Commit af570d1c authored by Bertrand Marquis's avatar Bertrand Marquis Committed by Julien Grall

xen/arm: Advertise workaround 1 if we apply 3

SMCC_WORKAROUND_3 is handling both Spectre v2 and spectre BHB.
So when a guest is asking if we support workaround 1, tell yes if we
apply workaround 3 on exception entry as it handles it.

This will allow guests not supporting Spectre BHB but impacted by
spectre v2 to still handle it correctly.
The modified behaviour is coherent with what the Linux kernel does in
KVM for guests.

While there use ARM_SMCCC_SUCCESS instead of 0 for the return code value
for workaround detection to be coherent with Workaround 2 handling.
Signed-off-by: default avatarBertrand Marquis <bertrand.marquis@arm.com>
Acked-by: default avatarJulien Grall <jgrall@amazon.com>
parent a5968a55
......@@ -104,8 +104,13 @@ static bool handle_arch(struct cpu_user_regs *regs)
switch ( arch_func_id )
{
case ARM_SMCCC_ARCH_WORKAROUND_1_FID:
if ( cpus_have_cap(ARM_HARDEN_BRANCH_PREDICTOR) )
ret = 0;
/*
* Workaround 3 is also mitigating spectre v2 so advertise that we
* support Workaround 1 if we do Workaround 3 on exception entry.
*/
if ( cpus_have_cap(ARM_HARDEN_BRANCH_PREDICTOR) ||
cpus_have_cap(ARM_WORKAROUND_BHB_SMCC_3) )
ret = ARM_SMCCC_SUCCESS;
break;
case ARM_SMCCC_ARCH_WORKAROUND_2_FID:
switch ( get_ssbd_state() )
......@@ -126,7 +131,7 @@ static bool handle_arch(struct cpu_user_regs *regs)
break;
case ARM_SMCCC_ARCH_WORKAROUND_3_FID:
if ( cpus_have_cap(ARM_WORKAROUND_BHB_SMCC_3) )
ret = 0;
ret = ARM_SMCCC_SUCCESS;
break;
}
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment