mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-15 00:54:22 +00:00
fix(cpus): workaround for CVE-2024-5660 for Neoverse-V3
Implements mitigation for CVE-2024-5660 that affects Neoverse-V3 revisions r0p0, r0p1. The workaround is to disable the hardware page aggregation at EL3 by setting CPUECTLR_EL1[46] = 1'b1. Public Documentation: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-5660 Change-Id: I9ed2590bf1215bf6a692f01dfd351e469ff072f8 Signed-off-by: Sona Mathew <sonarebecca.mathew@arm.com>
This commit is contained in:
parent
af65cbb954
commit
ad3da01990
1 changed files with 7 additions and 0 deletions
|
@ -26,6 +26,13 @@
|
|||
wa_cve_2022_23960_bhb_vector_table NEOVERSE_V3_BHB_LOOP_COUNT, neoverse_v3
|
||||
#endif /* WORKAROUND_CVE_2022_23960 */
|
||||
|
||||
/* Disable hardware page aggregation. Enables mitigation for `CVE-2024-5660` */
|
||||
workaround_reset_start neoverse_v3, CVE(2024, 5660), WORKAROUND_CVE_2024_5660
|
||||
sysreg_bit_set NEOVERSE_V3_CPUECTLR_EL1, BIT(46)
|
||||
workaround_reset_end neoverse_v3, CVE(2024, 5660)
|
||||
|
||||
check_erratum_ls neoverse_v3, CVE(2024, 5660), CPU_REV(0, 1)
|
||||
|
||||
workaround_reset_start neoverse_v3, CVE(2022,23960), WORKAROUND_CVE_2022_23960
|
||||
#if IMAGE_BL31
|
||||
/*
|
||||
|
|
Loading…
Add table
Reference in a new issue