From mboxrd@z Thu Jan 1 00:00:00 1970 From: linux@arm.linux.org.uk (Russell King - ARM Linux) Date: Fri, 16 Nov 2012 18:41:36 +0000 Subject: [PATCH] ARM: Fix errata 751472 handling on Cortex-A9 r1p* In-Reply-To: <20121116171333.GL6801@atomide.com> References: <20121114203221.GA6801@atomide.com> <50A413D4.7000405@gmail.com> <20121114222159.GB6801@atomide.com> <50A43D58.5030404@gmail.com> <20121115110137.GA25985@arm.com> <50A4FCC5.2080604@gmail.com> <20121115143714.GF25985@arm.com> <50A50C24.9010702@gmail.com> <20121116100550.GI3332@n2100.arm.linux.org.uk> <20121116171333.GL6801@atomide.com> Message-ID: <20121116184136.GK3332@n2100.arm.linux.org.uk> To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org On Fri, Nov 16, 2012 at 09:13:33AM -0800, Tony Lindgren wrote: > * Russell King - ARM Linux [121116 02:07]: > > > > So, we don't detect whether we're running in secure mode or not; as I've > > already stated, we don't have a way to do that. We instead only apply > > work-arounds which aren't already enabled prior to the kernel booting. > > So, even on a secure mode platform, we will avoid writing the bits if the > > work-around has already been applied. > > This all assumes that we can read the value of the diagnostic register, > and on my 4430 blaze the read returns zero. I have no idea if this is > the correct value for the register, or if reads always just returns 0. ARM Ltd has made that assumption since the inception of the errata work-arounds appearing in the kernel for v6+ CPUs... But your question may prove to be moot if we end up ripping all these out, like I'm beginning to think we should do.