1# 2# Copyright (c) 2022-2025, Arm Limited. All rights reserved. 3# 4# SPDX-License-Identifier: BSD-3-Clause 5# 6 7# This file lists all of the architectural features, and initializes 8# and enables them based on the configured architecture version. 9 10# This file follows the following format: 11# - Enable mandatory feature if not updated, as applicable to an Arch Version. 12# - By default disable any mandatory features if they have not been defined yet. 13# - Disable or enable any optional feature this would be enabled/disabled if needed by platform. 14 15# 16################################################################################ 17# Enable Mandatory features if not updated yet, based on Arch versions. 18################################################################################ 19# 20 21# Enable the features which are mandatory from ARCH version 8.1 and upwards. 22ifeq "8.1" "$(word 1, $(sort 8.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 23armv8-1-a-feats := ENABLE_FEAT_PAN ENABLE_FEAT_VHE 24 25FEAT_LIST := ${armv8-1-a-feats} 26endif 27 28# Enable the features which are mandatory from ARCH version 8.2 and upwards. 29ifeq "8.2" "$(word 1, $(sort 8.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 30armv8-2-a-feats := ENABLE_FEAT_RAS 31# 8.1 Compliant 32armv8-2-a-feats += ${armv8-1-a-feats} 33 34FEAT_LIST := ${armv8-2-a-feats} 35endif 36 37# Enable the features which are mandatory from ARCH version 8.3 and upwards. 38ifeq "8.3" "$(word 1, $(sort 8.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 39# 8.2 Compliant 40armv8-3-a-feats += ${armv8-2-a-feats} 41 42FEAT_LIST := ${armv8-3-a-feats} 43endif 44 45# Enable the features which are mandatory from ARCH version 8.4 and upwards. 46ifeq "8.4" "$(word 1, $(sort 8.4 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 47armv8-4-a-feats := ENABLE_FEAT_SEL2 ENABLE_TRF_FOR_NS ENABLE_FEAT_DIT 48# 8.3 Compliant 49armv8-4-a-feats += ${armv8-3-a-feats} 50 51FEAT_LIST := ${armv8-4-a-feats} 52endif 53 54# Enable the features which are mandatory from ARCH version 8.5 and upwards. 55ifeq "8.5" "$(word 1, $(sort 8.5 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 56armv8-5-a-feats := ENABLE_FEAT_RNG ENABLE_FEAT_SB 57# 8.4 Compliant 58armv8-5-a-feats += ${armv8-4-a-feats} 59 60FEAT_LIST := ${armv8-5-a-feats} 61# Enable Memory tagging, Branch Target Identification for aarch64 only. 62ifeq ($(ARCH), aarch64) 63 mem_tag_arch_support ?= yes 64endif #(ARCH=aarch64) 65 66endif 67 68# Enable the features which are mandatory from ARCH version 8.6 and upwards. 69ifeq "8.6" "$(word 1, $(sort 8.6 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 70armv8-6-a-feats := ENABLE_FEAT_ECV ENABLE_FEAT_FGT 71# 8.5 Compliant 72armv8-6-a-feats += ${armv8-5-a-feats} 73FEAT_LIST := ${armv8-6-a-feats} 74endif 75 76# Enable the features which are mandatory from ARCH version 8.7 and upwards. 77ifeq "8.7" "$(word 1, $(sort 8.7 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 78armv8-7-a-feats := ENABLE_FEAT_HCX 79# 8.6 Compliant 80armv8-7-a-feats += ${armv8-6-a-feats} 81FEAT_LIST := ${armv8-7-a-feats} 82endif 83 84# Enable the features which are mandatory from ARCH version 8.8 and upwards. 85ifeq "8.8" "$(word 1, $(sort 8.8 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 86armv8-8-a-feats := ENABLE_FEAT_MOPS 87# 8.7 Compliant 88armv8-8-a-feats += ${armv8-7-a-feats} 89FEAT_LIST := ${armv8-8-a-feats} 90endif 91 92# Enable the features which are mandatory from ARCH version 8.9 and upwards. 93ifeq "8.9" "$(word 1, $(sort 8.9 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 94armv8-9-a-feats := ENABLE_FEAT_TCR2 ENABLE_FEAT_DEBUGV8P9 ENABLE_FEAT_SCTLR2 95# 8.8 Compliant 96armv8-9-a-feats += ${armv8-8-a-feats} 97FEAT_LIST := ${armv8-9-a-feats} 98endif 99 100# Enable the features which are mandatory from ARCH version 9.0 and upwards. 101ifeq "9.0" "$(word 1, $(sort 9.0 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 102# 8.5 Compliant 103armv9-0-a-feats += ${armv8-5-a-feats} 104FEAT_LIST := ${armv9-0-a-feats} 105endif 106 107# Enable the features which are mandatory from ARCH version 9.1 and upwards. 108ifeq "9.1" "$(word 1, $(sort 9.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 109# 8.6 and 9.0 Compliant 110armv9-1-a-feats += ${armv8-6-a-feats} ${armv9-0-a-feats} 111FEAT_LIST := ${armv9-1-a-feats} 112endif 113 114# Enable the features which are mandatory from ARCH version 9.2 and upwards. 115ifeq "9.2" "$(word 1, $(sort 9.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 116# 8.7 and 9.1 Compliant 117armv9-2-a-feats += ${armv8-7-a-feats} ${armv9-1-a-feats} 118FEAT_LIST := ${armv9-2-a-feats} 119endif 120 121# Enable the features which are mandatory from ARCH version 9.3 and upwards. 122ifeq "9.3" "$(word 1, $(sort 9.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 123# 8.8 and 9.2 Compliant 124armv9-3-a-feats += ${armv8-8-a-feats} ${armv9-2-a-feats} 125FEAT_LIST := ${armv9-3-a-feats} 126endif 127 128# Set all FEAT_* in FEAT_LIST to '1' if they are not yet defined or set 129# from build commandline options or platform makefile. 130$(eval $(call default_ones, ${sort ${FEAT_LIST}})) 131 132# 133################################################################################ 134# Set mandatory features by default to zero, if they are not already updated. 135################################################################################ 136# 137 138#---- 139# 8.1 140#---- 141 142# Flag to enable access to Privileged Access Never bit of PSTATE. 143ENABLE_FEAT_PAN ?= 0 144 145# Flag to enable Virtualization Host Extensions. 146ENABLE_FEAT_VHE ?= 0 147 148#---- 149# 8.2 150#---- 151 152# Enable RAS Support. 153ENABLE_FEAT_RAS ?= 0 154 155#---- 156# 8.3 157#---- 158 159# Flag to enable Pointer Authentication. Internal flag not meant for 160# direct setting. Use BRANCH_PROTECTION to enable PAUTH. 161ENABLE_PAUTH ?= 0 162 163# FEAT_PAUTH_LR is an optional architectural feature, so this flag must be set 164# manually in addition to the BRANCH_PROTECTION flag which is used for other 165# branch protection and pointer authentication features. 166ENABLE_FEAT_PAUTH_LR ?= 0 167 168# Include pointer authentication (ARMv8.3-PAuth) registers in cpu context. This 169# must be set to 1 if the platform wants to use this feature in the Secure 170# world. It is not necessary for use in the Non-secure world. 171CTX_INCLUDE_PAUTH_REGS ?= 0 172 173 174#---- 175# 8.4 176#---- 177 178# Flag to enable Secure EL-2 feature. 179ENABLE_FEAT_SEL2 ?= 0 180 181# By default, disable trace filter control register access to lower non-secure 182# exception levels, i.e. NS-EL2, or NS-EL1 if NS-EL2 is implemented, but 183# trace filter control register access is unused if FEAT_TRF is implemented. 184ENABLE_TRF_FOR_NS ?= 0 185 186# Flag to enable Data Independent Timing instructions. 187ENABLE_FEAT_DIT ?= 0 188 189#---- 190# 8.5 191#---- 192 193# Flag to enable Branch Target Identification. 194# Internal flag not meant for direct setting. 195# Use BRANCH_PROTECTION to enable BTI. 196ENABLE_BTI ?= 0 197 198# Flag to enable access to the Random Number Generator registers. 199ENABLE_FEAT_RNG ?= 0 200 201# Flag to enable Speculation Barrier Instruction. 202ENABLE_FEAT_SB ?= 0 203 204#---- 205# 8.6 206#---- 207 208# Flag to enable access to the CNTPOFF_EL2 register. 209ENABLE_FEAT_ECV ?= 0 210 211# Flag to enable access to the HDFGRTR_EL2 register. 212ENABLE_FEAT_FGT ?= 0 213 214#---- 215# 8.7 216#---- 217 218# Flag to enable access to the HCRX_EL2 register by setting SCR_EL3.HXEn. 219ENABLE_FEAT_HCX ?= 0 220 221#---- 222# 8.8 223#---- 224 225# Flag to enable FEAT_MOPS (Standardization of Memory operations) 226# when INIT_UNUSED_NS_EL2 = 1 227ENABLE_FEAT_MOPS ?= 0 228 229#---- 230# 8.9 231#---- 232 233# Flag to enable access to TCR2 (FEAT_TCR2). 234ENABLE_FEAT_TCR2 ?= 0 235 236# Flag to enable access to SCTLR2 (FEAT_SCTLR2). 237ENABLE_FEAT_SCTLR2 ?= 0 238 239# 240################################################################################ 241# Optional Features defaulted to 0 or 2, if they are not enabled from 242# build option. Can also be disabled or enabled by platform if needed. 243################################################################################ 244# 245 246#---- 247# 8.0 248#---- 249 250# Flag to enable CSV2_2 extension. 251ENABLE_FEAT_CSV2_2 ?= 0 252 253# Flag to enable CSV2_3 extension. FEAT_CSV2_3 enables access to the 254# SCXTNUM_ELx register. 255ENABLE_FEAT_CSV2_3 ?= 0 256 257# By default, disable access of trace system registers from NS lower 258# ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused if 259# system register trace is implemented. This feature is available if 260# trace unit such as ETMv4.x, This feature is OPTIONAL and is only 261# permitted in Armv8 implementations. 262ENABLE_SYS_REG_TRACE_FOR_NS ?= 0 263 264#---- 265# 8.2 266#---- 267 268# Build option to enable/disable the Statistical Profiling Extension, 269# keep it enabled by default for AArch64. 270ifeq (${ARCH},aarch64) 271 ENABLE_SPE_FOR_NS ?= 2 272else ifeq (${ARCH},aarch32) 273 ifneq ($(or $(ENABLE_SPE_FOR_NS),0),0) 274 $(error ENABLE_SPE_FOR_NS is not supported for AArch32) 275 else 276 ENABLE_SPE_FOR_NS := 0 277 endif 278endif 279 280# Enable SVE for non-secure world by default. 281ifeq (${ARCH},aarch64) 282 ENABLE_SVE_FOR_NS ?= 2 283# SVE is only supported on AArch64 so disable it on AArch32. 284else ifeq (${ARCH},aarch32) 285 ifneq ($(or $(ENABLE_SVE_FOR_NS),0),0) 286 $(error ENABLE_SVE_FOR_NS is not supported for AArch32) 287 else 288 ENABLE_SVE_FOR_NS := 0 289 endif 290endif 291 292#---- 293# 8.4 294#---- 295 296# Feature flags for supporting Activity monitor extensions. 297ENABLE_FEAT_AMU ?= 0 298ENABLE_AMU_AUXILIARY_COUNTERS ?= 0 299AMU_RESTRICT_COUNTERS ?= 1 300 301# Build option to enable MPAM for lower ELs. 302# Enabling it by default 303ifeq (${ARCH},aarch64) 304 ENABLE_FEAT_MPAM ?= 2 305else ifeq (${ARCH},aarch32) 306 ifneq ($(or $(ENABLE_FEAT_MPAM),0),0) 307 $(error ENABLE_FEAT_MPAM is not supported for AArch32) 308 else 309 ENABLE_FEAT_MPAM := 0 310 endif 311endif 312 313# Include nested virtualization control (Armv8.4-NV) registers in cpu context. 314# This must be set to 1 if architecture implements Nested Virtualization 315# Extension and platform wants to use this feature in the Secure world. 316CTX_INCLUDE_NEVE_REGS ?= 0 317 318#---- 319# 8.5 320#---- 321 322# Flag to enable support for EL3 trapping of reads of the RNDR and RNDRRS 323# registers, by setting SCR_EL3.TRNDR. 324ENABLE_FEAT_RNG_TRAP ?= 0 325 326# Enable FEAT_MTE2. This must be set to 1 if the platform wants 327# to use this feature and is enabled at ELX. 328ENABLE_FEAT_MTE2 ?= 0 329 330#---- 331# 8.6 332#---- 333 334# Flag to enable AMUv1p1 extension. 335ENABLE_FEAT_AMUv1p1 ?= 0 336 337# Flag to enable delayed trapping of WFE instruction (FEAT_TWED). 338ENABLE_FEAT_TWED ?= 0 339 340# In v8.6+ platforms with delayed trapping of WFE being supported 341# via FEAT_TWED, this flag takes the delay value to be set in the 342# SCR_EL3.TWEDEL(4bit) field, when FEAT_TWED is implemented. 343# By default it takes 0, and need to be updated by the platforms. 344TWED_DELAY ?= 0 345 346# Disable MTPMU if FEAT_MTPMU is supported. 347DISABLE_MTPMU ?= 0 348 349# Flag to enable FEAT_FGT2 (Fine Granular Traps 2) 350ENABLE_FEAT_FGT2 ?= 0 351 352# LoadStore64Bytes extension using the ACCDATA_EL1 system register 353ENABLE_FEAT_LS64_ACCDATA ?= 0 354 355#---- 356# 8.8 357#---- 358 359# Flag to enable FEAT_THE (Translation Hardening Extension) 360ENABLE_FEAT_THE ?= 0 361 362#---- 363# 8.9 364#---- 365 366# Flag to enable access to Stage 2 Permission Indirection (FEAT_S2PIE). 367ENABLE_FEAT_S2PIE ?= 0 368 369# Flag to enable access to Stage 1 Permission Indirection (FEAT_S1PIE). 370ENABLE_FEAT_S1PIE ?= 0 371 372# Flag to enable access to Stage 2 Permission Overlay (FEAT_S2POE). 373ENABLE_FEAT_S2POE ?= 0 374 375# Flag to enable access to Stage 1 Permission Overlay (FEAT_S1POE). 376ENABLE_FEAT_S1POE ?= 0 377 378# Flag to enable access to Arm v8.9 Debug extension 379ENABLE_FEAT_DEBUGV8P9 ?= 0 380 381#---- 382# 9.0 383#---- 384 385# Scalable Matrix Extension for non-secure world. 386ENABLE_SME_FOR_NS ?= 0 387 388# Scalable Vector Extension for secure world. 389ENABLE_SVE_FOR_SWD ?= 0 390 391# By default, disable access of trace buffer control registers from NS 392# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused 393# if FEAT_TRBE is implemented. 394# Note FEAT_TRBE is only supported on AArch64 - therefore do not enable in 395# AArch32. 396ifeq (${ARCH},aarch64) 397 ENABLE_TRBE_FOR_NS ?= 0 398else ifeq (${ARCH},aarch32) 399 ifneq ($(or $(ENABLE_TRBE_FOR_NS),0),0) 400 $(error ENABLE_TRBE_FOR_NS is not supported for AArch32) 401 else 402 ENABLE_TRBE_FOR_NS := 0 403 endif 404endif 405 406#---- 407# 9.2 408#---- 409 410# Flag to enable Realm Management Extension (FEAT_RME). 411ENABLE_RME ?= 0 412 413# Scalable Matrix Extension version 2 for non-secure world. 414ENABLE_SME2_FOR_NS ?= 0 415 416# Scalable Matrix Extension for secure world. 417ENABLE_SME_FOR_SWD ?= 0 418 419# By default, disable access to branch record buffer control registers from NS 420# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused 421# if FEAT_BRBE is implemented. 422ENABLE_BRBE_FOR_NS ?= 0 423 424# Flag to enable Floating point exception Mode Register Feature (FEAT_FPMR) 425ENABLE_FEAT_FPMR ?= 0 426 427# Flag to enable Memory Encryption Contexts (FEAT_MEC). 428ENABLE_FEAT_MEC ?= 0 429 430#---- 431# 9.3 432#---- 433# Flag to enable access to Arm v9.3 FEAT_D128 extension 434ENABLE_FEAT_D128 ?= 0 435 436#---- 437#9.4 438#---- 439 440# Flag to enable access to Guarded Control Stack (FEAT_GCS). 441ENABLE_FEAT_GCS ?= 0 442