diff options
author | Sandrine Bailleux <sandrine.bailleux@arm.com> | 2018-05-09 14:45:34 +0200 |
---|---|---|
committer | Sandrine Bailleux <sandrine.bailleux@arm.com> | 2018-05-15 09:59:44 +0200 |
commit | 398489452fe50118521be845a55ce3b8773cd13d (patch) | |
tree | 401f696b2a73a406141faf2057ad1f869e250aca /drivers | |
parent | 885ca54a75e14a63c375b5d12852dc7ef2c0b568 (diff) | |
download | platform_external_arm-trusted-firmware-398489452fe50118521be845a55ce3b8773cd13d.tar.gz platform_external_arm-trusted-firmware-398489452fe50118521be845a55ce3b8773cd13d.tar.bz2 platform_external_arm-trusted-firmware-398489452fe50118521be845a55ce3b8773cd13d.zip |
SPM: Do not trap S-EL0 access to SVE/SIMD/FP regs
This allows secure partitions to access these registers. This is
needed in some cases. For example, it has been reported that in order
to implement secure storage services, a secure partition needs to
encrypt/decrypt some authentication variables, which requires FP/SIMD
support.
Note that SPM will not do any saving/restoring of these registers on
behalf of the SP. This falls under the SP's responsibility.
Also note that if the SP gets preempted, it might not get a chance to
save/restore FP/SIMD registers first. This patch does not address this
problem. It only serves as a temporary solution to unblock development
on the secure partition side.
Change-Id: I3b8ccdebdac0219f6ac96ad66ab2be0be8374ad3
Signed-off-by: Sandrine Bailleux <sandrine.bailleux@arm.com>
Diffstat (limited to 'drivers')
0 files changed, 0 insertions, 0 deletions