1 // SPDX-License-Identifier: GPL-2.0
2 #include <linux/arm-smccc.h>
3 #include <linux/kernel.h>
4 #include <linux/psci.h>
8 #include <asm/cputype.h>
9 #include <asm/proc-fns.h>
10 #include <asm/spectre.h>
11 #include <asm/system_misc.h>
13 #ifdef CONFIG_ARM_PSCI
14 static int __maybe_unused spectre_v2_get_cpu_fw_mitigation_state(void)
16 struct arm_smccc_res res;
18 arm_smccc_1_1_invoke(ARM_SMCCC_ARCH_FEATURES_FUNC_ID,
19 ARM_SMCCC_ARCH_WORKAROUND_1, &res);
21 switch ((int)res.a0) {
22 case SMCCC_RET_SUCCESS:
23 return SPECTRE_MITIGATED;
25 case SMCCC_ARCH_WORKAROUND_RET_UNAFFECTED:
26 return SPECTRE_UNAFFECTED;
29 return SPECTRE_VULNERABLE;
33 static int __maybe_unused spectre_v2_get_cpu_fw_mitigation_state(void)
35 return SPECTRE_VULNERABLE;
39 #ifdef CONFIG_HARDEN_BRANCH_PREDICTOR
40 DEFINE_PER_CPU(harden_branch_predictor_fn_t, harden_branch_predictor_fn);
42 extern void cpu_v7_iciallu_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
43 extern void cpu_v7_bpiall_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
44 extern void cpu_v7_smc_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
45 extern void cpu_v7_hvc_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
47 static void harden_branch_predictor_bpiall(void)
49 write_sysreg(0, BPIALL);
52 static void harden_branch_predictor_iciallu(void)
54 write_sysreg(0, ICIALLU);
57 static void __maybe_unused call_smc_arch_workaround_1(void)
59 arm_smccc_1_1_smc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL);
62 static void __maybe_unused call_hvc_arch_workaround_1(void)
64 arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL);
67 static unsigned int spectre_v2_install_workaround(unsigned int method)
69 const char *spectre_v2_method = NULL;
70 int cpu = smp_processor_id();
72 if (per_cpu(harden_branch_predictor_fn, cpu))
73 return SPECTRE_MITIGATED;
76 case SPECTRE_V2_METHOD_BPIALL:
77 per_cpu(harden_branch_predictor_fn, cpu) =
78 harden_branch_predictor_bpiall;
79 spectre_v2_method = "BPIALL";
82 case SPECTRE_V2_METHOD_ICIALLU:
83 per_cpu(harden_branch_predictor_fn, cpu) =
84 harden_branch_predictor_iciallu;
85 spectre_v2_method = "ICIALLU";
88 case SPECTRE_V2_METHOD_HVC:
89 per_cpu(harden_branch_predictor_fn, cpu) =
90 call_hvc_arch_workaround_1;
91 cpu_do_switch_mm = cpu_v7_hvc_switch_mm;
92 spectre_v2_method = "hypervisor";
95 case SPECTRE_V2_METHOD_SMC:
96 per_cpu(harden_branch_predictor_fn, cpu) =
97 call_smc_arch_workaround_1;
98 cpu_do_switch_mm = cpu_v7_smc_switch_mm;
99 spectre_v2_method = "firmware";
103 if (spectre_v2_method)
104 pr_info("CPU%u: Spectre v2: using %s workaround\n",
105 smp_processor_id(), spectre_v2_method);
107 return SPECTRE_MITIGATED;
110 static unsigned int spectre_v2_install_workaround(unsigned int method)
112 pr_info_once("Spectre V2: workarounds disabled by configuration\n");
114 return SPECTRE_VULNERABLE;
118 static void cpu_v7_spectre_v2_init(void)
120 unsigned int state, method = 0;
122 switch (read_cpuid_part()) {
123 case ARM_CPU_PART_CORTEX_A8:
124 case ARM_CPU_PART_CORTEX_A9:
125 case ARM_CPU_PART_CORTEX_A12:
126 case ARM_CPU_PART_CORTEX_A17:
127 case ARM_CPU_PART_CORTEX_A73:
128 case ARM_CPU_PART_CORTEX_A75:
129 state = SPECTRE_MITIGATED;
130 method = SPECTRE_V2_METHOD_BPIALL;
133 case ARM_CPU_PART_CORTEX_A15:
134 case ARM_CPU_PART_BRAHMA_B15:
135 state = SPECTRE_MITIGATED;
136 method = SPECTRE_V2_METHOD_ICIALLU;
139 case ARM_CPU_PART_BRAHMA_B53:
140 /* Requires no workaround */
141 state = SPECTRE_UNAFFECTED;
145 /* Other ARM CPUs require no workaround */
146 if (read_cpuid_implementor() == ARM_CPU_IMP_ARM) {
147 state = SPECTRE_UNAFFECTED;
151 /* Cortex A57/A72 require firmware workaround */
152 case ARM_CPU_PART_CORTEX_A57:
153 case ARM_CPU_PART_CORTEX_A72: {
154 struct arm_smccc_res res;
156 state = spectre_v2_get_cpu_fw_mitigation_state();
157 if (state != SPECTRE_MITIGATED)
160 if (psci_ops.smccc_version == SMCCC_VERSION_1_0)
163 switch (psci_ops.conduit) {
164 case PSCI_CONDUIT_HVC:
165 arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID,
166 ARM_SMCCC_ARCH_WORKAROUND_1, &res);
167 if ((int)res.a0 != 0)
169 method = SPECTRE_V2_METHOD_HVC;
172 case PSCI_CONDUIT_SMC:
173 arm_smccc_1_1_smc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID,
174 ARM_SMCCC_ARCH_WORKAROUND_1, &res);
175 if ((int)res.a0 != 0)
177 method = SPECTRE_V2_METHOD_SMC;
181 state = SPECTRE_VULNERABLE;
187 if (state == SPECTRE_MITIGATED)
188 state = spectre_v2_install_workaround(method);
190 spectre_v2_update_state(state, method);
193 #ifdef CONFIG_HARDEN_BRANCH_HISTORY
194 static int spectre_bhb_method;
196 static const char *spectre_bhb_method_name(int method)
199 case SPECTRE_V2_METHOD_LOOP8:
202 case SPECTRE_V2_METHOD_BPIALL:
210 static int spectre_bhb_install_workaround(int method)
212 if (spectre_bhb_method != method) {
213 if (spectre_bhb_method) {
214 pr_err("CPU%u: Spectre BHB: method disagreement, system vulnerable\n",
217 return SPECTRE_VULNERABLE;
220 if (spectre_bhb_update_vectors(method) == SPECTRE_VULNERABLE)
221 return SPECTRE_VULNERABLE;
223 spectre_bhb_method = method;
225 pr_info("CPU%u: Spectre BHB: enabling %s workaround for all CPUs\n",
226 smp_processor_id(), spectre_bhb_method_name(method));
229 return SPECTRE_MITIGATED;
232 static int spectre_bhb_install_workaround(int method)
234 return SPECTRE_VULNERABLE;
238 static void cpu_v7_spectre_bhb_init(void)
240 unsigned int state, method = 0;
242 switch (read_cpuid_part()) {
243 case ARM_CPU_PART_CORTEX_A15:
244 case ARM_CPU_PART_BRAHMA_B15:
245 case ARM_CPU_PART_CORTEX_A57:
246 case ARM_CPU_PART_CORTEX_A72:
247 state = SPECTRE_MITIGATED;
248 method = SPECTRE_V2_METHOD_LOOP8;
251 case ARM_CPU_PART_CORTEX_A73:
252 case ARM_CPU_PART_CORTEX_A75:
253 state = SPECTRE_MITIGATED;
254 method = SPECTRE_V2_METHOD_BPIALL;
258 state = SPECTRE_UNAFFECTED;
262 if (state == SPECTRE_MITIGATED)
263 state = spectre_bhb_install_workaround(method);
265 spectre_v2_update_state(state, method);
268 static __maybe_unused bool cpu_v7_check_auxcr_set(bool *warned,
269 u32 mask, const char *msg)
273 asm("mrc p15, 0, %0, c1, c0, 1" : "=r" (aux_cr));
275 if ((aux_cr & mask) != mask) {
277 pr_err("CPU%u: %s", smp_processor_id(), msg);
284 static DEFINE_PER_CPU(bool, spectre_warned);
286 static bool check_spectre_auxcr(bool *warned, u32 bit)
288 return IS_ENABLED(CONFIG_HARDEN_BRANCH_PREDICTOR) &&
289 cpu_v7_check_auxcr_set(warned, bit,
290 "Spectre v2: firmware did not set auxiliary control register IBE bit, system vulnerable\n");
293 void cpu_v7_ca8_ibe(void)
295 if (check_spectre_auxcr(this_cpu_ptr(&spectre_warned), BIT(6)))
296 cpu_v7_spectre_v2_init();
299 void cpu_v7_ca15_ibe(void)
301 if (check_spectre_auxcr(this_cpu_ptr(&spectre_warned), BIT(0)))
302 cpu_v7_spectre_v2_init();
303 cpu_v7_spectre_bhb_init();
306 void cpu_v7_bugs_init(void)
308 cpu_v7_spectre_v2_init();
309 cpu_v7_spectre_bhb_init();