Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 1 | /* |
Zelalem Aweke | f92c0cb | 2022-01-31 16:59:42 -0600 | [diff] [blame] | 2 | * Copyright (c) 2013-2022, ARM Limited and Contributors. All rights reserved. |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 5 | */ |
| 6 | |
Antonio Nino Diaz | 864ca6f | 2018-10-31 15:25:35 +0000 | [diff] [blame] | 7 | #ifndef CONTEXT_MGMT_H |
| 8 | #define CONTEXT_MGMT_H |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 9 | |
Jeenu Viswambharan | bc1a929 | 2017-02-16 14:55:15 +0000 | [diff] [blame] | 10 | #include <assert.h> |
Antonio Nino Diaz | 28dce9e | 2018-05-22 10:09:10 +0100 | [diff] [blame] | 11 | #include <context.h> |
Jeenu Viswambharan | bc1a929 | 2017-02-16 14:55:15 +0000 | [diff] [blame] | 12 | #include <stdint.h> |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 13 | |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 14 | #include <arch.h> |
| 15 | |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 16 | /******************************************************************************* |
Andrew Thoelke | 4e12607 | 2014-06-04 21:10:52 +0100 | [diff] [blame] | 17 | * Forward declarations |
| 18 | ******************************************************************************/ |
| 19 | struct entry_point_info; |
| 20 | |
| 21 | /******************************************************************************* |
Achin Gupta | 7aea908 | 2014-02-01 07:51:28 +0000 | [diff] [blame] | 22 | * Function & variable prototypes |
| 23 | ******************************************************************************/ |
Dan Handley | a17fefa | 2014-05-14 12:38:32 +0100 | [diff] [blame] | 24 | void cm_init(void); |
Soby Mathew | b0082d2 | 2015-04-09 13:40:55 +0100 | [diff] [blame] | 25 | void *cm_get_context_by_index(unsigned int cpu_idx, |
| 26 | unsigned int security_state); |
| 27 | void cm_set_context_by_index(unsigned int cpu_idx, |
| 28 | void *context, |
| 29 | unsigned int security_state); |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 30 | void *cm_get_context(uint32_t security_state); |
| 31 | void cm_set_context(void *context, uint32_t security_state); |
Soby Mathew | b0082d2 | 2015-04-09 13:40:55 +0100 | [diff] [blame] | 32 | void cm_init_my_context(const struct entry_point_info *ep); |
| 33 | void cm_init_context_by_index(unsigned int cpu_idx, |
| 34 | const struct entry_point_info *ep); |
Varun Wadekar | d102752 | 2020-04-01 09:55:49 -0700 | [diff] [blame] | 35 | void cm_setup_context(cpu_context_t *ctx, const struct entry_point_info *ep); |
Andrew Thoelke | 4e12607 | 2014-06-04 21:10:52 +0100 | [diff] [blame] | 36 | void cm_prepare_el3_exit(uint32_t security_state); |
Zelalem Aweke | f92c0cb | 2022-01-31 16:59:42 -0600 | [diff] [blame] | 37 | void cm_prepare_el3_exit_ns(void); |
Soby Mathew | 748be1d | 2016-05-05 14:10:46 +0100 | [diff] [blame] | 38 | |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 39 | #ifdef __aarch64__ |
Boyan Karatotev | 36cebf9 | 2023-03-08 11:56:49 +0000 | [diff] [blame] | 40 | #if IMAGE_BL31 |
| 41 | void cm_manage_extensions_el3(void); |
| 42 | #endif |
Max Shvetsov | bdf502d | 2020-02-25 13:56:19 +0000 | [diff] [blame] | 43 | #if CTX_INCLUDE_EL2_REGS |
| 44 | void cm_el2_sysregs_context_save(uint32_t security_state); |
| 45 | void cm_el2_sysregs_context_restore(uint32_t security_state); |
| 46 | #endif |
| 47 | |
Dan Handley | a17fefa | 2014-05-14 12:38:32 +0100 | [diff] [blame] | 48 | void cm_el1_sysregs_context_save(uint32_t security_state); |
| 49 | void cm_el1_sysregs_context_restore(uint32_t security_state); |
Soby Mathew | a0fedc4 | 2016-06-16 14:52:04 +0100 | [diff] [blame] | 50 | void cm_set_elr_el3(uint32_t security_state, uintptr_t entrypoint); |
Andrew Thoelke | 4e12607 | 2014-06-04 21:10:52 +0100 | [diff] [blame] | 51 | void cm_set_elr_spsr_el3(uint32_t security_state, |
Soby Mathew | a0fedc4 | 2016-06-16 14:52:04 +0100 | [diff] [blame] | 52 | uintptr_t entrypoint, uint32_t spsr); |
Dan Handley | a17fefa | 2014-05-14 12:38:32 +0100 | [diff] [blame] | 53 | void cm_write_scr_el3_bit(uint32_t security_state, |
| 54 | uint32_t bit_pos, |
| 55 | uint32_t value); |
| 56 | void cm_set_next_eret_context(uint32_t security_state); |
Louis Mayencourt | 1c819c3 | 2020-01-24 13:30:28 +0000 | [diff] [blame] | 57 | u_register_t cm_get_scr_el3(uint32_t security_state); |
Andrew Thoelke | 8c28fe0 | 2014-06-02 11:40:35 +0100 | [diff] [blame] | 58 | |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 59 | /* Inline definitions */ |
| 60 | |
| 61 | /******************************************************************************* |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 62 | * This function is used to program the context that's used for exception |
| 63 | * return. This initializes the SP_EL3 to a pointer to a 'cpu_context' set for |
| 64 | * the required security state |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 65 | ******************************************************************************/ |
Sandrine Bailleux | 37a12df | 2016-04-11 13:17:50 +0100 | [diff] [blame] | 66 | static inline void cm_set_next_context(void *context) |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 67 | { |
Antonio Nino Diaz | 3759e3f | 2017-03-22 15:48:51 +0000 | [diff] [blame] | 68 | #if ENABLE_ASSERTIONS |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 69 | uint64_t sp_mode; |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 70 | |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 71 | /* |
| 72 | * Check that this function is called with SP_EL0 as the stack |
| 73 | * pointer |
| 74 | */ |
| 75 | __asm__ volatile("mrs %0, SPSel\n" |
| 76 | : "=r" (sp_mode)); |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 77 | |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 78 | assert(sp_mode == MODE_SP_EL0); |
Antonio Nino Diaz | 3759e3f | 2017-03-22 15:48:51 +0000 | [diff] [blame] | 79 | #endif /* ENABLE_ASSERTIONS */ |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 80 | |
Yatharth Kochar | 6c0566c | 2015-10-02 17:56:48 +0100 | [diff] [blame] | 81 | __asm__ volatile("msr spsel, #1\n" |
| 82 | "mov sp, %0\n" |
| 83 | "msr spsel, #0\n" |
| 84 | : : "r" (context)); |
Andrew Thoelke | c02dbd6 | 2014-06-02 10:00:25 +0100 | [diff] [blame] | 85 | } |
Yatharth Kochar | 5d36121 | 2016-06-28 17:07:09 +0100 | [diff] [blame] | 86 | |
| 87 | #else |
| 88 | void *cm_get_next_context(void); |
Etienne Carriere | 662bf93 | 2017-06-23 09:37:49 +0200 | [diff] [blame] | 89 | void cm_set_next_context(void *context); |
Boyan Karatotev | 36cebf9 | 2023-03-08 11:56:49 +0000 | [diff] [blame] | 90 | static inline void cm_manage_extensions_el3(void) {} |
Julius Werner | 8e0ef0f | 2019-07-09 14:02:43 -0700 | [diff] [blame] | 91 | #endif /* __aarch64__ */ |
Yatharth Kochar | 5d36121 | 2016-06-28 17:07:09 +0100 | [diff] [blame] | 92 | |
Antonio Nino Diaz | 864ca6f | 2018-10-31 15:25:35 +0000 | [diff] [blame] | 93 | #endif /* CONTEXT_MGMT_H */ |