mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-15 17:14:21 +00:00

The erratum titled “Disabling of data prefetcher with outstanding prefetch TLB miss might cause a deadlock” should not be handled within TF-A. The current workaround attempts to follow option 2 but misapplies it. Specifically, it statically sets PF_MODE to conservative, which is not the recommended approach. According to the erratum documentation, PF_MODE should be configured in conservative mode only when we disable data prefetcher however this is not done in TF-A and thus the workaround is not needed in TF-A. The static setting of PF_MODE in TF-A does not correctly address the erratum and may introduce unnecessary performance degradation on platforms that adopt it without fully understanding its implications. To prevent incorrect or unintended use, the current implementation of this erratum workaround should be removed from TF-A and not adopted by platforms. List of Impacted CPU's with Errata Numbers and reference to SDEN - Cortex-A78 - 2132060 - https://developer.arm.com/documentation/SDEN1401784/latest Cortex-A78C - 2132064 - https://developer.arm.com/documentation/SDEN-2004089/latest Cortex-A710 - 2058056 - https://developer.arm.com/documentation/SDEN-1775101/latest Cortex-X2 - 2058056 - https://developer.arm.com/documentation/SDEN-1775100/latest Cortex-X3 - 2070301 - https://developer.arm.com/documentation/SDEN2055130/latest Neoverse-N2 - 2138953 - https://developer.arm.com/documentation/SDEN-1982442/latest Neoverse-V1 - 2108267 - https://developer.arm.com/documentation/SDEN-1401781/latest Neoverse-V2 - 2331132 - https://developer.arm.com/documentation/SDEN-2332927/latest Change-Id: Icf4048508ae070b2df073cc46c63be058b2779df Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
159 lines
5.5 KiB
ArmAsm
159 lines
5.5 KiB
ArmAsm
/*
|
|
* Copyright (c) 2021-2025, Arm Limited. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <arch.h>
|
|
#include <asm_macros.S>
|
|
#include <common/bl_common.h>
|
|
#include <cortex_a78c.h>
|
|
#include <cpu_macros.S>
|
|
#include <plat_macros.S>
|
|
#include "wa_cve_2022_23960_bhb_vector.S"
|
|
|
|
/* Hardware handled coherency */
|
|
#if HW_ASSISTED_COHERENCY == 0
|
|
#error "cortex_a78c must be compiled with HW_ASSISTED_COHERENCY enabled"
|
|
#endif
|
|
|
|
#if WORKAROUND_CVE_2022_23960
|
|
wa_cve_2022_23960_bhb_vector_table CORTEX_A78C_BHB_LOOP_COUNT, cortex_a78c
|
|
#endif /* WORKAROUND_CVE_2022_23960 */
|
|
|
|
cpu_reset_prologue cortex_a78c
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(1827430), ERRATA_A78C_1827430
|
|
/* Disable allocation of splintered pages in the L2 TLB */
|
|
sysreg_bit_set CORTEX_A78C_CPUECTLR_EL1, CORTEX_A78C_CPUECTLR_EL1_MM_ASP_EN
|
|
workaround_reset_end cortex_a78c, ERRATUM(1827430)
|
|
|
|
check_erratum_ls cortex_a78c, ERRATUM(1827430), CPU_REV(0, 0)
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(1827440), ERRATA_A78C_1827440
|
|
/* Force Atomic Store to WB memory be done in L1 data cache */
|
|
sysreg_bit_set CORTEX_A78C_CPUACTLR2_EL1, BIT(2)
|
|
workaround_reset_end cortex_a78c, ERRATUM(1827440)
|
|
|
|
check_erratum_ls cortex_a78c, ERRATUM(1827440), CPU_REV(0, 0)
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(2242638), ERRATA_A78C_2242638
|
|
ldr x0, =0x5
|
|
msr CORTEX_A78C_IMP_CPUPSELR_EL3, x0
|
|
ldr x0, =0x10F600E000
|
|
msr CORTEX_A78C_IMP_CPUPOR_EL3, x0
|
|
ldr x0, =0x10FF80E000
|
|
msr CORTEX_A78C_IMP_CPUPMR_EL3, x0
|
|
ldr x0, =0x80000000003FF
|
|
msr CORTEX_A78C_IMP_CPUPCR_EL3, x0
|
|
workaround_reset_end cortex_a78c, ERRATUM(2242638)
|
|
|
|
check_erratum_range cortex_a78c, ERRATUM(2242638), CPU_REV(0, 1), CPU_REV(0, 2)
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(2376749), ERRATA_A78C_2376749
|
|
sysreg_bit_set CORTEX_A78C_CPUACTLR2_EL1, CORTEX_A78C_CPUACTLR2_EL1_BIT_0
|
|
workaround_reset_end cortex_a78c, ERRATUM(2376749)
|
|
|
|
check_erratum_range cortex_a78c, ERRATUM(2376749), CPU_REV(0, 1), CPU_REV(0, 2)
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(2395411), ERRATA_A78C_2395411
|
|
sysreg_bit_set CORTEX_A78C_CPUACTLR2_EL1, CORTEX_A78C_CPUACTLR2_EL1_BIT_40
|
|
workaround_reset_end cortex_a78c, ERRATUM(2395411)
|
|
|
|
check_erratum_range cortex_a78c, ERRATUM(2395411), CPU_REV(0, 1), CPU_REV(0, 2)
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(2683027), ERRATA_A78C_2683027
|
|
ldr x0, =0x3
|
|
msr CORTEX_A78C_IMP_CPUPSELR_EL3, x0
|
|
ldr x0, =0xEE010F10
|
|
msr CORTEX_A78C_IMP_CPUPOR_EL3, x0
|
|
ldr x0, =0xFF1F0FFE
|
|
msr CORTEX_A78C_IMP_CPUPMR_EL3, x0
|
|
ldr x0, =0x100000004003FF
|
|
msr CORTEX_A78C_IMP_CPUPCR_EL3, x0
|
|
workaround_reset_end cortex_a78c, ERRATUM(2683027)
|
|
|
|
check_erratum_range cortex_a78c, ERRATUM(2683027), CPU_REV(0, 1), CPU_REV(0, 2)
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(2743232), ERRATA_A78C_2743232
|
|
/* Set CPUACTLR5_EL1[56:55] to 2'b01 */
|
|
sysreg_bit_set CORTEX_A78C_ACTLR5_EL1, BIT(55)
|
|
sysreg_bit_clear CORTEX_A78C_ACTLR5_EL1, BIT(56)
|
|
workaround_reset_end cortex_a78c, ERRATUM(2743232)
|
|
|
|
check_erratum_range cortex_a78c, ERRATUM(2743232), CPU_REV(0, 1), CPU_REV(0, 2)
|
|
|
|
workaround_runtime_start cortex_a78c, ERRATUM(2772121), ERRATA_A78C_2772121
|
|
/* dsb before isb of power down sequence */
|
|
dsb sy
|
|
workaround_runtime_end cortex_a78c, ERRATUM(2772121)
|
|
|
|
check_erratum_ls cortex_a78c, ERRATUM(2772121), CPU_REV(0, 2)
|
|
|
|
workaround_reset_start cortex_a78c, ERRATUM(2779484), ERRATA_A78C_2779484
|
|
sysreg_bit_set CORTEX_A78C_ACTLR3_EL1, BIT(47)
|
|
workaround_reset_end cortex_a78c, ERRATUM(2779484)
|
|
|
|
check_erratum_range cortex_a78c, ERRATUM(2779484), CPU_REV(0, 1), CPU_REV(0, 2)
|
|
|
|
check_erratum_chosen cortex_a78c, CVE(2022, 23960), WORKAROUND_CVE_2022_23960
|
|
|
|
workaround_reset_start cortex_a78c, CVE(2022, 23960), WORKAROUND_CVE_2022_23960
|
|
#if IMAGE_BL31
|
|
/*
|
|
* The Cortex-A78c generic vectors are overridden to apply errata
|
|
* mitigation on exception entry from lower ELs.
|
|
*/
|
|
override_vector_table wa_cve_vbar_cortex_a78c
|
|
#endif /* IMAGE_BL31 */
|
|
workaround_reset_end cortex_a78c, CVE(2022, 23960)
|
|
|
|
/* Disable hardware page aggregation. Enables mitigation for `CVE-2024-5660` */
|
|
workaround_reset_start cortex_a78c, CVE(2024, 5660), WORKAROUND_CVE_2024_5660
|
|
sysreg_bit_set CORTEX_A78C_CPUECTLR_EL1, BIT(46)
|
|
workaround_reset_end cortex_a78c, CVE(2024, 5660)
|
|
|
|
check_erratum_ls cortex_a78c, CVE(2024, 5660), CPU_REV(0, 2)
|
|
|
|
cpu_reset_func_start cortex_a78c
|
|
cpu_reset_func_end cortex_a78c
|
|
|
|
/* ----------------------------------------------------
|
|
* HW will do the cache maintenance while powering down
|
|
* ----------------------------------------------------
|
|
*/
|
|
func cortex_a78c_core_pwr_dwn
|
|
/* ---------------------------------------------------
|
|
* Enable CPU power down bit in power control register
|
|
* ---------------------------------------------------
|
|
*/
|
|
sysreg_bit_set CORTEX_A78C_CPUPWRCTLR_EL1, CORTEX_A78C_CPUPWRCTLR_EL1_CORE_PWRDN_EN_BIT
|
|
|
|
apply_erratum cortex_a78c, ERRATUM(2772121), ERRATA_A78C_2772121, NO_GET_CPU_REV
|
|
|
|
isb
|
|
ret
|
|
endfunc cortex_a78c_core_pwr_dwn
|
|
|
|
/* ---------------------------------------------
|
|
* This function provides cortex_a78c specific
|
|
* register information for crash reporting.
|
|
* It needs to return with x6 pointing to
|
|
* a list of register names in ascii and
|
|
* x8 - x15 having values of registers to be
|
|
* reported.
|
|
* ---------------------------------------------
|
|
*/
|
|
.section .rodata.cortex_a78c_regs, "aS"
|
|
cortex_a78c_regs: /* The ascii list of register names to be reported */
|
|
.asciz "cpuectlr_el1", ""
|
|
|
|
func cortex_a78c_cpu_reg_dump
|
|
adr x6, cortex_a78c_regs
|
|
mrs x8, CORTEX_A78C_CPUECTLR_EL1
|
|
ret
|
|
endfunc cortex_a78c_cpu_reg_dump
|
|
|
|
declare_cpu_ops cortex_a78c, CORTEX_A78C_MIDR, \
|
|
cortex_a78c_reset_func, \
|
|
cortex_a78c_core_pwr_dwn
|