blob: 548f9779430d4bd1446e8d450ecf62da30414f76 [file] [log] [blame]
Achin Gupta9ac63c52014-01-16 12:08:03 +00001/*
Max Shvetsovbdf502d2020-02-25 13:56:19 +00002 * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved.
Achin Gupta9ac63c52014-01-16 12:08:03 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta9ac63c52014-01-16 12:08:03 +00005 */
6
Dan Handley2bd4ef22014-04-09 13:14:54 +01007#include <arch.h>
Andrew Thoelke38bde412014-03-18 13:46:55 +00008#include <asm_macros.S>
Jan Dabrosfa015982019-12-02 13:30:03 +01009#include <assert_macros.S>
Dan Handley2bd4ef22014-04-09 13:14:54 +010010#include <context.h>
Achin Gupta9ac63c52014-01-16 12:08:03 +000011
Max Shvetsovbdf502d2020-02-25 13:56:19 +000012#if CTX_INCLUDE_EL2_REGS
13 .global el2_sysregs_context_save
14 .global el2_sysregs_context_restore
15#endif
16
Yatharth Kochar6c0566c2015-10-02 17:56:48 +010017 .global el1_sysregs_context_save
18 .global el1_sysregs_context_restore
19#if CTX_INCLUDE_FPREGS
20 .global fpregs_context_save
21 .global fpregs_context_restore
22#endif
Alexei Fedorovf41355c2019-09-13 14:11:59 +010023 .global save_gp_pmcr_pauth_regs
24 .global restore_gp_pmcr_pauth_regs
Yatharth Kochar6c0566c2015-10-02 17:56:48 +010025 .global el3_exit
26
Max Shvetsovbdf502d2020-02-25 13:56:19 +000027#if CTX_INCLUDE_EL2_REGS
28
29/* -----------------------------------------------------
30 * The following function strictly follows the AArch64
31 * PCS to use x9-x17 (temporary caller-saved registers)
Max Shvetsovc9e2c922020-02-17 16:15:47 +000032 * to save EL2 system register context. It assumes that
33 * 'x0' is pointing to a 'el2_sys_regs' structure where
Max Shvetsovbdf502d2020-02-25 13:56:19 +000034 * the register context will be saved.
Max Shvetsovc9e2c922020-02-17 16:15:47 +000035 *
36 * The following registers are not added.
37 * AMEVCNTVOFF0<n>_EL2
38 * AMEVCNTVOFF1<n>_EL2
39 * ICH_AP0R<n>_EL2
40 * ICH_AP1R<n>_EL2
41 * ICH_LR<n>_EL2
Max Shvetsovbdf502d2020-02-25 13:56:19 +000042 * -----------------------------------------------------
43 */
Max Shvetsovbdf502d2020-02-25 13:56:19 +000044
Max Shvetsovc9e2c922020-02-17 16:15:47 +000045func el2_sysregs_context_save
Max Shvetsovbdf502d2020-02-25 13:56:19 +000046 mrs x9, actlr_el2
Max Shvetsovc9e2c922020-02-17 16:15:47 +000047 mrs x10, afsr0_el2
48 stp x9, x10, [x0, #CTX_ACTLR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000049
Max Shvetsovc9e2c922020-02-17 16:15:47 +000050 mrs x11, afsr1_el2
51 mrs x12, amair_el2
52 stp x11, x12, [x0, #CTX_AFSR1_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000053
Max Shvetsovc9e2c922020-02-17 16:15:47 +000054 mrs x13, cnthctl_el2
55 mrs x14, cnthp_ctl_el2
56 stp x13, x14, [x0, #CTX_CNTHCTL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000057
Max Shvetsovc9e2c922020-02-17 16:15:47 +000058 mrs x15, cnthp_cval_el2
59 mrs x16, cnthp_tval_el2
60 stp x15, x16, [x0, #CTX_CNTHP_CVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000061
Max Shvetsovc9e2c922020-02-17 16:15:47 +000062 mrs x17, cntvoff_el2
Max Shvetsovbdf502d2020-02-25 13:56:19 +000063 mrs x9, cptr_el2
Max Shvetsovc9e2c922020-02-17 16:15:47 +000064 stp x17, x9, [x0, #CTX_CNTVOFF_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000065
Max Shvetsovc9e2c922020-02-17 16:15:47 +000066 mrs x10, dbgvcr32_el2
67 mrs x11, elr_el2
68 stp x10, x11, [x0, #CTX_DBGVCR32_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000069
Max Shvetsovc9e2c922020-02-17 16:15:47 +000070 mrs x14, esr_el2
71 mrs x15, far_el2
72 stp x14, x15, [x0, #CTX_ESR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000073
Max Shvetsov0c16abd2020-05-13 18:15:39 +010074 mrs x16, hacr_el2
75 mrs x17, hcr_el2
76 stp x16, x17, [x0, #CTX_HACR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000077
Max Shvetsov0c16abd2020-05-13 18:15:39 +010078 mrs x9, hpfar_el2
79 mrs x10, hstr_el2
80 stp x9, x10, [x0, #CTX_HPFAR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000081
Max Shvetsov0c16abd2020-05-13 18:15:39 +010082 mrs x11, ICC_SRE_EL2
83 mrs x12, ICH_HCR_EL2
84 stp x11, x12, [x0, #CTX_ICC_SRE_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000085
Max Shvetsov0c16abd2020-05-13 18:15:39 +010086 mrs x13, ICH_VMCR_EL2
87 mrs x14, mair_el2
88 stp x13, x14, [x0, #CTX_ICH_VMCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000089
Max Shvetsov0c16abd2020-05-13 18:15:39 +010090 mrs x15, mdcr_el2
91 mrs x16, PMSCR_EL2
92 stp x15, x16, [x0, #CTX_MDCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000093
Max Shvetsov0c16abd2020-05-13 18:15:39 +010094 mrs x17, sctlr_el2
95 mrs x9, spsr_el2
96 stp x17, x9, [x0, #CTX_SCTLR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +000097
Max Shvetsov0c16abd2020-05-13 18:15:39 +010098 mrs x10, sp_el2
99 mrs x11, tcr_el2
100 stp x10, x11, [x0, #CTX_SP_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000101
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100102 mrs x12, tpidr_el2
103 mrs x13, ttbr0_el2
104 stp x12, x13, [x0, #CTX_TPIDR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000105
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100106 mrs x14, vbar_el2
107 mrs x15, vmpidr_el2
108 stp x14, x15, [x0, #CTX_VBAR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000109
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100110 mrs x16, vpidr_el2
111 mrs x17, vtcr_el2
112 stp x16, x17, [x0, #CTX_VPIDR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000113
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100114 mrs x9, vttbr_el2
115 str x9, [x0, #CTX_VTTBR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000116
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000117#if CTX_INCLUDE_MTE_REGS
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100118 mrs x10, TFSR_EL2
119 str x10, [x0, #CTX_TFSR_EL2]
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000120#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000121
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000122#if ENABLE_MPAM_FOR_LOWER_ELS
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000123 mrs x9, MPAM2_EL2
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000124 mrs x10, MPAMHCR_EL2
125 stp x9, x10, [x0, #CTX_MPAM2_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000126
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000127 mrs x11, MPAMVPM0_EL2
128 mrs x12, MPAMVPM1_EL2
129 stp x11, x12, [x0, #CTX_MPAMVPM0_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000130
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000131 mrs x13, MPAMVPM2_EL2
132 mrs x14, MPAMVPM3_EL2
133 stp x13, x14, [x0, #CTX_MPAMVPM2_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000134
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000135 mrs x15, MPAMVPM4_EL2
136 mrs x16, MPAMVPM5_EL2
137 stp x15, x16, [x0, #CTX_MPAMVPM4_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000138
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000139 mrs x17, MPAMVPM6_EL2
140 mrs x9, MPAMVPM7_EL2
141 stp x17, x9, [x0, #CTX_MPAMVPM6_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000142
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000143 mrs x10, MPAMVPMV_EL2
144 str x10, [x0, #CTX_MPAMVPMV_EL2]
145#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000146
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000147
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000148#if ARM_ARCH_AT_LEAST(8, 6)
149 mrs x11, HAFGRTR_EL2
150 mrs x12, HDFGRTR_EL2
151 stp x11, x12, [x0, #CTX_HAFGRTR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000152
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000153 mrs x13, HDFGWTR_EL2
154 mrs x14, HFGITR_EL2
155 stp x13, x14, [x0, #CTX_HDFGWTR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000156
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000157 mrs x15, HFGRTR_EL2
158 mrs x16, HFGWTR_EL2
159 stp x15, x16, [x0, #CTX_HFGRTR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000160
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000161 mrs x17, CNTPOFF_EL2
162 str x17, [x0, #CTX_CNTPOFF_EL2]
163#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000164
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000165#if ARM_ARCH_AT_LEAST(8, 4)
166 mrs x9, cnthps_ctl_el2
167 mrs x10, cnthps_cval_el2
168 stp x9, x10, [x0, #CTX_CNTHPS_CTL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000169
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000170 mrs x11, cnthps_tval_el2
171 mrs x12, cnthvs_ctl_el2
172 stp x11, x12, [x0, #CTX_CNTHPS_TVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000173
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000174 mrs x13, cnthvs_cval_el2
175 mrs x14, cnthvs_tval_el2
176 stp x13, x14, [x0, #CTX_CNTHVS_CVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000177
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000178 mrs x15, cnthv_ctl_el2
179 mrs x16, cnthv_cval_el2
180 stp x15, x16, [x0, #CTX_CNTHV_CTL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000181
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000182 mrs x17, cnthv_tval_el2
183 mrs x9, contextidr_el2
184 stp x17, x9, [x0, #CTX_CNTHV_TVAL_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000185
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000186 mrs x10, sder32_el2
187 str x10, [x0, #CTX_SDER32_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000188
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000189 mrs x11, ttbr1_el2
190 str x11, [x0, #CTX_TTBR1_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000191
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000192 mrs x12, vdisr_el2
193 str x12, [x0, #CTX_VDISR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000194
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000195 mrs x13, vncr_el2
196 str x13, [x0, #CTX_VNCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000197
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000198 mrs x14, vsesr_el2
199 str x14, [x0, #CTX_VSESR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000200
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000201 mrs x15, vstcr_el2
202 str x15, [x0, #CTX_VSTCR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000203
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000204 mrs x16, vsttbr_el2
205 str x16, [x0, #CTX_VSTTBR_EL2]
Olivier Deprez19628912020-03-20 14:22:05 +0100206
207 mrs x17, TRFCR_EL2
208 str x17, [x0, #CTX_TRFCR_EL2]
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000209#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000210
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000211#if ARM_ARCH_AT_LEAST(8, 5)
Olivier Deprez19628912020-03-20 14:22:05 +0100212 mrs x9, scxtnum_el2
213 str x9, [x0, #CTX_SCXTNUM_EL2]
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000214#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000215
216 ret
217endfunc el2_sysregs_context_save
218
219/* -----------------------------------------------------
220 * The following function strictly follows the AArch64
221 * PCS to use x9-x17 (temporary caller-saved registers)
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000222 * to restore EL2 system register context. It assumes
223 * that 'x0' is pointing to a 'el2_sys_regs' structure
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000224 * from where the register context will be restored
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000225
226 * The following registers are not restored
227 * AMEVCNTVOFF0<n>_EL2
228 * AMEVCNTVOFF1<n>_EL2
229 * ICH_AP0R<n>_EL2
230 * ICH_AP1R<n>_EL2
231 * ICH_LR<n>_EL2
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000232 * -----------------------------------------------------
233 */
234func el2_sysregs_context_restore
235
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000236 ldp x9, x10, [x0, #CTX_ACTLR_EL2]
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000237 msr actlr_el2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000238 msr afsr0_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000239
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000240 ldp x11, x12, [x0, #CTX_AFSR1_EL2]
241 msr afsr1_el2, x11
242 msr amair_el2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000243
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000244 ldp x13, x14, [x0, #CTX_CNTHCTL_EL2]
245 msr cnthctl_el2, x13
246 msr cnthp_ctl_el2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000247
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000248 ldp x15, x16, [x0, #CTX_CNTHP_CVAL_EL2]
249 msr cnthp_cval_el2, x15
250 msr cnthp_tval_el2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000251
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000252 ldp x17, x9, [x0, #CTX_CNTVOFF_EL2]
253 msr cntvoff_el2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000254 msr cptr_el2, x9
255
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000256 ldp x10, x11, [x0, #CTX_DBGVCR32_EL2]
257 msr dbgvcr32_el2, x10
258 msr elr_el2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000259
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000260 ldp x14, x15, [x0, #CTX_ESR_EL2]
261 msr esr_el2, x14
262 msr far_el2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000263
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100264 ldp x16, x17, [x0, #CTX_HACR_EL2]
265 msr hacr_el2, x16
266 msr hcr_el2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000267
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100268 ldp x9, x10, [x0, #CTX_HPFAR_EL2]
269 msr hpfar_el2, x9
270 msr hstr_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000271
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100272 ldp x11, x12, [x0, #CTX_ICC_SRE_EL2]
273 msr ICC_SRE_EL2, x11
274 msr ICH_HCR_EL2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000275
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100276 ldp x13, x14, [x0, #CTX_ICH_VMCR_EL2]
277 msr ICH_VMCR_EL2, x13
278 msr mair_el2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000279
Max Shvetsov0c16abd2020-05-13 18:15:39 +0100280 ldp x15, x16, [x0, #CTX_MDCR_EL2]
281 msr mdcr_el2, x15
282 msr PMSCR_EL2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000283
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100284 ldp x17, x9, [x0, #CTX_SCTLR_EL2]
285 msr sctlr_el2, x17
286 msr spsr_el2, x9
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000287
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100288 ldp x10, x11, [x0, #CTX_SP_EL2]
289 msr sp_el2, x10
290 msr tcr_el2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000291
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100292 ldp x12, x13, [x0, #CTX_TPIDR_EL2]
293 msr tpidr_el2, x12
294 msr ttbr0_el2, x13
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000295
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100296 ldp x13, x14, [x0, #CTX_VBAR_EL2]
297 msr vbar_el2, x13
298 msr vmpidr_el2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000299
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100300 ldp x15, x16, [x0, #CTX_VPIDR_EL2]
301 msr vpidr_el2, x15
302 msr vtcr_el2, x16
303
304 ldr x17, [x0, #CTX_VTTBR_EL2]
305 msr vttbr_el2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000306
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000307#if CTX_INCLUDE_MTE_REGS
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100308 ldr x9, [x0, #CTX_TFSR_EL2]
309 msr TFSR_EL2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000310#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000311
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000312#if ENABLE_MPAM_FOR_LOWER_ELS
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100313 ldp x10, x11, [x0, #CTX_MPAM2_EL2]
314 msr MPAM2_EL2, x10
315 msr MPAMHCR_EL2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000316
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100317 ldp x12, x13, [x0, #CTX_MPAMVPM0_EL2]
318 msr MPAMVPM0_EL2, x12
319 msr MPAMVPM1_EL2, x13
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000320
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100321 ldp x14, x15, [x0, #CTX_MPAMVPM2_EL2]
322 msr MPAMVPM2_EL2, x14
323 msr MPAMVPM3_EL2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000324
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100325 ldp x16, x17, [x0, #CTX_MPAMVPM4_EL2]
326 msr MPAMVPM4_EL2, x16
327 msr MPAMVPM5_EL2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000328
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100329 ldp x9, x10, [x0, #CTX_MPAMVPM6_EL2]
330 msr MPAMVPM6_EL2, x9
331 msr MPAMVPM7_EL2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000332
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100333 ldr x11, [x0, #CTX_MPAMVPMV_EL2]
334 msr MPAMVPMV_EL2, x11
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000335#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000336
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000337#if ARM_ARCH_AT_LEAST(8, 6)
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100338 ldp x12, x13, [x0, #CTX_HAFGRTR_EL2]
339 msr HAFGRTR_EL2, x12
340 msr HDFGRTR_EL2, x13
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000341
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100342 ldp x14, x15, [x0, #CTX_HDFGWTR_EL2]
343 msr HDFGWTR_EL2, x14
344 msr HFGITR_EL2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000345
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100346 ldp x16, x17, [x0, #CTX_HFGRTR_EL2]
347 msr HFGRTR_EL2, x16
348 msr HFGWTR_EL2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000349
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100350 ldr x9, [x0, #CTX_CNTPOFF_EL2]
351 msr CNTPOFF_EL2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000352#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000353
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000354#if ARM_ARCH_AT_LEAST(8, 4)
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100355 ldp x10, x11, [x0, #CTX_CNTHPS_CTL_EL2]
356 msr cnthps_ctl_el2, x10
357 msr cnthps_cval_el2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000358
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100359 ldp x12, x13, [x0, #CTX_CNTHPS_TVAL_EL2]
360 msr cnthps_tval_el2, x12
361 msr cnthvs_ctl_el2, x13
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000362
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100363 ldp x14, x15, [x0, #CTX_CNTHVS_CVAL_EL2]
364 msr cnthvs_cval_el2, x14
365 msr cnthvs_tval_el2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000366
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100367 ldp x16, x17, [x0, #CTX_CNTHV_CTL_EL2]
368 msr cnthv_ctl_el2, x16
369 msr cnthv_cval_el2, x17
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000370
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100371 ldp x9, x10, [x0, #CTX_CNTHV_TVAL_EL2]
372 msr cnthv_tval_el2, x9
373 msr contextidr_el2, x10
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000374
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100375 ldr x11, [x0, #CTX_SDER32_EL2]
376 msr sder32_el2, x11
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000377
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100378 ldr x12, [x0, #CTX_TTBR1_EL2]
379 msr ttbr1_el2, x12
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000380
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100381 ldr x13, [x0, #CTX_VDISR_EL2]
382 msr vdisr_el2, x13
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000383
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100384 ldr x14, [x0, #CTX_VNCR_EL2]
385 msr vncr_el2, x14
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000386
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100387 ldr x15, [x0, #CTX_VSESR_EL2]
388 msr vsesr_el2, x15
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000389
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100390 ldr x16, [x0, #CTX_VSTCR_EL2]
391 msr vstcr_el2, x16
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000392
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100393 ldr x17, [x0, #CTX_VSTTBR_EL2]
394 msr vsttbr_el2, x17
Olivier Deprez19628912020-03-20 14:22:05 +0100395
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100396 ldr x9, [x0, #CTX_TRFCR_EL2]
397 msr TRFCR_EL2, x9
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000398#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000399
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000400#if ARM_ARCH_AT_LEAST(8, 5)
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100401 ldr x10, [x0, #CTX_SCXTNUM_EL2]
402 msr scxtnum_el2, x10
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000403#endif
Max Shvetsovbdf502d2020-02-25 13:56:19 +0000404
405 ret
406endfunc el2_sysregs_context_restore
407
408#endif /* CTX_INCLUDE_EL2_REGS */
409
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100410/* ------------------------------------------------------------------
411 * The following function strictly follows the AArch64 PCS to use
412 * x9-x17 (temporary caller-saved registers) to save EL1 system
413 * register context. It assumes that 'x0' is pointing to a
414 * 'el1_sys_regs' structure where the register context will be saved.
415 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000416 */
Andrew Thoelke38bde412014-03-18 13:46:55 +0000417func el1_sysregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000418
419 mrs x9, spsr_el1
420 mrs x10, elr_el1
421 stp x9, x10, [x0, #CTX_SPSR_EL1]
422
Achin Gupta9ac63c52014-01-16 12:08:03 +0000423 mrs x15, sctlr_el1
424 mrs x16, actlr_el1
425 stp x15, x16, [x0, #CTX_SCTLR_EL1]
426
427 mrs x17, cpacr_el1
428 mrs x9, csselr_el1
429 stp x17, x9, [x0, #CTX_CPACR_EL1]
430
431 mrs x10, sp_el1
432 mrs x11, esr_el1
433 stp x10, x11, [x0, #CTX_SP_EL1]
434
435 mrs x12, ttbr0_el1
436 mrs x13, ttbr1_el1
437 stp x12, x13, [x0, #CTX_TTBR0_EL1]
438
439 mrs x14, mair_el1
440 mrs x15, amair_el1
441 stp x14, x15, [x0, #CTX_MAIR_EL1]
442
443 mrs x16, tcr_el1
444 mrs x17, tpidr_el1
445 stp x16, x17, [x0, #CTX_TCR_EL1]
446
447 mrs x9, tpidr_el0
448 mrs x10, tpidrro_el0
449 stp x9, x10, [x0, #CTX_TPIDR_EL0]
450
Achin Gupta9ac63c52014-01-16 12:08:03 +0000451 mrs x13, par_el1
452 mrs x14, far_el1
453 stp x13, x14, [x0, #CTX_PAR_EL1]
454
455 mrs x15, afsr0_el1
456 mrs x16, afsr1_el1
457 stp x15, x16, [x0, #CTX_AFSR0_EL1]
458
459 mrs x17, contextidr_el1
460 mrs x9, vbar_el1
461 stp x17, x9, [x0, #CTX_CONTEXTIDR_EL1]
462
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100463 /* Save AArch32 system registers if the build has instructed so */
464#if CTX_INCLUDE_AARCH32_REGS
465 mrs x11, spsr_abt
466 mrs x12, spsr_und
467 stp x11, x12, [x0, #CTX_SPSR_ABT]
468
469 mrs x13, spsr_irq
470 mrs x14, spsr_fiq
471 stp x13, x14, [x0, #CTX_SPSR_IRQ]
472
473 mrs x15, dacr32_el2
474 mrs x16, ifsr32_el2
475 stp x15, x16, [x0, #CTX_DACR32_EL2]
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100476#endif
477
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100478 /* Save NS timer registers if the build has instructed so */
479#if NS_TIMER_SWITCH
Achin Gupta9ac63c52014-01-16 12:08:03 +0000480 mrs x10, cntp_ctl_el0
481 mrs x11, cntp_cval_el0
482 stp x10, x11, [x0, #CTX_CNTP_CTL_EL0]
483
484 mrs x12, cntv_ctl_el0
485 mrs x13, cntv_cval_el0
486 stp x12, x13, [x0, #CTX_CNTV_CTL_EL0]
487
488 mrs x14, cntkctl_el1
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100489 str x14, [x0, #CTX_CNTKCTL_EL1]
490#endif
491
Justin Chadwell1c7c13a2019-07-18 14:25:33 +0100492 /* Save MTE system registers if the build has instructed so */
493#if CTX_INCLUDE_MTE_REGS
494 mrs x15, TFSRE0_EL1
495 mrs x16, TFSR_EL1
496 stp x15, x16, [x0, #CTX_TFSRE0_EL1]
497
498 mrs x9, RGSR_EL1
499 mrs x10, GCR_EL1
500 stp x9, x10, [x0, #CTX_RGSR_EL1]
501#endif
502
Achin Gupta9ac63c52014-01-16 12:08:03 +0000503 ret
Kévin Petita877c252015-03-24 14:03:57 +0000504endfunc el1_sysregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000505
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100506/* ------------------------------------------------------------------
507 * The following function strictly follows the AArch64 PCS to use
508 * x9-x17 (temporary caller-saved registers) to restore EL1 system
509 * register context. It assumes that 'x0' is pointing to a
510 * 'el1_sys_regs' structure from where the register context will be
511 * restored
512 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000513 */
Andrew Thoelke38bde412014-03-18 13:46:55 +0000514func el1_sysregs_context_restore
Achin Gupta9ac63c52014-01-16 12:08:03 +0000515
516 ldp x9, x10, [x0, #CTX_SPSR_EL1]
517 msr spsr_el1, x9
518 msr elr_el1, x10
519
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100520 ldp x15, x16, [x0, #CTX_SCTLR_EL1]
521 msr sctlr_el1, x15
Achin Gupta9ac63c52014-01-16 12:08:03 +0000522 msr actlr_el1, x16
523
524 ldp x17, x9, [x0, #CTX_CPACR_EL1]
525 msr cpacr_el1, x17
526 msr csselr_el1, x9
527
528 ldp x10, x11, [x0, #CTX_SP_EL1]
529 msr sp_el1, x10
530 msr esr_el1, x11
531
532 ldp x12, x13, [x0, #CTX_TTBR0_EL1]
533 msr ttbr0_el1, x12
534 msr ttbr1_el1, x13
535
536 ldp x14, x15, [x0, #CTX_MAIR_EL1]
537 msr mair_el1, x14
538 msr amair_el1, x15
539
Manish V Badarkhed73c1ba2020-07-28 07:12:56 +0100540 ldp x16, x17, [x0, #CTX_TCR_EL1]
541 msr tcr_el1, x16
542 msr tpidr_el1, x17
Achin Gupta9ac63c52014-01-16 12:08:03 +0000543
544 ldp x9, x10, [x0, #CTX_TPIDR_EL0]
545 msr tpidr_el0, x9
546 msr tpidrro_el0, x10
547
Achin Gupta9ac63c52014-01-16 12:08:03 +0000548 ldp x13, x14, [x0, #CTX_PAR_EL1]
549 msr par_el1, x13
550 msr far_el1, x14
551
552 ldp x15, x16, [x0, #CTX_AFSR0_EL1]
553 msr afsr0_el1, x15
554 msr afsr1_el1, x16
555
556 ldp x17, x9, [x0, #CTX_CONTEXTIDR_EL1]
557 msr contextidr_el1, x17
558 msr vbar_el1, x9
559
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100560 /* Restore AArch32 system registers if the build has instructed so */
561#if CTX_INCLUDE_AARCH32_REGS
562 ldp x11, x12, [x0, #CTX_SPSR_ABT]
563 msr spsr_abt, x11
564 msr spsr_und, x12
565
566 ldp x13, x14, [x0, #CTX_SPSR_IRQ]
567 msr spsr_irq, x13
568 msr spsr_fiq, x14
569
570 ldp x15, x16, [x0, #CTX_DACR32_EL2]
571 msr dacr32_el2, x15
572 msr ifsr32_el2, x16
Soby Mathewd75d2ba2016-05-17 14:01:32 +0100573#endif
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100574 /* Restore NS timer registers if the build has instructed so */
575#if NS_TIMER_SWITCH
Achin Gupta9ac63c52014-01-16 12:08:03 +0000576 ldp x10, x11, [x0, #CTX_CNTP_CTL_EL0]
577 msr cntp_ctl_el0, x10
578 msr cntp_cval_el0, x11
579
580 ldp x12, x13, [x0, #CTX_CNTV_CTL_EL0]
581 msr cntv_ctl_el0, x12
582 msr cntv_cval_el0, x13
583
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100584 ldr x14, [x0, #CTX_CNTKCTL_EL1]
Achin Gupta9ac63c52014-01-16 12:08:03 +0000585 msr cntkctl_el1, x14
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100586#endif
Justin Chadwell1c7c13a2019-07-18 14:25:33 +0100587 /* Restore MTE system registers if the build has instructed so */
588#if CTX_INCLUDE_MTE_REGS
589 ldp x11, x12, [x0, #CTX_TFSRE0_EL1]
590 msr TFSRE0_EL1, x11
591 msr TFSR_EL1, x12
592
593 ldp x13, x14, [x0, #CTX_RGSR_EL1]
594 msr RGSR_EL1, x13
595 msr GCR_EL1, x14
596#endif
Jeenu Viswambharand1b60152014-05-12 15:28:47 +0100597
Achin Gupta9ac63c52014-01-16 12:08:03 +0000598 /* No explict ISB required here as ERET covers it */
Achin Gupta9ac63c52014-01-16 12:08:03 +0000599 ret
Kévin Petita877c252015-03-24 14:03:57 +0000600endfunc el1_sysregs_context_restore
Achin Gupta9ac63c52014-01-16 12:08:03 +0000601
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100602/* ------------------------------------------------------------------
603 * The following function follows the aapcs_64 strictly to use
604 * x9-x17 (temporary caller-saved registers according to AArch64 PCS)
605 * to save floating point register context. It assumes that 'x0' is
606 * pointing to a 'fp_regs' structure where the register context will
Achin Gupta9ac63c52014-01-16 12:08:03 +0000607 * be saved.
608 *
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100609 * Access to VFP registers will trap if CPTR_EL3.TFP is set.
610 * However currently we don't use VFP registers nor set traps in
611 * Trusted Firmware, and assume it's cleared.
Achin Gupta9ac63c52014-01-16 12:08:03 +0000612 *
613 * TODO: Revisit when VFP is used in secure world
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100614 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000615 */
Juan Castillo258e94f2014-06-25 17:26:36 +0100616#if CTX_INCLUDE_FPREGS
Andrew Thoelke38bde412014-03-18 13:46:55 +0000617func fpregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000618 stp q0, q1, [x0, #CTX_FP_Q0]
619 stp q2, q3, [x0, #CTX_FP_Q2]
620 stp q4, q5, [x0, #CTX_FP_Q4]
621 stp q6, q7, [x0, #CTX_FP_Q6]
622 stp q8, q9, [x0, #CTX_FP_Q8]
623 stp q10, q11, [x0, #CTX_FP_Q10]
624 stp q12, q13, [x0, #CTX_FP_Q12]
625 stp q14, q15, [x0, #CTX_FP_Q14]
626 stp q16, q17, [x0, #CTX_FP_Q16]
627 stp q18, q19, [x0, #CTX_FP_Q18]
628 stp q20, q21, [x0, #CTX_FP_Q20]
629 stp q22, q23, [x0, #CTX_FP_Q22]
630 stp q24, q25, [x0, #CTX_FP_Q24]
631 stp q26, q27, [x0, #CTX_FP_Q26]
632 stp q28, q29, [x0, #CTX_FP_Q28]
633 stp q30, q31, [x0, #CTX_FP_Q30]
634
635 mrs x9, fpsr
636 str x9, [x0, #CTX_FP_FPSR]
637
638 mrs x10, fpcr
639 str x10, [x0, #CTX_FP_FPCR]
640
David Cunadod1a1fd42017-10-20 11:30:57 +0100641#if CTX_INCLUDE_AARCH32_REGS
642 mrs x11, fpexc32_el2
643 str x11, [x0, #CTX_FP_FPEXC32_EL2]
644#endif
Achin Gupta9ac63c52014-01-16 12:08:03 +0000645 ret
Kévin Petita877c252015-03-24 14:03:57 +0000646endfunc fpregs_context_save
Achin Gupta9ac63c52014-01-16 12:08:03 +0000647
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100648/* ------------------------------------------------------------------
649 * The following function follows the aapcs_64 strictly to use x9-x17
650 * (temporary caller-saved registers according to AArch64 PCS) to
651 * restore floating point register context. It assumes that 'x0' is
652 * pointing to a 'fp_regs' structure from where the register context
Achin Gupta9ac63c52014-01-16 12:08:03 +0000653 * will be restored.
654 *
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100655 * Access to VFP registers will trap if CPTR_EL3.TFP is set.
656 * However currently we don't use VFP registers nor set traps in
657 * Trusted Firmware, and assume it's cleared.
Achin Gupta9ac63c52014-01-16 12:08:03 +0000658 *
659 * TODO: Revisit when VFP is used in secure world
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100660 * ------------------------------------------------------------------
Achin Gupta9ac63c52014-01-16 12:08:03 +0000661 */
Andrew Thoelke38bde412014-03-18 13:46:55 +0000662func fpregs_context_restore
Achin Gupta9ac63c52014-01-16 12:08:03 +0000663 ldp q0, q1, [x0, #CTX_FP_Q0]
664 ldp q2, q3, [x0, #CTX_FP_Q2]
665 ldp q4, q5, [x0, #CTX_FP_Q4]
666 ldp q6, q7, [x0, #CTX_FP_Q6]
667 ldp q8, q9, [x0, #CTX_FP_Q8]
668 ldp q10, q11, [x0, #CTX_FP_Q10]
669 ldp q12, q13, [x0, #CTX_FP_Q12]
670 ldp q14, q15, [x0, #CTX_FP_Q14]
671 ldp q16, q17, [x0, #CTX_FP_Q16]
672 ldp q18, q19, [x0, #CTX_FP_Q18]
673 ldp q20, q21, [x0, #CTX_FP_Q20]
674 ldp q22, q23, [x0, #CTX_FP_Q22]
675 ldp q24, q25, [x0, #CTX_FP_Q24]
676 ldp q26, q27, [x0, #CTX_FP_Q26]
677 ldp q28, q29, [x0, #CTX_FP_Q28]
678 ldp q30, q31, [x0, #CTX_FP_Q30]
679
680 ldr x9, [x0, #CTX_FP_FPSR]
681 msr fpsr, x9
682
Soby Mathewe77e1162015-12-03 09:42:50 +0000683 ldr x10, [x0, #CTX_FP_FPCR]
Achin Gupta9ac63c52014-01-16 12:08:03 +0000684 msr fpcr, x10
685
David Cunadod1a1fd42017-10-20 11:30:57 +0100686#if CTX_INCLUDE_AARCH32_REGS
687 ldr x11, [x0, #CTX_FP_FPEXC32_EL2]
688 msr fpexc32_el2, x11
689#endif
Achin Gupta9ac63c52014-01-16 12:08:03 +0000690 /*
691 * No explict ISB required here as ERET to
Sandrine Bailleuxf4119ec2015-12-17 13:58:58 +0000692 * switch to secure EL1 or non-secure world
Achin Gupta9ac63c52014-01-16 12:08:03 +0000693 * covers it
694 */
695
696 ret
Kévin Petita877c252015-03-24 14:03:57 +0000697endfunc fpregs_context_restore
Juan Castillo258e94f2014-06-25 17:26:36 +0100698#endif /* CTX_INCLUDE_FPREGS */
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100699
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100700/* ------------------------------------------------------------------
701 * The following function is used to save and restore all the general
702 * purpose and ARMv8.3-PAuth (if enabled) registers.
703 * It also checks if Secure Cycle Counter is not disabled in MDCR_EL3
704 * when ARMv8.5-PMU is implemented, and if called from Non-secure
705 * state saves PMCR_EL0 and disables Cycle Counter.
706 *
707 * Ideally we would only save and restore the callee saved registers
708 * when a world switch occurs but that type of implementation is more
709 * complex. So currently we will always save and restore these
710 * registers on entry and exit of EL3.
711 * These are not macros to ensure their invocation fits within the 32
712 * instructions per exception vector.
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100713 * clobbers: x18
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100714 * ------------------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100715 */
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100716func save_gp_pmcr_pauth_regs
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100717 stp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0]
718 stp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
719 stp x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4]
720 stp x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6]
721 stp x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8]
722 stp x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10]
723 stp x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12]
724 stp x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14]
725 stp x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16]
726 stp x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18]
727 stp x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20]
728 stp x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22]
729 stp x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24]
730 stp x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26]
731 stp x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28]
732 mrs x18, sp_el0
733 str x18, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0]
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100734
735 /* ----------------------------------------------------------
736 * Check if earlier initialization MDCR_EL3.SCCD to 1 failed,
737 * meaning that ARMv8-PMU is not implemented and PMCR_EL0
738 * should be saved in non-secure context.
739 * ----------------------------------------------------------
740 */
741 mrs x9, mdcr_el3
742 tst x9, #MDCR_SCCD_BIT
743 bne 1f
744
745 /* Secure Cycle Counter is not disabled */
746 mrs x9, pmcr_el0
747
748 /* Check caller's security state */
749 mrs x10, scr_el3
750 tst x10, #SCR_NS_BIT
751 beq 2f
752
753 /* Save PMCR_EL0 if called from Non-secure state */
754 str x9, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0]
755
756 /* Disable cycle counter when event counting is prohibited */
7572: orr x9, x9, #PMCR_EL0_DP_BIT
758 msr pmcr_el0, x9
759 isb
7601:
761#if CTX_INCLUDE_PAUTH_REGS
762 /* ----------------------------------------------------------
763 * Save the ARMv8.3-PAuth keys as they are not banked
764 * by exception level
765 * ----------------------------------------------------------
766 */
767 add x19, sp, #CTX_PAUTH_REGS_OFFSET
768
769 mrs x20, APIAKeyLo_EL1 /* x21:x20 = APIAKey */
770 mrs x21, APIAKeyHi_EL1
771 mrs x22, APIBKeyLo_EL1 /* x23:x22 = APIBKey */
772 mrs x23, APIBKeyHi_EL1
773 mrs x24, APDAKeyLo_EL1 /* x25:x24 = APDAKey */
774 mrs x25, APDAKeyHi_EL1
775 mrs x26, APDBKeyLo_EL1 /* x27:x26 = APDBKey */
776 mrs x27, APDBKeyHi_EL1
777 mrs x28, APGAKeyLo_EL1 /* x29:x28 = APGAKey */
778 mrs x29, APGAKeyHi_EL1
779
780 stp x20, x21, [x19, #CTX_PACIAKEY_LO]
781 stp x22, x23, [x19, #CTX_PACIBKEY_LO]
782 stp x24, x25, [x19, #CTX_PACDAKEY_LO]
783 stp x26, x27, [x19, #CTX_PACDBKEY_LO]
784 stp x28, x29, [x19, #CTX_PACGAKEY_LO]
785#endif /* CTX_INCLUDE_PAUTH_REGS */
786
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100787 ret
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100788endfunc save_gp_pmcr_pauth_regs
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100789
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100790/* ------------------------------------------------------------------
791 * This function restores ARMv8.3-PAuth (if enabled) and all general
792 * purpose registers except x30 from the CPU context.
793 * x30 register must be explicitly restored by the caller.
794 * ------------------------------------------------------------------
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000795 */
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100796func restore_gp_pmcr_pauth_regs
797#if CTX_INCLUDE_PAUTH_REGS
798 /* Restore the ARMv8.3 PAuth keys */
799 add x10, sp, #CTX_PAUTH_REGS_OFFSET
800
801 ldp x0, x1, [x10, #CTX_PACIAKEY_LO] /* x1:x0 = APIAKey */
802 ldp x2, x3, [x10, #CTX_PACIBKEY_LO] /* x3:x2 = APIBKey */
803 ldp x4, x5, [x10, #CTX_PACDAKEY_LO] /* x5:x4 = APDAKey */
804 ldp x6, x7, [x10, #CTX_PACDBKEY_LO] /* x7:x6 = APDBKey */
805 ldp x8, x9, [x10, #CTX_PACGAKEY_LO] /* x9:x8 = APGAKey */
806
807 msr APIAKeyLo_EL1, x0
808 msr APIAKeyHi_EL1, x1
809 msr APIBKeyLo_EL1, x2
810 msr APIBKeyHi_EL1, x3
811 msr APDAKeyLo_EL1, x4
812 msr APDAKeyHi_EL1, x5
813 msr APDBKeyLo_EL1, x6
814 msr APDBKeyHi_EL1, x7
815 msr APGAKeyLo_EL1, x8
816 msr APGAKeyHi_EL1, x9
817#endif /* CTX_INCLUDE_PAUTH_REGS */
818
819 /* ----------------------------------------------------------
820 * Restore PMCR_EL0 when returning to Non-secure state if
821 * Secure Cycle Counter is not disabled in MDCR_EL3 when
822 * ARMv8.5-PMU is implemented.
823 * ----------------------------------------------------------
824 */
825 mrs x0, scr_el3
826 tst x0, #SCR_NS_BIT
827 beq 2f
828
829 /* ----------------------------------------------------------
830 * Back to Non-secure state.
831 * Check if earlier initialization MDCR_EL3.SCCD to 1 failed,
832 * meaning that ARMv8-PMU is not implemented and PMCR_EL0
833 * should be restored from non-secure context.
834 * ----------------------------------------------------------
835 */
836 mrs x0, mdcr_el3
837 tst x0, #MDCR_SCCD_BIT
838 bne 2f
839 ldr x0, [sp, #CTX_EL3STATE_OFFSET + CTX_PMCR_EL0]
840 msr pmcr_el0, x0
8412:
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100842 ldp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0]
843 ldp x2, x3, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X2]
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100844 ldp x4, x5, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X4]
845 ldp x6, x7, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X6]
846 ldp x8, x9, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X8]
847 ldp x10, x11, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X10]
848 ldp x12, x13, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X12]
849 ldp x14, x15, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X14]
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000850 ldp x16, x17, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X16]
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100851 ldp x18, x19, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X18]
852 ldp x20, x21, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X20]
853 ldp x22, x23, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X22]
854 ldp x24, x25, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X24]
855 ldp x26, x27, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X26]
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000856 ldr x28, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_SP_EL0]
857 msr sp_el0, x28
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100858 ldp x28, x29, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X28]
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000859 ret
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100860endfunc restore_gp_pmcr_pauth_regs
Jeenu Viswambharan23d05a82017-11-29 16:59:34 +0000861
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100862/* ------------------------------------------------------------------
863 * This routine assumes that the SP_EL3 is pointing to a valid
864 * context structure from where the gp regs and other special
865 * registers can be retrieved.
866 * ------------------------------------------------------------------
Antonio Nino Diaz13adfb12019-01-30 20:41:31 +0000867 */
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100868func el3_exit
Jan Dabrosfa015982019-12-02 13:30:03 +0100869#if ENABLE_ASSERTIONS
870 /* el3_exit assumes SP_EL0 on entry */
871 mrs x17, spsel
872 cmp x17, #MODE_SP_EL0
873 ASM_ASSERT(eq)
874#endif
875
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100876 /* ----------------------------------------------------------
877 * Save the current SP_EL0 i.e. the EL3 runtime stack which
878 * will be used for handling the next SMC.
879 * Then switch to SP_EL3.
880 * ----------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100881 */
882 mov x17, sp
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100883 msr spsel, #MODE_SP_ELX
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100884 str x17, [sp, #CTX_EL3STATE_OFFSET + CTX_RUNTIME_SP]
885
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100886 /* ----------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100887 * Restore SPSR_EL3, ELR_EL3 and SCR_EL3 prior to ERET
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100888 * ----------------------------------------------------------
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100889 */
890 ldr x18, [sp, #CTX_EL3STATE_OFFSET + CTX_SCR_EL3]
891 ldp x16, x17, [sp, #CTX_EL3STATE_OFFSET + CTX_SPSR_EL3]
892 msr scr_el3, x18
893 msr spsr_el3, x16
894 msr elr_el3, x17
895
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100896#if IMAGE_BL31 && DYNAMIC_WORKAROUND_CVE_2018_3639
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100897 /* ----------------------------------------------------------
898 * Restore mitigation state as it was on entry to EL3
899 * ----------------------------------------------------------
900 */
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100901 ldr x17, [sp, #CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_DISABLE]
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100902 cbz x17, 1f
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100903 blr x17
Antonio Nino Diaz13adfb12019-01-30 20:41:31 +00009041:
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100905#endif
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100906 /* ----------------------------------------------------------
907 * Restore general purpose (including x30), PMCR_EL0 and
908 * ARMv8.3-PAuth registers.
909 * Exit EL3 via ERET to a lower exception level.
910 * ----------------------------------------------------------
911 */
912 bl restore_gp_pmcr_pauth_regs
913 ldr x30, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_LR]
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100914
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100915#if IMAGE_BL31 && RAS_EXTENSION
916 /* ----------------------------------------------------------
917 * Issue Error Synchronization Barrier to synchronize SErrors
918 * before exiting EL3. We're running with EAs unmasked, so
919 * any synchronized errors would be taken immediately;
920 * therefore no need to inspect DISR_EL1 register.
921 * ----------------------------------------------------------
922 */
923 esb
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000924#endif
Anthony Steinhauser0f7e6012020-01-07 15:44:06 -0800925 exception_return
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000926
Yatharth Kochar6c0566c2015-10-02 17:56:48 +0100927endfunc el3_exit