From b2ed99894d326993961680fb8e786c267a712400 Mon Sep 17 00:00:00 2001 From: Varun Wadekar Date: Tue, 24 May 2022 15:00:06 +0100 Subject: [PATCH] fix(cpus/denver): use CPU_NO_EXTRA3_FUNC for all variants Denver CPUs use the same workaround for CVE-2017-5715 and CVE-2022-23960 vulnerabilities. The workaround for CVE-2017-5715 is always enabled, so all Denver variants use CPU_NO_EXTRA3_FUNC as a placeholder for the mitigation for CVE-2022-23960. This patch implements the approach. Signed-off-by: Varun Wadekar Change-Id: I0863541ce19b6b3b6d1b2f901d3fb6a77f315189 --- lib/cpus/aarch64/denver.S | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/lib/cpus/aarch64/denver.S b/lib/cpus/aarch64/denver.S index 224ee2676..3c54a6fe2 100644 --- a/lib/cpus/aarch64/denver.S +++ b/lib/cpus/aarch64/denver.S @@ -1,6 +1,6 @@ /* * Copyright (c) 2015-2018, ARM Limited and Contributors. All rights reserved. - * Copyright (c) 2020, NVIDIA Corporation. All rights reserved. + * Copyright (c) 2020-2022, NVIDIA Corporation. All rights reserved. * * SPDX-License-Identifier: BSD-3-Clause */ @@ -369,6 +369,7 @@ endfunc denver_cpu_reg_dump denver_reset_func, \ check_errata_cve_2017_5715, \ CPU_NO_EXTRA2_FUNC, \ + CPU_NO_EXTRA3_FUNC, \ denver_core_pwr_dwn, \ denver_cluster_pwr_dwn .endm