1359b7064SMarc Zyngier /* 2359b7064SMarc Zyngier * Contains CPU feature definitions 3359b7064SMarc Zyngier * 4359b7064SMarc Zyngier * Copyright (C) 2015 ARM Ltd. 5359b7064SMarc Zyngier * 6359b7064SMarc Zyngier * This program is free software; you can redistribute it and/or modify 7359b7064SMarc Zyngier * it under the terms of the GNU General Public License version 2 as 8359b7064SMarc Zyngier * published by the Free Software Foundation. 9359b7064SMarc Zyngier * 10359b7064SMarc Zyngier * This program is distributed in the hope that it will be useful, 11359b7064SMarc Zyngier * but WITHOUT ANY WARRANTY; without even the implied warranty of 12359b7064SMarc Zyngier * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13359b7064SMarc Zyngier * GNU General Public License for more details. 14359b7064SMarc Zyngier * 15359b7064SMarc Zyngier * You should have received a copy of the GNU General Public License 16359b7064SMarc Zyngier * along with this program. If not, see <http://www.gnu.org/licenses/>. 17359b7064SMarc Zyngier */ 18359b7064SMarc Zyngier 199cdf8ec4SSuzuki K. Poulose #define pr_fmt(fmt) "CPU features: " fmt 20359b7064SMarc Zyngier 213c739b57SSuzuki K. Poulose #include <linux/bsearch.h> 222a6dcb2bSJames Morse #include <linux/cpumask.h> 233c739b57SSuzuki K. Poulose #include <linux/sort.h> 242a6dcb2bSJames Morse #include <linux/stop_machine.h> 25359b7064SMarc Zyngier #include <linux/types.h> 262077be67SLaura Abbott #include <linux/mm.h> 27359b7064SMarc Zyngier #include <asm/cpu.h> 28359b7064SMarc Zyngier #include <asm/cpufeature.h> 29dbb4e152SSuzuki K. Poulose #include <asm/cpu_ops.h> 302e0f2478SDave Martin #include <asm/fpsimd.h> 3113f417f3SSuzuki K Poulose #include <asm/mmu_context.h> 32338d4f49SJames Morse #include <asm/processor.h> 33cdcf817bSSuzuki K. Poulose #include <asm/sysreg.h> 3477c97b4eSSuzuki K Poulose #include <asm/traps.h> 35d88701beSMarc Zyngier #include <asm/virt.h> 36359b7064SMarc Zyngier 379cdf8ec4SSuzuki K. Poulose unsigned long elf_hwcap __read_mostly; 389cdf8ec4SSuzuki K. Poulose EXPORT_SYMBOL_GPL(elf_hwcap); 399cdf8ec4SSuzuki K. Poulose 409cdf8ec4SSuzuki K. Poulose #ifdef CONFIG_COMPAT 419cdf8ec4SSuzuki K. Poulose #define COMPAT_ELF_HWCAP_DEFAULT \ 429cdf8ec4SSuzuki K. Poulose (COMPAT_HWCAP_HALF|COMPAT_HWCAP_THUMB|\ 439cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_FAST_MULT|COMPAT_HWCAP_EDSP|\ 449cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_TLS|COMPAT_HWCAP_VFP|\ 459cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_VFPv3|COMPAT_HWCAP_VFPv4|\ 469cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_NEON|COMPAT_HWCAP_IDIV|\ 479cdf8ec4SSuzuki K. Poulose COMPAT_HWCAP_LPAE) 489cdf8ec4SSuzuki K. Poulose unsigned int compat_elf_hwcap __read_mostly = COMPAT_ELF_HWCAP_DEFAULT; 499cdf8ec4SSuzuki K. Poulose unsigned int compat_elf_hwcap2 __read_mostly; 509cdf8ec4SSuzuki K. Poulose #endif 519cdf8ec4SSuzuki K. Poulose 529cdf8ec4SSuzuki K. Poulose DECLARE_BITMAP(cpu_hwcaps, ARM64_NCAPS); 534b65a5dbSCatalin Marinas EXPORT_SYMBOL(cpu_hwcaps); 549cdf8ec4SSuzuki K. Poulose 558f1eec57SDave Martin /* 568f1eec57SDave Martin * Flag to indicate if we have computed the system wide 578f1eec57SDave Martin * capabilities based on the boot time active CPUs. This 588f1eec57SDave Martin * will be used to determine if a new booting CPU should 598f1eec57SDave Martin * go through the verification process to make sure that it 608f1eec57SDave Martin * supports the system capabilities, without using a hotplug 618f1eec57SDave Martin * notifier. 628f1eec57SDave Martin */ 638f1eec57SDave Martin static bool sys_caps_initialised; 648f1eec57SDave Martin 658f1eec57SDave Martin static inline void set_sys_caps_initialised(void) 668f1eec57SDave Martin { 678f1eec57SDave Martin sys_caps_initialised = true; 688f1eec57SDave Martin } 698f1eec57SDave Martin 708effeaafSMark Rutland static int dump_cpu_hwcaps(struct notifier_block *self, unsigned long v, void *p) 718effeaafSMark Rutland { 728effeaafSMark Rutland /* file-wide pr_fmt adds "CPU features: " prefix */ 738effeaafSMark Rutland pr_emerg("0x%*pb\n", ARM64_NCAPS, &cpu_hwcaps); 748effeaafSMark Rutland return 0; 758effeaafSMark Rutland } 768effeaafSMark Rutland 778effeaafSMark Rutland static struct notifier_block cpu_hwcaps_notifier = { 788effeaafSMark Rutland .notifier_call = dump_cpu_hwcaps 798effeaafSMark Rutland }; 808effeaafSMark Rutland 818effeaafSMark Rutland static int __init register_cpu_hwcaps_dumper(void) 828effeaafSMark Rutland { 838effeaafSMark Rutland atomic_notifier_chain_register(&panic_notifier_list, 848effeaafSMark Rutland &cpu_hwcaps_notifier); 858effeaafSMark Rutland return 0; 868effeaafSMark Rutland } 878effeaafSMark Rutland __initcall(register_cpu_hwcaps_dumper); 888effeaafSMark Rutland 89efd9e03fSCatalin Marinas DEFINE_STATIC_KEY_ARRAY_FALSE(cpu_hwcap_keys, ARM64_NCAPS); 90efd9e03fSCatalin Marinas EXPORT_SYMBOL(cpu_hwcap_keys); 91efd9e03fSCatalin Marinas 92fe4fbdbcSSuzuki K Poulose #define __ARM64_FTR_BITS(SIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \ 933c739b57SSuzuki K. Poulose { \ 944f0a606bSSuzuki K. Poulose .sign = SIGNED, \ 95fe4fbdbcSSuzuki K Poulose .visible = VISIBLE, \ 963c739b57SSuzuki K. Poulose .strict = STRICT, \ 973c739b57SSuzuki K. Poulose .type = TYPE, \ 983c739b57SSuzuki K. Poulose .shift = SHIFT, \ 993c739b57SSuzuki K. Poulose .width = WIDTH, \ 1003c739b57SSuzuki K. Poulose .safe_val = SAFE_VAL, \ 1013c739b57SSuzuki K. Poulose } 1023c739b57SSuzuki K. Poulose 1030710cfdbSSuzuki K Poulose /* Define a feature with unsigned values */ 104fe4fbdbcSSuzuki K Poulose #define ARM64_FTR_BITS(VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \ 105fe4fbdbcSSuzuki K Poulose __ARM64_FTR_BITS(FTR_UNSIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) 1064f0a606bSSuzuki K. Poulose 1070710cfdbSSuzuki K Poulose /* Define a feature with a signed value */ 108fe4fbdbcSSuzuki K Poulose #define S_ARM64_FTR_BITS(VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \ 109fe4fbdbcSSuzuki K Poulose __ARM64_FTR_BITS(FTR_SIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) 1100710cfdbSSuzuki K Poulose 1113c739b57SSuzuki K. Poulose #define ARM64_FTR_END \ 1123c739b57SSuzuki K. Poulose { \ 1133c739b57SSuzuki K. Poulose .width = 0, \ 1143c739b57SSuzuki K. Poulose } 1153c739b57SSuzuki K. Poulose 11670544196SJames Morse /* meta feature for alternatives */ 11770544196SJames Morse static bool __maybe_unused 11892406f0cSSuzuki K Poulose cpufeature_pan_not_uao(const struct arm64_cpu_capabilities *entry, int __unused); 11992406f0cSSuzuki K Poulose 12070544196SJames Morse 1214aa8a472SSuzuki K Poulose /* 1224aa8a472SSuzuki K Poulose * NOTE: Any changes to the visibility of features should be kept in 1234aa8a472SSuzuki K Poulose * sync with the documentation of the CPU feature register ABI. 1244aa8a472SSuzuki K Poulose */ 1255e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64isar0[] = { 1267206dc93SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_TS_SHIFT, 4, 0), 1273b3b6810SDongjiu Geng ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_FHM_SHIFT, 4, 0), 1285bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_DP_SHIFT, 4, 0), 1295bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SM4_SHIFT, 4, 0), 1305bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SM3_SHIFT, 4, 0), 1315bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA3_SHIFT, 4, 0), 1325bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_RDM_SHIFT, 4, 0), 133fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_ATOMICS_SHIFT, 4, 0), 134fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_CRC32_SHIFT, 4, 0), 135fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA2_SHIFT, 4, 0), 136fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_SHA1_SHIFT, 4, 0), 137fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR0_AES_SHIFT, 4, 0), 1383c739b57SSuzuki K. Poulose ARM64_FTR_END, 1393c739b57SSuzuki K. Poulose }; 1403c739b57SSuzuki K. Poulose 141c8c3798dSSuzuki K Poulose static const struct arm64_ftr_bits ftr_id_aa64isar1[] = { 1425bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_LRCPC_SHIFT, 4, 0), 1435bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_FCMA_SHIFT, 4, 0), 1445bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_JSCVT_SHIFT, 4, 0), 1455bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_DPB_SHIFT, 4, 0), 146c8c3798dSSuzuki K Poulose ARM64_FTR_END, 147c8c3798dSSuzuki K Poulose }; 148c8c3798dSSuzuki K Poulose 1495e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64pfr0[] = { 150179a56f6SWill Deacon ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_CSV3_SHIFT, 4, 0), 1510f15adbbSWill Deacon ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_CSV2_SHIFT, 4, 0), 1527206dc93SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_DIT_SHIFT, 4, 0), 1533fab3999SDave Martin ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SVE), 1543fab3999SDave Martin FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_SVE_SHIFT, 4, 0), 15564c02720SXie XiuQi ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_RAS_SHIFT, 4, 0), 1565bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_GIC_SHIFT, 4, 0), 157fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_ASIMD_SHIFT, 4, ID_AA64PFR0_ASIMD_NI), 158fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_FP_SHIFT, 4, ID_AA64PFR0_FP_NI), 1593c739b57SSuzuki K. Poulose /* Linux doesn't care about the EL3 */ 1605bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL3_SHIFT, 4, 0), 1615bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL2_SHIFT, 4, 0), 1625bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_SHIFT, 4, ID_AA64PFR0_EL1_64BIT_ONLY), 1635bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL0_SHIFT, 4, ID_AA64PFR0_EL0_64BIT_ONLY), 1643c739b57SSuzuki K. Poulose ARM64_FTR_END, 1653c739b57SSuzuki K. Poulose }; 1663c739b57SSuzuki K. Poulose 1675e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr0[] = { 1685bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN4_SHIFT, 4, ID_AA64MMFR0_TGRAN4_NI), 1695bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN64_SHIFT, 4, ID_AA64MMFR0_TGRAN64_NI), 1705bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_TGRAN16_SHIFT, 4, ID_AA64MMFR0_TGRAN16_NI), 1715bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_BIGENDEL0_SHIFT, 4, 0), 1723c739b57SSuzuki K. Poulose /* Linux shouldn't care about secure memory */ 1735bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_SNSMEM_SHIFT, 4, 0), 1745bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_BIGENDEL_SHIFT, 4, 0), 1755bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_ASID_SHIFT, 4, 0), 1763c739b57SSuzuki K. Poulose /* 1773c739b57SSuzuki K. Poulose * Differing PARange is fine as long as all peripherals and memory are mapped 1783c739b57SSuzuki K. Poulose * within the minimum PARange of all CPUs 1793c739b57SSuzuki K. Poulose */ 180fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_PARANGE_SHIFT, 4, 0), 1813c739b57SSuzuki K. Poulose ARM64_FTR_END, 1823c739b57SSuzuki K. Poulose }; 1833c739b57SSuzuki K. Poulose 1845e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr1[] = { 185fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_PAN_SHIFT, 4, 0), 1865bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_LOR_SHIFT, 4, 0), 1875bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_HPD_SHIFT, 4, 0), 1885bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_VHE_SHIFT, 4, 0), 1895bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_VMIDBITS_SHIFT, 4, 0), 1905bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR1_HADBS_SHIFT, 4, 0), 1913c739b57SSuzuki K. Poulose ARM64_FTR_END, 1923c739b57SSuzuki K. Poulose }; 1933c739b57SSuzuki K. Poulose 1945e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64mmfr2[] = { 1957206dc93SSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_AT_SHIFT, 4, 0), 1965bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_LVA_SHIFT, 4, 0), 1975bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_IESB_SHIFT, 4, 0), 1985bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_LSM_SHIFT, 4, 0), 1995bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_UAO_SHIFT, 4, 0), 2005bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR2_CNP_SHIFT, 4, 0), 201406e3087SJames Morse ARM64_FTR_END, 202406e3087SJames Morse }; 203406e3087SJames Morse 2045e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_ctr[] = { 205be68a8aaSWill Deacon ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_EXACT, 31, 1, 1), /* RES1 */ 2066ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_DIC_SHIFT, 1, 1), 2076ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_IDC_SHIFT, 1, 1), 2086ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_HIGHER_SAFE, CTR_CWG_SHIFT, 4, 0), 2096ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_HIGHER_SAFE, CTR_ERG_SHIFT, 4, 0), 2106ae4b6e0SShanker Donthineni ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_DMINLINE_SHIFT, 4, 1), 2113c739b57SSuzuki K. Poulose /* 2123c739b57SSuzuki K. Poulose * Linux can handle differing I-cache policies. Userspace JITs will 213ee7bc638SSuzuki K Poulose * make use of *minLine. 214155433cbSWill Deacon * If we have differing I-cache policies, report it as the weakest - VIPT. 2153c739b57SSuzuki K. Poulose */ 216155433cbSWill Deacon ARM64_FTR_BITS(FTR_VISIBLE, FTR_NONSTRICT, FTR_EXACT, 14, 2, ICACHE_POLICY_VIPT), /* L1Ip */ 217fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* IminLine */ 2183c739b57SSuzuki K. Poulose ARM64_FTR_END, 2193c739b57SSuzuki K. Poulose }; 2203c739b57SSuzuki K. Poulose 221675b0563SArd Biesheuvel struct arm64_ftr_reg arm64_ftr_reg_ctrel0 = { 222675b0563SArd Biesheuvel .name = "SYS_CTR_EL0", 223675b0563SArd Biesheuvel .ftr_bits = ftr_ctr 224675b0563SArd Biesheuvel }; 225675b0563SArd Biesheuvel 2265e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_mmfr0[] = { 2275bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0xf), /* InnerShr */ 2285bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0), /* FCSE */ 229fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, 20, 4, 0), /* AuxReg */ 2305bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0), /* TCM */ 2315bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), /* ShareLvl */ 2325bdecb79SSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0xf), /* OuterShr */ 2335bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* PMSA */ 2345bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* VMSA */ 2353c739b57SSuzuki K. Poulose ARM64_FTR_END, 2363c739b57SSuzuki K. Poulose }; 2373c739b57SSuzuki K. Poulose 2385e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_aa64dfr0[] = { 239fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, 36, 28, 0), 240fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64DFR0_PMSVER_SHIFT, 4, 0), 241fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_CTX_CMPS_SHIFT, 4, 0), 242fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_WRPS_SHIFT, 4, 0), 243fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64DFR0_BRPS_SHIFT, 4, 0), 244b20d1ba3SWill Deacon /* 245b20d1ba3SWill Deacon * We can instantiate multiple PMU instances with different levels 246b20d1ba3SWill Deacon * of support. 247fe4fbdbcSSuzuki K Poulose */ 248fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_EXACT, ID_AA64DFR0_PMUVER_SHIFT, 4, 0), 249fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_TRACEVER_SHIFT, 4, 0), 250fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, ID_AA64DFR0_DEBUGVER_SHIFT, 4, 0x6), 2513c739b57SSuzuki K. Poulose ARM64_FTR_END, 2523c739b57SSuzuki K. Poulose }; 2533c739b57SSuzuki K. Poulose 2545e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_mvfr2[] = { 2555bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* FPMisc */ 2565bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* SIMDMisc */ 2573c739b57SSuzuki K. Poulose ARM64_FTR_END, 2583c739b57SSuzuki K. Poulose }; 2593c739b57SSuzuki K. Poulose 2605e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_dczid[] = { 261fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_EXACT, 4, 1, 1), /* DZP */ 262fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* BS */ 2633c739b57SSuzuki K. Poulose ARM64_FTR_END, 2643c739b57SSuzuki K. Poulose }; 2653c739b57SSuzuki K. Poulose 2663c739b57SSuzuki K. Poulose 2675e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_isar5[] = { 2685bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_RDM_SHIFT, 4, 0), 2695bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_CRC32_SHIFT, 4, 0), 2705bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SHA2_SHIFT, 4, 0), 2715bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SHA1_SHIFT, 4, 0), 2725bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_AES_SHIFT, 4, 0), 2735bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_ISAR5_SEVL_SHIFT, 4, 0), 2743c739b57SSuzuki K. Poulose ARM64_FTR_END, 2753c739b57SSuzuki K. Poulose }; 2763c739b57SSuzuki K. Poulose 2775e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_mmfr4[] = { 2785bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* ac2 */ 2793c739b57SSuzuki K. Poulose ARM64_FTR_END, 2803c739b57SSuzuki K. Poulose }; 2813c739b57SSuzuki K. Poulose 2825e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_pfr0[] = { 2835bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), /* State3 */ 2845bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0), /* State2 */ 2855bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), /* State1 */ 2865bdecb79SSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), /* State0 */ 2873c739b57SSuzuki K. Poulose ARM64_FTR_END, 2883c739b57SSuzuki K. Poulose }; 2893c739b57SSuzuki K. Poulose 2905e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_id_dfr0[] = { 291fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0), 292fe4fbdbcSSuzuki K Poulose S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0xf), /* PerfMon */ 293fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 20, 4, 0), 294fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0), 295fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), 296fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0), 297fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), 298fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), 299e5343503SSuzuki K Poulose ARM64_FTR_END, 300e5343503SSuzuki K Poulose }; 301e5343503SSuzuki K Poulose 3022e0f2478SDave Martin static const struct arm64_ftr_bits ftr_zcr[] = { 3032e0f2478SDave Martin ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, 3042e0f2478SDave Martin ZCR_ELx_LEN_SHIFT, ZCR_ELx_LEN_SIZE, 0), /* LEN */ 3052e0f2478SDave Martin ARM64_FTR_END, 3062e0f2478SDave Martin }; 3072e0f2478SDave Martin 3083c739b57SSuzuki K. Poulose /* 3093c739b57SSuzuki K. Poulose * Common ftr bits for a 32bit register with all hidden, strict 3103c739b57SSuzuki K. Poulose * attributes, with 4bit feature fields and a default safe value of 3113c739b57SSuzuki K. Poulose * 0. Covers the following 32bit registers: 3123c739b57SSuzuki K. Poulose * id_isar[0-4], id_mmfr[1-3], id_pfr1, mvfr[0-1] 3133c739b57SSuzuki K. Poulose */ 3145e49d73cSArd Biesheuvel static const struct arm64_ftr_bits ftr_generic_32bits[] = { 315fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 28, 4, 0), 316fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 24, 4, 0), 317fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 20, 4, 0), 318fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 16, 4, 0), 319fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 12, 4, 0), 320fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 8, 4, 0), 321fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 4, 4, 0), 322fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 0, 4, 0), 3233c739b57SSuzuki K. Poulose ARM64_FTR_END, 3243c739b57SSuzuki K. Poulose }; 3253c739b57SSuzuki K. Poulose 326eab43e88SSuzuki K Poulose /* Table for a single 32bit feature value */ 327eab43e88SSuzuki K Poulose static const struct arm64_ftr_bits ftr_single32[] = { 328fe4fbdbcSSuzuki K Poulose ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_EXACT, 0, 32, 0), 3293c739b57SSuzuki K. Poulose ARM64_FTR_END, 3303c739b57SSuzuki K. Poulose }; 3313c739b57SSuzuki K. Poulose 332eab43e88SSuzuki K Poulose static const struct arm64_ftr_bits ftr_raz[] = { 3333c739b57SSuzuki K. Poulose ARM64_FTR_END, 3343c739b57SSuzuki K. Poulose }; 3353c739b57SSuzuki K. Poulose 3366f2b7eefSArd Biesheuvel #define ARM64_FTR_REG(id, table) { \ 3373c739b57SSuzuki K. Poulose .sys_id = id, \ 3386f2b7eefSArd Biesheuvel .reg = &(struct arm64_ftr_reg){ \ 3393c739b57SSuzuki K. Poulose .name = #id, \ 3403c739b57SSuzuki K. Poulose .ftr_bits = &((table)[0]), \ 3416f2b7eefSArd Biesheuvel }} 3423c739b57SSuzuki K. Poulose 3436f2b7eefSArd Biesheuvel static const struct __ftr_reg_entry { 3446f2b7eefSArd Biesheuvel u32 sys_id; 3456f2b7eefSArd Biesheuvel struct arm64_ftr_reg *reg; 3466f2b7eefSArd Biesheuvel } arm64_ftr_regs[] = { 3473c739b57SSuzuki K. Poulose 3483c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 1 */ 3493c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_PFR0_EL1, ftr_id_pfr0), 3503c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_PFR1_EL1, ftr_generic_32bits), 351e5343503SSuzuki K Poulose ARM64_FTR_REG(SYS_ID_DFR0_EL1, ftr_id_dfr0), 3523c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR0_EL1, ftr_id_mmfr0), 3533c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR1_EL1, ftr_generic_32bits), 3543c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR2_EL1, ftr_generic_32bits), 3553c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR3_EL1, ftr_generic_32bits), 3563c739b57SSuzuki K. Poulose 3573c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 2 */ 3583c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR0_EL1, ftr_generic_32bits), 3593c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR1_EL1, ftr_generic_32bits), 3603c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR2_EL1, ftr_generic_32bits), 3613c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR3_EL1, ftr_generic_32bits), 3623c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR4_EL1, ftr_generic_32bits), 3633c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_ISAR5_EL1, ftr_id_isar5), 3643c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_MMFR4_EL1, ftr_id_mmfr4), 3653c739b57SSuzuki K. Poulose 3663c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 3 */ 3673c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_MVFR0_EL1, ftr_generic_32bits), 3683c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_MVFR1_EL1, ftr_generic_32bits), 3693c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_MVFR2_EL1, ftr_mvfr2), 3703c739b57SSuzuki K. Poulose 3713c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 4 */ 3723c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64PFR0_EL1, ftr_id_aa64pfr0), 373eab43e88SSuzuki K Poulose ARM64_FTR_REG(SYS_ID_AA64PFR1_EL1, ftr_raz), 3742e0f2478SDave Martin ARM64_FTR_REG(SYS_ID_AA64ZFR0_EL1, ftr_raz), 3753c739b57SSuzuki K. Poulose 3763c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 5 */ 3773c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64DFR0_EL1, ftr_id_aa64dfr0), 378eab43e88SSuzuki K Poulose ARM64_FTR_REG(SYS_ID_AA64DFR1_EL1, ftr_raz), 3793c739b57SSuzuki K. Poulose 3803c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 6 */ 3813c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64ISAR0_EL1, ftr_id_aa64isar0), 382c8c3798dSSuzuki K Poulose ARM64_FTR_REG(SYS_ID_AA64ISAR1_EL1, ftr_id_aa64isar1), 3833c739b57SSuzuki K. Poulose 3843c739b57SSuzuki K. Poulose /* Op1 = 0, CRn = 0, CRm = 7 */ 3853c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64MMFR0_EL1, ftr_id_aa64mmfr0), 3863c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_ID_AA64MMFR1_EL1, ftr_id_aa64mmfr1), 387406e3087SJames Morse ARM64_FTR_REG(SYS_ID_AA64MMFR2_EL1, ftr_id_aa64mmfr2), 3883c739b57SSuzuki K. Poulose 3892e0f2478SDave Martin /* Op1 = 0, CRn = 1, CRm = 2 */ 3902e0f2478SDave Martin ARM64_FTR_REG(SYS_ZCR_EL1, ftr_zcr), 3912e0f2478SDave Martin 3923c739b57SSuzuki K. Poulose /* Op1 = 3, CRn = 0, CRm = 0 */ 393675b0563SArd Biesheuvel { SYS_CTR_EL0, &arm64_ftr_reg_ctrel0 }, 3943c739b57SSuzuki K. Poulose ARM64_FTR_REG(SYS_DCZID_EL0, ftr_dczid), 3953c739b57SSuzuki K. Poulose 3963c739b57SSuzuki K. Poulose /* Op1 = 3, CRn = 14, CRm = 0 */ 397eab43e88SSuzuki K Poulose ARM64_FTR_REG(SYS_CNTFRQ_EL0, ftr_single32), 3983c739b57SSuzuki K. Poulose }; 3993c739b57SSuzuki K. Poulose 4003c739b57SSuzuki K. Poulose static int search_cmp_ftr_reg(const void *id, const void *regp) 4013c739b57SSuzuki K. Poulose { 4026f2b7eefSArd Biesheuvel return (int)(unsigned long)id - (int)((const struct __ftr_reg_entry *)regp)->sys_id; 4033c739b57SSuzuki K. Poulose } 4043c739b57SSuzuki K. Poulose 4053c739b57SSuzuki K. Poulose /* 4063c739b57SSuzuki K. Poulose * get_arm64_ftr_reg - Lookup a feature register entry using its 4073c739b57SSuzuki K. Poulose * sys_reg() encoding. With the array arm64_ftr_regs sorted in the 4083c739b57SSuzuki K. Poulose * ascending order of sys_id , we use binary search to find a matching 4093c739b57SSuzuki K. Poulose * entry. 4103c739b57SSuzuki K. Poulose * 4113c739b57SSuzuki K. Poulose * returns - Upon success, matching ftr_reg entry for id. 4123c739b57SSuzuki K. Poulose * - NULL on failure. It is upto the caller to decide 4133c739b57SSuzuki K. Poulose * the impact of a failure. 4143c739b57SSuzuki K. Poulose */ 4153c739b57SSuzuki K. Poulose static struct arm64_ftr_reg *get_arm64_ftr_reg(u32 sys_id) 4163c739b57SSuzuki K. Poulose { 4176f2b7eefSArd Biesheuvel const struct __ftr_reg_entry *ret; 4186f2b7eefSArd Biesheuvel 4196f2b7eefSArd Biesheuvel ret = bsearch((const void *)(unsigned long)sys_id, 4203c739b57SSuzuki K. Poulose arm64_ftr_regs, 4213c739b57SSuzuki K. Poulose ARRAY_SIZE(arm64_ftr_regs), 4223c739b57SSuzuki K. Poulose sizeof(arm64_ftr_regs[0]), 4233c739b57SSuzuki K. Poulose search_cmp_ftr_reg); 4246f2b7eefSArd Biesheuvel if (ret) 4256f2b7eefSArd Biesheuvel return ret->reg; 4266f2b7eefSArd Biesheuvel return NULL; 4273c739b57SSuzuki K. Poulose } 4283c739b57SSuzuki K. Poulose 4295e49d73cSArd Biesheuvel static u64 arm64_ftr_set_value(const struct arm64_ftr_bits *ftrp, s64 reg, 4305e49d73cSArd Biesheuvel s64 ftr_val) 4313c739b57SSuzuki K. Poulose { 4323c739b57SSuzuki K. Poulose u64 mask = arm64_ftr_mask(ftrp); 4333c739b57SSuzuki K. Poulose 4343c739b57SSuzuki K. Poulose reg &= ~mask; 4353c739b57SSuzuki K. Poulose reg |= (ftr_val << ftrp->shift) & mask; 4363c739b57SSuzuki K. Poulose return reg; 4373c739b57SSuzuki K. Poulose } 4383c739b57SSuzuki K. Poulose 4395e49d73cSArd Biesheuvel static s64 arm64_ftr_safe_value(const struct arm64_ftr_bits *ftrp, s64 new, 4405e49d73cSArd Biesheuvel s64 cur) 4413c739b57SSuzuki K. Poulose { 4423c739b57SSuzuki K. Poulose s64 ret = 0; 4433c739b57SSuzuki K. Poulose 4443c739b57SSuzuki K. Poulose switch (ftrp->type) { 4453c739b57SSuzuki K. Poulose case FTR_EXACT: 4463c739b57SSuzuki K. Poulose ret = ftrp->safe_val; 4473c739b57SSuzuki K. Poulose break; 4483c739b57SSuzuki K. Poulose case FTR_LOWER_SAFE: 4493c739b57SSuzuki K. Poulose ret = new < cur ? new : cur; 4503c739b57SSuzuki K. Poulose break; 4513c739b57SSuzuki K. Poulose case FTR_HIGHER_SAFE: 4523c739b57SSuzuki K. Poulose ret = new > cur ? new : cur; 4533c739b57SSuzuki K. Poulose break; 4543c739b57SSuzuki K. Poulose default: 4553c739b57SSuzuki K. Poulose BUG(); 4563c739b57SSuzuki K. Poulose } 4573c739b57SSuzuki K. Poulose 4583c739b57SSuzuki K. Poulose return ret; 4593c739b57SSuzuki K. Poulose } 4603c739b57SSuzuki K. Poulose 4613c739b57SSuzuki K. Poulose static void __init sort_ftr_regs(void) 4623c739b57SSuzuki K. Poulose { 4636f2b7eefSArd Biesheuvel int i; 4646f2b7eefSArd Biesheuvel 4656f2b7eefSArd Biesheuvel /* Check that the array is sorted so that we can do the binary search */ 4666f2b7eefSArd Biesheuvel for (i = 1; i < ARRAY_SIZE(arm64_ftr_regs); i++) 4676f2b7eefSArd Biesheuvel BUG_ON(arm64_ftr_regs[i].sys_id < arm64_ftr_regs[i - 1].sys_id); 4683c739b57SSuzuki K. Poulose } 4693c739b57SSuzuki K. Poulose 4703c739b57SSuzuki K. Poulose /* 4713c739b57SSuzuki K. Poulose * Initialise the CPU feature register from Boot CPU values. 4723c739b57SSuzuki K. Poulose * Also initiliases the strict_mask for the register. 473b389d799SMark Rutland * Any bits that are not covered by an arm64_ftr_bits entry are considered 474b389d799SMark Rutland * RES0 for the system-wide value, and must strictly match. 4753c739b57SSuzuki K. Poulose */ 4763c739b57SSuzuki K. Poulose static void __init init_cpu_ftr_reg(u32 sys_reg, u64 new) 4773c739b57SSuzuki K. Poulose { 4783c739b57SSuzuki K. Poulose u64 val = 0; 4793c739b57SSuzuki K. Poulose u64 strict_mask = ~0x0ULL; 480fe4fbdbcSSuzuki K Poulose u64 user_mask = 0; 481b389d799SMark Rutland u64 valid_mask = 0; 482b389d799SMark Rutland 4835e49d73cSArd Biesheuvel const struct arm64_ftr_bits *ftrp; 4843c739b57SSuzuki K. Poulose struct arm64_ftr_reg *reg = get_arm64_ftr_reg(sys_reg); 4853c739b57SSuzuki K. Poulose 4863c739b57SSuzuki K. Poulose BUG_ON(!reg); 4873c739b57SSuzuki K. Poulose 4883c739b57SSuzuki K. Poulose for (ftrp = reg->ftr_bits; ftrp->width; ftrp++) { 489b389d799SMark Rutland u64 ftr_mask = arm64_ftr_mask(ftrp); 4903c739b57SSuzuki K. Poulose s64 ftr_new = arm64_ftr_value(ftrp, new); 4913c739b57SSuzuki K. Poulose 4923c739b57SSuzuki K. Poulose val = arm64_ftr_set_value(ftrp, val, ftr_new); 493b389d799SMark Rutland 494b389d799SMark Rutland valid_mask |= ftr_mask; 4953c739b57SSuzuki K. Poulose if (!ftrp->strict) 496b389d799SMark Rutland strict_mask &= ~ftr_mask; 497fe4fbdbcSSuzuki K Poulose if (ftrp->visible) 498fe4fbdbcSSuzuki K Poulose user_mask |= ftr_mask; 499fe4fbdbcSSuzuki K Poulose else 500fe4fbdbcSSuzuki K Poulose reg->user_val = arm64_ftr_set_value(ftrp, 501fe4fbdbcSSuzuki K Poulose reg->user_val, 502fe4fbdbcSSuzuki K Poulose ftrp->safe_val); 5033c739b57SSuzuki K. Poulose } 504b389d799SMark Rutland 505b389d799SMark Rutland val &= valid_mask; 506b389d799SMark Rutland 5073c739b57SSuzuki K. Poulose reg->sys_val = val; 5083c739b57SSuzuki K. Poulose reg->strict_mask = strict_mask; 509fe4fbdbcSSuzuki K Poulose reg->user_mask = user_mask; 5103c739b57SSuzuki K. Poulose } 5113c739b57SSuzuki K. Poulose 5121e89baedSSuzuki K Poulose extern const struct arm64_cpu_capabilities arm64_errata[]; 513fd9d63daSSuzuki K Poulose static void __init setup_boot_cpu_capabilities(void); 5141e89baedSSuzuki K Poulose 5153c739b57SSuzuki K. Poulose void __init init_cpu_features(struct cpuinfo_arm64 *info) 5163c739b57SSuzuki K. Poulose { 5173c739b57SSuzuki K. Poulose /* Before we start using the tables, make sure it is sorted */ 5183c739b57SSuzuki K. Poulose sort_ftr_regs(); 5193c739b57SSuzuki K. Poulose 5203c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_CTR_EL0, info->reg_ctr); 5213c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_DCZID_EL0, info->reg_dczid); 5223c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_CNTFRQ_EL0, info->reg_cntfrq); 5233c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64DFR0_EL1, info->reg_id_aa64dfr0); 5243c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64DFR1_EL1, info->reg_id_aa64dfr1); 5253c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64ISAR0_EL1, info->reg_id_aa64isar0); 5263c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64ISAR1_EL1, info->reg_id_aa64isar1); 5273c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64MMFR0_EL1, info->reg_id_aa64mmfr0); 5283c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64MMFR1_EL1, info->reg_id_aa64mmfr1); 529406e3087SJames Morse init_cpu_ftr_reg(SYS_ID_AA64MMFR2_EL1, info->reg_id_aa64mmfr2); 5303c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64PFR0_EL1, info->reg_id_aa64pfr0); 5313c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_AA64PFR1_EL1, info->reg_id_aa64pfr1); 5322e0f2478SDave Martin init_cpu_ftr_reg(SYS_ID_AA64ZFR0_EL1, info->reg_id_aa64zfr0); 533a6dc3cd7SSuzuki K Poulose 534a6dc3cd7SSuzuki K Poulose if (id_aa64pfr0_32bit_el0(info->reg_id_aa64pfr0)) { 5353c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_DFR0_EL1, info->reg_id_dfr0); 5363c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR0_EL1, info->reg_id_isar0); 5373c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR1_EL1, info->reg_id_isar1); 5383c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR2_EL1, info->reg_id_isar2); 5393c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR3_EL1, info->reg_id_isar3); 5403c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR4_EL1, info->reg_id_isar4); 5413c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_ISAR5_EL1, info->reg_id_isar5); 5423c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR0_EL1, info->reg_id_mmfr0); 5433c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR1_EL1, info->reg_id_mmfr1); 5443c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR2_EL1, info->reg_id_mmfr2); 5453c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_MMFR3_EL1, info->reg_id_mmfr3); 5463c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_PFR0_EL1, info->reg_id_pfr0); 5473c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_ID_PFR1_EL1, info->reg_id_pfr1); 5483c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_MVFR0_EL1, info->reg_mvfr0); 5493c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_MVFR1_EL1, info->reg_mvfr1); 5503c739b57SSuzuki K. Poulose init_cpu_ftr_reg(SYS_MVFR2_EL1, info->reg_mvfr2); 5513c739b57SSuzuki K. Poulose } 5523c739b57SSuzuki K. Poulose 5532e0f2478SDave Martin if (id_aa64pfr0_sve(info->reg_id_aa64pfr0)) { 5542e0f2478SDave Martin init_cpu_ftr_reg(SYS_ZCR_EL1, info->reg_zcr); 5552e0f2478SDave Martin sve_init_vq_map(); 5562e0f2478SDave Martin } 5575e91107bSSuzuki K Poulose 5585e91107bSSuzuki K Poulose /* 559fd9d63daSSuzuki K Poulose * Detect and enable early CPU capabilities based on the boot CPU, 560fd9d63daSSuzuki K Poulose * after we have initialised the CPU feature infrastructure. 5615e91107bSSuzuki K Poulose */ 562fd9d63daSSuzuki K Poulose setup_boot_cpu_capabilities(); 563a6dc3cd7SSuzuki K Poulose } 564a6dc3cd7SSuzuki K Poulose 5653086d391SSuzuki K. Poulose static void update_cpu_ftr_reg(struct arm64_ftr_reg *reg, u64 new) 5663c739b57SSuzuki K. Poulose { 5675e49d73cSArd Biesheuvel const struct arm64_ftr_bits *ftrp; 5683c739b57SSuzuki K. Poulose 5693c739b57SSuzuki K. Poulose for (ftrp = reg->ftr_bits; ftrp->width; ftrp++) { 5703c739b57SSuzuki K. Poulose s64 ftr_cur = arm64_ftr_value(ftrp, reg->sys_val); 5713c739b57SSuzuki K. Poulose s64 ftr_new = arm64_ftr_value(ftrp, new); 5723c739b57SSuzuki K. Poulose 5733c739b57SSuzuki K. Poulose if (ftr_cur == ftr_new) 5743c739b57SSuzuki K. Poulose continue; 5753c739b57SSuzuki K. Poulose /* Find a safe value */ 5763c739b57SSuzuki K. Poulose ftr_new = arm64_ftr_safe_value(ftrp, ftr_new, ftr_cur); 5773c739b57SSuzuki K. Poulose reg->sys_val = arm64_ftr_set_value(ftrp, reg->sys_val, ftr_new); 5783c739b57SSuzuki K. Poulose } 5793c739b57SSuzuki K. Poulose 5803c739b57SSuzuki K. Poulose } 5813c739b57SSuzuki K. Poulose 5823086d391SSuzuki K. Poulose static int check_update_ftr_reg(u32 sys_id, int cpu, u64 val, u64 boot) 583cdcf817bSSuzuki K. Poulose { 5843086d391SSuzuki K. Poulose struct arm64_ftr_reg *regp = get_arm64_ftr_reg(sys_id); 5853086d391SSuzuki K. Poulose 5863086d391SSuzuki K. Poulose BUG_ON(!regp); 5873086d391SSuzuki K. Poulose update_cpu_ftr_reg(regp, val); 5883086d391SSuzuki K. Poulose if ((boot & regp->strict_mask) == (val & regp->strict_mask)) 5893086d391SSuzuki K. Poulose return 0; 5903086d391SSuzuki K. Poulose pr_warn("SANITY CHECK: Unexpected variation in %s. Boot CPU: %#016llx, CPU%d: %#016llx\n", 5913086d391SSuzuki K. Poulose regp->name, boot, cpu, val); 5923086d391SSuzuki K. Poulose return 1; 5933086d391SSuzuki K. Poulose } 5943086d391SSuzuki K. Poulose 5953086d391SSuzuki K. Poulose /* 5963086d391SSuzuki K. Poulose * Update system wide CPU feature registers with the values from a 5973086d391SSuzuki K. Poulose * non-boot CPU. Also performs SANITY checks to make sure that there 5983086d391SSuzuki K. Poulose * aren't any insane variations from that of the boot CPU. 5993086d391SSuzuki K. Poulose */ 6003086d391SSuzuki K. Poulose void update_cpu_features(int cpu, 6013086d391SSuzuki K. Poulose struct cpuinfo_arm64 *info, 6023086d391SSuzuki K. Poulose struct cpuinfo_arm64 *boot) 6033086d391SSuzuki K. Poulose { 6043086d391SSuzuki K. Poulose int taint = 0; 6053086d391SSuzuki K. Poulose 6063086d391SSuzuki K. Poulose /* 6073086d391SSuzuki K. Poulose * The kernel can handle differing I-cache policies, but otherwise 6083086d391SSuzuki K. Poulose * caches should look identical. Userspace JITs will make use of 6093086d391SSuzuki K. Poulose * *minLine. 6103086d391SSuzuki K. Poulose */ 6113086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_CTR_EL0, cpu, 6123086d391SSuzuki K. Poulose info->reg_ctr, boot->reg_ctr); 6133086d391SSuzuki K. Poulose 6143086d391SSuzuki K. Poulose /* 6153086d391SSuzuki K. Poulose * Userspace may perform DC ZVA instructions. Mismatched block sizes 6163086d391SSuzuki K. Poulose * could result in too much or too little memory being zeroed if a 6173086d391SSuzuki K. Poulose * process is preempted and migrated between CPUs. 6183086d391SSuzuki K. Poulose */ 6193086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_DCZID_EL0, cpu, 6203086d391SSuzuki K. Poulose info->reg_dczid, boot->reg_dczid); 6213086d391SSuzuki K. Poulose 6223086d391SSuzuki K. Poulose /* If different, timekeeping will be broken (especially with KVM) */ 6233086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_CNTFRQ_EL0, cpu, 6243086d391SSuzuki K. Poulose info->reg_cntfrq, boot->reg_cntfrq); 6253086d391SSuzuki K. Poulose 6263086d391SSuzuki K. Poulose /* 6273086d391SSuzuki K. Poulose * The kernel uses self-hosted debug features and expects CPUs to 6283086d391SSuzuki K. Poulose * support identical debug features. We presently need CTX_CMPs, WRPs, 6293086d391SSuzuki K. Poulose * and BRPs to be identical. 6303086d391SSuzuki K. Poulose * ID_AA64DFR1 is currently RES0. 6313086d391SSuzuki K. Poulose */ 6323086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64DFR0_EL1, cpu, 6333086d391SSuzuki K. Poulose info->reg_id_aa64dfr0, boot->reg_id_aa64dfr0); 6343086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64DFR1_EL1, cpu, 6353086d391SSuzuki K. Poulose info->reg_id_aa64dfr1, boot->reg_id_aa64dfr1); 6363086d391SSuzuki K. Poulose /* 6373086d391SSuzuki K. Poulose * Even in big.LITTLE, processors should be identical instruction-set 6383086d391SSuzuki K. Poulose * wise. 6393086d391SSuzuki K. Poulose */ 6403086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64ISAR0_EL1, cpu, 6413086d391SSuzuki K. Poulose info->reg_id_aa64isar0, boot->reg_id_aa64isar0); 6423086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64ISAR1_EL1, cpu, 6433086d391SSuzuki K. Poulose info->reg_id_aa64isar1, boot->reg_id_aa64isar1); 6443086d391SSuzuki K. Poulose 6453086d391SSuzuki K. Poulose /* 6463086d391SSuzuki K. Poulose * Differing PARange support is fine as long as all peripherals and 6473086d391SSuzuki K. Poulose * memory are mapped within the minimum PARange of all CPUs. 6483086d391SSuzuki K. Poulose * Linux should not care about secure memory. 6493086d391SSuzuki K. Poulose */ 6503086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64MMFR0_EL1, cpu, 6513086d391SSuzuki K. Poulose info->reg_id_aa64mmfr0, boot->reg_id_aa64mmfr0); 6523086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64MMFR1_EL1, cpu, 6533086d391SSuzuki K. Poulose info->reg_id_aa64mmfr1, boot->reg_id_aa64mmfr1); 654406e3087SJames Morse taint |= check_update_ftr_reg(SYS_ID_AA64MMFR2_EL1, cpu, 655406e3087SJames Morse info->reg_id_aa64mmfr2, boot->reg_id_aa64mmfr2); 6563086d391SSuzuki K. Poulose 6573086d391SSuzuki K. Poulose /* 6583086d391SSuzuki K. Poulose * EL3 is not our concern. 6593086d391SSuzuki K. Poulose * ID_AA64PFR1 is currently RES0. 6603086d391SSuzuki K. Poulose */ 6613086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64PFR0_EL1, cpu, 6623086d391SSuzuki K. Poulose info->reg_id_aa64pfr0, boot->reg_id_aa64pfr0); 6633086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_AA64PFR1_EL1, cpu, 6643086d391SSuzuki K. Poulose info->reg_id_aa64pfr1, boot->reg_id_aa64pfr1); 6653086d391SSuzuki K. Poulose 6662e0f2478SDave Martin taint |= check_update_ftr_reg(SYS_ID_AA64ZFR0_EL1, cpu, 6672e0f2478SDave Martin info->reg_id_aa64zfr0, boot->reg_id_aa64zfr0); 6682e0f2478SDave Martin 6693086d391SSuzuki K. Poulose /* 670a6dc3cd7SSuzuki K Poulose * If we have AArch32, we care about 32-bit features for compat. 671a6dc3cd7SSuzuki K Poulose * If the system doesn't support AArch32, don't update them. 6723086d391SSuzuki K. Poulose */ 67346823dd1SDave Martin if (id_aa64pfr0_32bit_el0(read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1)) && 674a6dc3cd7SSuzuki K Poulose id_aa64pfr0_32bit_el0(info->reg_id_aa64pfr0)) { 675a6dc3cd7SSuzuki K Poulose 6763086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_DFR0_EL1, cpu, 6773086d391SSuzuki K. Poulose info->reg_id_dfr0, boot->reg_id_dfr0); 6783086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR0_EL1, cpu, 6793086d391SSuzuki K. Poulose info->reg_id_isar0, boot->reg_id_isar0); 6803086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR1_EL1, cpu, 6813086d391SSuzuki K. Poulose info->reg_id_isar1, boot->reg_id_isar1); 6823086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR2_EL1, cpu, 6833086d391SSuzuki K. Poulose info->reg_id_isar2, boot->reg_id_isar2); 6843086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR3_EL1, cpu, 6853086d391SSuzuki K. Poulose info->reg_id_isar3, boot->reg_id_isar3); 6863086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR4_EL1, cpu, 6873086d391SSuzuki K. Poulose info->reg_id_isar4, boot->reg_id_isar4); 6883086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_ISAR5_EL1, cpu, 6893086d391SSuzuki K. Poulose info->reg_id_isar5, boot->reg_id_isar5); 6903086d391SSuzuki K. Poulose 6913086d391SSuzuki K. Poulose /* 6923086d391SSuzuki K. Poulose * Regardless of the value of the AuxReg field, the AIFSR, ADFSR, and 6933086d391SSuzuki K. Poulose * ACTLR formats could differ across CPUs and therefore would have to 6943086d391SSuzuki K. Poulose * be trapped for virtualization anyway. 6953086d391SSuzuki K. Poulose */ 6963086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR0_EL1, cpu, 6973086d391SSuzuki K. Poulose info->reg_id_mmfr0, boot->reg_id_mmfr0); 6983086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR1_EL1, cpu, 6993086d391SSuzuki K. Poulose info->reg_id_mmfr1, boot->reg_id_mmfr1); 7003086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR2_EL1, cpu, 7013086d391SSuzuki K. Poulose info->reg_id_mmfr2, boot->reg_id_mmfr2); 7023086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_MMFR3_EL1, cpu, 7033086d391SSuzuki K. Poulose info->reg_id_mmfr3, boot->reg_id_mmfr3); 7043086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_PFR0_EL1, cpu, 7053086d391SSuzuki K. Poulose info->reg_id_pfr0, boot->reg_id_pfr0); 7063086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_ID_PFR1_EL1, cpu, 7073086d391SSuzuki K. Poulose info->reg_id_pfr1, boot->reg_id_pfr1); 7083086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_MVFR0_EL1, cpu, 7093086d391SSuzuki K. Poulose info->reg_mvfr0, boot->reg_mvfr0); 7103086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_MVFR1_EL1, cpu, 7113086d391SSuzuki K. Poulose info->reg_mvfr1, boot->reg_mvfr1); 7123086d391SSuzuki K. Poulose taint |= check_update_ftr_reg(SYS_MVFR2_EL1, cpu, 7133086d391SSuzuki K. Poulose info->reg_mvfr2, boot->reg_mvfr2); 714a6dc3cd7SSuzuki K Poulose } 7153086d391SSuzuki K. Poulose 7162e0f2478SDave Martin if (id_aa64pfr0_sve(info->reg_id_aa64pfr0)) { 7172e0f2478SDave Martin taint |= check_update_ftr_reg(SYS_ZCR_EL1, cpu, 7182e0f2478SDave Martin info->reg_zcr, boot->reg_zcr); 7192e0f2478SDave Martin 7202e0f2478SDave Martin /* Probe vector lengths, unless we already gave up on SVE */ 7212e0f2478SDave Martin if (id_aa64pfr0_sve(read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1)) && 7222e0f2478SDave Martin !sys_caps_initialised) 7232e0f2478SDave Martin sve_update_vq_map(); 7242e0f2478SDave Martin } 7252e0f2478SDave Martin 7263086d391SSuzuki K. Poulose /* 7273086d391SSuzuki K. Poulose * Mismatched CPU features are a recipe for disaster. Don't even 7283086d391SSuzuki K. Poulose * pretend to support them. 7293086d391SSuzuki K. Poulose */ 7308dd0ee65SWill Deacon if (taint) { 7313fde2999SWill Deacon pr_warn_once("Unsupported CPU feature variation detected.\n"); 7323fde2999SWill Deacon add_taint(TAINT_CPU_OUT_OF_SPEC, LOCKDEP_STILL_OK); 733cdcf817bSSuzuki K. Poulose } 7348dd0ee65SWill Deacon } 735cdcf817bSSuzuki K. Poulose 73646823dd1SDave Martin u64 read_sanitised_ftr_reg(u32 id) 737b3f15378SSuzuki K. Poulose { 738b3f15378SSuzuki K. Poulose struct arm64_ftr_reg *regp = get_arm64_ftr_reg(id); 739b3f15378SSuzuki K. Poulose 740b3f15378SSuzuki K. Poulose /* We shouldn't get a request for an unsupported register */ 741b3f15378SSuzuki K. Poulose BUG_ON(!regp); 742b3f15378SSuzuki K. Poulose return regp->sys_val; 743b3f15378SSuzuki K. Poulose } 744359b7064SMarc Zyngier 745965861d6SMark Rutland #define read_sysreg_case(r) \ 746965861d6SMark Rutland case r: return read_sysreg_s(r) 747965861d6SMark Rutland 74892406f0cSSuzuki K Poulose /* 74946823dd1SDave Martin * __read_sysreg_by_encoding() - Used by a STARTING cpu before cpuinfo is populated. 75092406f0cSSuzuki K Poulose * Read the system register on the current CPU 75192406f0cSSuzuki K Poulose */ 75246823dd1SDave Martin static u64 __read_sysreg_by_encoding(u32 sys_id) 75392406f0cSSuzuki K Poulose { 75492406f0cSSuzuki K Poulose switch (sys_id) { 755965861d6SMark Rutland read_sysreg_case(SYS_ID_PFR0_EL1); 756965861d6SMark Rutland read_sysreg_case(SYS_ID_PFR1_EL1); 757965861d6SMark Rutland read_sysreg_case(SYS_ID_DFR0_EL1); 758965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR0_EL1); 759965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR1_EL1); 760965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR2_EL1); 761965861d6SMark Rutland read_sysreg_case(SYS_ID_MMFR3_EL1); 762965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR0_EL1); 763965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR1_EL1); 764965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR2_EL1); 765965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR3_EL1); 766965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR4_EL1); 767965861d6SMark Rutland read_sysreg_case(SYS_ID_ISAR5_EL1); 768965861d6SMark Rutland read_sysreg_case(SYS_MVFR0_EL1); 769965861d6SMark Rutland read_sysreg_case(SYS_MVFR1_EL1); 770965861d6SMark Rutland read_sysreg_case(SYS_MVFR2_EL1); 77192406f0cSSuzuki K Poulose 772965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64PFR0_EL1); 773965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64PFR1_EL1); 774965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64DFR0_EL1); 775965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64DFR1_EL1); 776965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64MMFR0_EL1); 777965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64MMFR1_EL1); 778965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64MMFR2_EL1); 779965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64ISAR0_EL1); 780965861d6SMark Rutland read_sysreg_case(SYS_ID_AA64ISAR1_EL1); 78192406f0cSSuzuki K Poulose 782965861d6SMark Rutland read_sysreg_case(SYS_CNTFRQ_EL0); 783965861d6SMark Rutland read_sysreg_case(SYS_CTR_EL0); 784965861d6SMark Rutland read_sysreg_case(SYS_DCZID_EL0); 785965861d6SMark Rutland 78692406f0cSSuzuki K Poulose default: 78792406f0cSSuzuki K Poulose BUG(); 78892406f0cSSuzuki K Poulose return 0; 78992406f0cSSuzuki K Poulose } 79092406f0cSSuzuki K Poulose } 79192406f0cSSuzuki K Poulose 792963fcd40SMarc Zyngier #include <linux/irqchip/arm-gic-v3.h> 793963fcd40SMarc Zyngier 79494a9e04aSMarc Zyngier static bool 79518ffa046SJames Morse feature_matches(u64 reg, const struct arm64_cpu_capabilities *entry) 79618ffa046SJames Morse { 79728c5dcb2SSuzuki K Poulose int val = cpuid_feature_extract_field(reg, entry->field_pos, entry->sign); 79818ffa046SJames Morse 79918ffa046SJames Morse return val >= entry->min_field_value; 80018ffa046SJames Morse } 80118ffa046SJames Morse 802da8d02d1SSuzuki K. Poulose static bool 80392406f0cSSuzuki K Poulose has_cpuid_feature(const struct arm64_cpu_capabilities *entry, int scope) 804da8d02d1SSuzuki K. Poulose { 805da8d02d1SSuzuki K. Poulose u64 val; 80694a9e04aSMarc Zyngier 80792406f0cSSuzuki K Poulose WARN_ON(scope == SCOPE_LOCAL_CPU && preemptible()); 80892406f0cSSuzuki K Poulose if (scope == SCOPE_SYSTEM) 80946823dd1SDave Martin val = read_sanitised_ftr_reg(entry->sys_reg); 81092406f0cSSuzuki K Poulose else 81146823dd1SDave Martin val = __read_sysreg_by_encoding(entry->sys_reg); 81292406f0cSSuzuki K Poulose 813da8d02d1SSuzuki K. Poulose return feature_matches(val, entry); 814da8d02d1SSuzuki K. Poulose } 815338d4f49SJames Morse 81692406f0cSSuzuki K Poulose static bool has_useable_gicv3_cpuif(const struct arm64_cpu_capabilities *entry, int scope) 817963fcd40SMarc Zyngier { 818963fcd40SMarc Zyngier bool has_sre; 819963fcd40SMarc Zyngier 82092406f0cSSuzuki K Poulose if (!has_cpuid_feature(entry, scope)) 821963fcd40SMarc Zyngier return false; 822963fcd40SMarc Zyngier 823963fcd40SMarc Zyngier has_sre = gic_enable_sre(); 824963fcd40SMarc Zyngier if (!has_sre) 825963fcd40SMarc Zyngier pr_warn_once("%s present but disabled by higher exception level\n", 826963fcd40SMarc Zyngier entry->desc); 827963fcd40SMarc Zyngier 828963fcd40SMarc Zyngier return has_sre; 829963fcd40SMarc Zyngier } 830963fcd40SMarc Zyngier 83192406f0cSSuzuki K Poulose static bool has_no_hw_prefetch(const struct arm64_cpu_capabilities *entry, int __unused) 832d5370f75SWill Deacon { 833d5370f75SWill Deacon u32 midr = read_cpuid_id(); 834d5370f75SWill Deacon 835d5370f75SWill Deacon /* Cavium ThunderX pass 1.x and 2.x */ 836fa5ce3d1SRobert Richter return MIDR_IS_CPU_MODEL_RANGE(midr, MIDR_THUNDERX, 837fa5ce3d1SRobert Richter MIDR_CPU_VAR_REV(0, 0), 838fa5ce3d1SRobert Richter MIDR_CPU_VAR_REV(1, MIDR_REVISION_MASK)); 839d5370f75SWill Deacon } 840d5370f75SWill Deacon 84182e0191aSSuzuki K Poulose static bool has_no_fpsimd(const struct arm64_cpu_capabilities *entry, int __unused) 84282e0191aSSuzuki K Poulose { 84346823dd1SDave Martin u64 pfr0 = read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1); 84482e0191aSSuzuki K Poulose 84582e0191aSSuzuki K Poulose return cpuid_feature_extract_signed_field(pfr0, 84682e0191aSSuzuki K Poulose ID_AA64PFR0_FP_SHIFT) < 0; 84782e0191aSSuzuki K Poulose } 84882e0191aSSuzuki K Poulose 8496ae4b6e0SShanker Donthineni static bool has_cache_idc(const struct arm64_cpu_capabilities *entry, 8506ae4b6e0SShanker Donthineni int __unused) 8516ae4b6e0SShanker Donthineni { 8526ae4b6e0SShanker Donthineni return read_sanitised_ftr_reg(SYS_CTR_EL0) & BIT(CTR_IDC_SHIFT); 8536ae4b6e0SShanker Donthineni } 8546ae4b6e0SShanker Donthineni 8556ae4b6e0SShanker Donthineni static bool has_cache_dic(const struct arm64_cpu_capabilities *entry, 8566ae4b6e0SShanker Donthineni int __unused) 8576ae4b6e0SShanker Donthineni { 8586ae4b6e0SShanker Donthineni return read_sanitised_ftr_reg(SYS_CTR_EL0) & BIT(CTR_DIC_SHIFT); 8596ae4b6e0SShanker Donthineni } 8606ae4b6e0SShanker Donthineni 861ea1e3de8SWill Deacon #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 862ea1e3de8SWill Deacon static int __kpti_forced; /* 0: not forced, >0: forced on, <0: forced off */ 863ea1e3de8SWill Deacon 864ea1e3de8SWill Deacon static bool unmap_kernel_at_el0(const struct arm64_cpu_capabilities *entry, 865d3aec8a2SSuzuki K Poulose int scope) 866ea1e3de8SWill Deacon { 867be5b2998SSuzuki K Poulose /* List of CPUs that are not vulnerable and don't need KPTI */ 868be5b2998SSuzuki K Poulose static const struct midr_range kpti_safe_list[] = { 869be5b2998SSuzuki K Poulose MIDR_ALL_VERSIONS(MIDR_CAVIUM_THUNDERX2), 870be5b2998SSuzuki K Poulose MIDR_ALL_VERSIONS(MIDR_BRCM_VULCAN), 871*71c751f2SMark Rutland { /* sentinel */ } 872be5b2998SSuzuki K Poulose }; 8736dc52b15SMarc Zyngier char const *str = "command line option"; 874179a56f6SWill Deacon 8756dc52b15SMarc Zyngier /* 8766dc52b15SMarc Zyngier * For reasons that aren't entirely clear, enabling KPTI on Cavium 8776dc52b15SMarc Zyngier * ThunderX leads to apparent I-cache corruption of kernel text, which 8786dc52b15SMarc Zyngier * ends as well as you might imagine. Don't even try. 8796dc52b15SMarc Zyngier */ 8806dc52b15SMarc Zyngier if (cpus_have_const_cap(ARM64_WORKAROUND_CAVIUM_27456)) { 8816dc52b15SMarc Zyngier str = "ARM64_WORKAROUND_CAVIUM_27456"; 8826dc52b15SMarc Zyngier __kpti_forced = -1; 8836dc52b15SMarc Zyngier } 8846dc52b15SMarc Zyngier 8856dc52b15SMarc Zyngier /* Forced? */ 886ea1e3de8SWill Deacon if (__kpti_forced) { 8876dc52b15SMarc Zyngier pr_info_once("kernel page table isolation forced %s by %s\n", 8886dc52b15SMarc Zyngier __kpti_forced > 0 ? "ON" : "OFF", str); 889ea1e3de8SWill Deacon return __kpti_forced > 0; 890ea1e3de8SWill Deacon } 891ea1e3de8SWill Deacon 892ea1e3de8SWill Deacon /* Useful for KASLR robustness */ 893ea1e3de8SWill Deacon if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) 894ea1e3de8SWill Deacon return true; 895ea1e3de8SWill Deacon 8960ba2e29cSJayachandran C /* Don't force KPTI for CPUs that are not vulnerable */ 897be5b2998SSuzuki K Poulose if (is_midr_in_range_list(read_cpuid_id(), kpti_safe_list)) 8980ba2e29cSJayachandran C return false; 8990ba2e29cSJayachandran C 900179a56f6SWill Deacon /* Defer to CPU feature registers */ 901d3aec8a2SSuzuki K Poulose return !has_cpuid_feature(entry, scope); 902ea1e3de8SWill Deacon } 903ea1e3de8SWill Deacon 904c0cda3b8SDave Martin static void 905c0cda3b8SDave Martin kpti_install_ng_mappings(const struct arm64_cpu_capabilities *__unused) 906f992b4dfSWill Deacon { 907f992b4dfSWill Deacon typedef void (kpti_remap_fn)(int, int, phys_addr_t); 908f992b4dfSWill Deacon extern kpti_remap_fn idmap_kpti_install_ng_mappings; 909f992b4dfSWill Deacon kpti_remap_fn *remap_fn; 910f992b4dfSWill Deacon 911f992b4dfSWill Deacon static bool kpti_applied = false; 912f992b4dfSWill Deacon int cpu = smp_processor_id(); 913f992b4dfSWill Deacon 914f992b4dfSWill Deacon if (kpti_applied) 915c0cda3b8SDave Martin return; 916f992b4dfSWill Deacon 917f992b4dfSWill Deacon remap_fn = (void *)__pa_symbol(idmap_kpti_install_ng_mappings); 918f992b4dfSWill Deacon 919f992b4dfSWill Deacon cpu_install_idmap(); 920f992b4dfSWill Deacon remap_fn(cpu, num_online_cpus(), __pa_symbol(swapper_pg_dir)); 921f992b4dfSWill Deacon cpu_uninstall_idmap(); 922f992b4dfSWill Deacon 923f992b4dfSWill Deacon if (!cpu) 924f992b4dfSWill Deacon kpti_applied = true; 925f992b4dfSWill Deacon 926c0cda3b8SDave Martin return; 927f992b4dfSWill Deacon } 928f992b4dfSWill Deacon 929ea1e3de8SWill Deacon static int __init parse_kpti(char *str) 930ea1e3de8SWill Deacon { 931ea1e3de8SWill Deacon bool enabled; 932ea1e3de8SWill Deacon int ret = strtobool(str, &enabled); 933ea1e3de8SWill Deacon 934ea1e3de8SWill Deacon if (ret) 935ea1e3de8SWill Deacon return ret; 936ea1e3de8SWill Deacon 937ea1e3de8SWill Deacon __kpti_forced = enabled ? 1 : -1; 938ea1e3de8SWill Deacon return 0; 939ea1e3de8SWill Deacon } 940ea1e3de8SWill Deacon __setup("kpti=", parse_kpti); 941ea1e3de8SWill Deacon #endif /* CONFIG_UNMAP_KERNEL_AT_EL0 */ 942ea1e3de8SWill Deacon 94305abb595SSuzuki K Poulose #ifdef CONFIG_ARM64_HW_AFDBM 94405abb595SSuzuki K Poulose static inline void __cpu_enable_hw_dbm(void) 94505abb595SSuzuki K Poulose { 94605abb595SSuzuki K Poulose u64 tcr = read_sysreg(tcr_el1) | TCR_HD; 94705abb595SSuzuki K Poulose 94805abb595SSuzuki K Poulose write_sysreg(tcr, tcr_el1); 94905abb595SSuzuki K Poulose isb(); 95005abb595SSuzuki K Poulose } 95105abb595SSuzuki K Poulose 952ece1397cSSuzuki K Poulose static bool cpu_has_broken_dbm(void) 953ece1397cSSuzuki K Poulose { 954ece1397cSSuzuki K Poulose /* List of CPUs which have broken DBM support. */ 955ece1397cSSuzuki K Poulose static const struct midr_range cpus[] = { 956ece1397cSSuzuki K Poulose #ifdef CONFIG_ARM64_ERRATUM_1024718 957ece1397cSSuzuki K Poulose MIDR_RANGE(MIDR_CORTEX_A55, 0, 0, 1, 0), // A55 r0p0 -r1p0 958ece1397cSSuzuki K Poulose #endif 959ece1397cSSuzuki K Poulose {}, 960ece1397cSSuzuki K Poulose }; 961ece1397cSSuzuki K Poulose 962ece1397cSSuzuki K Poulose return is_midr_in_range_list(read_cpuid_id(), cpus); 963ece1397cSSuzuki K Poulose } 964ece1397cSSuzuki K Poulose 96505abb595SSuzuki K Poulose static bool cpu_can_use_dbm(const struct arm64_cpu_capabilities *cap) 96605abb595SSuzuki K Poulose { 967ece1397cSSuzuki K Poulose return has_cpuid_feature(cap, SCOPE_LOCAL_CPU) && 968ece1397cSSuzuki K Poulose !cpu_has_broken_dbm(); 96905abb595SSuzuki K Poulose } 97005abb595SSuzuki K Poulose 97105abb595SSuzuki K Poulose static void cpu_enable_hw_dbm(struct arm64_cpu_capabilities const *cap) 97205abb595SSuzuki K Poulose { 97305abb595SSuzuki K Poulose if (cpu_can_use_dbm(cap)) 97405abb595SSuzuki K Poulose __cpu_enable_hw_dbm(); 97505abb595SSuzuki K Poulose } 97605abb595SSuzuki K Poulose 97705abb595SSuzuki K Poulose static bool has_hw_dbm(const struct arm64_cpu_capabilities *cap, 97805abb595SSuzuki K Poulose int __unused) 97905abb595SSuzuki K Poulose { 98005abb595SSuzuki K Poulose static bool detected = false; 98105abb595SSuzuki K Poulose /* 98205abb595SSuzuki K Poulose * DBM is a non-conflicting feature. i.e, the kernel can safely 98305abb595SSuzuki K Poulose * run a mix of CPUs with and without the feature. So, we 98405abb595SSuzuki K Poulose * unconditionally enable the capability to allow any late CPU 98505abb595SSuzuki K Poulose * to use the feature. We only enable the control bits on the 98605abb595SSuzuki K Poulose * CPU, if it actually supports. 98705abb595SSuzuki K Poulose * 98805abb595SSuzuki K Poulose * We have to make sure we print the "feature" detection only 98905abb595SSuzuki K Poulose * when at least one CPU actually uses it. So check if this CPU 99005abb595SSuzuki K Poulose * can actually use it and print the message exactly once. 99105abb595SSuzuki K Poulose * 99205abb595SSuzuki K Poulose * This is safe as all CPUs (including secondary CPUs - due to the 99305abb595SSuzuki K Poulose * LOCAL_CPU scope - and the hotplugged CPUs - via verification) 99405abb595SSuzuki K Poulose * goes through the "matches" check exactly once. Also if a CPU 99505abb595SSuzuki K Poulose * matches the criteria, it is guaranteed that the CPU will turn 99605abb595SSuzuki K Poulose * the DBM on, as the capability is unconditionally enabled. 99705abb595SSuzuki K Poulose */ 99805abb595SSuzuki K Poulose if (!detected && cpu_can_use_dbm(cap)) { 99905abb595SSuzuki K Poulose detected = true; 100005abb595SSuzuki K Poulose pr_info("detected: Hardware dirty bit management\n"); 100105abb595SSuzuki K Poulose } 100205abb595SSuzuki K Poulose 100305abb595SSuzuki K Poulose return true; 100405abb595SSuzuki K Poulose } 100505abb595SSuzuki K Poulose 100605abb595SSuzuki K Poulose #endif 100705abb595SSuzuki K Poulose 100812eb3691SWill Deacon #ifdef CONFIG_ARM64_VHE 100912eb3691SWill Deacon static bool runs_at_el2(const struct arm64_cpu_capabilities *entry, int __unused) 101012eb3691SWill Deacon { 101112eb3691SWill Deacon return is_kernel_in_hyp_mode(); 101212eb3691SWill Deacon } 101312eb3691SWill Deacon 1014c0cda3b8SDave Martin static void cpu_copy_el2regs(const struct arm64_cpu_capabilities *__unused) 10156d99b689SJames Morse { 10166d99b689SJames Morse /* 10176d99b689SJames Morse * Copy register values that aren't redirected by hardware. 10186d99b689SJames Morse * 10196d99b689SJames Morse * Before code patching, we only set tpidr_el1, all CPUs need to copy 10206d99b689SJames Morse * this value to tpidr_el2 before we patch the code. Once we've done 10216d99b689SJames Morse * that, freshly-onlined CPUs will set tpidr_el2, so we don't need to 10226d99b689SJames Morse * do anything here. 10236d99b689SJames Morse */ 10246d99b689SJames Morse if (!alternatives_applied) 10256d99b689SJames Morse write_sysreg(read_sysreg(tpidr_el1), tpidr_el2); 10266d99b689SJames Morse } 102712eb3691SWill Deacon #endif 10286d99b689SJames Morse 1029359b7064SMarc Zyngier static const struct arm64_cpu_capabilities arm64_features[] = { 103094a9e04aSMarc Zyngier { 103194a9e04aSMarc Zyngier .desc = "GIC system register CPU interface", 103294a9e04aSMarc Zyngier .capability = ARM64_HAS_SYSREG_GIC_CPUIF, 10335b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1034963fcd40SMarc Zyngier .matches = has_useable_gicv3_cpuif, 1035da8d02d1SSuzuki K. Poulose .sys_reg = SYS_ID_AA64PFR0_EL1, 1036da8d02d1SSuzuki K. Poulose .field_pos = ID_AA64PFR0_GIC_SHIFT, 1037ff96f7bcSSuzuki K Poulose .sign = FTR_UNSIGNED, 103818ffa046SJames Morse .min_field_value = 1, 103994a9e04aSMarc Zyngier }, 1040338d4f49SJames Morse #ifdef CONFIG_ARM64_PAN 1041338d4f49SJames Morse { 1042338d4f49SJames Morse .desc = "Privileged Access Never", 1043338d4f49SJames Morse .capability = ARM64_HAS_PAN, 10445b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1045da8d02d1SSuzuki K. Poulose .matches = has_cpuid_feature, 1046da8d02d1SSuzuki K. Poulose .sys_reg = SYS_ID_AA64MMFR1_EL1, 1047da8d02d1SSuzuki K. Poulose .field_pos = ID_AA64MMFR1_PAN_SHIFT, 1048ff96f7bcSSuzuki K Poulose .sign = FTR_UNSIGNED, 1049338d4f49SJames Morse .min_field_value = 1, 1050c0cda3b8SDave Martin .cpu_enable = cpu_enable_pan, 1051338d4f49SJames Morse }, 1052338d4f49SJames Morse #endif /* CONFIG_ARM64_PAN */ 10532e94da13SWill Deacon #if defined(CONFIG_AS_LSE) && defined(CONFIG_ARM64_LSE_ATOMICS) 10542e94da13SWill Deacon { 10552e94da13SWill Deacon .desc = "LSE atomic instructions", 10562e94da13SWill Deacon .capability = ARM64_HAS_LSE_ATOMICS, 10575b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1058da8d02d1SSuzuki K. Poulose .matches = has_cpuid_feature, 1059da8d02d1SSuzuki K. Poulose .sys_reg = SYS_ID_AA64ISAR0_EL1, 1060da8d02d1SSuzuki K. Poulose .field_pos = ID_AA64ISAR0_ATOMICS_SHIFT, 1061ff96f7bcSSuzuki K Poulose .sign = FTR_UNSIGNED, 10622e94da13SWill Deacon .min_field_value = 2, 10632e94da13SWill Deacon }, 10642e94da13SWill Deacon #endif /* CONFIG_AS_LSE && CONFIG_ARM64_LSE_ATOMICS */ 1065d88701beSMarc Zyngier { 1066d5370f75SWill Deacon .desc = "Software prefetching using PRFM", 1067d5370f75SWill Deacon .capability = ARM64_HAS_NO_HW_PREFETCH, 10685c137714SSuzuki K Poulose .type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE, 1069d5370f75SWill Deacon .matches = has_no_hw_prefetch, 1070d5370f75SWill Deacon }, 107157f4959bSJames Morse #ifdef CONFIG_ARM64_UAO 107257f4959bSJames Morse { 107357f4959bSJames Morse .desc = "User Access Override", 107457f4959bSJames Morse .capability = ARM64_HAS_UAO, 10755b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 107657f4959bSJames Morse .matches = has_cpuid_feature, 107757f4959bSJames Morse .sys_reg = SYS_ID_AA64MMFR2_EL1, 107857f4959bSJames Morse .field_pos = ID_AA64MMFR2_UAO_SHIFT, 107957f4959bSJames Morse .min_field_value = 1, 1080c8b06e3fSJames Morse /* 1081c8b06e3fSJames Morse * We rely on stop_machine() calling uao_thread_switch() to set 1082c8b06e3fSJames Morse * UAO immediately after patching. 1083c8b06e3fSJames Morse */ 108457f4959bSJames Morse }, 108557f4959bSJames Morse #endif /* CONFIG_ARM64_UAO */ 108670544196SJames Morse #ifdef CONFIG_ARM64_PAN 108770544196SJames Morse { 108870544196SJames Morse .capability = ARM64_ALT_PAN_NOT_UAO, 10895b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 109070544196SJames Morse .matches = cpufeature_pan_not_uao, 109170544196SJames Morse }, 109270544196SJames Morse #endif /* CONFIG_ARM64_PAN */ 1093830dcc9fSSuzuki K Poulose #ifdef CONFIG_ARM64_VHE 1094588ab3f9SLinus Torvalds { 1095d88701beSMarc Zyngier .desc = "Virtualization Host Extensions", 1096d88701beSMarc Zyngier .capability = ARM64_HAS_VIRT_HOST_EXTN, 1097830dcc9fSSuzuki K Poulose .type = ARM64_CPUCAP_STRICT_BOOT_CPU_FEATURE, 1098d88701beSMarc Zyngier .matches = runs_at_el2, 1099c0cda3b8SDave Martin .cpu_enable = cpu_copy_el2regs, 1100d88701beSMarc Zyngier }, 1101830dcc9fSSuzuki K Poulose #endif /* CONFIG_ARM64_VHE */ 1102042446a3SSuzuki K Poulose { 1103042446a3SSuzuki K Poulose .desc = "32-bit EL0 Support", 1104042446a3SSuzuki K Poulose .capability = ARM64_HAS_32BIT_EL0, 11055b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1106042446a3SSuzuki K Poulose .matches = has_cpuid_feature, 1107042446a3SSuzuki K Poulose .sys_reg = SYS_ID_AA64PFR0_EL1, 1108042446a3SSuzuki K Poulose .sign = FTR_UNSIGNED, 1109042446a3SSuzuki K Poulose .field_pos = ID_AA64PFR0_EL0_SHIFT, 1110042446a3SSuzuki K Poulose .min_field_value = ID_AA64PFR0_EL0_32BIT_64BIT, 1111042446a3SSuzuki K Poulose }, 1112ea1e3de8SWill Deacon #ifdef CONFIG_UNMAP_KERNEL_AT_EL0 1113ea1e3de8SWill Deacon { 1114179a56f6SWill Deacon .desc = "Kernel page table isolation (KPTI)", 1115ea1e3de8SWill Deacon .capability = ARM64_UNMAP_KERNEL_AT_EL0, 1116d3aec8a2SSuzuki K Poulose .type = ARM64_CPUCAP_BOOT_RESTRICTED_CPU_LOCAL_FEATURE, 1117d3aec8a2SSuzuki K Poulose /* 1118d3aec8a2SSuzuki K Poulose * The ID feature fields below are used to indicate that 1119d3aec8a2SSuzuki K Poulose * the CPU doesn't need KPTI. See unmap_kernel_at_el0 for 1120d3aec8a2SSuzuki K Poulose * more details. 1121d3aec8a2SSuzuki K Poulose */ 1122d3aec8a2SSuzuki K Poulose .sys_reg = SYS_ID_AA64PFR0_EL1, 1123d3aec8a2SSuzuki K Poulose .field_pos = ID_AA64PFR0_CSV3_SHIFT, 1124d3aec8a2SSuzuki K Poulose .min_field_value = 1, 1125ea1e3de8SWill Deacon .matches = unmap_kernel_at_el0, 1126c0cda3b8SDave Martin .cpu_enable = kpti_install_ng_mappings, 1127ea1e3de8SWill Deacon }, 1128ea1e3de8SWill Deacon #endif 112982e0191aSSuzuki K Poulose { 113082e0191aSSuzuki K Poulose /* FP/SIMD is not implemented */ 113182e0191aSSuzuki K Poulose .capability = ARM64_HAS_NO_FPSIMD, 11325b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 113382e0191aSSuzuki K Poulose .min_field_value = 0, 113482e0191aSSuzuki K Poulose .matches = has_no_fpsimd, 113582e0191aSSuzuki K Poulose }, 1136d50e071fSRobin Murphy #ifdef CONFIG_ARM64_PMEM 1137d50e071fSRobin Murphy { 1138d50e071fSRobin Murphy .desc = "Data cache clean to Point of Persistence", 1139d50e071fSRobin Murphy .capability = ARM64_HAS_DCPOP, 11405b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 1141d50e071fSRobin Murphy .matches = has_cpuid_feature, 1142d50e071fSRobin Murphy .sys_reg = SYS_ID_AA64ISAR1_EL1, 1143d50e071fSRobin Murphy .field_pos = ID_AA64ISAR1_DPB_SHIFT, 1144d50e071fSRobin Murphy .min_field_value = 1, 1145d50e071fSRobin Murphy }, 1146d50e071fSRobin Murphy #endif 114743994d82SDave Martin #ifdef CONFIG_ARM64_SVE 114843994d82SDave Martin { 114943994d82SDave Martin .desc = "Scalable Vector Extension", 11505b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 115143994d82SDave Martin .capability = ARM64_SVE, 115243994d82SDave Martin .sys_reg = SYS_ID_AA64PFR0_EL1, 115343994d82SDave Martin .sign = FTR_UNSIGNED, 115443994d82SDave Martin .field_pos = ID_AA64PFR0_SVE_SHIFT, 115543994d82SDave Martin .min_field_value = ID_AA64PFR0_SVE, 115643994d82SDave Martin .matches = has_cpuid_feature, 1157c0cda3b8SDave Martin .cpu_enable = sve_kernel_enable, 115843994d82SDave Martin }, 115943994d82SDave Martin #endif /* CONFIG_ARM64_SVE */ 116064c02720SXie XiuQi #ifdef CONFIG_ARM64_RAS_EXTN 116164c02720SXie XiuQi { 116264c02720SXie XiuQi .desc = "RAS Extension Support", 116364c02720SXie XiuQi .capability = ARM64_HAS_RAS_EXTN, 11645b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 116564c02720SXie XiuQi .matches = has_cpuid_feature, 116664c02720SXie XiuQi .sys_reg = SYS_ID_AA64PFR0_EL1, 116764c02720SXie XiuQi .sign = FTR_UNSIGNED, 116864c02720SXie XiuQi .field_pos = ID_AA64PFR0_RAS_SHIFT, 116964c02720SXie XiuQi .min_field_value = ID_AA64PFR0_RAS_V1, 1170c0cda3b8SDave Martin .cpu_enable = cpu_clear_disr, 117164c02720SXie XiuQi }, 117264c02720SXie XiuQi #endif /* CONFIG_ARM64_RAS_EXTN */ 11736ae4b6e0SShanker Donthineni { 11746ae4b6e0SShanker Donthineni .desc = "Data cache clean to the PoU not required for I/D coherence", 11756ae4b6e0SShanker Donthineni .capability = ARM64_HAS_CACHE_IDC, 11765b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 11776ae4b6e0SShanker Donthineni .matches = has_cache_idc, 11786ae4b6e0SShanker Donthineni }, 11796ae4b6e0SShanker Donthineni { 11806ae4b6e0SShanker Donthineni .desc = "Instruction cache invalidation not required for I/D coherence", 11816ae4b6e0SShanker Donthineni .capability = ARM64_HAS_CACHE_DIC, 11825b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, 11836ae4b6e0SShanker Donthineni .matches = has_cache_dic, 11846ae4b6e0SShanker Donthineni }, 118505abb595SSuzuki K Poulose #ifdef CONFIG_ARM64_HW_AFDBM 118605abb595SSuzuki K Poulose { 118705abb595SSuzuki K Poulose /* 118805abb595SSuzuki K Poulose * Since we turn this on always, we don't want the user to 118905abb595SSuzuki K Poulose * think that the feature is available when it may not be. 119005abb595SSuzuki K Poulose * So hide the description. 119105abb595SSuzuki K Poulose * 119205abb595SSuzuki K Poulose * .desc = "Hardware pagetable Dirty Bit Management", 119305abb595SSuzuki K Poulose * 119405abb595SSuzuki K Poulose */ 119505abb595SSuzuki K Poulose .type = ARM64_CPUCAP_WEAK_LOCAL_CPU_FEATURE, 119605abb595SSuzuki K Poulose .capability = ARM64_HW_DBM, 119705abb595SSuzuki K Poulose .sys_reg = SYS_ID_AA64MMFR1_EL1, 119805abb595SSuzuki K Poulose .sign = FTR_UNSIGNED, 119905abb595SSuzuki K Poulose .field_pos = ID_AA64MMFR1_HADBS_SHIFT, 120005abb595SSuzuki K Poulose .min_field_value = 2, 120105abb595SSuzuki K Poulose .matches = has_hw_dbm, 120205abb595SSuzuki K Poulose .cpu_enable = cpu_enable_hw_dbm, 120305abb595SSuzuki K Poulose }, 120405abb595SSuzuki K Poulose #endif 1205359b7064SMarc Zyngier {}, 1206359b7064SMarc Zyngier }; 1207359b7064SMarc Zyngier 1208143ba05dSSuzuki K Poulose #define HWCAP_CAP(reg, field, s, min_value, cap_type, cap) \ 120937b01d53SSuzuki K. Poulose { \ 121037b01d53SSuzuki K. Poulose .desc = #cap, \ 12115b4747c5SSuzuki K Poulose .type = ARM64_CPUCAP_SYSTEM_FEATURE, \ 121237b01d53SSuzuki K. Poulose .matches = has_cpuid_feature, \ 121337b01d53SSuzuki K. Poulose .sys_reg = reg, \ 121437b01d53SSuzuki K. Poulose .field_pos = field, \ 1215ff96f7bcSSuzuki K Poulose .sign = s, \ 121637b01d53SSuzuki K. Poulose .min_field_value = min_value, \ 1217143ba05dSSuzuki K Poulose .hwcap_type = cap_type, \ 121837b01d53SSuzuki K. Poulose .hwcap = cap, \ 121937b01d53SSuzuki K. Poulose } 122037b01d53SSuzuki K. Poulose 1221f3efb675SSuzuki K Poulose static const struct arm64_cpu_capabilities arm64_elf_hwcaps[] = { 1222ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_AES_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_PMULL), 1223ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_AES_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_AES), 1224ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA1_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA1), 1225ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA2_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA2), 1226f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA2_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_SHA512), 1227ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_CRC32_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_CRC32), 1228ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_ATOMICS_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_ATOMICS), 1229f92f5ce0SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_RDM_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDRDM), 1230f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SHA3_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SHA3), 1231f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SM3_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SM3), 1232f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_SM4_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_SM4), 1233f5e035f8SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_DP_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDDP), 12343b3b6810SDongjiu Geng HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_FHM_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_ASIMDFHM), 12357206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR0_EL1, ID_AA64ISAR0_TS_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_FLAGM), 1236ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_FP_SHIFT, FTR_SIGNED, 0, CAP_HWCAP, HWCAP_FP), 1237bf500618SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_FP_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_FPHP), 1238ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_ASIMD_SHIFT, FTR_SIGNED, 0, CAP_HWCAP, HWCAP_ASIMD), 1239bf500618SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_ASIMD_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_ASIMDHP), 12407206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_DIT_SHIFT, FTR_SIGNED, 1, CAP_HWCAP, HWCAP_DIT), 12417aac405eSRobin Murphy HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_DPB_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_DCPOP), 1242c8c3798dSSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_JSCVT_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_JSCVT), 1243cb567e79SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_FCMA_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_FCMA), 1244c651aae5SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_LRCPC_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_LRCPC), 12457206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64ISAR1_EL1, ID_AA64ISAR1_LRCPC_SHIFT, FTR_UNSIGNED, 2, CAP_HWCAP, HWCAP_ILRCPC), 12467206dc93SSuzuki K Poulose HWCAP_CAP(SYS_ID_AA64MMFR2_EL1, ID_AA64MMFR2_AT_SHIFT, FTR_UNSIGNED, 1, CAP_HWCAP, HWCAP_USCAT), 124743994d82SDave Martin #ifdef CONFIG_ARM64_SVE 124843994d82SDave Martin HWCAP_CAP(SYS_ID_AA64PFR0_EL1, ID_AA64PFR0_SVE_SHIFT, FTR_UNSIGNED, ID_AA64PFR0_SVE, CAP_HWCAP, HWCAP_SVE), 124943994d82SDave Martin #endif 125075283501SSuzuki K Poulose {}, 125175283501SSuzuki K Poulose }; 125275283501SSuzuki K Poulose 125375283501SSuzuki K Poulose static const struct arm64_cpu_capabilities compat_elf_hwcaps[] = { 125437b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT 1255ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 2, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_PMULL), 1256ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_AES_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_AES), 1257ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_SHA1_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_SHA1), 1258ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_SHA2_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_SHA2), 1259ff96f7bcSSuzuki K Poulose HWCAP_CAP(SYS_ID_ISAR5_EL1, ID_ISAR5_CRC32_SHIFT, FTR_UNSIGNED, 1, CAP_COMPAT_HWCAP2, COMPAT_HWCAP2_CRC32), 126037b01d53SSuzuki K. Poulose #endif 126137b01d53SSuzuki K. Poulose {}, 126237b01d53SSuzuki K. Poulose }; 126337b01d53SSuzuki K. Poulose 1264f3efb675SSuzuki K Poulose static void __init cap_set_elf_hwcap(const struct arm64_cpu_capabilities *cap) 126537b01d53SSuzuki K. Poulose { 126637b01d53SSuzuki K. Poulose switch (cap->hwcap_type) { 126737b01d53SSuzuki K. Poulose case CAP_HWCAP: 126837b01d53SSuzuki K. Poulose elf_hwcap |= cap->hwcap; 126937b01d53SSuzuki K. Poulose break; 127037b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT 127137b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP: 127237b01d53SSuzuki K. Poulose compat_elf_hwcap |= (u32)cap->hwcap; 127337b01d53SSuzuki K. Poulose break; 127437b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP2: 127537b01d53SSuzuki K. Poulose compat_elf_hwcap2 |= (u32)cap->hwcap; 127637b01d53SSuzuki K. Poulose break; 127737b01d53SSuzuki K. Poulose #endif 127837b01d53SSuzuki K. Poulose default: 127937b01d53SSuzuki K. Poulose WARN_ON(1); 128037b01d53SSuzuki K. Poulose break; 128137b01d53SSuzuki K. Poulose } 128237b01d53SSuzuki K. Poulose } 128337b01d53SSuzuki K. Poulose 128437b01d53SSuzuki K. Poulose /* Check if we have a particular HWCAP enabled */ 1285f3efb675SSuzuki K Poulose static bool cpus_have_elf_hwcap(const struct arm64_cpu_capabilities *cap) 128637b01d53SSuzuki K. Poulose { 128737b01d53SSuzuki K. Poulose bool rc; 128837b01d53SSuzuki K. Poulose 128937b01d53SSuzuki K. Poulose switch (cap->hwcap_type) { 129037b01d53SSuzuki K. Poulose case CAP_HWCAP: 129137b01d53SSuzuki K. Poulose rc = (elf_hwcap & cap->hwcap) != 0; 129237b01d53SSuzuki K. Poulose break; 129337b01d53SSuzuki K. Poulose #ifdef CONFIG_COMPAT 129437b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP: 129537b01d53SSuzuki K. Poulose rc = (compat_elf_hwcap & (u32)cap->hwcap) != 0; 129637b01d53SSuzuki K. Poulose break; 129737b01d53SSuzuki K. Poulose case CAP_COMPAT_HWCAP2: 129837b01d53SSuzuki K. Poulose rc = (compat_elf_hwcap2 & (u32)cap->hwcap) != 0; 129937b01d53SSuzuki K. Poulose break; 130037b01d53SSuzuki K. Poulose #endif 130137b01d53SSuzuki K. Poulose default: 130237b01d53SSuzuki K. Poulose WARN_ON(1); 130337b01d53SSuzuki K. Poulose rc = false; 130437b01d53SSuzuki K. Poulose } 130537b01d53SSuzuki K. Poulose 130637b01d53SSuzuki K. Poulose return rc; 130737b01d53SSuzuki K. Poulose } 130837b01d53SSuzuki K. Poulose 130975283501SSuzuki K Poulose static void __init setup_elf_hwcaps(const struct arm64_cpu_capabilities *hwcaps) 131037b01d53SSuzuki K. Poulose { 131177c97b4eSSuzuki K Poulose /* We support emulation of accesses to CPU ID feature registers */ 131277c97b4eSSuzuki K Poulose elf_hwcap |= HWCAP_CPUID; 131375283501SSuzuki K Poulose for (; hwcaps->matches; hwcaps++) 1314143ba05dSSuzuki K Poulose if (hwcaps->matches(hwcaps, cpucap_default_scope(hwcaps))) 131575283501SSuzuki K Poulose cap_set_elf_hwcap(hwcaps); 131637b01d53SSuzuki K. Poulose } 131737b01d53SSuzuki K. Poulose 131867948af4SSuzuki K Poulose /* 131967948af4SSuzuki K Poulose * Check if the current CPU has a given feature capability. 132067948af4SSuzuki K Poulose * Should be called from non-preemptible context. 132167948af4SSuzuki K Poulose */ 132267948af4SSuzuki K Poulose static bool __this_cpu_has_cap(const struct arm64_cpu_capabilities *cap_array, 132367948af4SSuzuki K Poulose unsigned int cap) 132467948af4SSuzuki K Poulose { 132567948af4SSuzuki K Poulose const struct arm64_cpu_capabilities *caps; 132667948af4SSuzuki K Poulose 132767948af4SSuzuki K Poulose if (WARN_ON(preemptible())) 132867948af4SSuzuki K Poulose return false; 132967948af4SSuzuki K Poulose 1330edf298cfSJames Morse for (caps = cap_array; caps->matches; caps++) 1331ba7d9233SSuzuki K Poulose if (caps->capability == cap) 1332ba7d9233SSuzuki K Poulose return caps->matches(caps, SCOPE_LOCAL_CPU); 1333ba7d9233SSuzuki K Poulose 133467948af4SSuzuki K Poulose return false; 133567948af4SSuzuki K Poulose } 133667948af4SSuzuki K Poulose 1337ed478b3fSSuzuki K Poulose static void __update_cpu_capabilities(const struct arm64_cpu_capabilities *caps, 1338cce360b5SSuzuki K Poulose u16 scope_mask, const char *info) 1339359b7064SMarc Zyngier { 1340cce360b5SSuzuki K Poulose scope_mask &= ARM64_CPUCAP_SCOPE_MASK; 134175283501SSuzuki K Poulose for (; caps->matches; caps++) { 1342cce360b5SSuzuki K Poulose if (!(caps->type & scope_mask) || 1343cce360b5SSuzuki K Poulose !caps->matches(caps, cpucap_default_scope(caps))) 1344359b7064SMarc Zyngier continue; 1345359b7064SMarc Zyngier 134675283501SSuzuki K Poulose if (!cpus_have_cap(caps->capability) && caps->desc) 134775283501SSuzuki K Poulose pr_info("%s %s\n", info, caps->desc); 134875283501SSuzuki K Poulose cpus_set_cap(caps->capability); 1349359b7064SMarc Zyngier } 1350359b7064SMarc Zyngier } 1351359b7064SMarc Zyngier 1352ed478b3fSSuzuki K Poulose static void update_cpu_capabilities(u16 scope_mask) 1353ed478b3fSSuzuki K Poulose { 1354ed478b3fSSuzuki K Poulose __update_cpu_capabilities(arm64_features, scope_mask, "detected:"); 1355ed478b3fSSuzuki K Poulose __update_cpu_capabilities(arm64_errata, scope_mask, 1356ed478b3fSSuzuki K Poulose "enabling workaround for"); 1357ed478b3fSSuzuki K Poulose } 1358ed478b3fSSuzuki K Poulose 1359c0cda3b8SDave Martin static int __enable_cpu_capability(void *arg) 1360c0cda3b8SDave Martin { 1361c0cda3b8SDave Martin const struct arm64_cpu_capabilities *cap = arg; 1362c0cda3b8SDave Martin 1363c0cda3b8SDave Martin cap->cpu_enable(cap); 1364c0cda3b8SDave Martin return 0; 1365c0cda3b8SDave Martin } 1366c0cda3b8SDave Martin 1367ce8b602cSSuzuki K. Poulose /* 1368dbb4e152SSuzuki K. Poulose * Run through the enabled capabilities and enable() it on all active 1369dbb4e152SSuzuki K. Poulose * CPUs 1370ce8b602cSSuzuki K. Poulose */ 13711e89baedSSuzuki K Poulose static void __init 1372ed478b3fSSuzuki K Poulose __enable_cpu_capabilities(const struct arm64_cpu_capabilities *caps, 1373cce360b5SSuzuki K Poulose u16 scope_mask) 1374359b7064SMarc Zyngier { 1375cce360b5SSuzuki K Poulose scope_mask &= ARM64_CPUCAP_SCOPE_MASK; 137663a1e1c9SMark Rutland for (; caps->matches; caps++) { 137763a1e1c9SMark Rutland unsigned int num = caps->capability; 137863a1e1c9SMark Rutland 1379cce360b5SSuzuki K Poulose if (!(caps->type & scope_mask) || !cpus_have_cap(num)) 138063a1e1c9SMark Rutland continue; 138163a1e1c9SMark Rutland 138263a1e1c9SMark Rutland /* Ensure cpus_have_const_cap(num) works */ 138363a1e1c9SMark Rutland static_branch_enable(&cpu_hwcap_keys[num]); 138463a1e1c9SMark Rutland 1385c0cda3b8SDave Martin if (caps->cpu_enable) { 13862a6dcb2bSJames Morse /* 1387fd9d63daSSuzuki K Poulose * Capabilities with SCOPE_BOOT_CPU scope are finalised 1388fd9d63daSSuzuki K Poulose * before any secondary CPU boots. Thus, each secondary 1389fd9d63daSSuzuki K Poulose * will enable the capability as appropriate via 1390fd9d63daSSuzuki K Poulose * check_local_cpu_capabilities(). The only exception is 1391fd9d63daSSuzuki K Poulose * the boot CPU, for which the capability must be 1392fd9d63daSSuzuki K Poulose * enabled here. This approach avoids costly 1393fd9d63daSSuzuki K Poulose * stop_machine() calls for this case. 1394fd9d63daSSuzuki K Poulose * 1395fd9d63daSSuzuki K Poulose * Otherwise, use stop_machine() as it schedules the 1396fd9d63daSSuzuki K Poulose * work allowing us to modify PSTATE, instead of 1397fd9d63daSSuzuki K Poulose * on_each_cpu() which uses an IPI, giving us a PSTATE 1398fd9d63daSSuzuki K Poulose * that disappears when we return. 13992a6dcb2bSJames Morse */ 1400fd9d63daSSuzuki K Poulose if (scope_mask & SCOPE_BOOT_CPU) 1401fd9d63daSSuzuki K Poulose caps->cpu_enable(caps); 1402fd9d63daSSuzuki K Poulose else 1403fd9d63daSSuzuki K Poulose stop_machine(__enable_cpu_capability, 1404fd9d63daSSuzuki K Poulose (void *)caps, cpu_online_mask); 1405dbb4e152SSuzuki K. Poulose } 140663a1e1c9SMark Rutland } 140763a1e1c9SMark Rutland } 1408dbb4e152SSuzuki K. Poulose 1409ed478b3fSSuzuki K Poulose static void __init enable_cpu_capabilities(u16 scope_mask) 1410ed478b3fSSuzuki K Poulose { 1411ed478b3fSSuzuki K Poulose __enable_cpu_capabilities(arm64_features, scope_mask); 1412ed478b3fSSuzuki K Poulose __enable_cpu_capabilities(arm64_errata, scope_mask); 1413ed478b3fSSuzuki K Poulose } 1414ed478b3fSSuzuki K Poulose 1415dbb4e152SSuzuki K. Poulose /* 1416eaac4d83SSuzuki K Poulose * Run through the list of capabilities to check for conflicts. 1417eaac4d83SSuzuki K Poulose * If the system has already detected a capability, take necessary 1418eaac4d83SSuzuki K Poulose * action on this CPU. 1419eaac4d83SSuzuki K Poulose * 1420eaac4d83SSuzuki K Poulose * Returns "false" on conflicts. 1421eaac4d83SSuzuki K Poulose */ 1422eaac4d83SSuzuki K Poulose static bool 1423ba7d9233SSuzuki K Poulose __verify_local_cpu_caps(const struct arm64_cpu_capabilities *caps, 1424cce360b5SSuzuki K Poulose u16 scope_mask) 1425eaac4d83SSuzuki K Poulose { 1426eaac4d83SSuzuki K Poulose bool cpu_has_cap, system_has_cap; 1427eaac4d83SSuzuki K Poulose 1428cce360b5SSuzuki K Poulose scope_mask &= ARM64_CPUCAP_SCOPE_MASK; 1429cce360b5SSuzuki K Poulose 1430ba7d9233SSuzuki K Poulose for (; caps->matches; caps++) { 1431cce360b5SSuzuki K Poulose if (!(caps->type & scope_mask)) 1432cce360b5SSuzuki K Poulose continue; 1433cce360b5SSuzuki K Poulose 1434ba7d9233SSuzuki K Poulose cpu_has_cap = caps->matches(caps, SCOPE_LOCAL_CPU); 1435eaac4d83SSuzuki K Poulose system_has_cap = cpus_have_cap(caps->capability); 1436eaac4d83SSuzuki K Poulose 1437eaac4d83SSuzuki K Poulose if (system_has_cap) { 1438eaac4d83SSuzuki K Poulose /* 1439eaac4d83SSuzuki K Poulose * Check if the new CPU misses an advertised feature, 1440eaac4d83SSuzuki K Poulose * which is not safe to miss. 1441eaac4d83SSuzuki K Poulose */ 1442eaac4d83SSuzuki K Poulose if (!cpu_has_cap && !cpucap_late_cpu_optional(caps)) 1443eaac4d83SSuzuki K Poulose break; 1444eaac4d83SSuzuki K Poulose /* 1445eaac4d83SSuzuki K Poulose * We have to issue cpu_enable() irrespective of 1446eaac4d83SSuzuki K Poulose * whether the CPU has it or not, as it is enabeld 1447eaac4d83SSuzuki K Poulose * system wide. It is upto the call back to take 1448eaac4d83SSuzuki K Poulose * appropriate action on this CPU. 1449eaac4d83SSuzuki K Poulose */ 1450eaac4d83SSuzuki K Poulose if (caps->cpu_enable) 1451eaac4d83SSuzuki K Poulose caps->cpu_enable(caps); 1452eaac4d83SSuzuki K Poulose } else { 1453eaac4d83SSuzuki K Poulose /* 1454eaac4d83SSuzuki K Poulose * Check if the CPU has this capability if it isn't 1455eaac4d83SSuzuki K Poulose * safe to have when the system doesn't. 1456eaac4d83SSuzuki K Poulose */ 1457eaac4d83SSuzuki K Poulose if (cpu_has_cap && !cpucap_late_cpu_permitted(caps)) 1458eaac4d83SSuzuki K Poulose break; 1459eaac4d83SSuzuki K Poulose } 1460eaac4d83SSuzuki K Poulose } 1461eaac4d83SSuzuki K Poulose 1462eaac4d83SSuzuki K Poulose if (caps->matches) { 1463eaac4d83SSuzuki K Poulose pr_crit("CPU%d: Detected conflict for capability %d (%s), System: %d, CPU: %d\n", 1464eaac4d83SSuzuki K Poulose smp_processor_id(), caps->capability, 1465eaac4d83SSuzuki K Poulose caps->desc, system_has_cap, cpu_has_cap); 1466eaac4d83SSuzuki K Poulose return false; 1467eaac4d83SSuzuki K Poulose } 1468eaac4d83SSuzuki K Poulose 1469eaac4d83SSuzuki K Poulose return true; 1470eaac4d83SSuzuki K Poulose } 1471eaac4d83SSuzuki K Poulose 1472ed478b3fSSuzuki K Poulose static bool verify_local_cpu_caps(u16 scope_mask) 1473ed478b3fSSuzuki K Poulose { 1474ed478b3fSSuzuki K Poulose return __verify_local_cpu_caps(arm64_errata, scope_mask) && 1475ed478b3fSSuzuki K Poulose __verify_local_cpu_caps(arm64_features, scope_mask); 1476ed478b3fSSuzuki K Poulose } 1477ed478b3fSSuzuki K Poulose 1478eaac4d83SSuzuki K Poulose /* 147913f417f3SSuzuki K Poulose * Check for CPU features that are used in early boot 148013f417f3SSuzuki K Poulose * based on the Boot CPU value. 1481dbb4e152SSuzuki K. Poulose */ 148213f417f3SSuzuki K Poulose static void check_early_cpu_features(void) 1483dbb4e152SSuzuki K. Poulose { 148413f417f3SSuzuki K Poulose verify_cpu_asid_bits(); 1485fd9d63daSSuzuki K Poulose /* 1486fd9d63daSSuzuki K Poulose * Early features are used by the kernel already. If there 1487fd9d63daSSuzuki K Poulose * is a conflict, we cannot proceed further. 1488fd9d63daSSuzuki K Poulose */ 1489fd9d63daSSuzuki K Poulose if (!verify_local_cpu_caps(SCOPE_BOOT_CPU)) 1490fd9d63daSSuzuki K Poulose cpu_panic_kernel(); 1491dbb4e152SSuzuki K. Poulose } 1492dbb4e152SSuzuki K. Poulose 149375283501SSuzuki K Poulose static void 149475283501SSuzuki K Poulose verify_local_elf_hwcaps(const struct arm64_cpu_capabilities *caps) 149575283501SSuzuki K Poulose { 149675283501SSuzuki K Poulose 149792406f0cSSuzuki K Poulose for (; caps->matches; caps++) 149892406f0cSSuzuki K Poulose if (cpus_have_elf_hwcap(caps) && !caps->matches(caps, SCOPE_LOCAL_CPU)) { 149975283501SSuzuki K Poulose pr_crit("CPU%d: missing HWCAP: %s\n", 150075283501SSuzuki K Poulose smp_processor_id(), caps->desc); 150175283501SSuzuki K Poulose cpu_die_early(); 150275283501SSuzuki K Poulose } 150375283501SSuzuki K Poulose } 150475283501SSuzuki K Poulose 15052e0f2478SDave Martin static void verify_sve_features(void) 15062e0f2478SDave Martin { 15072e0f2478SDave Martin u64 safe_zcr = read_sanitised_ftr_reg(SYS_ZCR_EL1); 15082e0f2478SDave Martin u64 zcr = read_zcr_features(); 15092e0f2478SDave Martin 15102e0f2478SDave Martin unsigned int safe_len = safe_zcr & ZCR_ELx_LEN_MASK; 15112e0f2478SDave Martin unsigned int len = zcr & ZCR_ELx_LEN_MASK; 15122e0f2478SDave Martin 15132e0f2478SDave Martin if (len < safe_len || sve_verify_vq_map()) { 15142e0f2478SDave Martin pr_crit("CPU%d: SVE: required vector length(s) missing\n", 15152e0f2478SDave Martin smp_processor_id()); 15162e0f2478SDave Martin cpu_die_early(); 15172e0f2478SDave Martin } 15182e0f2478SDave Martin 15192e0f2478SDave Martin /* Add checks on other ZCR bits here if necessary */ 15202e0f2478SDave Martin } 15212e0f2478SDave Martin 15221e89baedSSuzuki K Poulose 15231e89baedSSuzuki K Poulose /* 1524dbb4e152SSuzuki K. Poulose * Run through the enabled system capabilities and enable() it on this CPU. 1525dbb4e152SSuzuki K. Poulose * The capabilities were decided based on the available CPUs at the boot time. 1526dbb4e152SSuzuki K. Poulose * Any new CPU should match the system wide status of the capability. If the 1527dbb4e152SSuzuki K. Poulose * new CPU doesn't have a capability which the system now has enabled, we 1528dbb4e152SSuzuki K. Poulose * cannot do anything to fix it up and could cause unexpected failures. So 1529dbb4e152SSuzuki K. Poulose * we park the CPU. 1530dbb4e152SSuzuki K. Poulose */ 1531c47a1900SSuzuki K Poulose static void verify_local_cpu_capabilities(void) 1532dbb4e152SSuzuki K. Poulose { 1533fd9d63daSSuzuki K Poulose /* 1534fd9d63daSSuzuki K Poulose * The capabilities with SCOPE_BOOT_CPU are checked from 1535fd9d63daSSuzuki K Poulose * check_early_cpu_features(), as they need to be verified 1536fd9d63daSSuzuki K Poulose * on all secondary CPUs. 1537fd9d63daSSuzuki K Poulose */ 1538fd9d63daSSuzuki K Poulose if (!verify_local_cpu_caps(SCOPE_ALL & ~SCOPE_BOOT_CPU)) 1539600b9c91SSuzuki K Poulose cpu_die_early(); 1540ed478b3fSSuzuki K Poulose 154175283501SSuzuki K Poulose verify_local_elf_hwcaps(arm64_elf_hwcaps); 15422e0f2478SDave Martin 1543643d703dSSuzuki K Poulose if (system_supports_32bit_el0()) 154475283501SSuzuki K Poulose verify_local_elf_hwcaps(compat_elf_hwcaps); 15452e0f2478SDave Martin 15462e0f2478SDave Martin if (system_supports_sve()) 15472e0f2478SDave Martin verify_sve_features(); 1548dbb4e152SSuzuki K. Poulose } 1549dbb4e152SSuzuki K. Poulose 1550c47a1900SSuzuki K Poulose void check_local_cpu_capabilities(void) 1551c47a1900SSuzuki K Poulose { 1552c47a1900SSuzuki K Poulose /* 1553c47a1900SSuzuki K Poulose * All secondary CPUs should conform to the early CPU features 1554c47a1900SSuzuki K Poulose * in use by the kernel based on boot CPU. 1555c47a1900SSuzuki K Poulose */ 1556c47a1900SSuzuki K Poulose check_early_cpu_features(); 1557c47a1900SSuzuki K Poulose 1558c47a1900SSuzuki K Poulose /* 1559c47a1900SSuzuki K Poulose * If we haven't finalised the system capabilities, this CPU gets 1560fbd890b9SSuzuki K Poulose * a chance to update the errata work arounds and local features. 1561c47a1900SSuzuki K Poulose * Otherwise, this CPU should verify that it has all the system 1562c47a1900SSuzuki K Poulose * advertised capabilities. 1563c47a1900SSuzuki K Poulose */ 1564ed478b3fSSuzuki K Poulose if (!sys_caps_initialised) 1565ed478b3fSSuzuki K Poulose update_cpu_capabilities(SCOPE_LOCAL_CPU); 1566ed478b3fSSuzuki K Poulose else 1567c47a1900SSuzuki K Poulose verify_local_cpu_capabilities(); 1568c47a1900SSuzuki K Poulose } 1569c47a1900SSuzuki K Poulose 1570fd9d63daSSuzuki K Poulose static void __init setup_boot_cpu_capabilities(void) 1571fd9d63daSSuzuki K Poulose { 1572fd9d63daSSuzuki K Poulose /* Detect capabilities with either SCOPE_BOOT_CPU or SCOPE_LOCAL_CPU */ 1573fd9d63daSSuzuki K Poulose update_cpu_capabilities(SCOPE_BOOT_CPU | SCOPE_LOCAL_CPU); 1574fd9d63daSSuzuki K Poulose /* Enable the SCOPE_BOOT_CPU capabilities alone right away */ 1575fd9d63daSSuzuki K Poulose enable_cpu_capabilities(SCOPE_BOOT_CPU); 1576fd9d63daSSuzuki K Poulose } 1577fd9d63daSSuzuki K Poulose 157863a1e1c9SMark Rutland DEFINE_STATIC_KEY_FALSE(arm64_const_caps_ready); 157963a1e1c9SMark Rutland EXPORT_SYMBOL(arm64_const_caps_ready); 158063a1e1c9SMark Rutland 158163a1e1c9SMark Rutland static void __init mark_const_caps_ready(void) 158263a1e1c9SMark Rutland { 158363a1e1c9SMark Rutland static_branch_enable(&arm64_const_caps_ready); 158463a1e1c9SMark Rutland } 158563a1e1c9SMark Rutland 15868f413758SMarc Zyngier extern const struct arm64_cpu_capabilities arm64_errata[]; 15878f413758SMarc Zyngier 15888f413758SMarc Zyngier bool this_cpu_has_cap(unsigned int cap) 15898f413758SMarc Zyngier { 15908f413758SMarc Zyngier return (__this_cpu_has_cap(arm64_features, cap) || 15918f413758SMarc Zyngier __this_cpu_has_cap(arm64_errata, cap)); 15928f413758SMarc Zyngier } 15938f413758SMarc Zyngier 1594ed478b3fSSuzuki K Poulose static void __init setup_system_capabilities(void) 1595ed478b3fSSuzuki K Poulose { 1596ed478b3fSSuzuki K Poulose /* 1597ed478b3fSSuzuki K Poulose * We have finalised the system-wide safe feature 1598ed478b3fSSuzuki K Poulose * registers, finalise the capabilities that depend 1599fd9d63daSSuzuki K Poulose * on it. Also enable all the available capabilities, 1600fd9d63daSSuzuki K Poulose * that are not enabled already. 1601ed478b3fSSuzuki K Poulose */ 1602ed478b3fSSuzuki K Poulose update_cpu_capabilities(SCOPE_SYSTEM); 1603fd9d63daSSuzuki K Poulose enable_cpu_capabilities(SCOPE_ALL & ~SCOPE_BOOT_CPU); 1604ed478b3fSSuzuki K Poulose } 1605ed478b3fSSuzuki K Poulose 16069cdf8ec4SSuzuki K. Poulose void __init setup_cpu_features(void) 16079cdf8ec4SSuzuki K. Poulose { 16089cdf8ec4SSuzuki K. Poulose u32 cwg; 16093f251cf0SWill Deacon int cls; 16109cdf8ec4SSuzuki K. Poulose 1611ed478b3fSSuzuki K Poulose setup_system_capabilities(); 161263a1e1c9SMark Rutland mark_const_caps_ready(); 161375283501SSuzuki K Poulose setup_elf_hwcaps(arm64_elf_hwcaps); 1614643d703dSSuzuki K Poulose 1615643d703dSSuzuki K Poulose if (system_supports_32bit_el0()) 161675283501SSuzuki K Poulose setup_elf_hwcaps(compat_elf_hwcaps); 1617dbb4e152SSuzuki K. Poulose 16182e6f549fSKees Cook if (system_uses_ttbr0_pan()) 16192e6f549fSKees Cook pr_info("emulated: Privileged Access Never (PAN) using TTBR0_EL1 switching\n"); 16202e6f549fSKees Cook 16212e0f2478SDave Martin sve_setup(); 16222e0f2478SDave Martin 1623dbb4e152SSuzuki K. Poulose /* Advertise that we have computed the system capabilities */ 1624dbb4e152SSuzuki K. Poulose set_sys_caps_initialised(); 1625dbb4e152SSuzuki K. Poulose 16269cdf8ec4SSuzuki K. Poulose /* 16279cdf8ec4SSuzuki K. Poulose * Check for sane CTR_EL0.CWG value. 16289cdf8ec4SSuzuki K. Poulose */ 16299cdf8ec4SSuzuki K. Poulose cwg = cache_type_cwg(); 16303f251cf0SWill Deacon cls = cache_line_size(); 16319cdf8ec4SSuzuki K. Poulose if (!cwg) 16323f251cf0SWill Deacon pr_warn("No Cache Writeback Granule information, assuming cache line size %d\n", 16333f251cf0SWill Deacon cls); 16343f251cf0SWill Deacon if (L1_CACHE_BYTES < cls) 16353f251cf0SWill Deacon pr_warn("L1_CACHE_BYTES smaller than the Cache Writeback Granule (%d < %d)\n", 16363f251cf0SWill Deacon L1_CACHE_BYTES, cls); 1637359b7064SMarc Zyngier } 163870544196SJames Morse 163970544196SJames Morse static bool __maybe_unused 164092406f0cSSuzuki K Poulose cpufeature_pan_not_uao(const struct arm64_cpu_capabilities *entry, int __unused) 164170544196SJames Morse { 1642a4023f68SSuzuki K Poulose return (cpus_have_const_cap(ARM64_HAS_PAN) && !cpus_have_const_cap(ARM64_HAS_UAO)); 164370544196SJames Morse } 164477c97b4eSSuzuki K Poulose 164577c97b4eSSuzuki K Poulose /* 164677c97b4eSSuzuki K Poulose * We emulate only the following system register space. 164777c97b4eSSuzuki K Poulose * Op0 = 0x3, CRn = 0x0, Op1 = 0x0, CRm = [0, 4 - 7] 164877c97b4eSSuzuki K Poulose * See Table C5-6 System instruction encodings for System register accesses, 164977c97b4eSSuzuki K Poulose * ARMv8 ARM(ARM DDI 0487A.f) for more details. 165077c97b4eSSuzuki K Poulose */ 165177c97b4eSSuzuki K Poulose static inline bool __attribute_const__ is_emulated(u32 id) 165277c97b4eSSuzuki K Poulose { 165377c97b4eSSuzuki K Poulose return (sys_reg_Op0(id) == 0x3 && 165477c97b4eSSuzuki K Poulose sys_reg_CRn(id) == 0x0 && 165577c97b4eSSuzuki K Poulose sys_reg_Op1(id) == 0x0 && 165677c97b4eSSuzuki K Poulose (sys_reg_CRm(id) == 0 || 165777c97b4eSSuzuki K Poulose ((sys_reg_CRm(id) >= 4) && (sys_reg_CRm(id) <= 7)))); 165877c97b4eSSuzuki K Poulose } 165977c97b4eSSuzuki K Poulose 166077c97b4eSSuzuki K Poulose /* 166177c97b4eSSuzuki K Poulose * With CRm == 0, reg should be one of : 166277c97b4eSSuzuki K Poulose * MIDR_EL1, MPIDR_EL1 or REVIDR_EL1. 166377c97b4eSSuzuki K Poulose */ 166477c97b4eSSuzuki K Poulose static inline int emulate_id_reg(u32 id, u64 *valp) 166577c97b4eSSuzuki K Poulose { 166677c97b4eSSuzuki K Poulose switch (id) { 166777c97b4eSSuzuki K Poulose case SYS_MIDR_EL1: 166877c97b4eSSuzuki K Poulose *valp = read_cpuid_id(); 166977c97b4eSSuzuki K Poulose break; 167077c97b4eSSuzuki K Poulose case SYS_MPIDR_EL1: 167177c97b4eSSuzuki K Poulose *valp = SYS_MPIDR_SAFE_VAL; 167277c97b4eSSuzuki K Poulose break; 167377c97b4eSSuzuki K Poulose case SYS_REVIDR_EL1: 167477c97b4eSSuzuki K Poulose /* IMPLEMENTATION DEFINED values are emulated with 0 */ 167577c97b4eSSuzuki K Poulose *valp = 0; 167677c97b4eSSuzuki K Poulose break; 167777c97b4eSSuzuki K Poulose default: 167877c97b4eSSuzuki K Poulose return -EINVAL; 167977c97b4eSSuzuki K Poulose } 168077c97b4eSSuzuki K Poulose 168177c97b4eSSuzuki K Poulose return 0; 168277c97b4eSSuzuki K Poulose } 168377c97b4eSSuzuki K Poulose 168477c97b4eSSuzuki K Poulose static int emulate_sys_reg(u32 id, u64 *valp) 168577c97b4eSSuzuki K Poulose { 168677c97b4eSSuzuki K Poulose struct arm64_ftr_reg *regp; 168777c97b4eSSuzuki K Poulose 168877c97b4eSSuzuki K Poulose if (!is_emulated(id)) 168977c97b4eSSuzuki K Poulose return -EINVAL; 169077c97b4eSSuzuki K Poulose 169177c97b4eSSuzuki K Poulose if (sys_reg_CRm(id) == 0) 169277c97b4eSSuzuki K Poulose return emulate_id_reg(id, valp); 169377c97b4eSSuzuki K Poulose 169477c97b4eSSuzuki K Poulose regp = get_arm64_ftr_reg(id); 169577c97b4eSSuzuki K Poulose if (regp) 169677c97b4eSSuzuki K Poulose *valp = arm64_ftr_reg_user_value(regp); 169777c97b4eSSuzuki K Poulose else 169877c97b4eSSuzuki K Poulose /* 169977c97b4eSSuzuki K Poulose * The untracked registers are either IMPLEMENTATION DEFINED 170077c97b4eSSuzuki K Poulose * (e.g, ID_AFR0_EL1) or reserved RAZ. 170177c97b4eSSuzuki K Poulose */ 170277c97b4eSSuzuki K Poulose *valp = 0; 170377c97b4eSSuzuki K Poulose return 0; 170477c97b4eSSuzuki K Poulose } 170577c97b4eSSuzuki K Poulose 170677c97b4eSSuzuki K Poulose static int emulate_mrs(struct pt_regs *regs, u32 insn) 170777c97b4eSSuzuki K Poulose { 170877c97b4eSSuzuki K Poulose int rc; 170977c97b4eSSuzuki K Poulose u32 sys_reg, dst; 171077c97b4eSSuzuki K Poulose u64 val; 171177c97b4eSSuzuki K Poulose 171277c97b4eSSuzuki K Poulose /* 171377c97b4eSSuzuki K Poulose * sys_reg values are defined as used in mrs/msr instruction. 171477c97b4eSSuzuki K Poulose * shift the imm value to get the encoding. 171577c97b4eSSuzuki K Poulose */ 171677c97b4eSSuzuki K Poulose sys_reg = (u32)aarch64_insn_decode_immediate(AARCH64_INSN_IMM_16, insn) << 5; 171777c97b4eSSuzuki K Poulose rc = emulate_sys_reg(sys_reg, &val); 171877c97b4eSSuzuki K Poulose if (!rc) { 171977c97b4eSSuzuki K Poulose dst = aarch64_insn_decode_register(AARCH64_INSN_REGTYPE_RT, insn); 1720521c6461SMark Rutland pt_regs_write_reg(regs, dst, val); 17216436beeeSJulien Thierry arm64_skip_faulting_instruction(regs, AARCH64_INSN_SIZE); 172277c97b4eSSuzuki K Poulose } 172377c97b4eSSuzuki K Poulose 172477c97b4eSSuzuki K Poulose return rc; 172577c97b4eSSuzuki K Poulose } 172677c97b4eSSuzuki K Poulose 172777c97b4eSSuzuki K Poulose static struct undef_hook mrs_hook = { 172877c97b4eSSuzuki K Poulose .instr_mask = 0xfff00000, 172977c97b4eSSuzuki K Poulose .instr_val = 0xd5300000, 173077c97b4eSSuzuki K Poulose .pstate_mask = COMPAT_PSR_MODE_MASK, 173177c97b4eSSuzuki K Poulose .pstate_val = PSR_MODE_EL0t, 173277c97b4eSSuzuki K Poulose .fn = emulate_mrs, 173377c97b4eSSuzuki K Poulose }; 173477c97b4eSSuzuki K Poulose 173577c97b4eSSuzuki K Poulose static int __init enable_mrs_emulation(void) 173677c97b4eSSuzuki K Poulose { 173777c97b4eSSuzuki K Poulose register_undef_hook(&mrs_hook); 173877c97b4eSSuzuki K Poulose return 0; 173977c97b4eSSuzuki K Poulose } 174077c97b4eSSuzuki K Poulose 1741c0d8832eSSuzuki K Poulose core_initcall(enable_mrs_emulation); 174268ddbf09SJames Morse 1743c0cda3b8SDave Martin void cpu_clear_disr(const struct arm64_cpu_capabilities *__unused) 174468ddbf09SJames Morse { 174568ddbf09SJames Morse /* Firmware may have left a deferred SError in this register. */ 174668ddbf09SJames Morse write_sysreg_s(0, SYS_DISR_EL1); 174768ddbf09SJames Morse } 1748