mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-05-08 10:08:47 +00:00
refactor(mte): remove mte, mte_perm
Currently both FEAT_MTE and FEAT_MTE_PERM aren't used for enabling of any feature bits in EL3. So remove both FEAT handling. All mte regs that are currently context saved/restored are needed only when FEAT_MTE2 is enabled, so move to usage of FEAT_MTE2 and remove FEAT_MTE usage. BREAKING CHANGE: Any platform or downstream code trying to use SCR_EL3.ATA bit(26) will see failures as this is now moved to be used only with FEAT_MTE2 with commit@ef0d0e5478a3f19cbe70a378b9b184036db38fe2 Change-Id: Id01e154156571f7792135639e17dc5c8d0e17cf8 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
This commit is contained in:
parent
e7419780f7
commit
c282384dbb
14 changed files with 31 additions and 66 deletions
|
@ -340,23 +340,11 @@ Common build options
|
|||
flag can take the values 0 to 2, to align with the ``ENABLE_FEAT``
|
||||
mechanism. Default value is ``0``.
|
||||
|
||||
- ``ENABLE_FEAT_MTE``: Numeric value to enable Memory Tagging Extension
|
||||
if the platform wants to use this feature at EL0 ``ENABLE_FEAT_MTE`` is
|
||||
required. This flag can take values 0 to 2, to align with the ``ENABLE_FEAT``
|
||||
feature detection mechanism. Default value is ``0``.
|
||||
|
||||
- ``ENABLE_FEAT_MTE2``: Numeric value to enable Memory Tagging Extension2
|
||||
if the platform wants to use this feature and MTE2 is enabled at ELX.
|
||||
This flag can take values 0 to 2, to align with the ``ENABLE_FEAT``
|
||||
mechanism. Default value is ``0``.
|
||||
|
||||
- ``ENABLE_FEAT_MTE_PERM``: Numeric value to enable support for
|
||||
``FEAT_MTE_PERM``, which introduces Allocation tag access permission to
|
||||
memory region attributes. ``FEAT_MTE_PERM`` is a optional architectural
|
||||
feature available from v8.9 and upwards. This flag can take the values 0 to
|
||||
2, to align with the ``ENABLE_FEAT`` mechanism. Default value is
|
||||
``0``.
|
||||
|
||||
- ``ENABLE_FEAT_PAN``: Numeric value to enable the ``FEAT_PAN`` (Privileged
|
||||
Access Never) extension. ``FEAT_PAN`` adds a bit to PSTATE, generating a
|
||||
permission fault for any privileged data access from EL1/EL2 to virtual
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue