From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755193AbaHARES (ORCPT ); Fri, 1 Aug 2014 13:04:18 -0400 Received: from mail-wi0-f170.google.com ([209.85.212.170]:33326 "EHLO mail-wi0-f170.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750851AbaHAREQ (ORCPT ); Fri, 1 Aug 2014 13:04:16 -0400 Date: Fri, 1 Aug 2014 19:04:11 +0200 From: Robert Richter To: Mark Rutland Cc: Ganapatrao Kulkarni , "devicetree@vger.kernel.org" , Arnd Bergmann , Pawel Moll , Ian Campbell , Catalin Marinas , Will Deacon , "linux-kernel@vger.kernel.org" , Robert Richter , Rob Herring , Kumar Gala , Radha Mohan Chintakuntla , "linux-arm-kernel@lists.infradead.org" , leif.lindholm@linaro.org Subject: Re: [PATCH 2/5] arm64, thunder: Add initial dts for Cavium Thunder SoC Message-ID: <20140801170411.GG4703@rric.localhost> References: <1406732794-20920-1-git-send-email-rric@kernel.org> <1406732794-20920-3-git-send-email-rric@kernel.org> <20140730154626.GD20162@leverpostej> <20140731095336.GB21850@leverpostej> <20140731113301.GE22994@leverpostej> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20140731113301.GE22994@leverpostej> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Mark, On 31.07.14 12:33:01, Mark Rutland wrote: > On Thu, Jul 31, 2014 at 12:12:33PM +0100, Ganapatrao Kulkarni wrote: > > We mark RAM used by ATF as secure-RAM, however we don't support > > secure/non-secure address aliasing. > > i.e, a DRAM address that can be referenced from both a secure PA and a > > non-secure PA is not allowed. > > What exactly do you mean by "not allowed"? It actually means "not possible" since secure and non-secure memory is kept in separate address ranges. > If Linux maps that memory, what happens? > > What if Linux tried to read or write to it? > > If Linux should not map that memory, it should not be described in the > memory map to begin with. Linux never will see secure-RAM. Firmware must be sure to report the correct non-secure memory ranges to the OS (e.g. unsecure mem size = total size - secure mem size). -Robert