From mboxrd@z Thu Jan 1 00:00:00 1970 From: Chen-Yu Tsai Date: Wed, 7 Jun 2017 11:47:24 +0800 Subject: [U-Boot] [linux-sunxi] [RFC PATCH 8/8] sunxi: enable PSCI for A83T SoC In-Reply-To: References: <20170607004721.24194-1-icenowy@aosc.io> <20170607004721.24194-9-icenowy@aosc.io> Message-ID: List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit To: u-boot@lists.denx.de On Wed, Jun 7, 2017 at 11:40 AM, Icenowy Zheng wrote: > > > 于 2017年6月7日 GMT+08:00 上午11:36:27, Chen-Yu Tsai 写到: >>On Wed, Jun 7, 2017 at 8:47 AM, Icenowy Zheng wrote: >>> As we have now a basical implementation of PSCI for A83T, enable >>> non-secure boot support and PSCI on A83T now. >>> >>> Signed-off-by: Icenowy Zheng >>> --- >>> arch/arm/mach-sunxi/Kconfig | 4 ++++ >>> 1 file changed, 4 insertions(+) >>> >>> diff --git a/arch/arm/mach-sunxi/Kconfig >>b/arch/arm/mach-sunxi/Kconfig >>> index 7ced838d6a..31d29de428 100644 >>> --- a/arch/arm/mach-sunxi/Kconfig >>> +++ b/arch/arm/mach-sunxi/Kconfig >>> @@ -98,8 +98,12 @@ config MACH_SUN8I_A33 >>> config MACH_SUN8I_A83T >>> bool "sun8i (Allwinner A83T)" >>> select CPU_V7 >>> + select CPU_V7_HAS_NONSEC >>> + select CPU_V7_HAS_VIRT >>> + select ARCH_SUPPORT_PSCI >>> select SUNXI_GEN_SUN6I >>> select SUPPORT_SPL >>> + select ARMV7_BOOT_SEC_DEFAULT if OLD_SUNXI_KERNEL_COMPAT >> >>The kernel does not work yet. Please have it boot to secure by default >>regardless of the kernel. We can have it boot non-secure once the >>kernel >>has been working for a reasonable amount of time. >> >>I don't want clueless users coming and asking why it suddenly stopped >>working. This should be an experimental feature. > > Maybe you should send out the fix, and tag them to also apply to > stable tree. > > GIC is really broken, UP systems only work by chance. We > shouldn't depend on this behavior. As I previously explained, it is not the GIC that is broken. I believe the GIC is working exactly as it is supposed to with regards to its input signals. Allwinner's security extensions implementation simply does not properly forward the AXI secure bit when the e-fuse's secure bit isn't burned. ChenYu