2019-06-25 00:11:49 +02:00
|
|
|
/*
|
|
|
|
* QEMU RISC-V Boot Helper
|
|
|
|
*
|
|
|
|
* Copyright (c) 2017 SiFive, Inc.
|
|
|
|
* Copyright (c) 2019 Alistair Francis <alistair.francis@wdc.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms and conditions of the GNU General Public License,
|
|
|
|
* version 2 or later, as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope it will be useful, but WITHOUT
|
|
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
|
|
* more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along with
|
|
|
|
* this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "qemu/osdep.h"
|
2020-10-28 12:36:57 +01:00
|
|
|
#include "qemu/datadir.h"
|
2019-06-25 00:11:49 +02:00
|
|
|
#include "qemu/units.h"
|
|
|
|
#include "qemu/error-report.h"
|
|
|
|
#include "exec/cpu-defs.h"
|
2019-08-12 07:23:52 +02:00
|
|
|
#include "hw/boards.h"
|
2019-06-25 00:11:49 +02:00
|
|
|
#include "hw/loader.h"
|
|
|
|
#include "hw/riscv/boot.h"
|
2020-07-01 20:39:48 +02:00
|
|
|
#include "hw/riscv/boot_opensbi.h"
|
2019-06-25 00:11:49 +02:00
|
|
|
#include "elf.h"
|
2020-07-01 20:39:46 +02:00
|
|
|
#include "sysemu/device_tree.h"
|
2019-07-22 22:20:40 +02:00
|
|
|
#include "sysemu/qtest.h"
|
2022-01-12 09:13:22 +01:00
|
|
|
#include "sysemu/kvm.h"
|
2019-06-25 00:11:49 +02:00
|
|
|
|
2020-07-01 20:39:46 +02:00
|
|
|
#include <libfdt.h>
|
|
|
|
|
2021-01-16 00:00:27 +01:00
|
|
|
bool riscv_is_32bit(RISCVHartArrayState *harts)
|
2020-10-14 02:17:30 +02:00
|
|
|
{
|
2021-10-20 05:16:58 +02:00
|
|
|
return harts->harts[0].env.misa_mxl_max == MXL_RV32;
|
2020-10-14 02:17:30 +02:00
|
|
|
}
|
|
|
|
|
2021-10-22 08:01:30 +02:00
|
|
|
/*
|
|
|
|
* Return the per-socket PLIC hart topology configuration string
|
|
|
|
* (caller must free with g_free())
|
|
|
|
*/
|
|
|
|
char *riscv_plic_hart_config_string(int hart_count)
|
|
|
|
{
|
|
|
|
g_autofree const char **vals = g_new(const char *, hart_count + 1);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < hart_count; i++) {
|
|
|
|
CPUState *cs = qemu_get_cpu(i);
|
|
|
|
CPURISCVState *env = &RISCV_CPU(cs)->env;
|
|
|
|
|
2022-01-12 09:13:22 +01:00
|
|
|
if (kvm_enabled()) {
|
|
|
|
vals[i] = "S";
|
|
|
|
} else if (riscv_has_ext(env, RVS)) {
|
2021-10-22 08:01:30 +02:00
|
|
|
vals[i] = "MS";
|
|
|
|
} else {
|
|
|
|
vals[i] = "M";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
vals[i] = NULL;
|
|
|
|
|
|
|
|
/* g_strjoinv() obliges us to cast away const here */
|
|
|
|
return g_strjoinv(",", (char **)vals);
|
|
|
|
}
|
|
|
|
|
2021-01-16 00:00:27 +01:00
|
|
|
target_ulong riscv_calc_kernel_start_addr(RISCVHartArrayState *harts,
|
2020-10-14 02:17:33 +02:00
|
|
|
target_ulong firmware_end_addr) {
|
2020-12-16 19:23:08 +01:00
|
|
|
if (riscv_is_32bit(harts)) {
|
2020-10-14 02:17:33 +02:00
|
|
|
return QEMU_ALIGN_UP(firmware_end_addr, 4 * MiB);
|
|
|
|
} else {
|
|
|
|
return QEMU_ALIGN_UP(firmware_end_addr, 2 * MiB);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-14 02:17:28 +02:00
|
|
|
target_ulong riscv_find_and_load_firmware(MachineState *machine,
|
|
|
|
const char *default_machine_firmware,
|
|
|
|
hwaddr firmware_load_addr,
|
|
|
|
symbol_fn_t sym_cb)
|
2019-07-16 20:47:25 +02:00
|
|
|
{
|
2019-10-03 18:59:29 +02:00
|
|
|
char *firmware_filename = NULL;
|
2020-10-14 02:17:28 +02:00
|
|
|
target_ulong firmware_end_addr = firmware_load_addr;
|
2019-07-16 20:47:25 +02:00
|
|
|
|
2020-05-01 14:19:05 +02:00
|
|
|
if ((!machine->firmware) || (!strcmp(machine->firmware, "default"))) {
|
2019-07-16 20:47:25 +02:00
|
|
|
/*
|
2020-05-01 14:19:05 +02:00
|
|
|
* The user didn't specify -bios, or has specified "-bios default".
|
|
|
|
* That means we are going to load the OpenSBI binary included in
|
|
|
|
* the QEMU source.
|
2019-07-16 20:47:25 +02:00
|
|
|
*/
|
2019-08-16 15:09:35 +02:00
|
|
|
firmware_filename = riscv_find_firmware(default_machine_firmware);
|
2019-10-03 18:59:29 +02:00
|
|
|
} else if (strcmp(machine->firmware, "none")) {
|
|
|
|
firmware_filename = riscv_find_firmware(machine->firmware);
|
2019-07-16 20:47:25 +02:00
|
|
|
}
|
|
|
|
|
2019-10-03 18:59:29 +02:00
|
|
|
if (firmware_filename) {
|
2019-07-16 20:47:25 +02:00
|
|
|
/* If not "none" load the firmware */
|
2020-10-14 02:17:28 +02:00
|
|
|
firmware_end_addr = riscv_load_firmware(firmware_filename,
|
|
|
|
firmware_load_addr, sym_cb);
|
2019-07-16 20:47:25 +02:00
|
|
|
g_free(firmware_filename);
|
|
|
|
}
|
2020-10-14 02:17:28 +02:00
|
|
|
|
|
|
|
return firmware_end_addr;
|
2019-07-16 20:47:25 +02:00
|
|
|
}
|
|
|
|
|
2019-08-16 15:09:35 +02:00
|
|
|
char *riscv_find_firmware(const char *firmware_filename)
|
|
|
|
{
|
|
|
|
char *filename;
|
|
|
|
|
|
|
|
filename = qemu_find_file(QEMU_FILE_TYPE_BIOS, firmware_filename);
|
|
|
|
if (filename == NULL) {
|
2020-05-01 17:50:54 +02:00
|
|
|
if (!qtest_enabled()) {
|
|
|
|
/*
|
|
|
|
* We only ship plain binary bios images in the QEMU source.
|
|
|
|
* With Spike machine that uses ELF images as the default bios,
|
|
|
|
* running QEMU test will complain hence let's suppress the error
|
|
|
|
* report for QEMU testing.
|
|
|
|
*/
|
|
|
|
error_report("Unable to load the RISC-V firmware \"%s\"",
|
|
|
|
firmware_filename);
|
|
|
|
exit(1);
|
|
|
|
}
|
2019-08-16 15:09:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return filename;
|
|
|
|
}
|
|
|
|
|
2019-06-25 00:11:52 +02:00
|
|
|
target_ulong riscv_load_firmware(const char *firmware_filename,
|
2020-04-27 10:06:42 +02:00
|
|
|
hwaddr firmware_load_addr,
|
|
|
|
symbol_fn_t sym_cb)
|
2019-06-25 00:11:52 +02:00
|
|
|
{
|
2020-10-14 02:17:28 +02:00
|
|
|
uint64_t firmware_entry, firmware_size, firmware_end;
|
2019-06-25 00:11:52 +02:00
|
|
|
|
2020-04-27 10:06:42 +02:00
|
|
|
if (load_elf_ram_sym(firmware_filename, NULL, NULL, NULL,
|
2020-10-14 02:17:28 +02:00
|
|
|
&firmware_entry, NULL, &firmware_end, NULL,
|
2020-04-27 10:06:42 +02:00
|
|
|
0, EM_RISCV, 1, 0, NULL, true, sym_cb) > 0) {
|
2020-10-14 02:17:28 +02:00
|
|
|
return firmware_end;
|
2019-06-25 00:11:52 +02:00
|
|
|
}
|
|
|
|
|
2020-10-14 02:17:28 +02:00
|
|
|
firmware_size = load_image_targphys_as(firmware_filename,
|
2020-10-28 11:16:22 +01:00
|
|
|
firmware_load_addr,
|
|
|
|
current_machine->ram_size, NULL);
|
2020-10-14 02:17:28 +02:00
|
|
|
|
|
|
|
if (firmware_size > 0) {
|
|
|
|
return firmware_load_addr + firmware_size;
|
2019-06-25 00:11:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
error_report("could not load firmware '%s'", firmware_filename);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2020-10-14 02:17:33 +02:00
|
|
|
target_ulong riscv_load_kernel(const char *kernel_filename,
|
|
|
|
target_ulong kernel_start_addr,
|
|
|
|
symbol_fn_t sym_cb)
|
2019-06-25 00:11:49 +02:00
|
|
|
{
|
hw/riscv: Use load address rather than entry point for fw_dynamic next_addr
The original BBL boot method had the kernel embedded as an opaque blob
that was blindly jumped to, which OpenSBI implemented as fw_payload.
OpenSBI then implemented fw_jump, which allows the payload to be loaded
elsewhere, but still blindly jumps to a fixed address at which the
kernel is to be loaded. Finally, OpenSBI introduced fw_dynamic, which
allows the previous stage to inform it where to jump to, rather than
having to blindly guess like fw_jump, or embed the payload as part of
the build like fw_payload. When used with an opaque binary (i.e. the
output of objcopy -O binary), it matches the behaviour of the previous
methods. However, when used with an ELF, QEMU currently passes on the
ELF's entry point address, which causes a discrepancy compared with all
the other boot methods if that entry point is not the first instruction
in the binary.
This difference specific to fw_dynamic with an ELF is not apparent when
booting Linux, since its entry point is the first instruction in the
binary. However, FreeBSD has a separate ELF entry point, following the
calling convention used by its bootloader, that differs from the first
instruction in the binary, used for the legacy SBI entry point, and so
the specific combination of QEMU's default fw_dynamic firmware with
booting FreeBSD as an ELF rather than a raw binary does not work.
Thus, align the behaviour when loading an ELF with the behaviour when
loading a raw binary; namely, use the base address of the loaded kernel
in place of the entry point.
The uImage code is left as-is in using the U-Boot header's entry point,
since the calling convention for that entry point is the same as the SBI
one and it mirrors what U-Boot will do.
Signed-off-by: Jessica Clarke <jrtc27@jrtc27.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Message-Id: <20211214032456.70203-1-jrtc27@jrtc27.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
2021-12-14 04:24:56 +01:00
|
|
|
uint64_t kernel_load_base, kernel_entry;
|
2019-06-25 00:11:49 +02:00
|
|
|
|
hw/riscv: Use load address rather than entry point for fw_dynamic next_addr
The original BBL boot method had the kernel embedded as an opaque blob
that was blindly jumped to, which OpenSBI implemented as fw_payload.
OpenSBI then implemented fw_jump, which allows the payload to be loaded
elsewhere, but still blindly jumps to a fixed address at which the
kernel is to be loaded. Finally, OpenSBI introduced fw_dynamic, which
allows the previous stage to inform it where to jump to, rather than
having to blindly guess like fw_jump, or embed the payload as part of
the build like fw_payload. When used with an opaque binary (i.e. the
output of objcopy -O binary), it matches the behaviour of the previous
methods. However, when used with an ELF, QEMU currently passes on the
ELF's entry point address, which causes a discrepancy compared with all
the other boot methods if that entry point is not the first instruction
in the binary.
This difference specific to fw_dynamic with an ELF is not apparent when
booting Linux, since its entry point is the first instruction in the
binary. However, FreeBSD has a separate ELF entry point, following the
calling convention used by its bootloader, that differs from the first
instruction in the binary, used for the legacy SBI entry point, and so
the specific combination of QEMU's default fw_dynamic firmware with
booting FreeBSD as an ELF rather than a raw binary does not work.
Thus, align the behaviour when loading an ELF with the behaviour when
loading a raw binary; namely, use the base address of the loaded kernel
in place of the entry point.
The uImage code is left as-is in using the U-Boot header's entry point,
since the calling convention for that entry point is the same as the SBI
one and it mirrors what U-Boot will do.
Signed-off-by: Jessica Clarke <jrtc27@jrtc27.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Message-Id: <20211214032456.70203-1-jrtc27@jrtc27.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
2021-12-14 04:24:56 +01:00
|
|
|
/*
|
|
|
|
* NB: Use low address not ELF entry point to ensure that the fw_dynamic
|
|
|
|
* behaviour when loading an ELF matches the fw_payload, fw_jump and BBL
|
|
|
|
* behaviour, as well as fw_dynamic with a raw binary, all of which jump to
|
|
|
|
* the (expected) load address load address. This allows kernels to have
|
|
|
|
* separate SBI and ELF entry points (used by FreeBSD, for example).
|
|
|
|
*/
|
2019-11-19 07:21:09 +01:00
|
|
|
if (load_elf_ram_sym(kernel_filename, NULL, NULL, NULL,
|
hw/riscv: Use load address rather than entry point for fw_dynamic next_addr
The original BBL boot method had the kernel embedded as an opaque blob
that was blindly jumped to, which OpenSBI implemented as fw_payload.
OpenSBI then implemented fw_jump, which allows the payload to be loaded
elsewhere, but still blindly jumps to a fixed address at which the
kernel is to be loaded. Finally, OpenSBI introduced fw_dynamic, which
allows the previous stage to inform it where to jump to, rather than
having to blindly guess like fw_jump, or embed the payload as part of
the build like fw_payload. When used with an opaque binary (i.e. the
output of objcopy -O binary), it matches the behaviour of the previous
methods. However, when used with an ELF, QEMU currently passes on the
ELF's entry point address, which causes a discrepancy compared with all
the other boot methods if that entry point is not the first instruction
in the binary.
This difference specific to fw_dynamic with an ELF is not apparent when
booting Linux, since its entry point is the first instruction in the
binary. However, FreeBSD has a separate ELF entry point, following the
calling convention used by its bootloader, that differs from the first
instruction in the binary, used for the legacy SBI entry point, and so
the specific combination of QEMU's default fw_dynamic firmware with
booting FreeBSD as an ELF rather than a raw binary does not work.
Thus, align the behaviour when loading an ELF with the behaviour when
loading a raw binary; namely, use the base address of the loaded kernel
in place of the entry point.
The uImage code is left as-is in using the U-Boot header's entry point,
since the calling convention for that entry point is the same as the SBI
one and it mirrors what U-Boot will do.
Signed-off-by: Jessica Clarke <jrtc27@jrtc27.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Message-Id: <20211214032456.70203-1-jrtc27@jrtc27.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
2021-12-14 04:24:56 +01:00
|
|
|
NULL, &kernel_load_base, NULL, NULL, 0,
|
2019-11-19 07:21:09 +01:00
|
|
|
EM_RISCV, 1, 0, NULL, true, sym_cb) > 0) {
|
hw/riscv: Use load address rather than entry point for fw_dynamic next_addr
The original BBL boot method had the kernel embedded as an opaque blob
that was blindly jumped to, which OpenSBI implemented as fw_payload.
OpenSBI then implemented fw_jump, which allows the payload to be loaded
elsewhere, but still blindly jumps to a fixed address at which the
kernel is to be loaded. Finally, OpenSBI introduced fw_dynamic, which
allows the previous stage to inform it where to jump to, rather than
having to blindly guess like fw_jump, or embed the payload as part of
the build like fw_payload. When used with an opaque binary (i.e. the
output of objcopy -O binary), it matches the behaviour of the previous
methods. However, when used with an ELF, QEMU currently passes on the
ELF's entry point address, which causes a discrepancy compared with all
the other boot methods if that entry point is not the first instruction
in the binary.
This difference specific to fw_dynamic with an ELF is not apparent when
booting Linux, since its entry point is the first instruction in the
binary. However, FreeBSD has a separate ELF entry point, following the
calling convention used by its bootloader, that differs from the first
instruction in the binary, used for the legacy SBI entry point, and so
the specific combination of QEMU's default fw_dynamic firmware with
booting FreeBSD as an ELF rather than a raw binary does not work.
Thus, align the behaviour when loading an ELF with the behaviour when
loading a raw binary; namely, use the base address of the loaded kernel
in place of the entry point.
The uImage code is left as-is in using the U-Boot header's entry point,
since the calling convention for that entry point is the same as the SBI
one and it mirrors what U-Boot will do.
Signed-off-by: Jessica Clarke <jrtc27@jrtc27.com>
Reviewed-by: Alistair Francis <alistair.francis@wdc.com>
Message-Id: <20211214032456.70203-1-jrtc27@jrtc27.com>
Signed-off-by: Alistair Francis <alistair.francis@wdc.com>
2021-12-14 04:24:56 +01:00
|
|
|
return kernel_load_base;
|
2019-06-25 00:11:49 +02:00
|
|
|
}
|
|
|
|
|
2019-06-25 00:11:54 +02:00
|
|
|
if (load_uimage_as(kernel_filename, &kernel_entry, NULL, NULL,
|
|
|
|
NULL, NULL, NULL) > 0) {
|
|
|
|
return kernel_entry;
|
|
|
|
}
|
|
|
|
|
2020-10-14 02:17:33 +02:00
|
|
|
if (load_image_targphys_as(kernel_filename, kernel_start_addr,
|
2020-10-28 11:16:22 +01:00
|
|
|
current_machine->ram_size, NULL) > 0) {
|
2020-10-14 02:17:33 +02:00
|
|
|
return kernel_start_addr;
|
2019-06-25 00:11:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
error_report("could not load kernel '%s'", kernel_filename);
|
|
|
|
exit(1);
|
2019-06-25 00:11:49 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
hwaddr riscv_load_initrd(const char *filename, uint64_t mem_size,
|
|
|
|
uint64_t kernel_entry, hwaddr *start)
|
|
|
|
{
|
|
|
|
int size;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We want to put the initrd far enough into RAM that when the
|
|
|
|
* kernel is uncompressed it will not clobber the initrd. However
|
|
|
|
* on boards without much RAM we must ensure that we still leave
|
|
|
|
* enough room for a decent sized initrd, and on boards with large
|
|
|
|
* amounts of RAM we must avoid the initrd being so far up in RAM
|
|
|
|
* that it is outside lowmem and inaccessible to the kernel.
|
|
|
|
* So for boards with less than 256MB of RAM we put the initrd
|
|
|
|
* halfway into RAM, and for boards with 256MB of RAM or more we put
|
|
|
|
* the initrd at 128MB.
|
|
|
|
*/
|
|
|
|
*start = kernel_entry + MIN(mem_size / 2, 128 * MiB);
|
|
|
|
|
|
|
|
size = load_ramdisk(filename, *start, mem_size - *start);
|
|
|
|
if (size == -1) {
|
|
|
|
size = load_image_targphys(filename, *start, mem_size - *start);
|
|
|
|
if (size == -1) {
|
|
|
|
error_report("could not load ramdisk '%s'", filename);
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return *start + size;
|
|
|
|
}
|
2020-07-01 20:39:46 +02:00
|
|
|
|
2022-04-19 13:59:45 +02:00
|
|
|
uint64_t riscv_load_fdt(hwaddr dram_base, uint64_t mem_size, void *fdt)
|
2020-07-01 20:39:47 +02:00
|
|
|
{
|
2022-04-19 13:59:45 +02:00
|
|
|
uint64_t temp, fdt_addr;
|
2020-07-01 20:39:47 +02:00
|
|
|
hwaddr dram_end = dram_base + mem_size;
|
2021-07-15 01:01:22 +02:00
|
|
|
int ret, fdtsize = fdt_totalsize(fdt);
|
2020-07-01 20:39:47 +02:00
|
|
|
|
|
|
|
if (fdtsize <= 0) {
|
|
|
|
error_report("invalid device-tree");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We should put fdt as far as possible to avoid kernel/initrd overwriting
|
|
|
|
* its content. But it should be addressable by 32 bit system as well.
|
2021-01-07 10:11:27 +01:00
|
|
|
* Thus, put it at an 16MB aligned address that less than fdt size from the
|
|
|
|
* end of dram or 3GB whichever is lesser.
|
2020-07-01 20:39:47 +02:00
|
|
|
*/
|
2022-04-19 13:59:45 +02:00
|
|
|
temp = (dram_base < 3072 * MiB) ? MIN(dram_end, 3072 * MiB) : dram_end;
|
2021-01-07 10:11:27 +01:00
|
|
|
fdt_addr = QEMU_ALIGN_DOWN(temp - fdtsize, 16 * MiB);
|
2020-07-01 20:39:47 +02:00
|
|
|
|
2021-07-15 01:01:22 +02:00
|
|
|
ret = fdt_pack(fdt);
|
|
|
|
/* Should only fail if we've built a corrupted tree */
|
|
|
|
g_assert(ret == 0);
|
2020-07-01 20:39:47 +02:00
|
|
|
/* copy in the device tree */
|
|
|
|
qemu_fdt_dumpdtb(fdt, fdtsize);
|
|
|
|
|
|
|
|
rom_add_blob_fixed_as("fdt", fdt, fdtsize, fdt_addr,
|
|
|
|
&address_space_memory);
|
|
|
|
|
|
|
|
return fdt_addr;
|
|
|
|
}
|
|
|
|
|
2020-12-16 19:22:37 +01:00
|
|
|
void riscv_rom_copy_firmware_info(MachineState *machine, hwaddr rom_base,
|
|
|
|
hwaddr rom_size, uint32_t reset_vec_size,
|
|
|
|
uint64_t kernel_entry)
|
2020-07-01 20:39:48 +02:00
|
|
|
{
|
|
|
|
struct fw_dynamic_info dinfo;
|
|
|
|
size_t dinfo_len;
|
|
|
|
|
2020-12-16 19:22:37 +01:00
|
|
|
if (sizeof(dinfo.magic) == 4) {
|
|
|
|
dinfo.magic = cpu_to_le32(FW_DYNAMIC_INFO_MAGIC_VALUE);
|
|
|
|
dinfo.version = cpu_to_le32(FW_DYNAMIC_INFO_VERSION);
|
|
|
|
dinfo.next_mode = cpu_to_le32(FW_DYNAMIC_INFO_NEXT_MODE_S);
|
|
|
|
dinfo.next_addr = cpu_to_le32(kernel_entry);
|
|
|
|
} else {
|
|
|
|
dinfo.magic = cpu_to_le64(FW_DYNAMIC_INFO_MAGIC_VALUE);
|
|
|
|
dinfo.version = cpu_to_le64(FW_DYNAMIC_INFO_VERSION);
|
|
|
|
dinfo.next_mode = cpu_to_le64(FW_DYNAMIC_INFO_NEXT_MODE_S);
|
|
|
|
dinfo.next_addr = cpu_to_le64(kernel_entry);
|
|
|
|
}
|
2020-07-01 20:39:48 +02:00
|
|
|
dinfo.options = 0;
|
|
|
|
dinfo.boot_hart = 0;
|
|
|
|
dinfo_len = sizeof(dinfo);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* copy the dynamic firmware info. This information is specific to
|
|
|
|
* OpenSBI but doesn't break any other firmware as long as they don't
|
|
|
|
* expect any certain value in "a2" register.
|
|
|
|
*/
|
|
|
|
if (dinfo_len > (rom_size - reset_vec_size)) {
|
|
|
|
error_report("not enough space to store dynamic firmware info");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
rom_add_blob_fixed_as("mrom.finfo", &dinfo, dinfo_len,
|
|
|
|
rom_base + reset_vec_size,
|
|
|
|
&address_space_memory);
|
|
|
|
}
|
|
|
|
|
2021-01-16 00:00:27 +01:00
|
|
|
void riscv_setup_rom_reset_vec(MachineState *machine, RISCVHartArrayState *harts,
|
2020-12-16 19:23:08 +01:00
|
|
|
hwaddr start_addr,
|
2020-12-16 19:22:37 +01:00
|
|
|
hwaddr rom_base, hwaddr rom_size,
|
|
|
|
uint64_t kernel_entry,
|
2022-04-19 13:59:45 +02:00
|
|
|
uint64_t fdt_load_addr, void *fdt)
|
2020-07-01 20:39:46 +02:00
|
|
|
{
|
|
|
|
int i;
|
2020-07-01 20:39:49 +02:00
|
|
|
uint32_t start_addr_hi32 = 0x00000000;
|
2022-04-19 13:59:45 +02:00
|
|
|
uint32_t fdt_load_addr_hi32 = 0x00000000;
|
2020-07-01 20:39:46 +02:00
|
|
|
|
2020-12-16 19:23:08 +01:00
|
|
|
if (!riscv_is_32bit(harts)) {
|
2020-12-16 19:22:37 +01:00
|
|
|
start_addr_hi32 = start_addr >> 32;
|
2022-04-19 13:59:45 +02:00
|
|
|
fdt_load_addr_hi32 = fdt_load_addr >> 32;
|
2020-12-16 19:22:37 +01:00
|
|
|
}
|
2020-07-01 20:39:46 +02:00
|
|
|
/* reset vector */
|
2020-07-01 20:39:47 +02:00
|
|
|
uint32_t reset_vec[10] = {
|
2020-07-01 20:39:48 +02:00
|
|
|
0x00000297, /* 1: auipc t0, %pcrel_hi(fw_dyn) */
|
|
|
|
0x02828613, /* addi a2, t0, %pcrel_lo(1b) */
|
2020-07-01 20:39:46 +02:00
|
|
|
0xf1402573, /* csrr a0, mhartid */
|
2020-12-16 19:22:37 +01:00
|
|
|
0,
|
|
|
|
0,
|
2020-07-01 20:39:46 +02:00
|
|
|
0x00028067, /* jr t0 */
|
|
|
|
start_addr, /* start: .dword */
|
2020-07-01 20:39:49 +02:00
|
|
|
start_addr_hi32,
|
2020-07-01 20:39:47 +02:00
|
|
|
fdt_load_addr, /* fdt_laddr: .dword */
|
2022-04-19 13:59:45 +02:00
|
|
|
fdt_load_addr_hi32,
|
2020-07-01 20:39:48 +02:00
|
|
|
/* fw_dyn: */
|
2020-07-01 20:39:46 +02:00
|
|
|
};
|
2020-12-16 19:23:08 +01:00
|
|
|
if (riscv_is_32bit(harts)) {
|
2020-12-16 19:22:37 +01:00
|
|
|
reset_vec[3] = 0x0202a583; /* lw a1, 32(t0) */
|
|
|
|
reset_vec[4] = 0x0182a283; /* lw t0, 24(t0) */
|
|
|
|
} else {
|
|
|
|
reset_vec[3] = 0x0202b583; /* ld a1, 32(t0) */
|
|
|
|
reset_vec[4] = 0x0182b283; /* ld t0, 24(t0) */
|
|
|
|
}
|
2020-07-01 20:39:46 +02:00
|
|
|
|
|
|
|
/* copy in the reset vector in little_endian byte order */
|
2020-07-01 20:39:47 +02:00
|
|
|
for (i = 0; i < ARRAY_SIZE(reset_vec); i++) {
|
2020-07-01 20:39:46 +02:00
|
|
|
reset_vec[i] = cpu_to_le32(reset_vec[i]);
|
|
|
|
}
|
|
|
|
rom_add_blob_fixed_as("mrom.reset", reset_vec, sizeof(reset_vec),
|
|
|
|
rom_base, &address_space_memory);
|
2020-12-16 19:22:37 +01:00
|
|
|
riscv_rom_copy_firmware_info(machine, rom_base, rom_size, sizeof(reset_vec),
|
2020-07-01 20:39:48 +02:00
|
|
|
kernel_entry);
|
2020-07-01 20:39:46 +02:00
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
2022-01-12 09:13:22 +01:00
|
|
|
|
|
|
|
void riscv_setup_direct_kernel(hwaddr kernel_addr, hwaddr fdt_addr)
|
|
|
|
{
|
|
|
|
CPUState *cs;
|
|
|
|
|
|
|
|
for (cs = first_cpu; cs; cs = CPU_NEXT(cs)) {
|
|
|
|
RISCVCPU *riscv_cpu = RISCV_CPU(cs);
|
|
|
|
riscv_cpu->env.kernel_addr = kernel_addr;
|
|
|
|
riscv_cpu->env.fdt_addr = fdt_addr;
|
|
|
|
}
|
|
|
|
}
|