From patchwork Tue Nov 1 14:33:17 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 620739 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 31B24C433FE for ; Tue, 1 Nov 2022 14:39:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230298AbiKAOj1 (ORCPT ); Tue, 1 Nov 2022 10:39:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230347AbiKAOjW (ORCPT ); Tue, 1 Nov 2022 10:39:22 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AD3471C426 for ; Tue, 1 Nov 2022 07:39:20 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 47EB06119B for ; Tue, 1 Nov 2022 14:39:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 81F10C433C1; Tue, 1 Nov 2022 14:39:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1667313559; bh=2WtYkfyqwfbzmrCrdKWnq9io6zKV9H6MzPUD6asynbg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Wv4/yPK38kS6nMQN1rM9p5TgvQzvuq3eZuWNPrvL1bwTex894/QuqmO7PhaIc+/Vd W+ePc5eNtCdApA7RxZt4Tp6N+62MuUz5qu4tUSP7Z+Qu9DZE/zaG1phzfzKRAEsJxC EC/IQvEGTmoQjayyzXL3SH3+ohXJFyh8brj/snBhQmtiFmkj4594KAA8gCOktlJKVO Hw1s25ETia2aqInEvPxytkS+ZzUsqu8UVbJW/0+hKP0FtmfAEh1LOFFys0sHUqMt8d q1+lBhS+NHiC8sBum0t7FVoCIJACJzlFqDkoJoKzuKDf61CN/igy4IDJLYcqGbjWgx tOcBcXi4SB0VA== From: Mark Brown To: Catalin Marinas , Will Deacon , Shuah Khan , Shuah Khan Cc: Alan Hayward , Luis Machado , Szabolcs Nagy , linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org, Mark Brown Subject: [PATCH v2 02/21] arm64: Document boot requirements for SME 2 Date: Tue, 1 Nov 2022 14:33:17 +0000 Message-Id: <20221101143336.254445-3-broonie@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20221101143336.254445-1-broonie@kernel.org> References: <20221101143336.254445-1-broonie@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=1166; i=broonie@kernel.org; h=from:subject; bh=2WtYkfyqwfbzmrCrdKWnq9io6zKV9H6MzPUD6asynbg=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBjYS4qp/fnXI1ilfvmmnP6CxO7mMM9nfvM50hdIBdv A9TAH9+JATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCY2EuKgAKCRAk1otyXVSH0JiAB/ 9qBpKYFVHc8N/HI97CrKsnIMV9crK/IwLfzQV9lRi1wga7R8XDz1t5SEHKeurO9qxM5bvsVSEEpyWW 0wh4lZBlF3o2YdGb78jXFO88NHRLE9vzuLjpQCY2gDznAgr5Sg6tcISCVlH0JcJ1X1VXKV/sxrVlXX Ccov8AV27IF/2qkVKwELA1UMyMKc37bN+dOvzPTkWnK3gowKE30GRTfqBgyz1aAyE97O4pIrJ5gfBC cGDzNaP1TcjCT3874qWc+xECBhj7CjZRB0AZfZLFoAefflzvCl4SZK2Kjcqmr/Pw7xKzkBmk+u24et ZepAW2xhR/CNAeTunmKk+Utn7KRHS9 X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org SME 2 introduces the new ZT0 register, we require that access to this reigster is not trapped when we identify that the feature is supported. Signed-off-by: Mark Brown --- Documentation/arm64/booting.rst | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/Documentation/arm64/booting.rst b/Documentation/arm64/booting.rst index 8aefa1001ae5..b69b5cb596e6 100644 --- a/Documentation/arm64/booting.rst +++ b/Documentation/arm64/booting.rst @@ -360,6 +360,16 @@ Before jumping into the kernel, the following conditions must be met: - HCR_EL2.ATA (bit 56) must be initialised to 0b1. + For CPUs with the Scalable Matrix Extension version 2 (FEAT_SME2): + + - If EL3 is present: + + - SMCR_EL3.EZT0 (bit 30) must be initialised to 0b1. + + - If the kernel is entered at EL1 and EL2 is present: + + - SMCR_EL2.EZT0 (bit 30) must be initialised to 0b1. + The requirements described above for CPU mode, caches, MMUs, architected timers, coherency and system registers apply to all CPUs. All CPUs must enter the kernel in the same exception level. Where the values documented