Hi,

I debugged the problem further. The PMU firmware, SPL and ATF pass
successfully with warrior branch. ATF sets entry-point at 0x8000000
where I see binary of u-boot.bin. The boot process enter there and stops
somewhere in _binary_u_boot_bin_start. Thus, I suspect problem with
U-Boot relocation. Has anybody experienced similar issue? My
understanding is that U-Boot takes size of RAM memory from device tree
and a board providing 2GB DDR, would have an entry:

memory {
       device_type = "memory";
       reg = <0x0 0x0 0x0 0x80000000>;
   };
correct?

Regards,

Adrian

On 23.10.2019 13:32, Adrian Fiergolski wrote:
>
> Hi,
>
> I am experiencing issue booting a custom board based on ZynqMP+
> device. The boot process stops at ATF:
>
> U-Boot SPL 2019.01 (Oct 23 2019 - 10:34:53 +0000)
> EL Level:       EL3
> Trying to boot from MMC2
> NOTICE:  ATF running on XCZU6EG/silicon v4/RTL5.1 at 0xfffea000
> NOTICE:  BL31: Secure code at 0x0
> NOTICE:  BL31: Non secure code at 0x8000000
> NOTICE:  BL31: v2.0(release):xilinx-v2019.1
> NOTICE:  BL31: Built : 15:12:20, Oct 22 2019
>
> I checked with debugger and apparently, ATF fails to launch u-boot image.
>
> As mu setup, what is reflected properly in the device-tree, uses 2 SD
> controllers, just as a precaution, I applied two patches on PMU (link
> <https://github.com/topic-embedded-products/meta-topic/tree/master/recipes-bsp/pmu-firmware/pmu-firmware>),
> including the one enabling NODE_SD0 for the cores.
>
> Has anybody experienced a similar issue? Can somebody confirm a
> successful run of ZynqMP+ based platform with warrior branch?
>
> Regards,
>
> Adrian
>
-- 
_______________________________________________
meta-xilinx mailing list
meta-xilinx@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-xilinx

Reply via email to