blob: 643d5508eef7e8e3da1b1f854bdf7a9399565c07 [file] [log] [blame]
Jayanth Dodderi Chidanand9461a892022-01-17 18:57:17 +00001#
Govindraj Raja24d3a4e2023-12-21 13:57:49 -06002# Copyright (c) 2022-2024, Arm Limited. All rights reserved.
Jayanth Dodderi Chidanand9461a892022-01-17 18:57:17 +00003#
4# SPDX-License-Identifier: BSD-3-Clause
5#
6
Govindraj Raja0386e312023-08-17 10:41:48 -05007# This file lists all of the architectural features, and initializes
8# and enables them based on the configured architecture version.
9
10# This file follows the following format:
Govindraj Rajaf7676dd2024-01-24 11:42:40 -060011# - Enable mandatory feature if not updated, as applicable to an Arch Version.
Govindraj Raja16b11372023-10-09 13:56:06 -050012# - By default disable any mandatory features if they have not been defined yet.
Govindraj Raja0386e312023-08-17 10:41:48 -050013# - Disable or enable any optional feature this would be enabled/disabled if needed by platform.
14
15#
16################################################################################
Govindraj Rajaf7676dd2024-01-24 11:42:40 -060017# Enable Mandatory features if not updated yet, based on Arch versions.
Govindraj Raja16b11372023-10-09 13:56:06 -050018################################################################################
19#
20
21# Enable the features which are mandatory from ARCH version 8.1 and upwards.
22ifeq "8.1" "$(word 1, $(sort 8.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060023armv8-1-a-feats := ENABLE_FEAT_PAN ENABLE_FEAT_VHE
24
25FEAT_LIST := ${armv8-1-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050026endif
27
28# Enable the features which are mandatory from ARCH version 8.2 and upwards.
29ifeq "8.2" "$(word 1, $(sort 8.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060030armv8-2-a-feats := ENABLE_FEAT_RAS
31# 8.1 Compliant
32armv8-2-a-feats += ${armv8-1-a-feats}
33
34FEAT_LIST := ${armv8-2-a-feats}
35endif
36
37# Enable the features which are mandatory from ARCH version 8.3 and upwards.
38ifeq "8.3" "$(word 1, $(sort 8.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
39# 8.2 Compliant
40armv8-3-a-feats += ${armv8-2-a-feats}
41
42FEAT_LIST := ${armv8-3-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050043endif
44
45# Enable the features which are mandatory from ARCH version 8.4 and upwards.
46ifeq "8.4" "$(word 1, $(sort 8.4 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060047armv8-4-a-feats := ENABLE_FEAT_SEL2 ENABLE_TRF_FOR_NS ENABLE_FEAT_DIT
48# 8.3 Compliant
49armv8-4-a-feats += ${armv8-3-a-feats}
50
51FEAT_LIST := ${armv8-4-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050052endif
53
54# Enable the features which are mandatory from ARCH version 8.5 and upwards.
55ifeq "8.5" "$(word 1, $(sort 8.5 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060056armv8-5-a-feats := ENABLE_FEAT_RNG ENABLE_FEAT_SB
57# 8.4 Compliant
58armv8-5-a-feats += ${armv8-4-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050059
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060060FEAT_LIST := ${armv8-5-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050061# Enable Memory tagging, Branch Target Identification for aarch64 only.
62ifeq ($(ARCH), aarch64)
Govindraj Raja01f97012024-01-11 13:56:40 -060063 mem_tag_arch_support ?= yes
Govindraj Raja16b11372023-10-09 13:56:06 -050064endif #(ARCH=aarch64)
65
66endif
67
68# Enable the features which are mandatory from ARCH version 8.6 and upwards.
69ifeq "8.6" "$(word 1, $(sort 8.6 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060070armv8-6-a-feats := ENABLE_FEAT_ECV ENABLE_FEAT_FGT
71# 8.5 Compliant
72armv8-6-a-feats += ${armv8-5-a-feats}
73FEAT_LIST := ${armv8-6-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050074endif
75
76# Enable the features which are mandatory from ARCH version 8.7 and upwards.
77ifeq "8.7" "$(word 1, $(sort 8.7 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060078armv8-7-a-feats := ENABLE_FEAT_HCX
79# 8.6 Compliant
80armv8-7-a-feats += ${armv8-6-a-feats}
81FEAT_LIST := ${armv8-7-a-feats}
82endif
83
84# Enable the features which are mandatory from ARCH version 8.8 and upwards.
85ifeq "8.8" "$(word 1, $(sort 8.8 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
86# 8.7 Compliant
87armv8-7-a-feats += ${armv8-7-a-feats}
88FEAT_LIST := ${armv8-8-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050089endif
90
91# Enable the features which are mandatory from ARCH version 8.9 and upwards.
92ifeq "8.9" "$(word 1, $(sort 8.9 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060093armv8-9-a-feats := ENABLE_FEAT_TCR2
94# 8.8 Compliant
95armv8-9-a-feats += ${armv8-8-a-feats}
96FEAT_LIST := ${armv8-9-a-feats}
Govindraj Raja16b11372023-10-09 13:56:06 -050097endif
98
Govindraj Raja7dc5f1b2024-01-23 14:20:52 -060099# Enable the features which are mandatory from ARCH version 9.0 and upwards.
100ifeq "9.0" "$(word 1, $(sort 9.0 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
101# 8.5 Compliant
102armv9-0-a-feats += ${armv8-5-a-feats}
103FEAT_LIST := ${armv9-0-a-feats}
104endif
105
106# Enable the features which are mandatory from ARCH version 9.1 and upwards.
107ifeq "9.1" "$(word 1, $(sort 9.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
108# 8.6 and 9.0 Compliant
109armv9-1-a-feats += ${armv8-6-a-feats} ${armv9-0-a-feats}
110FEAT_LIST := ${armv9-1-a-feats}
111endif
112
113# Enable the features which are mandatory from ARCH version 9.2 and upwards.
114ifeq "9.2" "$(word 1, $(sort 9.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
115# 8.7 and 9.1 Compliant
116armv9-2-a-feats += ${armv8-7-a-feats} ${armv9-1-a-feats}
117FEAT_LIST := ${armv9-2-a-feats}
118endif
119
120# Enable the features which are mandatory from ARCH version 9.3 and upwards.
121ifeq "9.3" "$(word 1, $(sort 9.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
122# 8.8 and 9.2 Compliant
123armv9-3-a-feats += ${armv8-8-a-feats} ${armv9-2-a-feats}
124FEAT_LIST := ${armv9-3-a-feats}
125endif
126
127# Set all FEAT_* in FEAT_LIST to '1' if they are not yet defined or set
128# from build commandline options or platform makefile.
129$(eval $(call default_ones, ${sort ${FEAT_LIST}}))
130
Govindraj Raja16b11372023-10-09 13:56:06 -0500131#
132################################################################################
Govindraj Rajaf7676dd2024-01-24 11:42:40 -0600133# Set mandatory features by default to zero, if they are not already updated.
Govindraj Raja0386e312023-08-17 10:41:48 -0500134################################################################################
135#
136
137#----
138# 8.1
139#----
140
141# Flag to enable access to Privileged Access Never bit of PSTATE.
Govindraj Raja16b11372023-10-09 13:56:06 -0500142ENABLE_FEAT_PAN ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500143
144# Flag to enable Virtualization Host Extensions.
Govindraj Raja16b11372023-10-09 13:56:06 -0500145ENABLE_FEAT_VHE ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500146
147#----
148# 8.2
149#----
150
151# Enable RAS Support.
Govindraj Raja16b11372023-10-09 13:56:06 -0500152ENABLE_FEAT_RAS ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500153
154#----
Govindraj Raja16b11372023-10-09 13:56:06 -0500155# 8.3
156#----
157
158# Flag to enable Pointer Authentication. Internal flag not meant for
159# direct setting. Use BRANCH_PROTECTION to enable PAUTH.
160ENABLE_PAUTH ?= 0
161
162# Include pointer authentication (ARMv8.3-PAuth) registers in cpu context. This
163# must be set to 1 if the platform wants to use this feature in the Secure
164# world. It is not necessary for use in the Non-secure world.
165CTX_INCLUDE_PAUTH_REGS ?= 0
166
167
168#----
Govindraj Raja0386e312023-08-17 10:41:48 -0500169# 8.4
170#----
171
172# Flag to enable Secure EL-2 feature.
Govindraj Raja16b11372023-10-09 13:56:06 -0500173ENABLE_FEAT_SEL2 ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500174
Govindraj Raja0386e312023-08-17 10:41:48 -0500175# By default, disable trace filter control register access to lower non-secure
176# exception levels, i.e. NS-EL2, or NS-EL1 if NS-EL2 is implemented, but
177# trace filter control register access is unused if FEAT_TRF is implemented.
Govindraj Raja16b11372023-10-09 13:56:06 -0500178ENABLE_TRF_FOR_NS ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500179
180# Flag to enable Data Independent Timing instructions.
Govindraj Raja16b11372023-10-09 13:56:06 -0500181ENABLE_FEAT_DIT ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500182
183#----
184# 8.5
185#----
186
Govindraj Raja16b11372023-10-09 13:56:06 -0500187# Flag to enable Branch Target Identification.
188# Internal flag not meant for direct setting.
189# Use BRANCH_PROTECTION to enable BTI.
190ENABLE_BTI ?= 0
191
Govindraj Raja0386e312023-08-17 10:41:48 -0500192# Flag to enable access to the Random Number Generator registers.
Govindraj Raja16b11372023-10-09 13:56:06 -0500193ENABLE_FEAT_RNG ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500194
195# Flag to enable Speculation Barrier Instruction.
Govindraj Raja16b11372023-10-09 13:56:06 -0500196ENABLE_FEAT_SB ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500197
Govindraj Raja0386e312023-08-17 10:41:48 -0500198#----
199# 8.6
200#----
201
202# Flag to enable access to the CNTPOFF_EL2 register.
Govindraj Raja16b11372023-10-09 13:56:06 -0500203ENABLE_FEAT_ECV ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500204
205# Flag to enable access to the HDFGRTR_EL2 register.
Govindraj Raja16b11372023-10-09 13:56:06 -0500206ENABLE_FEAT_FGT ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500207
208#----
209# 8.7
210#----
211
212# Flag to enable access to the HCRX_EL2 register by setting SCR_EL3.HXEn.
Govindraj Raja16b11372023-10-09 13:56:06 -0500213ENABLE_FEAT_HCX ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500214
215#----
216# 8.9
217#----
218
219# Flag to enable access to TCR2 (FEAT_TCR2).
Govindraj Raja16b11372023-10-09 13:56:06 -0500220ENABLE_FEAT_TCR2 ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500221
222#
223################################################################################
Govindraj Raja0386e312023-08-17 10:41:48 -0500224# Optional Features defaulted to 0 or 2, if they are not enabled from
225# build option. Can also be disabled or enabled by platform if needed.
226################################################################################
227#
228
229#----
230# 8.0
231#----
232
233# Flag to enable CSV2_2 extension.
234ENABLE_FEAT_CSV2_2 ?= 0
235
Sona Mathew3b84c962023-10-25 16:48:19 -0500236# Flag to enable CSV2_3 extension. FEAT_CSV2_3 enables access to the
237# SCXTNUM_ELx register.
238ENABLE_FEAT_CSV2_3 ?= 0
239
Govindraj Raja0386e312023-08-17 10:41:48 -0500240# By default, disable access of trace system registers from NS lower
241# ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused if
242# system register trace is implemented. This feature is available if
243# trace unit such as ETMv4.x, This feature is OPTIONAL and is only
244# permitted in Armv8 implementations.
245ENABLE_SYS_REG_TRACE_FOR_NS ?= 0
246
247#----
248# 8.2
249#----
250
251# Build option to enable/disable the Statistical Profiling Extension,
252# keep it enabled by default for AArch64.
253ifeq (${ARCH},aarch64)
Govindraj Raja28b525c2023-09-20 15:31:45 -0500254 ENABLE_SPE_FOR_NS ?= 2
Govindraj Raja0386e312023-08-17 10:41:48 -0500255else ifeq (${ARCH},aarch32)
Govindraj Raja399541a2023-10-17 08:13:03 -0500256 ifneq ($(or $(ENABLE_SPE_FOR_NS),0),0)
Govindraj Raja28b525c2023-09-20 15:31:45 -0500257 $(error ENABLE_SPE_FOR_NS is not supported for AArch32)
258 else
259 ENABLE_SPE_FOR_NS := 0
260 endif
Govindraj Raja0386e312023-08-17 10:41:48 -0500261endif
262
263# Enable SVE for non-secure world by default.
264ifeq (${ARCH},aarch64)
Govindraj Raja28b525c2023-09-20 15:31:45 -0500265 ENABLE_SVE_FOR_NS ?= 2
Govindraj Raja0386e312023-08-17 10:41:48 -0500266# SVE is only supported on AArch64 so disable it on AArch32.
267else ifeq (${ARCH},aarch32)
Govindraj Raja399541a2023-10-17 08:13:03 -0500268 ifneq ($(or $(ENABLE_SVE_FOR_NS),0),0)
Govindraj Raja28b525c2023-09-20 15:31:45 -0500269 $(error ENABLE_SVE_FOR_NS is not supported for AArch32)
270 else
271 ENABLE_SVE_FOR_NS := 0
272 endif
Govindraj Raja0386e312023-08-17 10:41:48 -0500273endif
274
275#----
276# 8.4
277#----
278
279# Feature flags for supporting Activity monitor extensions.
280ENABLE_FEAT_AMU ?= 0
281ENABLE_AMU_AUXILIARY_COUNTERS ?= 0
282ENABLE_AMU_FCONF ?= 0
283AMU_RESTRICT_COUNTERS ?= 0
284
285# Build option to enable MPAM for lower ELs.
Arvind Ram Prakashab28d4b2023-10-11 12:10:56 -0500286# Enabling it by default
287ifeq (${ARCH},aarch64)
Harrison Mutaibb75e4f2023-10-31 10:15:41 +0000288 ENABLE_FEAT_MPAM ?= 2
Arvind Ram Prakashab28d4b2023-10-11 12:10:56 -0500289else ifeq (${ARCH},aarch32)
Harrison Mutaibb75e4f2023-10-31 10:15:41 +0000290 ifneq ($(or $(ENABLE_FEAT_MPAM),0),0)
291 $(error ENABLE_FEAT_MPAM is not supported for AArch32)
292 else
293 ENABLE_FEAT_MPAM := 0
294 endif
Arvind Ram Prakashab28d4b2023-10-11 12:10:56 -0500295endif
Govindraj Raja0386e312023-08-17 10:41:48 -0500296
Govindraj Raja3748d902023-09-19 08:43:16 -0500297# Include nested virtualization control (Armv8.4-NV) registers in cpu context.
298# This must be set to 1 if architecture implements Nested Virtualization
299# Extension and platform wants to use this feature in the Secure world.
300CTX_INCLUDE_NEVE_REGS ?= 0
301
Govindraj Raja0386e312023-08-17 10:41:48 -0500302#----
303# 8.5
304#----
305
306# Flag to enable support for EL3 trapping of reads of the RNDR and RNDRRS
307# registers, by setting SCR_EL3.TRNDR.
308ENABLE_FEAT_RNG_TRAP ?= 0
309
Govindraj Raja24d3a4e2023-12-21 13:57:49 -0600310# Enable Memory Tagging Extension. This must be set to 1 if the platform wants
311# to use this feature in the Secure world and MTE is enabled at ELX.
312ifeq ($(CTX_INCLUDE_MTE_REGS),1)
313 $(warning CTX_INCLUDE_MTE_REGS option is deprecated use ENABLE_FEAT_MTE, Enabling ENABLE_FEAT_MTE)
314 ENABLE_FEAT_MTE ?= 1
315endif
316ifeq (${ARCH},aarch32)
317 ifneq ($(or $(ENABLE_FEAT_MTE),0),0)
318 $(error ENABLE_FEAT_MTE is not supported for AArch32)
319 endif
320endif
321ENABLE_FEAT_MTE ?= 0
Govindraj Rajad7b63ac2024-01-26 10:08:37 -0600322ENABLE_FEAT_MTE2 ?= 0
323
324
325# Add a error message to indicate incorrect MTE2 selection without MTE enabled.
326ifneq ($(ENABLE_FEAT_MTE2),0)
327 ifeq ($(ENABLE_FEAT_MTE),0)
328 $(error ENABLE_FEAT_MTE2 is not supported without enabling ENABLE_FEAT_MTE)
329 endif
330endif
Govindraj Raja0386e312023-08-17 10:41:48 -0500331
332#----
333# 8.6
334#----
335
336# Flag to enable AMUv1p1 extension.
337ENABLE_FEAT_AMUv1p1 ?= 0
338
339# Flag to enable delayed trapping of WFE instruction (FEAT_TWED).
340ENABLE_FEAT_TWED ?= 0
341
342# In v8.6+ platforms with delayed trapping of WFE being supported
343# via FEAT_TWED, this flag takes the delay value to be set in the
344# SCR_EL3.TWEDEL(4bit) field, when FEAT_TWED is implemented.
345# By default it takes 0, and need to be updated by the platforms.
346TWED_DELAY ?= 0
347
348# Disable MTPMU if FEAT_MTPMU is supported.
349DISABLE_MTPMU ?= 0
350
351#----
352# 8.9
353#----
354
355# Flag to enable NoTagAccess memory region attribute for stage 2 of translation.
356ENABLE_FEAT_MTE_PERM ?= 0
357
358# Flag to enable access to Stage 2 Permission Indirection (FEAT_S2PIE).
359ENABLE_FEAT_S2PIE ?= 0
360
361# Flag to enable access to Stage 1 Permission Indirection (FEAT_S1PIE).
362ENABLE_FEAT_S1PIE ?= 0
363
364# Flag to enable access to Stage 2 Permission Overlay (FEAT_S2POE).
365ENABLE_FEAT_S2POE ?= 0
366
367# Flag to enable access to Stage 1 Permission Overlay (FEAT_S1POE).
368ENABLE_FEAT_S1POE ?= 0
369
370#----
371# 9.0
372#----
373
Govindraj Raja0386e312023-08-17 10:41:48 -0500374# Scalable Matrix Extension for non-secure world.
375ENABLE_SME_FOR_NS ?= 0
376
377# Scalable Vector Extension for secure world.
378ENABLE_SVE_FOR_SWD ?= 0
379
380# By default, disable access of trace buffer control registers from NS
381# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
382# if FEAT_TRBE is implemented.
383# Note FEAT_TRBE is only supported on AArch64 - therefore do not enable in
384# AArch32.
385ifeq (${ARCH},aarch64)
Govindraj Raja28b525c2023-09-20 15:31:45 -0500386 ENABLE_TRBE_FOR_NS ?= 0
Govindraj Raja0386e312023-08-17 10:41:48 -0500387else ifeq (${ARCH},aarch32)
Govindraj Raja399541a2023-10-17 08:13:03 -0500388 ifneq ($(or $(ENABLE_TRBE_FOR_NS),0),0)
389 $(error ENABLE_TRBE_FOR_NS is not supported for AArch32)
Govindraj Raja28b525c2023-09-20 15:31:45 -0500390 else
Govindraj Raja399541a2023-10-17 08:13:03 -0500391 ENABLE_TRBE_FOR_NS := 0
Govindraj Raja28b525c2023-09-20 15:31:45 -0500392 endif
Govindraj Raja0386e312023-08-17 10:41:48 -0500393endif
394
395#----
396# 9.2
397#----
398
Govindraj Rajaf7676dd2024-01-24 11:42:40 -0600399# Flag to enable Realm Management Extension (FEAT_RME).
400ENABLE_RME ?= 0
401
Govindraj Raja0386e312023-08-17 10:41:48 -0500402# Scalable Matrix Extension version 2 for non-secure world.
403ENABLE_SME2_FOR_NS ?= 0
404
405# Scalable Matrix Extension for secure world.
406ENABLE_SME_FOR_SWD ?= 0
407
408# By default, disable access to branch record buffer control registers from NS
409# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
410# if FEAT_BRBE is implemented.
411ENABLE_BRBE_FOR_NS ?= 0
412
413#----
414#9.4
415#----
416
417# Flag to enable access to Guarded Control Stack (FEAT_GCS).
418ENABLE_FEAT_GCS ?= 0