[PATCH 3/5] arm: initial support for Marvell Dove SoCs
Thomas Petazzoni
thomas.petazzoni at free-electrons.com
Mon May 13 13:14:47 EDT 2013
Dear Sebastian Hesselbarth,
On Mon, 13 May 2013 18:48:49 +0200, Sebastian Hesselbarth wrote:
> Turned out to be easier than I thought!
>
> You can always read from 0xd0020080 (REG_BASE_REMAP) without lockup.
>
> So if that what you read equals 0xd0000000, you are still on boot-up
> reg bases. If not, and as long as we only remap to 0xf1000000 you are
> remapped to 0xf1000000.
Are you sure this is safe? Imagine you have 4 GB of RAM. Once registers
are remapped to 0xf1000000, what you read at 0xd0020080 is RAM.
And, what happens if by chance (or lack therefore), what the RAM
contains at 0xd0020080 is 0xd0000000 ? You'll believe you're still
mapped at the old location.
Now that I think of it, not sure of what will happen though, you will
write 0xf1000000 at this address, and then continue with the rest of
boot. Would that be a problem?
Thanks,
Thomas
--
Thomas Petazzoni, Free Electrons
Kernel, drivers, real-time and embedded Linux
development, consulting, training and support.
http://free-electrons.com
More information about the barebox
mailing list