679db70801
Some CPUs can speculate past an ERET instruction and potentially perform speculative accesses to memory before processing the exception return. Since the register state is often controlled by a lower privilege level at the point of an ERET, this could potentially be used as part of a side-channel attack. This patch emits an SB sequence after each ERET so that speculation is held up on exception return. Signed-off-by: Will Deacon <will.deacon@arm.com> |
||
---|---|---|
.. | ||
Makefile | ||
debug-sr.c | ||
entry.S | ||
fpsimd.S | ||
hyp-entry.S | ||
switch.c | ||
sysreg-sr.c | ||
tlb.c | ||
vgic-v2-cpuif-proxy.c |