]> code.ossystems Code Review - openembedded-core.git/commit
gcc: mitigate the Straight-line Speculation attack
authorRoss Burton <ross.burton@arm.com>
Wed, 22 Jul 2020 14:10:09 +0000 (15:10 +0100)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 22 Jul 2020 22:47:53 +0000 (23:47 +0100)
commit3415e0ccdf75575014fb8c600edb707bbec0f566
treee9592bf02150efcdf6df03de60187139d54c9515
parent3b2c7350a7f3fb20f2b61ddb41f81959a54bc873
gcc: mitigate the Straight-line Speculation attack

Straight-line Speculation is a SPECTRE-like attack on Armv8-A, further
details can be found in the white paper here:

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation

Backport the GCC patches to mitigate the attack.

CVE: CVE-2020-13844
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-devtools/gcc/gcc-10.1.inc
meta/recipes-devtools/gcc/gcc-10.1/0001-aarch64-New-Straight-Line-Speculation-SLS-mitigation.patch [new file with mode: 0644]
meta/recipes-devtools/gcc/gcc-10.1/0002-aarch64-Introduce-SLS-mitigation-for-RET-and-BR-inst.patch [new file with mode: 0644]
meta/recipes-devtools/gcc/gcc-10.1/0003-aarch64-Mitigate-SLS-for-BLR-instruction.patch [new file with mode: 0644]