From patchwork Tue Apr 15 12:10:24 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Luca Fancellu X-Patchwork-Id: 14052088 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id BEA0AC369AB for ; Tue, 15 Apr 2025 12:11:26 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.953760.1348185 (Exim 4.92) (envelope-from ) id 1u4f88-0004tF-1o; Tue, 15 Apr 2025 12:11:08 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 953760.1348185; Tue, 15 Apr 2025 12:11:08 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1u4f87-0004t8-Uo; Tue, 15 Apr 2025 12:11:07 +0000 Received: by outflank-mailman (input) for mailman id 953760; Tue, 15 Apr 2025 12:11:06 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1u4f86-0004t2-AN for xen-devel@lists.xenproject.org; Tue, 15 Apr 2025 12:11:06 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2062f.outbound.protection.outlook.com [2a01:111:f403:2614::62f]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id b330ba9d-19f2-11f0-9eae-5ba50f476ded; Tue, 15 Apr 2025 14:11:03 +0200 (CEST) Received: from DUZPR01CA0094.eurprd01.prod.exchangelabs.com (2603:10a6:10:4bb::20) by AS4PR08MB7856.eurprd08.prod.outlook.com (2603:10a6:20b:51f::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8632.36; Tue, 15 Apr 2025 12:11:00 +0000 Received: from DB3PEPF0000885F.eurprd02.prod.outlook.com (2603:10a6:10:4bb:cafe::eb) by DUZPR01CA0094.outlook.office365.com (2603:10a6:10:4bb::20) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8632.36 via Frontend Transport; Tue, 15 Apr 2025 12:10:54 +0000 Received: from outbound-uk1.az.dlp.m.darktrace.com (4.158.2.129) by DB3PEPF0000885F.mail.protection.outlook.com (10.167.242.10) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8655.12 via Frontend Transport; Tue, 15 Apr 2025 12:10:58 +0000 Received: from DB7PR08MB2987.eurprd08.prod.outlook.com (2603:10a6:5:1c::25) by AS2PR08MB10376.eurprd08.prod.outlook.com (2603:10a6:20b:545::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8632.35; Tue, 15 Apr 2025 12:10:25 +0000 Received: from DB7PR08MB2987.eurprd08.prod.outlook.com ([fe80::d53f:b16d:70a5:8668]) by DB7PR08MB2987.eurprd08.prod.outlook.com ([fe80::d53f:b16d:70a5:8668%4]) with mapi id 15.20.8632.030; Tue, 15 Apr 2025 12:10:24 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: b330ba9d-19f2-11f0-9eae-5ba50f476ded ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=D9e2QfON9UXIX0HbYOSGa7JSN9I+OlCsTVfGp4coUvfGOxTNpmFjWOvpNqa2V2SXNv1MgJ0fDTkpdFPzeLKPW2Eh6Fb031kHkSQtlikDDCFxDGVZAgbXyDVRPxPrcBmQf5AlfUzCSbzEmetDEr/KSR2xxaFdde++bWBuwPtQUdHxne1uRt3nizYQJH2BCXbWgDJt5+5TmmQ2ha4qqeKRXtQG1tBqMzlFxSIL4KFFGZN5P/Sr7AXRoTJzIrxzhoT2wjj1ErFdbusbOQK0F88Z+IlwxkBxSSuYhMk+2vMFzorYKndYjvDVxLKJnfbG+qJLZ74wNAcYST21bV4Ej23k1A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=maXQIFrepbcnWNUy7X+0V7vl3j2FxLUceEItRnrI7XM=; b=V+Un2fz45151rA58QIGmId5Gu44q4yDBFBRsA60OWuM75wFje4S/fpI05A9RiADOQwhs4eDN+nHeVDRKroh7+IdyafCtu6VV7QlwHXRJ7TOuqD+EZv24Rk0m72423kXub9DZeoW5Zrjb8GaQMu6Ac10Z1wvRHeubwu0ox2+/Z3TUwzV1FLTxQl8wGeRjpiYB5mk8dMcYNlAmh+vKCBFIT1ShStKasH5ZLzWJG0F3cT+t9y//DpyzYozURxC0ndlTPl8nL6tau7CxXQ85jofnzU+XZ+w6fA57TURR5oWLeSxXdU+lraawickrplxin4fTWIXN+bJ5hmmCfxFemaORlg== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 4.158.2.129) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=maXQIFrepbcnWNUy7X+0V7vl3j2FxLUceEItRnrI7XM=; b=cLq/cqLDafwzb8RTc0wsF8xhgMfPgWuTSxWlIt4Ul6/44cBWRph7gqrMWCStn2G9P8nbo5hVHNk6hAHbExWT/VnMNSUpCkK87yR1rR7QSm4Pk4EEmLSeVqGcsPmXevsf0FdjeWnDromLxadVh6gmapdkapfU1cKKgBYyo96rolw= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 4.158.2.129) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 4.158.2.129 as permitted sender) receiver=protection.outlook.com; client-ip=4.158.2.129; helo=outbound-uk1.az.dlp.m.darktrace.com; pr=C ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=MjDPlLh+uT7PtY9Ux+sp1GjnpgC1+mUXl2RVQsqVvgCkOxIDqqnE26DJe21O3SalVoVSO9xtNRZLVhaawZkNakjmDzUZuZiQsnSSO2FkaHYnhbwaOPiPpq7Npa1jQt4kToUFn9jkwnL7Y6lUiKTgY56DtXJ+nAD1X8VqbDOhLjW83ju8JykXRv0nYWm4Fr+wPJBGEtCk6E8Ic3Q2vc8FsaVM0cRL18NIodC5ZnLqaJHtzSZsdOme6Dg03azQn7oomXkPVwi8i+h0j1G92qsB3kiQpjky/IFUnWkd0A5LtTvMFfutBLIvwrknwKnRhYppL7jtPGcMwJ+lbbR111P4ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=maXQIFrepbcnWNUy7X+0V7vl3j2FxLUceEItRnrI7XM=; b=lDzNhojcN/7X0pWnlM4VEiQ3I4bMM66eUng6XE1WCQL771G7Cjk7GzwxzqkWgEQ0nJJn7bb51BeuFH0icJU0rfRfkotKWeJb4shligxtEOIQqU8l+iPljsGgQAtRWZwUtr1cRstATGSE8YQL4v/tnzZLROAqXKI6yH06HzHKkUXLQZZUN9XzRV/L5u1DEujZ8U/rdZXPKFQhIEbc/ByhShozWV1i6K5ZmgL2fz6/shOPaVdrMI6YTjZv93XcrB1q4gi8gMDSOPjeyO6Mjij9URLRKtukW+KvsZrJDQP4d/PWJ7hlqaRL6sEUZs1OF5k4M8sl6b6vMnSB+bkHVioosg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=maXQIFrepbcnWNUy7X+0V7vl3j2FxLUceEItRnrI7XM=; b=cLq/cqLDafwzb8RTc0wsF8xhgMfPgWuTSxWlIt4Ul6/44cBWRph7gqrMWCStn2G9P8nbo5hVHNk6hAHbExWT/VnMNSUpCkK87yR1rR7QSm4Pk4EEmLSeVqGcsPmXevsf0FdjeWnDromLxadVh6gmapdkapfU1cKKgBYyo96rolw= From: Luca Fancellu To: "xen-devel@lists.xenproject.org" CC: Stefano Stabellini , Bertrand Marquis , Julien Grall , "Orzel, Michal" , Ayan Kumar Halder Subject: Xen Armv8-R booting protocol Thread-Topic: Xen Armv8-R booting protocol Thread-Index: AQHbrf9e2Q3ZtL+0AUaAx8EjnSV7Wg== Date: Tue, 15 Apr 2025 12:10:24 +0000 Message-ID: Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3826.400.131.1.6) Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; x-ms-traffictypediagnostic: DB7PR08MB2987:EE_|AS2PR08MB10376:EE_|DB3PEPF0000885F:EE_|AS4PR08MB7856:EE_ X-MS-Office365-Filtering-Correlation-Id: 6ac851e0-ec58-4d24-ed94-08dd7c169509 x-checkrecipientrouted: true nodisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230040|376014|1800799024|366016|38070700018; X-Microsoft-Antispam-Message-Info-Original: =?utf-8?q?SsizS7RRVpOJhkR/av1vh0?= =?utf-8?q?m3c0WK5zxTHtLDbCRXWu8UgWtb09KSHOX8K85EFAf1aRT5okUMRPvq+kMfZd57/pW?= =?utf-8?q?Eajbtu3G+nH8ci0Hz+xUCBZVnFU+LFsO7sV+DgIqvPmzONPQBDKls8IZUTkPyIVXC?= =?utf-8?q?s0p4r9iVTlFbLMuKlH9/zY+5HO69Dphzt2lE8oFRViIMf1PzLcOXZPUIPosO3vKP4?= =?utf-8?q?e6r2KP1UJRvPOwZ0FX4NVKGnKluYdbzpCW1de2duV4WcdGGxY4Tk5GQvTa2zem3Ak?= =?utf-8?q?95axnOs7NjluVKF6wWLESRDrEqcL5stgMZgf5Nynk7G3RtgHEGz9D54s1DpGXsbIJ?= =?utf-8?q?UYEHQvDTtl/Jysb9qexetaLz+oseBFC7S5DqYBbaV+EcM9lSJpi3jbctZTex1Nu0v?= =?utf-8?q?kFW9kq0SPuLYoYReLzBJBeG/IsEBeMRagMYDSMaThwD8WG9nZ0aAnrpdZKqzKFVr9?= =?utf-8?q?5El4yoXdIvrHDtwi6xPwoIqQC8+X0d+EbR83Ji5QQXbIzDH1izTZ17XVqoTwBj85b?= =?utf-8?q?z+5/zhgTPjYFEC0p6KpE4BKvhAKE+S7QS/EblNNPdch4qwRPHh0uAoTCRxXojH+Vt?= =?utf-8?q?WwROuvNacuueYY/ovu+EPRP74cqWoA7XfPoSXLdjGf/pOmjYEvno+inwyze5yfsO9?= =?utf-8?q?RGu4yl7ZqZLD56Cgq6RRxlVUzXN5B5BuEuDvTFPNh2KBkFVmCWufKuP75AjA/BeBu?= =?utf-8?q?47LrqxIaFasg8Y+6JnNijWAmhi59RR5C88kORHHgdcAGSFaNcEozryAqluKu+AC/a?= =?utf-8?q?LaQEDKV3q+Cj0yvajqdmJQPjuJINMOmDXLCnjtS7UT4kB/v3WrjFnh3CsATmP5X5A?= =?utf-8?q?sPpgfClsfovGj+mpe6/PgEfJAj9t1z3BJ4uuQYvmQCs182uYDTM45/PJyEfjey4JR?= =?utf-8?q?zkZ+sUXjlt0qN/Duf/KTSk9xYfFgQ4AgQLr5zi3X8+C+QbCruFl9tHfdLR0DNTNPy?= =?utf-8?q?6syYCbQLFt9ao0ynRaCfG17JBP+6uQlHPtUShfcmQGX4DPiPwoCvsLrVp8bQe4GaL?= =?utf-8?q?yZ99L1uCj7qo8JPY5fuhph4/kL9rZGjM6sQjIB0WdWcvGw+Y7GGYOmqg8ny0AyJdZ?= =?utf-8?q?CJjEOXhhAs0bdi3azYrdpbk65aDNWcKC5+2uWCoxMXjnMznr0+td4Lg+v3OEHklqY?= =?utf-8?q?SkQ+ASi30pJVSuH2jhRODR/7LKVx86b90B+l8a0DX2CoVwe2wK9fnGtJT8szhB2T9?= =?utf-8?q?BcvTWYlfjjrvbdA0thC18s71MVsdp0tIxPjpzUTSpVUo6WoUxYTovx+nyDhVFkmNS?= =?utf-8?q?t8tU4RgAmLBr1JgXkA9zwiM0m6DrHyy0nB8EbQlXh2sPtJmBN5pbGGMmO574t/bbU?= =?utf-8?q?YLTcW5pb8uzdFJ0dQmI+svbZZUeQApIAAyE1VdaQMwdUDrY/F12VABmAWyOZr30Mz?= =?utf-8?q?XmLDp+0HSg5jEfDCrNDqXysjA843NvQf0yeAYHPw2GLj6lZtAcSEv71NvRCQRDc?= =?utf-8?q?=3D?= X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR08MB2987.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101; Content-ID: <987667777EDE8B4D9AE31F0DCA4D087A@eurprd08.prod.outlook.com> MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR08MB10376 X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB3PEPF0000885F.eurprd02.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 20a68947-5c3f-4617-f937-08dd7c1680d0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|14060799003|376014|1800799024|82310400026|35042699022; X-Microsoft-Antispam-Message-Info: =?utf-8?q?sQbY5K13g5yXTdocBaudJ0OgDbOCdm8?= =?utf-8?q?fBdX7uNYKUoOe9Cp0RMbMrlVFbKqDfAfra/c48rw/KVPOXpM+sLO9W68YoxVroJL/?= =?utf-8?q?GsQ55WW3XB02jX9iglERjC7snA/6PiGlWIdtKyr3bgi36GV+haO+fxJLBNsTFw/z0?= =?utf-8?q?kasWpXOuiDGAzZYbBlGo78oVCqSmigz+FDDR6tDYUJi8O4Bnf3OU+J1LtLtU0pGze?= =?utf-8?q?OiqJf7IaQP2bEToowXYoFo+p0wLRq5ZCP8JRP0I/rEbTHTc7+Q6BspSv5ugYoCf3H?= =?utf-8?q?RaKcphnOLE7DdDekmoRKj2/QrRXb34dQ/NCngsQ4tR9e6p26D9rr6ud/5kqmEbeK1?= =?utf-8?q?apcn0MC9je0pxrZkhja1705A8Zu8N8/NWK7APvnaFMHgXRUhIZgh/y4CeNpV/K6xo?= =?utf-8?q?4QI3G/pJsF/3rowOTPU7/26Bhs/tcIxxGLHALYYXG/lf1kBIcvBslCrFc659Swbk5?= =?utf-8?q?Cfi/ihRPKmf/UqsxuTldjpwPvldkUiIfhkOPPTBnkXGyB1MTO1bp2/+97nDubxKKi?= =?utf-8?q?7q1LZXwtIgXPs1mLH2fxlxsrdFOvYj6Romz5157DRDwFt3IEsWBkpgqKgzGK32bfE?= =?utf-8?q?o1DMXx+MYTSDEIIFYrX3fDoZRJ8mp/Busxy4xfEC+9QQSHObj4nHh1Rdxlw19Ds1r?= =?utf-8?q?O+owD/6xmxg1gxRB8A6YY4Wg4vlcudtOHVJN2URDq9G4ecd0TPTK86JRl6hrVBEfZ?= =?utf-8?q?dGvK/4b42pYAbhT0068z3iWNdRQHMTy9j6AcqhLtkEFgBD/7OH83mLt87zkMnIZhP?= =?utf-8?q?13mOx+YNV3pu4IvFrF/T10SCbzPDuXtq19Pm0NrGNxHv5tKywdLxQCbbKSj1JAbeX?= =?utf-8?q?YVVznOFzSiQy8DQ3k/+Y4etkajF5ZFcl2mU6L9QFviyNoXNy1W7wKZJqBt88I+zgZ?= =?utf-8?q?O2SlXgGvB2QZVbFWnYYbBj0n0hWcg+FjCexRHe1OKw9vicJrk1XBAQsxO8+6QRC1J?= =?utf-8?q?Tn4Wb6crhX6X8MpdTIHoJtWvAMdRKfl+qGt1QK2etD+I+/OV2ulU6tLSclueo0QbC?= =?utf-8?q?fwD7UQ3mjqxmr3yB4jMff7KGtGZ5Pf8UomMMuEULTLlEYDt/Ad7yVFYmVZ7D9lceg?= =?utf-8?q?7FrHs43Hi6TdPdDRknDwOewxUtP3rPCTCKhWw21/pGWETtNaKnN+E2KLy1DKy3uXi?= =?utf-8?q?Cy/bQsZJGaWOcvHxI6wYHaiPwrKGGtjxoyfUoT27jQEyMgeWMwFlaMPjGhZj8I2GP?= =?utf-8?q?4RyUdNo/4iR/rHlQfHADoMicPdrA0/9q06cJvUx6t3NcsBHBwaMrpXbkiE2jQR2rc?= =?utf-8?q?lhxXAr2T7FK4nLPYoaFvHk7duAAL0C8Zw9W+QlzyQy3vlsJE2MQQxWxMdttEaARWE?= =?utf-8?q?YAH8leGl1wPUPbPmHqd5jNT8rFS+TR49QG/pH0V4X7QNtUhqZD3f7OqdtQCSMqO0c?= =?utf-8?q?5QDZlkzFTHv1NCt6DvPtTLNfRk7FWtEhnTRttdSZhFtZRMPMFnviv4swImW/jDHgX?= =?utf-8?q?pq2puzPQ+/yiUyWjyrATZ630V+0+jHCg=3D=3D?= X-Forefront-Antispam-Report: CIP:4.158.2.129;CTRY:GB;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:outbound-uk1.az.dlp.m.darktrace.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(14060799003)(376014)(1800799024)(82310400026)(35042699022);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Apr 2025 12:10:58.6965 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6ac851e0-ec58-4d24-ed94-08dd7c169509 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[4.158.2.129];Helo=[outbound-uk1.az.dlp.m.darktrace.com] X-MS-Exchange-CrossTenant-AuthSource: DB3PEPF0000885F.eurprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7856 Hi all, I’ve started this thread to talk about a possible Xen booting protocol when running on Armv8-R, currently Xen uses the Linux boot protocol and some other requirements stated in docs/misc/arm/booting.txt. Unfortunately we don’t have anything already available for Armv8-R, the only implementation of a bootloader is the boot-wrapper-aarch64 which keeps the MPU off, I/D cache off. So my proposal is to add additional requirements in our docs/misc/arm/booting.txt for the case where Xen is started on Armv8-R, under "Firmware/bootloader requirements”. Please let me know your thoughts. Cheers, Luca diff --git a/docs/misc/arm/booting.txt b/docs/misc/arm/booting.txt index 21ae74837dcc..39f029153e38 100644 --- a/docs/misc/arm/booting.txt +++ b/docs/misc/arm/booting.txt @@ -62,6 +62,14 @@ Xen relies on some settings the firmware has to configure in EL3 before starting * The bit SCR_EL3.HCE (resp. SCR.HCE for 32-bit ARM) must be set to 1. +When Xen runs on Armv8-R, the highest exception level is EL2 and the only +available mode is secure, hence the above requirements needs to be adjusted to +this case: + +* Xen must be entered in S EL2 mode. + +* Xen must be entered with MPU off and data cache disabled (SCTLR_EL2.M bit and + SCTLR_EL2.C set to 0). [1] linux/Documentation/arm/booting.rst Latest version: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/Documentation/arch/arm/booting.rst