From patchwork Tue Aug 18 17:01:11 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Heinrich Schuchardt X-Patchwork-Id: 1347170 X-Patchwork-Delegate: uboot@andestech.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.a=rsa-sha256 header.s=badeba3b8450 header.b=UWl1aBvP; dkim-atps=neutral Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4BWHJ711cKz9sPC for ; Wed, 19 Aug 2020 03:01:41 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 78A1C82176; Tue, 18 Aug 2020 19:01:37 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; secure) header.d=gmx.net header.i=@gmx.net header.b="UWl1aBvP"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 2C2A6821F7; Tue, 18 Aug 2020 19:01:36 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 6EB5A81C1E for ; Tue, 18 Aug 2020 19:01:33 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=gmx.de Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=xypron.glpk@gmx.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1597770078; bh=AyrTW6uoeiUmHaoKhTztONLxpFt0kZZAYyN25mJYY+Y=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date; b=UWl1aBvPGaSBQdMZc3LPzz8+50PVD43uWn5xhZSNjodMChuA8LUrBA8z6ppHMbMbJ 8xwDZBm8J1N7pScgVR2cq3QuhefTY1lrD8cuuAGUd88SRA09lar32ydUrbwb1hyvW/ ui+g10VGJyVAkQrZiPVgCvqaC4O/p8g+M33H8Q10= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from lorawanserver.fritz.box ([178.202.41.107]) by mail.gmx.com (mrgmx105 [212.227.17.174]) with ESMTPSA (Nemesis) id 1MWigq-1kAOHt3wi0-00X65R; Tue, 18 Aug 2020 19:01:18 +0200 From: Heinrich Schuchardt To: Rick Chen Cc: Bin Meng , Pragnesh Patel , Lukas Auer , Atish Patra , u-boot@lists.denx.de, Heinrich Schuchardt Subject: [PATCH v2 1/1] cmd: provide command sbi Date: Tue, 18 Aug 2020 19:01:11 +0200 Message-Id: <20200818170111.91379-1-xypron.glpk@gmx.de> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 X-Provags-ID: V03:K1:y9cVNRxw+MC+PZI7C8OsLvVX0y4uA71PVVGsAvz7Sjcctjm1cGK V5HzpDSquDJwZk1eKPvRYjoQLoHpcNITTZTbxsl8tRAVnf2IlRxrdj/que5t5FnF3K60rYF Kgxg9Oekm6UjNa/IkoGmHRME/lcoLwPtGjQHCK0rNGbEApg1VHKrS63ZPJGMx4cOuFpY1UK PbQsf+zrHy7um6p5GJd/A== X-UI-Out-Filterresults: notjunk:1;V03:K0:qlg74io/gh8=:SWonMKTYKB8Br12r7mXlwh zRZarE2DNTIEljIlXyU/0QJzIC+jOBLra9VqbcxhYs5RSpfNcR23ViSNJFFGLzeL+f/akrvaL fF+38O9ornwoR6U8HHgy/5w37cGjm++JGCF4izJMqfLqzJucYBXzIa70XsYNJFhblfLXRidhR a8LWEKWz1sKopn+ftbpp4kLamKhm6ebXZPkT/WutGkeFz5hzbu9HOhJBG+5QHWCjt8np4e3yN iH5Hyk0QW9+vVeEqEtzLqR6LUv8e4aDzzQsLPhqaV69kpvqS94AOUqxzLdQyb1+aL2PXJ9VPi DyqWA24ZLvkI45t1g3MmCLCcULk/Vc33kosTtIyPzm0G+fmC0Hg8Jwe+Sab0ozvAXpWonUM60 7bEdHXogicsM+XvvE7HDBkCffgiWaY6V1IJEw4QzgWFxvUZC86I/g2xuGtOzz/elfb0nL0Xmp WXqVQmUj/QXf49QnjDSnw7IIhJ/VKJh7OHO/vojI8p3m4kQfeSi4THgczkWCDsr25cYj4IEux OPKfdlISnVq6rdWBCEQdzHwWh60/LExJu3k3EzFhe+Agq6eMcOgkz5ufKC8TXUj/Y1xGv+4GJ Iz5D2sRtYMhMInIVDmX6L9losDNoAW2bnTs2WJTJIKZZCwCxdobP0uzAqCscaQR+HhQikPi8j ln1qJLRJ+8Qi8I3zT4TMUdhbOpUXSnOZyMp2HcZ+MtcNS+KDIKxvZaNhseN4vBW+CZH9R2F9b p8L8Ti+OqGnlWWvE+CXOJL/wfMv3dM02sAKhxa32Prm6YH5h/u67mjBsyHnuJUrziSnGID/Yc 7nVs3OXFmMHxfz9pV7O02wPp1LG8eAapG9HhNkupTXriLfU0rSqGG6Kbf123lJtGb0MAezs2U aOJZzrpmbiXjvYsq9Q8mytFVjMaWOYP0WhRAbmpuWarXPyltslFcrgXNDsw4mCDZ0ylJ3nyOR AbiZ5co23drwj5Vps8phQDPK1DFXtLmLg9QxE2pnFkWhoDPRCRptZsIY1tDSulR+nBApSYRBk 8EwqNzfJAV0069u+KQ8re3ygulQI2J0+7KaayCdZzN1FTYVT5bji63kAmfv8mjC2D+O5/bLdG /2G0HUWuzU1fMnvUr7UjqB1+oKD8tPa4b9SebXQ7+V9MfzCxZaSVdIGKV4hH8SxnAsCciAQNN dwiGG6ZZWehW/av8APqn3UBYe5YufwQRWQK9brrLct4ggKqwiG0Prc61EUVKfe0/o/dbdD/oR 0rHHCYpAU6vBGElulZjVxdeWPs/o/14KKjObplg== X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.34 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.102.3 at phobos.denx.de X-Virus-Status: Clean Provide a command to display information about the SBI implementation. The output might look like: => sbi SBI 0.2 OpenSBI Extensions: sbi_set_timer sbi_console_putchar sbi_console_getchar sbi_clear_ipi sbi_send_ipi sbi_remote_fence_i sbi_remote_sfence_vma sbi_remote_sfence_vma_asid sbi_shutdown SBI Base Functionality Timer Extension IPI Extension RFENCE Extension Hart State Management Extension The command can be used to construct a unit test checking that the communication with the SEE is working. Signed-off-by: Heinrich Schuchardt --- v2: provide a non-blank long help text --- arch/riscv/include/asm/sbi.h | 2 + arch/riscv/lib/sbi.c | 36 ++++++++++++++++ cmd/Kconfig | 6 +++ cmd/riscv/Makefile | 1 + cmd/riscv/sbi.c | 82 ++++++++++++++++++++++++++++++++++++ 5 files changed, 127 insertions(+) create mode 100644 cmd/riscv/sbi.c -- 2.28.0 diff --git a/arch/riscv/include/asm/sbi.h b/arch/riscv/include/asm/sbi.h index 08e1ac0c0e..53ca316180 100644 --- a/arch/riscv/include/asm/sbi.h +++ b/arch/riscv/include/asm/sbi.h @@ -115,6 +115,8 @@ void sbi_remote_sfence_vma_asid(const unsigned long *hart_mask, unsigned long asid); #endif void sbi_set_timer(uint64_t stime_value); +long sbi_get_spec_version(void); +int sbi_get_impl_id(void); int sbi_probe_extension(int ext); #endif diff --git a/arch/riscv/lib/sbi.c b/arch/riscv/lib/sbi.c index 8fbc23839d..920889ed13 100644 --- a/arch/riscv/lib/sbi.c +++ b/arch/riscv/lib/sbi.c @@ -53,6 +53,42 @@ void sbi_set_timer(uint64_t stime_value) #endif } +/** + * sbi_get_spec_version() - get current SBI specification version + * + * Return: version id + */ +long sbi_get_spec_version(void) +{ + struct sbiret ret; + + ret = sbi_ecall(SBI_EXT_BASE, SBI_EXT_BASE_GET_SPEC_VERSION, + 0, 0, 0, 0, 0, 0); + if (!ret.error) + if (ret.value) + return ret.value; + + return -ENOTSUPP; +} + +/** + * sbi_get_impl_id() - get SBI implemenation ID + * + * Return: implementation ID + */ +int sbi_get_impl_id(void) +{ + struct sbiret ret; + + ret = sbi_ecall(SBI_EXT_BASE, SBI_EXT_BASE_GET_IMP_ID, + 0, 0, 0, 0, 0, 0); + if (!ret.error) + if (ret.value) + return ret.value; + + return -ENOTSUPP; +} + /** * sbi_probe_extension() - Check if an SBI extension ID is supported or not. * @extid: The extension ID to be probed. diff --git a/cmd/Kconfig b/cmd/Kconfig index 9ad511aa17..48c08cbc0b 100644 --- a/cmd/Kconfig +++ b/cmd/Kconfig @@ -270,6 +270,12 @@ config SPL_CMD_TLV_EEPROM help Read system EEPROM data block in ONIE Tlvinfo format from SPL. +config CMD_SBI + bool "SBI information" + depends on RISCV_SMODE + help + Display information about the SBI implementation. + endmenu menu "Boot commands" diff --git a/cmd/riscv/Makefile b/cmd/riscv/Makefile index 24df023ece..1e6ac364e3 100644 --- a/cmd/riscv/Makefile +++ b/cmd/riscv/Makefile @@ -1,3 +1,4 @@ # SPDX-License-Identifier: GPL-2.0+ obj-$(CONFIG_CMD_EXCEPTION) += exception.o +obj-$(CONFIG_CMD_SBI) += sbi.o diff --git a/cmd/riscv/sbi.c b/cmd/riscv/sbi.c new file mode 100644 index 0000000000..7c9151f436 --- /dev/null +++ b/cmd/riscv/sbi.c @@ -0,0 +1,82 @@ +// SPDX-License-Identifier: GPL-2.0+ +/* + * The 'sbi' command displays information about the SBI implementation. + * + * Copyright (c) 2020, Heinrich Schuchardt + */ + +#include +#include +#include + +struct sbi_ext { + const u32 id; + const char *name; +}; + +static struct sbi_ext extensions[] = { + { 0x00000000, "sbi_set_timer" }, + { 0x00000001, "sbi_console_putchar" }, + { 0x00000002, "sbi_console_getchar" }, + { 0x00000003, "sbi_clear_ipi" }, + { 0x00000004, "sbi_send_ipi" }, + { 0x00000005, "sbi_remote_fence_i" }, + { 0x00000006, "sbi_remote_sfence_vma" }, + { 0x00000007, "sbi_remote_sfence_vma_asid" }, + { 0x00000008, "sbi_shutdown" }, + { 0x00000010, "SBI Base Functionality" }, + { 0x54494D45, "Timer Extension" }, + { 0x00735049, "IPI Extension" }, + { 0x52464E43, "RFENCE Extension" }, + { 0x0048534D, "Hart State Management Extension" }, +}; + +static int do_sbi(struct cmd_tbl *cmdtp, int flag, int argc, + char *const argv[]) +{ + int i; + long ret; + + ret = sbi_get_spec_version(); + if (ret >= 0) + printf("SBI %ld.%ld\n", ret >> 24, ret &0xffffff); + ret = sbi_get_impl_id(); + if (ret >= 0) { + switch (ret) { + case 0: + printf("Berkeley Boot Loader (BBL)\n"); + break; + case 1: + printf("OpenSBI\n"); + break; + case 2: + printf("Xvisor\n"); + break; + case 3: + printf("KVM\n"); + break; + default: + printf("Unknown implementation\n"); + break; + } + } + printf("Extensions:\n"); + for (i = 0; i < ARRAY_SIZE(extensions); ++i) { + ret = sbi_probe_extension(extensions[i].id); + if (ret > 0) + printf(" %s\n", extensions[i].name); + } + return 0; +} + +#ifdef CONFIG_SYS_LONGHELP +static char sbi_help_text[] = + "- display SBI spec version, implementation, and available extensions"; + +#endif + +U_BOOT_CMD_COMPLETE( + sbi, 2, 0, do_sbi, + "display SBI information", + sbi_help_text, NULL +);