On Thu, November 10, 2011 02:48, Adam Lackorzynski wrote:
On Tue Nov 08, 2011 at 18:03:38 -0800, Wesley Miaw wrote:
An objdump of the fiasco image shows that a number of kernel sections are being placed into 0xf0000000 and higher. And things work, but I would think that the correct address should be somewhere in RAM. (RAM which you then have to not withhold from sigma0.)
The kernel also runs in virtual addresses, so 0xf0000000 is backed with memory.
Thank you for the reply. I guess I was confused because I am using the RealView Debugger to view my memory and I thought it was showing me physical memory. Plus, all the other addresses appear to be mapping based on the Cortex-A9 physical memory map.