RISC-V VeeR EL2 Programmer’s Reference Manual¶
- 1. RISC-V VeeR EL2 Programmer’s Reference Manual
- 2. Core Overview
- 3. Memory Map
- 3.1. Address Regions
- 3.2. Access Properties
- 3.3. Memory Types
- 3.4. Memory Type Access Properties
- 3.5. Memory Access Ordering
- 3.6. Memory Protection
- 3.7. Exception Handling
- 3.8. Control/Status Registers
- 3.9. Memory Address Map
- 3.10. Behavior of Loads to Side-Effect Addresses
- 3.11. Partial Writes
- 3.12. Expected SoC Behavior for Accesses
- 3.13. Speculative Bus Accesses
- 3.14. DMA Slave Port
- 3.15. Reset Signal and Vector
- 3.16. Non-Maskable Interrupt (NMI) Signal and Vector
- 3.17. Software Interrupts
- 4. Memory Error Protection
- 5. Internal Timers
- 6. Power Management and Multi-Core Debug Control
- 7. External Interrupts
- 7.1. Features
- 7.2. Naming Convention
- 7.3. Overview of Major Functional Units
- 7.4. PIC Block Diagram
- 7.5. Theory Of Operation
- 7.6. Support for Vectored External Interrupts
- 7.7. Interrupt Chaining
- 7.8. Interrupt Nesting
- 7.9. Power Reduction
- 7.10. Performance Targets
- 7.11. Configurability
- 7.12. PIC Control/Status Registers
- 7.13. PIC CSR Address Map
- 7.14. PIC Memory-Mapped Register Address Map
- 7.15. Interrupt Enable/Disable Code Samples
- 8. Performance Monitoring
- 9. Cache Control
- 10. Debug Support
- 11. Low-Level Core Control
- 12. Standard RISC-V CSRs with Core-Specific Adaptations
- 13. CSR Address Map
- 14. Interrupt Priorities
- 15. Clock And Reset
- 16. Complex Port List
- 17. Build Arguments
- 18. Compliance Test Suite Failures
- 19. Errata
- 20. Physical Memory Protection
- 21. User Mode
- 21.1. Machine ISA Register (misa)
- 21.2. Machine Status Register (mstatus)
- 21.3. Machine Environment Configuration Registers (menvcfg,menvcfgh)
- 21.4. User Mode Performance Counters (cycle, cycleh, instret, instreth)
- 21.5. Machine Counter-Enable Register (mcounteren)
- 21.6. Machine Security Configuration Register (mseccfg, mseccfgh)
- 21.7. Privilege Mode Transitions and Exception Handling
- 21.8. PMP Enhancements for Memory Access and Execution Prevention on Machine Mode
- 22. Verification
- 23. Interactive Debugging in Simulation
- 24. Running Tock OS
Last update:
2024-10-02