Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932783AbaFKPam (ORCPT ); Wed, 11 Jun 2014 11:30:42 -0400 Received: from mailout2.w1.samsung.com ([210.118.77.12]:43329 "EHLO mailout2.w1.samsung.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753048AbaFKPaj (ORCPT ); Wed, 11 Jun 2014 11:30:39 -0400 X-AuditID: cbfec7f5-b7f626d000004b39-30-539876162f70 From: Tomasz Figa To: linux-samsung-soc@vger.kernel.org Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-omap@vger.kernel.org, Kukjin Kim , Laura Abbott , Linus Walleij , Robin Holt , Russell King , Santosh Shilimkar , Tony Lindgren , Tomasz Figa , Tomasz Figa Subject: [PATCH 0/5] Handle non-secure L2C initialization on Exynos4 Date: Wed, 11 Jun 2014 17:30:07 +0200 Message-id: <1402500612-4778-1-git-send-email-t.figa@samsung.com> X-Mailer: git-send-email 1.9.3 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprILMWRmVeSWpSXmKPExsVy+t/xy7piZTOCDa7dVLLon9bBatG74Cqb xfbOGewWU/4sZ7LY9Pgaq8XlXXPYLGYv6WexmHF+H5PF7cu8Fq/71jBbrJ/xmsVi1a4/jBb7 r3g58Hq0NPeweXz7OonF43JfL5PHzll32T3uXNvD5rF5Sb1H35ZVjB53r79k8jh+YzuTx+dN cgFcUVw2Kak5mWWpRfp2CVwZL5atYC+4JlDR+6ibrYFxF28XIyeHhICJxOMZlxghbDGJC/fW s4HYQgJLGSWmNLJA2H1MEh2LBEFsNgE1ic8Nj8BqRARUJT63LWDvYuTiYBbYyyxxZsYNsEHC Ai4SVz79BmtmASra1NAJFucVcJS4cf80O8QyOYnebW+YJzByL2BkWMUomlqaXFCclJ5rpFec mFtcmpeul5yfu4kREoxfdzAuPWZ1iFGAg1GJh9fAf1qwEGtiWXFl7iFGCQ5mJRHegsIZwUK8 KYmVValF+fFFpTmpxYcYmTg4pRoYteXXVJw+oPu3TfaUlD7f3FDfvRw8tlsnOJov4FeobuRh aRT7/H/ajXmdzpVpL+Seu39TnbOCu6dw+Vpl6Tu7l7H+bzmes3Pz2pPrNBqntD8/qe+37bYf z+oJ8qeXF5R37p58mn/TGsljP40Cbq4qnnGQke0p7/Ep23SdXJn0BC6+8niaIfRfQomlOCPR UIu5qDgRAPEOk4EkAgAA Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series intends to add support for L2 cache on Exynos4 SoCs on boards running under secure firmware, which requires certain initialization steps to be done with help of firmware, as selected registers are writable only from secure mode. First three patches extend existing support for secure write in L2C driver to account for design of secure firmware running on Exynos. Namely: 1) direct read access to certain registers is needed on Exynos, because secure firmware calls set several registers at once, 2) not all boards are running secure firmware, so .write_sec callback needs to be installed in Exynos firmware ops initialization code, 3) write access to {DATA,TAG}_LATENCY_CTRL registers fron non-secure world is not allowed and so must use l2c_write_sec as well. Those patches might affect other platforms using .write_sec callback, so I'd like to kindly ask any interested people for testing. Further two patches add impelmentation of .write_sec for Exynos secure firmware and necessary DT nodes to enable L2 cache. Tested on Exynos4210-based Universal C210 board (without secure firmware) and Exynos4412-based TRATS2 board (with secure firmware). Tomasz Figa (5): ARM: mm: cache-l2x0: Add base address argument to write_sec callback ARM: Get outer cache .write_sec callback from mach_desc only if not NULL ARM: mm: cache-l2x0: Use l2c_write_sec() for LATENCY_CTRL registers ARM: EXYNOS: Add .write_sec outer cache callback for L2C-310 ARM: dts: exynos4: Add nodes for L2 cache controller arch/arm/boot/dts/exynos4210.dtsi | 9 ++++++ arch/arm/boot/dts/exynos4x12.dtsi | 9 ++++++ arch/arm/include/asm/mach/arch.h | 3 +- arch/arm/include/asm/outercache.h | 2 +- arch/arm/kernel/irq.c | 3 +- arch/arm/mach-exynos/firmware.c | 61 ++++++++++++++++++++++++++++++++++++++ arch/arm/mach-highbank/highbank.c | 3 +- arch/arm/mach-omap2/omap4-common.c | 3 +- arch/arm/mach-ux500/cache-l2x0.c | 3 +- arch/arm/mm/cache-l2x0.c | 10 +++---- 10 files changed, 95 insertions(+), 11 deletions(-) -- 1.9.3 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/