blob: 9c1f4a8ca8b15ecc76d573d94cd39697a8c3475a [file] [log] [blame]
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +01001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * Switch to non-secure mode
4 *
5 * Copyright (c) 2018 Heinrich Schuchardt
6 *
7 * This module contains the ARMv8 specific code required to adjust the exception
8 * level before booting an operating system.
9 */
10
11#include <common.h>
12#include <bootm.h>
Simon Glass1d91ba72019-11-14 12:57:37 -070013#include <cpu_func.h>
Heinrich Schuchardtaa0b11b2019-01-08 18:13:06 +010014#include <asm/setjmp.h>
15
16/**
17 * entry_non_secure() - entry point when switching to non-secure mode
18 *
19 * When switching to non-secure mode switch_to_non_secure_mode() calls this
20 * function passing a jump buffer. We use this jump buffer to restore the
21 * original stack and register state.
22 *
23 * @non_secure_jmp: jump buffer for restoring stack and registers
24 */
25static void entry_non_secure(struct jmp_buf_data *non_secure_jmp)
26{
27 dcache_enable();
28 debug("Reached non-secure mode\n");
29
30 /* Restore stack and registers saved in switch_to_non_secure_mode() */
31 longjmp(non_secure_jmp, 1);
32}
33
34/**
35 * switch_to_non_secure_mode() - switch to non-secure mode
36 *
37 * Exception level EL3 is meant to be used by the secure monitor only (ARM
38 * trusted firmware being one embodiment). The operating system shall be
39 * started at exception level EL2. So here we check the exception level
40 * and switch it if necessary.
41 */
42void switch_to_non_secure_mode(void)
43{
44 struct jmp_buf_data non_secure_jmp;
45
46 /* On AArch64 we need to make sure we call our payload in < EL3 */
47 if (current_el() == 3) {
48 if (setjmp(&non_secure_jmp))
49 return;
50 dcache_disable(); /* flush cache before switch to EL2 */
51
52 /* Move into EL2 and keep running there */
53 armv8_switch_to_el2((uintptr_t)&non_secure_jmp, 0, 0, 0,
54 (uintptr_t)entry_non_secure, ES_TO_AARCH64);
55 }
56}