From nobody Mon May 6 14:49:55 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail header.i=@wdc.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=wdc.com ARC-Seal: i=1; a=rsa-sha256; t=1593110372; cv=none; d=zohomail.com; s=zohoarc; b=mxX9IDVLvSuQb5wk0tHKh7nd/iPax9V2edzihPq1MdECtwBIawt0INkNGIc7E3Usfw+JKromeUnuxWcLxMt6DV5tlqJeMCoM7tuIRUASvrubJxYGnMK3qVAkN8vq62qZDamfwHq4Y3AwA1PRtnlKQIl5ow5kIgj19nyk2RKZPbg= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1593110372; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=OI5vxv1K0Odu6K4hTBHczOt8JO1hynPqSVMyJeMudH4=; b=FWrWTmb8WtU3T0JkMWpD0jFChkQ0/SVp9Zm8ZWYcXhQPNvqRbDL96ZY2bHWP4dLzq3fhHghlVKTp20S95jy75rO2DppGT608tXsZJT4noILE3u9QoJg4u/Uj8Ik1hUL5LzL46ShU370tsaHrBLGGS9cuPTpbxdIAnb5LP3YrOTc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail header.i=@wdc.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1593110372687904.1362334104326; Thu, 25 Jun 2020 11:39:32 -0700 (PDT) Received: from localhost ([::1]:50266 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1joWmZ-0000t3-91 for importer@patchew.org; Thu, 25 Jun 2020 14:39:31 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:37604) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1joWl0-0007tn-MZ; Thu, 25 Jun 2020 14:37:54 -0400 Received: from esa3.hgst.iphmx.com ([216.71.153.141]:3333) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1joWky-0006Ic-Ic; Thu, 25 Jun 2020 14:37:54 -0400 Received: from h199-255-45-14.hgst.com (HELO uls-op-cesaep01.wdc.com) ([199.255.45.14]) by ob1.hgst.iphmx.com with ESMTP; 26 Jun 2020 02:37:45 +0800 Received: from uls-op-cesaip02.wdc.com ([10.248.3.37]) by uls-op-cesaep01.wdc.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Jun 2020 11:26:45 -0700 Received: from usa003490.ad.shared (HELO yoda.hgst.com) ([10.86.58.205]) by uls-op-cesaip02.wdc.com with ESMTP; 25 Jun 2020 11:37:44 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1593110273; x=1624646273; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Ai2mrRf9+4yzmnnkppKa9kqzIiDSms8AG3F3kLHnLpU=; b=OJrAWn4FZeoK/kC9MIG4xzVTdIYMOYgehh5CGB4ZtAainTh0kt9kGmN8 XBnxM5FQFMH+iGs1m7WrsVZwYuBgxLC8L29cZ/tSWQjHzzXW/n/QGnPGd 4nm1L1vbaLzz+o4daZBPTLQ09P8BRVYIQhFufprqIT7rr1fJzH5dEiWn8 cplYJFwCJT5Wv2HBu1Iv1zkdQ1FX8GWjeZMTDC31uqaBVYKhXVB5G4yu8 fmx5Iqbswydt1ITdvrXjem8CGkwJGm8EJ9QBrqxaEaDS8aG2H1itVD4qB 2van/1dvkaX11bSU2INPc0MJDjIZzqEi7wU/EJCD2MIv+1hSsMUzZYFCx g==; IronPort-SDR: Y286Xhwet0Ozn3L5LJYw18eOfR8vkBetCLSozPM7LIOtcJb3klP3IAYLip1tTlfhGQf6jeiu28 icS4PcJ2j5jbcw3RU8PUX+uF+S51WJVbMLkXyXi3qMo9sT23bv6MvRJypyTyb3WBghQAOw2ExP A8EiCixQ7wgnJsRpBK3g6YNN/pFPyA7dbsFIZqc04YJeksP2cpNpNN3h5+tAGgIh08JfVui9uA vlvhqQVT/PL+CbGDdMyoGcjYJldAc9AQcEq/ObKBPFGIW7H9CnNnVF37GOejE+yIcqQKGM66tR ZxI= X-IronPort-AV: E=Sophos;i="5.75,280,1589212800"; d="scan'208";a="145259210" IronPort-SDR: 5obrPZPBl2ZChmzxhLLoFyf3753nY+SAVyk/q+Z9ThA1Kvfp7xQOxjZP3kJgzeyr8q+Tvy2kxH u6tGkxItkMll6N6/kV0SFrNL0SnbDDUlw= IronPort-SDR: KMtH/aghD2EdGCthrzRqMJB085frxxtGq0daVTHhXZUyQfjqUgjq9rgCdsiOLrd4KmFFG9FBwe jeqanOJGzhBw== WDCIronportException: Internal From: Atish Patra To: qemu-devel@nongnu.org Subject: [PATCH v2 1/3] riscv: Unify Qemu's reset vector code path Date: Thu, 25 Jun 2020 11:37:39 -0700 Message-Id: <20200625183741.642407-2-atish.patra@wdc.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200625183741.642407-1-atish.patra@wdc.com> References: <20200625183741.642407-1-atish.patra@wdc.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=216.71.153.141; envelope-from=prvs=43885dcdb=atish.patra@wdc.com; helo=esa3.hgst.iphmx.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/06/25 14:37:44 X-ACL-Warn: Detected OS = FreeBSD 9.x or newer [fuzzy] X-Spam_score_int: -43 X-Spam_score: -4.4 X-Spam_bar: ---- X-Spam_report: (-4.4 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001 autolearn=_AUTOLEARN X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: qemu-riscv@nongnu.org, Sagar Karandikar , Bastian Koppelmann , Atish Patra , Alistair Francis , Alexander Richardson , Palmer Dabbelt , Bin Meng Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Type: text/plain; charset="utf-8" Currently, all riscv machines except sifive_u have identical reset vector code implementations with memory addresses being different for all machines. They can be easily combined into a single function in common code. Move it to common function and let all the machines use the common function. Signed-off-by: Atish Patra Reviewed-by: Alistair Francis --- hw/riscv/boot.c | 46 +++++++++++++++++++++++++++++++++++++++++ hw/riscv/spike.c | 38 +++------------------------------- hw/riscv/virt.c | 37 +++------------------------------ include/hw/riscv/boot.h | 2 ++ 4 files changed, 54 insertions(+), 69 deletions(-) diff --git a/hw/riscv/boot.c b/hw/riscv/boot.c index adb421b91b68..8ed96da600c9 100644 --- a/hw/riscv/boot.c +++ b/hw/riscv/boot.c @@ -22,12 +22,16 @@ #include "qemu/units.h" #include "qemu/error-report.h" #include "exec/cpu-defs.h" +#include "exec/address-spaces.h" #include "hw/boards.h" #include "hw/loader.h" #include "hw/riscv/boot.h" #include "elf.h" +#include "sysemu/device_tree.h" #include "sysemu/qtest.h" =20 +#include + #if defined(TARGET_RISCV32) # define KERNEL_BOOT_ADDRESS 0x80400000 #else @@ -155,3 +159,45 @@ hwaddr riscv_load_initrd(const char *filename, uint64_= t mem_size, =20 return *start + size; } + +void riscv_setup_rom_reset_vec(hwaddr start_addr, hwaddr rom_base, + hwaddr rom_size, void *fdt) +{ + int i; + /* reset vector */ + uint32_t reset_vec[8] =3D { + 0x00000297, /* 1: auipc t0, %pcrel_hi(dtb) */ + 0x02028593, /* addi a1, t0, %pcrel_lo(1b) */ + 0xf1402573, /* csrr a0, mhartid */ +#if defined(TARGET_RISCV32) + 0x0182a283, /* lw t0, 24(t0) */ +#elif defined(TARGET_RISCV64) + 0x0182b283, /* ld t0, 24(t0) */ +#endif + 0x00028067, /* jr t0 */ + 0x00000000, + start_addr, /* start: .dword */ + 0x00000000, + /* dtb: */ + }; + + /* copy in the reset vector in little_endian byte order */ + for (i =3D 0; i < sizeof(reset_vec) >> 2; i++) { + reset_vec[i] =3D cpu_to_le32(reset_vec[i]); + } + rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec), + rom_base, &address_space_memory); + + /* copy in the device tree */ + if (fdt_pack(fdt) || fdt_totalsize(fdt) > + rom_size - sizeof(reset_vec)) { + error_report("not enough space to store device-tree"); + exit(1); + } + qemu_fdt_dumpdtb(fdt, fdt_totalsize(fdt)); + rom_add_blob_fixed_as("mrom.fdt", fdt, fdt_totalsize(fdt), + rom_base + sizeof(reset_vec), + &address_space_memory); + + return; +} diff --git a/hw/riscv/spike.c b/hw/riscv/spike.c index 3c87e04fdceb..561642c1fb5d 100644 --- a/hw/riscv/spike.c +++ b/hw/riscv/spike.c @@ -165,7 +165,6 @@ static void spike_board_init(MachineState *machine) MemoryRegion *system_memory =3D get_system_memory(); MemoryRegion *main_mem =3D g_new(MemoryRegion, 1); MemoryRegion *mask_rom =3D g_new(MemoryRegion, 1); - int i; unsigned int smp_cpus =3D machine->smp.cpus; =20 /* Initialize SOC */ @@ -212,40 +211,9 @@ static void spike_board_init(MachineState *machine) } } =20 - /* reset vector */ - uint32_t reset_vec[8] =3D { - 0x00000297, /* 1: auipc t0, %pcrel_hi(dtb) */ - 0x02028593, /* addi a1, t0, %pcrel_lo(1b) */ - 0xf1402573, /* csrr a0, mhartid */ -#if defined(TARGET_RISCV32) - 0x0182a283, /* lw t0, 24(t0) */ -#elif defined(TARGET_RISCV64) - 0x0182b283, /* ld t0, 24(t0) */ -#endif - 0x00028067, /* jr t0 */ - 0x00000000, - memmap[SPIKE_DRAM].base, /* start: .dword DRAM_BASE */ - 0x00000000, - /* dtb: */ - }; - - /* copy in the reset vector in little_endian byte order */ - for (i =3D 0; i < sizeof(reset_vec) >> 2; i++) { - reset_vec[i] =3D cpu_to_le32(reset_vec[i]); - } - rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec), - memmap[SPIKE_MROM].base, &address_space_memory); - - /* copy in the device tree */ - if (fdt_pack(s->fdt) || fdt_totalsize(s->fdt) > - memmap[SPIKE_MROM].size - sizeof(reset_vec)) { - error_report("not enough space to store device-tree"); - exit(1); - } - qemu_fdt_dumpdtb(s->fdt, fdt_totalsize(s->fdt)); - rom_add_blob_fixed_as("mrom.fdt", s->fdt, fdt_totalsize(s->fdt), - memmap[SPIKE_MROM].base + sizeof(reset_vec), - &address_space_memory); + /* load the reset vector */ + riscv_setup_rom_reset_vec(memmap[SPIKE_DRAM].base, memmap[SPIKE_MROM].= base, + memmap[SPIKE_MROM].size, s->fdt); =20 /* initialize HTIF using symbols found in load_kernel */ htif_mm_init(system_memory, mask_rom, &s->soc.harts[0].env, serial_hd(= 0)); diff --git a/hw/riscv/virt.c b/hw/riscv/virt.c index 616db6f5aced..22a60259daab 100644 --- a/hw/riscv/virt.c +++ b/hw/riscv/virt.c @@ -535,40 +535,9 @@ static void virt_machine_init(MachineState *machine) start_addr =3D virt_memmap[VIRT_FLASH].base; } =20 - /* reset vector */ - uint32_t reset_vec[8] =3D { - 0x00000297, /* 1: auipc t0, %pcrel_hi(dtb) */ - 0x02028593, /* addi a1, t0, %pcrel_lo(1b) */ - 0xf1402573, /* csrr a0, mhartid */ -#if defined(TARGET_RISCV32) - 0x0182a283, /* lw t0, 24(t0) */ -#elif defined(TARGET_RISCV64) - 0x0182b283, /* ld t0, 24(t0) */ -#endif - 0x00028067, /* jr t0 */ - 0x00000000, - start_addr, /* start: .dword */ - 0x00000000, - /* dtb: */ - }; - - /* copy in the reset vector in little_endian byte order */ - for (i =3D 0; i < sizeof(reset_vec) >> 2; i++) { - reset_vec[i] =3D cpu_to_le32(reset_vec[i]); - } - rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec), - memmap[VIRT_MROM].base, &address_space_memory); - - /* copy in the device tree */ - if (fdt_pack(s->fdt) || fdt_totalsize(s->fdt) > - memmap[VIRT_MROM].size - sizeof(reset_vec)) { - error_report("not enough space to store device-tree"); - exit(1); - } - qemu_fdt_dumpdtb(s->fdt, fdt_totalsize(s->fdt)); - rom_add_blob_fixed_as("mrom.fdt", s->fdt, fdt_totalsize(s->fdt), - memmap[VIRT_MROM].base + sizeof(reset_vec), - &address_space_memory); + /* load the reset vector */ + riscv_setup_rom_reset_vec(start_addr, virt_memmap[VIRT_MROM].base, + virt_memmap[VIRT_MROM].size, s->fdt); =20 /* create PLIC hart topology configuration string */ plic_hart_config_len =3D (strlen(VIRT_PLIC_HART_CONFIG) + 1) * smp_cpu= s; diff --git a/include/hw/riscv/boot.h b/include/hw/riscv/boot.h index 9daa98da08d7..3e9759c89aa2 100644 --- a/include/hw/riscv/boot.h +++ b/include/hw/riscv/boot.h @@ -35,5 +35,7 @@ target_ulong riscv_load_kernel(const char *kernel_filenam= e, symbol_fn_t sym_cb); hwaddr riscv_load_initrd(const char *filename, uint64_t mem_size, uint64_t kernel_entry, hwaddr *start); +void riscv_setup_rom_reset_vec(hwaddr saddr, hwaddr rom_base, + hwaddr rom_size, void *fdt); =20 #endif /* RISCV_BOOT_H */ --=20 2.26.2 From nobody Mon May 6 14:49:56 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail header.i=@wdc.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=wdc.com ARC-Seal: i=1; a=rsa-sha256; t=1593110514; cv=none; d=zohomail.com; s=zohoarc; b=Siedf7StG66Y4dTYsHzsrtNIxQ+ZBbFB0CmFP/TquYnxGHZDc2AqywzvFN+DxFwEM9k+2n/gDCzFDGI6xxro75Wd4twpmjBPmGZCo4i+Ns3oVahzMPtQ9a3BsKCqpUTJGbm2pS+Dij4mpaEH+I46d35yUszGIlGPZtqqNZy0/Ds= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1593110514; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=Ds+OmUh5jhBH/aBrAssJFZfGXBfAHdgj9DiqJmoyQko=; b=ORA+LFjtXP8WkelbhzRGuDJZAEK+XuJwNlTROW1sHyPcH7kndohnqM3deV7ruk05V28py94rq8Z+AIvn5vk6a+UokcLNu0YWlSHGPCVv1kBsVtj+whKWi/erMYvga6b3qEVddsgjAAXWVQass2mJJ5FVbdsisOwDPbVw8T4iArg= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail header.i=@wdc.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1593110514413351.1278710253381; Thu, 25 Jun 2020 11:41:54 -0700 (PDT) Received: from localhost ([::1]:57118 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1joWoq-0003sS-W1 for importer@patchew.org; Thu, 25 Jun 2020 14:41:53 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:37612) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1joWl1-0007vz-ON; Thu, 25 Jun 2020 14:37:55 -0400 Received: from esa3.hgst.iphmx.com ([216.71.153.141]:3344) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1joWkz-0006KI-HU; Thu, 25 Jun 2020 14:37:55 -0400 Received: from h199-255-45-14.hgst.com (HELO uls-op-cesaep01.wdc.com) ([199.255.45.14]) by ob1.hgst.iphmx.com with ESMTP; 26 Jun 2020 02:37:46 +0800 Received: from uls-op-cesaip02.wdc.com ([10.248.3.37]) by uls-op-cesaep01.wdc.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Jun 2020 11:26:45 -0700 Received: from usa003490.ad.shared (HELO yoda.hgst.com) ([10.86.58.205]) by uls-op-cesaip02.wdc.com with ESMTP; 25 Jun 2020 11:37:45 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1593110274; x=1624646274; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Psv+EZjSl6j1FaUIcq8iIV5ARZPMW7/XTeGuek9zX6U=; b=GnbHT3knoIvf9hbKgDY8y2DLTgh0nVLkGDqB2Nf7Br0ZZKJG37TfLbS+ mFXNZHdjkJbVw0uXa1Qf4MzcXrUN8vyGYWtxlNSxEgUtSAV/cu+JrbG2D kcFKkSIU1iJIPFX4JE3wwkPUStYGnF3DLgW8zIFJ72C+U5CVj5csDM9Qc BqQeZ6vuPAx7zPNOGtLG9K1OQn96hPcZgwp/gwUDrJwGDx/stwwKJ/KYi 0sbZf6sCY+dEp9KXTgVQaQodYa2VfuTsFYc2VhP8oCZ42V/xL3RwVqjEN DswOtLEqC2y0l7cu3ew4JniB0VEt7eBlwENJAWuWromEBtz65Z2u8wEjW g==; IronPort-SDR: rGv8+juxdXW+NMAo0OsXIirZ7dlAzYFcv/45Ec3RMr/UURyUB2diKGcXmGZqrqirayhDW7JbEO qb7JzgFkSa22wHXq4nOE3WYo0iDbwn6tOa9h/2gb2f0TiLS9H3xUvQFm7PFqzdg3XQ1FuKfTpi MTcYKGyNNL+vQiFwTWswOtsV/+UH2srtIzJN0KMl2gCddFSQOmBEx50xIF6mDbvjxsnnAj0s+g Lgu5jeH+LQj57bDTLM/vjvHRjqMlAaGHfY4MttjwqjPzkGj9Yi+bhj/aBptfu6BP1m7o94kTym kGE= X-IronPort-AV: E=Sophos;i="5.75,280,1589212800"; d="scan'208";a="145259213" IronPort-SDR: d++rySXwSF7Fm4jU6fZEjHmgCc2XPq9b6OY5vyvmdg6xi+oJY1UMusjktia12fMMtzUmBHylRP MvrQCPzoaVDqKEP6v41Yji5ve9cO5MJZs= IronPort-SDR: lxNMinUFgsMNvyhU+Rkk61ZYbQS9KrasyFcmXcghNzU5DBDvj0zKRyLGua8A0216J1DkpHrK5V VACDdpEuuMCg== WDCIronportException: Internal From: Atish Patra To: qemu-devel@nongnu.org Subject: [PATCH v2 2/3] RISC-V: Copy the fdt in dram instead of ROM Date: Thu, 25 Jun 2020 11:37:40 -0700 Message-Id: <20200625183741.642407-3-atish.patra@wdc.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200625183741.642407-1-atish.patra@wdc.com> References: <20200625183741.642407-1-atish.patra@wdc.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=216.71.153.141; envelope-from=prvs=43885dcdb=atish.patra@wdc.com; helo=esa3.hgst.iphmx.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/06/25 14:37:44 X-ACL-Warn: Detected OS = FreeBSD 9.x or newer [fuzzy] X-Spam_score_int: -43 X-Spam_score: -4.4 X-Spam_bar: ---- X-Spam_report: (-4.4 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001 autolearn=_AUTOLEARN X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: qemu-riscv@nongnu.org, Sagar Karandikar , Bastian Koppelmann , Atish Patra , Alistair Francis , Alexander Richardson , Palmer Dabbelt , Bin Meng Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Type: text/plain; charset="utf-8" Currently, the fdt is copied to the ROM after the reset vector. The firmware has to copy it to DRAM. Instead of this, directly copy the device tree to a pre-computed dram address. The device tree load address should be as far as possible from kernel and initrd images. That's why it is kept at the end of the DRAM or 4GB whichever is lesser. Signed-off-by: Atish Patra Reviewed-by: Alistair Francis --- hw/riscv/boot.c | 57 +++++++++++++++++++++++++++++------------ hw/riscv/sifive_u.c | 32 +++++++++++------------ hw/riscv/spike.c | 7 ++++- hw/riscv/virt.c | 7 ++++- include/hw/riscv/boot.h | 5 +++- 5 files changed, 71 insertions(+), 37 deletions(-) diff --git a/hw/riscv/boot.c b/hw/riscv/boot.c index 8ed96da600c9..95a6b0b378d5 100644 --- a/hw/riscv/boot.c +++ b/hw/riscv/boot.c @@ -160,44 +160,67 @@ hwaddr riscv_load_initrd(const char *filename, uint64= _t mem_size, return *start + size; } =20 +hwaddr riscv_load_fdt(hwaddr dram_base, uint64_t mem_size, void *fdt) +{ + hwaddr temp, fdt_addr; + hwaddr dram_end =3D dram_base + mem_size; + int fdtsize =3D fdt_totalsize(fdt); + + if (fdtsize <=3D 0) { + error_report("invalid device-tree"); + exit(1); + } + + /* + * We should put fdt as far as possible to avoid kernel/initrd overwri= ting + * its content. But it should be addressable by 32 bit system as well. + * Thus, put it at an aligned address that less than fdt size from end= of + * dram or 4GB whichever is lesser. + */ + temp =3D MIN(dram_end, 4096 * MiB); + fdt_addr =3D QEMU_ALIGN_DOWN(temp - fdtsize, 2 * MiB); + + fdt_pack(fdt); + /* copy in the device tree */ + qemu_fdt_dumpdtb(fdt, fdt_totalsize(fdt)); + + rom_add_blob_fixed_as("fdt", fdt, fdtsize, fdt_addr, + &address_space_memory); + + return fdt_addr; +} + void riscv_setup_rom_reset_vec(hwaddr start_addr, hwaddr rom_base, - hwaddr rom_size, void *fdt) + hwaddr rom_size, + hwaddr fdt_load_addr, void *fdt) { int i; /* reset vector */ - uint32_t reset_vec[8] =3D { - 0x00000297, /* 1: auipc t0, %pcrel_hi(dtb) */ - 0x02028593, /* addi a1, t0, %pcrel_lo(1b) */ + uint32_t reset_vec[10] =3D { + 0x00000297, /* 1: auipc t0, %pcrel_hi(fw_dyn) */ 0xf1402573, /* csrr a0, mhartid */ #if defined(TARGET_RISCV32) + 0x0202a583, /* lw a1, 32(t0) */ 0x0182a283, /* lw t0, 24(t0) */ #elif defined(TARGET_RISCV64) + 0x0202b583, /* ld a1, 32(t0) */ 0x0182b283, /* ld t0, 24(t0) */ #endif 0x00028067, /* jr t0 */ 0x00000000, start_addr, /* start: .dword */ 0x00000000, - /* dtb: */ + fdt_load_addr, /* fdt_laddr: .dword */ + 0x00000000, + /* fw_dyn: */ }; =20 /* copy in the reset vector in little_endian byte order */ - for (i =3D 0; i < sizeof(reset_vec) >> 2; i++) { + for (i =3D 0; i < ARRAY_SIZE(reset_vec); i++) { reset_vec[i] =3D cpu_to_le32(reset_vec[i]); } rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec), rom_base, &address_space_memory); =20 - /* copy in the device tree */ - if (fdt_pack(fdt) || fdt_totalsize(fdt) > - rom_size - sizeof(reset_vec)) { - error_report("not enough space to store device-tree"); - exit(1); - } - qemu_fdt_dumpdtb(fdt, fdt_totalsize(fdt)); - rom_add_blob_fixed_as("mrom.fdt", fdt, fdt_totalsize(fdt), - rom_base + sizeof(reset_vec), - &address_space_memory); - return; } diff --git a/hw/riscv/sifive_u.c b/hw/riscv/sifive_u.c index 7d051e7c9299..aba247716cee 100644 --- a/hw/riscv/sifive_u.c +++ b/hw/riscv/sifive_u.c @@ -380,6 +380,7 @@ static void sifive_u_machine_init(MachineState *machine) MemoryRegion *flash0 =3D g_new(MemoryRegion, 1); target_ulong start_addr =3D memmap[SIFIVE_U_DRAM].base; int i; + hwaddr fdt_load_addr; =20 /* Initialize SoC */ object_initialize_child(OBJECT(machine), "soc", &s->soc, TYPE_RISCV_U_= SOC); @@ -451,40 +452,37 @@ static void sifive_u_machine_init(MachineState *machi= ne) } } =20 + /* Compute the fdt load address in dram */ + fdt_load_addr =3D riscv_load_fdt(memmap[SIFIVE_U_DRAM].base, + machine->ram_size, s->fdt); + /* reset vector */ - uint32_t reset_vec[8] =3D { + uint32_t reset_vec[11] =3D { s->msel, /* MSEL pin state */ - 0x00000297, /* 1: auipc t0, %pcrel_hi(dtb) */ - 0x01c28593, /* addi a1, t0, %pcrel_lo(1b)= */ + 0x00000297, /* 1: auipc t0, %pcrel_hi(fw_dyn)= */ 0xf1402573, /* csrr a0, mhartid */ #if defined(TARGET_RISCV32) + 0x0202a583, /* lw a1, 32(t0) */ 0x0182a283, /* lw t0, 24(t0) */ #elif defined(TARGET_RISCV64) - 0x0182e283, /* lwu t0, 24(t0) */ + 0x0202b583, /* ld a1, 32(t0) */ + 0x0182b283, /* ld t0, 24(t0) */ #endif 0x00028067, /* jr t0 */ 0x00000000, start_addr, /* start: .dword */ - /* dtb: */ + 0x00000000, + fdt_load_addr, /* fdt_laddr: .dword */ + 0x00000000, + /* fw_dyn: */ }; =20 /* copy in the reset vector in little_endian byte order */ - for (i =3D 0; i < sizeof(reset_vec) >> 2; i++) { + for (i =3D 0; i < ARRAY_SIZE(reset_vec); i++) { reset_vec[i] =3D cpu_to_le32(reset_vec[i]); } rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec), memmap[SIFIVE_U_MROM].base, &address_space_memor= y); - - /* copy in the device tree */ - if (fdt_pack(s->fdt) || fdt_totalsize(s->fdt) > - memmap[SIFIVE_U_MROM].size - sizeof(reset_vec)) { - error_report("not enough space to store device-tree"); - exit(1); - } - qemu_fdt_dumpdtb(s->fdt, fdt_totalsize(s->fdt)); - rom_add_blob_fixed_as("mrom.fdt", s->fdt, fdt_totalsize(s->fdt), - memmap[SIFIVE_U_MROM].base + sizeof(reset_vec), - &address_space_memory); } =20 static bool sifive_u_machine_get_start_in_flash(Object *obj, Error **errp) diff --git a/hw/riscv/spike.c b/hw/riscv/spike.c index 561642c1fb5d..7f58e36b4550 100644 --- a/hw/riscv/spike.c +++ b/hw/riscv/spike.c @@ -166,6 +166,7 @@ static void spike_board_init(MachineState *machine) MemoryRegion *main_mem =3D g_new(MemoryRegion, 1); MemoryRegion *mask_rom =3D g_new(MemoryRegion, 1); unsigned int smp_cpus =3D machine->smp.cpus; + hwaddr fdt_load_addr; =20 /* Initialize SOC */ object_initialize_child(OBJECT(machine), "soc", &s->soc, @@ -211,9 +212,13 @@ static void spike_board_init(MachineState *machine) } } =20 + /* Compute the fdt load address in dram */ + fdt_load_addr =3D riscv_load_fdt(memmap[SPIKE_DRAM].base, + machine->ram_size, s->fdt); /* load the reset vector */ riscv_setup_rom_reset_vec(memmap[SPIKE_DRAM].base, memmap[SPIKE_MROM].= base, - memmap[SPIKE_MROM].size, s->fdt); + memmap[SPIKE_MROM].size, + fdt_load_addr, s->fdt); =20 /* initialize HTIF using symbols found in load_kernel */ htif_mm_init(system_memory, mask_rom, &s->soc.harts[0].env, serial_hd(= 0)); diff --git a/hw/riscv/virt.c b/hw/riscv/virt.c index 22a60259daab..d98d764466bf 100644 --- a/hw/riscv/virt.c +++ b/hw/riscv/virt.c @@ -481,6 +481,7 @@ static void virt_machine_init(MachineState *machine) char *plic_hart_config; size_t plic_hart_config_len; target_ulong start_addr =3D memmap[VIRT_DRAM].base; + hwaddr fdt_load_addr; int i; unsigned int smp_cpus =3D machine->smp.cpus; =20 @@ -535,9 +536,13 @@ static void virt_machine_init(MachineState *machine) start_addr =3D virt_memmap[VIRT_FLASH].base; } =20 + /* Compute the fdt load address in dram */ + fdt_load_addr =3D riscv_load_fdt(memmap[VIRT_DRAM].base, + machine->ram_size, s->fdt); /* load the reset vector */ riscv_setup_rom_reset_vec(start_addr, virt_memmap[VIRT_MROM].base, - virt_memmap[VIRT_MROM].size, s->fdt); + virt_memmap[VIRT_MROM].size, + fdt_load_addr, s->fdt); =20 /* create PLIC hart topology configuration string */ plic_hart_config_len =3D (strlen(VIRT_PLIC_HART_CONFIG) + 1) * smp_cpu= s; diff --git a/include/hw/riscv/boot.h b/include/hw/riscv/boot.h index 3e9759c89aa2..f64fcadd2390 100644 --- a/include/hw/riscv/boot.h +++ b/include/hw/riscv/boot.h @@ -35,7 +35,10 @@ target_ulong riscv_load_kernel(const char *kernel_filena= me, symbol_fn_t sym_cb); hwaddr riscv_load_initrd(const char *filename, uint64_t mem_size, uint64_t kernel_entry, hwaddr *start); +hwaddr riscv_load_fdt(hwaddr dram_start, uint64_t dram_size, + void *fdt); void riscv_setup_rom_reset_vec(hwaddr saddr, hwaddr rom_base, - hwaddr rom_size, void *fdt); + hwaddr rom_size, + hwaddr fdt_load_addr, void *fdt); =20 #endif /* RISCV_BOOT_H */ --=20 2.26.2 From nobody Mon May 6 14:49:56 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail header.i=@wdc.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=wdc.com ARC-Seal: i=1; a=rsa-sha256; t=1593110600; cv=none; d=zohomail.com; s=zohoarc; b=Lf858C3c+ZpeaiyzqPzsxb/O1FOOx51sOUw+LvJxdpw2rhY6jedPYpAg7lfRRYxg/J6T/pYNv4ZUaAJ3+7oP7i1UYaKGFOpTJMgjLnvYiRE+UO+DljbJsT8g0Def9hIkUui8mPDdnpD8jGMPiT6icrYaOujPXs4E9l3InIrzRL4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1593110600; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=sBIRzvVpfkRTzJ5qcQ+dLpGciCnJy7ZAwEwaG5Ahaz4=; b=EINO7x0MDfzhJp0vqpvujBKv9RIqC3apu4+lcNoH8HqXVJrAEyqwj/gtXVhOC5QdXqztQeZsUs8iA21Dg6Q5Bqw2obg8SoYmUiYko1sRv8k5sTyKIeNN8yNFhRWHnH7uEPItoh4cXbd15LMeM+z8aHVTa1o78W7PCMzu58QcV3k= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail header.i=@wdc.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1593110600503162.18565652925486; Thu, 25 Jun 2020 11:43:20 -0700 (PDT) Received: from localhost ([::1]:33702 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1joWqE-0005oh-Uy for importer@patchew.org; Thu, 25 Jun 2020 14:43:18 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:37582) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1joWky-0007pl-EM; Thu, 25 Jun 2020 14:37:52 -0400 Received: from esa4.hgst.iphmx.com ([216.71.154.42]:48786) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1joWkv-0006Im-QR; Thu, 25 Jun 2020 14:37:52 -0400 Received: from uls-op-cesaip01.wdc.com (HELO uls-op-cesaep01.wdc.com) ([199.255.45.14]) by ob1.hgst.iphmx.com with ESMTP; 26 Jun 2020 02:37:45 +0800 Received: from uls-op-cesaip02.wdc.com ([10.248.3.37]) by uls-op-cesaep01.wdc.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Jun 2020 11:26:46 -0700 Received: from usa003490.ad.shared (HELO yoda.hgst.com) ([10.86.58.205]) by uls-op-cesaip02.wdc.com with ESMTP; 25 Jun 2020 11:37:46 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1593110269; x=1624646269; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=iRfcb9kxUQWT7MqwrA0GfmN82wmt/5LBqyqXn0j4OHI=; b=VaUCKMuTzbVIOz7XLYh78zU3yIlZxKqQX3GAW68H4GxetrckZWG9nq3O v8mbcA+6qiRKsKW2R1ZODrsprxCxLjOcFhVxzjXtKnFGq+O+T0j+M1R5z 2KnpTnbT1XJregmDitslPETivPXLyDuKg56T9zl5d2rq9cJhdvoI0nklH fwlM/wF5tOFrbOIgujdBRIWWREKoRixoGam58dk+M8M/Pd/VHrvVsbIWT Gr5UkAzZdaYIn5Dk3biibih/OZtCe+jHQFCsMBUAAciuN1VBam8mF1vwu Fun7eRE7u8834dJmuGEUMmCD4fUxhPnbQoQSshpUqnkQeSdwbfwsecsQg w==; IronPort-SDR: bKdKbPQmY5HFJxbCydoLYiT8X/g72/fRiCDrJHBLsIPWjVe2n/FmPVCRPhyVDNdccRy9lGrXIa qNFj4rOoaTKsbOziasHeXrGUywx4Pe1aJE/hHNPMRREtVJGs3oqlFi8iHYcpjHPUTLADHyAR2T g0eigvCWPot/Ibsnw0v8KHJLWEaFuVpE0BafyeUVmgLwJaC2vLjx1aEyZ7tEexJwU/5cFaO8wk Wvb0LeqaJPLXmkU17RShXDPEc+bPw+xascvMBx7rcd6CL1H7XJ8nLjf1ZdUWt89wK5+8KcgY9Q z/Q= X-IronPort-AV: E=Sophos;i="5.75,280,1589212800"; d="scan'208";a="140930490" IronPort-SDR: ZMeXApbXSBrV6ijOFx8aTUVKLlWSHZTEIE/UApXCaIyidMC16skXpblnu7Q8EsEVLYTfngQVuw pjlfLoAE9SWUWyMpGJ2vl6Zh3ytiICUtU= IronPort-SDR: pU6SBeAIYKFaDwDItcgRTBcec/CwgzR9VdSmUKPPKBP2ArxxomXlPyiBst1u7RkC+AZoFzrcDD c5H+owFa5qZw== WDCIronportException: Internal From: Atish Patra To: qemu-devel@nongnu.org Subject: [PATCH v2 3/3] riscv: Add opensbi firmware dynamic support Date: Thu, 25 Jun 2020 11:37:41 -0700 Message-Id: <20200625183741.642407-4-atish.patra@wdc.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200625183741.642407-1-atish.patra@wdc.com> References: <20200625183741.642407-1-atish.patra@wdc.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=216.71.154.42; envelope-from=prvs=43885dcdb=atish.patra@wdc.com; helo=esa4.hgst.iphmx.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/06/25 14:37:46 X-ACL-Warn: Detected OS = FreeBSD 9.x or newer [fuzzy] X-Spam_score_int: -43 X-Spam_score: -4.4 X-Spam_bar: ---- X-Spam_report: (-4.4 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001 autolearn=_AUTOLEARN X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: qemu-riscv@nongnu.org, Sagar Karandikar , Bastian Koppelmann , Atish Patra , Alistair Francis , Alexander Richardson , Palmer Dabbelt , Bin Meng Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Type: text/plain; charset="utf-8" OpenSBI is the default firmware in Qemu and has various firmware loading options. Currently, qemu loader uses fw_jump which has a compile time pre-defined address where fdt & kernel image must reside. This puts a constraint on image size of the Linux kernel depending on the fdt location and available memory. However, fw_dynamic allows the loader to specify the next stage location (i.e. Linux kernel/U-boot) in memory and other configurable boot options available in OpenSBI. Add support for OpenSBI dynamic firmware loading support. This doesn't break existing setup and fw_jump will continue to work as it is. Any other firmware will continue to work without any issues as long as it doesn't expect anything specific from loader in "a2" register. Signed-off-by: Atish Patra Reviewed-by: Alistair Francis --- hw/riscv/boot.c | 39 ++++++++++++++++++++-- hw/riscv/sifive_u.c | 15 +++++++-- hw/riscv/spike.c | 11 +++++-- hw/riscv/virt.c | 11 +++++-- include/hw/riscv/boot.h | 5 ++- include/hw/riscv/boot_opensbi.h | 58 +++++++++++++++++++++++++++++++++ 6 files changed, 130 insertions(+), 9 deletions(-) create mode 100644 include/hw/riscv/boot_opensbi.h diff --git a/hw/riscv/boot.c b/hw/riscv/boot.c index 95a6b0b378d5..77f1a388da6a 100644 --- a/hw/riscv/boot.c +++ b/hw/riscv/boot.c @@ -26,6 +26,7 @@ #include "hw/boards.h" #include "hw/loader.h" #include "hw/riscv/boot.h" +#include "hw/riscv/boot_opensbi.h" #include "elf.h" #include "sysemu/device_tree.h" #include "sysemu/qtest.h" @@ -34,8 +35,10 @@ =20 #if defined(TARGET_RISCV32) # define KERNEL_BOOT_ADDRESS 0x80400000 +#define fw_dynamic_info_data(__val) cpu_to_le32(__val) #else # define KERNEL_BOOT_ADDRESS 0x80200000 +#define fw_dynamic_info_data(__val) cpu_to_le64(__val) #endif =20 void riscv_find_and_load_firmware(MachineState *machine, @@ -190,14 +193,45 @@ hwaddr riscv_load_fdt(hwaddr dram_base, uint64_t mem_= size, void *fdt) return fdt_addr; } =20 +void riscv_rom_copy_firmware_info(hwaddr rom_base, hwaddr rom_size, + uint32_t reset_vec_size, uint64_t kernel_ent= ry) +{ + struct fw_dynamic_info dinfo; + uint64_t dinfo_len; + + dinfo.magic =3D fw_dynamic_info_data(FW_DYNAMIC_INFO_MAGIC_VALUE); + dinfo.version =3D fw_dynamic_info_data(FW_DYNAMIC_INFO_VERSION); + dinfo.next_mode =3D fw_dynamic_info_data(FW_DYNAMIC_INFO_NEXT_MODE_S); + dinfo.next_addr =3D fw_dynamic_info_data(kernel_entry); + dinfo.options =3D 0; + dinfo.boot_hart =3D 0; + dinfo_len =3D sizeof(dinfo); + + /** + * copy the dynamic firmware info. This information is specific to + * OpenSBI but doesn't break any other firmware as long as they don't + * expect any certain value in "a2" register. + */ + if (dinfo_len > (rom_size - reset_vec_size)) { + error_report("not enough space to store dynamic firmware info"); + exit(1); + } + + rom_add_blob_fixed_as("mrom.finfo", &dinfo, dinfo_len, + rom_base + reset_vec_size, + &address_space_memory); +} + void riscv_setup_rom_reset_vec(hwaddr start_addr, hwaddr rom_base, - hwaddr rom_size, + hwaddr rom_size, uint64_t kernel_entry, hwaddr fdt_load_addr, void *fdt) { int i; + /* reset vector */ uint32_t reset_vec[10] =3D { 0x00000297, /* 1: auipc t0, %pcrel_hi(fw_dyn) */ + 0x02828613, /* addi a2, t0, %pcrel_lo(1b) */ 0xf1402573, /* csrr a0, mhartid */ #if defined(TARGET_RISCV32) 0x0202a583, /* lw a1, 32(t0) */ @@ -207,7 +241,6 @@ void riscv_setup_rom_reset_vec(hwaddr start_addr, hwadd= r rom_base, 0x0182b283, /* ld t0, 24(t0) */ #endif 0x00028067, /* jr t0 */ - 0x00000000, start_addr, /* start: .dword */ 0x00000000, fdt_load_addr, /* fdt_laddr: .dword */ @@ -221,6 +254,8 @@ void riscv_setup_rom_reset_vec(hwaddr start_addr, hwadd= r rom_base, } rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec), rom_base, &address_space_memory); + riscv_rom_copy_firmware_info(rom_base, rom_size, sizeof(reset_vec), + kernel_entry); =20 return; } diff --git a/hw/riscv/sifive_u.c b/hw/riscv/sifive_u.c index aba247716cee..5ded6487cd87 100644 --- a/hw/riscv/sifive_u.c +++ b/hw/riscv/sifive_u.c @@ -381,6 +381,7 @@ static void sifive_u_machine_init(MachineState *machine) target_ulong start_addr =3D memmap[SIFIVE_U_DRAM].base; int i; hwaddr fdt_load_addr; + uint64_t kernel_entry; =20 /* Initialize SoC */ object_initialize_child(OBJECT(machine), "soc", &s->soc, TYPE_RISCV_U_= SOC); @@ -437,7 +438,7 @@ static void sifive_u_machine_init(MachineState *machine) riscv_find_and_load_firmware(machine, BIOS_FILENAME, start_addr, NULL); =20 if (machine->kernel_filename) { - uint64_t kernel_entry =3D riscv_load_kernel(machine->kernel_filena= me, + kernel_entry =3D riscv_load_kernel(machine->kernel_filename, NULL); =20 if (machine->initrd_filename) { @@ -450,6 +451,12 @@ static void sifive_u_machine_init(MachineState *machin= e) qemu_fdt_setprop_cell(s->fdt, "/chosen", "linux,initrd-end", end); } + } else { + /* + * If dynamic firmware is used, it doesn't know where is the next m= ode + * if kernel argument is not set. + */ + kernel_entry =3D 0; } =20 /* Compute the fdt load address in dram */ @@ -460,6 +467,7 @@ static void sifive_u_machine_init(MachineState *machine) uint32_t reset_vec[11] =3D { s->msel, /* MSEL pin state */ 0x00000297, /* 1: auipc t0, %pcrel_hi(fw_dyn)= */ + 0x02828613, /* addi a2, t0, %pcrel_lo(1b) */ 0xf1402573, /* csrr a0, mhartid */ #if defined(TARGET_RISCV32) 0x0202a583, /* lw a1, 32(t0) */ @@ -469,7 +477,6 @@ static void sifive_u_machine_init(MachineState *machine) 0x0182b283, /* ld t0, 24(t0) */ #endif 0x00028067, /* jr t0 */ - 0x00000000, start_addr, /* start: .dword */ 0x00000000, fdt_load_addr, /* fdt_laddr: .dword */ @@ -483,6 +490,10 @@ static void sifive_u_machine_init(MachineState *machin= e) } rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec), memmap[SIFIVE_U_MROM].base, &address_space_memor= y); + + riscv_rom_copy_firmware_info(memmap[SIFIVE_U_MROM].base, + memmap[SIFIVE_U_MROM].size, + sizeof(reset_vec), kernel_entry); } =20 static bool sifive_u_machine_get_start_in_flash(Object *obj, Error **errp) diff --git a/hw/riscv/spike.c b/hw/riscv/spike.c index 7f58e36b4550..7a28d3113e89 100644 --- a/hw/riscv/spike.c +++ b/hw/riscv/spike.c @@ -167,6 +167,7 @@ static void spike_board_init(MachineState *machine) MemoryRegion *mask_rom =3D g_new(MemoryRegion, 1); unsigned int smp_cpus =3D machine->smp.cpus; hwaddr fdt_load_addr; + uint64_t kernel_entry; =20 /* Initialize SOC */ object_initialize_child(OBJECT(machine), "soc", &s->soc, @@ -197,7 +198,7 @@ static void spike_board_init(MachineState *machine) htif_symbol_callback); =20 if (machine->kernel_filename) { - uint64_t kernel_entry =3D riscv_load_kernel(machine->kernel_filena= me, + kernel_entry =3D riscv_load_kernel(machine->kernel_filename, htif_symbol_callback); =20 if (machine->initrd_filename) { @@ -210,6 +211,12 @@ static void spike_board_init(MachineState *machine) qemu_fdt_setprop_cell(s->fdt, "/chosen", "linux,initrd-end", end); } + } else { + /* + * If dynamic firmware is used, it doesn't know where is the next m= ode + * if kernel argument is not set. + */ + kernel_entry =3D 0; } =20 /* Compute the fdt load address in dram */ @@ -217,7 +224,7 @@ static void spike_board_init(MachineState *machine) machine->ram_size, s->fdt); /* load the reset vector */ riscv_setup_rom_reset_vec(memmap[SPIKE_DRAM].base, memmap[SPIKE_MROM].= base, - memmap[SPIKE_MROM].size, + memmap[SPIKE_MROM].size, kernel_entry, fdt_load_addr, s->fdt); =20 /* initialize HTIF using symbols found in load_kernel */ diff --git a/hw/riscv/virt.c b/hw/riscv/virt.c index d98d764466bf..7eb46ab45840 100644 --- a/hw/riscv/virt.c +++ b/hw/riscv/virt.c @@ -482,6 +482,7 @@ static void virt_machine_init(MachineState *machine) size_t plic_hart_config_len; target_ulong start_addr =3D memmap[VIRT_DRAM].base; hwaddr fdt_load_addr; + uint64_t kernel_entry; int i; unsigned int smp_cpus =3D machine->smp.cpus; =20 @@ -513,7 +514,7 @@ static void virt_machine_init(MachineState *machine) memmap[VIRT_DRAM].base, NULL); =20 if (machine->kernel_filename) { - uint64_t kernel_entry =3D riscv_load_kernel(machine->kernel_filena= me, + kernel_entry =3D riscv_load_kernel(machine->kernel_filename, NULL); =20 if (machine->initrd_filename) { @@ -526,6 +527,12 @@ static void virt_machine_init(MachineState *machine) qemu_fdt_setprop_cell(s->fdt, "/chosen", "linux,initrd-end", end); } + } else { + /* + * If dynamic firmware is used, it doesn't know where is the next m= ode + * if kernel argument is not set. + */ + kernel_entry =3D 0; } =20 if (drive_get(IF_PFLASH, 0, 0)) { @@ -541,7 +548,7 @@ static void virt_machine_init(MachineState *machine) machine->ram_size, s->fdt); /* load the reset vector */ riscv_setup_rom_reset_vec(start_addr, virt_memmap[VIRT_MROM].base, - virt_memmap[VIRT_MROM].size, + virt_memmap[VIRT_MROM].size, kernel_entry, fdt_load_addr, s->fdt); =20 /* create PLIC hart topology configuration string */ diff --git a/include/hw/riscv/boot.h b/include/hw/riscv/boot.h index f64fcadd2390..0ccfd2285888 100644 --- a/include/hw/riscv/boot.h +++ b/include/hw/riscv/boot.h @@ -37,8 +37,11 @@ hwaddr riscv_load_initrd(const char *filename, uint64_t = mem_size, uint64_t kernel_entry, hwaddr *start); hwaddr riscv_load_fdt(hwaddr dram_start, uint64_t dram_size, void *fdt); +void riscv_rom_copy_firmware_info(hwaddr rom_base, hwaddr rom_size, + uint32_t reset_vec_size, + uint64_t kernel_entry); void riscv_setup_rom_reset_vec(hwaddr saddr, hwaddr rom_base, - hwaddr rom_size, + hwaddr rom_size, uint64_t kernel_entry, hwaddr fdt_load_addr, void *fdt); =20 #endif /* RISCV_BOOT_H */ diff --git a/include/hw/riscv/boot_opensbi.h b/include/hw/riscv/boot_opensb= i.h new file mode 100644 index 000000000000..0d5ddd6c3daf --- /dev/null +++ b/include/hw/riscv/boot_opensbi.h @@ -0,0 +1,58 @@ +/* SPDX-License-Identifier: BSD-2-Clause */ +/* + * Copyright (c) 2019 Western Digital Corporation or its affiliates. + * + * Based on include/sbi/{fw_dynamic.h,sbi_scratch.h} from the OpenSBI proj= ect. + */ +#ifndef OPENSBI_H +#define OPENSBI_H + +/** Expected value of info magic ('OSBI' ascii string in hex) */ +#define FW_DYNAMIC_INFO_MAGIC_VALUE 0x4942534f + +/** Maximum supported info version */ +#define FW_DYNAMIC_INFO_VERSION 0x2 + +/** Possible next mode values */ +#define FW_DYNAMIC_INFO_NEXT_MODE_U 0x0 +#define FW_DYNAMIC_INFO_NEXT_MODE_S 0x1 +#define FW_DYNAMIC_INFO_NEXT_MODE_M 0x3 + +enum sbi_scratch_options { + /** Disable prints during boot */ + SBI_SCRATCH_NO_BOOT_PRINTS =3D (1 << 0), + /** Enable runtime debug prints */ + SBI_SCRATCH_DEBUG_PRINTS =3D (1 << 1), +}; + +/** Representation dynamic info passed by previous booting stage */ +struct fw_dynamic_info { + /** Info magic */ + target_long magic; + /** Info version */ + target_long version; + /** Next booting stage address */ + target_long next_addr; + /** Next booting stage mode */ + target_long next_mode; + /** Options for OpenSBI library */ + target_long options; + /** + * Preferred boot HART id + * + * It is possible that the previous booting stage uses same link + * address as the FW_DYNAMIC firmware. In this case, the relocation + * lottery mechanism can potentially overwrite the previous booting + * stage while other HARTs are still running in the previous booting + * stage leading to boot-time crash. To avoid this boot-time crash, + * the previous booting stage can specify last HART that will jump + * to the FW_DYNAMIC firmware as the preferred boot HART. + * + * To avoid specifying a preferred boot HART, the previous booting + * stage can set it to -1UL which will force the FW_DYNAMIC firmware + * to use the relocation lottery mechanism. + */ + target_long boot_hart; +}; + +#endif --=20 2.26.2