Exact SPTM SVC routing between GL0 and GL2
Determine the exact request-routing and handling mechanisms used by the Secure Page Table Monitor (SPTM) to process SVC exceptions originating from Guarded Level 0 (GL0) components, including how these calls are conditionally trapped to Guarded Level 2 (GL2) via HCR_EL2.TGE, and clarify how GL0 components reach Secure Kernel at Guarded Level 1 (GL1) while the Trusted Execution Monitor (TXM) concurrently issues SVCs to SPTM at GL2.
References
The exact inner working of the request handling logic is still unknown, considering we will show in \cref{secureKernel} that GL0 components actually directly call into Secure Kernel in GL1. The exact handling mechanisms for allowing GL0 components to call into Secure Kernel at GL1 via SVCs and TXM calling into SPTM at GL2 via SVCs at the same time have yet to be discovered.