| /rk3399_ARM-atf/lib/extensions/idte/ |
| H A D | idte3.c | 15 void idte3_init_percpu_once_regs(size_t security_state) in idte3_init_percpu_once_regs() argument 17 assert(security_state < CPU_CONTEXT_NUM); in idte3_init_percpu_once_regs() 20 &get_cpu_data(idregs[security_state]); in idte3_init_percpu_once_regs() 25 update_feat_spe_idreg_field(security_state); in idte3_init_percpu_once_regs() 26 update_feat_brbe_idreg_field(security_state); in idte3_init_percpu_once_regs() 27 update_feat_trbe_idreg_field(security_state); in idte3_init_percpu_once_regs() 28 update_feat_trf_idreg_field(security_state); in idte3_init_percpu_once_regs() 29 update_feat_mtpmu_idreg_field(security_state); in idte3_init_percpu_once_regs() 30 update_feat_sebep_idreg_field(security_state); in idte3_init_percpu_once_regs() 31 update_feat_sys_reg_trace_idreg_field(security_state); in idte3_init_percpu_once_regs() [all …]
|
| /rk3399_ARM-atf/bl31/ |
| H A D | bl31_context_mgmt.c | 20 void *cm_get_context(size_t security_state) in cm_get_context() argument 22 assert(sec_state_is_valid(security_state)); in cm_get_context() 24 return get_cpu_data(cpu_context[get_cpu_context_index(security_state)]); in cm_get_context() 31 void cm_set_context(void *context, uint32_t security_state) in cm_set_context() argument 33 assert(sec_state_is_valid(security_state)); in cm_set_context() 35 set_cpu_data(cpu_context[get_cpu_context_index(security_state)], in cm_set_context() 46 size_t security_state) in cm_get_context_by_index() argument 48 assert(sec_state_is_valid(security_state)); in cm_get_context_by_index() 51 cpu_context[get_cpu_context_index(security_state)]); in cm_get_context_by_index() 59 unsigned int security_state) in cm_set_context_by_index() argument [all …]
|
| H A D | interrupt_mgmt.c | 84 u_register_t get_scr_el3_from_routing_model(size_t security_state) in get_scr_el3_from_routing_model() argument 88 assert(sec_state_is_valid(security_state)); in get_scr_el3_from_routing_model() 89 scr_el3 = intr_type_descs[INTR_TYPE_NS].scr_el3[security_state]; in get_scr_el3_from_routing_model() 90 scr_el3 |= intr_type_descs[INTR_TYPE_S_EL1].scr_el3[security_state]; in get_scr_el3_from_routing_model() 91 scr_el3 |= intr_type_descs[INTR_TYPE_EL3].scr_el3[security_state]; in get_scr_el3_from_routing_model() 103 uint32_t security_state) in set_scr_el3_from_rm() argument 107 flag = get_interrupt_rm_flag(interrupt_type_flags, security_state); in set_scr_el3_from_rm() 108 bit_pos = plat_interrupt_type_to_line(type, security_state); in set_scr_el3_from_rm() 109 intr_type_descs[type].scr_el3[security_state] = (u_register_t)flag << bit_pos; in set_scr_el3_from_rm() 116 if (cm_get_context(security_state) != NULL) { in set_scr_el3_from_rm() [all …]
|
| H A D | bl31_main.c | 302 void bl31_set_next_image_type(uint32_t security_state) in bl31_set_next_image_type() argument 304 assert(sec_state_is_valid(security_state)); in bl31_set_next_image_type() 305 next_image_type = security_state; in bl31_set_next_image_type()
|
| /rk3399_ARM-atf/include/lib/el3_runtime/ |
| H A D | context_mgmt.h | 26 size_t security_state); 29 unsigned int security_state); 30 void *cm_get_context(size_t security_state); 31 void cm_set_context(void *context, uint32_t security_state); 34 void cm_prepare_el3_exit(size_t security_state); 43 void cm_el2_sysregs_context_save(uint32_t security_state); 44 void cm_el2_sysregs_context_restore(uint32_t security_state); 46 void cm_el1_sysregs_context_save(uint32_t security_state); 47 void cm_el1_sysregs_context_restore(uint32_t security_state); 50 void cm_set_elr_el3(uint32_t security_state, uintptr_t entrypoint); [all …]
|
| H A D | simd_ctx.h | 94 void simd_ctx_save(uint32_t security_state, bool hint_sve); 95 void simd_ctx_restore(uint32_t security_state);
|
| /rk3399_ARM-atf/bl1/aarch32/ |
| H A D | bl1_context_mgmt.c | 32 void *smc_get_ctx(unsigned int security_state) in smc_get_ctx() argument 34 assert(sec_state_is_valid(security_state)); in smc_get_ctx() 35 return &bl1_smc_context[security_state]; in smc_get_ctx() 38 void smc_set_next_ctx(unsigned int security_state) in smc_set_next_ctx() argument 40 assert(sec_state_is_valid(security_state)); in smc_set_next_ctx() 41 bl1_next_smc_context_ptr = &bl1_smc_context[security_state]; in smc_set_next_ctx() 50 void *cm_get_context(size_t security_state) in cm_get_context() argument 52 assert(sec_state_is_valid(security_state)); in cm_get_context() 53 return &bl1_cpu_context[security_state]; in cm_get_context() 105 unsigned int security_state, mode = MODE32_svc; in bl1_prepare_next_image() local [all …]
|
| /rk3399_ARM-atf/lib/el3_runtime/ |
| H A D | simd_ctx.c | 30 void simd_ctx_save(uint32_t security_state, bool hint_sve) in simd_ctx_save() argument 34 if (security_state != NON_SECURE && security_state != SECURE) { in simd_ctx_save() 36 security_state); in simd_ctx_save() 40 regs = &simd_context[security_state][plat_my_core_pos()]; in simd_ctx_save() 59 void simd_ctx_restore(uint32_t security_state) in simd_ctx_restore() argument 63 if (security_state != NON_SECURE && security_state != SECURE) { in simd_ctx_restore() 65 security_state); in simd_ctx_restore() 69 regs = &simd_context[security_state][plat_my_core_pos()]; in simd_ctx_restore()
|
| /rk3399_ARM-atf/bl32/sp_min/ |
| H A D | sp_min_main.c | 48 void *smc_get_ctx(unsigned int security_state) 50 assert(security_state == NON_SECURE); 54 void smc_set_next_ctx(unsigned int security_state) in smc_set_next_ctx() argument 56 assert(security_state == NON_SECURE); in smc_set_next_ctx() 70 void *cm_get_context(size_t security_state) in cm_get_context() argument 72 assert(security_state == NON_SECURE); in cm_get_context() 80 void cm_set_context(void *context, uint32_t security_state) in cm_set_context() argument 82 assert(security_state == NON_SECURE); in cm_set_context() 93 size_t security_state) in cm_get_context_by_index() argument 95 assert(security_state == NON_SECURE); in cm_get_context_by_index() [all …]
|
| /rk3399_ARM-atf/bl1/aarch64/ |
| H A D | bl1_context_mgmt.c | 25 void *cm_get_context(size_t security_state) in cm_get_context() argument 27 assert(sec_state_is_valid(security_state)); in cm_get_context() 28 return &bl1_cpu_context[security_state]; in cm_get_context() 71 unsigned int security_state, mode = MODE_EL1; in bl1_prepare_next_image() local 95 security_state = GET_SECURITY_STATE(next_bl_ep->h.attr); in bl1_prepare_next_image() 98 if ((security_state != SECURE) && (el_implemented(2) != EL_IMPL_NONE)) { in bl1_prepare_next_image() 110 cm_prepare_el3_exit(security_state); in bl1_prepare_next_image()
|
| /rk3399_ARM-atf/services/spd/pncd/ |
| H A D | pncd_main.c | 53 static void context_save(unsigned long security_state) in context_save() argument 55 assert(sec_state_is_valid(security_state)); in context_save() 57 cm_el1_sysregs_context_save((uint32_t) security_state); in context_save() 60 simd_ctx_save((uint32_t)security_state, false); in context_save() 64 static void *context_restore(unsigned long security_state) in context_restore() argument 68 assert(sec_state_is_valid(security_state)); in context_restore() 71 handle = cm_get_context((uint32_t) security_state); in context_restore() 75 cm_el1_sysregs_context_restore((uint32_t) security_state); in context_restore() 78 simd_ctx_restore((uint32_t)security_state); in context_restore() 81 cm_set_next_eret_context((uint32_t) security_state); in context_restore() [all …]
|
| /rk3399_ARM-atf/lib/el3_runtime/aarch32/ |
| H A D | context_mgmt.c | 60 unsigned int security_state; in cm_setup_context() local 66 security_state = GET_SECURITY_STATE(ep->h.attr); in cm_setup_context() 80 if (security_state != SECURE) in cm_setup_context() 83 if (security_state != SECURE) { in cm_setup_context() 178 void cm_prepare_el3_exit(size_t security_state) in cm_prepare_el3_exit() argument 181 cpu_context_t *ctx = cm_get_context(security_state); in cm_prepare_el3_exit() 186 if (security_state == NON_SECURE) { in cm_prepare_el3_exit()
|
| /rk3399_ARM-atf/lib/el3_runtime/aarch64/ |
| H A D | context_mgmt.c | 656 size_t security_state; in cm_setup_context() local 666 security_state = GET_SECURITY_STATE(ep->h.attr); in cm_setup_context() 669 switch (security_state) { in cm_setup_context() 1144 void cm_prepare_el3_exit(size_t security_state) in cm_prepare_el3_exit() argument 1147 cpu_context_t *ctx = cm_get_context(security_state); in cm_prepare_el3_exit() 1151 if (security_state == NON_SECURE) { in cm_prepare_el3_exit() 1219 cm_el1_sysregs_context_restore(security_state); in cm_prepare_el3_exit() 1221 cm_set_next_eret_context(security_state); in cm_prepare_el3_exit() 1369 static void el2_sysregs_context_save_gic(el2_sysregs_t *ctx, uint32_t security_state) in el2_sysregs_context_save_gic() argument 1387 if (security_state == SECURE) { in el2_sysregs_context_save_gic() [all …]
|
| /rk3399_ARM-atf/include/bl31/ |
| H A D | bl31.h | 15 void bl31_next_el_arch_setup(uint32_t security_state); 16 void bl31_set_next_image_type(uint32_t security_state);
|
| H A D | interrupt_mgmt.h | 147 u_register_t get_scr_el3_from_routing_model(size_t security_state); 153 int disable_intr_rm_local(uint32_t type, uint32_t security_state); 154 int enable_intr_rm_local(uint32_t type, uint32_t security_state);
|
| /rk3399_ARM-atf/services/arm_arch_svc/ |
| H A D | arm_arch_svc_setup.c | 186 size_t security_state; in smccc_arch_feature_availability() local 190 security_state = SECURE; in smccc_arch_feature_availability() 192 security_state = NON_SECURE; in smccc_arch_feature_availability() 195 security_state = REALM; in smccc_arch_feature_availability() 201 caller_per_world_context = &per_world_context[get_cpu_context_index(security_state)]; in smccc_arch_feature_availability() 202 state = get_el3state_ctx(cm_get_context(security_state)); in smccc_arch_feature_availability()
|
| /rk3399_ARM-atf/include/arch/aarch64/ |
| H A D | arch_features.h | 93 static inline void update_ ## name ## _idreg_field(size_t security_state) \ 95 if (SHOULD_ID_FIELD_DISABLE(guard, enabled_worlds, security_state)) { \ 97 &per_world_context[security_state]; \ 105 static inline void update_ ## name ## _idreg_field(size_t security_state) \ 107 if (SHOULD_ID_FIELD_DISABLE(guard, enabled_worlds, security_state)) { \ 109 &(get_cpu_data(idregs[security_state]));\ 332 static inline void update_feat_pauth_idreg_field(size_t security_state) in CREATE_FEATURE_SUPPORTED() 344 per_world_context_t *per_world_ctx = &per_world_context[security_state]; in CREATE_FEATURE_SUPPORTED() 349 security_state)) && in CREATE_FEATURE_SUPPORTED() 352 security_state))) { in CREATE_FEATURE_SUPPORTED() [all …]
|
| /rk3399_ARM-atf/include/lib/extensions/ |
| H A D | idte3.h | 129 void idte3_init_cached_idregs_per_world(size_t security_state); 130 void idte3_init_percpu_once_regs(size_t security_state); 140 static inline void idte3_init_percpu_once_regs(size_t security_state) in idte3_init_percpu_once_regs() argument 143 static inline void idte3_init_cached_idregs_per_world(size_t security_state) in idte3_init_cached_idregs_per_world() argument
|
| /rk3399_ARM-atf/services/spd/trusty/ |
| H A D | trusty.c | 90 static struct smc_args trusty_context_switch(uint32_t security_state, uint64_t r0, in trusty_context_switch() argument 97 assert(ctx->saved_security_state != security_state); in trusty_context_switch() 122 simd_ctx_save(security_state, false); in trusty_context_switch() 125 cm_el1_sysregs_context_save(security_state); in trusty_context_switch() 127 ctx->saved_security_state = security_state; in trusty_context_switch() 130 assert(ctx->saved_security_state == ((security_state == 0U) ? 1U : 0U)); in trusty_context_switch() 132 cm_el1_sysregs_context_restore(security_state); in trusty_context_switch() 134 simd_ctx_restore(security_state); in trusty_context_switch() 137 cm_set_next_eret_context(security_state); in trusty_context_switch()
|
| /rk3399_ARM-atf/plat/common/ |
| H A D | plat_gicv3.c | 157 uint32_t security_state) in plat_interrupt_type_to_line() argument 163 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line() 172 if (security_state == SECURE) { in plat_interrupt_type_to_line() 183 if (security_state == SECURE) { in plat_interrupt_type_to_line()
|
| H A D | plat_gicv2.c | 143 uint32_t security_state) in plat_interrupt_type_to_line() argument 148 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line()
|
| /rk3399_ARM-atf/include/bl32/pnc/ |
| H A D | pnc.h | 20 void *pncd_context_switch_to(unsigned long security_state);
|
| /rk3399_ARM-atf/plat/arm/board/neoverse_rd/common/ras/ |
| H A D | nrd_ras_cpu.c | 53 uint64_t security_state) in populate_cpu_err_data() argument 57 ctx = cm_get_context(security_state); in populate_cpu_err_data() 62 cpu_info->SecurityState = security_state; in populate_cpu_err_data()
|
| /rk3399_ARM-atf/plat/rpi/common/ |
| H A D | rpi3_common.c | 218 uint32_t plat_interrupt_type_to_line(uint32_t type, uint32_t security_state) in plat_interrupt_type_to_line() argument 223 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line()
|
| /rk3399_ARM-atf/include/lib/el3_runtime/aarch64/ |
| H A D | context.h | 323 static inline uint8_t get_cpu_context_index(size_t security_state) in get_cpu_context_index() argument 325 if (security_state == SECURE) { in get_cpu_context_index() 328 } else if (security_state == REALM) { in get_cpu_context_index() 332 assert(security_state == NON_SECURE); in get_cpu_context_index()
|