[ARM] head.S change broke platform device registration?
Russell King - ARM Linux
linux at arm.linux.org.uk
Mon Dec 10 19:25:00 EST 2012
On Mon, Dec 10, 2012 at 06:21:52PM +0100, Marko Katić wrote:
> > The code which distinguishes between Borzoi and Akita is this:
> >
> > /* Check for a second SCOOP chip - if found we have Borzoi */
> > ldr r1, .SCOOP2ADDR
> > ==cacheline boundary without patch (0x120)=====
> > ldr r7, .BORZOIID
> > mov r6, #0x0140
> > strh r6, [r1]
> > ==cacheline boundary with patch (0x160)======
> > ldrh r6, [r1]
> > cmp r6, #0x0140
> > beq .SHARPEND @ We have Borzoi
> >
> > /* Must be Akita */
> > ldr r7, .AKITAID
> > b .SHARPEND @ We have Borzoi
> >
> > and I've marked where the cache line boundary ends up with the patch
> > in place... except of course that the caches are off here, so the
> > placement of the code should be irrelevant. It also would have the
> > reverse results from those that you're experiencing.
> >
> > My guess is that because the Scoop2 device is not present, the strh
> > access places 0x140 onto the data bus. By the time the ldrh is
> > executed, it reads the data bus, and because nothing drives it, it
> > reads back the value last present on the bus, which happens to be
> > 0x140 - and this allows us to think we have the Scoop2 device.
> >
> > In theory, because the caches are off (including the instruction
> > cache) the CPU should fetch ldrh between the strh write and the
> > ldrh access to the same address.
> >
> > Having said all that, I'm not impressed by the above code; to write to
> > a memory region which may or may not have a device, and immediately
> > read it back is a recipe for exactly this kind of stuff happening. If
> > anyone has looked at any real device detection code, they'll know that
> > this sequence is typical:
> >
> > ldr r0, =address
> > mov r1, #probe_data
> > eor r2, r1, #~0
> > str r1, [r0, #reg1]
> > str r2, [r0, #reg2]
> > ldr r3, [r0, #reg1]
> > ldr r0, [r0, #reg2]
> > teq r1, r3
> > teqeq r2, r0
> > beq found
> >
> > This sequence _purposely_ writes the opposite value between the first
> > store and the read-back of it to perturb the bus in case it's floating,
> > to prevent exactly these kinds of false positives. The second check is
> > additional belt and braces to make the check even more secure.
> >
> > Can we do that with Scoop2? I've no idea, I don't know what the weird
> > 0x40 offset is that's being probed by this code. We need whoever wrote
> > this code, but I suspect they've long since moved on and aren't
> > interested in it.
> >
> > The alternative is we can rip out all this autodetection code and go
> > in the exact opposite direction to arm-soc and force Sharp kernels
> > to be built for the exact machine that they're to be run on. Not
> > particularly desirable, but I don't have any other answers to this
> > without more information about the hardware.
>
> The scoop device is a gate array, it's programming was never disclosed.
> It's datasheet can be found here (if it's of any use):
>
> http://www.penguin.cz/~utx/zaurus/datasheets/ASIC_S1L50752B26B200/
>
> So the only documentation we have is the arm/common/scoop.c driver.
> Richard might have more information on it, I CC-ed him.
Or maybe Richard can suggest a more secure probing solution along the
lines of the above given his experience with these platforms.
More information about the linux-arm-kernel
mailing list