| 1d766b6f | 05-Mar-2026 |
Manish V Badarkhe <Manish.Badarkhe@arm.com> |
fix(bl1): harden FWU copy/auth overflow checks
Use full-size overflow checks so invalid image source/size values can’t wrap and slip past validation during copy/auth, preventing out-of-range memory
fix(bl1): harden FWU copy/auth overflow checks
Use full-size overflow checks so invalid image source/size values can’t wrap and slip past validation during copy/auth, preventing out-of-range memory access.
Change-Id: Ie49793dd13e68f044c2ae78f33fcb1326d2853b4 Signed-off-by: Manish V Badarkhe <Manish.Badarkhe@arm.com>
show more ...
|
| 716c8648 | 08-Apr-2026 |
Boyan Karatotev <boyan.karatotev@arm.com> |
fix(cpus): unconstrain WORKAROUND_CVE_2025_0647
Conditional flag enables are strongly discouraged in TF-A because they cause cyclic dependencies that we are not equipped to deal with. On a real plat
fix(cpus): unconstrain WORKAROUND_CVE_2025_0647
Conditional flag enables are strongly discouraged in TF-A because they cause cyclic dependencies that we are not equipped to deal with. On a real platform, ARM_ARCH_{MAJOR, MINOR} should be set in platform.mk but WORKAROUND_CVE_2025_0647 gets its value before platform.mk is evaluated.
Further, WORKAROUND_CVE_2025_0647 is only present on cores the feature set of which is known ahead of time. Using ARM_ARCH_{MAJOR, MINOR} is redundant and incorrect (as it sidesteps the feature detection mechanism).
This patch solves both of these issues by making WORKAROUND_CVE_2025_0647 unconstrained by ARM_ARCH_{MAJOR, MINOR} and making it buildable on a v8.0 target. Running the workaround will only happen on affected cores which, by definition, all implement armv8.5 so doing any checks in unnecessary.
Change-Id: Ia164077f09b552d42b558ada4f6036cabbd34f64 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| 993c004c | 22-Oct-2025 |
Xialin Liu <xialin.liu@arm.com> |
feat(crypto): enable the runtime instrumentation for crypto extension
Add runtime instrumentation for the authentication process in BL1 and BL2, to measure the speedup of the authentication after en
feat(crypto): enable the runtime instrumentation for crypto extension
Add runtime instrumentation for the authentication process in BL1 and BL2, to measure the speedup of the authentication after enabling the crypto extension.
Change-Id: Ieea927e7e8bd0d109525f28b06510acf0ab62e5c Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| 51997e3d | 02-Apr-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
perf(cpufeat): centralise PAuth key saving
prepare_el3_entry() is meant to be the one-stop shop for all the context we must fiddle with to enter EL3 proper. However, PAuth is the one exception, happ
perf(cpufeat): centralise PAuth key saving
prepare_el3_entry() is meant to be the one-stop shop for all the context we must fiddle with to enter EL3 proper. However, PAuth is the one exception, happening right after. Absorb it into prepare_el3_entry(), handling the BL1/BL31 difference.
This is a good time to also move the key saving into the enable function, also to centralise. With this it becomes apparent that saving keys just before CPU_SUSPEND is redundant as they will be reinitialised when the core wakes up.
Note that the key loading, now in save_gp_pmcr_pauth_regs, does not end in an isb. The effects of the key change are not needed until the isb in the caller, so this isb is not needed.
Change-Id: Idd286bea91140c106ab4c933c5c44b0bc2050ca2 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|