• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2022-2024, Arm Limited and Contributors. All rights reserved.
3  *
4  * SPDX-License-Identifier: BSD-3-Clause
5  */
6 
7 #include <arch_features.h>
8 #include <common/debug.h>
9 #include <common/feat_detect.h>
10 
11 static bool tainted;
12 
13 /*******************************************************************************
14  * This section lists the wrapper modules for each feature to evaluate the
15  * feature states (FEAT_STATE_ALWAYS and FEAT_STATE_CHECK) and perform
16  * necessary action as below:
17  *
18  * It verifies whether the FEAT_XXX (eg: FEAT_SB) is supported by the PE or not.
19  * Without this check an exception would occur during context save/restore
20  * routines, if the feature is enabled but not supported by PE.
21  ******************************************************************************/
22 
23 #define feat_detect_panic(a, b)		((a) ? (void)0 : feature_panic(b))
24 
25 /*******************************************************************************
26  * Function : feature_panic
27  * Customised panic function with error logging mechanism to list the feature
28  * not supported by the PE.
29  ******************************************************************************/
feature_panic(char * feat_name)30 static inline void feature_panic(char *feat_name)
31 {
32 	ERROR("FEAT_%s not supported by the PE\n", feat_name);
33 	panic();
34 }
35 
36 /*******************************************************************************
37  * Function : check_feature
38  * Check for a valid combination of build time flags (ENABLE_FEAT_xxx) and
39  * feature availability on the hardware. <min> is the smallest feature
40  * ID field value that is required for that feature.
41  * Triggers a panic later if a feature is forcefully enabled, but not
42  * available on the PE. Also will panic if the hardware feature ID field
43  * is larger than the maximum known and supported number, specified by <max>.
44  *
45  * We force inlining here to let the compiler optimise away the whole check
46  * if the feature is disabled at build time (FEAT_STATE_DISABLED).
47  ******************************************************************************/
48 static inline void __attribute((__always_inline__))
check_feature(int state,unsigned long field,const char * feat_name,unsigned int min,unsigned int max)49 check_feature(int state, unsigned long field, const char *feat_name,
50 	      unsigned int min, unsigned int max)
51 {
52 	if (state == FEAT_STATE_ALWAYS && field < min) {
53 		ERROR("FEAT_%s not supported by the PE\n", feat_name);
54 		tainted = true;
55 	}
56 	if (state >= FEAT_STATE_ALWAYS && field > max) {
57 		ERROR("FEAT_%s is version %ld, but is only known up to version %d\n",
58 		      feat_name, field, max);
59 		tainted = true;
60 	}
61 }
62 
63 /************************************************
64  * Feature : FEAT_PAUTH (Pointer Authentication)
65  ***********************************************/
read_feat_pauth(void)66 static void read_feat_pauth(void)
67 {
68 #if (ENABLE_PAUTH == FEAT_STATE_ALWAYS) || (CTX_INCLUDE_PAUTH_REGS == FEAT_STATE_ALWAYS)
69 	feat_detect_panic(is_armv8_3_pauth_present(), "PAUTH");
70 #endif
71 }
72 
read_feat_rng_trap_id_field(void)73 static unsigned int read_feat_rng_trap_id_field(void)
74 {
75 	return ISOLATE_FIELD(read_id_aa64pfr1_el1(), ID_AA64PFR1_EL1_RNDR_TRAP_SHIFT,
76 			     ID_AA64PFR1_EL1_RNDR_TRAP_MASK);
77 }
78 
read_feat_bti_id_field(void)79 static unsigned int read_feat_bti_id_field(void)
80 {
81 	return ISOLATE_FIELD(read_id_aa64pfr1_el1(), ID_AA64PFR1_EL1_BT_SHIFT,
82 			     ID_AA64PFR1_EL1_BT_MASK);
83 }
84 
read_feat_sb_id_field(void)85 static unsigned int read_feat_sb_id_field(void)
86 {
87 	return ISOLATE_FIELD(read_id_aa64isar1_el1(), ID_AA64ISAR1_SB_SHIFT,
88 			     ID_AA64ISAR1_SB_MASK);
89 }
90 
read_feat_csv2_id_field(void)91 static unsigned int read_feat_csv2_id_field(void)
92 {
93 	return ISOLATE_FIELD(read_id_aa64pfr0_el1(), ID_AA64PFR0_CSV2_SHIFT,
94 			     ID_AA64PFR0_CSV2_MASK);
95 }
96 
read_feat_debugv8p9_id_field(void)97 static unsigned int read_feat_debugv8p9_id_field(void)
98 {
99 	return ISOLATE_FIELD(read_id_aa64dfr0_el1(), ID_AA64DFR0_DEBUGVER_SHIFT,
100 			     ID_AA64DFR0_DEBUGVER_MASK);
101 }
102 
read_feat_pmuv3_id_field(void)103 static unsigned int read_feat_pmuv3_id_field(void)
104 {
105 	return ISOLATE_FIELD(read_id_aa64dfr0_el1(), ID_AA64DFR0_PMUVER_SHIFT,
106 			     ID_AA64DFR0_PMUVER_MASK);
107 }
108 
read_feat_vhe_id_field(void)109 static unsigned int read_feat_vhe_id_field(void)
110 {
111 	return ISOLATE_FIELD(read_id_aa64mmfr1_el1(), ID_AA64MMFR1_EL1_VHE_SHIFT,
112 			     ID_AA64MMFR1_EL1_VHE_MASK);
113 }
114 
read_feat_sve_id_field(void)115 static unsigned int read_feat_sve_id_field(void)
116 {
117 	return ISOLATE_FIELD(read_id_aa64pfr0_el1(), ID_AA64PFR0_SVE_SHIFT,
118 			     ID_AA64PFR0_SVE_MASK);
119 }
120 
read_feat_ras_id_field(void)121 static unsigned int read_feat_ras_id_field(void)
122 {
123 	return ISOLATE_FIELD(read_id_aa64pfr0_el1(), ID_AA64PFR0_RAS_SHIFT,
124 			     ID_AA64PFR0_RAS_MASK);
125 }
126 
read_feat_dit_id_field(void)127 static unsigned int read_feat_dit_id_field(void)
128 {
129 	return ISOLATE_FIELD(read_id_aa64pfr0_el1(), ID_AA64PFR0_DIT_SHIFT,
130 			     ID_AA64PFR0_DIT_MASK);
131 }
132 
read_feat_amu_id_field(void)133 static unsigned int  read_feat_amu_id_field(void)
134 {
135 	return ISOLATE_FIELD(read_id_aa64pfr0_el1(), ID_AA64PFR0_AMU_SHIFT,
136 			     ID_AA64PFR0_AMU_MASK);
137 }
138 
read_feat_mpam_version(void)139 static unsigned int read_feat_mpam_version(void)
140 {
141 	return (unsigned int)((((read_id_aa64pfr0_el1() >>
142 		ID_AA64PFR0_MPAM_SHIFT) & ID_AA64PFR0_MPAM_MASK) << 4) |
143 			((read_id_aa64pfr1_el1() >>
144 		ID_AA64PFR1_MPAM_FRAC_SHIFT) & ID_AA64PFR1_MPAM_FRAC_MASK));
145 }
146 
read_feat_nv_id_field(void)147 static unsigned int read_feat_nv_id_field(void)
148 {
149 	return ISOLATE_FIELD(read_id_aa64mmfr2_el1(), ID_AA64MMFR2_EL1_NV_SHIFT,
150 			     ID_AA64MMFR2_EL1_NV_MASK);
151 }
152 
read_feat_sel2_id_field(void)153 static unsigned int read_feat_sel2_id_field(void)
154 {
155 	return ISOLATE_FIELD(read_id_aa64pfr0_el1(), ID_AA64PFR0_SEL2_SHIFT,
156 			     ID_AA64PFR0_SEL2_MASK);
157 }
158 
read_feat_trf_id_field(void)159 static unsigned int read_feat_trf_id_field(void)
160 {
161 	return ISOLATE_FIELD(read_id_aa64dfr0_el1(), ID_AA64DFR0_TRACEFILT_SHIFT,
162 			     ID_AA64DFR0_TRACEFILT_MASK);
163 }
get_armv8_5_mte_support(void)164 static unsigned int get_armv8_5_mte_support(void)
165 {
166 	return ISOLATE_FIELD(read_id_aa64pfr1_el1(), ID_AA64PFR1_EL1_MTE_SHIFT,
167 			     ID_AA64PFR1_EL1_MTE_MASK);
168 }
read_feat_rng_id_field(void)169 static unsigned int read_feat_rng_id_field(void)
170 {
171 	return ISOLATE_FIELD(read_id_aa64isar0_el1(), ID_AA64ISAR0_RNDR_SHIFT,
172 			     ID_AA64ISAR0_RNDR_MASK);
173 }
read_feat_fgt_id_field(void)174 static unsigned int read_feat_fgt_id_field(void)
175 {
176 	return ISOLATE_FIELD(read_id_aa64mmfr0_el1(), ID_AA64MMFR0_EL1_FGT_SHIFT,
177 			     ID_AA64MMFR0_EL1_FGT_MASK);
178 }
read_feat_ecv_id_field(void)179 static unsigned int read_feat_ecv_id_field(void)
180 {
181 	return ISOLATE_FIELD(read_id_aa64mmfr0_el1(), ID_AA64MMFR0_EL1_ECV_SHIFT,
182 			     ID_AA64MMFR0_EL1_ECV_MASK);
183 }
read_feat_twed_id_field(void)184 static unsigned int read_feat_twed_id_field(void)
185 {
186 	return ISOLATE_FIELD(read_id_aa64mmfr1_el1(), ID_AA64MMFR1_EL1_TWED_SHIFT,
187 			     ID_AA64MMFR1_EL1_TWED_MASK);
188 }
189 
read_feat_hcx_id_field(void)190 static unsigned int read_feat_hcx_id_field(void)
191 {
192 	return ISOLATE_FIELD(read_id_aa64mmfr1_el1(), ID_AA64MMFR1_EL1_HCX_SHIFT,
193 			     ID_AA64MMFR1_EL1_HCX_MASK);
194 }
read_feat_ls64_id_field(void)195 static unsigned int read_feat_ls64_id_field(void)
196 {
197 	return ISOLATE_FIELD(read_id_aa64isar1_el1(), ID_AA64ISAR1_LS64_SHIFT,
198 			     ID_AA64ISAR1_LS64_MASK);
199 }
read_feat_tcr2_id_field(void)200 static unsigned int read_feat_tcr2_id_field(void)
201 {
202 	return ISOLATE_FIELD(read_id_aa64mmfr3_el1(), ID_AA64MMFR3_EL1_TCRX_SHIFT,
203 			     ID_AA64MMFR3_EL1_TCRX_MASK);
204 }
read_feat_s2pie_id_field(void)205 static unsigned int read_feat_s2pie_id_field(void)
206 {
207 	return ISOLATE_FIELD(read_id_aa64mmfr3_el1(), ID_AA64MMFR3_EL1_S2PIE_SHIFT,
208 			     ID_AA64MMFR3_EL1_S2PIE_MASK);
209 }
read_feat_s1pie_id_field(void)210 static unsigned int read_feat_s1pie_id_field(void)
211 {
212 	return ISOLATE_FIELD(read_id_aa64mmfr3_el1(), ID_AA64MMFR3_EL1_S1PIE_SHIFT,
213 			     ID_AA64MMFR3_EL1_S1PIE_MASK);
214 }
read_feat_s2poe_id_field(void)215 static unsigned int read_feat_s2poe_id_field(void)
216 {
217 	return ISOLATE_FIELD(read_id_aa64mmfr3_el1(), ID_AA64MMFR3_EL1_S2POE_SHIFT,
218 			     ID_AA64MMFR3_EL1_S2POE_MASK);
219 }
read_feat_s1poe_id_field(void)220 static unsigned int read_feat_s1poe_id_field(void)
221 {
222 	return ISOLATE_FIELD(read_id_aa64mmfr3_el1(), ID_AA64MMFR3_EL1_S1POE_SHIFT,
223 			     ID_AA64MMFR3_EL1_S1POE_MASK);
224 }
read_feat_brbe_id_field(void)225 static unsigned int read_feat_brbe_id_field(void)
226 {
227 	return ISOLATE_FIELD(read_id_aa64dfr0_el1(), ID_AA64DFR0_BRBE_SHIFT,
228 			     ID_AA64DFR0_BRBE_MASK);
229 }
read_feat_trbe_id_field(void)230 static unsigned int read_feat_trbe_id_field(void)
231 {
232 	return ISOLATE_FIELD(read_id_aa64dfr0_el1(), ID_AA64DFR0_TRACEBUFFER_SHIFT,
233 			     ID_AA64DFR0_TRACEBUFFER_MASK);
234 }
read_feat_sme_id_field(void)235 static unsigned int read_feat_sme_id_field(void)
236 {
237 	return ISOLATE_FIELD(read_id_aa64pfr1_el1(), ID_AA64PFR1_EL1_SME_SHIFT,
238 			     ID_AA64PFR1_EL1_SME_MASK);
239 }
read_feat_gcs_id_field(void)240 static unsigned int read_feat_gcs_id_field(void)
241 {
242 	return ISOLATE_FIELD(read_id_aa64pfr1_el1(), ID_AA64PFR1_EL1_GCS_SHIFT,
243 			     ID_AA64PFR1_EL1_GCS_MASK);
244 }
245 
read_feat_rme_id_field(void)246 static unsigned int read_feat_rme_id_field(void)
247 {
248 	return ISOLATE_FIELD(read_id_aa64pfr0_el1(), ID_AA64PFR0_FEAT_RME_SHIFT,
249 			     ID_AA64PFR0_FEAT_RME_MASK);
250 }
251 
read_feat_pan_id_field(void)252 static unsigned int read_feat_pan_id_field(void)
253 {
254 	return ISOLATE_FIELD(read_id_aa64mmfr1_el1(), ID_AA64MMFR1_EL1_PAN_SHIFT,
255 			     ID_AA64MMFR1_EL1_PAN_MASK);
256 }
257 
read_feat_mtpmu_id_field(void)258 static unsigned int read_feat_mtpmu_id_field(void)
259 {
260 	return ISOLATE_FIELD(read_id_aa64dfr0_el1(), ID_AA64DFR0_MTPMU_SHIFT,
261 			     ID_AA64DFR0_MTPMU_MASK);
262 
263 }
264 
read_feat_the_id_field(void)265 static unsigned int read_feat_the_id_field(void)
266 {
267 	return ISOLATE_FIELD(read_id_aa64pfr1_el1(), ID_AA64PFR1_EL1_THE_SHIFT,
268 			     ID_AA64PFR1_EL1_THE_MASK);
269 }
270 
read_feat_sctlr2_id_field(void)271 static unsigned int read_feat_sctlr2_id_field(void)
272 {
273 	return ISOLATE_FIELD(read_id_aa64mmfr3_el1(), ID_AA64MMFR3_EL1_SCTLR2_SHIFT,
274 			     ID_AA64MMFR3_EL1_SCTLR2_MASK);
275 }
276 
read_feat_d128_id_field(void)277 static unsigned int read_feat_d128_id_field(void)
278 {
279 	return ISOLATE_FIELD(read_id_aa64mmfr3_el1(), ID_AA64MMFR3_EL1_D128_SHIFT,
280 			     ID_AA64MMFR3_EL1_D128_MASK);
281 }
282 
283 /***********************************************************************************
284  * TF-A supports many Arm architectural features starting from arch version
285  * (8.0 till 8.7+). These features are mostly enabled through build flags. This
286  * mechanism helps in validating these build flags in the early boot phase
287  * either in BL1 or BL31 depending on the platform and assists in identifying
288  * and notifying the features which are enabled but not supported by the PE.
289  *
290  * It reads all the enabled features ID-registers and ensures the features
291  * are supported by the PE.
292  * In case if they aren't it stops booting at an early phase and logs the error
293  * messages, notifying the platforms about the features that are not supported.
294  *
295  * Further the procedure is implemented with a tri-state approach for each feature:
296  * ENABLE_FEAT_xxx = 0 : The feature is disabled statically at compile time
297  * ENABLE_FEAT_xxx = 1 : The feature is enabled and must be present in hardware.
298  *                       There will be panic if feature is not present at cold boot.
299  * ENABLE_FEAT_xxx = 2 : The feature is enabled but dynamically enabled at runtime
300  *                       depending on hardware capability.
301  *
302  * For better readability, state values are defined with macros, namely:
303  * { FEAT_STATE_DISABLED, FEAT_STATE_ALWAYS, FEAT_STATE_CHECK }, taking values
304  * { 0, 1, 2 }, respectively, as their naming.
305  **********************************************************************************/
detect_arch_features(void)306 void detect_arch_features(void)
307 {
308 	tainted = false;
309 
310 	/* v8.0 features */
311 	check_feature(ENABLE_FEAT_SB, read_feat_sb_id_field(), "SB", 1, 1);
312 	check_feature(ENABLE_FEAT_CSV2_2, read_feat_csv2_id_field(),
313 		      "CSV2_2", 2, 3);
314 	/*
315 	 * Even though the PMUv3 is an OPTIONAL feature, it is always
316 	 * implemented and Arm prescribes so. So assume it will be there and do
317 	 * away with a flag for it. This is used to check minor PMUv3px
318 	 * revisions so that we catch them as they come along
319 	 */
320 	check_feature(FEAT_STATE_ALWAYS, read_feat_pmuv3_id_field(),
321 		      "PMUv3", 1, ID_AA64DFR0_PMUVER_PMUV3P8);
322 
323 	/* v8.1 features */
324 	check_feature(ENABLE_FEAT_PAN, read_feat_pan_id_field(), "PAN", 1, 3);
325 	check_feature(ENABLE_FEAT_VHE, read_feat_vhe_id_field(), "VHE", 1, 1);
326 
327 	/* v8.2 features */
328 	check_feature(ENABLE_SVE_FOR_NS, read_feat_sve_id_field(),
329 		      "SVE", 1, 1);
330 	check_feature(ENABLE_FEAT_RAS, read_feat_ras_id_field(), "RAS", 1, 2);
331 
332 	/* v8.3 features */
333 	/* TODO: Pauth yet to convert to tri-state feat detect logic */
334 	read_feat_pauth();
335 
336 	/* v8.4 features */
337 	check_feature(ENABLE_FEAT_DIT, read_feat_dit_id_field(), "DIT", 1, 1);
338 	check_feature(ENABLE_FEAT_AMU, read_feat_amu_id_field(),
339 		      "AMUv1", 1, 2);
340 	check_feature(ENABLE_FEAT_MPAM, read_feat_mpam_version(),
341 		      "MPAM", 1, 17);
342 	check_feature(CTX_INCLUDE_NEVE_REGS, read_feat_nv_id_field(),
343 		      "NV2", 2, 2);
344 	check_feature(ENABLE_FEAT_SEL2, read_feat_sel2_id_field(),
345 		      "SEL2", 1, 1);
346 	check_feature(ENABLE_TRF_FOR_NS, read_feat_trf_id_field(),
347 		      "TRF", 1, 1);
348 
349 	/* v8.5 features */
350 	check_feature(ENABLE_FEAT_MTE2, get_armv8_5_mte_support(), "MTE2",
351 		      MTE_IMPLEMENTED_ELX, MTE_IMPLEMENTED_ASY);
352 	check_feature(ENABLE_FEAT_RNG, read_feat_rng_id_field(), "RNG", 1, 1);
353 	check_feature(ENABLE_BTI, read_feat_bti_id_field(), "BTI", 1, 1);
354 	check_feature(ENABLE_FEAT_RNG_TRAP, read_feat_rng_trap_id_field(),
355 		      "RNG_TRAP", 1, 1);
356 
357 	/* v8.6 features */
358 	check_feature(ENABLE_FEAT_AMUv1p1, read_feat_amu_id_field(),
359 		      "AMUv1p1", 2, 2);
360 	check_feature(ENABLE_FEAT_FGT, read_feat_fgt_id_field(), "FGT", 1, 2);
361 	check_feature(ENABLE_FEAT_FGT2, read_feat_fgt_id_field(), "FGT2", 2, 2);
362 	check_feature(ENABLE_FEAT_ECV, read_feat_ecv_id_field(), "ECV", 1, 2);
363 	check_feature(ENABLE_FEAT_TWED, read_feat_twed_id_field(),
364 		      "TWED", 1, 1);
365 
366 	/*
367 	 * even though this is a "DISABLE" it does confusingly perform feature
368 	 * enablement duties like all other flags here. Check it against the HW
369 	 * feature when we intend to diverge from the default behaviour
370 	 */
371 	check_feature(DISABLE_MTPMU, read_feat_mtpmu_id_field(), "MTPMU", 1, 1);
372 
373 	/* v8.7 features */
374 	check_feature(ENABLE_FEAT_HCX, read_feat_hcx_id_field(), "HCX", 1, 1);
375 	check_feature(ENABLE_FEAT_LS64_ACCDATA, read_feat_ls64_id_field(), "LS64", 1, 3);
376 
377 	/* v8.9 features */
378 	check_feature(ENABLE_FEAT_TCR2, read_feat_tcr2_id_field(),
379 		      "TCR2", 1, 1);
380 	check_feature(ENABLE_FEAT_S2PIE, read_feat_s2pie_id_field(),
381 		      "S2PIE", 1, 1);
382 	check_feature(ENABLE_FEAT_S1PIE, read_feat_s1pie_id_field(),
383 		      "S1PIE", 1, 1);
384 	check_feature(ENABLE_FEAT_S2POE, read_feat_s2poe_id_field(),
385 		      "S2POE", 1, 1);
386 	check_feature(ENABLE_FEAT_S1POE, read_feat_s1poe_id_field(),
387 		      "S1POE", 1, 1);
388 	check_feature(ENABLE_FEAT_CSV2_3, read_feat_csv2_id_field(),
389 		      "CSV2_3", 3, 3);
390 	check_feature(ENABLE_FEAT_DEBUGV8P9, read_feat_debugv8p9_id_field(),
391 			"DEBUGV8P9", 11, 11);
392 	check_feature(ENABLE_FEAT_THE, read_feat_the_id_field(),
393 			"THE", 1, 1);
394 	check_feature(ENABLE_FEAT_SCTLR2, read_feat_sctlr2_id_field(),
395 			"SCTLR2", 1, 1);
396 
397 	/* v9.0 features */
398 	check_feature(ENABLE_BRBE_FOR_NS, read_feat_brbe_id_field(),
399 		      "BRBE", 1, 2);
400 	check_feature(ENABLE_TRBE_FOR_NS, read_feat_trbe_id_field(),
401 		      "TRBE", 1, 1);
402 
403 	/* v9.2 features */
404 	check_feature(ENABLE_SME_FOR_NS, read_feat_sme_id_field(),
405 		      "SME", 1, 2);
406 	check_feature(ENABLE_SME2_FOR_NS, read_feat_sme_id_field(),
407 		      "SME2", 2, 2);
408 
409 	/* v9.3 features */
410 	check_feature(ENABLE_FEAT_D128, read_feat_d128_id_field(),
411 		      "D128", 1, 1);
412 
413 	/* v9.4 features */
414 	check_feature(ENABLE_FEAT_GCS, read_feat_gcs_id_field(), "GCS", 1, 1);
415 	check_feature(ENABLE_RME, read_feat_rme_id_field(), "RME", 1, 1);
416 
417 	if (tainted) {
418 		panic();
419 	}
420 }
421