| #
7b49b2ec |
| 18-Dec-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge changes from topic "xl/c1pro-errata" into integration
* changes: fix(cpus): workaround for C1-Pro erratum 3686597 fix(cpus): workaround for C1-Pro erratum 3300099 fix(cpus): workaround f
Merge changes from topic "xl/c1pro-errata" into integration
* changes: fix(cpus): workaround for C1-Pro erratum 3686597 fix(cpus): workaround for C1-Pro erratum 3300099 fix(cpus): workaround for C1-Pro erratum 3338470 fix(cpus): workaround for C1-Pro erratum 3362007 fix(cpus): workaround for C1-Pro erratum 3684268 fix(cpus): workaround for C1-Pro erratum 3694158 fix(cpus): workaround for C1-Pro erratum 3706576
show more ...
|
| #
740b3bb2 |
| 10-Dec-2025 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for C1-Pro erratum 3300099
C1-Pro erratum 3300099 is a Cat B erratum that applies to revisions r0p0, r1p0, and is fixed in r1p1.
This is workaround for accessing ICH_VMCR_EL2.
fix(cpus): workaround for C1-Pro erratum 3300099
C1-Pro erratum 3300099 is a Cat B erratum that applies to revisions r0p0, r1p0, and is fixed in r1p1.
This is workaround for accessing ICH_VMCR_EL2. When ICH_VMCR_EL2.VBPR1 is written in Secure state (SCR_EL3.NS==0) and then subsequently read in Non-secure state (SCR_EL3.NS==1), a wrong value might be returned. The same issue exists in the opposite way.
Adding workaround in EL3 software that performs context save/restore on a change of Security state to use a value of SCR_EL3.NS when accessing ICH_VMCR_EL2 that reflects the Security state that owns the data being saved or restored. For example, EL3 software should set SCR_EL3.NS to 1 when saving or restoring the value ICH_VMCR_EL2 for Non-secure(or Realm) state. EL3 software should clear SCR_EL3.NS to 0 when saving or restoring the value ICH_VMCR_EL2 for Secure state.
SDEN documentation: https://developer.arm.com/documentation/SDEN-3273080/1300/?lang=en
Change-Id: If24d3230c4b4e87fcb831d446cf0d0c68c95ea18 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| #
0d3eb4d0 |
| 05-Dec-2025 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for C1-Pro erratum 3684268
C1-Pro erratum 3684268 is a Cat B erratum that applies to revisions r0p0, r1p0 and it is fixed in r1p1.
The erratum is avoided by disabling the affe
fix(cpus): workaround for C1-Pro erratum 3684268
C1-Pro erratum 3684268 is a Cat B erratum that applies to revisions r0p0, r1p0 and it is fixed in r1p1.
The erratum is avoided by disabling the affected prefetcher, which is done by setting CPUECTLR2_EL1[49] to 1.
SDEN documentation: https://developer.arm.com/documentation/SDEN-3273080/1300/?lang=en
Change-Id: I7929e931572471370b1a899d412b11f1c4d206c8 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| #
dd83309f |
| 05-Dec-2025 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for C1-Pro erratum 3694158
C1-Pro erratum 3694158 is a Cat B erratum that applies to revisions r0p0, r1p0 and r1p1, it is fixed in r1p2.
This erratum can be avoided by inserti
fix(cpus): workaround for C1-Pro erratum 3694158
C1-Pro erratum 3694158 is a Cat B erratum that applies to revisions r0p0, r1p0 and r1p1, it is fixed in r1p2.
This erratum can be avoided by inserting a DMB LD after each DSB ST instruction with a CPU implementation specific patch sequence.
SDEN documentation: https://developer.arm.com/documentation/SDEN-3273080/1300/?lang=en
Change-Id: I38f0fb6565110c579ab16b76e0f4ca601fa1b912 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| #
7b60fae4 |
| 05-Dec-2025 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for C1-Pro erratum 3706576
C1-Pro erratum 3706576 is a Cat B erratum that applies to CPU revisions r0p0 and r1p0, and is fixed in r1p1.
This erratum might cause data corruptio
fix(cpus): workaround for C1-Pro erratum 3706576
C1-Pro erratum 3706576 is a Cat B erratum that applies to CPU revisions r0p0 and r1p0, and is fixed in r1p1.
This erratum might cause data corruption when Memory read effect crossing a 64B boundary, which can be avoided by setting CPUACTLR2_EL1[37] to 1. Setting this bit is expected to have a negligible performance impact.
SDEN documentation: https://developer.arm.com/documentation/SDEN-3273080/1300/?lang=en
Change-Id: Ie427e56c682065bdf82da9b11e71da6383db4e73 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| #
cd30f9f8 |
| 18-Sep-2025 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "chore(tc): align core names to Arm Lumex" into integration
|
| #
7dae0451 |
| 04-Sep-2025 |
Min Yao Ng <minyao.ng@arm.com> |
chore(tc): align core names to Arm Lumex
Adopt core names aligned to Arm Lumex [1]
Nevis => C1-Nano Gelas => C1-Pro Travis => C1-Ultra Alto => C1-Premium
C1-Pro TRM: https://developer.arm.com/docu
chore(tc): align core names to Arm Lumex
Adopt core names aligned to Arm Lumex [1]
Nevis => C1-Nano Gelas => C1-Pro Travis => C1-Ultra Alto => C1-Premium
C1-Pro TRM: https://developer.arm.com/documentation/107771/0102/ C1-Ultra TRM: https://developer.arm.com/documentation/108014/0100/ C1-Premium TRM: https://developer.arm.com/documentation/109416/0100/ C1-Nano TRM: https://developer.arm.com/documentation/107753/0001/
[1]: https://www.arm.com/product-filter?families=c1%20cpus https://www.arm.com/products/mobile/compute-subsystems/lumex
Signed-off-by: Min Yao Ng <minyao.ng@arm.com> Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Id4b487ef6a6fd1b00b75b09c5d06d81bce50a15d Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|