arm-trusted-firmware/bl1/aarch32
Madhukar Pappireddy 6bc243825f aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a
ERET as if it was not a jump instruction. This could lead to
cache-based side channel vulnerabilities. The software fix is
to place barrier instructions following ERET.

The counterpart patch for aarch64 is merged:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc

Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
2020-03-01 06:44:30 -06:00
..
bl1_arch_setup.c bl1: include bl1_private.h in aarch* files 2017-06-23 09:38:06 +02:00
bl1_context_mgmt.c Refactor SPSR initialisation code 2019-07-24 12:49:54 +01:00
bl1_entrypoint.S BL1: Enable pointer authentication support 2019-02-27 11:58:09 +00:00
bl1_exceptions.S aarch32: stop speculative execution past exception returns 2020-03-01 06:44:30 -06:00