mirror of
https://github.com/torvalds/linux.git
synced 2024-12-28 13:51:44 +00:00
716a3dc200
Several platforms are now using the memblock_alloc+memblock_free+
memblock_remove trick to obtain memory which won't be mapped in the
kernel's page tables. Most platforms do this (correctly) in the
->reserve callback. However, OMAP has started to call these functions
outside of this callback, and this is extremely unsafe - memory will
not be unmapped, and could well be given out after memblock is no
longer responsible for its management.
So, provide arm_memblock_steal() to perform this function, and ensure
that it panic()s if it is used inappropriately. Convert everyone
over, including OMAP.
As a result, OMAP with OMAP4_ERRATA_I688 enabled will panic on boot
with this change. Mark this option as BROKEN and make it depend on
BROKEN. OMAP needs to be fixed, or 137d105d50
(ARM: OMAP4: Fix
errata i688 with MPU interconnect barriers.) reverted until such
time it can be fixed correctly.
Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
73 lines
1.6 KiB
C
73 lines
1.6 KiB
C
/*
|
|
* OMAP Secure API infrastructure.
|
|
*
|
|
* Copyright (C) 2011 Texas Instruments, Inc.
|
|
* Santosh Shilimkar <santosh.shilimkar@ti.com>
|
|
*
|
|
*
|
|
* This program is free software,you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/init.h>
|
|
#include <linux/io.h>
|
|
#include <linux/memblock.h>
|
|
|
|
#include <asm/cacheflush.h>
|
|
#include <asm/memblock.h>
|
|
|
|
#include <mach/omap-secure.h>
|
|
|
|
static phys_addr_t omap_secure_memblock_base;
|
|
|
|
/**
|
|
* omap_sec_dispatcher: Routine to dispatch low power secure
|
|
* service routines
|
|
* @idx: The HAL API index
|
|
* @flag: The flag indicating criticality of operation
|
|
* @nargs: Number of valid arguments out of four.
|
|
* @arg1, arg2, arg3 args4: Parameters passed to secure API
|
|
*
|
|
* Return the non-zero error value on failure.
|
|
*/
|
|
u32 omap_secure_dispatcher(u32 idx, u32 flag, u32 nargs, u32 arg1, u32 arg2,
|
|
u32 arg3, u32 arg4)
|
|
{
|
|
u32 ret;
|
|
u32 param[5];
|
|
|
|
param[0] = nargs;
|
|
param[1] = arg1;
|
|
param[2] = arg2;
|
|
param[3] = arg3;
|
|
param[4] = arg4;
|
|
|
|
/*
|
|
* Secure API needs physical address
|
|
* pointer for the parameters
|
|
*/
|
|
flush_cache_all();
|
|
outer_clean_range(__pa(param), __pa(param + 5));
|
|
ret = omap_smc2(idx, flag, __pa(param));
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* Allocate the memory to save secure ram */
|
|
int __init omap_secure_ram_reserve_memblock(void)
|
|
{
|
|
u32 size = OMAP_SECURE_RAM_STORAGE;
|
|
|
|
size = ALIGN(size, SZ_1M);
|
|
omap_secure_memblock_base = arm_memblock_steal(size, SZ_1M);
|
|
|
|
return 0;
|
|
}
|
|
|
|
phys_addr_t omap_secure_ram_mempool_base(void)
|
|
{
|
|
return omap_secure_memblock_base;
|
|
}
|