]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - ArmPkg/Library/ArmLib/AArch64/AArch64Support.S
ArmPkg/ArmLib: AARCH64: allow the stack aligment (SA) bit to be managed
[mirror_edk2.git] / ArmPkg / Library / ArmLib / AArch64 / AArch64Support.S
... / ...
CommitLineData
1#------------------------------------------------------------------------------\r
2#\r
3# Copyright (c) 2008 - 2010, Apple Inc. All rights reserved.<BR>\r
4# Copyright (c) 2011 - 2014, ARM Limited. All rights reserved.\r
5# Copyright (c) 2016, Linaro Limited. All rights reserved.\r
6#\r
7# This program and the accompanying materials\r
8# are licensed and made available under the terms and conditions of the BSD License\r
9# which accompanies this distribution. The full text of the license may be found at\r
10# http://opensource.org/licenses/bsd-license.php\r
11#\r
12# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
13# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
14#\r
15#------------------------------------------------------------------------------\r
16\r
17#include <Chipset/AArch64.h>\r
18#include <AsmMacroIoLibV8.h>\r
19\r
20.set CTRL_M_BIT, (1 << 0)\r
21.set CTRL_A_BIT, (1 << 1)\r
22.set CTRL_C_BIT, (1 << 2)\r
23.set CTRL_SA_BIT, (1 << 3)\r
24.set CTRL_I_BIT, (1 << 12)\r
25.set CTRL_V_BIT, (1 << 12)\r
26.set CPACR_VFP_BITS, (3 << 20)\r
27\r
28ASM_FUNC(ArmInvalidateDataCacheEntryByMVA)\r
29 dc ivac, x0 // Invalidate single data cache line\r
30 ret\r
31\r
32\r
33ASM_FUNC(ArmCleanDataCacheEntryByMVA)\r
34 dc cvac, x0 // Clean single data cache line\r
35 ret\r
36\r
37\r
38ASM_FUNC(ArmCleanDataCacheEntryToPoUByMVA)\r
39 dc cvau, x0 // Clean single data cache line to PoU\r
40 ret\r
41\r
42ASM_FUNC(ArmInvalidateInstructionCacheEntryToPoUByMVA)\r
43 ic ivau, x0 // Invalidate single instruction cache line to PoU\r
44 ret\r
45\r
46\r
47ASM_FUNC(ArmCleanInvalidateDataCacheEntryByMVA)\r
48 dc civac, x0 // Clean and invalidate single data cache line\r
49 ret\r
50\r
51\r
52ASM_FUNC(ArmInvalidateDataCacheEntryBySetWay)\r
53 dc isw, x0 // Invalidate this line\r
54 ret\r
55\r
56\r
57ASM_FUNC(ArmCleanInvalidateDataCacheEntryBySetWay)\r
58 dc cisw, x0 // Clean and Invalidate this line\r
59 ret\r
60\r
61\r
62ASM_FUNC(ArmCleanDataCacheEntryBySetWay)\r
63 dc csw, x0 // Clean this line\r
64 ret\r
65\r
66\r
67ASM_FUNC(ArmInvalidateInstructionCache)\r
68 ic iallu // Invalidate entire instruction cache\r
69 dsb sy\r
70 isb\r
71 ret\r
72\r
73\r
74ASM_FUNC(ArmEnableMmu)\r
75 EL1_OR_EL2_OR_EL3(x1)\r
761: mrs x0, sctlr_el1 // Read System control register EL1\r
77 b 4f\r
782: mrs x0, sctlr_el2 // Read System control register EL2\r
79 b 4f\r
803: mrs x0, sctlr_el3 // Read System control register EL3\r
814: orr x0, x0, #CTRL_M_BIT // Set MMU enable bit\r
82 EL1_OR_EL2_OR_EL3(x1)\r
831: tlbi vmalle1\r
84 dsb nsh\r
85 isb\r
86 msr sctlr_el1, x0 // Write back\r
87 b 4f\r
882: tlbi alle2\r
89 dsb nsh\r
90 isb\r
91 msr sctlr_el2, x0 // Write back\r
92 b 4f\r
933: tlbi alle3\r
94 dsb nsh\r
95 isb\r
96 msr sctlr_el3, x0 // Write back\r
974: isb\r
98 ret\r
99\r
100\r
101ASM_FUNC(ArmDisableMmu)\r
102 EL1_OR_EL2_OR_EL3(x1)\r
1031: mrs x0, sctlr_el1 // Read System Control Register EL1\r
104 b 4f\r
1052: mrs x0, sctlr_el2 // Read System Control Register EL2\r
106 b 4f\r
1073: mrs x0, sctlr_el3 // Read System Control Register EL3\r
1084: and x0, x0, #~CTRL_M_BIT // Clear MMU enable bit\r
109 EL1_OR_EL2_OR_EL3(x1)\r
1101: msr sctlr_el1, x0 // Write back\r
111 tlbi vmalle1\r
112 b 4f\r
1132: msr sctlr_el2, x0 // Write back\r
114 tlbi alle2\r
115 b 4f\r
1163: msr sctlr_el3, x0 // Write back\r
117 tlbi alle3\r
1184: dsb sy\r
119 isb\r
120 ret\r
121\r
122\r
123ASM_FUNC(ArmDisableCachesAndMmu)\r
124 EL1_OR_EL2_OR_EL3(x1)\r
1251: mrs x0, sctlr_el1 // Get control register EL1\r
126 b 4f\r
1272: mrs x0, sctlr_el2 // Get control register EL2\r
128 b 4f\r
1293: mrs x0, sctlr_el3 // Get control register EL3\r
1304: mov x1, #~(CTRL_M_BIT | CTRL_C_BIT | CTRL_I_BIT) // Disable MMU, D & I caches\r
131 and x0, x0, x1\r
132 EL1_OR_EL2_OR_EL3(x1)\r
1331: msr sctlr_el1, x0 // Write back control register\r
134 b 4f\r
1352: msr sctlr_el2, x0 // Write back control register\r
136 b 4f\r
1373: msr sctlr_el3, x0 // Write back control register\r
1384: dsb sy\r
139 isb\r
140 ret\r
141\r
142\r
143ASM_FUNC(ArmMmuEnabled)\r
144 EL1_OR_EL2_OR_EL3(x1)\r
1451: mrs x0, sctlr_el1 // Get control register EL1\r
146 b 4f\r
1472: mrs x0, sctlr_el2 // Get control register EL2\r
148 b 4f\r
1493: mrs x0, sctlr_el3 // Get control register EL3\r
1504: and x0, x0, #CTRL_M_BIT\r
151 ret\r
152\r
153\r
154ASM_FUNC(ArmEnableDataCache)\r
155 EL1_OR_EL2_OR_EL3(x1)\r
1561: mrs x0, sctlr_el1 // Get control register EL1\r
157 b 4f\r
1582: mrs x0, sctlr_el2 // Get control register EL2\r
159 b 4f\r
1603: mrs x0, sctlr_el3 // Get control register EL3\r
1614: orr x0, x0, #CTRL_C_BIT // Set C bit\r
162 EL1_OR_EL2_OR_EL3(x1)\r
1631: msr sctlr_el1, x0 // Write back control register\r
164 b 4f\r
1652: msr sctlr_el2, x0 // Write back control register\r
166 b 4f\r
1673: msr sctlr_el3, x0 // Write back control register\r
1684: dsb sy\r
169 isb\r
170 ret\r
171\r
172\r
173ASM_FUNC(ArmDisableDataCache)\r
174 EL1_OR_EL2_OR_EL3(x1)\r
1751: mrs x0, sctlr_el1 // Get control register EL1\r
176 b 4f\r
1772: mrs x0, sctlr_el2 // Get control register EL2\r
178 b 4f\r
1793: mrs x0, sctlr_el3 // Get control register EL3\r
1804: and x0, x0, #~CTRL_C_BIT // Clear C bit\r
181 EL1_OR_EL2_OR_EL3(x1)\r
1821: msr sctlr_el1, x0 // Write back control register\r
183 b 4f\r
1842: msr sctlr_el2, x0 // Write back control register\r
185 b 4f\r
1863: msr sctlr_el3, x0 // Write back control register\r
1874: dsb sy\r
188 isb\r
189 ret\r
190\r
191\r
192ASM_FUNC(ArmEnableInstructionCache)\r
193 EL1_OR_EL2_OR_EL3(x1)\r
1941: mrs x0, sctlr_el1 // Get control register EL1\r
195 b 4f\r
1962: mrs x0, sctlr_el2 // Get control register EL2\r
197 b 4f\r
1983: mrs x0, sctlr_el3 // Get control register EL3\r
1994: orr x0, x0, #CTRL_I_BIT // Set I bit\r
200 EL1_OR_EL2_OR_EL3(x1)\r
2011: msr sctlr_el1, x0 // Write back control register\r
202 b 4f\r
2032: msr sctlr_el2, x0 // Write back control register\r
204 b 4f\r
2053: msr sctlr_el3, x0 // Write back control register\r
2064: dsb sy\r
207 isb\r
208 ret\r
209\r
210\r
211ASM_FUNC(ArmDisableInstructionCache)\r
212 EL1_OR_EL2_OR_EL3(x1)\r
2131: mrs x0, sctlr_el1 // Get control register EL1\r
214 b 4f\r
2152: mrs x0, sctlr_el2 // Get control register EL2\r
216 b 4f\r
2173: mrs x0, sctlr_el3 // Get control register EL3\r
2184: and x0, x0, #~CTRL_I_BIT // Clear I bit\r
219 EL1_OR_EL2_OR_EL3(x1)\r
2201: msr sctlr_el1, x0 // Write back control register\r
221 b 4f\r
2222: msr sctlr_el2, x0 // Write back control register\r
223 b 4f\r
2243: msr sctlr_el3, x0 // Write back control register\r
2254: dsb sy\r
226 isb\r
227 ret\r
228\r
229\r
230ASM_FUNC(ArmEnableAlignmentCheck)\r
231 EL1_OR_EL2(x1)\r
2321: mrs x0, sctlr_el1 // Get control register EL1\r
233 b 3f\r
2342: mrs x0, sctlr_el2 // Get control register EL2\r
2353: orr x0, x0, #CTRL_A_BIT // Set A (alignment check) bit\r
236 EL1_OR_EL2(x1)\r
2371: msr sctlr_el1, x0 // Write back control register\r
238 b 3f\r
2392: msr sctlr_el2, x0 // Write back control register\r
2403: dsb sy\r
241 isb\r
242 ret\r
243\r
244\r
245ASM_FUNC(ArmDisableAlignmentCheck)\r
246 EL1_OR_EL2_OR_EL3(x1)\r
2471: mrs x0, sctlr_el1 // Get control register EL1\r
248 b 4f\r
2492: mrs x0, sctlr_el2 // Get control register EL2\r
250 b 4f\r
2513: mrs x0, sctlr_el3 // Get control register EL3\r
2524: and x0, x0, #~CTRL_A_BIT // Clear A (alignment check) bit\r
253 EL1_OR_EL2_OR_EL3(x1)\r
2541: msr sctlr_el1, x0 // Write back control register\r
255 b 4f\r
2562: msr sctlr_el2, x0 // Write back control register\r
257 b 4f\r
2583: msr sctlr_el3, x0 // Write back control register\r
2594: dsb sy\r
260 isb\r
261 ret\r
262\r
263ASM_FUNC(ArmEnableStackAlignmentCheck)\r
264 EL1_OR_EL2(x1)\r
2651: mrs x0, sctlr_el1 // Get control register EL1\r
266 b 3f\r
2672: mrs x0, sctlr_el2 // Get control register EL2\r
2683: orr x0, x0, #CTRL_SA_BIT // Set SA (stack alignment check) bit\r
269 EL1_OR_EL2(x1)\r
2701: msr sctlr_el1, x0 // Write back control register\r
271 b 3f\r
2722: msr sctlr_el2, x0 // Write back control register\r
2733: dsb sy\r
274 isb\r
275 ret\r
276\r
277\r
278ASM_FUNC(ArmDisableStackAlignmentCheck)\r
279 EL1_OR_EL2_OR_EL3(x1)\r
2801: mrs x0, sctlr_el1 // Get control register EL1\r
281 b 4f\r
2822: mrs x0, sctlr_el2 // Get control register EL2\r
283 b 4f\r
2843: mrs x0, sctlr_el3 // Get control register EL3\r
2854: bic x0, x0, #CTRL_SA_BIT // Clear SA (stack alignment check) bit\r
286 EL1_OR_EL2_OR_EL3(x1)\r
2871: msr sctlr_el1, x0 // Write back control register\r
288 b 4f\r
2892: msr sctlr_el2, x0 // Write back control register\r
290 b 4f\r
2913: msr sctlr_el3, x0 // Write back control register\r
2924: dsb sy\r
293 isb\r
294 ret\r
295\r
296\r
297// Always turned on in AArch64. Else implementation specific. Leave in for C compatibility for now\r
298ASM_FUNC(ArmEnableBranchPrediction)\r
299 ret\r
300\r
301\r
302// Always turned on in AArch64. Else implementation specific. Leave in for C compatibility for now.\r
303ASM_FUNC(ArmDisableBranchPrediction)\r
304 ret\r
305\r
306\r
307ASM_FUNC(AArch64AllDataCachesOperation)\r
308// We can use regs 0-7 and 9-15 without having to save/restore.\r
309// Save our link register on the stack. - The stack must always be quad-word aligned\r
310 stp x29, x30, [sp, #-16]!\r
311 mov x29, sp\r
312 mov x1, x0 // Save Function call in x1\r
313 mrs x6, clidr_el1 // Read EL1 CLIDR\r
314 and x3, x6, #0x7000000 // Mask out all but Level of Coherency (LoC)\r
315 lsr x3, x3, #23 // Left align cache level value - the level is shifted by 1 to the\r
316 // right to ease the access to CSSELR and the Set/Way operation.\r
317 cbz x3, L_Finished // No need to clean if LoC is 0\r
318 mov x10, #0 // Start clean at cache level 0\r
319\r
320Loop1:\r
321 add x2, x10, x10, lsr #1 // Work out 3x cachelevel for cache info\r
322 lsr x12, x6, x2 // bottom 3 bits are the Cache type for this level\r
323 and x12, x12, #7 // get those 3 bits alone\r
324 cmp x12, #2 // what cache at this level?\r
325 b.lt L_Skip // no cache or only instruction cache at this level\r
326 msr csselr_el1, x10 // write the Cache Size selection register with current level (CSSELR)\r
327 isb // isb to sync the change to the CacheSizeID reg\r
328 mrs x12, ccsidr_el1 // reads current Cache Size ID register (CCSIDR)\r
329 and x2, x12, #0x7 // extract the line length field\r
330 add x2, x2, #4 // add 4 for the line length offset (log2 16 bytes)\r
331 mov x4, #0x400\r
332 sub x4, x4, #1\r
333 and x4, x4, x12, lsr #3 // x4 is the max number on the way size (right aligned)\r
334 clz w5, w4 // w5 is the bit position of the way size increment\r
335 mov x7, #0x00008000\r
336 sub x7, x7, #1\r
337 and x7, x7, x12, lsr #13 // x7 is the max number of the index size (right aligned)\r
338\r
339Loop2:\r
340 mov x9, x4 // x9 working copy of the max way size (right aligned)\r
341\r
342Loop3:\r
343 lsl x11, x9, x5\r
344 orr x0, x10, x11 // factor in the way number and cache number\r
345 lsl x11, x7, x2\r
346 orr x0, x0, x11 // factor in the index number\r
347\r
348 blr x1 // Goto requested cache operation\r
349\r
350 subs x9, x9, #1 // decrement the way number\r
351 b.ge Loop3\r
352 subs x7, x7, #1 // decrement the index\r
353 b.ge Loop2\r
354L_Skip:\r
355 add x10, x10, #2 // increment the cache number\r
356 cmp x3, x10\r
357 b.gt Loop1\r
358\r
359L_Finished:\r
360 dsb sy\r
361 isb\r
362 ldp x29, x30, [sp], #0x10\r
363 ret\r
364\r
365\r
366ASM_FUNC(ArmDataMemoryBarrier)\r
367 dmb sy\r
368 ret\r
369\r
370\r
371ASM_FUNC(ArmDataSynchronizationBarrier)\r
372 dsb sy\r
373 ret\r
374\r
375\r
376ASM_FUNC(ArmInstructionSynchronizationBarrier)\r
377 isb\r
378 ret\r
379\r
380\r
381ASM_FUNC(ArmWriteVBar)\r
382 EL1_OR_EL2_OR_EL3(x1)\r
3831: msr vbar_el1, x0 // Set the Address of the EL1 Vector Table in the VBAR register\r
384 b 4f\r
3852: msr vbar_el2, x0 // Set the Address of the EL2 Vector Table in the VBAR register\r
386 b 4f\r
3873: msr vbar_el3, x0 // Set the Address of the EL3 Vector Table in the VBAR register\r
3884: isb\r
389 ret\r
390\r
391ASM_FUNC(ArmReadVBar)\r
392 EL1_OR_EL2_OR_EL3(x1)\r
3931: mrs x0, vbar_el1 // Set the Address of the EL1 Vector Table in the VBAR register\r
394 ret\r
3952: mrs x0, vbar_el2 // Set the Address of the EL2 Vector Table in the VBAR register\r
396 ret\r
3973: mrs x0, vbar_el3 // Set the Address of the EL3 Vector Table in the VBAR register\r
398 ret\r
399\r
400\r
401ASM_FUNC(ArmEnableVFP)\r
402 // Check whether floating-point is implemented in the processor.\r
403 mov x1, x30 // Save LR\r
404 bl ArmReadIdPfr0 // Read EL1 Processor Feature Register (PFR0)\r
405 mov x30, x1 // Restore LR\r
406 ands x0, x0, #AARCH64_PFR0_FP// Extract bits indicating VFP implementation\r
407 cmp x0, #0 // VFP is implemented if '0'.\r
408 b.ne 4f // Exit if VFP not implemented.\r
409 // FVP is implemented.\r
410 // Make sure VFP exceptions are not trapped (to any exception level).\r
411 mrs x0, cpacr_el1 // Read EL1 Coprocessor Access Control Register (CPACR)\r
412 orr x0, x0, #CPACR_VFP_BITS // Disable FVP traps to EL1\r
413 msr cpacr_el1, x0 // Write back EL1 Coprocessor Access Control Register (CPACR)\r
414 mov x1, #AARCH64_CPTR_TFP // TFP Bit for trapping VFP Exceptions\r
415 EL1_OR_EL2_OR_EL3(x2)\r
4161:ret // Not configurable in EL1\r
4172:mrs x0, cptr_el2 // Disable VFP traps to EL2\r
418 bic x0, x0, x1\r
419 msr cptr_el2, x0\r
420 ret\r
4213:mrs x0, cptr_el3 // Disable VFP traps to EL3\r
422 bic x0, x0, x1\r
423 msr cptr_el3, x0\r
4244:ret\r
425\r
426\r
427ASM_FUNC(ArmCallWFI)\r
428 wfi\r
429 ret\r
430\r
431\r
432ASM_FUNC(ArmReadMpidr)\r
433 mrs x0, mpidr_el1 // read EL1 MPIDR\r
434 ret\r
435\r
436\r
437// Keep old function names for C compatibilty for now. Change later?\r
438ASM_FUNC(ArmReadTpidrurw)\r
439 mrs x0, tpidr_el0 // read tpidr_el0 (v7 TPIDRURW) -> (v8 TPIDR_EL0)\r
440 ret\r
441\r
442\r
443// Keep old function names for C compatibilty for now. Change later?\r
444ASM_FUNC(ArmWriteTpidrurw)\r
445 msr tpidr_el0, x0 // write tpidr_el0 (v7 TPIDRURW) -> (v8 TPIDR_EL0)\r
446 ret\r
447\r
448\r
449// Arch timers are mandatory on AArch64\r
450ASM_FUNC(ArmIsArchTimerImplemented)\r
451 mov x0, #1\r
452 ret\r
453\r
454\r
455ASM_FUNC(ArmReadIdPfr0)\r
456 mrs x0, id_aa64pfr0_el1 // Read ID_AA64PFR0 Register\r
457 ret\r
458\r
459\r
460// Q: id_aa64pfr1_el1 not defined yet. What does this funtion want to access?\r
461// A: used to setup arch timer. Check if we have security extensions, permissions to set stuff.\r
462// See: ArmPkg/Library/ArmArchTimerLib/AArch64/ArmArchTimerLib.c\r
463// Not defined yet, but stick in here for now, should read all zeros.\r
464ASM_FUNC(ArmReadIdPfr1)\r
465 mrs x0, id_aa64pfr1_el1 // Read ID_PFR1 Register\r
466 ret\r
467\r
468// VOID ArmWriteHcr(UINTN Hcr)\r
469ASM_FUNC(ArmWriteHcr)\r
470 msr hcr_el2, x0 // Write the passed HCR value\r
471 ret\r
472\r
473// UINTN ArmReadHcr(VOID)\r
474ASM_FUNC(ArmReadHcr)\r
475 mrs x0, hcr_el2\r
476 ret\r
477\r
478// UINTN ArmReadCurrentEL(VOID)\r
479ASM_FUNC(ArmReadCurrentEL)\r
480 mrs x0, CurrentEL\r
481 ret\r
482\r
483ASM_FUNCTION_REMOVE_IF_UNREFERENCED\r