The GICV_CTLR characteristics are:
Controls the behavior of virtual interrupts.
This register corresponds to the physical CPU interface register GICC_CTLR.
This register is present only when FEAT_GICv3_LEGACY is implemented and EL2 is implemented. Otherwise, direct accesses to GICV_CTLR are RES0.
This register is available when a GIC implementation supports interrupt virtualization.
GICV_CTLR is a 32-bit register.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
RES0 | EOImode | RES0 | CBPR | FIQEn | AckCtl | EnableGrp1 | EnableGrp0 |
Reserved, RES0.
Controls the behavior associated with the GICV_EOIR, GICV_AEOIR, and GICV_DIR registers:
EOImode | Meaning |
---|---|
0b0 | Writes to GICV_EOIR and GICV_AEOIR perform priority drop and deactivate interrupt operations simultaneously. Behavior on a write to GICV_DIR is unpredictable. When it has completed processing the interrupt, the virtual machine writes to GICV_EOIR or GICV_AEOIR to deactivate the interrupt. The write updates the List registers and causes the virtual CPU interface to signal the interrupt completion to the physical Distributor. |
0b1 | Writes to GICV_EOIR and GICV_AEOIR perform priority drop operation only. Writes to GICV_DIR perform deactivate interrupt operation only. When it has completed processing the interrupt, the virtual machine writes to GICV_DIR to deactivate the interrupt. The write updates the List registers and causes the virtual CPU interface to signal the interrupt completion to the Distributor. |
The reset behavior of this field is:
Reserved, RES0.
Controls whether GICV_BPR affects both Group 0 and Group 1 interrupts:
CBPR | Meaning |
---|---|
0b0 |
GICV_BPR affects Group 0 virtual interrupts only. GICV_ABPR affects Group 1 virtual interrupts only. |
0b1 |
GICV_BPR affects both Group 0 and Group 1 virtual interrupts. |
For more information, see 'Priority grouping' in ARM® Generic Interrupt Controller Architecture Specification, GIC architecture version 3.0 and version 4.0 (ARM IHI 0069).
The reset behavior of this field is:
FIQ Enable. Controls whether Group 0 virtual interrupts are presented as virtual FIQs:
FIQEn | Meaning |
---|---|
0b0 |
Group 0 virtual interrupts are presented as virtual IRQs. |
0b1 |
Group 0 virtual interrupts are presented as virtual FIQs. |
The reset behavior of this field is:
Arm deprecates use of this bit. Arm strongly recommends that software is written to operate with this bit always cleared to 0.
Acknowledge control. When the highest priority interrupt is Group 1, determines whether GICV_IAR causes the CPU interface to acknowledge the interrupt or returns the spurious identifier 1022, and whether GICV_HPPIR returns the interrupt ID or the special identifier 1022.
AckCtl | Meaning |
---|---|
0b0 |
If the highest priority pending interrupt is Group 1, a read of GICV_IAR or GICV_HPPIR returns an interrupt ID of 1022. |
0b1 |
If the highest priority pending interrupt is Group 1, a read of GICV_IAR or GICV_HPPIR returns the interrupt ID of the corresponding interrupt. |
The reset behavior of this field is:
Enables the signaling of Group 1 virtual interrupts by the virtual CPU interface to the virtual machine:
EnableGrp1 | Meaning |
---|---|
0b0 |
Signaling of Group 1 interrupts is disabled. |
0b1 |
Signaling of Group 1 interrupts is enabled. |
The reset behavior of this field is:
Enables the signaling of Group 0 virtual interrupts by the virtual CPU interface to the virtual machine:
EnableGrp0 | Meaning |
---|---|
0b0 |
Signaling of Group 0 interrupts is disabled. |
0b1 |
Signaling of Group 0 interrupts is enabled. |
The reset behavior of this field is:
This register is used only when System register access is not enabled. When System register access is enabled:
Component | Offset | Instance |
---|---|---|
GIC Virtual CPU interface | 0x0000 | GICV_CTLR |
This interface is accessible as follows:
26/03/2024 09:49; 67c0ae5282a7629ba0ea0ba7267b43cd4f7939f6
Copyright © 2010-2024 Arm Limited or its affiliates. All rights reserved. This document is Non-Confidential.