Difference between revisions of "Loading Linux Kernels Onto a Board"

From wiki.emacinc.com
Jump to: navigation, search
m (Added guiding info on what to write.)
 
(31 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{todo|Add some text (11.06.13-08:47->MW+); (11.06.13-18:05->MD+)|Michael Welling|project=oe 4,oe 5,mw,md,InProgress}}
+
{{todo|SEOKWRev (11.06.13-08:47->MW+); (11.06.13-18:05->MD+); (12.12.13-11:10->MW+); (12.16.13-01:20->MD-); (12.16.13-10:42->MW+);(12.17.13-13:15->KY+);(03.06.14-15:30->BS-);(04.11.14-15:45->BS+);(11.06.15-16:45->MG+)|Michael Welling|project=oe 4,oe 5,mw,md,reorganize,ky,bs,mg}}
 +
 
 +
{{#seo:
 +
|title=Loading Linux Kernels Onto a Board
 +
|titlemode=append
 +
|keywords=Linux Kernels,TFTP Server,Serial Connection,U-Boot
 +
|description=For EMAC's ARM Linux builds, the kernel is loaded onto boards separately from file systems, while on others the kernel is loaded with the filesystem.
 +
}}
 
=== Background Information ===
 
=== Background Information ===
  
Kernels are loaded onto boards separately from filesystems, but need to be loaded with a matching filesystem.  The kernel image itself only contains the statically linked kernel drivers. The loadable module kernel drivers are stored on the filesystem, and are flavor matched to the kernel with which they were built.  blah blah...
+
The Linux kernel is at the core of EMAC's OE operating system. The kernel provides essential I/O interfaces, task management, and memory management to the user simplifying the development environment. Each embedded target has a Linux kernel image that is tailored to its specific hardware needs. For more information about the Linux kernel see the links in the [[About Linux]] page.
  
Kernels can be loaded into and run from RAM, which is good for testing... blah
+
For EMAC's ARM Linux builds, the kernel is loaded onto boards separately from file systems, while on others the kernel is loaded with the filesystem. It should be noted that, regardless of how the kernel is loaded, many of the kernel's drivers can be compiled as modules which have to be included in the file system in the <code>/lib/modules</code> directory. [[Building the Linux Kernel]] explains how to compile the Linux kernel and how to load the kernel modules onto an existing file system.
  
Kernels can also be programmed onto the flash, where they'll be loaded by default when they run.  You want to make sure to do this for the final... blah
+
''See [[Installing LILO]] for more information on updating the kernel with X86 targets.''
 +
 
 +
''See the [[Loading Images with U-Boot]] page for more information on updating the kernel on ARM targets.''
  
 
=== General Information ===
 
=== General Information ===
  
Here's how you load and boot from RAM: ...
+
As with the loading the JFFS2 file system, the kernel is loaded using TFTP and a serial connection to the boot loader. Once the boot loader and TFTP server are accessible the kernel is loaded into SDRAM and relocated to the target's embedded flash.
 
 
Here's how you load and boot from Flash...
 
  
Here are some pitfalls to watch out for....
+
For instructions on installing a TFTP server on a development PC, see
 +
[[Installing TFTP server]].
  
The long 0x70000000 number is a hexadecimal offset from the top of memory, and ....
+
For details on connecting to the serial port for an embedded target, see
(remember, they're usually C/C++ programmers reading this, so they should understand details about memory layout if you explain it to them)
+
[[Serial Connections]].
  
'''Either put this in the uBoot doc, or explain it here:'''
+
The [[Loading Images with U-Boot]] page explains how to load a kernel onto a target. It is important to note the offset in SDRAM and Flash as setting them incorrectly could adversely affect the operation of the system. The current page details the utilization of U-Boot more specifically; for more information about Redboot see the [[Loading Images with RedBoot]] page.
  
The erase step on some uBoot boards is because...
+
Here is an example of configuring the networking for TFTP transfer and loading the kernel into the resident SDRAM on a SoM-9G45:
 +
U-Boot> set autoload no
 +
U-Boot> dhcp
 +
U-Boot> set serverip 192.168.0.100
 +
U-Boot> tftp 0x74000000 uImage-2.6.30-9g45
  
The cp.b command is used to...
+
Once the kernel is loaded into SDRAM, the kernel image can be either booted directly or loaded into the board's flash memory for deployment. Booting directly into the kernel can be especially useful during development as it allows for testing and debugging without committing the kernel to flash. To boot the kernel directly, use the <code>bootm</code> command as follows:
 +
U-Boot> bootm
  
The set kernelsize line is actually a script step, and it...
+
The procedure for writing to the flash differs from board to board because of the different flash types that are used. For instance, the SoM-9G45 and SoM-9G20 use serial Dataflash to store the kernel, whereas the SoM-9260 uses NOR flash.
  
The $filesize variable is automatically set ...
+
Here is an example for copying the the kernel image into the Dataflash on the SoM-9G45 using <code>cp.b</code>:
 +
U-Boot> cp.b 0x74000000 0xC0042000 ${filesize}
  
The protect off all is for...
+
{{imbox | type=notice | text = The $filesize variable is automatically set based on the size of the file loaded with the previous tftp load command. }}
  
'''^^^This is the kind of info programmers should take to like fish to water, if you explain it for them^^^'''
+
Here is an example of writing the kernel to the NOR flash on the SoM-9260:
 +
U-Boot> protect off all
 +
U-Boot> erase 0x10100000 0x103fffff
 +
U-Boot> cp.b 0x20000000 0x10100000 ${filesize}
 +
U-Boot> set kernelsize $filesize
  
=== Quick Reference by SoM ===
+
The <code>protect off all</code> command unlocks NOR flash erasing and writing. NOR flash needs to be specifically erased before programming using the <code>erase</code> command. Once the erase is complete the kernel image can be written to the flash. The <code>kernelsize</code> variable is used in the boot script for the SoM-9260. To see the boot command sequence for a particular board, run the <code>printenv</code> command on the system and note the <code>bootcmd</code> variable.
 +
{{imbox | type=notice | text = The 0x numbers represent the hexadecimal value of the offset from the top of specific memories. These values vary from system to system. See the quick reference below for examples on the various EMAC ARM based systems.}}
  
== SoM-9260M ==
+
=== Quick Reference (By Target Type) ===
 +
This section provides a quick reference for programming various targets with a kernel images.
 +
==== SoM-9260M ====
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
 
U-Boot> tftp 0x20000000 uImage-som-9260m
 
U-Boot> tftp 0x20000000 uImage-som-9260m
Line 44: Line 65:
 
</syntaxhighlight>
 
</syntaxhighlight>
  
== SoM-9G20M ==
+
==== SoM-9G20M ====
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
 
U-Boot> tftp 0x20000000 uImage-som-9g20m
 
U-Boot> tftp 0x20000000 uImage-som-9g20m
Line 50: Line 71:
 
</syntaxhighlight>
 
</syntaxhighlight>
  
== SoM-9G45M ==
+
==== SoM-9G45M/9M10M ====
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
 
U-Boot> tftp 0x74000000 uImage-som-9g45m
 
U-Boot> tftp 0x74000000 uImage-som-9g45m
Line 56: Line 77:
 
</syntaxhighlight>
 
</syntaxhighlight>
  
== SoM-9M10M ==
+
==== SoM-9x25 iPac-9x25 SoM-9G25 SoM-A5D3X ====
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
  
U-Boot> tftp 0x74000000 uImage-som-9m10m
+
U-Boot> tftp 0x22000000 zImage
U-Boot> cp.b 0x74000000 0xC0042000 ${filesize}
+
U-Boot> sf probe;sf erase 0x100000 +${filesize};sf write 0x22000000 0x100000 ${filesize}
 +
U-Boot> set kernelsize ${filesize};saveenv
 
</syntaxhighlight>
 
</syntaxhighlight>
  
== SoM-9307M ==
+
==== SoM-3354 ====
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
Redboot> fis unlock -f 0x60000000 -l 0x1fdffff
 
Redboot> load -r -v -b 0x80000 -h 10.0.2.60 zImage-som-9307m
 
Redboot> fis create -b 0x80000 -l 0x200000 zImage
 
</syntaxhighlight>
 
  
== IPAC-9302 ==
+
U-Boot> tftp 0x82000000 zImage
<syntaxhighlight lang="bash">
+
U-Boot> sf probe;sf erase 0x100000 +${filesize};sf write 0x82000000 0x100000 ${filesize}
Redboot> fis unlock -f 0x60000000 -l 0x1fdffff
+
U-Boot> set kernelsize ${filesize};saveenv
Redboot> load -r -v -b 0x80000 -h 10.0.2.60 zImage-ipac-9302
 
Redboot> fis create -b 0x80000 -l 0x200000 zImage
 
 
</syntaxhighlight>
 
</syntaxhighlight>

Latest revision as of 16:24, 4 November 2019

TODO: {{#todo:SEOKWRev (11.06.13-08:47->MW+); (11.06.13-18:05->MD+); (12.12.13-11:10->MW+); (12.16.13-01:20->MD-); (12.16.13-10:42->MW+);(12.17.13-13:15->KY+);(03.06.14-15:30->BS-);(04.11.14-15:45->BS+);(11.06.15-16:45->MG+)|Michael Welling|oe 4,oe 5,mw,md,reorganize,ky,bs,mg}}

Background Information

The Linux kernel is at the core of EMAC's OE operating system. The kernel provides essential I/O interfaces, task management, and memory management to the user simplifying the development environment. Each embedded target has a Linux kernel image that is tailored to its specific hardware needs. For more information about the Linux kernel see the links in the About Linux page.

For EMAC's ARM Linux builds, the kernel is loaded onto boards separately from file systems, while on others the kernel is loaded with the filesystem. It should be noted that, regardless of how the kernel is loaded, many of the kernel's drivers can be compiled as modules which have to be included in the file system in the /lib/modules directory. Building the Linux Kernel explains how to compile the Linux kernel and how to load the kernel modules onto an existing file system.

See Installing LILO for more information on updating the kernel with X86 targets.

See the Loading Images with U-Boot page for more information on updating the kernel on ARM targets.

General Information

As with the loading the JFFS2 file system, the kernel is loaded using TFTP and a serial connection to the boot loader. Once the boot loader and TFTP server are accessible the kernel is loaded into SDRAM and relocated to the target's embedded flash.

For instructions on installing a TFTP server on a development PC, see Installing TFTP server.

For details on connecting to the serial port for an embedded target, see Serial Connections.

The Loading Images with U-Boot page explains how to load a kernel onto a target. It is important to note the offset in SDRAM and Flash as setting them incorrectly could adversely affect the operation of the system. The current page details the utilization of U-Boot more specifically; for more information about Redboot see the Loading Images with RedBoot page.

Here is an example of configuring the networking for TFTP transfer and loading the kernel into the resident SDRAM on a SoM-9G45:

U-Boot> set autoload no
U-Boot> dhcp
U-Boot> set serverip 192.168.0.100
U-Boot> tftp 0x74000000 uImage-2.6.30-9g45

Once the kernel is loaded into SDRAM, the kernel image can be either booted directly or loaded into the board's flash memory for deployment. Booting directly into the kernel can be especially useful during development as it allows for testing and debugging without committing the kernel to flash. To boot the kernel directly, use the bootm command as follows:

U-Boot> bootm

The procedure for writing to the flash differs from board to board because of the different flash types that are used. For instance, the SoM-9G45 and SoM-9G20 use serial Dataflash to store the kernel, whereas the SoM-9260 uses NOR flash.

Here is an example for copying the the kernel image into the Dataflash on the SoM-9G45 using cp.b:

U-Boot> cp.b 0x74000000 0xC0042000 ${filesize}

Here is an example of writing the kernel to the NOR flash on the SoM-9260:

U-Boot> protect off all
U-Boot> erase 0x10100000 0x103fffff
U-Boot> cp.b 0x20000000 0x10100000 ${filesize}
U-Boot> set kernelsize $filesize

The protect off all command unlocks NOR flash erasing and writing. NOR flash needs to be specifically erased before programming using the erase command. Once the erase is complete the kernel image can be written to the flash. The kernelsize variable is used in the boot script for the SoM-9260. To see the boot command sequence for a particular board, run the printenv command on the system and note the bootcmd variable.

Quick Reference (By Target Type)

This section provides a quick reference for programming various targets with a kernel images.

SoM-9260M

U-Boot> tftp 0x20000000 uImage-som-9260m
U-Boot> protect off all
U-Boot> erase 0x10100000 0x103fffff
U-Boot> cp.b 0x20000000 0x10100000 ${filesize}
U-Boot> set kernelsize $filesize

SoM-9G20M

U-Boot> tftp 0x20000000 uImage-som-9g20m
U-Boot> cp.b 0x20000000 0xD0042000 ${filesize}

SoM-9G45M/9M10M

U-Boot> tftp 0x74000000 uImage-som-9g45m
U-Boot> cp.b 0x74000000 0xC0042000 ${filesize}

SoM-9x25 iPac-9x25 SoM-9G25 SoM-A5D3X

U-Boot> tftp 0x22000000 zImage
U-Boot> sf probe;sf erase 0x100000 +${filesize};sf write 0x22000000 0x100000 ${filesize}
U-Boot> set kernelsize ${filesize};saveenv

SoM-3354

U-Boot> tftp 0x82000000 zImage
U-Boot> sf probe;sf erase 0x100000 +${filesize};sf write 0x82000000 0x100000 ${filesize}
U-Boot> set kernelsize ${filesize};saveenv