1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Based on arch/arm/mm/proc.S
5 * Copyright (C) 2001 Deep Blue Solutions Ltd.
6 * Copyright (C) 2012 ARM Ltd.
7 * Author: Catalin Marinas <catalin.marinas@arm.com>
10 #include <linux/init.h>
11 #include <linux/linkage.h>
12 #include <asm/assembler.h>
13 #include <asm/asm-offsets.h>
14 #include <asm/hwcap.h>
15 #include <asm/pgtable.h>
16 #include <asm/pgtable-hwdef.h>
17 #include <asm/cpufeature.h>
18 #include <asm/alternative.h>
20 #ifdef CONFIG_ARM64_64K_PAGES
21 #define TCR_TG_FLAGS TCR_TG0_64K | TCR_TG1_64K
22 #elif defined(CONFIG_ARM64_16K_PAGES)
23 #define TCR_TG_FLAGS TCR_TG0_16K | TCR_TG1_16K
24 #else /* CONFIG_ARM64_4K_PAGES */
25 #define TCR_TG_FLAGS TCR_TG0_4K | TCR_TG1_4K
28 #ifdef CONFIG_RANDOMIZE_BASE
29 #define TCR_KASLR_FLAGS TCR_NFD1
31 #define TCR_KASLR_FLAGS 0
34 #define TCR_SMP_FLAGS TCR_SHARED
36 /* PTWs cacheable, inner/outer WBWA */
37 #define TCR_CACHE_FLAGS TCR_IRGN_WBWA | TCR_ORGN_WBWA
39 #ifdef CONFIG_KASAN_SW_TAGS
40 #define TCR_KASAN_FLAGS TCR_TBI1
42 #define TCR_KASAN_FLAGS 0
45 #define MAIR(attr, mt) ((attr) << ((mt) * 8))
49 * cpu_do_suspend - save CPU registers context
51 * x0: virtual address of context pointer
56 mrs x4, contextidr_el1
64 alternative_if_not ARM64_HAS_VIRT_HOST_EXTN
74 stp x10, x11, [x0, #64]
75 stp x12, x13, [x0, #80]
77 ENDPROC(cpu_do_suspend)
80 * cpu_do_resume - restore CPU register context
82 * x0: Address of context pointer
84 .pushsection ".idmap.text", "awx"
89 ldp x9, x10, [x0, #48]
90 ldp x11, x12, [x0, #64]
91 ldp x13, x14, [x0, #80]
94 msr contextidr_el1, x4
97 /* Don't change t0sz here, mask those bits when restoring */
99 bfi x8, x7, TCR_T0SZ_OFFSET, TCR_TxSZ_WIDTH
105 * __cpu_setup() cleared MDSCR_EL1.MDE and friends, before unmasking
106 * debug exceptions. By restoring MDSCR_EL1 here, we may take a debug
107 * exception. Mask them until local_daif_restore() in cpu_suspend()
114 alternative_if_not ARM64_HAS_VIRT_HOST_EXTN
121 * Restore oslsr_el1 by writing oslar_el1
124 ubfx x11, x11, #1, #1
126 reset_pmuserenr_el0 x0 // Disable PMU access from EL0
128 alternative_if ARM64_HAS_RAS_EXTN
129 msr_s SYS_DISR_EL1, xzr
130 alternative_else_nop_endif
134 ENDPROC(cpu_do_resume)
139 * cpu_do_switch_mm(pgd_phys, tsk)
141 * Set the translation table base pointer to be pgd_phys.
143 * - pgd_phys - physical address of new TTB
145 ENTRY(cpu_do_switch_mm)
147 mmid x1, x1 // get mm->context.id
150 alternative_if ARM64_HAS_CNP
151 cbz x1, 1f // skip CNP for reserved ASID
152 orr x3, x3, #TTBR_CNP_BIT
154 alternative_else_nop_endif
155 #ifdef CONFIG_ARM64_SW_TTBR0_PAN
156 bfi x3, x1, #48, #16 // set the ASID field in TTBR0
158 bfi x2, x1, #48, #16 // set the ASID
159 msr ttbr1_el1, x2 // in TTBR1 (since TCR.A1 is set)
161 msr ttbr0_el1, x3 // now update TTBR0
163 b post_ttbr_update_workaround // Back to C code...
164 ENDPROC(cpu_do_switch_mm)
166 .pushsection ".idmap.text", "awx"
168 .macro __idmap_cpu_set_reserved_ttbr1, tmp1, tmp2
169 adrp \tmp1, empty_zero_page
170 phys_to_ttbr \tmp2, \tmp1
180 * void idmap_cpu_replace_ttbr1(phys_addr_t ttbr1)
182 * This is the low-level counterpart to cpu_replace_ttbr1, and should not be
183 * called by anything else. It can only be executed from a TTBR0 mapping.
185 ENTRY(idmap_cpu_replace_ttbr1)
186 save_and_disable_daif flags=x2
188 __idmap_cpu_set_reserved_ttbr1 x1, x3
197 ENDPROC(idmap_cpu_replace_ttbr1)
200 #ifdef CONFIG_UNMAP_KERNEL_AT_EL0
201 .pushsection ".idmap.text", "awx"
203 .macro __idmap_kpti_get_pgtable_ent, type
204 dc cvac, cur_\()\type\()p // Ensure any existing dirty
205 dmb sy // lines are written back before
206 ldr \type, [cur_\()\type\()p] // loading the entry
207 tbz \type, #0, skip_\()\type // Skip invalid and
208 tbnz \type, #11, skip_\()\type // non-global entries
211 .macro __idmap_kpti_put_pgtable_ent_ng, type
212 orr \type, \type, #PTE_NG // Same bit for blocks and pages
213 str \type, [cur_\()\type\()p] // Update the entry and ensure
214 dmb sy // that it is visible to all
215 dc civac, cur_\()\type\()p // CPUs.
219 * void __kpti_install_ng_mappings(int cpu, int num_cpus, phys_addr_t swapper)
221 * Called exactly once from stop_machine context by each CPU found during boot.
225 ENTRY(idmap_kpti_install_ng_mappings)
244 mrs swapper_ttb, ttbr1_el1
245 restore_ttbr1 swapper_ttb
246 adr flag_ptr, __idmap_kpti_flag
248 cbnz cpu, __idmap_kpti_secondary
250 /* We're the boot CPU. Wait for the others to catch up */
253 ldaxr w18, [flag_ptr]
254 eor w18, w18, num_cpus
257 /* We need to walk swapper, so turn off the MMU. */
258 pre_disable_mmu_workaround
260 bic x18, x18, #SCTLR_ELx_M
264 /* Everybody is enjoying the idmap, so we can rewrite swapper. */
266 mov cur_pgdp, swapper_pa
267 add end_pgdp, cur_pgdp, #(PTRS_PER_PGD * 8)
268 do_pgd: __idmap_kpti_get_pgtable_ent pgd
269 tbnz pgd, #1, walk_puds
271 __idmap_kpti_put_pgtable_ent_ng pgd
273 add cur_pgdp, cur_pgdp, #8
274 cmp cur_pgdp, end_pgdp
277 /* Publish the updated tables and nuke all the TLBs */
283 /* We're done: fire up the MMU again */
285 orr x18, x18, #SCTLR_ELx_M
289 /* Set the flag to zero to indicate that we're all done */
295 .if CONFIG_PGTABLE_LEVELS > 3
296 pte_to_phys cur_pudp, pgd
297 add end_pudp, cur_pudp, #(PTRS_PER_PUD * 8)
298 do_pud: __idmap_kpti_get_pgtable_ent pud
299 tbnz pud, #1, walk_pmds
301 __idmap_kpti_put_pgtable_ent_ng pud
303 add cur_pudp, cur_pudp, 8
304 cmp cur_pudp, end_pudp
307 .else /* CONFIG_PGTABLE_LEVELS <= 3 */
316 .if CONFIG_PGTABLE_LEVELS > 2
317 pte_to_phys cur_pmdp, pud
318 add end_pmdp, cur_pmdp, #(PTRS_PER_PMD * 8)
319 do_pmd: __idmap_kpti_get_pgtable_ent pmd
320 tbnz pmd, #1, walk_ptes
322 __idmap_kpti_put_pgtable_ent_ng pmd
324 add cur_pmdp, cur_pmdp, #8
325 cmp cur_pmdp, end_pmdp
328 .else /* CONFIG_PGTABLE_LEVELS <= 2 */
337 pte_to_phys cur_ptep, pmd
338 add end_ptep, cur_ptep, #(PTRS_PER_PTE * 8)
339 do_pte: __idmap_kpti_get_pgtable_ent pte
340 __idmap_kpti_put_pgtable_ent_ng pte
342 add cur_ptep, cur_ptep, #8
343 cmp cur_ptep, end_ptep
347 /* Secondary CPUs end up here */
348 __idmap_kpti_secondary:
349 /* Uninstall swapper before surgery begins */
350 __idmap_cpu_set_reserved_ttbr1 x18, x17
352 /* Increment the flag to let the boot CPU we're ready */
353 1: ldxr w18, [flag_ptr]
355 stxr w17, w18, [flag_ptr]
358 /* Wait for the boot CPU to finish messing around with swapper */
364 /* All done, act like nothing happened */
365 offset_ttbr1 swapper_ttb
366 msr ttbr1_el1, swapper_ttb
387 ENDPROC(idmap_kpti_install_ng_mappings)
394 * Initialise the processor for turning the MMU on. Return in x0 the
395 * value of the SCTLR_EL1 register.
397 .pushsection ".idmap.text", "awx"
399 tlbi vmalle1 // Invalidate local TLB
403 msr cpacr_el1, x0 // Enable FP/ASIMD
404 mov x0, #1 << 12 // Reset mdscr_el1 and disable
405 msr mdscr_el1, x0 // access to the DCC from EL0
406 isb // Unmask debug exceptions now,
407 enable_dbg // since this is per-cpu
408 reset_pmuserenr_el0 x0 // Disable PMU access from EL0
410 * Memory region attributes for LPAE:
414 * DEVICE_nGnRnE 000 00000000
415 * DEVICE_nGnRE 001 00000100
416 * DEVICE_GRE 010 00001100
417 * NORMAL_NC 011 01000100
418 * NORMAL 100 11111111
419 * NORMAL_WT 101 10111011
421 ldr x5, =MAIR(0x00, MT_DEVICE_nGnRnE) | \
422 MAIR(0x04, MT_DEVICE_nGnRE) | \
423 MAIR(0x0c, MT_DEVICE_GRE) | \
424 MAIR(0x44, MT_NORMAL_NC) | \
425 MAIR(0xff, MT_NORMAL) | \
426 MAIR(0xbb, MT_NORMAL_WT)
431 mov_q x0, SCTLR_EL1_SET
433 * Set/prepare TCR and TTBR. We use 512GB (39-bit) address range for
434 * both user and kernel.
436 ldr x10, =TCR_TxSZ(VA_BITS) | TCR_CACHE_FLAGS | TCR_SMP_FLAGS | \
437 TCR_TG_FLAGS | TCR_KASLR_FLAGS | TCR_ASID16 | \
438 TCR_TBI0 | TCR_A1 | TCR_KASAN_FLAGS
439 tcr_clear_errata_bits x10, x9, x5
441 #ifdef CONFIG_ARM64_USER_VA_BITS_52
442 ldr_l x9, vabits_user
451 * Set the IPS bits in TCR_EL1.
453 tcr_compute_pa_size x10, #TCR_IPS_SHIFT, x5, x6
454 #ifdef CONFIG_ARM64_HW_AFDBM
456 * Enable hardware update of the Access Flags bit.
457 * Hardware dirty bit management is enabled later,
460 mrs x9, ID_AA64MMFR1_EL1
463 orr x10, x10, #TCR_HA // hardware Access flag update
465 #endif /* CONFIG_ARM64_HW_AFDBM */
467 ret // return to head.S