dear all,
experiencing odd when trying avoid arm stub loader in bare metal programs.
boot arm cpu in secure svc option `kernel_old=1` in `config.txt`.
noticed binary file size greater 0x100 byte not work!
added option `disable_cmd_atags=1` , made trick, seems without option atags overwrite kernel?!?
if remember correctly, specifying `kernel_old=1` kernel should loaded @ 0x0.
how comes without explicitly disabling atags kernel overwritten atags?
appreciate idea.
thnx
experiencing odd when trying avoid arm stub loader in bare metal programs.
boot arm cpu in secure svc option `kernel_old=1` in `config.txt`.
noticed binary file size greater 0x100 byte not work!
added option `disable_cmd_atags=1` , made trick, seems without option atags overwrite kernel?!?
if remember correctly, specifying `kernel_old=1` kernel should loaded @ 0x0.
how comes without explicitly disabling atags kernel overwritten atags?
appreciate idea.
thnx
the atags written 0x0100.
should ok if write kernel there no code between 0x100 , 0x200.
should ok if write kernel there no code between 0x100 , 0x200.
raspberrypi
Comments
Post a Comment