xref: /rk3399_ARM-atf/lib/extensions/spe/spe.c (revision 13f4a25251cc6ce0230e999f39a4668cff25dcd0)
1281a08ccSDimitris Papastamos /*
2fc7dca72SBoyan Karatotev  * Copyright (c) 2017-2025, Arm Limited and Contributors. All rights reserved.
3281a08ccSDimitris Papastamos  *
4281a08ccSDimitris Papastamos  * SPDX-License-Identifier: BSD-3-Clause
5281a08ccSDimitris Papastamos  */
6281a08ccSDimitris Papastamos 
709d40e0eSAntonio Nino Diaz #include <stdbool.h>
809d40e0eSAntonio Nino Diaz 
9281a08ccSDimitris Papastamos #include <arch.h>
106437a09aSAndre Przywara #include <arch_features.h>
11281a08ccSDimitris Papastamos #include <arch_helpers.h>
1209d40e0eSAntonio Nino Diaz #include <lib/extensions/spe.h>
13281a08ccSDimitris Papastamos 
14777f1f68SJayanth Dodderi Chidanand #include <plat/common/platform.h>
15777f1f68SJayanth Dodderi Chidanand 
16123002f9SJayanth Dodderi Chidanand void spe_enable(cpu_context_t *ctx)
172ff8fbf3SDimitris Papastamos {
18123002f9SJayanth Dodderi Chidanand 	el3_state_t *state = get_el3state_ctx(ctx);
19123002f9SJayanth Dodderi Chidanand 	u_register_t mdcr_el3_val = read_ctx_reg(state, CTX_MDCR_EL3);
20281a08ccSDimitris Papastamos 
21281a08ccSDimitris Papastamos 	/*
2299506facSBoyan Karatotev 	 * MDCR_EL3.NSPB (ARM v8.2): SPE enabled in Non-secure state
23281a08ccSDimitris Papastamos 	 * and disabled in secure state. Accesses to SPE registers at
24281a08ccSDimitris Papastamos 	 * S-EL1 generate trap exceptions to EL3.
25f20eb893SManish V Badarkhe 	 *
2699506facSBoyan Karatotev 	 * MDCR_EL3.NSPBE: Profiling Buffer uses Non-secure Virtual Addresses.
2799506facSBoyan Karatotev 	 * When FEAT_RME is not implemented, this field is RES0.
2899506facSBoyan Karatotev 	 *
29f20eb893SManish V Badarkhe 	 * MDCR_EL3.EnPMSN (ARM v8.7): Do not trap access to PMSNEVFR_EL1
30f20eb893SManish V Badarkhe 	 * register at NS-EL1 or NS-EL2 to EL3 if FEAT_SPEv1p2 is implemented.
31f20eb893SManish V Badarkhe 	 * Setting this bit to 1 doesn't have any effect on it when
32f20eb893SManish V Badarkhe 	 * FEAT_SPEv1p2 not implemented.
33281a08ccSDimitris Papastamos 	 */
34123002f9SJayanth Dodderi Chidanand 	mdcr_el3_val |= MDCR_NSPB(MDCR_NSPB_EL1) | MDCR_EnPMSN_BIT;
35123002f9SJayanth Dodderi Chidanand 	mdcr_el3_val &= ~(MDCR_NSPBE_BIT);
36123002f9SJayanth Dodderi Chidanand 	write_ctx_reg(state, CTX_MDCR_EL3, mdcr_el3_val);
37281a08ccSDimitris Papastamos }
38281a08ccSDimitris Papastamos 
39651fe507SManish Pandey void spe_disable(cpu_context_t *ctx)
40651fe507SManish Pandey {
41651fe507SManish Pandey 	el3_state_t *state = get_el3state_ctx(ctx);
42651fe507SManish Pandey 	u_register_t mdcr_el3_val = read_ctx_reg(state, CTX_MDCR_EL3);
43651fe507SManish Pandey 
44651fe507SManish Pandey 	/*
45*13f4a252SBoyan Karatotev 	 * MDCR_EL3.{NSPB,NSPBE} = 0b00, 0b0
46*13f4a252SBoyan Karatotev 	 *  Disable access of profiling buffer control registers from lower ELs
47*13f4a252SBoyan Karatotev 	 *  in any security state. Secure state owns the buffer.
48651fe507SManish Pandey 	 *
49651fe507SManish Pandey 	 * MDCR_EL3.EnPMSN (ARM v8.7): Clear the bit to trap access of PMSNEVFR_EL1
50651fe507SManish Pandey 	 * from EL2/EL1 to EL3.
51651fe507SManish Pandey 	 */
52*13f4a252SBoyan Karatotev 	mdcr_el3_val &= ~(MDCR_NSPB(MDCR_NSPB_EL1) | MDCR_NSPBE_BIT | MDCR_EnPMSN_BIT);
53651fe507SManish Pandey 	write_ctx_reg(state, CTX_MDCR_EL3, mdcr_el3_val);
54651fe507SManish Pandey }
55651fe507SManish Pandey 
5660d330dcSBoyan Karatotev void spe_init_el2_unused(void)
5760d330dcSBoyan Karatotev {
5860d330dcSBoyan Karatotev 	uint64_t v;
5960d330dcSBoyan Karatotev 
6060d330dcSBoyan Karatotev 	/*
6160d330dcSBoyan Karatotev 	 * MDCR_EL2.TPMS (ARM v8.2): Do not trap statistical
6260d330dcSBoyan Karatotev 	 * profiling controls to EL2.
6360d330dcSBoyan Karatotev 	 *
6460d330dcSBoyan Karatotev 	 * MDCR_EL2.E2PB (ARM v8.2): SPE enabled in Non-secure
6560d330dcSBoyan Karatotev 	 * state. Accesses to profiling buffer controls at
6660d330dcSBoyan Karatotev 	 * Non-secure EL1 are not trapped to EL2.
6760d330dcSBoyan Karatotev 	 */
6860d330dcSBoyan Karatotev 	v = read_mdcr_el2();
6960d330dcSBoyan Karatotev 	v &= ~MDCR_EL2_TPMS;
7060d330dcSBoyan Karatotev 	v |= MDCR_EL2_E2PB(MDCR_EL2_E2PB_EL1);
7160d330dcSBoyan Karatotev 	write_mdcr_el2(v);
7260d330dcSBoyan Karatotev }
73