2018-05-22 02:47:47 +02:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018 Intel Corporation
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*/
|
|
|
|
|
2022-05-06 10:49:15 +02:00
|
|
|
#include <zephyr/init.h>
|
2022-10-05 16:09:51 +02:00
|
|
|
#include <zephyr/kernel.h>
|
2018-05-22 02:47:47 +02:00
|
|
|
#include <kernel_arch_data.h>
|
|
|
|
#include <kernel_arch_func.h>
|
2022-05-06 10:49:15 +02:00
|
|
|
#include <zephyr/arch/x86/msr.h>
|
|
|
|
#include <zephyr/arch/x86/cpuid.h>
|
2018-05-22 02:47:47 +02:00
|
|
|
|
2019-03-01 00:51:56 +01:00
|
|
|
/*
|
|
|
|
* See:
|
|
|
|
* https://software.intel.com/security-software-guidance/api-app/sites/default/files/336996-Speculative-Execution-Side-Channel-Mitigations.pdf
|
|
|
|
*/
|
|
|
|
|
2024-03-01 19:43:41 +01:00
|
|
|
#if defined(CONFIG_X86_DISABLE_SSBD) || defined(CONFIG_X86_ENABLE_EXTENDED_IBRS)
|
init: remove the need for a dummy device pointer in SYS_INIT functions
The init infrastructure, found in `init.h`, is currently used by:
- `SYS_INIT`: to call functions before `main`
- `DEVICE_*`: to initialize devices
They are all sorted according to an initialization level + a priority.
`SYS_INIT` calls are really orthogonal to devices, however, the required
function signature requires a `const struct device *dev` as a first
argument. The only reason for that is because the same init machinery is
used by devices, so we have something like:
```c
struct init_entry {
int (*init)(const struct device *dev);
/* only set by DEVICE_*, otherwise NULL */
const struct device *dev;
}
```
As a result, we end up with such weird/ugly pattern:
```c
static int my_init(const struct device *dev)
{
/* always NULL! add ARG_UNUSED to avoid compiler warning */
ARG_UNUSED(dev);
...
}
```
This is really a result of poor internals isolation. This patch proposes
a to make init entries more flexible so that they can accept sytem
initialization calls like this:
```c
static int my_init(void)
{
...
}
```
This is achieved using a union:
```c
union init_function {
/* for SYS_INIT, used when init_entry.dev == NULL */
int (*sys)(void);
/* for DEVICE*, used when init_entry.dev != NULL */
int (*dev)(const struct device *dev);
};
struct init_entry {
/* stores init function (either for SYS_INIT or DEVICE*)
union init_function init_fn;
/* stores device pointer for DEVICE*, NULL for SYS_INIT. Allows
* to know which union entry to call.
*/
const struct device *dev;
}
```
This solution **does not increase ROM usage**, and allows to offer clean
public APIs for both SYS_INIT and DEVICE*. Note that however, init
machinery keeps a coupling with devices.
**NOTE**: This is a breaking change! All `SYS_INIT` functions will need
to be converted to the new signature. See the script offered in the
following commit.
Signed-off-by: Gerard Marull-Paretas <gerard.marull@nordicsemi.no>
init: convert SYS_INIT functions to the new signature
Conversion scripted using scripts/utils/migrate_sys_init.py.
Signed-off-by: Gerard Marull-Paretas <gerard.marull@nordicsemi.no>
manifest: update projects for SYS_INIT changes
Update modules with updated SYS_INIT calls:
- hal_ti
- lvgl
- sof
- TraceRecorderSource
Signed-off-by: Gerard Marull-Paretas <gerard.marull@nordicsemi.no>
tests: devicetree: devices: adjust test
Adjust test according to the recently introduced SYS_INIT
infrastructure.
Signed-off-by: Gerard Marull-Paretas <gerard.marull@nordicsemi.no>
tests: kernel: threads: adjust SYS_INIT call
Adjust to the new signature: int (*init_fn)(void);
Signed-off-by: Gerard Marull-Paretas <gerard.marull@nordicsemi.no>
2022-10-19 09:33:44 +02:00
|
|
|
static int spec_ctrl_init(void)
|
2018-05-22 02:47:47 +02:00
|
|
|
{
|
2019-03-01 00:51:56 +01:00
|
|
|
|
2020-05-27 18:26:57 +02:00
|
|
|
uint32_t enable_bits = 0U;
|
2022-02-04 09:55:47 +01:00
|
|
|
uint32_t cpuid7 = z_x86_cpuid_extended_features();
|
2019-03-01 00:51:56 +01:00
|
|
|
|
2024-03-01 19:43:41 +01:00
|
|
|
#ifdef CONFIG_X86_DISABLE_SSBD
|
2019-03-27 02:57:45 +01:00
|
|
|
if ((cpuid7 & CPUID_SPEC_CTRL_SSBD) != 0U) {
|
2019-06-27 19:41:58 +02:00
|
|
|
enable_bits |= X86_SPEC_CTRL_MSR_SSBD;
|
2019-03-01 00:51:56 +01:00
|
|
|
}
|
|
|
|
#endif
|
2024-03-01 19:43:41 +01:00
|
|
|
#ifdef CONFIG_X86_ENABLE_EXTENDED_IBRS
|
2019-03-27 02:57:45 +01:00
|
|
|
if ((cpuid7 & CPUID_SPEC_CTRL_IBRS) != 0U) {
|
2019-06-27 19:41:58 +02:00
|
|
|
enable_bits |= X86_SPEC_CTRL_MSR_IBRS;
|
2019-03-01 00:51:56 +01:00
|
|
|
}
|
|
|
|
#endif
|
2019-03-27 02:57:45 +01:00
|
|
|
if (enable_bits != 0U) {
|
2020-05-27 18:26:57 +02:00
|
|
|
uint64_t cur = z_x86_msr_read(X86_SPEC_CTRL_MSR);
|
2018-05-22 02:47:47 +02:00
|
|
|
|
2019-06-04 21:42:01 +02:00
|
|
|
z_x86_msr_write(X86_SPEC_CTRL_MSR,
|
2019-03-01 00:51:56 +01:00
|
|
|
cur | enable_bits);
|
2018-05-22 02:47:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-03-01 00:51:56 +01:00
|
|
|
SYS_INIT(spec_ctrl_init, PRE_KERNEL_1, 0);
|
2024-03-01 19:43:41 +01:00
|
|
|
#endif /* CONFIG_X86_DISABLE_SSBD || CONFIG_X86_ENABLE_EXTENDED_IBRS */
|