blob: d9a91886658de29c3daaae3f8a3f0245137afc4a [file] [log] [blame]
Achin Gupta9ac63c52014-01-16 12:08:03 +00001/*
Boyan Karatotev90b7b752024-11-15 15:03:02 +00002 * Copyright (c) 2013-2025, Arm Limited and Contributors. All rights reserved.
Achin Gupta9ac63c52014-01-16 12:08:03 +00003 *
dp-armfa3cf0b2017-05-03 09:38:09 +01004 * SPDX-License-Identifier: BSD-3-Clause
Achin Gupta9ac63c52014-01-16 12:08:03 +00005 */
6
Antonio Nino Diaz864ca6f2018-10-31 15:25:35 +00007#ifndef CONTEXT_H
8#define CONTEXT_H
Achin Gupta9ac63c52014-01-16 12:08:03 +00009
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +010010#if (CTX_INCLUDE_EL2_REGS && IMAGE_BL31)
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +000011#include <lib/el3_runtime/context_el2.h>
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +010012#else
13/**
14 * El1 context is required either when:
15 * IMAGE_BL1 || ((!CTX_INCLUDE_EL2_REGS) && IMAGE_BL31)
16 */
17#include <lib/el3_runtime/context_el1.h>
18#endif /* (CTX_INCLUDE_EL2_REGS && IMAGE_BL31) */
19
Elizabeth Ho4fc00d22023-07-18 14:10:25 +010020#include <lib/el3_runtime/cpu_data.h>
Madhukar Pappireddy5c1b8d92024-06-17 15:26:00 -050021#include <lib/el3_runtime/simd_ctx.h>
Antonio Nino Diaze0f90632018-12-14 00:18:21 +000022#include <lib/utils_def.h>
Jeenu Viswambharan96c7df02017-11-30 12:54:15 +000023
Achin Gupta9ac63c52014-01-16 12:08:03 +000024/*******************************************************************************
Achin Gupta07f4e072014-02-02 12:02:23 +000025 * Constants that allow assembler code to access members of and the 'gp_regs'
26 * structure at their correct offsets.
27 ******************************************************************************/
Varun Wadekarc6a11f62017-05-25 18:04:48 -070028#define CTX_GPREGS_OFFSET U(0x0)
29#define CTX_GPREG_X0 U(0x0)
30#define CTX_GPREG_X1 U(0x8)
31#define CTX_GPREG_X2 U(0x10)
32#define CTX_GPREG_X3 U(0x18)
33#define CTX_GPREG_X4 U(0x20)
34#define CTX_GPREG_X5 U(0x28)
35#define CTX_GPREG_X6 U(0x30)
36#define CTX_GPREG_X7 U(0x38)
37#define CTX_GPREG_X8 U(0x40)
38#define CTX_GPREG_X9 U(0x48)
39#define CTX_GPREG_X10 U(0x50)
40#define CTX_GPREG_X11 U(0x58)
41#define CTX_GPREG_X12 U(0x60)
42#define CTX_GPREG_X13 U(0x68)
43#define CTX_GPREG_X14 U(0x70)
44#define CTX_GPREG_X15 U(0x78)
45#define CTX_GPREG_X16 U(0x80)
46#define CTX_GPREG_X17 U(0x88)
47#define CTX_GPREG_X18 U(0x90)
48#define CTX_GPREG_X19 U(0x98)
49#define CTX_GPREG_X20 U(0xa0)
50#define CTX_GPREG_X21 U(0xa8)
51#define CTX_GPREG_X22 U(0xb0)
52#define CTX_GPREG_X23 U(0xb8)
53#define CTX_GPREG_X24 U(0xc0)
54#define CTX_GPREG_X25 U(0xc8)
55#define CTX_GPREG_X26 U(0xd0)
56#define CTX_GPREG_X27 U(0xd8)
57#define CTX_GPREG_X28 U(0xe0)
58#define CTX_GPREG_X29 U(0xe8)
59#define CTX_GPREG_LR U(0xf0)
60#define CTX_GPREG_SP_EL0 U(0xf8)
61#define CTX_GPREGS_END U(0x100)
Achin Gupta07f4e072014-02-02 12:02:23 +000062
63/*******************************************************************************
Achin Gupta9ac63c52014-01-16 12:08:03 +000064 * Constants that allow assembler code to access members of and the 'el3_state'
65 * structure at their correct offsets. Note that some of the registers are only
66 * 32-bits wide but are stored as 64-bit values for convenience
67 ******************************************************************************/
Dimitris Papastamosb63c6f12018-01-11 15:29:36 +000068#define CTX_EL3STATE_OFFSET (CTX_GPREGS_OFFSET + CTX_GPREGS_END)
Varun Wadekarc6a11f62017-05-25 18:04:48 -070069#define CTX_SCR_EL3 U(0x0)
Manish Pandeyb780d992025-02-03 12:00:56 +000070#define CTX_RUNTIME_SP U(0x8)
71#define CTX_SPSR_EL3 U(0x10)
72#define CTX_ELR_EL3 U(0x18)
73#define CTX_PMCR_EL0 U(0x20)
74#define CTX_IS_IN_EL3 U(0x28)
75#define CTX_MDCR_EL3 U(0x30)
Manish Pandey07952fb2023-05-25 13:46:14 +010076/* Constants required in supporting nested exception in EL3 */
Manish Pandeyb780d992025-02-03 12:00:56 +000077#define CTX_SAVED_ELR_EL3 U(0x38)
Manish Pandey07952fb2023-05-25 13:46:14 +010078/*
79 * General purpose flag, to save various EL3 states
80 * FFH mode : Used to identify if handling nested exception
81 * KFH mode : Used as counter value
82 */
Manish Pandeyb780d992025-02-03 12:00:56 +000083#define CTX_NESTED_EA_FLAG U(0x40)
Manish Pandeyf90a73c2023-10-10 15:42:19 +010084#if FFH_SUPPORT
Manish Pandeyb780d992025-02-03 12:00:56 +000085 #define CTX_SAVED_ESR_EL3 U(0x48)
86 #define CTX_SAVED_SPSR_EL3 U(0x50)
87 #define CTX_SAVED_GPREG_LR U(0x58)
88 #define CTX_DOUBLE_FAULT_ESR U(0x60)
Jayanth Dodderi Chidanand118b3352024-06-18 15:22:54 +010089 #define CTX_EL3STATE_END U(0x70) /* Align to the next 16 byte boundary */
Manish Pandey07952fb2023-05-25 13:46:14 +010090#else
91 #define CTX_EL3STATE_END U(0x50) /* Align to the next 16 byte boundary */
Arvind Ram Prakashb5d95592023-11-08 12:28:30 -060092#endif /* FFH_SUPPORT */
Achin Gupta9ac63c52014-01-16 12:08:03 +000093
Achin Gupta9ac63c52014-01-16 12:08:03 +000094
Antonio Nino Diaz13adfb12019-01-30 20:41:31 +000095/*******************************************************************************
96 * Registers related to CVE-2018-3639
97 ******************************************************************************/
Madhukar Pappireddy36d524f2024-04-25 23:05:26 -050098#define CTX_CVE_2018_3639_OFFSET (CTX_EL3STATE_OFFSET + CTX_EL3STATE_END)
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +010099#define CTX_CVE_2018_3639_DISABLE U(0)
100#define CTX_CVE_2018_3639_END U(0x10) /* Align to the next 16 byte boundary */
101
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000102/*******************************************************************************
Jayanth Dodderi Chidanand3a71df62024-06-05 11:13:05 +0100103 * Registers related to ERRATA_SPECULATIVE_AT
104 *
105 * This is essential as with EL1 and EL2 context registers being decoupled,
106 * both will not be present for a given build configuration.
107 * As ERRATA_SPECULATIVE_AT errata requires SCTLR_EL1 and TCR_EL1 registers
108 * independent of the above logic, we need explicit context entries to be
109 * reserved for these registers.
110 *
111 * NOTE: Based on this we end up with following different configurations depending
112 * on the presence of errata and inclusion of EL1 or EL2 context.
113 *
114 * ============================================================================
115 * | ERRATA_SPECULATIVE_AT | EL1 context| Memory allocation(Sctlr_el1,Tcr_el1)|
116 * ============================================================================
117 * | 0 | 0 | None |
118 * | 0 | 1 | EL1 C-Context structure |
119 * | 1 | 0 | Errata Context Offset Entries |
120 * | 1 | 1 | Errata Context Offset Entries |
121 * ============================================================================
122 *
123 * In the above table, when ERRATA_SPECULATIVE_AT=1, EL1_Context=0, it implies
124 * there is only EL2 context and memory for SCTLR_EL1 and TCR_EL1 registers is
125 * reserved explicitly under ERRATA_SPECULATIVE_AT build flag here.
126 *
127 * In situations when EL1_Context=1 and ERRATA_SPECULATIVE_AT=1, since SCTLR_EL1
128 * and TCR_EL1 registers will be modified under errata and it happens at the
129 * early in the codeflow prior to el1 context (save and restore operations),
130 * context memory still will be reserved under the errata logic here explicitly.
131 * These registers will not be part of EL1 context save & restore routines.
132 *
133 * Only when ERRATA_SPECULATIVE_AT=0, EL1_Context=1, for this combination,
134 * SCTLR_EL1 and TCR_EL1 will be part of EL1 context structure (context_el1.h)
135 * -----------------------------------------------------------------------------
136 ******************************************************************************/
137#define CTX_ERRATA_SPEC_AT_OFFSET (CTX_CVE_2018_3639_OFFSET + CTX_CVE_2018_3639_END)
138#if ERRATA_SPECULATIVE_AT
139#define CTX_ERRATA_SPEC_AT_SCTLR_EL1 U(0x0)
140#define CTX_ERRATA_SPEC_AT_TCR_EL1 U(0x8)
141#define CTX_ERRATA_SPEC_AT_END U(0x10) /* Align to the next 16 byte boundary */
142#else
143#define CTX_ERRATA_SPEC_AT_END U(0x0)
144#endif /* ERRATA_SPECULATIVE_AT */
145
146/*******************************************************************************
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000147 * Registers related to ARMv8.3-PAuth.
148 ******************************************************************************/
Jayanth Dodderi Chidanand3a71df62024-06-05 11:13:05 +0100149#define CTX_PAUTH_REGS_OFFSET (CTX_ERRATA_SPEC_AT_OFFSET + CTX_ERRATA_SPEC_AT_END)
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000150#if CTX_INCLUDE_PAUTH_REGS
151#define CTX_PACIAKEY_LO U(0x0)
152#define CTX_PACIAKEY_HI U(0x8)
153#define CTX_PACIBKEY_LO U(0x10)
154#define CTX_PACIBKEY_HI U(0x18)
155#define CTX_PACDAKEY_LO U(0x20)
156#define CTX_PACDAKEY_HI U(0x28)
157#define CTX_PACDBKEY_LO U(0x30)
158#define CTX_PACDBKEY_HI U(0x38)
159#define CTX_PACGAKEY_LO U(0x40)
160#define CTX_PACGAKEY_HI U(0x48)
Alexei Fedorovf41355c2019-09-13 14:11:59 +0100161#define CTX_PAUTH_REGS_END U(0x50) /* Align to the next 16 byte boundary */
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000162#else
163#define CTX_PAUTH_REGS_END U(0)
164#endif /* CTX_INCLUDE_PAUTH_REGS */
165
Elizabeth Ho4fc00d22023-07-18 14:10:25 +0100166/*******************************************************************************
167 * Registers initialised in a per-world context.
168 ******************************************************************************/
Jayanth Dodderi Chidanand56aa3822023-12-11 11:22:02 +0000169#define CTX_CPTR_EL3 U(0x0)
Boyan Karatotev90b7b752024-11-15 15:03:02 +0000170#define CTX_MPAM3_EL3 U(0x8)
171#define CTX_PERWORLD_EL3STATE_END U(0x10)
Elizabeth Ho4fc00d22023-07-18 14:10:25 +0100172
Julius Werner53456fc2019-07-09 13:49:11 -0700173#ifndef __ASSEMBLER__
Achin Gupta9ac63c52014-01-16 12:08:03 +0000174
Dan Handley2bd4ef22014-04-09 13:14:54 +0100175#include <stdint.h>
176
Antonio Nino Diaze0f90632018-12-14 00:18:21 +0000177#include <lib/cassert.h>
178
Achin Gupta9ac63c52014-01-16 12:08:03 +0000179/*
180 * Common constants to help define the 'cpu_context' structure and its
181 * members below.
182 */
Varun Wadekarc6a11f62017-05-25 18:04:48 -0700183#define DWORD_SHIFT U(3)
Achin Gupta9ac63c52014-01-16 12:08:03 +0000184#define DEFINE_REG_STRUCT(name, num_regs) \
Dan Handleye2712bc2014-04-10 15:37:22 +0100185 typedef struct name { \
Zelalem91d80612020-02-12 10:37:03 -0600186 uint64_t ctx_regs[num_regs]; \
Dan Handleye2712bc2014-04-10 15:37:22 +0100187 } __aligned(16) name##_t
Achin Gupta9ac63c52014-01-16 12:08:03 +0000188
189/* Constants to determine the size of individual context structures */
Achin Gupta07f4e072014-02-02 12:02:23 +0000190#define CTX_GPREG_ALL (CTX_GPREGS_END >> DWORD_SHIFT)
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000191
Achin Gupta9ac63c52014-01-16 12:08:03 +0000192#define CTX_EL3STATE_ALL (CTX_EL3STATE_END >> DWORD_SHIFT)
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100193#define CTX_CVE_2018_3639_ALL (CTX_CVE_2018_3639_END >> DWORD_SHIFT)
Jayanth Dodderi Chidanand3a71df62024-06-05 11:13:05 +0100194
195#if ERRATA_SPECULATIVE_AT
196#define CTX_ERRATA_SPEC_AT_ALL (CTX_ERRATA_SPEC_AT_END >> DWORD_SHIFT)
197#endif
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000198#if CTX_INCLUDE_PAUTH_REGS
199# define CTX_PAUTH_REGS_ALL (CTX_PAUTH_REGS_END >> DWORD_SHIFT)
200#endif
Achin Gupta9ac63c52014-01-16 12:08:03 +0000201
202/*
Soby Mathew6c5192a2014-04-30 15:36:37 +0100203 * AArch64 general purpose register context structure. Usually x0-x18,
204 * lr are saved as the compiler is expected to preserve the remaining
Achin Gupta07f4e072014-02-02 12:02:23 +0000205 * callee saved registers if used by the C runtime and the assembler
Soby Mathew6c5192a2014-04-30 15:36:37 +0100206 * does not touch the remaining. But in case of world switch during
207 * exception handling, we need to save the callee registers too.
Achin Gupta07f4e072014-02-02 12:02:23 +0000208 */
Jeenu Viswambharancaa84932014-02-06 10:36:15 +0000209DEFINE_REG_STRUCT(gp_regs, CTX_GPREG_ALL);
Achin Gupta07f4e072014-02-02 12:02:23 +0000210
211/*
Achin Gupta9ac63c52014-01-16 12:08:03 +0000212 * Miscellaneous registers used by EL3 firmware to maintain its state
213 * across exception entries and exits
214 */
215DEFINE_REG_STRUCT(el3_state, CTX_EL3STATE_ALL);
216
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100217/* Function pointer used by CVE-2018-3639 dynamic mitigation */
218DEFINE_REG_STRUCT(cve_2018_3639, CTX_CVE_2018_3639_ALL);
219
Jayanth Dodderi Chidanand3a71df62024-06-05 11:13:05 +0100220/* Registers associated to Errata_Speculative */
221#if ERRATA_SPECULATIVE_AT
222DEFINE_REG_STRUCT(errata_speculative_at, CTX_ERRATA_SPEC_AT_ALL);
223#endif
224
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000225/* Registers associated to ARMv8.3-PAuth */
226#if CTX_INCLUDE_PAUTH_REGS
227DEFINE_REG_STRUCT(pauth, CTX_PAUTH_REGS_ALL);
228#endif
229
Achin Gupta9ac63c52014-01-16 12:08:03 +0000230/*
231 * Macros to access members of any of the above structures using their
232 * offsets
233 */
Zelalem91d80612020-02-12 10:37:03 -0600234#define read_ctx_reg(ctx, offset) ((ctx)->ctx_regs[(offset) >> DWORD_SHIFT])
235#define write_ctx_reg(ctx, offset, val) (((ctx)->ctx_regs[(offset) >> DWORD_SHIFT]) \
Jeenu Viswambharan32ceef52018-08-02 10:14:12 +0100236 = (uint64_t) (val))
Achin Gupta9ac63c52014-01-16 12:08:03 +0000237
238/*
Zelalem Awekeb6301e62021-07-09 17:54:30 -0500239 * Top-level context structure which is used by EL3 firmware to preserve
240 * the state of a core at the next lower EL in a given security state and
241 * save enough EL3 meta data to be able to return to that EL and security
242 * state. The context management library will be used to ensure that
243 * SP_EL3 always points to an instance of this structure at exception
244 * entry and exit.
Achin Gupta9ac63c52014-01-16 12:08:03 +0000245 */
Dan Handleye2712bc2014-04-10 15:37:22 +0100246typedef struct cpu_context {
247 gp_regs_t gpregs_ctx;
248 el3_state_t el3state_ctx;
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000249
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100250 cve_2018_3639_t cve_2018_3639_ctx;
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000251
Jayanth Dodderi Chidanand3a71df62024-06-05 11:13:05 +0100252#if ERRATA_SPECULATIVE_AT
253 errata_speculative_at_t errata_speculative_at_ctx;
254#endif
255
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000256#if CTX_INCLUDE_PAUTH_REGS
257 pauth_t pauth_ctx;
258#endif
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000259
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +0100260#if (CTX_INCLUDE_EL2_REGS && IMAGE_BL31)
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000261 el2_sysregs_t el2_sysregs_ctx;
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +0100262#else
263 /* El1 context should be included only either for IMAGE_BL1,
264 * or for IMAGE_BL31 when CTX_INCLUDE_EL2_REGS=0:
265 * When SPMD_SPM_AT_SEL2=1, SPMC at S-EL2 takes care of saving
266 * and restoring EL1 registers. In this case, BL31 at EL3 can
267 * exclude save and restore of EL1 context registers.
268 */
269 el1_sysregs_t el1_sysregs_ctx;
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000270#endif
271
Dan Handleye2712bc2014-04-10 15:37:22 +0100272} cpu_context_t;
Achin Gupta9ac63c52014-01-16 12:08:03 +0000273
Elizabeth Ho4fc00d22023-07-18 14:10:25 +0100274/*
275 * Per-World Context.
276 * It stores registers whose values can be shared across CPUs.
277 */
278typedef struct per_world_context {
279 uint64_t ctx_cptr_el3;
Arvind Ram Prakashb5d95592023-11-08 12:28:30 -0600280 uint64_t ctx_mpam3_el3;
Elizabeth Ho4fc00d22023-07-18 14:10:25 +0100281} per_world_context_t;
282
283extern per_world_context_t per_world_context[CPU_DATA_CONTEXT_NUM];
284
Dan Handleye2712bc2014-04-10 15:37:22 +0100285/* Macros to access members of the 'cpu_context_t' structure */
286#define get_el3state_ctx(h) (&((cpu_context_t *) h)->el3state_ctx)
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +0100287
288#if (CTX_INCLUDE_EL2_REGS && IMAGE_BL31)
289#define get_el2_sysregs_ctx(h) (&((cpu_context_t *) h)->el2_sysregs_ctx)
290#else
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000291#define get_el1_sysregs_ctx(h) (&((cpu_context_t *) h)->el1_sysregs_ctx)
Max Shvetsovc9e2c922020-02-17 16:15:47 +0000292#endif
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +0100293
Dan Handleye2712bc2014-04-10 15:37:22 +0100294#define get_gpregs_ctx(h) (&((cpu_context_t *) h)->gpregs_ctx)
Dimitris Papastamosbb1fd5b2018-06-07 11:29:15 +0100295#define get_cve_2018_3639_ctx(h) (&((cpu_context_t *) h)->cve_2018_3639_ctx)
Jayanth Dodderi Chidanand3a71df62024-06-05 11:13:05 +0100296
297#if ERRATA_SPECULATIVE_AT
298#define get_errata_speculative_at_ctx(h) (&((cpu_context_t *) h)->errata_speculative_at_ctx)
299#endif
300
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000301#if CTX_INCLUDE_PAUTH_REGS
302# define get_pauth_ctx(h) (&((cpu_context_t *) h)->pauth_ctx)
303#endif
Achin Gupta9ac63c52014-01-16 12:08:03 +0000304
305/*
306 * Compile time assertions related to the 'cpu_context' structure to
307 * ensure that the assembler and the compiler view of the offsets of
308 * the structure members is the same.
309 */
Elyes Haouas183638f2023-02-13 10:05:41 +0100310CASSERT(CTX_GPREGS_OFFSET == __builtin_offsetof(cpu_context_t, gpregs_ctx),
Achin Gupta07f4e072014-02-02 12:02:23 +0000311 assert_core_context_gp_offset_mismatch);
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000312
313CASSERT(CTX_EL3STATE_OFFSET == __builtin_offsetof(cpu_context_t, el3state_ctx),
314 assert_core_context_el3state_offset_mismatch);
315
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000316
Elyes Haouas183638f2023-02-13 10:05:41 +0100317CASSERT(CTX_CVE_2018_3639_OFFSET == __builtin_offsetof(cpu_context_t, cve_2018_3639_ctx),
Dimitris Papastamosba51d9e2018-05-16 11:36:14 +0100318 assert_core_context_cve_2018_3639_offset_mismatch);
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000319
Jayanth Dodderi Chidanand3a71df62024-06-05 11:13:05 +0100320#if ERRATA_SPECULATIVE_AT
321CASSERT(CTX_ERRATA_SPEC_AT_OFFSET == __builtin_offsetof(cpu_context_t, errata_speculative_at_ctx),
322 assert_core_context_errata_speculative_at_offset_mismatch);
323#endif
324
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000325#if CTX_INCLUDE_PAUTH_REGS
Elyes Haouas183638f2023-02-13 10:05:41 +0100326CASSERT(CTX_PAUTH_REGS_OFFSET == __builtin_offsetof(cpu_context_t, pauth_ctx),
Antonio Nino Diaz594811b2019-01-31 11:58:00 +0000327 assert_core_context_pauth_offset_mismatch);
Jayanth Dodderi Chidanandfbbee6b2024-01-24 20:05:07 +0000328#endif /* CTX_INCLUDE_PAUTH_REGS */
329
Achin Gupta607084e2014-02-09 18:24:19 +0000330/*
331 * Helper macro to set the general purpose registers that correspond to
332 * parameters in an aapcs_64 call i.e. x0-x7
333 */
334#define set_aapcs_args0(ctx, x0) do { \
335 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X0, x0); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100336 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000337#define set_aapcs_args1(ctx, x0, x1) do { \
338 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X1, x1); \
339 set_aapcs_args0(ctx, x0); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100340 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000341#define set_aapcs_args2(ctx, x0, x1, x2) do { \
342 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X2, x2); \
343 set_aapcs_args1(ctx, x0, x1); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100344 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000345#define set_aapcs_args3(ctx, x0, x1, x2, x3) do { \
346 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X3, x3); \
347 set_aapcs_args2(ctx, x0, x1, x2); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100348 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000349#define set_aapcs_args4(ctx, x0, x1, x2, x3, x4) do { \
350 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X4, x4); \
351 set_aapcs_args3(ctx, x0, x1, x2, x3); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100352 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000353#define set_aapcs_args5(ctx, x0, x1, x2, x3, x4, x5) do { \
354 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X5, x5); \
355 set_aapcs_args4(ctx, x0, x1, x2, x3, x4); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100356 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000357#define set_aapcs_args6(ctx, x0, x1, x2, x3, x4, x5, x6) do { \
358 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X6, x6); \
359 set_aapcs_args5(ctx, x0, x1, x2, x3, x4, x5); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100360 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000361#define set_aapcs_args7(ctx, x0, x1, x2, x3, x4, x5, x6, x7) do { \
362 write_ctx_reg(get_gpregs_ctx(ctx), CTX_GPREG_X7, x7); \
363 set_aapcs_args6(ctx, x0, x1, x2, x3, x4, x5, x6); \
Soby Mathew24ab34f2016-05-03 17:11:42 +0100364 } while (0)
Achin Gupta607084e2014-02-09 18:24:19 +0000365
Achin Gupta9ac63c52014-01-16 12:08:03 +0000366/*******************************************************************************
367 * Function prototypes
368 ******************************************************************************/
Juan Castillo258e94f2014-06-25 17:26:36 +0100369#if CTX_INCLUDE_FPREGS
Madhukar Pappireddy5c1b8d92024-06-17 15:26:00 -0500370void fpregs_context_save(simd_regs_t *regs);
371void fpregs_context_restore(simd_regs_t *regs);
Juan Castillo258e94f2014-06-25 17:26:36 +0100372#endif
Achin Gupta9ac63c52014-01-16 12:08:03 +0000373
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +0100374/*******************************************************************************
375 * The next four inline functions are required for IMAGE_BL1, as well as for
376 * IMAGE_BL31 for the below combinations.
377 * ============================================================================
378 * | ERRATA_SPECULATIVE_AT| CTX_INCLUDE_EL2_REGS | Combination |
379 * ============================================================================
380 * | 0 | 0 | Valid (EL1 ctx) |
381 * |______________________|______________________|____________________________|
382 * | | | Invalid (No Errata/EL1 Ctx)|
383 * | 0 | 1 | Hence commented out. |
384 * |______________________|______________________|____________________________|
385 * | | | |
386 * | 1 | 0 | Valid (Errata ctx) |
387 * |______________________|______________________|____________________________|
388 * | | | |
389 * | 1 | 1 | Valid (Errata ctx) |
390 * |______________________|______________________|____________________________|
391 * ============================================================================
392 ******************************************************************************/
393#if (IMAGE_BL1 || ((ERRATA_SPECULATIVE_AT) || (!CTX_INCLUDE_EL2_REGS)))
394
Jayanth Dodderi Chidanandaeb82d62024-07-30 17:04:23 +0100395static inline void write_ctx_sctlr_el1_reg_errata(cpu_context_t *ctx, u_register_t val)
396{
397#if (ERRATA_SPECULATIVE_AT)
398 write_ctx_reg(get_errata_speculative_at_ctx(ctx),
399 CTX_ERRATA_SPEC_AT_SCTLR_EL1, val);
400#else
401 write_el1_ctx_common(get_el1_sysregs_ctx(ctx), sctlr_el1, val);
402#endif /* ERRATA_SPECULATIVE_AT */
403}
404
405static inline void write_ctx_tcr_el1_reg_errata(cpu_context_t *ctx, u_register_t val)
406{
407#if (ERRATA_SPECULATIVE_AT)
408 write_ctx_reg(get_errata_speculative_at_ctx(ctx),
409 CTX_ERRATA_SPEC_AT_TCR_EL1, val);
410#else
411 write_el1_ctx_common(get_el1_sysregs_ctx(ctx), tcr_el1, val);
412#endif /* ERRATA_SPECULATIVE_AT */
413}
414
415static inline u_register_t read_ctx_sctlr_el1_reg_errata(cpu_context_t *ctx)
416{
417#if (ERRATA_SPECULATIVE_AT)
418 return read_ctx_reg(get_errata_speculative_at_ctx(ctx),
419 CTX_ERRATA_SPEC_AT_SCTLR_EL1);
420#else
421 return read_el1_ctx_common(get_el1_sysregs_ctx(ctx), sctlr_el1);
422#endif /* ERRATA_SPECULATIVE_AT */
423}
424
425static inline u_register_t read_ctx_tcr_el1_reg_errata(cpu_context_t *ctx)
426{
427#if (ERRATA_SPECULATIVE_AT)
428 return read_ctx_reg(get_errata_speculative_at_ctx(ctx),
429 CTX_ERRATA_SPEC_AT_TCR_EL1);
430#else
431 return read_el1_ctx_common(get_el1_sysregs_ctx(ctx), tcr_el1);
432#endif /* ERRATA_SPECULATIVE_AT */
433}
434
Jayanth Dodderi Chidanand9abe23b2024-05-07 18:50:57 +0100435#endif /* (IMAGE_BL1 || ((ERRATA_SPECULATIVE_AT) || (!CTX_INCLUDE_EL2_REGS))) */
436
Julius Werner53456fc2019-07-09 13:49:11 -0700437#endif /* __ASSEMBLER__ */
Achin Gupta9ac63c52014-01-16 12:08:03 +0000438
Antonio Nino Diaz864ca6f2018-10-31 15:25:35 +0000439#endif /* CONTEXT_H */