xref: /rk3399_ARM-atf/make_helpers/arch_features.mk (revision 06f3c7058c42a9f1a9f7df75ea2de71a000855e8)
1#
2# Copyright (c) 2022-2025, Arm Limited. All rights reserved.
3#
4# SPDX-License-Identifier: BSD-3-Clause
5#
6
7# This file lists all of the architectural features, and initializes
8# and enables them based on the configured architecture version.
9
10# This file follows the following format:
11#   - Enable mandatory feature if not updated, as applicable to an Arch Version.
12#   - By default disable any mandatory features if they have not been defined yet.
13#   - Disable or enable any optional feature this would be enabled/disabled if needed by platform.
14
15#
16################################################################################
17# Enable Mandatory features if not updated yet, based on Arch versions.
18################################################################################
19#
20
21# Enable the features which are mandatory from ARCH version 8.1 and upwards.
22ifeq "8.1" "$(word 1, $(sort 8.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
23armv8-1-a-feats         := ENABLE_FEAT_PAN ENABLE_FEAT_VHE
24
25FEAT_LIST               := ${armv8-1-a-feats}
26endif
27
28# Enable the features which are mandatory from ARCH version 8.2 and upwards.
29ifeq "8.2" "$(word 1, $(sort 8.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
30armv8-2-a-feats         := ENABLE_FEAT_RAS
31# 8.1 Compliant
32armv8-2-a-feats         += ${armv8-1-a-feats}
33
34FEAT_LIST               := ${armv8-2-a-feats}
35endif
36
37# Enable the features which are mandatory from ARCH version 8.3 and upwards.
38ifeq "8.3" "$(word 1, $(sort 8.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
39# 8.2 Compliant
40armv8-3-a-feats         += ${armv8-2-a-feats}
41
42FEAT_LIST               := ${armv8-3-a-feats}
43endif
44
45# Enable the features which are mandatory from ARCH version 8.4 and upwards.
46ifeq "8.4" "$(word 1, $(sort 8.4 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
47armv8-4-a-feats         := ENABLE_FEAT_SEL2 ENABLE_TRF_FOR_NS ENABLE_FEAT_DIT
48# 8.3 Compliant
49armv8-4-a-feats         += ${armv8-3-a-feats}
50
51FEAT_LIST               := ${armv8-4-a-feats}
52endif
53
54# Enable the features which are mandatory from ARCH version 8.5 and upwards.
55ifeq "8.5" "$(word 1, $(sort 8.5 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
56armv8-5-a-feats         := ENABLE_FEAT_RNG ENABLE_FEAT_SB
57# 8.4 Compliant
58armv8-5-a-feats         += ${armv8-4-a-feats}
59
60FEAT_LIST               := ${armv8-5-a-feats}
61# Enable Memory tagging, Branch Target Identification for aarch64 only.
62ifeq ($(ARCH), aarch64)
63	mem_tag_arch_support		?= 	yes
64endif #(ARCH=aarch64)
65
66endif
67
68# Enable the features which are mandatory from ARCH version 8.6 and upwards.
69ifeq "8.6" "$(word 1, $(sort 8.6 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
70armv8-6-a-feats         := ENABLE_FEAT_ECV ENABLE_FEAT_FGT
71# 8.5 Compliant
72armv8-6-a-feats         += ${armv8-5-a-feats}
73FEAT_LIST               := ${armv8-6-a-feats}
74endif
75
76# Enable the features which are mandatory from ARCH version 8.7 and upwards.
77ifeq "8.7" "$(word 1, $(sort 8.7 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
78armv8-7-a-feats         := ENABLE_FEAT_HCX
79# 8.6 Compliant
80armv8-7-a-feats         += ${armv8-6-a-feats}
81FEAT_LIST               := ${armv8-7-a-feats}
82endif
83
84# Enable the features which are mandatory from ARCH version 8.8 and upwards.
85ifeq "8.8" "$(word 1, $(sort 8.8 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
86armv8-8-a-feats		:= ENABLE_FEAT_MOPS
87# 8.7 Compliant
88armv8-8-a-feats         += ${armv8-7-a-feats}
89FEAT_LIST               := ${armv8-8-a-feats}
90endif
91
92# Enable the features which are mandatory from ARCH version 8.9 and upwards.
93ifeq "8.9" "$(word 1, $(sort 8.9 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
94armv8-9-a-feats         := ENABLE_FEAT_TCR2 ENABLE_FEAT_DEBUGV8P9 ENABLE_FEAT_SCTLR2
95# 8.8 Compliant
96armv8-9-a-feats         += ${armv8-8-a-feats}
97FEAT_LIST               := ${armv8-9-a-feats}
98endif
99
100# Enable the features which are mandatory from ARCH version 9.0 and upwards.
101ifeq "9.0" "$(word 1, $(sort 9.0 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
102# 8.5 Compliant
103armv9-0-a-feats         += ${armv8-5-a-feats}
104FEAT_LIST               := ${armv9-0-a-feats}
105endif
106
107# Enable the features which are mandatory from ARCH version 9.1 and upwards.
108ifeq "9.1" "$(word 1, $(sort 9.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
109# 8.6 and 9.0 Compliant
110armv9-1-a-feats         += ${armv8-6-a-feats} ${armv9-0-a-feats}
111FEAT_LIST               := ${armv9-1-a-feats}
112endif
113
114# Enable the features which are mandatory from ARCH version 9.2 and upwards.
115ifeq "9.2" "$(word 1, $(sort 9.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
116# 8.7 and 9.1 Compliant
117armv9-2-a-feats         += ${armv8-7-a-feats} ${armv9-1-a-feats}
118FEAT_LIST               := ${armv9-2-a-feats}
119endif
120
121# Enable the features which are mandatory from ARCH version 9.3 and upwards.
122ifeq "9.3" "$(word 1, $(sort 9.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
123# 8.8 and 9.2 Compliant
124armv9-3-a-feats         += ${armv8-8-a-feats} ${armv9-2-a-feats}
125FEAT_LIST               := ${armv9-3-a-feats}
126endif
127
128# Set all FEAT_* in FEAT_LIST to '1' if they are not yet defined or set
129# from build commandline options or platform makefile.
130$(eval $(call default_ones, ${sort ${FEAT_LIST}}))
131
132#
133################################################################################
134# Set mandatory features by default to zero, if they are not already updated.
135################################################################################
136#
137
138#----
139# 8.1
140#----
141
142# Flag to enable access to Privileged Access Never bit of PSTATE.
143ENABLE_FEAT_PAN			?=	0
144
145# Flag to enable Virtualization Host Extensions.
146ENABLE_FEAT_VHE			?=	0
147
148#----
149# 8.2
150#----
151
152# Enable RAS Support.
153ENABLE_FEAT_RAS			?=	0
154
155#----
156# 8.3
157#----
158
159# Flag to enable Pointer Authentication. Internal flag not meant for
160# direct setting. Use BRANCH_PROTECTION to enable PAUTH.
161ENABLE_PAUTH			?=	0
162
163# FEAT_PAUTH_LR is an optional architectural feature, so this flag must be set
164# manually in addition to the BRANCH_PROTECTION flag which is used for other
165# branch protection and pointer authentication features.
166ENABLE_FEAT_PAUTH_LR		?=	0
167
168# Include pointer authentication (ARMv8.3-PAuth) registers in cpu context. This
169# must be set to 1 if the platform wants to use this feature in the Secure
170# world. It is not necessary for use in the Non-secure world.
171CTX_INCLUDE_PAUTH_REGS		?=	0
172
173
174#----
175# 8.4
176#----
177
178# Flag to enable Secure EL-2 feature.
179ENABLE_FEAT_SEL2		?=	0
180
181# By default, disable trace filter control register access to lower non-secure
182# exception levels, i.e. NS-EL2, or NS-EL1 if NS-EL2 is implemented, but
183# trace filter control register access is unused if FEAT_TRF is implemented.
184ENABLE_TRF_FOR_NS		?=	0
185
186# Flag to enable Data Independent Timing instructions.
187ENABLE_FEAT_DIT			?=	0
188
189#----
190# 8.5
191#----
192
193# Flag to enable Branch Target Identification.
194# Internal flag not meant for direct setting.
195# Use BRANCH_PROTECTION to enable BTI.
196ENABLE_BTI			?=	0
197
198# Flag to enable access to the Random Number Generator registers.
199ENABLE_FEAT_RNG			?=	0
200
201# Flag to enable Speculation Barrier Instruction.
202ENABLE_FEAT_SB			?=	0
203
204#----
205# 8.6
206#----
207
208# Flag to enable access to the CNTPOFF_EL2 register.
209ENABLE_FEAT_ECV			?=	0
210
211# Flag to enable access to the HDFGRTR_EL2 register.
212ENABLE_FEAT_FGT			?=	0
213
214#----
215# 8.7
216#----
217
218# Flag to enable access to the HCRX_EL2 register by setting SCR_EL3.HXEn.
219ENABLE_FEAT_HCX			?=	0
220
221#----
222# 8.8
223#----
224
225# Flag to enable FEAT_MOPS (Standardization of Memory operations)
226# when INIT_UNUSED_NS_EL2 = 1
227ENABLE_FEAT_MOPS		?=	0
228
229#----
230# 8.9
231#----
232
233# Flag to enable access to TCR2 (FEAT_TCR2).
234ENABLE_FEAT_TCR2		?=	0
235
236# Flag to enable access to SCTLR2 (FEAT_SCTLR2).
237ENABLE_FEAT_SCTLR2		?=	0
238
239#
240################################################################################
241# Optional Features defaulted to 0 or 2, if they are not enabled from
242# build option. Can also be disabled or enabled by platform if needed.
243################################################################################
244#
245
246#----
247# 8.0
248#----
249
250# Flag to enable CSV2_2 extension.
251ENABLE_FEAT_CSV2_2			?=	0
252
253# Flag to enable CSV2_3 extension. FEAT_CSV2_3 enables access to the
254# SCXTNUM_ELx register.
255ENABLE_FEAT_CSV2_3			?=	0
256
257# By default, disable access of trace system registers from NS lower
258# ELs  i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused if
259# system register trace is implemented. This feature is available if
260# trace unit such as ETMv4.x, This feature is OPTIONAL and is only
261# permitted in Armv8 implementations.
262ENABLE_SYS_REG_TRACE_FOR_NS		?=	0
263
264#----
265# 8.2
266#----
267
268# Build option to enable/disable the Statistical Profiling Extension,
269# keep it enabled by default for AArch64.
270ifeq (${ARCH},aarch64)
271       ENABLE_SPE_FOR_NS		?=	2
272else ifeq (${ARCH},aarch32)
273       ifneq ($(or $(ENABLE_SPE_FOR_NS),0),0)
274              $(error ENABLE_SPE_FOR_NS is not supported for AArch32)
275       else
276              ENABLE_SPE_FOR_NS		:=	0
277       endif
278endif
279
280# Enable SVE for non-secure world by default.
281ifeq (${ARCH},aarch64)
282       ENABLE_SVE_FOR_NS		?=	2
283# SVE is only supported on AArch64 so disable it on AArch32.
284else ifeq (${ARCH},aarch32)
285       ifneq ($(or $(ENABLE_SVE_FOR_NS),0),0)
286              $(error ENABLE_SVE_FOR_NS is not supported for AArch32)
287       else
288              ENABLE_SVE_FOR_NS 	:=	0
289       endif
290endif
291
292#----
293# 8.4
294#----
295
296# Feature flags for supporting Activity monitor extensions.
297ENABLE_FEAT_AMU				?=	0
298ENABLE_AMU_AUXILIARY_COUNTERS		?=	0
299AMU_RESTRICT_COUNTERS			?=	1
300
301# Build option to enable MPAM for lower ELs.
302# Enabling it by default
303ifeq (${ARCH},aarch64)
304        ENABLE_FEAT_MPAM		?=	2
305else ifeq (${ARCH},aarch32)
306        ifneq ($(or $(ENABLE_FEAT_MPAM),0),0)
307                $(error ENABLE_FEAT_MPAM is not supported for AArch32)
308        else
309                ENABLE_FEAT_MPAM	:=	0
310        endif
311endif
312
313# Include nested virtualization control (Armv8.4-NV) registers in cpu context.
314# This must be set to 1 if architecture implements Nested Virtualization
315# Extension and platform wants to use this feature in the Secure world.
316CTX_INCLUDE_NEVE_REGS			?=	0
317
318#----
319# 8.5
320#----
321
322# Flag to enable support for EL3 trapping of reads of the RNDR and RNDRRS
323# registers, by setting SCR_EL3.TRNDR.
324ENABLE_FEAT_RNG_TRAP			?=	0
325
326# Enable FEAT_MTE2. This must be set to 1 if the platform wants
327# to use this feature and is enabled at ELX.
328ENABLE_FEAT_MTE2		        ?=	0
329
330#----
331# 8.6
332#----
333
334# Flag to enable AMUv1p1 extension.
335ENABLE_FEAT_AMUv1p1			?=	0
336
337# Flag to enable delayed trapping of WFE instruction (FEAT_TWED).
338ENABLE_FEAT_TWED			?=	0
339
340# In v8.6+ platforms with delayed trapping of WFE being supported
341# via FEAT_TWED, this flag takes the delay value to be set in the
342# SCR_EL3.TWEDEL(4bit) field, when FEAT_TWED is implemented.
343# By default it takes 0, and need to be updated by the platforms.
344TWED_DELAY				?=	0
345
346# Disable MTPMU if FEAT_MTPMU is supported.
347DISABLE_MTPMU				?=	0
348
349# Flag to enable FEAT_FGT2 (Fine Granular Traps 2)
350ENABLE_FEAT_FGT2			?=	0
351
352# LoadStore64Bytes extension using the ACCDATA_EL1 system register
353ENABLE_FEAT_LS64_ACCDATA		?=	0
354
355#----
356# 8.8
357#----
358
359# Flag to enable FEAT_THE (Translation Hardening Extension)
360ENABLE_FEAT_THE				?=	0
361
362#----
363# 8.9
364#----
365
366# Flag to enable access to Stage 2 Permission Indirection (FEAT_S2PIE).
367ENABLE_FEAT_S2PIE			?=	0
368
369# Flag to enable access to Stage 1 Permission Indirection (FEAT_S1PIE).
370ENABLE_FEAT_S1PIE			?=	0
371
372# Flag to enable access to Stage 2 Permission Overlay (FEAT_S2POE).
373ENABLE_FEAT_S2POE			?=	0
374
375# Flag to enable access to Stage 1 Permission Overlay (FEAT_S1POE).
376ENABLE_FEAT_S1POE			?=	0
377
378# Flag to enable access to Arm v8.9 Debug extension
379ENABLE_FEAT_DEBUGV8P9			?=	0
380
381#----
382# 9.0
383#----
384
385# Scalable Matrix Extension for non-secure world.
386ENABLE_SME_FOR_NS			?=	0
387
388# Scalable Vector Extension for secure world.
389ENABLE_SVE_FOR_SWD			?=	0
390
391# By default, disable access of trace buffer control registers from NS
392# lower ELs  i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
393# if FEAT_TRBE is implemented.
394# Note FEAT_TRBE is only supported on AArch64 - therefore do not enable in
395# AArch32.
396ifeq (${ARCH},aarch64)
397        ENABLE_TRBE_FOR_NS		?=	0
398else ifeq (${ARCH},aarch32)
399        ifneq ($(or $(ENABLE_TRBE_FOR_NS),0),0)
400               $(error ENABLE_TRBE_FOR_NS is not supported for AArch32)
401        else
402               ENABLE_TRBE_FOR_NS 	:=	0
403        endif
404endif
405
406#----
407# 9.2
408#----
409
410# Flag to enable Realm Management Extension (FEAT_RME).
411ENABLE_RME				?=	0
412
413# Scalable Matrix Extension version 2 for non-secure world.
414ENABLE_SME2_FOR_NS			?=	0
415
416# Scalable Matrix Extension for secure world.
417ENABLE_SME_FOR_SWD			?=	0
418
419# By default, disable access to branch record buffer control registers from NS
420# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
421# if FEAT_BRBE is implemented.
422ENABLE_BRBE_FOR_NS			?=	0
423
424# Flag to enable Floating point exception Mode Register Feature (FEAT_FPMR)
425ENABLE_FEAT_FPMR			?=	0
426
427# Flag to enable Memory Encryption Contexts (FEAT_MEC).
428ENABLE_FEAT_MEC				?=	0
429
430#----
431# 9.3
432#----
433# Flag to enable access to Arm v9.3 FEAT_D128 extension
434ENABLE_FEAT_D128			?=	0
435
436#----
437#9.4
438#----
439
440# Flag to enable access to Guarded Control Stack (FEAT_GCS).
441ENABLE_FEAT_GCS				?=	0
442