System Control
ARM DDI 0388I Copyright © 2008-2012 ARM. All rights reserved. 4-27
ID073015 Non-Confidential
Attempts to read or write the SCTLR from secure or Non-secure User modes result in an
Undefined Instruction exception.
Attempts to write to this register in secure privileged mode when CP15SDISABLE is HIGH
result in an Undefined Instruction exception.
Attempts to write secure modify only bits in non-secure privileged modes are ignored.
Attempts to read secure modify only bits return the secure bit value.
Attempts to modify RO bits are ignored.
To access the SCTRL, read or write the CP15 register with:
MRC p15, 0,<Rd>, c1, c0, 0; Read SCTLR
MCR p15, 0,<Rd>, c1, c0, 0; Write SCTLR
4.3.10 Auxiliary Control Register
The ACTLR characteristics are:
Purpose Controls:
• parity checking, if implemented
• allocation in one way
• exclusive caching with the L2 cache
• coherency mode, Symmetric Multiprocessing (SMP) or Asymmetric
Multiprocessing (AMP)
• speculative accesses on AXI
• broadcast of cache, branch predictor, and TLB maintenance
operations
• write full line of zeros mode optimization for L2C-310 cache
requests.
Usage constraints The ACTLR is:
• Only accessible in privileged modes.
• Common to the Secure and Non-secure states.
• RW in Secure state.
• RO in Non-secure state if NSACR.NS_SMP = 0.
[2] C bit Banked Determines if data can be cached at any available cache level:
0 Data caching disabled at all levels. This is the reset value.
1 Data caching enabled.
[1] A bit Banked Enables strict alignment of data to detect alignment faults in data accesses:
0 Strict alignment fault checking disabled. This is the reset value.
1 Strict alignment fault checking enabled.
[0] M bit Banked Enables the MMU:
0 MMU disabled. This is the reset value.
1 MMU enabled.
Table 4-35 SCTLR bit assignments (continued)
Bits Name Access Function