1dc78e62dSjohpow01 /* 245007acdSJayanth Dodderi Chidanand * Copyright (c) 2021-2023, Arm Limited and Contributors. All rights reserved. 3dc78e62dSjohpow01 * 4dc78e62dSjohpow01 * SPDX-License-Identifier: BSD-3-Clause 5dc78e62dSjohpow01 */ 6dc78e62dSjohpow01 7dc78e62dSjohpow01 #include <stdbool.h> 8dc78e62dSjohpow01 9dc78e62dSjohpow01 #include <arch.h> 1045007acdSJayanth Dodderi Chidanand #include <arch_features.h> 11dc78e62dSjohpow01 #include <arch_helpers.h> 12dc78e62dSjohpow01 #include <common/debug.h> 13dc78e62dSjohpow01 #include <lib/el3_runtime/context_mgmt.h> 14dc78e62dSjohpow01 #include <lib/extensions/sme.h> 15dc78e62dSjohpow01 #include <lib/extensions/sve.h> 16dc78e62dSjohpow01 17dc78e62dSjohpow01 void sme_enable(cpu_context_t *context) 18dc78e62dSjohpow01 { 19dc78e62dSjohpow01 u_register_t reg; 20dc78e62dSjohpow01 el3_state_t *state; 21dc78e62dSjohpow01 22dc78e62dSjohpow01 /* Get the context state. */ 23dc78e62dSjohpow01 state = get_el3state_ctx(context); 24dc78e62dSjohpow01 25dc78e62dSjohpow01 /* Set the ENTP2 bit in SCR_EL3 to enable access to TPIDR2_EL0. */ 26dc78e62dSjohpow01 reg = read_ctx_reg(state, CTX_SCR_EL3); 27dc78e62dSjohpow01 reg |= SCR_ENTP2_BIT; 28dc78e62dSjohpow01 write_ctx_reg(state, CTX_SCR_EL3, reg); 2960d330dcSBoyan Karatotev } 30dc78e62dSjohpow01 31*461c0a5dSElizabeth Ho void sme_enable_per_world(per_world_context_t *per_world_ctx) 32*461c0a5dSElizabeth Ho { 33*461c0a5dSElizabeth Ho u_register_t reg; 34*461c0a5dSElizabeth Ho 35*461c0a5dSElizabeth Ho /* Enable SME in CPTR_EL3. */ 36*461c0a5dSElizabeth Ho reg = per_world_ctx->ctx_cptr_el3; 37*461c0a5dSElizabeth Ho reg |= ESM_BIT; 38*461c0a5dSElizabeth Ho per_world_ctx->ctx_cptr_el3 = reg; 39*461c0a5dSElizabeth Ho } 40*461c0a5dSElizabeth Ho 4160d330dcSBoyan Karatotev void sme_init_el3(void) 4260d330dcSBoyan Karatotev { 4360d330dcSBoyan Karatotev u_register_t cptr_el3 = read_cptr_el3(); 4460d330dcSBoyan Karatotev u_register_t smcr_el3; 4560d330dcSBoyan Karatotev 4660d330dcSBoyan Karatotev /* Set CPTR_EL3.ESM bit so we can access SMCR_EL3 without trapping. */ 47dc78e62dSjohpow01 write_cptr_el3(cptr_el3 | ESM_BIT); 4846e92f28SBoyan Karatotev isb(); 49dc78e62dSjohpow01 50dc78e62dSjohpow01 /* 51*461c0a5dSElizabeth Ho * Set the max LEN value and FA64 bit. This register is set up per_world 52dc78e62dSjohpow01 * to be the least restrictive, then lower ELs can restrict as needed 53dc78e62dSjohpow01 * using SMCR_EL2 and SMCR_EL1. 54dc78e62dSjohpow01 */ 5560d330dcSBoyan Karatotev smcr_el3 = SMCR_ELX_LEN_MAX; 5645007acdSJayanth Dodderi Chidanand if (read_feat_sme_fa64_id_field() != 0U) { 57dc78e62dSjohpow01 VERBOSE("[SME] FA64 enabled\n"); 5860d330dcSBoyan Karatotev smcr_el3 |= SMCR_ELX_FA64_BIT; 59dc78e62dSjohpow01 } 6003d3c0d7SJayanth Dodderi Chidanand 6103d3c0d7SJayanth Dodderi Chidanand /* 6203d3c0d7SJayanth Dodderi Chidanand * Enable access to ZT0 register. 6303d3c0d7SJayanth Dodderi Chidanand * Make sure FEAT_SME2 is supported by the hardware before continuing. 6403d3c0d7SJayanth Dodderi Chidanand * If supported, Set the EZT0 bit in SMCR_EL3 to allow instructions to 6503d3c0d7SJayanth Dodderi Chidanand * access ZT0 register without trapping. 6603d3c0d7SJayanth Dodderi Chidanand */ 6703d3c0d7SJayanth Dodderi Chidanand if (is_feat_sme2_supported()) { 6803d3c0d7SJayanth Dodderi Chidanand VERBOSE("SME2 enabled\n"); 6960d330dcSBoyan Karatotev smcr_el3 |= SMCR_ELX_EZT0_BIT; 7003d3c0d7SJayanth Dodderi Chidanand } 7160d330dcSBoyan Karatotev write_smcr_el3(smcr_el3); 72dc78e62dSjohpow01 73dc78e62dSjohpow01 /* Reset CPTR_EL3 value. */ 74dc78e62dSjohpow01 write_cptr_el3(cptr_el3); 7546e92f28SBoyan Karatotev isb(); 76dc78e62dSjohpow01 } 77dc78e62dSjohpow01 7860d330dcSBoyan Karatotev void sme_init_el2_unused(void) 7960d330dcSBoyan Karatotev { 8060d330dcSBoyan Karatotev /* 8160d330dcSBoyan Karatotev * CPTR_EL2.TCPAC: Set to zero so that Non-secure EL1 accesses to the 8260d330dcSBoyan Karatotev * CPACR_EL1 or CPACR from both Execution states do not trap to EL2. 8360d330dcSBoyan Karatotev */ 8460d330dcSBoyan Karatotev write_cptr_el2(read_cptr_el2() & ~CPTR_EL2_TCPAC_BIT); 8560d330dcSBoyan Karatotev } 8660d330dcSBoyan Karatotev 87dc78e62dSjohpow01 void sme_disable(cpu_context_t *context) 88dc78e62dSjohpow01 { 89dc78e62dSjohpow01 u_register_t reg; 90dc78e62dSjohpow01 el3_state_t *state; 91dc78e62dSjohpow01 92dc78e62dSjohpow01 /* Get the context state. */ 93dc78e62dSjohpow01 state = get_el3state_ctx(context); 94dc78e62dSjohpow01 95dc78e62dSjohpow01 /* Disable access to TPIDR2_EL0. */ 96dc78e62dSjohpow01 reg = read_ctx_reg(state, CTX_SCR_EL3); 97dc78e62dSjohpow01 reg &= ~SCR_ENTP2_BIT; 98dc78e62dSjohpow01 write_ctx_reg(state, CTX_SCR_EL3, reg); 99dc78e62dSjohpow01 } 100*461c0a5dSElizabeth Ho 101*461c0a5dSElizabeth Ho void sme_disable_per_world(per_world_context_t *per_world_ctx) 102*461c0a5dSElizabeth Ho { 103*461c0a5dSElizabeth Ho u_register_t reg; 104*461c0a5dSElizabeth Ho 105*461c0a5dSElizabeth Ho /* Disable SME, SVE, and FPU since they all share registers. */ 106*461c0a5dSElizabeth Ho reg = per_world_ctx->ctx_cptr_el3; 107*461c0a5dSElizabeth Ho reg &= ~ESM_BIT; /* Trap SME */ 108*461c0a5dSElizabeth Ho reg &= ~CPTR_EZ_BIT; /* Trap SVE */ 109*461c0a5dSElizabeth Ho reg |= TFP_BIT; /* Trap FPU/SIMD */ 110*461c0a5dSElizabeth Ho per_world_ctx->ctx_cptr_el3 = reg; 111*461c0a5dSElizabeth Ho } 112