| 925db12f | 28-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "fix(cpus): workaround for Cortex-A65AE erratum 1638571" into integration |
| 7096d2bc | 28-Jan-2026 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for Cortex-A65AE erratum 1638571
Cortex-A65AE erratum 1638571 is a Cat B erratum that applies to revisions r0p0, r1p0, r1p1, and is still open.
This erratum can be avoided by
fix(cpus): workaround for Cortex-A65AE erratum 1638571
Cortex-A65AE erratum 1638571 is a Cat B erratum that applies to revisions r0p0, r1p0, r1p1, and is still open.
This erratum can be avoided by disable stage1 page table walk for lower Els (EL1 and EL0) in EL3, so 'AT' speculative fetch at any point produces either the correct result or failure without TLB allocation.
SDEN documentation: https://developer.arm.com/documentation/SDEN1344564/latest
Change-Id: I861230de94a105fd52f9c8ef7e7551a2633c065b Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| 82ec67c2 | 26-Jan-2026 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(cpus): remove C1-Premium erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Premium erratum 3651221 [2] support.
fix(cpus): remove C1-Premium erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Premium erratum 3651221 [2] support.
[1] : https://developer.arm.com/documentation/110326/latest/ [2] : https://developer.arm.com/documentation/111078/latest/ Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I40b37ec62788884ae5c0a0bb3eb4b924622ffe55
show more ...
|
| 5b7afcb3 | 26-Jan-2026 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(cpus): remove C1-Ultra erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Ultra erratum 3651221 [2] support.
[1]
fix(cpus): remove C1-Ultra erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Ultra erratum 3651221 [2] support.
[1] : https://developer.arm.com/documentation/110326/latest/ [2] : https://developer.arm.com/documentation/111077/latest/ Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: If7ea433e4614f92333e788e3f6b366db22c92f0d
show more ...
|
| 807d7bc0 | 23-Jan-2026 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(cpus): correct CVE-2024-7881 workaround and drop duplicate erratum
Fix the CVE-2024-7881 [1] workaround for C1-Pro. The previously implemented erratum 3684268 [2] programmed the same control bit
fix(cpus): correct CVE-2024-7881 workaround and drop duplicate erratum
Fix the CVE-2024-7881 [1] workaround for C1-Pro. The previously implemented erratum 3684268 [2] programmed the same control bit and overlapped functionally with the CVE workaround, so the duplicate erratum is removed.
Reference: [1] https://developer.arm.com/documentation/110326/latest/ [2] https://developer.arm.com/documentation/SDEN-3273080/latest/
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I6207c49486e4020f34c862ad40ec3137bd3684cc
show more ...
|
| 42453995 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for C1-Premium
This patch mitigates CVE-2025-0647 for C1-Premium CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Iec
fix(security): add CVE-2025-0647 for C1-Premium
This patch mitigates CVE-2025-0647 for C1-Premium CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Iec070b6e2a73c6218d150e32149b25ba4c94ea3a Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 2bf674ef | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for C1-Ultra
This patch mitigates CVE-2025-0647 for C1-Ultra CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I506007
fix(security): add CVE-2025-0647 for C1-Ultra
This patch mitigates CVE-2025-0647 for C1-Ultra CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I506007ec8702b183e377be50eede72d6803b344b Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Signed-off-by: John Powell <john.powell@arm.com>
show more ...
|
| efdd8ce6 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Neoverse-V3
This patch mitigates CVE-2025-0647 for Neoverse-V3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Neoverse-V3
This patch mitigates CVE-2025-0647 for Neoverse-V3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Ic52ad93474c5f81e01eb4839ece726c84c3348ff Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 145603e9 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Neoverse-V2
This patch mitigates CVE-2025-0647 for Neoverse-V2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Neoverse-V2
This patch mitigates CVE-2025-0647 for Neoverse-V2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I7ec215a9dd168eb045366b589a02b54148f587c2 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| a142b102 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Neoverse-N2
This patch mitigates CVE-2025-0647 for Neoverse-N2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Neoverse-N2
This patch mitigates CVE-2025-0647 for Neoverse-N2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I366c2683cca22403d33f0761487e1ffa62e964ce Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Signed-off-by: John Powell <john.powell@arm.com>
show more ...
|
| f26fb932 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X925
This patch mitigates CVE-2025-0647 for Cortex-X925 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Cortex-X925
This patch mitigates CVE-2025-0647 for Cortex-X925 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I4c1ac2be3620566813c90f5815ffcc7205bb5ac9 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 680a74b1 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X4
This patch mitigates CVE-2025-0647 for Cortex-X4 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I585a
fix(security): add CVE-2025-0647 for Cortex-X4
This patch mitigates CVE-2025-0647 for Cortex-X4 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I585a7ea516515fe16a3eca907695728068cef611 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 7fe900e3 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X3
This patch mitigates CVE-2025-0647 for Cortex-X3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Ic276
fix(security): add CVE-2025-0647 for Cortex-X3
This patch mitigates CVE-2025-0647 for Cortex-X3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Ic276befafc1ca0b456826532437ca453eb7717a6 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 9c17b3ef | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X2
This patch mitigates CVE-2025-0647 for Cortex-X2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Idba6
fix(security): add CVE-2025-0647 for Cortex-X2
This patch mitigates CVE-2025-0647 for Cortex-X2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Idba607340d944a6387759c856e8eacc967e0ec06 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| a52dcaee | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-A710
This patch mitigates CVE-2025-0647 for Cortex-A710 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Cortex-A710
This patch mitigates CVE-2025-0647 for Cortex-A710 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I522dedfffd3108f7a94df1ce2cabd742ce682334 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Signed-off-by: John Powell <john.powell@arm.com>
show more ...
|
| 416b8613 | 05-Mar-2025 |
John Powell <john.powell@arm.com> |
fix(security): add workaround for CVE-2025-0647
This workaround fixes an issue with the CPP RCTX instruction by issuing an instruction patch sequence to trap uses of the CPP RCTX instruction from EL
fix(security): add workaround for CVE-2025-0647
This workaround fixes an issue with the CPP RCTX instruction by issuing an instruction patch sequence to trap uses of the CPP RCTX instruction from EL0, EL1, and EL2 to EL3 and perform a workaround procedure using the implementation defined trap handler to ensure the correct behavior of the system. In addition, it includes an EL3 API to be used if EL3 firmware needs to use the CPP RCTX instruction. This saves the overhead of exception handling, and EL3 does not generically support trapping EL3->EL3, and adding support for that is not trivial due to the implications for context management.
The issue affects the following CPUs:
C1-Premium C1-Ultra Cortex-A710 Cortex-X2 Cortex-X3 Cortex-X4 Cortex-X925 Neoverse N2 Neoverse V2 Neoverse V3 Neoverse V3AE (handled same as V3 CPU in TF-A CPU-Lib)
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I5e7589afbeb69ebb79c01bec80e29f572aff3d89 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| ed98a626 | 22-Jan-2026 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): fix the ordering of errata for C1 Premium
Reorder the errata to comply with the convention.
Change-Id: Ifd1c73224060c1c2e94c5f7978e9dc79e0229bd4 Signed-off-by: Xialin Liu <xialin.liu@arm
fix(cpus): fix the ordering of errata for C1 Premium
Reorder the errata to comply with the convention.
Change-Id: Ifd1c73224060c1c2e94c5f7978e9dc79e0229bd4 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| b8fd42ac | 22-Jan-2026 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): fix the ordering of errata for C1 Ultra
The CVE workaround is placed before errata workaround, fix it to comply with the convention.
Change-Id: I6482ce4015541c64d9ac0d9c9df2e84d0c9eaae0
fix(cpus): fix the ordering of errata for C1 Ultra
The CVE workaround is placed before errata workaround, fix it to comply with the convention.
Change-Id: I6482ce4015541c64d9ac0d9c9df2e84d0c9eaae0 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| 867fe8ec | 20-Jan-2026 |
Boyan Karatotev <boyan.karatotev@arm.com> |
refactor(cpus): export midr_match to a more global location
It's a useful little helper that is horribly underused. Put it in common code so that we can use it in future.
Change-Id: I635c581644b07a
refactor(cpus): export midr_match to a more global location
It's a useful little helper that is horribly underused. Put it in common code so that we can use it in future.
Change-Id: I635c581644b07a6ca5ff68bb4fa475c4052da691 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| 040ab75d | 19-Jan-2026 |
Manish Pandey <manish.pandey2@arm.com> |
Merge "feat(cpus): add support for Rosillo cpu" into integration |
| d62f795c | 19-Jan-2026 |
Manish Pandey <manish.pandey2@arm.com> |
Merge changes I215a84bd,I83710d84 into integration
* changes: perf(cpus): reduce the footprint of errata reporting refactor(cpus): make errata reporting more generic |
| c9017cbc | 05-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
feat(cpus): add support for Rosillo cpu
Add basic CPU library code to support Rosillo CPU
Change-Id: I0e11e511511562297e4dccd2745842ebcfa2bff4 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> |
| 1df0bb50 | 12-Dec-2025 |
Jaiprakash Singh <jaiprakashs@marvell.com> |
fix(cpus): enable Neoverse-V2 external LLC support
Change-Id: I9582c7405db6862e77db240822e241d4082966f2 Signed-off-by: Jaiprakash Singh <jaiprakashs@marvell.com> |
| 9718d0db | 19-Dec-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
perf(cpus): reduce the footprint of errata reporting
Since the advent of spin_trylock() it's possible to combine the spinlock with the errata_reported field. If the spinlock is only acquired with a
perf(cpus): reduce the footprint of errata reporting
Since the advent of spin_trylock() it's possible to combine the spinlock with the errata_reported field. If the spinlock is only acquired with a non-blocking call then a successful call means reporting should be done and an unsuccessful one means that reporting would have been done by whoever acquired it. This relies on the lock never being released which this patch does. The effect is a smaller memory footprint and a smaller runtime.
Change-Id: I215a84bd2c91e33703349c41fc59f654f7764b2f Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| 9d619dec | 19-Dec-2025 |
Boyan Karatotev <boyan.karatotev@arm.com> |
refactor(cpus): make errata reporting more generic
Only the backing store differs between the cpu_ops_ptr argument so hoist that up and make things easier to follow.
Change-Id: I83710d8475a4a55046c
refactor(cpus): make errata reporting more generic
Only the backing store differs between the cpu_ops_ptr argument so hoist that up and make things easier to follow.
Change-Id: I83710d8475a4a55046cf2eb6d16cd27b8ef0f3c3 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|