Skip to content
Snippets Groups Projects
Commit a76007f5 authored by Marc Zyngier's avatar Marc Zyngier Committed by Frieder Schrempf
Browse files

irqchip/gic-v3: Fix rk3399 workaround when secure interrupts are enabled


commit 4cb77793842a351b39a030f77caebace3524840e upstream.

Christoph reports that their rk3399 system dies since commit 773c05f417fa1
("irqchip/gic-v3: Work around insecure GIC integrations").

It appears that some rk3399 have secure payloads, and that the firmware
sets SCR_EL3.FIQ==1. Obivously, disabling security in that configuration
leads to even more problems.

Revisit the workaround by:

  - making it rk3399 specific
  - checking whether Group-0 is available, which is a good proxy
    for SCR_EL3.FIQ being 0
  - either apply the workaround if Group-0 is available, or disable
    pseudo-NMIs if not

Note that this doesn't mean that the secure side is able to receive
interrupts, as all interrupts are made non-secure anyway.

Clearly, nobody ever tested secure interrupts on this platform.

Fixes: 773c05f417fa1 ("irqchip/gic-v3: Work around insecure GIC integrations")
Reported-by: default avatarChristoph Fritz <chf.fritz@googlemail.com>
Signed-off-by: default avatarMarc Zyngier <maz@kernel.org>
Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
Tested-by: default avatarChristoph Fritz <chf.fritz@googlemail.com>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/all/20250215185241.3768218-1-maz@kernel.org
Closes: https://lore.kernel.org/r/b1266652fb64857246e8babdf268d0df8f0c36d9.camel@googlemail.com


Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent 0f6e4fa2
No related branches found
No related tags found
1 merge request!192🤖 Sync Bot: Update v6.12-ktn to Latest Stable Kernel (v6.12.17)
...@@ -44,6 +44,7 @@ static u8 dist_prio_nmi __ro_after_init = GICV3_PRIO_NMI; ...@@ -44,6 +44,7 @@ static u8 dist_prio_nmi __ro_after_init = GICV3_PRIO_NMI;
#define FLAGS_WORKAROUND_GICR_WAKER_MSM8996 (1ULL << 0) #define FLAGS_WORKAROUND_GICR_WAKER_MSM8996 (1ULL << 0)
#define FLAGS_WORKAROUND_CAVIUM_ERRATUM_38539 (1ULL << 1) #define FLAGS_WORKAROUND_CAVIUM_ERRATUM_38539 (1ULL << 1)
#define FLAGS_WORKAROUND_ASR_ERRATUM_8601001 (1ULL << 2) #define FLAGS_WORKAROUND_ASR_ERRATUM_8601001 (1ULL << 2)
#define FLAGS_WORKAROUND_INSECURE (1ULL << 3)
#define GIC_IRQ_TYPE_PARTITION (GIC_IRQ_TYPE_LPI + 1) #define GIC_IRQ_TYPE_PARTITION (GIC_IRQ_TYPE_LPI + 1)
...@@ -83,6 +84,8 @@ static DEFINE_STATIC_KEY_TRUE(supports_deactivate_key); ...@@ -83,6 +84,8 @@ static DEFINE_STATIC_KEY_TRUE(supports_deactivate_key);
#define GIC_LINE_NR min(GICD_TYPER_SPIS(gic_data.rdists.gicd_typer), 1020U) #define GIC_LINE_NR min(GICD_TYPER_SPIS(gic_data.rdists.gicd_typer), 1020U)
#define GIC_ESPI_NR GICD_TYPER_ESPIS(gic_data.rdists.gicd_typer) #define GIC_ESPI_NR GICD_TYPER_ESPIS(gic_data.rdists.gicd_typer)
static bool nmi_support_forbidden;
/* /*
* There are 16 SGIs, though we only actually use 8 in Linux. The other 8 SGIs * There are 16 SGIs, though we only actually use 8 in Linux. The other 8 SGIs
* are potentially stolen by the secure side. Some code, especially code dealing * are potentially stolen by the secure side. Some code, especially code dealing
...@@ -163,21 +166,27 @@ static void __init gic_prio_init(void) ...@@ -163,21 +166,27 @@ static void __init gic_prio_init(void)
{ {
bool ds; bool ds;
ds = gic_dist_security_disabled(); cpus_have_group0 = gic_has_group0();
if (!ds) {
u32 val;
val = readl_relaxed(gic_data.dist_base + GICD_CTLR);
val |= GICD_CTLR_DS;
writel_relaxed(val, gic_data.dist_base + GICD_CTLR);
ds = gic_dist_security_disabled(); ds = gic_dist_security_disabled();
if (ds) if ((gic_data.flags & FLAGS_WORKAROUND_INSECURE) && !ds) {
pr_warn("Broken GIC integration, security disabled"); if (cpus_have_group0) {
u32 val;
val = readl_relaxed(gic_data.dist_base + GICD_CTLR);
val |= GICD_CTLR_DS;
writel_relaxed(val, gic_data.dist_base + GICD_CTLR);
ds = gic_dist_security_disabled();
if (ds)
pr_warn("Broken GIC integration, security disabled\n");
} else {
pr_warn("Broken GIC integration, pNMI forbidden\n");
nmi_support_forbidden = true;
}
} }
cpus_have_security_disabled = ds; cpus_have_security_disabled = ds;
cpus_have_group0 = gic_has_group0();
/* /*
* How priority values are used by the GIC depends on two things: * How priority values are used by the GIC depends on two things:
...@@ -209,7 +218,7 @@ static void __init gic_prio_init(void) ...@@ -209,7 +218,7 @@ static void __init gic_prio_init(void)
* be in the non-secure range, we program the non-secure values into * be in the non-secure range, we program the non-secure values into
* the distributor to match the PMR values we want. * the distributor to match the PMR values we want.
*/ */
if (cpus_have_group0 & !cpus_have_security_disabled) { if (cpus_have_group0 && !cpus_have_security_disabled) {
dist_prio_irq = __gicv3_prio_to_ns(dist_prio_irq); dist_prio_irq = __gicv3_prio_to_ns(dist_prio_irq);
dist_prio_nmi = __gicv3_prio_to_ns(dist_prio_nmi); dist_prio_nmi = __gicv3_prio_to_ns(dist_prio_nmi);
} }
...@@ -1922,6 +1931,18 @@ static bool gic_enable_quirk_arm64_2941627(void *data) ...@@ -1922,6 +1931,18 @@ static bool gic_enable_quirk_arm64_2941627(void *data)
return true; return true;
} }
static bool gic_enable_quirk_rk3399(void *data)
{
struct gic_chip_data *d = data;
if (of_machine_is_compatible("rockchip,rk3399")) {
d->flags |= FLAGS_WORKAROUND_INSECURE;
return true;
}
return false;
}
static bool rd_set_non_coherent(void *data) static bool rd_set_non_coherent(void *data)
{ {
struct gic_chip_data *d = data; struct gic_chip_data *d = data;
...@@ -1996,6 +2017,12 @@ static const struct gic_quirk gic_quirks[] = { ...@@ -1996,6 +2017,12 @@ static const struct gic_quirk gic_quirks[] = {
.property = "dma-noncoherent", .property = "dma-noncoherent",
.init = rd_set_non_coherent, .init = rd_set_non_coherent,
}, },
{
.desc = "GICv3: Insecure RK3399 integration",
.iidr = 0x0000043b,
.mask = 0xff000fff,
.init = gic_enable_quirk_rk3399,
},
{ {
} }
}; };
...@@ -2004,7 +2031,7 @@ static void gic_enable_nmi_support(void) ...@@ -2004,7 +2031,7 @@ static void gic_enable_nmi_support(void)
{ {
int i; int i;
if (!gic_prio_masking_enabled()) if (!gic_prio_masking_enabled() || nmi_support_forbidden)
return; return;
rdist_nmi_refs = kcalloc(gic_data.ppi_nr + SGI_NR, rdist_nmi_refs = kcalloc(gic_data.ppi_nr + SGI_NR,
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment