No description
Find a file
Boyan Karatotev 89dba82dfa perf(cpus): make reset errata do fewer branches
Errata application is painful for performance. For a start, it's done
when the core has just come out of reset, which means branch predictors
and caches will be empty so a branch to a workaround function must be
fetched from memory and that round trip is very slow. Then it also runs
with the I-cache off, which means that the loop to iterate over the
workarounds must also be fetched from memory on each iteration.

We can remove both branches. First, we can simply apply every erratum
directly instead of defining a workaround function and jumping to it.
Currently, no errata that need to be applied at both reset and runtime,
with the same workaround function, exist. If the need arose in future,
this should be achievable with a reset + runtime wrapper combo.

Then, we can construct a function that applies each erratum linearly
instead of looping over the list. If this function is part of the reset
function, then the only "far" branches at reset will be for the checker
functions. Importantly, this mitigates the slowdown even when an erratum
is disabled.

The result is ~50% speedup on N1SDP and ~20% on AArch64 Juno on wakeup
from PSCI calls that end in powerdown. This is roughly back to the
baseline of v2.9, before the errata framework regressed on performance
(or a little better). It is important to note that there are other
slowdowns since then that remain unknown.

Change-Id: Ie4d5288a331b11fd648e5c4a0b652b74160b07b9
Signed-off-by: Boyan Karatotev <boyan.karatotev@arm.com>
2025-02-24 09:36:11 +00:00
.github chore(dependabot): further refine Dependabot configuration 2025-02-10 15:21:23 +00:00
.husky build(npm): adhere to Husky deprecation notice 2024-03-07 16:13:15 +00:00
bl1 refactor(cpus): register DSU errata with the errata framework's wrappers 2025-02-20 17:28:17 +00:00
bl2 refactor(cpus): register DSU errata with the errata framework's wrappers 2025-02-20 17:28:17 +00:00
bl2u build: remove MAKE_BUILD_STRINGS function 2024-04-29 12:47:01 +00:00
bl31 refactor(cpus): register DSU errata with the errata framework's wrappers 2025-02-20 17:28:17 +00:00
bl32 refactor(bl32): flush before console switch state 2025-01-21 12:22:57 +01:00
common feat(rmm): add PCIe IO info to Boot manifest 2025-02-11 15:10:49 +00:00
docs perf(cpus): make reset errata do fewer branches 2025-02-24 09:36:11 +00:00
drivers feat(s32g274a): enable sdhc clock 2025-02-18 09:59:04 +02:00
fdts feat(fvp): change size of PCIe memory region 2 2025-02-11 15:10:49 +00:00
include perf(cpus): make reset errata do fewer branches 2025-02-24 09:36:11 +00:00
lib perf(cpus): make reset errata do fewer branches 2025-02-24 09:36:11 +00:00
licenses feat(dice): add typedefs from the Open DICE repo 2024-03-06 15:44:55 +01:00
make_helpers Merge changes I765a7fa0,Ic33f0b6d,I8d1a88c7,I381f96be,I698fa849, ... into integration 2025-02-11 16:52:18 +01:00
plat refactor(cpus): register DSU errata with the errata framework's wrappers 2025-02-20 17:28:17 +00:00
services Merge "fix(spmd): prevent SIMD context loss" into integration 2025-02-18 12:59:04 +01:00
tools Merge "feat(sptool): transfer list to replace SP Pkg" into integration 2025-02-03 15:45:14 +01:00
.checkpatch.conf Re-apply GIT_COMMIT_ID check for checkpatch 2019-07-12 11:06:24 +01:00
.commitlintrc.js build(npm): update Node.js and all packages 2024-02-27 18:50:10 +00:00
.ctags feat(build): add ctags recipes for indexing assembly files 2024-08-29 15:58:24 +01:00
.cz-adapter.cjs build(npm): fix Commitizen ES Module errors 2024-03-07 16:13:39 +00:00
.cz.json build(npm): fix Commitizen ES Module errors 2024-03-07 16:13:39 +00:00
.editorconfig chore(commitlint): tell editors commit line lengths are 72 characters 2024-10-16 13:44:51 +01:00
.gitignore fix: .gitignore to include memory tools 2023-08-11 11:49:53 +01:00
.gitreview Specify integration as the default branch for git-review 2020-04-02 07:57:17 +00:00
.nvmrc build(npm): update Node.js and all packages 2024-02-27 18:50:10 +00:00
.readthedocs.yaml fix(docs): point poetry readthedocs virtual env 2024-08-01 15:48:44 +00:00
.versionrc.cjs build(npm): update Node.js and all packages 2024-02-27 18:50:10 +00:00
changelog.yaml chore(dependabot): limit LTS branches to patch updates 2025-02-03 11:25:43 +00:00
dco.txt Drop requirement for CLA in contribution.md 2016-09-27 21:52:03 +01:00
license.rst doc: De-duplicate readme and license files 2019-10-08 16:36:15 +00:00
Makefile Merge changes I765a7fa0,Ic33f0b6d,I8d1a88c7,I381f96be,I698fa849, ... into integration 2025-02-11 16:52:18 +01:00
package-lock.json chore(deps): bump cross-spawn 2025-01-07 15:56:00 +00:00
package.json docs(changelog): changelog for v2.12 release 2024-11-19 18:08:58 -06:00
poetry.lock chore(deps): bump the pip group across 2 directories with 1 update 2025-01-14 15:41:40 +00:00
pyproject.toml docs(changelog): changelog for v2.12 release 2024-11-19 18:08:58 -06:00
readme.rst docs: fix link to TBBR specification 2024-02-02 15:31:12 +01:00

Trusted Firmware-A
==================

Trusted Firmware-A (TF-A) is a reference implementation of secure world software
for `Arm A-Profile architectures`_ (Armv8-A and Armv7-A), including an Exception
Level 3 (EL3) `Secure Monitor`_. It provides a suitable starting point for
productization of secure world boot and runtime firmware, in either the AArch32
or AArch64 execution states.

TF-A implements Arm interface standards, including:

-  `Power State Coordination Interface (PSCI)`_
-  `Trusted Board Boot Requirements CLIENT (TBBR-CLIENT)`_
-  `SMC Calling Convention`_
-  `System Control and Management Interface (SCMI)`_
-  `Software Delegated Exception Interface (SDEI)`_

The code is designed to be portable and reusable across hardware platforms and
software models that are based on the Armv8-A and Armv7-A architectures.

In collaboration with interested parties, we will continue to enhance TF-A
with reference implementations of Arm standards to benefit developers working
with Armv7-A and Armv8-A TrustZone technology.

Users are encouraged to do their own security validation, including penetration
testing, on any secure world code derived from TF-A.

More Info and Documentation
---------------------------

To find out more about Trusted Firmware-A, please `view the full documentation`_
that is available through `trustedfirmware.org`_.

--------------

*Copyright (c) 2013-2019, Arm Limited and Contributors. All rights reserved.*

.. _Armv7-A and Armv8-A: https://developer.arm.com/products/architecture/a-profile
.. _Secure Monitor: http://www.arm.com/products/processors/technologies/trustzone/tee-smc.php
.. _Power State Coordination Interface (PSCI): PSCI_
.. _PSCI: http://infocenter.arm.com/help/topic/com.arm.doc.den0022d/Power_State_Coordination_Interface_PDD_v1_1_DEN0022D.pdf
.. _Trusted Board Boot Requirements CLIENT (TBBR-CLIENT): https://developer.arm.com/docs/den0006/latest
.. _SMC Calling Convention: http://infocenter.arm.com/help/topic/com.arm.doc.den0028b/ARM_DEN0028B_SMC_Calling_Convention.pdf
.. _System Control and Management Interface (SCMI): SCMI_
.. _SCMI: http://infocenter.arm.com/help/topic/com.arm.doc.den0056a/DEN0056A_System_Control_and_Management_Interface.pdf
.. _Software Delegated Exception Interface (SDEI): SDEI_
.. _SDEI: http://infocenter.arm.com/help/topic/com.arm.doc.den0054a/ARM_DEN0054A_Software_Delegated_Exception_Interface.pdf
.. _Arm A-Profile architectures: https://developer.arm.com/architectures/cpu-architecture/a-profile
.. _view the full documentation: https://www.trustedfirmware.org/docs/tf-a
.. _trustedfirmware.org: http://www.trustedfirmware.org