> > This address is not accessible out side of secure mode along with some other
> qualifiers.
> >
> > Trying to access is futile and will result in an abort. The control
> register range is full of readable and aborting addresses.
>
> Is there any hint in TRM (spruf98b.pdf) identifying/marking wh
Woodruff, Richard wrote:
With OMAP3530 on BeagleBoard we like to read OMAP3's
CONTROL_RAND_KEY_0 (0x4800 2318) register with something like
printf ("attempting cpu_uid read\n");
u32 cpu_uid = *((u32 *) 0x48002318);
/* u32 cpu_uid = readl(&ctrl_base->randkey_0); */
printf ("cpu_uid read done\n");
> With OMAP3530 on BeagleBoard we like to read OMAP3's
> CONTROL_RAND_KEY_0 (0x4800 2318) register with something like
>
> printf ("attempting cpu_uid read\n");
> u32 cpu_uid = *((u32 *) 0x48002318);
> /* u32 cpu_uid = readl(&ctrl_base->randkey_0); */
> printf ("cpu_uid read done\n");
This address
With OMAP3530 on BeagleBoard we like to read OMAP3's
CONTROL_RAND_KEY_0 (0x4800 2318) register with something like
printf ("attempting cpu_uid read\n");
u32 cpu_uid = *((u32 *) 0x48002318);
/* u32 cpu_uid = readl(&ctrl_base->randkey_0); */
printf ("cpu_uid read done\n");
This does hang after