diff options
author | davidcunado-arm <david.cunado@arm.com> | 2017-05-02 16:32:20 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-05-02 16:32:20 +0100 |
commit | 4b427bd48778a7af9f1bb639a33c8d25e758a245 (patch) | |
tree | fcb3564316d6bfd1649a655c59d98b039a59a5d9 /bl32 | |
parent | 062dd378280a6a1b9ace59d0be9c466a05a2de95 (diff) | |
parent | 16292f54811f27bb7de28512cda74db83686cb63 (diff) | |
download | platform_external_arm-trusted-firmware-4b427bd48778a7af9f1bb639a33c8d25e758a245.tar.gz platform_external_arm-trusted-firmware-4b427bd48778a7af9f1bb639a33c8d25e758a245.tar.bz2 platform_external_arm-trusted-firmware-4b427bd48778a7af9f1bb639a33c8d25e758a245.zip |
Merge pull request #919 from davidcunado-arm/dc/smc_yielding_generic
Update terminology: standard SMC to yielding SMC
Diffstat (limited to 'bl32')
-rw-r--r-- | bl32/tsp/aarch64/tsp_entrypoint.S | 16 | ||||
-rw-r--r-- | bl32/tsp/tsp_main.c | 6 |
2 files changed, 11 insertions, 11 deletions
diff --git a/bl32/tsp/aarch64/tsp_entrypoint.S b/bl32/tsp/aarch64/tsp_entrypoint.S index 3f2813946..834dedbed 100644 --- a/bl32/tsp/aarch64/tsp_entrypoint.S +++ b/bl32/tsp/aarch64/tsp_entrypoint.S @@ -180,7 +180,7 @@ endfunc tsp_entrypoint * ------------------------------------------- */ func tsp_vector_table - b tsp_std_smc_entry + b tsp_yield_smc_entry b tsp_fast_smc_entry b tsp_cpu_on_entry b tsp_cpu_off_entry @@ -189,7 +189,7 @@ func tsp_vector_table b tsp_sel1_intr_entry b tsp_system_off_entry b tsp_system_reset_entry - b tsp_abort_std_smc_entry + b tsp_abort_yield_smc_entry endfunc tsp_vector_table /*--------------------------------------------- @@ -437,12 +437,12 @@ endfunc tsp_fast_smc_entry /*--------------------------------------------- * This entrypoint is used by the TSPD to ask - * the TSP to service a std smc request. + * the TSP to service a Yielding SMC request. * We will enable preemption during execution * of tsp_smc_handler. * --------------------------------------------- */ -func tsp_std_smc_entry +func tsp_yield_smc_entry msr daifclr, #DAIF_FIQ_BIT | DAIF_IRQ_BIT bl tsp_smc_handler msr daifset, #DAIF_FIQ_BIT | DAIF_IRQ_BIT @@ -450,15 +450,15 @@ func tsp_std_smc_entry /* Should never reach here */ no_ret plat_panic_handler -endfunc tsp_std_smc_entry +endfunc tsp_yield_smc_entry /*--------------------------------------------------------------------- - * This entrypoint is used by the TSPD to abort a pre-empted Standard + * This entrypoint is used by the TSPD to abort a pre-empted Yielding * SMC. It could be on behalf of non-secure world or because a CPU * suspend/CPU off request needs to abort the preempted SMC. * -------------------------------------------------------------------- */ -func tsp_abort_std_smc_entry +func tsp_abort_yield_smc_entry /* * Exceptions masking is already done by the TSPD when entering this @@ -477,4 +477,4 @@ func tsp_abort_std_smc_entry /* Should never reach here */ bl plat_panic_handler -endfunc tsp_abort_std_smc_entry +endfunc tsp_abort_yield_smc_entry diff --git a/bl32/tsp/tsp_main.c b/bl32/tsp/tsp_main.c index 2b3653208..b4010f361 100644 --- a/bl32/tsp/tsp_main.c +++ b/bl32/tsp/tsp_main.c @@ -1,5 +1,5 @@ /* - * Copyright (c) 2013-2016, ARM Limited and Contributors. All rights reserved. + * Copyright (c) 2013-2017, ARM Limited and Contributors. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: @@ -372,7 +372,7 @@ tsp_args_t *tsp_smc_handler(uint64_t func, tsp_stats[linear_id].eret_count++; INFO("TSP: cpu 0x%lx received %s smc 0x%lx\n", read_mpidr(), - ((func >> 31) & 1) == 1 ? "fast" : "standard", + ((func >> 31) & 1) == 1 ? "fast" : "yielding", func); INFO("TSP: cpu 0x%lx: %d smcs, %d erets\n", read_mpidr(), tsp_stats[linear_id].smc_count, @@ -418,7 +418,7 @@ tsp_args_t *tsp_smc_handler(uint64_t func, /******************************************************************************* * TSP smc abort handler. This function is called when aborting a preemtped - * standard SMC request. It should cleanup all resources owned by the SMC + * yielding SMC request. It should cleanup all resources owned by the SMC * handler such as locks or dynamically allocated memory so following SMC * request are executed in a clean environment. ******************************************************************************/ |