1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Copyright (C) 2012,2013 - ARM Ltd
4 * Author: Marc Zyngier <marc.zyngier@arm.com>
7 #include <linux/arm-smccc.h>
8 #include <linux/linkage.h>
10 #include <asm/alternative.h>
11 #include <asm/assembler.h>
12 #include <asm/el2_setup.h>
13 #include <asm/kvm_arm.h>
14 #include <asm/kvm_asm.h>
15 #include <asm/kvm_mmu.h>
16 #include <asm/pgtable-hwdef.h>
17 #include <asm/sysreg.h>
21 .pushsection .idmap.text, "ax"
25 SYM_CODE_START(__kvm_hyp_init)
26 ventry __invalid // Synchronous EL2t
27 ventry __invalid // IRQ EL2t
28 ventry __invalid // FIQ EL2t
29 ventry __invalid // Error EL2t
31 ventry __invalid // Synchronous EL2h
32 ventry __invalid // IRQ EL2h
33 ventry __invalid // FIQ EL2h
34 ventry __invalid // Error EL2h
36 ventry __do_hyp_init // Synchronous 64-bit EL1
37 ventry __invalid // IRQ 64-bit EL1
38 ventry __invalid // FIQ 64-bit EL1
39 ventry __invalid // Error 64-bit EL1
41 ventry __invalid // Synchronous 32-bit EL1
42 ventry __invalid // IRQ 32-bit EL1
43 ventry __invalid // FIQ 32-bit EL1
44 ventry __invalid // Error 32-bit EL1
50 * Only uses x0..x3 so as to not clobber callee-saved SMCCC registers.
52 * x0: SMCCC function ID
53 * x1: struct kvm_nvhe_init_params PA
56 /* Check for a stub HVC call */
57 cmp x0, #HVC_STUB_HCALL_NR
58 b.lo __kvm_handle_stub_hvc
60 mov x3, #KVM_HOST_SMCCC_FUNC(__kvm_hyp_init)
64 mov x0, #SMCCC_RET_NOT_SUPPORTED
69 bl ___kvm_hyp_init // Clobbers x0..x2
73 mov x0, #SMCCC_RET_SUCCESS
75 SYM_CODE_END(__kvm_hyp_init)
78 * Initialize the hypervisor in EL2.
80 * Only uses x0..x2 so as to not clobber callee-saved SMCCC registers
81 * and leave x3 for the caller.
83 * x0: struct kvm_nvhe_init_params PA
85 SYM_CODE_START_LOCAL(___kvm_hyp_init)
86 ldr x1, [x0, #NVHE_INIT_TPIDR_EL2]
89 ldr x1, [x0, #NVHE_INIT_STACK_HYP_VA]
92 ldr x1, [x0, #NVHE_INIT_MAIR_EL2]
95 ldr x1, [x0, #NVHE_INIT_HCR_EL2]
98 ldr x1, [x0, #NVHE_INIT_VTTBR]
101 ldr x1, [x0, #NVHE_INIT_VTCR]
104 ldr x1, [x0, #NVHE_INIT_PGD_PA]
106 alternative_if ARM64_HAS_CNP
107 orr x2, x2, #TTBR_CNP_BIT
108 alternative_else_nop_endif
112 * Set the PS bits in TCR_EL2.
114 ldr x0, [x0, #NVHE_INIT_TCR_EL2]
115 tcr_compute_pa_size x0, #TCR_EL2_PS_SHIFT, x1, x2
120 /* Invalidate the stale TLBs from Bootloader */
125 mov_q x0, INIT_SCTLR_EL2_MMU_ON
126 alternative_if ARM64_HAS_ADDRESS_AUTH
127 mov_q x1, (SCTLR_ELx_ENIA | SCTLR_ELx_ENIB | \
128 SCTLR_ELx_ENDA | SCTLR_ELx_ENDB)
130 alternative_else_nop_endif
134 /* Set the host vector */
135 ldr x0, =__kvm_hyp_host_vector
139 SYM_CODE_END(___kvm_hyp_init)
142 * PSCI CPU_ON entry point
144 * x0: struct kvm_nvhe_init_params PA
146 SYM_CODE_START(kvm_hyp_cpu_entry)
147 mov x1, #1 // is_cpu_on = true
149 SYM_CODE_END(kvm_hyp_cpu_entry)
152 * PSCI CPU_SUSPEND / SYSTEM_SUSPEND entry point
154 * x0: struct kvm_nvhe_init_params PA
156 SYM_CODE_START(kvm_hyp_cpu_resume)
157 mov x1, #0 // is_cpu_on = false
159 SYM_CODE_END(kvm_hyp_cpu_resume)
162 * Common code for CPU entry points. Initializes EL2 state and
163 * installs the hypervisor before handing over to a C handler.
165 * x0: struct kvm_nvhe_init_params PA
168 SYM_CODE_START_LOCAL(__kvm_hyp_init_cpu)
169 mov x28, x0 // Stash arguments
172 /* Check that the core was booted in EL2. */
174 cmp x0, #CurrentEL_EL2
177 /* The core booted in EL1. KVM cannot be initialized on it. */
182 2: msr SPsel, #1 // We want to use SP_EL{1,2}
184 /* Initialize EL2 CPU state to sane values. */
185 init_el2_state // Clobbers x0..x2
187 /* Enable MMU, set vectors and stack. */
189 bl ___kvm_hyp_init // Clobbers x0..x2
193 ldr x1, =kvm_host_psci_cpu_entry
195 SYM_CODE_END(__kvm_hyp_init_cpu)
197 SYM_CODE_START(__kvm_handle_stub_hvc)
198 cmp x0, #HVC_SOFT_RESTART
201 /* This is where we're about to jump, staying at EL2 */
203 mov x0, #(PSR_F_BIT | PSR_I_BIT | PSR_A_BIT | PSR_D_BIT | PSR_MODE_EL2h)
206 /* Shuffle the arguments, and don't come back */
212 1: cmp x0, #HVC_RESET_VECTORS
216 * Set the HVC_RESET_VECTORS return code before entering the common
217 * path so that we do not clobber x0-x2 in case we are coming via
222 /* Reset kvm back to the hyp stub. */
223 mov_q x5, INIT_SCTLR_EL2_MMU_OFF
224 pre_disable_mmu_workaround
228 alternative_if ARM64_KVM_PROTECTED_MODE
229 mov_q x5, HCR_HOST_NVHE_FLAGS
231 alternative_else_nop_endif
233 /* Install stub vectors */
234 adr_l x5, __hyp_stub_vectors
238 1: /* Bad stub call */
239 mov_q x0, HVC_STUB_ERR
242 SYM_CODE_END(__kvm_handle_stub_hvc)
244 SYM_FUNC_START(__pkvm_init_switch_pgd)
245 /* Turn the MMU off */
246 pre_disable_mmu_workaround
248 bic x3, x2, #SCTLR_ELx_M
254 /* Install the new pgtables */
255 ldr x3, [x0, #NVHE_INIT_PGD_PA]
257 alternative_if ARM64_HAS_CNP
258 orr x4, x4, #TTBR_CNP_BIT
259 alternative_else_nop_endif
262 /* Set the new stack pointer */
263 ldr x0, [x0, #NVHE_INIT_STACK_HYP_VA]
266 /* And turn the MMU back on! */
269 SYM_FUNC_END(__pkvm_init_switch_pgd)