From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Rini Date: Wed, 3 Mar 2021 14:09:13 -0500 Subject: [PATCH 5/8] arm: cp15: update DACR value to activate access control In-Reply-To: <20210205135332.5.I7ab5a1fc95ca9fae01a4ec194a67374ba6872638@changeid> References: <20210205125339.24721-1-patrick.delaunay@foss.st.com> <20210205135332.5.I7ab5a1fc95ca9fae01a4ec194a67374ba6872638@changeid> Message-ID: <20210303190913.GR1310@bill-the-cat> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: u-boot@lists.denx.de On Fri, Feb 05, 2021 at 01:53:36PM +0100, Patrick Delaunay wrote: > Update the initial value of Domain Access Control Register (DACR) > and set by default the access permission to client (DACR_Dn_CLIENT = 1U) > for each of the 16 domains and no more to all-supervisor > (DACR_Dn_MANAGER = 3U). > > This patch allows to activate the domain checking in MMU against the > permission bits in the translation tables and avoids prefetching issue > on ARMv7 [1]. > > Today it was already done for OMAP2 architecture > ./arch/arm/mach-omap2/omap-cache.c::arm_init_domains > introduced by commit de63ac278cba ("ARM: mmu: Set domain permissions > to client access") which fixes lot of speculative prefetch aborts seen > on OMAP5 secure devices. > > [1] https://developer.arm.com/documentation/ddi0406/b/System-Level-Architecture/Virtual-Memory-System-Architecture--VMSA-/Memory-access-control/The-Execute-Never--XN--attribute-and-instruction-prefetching > > Signed-off-by: Patrick Delaunay > Reported-by: Ard Biesheuvel > Signed-off-by: Patrick Delaunay Applied to u-boot/next, thanks! -- Tom -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 659 bytes Desc: not available URL: