-
Notifications
You must be signed in to change notification settings - Fork 779
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[tlul] tlul_sram_byte data integrity check #8815
Comments
Let's review this in D2S meeting |
@tjaychen, should we just check ECC on all SRAM reads in this case (like we do on incoming TL-UL transactions)? |
o sorry, this is due to lack of a tagging scheme. |
Tagging with software label as this needs to be added to the software implementation guidelines. |
Triaged for |
Thanks for tagging me @andreaskurth . After having studied the RTL I agree that the change would probably be rather simple and it would be a nice to have for M2.5. However, it's not critical. Thus, I label this as P3. If we don't have time to do it or things turn out more difficult, we can instead include information on this in the software guidelines. |
Given that byte-writes are already considered less secure due to the ECC recomputation, I would lump this into software guidance for now and forego the RTL change. |
@moidx since this is documentation-only, I'll move this to the M2.5 Backlog. |
@vogelpi @johannheyszl are we ok with leaving this in the documentation-only category for Earlgrey-PROD? |
Both ways - adding to guidelines, or a modification - sgtm. If the fix is small and we can avoid one more item on the guidelines, that is a benefit. @vogelpi ? |
I would lean towards no change at this point, since this also introduces again more DV effort. |
Ideally, we would have changed the design here but I agree to leave this as is for Earlgrey-PROD. There are other, higher priority things to be taken care of first. |
This was discussed in the Sec WG meeting on Mar 14, 2024 . It was concluded to leave this as is. There are also other reasons for not doing byte writes and we have already SW guidance for those. For example, byte-write operations are not favorable from an SCA viewpoint. In both cases, SW should first perform a word read and then insert the byte inside the ALU and write back the full word. |
When a byte write is issued to memory,
tlul_sram_byte
is responsible for doing a read first to generate the new word-wise integrity.However, the read data integrity is not checked as part of this generation. This potentially creates a security risk.
The text was updated successfully, but these errors were encountered: