Browse Source
Some CPUS may benefit from using a dynamic mitigation approach for CVE-2018-3639. A new SMC interface is defined to allow software executing in lower ELs to enable or disable the mitigation for their execution context. It should be noted that regardless of the state of the mitigation for lower ELs, code executing in EL3 is always mitigated against CVE-2018-3639. NOTE: This change is a compatibility break for any platform using the declare_cpu_ops_workaround_cve_2017_5715 macro. Migrate to the declare_cpu_ops_wa macro instead. Change-Id: I3509a9337ad217bbd96de9f380c4ff8bf7917013 Signed-off-by: Dimitris Papastamos <dimitris.papastamos@arm.com>pull/1392/head
Dimitris Papastamos
7 years ago
12 changed files with 116 additions and 10 deletions
@ -0,0 +1,12 @@ |
|||
/*
|
|||
* Copyright (c) 2018, ARM Limited and Contributors. All rights reserved. |
|||
* |
|||
* SPDX-License-Identifier: BSD-3-Clause |
|||
*/ |
|||
|
|||
#ifndef __WA_CVE_2018_3639_H__ |
|||
#define __WA_CVE_2018_3639_H__ |
|||
|
|||
void *wa_cve_2018_3639_get_disable_ptr(void); |
|||
|
|||
#endif /* __WA_CVE_2018_3639_H__ */ |
Loading…
Reference in new issue