cpu_errata.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. /*
  2. * Contains CPU specific errata definitions
  3. *
  4. * Copyright (C) 2014 ARM Ltd.
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License version 2 as
  8. * published by the Free Software Foundation.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. */
  18. #include <linux/types.h>
  19. #include <asm/cpu.h>
  20. #include <asm/cputype.h>
  21. #include <asm/cpufeature.h>
  22. static bool __maybe_unused
  23. is_affected_midr_range(const struct arm64_cpu_capabilities *entry, int scope)
  24. {
  25. WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible());
  26. return MIDR_IS_CPU_MODEL_RANGE(read_cpuid_id(), entry->midr_model,
  27. entry->midr_range_min,
  28. entry->midr_range_max);
  29. }
  30. static bool __maybe_unused
  31. is_kryo_midr(const struct arm64_cpu_capabilities *entry, int scope)
  32. {
  33. u32 model;
  34. WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible());
  35. model = read_cpuid_id();
  36. model &= MIDR_IMPLEMENTOR_MASK | (0xf00 << MIDR_PARTNUM_SHIFT) |
  37. MIDR_ARCHITECTURE_MASK;
  38. return model == entry->midr_model;
  39. }
  40. static bool
  41. has_mismatched_cache_line_size(const struct arm64_cpu_capabilities *entry,
  42. int scope)
  43. {
  44. WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible());
  45. return (read_cpuid_cachetype() & arm64_ftr_reg_ctrel0.strict_mask) !=
  46. (arm64_ftr_reg_ctrel0.sys_val & arm64_ftr_reg_ctrel0.strict_mask);
  47. }
  48. static int cpu_enable_trap_ctr_access(void *__unused)
  49. {
  50. /* Clear SCTLR_EL1.UCT */
  51. config_sctlr_el1(SCTLR_EL1_UCT, 0);
  52. return 0;
  53. }
  54. #ifdef CONFIG_HARDEN_BRANCH_PREDICTOR
  55. #include <asm/mmu_context.h>
  56. #include <asm/cacheflush.h>
  57. DEFINE_PER_CPU_READ_MOSTLY(struct bp_hardening_data, bp_hardening_data);
  58. #ifdef CONFIG_KVM
  59. extern char __qcom_hyp_sanitize_link_stack_start[];
  60. extern char __qcom_hyp_sanitize_link_stack_end[];
  61. extern char __smccc_workaround_1_smc_start[];
  62. extern char __smccc_workaround_1_smc_end[];
  63. extern char __smccc_workaround_1_hvc_start[];
  64. extern char __smccc_workaround_1_hvc_end[];
  65. static void __copy_hyp_vect_bpi(int slot, const char *hyp_vecs_start,
  66. const char *hyp_vecs_end)
  67. {
  68. void *dst = lm_alias(__bp_harden_hyp_vecs_start + slot * SZ_2K);
  69. int i;
  70. for (i = 0; i < SZ_2K; i += 0x80)
  71. memcpy(dst + i, hyp_vecs_start, hyp_vecs_end - hyp_vecs_start);
  72. flush_icache_range((uintptr_t)dst, (uintptr_t)dst + SZ_2K);
  73. }
  74. static void __install_bp_hardening_cb(bp_hardening_cb_t fn,
  75. const char *hyp_vecs_start,
  76. const char *hyp_vecs_end)
  77. {
  78. static int last_slot = -1;
  79. static DEFINE_SPINLOCK(bp_lock);
  80. int cpu, slot = -1;
  81. spin_lock(&bp_lock);
  82. for_each_possible_cpu(cpu) {
  83. if (per_cpu(bp_hardening_data.fn, cpu) == fn) {
  84. slot = per_cpu(bp_hardening_data.hyp_vectors_slot, cpu);
  85. break;
  86. }
  87. }
  88. if (slot == -1) {
  89. last_slot++;
  90. BUG_ON(((__bp_harden_hyp_vecs_end - __bp_harden_hyp_vecs_start)
  91. / SZ_2K) <= last_slot);
  92. slot = last_slot;
  93. __copy_hyp_vect_bpi(slot, hyp_vecs_start, hyp_vecs_end);
  94. }
  95. __this_cpu_write(bp_hardening_data.hyp_vectors_slot, slot);
  96. __this_cpu_write(bp_hardening_data.fn, fn);
  97. spin_unlock(&bp_lock);
  98. }
  99. #else
  100. #define __qcom_hyp_sanitize_link_stack_start NULL
  101. #define __qcom_hyp_sanitize_link_stack_end NULL
  102. #define __smccc_workaround_1_smc_start NULL
  103. #define __smccc_workaround_1_smc_end NULL
  104. #define __smccc_workaround_1_hvc_start NULL
  105. #define __smccc_workaround_1_hvc_end NULL
  106. static void __install_bp_hardening_cb(bp_hardening_cb_t fn,
  107. const char *hyp_vecs_start,
  108. const char *hyp_vecs_end)
  109. {
  110. __this_cpu_write(bp_hardening_data.fn, fn);
  111. }
  112. #endif /* CONFIG_KVM */
  113. static void install_bp_hardening_cb(const struct arm64_cpu_capabilities *entry,
  114. bp_hardening_cb_t fn,
  115. const char *hyp_vecs_start,
  116. const char *hyp_vecs_end)
  117. {
  118. u64 pfr0;
  119. if (!entry->matches(entry, SCOPE_LOCAL_CPU))
  120. return;
  121. pfr0 = read_cpuid(ID_AA64PFR0_EL1);
  122. if (cpuid_feature_extract_unsigned_field(pfr0, ID_AA64PFR0_CSV2_SHIFT))
  123. return;
  124. __install_bp_hardening_cb(fn, hyp_vecs_start, hyp_vecs_end);
  125. }
  126. #include <uapi/linux/psci.h>
  127. #include <linux/arm-smccc.h>
  128. #include <linux/psci.h>
  129. static void call_smc_arch_workaround_1(void)
  130. {
  131. arm_smccc_1_1_smc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL);
  132. }
  133. static void call_hvc_arch_workaround_1(void)
  134. {
  135. arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_WORKAROUND_1, NULL);
  136. }
  137. static int enable_smccc_arch_workaround_1(void *data)
  138. {
  139. const struct arm64_cpu_capabilities *entry = data;
  140. bp_hardening_cb_t cb;
  141. void *smccc_start, *smccc_end;
  142. struct arm_smccc_res res;
  143. if (!entry->matches(entry, SCOPE_LOCAL_CPU))
  144. return 0;
  145. if (psci_ops.smccc_version == SMCCC_VERSION_1_0)
  146. return 0;
  147. switch (psci_ops.conduit) {
  148. case PSCI_CONDUIT_HVC:
  149. arm_smccc_1_1_hvc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID,
  150. ARM_SMCCC_ARCH_WORKAROUND_1, &res);
  151. if ((int)res.a0 < 0)
  152. return 0;
  153. cb = call_hvc_arch_workaround_1;
  154. smccc_start = __smccc_workaround_1_hvc_start;
  155. smccc_end = __smccc_workaround_1_hvc_end;
  156. break;
  157. case PSCI_CONDUIT_SMC:
  158. arm_smccc_1_1_smc(ARM_SMCCC_ARCH_FEATURES_FUNC_ID,
  159. ARM_SMCCC_ARCH_WORKAROUND_1, &res);
  160. if ((int)res.a0 < 0)
  161. return 0;
  162. cb = call_smc_arch_workaround_1;
  163. smccc_start = __smccc_workaround_1_smc_start;
  164. smccc_end = __smccc_workaround_1_smc_end;
  165. break;
  166. default:
  167. return 0;
  168. }
  169. install_bp_hardening_cb(entry, cb, smccc_start, smccc_end);
  170. return 0;
  171. }
  172. static void qcom_link_stack_sanitization(void)
  173. {
  174. u64 tmp;
  175. asm volatile("mov %0, x30 \n"
  176. ".rept 16 \n"
  177. "bl . + 4 \n"
  178. ".endr \n"
  179. "mov x30, %0 \n"
  180. : "=&r" (tmp));
  181. }
  182. static int qcom_enable_link_stack_sanitization(void *data)
  183. {
  184. const struct arm64_cpu_capabilities *entry = data;
  185. install_bp_hardening_cb(entry, qcom_link_stack_sanitization,
  186. __qcom_hyp_sanitize_link_stack_start,
  187. __qcom_hyp_sanitize_link_stack_end);
  188. return 0;
  189. }
  190. #endif /* CONFIG_HARDEN_BRANCH_PREDICTOR */
  191. #define MIDR_RANGE(model, min, max) \
  192. .def_scope = SCOPE_LOCAL_CPU, \
  193. .matches = is_affected_midr_range, \
  194. .midr_model = model, \
  195. .midr_range_min = min, \
  196. .midr_range_max = max
  197. #define MIDR_ALL_VERSIONS(model) \
  198. .def_scope = SCOPE_LOCAL_CPU, \
  199. .matches = is_affected_midr_range, \
  200. .midr_model = model, \
  201. .midr_range_min = 0, \
  202. .midr_range_max = (MIDR_VARIANT_MASK | MIDR_REVISION_MASK)
  203. const struct arm64_cpu_capabilities arm64_errata[] = {
  204. #if defined(CONFIG_ARM64_ERRATUM_826319) || \
  205. defined(CONFIG_ARM64_ERRATUM_827319) || \
  206. defined(CONFIG_ARM64_ERRATUM_824069)
  207. {
  208. /* Cortex-A53 r0p[012] */
  209. .desc = "ARM errata 826319, 827319, 824069",
  210. .capability = ARM64_WORKAROUND_CLEAN_CACHE,
  211. MIDR_RANGE(MIDR_CORTEX_A53, 0x00, 0x02),
  212. .enable = cpu_enable_cache_maint_trap,
  213. },
  214. #endif
  215. #ifdef CONFIG_ARM64_ERRATUM_819472
  216. {
  217. /* Cortex-A53 r0p[01] */
  218. .desc = "ARM errata 819472",
  219. .capability = ARM64_WORKAROUND_CLEAN_CACHE,
  220. MIDR_RANGE(MIDR_CORTEX_A53, 0x00, 0x01),
  221. .enable = cpu_enable_cache_maint_trap,
  222. },
  223. #endif
  224. #ifdef CONFIG_ARM64_ERRATUM_832075
  225. {
  226. /* Cortex-A57 r0p0 - r1p2 */
  227. .desc = "ARM erratum 832075",
  228. .capability = ARM64_WORKAROUND_DEVICE_LOAD_ACQUIRE,
  229. MIDR_RANGE(MIDR_CORTEX_A57,
  230. MIDR_CPU_VAR_REV(0, 0),
  231. MIDR_CPU_VAR_REV(1, 2)),
  232. },
  233. #endif
  234. #ifdef CONFIG_ARM64_ERRATUM_834220
  235. {
  236. /* Cortex-A57 r0p0 - r1p2 */
  237. .desc = "ARM erratum 834220",
  238. .capability = ARM64_WORKAROUND_834220,
  239. MIDR_RANGE(MIDR_CORTEX_A57,
  240. MIDR_CPU_VAR_REV(0, 0),
  241. MIDR_CPU_VAR_REV(1, 2)),
  242. },
  243. #endif
  244. #ifdef CONFIG_ARM64_ERRATUM_845719
  245. {
  246. /* Cortex-A53 r0p[01234] */
  247. .desc = "ARM erratum 845719",
  248. .capability = ARM64_WORKAROUND_845719,
  249. MIDR_RANGE(MIDR_CORTEX_A53, 0x00, 0x04),
  250. },
  251. #endif
  252. #ifdef CONFIG_CAVIUM_ERRATUM_23154
  253. {
  254. /* Cavium ThunderX, pass 1.x */
  255. .desc = "Cavium erratum 23154",
  256. .capability = ARM64_WORKAROUND_CAVIUM_23154,
  257. MIDR_RANGE(MIDR_THUNDERX, 0x00, 0x01),
  258. },
  259. #endif
  260. #ifdef CONFIG_CAVIUM_ERRATUM_27456
  261. {
  262. /* Cavium ThunderX, T88 pass 1.x - 2.1 */
  263. .desc = "Cavium erratum 27456",
  264. .capability = ARM64_WORKAROUND_CAVIUM_27456,
  265. MIDR_RANGE(MIDR_THUNDERX,
  266. MIDR_CPU_VAR_REV(0, 0),
  267. MIDR_CPU_VAR_REV(1, 1)),
  268. },
  269. {
  270. /* Cavium ThunderX, T81 pass 1.0 */
  271. .desc = "Cavium erratum 27456",
  272. .capability = ARM64_WORKAROUND_CAVIUM_27456,
  273. MIDR_RANGE(MIDR_THUNDERX_81XX, 0x00, 0x00),
  274. },
  275. #endif
  276. #ifdef CONFIG_CAVIUM_ERRATUM_30115
  277. {
  278. /* Cavium ThunderX, T88 pass 1.x - 2.2 */
  279. .desc = "Cavium erratum 30115",
  280. .capability = ARM64_WORKAROUND_CAVIUM_30115,
  281. MIDR_RANGE(MIDR_THUNDERX, 0x00,
  282. (1 << MIDR_VARIANT_SHIFT) | 2),
  283. },
  284. {
  285. /* Cavium ThunderX, T81 pass 1.0 - 1.2 */
  286. .desc = "Cavium erratum 30115",
  287. .capability = ARM64_WORKAROUND_CAVIUM_30115,
  288. MIDR_RANGE(MIDR_THUNDERX_81XX, 0x00, 0x02),
  289. },
  290. {
  291. /* Cavium ThunderX, T83 pass 1.0 */
  292. .desc = "Cavium erratum 30115",
  293. .capability = ARM64_WORKAROUND_CAVIUM_30115,
  294. MIDR_RANGE(MIDR_THUNDERX_83XX, 0x00, 0x00),
  295. },
  296. #endif
  297. {
  298. .desc = "Mismatched cache line size",
  299. .capability = ARM64_MISMATCHED_CACHE_LINE_SIZE,
  300. .matches = has_mismatched_cache_line_size,
  301. .def_scope = SCOPE_LOCAL_CPU,
  302. .enable = cpu_enable_trap_ctr_access,
  303. },
  304. #ifdef CONFIG_QCOM_FALKOR_ERRATUM_1003
  305. {
  306. .desc = "Qualcomm Technologies Falkor erratum 1003",
  307. .capability = ARM64_WORKAROUND_QCOM_FALKOR_E1003,
  308. MIDR_RANGE(MIDR_QCOM_FALKOR_V1,
  309. MIDR_CPU_VAR_REV(0, 0),
  310. MIDR_CPU_VAR_REV(0, 0)),
  311. },
  312. {
  313. .desc = "Qualcomm Technologies Kryo erratum 1003",
  314. .capability = ARM64_WORKAROUND_QCOM_FALKOR_E1003,
  315. .def_scope = SCOPE_LOCAL_CPU,
  316. .midr_model = MIDR_QCOM_KRYO,
  317. .matches = is_kryo_midr,
  318. },
  319. #endif
  320. #ifdef CONFIG_QCOM_FALKOR_ERRATUM_1009
  321. {
  322. .desc = "Qualcomm Technologies Falkor erratum 1009",
  323. .capability = ARM64_WORKAROUND_REPEAT_TLBI,
  324. MIDR_RANGE(MIDR_QCOM_FALKOR_V1,
  325. MIDR_CPU_VAR_REV(0, 0),
  326. MIDR_CPU_VAR_REV(0, 0)),
  327. },
  328. #endif
  329. #ifdef CONFIG_ARM64_ERRATUM_858921
  330. {
  331. /* Cortex-A73 all versions */
  332. .desc = "ARM erratum 858921",
  333. .capability = ARM64_WORKAROUND_858921,
  334. MIDR_ALL_VERSIONS(MIDR_CORTEX_A73),
  335. },
  336. #endif
  337. #ifdef CONFIG_HARDEN_BRANCH_PREDICTOR
  338. {
  339. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  340. MIDR_ALL_VERSIONS(MIDR_CORTEX_A57),
  341. .enable = enable_smccc_arch_workaround_1,
  342. },
  343. {
  344. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  345. MIDR_ALL_VERSIONS(MIDR_CORTEX_A72),
  346. .enable = enable_smccc_arch_workaround_1,
  347. },
  348. {
  349. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  350. MIDR_ALL_VERSIONS(MIDR_CORTEX_A73),
  351. .enable = enable_smccc_arch_workaround_1,
  352. },
  353. {
  354. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  355. MIDR_ALL_VERSIONS(MIDR_CORTEX_A75),
  356. .enable = enable_smccc_arch_workaround_1,
  357. },
  358. {
  359. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  360. MIDR_ALL_VERSIONS(MIDR_QCOM_FALKOR_V1),
  361. .enable = qcom_enable_link_stack_sanitization,
  362. },
  363. {
  364. .capability = ARM64_HARDEN_BP_POST_GUEST_EXIT,
  365. MIDR_ALL_VERSIONS(MIDR_QCOM_FALKOR_V1),
  366. },
  367. {
  368. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  369. MIDR_ALL_VERSIONS(MIDR_QCOM_FALKOR),
  370. .enable = qcom_enable_link_stack_sanitization,
  371. },
  372. {
  373. .capability = ARM64_HARDEN_BP_POST_GUEST_EXIT,
  374. MIDR_ALL_VERSIONS(MIDR_QCOM_FALKOR),
  375. },
  376. {
  377. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  378. MIDR_ALL_VERSIONS(MIDR_BRCM_VULCAN),
  379. .enable = enable_smccc_arch_workaround_1,
  380. },
  381. {
  382. .capability = ARM64_HARDEN_BRANCH_PREDICTOR,
  383. MIDR_ALL_VERSIONS(MIDR_CAVIUM_THUNDERX2),
  384. .enable = enable_smccc_arch_workaround_1,
  385. },
  386. #endif
  387. {
  388. }
  389. };
  390. /*
  391. * The CPU Errata work arounds are detected and applied at boot time
  392. * and the related information is freed soon after. If the new CPU requires
  393. * an errata not detected at boot, fail this CPU.
  394. */
  395. void verify_local_cpu_errata_workarounds(void)
  396. {
  397. const struct arm64_cpu_capabilities *caps = arm64_errata;
  398. for (; caps->matches; caps++) {
  399. if (cpus_have_cap(caps->capability)) {
  400. if (caps->enable)
  401. caps->enable((void *)caps);
  402. } else if (caps->matches(caps, SCOPE_LOCAL_CPU)) {
  403. pr_crit("CPU%d: Requires work around for %s, not detected"
  404. " at boot time\n",
  405. smp_processor_id(),
  406. caps->desc ? : "an erratum");
  407. cpu_die_early();
  408. }
  409. }
  410. }
  411. void update_cpu_errata_workarounds(void)
  412. {
  413. update_cpu_capabilities(arm64_errata, "enabling workaround for");
  414. }
  415. void __init enable_errata_workarounds(void)
  416. {
  417. enable_cpu_capabilities(arm64_errata);
  418. }