1532ed618SSoby Mathew/* 230788a84SGovindraj Raja * Copyright (c) 2013-2024, Arm Limited and Contributors. All rights reserved. 3532ed618SSoby Mathew * 482cb2c1aSdp-arm * SPDX-License-Identifier: BSD-3-Clause 5532ed618SSoby Mathew */ 6532ed618SSoby Mathew 7532ed618SSoby Mathew#include <arch.h> 8532ed618SSoby Mathew#include <asm_macros.S> 9bb9549baSJan Dabros#include <assert_macros.S> 10532ed618SSoby Mathew#include <context.h> 113b8456bdSManish V Badarkhe#include <el3_common_macros.S> 12532ed618SSoby Mathew 13532ed618SSoby Mathew#if CTX_INCLUDE_FPREGS 14532ed618SSoby Mathew .global fpregs_context_save 15532ed618SSoby Mathew .global fpregs_context_restore 160ce220afSJayanth Dodderi Chidanand#endif /* CTX_INCLUDE_FPREGS */ 17*59b7c0a0SJayanth Dodderi Chidanand 18*59b7c0a0SJayanth Dodderi Chidanand#if ERRATA_SPECULATIVE_AT 19*59b7c0a0SJayanth Dodderi Chidanand .global save_and_update_ptw_el1_sys_regs 20*59b7c0a0SJayanth Dodderi Chidanand#endif /* ERRATA_SPECULATIVE_AT */ 21*59b7c0a0SJayanth Dodderi Chidanand 2297215e0fSDaniel Boulby .global prepare_el3_entry 23ed108b56SAlexei Fedorov .global restore_gp_pmcr_pauth_regs 24532ed618SSoby Mathew .global el3_exit 25532ed618SSoby Mathew 26ed108b56SAlexei Fedorov/* ------------------------------------------------------------------ 27ed108b56SAlexei Fedorov * The following function follows the aapcs_64 strictly to use 28ed108b56SAlexei Fedorov * x9-x17 (temporary caller-saved registers according to AArch64 PCS) 29ed108b56SAlexei Fedorov * to save floating point register context. It assumes that 'x0' is 30ed108b56SAlexei Fedorov * pointing to a 'fp_regs' structure where the register context will 31532ed618SSoby Mathew * be saved. 32532ed618SSoby Mathew * 33ed108b56SAlexei Fedorov * Access to VFP registers will trap if CPTR_EL3.TFP is set. 34ed108b56SAlexei Fedorov * However currently we don't use VFP registers nor set traps in 35ed108b56SAlexei Fedorov * Trusted Firmware, and assume it's cleared. 36532ed618SSoby Mathew * 37532ed618SSoby Mathew * TODO: Revisit when VFP is used in secure world 38ed108b56SAlexei Fedorov * ------------------------------------------------------------------ 39532ed618SSoby Mathew */ 40532ed618SSoby Mathew#if CTX_INCLUDE_FPREGS 41532ed618SSoby Mathewfunc fpregs_context_save 42532ed618SSoby Mathew stp q0, q1, [x0, #CTX_FP_Q0] 43532ed618SSoby Mathew stp q2, q3, [x0, #CTX_FP_Q2] 44532ed618SSoby Mathew stp q4, q5, [x0, #CTX_FP_Q4] 45532ed618SSoby Mathew stp q6, q7, [x0, #CTX_FP_Q6] 46532ed618SSoby Mathew stp q8, q9, [x0, #CTX_FP_Q8] 47532ed618SSoby Mathew stp q10, q11, [x0, #CTX_FP_Q10] 48532ed618SSoby Mathew stp q12, q13, [x0, #CTX_FP_Q12] 49532ed618SSoby Mathew stp q14, q15, [x0, #CTX_FP_Q14] 50532ed618SSoby Mathew stp q16, q17, [x0, #CTX_FP_Q16] 51532ed618SSoby Mathew stp q18, q19, [x0, #CTX_FP_Q18] 52532ed618SSoby Mathew stp q20, q21, [x0, #CTX_FP_Q20] 53532ed618SSoby Mathew stp q22, q23, [x0, #CTX_FP_Q22] 54532ed618SSoby Mathew stp q24, q25, [x0, #CTX_FP_Q24] 55532ed618SSoby Mathew stp q26, q27, [x0, #CTX_FP_Q26] 56532ed618SSoby Mathew stp q28, q29, [x0, #CTX_FP_Q28] 57532ed618SSoby Mathew stp q30, q31, [x0, #CTX_FP_Q30] 58532ed618SSoby Mathew 59532ed618SSoby Mathew mrs x9, fpsr 60532ed618SSoby Mathew str x9, [x0, #CTX_FP_FPSR] 61532ed618SSoby Mathew 62532ed618SSoby Mathew mrs x10, fpcr 63532ed618SSoby Mathew str x10, [x0, #CTX_FP_FPCR] 64532ed618SSoby Mathew 6591089f36SDavid Cunado#if CTX_INCLUDE_AARCH32_REGS 6691089f36SDavid Cunado mrs x11, fpexc32_el2 6791089f36SDavid Cunado str x11, [x0, #CTX_FP_FPEXC32_EL2] 680ce220afSJayanth Dodderi Chidanand#endif /* CTX_INCLUDE_AARCH32_REGS */ 69532ed618SSoby Mathew ret 70532ed618SSoby Mathewendfunc fpregs_context_save 71532ed618SSoby Mathew 72ed108b56SAlexei Fedorov/* ------------------------------------------------------------------ 73ed108b56SAlexei Fedorov * The following function follows the aapcs_64 strictly to use x9-x17 74ed108b56SAlexei Fedorov * (temporary caller-saved registers according to AArch64 PCS) to 75ed108b56SAlexei Fedorov * restore floating point register context. It assumes that 'x0' is 76ed108b56SAlexei Fedorov * pointing to a 'fp_regs' structure from where the register context 77532ed618SSoby Mathew * will be restored. 78532ed618SSoby Mathew * 79ed108b56SAlexei Fedorov * Access to VFP registers will trap if CPTR_EL3.TFP is set. 80ed108b56SAlexei Fedorov * However currently we don't use VFP registers nor set traps in 81ed108b56SAlexei Fedorov * Trusted Firmware, and assume it's cleared. 82532ed618SSoby Mathew * 83532ed618SSoby Mathew * TODO: Revisit when VFP is used in secure world 84ed108b56SAlexei Fedorov * ------------------------------------------------------------------ 85532ed618SSoby Mathew */ 86532ed618SSoby Mathewfunc fpregs_context_restore 87532ed618SSoby Mathew ldp q0, q1, [x0, #CTX_FP_Q0] 88532ed618SSoby Mathew ldp q2, q3, [x0, #CTX_FP_Q2] 89532ed618SSoby Mathew ldp q4, q5, [x0, #CTX_FP_Q4] 90532ed618SSoby Mathew ldp q6, q7, [x0, #CTX_FP_Q6] 91532ed618SSoby Mathew ldp q8, q9, [x0, #CTX_FP_Q8] 92532ed618SSoby Mathew ldp q10, q11, [x0, #CTX_FP_Q10] 93532ed618SSoby Mathew ldp q12, q13, [x0, #CTX_FP_Q12] 94532ed618SSoby Mathew ldp q14, q15, [x0, #CTX_FP_Q14] 95532ed618SSoby Mathew ldp q16, q17, [x0, #CTX_FP_Q16] 96532ed618SSoby Mathew ldp q18, q19, [x0, #CTX_FP_Q18] 97532ed618SSoby Mathew ldp q20, q21, [x0, #CTX_FP_Q20] 98532ed618SSoby Mathew ldp q22, q23, [x0, #CTX_FP_Q22] 99532ed618SSoby Mathew ldp q24, q25, [x0, #CTX_FP_Q24] 100532ed618SSoby Mathew ldp q26, q27, [x0, #CTX_FP_Q26] 101532ed618SSoby Mathew ldp q28, q29, [x0, #CTX_FP_Q28] 102532ed618SSoby Mathew ldp q30, q31, [x0, #CTX_FP_Q30] 103532ed618SSoby Mathew 104532ed618SSoby Mathew ldr x9, [x0, #CTX_FP_FPSR] 105532ed618SSoby Mathew msr fpsr, x9 106532ed618SSoby Mathew 107532ed618SSoby Mathew ldr x10, [x0, #CTX_FP_FPCR] 108532ed618SSoby Mathew msr fpcr, x10 109532ed618SSoby Mathew 11091089f36SDavid Cunado#if CTX_INCLUDE_AARCH32_REGS 11191089f36SDavid Cunado ldr x11, [x0, #CTX_FP_FPEXC32_EL2] 11291089f36SDavid Cunado msr fpexc32_el2, x11 1130ce220afSJayanth Dodderi Chidanand#endif /* CTX_INCLUDE_AARCH32_REGS */ 1140ce220afSJayanth Dodderi Chidanand 115532ed618SSoby Mathew /* 116532ed618SSoby Mathew * No explict ISB required here as ERET to 117532ed618SSoby Mathew * switch to secure EL1 or non-secure world 118532ed618SSoby Mathew * covers it 119532ed618SSoby Mathew */ 120532ed618SSoby Mathew 121532ed618SSoby Mathew ret 122532ed618SSoby Mathewendfunc fpregs_context_restore 123532ed618SSoby Mathew#endif /* CTX_INCLUDE_FPREGS */ 124532ed618SSoby Mathew 1257d33ffe4SDaniel Boulby /* 1261cbe42a5SManish Pandey * Set SCR_EL3.EA bit to enable SErrors at EL3 1271cbe42a5SManish Pandey */ 1281cbe42a5SManish Pandey .macro enable_serror_at_el3 1291cbe42a5SManish Pandey mrs x8, scr_el3 1301cbe42a5SManish Pandey orr x8, x8, #SCR_EA_BIT 1311cbe42a5SManish Pandey msr scr_el3, x8 1321cbe42a5SManish Pandey .endm 1331cbe42a5SManish Pandey 1341cbe42a5SManish Pandey /* 1357d33ffe4SDaniel Boulby * Set the PSTATE bits not set when the exception was taken as 1367d33ffe4SDaniel Boulby * described in the AArch64.TakeException() pseudocode function 1377d33ffe4SDaniel Boulby * in ARM DDI 0487F.c page J1-7635 to a default value. 1387d33ffe4SDaniel Boulby */ 1397d33ffe4SDaniel Boulby .macro set_unset_pstate_bits 1407d33ffe4SDaniel Boulby /* 1417d33ffe4SDaniel Boulby * If Data Independent Timing (DIT) functionality is implemented, 1427d33ffe4SDaniel Boulby * always enable DIT in EL3 1437d33ffe4SDaniel Boulby */ 1447d33ffe4SDaniel Boulby#if ENABLE_FEAT_DIT 14588727fc3SAndre Przywara#if ENABLE_FEAT_DIT == 2 14688727fc3SAndre Przywara mrs x8, id_aa64pfr0_el1 14788727fc3SAndre Przywara and x8, x8, #(ID_AA64PFR0_DIT_MASK << ID_AA64PFR0_DIT_SHIFT) 14888727fc3SAndre Przywara cbz x8, 1f 14988727fc3SAndre Przywara#endif 1507d33ffe4SDaniel Boulby mov x8, #DIT_BIT 1517d33ffe4SDaniel Boulby msr DIT, x8 15288727fc3SAndre Przywara1: 1537d33ffe4SDaniel Boulby#endif /* ENABLE_FEAT_DIT */ 1547d33ffe4SDaniel Boulby .endm /* set_unset_pstate_bits */ 1557d33ffe4SDaniel Boulby 156edebefbcSArvind Ram Prakash/*------------------------------------------------------------------------- 157edebefbcSArvind Ram Prakash * This macro checks the ENABLE_FEAT_MPAM state, performs ID register 158edebefbcSArvind Ram Prakash * check to see if the platform supports MPAM extension and restores MPAM3 159edebefbcSArvind Ram Prakash * register value if it is FEAT_STATE_ENABLED/FEAT_STATE_CHECKED. 160edebefbcSArvind Ram Prakash * 161edebefbcSArvind Ram Prakash * This is particularly more complicated because we can't check 162edebefbcSArvind Ram Prakash * if the platform supports MPAM by looking for status of a particular bit 163edebefbcSArvind Ram Prakash * in the MDCR_EL3 or CPTR_EL3 register like other extensions. 164edebefbcSArvind Ram Prakash * ------------------------------------------------------------------------ 165edebefbcSArvind Ram Prakash */ 166edebefbcSArvind Ram Prakash 167edebefbcSArvind Ram Prakash .macro restore_mpam3_el3 168edebefbcSArvind Ram Prakash#if ENABLE_FEAT_MPAM 169edebefbcSArvind Ram Prakash#if ENABLE_FEAT_MPAM == 2 170edebefbcSArvind Ram Prakash 171edebefbcSArvind Ram Prakash mrs x8, id_aa64pfr0_el1 172edebefbcSArvind Ram Prakash lsr x8, x8, #(ID_AA64PFR0_MPAM_SHIFT) 173edebefbcSArvind Ram Prakash and x8, x8, #(ID_AA64PFR0_MPAM_MASK) 174edebefbcSArvind Ram Prakash mrs x7, id_aa64pfr1_el1 175edebefbcSArvind Ram Prakash lsr x7, x7, #(ID_AA64PFR1_MPAM_FRAC_SHIFT) 176edebefbcSArvind Ram Prakash and x7, x7, #(ID_AA64PFR1_MPAM_FRAC_MASK) 177edebefbcSArvind Ram Prakash orr x7, x7, x8 178edebefbcSArvind Ram Prakash cbz x7, no_mpam 179edebefbcSArvind Ram Prakash#endif 180edebefbcSArvind Ram Prakash /* ----------------------------------------------------------- 181edebefbcSArvind Ram Prakash * Restore MPAM3_EL3 register as per context state 182edebefbcSArvind Ram Prakash * Currently we only enable MPAM for NS world and trap to EL3 183edebefbcSArvind Ram Prakash * for MPAM access in lower ELs of Secure and Realm world 184ac4f6aafSArvind Ram Prakash * x9 holds address of the per_world context 185edebefbcSArvind Ram Prakash * ----------------------------------------------------------- 186edebefbcSArvind Ram Prakash */ 187ac4f6aafSArvind Ram Prakash 188ac4f6aafSArvind Ram Prakash ldr x17, [x9, #CTX_MPAM3_EL3] 189edebefbcSArvind Ram Prakash msr S3_6_C10_C5_0, x17 /* mpam3_el3 */ 190edebefbcSArvind Ram Prakash 191edebefbcSArvind Ram Prakashno_mpam: 192edebefbcSArvind Ram Prakash#endif 193edebefbcSArvind Ram Prakash .endm /* restore_mpam3_el3 */ 194edebefbcSArvind Ram Prakash 195ed108b56SAlexei Fedorov/* ------------------------------------------------------------------ 19697215e0fSDaniel Boulby * The following macro is used to save and restore all the general 197ed108b56SAlexei Fedorov * purpose and ARMv8.3-PAuth (if enabled) registers. 198d64bfef5SJayanth Dodderi Chidanand * It also checks if the Secure Cycle Counter (PMCCNTR_EL0) 199d64bfef5SJayanth Dodderi Chidanand * is disabled in EL3/Secure (ARMv8.5-PMU), wherein PMCCNTR_EL0 200d64bfef5SJayanth Dodderi Chidanand * needs not to be saved/restored during world switch. 201ed108b56SAlexei Fedorov * 202ed108b56SAlexei Fedorov * Ideally we would only save and restore the callee saved registers 203ed108b56SAlexei Fedorov * when a world switch occurs but that type of implementation is more 204ed108b56SAlexei Fedorov * complex. So currently we will always save and restore these 205ed108b56SAlexei Fedorov * registers on entry and exit of EL3. 206532ed618SSoby Mathew * clobbers: x18 207ed108b56SAlexei Fedorov * ------------------------------------------------------------------ 208532ed618SSoby Mathew */ 20997215e0fSDaniel Boulby .macro save_gp_pmcr_pauth_regs 210532ed618SSoby Mathew stp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0] 211532ed618SSoby Mathew stp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2] 212532ed618SSoby Mathew stp x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4] 213532ed618SSoby Mathew stp x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6] 214532ed618SSoby Mathew stp x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8] 215532ed618SSoby Mathew stp x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10] 216532ed618SSoby Mathew stp x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12] 217532ed618SSoby Mathew stp x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14] 218532ed618SSoby Mathew stp x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16] 219532ed618SSoby Mathew stp x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18] 220532ed618SSoby Mathew stp x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20] 221532ed618SSoby Mathew stp x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22] 222532ed618SSoby Mathew stp x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24] 223532ed618SSoby Mathew stp x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26] 224532ed618SSoby Mathew stp x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28] 225532ed618SSoby Mathew mrs x18, sp_el0 226532ed618SSoby Mathew str x18, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0] 227c73686a1SBoyan Karatotev 228c73686a1SBoyan Karatotev /* PMUv3 is presumed to be always present */ 229ed108b56SAlexei Fedorov mrs x9, pmcr_el0 230ed108b56SAlexei Fedorov str x9, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0] 231ed108b56SAlexei Fedorov /* Disable cycle counter when event counting is prohibited */ 2321d6d6802SBoyan Karatotev orr x9, x9, #PMCR_EL0_DP_BIT 233ed108b56SAlexei Fedorov msr pmcr_el0, x9 234ed108b56SAlexei Fedorov isb 235ed108b56SAlexei Fedorov#if CTX_INCLUDE_PAUTH_REGS 236ed108b56SAlexei Fedorov /* ---------------------------------------------------------- 237ed108b56SAlexei Fedorov * Save the ARMv8.3-PAuth keys as they are not banked 238ed108b56SAlexei Fedorov * by exception level 239ed108b56SAlexei Fedorov * ---------------------------------------------------------- 240ed108b56SAlexei Fedorov */ 241ed108b56SAlexei Fedorov add x19, sp, #CTX_PAUTH_REGS_OFFSET 242ed108b56SAlexei Fedorov 243ed108b56SAlexei Fedorov mrs x20, APIAKeyLo_EL1 /* x21:x20 = APIAKey */ 244ed108b56SAlexei Fedorov mrs x21, APIAKeyHi_EL1 245ed108b56SAlexei Fedorov mrs x22, APIBKeyLo_EL1 /* x23:x22 = APIBKey */ 246ed108b56SAlexei Fedorov mrs x23, APIBKeyHi_EL1 247ed108b56SAlexei Fedorov mrs x24, APDAKeyLo_EL1 /* x25:x24 = APDAKey */ 248ed108b56SAlexei Fedorov mrs x25, APDAKeyHi_EL1 249ed108b56SAlexei Fedorov mrs x26, APDBKeyLo_EL1 /* x27:x26 = APDBKey */ 250ed108b56SAlexei Fedorov mrs x27, APDBKeyHi_EL1 251ed108b56SAlexei Fedorov mrs x28, APGAKeyLo_EL1 /* x29:x28 = APGAKey */ 252ed108b56SAlexei Fedorov mrs x29, APGAKeyHi_EL1 253ed108b56SAlexei Fedorov 254ed108b56SAlexei Fedorov stp x20, x21, [x19, #CTX_PACIAKEY_LO] 255ed108b56SAlexei Fedorov stp x22, x23, [x19, #CTX_PACIBKEY_LO] 256ed108b56SAlexei Fedorov stp x24, x25, [x19, #CTX_PACDAKEY_LO] 257ed108b56SAlexei Fedorov stp x26, x27, [x19, #CTX_PACDBKEY_LO] 258ed108b56SAlexei Fedorov stp x28, x29, [x19, #CTX_PACGAKEY_LO] 259ed108b56SAlexei Fedorov#endif /* CTX_INCLUDE_PAUTH_REGS */ 26097215e0fSDaniel Boulby .endm /* save_gp_pmcr_pauth_regs */ 26197215e0fSDaniel Boulby 26297215e0fSDaniel Boulby/* ----------------------------------------------------------------- 2637d33ffe4SDaniel Boulby * This function saves the context and sets the PSTATE to a known 2647d33ffe4SDaniel Boulby * state, preparing entry to el3. 26597215e0fSDaniel Boulby * Save all the general purpose and ARMv8.3-PAuth (if enabled) 26697215e0fSDaniel Boulby * registers. 2677d33ffe4SDaniel Boulby * Then set any of the PSTATE bits that are not set by hardware 2687d33ffe4SDaniel Boulby * according to the Aarch64.TakeException pseudocode in the Arm 2697d33ffe4SDaniel Boulby * Architecture Reference Manual to a default value for EL3. 2707d33ffe4SDaniel Boulby * clobbers: x17 27197215e0fSDaniel Boulby * ----------------------------------------------------------------- 27297215e0fSDaniel Boulby */ 27397215e0fSDaniel Boulbyfunc prepare_el3_entry 27497215e0fSDaniel Boulby save_gp_pmcr_pauth_regs 2751cbe42a5SManish Pandey enable_serror_at_el3 2767d33ffe4SDaniel Boulby /* 2777d33ffe4SDaniel Boulby * Set the PSTATE bits not described in the Aarch64.TakeException 2787d33ffe4SDaniel Boulby * pseudocode to their default values. 2797d33ffe4SDaniel Boulby */ 2807d33ffe4SDaniel Boulby set_unset_pstate_bits 281ed108b56SAlexei Fedorov ret 28297215e0fSDaniel Boulbyendfunc prepare_el3_entry 283ed108b56SAlexei Fedorov 284ed108b56SAlexei Fedorov/* ------------------------------------------------------------------ 285ed108b56SAlexei Fedorov * This function restores ARMv8.3-PAuth (if enabled) and all general 286ed108b56SAlexei Fedorov * purpose registers except x30 from the CPU context. 287ed108b56SAlexei Fedorov * x30 register must be explicitly restored by the caller. 288ed108b56SAlexei Fedorov * ------------------------------------------------------------------ 289ed108b56SAlexei Fedorov */ 290ed108b56SAlexei Fedorovfunc restore_gp_pmcr_pauth_regs 291ed108b56SAlexei Fedorov#if CTX_INCLUDE_PAUTH_REGS 292ed108b56SAlexei Fedorov /* Restore the ARMv8.3 PAuth keys */ 293ed108b56SAlexei Fedorov add x10, sp, #CTX_PAUTH_REGS_OFFSET 294ed108b56SAlexei Fedorov 295ed108b56SAlexei Fedorov ldp x0, x1, [x10, #CTX_PACIAKEY_LO] /* x1:x0 = APIAKey */ 296ed108b56SAlexei Fedorov ldp x2, x3, [x10, #CTX_PACIBKEY_LO] /* x3:x2 = APIBKey */ 297ed108b56SAlexei Fedorov ldp x4, x5, [x10, #CTX_PACDAKEY_LO] /* x5:x4 = APDAKey */ 298ed108b56SAlexei Fedorov ldp x6, x7, [x10, #CTX_PACDBKEY_LO] /* x7:x6 = APDBKey */ 299ed108b56SAlexei Fedorov ldp x8, x9, [x10, #CTX_PACGAKEY_LO] /* x9:x8 = APGAKey */ 300ed108b56SAlexei Fedorov 301ed108b56SAlexei Fedorov msr APIAKeyLo_EL1, x0 302ed108b56SAlexei Fedorov msr APIAKeyHi_EL1, x1 303ed108b56SAlexei Fedorov msr APIBKeyLo_EL1, x2 304ed108b56SAlexei Fedorov msr APIBKeyHi_EL1, x3 305ed108b56SAlexei Fedorov msr APDAKeyLo_EL1, x4 306ed108b56SAlexei Fedorov msr APDAKeyHi_EL1, x5 307ed108b56SAlexei Fedorov msr APDBKeyLo_EL1, x6 308ed108b56SAlexei Fedorov msr APDBKeyHi_EL1, x7 309ed108b56SAlexei Fedorov msr APGAKeyLo_EL1, x8 310ed108b56SAlexei Fedorov msr APGAKeyHi_EL1, x9 311ed108b56SAlexei Fedorov#endif /* CTX_INCLUDE_PAUTH_REGS */ 312c73686a1SBoyan Karatotev 313c73686a1SBoyan Karatotev /* PMUv3 is presumed to be always present */ 314ed108b56SAlexei Fedorov ldr x0, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0] 315ed108b56SAlexei Fedorov msr pmcr_el0, x0 316532ed618SSoby Mathew ldp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0] 317532ed618SSoby Mathew ldp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2] 318532ed618SSoby Mathew ldp x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4] 319532ed618SSoby Mathew ldp x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6] 320532ed618SSoby Mathew ldp x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8] 321532ed618SSoby Mathew ldp x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10] 322532ed618SSoby Mathew ldp x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12] 323532ed618SSoby Mathew ldp x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14] 324ef653d93SJeenu Viswambharan ldp x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16] 325532ed618SSoby Mathew ldp x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18] 326532ed618SSoby Mathew ldp x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20] 327532ed618SSoby Mathew ldp x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22] 328532ed618SSoby Mathew ldp x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24] 329532ed618SSoby Mathew ldp x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26] 330ef653d93SJeenu Viswambharan ldr x28, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0] 331ef653d93SJeenu Viswambharan msr sp_el0, x28 332532ed618SSoby Mathew ldp x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28] 333ef653d93SJeenu Viswambharan ret 334ed108b56SAlexei Fedorovendfunc restore_gp_pmcr_pauth_regs 335ef653d93SJeenu Viswambharan 336*59b7c0a0SJayanth Dodderi Chidanand#if ERRATA_SPECULATIVE_AT 337*59b7c0a0SJayanth Dodderi Chidanand/* -------------------------------------------------------------------- 3383b8456bdSManish V Badarkhe * In case of ERRATA_SPECULATIVE_AT, save SCTLR_EL1 and TCR_EL1 3393b8456bdSManish V Badarkhe * registers and update EL1 registers to disable stage1 and stage2 340*59b7c0a0SJayanth Dodderi Chidanand * page table walk. 341*59b7c0a0SJayanth Dodderi Chidanand * -------------------------------------------------------------------- 3423b8456bdSManish V Badarkhe */ 3433b8456bdSManish V Badarkhefunc save_and_update_ptw_el1_sys_regs 3443b8456bdSManish V Badarkhe /* ---------------------------------------------------------- 3453b8456bdSManish V Badarkhe * Save only sctlr_el1 and tcr_el1 registers 3463b8456bdSManish V Badarkhe * ---------------------------------------------------------- 3473b8456bdSManish V Badarkhe */ 3483b8456bdSManish V Badarkhe mrs x29, sctlr_el1 349*59b7c0a0SJayanth Dodderi Chidanand str x29, [sp, #(CTX_ERRATA_SPEC_AT_OFFSET + CTX_ERRATA_SPEC_AT_SCTLR_EL1)] 3503b8456bdSManish V Badarkhe mrs x29, tcr_el1 351*59b7c0a0SJayanth Dodderi Chidanand str x29, [sp, #(CTX_ERRATA_SPEC_AT_OFFSET + CTX_ERRATA_SPEC_AT_TCR_EL1)] 3523b8456bdSManish V Badarkhe 3533b8456bdSManish V Badarkhe /* ------------------------------------------------------------ 3543b8456bdSManish V Badarkhe * Must follow below order in order to disable page table 3553b8456bdSManish V Badarkhe * walk for lower ELs (EL1 and EL0). First step ensures that 3563b8456bdSManish V Badarkhe * page table walk is disabled for stage1 and second step 3573b8456bdSManish V Badarkhe * ensures that page table walker should use TCR_EL1.EPDx 3583b8456bdSManish V Badarkhe * bits to perform address translation. ISB ensures that CPU 3593b8456bdSManish V Badarkhe * does these 2 steps in order. 3603b8456bdSManish V Badarkhe * 3613b8456bdSManish V Badarkhe * 1. Update TCR_EL1.EPDx bits to disable page table walk by 3623b8456bdSManish V Badarkhe * stage1. 3633b8456bdSManish V Badarkhe * 2. Enable MMU bit to avoid identity mapping via stage2 3643b8456bdSManish V Badarkhe * and force TCR_EL1.EPDx to be used by the page table 3653b8456bdSManish V Badarkhe * walker. 3663b8456bdSManish V Badarkhe * ------------------------------------------------------------ 3673b8456bdSManish V Badarkhe */ 3683b8456bdSManish V Badarkhe orr x29, x29, #(TCR_EPD0_BIT) 3693b8456bdSManish V Badarkhe orr x29, x29, #(TCR_EPD1_BIT) 3703b8456bdSManish V Badarkhe msr tcr_el1, x29 3713b8456bdSManish V Badarkhe isb 3723b8456bdSManish V Badarkhe mrs x29, sctlr_el1 3733b8456bdSManish V Badarkhe orr x29, x29, #SCTLR_M_BIT 3743b8456bdSManish V Badarkhe msr sctlr_el1, x29 3753b8456bdSManish V Badarkhe isb 3763b8456bdSManish V Badarkhe ret 3773b8456bdSManish V Badarkheendfunc save_and_update_ptw_el1_sys_regs 3783b8456bdSManish V Badarkhe 379*59b7c0a0SJayanth Dodderi Chidanand#endif /* ERRATA_SPECULATIVE_AT */ 380*59b7c0a0SJayanth Dodderi Chidanand 381461c0a5dSElizabeth Ho/* ----------------------------------------------------------------- 382461c0a5dSElizabeth Ho* The below macro returns the address of the per_world context for 383461c0a5dSElizabeth Ho* the security state, retrieved through "get_security_state" macro. 384461c0a5dSElizabeth Ho* The per_world context address is returned in the register argument. 385461c0a5dSElizabeth Ho* Clobbers: x9, x10 386461c0a5dSElizabeth Ho* ------------------------------------------------------------------ 387461c0a5dSElizabeth Ho*/ 388461c0a5dSElizabeth Ho 389461c0a5dSElizabeth Ho.macro get_per_world_context _reg:req 390461c0a5dSElizabeth Ho ldr x10, [sp, #CTX_EL3STATE_OFFSET + CTX_SCR_EL3] 391461c0a5dSElizabeth Ho get_security_state x9, x10 3924087ed6cSJayanth Dodderi Chidanand mov_imm x10, (CTX_PERWORLD_EL3STATE_END - CTX_CPTR_EL3) 393461c0a5dSElizabeth Ho mul x9, x9, x10 394461c0a5dSElizabeth Ho adrp x10, per_world_context 395461c0a5dSElizabeth Ho add x10, x10, :lo12:per_world_context 396461c0a5dSElizabeth Ho add x9, x9, x10 397461c0a5dSElizabeth Ho mov \_reg, x9 398461c0a5dSElizabeth Ho.endm 399461c0a5dSElizabeth Ho 400ed108b56SAlexei Fedorov/* ------------------------------------------------------------------ 401ed108b56SAlexei Fedorov * This routine assumes that the SP_EL3 is pointing to a valid 402ed108b56SAlexei Fedorov * context structure from where the gp regs and other special 403ed108b56SAlexei Fedorov * registers can be retrieved. 404ed108b56SAlexei Fedorov * ------------------------------------------------------------------ 405532ed618SSoby Mathew */ 406532ed618SSoby Mathewfunc el3_exit 407bb9549baSJan Dabros#if ENABLE_ASSERTIONS 408bb9549baSJan Dabros /* el3_exit assumes SP_EL0 on entry */ 409bb9549baSJan Dabros mrs x17, spsel 410bb9549baSJan Dabros cmp x17, #MODE_SP_EL0 411bb9549baSJan Dabros ASM_ASSERT(eq) 4120ce220afSJayanth Dodderi Chidanand#endif /* ENABLE_ASSERTIONS */ 413bb9549baSJan Dabros 414ed108b56SAlexei Fedorov /* ---------------------------------------------------------- 415ed108b56SAlexei Fedorov * Save the current SP_EL0 i.e. the EL3 runtime stack which 416ed108b56SAlexei Fedorov * will be used for handling the next SMC. 417ed108b56SAlexei Fedorov * Then switch to SP_EL3. 418ed108b56SAlexei Fedorov * ---------------------------------------------------------- 419532ed618SSoby Mathew */ 420532ed618SSoby Mathew mov x17, sp 421ed108b56SAlexei Fedorov msr spsel, #MODE_SP_ELX 422532ed618SSoby Mathew str x17, [sp, #CTX_EL3STATE_OFFSET + CTX_RUNTIME_SP] 423532ed618SSoby Mathew 4240c5e7d1cSMax Shvetsov /* ---------------------------------------------------------- 42568ac5ed0SArunachalam Ganapathy * Restore CPTR_EL3. 4260c5e7d1cSMax Shvetsov * ZCR is only restored if SVE is supported and enabled. 4270c5e7d1cSMax Shvetsov * Synchronization is required before zcr_el3 is addressed. 4280c5e7d1cSMax Shvetsov * ---------------------------------------------------------- 4290c5e7d1cSMax Shvetsov */ 430461c0a5dSElizabeth Ho 431461c0a5dSElizabeth Ho /* The address of the per_world context is stored in x9 */ 432461c0a5dSElizabeth Ho get_per_world_context x9 433461c0a5dSElizabeth Ho 434461c0a5dSElizabeth Ho ldp x19, x20, [x9, #CTX_CPTR_EL3] 4350c5e7d1cSMax Shvetsov msr cptr_el3, x19 4360c5e7d1cSMax Shvetsov 437f0c96a2eSBoyan Karatotev#if IMAGE_BL31 4380c5e7d1cSMax Shvetsov ands x19, x19, #CPTR_EZ_BIT 4390c5e7d1cSMax Shvetsov beq sve_not_enabled 4400c5e7d1cSMax Shvetsov 4410c5e7d1cSMax Shvetsov isb 4420c5e7d1cSMax Shvetsov msr S3_6_C1_C2_0, x20 /* zcr_el3 */ 4430c5e7d1cSMax Shvetsovsve_not_enabled: 444edebefbcSArvind Ram Prakash 445edebefbcSArvind Ram Prakash restore_mpam3_el3 446edebefbcSArvind Ram Prakash 4470ce220afSJayanth Dodderi Chidanand#endif /* IMAGE_BL31 */ 4480c5e7d1cSMax Shvetsov 449fe007b2eSDimitris Papastamos#if IMAGE_BL31 && DYNAMIC_WORKAROUND_CVE_2018_3639 450ed108b56SAlexei Fedorov /* ---------------------------------------------------------- 451ed108b56SAlexei Fedorov * Restore mitigation state as it was on entry to EL3 452ed108b56SAlexei Fedorov * ---------------------------------------------------------- 453ed108b56SAlexei Fedorov */ 454fe007b2eSDimitris Papastamos ldr x17, [sp, #CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_DISABLE] 455ed108b56SAlexei Fedorov cbz x17, 1f 456fe007b2eSDimitris Papastamos blr x17 4574d1ccf0eSAntonio Nino Diaz1: 4580ce220afSJayanth Dodderi Chidanand#endif /* IMAGE_BL31 && DYNAMIC_WORKAROUND_CVE_2018_3639 */ 4590ce220afSJayanth Dodderi Chidanand 4606597fcf1SManish Pandey#if IMAGE_BL31 4616597fcf1SManish Pandey synchronize_errors 4626597fcf1SManish Pandey#endif /* IMAGE_BL31 */ 4630ce220afSJayanth Dodderi Chidanand 464123002f9SJayanth Dodderi Chidanand /* -------------------------------------------------------------- 465123002f9SJayanth Dodderi Chidanand * Restore MDCR_EL3, SPSR_EL3, ELR_EL3 and SCR_EL3 prior to ERET 466123002f9SJayanth Dodderi Chidanand * -------------------------------------------------------------- 467ff1d2ef3SManish Pandey */ 468ff1d2ef3SManish Pandey ldp x16, x17, [sp, #CTX_EL3STATE_OFFSET + CTX_SPSR_EL3] 469123002f9SJayanth Dodderi Chidanand ldr x18, [sp, #CTX_EL3STATE_OFFSET + CTX_SCR_EL3] 470123002f9SJayanth Dodderi Chidanand ldr x19, [sp, #CTX_EL3STATE_OFFSET + CTX_MDCR_EL3] 471ff1d2ef3SManish Pandey msr spsr_el3, x16 472ff1d2ef3SManish Pandey msr elr_el3, x17 473123002f9SJayanth Dodderi Chidanand msr scr_el3, x18 474123002f9SJayanth Dodderi Chidanand msr mdcr_el3, x19 475ff1d2ef3SManish Pandey 476ff1d2ef3SManish Pandey restore_ptw_el1_sys_regs 477ff1d2ef3SManish Pandey 478ff1d2ef3SManish Pandey /* ---------------------------------------------------------- 479ff1d2ef3SManish Pandey * Restore general purpose (including x30), PMCR_EL0 and 480ff1d2ef3SManish Pandey * ARMv8.3-PAuth registers. 481ff1d2ef3SManish Pandey * Exit EL3 via ERET to a lower exception level. 482ff1d2ef3SManish Pandey * ---------------------------------------------------------- 483ff1d2ef3SManish Pandey */ 484ff1d2ef3SManish Pandey bl restore_gp_pmcr_pauth_regs 485ff1d2ef3SManish Pandey ldr x30, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_LR] 486ff1d2ef3SManish Pandey 487c2d32a5fSMadhukar Pappireddy#ifdef IMAGE_BL31 488d04c04a4SManish Pandey /* Clear the EL3 flag as we are exiting el3 */ 489d04c04a4SManish Pandey str xzr, [sp, #CTX_EL3STATE_OFFSET + CTX_NESTED_EA_FLAG] 4900ce220afSJayanth Dodderi Chidanand#endif /* IMAGE_BL31 */ 4910ce220afSJayanth Dodderi Chidanand 492f461fe34SAnthony Steinhauser exception_return 4935283962eSAntonio Nino Diaz 494532ed618SSoby Mathewendfunc el3_exit 495