On 03/04/2013 02:16 AM, Peter De Schrijver wrote: > On Mon, Mar 04, 2013 at 07:34:36AM +0100, Peter De Schrijver wrote: >> On Fri, Mar 01, 2013 at 06:37:27PM +0100, Stephen Warren wrote: >> >> ... >> >>> Since some of the bits that enable WARs are banked per CPU, the WAR >>> needs to be enabled by code running on each individual CPU, each time >>> it's powered on. When a secure monitor exists, the CPU will boot through >>> it (at least on Tegra, there is a single register that defines the boot >>> vector for all CPUs; I don't know if that fact is ARM-architectural or >>> not), so the secure monitor can apply the WAR if needed. However, when >>> there is no secure monitor and the kernel runs in secure world, the >>> kernel would have to apply those WARs, since the only code that runs is >>> in the kernel. >>> >> >> The boot vector register is Tegra specific. At least on OMAP all cores boot >> from ROM afaik. > > Nicolas Pitre suggested a slightly different solution to me: > > 1) Handle CPU0 errata WARs in the bootloader OK - there's not much choice here, and I've posted a patch for this for Tegra U-Boot already. > 2) Indicate in device tree if linux is booting in secude mode or non-secure > mode. > 3) Use this information in the kernel to decide how to apply the WARs for > secondary core bringup and after powerungating. Hmmm. That seems like a lot of overhead to avoid duplicating roughly 8 assembly instructions per Tegra version. Also, some/all of the WARs in question probably need to be applied very early by assembly code, e.g. before MMU is re-enabled, so I think you'd end up parsing DT from assembly again, which would be painful. I tend to think just including the code in the kernel's SoC-specific reset handler is simplest, and even with the slight duplication, probably most maintainable. I've written a patch for this for Tegra already, which I hope to post later today, depending on testing and what other stuff I get side-tracked on. -- To unsubscribe from this list: send the line "unsubscribe linux-tegra" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html