Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 1 | /* |
Elizabeth Ho | 4fc00d2 | 2023-07-18 14:10:25 +0100 | [diff] [blame] | 2 | * Copyright (c) 2013-2023, Arm Limited and Contributors. All rights reserved. |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
Antonio Nino Diaz | 864ca6f | 2018-10-31 15:25:35 +0000 | [diff] [blame] | 7 | #ifndef CONTEXT_MGMT_H |
| 8 | #define CONTEXT_MGMT_H |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 9 | |
Jeenu Viswambharan | bc1a929 | 2017-02-16 14:55:15 +0000 | [diff] [blame] | 10 | #include <assert.h> |
Antonio Nino Diaz | 28dce9e | 2018-05-22 10:09:10 +0100 | [diff] [blame] | 11 | #include <context.h> |
Jeenu Viswambharan | bc1a929 | 2017-02-16 14:55:15 +0000 | [diff] [blame] | 12 | #include <stdint.h> |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 13 | |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 14 | #include <arch.h> |
| 15 | |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 16 | /******************************************************************************* |
Andrew Thoelke | 4e12607 | 2014-06-04 21:10:52 +0100 | [diff] [blame] | 17 | * Forward declarations |
| 18 | ******************************************************************************/ |
| 19 | struct entry_point_info; |
| 20 | |
| 21 | /******************************************************************************* |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 22 | * Function & variable prototypes |
| 23 | ******************************************************************************/ |
Dan Handley | a17fefa | 2014-05-14 12:38:32 +0100 | [diff] [blame] | 24 | void cm_init(void); |
Soby Mathew | b0082d2 | 2015-04-09 13:40:55 +0100 | [diff] [blame] | 25 | void *cm_get_context_by_index(unsigned int cpu_idx, |
| 26 | unsigned int security_state); |
| 27 | void cm_set_context_by_index(unsigned int cpu_idx, |
| 28 | void *context, |
| 29 | unsigned int security_state); |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 30 | void *cm_get_context(uint32_t security_state); |
| 31 | void cm_set_context(void *context, uint32_t security_state); |
Soby Mathew | b0082d2 | 2015-04-09 13:40:55 +0100 | [diff] [blame] | 32 | void cm_init_my_context(const struct entry_point_info *ep); |
| 33 | void cm_init_context_by_index(unsigned int cpu_idx, |
| 34 | const struct entry_point_info *ep); |
Varun Wadekar | d102752 | 2020-04-01 09:55:49 -0700 | [diff] [blame] | 35 | void cm_setup_context(cpu_context_t *ctx, const struct entry_point_info *ep); |
Andrew Thoelke | 4e12607 | 2014-06-04 21:10:52 +0100 | [diff] [blame] | 36 | void cm_prepare_el3_exit(uint32_t security_state); |
Zelalem Aweke | f92c0cb | 2022-01-31 16:59:42 -0600 | [diff] [blame] | 37 | void cm_prepare_el3_exit_ns(void); |
Soby Mathew | 748be1d | 2016-05-05 14:10:46 +0100 | [diff] [blame] | 38 | |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 39 | #ifdef __aarch64__ |
Boyan Karatotev | 36cebf9 | 2023-03-08 11:56:49 +0000 | [diff] [blame] | 40 | #if IMAGE_BL31 |
| 41 | void cm_manage_extensions_el3(void); |
Elizabeth Ho | 4fc00d2 | 2023-07-18 14:10:25 +0100 | [diff] [blame] | 42 | void manage_extensions_nonsecure_per_world(void); |
Jayanth Dodderi Chidanand | 56aa382 | 2023-12-11 11:22:02 +0000 | [diff] [blame] | 43 | void cm_el3_arch_init_per_world(per_world_context_t *per_world_ctx); |
Boyan Karatotev | 36cebf9 | 2023-03-08 11:56:49 +0000 | [diff] [blame] | 44 | #endif |
Jayanth Dodderi Chidanand | 56aa382 | 2023-12-11 11:22:02 +0000 | [diff] [blame] | 45 | |
Max Shvetsov | bdf502d | 2020-02-25 13:56:19 +0000 | [diff] [blame] | 46 | #if CTX_INCLUDE_EL2_REGS |
| 47 | void cm_el2_sysregs_context_save(uint32_t security_state); |
| 48 | void cm_el2_sysregs_context_restore(uint32_t security_state); |
| 49 | #endif |
| 50 | |
Dan Handley | a17fefa | 2014-05-14 12:38:32 +0100 | [diff] [blame] | 51 | void cm_el1_sysregs_context_save(uint32_t security_state); |
| 52 | void cm_el1_sysregs_context_restore(uint32_t security_state); |
Soby Mathew | a0fedc4 | 2016-06-16 14:52:04 +0100 | [diff] [blame] | 53 | void cm_set_elr_el3(uint32_t security_state, uintptr_t entrypoint); |
Andrew Thoelke | 4e12607 | 2014-06-04 21:10:52 +0100 | [diff] [blame] | 54 | void cm_set_elr_spsr_el3(uint32_t security_state, |
Soby Mathew | a0fedc4 | 2016-06-16 14:52:04 +0100 | [diff] [blame] | 55 | uintptr_t entrypoint, uint32_t spsr); |
Dan Handley | a17fefa | 2014-05-14 12:38:32 +0100 | [diff] [blame] | 56 | void cm_write_scr_el3_bit(uint32_t security_state, |
| 57 | uint32_t bit_pos, |
| 58 | uint32_t value); |
| 59 | void cm_set_next_eret_context(uint32_t security_state); |
Louis Mayencourt | 1c819c3 | 2020-01-24 13:30:28 +0000 | [diff] [blame] | 60 | u_register_t cm_get_scr_el3(uint32_t security_state); |
Andrew Thoelke | 8c28fe0 | 2014-06-02 11:40:35 +0100 | [diff] [blame] | 61 | |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 62 | /* Inline definitions */ |
| 63 | |
| 64 | /******************************************************************************* |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 65 | * This function is used to program the context that's used for exception |
| 66 | * return. This initializes the SP_EL3 to a pointer to a 'cpu_context' set for |
| 67 | * the required security state |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 68 | ******************************************************************************/ |
Sandrine Bailleux | 37a12df | 2016-04-11 13:17:50 +0100 | [diff] [blame] | 69 | static inline void cm_set_next_context(void *context) |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 70 | { |
Antonio Nino Diaz | 3759e3f | 2017-03-22 15:48:51 +0000 | [diff] [blame] | 71 | #if ENABLE_ASSERTIONS |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 72 | uint64_t sp_mode; |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 73 | |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 74 | /* |
| 75 | * Check that this function is called with SP_EL0 as the stack |
| 76 | * pointer |
| 77 | */ |
| 78 | __asm__ volatile("mrs %0, SPSel\n" |
| 79 | : "=r" (sp_mode)); |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 80 | |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 81 | assert(sp_mode == MODE_SP_EL0); |
Antonio Nino Diaz | 3759e3f | 2017-03-22 15:48:51 +0000 | [diff] [blame] | 82 | #endif /* ENABLE_ASSERTIONS */ |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 83 | |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 84 | __asm__ volatile("msr spsel, #1\n" |
| 85 | "mov sp, %0\n" |
| 86 | "msr spsel, #0\n" |
| 87 | : : "r" (context)); |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 88 | } |
Yatharth Kochar | 5d36121 | 2016-06-28 17:07:09 +0100 | [diff] [blame] | 89 | |
| 90 | #else |
| 91 | void *cm_get_next_context(void); |
Etienne Carriere | 662bf93 | 2017-06-23 09:37:49 +0200 | [diff] [blame] | 92 | void cm_set_next_context(void *context); |
Boyan Karatotev | 36cebf9 | 2023-03-08 11:56:49 +0000 | [diff] [blame] | 93 | static inline void cm_manage_extensions_el3(void) {} |
Elizabeth Ho | 4fc00d2 | 2023-07-18 14:10:25 +0100 | [diff] [blame] | 94 | static inline void manage_extensions_nonsecure_per_world(void) {} |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 95 | #endif /* __aarch64__ */ |
Yatharth Kochar | 5d36121 | 2016-06-28 17:07:09 +0100 | [diff] [blame] | 96 | |
Antonio Nino Diaz | 864ca6f | 2018-10-31 15:25:35 +0000 | [diff] [blame] | 97 | #endif /* CONTEXT_MGMT_H */ |