Multi-platform, and secure-only ARM errata workarounds
Stephen Warren
swarren at wwwdotorg.org
Tue Feb 26 13:01:30 EST 2013
On 02/26/2013 04:35 AM, Russell King - ARM Linux wrote:
> On Tue, Feb 26, 2013 at 10:23:26AM +0000, Arnd Bergmann wrote:
>> On Monday 25 February 2013, Stephen Warren wrote:
>>> Is there any other alternative I'm not seeing? Having the kernel
>>> suddenly become incompatible with any currently extant bootloader when I
>>> enable CONFIG_MULTIPLATFORM doesn't seem like a great idea.
>>
>> Could we make those errata be run-time enabled only when not booting
>> in secure mode?
>
> The long and the short answer to this is... no.
>
> 1. It is impossible to tell whether we're running secure or non-secure.
>
> 2. Errata need to be applied before the MMU is initialized. We need the
> MMU to be initialized to run any C code what so ever, so calling out
> to platform specific code to set errata is not possible. Moreover,
> we no longer determine the platform in the assembly code since DT
> came along: this was removed because detecting it in DT from assembly
> is far from trivial (you'd need to write an assembly DT parser).
>
> Now, as for having the secure mode errata enabled on a kernel running in
> non-secure mode... what happens today is that we check whether something
> before the kernel has enabled the workaround, and we omit to write to
> the register.
>
> What that means is that we expect whatever came before the kernel to have
> appropriately enabled the bits in the secure registers. If it hasn't,
> and you have one of these secure mode workarounds enabled, the kernel
> will fault at boot time.
The conditional in that statement makes me wonder which of the following
operations will fault in non-secure mode:
1) Reading from the diagnostic register.
2) Writing to the diagnostic register, of a value the same as what's
already there.
3) Writing to the diagnostic register, of a value different than what's
already there.
Would the following not fault in both secure and non-secure mode:
read diagnostic register
if desired bit already set:
b 1f
set desired bit
write value back to diagnostic register
1:
If so, that would allow a multi-SoC kernel to keep the errata workaround
enabled, and allow the kernel to apply the WAR /if/ booted in secure
mode, but require the errata to be previously enabled if the kernel was
not booted in secure mode.
More information about the linux-arm-kernel
mailing list