[FS#1199] Bad Header Checksum DIR-600 B5E

LEDE Bugs lede-bugs at lists.infradead.org
Sat Jan 6 06:11:07 PST 2018


The following task has a new comment added:

FS#1199 - Bad Header Checksum DIR-600 B5E
User who did this - Venca B Spam (vbspam)

----------
I can confirm it happens also on my DIR-600 B6E.





U-Boot 1.1.3 (Feb 25 2011 - 14:31:26) (ALPHA)


SVN revision: 499

Target board: WRG-N49


Board: Ralink APSoC DRAM:  32 MB

spi_wait_nsec: 42 

spi device id: c2 20 16 c2 20 (2016c220)

find flash: MX25L3205D

..============================================ 

Ralink UBoot Version: 3.5.1.0

-------------------------------------------- 

ASIC 5350_MP (Port5None)

DRAM_CONF_FROM: Boot-Strapping 

DRAM_TYPE: SDRAM 

DRAM_SIZE: 256 Mbits

DRAM_WIDTH: 16 bits

DRAM_TOTAL_WIDTH: 16 bits

TOTAL_MEMORY_SIZE: 32 MBytes

Flash component: SPI Flash

Date:Feb 25 2011  Time:14:31:26

============================================ 

icache: sets:256, ways:4, linesz:32 ,total:32768

dcache: sets:128, ways:4, linesz:32 ,total:16384 

## Powering down port 0 ~ 3.


Please choose the operation: 

   1: Load system code to SDRAM via TFTP. 

   2: Load system code then write to Flash via TFTP. 

   3: Boot system code via Flash (default).

   4: Entr boot command line interface.

   7: Load Boot Loader code then write to Flash via Serial. 

   9: Load Boot Loader code then write to Flash via TFTP. 

   A: Load  Runtime code then write to Flash via Serial. 

\0x08\0x08\0x08 0 

   

3: System Boot system code via Flash.

## Booting image at bc050000 ...

......................................................addr:80400000

We have SEAMA, Image Size = 3428292

Verifying Checksum ...

Bad Header Checksum.

## Powering up port 0 ~ 3.


Entering HTTP server.


 KSEG1ADDR(NetTxPacket) = 0xA1FE74C0 


 NetLoop,call eth_halt ! 


 NetLoop,call eth_init ! 


 Waitting for RX_DMA_BUSY status Start... done



 Header Payload scatter function is Disable !! 


 ETH_STATE_ACTIVE!! 

Using Eth0 (10/100-M) device

Start HTTP server on port 80, 192.168.0.1

Running ...

\0x00

----------

More information can be found at the following URL:
https://bugs.lede-project.org/index.php?do=details&task_id=1199#comment4076



More information about the lede-bugs mailing list