xref: /rk3399_ARM-atf/make_helpers/arch_features.mk (revision fcb7b26021c842c843db5d2df5aeb553785c0084)
1#
2# Copyright (c) 2022-2025, Arm Limited. All rights reserved.
3#
4# SPDX-License-Identifier: BSD-3-Clause
5#
6
7# This file lists all of the architectural features, and initializes
8# and enables them based on the configured architecture version.
9
10# This file follows the following format:
11#   - Enable mandatory feature if not updated, as applicable to an Arch Version.
12#   - By default disable any mandatory features if they have not been defined yet.
13#   - Disable or enable any optional feature this would be enabled/disabled if needed by platform.
14
15#
16################################################################################
17# Enable Mandatory features if not updated yet, based on Arch versions.
18################################################################################
19#
20
21# Enable the features which are mandatory from ARCH version 8.1 and upwards.
22ifeq "8.1" "$(word 1, $(sort 8.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
23armv8-1-a-feats         := ENABLE_FEAT_PAN ENABLE_FEAT_VHE
24
25FEAT_LIST               := ${armv8-1-a-feats}
26endif
27
28# Enable the features which are mandatory from ARCH version 8.2 and upwards.
29ifeq "8.2" "$(word 1, $(sort 8.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
30armv8-2-a-feats         := ENABLE_FEAT_RAS
31# 8.1 Compliant
32armv8-2-a-feats         += ${armv8-1-a-feats}
33
34FEAT_LIST               := ${armv8-2-a-feats}
35endif
36
37# Enable the features which are mandatory from ARCH version 8.3 and upwards.
38ifeq "8.3" "$(word 1, $(sort 8.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
39# 8.2 Compliant
40armv8-3-a-feats         += ${armv8-2-a-feats}
41
42FEAT_LIST               := ${armv8-3-a-feats}
43endif
44
45# Enable the features which are mandatory from ARCH version 8.4 and upwards.
46ifeq "8.4" "$(word 1, $(sort 8.4 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
47armv8-4-a-feats         := ENABLE_FEAT_SEL2 ENABLE_TRF_FOR_NS ENABLE_FEAT_DIT
48# 8.3 Compliant
49armv8-4-a-feats         += ${armv8-3-a-feats}
50
51FEAT_LIST               := ${armv8-4-a-feats}
52endif
53
54# Enable the features which are mandatory from ARCH version 8.5 and upwards.
55ifeq "8.5" "$(word 1, $(sort 8.5 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
56armv8-5-a-feats         := ENABLE_FEAT_RNG ENABLE_FEAT_SB
57# 8.4 Compliant
58armv8-5-a-feats         += ${armv8-4-a-feats}
59
60FEAT_LIST               := ${armv8-5-a-feats}
61endif
62
63# Enable the features which are mandatory from ARCH version 8.6 and upwards.
64ifeq "8.6" "$(word 1, $(sort 8.6 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
65armv8-6-a-feats         := ENABLE_FEAT_ECV ENABLE_FEAT_FGT
66# 8.5 Compliant
67armv8-6-a-feats         += ${armv8-5-a-feats}
68FEAT_LIST               := ${armv8-6-a-feats}
69endif
70
71# Enable the features which are mandatory from ARCH version 8.7 and upwards.
72ifeq "8.7" "$(word 1, $(sort 8.7 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
73armv8-7-a-feats         := ENABLE_FEAT_HCX
74# 8.6 Compliant
75armv8-7-a-feats         += ${armv8-6-a-feats}
76FEAT_LIST               := ${armv8-7-a-feats}
77endif
78
79# Enable the features which are mandatory from ARCH version 8.8 and upwards.
80ifeq "8.8" "$(word 1, $(sort 8.8 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
81armv8-8-a-feats		:= ENABLE_FEAT_MOPS
82# 8.7 Compliant
83armv8-8-a-feats         += ${armv8-7-a-feats}
84FEAT_LIST               := ${armv8-8-a-feats}
85endif
86
87# Enable the features which are mandatory from ARCH version 8.9 and upwards.
88ifeq "8.9" "$(word 1, $(sort 8.9 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
89armv8-9-a-feats         := ENABLE_FEAT_TCR2 ENABLE_FEAT_DEBUGV8P9	\
90			   ENABLE_FEAT_SCTLR2 ENABLE_FEAT_CLRBHB
91# 8.8 Compliant
92armv8-9-a-feats         += ${armv8-8-a-feats}
93FEAT_LIST               := ${armv8-9-a-feats}
94endif
95
96# Enable the features which are mandatory from ARCH version 9.0 and upwards.
97ifeq "9.0" "$(word 1, $(sort 9.0 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
98# 8.5 Compliant
99armv9-0-a-feats         += ${armv8-5-a-feats}
100FEAT_LIST               := ${armv9-0-a-feats}
101endif
102
103# Enable the features which are mandatory from ARCH version 9.1 and upwards.
104ifeq "9.1" "$(word 1, $(sort 9.1 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
105# 8.6 and 9.0 Compliant
106armv9-1-a-feats         += ${armv8-6-a-feats} ${armv9-0-a-feats}
107FEAT_LIST               := ${armv9-1-a-feats}
108endif
109
110# Enable the features which are mandatory from ARCH version 9.2 and upwards.
111ifeq "9.2" "$(word 1, $(sort 9.2 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
112# 8.7 and 9.1 Compliant
113armv9-2-a-feats         += ${armv8-7-a-feats} ${armv9-1-a-feats}
114FEAT_LIST               := ${armv9-2-a-feats}
115endif
116
117# Enable the features which are mandatory from ARCH version 9.3 and upwards.
118ifeq "9.3" "$(word 1, $(sort 9.3 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
119# 8.8 and 9.2 Compliant
120armv9-3-a-feats         += ${armv8-8-a-feats} ${armv9-2-a-feats}
121FEAT_LIST               := ${armv9-3-a-feats}
122endif
123
124# Set all FEAT_* in FEAT_LIST to '1' if they are not yet defined or set
125# from build commandline options or platform makefile.
126$(eval $(call default_ones, ${sort ${FEAT_LIST}}))
127
128#
129################################################################################
130# Set mandatory features by default to zero, if they are not already updated.
131################################################################################
132#
133
134#----
135# 8.1
136#----
137
138# Flag to enable access to Privileged Access Never bit of PSTATE.
139ENABLE_FEAT_PAN			?=	0
140
141# Flag to enable Virtualization Host Extensions.
142ENABLE_FEAT_VHE			?=	0
143
144#----
145# 8.2
146#----
147
148# Enable RAS Support.
149ENABLE_FEAT_RAS			?=	0
150
151#----
152# 8.3
153#----
154
155# Flag to enable Pointer Authentication. Internal flag not meant for
156# direct setting. Use BRANCH_PROTECTION to enable PAUTH.
157ENABLE_PAUTH			?=	0
158
159# FEAT_PAUTH_LR is an optional architectural feature, so this flag must be set
160# manually in addition to the BRANCH_PROTECTION flag which is used for other
161# branch protection and pointer authentication features.
162ENABLE_FEAT_PAUTH_LR		?=	0
163
164# Include pointer authentication (ARMv8.3-PAuth) registers in cpu context. This
165# must be set to 1 if the platform wants to use this feature in the Secure
166# world. It is not necessary for use in the Non-secure world.
167CTX_INCLUDE_PAUTH_REGS		?=	0
168
169
170#----
171# 8.4
172#----
173
174# Flag to enable Secure EL-2 feature.
175ENABLE_FEAT_SEL2		?=	0
176
177# By default, disable trace filter control register access to lower non-secure
178# exception levels, i.e. NS-EL2, or NS-EL1 if NS-EL2 is implemented, but
179# trace filter control register access is unused if FEAT_TRF is implemented.
180ENABLE_TRF_FOR_NS		?=	0
181
182# Flag to enable Data Independent Timing instructions.
183ENABLE_FEAT_DIT			?=	0
184
185#----
186# 8.5
187#----
188
189# Flag to enable Branch Target Identification.
190# Internal flag not meant for direct setting.
191# Use BRANCH_PROTECTION to enable BTI.
192ENABLE_BTI			?=	0
193
194# Flag to enable access to the Random Number Generator registers.
195ENABLE_FEAT_RNG			?=	0
196
197# Flag to enable Speculation Barrier Instruction.
198ENABLE_FEAT_SB			?=	0
199
200#----
201# 8.6
202#----
203
204# Flag to enable access to the CNTPOFF_EL2 register.
205ENABLE_FEAT_ECV			?=	0
206
207# Flag to enable access to the HDFGRTR_EL2 register.
208ENABLE_FEAT_FGT			?=	0
209
210#----
211# 8.7
212#----
213
214# Flag to enable access to the HCRX_EL2 register by setting SCR_EL3.HXEn.
215ENABLE_FEAT_HCX			?=	0
216
217#----
218# 8.8
219#----
220
221# Flag to enable FEAT_MOPS (Standardization of Memory operations)
222# when INIT_UNUSED_NS_EL2 = 1
223ENABLE_FEAT_MOPS		?=	0
224
225#----
226# 8.9
227#----
228
229# Flag to enable access to TCR2 (FEAT_TCR2).
230ENABLE_FEAT_TCR2		?=	0
231
232# Flag to enable access to SCTLR2 (FEAT_SCTLR2).
233ENABLE_FEAT_SCTLR2		?=	0
234
235#
236################################################################################
237# Optional Features defaulted to 0 or 2, if they are not enabled from
238# build option. Can also be disabled or enabled by platform if needed.
239################################################################################
240#
241
242#----
243# 8.0
244#----
245
246# Flag to enable support for clrbhb instruction.
247ENABLE_FEAT_CLRBHB			?=	0
248
249# Flag to enable CSV2_2 extension.
250ENABLE_FEAT_CSV2_2			?=	0
251
252# Flag to enable CSV2_3 extension. FEAT_CSV2_3 enables access to the
253# SCXTNUM_ELx register.
254ENABLE_FEAT_CSV2_3			?=	0
255
256# By default, disable access of trace system registers from NS lower
257# ELs  i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused if
258# system register trace is implemented. This feature is available if
259# trace unit such as ETMv4.x, This feature is OPTIONAL and is only
260# permitted in Armv8 implementations.
261ENABLE_SYS_REG_TRACE_FOR_NS		?=	0
262
263#----
264# 8.2
265#----
266
267# Build option to enable/disable the Statistical Profiling Extension,
268# keep it enabled by default for AArch64.
269ifeq (${ARCH},aarch64)
270       ENABLE_SPE_FOR_NS		?=	2
271else ifeq (${ARCH},aarch32)
272       ifneq ($(or $(ENABLE_SPE_FOR_NS),0),0)
273              $(error ENABLE_SPE_FOR_NS is not supported for AArch32)
274       else
275              ENABLE_SPE_FOR_NS		:=	0
276       endif
277endif
278
279# Enable SVE for non-secure world by default.
280ifeq (${ARCH},aarch64)
281       ENABLE_SVE_FOR_NS		?=	2
282# SVE is only supported on AArch64 so disable it on AArch32.
283else ifeq (${ARCH},aarch32)
284       ifneq ($(or $(ENABLE_SVE_FOR_NS),0),0)
285              $(error ENABLE_SVE_FOR_NS is not supported for AArch32)
286       else
287              ENABLE_SVE_FOR_NS 	:=	0
288       endif
289endif
290
291#----
292# 8.4
293#----
294
295# Feature flags for supporting Activity monitor extensions.
296ENABLE_FEAT_AMU				?=	0
297ENABLE_AMU_AUXILIARY_COUNTERS		?=	0
298AMU_RESTRICT_COUNTERS			?=	1
299
300# Build option to enable MPAM for lower ELs.
301# Enabling it by default
302ifeq (${ARCH},aarch64)
303        ENABLE_FEAT_MPAM		?=	2
304else ifeq (${ARCH},aarch32)
305        ifneq ($(or $(ENABLE_FEAT_MPAM),0),0)
306                $(error ENABLE_FEAT_MPAM is not supported for AArch32)
307        else
308                ENABLE_FEAT_MPAM	:=	0
309        endif
310endif
311
312# Include nested virtualization control (Armv8.4-NV) registers in cpu context.
313# This must be set to 1 if architecture implements Nested Virtualization
314# Extension and platform wants to use this feature in the Secure world.
315CTX_INCLUDE_NEVE_REGS			?=	0
316
317#----
318# 8.5
319#----
320
321# Flag to enable support for EL3 trapping of reads of the RNDR and RNDRRS
322# registers, by setting SCR_EL3.TRNDR.
323ENABLE_FEAT_RNG_TRAP			?=	0
324
325# Enable FEAT_MTE2. This must be set to 1 if the platform wants
326# to use this feature and is enabled at ELX.
327ENABLE_FEAT_MTE2		        ?=	0
328
329#----
330# 8.6
331#----
332
333# Flag to enable AMUv1p1 extension.
334ENABLE_FEAT_AMUv1p1			?=	0
335
336# Flag to enable delayed trapping of WFE instruction (FEAT_TWED).
337ENABLE_FEAT_TWED			?=	0
338
339# In v8.6+ platforms with delayed trapping of WFE being supported
340# via FEAT_TWED, this flag takes the delay value to be set in the
341# SCR_EL3.TWEDEL(4bit) field, when FEAT_TWED is implemented.
342# By default it takes 0, and need to be updated by the platforms.
343TWED_DELAY				?=	0
344
345# Disable MTPMU if FEAT_MTPMU is supported.
346DISABLE_MTPMU				?=	0
347
348# Flag to enable FEAT_FGT2 (Fine Granular Traps 2)
349ENABLE_FEAT_FGT2			?=	0
350
351# LoadStore64Bytes extension using the ACCDATA_EL1 system register
352ENABLE_FEAT_LS64_ACCDATA		?=	0
353
354#----
355# 8.8
356#----
357
358# Flag to enable FEAT_THE (Translation Hardening Extension)
359ENABLE_FEAT_THE				?=	0
360
361#----
362# 8.9
363#----
364
365# Flag to enable access to Stage 2 Permission Indirection (FEAT_S2PIE).
366ENABLE_FEAT_S2PIE			?=	0
367
368# Flag to enable access to Stage 1 Permission Indirection (FEAT_S1PIE).
369ENABLE_FEAT_S1PIE			?=	0
370
371# Flag to enable access to Stage 2 Permission Overlay (FEAT_S2POE).
372ENABLE_FEAT_S2POE			?=	0
373
374# Flag to enable access to Stage 1 Permission Overlay (FEAT_S1POE).
375ENABLE_FEAT_S1POE			?=	0
376
377# Flag to enable access to Arm v8.9 Debug extension
378ENABLE_FEAT_DEBUGV8P9			?=	0
379
380# AIE extension using the (A)MAIR2 system registers
381ENABLE_FEAT_AIE				?=	0
382
383# PFAR extension using the PFAR system registers
384ENABLE_FEAT_PFAR			?=	0
385
386#----
387# 9.0
388#----
389
390# Scalable Matrix Extension for non-secure world.
391ENABLE_SME_FOR_NS			?=	0
392
393# Scalable Vector Extension for secure world.
394ENABLE_SVE_FOR_SWD			?=	0
395
396# By default, disable access of trace buffer control registers from NS
397# lower ELs  i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
398# if FEAT_TRBE is implemented.
399# Note FEAT_TRBE is only supported on AArch64 - therefore do not enable in
400# AArch32.
401ifeq (${ARCH},aarch64)
402        ENABLE_TRBE_FOR_NS		?=	0
403else ifeq (${ARCH},aarch32)
404        ifneq ($(or $(ENABLE_TRBE_FOR_NS),0),0)
405               $(error ENABLE_TRBE_FOR_NS is not supported for AArch32)
406        else
407               ENABLE_TRBE_FOR_NS 	:=	0
408        endif
409endif
410
411#----
412# 9.2
413#----
414
415# Flag to enable Realm Management Extension (FEAT_RME).
416ENABLE_RME				?=	0
417
418# Scalable Matrix Extension version 2 for non-secure world.
419ENABLE_SME2_FOR_NS			?=	0
420
421# Scalable Matrix Extension for secure world.
422ENABLE_SME_FOR_SWD			?=	0
423
424# By default, disable access to branch record buffer control registers from NS
425# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
426# if FEAT_BRBE is implemented.
427ENABLE_BRBE_FOR_NS			?=	0
428
429# Flag to enable Floating point exception Mode Register Feature (FEAT_FPMR)
430ENABLE_FEAT_FPMR			?=	0
431
432# Flag to enable Memory Encryption Contexts (FEAT_MEC).
433ENABLE_FEAT_MEC				?=	0
434
435#----
436# 9.3
437#----
438# Flag to enable access to Arm v9.3 FEAT_D128 extension
439ENABLE_FEAT_D128			?=	0
440
441# Flag to enable access to GICv5 CPU interface extension (FEAT_GCIE)
442ENABLE_FEAT_GCIE			?=	0
443
444# Enables access to PE-side MPAM bandwidth controls (FEAT_MPAM_PE_BW_CTRL)
445ENABLE_FEAT_MPAM_PE_BW_CTRL		?=	0
446
447# Flag to enable Exception-based Event Profiling (FEAT_EBEP)
448ENABLE_FEAT_EBEP			?=	0
449
450#----
451#9.4
452#----
453
454# Flag to enable FEAT_RME_GDI
455ENABLE_FEAT_RME_GDI			?=	0
456
457# Flag to enable access to Guarded Control Stack (FEAT_GCS).
458ENABLE_FEAT_GCS				?=	0
459
460# Flag to enable Fine Grained Write Traps (FEAT_FGWTE3) for EL3.
461ENABLE_FEAT_FGWTE3			?=	0
462
463# Flag to enable checked pointer arithmetic (FEAT_CPA2) for EL3.
464# We don't have a flag for FEAT_CPA since that has no effect on software
465ENABLE_FEAT_CPA2			?=	0
466
467#----
468#9.6
469#----
470
471# Flag to enable trapping of ID registers to EL3
472ENABLE_FEAT_IDTE3                       ?=      0
473