On Sunday 12 October 2014 20:14:00 Stefan Agner wrote: > Get DTB pointer (located in r2) from SRC_GPR3 (argument register > for secondary core) > > Signed-off-by: Stefan Agner <stefan@xxxxxxxx> > --- > This is clearly a hack but it works around the need of a boot loader > on the Cortex-M4. I guess there is no way neither its acceptable to > do this on machine level..? But then, this can also be done with a > minimal boot loader loaded just in front of the kernel by the m4boot > utility. > How do you actually enter the kernel on the m4? Do you use a decompressor or XIP_KERNEL at the moment? There are probably lots of ways to do this, my first idea would be to have a vybrid specific boot wrapper that consists of just a few assembly instructions to set up the initial environment from wherever it gets started. Arnd -- To unsubscribe from this list: send the line "unsubscribe devicetree" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html