]> code.ossystems Code Review - openembedded-core.git/commit
gcc: mitigate the Straight-line Speculation attack
authorRoss Burton <ross@burtonini.com>
Fri, 23 Oct 2020 08:39:56 +0000 (09:39 +0100)
committerSteve Sakoman <steve@sakoman.com>
Tue, 27 Oct 2020 01:06:51 +0000 (15:06 -1000)
commit406a1636e1111729e3bb0fe804ef28c8a51c22e3
tree4928079336a228ea2d9685726eaf019220326ac8
parented912771ea98c42f61bf927b1ca708650b0bed4c
gcc: mitigate the Straight-line Speculation attack

Straight-line Speculation is a SPECTRE-like attack on Armv8-A, further
details can be found in the white paper here:

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation

Backport the GCC patches to mitigate the attack.

CVE: CVE-2020-13844

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-devtools/gcc/gcc-9.3.inc
meta/recipes-devtools/gcc/gcc-9.3/0001-aarch64-New-Straight-Line-Speculation-SLS-mitigation.patch [new file with mode: 0644]
meta/recipes-devtools/gcc/gcc-9.3/0002-aarch64-Introduce-SLS-mitigation-for-RET-and-BR-inst.patch [new file with mode: 0644]
meta/recipes-devtools/gcc/gcc-9.3/0003-aarch64-Mitigate-SLS-for-BLR-instruction.patch [new file with mode: 0644]