Peter Maydell <peter.mayd...@linaro.org> writes:

> Fix a TODO in bp_wp_matches() now that we have a function for
> testing whether the CPU is currently in Secure mode or not.
>
> Signed-off-by: Peter Maydell <peter.mayd...@linaro.org>
> Reviewed-by: Edgar E. Iglesias <edgar.igles...@xilinx.com>

Reviewed-by: Alex Bennée <alex.ben...@linaro.org>

> ---
>  target-arm/op_helper.c | 6 ++++--
>  1 file changed, 4 insertions(+), 2 deletions(-)
>
> diff --git a/target-arm/op_helper.c b/target-arm/op_helper.c
> index 4a8c4e0..3df9c57 100644
> --- a/target-arm/op_helper.c
> +++ b/target-arm/op_helper.c
> @@ -600,8 +600,10 @@ static bool bp_wp_matches(ARMCPU *cpu, int n, bool is_wp)
>      CPUARMState *env = &cpu->env;
>      uint64_t cr;
>      int pac, hmc, ssc, wt, lbn;
> -    /* TODO: check against CPU security state when we implement TrustZone */
> -    bool is_secure = false;
> +    /* Note that for watchpoints the check is against the CPU security
> +     * state, not the S/NS attribute on the offending data access.
> +     */
> +    bool is_secure = arm_is_secure(env);
>      int access_el = arm_current_el(env);
>  
>      if (is_wp) {

-- 
Alex Bennée

Reply via email to