arm-trusted-firmware/include
Arvind Ram Prakash 8ae6b1ad6c fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus
This patch implements SMCCC_ARCH_WORKAROUND_4 and
allows discovery through SMCCC_ARCH_FEATURES.
This mechanism is enabled if CVE_2024_7881 [1] is enabled
by the platform. If CVE_2024_7881 mitigation
is implemented, the discovery call returns 0,
if not -1 (SMC_ARCH_CALL_NOT_SUPPORTED).

For more information about SMCCC_ARCH_WORKAROUND_4 [2], please
refer to the SMCCC Specification reference provided below.

[1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881
[2]: https://developer.arm.com/documentation/den0028/latest

Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com>
Change-Id: I1b1ffaa1f806f07472fd79d5525f81764d99bc79
2025-01-30 16:45:35 -06:00
..
arch feat(mops): enable FEAT_MOPS in EL3 when INIT_UNUSED_NS_EL2=1 2025-01-14 15:30:19 -06:00
bl1 refactor(bl1): clean up bl2 layout calculation 2024-04-26 09:00:12 +00:00
bl2 BL2_AT_EL3: Enable pointer authentication support 2019-02-27 11:58:09 +00:00
bl2u
bl31 Merge "refactor(sdei): use common create_spsr() in SDEI library" into integration 2024-03-14 21:17:45 +01:00
bl32 feat(cm): test integrity of el1_ctx registers 2024-11-08 11:05:13 +00:00
common feat(mbedtls): introduce crypto lib heap info struct 2024-12-18 14:48:24 +00:00
drivers feat(s32g274a): split early clock initialization 2025-01-14 13:02:51 +02:00
dt-bindings fix(dt-bindings): update STM32MP2 clock and reset bindings 2024-06-27 17:17:35 +02:00
export feat(tbbr): add image id for backup GPT 2023-10-27 08:31:54 -05:00
lib fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus 2025-01-30 16:45:35 -06:00
plat feat(handoff): common API for TPM event log handoff 2025-01-06 07:20:37 -08:00
services fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus 2025-01-30 16:45:35 -06:00
tools_share fix(tc): add SCP_BL2 to RSE measured boot 2024-06-13 15:53:10 +02:00