Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 1 | /* |
Anthony Steinhauser | 0f7e601 | 2020-01-07 15:44:06 -0800 | [diff] [blame] | 2 | * Copyright (c) 2013-2020, ARM Limited and Contributors. All rights reserved. |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 3 | * |
dp-arm | fa3cf0b | 2017-05-03 09:38:09 +0100 | [diff] [blame] | 4 | * SPDX-License-Identifier: BSD-3-Clause |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 5 | */ |
Antonio Nino Diaz | 5eb8837 | 2018-11-08 10:20:19 +0000 | [diff] [blame] | 6 | #ifndef ASM_MACROS_S |
| 7 | #define ASM_MACROS_S |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 8 | |
Dan Handley | 2bd4ef2 | 2014-04-09 13:14:54 +0100 | [diff] [blame] | 9 | #include <arch.h> |
Antonio Nino Diaz | e0f9063 | 2018-12-14 00:18:21 +0000 | [diff] [blame] | 10 | #include <common/asm_macros_common.S> |
| 11 | #include <lib/spinlock.h> |
Dan Handley | 2bd4ef2 | 2014-04-09 13:14:54 +0100 | [diff] [blame] | 12 | |
Jeenu Viswambharan | 58e8148 | 2018-04-27 15:06:57 +0100 | [diff] [blame] | 13 | /* |
| 14 | * TLBI instruction with type specifier that implements the workaround for |
Soby Mathew | 16d006b | 2019-05-03 13:17:56 +0100 | [diff] [blame] | 15 | * errata 813419 of Cortex-A57 or errata 1286807 of Cortex-A76. |
Jeenu Viswambharan | 58e8148 | 2018-04-27 15:06:57 +0100 | [diff] [blame] | 16 | */ |
Soby Mathew | 16d006b | 2019-05-03 13:17:56 +0100 | [diff] [blame] | 17 | #if ERRATA_A57_813419 || ERRATA_A76_1286807 |
Jeenu Viswambharan | 58e8148 | 2018-04-27 15:06:57 +0100 | [diff] [blame] | 18 | #define TLB_INVALIDATE(_type) \ |
| 19 | tlbi _type; \ |
| 20 | dsb ish; \ |
| 21 | tlbi _type |
| 22 | #else |
| 23 | #define TLB_INVALIDATE(_type) \ |
| 24 | tlbi _type |
| 25 | #endif |
| 26 | |
Dan Handley | 2bd4ef2 | 2014-04-09 13:14:54 +0100 | [diff] [blame] | 27 | |
Boyan Karatotev | 03a9a3e | 2023-03-10 18:24:50 +0000 | [diff] [blame] | 28 | /* |
| 29 | * Create a stack frame at the start of an assembly function. Will also |
| 30 | * add all necessary call frame information (cfi) directives for a |
| 31 | * pretty stack trace. This is necessary as there is quite a bit of |
| 32 | * flexibility within a stack frame and the stack pointer can move |
| 33 | * around throughout the function. If the debugger isn't told where to |
| 34 | * find things, it gets lost, gives up and displays nothing. So inform |
| 35 | * the debugger of what's where. Anchor the Canonical Frame Address |
| 36 | * (CFA; the thing used to track what's where) to the frame pointer as |
| 37 | * that's not expected to change in the function body and no extra |
| 38 | * bookkeeping will be necessary, allowing free movement of the sp |
| 39 | * |
| 40 | * _frame_size: requested space for caller to use. Must be a mutliple |
| 41 | * of 16 for stack pointer alignment |
| 42 | */ |
| 43 | .macro func_prologue _frame_size=0 |
| 44 | .if \_frame_size & 0xf |
| 45 | .error "frame_size must have stack pointer alignment (multiple of 16)" |
| 46 | .endif |
| 47 | |
| 48 | /* put frame record at top of frame */ |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 49 | stp x29, x30, [sp, #-0x10]! |
| 50 | mov x29,sp |
Boyan Karatotev | 03a9a3e | 2023-03-10 18:24:50 +0000 | [diff] [blame] | 51 | .if \_frame_size |
| 52 | sub sp, sp, #\_frame_size |
| 53 | .endif |
| 54 | |
| 55 | /* point CFA to start of frame record, i.e. x29 + 0x10 */ |
| 56 | .cfi_def_cfa x29, 0x10 |
| 57 | /* inform it about x29, x30 locations */ |
| 58 | .cfi_offset x30, -0x8 |
| 59 | .cfi_offset x29, -0x10 |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 60 | .endm |
| 61 | |
Boyan Karatotev | 03a9a3e | 2023-03-10 18:24:50 +0000 | [diff] [blame] | 62 | /* |
| 63 | * Clear stack frame at the end of an assembly function. |
| 64 | * |
| 65 | * _frame_size: the value passed to func_prologue |
| 66 | */ |
| 67 | .macro func_epilogue _frame_size=0 |
| 68 | /* remove requested space */ |
| 69 | .if \_frame_size |
| 70 | add sp, sp, #\_frame_size |
| 71 | .endif |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 72 | ldp x29, x30, [sp], #0x10 |
| 73 | .endm |
| 74 | |
| 75 | |
| 76 | .macro dcache_line_size reg, tmp |
Achin Gupta | 07f4e07 | 2014-02-02 12:02:23 +0000 | [diff] [blame] | 77 | mrs \tmp, ctr_el0 |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 78 | ubfx \tmp, \tmp, #16, #4 |
Achin Gupta | 07f4e07 | 2014-02-02 12:02:23 +0000 | [diff] [blame] | 79 | mov \reg, #4 |
| 80 | lsl \reg, \reg, \tmp |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 81 | .endm |
| 82 | |
| 83 | |
| 84 | .macro icache_line_size reg, tmp |
Achin Gupta | 07f4e07 | 2014-02-02 12:02:23 +0000 | [diff] [blame] | 85 | mrs \tmp, ctr_el0 |
| 86 | and \tmp, \tmp, #0xf |
| 87 | mov \reg, #4 |
| 88 | lsl \reg, \reg, \tmp |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 89 | .endm |
| 90 | |
| 91 | |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 92 | .macro smc_check label |
Andrew Thoelke | f977ed8 | 2014-04-28 12:32:02 +0100 | [diff] [blame] | 93 | mrs x0, esr_el3 |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 94 | ubfx x0, x0, #ESR_EC_SHIFT, #ESR_EC_LENGTH |
| 95 | cmp x0, #EC_AARCH64_SMC |
| 96 | b.ne $label |
| 97 | .endm |
| 98 | |
Sandrine Bailleux | 9e6ad6c | 2016-05-24 16:56:03 +0100 | [diff] [blame] | 99 | /* |
| 100 | * Declare the exception vector table, enforcing it is aligned on a |
| 101 | * 2KB boundary, as required by the ARMv8 architecture. |
Sandrine Bailleux | 618ba99 | 2016-05-24 16:22:59 +0100 | [diff] [blame] | 102 | * Use zero bytes as the fill value to be stored in the padding bytes |
| 103 | * so that it inserts illegal AArch64 instructions. This increases |
| 104 | * security, robustness and potentially facilitates debugging. |
Sandrine Bailleux | 9e6ad6c | 2016-05-24 16:56:03 +0100 | [diff] [blame] | 105 | */ |
Antonio Nino Diaz | c41f206 | 2017-10-24 10:07:35 +0100 | [diff] [blame] | 106 | .macro vector_base label, section_name=.vectors |
| 107 | .section \section_name, "ax" |
Sandrine Bailleux | 618ba99 | 2016-05-24 16:22:59 +0100 | [diff] [blame] | 108 | .align 11, 0 |
Sandrine Bailleux | 9e6ad6c | 2016-05-24 16:56:03 +0100 | [diff] [blame] | 109 | \label: |
| 110 | .endm |
| 111 | |
| 112 | /* |
| 113 | * Create an entry in the exception vector table, enforcing it is |
| 114 | * aligned on a 128-byte boundary, as required by the ARMv8 architecture. |
Sandrine Bailleux | 618ba99 | 2016-05-24 16:22:59 +0100 | [diff] [blame] | 115 | * Use zero bytes as the fill value to be stored in the padding bytes |
| 116 | * so that it inserts illegal AArch64 instructions. This increases |
| 117 | * security, robustness and potentially facilitates debugging. |
Sandrine Bailleux | 9e6ad6c | 2016-05-24 16:56:03 +0100 | [diff] [blame] | 118 | */ |
Antonio Nino Diaz | c41f206 | 2017-10-24 10:07:35 +0100 | [diff] [blame] | 119 | .macro vector_entry label, section_name=.vectors |
Douglas Raillard | efa50b5 | 2017-08-07 16:20:46 +0100 | [diff] [blame] | 120 | .cfi_sections .debug_frame |
Antonio Nino Diaz | c41f206 | 2017-10-24 10:07:35 +0100 | [diff] [blame] | 121 | .section \section_name, "ax" |
Sandrine Bailleux | 618ba99 | 2016-05-24 16:22:59 +0100 | [diff] [blame] | 122 | .align 7, 0 |
Douglas Raillard | efa50b5 | 2017-08-07 16:20:46 +0100 | [diff] [blame] | 123 | .type \label, %function |
Douglas Raillard | efa50b5 | 2017-08-07 16:20:46 +0100 | [diff] [blame] | 124 | .cfi_startproc |
Sandrine Bailleux | 9e6ad6c | 2016-05-24 16:56:03 +0100 | [diff] [blame] | 125 | \label: |
| 126 | .endm |
Achin Gupta | 4f6ad66 | 2013-10-25 09:08:21 +0100 | [diff] [blame] | 127 | |
Jeenu Viswambharan | a7934d6 | 2014-02-07 15:53:18 +0000 | [diff] [blame] | 128 | /* |
Roberto Vargas | 95f30ab | 2018-04-17 11:31:43 +0100 | [diff] [blame] | 129 | * Add the bytes until fill the full exception vector, whose size is always |
| 130 | * 32 instructions. If there are more than 32 instructions in the |
| 131 | * exception vector then an error is emitted. |
| 132 | */ |
| 133 | .macro end_vector_entry label |
| 134 | .cfi_endproc |
| 135 | .fill \label + (32 * 4) - . |
| 136 | .endm |
| 137 | |
| 138 | /* |
Soby Mathew | b0082d2 | 2015-04-09 13:40:55 +0100 | [diff] [blame] | 139 | * This macro calculates the base address of the current CPU's MP stack |
| 140 | * using the plat_my_core_pos() index, the name of the stack storage |
| 141 | * and the size of each stack |
| 142 | * Out: X0 = physical address of stack base |
| 143 | * Clobber: X30, X1, X2 |
| 144 | */ |
| 145 | .macro get_my_mp_stack _name, _size |
Soby Mathew | fcaf1bd | 2018-10-12 16:40:28 +0100 | [diff] [blame] | 146 | bl plat_my_core_pos |
| 147 | adrp x2, (\_name + \_size) |
| 148 | add x2, x2, :lo12:(\_name + \_size) |
Soby Mathew | b0082d2 | 2015-04-09 13:40:55 +0100 | [diff] [blame] | 149 | mov x1, #\_size |
| 150 | madd x0, x0, x1, x2 |
| 151 | .endm |
| 152 | |
| 153 | /* |
Andrew Thoelke | 65668f9 | 2014-03-20 10:48:23 +0000 | [diff] [blame] | 154 | * This macro calculates the base address of a UP stack using the |
| 155 | * name of the stack storage and the size of the stack |
| 156 | * Out: X0 = physical address of stack base |
| 157 | */ |
| 158 | .macro get_up_stack _name, _size |
Soby Mathew | fcaf1bd | 2018-10-12 16:40:28 +0100 | [diff] [blame] | 159 | adrp x0, (\_name + \_size) |
| 160 | add x0, x0, :lo12:(\_name + \_size) |
Andrew Thoelke | 65668f9 | 2014-03-20 10:48:23 +0000 | [diff] [blame] | 161 | .endm |
Soby Mathew | 066f713 | 2014-07-14 16:57:23 +0100 | [diff] [blame] | 162 | |
| 163 | /* |
| 164 | * Helper macro to generate the best mov/movk combinations according |
| 165 | * the value to be moved. The 16 bits from '_shift' are tested and |
| 166 | * if not zero, they are moved into '_reg' without affecting |
| 167 | * other bits. |
| 168 | */ |
| 169 | .macro _mov_imm16 _reg, _val, _shift |
| 170 | .if (\_val >> \_shift) & 0xffff |
| 171 | .if (\_val & (1 << \_shift - 1)) |
| 172 | movk \_reg, (\_val >> \_shift) & 0xffff, LSL \_shift |
| 173 | .else |
| 174 | mov \_reg, \_val & (0xffff << \_shift) |
| 175 | .endif |
| 176 | .endif |
| 177 | .endm |
| 178 | |
| 179 | /* |
| 180 | * Helper macro to load arbitrary values into 32 or 64-bit registers |
| 181 | * which generates the best mov/movk combinations. Many base addresses |
| 182 | * are 64KB aligned the macro will eliminate updating bits 15:0 in |
| 183 | * that case |
| 184 | */ |
| 185 | .macro mov_imm _reg, _val |
| 186 | .if (\_val) == 0 |
| 187 | mov \_reg, #0 |
| 188 | .else |
| 189 | _mov_imm16 \_reg, (\_val), 0 |
| 190 | _mov_imm16 \_reg, (\_val), 16 |
| 191 | _mov_imm16 \_reg, (\_val), 32 |
| 192 | _mov_imm16 \_reg, (\_val), 48 |
| 193 | .endif |
| 194 | .endm |
Dan Handley | ea59668 | 2015-04-01 17:34:24 +0100 | [diff] [blame] | 195 | |
Jeenu Viswambharan | 68aef10 | 2016-11-30 15:21:11 +0000 | [diff] [blame] | 196 | /* |
| 197 | * Macro to mark instances where we're jumping to a function and don't |
| 198 | * expect a return. To provide the function being jumped to with |
| 199 | * additional information, we use 'bl' instruction to jump rather than |
| 200 | * 'b'. |
| 201 | * |
| 202 | * Debuggers infer the location of a call from where LR points to, which |
| 203 | * is usually the instruction after 'bl'. If this macro expansion |
| 204 | * happens to be the last location in a function, that'll cause the LR |
| 205 | * to point a location beyond the function, thereby misleading debugger |
| 206 | * back trace. We therefore insert a 'nop' after the function call for |
| 207 | * debug builds, unless 'skip_nop' parameter is non-zero. |
| 208 | */ |
| 209 | .macro no_ret _func:req, skip_nop=0 |
| 210 | bl \_func |
| 211 | #if DEBUG |
| 212 | .ifeq \skip_nop |
| 213 | nop |
| 214 | .endif |
| 215 | #endif |
| 216 | .endm |
| 217 | |
Jeenu Viswambharan | 54ec86a | 2017-01-19 14:23:36 +0000 | [diff] [blame] | 218 | /* |
| 219 | * Reserve space for a spin lock in assembly file. |
| 220 | */ |
| 221 | .macro define_asm_spinlock _name:req |
| 222 | .align SPINLOCK_ASM_ALIGN |
| 223 | \_name: |
| 224 | .space SPINLOCK_ASM_SIZE |
| 225 | .endm |
| 226 | |
Manish Pandey | 3531ac7 | 2023-04-27 10:02:35 +0100 | [diff] [blame] | 227 | /* |
| 228 | * With RAS extension executes esb instruction, else NOP |
| 229 | */ |
Jeenu Viswambharan | 9a7ce2f | 2018-04-04 16:07:11 +0100 | [diff] [blame] | 230 | .macro esb |
| 231 | .inst 0xd503221f |
| 232 | .endm |
Alexei Fedorov | 90f2e88 | 2019-05-24 12:17:09 +0100 | [diff] [blame] | 233 | |
| 234 | /* |
| 235 | * Helper macro to read system register value into x0 |
| 236 | */ |
| 237 | .macro read reg:req |
| 238 | #if ENABLE_BTI |
| 239 | bti j |
| 240 | #endif |
| 241 | mrs x0, \reg |
| 242 | ret |
| 243 | .endm |
| 244 | |
| 245 | /* |
| 246 | * Helper macro to write value from x1 to system register |
| 247 | */ |
| 248 | .macro write reg:req |
| 249 | #if ENABLE_BTI |
| 250 | bti j |
Jeenu Viswambharan | 9a7ce2f | 2018-04-04 16:07:11 +0100 | [diff] [blame] | 251 | #endif |
Alexei Fedorov | 90f2e88 | 2019-05-24 12:17:09 +0100 | [diff] [blame] | 252 | msr \reg, x1 |
| 253 | ret |
| 254 | .endm |
Jeenu Viswambharan | 9a7ce2f | 2018-04-04 16:07:11 +0100 | [diff] [blame] | 255 | |
Anthony Steinhauser | 0f7e601 | 2020-01-07 15:44:06 -0800 | [diff] [blame] | 256 | /* |
Andre Przywara | c735f1c | 2022-11-25 14:10:13 +0000 | [diff] [blame] | 257 | * The "sb" instruction was introduced later into the architecture, |
| 258 | * so not all toolchains understand it. Some deny its usage unless |
| 259 | * a supported processor is specified on the build command line. |
| 260 | * Use sb's system register encoding to work around this, we already |
| 261 | * guard the sb execution with a feature flag. |
| 262 | */ |
| 263 | |
| 264 | .macro sb_barrier_insn |
| 265 | msr SYSREG_SB, xzr |
| 266 | .endm |
| 267 | |
| 268 | /* |
Bipin Ravi | 9ee6dd4 | 2022-10-13 17:25:51 -0500 | [diff] [blame] | 269 | * Macro for using speculation barrier instruction introduced by |
| 270 | * FEAT_SB, if it's enabled. |
| 271 | */ |
| 272 | .macro speculation_barrier |
| 273 | #if ENABLE_FEAT_SB |
Andre Przywara | c735f1c | 2022-11-25 14:10:13 +0000 | [diff] [blame] | 274 | sb_barrier_insn |
Bipin Ravi | 9ee6dd4 | 2022-10-13 17:25:51 -0500 | [diff] [blame] | 275 | #else |
| 276 | dsb sy |
| 277 | isb |
| 278 | #endif |
| 279 | .endm |
| 280 | |
| 281 | /* |
Chris Kay | 08fec33 | 2021-03-09 13:34:35 +0000 | [diff] [blame] | 282 | * Macro for mitigating against speculative execution beyond ERET. Uses the |
| 283 | * speculation barrier instruction introduced by FEAT_SB, if it's enabled. |
Anthony Steinhauser | 0f7e601 | 2020-01-07 15:44:06 -0800 | [diff] [blame] | 284 | */ |
| 285 | .macro exception_return |
| 286 | eret |
Chris Kay | 08fec33 | 2021-03-09 13:34:35 +0000 | [diff] [blame] | 287 | #if ENABLE_FEAT_SB |
Andre Przywara | c735f1c | 2022-11-25 14:10:13 +0000 | [diff] [blame] | 288 | sb_barrier_insn |
Madhukar Pappireddy | bfe7bb6 | 2020-03-10 18:04:59 -0500 | [diff] [blame] | 289 | #else |
| 290 | dsb nsh |
Anthony Steinhauser | 0f7e601 | 2020-01-07 15:44:06 -0800 | [diff] [blame] | 291 | isb |
Madhukar Pappireddy | bfe7bb6 | 2020-03-10 18:04:59 -0500 | [diff] [blame] | 292 | #endif |
Anthony Steinhauser | 0f7e601 | 2020-01-07 15:44:06 -0800 | [diff] [blame] | 293 | .endm |
| 294 | |
Antonio Nino Diaz | 5eb8837 | 2018-11-08 10:20:19 +0000 | [diff] [blame] | 295 | #endif /* ASM_MACROS_S */ |