/* * This file is part of the coreboot project. * * Copyright 2014 Google Inc. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; version 2 of the License. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. */ #include #include #include #include #include #include /* Litte-endian, No XN-forced, Instr cache disabled, * Stack alignment disabled, Data and unified cache * disabled, Alignment check disabled, MMU disabled */ #define SCTLR_MASK (SCTLR_MMU_DISABLE | SCTLR_ACE_DISABLE | \ SCTLR_CACHE_DISABLE | SCTLR_SAE_DISABLE | SCTLR_RES1 | \ SCTLR_ICE_DISABLE | SCTLR_WXN_DISABLE | SCTLR_LITTLE_END) void __weak exc_dispatch(struct exc_state *exc_state, uint64_t id) { /* Default weak implementation does nothing. */ } void exc_entry(struct exc_state *exc_state, uint64_t id) { struct elx_state *elx = &exc_state->elx; struct regs *regs = &exc_state->regs; uint8_t elx_mode, elx_el; elx->spsr = raw_read_spsr_current(); elx_mode = get_mode_from_spsr(elx->spsr); elx_el = get_el_from_spsr(elx->spsr); if (elx_mode == SPSR_USE_H) { if (elx_el == get_current_el()) regs->sp = (uint64_t)&exc_state[1]; else regs->sp = raw_read_sp_elx(elx_el); } else { regs->sp = raw_read_sp_el0(); } elx->elr = raw_read_elr_current(); exc_dispatch(exc_state, id); } void transition_with_entry(void *entry, void *arg, struct exc_state *exc_state) { /* Argument to entry point goes into X0 */ exc_state->regs.x[X0_INDEX] = (uint64_t)arg; /* Entry point goes into ELR */ exc_state->elx.elr = (uint64_t)entry; transition(exc_state); } void transition(struct exc_state *exc_state) { uint64_t sctlr; uint32_t current_el = get_current_el(); struct elx_state *elx = &exc_state->elx; struct regs *regs = &exc_state->regs; uint8_t elx_el = get_el_from_spsr(elx->spsr); /* * Policies enforced: * 1. We support only elx --> (elx - 1) transitions * 2. We support transitions to Aarch64 mode only * * If any of the above conditions holds false, then we need a proper way * to update SCR/HCR before removing the checks below */ if ((current_el - elx_el) != 1) die("ARM64 Error: Do not support transition\n"); if (elx->spsr & SPSR_ERET_32) die("ARM64 Error: Do not support eret to Aarch32\n"); /* Most parts of coreboot currently don't support EL2 anyway. */ assert(current_el == EL3); /* Initialize SCR with defaults for running without secure monitor. */ raw_write_scr_el3(SCR_TWE_DISABLE | /* don't trap WFE */ SCR_TWI_DISABLE | /* don't trap WFI */ SCR_ST_ENABLE | /* allow secure timer access */ SCR_LOWER_AARCH64 | /* lower level is AArch64 */ SCR_SIF_DISABLE | /* disable secure ins. fetch */ SCR_HVC_ENABLE | /* allow HVC instruction */ SCR_SMD_ENABLE | /* disable SMC instruction */ SCR_RES1 | /* reserved-1 bits */ SCR_EA_DISABLE | /* disable ext. abort trap */ SCR_FIQ_DISABLE | /* disable FIQ trap to EL3 */ SCR_IRQ_DISABLE | /* disable IRQ trap to EL3 */ SCR_NS_ENABLE); /* lower level is non-secure */ /* Initialize CPTR to not trap anything to EL3. */ raw_write_cptr_el3(CPTR_EL3_TCPAC_DISABLE | CPTR_EL3_TTA_DISABLE | CPTR_EL3_TFP_DISABLE); /* ELR/SPSR: Write entry point and processor state of program */ raw_write_elr_current(elx->elr); raw_write_spsr_current(elx->spsr); /* SCTLR: Initialize EL with selected properties */ sctlr = raw_read_sctlr(elx_el); sctlr &= SCTLR_MASK; raw_write_sctlr(sctlr, elx_el); /* SP_ELx: Initialize stack pointer */ raw_write_sp_elx(elx->sp_elx, elx_el); isb(); /* Eret to the entry point */ trans_switch(regs); }