Ian Stirling wrote: > This would basically be a 'last chance, should never happen' event. > > It's in case someone intentionally unprotects and flashes the bootloader. > > (Intentionally, as it requires 2 specific 32 bit words written to the > flash controller - which should not be present on the device, and be > communicated to it by the 'flash' program.)
Ah, now I see what you mean. If I understand things right, we may not have to worry about this scenario: http://lists.openmoko.org/pipermail/hardware/2008-August/000307.html So we could just write an invalid key in the protected part and then the Flash would be safe until reset. (Which is when our protected code gains control again and writes another invalid key.) > This is part of my cunning plan to get a usable connector for expansion > on the phone :) Heh, that's a separate topic ;-) - Werner _______________________________________________ hardware mailing list [email protected] http://lists.openmoko.org/mailman/listinfo/hardware

