booting.txt 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. Booting AArch64 Linux
  2. =====================
  3. Author: Will Deacon <will.deacon@arm.com>
  4. Date : 07 September 2012
  5. This document is based on the ARM booting document by Russell King and
  6. is relevant to all public releases of the AArch64 Linux kernel.
  7. The AArch64 exception model is made up of a number of exception levels
  8. (EL0 - EL3), with EL0 and EL1 having a secure and a non-secure
  9. counterpart. EL2 is the hypervisor level and exists only in non-secure
  10. mode. EL3 is the highest priority level and exists only in secure mode.
  11. For the purposes of this document, we will use the term `boot loader'
  12. simply to define all software that executes on the CPU(s) before control
  13. is passed to the Linux kernel. This may include secure monitor and
  14. hypervisor code, or it may just be a handful of instructions for
  15. preparing a minimal boot environment.
  16. Essentially, the boot loader should provide (as a minimum) the
  17. following:
  18. 1. Setup and initialise the RAM
  19. 2. Setup the device tree
  20. 3. Decompress the kernel image
  21. 4. Call the kernel image
  22. 1. Setup and initialise RAM
  23. ---------------------------
  24. Requirement: MANDATORY
  25. The boot loader is expected to find and initialise all RAM that the
  26. kernel will use for volatile data storage in the system. It performs
  27. this in a machine dependent manner. (It may use internal algorithms
  28. to automatically locate and size all RAM, or it may use knowledge of
  29. the RAM in the machine, or any other method the boot loader designer
  30. sees fit.)
  31. 2. Setup the device tree
  32. -------------------------
  33. Requirement: MANDATORY
  34. The device tree blob (dtb) must be placed on an 8-byte boundary within
  35. the first 512 megabytes from the start of the kernel image and must not
  36. cross a 2-megabyte boundary. This is to allow the kernel to map the
  37. blob using a single section mapping in the initial page tables.
  38. 3. Decompress the kernel image
  39. ------------------------------
  40. Requirement: OPTIONAL
  41. The AArch64 kernel does not currently provide a decompressor and
  42. therefore requires decompression (gzip etc.) to be performed by the boot
  43. loader if a compressed Image target (e.g. Image.gz) is used. For
  44. bootloaders that do not implement this requirement, the uncompressed
  45. Image target is available instead.
  46. 4. Call the kernel image
  47. ------------------------
  48. Requirement: MANDATORY
  49. The decompressed kernel image contains a 64-byte header as follows:
  50. u32 code0; /* Executable code */
  51. u32 code1; /* Executable code */
  52. u64 text_offset; /* Image load offset */
  53. u64 res0 = 0; /* reserved */
  54. u64 res1 = 0; /* reserved */
  55. u64 res2 = 0; /* reserved */
  56. u64 res3 = 0; /* reserved */
  57. u64 res4 = 0; /* reserved */
  58. u32 magic = 0x644d5241; /* Magic number, little endian, "ARM\x64" */
  59. u32 res5 = 0; /* reserved */
  60. Header notes:
  61. - code0/code1 are responsible for branching to stext.
  62. The image must be placed at the specified offset (currently 0x80000)
  63. from the start of the system RAM and called there. The start of the
  64. system RAM must be aligned to 2MB.
  65. Before jumping into the kernel, the following conditions must be met:
  66. - Quiesce all DMA capable devices so that memory does not get
  67. corrupted by bogus network packets or disk data. This will save
  68. you many hours of debug.
  69. - Primary CPU general-purpose register settings
  70. x0 = physical address of device tree blob (dtb) in system RAM.
  71. x1 = 0 (reserved for future use)
  72. x2 = 0 (reserved for future use)
  73. x3 = 0 (reserved for future use)
  74. - CPU mode
  75. All forms of interrupts must be masked in PSTATE.DAIF (Debug, SError,
  76. IRQ and FIQ).
  77. The CPU must be in either EL2 (RECOMMENDED in order to have access to
  78. the virtualisation extensions) or non-secure EL1.
  79. - Caches, MMUs
  80. The MMU must be off.
  81. Instruction cache may be on or off.
  82. Data cache must be off and invalidated.
  83. External caches (if present) must be configured and disabled.
  84. - Architected timers
  85. CNTFRQ must be programmed with the timer frequency.
  86. If entering the kernel at EL1, CNTHCTL_EL2 must have EL1PCTEN (bit 0)
  87. set where available.
  88. - Coherency
  89. All CPUs to be booted by the kernel must be part of the same coherency
  90. domain on entry to the kernel. This may require IMPLEMENTATION DEFINED
  91. initialisation to enable the receiving of maintenance operations on
  92. each CPU.
  93. - System registers
  94. All writable architected system registers at the exception level where
  95. the kernel image will be entered must be initialised by software at a
  96. higher exception level to prevent execution in an UNKNOWN state.
  97. The boot loader is expected to enter the kernel on each CPU in the
  98. following manner:
  99. - The primary CPU must jump directly to the first instruction of the
  100. kernel image. The device tree blob passed by this CPU must contain
  101. for each CPU node:
  102. 1. An 'enable-method' property. Currently, the only supported value
  103. for this field is the string "spin-table".
  104. 2. A 'cpu-release-addr' property identifying a 64-bit,
  105. zero-initialised memory location.
  106. It is expected that the bootloader will generate these device tree
  107. properties and insert them into the blob prior to kernel entry.
  108. - Any secondary CPUs must spin outside of the kernel in a reserved area
  109. of memory (communicated to the kernel by a /memreserve/ region in the
  110. device tree) polling their cpu-release-addr location, which must be
  111. contained in the reserved region. A wfe instruction may be inserted
  112. to reduce the overhead of the busy-loop and a sev will be issued by
  113. the primary CPU. When a read of the location pointed to by the
  114. cpu-release-addr returns a non-zero value, the CPU must jump directly
  115. to this value.
  116. - Secondary CPU general-purpose register settings
  117. x0 = 0 (reserved for future use)
  118. x1 = 0 (reserved for future use)
  119. x2 = 0 (reserved for future use)
  120. x3 = 0 (reserved for future use)