• Home
  • Raw
  • Download

Lines Matching refs:EL0

16 resides at EL3 and management services run from isolated Secure Partitions at S-EL0.
51 S-EL0 that can be used to implement simple management and security services.
52 Since S-EL0 is an unprivileged Exception Level, a Secure Partition relies on
67 services in EL3 and instantiate the rest in a partition in S-EL0.
126 SPM bootflow, a Secure Partition image executing at S-EL0 replaces the Secure
240 S-EL0, the SPM should define the following types of interfaces:
242 - Interfaces that enable access to privileged operations from S-EL0. These
251 Secure Partition to initialise itself and export its services in S-EL0. These
259 depending on the implemented Exception levels. In S-EL0, the Supervisor Call
268 SMC request, Trusted Firmware-A returns control directly to S-EL0 through an
284 instruction (ERET) to S-EL0. Later, the Secure Partition issues an SVC
296 An ERET instruction is used by TF-A to return to S-EL0 with the result of the
385 enable initialisation of a service in S-EL0. The responsibilities of the SPM are
401 At cold boot, system registers accessible from S-EL0 will be in their reset
403 architectural setup to enable execution in S-EL0
429 S-EL0 or S-EL1.
434 System registers that influence software execution in S-EL0 are setup by the SPM
460 - ``CurrentEL=0`` (EL0)
468 This transition into S-EL0 is special since it is not in response to a previous
469 request through a SVC instruction. This is the first entry into S-EL0. The
490 - ``X0``: Virtual address of a buffer shared between EL3 and S-EL0. The
606 A Secure Partition executes at S-EL0, which is an unprivileged Exception Level.
647 Request the permission attributes of a memory region from S-EL0.
699 This function is used to request the permission attributes for S-EL0 on a
720 Set the permission attributes of a memory region from S-EL0.
788 This function is used to change the permission attributes for S-EL0 on a