Merge "feat(gcs): support guarded control stack" into integration

This commit is contained in:
Bipin Ravi 2023-04-25 07:50:22 +02:00 committed by TrustedFirmware Code Review
commit 760fbfc490
11 changed files with 69 additions and 1 deletions

View file

@ -1189,6 +1189,7 @@ $(eval $(call assert_numerics,\
ENABLE_FEAT_S1PIE \
ENABLE_FEAT_S2POE \
ENABLE_FEAT_S1POE \
ENABLE_FEAT_GCS \
ENABLE_FEAT_VHE \
ENABLE_MPAM_FOR_LOWER_ELS \
ENABLE_RME \
@ -1329,6 +1330,7 @@ $(eval $(call add_defines,\
ENABLE_FEAT_S1PIE \
ENABLE_FEAT_S2POE \
ENABLE_FEAT_S1POE \
ENABLE_FEAT_GCS \
FEATURE_DETECTION \
TWED_DELAY \
ENABLE_FEAT_TWED \

View file

@ -104,6 +104,9 @@ subsections:
- title: CPU feature / ID register handling in general
scope: cpufeat
- title: Guarded Control Stack (FEAT_GCS)
scope: gcs
- title: Support for the `HCRX_EL2` register (FEAT_HCX)
scope: hcx

View file

@ -228,6 +228,10 @@ void detect_arch_features(void)
/* v9.2 features */
check_feature(ENABLE_SME_FOR_NS, read_feat_sme_id_field(),
"SME", 1, 2);
/* v9.4 features */
check_feature(ENABLE_FEAT_GCS, read_feat_gcs_id_field(), "GCS", 1, 1);
read_feat_rme();
if (tainted) {

View file

@ -374,6 +374,12 @@ Common build options
can take the values 0 to 2, to align with the ``FEATURE_DETECTION``
mechanism. Default value is ``0``.
- ``ENABLE_FEAT_GCS``: Numeric value to set the bit SCR_EL3.GCSEn in EL3 to
allow use of Guarded Control Stack from EL2 as well as adding the GCS
registers to the EL2 context save/restore operations. This flag can take
the values 0 to 2, to align with the ``FEATURE_DETECTION`` mechanism.
Default value is ``0``.
- ``ENABLE_LTO``: Boolean option to enable Link Time Optimization (LTO)
support in GCC for TF-A. This option is currently only supported for
AArch64. Default is 0.

View file

@ -371,6 +371,9 @@
#define ID_AA64MMFR3_EL1_TCRX_MASK ULL(0xf)
/* ID_AA64PFR1_EL1 definitions */
#define ID_AA64PFR1_EL1_GCS_SHIFT U(44)
#define ID_AA64PFR1_EL1_GCS_MASK ULL(0xf)
#define ID_AA64PFR1_EL1_SSBS_SHIFT U(4)
#define ID_AA64PFR1_EL1_SSBS_MASK ULL(0xf)
@ -527,6 +530,7 @@
#define SCR_PIEN_BIT (UL(1) << 45)
#define SCR_TCR2EN_BIT (UL(1) << 43)
#define SCR_TRNDR_BIT (UL(1) << 40)
#define SCR_GCSEn_BIT (UL(1) << 39)
#define SCR_HXEn_BIT (UL(1) << 38)
#define SCR_ENTP2_SHIFT U(41)
#define SCR_ENTP2_BIT (UL(1) << SCR_ENTP2_SHIFT)
@ -1350,6 +1354,12 @@
#define POR_EL2 S3_4_C10_C2_4
#define S2PIR_EL2 S3_4_C10_C2_5
/*******************************************************************************
* FEAT_GCS - Guarded Control Stack Registers
******************************************************************************/
#define GCSCR_EL2 S3_4_C2_C5_0
#define GCSPR_EL2 S3_4_C2_C5_1
/*******************************************************************************
* Definitions for DynamicIQ Shared Unit registers
******************************************************************************/

View file

@ -316,6 +316,24 @@ static inline bool is_feat_sxpie_supported(void)
return is_feat_s1pie_supported() || is_feat_s2pie_supported();
}
static unsigned int read_feat_gcs_id_field(void)
{
return ISOLATE_FIELD(read_id_aa64pfr1_el1(), ID_AA64PFR1_EL1_GCS);
}
static inline bool is_feat_gcs_supported(void)
{
if (ENABLE_FEAT_GCS == FEAT_STATE_DISABLED) {
return false;
}
if (ENABLE_FEAT_GCS == FEAT_STATE_ALWAYS) {
return true;
}
return read_feat_gcs_id_field() != 0U;
}
/*******************************************************************************
* Functions to identify the presence of the Activity Monitors Extension
******************************************************************************/

View file

@ -613,6 +613,10 @@ DEFINE_RENAME_SYSREG_RW_FUNCS(s2pir_el2, S2PIR_EL2)
/* FEAT_SxPOE Registers */
DEFINE_RENAME_SYSREG_RW_FUNCS(por_el2, POR_EL2)
/* FEAT_GCS Registers */
DEFINE_RENAME_SYSREG_RW_FUNCS(gcscr_el2, GCSCR_EL2)
DEFINE_RENAME_SYSREG_RW_FUNCS(gcspr_el2, GCSPR_EL2)
/* DynamIQ Shared Unit power management */
DEFINE_RENAME_SYSREG_RW_FUNCS(clusterpwrdn_el1, CLUSTERPWRDN_EL1)

View file

@ -234,9 +234,11 @@
#define CTX_PIRE0_EL2 U(0x1e8)
#define CTX_PIR_EL2 U(0x1f0)
#define CTX_S2PIR_EL2 U(0x1f8)
#define CTX_GCSCR_EL2 U(0x200)
#define CTX_GCSPR_EL2 U(0x208)
/* Align to the next 16 byte boundary */
#define CTX_EL2_SYSREGS_END U(0x200)
#define CTX_EL2_SYSREGS_END U(0x210)
#endif /* CTX_INCLUDE_EL2_REGS */

View file

@ -375,6 +375,13 @@ static void setup_context_common(cpu_context_t *ctx, const entry_point_info_t *e
scr_el3 |= SCR_PIEN_BIT;
}
/*
* SCR_EL3.GCSEn: Enable GCS registers for AArch64 if present.
*/
if ((is_feat_gcs_supported()) && (GET_RW(ep->spsr) == MODE_RW_64)) {
scr_el3 |= SCR_GCSEn_BIT;
}
/*
* CPTR_EL3 was initialized out of reset, copy that value to the
* context register.
@ -1039,6 +1046,10 @@ void cm_el2_sysregs_context_save(uint32_t security_state)
if (is_feat_sxpoe_supported()) {
write_ctx_reg(el2_sysregs_ctx, CTX_POR_EL2, read_por_el2());
}
if (is_feat_gcs_supported()) {
write_ctx_reg(el2_sysregs_ctx, CTX_GCSPR_EL2, read_gcspr_el2());
write_ctx_reg(el2_sysregs_ctx, CTX_GCSCR_EL2, read_gcscr_el2());
}
}
}
@ -1116,6 +1127,10 @@ void cm_el2_sysregs_context_restore(uint32_t security_state)
if (is_feat_sxpoe_supported()) {
write_por_el2(read_ctx_reg(el2_sysregs_ctx, CTX_POR_EL2));
}
if (is_feat_gcs_supported()) {
write_gcscr_el2(read_ctx_reg(el2_sysregs_ctx, CTX_GCSCR_EL2));
write_gcspr_el2(read_ctx_reg(el2_sysregs_ctx, CTX_GCSPR_EL2));
}
}
}
#endif /* CTX_INCLUDE_EL2_REGS */

View file

@ -188,6 +188,9 @@ ENABLE_FEAT_S2POE := 0
# Flag to enable access to Stage 1 Permission Overlay (FEAT_S1POE)
ENABLE_FEAT_S1POE := 0
# Flag to enable access to Guarded Control Stack (FEAT_GCS)
ENABLE_FEAT_GCS := 0
# By default BL31 encryption disabled
ENCRYPT_BL31 := 0

View file

@ -49,6 +49,7 @@ ifneq (${SPD}, tspd)
ENABLE_MPAM_FOR_LOWER_ELS := 2
ENABLE_FEAT_RNG := 2
ENABLE_FEAT_TWED := 2
ENABLE_FEAT_GCS := 2
ifeq (${ARCH},aarch64)
ifeq (${SPM_MM}, 0)
ifeq (${ENABLE_RME}, 0)