- •Contents
- •List of Tables
- •List of Figures
- •Preface
- •About this manual
- •Product revision status
- •Intended audience
- •Using this manual
- •Conventions
- •Additional reading
- •Feedback
- •Feedback on the product
- •Feedback on this book
- •Introduction
- •1.1 About the processor
- •1.2 Extensions to ARMv6
- •1.3 TrustZone security extensions
- •1.4.1 Instruction compression
- •1.4.2 The Thumb instruction set
- •1.4.3 Java bytecodes
- •1.5 Components of the processor
- •1.5.1 Integer core
- •1.5.2 Load Store Unit (LSU)
- •1.5.3 Prefetch unit
- •1.5.4 Memory system
- •1.5.5 AMBA AXI interface
- •1.5.6 Coprocessor interface
- •1.5.7 Debug
- •1.5.8 Instruction cycle summary and interlocks
- •1.5.9 System control
- •1.5.10 Interrupt handling
- •1.6 Power management
- •1.7 Configurable options
- •1.8 Pipeline stages
- •1.9 Typical pipeline operations
- •1.9.1 Instruction progression
- •1.10.1 Extended ARM instruction set summary
- •1.10.2 Thumb instruction set summary
- •1.11 Product revisions
- •Programmer’s Model
- •2.1 About the programmer’s model
- •2.2.1 TrustZone model
- •2.2.2 How the Secure model works
- •2.2.3 TrustZone write access disable
- •2.2.4 Secure Monitor bus
- •2.3 Processor operating states
- •2.3.1 Switching state
- •2.3.2 Interworking ARM and Thumb state
- •2.4 Instruction length
- •2.5 Data types
- •2.6 Memory formats
- •2.7 Addresses in a processor system
- •2.8 Operating modes
- •2.9 Registers
- •2.9.1 The ARM state core register set
- •2.9.2 The Thumb state core register set
- •2.9.3 Accessing high registers in Thumb state
- •2.9.4 ARM state and Thumb state registers relationship
- •2.10 The program status registers
- •2.10.1 The condition code flags
- •2.10.2 The Q flag
- •2.10.4 The GE[3:0] bits
- •2.10.7 The control bits
- •2.10.8 Modification of PSR bits by MSR instructions
- •2.10.9 Reserved bits
- •2.11 Additional instructions
- •2.11.1 Load or Store Byte Exclusive
- •2.11.2 Load or Store Halfword Exclusive
- •2.11.3 Load or Store Doubleword
- •2.11.4 CLREX
- •2.12 Exceptions
- •2.12.1 New instructions for exception handling
- •2.12.2 Exception entry and exit summary
- •2.12.3 Entering an ARM exception
- •2.12.4 Leaving an ARM exception
- •2.12.5 Reset
- •2.12.6 Fast interrupt request
- •2.12.7 Interrupt request
- •2.12.8 Low interrupt latency configuration
- •2.12.9 Interrupt latency example
- •2.12.10 Aborts
- •2.12.11 Imprecise Data Abort mask in the CPSR/SPSR
- •2.12.12 Supervisor call instruction
- •2.12.13 Secure Monitor Call (SMC)
- •2.12.14 Undefined instruction
- •2.12.15 Breakpoint instruction (BKPT)
- •2.12.16 Exception vectors
- •2.12.17 Exception priorities
- •2.13 Software considerations
- •2.13.1 Branch Target Address Cache flush
- •2.13.2 Waiting for DMA to complete
- •System Control Coprocessor
- •3.1 About the system control coprocessor
- •3.1.1 System control coprocessor functional groups
- •3.1.2 System control and configuration
- •3.1.3 MMU control and configuration
- •3.1.4 Cache control and configuration
- •3.1.5 TCM control and configuration
- •3.1.6 Cache Master Valid Registers
- •3.1.7 DMA control
- •3.1.8 System performance monitor
- •3.1.9 System validation
- •3.1.10 Use of the system control coprocessor
- •3.2 System control processor registers
- •3.2.1 Register allocation
- •3.2.2 c0, Main ID Register
- •3.2.3 c0, Cache Type Register
- •3.2.4 c0, TCM Status Register
- •3.2.5 c0, TLB Type Register
- •3.2.6 c0, CPUID registers
- •3.2.7 c1, Control Register
- •3.2.8 c1, Auxiliary Control Register
- •3.2.9 c1, Coprocessor Access Control Register
- •3.2.10 c1, Secure Configuration Register
- •3.2.11 c1, Secure Debug Enable Register
- •3.2.13 c2, Translation Table Base Register 0
- •3.2.14 c2, Translation Table Base Register 1
- •3.2.15 c2, Translation Table Base Control Register
- •3.2.16 c3, Domain Access Control Register
- •3.2.17 c5, Data Fault Status Register
- •3.2.18 c5, Instruction Fault Status Register
- •3.2.19 c6, Fault Address Register
- •3.2.20 c6, Watchpoint Fault Address Register
- •3.2.21 c6, Instruction Fault Address Register
- •3.2.22 c7, Cache operations
- •3.2.23 c8, TLB Operations Register
- •3.2.24 c9, Data and instruction cache lockdown registers
- •3.2.25 c9, Data TCM Region Register
- •3.2.26 c9, Instruction TCM Region Register
- •3.2.29 c9, TCM Selection Register
- •3.2.30 c9, Cache Behavior Override Register
- •3.2.31 c10, TLB Lockdown Register
- •3.2.32 c10, Memory region remap registers
- •3.2.33 c11, DMA identification and status registers
- •3.2.34 c11, DMA User Accessibility Register
- •3.2.35 c11, DMA Channel Number Register
- •3.2.36 c11, DMA enable registers
- •3.2.37 c11, DMA Control Register
- •3.2.38 c11, DMA Internal Start Address Register
- •3.2.39 c11, DMA External Start Address Register
- •3.2.40 c11, DMA Internal End Address Register
- •3.2.41 c11, DMA Channel Status Register
- •3.2.42 c11, DMA Context ID Register
- •3.2.44 c12, Monitor Vector Base Address Register
- •3.2.45 c12, Interrupt Status Register
- •3.2.46 c13, FCSE PID Register
- •3.2.47 c13, Context ID Register
- •3.2.48 c13, Thread and process ID registers
- •3.2.49 c15, Peripheral Port Memory Remap Register
- •3.2.51 c15, Performance Monitor Control Register
- •3.2.52 c15, Cycle Counter Register
- •3.2.53 c15, Count Register 0
- •3.2.54 c15, Count Register 1
- •3.2.55 c15, System Validation Counter Register
- •3.2.56 c15, System Validation Operations Register
- •3.2.57 c15, System Validation Cache Size Mask Register
- •3.2.58 c15, Instruction Cache Master Valid Register
- •3.2.59 c15, Data Cache Master Valid Register
- •3.2.60 c15, TLB lockdown access registers
- •Unaligned and Mixed-endian Data Access Support
- •4.2 Unaligned access support
- •4.2.1 Legacy support
- •4.2.2 ARMv6 extensions
- •4.2.3 Legacy and ARMv6 configurations
- •4.2.4 Legacy data access in ARMv6 (U=0)
- •4.2.5 Support for unaligned data access in ARMv6 (U=1)
- •4.2.6 ARMv6 unaligned data access restrictions
- •4.3 Endian support
- •4.3.1 Load unsigned byte, endian independent
- •4.3.2 Load signed byte, endian independent
- •4.3.3 Store byte, endian independent
- •4.4 Operation of unaligned accesses
- •4.5.1 Legacy fixed instruction and data endianness
- •4.5.3 Reset values of the U, B, and EE bits
- •4.6.1 All load and store operations
- •4.7 Instructions to change the CPSR E bit
- •Program Flow Prediction
- •5.1 About program flow prediction
- •5.2 Branch prediction
- •5.2.1 Enabling program flow prediction
- •5.2.2 Dynamic branch predictor
- •5.2.3 Static branch predictor
- •5.2.4 Branch folding
- •5.2.5 Incorrect predictions and correction
- •5.3 Return stack
- •5.4 Memory Barriers
- •5.4.1 Instruction Memory Barriers (IMBs)
- •5.5.1 Execution of IMB instructions
- •Memory Management Unit
- •6.1 About the MMU
- •6.2 TLB organization
- •6.2.1 MicroTLB
- •6.2.2 Main TLB
- •6.2.3 TLB control operations
- •6.2.5 Supersections
- •6.3 Memory access sequence
- •6.3.1 TLB match process
- •6.3.2 Virtual to physical translation mapping restrictions
- •6.4 Enabling and disabling the MMU
- •6.4.1 Enabling the MMU
- •6.4.2 Disabling the MMU
- •6.4.3 Behavior with MMU disabled
- •6.5 Memory access control
- •6.5.1 Domains
- •6.5.2 Access permissions
- •6.5.3 Execute never bits in the TLB entry
- •6.6 Memory region attributes
- •6.6.1 C and B bit, and type extension field encodings
- •6.6.2 Shared
- •6.6.3 NS attribute
- •6.7 Memory attributes and types
- •6.7.1 Normal memory attribute
- •6.7.2 Device memory attribute
- •6.7.3 Strongly Ordered memory attribute
- •6.7.4 Ordering requirements for memory accesses
- •6.7.5 Explicit Memory Barriers
- •6.7.6 Backwards compatibility
- •6.8 MMU aborts
- •6.8.1 External aborts
- •6.9 MMU fault checking
- •6.9.1 Fault checking sequence
- •6.9.2 Alignment fault
- •6.9.3 Translation fault
- •6.9.4 Access bit fault
- •6.9.5 Domain fault
- •6.9.6 Permission fault
- •6.9.7 Debug event
- •6.10 Fault status and address
- •6.11 Hardware page table translation
- •6.11.2 ARMv6 page table translation subpage AP bits disabled
- •6.11.3 Restrictions on page table mappings page coloring
- •6.12 MMU descriptors
- •Level One Memory System
- •7.1 About the level one memory system
- •7.2 Cache organization
- •7.2.1 Features of the cache system
- •7.2.2 Cache functional description
- •7.2.3 Cache control operations
- •7.2.4 Cache miss handling
- •7.2.5 Cache disabled behavior
- •7.2.6 Unexpected hit behavior
- •7.3.1 TCM behavior
- •7.3.2 Restriction on page table mappings
- •7.3.3 Restriction on page table attributes
- •7.5 TCM and cache interactions
- •7.5.1 Overlapping between TCM regions
- •7.5.2 DMA and core access arbitration
- •7.5.3 Instruction accesses to TCM
- •7.5.4 Data accesses to the Instruction TCM
- •7.6 Write buffer
- •Level Two Interface
- •8.1 About the level two interface
- •8.1.1 AXI parameters for the level 2 interconnect interfaces
- •8.2 Synchronization primitives
- •8.2.3 Example of LDREX and STREX usage
- •8.3 AXI control signals in the processor
- •8.3.1 Channel definition
- •8.3.2 Signal name suffixes
- •8.3.3 Address channel signals
- •8.4 Instruction Fetch Interface transfers
- •8.4.1 Cacheable fetches
- •8.4.2 Noncacheable fetches
- •8.5 Data Read/Write Interface transfers
- •8.5.1 Linefills
- •8.5.2 Noncacheable LDRB
- •8.5.3 Noncacheable LDRH
- •8.5.4 Noncacheable LDR or LDM1
- •8.5.5 Noncacheable LDRD or LDM2
- •8.5.6 Noncacheable LDM3
- •8.5.7 Noncacheable LDM4
- •8.5.8 Noncacheable LDM5
- •8.5.9 Noncacheable LDM6
- •8.5.10 Noncacheable LDM7
- •8.5.11 Noncacheable LDM8
- •8.5.12 Noncacheable LDM9
- •8.5.13 Noncacheable LDM10
- •8.5.14 Noncacheable LDM11
- •8.5.15 Noncacheable LDM12
- •8.5.16 Noncacheable LDM13
- •8.5.17 Noncacheable LDM14
- •8.5.18 Noncacheable LDM15
- •8.5.19 Noncacheable LDM16
- •8.6 Peripheral Interface transfers
- •8.7 Endianness
- •8.8 Locked access
- •Clocking and Resets
- •9.1 About clocking and resets
- •9.2 Clocking and resets with no IEM
- •9.2.1 Processor clocking with no IEM
- •9.2.2 Reset with no IEM
- •9.3 Clocking and resets with IEM
- •9.3.1 Processor clocking with IEM
- •9.3.2 Reset with IEM
- •9.4 Reset modes
- •9.4.1 Power-on reset
- •9.4.2 CP14 debug logic
- •9.4.3 Processor reset
- •9.4.4 DBGTAP reset
- •9.4.5 Normal operation
- •Power Control
- •10.1 About power control
- •10.2 Power management
- •10.2.1 Run mode
- •10.2.2 Standby mode
- •10.2.3 Shutdown mode
- •10.2.4 Dormant mode
- •10.2.5 Communication to the Power Management Controller
- •10.3 Intelligent Energy Management
- •10.3.1 Purpose of IEM
- •10.3.2 Structure of IEM
- •10.3.3 Operation of IEM
- •Coprocessor Interface
- •11.1 About the coprocessor interface
- •11.2 Coprocessor pipeline
- •11.2.1 Coprocessor instructions
- •11.2.2 Coprocessor control
- •11.2.3 Pipeline synchronization
- •11.2.4 Pipeline control
- •11.2.5 Instruction tagging
- •11.2.6 Flush broadcast
- •11.3 Token queue management
- •11.3.1 Queue implementation
- •11.3.2 Queue modification
- •11.3.3 Queue flushing
- •11.4 Token queues
- •11.4.1 Instruction queue
- •11.4.2 Length queue
- •11.4.3 Accept queue
- •11.4.4 Cancel queue
- •11.4.5 Finish queue
- •11.5 Data transfer
- •11.5.1 Loads
- •11.5.2 Stores
- •11.6 Operations
- •11.6.1 Normal operation
- •11.6.2 Cancel operations
- •11.6.3 Bounce operations
- •11.6.4 Flush operations
- •11.6.5 Retirement operations
- •11.7 Multiple coprocessors
- •11.7.1 Interconnect considerations
- •11.7.2 Coprocessor selection
- •11.7.3 Coprocessor switching
- •Vectored Interrupt Controller Port
- •12.1 About the PL192 Vectored Interrupt Controller
- •12.2 About the processor VIC port
- •12.2.1 Synchronization of the VIC port signals
- •12.2.2 Interrupt handler exit
- •12.3 Timing of the VIC port
- •12.3.1 PL192 VIC timing
- •12.3.2 Core timing
- •12.4 Interrupt entry flowchart
- •Debug
- •13.1 Debug systems
- •13.1.1 The debug host
- •13.1.2 The protocol converter
- •13.1.3 The processor
- •13.2 About the debug unit
- •13.2.3 Secure Monitor mode and debug
- •13.2.4 Virtual addresses and debug
- •13.2.5 Programming the debug unit
- •13.3 Debug registers
- •13.3.1 Accessing debug registers
- •13.3.2 CP14 c0, Debug ID Register (DIDR)
- •13.3.3 CP14 c1, Debug Status and Control Register (DSCR)
- •13.3.4 CP14 c5, Data Transfer Registers (DTR)
- •13.3.5 CP14 c6, Watchpoint Fault Address Register (WFAR)
- •13.3.6 CP14 c7, Vector Catch Register (VCR)
- •13.3.10 CP14 c112-c113, Watchpoint Control Registers (WCR)
- •13.3.11 CP14 c10, Debug State Cache Control Register
- •13.3.12 CP14 c11, Debug State MMU Control Register
- •13.4 CP14 registers reset
- •13.5 CP14 debug instructions
- •13.5.1 Executing CP14 debug instructions
- •13.6 External debug interface
- •13.7 Changing the debug enable signals
- •13.8 Debug events
- •13.8.1 Software debug event
- •13.8.2 External debug request signal
- •13.8.3 Halt DBGTAP instruction
- •13.8.4 Behavior of the processor on debug events
- •13.8.5 Effect of a debug event on CP15 registers
- •13.9 Debug exception
- •13.10 Debug state
- •13.10.1 Behavior of the PC in Debug state
- •13.10.2 Interrupts
- •13.10.3 Exceptions
- •13.11 Debug communications channel
- •13.12 Debugging in a cached system
- •13.12.1 Data cache writes
- •13.13 Debugging in a system with TLBs
- •13.14 Monitor debug-mode debugging
- •13.14.1 Entering the debug monitor target
- •13.14.2 Setting breakpoints, watchpoints, and vector catch debug events
- •13.14.3 Setting software breakpoint debug events (BKPT)
- •13.14.4 Using the debug communications channel
- •13.15 Halting debug-mode debugging
- •13.15.1 Entering Debug state
- •13.15.2 Exiting Debug state
- •13.15.3 Programming debug events
- •13.16 External signals
- •Debug Test Access Port
- •14.1 Debug Test Access Port and Debug state
- •14.2 Synchronizing RealView ICE
- •14.3 Entering Debug state
- •14.4 Exiting Debug state
- •14.5 The DBGTAP port and debug registers
- •14.6 Debug registers
- •14.6.1 Bypass register
- •14.6.2 Device ID code register
- •14.6.3 Instruction register
- •14.6.4 Scan chain select register (SCREG)
- •14.6.5 Scan chains
- •14.6.6 Reset
- •14.7 Using the Debug Test Access Port
- •14.7.1 Entering and leaving Debug state
- •14.7.2 Executing instructions in Debug state
- •14.7.3 Using the ITRsel IR instruction
- •14.7.4 Transferring data between the host and the core
- •14.7.5 Using the debug communications channel
- •14.7.6 Target to host debug communications channel sequence
- •14.7.7 Host to target debug communications channel
- •14.7.8 Transferring data in Debug state
- •14.7.9 Example sequences
- •14.8 Debug sequences
- •14.8.1 Debug macros
- •14.8.2 General setup
- •14.8.3 Forcing the processor to halt
- •14.8.4 Entering Debug state
- •14.8.5 Leaving Debug state
- •14.8.8 Reading the CPSR/SPSR
- •14.8.9 Writing the CPSR/SPSR
- •14.8.10 Reading the PC
- •14.8.11 Writing the PC
- •14.8.12 General notes about reading and writing memory
- •14.8.13 Reading memory as words
- •14.8.14 Writing memory as words
- •14.8.15 Reading memory as halfwords or bytes
- •14.8.16 Writing memory as halfwords/bytes
- •14.8.17 Coprocessor register reads and writes
- •14.8.18 Reading coprocessor registers
- •14.8.19 Writing coprocessor registers
- •14.9 Programming debug events
- •14.9.1 Reading registers using scan chain 7
- •14.9.2 Writing registers using scan chain 7
- •14.9.3 Setting breakpoints, watchpoints and vector traps
- •14.9.4 Setting software breakpoints
- •14.10 Monitor debug-mode debugging
- •14.10.1 Receiving data from the core
- •14.10.2 Sending data to the core
- •Trace Interface Port
- •15.1 About the ETM interface
- •15.1.1 Instruction interface
- •15.1.2 Secure control bus
- •15.1.3 Data address interface
- •15.1.4 Data value interface
- •15.1.5 Pipeline advance interface
- •15.1.6 Coprocessor interface
- •15.1.7 Other connections to the core
- •Cycle Timings and Interlock Behavior
- •16.1 About cycle timings and interlock behavior
- •16.1.1 Changes in instruction flow overview
- •16.1.2 Instruction execution overview
- •16.1.3 Conditional instructions
- •16.1.4 Opposite condition code checks
- •16.1.5 Definition of terms
- •16.2 Register interlock examples
- •16.3 Data processing instructions
- •16.3.1 Cycle counts if destination is not PC
- •16.3.2 Cycle counts if destination is the PC
- •16.3.3 Example interlocks
- •16.4 QADD, QDADD, QSUB, and QDSUB instructions
- •16.6 ARMv6 Sum of Absolute Differences (SAD)
- •16.6.1 Example interlocks
- •16.7 Multiplies
- •16.8 Branches
- •16.9 Processor state updating instructions
- •16.10 Single load and store instructions
- •16.10.1 Base register update
- •16.11 Load and Store Double instructions
- •16.12 Load and Store Multiple Instructions
- •16.12.1 Load and Store Multiples, other than load multiples including the PC
- •16.12.2 Load Multiples, where the PC is in the register list
- •16.12.3 Example Interlocks
- •16.13 RFE and SRS instructions
- •16.14 Synchronization instructions
- •16.15 Coprocessor instructions
- •16.16 SVC, SMC, BKPT, Undefined, and Prefetch Aborted instructions
- •16.17 No operation
- •16.18 Thumb instructions
- •AC Characteristics
- •17.1 Processor timing diagrams
- •17.2 Processor timing parameters
- •Signal Descriptions
- •A.1 Global signals
- •A.2 Static configuration signals
- •A.3 TrustZone internal signals
- •A.4 Interrupt signals, including VIC interface
- •A.5 AXI interface signals
- •A.5.1 Instruction read port signals
- •A.5.2 Data port signals
- •A.5.3 Peripheral port signals
- •A.5.4 DMA port signals
- •A.6 Coprocessor interface signals
- •A.7 Debug interface signals, including JTAG
- •A.8 ETM interface signals
- •A.9 Test signals
- •B.1 About the differences between the ARM1136J-S and ARM1176JZ-S processors
- •B.2 Summary of differences
- •B.2.1 TrustZone
- •B.2.2 ARMv6k extensions support
- •B.2.3 Power management
- •B.2.4 SmartCache
- •B.2.7 Tightly-Coupled Memories
- •B.2.8 Fault Address Register
- •B.2.9 Fault Status Register
- •B.2.10 Prefetch Unit
- •B.2.11 System control coprocessor operations
- •B.2.13 Debug
- •B.2.14 Level two interface
- •B.2.15 Memory BIST
- •Revisions
- •Glossary
List of Tables
ARM1176JZ-S Technical Reference Manual
|
Change history ................................................................................................................................ |
ii |
Table 1-1 |
TCM configurations ................................................................................................................... |
1-13 |
Table 1-2 |
Configurable options ................................................................................................................. |
1-23 |
Table 1-3 |
ARM1176JZ-S processor default configurations ...................................................................... |
1-23 |
Table 1-4 |
Key to instruction set tables ...................................................................................................... |
1-30 |
Table 1-5 |
ARM instruction set summary ................................................................................................... |
1-31 |
Table 1-6 |
Addressing mode 2 ................................................................................................................... |
1-38 |
Table 1-7 |
Addressing mode 2P, post-indexed only .................................................................................. |
1-39 |
Table 1-8 |
Addressing mode 3 ................................................................................................................... |
1-40 |
Table 1-9 |
Addressing mode 4 ................................................................................................................... |
1-40 |
Table 1-10 |
Addressing mode 5 ................................................................................................................... |
1-41 |
Table 1-11 |
Operand2 .................................................................................................................................. |
1-41 |
Table 1-12 |
Fields ........................................................................................................................................ |
1-41 |
Table 1-13 |
Condition codes ........................................................................................................................ |
1-42 |
Table 1-14 |
Thumb instruction set summary ................................................................................................ |
1-42 |
Table 2-1 |
Write access behavior for system control processor registers .................................................... |
2-9 |
Table 2-2 |
Secure Monitor bus signals ....................................................................................................... |
2-11 |
Table 2-3 |
Address types in the processor system .................................................................................... |
2-16 |
Table 2-4 |
Mode structure .......................................................................................................................... |
2-17 |
Table 2-5 |
Register mode identifiers .......................................................................................................... |
2-19 |
Table 2-6 |
GE[3:0] settings ........................................................................................................................ |
2-26 |
Table 2-7 |
PSR mode bit values ................................................................................................................ |
2-28 |
Table 2-8 |
Exception entry and exit ............................................................................................................ |
2-37 |
Table 2-9 |
Exception priorities .................................................................................................................... |
2-57 |
Table 3-1 |
System control coprocessor register functions ........................................................................... |
3-3 |
Table 3-2 |
Summary of CP15 registers and operations ............................................................................. |
3-15 |
Table 3-3 |
Summary of CP15 MCRR operations ....................................................................................... |
3-20 |
Table 3-4 |
Main ID Register bit functions ................................................................................................... |
3-21 |
Table 3-5 |
Results of access to the Main ID Register ................................................................................ |
3-21 |
Table 3-6 |
Cache Type Register bit functions ............................................................................................ |
3-22 |
ARM DDI 0333H |
Copyright © 2004-2009 ARM Limited. All rights reserved. |
vii |
ID012410 |
Non-Confidential, Unrestricted Access |
|
|
|
List of Tables |
Table 3-7 |
Results of access to the Cache Type Register ......................................................................... |
3-23 |
Table 3-8 |
Example Cache Type Register format .................................................................................... |
.. 3-24 |
Table 3-9 |
TCM Status Register bit functions ..................................................................................... |
....... 3-25 |
Table 3-10 |
TLB Type Register bit functions ................................................................................................ |
3-26 |
Table 3-11 |
Results of access to the TLB Type Register ........................................................................... |
.. 3-26 |
Table 3-12 |
Processor Feature Register 0 bit functions ........................................................................... |
.... 3-27 |
Table 3-13 |
Results of access to the Processor Feature Register 0 ............................................................ |
3-27 |
Table 3-14 |
Processor Feature Register 1 bit functions ........................................................................... |
.... 3-28 |
Table 3-15 |
Results of access to the Processor Feature Register 1 ............................................................ |
3-29 |
Table 3-16 |
Debug Feature Register 0 bit functions ............................................................................... |
..... 3-29 |
Table 3-17 |
Results of access to the Debug Feature Register 0 ................................................................. |
3-30 |
Table 3-18 |
Auxiliary Feature Register 0 bit functions ........................................................................... |
...... 3-30 |
Table 3-19 |
Results of access to the Auxiliary Feature Register 0 .............................................................. |
3-31 |
Table 3-20 |
Memory Model Feature Register 0 bit functions ....................................................................... |
3-31 |
Table 3-21 |
Results of access to the Memory Model Feature Register 0 .................................................... |
3-32 |
Table 3-22 |
Memory Model Feature Register 1 bit functions ....................................................................... |
3-33 |
Table 3-23 |
Results of access to the Memory Model Feature Register 1 .................................................... |
3-33 |
Table 3-24 |
Memory Model Feature Register 2 bit functions ....................................................................... |
3-34 |
Table 3-25 |
Results of access to the Memory Model Feature Register 2 .................................................... |
3-35 |
Table 3-26 |
Memory Model Feature Register 3 bit functions ....................................................................... |
3-36 |
Table 3-27 |
Results of access to the Memory Model Feature Register 3 .................................................... |
3-36 |
Table 3-28 |
Instruction Set Attributes Register 0 bit functions .................................................................. |
... 3-37 |
Table 3-29 |
Results of access to the Instruction Set Attributes Register 0 .................................................. |
3-37 |
Table 3-30 |
Instruction Set Attributes Register 1 bit functions .................................................................. |
... 3-38 |
Table 3-31 |
Results of access to the Instruction Set Attributes Register 1 .................................................. |
3-39 |
Table 3-32 |
Instruction Set Attributes Register 2 bit functions .................................................................. |
... 3-39 |
Table 3-33 |
Results of access to the Instruction Set Attributes Register 2 .................................................. |
3-40 |
Table 3-34 |
Instruction Set Attributes Register 3 bit functions .................................................................. |
... 3-41 |
Table 3-35 |
Results of access to the Instruction Set Attributes Register 3 .................................................. |
3-41 |
Table 3-36 |
Instruction Set Attributes Register 4 bit functions .................................................................. |
... 3-42 |
Table 3-37 |
Results of access to the Instruction Set Attributes Register 4 .................................................. |
3-43 |
Table 3-38 |
Results of access to the Instruction Set Attributes Register 5 .................................................. |
3-44 |
Table 3-39 |
Control Register bit functions .................................................................................................... |
3-45 |
Table 3-40 |
Results of access to the Control Register ............................................................................ |
..... 3-47 |
Table 3-41 |
Resultant B bit, U bit, and EE bit values ............................................................................ |
....... 3-48 |
Table 3-42 |
Auxiliary Control Register bit functions ............................................................................. |
........ 3-49 |
Table 3-43 |
Results of access to the Auxiliary Control Register .................................................................. |
3-50 |
Table 3-44 |
Coprocessor Access Control Register bit functions .................................................................. |
3-51 |
Table 3-45 |
Results of access to the Coprocessor Access Control Register ............................................... |
3-52 |
Table 3-46 |
Secure Configuration Register bit functions .......................................................................... |
.... 3-53 |
Table 3-47 |
Operation of the FW and FIQ bits ..................................................................................... |
........ 3-53 |
Table 3-48 |
Operation of the AW and EA bits ...................................................................................... |
........ 3-54 |
Table 3-49 |
Secure Debug Enable Register bit functions ........................................................................... |
. 3-55 |
Table 3-50 |
Results of access to the Coprocessor Access Control Register ............................................... |
3-55 |
Table 3-51 |
Non-Secure Access Control Register bit functions ................................................................... |
3-56 |
Table 3-52 |
Results of access to the Auxiliary Control Register .................................................................. |
3-57 |
Table 3-53 |
Translation Table Base Register 0 bit functions ...................................................................... |
. 3-58 |
Table 3-54 |
Results of access to the Translation Table Base Register 0 .................................................... |
3-58 |
Table 3-55 |
Translation Table Base Register 1 bit functions ...................................................................... |
. 3-60 |
Table 3-56 |
Results of access to the Translation Table Base Register 1 .................................................... |
3-60 |
Table 3-57 |
Translation Table Base Control Register bit functions .............................................................. |
3-61 |
Table 3-58 |
Results of access to the Translation Table Base Control Register ........................................... |
3-62 |
Table 3-59 |
Domain Access Control Register bit functions ......................................................................... |
. 3-63 |
Table 3-60 |
Results of access to the Domain Access Control Register ....................................................... |
3-63 |
Table 3-61 |
Data Fault Status Register bit functions ............................................................................. |
....... 3-64 |
Table 3-62 |
Results of access to the Data Fault Status Register ................................................................. |
3-66 |
Table 3-63 |
Instruction Fault Status Register bit functions ...................................................................... |
..... 3-67 |
Table 3-64 |
Results of access to the Instruction Fault Status Register ........................................................ |
3-67 |
Table 3-65 |
Results of access to the Fault Address Register ...................................................................... |
3-68 |
Table 3-66 |
Results of access to the Instruction Fault Address Register ..................................................... |
3-69 |
ARM DDI 0333H |
Copyright © 2004-2009 ARM Limited. All rights reserved. |
viii |
ID012410 |
Non-Confidential, Unrestricted Access |
|
|
|
List of Tables |
Table 3-67 |
Functional bits of c7 for Set and Index .............................................................................. |
........ 3-72 |
Table 3-68 |
Cache size and S parameter dependency ................................................................................ |
3-72 |
Table 3-69 |
Functional bits of c7 for MVA .................................................................................................... |
3-73 |
Table 3-70 |
Functional bits of c7 for VA format ............................................................................................ |
3-74 |
Table 3-71 |
Cache operations for entire cache .................................................................................... |
........ 3-74 |
Table 3-72 |
Cache operations for single lines .............................................................................................. |
3-76 |
Table 3-73 |
Cache operations for address ranges .................................................................................. |
..... 3-76 |
Table 3-74 |
Cache Dirty Status Register bit functions ............................................................................ |
..... 3-78 |
Table 3-75 |
Cache operations flush functions ..................................................................................... |
......... 3-79 |
Table 3-76 |
Flush Branch Target Entry using MVA bit functions ................................................................. |
3-80 |
Table 3-77 |
PA Register for successful translation bit functions ................................................................. |
. 3-81 |
Table 3-78 |
PA Register for unsuccessful translation bit functions .............................................................. |
3-82 |
Table 3-79 |
Results of access to the Data Synchronization Barrier operation ............................................. |
3-84 |
Table 3-80 |
Results of access to the Data Memory Barrier operation ......................................................... |
3-85 |
Table 3-81 |
Results of access to the Wait For Interrupt operation ............................................................... |
3-86 |
Table 3-82 |
Results of access to the TLB Operations Register ................................................................... |
3-87 |
Table 3-83 |
Instruction and data cache lockdown register bit functions .................................................... |
... 3-89 |
Table 3-84 |
Results of access to the Instruction and Data Cache Lockdown Register ................................ |
3-89 |
Table 3-85 |
Data TCM Region Register bit functions ............................................................................... |
.... 3-91 |
Table 3-86 |
Results of access to the Data TCM Region Register ................................................................ |
3-91 |
Table 3-87 |
Instruction TCM Region Register bit functions ........................................................................ |
.. 3-92 |
Table 3-88 |
Results of access to the Instruction TCM Region Register ....................................................... |
3-93 |
Table 3-89 |
Data TCM Non-secure Control Access Register bit functions .................................................. |
3-94 |
Table 3-90 |
Effects of NS items for data TCM operation ........................................................................... |
.. 3-95 |
Table 3-91 |
Instruction TCM Non-secure Control Access Register bit functions ......................................... |
3-96 |
Table 3-92 |
Effects of NS items for instruction TCM operation .................................................................... |
3-96 |
Table 3-93 |
TCM Selection Register bit functions ................................................................................. |
....... 3-97 |
Table 3-94 |
Results of access to the TCM Selection Register ..................................................................... |
3-97 |
Table 3-95 |
Cache Behavior Override Register bit functions ....................................................................... |
3-98 |
Table 3-96 |
Results of access to the Cache Behavior Override Register .................................................... |
3-99 |
Table 3-97 |
TLB Lockdown Register bit functions .................................................................................. |
.... 3-100 |
Table 3-98 |
Results of access to the TLB Lockdown Register ................................................................... |
3-100 |
Table 3-99 |
Primary Region Remap Register bit functions ........................................................................ |
3-102 |
Table 3-100 |
Encoding for the remapping of the primary memory type ....................................................... |
3-103 |
Table 3-101 |
Normal Memory Remap Register bit functions ....................................................................... |
3-103 |
Table 3-102 |
Remap encoding for Inner or Outer cacheable attributes ....................................................... |
3-104 |
Table 3-103 |
Results of access to the memory region remap registers ....................................................... |
3-105 |
Table 3-104 |
DMA identification and status register bit functions ................................................................ |
3-106 |
Table 3-105 |
DMA Identification and Status Register functions ................................................................... |
3-106 |
Table 3-106 |
Results of access to the DMA identification and status registers ........................................... |
3-107 |
Table 3-107 |
DMA User Accessibility Register bit functions ....................................................................... |
. 3-108 |
Table 3-108 |
Results of access to the DMA User Accessibility Register ..................................................... |
3-108 |
Table 3-109 |
DMA Channel Number Register bit functions .................................................................. |
....... 3-109 |
Table 3-110 |
Results of access to the DMA Channel Number Register ...................................................... |
3-109 |
Table 3-111 |
Results of access to the DMA enable registers ...................................................................... |
3-111 |
Table 3-112 |
DMA Control Register bit functions .................................................................................. |
....... 3-112 |
Table 3-113 |
Results of access to the DMA Control Register ...................................................................... |
3-113 |
Table 3-114 |
Results of access to the DMA Internal Start Address Register ............................................... |
3-114 |
Table 3-115 |
Results of access to the DMA External Start Address Register ............................................. |
3-115 |
Table 3-116 |
Results of access to the DMA Internal End Address Register ................................................ |
3-116 |
Table 3-117 |
DMA Channel Status Register bit functions ........................................................................... |
. 3-117 |
Table 3-118 |
Results of access to the DMA Channel Status Register ......................................................... |
3-119 |
Table 3-119 |
DMA Context ID Register bit functions ............................................................................... |
.... 3-120 |
Table 3-120 |
Results of access to the DMA Context ID Register ................................................................ |
3-120 |
Table 3-121 |
Secure or Non-secure Vector Base Address Register bit functions ....................................... |
3-121 |
Table 3-122 |
Results of access to the Secure or Non-secure Vector Base Address Register .................... |
3-122 |
Table 3-123 |
Monitor Vector Base Address Register bit functions ............................................................... |
3-123 |
Table 3-124 |
Results of access to the Monitor Vector Base Address Register ............................................ |
3-123 |
Table 3-125 |
Interrupt Status Register bit functions ..................................................................................... |
3-124 |
Table 3-126 |
Results of access to the Interrupt Status Register .................................................................. |
3-124 |
ARM DDI 0333H |
Copyright © 2004-2009 ARM Limited. All rights reserved. |
ix |
ID012410 |
Non-Confidential, Unrestricted Access |
|
|
List of Tables |
|
Table 3-127 |
FCSE PID Register bit functions ............................................................................................. |
3-125 |
Table 3-128 |
Results of access to the FCSE PID Register .......................................................................... |
3-126 |
Table 3-129 |
Context ID Register bit functions ............................................................................................ |
3-128 |
Table 3-130 |
Results of access to the Context ID Register ......................................................................... |
3-128 |
Table 3-131 |
Results of access to the thread and process ID registers ....................................................... |
3-129 |
Table 3-132 |
Peripheral Port Memory Remap Register bit functions ........................................................... |
3-131 |
Table 3-133 |
Results of access to the Peripheral Port Remap Register ...................................................... |
3-131 |
Table 3-134 |
Secure User and Non-secure Access Validation Control Register bit functions ..................... |
3-132 |
Table 3-135 |
Results of access to the Secure User and Non-secure Access Validation Control Register .. |
3-133 |
Table 3-136 |
Performance Monitor Control Register bit functions ............................................................... |
3-134 |
Table 3-137 |
Performance monitoring events .............................................................................................. |
3-135 |
Table 3-138 |
Results of access to the Performance Monitor Control Register ............................................ |
3-137 |
Table 3-139 |
Results of access to the Cycle Counter Register .................................................................... |
3-138 |
Table 3-140 |
Results of access to the Count Register 0 .............................................................................. |
3-139 |
Table 3-141 |
Results of access to the Count Register 1 .............................................................................. |
3-140 |
Table 3-142 |
System validation counter register operations ........................................................................ |
3-140 |
Table 3-143 |
Results of access to the System Validation Counter Register ................................................ |
3-141 |
Table 3-144 |
System Validation Operations Register functions ................................................................... |
3-142 |
Table 3-145 |
Results of access to the System Validation Operations Register ........................................... |
3-143 |
Table 3-146 |
System Validation Cache Size Mask Register bit functions .................................................... |
3-145 |
Table 3-147 |
Results of access to the System Validation Cache Size Mask Register ................................. |
3-146 |
Table 3-148 |
TLB Lockdown Index Register bit functions ............................................................................ |
3-149 |
Table 3-149 |
TLB Lockdown VA Register bit functions ................................................................................ |
3-150 |
Table 3-150 |
TLB Lockdown PA Register bit functions ................................................................................ |
3-150 |
Table 3-151 |
Access permissions APX and AP bit fields encoding ............................................................. |
3-151 |
Table 3-152 |
TLB Lockdown Attributes Register bit functions ..................................................................... |
3-152 |
Table 3-153 |
Results of access to the TLB lockdown access registers ....................................................... |
3-152 |
Table 4-1 |
Unaligned access handling ......................................................................................................... |
4-4 |
Table 4-2 |
Memory access types ............................................................................................................... |
4-13 |
Table 4-3 |
Unalignment fault occurrence when access behavior is architecturally unpredictable ............. |
4-14 |
Table 4-4 |
Legacy endianness using CP15 c1 ........................................................................................... |
4-17 |
Table 4-5 |
Mixed-endian configuration ....................................................................................................... |
4-19 |
Table 4-6 |
B bit, U bit, and EE bit settings ................................................................................................. |
4-19 |
Table 6-1 |
Access permission bit encoding ................................................................................................ |
6-12 |
Table 6-2 |
TEX field, and C and B bit encodings used in page table formats ............................................ |
6-15 |
Table 6-3 |
Cache policy bits ....................................................................................................................... |
6-15 |
Table 6-4 |
Inner and Outer cache policy implementation options .............................................................. |
6-16 |
Table 6-5 |
Effect of remapping memory with TEX remap = 1 .................................................................... |
6-17 |
Table 6-6 |
Values that remap the shareable attribute ................................................................................ |
6-18 |
Table 6-7 |
Primary region type encoding ................................................................................................... |
6-18 |
Table 6-8 |
Inner and outer region remap encoding .................................................................................... |
6-18 |
Table 6-9 |
Memory attributes ..................................................................................................................... |
6-20 |
Table 6-10 |
Memory region backwards compatibility ................................................................................... |
6-26 |
Table 6-11 |
Fault Status Register encoding ................................................................................................. |
6-34 |
Table 6-12 |
Summary of aborts .................................................................................................................... |
6-35 |
Table 6-13 |
Translation table size ................................................................................................................ |
6-43 |
Table 6-14 |
Access types from first-level descriptor bit values .................................................................... |
6-45 |
Table 6-15 |
Access types from second-level descriptor bit values .............................................................. |
6-47 |
Table 6-16 |
CP15 register functions ............................................................................................................. |
6-53 |
Table 6-17 |
CP14 register functions ............................................................................................................. |
6-54 |
Table 7-1 |
TCM configurations ..................................................................................................................... |
7-7 |
Table 7-2 |
Access to Non-secure TCM ........................................................................................................ |
7-8 |
Table 7-3 |
Access to Secure TCM ............................................................................................................... |
7-8 |
Table 7-4 |
Summary of data accesses to TCM and caches ...................................................................... |
7-14 |
Table 7-5 |
Summary of instruction accesses to TCM and caches ............................................................. |
7-15 |
Table 8-1 |
AXI parameters for the level 2 interconnect interfaces ............................................................... |
8-3 |
Table 8-2 |
AxLEN[3:0] encoding ................................................................................................................ |
8-10 |
Table 8-3 |
AxSIZE[2:0] encoding ............................................................................................................... |
8-11 |
Table 8-4 |
AxBURST[1:0] encoding ........................................................................................................... |
8-11 |
Table 8-5 |
AxLOCK[1:0] encoding ............................................................................................................. |
8-11 |
ARM DDI 0333H |
Copyright © 2004-2009 ARM Limited. All rights reserved. |
x |
ID012410 |
Non-Confidential, Unrestricted Access |
|
|
List of Tables |
|
Table 8-6 |
AxCACHE[3:0] encoding ........................................................................................................... |
8-12 |
Table 8-7 |
AxPROT[2:0] encoding ............................................................................................................. |
8-12 |
Table 8-8 |
AxSIDEBAND[4:1] encoding ..................................................................................................... |
8-13 |
Table 8-9 |
ARSIDEBANDI[4:1] encoding ................................................................................................... |
8-13 |
Table 8-10 |
AXI signals for Cacheable fetches ............................................................................................ |
8-14 |
Table 8-11 |
AXI signals for Noncacheable fetches ...................................................................................... |
8-14 |
Table 8-12 |
Linefill behavior on the AXI interface ........................................................................................ |
8-15 |
Table 8-13 |
Noncacheable LDRB ................................................................................................................ |
8-16 |
Table 8-14 |
Noncacheable LDRH ................................................................................................................ |
8-16 |
Table 8-15 |
Noncacheable LDR or LDM1 .................................................................................................... |
8-17 |
Table 8-16 |
Noncacheable LDRD or LDM2 ................................................................................................. |
8-17 |
Table 8-17 |
Noncacheable LDRD or LDM2 from word 7 ............................................................................. |
8-18 |
Table 8-18 |
Noncacheable LDM3, Strongly Ordered or Device memory ..................................................... |
8-18 |
Table 8-19 |
Noncacheable LDM3, Noncacheable memory or cache disabled ............................................ |
8-18 |
Table 8-20 |
Noncacheable LDM3 from word 6, or 7 .................................................................................... |
8-18 |
Table 8-21 |
Noncacheable LDM4, Strongly Ordered or Device memory ..................................................... |
8-19 |
Table 8-22 |
Noncacheable LDM4, Noncacheable memory or cache disabled ............................................ |
8-19 |
Table 8-23 |
Noncacheable LDM4 from word 5, 6, or 7 ................................................................................ |
8-19 |
Table 8-24 |
Noncacheable LDM5, Strongly Ordered or Device memory ..................................................... |
8-20 |
Table 8-25 |
Noncacheable LDM5, Noncacheable memory or cache disabled ............................................ |
8-20 |
Table 8-26 |
Noncacheable LDM5 from word 4, 5, 6, or 7 ............................................................................ |
8-20 |
Table 8-27 |
Noncacheable LDM6, Strongly Ordered or Device memory ..................................................... |
8-20 |
Table 8-28 |
Noncacheable LDM6, Noncacheable memory or cache disabled ............................................ |
8-21 |
Table 8-29 |
Noncacheable LDM6 from word 3, 4, 5, 6, or 7 ........................................................................ |
8-21 |
Table 8-30 |
Noncacheable LDM7, Strongly Ordered or Device memory ..................................................... |
8-21 |
Table 8-31 |
Noncacheable LDM7, Noncacheable memory or cache disabled ............................................ |
8-21 |
Table 8-32 |
Noncacheable LDM7 from word 2, 3, 4, 5, 6, or 7 .................................................................... |
8-21 |
Table 8-33 |
Noncacheable LDM8 from word 0 ............................................................................................ |
8-22 |
Table 8-34 |
Noncacheable LDM8 from word 1, 2, 3, 4, 5, 6, or 7 ................................................................ |
8-22 |
Table 8-35 |
Noncacheable LDM9 ................................................................................................................ |
8-23 |
Table 8-36 |
Noncacheable LDM10 .............................................................................................................. |
8-23 |
Table 8-37 |
Noncacheable LDM11 .............................................................................................................. |
8-23 |
Table 8-38 |
Noncacheable LDM12 .............................................................................................................. |
8-24 |
Table 8-39 |
Noncacheable LDM13 .............................................................................................................. |
8-24 |
Table 8-40 |
Noncacheable LDM14 .............................................................................................................. |
8-25 |
Table 8-41 |
Noncacheable LDM15 .............................................................................................................. |
8-25 |
Table 8-42 |
Noncacheable LDM16 .............................................................................................................. |
8-25 |
Table 8-43 |
Half-line Write-Back .................................................................................................................. |
8-26 |
Table 8-44 |
Full-line Write-Back ................................................................................................................... |
8-26 |
Table 8-45 |
Cacheable Write-Through or Noncacheable STRB .................................................................. |
8-27 |
Table 8-46 |
Cacheable Write-Through or Noncacheable STRH .................................................................. |
8-27 |
Table 8-47 |
Cacheable Write-Through or Noncacheable STR or STM1 ...................................................... |
8-29 |
Table 8-48 |
Cacheable Write-Through or Noncacheable STRD or STM2 to words 0, 1, 2, 3, 4, 5, or 6 ..... |
8-30 |
Table 8-49 |
Cacheable Write-Through or Noncacheable STM2 to word 7 .................................................. |
8-30 |
Table 8-50 |
Cacheable Write-Through or Noncacheable STM3 to words 0, 1, 2, 3, 4, or 5 ........................ |
8-31 |
Table 8-51 |
Cacheable Write-Through or Noncacheable STM3 to words 6 or 7 ......................................... |
8-31 |
Table 8-52 |
Cacheable Write-Through or Noncacheable STM4 to word 0, 1, 2, 3, or 4 .............................. |
8-32 |
Table 8-53 |
Cacheable Write-Through or Noncacheable STM4 to word 5, 6, or 7 ...................................... |
8-32 |
Table 8-54 |
Cacheable Write-Through or Noncacheable STM5 to word 0, 1, 2, or 3 .................................. |
8-33 |
Table 8-55 |
Cacheable Write-Through or Noncacheable STM5 to word 4, 5, 6, or 7 .................................. |
8-33 |
Table 8-56 |
Cacheable Write-Through or Noncacheable STM6 to word 0, 1, or 2 ...................................... |
8-34 |
Table 8-57 |
Cacheable Write-Through or Noncacheable STM6 to word 3, 4, 5, 6, or 7 .............................. |
8-34 |
Table 8-58 |
Cacheable Write-Through or Noncacheable STM7 to word 0 or 1 ........................................... |
8-35 |
Table 8-59 |
Cacheable Write-Through or Noncacheable STM7 to word 2, 3, 4, 5, 6 or 7 ........................... |
8-35 |
Table 8-60 |
Cacheable Write-Through or Noncacheable STM8 to word 0 .................................................. |
8-36 |
Table 8-61 |
Cacheable Write-Through or Noncacheable STM8 to word 1, 2, 3, 4, 5, 6, or 7 ...................... |
8-36 |
Table 8-62 |
Cacheable Write-Through or Noncacheable STM9 .................................................................. |
8-37 |
Table 8-63 |
Cacheable Write-Through or Noncacheable STM10 ................................................................ |
8-37 |
Table 8-64 |
Cacheable Write-Through or Noncacheable STM11 ................................................................ |
8-38 |
Table 8-65 |
Cacheable Write-Through or Noncacheable STM12 ................................................................ |
8-38 |
ARM DDI 0333H |
Copyright © 2004-2009 ARM Limited. All rights reserved. |
xi |
ID012410 |
Non-Confidential, Unrestricted Access |
|
|
|
List of Tables |
Table 8-66 |
Cacheable Write-Through or Noncacheable STM13 ............................................................. |
... 8-39 |
Table 8-67 |
Cacheable Write-Through or Noncacheable STM14 ............................................................. |
... 8-39 |
Table 8-68 |
Cacheable Write-Through or Noncacheable STM15 ............................................................. |
... 8-40 |
Table 8-69 |
Cacheable Write-Through or Noncacheable STM16 ............................................................. |
... 8-40 |
Table 8-70 |
Example Peripheral Interface reads and writes ........................................................................ |
8-41 |
Table 9-1 |
Reset modes ............................................................................................................................. |
9-10 |
Table 11-1 |
Coprocessor instructions .......................................................................................................... |
11-3 |
Table 11-2 |
Coprocessor control signals ...................................................................................................... |
11-4 |
Table 11-3 |
Pipeline stage update ............................................................................................................... |
11-7 |
Table 11-4 |
Addressing of queue buffers ................................................................................................... |
11-10 |
Table 11-5 |
Retirement conditions ............................................................................................................. |
11-20 |
Table 12-1 |
VIC port signals ......................................................................................................................... |
12-3 |
Table 13-1 |
Terms used in register descriptions .................................................................................. |
........ 13-5 |
Table 13-2 |
CP14 debug register map ......................................................................................................... |
13-5 |
Table 13-3 |
Debug ID Register bit field definition ......................................................................................... |
13-7 |
Table 13-4 |
Debug Status and Control Register bit field definitions ............................................................. |
13-8 |
Table 13-5 |
Data Transfer Register bit field definitions ......................................................................... |
..... 13-12 |
Table 13-6 |
Vector Catch Register bit field definitions .......................................................................... |
..... 13-14 |
Table 13-7 |
Summary of debug entry and exception conditions ................................................................ |
13-14 |
Table 13-8 |
Processor breakpoint and watchpoint registers ...................................................................... |
13-16 |
Table 13-9 |
Breakpoint Value Registers, bit field definition ..................................................................... |
... 13-17 |
Table 13-10 |
Processor Breakpoint Control Registers .............................................................................. |
... 13-17 |
Table 13-11 |
Breakpoint Control Registers, bit field definitions ................................................................. |
.. 13-18 |
Table 13-12 |
Meaning of BCR[22:20] bits .................................................................................................... |
13-19 |
Table 13-13 |
Processor Watchpoint Value Registers ................................................................................ |
.. 13-20 |
Table 13-14 |
Watchpoint Value Registers, bit field definitions ................................................................... |
.. 13-21 |
Table 13-15 |
Processor Watchpoint Control Registers .............................................................................. |
.. 13-21 |
Table 13-16 |
Watchpoint Control Registers, bit field definitions ................................................................. |
.. 13-22 |
Table 13-17 |
Debug State Cache Control Register bit functions ................................................................. |
13-24 |
Table 13-18 |
Debug State MMU Control Register bit functions ................................................................... |
13-24 |
Table 13-19 |
CP14 debug instructions ......................................................................................................... |
13-26 |
Table 13-20 |
Debug instruction execution .................................................................................................... |
13-27 |
Table 13-21 |
Secure debug behavior ........................................................................................................... |
13-28 |
Table 13-22 |
Behavior of the processor on debug events ........................................................................... |
13-33 |
Table 13-23 |
Setting of CP15 registers on debug events ........................................................................... |
. 13-34 |
Table 13-24 |
Values in the link register after exceptions ........................................................................ |
..... 13-36 |
Table 13-25 |
Read PC value after Debug state entry ............................................................................... |
... 13-39 |
Table 13-26 |
Example memory operation sequence ................................................................................... |
13-41 |
Table 14-1 |
Supported public instructions .................................................................................................... |
14-6 |
Table 14-2 |
Scan chain 7 register map ...................................................................................................... |
14-19 |
Table 15-1 |
Instruction interface signals ...................................................................................................... |
15-2 |
Table 15-2 |
ETMIACTL[17:0] ....................................................................................................................... |
15-3 |
Table 15-3 |
ETMIASECCTL[1:0] .................................................................................................................. |
15-4 |
Table 15-4 |
Data address interface signals .................................................................................................. |
15-4 |
Table 15-5 |
ETMDACTL[17:0] ...................................................................................................................... |
15-5 |
Table 15-6 |
Data value interface signals ...................................................................................................... |
15-6 |
Table 15-7 |
ETMDDCTL[3:0] ....................................................................................................................... |
15-6 |
Table 15-8 |
ETMPADV[2:0] .......................................................................................................................... |
15-6 |
Table 15-9 |
Coprocessor interface signals ................................................................................................... |
15-7 |
Table 15-10 |
ETMCPSECCTL[1:0] format ............................................................................................. |
........ 15-7 |
Table 15-11 |
Other connections ..................................................................................................................... |
15-8 |
Table 16-1 |
Pipeline stages .......................................................................................................................... |
16-3 |
Table 16-2 |
Definition of cycle timing terms ................................................................................................. |
16-5 |
Table 16-3 |
Register interlock examples ...................................................................................................... |
16-6 |
Table 16-4 |
Data Processing Instruction cycle timing behavior if destination is not PC ............................ |
... 16-7 |
Table 16-5 |
Data Processing Instruction cycle timing behavior if destination is the PC ............................ |
... 16-7 |
Table 16-6 |
QADD, QDADD, QSUB, and QDSUB instruction cycle timing behavior ................................... |
16-9 |
Table 16-7 |
ARMv6 media data-processing instructions cycle timing behavior ......................................... |
16-10 |
Table 16-8 |
ARMv6 sum of absolute differences instruction timing behavior ............................................ |
16-11 |
Table 16-9 |
Example interlocks .................................................................................................................. |
16-11 |
ARM DDI 0333H |
Copyright © 2004-2009 ARM Limited. All rights reserved. |
xii |
ID012410 |
Non-Confidential, Unrestricted Access |
|
|
|
List of Tables |
Table 16-10 |
Example multiply instruction cycle timing behavior ................................................................. |
16-12 |
Table 16-11 |
Branch instruction cycle timing behavior ............................................................................ |
..... 16-14 |
Table 16-12 |
Processor state updating instructions cycle timing behavior .................................................. |
16-15 |
Table 16-13 |
Cycle timing behavior for stores and loads, other than loads to the PC ............................. |
.... 16-16 |
Table 16-14 |
Cycle timing behavior for loads to the PC ........................................................................... |
.... 16-17 |
Table 16-15 |
<addr_md_1cycle> and <addr_md_2cycle> LDR example instruction explanation ............... |
16-17 |
Table 16-16 |
Load and Store Double instructions cycle timing behavior ..................................................... |
16-19 |
Table 16-17 |
<addr_md_1cycle> and <addr_md_2cycle> LDRD example instruction explanation ............. |
16-19 |
Table 16-18 |
Cycle timing behavior of Load and Store Multiples, other than load multiples including the PC ....... |
|
|
16-21 |
|
Table 16-19 |
Cycle timing behavior of Load Multiples, where the PC is in the register list .......................... |
16-22 |
Table 16-20 |
RFE and SRS instructions cycle timing behavior ............................................................. |
....... 16-23 |
Table 16-21 |
Synchronization Instructions cycle timing behavior ................................................................ |
16-24 |
Table 16-22 |
Coprocessor Instructions cycle timing behavior ...................................................................... |
16-25 |
Table 16-23 |
SVC, BKPT, undefined, prefetch aborted instructions cycle timing behavior ......................... |
16-26 |
Table 17-1 |
Global signals ........................................................................................................................... |
17-3 |
Table 17-2 |
AXI signals ................................................................................................................................ |
17-3 |
Table 17-3 |
Coprocessor signals ................................................................................................................. |
17-4 |
Table 17-4 |
ETM interface signals ............................................................................................................... |
17-5 |
Table 17-5 |
Interrupt signals ........................................................................................................................ |
17-5 |
Table 17-6 |
Debug interface signals ............................................................................................................ |
17-5 |
Table 17-7 |
Test signals ............................................................................................................................... |
17-6 |
Table 17-8 |
Static configuration signals ....................................................................................................... |
17-6 |
Table 17-9 |
TrustZone internal signals ......................................................................................................... |
17-6 |
Table A-1 |
Global signals ............................................................................................................................. |
A-2 |
Table A-2 |
Static configuration signals ......................................................................................................... |
A-4 |
Table A-3 |
TrustZone internal signals ........................................................................................................... |
A-5 |
Table A-4 |
Interrupt signals .......................................................................................................................... |
A-6 |
Table A-5 |
Port signal name suffixes ............................................................................................................ |
A-7 |
Table A-6 |
Instruction read port AXI signal implementation ......................................................................... |
A-8 |
Table A-7 |
Data port AXI signal implementation ........................................................................................... |
A-9 |
Table A-8 |
Peripheral port AXI signal implementation ................................................................................ |
A-10 |
Table A-9 |
DMA port signals ....................................................................................................................... |
A-11 |
Table A-10 |
Core to coprocessor signals ..................................................................................................... |
A-12 |
Table A-11 |
Coprocessor to core signals ..................................................................................................... |
A-12 |
Table A-12 |
Debug interface signals ............................................................................................................ |
A-14 |
Table A-13 |
ETM interface signals ............................................................................................................... |
A-15 |
Table A-14 |
Test signals ............................................................................................................................... |
A-16 |
Table B-1 |
TCM for ARM1176JZ-S processors ............................................................................................ |
B-6 |
Table B-2 |
CP15 c15 features common to ARM1136J-S and ARM1176JZ-S processors ........................... |
B-7 |
Table B-3 |
CP15 c15 only found in ARM1136J-S processors ...................................................................... |
B-8 |
Table C-1 |
Differences between issue G and issue H .................................................................................. |
C-1 |
ARM DDI 0333H |
Copyright © 2004-2009 ARM Limited. All rights reserved. |
xiii |
ID012410 |
Non-Confidential, Unrestricted Access |
|