summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/gcc/gcc-10.1.inc
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@arm.com>2020-07-22 15:10:09 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2020-07-22 23:47:53 +0100
commit3415e0ccdf75575014fb8c600edb707bbec0f566 (patch)
treee9592bf02150efcdf6df03de60187139d54c9515 /meta/recipes-devtools/gcc/gcc-10.1.inc
parent3b2c7350a7f3fb20f2b61ddb41f81959a54bc873 (diff)
downloadopenembedded-core-contrib-3415e0ccdf75575014fb8c600edb707bbec0f566.tar.gz
gcc: mitigate the Straight-line Speculation attack
Straight-line Speculation is a SPECTRE-like attack on Armv8-A, further details can be found in the white paper here: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/downloads/straight-line-speculation Backport the GCC patches to mitigate the attack. CVE: CVE-2020-13844 Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/gcc/gcc-10.1.inc')
-rw-r--r--meta/recipes-devtools/gcc/gcc-10.1.inc3
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-devtools/gcc/gcc-10.1.inc b/meta/recipes-devtools/gcc/gcc-10.1.inc
index a3de91a2c6..7c1201a2e3 100644
--- a/meta/recipes-devtools/gcc/gcc-10.1.inc
+++ b/meta/recipes-devtools/gcc/gcc-10.1.inc
@@ -66,6 +66,9 @@ SRC_URI = "\
file://0036-Enable-CET-in-cross-compiler-if-possible.patch \
file://0037-mingw32-Enable-operation_not_supported.patch \
file://0038-libatomic-Do-not-enforce-march-on-aarch64.patch \
+ file://0001-aarch64-New-Straight-Line-Speculation-SLS-mitigation.patch \
+ file://0002-aarch64-Introduce-SLS-mitigation-for-RET-and-BR-inst.patch \
+ file://0003-aarch64-Mitigate-SLS-for-BLR-instruction.patch \
"
SRC_URI[sha256sum] = "b6898a23844b656f1b68691c5c012036c2e694ac4b53a8918d4712ad876e7ea2"