1/* 2 * Copyright (c) 2018 Metempsy Technology Consulting 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions are 7 * met: redistributions of source code must retain the above copyright 8 * notice, this list of conditions and the following disclaimer; --- 564 unchanged lines hidden (view full) --- 573 } 574 } 575 576 return; 577 } else if (GICD_ICENABLER.contains(addr)) { 578 // Interrupt Clear-Enable Registers 579 int first_intid = (addr - GICD_ICENABLER.start()) * 8; 580 |
581 if (isNotSPI(first_intid)) { 582 return; 583 } 584 |
585 for (int i = 0, int_id = first_intid; i < 8 * size && int_id < itLines; 586 i++, int_id++) { 587 588 if (nsAccessToSecInt(int_id, is_secure_access)) 589 { 590 continue; 591 } 592 --- 559 unchanged lines hidden --- |