xref: /linux/arch/arm64/kernel/cpufeature.c (revision 6984eb47d5c1a74bb44467ee4eee22d680f10785)
1359b7064SMarc Zyngier /*
2359b7064SMarc Zyngier  * Contains CPU feature definitions
3359b7064SMarc Zyngier  *
4359b7064SMarc Zyngier  * Copyright (C) 2015 ARM Ltd.
5359b7064SMarc Zyngier  *
6359b7064SMarc Zyngier  * This program is free software; you can redistribute it and/or modify
7359b7064SMarc Zyngier  * it under the terms of the GNU General Public License version 2 as
8359b7064SMarc Zyngier  * published by the Free Software Foundation.
9359b7064SMarc Zyngier  *
10359b7064SMarc Zyngier  * This program is distributed in the hope that it will be useful,
11359b7064SMarc Zyngier  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12359b7064SMarc Zyngier  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13359b7064SMarc Zyngier  * GNU General Public License for more details.
14359b7064SMarc Zyngier  *
15359b7064SMarc Zyngier  * You should have received a copy of the GNU General Public License
16359b7064SMarc Zyngier  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
17359b7064SMarc Zyngier  */
18359b7064SMarc Zyngier 
199cdf8ec4SSuzuki K. Poulose #define pr_fmt(fmt) "CPU features: " fmt
20359b7064SMarc Zyngier 
213c739b57SSuzuki K. Poulose #include <linux/bsearch.h>
222a6dcb2bSJames Morse #include <linux/cpumask.h>
235ffdfaedSVladimir Murzin #include <linux/crash_dump.h>
243c739b57SSuzuki K. Poulose #include <linux/sort.h>
252a6dcb2bSJames Morse #include <linux/stop_machine.h>
26359b7064SMarc Zyngier #include <linux/types.h>
272077be67SLaura Abbott #include <linux/mm.h>
28359b7064SMarc Zyngier #include <asm/cpu.h>
29359b7064SMarc Zyngier #include <asm/cpufeature.h>
30dbb4e152SSuzuki K. Poulose #include <asm/cpu_ops.h>
312e0f2478SDave Martin #include <asm/fpsimd.h>
3213f417f3SSuzuki K Poulose #include <asm/mmu_context.h>
33338d4f49SJames Morse #include <asm/processor.h>
34cdcf817bSSuzuki K. Poulose #include <asm/sysreg.h>
3577c97b4eSSuzuki K Poulose #include <asm/traps.h>
36d88701beSMarc Zyngier #include <asm/virt.h>
37359b7064SMarc Zyngier 
389cdf8ec4SSuzuki K. Poulose unsigned long elf_hwcap __read_mostly;
399cdf8ec4SSuzuki K. Poulose EXPORT_SYMBOL_GPL(elf_hwcap);
409cdf8ec4SSuzuki K. Poulose 
419cdf8ec4SSuzuki K. Poulose #ifdef CONFIG_COMPAT
429cdf8ec4SSuzuki K. Poulose #define COMPAT_ELF_HWCAP_DEFAULT	\
439cdf8ec4SSuzuki K. Poulose 				(COMPAT_HWCAP_HALF|COMPAT_HWCAP_THUMB|\
449cdf8ec4SSuzuki K. Poulose 				 COMPAT_HWCAP_FAST_MULT|COMPAT_HWCAP_EDSP|\
459cdf8ec4SSuzuki K. Poulose 				 COMPAT_HWCAP_TLS|COMPAT_HWCAP_VFP|\
469cdf8ec4SSuzuki K. Poulose 				 COMPAT_HWCAP_VFPv3|COMPAT_HWCAP_VFPv4|\
479cdf8ec4SSuzuki K. Poulose 				 COMPAT_HWCAP_NEON|COMPAT_HWCAP_IDIV|\
489cdf8ec4SSuzuki K. Poulose 				 COMPAT_HWCAP_LPAE)
499cdf8ec4SSuzuki K. Poulose unsigned int compat_elf_hwcap __read_mostly = COMPAT_ELF_HWCAP_DEFAULT;
509cdf8ec4SSuzuki K. Poulose unsigned int compat_elf_hwcap2 __read_mostly;
519cdf8ec4SSuzuki K. Poulose #endif
529cdf8ec4SSuzuki K. Poulose 
539cdf8ec4SSuzuki K. Poulose DECLARE_BITMAP(cpu_hwcaps, ARM64_NCAPS);
544b65a5dbSCatalin Marinas EXPORT_SYMBOL(cpu_hwcaps);
5582a3a21bSSuzuki K Poulose static struct arm64_cpu_capabilities const __ro_after_init *cpu_hwcaps_ptrs[ARM64_NCAPS];
569cdf8ec4SSuzuki K. Poulose 
578f1eec57SDave Martin /*
588f1eec57SDave Martin  * Flag to indicate if we have computed the system wide
598f1eec57SDave Martin  * capabilities based on the boot time active CPUs. This
608f1eec57SDave Martin  * will be used to determine if a new booting CPU should
618f1eec57SDave Martin  * go through the verification process to make sure that it
628f1eec57SDave Martin  * supports the system capabilities, without using a hotplug
638f1eec57SDave Martin  * notifier.
648f1eec57SDave Martin  */
658f1eec57SDave Martin static bool sys_caps_initialised;
668f1eec57SDave Martin 
678f1eec57SDave Martin static inline void set_sys_caps_initialised(void)
688f1eec57SDave Martin {
698f1eec57SDave Martin 	sys_caps_initialised = true;
708f1eec57SDave Martin }
718f1eec57SDave Martin 
728effeaafSMark Rutland static int dump_cpu_hwcaps(struct notifier_block *self, unsigned long v, void *p)
738effeaafSMark Rutland {
748effeaafSMark Rutland 	/* file-wide pr_fmt adds "CPU features: " prefix */
758effeaafSMark Rutland 	pr_emerg("0x%*pb\n", ARM64_NCAPS, &cpu_hwcaps);
768effeaafSMark Rutland 	return 0;
778effeaafSMark Rutland }
788effeaafSMark Rutland 
798effeaafSMark Rutland static struct notifier_block cpu_hwcaps_notifier = {
808effeaafSMark Rutland 	.notifier_call = dump_cpu_hwcaps
818effeaafSMark Rutland };
828effeaafSMark Rutland 
838effeaafSMark Rutland static int __init register_cpu_hwcaps_dumper(void)
848effeaafSMark Rutland {
858effeaafSMark Rutland 	atomic_notifier_chain_register(&panic_notifier_list,
868effeaafSMark Rutland 				       &cpu_hwcaps_notifier);
878effeaafSMark Rutland 	return 0;
888effeaafSMark Rutland }
898effeaafSMark Rutland __initcall(register_cpu_hwcaps_dumper);
908effeaafSMark Rutland 
91efd9e03fSCatalin Marinas DEFINE_STATIC_KEY_ARRAY_FALSE(cpu_hwcap_keys, ARM64_NCAPS);
92efd9e03fSCatalin Marinas EXPORT_SYMBOL(cpu_hwcap_keys);
93efd9e03fSCatalin Marinas 
94fe4fbdbcSSuzuki K Poulose #define __ARM64_FTR_BITS(SIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \
953c739b57SSuzuki K. Poulose 	{						\
964f0a606bSSuzuki K. Poulose 		.sign = SIGNED,				\
97fe4fbdbcSSuzuki K Poulose 		.visible = VISIBLE,			\
983c739b57SSuzuki K. Poulose 		.strict = STRICT,			\
993c739b57SSuzuki K. Poulose 		.type = TYPE,				\
1003c739b57SSuzuki K. Poulose 		.shift = SHIFT,				\
1013c739b57SSuzuki K. Poulose 		.width = WIDTH,				\
1023c739b57SSuzuki K. Poulose 		.safe_val = SAFE_VAL,			\
1033c739b57SSuzuki K. Poulose 	}
1043c739b57SSuzuki K. Poulose 
1050710cfdbSSuzuki K Poulose /* Define a feature with unsigned values */
106fe4fbdbcSSuzuki K Poulose #define ARM64_FTR_BITS(VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \
107fe4fbdbcSSuzuki K Poulose 	__ARM64_FTR_BITS(FTR_UNSIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL)
1084f0a606bSSuzuki K. Poulose 
1090710cfdbSSuzuki K Poulose /* Define a feature with a signed value */
110fe4fbdbcSSuzuki K Poulose #define S_ARM64_FTR_BITS(VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \
111fe4fbdbcSSuzuki K Poulose 	__ARM64_FTR_BITS(FTR_SIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL)
1120710cfdbSSuzuki K Poulose 
1133c739b57SSuzuki K. Poulose #define ARM64_FTR_END					\
1143c739b57SSuzuki K. Poulose 	{						\
1153c739b57SSuzuki K. Poulose 		.width = 0,				\
1163c739b57SSuzuki K. Poulose 	}
1173c739b57SSuzuki K. Poulose 
11870544196SJames Morse /* meta feature for alternatives */
11970544196SJames Morse static bool __maybe_unused
12092406f0cSSuzuki K Poulose cpufeature_pan_not_uao(const struct arm64_cpu_capabilities *entry, int __unused);
12192406f0cSSuzuki K Poulose 
1225ffdfaedSVladimir Murzin static void cpu_enable_cnp(struct arm64_cpu_capabilities const *cap);
12370544196SJames Morse 
1244aa8a472SSuzuki K Poulose /*
1254aa8a472SSuzuki K Poulose  * NOTE: Any changes to the visibility of features should be kept in
1264aa8a472SSuzuki K Poulose  * sync with the documentation of the CPU feature register ABI.
1274aa8a472SSuzuki K Poulose  */
1285e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64isar0[] = {
1297206dc93SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_TS_SHIFT, 4, 0),
1303b3b6810SDongjiu Geng 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_FHM_SHIFT, 4, 0),
1315bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_DP_SHIFT, 4, 0),
1325bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SM4_SHIFT, 4, 0),
1335bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SM3_SHIFT, 4, 0),
1345bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA3_SHIFT, 4, 0),
1355bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_RDM_SHIFT, 4, 0),
136fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_ATOMICS_SHIFT, 4, 0),
137fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_CRC32_SHIFT, 4, 0),
138fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA2_SHIFT, 4, 0),
139fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA1_SHIFT, 4, 0),
140fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_AES_SHIFT, 4, 0),
1413c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
1423c739b57SSuzuki K. Poulose };
1433c739b57SSuzuki K. Poulose 
144c8c3798dSSuzuki K Poulose static const struct arm64_ftr_bits ftr_id_aa64isar1[] = {
145bd4fb6d2SWill Deacon 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_SB_SHIFT, 4, 0),
146*6984eb47SMark Rutland 	ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH),
147*6984eb47SMark Rutland 		       FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_GPI_SHIFT, 4, 0),
148*6984eb47SMark Rutland 	ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH),
149*6984eb47SMark Rutland 		       FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_GPA_SHIFT, 4, 0),
1505bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_LRCPC_SHIFT, 4, 0),
1515bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_FCMA_SHIFT, 4, 0),
1525bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_JSCVT_SHIFT, 4, 0),
153*6984eb47SMark Rutland 	ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH),
154*6984eb47SMark Rutland 		       FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_API_SHIFT, 4, 0),
155*6984eb47SMark Rutland 	ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH),
156*6984eb47SMark Rutland 		       FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_APA_SHIFT, 4, 0),
1575bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_DPB_SHIFT, 4, 0),
158c8c3798dSSuzuki K Poulose 	ARM64_FTR_END,
159c8c3798dSSuzuki K Poulose };
160c8c3798dSSuzuki K Poulose 
1615e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64pfr0[] = {
162179a56f6SWill Deacon 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_CSV3_SHIFT, 4, 0),
1630f15adbbSWill Deacon 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_CSV2_SHIFT, 4, 0),
1647206dc93SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_DIT_SHIFT, 4, 0),
1653fab3999SDave Martin 	ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SVE),
1663fab3999SDave Martin 				   FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_SVE_SHIFT, 4, 0),
16764c02720SXie XiuQi 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_RAS_SHIFT, 4, 0),
1685bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_GIC_SHIFT, 4, 0),
169fe4fbdbcSSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_ASIMD_SHIFT, 4, ID_AA64PFR0_ASIMD_NI),
170fe4fbdbcSSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_FP_SHIFT, 4, ID_AA64PFR0_FP_NI),
1713c739b57SSuzuki K. Poulose 	/* Linux doesn't care about the EL3 */
1725bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL3_SHIFT, 4, 0),
1735bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL2_SHIFT, 4, 0),
1745bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_SHIFT, 4, ID_AA64PFR0_EL1_64BIT_ONLY),
1755bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL0_SHIFT, 4, ID_AA64PFR0_EL0_64BIT_ONLY),
1763c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
1773c739b57SSuzuki K. Poulose };
1783c739b57SSuzuki K. Poulose 
179d71be2b6SWill Deacon static const struct arm64_ftr_bits ftr_id_aa64pfr1[] = {
180d71be2b6SWill Deacon 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR1_SSBS_SHIFT, 4, ID_AA64PFR1_SSBS_PSTATE_NI),
181d71be2b6SWill Deacon 	ARM64_FTR_END,
182d71be2b6SWill Deacon };
183d71be2b6SWill Deacon 
1845e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr0[] = {
1855bdecb79SSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN4_SHIFT, 4, ID_AA64MMFR0_TGRAN4_NI),
1865bdecb79SSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN64_SHIFT, 4, ID_AA64MMFR0_TGRAN64_NI),
1875bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN16_SHIFT, 4, ID_AA64MMFR0_TGRAN16_NI),
1885bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_BIGENDEL0_SHIFT, 4, 0),
1893c739b57SSuzuki K. Poulose 	/* Linux shouldn't care about secure memory */
1905bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_SNSMEM_SHIFT, 4, 0),
1915bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_BIGENDEL_SHIFT, 4, 0),
1925bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_ASID_SHIFT, 4, 0),
1933c739b57SSuzuki K. Poulose 	/*
1943c739b57SSuzuki K. Poulose 	 * Differing PARange is fine as long as all peripherals and memory are mapped
1953c739b57SSuzuki K. Poulose 	 * within the minimum PARange of all CPUs
1963c739b57SSuzuki K. Poulose 	 */
197fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_PARANGE_SHIFT, 4, 0),
1983c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
1993c739b57SSuzuki K. Poulose };
2003c739b57SSuzuki K. Poulose 
2015e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr1[] = {
202fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_PAN_SHIFT, 4, 0),
2035bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_LOR_SHIFT, 4, 0),
2045bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_HPD_SHIFT, 4, 0),
2055bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_VHE_SHIFT, 4, 0),
2065bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_VMIDBITS_SHIFT, 4, 0),
2075bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_HADBS_SHIFT, 4, 0),
2083c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2093c739b57SSuzuki K. Poulose };
2103c739b57SSuzuki K. Poulose 
2115e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr2[] = {
212e48d53a9SMarc Zyngier 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_FWB_SHIFT, 4, 0),
2137206dc93SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_AT_SHIFT, 4, 0),
2145bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_LVA_SHIFT, 4, 0),
2155bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_IESB_SHIFT, 4, 0),
2165bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_LSM_SHIFT, 4, 0),
2175bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_UAO_SHIFT, 4, 0),
2185bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_CNP_SHIFT, 4, 0),
219406e3087SJames Morse 	ARM64_FTR_END,
220406e3087SJames Morse };
221406e3087SJames Morse 
2225e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_ctr[] = {
223be68a8aaSWill Deacon 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_EXACT, 31, 1, 1), /* RES1 */
2246ae4b6e0SShanker Donthineni 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_DIC_SHIFT, 1, 1),
2256ae4b6e0SShanker Donthineni 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_IDC_SHIFT, 1, 1),
2266ae4b6e0SShanker Donthineni 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_HIGHER_SAFE, CTR_CWG_SHIFT, 4, 0),
2276ae4b6e0SShanker Donthineni 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_HIGHER_SAFE, CTR_ERG_SHIFT, 4, 0),
2286ae4b6e0SShanker Donthineni 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_DMINLINE_SHIFT, 4, 1),
2293c739b57SSuzuki K. Poulose 	/*
2303c739b57SSuzuki K. Poulose 	 * Linux can handle differing I-cache policies. Userspace JITs will
231ee7bc638SSuzuki K Poulose 	 * make use of *minLine.
232155433cbSWill Deacon 	 * If we have differing I-cache policies, report it as the weakest - VIPT.
2333c739b57SSuzuki K. Poulose 	 */
234155433cbSWill Deacon 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_NONSTRICT, FTR_EXACT, 14, 2, ICACHE_POLICY_VIPT),	/* L1Ip */
2354c4a39ddSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_IMINLINE_SHIFT, 4, 0),
2363c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2373c739b57SSuzuki K. Poulose };
2383c739b57SSuzuki K. Poulose 
239675b0563SArd Biesheuvel struct arm64_ftr_reg arm64_ftr_reg_ctrel0 = {
240675b0563SArd Biesheuvel 	.name		= "SYS_CTR_EL0",
241675b0563SArd Biesheuvel 	.ftr_bits	= ftr_ctr
242675b0563SArd Biesheuvel };
243675b0563SArd Biesheuvel 
2445e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_mmfr0[] = {
2455bdecb79SSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0xf),	/* InnerShr */
2465bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0),	/* FCSE */
247fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, 20, 4, 0),	/* AuxReg */
2485bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0),	/* TCM */
2495bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0),	/* ShareLvl */
2505bdecb79SSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0xf),	/* OuterShr */
2515bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0),	/* PMSA */
2525bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0),	/* VMSA */
2533c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2543c739b57SSuzuki K. Poulose };
2553c739b57SSuzuki K. Poulose 
2565e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64dfr0[] = {
257fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, 36, 28, 0),
258fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64DFR0_PMSVER_SHIFT, 4, 0),
259fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_CTX_CMPS_SHIFT, 4, 0),
260fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_WRPS_SHIFT, 4, 0),
261fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_BRPS_SHIFT, 4, 0),
262b20d1ba3SWill Deacon 	/*
263b20d1ba3SWill Deacon 	 * We can instantiate multiple PMU instances with different levels
264b20d1ba3SWill Deacon 	 * of support.
265fe4fbdbcSSuzuki K Poulose 	 */
266fe4fbdbcSSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_EXACT, ID_AA64DFR0_PMUVER_SHIFT, 4, 0),
267fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_TRACEVER_SHIFT, 4, 0),
268fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_DEBUGVER_SHIFT, 4, 0x6),
2693c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2703c739b57SSuzuki K. Poulose };
2713c739b57SSuzuki K. Poulose 
2725e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_mvfr2[] = {
2735bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0),		/* FPMisc */
2745bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0),		/* SIMDMisc */
2753c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2763c739b57SSuzuki K. Poulose };
2773c739b57SSuzuki K. Poulose 
2785e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_dczid[] = {
279fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_EXACT, 4, 1, 1),		/* DZP */
280fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0),	/* BS */
2813c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2823c739b57SSuzuki K. Poulose };
2833c739b57SSuzuki K. Poulose 
2843c739b57SSuzuki K. Poulose 
2855e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_isar5[] = {
2865bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_RDM_SHIFT, 4, 0),
2875bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_CRC32_SHIFT, 4, 0),
2885bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SHA2_SHIFT, 4, 0),
2895bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SHA1_SHIFT, 4, 0),
2905bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_AES_SHIFT, 4, 0),
2915bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SEVL_SHIFT, 4, 0),
2923c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2933c739b57SSuzuki K. Poulose };
2943c739b57SSuzuki K. Poulose 
2955e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_mmfr4[] = {
2965bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0),	/* ac2 */
2973c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
2983c739b57SSuzuki K. Poulose };
2993c739b57SSuzuki K. Poulose 
3005e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_pfr0[] = {
3015bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0),		/* State3 */
3025bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0),		/* State2 */
3035bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0),		/* State1 */
3045bdecb79SSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0),		/* State0 */
3053c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
3063c739b57SSuzuki K. Poulose };
3073c739b57SSuzuki K. Poulose 
3085e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_dfr0[] = {
309fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0),
310fe4fbdbcSSuzuki K Poulose 	S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0xf),	/* PerfMon */
311fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 20, 4, 0),
312fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0),
313fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0),
314fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0),
315fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0),
316fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0),
317e5343503SSuzuki K Poulose 	ARM64_FTR_END,
318e5343503SSuzuki K Poulose };
319e5343503SSuzuki K Poulose 
3202e0f2478SDave Martin static const struct arm64_ftr_bits ftr_zcr[] = {
3212e0f2478SDave Martin 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE,
3222e0f2478SDave Martin 		ZCR_ELx_LEN_SHIFT, ZCR_ELx_LEN_SIZE, 0),	/* LEN */
3232e0f2478SDave Martin 	ARM64_FTR_END,
3242e0f2478SDave Martin };
3252e0f2478SDave Martin 
3263c739b57SSuzuki K. Poulose /*
3273c739b57SSuzuki K. Poulose  * Common ftr bits for a 32bit register with all hidden, strict
3283c739b57SSuzuki K. Poulose  * attributes, with 4bit feature fields and a default safe value of
3293c739b57SSuzuki K. Poulose  * 0. Covers the following 32bit registers:
3303c739b57SSuzuki K. Poulose  * id_isar[0-4], id_mmfr[1-3], id_pfr1, mvfr[0-1]
3313c739b57SSuzuki K. Poulose  */
3325e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_generic_32bits[] = {
333fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0),
334fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0),
335fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 20, 4, 0),
336fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0),
337fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0),
338fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0),
339fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0),
340fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0),
3413c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
3423c739b57SSuzuki K. Poulose };
3433c739b57SSuzuki K. Poulose 
344eab43e88SSuzuki K Poulose /* Table for a single 32bit feature value */
345eab43e88SSuzuki K Poulose static const struct arm64_ftr_bits ftr_single32[] = {
346fe4fbdbcSSuzuki K Poulose 	ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, 0, 32, 0),
3473c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
3483c739b57SSuzuki K. Poulose };
3493c739b57SSuzuki K. Poulose 
350eab43e88SSuzuki K Poulose static const struct arm64_ftr_bits ftr_raz[] = {
3513c739b57SSuzuki K. Poulose 	ARM64_FTR_END,
3523c739b57SSuzuki K. Poulose };
3533c739b57SSuzuki K. Poulose 
3546f2b7eefSArd Biesheuvel #define ARM64_FTR_REG(id, table) {		\
3553c739b57SSuzuki K. Poulose 	.sys_id = id,				\
3566f2b7eefSArd Biesheuvel 	.reg = 	&(struct arm64_ftr_reg){	\
3573c739b57SSuzuki K. Poulose 		.name = #id,			\
3583c739b57SSuzuki K. Poulose 		.ftr_bits = &((table)[0]),	\
3596f2b7eefSArd Biesheuvel 	}}
3603c739b57SSuzuki K. Poulose 
3616f2b7eefSArd Biesheuvel static const struct __ftr_reg_entry {
3626f2b7eefSArd Biesheuvel 	u32			sys_id;
3636f2b7eefSArd Biesheuvel 	struct arm64_ftr_reg 	*reg;
3646f2b7eefSArd Biesheuvel } arm64_ftr_regs[] = {
3653c739b57SSuzuki K. Poulose 
3663c739b57SSuzuki K. Poulose 	/* Op1 = 0, CRn = 0, CRm = 1 */
3673c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_PFR0_EL1, ftr_id_pfr0),
3683c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_PFR1_EL1, ftr_generic_32bits),
369e5343503SSuzuki K Poulose 	ARM64_FTR_REG(SYS_ID_DFR0_EL1, ftr_id_dfr0),
3703c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_MMFR0_EL1, ftr_id_mmfr0),
3713c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_MMFR1_EL1, ftr_generic_32bits),
3723c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_MMFR2_EL1, ftr_generic_32bits),
3733c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_MMFR3_EL1, ftr_generic_32bits),
3743c739b57SSuzuki K. Poulose 
3753c739b57SSuzuki K. Poulose 	/* Op1 = 0, CRn = 0, CRm = 2 */
3763c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_ISAR0_EL1, ftr_generic_32bits),
3773c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_ISAR1_EL1, ftr_generic_32bits),
3783c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_ISAR2_EL1, ftr_generic_32bits),
3793c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_ISAR3_EL1, ftr_generic_32bits),
3803c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_ISAR4_EL1, ftr_generic_32bits),
3813c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_ISAR5_EL1, ftr_id_isar5),
3823c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_MMFR4_EL1, ftr_id_mmfr4),
3833c739b57SSuzuki K. Poulose 
3843c739b57SSuzuki K. Poulose 	/* Op1 = 0, CRn = 0, CRm = 3 */
3853c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_MVFR0_EL1, ftr_generic_32bits),
3863c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_MVFR1_EL1, ftr_generic_32bits),
3873c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_MVFR2_EL1, ftr_mvfr2),
3883c739b57SSuzuki K. Poulose 
3893c739b57SSuzuki K. Poulose 	/* Op1 = 0, CRn = 0, CRm = 4 */
3903c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_AA64PFR0_EL1, ftr_id_aa64pfr0),
391d71be2b6SWill Deacon 	ARM64_FTR_REG(SYS_ID_AA64PFR1_EL1, ftr_id_aa64pfr1),
3922e0f2478SDave Martin 	ARM64_FTR_REG(SYS_ID_AA64ZFR0_EL1, ftr_raz),
3933c739b57SSuzuki K. Poulose 
3943c739b57SSuzuki K. Poulose 	/* Op1 = 0, CRn = 0, CRm = 5 */
3953c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_AA64DFR0_EL1, ftr_id_aa64dfr0),
396eab43e88SSuzuki K Poulose 	ARM64_FTR_REG(SYS_ID_AA64DFR1_EL1, ftr_raz),
3973c739b57SSuzuki K. Poulose 
3983c739b57SSuzuki K. Poulose 	/* Op1 = 0, CRn = 0, CRm = 6 */
3993c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_AA64ISAR0_EL1, ftr_id_aa64isar0),
400c8c3798dSSuzuki K Poulose 	ARM64_FTR_REG(SYS_ID_AA64ISAR1_EL1, ftr_id_aa64isar1),
4013c739b57SSuzuki K. Poulose 
4023c739b57SSuzuki K. Poulose 	/* Op1 = 0, CRn = 0, CRm = 7 */
4033c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_AA64MMFR0_EL1, ftr_id_aa64mmfr0),
4043c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_ID_AA64MMFR1_EL1, ftr_id_aa64mmfr1),
405406e3087SJames Morse 	ARM64_FTR_REG(SYS_ID_AA64MMFR2_EL1, ftr_id_aa64mmfr2),
4063c739b57SSuzuki K. Poulose 
4072e0f2478SDave Martin 	/* Op1 = 0, CRn = 1, CRm = 2 */
4082e0f2478SDave Martin 	ARM64_FTR_REG(SYS_ZCR_EL1, ftr_zcr),
4092e0f2478SDave Martin 
4103c739b57SSuzuki K. Poulose 	/* Op1 = 3, CRn = 0, CRm = 0 */
411675b0563SArd Biesheuvel 	{ SYS_CTR_EL0, &arm64_ftr_reg_ctrel0 },
4123c739b57SSuzuki K. Poulose 	ARM64_FTR_REG(SYS_DCZID_EL0, ftr_dczid),
4133c739b57SSuzuki K. Poulose 
4143c739b57SSuzuki K. Poulose 	/* Op1 = 3, CRn = 14, CRm = 0 */
415eab43e88SSuzuki K Poulose 	ARM64_FTR_REG(SYS_CNTFRQ_EL0, ftr_single32),
4163c739b57SSuzuki K. Poulose };
4173c739b57SSuzuki K. Poulose 
4183c739b57SSuzuki K. Poulose static int search_cmp_ftr_reg(const void *id, const void *regp)
4193c739b57SSuzuki K. Poulose {
4206f2b7eefSArd Biesheuvel 	return (int)(unsigned long)id - (int)((const struct __ftr_reg_entry *)regp)->sys_id;
4213c739b57SSuzuki K. Poulose }
4223c739b57SSuzuki K. Poulose 
4233c739b57SSuzuki K. Poulose /*
4243c739b57SSuzuki K. Poulose  * get_arm64_ftr_reg - Lookup a feature register entry using its
4253c739b57SSuzuki K. Poulose  * sys_reg() encoding. With the array arm64_ftr_regs sorted in the
4263c739b57SSuzuki K. Poulose  * ascending order of sys_id , we use binary search to find a matching
4273c739b57SSuzuki K. Poulose  * entry.
4283c739b57SSuzuki K. Poulose  *
4293c739b57SSuzuki K. Poulose  * returns - Upon success,  matching ftr_reg entry for id.
4303c739b57SSuzuki K. Poulose  *         - NULL on failure. It is upto the caller to decide
4313c739b57SSuzuki K. Poulose  *	     the impact of a failure.
4323c739b57SSuzuki K. Poulose  */
4333c739b57SSuzuki K. Poulose static struct arm64_ftr_reg *get_arm64_ftr_reg(u32 sys_id)
4343c739b57SSuzuki K. Poulose {
4356f2b7eefSArd Biesheuvel 	const struct __ftr_reg_entry *ret;
4366f2b7eefSArd Biesheuvel 
4376f2b7eefSArd Biesheuvel 	ret = bsearch((const void *)(unsigned long)sys_id,
4383c739b57SSuzuki K. Poulose 			arm64_ftr_regs,
4393c739b57SSuzuki K. Poulose 			ARRAY_SIZE(arm64_ftr_regs),
4403c739b57SSuzuki K. Poulose 			sizeof(arm64_ftr_regs[0]),
4413c739b57SSuzuki K. Poulose 			search_cmp_ftr_reg);
4426f2b7eefSArd Biesheuvel 	if (ret)
4436f2b7eefSArd Biesheuvel 		return ret->reg;
4446f2b7eefSArd Biesheuvel 	return NULL;
4453c739b57SSuzuki K. Poulose }
4463c739b57SSuzuki K. Poulose 
4475e49d73cSArd Biesheuvel static u64 arm64_ftr_set_value(const struct arm64_ftr_bits *ftrp, s64 reg,
4485e49d73cSArd Biesheuvel 			       s64 ftr_val)
4493c739b57SSuzuki K. Poulose {
4503c739b57SSuzuki K. Poulose 	u64 mask = arm64_ftr_mask(ftrp);
4513c739b57SSuzuki K. Poulose 
4523c739b57SSuzuki K. Poulose 	reg &= ~mask;
4533c739b57SSuzuki K. Poulose 	reg |= (ftr_val << ftrp->shift) & mask;
4543c739b57SSuzuki K. Poulose 	return reg;
4553c739b57SSuzuki K. Poulose }
4563c739b57SSuzuki K. Poulose 
4575e49d73cSArd Biesheuvel static s64 arm64_ftr_safe_value(const struct arm64_ftr_bits *ftrp, s64 new,
4585e49d73cSArd Biesheuvel 				s64 cur)
4593c739b57SSuzuki K. Poulose {
4603c739b57SSuzuki K. Poulose 	s64 ret = 0;
4613c739b57SSuzuki K. Poulose 
4623c739b57SSuzuki K. Poulose 	switch (ftrp->type) {
4633c739b57SSuzuki K. Poulose 	case FTR_EXACT:
4643c739b57SSuzuki K. Poulose 		ret = ftrp->safe_val;
4653c739b57SSuzuki K. Poulose 		break;
4663c739b57SSuzuki K. Poulose 	case FTR_LOWER_SAFE:
4673c739b57SSuzuki K. Poulose 		ret = new < cur ? new : cur;
4683c739b57SSuzuki K. Poulose 		break;
4693c739b57SSuzuki K. Poulose 	case FTR_HIGHER_SAFE:
4703c739b57SSuzuki K. Poulose 		ret = new > cur ? new : cur;
4713c739b57SSuzuki K. Poulose 		break;
4723c739b57SSuzuki K. Poulose 	default:
4733c739b57SSuzuki K. Poulose 		BUG();
4743c739b57SSuzuki K. Poulose 	}
4753c739b57SSuzuki K. Poulose 
4763c739b57SSuzuki K. Poulose 	return ret;
4773c739b57SSuzuki K. Poulose }
4783c739b57SSuzuki K. Poulose 
4793c739b57SSuzuki K. Poulose static void __init sort_ftr_regs(void)
4803c739b57SSuzuki K. Poulose {
4816f2b7eefSArd Biesheuvel 	int i;
4826f2b7eefSArd Biesheuvel 
4836f2b7eefSArd Biesheuvel 	/* Check that the array is sorted so that we can do the binary search */
4846f2b7eefSArd Biesheuvel 	for (i = 1; i < ARRAY_SIZE(arm64_ftr_regs); i++)
4856f2b7eefSArd Biesheuvel 		BUG_ON(arm64_ftr_regs[i].sys_id < arm64_ftr_regs[i - 1].sys_id);
4863c739b57SSuzuki K. Poulose }
4873c739b57SSuzuki K. Poulose 
4883c739b57SSuzuki K. Poulose /*
4893c739b57SSuzuki K. Poulose  * Initialise the CPU feature register from Boot CPU values.
4903c739b57SSuzuki K. Poulose  * Also initiliases the strict_mask for the register.
491b389d799SMark Rutland  * Any bits that are not covered by an arm64_ftr_bits entry are considered
492b389d799SMark Rutland  * RES0 for the system-wide value, and must strictly match.
4933c739b57SSuzuki K. Poulose  */
4943c739b57SSuzuki K. Poulose static void __init init_cpu_ftr_reg(u32 sys_reg, u64 new)
4953c739b57SSuzuki K. Poulose {
4963c739b57SSuzuki K. Poulose 	u64 val = 0;
4973c739b57SSuzuki K. Poulose 	u64 strict_mask = ~0x0ULL;
498fe4fbdbcSSuzuki K Poulose 	u64 user_mask = 0;
499b389d799SMark Rutland 	u64 valid_mask = 0;
500b389d799SMark Rutland 
5015e49d73cSArd Biesheuvel 	const struct arm64_ftr_bits *ftrp;
5023c739b57SSuzuki K. Poulose 	struct arm64_ftr_reg *reg = get_arm64_ftr_reg(sys_reg);
5033c739b57SSuzuki K. Poulose 
5043c739b57SSuzuki K. Poulose 	BUG_ON(!reg);
5053c739b57SSuzuki K. Poulose 
5063c739b57SSuzuki K. Poulose 	for (ftrp  = reg->ftr_bits; ftrp->width; ftrp++) {
507b389d799SMark Rutland 		u64 ftr_mask = arm64_ftr_mask(ftrp);
5083c739b57SSuzuki K. Poulose 		s64 ftr_new = arm64_ftr_value(ftrp, new);
5093c739b57SSuzuki K. Poulose 
5103c739b57SSuzuki K. Poulose 		val = arm64_ftr_set_value(ftrp, val, ftr_new);
511b389d799SMark Rutland 
512b389d799SMark Rutland 		valid_mask |= ftr_mask;
5133c739b57SSuzuki K. Poulose 		if (!ftrp->strict)
514b389d799SMark Rutland 			strict_mask &= ~ftr_mask;
515fe4fbdbcSSuzuki K Poulose 		if (ftrp->visible)
516fe4fbdbcSSuzuki K Poulose 			user_mask |= ftr_mask;
517fe4fbdbcSSuzuki K Poulose 		else
518fe4fbdbcSSuzuki K Poulose 			reg->user_val = arm64_ftr_set_value(ftrp,
519fe4fbdbcSSuzuki K Poulose 							    reg->user_val,
520fe4fbdbcSSuzuki K Poulose 							    ftrp->safe_val);
5213c739b57SSuzuki K. Poulose 	}
522b389d799SMark Rutland 
523b389d799SMark Rutland 	val &= valid_mask;
524b389d799SMark Rutland 
5253c739b57SSuzuki K. Poulose 	reg->sys_val = val;
5263c739b57SSuzuki K. Poulose 	reg->strict_mask = strict_mask;
527fe4fbdbcSSuzuki K Poulose 	reg->user_mask = user_mask;
5283c739b57SSuzuki K. Poulose }
5293c739b57SSuzuki K. Poulose 
5301e89baedSSuzuki K Poulose extern const struct arm64_cpu_capabilities arm64_errata[];
53182a3a21bSSuzuki K Poulose static const struct arm64_cpu_capabilities arm64_features[];
53282a3a21bSSuzuki K Poulose 
53382a3a21bSSuzuki K Poulose static void __init
53482a3a21bSSuzuki K Poulose init_cpu_hwcaps_indirect_list_from_array(const struct arm64_cpu_capabilities *caps)
53582a3a21bSSuzuki K Poulose {
53682a3a21bSSuzuki K Poulose 	for (; caps->matches; caps++) {
53782a3a21bSSuzuki K Poulose 		if (WARN(caps->capability >= ARM64_NCAPS,
53882a3a21bSSuzuki K Poulose 			"Invalid capability %d\n", caps->capability))
53982a3a21bSSuzuki K Poulose 			continue;
54082a3a21bSSuzuki K Poulose 		if (WARN(cpu_hwcaps_ptrs[caps->capability],
54182a3a21bSSuzuki K Poulose 			"Duplicate entry for capability %d\n",
54282a3a21bSSuzuki K Poulose 			caps->capability))
54382a3a21bSSuzuki K Poulose 			continue;
54482a3a21bSSuzuki K Poulose 		cpu_hwcaps_ptrs[caps->capability] = caps;
54582a3a21bSSuzuki K Poulose 	}
54682a3a21bSSuzuki K Poulose }
54782a3a21bSSuzuki K Poulose 
54882a3a21bSSuzuki K Poulose static void __init init_cpu_hwcaps_indirect_list(void)
54982a3a21bSSuzuki K Poulose {
55082a3a21bSSuzuki K Poulose 	init_cpu_hwcaps_indirect_list_from_array(arm64_features);
55182a3a21bSSuzuki K Poulose 	init_cpu_hwcaps_indirect_list_from_array(arm64_errata);
55282a3a21bSSuzuki K Poulose }
55382a3a21bSSuzuki K Poulose 
554fd9d63daSSuzuki K Poulose static void __init setup_boot_cpu_capabilities(void);
5551e89baedSSuzuki K Poulose 
5563c739b57SSuzuki K. Poulose void __init init_cpu_features(struct cpuinfo_arm64 *info)
5573c739b57SSuzuki K. Poulose {
5583c739b57SSuzuki K. Poulose 	/* Before we start using the tables, make sure it is sorted */
5593c739b57SSuzuki K. Poulose 	sort_ftr_regs();
5603c739b57SSuzuki K. Poulose 
5613c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_CTR_EL0, info->reg_ctr);
5623c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_DCZID_EL0, info->reg_dczid);
5633c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_CNTFRQ_EL0, info->reg_cntfrq);
5643c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64DFR0_EL1, info->reg_id_aa64dfr0);
5653c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64DFR1_EL1, info->reg_id_aa64dfr1);
5663c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64ISAR0_EL1, info->reg_id_aa64isar0);
5673c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64ISAR1_EL1, info->reg_id_aa64isar1);
5683c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64MMFR0_EL1, info->reg_id_aa64mmfr0);
5693c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64MMFR1_EL1, info->reg_id_aa64mmfr1);
570406e3087SJames Morse 	init_cpu_ftr_reg(SYS_ID_AA64MMFR2_EL1, info->reg_id_aa64mmfr2);
5713c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64PFR0_EL1, info->reg_id_aa64pfr0);
5723c739b57SSuzuki K. Poulose 	init_cpu_ftr_reg(SYS_ID_AA64PFR1_EL1, info->reg_id_aa64pfr1);
5732e0f2478SDave Martin 	init_cpu_ftr_reg(SYS_ID_AA64ZFR0_EL1, info->reg_id_aa64zfr0);
574a6dc3cd7SSuzuki K Poulose 
575a6dc3cd7SSuzuki K Poulose 	if (id_aa64pfr0_32bit_el0(info->reg_id_aa64pfr0)) {
5763c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_DFR0_EL1, info->reg_id_dfr0);
5773c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_ISAR0_EL1, info->reg_id_isar0);
5783c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_ISAR1_EL1, info->reg_id_isar1);
5793c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_ISAR2_EL1, info->reg_id_isar2);
5803c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_ISAR3_EL1, info->reg_id_isar3);
5813c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_ISAR4_EL1, info->reg_id_isar4);
5823c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_ISAR5_EL1, info->reg_id_isar5);
5833c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_MMFR0_EL1, info->reg_id_mmfr0);
5843c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_MMFR1_EL1, info->reg_id_mmfr1);
5853c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_MMFR2_EL1, info->reg_id_mmfr2);
5863c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_MMFR3_EL1, info->reg_id_mmfr3);
5873c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_PFR0_EL1, info->reg_id_pfr0);
5883c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_ID_PFR1_EL1, info->reg_id_pfr1);
5893c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_MVFR0_EL1, info->reg_mvfr0);
5903c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_MVFR1_EL1, info->reg_mvfr1);
5913c739b57SSuzuki K. Poulose 		init_cpu_ftr_reg(SYS_MVFR2_EL1, info->reg_mvfr2);
5923c739b57SSuzuki K. Poulose 	}
5933c739b57SSuzuki K. Poulose 
5942e0f2478SDave Martin 	if (id_aa64pfr0_sve(info->reg_id_aa64pfr0)) {
5952e0f2478SDave Martin 		init_cpu_ftr_reg(SYS_ZCR_EL1, info->reg_zcr);
5962e0f2478SDave Martin 		sve_init_vq_map();
5972e0f2478SDave Martin 	}
5985e91107bSSuzuki K Poulose 
5995e91107bSSuzuki K Poulose 	/*
60082a3a21bSSuzuki K Poulose 	 * Initialize the indirect array of CPU hwcaps capabilities pointers
60182a3a21bSSuzuki K Poulose 	 * before we handle the boot CPU below.
60282a3a21bSSuzuki K Poulose 	 */
60382a3a21bSSuzuki K Poulose 	init_cpu_hwcaps_indirect_list();
60482a3a21bSSuzuki K Poulose 
60582a3a21bSSuzuki K Poulose 	/*
606fd9d63daSSuzuki K Poulose 	 * Detect and enable early CPU capabilities based on the boot CPU,
607fd9d63daSSuzuki K Poulose 	 * after we have initialised the CPU feature infrastructure.
6085e91107bSSuzuki K Poulose 	 */
609fd9d63daSSuzuki K Poulose 	setup_boot_cpu_capabilities();
610a6dc3cd7SSuzuki K Poulose }
611a6dc3cd7SSuzuki K Poulose 
6123086d391SSuzuki K. Poulose static void update_cpu_ftr_reg(struct arm64_ftr_reg *reg, u64 new)
6133c739b57SSuzuki K. Poulose {
6145e49d73cSArd Biesheuvel 	const struct arm64_ftr_bits *ftrp;
6153c739b57SSuzuki K. Poulose 
6163c739b57SSuzuki K. Poulose 	for (ftrp = reg->ftr_bits; ftrp->width; ftrp++) {
6173c739b57SSuzuki K. Poulose 		s64 ftr_cur = arm64_ftr_value(ftrp, reg->sys_val);
6183c739b57SSuzuki K. Poulose 		s64 ftr_new = arm64_ftr_value(ftrp, new);
6193c739b57SSuzuki K. Poulose 
6203c739b57SSuzuki K. Poulose 		if (ftr_cur == ftr_new)
6213c739b57SSuzuki K. Poulose 			continue;
6223c739b57SSuzuki K. Poulose 		/* Find a safe value */
6233c739b57SSuzuki K. Poulose 		ftr_new = arm64_ftr_safe_value(ftrp, ftr_new, ftr_cur);
6243c739b57SSuzuki K. Poulose 		reg->sys_val = arm64_ftr_set_value(ftrp, reg->sys_val, ftr_new);
6253c739b57SSuzuki K. Poulose 	}
6263c739b57SSuzuki K. Poulose 
6273c739b57SSuzuki K. Poulose }
6283c739b57SSuzuki K. Poulose 
6293086d391SSuzuki K. Poulose static int check_update_ftr_reg(u32 sys_id, int cpu, u64 val, u64 boot)
630cdcf817bSSuzuki K. Poulose {
6313086d391SSuzuki K. Poulose 	struct arm64_ftr_reg *regp = get_arm64_ftr_reg(sys_id);
6323086d391SSuzuki K. Poulose 
6333086d391SSuzuki K. Poulose 	BUG_ON(!regp);
6343086d391SSuzuki K. Poulose 	update_cpu_ftr_reg(regp, val);
6353086d391SSuzuki K. Poulose 	if ((boot & regp->strict_mask) == (val & regp->strict_mask))
6363086d391SSuzuki K. Poulose 		return 0;
6373086d391SSuzuki K. Poulose 	pr_warn("SANITY CHECK: Unexpected variation in %s. Boot CPU: %#016llx, CPU%d: %#016llx\n",
6383086d391SSuzuki K. Poulose 			regp->name, boot, cpu, val);
6393086d391SSuzuki K. Poulose 	return 1;
6403086d391SSuzuki K. Poulose }
6413086d391SSuzuki K. Poulose 
6423086d391SSuzuki K. Poulose /*
6433086d391SSuzuki K. Poulose  * Update system wide CPU feature registers with the values from a
6443086d391SSuzuki K. Poulose  * non-boot CPU. Also performs SANITY checks to make sure that there
6453086d391SSuzuki K. Poulose  * aren't any insane variations from that of the boot CPU.
6463086d391SSuzuki K. Poulose  */
6473086d391SSuzuki K. Poulose void update_cpu_features(int cpu,
6483086d391SSuzuki K. Poulose 			 struct cpuinfo_arm64 *info,
6493086d391SSuzuki K. Poulose 			 struct cpuinfo_arm64 *boot)
6503086d391SSuzuki K. Poulose {
6513086d391SSuzuki K. Poulose 	int taint = 0;
6523086d391SSuzuki K. Poulose 
6533086d391SSuzuki K. Poulose 	/*
6543086d391SSuzuki K. Poulose 	 * The kernel can handle differing I-cache policies, but otherwise
6553086d391SSuzuki K. Poulose 	 * caches should look identical. Userspace JITs will make use of
6563086d391SSuzuki K. Poulose 	 * *minLine.
6573086d391SSuzuki K. Poulose 	 */
6583086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_CTR_EL0, cpu,
6593086d391SSuzuki K. Poulose 				      info->reg_ctr, boot->reg_ctr);
6603086d391SSuzuki K. Poulose 
6613086d391SSuzuki K. Poulose 	/*
6623086d391SSuzuki K. Poulose 	 * Userspace may perform DC ZVA instructions. Mismatched block sizes
6633086d391SSuzuki K. Poulose 	 * could result in too much or too little memory being zeroed if a
6643086d391SSuzuki K. Poulose 	 * process is preempted and migrated between CPUs.
6653086d391SSuzuki K. Poulose 	 */
6663086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_DCZID_EL0, cpu,
6673086d391SSuzuki K. Poulose 				      info->reg_dczid, boot->reg_dczid);
6683086d391SSuzuki K. Poulose 
6693086d391SSuzuki K. Poulose 	/* If different, timekeeping will be broken (especially with KVM) */
6703086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_CNTFRQ_EL0, cpu,
6713086d391SSuzuki K. Poulose 				      info->reg_cntfrq, boot->reg_cntfrq);
6723086d391SSuzuki K. Poulose 
6733086d391SSuzuki K. Poulose 	/*
6743086d391SSuzuki K. Poulose 	 * The kernel uses self-hosted debug features and expects CPUs to
6753086d391SSuzuki K. Poulose 	 * support identical debug features. We presently need CTX_CMPs, WRPs,
6763086d391SSuzuki K. Poulose 	 * and BRPs to be identical.
6773086d391SSuzuki K. Poulose 	 * ID_AA64DFR1 is currently RES0.
6783086d391SSuzuki K. Poulose 	 */
6793086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64DFR0_EL1, cpu,
6803086d391SSuzuki K. Poulose 				      info->reg_id_aa64dfr0, boot->reg_id_aa64dfr0);
6813086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64DFR1_EL1, cpu,
6823086d391SSuzuki K. Poulose 				      info->reg_id_aa64dfr1, boot->reg_id_aa64dfr1);
6833086d391SSuzuki K. Poulose 	/*
6843086d391SSuzuki K. Poulose 	 * Even in big.LITTLE, processors should be identical instruction-set
6853086d391SSuzuki K. Poulose 	 * wise.
6863086d391SSuzuki K. Poulose 	 */
6873086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64ISAR0_EL1, cpu,
6883086d391SSuzuki K. Poulose 				      info->reg_id_aa64isar0, boot->reg_id_aa64isar0);
6893086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64ISAR1_EL1, cpu,
6903086d391SSuzuki K. Poulose 				      info->reg_id_aa64isar1, boot->reg_id_aa64isar1);
6913086d391SSuzuki K. Poulose 
6923086d391SSuzuki K. Poulose 	/*
6933086d391SSuzuki K. Poulose 	 * Differing PARange support is fine as long as all peripherals and
6943086d391SSuzuki K. Poulose 	 * memory are mapped within the minimum PARange of all CPUs.
6953086d391SSuzuki K. Poulose 	 * Linux should not care about secure memory.
6963086d391SSuzuki K. Poulose 	 */
6973086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64MMFR0_EL1, cpu,
6983086d391SSuzuki K. Poulose 				      info->reg_id_aa64mmfr0, boot->reg_id_aa64mmfr0);
6993086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64MMFR1_EL1, cpu,
7003086d391SSuzuki K. Poulose 				      info->reg_id_aa64mmfr1, boot->reg_id_aa64mmfr1);
701406e3087SJames Morse 	taint |= check_update_ftr_reg(SYS_ID_AA64MMFR2_EL1, cpu,
702406e3087SJames Morse 				      info->reg_id_aa64mmfr2, boot->reg_id_aa64mmfr2);
7033086d391SSuzuki K. Poulose 
7043086d391SSuzuki K. Poulose 	/*
7053086d391SSuzuki K. Poulose 	 * EL3 is not our concern.
7063086d391SSuzuki K. Poulose 	 */
7073086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64PFR0_EL1, cpu,
7083086d391SSuzuki K. Poulose 				      info->reg_id_aa64pfr0, boot->reg_id_aa64pfr0);
7093086d391SSuzuki K. Poulose 	taint |= check_update_ftr_reg(SYS_ID_AA64PFR1_EL1, cpu,
7103086d391SSuzuki K. Poulose 				      info->reg_id_aa64pfr1, boot->reg_id_aa64pfr1);
7113086d391SSuzuki K. Poulose 
7122e0f2478SDave Martin 	taint |= check_update_ftr_reg(SYS_ID_AA64ZFR0_EL1, cpu,
7132e0f2478SDave Martin 				      info->reg_id_aa64zfr0, boot->reg_id_aa64zfr0);
7142e0f2478SDave Martin 
7153086d391SSuzuki K. Poulose 	/*
716a6dc3cd7SSuzuki K Poulose 	 * If we have AArch32, we care about 32-bit features for compat.
717a6dc3cd7SSuzuki K Poulose 	 * If the system doesn't support AArch32, don't update them.
7183086d391SSuzuki K. Poulose 	 */
71946823dd1SDave Martin 	if (id_aa64pfr0_32bit_el0(read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1)) &&
720a6dc3cd7SSuzuki K Poulose 		id_aa64pfr0_32bit_el0(info->reg_id_aa64pfr0)) {
721a6dc3cd7SSuzuki K Poulose 
7223086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_DFR0_EL1, cpu,
7233086d391SSuzuki K. Poulose 					info->reg_id_dfr0, boot->reg_id_dfr0);
7243086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_ISAR0_EL1, cpu,
7253086d391SSuzuki K. Poulose 					info->reg_id_isar0, boot->reg_id_isar0);
7263086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_ISAR1_EL1, cpu,
7273086d391SSuzuki K. Poulose 					info->reg_id_isar1, boot->reg_id_isar1);
7283086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_ISAR2_EL1, cpu,
7293086d391SSuzuki K. Poulose 					info->reg_id_isar2, boot->reg_id_isar2);
7303086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_ISAR3_EL1, cpu,
7313086d391SSuzuki K. Poulose 					info->reg_id_isar3, boot->reg_id_isar3);
7323086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_ISAR4_EL1, cpu,
7333086d391SSuzuki K. Poulose 					info->reg_id_isar4, boot->reg_id_isar4);
7343086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_ISAR5_EL1, cpu,
7353086d391SSuzuki K. Poulose 					info->reg_id_isar5, boot->reg_id_isar5);
7363086d391SSuzuki K. Poulose 
7373086d391SSuzuki K. Poulose 		/*
7383086d391SSuzuki K. Poulose 		 * Regardless of the value of the AuxReg field, the AIFSR, ADFSR, and
7393086d391SSuzuki K. Poulose 		 * ACTLR formats could differ across CPUs and therefore would have to
7403086d391SSuzuki K. Poulose 		 * be trapped for virtualization anyway.
7413086d391SSuzuki K. Poulose 		 */
7423086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_MMFR0_EL1, cpu,
7433086d391SSuzuki K. Poulose 					info->reg_id_mmfr0, boot->reg_id_mmfr0);
7443086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_MMFR1_EL1, cpu,
7453086d391SSuzuki K. Poulose 					info->reg_id_mmfr1, boot->reg_id_mmfr1);
7463086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_MMFR2_EL1, cpu,
7473086d391SSuzuki K. Poulose 					info->reg_id_mmfr2, boot->reg_id_mmfr2);
7483086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_MMFR3_EL1, cpu,
7493086d391SSuzuki K. Poulose 					info->reg_id_mmfr3, boot->reg_id_mmfr3);
7503086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_PFR0_EL1, cpu,
7513086d391SSuzuki K. Poulose 					info->reg_id_pfr0, boot->reg_id_pfr0);
7523086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_ID_PFR1_EL1, cpu,
7533086d391SSuzuki K. Poulose 					info->reg_id_pfr1, boot->reg_id_pfr1);
7543086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_MVFR0_EL1, cpu,
7553086d391SSuzuki K. Poulose 					info->reg_mvfr0, boot->reg_mvfr0);
7563086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_MVFR1_EL1, cpu,
7573086d391SSuzuki K. Poulose 					info->reg_mvfr1, boot->reg_mvfr1);
7583086d391SSuzuki K. Poulose 		taint |= check_update_ftr_reg(SYS_MVFR2_EL1, cpu,
7593086d391SSuzuki K. Poulose 					info->reg_mvfr2, boot->reg_mvfr2);
760a6dc3cd7SSuzuki K Poulose 	}
7613086d391SSuzuki K. Poulose 
7622e0f2478SDave Martin 	if (id_aa64pfr0_sve(info->reg_id_aa64pfr0)) {
7632e0f2478SDave Martin 		taint |= check_update_ftr_reg(SYS_ZCR_EL1, cpu,
7642e0f2478SDave Martin 					info->reg_zcr, boot->reg_zcr);
7652e0f2478SDave Martin 
7662e0f2478SDave Martin 		/* Probe vector lengths, unless we already gave up on SVE */
7672e0f2478SDave Martin 		if (id_aa64pfr0_sve(read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1)) &&
7682e0f2478SDave Martin 		    !sys_caps_initialised)
7692e0f2478SDave Martin 			sve_update_vq_map();
7702e0f2478SDave Martin 	}
7712e0f2478SDave Martin 
7723086d391SSuzuki K. Poulose 	/*
7733086d391SSuzuki K. Poulose 	 * Mismatched CPU features are a recipe for disaster. Don't even
7743086d391SSuzuki K. Poulose 	 * pretend to support them.
7753086d391SSuzuki K. Poulose 	 */
7768dd0ee65SWill Deacon 	if (taint) {
7773fde2999SWill Deacon 		pr_warn_once("Unsupported CPU feature variation detected.\n");
7783fde2999SWill Deacon 		add_taint(TAINT_CPU_OUT_OF_SPEC, LOCKDEP_STILL_OK);
779cdcf817bSSuzuki K. Poulose 	}
7808dd0ee65SWill Deacon }
781cdcf817bSSuzuki K. Poulose 
78246823dd1SDave Martin u64 read_sanitised_ftr_reg(u32 id)
783b3f15378SSuzuki K. Poulose {
784b3f15378SSuzuki K. Poulose 	struct arm64_ftr_reg *regp = get_arm64_ftr_reg(id);
785b3f15378SSuzuki K. Poulose 
786b3f15378SSuzuki K. Poulose 	/* We shouldn't get a request for an unsupported register */
787b3f15378SSuzuki K. Poulose 	BUG_ON(!regp);
788b3f15378SSuzuki K. Poulose 	return regp->sys_val;
789b3f15378SSuzuki K. Poulose }
790359b7064SMarc Zyngier 
791965861d6SMark Rutland #define read_sysreg_case(r)	\
792965861d6SMark Rutland 	case r:		return read_sysreg_s(r)
793965861d6SMark Rutland 
79492406f0cSSuzuki K Poulose /*
79546823dd1SDave Martin  * __read_sysreg_by_encoding() - Used by a STARTING cpu before cpuinfo is populated.
79692406f0cSSuzuki K Poulose  * Read the system register on the current CPU
79792406f0cSSuzuki K Poulose  */
79846823dd1SDave Martin static u64 __read_sysreg_by_encoding(u32 sys_id)
79992406f0cSSuzuki K Poulose {
80092406f0cSSuzuki K Poulose 	switch (sys_id) {
801965861d6SMark Rutland 	read_sysreg_case(SYS_ID_PFR0_EL1);
802965861d6SMark Rutland 	read_sysreg_case(SYS_ID_PFR1_EL1);
803965861d6SMark Rutland 	read_sysreg_case(SYS_ID_DFR0_EL1);
804965861d6SMark Rutland 	read_sysreg_case(SYS_ID_MMFR0_EL1);
805965861d6SMark Rutland 	read_sysreg_case(SYS_ID_MMFR1_EL1);
806965861d6SMark Rutland 	read_sysreg_case(SYS_ID_MMFR2_EL1);
807965861d6SMark Rutland 	read_sysreg_case(SYS_ID_MMFR3_EL1);
808965861d6SMark Rutland 	read_sysreg_case(SYS_ID_ISAR0_EL1);
809965861d6SMark Rutland 	read_sysreg_case(SYS_ID_ISAR1_EL1);
810965861d6SMark Rutland 	read_sysreg_case(SYS_ID_ISAR2_EL1);
811965861d6SMark Rutland 	read_sysreg_case(SYS_ID_ISAR3_EL1);
812965861d6SMark Rutland 	read_sysreg_case(SYS_ID_ISAR4_EL1);
813965861d6SMark Rutland 	read_sysreg_case(SYS_ID_ISAR5_EL1);
814965861d6SMark Rutland 	read_sysreg_case(SYS_MVFR0_EL1);
815965861d6SMark Rutland 	read_sysreg_case(SYS_MVFR1_EL1);
816965861d6SMark Rutland 	read_sysreg_case(SYS_MVFR2_EL1);
81792406f0cSSuzuki K Poulose 
818965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64PFR0_EL1);
819965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64PFR1_EL1);
820965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64DFR0_EL1);
821965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64DFR1_EL1);
822965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64MMFR0_EL1);
823965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64MMFR1_EL1);
824965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64MMFR2_EL1);
825965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64ISAR0_EL1);
826965861d6SMark Rutland 	read_sysreg_case(SYS_ID_AA64ISAR1_EL1);
82792406f0cSSuzuki K Poulose 
828965861d6SMark Rutland 	read_sysreg_case(SYS_CNTFRQ_EL0);
829965861d6SMark Rutland 	read_sysreg_case(SYS_CTR_EL0);
830965861d6SMark Rutland 	read_sysreg_case(SYS_DCZID_EL0);
831965861d6SMark Rutland 
83292406f0cSSuzuki K Poulose 	default:
83392406f0cSSuzuki K Poulose 		BUG();
83492406f0cSSuzuki K Poulose 		return 0;
83592406f0cSSuzuki K Poulose 	}
83692406f0cSSuzuki K Poulose }
83792406f0cSSuzuki K Poulose 
838963fcd40SMarc Zyngier #include <linux/irqchip/arm-gic-v3.h>
839963fcd40SMarc Zyngier 
84094a9e04aSMarc Zyngier static bool
84118ffa046SJames Morse feature_matches(u64 reg, const struct arm64_cpu_capabilities *entry)
84218ffa046SJames Morse {
84328c5dcb2SSuzuki K Poulose 	int val = cpuid_feature_extract_field(reg, entry->field_pos, entry->sign);
84418ffa046SJames Morse 
84518ffa046SJames Morse 	return val >= entry->min_field_value;
84618ffa046SJames Morse }
84718ffa046SJames Morse 
848da8d02d1SSuzuki K. Poulose static bool
84992406f0cSSuzuki K Poulose has_cpuid_feature(const struct arm64_cpu_capabilities *entry, int scope)
850da8d02d1SSuzuki K. Poulose {
851da8d02d1SSuzuki K. Poulose 	u64 val;
85294a9e04aSMarc Zyngier 
85392406f0cSSuzuki K Poulose 	WARN_ON(scope == SCOPE_LOCAL_CPU && preemptible());
85492406f0cSSuzuki K Poulose 	if (scope == SCOPE_SYSTEM)
85546823dd1SDave Martin 		val = read_sanitised_ftr_reg(entry->sys_reg);
85692406f0cSSuzuki K Poulose 	else
85746823dd1SDave Martin 		val = __read_sysreg_by_encoding(entry->sys_reg);
85892406f0cSSuzuki K Poulose 
859da8d02d1SSuzuki K. Poulose 	return feature_matches(val, entry);
860da8d02d1SSuzuki K. Poulose }
861338d4f49SJames Morse 
86292406f0cSSuzuki K Poulose static bool has_useable_gicv3_cpuif(const struct arm64_cpu_capabilities *entry, int scope)
863963fcd40SMarc Zyngier {
864963fcd40SMarc Zyngier 	bool has_sre;
865963fcd40SMarc Zyngier 
86692406f0cSSuzuki K Poulose 	if (!has_cpuid_feature(entry, scope))
867963fcd40SMarc Zyngier 		return false;
868963fcd40SMarc Zyngier 
869963fcd40SMarc Zyngier 	has_sre = gic_enable_sre();
870963fcd40SMarc Zyngier 	if (!has_sre)
871963fcd40SMarc Zyngier 		pr_warn_once("%s present but disabled by higher exception level\n",
872963fcd40SMarc Zyngier 			     entry->desc);
873963fcd40SMarc Zyngier 
874963fcd40SMarc Zyngier 	return has_sre;
875963fcd40SMarc Zyngier }
876963fcd40SMarc Zyngier 
87792406f0cSSuzuki K Poulose static bool has_no_hw_prefetch(const struct arm64_cpu_capabilities *entry, int __unused)
878d5370f75SWill Deacon {
879d5370f75SWill Deacon 	u32 midr = read_cpuid_id();
880d5370f75SWill Deacon 
881d5370f75SWill Deacon 	/* Cavium ThunderX pass 1.x and 2.x */
882fa5ce3d1SRobert Richter 	return MIDR_IS_CPU_MODEL_RANGE(midr, MIDR_THUNDERX,
883fa5ce3d1SRobert Richter 		MIDR_CPU_VAR_REV(0, 0),
884fa5ce3d1SRobert Richter 		MIDR_CPU_VAR_REV(1, MIDR_REVISION_MASK));
885d5370f75SWill Deacon }
886d5370f75SWill Deacon 
88782e0191aSSuzuki K Poulose static bool has_no_fpsimd(const struct arm64_cpu_capabilities *entry, int __unused)
88882e0191aSSuzuki K Poulose {
88946823dd1SDave Martin 	u64 pfr0 = read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1);
89082e0191aSSuzuki K Poulose 
89182e0191aSSuzuki K Poulose 	return cpuid_feature_extract_signed_field(pfr0,
89282e0191aSSuzuki K Poulose 					ID_AA64PFR0_FP_SHIFT) < 0;
89382e0191aSSuzuki K Poulose }
89482e0191aSSuzuki K Poulose 
8956ae4b6e0SShanker Donthineni static bool has_cache_idc(const struct arm64_cpu_capabilities *entry,
8968ab66cbeSSuzuki K Poulose 			  int scope)
8976ae4b6e0SShanker Donthineni {
8988ab66cbeSSuzuki K Poulose 	u64 ctr;
8998ab66cbeSSuzuki K Poulose 
9008ab66cbeSSuzuki K Poulose 	if (scope == SCOPE_SYSTEM)
9018ab66cbeSSuzuki K Poulose 		ctr = arm64_ftr_reg_ctrel0.sys_val;
9028ab66cbeSSuzuki K Poulose 	else
9031602df02SSuzuki K Poulose 		ctr = read_cpuid_effective_cachetype();
9048ab66cbeSSuzuki K Poulose 
9058ab66cbeSSuzuki K Poulose 	return ctr & BIT(CTR_IDC_SHIFT);
9066ae4b6e0SShanker Donthineni }
9076ae4b6e0SShanker Donthineni 
9081602df02SSuzuki K Poulose static void cpu_emulate_effective_ctr(const struct arm64_cpu_capabilities *__unused)
9091602df02SSuzuki K Poulose {
9101602df02SSuzuki K Poulose 	/*
9111602df02SSuzuki K Poulose 	 * If the CPU exposes raw CTR_EL0.IDC = 0, while effectively
9121602df02SSuzuki K Poulose 	 * CTR_EL0.IDC = 1 (from CLIDR values), we need to trap accesses
9131602df02SSuzuki K Poulose 	 * to the CTR_EL0 on this CPU and emulate it with the real/safe
9141602df02SSuzuki K Poulose 	 * value.
9151602df02SSuzuki K Poulose 	 */
9161602df02SSuzuki K Poulose 	if (!(read_cpuid_cachetype() & BIT(CTR_IDC_SHIFT)))
9171602df02SSuzuki K Poulose 		sysreg_clear_set(sctlr_el1, SCTLR_EL1_UCT, 0);
9181602df02SSuzuki K Poulose }
9191602df02SSuzuki K Poulose 
9206ae4b6e0SShanker Donthineni static bool has_cache_dic(const struct arm64_cpu_capabilities *entry,
9218ab66cbeSSuzuki K Poulose 			  int scope)
9226ae4b6e0SShanker Donthineni {
9238ab66cbeSSuzuki K Poulose 	u64 ctr;
9248ab66cbeSSuzuki K Poulose 
9258ab66cbeSSuzuki K Poulose 	if (scope == SCOPE_SYSTEM)
9268ab66cbeSSuzuki K Poulose 		ctr = arm64_ftr_reg_ctrel0.sys_val;
9278ab66cbeSSuzuki K Poulose 	else
9288ab66cbeSSuzuki K Poulose 		ctr = read_cpuid_cachetype();
9298ab66cbeSSuzuki K Poulose 
9308ab66cbeSSuzuki K Poulose 	return ctr & BIT(CTR_DIC_SHIFT);
9316ae4b6e0SShanker Donthineni }
9326ae4b6e0SShanker Donthineni 
9335ffdfaedSVladimir Murzin static bool __maybe_unused
9345ffdfaedSVladimir Murzin has_useable_cnp(const struct arm64_cpu_capabilities *entry, int scope)
9355ffdfaedSVladimir Murzin {
9365ffdfaedSVladimir Murzin 	/*
9375ffdfaedSVladimir Murzin 	 * Kdump isn't guaranteed to power-off all secondary CPUs, CNP
9385ffdfaedSVladimir Murzin 	 * may share TLB entries with a CPU stuck in the crashed
9395ffdfaedSVladimir Murzin 	 * kernel.
9405ffdfaedSVladimir Murzin 	 */
9415ffdfaedSVladimir Murzin 	 if (is_kdump_kernel())
9425ffdfaedSVladimir Murzin 		return false;
9435ffdfaedSVladimir Murzin 
9445ffdfaedSVladimir Murzin 	return has_cpuid_feature(entry, scope);
9455ffdfaedSVladimir Murzin }
9465ffdfaedSVladimir Murzin 
947ea1e3de8SWill Deacon #ifdef CONFIG_UNMAP_KERNEL_AT_EL0
948ea1e3de8SWill Deacon static int __kpti_forced; /* 0: not forced, >0: forced on, <0: forced off */
949ea1e3de8SWill Deacon 
950ea1e3de8SWill Deacon static bool unmap_kernel_at_el0(const struct arm64_cpu_capabilities *entry,
951d3aec8a2SSuzuki K Poulose 				int scope)
952ea1e3de8SWill Deacon {
953be5b2998SSuzuki K Poulose 	/* List of CPUs that are not vulnerable and don't need KPTI */
954be5b2998SSuzuki K Poulose 	static const struct midr_range kpti_safe_list[] = {
955be5b2998SSuzuki K Poulose 		MIDR_ALL_VERSIONS(MIDR_CAVIUM_THUNDERX2),
956be5b2998SSuzuki K Poulose 		MIDR_ALL_VERSIONS(MIDR_BRCM_VULCAN),
9572a355ec2SWill Deacon 		MIDR_ALL_VERSIONS(MIDR_CORTEX_A35),
9582a355ec2SWill Deacon 		MIDR_ALL_VERSIONS(MIDR_CORTEX_A53),
9592a355ec2SWill Deacon 		MIDR_ALL_VERSIONS(MIDR_CORTEX_A55),
9602a355ec2SWill Deacon 		MIDR_ALL_VERSIONS(MIDR_CORTEX_A57),
9612a355ec2SWill Deacon 		MIDR_ALL_VERSIONS(MIDR_CORTEX_A72),
9622a355ec2SWill Deacon 		MIDR_ALL_VERSIONS(MIDR_CORTEX_A73),
96371c751f2SMark Rutland 		{ /* sentinel */ }
964be5b2998SSuzuki K Poulose 	};
9656dc52b15SMarc Zyngier 	char const *str = "command line option";
966179a56f6SWill Deacon 
9676dc52b15SMarc Zyngier 	/*
9686dc52b15SMarc Zyngier 	 * For reasons that aren't entirely clear, enabling KPTI on Cavium
9696dc52b15SMarc Zyngier 	 * ThunderX leads to apparent I-cache corruption of kernel text, which
9706dc52b15SMarc Zyngier 	 * ends as well as you might imagine. Don't even try.
9716dc52b15SMarc Zyngier 	 */
9726dc52b15SMarc Zyngier 	if (cpus_have_const_cap(ARM64_WORKAROUND_CAVIUM_27456)) {
9736dc52b15SMarc Zyngier 		str = "ARM64_WORKAROUND_CAVIUM_27456";
9746dc52b15SMarc Zyngier 		__kpti_forced = -1;
9756dc52b15SMarc Zyngier 	}
9766dc52b15SMarc Zyngier 
9776dc52b15SMarc Zyngier 	/* Forced? */
978ea1e3de8SWill Deacon 	if (__kpti_forced) {
9796dc52b15SMarc Zyngier 		pr_info_once("kernel page table isolation forced %s by %s\n",
9806dc52b15SMarc Zyngier 			     __kpti_forced > 0 ? "ON" : "OFF", str);
981ea1e3de8SWill Deacon 		return __kpti_forced > 0;
982ea1e3de8SWill Deacon 	}
983ea1e3de8SWill Deacon 
984ea1e3de8SWill Deacon 	/* Useful for KASLR robustness */
985ea1e3de8SWill Deacon 	if (IS_ENABLED(CONFIG_RANDOMIZE_BASE))
986ea1e3de8SWill Deacon 		return true;
987ea1e3de8SWill Deacon 
9880ba2e29cSJayachandran C 	/* Don't force KPTI for CPUs that are not vulnerable */
989be5b2998SSuzuki K Poulose 	if (is_midr_in_range_list(read_cpuid_id(), kpti_safe_list))
9900ba2e29cSJayachandran C 		return false;
9910ba2e29cSJayachandran C 
992179a56f6SWill Deacon 	/* Defer to CPU feature registers */
993d3aec8a2SSuzuki K Poulose 	return !has_cpuid_feature(entry, scope);
994ea1e3de8SWill Deacon }
995ea1e3de8SWill Deacon 
996c0cda3b8SDave Martin static void
997c0cda3b8SDave Martin kpti_install_ng_mappings(const struct arm64_cpu_capabilities *__unused)
998f992b4dfSWill Deacon {
999f992b4dfSWill Deacon 	typedef void (kpti_remap_fn)(int, int, phys_addr_t);
1000f992b4dfSWill Deacon 	extern kpti_remap_fn idmap_kpti_install_ng_mappings;
1001f992b4dfSWill Deacon 	kpti_remap_fn *remap_fn;
1002f992b4dfSWill Deacon 
1003f992b4dfSWill Deacon 	static bool kpti_applied = false;
1004f992b4dfSWill Deacon 	int cpu = smp_processor_id();
1005f992b4dfSWill Deacon 
1006f992b4dfSWill Deacon 	if (kpti_applied)
1007c0cda3b8SDave Martin 		return;
1008f992b4dfSWill Deacon 
1009f992b4dfSWill Deacon 	remap_fn = (void *)__pa_symbol(idmap_kpti_install_ng_mappings);
1010f992b4dfSWill Deacon 
1011f992b4dfSWill Deacon 	cpu_install_idmap();
1012f992b4dfSWill Deacon 	remap_fn(cpu, num_online_cpus(), __pa_symbol(swapper_pg_dir));
1013f992b4dfSWill Deacon 	cpu_uninstall_idmap();
1014f992b4dfSWill Deacon 
1015f992b4dfSWill Deacon 	if (!cpu)
1016f992b4dfSWill Deacon 		kpti_applied = true;
1017f992b4dfSWill Deacon 
1018c0cda3b8SDave Martin 	return;
1019f992b4dfSWill Deacon }
1020f992b4dfSWill Deacon 
1021ea1e3de8SWill Deacon static int __init parse_kpti(char *str)
1022ea1e3de8SWill Deacon {
1023ea1e3de8SWill Deacon 	bool enabled;
1024ea1e3de8SWill Deacon 	int ret = strtobool(str, &enabled);
1025ea1e3de8SWill Deacon 
1026ea1e3de8SWill Deacon 	if (ret)
1027ea1e3de8SWill Deacon 		return ret;
1028ea1e3de8SWill Deacon 
1029ea1e3de8SWill Deacon 	__kpti_forced = enabled ? 1 : -1;
1030ea1e3de8SWill Deacon 	return 0;
1031ea1e3de8SWill Deacon }
1032b5b7dd64SWill Deacon early_param("kpti", parse_kpti);
1033ea1e3de8SWill Deacon #endif	/* CONFIG_UNMAP_KERNEL_AT_EL0 */
1034ea1e3de8SWill Deacon 
103505abb595SSuzuki K Poulose #ifdef CONFIG_ARM64_HW_AFDBM
103605abb595SSuzuki K Poulose static inline void __cpu_enable_hw_dbm(void)
103705abb595SSuzuki K Poulose {
103805abb595SSuzuki K Poulose 	u64 tcr = read_sysreg(tcr_el1) | TCR_HD;
103905abb595SSuzuki K Poulose 
104005abb595SSuzuki K Poulose 	write_sysreg(tcr, tcr_el1);
104105abb595SSuzuki K Poulose 	isb();
104205abb595SSuzuki K Poulose }
104305abb595SSuzuki K Poulose 
1044ece1397cSSuzuki K Poulose static bool cpu_has_broken_dbm(void)
1045ece1397cSSuzuki K Poulose {
1046ece1397cSSuzuki K Poulose 	/* List of CPUs which have broken DBM support. */
1047ece1397cSSuzuki K Poulose 	static const struct midr_range cpus[] = {
1048ece1397cSSuzuki K Poulose #ifdef CONFIG_ARM64_ERRATUM_1024718
1049ece1397cSSuzuki K Poulose 		MIDR_RANGE(MIDR_CORTEX_A55, 0, 0, 1, 0),  // A55 r0p0 -r1p0
1050ece1397cSSuzuki K Poulose #endif
1051ece1397cSSuzuki K Poulose 		{},
1052ece1397cSSuzuki K Poulose 	};
1053ece1397cSSuzuki K Poulose 
1054ece1397cSSuzuki K Poulose 	return is_midr_in_range_list(read_cpuid_id(), cpus);
1055ece1397cSSuzuki K Poulose }
1056ece1397cSSuzuki K Poulose 
105705abb595SSuzuki K Poulose static bool cpu_can_use_dbm(const struct arm64_cpu_capabilities *cap)
105805abb595SSuzuki K Poulose {
1059ece1397cSSuzuki K Poulose 	return has_cpuid_feature(cap, SCOPE_LOCAL_CPU) &&
1060ece1397cSSuzuki K Poulose 	       !cpu_has_broken_dbm();
106105abb595SSuzuki K Poulose }
106205abb595SSuzuki K Poulose 
106305abb595SSuzuki K Poulose static void cpu_enable_hw_dbm(struct arm64_cpu_capabilities const *cap)
106405abb595SSuzuki K Poulose {
106505abb595SSuzuki K Poulose 	if (cpu_can_use_dbm(cap))
106605abb595SSuzuki K Poulose 		__cpu_enable_hw_dbm();
106705abb595SSuzuki K Poulose }
106805abb595SSuzuki K Poulose 
106905abb595SSuzuki K Poulose static bool has_hw_dbm(const struct arm64_cpu_capabilities *cap,
107005abb595SSuzuki K Poulose 		       int __unused)
107105abb595SSuzuki K Poulose {
107205abb595SSuzuki K Poulose 	static bool detected = false;
107305abb595SSuzuki K Poulose 	/*
107405abb595SSuzuki K Poulose 	 * DBM is a non-conflicting feature. i.e, the kernel can safely
107505abb595SSuzuki K Poulose 	 * run a mix of CPUs with and without the feature. So, we
107605abb595SSuzuki K Poulose 	 * unconditionally enable the capability to allow any late CPU
107705abb595SSuzuki K Poulose 	 * to use the feature. We only enable the control bits on the
107805abb595SSuzuki K Poulose 	 * CPU, if it actually supports.
107905abb595SSuzuki K Poulose 	 *
108005abb595SSuzuki K Poulose 	 * We have to make sure we print the "feature" detection only
108105abb595SSuzuki K Poulose 	 * when at least one CPU actually uses it. So check if this CPU
108205abb595SSuzuki K Poulose 	 * can actually use it and print the message exactly once.
108305abb595SSuzuki K Poulose 	 *
108405abb595SSuzuki K Poulose 	 * This is safe as all CPUs (including secondary CPUs - due to the
108505abb595SSuzuki K Poulose 	 * LOCAL_CPU scope - and the hotplugged CPUs - via verification)
108605abb595SSuzuki K Poulose 	 * goes through the "matches" check exactly once. Also if a CPU
108705abb595SSuzuki K Poulose 	 * matches the criteria, it is guaranteed that the CPU will turn
108805abb595SSuzuki K Poulose 	 * the DBM on, as the capability is unconditionally enabled.
108905abb595SSuzuki K Poulose 	 */
109005abb595SSuzuki K Poulose 	if (!detected && cpu_can_use_dbm(cap)) {
109105abb595SSuzuki K Poulose 		detected = true;
109205abb595SSuzuki K Poulose 		pr_info("detected: Hardware dirty bit management\n");
109305abb595SSuzuki K Poulose 	}
109405abb595SSuzuki K Poulose 
109505abb595SSuzuki K Poulose 	return true;
109605abb595SSuzuki K Poulose }
109705abb595SSuzuki K Poulose 
109805abb595SSuzuki K Poulose #endif
109905abb595SSuzuki K Poulose 
110012eb3691SWill Deacon #ifdef CONFIG_ARM64_VHE
110112eb3691SWill Deacon static bool runs_at_el2(const struct arm64_cpu_capabilities *entry, int __unused)
110212eb3691SWill Deacon {
110312eb3691SWill Deacon 	return is_kernel_in_hyp_mode();
110412eb3691SWill Deacon }
110512eb3691SWill Deacon 
1106c0cda3b8SDave Martin static void cpu_copy_el2regs(const struct arm64_cpu_capabilities *__unused)
11076d99b689SJames Morse {
11086d99b689SJames Morse 	/*
11096d99b689SJames Morse 	 * Copy register values that aren't redirected by hardware.
11106d99b689SJames Morse 	 *
11116d99b689SJames Morse 	 * Before code patching, we only set tpidr_el1, all CPUs need to copy
11126d99b689SJames Morse 	 * this value to tpidr_el2 before we patch the code. Once we've done
11136d99b689SJames Morse 	 * that, freshly-onlined CPUs will set tpidr_el2, so we don't need to
11146d99b689SJames Morse 	 * do anything here.
11156d99b689SJames Morse 	 */
11166d99b689SJames Morse 	if (!alternatives_applied)
11176d99b689SJames Morse 		write_sysreg(read_sysreg(tpidr_el1), tpidr_el2);
11186d99b689SJames Morse }
111912eb3691SWill Deacon #endif
11206d99b689SJames Morse 
1121e48d53a9SMarc Zyngier static void cpu_has_fwb(const struct arm64_cpu_capabilities *__unused)
1122e48d53a9SMarc Zyngier {
1123e48d53a9SMarc Zyngier 	u64 val = read_sysreg_s(SYS_CLIDR_EL1);
1124e48d53a9SMarc Zyngier 
1125e48d53a9SMarc Zyngier 	/* Check that CLIDR_EL1.LOU{U,IS} are both 0 */
1126e48d53a9SMarc Zyngier 	WARN_ON(val & (7 << 27 | 7 << 21));
1127e48d53a9SMarc Zyngier }
1128e48d53a9SMarc Zyngier 
11298f04e8e6SWill Deacon #ifdef CONFIG_ARM64_SSBD
11308f04e8e6SWill Deacon static int ssbs_emulation_handler(struct pt_regs *regs, u32 instr)
11318f04e8e6SWill Deacon {
11328f04e8e6SWill Deacon 	if (user_mode(regs))
11338f04e8e6SWill Deacon 		return 1;
11348f04e8e6SWill Deacon 
113574e24828SSuzuki K Poulose 	if (instr & BIT(PSTATE_Imm_shift))
11368f04e8e6SWill Deacon 		regs->pstate |= PSR_SSBS_BIT;
11378f04e8e6SWill Deacon 	else
11388f04e8e6SWill Deacon 		regs->pstate &= ~PSR_SSBS_BIT;
11398f04e8e6SWill Deacon 
11408f04e8e6SWill Deacon 	arm64_skip_faulting_instruction(regs, 4);
11418f04e8e6SWill Deacon 	return 0;
11428f04e8e6SWill Deacon }
11438f04e8e6SWill Deacon 
11448f04e8e6SWill Deacon static struct undef_hook ssbs_emulation_hook = {
114574e24828SSuzuki K Poulose 	.instr_mask	= ~(1U << PSTATE_Imm_shift),
114674e24828SSuzuki K Poulose 	.instr_val	= 0xd500401f | PSTATE_SSBS,
11478f04e8e6SWill Deacon 	.fn		= ssbs_emulation_handler,
11488f04e8e6SWill Deacon };
11498f04e8e6SWill Deacon 
11508f04e8e6SWill Deacon static void cpu_enable_ssbs(const struct arm64_cpu_capabilities *__unused)
11518f04e8e6SWill Deacon {
11528f04e8e6SWill Deacon 	static bool undef_hook_registered = false;
11538f04e8e6SWill Deacon 	static DEFINE_SPINLOCK(hook_lock);
11548f04e8e6SWill Deacon 
11558f04e8e6SWill Deacon 	spin_lock(&hook_lock);
11568f04e8e6SWill Deacon 	if (!undef_hook_registered) {
11578f04e8e6SWill Deacon 		register_undef_hook(&ssbs_emulation_hook);
11588f04e8e6SWill Deacon 		undef_hook_registered = true;
11598f04e8e6SWill Deacon 	}
11608f04e8e6SWill Deacon 	spin_unlock(&hook_lock);
11618f04e8e6SWill Deacon 
11628f04e8e6SWill Deacon 	if (arm64_get_ssbd_state() == ARM64_SSBD_FORCE_DISABLE) {
11638f04e8e6SWill Deacon 		sysreg_clear_set(sctlr_el1, 0, SCTLR_ELx_DSSBS);
11648f04e8e6SWill Deacon 		arm64_set_ssbd_mitigation(false);
11658f04e8e6SWill Deacon 	} else {
11668f04e8e6SWill Deacon 		arm64_set_ssbd_mitigation(true);
11678f04e8e6SWill Deacon 	}
11688f04e8e6SWill Deacon }
11698f04e8e6SWill Deacon #endif /* CONFIG_ARM64_SSBD */
11708f04e8e6SWill Deacon 
1171b8925ee2SWill Deacon #ifdef CONFIG_ARM64_PAN
1172b8925ee2SWill Deacon static void cpu_enable_pan(const struct arm64_cpu_capabilities *__unused)
1173b8925ee2SWill Deacon {
1174b8925ee2SWill Deacon 	/*
1175b8925ee2SWill Deacon 	 * We modify PSTATE. This won't work from irq context as the PSTATE
1176b8925ee2SWill Deacon 	 * is discarded once we return from the exception.
1177b8925ee2SWill Deacon 	 */
1178b8925ee2SWill Deacon 	WARN_ON_ONCE(in_interrupt());
1179b8925ee2SWill Deacon 
1180b8925ee2SWill Deacon 	sysreg_clear_set(sctlr_el1, SCTLR_EL1_SPAN, 0);
1181b8925ee2SWill Deacon 	asm(SET_PSTATE_PAN(1));
1182b8925ee2SWill Deacon }
1183b8925ee2SWill Deacon #endif /* CONFIG_ARM64_PAN */
1184b8925ee2SWill Deacon 
1185b8925ee2SWill Deacon #ifdef CONFIG_ARM64_RAS_EXTN
1186b8925ee2SWill Deacon static void cpu_clear_disr(const struct arm64_cpu_capabilities *__unused)
1187b8925ee2SWill Deacon {
1188b8925ee2SWill Deacon 	/* Firmware may have left a deferred SError in this register. */
1189b8925ee2SWill Deacon 	write_sysreg_s(0, SYS_DISR_EL1);
1190b8925ee2SWill Deacon }
1191b8925ee2SWill Deacon #endif /* CONFIG_ARM64_RAS_EXTN */
1192b8925ee2SWill Deacon 
1193*6984eb47SMark Rutland #ifdef CONFIG_ARM64_PTR_AUTH
1194*6984eb47SMark Rutland static bool has_address_auth(const struct arm64_cpu_capabilities *entry,
1195*6984eb47SMark Rutland 			     int __unused)
1196*6984eb47SMark Rutland {
1197*6984eb47SMark Rutland 	u64 isar1 = read_sanitised_ftr_reg(SYS_ID_AA64ISAR1_EL1);
1198*6984eb47SMark Rutland 	bool api, apa;
1199*6984eb47SMark Rutland 
1200*6984eb47SMark Rutland 	apa = cpuid_feature_extract_unsigned_field(isar1,
1201*6984eb47SMark Rutland 					ID_AA64ISAR1_APA_SHIFT) > 0;
1202*6984eb47SMark Rutland 	api = cpuid_feature_extract_unsigned_field(isar1,
1203*6984eb47SMark Rutland 					ID_AA64ISAR1_API_SHIFT) > 0;
1204*6984eb47SMark Rutland 
1205*6984eb47SMark Rutland 	return apa || api;
1206*6984eb47SMark Rutland }
1207*6984eb47SMark Rutland 
1208*6984eb47SMark Rutland static bool has_generic_auth(const struct arm64_cpu_capabilities *entry,
1209*6984eb47SMark Rutland 			     int __unused)
1210*6984eb47SMark Rutland {
1211*6984eb47SMark Rutland 	u64 isar1 = read_sanitised_ftr_reg(SYS_ID_AA64ISAR1_EL1);
1212*6984eb47SMark Rutland 	bool gpi, gpa;
1213*6984eb47SMark Rutland 
1214*6984eb47SMark Rutland 	gpa = cpuid_feature_extract_unsigned_field(isar1,
1215*6984eb47SMark Rutland 					ID_AA64ISAR1_GPA_SHIFT) > 0;
1216*6984eb47SMark Rutland 	gpi = cpuid_feature_extract_unsigned_field(isar1,
1217*6984eb47SMark Rutland 					ID_AA64ISAR1_GPI_SHIFT) > 0;
1218*6984eb47SMark Rutland 
1219*6984eb47SMark Rutland 	return gpa || gpi;
1220*6984eb47SMark Rutland }
1221*6984eb47SMark Rutland #endif /* CONFIG_ARM64_PTR_AUTH */
1222*6984eb47SMark Rutland 
1223359b7064SMarc Zyngier static const struct arm64_cpu_capabilities arm64_features[] = {
122494a9e04aSMarc Zyngier 	{
122594a9e04aSMarc Zyngier 		.desc = "GIC system register CPU interface",
122694a9e04aSMarc Zyngier 		.capability = ARM64_HAS_SYSREG_GIC_CPUIF,
12275b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1228963fcd40SMarc Zyngier 		.matches = has_useable_gicv3_cpuif,
1229da8d02d1SSuzuki K. Poulose 		.sys_reg = SYS_ID_AA64PFR0_EL1,
1230da8d02d1SSuzuki K. Poulose 		.field_pos = ID_AA64PFR0_GIC_SHIFT,
1231ff96f7bcSSuzuki K Poulose 		.sign = FTR_UNSIGNED,
123218ffa046SJames Morse 		.min_field_value = 1,
123394a9e04aSMarc Zyngier 	},
1234338d4f49SJames Morse #ifdef CONFIG_ARM64_PAN
1235338d4f49SJames Morse 	{
1236338d4f49SJames Morse 		.desc = "Privileged Access Never",
1237338d4f49SJames Morse 		.capability = ARM64_HAS_PAN,
12385b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1239da8d02d1SSuzuki K. Poulose 		.matches = has_cpuid_feature,
1240da8d02d1SSuzuki K. Poulose 		.sys_reg = SYS_ID_AA64MMFR1_EL1,
1241da8d02d1SSuzuki K. Poulose 		.field_pos = ID_AA64MMFR1_PAN_SHIFT,
1242ff96f7bcSSuzuki K Poulose 		.sign = FTR_UNSIGNED,
1243338d4f49SJames Morse 		.min_field_value = 1,
1244c0cda3b8SDave Martin 		.cpu_enable = cpu_enable_pan,
1245338d4f49SJames Morse 	},
1246338d4f49SJames Morse #endif /* CONFIG_ARM64_PAN */
12472e94da13SWill Deacon #if defined(CONFIG_AS_LSE) && defined(CONFIG_ARM64_LSE_ATOMICS)
12482e94da13SWill Deacon 	{
12492e94da13SWill Deacon 		.desc = "LSE atomic instructions",
12502e94da13SWill Deacon 		.capability = ARM64_HAS_LSE_ATOMICS,
12515b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1252da8d02d1SSuzuki K. Poulose 		.matches = has_cpuid_feature,
1253da8d02d1SSuzuki K. Poulose 		.sys_reg = SYS_ID_AA64ISAR0_EL1,
1254da8d02d1SSuzuki K. Poulose 		.field_pos = ID_AA64ISAR0_ATOMICS_SHIFT,
1255ff96f7bcSSuzuki K Poulose 		.sign = FTR_UNSIGNED,
12562e94da13SWill Deacon 		.min_field_value = 2,
12572e94da13SWill Deacon 	},
12582e94da13SWill Deacon #endif /* CONFIG_AS_LSE && CONFIG_ARM64_LSE_ATOMICS */
1259d88701beSMarc Zyngier 	{
1260d5370f75SWill Deacon 		.desc = "Software prefetching using PRFM",
1261d5370f75SWill Deacon 		.capability = ARM64_HAS_NO_HW_PREFETCH,
12625c137714SSuzuki K Poulose 		.type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE,
1263d5370f75SWill Deacon 		.matches = has_no_hw_prefetch,
1264d5370f75SWill Deacon 	},
126557f4959bSJames Morse #ifdef CONFIG_ARM64_UAO
126657f4959bSJames Morse 	{
126757f4959bSJames Morse 		.desc = "User Access Override",
126857f4959bSJames Morse 		.capability = ARM64_HAS_UAO,
12695b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
127057f4959bSJames Morse 		.matches = has_cpuid_feature,
127157f4959bSJames Morse 		.sys_reg = SYS_ID_AA64MMFR2_EL1,
127257f4959bSJames Morse 		.field_pos = ID_AA64MMFR2_UAO_SHIFT,
127357f4959bSJames Morse 		.min_field_value = 1,
1274c8b06e3fSJames Morse 		/*
1275c8b06e3fSJames Morse 		 * We rely on stop_machine() calling uao_thread_switch() to set
1276c8b06e3fSJames Morse 		 * UAO immediately after patching.
1277c8b06e3fSJames Morse 		 */
127857f4959bSJames Morse 	},
127957f4959bSJames Morse #endif /* CONFIG_ARM64_UAO */
128070544196SJames Morse #ifdef CONFIG_ARM64_PAN
128170544196SJames Morse 	{
128270544196SJames Morse 		.capability = ARM64_ALT_PAN_NOT_UAO,
12835b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
128470544196SJames Morse 		.matches = cpufeature_pan_not_uao,
128570544196SJames Morse 	},
128670544196SJames Morse #endif /* CONFIG_ARM64_PAN */
1287830dcc9fSSuzuki K Poulose #ifdef CONFIG_ARM64_VHE
1288588ab3f9SLinus Torvalds 	{
1289d88701beSMarc Zyngier 		.desc = "Virtualization Host Extensions",
1290d88701beSMarc Zyngier 		.capability = ARM64_HAS_VIRT_HOST_EXTN,
1291830dcc9fSSuzuki K Poulose 		.type = ARM64_CPUCAP_STRICT_BOOT_CPU_FEATURE,
1292d88701beSMarc Zyngier 		.matches = runs_at_el2,
1293c0cda3b8SDave Martin 		.cpu_enable = cpu_copy_el2regs,
1294d88701beSMarc Zyngier 	},
1295830dcc9fSSuzuki K Poulose #endif	/* CONFIG_ARM64_VHE */
1296042446a3SSuzuki K Poulose 	{
1297042446a3SSuzuki K Poulose 		.desc = "32-bit EL0 Support",
1298042446a3SSuzuki K Poulose 		.capability = ARM64_HAS_32BIT_EL0,
12995b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1300042446a3SSuzuki K Poulose 		.matches = has_cpuid_feature,
1301042446a3SSuzuki K Poulose 		.sys_reg = SYS_ID_AA64PFR0_EL1,
1302042446a3SSuzuki K Poulose 		.sign = FTR_UNSIGNED,
1303042446a3SSuzuki K Poulose 		.field_pos = ID_AA64PFR0_EL0_SHIFT,
1304042446a3SSuzuki K Poulose 		.min_field_value = ID_AA64PFR0_EL0_32BIT_64BIT,
1305042446a3SSuzuki K Poulose 	},
1306ea1e3de8SWill Deacon #ifdef CONFIG_UNMAP_KERNEL_AT_EL0
1307ea1e3de8SWill Deacon 	{
1308179a56f6SWill Deacon 		.desc = "Kernel page table isolation (KPTI)",
1309ea1e3de8SWill Deacon 		.capability = ARM64_UNMAP_KERNEL_AT_EL0,
1310d3aec8a2SSuzuki K Poulose 		.type = ARM64_CPUCAP_BOOT_RESTRICTED_CPU_LOCAL_FEATURE,
1311d3aec8a2SSuzuki K Poulose 		/*
1312d3aec8a2SSuzuki K Poulose 		 * The ID feature fields below are used to indicate that
1313d3aec8a2SSuzuki K Poulose 		 * the CPU doesn't need KPTI. See unmap_kernel_at_el0 for
1314d3aec8a2SSuzuki K Poulose 		 * more details.
1315d3aec8a2SSuzuki K Poulose 		 */
1316d3aec8a2SSuzuki K Poulose 		.sys_reg = SYS_ID_AA64PFR0_EL1,
1317d3aec8a2SSuzuki K Poulose 		.field_pos = ID_AA64PFR0_CSV3_SHIFT,
1318d3aec8a2SSuzuki K Poulose 		.min_field_value = 1,
1319ea1e3de8SWill Deacon 		.matches = unmap_kernel_at_el0,
1320c0cda3b8SDave Martin 		.cpu_enable = kpti_install_ng_mappings,
1321ea1e3de8SWill Deacon 	},
1322ea1e3de8SWill Deacon #endif
132382e0191aSSuzuki K Poulose 	{
132482e0191aSSuzuki K Poulose 		/* FP/SIMD is not implemented */
132582e0191aSSuzuki K Poulose 		.capability = ARM64_HAS_NO_FPSIMD,
13265b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
132782e0191aSSuzuki K Poulose 		.min_field_value = 0,
132882e0191aSSuzuki K Poulose 		.matches = has_no_fpsimd,
132982e0191aSSuzuki K Poulose 	},
1330d50e071fSRobin Murphy #ifdef CONFIG_ARM64_PMEM
1331d50e071fSRobin Murphy 	{
1332d50e071fSRobin Murphy 		.desc = "Data cache clean to Point of Persistence",
1333d50e071fSRobin Murphy 		.capability = ARM64_HAS_DCPOP,
13345b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1335d50e071fSRobin Murphy 		.matches = has_cpuid_feature,
1336d50e071fSRobin Murphy 		.sys_reg = SYS_ID_AA64ISAR1_EL1,
1337d50e071fSRobin Murphy 		.field_pos = ID_AA64ISAR1_DPB_SHIFT,
1338d50e071fSRobin Murphy 		.min_field_value = 1,
1339d50e071fSRobin Murphy 	},
1340d50e071fSRobin Murphy #endif
134143994d82SDave Martin #ifdef CONFIG_ARM64_SVE
134243994d82SDave Martin 	{
134343994d82SDave Martin 		.desc = "Scalable Vector Extension",
13445b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
134543994d82SDave Martin 		.capability = ARM64_SVE,
134643994d82SDave Martin 		.sys_reg = SYS_ID_AA64PFR0_EL1,
134743994d82SDave Martin 		.sign = FTR_UNSIGNED,
134843994d82SDave Martin 		.field_pos = ID_AA64PFR0_SVE_SHIFT,
134943994d82SDave Martin 		.min_field_value = ID_AA64PFR0_SVE,
135043994d82SDave Martin 		.matches = has_cpuid_feature,
1351c0cda3b8SDave Martin 		.cpu_enable = sve_kernel_enable,
135243994d82SDave Martin 	},
135343994d82SDave Martin #endif /* CONFIG_ARM64_SVE */
135464c02720SXie XiuQi #ifdef CONFIG_ARM64_RAS_EXTN
135564c02720SXie XiuQi 	{
135664c02720SXie XiuQi 		.desc = "RAS Extension Support",
135764c02720SXie XiuQi 		.capability = ARM64_HAS_RAS_EXTN,
13585b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
135964c02720SXie XiuQi 		.matches = has_cpuid_feature,
136064c02720SXie XiuQi 		.sys_reg = SYS_ID_AA64PFR0_EL1,
136164c02720SXie XiuQi 		.sign = FTR_UNSIGNED,
136264c02720SXie XiuQi 		.field_pos = ID_AA64PFR0_RAS_SHIFT,
136364c02720SXie XiuQi 		.min_field_value = ID_AA64PFR0_RAS_V1,
1364c0cda3b8SDave Martin 		.cpu_enable = cpu_clear_disr,
136564c02720SXie XiuQi 	},
136664c02720SXie XiuQi #endif /* CONFIG_ARM64_RAS_EXTN */
13676ae4b6e0SShanker Donthineni 	{
13686ae4b6e0SShanker Donthineni 		.desc = "Data cache clean to the PoU not required for I/D coherence",
13696ae4b6e0SShanker Donthineni 		.capability = ARM64_HAS_CACHE_IDC,
13705b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
13716ae4b6e0SShanker Donthineni 		.matches = has_cache_idc,
13721602df02SSuzuki K Poulose 		.cpu_enable = cpu_emulate_effective_ctr,
13736ae4b6e0SShanker Donthineni 	},
13746ae4b6e0SShanker Donthineni 	{
13756ae4b6e0SShanker Donthineni 		.desc = "Instruction cache invalidation not required for I/D coherence",
13766ae4b6e0SShanker Donthineni 		.capability = ARM64_HAS_CACHE_DIC,
13775b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
13786ae4b6e0SShanker Donthineni 		.matches = has_cache_dic,
13796ae4b6e0SShanker Donthineni 	},
1380e48d53a9SMarc Zyngier 	{
1381e48d53a9SMarc Zyngier 		.desc = "Stage-2 Force Write-Back",
1382e48d53a9SMarc Zyngier 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1383e48d53a9SMarc Zyngier 		.capability = ARM64_HAS_STAGE2_FWB,
1384e48d53a9SMarc Zyngier 		.sys_reg = SYS_ID_AA64MMFR2_EL1,
1385e48d53a9SMarc Zyngier 		.sign = FTR_UNSIGNED,
1386e48d53a9SMarc Zyngier 		.field_pos = ID_AA64MMFR2_FWB_SHIFT,
1387e48d53a9SMarc Zyngier 		.min_field_value = 1,
1388e48d53a9SMarc Zyngier 		.matches = has_cpuid_feature,
1389e48d53a9SMarc Zyngier 		.cpu_enable = cpu_has_fwb,
1390e48d53a9SMarc Zyngier 	},
139105abb595SSuzuki K Poulose #ifdef CONFIG_ARM64_HW_AFDBM
139205abb595SSuzuki K Poulose 	{
139305abb595SSuzuki K Poulose 		/*
139405abb595SSuzuki K Poulose 		 * Since we turn this on always, we don't want the user to
139505abb595SSuzuki K Poulose 		 * think that the feature is available when it may not be.
139605abb595SSuzuki K Poulose 		 * So hide the description.
139705abb595SSuzuki K Poulose 		 *
139805abb595SSuzuki K Poulose 		 * .desc = "Hardware pagetable Dirty Bit Management",
139905abb595SSuzuki K Poulose 		 *
140005abb595SSuzuki K Poulose 		 */
140105abb595SSuzuki K Poulose 		.type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE,
140205abb595SSuzuki K Poulose 		.capability = ARM64_HW_DBM,
140305abb595SSuzuki K Poulose 		.sys_reg = SYS_ID_AA64MMFR1_EL1,
140405abb595SSuzuki K Poulose 		.sign = FTR_UNSIGNED,
140505abb595SSuzuki K Poulose 		.field_pos = ID_AA64MMFR1_HADBS_SHIFT,
140605abb595SSuzuki K Poulose 		.min_field_value = 2,
140705abb595SSuzuki K Poulose 		.matches = has_hw_dbm,
140805abb595SSuzuki K Poulose 		.cpu_enable = cpu_enable_hw_dbm,
140905abb595SSuzuki K Poulose 	},
141005abb595SSuzuki K Poulose #endif
14118f04e8e6SWill Deacon #ifdef CONFIG_ARM64_SSBD
141286d0dd34SArd Biesheuvel 	{
141386d0dd34SArd Biesheuvel 		.desc = "CRC32 instructions",
141486d0dd34SArd Biesheuvel 		.capability = ARM64_HAS_CRC32,
141586d0dd34SArd Biesheuvel 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
141686d0dd34SArd Biesheuvel 		.matches = has_cpuid_feature,
141786d0dd34SArd Biesheuvel 		.sys_reg = SYS_ID_AA64ISAR0_EL1,
141886d0dd34SArd Biesheuvel 		.field_pos = ID_AA64ISAR0_CRC32_SHIFT,
141986d0dd34SArd Biesheuvel 		.min_field_value = 1,
142086d0dd34SArd Biesheuvel 	},
1421d71be2b6SWill Deacon 	{
1422d71be2b6SWill Deacon 		.desc = "Speculative Store Bypassing Safe (SSBS)",
1423d71be2b6SWill Deacon 		.capability = ARM64_SSBS,
1424d71be2b6SWill Deacon 		.type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE,
1425d71be2b6SWill Deacon 		.matches = has_cpuid_feature,
1426d71be2b6SWill Deacon 		.sys_reg = SYS_ID_AA64PFR1_EL1,
1427d71be2b6SWill Deacon 		.field_pos = ID_AA64PFR1_SSBS_SHIFT,
1428d71be2b6SWill Deacon 		.sign = FTR_UNSIGNED,
1429d71be2b6SWill Deacon 		.min_field_value = ID_AA64PFR1_SSBS_PSTATE_ONLY,
14308f04e8e6SWill Deacon 		.cpu_enable = cpu_enable_ssbs,
1431d71be2b6SWill Deacon 	},
14328f04e8e6SWill Deacon #endif
14335ffdfaedSVladimir Murzin #ifdef CONFIG_ARM64_CNP
14345ffdfaedSVladimir Murzin 	{
14355ffdfaedSVladimir Murzin 		.desc = "Common not Private translations",
14365ffdfaedSVladimir Murzin 		.capability = ARM64_HAS_CNP,
14375ffdfaedSVladimir Murzin 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
14385ffdfaedSVladimir Murzin 		.matches = has_useable_cnp,
14395ffdfaedSVladimir Murzin 		.sys_reg = SYS_ID_AA64MMFR2_EL1,
14405ffdfaedSVladimir Murzin 		.sign = FTR_UNSIGNED,
14415ffdfaedSVladimir Murzin 		.field_pos = ID_AA64MMFR2_CNP_SHIFT,
14425ffdfaedSVladimir Murzin 		.min_field_value = 1,
14435ffdfaedSVladimir Murzin 		.cpu_enable = cpu_enable_cnp,
14445ffdfaedSVladimir Murzin 	},
14455ffdfaedSVladimir Murzin #endif
1446bd4fb6d2SWill Deacon 	{
1447bd4fb6d2SWill Deacon 		.desc = "Speculation barrier (SB)",
1448bd4fb6d2SWill Deacon 		.capability = ARM64_HAS_SB,
1449bd4fb6d2SWill Deacon 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1450bd4fb6d2SWill Deacon 		.matches = has_cpuid_feature,
1451bd4fb6d2SWill Deacon 		.sys_reg = SYS_ID_AA64ISAR1_EL1,
1452bd4fb6d2SWill Deacon 		.field_pos = ID_AA64ISAR1_SB_SHIFT,
1453bd4fb6d2SWill Deacon 		.sign = FTR_UNSIGNED,
1454bd4fb6d2SWill Deacon 		.min_field_value = 1,
1455bd4fb6d2SWill Deacon 	},
1456*6984eb47SMark Rutland #ifdef CONFIG_ARM64_PTR_AUTH
1457*6984eb47SMark Rutland 	{
1458*6984eb47SMark Rutland 		.desc = "Address authentication (architected algorithm)",
1459*6984eb47SMark Rutland 		.capability = ARM64_HAS_ADDRESS_AUTH_ARCH,
1460*6984eb47SMark Rutland 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1461*6984eb47SMark Rutland 		.sys_reg = SYS_ID_AA64ISAR1_EL1,
1462*6984eb47SMark Rutland 		.sign = FTR_UNSIGNED,
1463*6984eb47SMark Rutland 		.field_pos = ID_AA64ISAR1_APA_SHIFT,
1464*6984eb47SMark Rutland 		.min_field_value = ID_AA64ISAR1_APA_ARCHITECTED,
1465*6984eb47SMark Rutland 		.matches = has_cpuid_feature,
1466*6984eb47SMark Rutland 	},
1467*6984eb47SMark Rutland 	{
1468*6984eb47SMark Rutland 		.desc = "Address authentication (IMP DEF algorithm)",
1469*6984eb47SMark Rutland 		.capability = ARM64_HAS_ADDRESS_AUTH_IMP_DEF,
1470*6984eb47SMark Rutland 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1471*6984eb47SMark Rutland 		.sys_reg = SYS_ID_AA64ISAR1_EL1,
1472*6984eb47SMark Rutland 		.sign = FTR_UNSIGNED,
1473*6984eb47SMark Rutland 		.field_pos = ID_AA64ISAR1_API_SHIFT,
1474*6984eb47SMark Rutland 		.min_field_value = ID_AA64ISAR1_API_IMP_DEF,
1475*6984eb47SMark Rutland 		.matches = has_cpuid_feature,
1476*6984eb47SMark Rutland 	},
1477*6984eb47SMark Rutland 	{
1478*6984eb47SMark Rutland 		.capability = ARM64_HAS_ADDRESS_AUTH,
1479*6984eb47SMark Rutland 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1480*6984eb47SMark Rutland 		.matches = has_address_auth,
1481*6984eb47SMark Rutland 	},
1482*6984eb47SMark Rutland 	{
1483*6984eb47SMark Rutland 		.desc = "Generic authentication (architected algorithm)",
1484*6984eb47SMark Rutland 		.capability = ARM64_HAS_GENERIC_AUTH_ARCH,
1485*6984eb47SMark Rutland 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1486*6984eb47SMark Rutland 		.sys_reg = SYS_ID_AA64ISAR1_EL1,
1487*6984eb47SMark Rutland 		.sign = FTR_UNSIGNED,
1488*6984eb47SMark Rutland 		.field_pos = ID_AA64ISAR1_GPA_SHIFT,
1489*6984eb47SMark Rutland 		.min_field_value = ID_AA64ISAR1_GPA_ARCHITECTED,
1490*6984eb47SMark Rutland 		.matches = has_cpuid_feature,
1491*6984eb47SMark Rutland 	},
1492*6984eb47SMark Rutland 	{
1493*6984eb47SMark Rutland 		.desc = "Generic authentication (IMP DEF algorithm)",
1494*6984eb47SMark Rutland 		.capability = ARM64_HAS_GENERIC_AUTH_IMP_DEF,
1495*6984eb47SMark Rutland 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1496*6984eb47SMark Rutland 		.sys_reg = SYS_ID_AA64ISAR1_EL1,
1497*6984eb47SMark Rutland 		.sign = FTR_UNSIGNED,
1498*6984eb47SMark Rutland 		.field_pos = ID_AA64ISAR1_GPI_SHIFT,
1499*6984eb47SMark Rutland 		.min_field_value = ID_AA64ISAR1_GPI_IMP_DEF,
1500*6984eb47SMark Rutland 		.matches = has_cpuid_feature,
1501*6984eb47SMark Rutland 	},
1502*6984eb47SMark Rutland 	{
1503*6984eb47SMark Rutland 		.capability = ARM64_HAS_GENERIC_AUTH,
1504*6984eb47SMark Rutland 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,
1505*6984eb47SMark Rutland 		.matches = has_generic_auth,
1506*6984eb47SMark Rutland 	},
1507*6984eb47SMark Rutland #endif /* CONFIG_ARM64_PTR_AUTH */
1508359b7064SMarc Zyngier 	{},
1509359b7064SMarc Zyngier };
1510359b7064SMarc Zyngier 
1511143ba05dSSuzuki K Poulose #define HWCAP_CAP(reg, field, s, min_value, cap_type, cap)	\
151237b01d53SSuzuki K. Poulose 	{							\
151337b01d53SSuzuki K. Poulose 		.desc = #cap,					\
15145b4747c5SSuzuki K Poulose 		.type = ARM64_CPUCAP_SYSTEM_FEATURE,		\
151537b01d53SSuzuki K. Poulose 		.matches = has_cpuid_feature,			\
151637b01d53SSuzuki K. Poulose 		.sys_reg = reg,					\
151737b01d53SSuzuki K. Poulose 		.field_pos = field,				\
1518ff96f7bcSSuzuki K Poulose 		.sign = s,					\
151937b01d53SSuzuki K. Poulose 		.min_field_value = min_value,			\
1520143ba05dSSuzuki K Poulose 		.hwcap_type = cap_type,				\
152137b01d53SSuzuki K. Poulose 		.hwcap = cap,					\
152237b01d53SSuzuki K. Poulose 	}
152337b01d53SSuzuki K. Poulose 
1524f3efb675SSuzuki K Poulose static const struct arm64_cpu_capabilities arm64_elf_hwcaps[] = {
1525ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_AES_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_PMULL),
1526ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_AES_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_AES),
1527ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA1_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA1),
1528ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA2_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA2),
1529f5e035f8SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA2_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_SHA512),
1530ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_CRC32_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_CRC32),
1531ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_ATOMICS_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_ATOMICS),
1532f92f5ce0SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_RDM_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDRDM),
1533f5e035f8SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA3_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA3),
1534f5e035f8SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SM3_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SM3),
1535f5e035f8SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SM4_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SM4),
1536f5e035f8SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_DP_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDDP),
15373b3b6810SDongjiu Geng 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_FHM_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDFHM),
15387206dc93SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_TS_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_FLAGM),
1539ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_FP_SHIFT, FTR_SIGNED, 0, CAP_HWCAP, HWCAP_FP),
1540bf500618SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_FP_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_FPHP),
1541ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_ASIMD_SHIFT, FTR_SIGNED, 0, CAP_HWCAP, HWCAP_ASIMD),
1542bf500618SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_ASIMD_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_ASIMDHP),
15437206dc93SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_DIT_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_DIT),
15447aac405eSRobin Murphy 	HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_DPB_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_DCPOP),
1545c8c3798dSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_JSCVT_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_JSCVT),
1546cb567e79SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_FCMA_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_FCMA),
1547c651aae5SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_LRCPC_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_LRCPC),
15487206dc93SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_LRCPC_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_ILRCPC),
1549bd4fb6d2SWill Deacon 	HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_SB_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SB),
15507206dc93SSuzuki K Poulose 	HWCAP_CAP(SYS_ID_AA64MMFR2_EL1, ID_AA64MMFR2_AT_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_USCAT),
155143994d82SDave Martin #ifdef CONFIG_ARM64_SVE
155243994d82SDave Martin 	HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_SVE_SHIFT, FTR_UNSIGNED, ID_AA64PFR0_SVE, CAP_HWCAP, HWCAP_SVE),
155343994d82SDave Martin #endif
1554d71be2b6SWill Deacon 	HWCAP_CAP(SYS_ID_AA64PFR1_EL1, ID_AA64PFR1_SSBS_SHIFT, FTR_UNSIGNED, ID_AA64PFR1_SSBS_PSTATE_INSNS, CAP_HWCAP, HWCAP_SSBS),
155575283501SSuzuki K Poulose 	{},
155675283501SSuzuki K Poulose };
155775283501SSuzuki K Poulose 
155875283501SSuzuki K Poulose static const struct arm64_cpu_capabilities compat_elf_hwcaps[] = {
155937b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT
1560ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 2, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_PMULL),
1561ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_AES),
1562ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_SHA1_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_SHA1),
1563ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_SHA2_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_SHA2),
1564ff96f7bcSSuzuki K Poulose 	HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_CRC32_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_CRC32),
156537b01d53SSuzuki K. Poulose #endif
156637b01d53SSuzuki K. Poulose 	{},
156737b01d53SSuzuki K. Poulose };
156837b01d53SSuzuki K. Poulose 
1569f3efb675SSuzuki K Poulose static void __init cap_set_elf_hwcap(const struct arm64_cpu_capabilities *cap)
157037b01d53SSuzuki K. Poulose {
157137b01d53SSuzuki K. Poulose 	switch (cap->hwcap_type) {
157237b01d53SSuzuki K. Poulose 	case CAP_HWCAP:
157337b01d53SSuzuki K. Poulose 		elf_hwcap |= cap->hwcap;
157437b01d53SSuzuki K. Poulose 		break;
157537b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT
157637b01d53SSuzuki K. Poulose 	case CAP_COMPAT_HWCAP:
157737b01d53SSuzuki K. Poulose 		compat_elf_hwcap |= (u32)cap->hwcap;
157837b01d53SSuzuki K. Poulose 		break;
157937b01d53SSuzuki K. Poulose 	case CAP_COMPAT_HWCAP2:
158037b01d53SSuzuki K. Poulose 		compat_elf_hwcap2 |= (u32)cap->hwcap;
158137b01d53SSuzuki K. Poulose 		break;
158237b01d53SSuzuki K. Poulose #endif
158337b01d53SSuzuki K. Poulose 	default:
158437b01d53SSuzuki K. Poulose 		WARN_ON(1);
158537b01d53SSuzuki K. Poulose 		break;
158637b01d53SSuzuki K. Poulose 	}
158737b01d53SSuzuki K. Poulose }
158837b01d53SSuzuki K. Poulose 
158937b01d53SSuzuki K. Poulose /* Check if we have a particular HWCAP enabled */
1590f3efb675SSuzuki K Poulose static bool cpus_have_elf_hwcap(const struct arm64_cpu_capabilities *cap)
159137b01d53SSuzuki K. Poulose {
159237b01d53SSuzuki K. Poulose 	bool rc;
159337b01d53SSuzuki K. Poulose 
159437b01d53SSuzuki K. Poulose 	switch (cap->hwcap_type) {
159537b01d53SSuzuki K. Poulose 	case CAP_HWCAP:
159637b01d53SSuzuki K. Poulose 		rc = (elf_hwcap & cap->hwcap) != 0;
159737b01d53SSuzuki K. Poulose 		break;
159837b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT
159937b01d53SSuzuki K. Poulose 	case CAP_COMPAT_HWCAP:
160037b01d53SSuzuki K. Poulose 		rc = (compat_elf_hwcap & (u32)cap->hwcap) != 0;
160137b01d53SSuzuki K. Poulose 		break;
160237b01d53SSuzuki K. Poulose 	case CAP_COMPAT_HWCAP2:
160337b01d53SSuzuki K. Poulose 		rc = (compat_elf_hwcap2 & (u32)cap->hwcap) != 0;
160437b01d53SSuzuki K. Poulose 		break;
160537b01d53SSuzuki K. Poulose #endif
160637b01d53SSuzuki K. Poulose 	default:
160737b01d53SSuzuki K. Poulose 		WARN_ON(1);
160837b01d53SSuzuki K. Poulose 		rc = false;
160937b01d53SSuzuki K. Poulose 	}
161037b01d53SSuzuki K. Poulose 
161137b01d53SSuzuki K. Poulose 	return rc;
161237b01d53SSuzuki K. Poulose }
161337b01d53SSuzuki K. Poulose 
161475283501SSuzuki K Poulose static void __init setup_elf_hwcaps(const struct arm64_cpu_capabilities *hwcaps)
161537b01d53SSuzuki K. Poulose {
161677c97b4eSSuzuki K Poulose 	/* We support emulation of accesses to CPU ID feature registers */
161777c97b4eSSuzuki K Poulose 	elf_hwcap |= HWCAP_CPUID;
161875283501SSuzuki K Poulose 	for (; hwcaps->matches; hwcaps++)
1619143ba05dSSuzuki K Poulose 		if (hwcaps->matches(hwcaps, cpucap_default_scope(hwcaps)))
162075283501SSuzuki K Poulose 			cap_set_elf_hwcap(hwcaps);
162137b01d53SSuzuki K. Poulose }
162237b01d53SSuzuki K. Poulose 
1623606f8e7bSSuzuki K Poulose static void update_cpu_capabilities(u16 scope_mask)
1624359b7064SMarc Zyngier {
1625606f8e7bSSuzuki K Poulose 	int i;
1626606f8e7bSSuzuki K Poulose 	const struct arm64_cpu_capabilities *caps;
1627606f8e7bSSuzuki K Poulose 
1628cce360b5SSuzuki K Poulose 	scope_mask &= ARM64_CPUCAP_SCOPE_MASK;
1629606f8e7bSSuzuki K Poulose 	for (i = 0; i < ARM64_NCAPS; i++) {
1630606f8e7bSSuzuki K Poulose 		caps = cpu_hwcaps_ptrs[i];
1631606f8e7bSSuzuki K Poulose 		if (!caps || !(caps->type & scope_mask) ||
1632606f8e7bSSuzuki K Poulose 		    cpus_have_cap(caps->capability) ||
1633cce360b5SSuzuki K Poulose 		    !caps->matches(caps, cpucap_default_scope(caps)))
1634359b7064SMarc Zyngier 			continue;
1635359b7064SMarc Zyngier 
1636606f8e7bSSuzuki K Poulose 		if (caps->desc)
1637606f8e7bSSuzuki K Poulose 			pr_info("detected: %s\n", caps->desc);
163875283501SSuzuki K Poulose 		cpus_set_cap(caps->capability);
1639359b7064SMarc Zyngier 	}
1640359b7064SMarc Zyngier }
1641359b7064SMarc Zyngier 
16420b587c84SSuzuki K Poulose /*
16430b587c84SSuzuki K Poulose  * Enable all the available capabilities on this CPU. The capabilities
16440b587c84SSuzuki K Poulose  * with BOOT_CPU scope are handled separately and hence skipped here.
16450b587c84SSuzuki K Poulose  */
16460b587c84SSuzuki K Poulose static int cpu_enable_non_boot_scope_capabilities(void *__unused)
1647c0cda3b8SDave Martin {
16480b587c84SSuzuki K Poulose 	int i;
16490b587c84SSuzuki K Poulose 	u16 non_boot_scope = SCOPE_ALL & ~SCOPE_BOOT_CPU;
1650c0cda3b8SDave Martin 
16510b587c84SSuzuki K Poulose 	for_each_available_cap(i) {
16520b587c84SSuzuki K Poulose 		const struct arm64_cpu_capabilities *cap = cpu_hwcaps_ptrs[i];
16530b587c84SSuzuki K Poulose 
16540b587c84SSuzuki K Poulose 		if (WARN_ON(!cap))
16550b587c84SSuzuki K Poulose 			continue;
16560b587c84SSuzuki K Poulose 
16570b587c84SSuzuki K Poulose 		if (!(cap->type & non_boot_scope))
16580b587c84SSuzuki K Poulose 			continue;
16590b587c84SSuzuki K Poulose 
16600b587c84SSuzuki K Poulose 		if (cap->cpu_enable)
1661c0cda3b8SDave Martin 			cap->cpu_enable(cap);
16620b587c84SSuzuki K Poulose 	}
1663c0cda3b8SDave Martin 	return 0;
1664c0cda3b8SDave Martin }
1665c0cda3b8SDave Martin 
1666ce8b602cSSuzuki K. Poulose /*
1667dbb4e152SSuzuki K. Poulose  * Run through the enabled capabilities and enable() it on all active
1668dbb4e152SSuzuki K. Poulose  * CPUs
1669ce8b602cSSuzuki K. Poulose  */
16700b587c84SSuzuki K Poulose static void __init enable_cpu_capabilities(u16 scope_mask)
1671359b7064SMarc Zyngier {
16720b587c84SSuzuki K Poulose 	int i;
16730b587c84SSuzuki K Poulose 	const struct arm64_cpu_capabilities *caps;
16740b587c84SSuzuki K Poulose 	bool boot_scope;
167563a1e1c9SMark Rutland 
16760b587c84SSuzuki K Poulose 	scope_mask &= ARM64_CPUCAP_SCOPE_MASK;
16770b587c84SSuzuki K Poulose 	boot_scope = !!(scope_mask & SCOPE_BOOT_CPU);
16780b587c84SSuzuki K Poulose 
16790b587c84SSuzuki K Poulose 	for (i = 0; i < ARM64_NCAPS; i++) {
16800b587c84SSuzuki K Poulose 		unsigned int num;
16810b587c84SSuzuki K Poulose 
16820b587c84SSuzuki K Poulose 		caps = cpu_hwcaps_ptrs[i];
16830b587c84SSuzuki K Poulose 		if (!caps || !(caps->type & scope_mask))
16840b587c84SSuzuki K Poulose 			continue;
16850b587c84SSuzuki K Poulose 		num = caps->capability;
16860b587c84SSuzuki K Poulose 		if (!cpus_have_cap(num))
168763a1e1c9SMark Rutland 			continue;
168863a1e1c9SMark Rutland 
168963a1e1c9SMark Rutland 		/* Ensure cpus_have_const_cap(num) works */
169063a1e1c9SMark Rutland 		static_branch_enable(&cpu_hwcap_keys[num]);
169163a1e1c9SMark Rutland 
16920b587c84SSuzuki K Poulose 		if (boot_scope && caps->cpu_enable)
16932a6dcb2bSJames Morse 			/*
1694fd9d63daSSuzuki K Poulose 			 * Capabilities with SCOPE_BOOT_CPU scope are finalised
1695fd9d63daSSuzuki K Poulose 			 * before any secondary CPU boots. Thus, each secondary
1696fd9d63daSSuzuki K Poulose 			 * will enable the capability as appropriate via
1697fd9d63daSSuzuki K Poulose 			 * check_local_cpu_capabilities(). The only exception is
1698fd9d63daSSuzuki K Poulose 			 * the boot CPU, for which the capability must be
1699fd9d63daSSuzuki K Poulose 			 * enabled here. This approach avoids costly
1700fd9d63daSSuzuki K Poulose 			 * stop_machine() calls for this case.
17012a6dcb2bSJames Morse 			 */
1702fd9d63daSSuzuki K Poulose 			caps->cpu_enable(caps);
170363a1e1c9SMark Rutland 	}
1704dbb4e152SSuzuki K. Poulose 
17050b587c84SSuzuki K Poulose 	/*
17060b587c84SSuzuki K Poulose 	 * For all non-boot scope capabilities, use stop_machine()
17070b587c84SSuzuki K Poulose 	 * as it schedules the work allowing us to modify PSTATE,
17080b587c84SSuzuki K Poulose 	 * instead of on_each_cpu() which uses an IPI, giving us a
17090b587c84SSuzuki K Poulose 	 * PSTATE that disappears when we return.
17100b587c84SSuzuki K Poulose 	 */
17110b587c84SSuzuki K Poulose 	if (!boot_scope)
17120b587c84SSuzuki K Poulose 		stop_machine(cpu_enable_non_boot_scope_capabilities,
17130b587c84SSuzuki K Poulose 			     NULL, cpu_online_mask);
1714ed478b3fSSuzuki K Poulose }
1715ed478b3fSSuzuki K Poulose 
1716dbb4e152SSuzuki K. Poulose /*
1717eaac4d83SSuzuki K Poulose  * Run through the list of capabilities to check for conflicts.
1718eaac4d83SSuzuki K Poulose  * If the system has already detected a capability, take necessary
1719eaac4d83SSuzuki K Poulose  * action on this CPU.
1720eaac4d83SSuzuki K Poulose  *
1721eaac4d83SSuzuki K Poulose  * Returns "false" on conflicts.
1722eaac4d83SSuzuki K Poulose  */
1723606f8e7bSSuzuki K Poulose static bool verify_local_cpu_caps(u16 scope_mask)
1724eaac4d83SSuzuki K Poulose {
1725606f8e7bSSuzuki K Poulose 	int i;
1726eaac4d83SSuzuki K Poulose 	bool cpu_has_cap, system_has_cap;
1727606f8e7bSSuzuki K Poulose 	const struct arm64_cpu_capabilities *caps;
1728eaac4d83SSuzuki K Poulose 
1729cce360b5SSuzuki K Poulose 	scope_mask &= ARM64_CPUCAP_SCOPE_MASK;
1730cce360b5SSuzuki K Poulose 
1731606f8e7bSSuzuki K Poulose 	for (i = 0; i < ARM64_NCAPS; i++) {
1732606f8e7bSSuzuki K Poulose 		caps = cpu_hwcaps_ptrs[i];
1733606f8e7bSSuzuki K Poulose 		if (!caps || !(caps->type & scope_mask))
1734cce360b5SSuzuki K Poulose 			continue;
1735cce360b5SSuzuki K Poulose 
1736ba7d9233SSuzuki K Poulose 		cpu_has_cap = caps->matches(caps, SCOPE_LOCAL_CPU);
1737eaac4d83SSuzuki K Poulose 		system_has_cap = cpus_have_cap(caps->capability);
1738eaac4d83SSuzuki K Poulose 
1739eaac4d83SSuzuki K Poulose 		if (system_has_cap) {
1740eaac4d83SSuzuki K Poulose 			/*
1741eaac4d83SSuzuki K Poulose 			 * Check if the new CPU misses an advertised feature,
1742eaac4d83SSuzuki K Poulose 			 * which is not safe to miss.
1743eaac4d83SSuzuki K Poulose 			 */
1744eaac4d83SSuzuki K Poulose 			if (!cpu_has_cap && !cpucap_late_cpu_optional(caps))
1745eaac4d83SSuzuki K Poulose 				break;
1746eaac4d83SSuzuki K Poulose 			/*
1747eaac4d83SSuzuki K Poulose 			 * We have to issue cpu_enable() irrespective of
1748eaac4d83SSuzuki K Poulose 			 * whether the CPU has it or not, as it is enabeld
1749eaac4d83SSuzuki K Poulose 			 * system wide. It is upto the call back to take
1750eaac4d83SSuzuki K Poulose 			 * appropriate action on this CPU.
1751eaac4d83SSuzuki K Poulose 			 */
1752eaac4d83SSuzuki K Poulose 			if (caps->cpu_enable)
1753eaac4d83SSuzuki K Poulose 				caps->cpu_enable(caps);
1754eaac4d83SSuzuki K Poulose 		} else {
1755eaac4d83SSuzuki K Poulose 			/*
1756eaac4d83SSuzuki K Poulose 			 * Check if the CPU has this capability if it isn't
1757eaac4d83SSuzuki K Poulose 			 * safe to have when the system doesn't.
1758eaac4d83SSuzuki K Poulose 			 */
1759eaac4d83SSuzuki K Poulose 			if (cpu_has_cap && !cpucap_late_cpu_permitted(caps))
1760eaac4d83SSuzuki K Poulose 				break;
1761eaac4d83SSuzuki K Poulose 		}
1762eaac4d83SSuzuki K Poulose 	}
1763eaac4d83SSuzuki K Poulose 
1764606f8e7bSSuzuki K Poulose 	if (i < ARM64_NCAPS) {
1765eaac4d83SSuzuki K Poulose 		pr_crit("CPU%d: Detected conflict for capability %d (%s), System: %d, CPU: %d\n",
1766eaac4d83SSuzuki K Poulose 			smp_processor_id(), caps->capability,
1767eaac4d83SSuzuki K Poulose 			caps->desc, system_has_cap, cpu_has_cap);
1768eaac4d83SSuzuki K Poulose 		return false;
1769eaac4d83SSuzuki K Poulose 	}
1770eaac4d83SSuzuki K Poulose 
1771eaac4d83SSuzuki K Poulose 	return true;
1772eaac4d83SSuzuki K Poulose }
1773eaac4d83SSuzuki K Poulose 
1774eaac4d83SSuzuki K Poulose /*
177513f417f3SSuzuki K Poulose  * Check for CPU features that are used in early boot
177613f417f3SSuzuki K Poulose  * based on the Boot CPU value.
1777dbb4e152SSuzuki K. Poulose  */
177813f417f3SSuzuki K Poulose static void check_early_cpu_features(void)
1779dbb4e152SSuzuki K. Poulose {
178013f417f3SSuzuki K Poulose 	verify_cpu_asid_bits();
1781fd9d63daSSuzuki K Poulose 	/*
1782fd9d63daSSuzuki K Poulose 	 * Early features are used by the kernel already. If there
1783fd9d63daSSuzuki K Poulose 	 * is a conflict, we cannot proceed further.
1784fd9d63daSSuzuki K Poulose 	 */
1785fd9d63daSSuzuki K Poulose 	if (!verify_local_cpu_caps(SCOPE_BOOT_CPU))
1786fd9d63daSSuzuki K Poulose 		cpu_panic_kernel();
1787dbb4e152SSuzuki K. Poulose }
1788dbb4e152SSuzuki K. Poulose 
178975283501SSuzuki K Poulose static void
179075283501SSuzuki K Poulose verify_local_elf_hwcaps(const struct arm64_cpu_capabilities *caps)
179175283501SSuzuki K Poulose {
179275283501SSuzuki K Poulose 
179392406f0cSSuzuki K Poulose 	for (; caps->matches; caps++)
179492406f0cSSuzuki K Poulose 		if (cpus_have_elf_hwcap(caps) && !caps->matches(caps, SCOPE_LOCAL_CPU)) {
179575283501SSuzuki K Poulose 			pr_crit("CPU%d: missing HWCAP: %s\n",
179675283501SSuzuki K Poulose 					smp_processor_id(), caps->desc);
179775283501SSuzuki K Poulose 			cpu_die_early();
179875283501SSuzuki K Poulose 		}
179975283501SSuzuki K Poulose }
180075283501SSuzuki K Poulose 
18012e0f2478SDave Martin static void verify_sve_features(void)
18022e0f2478SDave Martin {
18032e0f2478SDave Martin 	u64 safe_zcr = read_sanitised_ftr_reg(SYS_ZCR_EL1);
18042e0f2478SDave Martin 	u64 zcr = read_zcr_features();
18052e0f2478SDave Martin 
18062e0f2478SDave Martin 	unsigned int safe_len = safe_zcr & ZCR_ELx_LEN_MASK;
18072e0f2478SDave Martin 	unsigned int len = zcr & ZCR_ELx_LEN_MASK;
18082e0f2478SDave Martin 
18092e0f2478SDave Martin 	if (len < safe_len || sve_verify_vq_map()) {
18102e0f2478SDave Martin 		pr_crit("CPU%d: SVE: required vector length(s) missing\n",
18112e0f2478SDave Martin 			smp_processor_id());
18122e0f2478SDave Martin 		cpu_die_early();
18132e0f2478SDave Martin 	}
18142e0f2478SDave Martin 
18152e0f2478SDave Martin 	/* Add checks on other ZCR bits here if necessary */
18162e0f2478SDave Martin }
18172e0f2478SDave Martin 
18181e89baedSSuzuki K Poulose 
18191e89baedSSuzuki K Poulose /*
1820dbb4e152SSuzuki K. Poulose  * Run through the enabled system capabilities and enable() it on this CPU.
1821dbb4e152SSuzuki K. Poulose  * The capabilities were decided based on the available CPUs at the boot time.
1822dbb4e152SSuzuki K. Poulose  * Any new CPU should match the system wide status of the capability. If the
1823dbb4e152SSuzuki K. Poulose  * new CPU doesn't have a capability which the system now has enabled, we
1824dbb4e152SSuzuki K. Poulose  * cannot do anything to fix it up and could cause unexpected failures. So
1825dbb4e152SSuzuki K. Poulose  * we park the CPU.
1826dbb4e152SSuzuki K. Poulose  */
1827c47a1900SSuzuki K Poulose static void verify_local_cpu_capabilities(void)
1828dbb4e152SSuzuki K. Poulose {
1829fd9d63daSSuzuki K Poulose 	/*
1830fd9d63daSSuzuki K Poulose 	 * The capabilities with SCOPE_BOOT_CPU are checked from
1831fd9d63daSSuzuki K Poulose 	 * check_early_cpu_features(), as they need to be verified
1832fd9d63daSSuzuki K Poulose 	 * on all secondary CPUs.
1833fd9d63daSSuzuki K Poulose 	 */
1834fd9d63daSSuzuki K Poulose 	if (!verify_local_cpu_caps(SCOPE_ALL & ~SCOPE_BOOT_CPU))
1835600b9c91SSuzuki K Poulose 		cpu_die_early();
1836ed478b3fSSuzuki K Poulose 
183775283501SSuzuki K Poulose 	verify_local_elf_hwcaps(arm64_elf_hwcaps);
18382e0f2478SDave Martin 
1839643d703dSSuzuki K Poulose 	if (system_supports_32bit_el0())
184075283501SSuzuki K Poulose 		verify_local_elf_hwcaps(compat_elf_hwcaps);
18412e0f2478SDave Martin 
18422e0f2478SDave Martin 	if (system_supports_sve())
18432e0f2478SDave Martin 		verify_sve_features();
1844dbb4e152SSuzuki K. Poulose }
1845dbb4e152SSuzuki K. Poulose 
1846c47a1900SSuzuki K Poulose void check_local_cpu_capabilities(void)
1847c47a1900SSuzuki K Poulose {
1848c47a1900SSuzuki K Poulose 	/*
1849c47a1900SSuzuki K Poulose 	 * All secondary CPUs should conform to the early CPU features
1850c47a1900SSuzuki K Poulose 	 * in use by the kernel based on boot CPU.
1851c47a1900SSuzuki K Poulose 	 */
1852c47a1900SSuzuki K Poulose 	check_early_cpu_features();
1853c47a1900SSuzuki K Poulose 
1854c47a1900SSuzuki K Poulose 	/*
1855c47a1900SSuzuki K Poulose 	 * If we haven't finalised the system capabilities, this CPU gets
1856fbd890b9SSuzuki K Poulose 	 * a chance to update the errata work arounds and local features.
1857c47a1900SSuzuki K Poulose 	 * Otherwise, this CPU should verify that it has all the system
1858c47a1900SSuzuki K Poulose 	 * advertised capabilities.
1859c47a1900SSuzuki K Poulose 	 */
1860ed478b3fSSuzuki K Poulose 	if (!sys_caps_initialised)
1861ed478b3fSSuzuki K Poulose 		update_cpu_capabilities(SCOPE_LOCAL_CPU);
1862ed478b3fSSuzuki K Poulose 	else
1863c47a1900SSuzuki K Poulose 		verify_local_cpu_capabilities();
1864c47a1900SSuzuki K Poulose }
1865c47a1900SSuzuki K Poulose 
1866fd9d63daSSuzuki K Poulose static void __init setup_boot_cpu_capabilities(void)
1867fd9d63daSSuzuki K Poulose {
1868fd9d63daSSuzuki K Poulose 	/* Detect capabilities with either SCOPE_BOOT_CPU or SCOPE_LOCAL_CPU */
1869fd9d63daSSuzuki K Poulose 	update_cpu_capabilities(SCOPE_BOOT_CPU | SCOPE_LOCAL_CPU);
1870fd9d63daSSuzuki K Poulose 	/* Enable the SCOPE_BOOT_CPU capabilities alone right away */
1871fd9d63daSSuzuki K Poulose 	enable_cpu_capabilities(SCOPE_BOOT_CPU);
1872fd9d63daSSuzuki K Poulose }
1873fd9d63daSSuzuki K Poulose 
187463a1e1c9SMark Rutland DEFINE_STATIC_KEY_FALSE(arm64_const_caps_ready);
187563a1e1c9SMark Rutland EXPORT_SYMBOL(arm64_const_caps_ready);
187663a1e1c9SMark Rutland 
187763a1e1c9SMark Rutland static void __init mark_const_caps_ready(void)
187863a1e1c9SMark Rutland {
187963a1e1c9SMark Rutland 	static_branch_enable(&arm64_const_caps_ready);
188063a1e1c9SMark Rutland }
188163a1e1c9SMark Rutland 
1882f7bfc14aSSuzuki K Poulose bool this_cpu_has_cap(unsigned int n)
18838f413758SMarc Zyngier {
1884f7bfc14aSSuzuki K Poulose 	if (!WARN_ON(preemptible()) && n < ARM64_NCAPS) {
1885f7bfc14aSSuzuki K Poulose 		const struct arm64_cpu_capabilities *cap = cpu_hwcaps_ptrs[n];
1886f7bfc14aSSuzuki K Poulose 
1887f7bfc14aSSuzuki K Poulose 		if (cap)
1888f7bfc14aSSuzuki K Poulose 			return cap->matches(cap, SCOPE_LOCAL_CPU);
1889f7bfc14aSSuzuki K Poulose 	}
1890f7bfc14aSSuzuki K Poulose 
1891f7bfc14aSSuzuki K Poulose 	return false;
18928f413758SMarc Zyngier }
18938f413758SMarc Zyngier 
1894ed478b3fSSuzuki K Poulose static void __init setup_system_capabilities(void)
1895ed478b3fSSuzuki K Poulose {
1896ed478b3fSSuzuki K Poulose 	/*
1897ed478b3fSSuzuki K Poulose 	 * We have finalised the system-wide safe feature
1898ed478b3fSSuzuki K Poulose 	 * registers, finalise the capabilities that depend
1899fd9d63daSSuzuki K Poulose 	 * on it. Also enable all the available capabilities,
1900fd9d63daSSuzuki K Poulose 	 * that are not enabled already.
1901ed478b3fSSuzuki K Poulose 	 */
1902ed478b3fSSuzuki K Poulose 	update_cpu_capabilities(SCOPE_SYSTEM);
1903fd9d63daSSuzuki K Poulose 	enable_cpu_capabilities(SCOPE_ALL & ~SCOPE_BOOT_CPU);
1904ed478b3fSSuzuki K Poulose }
1905ed478b3fSSuzuki K Poulose 
19069cdf8ec4SSuzuki K. Poulose void __init setup_cpu_features(void)
19079cdf8ec4SSuzuki K. Poulose {
19089cdf8ec4SSuzuki K. Poulose 	u32 cwg;
19099cdf8ec4SSuzuki K. Poulose 
1910ed478b3fSSuzuki K Poulose 	setup_system_capabilities();
191163a1e1c9SMark Rutland 	mark_const_caps_ready();
191275283501SSuzuki K Poulose 	setup_elf_hwcaps(arm64_elf_hwcaps);
1913643d703dSSuzuki K Poulose 
1914643d703dSSuzuki K Poulose 	if (system_supports_32bit_el0())
191575283501SSuzuki K Poulose 		setup_elf_hwcaps(compat_elf_hwcaps);
1916dbb4e152SSuzuki K. Poulose 
19172e6f549fSKees Cook 	if (system_uses_ttbr0_pan())
19182e6f549fSKees Cook 		pr_info("emulated: Privileged Access Never (PAN) using TTBR0_EL1 switching\n");
19192e6f549fSKees Cook 
19202e0f2478SDave Martin 	sve_setup();
192194b07c1fSDave Martin 	minsigstksz_setup();
19222e0f2478SDave Martin 
1923dbb4e152SSuzuki K. Poulose 	/* Advertise that we have computed the system capabilities */
1924dbb4e152SSuzuki K. Poulose 	set_sys_caps_initialised();
1925dbb4e152SSuzuki K. Poulose 
19269cdf8ec4SSuzuki K. Poulose 	/*
19279cdf8ec4SSuzuki K. Poulose 	 * Check for sane CTR_EL0.CWG value.
19289cdf8ec4SSuzuki K. Poulose 	 */
19299cdf8ec4SSuzuki K. Poulose 	cwg = cache_type_cwg();
19309cdf8ec4SSuzuki K. Poulose 	if (!cwg)
1931ebc7e21eSCatalin Marinas 		pr_warn("No Cache Writeback Granule information, assuming %d\n",
1932ebc7e21eSCatalin Marinas 			ARCH_DMA_MINALIGN);
1933359b7064SMarc Zyngier }
193470544196SJames Morse 
193570544196SJames Morse static bool __maybe_unused
193692406f0cSSuzuki K Poulose cpufeature_pan_not_uao(const struct arm64_cpu_capabilities *entry, int __unused)
193770544196SJames Morse {
1938a4023f68SSuzuki K Poulose 	return (cpus_have_const_cap(ARM64_HAS_PAN) && !cpus_have_const_cap(ARM64_HAS_UAO));
193970544196SJames Morse }
194077c97b4eSSuzuki K Poulose 
19415ffdfaedSVladimir Murzin static void __maybe_unused cpu_enable_cnp(struct arm64_cpu_capabilities const *cap)
19425ffdfaedSVladimir Murzin {
19435ffdfaedSVladimir Murzin 	cpu_replace_ttbr1(lm_alias(swapper_pg_dir));
19445ffdfaedSVladimir Murzin }
19455ffdfaedSVladimir Murzin 
194677c97b4eSSuzuki K Poulose /*
194777c97b4eSSuzuki K Poulose  * We emulate only the following system register space.
194877c97b4eSSuzuki K Poulose  * Op0 = 0x3, CRn = 0x0, Op1 = 0x0, CRm = [0, 4 - 7]
194977c97b4eSSuzuki K Poulose  * See Table C5-6 System instruction encodings for System register accesses,
195077c97b4eSSuzuki K Poulose  * ARMv8 ARM(ARM DDI 0487A.f) for more details.
195177c97b4eSSuzuki K Poulose  */
195277c97b4eSSuzuki K Poulose static inline bool __attribute_const__ is_emulated(u32 id)
195377c97b4eSSuzuki K Poulose {
195477c97b4eSSuzuki K Poulose 	return (sys_reg_Op0(id) == 0x3 &&
195577c97b4eSSuzuki K Poulose 		sys_reg_CRn(id) == 0x0 &&
195677c97b4eSSuzuki K Poulose 		sys_reg_Op1(id) == 0x0 &&
195777c97b4eSSuzuki K Poulose 		(sys_reg_CRm(id) == 0 ||
195877c97b4eSSuzuki K Poulose 		 ((sys_reg_CRm(id) >= 4) && (sys_reg_CRm(id) <= 7))));
195977c97b4eSSuzuki K Poulose }
196077c97b4eSSuzuki K Poulose 
196177c97b4eSSuzuki K Poulose /*
196277c97b4eSSuzuki K Poulose  * With CRm == 0, reg should be one of :
196377c97b4eSSuzuki K Poulose  * MIDR_EL1, MPIDR_EL1 or REVIDR_EL1.
196477c97b4eSSuzuki K Poulose  */
196577c97b4eSSuzuki K Poulose static inline int emulate_id_reg(u32 id, u64 *valp)
196677c97b4eSSuzuki K Poulose {
196777c97b4eSSuzuki K Poulose 	switch (id) {
196877c97b4eSSuzuki K Poulose 	case SYS_MIDR_EL1:
196977c97b4eSSuzuki K Poulose 		*valp = read_cpuid_id();
197077c97b4eSSuzuki K Poulose 		break;
197177c97b4eSSuzuki K Poulose 	case SYS_MPIDR_EL1:
197277c97b4eSSuzuki K Poulose 		*valp = SYS_MPIDR_SAFE_VAL;
197377c97b4eSSuzuki K Poulose 		break;
197477c97b4eSSuzuki K Poulose 	case SYS_REVIDR_EL1:
197577c97b4eSSuzuki K Poulose 		/* IMPLEMENTATION DEFINED values are emulated with 0 */
197677c97b4eSSuzuki K Poulose 		*valp = 0;
197777c97b4eSSuzuki K Poulose 		break;
197877c97b4eSSuzuki K Poulose 	default:
197977c97b4eSSuzuki K Poulose 		return -EINVAL;
198077c97b4eSSuzuki K Poulose 	}
198177c97b4eSSuzuki K Poulose 
198277c97b4eSSuzuki K Poulose 	return 0;
198377c97b4eSSuzuki K Poulose }
198477c97b4eSSuzuki K Poulose 
198577c97b4eSSuzuki K Poulose static int emulate_sys_reg(u32 id, u64 *valp)
198677c97b4eSSuzuki K Poulose {
198777c97b4eSSuzuki K Poulose 	struct arm64_ftr_reg *regp;
198877c97b4eSSuzuki K Poulose 
198977c97b4eSSuzuki K Poulose 	if (!is_emulated(id))
199077c97b4eSSuzuki K Poulose 		return -EINVAL;
199177c97b4eSSuzuki K Poulose 
199277c97b4eSSuzuki K Poulose 	if (sys_reg_CRm(id) == 0)
199377c97b4eSSuzuki K Poulose 		return emulate_id_reg(id, valp);
199477c97b4eSSuzuki K Poulose 
199577c97b4eSSuzuki K Poulose 	regp = get_arm64_ftr_reg(id);
199677c97b4eSSuzuki K Poulose 	if (regp)
199777c97b4eSSuzuki K Poulose 		*valp = arm64_ftr_reg_user_value(regp);
199877c97b4eSSuzuki K Poulose 	else
199977c97b4eSSuzuki K Poulose 		/*
200077c97b4eSSuzuki K Poulose 		 * The untracked registers are either IMPLEMENTATION DEFINED
200177c97b4eSSuzuki K Poulose 		 * (e.g, ID_AFR0_EL1) or reserved RAZ.
200277c97b4eSSuzuki K Poulose 		 */
200377c97b4eSSuzuki K Poulose 		*valp = 0;
200477c97b4eSSuzuki K Poulose 	return 0;
200577c97b4eSSuzuki K Poulose }
200677c97b4eSSuzuki K Poulose 
2007520ad988SAnshuman Khandual int do_emulate_mrs(struct pt_regs *regs, u32 sys_reg, u32 rt)
200877c97b4eSSuzuki K Poulose {
200977c97b4eSSuzuki K Poulose 	int rc;
201077c97b4eSSuzuki K Poulose 	u64 val;
201177c97b4eSSuzuki K Poulose 
2012520ad988SAnshuman Khandual 	rc = emulate_sys_reg(sys_reg, &val);
2013520ad988SAnshuman Khandual 	if (!rc) {
2014520ad988SAnshuman Khandual 		pt_regs_write_reg(regs, rt, val);
2015520ad988SAnshuman Khandual 		arm64_skip_faulting_instruction(regs, AARCH64_INSN_SIZE);
2016520ad988SAnshuman Khandual 	}
2017520ad988SAnshuman Khandual 	return rc;
2018520ad988SAnshuman Khandual }
2019520ad988SAnshuman Khandual 
2020520ad988SAnshuman Khandual static int emulate_mrs(struct pt_regs *regs, u32 insn)
2021520ad988SAnshuman Khandual {
2022520ad988SAnshuman Khandual 	u32 sys_reg, rt;
2023520ad988SAnshuman Khandual 
202477c97b4eSSuzuki K Poulose 	/*
202577c97b4eSSuzuki K Poulose 	 * sys_reg values are defined as used in mrs/msr instruction.
202677c97b4eSSuzuki K Poulose 	 * shift the imm value to get the encoding.
202777c97b4eSSuzuki K Poulose 	 */
202877c97b4eSSuzuki K Poulose 	sys_reg = (u32)aarch64_insn_decode_immediate(AARCH64_INSN_IMM_16, insn) << 5;
2029520ad988SAnshuman Khandual 	rt = aarch64_insn_decode_register(AARCH64_INSN_REGTYPE_RT, insn);
2030520ad988SAnshuman Khandual 	return do_emulate_mrs(regs, sys_reg, rt);
203177c97b4eSSuzuki K Poulose }
203277c97b4eSSuzuki K Poulose 
203377c97b4eSSuzuki K Poulose static struct undef_hook mrs_hook = {
203477c97b4eSSuzuki K Poulose 	.instr_mask = 0xfff00000,
203577c97b4eSSuzuki K Poulose 	.instr_val  = 0xd5300000,
2036d64567f6SMark Rutland 	.pstate_mask = PSR_AA32_MODE_MASK,
203777c97b4eSSuzuki K Poulose 	.pstate_val = PSR_MODE_EL0t,
203877c97b4eSSuzuki K Poulose 	.fn = emulate_mrs,
203977c97b4eSSuzuki K Poulose };
204077c97b4eSSuzuki K Poulose 
204177c97b4eSSuzuki K Poulose static int __init enable_mrs_emulation(void)
204277c97b4eSSuzuki K Poulose {
204377c97b4eSSuzuki K Poulose 	register_undef_hook(&mrs_hook);
204477c97b4eSSuzuki K Poulose 	return 0;
204577c97b4eSSuzuki K Poulose }
204677c97b4eSSuzuki K Poulose 
2047c0d8832eSSuzuki K Poulose core_initcall(enable_mrs_emulation);
2048