From patchwork Fri Jul 1 15:01:31 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 71314 Delivered-To: patch@linaro.org Received: by 10.140.28.4 with SMTP id 4csp348352qgy; Fri, 1 Jul 2016 08:03:26 -0700 (PDT) X-Received: by 10.66.168.13 with SMTP id zs13mr32359928pab.68.1467385405983; Fri, 01 Jul 2016 08:03:25 -0700 (PDT) Return-Path: Received: from bombadil.infradead.org (bombadil.infradead.org. [2001:1868:205::9]) by mx.google.com with ESMTPS id 15si4544669pfx.153.2016.07.01.08.03.25 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 01 Jul 2016 08:03:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-arm-kernel-bounces+patch=linaro.org@lists.infradead.org designates 2001:1868:205::9 as permitted sender) client-ip=2001:1868:205::9; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org; spf=pass (google.com: best guess record for domain of linux-arm-kernel-bounces+patch=linaro.org@lists.infradead.org designates 2001:1868:205::9 as permitted sender) smtp.mailfrom=linux-arm-kernel-bounces+patch=linaro.org@lists.infradead.org; dmarc=fail (p=NONE dis=NONE) header.from=linaro.org Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.85_2 #1 (Red Hat Linux)) id 1bIzxa-00017J-Du; Fri, 01 Jul 2016 15:02:26 +0000 Received: from mail-wm0-x235.google.com ([2a00:1450:400c:c09::235]) by bombadil.infradead.org with esmtps (Exim 4.85_2 #1 (Red Hat Linux)) id 1bIzxR-0000zK-AJ for linux-arm-kernel@lists.infradead.org; Fri, 01 Jul 2016 15:02:17 +0000 Received: by mail-wm0-x235.google.com with SMTP id a66so33142214wme.0 for ; Fri, 01 Jul 2016 08:01:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=kz5fYxYo7kVkHaVwrGcVH93vbooLzgjIqN4YKFoy1Mk=; b=SQ3aEcy4OGB6vKO6DRNJZPTgLewbbp0Ky+nOgRB1sIPddJNfuuV+k1tXeL1lb6pCGg JjvAIAhaV6qCa18N/aYtr50e7UqW26hTzhGpwk5DdVdnbJVHBjniZRooNQ8cwtt6M9ay AsDbdg2bpO3BPCfnpgZBZUzFmVJ2Hrv9LdFU0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=kz5fYxYo7kVkHaVwrGcVH93vbooLzgjIqN4YKFoy1Mk=; b=PljMpDVz6eFNMB/7X1Aj1zqhF+TWVq5VfdybSpjQ9uyHj385gJQZQP3+0F3lJBGos+ q8Rj1kqFcboEqVWIyfZDMz8wY6VrKjcXS6FaczQGzmiu4TA1S3SMLjKnM+AAs3hRkBsC 5izizAvXc2TRgciAmswkCLBHU0H1LKZup7L+Tf9yjoer5m4WM8yzfY2ry9DCYsP0vUV/ 0fggILDjNoXQ0Dkkx4ZrXDbA1h3g+H2X9WmPem6PspIDEA6DfSxBj1Q/YDvhccAoqsTI 4N6mg/i4N4wzMNcSh2FVehG8F9DDJlOhFVC3a4aEYanNoKFioiHkIs4IX7BQ8Psd3Ngx i26g== X-Gm-Message-State: ALyK8tIGN9iB4QXzYcSSRUQfsDna1FTLL6abJ/5LHkWYlJyDS4grALo6vuuMfiO//gxIQ8pl X-Received: by 10.28.210.83 with SMTP id j80mr47289wmg.54.1467385315508; Fri, 01 Jul 2016 08:01:55 -0700 (PDT) Received: from localhost.localdomain ([188.203.148.129]) by smtp.gmail.com with ESMTPSA id q6sm3024631wjt.46.2016.07.01.08.01.54 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 01 Jul 2016 08:01:54 -0700 (PDT) From: Ard Biesheuvel To: linux-efi@vger.kernel.org, linux-arm-kernel@lists.infradead.org, matt@codeblueprint.co.uk, catalin.marinas@arm.com, mark.rutland@arm.com, leif.lindholm@linaro.org Subject: [PATCH 2/2] arm64: document that pending SErrors are not allowed at kernel entry Date: Fri, 1 Jul 2016 17:01:31 +0200 Message-Id: <1467385291-9880-2-git-send-email-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1467385291-9880-1-git-send-email-ard.biesheuvel@linaro.org> References: <1467385291-9880-1-git-send-email-ard.biesheuvel@linaro.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20160701_080217_509732_5B11FC2C X-CRM114-Status: GOOD ( 10.14 ) X-Spam-Score: -2.7 (--) X-Spam-Report: SpamAssassin version 3.4.0 on bombadil.infradead.org summary: Content analysis details: (-2.7 points) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [2a00:1450:400c:c09:0:0:0:235 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ard Biesheuvel MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patch=linaro.org@lists.infradead.org Our current strategy to deal with pending SErrors at boot is to panic. So let's mention in our boot protocol documentation that no SErrors should be pending when handing over to the kernel. Signed-off-by: Ard Biesheuvel --- Documentation/arm64/booting.txt | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) -- 2.7.4 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel diff --git a/Documentation/arm64/booting.txt b/Documentation/arm64/booting.txt index 8d0df62c3fe0..75dcfead1a0c 100644 --- a/Documentation/arm64/booting.txt +++ b/Documentation/arm64/booting.txt @@ -154,8 +154,9 @@ Before jumping into the kernel, the following conditions must be met: x3 = 0 (reserved for future use) - CPU mode - All forms of interrupts must be masked in PSTATE.DAIF (Debug, SError, - IRQ and FIQ). + All forms of exceptions must be masked in PSTATE.DAIF (Debug, SError, + IRQ and FIQ), and any pending SError exceptions must be taken by the + boot loader or firmware before handing over to the kernel. The CPU must be in either EL2 (RECOMMENDED in order to have access to the virtualisation extensions) or non-secure EL1.