| 925db12f | 28-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
Merge "fix(cpus): workaround for Cortex-A65AE erratum 1638571" into integration |
| 7096d2bc | 28-Jan-2026 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for Cortex-A65AE erratum 1638571
Cortex-A65AE erratum 1638571 is a Cat B erratum that applies to revisions r0p0, r1p0, r1p1, and is still open.
This erratum can be avoided by
fix(cpus): workaround for Cortex-A65AE erratum 1638571
Cortex-A65AE erratum 1638571 is a Cat B erratum that applies to revisions r0p0, r1p0, r1p1, and is still open.
This erratum can be avoided by disable stage1 page table walk for lower Els (EL1 and EL0) in EL3, so 'AT' speculative fetch at any point produces either the correct result or failure without TLB allocation.
SDEN documentation: https://developer.arm.com/documentation/SDEN1344564/latest
Change-Id: I861230de94a105fd52f9c8ef7e7551a2633c065b Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| 82ec67c2 | 26-Jan-2026 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(cpus): remove C1-Premium erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Premium erratum 3651221 [2] support.
fix(cpus): remove C1-Premium erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Premium erratum 3651221 [2] support.
[1] : https://developer.arm.com/documentation/110326/latest/ [2] : https://developer.arm.com/documentation/111078/latest/ Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I40b37ec62788884ae5c0a0bb3eb4b924622ffe55
show more ...
|
| 5b7afcb3 | 26-Jan-2026 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(cpus): remove C1-Ultra erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Ultra erratum 3651221 [2] support.
[1]
fix(cpus): remove C1-Ultra erratum 3651221
This erratum workaround is already implemented as part of CVE-2024-7881 [1] and is redundant. This patch removes C1-Ultra erratum 3651221 [2] support.
[1] : https://developer.arm.com/documentation/110326/latest/ [2] : https://developer.arm.com/documentation/111077/latest/ Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: If7ea433e4614f92333e788e3f6b366db22c92f0d
show more ...
|
| 807d7bc0 | 23-Jan-2026 |
Arvind Ram Prakash <arvind.ramprakash@arm.com> |
fix(cpus): correct CVE-2024-7881 workaround and drop duplicate erratum
Fix the CVE-2024-7881 [1] workaround for C1-Pro. The previously implemented erratum 3684268 [2] programmed the same control bit
fix(cpus): correct CVE-2024-7881 workaround and drop duplicate erratum
Fix the CVE-2024-7881 [1] workaround for C1-Pro. The previously implemented erratum 3684268 [2] programmed the same control bit and overlapped functionally with the CVE workaround, so the duplicate erratum is removed.
Reference: [1] https://developer.arm.com/documentation/110326/latest/ [2] https://developer.arm.com/documentation/SDEN-3273080/latest/
Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I6207c49486e4020f34c862ad40ec3137bd3684cc
show more ...
|
| 42453995 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for C1-Premium
This patch mitigates CVE-2025-0647 for C1-Premium CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Iec
fix(security): add CVE-2025-0647 for C1-Premium
This patch mitigates CVE-2025-0647 for C1-Premium CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Iec070b6e2a73c6218d150e32149b25ba4c94ea3a Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 2bf674ef | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for C1-Ultra
This patch mitigates CVE-2025-0647 for C1-Ultra CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I506007
fix(security): add CVE-2025-0647 for C1-Ultra
This patch mitigates CVE-2025-0647 for C1-Ultra CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I506007ec8702b183e377be50eede72d6803b344b Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Signed-off-by: John Powell <john.powell@arm.com>
show more ...
|
| efdd8ce6 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Neoverse-V3
This patch mitigates CVE-2025-0647 for Neoverse-V3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Neoverse-V3
This patch mitigates CVE-2025-0647 for Neoverse-V3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Ic52ad93474c5f81e01eb4839ece726c84c3348ff Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 145603e9 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Neoverse-V2
This patch mitigates CVE-2025-0647 for Neoverse-V2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Neoverse-V2
This patch mitigates CVE-2025-0647 for Neoverse-V2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I7ec215a9dd168eb045366b589a02b54148f587c2 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| a142b102 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Neoverse-N2
This patch mitigates CVE-2025-0647 for Neoverse-N2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Neoverse-N2
This patch mitigates CVE-2025-0647 for Neoverse-N2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I366c2683cca22403d33f0761487e1ffa62e964ce Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Signed-off-by: John Powell <john.powell@arm.com>
show more ...
|
| f26fb932 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X925
This patch mitigates CVE-2025-0647 for Cortex-X925 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Cortex-X925
This patch mitigates CVE-2025-0647 for Cortex-X925 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I4c1ac2be3620566813c90f5815ffcc7205bb5ac9 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 680a74b1 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X4
This patch mitigates CVE-2025-0647 for Cortex-X4 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I585a
fix(security): add CVE-2025-0647 for Cortex-X4
This patch mitigates CVE-2025-0647 for Cortex-X4 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I585a7ea516515fe16a3eca907695728068cef611 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 7fe900e3 | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X3
This patch mitigates CVE-2025-0647 for Cortex-X3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Ic276
fix(security): add CVE-2025-0647 for Cortex-X3
This patch mitigates CVE-2025-0647 for Cortex-X3 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Ic276befafc1ca0b456826532437ca453eb7717a6 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| 9c17b3ef | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-X2
This patch mitigates CVE-2025-0647 for Cortex-X2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Idba6
fix(security): add CVE-2025-0647 for Cortex-X2
This patch mitigates CVE-2025-0647 for Cortex-X2 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: Idba607340d944a6387759c856e8eacc967e0ec06 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| a52dcaee | 22-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
fix(security): add CVE-2025-0647 for Cortex-A710
This patch mitigates CVE-2025-0647 for Cortex-A710 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I
fix(security): add CVE-2025-0647 for Cortex-A710
This patch mitigates CVE-2025-0647 for Cortex-A710 CPU.
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I522dedfffd3108f7a94df1ce2cabd742ce682334 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> Signed-off-by: John Powell <john.powell@arm.com>
show more ...
|
| 416b8613 | 05-Mar-2025 |
John Powell <john.powell@arm.com> |
fix(security): add workaround for CVE-2025-0647
This workaround fixes an issue with the CPP RCTX instruction by issuing an instruction patch sequence to trap uses of the CPP RCTX instruction from EL
fix(security): add workaround for CVE-2025-0647
This workaround fixes an issue with the CPP RCTX instruction by issuing an instruction patch sequence to trap uses of the CPP RCTX instruction from EL0, EL1, and EL2 to EL3 and perform a workaround procedure using the implementation defined trap handler to ensure the correct behavior of the system. In addition, it includes an EL3 API to be used if EL3 firmware needs to use the CPP RCTX instruction. This saves the overhead of exception handling, and EL3 does not generically support trapping EL3->EL3, and adding support for that is not trivial due to the implications for context management.
The issue affects the following CPUs:
C1-Premium C1-Ultra Cortex-A710 Cortex-X2 Cortex-X3 Cortex-X4 Cortex-X925 Neoverse N2 Neoverse V2 Neoverse V3 Neoverse V3AE (handled same as V3 CPU in TF-A CPU-Lib)
Arm Security Bulletin Document: https://developer.arm.com/documentation/111546
Change-Id: I5e7589afbeb69ebb79c01bec80e29f572aff3d89 Signed-off-by: John Powell <john.powell@arm.com> Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
show more ...
|
| ed98a626 | 22-Jan-2026 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): fix the ordering of errata for C1 Premium
Reorder the errata to comply with the convention.
Change-Id: Ifd1c73224060c1c2e94c5f7978e9dc79e0229bd4 Signed-off-by: Xialin Liu <xialin.liu@arm
fix(cpus): fix the ordering of errata for C1 Premium
Reorder the errata to comply with the convention.
Change-Id: Ifd1c73224060c1c2e94c5f7978e9dc79e0229bd4 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| b8fd42ac | 22-Jan-2026 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): fix the ordering of errata for C1 Ultra
The CVE workaround is placed before errata workaround, fix it to comply with the convention.
Change-Id: I6482ce4015541c64d9ac0d9c9df2e84d0c9eaae0
fix(cpus): fix the ordering of errata for C1 Ultra
The CVE workaround is placed before errata workaround, fix it to comply with the convention.
Change-Id: I6482ce4015541c64d9ac0d9c9df2e84d0c9eaae0 Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| 867fe8ec | 20-Jan-2026 |
Boyan Karatotev <boyan.karatotev@arm.com> |
refactor(cpus): export midr_match to a more global location
It's a useful little helper that is horribly underused. Put it in common code so that we can use it in future.
Change-Id: I635c581644b07a
refactor(cpus): export midr_match to a more global location
It's a useful little helper that is horribly underused. Put it in common code so that we can use it in future.
Change-Id: I635c581644b07a6ca5ff68bb4fa475c4052da691 Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
show more ...
|
| c9017cbc | 05-Jan-2026 |
Govindraj Raja <govindraj.raja@arm.com> |
feat(cpus): add support for Rosillo cpu
Add basic CPU library code to support Rosillo CPU
Change-Id: I0e11e511511562297e4dccd2745842ebcfa2bff4 Signed-off-by: Govindraj Raja <govindraj.raja@arm.com> |
| 0eaf5de8 | 06-Jan-2026 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topic "xl/n2-errata" into integration
* changes: fix(cpus): workaround for Neoverse-N2 erratum 2138953 fix(cpus): workaround for Neoverse-N2 erratum 4302970 fix(cpus): worka
Merge changes from topic "xl/n2-errata" into integration
* changes: fix(cpus): workaround for Neoverse-N2 erratum 2138953 fix(cpus): workaround for Neoverse-N2 erratum 4302970 fix(cpus): workaround for Neoverse-N2 erratum 3888123 refactor(cpus): reorder the errratum build flag for Neoverse-N2
show more ...
|
| ea5a7ab1 | 06-Jan-2026 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topic "xl/cortex-x3-errata" into integration
* changes: fix(cpus): workaround for Cortex-X3 erratum 4302966 fix(cpus): workaround for Cortex-X3 erratum 3888125 |
| a4defaef | 06-Jan-2026 |
Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
Merge changes from topic "xl/cortex-x2-errata" into integration
* changes: fix(cpus): workaround for Cortex-X2 erratum 4302969 fix(cpus): workaround for Cortex-X2 erratum 3888122 |
| 925661ad | 31-Dec-2025 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for Neoverse-N2 erratum 2138953
Neoverse-N2 erratum 2138953 that applies to revisions r0p0, r0p1, r0p2 and r0p3, and is still open.
The erratum can be avoided by executing a s
fix(cpus): workaround for Neoverse-N2 erratum 2138953
Neoverse-N2 erratum 2138953 that applies to revisions r0p0, r0p1, r0p2 and r0p3, and is still open.
The erratum can be avoided by executing a specific instruction sequence when disabling the hardware prefetcher.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1982442/latest
Change-Id: Ie465328e87754a1ec511a2f77243b4b0b09134cc Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|
| 420a0591 | 31-Dec-2025 |
Xialin Liu <xialin.liu@arm.com> |
fix(cpus): workaround for Neoverse-N2 erratum 4302970
Neoverse-N2 erratum 4302970 that applies to revisions r0p0, r0p1, r0p2, r0p3, and is still open.
This erratum can be avoided by setting CPUACTL
fix(cpus): workaround for Neoverse-N2 erratum 4302970
Neoverse-N2 erratum 4302970 that applies to revisions r0p0, r0p1, r0p2, r0p3, and is still open.
This erratum can be avoided by setting CPUACTLR5_EL1[50] to 1.
SDEN documentation: https://developer.arm.com/documentation/SDEN-1982442/latest
Change-Id: I2436b11a36be204d549522f1176fcd49658c044c Signed-off-by: Xialin Liu <xialin.liu@arm.com>
show more ...
|