public inbox for u-boot@lists.denx.de
 help / color / mirror / Atom feed
From: Thierry Reding <treding@nvidia.com>
To: u-boot@lists.denx.de
Subject: [U-Boot] [PATCH v5 08/14] virt-dt: Allow reservation of secure region when in a RAM carveout
Date: Thu, 12 Mar 2015 09:18:01 +0100	[thread overview]
Message-ID: <20150312081800.GB30605@ulmo.nvidia.com> (raw)
In-Reply-To: <20150311151225.GX32541@bill-the-cat>

On Wed, Mar 11, 2015 at 11:12:25AM -0400, Tom Rini wrote:
> * PGP Signed by an unknown key
> 
> On Mon, Mar 09, 2015 at 08:00:18AM +0100, Jan Kiszka wrote:
> 
> > In this case the secure code lives in RAM, and hence the memory node in
> > the device tree needs to be adjusted. This avoids that the OS will map
> > and possibly access the reservation.
> > 
> > Add support for setting CONFIG_ARMV7_SECURE_RESERVE_SIZE to carve out
> > such a region. We only support cutting off memory from the beginning or
> > the end of a RAM bank as we do not want to increase their number (which
> > would happen if punching a hole) for simplicity reasons
> > 
> > This will be used in a subsequent patch for Jetson-TK1.
> > 
> > Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
> > ---
> >  arch/arm/cpu/armv7/virt-dt.c | 29 +++++++++++++++++++++++++++++
> 
> My concern here is that this looks a lot like things we would re-use on
> armv8 and we're making them potentially needlessly v7-centric.  If
> nothing else, the function names should be generic and this be the v7
> implementation of them, yes?

In my opinion it's fine to go along with this and then refactor things
once we have an ARMv8 board that makes use of this.

Thierry
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <http://lists.denx.de/pipermail/u-boot/attachments/20150312/d3cc3154/attachment.sig>

  parent reply	other threads:[~2015-03-12  8:18 UTC|newest]

Thread overview: 59+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-03-09  7:00 [U-Boot] [PATCH v5 00/14] Add PSCI support for Jetson TK1/Tegra124 + CNTFRQ fix Jan Kiszka
2015-03-09  7:00 ` [U-Boot] [PATCH v5 01/14] sun7i: Remove duplicate call to psci_arch_init Jan Kiszka
2015-03-11 15:11   ` Tom Rini
2015-03-12  7:34     ` Jan Kiszka
2015-03-12 12:28       ` Tom Rini
2015-03-12 13:44         ` Jan Kiszka
2015-03-21 13:34     ` Hans de Goede
2015-03-09  7:00 ` [U-Boot] [PATCH v5 02/14] ARM: Factor out common psci_get_cpu_id Jan Kiszka
2015-03-11 15:11   ` Tom Rini
2015-03-18 16:54   ` Ian Campbell
2015-03-19  7:52     ` Jan Kiszka
2015-03-09  7:00 ` [U-Boot] [PATCH v5 03/14] ARM: Factor out reusable psci_cpu_off_common Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 04/14] ARM: Factor out reusable psci_cpu_entry Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 05/14] ARM: Factor out reusable psci_get_cpu_stack_top Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 06/14] ARM: Put target PC for PSCI CPU_ON on per-CPU stack Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 07/14] tegra124: Add more registers to struct mc_ctlr Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 08/14] virt-dt: Allow reservation of secure region when in a RAM carveout Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-12  7:34     ` Jan Kiszka
2015-03-12  8:18     ` Thierry Reding [this message]
2015-03-12 12:30       ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 09/14] tegra: Make tegra_powergate_power_on public Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 10/14] tegra: Add ap_pm_init hook Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 11/14] tegra124: Add PSCI support for Tegra124 Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 12/14] jetson-tk1: Add PSCI configuration options and reserve secure code Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 13/14] tegra124: Reserve secure RAM using MC_SECURITY_CFG{0, 1}_0 Jan Kiszka
2015-03-11 15:12   ` Tom Rini
2015-03-09  7:00 ` [U-Boot] [PATCH v5 14/14] tegra: Set CNTFRQ for secondary CPUs Jan Kiszka
2015-03-11 15:13   ` Tom Rini
2015-03-11  8:56 ` [U-Boot] [PATCH v5 00/14] Add PSCI support for Jetson TK1/Tegra124 + CNTFRQ fix Ian Campbell
2015-03-12  7:55   ` Ian Campbell
2015-03-11 15:11 ` Tom Rini
2015-03-18  6:40   ` Jan Kiszka
2015-03-18 16:02     ` Tom Warren
2015-03-18 16:54   ` Ian Campbell
2015-03-19  7:52     ` Jan Kiszka
2015-03-19 15:02 ` Thierry Reding
2015-04-08  8:37   ` Jan Kiszka
2015-04-08 13:43     ` Tom Rini
2015-04-08 13:55       ` Jan Kiszka
2015-04-08 14:02         ` Tom Rini
2015-04-08 14:12           ` Jan Kiszka
2015-04-08 15:54             ` Tom Rini
2015-04-08 16:13               ` Jan Kiszka
2015-04-08 16:22                 ` Tom Rini
2015-04-10  6:59     ` Thierry Reding
2015-04-10  7:07       ` Jan Kiszka
2015-04-10  9:54         ` Thierry Reding
2015-04-10 10:19           ` Jan Kiszka
2015-04-10 10:22             ` Thierry Reding

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20150312081800.GB30605@ulmo.nvidia.com \
    --to=treding@nvidia.com \
    --cc=u-boot@lists.denx.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox