blob: 92a2b58ed46db202b2e156725423bdb759a16039 [file] [log] [blame]
Linus Walleij23b58772015-03-09 10:53:21 +01001if ARM64
2
Andre Przywara1416e2d2018-07-25 00:57:01 +01003config ARMV8_SPL_EXCEPTION_VECTORS
4 bool "Install crash dump exception vectors"
5 depends on SPL
Alexander Grafef331e32019-02-20 17:14:49 +01006 default n
Andre Przywara1416e2d2018-07-25 00:57:01 +01007 help
8 The default exception vector table is only used for the crash
9 dump, but still takes quite a lot of space in the image size.
10
11 Say N here if you are running out of code space in the image
12 and want to save some space at the cost of less debugging info.
13
Linus Walleij23b58772015-03-09 10:53:21 +010014config ARMV8_MULTIENTRY
Masahiro Yamadaab650062016-08-12 10:26:50 +090015 bool "Enable multiple CPUs to enter into U-Boot"
Linus Walleij23b58772015-03-09 10:53:21 +010016
Mingkai Hu3aec4522017-01-06 17:41:10 +080017config ARMV8_SET_SMPEN
18 bool "Enable data coherency with other cores in cluster"
19 help
20 Say Y here if there is not any trust firmware to set
21 CPUECTLR_EL1.SMPEN bit before U-Boot.
22
23 For A53, it enables data coherency with other cores in the
24 cluster, and for A57/A72, it enables receiving of instruction
25 cache and TLB maintenance operations.
26 Cortex A53/57/72 cores require CPUECTLR_EL1.SMPEN set even
27 for single core systems. Unfortunately write access to this
28 register may be controlled by EL3/EL2 firmware. To be more
29 precise, by default (if there is EL2/EL3 firmware running)
30 this register is RO for NS EL1.
31 This switch can be used to avoid writing to CPUECTLR_EL1,
32 it can be safely enabled when EL2/EL3 initialized SMPEN bit
33 or when CPU implementation doesn't include that register.
34
Masahiro Yamada6b6024e2016-06-27 19:31:05 +090035config ARMV8_SPIN_TABLE
36 bool "Support spin-table enable method"
37 depends on ARMV8_MULTIENTRY && OF_LIBFDT
38 help
39 Say Y here to support "spin-table" enable method for booting Linux.
40
41 To use this feature, you must do:
42 - Specify enable-method = "spin-table" in each CPU node in the
43 Device Tree you are using to boot the kernel
Masahiro Yamada65f32192017-01-20 18:04:43 +090044 - Bring secondary CPUs into U-Boot proper in a board specific
45 manner. This must be done *after* relocation. Otherwise, the
46 secondary CPUs will spin in unprotected memory area because the
47 master CPU protects the relocated spin code.
Masahiro Yamada6b6024e2016-06-27 19:31:05 +090048
49 U-Boot automatically does:
50 - Set "cpu-release-addr" property of each CPU node
51 (overwrites it if already exists).
52 - Reserve the code for the spin-table and the release address
53 via a /memreserve/ region in the Device Tree.
54
Hou Zhiqiang0897eb22017-01-16 17:31:47 +080055menu "ARMv8 secure monitor firmware"
56config ARMV8_SEC_FIRMWARE_SUPPORT
57 bool "Enable ARMv8 secure monitor firmware framework support"
Hou Zhiqiang0897eb22017-01-16 17:31:47 +080058 select FIT
Michal Simek58008cb2018-07-23 15:55:15 +020059 select OF_LIBFDT
Hou Zhiqiang0897eb22017-01-16 17:31:47 +080060 help
61 This framework is aimed at making secure monitor firmware load
62 process brief.
63 Note: Only FIT format image is supported.
64 You should prepare and provide the below information:
65 - Address of secure firmware.
66 - Address to hold the return address from secure firmware.
67 - Secure firmware FIT image related information.
68 Such as: SEC_FIRMWARE_FIT_IMAGE and SEC_FIRMEWARE_FIT_CNF_NAME
69 - The target exception level that secure monitor firmware will
70 return to.
71
72config SPL_ARMV8_SEC_FIRMWARE_SUPPORT
73 bool "Enable ARMv8 secure monitor firmware framework support for SPL"
Hou Zhiqiang0897eb22017-01-16 17:31:47 +080074 select SPL_FIT
Michal Simek58008cb2018-07-23 15:55:15 +020075 select SPL_OF_LIBFDT
Hou Zhiqiang0897eb22017-01-16 17:31:47 +080076 help
77 Say Y here to support this framework in SPL phase.
78
Hou Zhiqiangdaa92642017-01-16 17:31:48 +080079config SEC_FIRMWARE_ARMV8_PSCI
80 bool "PSCI implementation in secure monitor firmware"
81 depends on ARMV8_SEC_FIRMWARE_SUPPORT || SPL_ARMV8_SEC_FIRMWARE_SUPPORT
82 help
83 This config enables the ARMv8 PSCI implementation in secure monitor
84 firmware. This is a private PSCI implementation and different from
85 those implemented under the common ARMv8 PSCI framework.
86
Hou Zhiqiang0897eb22017-01-16 17:31:47 +080087config ARMV8_SEC_FIRMWARE_ERET_ADDR_REVERT
88 bool "ARMv8 secure monitor firmware ERET address byteorder swap"
89 depends on ARMV8_SEC_FIRMWARE_SUPPORT || SPL_ARMV8_SEC_FIRMWARE_SUPPORT
90 help
91 Say Y here when the endianness of the register or memory holding the
92 Secure firmware exception return address is different with core's.
93
94endmenu
95
Alexander Graf80698212016-08-16 21:08:48 +020096config PSCI_RESET
97 bool "Use PSCI for reset and shutdown"
98 default y
Heinrich Schuchardt81ea0082018-10-18 12:29:40 +020099 select ARM_SMCCC if OF_CONTROL
Bhaskar Upadhayabdc48ec2018-01-11 20:03:30 +0530100 depends on !ARCH_EXYNOS7 && !ARCH_BCM283X && \
Alexander Graf80698212016-08-16 21:08:48 +0200101 !TARGET_LS2080A_SIMU && !TARGET_LS2080AQDS && \
Bhaskar Upadhayabdc48ec2018-01-11 20:03:30 +0530102 !TARGET_LS2080ARDB && !TARGET_LS2080A_EMU && \
Ashish Kumar77697762017-08-31 16:12:55 +0530103 !TARGET_LS1088ARDB && !TARGET_LS1088AQDS && \
Alexander Graf80698212016-08-16 21:08:48 +0200104 !TARGET_LS1012ARDB && !TARGET_LS1012AFRDM && \
Bhaskar Upadhayab0ce1872018-01-11 20:03:31 +0530105 !TARGET_LS1012A2G5RDB && !TARGET_LS1012AQDS && \
Bhaskar Upadhaya9629ccd2018-05-23 11:03:30 +0530106 !TARGET_LS1012AFRWY && \
Yuantian Tangf278a212019-04-10 16:43:35 +0800107 !TARGET_LS1028ARDB && !TARGET_LS1028AQDS && \
Alexander Graf441a2302016-11-17 01:02:55 +0100108 !TARGET_LS1043ARDB && !TARGET_LS1043AQDS && \
109 !TARGET_LS1046ARDB && !TARGET_LS1046AQDS && \
Vabhav Sharmad90c7ac2019-06-06 12:35:28 +0000110 !TARGET_LS1046AFRWY && \
Priyanka Jain58c3e622018-11-28 13:04:27 +0000111 !TARGET_LS2081ARDB && !TARGET_LX2160ARDB && \
Pankaj Bansal1eba7232019-02-08 10:29:58 +0000112 !TARGET_LX2160AQDS && \
Rob Clark8bf5c1e2017-06-26 09:22:23 -0400113 !ARCH_UNIPHIER && !TARGET_S32V234EVB
Alexander Graf80698212016-08-16 21:08:48 +0200114 help
115 Most armv8 systems have PSCI support enabled in EL3, either through
116 ARM Trusted Firmware or other firmware.
117
118 On these systems, we do not need to implement system reset manually,
119 but can instead rely on higher level firmware to deal with it.
120
121 Select Y here to make use of PSCI calls for system reset
122
macro.wave.z@gmail.comdf88cb32016-12-08 11:58:22 +0800123config ARMV8_PSCI
124 bool "Enable PSCI support" if EXPERT
125 default n
126 help
127 PSCI is Power State Coordination Interface defined by ARM.
128 The PSCI in U-boot provides a general framework and each platform
129 can implement their own specific PSCI functions.
130 Say Y here to enable PSCI support on ARMv8 platform.
131
132config ARMV8_PSCI_NR_CPUS
133 int "Maximum supported CPUs for PSCI"
134 depends on ARMV8_PSCI
135 default 4
136 help
137 The maximum number of CPUs supported in the PSCI firmware.
138 It is no problem to set a larger value than the number of CPUs in
139 the actual hardware implementation.
140
macro.wave.z@gmail.com14bf25d2016-12-08 11:58:24 +0800141config ARMV8_PSCI_CPUS_PER_CLUSTER
142 int "Number of CPUs per cluster"
143 depends on ARMV8_PSCI
144 default 0
145 help
146 The number of CPUs per cluster, suppose each cluster has same number
147 of CPU cores, platforms with asymmetric clusters don't apply here.
148 A value 0 or no definition of it works for single cluster system.
149 System with multi-cluster should difine their own exact value.
150
Chee Hong Angc0f32962018-08-20 10:57:35 -0700151config ARMV8_EA_EL3_FIRST
152 bool "External aborts and SError interrupt exception are taken in EL3"
153 default n
154 help
155 Exception handling at all exception levels for External Abort and
156 SError interrupt exception are taken in EL3.
157
macro.wave.z@gmail.comdf88cb32016-12-08 11:58:22 +0800158if SYS_HAS_ARMV8_SECURE_BASE
159
160config ARMV8_SECURE_BASE
161 hex "Secure address for PSCI image"
162 depends on ARMV8_PSCI
163 help
164 Address for placing the PSCI text, data and stack sections.
165 If not defined, the PSCI sections are placed together with the u-boot
166 but platform can choose to place PSCI code image separately in other
167 places such as some secure RAM built-in SOC etc.
168
169endif
170
Linus Walleij23b58772015-03-09 10:53:21 +0100171endif