From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754647Ab2IJVXR (ORCPT ); Mon, 10 Sep 2012 17:23:17 -0400 Received: from 9.mo1.mail-out.ovh.net ([178.32.108.172]:52575 "EHLO mo1.mail-out.ovh.net" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753622Ab2IJVXM (ORCPT ); Mon, 10 Sep 2012 17:23:12 -0400 X-Greylist: delayed 4200 seconds by postgrey-1.27 at vger.kernel.org; Mon, 10 Sep 2012 17:23:12 EDT Date: Mon, 10 Sep 2012 17:21:02 +0200 From: Jean-Christophe PLAGNIOL-VILLARD To: Catalin Marinas Cc: Nicolas Pitre , "linux-arch@vger.kernel.org" , Arnd Bergmann , "linux-kernel@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" X-Ovh-Mailout: 178.32.228.1 (mo1.mail-out.ovh.net) Subject: Re: [PATCH v3 02/31] arm64: Kernel booting and initialisation Message-ID: <20120910152102.GD31430@game.jcrosoft.org> References: <1347035226-18649-1-git-send-email-catalin.marinas@arm.com> <1347035226-18649-3-git-send-email-catalin.marinas@arm.com> <20120909172046.GB31430@game.jcrosoft.org> <20120910055339.GC31430@game.jcrosoft.org> <20120910125137.GC27042@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20120910125137.GC27042@arm.com> X-PGP-Key: http://uboot.jcrosoft.org/plagnioj.asc X-PGP-key-fingerprint: 6309 2BBA 16C8 3A07 1772 CC24 DEFC FFA3 279C CE7C User-Agent: Mutt/1.5.20 (2009-06-14) X-Ovh-Tracer-Id: 430656715007241027 X-Ovh-Remote: 213.251.161.87 (ns32433.ovh.net) X-Ovh-Local: 213.186.33.20 (ns0.ovh.net) X-OVH-SPAMSTATE: OK X-OVH-SPAMSCORE: -100 X-OVH-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrfeehtddrheegucetufdoteggodetrfcurfhrohhfihhlvgemucfqggfjnecuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfhrhhomheplfgvrghnqdevhhhrihhsthhophhhvgcurffntefipffkqffnqdggkffnnfettfffuceophhlrghgnhhiohhjsehjtghrohhsohhfthdrtghomheqnecujfgurhepfffhvffukfhfgggtuggjfgesthdttfdttdervd X-Spam-Check: DONE|U 0.5/N X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrfeehtddrheegucetufdoteggodetrfcurfhrohhfihhlvgemucfqggfjnecuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfhrhhomheplfgvrghnqdevhhhrihhsthhophhhvgcurffntefipffkqffnqdggkffnnfettfffuceophhlrghgnhhiohhjsehjtghrohhsohhfthdrtghomheqnecujfgurhepfffhvffukfhfgggtuggjfgesthdttfdttdervd Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 13:51 Mon 10 Sep , Catalin Marinas wrote: > On Mon, Sep 10, 2012 at 06:53:39AM +0100, Jean-Christophe PLAGNIOL-VILLARD wrote: > > On 19:29 Sun 09 Sep , Nicolas Pitre wrote: > > > On Sun, 9 Sep 2012, Jean-Christophe PLAGNIOL-VILLARD wrote: > > > > On 17:26 Fri 07 Sep , Catalin Marinas wrote: > > > > > +The image must be placed at the specified offset (currently 0x80000) > > > > > +from the start of the system RAM and called there. The start of the > > > > > +system RAM must be aligned to 2MB. > > > > can we drop this > > > > > > Drop what? > > > And why? > > This contrain the must be loadable at any address > > You can't easily load the kernel image at any address, unless it can > relocate itself and you have a way to specify PHYS_OFFSET. We don't want > a compile-time PHYS_OFFSET, the kernel detects it at boot time based on > the load address. so NACK kexec and other boot loaders require it Best Regards, J.