On 14 May 2014 00:53, Sergey Fedorov <serge.f...@gmail.com> wrote:

> On 13.05.2014 20:15, Fabian Aggeler wrote:
> > arm_is_secure() function allows to determine CPU security state
> > if the CPU implements Security Extensions.
> >
> > Signed-off-by: Sergey Fedorov <s.fedo...@samsung.com>
> > Signed-off-by: Fabian Aggeler <aggel...@ethz.ch>
> > ---
> >  target-arm/cpu.h | 15 +++++++++++++++
> >  1 file changed, 15 insertions(+)
> >
> > diff --git a/target-arm/cpu.h b/target-arm/cpu.h
> > index a56d3d6..6ea0432 100644
> > --- a/target-arm/cpu.h
> > +++ b/target-arm/cpu.h
> > @@ -640,6 +640,21 @@ static inline int arm_feature(CPUARMState *env, int
> feature)
> >      return (env->features & (1ULL << feature)) != 0;
> >  }
> >
> > +/* Return true if the processor is in secure state */
> > +static inline bool arm_is_secure(CPUARMState *env)
> > +{
> > +#if !defined(CONFIG_USER_ONLY)
> > +    if (arm_feature(env, ARM_FEATURE_SECURITY_EXTENSIONS)) {
>
> I think feature test can be safely avoided here. Without this feature
> that should be no way to switch to monitor mode and to access SCR register.
>

I agree with the feature check here.  For correctness, we should only be
examining c1_scr if the security extension is enabled.   This is consistent
with only registering the SCR register if the feature is enabled.


> > +        return ((env->uncached_cpsr & CPSR_M) == ARM_CPU_MODE_MON) ||
> > +                !(env->cp15.c1_scr & 1);
> > +    } else {
> > +        return false;
> > +    }
> > +#else
> > +    return false;
>
> That is a good question how to treat user emulation: secure or
> non-secure. Perhaps assuming user emulation in secure state may simplify
> code in the following patches.


> > +#endif
> > +}
> > +
> >  /* Return true if the specified exception level is running in AArch64
> state. */
> >  static inline bool arm_el_is_aa64(CPUARMState *env, int el)
> >  {
>
> Thanks,
> Sergey.
>
>

Reply via email to