Dear Sebastian Hesselbarth, On Mon, 13 May 2013 18:48:49 +0200, Sebastian Hesselbarth wrote: > Turned out to be easier than I thought! > > You can always read from 0xd0020080 (REG_BASE_REMAP) without lockup. > > So if that what you read equals 0xd0000000, you are still on boot-up > reg bases. If not, and as long as we only remap to 0xf1000000 you are > remapped to 0xf1000000. Are you sure this is safe? Imagine you have 4 GB of RAM. Once registers are remapped to 0xf1000000, what you read at 0xd0020080 is RAM. And, what happens if by chance (or lack therefore), what the RAM contains at 0xd0020080 is 0xd0000000 ? You'll believe you're still mapped at the old location. Now that I think of it, not sure of what will happen though, you will write 0xf1000000 at this address, and then continue with the rest of boot. Would that be a problem? Thanks, Thomas -- Thomas Petazzoni, Free Electrons Kernel, drivers, real-time and embedded Linux development, consulting, training and support. http://free-electrons.com _______________________________________________ barebox mailing list barebox@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/barebox