blob: 221f33e065837895baded3c8e3895e89d0f7c048 [file] [log] [blame]
Achin Gupta9ac63c52014-01-16 12:08:03 +00001/*
Max Shvetsovbdf502d2020-02-25 13:56:19 +00002 * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved.
Achin Gupta9ac63c52014-01-16 12:08:03 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta9ac63c52014-01-16 12:08:03 +00005 */
6
Dan Handley2bd4ef22014-04-09 13:14:54 +01007#include <arch.h>
Andrew Thoelke38bde412014-03-18 13:46:55 +00008#include <asm_macros.S>
Jan Dabrosfa015982019-12-02 13:30:03 +01009#include <assert_macros.S>
Dan Handley2bd4ef22014-04-09 13:14:54 +010010#include <context.h>
Achin Gupta9ac63c52014-01-16 12:08:03 +000011
Max Shvetsovbdf502d2020-02-25 13:56:19 +000012#if CTX_INCLUDE_EL2_REGS
13 .global el2_sysregs_context_save
14 .global el2_sysregs_context_restore
15#endif
16
Yatharth Kochar6c0566c2015-10-02 17:56:48 +010017 .global el1_sysregs_context_save
18 .global el1_sysregs_context_restore
19#if CTX_INCLUDE_FPREGS
20 .global fpregs_context_save
21 .global fpregs_context_restore
22#endif
Alexei Fedorovf41355c2019-09-13 14:11:59 +010023 .global save_gp_pmcr_pauth_regs
24 .global restore_gp_pmcr_pauth_regs
Yatharth Kochar6c0566c2015-10-02 17:56:48 +010025 .global el3_exit
26
Max Shvetsovbdf502d2020-02-25 13:56:19 +000027#if CTX_INCLUDE_EL2_REGS
28
29/* -----------------------------------------------------
30 * The following function strictly follows the AArch64
31 * PCS to use x9-x17 (temporary caller-saved registers)
Max Shvetsovc9e2c922020-02-17 16:15:47 +000032 * to save EL2 system register context. It assumes that
33 * 'x0' is pointing to a 'el2_sys_regs' structure where
Max Shvetsovbdf502d2020-02-25 13:56:19 +000034 * the register context will be saved.
Max Shvetsovc9e2c922020-02-17 16:15:47 +000035 *
36 * The following registers are not added.
37 * AMEVCNTVOFF0<n>_EL2
38 * AMEVCNTVOFF1<n>_EL2
39 * ICH_AP0R<n>_EL2
40 * ICH_AP1R<n>_EL2
41 * ICH_LR<n>_EL2
Max Shvetsovbdf502d2020-02-25 13:56:19 +000042 * -----------------------------------------------------
43 */
Max Shvetsovbdf502d2020-02-25 13:56:19 +000044
Max Shvetsovc9e2c922020-02-17 16:15:47 +000045func el2_sysregs_context_save
Max Shvetsovbdf502d2020-02-25 13:56:19 +000046 mrs x9, actlr_el2
Max Shvetsovc9e2c922020-02-17 16:15:47 +000047 mrs x10, afsr0_el2
48 stp x9, x10, [x0, #CTX_ACTLR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000049
Max Shvetsovc9e2c922020-02-17 16:15:47 +000050 mrs x11, afsr1_el2
51 mrs x12, amair_el2
52 stp x11, x12, [x0, #CTX_AFSR1_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000053
Max Shvetsovc9e2c922020-02-17 16:15:47 +000054 mrs x13, cnthctl_el2
55 mrs x14, cnthp_ctl_el2
56 stp x13, x14, [x0, #CTX_CNTHCTL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000057
Max Shvetsovc9e2c922020-02-17 16:15:47 +000058 mrs x15, cnthp_cval_el2
59 mrs x16, cnthp_tval_el2
60 stp x15, x16, [x0, #CTX_CNTHP_CVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000061
Max Shvetsovc9e2c922020-02-17 16:15:47 +000062 mrs x17, cntvoff_el2
Max Shvetsovbdf502d2020-02-25 13:56:19 +000063 mrs x9, cptr_el2
Max Shvetsovc9e2c922020-02-17 16:15:47 +000064 stp x17, x9, [x0, #CTX_CNTVOFF_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000065
Max Shvetsovc9e2c922020-02-17 16:15:47 +000066 mrs x10, dbgvcr32_el2
67 mrs x11, elr_el2
68 stp x10, x11, [x0, #CTX_DBGVCR32_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000069
Max Shvetsovc9e2c922020-02-17 16:15:47 +000070 mrs x14, esr_el2
71 mrs x15, far_el2
72 stp x14, x15, [x0, #CTX_ESR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000073
Max Shvetsovc9e2c922020-02-17 16:15:47 +000074 mrs x16, fpexc32_el2
75 mrs x17, hacr_el2
76 stp x16, x17, [x0, #CTX_FPEXC32_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000077
78 mrs x9, hcr_el2
Max Shvetsovc9e2c922020-02-17 16:15:47 +000079 mrs x10, hpfar_el2
80 stp x9, x10, [x0, #CTX_HCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000081
Max Shvetsovc9e2c922020-02-17 16:15:47 +000082 mrs x11, hstr_el2
83 mrs x12, ICC_SRE_EL2
84 stp x11, x12, [x0, #CTX_HSTR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000085
Max Shvetsovc9e2c922020-02-17 16:15:47 +000086 mrs x13, ICH_HCR_EL2
87 mrs x14, ICH_VMCR_EL2
88 stp x13, x14, [x0, #CTX_ICH_HCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000089
Max Shvetsovc9e2c922020-02-17 16:15:47 +000090 mrs x15, mair_el2
91 mrs x16, mdcr_el2
92 stp x15, x16, [x0, #CTX_MAIR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000093
Max Shvetsovc9e2c922020-02-17 16:15:47 +000094 mrs x17, PMSCR_EL2
95 mrs x9, sctlr_el2
96 stp x17, x9, [x0, #CTX_PMSCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000097
Max Shvetsovc9e2c922020-02-17 16:15:47 +000098 mrs x10, spsr_el2
99 mrs x11, sp_el2
100 stp x10, x11, [x0, #CTX_SPSR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000101
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000102 mrs x12, tcr_el2
Olivier Deprez19628912020-03-20 14:22:05 +0100103 mrs x13, tpidr_el2
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000104 stp x12, x13, [x0, #CTX_TCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000105
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000106 mrs x14, ttbr0_el2
107 mrs x15, vbar_el2
108 stp x14, x15, [x0, #CTX_TTBR0_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000109
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000110 mrs x16, vmpidr_el2
111 mrs x17, vpidr_el2
112 stp x16, x17, [x0, #CTX_VMPIDR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000113
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000114 mrs x9, vtcr_el2
115 mrs x10, vttbr_el2
116 stp x9, x10, [x0, #CTX_VTCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000117
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000118#if CTX_INCLUDE_MTE_REGS
119 mrs x11, TFSR_EL2
120 str x11, [x0, #CTX_TFSR_EL2]
121#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000122
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000123#if ENABLE_MPAM_FOR_LOWER_ELS
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000124 mrs x9, MPAM2_EL2
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000125 mrs x10, MPAMHCR_EL2
126 stp x9, x10, [x0, #CTX_MPAM2_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000127
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000128 mrs x11, MPAMVPM0_EL2
129 mrs x12, MPAMVPM1_EL2
130 stp x11, x12, [x0, #CTX_MPAMVPM0_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000131
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000132 mrs x13, MPAMVPM2_EL2
133 mrs x14, MPAMVPM3_EL2
134 stp x13, x14, [x0, #CTX_MPAMVPM2_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000135
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000136 mrs x15, MPAMVPM4_EL2
137 mrs x16, MPAMVPM5_EL2
138 stp x15, x16, [x0, #CTX_MPAMVPM4_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000139
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000140 mrs x17, MPAMVPM6_EL2
141 mrs x9, MPAMVPM7_EL2
142 stp x17, x9, [x0, #CTX_MPAMVPM6_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000143
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000144 mrs x10, MPAMVPMV_EL2
145 str x10, [x0, #CTX_MPAMVPMV_EL2]
146#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000147
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000148
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000149#if ARM_ARCH_AT_LEAST(8, 6)
150 mrs x11, HAFGRTR_EL2
151 mrs x12, HDFGRTR_EL2
152 stp x11, x12, [x0, #CTX_HAFGRTR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000153
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000154 mrs x13, HDFGWTR_EL2
155 mrs x14, HFGITR_EL2
156 stp x13, x14, [x0, #CTX_HDFGWTR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000157
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000158 mrs x15, HFGRTR_EL2
159 mrs x16, HFGWTR_EL2
160 stp x15, x16, [x0, #CTX_HFGRTR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000161
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000162 mrs x17, CNTPOFF_EL2
163 str x17, [x0, #CTX_CNTPOFF_EL2]
164#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000165
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000166#if ARM_ARCH_AT_LEAST(8, 4)
167 mrs x9, cnthps_ctl_el2
168 mrs x10, cnthps_cval_el2
169 stp x9, x10, [x0, #CTX_CNTHPS_CTL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000170
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000171 mrs x11, cnthps_tval_el2
172 mrs x12, cnthvs_ctl_el2
173 stp x11, x12, [x0, #CTX_CNTHPS_TVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000174
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000175 mrs x13, cnthvs_cval_el2
176 mrs x14, cnthvs_tval_el2
177 stp x13, x14, [x0, #CTX_CNTHVS_CVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000178
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000179 mrs x15, cnthv_ctl_el2
180 mrs x16, cnthv_cval_el2
181 stp x15, x16, [x0, #CTX_CNTHV_CTL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000182
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000183 mrs x17, cnthv_tval_el2
184 mrs x9, contextidr_el2
185 stp x17, x9, [x0, #CTX_CNTHV_TVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000186
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000187 mrs x10, sder32_el2
188 str x10, [x0, #CTX_SDER32_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000189
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000190 mrs x11, ttbr1_el2
191 str x11, [x0, #CTX_TTBR1_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000192
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000193 mrs x12, vdisr_el2
194 str x12, [x0, #CTX_VDISR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000195
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000196 mrs x13, vncr_el2
197 str x13, [x0, #CTX_VNCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000198
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000199 mrs x14, vsesr_el2
200 str x14, [x0, #CTX_VSESR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000201
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000202 mrs x15, vstcr_el2
203 str x15, [x0, #CTX_VSTCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000204
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000205 mrs x16, vsttbr_el2
206 str x16, [x0, #CTX_VSTTBR_EL2]
Olivier Deprez19628912020-03-20 14:22:05 +0100207
208 mrs x17, TRFCR_EL2
209 str x17, [x0, #CTX_TRFCR_EL2]
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000210#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000211
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000212#if ARM_ARCH_AT_LEAST(8, 5)
Olivier Deprez19628912020-03-20 14:22:05 +0100213 mrs x9, scxtnum_el2
214 str x9, [x0, #CTX_SCXTNUM_EL2]
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000215#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000216
217 ret
218endfunc el2_sysregs_context_save
219
220/* -----------------------------------------------------
221 * The following function strictly follows the AArch64
222 * PCS to use x9-x17 (temporary caller-saved registers)
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000223 * to restore EL2 system register context. It assumes
224 * that 'x0' is pointing to a 'el2_sys_regs' structure
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000225 * from where the register context will be restored
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000226
227 * The following registers are not restored
228 * AMEVCNTVOFF0<n>_EL2
229 * AMEVCNTVOFF1<n>_EL2
230 * ICH_AP0R<n>_EL2
231 * ICH_AP1R<n>_EL2
232 * ICH_LR<n>_EL2
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000233 * -----------------------------------------------------
234 */
235func el2_sysregs_context_restore
236
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000237 ldp x9, x10, [x0, #CTX_ACTLR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000238 msr actlr_el2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000239 msr afsr0_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000240
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000241 ldp x11, x12, [x0, #CTX_AFSR1_EL2]
242 msr afsr1_el2, x11
243 msr amair_el2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000244
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000245 ldp x13, x14, [x0, #CTX_CNTHCTL_EL2]
246 msr cnthctl_el2, x13
247 msr cnthp_ctl_el2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000248
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000249 ldp x15, x16, [x0, #CTX_CNTHP_CVAL_EL2]
250 msr cnthp_cval_el2, x15
251 msr cnthp_tval_el2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000252
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000253 ldp x17, x9, [x0, #CTX_CNTVOFF_EL2]
254 msr cntvoff_el2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000255 msr cptr_el2, x9
256
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000257 ldp x10, x11, [x0, #CTX_DBGVCR32_EL2]
258 msr dbgvcr32_el2, x10
259 msr elr_el2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000260
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000261 ldp x14, x15, [x0, #CTX_ESR_EL2]
262 msr esr_el2, x14
263 msr far_el2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000264
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000265 ldp x16, x17, [x0, #CTX_FPEXC32_EL2]
266 msr fpexc32_el2, x16
267 msr hacr_el2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000268
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000269 ldp x9, x10, [x0, #CTX_HCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000270 msr hcr_el2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000271 msr hpfar_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000272
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000273 ldp x11, x12, [x0, #CTX_HSTR_EL2]
274 msr hstr_el2, x11
275 msr ICC_SRE_EL2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000276
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000277 ldp x13, x14, [x0, #CTX_ICH_HCR_EL2]
278 msr ICH_HCR_EL2, x13
279 msr ICH_VMCR_EL2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000280
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000281 ldp x15, x16, [x0, #CTX_MAIR_EL2]
282 msr mair_el2, x15
283 msr mdcr_el2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000284
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000285 ldp x17, x9, [x0, #CTX_PMSCR_EL2]
286 msr PMSCR_EL2, x17
287 msr sctlr_el2, x9
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000288
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000289 ldp x10, x11, [x0, #CTX_SPSR_EL2]
290 msr spsr_el2, x10
291 msr sp_el2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000292
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000293 ldp x12, x13, [x0, #CTX_TCR_EL2]
294 msr tcr_el2, x12
Olivier Deprez19628912020-03-20 14:22:05 +0100295 msr tpidr_el2, x13
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000296
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000297 ldp x14, x15, [x0, #CTX_TTBR0_EL2]
298 msr ttbr0_el2, x14
299 msr vbar_el2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000300
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000301 ldp x16, x17, [x0, #CTX_VMPIDR_EL2]
302 msr vmpidr_el2, x16
303 msr vpidr_el2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000304
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000305 ldp x9, x10, [x0, #CTX_VTCR_EL2]
306 msr vtcr_el2, x9
307 msr vttbr_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000308
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000309#if CTX_INCLUDE_MTE_REGS
310 ldr x11, [x0, #CTX_TFSR_EL2]
311 msr TFSR_EL2, x11
312#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000313
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000314#if ENABLE_MPAM_FOR_LOWER_ELS
315 ldp x9, x10, [x0, #CTX_MPAM2_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000316 msr MPAM2_EL2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000317 msr MPAMHCR_EL2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000318
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000319 ldp x11, x12, [x0, #CTX_MPAMVPM0_EL2]
320 msr MPAMVPM0_EL2, x11
321 msr MPAMVPM1_EL2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000322
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000323 ldp x13, x14, [x0, #CTX_MPAMVPM2_EL2]
324 msr MPAMVPM2_EL2, x13
325 msr MPAMVPM3_EL2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000326
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000327 ldp x15, x16, [x0, #CTX_MPAMVPM4_EL2]
328 msr MPAMVPM4_EL2, x15
329 msr MPAMVPM5_EL2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000330
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000331 ldp x17, x9, [x0, #CTX_MPAMVPM6_EL2]
332 msr MPAMVPM6_EL2, x17
333 msr MPAMVPM7_EL2, x9
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000334
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000335 ldr x10, [x0, #CTX_MPAMVPMV_EL2]
336 msr MPAMVPMV_EL2, x10
337#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000338
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000339#if ARM_ARCH_AT_LEAST(8, 6)
340 ldp x11, x12, [x0, #CTX_HAFGRTR_EL2]
341 msr HAFGRTR_EL2, x11
342 msr HDFGRTR_EL2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000343
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000344 ldp x13, x14, [x0, #CTX_HDFGWTR_EL2]
345 msr HDFGWTR_EL2, x13
346 msr HFGITR_EL2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000347
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000348 ldp x15, x16, [x0, #CTX_HFGRTR_EL2]
349 msr HFGRTR_EL2, x15
350 msr HFGWTR_EL2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000351
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000352 ldr x17, [x0, #CTX_CNTPOFF_EL2]
353 msr CNTPOFF_EL2, x17
354#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000355
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000356#if ARM_ARCH_AT_LEAST(8, 4)
357 ldp x9, x10, [x0, #CTX_CNTHPS_CTL_EL2]
358 msr cnthps_ctl_el2, x9
359 msr cnthps_cval_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000360
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000361 ldp x11, x12, [x0, #CTX_CNTHPS_TVAL_EL2]
362 msr cnthps_tval_el2, x11
363 msr cnthvs_ctl_el2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000364
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000365 ldp x13, x14, [x0, #CTX_CNTHVS_CVAL_EL2]
366 msr cnthvs_cval_el2, x13
367 msr cnthvs_tval_el2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000368
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000369 ldp x15, x16, [x0, #CTX_CNTHV_CTL_EL2]
370 msr cnthv_ctl_el2, x15
371 msr cnthv_cval_el2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000372
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000373 ldp x17, x9, [x0, #CTX_CNTHV_TVAL_EL2]
374 msr cnthv_tval_el2, x17
375 msr contextidr_el2, x9
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000376
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000377 ldr x10, [x0, #CTX_SDER32_EL2]
378 msr sder32_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000379
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000380 ldr x11, [x0, #CTX_TTBR1_EL2]
381 msr ttbr1_el2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000382
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000383 ldr x12, [x0, #CTX_VDISR_EL2]
384 msr vdisr_el2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000385
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000386 ldr x13, [x0, #CTX_VNCR_EL2]
387 msr vncr_el2, x13
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000388
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000389 ldr x14, [x0, #CTX_VSESR_EL2]
390 msr vsesr_el2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000391
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000392 ldr x15, [x0, #CTX_VSTCR_EL2]
393 msr vstcr_el2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000394
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000395 ldr x16, [x0, #CTX_VSTTBR_EL2]
396 msr vsttbr_el2, x16
Olivier Deprez19628912020-03-20 14:22:05 +0100397
398 ldr x17, [x0, #CTX_TRFCR_EL2]
399 msr TRFCR_EL2, x17
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000400#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000401
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000402#if ARM_ARCH_AT_LEAST(8, 5)
Olivier Deprez19628912020-03-20 14:22:05 +0100403 ldr x9, [x0, #CTX_SCXTNUM_EL2]
404 msr scxtnum_el2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000405#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000406
407 ret
408endfunc el2_sysregs_context_restore
409
410#endif /* CTX_INCLUDE_EL2_REGS */
411
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100412/* ------------------------------------------------------------------
413 * The following function strictly follows the AArch64 PCS to use
414 * x9-x17 (temporary caller-saved registers) to save EL1 system
415 * register context. It assumes that 'x0' is pointing to a
416 * 'el1_sys_regs' structure where the register context will be saved.
417 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000418 */
Andrew Thoelke38bde412014-03-18 13:46:55 +0000419func el1_sysregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000420
421 mrs x9, spsr_el1
422 mrs x10, elr_el1
423 stp x9, x10, [x0, #CTX_SPSR_EL1]
424
Achin Gupta9ac63c52014-01-16 12:08:03 +0000425 mrs x15, sctlr_el1
426 mrs x16, actlr_el1
427 stp x15, x16, [x0, #CTX_SCTLR_EL1]
428
429 mrs x17, cpacr_el1
430 mrs x9, csselr_el1
431 stp x17, x9, [x0, #CTX_CPACR_EL1]
432
433 mrs x10, sp_el1
434 mrs x11, esr_el1
435 stp x10, x11, [x0, #CTX_SP_EL1]
436
437 mrs x12, ttbr0_el1
438 mrs x13, ttbr1_el1
439 stp x12, x13, [x0, #CTX_TTBR0_EL1]
440
441 mrs x14, mair_el1
442 mrs x15, amair_el1
443 stp x14, x15, [x0, #CTX_MAIR_EL1]
444
445 mrs x16, tcr_el1
446 mrs x17, tpidr_el1
447 stp x16, x17, [x0, #CTX_TCR_EL1]
448
449 mrs x9, tpidr_el0
450 mrs x10, tpidrro_el0
451 stp x9, x10, [x0, #CTX_TPIDR_EL0]
452
Achin Gupta9ac63c52014-01-16 12:08:03 +0000453 mrs x13, par_el1
454 mrs x14, far_el1
455 stp x13, x14, [x0, #CTX_PAR_EL1]
456
457 mrs x15, afsr0_el1
458 mrs x16, afsr1_el1
459 stp x15, x16, [x0, #CTX_AFSR0_EL1]
460
461 mrs x17, contextidr_el1
462 mrs x9, vbar_el1
463 stp x17, x9, [x0, #CTX_CONTEXTIDR_EL1]
464
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100465 /* Save AArch32 system registers if the build has instructed so */
466#if CTX_INCLUDE_AARCH32_REGS
467 mrs x11, spsr_abt
468 mrs x12, spsr_und
469 stp x11, x12, [x0, #CTX_SPSR_ABT]
470
471 mrs x13, spsr_irq
472 mrs x14, spsr_fiq
473 stp x13, x14, [x0, #CTX_SPSR_IRQ]
474
475 mrs x15, dacr32_el2
476 mrs x16, ifsr32_el2
477 stp x15, x16, [x0, #CTX_DACR32_EL2]
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100478#endif
479
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100480 /* Save NS timer registers if the build has instructed so */
481#if NS_TIMER_SWITCH
Achin Gupta9ac63c52014-01-16 12:08:03 +0000482 mrs x10, cntp_ctl_el0
483 mrs x11, cntp_cval_el0
484 stp x10, x11, [x0, #CTX_CNTP_CTL_EL0]
485
486 mrs x12, cntv_ctl_el0
487 mrs x13, cntv_cval_el0
488 stp x12, x13, [x0, #CTX_CNTV_CTL_EL0]
489
490 mrs x14, cntkctl_el1
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100491 str x14, [x0, #CTX_CNTKCTL_EL1]
492#endif
493
Justin Chadwell1c7c13a2019-07-18 14:25:33 +0100494 /* Save MTE system registers if the build has instructed so */
495#if CTX_INCLUDE_MTE_REGS
496 mrs x15, TFSRE0_EL1
497 mrs x16, TFSR_EL1
498 stp x15, x16, [x0, #CTX_TFSRE0_EL1]
499
500 mrs x9, RGSR_EL1
501 mrs x10, GCR_EL1
502 stp x9, x10, [x0, #CTX_RGSR_EL1]
503#endif
504
Achin Gupta9ac63c52014-01-16 12:08:03 +0000505 ret
Kévin Petita877c252015-03-24 14:03:57 +0000506endfunc el1_sysregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000507
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100508/* ------------------------------------------------------------------
509 * The following function strictly follows the AArch64 PCS to use
510 * x9-x17 (temporary caller-saved registers) to restore EL1 system
511 * register context. It assumes that 'x0' is pointing to a
512 * 'el1_sys_regs' structure from where the register context will be
513 * restored
514 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000515 */
Andrew Thoelke38bde412014-03-18 13:46:55 +0000516func el1_sysregs_context_restore
Achin Gupta9ac63c52014-01-16 12:08:03 +0000517
518 ldp x9, x10, [x0, #CTX_SPSR_EL1]
519 msr spsr_el1, x9
520 msr elr_el1, x10
521
Achin Gupta9ac63c52014-01-16 12:08:03 +0000522 ldp x15, x16, [x0, #CTX_SCTLR_EL1]
523 msr sctlr_el1, x15
524 msr actlr_el1, x16
525
526 ldp x17, x9, [x0, #CTX_CPACR_EL1]
527 msr cpacr_el1, x17
528 msr csselr_el1, x9
529
530 ldp x10, x11, [x0, #CTX_SP_EL1]
531 msr sp_el1, x10
532 msr esr_el1, x11
533
534 ldp x12, x13, [x0, #CTX_TTBR0_EL1]
535 msr ttbr0_el1, x12
536 msr ttbr1_el1, x13
537
538 ldp x14, x15, [x0, #CTX_MAIR_EL1]
539 msr mair_el1, x14
540 msr amair_el1, x15
541
542 ldp x16, x17, [x0, #CTX_TCR_EL1]
543 msr tcr_el1, x16
544 msr tpidr_el1, x17
545
546 ldp x9, x10, [x0, #CTX_TPIDR_EL0]
547 msr tpidr_el0, x9
548 msr tpidrro_el0, x10
549
Achin Gupta9ac63c52014-01-16 12:08:03 +0000550 ldp x13, x14, [x0, #CTX_PAR_EL1]
551 msr par_el1, x13
552 msr far_el1, x14
553
554 ldp x15, x16, [x0, #CTX_AFSR0_EL1]
555 msr afsr0_el1, x15
556 msr afsr1_el1, x16
557
558 ldp x17, x9, [x0, #CTX_CONTEXTIDR_EL1]
559 msr contextidr_el1, x17
560 msr vbar_el1, x9
561
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100562 /* Restore AArch32 system registers if the build has instructed so */
563#if CTX_INCLUDE_AARCH32_REGS
564 ldp x11, x12, [x0, #CTX_SPSR_ABT]
565 msr spsr_abt, x11
566 msr spsr_und, x12
567
568 ldp x13, x14, [x0, #CTX_SPSR_IRQ]
569 msr spsr_irq, x13
570 msr spsr_fiq, x14
571
572 ldp x15, x16, [x0, #CTX_DACR32_EL2]
573 msr dacr32_el2, x15
574 msr ifsr32_el2, x16
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100575#endif
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100576 /* Restore NS timer registers if the build has instructed so */
577#if NS_TIMER_SWITCH
Achin Gupta9ac63c52014-01-16 12:08:03 +0000578 ldp x10, x11, [x0, #CTX_CNTP_CTL_EL0]
579 msr cntp_ctl_el0, x10
580 msr cntp_cval_el0, x11
581
582 ldp x12, x13, [x0, #CTX_CNTV_CTL_EL0]
583 msr cntv_ctl_el0, x12
584 msr cntv_cval_el0, x13
585
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100586 ldr x14, [x0, #CTX_CNTKCTL_EL1]
Achin Gupta9ac63c52014-01-16 12:08:03 +0000587 msr cntkctl_el1, x14
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100588#endif
Justin Chadwell1c7c13a2019-07-18 14:25:33 +0100589 /* Restore MTE system registers if the build has instructed so */
590#if CTX_INCLUDE_MTE_REGS
591 ldp x11, x12, [x0, #CTX_TFSRE0_EL1]
592 msr TFSRE0_EL1, x11
593 msr TFSR_EL1, x12
594
595 ldp x13, x14, [x0, #CTX_RGSR_EL1]
596 msr RGSR_EL1, x13
597 msr GCR_EL1, x14
598#endif
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100599
Achin Gupta9ac63c52014-01-16 12:08:03 +0000600 /* No explict ISB required here as ERET covers it */
Achin Gupta9ac63c52014-01-16 12:08:03 +0000601 ret
Kévin Petita877c252015-03-24 14:03:57 +0000602endfunc el1_sysregs_context_restore
Achin Gupta9ac63c52014-01-16 12:08:03 +0000603
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100604/* ------------------------------------------------------------------
605 * The following function follows the aapcs_64 strictly to use
606 * x9-x17 (temporary caller-saved registers according to AArch64 PCS)
607 * to save floating point register context. It assumes that 'x0' is
608 * pointing to a 'fp_regs' structure where the register context will
Achin Gupta9ac63c52014-01-16 12:08:03 +0000609 * be saved.
610 *
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100611 * Access to VFP registers will trap if CPTR_EL3.TFP is set.
612 * However currently we don't use VFP registers nor set traps in
613 * Trusted Firmware, and assume it's cleared.
Achin Gupta9ac63c52014-01-16 12:08:03 +0000614 *
615 * TODO: Revisit when VFP is used in secure world
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100616 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000617 */
Juan Castillo258e94f2014-06-25 17:26:36 +0100618#if CTX_INCLUDE_FPREGS
Andrew Thoelke38bde412014-03-18 13:46:55 +0000619func fpregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000620 stp q0, q1, [x0, #CTX_FP_Q0]
621 stp q2, q3, [x0, #CTX_FP_Q2]
622 stp q4, q5, [x0, #CTX_FP_Q4]
623 stp q6, q7, [x0, #CTX_FP_Q6]
624 stp q8, q9, [x0, #CTX_FP_Q8]
625 stp q10, q11, [x0, #CTX_FP_Q10]
626 stp q12, q13, [x0, #CTX_FP_Q12]
627 stp q14, q15, [x0, #CTX_FP_Q14]
628 stp q16, q17, [x0, #CTX_FP_Q16]
629 stp q18, q19, [x0, #CTX_FP_Q18]
630 stp q20, q21, [x0, #CTX_FP_Q20]
631 stp q22, q23, [x0, #CTX_FP_Q22]
632 stp q24, q25, [x0, #CTX_FP_Q24]
633 stp q26, q27, [x0, #CTX_FP_Q26]
634 stp q28, q29, [x0, #CTX_FP_Q28]
635 stp q30, q31, [x0, #CTX_FP_Q30]
636
637 mrs x9, fpsr
638 str x9, [x0, #CTX_FP_FPSR]
639
640 mrs x10, fpcr
641 str x10, [x0, #CTX_FP_FPCR]
642
David Cunadod1a1fd42017-10-20 11:30:57 +0100643#if CTX_INCLUDE_AARCH32_REGS
644 mrs x11, fpexc32_el2
645 str x11, [x0, #CTX_FP_FPEXC32_EL2]
646#endif
Achin Gupta9ac63c52014-01-16 12:08:03 +0000647 ret
Kévin Petita877c252015-03-24 14:03:57 +0000648endfunc fpregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000649
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100650/* ------------------------------------------------------------------
651 * The following function follows the aapcs_64 strictly to use x9-x17
652 * (temporary caller-saved registers according to AArch64 PCS) to
653 * restore floating point register context. It assumes that 'x0' is
654 * pointing to a 'fp_regs' structure from where the register context
Achin Gupta9ac63c52014-01-16 12:08:03 +0000655 * will be restored.
656 *
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100657 * Access to VFP registers will trap if CPTR_EL3.TFP is set.
658 * However currently we don't use VFP registers nor set traps in
659 * Trusted Firmware, and assume it's cleared.
Achin Gupta9ac63c52014-01-16 12:08:03 +0000660 *
661 * TODO: Revisit when VFP is used in secure world
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100662 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000663 */
Andrew Thoelke38bde412014-03-18 13:46:55 +0000664func fpregs_context_restore
Achin Gupta9ac63c52014-01-16 12:08:03 +0000665 ldp q0, q1, [x0, #CTX_FP_Q0]
666 ldp q2, q3, [x0, #CTX_FP_Q2]
667 ldp q4, q5, [x0, #CTX_FP_Q4]
668 ldp q6, q7, [x0, #CTX_FP_Q6]
669 ldp q8, q9, [x0, #CTX_FP_Q8]
670 ldp q10, q11, [x0, #CTX_FP_Q10]
671 ldp q12, q13, [x0, #CTX_FP_Q12]
672 ldp q14, q15, [x0, #CTX_FP_Q14]
673 ldp q16, q17, [x0, #CTX_FP_Q16]
674 ldp q18, q19, [x0, #CTX_FP_Q18]
675 ldp q20, q21, [x0, #CTX_FP_Q20]
676 ldp q22, q23, [x0, #CTX_FP_Q22]
677 ldp q24, q25, [x0, #CTX_FP_Q24]
678 ldp q26, q27, [x0, #CTX_FP_Q26]
679 ldp q28, q29, [x0, #CTX_FP_Q28]
680 ldp q30, q31, [x0, #CTX_FP_Q30]
681
682 ldr x9, [x0, #CTX_FP_FPSR]
683 msr fpsr, x9
684
Soby Mathewe77e1162015-12-03 09:42:50 +0000685 ldr x10, [x0, #CTX_FP_FPCR]
Achin Gupta9ac63c52014-01-16 12:08:03 +0000686 msr fpcr, x10
687
David Cunadod1a1fd42017-10-20 11:30:57 +0100688#if CTX_INCLUDE_AARCH32_REGS
689 ldr x11, [x0, #CTX_FP_FPEXC32_EL2]
690 msr fpexc32_el2, x11
691#endif
Achin Gupta9ac63c52014-01-16 12:08:03 +0000692 /*
693 * No explict ISB required here as ERET to
Sandrine Bailleuxf4119ec2015-12-17 13:58:58 +0000694 * switch to secure EL1 or non-secure world
Achin Gupta9ac63c52014-01-16 12:08:03 +0000695 * covers it
696 */
697
698 ret
Kévin Petita877c252015-03-24 14:03:57 +0000699endfunc fpregs_context_restore
Juan Castillo258e94f2014-06-25 17:26:36 +0100700#endif /* CTX_INCLUDE_FPREGS */
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100701
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100702/* ------------------------------------------------------------------
703 * The following function is used to save and restore all the general
704 * purpose and ARMv8.3-PAuth (if enabled) registers.
705 * It also checks if Secure Cycle Counter is not disabled in MDCR_EL3
706 * when ARMv8.5-PMU is implemented, and if called from Non-secure
707 * state saves PMCR_EL0 and disables Cycle Counter.
708 *
709 * Ideally we would only save and restore the callee saved registers
710 * when a world switch occurs but that type of implementation is more
711 * complex. So currently we will always save and restore these
712 * registers on entry and exit of EL3.
713 * These are not macros to ensure their invocation fits within the 32
714 * instructions per exception vector.
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100715 * clobbers: x18
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100716 * ------------------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100717 */
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100718func save_gp_pmcr_pauth_regs
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100719 stp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0]
720 stp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
721 stp x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4]
722 stp x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6]
723 stp x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8]
724 stp x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10]
725 stp x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12]
726 stp x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14]
727 stp x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16]
728 stp x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18]
729 stp x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20]
730 stp x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22]
731 stp x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24]
732 stp x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26]
733 stp x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28]
734 mrs x18, sp_el0
735 str x18, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0]
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100736
737 /* ----------------------------------------------------------
738 * Check if earlier initialization MDCR_EL3.SCCD to 1 failed,
739 * meaning that ARMv8-PMU is not implemented and PMCR_EL0
740 * should be saved in non-secure context.
741 * ----------------------------------------------------------
742 */
743 mrs x9, mdcr_el3
744 tst x9, #MDCR_SCCD_BIT
745 bne 1f
746
747 /* Secure Cycle Counter is not disabled */
748 mrs x9, pmcr_el0
749
750 /* Check caller's security state */
751 mrs x10, scr_el3
752 tst x10, #SCR_NS_BIT
753 beq 2f
754
755 /* Save PMCR_EL0 if called from Non-secure state */
756 str x9, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0]
757
758 /* Disable cycle counter when event counting is prohibited */
7592: orr x9, x9, #PMCR_EL0_DP_BIT
760 msr pmcr_el0, x9
761 isb
7621:
763#if CTX_INCLUDE_PAUTH_REGS
764 /* ----------------------------------------------------------
765 * Save the ARMv8.3-PAuth keys as they are not banked
766 * by exception level
767 * ----------------------------------------------------------
768 */
769 add x19, sp, #CTX_PAUTH_REGS_OFFSET
770
771 mrs x20, APIAKeyLo_EL1 /* x21:x20 = APIAKey */
772 mrs x21, APIAKeyHi_EL1
773 mrs x22, APIBKeyLo_EL1 /* x23:x22 = APIBKey */
774 mrs x23, APIBKeyHi_EL1
775 mrs x24, APDAKeyLo_EL1 /* x25:x24 = APDAKey */
776 mrs x25, APDAKeyHi_EL1
777 mrs x26, APDBKeyLo_EL1 /* x27:x26 = APDBKey */
778 mrs x27, APDBKeyHi_EL1
779 mrs x28, APGAKeyLo_EL1 /* x29:x28 = APGAKey */
780 mrs x29, APGAKeyHi_EL1
781
782 stp x20, x21, [x19, #CTX_PACIAKEY_LO]
783 stp x22, x23, [x19, #CTX_PACIBKEY_LO]
784 stp x24, x25, [x19, #CTX_PACDAKEY_LO]
785 stp x26, x27, [x19, #CTX_PACDBKEY_LO]
786 stp x28, x29, [x19, #CTX_PACGAKEY_LO]
787#endif /* CTX_INCLUDE_PAUTH_REGS */
788
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100789 ret
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100790endfunc save_gp_pmcr_pauth_regs
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100791
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100792/* ------------------------------------------------------------------
793 * This function restores ARMv8.3-PAuth (if enabled) and all general
794 * purpose registers except x30 from the CPU context.
795 * x30 register must be explicitly restored by the caller.
796 * ------------------------------------------------------------------
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000797 */
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100798func restore_gp_pmcr_pauth_regs
799#if CTX_INCLUDE_PAUTH_REGS
800 /* Restore the ARMv8.3 PAuth keys */
801 add x10, sp, #CTX_PAUTH_REGS_OFFSET
802
803 ldp x0, x1, [x10, #CTX_PACIAKEY_LO] /* x1:x0 = APIAKey */
804 ldp x2, x3, [x10, #CTX_PACIBKEY_LO] /* x3:x2 = APIBKey */
805 ldp x4, x5, [x10, #CTX_PACDAKEY_LO] /* x5:x4 = APDAKey */
806 ldp x6, x7, [x10, #CTX_PACDBKEY_LO] /* x7:x6 = APDBKey */
807 ldp x8, x9, [x10, #CTX_PACGAKEY_LO] /* x9:x8 = APGAKey */
808
809 msr APIAKeyLo_EL1, x0
810 msr APIAKeyHi_EL1, x1
811 msr APIBKeyLo_EL1, x2
812 msr APIBKeyHi_EL1, x3
813 msr APDAKeyLo_EL1, x4
814 msr APDAKeyHi_EL1, x5
815 msr APDBKeyLo_EL1, x6
816 msr APDBKeyHi_EL1, x7
817 msr APGAKeyLo_EL1, x8
818 msr APGAKeyHi_EL1, x9
819#endif /* CTX_INCLUDE_PAUTH_REGS */
820
821 /* ----------------------------------------------------------
822 * Restore PMCR_EL0 when returning to Non-secure state if
823 * Secure Cycle Counter is not disabled in MDCR_EL3 when
824 * ARMv8.5-PMU is implemented.
825 * ----------------------------------------------------------
826 */
827 mrs x0, scr_el3
828 tst x0, #SCR_NS_BIT
829 beq 2f
830
831 /* ----------------------------------------------------------
832 * Back to Non-secure state.
833 * Check if earlier initialization MDCR_EL3.SCCD to 1 failed,
834 * meaning that ARMv8-PMU is not implemented and PMCR_EL0
835 * should be restored from non-secure context.
836 * ----------------------------------------------------------
837 */
838 mrs x0, mdcr_el3
839 tst x0, #MDCR_SCCD_BIT
840 bne 2f
841 ldr x0, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0]
842 msr pmcr_el0, x0
8432:
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100844 ldp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0]
845 ldp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100846 ldp x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4]
847 ldp x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6]
848 ldp x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8]
849 ldp x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10]
850 ldp x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12]
851 ldp x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14]
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000852 ldp x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16]
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100853 ldp x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18]
854 ldp x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20]
855 ldp x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22]
856 ldp x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24]
857 ldp x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26]
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000858 ldr x28, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0]
859 msr sp_el0, x28
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100860 ldp x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28]
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000861 ret
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100862endfunc restore_gp_pmcr_pauth_regs
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000863
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100864/* ------------------------------------------------------------------
865 * This routine assumes that the SP_EL3 is pointing to a valid
866 * context structure from where the gp regs and other special
867 * registers can be retrieved.
868 * ------------------------------------------------------------------
Antonio Nino Diaz13adfb12019-01-30 20:41:31 +0000869 */
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100870func el3_exit
Jan Dabrosfa015982019-12-02 13:30:03 +0100871#if ENABLE_ASSERTIONS
872 /* el3_exit assumes SP_EL0 on entry */
873 mrs x17, spsel
874 cmp x17, #MODE_SP_EL0
875 ASM_ASSERT(eq)
876#endif
877
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100878 /* ----------------------------------------------------------
879 * Save the current SP_EL0 i.e. the EL3 runtime stack which
880 * will be used for handling the next SMC.
881 * Then switch to SP_EL3.
882 * ----------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100883 */
884 mov x17, sp
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100885 msr spsel, #MODE_SP_ELX
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100886 str x17, [sp, #CTX_EL3STATE_OFFSET + CTX_RUNTIME_SP]
887
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100888 /* ----------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100889 * Restore SPSR_EL3, ELR_EL3 and SCR_EL3 prior to ERET
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100890 * ----------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100891 */
892 ldr x18, [sp, #CTX_EL3STATE_OFFSET + CTX_SCR_EL3]
893 ldp x16, x17, [sp, #CTX_EL3STATE_OFFSET + CTX_SPSR_EL3]
894 msr scr_el3, x18
895 msr spsr_el3, x16
896 msr elr_el3, x17
897
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100898#if IMAGE_BL31 && DYNAMIC_WORKAROUND_CVE_2018_3639
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100899 /* ----------------------------------------------------------
900 * Restore mitigation state as it was on entry to EL3
901 * ----------------------------------------------------------
902 */
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100903 ldr x17, [sp, #CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_DISABLE]
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100904 cbz x17, 1f
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100905 blr x17
Antonio Nino Diaz13adfb12019-01-30 20:41:31 +00009061:
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100907#endif
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100908 /* ----------------------------------------------------------
909 * Restore general purpose (including x30), PMCR_EL0 and
910 * ARMv8.3-PAuth registers.
911 * Exit EL3 via ERET to a lower exception level.
912 * ----------------------------------------------------------
913 */
914 bl restore_gp_pmcr_pauth_regs
915 ldr x30, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_LR]
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100916
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100917#if IMAGE_BL31 && RAS_EXTENSION
918 /* ----------------------------------------------------------
919 * Issue Error Synchronization Barrier to synchronize SErrors
920 * before exiting EL3. We're running with EAs unmasked, so
921 * any synchronized errors would be taken immediately;
922 * therefore no need to inspect DISR_EL1 register.
923 * ----------------------------------------------------------
924 */
925 esb
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000926#endif
Anthony Steinhauser0f7e6012020-01-07 15:44:06 -0800927 exception_return
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000928
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100929endfunc el3_exit