arm-trusted-firmware/bl2
Madhukar Pappireddy 6bc243825f aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a
ERET as if it was not a jump instruction. This could lead to
cache-based side channel vulnerabilities. The software fix is
to place barrier instructions following ERET.

The counterpart patch for aarch64 is merged:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc

Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
2020-03-01 06:44:30 -06:00
..
aarch32 aarch32: stop speculative execution past exception returns 2020-03-01 06:44:30 -06:00
aarch64 BL2_AT_EL3: add PIE support 2020-01-24 22:34:25 +09:00
bl2.ld.S fconf: initial commit 2020-02-07 13:29:09 +00:00
bl2.mk Add support for Branch Target Identification 2019-05-24 14:44:45 +01:00
bl2_el3.ld.S BL2_AT_EL3: add PIE support 2020-01-24 22:34:25 +09:00
bl2_image_load_v2.c coverity: Fix MISRA null pointer violations 2020-02-05 14:53:02 -06:00
bl2_main.c Refactor ARMv8.3 Pointer Authentication support code 2019-09-13 14:11:59 +01:00
bl2_private.h Move BL1 and BL2 private defines to bl_common.h 2019-01-15 13:52:32 +00:00