1*91f16700Schasinglulu /* 2*91f16700Schasinglulu * Copyright (c) 2021-2023, Arm Limited and Contributors. All rights reserved. 3*91f16700Schasinglulu * 4*91f16700Schasinglulu * SPDX-License-Identifier: BSD-3-Clause 5*91f16700Schasinglulu */ 6*91f16700Schasinglulu 7*91f16700Schasinglulu #include <stdbool.h> 8*91f16700Schasinglulu 9*91f16700Schasinglulu #include <arch.h> 10*91f16700Schasinglulu #include <arch_features.h> 11*91f16700Schasinglulu #include <arch_helpers.h> 12*91f16700Schasinglulu #include <common/debug.h> 13*91f16700Schasinglulu #include <lib/el3_runtime/context_mgmt.h> 14*91f16700Schasinglulu #include <lib/extensions/sme.h> 15*91f16700Schasinglulu #include <lib/extensions/sve.h> 16*91f16700Schasinglulu 17*91f16700Schasinglulu void sme_enable(cpu_context_t *context) 18*91f16700Schasinglulu { 19*91f16700Schasinglulu u_register_t reg; 20*91f16700Schasinglulu el3_state_t *state; 21*91f16700Schasinglulu 22*91f16700Schasinglulu /* Get the context state. */ 23*91f16700Schasinglulu state = get_el3state_ctx(context); 24*91f16700Schasinglulu 25*91f16700Schasinglulu /* Set the ENTP2 bit in SCR_EL3 to enable access to TPIDR2_EL0. */ 26*91f16700Schasinglulu reg = read_ctx_reg(state, CTX_SCR_EL3); 27*91f16700Schasinglulu reg |= SCR_ENTP2_BIT; 28*91f16700Schasinglulu write_ctx_reg(state, CTX_SCR_EL3, reg); 29*91f16700Schasinglulu } 30*91f16700Schasinglulu 31*91f16700Schasinglulu void sme_enable_per_world(per_world_context_t *per_world_ctx) 32*91f16700Schasinglulu { 33*91f16700Schasinglulu u_register_t reg; 34*91f16700Schasinglulu 35*91f16700Schasinglulu /* Enable SME in CPTR_EL3. */ 36*91f16700Schasinglulu reg = per_world_ctx->ctx_cptr_el3; 37*91f16700Schasinglulu reg |= ESM_BIT; 38*91f16700Schasinglulu per_world_ctx->ctx_cptr_el3 = reg; 39*91f16700Schasinglulu } 40*91f16700Schasinglulu 41*91f16700Schasinglulu void sme_init_el3(void) 42*91f16700Schasinglulu { 43*91f16700Schasinglulu u_register_t cptr_el3 = read_cptr_el3(); 44*91f16700Schasinglulu u_register_t smcr_el3; 45*91f16700Schasinglulu 46*91f16700Schasinglulu /* Set CPTR_EL3.ESM bit so we can access SMCR_EL3 without trapping. */ 47*91f16700Schasinglulu write_cptr_el3(cptr_el3 | ESM_BIT); 48*91f16700Schasinglulu isb(); 49*91f16700Schasinglulu 50*91f16700Schasinglulu /* 51*91f16700Schasinglulu * Set the max LEN value and FA64 bit. This register is set up per_world 52*91f16700Schasinglulu * to be the least restrictive, then lower ELs can restrict as needed 53*91f16700Schasinglulu * using SMCR_EL2 and SMCR_EL1. 54*91f16700Schasinglulu */ 55*91f16700Schasinglulu smcr_el3 = SMCR_ELX_LEN_MAX; 56*91f16700Schasinglulu if (read_feat_sme_fa64_id_field() != 0U) { 57*91f16700Schasinglulu VERBOSE("[SME] FA64 enabled\n"); 58*91f16700Schasinglulu smcr_el3 |= SMCR_ELX_FA64_BIT; 59*91f16700Schasinglulu } 60*91f16700Schasinglulu 61*91f16700Schasinglulu /* 62*91f16700Schasinglulu * Enable access to ZT0 register. 63*91f16700Schasinglulu * Make sure FEAT_SME2 is supported by the hardware before continuing. 64*91f16700Schasinglulu * If supported, Set the EZT0 bit in SMCR_EL3 to allow instructions to 65*91f16700Schasinglulu * access ZT0 register without trapping. 66*91f16700Schasinglulu */ 67*91f16700Schasinglulu if (is_feat_sme2_supported()) { 68*91f16700Schasinglulu VERBOSE("SME2 enabled\n"); 69*91f16700Schasinglulu smcr_el3 |= SMCR_ELX_EZT0_BIT; 70*91f16700Schasinglulu } 71*91f16700Schasinglulu write_smcr_el3(smcr_el3); 72*91f16700Schasinglulu 73*91f16700Schasinglulu /* Reset CPTR_EL3 value. */ 74*91f16700Schasinglulu write_cptr_el3(cptr_el3); 75*91f16700Schasinglulu isb(); 76*91f16700Schasinglulu } 77*91f16700Schasinglulu 78*91f16700Schasinglulu void sme_init_el2_unused(void) 79*91f16700Schasinglulu { 80*91f16700Schasinglulu /* 81*91f16700Schasinglulu * CPTR_EL2.TCPAC: Set to zero so that Non-secure EL1 accesses to the 82*91f16700Schasinglulu * CPACR_EL1 or CPACR from both Execution states do not trap to EL2. 83*91f16700Schasinglulu */ 84*91f16700Schasinglulu write_cptr_el2(read_cptr_el2() & ~CPTR_EL2_TCPAC_BIT); 85*91f16700Schasinglulu } 86*91f16700Schasinglulu 87*91f16700Schasinglulu void sme_disable(cpu_context_t *context) 88*91f16700Schasinglulu { 89*91f16700Schasinglulu u_register_t reg; 90*91f16700Schasinglulu el3_state_t *state; 91*91f16700Schasinglulu 92*91f16700Schasinglulu /* Get the context state. */ 93*91f16700Schasinglulu state = get_el3state_ctx(context); 94*91f16700Schasinglulu 95*91f16700Schasinglulu /* Disable access to TPIDR2_EL0. */ 96*91f16700Schasinglulu reg = read_ctx_reg(state, CTX_SCR_EL3); 97*91f16700Schasinglulu reg &= ~SCR_ENTP2_BIT; 98*91f16700Schasinglulu write_ctx_reg(state, CTX_SCR_EL3, reg); 99*91f16700Schasinglulu } 100*91f16700Schasinglulu 101*91f16700Schasinglulu void sme_disable_per_world(per_world_context_t *per_world_ctx) 102*91f16700Schasinglulu { 103*91f16700Schasinglulu u_register_t reg; 104*91f16700Schasinglulu 105*91f16700Schasinglulu /* Disable SME, SVE, and FPU since they all share registers. */ 106*91f16700Schasinglulu reg = per_world_ctx->ctx_cptr_el3; 107*91f16700Schasinglulu reg &= ~ESM_BIT; /* Trap SME */ 108*91f16700Schasinglulu reg &= ~CPTR_EZ_BIT; /* Trap SVE */ 109*91f16700Schasinglulu reg |= TFP_BIT; /* Trap FPU/SIMD */ 110*91f16700Schasinglulu per_world_ctx->ctx_cptr_el3 = reg; 111*91f16700Schasinglulu } 112