(old) | htmldiff from- | (new) |
The BPIALL characteristics are:
Invalidate all entries from branch predictors.
This instruction is present only when AArch32 is supported at any Exception level. Otherwise, direct accesses to BPIALL are UNKNOWN.
In an implementation where the branch predictors are architecturally invisible, this instruction can execute as a NOP.
BPIALL is a 32-bit System instruction.
BPIALL ignores the value in the register specified by the instruction encoding. Software does not have to write a value to the register before issuing this instruction.
The PE ignores the value of <Rt>. Software does not have to write a value to this register before issuing this instruction.
When HCR.FB is 1, at Non-secure EL1 this instruction executes as a BPIALLIS.
Accesses to this instruction use the following encodings:
coproc | opc1 | CRn | CRm | opc2 |
---|---|---|---|---|
0b1111 | 0b000 | 0b0111 | 0b0101 | 0b110 |
if PSTATE.EL == EL0 then UNDEFINED; elsif PSTATE.EL == EL1 then if EL2Enabled() && !ELUsingAArch32(EL2) && HSTR_EL2.T7 == '1' then AArch64.AArch32SystemAccessTrap(EL2, 0x03); elsif EL2Enabled() && ELUsingAArch32(EL2) && HSTR.T7 == '1' then AArch32.TakeHypTrapException(0x03); elsif EL2Enabled() && ELUsingAArch32(EL2) && HCR.FB == '1' then BPIALLIS(); else BPIALL(); elsif PSTATE.EL == EL2 then BPIALL(); elsif PSTATE.EL == EL3 then BPIALL();
1327/1209/2019 1518:1348; 391b5248b29fb2f001ef74792eaacbd6fc72f2116134483bd14dc8c12a99c984cbfe3431cc1c9707
Copyright © 2010-2019 Arm Limited or its affiliates. All rights reserved. This document is Non-Confidential.
(old) | htmldiff from- | (new) |