/external/arm-trusted-firmware/bl31/ |
D | bl31_context_mgmt.c | 21 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 23 assert(security_state <= NON_SECURE); in cm_get_context() 25 return get_cpu_data(cpu_context[security_state]); in cm_get_context() 32 void cm_set_context(void *context, uint32_t security_state) in cm_set_context() argument 34 assert(security_state <= NON_SECURE); in cm_set_context() 36 set_cpu_data(cpu_context[security_state], context); in cm_set_context() 46 unsigned int security_state) in cm_get_context_by_index() argument 48 assert(sec_state_is_valid(security_state)); in cm_get_context_by_index() 50 return get_cpu_data_by_index(cpu_idx, cpu_context[security_state]); in cm_get_context_by_index() 58 unsigned int security_state) in cm_set_context_by_index() argument [all …]
|
D | interrupt_mgmt.c | 81 u_register_t get_scr_el3_from_routing_model(uint32_t security_state) in get_scr_el3_from_routing_model() argument 85 assert(sec_state_is_valid(security_state)); in get_scr_el3_from_routing_model() 86 scr_el3 = intr_type_descs[INTR_TYPE_NS].scr_el3[security_state]; in get_scr_el3_from_routing_model() 87 scr_el3 |= intr_type_descs[INTR_TYPE_S_EL1].scr_el3[security_state]; in get_scr_el3_from_routing_model() 88 scr_el3 |= intr_type_descs[INTR_TYPE_EL3].scr_el3[security_state]; in get_scr_el3_from_routing_model() 100 uint32_t security_state) in set_scr_el3_from_rm() argument 104 flag = get_interrupt_rm_flag(interrupt_type_flags, security_state); in set_scr_el3_from_rm() 105 bit_pos = plat_interrupt_type_to_line(type, security_state); in set_scr_el3_from_rm() 106 intr_type_descs[type].scr_el3[security_state] = (u_register_t)flag << bit_pos; in set_scr_el3_from_rm() 113 if (cm_get_context(security_state) != NULL) in set_scr_el3_from_rm() [all …]
|
D | bl31_main.c | 160 void bl31_set_next_image_type(uint32_t security_state) in bl31_set_next_image_type() argument 162 assert(sec_state_is_valid(security_state)); in bl31_set_next_image_type() 163 next_image_type = security_state; in bl31_set_next_image_type()
|
/external/arm-trusted-firmware/bl1/aarch32/ |
D | bl1_context_mgmt.c | 32 void *smc_get_ctx(unsigned int security_state) in smc_get_ctx() argument 34 assert(sec_state_is_valid(security_state)); in smc_get_ctx() 35 return &bl1_smc_context[security_state]; in smc_get_ctx() 38 void smc_set_next_ctx(unsigned int security_state) in smc_set_next_ctx() argument 40 assert(sec_state_is_valid(security_state)); in smc_set_next_ctx() 41 bl1_next_smc_context_ptr = &bl1_smc_context[security_state]; in smc_set_next_ctx() 50 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 52 assert(sec_state_is_valid(security_state)); in cm_get_context() 53 return &bl1_cpu_context[security_state]; in cm_get_context() 105 unsigned int security_state, mode = MODE32_svc; in bl1_prepare_next_image() local [all …]
|
/external/arm-trusted-firmware/bl1/aarch64/ |
D | bl1_context_mgmt.c | 27 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 29 assert(sec_state_is_valid(security_state)); in cm_get_context() 30 return bl1_cpu_context_ptr[security_state]; in cm_get_context() 33 void cm_set_context(void *context, uint32_t security_state) in cm_set_context() argument 35 assert(sec_state_is_valid(security_state)); in cm_set_context() 36 bl1_cpu_context_ptr[security_state] = context; in cm_set_context() 45 unsigned int security_state, mode = MODE_EL1; in bl1_prepare_next_image() local 69 security_state = GET_SECURITY_STATE(next_bl_ep->h.attr); in bl1_prepare_next_image() 72 if (!cm_get_context(security_state)) in bl1_prepare_next_image() 73 cm_set_context(&bl1_cpu_context[security_state], security_state); in bl1_prepare_next_image() [all …]
|
/external/arm-trusted-firmware/lib/el3_runtime/aarch64/ |
D | context_mgmt.c | 68 unsigned int security_state; in cm_setup_context() local 76 security_state = GET_SECURITY_STATE(ep->h.attr); in cm_setup_context() 96 if (security_state != SECURE) in cm_setup_context() 136 if (security_state == NON_SECURE) in cm_setup_context() 156 } else if (mte == MTE_IMPLEMENTED_ELX && security_state == NON_SECURE) { in cm_setup_context() 170 scr_el3 |= get_scr_el3_from_routing_model(security_state); in cm_setup_context() 185 if ((security_state == SECURE) && (GET_EL(ep->spsr) == MODE_EL2)) { in cm_setup_context() 327 void cm_prepare_el3_exit(uint32_t security_state) in cm_prepare_el3_exit() argument 330 cpu_context_t *ctx = cm_get_context(security_state); in cm_prepare_el3_exit() 336 if (security_state == NON_SECURE) { in cm_prepare_el3_exit() [all …]
|
/external/arm-trusted-firmware/include/lib/el3_runtime/ |
D | context_mgmt.h | 26 unsigned int security_state); 29 unsigned int security_state); 30 void *cm_get_context(uint32_t security_state); 31 void cm_set_context(void *context, uint32_t security_state); 36 void cm_prepare_el3_exit(uint32_t security_state); 39 void cm_el1_sysregs_context_save(uint32_t security_state); 40 void cm_el1_sysregs_context_restore(uint32_t security_state); 41 void cm_set_elr_el3(uint32_t security_state, uintptr_t entrypoint); 42 void cm_set_elr_spsr_el3(uint32_t security_state, 44 void cm_write_scr_el3_bit(uint32_t security_state, [all …]
|
/external/arm-trusted-firmware/bl32/sp_min/ |
D | sp_min_main.c | 47 void *smc_get_ctx(unsigned int security_state) 49 assert(security_state == NON_SECURE); 53 void smc_set_next_ctx(unsigned int security_state) in smc_set_next_ctx() argument 55 assert(security_state == NON_SECURE); in smc_set_next_ctx() 69 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 71 assert(security_state == NON_SECURE); in cm_get_context() 79 void cm_set_context(void *context, uint32_t security_state) in cm_set_context() argument 81 assert(security_state == NON_SECURE); in cm_set_context() 92 unsigned int security_state) in cm_get_context_by_index() argument 94 assert(security_state == NON_SECURE); in cm_get_context_by_index() [all …]
|
/external/arm-trusted-firmware/lib/el3_runtime/aarch32/ |
D | context_mgmt.c | 58 unsigned int security_state; in cm_setup_context() local 64 security_state = GET_SECURITY_STATE(ep->h.attr); in cm_setup_context() 78 if (security_state != SECURE) in cm_setup_context() 81 if (security_state != SECURE) { in cm_setup_context() 177 void cm_prepare_el3_exit(uint32_t security_state) in cm_prepare_el3_exit() argument 180 cpu_context_t *ctx = cm_get_context(security_state); in cm_prepare_el3_exit() 185 if (security_state == NON_SECURE) { in cm_prepare_el3_exit()
|
/external/arm-trusted-firmware/services/spd/trusty/ |
D | trusty.c | 80 static struct smc_args trusty_context_switch(uint32_t security_state, uint64_t r0, in trusty_context_switch() argument 87 assert(ctx->saved_security_state != security_state); in trusty_context_switch() 112 fpregs_context_save(get_fpregs_ctx(cm_get_context(security_state))); in trusty_context_switch() 113 cm_el1_sysregs_context_save(security_state); in trusty_context_switch() 115 ctx->saved_security_state = security_state; in trusty_context_switch() 118 assert(ctx->saved_security_state == ((security_state == 0U) ? 1U : 0U)); in trusty_context_switch() 120 cm_el1_sysregs_context_restore(security_state); in trusty_context_switch() 122 fpregs_context_restore(get_fpregs_ctx(cm_get_context(security_state))); in trusty_context_switch() 124 cm_set_next_eret_context(security_state); in trusty_context_switch()
|
/external/arm-trusted-firmware/plat/common/ |
D | plat_gicv3.c | 143 uint32_t security_state) in plat_interrupt_type_to_line() argument 149 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line() 158 if (security_state == SECURE) in plat_interrupt_type_to_line() 168 if (security_state == SECURE) in plat_interrupt_type_to_line()
|
D | plat_gicv2.c | 134 uint32_t security_state) in plat_interrupt_type_to_line() argument 139 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line()
|
/external/arm-trusted-firmware/include/bl31/ |
D | interrupt_mgmt.h | 137 u_register_t get_scr_el3_from_routing_model(uint32_t security_state); 143 int disable_intr_rm_local(uint32_t type, uint32_t security_state); 144 int enable_intr_rm_local(uint32_t type, uint32_t security_state);
|
D | bl31.h | 17 void bl31_next_el_arch_setup(uint32_t security_state); 18 void bl31_set_next_image_type(uint32_t security_state);
|
/external/arm-trusted-firmware/plat/rpi/common/ |
D | rpi3_common.c | 215 uint32_t plat_interrupt_type_to_line(uint32_t type, uint32_t security_state) in plat_interrupt_type_to_line() argument 220 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line()
|
/external/arm-trusted-firmware/include/arch/aarch32/ |
D | smccc_helpers.h | 167 void *smc_get_ctx(unsigned int security_state); 170 void smc_set_next_ctx(unsigned int security_state);
|
/external/arm-trusted-firmware/docs/getting_started/ |
D | psci-lib-integration-guide.rst | 364 Argument : unsigned int cpu_idx, void *context, unsigned int security_state 371 argument), for the specified ``security_state`` (3rd argument) and CPU identified 372 by ``cpu_idx`` (first argument). The ``security_state`` will always be non-secure 385 Argument : uint32_t security_state 389 the specified ``security_state`` (first argument) for the current CPU. The caller 391 context pointers are stored prior to invoking this API. The ``security_state`` 399 Argument : unsigned int cpu_idx, unsigned int security_state 403 the specified ``security_state`` (second argument) for the CPU identified by 406 pointers are stored prior to invoking this API. The ``security_state`` will
|
/external/arm-trusted-firmware/include/plat/common/ |
D | platform.h | 71 uint32_t security_state);
|
/external/arm-trusted-firmware/docs/design/ |
D | interrupt-framework-design.rst | 378 uint32_t cm_get_scr_el3(uint32_t security_state); 379 void cm_write_scr_el3_bit(uint32_t security_state,
|