Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 1 | ===================== |
| 2 | Booting AArch64 Linux |
| 3 | ===================== |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 4 | |
| 5 | Author: Will Deacon <will.deacon@arm.com> |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 6 | |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 7 | Date : 07 September 2012 |
| 8 | |
| 9 | This document is based on the ARM booting document by Russell King and |
| 10 | is relevant to all public releases of the AArch64 Linux kernel. |
| 11 | |
| 12 | The AArch64 exception model is made up of a number of exception levels |
| 13 | (EL0 - EL3), with EL0 and EL1 having a secure and a non-secure |
| 14 | counterpart. EL2 is the hypervisor level and exists only in non-secure |
| 15 | mode. EL3 is the highest priority level and exists only in secure mode. |
| 16 | |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 17 | For the purposes of this document, we will use the term `boot loader` |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 18 | simply to define all software that executes on the CPU(s) before control |
| 19 | is passed to the Linux kernel. This may include secure monitor and |
| 20 | hypervisor code, or it may just be a handful of instructions for |
| 21 | preparing a minimal boot environment. |
| 22 | |
| 23 | Essentially, the boot loader should provide (as a minimum) the |
| 24 | following: |
| 25 | |
| 26 | 1. Setup and initialise the RAM |
| 27 | 2. Setup the device tree |
| 28 | 3. Decompress the kernel image |
| 29 | 4. Call the kernel image |
| 30 | |
| 31 | |
| 32 | 1. Setup and initialise RAM |
| 33 | --------------------------- |
| 34 | |
| 35 | Requirement: MANDATORY |
| 36 | |
| 37 | The boot loader is expected to find and initialise all RAM that the |
| 38 | kernel will use for volatile data storage in the system. It performs |
| 39 | this in a machine dependent manner. (It may use internal algorithms |
| 40 | to automatically locate and size all RAM, or it may use knowledge of |
| 41 | the RAM in the machine, or any other method the boot loader designer |
| 42 | sees fit.) |
| 43 | |
| 44 | |
| 45 | 2. Setup the device tree |
| 46 | ------------------------- |
| 47 | |
| 48 | Requirement: MANDATORY |
| 49 | |
Ard Biesheuvel | 61bd93c | 2015-06-01 13:40:32 +0200 | [diff] [blame] | 50 | The device tree blob (dtb) must be placed on an 8-byte boundary and must |
| 51 | not exceed 2 megabytes in size. Since the dtb will be mapped cacheable |
| 52 | using blocks of up to 2 megabytes in size, it must not be placed within |
| 53 | any 2M region which must be mapped with any specific attributes. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 54 | |
Ard Biesheuvel | 61bd93c | 2015-06-01 13:40:32 +0200 | [diff] [blame] | 55 | NOTE: versions prior to v4.2 also require that the DTB be placed within |
| 56 | the 512 MB region starting at text_offset bytes below the kernel Image. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 57 | |
| 58 | 3. Decompress the kernel image |
| 59 | ------------------------------ |
| 60 | |
| 61 | Requirement: OPTIONAL |
| 62 | |
| 63 | The AArch64 kernel does not currently provide a decompressor and |
| 64 | therefore requires decompression (gzip etc.) to be performed by the boot |
| 65 | loader if a compressed Image target (e.g. Image.gz) is used. For |
| 66 | bootloaders that do not implement this requirement, the uncompressed |
| 67 | Image target is available instead. |
| 68 | |
| 69 | |
| 70 | 4. Call the kernel image |
| 71 | ------------------------ |
| 72 | |
| 73 | Requirement: MANDATORY |
| 74 | |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 75 | The decompressed kernel image contains a 64-byte header as follows:: |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 76 | |
Roy Franz | 4370eec | 2013-08-15 00:10:00 +0100 | [diff] [blame] | 77 | u32 code0; /* Executable code */ |
| 78 | u32 code1; /* Executable code */ |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 79 | u64 text_offset; /* Image load offset, little endian */ |
| 80 | u64 image_size; /* Effective Image size, little endian */ |
| 81 | u64 flags; /* kernel flags, little endian */ |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 82 | u64 res2 = 0; /* reserved */ |
Roy Franz | 4370eec | 2013-08-15 00:10:00 +0100 | [diff] [blame] | 83 | u64 res3 = 0; /* reserved */ |
| 84 | u64 res4 = 0; /* reserved */ |
| 85 | u32 magic = 0x644d5241; /* Magic number, little endian, "ARM\x64" */ |
Ard Biesheuvel | 6c020ea | 2015-07-29 12:30:39 +0100 | [diff] [blame] | 86 | u32 res5; /* reserved (used for PE COFF offset) */ |
Roy Franz | 4370eec | 2013-08-15 00:10:00 +0100 | [diff] [blame] | 87 | |
| 88 | |
| 89 | Header notes: |
| 90 | |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 91 | - As of v3.17, all fields are little endian unless stated otherwise. |
| 92 | |
Roy Franz | 4370eec | 2013-08-15 00:10:00 +0100 | [diff] [blame] | 93 | - code0/code1 are responsible for branching to stext. |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 94 | |
Mark Salter | cdd7857 | 2013-11-29 16:00:14 -0500 | [diff] [blame] | 95 | - when booting through EFI, code0/code1 are initially skipped. |
| 96 | res5 is an offset to the PE header and the PE header has the EFI |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 97 | entry point (efi_stub_entry). When the stub has done its work, it |
Mark Salter | cdd7857 | 2013-11-29 16:00:14 -0500 | [diff] [blame] | 98 | jumps to code0 to resume the normal boot process. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 99 | |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 100 | - Prior to v3.17, the endianness of text_offset was not specified. In |
| 101 | these cases image_size is zero and text_offset is 0x80000 in the |
| 102 | endianness of the kernel. Where image_size is non-zero image_size is |
| 103 | little-endian and must be respected. Where image_size is zero, |
| 104 | text_offset can be assumed to be 0x80000. |
| 105 | |
| 106 | - The flags field (introduced in v3.17) is a little-endian 64-bit field |
| 107 | composed as follows: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 108 | |
| 109 | ============= =============================================================== |
| 110 | Bit 0 Kernel endianness. 1 if BE, 0 if LE. |
| 111 | Bit 1-2 Kernel Page size. |
| 112 | |
| 113 | * 0 - Unspecified. |
| 114 | * 1 - 4K |
| 115 | * 2 - 16K |
| 116 | * 3 - 64K |
| 117 | Bit 3 Kernel physical placement |
| 118 | |
| 119 | 0 |
| 120 | 2MB aligned base should be as close as possible |
| 121 | to the base of DRAM, since memory below it is not |
| 122 | accessible via the linear mapping |
| 123 | 1 |
| 124 | 2MB aligned base may be anywhere in physical |
| 125 | memory |
| 126 | Bits 4-63 Reserved. |
| 127 | ============= =============================================================== |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 128 | |
| 129 | - When image_size is zero, a bootloader should attempt to keep as much |
| 130 | memory as possible free for use by the kernel immediately after the |
| 131 | end of the kernel image. The amount of space required will vary |
| 132 | depending on selected features, and is effectively unbound. |
| 133 | |
| 134 | The Image must be placed text_offset bytes from a 2MB aligned base |
Ard Biesheuvel | a7f8de1 | 2016-02-16 13:52:42 +0100 | [diff] [blame] | 135 | address anywhere in usable system RAM and called there. The region |
| 136 | between the 2 MB aligned base address and the start of the image has no |
| 137 | special significance to the kernel, and may be used for other purposes. |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 138 | At least image_size bytes from the start of the image must be free for |
| 139 | use by the kernel. |
Ard Biesheuvel | a7f8de1 | 2016-02-16 13:52:42 +0100 | [diff] [blame] | 140 | NOTE: versions prior to v4.6 cannot make use of memory below the |
| 141 | physical offset of the Image so it is recommended that the Image be |
| 142 | placed as close as possible to the start of system RAM. |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 143 | |
Ard Biesheuvel | 177e15f | 2016-03-30 15:18:42 +0200 | [diff] [blame] | 144 | If an initrd/initramfs is passed to the kernel at boot, it must reside |
| 145 | entirely within a 1 GB aligned physical memory window of up to 32 GB in |
| 146 | size that fully covers the kernel Image as well. |
| 147 | |
Ard Biesheuvel | 6c020ea | 2015-07-29 12:30:39 +0100 | [diff] [blame] | 148 | Any memory described to the kernel (even that below the start of the |
| 149 | image) which is not marked as reserved from the kernel (e.g., with a |
Mark Rutland | a2c1d73 | 2014-06-24 16:51:36 +0100 | [diff] [blame] | 150 | memreserve region in the device tree) will be considered as available to |
| 151 | the kernel. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 152 | |
| 153 | Before jumping into the kernel, the following conditions must be met: |
| 154 | |
| 155 | - Quiesce all DMA capable devices so that memory does not get |
| 156 | corrupted by bogus network packets or disk data. This will save |
| 157 | you many hours of debug. |
| 158 | |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 159 | - Primary CPU general-purpose register settings: |
| 160 | |
| 161 | - x0 = physical address of device tree blob (dtb) in system RAM. |
| 162 | - x1 = 0 (reserved for future use) |
| 163 | - x2 = 0 (reserved for future use) |
| 164 | - x3 = 0 (reserved for future use) |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 165 | |
| 166 | - CPU mode |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 167 | |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 168 | All forms of interrupts must be masked in PSTATE.DAIF (Debug, SError, |
| 169 | IRQ and FIQ). |
| 170 | The CPU must be in either EL2 (RECOMMENDED in order to have access to |
| 171 | the virtualisation extensions) or non-secure EL1. |
| 172 | |
| 173 | - Caches, MMUs |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 174 | |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 175 | The MMU must be off. |
Mauro Carvalho Chehab | 877a37d | 2020-04-14 18:48:39 +0200 | [diff] [blame] | 176 | |
Will Deacon | e24e03a | 2020-04-23 10:36:58 +0100 | [diff] [blame] | 177 | The instruction cache may be on or off, and must not hold any stale |
| 178 | entries corresponding to the loaded kernel image. |
Mauro Carvalho Chehab | 877a37d | 2020-04-14 18:48:39 +0200 | [diff] [blame] | 179 | |
Catalin Marinas | c218bca | 2014-03-26 18:25:55 +0000 | [diff] [blame] | 180 | The address range corresponding to the loaded kernel image must be |
| 181 | cleaned to the PoC. In the presence of a system cache or other |
| 182 | coherent masters with caches enabled, this will typically require |
| 183 | cache maintenance by VA rather than set/way operations. |
| 184 | System caches which respect the architected cache maintenance by VA |
| 185 | operations must be configured and may be enabled. |
| 186 | System caches which do not respect architected cache maintenance by VA |
| 187 | operations (not recommended) must be configured and disabled. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 188 | |
| 189 | - Architected timers |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 190 | |
Mark Rutland | 4fcd6e1 | 2013-10-11 14:52:07 +0100 | [diff] [blame] | 191 | CNTFRQ must be programmed with the timer frequency and CNTVOFF must |
| 192 | be programmed with a consistent value on all CPUs. If entering the |
| 193 | kernel at EL1, CNTHCTL_EL2 must have EL1PCTEN (bit 0) set where |
| 194 | available. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 195 | |
| 196 | - Coherency |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 197 | |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 198 | All CPUs to be booted by the kernel must be part of the same coherency |
| 199 | domain on entry to the kernel. This may require IMPLEMENTATION DEFINED |
| 200 | initialisation to enable the receiving of maintenance operations on |
| 201 | each CPU. |
| 202 | |
| 203 | - System registers |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 204 | |
Mark Brown | 230800c | 2021-04-01 19:09:41 +0100 | [diff] [blame] | 205 | All writable architected system registers at or below the exception |
| 206 | level where the kernel image will be entered must be initialised by |
| 207 | software at a higher exception level to prevent execution in an UNKNOWN |
| 208 | state. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 209 | |
Marc Zyngier | e384976 | 2021-08-12 20:02:13 +0100 | [diff] [blame] | 210 | For all systems: |
| 211 | - If EL3 is present: |
| 212 | |
| 213 | - SCR_EL3.FIQ must have the same value across all CPUs the kernel is |
| 214 | executing on. |
| 215 | - The value of SCR_EL3.FIQ must be the same as the one present at boot |
| 216 | time whenever the kernel is executing. |
| 217 | |
| 218 | - If EL3 is present and the kernel is entered at EL2: |
| 219 | |
| 220 | - SCR_EL3.HCE (bit 8) must be initialised to 0b1. |
Julien Thierry | d98d0a9 | 2019-01-31 14:58:57 +0000 | [diff] [blame] | 221 | |
Marc Zyngier | 6d32ab2 | 2015-09-30 12:05:17 +0100 | [diff] [blame] | 222 | For systems with a GICv3 interrupt controller to be used in v3 mode: |
Marc Zyngier | 63f8344 | 2013-11-28 18:24:58 +0000 | [diff] [blame] | 223 | - If EL3 is present: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 224 | |
| 225 | - ICC_SRE_EL3.Enable (bit 3) must be initialiased to 0b1. |
| 226 | - ICC_SRE_EL3.SRE (bit 0) must be initialised to 0b1. |
Marc Zyngier | 7e3a57f | 2019-10-02 10:06:13 +0100 | [diff] [blame] | 227 | - ICC_CTLR_EL3.PMHE (bit 6) must be set to the same value across |
| 228 | all CPUs the kernel is executing on, and must stay constant |
| 229 | for the lifetime of the kernel. |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 230 | |
Marc Zyngier | 63f8344 | 2013-11-28 18:24:58 +0000 | [diff] [blame] | 231 | - If the kernel is entered at EL1: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 232 | |
| 233 | - ICC.SRE_EL2.Enable (bit 3) must be initialised to 0b1 |
| 234 | - ICC_SRE_EL2.SRE (bit 0) must be initialised to 0b1. |
| 235 | |
Marc Zyngier | 6d32ab2 | 2015-09-30 12:05:17 +0100 | [diff] [blame] | 236 | - The DT or ACPI tables must describe a GICv3 interrupt controller. |
| 237 | |
| 238 | For systems with a GICv3 interrupt controller to be used in |
| 239 | compatibility (v2) mode: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 240 | |
Marc Zyngier | 6d32ab2 | 2015-09-30 12:05:17 +0100 | [diff] [blame] | 241 | - If EL3 is present: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 242 | |
| 243 | ICC_SRE_EL3.SRE (bit 0) must be initialised to 0b0. |
| 244 | |
Marc Zyngier | 6d32ab2 | 2015-09-30 12:05:17 +0100 | [diff] [blame] | 245 | - If the kernel is entered at EL1: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 246 | |
| 247 | ICC_SRE_EL2.SRE (bit 0) must be initialised to 0b0. |
| 248 | |
Marc Zyngier | 6d32ab2 | 2015-09-30 12:05:17 +0100 | [diff] [blame] | 249 | - The DT or ACPI tables must describe a GICv2 interrupt controller. |
Marc Zyngier | 63f8344 | 2013-11-28 18:24:58 +0000 | [diff] [blame] | 250 | |
Mark Rutland | fbedc59 | 2018-12-07 18:39:31 +0000 | [diff] [blame] | 251 | For CPUs with pointer authentication functionality: |
Mauro Carvalho Chehab | 877a37d | 2020-04-14 18:48:39 +0200 | [diff] [blame] | 252 | |
Mark Rutland | fbedc59 | 2018-12-07 18:39:31 +0000 | [diff] [blame] | 253 | - If EL3 is present: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 254 | |
| 255 | - SCR_EL3.APK (bit 16) must be initialised to 0b1 |
| 256 | - SCR_EL3.API (bit 17) must be initialised to 0b1 |
| 257 | |
Mark Rutland | fbedc59 | 2018-12-07 18:39:31 +0000 | [diff] [blame] | 258 | - If the kernel is entered at EL1: |
Mauro Carvalho Chehab | b693d0b | 2019-06-12 14:52:38 -0300 | [diff] [blame] | 259 | |
| 260 | - HCR_EL2.APK (bit 40) must be initialised to 0b1 |
| 261 | - HCR_EL2.API (bit 41) must be initialised to 0b1 |
Mark Rutland | fbedc59 | 2018-12-07 18:39:31 +0000 | [diff] [blame] | 262 | |
Ionela Voinescu | 6abde90 | 2020-03-05 09:06:24 +0000 | [diff] [blame] | 263 | For CPUs with Activity Monitors Unit v1 (AMUv1) extension present: |
Mauro Carvalho Chehab | 877a37d | 2020-04-14 18:48:39 +0200 | [diff] [blame] | 264 | |
Ionela Voinescu | 6abde90 | 2020-03-05 09:06:24 +0000 | [diff] [blame] | 265 | - If EL3 is present: |
Mauro Carvalho Chehab | 877a37d | 2020-04-14 18:48:39 +0200 | [diff] [blame] | 266 | |
| 267 | - CPTR_EL3.TAM (bit 30) must be initialised to 0b0 |
| 268 | - CPTR_EL2.TAM (bit 30) must be initialised to 0b0 |
| 269 | - AMCNTENSET0_EL0 must be initialised to 0b1111 |
| 270 | - AMCNTENSET1_EL0 must be initialised to a platform specific value |
| 271 | having 0b1 set for the corresponding bit for each of the auxiliary |
| 272 | counters present. |
| 273 | |
Ionela Voinescu | 6abde90 | 2020-03-05 09:06:24 +0000 | [diff] [blame] | 274 | - If the kernel is entered at EL1: |
Mauro Carvalho Chehab | 877a37d | 2020-04-14 18:48:39 +0200 | [diff] [blame] | 275 | |
| 276 | - AMCNTENSET0_EL0 must be initialised to 0b1111 |
| 277 | - AMCNTENSET1_EL0 must be initialised to a platform specific value |
| 278 | having 0b1 set for the corresponding bit for each of the auxiliary |
| 279 | counters present. |
Ionela Voinescu | 6abde90 | 2020-03-05 09:06:24 +0000 | [diff] [blame] | 280 | |
Mark Brown | 3e23738 | 2021-04-01 19:09:39 +0100 | [diff] [blame] | 281 | For CPUs with the Fine Grained Traps (FEAT_FGT) extension present: |
| 282 | |
| 283 | - If EL3 is present and the kernel is entered at EL2: |
| 284 | |
| 285 | - SCR_EL3.FGTEn (bit 27) must be initialised to 0b1. |
| 286 | |
Mark Brown | ca94079 | 2021-05-12 17:23:50 +0100 | [diff] [blame] | 287 | For CPUs with support for HCRX_EL2 (FEAT_HCX) present: |
| 288 | |
| 289 | - If EL3 is present and the kernel is entered at EL2: |
| 290 | |
| 291 | - SCR_EL3.HXEn (bit 38) must be initialised to 0b1. |
| 292 | |
Mark Brown | b30dbf4 | 2021-04-12 16:19:54 +0100 | [diff] [blame] | 293 | For CPUs with Advanced SIMD and floating point support: |
| 294 | |
| 295 | - If EL3 is present: |
| 296 | |
| 297 | - CPTR_EL3.TFP (bit 10) must be initialised to 0b0. |
| 298 | |
| 299 | - If EL2 is present and the kernel is entered at EL1: |
| 300 | |
| 301 | - CPTR_EL2.TFP (bit 10) must be initialised to 0b0. |
| 302 | |
Mark Brown | ff1c42c | 2021-04-12 16:19:55 +0100 | [diff] [blame] | 303 | For CPUs with the Scalable Vector Extension (FEAT_SVE) present: |
| 304 | |
| 305 | - if EL3 is present: |
| 306 | |
| 307 | - CPTR_EL3.EZ (bit 8) must be initialised to 0b1. |
| 308 | |
| 309 | - ZCR_EL3.LEN must be initialised to the same value for all CPUs the |
| 310 | kernel is executed on. |
| 311 | |
| 312 | - If the kernel is entered at EL1 and EL2 is present: |
| 313 | |
| 314 | - CPTR_EL2.TZ (bit 8) must be initialised to 0b0. |
| 315 | |
| 316 | - CPTR_EL2.ZEN (bits 17:16) must be initialised to 0b11. |
| 317 | |
| 318 | - ZCR_EL2.LEN must be initialised to the same value for all CPUs the |
| 319 | kernel will execute on. |
| 320 | |
Mark Brown | a8caaa2 | 2021-07-20 21:42:20 +0100 | [diff] [blame] | 321 | For CPUs with the Scalable Matrix Extension (FEAT_SME): |
| 322 | |
| 323 | - If EL3 is present: |
| 324 | |
| 325 | - CPTR_EL3.ESM (bit 12) must be initialised to 0b1. |
| 326 | |
| 327 | - SCR_EL3.EnTP2 (bit 41) must be initialised to 0b1. |
| 328 | |
| 329 | - SMCR_EL3.LEN must be initialised to the same value for all CPUs the |
| 330 | kernel will execute on. |
| 331 | |
| 332 | - If the kernel is entered at EL1 and EL2 is present: |
| 333 | |
| 334 | - CPTR_EL2.TSM (bit 12) must be initialised to 0b0. |
| 335 | |
| 336 | - CPTR_EL2.SMEN (bits 25:24) must be initialised to 0b11. |
| 337 | |
| 338 | - SCTLR_EL2.EnTP2 (bit 60) must be initialised to 0b1. |
| 339 | |
| 340 | - SMCR_EL2.LEN must be initialised to the same value for all CPUs the |
| 341 | kernel will execute on. |
| 342 | |
Mark Brown | d198c77 | 2021-10-26 12:18:02 +0100 | [diff] [blame] | 343 | For CPUs with the Scalable Matrix Extension FA64 feature (FEAT_SME_FA64) |
| 344 | |
| 345 | - If EL3 is present: |
| 346 | |
| 347 | - SMCR_EL3.FA64 (bit 31) must be initialised to 0b1. |
| 348 | |
| 349 | - If the kernel is entered at EL1 and EL2 is present: |
| 350 | |
| 351 | - SMCR_EL2.FA64 (bit 31) must be initialised to 0b1. |
| 352 | |
Mark Rutland | 4fcd6e1 | 2013-10-11 14:52:07 +0100 | [diff] [blame] | 353 | The requirements described above for CPU mode, caches, MMUs, architected |
| 354 | timers, coherency and system registers apply to all CPUs. All CPUs must |
Mark Brown | ee61f36 | 2021-04-12 16:19:53 +0100 | [diff] [blame] | 355 | enter the kernel in the same exception level. Where the values documented |
| 356 | disable traps it is permissible for these traps to be enabled so long as |
| 357 | those traps are handled transparently by higher exception levels as though |
| 358 | the values documented were set. |
Mark Rutland | 4fcd6e1 | 2013-10-11 14:52:07 +0100 | [diff] [blame] | 359 | |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 360 | The boot loader is expected to enter the kernel on each CPU in the |
| 361 | following manner: |
| 362 | |
| 363 | - The primary CPU must jump directly to the first instruction of the |
| 364 | kernel image. The device tree blob passed by this CPU must contain |
Mark Rutland | 4fcd6e1 | 2013-10-11 14:52:07 +0100 | [diff] [blame] | 365 | an 'enable-method' property for each cpu node. The supported |
| 366 | enable-methods are described below. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 367 | |
| 368 | It is expected that the bootloader will generate these device tree |
| 369 | properties and insert them into the blob prior to kernel entry. |
| 370 | |
Mark Rutland | 4fcd6e1 | 2013-10-11 14:52:07 +0100 | [diff] [blame] | 371 | - CPUs with a "spin-table" enable-method must have a 'cpu-release-addr' |
| 372 | property in their cpu node. This property identifies a |
| 373 | naturally-aligned 64-bit zero-initalised memory location. |
| 374 | |
| 375 | These CPUs should spin outside of the kernel in a reserved area of |
| 376 | memory (communicated to the kernel by a /memreserve/ region in the |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 377 | device tree) polling their cpu-release-addr location, which must be |
| 378 | contained in the reserved region. A wfe instruction may be inserted |
| 379 | to reduce the overhead of the busy-loop and a sev will be issued by |
| 380 | the primary CPU. When a read of the location pointed to by the |
Mark Rutland | 4fcd6e1 | 2013-10-11 14:52:07 +0100 | [diff] [blame] | 381 | cpu-release-addr returns a non-zero value, the CPU must jump to this |
| 382 | value. The value will be written as a single 64-bit little-endian |
| 383 | value, so CPUs must convert the read value to their native endianness |
| 384 | before jumping to it. |
| 385 | |
| 386 | - CPUs with a "psci" enable method should remain outside of |
| 387 | the kernel (i.e. outside of the regions of memory described to the |
| 388 | kernel in the memory node, or in a reserved area of memory described |
| 389 | to the kernel by a /memreserve/ region in the device tree). The |
| 390 | kernel will issue CPU_ON calls as described in ARM document number ARM |
| 391 | DEN 0022A ("Power State Coordination Interface System Software on ARM |
| 392 | processors") to bring CPUs into the kernel. |
| 393 | |
| 394 | The device tree should contain a 'psci' node, as described in |
Linus Torvalds | d06e415 | 2019-07-11 18:35:30 -0700 | [diff] [blame] | 395 | Documentation/devicetree/bindings/arm/psci.yaml. |
Catalin Marinas | 9703d9d | 2012-03-05 11:49:27 +0000 | [diff] [blame] | 396 | |
| 397 | - Secondary CPU general-purpose register settings |
Mauro Carvalho Chehab | 877a37d | 2020-04-14 18:48:39 +0200 | [diff] [blame] | 398 | |
| 399 | - x0 = 0 (reserved for future use) |
| 400 | - x1 = 0 (reserved for future use) |
| 401 | - x2 = 0 (reserved for future use) |
| 402 | - x3 = 0 (reserved for future use) |