/trusted-firmware-a/bl31/ |
A D | bl31_context_mgmt.c | 20 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 22 assert(sec_state_is_valid(security_state)); in cm_get_context() 31 void cm_set_context(void *context, uint32_t security_state) in cm_set_context() argument 33 assert(sec_state_is_valid(security_state)); in cm_set_context() 35 set_cpu_data(cpu_context[get_cpu_context_index(security_state)], in cm_set_context() 46 unsigned int security_state) in cm_get_context_by_index() argument 48 assert(sec_state_is_valid(security_state)); in cm_get_context_by_index() 51 cpu_context[get_cpu_context_index(security_state)]); in cm_get_context_by_index() 59 unsigned int security_state) in cm_set_context_by_index() argument 61 assert(sec_state_is_valid(security_state)); in cm_set_context_by_index() [all …]
|
A D | interrupt_mgmt.c | 85 assert(sec_state_is_valid(security_state)); in get_scr_el3_from_routing_model() 100 uint32_t security_state) in set_scr_el3_from_rm() argument 105 bit_pos = plat_interrupt_type_to_line(type, security_state); in set_scr_el3_from_rm() 113 if (cm_get_context(security_state) != NULL) in set_scr_el3_from_rm() 114 cm_write_scr_el3_bit(security_state, bit_pos, flag); in set_scr_el3_from_rm() 155 flag = get_interrupt_rm_flag(INTR_DEFAULT_RM, security_state); in disable_intr_rm_local() 157 bit_pos = plat_interrupt_type_to_line(type, security_state); in disable_intr_rm_local() 158 cm_write_scr_el3_bit(security_state, bit_pos, flag); in disable_intr_rm_local() 174 security_state); in enable_intr_rm_local() 176 bit_pos = plat_interrupt_type_to_line(type, security_state); in enable_intr_rm_local() [all …]
|
A D | bl31_main.c | 212 void bl31_set_next_image_type(uint32_t security_state) in bl31_set_next_image_type() argument 214 assert(sec_state_is_valid(security_state)); in bl31_set_next_image_type() 215 next_image_type = security_state; in bl31_set_next_image_type()
|
/trusted-firmware-a/include/lib/el3_runtime/ |
A D | context_mgmt.h | 26 unsigned int security_state); 29 unsigned int security_state); 30 void *cm_get_context(uint32_t security_state); 31 void cm_set_context(void *context, uint32_t security_state); 36 void cm_prepare_el3_exit(uint32_t security_state); 40 void cm_el2_sysregs_context_save(uint32_t security_state); 44 void cm_el1_sysregs_context_save(uint32_t security_state); 47 void cm_set_elr_spsr_el3(uint32_t security_state, 49 void cm_write_scr_el3_bit(uint32_t security_state, 52 void cm_set_next_eret_context(uint32_t security_state); [all …]
|
A D | cpu_data.h | 193 static inline context_pas_t get_cpu_context_index(uint32_t security_state) in get_cpu_context_index() argument 195 if (security_state == SECURE) { in get_cpu_context_index() 199 if (security_state == NON_SECURE) { in get_cpu_context_index() 202 assert(security_state == REALM); in get_cpu_context_index() 206 assert(security_state == NON_SECURE); in get_cpu_context_index()
|
/trusted-firmware-a/bl1/aarch32/ |
A D | bl1_context_mgmt.c | 32 void *smc_get_ctx(unsigned int security_state) in smc_get_ctx() argument 34 assert(sec_state_is_valid(security_state)); in smc_get_ctx() 35 return &bl1_smc_context[security_state]; in smc_get_ctx() 38 void smc_set_next_ctx(unsigned int security_state) in smc_set_next_ctx() argument 40 assert(sec_state_is_valid(security_state)); in smc_set_next_ctx() 50 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 52 assert(sec_state_is_valid(security_state)); in cm_get_context() 53 return &bl1_cpu_context[security_state]; in cm_get_context() 132 cm_prepare_el3_exit(security_state); in bl1_prepare_next_image() 136 smc_set_next_ctx(security_state); in bl1_prepare_next_image() [all …]
|
/trusted-firmware-a/lib/el3_runtime/aarch64/ |
A D | context_mgmt.c | 72 unsigned int security_state; in cm_setup_context() local 106 if (security_state == NON_SECURE) { in cm_setup_context() 112 if (security_state == REALM) { in cm_setup_context() 173 if (security_state == NON_SECURE) { in cm_setup_context() 215 if (security_state != REALM) { in cm_setup_context() 222 if (security_state == SECURE) { in cm_setup_context() 487 if (security_state == NON_SECURE) { in cm_prepare_el3_exit() 706 if ((security_state != SECURE) || in cm_el2_sysregs_context_save() 728 if ((security_state != SECURE) || in cm_el2_sysregs_context_restore() 755 if (security_state == SECURE) in cm_el1_sysregs_context_save() [all …]
|
/trusted-firmware-a/bl1/aarch64/ |
A D | bl1_context_mgmt.c | 22 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 24 assert(sec_state_is_valid(security_state)); in cm_get_context() 25 return bl1_cpu_context_ptr[security_state]; in cm_get_context() 28 void cm_set_context(void *context, uint32_t security_state) in cm_set_context() argument 30 assert(sec_state_is_valid(security_state)); in cm_set_context() 31 bl1_cpu_context_ptr[security_state] = context; in cm_set_context() 81 unsigned int security_state, mode = MODE_EL1; in bl1_prepare_next_image() local 105 security_state = GET_SECURITY_STATE(next_bl_ep->h.attr); in bl1_prepare_next_image() 108 if (cm_get_context(security_state) == NULL) in bl1_prepare_next_image() 109 cm_set_context(&bl1_cpu_context[security_state], security_state); in bl1_prepare_next_image() [all …]
|
/trusted-firmware-a/bl32/sp_min/ |
A D | sp_min_main.c | 47 void *smc_get_ctx(unsigned int security_state) 49 assert(security_state == NON_SECURE); 53 void smc_set_next_ctx(unsigned int security_state) in smc_set_next_ctx() argument 55 assert(security_state == NON_SECURE); in smc_set_next_ctx() 69 void *cm_get_context(uint32_t security_state) in cm_get_context() argument 71 assert(security_state == NON_SECURE); in cm_get_context() 81 assert(security_state == NON_SECURE); in cm_set_context() 92 unsigned int security_state) in cm_get_context_by_index() argument 94 assert(security_state == NON_SECURE); in cm_get_context_by_index() 103 unsigned int security_state) in cm_set_context_by_index() argument [all …]
|
/trusted-firmware-a/lib/el3_runtime/aarch32/ |
A D | context_mgmt.c | 58 unsigned int security_state; in cm_setup_context() local 64 security_state = GET_SECURITY_STATE(ep->h.attr); in cm_setup_context() 78 if (security_state != SECURE) in cm_setup_context() 81 if (security_state != SECURE) { in cm_setup_context() 185 void cm_prepare_el3_exit(uint32_t security_state) in cm_prepare_el3_exit() argument 188 cpu_context_t *ctx = cm_get_context(security_state); in cm_prepare_el3_exit() 193 if (security_state == NON_SECURE) { in cm_prepare_el3_exit()
|
/trusted-firmware-a/include/bl31/ |
A D | bl31.h | 17 void bl31_next_el_arch_setup(uint32_t security_state); 18 void bl31_set_next_image_type(uint32_t security_state);
|
A D | interrupt_mgmt.h | 137 u_register_t get_scr_el3_from_routing_model(uint32_t security_state); 143 int disable_intr_rm_local(uint32_t type, uint32_t security_state); 144 int enable_intr_rm_local(uint32_t type, uint32_t security_state);
|
/trusted-firmware-a/services/spd/trusty/ |
A D | trusty.c | 90 static struct smc_args trusty_context_switch(uint32_t security_state, uint64_t r0, in trusty_context_switch() argument 97 assert(ctx->saved_security_state != security_state); in trusty_context_switch() 122 fpregs_context_save(get_fpregs_ctx(cm_get_context(security_state))); in trusty_context_switch() 123 cm_el1_sysregs_context_save(security_state); in trusty_context_switch() 125 ctx->saved_security_state = security_state; in trusty_context_switch() 128 assert(ctx->saved_security_state == ((security_state == 0U) ? 1U : 0U)); in trusty_context_switch() 130 cm_el1_sysregs_context_restore(security_state); in trusty_context_switch() 132 fpregs_context_restore(get_fpregs_ctx(cm_get_context(security_state))); in trusty_context_switch() 134 cm_set_next_eret_context(security_state); in trusty_context_switch()
|
/trusted-firmware-a/plat/common/ |
A D | plat_gicv3.c | 143 uint32_t security_state) in plat_interrupt_type_to_line() argument 149 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line() 158 if (security_state == SECURE) in plat_interrupt_type_to_line() 168 if (security_state == SECURE) in plat_interrupt_type_to_line()
|
A D | plat_gicv2.c | 134 uint32_t security_state) in plat_interrupt_type_to_line() argument 139 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line()
|
/trusted-firmware-a/plat/rpi/common/ |
A D | rpi3_common.c | 234 uint32_t plat_interrupt_type_to_line(uint32_t type, uint32_t security_state) in plat_interrupt_type_to_line() argument 239 assert(sec_state_is_valid(security_state)); in plat_interrupt_type_to_line()
|
/trusted-firmware-a/include/arch/aarch32/ |
A D | smccc_helpers.h | 167 void *smc_get_ctx(unsigned int security_state); 170 void smc_set_next_ctx(unsigned int security_state);
|
/trusted-firmware-a/docs/getting_started/ |
A D | psci-lib-integration-guide.rst | 364 Argument : unsigned int cpu_idx, void *context, unsigned int security_state 371 argument), for the specified ``security_state`` (3rd argument) and CPU identified 372 by ``cpu_idx`` (first argument). The ``security_state`` will always be non-secure 385 Argument : uint32_t security_state 389 the specified ``security_state`` (first argument) for the current CPU. The caller 391 context pointers are stored prior to invoking this API. The ``security_state`` 399 Argument : unsigned int cpu_idx, unsigned int security_state 403 the specified ``security_state`` (second argument) for the CPU identified by 406 pointers are stored prior to invoking this API. The ``security_state`` will
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/getting_started/ |
A D | psci-lib-integration-guide.rst.txt | 364 Argument : unsigned int cpu_idx, void *context, unsigned int security_state 371 argument), for the specified ``security_state`` (3rd argument) and CPU identified 372 by ``cpu_idx`` (first argument). The ``security_state`` will always be non-secure 385 Argument : uint32_t security_state 389 the specified ``security_state`` (first argument) for the current CPU. The caller 391 context pointers are stored prior to invoking this API. The ``security_state`` 399 Argument : unsigned int cpu_idx, unsigned int security_state 403 the specified ``security_state`` (second argument) for the CPU identified by 406 pointers are stored prior to invoking this API. The ``security_state`` will
|
/trusted-firmware-a/include/plat/common/ |
A D | platform.h | 88 uint32_t security_state);
|
/trusted-firmware-a/docs/process/ |
A D | coding-style.rst | 231 uint32_t security_state)
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/process/ |
A D | coding-style.rst.txt | 231 uint32_t security_state)
|
/trusted-firmware-a/docs/design/ |
A D | interrupt-framework-design.rst | 380 uint32_t cm_get_scr_el3(uint32_t security_state); 381 void cm_write_scr_el3_bit(uint32_t security_state,
|
/trusted-firmware-a/docs/build/TF-A_2.5/_sources/design/ |
A D | interrupt-framework-design.rst.txt | 380 uint32_t cm_get_scr_el3(uint32_t security_state); 381 void cm_write_scr_el3_bit(uint32_t security_state,
|