mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-11 15:14:21 +00:00
Merge changes from topic "ar/cvereorder" into integration
* changes: chore(cpus): rearrange the errata and cve in order in Cortex-X4 chore(cpus): rearrange the errata and cve in order in Neoverse-V3
This commit is contained in:
commit
b78c307ca6
2 changed files with 22 additions and 22 deletions
|
@ -35,13 +35,6 @@ add_erratum_entry cortex_x4, ERRATUM(2726228), ERRATA_X4_2726228
|
|||
|
||||
check_erratum_ls cortex_x4, ERRATUM(2726228), CPU_REV(0, 1)
|
||||
|
||||
/* Disable hardware page aggregation. Enables mitigation for `CVE-2024-5660` */
|
||||
workaround_reset_start cortex_x4, CVE(2024, 5660), WORKAROUND_CVE_2024_5660
|
||||
sysreg_bit_set CORTEX_X4_CPUECTLR_EL1, BIT(46)
|
||||
workaround_reset_end cortex_x4, CVE(2024, 5660)
|
||||
|
||||
check_erratum_ls cortex_x4, CVE(2024, 5660), CPU_REV(0, 2)
|
||||
|
||||
workaround_runtime_start cortex_x4, ERRATUM(2740089), ERRATA_X4_2740089
|
||||
/* dsb before isb of power down sequence */
|
||||
dsb sy
|
||||
|
@ -100,6 +93,10 @@ workaround_reset_end cortex_x4, ERRATUM(3076789)
|
|||
|
||||
check_erratum_ls cortex_x4, ERRATUM(3076789), CPU_REV(0, 1)
|
||||
|
||||
add_erratum_entry cortex_x4, ERRATUM(3701758), ERRATA_X4_3701758
|
||||
|
||||
check_erratum_ls cortex_x4, ERRATUM(3701758), CPU_REV(0, 3)
|
||||
|
||||
workaround_reset_start cortex_x4, CVE(2022, 23960), WORKAROUND_CVE_2022_23960
|
||||
#if IMAGE_BL31
|
||||
/*
|
||||
|
@ -112,6 +109,13 @@ workaround_reset_end cortex_x4, CVE(2022, 23960)
|
|||
|
||||
check_erratum_chosen cortex_x4, CVE(2022, 23960), WORKAROUND_CVE_2022_23960
|
||||
|
||||
/* Disable hardware page aggregation. Enables mitigation for `CVE-2024-5660` */
|
||||
workaround_reset_start cortex_x4, CVE(2024, 5660), WORKAROUND_CVE_2024_5660
|
||||
sysreg_bit_set CORTEX_X4_CPUECTLR_EL1, BIT(46)
|
||||
workaround_reset_end cortex_x4, CVE(2024, 5660)
|
||||
|
||||
check_erratum_ls cortex_x4, CVE(2024, 5660), CPU_REV(0, 2)
|
||||
|
||||
workaround_reset_start cortex_x4, CVE(2024, 7881), WORKAROUND_CVE_2024_7881
|
||||
/* ---------------------------------
|
||||
* Sets BIT41 of CPUACTLR6_EL1 which
|
||||
|
@ -123,10 +127,6 @@ workaround_reset_end cortex_x4, CVE(2024, 7881)
|
|||
|
||||
check_erratum_chosen cortex_x4, CVE(2024, 7881), WORKAROUND_CVE_2024_7881
|
||||
|
||||
add_erratum_entry cortex_x4, ERRATUM(3701758), ERRATA_X4_3701758
|
||||
|
||||
check_erratum_ls cortex_x4, ERRATUM(3701758), CPU_REV(0, 3)
|
||||
|
||||
cpu_reset_func_start cortex_x4
|
||||
/* Disable speculative loads */
|
||||
msr SSBS, xzr
|
||||
|
|
|
@ -26,10 +26,6 @@ cpu_reset_prologue neoverse_v3
|
|||
|
||||
.global check_erratum_neoverse_v3_3701767
|
||||
|
||||
add_erratum_entry neoverse_v3, ERRATUM(3701767), ERRATA_V3_3701767
|
||||
|
||||
check_erratum_ls neoverse_v3, ERRATUM(3701767), CPU_REV(0, 2)
|
||||
|
||||
workaround_reset_start neoverse_v3, ERRATUM(2970647), ERRATA_V3_2970647
|
||||
/* Add ISB before MRS reads of MPIDR_EL1/MIDR_EL1 */
|
||||
ldr x0, =0x1
|
||||
|
@ -45,17 +41,14 @@ workaround_reset_end neoverse_v3, ERRATUM(2970647)
|
|||
|
||||
check_erratum_ls neoverse_v3, ERRATUM(2970647), CPU_REV(0, 0)
|
||||
|
||||
add_erratum_entry neoverse_v3, ERRATUM(3701767), ERRATA_V3_3701767
|
||||
|
||||
check_erratum_ls neoverse_v3, ERRATUM(3701767), CPU_REV(0, 2)
|
||||
|
||||
#if WORKAROUND_CVE_2022_23960
|
||||
wa_cve_2022_23960_bhb_vector_table NEOVERSE_V3_BHB_LOOP_COUNT, neoverse_v3
|
||||
#endif /* WORKAROUND_CVE_2022_23960 */
|
||||
|
||||
/* Disable hardware page aggregation. Enables mitigation for `CVE-2024-5660` */
|
||||
workaround_reset_start neoverse_v3, CVE(2024, 5660), WORKAROUND_CVE_2024_5660
|
||||
sysreg_bit_set NEOVERSE_V3_CPUECTLR_EL1, BIT(46)
|
||||
workaround_reset_end neoverse_v3, CVE(2024, 5660)
|
||||
|
||||
check_erratum_ls neoverse_v3, CVE(2024, 5660), CPU_REV(0, 1)
|
||||
|
||||
workaround_reset_start neoverse_v3, CVE(2022,23960), WORKAROUND_CVE_2022_23960
|
||||
#if IMAGE_BL31
|
||||
/*
|
||||
|
@ -69,6 +62,13 @@ workaround_reset_end neoverse_v3, CVE(2022,23960)
|
|||
|
||||
check_erratum_chosen neoverse_v3, CVE(2022, 23960), WORKAROUND_CVE_2022_23960
|
||||
|
||||
/* Disable hardware page aggregation. Enables mitigation for `CVE-2024-5660` */
|
||||
workaround_reset_start neoverse_v3, CVE(2024, 5660), WORKAROUND_CVE_2024_5660
|
||||
sysreg_bit_set NEOVERSE_V3_CPUECTLR_EL1, BIT(46)
|
||||
workaround_reset_end neoverse_v3, CVE(2024, 5660)
|
||||
|
||||
check_erratum_ls neoverse_v3, CVE(2024, 5660), CPU_REV(0, 1)
|
||||
|
||||
workaround_reset_start neoverse_v3, CVE(2024, 7881), WORKAROUND_CVE_2024_7881
|
||||
/* ---------------------------------
|
||||
* Sets BIT41 of CPUACTLR6_EL1 which
|
||||
|
|
Loading…
Add table
Reference in a new issue