1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Based on arch/arm/mm/proc.S
5 * Copyright (C) 2001 Deep Blue Solutions Ltd.
6 * Copyright (C) 2012 ARM Ltd.
7 * Author: Catalin Marinas <catalin.marinas@arm.com>
10 #include <linux/init.h>
11 #include <linux/linkage.h>
12 #include <linux/pgtable.h>
13 #include <asm/assembler.h>
14 #include <asm/asm-offsets.h>
15 #include <asm/asm_pointer_auth.h>
16 #include <asm/hwcap.h>
17 #include <asm/pgtable-hwdef.h>
18 #include <asm/cpufeature.h>
19 #include <asm/alternative.h>
21 #include <asm/sysreg.h>
23 #ifdef CONFIG_ARM64_64K_PAGES
24 #define TCR_TG_FLAGS TCR_TG0_64K | TCR_TG1_64K
25 #elif defined(CONFIG_ARM64_16K_PAGES)
26 #define TCR_TG_FLAGS TCR_TG0_16K | TCR_TG1_16K
27 #else /* CONFIG_ARM64_4K_PAGES */
28 #define TCR_TG_FLAGS TCR_TG0_4K | TCR_TG1_4K
31 #ifdef CONFIG_RANDOMIZE_BASE
32 #define TCR_KASLR_FLAGS TCR_NFD1
34 #define TCR_KASLR_FLAGS 0
37 #define TCR_SMP_FLAGS TCR_SHARED
39 /* PTWs cacheable, inner/outer WBWA */
40 #define TCR_CACHE_FLAGS TCR_IRGN_WBWA | TCR_ORGN_WBWA
42 #ifdef CONFIG_KASAN_SW_TAGS
43 #define TCR_KASAN_SW_FLAGS TCR_TBI1 | TCR_TBID1
45 #define TCR_KASAN_SW_FLAGS 0
48 #ifdef CONFIG_KASAN_HW_TAGS
49 #define TCR_KASAN_HW_FLAGS SYS_TCR_EL1_TCMA1 | TCR_TBI1 | TCR_TBID1
51 #define TCR_KASAN_HW_FLAGS 0
55 * Default MAIR_EL1. MT_NORMAL_TAGGED is initially mapped as Normal memory and
56 * changed during __cpu_setup to Normal Tagged if the system supports MTE.
58 #define MAIR_EL1_SET \
59 (MAIR_ATTRIDX(MAIR_ATTR_DEVICE_nGnRnE, MT_DEVICE_nGnRnE) | \
60 MAIR_ATTRIDX(MAIR_ATTR_DEVICE_nGnRE, MT_DEVICE_nGnRE) | \
61 MAIR_ATTRIDX(MAIR_ATTR_DEVICE_GRE, MT_DEVICE_GRE) | \
62 MAIR_ATTRIDX(MAIR_ATTR_NORMAL_NC, MT_NORMAL_NC) | \
63 MAIR_ATTRIDX(MAIR_ATTR_NORMAL, MT_NORMAL) | \
64 MAIR_ATTRIDX(MAIR_ATTR_NORMAL_WT, MT_NORMAL_WT) | \
65 MAIR_ATTRIDX(MAIR_ATTR_NORMAL, MT_NORMAL_TAGGED))
69 * cpu_do_suspend - save CPU registers context
71 * x0: virtual address of context pointer
73 * This must be kept in sync with struct cpu_suspend_ctx in <asm/suspend.h>.
75 SYM_FUNC_START(cpu_do_suspend)
78 mrs x4, contextidr_el1
86 alternative_if_not ARM64_HAS_VIRT_HOST_EXTN
96 stp x10, x11, [x0, #64]
97 stp x12, x13, [x0, #80]
99 * Save x18 as it may be used as a platform register, e.g. by shadow
104 SYM_FUNC_END(cpu_do_suspend)
107 * cpu_do_resume - restore CPU register context
109 * x0: Address of context pointer
111 .pushsection ".idmap.text", "awx"
112 SYM_FUNC_START(cpu_do_resume)
114 ldp x4, x5, [x0, #16]
115 ldp x6, x8, [x0, #32]
116 ldp x9, x10, [x0, #48]
117 ldp x11, x12, [x0, #64]
118 ldp x13, x14, [x0, #80]
120 * Restore x18, as it may be used as a platform register, and clear
121 * the buffer to minimize the risk of exposure when used for shadow
128 msr contextidr_el1, x4
131 /* Don't change t0sz here, mask those bits when restoring */
133 bfi x8, x7, TCR_T0SZ_OFFSET, TCR_TxSZ_WIDTH
139 * __cpu_setup() cleared MDSCR_EL1.MDE and friends, before unmasking
140 * debug exceptions. By restoring MDSCR_EL1 here, we may take a debug
141 * exception. Mask them until local_daif_restore() in cpu_suspend()
148 alternative_if_not ARM64_HAS_VIRT_HOST_EXTN
155 * Restore oslsr_el1 by writing oslar_el1
158 ubfx x11, x11, #1, #1
160 reset_pmuserenr_el0 x0 // Disable PMU access from EL0
161 reset_amuserenr_el0 x0 // Disable AMU access from EL0
163 alternative_if ARM64_HAS_RAS_EXTN
164 msr_s SYS_DISR_EL1, xzr
165 alternative_else_nop_endif
167 ptrauth_keys_install_kernel_nosync x14, x1, x2, x3
170 SYM_FUNC_END(cpu_do_resume)
174 .pushsection ".idmap.text", "awx"
176 .macro __idmap_cpu_set_reserved_ttbr1, tmp1, tmp2
177 adrp \tmp1, reserved_pg_dir
178 phys_to_ttbr \tmp2, \tmp1
179 offset_ttbr1 \tmp2, \tmp1
188 * void idmap_cpu_replace_ttbr1(phys_addr_t ttbr1)
190 * This is the low-level counterpart to cpu_replace_ttbr1, and should not be
191 * called by anything else. It can only be executed from a TTBR0 mapping.
193 SYM_FUNC_START(idmap_cpu_replace_ttbr1)
194 save_and_disable_daif flags=x2
196 __idmap_cpu_set_reserved_ttbr1 x1, x3
205 SYM_FUNC_END(idmap_cpu_replace_ttbr1)
208 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0
209 .pushsection ".idmap.text", "awx"
211 .macro __idmap_kpti_get_pgtable_ent, type
212 dc cvac, cur_\()\type\()p // Ensure any existing dirty
213 dmb sy // lines are written back before
214 ldr \type, [cur_\()\type\()p] // loading the entry
215 tbz \type, #0, skip_\()\type // Skip invalid and
216 tbnz \type, #11, skip_\()\type // non-global entries
219 .macro __idmap_kpti_put_pgtable_ent_ng, type
220 orr \type, \type, #PTE_NG // Same bit for blocks and pages
221 str \type, [cur_\()\type\()p] // Update the entry and ensure
222 dmb sy // that it is visible to all
223 dc civac, cur_\()\type\()p // CPUs.
227 * void __kpti_install_ng_mappings(int cpu, int num_cpus, phys_addr_t swapper)
229 * Called exactly once from stop_machine context by each CPU found during boot.
233 SYM_FUNC_START(idmap_kpti_install_ng_mappings)
252 mrs swapper_ttb, ttbr1_el1
253 restore_ttbr1 swapper_ttb
254 adr flag_ptr, __idmap_kpti_flag
256 cbnz cpu, __idmap_kpti_secondary
258 /* We're the boot CPU. Wait for the others to catch up */
261 ldaxr w17, [flag_ptr]
262 eor w17, w17, num_cpus
265 /* We need to walk swapper, so turn off the MMU. */
266 pre_disable_mmu_workaround
268 bic x17, x17, #SCTLR_ELx_M
272 /* Everybody is enjoying the idmap, so we can rewrite swapper. */
274 mov cur_pgdp, swapper_pa
275 add end_pgdp, cur_pgdp, #(PTRS_PER_PGD * 8)
276 do_pgd: __idmap_kpti_get_pgtable_ent pgd
277 tbnz pgd, #1, walk_puds
279 __idmap_kpti_put_pgtable_ent_ng pgd
281 add cur_pgdp, cur_pgdp, #8
282 cmp cur_pgdp, end_pgdp
285 /* Publish the updated tables and nuke all the TLBs */
291 /* We're done: fire up the MMU again */
293 orr x17, x17, #SCTLR_ELx_M
298 * Invalidate the local I-cache so that any instructions fetched
299 * speculatively from the PoC are discarded, since they may have
300 * been dynamically patched at the PoU.
306 /* Set the flag to zero to indicate that we're all done */
312 .if CONFIG_PGTABLE_LEVELS > 3
313 pte_to_phys cur_pudp, pgd
314 add end_pudp, cur_pudp, #(PTRS_PER_PUD * 8)
315 do_pud: __idmap_kpti_get_pgtable_ent pud
316 tbnz pud, #1, walk_pmds
318 __idmap_kpti_put_pgtable_ent_ng pud
320 add cur_pudp, cur_pudp, 8
321 cmp cur_pudp, end_pudp
324 .else /* CONFIG_PGTABLE_LEVELS <= 3 */
333 .if CONFIG_PGTABLE_LEVELS > 2
334 pte_to_phys cur_pmdp, pud
335 add end_pmdp, cur_pmdp, #(PTRS_PER_PMD * 8)
336 do_pmd: __idmap_kpti_get_pgtable_ent pmd
337 tbnz pmd, #1, walk_ptes
339 __idmap_kpti_put_pgtable_ent_ng pmd
341 add cur_pmdp, cur_pmdp, #8
342 cmp cur_pmdp, end_pmdp
345 .else /* CONFIG_PGTABLE_LEVELS <= 2 */
354 pte_to_phys cur_ptep, pmd
355 add end_ptep, cur_ptep, #(PTRS_PER_PTE * 8)
356 do_pte: __idmap_kpti_get_pgtable_ent pte
357 __idmap_kpti_put_pgtable_ent_ng pte
359 add cur_ptep, cur_ptep, #8
360 cmp cur_ptep, end_ptep
380 /* Secondary CPUs end up here */
381 __idmap_kpti_secondary:
382 /* Uninstall swapper before surgery begins */
383 __idmap_cpu_set_reserved_ttbr1 x16, x17
385 /* Increment the flag to let the boot CPU we're ready */
386 1: ldxr w16, [flag_ptr]
388 stxr w17, w16, [flag_ptr]
391 /* Wait for the boot CPU to finish messing around with swapper */
397 /* All done, act like nothing happened */
398 offset_ttbr1 swapper_ttb, x16
399 msr ttbr1_el1, swapper_ttb
405 SYM_FUNC_END(idmap_kpti_install_ng_mappings)
412 * Initialise the processor for turning the MMU on.
415 * Return in x0 the value of the SCTLR_EL1 register.
417 .pushsection ".idmap.text", "awx"
418 SYM_FUNC_START(__cpu_setup)
419 tlbi vmalle1 // Invalidate local TLB
423 msr cpacr_el1, x1 // Enable FP/ASIMD
424 mov x1, #1 << 12 // Reset mdscr_el1 and disable
425 msr mdscr_el1, x1 // access to the DCC from EL0
426 isb // Unmask debug exceptions now,
427 enable_dbg // since this is per-cpu
428 reset_pmuserenr_el0 x1 // Disable PMU access from EL0
429 reset_amuserenr_el0 x1 // Disable AMU access from EL0
432 * Memory region attributes
434 mov_q x5, MAIR_EL1_SET
435 #ifdef CONFIG_ARM64_MTE
441 * Update MAIR_EL1, GCR_EL1 and TFSR*_EL1 if MTE is supported
442 * (ID_AA64PFR1_EL1[11:8] > 1).
444 mrs x10, ID_AA64PFR1_EL1
445 ubfx x10, x10, #ID_AA64PFR1_MTE_SHIFT, #4
446 cmp x10, #ID_AA64PFR1_MTE
449 /* Normal Tagged memory type at the corresponding MAIR index */
450 mov x10, #MAIR_ATTR_NORMAL_TAGGED
451 bfi x5, x10, #(8 * MT_NORMAL_TAGGED), #8
453 /* initialize GCR_EL1: all non-zero tags excluded by default */
454 mov x10, #(SYS_GCR_EL1_RRND | SYS_GCR_EL1_EXCL_MASK)
455 msr_s SYS_GCR_EL1, x10
457 /* clear any pending tag check faults in TFSR*_EL1 */
458 msr_s SYS_TFSR_EL1, xzr
459 msr_s SYS_TFSRE0_EL1, xzr
461 /* set the TCR_EL1 bits */
462 mov_q mte_tcr, TCR_KASAN_HW_FLAGS
467 * Set/prepare TCR and TTBR. We use 512GB (39-bit) address range for
468 * both user and kernel.
470 mov_q x10, TCR_TxSZ(VA_BITS) | TCR_CACHE_FLAGS | TCR_SMP_FLAGS | \
471 TCR_TG_FLAGS | TCR_KASLR_FLAGS | TCR_ASID16 | \
472 TCR_TBI0 | TCR_A1 | TCR_KASAN_SW_FLAGS
473 #ifdef CONFIG_ARM64_MTE
474 orr x10, x10, mte_tcr
477 tcr_clear_errata_bits x10, x9, x5
479 #ifdef CONFIG_ARM64_VA_BITS_52
480 ldr_l x9, vabits_actual
490 * Set the IPS bits in TCR_EL1.
492 tcr_compute_pa_size x10, #TCR_IPS_SHIFT, x5, x6
493 #ifdef CONFIG_ARM64_HW_AFDBM
495 * Enable hardware update of the Access Flags bit.
496 * Hardware dirty bit management is enabled later,
499 mrs x9, ID_AA64MMFR1_EL1
502 orr x10, x10, #TCR_HA // hardware Access flag update
504 #endif /* CONFIG_ARM64_HW_AFDBM */
509 mov_q x0, INIT_SCTLR_EL1_MMU_ON
510 ret // return to head.S
511 SYM_FUNC_END(__cpu_setup)