arm-trusted-firmware/bl31
Dimitris Papastamos f62ad32269 Workaround for CVE-2017-5715 on Cortex A57 and A72
Invalidate the Branch Target Buffer (BTB) on entry to EL3 by disabling
and enabling the MMU.  To achieve this without performing any branch
instruction, a per-cpu vbar is installed which executes the workaround
and then branches off to the corresponding vector entry in the main
vector table.  A side effect of this change is that the main vbar is
configured before any reset handling.  This is to allow the per-cpu
reset function to override the vbar setting.

This workaround is enabled by default on the affected CPUs.

Change-Id: I97788d38463a5840a410e3cea85ed297a1678265
Signed-off-by: Dimitris Papastamos <dimitris.papastamos@arm.com>
2018-01-11 10:26:15 +00:00
..
aarch64 Workaround for CVE-2017-5715 on Cortex A57 and A72 2018-01-11 10:26:15 +00:00
bl31.ld.S Replace magic numbers in linkerscripts by PAGE_SIZE 2017-11-29 12:09:52 +00:00
bl31.mk Workaround for CVE-2017-5715 on Cortex A57 and A72 2018-01-11 10:26:15 +00:00
bl31_context_mgmt.c Use SPDX license identifiers 2017-05-03 09:39:28 +01:00
bl31_main.c BL31: Introduce Exception Handling Framework 2017-11-13 07:49:30 +00:00
ehf.c BL31: Program Priority Mask for SMC handling 2017-11-13 07:49:30 +00:00
interrupt_mgmt.c Use SPDX license identifiers 2017-05-03 09:39:28 +01:00