SCTLR_EL1, System Control Register (EL1)
The SCTLR_EL1 characteristics are:
Purpose
Provides top level control of the system, including its memory system, at EL1 and EL0.
Configuration
AArch64 System register SCTLR_EL1 bits [31:0] are architecturally mapped to AArch32 System register SCTLR[31:0] .
Attributes
SCTLR_EL1 is a 64-bit register.
Field descriptions
The SCTLR_EL1 bit assignments are:
63 | 62 | 61 | 60 | 59 | 58 | 57 | 56 | 55 | 54 | 53 | 52 | 51 | 50 | 49 | 48 | 47 | 46 | 45 | 44 | 43 | 42 | 41 | 40 | 39 | 38 | 37 | 36 | 35 | 34 | 33 | 32 |
RES0 | EnCSR0 | EPAN | EnALS | EnAS0 | EnASR | TME | TME0 | TMT | TMT0 | TWEDEL | TWEDEn | DSSBS | ATA | ATA0 | TCF | TCF0 | ITFSB | BT1 | BT0 | RES0 | |||||||||||
EnIA | EnIB | LSMAOE | nTLSMD | EnDA | UCI | EE | E0E | SPAN | EIS | IESB | TSCXT | WXN | nTWE | RES0 | nTWI | UCT | DZE | EnDB | I | EOS | EnRCTX | UMA | SED | ITD | nAA | CP15BEN | SA0 | SA | C | A | M |
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
Bits [63:60]
Reserved, RES0.
EnCSR0, bits [59:58]
When FEAT_CSRE is implemented:
When FEAT_CSRE is implemented:
EL0 Call Stack Recorder Enable.
Controls access to the EL0 Call Stack Recorder registers from EL0:
- When EL2 is implemented and enabled for the current Security state and HCR_EL2.{E2H, TGE} == {0, 1}, this field controls traps to EL2.
- When EL2 is not implemented, EL2 is not enabled for the current Security state, or HCR_EL2.TGE == 0b0, this field controls traps to EL1.
- Otherwise, this field has no effect.
EnCSR0 | Meaning |
---|---|
0b00 |
Trap EL0 read and write accesses to EL0 Call Stack Recorder registers. |
0b01 |
Trap EL0 write accesses to CSRCR_EL0 and CSRPTR_EL0 and EL0 read accesses to CSRPTR_EL0. |
0b11 |
This field does not cause any instructions to be trapped. |
All other values are reserved.
The EL0 Call Stack recorder registers trapped by this control are: CSRCR_EL0, CSRIDR_EL0, CSRPTRIDX_EL0, and CSRPTR_EL0.
Traps are reported using an ESR_ELx.EC value of 0x18.
Traps are not taken if there is a higher priority exception generated by the access.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
EPAN, bit [57]
When FEAT_PAN3 is implemented:
When FEAT_PAN3 is implemented:
Enhanced Privileged Access Never. When PSTATE.PAN is 1, determines whether an EL1 data access to a page with stage 1 EL0 instruction access permission generates a Permission fault as a result of the Privileged Access Never mechanism.
EPAN | Meaning |
---|---|
0b0 |
No additional Permission faults are generated by this mechanism. |
0b1 | An EL1 data access to a page with stage 1 EL0 data access permission or stage 1 EL0 instruction access permission generates a Permission fault. Any speculative data accesses that would generate a Permission fault if the accesses were not speculative will not cause an allocation into a cache. |
This bit is permitted to be cached in a TLB.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
EnALS, bit [56]
When FEAT_LS64 is implemented:
When FEAT_LS64 is implemented:
When HCR_EL2.{E2H, TGE} != {1, 1}, traps execution of an LD64B or ST64B instruction at EL0 to EL1.
EnALS | Meaning |
---|---|
0b0 |
Execution of an LD64B or ST64B instruction at EL0 is trapped to EL1. |
0b1 |
This control does not cause any instructions to be trapped. |
A trap of an LD64B or ST64B instruction is reported using an ESR_ELx.EC value of 0x0A, with an ISS code of 0x0000002.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
EnAS0, bit [55]
When FEAT_LS64 is implemented:
When FEAT_LS64 is implemented:
When HCR_EL2.{E2H, TGE} != {1, 1}, traps execution of an ST64BV0 instruction at EL0 to EL1.
EnAS0 | Meaning |
---|---|
0b0 |
Execution of an ST64BV0 instruction at EL0 is trapped to EL1. |
0b1 |
This control does not cause any instructions to be trapped. |
A trap of an ST64BV0 instruction is reported using an ESR_ELx.EC value of 0x0A, with an ISS code of 0x0000001.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
EnASR, bit [54]
When FEAT_LS64 is implemented:
When FEAT_LS64 is implemented:
When HCR_EL2.{E2H, TGE} != {1, 1}, traps execution of an ST64BV instruction at EL0 to EL1.
EnASR | Meaning |
---|---|
0b0 |
Execution of an ST64BV instruction at EL0 is trapped to EL1. |
0b1 |
This control does not cause any instructions to be trapped. |
A trap of an ST64BV instruction is reported using an ESR_ELx.EC value of 0x0A, with an ISS code of 0x0000000.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TME, bit [53]
When FEAT_TME is implemented:
When FEAT_TME is implemented:
Enables the Transactional Memory Extension at EL1.
TME | Meaning |
---|---|
0b0 |
Any attempt to execute a TSTART instruction at EL1 is trapped to EL1, unless HCR_EL2.TME or SCR_EL3.TME causes TSTART instructions to be UNDEFINED at EL1. |
0b1 |
This control does not cause any TSTART instruction to be trapped. |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TME0, bit [52]
When FEAT_TME is implemented:
When FEAT_TME is implemented:
Enables the Transactional Memory Extension at EL0.
TME0 | Meaning |
---|---|
0b0 |
Any attempt to execute a TSTART instruction at EL0 is trapped to EL1, unless HCR_EL2.TME or SCR_EL3.TME causes TSTART instructions to be UNDEFINED at EL0. |
0b1 |
This control does not cause any TSTART instruction to be trapped. |
If FEAT_VHE is implemented, EL2 is implemented and enabled in the current Security state, and HCR_EL2.{E2H, TGE} == {1,1}, this field has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TMT, bit [51]
When FEAT_TME is implemented:
When FEAT_TME is implemented:
Forces a trivial implementation of the Transactional Memory Extension at EL1.
TMT | Meaning |
---|---|
0b0 |
This control does not cause any TSTART instruction to fail. |
0b1 |
When the TSTART instruction is executed at EL1, the transaction fails with a TRIVIAL failure cause. |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TMT0, bit [50]
When FEAT_TME is implemented:
When FEAT_TME is implemented:
Forces a trivial implementation of the Transactional Memory Extension at EL0.
TMT0 | Meaning |
---|---|
0b0 |
This control does not cause any TSTART instruction to fail. |
0b1 |
When the TSTART instruction is executed at EL0, the transaction fails with a TRIVIAL failure cause. |
If FEAT_VHE is implemented, EL2 is implemented and enabled in the current Security state, and HCR_EL2.{E2H, TGE} == {1,1}, this field has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TWEDEL, bits [49:46]
When FEAT_TWED is implemented:
When FEAT_TWED is implemented:
TWE Delay. A 4-bit unsigned number that, when SCTLR_EL1.TWEDEn is 1, encodes the minimum delay in taking a trap of WFE* caused by SCTLR_EL1.nTWE as 2(TWEDEL + 8) cycles.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TWEDEn, bit [45]
When FEAT_TWED is implemented:
When FEAT_TWED is implemented:
TWE Delay Enable. Enables a configurable delayed trap of the WFE* instruction caused by SCTLR_EL1.nTWE.
TWEDEn | Meaning |
---|---|
0b0 |
The delay for taking the trap is IMPLEMENTATION DEFINED. |
0b1 |
The delay for taking the trap is at least the number of cycles defined in SCTLR_EL1.TWEDEL. |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
DSSBS, bit [44]
When FEAT_SSBS is implemented:
When FEAT_SSBS is implemented:
Default PSTATE.SSBS value on Exception Entry. The defined values are:
DSSBS | Meaning |
---|---|
0b0 |
PSTATE.SSBS is set to 0 on an exception to EL1. |
0b1 |
PSTATE.SSBS is set to 1 on an exception to EL1. |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an IMPLEMENTATION DEFINED value.
Otherwise:
Otherwise:
Reserved, RES0.
ATA, bit [43]
When FEAT_MTE2 is implemented:
When FEAT_MTE2 is implemented:
Allocation Tag Access in EL1. When SCR_EL3.ATA=1 and HCR_EL2.ATA=1, controls EL1 access to Allocation Tags.
When access to Allocation Tags is prevented:
-
Instructions which Load or Store data are Unchecked.
-
Instructions which Load or Store Allocation Tags treat the Allocation Tag as RAZ/WI.
-
Instructions which insert Logical Address Tags into addresses treat the Allocation Tag used to generate the Logical Address Tag as 0.
-
Cache maintenance instructions which invalidate Allocation Tags from caches behave as the equivalent Clean and Invalidate operation on Allocation Tags.
ATA | Meaning |
---|---|
0b0 |
Access to Allocation Tags is prevented. |
0b1 |
Access to Allocation Tags is not prevented. |
This bit is permitted to be cached in a TLB.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
ATA0, bit [42]
When FEAT_MTE2 is implemented:
When FEAT_MTE2 is implemented:
Allocation Tag Access in EL0. When SCR_EL3.ATA=1, HCR_EL2.ATA=1, and HCR_EL2.{E2H, TGE} != {1, 1}, controls EL0 access to Allocation Tags.
When access to Allocation Tags is prevented:
-
Instructions which Load or Store data are Unchecked.
-
Instructions which Load or Store Allocation Tags treat the Allocation Tag as RAZ/WI.
-
Instructions which insert Logical Address Tags into addresses treat the Allocation Tag used to generate the Logical Address Tag as 0.
-
Cache maintenance instructions which invalidate Allocation Tags from caches behave as the equivalent Clean and Invalidate operation on Allocation Tags.
ATA0 | Meaning |
---|---|
0b0 |
Access to Allocation Tags is prevented. |
0b1 |
Access to Allocation Tags is not prevented. |
This field is permitted to be cached in a TLB.
Software may change this control bit on a context switch.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TCF, bits [41:40]
When FEAT_MTE2 is implemented:
When FEAT_MTE2 is implemented:
Tag Check Fault in EL1. Controls the effect of Tag Check Faults due to Loads and Stores in EL1.
If FEAT_MTE3 is not implemented, the value 0b11 is reserved.
TCF | Meaning | Applies when |
---|---|---|
0b00 |
Tag Check Faults have no effect on the PE. | |
0b01 |
Tag Check Faults cause a synchronous exception. | |
0b10 |
Tag Check Faults are asynchronously accumulated. | |
0b11 |
Tag Check Faults cause a synchronous exception on reads, and are asynchronously accumulated on writes. | When FEAT_MTE3 is implemented |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TCF0, bits [39:38]
When FEAT_MTE2 is implemented:
When FEAT_MTE2 is implemented:
Tag Check Fault in EL0. When HCR_EL2.{E2H,TGE} != {1,1}, controls the effect of Tag Check Faults due to Loads and Stores in EL0.
If FEAT_MTE3 is not implemented, the value 0b11 is reserved.
Software may change this control bit on a context switch.
TCF0 | Meaning | Applies when |
---|---|---|
0b00 |
Tag Check Faults have no effect on the PE. | |
0b01 |
Tag Check Faults cause a synchronous exception. | |
0b10 |
Tag Check Faults are asynchronously accumulated. | |
0b11 |
Tag Check Faults cause a synchronous exception on reads, and are asynchronously accumulated on writes. | When FEAT_MTE3 is implemented |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
ITFSB, bit [37]
When FEAT_MTE2 is implemented:
When FEAT_MTE2 is implemented:
When synchronous exceptions are not being generated by Tag Check Faults, this field controls whether on exception entry into EL1, all Tag Check Faults due to instructions executed before exception entry, that are reported asynchronously, are synchronized into TFSRE0_EL1 and TFSR_EL1 registers.
ITFSB | Meaning |
---|---|
0b0 |
Tag Check Faults are not synchronized on entry to EL1. |
0b1 |
Tag Check Faults are synchronized on entry to EL1. |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
BT1, bit [36]
When FEAT_BTI is implemented:
When FEAT_BTI is implemented:
PAC Branch Type compatibility at EL1.
BT1 | Meaning |
---|---|
0b0 |
When the PE is executing at EL1, PACIASP and PACIBSP are compatible with PSTATE.BTYPE == 0b11. |
0b1 |
When the PE is executing at EL1, PACIASP and PACIBSP are not compatible with PSTATE.BTYPE == 0b11. |
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
BT0, bit [35]
When FEAT_BTI is implemented:
When FEAT_BTI is implemented:
PAC Branch Type compatibility at EL0.
BT0 | Meaning |
---|---|
0b0 |
When the PE is executing at EL0, PACIASP and PACIBSP are compatible with PSTATE.BTYPE == 0b11. |
0b1 |
When the PE is executing at EL0, PACIASP and PACIBSP are not compatible with PSTATE.BTYPE == 0b11. |
When HCR_EL2.E2H == 1 && HCR_EL2.TGE == 1, the value of the SCTLR_EL1.BT0 has no effect on execution at EL0
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
Bits [34:32]
Reserved, RES0.
EnIA, bit [31]
When FEAT_PAuth is implemented:
When FEAT_PAuth is implemented:
Controls enabling of pointer authentication (using the APIAKey_EL1 key) of instruction addresses in the EL1&0 translation regime.
For more information, see 'System register control of pointer authentication'.
EnIA | Meaning |
---|---|
0b0 |
Pointer authentication (using the APIAKey_EL1 key) of instruction addresses is not enabled. |
0b1 |
Pointer authentication (using the APIAKey_EL1 key) of instruction addresses is enabled. |
This field controls the behavior of the AddPACIA and AuthIA pseudocode functions. Specifically, when the field is 1, AddPACIA returns a copy of a pointer to which a pointer authentication code has been added, and AuthIA returns an authenticated copy of a pointer. When the field is 0, both of these functions are NOP.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
EnIB, bit [30]
When FEAT_PAuth is implemented:
When FEAT_PAuth is implemented:
Controls enabling of pointer authentication (using the APIBKey_EL1 key) of instruction addresses in the EL1&0 translation regime.
For more information, see 'System register control of pointer authentication'.
EnIB | Meaning |
---|---|
0b0 |
Pointer authentication (using the APIBKey_EL1 key) of instruction addresses is not enabled. |
0b1 |
Pointer authentication (using the APIBKey_EL1 key) of instruction addresses is enabled. |
This field controls the behavior of the AddPACIB and AuthIB pseudocode functions. Specifically, when the field is 1, AddPACIB returns a copy of a pointer to which a pointer authentication code has been added, and AuthIB returns an authenticated copy of a pointer. When the field is 0, both of these functions are NOP.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
LSMAOE, bit [29]
When FEAT_LSMAOC is implemented:
When FEAT_LSMAOC is implemented:
Load Multiple and Store Multiple Atomicity and Ordering Enable.
LSMAOE | Meaning |
---|---|
0b0 |
For all memory accesses at EL0, A32 and T32 Load Multiple and Store Multiple can have an interrupt taken during the sequence memory accesses, and the memory accesses are not required to be ordered. |
0b1 |
The ordering and interrupt behavior of A32 and T32 Load Multiple and Store Multiple at EL0 is as defined for Armv8.0. |
This bit is permitted to be cached in a TLB.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1,1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
nTLSMD, bit [28]
When FEAT_LSMAOC is implemented:
When FEAT_LSMAOC is implemented:
No Trap Load Multiple and Store Multiple to Device-nGRE/Device-nGnRE/Device-nGnRnE memory.
nTLSMD | Meaning |
---|---|
0b0 |
All memory accesses by A32 and T32 Load Multiple and Store Multiple at EL0 that are marked at stage 1 as Device-nGRE/Device-nGnRE/Device-nGnRnE memory are trapped and generate a stage 1 Alignment fault. |
0b1 |
All memory accesses by A32 and T32 Load Multiple and Store Multiple at EL0 that are marked at stage 1 as Device-nGRE/Device-nGnRE/Device-nGnRnE memory are not trapped. |
This bit is permitted to be cached in a TLB.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1,1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
EnDA, bit [27]
When FEAT_PAuth is implemented:
When FEAT_PAuth is implemented:
Controls enabling of pointer authentication (using the APDAKey_EL1 key) of instruction addresses in the EL1&0 translation regime.
For more information, see 'System register control of pointer authentication'.
EnDA | Meaning |
---|---|
0b0 |
Pointer authentication (using the APDAKey_EL1 key) of data addresses is not enabled. |
0b1 |
Pointer authentication (using the APDAKey_EL1 key) of data addresses is enabled. |
This field controls the behavior of the AddPACDA and AuthDA pseudocode functions. Specifically, when the field is 1, AddPACDA returns a copy of a pointer to which a pointer authentication code has been added, and AuthDA returns an authenticated copy of a pointer. When the field is 0, both of these functions are NOP.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
UCI, bit [26]
Traps EL0 execution of cache maintenance instructions, to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1, from AArch64 state only, reported using an ESR_ELx.EC value of 0x18.
This applies to DC CVAU, DC CIVAC, DC CVAC, DC CVAP, and IC IVAU.
If FEAT_DPB2 is implemented, this trap also applies to DC CVADP.
If FEAT_MTE2 is implemented, this trap also applies to DC CIGVAC, DC CIGDVAC, DC CGVAC, DC CGDVAC, DC CGVAP, and DC CGDVAP.
If FEAT_DPB2 and FEAT_MTE2 are implemented, this trap also applies to DC CGVADP and DC CGDVADP.
UCI | Meaning |
---|---|
0b0 |
Execution of the specified instructions at EL0 using AArch64 is trapped. |
0b1 |
This control does not cause any instructions to be trapped. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
If the Point of Coherency is before any level of data cache, it is IMPLEMENTATION DEFINED whether the execution of any data or unified cache clean, or clean and invalidate instruction that operates by VA to the point of coherency can be trapped when the value of this control is 1.
If the Point of Unification is before any level of data cache, it is IMPLEMENTATION DEFINED whether the execution of any data or unified cache clean by VA to the Point of Unification instruction can be trapped when the value of this control is 1.
If the Point of Unification is before any level of instruction cache, it is IMPLEMENTATION DEFINED whether the execution of any instruction cache invalidate by VA to the Point of Unification instruction can be trapped when the value of this control is 1.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
EE, bit [25]
Endianness of data accesses at EL1, and stage 1 translation table walks in the EL1&0 translation regime.
The possible values of this bit are:
EE | Meaning |
---|---|
0b0 |
Explicit data accesses at EL1, and stage 1 translation table walks in the EL1&0 translation regime are little-endian. |
0b1 |
Explicit data accesses at EL1, and stage 1 translation table walks in the EL1&0 translation regime are big-endian. |
If an implementation does not provide Big-endian support at Exception Levels higher than EL0, this bit is RES0.
If an implementation does not provide Little-endian support at Exception Levels higher than EL0, this bit is RES1.
The EE bit is permitted to be cached in a TLB.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on the PE.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an IMPLEMENTATION DEFINED value.
E0E, bit [24]
Endianness of data accesses at EL0.
The possible values of this bit are:
E0E | Meaning |
---|---|
0b0 |
Explicit data accesses at EL0 are little-endian. |
0b1 |
Explicit data accesses at EL0 are big-endian. |
If an implementation only supports Little-endian accesses at EL0 then this bit is RES0. This option is not permitted when SCTLR_EL1.EE is RES1.
If an implementation only supports Big-endian accesses at EL0 then this bit is RES1. This option is not permitted when SCTLR_EL1.EE is RES0.
This bit has no effect on the endianness of LDTR, LDTRH, LDTRSH, LDTRSW, STTR, and STTRH instructions executed at EL1.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
SPAN, bit [23]
When FEAT_PAN is implemented:
When FEAT_PAN is implemented:
Set Privileged Access Never, on taking an exception to EL1.
SPAN | Meaning |
---|---|
0b0 |
PSTATE.PAN is set to 1 on taking an exception to EL1. |
0b1 |
The value of PSTATE.PAN is left unchanged on taking an exception to EL1. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
EIS, bit [22]
When FEAT_ExS is implemented:
When FEAT_ExS is implemented:
Exception Entry is Context Synchronizing. The defined values are:
EIS | Meaning |
---|---|
0b0 |
The taking of an exception to EL1 is not a context synchronizing event. |
0b1 |
The taking of an exception to EL1 is a context synchronizing event. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1,1}, this bit has no effect on execution at EL0.
If SCTLR_EL1.EIS is set to 0b0:
- Indirect writes to ESR_EL1, FAR_EL1, SPSR_EL1, ELR_EL1 are synchronized on exception entry to EL1, so that a direct read of the register after exception entry sees the indirectly written value caused by the exception entry.
- Memory transactions, including instruction fetches, from an Exception level always use the translation resources associated with that translation regime.
- Exception Catch debug events are synchronous debug events.
- DCPS* and DRPS instructions are context synchronization events.
The following are not affected by the value of SCTLR_EL1.EIS:
- Changes to the PSTATE information on entry to EL1.
- Behavior of accessing the banked copies of the stack pointer using the SP register name for loads, stores and data processing instructions.
- Exit from Debug state.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
IESB, bit [21]
When FEAT_IESB is implemented:
When FEAT_IESB is implemented:
Implicit Error Synchronization event enable. Possible values are:
IESB | Meaning |
---|---|
0b0 |
Disabled. |
0b1 | An implicit error synchronization event is added:
|
When the PE is in Debug state, the effect of this field is CONSTRAINED UNPREDICTABLE, and its Effective value might be 0 or 1 regardless of the value of the field. If the Effective value of the field is 1, then an implicit error synchronization event is added after each DCPSx instruction taken to EL1 and before each DRPS instruction executed at EL1, in addition to the other cases where it is added.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
TSCXT, bit [20]
When FEAT_CSV2 is implemented:
When FEAT_CSV2 is implemented:
Trap EL0 Access to the SCXTNUM_EL0 register, when EL0 is using AArch64. The defined values are:
TSCXT | Meaning |
---|---|
0b0 |
EL0 access to SCXTNUM_EL0 is not disabled by this mechanism. |
0b1 | EL0 access to SCXTNUM_EL0 is disabled, causing an exception to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1. The value of SCXTNUM_EL0 is treated as 0. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1,1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
WXN, bit [19]
Write permission implies XN (Execute-never). For the EL1&0 translation regime, this bit can force all memory regions that are writable to be treated as XN. The possible values of this bit are:
WXN | Meaning |
---|---|
0b0 |
This control has no effect on memory access permissions. |
0b1 |
Any region that is writable in the EL1&0 translation regime is forced to XN for accesses from software executing at EL1 or EL0. |
This bit applies only when SCTLR_EL1.M bit is set.
The WXN bit is permitted to be cached in a TLB.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on the PE.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
nTWE, bit [18]
Traps EL0 execution of WFE instructions to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1, from both Execution states, reported using an ESR_ELx.EC value of 0x01.
When FEAT_WFxT is implemented, this trap also applies to the WFET instruction.
nTWE | Meaning |
---|---|
0b0 |
Any attempt to execute a WFE instruction at EL0 is trapped, if the instruction would otherwise have caused the PE to enter a low-power state. |
0b1 |
This control does not cause any instructions to be trapped. |
In AArch32 state, the attempted execution of a conditional WFE instruction is only trapped if the instruction passes its condition code check.
Since a WFE or WFI can complete at any time, even without a Wakeup event, the traps on WFE of WFI are not guaranteed to be taken, even if the WFE or WFI is executed when there is no Wakeup event. The only guarantee is that if the instruction does not complete in finite time in the absence of a Wakeup event, the trap will be taken.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Bit [17]
Reserved, RES0.
nTWI, bit [16]
Traps EL0 execution of WFI instructions to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1, from both Execution states, reported using an ESR_ELx.EC value of 0x01.
When FEAT_WFxT is implemented, this trap also applies to the WFIT instruction.
nTWI | Meaning |
---|---|
0b0 |
Any attempt to execute a WFI instruction at EL0 is trapped, if the instruction would otherwise have caused the PE to enter a low-power state. |
0b1 |
This control does not cause any instructions to be trapped. |
In AArch32 state, the attempted execution of a conditional WFI instruction is only trapped if the instruction passes its condition code check.
Since a WFE or WFI can complete at any time, even without a Wakeup event, the traps on WFE of WFI are not guaranteed to be taken, even if the WFE or WFI is executed when there is no Wakeup event. The only guarantee is that if the instruction does not complete in finite time in the absence of a Wakeup event, the trap will be taken.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
UCT, bit [15]
Traps EL0 accesses to the CTR_EL0 to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1, from AArch64 state only, reported using an ESR_ELx.EC value of 0x18.
UCT | Meaning |
---|---|
0b0 |
Accesses to the CTR_EL0 from EL0 using AArch64 are trapped. |
0b1 |
This control does not cause any instructions to be trapped. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
DZE, bit [14]
Traps EL0 execution of DC ZVA instructions to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1, from AArch64 state only, reported using an ESR_ELx.EC value of 0x18.
If FEAT_MTE2 is implemented, this trap also applies to DC GVA and DC GZVA.
DZE | Meaning |
---|---|
0b0 | Any attempt to execute an instruction that this trap applies to at EL0 using AArch64 is trapped. Reading DCZID_EL0.DZP from EL0 returns 1, indicating that the instructions this trap applies to are not supported. |
0b1 |
This control does not cause any instructions to be trapped. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
EnDB, bit [13]
When FEAT_PAuth is implemented:
When FEAT_PAuth is implemented:
Controls enabling of pointer authentication (using the APDBKey_EL1 key) of instruction addresses in the EL1&0 translation regime.
For more information, see 'System register control of pointer authentication'.
EnDB | Meaning |
---|---|
0b0 |
Pointer authentication (using the APDBKey_EL1 key) of data addresses is not enabled. |
0b1 |
Pointer authentication (using the APDBKey_EL1 key) of data addresses is enabled. |
This field controls the behavior of the AddPACDB and AuthDB pseudocode functions. Specifically, when the field is 1, AddPACDB returns a copy of a pointer to which a pointer authentication code has been added, and AuthDB returns an authenticated copy of a pointer. When the field is 0, both of these functions are NOP.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
I, bit [12]
Stage 1 instruction access Cacheability control, for accesses at EL0 and EL1:
I | Meaning |
---|---|
0b0 | All instruction access to Stage 1 Normal memory from EL0 and EL1 are Stage 1 Non-cacheable. If the value of SCTLR_EL1.M is 0, instruction accesses from stage 1 of the EL1&0 translation regime are to Normal, Outer Shareable, Inner Non-cacheable, Outer Non-cacheable memory. |
0b1 | This control has no effect on the Stage 1 Cacheability of instruction access to Stage 1 Normal memory from EL0 and EL1. If the value of SCTLR_EL1.M is 0, instruction accesses from stage 1 of the EL1&0 translation regime are to Normal, Outer Shareable, Inner Write-Through, Outer Write-Through memory. |
When the value of the HCR_EL2.DC bit is 1, then instruction access to Normal memory from EL0 and EL1 are Cacheable regardless of the value of the SCTLR_EL1.I bit.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on the PE.
On a Warm reset, in a system where the PE resets into EL1, this field resets to 0.
EOS, bit [11]
When FEAT_ExS is implemented:
When FEAT_ExS is implemented:
Exception Exit is Context Synchronizing. The defined values are:
EOS | Meaning |
---|---|
0b0 |
An exception return from EL1 is not a context synchronizing event |
0b1 |
An exception return from EL1 is a context synchronizing event |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1,1}, this bit has no effect on execution at EL0.
If SCTLR_EL1.EOS is set to 0b0:
- Memory transactions, including instruction fetches, from an Exception level always use the translation resources associated with that translation regime.
- Exception Catch debug events are synchronous debug events.
- DCPS* and DRPS instructions are context synchronization events.
The following are not affected by the value of SCTLR_EL1.EOS:
- The indirect write of the PSTATE and PC values from SPSR_EL1 and ELR_EL1 on exception return is synchronized.
- Behavior of accessing the banked copies of the stack pointer using the SP register name for loads, stores and data processing instructions.
- Exit from Debug state.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
EnRCTX, bit [10]
When FEAT_SPECRES is implemented:
When FEAT_SPECRES is implemented:
Enable EL0 Access to the following instructions:
-
AArch32 CFPRCTX, DVPRCTX and CPPRCTX instructions.
-
AArch64 CFP RCTX, DVP RCT and CPP RCTX instructions.
The defined values are:
EnRCTX | Meaning |
---|---|
0b0 |
EL0 access to these instructions is disabled, and these instructions are trapped to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1. |
0b1 |
EL0 access to these instructions is enabled. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1,1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
UMA, bit [9]
User Mask Access. Traps EL0 execution of MSR and MRS instructions that access the PSTATE.{D, A, I, F} masks to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1, from AArch64 state only, reported using an ESR_ELx.EC value of 0x18.
UMA | Meaning |
---|---|
0b0 |
Any attempt at EL0 using AArch64 to execute an MRS, MSR(register), or MSR(immediate) instruction that accesses the DAIF is trapped. |
0b1 |
This control does not cause any instructions to be trapped. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
SED, bit [8]
When EL0 is capable of using AArch32:
When EL0 is capable of using AArch32:
SETEND instruction disable. Disables SETEND instructions at EL0 using AArch32.
SED | Meaning |
---|---|
0b0 |
SETEND instruction execution is enabled at EL0 using AArch32. |
0b1 |
SETEND instructions are UNDEFINED at EL0 using AArch32 and any attempt at EL0 to access a SETEND instruction generates an exception to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1, reported using an ESR_ELx.EC value of 0x00. |
If the implementation does not support mixed-endian operation at any Exception level, this bit is RES1.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
ITD, bit [7]
When EL0 is capable of using AArch32:
When EL0 is capable of using AArch32:
IT Disable. Disables some uses of IT instructions at EL0 using AArch32.
ITD | Meaning |
---|---|
0b0 |
All IT instruction functionality is enabled at EL0 using AArch32. |
0b1 | Any attempt at EL0 using AArch32 to execute any of the following is UNDEFINED and generates an exception, reported using an ESR_ELx.EC value of 0x00, to EL1 or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1:
These instructions are always UNDEFINED, regardless of whether they would pass or fail the condition code check that applies to them as a result of being in an IT block. It is IMPLEMENTATION DEFINED whether the IT instruction is treated as:
This means that, for the situations that are UNDEFINED, either the second 16-bit instruction or the 32-bit instruction is UNDEFINED. An implementation might vary dynamically as to whether IT is treated as a 16-bit instruction or the first half of a 32-bit instruction. |
If an instruction in an active IT block that would be disabled by this field sets this field to 1 then behavior is CONSTRAINED UNPREDICTABLE. For more information see 'Changes to an ITD control by an instruction in an IT block'.
ITD is optional, but if it is implemented in the SCTLR then it must also be implemented in the SCTLR_EL1. If it is not implemented then this bit is RAZ/WI.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES1.
nAA, bit [6]
When FEAT_LSE2 is implemented:
When FEAT_LSE2 is implemented:
Non-aligned access. This bit controls generation of Alignment faults at EL1 and EL0 under certain conditions.
nAA | Meaning |
---|---|
0b0 |
LDAPR, LDAPRH, LDAPUR, LDAPURH, LDAPURSH, LDAPURSW, LDAR, LDARH, LDLAR, LDLARH, STLLR, STLLRH, STLR, STLRH, STLUR, and STLURH generate an Alignment fault if all bytes being accessed are not within a single 16-byte quantity, aligned to 16 bytes for accesses. |
0b1 |
This control bit does not cause LDAPR, LDAPRH, LDAPUR, LDAPURH, LDAPURSH, LDAPURSW, LDAR, LDARH, LDLAR, LDLARH, STLLR, STLLRH, STLR, STLRH, STLUR, or STLURH to generate an Alignment fault if all bytes being accessed are not within a single 16-byte quantity, aligned to 16 bytes. |
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
CP15BEN, bit [5]
When EL0 is capable of using AArch32:
When EL0 is capable of using AArch32:
System instruction memory barrier enable. Enables accesses to the DMB, DSB, and ISB System instructions in the (coproc==0b1111) encoding space from EL0:
CP15BEN | Meaning |
---|---|
0b0 |
EL0 using AArch32: EL0 execution of the CP15DMB, CP15DSB, and CP15ISB instructions is UNDEFINED and generates an exception to EL1, or to EL2 when it is implemented and enabled for the current Security state and HCR_EL2.TGE is 1. The exception is reported using an ESR_ELx.EC value of 0x00. |
0b1 |
EL0 using AArch32: EL0 execution of the CP15DMB, CP15DSB, and CP15ISB instructions is enabled. |
CP15BEN is optional, but if it is implemented in the SCTLR then it must also be implemented in the SCTLR_EL1. If it is not implemented then this bit is RAO/WI.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
Otherwise:
Otherwise:
Reserved, RES0.
SA0, bit [4]
SP Alignment check enable for EL0. When set to 1, if a load or store instruction executed at EL0 uses the SP as the base address and the SP is not aligned to a 16-byte boundary, then a SP alignment fault exception is generated. For more information, see 'SP alignment checking'.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
SA, bit [3]
SP Alignment check enable. When set to 1, if a load or store instruction executed at EL1 uses the SP as the base address and the SP is not aligned to a 16-byte boundary, then a SP alignment fault exception is generated. For more information, see 'SP alignment checking'.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on the PE.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
C, bit [2]
Stage 1 Cacheability control, for data accesses.
C | Meaning |
---|---|
0b0 |
All data access to Stage 1 Normal memory from EL0 and EL1, and all Normal memory accesses from unified cache to the EL1&0 Stage 1 translation tables, are treated as Stage 1 Non-cacheable. |
0b1 | This control has no effect on the Stage 1 Cacheability of:
|
When the value of the HCR_EL2.DC bit is 1, the PE ignores SCTLR.C. This means that Non-secure EL0 and Non-secure EL1 data accesses to Normal memory are Cacheable.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on the PE.
On a Warm reset, in a system where the PE resets into EL1, this field resets to 0.
A, bit [1]
Alignment check enable. This is the enable bit for Alignment fault checking at EL1 and EL0 .
A | Meaning |
---|---|
0b0 | Alignment fault checking disabled when executing at EL1 or EL0. Instructions that load or store one or more registers, other than load/store exclusive and load-acquire/store-release, do not check that the address being accessed is aligned to the size of the data element(s) being accessed. |
0b1 | Alignment fault checking enabled when executing at EL1 or EL0. All instructions that load or store one or more registers have an alignment check that the address being accessed is aligned to the size of the data element(s) being accessed. If this check fails it causes an Alignment fault, which is taken as a Data Abort exception. |
Load/store exclusive and load-acquire/store-release instructions have an alignment check regardless of the value of the A bit.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on execution at EL0.
On a Warm reset, in a system where the PE resets into EL1, this field resets to an architecturally UNKNOWN value.
M, bit [0]
MMU enable for EL1&0 stage 1 address translation.
M | Meaning |
---|---|
0b0 | EL1&0 stage 1 address translation disabled. See the SCTLR_EL1.I field for the behavior of instruction accesses to Normal memory. |
0b1 |
EL1&0 stage 1 address translation enabled. |
If the value of HCR_EL2.{DC, TGE} is not {0, 0} then in Non-secure state the PE behaves as if the value of the SCTLR_EL1.M field is 0 for all purposes other than returning the value of a direct read of the field.
When FEAT_VHE is implemented, and the value of HCR_EL2.{E2H, TGE} is {1, 1}, this bit has no effect on the PE.
On a Warm reset, in a system where the PE resets into EL1, this field resets to 0.
Accessing the SCTLR_EL1
When HCR_EL2.E2H is 1, without explicit synchronization, access from EL3 using the mnemonic SCTLR_EL1 or SCTLR_EL12 are not guaranteed to be ordered with respect to accesses using the other mnemonic.
Accesses to this register use the following encodings:
MRS <Xt>, SCTLR_EL1
op0 | op1 | CRn | CRm | op2 |
---|---|---|---|---|
0b11 | 0b000 | 0b0001 | 0b0000 | 0b000 |
if PSTATE.EL == EL0 then UNDEFINED; elsif PSTATE.EL == EL1 then if EL2Enabled() && HCR_EL2.TRVM == '1' then AArch64.SystemAccessTrap(EL2, 0x18); elsif EL2Enabled() && (!HaveEL(EL3) || SCR_EL3.FGTEn == '1') && HFGRTR_EL2.SCTLR_EL1 == '1' then AArch64.SystemAccessTrap(EL2, 0x18); elsif EL2Enabled() && HCR_EL2.<NV2,NV1,NV> == '111' then return NVMem[0x110]; else return SCTLR_EL1; elsif PSTATE.EL == EL2 then if HCR_EL2.E2H == '1' then return SCTLR_EL2; else return SCTLR_EL1; elsif PSTATE.EL == EL3 then return SCTLR_EL1;
MSR SCTLR_EL1, <Xt>
op0 | op1 | CRn | CRm | op2 |
---|---|---|---|---|
0b11 | 0b000 | 0b0001 | 0b0000 | 0b000 |
if PSTATE.EL == EL0 then UNDEFINED; elsif PSTATE.EL == EL1 then if EL2Enabled() && HCR_EL2.TVM == '1' then AArch64.SystemAccessTrap(EL2, 0x18); elsif EL2Enabled() && (!HaveEL(EL3) || SCR_EL3.FGTEn == '1') && HFGWTR_EL2.SCTLR_EL1 == '1' then AArch64.SystemAccessTrap(EL2, 0x18); elsif EL2Enabled() && HCR_EL2.<NV2,NV1,NV> == '111' then NVMem[0x110] = X[t]; else SCTLR_EL1 = X[t]; elsif PSTATE.EL == EL2 then if HCR_EL2.E2H == '1' then SCTLR_EL2 = X[t]; else SCTLR_EL1 = X[t]; elsif PSTATE.EL == EL3 then SCTLR_EL1 = X[t];
MRS <Xt>, SCTLR_EL12
op0 | op1 | CRn | CRm | op2 |
---|---|---|---|---|
0b11 | 0b101 | 0b0001 | 0b0000 | 0b000 |
if PSTATE.EL == EL0 then UNDEFINED; elsif PSTATE.EL == EL1 then if EL2Enabled() && HCR_EL2.<NV2,NV1,NV> == '101' then return NVMem[0x110]; elsif EL2Enabled() && HCR_EL2.NV == '1' then AArch64.SystemAccessTrap(EL2, 0x18); else UNDEFINED; elsif PSTATE.EL == EL2 then if HCR_EL2.E2H == '1' then return SCTLR_EL1; else UNDEFINED; elsif PSTATE.EL == EL3 then if EL2Enabled() && !ELUsingAArch32(EL2) && HCR_EL2.E2H == '1' then return SCTLR_EL1; else UNDEFINED;
MSR SCTLR_EL12, <Xt>
op0 | op1 | CRn | CRm | op2 |
---|---|---|---|---|
0b11 | 0b101 | 0b0001 | 0b0000 | 0b000 |
if PSTATE.EL == EL0 then UNDEFINED; elsif PSTATE.EL == EL1 then if EL2Enabled() && HCR_EL2.<NV2,NV1,NV> == '101' then NVMem[0x110] = X[t]; elsif EL2Enabled() && HCR_EL2.NV == '1' then AArch64.SystemAccessTrap(EL2, 0x18); else UNDEFINED; elsif PSTATE.EL == EL2 then if HCR_EL2.E2H == '1' then SCTLR_EL1 = X[t]; else UNDEFINED; elsif PSTATE.EL == EL3 then if EL2Enabled() && !ELUsingAArch32(EL2) && HCR_EL2.E2H == '1' then SCTLR_EL1 = X[t]; else UNDEFINED;