arm-trusted-firmware/include
Dimitris Papastamos d6b798097e Implement dynamic mitigation for CVE-2018-3639 on Cortex-A76
The Cortex-A76 implements SMCCC_ARCH_WORKAROUND_2 as defined in
"Firmware interfaces for mitigating cache speculation vulnerabilities
System Software on Arm Systems"[0].

Dynamic mitigation for CVE-2018-3639 is enabled/disabled by
setting/clearning bit 16 (Disable load pass store) of `CPUACTLR2_EL1`.

NOTE: The generic code that implements dynamic mitigation does not
currently implement the expected semantics when dispatching an SDEI
event to a lower EL.  This will be fixed in a separate patch.

[0] https://developer.arm.com/cache-speculation-vulnerability-firmware-specification

Change-Id: I8fb2862b9ab24d55a0e9693e48e8be4df32afb5a
Signed-off-by: Dimitris Papastamos <dimitris.papastamos@arm.com>
2018-06-08 11:46:31 +01:00
..
bl1 Fix MISRA rule 8.4 Part 1 2018-02-28 17:19:55 +00:00
bl2 Fix MISRA rule 8.5 in common code 2018-04-13 14:01:56 +01:00
bl2u Fix MISRA rule 8.4 in common code 2018-02-28 17:18:46 +00:00
bl31 RAS: Allow individual interrupt registration 2018-05-04 08:33:17 +01:00
bl32 Introduce the new BL handover interface 2018-02-26 16:31:10 +00:00
common Merge pull request #1386 from soby-mathew/sm/dyn_bl31 2018-05-23 12:45:13 +01:00
drivers Ensure read and write of flags are 32 bit 2018-05-17 16:42:41 +01:00
lib Implement dynamic mitigation for CVE-2018-3639 on Cortex-A76 2018-06-08 11:46:31 +01:00
plat ARM platforms: Move BL31 below BL2 to enable BL2 overlay 2018-06-07 12:26:19 +01:00
services Merge pull request #1392 from dp-arm/dp/cve_2018_3639 2018-05-29 09:28:05 +01:00
tools_share Dynamic cfg: Enable support on CoT for other configs 2018-05-18 12:26:38 +01:00