Table 3-135
Results of access to the Secure User and Non-secure Access Validation Control Register .. 3-133
Table 3-140
Results of access to the Count Register 0 .............................................................................. 3-139
Table 3-141
Results of access to the Count Register 1 .............................................................................. 3-140
Unaligned access handling ......................................................................................................... 4-4
Memory access types ............................................................................................................... 4-13
Mixed-endian configuration ....................................................................................................... 4-19
Cache policy bits ....................................................................................................................... 6-16
Table 6-5
Effect of remapping memory with TEX remap = 1 .................................................................... 6-17
Memory attributes ..................................................................................................................... 6-20
Summary of aborts .................................................................................................................... 6-35
Translation table size ................................................................................................................ 6-43
Table 6-15
Access types from second-level descriptor bit values .............................................................. 6-47
CP15 register functions ............................................................................................................. 6-53
CP14 register functions ............................................................................................................. 6-54
TCM configurations ..................................................................................................................... 7-7
Access to Non-secure TCM ........................................................................................................ 7-8
Access to Secure TCM ............................................................................................................... 7-8
AxLEN[3:0] encoding ................................................................................................................ 8-10
AxSIZE[2:0] encoding ............................................................................................................... 8-11
ARM DDI 0301H
ID012310
Copyright © 2004-2009 ARM Limited. All rights reserved.
Non-Confidential, Unrestricted Access
List of Tables
xii