aboutsummaryrefslogtreecommitdiffstats
path: root/include
diff options
context:
space:
mode:
authorDimitris Papastamos <dimitris.papastamos@arm.com>2018-06-07 11:29:15 +0100
committerDimitris Papastamos <dimitris.papastamos@arm.com>2018-06-08 11:46:31 +0100
commit6f03bc7753a22485ad2b531a11e96756147facbe (patch)
treee411a969ab2cfcabc579b434419a30cf5ada66c0 /include
parentd6b798097e23bc98814ced8406f4dc63df4078c5 (diff)
downloadplatform_external_arm-trusted-firmware-6f03bc7753a22485ad2b531a11e96756147facbe.tar.gz
platform_external_arm-trusted-firmware-6f03bc7753a22485ad2b531a11e96756147facbe.tar.bz2
platform_external_arm-trusted-firmware-6f03bc7753a22485ad2b531a11e96756147facbe.zip
SDEI: Ensure SDEI handler executes with CVE-2018-3639 mitigation enabled
When dynamic mitigation is used, the SDEI handler is required to execute with the mitigation enabled by default, regardless of the mitigation state for lower ELs. This means that if the kernel or hypervisor explicitly disables the mitigation and then later when the event is dispatched, the dispatcher will remember the mitigation state for the lower ELs but force the mitigation to be on during the SDEI handler execution. When the SDEI handler returns, it will restore the mitigation state. This behaviour is described in "Firmware interfaces for mitigating cache speculation vulnerabilities System Software on Arm Systems"[0]. [0] https://developer.arm.com/cache-speculation-vulnerability-firmware-specification Change-Id: I8dd60b736be0aa9e832b0f92d67a401fdeb417f4 Signed-off-by: Dimitris Papastamos <dimitris.papastamos@arm.com>
Diffstat (limited to 'include')
-rw-r--r--include/lib/el3_runtime/aarch64/context.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/lib/el3_runtime/aarch64/context.h b/include/lib/el3_runtime/aarch64/context.h
index a4f3ea1bb..a2ce9f828 100644
--- a/include/lib/el3_runtime/aarch64/context.h
+++ b/include/lib/el3_runtime/aarch64/context.h
@@ -271,6 +271,7 @@ typedef struct cpu_context {
#endif
#define get_sysregs_ctx(h) (&((cpu_context_t *) h)->sysregs_ctx)
#define get_gpregs_ctx(h) (&((cpu_context_t *) h)->gpregs_ctx)
+#define get_cve_2018_3639_ctx(h) (&((cpu_context_t *) h)->cve_2018_3639_ctx)
/*
* Compile time assertions related to the 'cpu_context' structure to