xref: /rk3399_ARM-atf/lib/extensions/sme/sme.c (revision aaaf2cc3135ca311ced63f49741c97897289ddcf)
1dc78e62dSjohpow01 /*
2*aaaf2cc3SSona Mathew  * Copyright (c) 2021-2024, Arm Limited and Contributors. All rights reserved.
3dc78e62dSjohpow01  *
4dc78e62dSjohpow01  * SPDX-License-Identifier: BSD-3-Clause
5dc78e62dSjohpow01  */
6dc78e62dSjohpow01 
7dc78e62dSjohpow01 #include <stdbool.h>
8dc78e62dSjohpow01 
9dc78e62dSjohpow01 #include <arch.h>
1045007acdSJayanth Dodderi Chidanand #include <arch_features.h>
11dc78e62dSjohpow01 #include <arch_helpers.h>
12dc78e62dSjohpow01 #include <common/debug.h>
13dc78e62dSjohpow01 #include <lib/el3_runtime/context_mgmt.h>
14dc78e62dSjohpow01 #include <lib/extensions/sme.h>
15dc78e62dSjohpow01 #include <lib/extensions/sve.h>
16dc78e62dSjohpow01 
17dc78e62dSjohpow01 void sme_enable(cpu_context_t *context)
18dc78e62dSjohpow01 {
19dc78e62dSjohpow01 	u_register_t reg;
20dc78e62dSjohpow01 	el3_state_t *state;
21dc78e62dSjohpow01 
22dc78e62dSjohpow01 	/* Get the context state. */
23dc78e62dSjohpow01 	state = get_el3state_ctx(context);
24dc78e62dSjohpow01 
25dc78e62dSjohpow01 	/* Set the ENTP2 bit in SCR_EL3 to enable access to TPIDR2_EL0. */
26dc78e62dSjohpow01 	reg = read_ctx_reg(state, CTX_SCR_EL3);
27dc78e62dSjohpow01 	reg |= SCR_ENTP2_BIT;
28dc78e62dSjohpow01 	write_ctx_reg(state, CTX_SCR_EL3, reg);
2960d330dcSBoyan Karatotev }
30dc78e62dSjohpow01 
31461c0a5dSElizabeth Ho void sme_enable_per_world(per_world_context_t *per_world_ctx)
32461c0a5dSElizabeth Ho {
33461c0a5dSElizabeth Ho 	u_register_t reg;
34461c0a5dSElizabeth Ho 
35461c0a5dSElizabeth Ho 	/* Enable SME in CPTR_EL3. */
36461c0a5dSElizabeth Ho 	reg = per_world_ctx->ctx_cptr_el3;
37461c0a5dSElizabeth Ho 	reg |= ESM_BIT;
38461c0a5dSElizabeth Ho 	per_world_ctx->ctx_cptr_el3 = reg;
39461c0a5dSElizabeth Ho }
40461c0a5dSElizabeth Ho 
4160d330dcSBoyan Karatotev void sme_init_el3(void)
4260d330dcSBoyan Karatotev {
4360d330dcSBoyan Karatotev 	u_register_t cptr_el3 = read_cptr_el3();
4460d330dcSBoyan Karatotev 	u_register_t smcr_el3;
4560d330dcSBoyan Karatotev 
4660d330dcSBoyan Karatotev 	/* Set CPTR_EL3.ESM bit so we can access SMCR_EL3 without trapping. */
47dc78e62dSjohpow01 	write_cptr_el3(cptr_el3 | ESM_BIT);
4846e92f28SBoyan Karatotev 	isb();
49dc78e62dSjohpow01 
50dc78e62dSjohpow01 	/*
51461c0a5dSElizabeth Ho 	 * Set the max LEN value and FA64 bit. This register is set up per_world
52dc78e62dSjohpow01 	 * to be the least restrictive, then lower ELs can restrict as needed
53dc78e62dSjohpow01 	 * using SMCR_EL2 and SMCR_EL1.
54dc78e62dSjohpow01 	 */
5560d330dcSBoyan Karatotev 	smcr_el3 = SMCR_ELX_LEN_MAX;
56*aaaf2cc3SSona Mathew 	if (is_feat_sme_fa64_present()) {
57dc78e62dSjohpow01 		VERBOSE("[SME] FA64 enabled\n");
5860d330dcSBoyan Karatotev 		smcr_el3 |= SMCR_ELX_FA64_BIT;
59dc78e62dSjohpow01 	}
6003d3c0d7SJayanth Dodderi Chidanand 
6103d3c0d7SJayanth Dodderi Chidanand 	/*
6203d3c0d7SJayanth Dodderi Chidanand 	 * Enable access to ZT0 register.
6303d3c0d7SJayanth Dodderi Chidanand 	 * Make sure FEAT_SME2 is supported by the hardware before continuing.
6403d3c0d7SJayanth Dodderi Chidanand 	 * If supported, Set the EZT0 bit in SMCR_EL3 to allow instructions to
6503d3c0d7SJayanth Dodderi Chidanand 	 * access ZT0 register without trapping.
6603d3c0d7SJayanth Dodderi Chidanand 	 */
6703d3c0d7SJayanth Dodderi Chidanand 	if (is_feat_sme2_supported()) {
6803d3c0d7SJayanth Dodderi Chidanand 		VERBOSE("SME2 enabled\n");
6960d330dcSBoyan Karatotev 		smcr_el3 |= SMCR_ELX_EZT0_BIT;
7003d3c0d7SJayanth Dodderi Chidanand 	}
7160d330dcSBoyan Karatotev 	write_smcr_el3(smcr_el3);
72dc78e62dSjohpow01 
73dc78e62dSjohpow01 	/* Reset CPTR_EL3 value. */
74dc78e62dSjohpow01 	write_cptr_el3(cptr_el3);
7546e92f28SBoyan Karatotev 	isb();
76dc78e62dSjohpow01 }
77dc78e62dSjohpow01 
7860d330dcSBoyan Karatotev void sme_init_el2_unused(void)
7960d330dcSBoyan Karatotev {
8060d330dcSBoyan Karatotev 	/*
8160d330dcSBoyan Karatotev 	 * CPTR_EL2.TCPAC: Set to zero so that Non-secure EL1 accesses to the
8260d330dcSBoyan Karatotev 	 *  CPACR_EL1 or CPACR from both Execution states do not trap to EL2.
8360d330dcSBoyan Karatotev 	 */
8460d330dcSBoyan Karatotev 	write_cptr_el2(read_cptr_el2() & ~CPTR_EL2_TCPAC_BIT);
8560d330dcSBoyan Karatotev }
8660d330dcSBoyan Karatotev 
87dc78e62dSjohpow01 void sme_disable(cpu_context_t *context)
88dc78e62dSjohpow01 {
89dc78e62dSjohpow01 	u_register_t reg;
90dc78e62dSjohpow01 	el3_state_t *state;
91dc78e62dSjohpow01 
92dc78e62dSjohpow01 	/* Get the context state. */
93dc78e62dSjohpow01 	state = get_el3state_ctx(context);
94dc78e62dSjohpow01 
95dc78e62dSjohpow01 	/* Disable access to TPIDR2_EL0. */
96dc78e62dSjohpow01 	reg = read_ctx_reg(state, CTX_SCR_EL3);
97dc78e62dSjohpow01 	reg &= ~SCR_ENTP2_BIT;
98dc78e62dSjohpow01 	write_ctx_reg(state, CTX_SCR_EL3, reg);
99dc78e62dSjohpow01 }
100461c0a5dSElizabeth Ho 
101461c0a5dSElizabeth Ho void sme_disable_per_world(per_world_context_t *per_world_ctx)
102461c0a5dSElizabeth Ho {
103461c0a5dSElizabeth Ho 	u_register_t reg;
104461c0a5dSElizabeth Ho 
105461c0a5dSElizabeth Ho 	/* Disable SME, SVE, and FPU since they all share registers. */
106461c0a5dSElizabeth Ho 	reg = per_world_ctx->ctx_cptr_el3;
107461c0a5dSElizabeth Ho 	reg &= ~ESM_BIT;	/* Trap SME */
108461c0a5dSElizabeth Ho 	reg &= ~CPTR_EZ_BIT;	/* Trap SVE */
109461c0a5dSElizabeth Ho 	reg |= TFP_BIT;		/* Trap FPU/SIMD */
110461c0a5dSElizabeth Ho 	per_world_ctx->ctx_cptr_el3 = reg;
111461c0a5dSElizabeth Ho }
112