| 6cf8d65f | 28-Aug-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
cpus: denver: Implement static workaround for CVE-2018-3639
For Denver CPUs, this approach enables the mitigation during EL3 initialization, following every PE reset. No mechanism is provided to dis
cpus: denver: Implement static workaround for CVE-2018-3639
For Denver CPUs, this approach enables the mitigation during EL3 initialization, following every PE reset. No mechanism is provided to disable the mitigation at runtime.
This approach permanently mitigates the EL3 software stack only. Other software components are responsible to enable it for their exception levels.
TF-A implements this approach for the Denver CPUs with DENVER_MIDR_PN3 and earlier:
* By setting bit 11 (Disable speculative store buffering) of `ACTLR_EL3`
* By setting bit 9 (Disable speculative memory disambiguation) of `ACTLR_EL3`
TF-A implements this approach for the Denver CPUs with DENVER_MIDR_PN4 and later:
* By setting bit 18 (Disable speculative store buffering) of `ACTLR_EL3`
* By setting bit 17 (Disable speculative memory disambiguation) of `ACTLR_EL3`
Change-Id: If1de96605ce3f7b0aff5fab2c828e5aecb687555 Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| cf3ed0dc | 25-Jun-2018 |
Varun Wadekar <vwadekar@nvidia.com> |
cpus: denver: reset power state to 'C1' on boot
Denver CPUs expect the power state field to be reset to 'C1' during boot. This patch updates the reset handler to reset the ACTLR_.PMSTATE field to 'C
cpus: denver: reset power state to 'C1' on boot
Denver CPUs expect the power state field to be reset to 'C1' during boot. This patch updates the reset handler to reset the ACTLR_.PMSTATE field to 'C1' state during CPU boot.
Change-Id: I7cb629627a4dd1a30ec5cbb3a5e90055244fe30c Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
show more ...
|
| d6b79809 | 16-May-2018 |
Dimitris Papastamos <dimitris.papastamos@arm.com> |
Implement dynamic mitigation for CVE-2018-3639 on Cortex-A76
The Cortex-A76 implements SMCCC_ARCH_WORKAROUND_2 as defined in "Firmware interfaces for mitigating cache speculation vulnerabilities Sys
Implement dynamic mitigation for CVE-2018-3639 on Cortex-A76
The Cortex-A76 implements SMCCC_ARCH_WORKAROUND_2 as defined in "Firmware interfaces for mitigating cache speculation vulnerabilities System Software on Arm Systems"[0].
Dynamic mitigation for CVE-2018-3639 is enabled/disabled by setting/clearning bit 16 (Disable load pass store) of `CPUACTLR2_EL1`.
NOTE: The generic code that implements dynamic mitigation does not currently implement the expected semantics when dispatching an SDEI event to a lower EL. This will be fixed in a separate patch.
[0] https://developer.arm.com/cache-speculation-vulnerability-firmware-specification
Change-Id: I8fb2862b9ab24d55a0e9693e48e8be4df32afb5a Signed-off-by: Dimitris Papastamos <dimitris.papastamos@arm.com>
show more ...
|