[PATCH 3/5] arm: initial support for Marvell Dove SoCs

Thomas Petazzoni thomas.petazzoni at free-electrons.com
Mon May 13 13:14:47 EDT 2013


Dear Sebastian Hesselbarth,

On Mon, 13 May 2013 18:48:49 +0200, Sebastian Hesselbarth wrote:

> Turned out to be easier than I thought!
> 
> You can always read from 0xd0020080 (REG_BASE_REMAP) without lockup.
> 
> So if that what you read equals 0xd0000000, you are still on boot-up
> reg bases. If not, and as long as we only remap to 0xf1000000 you are
> remapped to 0xf1000000.

Are you sure this is safe? Imagine you have 4 GB of RAM. Once registers
are remapped to 0xf1000000, what you read at 0xd0020080 is RAM.

And, what happens if by chance (or lack therefore), what the RAM
contains at 0xd0020080 is 0xd0000000 ? You'll believe you're still
mapped at the old location.

Now that I think of it, not sure of what will happen though, you will
write 0xf1000000 at this address, and then continue with the rest of
boot. Would that be a problem?

Thanks,

Thomas
-- 
Thomas Petazzoni, Free Electrons
Kernel, drivers, real-time and embedded Linux
development, consulting, training and support.
http://free-electrons.com



More information about the barebox mailing list