diff --git a/plat/hisilicon/hikey/platform.mk b/plat/hisilicon/hikey/platform.mk index c8a29924a011388717d29a5094208336c24fcba1..b11d2085e91d9ebe26368d6a4698c31385d8e977 100644 --- a/plat/hisilicon/hikey/platform.mk +++ b/plat/hisilicon/hikey/platform.mk @@ -122,4 +122,6 @@ ERRATA_A53_836870 := 1 ERRATA_A53_843419 := 1 ERRATA_A53_855873 := 1 +WORKAROUND_CVE_2017_5715 := 0 + FIP_ALIGN := 512 diff --git a/plat/hisilicon/poplar/platform.mk b/plat/hisilicon/poplar/platform.mk index 2dbbac6e7124866ba5cb843decc263dfff782ce2..d53e0627439126c01a5be832ba3b550757c94289 100644 --- a/plat/hisilicon/poplar/platform.mk +++ b/plat/hisilicon/poplar/platform.mk @@ -29,6 +29,8 @@ ERRATA_A53_835769 := 1 ERRATA_A53_843419 := 1 ENABLE_SVE_FOR_NS := 0 +WORKAROUND_CVE_2017_5715 := 0 + ARM_GIC_ARCH := 2 $(eval $(call add_define,ARM_GIC_ARCH)) diff --git a/plat/mediatek/mt6795/platform.mk b/plat/mediatek/mt6795/platform.mk index 82300674d475667249df352b7fb1dac726a46137..1bdf30af341778787f800c97a0877874e1439c05 100644 --- a/plat/mediatek/mt6795/platform.mk +++ b/plat/mediatek/mt6795/platform.mk @@ -61,6 +61,8 @@ $(eval $(call add_define,ARM_GIC_ARCH)) ERRATA_A53_826319 := 1 ERRATA_A53_836870 := 1 +WORKAROUND_CVE_2017_5715 := 0 + # indicate the reset vector address can be programmed PROGRAMMABLE_RESET_ADDRESS := 1 diff --git a/plat/rockchip/rk3328/platform.mk b/plat/rockchip/rk3328/platform.mk index 6e4d5b4dc0cd23a45139d80917a2c374fa48b416..f0fd36f9b47a70dcac74c9732bd58c2ee8157025 100644 --- a/plat/rockchip/rk3328/platform.mk +++ b/plat/rockchip/rk3328/platform.mk @@ -58,3 +58,5 @@ $(eval $(call add_define,PLAT_SKIP_OPTEE_S_EL1_INT_REGISTER)) # Do not enable SVE ENABLE_SVE_FOR_NS := 0 + +WORKAROUND_CVE_2017_5715 := 0 diff --git a/plat/rockchip/rk3368/platform.mk b/plat/rockchip/rk3368/platform.mk index ad204e9ebebdb26cbee3e2a6716dfeca6d2778ad..7ecb21ad5ed6070145e3ddc0c604e785595bd6a2 100644 --- a/plat/rockchip/rk3368/platform.mk +++ b/plat/rockchip/rk3368/platform.mk @@ -57,3 +57,5 @@ $(eval $(call add_define,PLAT_EXTRA_LD_SCRIPT)) # Do not enable SVE ENABLE_SVE_FOR_NS := 0 + +WORKAROUND_CVE_2017_5715 := 0 diff --git a/plat/rpi3/platform.mk b/plat/rpi3/platform.mk index 821f80153884a013e32bc65c56f588c9e0ddc2a1..e201ceed0343d00fe728eb28c6ce2d7233b46509 100644 --- a/plat/rpi3/platform.mk +++ b/plat/rpi3/platform.mk @@ -64,6 +64,8 @@ ERRATA_A53_836870 := 1 ERRATA_A53_843419 := 1 ERRATA_A53_855873 := 1 +WORKAROUND_CVE_2017_5715 := 0 + # Disable the PSCI platform compatibility layer by default ENABLE_PLAT_COMPAT := 0 diff --git a/plat/xilinx/zynqmp/platform.mk b/plat/xilinx/zynqmp/platform.mk index bdd194bdae18e916b42d371b32fa4fb70a652d26..bddf305628ab6f795f5d0dbb037bb87c40b25a41 100644 --- a/plat/xilinx/zynqmp/platform.mk +++ b/plat/xilinx/zynqmp/platform.mk @@ -14,6 +14,8 @@ override RESET_TO_BL31 := 1 # Do not enable SVE ENABLE_SVE_FOR_NS := 0 +WORKAROUND_CVE_2017_5715 := 0 + ifdef ZYNQMP_ATF_MEM_BASE $(eval $(call add_define,ZYNQMP_ATF_MEM_BASE))