blob: e031bf61b95f039617f32a3ecf77c6f985f91e02 [file] [log] [blame]
David Cunadoce88eee2017-10-20 11:30:57 +01001/*
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +00002 * Copyright (c) 2017-2018, ARM Limited and Contributors. All rights reserved.
David Cunadoce88eee2017-10-20 11:30:57 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <arch.h>
8#include <arch_helpers.h>
9#include <pubsub.h>
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010010#include <stdbool.h>
David Cunadoce88eee2017-10-20 11:30:57 +010011#include <sve.h>
12
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010013bool sve_supported(void)
David Cunadoce88eee2017-10-20 11:30:57 +010014{
15 uint64_t features;
16
17 features = read_id_aa64pfr0_el1() >> ID_AA64PFR0_SVE_SHIFT;
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010018 return (features & ID_AA64PFR0_SVE_MASK) == 1U;
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000019}
David Cunadoce88eee2017-10-20 11:30:57 +010020
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000021static void *disable_sve_hook(const void *arg)
22{
23 uint64_t cptr;
David Cunadoce88eee2017-10-20 11:30:57 +010024
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010025 if (!sve_supported())
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000026 return (void *)-1;
27
28 /*
29 * Disable SVE, SIMD and FP access for the Secure world.
30 * As the SIMD/FP registers are part of the SVE Z-registers, any
31 * use of SIMD/FP functionality will corrupt the SVE registers.
32 * Therefore it is necessary to prevent use of SIMD/FP support
33 * in the Secure world as well as SVE functionality.
34 */
35 cptr = read_cptr_el3();
36 cptr = (cptr | TFP_BIT) & ~(CPTR_EZ_BIT);
37 write_cptr_el3(cptr);
38
39 /*
40 * No explicit ISB required here as ERET to switch to Secure
41 * world covers it
42 */
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010043 return (void *)0;
David Cunadoce88eee2017-10-20 11:30:57 +010044}
45
46static void *enable_sve_hook(const void *arg)
47{
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000048 uint64_t cptr;
David Cunadoce88eee2017-10-20 11:30:57 +010049
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010050 if (!sve_supported())
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000051 return (void *)-1;
David Cunadoce88eee2017-10-20 11:30:57 +010052
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000053 /*
54 * Enable SVE, SIMD and FP access for the Non-secure world.
55 */
56 cptr = read_cptr_el3();
57 cptr = (cptr | CPTR_EZ_BIT) & ~(TFP_BIT);
58 write_cptr_el3(cptr);
David Cunadoce88eee2017-10-20 11:30:57 +010059
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000060 /*
61 * No explicit ISB required here as ERET to switch to Non-secure
62 * world covers it
63 */
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010064 return (void *)0;
David Cunadoce88eee2017-10-20 11:30:57 +010065}
66
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010067void sve_enable(bool el2_unused)
David Cunadoce88eee2017-10-20 11:30:57 +010068{
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000069 uint64_t cptr;
David Cunadoce88eee2017-10-20 11:30:57 +010070
Antonio Nino Diaz033b4bb2018-10-25 16:52:26 +010071 if (!sve_supported())
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000072 return;
73
David Cunadoce88eee2017-10-20 11:30:57 +010074#if CTX_INCLUDE_FPREGS
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000075 /*
76 * CTX_INCLUDE_FPREGS is not supported on SVE enabled systems.
77 */
78 assert(0);
David Cunadoce88eee2017-10-20 11:30:57 +010079#endif
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000080 /*
81 * Update CPTR_EL3 to enable access to SVE functionality for the
82 * Non-secure world.
83 * NOTE - assumed that CPTR_EL3.TFP is set to allow access to
84 * the SIMD, floating-point and SVE support.
85 *
86 * CPTR_EL3.EZ: Set to 1 to enable access to SVE functionality
87 * in the Non-secure world.
88 */
89 cptr = read_cptr_el3();
90 cptr |= CPTR_EZ_BIT;
91 write_cptr_el3(cptr);
David Cunadoce88eee2017-10-20 11:30:57 +010092
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +000093 /*
94 * Need explicit ISB here to guarantee that update to ZCR_ELx
95 * and CPTR_EL2.TZ do not result in trap to EL3.
96 */
97 isb();
98
99 /*
100 * Ensure lower ELs have access to full vector length.
101 */
102 write_zcr_el3(ZCR_EL3_LEN_MASK);
David Cunadoce88eee2017-10-20 11:30:57 +0100103
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +0000104 if (el2_unused) {
David Cunadoce88eee2017-10-20 11:30:57 +0100105 /*
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +0000106 * Update CPTR_EL2 to enable access to SVE functionality
107 * for Non-secure world, EL2 and Non-secure EL1 and EL0.
108 * NOTE - assumed that CPTR_EL2.TFP is set to allow
109 * access to the SIMD, floating-point and SVE support.
110 *
111 * CPTR_EL2.TZ: Set to 0 to enable access to SVE support
112 * for EL2 and Non-secure EL1 and EL0.
David Cunadoce88eee2017-10-20 11:30:57 +0100113 */
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +0000114 cptr = read_cptr_el2();
115 cptr &= ~(CPTR_EL2_TZ_BIT);
116 write_cptr_el2(cptr);
David Cunadoce88eee2017-10-20 11:30:57 +0100117
David Cunadoce88eee2017-10-20 11:30:57 +0100118 /*
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +0000119 * Ensure lower ELs have access to full vector length.
David Cunadoce88eee2017-10-20 11:30:57 +0100120 */
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +0000121 write_zcr_el2(ZCR_EL2_LEN_MASK);
David Cunadoce88eee2017-10-20 11:30:57 +0100122 }
Dimitris Papastamos5e8cd792018-02-19 14:52:19 +0000123 /*
124 * No explicit ISB required here as ERET to switch to
125 * Non-secure world covers it.
126 */
David Cunadoce88eee2017-10-20 11:30:57 +0100127}
128
129SUBSCRIBE_TO_EVENT(cm_exited_normal_world, disable_sve_hook);
130SUBSCRIBE_TO_EVENT(cm_entering_normal_world, enable_sve_hook);