arm-trusted-firmware/include/lib/cpus
Varun Wadekar 6cf8d65f27 cpus: denver: Implement static workaround for CVE-2018-3639
For Denver CPUs, this approach enables the mitigation during EL3
initialization, following every PE reset. No mechanism is provided to
disable the mitigation at runtime.

This approach permanently mitigates the EL3 software stack only. Other
software components are responsible to enable it for their exception
levels.

TF-A implements this approach for the Denver CPUs with DENVER_MIDR_PN3
and earlier:

*   By setting bit 11 (Disable speculative store buffering) of
    `ACTLR_EL3`

*   By setting bit 9 (Disable speculative memory disambiguation) of
    `ACTLR_EL3`

TF-A implements this approach for the Denver CPUs with DENVER_MIDR_PN4
and later:

*   By setting bit 18 (Disable speculative store buffering) of
    `ACTLR_EL3`

*   By setting bit 17 (Disable speculative memory disambiguation) of
    `ACTLR_EL3`

Change-Id: If1de96605ce3f7b0aff5fab2c828e5aecb687555
Signed-off-by: Varun Wadekar <vwadekar@nvidia.com>
2018-09-04 17:34:08 -07:00
..
aarch32 Remove integrity check in declare_cpu_ops_base 2018-07-11 09:23:04 +01:00
aarch64 cpus: denver: Implement static workaround for CVE-2018-3639 2018-09-04 17:34:08 -07:00
errata_report.h Fix MISRA rule 8.4 in common code 2018-02-28 17:18:46 +00:00
wa_cve_2017_5715.h Rename symbols and files relating to CVE-2017-5715 2018-05-23 12:45:48 +01:00
wa_cve_2018_3639.h Add support for dynamic mitigation for CVE-2018-3639 2018-05-23 12:45:48 +01:00