hw/arm/boot: set CPTR_EL3.ESM and SCR_EL3.EnTP2 when booting Linux with EL3
According to the Linux kernel booting.rst [1], CPTR_EL3.ESM and SCR_EL3.EnTP2 must be initialized to 1 when EL3 is present and FEAT_SME is advertised. This has to be taken care of when QEMU boots directly into the kernel (i.e., "-M virt,secure=on -cpu max -kernel Image"). Cc: qemu-stable@nongnu.org Fixes: 78cb9776662a ("target/arm: Enable SME for -cpu max") Link: [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/arm64/booting.rst?h=v6.0#n321 Signed-off-by: Jerome Forissier <jerome.forissier@linaro.org> Message-id: 20221003145641.1921467-1-jerome.forissier@linaro.org Reviewed-by: Peter Maydell <peter.maydell@linaro.org> Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
		
							parent
							
								
									7fa7ea8f48
								
							
						
					
					
						commit
						0ff993193f
					
				@ -763,6 +763,10 @@ static void do_cpu_reset(void *opaque)
 | 
				
			|||||||
                    if (cpu_isar_feature(aa64_sve, cpu)) {
 | 
					                    if (cpu_isar_feature(aa64_sve, cpu)) {
 | 
				
			||||||
                        env->cp15.cptr_el[3] |= R_CPTR_EL3_EZ_MASK;
 | 
					                        env->cp15.cptr_el[3] |= R_CPTR_EL3_EZ_MASK;
 | 
				
			||||||
                    }
 | 
					                    }
 | 
				
			||||||
 | 
					                    if (cpu_isar_feature(aa64_sme, cpu)) {
 | 
				
			||||||
 | 
					                        env->cp15.cptr_el[3] |= R_CPTR_EL3_ESM_MASK;
 | 
				
			||||||
 | 
					                        env->cp15.scr_el3 |= SCR_ENTP2;
 | 
				
			||||||
 | 
					                    }
 | 
				
			||||||
                    /* AArch64 kernels never boot in secure mode */
 | 
					                    /* AArch64 kernels never boot in secure mode */
 | 
				
			||||||
                    assert(!info->secure_boot);
 | 
					                    assert(!info->secure_boot);
 | 
				
			||||||
                    /* This hook is only supported for AArch32 currently:
 | 
					                    /* This hook is only supported for AArch32 currently:
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user