Yes, sorry about that. Best, Fabian
> On 15.05.2014, at 20:58, "Sergey Fedorov" <serge.f...@gmail.com> wrote: > > Can s.fedo...@samsung.com be removed from CC list since this mailbox has > been deleted? That was my address when I worked for Samsung. Now sending > to this address results with annoying delivery failure notification. > > Thanks, > Sergey. > > 13.05.2014 20:15, Fabian Aggeler wrote: >> Hi, >> >> This is a rework of the Samsung patches sent last year to add Security >> Extensions. The patches have been changed based on the discussion on >> the mailing list. Other changes became necessary because of Aarch64 >> support which got added in the meantime. This patchset makes it possible >> to run a kernel in the secure world and then switch to non-secure >> on CPUs that implement Security Extensions. It works for EL3 in Aarch32 >> state, but may add _EL3 registers where necessary to reflect the mapping >> of secure instances of cp registers to _EL3 registers. >> >> Banking of cp registers has been changed from active mass-swapping to >> the mechanism discussed on the mailing list, where every Aarch32 cp >> register goes into the hashtable twice. A ns-bit is added to the key >> of the register which is used when accessing a cp register to get the >> correct instance. >> >> Magic numbers have been changed to bitshifted constants or macros to make >> the code easier to read. >> >> The whole patchset now uses the term Security Extensions instead of >> TrustZone as this is the term which is used in the ARM ARM. >> >> I am happy for any feedback, especially for the banking of course. It should >> not be too hard to combine these changes with the recent effort towards EL3 >> in A64. >> >> Thanks, >> Fabian >> >> Fabian Aggeler (12): >> target-arm: add arm_is_secure() function >> target-arm: add NSACR support >> target-arm: Split TLB for secure state and EL3 in Aarch64 >> target-arm: add banked coprocessor register type and macros >> target-arm: Restrict EL3 to Aarch32 state >> target-arm: Use arm_current_sctlr to access SCTLR >> target-arm: Use raw_write/raw_read whenever possible >> target-arm: Convert banked coprocessor registers >> target-arm: maintain common bits of banked CP registers >> target-arm: add MVBAR support >> target-arm: implement IRQ/FIQ routing to Monitor mode >> target-arm: Respect SCR.FW, SCR.AW and SCTLR.NMFI >> >> Sergey Fedorov (8): >> target-arm: move SCR into Security Extensions register list >> target-arm: adjust TTBCR for Security Extension feature >> target-arm: reject switching to monitor mode from non-secure state >> target-arm: adjust arm_current_pl() for Security Extensions >> target-arm: add non-secure Translation Block flag >> target-arm: implement CPACR register logic >> target-arm: add SDER definition >> target-arm: implement SMC instruction >> >> Svetlana Fedoseeva (3): >> target-arm: add new CPU feature for Security Extensions >> target-arm: preserve RAO/WI bits of ARMv7 SCTLR >> target-arm: add CPU Monitor mode >> >> hw/arm/pxa2xx.c | 2 +- >> linux-user/main.c | 2 +- >> target-arm/cpu-qom.h | 1 + >> target-arm/cpu.c | 8 +- >> target-arm/cpu.h | 271 ++++++++++++++++++++++--- >> target-arm/helper-a64.c | 3 +- >> target-arm/helper.c | 489 >> ++++++++++++++++++++++++++++++++++++--------- >> target-arm/machine.c | 6 +- >> target-arm/op_helper.c | 2 +- >> target-arm/translate-a64.c | 9 +- >> target-arm/translate.c | 342 ++++++++++++++++++------------- >> target-arm/translate.h | 4 + >> 12 files changed, 866 insertions(+), 273 deletions(-) >