On 04/06/2015 03:02 PM, Sjoerd Simons wrote:
Add dummy bootz_setup implementation allowing the u-boot sandbox to
run bootz. This recognizes both ARM and x86 zImages to validate a
valid zImage was loaded.

diff --git a/arch/sandbox/lib/bootm.c b/arch/sandbox/lib/bootm.c

+int bootz_setup(ulong image, ulong *start, ulong *end)

+       *start = 0xdead;
+       *end = 0xbeef;
+       return 0;

Isn't that going to cause the rest of bootz to access or jump to some bogus address and crash?

Aside from that, this series looks plausible, so,
Acked-by: Stephen Warren <swar...@nvidia.com>

(I read through patch 6 most thoroughly, briefly skimmed patch 7, and read the others fairly quickly, so take that as an ack primarily on patch 6 although I didn't see anything obviously wrong elsewhere).
_______________________________________________
U-Boot mailing list
U-Boot@lists.denx.de
http://lists.denx.de/mailman/listinfo/u-boot

Reply via email to