summaryrefslogtreecommitdiff
path: root/src/arch/arm64/transition.c
diff options
context:
space:
mode:
authorJulius Werner <jwerner@chromium.org>2018-08-03 17:14:45 -0700
committerJulius Werner <jwerner@chromium.org>2018-08-10 04:16:25 +0000
commit0c5f61a01c3ebaa1c19f9a20d20d4b1353648d7c (patch)
treeb200a6be0cbc43adfd25d6778afce750ae81739c /src/arch/arm64/transition.c
parent73be9dd82c033a9bce3fc7ff11dab453e9cfde82 (diff)
arm64: Drop checks for current exception level, hardcode EL3 assumption
When we first created the arm64 port, we weren't quite sure whether coreboot would always run in EL3 on all platforms. The AArch64 A.R.M. technically considers this exception level optional, but in practice all SoCs seem to support it. We have since accumulated a lot of code that already hardcodes an implicit or explicit assumption of executing in EL3 somewhere, so coreboot wouldn't work on a system that tries to enter it in EL1/2 right now anyway. However, some of our low level support libraries (in particular those for accessing architectural registers) still have provisions for running at different exception levels built-in, and often use switch statements over the current exception level to decide which register to access. This includes an unnecessarily large amount of code for what should be single-instruction operations and precludes further optimization via inlining. This patch removes any remaining code that dynamically depends on the current exception level and makes the assumption that coreboot executes at EL3 official. If this ever needs to change for a future platform, it would probably be cleaner to set the expected exception level in a Kconfig rather than always probing it at runtime. Change-Id: I1a9fb9b4227bd15a013080d1c7eabd48515fdb67 Signed-off-by: Julius Werner <jwerner@chromium.org> Reviewed-on: https://review.coreboot.org/27880 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Patrick Rudolph <patrick.rudolph@9elements.com> Reviewed-by: Aaron Durbin <adurbin@chromium.org>
Diffstat (limited to 'src/arch/arm64/transition.c')
-rw-r--r--src/arch/arm64/transition.c65
1 files changed, 22 insertions, 43 deletions
diff --git a/src/arch/arm64/transition.c b/src/arch/arm64/transition.c
index c549c5f26e..ee5e57036a 100644
--- a/src/arch/arm64/transition.c
+++ b/src/arch/arm64/transition.c
@@ -38,62 +38,41 @@ void exc_entry(struct exc_state *exc_state, uint64_t id)
{
struct elx_state *elx = &exc_state->elx;
struct regs *regs = &exc_state->regs;
- uint8_t elx_mode, elx_el;
+ uint8_t elx_mode;
- elx->spsr = raw_read_spsr_current();
+ elx->spsr = raw_read_spsr_el3();
elx_mode = get_mode_from_spsr(elx->spsr);
- elx_el = get_el_from_spsr(elx->spsr);
-
- if (elx_mode == SPSR_USE_H) {
- if (elx_el == get_current_el())
- regs->sp = (uint64_t)&exc_state[1];
- else
- regs->sp = raw_read_sp_elx(elx_el);
- } else {
+
+ if (elx_mode == SPSR_USE_H)
+ regs->sp = (uint64_t)&exc_state[1];
+ else
regs->sp = raw_read_sp_el0();
- }
- elx->elr = raw_read_elr_current();
+ elx->elr = raw_read_elr_el3();
exc_dispatch(exc_state, id);
}
-void transition_with_entry(void *entry, void *arg, struct exc_state *exc_state)
-{
- /* Argument to entry point goes into X0 */
- exc_state->regs.x[X0_INDEX] = (uint64_t)arg;
- /* Entry point goes into ELR */
- exc_state->elx.elr = (uint64_t)entry;
-
- transition(exc_state);
-}
-
-void transition(struct exc_state *exc_state)
+void transition_to_el2(void *entry, void *arg, uint64_t spsr)
{
- uint64_t sctlr;
- uint32_t current_el = get_current_el();
+ struct exc_state exc_state;
+ struct elx_state *elx = &exc_state.elx;
+ struct regs *regs = &exc_state.regs;
+ uint32_t sctlr;
- struct elx_state *elx = &exc_state->elx;
- struct regs *regs = &exc_state->regs;
-
- uint8_t elx_el = get_el_from_spsr(elx->spsr);
+ regs->x[X0_INDEX] = (uint64_t)arg;
+ elx->elr = (uint64_t)entry;
+ elx->spsr = spsr;
/*
* Policies enforced:
- * 1. We support only elx --> (elx - 1) transitions
+ * 1. We support only transitions to EL2
* 2. We support transitions to Aarch64 mode only
*
* If any of the above conditions holds false, then we need a proper way
* to update SCR/HCR before removing the checks below
*/
- if ((current_el - elx_el) != 1)
- die("ARM64 Error: Do not support transition\n");
-
- if (elx->spsr & SPSR_ERET_32)
- die("ARM64 Error: Do not support eret to Aarch32\n");
-
- /* Most parts of coreboot currently don't support EL2 anyway. */
- assert(current_el == EL3);
+ assert(get_el_from_spsr(spsr) == EL2 && !(spsr & SPSR_ERET_32));
/* Initialize SCR with defaults for running without secure monitor. */
raw_write_scr_el3(SCR_TWE_DISABLE | /* don't trap WFE */
@@ -114,16 +93,16 @@ void transition(struct exc_state *exc_state)
CPTR_EL3_TFP_DISABLE);
/* ELR/SPSR: Write entry point and processor state of program */
- raw_write_elr_current(elx->elr);
- raw_write_spsr_current(elx->spsr);
+ raw_write_elr_el3(elx->elr);
+ raw_write_spsr_el3(elx->spsr);
/* SCTLR: Initialize EL with selected properties */
- sctlr = raw_read_sctlr(elx_el);
+ sctlr = raw_read_sctlr_el2();
sctlr &= SCTLR_MASK;
- raw_write_sctlr(sctlr, elx_el);
+ raw_write_sctlr_el2(sctlr);
/* SP_ELx: Initialize stack pointer */
- raw_write_sp_elx(elx->sp_elx, elx_el);
+ raw_write_sp_el2(elx->sp_elx);
/* Payloads expect to be entered with MMU disabled. Includes an ISB. */
mmu_disable();