commit | 337aa3bf1703aaa45516329ba49d12ed07042485 | [log] [tgz] |
---|---|---|
author | Arvind Ram Prakash <arvind.ramprakash@arm.com> | Mon Feb 03 17:17:30 2025 +0100 |
committer | Yann Gautier <yann.gautier@st.com> | Mon Feb 03 17:51:26 2025 +0100 |
tree | d47b74d61f5999fcd500a48ad23d3e92a5346ce2 | |
parent | 8fc0fa7c0f4218655fc30039ad7a236d4ec5ccb3 [diff] |
fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus This patch implements SMCCC_ARCH_WORKAROUND_4 and allows discovery through SMCCC_ARCH_FEATURES. This mechanism is enabled if CVE_2024_7881 [1] is enabled by the platform. If CVE_2024_7881 mitigation is implemented, the discovery call returns 0, if not -1 (SMC_ARCH_CALL_NOT_SUPPORTED). For more information about SMCCC_ARCH_WORKAROUND_4 [2], please refer to the SMCCC Specification reference provided below. [1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881 [2]: https://developer.arm.com/documentation/den0028/latest Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I1b1ffaa1f806f07472fd79d5525f81764d99bc79 (cherry picked from commit 8ae6b1ad6c9c57b09b6d4e7ae3cbdf3aed6455b1)