Searched hist:"6 bc243825f561e87ef7af7f51b218c6b0dab9b78" (Results 1 – 4 of 4) sorted by relevance
| /rk3399_ARM-atf/include/arch/aarch32/ |
| H A D | smccc_macros.S | 6bc243825f561e87ef7af7f51b218c6b0dab9b78 Wed Feb 26 18:37:05 UTC 2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com> aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a ERET as if it was not a jump instruction. This could lead to cache-based side channel vulnerabilities. The software fix is to place barrier instructions following ERET.
The counterpart patch for aarch64 is merged: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc
Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
|
| H A D | asm_macros.S | 6bc243825f561e87ef7af7f51b218c6b0dab9b78 Wed Feb 26 18:37:05 UTC 2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com> aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a ERET as if it was not a jump instruction. This could lead to cache-based side channel vulnerabilities. The software fix is to place barrier instructions following ERET.
The counterpart patch for aarch64 is merged: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc
Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
|
| /rk3399_ARM-atf/bl1/aarch32/ |
| H A D | bl1_exceptions.S | 6bc243825f561e87ef7af7f51b218c6b0dab9b78 Wed Feb 26 18:37:05 UTC 2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com> aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a ERET as if it was not a jump instruction. This could lead to cache-based side channel vulnerabilities. The software fix is to place barrier instructions following ERET.
The counterpart patch for aarch64 is merged: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc
Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
|
| /rk3399_ARM-atf/bl2/aarch32/ |
| H A D | bl2_el3_entrypoint.S | 6bc243825f561e87ef7af7f51b218c6b0dab9b78 Wed Feb 26 18:37:05 UTC 2020 Madhukar Pappireddy <madhukar.pappireddy@arm.com> aarch32: stop speculative execution past exception returns
aarch32 CPUs speculatively execute instructions following a ERET as if it was not a jump instruction. This could lead to cache-based side channel vulnerabilities. The software fix is to place barrier instructions following ERET.
The counterpart patch for aarch64 is merged: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=f461fe346b728d0e88142fd7b8f2816415af18bc
Change-Id: I2aa3105bee0b92238f389830b3a3b8650f33af3d Signed-off-by: Madhukar Pappireddy <madhukar.pappireddy@arm.com>
|