arm-trusted-firmware/include/lib/el3_runtime
Dimitris Papastamos 6f03bc7753 SDEI: Ensure SDEI handler executes with CVE-2018-3639 mitigation enabled
When dynamic mitigation is used, the SDEI handler is required to
execute with the mitigation enabled by default, regardless of the
mitigation state for lower ELs.  This means that if the kernel or
hypervisor explicitly disables the mitigation and then later when the
event is dispatched, the dispatcher will remember the mitigation state
for the lower ELs but force the mitigation to be on during the SDEI
handler execution.  When the SDEI handler returns, it will restore the
mitigation state.

This behaviour is described in "Firmware interfaces for mitigating
cache speculation vulnerabilities System Software on Arm Systems"[0].

[0] https://developer.arm.com/cache-speculation-vulnerability-firmware-specification

Change-Id: I8dd60b736be0aa9e832b0f92d67a401fdeb417f4
Signed-off-by: Dimitris Papastamos <dimitris.papastamos@arm.com>
2018-06-08 11:46:31 +01:00
..
aarch32 Use SPDX license identifiers 2017-05-03 09:39:28 +01:00
aarch64 SDEI: Ensure SDEI handler executes with CVE-2018-3639 mitigation enabled 2018-06-08 11:46:31 +01:00
context_mgmt.h context_mgmt: Make cm_init_context_common public 2018-05-23 13:50:18 +01:00
cpu_data.h Fix MISRA rule 8.4 in common code 2018-02-28 17:18:46 +00:00
pubsub.h Fix MISRA rule 8.4 in common code 2018-02-28 17:18:46 +00:00
pubsub_events.h Add PubSub events for CPU powerdown/powerup 2018-01-11 10:33:41 +00:00