arm-trusted-firmware/include
Govindraj Raja e25fc9df25 fix(cpus): workaround for Neoverse-V3 erratum 3701767
Neoverse-V3 erratum 3701767 that applies to r0p0, r0p1, r0p2 is
still Open.

The workaround is for EL3 software that performs context save/restore
on a change of Security state to use a value of SCR_EL3.NS when
accessing ICH_VMCR_EL2 that reflects the Security state that owns the
data being saved or restored.

SDEN documentation:
https://developer.arm.com/documentation/SDEN-2891958/latest/

Change-Id: I5be0de881f408a9e82a07b8459d79490e9065f94
Signed-off-by: Govindraj Raja <govindraj.raja@arm.com>
2025-02-03 13:57:51 -06:00
..
arch feat(mops): enable FEAT_MOPS in EL3 when INIT_UNUSED_NS_EL2=1 2025-01-14 15:30:19 -06:00
bl1 refactor(bl1): clean up bl2 layout calculation 2024-04-26 09:00:12 +00:00
bl2 BL2_AT_EL3: Enable pointer authentication support 2019-02-27 11:58:09 +00:00
bl2u Standardise header guards across codebase 2018-11-08 10:20:19 +00:00
bl31 Merge "refactor(sdei): use common create_spsr() in SDEI library" into integration 2024-03-14 21:17:45 +01:00
bl32 feat(cm): test integrity of el1_ctx registers 2024-11-08 11:05:13 +00:00
common feat(mbedtls): introduce crypto lib heap info struct 2024-12-18 14:48:24 +00:00
drivers feat(s32g274a): split early clock initialization 2025-01-14 13:02:51 +02:00
dt-bindings fix(dt-bindings): update STM32MP2 clock and reset bindings 2024-06-27 17:17:35 +02:00
export feat(tbbr): add image id for backup GPT 2023-10-27 08:31:54 -05:00
lib fix(cpus): workaround for Neoverse-V3 erratum 3701767 2025-02-03 13:57:51 -06:00
plat feat(handoff): common API for TPM event log handoff 2025-01-06 07:20:37 -08:00
services fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus 2025-01-30 16:45:35 -06:00
tools_share fix(tc): add SCP_BL2 to RSE measured boot 2024-06-13 15:53:10 +02:00