f0d4: 5d204c69 6e757820 76657273 696f6e20    ] Linux version 
0020f0e4: 322e362e 32312d72 63362028 726f6f74    2.6.21-rc6 (root
0020f0f4: 40706335 32313529 20286763 63207665    @pc5215) (gcc ve
0020f104: 7273696f 6e20342e 302e3229 20233136    rsion 4.0.2) #16
0020f114: 204d6f6e 20417567 20323720 31323a33     Mon Aug 27 12:3
0020f124: 373a3038 20434553 54203230 30370a3c    7:08 CEST 2007.<
0020f134: 363e5b20 20202030 2e303030 3030305d    6>[    0.000000]
0020f144: 2058696c 696e7820 4d4c3430 33205265     Xilinx ML403 Re
0020f154: 66657265 6e636520 53797374 656d2028    ference System (
0020f164: 56697274 65782d34 20465829 0a3c373e    Virtex-4 FX).<7>
0020f174: 5b202020 20302e30 30303030 305d2045    [    0.000000] E
0020f184: 6e746572 696e6720 6164645f 61637469    ntering add_acti
0020f194: 76655f72 616e6765 28302c20 302c2038    ve_range(0, 0, 8
0020f1a4: 31393129 20302065 6e747269 6573206f    191) 0 entries o
0020f1b4: 66203235 36207573 65640a3c 343e5b20    f 256 used.<4>[ 
0020f1c4: 20202030 2e303030 3030305d 205a6f6e       0.000000] Zon
0020f1d4: 65205046 4e207261 6e676573 3a0a3c34    e PFN ranges:.<4

So it seams to be that the address points to the __log_buf (I hope).

Does it mean that when I try to start zImage kernel from u-boot 
it hangs during uncompressing the image and it does even start booting?

Best Regards

Mirek  


On Tue, 28 Aug 2007, Grant Likely wrote:

> On 8/28/07, Miroslaw Dach <[EMAIL PROTECTED]> wrote:
> > Hi Grant,
> >
> >         Thanks for your answer.
> > I have found in the System.map :
> > c020f0c4 b __log_buf
> >
> > Is the address c020f0c4 relative to the .data segment?
> 
> 0xc0000000 are virtual kernel addresses; not physical addresses.  If
> the MMU is still on, then you need to use the virtual address to
> examine memory.  If the MMU is off (such as after reloading u-boot),
> then you need to change 0xCxxxxxxx to 0x0xxxxxxxx.
> 
> > I understand that when the system hangs I should type in the XMD window
> > stop.
> >
> > Is there anyway to examine the memory from the XMD window? or should I
> > reload the u-boot and examine the memory from u-boot?
> 
> I don't know; I've never used XMD.  Read the XMD documentation.  You
> can do it from u-boot too.
> 
> g.
> 
> 

-- 
=============================================================================
          Miroslaw Dach ([EMAIL PROTECTED]) - SLS/Controls Group 
                PSI - Paul Scherrer Institut CH-5232 Villigen
=============================================================================

_______________________________________________
Linuxppc-embedded mailing list
Linuxppc-embedded@ozlabs.org
https://ozlabs.org/mailman/listinfo/linuxppc-embedded

Reply via email to