Lines Matching refs:EL1

56 -  Boot Loader stage 3-2 (BL32) *Secure-EL1 Payload* (optional)
222 SYS_LED[2:1] - Exception Level (EL3=0x3, EL2=0x2, EL1=0x1, EL0=0x0)
262 - ``CPTR_EL3``. Accesses to the ``CPACR_EL1`` register from EL1 or EL2, or the
277 disable AArch32 Secure self-hosted privileged debug from S-EL1.
366 #. BL1 passes control to the BL2 image at Secure EL1 (for AArch64) or at
372 BL1 loads and passes control to BL2 at Secure-EL1 (for AArch64) or at Secure
381 for subsequent stages of TF-A and normal world software. EL1 and EL0 are given
438 AArch64 BL32 (Secure-EL1 Payload) image load
447 Secure-EL1 Payload Dispatcher (see later) within BL31, which is responsible for
484 as its only purpose is to ensure TF-A BL2 is entered at S-EL1. To avoid
603 AArch64 BL32 (Secure-EL1 Payload) image initialization
606 If a BL32 image is present then there must be a matching Secure-EL1 Payload
619 EL3 Runtime Software initializes the EL2 or EL1 processor context for normal-
623 at the highest available Exception Level (EL2 if available, otherwise EL1).
868 #. Secure-EL1 Payload Dispatcher service
870 If a system runs a Trusted OS or other Secure-EL1 Payload (SP) then
871 it also requires a *Secure Monitor* at EL3 to switch the EL1 processor
872 context between the normal world (EL1/EL2) and trusted world (Secure-EL1).
877 The interface between the EL3 Runtime Software and the Secure-EL1 Payload is
879 Secure-EL1 Payload requires a specific Secure Monitor that runs as a runtime
880 service - within TF-A this service is referred to as the Secure-EL1 Payload
883 TF-A provides a Test Secure-EL1 Payload (TSP) and its associated Dispatcher
1081 Secure-EL1 Payloads and Dispatchers
1084 On a production system that includes a Trusted OS running in Secure-EL1/EL0,
1091 TF-A uses a more general term for the BL32 software that runs at Secure-EL1 -
1092 the *Secure-EL1 Payload* - as it is not always a Trusted OS.
1094 TF-A provides a Test Secure-EL1 Payload (TSP) and a Test Secure-EL1 Payload
1103 The TSP runs in Secure-EL1. It is designed to demonstrate synchronous
1104 communication with the normal-world software running in EL1/EL2. Communication
1123 The Secure-EL1 Payload Dispatcher (SPD) service is responsible for initializing
1154 Secure-EL1. BL31 will exit to BL32 using the asynchronous method by
1157 When the BL32 has completed initialization at Secure-EL1, it returns to
1167 invoke a 'world-switch synchronous call' to Secure-EL1 to run the BL32
1186 reports the general purpose, EL3, Secure EL1 and some EL2 state registers.