Trouble running hardhat linux on EP405

Steven Blakeslee BlakesleeS at embeddedplanet.com
Fri Feb 14 00:41:41 EST 2003


Usually to get around the ELF header you add 0x10000 to the start address.
As an example, if you download the kernel to address 0x00400000 you would
start at address 0x00410000.

Also, I have had luck with the http://ppc.bkbits.net:8080/linuxppc_2_4_devel
tree on the ep405.

-----Original Message-----
From: Phillip.Treddenick at colorado.edu
[mailto:Phillip.Treddenick at colorado.edu]
Sent: Thursday, February 13, 2003 3:07 AM
To: linuxppc-embedded at lists.linuxppc.org
Subject: Trouble running hardhat linux on EP405



Folks,

I'm trying to run a hardhat kernel on an EP405 board which has an IBM
PPC405GP.
I'm able to download the kernel to the board and verify it's there using a
boot loader program.  The problem is that as soon as I jump to a location in
the code, the board resets.  So, what I really need to know is what the
starting address for my kernel build is.  Does anybody know how I can
determine this?  Here is some info from the elf header if that helps.

Thanks, Phill Treddenick
        treddeni at colorado.edu


ELF Header:
  Magic:   7f 45 4c 46 01 02 01 00 00 00 00 00 00 00 00 00
  Class:                             ELF32
  Data:                              2's complement, big endian
  Version:                           1 (current)
  OS/ABI:                            UNIX - System V
  ABI Version:                       0
  Type:                              EXEC (Executable file)
  Machine:                           PowerPC
  Version:                           0x1
  Entry point address:               0xc0000000
  Start of program headers:          52 (bytes into file)
  Start of section headers:          1698512 (bytes into file)
  Flags:                             0x0
  Size of this header:               52 (bytes)
  Size of program headers:           32 (bytes)
  Number of program headers:         1
  Size of section headers:           40 (bytes)
  Number of section headers:         20
  Section header string table index: 17
Section Headers:
  [Nr] Name              Type            Addr     Off    Size   ES Flg Lk
Inf Al
  [ 0]                   NULL            00000000 000000 000000 00      0  
0  0
  [ 1] .text             PROGBITS        c0000000 010000 10ef9c 00  AX  0  
0 32
  [ 2] .text.exit        PROGBITS        c010ef9c 11ef9c 0005e0 00  AX  0  
0  4
  [ 3] .rodata           PROGBITS        c010f580 11f580 031470 00   A  0  
0 16
  [ 4] .kstrtab          PROGBITS        c01409f0 1509f0 003cb0 00   A  0  
0  4
  [ 5] .data             PROGBITS        c0145000 155000 0140a4 00  WA  0  
0 16
  [ 6] .exitcall.exit    PROGBITS        c01590a4 1690a4 000044 00  WA  0  
0  4
  [ 7] __ex_table        PROGBITS        c01590e8 1690e8 000dc0 00   A  0  
0  4
  [ 8] __ksymtab         PROGBITS        c0159ea8 169ea8 001d88 00   A  0  
0  4
  [ 9] .data.cacheline_a PROGBITS        c015bc40 16bc40 000700 00  WA  0  
0 32
  [10] .text.init        PROGBITS        c015d000 16d000 00f45c 00  AX  0  
0  4
  [11] .data.init        PROGBITS        c016c45c 17c45c 01d6d8 00  WA  0  
0  4
  [12] .setup.init       PROGBITS        c0189b40 199b40 0000d8 00  WA  0  
0  4
  [13] .initcall.init    PROGBITS        c0189c18 199c18 000074 00  WA  0  
0  4
  [14] .text.openfirmwar PROGBITS        c018a000 19a000 000010 00  AX  0  
0  4
  [15] .bss              NOBITS          c018b000 19b000 026850 00  WA  0  
0 32
  [16] .comment          PROGBITS        00000000 19b000 0039ff 00      0  
0  1
  [17] .shstrtab         STRTAB          00000000 19e9ff 0000d1 00      0  
0  1
  [18] .symtab           SYMTAB          00000000 19edf0 036050 10     19
2326
4
  [19] .strtab           STRTAB          00000000 1d4e40 0394f3 00      0  
0  1
Key to Flags:
  W (write), A (alloc), X (execute), M (merge), S (strings)
  I (info), L (link order), G (group), x (unknown)
  O (extra OS processing required) o (OS specific), p (processor specific)
Program Header:
  Type           Offset   VirtAddr   PhysAddr   FileSiz MemSiz  Flg Align
  LOAD           0x010000 0xc0000000 0xc0000000 0x18a010 0x1b1850 RWE
0x10000
 Section to Segment mapping:
  Segment Sections...
   00     .text .text.exit .rodata .kstrtab .data .exitcall.exit __ex_table
__ksymtab .data.cacheline_aligned .text.init .data.init .setup.init
.initcall.init .text.openfirmware .bss


** Sent via the linuxppc-embedded mail list. See http://lists.linuxppc.org/





More information about the Linuxppc-embedded mailing list