On Wed, Dec 14, 2011 at 9:27 AM, Mark Brown <broonie@xxxxxxxxxxxxxxxxxxxxxxxxxxx> wrote: > On Wed, Dec 14, 2011 at 09:24:33AM +0100, Linus Walleij wrote: > >> The above remaps and reads from some random ROM page to get >> the ASIC ID is actually not screwing things up. Right now. > > The ASIC ID reads are also done by Samsung platforms which boot fine - > it's not strictly good but it happens to work (and has done for some > considerable time). Yes some chicken and egg problem here to some extent :-/ What would be elegant is some readl_early_physical(u32 addr); that is guaranteed to set up a temporary mapping, read out that 32-bit word wherever it lives and tear it the map down in a controlled manner afterwards. We could tag it __init so it is not abused at runtime. This could atleast collect these hacks in one place. Don't know how easy it'd be to achieve that... Linus Walleij -- To unsubscribe from this list: send the line "unsubscribe linux-next" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html