diff options
author | Andre Przywara <andre.przywara@arm.com> | 2023-02-03 15:30:14 +0000 |
---|---|---|
committer | Andre Przywara <andre.przywara@arm.com> | 2023-03-20 13:37:36 +0000 |
commit | 90118bb5c180198db3386c3e1f5be8e32707c2cc (patch) | |
tree | 5006ebf35c6b8dcae4db5314ba264ea5cdbd2c44 /lib | |
parent | 16e3ddba1f049106387dfe21989243d2fc4cf061 (diff) |
refactor(cpufeat): rename ENABLE_SPE_FOR_LOWER_ELS to ENABLE_SPE_FOR_NS
At the moment we hardcode the SPE functionality to be available on the
non-secure side only, by setting MDCR_EL2.E2PB accordingly.
This should be reflected in the feature selection symbol, so rename that
to ENABLE_SPE_FOR_NS, to make it clearer that SPE is not supported in
the secure world.
Change-Id: I3f9b48eab1a45d6ccfcbb9c90a11eeb66867ad9a
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
Diffstat (limited to 'lib')
-rw-r--r-- | lib/el3_runtime/aarch64/context_mgmt.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/el3_runtime/aarch64/context_mgmt.c b/lib/el3_runtime/aarch64/context_mgmt.c index e1c671d8b..50fddc502 100644 --- a/lib/el3_runtime/aarch64/context_mgmt.c +++ b/lib/el3_runtime/aarch64/context_mgmt.c @@ -482,7 +482,7 @@ void cm_setup_context(cpu_context_t *ctx, const entry_point_info_t *ep) static void manage_extensions_nonsecure(bool el2_unused, cpu_context_t *ctx) { #if IMAGE_BL31 -#if ENABLE_SPE_FOR_LOWER_ELS +#if ENABLE_SPE_FOR_NS spe_enable(el2_unused); #endif |