1359b7064SMarc Zyngier /* 2359b7064SMarc Zyngier * Contains CPU feature definitions 3359b7064SMarc Zyngier * 4359b7064SMarc Zyngier * Copyright (C) 2015 ARM Ltd. 5359b7064SMarc Zyngier * 6359b7064SMarc Zyngier * This program is free software; you can redistribute it and/or modify 7359b7064SMarc Zyngier * it under the terms of the GNU General Public License version 2 as 8359b7064SMarc Zyngier * published by the Free Software Foundation. 9359b7064SMarc Zyngier * 10359b7064SMarc Zyngier * This program is distributed in the hope that it will be useful, 11359b7064SMarc Zyngier * but WITHOUT ANY WARRANTY; without even the implied warranty of 12359b7064SMarc Zyngier * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13359b7064SMarc Zyngier * GNU General Public License for more details. 14359b7064SMarc Zyngier * 15359b7064SMarc Zyngier * You should have received a copy of the GNU General Public License 16359b7064SMarc Zyngier * along with this program. If not, see <http://www.gnu.org/licenses/>. 17359b7064SMarc Zyngier */ 18359b7064SMarc Zyngier 199cdf8ec4SSuzuki K. Poulose #define pr_fmt(fmt) "CPU features: " fmt 20359b7064SMarc Zyngier 213c739b57SSuzuki K. Poulose #include <linux/bsearch.h> 222a6dcb2bSJames Morse #include <linux/cpumask.h> 235ffdfaedSVladimir Murzin #include <linux/crash_dump.h> 243c739b57SSuzuki K. Poulose #include <linux/sort.h> 252a6dcb2bSJames Morse #include <linux/stop_machine.h> 26359b7064SMarc Zyngier #include <linux/types.h> 272077be67SLaura Abbott #include <linux/mm.h> 28359b7064SMarc Zyngier #include <asm/cpu.h> 29359b7064SMarc Zyngier #include <asm/cpufeature.h> 30dbb4e152SSuzuki K. Poulose #include <asm/cpu_ops.h> 312e0f2478SDave Martin #include <asm/fpsimd.h> 3213f417f3SSuzuki K Poulose #include <asm/mmu_context.h> 33338d4f49SJames Morse #include <asm/processor.h> 34cdcf817bSSuzuki K. Poulose #include <asm/sysreg.h> 3577c97b4eSSuzuki K Poulose #include <asm/traps.h> 36d88701beSMarc Zyngier #include <asm/virt.h> 37359b7064SMarc Zyngier 389cdf8ec4SSuzuki K. Poulose unsigned long elf_hwcap __read_mostly; 399cdf8ec4SSuzuki K. Poulose EXPORT_SYMBOL_GPL(elf_hwcap); 409cdf8ec4SSuzuki K. Poulose 419cdf8ec4SSuzuki K. Poulose #ifdef CONFIG_COMPAT 429cdf8ec4SSuzuki K. Poulose #define COMPAT_ELF_HWCAP_DEFAULT \ 439cdf8ec4SSuzuki K. Poulose (COMPAT_HWCAP_HALF|COMPAT_HWCAP_THUMB|\ 449cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_FAST_MULT|COMPAT_HWCAP_EDSP|\ 459cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_TLS|COMPAT_HWCAP_VFP|\ 469cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_VFPv3|COMPAT_HWCAP_VFPv4|\ 479cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_NEON|COMPAT_HWCAP_IDIV|\ 489cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_LPAE) 499cdf8ec4SSuzuki K. Poulose unsigned int compat_elf_hwcap __read_mostly = COMPAT_ELF_HWCAP_DEFAULT; 509cdf8ec4SSuzuki K. Poulose unsigned int compat_elf_hwcap2 __read_mostly; 519cdf8ec4SSuzuki K. Poulose #endif 529cdf8ec4SSuzuki K. Poulose 539cdf8ec4SSuzuki K. Poulose DECLARE_BITMAP(cpu_hwcaps, ARM64_NCAPS); 544b65a5dbSCatalin Marinas EXPORT_SYMBOL(cpu_hwcaps); 5582a3a21bSSuzuki K Poulose static struct arm64_cpu_capabilities const __ro_after_init *cpu_hwcaps_ptrs[ARM64_NCAPS]; 569cdf8ec4SSuzuki K. Poulose 578f1eec57SDave Martin /* 588f1eec57SDave Martin * Flag to indicate if we have computed the system wide 598f1eec57SDave Martin * capabilities based on the boot time active CPUs. This 608f1eec57SDave Martin * will be used to determine if a new booting CPU should 618f1eec57SDave Martin * go through the verification process to make sure that it 628f1eec57SDave Martin * supports the system capabilities, without using a hotplug 638f1eec57SDave Martin * notifier. 648f1eec57SDave Martin */ 658f1eec57SDave Martin static bool sys_caps_initialised; 668f1eec57SDave Martin 678f1eec57SDave Martin static inline void set_sys_caps_initialised(void) 688f1eec57SDave Martin { 698f1eec57SDave Martin sys_caps_initialised = true; 708f1eec57SDave Martin } 718f1eec57SDave Martin 728effeaafSMark Rutland static int dump_cpu_hwcaps(struct notifier_block *self, unsigned long v, void *p) 738effeaafSMark Rutland { 748effeaafSMark Rutland /* file-wide pr_fmt adds "CPU features: " prefix */ 758effeaafSMark Rutland pr_emerg("0x%*pb\n", ARM64_NCAPS, &cpu_hwcaps); 768effeaafSMark Rutland return 0; 778effeaafSMark Rutland } 788effeaafSMark Rutland 798effeaafSMark Rutland static struct notifier_block cpu_hwcaps_notifier = { 808effeaafSMark Rutland .notifier_call = dump_cpu_hwcaps 818effeaafSMark Rutland }; 828effeaafSMark Rutland 838effeaafSMark Rutland static int __init register_cpu_hwcaps_dumper(void) 848effeaafSMark Rutland { 858effeaafSMark Rutland atomic_notifier_chain_register(&panic_notifier_list, 868effeaafSMark Rutland &cpu_hwcaps_notifier); 878effeaafSMark Rutland return 0; 888effeaafSMark Rutland } 898effeaafSMark Rutland __initcall(register_cpu_hwcaps_dumper); 908effeaafSMark Rutland 91efd9e03fSCatalin Marinas DEFINE_STATIC_KEY_ARRAY_FALSE(cpu_hwcap_keys, ARM64_NCAPS); 92efd9e03fSCatalin Marinas EXPORT_SYMBOL(cpu_hwcap_keys); 93efd9e03fSCatalin Marinas 94fe4fbdbcSSuzuki K Poulose #define __ARM64_FTR_BITS(SIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \ 953c739b57SSuzuki K. Poulose { \ 964f0a606bSSuzuki K. Poulose .sign = SIGNED, \ 97fe4fbdbcSSuzuki K Poulose .visible = VISIBLE, \ 983c739b57SSuzuki K. Poulose .strict = STRICT, \ 993c739b57SSuzuki K. Poulose .type = TYPE, \ 1003c739b57SSuzuki K. Poulose .shift = SHIFT, \ 1013c739b57SSuzuki K. Poulose .width = WIDTH, \ 1023c739b57SSuzuki K. Poulose .safe_val = SAFE_VAL, \ 1033c739b57SSuzuki K. Poulose } 1043c739b57SSuzuki K. Poulose 1050710cfdbSSuzuki K Poulose /* Define a feature with unsigned values */ 106fe4fbdbcSSuzuki K Poulose #define ARM64_FTR_BITS(VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \ 107fe4fbdbcSSuzuki K Poulose __ARM64_FTR_BITS(FTR_UNSIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) 1084f0a606bSSuzuki K. Poulose 1090710cfdbSSuzuki K Poulose /* Define a feature with a signed value */ 110fe4fbdbcSSuzuki K Poulose #define S_ARM64_FTR_BITS(VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \ 111fe4fbdbcSSuzuki K Poulose __ARM64_FTR_BITS(FTR_SIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) 1120710cfdbSSuzuki K Poulose 1133c739b57SSuzuki K. Poulose #define ARM64_FTR_END \ 1143c739b57SSuzuki K. Poulose { \ 1153c739b57SSuzuki K. Poulose .width = 0, \ 1163c739b57SSuzuki K. Poulose } 1173c739b57SSuzuki K. Poulose 11870544196SJames Morse /* meta feature for alternatives */ 11970544196SJames Morse static bool __maybe_unused 12092406f0cSSuzuki K Poulose cpufeature_pan_not_uao(const struct arm64_cpu_capabilities *entry, int __unused); 12192406f0cSSuzuki K Poulose 1225ffdfaedSVladimir Murzin static void cpu_enable_cnp(struct arm64_cpu_capabilities const *cap); 12370544196SJames Morse 1244aa8a472SSuzuki K Poulose /* 1254aa8a472SSuzuki K Poulose * NOTE: Any changes to the visibility of features should be kept in 1264aa8a472SSuzuki K Poulose * sync with the documentation of the CPU feature register ABI. 1274aa8a472SSuzuki K Poulose */ 1285e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64isar0[] = { 1297206dc93SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_TS_SHIFT, 4, 0), 1303b3b6810SDongjiu Geng ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_FHM_SHIFT, 4, 0), 1315bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_DP_SHIFT, 4, 0), 1325bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SM4_SHIFT, 4, 0), 1335bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SM3_SHIFT, 4, 0), 1345bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA3_SHIFT, 4, 0), 1355bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_RDM_SHIFT, 4, 0), 136fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_ATOMICS_SHIFT, 4, 0), 137fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_CRC32_SHIFT, 4, 0), 138fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA2_SHIFT, 4, 0), 139fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA1_SHIFT, 4, 0), 140fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_AES_SHIFT, 4, 0), 1413c739b57SSuzuki K. Poulose ARM64_FTR_END, 1423c739b57SSuzuki K. Poulose }; 1433c739b57SSuzuki K. Poulose 144c8c3798dSSuzuki K Poulose static const struct arm64_ftr_bits ftr_id_aa64isar1[] = { 145bd4fb6d2SWill Deacon ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_SB_SHIFT, 4, 0), 146*6984eb47SMark Rutland ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH), 147*6984eb47SMark Rutland FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_GPI_SHIFT, 4, 0), 148*6984eb47SMark Rutland ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH), 149*6984eb47SMark Rutland FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_GPA_SHIFT, 4, 0), 1505bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_LRCPC_SHIFT, 4, 0), 1515bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_FCMA_SHIFT, 4, 0), 1525bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_JSCVT_SHIFT, 4, 0), 153*6984eb47SMark Rutland ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH), 154*6984eb47SMark Rutland FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_API_SHIFT, 4, 0), 155*6984eb47SMark Rutland ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH), 156*6984eb47SMark Rutland FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_APA_SHIFT, 4, 0), 1575bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_DPB_SHIFT, 4, 0), 158c8c3798dSSuzuki K Poulose ARM64_FTR_END, 159c8c3798dSSuzuki K Poulose }; 160c8c3798dSSuzuki K Poulose 1615e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64pfr0[] = { 162179a56f6SWill Deacon ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_CSV3_SHIFT, 4, 0), 1630f15adbbSWill Deacon ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_CSV2_SHIFT, 4, 0), 1647206dc93SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_DIT_SHIFT, 4, 0), 1653fab3999SDave Martin ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SVE), 1663fab3999SDave Martin FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_SVE_SHIFT, 4, 0), 16764c02720SXie XiuQi ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_RAS_SHIFT, 4, 0), 1685bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_GIC_SHIFT, 4, 0), 169fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_ASIMD_SHIFT, 4, ID_AA64PFR0_ASIMD_NI), 170fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_FP_SHIFT, 4, ID_AA64PFR0_FP_NI), 1713c739b57SSuzuki K. Poulose /* Linux doesn't care about the EL3 */ 1725bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL3_SHIFT, 4, 0), 1735bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL2_SHIFT, 4, 0), 1745bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_SHIFT, 4, ID_AA64PFR0_EL1_64BIT_ONLY), 1755bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL0_SHIFT, 4, ID_AA64PFR0_EL0_64BIT_ONLY), 1763c739b57SSuzuki K. Poulose ARM64_FTR_END, 1773c739b57SSuzuki K. Poulose }; 1783c739b57SSuzuki K. Poulose 179d71be2b6SWill Deacon static const struct arm64_ftr_bits ftr_id_aa64pfr1[] = { 180d71be2b6SWill Deacon ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR1_SSBS_SHIFT, 4, ID_AA64PFR1_SSBS_PSTATE_NI), 181d71be2b6SWill Deacon ARM64_FTR_END, 182d71be2b6SWill Deacon }; 183d71be2b6SWill Deacon 1845e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr0[] = { 1855bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN4_SHIFT, 4, ID_AA64MMFR0_TGRAN4_NI), 1865bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN64_SHIFT, 4, ID_AA64MMFR0_TGRAN64_NI), 1875bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN16_SHIFT, 4, ID_AA64MMFR0_TGRAN16_NI), 1885bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_BIGENDEL0_SHIFT, 4, 0), 1893c739b57SSuzuki K. Poulose /* Linux shouldn't care about secure memory */ 1905bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_SNSMEM_SHIFT, 4, 0), 1915bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_BIGENDEL_SHIFT, 4, 0), 1925bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_ASID_SHIFT, 4, 0), 1933c739b57SSuzuki K. Poulose /* 1943c739b57SSuzuki K. Poulose * Differing PARange is fine as long as all peripherals and memory are mapped 1953c739b57SSuzuki K. Poulose * within the minimum PARange of all CPUs 1963c739b57SSuzuki K. Poulose */ 197fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_PARANGE_SHIFT, 4, 0), 1983c739b57SSuzuki K. Poulose ARM64_FTR_END, 1993c739b57SSuzuki K. Poulose }; 2003c739b57SSuzuki K. Poulose 2015e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr1[] = { 202fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_PAN_SHIFT, 4, 0), 2035bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_LOR_SHIFT, 4, 0), 2045bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_HPD_SHIFT, 4, 0), 2055bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_VHE_SHIFT, 4, 0), 2065bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_VMIDBITS_SHIFT, 4, 0), 2075bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_HADBS_SHIFT, 4, 0), 2083c739b57SSuzuki K. Poulose ARM64_FTR_END, 2093c739b57SSuzuki K. Poulose }; 2103c739b57SSuzuki K. Poulose 2115e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr2[] = { 212e48d53a9SMarc Zyngier ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_FWB_SHIFT, 4, 0), 2137206dc93SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_AT_SHIFT, 4, 0), 2145bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_LVA_SHIFT, 4, 0), 2155bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_IESB_SHIFT, 4, 0), 2165bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_LSM_SHIFT, 4, 0), 2175bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_UAO_SHIFT, 4, 0), 2185bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_CNP_SHIFT, 4, 0), 219406e3087SJames Morse ARM64_FTR_END, 220406e3087SJames Morse }; 221406e3087SJames Morse 2225e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_ctr[] = { 223be68a8aaSWill Deacon ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_EXACT, 31, 1, 1), /* RES1 */ 2246ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_DIC_SHIFT, 1, 1), 2256ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_IDC_SHIFT, 1, 1), 2266ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_HIGHER_SAFE, CTR_CWG_SHIFT, 4, 0), 2276ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_HIGHER_SAFE, CTR_ERG_SHIFT, 4, 0), 2286ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_DMINLINE_SHIFT, 4, 1), 2293c739b57SSuzuki K. Poulose /* 2303c739b57SSuzuki K. Poulose * Linux can handle differing I-cache policies. Userspace JITs will 231ee7bc638SSuzuki K Poulose * make use of *minLine. 232155433cbSWill Deacon * If we have differing I-cache policies, report it as the weakest - VIPT. 2333c739b57SSuzuki K. Poulose */ 234155433cbSWill Deacon ARM64_FTR_BITS(FTR_VISIBLE, FTR_NONSTRICT, FTR_EXACT, 14, 2, ICACHE_POLICY_VIPT), /* L1Ip */ 2354c4a39ddSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_IMINLINE_SHIFT, 4, 0), 2363c739b57SSuzuki K. Poulose ARM64_FTR_END, 2373c739b57SSuzuki K. Poulose }; 2383c739b57SSuzuki K. Poulose 239675b0563SArd Biesheuvel struct arm64_ftr_reg arm64_ftr_reg_ctrel0 = { 240675b0563SArd Biesheuvel .name = "SYS_CTR_EL0", 241675b0563SArd Biesheuvel .ftr_bits = ftr_ctr 242675b0563SArd Biesheuvel }; 243675b0563SArd Biesheuvel 2445e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_mmfr0[] = { 2455bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0xf), /* InnerShr */ 2465bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0), /* FCSE */ 247fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, 20, 4, 0), /* AuxReg */ 2485bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0), /* TCM */ 2495bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), /* ShareLvl */ 2505bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0xf), /* OuterShr */ 2515bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* PMSA */ 2525bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* VMSA */ 2533c739b57SSuzuki K. Poulose ARM64_FTR_END, 2543c739b57SSuzuki K. Poulose }; 2553c739b57SSuzuki K. Poulose 2565e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64dfr0[] = { 257fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, 36, 28, 0), 258fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64DFR0_PMSVER_SHIFT, 4, 0), 259fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_CTX_CMPS_SHIFT, 4, 0), 260fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_WRPS_SHIFT, 4, 0), 261fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_BRPS_SHIFT, 4, 0), 262b20d1ba3SWill Deacon /* 263b20d1ba3SWill Deacon * We can instantiate multiple PMU instances with different levels 264b20d1ba3SWill Deacon * of support. 265fe4fbdbcSSuzuki K Poulose */ 266fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_EXACT, ID_AA64DFR0_PMUVER_SHIFT, 4, 0), 267fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_TRACEVER_SHIFT, 4, 0), 268fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_DEBUGVER_SHIFT, 4, 0x6), 2693c739b57SSuzuki K. Poulose ARM64_FTR_END, 2703c739b57SSuzuki K. Poulose }; 2713c739b57SSuzuki K. Poulose 2725e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_mvfr2[] = { 2735bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* FPMisc */ 2745bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* SIMDMisc */ 2753c739b57SSuzuki K. Poulose ARM64_FTR_END, 2763c739b57SSuzuki K. Poulose }; 2773c739b57SSuzuki K. Poulose 2785e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_dczid[] = { 279fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_EXACT, 4, 1, 1), /* DZP */ 280fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* BS */ 2813c739b57SSuzuki K. Poulose ARM64_FTR_END, 2823c739b57SSuzuki K. Poulose }; 2833c739b57SSuzuki K. Poulose 2843c739b57SSuzuki K. Poulose 2855e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_isar5[] = { 2865bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_RDM_SHIFT, 4, 0), 2875bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_CRC32_SHIFT, 4, 0), 2885bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SHA2_SHIFT, 4, 0), 2895bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SHA1_SHIFT, 4, 0), 2905bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_AES_SHIFT, 4, 0), 2915bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SEVL_SHIFT, 4, 0), 2923c739b57SSuzuki K. Poulose ARM64_FTR_END, 2933c739b57SSuzuki K. Poulose }; 2943c739b57SSuzuki K. Poulose 2955e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_mmfr4[] = { 2965bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* ac2 */ 2973c739b57SSuzuki K. Poulose ARM64_FTR_END, 2983c739b57SSuzuki K. Poulose }; 2993c739b57SSuzuki K. Poulose 3005e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_pfr0[] = { 3015bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), /* State3 */ 3025bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0), /* State2 */ 3035bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* State1 */ 3045bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* State0 */ 3053c739b57SSuzuki K. Poulose ARM64_FTR_END, 3063c739b57SSuzuki K. Poulose }; 3073c739b57SSuzuki K. Poulose 3085e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_dfr0[] = { 309fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0), 310fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0xf), /* PerfMon */ 311fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 20, 4, 0), 312fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0), 313fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), 314fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0), 315fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), 316fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), 317e5343503SSuzuki K Poulose ARM64_FTR_END, 318e5343503SSuzuki K Poulose }; 319e5343503SSuzuki K Poulose 3202e0f2478SDave Martin static const struct arm64_ftr_bits ftr_zcr[] = { 3212e0f2478SDave Martin ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, 3222e0f2478SDave Martin ZCR_ELx_LEN_SHIFT, ZCR_ELx_LEN_SIZE, 0), /* LEN */ 3232e0f2478SDave Martin ARM64_FTR_END, 3242e0f2478SDave Martin }; 3252e0f2478SDave Martin 3263c739b57SSuzuki K. Poulose /* 3273c739b57SSuzuki K. Poulose * Common ftr bits for a 32bit register with all hidden, strict 3283c739b57SSuzuki K. Poulose * attributes, with 4bit feature fields and a default safe value of 3293c739b57SSuzuki K. Poulose * 0. Covers the following 32bit registers: 3303c739b57SSuzuki K. Poulose * id_isar[0-4], id_mmfr[1-3], id_pfr1, mvfr[0-1] 3313c739b57SSuzuki K. Poulose */ 3325e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_generic_32bits[] = { 333fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0), 334fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0), 335fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 20, 4, 0), 336fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0), 337fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), 338fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0), 339fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), 340fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), 3413c739b57SSuzuki K. Poulose ARM64_FTR_END, 3423c739b57SSuzuki K. Poulose }; 3433c739b57SSuzuki K. Poulose 344eab43e88SSuzuki K Poulose /* Table for a single 32bit feature value */ 345eab43e88SSuzuki K Poulose static const struct arm64_ftr_bits ftr_single32[] = { 346fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, 0, 32, 0), 3473c739b57SSuzuki K. Poulose ARM64_FTR_END, 3483c739b57SSuzuki K. Poulose }; 3493c739b57SSuzuki K. Poulose 350eab43e88SSuzuki K Poulose static const struct arm64_ftr_bits ftr_raz[] = { 3513c739b57SSuzuki K. Poulose ARM64_FTR_END, 3523c739b57SSuzuki K. Poulose }; 3533c739b57SSuzuki K. Poulose 3546f2b7eefSArd Biesheuvel #define ARM64_FTR_REG(id, table) { \ 3553c739b57SSuzuki K. Poulose .sys_id = id, \ 3566f2b7eefSArd Biesheuvel .reg = &(struct arm64_ftr_reg){ \ 3573c739b57SSuzuki K. Poulose .name = #id, \ 3583c739b57SSuzuki K. Poulose .ftr_bits = &((table)[0]), \ 3596f2b7eefSArd Biesheuvel }} 3603c739b57SSuzuki K. Poulose 3616f2b7eefSArd Biesheuvel static const struct __ftr_reg_entry { 3626f2b7eefSArd Biesheuvel u32 sys_id; 3636f2b7eefSArd Biesheuvel struct arm64_ftr_reg *reg; 3646f2b7eefSArd Biesheuvel } arm64_ftr_regs[] = { 3653c739b57SSuzuki K. Poulose 3663c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 1 */ 3673c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_PFR0_EL1, ftr_id_pfr0), 3683c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_PFR1_EL1, ftr_generic_32bits), 369e5343503SSuzuki K Poulose ARM64_FTR_REG(SYS_ID_DFR0_EL1, ftr_id_dfr0), 3703c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR0_EL1, ftr_id_mmfr0), 3713c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR1_EL1, ftr_generic_32bits), 3723c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR2_EL1, ftr_generic_32bits), 3733c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR3_EL1, ftr_generic_32bits), 3743c739b57SSuzuki K. Poulose 3753c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 2 */ 3763c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR0_EL1, ftr_generic_32bits), 3773c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR1_EL1, ftr_generic_32bits), 3783c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR2_EL1, ftr_generic_32bits), 3793c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR3_EL1, ftr_generic_32bits), 3803c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR4_EL1, ftr_generic_32bits), 3813c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR5_EL1, ftr_id_isar5), 3823c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR4_EL1, ftr_id_mmfr4), 3833c739b57SSuzuki K. Poulose 3843c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 3 */ 3853c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_MVFR0_EL1, ftr_generic_32bits), 3863c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_MVFR1_EL1, ftr_generic_32bits), 3873c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_MVFR2_EL1, ftr_mvfr2), 3883c739b57SSuzuki K. Poulose 3893c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 4 */ 3903c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64PFR0_EL1, ftr_id_aa64pfr0), 391d71be2b6SWill Deacon ARM64_FTR_REG(SYS_ID_AA64PFR1_EL1, ftr_id_aa64pfr1), 3922e0f2478SDave Martin ARM64_FTR_REG(SYS_ID_AA64ZFR0_EL1, ftr_raz), 3933c739b57SSuzuki K. Poulose 3943c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 5 */ 3953c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64DFR0_EL1, ftr_id_aa64dfr0), 396eab43e88SSuzuki K Poulose ARM64_FTR_REG(SYS_ID_AA64DFR1_EL1, ftr_raz), 3973c739b57SSuzuki K. Poulose 3983c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 6 */ 3993c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64ISAR0_EL1, ftr_id_aa64isar0), 400c8c3798dSSuzuki K Poulose ARM64_FTR_REG(SYS_ID_AA64ISAR1_EL1, ftr_id_aa64isar1), 4013c739b57SSuzuki K. Poulose 4023c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 7 */ 4033c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64MMFR0_EL1, ftr_id_aa64mmfr0), 4043c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64MMFR1_EL1, ftr_id_aa64mmfr1), 405406e3087SJames Morse ARM64_FTR_REG(SYS_ID_AA64MMFR2_EL1, ftr_id_aa64mmfr2), 4063c739b57SSuzuki K. Poulose 4072e0f2478SDave Martin /* Op1 = 0, CRn = 1, CRm = 2 */ 4082e0f2478SDave Martin ARM64_FTR_REG(SYS_ZCR_EL1, ftr_zcr), 4092e0f2478SDave Martin 4103c739b57SSuzuki K. Poulose /* Op1 = 3, CRn = 0, CRm = 0 */ 411675b0563SArd Biesheuvel { SYS_CTR_EL0, &arm64_ftr_reg_ctrel0 }, 4123c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_DCZID_EL0, ftr_dczid), 4133c739b57SSuzuki K. Poulose 4143c739b57SSuzuki K. Poulose /* Op1 = 3, CRn = 14, CRm = 0 */ 415eab43e88SSuzuki K Poulose ARM64_FTR_REG(SYS_CNTFRQ_EL0, ftr_single32), 4163c739b57SSuzuki K. Poulose }; 4173c739b57SSuzuki K. Poulose 4183c739b57SSuzuki K. Poulose static int search_cmp_ftr_reg(const void *id, const void *regp) 4193c739b57SSuzuki K. Poulose { 4206f2b7eefSArd Biesheuvel return (int)(unsigned long)id - (int)((const struct __ftr_reg_entry *)regp)->sys_id; 4213c739b57SSuzuki K. Poulose } 4223c739b57SSuzuki K. Poulose 4233c739b57SSuzuki K. Poulose /* 4243c739b57SSuzuki K. Poulose * get_arm64_ftr_reg - Lookup a feature register entry using its 4253c739b57SSuzuki K. Poulose * sys_reg() encoding. With the array arm64_ftr_regs sorted in the 4263c739b57SSuzuki K. Poulose * ascending order of sys_id , we use binary search to find a matching 4273c739b57SSuzuki K. Poulose * entry. 4283c739b57SSuzuki K. Poulose * 4293c739b57SSuzuki K. Poulose * returns - Upon success, matching ftr_reg entry for id. 4303c739b57SSuzuki K. Poulose * - NULL on failure. It is upto the caller to decide 4313c739b57SSuzuki K. Poulose * the impact of a failure. 4323c739b57SSuzuki K. Poulose */ 4333c739b57SSuzuki K. Poulose static struct arm64_ftr_reg *get_arm64_ftr_reg(u32 sys_id) 4343c739b57SSuzuki K. Poulose { 4356f2b7eefSArd Biesheuvel const struct __ftr_reg_entry *ret; 4366f2b7eefSArd Biesheuvel 4376f2b7eefSArd Biesheuvel ret = bsearch((const void *)(unsigned long)sys_id, 4383c739b57SSuzuki K. Poulose arm64_ftr_regs, 4393c739b57SSuzuki K. Poulose ARRAY_SIZE(arm64_ftr_regs), 4403c739b57SSuzuki K. Poulose sizeof(arm64_ftr_regs[0]), 4413c739b57SSuzuki K. Poulose search_cmp_ftr_reg); 4426f2b7eefSArd Biesheuvel if (ret) 4436f2b7eefSArd Biesheuvel return ret->reg; 4446f2b7eefSArd Biesheuvel return NULL; 4453c739b57SSuzuki K. Poulose } 4463c739b57SSuzuki K. Poulose 4475e49d73cSArd Biesheuvel static u64 arm64_ftr_set_value(const struct arm64_ftr_bits *ftrp, s64 reg, 4485e49d73cSArd Biesheuvel s64 ftr_val) 4493c739b57SSuzuki K. Poulose { 4503c739b57SSuzuki K. Poulose u64 mask = arm64_ftr_mask(ftrp); 4513c739b57SSuzuki K. Poulose 4523c739b57SSuzuki K. Poulose reg &= ~mask; 4533c739b57SSuzuki K. Poulose reg |= (ftr_val << ftrp->shift) & mask; 4543c739b57SSuzuki K. Poulose return reg; 4553c739b57SSuzuki K. Poulose } 4563c739b57SSuzuki K. Poulose 4575e49d73cSArd Biesheuvel static s64 arm64_ftr_safe_value(const struct arm64_ftr_bits *ftrp, s64 new, 4585e49d73cSArd Biesheuvel s64 cur) 4593c739b57SSuzuki K. Poulose { 4603c739b57SSuzuki K. Poulose s64 ret = 0; 4613c739b57SSuzuki K. Poulose 4623c739b57SSuzuki K. Poulose switch (ftrp->type) { 4633c739b57SSuzuki K. Poulose case FTR_EXACT: 4643c739b57SSuzuki K. Poulose ret = ftrp->safe_val; 4653c739b57SSuzuki K. Poulose break; 4663c739b57SSuzuki K. Poulose case FTR_LOWER_SAFE: 4673c739b57SSuzuki K. Poulose ret = new < cur ? new : cur; 4683c739b57SSuzuki K. Poulose break; 4693c739b57SSuzuki K. Poulose case FTR_HIGHER_SAFE: 4703c739b57SSuzuki K. Poulose ret = new > cur ? new : cur; 4713c739b57SSuzuki K. Poulose break; 4723c739b57SSuzuki K. Poulose default: 4733c739b57SSuzuki K. Poulose BUG(); 4743c739b57SSuzuki K. Poulose } 4753c739b57SSuzuki K. Poulose 4763c739b57SSuzuki K. Poulose return ret; 4773c739b57SSuzuki K. Poulose } 4783c739b57SSuzuki K. Poulose 4793c739b57SSuzuki K. Poulose static void __init sort_ftr_regs(void) 4803c739b57SSuzuki K. Poulose { 4816f2b7eefSArd Biesheuvel int i; 4826f2b7eefSArd Biesheuvel 4836f2b7eefSArd Biesheuvel /* Check that the array is sorted so that we can do the binary search */ 4846f2b7eefSArd Biesheuvel for (i = 1; i < ARRAY_SIZE(arm64_ftr_regs); i++) 4856f2b7eefSArd Biesheuvel BUG_ON(arm64_ftr_regs[i].sys_id < arm64_ftr_regs[i - 1].sys_id); 4863c739b57SSuzuki K. Poulose } 4873c739b57SSuzuki K. Poulose 4883c739b57SSuzuki K. Poulose /* 4893c739b57SSuzuki K. Poulose * Initialise the CPU feature register from Boot CPU values. 4903c739b57SSuzuki K. Poulose * Also initiliases the strict_mask for the register. 491b389d799SMark Rutland * Any bits that are not covered by an arm64_ftr_bits entry are considered 492b389d799SMark Rutland * RES0 for the system-wide value, and must strictly match. 4933c739b57SSuzuki K. Poulose */ 4943c739b57SSuzuki K. Poulose static void __init init_cpu_ftr_reg(u32 sys_reg, u64 new) 4953c739b57SSuzuki K. Poulose { 4963c739b57SSuzuki K. Poulose u64 val = 0; 4973c739b57SSuzuki K. Poulose u64 strict_mask = ~0x0ULL; 498fe4fbdbcSSuzuki K Poulose u64 user_mask = 0; 499b389d799SMark Rutland u64 valid_mask = 0; 500b389d799SMark Rutland 5015e49d73cSArd Biesheuvel const struct arm64_ftr_bits *ftrp; 5023c739b57SSuzuki K. Poulose struct arm64_ftr_reg *reg = get_arm64_ftr_reg(sys_reg); 5033c739b57SSuzuki K. Poulose 5043c739b57SSuzuki K. Poulose BUG_ON(!reg); 5053c739b57SSuzuki K. Poulose 5063c739b57SSuzuki K. Poulose for (ftrp = reg->ftr_bits; ftrp->width; ftrp++) { 507b389d799SMark Rutland u64 ftr_mask = arm64_ftr_mask(ftrp); 5083c739b57SSuzuki K. Poulose s64 ftr_new = arm64_ftr_value(ftrp, new); 5093c739b57SSuzuki K. Poulose 5103c739b57SSuzuki K. Poulose val = arm64_ftr_set_value(ftrp, val, ftr_new); 511b389d799SMark Rutland 512b389d799SMark Rutland valid_mask |= ftr_mask; 5133c739b57SSuzuki K. Poulose if (!ftrp->strict) 514b389d799SMark Rutland strict_mask &= ~ftr_mask; 515fe4fbdbcSSuzuki K Poulose if (ftrp->visible) 516fe4fbdbcSSuzuki K Poulose user_mask |= ftr_mask; 517fe4fbdbcSSuzuki K Poulose else 518fe4fbdbcSSuzuki K Poulose reg->user_val = arm64_ftr_set_value(ftrp, 519fe4fbdbcSSuzuki K Poulose reg->user_val, 520fe4fbdbcSSuzuki K Poulose ftrp->safe_val); 5213c739b57SSuzuki K. Poulose } 522b389d799SMark Rutland 523b389d799SMark Rutland val &= valid_mask; 524b389d799SMark Rutland 5253c739b57SSuzuki K. Poulose reg->sys_val = val; 5263c739b57SSuzuki K. Poulose reg->strict_mask = strict_mask; 527fe4fbdbcSSuzuki K Poulose reg->user_mask = user_mask; 5283c739b57SSuzuki K. Poulose } 5293c739b57SSuzuki K. Poulose 5301e89baedSSuzuki K Poulose extern const struct arm64_cpu_capabilities arm64_errata[]; 53182a3a21bSSuzuki K Poulose static const struct arm64_cpu_capabilities arm64_features[]; 53282a3a21bSSuzuki K Poulose 53382a3a21bSSuzuki K Poulose static void __init 53482a3a21bSSuzuki K Poulose init_cpu_hwcaps_indirect_list_from_array(const struct arm64_cpu_capabilities *caps) 53582a3a21bSSuzuki K Poulose { 53682a3a21bSSuzuki K Poulose for (; caps->matches; caps++) { 53782a3a21bSSuzuki K Poulose if (WARN(caps->capability >= ARM64_NCAPS, 53882a3a21bSSuzuki K Poulose "Invalid capability %d\n", caps->capability)) 53982a3a21bSSuzuki K Poulose continue; 54082a3a21bSSuzuki K Poulose if (WARN(cpu_hwcaps_ptrs[caps->capability], 54182a3a21bSSuzuki K Poulose "Duplicate entry for capability %d\n", 54282a3a21bSSuzuki K Poulose caps->capability)) 54382a3a21bSSuzuki K Poulose continue; 54482a3a21bSSuzuki K Poulose cpu_hwcaps_ptrs[caps->capability] = caps; 54582a3a21bSSuzuki K Poulose } 54682a3a21bSSuzuki K Poulose } 54782a3a21bSSuzuki K Poulose 54882a3a21bSSuzuki K Poulose static void __init init_cpu_hwcaps_indirect_list(void) 54982a3a21bSSuzuki K Poulose { 55082a3a21bSSuzuki K Poulose init_cpu_hwcaps_indirect_list_from_array(arm64_features); 55182a3a21bSSuzuki K Poulose init_cpu_hwcaps_indirect_list_from_array(arm64_errata); 55282a3a21bSSuzuki K Poulose } 55382a3a21bSSuzuki K Poulose 554fd9d63daSSuzuki K Poulose static void __init setup_boot_cpu_capabilities(void); 5551e89baedSSuzuki K Poulose 5563c739b57SSuzuki K. Poulose void __init init_cpu_features(struct cpuinfo_arm64 *info) 5573c739b57SSuzuki K. Poulose { 5583c739b57SSuzuki K. Poulose /* Before we start using the tables, make sure it is sorted */ 5593c739b57SSuzuki K. Poulose sort_ftr_regs(); 5603c739b57SSuzuki K. Poulose 5613c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_CTR_EL0, info->reg_ctr); 5623c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_DCZID_EL0, info->reg_dczid); 5633c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_CNTFRQ_EL0, info->reg_cntfrq); 5643c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64DFR0_EL1, info->reg_id_aa64dfr0); 5653c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64DFR1_EL1, info->reg_id_aa64dfr1); 5663c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64ISAR0_EL1, info->reg_id_aa64isar0); 5673c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64ISAR1_EL1, info->reg_id_aa64isar1); 5683c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64MMFR0_EL1, info->reg_id_aa64mmfr0); 5693c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64MMFR1_EL1, info->reg_id_aa64mmfr1); 570406e3087SJames Morse init_cpu_ftr_reg(SYS_ID_AA64MMFR2_EL1, info->reg_id_aa64mmfr2); 5713c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64PFR0_EL1, info->reg_id_aa64pfr0); 5723c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64PFR1_EL1, info->reg_id_aa64pfr1); 5732e0f2478SDave Martin init_cpu_ftr_reg(SYS_ID_AA64ZFR0_EL1, info->reg_id_aa64zfr0); 574a6dc3cd7SSuzuki K Poulose 575a6dc3cd7SSuzuki K Poulose if (id_aa64pfr0_32bit_el0(info->reg_id_aa64pfr0)) { 5763c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_DFR0_EL1, info->reg_id_dfr0); 5773c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR0_EL1, info->reg_id_isar0); 5783c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR1_EL1, info->reg_id_isar1); 5793c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR2_EL1, info->reg_id_isar2); 5803c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR3_EL1, info->reg_id_isar3); 5813c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR4_EL1, info->reg_id_isar4); 5823c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR5_EL1, info->reg_id_isar5); 5833c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR0_EL1, info->reg_id_mmfr0); 5843c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR1_EL1, info->reg_id_mmfr1); 5853c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR2_EL1, info->reg_id_mmfr2); 5863c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR3_EL1, info->reg_id_mmfr3); 5873c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_PFR0_EL1, info->reg_id_pfr0); 5883c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_PFR1_EL1, info->reg_id_pfr1); 5893c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_MVFR0_EL1, info->reg_mvfr0); 5903c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_MVFR1_EL1, info->reg_mvfr1); 5913c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_MVFR2_EL1, info->reg_mvfr2); 5923c739b57SSuzuki K. Poulose } 5933c739b57SSuzuki K. Poulose 5942e0f2478SDave Martin if (id_aa64pfr0_sve(info->reg_id_aa64pfr0)) { 5952e0f2478SDave Martin init_cpu_ftr_reg(SYS_ZCR_EL1, info->reg_zcr); 5962e0f2478SDave Martin sve_init_vq_map(); 5972e0f2478SDave Martin } 5985e91107bSSuzuki K Poulose 5995e91107bSSuzuki K Poulose /* 60082a3a21bSSuzuki K Poulose * Initialize the indirect array of CPU hwcaps capabilities pointers 60182a3a21bSSuzuki K Poulose * before we handle the boot CPU below. 60282a3a21bSSuzuki K Poulose */ 60382a3a21bSSuzuki K Poulose init_cpu_hwcaps_indirect_list(); 60482a3a21bSSuzuki K Poulose 60582a3a21bSSuzuki K Poulose /* 606fd9d63daSSuzuki K Poulose * Detect and enable early CPU capabilities based on the boot CPU, 607fd9d63daSSuzuki K Poulose * after we have initialised the CPU feature infrastructure. 6085e91107bSSuzuki K Poulose */ 609fd9d63daSSuzuki K Poulose setup_boot_cpu_capabilities(); 610a6dc3cd7SSuzuki K Poulose } 611a6dc3cd7SSuzuki K Poulose 6123086d391SSuzuki K. Poulose static void update_cpu_ftr_reg(struct arm64_ftr_reg *reg, u64 new) 6133c739b57SSuzuki K. Poulose { 6145e49d73cSArd Biesheuvel const struct arm64_ftr_bits *ftrp; 6153c739b57SSuzuki K. Poulose 6163c739b57SSuzuki K. Poulose for (ftrp = reg->ftr_bits; ftrp->width; ftrp++) { 6173c739b57SSuzuki K. Poulose s64 ftr_cur = arm64_ftr_value(ftrp, reg->sys_val); 6183c739b57SSuzuki K. Poulose s64 ftr_new = arm64_ftr_value(ftrp, new); 6193c739b57SSuzuki K. Poulose 6203c739b57SSuzuki K. Poulose if (ftr_cur == ftr_new) 6213c739b57SSuzuki K. Poulose continue; 6223c739b57SSuzuki K. Poulose /* Find a safe value */ 6233c739b57SSuzuki K. Poulose ftr_new = arm64_ftr_safe_value(ftrp, ftr_new, ftr_cur); 6243c739b57SSuzuki K. Poulose reg->sys_val = arm64_ftr_set_value(ftrp, reg->sys_val, ftr_new); 6253c739b57SSuzuki K. Poulose } 6263c739b57SSuzuki K. Poulose 6273c739b57SSuzuki K. Poulose } 6283c739b57SSuzuki K. Poulose 6293086d391SSuzuki K. Poulose static int check_update_ftr_reg(u32 sys_id, int cpu, u64 val, u64 boot) 630cdcf817bSSuzuki K. Poulose { 6313086d391SSuzuki K. Poulose struct arm64_ftr_reg *regp = get_arm64_ftr_reg(sys_id); 6323086d391SSuzuki K. Poulose 6333086d391SSuzuki K. Poulose BUG_ON(!regp); 6343086d391SSuzuki K. Poulose update_cpu_ftr_reg(regp, val); 6353086d391SSuzuki K. Poulose if ((boot & regp->strict_mask) == (val & regp->strict_mask)) 6363086d391SSuzuki K. Poulose return 0; 6373086d391SSuzuki K. Poulose pr_warn("SANITY CHECK: Unexpected variation in %s. Boot CPU: %#016llx, CPU%d: %#016llx\n", 6383086d391SSuzuki K. Poulose regp->name, boot, cpu, val); 6393086d391SSuzuki K. Poulose return 1; 6403086d391SSuzuki K. Poulose } 6413086d391SSuzuki K. Poulose 6423086d391SSuzuki K. Poulose /* 6433086d391SSuzuki K. Poulose * Update system wide CPU feature registers with the values from a 6443086d391SSuzuki K. Poulose * non-boot CPU. Also performs SANITY checks to make sure that there 6453086d391SSuzuki K. Poulose * aren't any insane variations from that of the boot CPU. 6463086d391SSuzuki K. Poulose */ 6473086d391SSuzuki K. Poulose void update_cpu_features(int cpu, 6483086d391SSuzuki K. Poulose struct cpuinfo_arm64 *info, 6493086d391SSuzuki K. Poulose struct cpuinfo_arm64 *boot) 6503086d391SSuzuki K. Poulose { 6513086d391SSuzuki K. Poulose int taint = 0; 6523086d391SSuzuki K. Poulose 6533086d391SSuzuki K. Poulose /* 6543086d391SSuzuki K. Poulose * The kernel can handle differing I-cache policies, but otherwise 6553086d391SSuzuki K. Poulose * caches should look identical. Userspace JITs will make use of 6563086d391SSuzuki K. Poulose * *minLine. 6573086d391SSuzuki K. Poulose */ 6583086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_CTR_EL0, cpu, 6593086d391SSuzuki K. Poulose info->reg_ctr, boot->reg_ctr); 6603086d391SSuzuki K. Poulose 6613086d391SSuzuki K. Poulose /* 6623086d391SSuzuki K. Poulose * Userspace may perform DC ZVA instructions. Mismatched block sizes 6633086d391SSuzuki K. Poulose * could result in too much or too little memory being zeroed if a 6643086d391SSuzuki K. Poulose * process is preempted and migrated between CPUs. 6653086d391SSuzuki K. Poulose */ 6663086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_DCZID_EL0, cpu, 6673086d391SSuzuki K. Poulose info->reg_dczid, boot->reg_dczid); 6683086d391SSuzuki K. Poulose 6693086d391SSuzuki K. Poulose /* If different, timekeeping will be broken (especially with KVM) */ 6703086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_CNTFRQ_EL0, cpu, 6713086d391SSuzuki K. Poulose info->reg_cntfrq, boot->reg_cntfrq); 6723086d391SSuzuki K. Poulose 6733086d391SSuzuki K. Poulose /* 6743086d391SSuzuki K. Poulose * The kernel uses self-hosted debug features and expects CPUs to 6753086d391SSuzuki K. Poulose * support identical debug features. We presently need CTX_CMPs, WRPs, 6763086d391SSuzuki K. Poulose * and BRPs to be identical. 6773086d391SSuzuki K. Poulose * ID_AA64DFR1 is currently RES0. 6783086d391SSuzuki K. Poulose */ 6793086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64DFR0_EL1, cpu, 6803086d391SSuzuki K. Poulose info->reg_id_aa64dfr0, boot->reg_id_aa64dfr0); 6813086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64DFR1_EL1, cpu, 6823086d391SSuzuki K. Poulose info->reg_id_aa64dfr1, boot->reg_id_aa64dfr1); 6833086d391SSuzuki K. Poulose /* 6843086d391SSuzuki K. Poulose * Even in big.LITTLE, processors should be identical instruction-set 6853086d391SSuzuki K. Poulose * wise. 6863086d391SSuzuki K. Poulose */ 6873086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64ISAR0_EL1, cpu, 6883086d391SSuzuki K. Poulose info->reg_id_aa64isar0, boot->reg_id_aa64isar0); 6893086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64ISAR1_EL1, cpu, 6903086d391SSuzuki K. Poulose info->reg_id_aa64isar1, boot->reg_id_aa64isar1); 6913086d391SSuzuki K. Poulose 6923086d391SSuzuki K. Poulose /* 6933086d391SSuzuki K. Poulose * Differing PARange support is fine as long as all peripherals and 6943086d391SSuzuki K. Poulose * memory are mapped within the minimum PARange of all CPUs. 6953086d391SSuzuki K. Poulose * Linux should not care about secure memory. 6963086d391SSuzuki K. Poulose */ 6973086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64MMFR0_EL1, cpu, 6983086d391SSuzuki K. Poulose info->reg_id_aa64mmfr0, boot->reg_id_aa64mmfr0); 6993086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64MMFR1_EL1, cpu, 7003086d391SSuzuki K. Poulose info->reg_id_aa64mmfr1, boot->reg_id_aa64mmfr1); 701406e3087SJames Morse taint |= check_update_ftr_reg(SYS_ID_AA64MMFR2_EL1, cpu, 702406e3087SJames Morse info->reg_id_aa64mmfr2, boot->reg_id_aa64mmfr2); 7033086d391SSuzuki K. Poulose 7043086d391SSuzuki K. Poulose /* 7053086d391SSuzuki K. Poulose * EL3 is not our concern. 7063086d391SSuzuki K. Poulose */ 7073086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64PFR0_EL1, cpu, 7083086d391SSuzuki K. Poulose info->reg_id_aa64pfr0, boot->reg_id_aa64pfr0); 7093086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64PFR1_EL1, cpu, 7103086d391SSuzuki K. Poulose info->reg_id_aa64pfr1, boot->reg_id_aa64pfr1); 7113086d391SSuzuki K. Poulose 7122e0f2478SDave Martin taint |= check_update_ftr_reg(SYS_ID_AA64ZFR0_EL1, cpu, 7132e0f2478SDave Martin info->reg_id_aa64zfr0, boot->reg_id_aa64zfr0); 7142e0f2478SDave Martin 7153086d391SSuzuki K. Poulose /* 716a6dc3cd7SSuzuki K Poulose * If we have AArch32, we care about 32-bit features for compat. 717a6dc3cd7SSuzuki K Poulose * If the system doesn't support AArch32, don't update them. 7183086d391SSuzuki K. Poulose */ 71946823dd1SDave Martin if (id_aa64pfr0_32bit_el0(read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1)) && 720a6dc3cd7SSuzuki K Poulose id_aa64pfr0_32bit_el0(info->reg_id_aa64pfr0)) { 721a6dc3cd7SSuzuki K Poulose 7223086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_DFR0_EL1, cpu, 7233086d391SSuzuki K. Poulose info->reg_id_dfr0, boot->reg_id_dfr0); 7243086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR0_EL1, cpu, 7253086d391SSuzuki K. Poulose info->reg_id_isar0, boot->reg_id_isar0); 7263086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR1_EL1, cpu, 7273086d391SSuzuki K. Poulose info->reg_id_isar1, boot->reg_id_isar1); 7283086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR2_EL1, cpu, 7293086d391SSuzuki K. Poulose info->reg_id_isar2, boot->reg_id_isar2); 7303086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR3_EL1, cpu, 7313086d391SSuzuki K. Poulose info->reg_id_isar3, boot->reg_id_isar3); 7323086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR4_EL1, cpu, 7333086d391SSuzuki K. Poulose info->reg_id_isar4, boot->reg_id_isar4); 7343086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR5_EL1, cpu, 7353086d391SSuzuki K. Poulose info->reg_id_isar5, boot->reg_id_isar5); 7363086d391SSuzuki K. Poulose 7373086d391SSuzuki K. Poulose /* 7383086d391SSuzuki K. Poulose * Regardless of the value of the AuxReg field, the AIFSR, ADFSR, and 7393086d391SSuzuki K. Poulose * ACTLR formats could differ across CPUs and therefore would have to 7403086d391SSuzuki K. Poulose * be trapped for virtualization anyway. 7413086d391SSuzuki K. Poulose */ 7423086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR0_EL1, cpu, 7433086d391SSuzuki K. Poulose info->reg_id_mmfr0, boot->reg_id_mmfr0); 7443086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR1_EL1, cpu, 7453086d391SSuzuki K. Poulose info->reg_id_mmfr1, boot->reg_id_mmfr1); 7463086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR2_EL1, cpu, 7473086d391SSuzuki K. Poulose info->reg_id_mmfr2, boot->reg_id_mmfr2); 7483086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR3_EL1, cpu, 7493086d391SSuzuki K. Poulose info->reg_id_mmfr3, boot->reg_id_mmfr3); 7503086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_PFR0_EL1, cpu, 7513086d391SSuzuki K. Poulose info->reg_id_pfr0, boot->reg_id_pfr0); 7523086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_PFR1_EL1, cpu, 7533086d391SSuzuki K. Poulose info->reg_id_pfr1, boot->reg_id_pfr1); 7543086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_MVFR0_EL1, cpu, 7553086d391SSuzuki K. Poulose info->reg_mvfr0, boot->reg_mvfr0); 7563086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_MVFR1_EL1, cpu, 7573086d391SSuzuki K. Poulose info->reg_mvfr1, boot->reg_mvfr1); 7583086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_MVFR2_EL1, cpu, 7593086d391SSuzuki K. Poulose info->reg_mvfr2, boot->reg_mvfr2); 760a6dc3cd7SSuzuki K Poulose } 7613086d391SSuzuki K. Poulose 7622e0f2478SDave Martin if (id_aa64pfr0_sve(info->reg_id_aa64pfr0)) { 7632e0f2478SDave Martin taint |= check_update_ftr_reg(SYS_ZCR_EL1, cpu, 7642e0f2478SDave Martin info->reg_zcr, boot->reg_zcr); 7652e0f2478SDave Martin 7662e0f2478SDave Martin /* Probe vector lengths, unless we already gave up on SVE */ 7672e0f2478SDave Martin if (id_aa64pfr0_sve(read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1)) && 7682e0f2478SDave Martin !sys_caps_initialised) 7692e0f2478SDave Martin sve_update_vq_map(); 7702e0f2478SDave Martin } 7712e0f2478SDave Martin 7723086d391SSuzuki K. Poulose /* 7733086d391SSuzuki K. Poulose * Mismatched CPU features are a recipe for disaster. Don't even 7743086d391SSuzuki K. Poulose * pretend to support them. 7753086d391SSuzuki K. Poulose */ 7768dd0ee65SWill Deacon if (taint) { 7773fde2999SWill Deacon pr_warn_once("Unsupported CPU feature variation detected.\n"); 7783fde2999SWill Deacon add_taint(TAINT_CPU_OUT_OF_SPEC, LOCKDEP_STILL_OK); 779cdcf817bSSuzuki K. Poulose } 7808dd0ee65SWill Deacon } 781cdcf817bSSuzuki K. Poulose 78246823dd1SDave Martin u64 read_sanitised_ftr_reg(u32 id) 783b3f15378SSuzuki K. Poulose { 784b3f15378SSuzuki K. Poulose struct arm64_ftr_reg *regp = get_arm64_ftr_reg(id); 785b3f15378SSuzuki K. Poulose 786b3f15378SSuzuki K. Poulose /* We shouldn't get a request for an unsupported register */ 787b3f15378SSuzuki K. Poulose BUG_ON(!regp); 788b3f15378SSuzuki K. Poulose return regp->sys_val; 789b3f15378SSuzuki K. Poulose } 790359b7064SMarc Zyngier 791965861d6SMark Rutland #define read_sysreg_case(r) \ 792965861d6SMark Rutland case r: return read_sysreg_s(r) 793965861d6SMark Rutland 79492406f0cSSuzuki K Poulose /* 79546823dd1SDave Martin * __read_sysreg_by_encoding() - Used by a STARTING cpu before cpuinfo is populated. 79692406f0cSSuzuki K Poulose * Read the system register on the current CPU 79792406f0cSSuzuki K Poulose */ 79846823dd1SDave Martin static u64 __read_sysreg_by_encoding(u32 sys_id) 79992406f0cSSuzuki K Poulose { 80092406f0cSSuzuki K Poulose switch (sys_id) { 801965861d6SMark Rutland read_sysreg_case(SYS_ID_PFR0_EL1); 802965861d6SMark Rutland read_sysreg_case(SYS_ID_PFR1_EL1); 803965861d6SMark Rutland read_sysreg_case(SYS_ID_DFR0_EL1); 804965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR0_EL1); 805965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR1_EL1); 806965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR2_EL1); 807965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR3_EL1); 808965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR0_EL1); 809965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR1_EL1); 810965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR2_EL1); 811965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR3_EL1); 812965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR4_EL1); 813965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR5_EL1); 814965861d6SMark Rutland read_sysreg_case(SYS_MVFR0_EL1); 815965861d6SMark Rutland read_sysreg_case(SYS_MVFR1_EL1); 816965861d6SMark Rutland read_sysreg_case(SYS_MVFR2_EL1); 81792406f0cSSuzuki K Poulose 818965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64PFR0_EL1); 819965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64PFR1_EL1); 820965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64DFR0_EL1); 821965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64DFR1_EL1); 822965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64MMFR0_EL1); 823965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64MMFR1_EL1); 824965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64MMFR2_EL1); 825965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64ISAR0_EL1); 826965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64ISAR1_EL1); 82792406f0cSSuzuki K Poulose 828965861d6SMark Rutland read_sysreg_case(SYS_CNTFRQ_EL0); 829965861d6SMark Rutland read_sysreg_case(SYS_CTR_EL0); 830965861d6SMark Rutland read_sysreg_case(SYS_DCZID_EL0); 831965861d6SMark Rutland 83292406f0cSSuzuki K Poulose default: 83392406f0cSSuzuki K Poulose BUG(); 83492406f0cSSuzuki K Poulose return 0; 83592406f0cSSuzuki K Poulose } 83692406f0cSSuzuki K Poulose } 83792406f0cSSuzuki K Poulose 838963fcd40SMarc Zyngier #include <linux/irqchip/arm-gic-v3.h> 839963fcd40SMarc Zyngier 84094a9e04aSMarc Zyngier static bool 84118ffa046SJames Morse feature_matches(u64 reg, const struct arm64_cpu_capabilities *entry) 84218ffa046SJames Morse { 84328c5dcb2SSuzuki K Poulose int val = cpuid_feature_extract_field(reg, entry->field_pos, entry->sign); 84418ffa046SJames Morse 84518ffa046SJames Morse return val >= entry->min_field_value; 84618ffa046SJames Morse } 84718ffa046SJames Morse 848da8d02d1SSuzuki K. Poulose static bool 84992406f0cSSuzuki K Poulose has_cpuid_feature(const struct arm64_cpu_capabilities *entry, int scope) 850da8d02d1SSuzuki K. Poulose { 851da8d02d1SSuzuki K. Poulose u64 val; 85294a9e04aSMarc Zyngier 85392406f0cSSuzuki K Poulose WARN_ON(scope == SCOPE_LOCAL_CPU && preemptible()); 85492406f0cSSuzuki K Poulose if (scope == SCOPE_SYSTEM) 85546823dd1SDave Martin val = read_sanitised_ftr_reg(entry->sys_reg); 85692406f0cSSuzuki K Poulose else 85746823dd1SDave Martin val = __read_sysreg_by_encoding(entry->sys_reg); 85892406f0cSSuzuki K Poulose 859da8d02d1SSuzuki K. Poulose return feature_matches(val, entry); 860da8d02d1SSuzuki K. Poulose } 861338d4f49SJames Morse 86292406f0cSSuzuki K Poulose static bool has_useable_gicv3_cpuif(const struct arm64_cpu_capabilities *entry, int scope) 863963fcd40SMarc Zyngier { 864963fcd40SMarc Zyngier bool has_sre; 865963fcd40SMarc Zyngier 86692406f0cSSuzuki K Poulose if (!has_cpuid_feature(entry, scope)) 867963fcd40SMarc Zyngier return false; 868963fcd40SMarc Zyngier 869963fcd40SMarc Zyngier has_sre = gic_enable_sre(); 870963fcd40SMarc Zyngier if (!has_sre) 871963fcd40SMarc Zyngier pr_warn_once("%s present but disabled by higher exception level\n", 872963fcd40SMarc Zyngier entry->desc); 873963fcd40SMarc Zyngier 874963fcd40SMarc Zyngier return has_sre; 875963fcd40SMarc Zyngier } 876963fcd40SMarc Zyngier 87792406f0cSSuzuki K Poulose static bool has_no_hw_prefetch(const struct arm64_cpu_capabilities *entry, int __unused) 878d5370f75SWill Deacon { 879d5370f75SWill Deacon u32 midr = read_cpuid_id(); 880d5370f75SWill Deacon 881d5370f75SWill Deacon /* Cavium ThunderX pass 1.x and 2.x */ 882fa5ce3d1SRobert Richter return MIDR_IS_CPU_MODEL_RANGE(midr, MIDR_THUNDERX, 883fa5ce3d1SRobert Richter MIDR_CPU_VAR_REV(0, 0), 884fa5ce3d1SRobert Richter MIDR_CPU_VAR_REV(1, MIDR_REVISION_MASK)); 885d5370f75SWill Deacon } 886d5370f75SWill Deacon 88782e0191aSSuzuki K Poulose static bool has_no_fpsimd(const struct arm64_cpu_capabilities *entry, int __unused) 88882e0191aSSuzuki K Poulose { 88946823dd1SDave Martin u64 pfr0 = read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1); 89082e0191aSSuzuki K Poulose 89182e0191aSSuzuki K Poulose return cpuid_feature_extract_signed_field(pfr0, 89282e0191aSSuzuki K Poulose ID_AA64PFR0_FP_SHIFT) < 0; 89382e0191aSSuzuki K Poulose } 89482e0191aSSuzuki K Poulose 8956ae4b6e0SShanker Donthineni static bool has_cache_idc(const struct arm64_cpu_capabilities *entry, 8968ab66cbeSSuzuki K Poulose int scope) 8976ae4b6e0SShanker Donthineni { 8988ab66cbeSSuzuki K Poulose u64 ctr; 8998ab66cbeSSuzuki K Poulose 9008ab66cbeSSuzuki K Poulose if (scope == SCOPE_SYSTEM) 9018ab66cbeSSuzuki K Poulose ctr = arm64_ftr_reg_ctrel0.sys_val; 9028ab66cbeSSuzuki K Poulose else 9031602df02SSuzuki K Poulose ctr = read_cpuid_effective_cachetype(); 9048ab66cbeSSuzuki K Poulose 9058ab66cbeSSuzuki K Poulose return ctr & BIT(CTR_IDC_SHIFT); 9066ae4b6e0SShanker Donthineni } 9076ae4b6e0SShanker Donthineni 9081602df02SSuzuki K Poulose static void cpu_emulate_effective_ctr(const struct arm64_cpu_capabilities *__unused) 9091602df02SSuzuki K Poulose { 9101602df02SSuzuki K Poulose /* 9111602df02SSuzuki K Poulose * If the CPU exposes raw CTR_EL0.IDC = 0, while effectively 9121602df02SSuzuki K Poulose * CTR_EL0.IDC = 1 (from CLIDR values), we need to trap accesses 9131602df02SSuzuki K Poulose * to the CTR_EL0 on this CPU and emulate it with the real/safe 9141602df02SSuzuki K Poulose * value. 9151602df02SSuzuki K Poulose */ 9161602df02SSuzuki K Poulose if (!(read_cpuid_cachetype() & BIT(CTR_IDC_SHIFT))) 9171602df02SSuzuki K Poulose sysreg_clear_set(sctlr_el1, SCTLR_EL1_UCT, 0); 9181602df02SSuzuki K Poulose } 9191602df02SSuzuki K Poulose 9206ae4b6e0SShanker Donthineni static bool has_cache_dic(const struct arm64_cpu_capabilities *entry, 9218ab66cbeSSuzuki K Poulose int scope) 9226ae4b6e0SShanker Donthineni { 9238ab66cbeSSuzuki K Poulose u64 ctr; 9248ab66cbeSSuzuki K Poulose 9258ab66cbeSSuzuki K Poulose if (scope == SCOPE_SYSTEM) 9268ab66cbeSSuzuki K Poulose ctr = arm64_ftr_reg_ctrel0.sys_val; 9278ab66cbeSSuzuki K Poulose else 9288ab66cbeSSuzuki K Poulose ctr = read_cpuid_cachetype(); 9298ab66cbeSSuzuki K Poulose 9308ab66cbeSSuzuki K Poulose return ctr & BIT(CTR_DIC_SHIFT); 9316ae4b6e0SShanker Donthineni } 9326ae4b6e0SShanker Donthineni 9335ffdfaedSVladimir Murzin static bool __maybe_unused 9345ffdfaedSVladimir Murzin has_useable_cnp(const struct arm64_cpu_capabilities *entry, int scope) 9355ffdfaedSVladimir Murzin { 9365ffdfaedSVladimir Murzin /* 9375ffdfaedSVladimir Murzin * Kdump isn't guaranteed to power-off all secondary CPUs, CNP 9385ffdfaedSVladimir Murzin * may share TLB entries with a CPU stuck in the crashed 9395ffdfaedSVladimir Murzin * kernel. 9405ffdfaedSVladimir Murzin */ 9415ffdfaedSVladimir Murzin if (is_kdump_kernel()) 9425ffdfaedSVladimir Murzin return false; 9435ffdfaedSVladimir Murzin 9445ffdfaedSVladimir Murzin return has_cpuid_feature(entry, scope); 9455ffdfaedSVladimir Murzin } 9465ffdfaedSVladimir Murzin 947ea1e3de8SWill Deacon #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 948ea1e3de8SWill Deacon static int __kpti_forced; /* 0: not forced, >0: forced on, <0: forced off */ 949ea1e3de8SWill Deacon 950ea1e3de8SWill Deacon static bool unmap_kernel_at_el0(const struct arm64_cpu_capabilities *entry, 951d3aec8a2SSuzuki K Poulose int scope) 952ea1e3de8SWill Deacon { 953be5b2998SSuzuki K Poulose /* List of CPUs that are not vulnerable and don't need KPTI */ 954be5b2998SSuzuki K Poulose static const struct midr_range kpti_safe_list[] = { 955be5b2998SSuzuki K Poulose MIDR_ALL_VERSIONS(MIDR_CAVIUM_THUNDERX2), 956be5b2998SSuzuki K Poulose MIDR_ALL_VERSIONS(MIDR_BRCM_VULCAN), 9572a355ec2SWill Deacon MIDR_ALL_VERSIONS(MIDR_CORTEX_A35), 9582a355ec2SWill Deacon MIDR_ALL_VERSIONS(MIDR_CORTEX_A53), 9592a355ec2SWill Deacon MIDR_ALL_VERSIONS(MIDR_CORTEX_A55), 9602a355ec2SWill Deacon MIDR_ALL_VERSIONS(MIDR_CORTEX_A57), 9612a355ec2SWill Deacon MIDR_ALL_VERSIONS(MIDR_CORTEX_A72), 9622a355ec2SWill Deacon MIDR_ALL_VERSIONS(MIDR_CORTEX_A73), 96371c751f2SMark Rutland { /* sentinel */ } 964be5b2998SSuzuki K Poulose }; 9656dc52b15SMarc Zyngier char const *str = "command line option"; 966179a56f6SWill Deacon 9676dc52b15SMarc Zyngier /* 9686dc52b15SMarc Zyngier * For reasons that aren't entirely clear, enabling KPTI on Cavium 9696dc52b15SMarc Zyngier * ThunderX leads to apparent I-cache corruption of kernel text, which 9706dc52b15SMarc Zyngier * ends as well as you might imagine. Don't even try. 9716dc52b15SMarc Zyngier */ 9726dc52b15SMarc Zyngier if (cpus_have_const_cap(ARM64_WORKAROUND_CAVIUM_27456)) { 9736dc52b15SMarc Zyngier str = "ARM64_WORKAROUND_CAVIUM_27456"; 9746dc52b15SMarc Zyngier __kpti_forced = -1; 9756dc52b15SMarc Zyngier } 9766dc52b15SMarc Zyngier 9776dc52b15SMarc Zyngier /* Forced? */ 978ea1e3de8SWill Deacon if (__kpti_forced) { 9796dc52b15SMarc Zyngier pr_info_once("kernel page table isolation forced %s by %s\n", 9806dc52b15SMarc Zyngier __kpti_forced > 0 ? "ON" : "OFF", str); 981ea1e3de8SWill Deacon return __kpti_forced > 0; 982ea1e3de8SWill Deacon } 983ea1e3de8SWill Deacon 984ea1e3de8SWill Deacon /* Useful for KASLR robustness */ 985ea1e3de8SWill Deacon if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) 986ea1e3de8SWill Deacon return true; 987ea1e3de8SWill Deacon 9880ba2e29cSJayachandran C /* Don't force KPTI for CPUs that are not vulnerable */ 989be5b2998SSuzuki K Poulose if (is_midr_in_range_list(read_cpuid_id(), kpti_safe_list)) 9900ba2e29cSJayachandran C return false; 9910ba2e29cSJayachandran C 992179a56f6SWill Deacon /* Defer to CPU feature registers */ 993d3aec8a2SSuzuki K Poulose return !has_cpuid_feature(entry, scope); 994ea1e3de8SWill Deacon } 995ea1e3de8SWill Deacon 996c0cda3b8SDave Martin static void 997c0cda3b8SDave Martin kpti_install_ng_mappings(const struct arm64_cpu_capabilities *__unused) 998f992b4dfSWill Deacon { 999f992b4dfSWill Deacon typedef void (kpti_remap_fn)(int, int, phys_addr_t); 1000f992b4dfSWill Deacon extern kpti_remap_fn idmap_kpti_install_ng_mappings; 1001f992b4dfSWill Deacon kpti_remap_fn *remap_fn; 1002f992b4dfSWill Deacon 1003f992b4dfSWill Deacon static bool kpti_applied = false; 1004f992b4dfSWill Deacon int cpu = smp_processor_id(); 1005f992b4dfSWill Deacon 1006f992b4dfSWill Deacon if (kpti_applied) 1007c0cda3b8SDave Martin return; 1008f992b4dfSWill Deacon 1009f992b4dfSWill Deacon remap_fn = (void *)__pa_symbol(idmap_kpti_install_ng_mappings); 1010f992b4dfSWill Deacon 1011f992b4dfSWill Deacon cpu_install_idmap(); 1012f992b4dfSWill Deacon remap_fn(cpu, num_online_cpus(), __pa_symbol(swapper_pg_dir)); 1013f992b4dfSWill Deacon cpu_uninstall_idmap(); 1014f992b4dfSWill Deacon 1015f992b4dfSWill Deacon if (!cpu) 1016f992b4dfSWill Deacon kpti_applied = true; 1017f992b4dfSWill Deacon 1018c0cda3b8SDave Martin return; 1019f992b4dfSWill Deacon } 1020f992b4dfSWill Deacon 1021ea1e3de8SWill Deacon static int __init parse_kpti(char *str) 1022ea1e3de8SWill Deacon { 1023ea1e3de8SWill Deacon bool enabled; 1024ea1e3de8SWill Deacon int ret = strtobool(str, &enabled); 1025ea1e3de8SWill Deacon 1026ea1e3de8SWill Deacon if (ret) 1027ea1e3de8SWill Deacon return ret; 1028ea1e3de8SWill Deacon 1029ea1e3de8SWill Deacon __kpti_forced = enabled ? 1 : -1; 1030ea1e3de8SWill Deacon return 0; 1031ea1e3de8SWill Deacon } 1032b5b7dd64SWill Deacon early_param("kpti", parse_kpti); 1033ea1e3de8SWill Deacon #endif /* CONFIG_UNMAP_KERNEL_AT_EL0 */ 1034ea1e3de8SWill Deacon 103505abb595SSuzuki K Poulose #ifdef CONFIG_ARM64_HW_AFDBM 103605abb595SSuzuki K Poulose static inline void __cpu_enable_hw_dbm(void) 103705abb595SSuzuki K Poulose { 103805abb595SSuzuki K Poulose u64 tcr = read_sysreg(tcr_el1) | TCR_HD; 103905abb595SSuzuki K Poulose 104005abb595SSuzuki K Poulose write_sysreg(tcr, tcr_el1); 104105abb595SSuzuki K Poulose isb(); 104205abb595SSuzuki K Poulose } 104305abb595SSuzuki K Poulose 1044ece1397cSSuzuki K Poulose static bool cpu_has_broken_dbm(void) 1045ece1397cSSuzuki K Poulose { 1046ece1397cSSuzuki K Poulose /* List of CPUs which have broken DBM support. */ 1047ece1397cSSuzuki K Poulose static const struct midr_range cpus[] = { 1048ece1397cSSuzuki K Poulose #ifdef CONFIG_ARM64_ERRATUM_1024718 1049ece1397cSSuzuki K Poulose MIDR_RANGE(MIDR_CORTEX_A55, 0, 0, 1, 0), // A55 r0p0 -r1p0 1050ece1397cSSuzuki K Poulose #endif 1051ece1397cSSuzuki K Poulose {}, 1052ece1397cSSuzuki K Poulose }; 1053ece1397cSSuzuki K Poulose 1054ece1397cSSuzuki K Poulose return is_midr_in_range_list(read_cpuid_id(), cpus); 1055ece1397cSSuzuki K Poulose } 1056ece1397cSSuzuki K Poulose 105705abb595SSuzuki K Poulose static bool cpu_can_use_dbm(const struct arm64_cpu_capabilities *cap) 105805abb595SSuzuki K Poulose { 1059ece1397cSSuzuki K Poulose return has_cpuid_feature(cap, SCOPE_LOCAL_CPU) && 1060ece1397cSSuzuki K Poulose !cpu_has_broken_dbm(); 106105abb595SSuzuki K Poulose } 106205abb595SSuzuki K Poulose 106305abb595SSuzuki K Poulose static void cpu_enable_hw_dbm(struct arm64_cpu_capabilities const *cap) 106405abb595SSuzuki K Poulose { 106505abb595SSuzuki K Poulose if (cpu_can_use_dbm(cap)) 106605abb595SSuzuki K Poulose __cpu_enable_hw_dbm(); 106705abb595SSuzuki K Poulose } 106805abb595SSuzuki K Poulose 106905abb595SSuzuki K Poulose static bool has_hw_dbm(const struct arm64_cpu_capabilities *cap, 107005abb595SSuzuki K Poulose int __unused) 107105abb595SSuzuki K Poulose { 107205abb595SSuzuki K Poulose static bool detected = false; 107305abb595SSuzuki K Poulose /* 107405abb595SSuzuki K Poulose * DBM is a non-conflicting feature. i.e, the kernel can safely 107505abb595SSuzuki K Poulose * run a mix of CPUs with and without the feature. So, we 107605abb595SSuzuki K Poulose * unconditionally enable the capability to allow any late CPU 107705abb595SSuzuki K Poulose * to use the feature. We only enable the control bits on the 107805abb595SSuzuki K Poulose * CPU, if it actually supports. 107905abb595SSuzuki K Poulose * 108005abb595SSuzuki K Poulose * We have to make sure we print the "feature" detection only 108105abb595SSuzuki K Poulose * when at least one CPU actually uses it. So check if this CPU 108205abb595SSuzuki K Poulose * can actually use it and print the message exactly once. 108305abb595SSuzuki K Poulose * 108405abb595SSuzuki K Poulose * This is safe as all CPUs (including secondary CPUs - due to the 108505abb595SSuzuki K Poulose * LOCAL_CPU scope - and the hotplugged CPUs - via verification) 108605abb595SSuzuki K Poulose * goes through the "matches" check exactly once. Also if a CPU 108705abb595SSuzuki K Poulose * matches the criteria, it is guaranteed that the CPU will turn 108805abb595SSuzuki K Poulose * the DBM on, as the capability is unconditionally enabled. 108905abb595SSuzuki K Poulose */ 109005abb595SSuzuki K Poulose if (!detected && cpu_can_use_dbm(cap)) { 109105abb595SSuzuki K Poulose detected = true; 109205abb595SSuzuki K Poulose pr_info("detected: Hardware dirty bit management\n"); 109305abb595SSuzuki K Poulose } 109405abb595SSuzuki K Poulose 109505abb595SSuzuki K Poulose return true; 109605abb595SSuzuki K Poulose } 109705abb595SSuzuki K Poulose 109805abb595SSuzuki K Poulose #endif 109905abb595SSuzuki K Poulose 110012eb3691SWill Deacon #ifdef CONFIG_ARM64_VHE 110112eb3691SWill Deacon static bool runs_at_el2(const struct arm64_cpu_capabilities *entry, int __unused) 110212eb3691SWill Deacon { 110312eb3691SWill Deacon return is_kernel_in_hyp_mode(); 110412eb3691SWill Deacon } 110512eb3691SWill Deacon 1106c0cda3b8SDave Martin static void cpu_copy_el2regs(const struct arm64_cpu_capabilities *__unused) 11076d99b689SJames Morse { 11086d99b689SJames Morse /* 11096d99b689SJames Morse * Copy register values that aren't redirected by hardware. 11106d99b689SJames Morse * 11116d99b689SJames Morse * Before code patching, we only set tpidr_el1, all CPUs need to copy 11126d99b689SJames Morse * this value to tpidr_el2 before we patch the code. Once we've done 11136d99b689SJames Morse * that, freshly-onlined CPUs will set tpidr_el2, so we don't need to 11146d99b689SJames Morse * do anything here. 11156d99b689SJames Morse */ 11166d99b689SJames Morse if (!alternatives_applied) 11176d99b689SJames Morse write_sysreg(read_sysreg(tpidr_el1), tpidr_el2); 11186d99b689SJames Morse } 111912eb3691SWill Deacon #endif 11206d99b689SJames Morse 1121e48d53a9SMarc Zyngier static void cpu_has_fwb(const struct arm64_cpu_capabilities *__unused) 1122e48d53a9SMarc Zyngier { 1123e48d53a9SMarc Zyngier u64 val = read_sysreg_s(SYS_CLIDR_EL1); 1124e48d53a9SMarc Zyngier 1125e48d53a9SMarc Zyngier /* Check that CLIDR_EL1.LOU{U,IS} are both 0 */ 1126e48d53a9SMarc Zyngier WARN_ON(val & (7 << 27 | 7 << 21)); 1127e48d53a9SMarc Zyngier } 1128e48d53a9SMarc Zyngier 11298f04e8e6SWill Deacon #ifdef CONFIG_ARM64_SSBD 11308f04e8e6SWill Deacon static int ssbs_emulation_handler(struct pt_regs *regs, u32 instr) 11318f04e8e6SWill Deacon { 11328f04e8e6SWill Deacon if (user_mode(regs)) 11338f04e8e6SWill Deacon return 1; 11348f04e8e6SWill Deacon 113574e24828SSuzuki K Poulose if (instr & BIT(PSTATE_Imm_shift)) 11368f04e8e6SWill Deacon regs->pstate |= PSR_SSBS_BIT; 11378f04e8e6SWill Deacon else 11388f04e8e6SWill Deacon regs->pstate &= ~PSR_SSBS_BIT; 11398f04e8e6SWill Deacon 11408f04e8e6SWill Deacon arm64_skip_faulting_instruction(regs, 4); 11418f04e8e6SWill Deacon return 0; 11428f04e8e6SWill Deacon } 11438f04e8e6SWill Deacon 11448f04e8e6SWill Deacon static struct undef_hook ssbs_emulation_hook = { 114574e24828SSuzuki K Poulose .instr_mask = ~(1U << PSTATE_Imm_shift), 114674e24828SSuzuki K Poulose .instr_val = 0xd500401f | PSTATE_SSBS, 11478f04e8e6SWill Deacon .fn = ssbs_emulation_handler, 11488f04e8e6SWill Deacon }; 11498f04e8e6SWill Deacon 11508f04e8e6SWill Deacon static void cpu_enable_ssbs(const struct arm64_cpu_capabilities *__unused) 11518f04e8e6SWill Deacon { 11528f04e8e6SWill Deacon static bool undef_hook_registered = false; 11538f04e8e6SWill Deacon static DEFINE_SPINLOCK(hook_lock); 11548f04e8e6SWill Deacon 11558f04e8e6SWill Deacon spin_lock(&hook_lock); 11568f04e8e6SWill Deacon if (!undef_hook_registered) { 11578f04e8e6SWill Deacon register_undef_hook(&ssbs_emulation_hook); 11588f04e8e6SWill Deacon undef_hook_registered = true; 11598f04e8e6SWill Deacon } 11608f04e8e6SWill Deacon spin_unlock(&hook_lock); 11618f04e8e6SWill Deacon 11628f04e8e6SWill Deacon if (arm64_get_ssbd_state() == ARM64_SSBD_FORCE_DISABLE) { 11638f04e8e6SWill Deacon sysreg_clear_set(sctlr_el1, 0, SCTLR_ELx_DSSBS); 11648f04e8e6SWill Deacon arm64_set_ssbd_mitigation(false); 11658f04e8e6SWill Deacon } else { 11668f04e8e6SWill Deacon arm64_set_ssbd_mitigation(true); 11678f04e8e6SWill Deacon } 11688f04e8e6SWill Deacon } 11698f04e8e6SWill Deacon #endif /* CONFIG_ARM64_SSBD */ 11708f04e8e6SWill Deacon 1171b8925ee2SWill Deacon #ifdef CONFIG_ARM64_PAN 1172b8925ee2SWill Deacon static void cpu_enable_pan(const struct arm64_cpu_capabilities *__unused) 1173b8925ee2SWill Deacon { 1174b8925ee2SWill Deacon /* 1175b8925ee2SWill Deacon * We modify PSTATE. This won't work from irq context as the PSTATE 1176b8925ee2SWill Deacon * is discarded once we return from the exception. 1177b8925ee2SWill Deacon */ 1178b8925ee2SWill Deacon WARN_ON_ONCE(in_interrupt()); 1179b8925ee2SWill Deacon 1180b8925ee2SWill Deacon sysreg_clear_set(sctlr_el1, SCTLR_EL1_SPAN, 0); 1181b8925ee2SWill Deacon asm(SET_PSTATE_PAN(1)); 1182b8925ee2SWill Deacon } 1183b8925ee2SWill Deacon #endif /* CONFIG_ARM64_PAN */ 1184b8925ee2SWill Deacon 1185b8925ee2SWill Deacon #ifdef CONFIG_ARM64_RAS_EXTN 1186b8925ee2SWill Deacon static void cpu_clear_disr(const struct arm64_cpu_capabilities *__unused) 1187b8925ee2SWill Deacon { 1188b8925ee2SWill Deacon /* Firmware may have left a deferred SError in this register. */ 1189b8925ee2SWill Deacon write_sysreg_s(0, SYS_DISR_EL1); 1190b8925ee2SWill Deacon } 1191b8925ee2SWill Deacon #endif /* CONFIG_ARM64_RAS_EXTN */ 1192b8925ee2SWill Deacon 1193*6984eb47SMark Rutland #ifdef CONFIG_ARM64_PTR_AUTH 1194*6984eb47SMark Rutland static bool has_address_auth(const struct arm64_cpu_capabilities *entry, 1195*6984eb47SMark Rutland int __unused) 1196*6984eb47SMark Rutland { 1197*6984eb47SMark Rutland u64 isar1 = read_sanitised_ftr_reg(SYS_ID_AA64ISAR1_EL1); 1198*6984eb47SMark Rutland bool api, apa; 1199*6984eb47SMark Rutland 1200*6984eb47SMark Rutland apa = cpuid_feature_extract_unsigned_field(isar1, 1201*6984eb47SMark Rutland ID_AA64ISAR1_APA_SHIFT) > 0; 1202*6984eb47SMark Rutland api = cpuid_feature_extract_unsigned_field(isar1, 1203*6984eb47SMark Rutland ID_AA64ISAR1_API_SHIFT) > 0; 1204*6984eb47SMark Rutland 1205*6984eb47SMark Rutland return apa || api; 1206*6984eb47SMark Rutland } 1207*6984eb47SMark Rutland 1208*6984eb47SMark Rutland static bool has_generic_auth(const struct arm64_cpu_capabilities *entry, 1209*6984eb47SMark Rutland int __unused) 1210*6984eb47SMark Rutland { 1211*6984eb47SMark Rutland u64 isar1 = read_sanitised_ftr_reg(SYS_ID_AA64ISAR1_EL1); 1212*6984eb47SMark Rutland bool gpi, gpa; 1213*6984eb47SMark Rutland 1214*6984eb47SMark Rutland gpa = cpuid_feature_extract_unsigned_field(isar1, 1215*6984eb47SMark Rutland ID_AA64ISAR1_GPA_SHIFT) > 0; 1216*6984eb47SMark Rutland gpi = cpuid_feature_extract_unsigned_field(isar1, 1217*6984eb47SMark Rutland ID_AA64ISAR1_GPI_SHIFT) > 0; 1218*6984eb47SMark Rutland 1219*6984eb47SMark Rutland return gpa || gpi; 1220*6984eb47SMark Rutland } 1221*6984eb47SMark Rutland #endif /* CONFIG_ARM64_PTR_AUTH */ 1222*6984eb47SMark Rutland 1223359b7064SMarc Zyngier static const struct arm64_cpu_capabilities arm64_features[] = { 122494a9e04aSMarc Zyngier { 122594a9e04aSMarc Zyngier .desc = "GIC system register CPU interface", 122694a9e04aSMarc Zyngier .capability = ARM64_HAS_SYSREG_GIC_CPUIF, 12275b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1228963fcd40SMarc Zyngier .matches = has_useable_gicv3_cpuif, 1229da8d02d1SSuzuki K. Poulose .sys_reg = SYS_ID_AA64PFR0_EL1, 1230da8d02d1SSuzuki K. Poulose .field_pos = ID_AA64PFR0_GIC_SHIFT, 1231ff96f7bcSSuzuki K Poulose .sign = FTR_UNSIGNED, 123218ffa046SJames Morse .min_field_value = 1, 123394a9e04aSMarc Zyngier }, 1234338d4f49SJames Morse #ifdef CONFIG_ARM64_PAN 1235338d4f49SJames Morse { 1236338d4f49SJames Morse .desc = "Privileged Access Never", 1237338d4f49SJames Morse .capability = ARM64_HAS_PAN, 12385b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1239da8d02d1SSuzuki K. Poulose .matches = has_cpuid_feature, 1240da8d02d1SSuzuki K. Poulose .sys_reg = SYS_ID_AA64MMFR1_EL1, 1241da8d02d1SSuzuki K. Poulose .field_pos = ID_AA64MMFR1_PAN_SHIFT, 1242ff96f7bcSSuzuki K Poulose .sign = FTR_UNSIGNED, 1243338d4f49SJames Morse .min_field_value = 1, 1244c0cda3b8SDave Martin .cpu_enable = cpu_enable_pan, 1245338d4f49SJames Morse }, 1246338d4f49SJames Morse #endif /* CONFIG_ARM64_PAN */ 12472e94da13SWill Deacon #if defined(CONFIG_AS_LSE) && defined(CONFIG_ARM64_LSE_ATOMICS) 12482e94da13SWill Deacon { 12492e94da13SWill Deacon .desc = "LSE atomic instructions", 12502e94da13SWill Deacon .capability = ARM64_HAS_LSE_ATOMICS, 12515b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1252da8d02d1SSuzuki K. Poulose .matches = has_cpuid_feature, 1253da8d02d1SSuzuki K. Poulose .sys_reg = SYS_ID_AA64ISAR0_EL1, 1254da8d02d1SSuzuki K. Poulose .field_pos = ID_AA64ISAR0_ATOMICS_SHIFT, 1255ff96f7bcSSuzuki K Poulose .sign = FTR_UNSIGNED, 12562e94da13SWill Deacon .min_field_value = 2, 12572e94da13SWill Deacon }, 12582e94da13SWill Deacon #endif /* CONFIG_AS_LSE && CONFIG_ARM64_LSE_ATOMICS */ 1259d88701beSMarc Zyngier { 1260d5370f75SWill Deacon .desc = "Software prefetching using PRFM", 1261d5370f75SWill Deacon .capability = ARM64_HAS_NO_HW_PREFETCH, 12625c137714SSuzuki K Poulose .type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE, 1263d5370f75SWill Deacon .matches = has_no_hw_prefetch, 1264d5370f75SWill Deacon }, 126557f4959bSJames Morse #ifdef CONFIG_ARM64_UAO 126657f4959bSJames Morse { 126757f4959bSJames Morse .desc = "User Access Override", 126857f4959bSJames Morse .capability = ARM64_HAS_UAO, 12695b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 127057f4959bSJames Morse .matches = has_cpuid_feature, 127157f4959bSJames Morse .sys_reg = SYS_ID_AA64MMFR2_EL1, 127257f4959bSJames Morse .field_pos = ID_AA64MMFR2_UAO_SHIFT, 127357f4959bSJames Morse .min_field_value = 1, 1274c8b06e3fSJames Morse /* 1275c8b06e3fSJames Morse * We rely on stop_machine() calling uao_thread_switch() to set 1276c8b06e3fSJames Morse * UAO immediately after patching. 1277c8b06e3fSJames Morse */ 127857f4959bSJames Morse }, 127957f4959bSJames Morse #endif /* CONFIG_ARM64_UAO */ 128070544196SJames Morse #ifdef CONFIG_ARM64_PAN 128170544196SJames Morse { 128270544196SJames Morse .capability = ARM64_ALT_PAN_NOT_UAO, 12835b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 128470544196SJames Morse .matches = cpufeature_pan_not_uao, 128570544196SJames Morse }, 128670544196SJames Morse #endif /* CONFIG_ARM64_PAN */ 1287830dcc9fSSuzuki K Poulose #ifdef CONFIG_ARM64_VHE 1288588ab3f9SLinus Torvalds { 1289d88701beSMarc Zyngier .desc = "Virtualization Host Extensions", 1290d88701beSMarc Zyngier .capability = ARM64_HAS_VIRT_HOST_EXTN, 1291830dcc9fSSuzuki K Poulose .type = ARM64_CPUCAP_STRICT_BOOT_CPU_FEATURE, 1292d88701beSMarc Zyngier .matches = runs_at_el2, 1293c0cda3b8SDave Martin .cpu_enable = cpu_copy_el2regs, 1294d88701beSMarc Zyngier }, 1295830dcc9fSSuzuki K Poulose #endif /* CONFIG_ARM64_VHE */ 1296042446a3SSuzuki K Poulose { 1297042446a3SSuzuki K Poulose .desc = "32-bit EL0 Support", 1298042446a3SSuzuki K Poulose .capability = ARM64_HAS_32BIT_EL0, 12995b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1300042446a3SSuzuki K Poulose .matches = has_cpuid_feature, 1301042446a3SSuzuki K Poulose .sys_reg = SYS_ID_AA64PFR0_EL1, 1302042446a3SSuzuki K Poulose .sign = FTR_UNSIGNED, 1303042446a3SSuzuki K Poulose .field_pos = ID_AA64PFR0_EL0_SHIFT, 1304042446a3SSuzuki K Poulose .min_field_value = ID_AA64PFR0_EL0_32BIT_64BIT, 1305042446a3SSuzuki K Poulose }, 1306ea1e3de8SWill Deacon #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 1307ea1e3de8SWill Deacon { 1308179a56f6SWill Deacon .desc = "Kernel page table isolation (KPTI)", 1309ea1e3de8SWill Deacon .capability = ARM64_UNMAP_KERNEL_AT_EL0, 1310d3aec8a2SSuzuki K Poulose .type = ARM64_CPUCAP_BOOT_RESTRICTED_CPU_LOCAL_FEATURE, 1311d3aec8a2SSuzuki K Poulose /* 1312d3aec8a2SSuzuki K Poulose * The ID feature fields below are used to indicate that 1313d3aec8a2SSuzuki K Poulose * the CPU doesn't need KPTI. See unmap_kernel_at_el0 for 1314d3aec8a2SSuzuki K Poulose * more details. 1315d3aec8a2SSuzuki K Poulose */ 1316d3aec8a2SSuzuki K Poulose .sys_reg = SYS_ID_AA64PFR0_EL1, 1317d3aec8a2SSuzuki K Poulose .field_pos = ID_AA64PFR0_CSV3_SHIFT, 1318d3aec8a2SSuzuki K Poulose .min_field_value = 1, 1319ea1e3de8SWill Deacon .matches = unmap_kernel_at_el0, 1320c0cda3b8SDave Martin .cpu_enable = kpti_install_ng_mappings, 1321ea1e3de8SWill Deacon }, 1322ea1e3de8SWill Deacon #endif 132382e0191aSSuzuki K Poulose { 132482e0191aSSuzuki K Poulose /* FP/SIMD is not implemented */ 132582e0191aSSuzuki K Poulose .capability = ARM64_HAS_NO_FPSIMD, 13265b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 132782e0191aSSuzuki K Poulose .min_field_value = 0, 132882e0191aSSuzuki K Poulose .matches = has_no_fpsimd, 132982e0191aSSuzuki K Poulose }, 1330d50e071fSRobin Murphy #ifdef CONFIG_ARM64_PMEM 1331d50e071fSRobin Murphy { 1332d50e071fSRobin Murphy .desc = "Data cache clean to Point of Persistence", 1333d50e071fSRobin Murphy .capability = ARM64_HAS_DCPOP, 13345b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1335d50e071fSRobin Murphy .matches = has_cpuid_feature, 1336d50e071fSRobin Murphy .sys_reg = SYS_ID_AA64ISAR1_EL1, 1337d50e071fSRobin Murphy .field_pos = ID_AA64ISAR1_DPB_SHIFT, 1338d50e071fSRobin Murphy .min_field_value = 1, 1339d50e071fSRobin Murphy }, 1340d50e071fSRobin Murphy #endif 134143994d82SDave Martin #ifdef CONFIG_ARM64_SVE 134243994d82SDave Martin { 134343994d82SDave Martin .desc = "Scalable Vector Extension", 13445b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 134543994d82SDave Martin .capability = ARM64_SVE, 134643994d82SDave Martin .sys_reg = SYS_ID_AA64PFR0_EL1, 134743994d82SDave Martin .sign = FTR_UNSIGNED, 134843994d82SDave Martin .field_pos = ID_AA64PFR0_SVE_SHIFT, 134943994d82SDave Martin .min_field_value = ID_AA64PFR0_SVE, 135043994d82SDave Martin .matches = has_cpuid_feature, 1351c0cda3b8SDave Martin .cpu_enable = sve_kernel_enable, 135243994d82SDave Martin }, 135343994d82SDave Martin #endif /* CONFIG_ARM64_SVE */ 135464c02720SXie XiuQi #ifdef CONFIG_ARM64_RAS_EXTN 135564c02720SXie XiuQi { 135664c02720SXie XiuQi .desc = "RAS Extension Support", 135764c02720SXie XiuQi .capability = ARM64_HAS_RAS_EXTN, 13585b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 135964c02720SXie XiuQi .matches = has_cpuid_feature, 136064c02720SXie XiuQi .sys_reg = SYS_ID_AA64PFR0_EL1, 136164c02720SXie XiuQi .sign = FTR_UNSIGNED, 136264c02720SXie XiuQi .field_pos = ID_AA64PFR0_RAS_SHIFT, 136364c02720SXie XiuQi .min_field_value = ID_AA64PFR0_RAS_V1, 1364c0cda3b8SDave Martin .cpu_enable = cpu_clear_disr, 136564c02720SXie XiuQi }, 136664c02720SXie XiuQi #endif /* CONFIG_ARM64_RAS_EXTN */ 13676ae4b6e0SShanker Donthineni { 13686ae4b6e0SShanker Donthineni .desc = "Data cache clean to the PoU not required for I/D coherence", 13696ae4b6e0SShanker Donthineni .capability = ARM64_HAS_CACHE_IDC, 13705b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 13716ae4b6e0SShanker Donthineni .matches = has_cache_idc, 13721602df02SSuzuki K Poulose .cpu_enable = cpu_emulate_effective_ctr, 13736ae4b6e0SShanker Donthineni }, 13746ae4b6e0SShanker Donthineni { 13756ae4b6e0SShanker Donthineni .desc = "Instruction cache invalidation not required for I/D coherence", 13766ae4b6e0SShanker Donthineni .capability = ARM64_HAS_CACHE_DIC, 13775b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 13786ae4b6e0SShanker Donthineni .matches = has_cache_dic, 13796ae4b6e0SShanker Donthineni }, 1380e48d53a9SMarc Zyngier { 1381e48d53a9SMarc Zyngier .desc = "Stage-2 Force Write-Back", 1382e48d53a9SMarc Zyngier .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1383e48d53a9SMarc Zyngier .capability = ARM64_HAS_STAGE2_FWB, 1384e48d53a9SMarc Zyngier .sys_reg = SYS_ID_AA64MMFR2_EL1, 1385e48d53a9SMarc Zyngier .sign = FTR_UNSIGNED, 1386e48d53a9SMarc Zyngier .field_pos = ID_AA64MMFR2_FWB_SHIFT, 1387e48d53a9SMarc Zyngier .min_field_value = 1, 1388e48d53a9SMarc Zyngier .matches = has_cpuid_feature, 1389e48d53a9SMarc Zyngier .cpu_enable = cpu_has_fwb, 1390e48d53a9SMarc Zyngier }, 139105abb595SSuzuki K Poulose #ifdef CONFIG_ARM64_HW_AFDBM 139205abb595SSuzuki K Poulose { 139305abb595SSuzuki K Poulose /* 139405abb595SSuzuki K Poulose * Since we turn this on always, we don't want the user to 139505abb595SSuzuki K Poulose * think that the feature is available when it may not be. 139605abb595SSuzuki K Poulose * So hide the description. 139705abb595SSuzuki K Poulose * 139805abb595SSuzuki K Poulose * .desc = "Hardware pagetable Dirty Bit Management", 139905abb595SSuzuki K Poulose * 140005abb595SSuzuki K Poulose */ 140105abb595SSuzuki K Poulose .type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE, 140205abb595SSuzuki K Poulose .capability = ARM64_HW_DBM, 140305abb595SSuzuki K Poulose .sys_reg = SYS_ID_AA64MMFR1_EL1, 140405abb595SSuzuki K Poulose .sign = FTR_UNSIGNED, 140505abb595SSuzuki K Poulose .field_pos = ID_AA64MMFR1_HADBS_SHIFT, 140605abb595SSuzuki K Poulose .min_field_value = 2, 140705abb595SSuzuki K Poulose .matches = has_hw_dbm, 140805abb595SSuzuki K Poulose .cpu_enable = cpu_enable_hw_dbm, 140905abb595SSuzuki K Poulose }, 141005abb595SSuzuki K Poulose #endif 14118f04e8e6SWill Deacon #ifdef CONFIG_ARM64_SSBD 141286d0dd34SArd Biesheuvel { 141386d0dd34SArd Biesheuvel .desc = "CRC32 instructions", 141486d0dd34SArd Biesheuvel .capability = ARM64_HAS_CRC32, 141586d0dd34SArd Biesheuvel .type = ARM64_CPUCAP_SYSTEM_FEATURE, 141686d0dd34SArd Biesheuvel .matches = has_cpuid_feature, 141786d0dd34SArd Biesheuvel .sys_reg = SYS_ID_AA64ISAR0_EL1, 141886d0dd34SArd Biesheuvel .field_pos = ID_AA64ISAR0_CRC32_SHIFT, 141986d0dd34SArd Biesheuvel .min_field_value = 1, 142086d0dd34SArd Biesheuvel }, 1421d71be2b6SWill Deacon { 1422d71be2b6SWill Deacon .desc = "Speculative Store Bypassing Safe (SSBS)", 1423d71be2b6SWill Deacon .capability = ARM64_SSBS, 1424d71be2b6SWill Deacon .type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE, 1425d71be2b6SWill Deacon .matches = has_cpuid_feature, 1426d71be2b6SWill Deacon .sys_reg = SYS_ID_AA64PFR1_EL1, 1427d71be2b6SWill Deacon .field_pos = ID_AA64PFR1_SSBS_SHIFT, 1428d71be2b6SWill Deacon .sign = FTR_UNSIGNED, 1429d71be2b6SWill Deacon .min_field_value = ID_AA64PFR1_SSBS_PSTATE_ONLY, 14308f04e8e6SWill Deacon .cpu_enable = cpu_enable_ssbs, 1431d71be2b6SWill Deacon }, 14328f04e8e6SWill Deacon #endif 14335ffdfaedSVladimir Murzin #ifdef CONFIG_ARM64_CNP 14345ffdfaedSVladimir Murzin { 14355ffdfaedSVladimir Murzin .desc = "Common not Private translations", 14365ffdfaedSVladimir Murzin .capability = ARM64_HAS_CNP, 14375ffdfaedSVladimir Murzin .type = ARM64_CPUCAP_SYSTEM_FEATURE, 14385ffdfaedSVladimir Murzin .matches = has_useable_cnp, 14395ffdfaedSVladimir Murzin .sys_reg = SYS_ID_AA64MMFR2_EL1, 14405ffdfaedSVladimir Murzin .sign = FTR_UNSIGNED, 14415ffdfaedSVladimir Murzin .field_pos = ID_AA64MMFR2_CNP_SHIFT, 14425ffdfaedSVladimir Murzin .min_field_value = 1, 14435ffdfaedSVladimir Murzin .cpu_enable = cpu_enable_cnp, 14445ffdfaedSVladimir Murzin }, 14455ffdfaedSVladimir Murzin #endif 1446bd4fb6d2SWill Deacon { 1447bd4fb6d2SWill Deacon .desc = "Speculation barrier (SB)", 1448bd4fb6d2SWill Deacon .capability = ARM64_HAS_SB, 1449bd4fb6d2SWill Deacon .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1450bd4fb6d2SWill Deacon .matches = has_cpuid_feature, 1451bd4fb6d2SWill Deacon .sys_reg = SYS_ID_AA64ISAR1_EL1, 1452bd4fb6d2SWill Deacon .field_pos = ID_AA64ISAR1_SB_SHIFT, 1453bd4fb6d2SWill Deacon .sign = FTR_UNSIGNED, 1454bd4fb6d2SWill Deacon .min_field_value = 1, 1455bd4fb6d2SWill Deacon }, 1456*6984eb47SMark Rutland #ifdef CONFIG_ARM64_PTR_AUTH 1457*6984eb47SMark Rutland { 1458*6984eb47SMark Rutland .desc = "Address authentication (architected algorithm)", 1459*6984eb47SMark Rutland .capability = ARM64_HAS_ADDRESS_AUTH_ARCH, 1460*6984eb47SMark Rutland .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1461*6984eb47SMark Rutland .sys_reg = SYS_ID_AA64ISAR1_EL1, 1462*6984eb47SMark Rutland .sign = FTR_UNSIGNED, 1463*6984eb47SMark Rutland .field_pos = ID_AA64ISAR1_APA_SHIFT, 1464*6984eb47SMark Rutland .min_field_value = ID_AA64ISAR1_APA_ARCHITECTED, 1465*6984eb47SMark Rutland .matches = has_cpuid_feature, 1466*6984eb47SMark Rutland }, 1467*6984eb47SMark Rutland { 1468*6984eb47SMark Rutland .desc = "Address authentication (IMP DEF algorithm)", 1469*6984eb47SMark Rutland .capability = ARM64_HAS_ADDRESS_AUTH_IMP_DEF, 1470*6984eb47SMark Rutland .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1471*6984eb47SMark Rutland .sys_reg = SYS_ID_AA64ISAR1_EL1, 1472*6984eb47SMark Rutland .sign = FTR_UNSIGNED, 1473*6984eb47SMark Rutland .field_pos = ID_AA64ISAR1_API_SHIFT, 1474*6984eb47SMark Rutland .min_field_value = ID_AA64ISAR1_API_IMP_DEF, 1475*6984eb47SMark Rutland .matches = has_cpuid_feature, 1476*6984eb47SMark Rutland }, 1477*6984eb47SMark Rutland { 1478*6984eb47SMark Rutland .capability = ARM64_HAS_ADDRESS_AUTH, 1479*6984eb47SMark Rutland .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1480*6984eb47SMark Rutland .matches = has_address_auth, 1481*6984eb47SMark Rutland }, 1482*6984eb47SMark Rutland { 1483*6984eb47SMark Rutland .desc = "Generic authentication (architected algorithm)", 1484*6984eb47SMark Rutland .capability = ARM64_HAS_GENERIC_AUTH_ARCH, 1485*6984eb47SMark Rutland .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1486*6984eb47SMark Rutland .sys_reg = SYS_ID_AA64ISAR1_EL1, 1487*6984eb47SMark Rutland .sign = FTR_UNSIGNED, 1488*6984eb47SMark Rutland .field_pos = ID_AA64ISAR1_GPA_SHIFT, 1489*6984eb47SMark Rutland .min_field_value = ID_AA64ISAR1_GPA_ARCHITECTED, 1490*6984eb47SMark Rutland .matches = has_cpuid_feature, 1491*6984eb47SMark Rutland }, 1492*6984eb47SMark Rutland { 1493*6984eb47SMark Rutland .desc = "Generic authentication (IMP DEF algorithm)", 1494*6984eb47SMark Rutland .capability = ARM64_HAS_GENERIC_AUTH_IMP_DEF, 1495*6984eb47SMark Rutland .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1496*6984eb47SMark Rutland .sys_reg = SYS_ID_AA64ISAR1_EL1, 1497*6984eb47SMark Rutland .sign = FTR_UNSIGNED, 1498*6984eb47SMark Rutland .field_pos = ID_AA64ISAR1_GPI_SHIFT, 1499*6984eb47SMark Rutland .min_field_value = ID_AA64ISAR1_GPI_IMP_DEF, 1500*6984eb47SMark Rutland .matches = has_cpuid_feature, 1501*6984eb47SMark Rutland }, 1502*6984eb47SMark Rutland { 1503*6984eb47SMark Rutland .capability = ARM64_HAS_GENERIC_AUTH, 1504*6984eb47SMark Rutland .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1505*6984eb47SMark Rutland .matches = has_generic_auth, 1506*6984eb47SMark Rutland }, 1507*6984eb47SMark Rutland #endif /* CONFIG_ARM64_PTR_AUTH */ 1508359b7064SMarc Zyngier {}, 1509359b7064SMarc Zyngier }; 1510359b7064SMarc Zyngier 1511143ba05dSSuzuki K Poulose #define HWCAP_CAP(reg, field, s, min_value, cap_type, cap) \ 151237b01d53SSuzuki K. Poulose { \ 151337b01d53SSuzuki K. Poulose .desc = #cap, \ 15145b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, \ 151537b01d53SSuzuki K. Poulose .matches = has_cpuid_feature, \ 151637b01d53SSuzuki K. Poulose .sys_reg = reg, \ 151737b01d53SSuzuki K. Poulose .field_pos = field, \ 1518ff96f7bcSSuzuki K Poulose .sign = s, \ 151937b01d53SSuzuki K. Poulose .min_field_value = min_value, \ 1520143ba05dSSuzuki K Poulose .hwcap_type = cap_type, \ 152137b01d53SSuzuki K. Poulose .hwcap = cap, \ 152237b01d53SSuzuki K. Poulose } 152337b01d53SSuzuki K. Poulose 1524f3efb675SSuzuki K Poulose static const struct arm64_cpu_capabilities arm64_elf_hwcaps[] = { 1525ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_AES_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_PMULL), 1526ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_AES_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_AES), 1527ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA1_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA1), 1528ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA2_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA2), 1529f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA2_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_SHA512), 1530ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_CRC32_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_CRC32), 1531ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_ATOMICS_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_ATOMICS), 1532f92f5ce0SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_RDM_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDRDM), 1533f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA3_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA3), 1534f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SM3_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SM3), 1535f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SM4_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SM4), 1536f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_DP_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDDP), 15373b3b6810SDongjiu Geng HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_FHM_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDFHM), 15387206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_TS_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_FLAGM), 1539ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_FP_SHIFT, FTR_SIGNED, 0, CAP_HWCAP, HWCAP_FP), 1540bf500618SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_FP_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_FPHP), 1541ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_ASIMD_SHIFT, FTR_SIGNED, 0, CAP_HWCAP, HWCAP_ASIMD), 1542bf500618SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_ASIMD_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_ASIMDHP), 15437206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_DIT_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_DIT), 15447aac405eSRobin Murphy HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_DPB_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_DCPOP), 1545c8c3798dSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_JSCVT_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_JSCVT), 1546cb567e79SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_FCMA_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_FCMA), 1547c651aae5SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_LRCPC_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_LRCPC), 15487206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_LRCPC_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_ILRCPC), 1549bd4fb6d2SWill Deacon HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_SB_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SB), 15507206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64MMFR2_EL1, ID_AA64MMFR2_AT_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_USCAT), 155143994d82SDave Martin #ifdef CONFIG_ARM64_SVE 155243994d82SDave Martin HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_SVE_SHIFT, FTR_UNSIGNED, ID_AA64PFR0_SVE, CAP_HWCAP, HWCAP_SVE), 155343994d82SDave Martin #endif 1554d71be2b6SWill Deacon HWCAP_CAP(SYS_ID_AA64PFR1_EL1, ID_AA64PFR1_SSBS_SHIFT, FTR_UNSIGNED, ID_AA64PFR1_SSBS_PSTATE_INSNS, CAP_HWCAP, HWCAP_SSBS), 155575283501SSuzuki K Poulose {}, 155675283501SSuzuki K Poulose }; 155775283501SSuzuki K Poulose 155875283501SSuzuki K Poulose static const struct arm64_cpu_capabilities compat_elf_hwcaps[] = { 155937b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT 1560ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 2, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_PMULL), 1561ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_AES), 1562ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_SHA1_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_SHA1), 1563ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_SHA2_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_SHA2), 1564ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_CRC32_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_CRC32), 156537b01d53SSuzuki K. Poulose #endif 156637b01d53SSuzuki K. Poulose {}, 156737b01d53SSuzuki K. Poulose }; 156837b01d53SSuzuki K. Poulose 1569f3efb675SSuzuki K Poulose static void __init cap_set_elf_hwcap(const struct arm64_cpu_capabilities *cap) 157037b01d53SSuzuki K. Poulose { 157137b01d53SSuzuki K. Poulose switch (cap->hwcap_type) { 157237b01d53SSuzuki K. Poulose case CAP_HWCAP: 157337b01d53SSuzuki K. Poulose elf_hwcap |= cap->hwcap; 157437b01d53SSuzuki K. Poulose break; 157537b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT 157637b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP: 157737b01d53SSuzuki K. Poulose compat_elf_hwcap |= (u32)cap->hwcap; 157837b01d53SSuzuki K. Poulose break; 157937b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP2: 158037b01d53SSuzuki K. Poulose compat_elf_hwcap2 |= (u32)cap->hwcap; 158137b01d53SSuzuki K. Poulose break; 158237b01d53SSuzuki K. Poulose #endif 158337b01d53SSuzuki K. Poulose default: 158437b01d53SSuzuki K. Poulose WARN_ON(1); 158537b01d53SSuzuki K. Poulose break; 158637b01d53SSuzuki K. Poulose } 158737b01d53SSuzuki K. Poulose } 158837b01d53SSuzuki K. Poulose 158937b01d53SSuzuki K. Poulose /* Check if we have a particular HWCAP enabled */ 1590f3efb675SSuzuki K Poulose static bool cpus_have_elf_hwcap(const struct arm64_cpu_capabilities *cap) 159137b01d53SSuzuki K. Poulose { 159237b01d53SSuzuki K. Poulose bool rc; 159337b01d53SSuzuki K. Poulose 159437b01d53SSuzuki K. Poulose switch (cap->hwcap_type) { 159537b01d53SSuzuki K. Poulose case CAP_HWCAP: 159637b01d53SSuzuki K. Poulose rc = (elf_hwcap & cap->hwcap) != 0; 159737b01d53SSuzuki K. Poulose break; 159837b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT 159937b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP: 160037b01d53SSuzuki K. Poulose rc = (compat_elf_hwcap & (u32)cap->hwcap) != 0; 160137b01d53SSuzuki K. Poulose break; 160237b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP2: 160337b01d53SSuzuki K. Poulose rc = (compat_elf_hwcap2 & (u32)cap->hwcap) != 0; 160437b01d53SSuzuki K. Poulose break; 160537b01d53SSuzuki K. Poulose #endif 160637b01d53SSuzuki K. Poulose default: 160737b01d53SSuzuki K. Poulose WARN_ON(1); 160837b01d53SSuzuki K. Poulose rc = false; 160937b01d53SSuzuki K. Poulose } 161037b01d53SSuzuki K. Poulose 161137b01d53SSuzuki K. Poulose return rc; 161237b01d53SSuzuki K. Poulose } 161337b01d53SSuzuki K. Poulose 161475283501SSuzuki K Poulose static void __init setup_elf_hwcaps(const struct arm64_cpu_capabilities *hwcaps) 161537b01d53SSuzuki K. Poulose { 161677c97b4eSSuzuki K Poulose /* We support emulation of accesses to CPU ID feature registers */ 161777c97b4eSSuzuki K Poulose elf_hwcap |= HWCAP_CPUID; 161875283501SSuzuki K Poulose for (; hwcaps->matches; hwcaps++) 1619143ba05dSSuzuki K Poulose if (hwcaps->matches(hwcaps, cpucap_default_scope(hwcaps))) 162075283501SSuzuki K Poulose cap_set_elf_hwcap(hwcaps); 162137b01d53SSuzuki K. Poulose } 162237b01d53SSuzuki K. Poulose 1623606f8e7bSSuzuki K Poulose static void update_cpu_capabilities(u16 scope_mask) 1624359b7064SMarc Zyngier { 1625606f8e7bSSuzuki K Poulose int i; 1626606f8e7bSSuzuki K Poulose const struct arm64_cpu_capabilities *caps; 1627606f8e7bSSuzuki K Poulose 1628cce360b5SSuzuki K Poulose scope_mask &= ARM64_CPUCAP_SCOPE_MASK; 1629606f8e7bSSuzuki K Poulose for (i = 0; i < ARM64_NCAPS; i++) { 1630606f8e7bSSuzuki K Poulose caps = cpu_hwcaps_ptrs[i]; 1631606f8e7bSSuzuki K Poulose if (!caps || !(caps->type & scope_mask) || 1632606f8e7bSSuzuki K Poulose cpus_have_cap(caps->capability) || 1633cce360b5SSuzuki K Poulose !caps->matches(caps, cpucap_default_scope(caps))) 1634359b7064SMarc Zyngier continue; 1635359b7064SMarc Zyngier 1636606f8e7bSSuzuki K Poulose if (caps->desc) 1637606f8e7bSSuzuki K Poulose pr_info("detected: %s\n", caps->desc); 163875283501SSuzuki K Poulose cpus_set_cap(caps->capability); 1639359b7064SMarc Zyngier } 1640359b7064SMarc Zyngier } 1641359b7064SMarc Zyngier 16420b587c84SSuzuki K Poulose /* 16430b587c84SSuzuki K Poulose * Enable all the available capabilities on this CPU. The capabilities 16440b587c84SSuzuki K Poulose * with BOOT_CPU scope are handled separately and hence skipped here. 16450b587c84SSuzuki K Poulose */ 16460b587c84SSuzuki K Poulose static int cpu_enable_non_boot_scope_capabilities(void *__unused) 1647c0cda3b8SDave Martin { 16480b587c84SSuzuki K Poulose int i; 16490b587c84SSuzuki K Poulose u16 non_boot_scope = SCOPE_ALL & ~SCOPE_BOOT_CPU; 1650c0cda3b8SDave Martin 16510b587c84SSuzuki K Poulose for_each_available_cap(i) { 16520b587c84SSuzuki K Poulose const struct arm64_cpu_capabilities *cap = cpu_hwcaps_ptrs[i]; 16530b587c84SSuzuki K Poulose 16540b587c84SSuzuki K Poulose if (WARN_ON(!cap)) 16550b587c84SSuzuki K Poulose continue; 16560b587c84SSuzuki K Poulose 16570b587c84SSuzuki K Poulose if (!(cap->type & non_boot_scope)) 16580b587c84SSuzuki K Poulose continue; 16590b587c84SSuzuki K Poulose 16600b587c84SSuzuki K Poulose if (cap->cpu_enable) 1661c0cda3b8SDave Martin cap->cpu_enable(cap); 16620b587c84SSuzuki K Poulose } 1663c0cda3b8SDave Martin return 0; 1664c0cda3b8SDave Martin } 1665c0cda3b8SDave Martin 1666ce8b602cSSuzuki K. Poulose /* 1667dbb4e152SSuzuki K. Poulose * Run through the enabled capabilities and enable() it on all active 1668dbb4e152SSuzuki K. Poulose * CPUs 1669ce8b602cSSuzuki K. Poulose */ 16700b587c84SSuzuki K Poulose static void __init enable_cpu_capabilities(u16 scope_mask) 1671359b7064SMarc Zyngier { 16720b587c84SSuzuki K Poulose int i; 16730b587c84SSuzuki K Poulose const struct arm64_cpu_capabilities *caps; 16740b587c84SSuzuki K Poulose bool boot_scope; 167563a1e1c9SMark Rutland 16760b587c84SSuzuki K Poulose scope_mask &= ARM64_CPUCAP_SCOPE_MASK; 16770b587c84SSuzuki K Poulose boot_scope = !!(scope_mask & SCOPE_BOOT_CPU); 16780b587c84SSuzuki K Poulose 16790b587c84SSuzuki K Poulose for (i = 0; i < ARM64_NCAPS; i++) { 16800b587c84SSuzuki K Poulose unsigned int num; 16810b587c84SSuzuki K Poulose 16820b587c84SSuzuki K Poulose caps = cpu_hwcaps_ptrs[i]; 16830b587c84SSuzuki K Poulose if (!caps || !(caps->type & scope_mask)) 16840b587c84SSuzuki K Poulose continue; 16850b587c84SSuzuki K Poulose num = caps->capability; 16860b587c84SSuzuki K Poulose if (!cpus_have_cap(num)) 168763a1e1c9SMark Rutland continue; 168863a1e1c9SMark Rutland 168963a1e1c9SMark Rutland /* Ensure cpus_have_const_cap(num) works */ 169063a1e1c9SMark Rutland static_branch_enable(&cpu_hwcap_keys[num]); 169163a1e1c9SMark Rutland 16920b587c84SSuzuki K Poulose if (boot_scope && caps->cpu_enable) 16932a6dcb2bSJames Morse /* 1694fd9d63daSSuzuki K Poulose * Capabilities with SCOPE_BOOT_CPU scope are finalised 1695fd9d63daSSuzuki K Poulose * before any secondary CPU boots. Thus, each secondary 1696fd9d63daSSuzuki K Poulose * will enable the capability as appropriate via 1697fd9d63daSSuzuki K Poulose * check_local_cpu_capabilities(). The only exception is 1698fd9d63daSSuzuki K Poulose * the boot CPU, for which the capability must be 1699fd9d63daSSuzuki K Poulose * enabled here. This approach avoids costly 1700fd9d63daSSuzuki K Poulose * stop_machine() calls for this case. 17012a6dcb2bSJames Morse */ 1702fd9d63daSSuzuki K Poulose caps->cpu_enable(caps); 170363a1e1c9SMark Rutland } 1704dbb4e152SSuzuki K. Poulose 17050b587c84SSuzuki K Poulose /* 17060b587c84SSuzuki K Poulose * For all non-boot scope capabilities, use stop_machine() 17070b587c84SSuzuki K Poulose * as it schedules the work allowing us to modify PSTATE, 17080b587c84SSuzuki K Poulose * instead of on_each_cpu() which uses an IPI, giving us a 17090b587c84SSuzuki K Poulose * PSTATE that disappears when we return. 17100b587c84SSuzuki K Poulose */ 17110b587c84SSuzuki K Poulose if (!boot_scope) 17120b587c84SSuzuki K Poulose stop_machine(cpu_enable_non_boot_scope_capabilities, 17130b587c84SSuzuki K Poulose NULL, cpu_online_mask); 1714ed478b3fSSuzuki K Poulose } 1715ed478b3fSSuzuki K Poulose 1716dbb4e152SSuzuki K. Poulose /* 1717eaac4d83SSuzuki K Poulose * Run through the list of capabilities to check for conflicts. 1718eaac4d83SSuzuki K Poulose * If the system has already detected a capability, take necessary 1719eaac4d83SSuzuki K Poulose * action on this CPU. 1720eaac4d83SSuzuki K Poulose * 1721eaac4d83SSuzuki K Poulose * Returns "false" on conflicts. 1722eaac4d83SSuzuki K Poulose */ 1723606f8e7bSSuzuki K Poulose static bool verify_local_cpu_caps(u16 scope_mask) 1724eaac4d83SSuzuki K Poulose { 1725606f8e7bSSuzuki K Poulose int i; 1726eaac4d83SSuzuki K Poulose bool cpu_has_cap, system_has_cap; 1727606f8e7bSSuzuki K Poulose const struct arm64_cpu_capabilities *caps; 1728eaac4d83SSuzuki K Poulose 1729cce360b5SSuzuki K Poulose scope_mask &= ARM64_CPUCAP_SCOPE_MASK; 1730cce360b5SSuzuki K Poulose 1731606f8e7bSSuzuki K Poulose for (i = 0; i < ARM64_NCAPS; i++) { 1732606f8e7bSSuzuki K Poulose caps = cpu_hwcaps_ptrs[i]; 1733606f8e7bSSuzuki K Poulose if (!caps || !(caps->type & scope_mask)) 1734cce360b5SSuzuki K Poulose continue; 1735cce360b5SSuzuki K Poulose 1736ba7d9233SSuzuki K Poulose cpu_has_cap = caps->matches(caps, SCOPE_LOCAL_CPU); 1737eaac4d83SSuzuki K Poulose system_has_cap = cpus_have_cap(caps->capability); 1738eaac4d83SSuzuki K Poulose 1739eaac4d83SSuzuki K Poulose if (system_has_cap) { 1740eaac4d83SSuzuki K Poulose /* 1741eaac4d83SSuzuki K Poulose * Check if the new CPU misses an advertised feature, 1742eaac4d83SSuzuki K Poulose * which is not safe to miss. 1743eaac4d83SSuzuki K Poulose */ 1744eaac4d83SSuzuki K Poulose if (!cpu_has_cap && !cpucap_late_cpu_optional(caps)) 1745eaac4d83SSuzuki K Poulose break; 1746eaac4d83SSuzuki K Poulose /* 1747eaac4d83SSuzuki K Poulose * We have to issue cpu_enable() irrespective of 1748eaac4d83SSuzuki K Poulose * whether the CPU has it or not, as it is enabeld 1749eaac4d83SSuzuki K Poulose * system wide. It is upto the call back to take 1750eaac4d83SSuzuki K Poulose * appropriate action on this CPU. 1751eaac4d83SSuzuki K Poulose */ 1752eaac4d83SSuzuki K Poulose if (caps->cpu_enable) 1753eaac4d83SSuzuki K Poulose caps->cpu_enable(caps); 1754eaac4d83SSuzuki K Poulose } else { 1755eaac4d83SSuzuki K Poulose /* 1756eaac4d83SSuzuki K Poulose * Check if the CPU has this capability if it isn't 1757eaac4d83SSuzuki K Poulose * safe to have when the system doesn't. 1758eaac4d83SSuzuki K Poulose */ 1759eaac4d83SSuzuki K Poulose if (cpu_has_cap && !cpucap_late_cpu_permitted(caps)) 1760eaac4d83SSuzuki K Poulose break; 1761eaac4d83SSuzuki K Poulose } 1762eaac4d83SSuzuki K Poulose } 1763eaac4d83SSuzuki K Poulose 1764606f8e7bSSuzuki K Poulose if (i < ARM64_NCAPS) { 1765eaac4d83SSuzuki K Poulose pr_crit("CPU%d: Detected conflict for capability %d (%s), System: %d, CPU: %d\n", 1766eaac4d83SSuzuki K Poulose smp_processor_id(), caps->capability, 1767eaac4d83SSuzuki K Poulose caps->desc, system_has_cap, cpu_has_cap); 1768eaac4d83SSuzuki K Poulose return false; 1769eaac4d83SSuzuki K Poulose } 1770eaac4d83SSuzuki K Poulose 1771eaac4d83SSuzuki K Poulose return true; 1772eaac4d83SSuzuki K Poulose } 1773eaac4d83SSuzuki K Poulose 1774eaac4d83SSuzuki K Poulose /* 177513f417f3SSuzuki K Poulose * Check for CPU features that are used in early boot 177613f417f3SSuzuki K Poulose * based on the Boot CPU value. 1777dbb4e152SSuzuki K. Poulose */ 177813f417f3SSuzuki K Poulose static void check_early_cpu_features(void) 1779dbb4e152SSuzuki K. Poulose { 178013f417f3SSuzuki K Poulose verify_cpu_asid_bits(); 1781fd9d63daSSuzuki K Poulose /* 1782fd9d63daSSuzuki K Poulose * Early features are used by the kernel already. If there 1783fd9d63daSSuzuki K Poulose * is a conflict, we cannot proceed further. 1784fd9d63daSSuzuki K Poulose */ 1785fd9d63daSSuzuki K Poulose if (!verify_local_cpu_caps(SCOPE_BOOT_CPU)) 1786fd9d63daSSuzuki K Poulose cpu_panic_kernel(); 1787dbb4e152SSuzuki K. Poulose } 1788dbb4e152SSuzuki K. Poulose 178975283501SSuzuki K Poulose static void 179075283501SSuzuki K Poulose verify_local_elf_hwcaps(const struct arm64_cpu_capabilities *caps) 179175283501SSuzuki K Poulose { 179275283501SSuzuki K Poulose 179392406f0cSSuzuki K Poulose for (; caps->matches; caps++) 179492406f0cSSuzuki K Poulose if (cpus_have_elf_hwcap(caps) && !caps->matches(caps, SCOPE_LOCAL_CPU)) { 179575283501SSuzuki K Poulose pr_crit("CPU%d: missing HWCAP: %s\n", 179675283501SSuzuki K Poulose smp_processor_id(), caps->desc); 179775283501SSuzuki K Poulose cpu_die_early(); 179875283501SSuzuki K Poulose } 179975283501SSuzuki K Poulose } 180075283501SSuzuki K Poulose 18012e0f2478SDave Martin static void verify_sve_features(void) 18022e0f2478SDave Martin { 18032e0f2478SDave Martin u64 safe_zcr = read_sanitised_ftr_reg(SYS_ZCR_EL1); 18042e0f2478SDave Martin u64 zcr = read_zcr_features(); 18052e0f2478SDave Martin 18062e0f2478SDave Martin unsigned int safe_len = safe_zcr & ZCR_ELx_LEN_MASK; 18072e0f2478SDave Martin unsigned int len = zcr & ZCR_ELx_LEN_MASK; 18082e0f2478SDave Martin 18092e0f2478SDave Martin if (len < safe_len || sve_verify_vq_map()) { 18102e0f2478SDave Martin pr_crit("CPU%d: SVE: required vector length(s) missing\n", 18112e0f2478SDave Martin smp_processor_id()); 18122e0f2478SDave Martin cpu_die_early(); 18132e0f2478SDave Martin } 18142e0f2478SDave Martin 18152e0f2478SDave Martin /* Add checks on other ZCR bits here if necessary */ 18162e0f2478SDave Martin } 18172e0f2478SDave Martin 18181e89baedSSuzuki K Poulose 18191e89baedSSuzuki K Poulose /* 1820dbb4e152SSuzuki K. Poulose * Run through the enabled system capabilities and enable() it on this CPU. 1821dbb4e152SSuzuki K. Poulose * The capabilities were decided based on the available CPUs at the boot time. 1822dbb4e152SSuzuki K. Poulose * Any new CPU should match the system wide status of the capability. If the 1823dbb4e152SSuzuki K. Poulose * new CPU doesn't have a capability which the system now has enabled, we 1824dbb4e152SSuzuki K. Poulose * cannot do anything to fix it up and could cause unexpected failures. So 1825dbb4e152SSuzuki K. Poulose * we park the CPU. 1826dbb4e152SSuzuki K. Poulose */ 1827c47a1900SSuzuki K Poulose static void verify_local_cpu_capabilities(void) 1828dbb4e152SSuzuki K. Poulose { 1829fd9d63daSSuzuki K Poulose /* 1830fd9d63daSSuzuki K Poulose * The capabilities with SCOPE_BOOT_CPU are checked from 1831fd9d63daSSuzuki K Poulose * check_early_cpu_features(), as they need to be verified 1832fd9d63daSSuzuki K Poulose * on all secondary CPUs. 1833fd9d63daSSuzuki K Poulose */ 1834fd9d63daSSuzuki K Poulose if (!verify_local_cpu_caps(SCOPE_ALL & ~SCOPE_BOOT_CPU)) 1835600b9c91SSuzuki K Poulose cpu_die_early(); 1836ed478b3fSSuzuki K Poulose 183775283501SSuzuki K Poulose verify_local_elf_hwcaps(arm64_elf_hwcaps); 18382e0f2478SDave Martin 1839643d703dSSuzuki K Poulose if (system_supports_32bit_el0()) 184075283501SSuzuki K Poulose verify_local_elf_hwcaps(compat_elf_hwcaps); 18412e0f2478SDave Martin 18422e0f2478SDave Martin if (system_supports_sve()) 18432e0f2478SDave Martin verify_sve_features(); 1844dbb4e152SSuzuki K. Poulose } 1845dbb4e152SSuzuki K. Poulose 1846c47a1900SSuzuki K Poulose void check_local_cpu_capabilities(void) 1847c47a1900SSuzuki K Poulose { 1848c47a1900SSuzuki K Poulose /* 1849c47a1900SSuzuki K Poulose * All secondary CPUs should conform to the early CPU features 1850c47a1900SSuzuki K Poulose * in use by the kernel based on boot CPU. 1851c47a1900SSuzuki K Poulose */ 1852c47a1900SSuzuki K Poulose check_early_cpu_features(); 1853c47a1900SSuzuki K Poulose 1854c47a1900SSuzuki K Poulose /* 1855c47a1900SSuzuki K Poulose * If we haven't finalised the system capabilities, this CPU gets 1856fbd890b9SSuzuki K Poulose * a chance to update the errata work arounds and local features. 1857c47a1900SSuzuki K Poulose * Otherwise, this CPU should verify that it has all the system 1858c47a1900SSuzuki K Poulose * advertised capabilities. 1859c47a1900SSuzuki K Poulose */ 1860ed478b3fSSuzuki K Poulose if (!sys_caps_initialised) 1861ed478b3fSSuzuki K Poulose update_cpu_capabilities(SCOPE_LOCAL_CPU); 1862ed478b3fSSuzuki K Poulose else 1863c47a1900SSuzuki K Poulose verify_local_cpu_capabilities(); 1864c47a1900SSuzuki K Poulose } 1865c47a1900SSuzuki K Poulose 1866fd9d63daSSuzuki K Poulose static void __init setup_boot_cpu_capabilities(void) 1867fd9d63daSSuzuki K Poulose { 1868fd9d63daSSuzuki K Poulose /* Detect capabilities with either SCOPE_BOOT_CPU or SCOPE_LOCAL_CPU */ 1869fd9d63daSSuzuki K Poulose update_cpu_capabilities(SCOPE_BOOT_CPU | SCOPE_LOCAL_CPU); 1870fd9d63daSSuzuki K Poulose /* Enable the SCOPE_BOOT_CPU capabilities alone right away */ 1871fd9d63daSSuzuki K Poulose enable_cpu_capabilities(SCOPE_BOOT_CPU); 1872fd9d63daSSuzuki K Poulose } 1873fd9d63daSSuzuki K Poulose 187463a1e1c9SMark Rutland DEFINE_STATIC_KEY_FALSE(arm64_const_caps_ready); 187563a1e1c9SMark Rutland EXPORT_SYMBOL(arm64_const_caps_ready); 187663a1e1c9SMark Rutland 187763a1e1c9SMark Rutland static void __init mark_const_caps_ready(void) 187863a1e1c9SMark Rutland { 187963a1e1c9SMark Rutland static_branch_enable(&arm64_const_caps_ready); 188063a1e1c9SMark Rutland } 188163a1e1c9SMark Rutland 1882f7bfc14aSSuzuki K Poulose bool this_cpu_has_cap(unsigned int n) 18838f413758SMarc Zyngier { 1884f7bfc14aSSuzuki K Poulose if (!WARN_ON(preemptible()) && n < ARM64_NCAPS) { 1885f7bfc14aSSuzuki K Poulose const struct arm64_cpu_capabilities *cap = cpu_hwcaps_ptrs[n]; 1886f7bfc14aSSuzuki K Poulose 1887f7bfc14aSSuzuki K Poulose if (cap) 1888f7bfc14aSSuzuki K Poulose return cap->matches(cap, SCOPE_LOCAL_CPU); 1889f7bfc14aSSuzuki K Poulose } 1890f7bfc14aSSuzuki K Poulose 1891f7bfc14aSSuzuki K Poulose return false; 18928f413758SMarc Zyngier } 18938f413758SMarc Zyngier 1894ed478b3fSSuzuki K Poulose static void __init setup_system_capabilities(void) 1895ed478b3fSSuzuki K Poulose { 1896ed478b3fSSuzuki K Poulose /* 1897ed478b3fSSuzuki K Poulose * We have finalised the system-wide safe feature 1898ed478b3fSSuzuki K Poulose * registers, finalise the capabilities that depend 1899fd9d63daSSuzuki K Poulose * on it. Also enable all the available capabilities, 1900fd9d63daSSuzuki K Poulose * that are not enabled already. 1901ed478b3fSSuzuki K Poulose */ 1902ed478b3fSSuzuki K Poulose update_cpu_capabilities(SCOPE_SYSTEM); 1903fd9d63daSSuzuki K Poulose enable_cpu_capabilities(SCOPE_ALL & ~SCOPE_BOOT_CPU); 1904ed478b3fSSuzuki K Poulose } 1905ed478b3fSSuzuki K Poulose 19069cdf8ec4SSuzuki K. Poulose void __init setup_cpu_features(void) 19079cdf8ec4SSuzuki K. Poulose { 19089cdf8ec4SSuzuki K. Poulose u32 cwg; 19099cdf8ec4SSuzuki K. Poulose 1910ed478b3fSSuzuki K Poulose setup_system_capabilities(); 191163a1e1c9SMark Rutland mark_const_caps_ready(); 191275283501SSuzuki K Poulose setup_elf_hwcaps(arm64_elf_hwcaps); 1913643d703dSSuzuki K Poulose 1914643d703dSSuzuki K Poulose if (system_supports_32bit_el0()) 191575283501SSuzuki K Poulose setup_elf_hwcaps(compat_elf_hwcaps); 1916dbb4e152SSuzuki K. Poulose 19172e6f549fSKees Cook if (system_uses_ttbr0_pan()) 19182e6f549fSKees Cook pr_info("emulated: Privileged Access Never (PAN) using TTBR0_EL1 switching\n"); 19192e6f549fSKees Cook 19202e0f2478SDave Martin sve_setup(); 192194b07c1fSDave Martin minsigstksz_setup(); 19222e0f2478SDave Martin 1923dbb4e152SSuzuki K. Poulose /* Advertise that we have computed the system capabilities */ 1924dbb4e152SSuzuki K. Poulose set_sys_caps_initialised(); 1925dbb4e152SSuzuki K. Poulose 19269cdf8ec4SSuzuki K. Poulose /* 19279cdf8ec4SSuzuki K. Poulose * Check for sane CTR_EL0.CWG value. 19289cdf8ec4SSuzuki K. Poulose */ 19299cdf8ec4SSuzuki K. Poulose cwg = cache_type_cwg(); 19309cdf8ec4SSuzuki K. Poulose if (!cwg) 1931ebc7e21eSCatalin Marinas pr_warn("No Cache Writeback Granule information, assuming %d\n", 1932ebc7e21eSCatalin Marinas ARCH_DMA_MINALIGN); 1933359b7064SMarc Zyngier } 193470544196SJames Morse 193570544196SJames Morse static bool __maybe_unused 193692406f0cSSuzuki K Poulose cpufeature_pan_not_uao(const struct arm64_cpu_capabilities *entry, int __unused) 193770544196SJames Morse { 1938a4023f68SSuzuki K Poulose return (cpus_have_const_cap(ARM64_HAS_PAN) && !cpus_have_const_cap(ARM64_HAS_UAO)); 193970544196SJames Morse } 194077c97b4eSSuzuki K Poulose 19415ffdfaedSVladimir Murzin static void __maybe_unused cpu_enable_cnp(struct arm64_cpu_capabilities const *cap) 19425ffdfaedSVladimir Murzin { 19435ffdfaedSVladimir Murzin cpu_replace_ttbr1(lm_alias(swapper_pg_dir)); 19445ffdfaedSVladimir Murzin } 19455ffdfaedSVladimir Murzin 194677c97b4eSSuzuki K Poulose /* 194777c97b4eSSuzuki K Poulose * We emulate only the following system register space. 194877c97b4eSSuzuki K Poulose * Op0 = 0x3, CRn = 0x0, Op1 = 0x0, CRm = [0, 4 - 7] 194977c97b4eSSuzuki K Poulose * See Table C5-6 System instruction encodings for System register accesses, 195077c97b4eSSuzuki K Poulose * ARMv8 ARM(ARM DDI 0487A.f) for more details. 195177c97b4eSSuzuki K Poulose */ 195277c97b4eSSuzuki K Poulose static inline bool __attribute_const__ is_emulated(u32 id) 195377c97b4eSSuzuki K Poulose { 195477c97b4eSSuzuki K Poulose return (sys_reg_Op0(id) == 0x3 && 195577c97b4eSSuzuki K Poulose sys_reg_CRn(id) == 0x0 && 195677c97b4eSSuzuki K Poulose sys_reg_Op1(id) == 0x0 && 195777c97b4eSSuzuki K Poulose (sys_reg_CRm(id) == 0 || 195877c97b4eSSuzuki K Poulose ((sys_reg_CRm(id) >= 4) && (sys_reg_CRm(id) <= 7)))); 195977c97b4eSSuzuki K Poulose } 196077c97b4eSSuzuki K Poulose 196177c97b4eSSuzuki K Poulose /* 196277c97b4eSSuzuki K Poulose * With CRm == 0, reg should be one of : 196377c97b4eSSuzuki K Poulose * MIDR_EL1, MPIDR_EL1 or REVIDR_EL1. 196477c97b4eSSuzuki K Poulose */ 196577c97b4eSSuzuki K Poulose static inline int emulate_id_reg(u32 id, u64 *valp) 196677c97b4eSSuzuki K Poulose { 196777c97b4eSSuzuki K Poulose switch (id) { 196877c97b4eSSuzuki K Poulose case SYS_MIDR_EL1: 196977c97b4eSSuzuki K Poulose *valp = read_cpuid_id(); 197077c97b4eSSuzuki K Poulose break; 197177c97b4eSSuzuki K Poulose case SYS_MPIDR_EL1: 197277c97b4eSSuzuki K Poulose *valp = SYS_MPIDR_SAFE_VAL; 197377c97b4eSSuzuki K Poulose break; 197477c97b4eSSuzuki K Poulose case SYS_REVIDR_EL1: 197577c97b4eSSuzuki K Poulose /* IMPLEMENTATION DEFINED values are emulated with 0 */ 197677c97b4eSSuzuki K Poulose *valp = 0; 197777c97b4eSSuzuki K Poulose break; 197877c97b4eSSuzuki K Poulose default: 197977c97b4eSSuzuki K Poulose return -EINVAL; 198077c97b4eSSuzuki K Poulose } 198177c97b4eSSuzuki K Poulose 198277c97b4eSSuzuki K Poulose return 0; 198377c97b4eSSuzuki K Poulose } 198477c97b4eSSuzuki K Poulose 198577c97b4eSSuzuki K Poulose static int emulate_sys_reg(u32 id, u64 *valp) 198677c97b4eSSuzuki K Poulose { 198777c97b4eSSuzuki K Poulose struct arm64_ftr_reg *regp; 198877c97b4eSSuzuki K Poulose 198977c97b4eSSuzuki K Poulose if (!is_emulated(id)) 199077c97b4eSSuzuki K Poulose return -EINVAL; 199177c97b4eSSuzuki K Poulose 199277c97b4eSSuzuki K Poulose if (sys_reg_CRm(id) == 0) 199377c97b4eSSuzuki K Poulose return emulate_id_reg(id, valp); 199477c97b4eSSuzuki K Poulose 199577c97b4eSSuzuki K Poulose regp = get_arm64_ftr_reg(id); 199677c97b4eSSuzuki K Poulose if (regp) 199777c97b4eSSuzuki K Poulose *valp = arm64_ftr_reg_user_value(regp); 199877c97b4eSSuzuki K Poulose else 199977c97b4eSSuzuki K Poulose /* 200077c97b4eSSuzuki K Poulose * The untracked registers are either IMPLEMENTATION DEFINED 200177c97b4eSSuzuki K Poulose * (e.g, ID_AFR0_EL1) or reserved RAZ. 200277c97b4eSSuzuki K Poulose */ 200377c97b4eSSuzuki K Poulose *valp = 0; 200477c97b4eSSuzuki K Poulose return 0; 200577c97b4eSSuzuki K Poulose } 200677c97b4eSSuzuki K Poulose 2007520ad988SAnshuman Khandual int do_emulate_mrs(struct pt_regs *regs, u32 sys_reg, u32 rt) 200877c97b4eSSuzuki K Poulose { 200977c97b4eSSuzuki K Poulose int rc; 201077c97b4eSSuzuki K Poulose u64 val; 201177c97b4eSSuzuki K Poulose 2012520ad988SAnshuman Khandual rc = emulate_sys_reg(sys_reg, &val); 2013520ad988SAnshuman Khandual if (!rc) { 2014520ad988SAnshuman Khandual pt_regs_write_reg(regs, rt, val); 2015520ad988SAnshuman Khandual arm64_skip_faulting_instruction(regs, AARCH64_INSN_SIZE); 2016520ad988SAnshuman Khandual } 2017520ad988SAnshuman Khandual return rc; 2018520ad988SAnshuman Khandual } 2019520ad988SAnshuman Khandual 2020520ad988SAnshuman Khandual static int emulate_mrs(struct pt_regs *regs, u32 insn) 2021520ad988SAnshuman Khandual { 2022520ad988SAnshuman Khandual u32 sys_reg, rt; 2023520ad988SAnshuman Khandual 202477c97b4eSSuzuki K Poulose /* 202577c97b4eSSuzuki K Poulose * sys_reg values are defined as used in mrs/msr instruction. 202677c97b4eSSuzuki K Poulose * shift the imm value to get the encoding. 202777c97b4eSSuzuki K Poulose */ 202877c97b4eSSuzuki K Poulose sys_reg = (u32)aarch64_insn_decode_immediate(AARCH64_INSN_IMM_16, insn) << 5; 2029520ad988SAnshuman Khandual rt = aarch64_insn_decode_register(AARCH64_INSN_REGTYPE_RT, insn); 2030520ad988SAnshuman Khandual return do_emulate_mrs(regs, sys_reg, rt); 203177c97b4eSSuzuki K Poulose } 203277c97b4eSSuzuki K Poulose 203377c97b4eSSuzuki K Poulose static struct undef_hook mrs_hook = { 203477c97b4eSSuzuki K Poulose .instr_mask = 0xfff00000, 203577c97b4eSSuzuki K Poulose .instr_val = 0xd5300000, 2036d64567f6SMark Rutland .pstate_mask = PSR_AA32_MODE_MASK, 203777c97b4eSSuzuki K Poulose .pstate_val = PSR_MODE_EL0t, 203877c97b4eSSuzuki K Poulose .fn = emulate_mrs, 203977c97b4eSSuzuki K Poulose }; 204077c97b4eSSuzuki K Poulose 204177c97b4eSSuzuki K Poulose static int __init enable_mrs_emulation(void) 204277c97b4eSSuzuki K Poulose { 204377c97b4eSSuzuki K Poulose register_undef_hook(&mrs_hook); 204477c97b4eSSuzuki K Poulose return 0; 204577c97b4eSSuzuki K Poulose } 204677c97b4eSSuzuki K Poulose 2047c0d8832eSSuzuki K Poulose core_initcall(enable_mrs_emulation); 2048