@ HAM hab Hallenberg probiert, Prog läft, aber mein AN / AUS problem ist immer noch nicht weg. Hab nen Log davon... Dies macht die Box 1000mal
debug: DDF: Calibrating delay loop... debug: DDF: 67.79 BogoMIPS
debug: WATCHDOG RE***
debug: BMon V1.2 mID 01
debug: feID dd gtxID 0b
debug: fpID 5a dsID http://Hallenberg.com
debug: HWrev 09 FPrev 0.81
debug: B/Ex/Fl(MB) 16/16/08
WATCHDOG re*** enabled
debug: autoboot aborted from terminal
dbox2:root>
dbox2:root> ***eth
ethaddr 0x1001ffe3
ethaddr: 00:50:9c:42:fa:ed
dbox2:root>
dbox2:root> boot net net net net net net net net net net
debug:
BOOTP/TFTP bootstrap loader (v0.3)
debug:
debug: Transmitting BOOTP request via broadcast
debug: Got BOOTP reply from Server IP 192.168.2.105, My IP 192.168.2.202
debug: Sending TFTP-request for file C/dboxifa_tmp/tftpboot/u-boot
will verify ELF image, start= 0x800000, size= 140008
verify sig: 262
boot net: boot file has no valid signature
Branching to 0x40000
U-Boot 1.1.6 (Tuxbox) (Jan 8 2007 - 22:58:00)
CPU: PPC823ZTnnA at 67.100 MHz: 2 kB I-Cache 1 kB D-Cache
*** Warning: CPU Core has Silicon Bugs -- Check the Errata ***
Board: DBOX2, Nokia, BMon V1.2
Watchdog enabled
I2C: ready
DRAM: 32 MB
FLASH: 8 MB
FB: ready
LCD: ready
In: serial
Out: serial
Err: serial
Net: SCC ETHERNET
BOOTP broadcast 1
Using SCC ETHERNET device
TFTP from server 192.168.2.105; our IP address is 192.168.2.202
Filename 'C/dboxifa_tmp/tftpboot/u-boot'.
Load address: 0x100000
Loading: * Using SCC ETHERNET device
TFTP from server 192.168.2.105; our IP address is 192.168.2.202
Filename 'logo-lcd'.
Load address: 0x100000
Loading: * ##
done
Bytes transferred = 7680 (1e00 hex)
BOOTP broadcast 1
Using SCC ETHERNET device
TFTP from server 192.168.2.105; our IP address is 192.168.2.202
Filename 'C/dboxifa_tmp/tftpboot/u-boot'.
Load address: 0x100000
Loading: * Using SCC ETHERNET device
TFTP from server 192.168.2.105; our IP address is 192.168.2.202
Filename 'logo-fb'.
Load address: 0x100000
Loading: * ####################################
done
Bytes transferred = 179877 (2bea5 hex)