Re: [PATCH] bootwrapper: CPU hotplug aware boot protocol

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Dec 14, 2012 at 3:49 AM, Jon Medhurst (Tixy) <tixy@xxxxxxxxxx> wrote:
> On Thu, 2012-12-13 at 13:52 -0800, Christoffer Dall wrote:
>> On Friday, December 7, 2012, Jon Medhurst (Tixy) wrote:
>>
>> > To enable CPU hotplug the need to provide some boot code at the
>> reset
>> > vector and which survives after the kernel has booted without being
>> > overwritten. We achieve this by the getting the linker script to
>> place
>> > the code in boot.S at address zero. This now means we can delete the
>> > code that relocates the secondary CPU pen code to "a location less
>> > likely to be overridden".
>> >
>>
>> not knowing these dev boards's memory maps I assume that the sysflags
>> are
>> initialized to 0
>
> That's what the TRM says and what is observed in practice.
>
>>  and that the first part of the physical memory space is
>> reserved for secure access?
>
> Wasn't quite sure what you meant my that, so looked at the RTSM manual
> for 'security' and spotted that if you enable the 'secure_memory'
> option, then the NOR flash at address 0 is "Secure RO, aborts on
> non-secure accesses". So if we need to support that option (do we?) then
> my patch is broken.
>
we probably don't need this for vexpress in any situation that uses
the boot-wrapper would be my guess, and we can always fix later then.

What I was trying to figure out was why you can get rid of the "a
location less likely to be overridden" and why you're sure this memory
stays unmodified - I thought that was because you were loading the
code in the beginning of the physical memory space, which wouldn't be
touched by the linux kernel (i.e. reserved for the secure side), but
my guess may have been wrong and I was never a whiz with linker
scripts.

-Christoffer
_______________________________________________
kvmarm mailing list
kvmarm@xxxxxxxxxxxxxxxxxxxxx
https://lists.cs.columbia.edu/cucslists/listinfo/kvmarm


[Index of Archives]     [Linux KVM]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux