1*4bf97069SCharlie Jenkins // SPDX-License-Identifier: GPL-2.0
2*4bf97069SCharlie Jenkins /*
3*4bf97069SCharlie Jenkins * Copyright (C) 2024 Rivos Inc.
4*4bf97069SCharlie Jenkins */
5*4bf97069SCharlie Jenkins
6*4bf97069SCharlie Jenkins #include <linux/cpu.h>
7*4bf97069SCharlie Jenkins #include <linux/device.h>
8*4bf97069SCharlie Jenkins #include <linux/sprintf.h>
9*4bf97069SCharlie Jenkins
10*4bf97069SCharlie Jenkins #include <asm/bugs.h>
11*4bf97069SCharlie Jenkins #include <asm/vendor_extensions/thead.h>
12*4bf97069SCharlie Jenkins
13*4bf97069SCharlie Jenkins static enum mitigation_state ghostwrite_state;
14*4bf97069SCharlie Jenkins
ghostwrite_set_vulnerable(void)15*4bf97069SCharlie Jenkins void ghostwrite_set_vulnerable(void)
16*4bf97069SCharlie Jenkins {
17*4bf97069SCharlie Jenkins ghostwrite_state = VULNERABLE;
18*4bf97069SCharlie Jenkins }
19*4bf97069SCharlie Jenkins
20*4bf97069SCharlie Jenkins /*
21*4bf97069SCharlie Jenkins * Vendor extension alternatives will use the value set at the time of boot
22*4bf97069SCharlie Jenkins * alternative patching, thus this must be called before boot alternatives are
23*4bf97069SCharlie Jenkins * patched (and after extension probing) to be effective.
24*4bf97069SCharlie Jenkins *
25*4bf97069SCharlie Jenkins * Returns true if mitgated, false otherwise.
26*4bf97069SCharlie Jenkins */
ghostwrite_enable_mitigation(void)27*4bf97069SCharlie Jenkins bool ghostwrite_enable_mitigation(void)
28*4bf97069SCharlie Jenkins {
29*4bf97069SCharlie Jenkins if (IS_ENABLED(CONFIG_RISCV_ISA_XTHEADVECTOR) &&
30*4bf97069SCharlie Jenkins ghostwrite_state == VULNERABLE && !cpu_mitigations_off()) {
31*4bf97069SCharlie Jenkins disable_xtheadvector();
32*4bf97069SCharlie Jenkins ghostwrite_state = MITIGATED;
33*4bf97069SCharlie Jenkins return true;
34*4bf97069SCharlie Jenkins }
35*4bf97069SCharlie Jenkins
36*4bf97069SCharlie Jenkins return false;
37*4bf97069SCharlie Jenkins }
38*4bf97069SCharlie Jenkins
ghostwrite_get_state(void)39*4bf97069SCharlie Jenkins enum mitigation_state ghostwrite_get_state(void)
40*4bf97069SCharlie Jenkins {
41*4bf97069SCharlie Jenkins return ghostwrite_state;
42*4bf97069SCharlie Jenkins }
43*4bf97069SCharlie Jenkins
cpu_show_ghostwrite(struct device * dev,struct device_attribute * attr,char * buf)44*4bf97069SCharlie Jenkins ssize_t cpu_show_ghostwrite(struct device *dev, struct device_attribute *attr, char *buf)
45*4bf97069SCharlie Jenkins {
46*4bf97069SCharlie Jenkins if (IS_ENABLED(CONFIG_RISCV_ISA_XTHEADVECTOR)) {
47*4bf97069SCharlie Jenkins switch (ghostwrite_state) {
48*4bf97069SCharlie Jenkins case UNAFFECTED:
49*4bf97069SCharlie Jenkins return sprintf(buf, "Not affected\n");
50*4bf97069SCharlie Jenkins case MITIGATED:
51*4bf97069SCharlie Jenkins return sprintf(buf, "Mitigation: xtheadvector disabled\n");
52*4bf97069SCharlie Jenkins case VULNERABLE:
53*4bf97069SCharlie Jenkins fallthrough;
54*4bf97069SCharlie Jenkins default:
55*4bf97069SCharlie Jenkins return sprintf(buf, "Vulnerable\n");
56*4bf97069SCharlie Jenkins }
57*4bf97069SCharlie Jenkins } else {
58*4bf97069SCharlie Jenkins return sprintf(buf, "Not affected\n");
59*4bf97069SCharlie Jenkins }
60*4bf97069SCharlie Jenkins }
61