1# 2# Copyright (c) 2022-2025, Arm Limited. All rights reserved. 3# 4# SPDX-License-Identifier: BSD-3-Clause 5# 6 7# This file lists all of the architectural features, and initializes 8# and enables them based on the configured architecture version. 9 10# This file follows the following format: 11# - Enable mandatory feature if not updated, as applicable to an Arch Version. 12# - By default disable any mandatory features if they have not been defined yet. 13# - Disable or enable any optional feature this would be enabled/disabled if needed by platform. 14 15# 16################################################################################ 17# Enable Mandatory features if not updated yet, based on Arch versions. 18################################################################################ 19# 20 21# Enable the features which are mandatory from ARCH version 8.1 and upwards. 22ifeq "8.1" "$(word 1, $(sort 8.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 23armv8-1-a-feats := ENABLE_FEAT_PAN ENABLE_FEAT_VHE 24 25FEAT_LIST := ${armv8-1-a-feats} 26endif 27 28# Enable the features which are mandatory from ARCH version 8.2 and upwards. 29ifeq "8.2" "$(word 1, $(sort 8.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 30armv8-2-a-feats := ENABLE_FEAT_RAS 31# 8.1 Compliant 32armv8-2-a-feats += ${armv8-1-a-feats} 33 34FEAT_LIST := ${armv8-2-a-feats} 35endif 36 37# Enable the features which are mandatory from ARCH version 8.3 and upwards. 38ifeq "8.3" "$(word 1, $(sort 8.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 39# 8.2 Compliant 40armv8-3-a-feats += ${armv8-2-a-feats} 41 42FEAT_LIST := ${armv8-3-a-feats} 43endif 44 45# Enable the features which are mandatory from ARCH version 8.4 and upwards. 46ifeq "8.4" "$(word 1, $(sort 8.4 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 47armv8-4-a-feats := ENABLE_FEAT_SEL2 ENABLE_TRF_FOR_NS ENABLE_FEAT_DIT 48# 8.3 Compliant 49armv8-4-a-feats += ${armv8-3-a-feats} 50 51FEAT_LIST := ${armv8-4-a-feats} 52endif 53 54# Enable the features which are mandatory from ARCH version 8.5 and upwards. 55ifeq "8.5" "$(word 1, $(sort 8.5 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 56armv8-5-a-feats := ENABLE_FEAT_RNG ENABLE_FEAT_SB 57# 8.4 Compliant 58armv8-5-a-feats += ${armv8-4-a-feats} 59 60FEAT_LIST := ${armv8-5-a-feats} 61endif 62 63# Enable the features which are mandatory from ARCH version 8.6 and upwards. 64ifeq "8.6" "$(word 1, $(sort 8.6 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 65armv8-6-a-feats := ENABLE_FEAT_ECV ENABLE_FEAT_FGT 66# 8.5 Compliant 67armv8-6-a-feats += ${armv8-5-a-feats} 68FEAT_LIST := ${armv8-6-a-feats} 69endif 70 71# Enable the features which are mandatory from ARCH version 8.7 and upwards. 72ifeq "8.7" "$(word 1, $(sort 8.7 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 73armv8-7-a-feats := ENABLE_FEAT_HCX 74# 8.6 Compliant 75armv8-7-a-feats += ${armv8-6-a-feats} 76FEAT_LIST := ${armv8-7-a-feats} 77endif 78 79# Enable the features which are mandatory from ARCH version 8.8 and upwards. 80ifeq "8.8" "$(word 1, $(sort 8.8 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 81armv8-8-a-feats := ENABLE_FEAT_MOPS 82# 8.7 Compliant 83armv8-8-a-feats += ${armv8-7-a-feats} 84FEAT_LIST := ${armv8-8-a-feats} 85endif 86 87# Enable the features which are mandatory from ARCH version 8.9 and upwards. 88ifeq "8.9" "$(word 1, $(sort 8.9 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 89armv8-9-a-feats := ENABLE_FEAT_TCR2 ENABLE_FEAT_DEBUGV8P9 \ 90 ENABLE_FEAT_SCTLR2 ENABLE_FEAT_CLRBHB 91# 8.8 Compliant 92armv8-9-a-feats += ${armv8-8-a-feats} 93FEAT_LIST := ${armv8-9-a-feats} 94endif 95 96# Enable the features which are mandatory from ARCH version 9.0 and upwards. 97ifeq "9.0" "$(word 1, $(sort 9.0 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 98# 8.5 Compliant 99armv9-0-a-feats += ${armv8-5-a-feats} 100FEAT_LIST := ${armv9-0-a-feats} 101endif 102 103# Enable the features which are mandatory from ARCH version 9.1 and upwards. 104ifeq "9.1" "$(word 1, $(sort 9.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 105# 8.6 and 9.0 Compliant 106armv9-1-a-feats += ${armv8-6-a-feats} ${armv9-0-a-feats} 107FEAT_LIST := ${armv9-1-a-feats} 108endif 109 110# Enable the features which are mandatory from ARCH version 9.2 and upwards. 111ifeq "9.2" "$(word 1, $(sort 9.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 112# 8.7 and 9.1 Compliant 113armv9-2-a-feats += ${armv8-7-a-feats} ${armv9-1-a-feats} 114FEAT_LIST := ${armv9-2-a-feats} 115endif 116 117# Enable the features which are mandatory from ARCH version 9.3 and upwards. 118ifeq "9.3" "$(word 1, $(sort 9.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))" 119# 8.8 and 9.2 Compliant 120armv9-3-a-feats += ${armv8-8-a-feats} ${armv9-2-a-feats} 121FEAT_LIST := ${armv9-3-a-feats} 122endif 123 124# Set all FEAT_* in FEAT_LIST to '1' if they are not yet defined or set 125# from build commandline options or platform makefile. 126$(eval $(call default_ones, ${sort ${FEAT_LIST}})) 127 128# 129################################################################################ 130# Set mandatory features by default to zero, if they are not already updated. 131################################################################################ 132# 133 134#---- 135# 8.1 136#---- 137 138# Flag to enable access to Privileged Access Never bit of PSTATE. 139ENABLE_FEAT_PAN ?= 0 140 141# Flag to enable Virtualization Host Extensions. 142ENABLE_FEAT_VHE ?= 0 143 144#---- 145# 8.2 146#---- 147 148# Enable RAS Support. 149ENABLE_FEAT_RAS ?= 0 150 151#---- 152# 8.3 153#---- 154 155# Flag to enable Pointer Authentication. Internal flag not meant for 156# direct setting. Use BRANCH_PROTECTION to enable PAUTH. 157ENABLE_PAUTH ?= 0 158 159# FEAT_PAUTH_LR is an optional architectural feature, so this flag must be set 160# manually in addition to the BRANCH_PROTECTION flag which is used for other 161# branch protection and pointer authentication features. 162ENABLE_FEAT_PAUTH_LR ?= 0 163 164# Include pointer authentication (ARMv8.3-PAuth) registers in cpu context. This 165# must be set to 1 if the platform wants to use this feature in the Secure 166# world. It is not necessary for use in the Non-secure world. 167CTX_INCLUDE_PAUTH_REGS ?= 0 168 169 170#---- 171# 8.4 172#---- 173 174# Flag to enable Secure EL-2 feature. 175ENABLE_FEAT_SEL2 ?= 0 176 177# By default, disable trace filter control register access to lower non-secure 178# exception levels, i.e. NS-EL2, or NS-EL1 if NS-EL2 is implemented, but 179# trace filter control register access is unused if FEAT_TRF is implemented. 180ENABLE_TRF_FOR_NS ?= 0 181 182# Flag to enable Data Independent Timing instructions. 183ENABLE_FEAT_DIT ?= 0 184 185#---- 186# 8.5 187#---- 188 189# Flag to enable Branch Target Identification. 190# Internal flag not meant for direct setting. 191# Use BRANCH_PROTECTION to enable BTI. 192ENABLE_BTI ?= 0 193 194# Flag to enable access to the Random Number Generator registers. 195ENABLE_FEAT_RNG ?= 0 196 197# Flag to enable Speculation Barrier Instruction. 198ENABLE_FEAT_SB ?= 0 199 200#---- 201# 8.6 202#---- 203 204# Flag to enable access to the CNTPOFF_EL2 register. 205ENABLE_FEAT_ECV ?= 0 206 207# Flag to enable access to the HDFGRTR_EL2 register. 208ENABLE_FEAT_FGT ?= 0 209 210#---- 211# 8.7 212#---- 213 214# Flag to enable access to the HCRX_EL2 register by setting SCR_EL3.HXEn. 215ENABLE_FEAT_HCX ?= 0 216 217#---- 218# 8.8 219#---- 220 221# Flag to enable FEAT_MOPS (Standardization of Memory operations) 222# when INIT_UNUSED_NS_EL2 = 1 223ENABLE_FEAT_MOPS ?= 0 224 225#---- 226# 8.9 227#---- 228 229# Flag to enable access to TCR2 (FEAT_TCR2). 230ENABLE_FEAT_TCR2 ?= 0 231 232# Flag to enable access to SCTLR2 (FEAT_SCTLR2). 233ENABLE_FEAT_SCTLR2 ?= 0 234 235# 236################################################################################ 237# Optional Features defaulted to 0 or 2, if they are not enabled from 238# build option. Can also be disabled or enabled by platform if needed. 239################################################################################ 240# 241 242#---- 243# 8.0 244#---- 245 246# Flag to enable support for clrbhb instruction. 247ENABLE_FEAT_CLRBHB ?= 0 248 249# Flag to enable CSV2_2 extension. 250ENABLE_FEAT_CSV2_2 ?= 0 251 252# Flag to enable CSV2_3 extension. FEAT_CSV2_3 enables access to the 253# SCXTNUM_ELx register. 254ENABLE_FEAT_CSV2_3 ?= 0 255 256# By default, disable access of trace system registers from NS lower 257# ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused if 258# system register trace is implemented. This feature is available if 259# trace unit such as ETMv4.x, This feature is OPTIONAL and is only 260# permitted in Armv8 implementations. 261ENABLE_SYS_REG_TRACE_FOR_NS ?= 0 262 263#---- 264# 8.2 265#---- 266 267# Build option to enable/disable the Statistical Profiling Extension, 268# keep it enabled by default for AArch64. 269ifeq (${ARCH},aarch64) 270 ENABLE_SPE_FOR_NS ?= 2 271else ifeq (${ARCH},aarch32) 272 ifneq ($(or $(ENABLE_SPE_FOR_NS),0),0) 273 $(error ENABLE_SPE_FOR_NS is not supported for AArch32) 274 else 275 ENABLE_SPE_FOR_NS := 0 276 endif 277endif 278 279# Enable SVE for non-secure world by default. 280ifeq (${ARCH},aarch64) 281 ENABLE_SVE_FOR_NS ?= 2 282# SVE is only supported on AArch64 so disable it on AArch32. 283else ifeq (${ARCH},aarch32) 284 ifneq ($(or $(ENABLE_SVE_FOR_NS),0),0) 285 $(error ENABLE_SVE_FOR_NS is not supported for AArch32) 286 else 287 ENABLE_SVE_FOR_NS := 0 288 endif 289endif 290 291#---- 292# 8.4 293#---- 294 295# Feature flags for supporting Activity monitor extensions. 296ENABLE_FEAT_AMU ?= 0 297ENABLE_AMU_AUXILIARY_COUNTERS ?= 0 298AMU_RESTRICT_COUNTERS ?= 1 299 300# Build option to enable MPAM for lower ELs. 301# Enabling it by default 302ifeq (${ARCH},aarch64) 303 ENABLE_FEAT_MPAM ?= 2 304else ifeq (${ARCH},aarch32) 305 ifneq ($(or $(ENABLE_FEAT_MPAM),0),0) 306 $(error ENABLE_FEAT_MPAM is not supported for AArch32) 307 else 308 ENABLE_FEAT_MPAM := 0 309 endif 310endif 311 312# Include nested virtualization control (Armv8.4-NV) registers in cpu context. 313# This must be set to 1 if architecture implements Nested Virtualization 314# Extension and platform wants to use this feature in the Secure world. 315CTX_INCLUDE_NEVE_REGS ?= 0 316 317#---- 318# 8.5 319#---- 320 321# Flag to enable support for EL3 trapping of reads of the RNDR and RNDRRS 322# registers, by setting SCR_EL3.TRNDR. 323ENABLE_FEAT_RNG_TRAP ?= 0 324 325# Enable FEAT_MTE2. This must be set to 1 if the platform wants 326# to use this feature and is enabled at ELX. 327ENABLE_FEAT_MTE2 ?= 0 328 329#---- 330# 8.6 331#---- 332 333# Flag to enable AMUv1p1 extension. 334ENABLE_FEAT_AMUv1p1 ?= 0 335 336# Flag to enable delayed trapping of WFE instruction (FEAT_TWED). 337ENABLE_FEAT_TWED ?= 0 338 339# In v8.6+ platforms with delayed trapping of WFE being supported 340# via FEAT_TWED, this flag takes the delay value to be set in the 341# SCR_EL3.TWEDEL(4bit) field, when FEAT_TWED is implemented. 342# By default it takes 0, and need to be updated by the platforms. 343TWED_DELAY ?= 0 344 345# Disable MTPMU if FEAT_MTPMU is supported. 346DISABLE_MTPMU ?= 0 347 348# Flag to enable FEAT_FGT2 (Fine Granular Traps 2) 349ENABLE_FEAT_FGT2 ?= 0 350 351# LoadStore64Bytes extension using the ACCDATA_EL1 system register 352ENABLE_FEAT_LS64_ACCDATA ?= 0 353 354#---- 355# 8.8 356#---- 357 358# Flag to enable FEAT_THE (Translation Hardening Extension) 359ENABLE_FEAT_THE ?= 0 360 361#---- 362# 8.9 363#---- 364 365# Flag to enable access to Stage 2 Permission Indirection (FEAT_S2PIE). 366ENABLE_FEAT_S2PIE ?= 0 367 368# Flag to enable access to Stage 1 Permission Indirection (FEAT_S1PIE). 369ENABLE_FEAT_S1PIE ?= 0 370 371# Flag to enable access to Stage 2 Permission Overlay (FEAT_S2POE). 372ENABLE_FEAT_S2POE ?= 0 373 374# Flag to enable access to Stage 1 Permission Overlay (FEAT_S1POE). 375ENABLE_FEAT_S1POE ?= 0 376 377# Flag to enable access to Arm v8.9 Debug extension 378ENABLE_FEAT_DEBUGV8P9 ?= 0 379 380# AIE extension using the (A)MAIR2 system registers 381ENABLE_FEAT_AIE ?= 0 382 383# PFAR extension using the PFAR system registers 384ENABLE_FEAT_PFAR ?= 0 385 386#---- 387# 9.0 388#---- 389 390# Scalable Matrix Extension for non-secure world. 391ENABLE_SME_FOR_NS ?= 0 392 393# Scalable Vector Extension for secure world. 394ENABLE_SVE_FOR_SWD ?= 0 395 396# By default, disable access of trace buffer control registers from NS 397# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused 398# if FEAT_TRBE is implemented. 399# Note FEAT_TRBE is only supported on AArch64 - therefore do not enable in 400# AArch32. 401ifeq (${ARCH},aarch64) 402 ENABLE_TRBE_FOR_NS ?= 0 403else ifeq (${ARCH},aarch32) 404 ifneq ($(or $(ENABLE_TRBE_FOR_NS),0),0) 405 $(error ENABLE_TRBE_FOR_NS is not supported for AArch32) 406 else 407 ENABLE_TRBE_FOR_NS := 0 408 endif 409endif 410 411#---- 412# 9.2 413#---- 414 415# Flag to enable Realm Management Extension (FEAT_RME). 416ENABLE_RME ?= 0 417 418# Scalable Matrix Extension version 2 for non-secure world. 419ENABLE_SME2_FOR_NS ?= 0 420 421# Scalable Matrix Extension for secure world. 422ENABLE_SME_FOR_SWD ?= 0 423 424# By default, disable access to branch record buffer control registers from NS 425# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused 426# if FEAT_BRBE is implemented. 427ENABLE_BRBE_FOR_NS ?= 0 428 429# Flag to enable Floating point exception Mode Register Feature (FEAT_FPMR) 430ENABLE_FEAT_FPMR ?= 0 431 432# Flag to enable Memory Encryption Contexts (FEAT_MEC). 433ENABLE_FEAT_MEC ?= 0 434 435#---- 436# 9.3 437#---- 438# Flag to enable access to Arm v9.3 FEAT_D128 extension 439ENABLE_FEAT_D128 ?= 0 440 441# Flag to enable access to GICv5 CPU interface extension (FEAT_GCIE) 442ENABLE_FEAT_GCIE ?= 0 443 444# Enables access to PE-side MPAM bandwidth controls (FEAT_MPAM_PE_BW_CTRL) 445ENABLE_FEAT_MPAM_PE_BW_CTRL ?= 0 446 447#---- 448#9.4 449#---- 450 451# Flag to enable access to Guarded Control Stack (FEAT_GCS). 452ENABLE_FEAT_GCS ?= 0 453 454# Flag to enable Fine Grained Write Traps (FEAT_FGWTE3) for EL3. 455ENABLE_FEAT_FGWTE3 ?= 0 456 457# Flag to enable checked pointer arithmetic (FEAT_CPA2) for EL3. 458# We don't have a flag for FEAT_CPA since that has no effect on software 459ENABLE_FEAT_CPA2 ?= 0 460