ERETAA, ERETAB

Exception Return, with pointer authentication. This instruction authenticates the address in ELR, using SP as the modifier and the specified key, the PE restores PSTATE from the SPSR for the current Exception level, and branches to the authenticated address.

Key A is used for ERETAA. Key B is used for ERETAB.

If the authentication passes, the PE continues execution at the target of the branch. For information on behavior if the authentication fails, see Faulting on pointer authentication.

The authenticated address is not written back to ELR.

The PE checks the SPSR for the current Exception level for an illegal return event. See Illegal return events from AArch64 state.

ERETAA and ERETAB are UNDEFINED at EL0.

Integer
(FEAT_PAuth)

313029282726252423222120191817161514131211109876543210
110101101001111100001M1111111111
opcop2ARnop4

ERETAA (M == 0)

ERETAA

ERETAB (M == 1)

ERETAB

boolean use_key_a = (M == '0'); if !IsFeatureImplemented(FEAT_PAuth) then UNDEFINED;

Operation

if PSTATE.EL == EL0 then UNDEFINED; AArch64.CheckForERetTrap(TRUE, use_key_a); bits(64) target = ELR_ELx[]; bits(64) modifier = SP[]; if use_key_a then target = AuthIA(target, modifier, TRUE); else target = AuthIB(target, modifier, TRUE); AArch64.ExceptionReturn(target, SPSR_ELx[]);


Internal version only: aarchmrs v2023-12_rel, pseudocode v2023-12_rel, sve v2023-12_rel ; Build timestamp: 2023-12-15T16:46

Copyright © 2010-2023 Arm Limited or its affiliates. All rights reserved. This document is Non-Confidential.