ERETAA, ERETAB

Exception Return, with pointer authentication. This instruction authenticates the address in ELR, using SP as the modifier and the specified key, the PE restores PSTATE from the SPSR for the current Exception level, and branches to the authenticated address.

Key A is used for ERETAA. Key B is used for ERETAB.

If the authentication passes, the PE continues execution at the target of the branch. For information on behavior if the authentication fails, see Faulting on pointer authentication.

The authenticated address is not written back to ELR.

The PE checks the SPSR for the current Exception level for an illegal return event. See Illegal return events from AArch64 state.

ERETAA and ERETAB are UNDEFINED at EL0.

Integer
(FEAT_PAuth)

313029282726252423222120191817161514131211109876543210
110101101001111100001M1111111111
opcop2ARnop4

ERETAA (M == 0)

ERETAA

ERETAB (M == 1)

ERETAB

if !IsFeatureImplemented(FEAT_PAuth) then UNDEFINED; boolean pac = TRUE; boolean use_key_a = (M == '0'); boolean auth_then_branch = TRUE;

Operation

if PSTATE.EL == EL0 then UNDEFINED; AArch64.CheckForERetTrap(pac, use_key_a); bits(64) target = ELR_ELx[]; bits(64) modifier = SP[]; if use_key_a then target = AuthIA(target, modifier, auth_then_branch); else target = AuthIB(target, modifier, auth_then_branch); AArch64.ExceptionReturn(target, SPSR_ELx[]);


Internal version only: aarchmrs v2024-03_relA, pseudocode v2024-03_rel, sve v2024-03_rel ; Build timestamp: 2024-03-26T09:45

Copyright © 2010-2024 Arm Limited or its affiliates. All rights reserved. This document is Non-Confidential.