mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-11 07:04:22 +00:00

The erratum titled “Disabling of data prefetcher with outstanding prefetch TLB miss might cause a deadlock” should not be handled within TF-A. The current workaround attempts to follow option 2 but misapplies it. Specifically, it statically sets PF_MODE to conservative, which is not the recommended approach. According to the erratum documentation, PF_MODE should be configured in conservative mode only when we disable data prefetcher however this is not done in TF-A and thus the workaround is not needed in TF-A. The static setting of PF_MODE in TF-A does not correctly address the erratum and may introduce unnecessary performance degradation on platforms that adopt it without fully understanding its implications. To prevent incorrect or unintended use, the current implementation of this erratum workaround should be removed from TF-A and not adopted by platforms. List of Impacted CPU's with Errata Numbers and reference to SDEN - Cortex-A78 - 2132060 - https://developer.arm.com/documentation/SDEN1401784/latest Cortex-A78C - 2132064 - https://developer.arm.com/documentation/SDEN-2004089/latest Cortex-A710 - 2058056 - https://developer.arm.com/documentation/SDEN-1775101/latest Cortex-X2 - 2058056 - https://developer.arm.com/documentation/SDEN-1775100/latest Cortex-X3 - 2070301 - https://developer.arm.com/documentation/SDEN2055130/latest Neoverse-N2 - 2138953 - https://developer.arm.com/documentation/SDEN-1982442/latest Neoverse-V1 - 2108267 - https://developer.arm.com/documentation/SDEN-1401781/latest Neoverse-V2 - 2331132 - https://developer.arm.com/documentation/SDEN-2332927/latest Change-Id: Icf4048508ae070b2df073cc46c63be058b2779df Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
157 lines
5.6 KiB
ArmAsm
157 lines
5.6 KiB
ArmAsm
/*
|
|
* Copyright (c) 2021-2025, Arm Limited. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <arch.h>
|
|
#include <asm_macros.S>
|
|
#include <common/bl_common.h>
|
|
#include <neoverse_v2.h>
|
|
#include <cpu_macros.S>
|
|
#include <plat_macros.S>
|
|
#include "wa_cve_2022_23960_bhb_vector.S"
|
|
|
|
/* Hardware handled coherency */
|
|
#if HW_ASSISTED_COHERENCY == 0
|
|
#error "Neoverse V2 must be compiled with HW_ASSISTED_COHERENCY enabled"
|
|
#endif
|
|
|
|
/* 64-bit only core */
|
|
#if CTX_INCLUDE_AARCH32_REGS == 1
|
|
#error "Neoverse V2 supports only AArch64. Compile with CTX_INCLUDE_AARCH32_REGS=0"
|
|
#endif
|
|
|
|
cpu_reset_prologue neoverse_v2
|
|
|
|
workaround_reset_start neoverse_v2, ERRATUM(2618597), ERRATA_V2_2618597
|
|
/* Disable retention control for WFI and WFE. */
|
|
mrs x0, NEOVERSE_V2_CPUPWRCTLR_EL1
|
|
bfi x0, xzr, #NEOVERSE_V2_CPUPWRCTLR_EL1_WFI_RET_CTRL_SHIFT, \
|
|
#NEOVERSE_V2_CPUPWRCTLR_EL1_WFI_RET_CTRL_WIDTH
|
|
bfi x0, xzr, #NEOVERSE_V2_CPUPWRCTLR_EL1_WFE_RET_CTRL_SHIFT, \
|
|
#NEOVERSE_V2_CPUPWRCTLR_EL1_WFE_RET_CTRL_WIDTH
|
|
msr NEOVERSE_V2_CPUPWRCTLR_EL1, x0
|
|
workaround_reset_end neoverse_v2, ERRATUM(2618597)
|
|
|
|
check_erratum_ls neoverse_v2, ERRATUM(2618597), CPU_REV(0, 1)
|
|
|
|
workaround_reset_start neoverse_v2, ERRATUM(2662553), ERRATA_V2_2662553
|
|
sysreg_bitfield_insert NEOVERSE_V2_CPUECTLR2_EL1, NEOVERSE_V2_CPUECTLR2_EL1_TXREQ_STATIC_FULL, \
|
|
NEOVERSE_V2_CPUECTLR2_EL1_TXREQ_LSB, NEOVERSE_V2_CPUECTLR2_EL1_TXREQ_WIDTH
|
|
workaround_reset_end neoverse_v2, ERRATUM(2662553)
|
|
|
|
check_erratum_ls neoverse_v2, ERRATUM(2662553), CPU_REV(0, 1)
|
|
|
|
workaround_reset_start neoverse_v2, ERRATUM(2719105), ERRATA_V2_2719105
|
|
sysreg_bit_set NEOVERSE_V2_CPUACTLR2_EL1, NEOVERSE_V2_CPUACTLR2_EL1_BIT_0
|
|
workaround_reset_end neoverse_v2, ERRATUM(2719105)
|
|
|
|
check_erratum_ls neoverse_v2, ERRATUM(2719105), CPU_REV(0, 1)
|
|
|
|
workaround_reset_start neoverse_v2, ERRATUM(2743011), ERRATA_V2_2743011
|
|
sysreg_bit_set NEOVERSE_V2_CPUACTLR5_EL1, NEOVERSE_V2_CPUACTLR5_EL1_BIT_55
|
|
sysreg_bit_clear NEOVERSE_V2_CPUACTLR5_EL1, NEOVERSE_V2_CPUACTLR5_EL1_BIT_56
|
|
workaround_reset_end neoverse_v2, ERRATUM(2743011)
|
|
|
|
check_erratum_ls neoverse_v2, ERRATUM(2743011), CPU_REV(0, 1)
|
|
|
|
workaround_reset_start neoverse_v2, ERRATUM(2779510), ERRATA_V2_2779510
|
|
sysreg_bit_set NEOVERSE_V2_CPUACTLR3_EL1, NEOVERSE_V2_CPUACTLR3_EL1_BIT_47
|
|
workaround_reset_end neoverse_v2, ERRATUM(2779510)
|
|
|
|
check_erratum_ls neoverse_v2, ERRATUM(2779510), CPU_REV(0, 1)
|
|
|
|
workaround_runtime_start neoverse_v2, ERRATUM(2801372), ERRATA_V2_2801372
|
|
/* dsb before isb of power down sequence */
|
|
dsb sy
|
|
workaround_runtime_end neoverse_v2, ERRATUM(2801372), ERRATA_V2_2801372
|
|
|
|
check_erratum_ls neoverse_v2, ERRATUM(2801372), CPU_REV(0, 1)
|
|
|
|
workaround_reset_start neoverse_v2, CVE(2022,23960), WORKAROUND_CVE_2022_23960
|
|
#if IMAGE_BL31
|
|
/*
|
|
* The Neoverse-V2 generic vectors are overridden to apply errata
|
|
* mitigation on exception entry from lower ELs.
|
|
*/
|
|
override_vector_table wa_cve_vbar_neoverse_v2
|
|
#endif /* IMAGE_BL31 */
|
|
workaround_reset_end neoverse_v2, CVE(2022,23960)
|
|
|
|
check_erratum_chosen neoverse_v2, CVE(2022, 23960), WORKAROUND_CVE_2022_23960
|
|
|
|
/* Disable hardware page aggregation. Enables mitigation for `CVE-2024-5660` */
|
|
workaround_reset_start neoverse_v2, CVE(2024, 5660), WORKAROUND_CVE_2024_5660
|
|
sysreg_bit_set NEOVERSE_V2_CPUECTLR_EL1, BIT(46)
|
|
workaround_reset_end neoverse_v2, CVE(2024, 5660)
|
|
|
|
check_erratum_ls neoverse_v2, CVE(2024, 5660), CPU_REV(0, 2)
|
|
|
|
#if WORKAROUND_CVE_2022_23960
|
|
wa_cve_2022_23960_bhb_vector_table NEOVERSE_V2_BHB_LOOP_COUNT, neoverse_v2
|
|
#endif /* WORKAROUND_CVE_2022_23960 */
|
|
|
|
workaround_reset_start neoverse_v2, CVE(2024, 7881), WORKAROUND_CVE_2024_7881
|
|
/* ---------------------------------
|
|
* Sets BIT41 of CPUACTLR6_EL1 which
|
|
* disables L1 Data cache prefetcher
|
|
* ---------------------------------
|
|
*/
|
|
sysreg_bit_set NEOVERSE_V2_CPUACTLR6_EL1, BIT(41)
|
|
workaround_reset_end neoverse_v2, CVE(2024, 7881)
|
|
|
|
check_erratum_chosen neoverse_v2, CVE(2024, 7881), WORKAROUND_CVE_2024_7881
|
|
|
|
/* ----------------------------------------------------
|
|
* HW will do the cache maintenance while powering down
|
|
* ----------------------------------------------------
|
|
*/
|
|
func neoverse_v2_core_pwr_dwn
|
|
/* ---------------------------------------------------
|
|
* Enable CPU power down bit in power control register
|
|
* ---------------------------------------------------
|
|
*/
|
|
sysreg_bit_set NEOVERSE_V2_CPUPWRCTLR_EL1, NEOVERSE_V2_CPUPWRCTLR_EL1_CORE_PWRDN_BIT
|
|
apply_erratum neoverse_v2, ERRATUM(2801372), ERRATA_V2_2801372, NO_GET_CPU_REV
|
|
|
|
isb
|
|
ret
|
|
endfunc neoverse_v2_core_pwr_dwn
|
|
|
|
cpu_reset_func_start neoverse_v2
|
|
/* Disable speculative loads */
|
|
msr SSBS, xzr
|
|
|
|
#if NEOVERSE_Vx_EXTERNAL_LLC
|
|
/* Some systems may have External LLC, core needs to be made aware */
|
|
sysreg_bit_set NEOVERSE_V2_CPUECTLR_EL1, NEOVERSE_V2_CPUECTLR_EL1_EXTLLC_BIT
|
|
#endif
|
|
cpu_reset_func_end neoverse_v2
|
|
|
|
/* ---------------------------------------------
|
|
* This function provides Neoverse V2-
|
|
* specific register information for crash
|
|
* reporting. It needs to return with x6
|
|
* pointing to a list of register names in ascii
|
|
* and x8 - x15 having values of registers to be
|
|
* reported.
|
|
* ---------------------------------------------
|
|
*/
|
|
.section .rodata.neoverse_v2_regs, "aS"
|
|
neoverse_v2_regs: /* The ascii list of register names to be reported */
|
|
.asciz "cpuectlr_el1", ""
|
|
|
|
func neoverse_v2_cpu_reg_dump
|
|
adr x6, neoverse_v2_regs
|
|
mrs x8, NEOVERSE_V2_CPUECTLR_EL1
|
|
ret
|
|
endfunc neoverse_v2_cpu_reg_dump
|
|
|
|
declare_cpu_ops_wa_4 neoverse_v2, NEOVERSE_V2_MIDR, \
|
|
neoverse_v2_reset_func, \
|
|
CPU_NO_EXTRA1_FUNC, \
|
|
CPU_NO_EXTRA2_FUNC, \
|
|
CPU_NO_EXTRA3_FUNC, \
|
|
check_erratum_neoverse_v2_7881, \
|
|
neoverse_v2_core_pwr_dwn
|