summaryrefslogtreecommitdiff
path: root/make_helpers
diff options
context:
space:
mode:
authorMark Brown <broonie@kernel.org>2023-03-14 21:33:04 +0000
committerMark Brown <broonie@kernel.org>2023-04-18 12:36:52 +0100
commit688ab57b9349adb19277d88f2469ceeadb8ba083 (patch)
tree062101095883b1045695d91d53c87c1de8fa2bc7 /make_helpers
parentffc56bd02d66b524193aeebdf4dea7c9dc14ca8d (diff)
downloadarm-trusted-firmware-688ab57b9349adb19277d88f2469ceeadb8ba083.tar.gz
feat(gcs): support guarded control stack
Arm v9.4 introduces support for Guarded Control Stack, providing mitigations against some forms of RPO attacks and an efficient mechanism for obtaining the current call stack without requiring a full stack unwind. Enable access to this feature for EL2 and below, context switching the newly added EL2 registers as appropriate. Change the FVP platform to default to handling this as a dynamic option so the right decision can be made by the code at runtime. Signed-off-by: Mark Brown <broonie@kernel.org> Change-Id: I691aa7c22e3547bb3abe98d96993baf18c5f0e7b
Diffstat (limited to 'make_helpers')
-rw-r--r--make_helpers/defaults.mk3
1 files changed, 3 insertions, 0 deletions
diff --git a/make_helpers/defaults.mk b/make_helpers/defaults.mk
index 808a058b2..34a9bc6b9 100644
--- a/make_helpers/defaults.mk
+++ b/make_helpers/defaults.mk
@@ -188,6 +188,9 @@ ENABLE_FEAT_S2POE := 0
# Flag to enable access to Stage 1 Permission Overlay (FEAT_S1POE)
ENABLE_FEAT_S1POE := 0
+# Flag to enable access to Guarded Control Stack (FEAT_GCS)
+ENABLE_FEAT_GCS := 0
+
# By default BL31 encryption disabled
ENCRYPT_BL31 := 0