[[hacking:sonicwall]]

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
hacking:sonicwall [2015/04/12 09:50]
rhaamo created
hacking:sonicwall [2016/12/28 21:15] (current)
Line 8: Line 8:
 |3-5 & 4-6|FLASK1_CS#​|FLASK0_CS#​| |3-5 & 4-6|FLASK1_CS#​|FLASK0_CS#​|
  
-Default jumpers, resistor on: 3-4 & 5-6 (FLASH0_CS#​|FLASH1_CS#​)+Default jumpers, resistor on: 3-4 & 5-6 (FLASH0_CS#​|FLASH1_CS#​)\\ 
 +Remove jumper 5-6 to get prompt of u-boot. 
 + 
 +===== Boot log ===== 
 + 
 +<code|h jumper to get prompt>​ 
 +[... .i2c_write ...] 
 +## No elf image at address 0x0e000000 
 +Octeon# 
 +</​code>​ 
 + 
 +<​code>​ 
 +U-boot 5.0.2.12 (Production build) (Build time: Nov 20 2008 - 16:16:28) 
 + 
 +OCTEON SNWL_GOMBE-4 CN5020-SCP pass 1.1, Core clock: 500 MHz, DDR clock: 266 MHz (532 Mhz data rate) 
 +DRAM:  256 MB 
 +Flash: 32 MB ( Bank 0: 16 MB Bank 1: 16 MB ) 
 +.i2c_write: octeon 3 byte data write error 
 + 
 + 
 +Uncompressed 0x181d88 bytes 
 +ELF file is 32 bit 
 +Allocating memory for ELF: Base addr, 0x2000000, size: 0xe000000 
 +Loading .text @ 0x82008000 (1389536 bytes) 
 +Loading .data @ 0x8215c000 (178688 bytes) 
 +Loading .cvmx_shared @ 0x82187a00 (416 bytes) 
 +Clearing .bss @ 0x82187c00 (1194416 bytes) 
 +## Loading ELF image with entry point: 0x82008000 ... 
 +Bootloader: Done loading app on coremask: 0x1 
 +Enabling Octeon big bar support 
 +</​code>​
  • hacking/sonicwall.txt
  • Last modified: 2016/12/28 21:15
  • (external edit)