lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 25 Jul 2010 20:05:17 +0300 From: Alexander Shishkin <virtuoso@...nd.org> To: linux-arm-kernel@...ts.infradead.org Cc: Alexander Shishkin <virtuoso@...nd.org>, Russell King <linux@....linux.org.uk>, linux-kernel@...r.kernel.org Subject: [PATCH 4/7] etm: do a dummy read from OSSRR during initialization The first read from ETM OS save and restore register after the power down bit deassertion returns garbage. Signed-off-by: Alexander Shishkin <virtuoso@...nd.org> Cc: Russell King <linux@....linux.org.uk> Cc: linux-arm-kernel@...ts.infradead.org Cc: linux-kernel@...r.kernel.org --- arch/arm/kernel/etm.c | 4 +++- 1 files changed, 3 insertions(+), 1 deletions(-) diff --git a/arch/arm/kernel/etm.c b/arch/arm/kernel/etm.c index d08062b..73b824a 100644 --- a/arch/arm/kernel/etm.c +++ b/arch/arm/kernel/etm.c @@ -558,7 +558,9 @@ static int __init etm_probe(struct amba_device *dev, struct amba_id *id) t->etm_portsz = 1; etm_unlock(t); - ret = etm_readl(t, ETMMR_PDSR); + (void)etm_readl(t, ETMMR_PDSR); + /* dummy first read */ + (void)etm_readl(&tracer, ETMMR_OSSRR); t->ncmppairs = etm_readl(t, ETMR_CONFCODE) & 0xf; etm_writel(t, 0x440, ETMR_CTRL); -- 1.7.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists