mirror of
https://github.com/torvalds/linux.git
synced 2024-11-22 12:11:40 +00:00
437330d90c
* for-next/mops: : More FEAT_MOPS (memcpy instructions) uses - in-kernel routines arm64: mops: Document requirements for hypervisors arm64: lib: Use MOPS for copy_page() and clear_page() arm64: lib: Use MOPS for memcpy() routines arm64: mops: Document booting requirement for HCR_EL2.MCE2 arm64: mops: Handle MOPS exceptions from EL1 arm64: probes: Disable kprobes/uprobes on MOPS instructions # Conflicts: # arch/arm64/kernel/entry-common.c
502 lines
17 KiB
ReStructuredText
502 lines
17 KiB
ReStructuredText
=====================
|
|
Booting AArch64 Linux
|
|
=====================
|
|
|
|
Author: Will Deacon <will.deacon@arm.com>
|
|
|
|
Date : 07 September 2012
|
|
|
|
This document is based on the ARM booting document by Russell King and
|
|
is relevant to all public releases of the AArch64 Linux kernel.
|
|
|
|
The AArch64 exception model is made up of a number of exception levels
|
|
(EL0 - EL3), with EL0, EL1 and EL2 having a secure and a non-secure
|
|
counterpart. EL2 is the hypervisor level, EL3 is the highest priority
|
|
level and exists only in secure mode. Both are architecturally optional.
|
|
|
|
For the purposes of this document, we will use the term `boot loader`
|
|
simply to define all software that executes on the CPU(s) before control
|
|
is passed to the Linux kernel. This may include secure monitor and
|
|
hypervisor code, or it may just be a handful of instructions for
|
|
preparing a minimal boot environment.
|
|
|
|
Essentially, the boot loader should provide (as a minimum) the
|
|
following:
|
|
|
|
1. Setup and initialise the RAM
|
|
2. Setup the device tree
|
|
3. Decompress the kernel image
|
|
4. Call the kernel image
|
|
|
|
|
|
1. Setup and initialise RAM
|
|
---------------------------
|
|
|
|
Requirement: MANDATORY
|
|
|
|
The boot loader is expected to find and initialise all RAM that the
|
|
kernel will use for volatile data storage in the system. It performs
|
|
this in a machine dependent manner. (It may use internal algorithms
|
|
to automatically locate and size all RAM, or it may use knowledge of
|
|
the RAM in the machine, or any other method the boot loader designer
|
|
sees fit.)
|
|
|
|
For Arm Confidential Compute Realms this includes ensuring that all
|
|
protected RAM has a Realm IPA state (RIPAS) of "RAM".
|
|
|
|
|
|
2. Setup the device tree
|
|
-------------------------
|
|
|
|
Requirement: MANDATORY
|
|
|
|
The device tree blob (dtb) must be placed on an 8-byte boundary and must
|
|
not exceed 2 megabytes in size. Since the dtb will be mapped cacheable
|
|
using blocks of up to 2 megabytes in size, it must not be placed within
|
|
any 2M region which must be mapped with any specific attributes.
|
|
|
|
NOTE: versions prior to v4.2 also require that the DTB be placed within
|
|
the 512 MB region starting at text_offset bytes below the kernel Image.
|
|
|
|
3. Decompress the kernel image
|
|
------------------------------
|
|
|
|
Requirement: OPTIONAL
|
|
|
|
The AArch64 kernel does not currently provide a decompressor and
|
|
therefore requires decompression (gzip etc.) to be performed by the boot
|
|
loader if a compressed Image target (e.g. Image.gz) is used. For
|
|
bootloaders that do not implement this requirement, the uncompressed
|
|
Image target is available instead.
|
|
|
|
|
|
4. Call the kernel image
|
|
------------------------
|
|
|
|
Requirement: MANDATORY
|
|
|
|
The decompressed kernel image contains a 64-byte header as follows::
|
|
|
|
u32 code0; /* Executable code */
|
|
u32 code1; /* Executable code */
|
|
u64 text_offset; /* Image load offset, little endian */
|
|
u64 image_size; /* Effective Image size, little endian */
|
|
u64 flags; /* kernel flags, little endian */
|
|
u64 res2 = 0; /* reserved */
|
|
u64 res3 = 0; /* reserved */
|
|
u64 res4 = 0; /* reserved */
|
|
u32 magic = 0x644d5241; /* Magic number, little endian, "ARM\x64" */
|
|
u32 res5; /* reserved (used for PE COFF offset) */
|
|
|
|
|
|
Header notes:
|
|
|
|
- As of v3.17, all fields are little endian unless stated otherwise.
|
|
|
|
- code0/code1 are responsible for branching to stext.
|
|
|
|
- when booting through EFI, code0/code1 are initially skipped.
|
|
res5 is an offset to the PE header and the PE header has the EFI
|
|
entry point (efi_stub_entry). When the stub has done its work, it
|
|
jumps to code0 to resume the normal boot process.
|
|
|
|
- Prior to v3.17, the endianness of text_offset was not specified. In
|
|
these cases image_size is zero and text_offset is 0x80000 in the
|
|
endianness of the kernel. Where image_size is non-zero image_size is
|
|
little-endian and must be respected. Where image_size is zero,
|
|
text_offset can be assumed to be 0x80000.
|
|
|
|
- The flags field (introduced in v3.17) is a little-endian 64-bit field
|
|
composed as follows:
|
|
|
|
============= ===============================================================
|
|
Bit 0 Kernel endianness. 1 if BE, 0 if LE.
|
|
Bit 1-2 Kernel Page size.
|
|
|
|
* 0 - Unspecified.
|
|
* 1 - 4K
|
|
* 2 - 16K
|
|
* 3 - 64K
|
|
Bit 3 Kernel physical placement
|
|
|
|
0
|
|
2MB aligned base should be as close as possible
|
|
to the base of DRAM, since memory below it is not
|
|
accessible via the linear mapping
|
|
1
|
|
2MB aligned base such that all image_size bytes
|
|
counted from the start of the image are within
|
|
the 48-bit addressable range of physical memory
|
|
Bits 4-63 Reserved.
|
|
============= ===============================================================
|
|
|
|
- When image_size is zero, a bootloader should attempt to keep as much
|
|
memory as possible free for use by the kernel immediately after the
|
|
end of the kernel image. The amount of space required will vary
|
|
depending on selected features, and is effectively unbound.
|
|
|
|
The Image must be placed text_offset bytes from a 2MB aligned base
|
|
address anywhere in usable system RAM and called there. The region
|
|
between the 2 MB aligned base address and the start of the image has no
|
|
special significance to the kernel, and may be used for other purposes.
|
|
At least image_size bytes from the start of the image must be free for
|
|
use by the kernel.
|
|
NOTE: versions prior to v4.6 cannot make use of memory below the
|
|
physical offset of the Image so it is recommended that the Image be
|
|
placed as close as possible to the start of system RAM.
|
|
|
|
If an initrd/initramfs is passed to the kernel at boot, it must reside
|
|
entirely within a 1 GB aligned physical memory window of up to 32 GB in
|
|
size that fully covers the kernel Image as well.
|
|
|
|
Any memory described to the kernel (even that below the start of the
|
|
image) which is not marked as reserved from the kernel (e.g., with a
|
|
memreserve region in the device tree) will be considered as available to
|
|
the kernel.
|
|
|
|
Before jumping into the kernel, the following conditions must be met:
|
|
|
|
- Quiesce all DMA capable devices so that memory does not get
|
|
corrupted by bogus network packets or disk data. This will save
|
|
you many hours of debug.
|
|
|
|
- Primary CPU general-purpose register settings:
|
|
|
|
- x0 = physical address of device tree blob (dtb) in system RAM.
|
|
- x1 = 0 (reserved for future use)
|
|
- x2 = 0 (reserved for future use)
|
|
- x3 = 0 (reserved for future use)
|
|
|
|
- CPU mode
|
|
|
|
All forms of interrupts must be masked in PSTATE.DAIF (Debug, SError,
|
|
IRQ and FIQ).
|
|
The CPU must be in non-secure state, either in EL2 (RECOMMENDED in order
|
|
to have access to the virtualisation extensions), or in EL1.
|
|
|
|
- Caches, MMUs
|
|
|
|
The MMU must be off.
|
|
|
|
The instruction cache may be on or off, and must not hold any stale
|
|
entries corresponding to the loaded kernel image.
|
|
|
|
The address range corresponding to the loaded kernel image must be
|
|
cleaned to the PoC. In the presence of a system cache or other
|
|
coherent masters with caches enabled, this will typically require
|
|
cache maintenance by VA rather than set/way operations.
|
|
System caches which respect the architected cache maintenance by VA
|
|
operations must be configured and may be enabled.
|
|
System caches which do not respect architected cache maintenance by VA
|
|
operations (not recommended) must be configured and disabled.
|
|
|
|
- Architected timers
|
|
|
|
CNTFRQ must be programmed with the timer frequency and CNTVOFF must
|
|
be programmed with a consistent value on all CPUs. If entering the
|
|
kernel at EL1, CNTHCTL_EL2 must have EL1PCTEN (bit 0) set where
|
|
available.
|
|
|
|
- Coherency
|
|
|
|
All CPUs to be booted by the kernel must be part of the same coherency
|
|
domain on entry to the kernel. This may require IMPLEMENTATION DEFINED
|
|
initialisation to enable the receiving of maintenance operations on
|
|
each CPU.
|
|
|
|
- System registers
|
|
|
|
All writable architected system registers at or below the exception
|
|
level where the kernel image will be entered must be initialised by
|
|
software at a higher exception level to prevent execution in an UNKNOWN
|
|
state.
|
|
|
|
For all systems:
|
|
- If EL3 is present:
|
|
|
|
- SCR_EL3.FIQ must have the same value across all CPUs the kernel is
|
|
executing on.
|
|
- The value of SCR_EL3.FIQ must be the same as the one present at boot
|
|
time whenever the kernel is executing.
|
|
|
|
- If EL3 is present and the kernel is entered at EL2:
|
|
|
|
- SCR_EL3.HCE (bit 8) must be initialised to 0b1.
|
|
|
|
For systems with a GICv3 interrupt controller to be used in v3 mode:
|
|
- If EL3 is present:
|
|
|
|
- ICC_SRE_EL3.Enable (bit 3) must be initialised to 0b1.
|
|
- ICC_SRE_EL3.SRE (bit 0) must be initialised to 0b1.
|
|
- ICC_CTLR_EL3.PMHE (bit 6) must be set to the same value across
|
|
all CPUs the kernel is executing on, and must stay constant
|
|
for the lifetime of the kernel.
|
|
|
|
- If the kernel is entered at EL1:
|
|
|
|
- ICC.SRE_EL2.Enable (bit 3) must be initialised to 0b1
|
|
- ICC_SRE_EL2.SRE (bit 0) must be initialised to 0b1.
|
|
|
|
- The DT or ACPI tables must describe a GICv3 interrupt controller.
|
|
|
|
For systems with a GICv3 interrupt controller to be used in
|
|
compatibility (v2) mode:
|
|
|
|
- If EL3 is present:
|
|
|
|
ICC_SRE_EL3.SRE (bit 0) must be initialised to 0b0.
|
|
|
|
- If the kernel is entered at EL1:
|
|
|
|
ICC_SRE_EL2.SRE (bit 0) must be initialised to 0b0.
|
|
|
|
- The DT or ACPI tables must describe a GICv2 interrupt controller.
|
|
|
|
For CPUs with pointer authentication functionality:
|
|
|
|
- If EL3 is present:
|
|
|
|
- SCR_EL3.APK (bit 16) must be initialised to 0b1
|
|
- SCR_EL3.API (bit 17) must be initialised to 0b1
|
|
|
|
- If the kernel is entered at EL1:
|
|
|
|
- HCR_EL2.APK (bit 40) must be initialised to 0b1
|
|
- HCR_EL2.API (bit 41) must be initialised to 0b1
|
|
|
|
For CPUs with Activity Monitors Unit v1 (AMUv1) extension present:
|
|
|
|
- If EL3 is present:
|
|
|
|
- CPTR_EL3.TAM (bit 30) must be initialised to 0b0
|
|
- CPTR_EL2.TAM (bit 30) must be initialised to 0b0
|
|
- AMCNTENSET0_EL0 must be initialised to 0b1111
|
|
- AMCNTENSET1_EL0 must be initialised to a platform specific value
|
|
having 0b1 set for the corresponding bit for each of the auxiliary
|
|
counters present.
|
|
|
|
- If the kernel is entered at EL1:
|
|
|
|
- AMCNTENSET0_EL0 must be initialised to 0b1111
|
|
- AMCNTENSET1_EL0 must be initialised to a platform specific value
|
|
having 0b1 set for the corresponding bit for each of the auxiliary
|
|
counters present.
|
|
|
|
For CPUs with the Fine Grained Traps (FEAT_FGT) extension present:
|
|
|
|
- If EL3 is present and the kernel is entered at EL2:
|
|
|
|
- SCR_EL3.FGTEn (bit 27) must be initialised to 0b1.
|
|
|
|
For CPUs with support for HCRX_EL2 (FEAT_HCX) present:
|
|
|
|
- If EL3 is present and the kernel is entered at EL2:
|
|
|
|
- SCR_EL3.HXEn (bit 38) must be initialised to 0b1.
|
|
|
|
For CPUs with Advanced SIMD and floating point support:
|
|
|
|
- If EL3 is present:
|
|
|
|
- CPTR_EL3.TFP (bit 10) must be initialised to 0b0.
|
|
|
|
- If EL2 is present and the kernel is entered at EL1:
|
|
|
|
- CPTR_EL2.TFP (bit 10) must be initialised to 0b0.
|
|
|
|
For CPUs with the Scalable Vector Extension (FEAT_SVE) present:
|
|
|
|
- if EL3 is present:
|
|
|
|
- CPTR_EL3.EZ (bit 8) must be initialised to 0b1.
|
|
|
|
- ZCR_EL3.LEN must be initialised to the same value for all CPUs the
|
|
kernel is executed on.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- CPTR_EL2.TZ (bit 8) must be initialised to 0b0.
|
|
|
|
- CPTR_EL2.ZEN (bits 17:16) must be initialised to 0b11.
|
|
|
|
- ZCR_EL2.LEN must be initialised to the same value for all CPUs the
|
|
kernel will execute on.
|
|
|
|
For CPUs with the Scalable Matrix Extension (FEAT_SME):
|
|
|
|
- If EL3 is present:
|
|
|
|
- CPTR_EL3.ESM (bit 12) must be initialised to 0b1.
|
|
|
|
- SCR_EL3.EnTP2 (bit 41) must be initialised to 0b1.
|
|
|
|
- SMCR_EL3.LEN must be initialised to the same value for all CPUs the
|
|
kernel will execute on.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- CPTR_EL2.TSM (bit 12) must be initialised to 0b0.
|
|
|
|
- CPTR_EL2.SMEN (bits 25:24) must be initialised to 0b11.
|
|
|
|
- SCTLR_EL2.EnTP2 (bit 60) must be initialised to 0b1.
|
|
|
|
- SMCR_EL2.LEN must be initialised to the same value for all CPUs the
|
|
kernel will execute on.
|
|
|
|
- HWFGRTR_EL2.nTPIDR2_EL0 (bit 55) must be initialised to 0b01.
|
|
|
|
- HWFGWTR_EL2.nTPIDR2_EL0 (bit 55) must be initialised to 0b01.
|
|
|
|
- HWFGRTR_EL2.nSMPRI_EL1 (bit 54) must be initialised to 0b01.
|
|
|
|
- HWFGWTR_EL2.nSMPRI_EL1 (bit 54) must be initialised to 0b01.
|
|
|
|
For CPUs with the Scalable Matrix Extension FA64 feature (FEAT_SME_FA64):
|
|
|
|
- If EL3 is present:
|
|
|
|
- SMCR_EL3.FA64 (bit 31) must be initialised to 0b1.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- SMCR_EL2.FA64 (bit 31) must be initialised to 0b1.
|
|
|
|
For CPUs with the Memory Tagging Extension feature (FEAT_MTE2):
|
|
|
|
- If EL3 is present:
|
|
|
|
- SCR_EL3.ATA (bit 26) must be initialised to 0b1.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- HCR_EL2.ATA (bit 56) must be initialised to 0b1.
|
|
|
|
For CPUs with the Scalable Matrix Extension version 2 (FEAT_SME2):
|
|
|
|
- If EL3 is present:
|
|
|
|
- SMCR_EL3.EZT0 (bit 30) must be initialised to 0b1.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- SMCR_EL2.EZT0 (bit 30) must be initialised to 0b1.
|
|
|
|
For CPUs with Memory Copy and Memory Set instructions (FEAT_MOPS):
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- HCRX_EL2.MSCEn (bit 11) must be initialised to 0b1.
|
|
|
|
- HCRX_EL2.MCE2 (bit 10) must be initialised to 0b1 and the hypervisor
|
|
must handle MOPS exceptions as described in :ref:`arm64_mops_hyp`.
|
|
|
|
For CPUs with the Extended Translation Control Register feature (FEAT_TCR2):
|
|
|
|
- If EL3 is present:
|
|
|
|
- SCR_EL3.TCR2En (bit 43) must be initialised to 0b1.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- HCRX_EL2.TCR2En (bit 14) must be initialised to 0b1.
|
|
|
|
For CPUs with the Stage 1 Permission Indirection Extension feature (FEAT_S1PIE):
|
|
|
|
- If EL3 is present:
|
|
|
|
- SCR_EL3.PIEn (bit 45) must be initialised to 0b1.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- HFGRTR_EL2.nPIR_EL1 (bit 58) must be initialised to 0b1.
|
|
|
|
- HFGWTR_EL2.nPIR_EL1 (bit 58) must be initialised to 0b1.
|
|
|
|
- HFGRTR_EL2.nPIRE0_EL1 (bit 57) must be initialised to 0b1.
|
|
|
|
- HFGRWR_EL2.nPIRE0_EL1 (bit 57) must be initialised to 0b1.
|
|
|
|
- For CPUs with Guarded Control Stacks (FEAT_GCS):
|
|
|
|
- GCSCR_EL1 must be initialised to 0.
|
|
|
|
- GCSCRE0_EL1 must be initialised to 0.
|
|
|
|
- If EL3 is present:
|
|
|
|
- SCR_EL3.GCSEn (bit 39) must be initialised to 0b1.
|
|
|
|
- If EL2 is present:
|
|
|
|
- GCSCR_EL2 must be initialised to 0.
|
|
|
|
- If the kernel is entered at EL1 and EL2 is present:
|
|
|
|
- HCRX_EL2.GCSEn must be initialised to 0b1.
|
|
|
|
- HFGITR_EL2.nGCSEPP (bit 59) must be initialised to 0b1.
|
|
|
|
- HFGITR_EL2.nGCSSTR_EL1 (bit 58) must be initialised to 0b1.
|
|
|
|
- HFGITR_EL2.nGCSPUSHM_EL1 (bit 57) must be initialised to 0b1.
|
|
|
|
- HFGRTR_EL2.nGCS_EL1 (bit 53) must be initialised to 0b1.
|
|
|
|
- HFGRTR_EL2.nGCS_EL0 (bit 52) must be initialised to 0b1.
|
|
|
|
- HFGWTR_EL2.nGCS_EL1 (bit 53) must be initialised to 0b1.
|
|
|
|
- HFGWTR_EL2.nGCS_EL0 (bit 52) must be initialised to 0b1.
|
|
|
|
The requirements described above for CPU mode, caches, MMUs, architected
|
|
timers, coherency and system registers apply to all CPUs. All CPUs must
|
|
enter the kernel in the same exception level. Where the values documented
|
|
disable traps it is permissible for these traps to be enabled so long as
|
|
those traps are handled transparently by higher exception levels as though
|
|
the values documented were set.
|
|
|
|
The boot loader is expected to enter the kernel on each CPU in the
|
|
following manner:
|
|
|
|
- The primary CPU must jump directly to the first instruction of the
|
|
kernel image. The device tree blob passed by this CPU must contain
|
|
an 'enable-method' property for each cpu node. The supported
|
|
enable-methods are described below.
|
|
|
|
It is expected that the bootloader will generate these device tree
|
|
properties and insert them into the blob prior to kernel entry.
|
|
|
|
- CPUs with a "spin-table" enable-method must have a 'cpu-release-addr'
|
|
property in their cpu node. This property identifies a
|
|
naturally-aligned 64-bit zero-initalised memory location.
|
|
|
|
These CPUs should spin outside of the kernel in a reserved area of
|
|
memory (communicated to the kernel by a /memreserve/ region in the
|
|
device tree) polling their cpu-release-addr location, which must be
|
|
contained in the reserved region. A wfe instruction may be inserted
|
|
to reduce the overhead of the busy-loop and a sev will be issued by
|
|
the primary CPU. When a read of the location pointed to by the
|
|
cpu-release-addr returns a non-zero value, the CPU must jump to this
|
|
value. The value will be written as a single 64-bit little-endian
|
|
value, so CPUs must convert the read value to their native endianness
|
|
before jumping to it.
|
|
|
|
- CPUs with a "psci" enable method should remain outside of
|
|
the kernel (i.e. outside of the regions of memory described to the
|
|
kernel in the memory node, or in a reserved area of memory described
|
|
to the kernel by a /memreserve/ region in the device tree). The
|
|
kernel will issue CPU_ON calls as described in ARM document number ARM
|
|
DEN 0022A ("Power State Coordination Interface System Software on ARM
|
|
processors") to bring CPUs into the kernel.
|
|
|
|
The device tree should contain a 'psci' node, as described in
|
|
Documentation/devicetree/bindings/arm/psci.yaml.
|
|
|
|
- Secondary CPU general-purpose register settings
|
|
|
|
- x0 = 0 (reserved for future use)
|
|
- x1 = 0 (reserved for future use)
|
|
- x2 = 0 (reserved for future use)
|
|
- x3 = 0 (reserved for future use)
|