arm-trusted-firmware/include/arch/aarch32
Madhukar Pappireddy 6bc243825f aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a
ERET as if it was not a jump instruction. This could lead to
cache-based side channel vulnerabilities. The software fix is
to place barrier instructions following ERET.

The counterpart patch for aarch64 is merged:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc

Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d
Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
2020-03-01 06:44:30 -06:00
..
arch.h AArch32: Disable Secure Cycle Counter 2019-09-26 15:36:02 +00:00
arch_features.h drivers: generic_delay_timer: Assert presence of Generic Timer 2019-02-06 09:54:42 +00:00
arch_helpers.h Cortex-A53: Workarounds for 819472, 824069 and 827319 2019-02-28 09:56:58 +00:00
asm_macros.S aarch32: stop speculative execution past exception returns 2020-03-01 06:44:30 -06:00
assert_macros.S Reorganize architecture-dependent header files 2019-01-04 10:43:16 +00:00
console_macros.S console: update skeleton 2019-07-16 13:01:02 +00:00
el3_common_macros.S Add missing support for BL2_AT_EL3 in XIP memory 2019-10-02 09:06:39 +02:00
smccc_helpers.h Changes to support updated register usage in SMCCC v1.2 2019-11-26 12:56:30 -06:00
smccc_macros.S aarch32: stop speculative execution past exception returns 2020-03-01 06:44:30 -06:00