RISC-V VeeR EL2 Programmer’s Reference Manual¶
- 1. RISC-V VeeR EL2 Programmer’s Reference Manual
- 2. Core Overview
- 3. Memory Map
- 3.1. Address Regions
- 3.2. Access Properties
- 3.3. Memory Types
- 3.4. Memory Type Access Properties
- 3.5. Memory Access Ordering
- 3.6. Memory Protection
- 3.7. Exception Handling
- 3.8. Control/Status Registers
- 3.9. Memory Address Map
- 3.10. Behavior of Loads to Side-Effect Addresses
- 3.11. Partial Writes
- 3.12. Expected SoC Behavior for Accesses
- 3.13. Speculative Bus Accesses
- 3.14. DMA Slave Port
- 3.15. Reset Signal and Vector
- 3.16. Non-Maskable Interrupt (NMI) Signal and Vector
- 3.17. Software Interrupts
- 4. Memory Error Protection
- 5. Dual-Core Lockstep (DCLS)
- 6. Internal Timers
- 7. Power Management and Multi-Core Debug Control
- 8. External Interrupts
- 8.1. Features
- 8.2. Naming Convention
- 8.3. Overview of Major Functional Units
- 8.4. PIC Block Diagram
- 8.5. Theory Of Operation
- 8.6. Support for Vectored External Interrupts
- 8.7. Interrupt Chaining
- 8.8. Interrupt Nesting
- 8.9. Power Reduction
- 8.10. Performance Targets
- 8.11. Configurability
- 8.12. PIC Control/Status Registers
- 8.13. PIC CSR Address Map
- 8.14. PIC Memory-Mapped Register Address Map
- 8.15. Interrupt Enable/Disable Code Samples
- 9. Performance Monitoring
- 10. Cache Control
- 11. Debug Support
- 12. Low-Level Core Control
- 13. Standard RISC-V CSRs with Core-Specific Adaptations
- 14. CSR Address Map
- 15. Interrupt Priorities
- 16. Clock And Reset
- 17. Complex Port List
- 18. Build Arguments
- 19. Compliance Test Suite Failures
- 20. Errata
- 21. Physical Memory Protection
- 22. User Mode
- 22.1. Machine ISA Register (misa)
- 22.2. Machine Status Register (mstatus)
- 22.3. Machine Environment Configuration Registers (menvcfg,menvcfgh)
- 22.4. User Mode Performance Counters (cycle, cycleh, instret, instreth)
- 22.5. Machine Counter-Enable Register (mcounteren)
- 22.6. Machine Security Configuration Register (mseccfg, mseccfgh)
- 22.7. Privilege Mode Transitions and Exception Handling
- 22.8. PMP Enhancements for Memory Access and Execution Prevention on Machine Mode
- 23. Verification
- 24. Interactive Debugging in Simulation
- 25. Running Tock OS
Last update:
2025-02-20