)]}'
{
  "commit": "c09454d0c86d347105708a361d2751e8f1a9514d",
  "tree": "d1e20b9980eb6f70cb8adfdb589f332a54a3913d",
  "parents": [
    "83ad6baebe522430911e0cdf8961fab105e97d45"
  ],
  "author": {
    "name": "Arvind Ram Prakash",
    "email": "arvind.ramprakash@arm.com",
    "time": "Fri Nov 14 20:48:25 2025"
  },
  "committer": {
    "name": "Arvind Ram Prakash",
    "email": "arvind.ramprakash@arm.com",
    "time": "Thu Dec 04 22:33:14 2025"
  },
  "message": "fix(security): add CVE-2024-7881 mitigation to C1-Pro CPU\n\nThis patch mitigates Cat B erratum 3684268 [2] / CVE-2024-7881 [1]\nfor C1-Pro CPU. This CVE applies to r0p0, r1p0 and\nis fixed in r1p1 [2].\n\nThis CVE can be mitigated by disabling the affected prefetcher\nby setting IMP_CPUECTLR_EL1[49].\n\nNote: C1-Pro has a different workaround for CVE-2024-7881\nwhich is not reflected in Security Bulletin yet. Refer\nSDEN for correct workaround description.\n\n[1] https://developer.arm.com/documentation/110326/latest/\n[2] https://developer.arm.com/documentation/SDEN-3273080/latest/\n\nSigned-off-by: Arvind Ram Prakash \u003carvind.ramprakash@arm.com\u003e\nChange-Id: I6b0eca1fc340f18dcbede920a0dd1c882bfe12c1\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "aa8132625e0866bc30e3d57b911b8694935b4d6e",
      "old_mode": 33188,
      "old_path": "lib/cpus/aarch64/c1_pro.S",
      "new_id": "d77da1c3771f87e470522af5b4622ee50f93ba8b",
      "new_mode": 33188,
      "new_path": "lib/cpus/aarch64/c1_pro.S"
    }
  ]
}
