Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags   |
// SPDX-License-Identifier: GPL-2.0
#include <linux/arm-smccc.h>
#include <linux/kernel.h>
#include <linux/smp.h>
#include <asm/cp15.h>
#include <asm/cputype.h>
#include <asm/proc-fns.h>
#include <asm/spectre.h>
#include <asm/system_misc.h>
#ifdef CONFIG_ARM_PSCI
static int __maybe_unused spectre_v2_get_cpu_fw_mitigation_state(void)
{
<------>struct arm_smccc_res res;
<------>arm_smccc_1_1_invoke(ARM_SMCCC_ARCH_FEATURES_FUNC_ID,
<------><------><------> ARM_SMCCC_ARCH_WORKAROUND_1, &res);
<------>switch ((int)res.a0) {
<------>case SMCCC_RET_SUCCESS:
<------><------>return SPECTRE_MITIGATED;
<------>case SMCCC_ARCH_WORKAROUND_RET_UNAFFECTED:
<------><------>return SPECTRE_UNAFFECTED;
<------>default:
<------><------>return SPECTRE_VULNERABLE;
<------>}
}
#else
static int __maybe_unused spectre_v2_get_cpu_fw_mitigation_state(void)
{
<------>return SPECTRE_VULNERABLE;
}
#endif
#ifdef CONFIG_HARDEN_BRANCH_PREDICTOR
DEFINE_PER_CPU(harden_branch_predictor_fn_t, harden_branch_predictor_fn);
extern void cpu_v7_iciallu_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
extern void cpu_v7_bpiall_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
extern void cpu_v7_smc_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
extern void cpu_v7_hvc_switch_mm(phys_addr_t pgd_phys, struct mm_struct *mm);
static void harden_branch_predictor_bpiall(void)
{
<------>write_sysreg(0, BPIALL);
}
static void harden_branch_predictor_iciallu(void)
{
<------>write_sysreg(0, ICIALLU);
}
static void __maybe_unused call_smc_arch_workaround_1(void)
{
<------>arm_smccc_1_1_smc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL);
}
static void __maybe_unused call_hvc_arch_workaround_1(void)
{
<------>arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL);
}
static unsigned int spectre_v2_install_workaround(unsigned int method)
{
<------>const char *spectre_v2_method = NULL;
<------>int cpu = smp_processor_id();
<------>if (per_cpu(harden_branch_predictor_fn, cpu))
<------><------>return SPECTRE_MITIGATED;
<------>switch (method) {
<------>case SPECTRE_V2_METHOD_BPIALL:
<------><------>per_cpu(harden_branch_predictor_fn, cpu) =
<------><------><------>harden_branch_predictor_bpiall;
<------><------>spectre_v2_method = "BPIALL";
<------><------>break;
<------>case SPECTRE_V2_METHOD_ICIALLU:
<------><------>per_cpu(harden_branch_predictor_fn, cpu) =
<------><------><------>harden_branch_predictor_iciallu;
<------><------>spectre_v2_method = "ICIALLU";
<------><------>break;
<------>case SPECTRE_V2_METHOD_HVC:
<------><------>per_cpu(harden_branch_predictor_fn, cpu) =
<------><------><------>call_hvc_arch_workaround_1;
<------><------>cpu_do_switch_mm = cpu_v7_hvc_switch_mm;
<------><------>spectre_v2_method = "hypervisor";
<------><------>break;
<------>case SPECTRE_V2_METHOD_SMC:
<------><------>per_cpu(harden_branch_predictor_fn, cpu) =
<------><------><------>call_smc_arch_workaround_1;
<------><------>cpu_do_switch_mm = cpu_v7_smc_switch_mm;
<------><------>spectre_v2_method = "firmware";
<------><------>break;
<------>}
<------>if (spectre_v2_method)
<------><------>pr_info("CPU%u: Spectre v2: using %s workaround\n",
<------><------><------>smp_processor_id(), spectre_v2_method);
<------>return SPECTRE_MITIGATED;
}
#else
static unsigned int spectre_v2_install_workaround(unsigned int method)
{
<------>pr_info("CPU%u: Spectre V2: workarounds disabled by configuration\n",
<------><------>smp_processor_id());
<------>return SPECTRE_VULNERABLE;
}
#endif
static void cpu_v7_spectre_v2_init(void)
{
<------>unsigned int state, method = 0;
<------>switch (read_cpuid_part()) {
<------>case ARM_CPU_PART_CORTEX_A8:
<------>case ARM_CPU_PART_CORTEX_A9:
<------>case ARM_CPU_PART_CORTEX_A12:
<------>case ARM_CPU_PART_CORTEX_A17:
<------>case ARM_CPU_PART_CORTEX_A73:
<------>case ARM_CPU_PART_CORTEX_A75:
<------><------>state = SPECTRE_MITIGATED;
<------><------>method = SPECTRE_V2_METHOD_BPIALL;
<------><------>break;
<------>case ARM_CPU_PART_CORTEX_A15:
<------>case ARM_CPU_PART_BRAHMA_B15:
<------><------>state = SPECTRE_MITIGATED;
<------><------>method = SPECTRE_V2_METHOD_ICIALLU;
<------><------>break;
<------>case ARM_CPU_PART_BRAHMA_B53:
<------><------>/* Requires no workaround */
<------><------>state = SPECTRE_UNAFFECTED;
<------><------>break;
<------>default:
<------><------>/* Other ARM CPUs require no workaround */
<------><------>if (read_cpuid_implementor() == ARM_CPU_IMP_ARM) {
<------><------><------>state = SPECTRE_UNAFFECTED;
<------><------><------>break;
<------><------>}
<------><------>fallthrough;
<------>/* Cortex A57/A72 require firmware workaround */
<------>case ARM_CPU_PART_CORTEX_A57:
<------>case ARM_CPU_PART_CORTEX_A72:
<------><------>state = spectre_v2_get_cpu_fw_mitigation_state();
<------><------>if (state != SPECTRE_MITIGATED)
<------><------><------>break;
<------><------>switch (arm_smccc_1_1_get_conduit()) {
<------><------>case SMCCC_CONDUIT_HVC:
<------><------><------>method = SPECTRE_V2_METHOD_HVC;
<------><------><------>break;
<------><------>case SMCCC_CONDUIT_SMC:
<------><------><------>method = SPECTRE_V2_METHOD_SMC;
<------><------><------>break;
<------><------>default:
<------><------><------>state = SPECTRE_VULNERABLE;
<------><------><------>break;
<------><------>}
<------>}
<------>if (state == SPECTRE_MITIGATED)
<------><------>state = spectre_v2_install_workaround(method);
<------>spectre_v2_update_state(state, method);
}
#ifdef CONFIG_HARDEN_BRANCH_HISTORY
static int spectre_bhb_method;
static const char *spectre_bhb_method_name(int method)
{
<------>switch (method) {
<------>case SPECTRE_V2_METHOD_LOOP8:
<------><------>return "loop";
<------>case SPECTRE_V2_METHOD_BPIALL:
<------><------>return "BPIALL";
<------>default:
<------><------>return "unknown";
<------>}
}
static int spectre_bhb_install_workaround(int method)
{
<------>if (spectre_bhb_method != method) {
<------><------>if (spectre_bhb_method) {
<------><------><------>pr_err("CPU%u: Spectre BHB: method disagreement, system vulnerable\n",
<------><------><------> smp_processor_id());
<------><------><------>return SPECTRE_VULNERABLE;
<------><------>}
<------><------>if (spectre_bhb_update_vectors(method) == SPECTRE_VULNERABLE)
<------><------><------>return SPECTRE_VULNERABLE;
<------><------>spectre_bhb_method = method;
<------>}
<------>pr_info("CPU%u: Spectre BHB: using %s workaround\n",
<------><------>smp_processor_id(), spectre_bhb_method_name(method));
<------>return SPECTRE_MITIGATED;
}
#else
static int spectre_bhb_install_workaround(int method)
{
<------>return SPECTRE_VULNERABLE;
}
#endif
static void cpu_v7_spectre_bhb_init(void)
{
<------>unsigned int state, method = 0;
<------>switch (read_cpuid_part()) {
<------>case ARM_CPU_PART_CORTEX_A15:
<------>case ARM_CPU_PART_BRAHMA_B15:
<------>case ARM_CPU_PART_CORTEX_A57:
<------>case ARM_CPU_PART_CORTEX_A72:
<------><------>state = SPECTRE_MITIGATED;
<------><------>method = SPECTRE_V2_METHOD_LOOP8;
<------><------>break;
<------>case ARM_CPU_PART_CORTEX_A73:
<------>case ARM_CPU_PART_CORTEX_A75:
<------><------>state = SPECTRE_MITIGATED;
<------><------>method = SPECTRE_V2_METHOD_BPIALL;
<------><------>break;
<------>default:
<------><------>state = SPECTRE_UNAFFECTED;
<------><------>break;
<------>}
<------>if (state == SPECTRE_MITIGATED)
<------><------>state = spectre_bhb_install_workaround(method);
<------>spectre_v2_update_state(state, method);
}
static __maybe_unused bool cpu_v7_check_auxcr_set(bool *warned,
<------><------><------><------><------><------> u32 mask, const char *msg)
{
<------>u32 aux_cr;
<------>asm("mrc p15, 0, %0, c1, c0, 1" : "=r" (aux_cr));
<------>if ((aux_cr & mask) != mask) {
<------><------>if (!*warned)
<------><------><------>pr_err("CPU%u: %s", smp_processor_id(), msg);
<------><------>*warned = true;
<------><------>return false;
<------>}
<------>return true;
}
static DEFINE_PER_CPU(bool, spectre_warned);
static bool check_spectre_auxcr(bool *warned, u32 bit)
{
<------>return IS_ENABLED(CONFIG_HARDEN_BRANCH_PREDICTOR) &&
<------><------>cpu_v7_check_auxcr_set(warned, bit,
<------><------><------><------> "Spectre v2: firmware did not set auxiliary control register IBE bit, system vulnerable\n");
}
void cpu_v7_ca8_ibe(void)
{
<------>if (check_spectre_auxcr(this_cpu_ptr(&spectre_warned), BIT(6)))
<------><------>cpu_v7_spectre_v2_init();
}
void cpu_v7_ca15_ibe(void)
{
<------>if (check_spectre_auxcr(this_cpu_ptr(&spectre_warned), BIT(0)))
<------><------>cpu_v7_spectre_v2_init();
}
void cpu_v7_bugs_init(void)
{
<------>cpu_v7_spectre_v2_init();
<------>cpu_v7_spectre_bhb_init();
}