lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 15 Sep 2014 13:33:03 -0700 From: Stephen Boyd <sboyd@...eaurora.org> To: Catalin Marinas <catalin.marinas@....com> CC: Marc Zyngier <Marc.Zyngier@....com>, Christopher Covington <cov@...eaurora.org>, Doug Anderson <dianders@...omium.org>, Will Deacon <Will.Deacon@....com>, "olof@...om.net" <olof@...om.net>, Sonny Rao <sonnyrao@...omium.org>, Mark Rutland <Mark.Rutland@....com>, Sudeep Holla <Sudeep.Holla@....com>, Lorenzo Pieralisi <Lorenzo.Pieralisi@....com>, Thomas Gleixner <tglx@...utronix.de>, Daniel Lezcano <daniel.lezcano@...aro.org>, Nathan Lynch <Nathan_Lynch@...tor.com>, "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, "robh+dt@...nel.org" <robh+dt@...nel.org>, Pawel Moll <Pawel.Moll@....com>, "ijc+devicetree@...lion.org.uk" <ijc+devicetree@...lion.org.uk>, "galak@...eaurora.org" <galak@...eaurora.org>, "devicetree@...r.kernel.org" <devicetree@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: Re: [PATCH v2] clocksource: arch_timer: Allow the device tree to specify the physical timer On 09/15/14 04:10, Catalin Marinas wrote: > On Fri, Sep 12, 2014 at 07:59:29PM +0100, Stephen Boyd wrote: >> On 09/12/14 05:14, Marc Zyngier wrote: >>> We surely can handle the UNDEF and do something there. We just can't do >>> it the way Doug described it above. >> I suggested doing that for something else a while ago and Will and Dave >> we're not thrilled[1]. The suggestion back then was to use DT to >> indicate what mode the kernel is running in. >> >> [1] >> http://lists.infradead.org/pipermail/linux-arm-kernel/2012-June/105321.html > I think the context was slightly different. As I re-read the thread, it > seems that the discussion was around whether to use some SMC interface > or not based on whether the kernel is running secure or non-secure. The > argument made by Will was to actually specify the type of the firmware > SMC interface in the DT and use it in the kernel (and probably assume > the kernel is running in secure mode if no smc interface is specified in > the DT; you could have both though, running in secure mode and also > having firmware). > > In this arch timer case, we need to work around a firmware bug (or > feature as 32-bit ARM kernels never required CNTVOFF initialisation by > firmware, no matter how small such firmware is). We don't expect a > specific SMC call to initialise CNTVOFF, so we can't describe it in the > DT. Agreed, we can't described SMC calls that don't exist. From my perspective it's just another part of the cpu boot sequence that needs to be handled in the kernel, so describing the requirement via the cpu-boot method seems appropriate. It seems like we're making it harder than it should be by handling the undef when we could have slightly different SMP boot code (and suspend/resume code) depending on the boot method property. -- Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists