[PATCH 1/2] arm/mm: L2CC shared mutex with ARM TZ
Etienne CARRIERE ST
etienne.carriere at st.com
Thu Nov 15 09:10:59 EST 2012
If I understood well, you stated that on-going background operations on L2 can jeopardize PA operations.
So the secure code must insure other CPUs do not perform other L2 operations, including non-PA based operations.
Linux protects both PA and WAY operations using the very same spinlock.
We must hold this lock while performing any PA operations from secure world.
I am right ?
etienne
-----Original Message-----
From: Catalin Marinas [mailto:catalin.marinas at arm.com]
Sent: Thursday, November 15, 2012 2:56 PM
To: Etienne CARRIERE ST
Cc: Abhimanyu Kapur; Dave Martin; Rabin VINCENT; Russell King; Srinidhi KASAGAR; Marc Zyngier; Linus Walleij (linus.walleij at linaro.org); Will Deacon; linux-arm-kernel at lists.infradead.org
Subject: Re: [PATCH 1/2] arm/mm: L2CC shared mutex with ARM TZ
On Thu, Nov 15, 2012 at 01:46:29PM +0000, Etienne CARRIERE ST wrote:
> I think we will internally use our hack in l2x0 spin locking to
> prevent collision, based on old arch_spinlock support.
Or just handle the collision in the secure code and make sure you don't start background operations. If you don't use background operations, you don't need any locking.
--
Catalin
More information about the linux-arm-kernel
mailing list