soc/intel/pantherlake: Remove soc_info.[hc] interface
[coreboot2.git] / src / arch / arm64 / transition.c
blob8b84ce24150b37d88c791773ecbfa0ed2046d05a
1 /* SPDX-License-Identifier: GPL-2.0-only */
3 #include <arch/cache.h>
4 #include <arch/lib_helpers.h>
5 #include <arch/mmu.h>
6 #include <arch/transition.h>
7 #include <assert.h>
9 void __weak exc_dispatch(struct exc_state *exc_state, uint64_t id)
11 /* Default weak implementation does nothing. */
14 void exc_entry(struct exc_state *exc_state, uint64_t id)
16 struct elx_state *elx = &exc_state->elx;
17 struct regs *regs = &exc_state->regs;
18 uint8_t elx_mode;
20 elx->spsr = raw_read_spsr();
21 elx->elr = raw_read_elr();
23 elx_mode = get_mode_from_spsr(elx->spsr);
25 if (elx_mode == SPSR_USE_H)
26 regs->sp = (uint64_t)&exc_state[1];
27 else
28 regs->sp = raw_read_sp_el0();
30 exc_dispatch(exc_state, id);
33 void transition_to_el2(void *entry, void *arg, uint64_t spsr)
35 struct exc_state exc_state;
36 struct elx_state *elx = &exc_state.elx;
37 struct regs *regs = &exc_state.regs;
39 regs->x[X0_INDEX] = (uint64_t)arg;
40 elx->elr = (uint64_t)entry;
41 elx->spsr = spsr;
44 * Policies enforced:
45 * 1. We support only transitions to EL2
46 * 2. We support transitions to Aarch64 mode only
48 * If any of the above conditions holds false, then we need a proper way
49 * to update SCR/HCR before removing the checks below
51 assert(get_el_from_spsr(spsr) == EL2 && !(spsr & SPSR_ERET_32));
53 /* Initialize SCR with defaults for running without secure monitor
54 (disable all traps, enable all instructions, run NS at AArch64). */
55 raw_write_scr_el3(SCR_FIEN | SCR_API | SCR_APK | SCR_ST | SCR_RW |
56 SCR_HCE | SCR_SMD | SCR_RES1 | SCR_NS);
58 /* Initialize CPTR to not trap anything to EL3. */
59 raw_write_cptr_el3(CPTR_EL3_TCPAC_DISABLE | CPTR_EL3_TTA_DISABLE |
60 CPTR_EL3_TFP_DISABLE);
62 /* ELR/SPSR: Write entry point and processor state of program */
63 raw_write_elr_el3(elx->elr);
64 raw_write_spsr_el3(elx->spsr);
66 /* SCTLR: Initialize EL with everything disabled */
67 raw_write_sctlr_el2(SCTLR_RES1);
69 /* SP_ELx: Initialize stack pointer */
70 raw_write_sp_el2(elx->sp_elx);
72 /* Payloads expect to be entered with MMU disabled. Includes an ISB. */
73 mmu_disable();
75 /* Eret to the entry point */
76 trans_switch(regs);