Home
last modified time | relevance | path

Searched refs:EL2 (Results 1 – 25 of 31) sorted by relevance

12

/external/arm-trusted-firmware/docs/resources/diagrams/plantuml/
Dsdei_general.puml10 participant "SDEI client" as EL2
14 activate EL2
15 EL2->EL3: **SDEI_INTERRUPT_BIND**(irq)
16 EL3->EL2: event number: ev
17 EL2->EL3: **SDEI_EVENT_REGISTER**(ev, handler, ...)
18 EL3->EL2: success
19 EL2->EL3: **SDEI_EVENT_ENABLE**(ev)
20 EL3->EL2: success
21 EL2->EL3: **SDEI_PE_UNMASK**()
22 EL3->EL2: 1
[all …]
Dsdei_explicit_dispatch.puml10 participant "SDEI client" as EL2
15 activate EL2
16 EL2->EL3: **SDEI_EVENT_REGISTER**(ev, handler, ...)
17 EL3->EL2: success
18 EL2->EL3: **SDEI_EVENT_ENABLE**(ev)
19 EL3->EL2: success
20 EL2->EL3: **SDEI_PE_UNMASK**()
21 EL3->EL2: 1
36 SDEI->EL2: dispatch
37 activate EL2 #salmon
[all …]
/external/arm-trusted-firmware/docs/perf/
Dperformance-monitoring-unit.rst91 - If set to ``1``, will increment the associated ``PMEVCNTR<n>`` at EL2.
92 - Reserved if EL2 not implemented.
98 at Secure EL2.
99 - Reserved if Secure EL2 not implemented.
135 counting (by ``PMEVCNTR<n>``) is prohibited (e.g. EL2 and the Secure
/external/arm-trusted-firmware/docs/plat/
Drpi4.rst8 This port is a minimal port to support loading non-secure EL2 payloads such
30 "kernel", as BL31 will drop into AArch64/EL2 to the respective load address.
48 see some text from BL31, followed by the output of the EL2 payload.
81 the EL2 payload needs to be a Linux kernel, a bootloader or any other kernel
Drpi3.rst35 SD card, it will load it and execute in EL2 in AArch64. Basically, it executes
54 in AArch32. This means that BL33 can't be in EL2 in AArch64 mode. The
56 is used for EL2. When using a AArch64 kernel, it should simply start in EL2.
152 level. If BL33 was running in EL2 in AArch64 (as in the default bootflow of
205 By default this option is 0, which means that TF-A will jump to BL33 in EL2
/external/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-8.rst64 multiple normal world SMC clients lies with EL2 software. When present, EL2
71 and are therefore unaffected by this issue. Other EL2 software should be audited
74 EL2 software might find mitigating this threat somewhat onerous, because for all
/external/OpenCSD/decoder/tests/snapshots/a57_single_step/pkt_proc_logs/
Dtrc_pkt_lister_a57ss-2.ppl21 …0 0x00 0x00 0x00 0x00 0x00 0x00 ]; I_CTXT : Context Packet.; Ctxt: AArch64,EL2, NS; CID=0x00000000…
29 …0 0x00 0x00 0x00 0x00 0x00 0x00 ]; I_CTXT : Context Packet.; Ctxt: AArch64,EL2, NS; CID=0x00000000…
Dtrc_pkt_lister_a57ss-1.ppl21 …0 0x00 0x00 0x00 0x00 0x00 0x00 ]; I_CTXT : Context Packet.; Ctxt: AArch64,EL2, NS; CID=0x00000000…
29 …0 0x00 0x00 0x00 0x00 0x00 0x00 ]; I_CTXT : Context Packet.; Ctxt: AArch64,EL2, NS; CID=0x00000000…
/external/arm-trusted-firmware/docs/components/
Dsecure-partition-manager.rst69 resides at EL3 and S-EL2 (or EL3 and S-EL1).
73 used as a reference code base for an S-EL2 secure firmware on
79 - Hypervisor refers to the NS-EL2 component managing Virtual Machines (or
81 - SPMC refers to the S-EL2 component managing Virtual Machines (or Secure
94 kernel) to SPMC located either at S-EL1 or S-EL2.
100 - S-EL2 supporting platforms implementing Armv8.4-SecEL2 extension.
101 SPMD conveys FF-A protocol from EL3 to S-EL2.
123 level to being S-EL1 or S-EL2. It defaults to enabled (value 1) when
126 restoring) the EL2 system register context before entering (resp.
141 | SPMC at S-EL2 (e.g. Hafnium) | 1 | 1 (default when |
[all …]
Dsdei.rst26 at EL2 and an event dispatch resulting from the triggering of a bound interrupt.
41 original EL2 execution [13]. Note that the SDEI interrupt remains active until
200 - EL2, if EL2 is implemented. The Hypervisor is expected to implement a
204 - Non-secure EL1, if EL2 is not implemented or disabled.
Darm-sip-service.rst36 Exception Level (either EL2, or NS EL1 if EL2 isn't implemented) to request to
Ddebugfs-design.rst114 - a test payload, bootloader or hypervisor running at NS-EL2
/external/llvm-project/polly/test/Isl/CodeGen/
Dsimple_vec_stride_x.ll67 ; CHECK: [[EL2:%[a-zA-Z0-9_]+]] = extractelement <4 x float> [[VEC4]], i32 1
68 ; CHECK: store float [[EL2]]
/external/llvm-project/lldb/source/Plugins/Instruction/ARM64/
DEmulateInstructionARM64.h92 enum ExceptionLevel { EL0 = 0, EL1 = 1, EL2 = 2, EL3 = 3 }; enumerator
DEmulateInstructionARM64.cpp500 when EL2 in BranchTo()
/external/arm-trusted-firmware/docs/process/
Dsecurity-hardening.rst68 at Secure EL1, Secure EL2 (if implemented) and EL3.
/external/OpenCSD/decoder/tests/snapshots/a55-test-tpiu/
Ddevice1.ini448 space=EL2
/external/OpenCSD/decoder/tests/snapshots/a57_single_step/
Ddevice1.ini448 space=EL2
/external/tensorflow/tensorflow/compiler/mlir/hlo/tests/
Dhlo-legalize-to-lhlo.mlir170 // CHECK: %[[EL2:.*]] = tensor.extract %[[SHAPE]]{{\[}}%[[C2]]] : tensor<3xi64>
171 // CHECK: %[[SIZE_2:.*]] = index_cast %[[EL2]] : i64 to index
/external/arm-trusted-firmware/docs/
Dchange-log.rst26 register accesses from EL1/EL2 to EL3
97 virtualization in EL2 context switches if the architecture supports it
200 top of Hafnium in S-EL2
443 routine in EL2
571 - Build option to support EL2 context save and restore in the secure world
576 be done as part of future S-EL2/SPM development.
595 or S-EL2 (SPMD_SPM_AT_SEL2).
650 - el3_runtime: Add support for enabling S-EL2
943 - socionext: uniphier: Run BL33 at EL2, call uniphier_scp_is_running() only
1639 - Enabled MPAM EL2 traps (``MPAMHCR_EL2`` and ``MPAM_EL2``)
[all …]
/external/arm-trusted-firmware/docs/getting_started/
Dbuild-options.rst161 operations when entering/exiting an EL2 execution context. This is of primary
171 Armv8.4-NV registers to be saved/restored when entering/exiting an EL2
593 component runs at the S-EL2 execution state provided by the Armv8.4-SecEL2
743 If this option is enabled for the EL3 software then EL2 software also must
/external/arm-trusted-firmware/docs/design/
Dfirmware-design.rst212 SYS_LED[2:1] - Exception Level (EL3=0x3, EL2=0x2, EL1=0x1, EL0=0x0)
252 - ``CPTR_EL3``. Accesses to the ``CPACR_EL1`` register from EL1 or EL2, or the
253 ``CPTR_EL2`` register from EL2 are configured to not trap to EL3 by
609 EL3 Runtime Software initializes the EL2 or EL1 processor context for normal-
613 at the highest available Exception Level (EL2 if available, otherwise EL1).
862 context between the normal world (EL1/EL2) and trusted world (Secure-EL1).
1093 communication with the normal-world software running in EL1/EL2. Communication
1152 will exit to EL2 and run BL33.
1175 reports the general purpose, EL3, Secure EL1 and some EL2 state registers.
Dinterrupt-framework-design.rst40 Secure-EL1, Non-secure EL1 or EL2 depending upon the security state of the
42 or EL2.
578 non-secure state (EL1/EL2) and are not visible to the SP. This routing
/external/OpenCSD/
DREADME.md199 - __Update__: Memaccess: Add EL2 secure memory space flag.
/external/arm-trusted-firmware/
DMakefile510 $(error SPMD with SPM at S-EL2 requires CTX_INCLUDE_EL2_REGS option)

12