[RFC 6/7] ARM: vf610m4: HACK: get dtb pointer from SRC_GPR3
Arnd Bergmann
arnd at arndb.de
Sun Oct 12 12:00:52 PDT 2014
On Sunday 12 October 2014 20:14:00 Stefan Agner wrote:
> Get DTB pointer (located in r2) from SRC_GPR3 (argument register
> for secondary core)
>
> Signed-off-by: Stefan Agner <stefan at agner.ch>
> ---
> This is clearly a hack but it works around the need of a boot loader
> on the Cortex-M4. I guess there is no way neither its acceptable to
> do this on machine level..? But then, this can also be done with a
> minimal boot loader loaded just in front of the kernel by the m4boot
> utility.
>
How do you actually enter the kernel on the m4? Do you use a
decompressor or XIP_KERNEL at the moment? There are probably
lots of ways to do this, my first idea would be to have a vybrid
specific boot wrapper that consists of just a few assembly
instructions to set up the initial environment from wherever
it gets started.
Arnd
More information about the linux-arm-kernel
mailing list