aboutsummaryrefslogtreecommitdiff
path: root/qemu-ga.texi
diff options
context:
space:
mode:
authorPeter Maydell <peter.maydell@linaro.org>2016-02-19 15:56:17 +0000
committerPeter Maydell <peter.maydell@linaro.org>2016-02-19 15:56:17 +0000
commitfb3b6536c3f42a3915ac49f0ff54590205e037cc (patch)
treea874c3bfb959ca60c3d60c70114f2522790caff3 /qemu-ga.texi
parentfa54347c57fac4cd929b42c8387cb794b7b1bb7e (diff)
hw/arm/virt: Assume EL3 boot rom will handle PSCI if one is providedv8-tz
If the user passes us an EL3 boot rom, then it is going to want to implement the PSCI interface itself. In this case, disable QEMU's internal PSCI implementation so it does not get in the way, and instead start all CPUs in an SMP configuration at once (the boot rom will catch them all and pen up the secondaries until needed). The boot rom code is also responsible for editing the device tree to include any necessary information about its own PSCI implementation before eventually passing it to a NonSecure guest. (This "start all CPUs at once" approach is what both ARM Trusted Firmware and UEFI expect, since it is what the ARM Foundation Model does; the other approach would be to provide some emulated hardware for "start the secondaries" but this is simplest.) This is a compatibility break, but I don't believe that anybody was using a secure boot ROM with an SMP configuration. Such a setup would be somewhat broken since there was nothing preventing nonsecure guest code from calling the QEMU PSCI function to start up a secondary core in a way that completely bypassed the secure world. Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Diffstat (limited to 'qemu-ga.texi')
0 files changed, 0 insertions, 0 deletions