Home
last modified time | relevance | path

Searched refs:EL1 (Results 1 – 25 of 36) sorted by relevance

12

/tf-a-ffa_el3_spmc/docs/design/
A Dinterrupt-framework-design.rst37 context. It is always handled in Secure-EL1.
40 Secure-EL1, Non-secure EL1 or EL2 depending upon the security state of the
95 Secure-EL1 interrupts
104 handover the interrupt to Secure-EL1 for handling.
211 handled in Secure-EL1. They can be delivered to Secure-EL1 via EL3 but they
292 which runs only in Secure-EL1.
527 Secure payload IHF design w.r.t secure-EL1 interrupts
531 triggered at one of the Secure-EL1 FIQ exception vectors. The Secure-EL1
551 Secure-EL1 IHF should then handle all Secure-EL1 interrupt through the
558 triggered at one of the Secure-EL1 IRQ exception vectors . The Secure-EL1
[all …]
A Dfirmware-design.rst49 - Boot Loader stage 3-2 (BL32) *Secure-EL1 Payload* (optional)
267 disable AArch32 Secure self-hosted privileged debug from S-EL1.
428 AArch64 BL32 (Secure-EL1 Payload) image load
593 AArch64 BL32 (Secure-EL1 Payload) image initialization
858 #. Secure-EL1 Payload Dispatcher service
860 If a system runs a Trusted OS or other Secure-EL1 Payload (SP) then
862 context between the normal world (EL1/EL2) and trusted world (Secure-EL1).
1070 Secure-EL1 Payloads and Dispatchers
1081 the *Secure-EL1 Payload* - as it is not always a Trusted OS.
1083 TF-A provides a Test Secure-EL1 Payload (TSP) and a Test Secure-EL1 Payload
[all …]
/tf-a-ffa_el3_spmc/docs/security_advisories/
A Dsecurity-advisory-tfv-3.rst5 | Title | RO memory is always executable at AArch64 Secure EL1 |
15 | Affected | executing at AArch64 Secure EL1 |
34 This feature does not work correctly for AArch64 images executing at Secure EL1.
58 determine whether a region is executable. The Secure EL1&0 translation regime
61 in the Secure EL1&0 regime. As a result, this programs the Secure EL0 execution
62 permissions but always leaves the memory as executable at Secure EL1.
A Dsecurity-advisory-tfv-2.rst43 meaning that debug exceptions from Secure EL1 are enabled by the authentication
44 interface. Therefore this issue only exists for AArch32 Secure EL1 code when
50 from AArch32 Secure EL1.
A Dsecurity-advisory-tfv-6.rst53 Secure-EL1 and executing the ``BPIALL`` instruction. This workaround is
75 disable/enable" and "BPIALL at AArch32 Secure-EL1" workarounds described above.
80 at invalidating the branch predictor on Cortex-A57, the drop into Secure-EL1
97 | ``PSCI_VERSION`` with "BPIALL at AArch32 Secure-EL1" | 1276 |
99 | ``SMCCC_ARCH_WORKAROUND_1`` with "BPIALL at AArch32 Secure-EL1" | 770 |
131 translation regime, for example between EL0 and EL1, therefore this variant
A Dsecurity-advisory-tfv-5.rst39 transitioning to S-EL1.
50 NOTE: The original pull request referenced above only fixed the issue for S-EL1
A Dsecurity-advisory-tfv-8.rst65 software must trap SMC calls from EL1 software to ensure secure behaviour.
/tf-a-ffa_el3_spmc/docs/components/spd/
A Doptee-dispatcher.rst4 `OP-TEE OS`_ is a Trusted OS running as Secure EL1.
A Dtlk-dispatcher.rst20 TLK is a Trusted OS running as Secure EL1. It is a Free Open Source Software
/tf-a-ffa_el3_spmc/docs/components/
A Dsecure-partition-manager.rst77 resides at EL3 and S-EL2 (or EL3 and S-EL1).
103 NWd (Hypervisor or OS kernel) to SPMC located either at S-EL1 or S-EL2.
108 extension. The SPMD relays the FF-A protocol from EL3 to S-EL1.
130 SPMC located at S-EL1 or S-EL2:
136 level to being S-EL1 or S-EL2. It defaults to enabled (value 1) when
152 | SPMC at S-EL1 | 0 | 0 |
177 Sample TF-A build command line when SPMC is located at S-EL1
499 load time (or EL1&0 Stage-1 for an S-EL1 SPMC). A memory region node can
503 EL1&0 Stage-1 for an S-EL1 SPMC) as peripherals and possibly allocate
514 non-secure EL1&0 Stage-2 table if it exists.
[all …]
A Dsecure-partition-manager-mm.rst43 privileged Exception Level (i.e. EL3 or S-EL1) makes security auditing of
127 Payload image executing at S-EL1 (e.g. a Trusted OS). Both are referred to as
265 A SVC causes an exception to be taken to S-EL1. TF-A assumes ownership of S-EL1
301 the Secure EL1&0 translation regime).
410 description and initialises the Secure EL1&0 translation regime as follows.
429 S-EL0 or S-EL1.
609 the Secure EL1&0 Translation regime with appropriate memory attributes.
701 region is equal to the Translation Granule size used in the Secure EL1&0
707 The caller must obtain the Translation Granule Size of the Secure EL1&0
733 of the Translation Granule Size used in the Secure EL1&0 translation
[all …]
A Dplatform-interrupt-controller-API.rst153 Secure EL1 interrupts.
156 for Secure EL1 interrupts.
173 - ``INTR_TYPE_S_EL1``: interrupt is meant to be consumed by Secure EL1.
A Dexception-handling.rst147 - On GICv3 systems, when executing in S-EL1, pending Non-secure interrupts of
149 EL3. As a result, S-EL1 software cannot expect to handle Non-secure
150 interrupts at S-EL1. Essentially, this deprecates the routing mode described
153 In order for S-EL1 software to handle Non-secure interrupts while having
156 handled over to S-EL1.
489 to be taken to S-EL1 [#irq]_, so would get a chance to populate the designated
500 .. [#irq] In case of GICv2, Non-secure interrupts while in S-EL1 were signalled
A Dffa-manifest-binding.rst65 - 0x0: EL1
121 scheduler. If so, run-time EL must be EL1.
A Dxlat-tables-lib-v2-design.rst74 the EL1&0 translation regime, the attributes also specify whether the region is
75 a User region (EL0) or Privileged region (EL1). See the ``MT_xxx`` definitions
76 in ``xlat_tables_v2.h``. Note that for the EL1&0 translation regime the Execute
77 Never attribute is set simultaneously for both EL1 and EL0.
111 create translation tables pertaining to the S-EL1&0 translation regime.
A Ddebugfs-design.rst115 - a Linux kernel driver running at NS-EL1
/tf-a-ffa_el3_spmc/plat/arm/board/fvp/fdts/
A Doptee_sp_manifest.dts22 exception-level = <2>; /* S-EL1 */
/tf-a-ffa_el3_spmc/services/std_svc/spm/spmc/
A Dspmc.h56 EL1, enumerator
/tf-a-ffa_el3_spmc/
A DPROTOTYPE_README15 Partition running in S-EL1 and a logical partition running in EL3 alongside the SPMC on
132 normal world, trusted firmware and S-EL1 TSP each on terminals 0, 1 & 2 respectively.
198 INFO: S-EL1 SP context on core0 is in 1 state
199 INFO: S-EL1 SP context on core0 is in 0 state
275 S-EL1 SP Output:
/tf-a-ffa_el3_spmc/docs/perf/
A Dperformance-monitoring-unit.rst79 - If set to ``0``, will increment the associated ``PMEVCNTR<n>`` at EL1.
85 Non-secure EL1.
/tf-a-ffa_el3_spmc/docs/getting_started/
A Drt-svc-writers-guide.rst282 The PSCI and Test Secure-EL1 Payload Dispatcher services do not follow
302 Secure-EL1 Payload Dispatcher service (SPD)
306 or other Secure-EL1 Payload are special. These services need to manage the
307 Secure-EL1 context, provide the *Secure Monitor* functionality of switching
308 between the normal and secure worlds, deliver SMC Calls through to Secure-EL1
309 and generally manage the Secure-EL1 Payload through CPU power-state transitions.
A Dimage-terminology.rst65 Secure-EL1 Payload (SP): ``AP_BL32``
69 normal world. However, it may refer to a more abstract Secure-EL1 Payload (SP).
71 single or primary image executing at Secure-EL1. In systems where there are
/tf-a-ffa_el3_spmc/docs/about/
A Dfeatures.rst40 - Secure Monitor library code such as world switching, EL1 context management
42 When a Secure-EL1 Payload (SP) is present, for example a Secure OS, the
/tf-a-ffa_el3_spmc/docs/process/
A Dsecurity.rst54 | |TFV-3| | RO memory is always executable at AArch64 Secure EL1 |
A Dsecurity-hardening.rst68 at Secure EL1, Secure EL2 (if implemented) and EL3.

Completed in 37 milliseconds

12