Thomas Gleixner | caab277 | 2019-06-03 07:44:50 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 2 | /* |
| 3 | * Contains CPU specific errata definitions |
| 4 | * |
| 5 | * Copyright (C) 2014 ARM Ltd. |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 6 | */ |
| 7 | |
Arnd Bergmann | 94a5d87 | 2018-06-05 13:50:07 +0200 | [diff] [blame] | 8 | #include <linux/arm-smccc.h> |
| 9 | #include <linux/psci.h> |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 10 | #include <linux/types.h> |
Josh Poimboeuf | a111b7c | 2019-04-12 15:39:32 -0500 | [diff] [blame] | 11 | #include <linux/cpu.h> |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 12 | #include <asm/cpu.h> |
| 13 | #include <asm/cputype.h> |
| 14 | #include <asm/cpufeature.h> |
| 15 | |
Andre Przywara | 301bcfa | 2014-11-14 15:54:10 +0000 | [diff] [blame] | 16 | static bool __maybe_unused |
Suzuki K Poulose | 92406f0 | 2016-04-22 12:25:31 +0100 | [diff] [blame] | 17 | is_affected_midr_range(const struct arm64_cpu_capabilities *entry, int scope) |
Andre Przywara | 301bcfa | 2014-11-14 15:54:10 +0000 | [diff] [blame] | 18 | { |
Ard Biesheuvel | e8002e0 | 2018-03-06 17:15:34 +0000 | [diff] [blame] | 19 | const struct arm64_midr_revidr *fix; |
| 20 | u32 midr = read_cpuid_id(), revidr; |
| 21 | |
Suzuki K Poulose | 92406f0 | 2016-04-22 12:25:31 +0100 | [diff] [blame] | 22 | WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); |
Suzuki K Poulose | 1df3105 | 2018-03-26 15:12:44 +0100 | [diff] [blame] | 23 | if (!is_midr_in_range(midr, &entry->midr_range)) |
Ard Biesheuvel | e8002e0 | 2018-03-06 17:15:34 +0000 | [diff] [blame] | 24 | return false; |
| 25 | |
| 26 | midr &= MIDR_REVISION_MASK | MIDR_VARIANT_MASK; |
| 27 | revidr = read_cpuid(REVIDR_EL1); |
| 28 | for (fix = entry->fixed_revs; fix && fix->revidr_mask; fix++) |
| 29 | if (midr == fix->midr_rv && (revidr & fix->revidr_mask)) |
| 30 | return false; |
| 31 | |
| 32 | return true; |
Andre Przywara | 301bcfa | 2014-11-14 15:54:10 +0000 | [diff] [blame] | 33 | } |
| 34 | |
Stephen Boyd | bb48711 | 2017-12-13 14:19:37 -0800 | [diff] [blame] | 35 | static bool __maybe_unused |
Suzuki K Poulose | be5b299 | 2018-03-26 15:12:45 +0100 | [diff] [blame] | 36 | is_affected_midr_range_list(const struct arm64_cpu_capabilities *entry, |
| 37 | int scope) |
| 38 | { |
| 39 | WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); |
| 40 | return is_midr_in_range_list(read_cpuid_id(), entry->midr_range_list); |
Andre Przywara | 301bcfa | 2014-11-14 15:54:10 +0000 | [diff] [blame] | 41 | } |
| 42 | |
Stephen Boyd | bb48711 | 2017-12-13 14:19:37 -0800 | [diff] [blame] | 43 | static bool __maybe_unused |
| 44 | is_kryo_midr(const struct arm64_cpu_capabilities *entry, int scope) |
| 45 | { |
| 46 | u32 model; |
| 47 | |
| 48 | WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); |
| 49 | |
| 50 | model = read_cpuid_id(); |
| 51 | model &= MIDR_IMPLEMENTOR_MASK | (0xf00 << MIDR_PARTNUM_SHIFT) | |
| 52 | MIDR_ARCHITECTURE_MASK; |
| 53 | |
Suzuki K Poulose | 1df3105 | 2018-03-26 15:12:44 +0100 | [diff] [blame] | 54 | return model == entry->midr_range.model; |
Stephen Boyd | bb48711 | 2017-12-13 14:19:37 -0800 | [diff] [blame] | 55 | } |
| 56 | |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 57 | static bool |
Suzuki K Poulose | 314d53d | 2018-07-04 23:07:46 +0100 | [diff] [blame] | 58 | has_mismatched_cache_type(const struct arm64_cpu_capabilities *entry, |
| 59 | int scope) |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 60 | { |
Suzuki K Poulose | 1602df0 | 2018-10-09 14:47:06 +0100 | [diff] [blame] | 61 | u64 mask = arm64_ftr_reg_ctrel0.strict_mask; |
| 62 | u64 sys = arm64_ftr_reg_ctrel0.sys_val & mask; |
| 63 | u64 ctr_raw, ctr_real; |
Suzuki K Poulose | 314d53d | 2018-07-04 23:07:46 +0100 | [diff] [blame] | 64 | |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 65 | WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); |
Suzuki K Poulose | 1602df0 | 2018-10-09 14:47:06 +0100 | [diff] [blame] | 66 | |
| 67 | /* |
| 68 | * We want to make sure that all the CPUs in the system expose |
| 69 | * a consistent CTR_EL0 to make sure that applications behaves |
| 70 | * correctly with migration. |
| 71 | * |
| 72 | * If a CPU has CTR_EL0.IDC but does not advertise it via CTR_EL0 : |
| 73 | * |
| 74 | * 1) It is safe if the system doesn't support IDC, as CPU anyway |
| 75 | * reports IDC = 0, consistent with the rest. |
| 76 | * |
| 77 | * 2) If the system has IDC, it is still safe as we trap CTR_EL0 |
| 78 | * access on this CPU via the ARM64_HAS_CACHE_IDC capability. |
| 79 | * |
| 80 | * So, we need to make sure either the raw CTR_EL0 or the effective |
| 81 | * CTR_EL0 matches the system's copy to allow a secondary CPU to boot. |
| 82 | */ |
| 83 | ctr_raw = read_cpuid_cachetype() & mask; |
| 84 | ctr_real = read_cpuid_effective_cachetype() & mask; |
| 85 | |
| 86 | return (ctr_real != sys) && (ctr_raw != sys); |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 87 | } |
| 88 | |
Dave Martin | c0cda3b | 2018-03-26 15:12:28 +0100 | [diff] [blame] | 89 | static void |
| 90 | cpu_enable_trap_ctr_access(const struct arm64_cpu_capabilities *__unused) |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 91 | { |
Suzuki K Poulose | 4afe8e7 | 2018-10-09 14:47:07 +0100 | [diff] [blame] | 92 | u64 mask = arm64_ftr_reg_ctrel0.strict_mask; |
| 93 | |
| 94 | /* Trap CTR_EL0 access on this CPU, only if it has a mismatch */ |
| 95 | if ((read_cpuid_cachetype() & mask) != |
| 96 | (arm64_ftr_reg_ctrel0.sys_val & mask)) |
| 97 | sysreg_clear_set(sctlr_el1, SCTLR_EL1_UCT, 0); |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 98 | } |
| 99 | |
Marc Zyngier | 4205a89 | 2018-03-13 12:40:39 +0000 | [diff] [blame] | 100 | atomic_t arm64_el2_vector_last_slot = ATOMIC_INIT(-1); |
| 101 | |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 102 | #include <asm/mmu_context.h> |
| 103 | #include <asm/cacheflush.h> |
| 104 | |
| 105 | DEFINE_PER_CPU_READ_MOSTLY(struct bp_hardening_data, bp_hardening_data); |
| 106 | |
Marc Zyngier | e8b22d0f | 2018-04-10 11:36:45 +0100 | [diff] [blame] | 107 | #ifdef CONFIG_KVM_INDIRECT_VECTORS |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 108 | extern char __smccc_workaround_1_smc_start[]; |
| 109 | extern char __smccc_workaround_1_smc_end[]; |
Will Deacon | aa6acde | 2018-01-03 12:46:21 +0000 | [diff] [blame] | 110 | |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 111 | static void __copy_hyp_vect_bpi(int slot, const char *hyp_vecs_start, |
| 112 | const char *hyp_vecs_end) |
| 113 | { |
| 114 | void *dst = lm_alias(__bp_harden_hyp_vecs_start + slot * SZ_2K); |
| 115 | int i; |
| 116 | |
| 117 | for (i = 0; i < SZ_2K; i += 0x80) |
| 118 | memcpy(dst + i, hyp_vecs_start, hyp_vecs_end - hyp_vecs_start); |
| 119 | |
Will Deacon | 3b8c9f1 | 2018-06-11 14:22:09 +0100 | [diff] [blame] | 120 | __flush_icache_range((uintptr_t)dst, (uintptr_t)dst + SZ_2K); |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 121 | } |
| 122 | |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 123 | static void install_bp_hardening_cb(bp_hardening_cb_t fn, |
| 124 | const char *hyp_vecs_start, |
| 125 | const char *hyp_vecs_end) |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 126 | { |
James Morse | d8797b1 | 2018-11-27 15:35:21 +0000 | [diff] [blame] | 127 | static DEFINE_RAW_SPINLOCK(bp_lock); |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 128 | int cpu, slot = -1; |
| 129 | |
James Morse | 4debef5 | 2018-09-21 21:49:19 +0100 | [diff] [blame] | 130 | /* |
| 131 | * enable_smccc_arch_workaround_1() passes NULL for the hyp_vecs |
| 132 | * start/end if we're a guest. Skip the hyp-vectors work. |
| 133 | */ |
| 134 | if (!hyp_vecs_start) { |
| 135 | __this_cpu_write(bp_hardening_data.fn, fn); |
| 136 | return; |
| 137 | } |
| 138 | |
James Morse | d8797b1 | 2018-11-27 15:35:21 +0000 | [diff] [blame] | 139 | raw_spin_lock(&bp_lock); |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 140 | for_each_possible_cpu(cpu) { |
| 141 | if (per_cpu(bp_hardening_data.fn, cpu) == fn) { |
| 142 | slot = per_cpu(bp_hardening_data.hyp_vectors_slot, cpu); |
| 143 | break; |
| 144 | } |
| 145 | } |
| 146 | |
| 147 | if (slot == -1) { |
Marc Zyngier | 4205a89 | 2018-03-13 12:40:39 +0000 | [diff] [blame] | 148 | slot = atomic_inc_return(&arm64_el2_vector_last_slot); |
| 149 | BUG_ON(slot >= BP_HARDEN_EL2_SLOTS); |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 150 | __copy_hyp_vect_bpi(slot, hyp_vecs_start, hyp_vecs_end); |
| 151 | } |
| 152 | |
| 153 | __this_cpu_write(bp_hardening_data.hyp_vectors_slot, slot); |
| 154 | __this_cpu_write(bp_hardening_data.fn, fn); |
James Morse | d8797b1 | 2018-11-27 15:35:21 +0000 | [diff] [blame] | 155 | raw_spin_unlock(&bp_lock); |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 156 | } |
| 157 | #else |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 158 | #define __smccc_workaround_1_smc_start NULL |
| 159 | #define __smccc_workaround_1_smc_end NULL |
Will Deacon | aa6acde | 2018-01-03 12:46:21 +0000 | [diff] [blame] | 160 | |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 161 | static void install_bp_hardening_cb(bp_hardening_cb_t fn, |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 162 | const char *hyp_vecs_start, |
| 163 | const char *hyp_vecs_end) |
| 164 | { |
| 165 | __this_cpu_write(bp_hardening_data.fn, fn); |
| 166 | } |
Marc Zyngier | e8b22d0f | 2018-04-10 11:36:45 +0100 | [diff] [blame] | 167 | #endif /* CONFIG_KVM_INDIRECT_VECTORS */ |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 168 | |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 169 | #include <uapi/linux/psci.h> |
| 170 | #include <linux/arm-smccc.h> |
Will Deacon | aa6acde | 2018-01-03 12:46:21 +0000 | [diff] [blame] | 171 | #include <linux/psci.h> |
| 172 | |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 173 | static void call_smc_arch_workaround_1(void) |
| 174 | { |
| 175 | arm_smccc_1_1_smc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL); |
| 176 | } |
| 177 | |
| 178 | static void call_hvc_arch_workaround_1(void) |
| 179 | { |
| 180 | arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL); |
| 181 | } |
| 182 | |
Shanker Donthineni | 4bc352f | 2018-04-10 11:36:42 +0100 | [diff] [blame] | 183 | static void qcom_link_stack_sanitization(void) |
| 184 | { |
| 185 | u64 tmp; |
| 186 | |
| 187 | asm volatile("mov %0, x30 \n" |
| 188 | ".rept 16 \n" |
| 189 | "bl . + 4 \n" |
| 190 | ".endr \n" |
| 191 | "mov x30, %0 \n" |
| 192 | : "=&r" (tmp)); |
| 193 | } |
| 194 | |
Jeremy Linton | e5ce5e7 | 2019-04-15 16:21:20 -0500 | [diff] [blame] | 195 | static bool __nospectre_v2; |
| 196 | static int __init parse_nospectre_v2(char *str) |
| 197 | { |
| 198 | __nospectre_v2 = true; |
| 199 | return 0; |
| 200 | } |
| 201 | early_param("nospectre_v2", parse_nospectre_v2); |
| 202 | |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 203 | /* |
| 204 | * -1: No workaround |
| 205 | * 0: No workaround required |
| 206 | * 1: Workaround installed |
| 207 | */ |
| 208 | static int detect_harden_bp_fw(void) |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 209 | { |
| 210 | bp_hardening_cb_t cb; |
| 211 | void *smccc_start, *smccc_end; |
| 212 | struct arm_smccc_res res; |
Shanker Donthineni | 4bc352f | 2018-04-10 11:36:42 +0100 | [diff] [blame] | 213 | u32 midr = read_cpuid_id(); |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 214 | |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 215 | if (psci_ops.smccc_version == SMCCC_VERSION_1_0) |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 216 | return -1; |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 217 | |
| 218 | switch (psci_ops.conduit) { |
| 219 | case PSCI_CONDUIT_HVC: |
| 220 | arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID, |
| 221 | ARM_SMCCC_ARCH_WORKAROUND_1, &res); |
Marc Zyngier | 517953c | 2019-04-15 16:21:24 -0500 | [diff] [blame] | 222 | switch ((int)res.a0) { |
| 223 | case 1: |
| 224 | /* Firmware says we're just fine */ |
| 225 | return 0; |
| 226 | case 0: |
| 227 | cb = call_hvc_arch_workaround_1; |
| 228 | /* This is a guest, no need to patch KVM vectors */ |
| 229 | smccc_start = NULL; |
| 230 | smccc_end = NULL; |
| 231 | break; |
| 232 | default: |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 233 | return -1; |
Marc Zyngier | 517953c | 2019-04-15 16:21:24 -0500 | [diff] [blame] | 234 | } |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 235 | break; |
| 236 | |
| 237 | case PSCI_CONDUIT_SMC: |
| 238 | arm_smccc_1_1_smc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID, |
| 239 | ARM_SMCCC_ARCH_WORKAROUND_1, &res); |
Marc Zyngier | 517953c | 2019-04-15 16:21:24 -0500 | [diff] [blame] | 240 | switch ((int)res.a0) { |
| 241 | case 1: |
| 242 | /* Firmware says we're just fine */ |
| 243 | return 0; |
| 244 | case 0: |
| 245 | cb = call_smc_arch_workaround_1; |
| 246 | smccc_start = __smccc_workaround_1_smc_start; |
| 247 | smccc_end = __smccc_workaround_1_smc_end; |
| 248 | break; |
| 249 | default: |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 250 | return -1; |
Marc Zyngier | 517953c | 2019-04-15 16:21:24 -0500 | [diff] [blame] | 251 | } |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 252 | break; |
| 253 | |
| 254 | default: |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 255 | return -1; |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 256 | } |
| 257 | |
Shanker Donthineni | 4bc352f | 2018-04-10 11:36:42 +0100 | [diff] [blame] | 258 | if (((midr & MIDR_CPU_MODEL_MASK) == MIDR_QCOM_FALKOR) || |
| 259 | ((midr & MIDR_CPU_MODEL_MASK) == MIDR_QCOM_FALKOR_V1)) |
| 260 | cb = qcom_link_stack_sanitization; |
| 261 | |
Jeremy Linton | 8c1e3d2 | 2019-04-15 16:21:25 -0500 | [diff] [blame] | 262 | if (IS_ENABLED(CONFIG_HARDEN_BRANCH_PREDICTOR)) |
| 263 | install_bp_hardening_cb(cb, smccc_start, smccc_end); |
Marc Zyngier | b092201 | 2018-02-06 17:56:20 +0000 | [diff] [blame] | 264 | |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 265 | return 1; |
Will Deacon | aa6acde | 2018-01-03 12:46:21 +0000 | [diff] [blame] | 266 | } |
Will Deacon | 0f15adb | 2018-01-03 11:17:58 +0000 | [diff] [blame] | 267 | |
Marc Zyngier | 5cf9ce6 | 2018-05-29 13:11:07 +0100 | [diff] [blame] | 268 | DEFINE_PER_CPU_READ_MOSTLY(u64, arm64_ssbd_callback_required); |
| 269 | |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 270 | int ssbd_state __read_mostly = ARM64_SSBD_KERNEL; |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 271 | static bool __ssb_safe = true; |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 272 | |
| 273 | static const struct ssbd_options { |
| 274 | const char *str; |
| 275 | int state; |
| 276 | } ssbd_options[] = { |
| 277 | { "force-on", ARM64_SSBD_FORCE_ENABLE, }, |
| 278 | { "force-off", ARM64_SSBD_FORCE_DISABLE, }, |
| 279 | { "kernel", ARM64_SSBD_KERNEL, }, |
| 280 | }; |
| 281 | |
| 282 | static int __init ssbd_cfg(char *buf) |
| 283 | { |
| 284 | int i; |
| 285 | |
| 286 | if (!buf || !buf[0]) |
| 287 | return -EINVAL; |
| 288 | |
| 289 | for (i = 0; i < ARRAY_SIZE(ssbd_options); i++) { |
| 290 | int len = strlen(ssbd_options[i].str); |
| 291 | |
| 292 | if (strncmp(buf, ssbd_options[i].str, len)) |
| 293 | continue; |
| 294 | |
| 295 | ssbd_state = ssbd_options[i].state; |
| 296 | return 0; |
| 297 | } |
| 298 | |
| 299 | return -EINVAL; |
| 300 | } |
| 301 | early_param("ssbd", ssbd_cfg); |
| 302 | |
Marc Zyngier | 8e29062 | 2018-05-29 13:11:06 +0100 | [diff] [blame] | 303 | void __init arm64_update_smccc_conduit(struct alt_instr *alt, |
| 304 | __le32 *origptr, __le32 *updptr, |
| 305 | int nr_inst) |
| 306 | { |
| 307 | u32 insn; |
| 308 | |
| 309 | BUG_ON(nr_inst != 1); |
| 310 | |
| 311 | switch (psci_ops.conduit) { |
| 312 | case PSCI_CONDUIT_HVC: |
| 313 | insn = aarch64_insn_get_hvc_value(); |
| 314 | break; |
| 315 | case PSCI_CONDUIT_SMC: |
| 316 | insn = aarch64_insn_get_smc_value(); |
| 317 | break; |
| 318 | default: |
| 319 | return; |
| 320 | } |
| 321 | |
| 322 | *updptr = cpu_to_le32(insn); |
| 323 | } |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 324 | |
Marc Zyngier | 986372c | 2018-05-29 13:11:11 +0100 | [diff] [blame] | 325 | void __init arm64_enable_wa2_handling(struct alt_instr *alt, |
| 326 | __le32 *origptr, __le32 *updptr, |
| 327 | int nr_inst) |
| 328 | { |
| 329 | BUG_ON(nr_inst != 1); |
| 330 | /* |
| 331 | * Only allow mitigation on EL1 entry/exit and guest |
| 332 | * ARCH_WORKAROUND_2 handling if the SSBD state allows it to |
| 333 | * be flipped. |
| 334 | */ |
| 335 | if (arm64_get_ssbd_state() == ARM64_SSBD_KERNEL) |
| 336 | *updptr = cpu_to_le32(aarch64_insn_gen_nop()); |
| 337 | } |
| 338 | |
Marc Zyngier | 647d051 | 2018-05-29 13:11:12 +0100 | [diff] [blame] | 339 | void arm64_set_ssbd_mitigation(bool state) |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 340 | { |
Jeremy Linton | d42281b | 2019-04-15 16:21:27 -0500 | [diff] [blame] | 341 | if (!IS_ENABLED(CONFIG_ARM64_SSBD)) { |
| 342 | pr_info_once("SSBD disabled by kernel configuration\n"); |
| 343 | return; |
| 344 | } |
| 345 | |
Will Deacon | 8f04e8e | 2018-08-07 13:47:06 +0100 | [diff] [blame] | 346 | if (this_cpu_has_cap(ARM64_SSBS)) { |
| 347 | if (state) |
| 348 | asm volatile(SET_PSTATE_SSBS(0)); |
| 349 | else |
| 350 | asm volatile(SET_PSTATE_SSBS(1)); |
| 351 | return; |
| 352 | } |
| 353 | |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 354 | switch (psci_ops.conduit) { |
| 355 | case PSCI_CONDUIT_HVC: |
| 356 | arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_WORKAROUND_2, state, NULL); |
| 357 | break; |
| 358 | |
| 359 | case PSCI_CONDUIT_SMC: |
| 360 | arm_smccc_1_1_smc(ARM_SMCCC_ARCH_WORKAROUND_2, state, NULL); |
| 361 | break; |
| 362 | |
| 363 | default: |
| 364 | WARN_ON_ONCE(1); |
| 365 | break; |
| 366 | } |
| 367 | } |
| 368 | |
| 369 | static bool has_ssbd_mitigation(const struct arm64_cpu_capabilities *entry, |
| 370 | int scope) |
| 371 | { |
| 372 | struct arm_smccc_res res; |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 373 | bool required = true; |
| 374 | s32 val; |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 375 | bool this_cpu_safe = false; |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 376 | |
| 377 | WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); |
| 378 | |
Josh Poimboeuf | a111b7c | 2019-04-12 15:39:32 -0500 | [diff] [blame] | 379 | if (cpu_mitigations_off()) |
| 380 | ssbd_state = ARM64_SSBD_FORCE_DISABLE; |
| 381 | |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 382 | /* delay setting __ssb_safe until we get a firmware response */ |
| 383 | if (is_midr_in_range_list(read_cpuid_id(), entry->midr_range_list)) |
| 384 | this_cpu_safe = true; |
| 385 | |
Will Deacon | eb337cd | 2019-04-30 16:58:56 +0100 | [diff] [blame] | 386 | if (this_cpu_has_cap(ARM64_SSBS)) { |
| 387 | if (!this_cpu_safe) |
| 388 | __ssb_safe = false; |
| 389 | required = false; |
| 390 | goto out_printmsg; |
| 391 | } |
| 392 | |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 393 | if (psci_ops.smccc_version == SMCCC_VERSION_1_0) { |
| 394 | ssbd_state = ARM64_SSBD_UNKNOWN; |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 395 | if (!this_cpu_safe) |
| 396 | __ssb_safe = false; |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 397 | return false; |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 398 | } |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 399 | |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 400 | switch (psci_ops.conduit) { |
| 401 | case PSCI_CONDUIT_HVC: |
| 402 | arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID, |
| 403 | ARM_SMCCC_ARCH_WORKAROUND_2, &res); |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 404 | break; |
| 405 | |
| 406 | case PSCI_CONDUIT_SMC: |
| 407 | arm_smccc_1_1_smc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID, |
| 408 | ARM_SMCCC_ARCH_WORKAROUND_2, &res); |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 409 | break; |
| 410 | |
| 411 | default: |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 412 | ssbd_state = ARM64_SSBD_UNKNOWN; |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 413 | if (!this_cpu_safe) |
| 414 | __ssb_safe = false; |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 415 | return false; |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 416 | } |
| 417 | |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 418 | val = (s32)res.a0; |
| 419 | |
| 420 | switch (val) { |
| 421 | case SMCCC_RET_NOT_SUPPORTED: |
| 422 | ssbd_state = ARM64_SSBD_UNKNOWN; |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 423 | if (!this_cpu_safe) |
| 424 | __ssb_safe = false; |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 425 | return false; |
| 426 | |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 427 | /* machines with mixed mitigation requirements must not return this */ |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 428 | case SMCCC_RET_NOT_REQUIRED: |
| 429 | pr_info_once("%s mitigation not required\n", entry->desc); |
| 430 | ssbd_state = ARM64_SSBD_MITIGATED; |
| 431 | return false; |
| 432 | |
| 433 | case SMCCC_RET_SUCCESS: |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 434 | __ssb_safe = false; |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 435 | required = true; |
| 436 | break; |
| 437 | |
| 438 | case 1: /* Mitigation not required on this CPU */ |
| 439 | required = false; |
| 440 | break; |
| 441 | |
| 442 | default: |
| 443 | WARN_ON(1); |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 444 | if (!this_cpu_safe) |
| 445 | __ssb_safe = false; |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 446 | return false; |
| 447 | } |
| 448 | |
| 449 | switch (ssbd_state) { |
| 450 | case ARM64_SSBD_FORCE_DISABLE: |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 451 | arm64_set_ssbd_mitigation(false); |
| 452 | required = false; |
| 453 | break; |
| 454 | |
| 455 | case ARM64_SSBD_KERNEL: |
| 456 | if (required) { |
| 457 | __this_cpu_write(arm64_ssbd_callback_required, 1); |
| 458 | arm64_set_ssbd_mitigation(true); |
| 459 | } |
| 460 | break; |
| 461 | |
| 462 | case ARM64_SSBD_FORCE_ENABLE: |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 463 | arm64_set_ssbd_mitigation(true); |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 464 | required = true; |
| 465 | break; |
| 466 | |
| 467 | default: |
| 468 | WARN_ON(1); |
| 469 | break; |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 470 | } |
| 471 | |
Will Deacon | 8f04e8e | 2018-08-07 13:47:06 +0100 | [diff] [blame] | 472 | out_printmsg: |
| 473 | switch (ssbd_state) { |
| 474 | case ARM64_SSBD_FORCE_DISABLE: |
| 475 | pr_info_once("%s disabled from command-line\n", entry->desc); |
| 476 | break; |
| 477 | |
| 478 | case ARM64_SSBD_FORCE_ENABLE: |
| 479 | pr_info_once("%s forced from command-line\n", entry->desc); |
| 480 | break; |
| 481 | } |
| 482 | |
Marc Zyngier | a43ae4d | 2018-05-29 13:11:09 +0100 | [diff] [blame] | 483 | return required; |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 484 | } |
Marc Zyngier | 8e29062 | 2018-05-29 13:11:06 +0100 | [diff] [blame] | 485 | |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 486 | /* known invulnerable cores */ |
| 487 | static const struct midr_range arm64_ssb_cpus[] = { |
| 488 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A35), |
| 489 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A53), |
| 490 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A55), |
| 491 | {}, |
| 492 | }; |
| 493 | |
Will Deacon | 969f5ea | 2019-04-29 13:03:57 +0100 | [diff] [blame] | 494 | #ifdef CONFIG_ARM64_ERRATUM_1463225 |
| 495 | DEFINE_PER_CPU(int, __in_cortex_a76_erratum_1463225_wa); |
| 496 | |
| 497 | static bool |
| 498 | has_cortex_a76_erratum_1463225(const struct arm64_cpu_capabilities *entry, |
| 499 | int scope) |
| 500 | { |
| 501 | u32 midr = read_cpuid_id(); |
| 502 | /* Cortex-A76 r0p0 - r3p1 */ |
| 503 | struct midr_range range = MIDR_RANGE(MIDR_CORTEX_A76, 0, 0, 3, 1); |
| 504 | |
| 505 | WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); |
| 506 | return is_midr_in_range(midr, &range) && is_kernel_in_hyp_mode(); |
| 507 | } |
| 508 | #endif |
| 509 | |
Will Deacon | b8925ee | 2018-08-07 13:53:41 +0100 | [diff] [blame] | 510 | static void __maybe_unused |
| 511 | cpu_enable_cache_maint_trap(const struct arm64_cpu_capabilities *__unused) |
| 512 | { |
| 513 | sysreg_clear_set(sctlr_el1, SCTLR_EL1_UCI, 0); |
| 514 | } |
| 515 | |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 516 | #define CAP_MIDR_RANGE(model, v_min, r_min, v_max, r_max) \ |
| 517 | .matches = is_affected_midr_range, \ |
Suzuki K Poulose | 1df3105 | 2018-03-26 15:12:44 +0100 | [diff] [blame] | 518 | .midr_range = MIDR_RANGE(model, v_min, r_min, v_max, r_max) |
Andre Przywara | 301bcfa | 2014-11-14 15:54:10 +0000 | [diff] [blame] | 519 | |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 520 | #define CAP_MIDR_ALL_VERSIONS(model) \ |
| 521 | .matches = is_affected_midr_range, \ |
Suzuki K Poulose | 1df3105 | 2018-03-26 15:12:44 +0100 | [diff] [blame] | 522 | .midr_range = MIDR_ALL_VERSIONS(model) |
Marc Zyngier | 06f1494 | 2017-02-01 14:38:46 +0000 | [diff] [blame] | 523 | |
Ard Biesheuvel | e8002e0 | 2018-03-06 17:15:34 +0000 | [diff] [blame] | 524 | #define MIDR_FIXED(rev, revidr_mask) \ |
| 525 | .fixed_revs = (struct arm64_midr_revidr[]){{ (rev), (revidr_mask) }, {}} |
| 526 | |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 527 | #define ERRATA_MIDR_RANGE(model, v_min, r_min, v_max, r_max) \ |
| 528 | .type = ARM64_CPUCAP_LOCAL_CPU_ERRATUM, \ |
| 529 | CAP_MIDR_RANGE(model, v_min, r_min, v_max, r_max) |
| 530 | |
Suzuki K Poulose | be5b299 | 2018-03-26 15:12:45 +0100 | [diff] [blame] | 531 | #define CAP_MIDR_RANGE_LIST(list) \ |
| 532 | .matches = is_affected_midr_range_list, \ |
| 533 | .midr_range_list = list |
| 534 | |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 535 | /* Errata affecting a range of revisions of given model variant */ |
| 536 | #define ERRATA_MIDR_REV_RANGE(m, var, r_min, r_max) \ |
| 537 | ERRATA_MIDR_RANGE(m, var, r_min, var, r_max) |
| 538 | |
| 539 | /* Errata affecting a single variant/revision of a model */ |
| 540 | #define ERRATA_MIDR_REV(model, var, rev) \ |
| 541 | ERRATA_MIDR_RANGE(model, var, rev, var, rev) |
| 542 | |
| 543 | /* Errata affecting all variants/revisions of a given a model */ |
| 544 | #define ERRATA_MIDR_ALL_VERSIONS(model) \ |
| 545 | .type = ARM64_CPUCAP_LOCAL_CPU_ERRATUM, \ |
| 546 | CAP_MIDR_ALL_VERSIONS(model) |
| 547 | |
Suzuki K Poulose | be5b299 | 2018-03-26 15:12:45 +0100 | [diff] [blame] | 548 | /* Errata affecting a list of midr ranges, with same work around */ |
| 549 | #define ERRATA_MIDR_RANGE_LIST(midr_list) \ |
| 550 | .type = ARM64_CPUCAP_LOCAL_CPU_ERRATUM, \ |
| 551 | CAP_MIDR_RANGE_LIST(midr_list) |
| 552 | |
Jeremy Linton | d2532e2 | 2019-04-15 16:21:26 -0500 | [diff] [blame] | 553 | /* Track overall mitigation state. We are only mitigated if all cores are ok */ |
| 554 | static bool __hardenbp_enab = true; |
| 555 | static bool __spectrev2_safe = true; |
| 556 | |
Suzuki K Poulose | be5b299 | 2018-03-26 15:12:45 +0100 | [diff] [blame] | 557 | /* |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 558 | * List of CPUs that do not need any Spectre-v2 mitigation at all. |
Suzuki K Poulose | be5b299 | 2018-03-26 15:12:45 +0100 | [diff] [blame] | 559 | */ |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 560 | static const struct midr_range spectre_v2_safe_list[] = { |
| 561 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A35), |
| 562 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A53), |
| 563 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A55), |
| 564 | { /* sentinel */ } |
Suzuki K Poulose | be5b299 | 2018-03-26 15:12:45 +0100 | [diff] [blame] | 565 | }; |
| 566 | |
Jeremy Linton | d2532e2 | 2019-04-15 16:21:26 -0500 | [diff] [blame] | 567 | /* |
| 568 | * Track overall bp hardening for all heterogeneous cores in the machine. |
| 569 | * We are only considered "safe" if all booted cores are known safe. |
| 570 | */ |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 571 | static bool __maybe_unused |
| 572 | check_branch_predictor(const struct arm64_cpu_capabilities *entry, int scope) |
| 573 | { |
| 574 | int need_wa; |
| 575 | |
| 576 | WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); |
| 577 | |
| 578 | /* If the CPU has CSV2 set, we're safe */ |
| 579 | if (cpuid_feature_extract_unsigned_field(read_cpuid(ID_AA64PFR0_EL1), |
| 580 | ID_AA64PFR0_CSV2_SHIFT)) |
| 581 | return false; |
| 582 | |
| 583 | /* Alternatively, we have a list of unaffected CPUs */ |
| 584 | if (is_midr_in_range_list(read_cpuid_id(), spectre_v2_safe_list)) |
| 585 | return false; |
| 586 | |
| 587 | /* Fallback to firmware detection */ |
| 588 | need_wa = detect_harden_bp_fw(); |
| 589 | if (!need_wa) |
| 590 | return false; |
| 591 | |
Jeremy Linton | d2532e2 | 2019-04-15 16:21:26 -0500 | [diff] [blame] | 592 | __spectrev2_safe = false; |
| 593 | |
Jeremy Linton | 8c1e3d2 | 2019-04-15 16:21:25 -0500 | [diff] [blame] | 594 | if (!IS_ENABLED(CONFIG_HARDEN_BRANCH_PREDICTOR)) { |
| 595 | pr_warn_once("spectrev2 mitigation disabled by kernel configuration\n"); |
| 596 | __hardenbp_enab = false; |
| 597 | return false; |
| 598 | } |
| 599 | |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 600 | /* forced off */ |
Josh Poimboeuf | a111b7c | 2019-04-12 15:39:32 -0500 | [diff] [blame] | 601 | if (__nospectre_v2 || cpu_mitigations_off()) { |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 602 | pr_info_once("spectrev2 mitigation disabled by command line option\n"); |
Jeremy Linton | d2532e2 | 2019-04-15 16:21:26 -0500 | [diff] [blame] | 603 | __hardenbp_enab = false; |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 604 | return false; |
| 605 | } |
| 606 | |
Jeremy Linton | d2532e2 | 2019-04-15 16:21:26 -0500 | [diff] [blame] | 607 | if (need_wa < 0) { |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 608 | pr_warn_once("ARM_SMCCC_ARCH_WORKAROUND_1 missing from firmware\n"); |
Jeremy Linton | d2532e2 | 2019-04-15 16:21:26 -0500 | [diff] [blame] | 609 | __hardenbp_enab = false; |
| 610 | } |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 611 | |
| 612 | return (need_wa > 0); |
| 613 | } |
Andre Przywara | 301bcfa | 2014-11-14 15:54:10 +0000 | [diff] [blame] | 614 | |
Marc Zyngier | 8892b71 | 2018-04-10 11:36:43 +0100 | [diff] [blame] | 615 | #ifdef CONFIG_HARDEN_EL2_VECTORS |
| 616 | |
| 617 | static const struct midr_range arm64_harden_el2_vectors[] = { |
| 618 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A57), |
| 619 | MIDR_ALL_VERSIONS(MIDR_CORTEX_A72), |
| 620 | {}, |
| 621 | }; |
| 622 | |
Marc Zyngier | dc6ed61 | 2018-03-28 12:46:07 +0100 | [diff] [blame] | 623 | #endif |
| 624 | |
Catalin Marinas | ce8c80c | 2018-11-19 11:27:28 +0000 | [diff] [blame] | 625 | #ifdef CONFIG_ARM64_WORKAROUND_REPEAT_TLBI |
| 626 | |
| 627 | static const struct midr_range arm64_repeat_tlbi_cpus[] = { |
| 628 | #ifdef CONFIG_QCOM_FALKOR_ERRATUM_1009 |
| 629 | MIDR_RANGE(MIDR_QCOM_FALKOR_V1, 0, 0, 0, 0), |
| 630 | #endif |
| 631 | #ifdef CONFIG_ARM64_ERRATUM_1286807 |
| 632 | MIDR_RANGE(MIDR_CORTEX_A76, 0, 0, 3, 0), |
| 633 | #endif |
| 634 | {}, |
| 635 | }; |
| 636 | |
| 637 | #endif |
| 638 | |
Suzuki K Poulose | f58cdf7 | 2018-11-30 17:18:01 +0000 | [diff] [blame] | 639 | #ifdef CONFIG_CAVIUM_ERRATUM_27456 |
Will Deacon | b89d82e | 2019-01-08 16:19:01 +0000 | [diff] [blame] | 640 | const struct midr_range cavium_erratum_27456_cpus[] = { |
Suzuki K Poulose | f58cdf7 | 2018-11-30 17:18:01 +0000 | [diff] [blame] | 641 | /* Cavium ThunderX, T88 pass 1.x - 2.1 */ |
| 642 | MIDR_RANGE(MIDR_THUNDERX, 0, 0, 1, 1), |
| 643 | /* Cavium ThunderX, T81 pass 1.0 */ |
| 644 | MIDR_REV(MIDR_THUNDERX_81XX, 0, 0), |
| 645 | {}, |
| 646 | }; |
| 647 | #endif |
| 648 | |
| 649 | #ifdef CONFIG_CAVIUM_ERRATUM_30115 |
| 650 | static const struct midr_range cavium_erratum_30115_cpus[] = { |
| 651 | /* Cavium ThunderX, T88 pass 1.x - 2.2 */ |
| 652 | MIDR_RANGE(MIDR_THUNDERX, 0, 0, 1, 2), |
| 653 | /* Cavium ThunderX, T81 pass 1.0 - 1.2 */ |
| 654 | MIDR_REV_RANGE(MIDR_THUNDERX_81XX, 0, 0, 2), |
| 655 | /* Cavium ThunderX, T83 pass 1.0 */ |
| 656 | MIDR_REV(MIDR_THUNDERX_83XX, 0, 0), |
| 657 | {}, |
| 658 | }; |
| 659 | #endif |
| 660 | |
Suzuki K Poulose | a3dcea2c | 2018-11-30 17:18:02 +0000 | [diff] [blame] | 661 | #ifdef CONFIG_QCOM_FALKOR_ERRATUM_1003 |
| 662 | static const struct arm64_cpu_capabilities qcom_erratum_1003_list[] = { |
| 663 | { |
| 664 | ERRATA_MIDR_REV(MIDR_QCOM_FALKOR_V1, 0, 0), |
| 665 | }, |
| 666 | { |
| 667 | .midr_range.model = MIDR_QCOM_KRYO, |
| 668 | .matches = is_kryo_midr, |
| 669 | }, |
| 670 | {}, |
| 671 | }; |
| 672 | #endif |
| 673 | |
Suzuki K Poulose | c9460dc | 2018-11-30 17:18:00 +0000 | [diff] [blame] | 674 | #ifdef CONFIG_ARM64_WORKAROUND_CLEAN_CACHE |
| 675 | static const struct midr_range workaround_clean_cache[] = { |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 676 | #if defined(CONFIG_ARM64_ERRATUM_826319) || \ |
| 677 | defined(CONFIG_ARM64_ERRATUM_827319) || \ |
| 678 | defined(CONFIG_ARM64_ERRATUM_824069) |
Suzuki K Poulose | c9460dc | 2018-11-30 17:18:00 +0000 | [diff] [blame] | 679 | /* Cortex-A53 r0p[012]: ARM errata 826319, 827319, 824069 */ |
| 680 | MIDR_REV_RANGE(MIDR_CORTEX_A53, 0, 0, 2), |
Andre Przywara | c0a01b8 | 2014-11-14 15:54:12 +0000 | [diff] [blame] | 681 | #endif |
Suzuki K Poulose | c9460dc | 2018-11-30 17:18:00 +0000 | [diff] [blame] | 682 | #ifdef CONFIG_ARM64_ERRATUM_819472 |
| 683 | /* Cortex-A53 r0p[01] : ARM errata 819472 */ |
| 684 | MIDR_REV_RANGE(MIDR_CORTEX_A53, 0, 0, 1), |
| 685 | #endif |
| 686 | {}, |
| 687 | }; |
| 688 | #endif |
| 689 | |
Marc Zyngier | a532508 | 2019-05-23 11:24:50 +0100 | [diff] [blame] | 690 | #ifdef CONFIG_ARM64_ERRATUM_1418040 |
| 691 | /* |
| 692 | * - 1188873 affects r0p0 to r2p0 |
| 693 | * - 1418040 affects r0p0 to r3p1 |
| 694 | */ |
| 695 | static const struct midr_range erratum_1418040_list[] = { |
| 696 | /* Cortex-A76 r0p0 to r3p1 */ |
| 697 | MIDR_RANGE(MIDR_CORTEX_A76, 0, 0, 3, 1), |
| 698 | /* Neoverse-N1 r0p0 to r3p1 */ |
| 699 | MIDR_RANGE(MIDR_NEOVERSE_N1, 0, 0, 3, 1), |
Marc Zyngier | 6989303 | 2019-04-15 13:03:54 +0100 | [diff] [blame] | 700 | {}, |
| 701 | }; |
| 702 | #endif |
| 703 | |
Suzuki K Poulose | c9460dc | 2018-11-30 17:18:00 +0000 | [diff] [blame] | 704 | const struct arm64_cpu_capabilities arm64_errata[] = { |
| 705 | #ifdef CONFIG_ARM64_WORKAROUND_CLEAN_CACHE |
Andre Przywara | c0a01b8 | 2014-11-14 15:54:12 +0000 | [diff] [blame] | 706 | { |
Suzuki K Poulose | c9460dc | 2018-11-30 17:18:00 +0000 | [diff] [blame] | 707 | .desc = "ARM errata 826319, 827319, 824069, 819472", |
Andre Przywara | c0a01b8 | 2014-11-14 15:54:12 +0000 | [diff] [blame] | 708 | .capability = ARM64_WORKAROUND_CLEAN_CACHE, |
Suzuki K Poulose | c9460dc | 2018-11-30 17:18:00 +0000 | [diff] [blame] | 709 | ERRATA_MIDR_RANGE_LIST(workaround_clean_cache), |
Dave Martin | c0cda3b | 2018-03-26 15:12:28 +0100 | [diff] [blame] | 710 | .cpu_enable = cpu_enable_cache_maint_trap, |
Andre Przywara | c0a01b8 | 2014-11-14 15:54:12 +0000 | [diff] [blame] | 711 | }, |
| 712 | #endif |
| 713 | #ifdef CONFIG_ARM64_ERRATUM_832075 |
Andre Przywara | 301bcfa | 2014-11-14 15:54:10 +0000 | [diff] [blame] | 714 | { |
Andre Przywara | 5afaa1f | 2014-11-14 15:54:11 +0000 | [diff] [blame] | 715 | /* Cortex-A57 r0p0 - r1p2 */ |
| 716 | .desc = "ARM erratum 832075", |
| 717 | .capability = ARM64_WORKAROUND_DEVICE_LOAD_ACQUIRE, |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 718 | ERRATA_MIDR_RANGE(MIDR_CORTEX_A57, |
| 719 | 0, 0, |
| 720 | 1, 2), |
Andre Przywara | 5afaa1f | 2014-11-14 15:54:11 +0000 | [diff] [blame] | 721 | }, |
Andre Przywara | c0a01b8 | 2014-11-14 15:54:12 +0000 | [diff] [blame] | 722 | #endif |
Marc Zyngier | 498cd5c | 2015-11-16 10:28:18 +0000 | [diff] [blame] | 723 | #ifdef CONFIG_ARM64_ERRATUM_834220 |
| 724 | { |
| 725 | /* Cortex-A57 r0p0 - r1p2 */ |
| 726 | .desc = "ARM erratum 834220", |
| 727 | .capability = ARM64_WORKAROUND_834220, |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 728 | ERRATA_MIDR_RANGE(MIDR_CORTEX_A57, |
| 729 | 0, 0, |
| 730 | 1, 2), |
Marc Zyngier | 498cd5c | 2015-11-16 10:28:18 +0000 | [diff] [blame] | 731 | }, |
| 732 | #endif |
Ard Biesheuvel | ca79acc | 2018-03-06 17:15:35 +0000 | [diff] [blame] | 733 | #ifdef CONFIG_ARM64_ERRATUM_843419 |
| 734 | { |
| 735 | /* Cortex-A53 r0p[01234] */ |
| 736 | .desc = "ARM erratum 843419", |
| 737 | .capability = ARM64_WORKAROUND_843419, |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 738 | ERRATA_MIDR_REV_RANGE(MIDR_CORTEX_A53, 0, 0, 4), |
Ard Biesheuvel | ca79acc | 2018-03-06 17:15:35 +0000 | [diff] [blame] | 739 | MIDR_FIXED(0x4, BIT(8)), |
Will Deacon | 905e8c5 | 2015-03-23 19:07:02 +0000 | [diff] [blame] | 740 | }, |
Robert Richter | 6d4e11c | 2015-09-21 22:58:35 +0200 | [diff] [blame] | 741 | #endif |
| 742 | #ifdef CONFIG_ARM64_ERRATUM_845719 |
| 743 | { |
| 744 | /* Cortex-A53 r0p[01234] */ |
| 745 | .desc = "ARM erratum 845719", |
| 746 | .capability = ARM64_WORKAROUND_845719, |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 747 | ERRATA_MIDR_REV_RANGE(MIDR_CORTEX_A53, 0, 0, 4), |
Marc Zyngier | 359b706 | 2015-03-27 13:09:23 +0000 | [diff] [blame] | 748 | }, |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 749 | #endif |
Robert Richter | 6d4e11c | 2015-09-21 22:58:35 +0200 | [diff] [blame] | 750 | #ifdef CONFIG_CAVIUM_ERRATUM_23154 |
| 751 | { |
| 752 | /* Cavium ThunderX, pass 1.x */ |
| 753 | .desc = "Cavium erratum 23154", |
| 754 | .capability = ARM64_WORKAROUND_CAVIUM_23154, |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 755 | ERRATA_MIDR_REV_RANGE(MIDR_THUNDERX, 0, 0, 1), |
Robert Richter | 6d4e11c | 2015-09-21 22:58:35 +0200 | [diff] [blame] | 756 | }, |
| 757 | #endif |
Andrew Pinski | 104a0c0 | 2016-02-24 17:44:57 -0800 | [diff] [blame] | 758 | #ifdef CONFIG_CAVIUM_ERRATUM_27456 |
| 759 | { |
Andrew Pinski | 104a0c0 | 2016-02-24 17:44:57 -0800 | [diff] [blame] | 760 | .desc = "Cavium erratum 27456", |
| 761 | .capability = ARM64_WORKAROUND_CAVIUM_27456, |
Suzuki K Poulose | f58cdf7 | 2018-11-30 17:18:01 +0000 | [diff] [blame] | 762 | ERRATA_MIDR_RANGE_LIST(cavium_erratum_27456_cpus), |
Ganapatrao Kulkarni | 47c459b | 2016-07-07 10:18:17 +0530 | [diff] [blame] | 763 | }, |
Andrew Pinski | 104a0c0 | 2016-02-24 17:44:57 -0800 | [diff] [blame] | 764 | #endif |
David Daney | 690a341 | 2017-06-09 12:49:48 +0100 | [diff] [blame] | 765 | #ifdef CONFIG_CAVIUM_ERRATUM_30115 |
| 766 | { |
David Daney | 690a341 | 2017-06-09 12:49:48 +0100 | [diff] [blame] | 767 | .desc = "Cavium erratum 30115", |
| 768 | .capability = ARM64_WORKAROUND_CAVIUM_30115, |
Suzuki K Poulose | f58cdf7 | 2018-11-30 17:18:01 +0000 | [diff] [blame] | 769 | ERRATA_MIDR_RANGE_LIST(cavium_erratum_30115_cpus), |
David Daney | 690a341 | 2017-06-09 12:49:48 +0100 | [diff] [blame] | 770 | }, |
| 771 | #endif |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 772 | { |
Will Deacon | 880f7cc | 2018-09-19 11:41:21 +0100 | [diff] [blame] | 773 | .desc = "Mismatched cache type (CTR_EL0)", |
Suzuki K Poulose | 314d53d | 2018-07-04 23:07:46 +0100 | [diff] [blame] | 774 | .capability = ARM64_MISMATCHED_CACHE_TYPE, |
| 775 | .matches = has_mismatched_cache_type, |
Suzuki K Poulose | 5b4747c | 2018-03-26 15:12:32 +0100 | [diff] [blame] | 776 | .type = ARM64_CPUCAP_LOCAL_CPU_ERRATUM, |
Dave Martin | c0cda3b | 2018-03-26 15:12:28 +0100 | [diff] [blame] | 777 | .cpu_enable = cpu_enable_trap_ctr_access, |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 778 | }, |
Christopher Covington | 38fd94b | 2017-02-08 15:08:37 -0500 | [diff] [blame] | 779 | #ifdef CONFIG_QCOM_FALKOR_ERRATUM_1003 |
| 780 | { |
Suzuki K Poulose | a3dcea2c | 2018-11-30 17:18:02 +0000 | [diff] [blame] | 781 | .desc = "Qualcomm Technologies Falkor/Kryo erratum 1003", |
Christopher Covington | 38fd94b | 2017-02-08 15:08:37 -0500 | [diff] [blame] | 782 | .capability = ARM64_WORKAROUND_QCOM_FALKOR_E1003, |
Will Deacon | 1e013d0 | 2018-12-12 15:53:54 +0000 | [diff] [blame] | 783 | .matches = cpucap_multi_entry_cap_matches, |
Suzuki K Poulose | a3dcea2c | 2018-11-30 17:18:02 +0000 | [diff] [blame] | 784 | .match_list = qcom_erratum_1003_list, |
Stephen Boyd | bb48711 | 2017-12-13 14:19:37 -0800 | [diff] [blame] | 785 | }, |
Christopher Covington | 38fd94b | 2017-02-08 15:08:37 -0500 | [diff] [blame] | 786 | #endif |
Catalin Marinas | ce8c80c | 2018-11-19 11:27:28 +0000 | [diff] [blame] | 787 | #ifdef CONFIG_ARM64_WORKAROUND_REPEAT_TLBI |
Christopher Covington | d9ff80f | 2017-01-31 12:50:19 -0500 | [diff] [blame] | 788 | { |
Catalin Marinas | ce8c80c | 2018-11-19 11:27:28 +0000 | [diff] [blame] | 789 | .desc = "Qualcomm erratum 1009, ARM erratum 1286807", |
Christopher Covington | d9ff80f | 2017-01-31 12:50:19 -0500 | [diff] [blame] | 790 | .capability = ARM64_WORKAROUND_REPEAT_TLBI, |
Catalin Marinas | ce8c80c | 2018-11-19 11:27:28 +0000 | [diff] [blame] | 791 | ERRATA_MIDR_RANGE_LIST(arm64_repeat_tlbi_cpus), |
Christopher Covington | d9ff80f | 2017-01-31 12:50:19 -0500 | [diff] [blame] | 792 | }, |
| 793 | #endif |
Marc Zyngier | eeb1efb | 2017-03-20 17:18:06 +0000 | [diff] [blame] | 794 | #ifdef CONFIG_ARM64_ERRATUM_858921 |
| 795 | { |
| 796 | /* Cortex-A73 all versions */ |
| 797 | .desc = "ARM erratum 858921", |
| 798 | .capability = ARM64_WORKAROUND_858921, |
Suzuki K Poulose | 5e7951c | 2018-03-26 15:12:43 +0100 | [diff] [blame] | 799 | ERRATA_MIDR_ALL_VERSIONS(MIDR_CORTEX_A73), |
Marc Zyngier | eeb1efb | 2017-03-20 17:18:06 +0000 | [diff] [blame] | 800 | }, |
| 801 | #endif |
Will Deacon | aa6acde | 2018-01-03 12:46:21 +0000 | [diff] [blame] | 802 | { |
| 803 | .capability = ARM64_HARDEN_BRANCH_PREDICTOR, |
Marc Zyngier | 73f3816 | 2019-04-15 16:21:23 -0500 | [diff] [blame] | 804 | .type = ARM64_CPUCAP_LOCAL_CPU_ERRATUM, |
| 805 | .matches = check_branch_predictor, |
Jayachandran C | f3d795d | 2018-01-19 04:22:47 -0800 | [diff] [blame] | 806 | }, |
Marc Zyngier | 4b472ff | 2018-02-15 11:49:20 +0000 | [diff] [blame] | 807 | #ifdef CONFIG_HARDEN_EL2_VECTORS |
| 808 | { |
Marc Zyngier | 8892b71 | 2018-04-10 11:36:43 +0100 | [diff] [blame] | 809 | .desc = "EL2 vector hardening", |
Marc Zyngier | 4b472ff | 2018-02-15 11:49:20 +0000 | [diff] [blame] | 810 | .capability = ARM64_HARDEN_EL2_VECTORS, |
Marc Zyngier | 8892b71 | 2018-04-10 11:36:43 +0100 | [diff] [blame] | 811 | ERRATA_MIDR_RANGE_LIST(arm64_harden_el2_vectors), |
Marc Zyngier | 4b472ff | 2018-02-15 11:49:20 +0000 | [diff] [blame] | 812 | }, |
| 813 | #endif |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 814 | { |
| 815 | .desc = "Speculative Store Bypass Disable", |
| 816 | .capability = ARM64_SSBD, |
| 817 | .type = ARM64_CPUCAP_LOCAL_CPU_ERRATUM, |
| 818 | .matches = has_ssbd_mitigation, |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 819 | .midr_range_list = arm64_ssb_cpus, |
Marc Zyngier | a725e3d | 2018-05-29 13:11:08 +0100 | [diff] [blame] | 820 | }, |
Marc Zyngier | a532508 | 2019-05-23 11:24:50 +0100 | [diff] [blame] | 821 | #ifdef CONFIG_ARM64_ERRATUM_1418040 |
Marc Zyngier | 95b861a4 | 2018-09-27 17:15:34 +0100 | [diff] [blame] | 822 | { |
Marc Zyngier | a532508 | 2019-05-23 11:24:50 +0100 | [diff] [blame] | 823 | .desc = "ARM erratum 1418040", |
| 824 | .capability = ARM64_WORKAROUND_1418040, |
| 825 | ERRATA_MIDR_RANGE_LIST(erratum_1418040_list), |
Marc Zyngier | 95b861a4 | 2018-09-27 17:15:34 +0100 | [diff] [blame] | 826 | }, |
| 827 | #endif |
Marc Zyngier | 8b2cca9 | 2018-12-06 17:31:23 +0000 | [diff] [blame] | 828 | #ifdef CONFIG_ARM64_ERRATUM_1165522 |
| 829 | { |
| 830 | /* Cortex-A76 r0p0 to r2p0 */ |
| 831 | .desc = "ARM erratum 1165522", |
| 832 | .capability = ARM64_WORKAROUND_1165522, |
| 833 | ERRATA_MIDR_RANGE(MIDR_CORTEX_A76, 0, 0, 2, 0), |
| 834 | }, |
| 835 | #endif |
Will Deacon | 969f5ea | 2019-04-29 13:03:57 +0100 | [diff] [blame] | 836 | #ifdef CONFIG_ARM64_ERRATUM_1463225 |
| 837 | { |
| 838 | .desc = "ARM erratum 1463225", |
| 839 | .capability = ARM64_WORKAROUND_1463225, |
| 840 | .type = ARM64_CPUCAP_LOCAL_CPU_ERRATUM, |
| 841 | .matches = has_cortex_a76_erratum_1463225, |
| 842 | }, |
| 843 | #endif |
Suzuki K Poulose | 116c81f | 2016-09-09 14:07:16 +0100 | [diff] [blame] | 844 | { |
Andre Przywara | e116a37 | 2014-11-14 15:54:09 +0000 | [diff] [blame] | 845 | } |
| 846 | }; |
Mian Yousaf Kaukab | 3891ebc | 2019-04-15 16:21:21 -0500 | [diff] [blame] | 847 | |
| 848 | ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, |
| 849 | char *buf) |
| 850 | { |
| 851 | return sprintf(buf, "Mitigation: __user pointer sanitization\n"); |
| 852 | } |
Jeremy Linton | d2532e2 | 2019-04-15 16:21:26 -0500 | [diff] [blame] | 853 | |
| 854 | ssize_t cpu_show_spectre_v2(struct device *dev, struct device_attribute *attr, |
| 855 | char *buf) |
| 856 | { |
| 857 | if (__spectrev2_safe) |
| 858 | return sprintf(buf, "Not affected\n"); |
| 859 | |
| 860 | if (__hardenbp_enab) |
| 861 | return sprintf(buf, "Mitigation: Branch predictor hardening\n"); |
| 862 | |
| 863 | return sprintf(buf, "Vulnerable\n"); |
| 864 | } |
Jeremy Linton | 526e065 | 2019-04-15 16:21:28 -0500 | [diff] [blame] | 865 | |
| 866 | ssize_t cpu_show_spec_store_bypass(struct device *dev, |
| 867 | struct device_attribute *attr, char *buf) |
| 868 | { |
| 869 | if (__ssb_safe) |
| 870 | return sprintf(buf, "Not affected\n"); |
| 871 | |
| 872 | switch (ssbd_state) { |
| 873 | case ARM64_SSBD_KERNEL: |
| 874 | case ARM64_SSBD_FORCE_ENABLE: |
| 875 | if (IS_ENABLED(CONFIG_ARM64_SSBD)) |
| 876 | return sprintf(buf, |
| 877 | "Mitigation: Speculative Store Bypass disabled via prctl\n"); |
| 878 | } |
| 879 | |
| 880 | return sprintf(buf, "Vulnerable\n"); |
| 881 | } |