commit | 9427c061eb8dee00c32d72c20d6bc231002a575c | [log] [tgz] |
---|---|---|
author | Arvind Ram Prakash <arvind.ramprakash@arm.com> | Fri Feb 07 16:28:32 2025 +0100 |
committer | Yann Gautier <yann.gautier@st.com> | Fri Feb 07 18:32:03 2025 +0100 |
tree | 4fb29b2952266dba664fca208f61530696241175 | |
parent | bea64fd5272deaf53111135baf36abb47b73b93e [diff] |
fix(security): apply SMCCC_ARCH_WORKAROUND_4 to affected cpus This patch implements SMCCC_ARCH_WORKAROUND_4 and allows discovery through SMCCC_ARCH_FEATURES. This mechanism is enabled if CVE_2024_7881 [1] is enabled by the platform. If CVE_2024_7881 mitigation is implemented, the discovery call returns 0, if not -1 (SMC_ARCH_CALL_NOT_SUPPORTED). For more information about SMCCC_ARCH_WORKAROUND_4 [2], please refer to the SMCCC Specification reference provided below. [1]: https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881 [2]: https://developer.arm.com/documentation/den0028/latest Signed-off-by: Arvind Ram Prakash <arvind.ramprakash@arm.com> Change-Id: I1b1ffaa1f806f07472fd79d5525f81764d99bc79 (cherry picked from commit 8ae6b1ad6c9c57b09b6d4e7ae3cbdf3aed6455b1)