[PATCH 4/6] ARM: reset: add reset functionality for jumping to a physical address
Frank Hofmann
frank.hofmann at tomtom.com
Wed Jun 8 11:55:11 EDT 2011
On Tue, 7 Jun 2011, Frank Hofmann wrote:
>
>
> On Tue, 7 Jun 2011, Dave Martin wrote:
[ ... ]
>> How about:
>>
>> typeof(cpu_reset) *phys_reset =
>> (typeof(cpu_reset) *)virt_to_phys(cpu_reset);
>
> Function pointers ;-)
> Thanks.
Hmmm ...
Just found a problem with this.
If you have a MULTI_CPU config, this doesn't compile. For two reasons:
1. you cannot use cpu_reset as argument to virt_to_phys because you can't
take the address
That bit can be fixed by changing the MULTI_CPU #define in
<asm/proc-fns.h> not to include the macro argument.
(There is no code in the arm tree using cpu_reset_whatever names which
would break from that change ... still, not that nice)
2. even when you do that, you loose the "typeof()" information and the
above still doesn't compile.
Only a manual type override,
void (*phys_reset)(unsigned long) = (void (*)(unsigned long))cpu_reset;
is accepted then.
FrankH.
>
>>
>> or even:
>>
>> typedef typeof(cpu_reset) *phys_reset_t;
>> phys_reset_t phys_reset = (phys_reset_t)virt_to_phys(cpu_reset);
>>>
>>> reset_func(reset_code_phys);
>>
>> Do you mean reset_func(phys_reset) ?
>
> phys_reset(reset_code_phys);
>
> me and my copy & paste ...
>
> [ ... ]
>>> cpu_reset itself is relocatable, isn't it ? Maybe one could do the
>>> same thing with/for it as for the reset code itself. I.e. relocate
>>> to a "suitable" page if the 1:1 mapping for all of lowmem isn't
>>> possible. The catch with that is of course somehow, such a "1:1
>>> candidate page" must be found.
>>
>> If cpu_reset is guaranteed to be position-independent and self-contained,
>> we could
>> just copy it (with fncpy() for example). We would still need to know the
>> length
>> of that function somehow though. Maybe just assuming that it's not longer
>> than
>> a page would be safe enough.
>
> In all current CPU implementations it's position-dependent and
> self-contained; all they do are suitable control reg modifications, ending
> all with "mov pc, r0".
>
>>
>> In this case we would just need to find an identity-mappable target
>> location to
>> copy the code to; we can find such a location in the same way as that used
>> to
>> find space for the alternate stack, i.e., somewhere after the end of the
>> kernel
>> image.
>
> If that's a normal thing to do, then this kind of 1:1-bounce-page seems a
> good way of avoiding the address range collision.
>
> best regards,
> FrankH.
>
>>
>> Cheers
>> ---Dave
>>
>
More information about the linux-arm-kernel
mailing list