System Control
ARM DDI 0500D Copyright © 2013-2014 ARM. All rights reserved. 4-63
ID021414 Non-Confidential
[24] TPU
Traps cache maintenance instructions to Point of Unification (POU).
a
The possible values are:
0
Cache maintenance instructions are not trapped. This is the reset value.
1
Cache maintenance instructions to the POU executed from Non-secure EL1 or EL0 that are not
UNDEFINED are trapped to EL2.
[23] TPC
Traps data or unified cache maintenance instructions to Point of Coherency (POC).
a
The possible values are:
0
Data or unified cache maintenance instructions are not trapped. This is the reset value.
1
Data or unified cache maintenance instructions by address to the POC executed from
Non-secure EL1 or EL0 that are not UNDEFINED are trapped to EL2.
[22] TSW
Traps data or unified cache maintenance instructions by Set or Way.
a
The possible values are:
0
Data or unified cache maintenance instructions are not trapped. This is the reset value.
1
Data or unified cache maintenance instructions by Set or Way executed from Non-secure EL1
that are not UNDEFINED are trapped to EL2.are not trapped.
[21] TACR Traps Auxiliary Control registers. The possible values are:
0
Accesses to Auxiliary Control registers are not trapped. This is the reset value.
1
Accesses to ACTLR in AArch32 state or the ACTLR_EL1 in the AArch64 state from
Non-secure EL1 are trapped to EL2.
[20] TIDCP Trap Implementation Dependent functionality. When 1, this causes accesses to the following instruction set
space executed from Non-secure EL1 to be trapped to EL2:
AArch32 All CP15
MCR
and
MRC
instructions as follows:
• CRn is 9, Opcode1 is 0 to 7, CRm is c0, c1, c2, c5, c6, c7, or c8, and Opcode2 is 0 to 7.
• CRn is 10, Opcode1 is 0 to 7, CRm is c0, c1, c4, or c8, and Opcode2 is 0 to 7.
• CRn is 11, Opcode1 is 0 to 7, CRm is c0 to c8, or c15, and Opcode2 is 0 to 7.
AArch64 Reserved control space for
IMPLEMENTATION DEFINED functionality.
Accesses from EL0 are UNDEFINED. The reset value is 0.
[19] TSC Traps
SMC
instruction. The possible values are:
0
SMC
instruction in not trapped. This is the reset value.
1
SMC
instruction executed in Non-secure EL1 is trapped to EL2 for AArch32 and AArch64
Execution states.
[18] TID3
Traps ID group 3 registers.
a
The possible values are:
0
ID group 3 register accesses are not trapped. This is the reset value.
1
Reads to ID group 3 registers executed from Non-secure EL1 are trapped to EL2.
[17] TID2
Traps ID group 2 registers.
a
The possible values are:
0
ID group 2 register accesses are not trapped. This is the reset value.
1
Reads to ID group 2 registers and writes to CSSELR and CSSELR_EL1executed from
Non-secure EL1 or EL0, if not UNDEFINED, are trapped to EL2.
[16] TID1
Traps ID group 1 registers.
a
The possible values are:
0
ID group 1 register accesses are not trapped. This is the reset value.
1
Reads to ID group 1registers executed from Non-secure EL1 are trapped to EL2.
[15] TID0
Traps ID group 0 registers.
a
The possible values are:
0
ID group 0 register accesses are not trapped. This is the reset value.
1
Reads to ID group 0 registers executed from Non-secure EL1 are trapped to EL2.
Table 4-72 HCR_EL2 bit assignments (continued)
Bits Name Function