Home
last modified time | relevance | path

Searched hist:"688 ab57b9349adb19277d88f2469ceeadb8ba083" (Results 1 – 11 of 11) sorted by relevance

/rk3399_ARM-atf/common/
H A Dfeat_detect.c688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
/rk3399_ARM-atf/include/arch/aarch64/
H A Darch_helpers.h688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
H A Darch_features.h688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
H A Darch.h688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
/rk3399_ARM-atf/include/lib/el3_runtime/aarch64/
H A Dcontext.h688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
/rk3399_ARM-atf/
H A Dchangelog.yaml688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
H A DMakefile688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
/rk3399_ARM-atf/lib/el3_runtime/aarch64/
H A Dcontext_mgmt.c688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
/rk3399_ARM-atf/make_helpers/
H A Ddefaults.mk688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
/rk3399_ARM-atf/docs/getting_started/
H A Dbuild-options.rst688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
/rk3399_ARM-atf/plat/arm/board/fvp/
H A Dplatform.mk688ab57b9349adb19277d88f2469ceeadb8ba083 Tue Mar 14 21:33:04 UTC 2023 Mark Brown <broonie@kernel.org> feat(gcs): support guarded control stack

Arm v9.4 introduces support for Guarded Control Stack, providing
mitigations against some forms of RPO attacks and an efficient mechanism
for obtaining the current call stack without requiring a full stack
unwind. Enable access to this feature for EL2 and below, context
switching the newly added EL2 registers as appropriate.

Change the FVP platform to default to handling this as a dynamic option
so the right decision can be made by the code at runtime.

Signed-off-by: Mark Brown <broonie@kernel.org>
Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b