[U-Boot] [PATCH V2 7/9] ARM: OMAP3: Introduce OMAP3 Cortex-A8 revision specific errata

Nishanth Menon nm at ti.com
Wed Feb 25 20:49:52 CET 2015


On 02/25/2015 05:15 AM, Paul Kocialkowski wrote:
> Le mardi 24 février 2015 à 16:57 -0600, Nishanth Menon a écrit :
>> 430973: Stale prediction on replaced inter working branch causes
>> 	Cortex-A8 to execute in the wrong ARM/Thumb state
>> Impacts: Everything lower than r2p1
>> Work around: Set IBE to 1
> 
> According to the Linux kernel source, this should only affect r1p*
> (hence, not r2p0):
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/arch/arm/mm/proc-v7.S#n321

I did look at the official Cortex-A8 errata doc (I think this is under
NDA at least under TI).. Doc revision 20.0

This has a "Errata Summary Table" where "X" indicates the revision
impacted. As per that, I see:
r1p1, r1p2, r1p3, r1p7 impacted. the first not impacted is r2p1.

Hence the cmp r3, #0x21	(and orrlt).

Can someone from ARM ltd comment if there could be a better
implementation? I will post a V3 based on latest documentation on my hand.

> 
>> 454179: Stale prediction may inhibit target address misprediction on
>> 	next predicted taken branch
>> Impacts: Everything lower than r2p1
>> Work around:  Set IBE and disable branch size mispredict to 1
>>
>> 621766: Under a specific set of conditions, executing a sequence of
>> 	NEON or vfp load instructions can cause processor deadlock
>> Impacts: Everything lower than r2p1
>> Work around: Set L1NEON to 1
> 
> Erratum 458693 also sets L1NEON bit and is said to only affect r2p0
> according to the Linux kernel source:
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/arch/arm/mm/proc-v7.S#n321
> 
> I'm not sure this is relevant (different erratum but similar
> workaround), but it seems odd to me.
> 
>> Since the OMAP3 generation of processors have a wide variety of CPU
>> revisions, it is more logical to enforce an implementation using
>> revision checks.
> 
> Anyways, this worked just fine on my omap3630 device (> r2p1) and didn't
> trigger the errata workarounds. I reckon someone would have to test on a
> device that does require those workarounds (e.g. omap35xx).
> 
>> Signed-off-by: Nishanth Menon <nm at ti.com>
>> ---
>>  README                                      |    3 +++
>>  arch/arm/cpu/armv7/omap3/board.c            |    2 +-
>>  arch/arm/cpu/armv7/omap3/lowlevel_init.S    |   37 +++++++++++++++++++++++++++
>>  arch/arm/include/asm/arch-omap3/sys_proto.h |    1 +
>>  4 files changed, 42 insertions(+), 1 deletion(-)
>>
>> diff --git a/README b/README
>> index d76cdc68d406..f309e27bbd02 100644
>> --- a/README
>> +++ b/README
>> @@ -625,6 +625,9 @@ The following options need to be configured:
>>  		with CONFIG_ARM_ARCH_CP15_ERRATA define. These need to have an
>>  		SoC specific implementation of the erratum workaround to
>>  		function.
>> +		CONFIG_ARM_ERRATA_430973
>> +		CONFIG_ARM_ERRATA_454179
>> +		CONFIG_ARM_ERRATA_621766
>>  		CONFIG_ARM_ERRATA_798870
>>  
>>  - Driver Model
>> diff --git a/arch/arm/cpu/armv7/omap3/board.c b/arch/arm/cpu/armv7/omap3/board.c
>> index 51abc4b09e36..7ce30949a6c6 100644
>> --- a/arch/arm/cpu/armv7/omap3/board.c
>> +++ b/arch/arm/cpu/armv7/omap3/board.c
>> @@ -408,7 +408,7 @@ static void omap3_emu_romcode_call(u32 service_id, u32 *parameters)
>>  	do_omap3_emu_romcode_call(service_id, OMAP3_PUBLIC_SRAM_SCRATCH_AREA);
>>  }
>>  
>> -static void omap3_update_aux_cr_secure(u32 set_bits, u32 clear_bits)
>> +void omap3_update_aux_cr_secure(u32 set_bits, u32 clear_bits)
>>  {
>>  	u32 acr;
>>  
>> diff --git a/arch/arm/cpu/armv7/omap3/lowlevel_init.S b/arch/arm/cpu/armv7/omap3/lowlevel_init.S
>> index 84591b8b5bab..b8e6ebccd4e7 100644
>> --- a/arch/arm/cpu/armv7/omap3/lowlevel_init.S
>> +++ b/arch/arm/cpu/armv7/omap3/lowlevel_init.S
>> @@ -48,6 +48,43 @@ ENTRY(do_omap3_emu_romcode_call)
>>  	POP {r4-r12, pc}
>>  ENDPROC(do_omap3_emu_romcode_call)
>>  
>> +#ifdef CONFIG_ARM_ARCH_CP15_ERRATA
>> +	.globl  arch_cp15_errata_workaround
>> +/*
>> + * R0 has MIDR
>> + * R1 has CPU Variant (bits 20-23)
>> + * R2 has CPU Revision (bits 0-3)
>> + * R3 is compbined CPU variant << 4 + CPU revision
>> + */
>> +ENTRY(arch_cp15_errata_workaround)
>> +	push    {r4-r12, lr}		@ save registers - ROM code may pollute
>> +
>> +	mov r0, #0			@ Nothing to set in ACR
>> +	mov r1, #0			@ Nothing to clear in ACR
>> +
>> +#ifdef CONFIG_ARM_ERRATA_454179
>> +	cmp r3, #0x21			@ Only on < r2p1
>> +	orrlt r0, r0, #(0x3 << 6)	@ Set DBSM(BIT7) and IBE(BIT6) bits
>> +#endif
>> +
>> +#ifdef CONFIG_ARM_ERRATA_430973
>> +	cmp r3, #0x21			@ Only on < r2p1
>> +	orrlt r0, r0, #(0x1 << 6)	@ Set IBE bit
>> +#endif
>> +
>> +#ifdef CONFIG_ARM_ERRATA_621766
>> +	cmp r3, #0x21			@ Only on < r2p1
>> +	orrlt r0, r0, #(0x1 << 5)	@ Set L1NEON bit
>> +#endif
>> +
>> +	add r2, r1, r0
>> +	teq r2, #0			@ See if nothing to set or clear
>> +	bne	omap3_update_aux_cr_secure	@update as per ROM code configuration needs
>> +
>> +	pop     {r4-r12, pc}		@restore the registers back.
>> +ENDPROC(arch_cp15_errata_workaround)
>> +#endif
>> +
>>  #if !defined(CONFIG_SYS_NAND_BOOT) && !defined(CONFIG_SYS_NAND_BOOT)
>>  /**************************************************************************
>>   * cpy_clk_code: relocates clock code into SRAM where its safer to execute
>> diff --git a/arch/arm/include/asm/arch-omap3/sys_proto.h b/arch/arm/include/asm/arch-omap3/sys_proto.h
>> index c06605d533d3..56126fe8e863 100644
>> --- a/arch/arm/include/asm/arch-omap3/sys_proto.h
>> +++ b/arch/arm/include/asm/arch-omap3/sys_proto.h
>> @@ -74,5 +74,6 @@ void dieid_num_r(void);
>>  void get_dieid(u32 *id);
>>  void do_omap3_emu_romcode_call(u32 service_id, u32 parameters);
>>  void omap_smc1(u32 service, u32 val);
>> +void omap3_update_aux_cr_secure(u32 set_bits, u32 clear_bits);
>>  u32 warm_reset(void);
>>  #endif
> 


-- 
Regards,
Nishanth Menon


More information about the U-Boot mailing list