arm-trusted-firmware/lib/cpus
Dimitris Papastamos 2b91536625 Fast path SMCCC_ARCH_WORKAROUND_1 calls from AArch32
When SMCCC_ARCH_WORKAROUND_1 is invoked from a lower EL running in
AArch32 state, ensure that the SMC call will take a shortcut in EL3.
This minimizes the time it takes to apply the mitigation in EL3.

When lower ELs run in AArch32, it is preferred that they execute the
`BPIALL` instruction to invalidate the BTB.  However, on some cores
the `BPIALL` instruction may be a no-op and thus would benefit from
making the SMCCC_ARCH_WORKAROUND_1 call go through the fast path.

Change-Id: Ia38abd92efe2c4b4a8efa7b70f260e43c5bda8a5
Signed-off-by: Dimitris Papastamos <dimitris.papastamos@arm.com>
2018-06-07 14:34:45 +01:00
..
aarch32 aarch32: Implement static workaround for CVE-2018-3639 2018-05-23 12:45:48 +01:00
aarch64 Fast path SMCCC_ARCH_WORKAROUND_1 calls from AArch32 2018-06-07 14:34:45 +01:00
cpu-ops.mk Add support for dynamic mitigation for CVE-2018-3639 2018-05-23 12:45:48 +01:00
errata_report.c Merge pull request #1228 from dp-arm/dp/cve_2017_5715 2018-01-25 00:06:50 +00:00