On Wed, Dec 14, 2011 at 9:27 AM, Mark Brown broonie@opensource.wolfsonmicro.com wrote:
On Wed, Dec 14, 2011 at 09:24:33AM +0100, Linus Walleij wrote:
The above remaps and reads from some random ROM page to get the ASIC ID is actually not screwing things up. Right now.
The ASIC ID reads are also done by Samsung platforms which boot fine - it's not strictly good but it happens to work (and has done for some considerable time).
Yes some chicken and egg problem here to some extent :-/
What would be elegant is some readl_early_physical(u32 addr); that is guaranteed to set up a temporary mapping, read out that 32-bit word wherever it lives and tear it the map down in a controlled manner afterwards. We could tag it __init so it is not abused at runtime.
This could atleast collect these hacks in one place.
Don't know how easy it'd be to achieve that...
Linus Walleij