Description: arm64: efi: Execute runtime services from a dedicated stack References: https://source.android.com/docs/security/bulletin/2023-05-01 https://android.googlesource.com/kernel/common/+/ec6fe823507b2f6ef4a58f3a9bee9a5ec086c32c%5E%21/#F2 Notes: bwh> Introduced in 5.14 by commit cefc7ca46235 "ACPI: PRM: implement bwh> OperationRegion handler for the PlatformRtMechanism subtype". Bugs: upstream: released (6.2-rc1) [ff7a167961d1b97e0e205f245f806e564d3505e7], released (6.2-rc4) [18bba1843fc7f264f58c9345d00827d082f9c558] 6.1-upstream-stable: released (6.1.8) [f75a91c82dc805af8f718ff106ec9c090234b37b, 72b0e5faa5149f09c6a7a74e4012f29e33509bab] 5.10-upstream-stable: released (5.10.165) [4012603cbd469223f225637d265a233f034c567a, d6544bccc1967cd6a883d6abac71fc7d863e8baa] 4.19-upstream-stable: N/A "Vulnerable code not present" sid: released (6.1.8-1) 6.1-bookworm-security: N/A "Fixed before branch point" 5.10-bullseye-security: released (5.10.178-1) 4.19-buster-security: N/A "Vulnerable code not present"