commit | 64618d66402d6b7ae3e1aec40129bfd7ec70b55c | [log] [tgz] |
---|---|---|
author | Arvind Ram Prakash <arvind.ramprakash@arm.com> | Mon Feb 03 17:17:30 2025 +0100 |
committer | Yann Gautier <yann.gautier@st.com> | Mon Feb 03 17:28:59 2025 +0100 |
tree | e0e41c757abc1c1e98d6abb7305b144c2ac25f57 | |
parent | b5386661a818abdc476ffcc308750291373c1dab [diff] |
fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus This patch implements SMCCC_ARCH_WORKAROUND_4 and allows discovery through SMCCC_ARCH_FEATURES. This mechanism is enabled if CVE_2024_7881 [1] is enabled by the platform. If CVE_2024_7881 mitigation is implemented, the discovery call returns 0, if not -1 (SMC_ARCH_CALL_NOT_SUPPORTED). For more information about SMCCC_ARCH_WORKAROUND_4 [2], please refer to the SMCCC Specification reference provided below. [1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881 [2]: https://developer.arm.com/documentation/den0028/latest Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I1b1ffaa1f806f07472fd79d5525f81764d99bc79 (cherry picked from commit 8ae6b1ad6c9c57b09b6d4e7ae3cbdf3aed6455b1)