linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: will.deacon@arm.com (Will Deacon)
To: linux-arm-kernel@lists.infradead.org
Subject: recent ARM Erratas 742231 & 742230 broken.
Date: Mon, 8 Nov 2010 14:21:01 -0000	[thread overview]
Message-ID: <000101cb7f50$2bc086a0$834193e0$@deacon@arm.com> (raw)
In-Reply-To: <AANLkTik3ipJHcPtsy5cTuO1PhmAbKwGfSqAE_gUKjhiG@mail.gmail.com>

Hey Linus,

> 2010/10/20 Will Deacon <will.deacon@arm.com>:
> 
> > The diagnostic register is only writable from secure mode so you'll need to
> > look at what these patches do (they perform simple read-modify-writes) and
> > incorporate that code into your secure software.
> > (...)
> > I doubt that your secure monitor exposes the diagnostic register through an
> > SMC interface so you'll need to change the secure boot code to enable these
> > workarounds when the system comes out of reset.
> 
> These SMC:s (System Management Call?) are getting hairier now.

Secure Monitor Call :)

What I was eluding to above is that exposing things like the diagnostic
register via an SMC is a *really* bad idea.  It's much better to set /clear
any necessary bits in the secure boot code and then be done with it.
If that's not possible, you could have a bunch of per-erratum SMCs
but if you can modify the monitor in such a way then you should be able
to modify the boot code too.
 
> Can't you add an abstraction for the stuff we need to poke into
> diagnostics registers, enabling platform-specific overrides, like
> we do for l2x0 in mm/cache-l2x0.c?

I think Russell addressed this point.

Cheers,

Will

      parent reply	other threads:[~2010-11-08 14:21 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-10-20  9:13 recent ARM Erratas 742231 & 742230 broken Srinidhi KASAGAR
2010-10-20 10:21 ` Will Deacon
     [not found] ` <-5088739724674874052@unknownmsgid>
2010-11-05 12:12   ` Linus Walleij
2010-11-05 13:13     ` Russell King - ARM Linux
2010-11-08 14:21     ` Will Deacon [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='000101cb7f50$2bc086a0$834193e0$@deacon@arm.com' \
    --to=will.deacon@arm.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).