Professional Documents
Culture Documents
00
Method of Procedure
LTE eNB UAMA/L9CA SW Fusion
MOP-23
1|P a g e
COPYRIGHT
This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright.
No information contained herein may be copied, translated, transcribed or duplicated for any commercial
purposes or disclosed to the third party in any form without the prior written consent of SAMSUNG
Electronics Co., Ltd.
TRADEMARKS
Product names mentioned in this manual may be trademarks and/or registered trademarks of their
respective companies.
2|P a g e
Document History
Edition Date of Issue Author Remarks
3|P a g e
Table of Contents
4|P a g e
Firmware files can be fused on UAMA and L9CA locally by two ports present on
UAMA/L9CA Board. One is DBG port(Serial Port) and another is EDBG Port(RJ45) Port as
shown in below picture.
Note:
Booter prompt can be accessed through DBG port of UAMA/L9CA.
Normal Firmware upgrade can be done through EDBG Port.
Case-1: Booter is working fine, able to Login to eNB through EDBG port.
Case-2: Booter is working fine but unable to login through EDBG port.
Case-3: Booter is not OK and unable to login through EDGB port.
Case-1
Description: Booter is working fine, able to Login to eNB through EDBG port.
Prerequisite:
FileZilla and Tera Term software must be installed on the Local PC.
Latest eNB Firmware file must be copied on Local PC.
Procedure:
1) Connect the RJ45 cable on EDBG port of eNB and Login by using Tera Term.
2) Check the current Firmware file version of eNB by command gettail 0.
3) Open the Filezilla, put the EDGB port IP (192.168.32.27) and Username(root) and
Password(123qwe).
6|P a g e
6) Then execute the below command one by one for each file for firmware fusion.
root@UAMA:/root> flashupdate.sh -b booter.enb_uama.0
root@UAMA:/root> flashupdate.sh -k kernel.enb_uama.0
root@UAMA:/root> flashupdate.sh -r rfs.enb_uama.0
root@UAMA:/root> flashupdate.sh -raw rfs_raw.enb_uama.0
booter.enb_l9ca_b4f.0;
kernel.enb_l9ca_b4t.0
rfs.enb_l9ca_b4t.0
rfs_raw.enb_l9ca_b4t.0
7|P a g e
Case-2
Description: Booter is working fine but unable to login through EDBG port.
Prerequisite:
FileZilla and Tera Term software must be installed on the Local PC.
Latest eNB Firmware file must be copied on Local PC.
TFTP server software must be installed on Local PC.
eNB debug cable(Serial Cable).
Procedure:
Debugging path
Flash Image
Downloadpath
DBG EDBG LAN
Serial
(RS232) Local PC
Change current directory to where flash images for UAMA are located
8|P a g e
3) Connect the serial cable on eNB at DBG port and another end at Local
PC.
Open the Tera Term software and selct the serial option.
Connect the RJ45 cable to Local PC and another end of cable at EDBG port of eNB.
9|P a g e
host 10.254.205.128 is alive( Ping status must be alive from eNB to Local PC )
Copy below commands and execute them under booter. ( Check image names once again )
tftp 0x20000000 booter.enb_uama.0;erase 0x1be00000 0x1befffff;cp.b 0x20000000 0x1be00000
BOOTER
0x00080000;booterbackup 1
tftp 0x20000000 kernel.enb_uama.0;erase 0x18000000 0x185fffff;cp.b 0x20000000 0x18000000
KERNEL
0x00300000;cp.b 0x20000000 0x18300000 0x00300000
8) Reboot the UAMA/L9CA board and verify the version by gettail 0 command.
10 | P a g e
Case-3
FileZilla and Tera Term software must be installed on the Local PC.
Latest eNB Firmware file must be pasted on Local PC.
TFTP server software must be installed on Local PC.
eNB debug cable(Serial Cable).
1. Refer to below picture and look for S1 switch DIPswitch. Moving the fourth switch to the left will
make normal booter mode to be changed with fail-safe mode.
b2. Refer to figure “UAMA DIP switch setting to boot form failsafe booter" and change mode to fail-safe
booter.
11 | P a g e
3. Turn on board
Open the Tera Term software and selct the serial option.
loadb 0x20000000
b. Click on File->>Transfer->>Kermit->>Send and select below files one by one for Transfer.
For UAMA :
1) booter.enb_uama.0
For L9CA :
2) booter.enb_l9ca_b4f.0
For L9CA->>
5. Revert the DIP switch to Old configuration to boot in normal booter mode and
12 | P a g e
watchdog disable
getinv
getenv
gettail checksum
UAMA L9CA
Octeon ubma_t# flashmap Octeon l9ca_b4t# flashmap
------------------------------------------------------------ ------------------------------------------------------------
DISPLAY FLASH MAP INFORMATION DISPLAY FLASH MAP INFORMATION
------------------------------------------------------------ ------------------------------------------------------------
Start Addr End Addr Size Start Addr End Addr Size
------------------------------------------------------------ ------------------------------------------------------------
Fail-safe 0xbf800000 0xbf87ffff 0x00080000 Fail-safe 0xbbc00000 0xbbc7ffff 0x00080000
Key 0xbf900000 0xbf97ffff 0x00080000 Resv0 0xbbc80000 0xbbdfffff 0x00180000
Resv1 0xbf980000 0xbfbfffff 0x00280000 Booter0 0xbbe00000 0xbbe7ffff 0x00080000
Kernel0 0x18000000 0x182fffff 0x00300000 Booter1 0xbbe80000 0xbbefffff 0x00080000
Kernel1 0x18300000 0x185fffff 0x00300000 Resv1 0xbbf00000 0xbbfbffff 0x000c0000
Rfs_raw 0x18600000 0x199fffff 0x01400000 IM 0xbbfc0000 0xbbfdffff 0x00020000
Rfs0 0x19a00000 0x1a5fffff 0x00c00000 Env 0xbbfe0000 0xbbffffff 0x00020000
Rfs1 0x1a600000 0x1b1fffff 0x00c00000 Kernel0 0xbc000000 0xbc2fffff 0x00300000
HW_test 0x1b200000 0x1b3fffff 0x00200000 Kernel1 0xbc300000 0xbc5fffff 0x00300000
Resv2 0x1b400000 0x1b8fffff 0x00500000 Rfs-Raw 0xbc600000 0xbd9fffff 0x01400000
UFH 0x1b900000 0x1bafffff 0x00200000 Rfs0 0xbda00000 0xbe3fffff 0x00a00000
Resv1 0x1bb00000 0x1bdfffff 0x00300000 Rfs1 0xbe400000 0xbedfffff 0x00a00000
Booter0 0x1be00000 0x1be7ffff 0x00080000 HW-test 0xbee00000 0xbf2fffff 0x00500000
13 | P a g e
b. regarding image checksum error happen, dump image area and report them to HQ
UAMA:
kernel.enb_uama.0
rfs.enb_uama.0
rfs_raw.enb_uama.0
L9CA:
kernel.enb_l9ca_b4t.0
rfs.enb_l9ca_b4t.0
rfs_raw.enb_l9ca_b4t.0
14 | P a g e
APPENDIX
15 | P a g e