summaryrefslogtreecommitdiff
path: root/net
diff options
context:
space:
mode:
authorAndre Przywara <andre.przywara@linaro.org>2013-09-19 18:06:42 +0200
committerAlbert ARIBAUD <albert.u.boot@aribaud.net>2013-10-03 21:28:43 +0200
commit1ef923851ab8ffcc4265fd991815b88d9c1f12d7 (patch)
tree4d23688d7fd04f205bb410069788f3032bd186c0 /net
parent16212b594f385bd594d5d316bf11b13c1186e3d7 (diff)
downloadu-boot-imx-1ef923851ab8ffcc4265fd991815b88d9c1f12d7.zip
u-boot-imx-1ef923851ab8ffcc4265fd991815b88d9c1f12d7.tar.gz
u-boot-imx-1ef923851ab8ffcc4265fd991815b88d9c1f12d7.tar.bz2
ARM: add C function to switch to non-secure state
The core specific part of the work is done in the assembly routine in nonsec_virt.S, introduced with the previous patch, but for the full glory we need to setup the GIC distributor interface once for the whole system, which is done in C here. The routine is placed in arch/arm/cpu/armv7 to allow easy access from other ARMv7 boards. We check the availability of the security extensions first. Since we need a safe way to access the GIC, we use the PERIPHBASE registers on Cortex-A15 and A7 CPUs and do some sanity checks. Boards not implementing the CBAR can override this value via a configuration file variable. Then we actually do the GIC enablement: a) enable the GIC distributor, both for non-secure and secure state (GICD_CTLR[1:0] = 11b) b) allow all interrupts to be handled from non-secure state (GICD_IGROUPRn = 0xFFFFFFFF) The core specific GIC setup is then done in the assembly routine. Signed-off-by: Andre Przywara <andre.przywara@linaro.org>
Diffstat (limited to 'net')
0 files changed, 0 insertions, 0 deletions