xref: /rk3399_ARM-atf/lib/el3_runtime/aarch64/context.S (revision 59b7c0a03fa8adfc9272f959bd8b4228ddd2607a)
1532ed618SSoby Mathew/*
230788a84SGovindraj Raja * Copyright (c) 2013-2024, Arm Limited and Contributors. All rights reserved.
3532ed618SSoby Mathew *
482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause
5532ed618SSoby Mathew */
6532ed618SSoby Mathew
7532ed618SSoby Mathew#include <arch.h>
8532ed618SSoby Mathew#include <asm_macros.S>
9bb9549baSJan Dabros#include <assert_macros.S>
10532ed618SSoby Mathew#include <context.h>
113b8456bdSManish V Badarkhe#include <el3_common_macros.S>
12532ed618SSoby Mathew
13532ed618SSoby Mathew#if CTX_INCLUDE_FPREGS
14532ed618SSoby Mathew	.global	fpregs_context_save
15532ed618SSoby Mathew	.global	fpregs_context_restore
160ce220afSJayanth Dodderi Chidanand#endif /* CTX_INCLUDE_FPREGS */
17*59b7c0a0SJayanth Dodderi Chidanand
18*59b7c0a0SJayanth Dodderi Chidanand#if ERRATA_SPECULATIVE_AT
19*59b7c0a0SJayanth Dodderi Chidanand	.global save_and_update_ptw_el1_sys_regs
20*59b7c0a0SJayanth Dodderi Chidanand#endif /* ERRATA_SPECULATIVE_AT */
21*59b7c0a0SJayanth Dodderi Chidanand
2297215e0fSDaniel Boulby	.global	prepare_el3_entry
23ed108b56SAlexei Fedorov	.global	restore_gp_pmcr_pauth_regs
24532ed618SSoby Mathew	.global	el3_exit
25532ed618SSoby Mathew
26ed108b56SAlexei Fedorov/* ------------------------------------------------------------------
27ed108b56SAlexei Fedorov * The following function follows the aapcs_64 strictly to use
28ed108b56SAlexei Fedorov * x9-x17 (temporary caller-saved registers according to AArch64 PCS)
29ed108b56SAlexei Fedorov * to save floating point register context. It assumes that 'x0' is
30ed108b56SAlexei Fedorov * pointing to a 'fp_regs' structure where the register context will
31532ed618SSoby Mathew * be saved.
32532ed618SSoby Mathew *
33ed108b56SAlexei Fedorov * Access to VFP registers will trap if CPTR_EL3.TFP is set.
34ed108b56SAlexei Fedorov * However currently we don't use VFP registers nor set traps in
35ed108b56SAlexei Fedorov * Trusted Firmware, and assume it's cleared.
36532ed618SSoby Mathew *
37532ed618SSoby Mathew * TODO: Revisit when VFP is used in secure world
38ed108b56SAlexei Fedorov * ------------------------------------------------------------------
39532ed618SSoby Mathew */
40532ed618SSoby Mathew#if CTX_INCLUDE_FPREGS
41532ed618SSoby Mathewfunc fpregs_context_save
42532ed618SSoby Mathew	stp	q0, q1, [x0, #CTX_FP_Q0]
43532ed618SSoby Mathew	stp	q2, q3, [x0, #CTX_FP_Q2]
44532ed618SSoby Mathew	stp	q4, q5, [x0, #CTX_FP_Q4]
45532ed618SSoby Mathew	stp	q6, q7, [x0, #CTX_FP_Q6]
46532ed618SSoby Mathew	stp	q8, q9, [x0, #CTX_FP_Q8]
47532ed618SSoby Mathew	stp	q10, q11, [x0, #CTX_FP_Q10]
48532ed618SSoby Mathew	stp	q12, q13, [x0, #CTX_FP_Q12]
49532ed618SSoby Mathew	stp	q14, q15, [x0, #CTX_FP_Q14]
50532ed618SSoby Mathew	stp	q16, q17, [x0, #CTX_FP_Q16]
51532ed618SSoby Mathew	stp	q18, q19, [x0, #CTX_FP_Q18]
52532ed618SSoby Mathew	stp	q20, q21, [x0, #CTX_FP_Q20]
53532ed618SSoby Mathew	stp	q22, q23, [x0, #CTX_FP_Q22]
54532ed618SSoby Mathew	stp	q24, q25, [x0, #CTX_FP_Q24]
55532ed618SSoby Mathew	stp	q26, q27, [x0, #CTX_FP_Q26]
56532ed618SSoby Mathew	stp	q28, q29, [x0, #CTX_FP_Q28]
57532ed618SSoby Mathew	stp	q30, q31, [x0, #CTX_FP_Q30]
58532ed618SSoby Mathew
59532ed618SSoby Mathew	mrs	x9, fpsr
60532ed618SSoby Mathew	str	x9, [x0, #CTX_FP_FPSR]
61532ed618SSoby Mathew
62532ed618SSoby Mathew	mrs	x10, fpcr
63532ed618SSoby Mathew	str	x10, [x0, #CTX_FP_FPCR]
64532ed618SSoby Mathew
6591089f36SDavid Cunado#if CTX_INCLUDE_AARCH32_REGS
6691089f36SDavid Cunado	mrs	x11, fpexc32_el2
6791089f36SDavid Cunado	str	x11, [x0, #CTX_FP_FPEXC32_EL2]
680ce220afSJayanth Dodderi Chidanand#endif /* CTX_INCLUDE_AARCH32_REGS */
69532ed618SSoby Mathew	ret
70532ed618SSoby Mathewendfunc fpregs_context_save
71532ed618SSoby Mathew
72ed108b56SAlexei Fedorov/* ------------------------------------------------------------------
73ed108b56SAlexei Fedorov * The following function follows the aapcs_64 strictly to use x9-x17
74ed108b56SAlexei Fedorov * (temporary caller-saved registers according to AArch64 PCS) to
75ed108b56SAlexei Fedorov * restore floating point register context. It assumes that 'x0' is
76ed108b56SAlexei Fedorov * pointing to a 'fp_regs' structure from where the register context
77532ed618SSoby Mathew * will be restored.
78532ed618SSoby Mathew *
79ed108b56SAlexei Fedorov * Access to VFP registers will trap if CPTR_EL3.TFP is set.
80ed108b56SAlexei Fedorov * However currently we don't use VFP registers nor set traps in
81ed108b56SAlexei Fedorov * Trusted Firmware, and assume it's cleared.
82532ed618SSoby Mathew *
83532ed618SSoby Mathew * TODO: Revisit when VFP is used in secure world
84ed108b56SAlexei Fedorov * ------------------------------------------------------------------
85532ed618SSoby Mathew */
86532ed618SSoby Mathewfunc fpregs_context_restore
87532ed618SSoby Mathew	ldp	q0, q1, [x0, #CTX_FP_Q0]
88532ed618SSoby Mathew	ldp	q2, q3, [x0, #CTX_FP_Q2]
89532ed618SSoby Mathew	ldp	q4, q5, [x0, #CTX_FP_Q4]
90532ed618SSoby Mathew	ldp	q6, q7, [x0, #CTX_FP_Q6]
91532ed618SSoby Mathew	ldp	q8, q9, [x0, #CTX_FP_Q8]
92532ed618SSoby Mathew	ldp	q10, q11, [x0, #CTX_FP_Q10]
93532ed618SSoby Mathew	ldp	q12, q13, [x0, #CTX_FP_Q12]
94532ed618SSoby Mathew	ldp	q14, q15, [x0, #CTX_FP_Q14]
95532ed618SSoby Mathew	ldp	q16, q17, [x0, #CTX_FP_Q16]
96532ed618SSoby Mathew	ldp	q18, q19, [x0, #CTX_FP_Q18]
97532ed618SSoby Mathew	ldp	q20, q21, [x0, #CTX_FP_Q20]
98532ed618SSoby Mathew	ldp	q22, q23, [x0, #CTX_FP_Q22]
99532ed618SSoby Mathew	ldp	q24, q25, [x0, #CTX_FP_Q24]
100532ed618SSoby Mathew	ldp	q26, q27, [x0, #CTX_FP_Q26]
101532ed618SSoby Mathew	ldp	q28, q29, [x0, #CTX_FP_Q28]
102532ed618SSoby Mathew	ldp	q30, q31, [x0, #CTX_FP_Q30]
103532ed618SSoby Mathew
104532ed618SSoby Mathew	ldr	x9, [x0, #CTX_FP_FPSR]
105532ed618SSoby Mathew	msr	fpsr, x9
106532ed618SSoby Mathew
107532ed618SSoby Mathew	ldr	x10, [x0, #CTX_FP_FPCR]
108532ed618SSoby Mathew	msr	fpcr, x10
109532ed618SSoby Mathew
11091089f36SDavid Cunado#if CTX_INCLUDE_AARCH32_REGS
11191089f36SDavid Cunado	ldr	x11, [x0, #CTX_FP_FPEXC32_EL2]
11291089f36SDavid Cunado	msr	fpexc32_el2, x11
1130ce220afSJayanth Dodderi Chidanand#endif /* CTX_INCLUDE_AARCH32_REGS */
1140ce220afSJayanth Dodderi Chidanand
115532ed618SSoby Mathew	/*
116532ed618SSoby Mathew	 * No explict ISB required here as ERET to
117532ed618SSoby Mathew	 * switch to secure EL1 or non-secure world
118532ed618SSoby Mathew	 * covers it
119532ed618SSoby Mathew	 */
120532ed618SSoby Mathew
121532ed618SSoby Mathew	ret
122532ed618SSoby Mathewendfunc fpregs_context_restore
123532ed618SSoby Mathew#endif /* CTX_INCLUDE_FPREGS */
124532ed618SSoby Mathew
1257d33ffe4SDaniel Boulby	/*
1261cbe42a5SManish Pandey	 * Set SCR_EL3.EA bit to enable SErrors at EL3
1271cbe42a5SManish Pandey	 */
1281cbe42a5SManish Pandey	.macro enable_serror_at_el3
1291cbe42a5SManish Pandey	mrs     x8, scr_el3
1301cbe42a5SManish Pandey	orr     x8, x8, #SCR_EA_BIT
1311cbe42a5SManish Pandey	msr     scr_el3, x8
1321cbe42a5SManish Pandey	.endm
1331cbe42a5SManish Pandey
1341cbe42a5SManish Pandey	/*
1357d33ffe4SDaniel Boulby	 * Set the PSTATE bits not set when the exception was taken as
1367d33ffe4SDaniel Boulby	 * described in the AArch64.TakeException() pseudocode function
1377d33ffe4SDaniel Boulby	 * in ARM DDI 0487F.c page J1-7635 to a default value.
1387d33ffe4SDaniel Boulby	 */
1397d33ffe4SDaniel Boulby	.macro set_unset_pstate_bits
1407d33ffe4SDaniel Boulby	/*
1417d33ffe4SDaniel Boulby	 * If Data Independent Timing (DIT) functionality is implemented,
1427d33ffe4SDaniel Boulby	 * always enable DIT in EL3
1437d33ffe4SDaniel Boulby	 */
1447d33ffe4SDaniel Boulby#if ENABLE_FEAT_DIT
14588727fc3SAndre Przywara#if ENABLE_FEAT_DIT == 2
14688727fc3SAndre Przywara	mrs	x8, id_aa64pfr0_el1
14788727fc3SAndre Przywara	and	x8, x8, #(ID_AA64PFR0_DIT_MASK << ID_AA64PFR0_DIT_SHIFT)
14888727fc3SAndre Przywara	cbz	x8, 1f
14988727fc3SAndre Przywara#endif
1507d33ffe4SDaniel Boulby	mov     x8, #DIT_BIT
1517d33ffe4SDaniel Boulby	msr     DIT, x8
15288727fc3SAndre Przywara1:
1537d33ffe4SDaniel Boulby#endif /* ENABLE_FEAT_DIT */
1547d33ffe4SDaniel Boulby	.endm /* set_unset_pstate_bits */
1557d33ffe4SDaniel Boulby
156edebefbcSArvind Ram Prakash/*-------------------------------------------------------------------------
157edebefbcSArvind Ram Prakash * This macro checks the ENABLE_FEAT_MPAM state, performs ID register
158edebefbcSArvind Ram Prakash * check to see if the platform supports MPAM extension and restores MPAM3
159edebefbcSArvind Ram Prakash * register value if it is FEAT_STATE_ENABLED/FEAT_STATE_CHECKED.
160edebefbcSArvind Ram Prakash *
161edebefbcSArvind Ram Prakash * This is particularly more complicated because we can't check
162edebefbcSArvind Ram Prakash * if the platform supports MPAM  by looking for status of a particular bit
163edebefbcSArvind Ram Prakash * in the MDCR_EL3 or CPTR_EL3 register like other extensions.
164edebefbcSArvind Ram Prakash * ------------------------------------------------------------------------
165edebefbcSArvind Ram Prakash */
166edebefbcSArvind Ram Prakash
167edebefbcSArvind Ram Prakash	.macro	restore_mpam3_el3
168edebefbcSArvind Ram Prakash#if ENABLE_FEAT_MPAM
169edebefbcSArvind Ram Prakash#if ENABLE_FEAT_MPAM == 2
170edebefbcSArvind Ram Prakash
171edebefbcSArvind Ram Prakash	mrs x8, id_aa64pfr0_el1
172edebefbcSArvind Ram Prakash	lsr x8, x8, #(ID_AA64PFR0_MPAM_SHIFT)
173edebefbcSArvind Ram Prakash	and x8, x8, #(ID_AA64PFR0_MPAM_MASK)
174edebefbcSArvind Ram Prakash	mrs x7, id_aa64pfr1_el1
175edebefbcSArvind Ram Prakash	lsr x7, x7, #(ID_AA64PFR1_MPAM_FRAC_SHIFT)
176edebefbcSArvind Ram Prakash	and x7, x7, #(ID_AA64PFR1_MPAM_FRAC_MASK)
177edebefbcSArvind Ram Prakash	orr x7, x7, x8
178edebefbcSArvind Ram Prakash	cbz x7, no_mpam
179edebefbcSArvind Ram Prakash#endif
180edebefbcSArvind Ram Prakash	/* -----------------------------------------------------------
181edebefbcSArvind Ram Prakash	 * Restore MPAM3_EL3 register as per context state
182edebefbcSArvind Ram Prakash	 * Currently we only enable MPAM for NS world and trap to EL3
183edebefbcSArvind Ram Prakash	 * for MPAM access in lower ELs of Secure and Realm world
184ac4f6aafSArvind Ram Prakash	 * x9 holds address of the per_world context
185edebefbcSArvind Ram Prakash	 * -----------------------------------------------------------
186edebefbcSArvind Ram Prakash	 */
187ac4f6aafSArvind Ram Prakash
188ac4f6aafSArvind Ram Prakash	ldr	x17, [x9, #CTX_MPAM3_EL3]
189edebefbcSArvind Ram Prakash	msr	S3_6_C10_C5_0, x17 /* mpam3_el3 */
190edebefbcSArvind Ram Prakash
191edebefbcSArvind Ram Prakashno_mpam:
192edebefbcSArvind Ram Prakash#endif
193edebefbcSArvind Ram Prakash	.endm /* restore_mpam3_el3 */
194edebefbcSArvind Ram Prakash
195ed108b56SAlexei Fedorov/* ------------------------------------------------------------------
19697215e0fSDaniel Boulby * The following macro is used to save and restore all the general
197ed108b56SAlexei Fedorov * purpose and ARMv8.3-PAuth (if enabled) registers.
198d64bfef5SJayanth Dodderi Chidanand * It also checks if the Secure Cycle Counter (PMCCNTR_EL0)
199d64bfef5SJayanth Dodderi Chidanand * is disabled in EL3/Secure (ARMv8.5-PMU), wherein PMCCNTR_EL0
200d64bfef5SJayanth Dodderi Chidanand * needs not to be saved/restored during world switch.
201ed108b56SAlexei Fedorov *
202ed108b56SAlexei Fedorov * Ideally we would only save and restore the callee saved registers
203ed108b56SAlexei Fedorov * when a world switch occurs but that type of implementation is more
204ed108b56SAlexei Fedorov * complex. So currently we will always save and restore these
205ed108b56SAlexei Fedorov * registers on entry and exit of EL3.
206532ed618SSoby Mathew * clobbers: x18
207ed108b56SAlexei Fedorov * ------------------------------------------------------------------
208532ed618SSoby Mathew */
20997215e0fSDaniel Boulby	.macro save_gp_pmcr_pauth_regs
210532ed618SSoby Mathew	stp	x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0]
211532ed618SSoby Mathew	stp	x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
212532ed618SSoby Mathew	stp	x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4]
213532ed618SSoby Mathew	stp	x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6]
214532ed618SSoby Mathew	stp	x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8]
215532ed618SSoby Mathew	stp	x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10]
216532ed618SSoby Mathew	stp	x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12]
217532ed618SSoby Mathew	stp	x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14]
218532ed618SSoby Mathew	stp	x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16]
219532ed618SSoby Mathew	stp	x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18]
220532ed618SSoby Mathew	stp	x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20]
221532ed618SSoby Mathew	stp	x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22]
222532ed618SSoby Mathew	stp	x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24]
223532ed618SSoby Mathew	stp	x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26]
224532ed618SSoby Mathew	stp	x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28]
225532ed618SSoby Mathew	mrs	x18, sp_el0
226532ed618SSoby Mathew	str	x18, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0]
227c73686a1SBoyan Karatotev
228c73686a1SBoyan Karatotev	/* PMUv3 is presumed to be always present */
229ed108b56SAlexei Fedorov	mrs	x9, pmcr_el0
230ed108b56SAlexei Fedorov	str	x9, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0]
231ed108b56SAlexei Fedorov	/* Disable cycle counter when event counting is prohibited */
2321d6d6802SBoyan Karatotev	orr	x9, x9, #PMCR_EL0_DP_BIT
233ed108b56SAlexei Fedorov	msr	pmcr_el0, x9
234ed108b56SAlexei Fedorov	isb
235ed108b56SAlexei Fedorov#if CTX_INCLUDE_PAUTH_REGS
236ed108b56SAlexei Fedorov	/* ----------------------------------------------------------
237ed108b56SAlexei Fedorov 	 * Save the ARMv8.3-PAuth keys as they are not banked
238ed108b56SAlexei Fedorov 	 * by exception level
239ed108b56SAlexei Fedorov	 * ----------------------------------------------------------
240ed108b56SAlexei Fedorov	 */
241ed108b56SAlexei Fedorov	add	x19, sp, #CTX_PAUTH_REGS_OFFSET
242ed108b56SAlexei Fedorov
243ed108b56SAlexei Fedorov	mrs	x20, APIAKeyLo_EL1	/* x21:x20 = APIAKey */
244ed108b56SAlexei Fedorov	mrs	x21, APIAKeyHi_EL1
245ed108b56SAlexei Fedorov	mrs	x22, APIBKeyLo_EL1	/* x23:x22 = APIBKey */
246ed108b56SAlexei Fedorov	mrs	x23, APIBKeyHi_EL1
247ed108b56SAlexei Fedorov	mrs	x24, APDAKeyLo_EL1	/* x25:x24 = APDAKey */
248ed108b56SAlexei Fedorov	mrs	x25, APDAKeyHi_EL1
249ed108b56SAlexei Fedorov	mrs	x26, APDBKeyLo_EL1	/* x27:x26 = APDBKey */
250ed108b56SAlexei Fedorov	mrs	x27, APDBKeyHi_EL1
251ed108b56SAlexei Fedorov	mrs	x28, APGAKeyLo_EL1	/* x29:x28 = APGAKey */
252ed108b56SAlexei Fedorov	mrs	x29, APGAKeyHi_EL1
253ed108b56SAlexei Fedorov
254ed108b56SAlexei Fedorov	stp	x20, x21, [x19, #CTX_PACIAKEY_LO]
255ed108b56SAlexei Fedorov	stp	x22, x23, [x19, #CTX_PACIBKEY_LO]
256ed108b56SAlexei Fedorov	stp	x24, x25, [x19, #CTX_PACDAKEY_LO]
257ed108b56SAlexei Fedorov	stp	x26, x27, [x19, #CTX_PACDBKEY_LO]
258ed108b56SAlexei Fedorov	stp	x28, x29, [x19, #CTX_PACGAKEY_LO]
259ed108b56SAlexei Fedorov#endif /* CTX_INCLUDE_PAUTH_REGS */
26097215e0fSDaniel Boulby	.endm /* save_gp_pmcr_pauth_regs */
26197215e0fSDaniel Boulby
26297215e0fSDaniel Boulby/* -----------------------------------------------------------------
2637d33ffe4SDaniel Boulby * This function saves the context and sets the PSTATE to a known
2647d33ffe4SDaniel Boulby * state, preparing entry to el3.
26597215e0fSDaniel Boulby * Save all the general purpose and ARMv8.3-PAuth (if enabled)
26697215e0fSDaniel Boulby * registers.
2677d33ffe4SDaniel Boulby * Then set any of the PSTATE bits that are not set by hardware
2687d33ffe4SDaniel Boulby * according to the Aarch64.TakeException pseudocode in the Arm
2697d33ffe4SDaniel Boulby * Architecture Reference Manual to a default value for EL3.
2707d33ffe4SDaniel Boulby * clobbers: x17
27197215e0fSDaniel Boulby * -----------------------------------------------------------------
27297215e0fSDaniel Boulby */
27397215e0fSDaniel Boulbyfunc prepare_el3_entry
27497215e0fSDaniel Boulby	save_gp_pmcr_pauth_regs
2751cbe42a5SManish Pandey	enable_serror_at_el3
2767d33ffe4SDaniel Boulby	/*
2777d33ffe4SDaniel Boulby	 * Set the PSTATE bits not described in the Aarch64.TakeException
2787d33ffe4SDaniel Boulby	 * pseudocode to their default values.
2797d33ffe4SDaniel Boulby	 */
2807d33ffe4SDaniel Boulby	set_unset_pstate_bits
281ed108b56SAlexei Fedorov	ret
28297215e0fSDaniel Boulbyendfunc prepare_el3_entry
283ed108b56SAlexei Fedorov
284ed108b56SAlexei Fedorov/* ------------------------------------------------------------------
285ed108b56SAlexei Fedorov * This function restores ARMv8.3-PAuth (if enabled) and all general
286ed108b56SAlexei Fedorov * purpose registers except x30 from the CPU context.
287ed108b56SAlexei Fedorov * x30 register must be explicitly restored by the caller.
288ed108b56SAlexei Fedorov * ------------------------------------------------------------------
289ed108b56SAlexei Fedorov */
290ed108b56SAlexei Fedorovfunc restore_gp_pmcr_pauth_regs
291ed108b56SAlexei Fedorov#if CTX_INCLUDE_PAUTH_REGS
292ed108b56SAlexei Fedorov 	/* Restore the ARMv8.3 PAuth keys */
293ed108b56SAlexei Fedorov	add	x10, sp, #CTX_PAUTH_REGS_OFFSET
294ed108b56SAlexei Fedorov
295ed108b56SAlexei Fedorov	ldp	x0, x1, [x10, #CTX_PACIAKEY_LO]	/* x1:x0 = APIAKey */
296ed108b56SAlexei Fedorov	ldp	x2, x3, [x10, #CTX_PACIBKEY_LO]	/* x3:x2 = APIBKey */
297ed108b56SAlexei Fedorov	ldp	x4, x5, [x10, #CTX_PACDAKEY_LO]	/* x5:x4 = APDAKey */
298ed108b56SAlexei Fedorov	ldp	x6, x7, [x10, #CTX_PACDBKEY_LO]	/* x7:x6 = APDBKey */
299ed108b56SAlexei Fedorov	ldp	x8, x9, [x10, #CTX_PACGAKEY_LO]	/* x9:x8 = APGAKey */
300ed108b56SAlexei Fedorov
301ed108b56SAlexei Fedorov	msr	APIAKeyLo_EL1, x0
302ed108b56SAlexei Fedorov	msr	APIAKeyHi_EL1, x1
303ed108b56SAlexei Fedorov	msr	APIBKeyLo_EL1, x2
304ed108b56SAlexei Fedorov	msr	APIBKeyHi_EL1, x3
305ed108b56SAlexei Fedorov	msr	APDAKeyLo_EL1, x4
306ed108b56SAlexei Fedorov	msr	APDAKeyHi_EL1, x5
307ed108b56SAlexei Fedorov	msr	APDBKeyLo_EL1, x6
308ed108b56SAlexei Fedorov	msr	APDBKeyHi_EL1, x7
309ed108b56SAlexei Fedorov	msr	APGAKeyLo_EL1, x8
310ed108b56SAlexei Fedorov	msr	APGAKeyHi_EL1, x9
311ed108b56SAlexei Fedorov#endif /* CTX_INCLUDE_PAUTH_REGS */
312c73686a1SBoyan Karatotev
313c73686a1SBoyan Karatotev	/* PMUv3 is presumed to be always present */
314ed108b56SAlexei Fedorov	ldr	x0, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0]
315ed108b56SAlexei Fedorov	msr	pmcr_el0, x0
316532ed618SSoby Mathew	ldp	x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0]
317532ed618SSoby Mathew	ldp	x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
318532ed618SSoby Mathew	ldp	x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4]
319532ed618SSoby Mathew	ldp	x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6]
320532ed618SSoby Mathew	ldp	x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8]
321532ed618SSoby Mathew	ldp	x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10]
322532ed618SSoby Mathew	ldp	x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12]
323532ed618SSoby Mathew	ldp	x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14]
324ef653d93SJeenu Viswambharan	ldp	x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16]
325532ed618SSoby Mathew	ldp	x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18]
326532ed618SSoby Mathew	ldp	x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20]
327532ed618SSoby Mathew	ldp	x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22]
328532ed618SSoby Mathew	ldp	x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24]
329532ed618SSoby Mathew	ldp	x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26]
330ef653d93SJeenu Viswambharan	ldr	x28, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0]
331ef653d93SJeenu Viswambharan	msr	sp_el0, x28
332532ed618SSoby Mathew	ldp	x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28]
333ef653d93SJeenu Viswambharan	ret
334ed108b56SAlexei Fedorovendfunc restore_gp_pmcr_pauth_regs
335ef653d93SJeenu Viswambharan
336*59b7c0a0SJayanth Dodderi Chidanand#if ERRATA_SPECULATIVE_AT
337*59b7c0a0SJayanth Dodderi Chidanand/* --------------------------------------------------------------------
3383b8456bdSManish V Badarkhe * In case of ERRATA_SPECULATIVE_AT, save SCTLR_EL1 and TCR_EL1
3393b8456bdSManish V Badarkhe * registers and update EL1 registers to disable stage1 and stage2
340*59b7c0a0SJayanth Dodderi Chidanand * page table walk.
341*59b7c0a0SJayanth Dodderi Chidanand * --------------------------------------------------------------------
3423b8456bdSManish V Badarkhe */
3433b8456bdSManish V Badarkhefunc save_and_update_ptw_el1_sys_regs
3443b8456bdSManish V Badarkhe	/* ----------------------------------------------------------
3453b8456bdSManish V Badarkhe	 * Save only sctlr_el1 and tcr_el1 registers
3463b8456bdSManish V Badarkhe	 * ----------------------------------------------------------
3473b8456bdSManish V Badarkhe	 */
3483b8456bdSManish V Badarkhe	mrs	x29, sctlr_el1
349*59b7c0a0SJayanth Dodderi Chidanand	str	x29, [sp, #(CTX_ERRATA_SPEC_AT_OFFSET + CTX_ERRATA_SPEC_AT_SCTLR_EL1)]
3503b8456bdSManish V Badarkhe	mrs	x29, tcr_el1
351*59b7c0a0SJayanth Dodderi Chidanand	str	x29, [sp, #(CTX_ERRATA_SPEC_AT_OFFSET + CTX_ERRATA_SPEC_AT_TCR_EL1)]
3523b8456bdSManish V Badarkhe
3533b8456bdSManish V Badarkhe	/* ------------------------------------------------------------
3543b8456bdSManish V Badarkhe	 * Must follow below order in order to disable page table
3553b8456bdSManish V Badarkhe	 * walk for lower ELs (EL1 and EL0). First step ensures that
3563b8456bdSManish V Badarkhe	 * page table walk is disabled for stage1 and second step
3573b8456bdSManish V Badarkhe	 * ensures that page table walker should use TCR_EL1.EPDx
3583b8456bdSManish V Badarkhe	 * bits to perform address translation. ISB ensures that CPU
3593b8456bdSManish V Badarkhe	 * does these 2 steps in order.
3603b8456bdSManish V Badarkhe	 *
3613b8456bdSManish V Badarkhe	 * 1. Update TCR_EL1.EPDx bits to disable page table walk by
3623b8456bdSManish V Badarkhe	 *    stage1.
3633b8456bdSManish V Badarkhe	 * 2. Enable MMU bit to avoid identity mapping via stage2
3643b8456bdSManish V Badarkhe	 *    and force TCR_EL1.EPDx to be used by the page table
3653b8456bdSManish V Badarkhe	 *    walker.
3663b8456bdSManish V Badarkhe	 * ------------------------------------------------------------
3673b8456bdSManish V Badarkhe	 */
3683b8456bdSManish V Badarkhe	orr	x29, x29, #(TCR_EPD0_BIT)
3693b8456bdSManish V Badarkhe	orr	x29, x29, #(TCR_EPD1_BIT)
3703b8456bdSManish V Badarkhe	msr	tcr_el1, x29
3713b8456bdSManish V Badarkhe	isb
3723b8456bdSManish V Badarkhe	mrs	x29, sctlr_el1
3733b8456bdSManish V Badarkhe	orr	x29, x29, #SCTLR_M_BIT
3743b8456bdSManish V Badarkhe	msr	sctlr_el1, x29
3753b8456bdSManish V Badarkhe	isb
3763b8456bdSManish V Badarkhe	ret
3773b8456bdSManish V Badarkheendfunc save_and_update_ptw_el1_sys_regs
3783b8456bdSManish V Badarkhe
379*59b7c0a0SJayanth Dodderi Chidanand#endif /* ERRATA_SPECULATIVE_AT */
380*59b7c0a0SJayanth Dodderi Chidanand
381461c0a5dSElizabeth Ho/* -----------------------------------------------------------------
382461c0a5dSElizabeth Ho* The below macro returns the address of the per_world context for
383461c0a5dSElizabeth Ho* the security state, retrieved through "get_security_state" macro.
384461c0a5dSElizabeth Ho* The per_world context address is returned in the register argument.
385461c0a5dSElizabeth Ho* Clobbers: x9, x10
386461c0a5dSElizabeth Ho* ------------------------------------------------------------------
387461c0a5dSElizabeth Ho*/
388461c0a5dSElizabeth Ho
389461c0a5dSElizabeth Ho.macro get_per_world_context _reg:req
390461c0a5dSElizabeth Ho	ldr 	x10, [sp, #CTX_EL3STATE_OFFSET + CTX_SCR_EL3]
391461c0a5dSElizabeth Ho	get_security_state x9, x10
3924087ed6cSJayanth Dodderi Chidanand	mov_imm	x10, (CTX_PERWORLD_EL3STATE_END - CTX_CPTR_EL3)
393461c0a5dSElizabeth Ho	mul	x9, x9, x10
394461c0a5dSElizabeth Ho	adrp	x10, per_world_context
395461c0a5dSElizabeth Ho	add	x10, x10, :lo12:per_world_context
396461c0a5dSElizabeth Ho	add	x9, x9, x10
397461c0a5dSElizabeth Ho	mov 	\_reg, x9
398461c0a5dSElizabeth Ho.endm
399461c0a5dSElizabeth Ho
400ed108b56SAlexei Fedorov/* ------------------------------------------------------------------
401ed108b56SAlexei Fedorov * This routine assumes that the SP_EL3 is pointing to a valid
402ed108b56SAlexei Fedorov * context structure from where the gp regs and other special
403ed108b56SAlexei Fedorov * registers can be retrieved.
404ed108b56SAlexei Fedorov * ------------------------------------------------------------------
405532ed618SSoby Mathew */
406532ed618SSoby Mathewfunc el3_exit
407bb9549baSJan Dabros#if ENABLE_ASSERTIONS
408bb9549baSJan Dabros	/* el3_exit assumes SP_EL0 on entry */
409bb9549baSJan Dabros	mrs	x17, spsel
410bb9549baSJan Dabros	cmp	x17, #MODE_SP_EL0
411bb9549baSJan Dabros	ASM_ASSERT(eq)
4120ce220afSJayanth Dodderi Chidanand#endif /* ENABLE_ASSERTIONS */
413bb9549baSJan Dabros
414ed108b56SAlexei Fedorov	/* ----------------------------------------------------------
415ed108b56SAlexei Fedorov	 * Save the current SP_EL0 i.e. the EL3 runtime stack which
416ed108b56SAlexei Fedorov	 * will be used for handling the next SMC.
417ed108b56SAlexei Fedorov	 * Then switch to SP_EL3.
418ed108b56SAlexei Fedorov	 * ----------------------------------------------------------
419532ed618SSoby Mathew	 */
420532ed618SSoby Mathew	mov	x17, sp
421ed108b56SAlexei Fedorov	msr	spsel, #MODE_SP_ELX
422532ed618SSoby Mathew	str	x17, [sp, #CTX_EL3STATE_OFFSET + CTX_RUNTIME_SP]
423532ed618SSoby Mathew
4240c5e7d1cSMax Shvetsov	/* ----------------------------------------------------------
42568ac5ed0SArunachalam Ganapathy	 * Restore CPTR_EL3.
4260c5e7d1cSMax Shvetsov	 * ZCR is only restored if SVE is supported and enabled.
4270c5e7d1cSMax Shvetsov	 * Synchronization is required before zcr_el3 is addressed.
4280c5e7d1cSMax Shvetsov	 * ----------------------------------------------------------
4290c5e7d1cSMax Shvetsov	 */
430461c0a5dSElizabeth Ho
431461c0a5dSElizabeth Ho	/* The address of the per_world context is stored in x9 */
432461c0a5dSElizabeth Ho	get_per_world_context x9
433461c0a5dSElizabeth Ho
434461c0a5dSElizabeth Ho	ldp	x19, x20, [x9, #CTX_CPTR_EL3]
4350c5e7d1cSMax Shvetsov	msr	cptr_el3, x19
4360c5e7d1cSMax Shvetsov
437f0c96a2eSBoyan Karatotev#if IMAGE_BL31
4380c5e7d1cSMax Shvetsov	ands	x19, x19, #CPTR_EZ_BIT
4390c5e7d1cSMax Shvetsov	beq	sve_not_enabled
4400c5e7d1cSMax Shvetsov
4410c5e7d1cSMax Shvetsov	isb
4420c5e7d1cSMax Shvetsov	msr	S3_6_C1_C2_0, x20 /* zcr_el3 */
4430c5e7d1cSMax Shvetsovsve_not_enabled:
444edebefbcSArvind Ram Prakash
445edebefbcSArvind Ram Prakash	restore_mpam3_el3
446edebefbcSArvind Ram Prakash
4470ce220afSJayanth Dodderi Chidanand#endif /* IMAGE_BL31 */
4480c5e7d1cSMax Shvetsov
449fe007b2eSDimitris Papastamos#if IMAGE_BL31 && DYNAMIC_WORKAROUND_CVE_2018_3639
450ed108b56SAlexei Fedorov	/* ----------------------------------------------------------
451ed108b56SAlexei Fedorov	 * Restore mitigation state as it was on entry to EL3
452ed108b56SAlexei Fedorov	 * ----------------------------------------------------------
453ed108b56SAlexei Fedorov	 */
454fe007b2eSDimitris Papastamos	ldr	x17, [sp, #CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_DISABLE]
455ed108b56SAlexei Fedorov	cbz	x17, 1f
456fe007b2eSDimitris Papastamos	blr	x17
4574d1ccf0eSAntonio Nino Diaz1:
4580ce220afSJayanth Dodderi Chidanand#endif /* IMAGE_BL31 && DYNAMIC_WORKAROUND_CVE_2018_3639 */
4590ce220afSJayanth Dodderi Chidanand
4606597fcf1SManish Pandey#if IMAGE_BL31
4616597fcf1SManish Pandey	synchronize_errors
4626597fcf1SManish Pandey#endif /* IMAGE_BL31 */
4630ce220afSJayanth Dodderi Chidanand
464123002f9SJayanth Dodderi Chidanand	/* --------------------------------------------------------------
465123002f9SJayanth Dodderi Chidanand	 * Restore MDCR_EL3, SPSR_EL3, ELR_EL3 and SCR_EL3 prior to ERET
466123002f9SJayanth Dodderi Chidanand	 * --------------------------------------------------------------
467ff1d2ef3SManish Pandey	 */
468ff1d2ef3SManish Pandey	ldp	x16, x17, [sp, #CTX_EL3STATE_OFFSET + CTX_SPSR_EL3]
469123002f9SJayanth Dodderi Chidanand	ldr	x18, [sp, #CTX_EL3STATE_OFFSET + CTX_SCR_EL3]
470123002f9SJayanth Dodderi Chidanand	ldr	x19, [sp, #CTX_EL3STATE_OFFSET + CTX_MDCR_EL3]
471ff1d2ef3SManish Pandey	msr	spsr_el3, x16
472ff1d2ef3SManish Pandey	msr	elr_el3, x17
473123002f9SJayanth Dodderi Chidanand	msr	scr_el3, x18
474123002f9SJayanth Dodderi Chidanand	msr	mdcr_el3, x19
475ff1d2ef3SManish Pandey
476ff1d2ef3SManish Pandey	restore_ptw_el1_sys_regs
477ff1d2ef3SManish Pandey
478ff1d2ef3SManish Pandey	/* ----------------------------------------------------------
479ff1d2ef3SManish Pandey	 * Restore general purpose (including x30), PMCR_EL0 and
480ff1d2ef3SManish Pandey	 * ARMv8.3-PAuth registers.
481ff1d2ef3SManish Pandey	 * Exit EL3 via ERET to a lower exception level.
482ff1d2ef3SManish Pandey 	 * ----------------------------------------------------------
483ff1d2ef3SManish Pandey 	 */
484ff1d2ef3SManish Pandey	bl	restore_gp_pmcr_pauth_regs
485ff1d2ef3SManish Pandey	ldr	x30, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_LR]
486ff1d2ef3SManish Pandey
487c2d32a5fSMadhukar Pappireddy#ifdef IMAGE_BL31
488d04c04a4SManish Pandey	/* Clear the EL3 flag as we are exiting el3 */
489d04c04a4SManish Pandey	str	xzr, [sp, #CTX_EL3STATE_OFFSET + CTX_NESTED_EA_FLAG]
4900ce220afSJayanth Dodderi Chidanand#endif /* IMAGE_BL31 */
4910ce220afSJayanth Dodderi Chidanand
492f461fe34SAnthony Steinhauser	exception_return
4935283962eSAntonio Nino Diaz
494532ed618SSoby Mathewendfunc el3_exit
495