arm-trusted-firmware/bl1
Madhukar Pappireddy 6bc243825f aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a
ERET as if it was not a jump instruction. This could lead to
cache-based side channel vulnerabilities. The software fix is
to place barrier instructions following ERET.

The counterpart patch for aarch64 is merged:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc

Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
2020-03-01 06:44:30 -06:00
..
aarch32 aarch32: stop speculative execution past exception returns 2020-03-01 06:44:30 -06:00
aarch64 coverity: Fix MISRA null pointer violations 2020-02-05 14:53:02 -06:00
tbbr Coverity: remove unnecessary header file includes 2020-02-04 10:23:51 -06:00
bl1.ld.S Fix boot failures on some builds linked with ld.lld. 2020-02-12 19:09:00 +00:00
bl1.mk Add support for Branch Target Identification 2019-05-24 14:44:45 +01:00
bl1_fwu.c coverity: fix MISRA violations 2020-02-18 10:47:46 -06:00
bl1_main.c coverity: fix MISRA violations 2020-02-18 10:47:46 -06:00
bl1_private.h coverity: fix MISRA violations 2020-02-18 10:47:46 -06:00