mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-16 09:34:18 +00:00
![]() This patch implements SMCCC_ARCH_WORKAROUND_4 and allows discovery through SMCCC_ARCH_FEATURES. This mechanism is enabled if CVE_2024_7881 [1] is enabled by the platform. If CVE_2024_7881 mitigation is implemented, the discovery call returns 0, if not -1 (SMC_ARCH_CALL_NOT_SUPPORTED). For more information about SMCCC_ARCH_WORKAROUND_4 [2], please refer to the SMCCC Specification reference provided below. [1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881 [2]: https://developer.arm.com/documentation/den0028/latest Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I1b1ffaa1f806f07472fd79d5525f81764d99bc79 |
||
---|---|---|
.. | ||
oem/chromeos | ||
trp | ||
arm_arch_svc.h | ||
drtm_svc.h | ||
el3_spmc_ffa_memory.h | ||
el3_spmc_logical_sp.h | ||
el3_spmd_logical_sp.h | ||
errata_abi_svc.h | ||
ffa_svc.h | ||
pci_svc.h | ||
rmm_core_manifest.h | ||
rmm_el3_token_sign.h | ||
rmmd_svc.h | ||
sdei.h | ||
sdei_flags.h | ||
spm_core_manifest.h | ||
spm_mm_partition.h | ||
spm_mm_svc.h | ||
spmc_svc.h | ||
spmd_svc.h | ||
std_svc.h | ||
trng_svc.h | ||
ven_el3_svc.h |