<feed xmlns='http://www.w3.org/2005/Atom'>
<title>bcm63xx/atf/lib/cpus/aarch64/cortex_a75.S, branch master</title>
<subtitle>Broadcom-s Trusted Firmware A</subtitle>
<id>https://git-03.infra.openwrt.org/project/bcm63xx/atf/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/'/>
<updated>2019-05-03T13:23:55Z</updated>
<entry>
<title>Add compile-time errors for HW_ASSISTED_COHERENCY flag</title>
<updated>2019-05-03T13:23:55Z</updated>
<author>
<name>John Tsichritzis</name>
</author>
<published>2019-03-19T17:20:52Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=076b5f02e2747ef1b5a55f1c5d368df16f046b1c'/>
<id>urn:sha1:076b5f02e2747ef1b5a55f1c5d368df16f046b1c</id>
<content type='text'>
This patch fixes this issue:
https://github.com/ARM-software/tf-issues/issues/660

The introduced changes are the following:

1) Some cores implement cache coherency maintenance operation on the
hardware level. For those cores, such as - but not only - the DynamIQ
cores, it is mandatory that TF-A is compiled with the
HW_ASSISTED_COHERENCY flag. If not, the core behaviour at runtime is
unpredictable. To prevent this, compile time checks have been added and
compilation errors are generated, if needed.

2) To enable this change for FVP, a logical separation has been done for
the core libraries. A system cannot contain cores of both groups, i.e.
cores that manage coherency on hardware and cores that don't do it. As
such, depending on the HW_ASSISTED_COHERENCY flag, FVP includes the
libraries only of the relevant cores.

3) The neoverse_e1.S file has been added to the FVP sources.

Change-Id: I787d15819b2add4ec0d238249e04bf0497dc12f3
Signed-off-by: John Tsichritzis &lt;john.tsichritzis@arm.com&gt;
</content>
</entry>
<entry>
<title>DSU: Implement workaround for errata 798953</title>
<updated>2019-04-17T12:46:43Z</updated>
<author>
<name>Louis Mayencourt</name>
</author>
<published>2019-04-09T15:29:01Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=0e985d708e8f429c1fa1f557d3eea90e32de5228'/>
<id>urn:sha1:0e985d708e8f429c1fa1f557d3eea90e32de5228</id>
<content type='text'>
Under certain near idle conditions, DSU may miss response transfers on
the ACE master or Peripheral port, leading to deadlock. This workaround
disables high-level clock gating of the DSU to prevent this.

Change-Id: I820911d61570bacb38dd325b3519bc8d12caa14b
Signed-off-by: Louis Mayencourt &lt;louis.mayencourt@arm.com&gt;
</content>
</entry>
<entry>
<title>Add workaround for errata 790748 for Cortex-A75</title>
<updated>2019-02-26T16:20:59Z</updated>
<author>
<name>Louis Mayencourt</name>
</author>
<published>2019-02-25T14:57:57Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=98551591f5371de2c2f0dee6be2e12b75653f04d'/>
<id>urn:sha1:98551591f5371de2c2f0dee6be2e12b75653f04d</id>
<content type='text'>
Internal timing conditions might cause the CPU to stop processing
interrupts. Set bit 13 of CPUACTLR_EL1 to prevent this.

Change-Id: Ifdd19dbcdb71bb0d9609cab1315c478aaedb03ba
Signed-off-by: Louis Mayencourt &lt;louis.mayencourt@arm.com&gt;
</content>
</entry>
<entry>
<title>Add workaround for errata 764081 of Cortex-A75</title>
<updated>2019-02-26T15:53:57Z</updated>
<author>
<name>Louis Mayencourt</name>
</author>
<published>2019-02-20T12:11:41Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=5f5d1ed7d5a7626b2da48f3ac423d366bbee1fd8'/>
<id>urn:sha1:5f5d1ed7d5a7626b2da48f3ac423d366bbee1fd8</id>
<content type='text'>
Implicit Error Synchronization Barrier (IESB) might not be correctly
generated in Cortex-A75 r0p0. To prevent this, IESB are enabled at all
expection levels.

Change-Id: I2a1a568668a31e4f3f38d0fba1d632ad9939e5ad
Signed-off-by: Louis Mayencourt &lt;louis.mayencourt@arm.com&gt;
</content>
</entry>
<entry>
<title>DSU erratum 936184 workaround</title>
<updated>2018-08-17T09:34:43Z</updated>
<author>
<name>John Tsichritzis</name>
</author>
<published>2018-07-23T08:11:59Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=8a6771803fa2c629e624913a1c622df901efbde7'/>
<id>urn:sha1:8a6771803fa2c629e624913a1c622df901efbde7</id>
<content type='text'>
If the system is in near idle conditions, this erratum could cause a
deadlock or data corruption. This patch applies the workaround that
prevents this.

This DSU erratum affects only the DSUs that contain the ACP interface
and it was fixed in r2p0. The workaround is applied only to the DSUs
that are actually affected.

Link to respective Arm documentation:
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.epm138168/index.html

Change-Id: I033213b3077685130fc1e3f4f79c4d15d7483ec9
Signed-off-by: John Tsichritzis &lt;john.tsichritzis@arm.com&gt;
</content>
</entry>
<entry>
<title>cpulib: Add ISBs or comment why they are unneeded</title>
<updated>2018-06-19T09:34:51Z</updated>
<author>
<name>Dimitris Papastamos</name>
</author>
<published>2018-06-07T12:20:19Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=bd5a76ac7c21515ceb2b85a46de471416d2c83fa'/>
<id>urn:sha1:bd5a76ac7c21515ceb2b85a46de471416d2c83fa</id>
<content type='text'>
Change-Id: I18a41bb9fedda635c3c002a7f112578808410ef6
Signed-off-by: Dimitris Papastamos &lt;dimitris.papastamos@arm.com&gt;
</content>
</entry>
<entry>
<title>Add support for dynamic mitigation for CVE-2018-3639</title>
<updated>2018-05-23T11:45:48Z</updated>
<author>
<name>Dimitris Papastamos</name>
</author>
<published>2018-05-16T10:36:14Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=fe007b2e15ec7b569c07fedbd9bfccb5ed742eec'/>
<id>urn:sha1:fe007b2e15ec7b569c07fedbd9bfccb5ed742eec</id>
<content type='text'>
Some CPUS may benefit from using a dynamic mitigation approach for
CVE-2018-3639.  A new SMC interface is defined to allow software
executing in lower ELs to enable or disable the mitigation for their
execution context.

It should be noted that regardless of the state of the mitigation for
lower ELs, code executing in EL3 is always mitigated against
CVE-2018-3639.

NOTE: This change is a compatibility break for any platform using
the declare_cpu_ops_workaround_cve_2017_5715 macro.  Migrate to
the declare_cpu_ops_wa macro instead.

Change-Id: I3509a9337ad217bbd96de9f380c4ff8bf7917013
Signed-off-by: Dimitris Papastamos &lt;dimitris.papastamos@arm.com&gt;
</content>
</entry>
<entry>
<title>Implement static workaround for CVE-2018-3639</title>
<updated>2018-05-23T11:45:48Z</updated>
<author>
<name>Dimitris Papastamos</name>
</author>
<published>2018-04-05T13:38:26Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=b8a25bbb0bab4e4afdbfb04bee98f0bf28141c4b'/>
<id>urn:sha1:b8a25bbb0bab4e4afdbfb04bee98f0bf28141c4b</id>
<content type='text'>
For affected CPUs, this approach enables the mitigation during EL3
initialization, following every PE reset. No mechanism is provided to
disable the mitigation at runtime.

This approach permanently mitigates the entire software stack and no
additional mitigation code is required in other software components.

TF-A implements this approach for the following affected CPUs:

*   Cortex-A57 and Cortex-A72, by setting bit 55 (Disable load pass store) of
    `CPUACTLR_EL1` (`S3_1_C15_C2_0`).

*   Cortex-A73, by setting bit 3 of `S3_0_C15_C0_0` (not documented in the
    Technical Reference Manual (TRM)).

*   Cortex-A75, by setting bit 35 (reserved in TRM) of `CPUACTLR_EL1`
    (`S3_0_C15_C1_0`).

Additionally, a new SMC interface is implemented to allow software
executing in lower ELs to discover whether the system is mitigated
against CVE-2018-3639.

Refer to "Firmware interfaces for mitigating cache speculation
vulnerabilities System Software on Arm Systems"[0] for more
information.

[0] https://developer.arm.com/cache-speculation-vulnerability-firmware-specification

Change-Id: I084aa7c3bc7c26bf2df2248301270f77bed22ceb
Signed-off-by: Dimitris Papastamos &lt;dimitris.papastamos@arm.com&gt;
</content>
</entry>
<entry>
<title>Rename symbols and files relating to CVE-2017-5715</title>
<updated>2018-05-23T11:45:48Z</updated>
<author>
<name>Dimitris Papastamos</name>
</author>
<published>2018-04-06T14:29:34Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=2c3a10780df3317c004de74fbe85df53daab94e5'/>
<id>urn:sha1:2c3a10780df3317c004de74fbe85df53daab94e5</id>
<content type='text'>
This patch renames symbols and files relating to CVE-2017-5715 to make
it easier to introduce new symbols and files for new CVE mitigations.

Change-Id: I24c23822862ca73648c772885f1690bed043dbc7
Signed-off-by: Dimitris Papastamos &lt;dimitris.papastamos@arm.com&gt;
</content>
</entry>
<entry>
<title>Fixup `SMCCC_ARCH_FEATURES` semantics</title>
<updated>2018-03-14T11:19:53Z</updated>
<author>
<name>Dimitris Papastamos</name>
</author>
<published>2018-03-12T14:47:09Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/bcm63xx/atf/commit/?id=a205a56ea891c354c642713701075fec28906c40'/>
<id>urn:sha1:a205a56ea891c354c642713701075fec28906c40</id>
<content type='text'>
When querying `SMCCC_ARCH_WORKAROUND_1` through `SMCCC_ARCH_FEATURES`,
return either:
  * -1 to indicate the PE on which `SMCCC_ARCH_FEATURES` is called
    requires firmware mitigation for CVE-2017-5715 but the mitigation
    is not compiled in.
  * 0 to indicate that firmware mitigation is required, or
  * 1 to indicate that no firmware mitigation is required.

This patch complies with v1.2 of the firmware interfaces
specification (ARM DEN 0070A).

Change-Id: Ibc32d6620efdac6c340758ec502d95554a55f02a
Signed-off-by: Dimitris Papastamos &lt;dimitris.papastamos@arm.com&gt;
</content>
</entry>
</feed>
