From c36b0e08b0e23e6f3bf3a947907c1d5eb7bf0396 Mon Sep 17 00:00:00 2001 From: sys64738 Date: Sun, 10 Apr 2022 19:13:38 +0200 Subject: [PATCH] bleh --- README.md | 4 +++- src/main.c | 4 ++-- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 37b4795..d2392cb 100644 --- a/README.md +++ b/README.md @@ -119,7 +119,9 @@ described near the end, the article is quite large. 1. Pipelining: can code running at `0x0FFE` (or a similar address) access the BSL memory, (mis)using the possibility that the effective value of `pc` might differ from the executed address due to pipelining effects? (cf. - [MerryMage's GBA BIOS dump](https://mary.rs/lab/gbabios/)) + [MerryMage's GBA BIOS dump](https://mary.rs/lab/gbabios/)) NOTE: `0x0FFE` is + not backed by anything and always reads as 0, so getting this to work will + be tricky. 1. DMA: can a DMA transfer be used to change the stack contents during BSL execution? (Most likely, just like interrupts can, I simply haven't checked.) 1. Dumping of the `0x1b00`..`0x1bff` region still needs to happen. diff --git a/src/main.c b/src/main.c index 721277d..caa9069 100644 --- a/src/main.c +++ b/src/main.c @@ -295,8 +295,8 @@ int main(void) { setup_io(); setup_clocks(); stdio_msp_init(); - SFRIE1 = NMIIE; - SFRRPCR = SYSRSTRE__ENABLE | SYSRSTUP__PULLUP | SYSNMIIES__FALLING | SYSNMI__NMI; + //SFRIE1 = NMIIE; + //SFRRPCR = SYSRSTRE__ENABLE | SYSRSTUP__PULLUP | SYSNMIIES__FALLING | SYSNMI__NMI; memset(regbak, 0, sizeof regbak);