1/* 2 * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7#include <arch.h> 8#include <asm_macros.S> 9#include <assert_macros.S> 10#include <context.h> 11#include <denver.h> 12#include <cpu_macros.S> 13#include <plat_macros.S> 14 15 /* ------------------------------------------------- 16 * CVE-2017-5715 mitigation 17 * 18 * Flush the indirect branch predictor and RSB on 19 * entry to EL3 by issuing a newly added instruction 20 * for Denver CPUs. 21 * 22 * To achieve this without performing any branch 23 * instruction, a per-cpu vbar is installed which 24 * executes the workaround and then branches off to 25 * the corresponding vector entry in the main vector 26 * table. 27 * ------------------------------------------------- 28 */ 29 .globl workaround_bpflush_runtime_exceptions 30 31vector_base workaround_bpflush_runtime_exceptions 32 33 .macro apply_workaround 34 stp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0] 35 36 /* ------------------------------------------------- 37 * A new write-only system register where a write of 38 * 1 to bit 0 will cause the indirect branch predictor 39 * and RSB to be flushed. 40 * 41 * A write of 0 to bit 0 will be ignored. A write of 42 * 1 to any other bit will cause an MCA. 43 * ------------------------------------------------- 44 */ 45 mov x0, #1 46 msr s3_0_c15_c0_6, x0 47 isb 48 49 ldp x0, x1, [sp, #CTX_GPREGS_OFFSET + CTX_GPREG_X0] 50 .endm 51 52 /* --------------------------------------------------------------------- 53 * Current EL with SP_EL0 : 0x0 - 0x200 54 * --------------------------------------------------------------------- 55 */ 56vector_entry workaround_bpflush_sync_exception_sp_el0 57 b sync_exception_sp_el0 58end_vector_entry workaround_bpflush_sync_exception_sp_el0 59 60vector_entry workaround_bpflush_irq_sp_el0 61 b irq_sp_el0 62end_vector_entry workaround_bpflush_irq_sp_el0 63 64vector_entry workaround_bpflush_fiq_sp_el0 65 b fiq_sp_el0 66end_vector_entry workaround_bpflush_fiq_sp_el0 67 68vector_entry workaround_bpflush_serror_sp_el0 69 b serror_sp_el0 70end_vector_entry workaround_bpflush_serror_sp_el0 71 72 /* --------------------------------------------------------------------- 73 * Current EL with SP_ELx: 0x200 - 0x400 74 * --------------------------------------------------------------------- 75 */ 76vector_entry workaround_bpflush_sync_exception_sp_elx 77 b sync_exception_sp_elx 78end_vector_entry workaround_bpflush_sync_exception_sp_elx 79 80vector_entry workaround_bpflush_irq_sp_elx 81 b irq_sp_elx 82end_vector_entry workaround_bpflush_irq_sp_elx 83 84vector_entry workaround_bpflush_fiq_sp_elx 85 b fiq_sp_elx 86end_vector_entry workaround_bpflush_fiq_sp_elx 87 88vector_entry workaround_bpflush_serror_sp_elx 89 b serror_sp_elx 90end_vector_entry workaround_bpflush_serror_sp_elx 91 92 /* --------------------------------------------------------------------- 93 * Lower EL using AArch64 : 0x400 - 0x600 94 * --------------------------------------------------------------------- 95 */ 96vector_entry workaround_bpflush_sync_exception_aarch64 97 apply_workaround 98 b sync_exception_aarch64 99end_vector_entry workaround_bpflush_sync_exception_aarch64 100 101vector_entry workaround_bpflush_irq_aarch64 102 apply_workaround 103 b irq_aarch64 104end_vector_entry workaround_bpflush_irq_aarch64 105 106vector_entry workaround_bpflush_fiq_aarch64 107 apply_workaround 108 b fiq_aarch64 109end_vector_entry workaround_bpflush_fiq_aarch64 110 111vector_entry workaround_bpflush_serror_aarch64 112 apply_workaround 113 b serror_aarch64 114end_vector_entry workaround_bpflush_serror_aarch64 115 116 /* --------------------------------------------------------------------- 117 * Lower EL using AArch32 : 0x600 - 0x800 118 * --------------------------------------------------------------------- 119 */ 120vector_entry workaround_bpflush_sync_exception_aarch32 121 apply_workaround 122 b sync_exception_aarch32 123end_vector_entry workaround_bpflush_sync_exception_aarch32 124 125vector_entry workaround_bpflush_irq_aarch32 126 apply_workaround 127 b irq_aarch32 128end_vector_entry workaround_bpflush_irq_aarch32 129 130vector_entry workaround_bpflush_fiq_aarch32 131 apply_workaround 132 b fiq_aarch32 133end_vector_entry workaround_bpflush_fiq_aarch32 134 135vector_entry workaround_bpflush_serror_aarch32 136 apply_workaround 137 b serror_aarch32 138end_vector_entry workaround_bpflush_serror_aarch32 139 140 .global denver_disable_dco 141 142 /* --------------------------------------------- 143 * Disable debug interfaces 144 * --------------------------------------------- 145 */ 146func denver_disable_ext_debug 147 mov x0, #1 148 msr osdlr_el1, x0 149 isb 150 dsb sy 151 ret 152endfunc denver_disable_ext_debug 153 154 /* ---------------------------------------------------- 155 * Enable dynamic code optimizer (DCO) 156 * ---------------------------------------------------- 157 */ 158func denver_enable_dco 159 mrs x0, mpidr_el1 160 and x0, x0, #0xF 161 mov x1, #1 162 lsl x1, x1, x0 163 msr s3_0_c15_c0_2, x1 164 ret 165endfunc denver_enable_dco 166 167 /* ---------------------------------------------------- 168 * Disable dynamic code optimizer (DCO) 169 * ---------------------------------------------------- 170 */ 171func denver_disable_dco 172 173 /* turn off background work */ 174 mrs x0, mpidr_el1 175 and x0, x0, #0xF 176 mov x1, #1 177 lsl x1, x1, x0 178 lsl x2, x1, #16 179 msr s3_0_c15_c0_2, x2 180 isb 181 182 /* wait till the background work turns off */ 1831: mrs x2, s3_0_c15_c0_2 184 lsr x2, x2, #32 185 and w2, w2, 0xFFFF 186 and x2, x2, x1 187 cbnz x2, 1b 188 189 ret 190endfunc denver_disable_dco 191 192func check_errata_cve_2017_5715 193 mov x0, #ERRATA_MISSING 194#if WORKAROUND_CVE_2017_5715 195 /* 196 * Check if the CPU supports the special instruction 197 * required to flush the indirect branch predictor and 198 * RSB. Support for this operation can be determined by 199 * comparing bits 19:16 of ID_AFR0_EL1 with 0b0001. 200 */ 201 mrs x1, id_afr0_el1 202 mov x2, #0x10000 203 and x1, x1, x2 204 cbz x1, 1f 205 mov x0, #ERRATA_APPLIES 2061: 207#endif 208 ret 209endfunc check_errata_cve_2017_5715 210 211 /* ------------------------------------------------- 212 * The CPU Ops reset function for Denver. 213 * ------------------------------------------------- 214 */ 215func denver_reset_func 216 217 mov x19, x30 218 219#if IMAGE_BL31 && WORKAROUND_CVE_2017_5715 220 /* 221 * Check if the CPU supports the special instruction 222 * required to flush the indirect branch predictor and 223 * RSB. Support for this operation can be determined by 224 * comparing bits 19:16 of ID_AFR0_EL1 with 0b0001. 225 */ 226 mrs x0, id_afr0_el1 227 mov x1, #0x10000 228 and x0, x0, x1 229 cmp x0, #0 230 adr x1, workaround_bpflush_runtime_exceptions 231 mrs x2, vbar_el3 232 csel x0, x1, x2, ne 233 msr vbar_el3, x0 234#endif 235 236 /* ---------------------------------------------------- 237 * Enable dynamic code optimizer (DCO) 238 * ---------------------------------------------------- 239 */ 240 bl denver_enable_dco 241 242 ret x19 243endfunc denver_reset_func 244 245 /* ---------------------------------------------------- 246 * The CPU Ops core power down function for Denver. 247 * ---------------------------------------------------- 248 */ 249func denver_core_pwr_dwn 250 251 mov x19, x30 252 253 /* --------------------------------------------- 254 * Force the debug interfaces to be quiescent 255 * --------------------------------------------- 256 */ 257 bl denver_disable_ext_debug 258 259 ret x19 260endfunc denver_core_pwr_dwn 261 262 /* ------------------------------------------------------- 263 * The CPU Ops cluster power down function for Denver. 264 * ------------------------------------------------------- 265 */ 266func denver_cluster_pwr_dwn 267 ret 268endfunc denver_cluster_pwr_dwn 269 270#if REPORT_ERRATA 271 /* 272 * Errata printing function for Denver. Must follow AAPCS. 273 */ 274func denver_errata_report 275 stp x8, x30, [sp, #-16]! 276 277 bl cpu_get_rev_var 278 mov x8, x0 279 280 /* 281 * Report all errata. The revision-variant information is passed to 282 * checking functions of each errata. 283 */ 284 report_errata WORKAROUND_CVE_2017_5715, denver, cve_2017_5715 285 286 ldp x8, x30, [sp], #16 287 ret 288endfunc denver_errata_report 289#endif 290 291 /* --------------------------------------------- 292 * This function provides Denver specific 293 * register information for crash reporting. 294 * It needs to return with x6 pointing to 295 * a list of register names in ascii and 296 * x8 - x15 having values of registers to be 297 * reported. 298 * --------------------------------------------- 299 */ 300.section .rodata.denver_regs, "aS" 301denver_regs: /* The ascii list of register names to be reported */ 302 .asciz "actlr_el1", "" 303 304func denver_cpu_reg_dump 305 adr x6, denver_regs 306 mrs x8, ACTLR_EL1 307 ret 308endfunc denver_cpu_reg_dump 309 310declare_cpu_ops_wa denver, DENVER_MIDR_PN0, \ 311 denver_reset_func, \ 312 check_errata_cve_2017_5715, \ 313 CPU_NO_EXTRA2_FUNC, \ 314 denver_core_pwr_dwn, \ 315 denver_cluster_pwr_dwn 316 317declare_cpu_ops_wa denver, DENVER_MIDR_PN1, \ 318 denver_reset_func, \ 319 check_errata_cve_2017_5715, \ 320 CPU_NO_EXTRA2_FUNC, \ 321 denver_core_pwr_dwn, \ 322 denver_cluster_pwr_dwn 323 324declare_cpu_ops_wa denver, DENVER_MIDR_PN2, \ 325 denver_reset_func, \ 326 check_errata_cve_2017_5715, \ 327 CPU_NO_EXTRA2_FUNC, \ 328 denver_core_pwr_dwn, \ 329 denver_cluster_pwr_dwn 330 331declare_cpu_ops_wa denver, DENVER_MIDR_PN3, \ 332 denver_reset_func, \ 333 check_errata_cve_2017_5715, \ 334 CPU_NO_EXTRA2_FUNC, \ 335 denver_core_pwr_dwn, \ 336 denver_cluster_pwr_dwn 337 338declare_cpu_ops_wa denver, DENVER_MIDR_PN4, \ 339 denver_reset_func, \ 340 check_errata_cve_2017_5715, \ 341 CPU_NO_EXTRA2_FUNC, \ 342 denver_core_pwr_dwn, \ 343 denver_cluster_pwr_dwn 344