kernel.ld.arm virt_address

Wesley Miaw wesley at wesman.net
Thu Nov 10 22:00:49 CET 2011


On Thu, November 10, 2011 02:48, Adam Lackorzynski wrote:
>
> On Tue Nov 08, 2011 at 18:03:38 -0800, Wesley Miaw wrote:
>> An objdump of the fiasco image shows that a number of kernel sections
>> are
>> being placed into 0xf0000000 and higher. And things work, but I would
>> think that the correct address should be somewhere in RAM. (RAM which
>> you
>> then have to not withhold from sigma0.)
>
> The kernel also runs in virtual addresses, so 0xf0000000 is backed with
> memory.

Thank you for the reply. I guess I was confused because I am using the
RealView Debugger to view my memory and I thought it was showing me
physical memory. Plus, all the other addresses appear to be mapping based
on the Cortex-A9 physical memory map.
-- 
Wesley Miaw
wesley at wesman.net





More information about the l4-hackers mailing list