mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-18 02:24:18 +00:00

This patch implements SMCCC_ARCH_WORKAROUND_4 and allows discovery through SMCCC_ARCH_FEATURES. This mechanism is enabled if CVE_2024_7881 [1] is enabled by the platform. If CVE_2024_7881 mitigation is implemented, the discovery call returns 0, if not -1 (SMC_ARCH_CALL_NOT_SUPPORTED). For more information about SMCCC_ARCH_WORKAROUND_4 [2], please refer to the SMCCC Specification reference provided below. [1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881 [2]: https://developer.arm.com/documentation/den0028/latest Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I1b1ffaa1f806f07472fd79d5525f81764d99bc79
99 lines
2.7 KiB
C
99 lines
2.7 KiB
C
/*
|
|
* Copyright (c) 2017-2025, Arm Limited and Contributors. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#ifndef ERRATA_REPORT_H
|
|
#define ERRATA_REPORT_H
|
|
|
|
#include <lib/cpus/cpu_ops.h>
|
|
|
|
|
|
#define ERRATUM_WA_FUNC_SIZE CPU_WORD_SIZE
|
|
#define ERRATUM_CHECK_FUNC_SIZE CPU_WORD_SIZE
|
|
#define ERRATUM_ID_SIZE 4
|
|
#define ERRATUM_CVE_SIZE 2
|
|
#define ERRATUM_CHOSEN_SIZE 1
|
|
#define ERRATUM_MITIGATED_SIZE 1
|
|
|
|
#define ERRATUM_WA_FUNC 0
|
|
#define ERRATUM_CHECK_FUNC ERRATUM_WA_FUNC + ERRATUM_WA_FUNC_SIZE
|
|
#define ERRATUM_ID ERRATUM_CHECK_FUNC + ERRATUM_CHECK_FUNC_SIZE
|
|
#define ERRATUM_CVE ERRATUM_ID + ERRATUM_ID_SIZE
|
|
#define ERRATUM_CHOSEN ERRATUM_CVE + ERRATUM_CVE_SIZE
|
|
#define ERRATUM_MITIGATED ERRATUM_CHOSEN + ERRATUM_CHOSEN_SIZE
|
|
#define ERRATUM_ENTRY_SIZE ERRATUM_MITIGATED + ERRATUM_MITIGATED_SIZE
|
|
|
|
/* Errata status */
|
|
#define ERRATA_NOT_APPLIES 0
|
|
#define ERRATA_APPLIES 1
|
|
#define ERRATA_MISSING 2
|
|
|
|
#ifndef __ASSEMBLER__
|
|
#include <lib/cassert.h>
|
|
|
|
void print_errata_status(void);
|
|
|
|
#if ERRATA_A75_764081
|
|
bool errata_a75_764081_applies(void);
|
|
#else
|
|
static inline bool errata_a75_764081_applies(void)
|
|
{
|
|
return false;
|
|
}
|
|
#endif
|
|
|
|
#if ERRATA_A520_2938996 || ERRATA_X4_2726228
|
|
unsigned int check_if_affected_core(void);
|
|
#endif
|
|
|
|
int check_wa_cve_2024_7881(void);
|
|
|
|
/*
|
|
* NOTE that this structure will be different on AArch32 and AArch64. The
|
|
* uintptr_t will reflect the change and the alignment will be correct in both.
|
|
*/
|
|
struct erratum_entry {
|
|
uintptr_t (*wa_func)(uint64_t cpu_rev);
|
|
uintptr_t (*check_func)(uint64_t cpu_rev);
|
|
/* Will fit CVEs with up to 10 character in the ID field */
|
|
uint32_t id;
|
|
/* Denote CVEs with their year or errata with 0 */
|
|
uint16_t cve;
|
|
uint8_t chosen;
|
|
/* TODO(errata ABI): placeholder for the mitigated field */
|
|
uint8_t _mitigated;
|
|
} __packed;
|
|
|
|
CASSERT(sizeof(struct erratum_entry) == ERRATUM_ENTRY_SIZE,
|
|
assert_erratum_entry_asm_c_different_sizes);
|
|
#else
|
|
|
|
/*
|
|
* errata framework macro helpers
|
|
*
|
|
* NOTE an erratum and CVE id could clash. However, both numbers are very large
|
|
* and the probablity is minuscule. Working around this makes code very
|
|
* complicated and extremely difficult to read so it is not considered. In the
|
|
* unlikely event that this does happen, prepending the CVE id with a 0 should
|
|
* resolve the conflict
|
|
*/
|
|
#define ERRATUM(id) 0, id
|
|
#define CVE(year, id) year, id
|
|
#define NO_ISB 1
|
|
#define NO_ASSERT 0
|
|
#define NO_APPLY_AT_RESET 0
|
|
#define APPLY_AT_RESET 1
|
|
#define GET_CPU_REV 1
|
|
#define NO_GET_CPU_REV 0
|
|
|
|
/* useful for errata that end up always being worked around */
|
|
#define ERRATUM_ALWAYS_CHOSEN 1
|
|
|
|
#endif /* __ASSEMBLER__ */
|
|
|
|
/* Macro to get CPU revision code for checking errata version compatibility. */
|
|
#define CPU_REV(r, p) ((r << 4) | p)
|
|
|
|
#endif /* ERRATA_REPORT_H */
|