arm-trusted-firmware/include/services
Arvind Ram Prakash 8ae6b1ad6c fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus
This patch implements SMCCC_ARCH_WORKAROUND_4 and
allows discovery through SMCCC_ARCH_FEATURES.
This mechanism is enabled if CVE_2024_7881 [1] is enabled
by the platform. If CVE_2024_7881 mitigation
is implemented, the discovery call returns 0,
if not -1 (SMC_ARCH_CALL_NOT_SUPPORTED).

For more information about SMCCC_ARCH_WORKAROUND_4 [2], please
refer to the SMCCC Specification reference provided below.

[1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881
[2]: https://developer.arm.com/documentation/den0028/latest

Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
Change-Id: I1b1ffaa1f806f07472fd79d5525f81764d99bc79
2025-01-30 16:45:35 -06:00
..
oem/chromeos
trp
arm_arch_svc.h fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus 2025-01-30 16:45:35 -06:00
drtm_svc.h
el3_spmc_ffa_memory.h
el3_spmc_logical_sp.h
el3_spmd_logical_sp.h fix(spmd): fix build failure due to redefinition 2024-12-03 16:02:21 +00:00
errata_abi_svc.h
ffa_svc.h feat(ff-a): support FFA_MSG_SEND_DIRECT_REQ2/RESP2 2025-01-13 11:34:41 +00:00
pci_svc.h
rmm_core_manifest.h fix(rme): add console name to checksum calculation 2024-11-15 15:59:00 +02:00
rmm_el3_token_sign.h feat(rmmd): el3 token sign during attestation 2024-10-15 08:20:28 -07:00
rmmd_svc.h feat(rmmd): el3 token sign during attestation 2024-10-15 08:20:28 -07:00
sdei.h
sdei_flags.h
spm_core_manifest.h
spm_mm_partition.h
spm_mm_svc.h
spmc_svc.h
spmd_svc.h
std_svc.h
trng_svc.h
ven_el3_svc.h