On Fri, Jul 22, 2011 at 5:53 AM, Santosh Shilimkar santosh.shilimkar@ti.com wrote:
On 7/22/2011 6:15 PM, Woodruff, Richard wrote:
From: linux-arm-kernel-bounces@lists.infradead.org [mailto:linux-arm- kernel-bounces@lists.infradead.org] On Behalf Of Shilimkar, Santosh
With fixed IRQ migration and forcing CPU0 into an infinite WFI loop, I can offline CPU0 and still have a running system.
The secure software runs only on CPU0 and that's the biggest limitation. Other issues like hand-shake as you pointed out, power sequencing etc can be worked around.
As you know well some of the secure APIs work on CPU1 and others do not.
I notice in other thread Russell made assumption about CPU1 being able to use all because it could run some. This is not the case.
I clarified that on the other thread.
I've asked a few other ARM folks (out of band) to weigh in on this thread to determine if their platform has similar limitations as OMAP. Unfortunately no one else has responded.
Still the limitation for OMAP remains. Earlier in this thread I provided an alternative to blacklisting CPU0 for all ARM platforms by instead using a config option, but it received no comments. What is the best way to move forward?
Thanks, Mike
Regards Santosh