// THIS HEADER FILE IS AUTOMATICALLY GENERATED -- DO NOT EDIT/** * Copyright (c) 2024 Raspberry Pi Ltd. * * SPDX-License-Identifier: BSD-3-Clause *//* ... */// =============================================================================// Register block : ACCESSCTRL// Version : 1// Bus type : apb// Description : Hardware access control registers// =============================================================================#ifndef_HARDWARE_REGS_ACCESSCTRL_H#define_HARDWARE_REGS_ACCESSCTRL_H// =============================================================================// Register : ACCESSCTRL_LOCK// Description : Once a LOCK bit is written to 1, ACCESSCTRL silently ignores// writes from that master. LOCK is writable only by a Secure,// Privileged processor or debugger.//// LOCK bits are only writable when their value is zero. Once set,// they can never be cleared, except by a full reset of ACCESSCTRL//// Setting the LOCK bit does not affect whether an access raises a// bus error. Unprivileged writes, or writes from the DMA, will// continue to raise bus errors. All other accesses will continue// not to.#defineACCESSCTRL_LOCK_OFFSET_u(0x00000000)#defineACCESSCTRL_LOCK_BITS_u(0x0000000f)#defineACCESSCTRL_LOCK_RESET_u(0x00000004)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_LOCK_DEBUG#defineACCESSCTRL_LOCK_DEBUG_RESET_u(0x0)#defineACCESSCTRL_LOCK_DEBUG_BITS_u(0x00000008)#defineACCESSCTRL_LOCK_DEBUG_MSB_u(3)#defineACCESSCTRL_LOCK_DEBUG_LSB_u(3)#defineACCESSCTRL_LOCK_DEBUG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_LOCK_DMA#defineACCESSCTRL_LOCK_DMA_RESET_u(0x1)#defineACCESSCTRL_LOCK_DMA_BITS_u(0x00000004)#defineACCESSCTRL_LOCK_DMA_MSB_u(2)#defineACCESSCTRL_LOCK_DMA_LSB_u(2)#defineACCESSCTRL_LOCK_DMA_ACCESS"RO"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_LOCK_CORE1#defineACCESSCTRL_LOCK_CORE1_RESET_u(0x0)#defineACCESSCTRL_LOCK_CORE1_BITS_u(0x00000002)#defineACCESSCTRL_LOCK_CORE1_MSB_u(1)#defineACCESSCTRL_LOCK_CORE1_LSB_u(1)#defineACCESSCTRL_LOCK_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_LOCK_CORE0#defineACCESSCTRL_LOCK_CORE0_RESET_u(0x0)#defineACCESSCTRL_LOCK_CORE0_BITS_u(0x00000001)#defineACCESSCTRL_LOCK_CORE0_MSB_u(0)#defineACCESSCTRL_LOCK_CORE0_LSB_u(0)#defineACCESSCTRL_LOCK_CORE0_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_FORCE_CORE_NS// Description : Force core 1's bus accesses to always be Non-secure, no matter// the core's internal state.//// Useful for schemes where one core is designated as the Non-// secure core, since some peripherals may filter individual// registers internally based on security state but not on master// ID.#defineACCESSCTRL_FORCE_CORE_NS_OFFSET_u(0x00000004)#defineACCESSCTRL_FORCE_CORE_NS_BITS_u(0x00000002)#defineACCESSCTRL_FORCE_CORE_NS_RESET_u(0x00000000)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_FORCE_CORE_NS_CORE1#defineACCESSCTRL_FORCE_CORE_NS_CORE1_RESET_u(0x0)#defineACCESSCTRL_FORCE_CORE_NS_CORE1_BITS_u(0x00000002)#defineACCESSCTRL_FORCE_CORE_NS_CORE1_MSB_u(1)#defineACCESSCTRL_FORCE_CORE_NS_CORE1_LSB_u(1)#defineACCESSCTRL_FORCE_CORE_NS_CORE1_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_CFGRESET// Description : Write 1 to reset all ACCESSCTRL configuration, except for the// LOCK and FORCE_CORE_NS registers.//// This bit is used in the RP2350 bootrom to quickly restore// ACCESSCTRL to a known state during the boot path.//// Note that, like all registers in ACCESSCTRL, this register is// not writable when the writer's corresponding LOCK bit is set,// therefore a master which has been locked out of ACCESSCTRL can// not use the CFGRESET register to disturb its contents.#defineACCESSCTRL_CFGRESET_OFFSET_u(0x00000008)#defineACCESSCTRL_CFGRESET_BITS_u(0x00000001)#defineACCESSCTRL_CFGRESET_RESET_u(0x00000000)#defineACCESSCTRL_CFGRESET_MSB_u(0)#defineACCESSCTRL_CFGRESET_LSB_u(0)#defineACCESSCTRL_CFGRESET_ACCESS"SC"// =============================================================================// Register : ACCESSCTRL_GPIO_NSMASK0// Description : Control whether GPIO0...31 are accessible to Non-secure code.// Writable only by a Secure, Privileged processor or debugger.//// 0 -> Secure access only//// 1 -> Secure + Non-secure access#defineACCESSCTRL_GPIO_NSMASK0_OFFSET_u(0x0000000c)#defineACCESSCTRL_GPIO_NSMASK0_BITS_u(0xffffffff)#defineACCESSCTRL_GPIO_NSMASK0_RESET_u(0x00000000)#defineACCESSCTRL_GPIO_NSMASK0_MSB_u(31)#defineACCESSCTRL_GPIO_NSMASK0_LSB_u(0)#defineACCESSCTRL_GPIO_NSMASK0_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_GPIO_NSMASK1// Description : Control whether GPIO32..47 are accessible to Non-secure code,// and whether QSPI and USB bitbang are accessible through the// Non-secure SIO. Writable only by a Secure, Privileged processor// or debugger.#defineACCESSCTRL_GPIO_NSMASK1_OFFSET_u(0x00000010)#defineACCESSCTRL_GPIO_NSMASK1_BITS_u(0xff00ffff)#defineACCESSCTRL_GPIO_NSMASK1_RESET_u(0x00000000)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_GPIO_NSMASK1_QSPI_SD#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SD_RESET_u(0x0)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SD_BITS_u(0xf0000000)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SD_MSB_u(31)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SD_LSB_u(28)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SD_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_GPIO_NSMASK1_QSPI_CSN#defineACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_RESET_u(0x0)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_BITS_u(0x08000000)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_MSB_u(27)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_LSB_u(27)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_GPIO_NSMASK1_QSPI_SCK#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_RESET_u(0x0)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_BITS_u(0x04000000)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_MSB_u(26)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_LSB_u(26)#defineACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_GPIO_NSMASK1_USB_DM#defineACCESSCTRL_GPIO_NSMASK1_USB_DM_RESET_u(0x0)#defineACCESSCTRL_GPIO_NSMASK1_USB_DM_BITS_u(0x02000000)#defineACCESSCTRL_GPIO_NSMASK1_USB_DM_MSB_u(25)#defineACCESSCTRL_GPIO_NSMASK1_USB_DM_LSB_u(25)#defineACCESSCTRL_GPIO_NSMASK1_USB_DM_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_GPIO_NSMASK1_USB_DP#defineACCESSCTRL_GPIO_NSMASK1_USB_DP_RESET_u(0x0)#defineACCESSCTRL_GPIO_NSMASK1_USB_DP_BITS_u(0x01000000)#defineACCESSCTRL_GPIO_NSMASK1_USB_DP_MSB_u(24)#defineACCESSCTRL_GPIO_NSMASK1_USB_DP_LSB_u(24)#defineACCESSCTRL_GPIO_NSMASK1_USB_DP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_GPIO_NSMASK1_GPIO#defineACCESSCTRL_GPIO_NSMASK1_GPIO_RESET_u(0x0000)#defineACCESSCTRL_GPIO_NSMASK1_GPIO_BITS_u(0x0000ffff)#defineACCESSCTRL_GPIO_NSMASK1_GPIO_MSB_u(15)#defineACCESSCTRL_GPIO_NSMASK1_GPIO_LSB_u(0)#defineACCESSCTRL_GPIO_NSMASK1_GPIO_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_ROM// Description : Control whether debugger, DMA, core 0 and core 1 can access// ROM, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_ROM_OFFSET_u(0x00000014)#defineACCESSCTRL_ROM_BITS_u(0x000000ff)#defineACCESSCTRL_ROM_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_DBG// Description : If 1, ROM can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_ROM_DBG_RESET_u(0x1)#defineACCESSCTRL_ROM_DBG_BITS_u(0x00000080)#defineACCESSCTRL_ROM_DBG_MSB_u(7)#defineACCESSCTRL_ROM_DBG_LSB_u(7)#defineACCESSCTRL_ROM_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_DMA// Description : If 1, ROM can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ROM_DMA_RESET_u(0x1)#defineACCESSCTRL_ROM_DMA_BITS_u(0x00000040)#defineACCESSCTRL_ROM_DMA_MSB_u(6)#defineACCESSCTRL_ROM_DMA_LSB_u(6)#defineACCESSCTRL_ROM_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_CORE1// Description : If 1, ROM can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ROM_CORE1_RESET_u(0x1)#defineACCESSCTRL_ROM_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_ROM_CORE1_MSB_u(5)#defineACCESSCTRL_ROM_CORE1_LSB_u(5)#defineACCESSCTRL_ROM_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_CORE0// Description : If 1, ROM can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ROM_CORE0_RESET_u(0x1)#defineACCESSCTRL_ROM_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_ROM_CORE0_MSB_u(4)#defineACCESSCTRL_ROM_CORE0_LSB_u(4)#defineACCESSCTRL_ROM_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_SP// Description : If 1, ROM can be accessed from a Secure, Privileged context.#defineACCESSCTRL_ROM_SP_RESET_u(0x1)#defineACCESSCTRL_ROM_SP_BITS_u(0x00000008)#defineACCESSCTRL_ROM_SP_MSB_u(3)#defineACCESSCTRL_ROM_SP_LSB_u(3)#defineACCESSCTRL_ROM_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_SU// Description : If 1, and SP is also set, ROM can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_ROM_SU_RESET_u(0x1)#defineACCESSCTRL_ROM_SU_BITS_u(0x00000004)#defineACCESSCTRL_ROM_SU_MSB_u(2)#defineACCESSCTRL_ROM_SU_LSB_u(2)#defineACCESSCTRL_ROM_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_NSP// Description : If 1, ROM can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_ROM_NSP_RESET_u(0x1)#defineACCESSCTRL_ROM_NSP_BITS_u(0x00000002)#defineACCESSCTRL_ROM_NSP_MSB_u(1)#defineACCESSCTRL_ROM_NSP_LSB_u(1)#defineACCESSCTRL_ROM_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROM_NSU// Description : If 1, and NSP is also set, ROM can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_ROM_NSU_RESET_u(0x1)#defineACCESSCTRL_ROM_NSU_BITS_u(0x00000001)#defineACCESSCTRL_ROM_NSU_MSB_u(0)#defineACCESSCTRL_ROM_NSU_LSB_u(0)#defineACCESSCTRL_ROM_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_XIP_MAIN// Description : Control whether debugger, DMA, core 0 and core 1 can access// XIP_MAIN, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_XIP_MAIN_OFFSET_u(0x00000018)#defineACCESSCTRL_XIP_MAIN_BITS_u(0x000000ff)#defineACCESSCTRL_XIP_MAIN_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_DBG// Description : If 1, XIP_MAIN can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_XIP_MAIN_DBG_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_DBG_BITS_u(0x00000080)#defineACCESSCTRL_XIP_MAIN_DBG_MSB_u(7)#defineACCESSCTRL_XIP_MAIN_DBG_LSB_u(7)#defineACCESSCTRL_XIP_MAIN_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_DMA// Description : If 1, XIP_MAIN can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_XIP_MAIN_DMA_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_DMA_BITS_u(0x00000040)#defineACCESSCTRL_XIP_MAIN_DMA_MSB_u(6)#defineACCESSCTRL_XIP_MAIN_DMA_LSB_u(6)#defineACCESSCTRL_XIP_MAIN_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_CORE1// Description : If 1, XIP_MAIN can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_MAIN_CORE1_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_XIP_MAIN_CORE1_MSB_u(5)#defineACCESSCTRL_XIP_MAIN_CORE1_LSB_u(5)#defineACCESSCTRL_XIP_MAIN_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_CORE0// Description : If 1, XIP_MAIN can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_MAIN_CORE0_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_XIP_MAIN_CORE0_MSB_u(4)#defineACCESSCTRL_XIP_MAIN_CORE0_LSB_u(4)#defineACCESSCTRL_XIP_MAIN_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_SP// Description : If 1, XIP_MAIN can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_XIP_MAIN_SP_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_SP_BITS_u(0x00000008)#defineACCESSCTRL_XIP_MAIN_SP_MSB_u(3)#defineACCESSCTRL_XIP_MAIN_SP_LSB_u(3)#defineACCESSCTRL_XIP_MAIN_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_SU// Description : If 1, and SP is also set, XIP_MAIN can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_XIP_MAIN_SU_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_SU_BITS_u(0x00000004)#defineACCESSCTRL_XIP_MAIN_SU_MSB_u(2)#defineACCESSCTRL_XIP_MAIN_SU_LSB_u(2)#defineACCESSCTRL_XIP_MAIN_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_NSP// Description : If 1, XIP_MAIN can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_XIP_MAIN_NSP_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_NSP_BITS_u(0x00000002)#defineACCESSCTRL_XIP_MAIN_NSP_MSB_u(1)#defineACCESSCTRL_XIP_MAIN_NSP_LSB_u(1)#defineACCESSCTRL_XIP_MAIN_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_MAIN_NSU// Description : If 1, and NSP is also set, XIP_MAIN can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_XIP_MAIN_NSU_RESET_u(0x1)#defineACCESSCTRL_XIP_MAIN_NSU_BITS_u(0x00000001)#defineACCESSCTRL_XIP_MAIN_NSU_MSB_u(0)#defineACCESSCTRL_XIP_MAIN_NSU_LSB_u(0)#defineACCESSCTRL_XIP_MAIN_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM0// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM0, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM0_OFFSET_u(0x0000001c)#defineACCESSCTRL_SRAM0_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM0_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_DBG// Description : If 1, SRAM0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM0_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM0_DBG_MSB_u(7)#defineACCESSCTRL_SRAM0_DBG_LSB_u(7)#defineACCESSCTRL_SRAM0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_DMA// Description : If 1, SRAM0 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM0_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM0_DMA_MSB_u(6)#defineACCESSCTRL_SRAM0_DMA_LSB_u(6)#defineACCESSCTRL_SRAM0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_CORE1// Description : If 1, SRAM0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM0_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM0_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM0_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_CORE0// Description : If 1, SRAM0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM0_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM0_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM0_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_SP// Description : If 1, SRAM0 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM0_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM0_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM0_SP_MSB_u(3)#defineACCESSCTRL_SRAM0_SP_LSB_u(3)#defineACCESSCTRL_SRAM0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_SU// Description : If 1, and SP is also set, SRAM0 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM0_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM0_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM0_SU_MSB_u(2)#defineACCESSCTRL_SRAM0_SU_LSB_u(2)#defineACCESSCTRL_SRAM0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_NSP// Description : If 1, SRAM0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM0_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM0_NSP_MSB_u(1)#defineACCESSCTRL_SRAM0_NSP_LSB_u(1)#defineACCESSCTRL_SRAM0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM0_NSU// Description : If 1, and NSP is also set, SRAM0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM0_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM0_NSU_MSB_u(0)#defineACCESSCTRL_SRAM0_NSU_LSB_u(0)#defineACCESSCTRL_SRAM0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM1// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM1, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM1_OFFSET_u(0x00000020)#defineACCESSCTRL_SRAM1_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM1_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_DBG// Description : If 1, SRAM1 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM1_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM1_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM1_DBG_MSB_u(7)#defineACCESSCTRL_SRAM1_DBG_LSB_u(7)#defineACCESSCTRL_SRAM1_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_DMA// Description : If 1, SRAM1 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM1_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM1_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM1_DMA_MSB_u(6)#defineACCESSCTRL_SRAM1_DMA_LSB_u(6)#defineACCESSCTRL_SRAM1_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_CORE1// Description : If 1, SRAM1 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM1_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM1_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM1_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM1_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM1_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_CORE0// Description : If 1, SRAM1 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM1_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM1_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM1_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM1_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM1_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_SP// Description : If 1, SRAM1 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM1_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM1_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM1_SP_MSB_u(3)#defineACCESSCTRL_SRAM1_SP_LSB_u(3)#defineACCESSCTRL_SRAM1_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_SU// Description : If 1, and SP is also set, SRAM1 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM1_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM1_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM1_SU_MSB_u(2)#defineACCESSCTRL_SRAM1_SU_LSB_u(2)#defineACCESSCTRL_SRAM1_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_NSP// Description : If 1, SRAM1 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM1_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM1_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM1_NSP_MSB_u(1)#defineACCESSCTRL_SRAM1_NSP_LSB_u(1)#defineACCESSCTRL_SRAM1_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM1_NSU// Description : If 1, and NSP is also set, SRAM1 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM1_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM1_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM1_NSU_MSB_u(0)#defineACCESSCTRL_SRAM1_NSU_LSB_u(0)#defineACCESSCTRL_SRAM1_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM2// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM2, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM2_OFFSET_u(0x00000024)#defineACCESSCTRL_SRAM2_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM2_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_DBG// Description : If 1, SRAM2 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM2_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM2_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM2_DBG_MSB_u(7)#defineACCESSCTRL_SRAM2_DBG_LSB_u(7)#defineACCESSCTRL_SRAM2_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_DMA// Description : If 1, SRAM2 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM2_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM2_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM2_DMA_MSB_u(6)#defineACCESSCTRL_SRAM2_DMA_LSB_u(6)#defineACCESSCTRL_SRAM2_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_CORE1// Description : If 1, SRAM2 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM2_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM2_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM2_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM2_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM2_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_CORE0// Description : If 1, SRAM2 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM2_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM2_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM2_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM2_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM2_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_SP// Description : If 1, SRAM2 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM2_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM2_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM2_SP_MSB_u(3)#defineACCESSCTRL_SRAM2_SP_LSB_u(3)#defineACCESSCTRL_SRAM2_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_SU// Description : If 1, and SP is also set, SRAM2 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM2_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM2_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM2_SU_MSB_u(2)#defineACCESSCTRL_SRAM2_SU_LSB_u(2)#defineACCESSCTRL_SRAM2_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_NSP// Description : If 1, SRAM2 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM2_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM2_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM2_NSP_MSB_u(1)#defineACCESSCTRL_SRAM2_NSP_LSB_u(1)#defineACCESSCTRL_SRAM2_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM2_NSU// Description : If 1, and NSP is also set, SRAM2 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM2_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM2_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM2_NSU_MSB_u(0)#defineACCESSCTRL_SRAM2_NSU_LSB_u(0)#defineACCESSCTRL_SRAM2_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM3// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM3, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM3_OFFSET_u(0x00000028)#defineACCESSCTRL_SRAM3_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM3_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_DBG// Description : If 1, SRAM3 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM3_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM3_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM3_DBG_MSB_u(7)#defineACCESSCTRL_SRAM3_DBG_LSB_u(7)#defineACCESSCTRL_SRAM3_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_DMA// Description : If 1, SRAM3 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM3_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM3_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM3_DMA_MSB_u(6)#defineACCESSCTRL_SRAM3_DMA_LSB_u(6)#defineACCESSCTRL_SRAM3_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_CORE1// Description : If 1, SRAM3 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM3_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM3_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM3_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM3_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM3_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_CORE0// Description : If 1, SRAM3 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM3_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM3_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM3_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM3_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM3_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_SP// Description : If 1, SRAM3 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM3_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM3_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM3_SP_MSB_u(3)#defineACCESSCTRL_SRAM3_SP_LSB_u(3)#defineACCESSCTRL_SRAM3_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_SU// Description : If 1, and SP is also set, SRAM3 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM3_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM3_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM3_SU_MSB_u(2)#defineACCESSCTRL_SRAM3_SU_LSB_u(2)#defineACCESSCTRL_SRAM3_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_NSP// Description : If 1, SRAM3 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM3_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM3_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM3_NSP_MSB_u(1)#defineACCESSCTRL_SRAM3_NSP_LSB_u(1)#defineACCESSCTRL_SRAM3_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM3_NSU// Description : If 1, and NSP is also set, SRAM3 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM3_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM3_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM3_NSU_MSB_u(0)#defineACCESSCTRL_SRAM3_NSU_LSB_u(0)#defineACCESSCTRL_SRAM3_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM4// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM4, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM4_OFFSET_u(0x0000002c)#defineACCESSCTRL_SRAM4_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM4_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_DBG// Description : If 1, SRAM4 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM4_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM4_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM4_DBG_MSB_u(7)#defineACCESSCTRL_SRAM4_DBG_LSB_u(7)#defineACCESSCTRL_SRAM4_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_DMA// Description : If 1, SRAM4 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM4_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM4_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM4_DMA_MSB_u(6)#defineACCESSCTRL_SRAM4_DMA_LSB_u(6)#defineACCESSCTRL_SRAM4_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_CORE1// Description : If 1, SRAM4 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM4_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM4_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM4_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM4_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM4_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_CORE0// Description : If 1, SRAM4 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM4_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM4_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM4_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM4_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM4_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_SP// Description : If 1, SRAM4 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM4_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM4_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM4_SP_MSB_u(3)#defineACCESSCTRL_SRAM4_SP_LSB_u(3)#defineACCESSCTRL_SRAM4_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_SU// Description : If 1, and SP is also set, SRAM4 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM4_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM4_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM4_SU_MSB_u(2)#defineACCESSCTRL_SRAM4_SU_LSB_u(2)#defineACCESSCTRL_SRAM4_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_NSP// Description : If 1, SRAM4 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM4_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM4_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM4_NSP_MSB_u(1)#defineACCESSCTRL_SRAM4_NSP_LSB_u(1)#defineACCESSCTRL_SRAM4_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM4_NSU// Description : If 1, and NSP is also set, SRAM4 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM4_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM4_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM4_NSU_MSB_u(0)#defineACCESSCTRL_SRAM4_NSU_LSB_u(0)#defineACCESSCTRL_SRAM4_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM5// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM5, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM5_OFFSET_u(0x00000030)#defineACCESSCTRL_SRAM5_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM5_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_DBG// Description : If 1, SRAM5 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM5_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM5_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM5_DBG_MSB_u(7)#defineACCESSCTRL_SRAM5_DBG_LSB_u(7)#defineACCESSCTRL_SRAM5_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_DMA// Description : If 1, SRAM5 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM5_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM5_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM5_DMA_MSB_u(6)#defineACCESSCTRL_SRAM5_DMA_LSB_u(6)#defineACCESSCTRL_SRAM5_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_CORE1// Description : If 1, SRAM5 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM5_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM5_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM5_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM5_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM5_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_CORE0// Description : If 1, SRAM5 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM5_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM5_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM5_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM5_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM5_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_SP// Description : If 1, SRAM5 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM5_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM5_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM5_SP_MSB_u(3)#defineACCESSCTRL_SRAM5_SP_LSB_u(3)#defineACCESSCTRL_SRAM5_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_SU// Description : If 1, and SP is also set, SRAM5 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM5_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM5_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM5_SU_MSB_u(2)#defineACCESSCTRL_SRAM5_SU_LSB_u(2)#defineACCESSCTRL_SRAM5_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_NSP// Description : If 1, SRAM5 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM5_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM5_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM5_NSP_MSB_u(1)#defineACCESSCTRL_SRAM5_NSP_LSB_u(1)#defineACCESSCTRL_SRAM5_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM5_NSU// Description : If 1, and NSP is also set, SRAM5 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM5_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM5_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM5_NSU_MSB_u(0)#defineACCESSCTRL_SRAM5_NSU_LSB_u(0)#defineACCESSCTRL_SRAM5_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM6// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM6, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM6_OFFSET_u(0x00000034)#defineACCESSCTRL_SRAM6_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM6_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_DBG// Description : If 1, SRAM6 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM6_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM6_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM6_DBG_MSB_u(7)#defineACCESSCTRL_SRAM6_DBG_LSB_u(7)#defineACCESSCTRL_SRAM6_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_DMA// Description : If 1, SRAM6 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM6_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM6_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM6_DMA_MSB_u(6)#defineACCESSCTRL_SRAM6_DMA_LSB_u(6)#defineACCESSCTRL_SRAM6_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_CORE1// Description : If 1, SRAM6 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM6_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM6_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM6_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM6_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM6_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_CORE0// Description : If 1, SRAM6 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM6_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM6_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM6_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM6_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM6_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_SP// Description : If 1, SRAM6 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM6_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM6_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM6_SP_MSB_u(3)#defineACCESSCTRL_SRAM6_SP_LSB_u(3)#defineACCESSCTRL_SRAM6_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_SU// Description : If 1, and SP is also set, SRAM6 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM6_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM6_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM6_SU_MSB_u(2)#defineACCESSCTRL_SRAM6_SU_LSB_u(2)#defineACCESSCTRL_SRAM6_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_NSP// Description : If 1, SRAM6 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM6_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM6_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM6_NSP_MSB_u(1)#defineACCESSCTRL_SRAM6_NSP_LSB_u(1)#defineACCESSCTRL_SRAM6_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM6_NSU// Description : If 1, and NSP is also set, SRAM6 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM6_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM6_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM6_NSU_MSB_u(0)#defineACCESSCTRL_SRAM6_NSU_LSB_u(0)#defineACCESSCTRL_SRAM6_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM7// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM7, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM7_OFFSET_u(0x00000038)#defineACCESSCTRL_SRAM7_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM7_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_DBG// Description : If 1, SRAM7 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM7_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM7_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM7_DBG_MSB_u(7)#defineACCESSCTRL_SRAM7_DBG_LSB_u(7)#defineACCESSCTRL_SRAM7_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_DMA// Description : If 1, SRAM7 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM7_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM7_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM7_DMA_MSB_u(6)#defineACCESSCTRL_SRAM7_DMA_LSB_u(6)#defineACCESSCTRL_SRAM7_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_CORE1// Description : If 1, SRAM7 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM7_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM7_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM7_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM7_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM7_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_CORE0// Description : If 1, SRAM7 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM7_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM7_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM7_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM7_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM7_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_SP// Description : If 1, SRAM7 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM7_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM7_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM7_SP_MSB_u(3)#defineACCESSCTRL_SRAM7_SP_LSB_u(3)#defineACCESSCTRL_SRAM7_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_SU// Description : If 1, and SP is also set, SRAM7 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM7_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM7_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM7_SU_MSB_u(2)#defineACCESSCTRL_SRAM7_SU_LSB_u(2)#defineACCESSCTRL_SRAM7_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_NSP// Description : If 1, SRAM7 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM7_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM7_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM7_NSP_MSB_u(1)#defineACCESSCTRL_SRAM7_NSP_LSB_u(1)#defineACCESSCTRL_SRAM7_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM7_NSU// Description : If 1, and NSP is also set, SRAM7 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM7_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM7_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM7_NSU_MSB_u(0)#defineACCESSCTRL_SRAM7_NSU_LSB_u(0)#defineACCESSCTRL_SRAM7_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM8// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM8, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM8_OFFSET_u(0x0000003c)#defineACCESSCTRL_SRAM8_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM8_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_DBG// Description : If 1, SRAM8 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM8_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM8_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM8_DBG_MSB_u(7)#defineACCESSCTRL_SRAM8_DBG_LSB_u(7)#defineACCESSCTRL_SRAM8_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_DMA// Description : If 1, SRAM8 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM8_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM8_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM8_DMA_MSB_u(6)#defineACCESSCTRL_SRAM8_DMA_LSB_u(6)#defineACCESSCTRL_SRAM8_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_CORE1// Description : If 1, SRAM8 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM8_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM8_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM8_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM8_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM8_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_CORE0// Description : If 1, SRAM8 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM8_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM8_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM8_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM8_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM8_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_SP// Description : If 1, SRAM8 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM8_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM8_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM8_SP_MSB_u(3)#defineACCESSCTRL_SRAM8_SP_LSB_u(3)#defineACCESSCTRL_SRAM8_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_SU// Description : If 1, and SP is also set, SRAM8 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM8_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM8_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM8_SU_MSB_u(2)#defineACCESSCTRL_SRAM8_SU_LSB_u(2)#defineACCESSCTRL_SRAM8_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_NSP// Description : If 1, SRAM8 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM8_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM8_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM8_NSP_MSB_u(1)#defineACCESSCTRL_SRAM8_NSP_LSB_u(1)#defineACCESSCTRL_SRAM8_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM8_NSU// Description : If 1, and NSP is also set, SRAM8 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM8_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM8_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM8_NSU_MSB_u(0)#defineACCESSCTRL_SRAM8_NSU_LSB_u(0)#defineACCESSCTRL_SRAM8_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SRAM9// Description : Control whether debugger, DMA, core 0 and core 1 can access// SRAM9, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SRAM9_OFFSET_u(0x00000040)#defineACCESSCTRL_SRAM9_BITS_u(0x000000ff)#defineACCESSCTRL_SRAM9_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_DBG// Description : If 1, SRAM9 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SRAM9_DBG_RESET_u(0x1)#defineACCESSCTRL_SRAM9_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SRAM9_DBG_MSB_u(7)#defineACCESSCTRL_SRAM9_DBG_LSB_u(7)#defineACCESSCTRL_SRAM9_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_DMA// Description : If 1, SRAM9 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM9_DMA_RESET_u(0x1)#defineACCESSCTRL_SRAM9_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SRAM9_DMA_MSB_u(6)#defineACCESSCTRL_SRAM9_DMA_LSB_u(6)#defineACCESSCTRL_SRAM9_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_CORE1// Description : If 1, SRAM9 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM9_CORE1_RESET_u(0x1)#defineACCESSCTRL_SRAM9_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SRAM9_CORE1_MSB_u(5)#defineACCESSCTRL_SRAM9_CORE1_LSB_u(5)#defineACCESSCTRL_SRAM9_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_CORE0// Description : If 1, SRAM9 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SRAM9_CORE0_RESET_u(0x1)#defineACCESSCTRL_SRAM9_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SRAM9_CORE0_MSB_u(4)#defineACCESSCTRL_SRAM9_CORE0_LSB_u(4)#defineACCESSCTRL_SRAM9_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_SP// Description : If 1, SRAM9 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SRAM9_SP_RESET_u(0x1)#defineACCESSCTRL_SRAM9_SP_BITS_u(0x00000008)#defineACCESSCTRL_SRAM9_SP_MSB_u(3)#defineACCESSCTRL_SRAM9_SP_LSB_u(3)#defineACCESSCTRL_SRAM9_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_SU// Description : If 1, and SP is also set, SRAM9 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SRAM9_SU_RESET_u(0x1)#defineACCESSCTRL_SRAM9_SU_BITS_u(0x00000004)#defineACCESSCTRL_SRAM9_SU_MSB_u(2)#defineACCESSCTRL_SRAM9_SU_LSB_u(2)#defineACCESSCTRL_SRAM9_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_NSP// Description : If 1, SRAM9 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SRAM9_NSP_RESET_u(0x1)#defineACCESSCTRL_SRAM9_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SRAM9_NSP_MSB_u(1)#defineACCESSCTRL_SRAM9_NSP_LSB_u(1)#defineACCESSCTRL_SRAM9_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SRAM9_NSU// Description : If 1, and NSP is also set, SRAM9 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SRAM9_NSU_RESET_u(0x1)#defineACCESSCTRL_SRAM9_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SRAM9_NSU_MSB_u(0)#defineACCESSCTRL_SRAM9_NSU_LSB_u(0)#defineACCESSCTRL_SRAM9_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_DMA// Description : Control whether debugger, DMA, core 0 and core 1 can access// DMA, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_DMA_OFFSET_u(0x00000044)#defineACCESSCTRL_DMA_BITS_u(0x000000ff)#defineACCESSCTRL_DMA_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_DBG// Description : If 1, DMA can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_DMA_DBG_RESET_u(0x1)#defineACCESSCTRL_DMA_DBG_BITS_u(0x00000080)#defineACCESSCTRL_DMA_DBG_MSB_u(7)#defineACCESSCTRL_DMA_DBG_LSB_u(7)#defineACCESSCTRL_DMA_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_DMA// Description : If 1, DMA can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_DMA_DMA_RESET_u(0x1)#defineACCESSCTRL_DMA_DMA_BITS_u(0x00000040)#defineACCESSCTRL_DMA_DMA_MSB_u(6)#defineACCESSCTRL_DMA_DMA_LSB_u(6)#defineACCESSCTRL_DMA_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_CORE1// Description : If 1, DMA can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_DMA_CORE1_RESET_u(0x1)#defineACCESSCTRL_DMA_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_DMA_CORE1_MSB_u(5)#defineACCESSCTRL_DMA_CORE1_LSB_u(5)#defineACCESSCTRL_DMA_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_CORE0// Description : If 1, DMA can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_DMA_CORE0_RESET_u(0x1)#defineACCESSCTRL_DMA_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_DMA_CORE0_MSB_u(4)#defineACCESSCTRL_DMA_CORE0_LSB_u(4)#defineACCESSCTRL_DMA_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_SP// Description : If 1, DMA can be accessed from a Secure, Privileged context.#defineACCESSCTRL_DMA_SP_RESET_u(0x1)#defineACCESSCTRL_DMA_SP_BITS_u(0x00000008)#defineACCESSCTRL_DMA_SP_MSB_u(3)#defineACCESSCTRL_DMA_SP_LSB_u(3)#defineACCESSCTRL_DMA_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_SU// Description : If 1, and SP is also set, DMA can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_DMA_SU_RESET_u(0x1)#defineACCESSCTRL_DMA_SU_BITS_u(0x00000004)#defineACCESSCTRL_DMA_SU_MSB_u(2)#defineACCESSCTRL_DMA_SU_LSB_u(2)#defineACCESSCTRL_DMA_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_NSP// Description : If 1, DMA can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_DMA_NSP_RESET_u(0x0)#defineACCESSCTRL_DMA_NSP_BITS_u(0x00000002)#defineACCESSCTRL_DMA_NSP_MSB_u(1)#defineACCESSCTRL_DMA_NSP_LSB_u(1)#defineACCESSCTRL_DMA_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_DMA_NSU// Description : If 1, and NSP is also set, DMA can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_DMA_NSU_RESET_u(0x0)#defineACCESSCTRL_DMA_NSU_BITS_u(0x00000001)#defineACCESSCTRL_DMA_NSU_MSB_u(0)#defineACCESSCTRL_DMA_NSU_LSB_u(0)#defineACCESSCTRL_DMA_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_USBCTRL// Description : Control whether debugger, DMA, core 0 and core 1 can access// USBCTRL, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_USBCTRL_OFFSET_u(0x00000048)#defineACCESSCTRL_USBCTRL_BITS_u(0x000000ff)#defineACCESSCTRL_USBCTRL_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_DBG// Description : If 1, USBCTRL can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_USBCTRL_DBG_RESET_u(0x1)#defineACCESSCTRL_USBCTRL_DBG_BITS_u(0x00000080)#defineACCESSCTRL_USBCTRL_DBG_MSB_u(7)#defineACCESSCTRL_USBCTRL_DBG_LSB_u(7)#defineACCESSCTRL_USBCTRL_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_DMA// Description : If 1, USBCTRL can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_USBCTRL_DMA_RESET_u(0x1)#defineACCESSCTRL_USBCTRL_DMA_BITS_u(0x00000040)#defineACCESSCTRL_USBCTRL_DMA_MSB_u(6)#defineACCESSCTRL_USBCTRL_DMA_LSB_u(6)#defineACCESSCTRL_USBCTRL_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_CORE1// Description : If 1, USBCTRL can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_USBCTRL_CORE1_RESET_u(0x1)#defineACCESSCTRL_USBCTRL_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_USBCTRL_CORE1_MSB_u(5)#defineACCESSCTRL_USBCTRL_CORE1_LSB_u(5)#defineACCESSCTRL_USBCTRL_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_CORE0// Description : If 1, USBCTRL can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_USBCTRL_CORE0_RESET_u(0x1)#defineACCESSCTRL_USBCTRL_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_USBCTRL_CORE0_MSB_u(4)#defineACCESSCTRL_USBCTRL_CORE0_LSB_u(4)#defineACCESSCTRL_USBCTRL_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_SP// Description : If 1, USBCTRL can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_USBCTRL_SP_RESET_u(0x1)#defineACCESSCTRL_USBCTRL_SP_BITS_u(0x00000008)#defineACCESSCTRL_USBCTRL_SP_MSB_u(3)#defineACCESSCTRL_USBCTRL_SP_LSB_u(3)#defineACCESSCTRL_USBCTRL_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_SU// Description : If 1, and SP is also set, USBCTRL can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_USBCTRL_SU_RESET_u(0x1)#defineACCESSCTRL_USBCTRL_SU_BITS_u(0x00000004)#defineACCESSCTRL_USBCTRL_SU_MSB_u(2)#defineACCESSCTRL_USBCTRL_SU_LSB_u(2)#defineACCESSCTRL_USBCTRL_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_NSP// Description : If 1, USBCTRL can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_USBCTRL_NSP_RESET_u(0x0)#defineACCESSCTRL_USBCTRL_NSP_BITS_u(0x00000002)#defineACCESSCTRL_USBCTRL_NSP_MSB_u(1)#defineACCESSCTRL_USBCTRL_NSP_LSB_u(1)#defineACCESSCTRL_USBCTRL_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_USBCTRL_NSU// Description : If 1, and NSP is also set, USBCTRL can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_USBCTRL_NSU_RESET_u(0x0)#defineACCESSCTRL_USBCTRL_NSU_BITS_u(0x00000001)#defineACCESSCTRL_USBCTRL_NSU_MSB_u(0)#defineACCESSCTRL_USBCTRL_NSU_LSB_u(0)#defineACCESSCTRL_USBCTRL_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PIO0// Description : Control whether debugger, DMA, core 0 and core 1 can access// PIO0, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PIO0_OFFSET_u(0x0000004c)#defineACCESSCTRL_PIO0_BITS_u(0x000000ff)#defineACCESSCTRL_PIO0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_DBG// Description : If 1, PIO0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PIO0_DBG_RESET_u(0x1)#defineACCESSCTRL_PIO0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PIO0_DBG_MSB_u(7)#defineACCESSCTRL_PIO0_DBG_LSB_u(7)#defineACCESSCTRL_PIO0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_DMA// Description : If 1, PIO0 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO0_DMA_RESET_u(0x1)#defineACCESSCTRL_PIO0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PIO0_DMA_MSB_u(6)#defineACCESSCTRL_PIO0_DMA_LSB_u(6)#defineACCESSCTRL_PIO0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_CORE1// Description : If 1, PIO0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO0_CORE1_RESET_u(0x1)#defineACCESSCTRL_PIO0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PIO0_CORE1_MSB_u(5)#defineACCESSCTRL_PIO0_CORE1_LSB_u(5)#defineACCESSCTRL_PIO0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_CORE0// Description : If 1, PIO0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO0_CORE0_RESET_u(0x1)#defineACCESSCTRL_PIO0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PIO0_CORE0_MSB_u(4)#defineACCESSCTRL_PIO0_CORE0_LSB_u(4)#defineACCESSCTRL_PIO0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_SP// Description : If 1, PIO0 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_PIO0_SP_RESET_u(0x1)#defineACCESSCTRL_PIO0_SP_BITS_u(0x00000008)#defineACCESSCTRL_PIO0_SP_MSB_u(3)#defineACCESSCTRL_PIO0_SP_LSB_u(3)#defineACCESSCTRL_PIO0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_SU// Description : If 1, and SP is also set, PIO0 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_PIO0_SU_RESET_u(0x1)#defineACCESSCTRL_PIO0_SU_BITS_u(0x00000004)#defineACCESSCTRL_PIO0_SU_MSB_u(2)#defineACCESSCTRL_PIO0_SU_LSB_u(2)#defineACCESSCTRL_PIO0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_NSP// Description : If 1, PIO0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PIO0_NSP_RESET_u(0x0)#defineACCESSCTRL_PIO0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PIO0_NSP_MSB_u(1)#defineACCESSCTRL_PIO0_NSP_LSB_u(1)#defineACCESSCTRL_PIO0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO0_NSU// Description : If 1, and NSP is also set, PIO0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PIO0_NSU_RESET_u(0x0)#defineACCESSCTRL_PIO0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PIO0_NSU_MSB_u(0)#defineACCESSCTRL_PIO0_NSU_LSB_u(0)#defineACCESSCTRL_PIO0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PIO1// Description : Control whether debugger, DMA, core 0 and core 1 can access// PIO1, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PIO1_OFFSET_u(0x00000050)#defineACCESSCTRL_PIO1_BITS_u(0x000000ff)#defineACCESSCTRL_PIO1_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_DBG// Description : If 1, PIO1 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PIO1_DBG_RESET_u(0x1)#defineACCESSCTRL_PIO1_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PIO1_DBG_MSB_u(7)#defineACCESSCTRL_PIO1_DBG_LSB_u(7)#defineACCESSCTRL_PIO1_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_DMA// Description : If 1, PIO1 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO1_DMA_RESET_u(0x1)#defineACCESSCTRL_PIO1_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PIO1_DMA_MSB_u(6)#defineACCESSCTRL_PIO1_DMA_LSB_u(6)#defineACCESSCTRL_PIO1_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_CORE1// Description : If 1, PIO1 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO1_CORE1_RESET_u(0x1)#defineACCESSCTRL_PIO1_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PIO1_CORE1_MSB_u(5)#defineACCESSCTRL_PIO1_CORE1_LSB_u(5)#defineACCESSCTRL_PIO1_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_CORE0// Description : If 1, PIO1 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO1_CORE0_RESET_u(0x1)#defineACCESSCTRL_PIO1_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PIO1_CORE0_MSB_u(4)#defineACCESSCTRL_PIO1_CORE0_LSB_u(4)#defineACCESSCTRL_PIO1_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_SP// Description : If 1, PIO1 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_PIO1_SP_RESET_u(0x1)#defineACCESSCTRL_PIO1_SP_BITS_u(0x00000008)#defineACCESSCTRL_PIO1_SP_MSB_u(3)#defineACCESSCTRL_PIO1_SP_LSB_u(3)#defineACCESSCTRL_PIO1_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_SU// Description : If 1, and SP is also set, PIO1 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_PIO1_SU_RESET_u(0x1)#defineACCESSCTRL_PIO1_SU_BITS_u(0x00000004)#defineACCESSCTRL_PIO1_SU_MSB_u(2)#defineACCESSCTRL_PIO1_SU_LSB_u(2)#defineACCESSCTRL_PIO1_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_NSP// Description : If 1, PIO1 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PIO1_NSP_RESET_u(0x0)#defineACCESSCTRL_PIO1_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PIO1_NSP_MSB_u(1)#defineACCESSCTRL_PIO1_NSP_LSB_u(1)#defineACCESSCTRL_PIO1_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO1_NSU// Description : If 1, and NSP is also set, PIO1 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PIO1_NSU_RESET_u(0x0)#defineACCESSCTRL_PIO1_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PIO1_NSU_MSB_u(0)#defineACCESSCTRL_PIO1_NSU_LSB_u(0)#defineACCESSCTRL_PIO1_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PIO2// Description : Control whether debugger, DMA, core 0 and core 1 can access// PIO2, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PIO2_OFFSET_u(0x00000054)#defineACCESSCTRL_PIO2_BITS_u(0x000000ff)#defineACCESSCTRL_PIO2_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_DBG// Description : If 1, PIO2 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PIO2_DBG_RESET_u(0x1)#defineACCESSCTRL_PIO2_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PIO2_DBG_MSB_u(7)#defineACCESSCTRL_PIO2_DBG_LSB_u(7)#defineACCESSCTRL_PIO2_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_DMA// Description : If 1, PIO2 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO2_DMA_RESET_u(0x1)#defineACCESSCTRL_PIO2_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PIO2_DMA_MSB_u(6)#defineACCESSCTRL_PIO2_DMA_LSB_u(6)#defineACCESSCTRL_PIO2_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_CORE1// Description : If 1, PIO2 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO2_CORE1_RESET_u(0x1)#defineACCESSCTRL_PIO2_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PIO2_CORE1_MSB_u(5)#defineACCESSCTRL_PIO2_CORE1_LSB_u(5)#defineACCESSCTRL_PIO2_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_CORE0// Description : If 1, PIO2 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PIO2_CORE0_RESET_u(0x1)#defineACCESSCTRL_PIO2_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PIO2_CORE0_MSB_u(4)#defineACCESSCTRL_PIO2_CORE0_LSB_u(4)#defineACCESSCTRL_PIO2_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_SP// Description : If 1, PIO2 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_PIO2_SP_RESET_u(0x1)#defineACCESSCTRL_PIO2_SP_BITS_u(0x00000008)#defineACCESSCTRL_PIO2_SP_MSB_u(3)#defineACCESSCTRL_PIO2_SP_LSB_u(3)#defineACCESSCTRL_PIO2_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_SU// Description : If 1, and SP is also set, PIO2 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_PIO2_SU_RESET_u(0x1)#defineACCESSCTRL_PIO2_SU_BITS_u(0x00000004)#defineACCESSCTRL_PIO2_SU_MSB_u(2)#defineACCESSCTRL_PIO2_SU_LSB_u(2)#defineACCESSCTRL_PIO2_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_NSP// Description : If 1, PIO2 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PIO2_NSP_RESET_u(0x0)#defineACCESSCTRL_PIO2_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PIO2_NSP_MSB_u(1)#defineACCESSCTRL_PIO2_NSP_LSB_u(1)#defineACCESSCTRL_PIO2_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PIO2_NSU// Description : If 1, and NSP is also set, PIO2 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PIO2_NSU_RESET_u(0x0)#defineACCESSCTRL_PIO2_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PIO2_NSU_MSB_u(0)#defineACCESSCTRL_PIO2_NSU_LSB_u(0)#defineACCESSCTRL_PIO2_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_CORESIGHT_TRACE// Description : Control whether debugger, DMA, core 0 and core 1 can access// CORESIGHT_TRACE, and at what security/privilege levels they can// do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_CORESIGHT_TRACE_OFFSET_u(0x00000058)#defineACCESSCTRL_CORESIGHT_TRACE_BITS_u(0x000000ff)#defineACCESSCTRL_CORESIGHT_TRACE_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_DBG// Description : If 1, CORESIGHT_TRACE can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_TRACE_DBG_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_TRACE_DBG_BITS_u(0x00000080)#defineACCESSCTRL_CORESIGHT_TRACE_DBG_MSB_u(7)#defineACCESSCTRL_CORESIGHT_TRACE_DBG_LSB_u(7)#defineACCESSCTRL_CORESIGHT_TRACE_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_DMA// Description : If 1, CORESIGHT_TRACE can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_TRACE_DMA_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_TRACE_DMA_BITS_u(0x00000040)#defineACCESSCTRL_CORESIGHT_TRACE_DMA_MSB_u(6)#defineACCESSCTRL_CORESIGHT_TRACE_DMA_LSB_u(6)#defineACCESSCTRL_CORESIGHT_TRACE_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_CORE1// Description : If 1, CORESIGHT_TRACE can be accessed by core 1, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_TRACE_CORE1_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_TRACE_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_CORESIGHT_TRACE_CORE1_MSB_u(5)#defineACCESSCTRL_CORESIGHT_TRACE_CORE1_LSB_u(5)#defineACCESSCTRL_CORESIGHT_TRACE_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_CORE0// Description : If 1, CORESIGHT_TRACE can be accessed by core 0, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_TRACE_CORE0_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_TRACE_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_CORESIGHT_TRACE_CORE0_MSB_u(4)#defineACCESSCTRL_CORESIGHT_TRACE_CORE0_LSB_u(4)#defineACCESSCTRL_CORESIGHT_TRACE_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_SP// Description : If 1, CORESIGHT_TRACE can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_CORESIGHT_TRACE_SP_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_TRACE_SP_BITS_u(0x00000008)#defineACCESSCTRL_CORESIGHT_TRACE_SP_MSB_u(3)#defineACCESSCTRL_CORESIGHT_TRACE_SP_LSB_u(3)#defineACCESSCTRL_CORESIGHT_TRACE_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_SU// Description : If 1, and SP is also set, CORESIGHT_TRACE can be accessed from// a Secure, Unprivileged context.#defineACCESSCTRL_CORESIGHT_TRACE_SU_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_TRACE_SU_BITS_u(0x00000004)#defineACCESSCTRL_CORESIGHT_TRACE_SU_MSB_u(2)#defineACCESSCTRL_CORESIGHT_TRACE_SU_LSB_u(2)#defineACCESSCTRL_CORESIGHT_TRACE_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_NSP// Description : If 1, CORESIGHT_TRACE can be accessed from a Non-secure,// Privileged context.#defineACCESSCTRL_CORESIGHT_TRACE_NSP_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_TRACE_NSP_BITS_u(0x00000002)#defineACCESSCTRL_CORESIGHT_TRACE_NSP_MSB_u(1)#defineACCESSCTRL_CORESIGHT_TRACE_NSP_LSB_u(1)#defineACCESSCTRL_CORESIGHT_TRACE_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_TRACE_NSU// Description : If 1, and NSP is also set, CORESIGHT_TRACE can be accessed from// a Non-secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_CORESIGHT_TRACE_NSU_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_TRACE_NSU_BITS_u(0x00000001)#defineACCESSCTRL_CORESIGHT_TRACE_NSU_MSB_u(0)#defineACCESSCTRL_CORESIGHT_TRACE_NSU_LSB_u(0)#defineACCESSCTRL_CORESIGHT_TRACE_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_CORESIGHT_PERIPH// Description : Control whether debugger, DMA, core 0 and core 1 can access// CORESIGHT_PERIPH, and at what security/privilege levels they// can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_CORESIGHT_PERIPH_OFFSET_u(0x0000005c)#defineACCESSCTRL_CORESIGHT_PERIPH_BITS_u(0x000000ff)#defineACCESSCTRL_CORESIGHT_PERIPH_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_DBG// Description : If 1, CORESIGHT_PERIPH can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_PERIPH_DBG_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_PERIPH_DBG_BITS_u(0x00000080)#defineACCESSCTRL_CORESIGHT_PERIPH_DBG_MSB_u(7)#defineACCESSCTRL_CORESIGHT_PERIPH_DBG_LSB_u(7)#defineACCESSCTRL_CORESIGHT_PERIPH_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_DMA// Description : If 1, CORESIGHT_PERIPH can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_PERIPH_DMA_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_PERIPH_DMA_BITS_u(0x00000040)#defineACCESSCTRL_CORESIGHT_PERIPH_DMA_MSB_u(6)#defineACCESSCTRL_CORESIGHT_PERIPH_DMA_LSB_u(6)#defineACCESSCTRL_CORESIGHT_PERIPH_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_CORE1// Description : If 1, CORESIGHT_PERIPH can be accessed by core 1, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_PERIPH_CORE1_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE1_MSB_u(5)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE1_LSB_u(5)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_CORE0// Description : If 1, CORESIGHT_PERIPH can be accessed by core 0, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CORESIGHT_PERIPH_CORE0_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE0_MSB_u(4)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE0_LSB_u(4)#defineACCESSCTRL_CORESIGHT_PERIPH_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_SP// Description : If 1, CORESIGHT_PERIPH can be accessed from a Secure,// Privileged context.#defineACCESSCTRL_CORESIGHT_PERIPH_SP_RESET_u(0x1)#defineACCESSCTRL_CORESIGHT_PERIPH_SP_BITS_u(0x00000008)#defineACCESSCTRL_CORESIGHT_PERIPH_SP_MSB_u(3)#defineACCESSCTRL_CORESIGHT_PERIPH_SP_LSB_u(3)#defineACCESSCTRL_CORESIGHT_PERIPH_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_SU// Description : If 1, and SP is also set, CORESIGHT_PERIPH can be accessed from// a Secure, Unprivileged context.#defineACCESSCTRL_CORESIGHT_PERIPH_SU_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_PERIPH_SU_BITS_u(0x00000004)#defineACCESSCTRL_CORESIGHT_PERIPH_SU_MSB_u(2)#defineACCESSCTRL_CORESIGHT_PERIPH_SU_LSB_u(2)#defineACCESSCTRL_CORESIGHT_PERIPH_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_NSP// Description : If 1, CORESIGHT_PERIPH can be accessed from a Non-secure,// Privileged context.#defineACCESSCTRL_CORESIGHT_PERIPH_NSP_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_PERIPH_NSP_BITS_u(0x00000002)#defineACCESSCTRL_CORESIGHT_PERIPH_NSP_MSB_u(1)#defineACCESSCTRL_CORESIGHT_PERIPH_NSP_LSB_u(1)#defineACCESSCTRL_CORESIGHT_PERIPH_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CORESIGHT_PERIPH_NSU// Description : If 1, and NSP is also set, CORESIGHT_PERIPH can be accessed// from a Non-secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_CORESIGHT_PERIPH_NSU_RESET_u(0x0)#defineACCESSCTRL_CORESIGHT_PERIPH_NSU_BITS_u(0x00000001)#defineACCESSCTRL_CORESIGHT_PERIPH_NSU_MSB_u(0)#defineACCESSCTRL_CORESIGHT_PERIPH_NSU_LSB_u(0)#defineACCESSCTRL_CORESIGHT_PERIPH_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SYSINFO// Description : Control whether debugger, DMA, core 0 and core 1 can access// SYSINFO, and at what security/privilege levels they can do so.//// Defaults to fully open access.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SYSINFO_OFFSET_u(0x00000060)#defineACCESSCTRL_SYSINFO_BITS_u(0x000000ff)#defineACCESSCTRL_SYSINFO_RESET_u(0x000000ff)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_DBG// Description : If 1, SYSINFO can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SYSINFO_DBG_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SYSINFO_DBG_MSB_u(7)#defineACCESSCTRL_SYSINFO_DBG_LSB_u(7)#defineACCESSCTRL_SYSINFO_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_DMA// Description : If 1, SYSINFO can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SYSINFO_DMA_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SYSINFO_DMA_MSB_u(6)#defineACCESSCTRL_SYSINFO_DMA_LSB_u(6)#defineACCESSCTRL_SYSINFO_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_CORE1// Description : If 1, SYSINFO can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SYSINFO_CORE1_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SYSINFO_CORE1_MSB_u(5)#defineACCESSCTRL_SYSINFO_CORE1_LSB_u(5)#defineACCESSCTRL_SYSINFO_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_CORE0// Description : If 1, SYSINFO can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SYSINFO_CORE0_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SYSINFO_CORE0_MSB_u(4)#defineACCESSCTRL_SYSINFO_CORE0_LSB_u(4)#defineACCESSCTRL_SYSINFO_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_SP// Description : If 1, SYSINFO can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_SYSINFO_SP_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_SP_BITS_u(0x00000008)#defineACCESSCTRL_SYSINFO_SP_MSB_u(3)#defineACCESSCTRL_SYSINFO_SP_LSB_u(3)#defineACCESSCTRL_SYSINFO_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_SU// Description : If 1, and SP is also set, SYSINFO can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_SYSINFO_SU_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_SU_BITS_u(0x00000004)#defineACCESSCTRL_SYSINFO_SU_MSB_u(2)#defineACCESSCTRL_SYSINFO_SU_LSB_u(2)#defineACCESSCTRL_SYSINFO_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_NSP// Description : If 1, SYSINFO can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SYSINFO_NSP_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SYSINFO_NSP_MSB_u(1)#defineACCESSCTRL_SYSINFO_NSP_LSB_u(1)#defineACCESSCTRL_SYSINFO_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSINFO_NSU// Description : If 1, and NSP is also set, SYSINFO can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SYSINFO_NSU_RESET_u(0x1)#defineACCESSCTRL_SYSINFO_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SYSINFO_NSU_MSB_u(0)#defineACCESSCTRL_SYSINFO_NSU_LSB_u(0)#defineACCESSCTRL_SYSINFO_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_RESETS// Description : Control whether debugger, DMA, core 0 and core 1 can access// RESETS, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_RESETS_OFFSET_u(0x00000064)#defineACCESSCTRL_RESETS_BITS_u(0x000000ff)#defineACCESSCTRL_RESETS_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_DBG// Description : If 1, RESETS can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_RESETS_DBG_RESET_u(0x1)#defineACCESSCTRL_RESETS_DBG_BITS_u(0x00000080)#defineACCESSCTRL_RESETS_DBG_MSB_u(7)#defineACCESSCTRL_RESETS_DBG_LSB_u(7)#defineACCESSCTRL_RESETS_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_DMA// Description : If 1, RESETS can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_RESETS_DMA_RESET_u(0x1)#defineACCESSCTRL_RESETS_DMA_BITS_u(0x00000040)#defineACCESSCTRL_RESETS_DMA_MSB_u(6)#defineACCESSCTRL_RESETS_DMA_LSB_u(6)#defineACCESSCTRL_RESETS_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_CORE1// Description : If 1, RESETS can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_RESETS_CORE1_RESET_u(0x1)#defineACCESSCTRL_RESETS_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_RESETS_CORE1_MSB_u(5)#defineACCESSCTRL_RESETS_CORE1_LSB_u(5)#defineACCESSCTRL_RESETS_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_CORE0// Description : If 1, RESETS can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_RESETS_CORE0_RESET_u(0x1)#defineACCESSCTRL_RESETS_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_RESETS_CORE0_MSB_u(4)#defineACCESSCTRL_RESETS_CORE0_LSB_u(4)#defineACCESSCTRL_RESETS_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_SP// Description : If 1, RESETS can be accessed from a Secure, Privileged context.#defineACCESSCTRL_RESETS_SP_RESET_u(0x1)#defineACCESSCTRL_RESETS_SP_BITS_u(0x00000008)#defineACCESSCTRL_RESETS_SP_MSB_u(3)#defineACCESSCTRL_RESETS_SP_LSB_u(3)#defineACCESSCTRL_RESETS_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_SU// Description : If 1, and SP is also set, RESETS can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_RESETS_SU_RESET_u(0x1)#defineACCESSCTRL_RESETS_SU_BITS_u(0x00000004)#defineACCESSCTRL_RESETS_SU_MSB_u(2)#defineACCESSCTRL_RESETS_SU_LSB_u(2)#defineACCESSCTRL_RESETS_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_NSP// Description : If 1, RESETS can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_RESETS_NSP_RESET_u(0x0)#defineACCESSCTRL_RESETS_NSP_BITS_u(0x00000002)#defineACCESSCTRL_RESETS_NSP_MSB_u(1)#defineACCESSCTRL_RESETS_NSP_LSB_u(1)#defineACCESSCTRL_RESETS_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RESETS_NSU// Description : If 1, and NSP is also set, RESETS can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_RESETS_NSU_RESET_u(0x0)#defineACCESSCTRL_RESETS_NSU_BITS_u(0x00000001)#defineACCESSCTRL_RESETS_NSU_MSB_u(0)#defineACCESSCTRL_RESETS_NSU_LSB_u(0)#defineACCESSCTRL_RESETS_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_IO_BANK0// Description : Control whether debugger, DMA, core 0 and core 1 can access// IO_BANK0, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_IO_BANK0_OFFSET_u(0x00000068)#defineACCESSCTRL_IO_BANK0_BITS_u(0x000000ff)#defineACCESSCTRL_IO_BANK0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_DBG// Description : If 1, IO_BANK0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_IO_BANK0_DBG_RESET_u(0x1)#defineACCESSCTRL_IO_BANK0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_IO_BANK0_DBG_MSB_u(7)#defineACCESSCTRL_IO_BANK0_DBG_LSB_u(7)#defineACCESSCTRL_IO_BANK0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_DMA// Description : If 1, IO_BANK0 can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_IO_BANK0_DMA_RESET_u(0x1)#defineACCESSCTRL_IO_BANK0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_IO_BANK0_DMA_MSB_u(6)#defineACCESSCTRL_IO_BANK0_DMA_LSB_u(6)#defineACCESSCTRL_IO_BANK0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_CORE1// Description : If 1, IO_BANK0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_IO_BANK0_CORE1_RESET_u(0x1)#defineACCESSCTRL_IO_BANK0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_IO_BANK0_CORE1_MSB_u(5)#defineACCESSCTRL_IO_BANK0_CORE1_LSB_u(5)#defineACCESSCTRL_IO_BANK0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_CORE0// Description : If 1, IO_BANK0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_IO_BANK0_CORE0_RESET_u(0x1)#defineACCESSCTRL_IO_BANK0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_IO_BANK0_CORE0_MSB_u(4)#defineACCESSCTRL_IO_BANK0_CORE0_LSB_u(4)#defineACCESSCTRL_IO_BANK0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_SP// Description : If 1, IO_BANK0 can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_IO_BANK0_SP_RESET_u(0x1)#defineACCESSCTRL_IO_BANK0_SP_BITS_u(0x00000008)#defineACCESSCTRL_IO_BANK0_SP_MSB_u(3)#defineACCESSCTRL_IO_BANK0_SP_LSB_u(3)#defineACCESSCTRL_IO_BANK0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_SU// Description : If 1, and SP is also set, IO_BANK0 can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_IO_BANK0_SU_RESET_u(0x1)#defineACCESSCTRL_IO_BANK0_SU_BITS_u(0x00000004)#defineACCESSCTRL_IO_BANK0_SU_MSB_u(2)#defineACCESSCTRL_IO_BANK0_SU_LSB_u(2)#defineACCESSCTRL_IO_BANK0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_NSP// Description : If 1, IO_BANK0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_IO_BANK0_NSP_RESET_u(0x0)#defineACCESSCTRL_IO_BANK0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_IO_BANK0_NSP_MSB_u(1)#defineACCESSCTRL_IO_BANK0_NSP_LSB_u(1)#defineACCESSCTRL_IO_BANK0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK0_NSU// Description : If 1, and NSP is also set, IO_BANK0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_IO_BANK0_NSU_RESET_u(0x0)#defineACCESSCTRL_IO_BANK0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_IO_BANK0_NSU_MSB_u(0)#defineACCESSCTRL_IO_BANK0_NSU_LSB_u(0)#defineACCESSCTRL_IO_BANK0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_IO_BANK1// Description : Control whether debugger, DMA, core 0 and core 1 can access// IO_BANK1, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_IO_BANK1_OFFSET_u(0x0000006c)#defineACCESSCTRL_IO_BANK1_BITS_u(0x000000ff)#defineACCESSCTRL_IO_BANK1_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_DBG// Description : If 1, IO_BANK1 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_IO_BANK1_DBG_RESET_u(0x1)#defineACCESSCTRL_IO_BANK1_DBG_BITS_u(0x00000080)#defineACCESSCTRL_IO_BANK1_DBG_MSB_u(7)#defineACCESSCTRL_IO_BANK1_DBG_LSB_u(7)#defineACCESSCTRL_IO_BANK1_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_DMA// Description : If 1, IO_BANK1 can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_IO_BANK1_DMA_RESET_u(0x1)#defineACCESSCTRL_IO_BANK1_DMA_BITS_u(0x00000040)#defineACCESSCTRL_IO_BANK1_DMA_MSB_u(6)#defineACCESSCTRL_IO_BANK1_DMA_LSB_u(6)#defineACCESSCTRL_IO_BANK1_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_CORE1// Description : If 1, IO_BANK1 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_IO_BANK1_CORE1_RESET_u(0x1)#defineACCESSCTRL_IO_BANK1_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_IO_BANK1_CORE1_MSB_u(5)#defineACCESSCTRL_IO_BANK1_CORE1_LSB_u(5)#defineACCESSCTRL_IO_BANK1_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_CORE0// Description : If 1, IO_BANK1 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_IO_BANK1_CORE0_RESET_u(0x1)#defineACCESSCTRL_IO_BANK1_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_IO_BANK1_CORE0_MSB_u(4)#defineACCESSCTRL_IO_BANK1_CORE0_LSB_u(4)#defineACCESSCTRL_IO_BANK1_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_SP// Description : If 1, IO_BANK1 can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_IO_BANK1_SP_RESET_u(0x1)#defineACCESSCTRL_IO_BANK1_SP_BITS_u(0x00000008)#defineACCESSCTRL_IO_BANK1_SP_MSB_u(3)#defineACCESSCTRL_IO_BANK1_SP_LSB_u(3)#defineACCESSCTRL_IO_BANK1_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_SU// Description : If 1, and SP is also set, IO_BANK1 can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_IO_BANK1_SU_RESET_u(0x1)#defineACCESSCTRL_IO_BANK1_SU_BITS_u(0x00000004)#defineACCESSCTRL_IO_BANK1_SU_MSB_u(2)#defineACCESSCTRL_IO_BANK1_SU_LSB_u(2)#defineACCESSCTRL_IO_BANK1_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_NSP// Description : If 1, IO_BANK1 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_IO_BANK1_NSP_RESET_u(0x0)#defineACCESSCTRL_IO_BANK1_NSP_BITS_u(0x00000002)#defineACCESSCTRL_IO_BANK1_NSP_MSB_u(1)#defineACCESSCTRL_IO_BANK1_NSP_LSB_u(1)#defineACCESSCTRL_IO_BANK1_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_IO_BANK1_NSU// Description : If 1, and NSP is also set, IO_BANK1 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_IO_BANK1_NSU_RESET_u(0x0)#defineACCESSCTRL_IO_BANK1_NSU_BITS_u(0x00000001)#defineACCESSCTRL_IO_BANK1_NSU_MSB_u(0)#defineACCESSCTRL_IO_BANK1_NSU_LSB_u(0)#defineACCESSCTRL_IO_BANK1_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PADS_BANK0// Description : Control whether debugger, DMA, core 0 and core 1 can access// PADS_BANK0, and at what security/privilege levels they can do// so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PADS_BANK0_OFFSET_u(0x00000070)#defineACCESSCTRL_PADS_BANK0_BITS_u(0x000000ff)#defineACCESSCTRL_PADS_BANK0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_DBG// Description : If 1, PADS_BANK0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_BANK0_DBG_RESET_u(0x1)#defineACCESSCTRL_PADS_BANK0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PADS_BANK0_DBG_MSB_u(7)#defineACCESSCTRL_PADS_BANK0_DBG_LSB_u(7)#defineACCESSCTRL_PADS_BANK0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_DMA// Description : If 1, PADS_BANK0 can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_BANK0_DMA_RESET_u(0x1)#defineACCESSCTRL_PADS_BANK0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PADS_BANK0_DMA_MSB_u(6)#defineACCESSCTRL_PADS_BANK0_DMA_LSB_u(6)#defineACCESSCTRL_PADS_BANK0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_CORE1// Description : If 1, PADS_BANK0 can be accessed by core 1, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_BANK0_CORE1_RESET_u(0x1)#defineACCESSCTRL_PADS_BANK0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PADS_BANK0_CORE1_MSB_u(5)#defineACCESSCTRL_PADS_BANK0_CORE1_LSB_u(5)#defineACCESSCTRL_PADS_BANK0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_CORE0// Description : If 1, PADS_BANK0 can be accessed by core 0, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_BANK0_CORE0_RESET_u(0x1)#defineACCESSCTRL_PADS_BANK0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PADS_BANK0_CORE0_MSB_u(4)#defineACCESSCTRL_PADS_BANK0_CORE0_LSB_u(4)#defineACCESSCTRL_PADS_BANK0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_SP// Description : If 1, PADS_BANK0 can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_PADS_BANK0_SP_RESET_u(0x1)#defineACCESSCTRL_PADS_BANK0_SP_BITS_u(0x00000008)#defineACCESSCTRL_PADS_BANK0_SP_MSB_u(3)#defineACCESSCTRL_PADS_BANK0_SP_LSB_u(3)#defineACCESSCTRL_PADS_BANK0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_SU// Description : If 1, and SP is also set, PADS_BANK0 can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_PADS_BANK0_SU_RESET_u(0x1)#defineACCESSCTRL_PADS_BANK0_SU_BITS_u(0x00000004)#defineACCESSCTRL_PADS_BANK0_SU_MSB_u(2)#defineACCESSCTRL_PADS_BANK0_SU_LSB_u(2)#defineACCESSCTRL_PADS_BANK0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_NSP// Description : If 1, PADS_BANK0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PADS_BANK0_NSP_RESET_u(0x0)#defineACCESSCTRL_PADS_BANK0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PADS_BANK0_NSP_MSB_u(1)#defineACCESSCTRL_PADS_BANK0_NSP_LSB_u(1)#defineACCESSCTRL_PADS_BANK0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_BANK0_NSU// Description : If 1, and NSP is also set, PADS_BANK0 can be accessed from a// Non-secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PADS_BANK0_NSU_RESET_u(0x0)#defineACCESSCTRL_PADS_BANK0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PADS_BANK0_NSU_MSB_u(0)#defineACCESSCTRL_PADS_BANK0_NSU_LSB_u(0)#defineACCESSCTRL_PADS_BANK0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PADS_QSPI// Description : Control whether debugger, DMA, core 0 and core 1 can access// PADS_QSPI, and at what security/privilege levels they can do// so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PADS_QSPI_OFFSET_u(0x00000074)#defineACCESSCTRL_PADS_QSPI_BITS_u(0x000000ff)#defineACCESSCTRL_PADS_QSPI_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_DBG// Description : If 1, PADS_QSPI can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_QSPI_DBG_RESET_u(0x1)#defineACCESSCTRL_PADS_QSPI_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PADS_QSPI_DBG_MSB_u(7)#defineACCESSCTRL_PADS_QSPI_DBG_LSB_u(7)#defineACCESSCTRL_PADS_QSPI_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_DMA// Description : If 1, PADS_QSPI can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_QSPI_DMA_RESET_u(0x1)#defineACCESSCTRL_PADS_QSPI_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PADS_QSPI_DMA_MSB_u(6)#defineACCESSCTRL_PADS_QSPI_DMA_LSB_u(6)#defineACCESSCTRL_PADS_QSPI_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_CORE1// Description : If 1, PADS_QSPI can be accessed by core 1, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_QSPI_CORE1_RESET_u(0x1)#defineACCESSCTRL_PADS_QSPI_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PADS_QSPI_CORE1_MSB_u(5)#defineACCESSCTRL_PADS_QSPI_CORE1_LSB_u(5)#defineACCESSCTRL_PADS_QSPI_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_CORE0// Description : If 1, PADS_QSPI can be accessed by core 0, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PADS_QSPI_CORE0_RESET_u(0x1)#defineACCESSCTRL_PADS_QSPI_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PADS_QSPI_CORE0_MSB_u(4)#defineACCESSCTRL_PADS_QSPI_CORE0_LSB_u(4)#defineACCESSCTRL_PADS_QSPI_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_SP// Description : If 1, PADS_QSPI can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_PADS_QSPI_SP_RESET_u(0x1)#defineACCESSCTRL_PADS_QSPI_SP_BITS_u(0x00000008)#defineACCESSCTRL_PADS_QSPI_SP_MSB_u(3)#defineACCESSCTRL_PADS_QSPI_SP_LSB_u(3)#defineACCESSCTRL_PADS_QSPI_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_SU// Description : If 1, and SP is also set, PADS_QSPI can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_PADS_QSPI_SU_RESET_u(0x1)#defineACCESSCTRL_PADS_QSPI_SU_BITS_u(0x00000004)#defineACCESSCTRL_PADS_QSPI_SU_MSB_u(2)#defineACCESSCTRL_PADS_QSPI_SU_LSB_u(2)#defineACCESSCTRL_PADS_QSPI_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_NSP// Description : If 1, PADS_QSPI can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PADS_QSPI_NSP_RESET_u(0x0)#defineACCESSCTRL_PADS_QSPI_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PADS_QSPI_NSP_MSB_u(1)#defineACCESSCTRL_PADS_QSPI_NSP_LSB_u(1)#defineACCESSCTRL_PADS_QSPI_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PADS_QSPI_NSU// Description : If 1, and NSP is also set, PADS_QSPI can be accessed from a// Non-secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PADS_QSPI_NSU_RESET_u(0x0)#defineACCESSCTRL_PADS_QSPI_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PADS_QSPI_NSU_MSB_u(0)#defineACCESSCTRL_PADS_QSPI_NSU_LSB_u(0)#defineACCESSCTRL_PADS_QSPI_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_BUSCTRL// Description : Control whether debugger, DMA, core 0 and core 1 can access// BUSCTRL, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_BUSCTRL_OFFSET_u(0x00000078)#defineACCESSCTRL_BUSCTRL_BITS_u(0x000000ff)#defineACCESSCTRL_BUSCTRL_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_DBG// Description : If 1, BUSCTRL can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_BUSCTRL_DBG_RESET_u(0x1)#defineACCESSCTRL_BUSCTRL_DBG_BITS_u(0x00000080)#defineACCESSCTRL_BUSCTRL_DBG_MSB_u(7)#defineACCESSCTRL_BUSCTRL_DBG_LSB_u(7)#defineACCESSCTRL_BUSCTRL_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_DMA// Description : If 1, BUSCTRL can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_BUSCTRL_DMA_RESET_u(0x1)#defineACCESSCTRL_BUSCTRL_DMA_BITS_u(0x00000040)#defineACCESSCTRL_BUSCTRL_DMA_MSB_u(6)#defineACCESSCTRL_BUSCTRL_DMA_LSB_u(6)#defineACCESSCTRL_BUSCTRL_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_CORE1// Description : If 1, BUSCTRL can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_BUSCTRL_CORE1_RESET_u(0x1)#defineACCESSCTRL_BUSCTRL_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_BUSCTRL_CORE1_MSB_u(5)#defineACCESSCTRL_BUSCTRL_CORE1_LSB_u(5)#defineACCESSCTRL_BUSCTRL_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_CORE0// Description : If 1, BUSCTRL can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_BUSCTRL_CORE0_RESET_u(0x1)#defineACCESSCTRL_BUSCTRL_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_BUSCTRL_CORE0_MSB_u(4)#defineACCESSCTRL_BUSCTRL_CORE0_LSB_u(4)#defineACCESSCTRL_BUSCTRL_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_SP// Description : If 1, BUSCTRL can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_BUSCTRL_SP_RESET_u(0x1)#defineACCESSCTRL_BUSCTRL_SP_BITS_u(0x00000008)#defineACCESSCTRL_BUSCTRL_SP_MSB_u(3)#defineACCESSCTRL_BUSCTRL_SP_LSB_u(3)#defineACCESSCTRL_BUSCTRL_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_SU// Description : If 1, and SP is also set, BUSCTRL can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_BUSCTRL_SU_RESET_u(0x1)#defineACCESSCTRL_BUSCTRL_SU_BITS_u(0x00000004)#defineACCESSCTRL_BUSCTRL_SU_MSB_u(2)#defineACCESSCTRL_BUSCTRL_SU_LSB_u(2)#defineACCESSCTRL_BUSCTRL_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_NSP// Description : If 1, BUSCTRL can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_BUSCTRL_NSP_RESET_u(0x0)#defineACCESSCTRL_BUSCTRL_NSP_BITS_u(0x00000002)#defineACCESSCTRL_BUSCTRL_NSP_MSB_u(1)#defineACCESSCTRL_BUSCTRL_NSP_LSB_u(1)#defineACCESSCTRL_BUSCTRL_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_BUSCTRL_NSU// Description : If 1, and NSP is also set, BUSCTRL can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_BUSCTRL_NSU_RESET_u(0x0)#defineACCESSCTRL_BUSCTRL_NSU_BITS_u(0x00000001)#defineACCESSCTRL_BUSCTRL_NSU_MSB_u(0)#defineACCESSCTRL_BUSCTRL_NSU_LSB_u(0)#defineACCESSCTRL_BUSCTRL_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_ADC0// Description : Control whether debugger, DMA, core 0 and core 1 can access// ADC0, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_ADC0_OFFSET_u(0x0000007c)#defineACCESSCTRL_ADC0_BITS_u(0x000000ff)#defineACCESSCTRL_ADC0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_DBG// Description : If 1, ADC0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_ADC0_DBG_RESET_u(0x1)#defineACCESSCTRL_ADC0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_ADC0_DBG_MSB_u(7)#defineACCESSCTRL_ADC0_DBG_LSB_u(7)#defineACCESSCTRL_ADC0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_DMA// Description : If 1, ADC0 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ADC0_DMA_RESET_u(0x1)#defineACCESSCTRL_ADC0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_ADC0_DMA_MSB_u(6)#defineACCESSCTRL_ADC0_DMA_LSB_u(6)#defineACCESSCTRL_ADC0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_CORE1// Description : If 1, ADC0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ADC0_CORE1_RESET_u(0x1)#defineACCESSCTRL_ADC0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_ADC0_CORE1_MSB_u(5)#defineACCESSCTRL_ADC0_CORE1_LSB_u(5)#defineACCESSCTRL_ADC0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_CORE0// Description : If 1, ADC0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ADC0_CORE0_RESET_u(0x1)#defineACCESSCTRL_ADC0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_ADC0_CORE0_MSB_u(4)#defineACCESSCTRL_ADC0_CORE0_LSB_u(4)#defineACCESSCTRL_ADC0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_SP// Description : If 1, ADC0 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_ADC0_SP_RESET_u(0x1)#defineACCESSCTRL_ADC0_SP_BITS_u(0x00000008)#defineACCESSCTRL_ADC0_SP_MSB_u(3)#defineACCESSCTRL_ADC0_SP_LSB_u(3)#defineACCESSCTRL_ADC0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_SU// Description : If 1, and SP is also set, ADC0 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_ADC0_SU_RESET_u(0x1)#defineACCESSCTRL_ADC0_SU_BITS_u(0x00000004)#defineACCESSCTRL_ADC0_SU_MSB_u(2)#defineACCESSCTRL_ADC0_SU_LSB_u(2)#defineACCESSCTRL_ADC0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_NSP// Description : If 1, ADC0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_ADC0_NSP_RESET_u(0x0)#defineACCESSCTRL_ADC0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_ADC0_NSP_MSB_u(1)#defineACCESSCTRL_ADC0_NSP_LSB_u(1)#defineACCESSCTRL_ADC0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ADC0_NSU// Description : If 1, and NSP is also set, ADC0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_ADC0_NSU_RESET_u(0x0)#defineACCESSCTRL_ADC0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_ADC0_NSU_MSB_u(0)#defineACCESSCTRL_ADC0_NSU_LSB_u(0)#defineACCESSCTRL_ADC0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_HSTX// Description : Control whether debugger, DMA, core 0 and core 1 can access// HSTX, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_HSTX_OFFSET_u(0x00000080)#defineACCESSCTRL_HSTX_BITS_u(0x000000ff)#defineACCESSCTRL_HSTX_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_DBG// Description : If 1, HSTX can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_HSTX_DBG_RESET_u(0x1)#defineACCESSCTRL_HSTX_DBG_BITS_u(0x00000080)#defineACCESSCTRL_HSTX_DBG_MSB_u(7)#defineACCESSCTRL_HSTX_DBG_LSB_u(7)#defineACCESSCTRL_HSTX_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_DMA// Description : If 1, HSTX can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_HSTX_DMA_RESET_u(0x1)#defineACCESSCTRL_HSTX_DMA_BITS_u(0x00000040)#defineACCESSCTRL_HSTX_DMA_MSB_u(6)#defineACCESSCTRL_HSTX_DMA_LSB_u(6)#defineACCESSCTRL_HSTX_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_CORE1// Description : If 1, HSTX can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_HSTX_CORE1_RESET_u(0x1)#defineACCESSCTRL_HSTX_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_HSTX_CORE1_MSB_u(5)#defineACCESSCTRL_HSTX_CORE1_LSB_u(5)#defineACCESSCTRL_HSTX_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_CORE0// Description : If 1, HSTX can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_HSTX_CORE0_RESET_u(0x1)#defineACCESSCTRL_HSTX_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_HSTX_CORE0_MSB_u(4)#defineACCESSCTRL_HSTX_CORE0_LSB_u(4)#defineACCESSCTRL_HSTX_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_SP// Description : If 1, HSTX can be accessed from a Secure, Privileged context.#defineACCESSCTRL_HSTX_SP_RESET_u(0x1)#defineACCESSCTRL_HSTX_SP_BITS_u(0x00000008)#defineACCESSCTRL_HSTX_SP_MSB_u(3)#defineACCESSCTRL_HSTX_SP_LSB_u(3)#defineACCESSCTRL_HSTX_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_SU// Description : If 1, and SP is also set, HSTX can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_HSTX_SU_RESET_u(0x1)#defineACCESSCTRL_HSTX_SU_BITS_u(0x00000004)#defineACCESSCTRL_HSTX_SU_MSB_u(2)#defineACCESSCTRL_HSTX_SU_LSB_u(2)#defineACCESSCTRL_HSTX_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_NSP// Description : If 1, HSTX can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_HSTX_NSP_RESET_u(0x0)#defineACCESSCTRL_HSTX_NSP_BITS_u(0x00000002)#defineACCESSCTRL_HSTX_NSP_MSB_u(1)#defineACCESSCTRL_HSTX_NSP_LSB_u(1)#defineACCESSCTRL_HSTX_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_HSTX_NSU// Description : If 1, and NSP is also set, HSTX can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_HSTX_NSU_RESET_u(0x0)#defineACCESSCTRL_HSTX_NSU_BITS_u(0x00000001)#defineACCESSCTRL_HSTX_NSU_MSB_u(0)#defineACCESSCTRL_HSTX_NSU_LSB_u(0)#defineACCESSCTRL_HSTX_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_I2C0// Description : Control whether debugger, DMA, core 0 and core 1 can access// I2C0, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_I2C0_OFFSET_u(0x00000084)#defineACCESSCTRL_I2C0_BITS_u(0x000000ff)#defineACCESSCTRL_I2C0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_DBG// Description : If 1, I2C0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_I2C0_DBG_RESET_u(0x1)#defineACCESSCTRL_I2C0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_I2C0_DBG_MSB_u(7)#defineACCESSCTRL_I2C0_DBG_LSB_u(7)#defineACCESSCTRL_I2C0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_DMA// Description : If 1, I2C0 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_I2C0_DMA_RESET_u(0x1)#defineACCESSCTRL_I2C0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_I2C0_DMA_MSB_u(6)#defineACCESSCTRL_I2C0_DMA_LSB_u(6)#defineACCESSCTRL_I2C0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_CORE1// Description : If 1, I2C0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_I2C0_CORE1_RESET_u(0x1)#defineACCESSCTRL_I2C0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_I2C0_CORE1_MSB_u(5)#defineACCESSCTRL_I2C0_CORE1_LSB_u(5)#defineACCESSCTRL_I2C0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_CORE0// Description : If 1, I2C0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_I2C0_CORE0_RESET_u(0x1)#defineACCESSCTRL_I2C0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_I2C0_CORE0_MSB_u(4)#defineACCESSCTRL_I2C0_CORE0_LSB_u(4)#defineACCESSCTRL_I2C0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_SP// Description : If 1, I2C0 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_I2C0_SP_RESET_u(0x1)#defineACCESSCTRL_I2C0_SP_BITS_u(0x00000008)#defineACCESSCTRL_I2C0_SP_MSB_u(3)#defineACCESSCTRL_I2C0_SP_LSB_u(3)#defineACCESSCTRL_I2C0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_SU// Description : If 1, and SP is also set, I2C0 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_I2C0_SU_RESET_u(0x1)#defineACCESSCTRL_I2C0_SU_BITS_u(0x00000004)#defineACCESSCTRL_I2C0_SU_MSB_u(2)#defineACCESSCTRL_I2C0_SU_LSB_u(2)#defineACCESSCTRL_I2C0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_NSP// Description : If 1, I2C0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_I2C0_NSP_RESET_u(0x0)#defineACCESSCTRL_I2C0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_I2C0_NSP_MSB_u(1)#defineACCESSCTRL_I2C0_NSP_LSB_u(1)#defineACCESSCTRL_I2C0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C0_NSU// Description : If 1, and NSP is also set, I2C0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_I2C0_NSU_RESET_u(0x0)#defineACCESSCTRL_I2C0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_I2C0_NSU_MSB_u(0)#defineACCESSCTRL_I2C0_NSU_LSB_u(0)#defineACCESSCTRL_I2C0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_I2C1// Description : Control whether debugger, DMA, core 0 and core 1 can access// I2C1, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_I2C1_OFFSET_u(0x00000088)#defineACCESSCTRL_I2C1_BITS_u(0x000000ff)#defineACCESSCTRL_I2C1_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_DBG// Description : If 1, I2C1 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_I2C1_DBG_RESET_u(0x1)#defineACCESSCTRL_I2C1_DBG_BITS_u(0x00000080)#defineACCESSCTRL_I2C1_DBG_MSB_u(7)#defineACCESSCTRL_I2C1_DBG_LSB_u(7)#defineACCESSCTRL_I2C1_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_DMA// Description : If 1, I2C1 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_I2C1_DMA_RESET_u(0x1)#defineACCESSCTRL_I2C1_DMA_BITS_u(0x00000040)#defineACCESSCTRL_I2C1_DMA_MSB_u(6)#defineACCESSCTRL_I2C1_DMA_LSB_u(6)#defineACCESSCTRL_I2C1_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_CORE1// Description : If 1, I2C1 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_I2C1_CORE1_RESET_u(0x1)#defineACCESSCTRL_I2C1_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_I2C1_CORE1_MSB_u(5)#defineACCESSCTRL_I2C1_CORE1_LSB_u(5)#defineACCESSCTRL_I2C1_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_CORE0// Description : If 1, I2C1 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_I2C1_CORE0_RESET_u(0x1)#defineACCESSCTRL_I2C1_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_I2C1_CORE0_MSB_u(4)#defineACCESSCTRL_I2C1_CORE0_LSB_u(4)#defineACCESSCTRL_I2C1_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_SP// Description : If 1, I2C1 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_I2C1_SP_RESET_u(0x1)#defineACCESSCTRL_I2C1_SP_BITS_u(0x00000008)#defineACCESSCTRL_I2C1_SP_MSB_u(3)#defineACCESSCTRL_I2C1_SP_LSB_u(3)#defineACCESSCTRL_I2C1_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_SU// Description : If 1, and SP is also set, I2C1 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_I2C1_SU_RESET_u(0x1)#defineACCESSCTRL_I2C1_SU_BITS_u(0x00000004)#defineACCESSCTRL_I2C1_SU_MSB_u(2)#defineACCESSCTRL_I2C1_SU_LSB_u(2)#defineACCESSCTRL_I2C1_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_NSP// Description : If 1, I2C1 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_I2C1_NSP_RESET_u(0x0)#defineACCESSCTRL_I2C1_NSP_BITS_u(0x00000002)#defineACCESSCTRL_I2C1_NSP_MSB_u(1)#defineACCESSCTRL_I2C1_NSP_LSB_u(1)#defineACCESSCTRL_I2C1_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_I2C1_NSU// Description : If 1, and NSP is also set, I2C1 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_I2C1_NSU_RESET_u(0x0)#defineACCESSCTRL_I2C1_NSU_BITS_u(0x00000001)#defineACCESSCTRL_I2C1_NSU_MSB_u(0)#defineACCESSCTRL_I2C1_NSU_LSB_u(0)#defineACCESSCTRL_I2C1_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PWM// Description : Control whether debugger, DMA, core 0 and core 1 can access// PWM, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PWM_OFFSET_u(0x0000008c)#defineACCESSCTRL_PWM_BITS_u(0x000000ff)#defineACCESSCTRL_PWM_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_DBG// Description : If 1, PWM can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PWM_DBG_RESET_u(0x1)#defineACCESSCTRL_PWM_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PWM_DBG_MSB_u(7)#defineACCESSCTRL_PWM_DBG_LSB_u(7)#defineACCESSCTRL_PWM_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_DMA// Description : If 1, PWM can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PWM_DMA_RESET_u(0x1)#defineACCESSCTRL_PWM_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PWM_DMA_MSB_u(6)#defineACCESSCTRL_PWM_DMA_LSB_u(6)#defineACCESSCTRL_PWM_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_CORE1// Description : If 1, PWM can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PWM_CORE1_RESET_u(0x1)#defineACCESSCTRL_PWM_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PWM_CORE1_MSB_u(5)#defineACCESSCTRL_PWM_CORE1_LSB_u(5)#defineACCESSCTRL_PWM_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_CORE0// Description : If 1, PWM can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PWM_CORE0_RESET_u(0x1)#defineACCESSCTRL_PWM_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PWM_CORE0_MSB_u(4)#defineACCESSCTRL_PWM_CORE0_LSB_u(4)#defineACCESSCTRL_PWM_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_SP// Description : If 1, PWM can be accessed from a Secure, Privileged context.#defineACCESSCTRL_PWM_SP_RESET_u(0x1)#defineACCESSCTRL_PWM_SP_BITS_u(0x00000008)#defineACCESSCTRL_PWM_SP_MSB_u(3)#defineACCESSCTRL_PWM_SP_LSB_u(3)#defineACCESSCTRL_PWM_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_SU// Description : If 1, and SP is also set, PWM can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_PWM_SU_RESET_u(0x1)#defineACCESSCTRL_PWM_SU_BITS_u(0x00000004)#defineACCESSCTRL_PWM_SU_MSB_u(2)#defineACCESSCTRL_PWM_SU_LSB_u(2)#defineACCESSCTRL_PWM_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_NSP// Description : If 1, PWM can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PWM_NSP_RESET_u(0x0)#defineACCESSCTRL_PWM_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PWM_NSP_MSB_u(1)#defineACCESSCTRL_PWM_NSP_LSB_u(1)#defineACCESSCTRL_PWM_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PWM_NSU// Description : If 1, and NSP is also set, PWM can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PWM_NSU_RESET_u(0x0)#defineACCESSCTRL_PWM_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PWM_NSU_MSB_u(0)#defineACCESSCTRL_PWM_NSU_LSB_u(0)#defineACCESSCTRL_PWM_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SPI0// Description : Control whether debugger, DMA, core 0 and core 1 can access// SPI0, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SPI0_OFFSET_u(0x00000090)#defineACCESSCTRL_SPI0_BITS_u(0x000000ff)#defineACCESSCTRL_SPI0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_DBG// Description : If 1, SPI0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SPI0_DBG_RESET_u(0x1)#defineACCESSCTRL_SPI0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SPI0_DBG_MSB_u(7)#defineACCESSCTRL_SPI0_DBG_LSB_u(7)#defineACCESSCTRL_SPI0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_DMA// Description : If 1, SPI0 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SPI0_DMA_RESET_u(0x1)#defineACCESSCTRL_SPI0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SPI0_DMA_MSB_u(6)#defineACCESSCTRL_SPI0_DMA_LSB_u(6)#defineACCESSCTRL_SPI0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_CORE1// Description : If 1, SPI0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SPI0_CORE1_RESET_u(0x1)#defineACCESSCTRL_SPI0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SPI0_CORE1_MSB_u(5)#defineACCESSCTRL_SPI0_CORE1_LSB_u(5)#defineACCESSCTRL_SPI0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_CORE0// Description : If 1, SPI0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SPI0_CORE0_RESET_u(0x1)#defineACCESSCTRL_SPI0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SPI0_CORE0_MSB_u(4)#defineACCESSCTRL_SPI0_CORE0_LSB_u(4)#defineACCESSCTRL_SPI0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_SP// Description : If 1, SPI0 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SPI0_SP_RESET_u(0x1)#defineACCESSCTRL_SPI0_SP_BITS_u(0x00000008)#defineACCESSCTRL_SPI0_SP_MSB_u(3)#defineACCESSCTRL_SPI0_SP_LSB_u(3)#defineACCESSCTRL_SPI0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_SU// Description : If 1, and SP is also set, SPI0 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SPI0_SU_RESET_u(0x1)#defineACCESSCTRL_SPI0_SU_BITS_u(0x00000004)#defineACCESSCTRL_SPI0_SU_MSB_u(2)#defineACCESSCTRL_SPI0_SU_LSB_u(2)#defineACCESSCTRL_SPI0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_NSP// Description : If 1, SPI0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SPI0_NSP_RESET_u(0x0)#defineACCESSCTRL_SPI0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SPI0_NSP_MSB_u(1)#defineACCESSCTRL_SPI0_NSP_LSB_u(1)#defineACCESSCTRL_SPI0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI0_NSU// Description : If 1, and NSP is also set, SPI0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SPI0_NSU_RESET_u(0x0)#defineACCESSCTRL_SPI0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SPI0_NSU_MSB_u(0)#defineACCESSCTRL_SPI0_NSU_LSB_u(0)#defineACCESSCTRL_SPI0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SPI1// Description : Control whether debugger, DMA, core 0 and core 1 can access// SPI1, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SPI1_OFFSET_u(0x00000094)#defineACCESSCTRL_SPI1_BITS_u(0x000000ff)#defineACCESSCTRL_SPI1_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_DBG// Description : If 1, SPI1 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SPI1_DBG_RESET_u(0x1)#defineACCESSCTRL_SPI1_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SPI1_DBG_MSB_u(7)#defineACCESSCTRL_SPI1_DBG_LSB_u(7)#defineACCESSCTRL_SPI1_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_DMA// Description : If 1, SPI1 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SPI1_DMA_RESET_u(0x1)#defineACCESSCTRL_SPI1_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SPI1_DMA_MSB_u(6)#defineACCESSCTRL_SPI1_DMA_LSB_u(6)#defineACCESSCTRL_SPI1_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_CORE1// Description : If 1, SPI1 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SPI1_CORE1_RESET_u(0x1)#defineACCESSCTRL_SPI1_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SPI1_CORE1_MSB_u(5)#defineACCESSCTRL_SPI1_CORE1_LSB_u(5)#defineACCESSCTRL_SPI1_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_CORE0// Description : If 1, SPI1 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SPI1_CORE0_RESET_u(0x1)#defineACCESSCTRL_SPI1_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SPI1_CORE0_MSB_u(4)#defineACCESSCTRL_SPI1_CORE0_LSB_u(4)#defineACCESSCTRL_SPI1_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_SP// Description : If 1, SPI1 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SPI1_SP_RESET_u(0x1)#defineACCESSCTRL_SPI1_SP_BITS_u(0x00000008)#defineACCESSCTRL_SPI1_SP_MSB_u(3)#defineACCESSCTRL_SPI1_SP_LSB_u(3)#defineACCESSCTRL_SPI1_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_SU// Description : If 1, and SP is also set, SPI1 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SPI1_SU_RESET_u(0x1)#defineACCESSCTRL_SPI1_SU_BITS_u(0x00000004)#defineACCESSCTRL_SPI1_SU_MSB_u(2)#defineACCESSCTRL_SPI1_SU_LSB_u(2)#defineACCESSCTRL_SPI1_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_NSP// Description : If 1, SPI1 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SPI1_NSP_RESET_u(0x0)#defineACCESSCTRL_SPI1_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SPI1_NSP_MSB_u(1)#defineACCESSCTRL_SPI1_NSP_LSB_u(1)#defineACCESSCTRL_SPI1_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SPI1_NSU// Description : If 1, and NSP is also set, SPI1 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SPI1_NSU_RESET_u(0x0)#defineACCESSCTRL_SPI1_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SPI1_NSU_MSB_u(0)#defineACCESSCTRL_SPI1_NSU_LSB_u(0)#defineACCESSCTRL_SPI1_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_TIMER0// Description : Control whether debugger, DMA, core 0 and core 1 can access// TIMER0, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_TIMER0_OFFSET_u(0x00000098)#defineACCESSCTRL_TIMER0_BITS_u(0x000000ff)#defineACCESSCTRL_TIMER0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_DBG// Description : If 1, TIMER0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_TIMER0_DBG_RESET_u(0x1)#defineACCESSCTRL_TIMER0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_TIMER0_DBG_MSB_u(7)#defineACCESSCTRL_TIMER0_DBG_LSB_u(7)#defineACCESSCTRL_TIMER0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_DMA// Description : If 1, TIMER0 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TIMER0_DMA_RESET_u(0x1)#defineACCESSCTRL_TIMER0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_TIMER0_DMA_MSB_u(6)#defineACCESSCTRL_TIMER0_DMA_LSB_u(6)#defineACCESSCTRL_TIMER0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_CORE1// Description : If 1, TIMER0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TIMER0_CORE1_RESET_u(0x1)#defineACCESSCTRL_TIMER0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_TIMER0_CORE1_MSB_u(5)#defineACCESSCTRL_TIMER0_CORE1_LSB_u(5)#defineACCESSCTRL_TIMER0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_CORE0// Description : If 1, TIMER0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TIMER0_CORE0_RESET_u(0x1)#defineACCESSCTRL_TIMER0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_TIMER0_CORE0_MSB_u(4)#defineACCESSCTRL_TIMER0_CORE0_LSB_u(4)#defineACCESSCTRL_TIMER0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_SP// Description : If 1, TIMER0 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_TIMER0_SP_RESET_u(0x1)#defineACCESSCTRL_TIMER0_SP_BITS_u(0x00000008)#defineACCESSCTRL_TIMER0_SP_MSB_u(3)#defineACCESSCTRL_TIMER0_SP_LSB_u(3)#defineACCESSCTRL_TIMER0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_SU// Description : If 1, and SP is also set, TIMER0 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_TIMER0_SU_RESET_u(0x1)#defineACCESSCTRL_TIMER0_SU_BITS_u(0x00000004)#defineACCESSCTRL_TIMER0_SU_MSB_u(2)#defineACCESSCTRL_TIMER0_SU_LSB_u(2)#defineACCESSCTRL_TIMER0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_NSP// Description : If 1, TIMER0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_TIMER0_NSP_RESET_u(0x0)#defineACCESSCTRL_TIMER0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_TIMER0_NSP_MSB_u(1)#defineACCESSCTRL_TIMER0_NSP_LSB_u(1)#defineACCESSCTRL_TIMER0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER0_NSU// Description : If 1, and NSP is also set, TIMER0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_TIMER0_NSU_RESET_u(0x0)#defineACCESSCTRL_TIMER0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_TIMER0_NSU_MSB_u(0)#defineACCESSCTRL_TIMER0_NSU_LSB_u(0)#defineACCESSCTRL_TIMER0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_TIMER1// Description : Control whether debugger, DMA, core 0 and core 1 can access// TIMER1, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_TIMER1_OFFSET_u(0x0000009c)#defineACCESSCTRL_TIMER1_BITS_u(0x000000ff)#defineACCESSCTRL_TIMER1_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_DBG// Description : If 1, TIMER1 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_TIMER1_DBG_RESET_u(0x1)#defineACCESSCTRL_TIMER1_DBG_BITS_u(0x00000080)#defineACCESSCTRL_TIMER1_DBG_MSB_u(7)#defineACCESSCTRL_TIMER1_DBG_LSB_u(7)#defineACCESSCTRL_TIMER1_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_DMA// Description : If 1, TIMER1 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TIMER1_DMA_RESET_u(0x1)#defineACCESSCTRL_TIMER1_DMA_BITS_u(0x00000040)#defineACCESSCTRL_TIMER1_DMA_MSB_u(6)#defineACCESSCTRL_TIMER1_DMA_LSB_u(6)#defineACCESSCTRL_TIMER1_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_CORE1// Description : If 1, TIMER1 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TIMER1_CORE1_RESET_u(0x1)#defineACCESSCTRL_TIMER1_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_TIMER1_CORE1_MSB_u(5)#defineACCESSCTRL_TIMER1_CORE1_LSB_u(5)#defineACCESSCTRL_TIMER1_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_CORE0// Description : If 1, TIMER1 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TIMER1_CORE0_RESET_u(0x1)#defineACCESSCTRL_TIMER1_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_TIMER1_CORE0_MSB_u(4)#defineACCESSCTRL_TIMER1_CORE0_LSB_u(4)#defineACCESSCTRL_TIMER1_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_SP// Description : If 1, TIMER1 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_TIMER1_SP_RESET_u(0x1)#defineACCESSCTRL_TIMER1_SP_BITS_u(0x00000008)#defineACCESSCTRL_TIMER1_SP_MSB_u(3)#defineACCESSCTRL_TIMER1_SP_LSB_u(3)#defineACCESSCTRL_TIMER1_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_SU// Description : If 1, and SP is also set, TIMER1 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_TIMER1_SU_RESET_u(0x1)#defineACCESSCTRL_TIMER1_SU_BITS_u(0x00000004)#defineACCESSCTRL_TIMER1_SU_MSB_u(2)#defineACCESSCTRL_TIMER1_SU_LSB_u(2)#defineACCESSCTRL_TIMER1_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_NSP// Description : If 1, TIMER1 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_TIMER1_NSP_RESET_u(0x0)#defineACCESSCTRL_TIMER1_NSP_BITS_u(0x00000002)#defineACCESSCTRL_TIMER1_NSP_MSB_u(1)#defineACCESSCTRL_TIMER1_NSP_LSB_u(1)#defineACCESSCTRL_TIMER1_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TIMER1_NSU// Description : If 1, and NSP is also set, TIMER1 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_TIMER1_NSU_RESET_u(0x0)#defineACCESSCTRL_TIMER1_NSU_BITS_u(0x00000001)#defineACCESSCTRL_TIMER1_NSU_MSB_u(0)#defineACCESSCTRL_TIMER1_NSU_LSB_u(0)#defineACCESSCTRL_TIMER1_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_UART0// Description : Control whether debugger, DMA, core 0 and core 1 can access// UART0, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_UART0_OFFSET_u(0x000000a0)#defineACCESSCTRL_UART0_BITS_u(0x000000ff)#defineACCESSCTRL_UART0_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_DBG// Description : If 1, UART0 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_UART0_DBG_RESET_u(0x1)#defineACCESSCTRL_UART0_DBG_BITS_u(0x00000080)#defineACCESSCTRL_UART0_DBG_MSB_u(7)#defineACCESSCTRL_UART0_DBG_LSB_u(7)#defineACCESSCTRL_UART0_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_DMA// Description : If 1, UART0 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_UART0_DMA_RESET_u(0x1)#defineACCESSCTRL_UART0_DMA_BITS_u(0x00000040)#defineACCESSCTRL_UART0_DMA_MSB_u(6)#defineACCESSCTRL_UART0_DMA_LSB_u(6)#defineACCESSCTRL_UART0_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_CORE1// Description : If 1, UART0 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_UART0_CORE1_RESET_u(0x1)#defineACCESSCTRL_UART0_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_UART0_CORE1_MSB_u(5)#defineACCESSCTRL_UART0_CORE1_LSB_u(5)#defineACCESSCTRL_UART0_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_CORE0// Description : If 1, UART0 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_UART0_CORE0_RESET_u(0x1)#defineACCESSCTRL_UART0_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_UART0_CORE0_MSB_u(4)#defineACCESSCTRL_UART0_CORE0_LSB_u(4)#defineACCESSCTRL_UART0_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_SP// Description : If 1, UART0 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_UART0_SP_RESET_u(0x1)#defineACCESSCTRL_UART0_SP_BITS_u(0x00000008)#defineACCESSCTRL_UART0_SP_MSB_u(3)#defineACCESSCTRL_UART0_SP_LSB_u(3)#defineACCESSCTRL_UART0_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_SU// Description : If 1, and SP is also set, UART0 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_UART0_SU_RESET_u(0x1)#defineACCESSCTRL_UART0_SU_BITS_u(0x00000004)#defineACCESSCTRL_UART0_SU_MSB_u(2)#defineACCESSCTRL_UART0_SU_LSB_u(2)#defineACCESSCTRL_UART0_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_NSP// Description : If 1, UART0 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_UART0_NSP_RESET_u(0x0)#defineACCESSCTRL_UART0_NSP_BITS_u(0x00000002)#defineACCESSCTRL_UART0_NSP_MSB_u(1)#defineACCESSCTRL_UART0_NSP_LSB_u(1)#defineACCESSCTRL_UART0_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART0_NSU// Description : If 1, and NSP is also set, UART0 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_UART0_NSU_RESET_u(0x0)#defineACCESSCTRL_UART0_NSU_BITS_u(0x00000001)#defineACCESSCTRL_UART0_NSU_MSB_u(0)#defineACCESSCTRL_UART0_NSU_LSB_u(0)#defineACCESSCTRL_UART0_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_UART1// Description : Control whether debugger, DMA, core 0 and core 1 can access// UART1, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_UART1_OFFSET_u(0x000000a4)#defineACCESSCTRL_UART1_BITS_u(0x000000ff)#defineACCESSCTRL_UART1_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_DBG// Description : If 1, UART1 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_UART1_DBG_RESET_u(0x1)#defineACCESSCTRL_UART1_DBG_BITS_u(0x00000080)#defineACCESSCTRL_UART1_DBG_MSB_u(7)#defineACCESSCTRL_UART1_DBG_LSB_u(7)#defineACCESSCTRL_UART1_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_DMA// Description : If 1, UART1 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_UART1_DMA_RESET_u(0x1)#defineACCESSCTRL_UART1_DMA_BITS_u(0x00000040)#defineACCESSCTRL_UART1_DMA_MSB_u(6)#defineACCESSCTRL_UART1_DMA_LSB_u(6)#defineACCESSCTRL_UART1_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_CORE1// Description : If 1, UART1 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_UART1_CORE1_RESET_u(0x1)#defineACCESSCTRL_UART1_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_UART1_CORE1_MSB_u(5)#defineACCESSCTRL_UART1_CORE1_LSB_u(5)#defineACCESSCTRL_UART1_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_CORE0// Description : If 1, UART1 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_UART1_CORE0_RESET_u(0x1)#defineACCESSCTRL_UART1_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_UART1_CORE0_MSB_u(4)#defineACCESSCTRL_UART1_CORE0_LSB_u(4)#defineACCESSCTRL_UART1_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_SP// Description : If 1, UART1 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_UART1_SP_RESET_u(0x1)#defineACCESSCTRL_UART1_SP_BITS_u(0x00000008)#defineACCESSCTRL_UART1_SP_MSB_u(3)#defineACCESSCTRL_UART1_SP_LSB_u(3)#defineACCESSCTRL_UART1_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_SU// Description : If 1, and SP is also set, UART1 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_UART1_SU_RESET_u(0x1)#defineACCESSCTRL_UART1_SU_BITS_u(0x00000004)#defineACCESSCTRL_UART1_SU_MSB_u(2)#defineACCESSCTRL_UART1_SU_LSB_u(2)#defineACCESSCTRL_UART1_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_NSP// Description : If 1, UART1 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_UART1_NSP_RESET_u(0x0)#defineACCESSCTRL_UART1_NSP_BITS_u(0x00000002)#defineACCESSCTRL_UART1_NSP_MSB_u(1)#defineACCESSCTRL_UART1_NSP_LSB_u(1)#defineACCESSCTRL_UART1_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_UART1_NSU// Description : If 1, and NSP is also set, UART1 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_UART1_NSU_RESET_u(0x0)#defineACCESSCTRL_UART1_NSU_BITS_u(0x00000001)#defineACCESSCTRL_UART1_NSU_MSB_u(0)#defineACCESSCTRL_UART1_NSU_LSB_u(0)#defineACCESSCTRL_UART1_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_OTP// Description : Control whether debugger, DMA, core 0 and core 1 can access// OTP, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_OTP_OFFSET_u(0x000000a8)#defineACCESSCTRL_OTP_BITS_u(0x000000ff)#defineACCESSCTRL_OTP_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_DBG// Description : If 1, OTP can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_OTP_DBG_RESET_u(0x1)#defineACCESSCTRL_OTP_DBG_BITS_u(0x00000080)#defineACCESSCTRL_OTP_DBG_MSB_u(7)#defineACCESSCTRL_OTP_DBG_LSB_u(7)#defineACCESSCTRL_OTP_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_DMA// Description : If 1, OTP can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_OTP_DMA_RESET_u(0x1)#defineACCESSCTRL_OTP_DMA_BITS_u(0x00000040)#defineACCESSCTRL_OTP_DMA_MSB_u(6)#defineACCESSCTRL_OTP_DMA_LSB_u(6)#defineACCESSCTRL_OTP_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_CORE1// Description : If 1, OTP can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_OTP_CORE1_RESET_u(0x1)#defineACCESSCTRL_OTP_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_OTP_CORE1_MSB_u(5)#defineACCESSCTRL_OTP_CORE1_LSB_u(5)#defineACCESSCTRL_OTP_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_CORE0// Description : If 1, OTP can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_OTP_CORE0_RESET_u(0x1)#defineACCESSCTRL_OTP_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_OTP_CORE0_MSB_u(4)#defineACCESSCTRL_OTP_CORE0_LSB_u(4)#defineACCESSCTRL_OTP_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_SP// Description : If 1, OTP can be accessed from a Secure, Privileged context.#defineACCESSCTRL_OTP_SP_RESET_u(0x1)#defineACCESSCTRL_OTP_SP_BITS_u(0x00000008)#defineACCESSCTRL_OTP_SP_MSB_u(3)#defineACCESSCTRL_OTP_SP_LSB_u(3)#defineACCESSCTRL_OTP_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_SU// Description : If 1, and SP is also set, OTP can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_OTP_SU_RESET_u(0x1)#defineACCESSCTRL_OTP_SU_BITS_u(0x00000004)#defineACCESSCTRL_OTP_SU_MSB_u(2)#defineACCESSCTRL_OTP_SU_LSB_u(2)#defineACCESSCTRL_OTP_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_NSP// Description : If 1, OTP can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_OTP_NSP_RESET_u(0x0)#defineACCESSCTRL_OTP_NSP_BITS_u(0x00000002)#defineACCESSCTRL_OTP_NSP_MSB_u(1)#defineACCESSCTRL_OTP_NSP_LSB_u(1)#defineACCESSCTRL_OTP_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_OTP_NSU// Description : If 1, and NSP is also set, OTP can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_OTP_NSU_RESET_u(0x0)#defineACCESSCTRL_OTP_NSU_BITS_u(0x00000001)#defineACCESSCTRL_OTP_NSU_MSB_u(0)#defineACCESSCTRL_OTP_NSU_LSB_u(0)#defineACCESSCTRL_OTP_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_TBMAN// Description : Control whether debugger, DMA, core 0 and core 1 can access// TBMAN, and at what security/privilege levels they can do so.//// Defaults to Secure access from any master.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_TBMAN_OFFSET_u(0x000000ac)#defineACCESSCTRL_TBMAN_BITS_u(0x000000ff)#defineACCESSCTRL_TBMAN_RESET_u(0x000000fc)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_DBG// Description : If 1, TBMAN can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_TBMAN_DBG_RESET_u(0x1)#defineACCESSCTRL_TBMAN_DBG_BITS_u(0x00000080)#defineACCESSCTRL_TBMAN_DBG_MSB_u(7)#defineACCESSCTRL_TBMAN_DBG_LSB_u(7)#defineACCESSCTRL_TBMAN_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_DMA// Description : If 1, TBMAN can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TBMAN_DMA_RESET_u(0x1)#defineACCESSCTRL_TBMAN_DMA_BITS_u(0x00000040)#defineACCESSCTRL_TBMAN_DMA_MSB_u(6)#defineACCESSCTRL_TBMAN_DMA_LSB_u(6)#defineACCESSCTRL_TBMAN_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_CORE1// Description : If 1, TBMAN can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TBMAN_CORE1_RESET_u(0x1)#defineACCESSCTRL_TBMAN_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_TBMAN_CORE1_MSB_u(5)#defineACCESSCTRL_TBMAN_CORE1_LSB_u(5)#defineACCESSCTRL_TBMAN_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_CORE0// Description : If 1, TBMAN can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TBMAN_CORE0_RESET_u(0x1)#defineACCESSCTRL_TBMAN_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_TBMAN_CORE0_MSB_u(4)#defineACCESSCTRL_TBMAN_CORE0_LSB_u(4)#defineACCESSCTRL_TBMAN_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_SP// Description : If 1, TBMAN can be accessed from a Secure, Privileged context.#defineACCESSCTRL_TBMAN_SP_RESET_u(0x1)#defineACCESSCTRL_TBMAN_SP_BITS_u(0x00000008)#defineACCESSCTRL_TBMAN_SP_MSB_u(3)#defineACCESSCTRL_TBMAN_SP_LSB_u(3)#defineACCESSCTRL_TBMAN_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_SU// Description : If 1, and SP is also set, TBMAN can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_TBMAN_SU_RESET_u(0x1)#defineACCESSCTRL_TBMAN_SU_BITS_u(0x00000004)#defineACCESSCTRL_TBMAN_SU_MSB_u(2)#defineACCESSCTRL_TBMAN_SU_LSB_u(2)#defineACCESSCTRL_TBMAN_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_NSP// Description : If 1, TBMAN can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_TBMAN_NSP_RESET_u(0x0)#defineACCESSCTRL_TBMAN_NSP_BITS_u(0x00000002)#defineACCESSCTRL_TBMAN_NSP_MSB_u(1)#defineACCESSCTRL_TBMAN_NSP_LSB_u(1)#defineACCESSCTRL_TBMAN_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TBMAN_NSU// Description : If 1, and NSP is also set, TBMAN can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_TBMAN_NSU_RESET_u(0x0)#defineACCESSCTRL_TBMAN_NSU_BITS_u(0x00000001)#defineACCESSCTRL_TBMAN_NSU_MSB_u(0)#defineACCESSCTRL_TBMAN_NSU_LSB_u(0)#defineACCESSCTRL_TBMAN_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_POWMAN// Description : Control whether debugger, DMA, core 0 and core 1 can access// POWMAN, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_POWMAN_OFFSET_u(0x000000b0)#defineACCESSCTRL_POWMAN_BITS_u(0x000000ff)#defineACCESSCTRL_POWMAN_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_DBG// Description : If 1, POWMAN can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_POWMAN_DBG_RESET_u(0x1)#defineACCESSCTRL_POWMAN_DBG_BITS_u(0x00000080)#defineACCESSCTRL_POWMAN_DBG_MSB_u(7)#defineACCESSCTRL_POWMAN_DBG_LSB_u(7)#defineACCESSCTRL_POWMAN_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_DMA// Description : If 1, POWMAN can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_POWMAN_DMA_RESET_u(0x0)#defineACCESSCTRL_POWMAN_DMA_BITS_u(0x00000040)#defineACCESSCTRL_POWMAN_DMA_MSB_u(6)#defineACCESSCTRL_POWMAN_DMA_LSB_u(6)#defineACCESSCTRL_POWMAN_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_CORE1// Description : If 1, POWMAN can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_POWMAN_CORE1_RESET_u(0x1)#defineACCESSCTRL_POWMAN_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_POWMAN_CORE1_MSB_u(5)#defineACCESSCTRL_POWMAN_CORE1_LSB_u(5)#defineACCESSCTRL_POWMAN_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_CORE0// Description : If 1, POWMAN can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_POWMAN_CORE0_RESET_u(0x1)#defineACCESSCTRL_POWMAN_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_POWMAN_CORE0_MSB_u(4)#defineACCESSCTRL_POWMAN_CORE0_LSB_u(4)#defineACCESSCTRL_POWMAN_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_SP// Description : If 1, POWMAN can be accessed from a Secure, Privileged context.#defineACCESSCTRL_POWMAN_SP_RESET_u(0x1)#defineACCESSCTRL_POWMAN_SP_BITS_u(0x00000008)#defineACCESSCTRL_POWMAN_SP_MSB_u(3)#defineACCESSCTRL_POWMAN_SP_LSB_u(3)#defineACCESSCTRL_POWMAN_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_SU// Description : If 1, and SP is also set, POWMAN can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_POWMAN_SU_RESET_u(0x0)#defineACCESSCTRL_POWMAN_SU_BITS_u(0x00000004)#defineACCESSCTRL_POWMAN_SU_MSB_u(2)#defineACCESSCTRL_POWMAN_SU_LSB_u(2)#defineACCESSCTRL_POWMAN_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_NSP// Description : If 1, POWMAN can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_POWMAN_NSP_RESET_u(0x0)#defineACCESSCTRL_POWMAN_NSP_BITS_u(0x00000002)#defineACCESSCTRL_POWMAN_NSP_MSB_u(1)#defineACCESSCTRL_POWMAN_NSP_LSB_u(1)#defineACCESSCTRL_POWMAN_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_POWMAN_NSU// Description : If 1, and NSP is also set, POWMAN can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_POWMAN_NSU_RESET_u(0x0)#defineACCESSCTRL_POWMAN_NSU_BITS_u(0x00000001)#defineACCESSCTRL_POWMAN_NSU_MSB_u(0)#defineACCESSCTRL_POWMAN_NSU_LSB_u(0)#defineACCESSCTRL_POWMAN_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_TRNG// Description : Control whether debugger, DMA, core 0 and core 1 can access// TRNG, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_TRNG_OFFSET_u(0x000000b4)#defineACCESSCTRL_TRNG_BITS_u(0x000000ff)#defineACCESSCTRL_TRNG_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_DBG// Description : If 1, TRNG can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_TRNG_DBG_RESET_u(0x1)#defineACCESSCTRL_TRNG_DBG_BITS_u(0x00000080)#defineACCESSCTRL_TRNG_DBG_MSB_u(7)#defineACCESSCTRL_TRNG_DBG_LSB_u(7)#defineACCESSCTRL_TRNG_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_DMA// Description : If 1, TRNG can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TRNG_DMA_RESET_u(0x0)#defineACCESSCTRL_TRNG_DMA_BITS_u(0x00000040)#defineACCESSCTRL_TRNG_DMA_MSB_u(6)#defineACCESSCTRL_TRNG_DMA_LSB_u(6)#defineACCESSCTRL_TRNG_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_CORE1// Description : If 1, TRNG can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TRNG_CORE1_RESET_u(0x1)#defineACCESSCTRL_TRNG_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_TRNG_CORE1_MSB_u(5)#defineACCESSCTRL_TRNG_CORE1_LSB_u(5)#defineACCESSCTRL_TRNG_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_CORE0// Description : If 1, TRNG can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TRNG_CORE0_RESET_u(0x1)#defineACCESSCTRL_TRNG_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_TRNG_CORE0_MSB_u(4)#defineACCESSCTRL_TRNG_CORE0_LSB_u(4)#defineACCESSCTRL_TRNG_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_SP// Description : If 1, TRNG can be accessed from a Secure, Privileged context.#defineACCESSCTRL_TRNG_SP_RESET_u(0x1)#defineACCESSCTRL_TRNG_SP_BITS_u(0x00000008)#defineACCESSCTRL_TRNG_SP_MSB_u(3)#defineACCESSCTRL_TRNG_SP_LSB_u(3)#defineACCESSCTRL_TRNG_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_SU// Description : If 1, and SP is also set, TRNG can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_TRNG_SU_RESET_u(0x0)#defineACCESSCTRL_TRNG_SU_BITS_u(0x00000004)#defineACCESSCTRL_TRNG_SU_MSB_u(2)#defineACCESSCTRL_TRNG_SU_LSB_u(2)#defineACCESSCTRL_TRNG_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_NSP// Description : If 1, TRNG can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_TRNG_NSP_RESET_u(0x0)#defineACCESSCTRL_TRNG_NSP_BITS_u(0x00000002)#defineACCESSCTRL_TRNG_NSP_MSB_u(1)#defineACCESSCTRL_TRNG_NSP_LSB_u(1)#defineACCESSCTRL_TRNG_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TRNG_NSU// Description : If 1, and NSP is also set, TRNG can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_TRNG_NSU_RESET_u(0x0)#defineACCESSCTRL_TRNG_NSU_BITS_u(0x00000001)#defineACCESSCTRL_TRNG_NSU_MSB_u(0)#defineACCESSCTRL_TRNG_NSU_LSB_u(0)#defineACCESSCTRL_TRNG_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SHA256// Description : Control whether debugger, DMA, core 0 and core 1 can access// SHA256, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SHA256_OFFSET_u(0x000000b8)#defineACCESSCTRL_SHA256_BITS_u(0x000000ff)#defineACCESSCTRL_SHA256_RESET_u(0x000000f8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_DBG// Description : If 1, SHA256 can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SHA256_DBG_RESET_u(0x1)#defineACCESSCTRL_SHA256_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SHA256_DBG_MSB_u(7)#defineACCESSCTRL_SHA256_DBG_LSB_u(7)#defineACCESSCTRL_SHA256_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_DMA// Description : If 1, SHA256 can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SHA256_DMA_RESET_u(0x1)#defineACCESSCTRL_SHA256_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SHA256_DMA_MSB_u(6)#defineACCESSCTRL_SHA256_DMA_LSB_u(6)#defineACCESSCTRL_SHA256_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_CORE1// Description : If 1, SHA256 can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SHA256_CORE1_RESET_u(0x1)#defineACCESSCTRL_SHA256_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SHA256_CORE1_MSB_u(5)#defineACCESSCTRL_SHA256_CORE1_LSB_u(5)#defineACCESSCTRL_SHA256_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_CORE0// Description : If 1, SHA256 can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SHA256_CORE0_RESET_u(0x1)#defineACCESSCTRL_SHA256_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SHA256_CORE0_MSB_u(4)#defineACCESSCTRL_SHA256_CORE0_LSB_u(4)#defineACCESSCTRL_SHA256_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_SP// Description : If 1, SHA256 can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SHA256_SP_RESET_u(0x1)#defineACCESSCTRL_SHA256_SP_BITS_u(0x00000008)#defineACCESSCTRL_SHA256_SP_MSB_u(3)#defineACCESSCTRL_SHA256_SP_LSB_u(3)#defineACCESSCTRL_SHA256_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_SU// Description : If 1, and SP is also set, SHA256 can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SHA256_SU_RESET_u(0x0)#defineACCESSCTRL_SHA256_SU_BITS_u(0x00000004)#defineACCESSCTRL_SHA256_SU_MSB_u(2)#defineACCESSCTRL_SHA256_SU_LSB_u(2)#defineACCESSCTRL_SHA256_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_NSP// Description : If 1, SHA256 can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SHA256_NSP_RESET_u(0x0)#defineACCESSCTRL_SHA256_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SHA256_NSP_MSB_u(1)#defineACCESSCTRL_SHA256_NSP_LSB_u(1)#defineACCESSCTRL_SHA256_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SHA256_NSU// Description : If 1, and NSP is also set, SHA256 can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SHA256_NSU_RESET_u(0x0)#defineACCESSCTRL_SHA256_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SHA256_NSU_MSB_u(0)#defineACCESSCTRL_SHA256_NSU_LSB_u(0)#defineACCESSCTRL_SHA256_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_SYSCFG// Description : Control whether debugger, DMA, core 0 and core 1 can access// SYSCFG, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_SYSCFG_OFFSET_u(0x000000bc)#defineACCESSCTRL_SYSCFG_BITS_u(0x000000ff)#defineACCESSCTRL_SYSCFG_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_DBG// Description : If 1, SYSCFG can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_SYSCFG_DBG_RESET_u(0x1)#defineACCESSCTRL_SYSCFG_DBG_BITS_u(0x00000080)#defineACCESSCTRL_SYSCFG_DBG_MSB_u(7)#defineACCESSCTRL_SYSCFG_DBG_LSB_u(7)#defineACCESSCTRL_SYSCFG_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_DMA// Description : If 1, SYSCFG can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SYSCFG_DMA_RESET_u(0x0)#defineACCESSCTRL_SYSCFG_DMA_BITS_u(0x00000040)#defineACCESSCTRL_SYSCFG_DMA_MSB_u(6)#defineACCESSCTRL_SYSCFG_DMA_LSB_u(6)#defineACCESSCTRL_SYSCFG_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_CORE1// Description : If 1, SYSCFG can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SYSCFG_CORE1_RESET_u(0x1)#defineACCESSCTRL_SYSCFG_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_SYSCFG_CORE1_MSB_u(5)#defineACCESSCTRL_SYSCFG_CORE1_LSB_u(5)#defineACCESSCTRL_SYSCFG_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_CORE0// Description : If 1, SYSCFG can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_SYSCFG_CORE0_RESET_u(0x1)#defineACCESSCTRL_SYSCFG_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_SYSCFG_CORE0_MSB_u(4)#defineACCESSCTRL_SYSCFG_CORE0_LSB_u(4)#defineACCESSCTRL_SYSCFG_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_SP// Description : If 1, SYSCFG can be accessed from a Secure, Privileged context.#defineACCESSCTRL_SYSCFG_SP_RESET_u(0x1)#defineACCESSCTRL_SYSCFG_SP_BITS_u(0x00000008)#defineACCESSCTRL_SYSCFG_SP_MSB_u(3)#defineACCESSCTRL_SYSCFG_SP_LSB_u(3)#defineACCESSCTRL_SYSCFG_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_SU// Description : If 1, and SP is also set, SYSCFG can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_SYSCFG_SU_RESET_u(0x0)#defineACCESSCTRL_SYSCFG_SU_BITS_u(0x00000004)#defineACCESSCTRL_SYSCFG_SU_MSB_u(2)#defineACCESSCTRL_SYSCFG_SU_LSB_u(2)#defineACCESSCTRL_SYSCFG_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_NSP// Description : If 1, SYSCFG can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_SYSCFG_NSP_RESET_u(0x0)#defineACCESSCTRL_SYSCFG_NSP_BITS_u(0x00000002)#defineACCESSCTRL_SYSCFG_NSP_MSB_u(1)#defineACCESSCTRL_SYSCFG_NSP_LSB_u(1)#defineACCESSCTRL_SYSCFG_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_SYSCFG_NSU// Description : If 1, and NSP is also set, SYSCFG can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_SYSCFG_NSU_RESET_u(0x0)#defineACCESSCTRL_SYSCFG_NSU_BITS_u(0x00000001)#defineACCESSCTRL_SYSCFG_NSU_MSB_u(0)#defineACCESSCTRL_SYSCFG_NSU_LSB_u(0)#defineACCESSCTRL_SYSCFG_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_CLOCKS// Description : Control whether debugger, DMA, core 0 and core 1 can access// CLOCKS, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_CLOCKS_OFFSET_u(0x000000c0)#defineACCESSCTRL_CLOCKS_BITS_u(0x000000ff)#defineACCESSCTRL_CLOCKS_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_DBG// Description : If 1, CLOCKS can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_CLOCKS_DBG_RESET_u(0x1)#defineACCESSCTRL_CLOCKS_DBG_BITS_u(0x00000080)#defineACCESSCTRL_CLOCKS_DBG_MSB_u(7)#defineACCESSCTRL_CLOCKS_DBG_LSB_u(7)#defineACCESSCTRL_CLOCKS_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_DMA// Description : If 1, CLOCKS can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_CLOCKS_DMA_RESET_u(0x0)#defineACCESSCTRL_CLOCKS_DMA_BITS_u(0x00000040)#defineACCESSCTRL_CLOCKS_DMA_MSB_u(6)#defineACCESSCTRL_CLOCKS_DMA_LSB_u(6)#defineACCESSCTRL_CLOCKS_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_CORE1// Description : If 1, CLOCKS can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_CLOCKS_CORE1_RESET_u(0x1)#defineACCESSCTRL_CLOCKS_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_CLOCKS_CORE1_MSB_u(5)#defineACCESSCTRL_CLOCKS_CORE1_LSB_u(5)#defineACCESSCTRL_CLOCKS_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_CORE0// Description : If 1, CLOCKS can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_CLOCKS_CORE0_RESET_u(0x1)#defineACCESSCTRL_CLOCKS_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_CLOCKS_CORE0_MSB_u(4)#defineACCESSCTRL_CLOCKS_CORE0_LSB_u(4)#defineACCESSCTRL_CLOCKS_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_SP// Description : If 1, CLOCKS can be accessed from a Secure, Privileged context.#defineACCESSCTRL_CLOCKS_SP_RESET_u(0x1)#defineACCESSCTRL_CLOCKS_SP_BITS_u(0x00000008)#defineACCESSCTRL_CLOCKS_SP_MSB_u(3)#defineACCESSCTRL_CLOCKS_SP_LSB_u(3)#defineACCESSCTRL_CLOCKS_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_SU// Description : If 1, and SP is also set, CLOCKS can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_CLOCKS_SU_RESET_u(0x0)#defineACCESSCTRL_CLOCKS_SU_BITS_u(0x00000004)#defineACCESSCTRL_CLOCKS_SU_MSB_u(2)#defineACCESSCTRL_CLOCKS_SU_LSB_u(2)#defineACCESSCTRL_CLOCKS_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_NSP// Description : If 1, CLOCKS can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_CLOCKS_NSP_RESET_u(0x0)#defineACCESSCTRL_CLOCKS_NSP_BITS_u(0x00000002)#defineACCESSCTRL_CLOCKS_NSP_MSB_u(1)#defineACCESSCTRL_CLOCKS_NSP_LSB_u(1)#defineACCESSCTRL_CLOCKS_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_CLOCKS_NSU// Description : If 1, and NSP is also set, CLOCKS can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_CLOCKS_NSU_RESET_u(0x0)#defineACCESSCTRL_CLOCKS_NSU_BITS_u(0x00000001)#defineACCESSCTRL_CLOCKS_NSU_MSB_u(0)#defineACCESSCTRL_CLOCKS_NSU_LSB_u(0)#defineACCESSCTRL_CLOCKS_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_XOSC// Description : Control whether debugger, DMA, core 0 and core 1 can access// XOSC, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_XOSC_OFFSET_u(0x000000c4)#defineACCESSCTRL_XOSC_BITS_u(0x000000ff)#defineACCESSCTRL_XOSC_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_DBG// Description : If 1, XOSC can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_XOSC_DBG_RESET_u(0x1)#defineACCESSCTRL_XOSC_DBG_BITS_u(0x00000080)#defineACCESSCTRL_XOSC_DBG_MSB_u(7)#defineACCESSCTRL_XOSC_DBG_LSB_u(7)#defineACCESSCTRL_XOSC_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_DMA// Description : If 1, XOSC can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XOSC_DMA_RESET_u(0x0)#defineACCESSCTRL_XOSC_DMA_BITS_u(0x00000040)#defineACCESSCTRL_XOSC_DMA_MSB_u(6)#defineACCESSCTRL_XOSC_DMA_LSB_u(6)#defineACCESSCTRL_XOSC_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_CORE1// Description : If 1, XOSC can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XOSC_CORE1_RESET_u(0x1)#defineACCESSCTRL_XOSC_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_XOSC_CORE1_MSB_u(5)#defineACCESSCTRL_XOSC_CORE1_LSB_u(5)#defineACCESSCTRL_XOSC_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_CORE0// Description : If 1, XOSC can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XOSC_CORE0_RESET_u(0x1)#defineACCESSCTRL_XOSC_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_XOSC_CORE0_MSB_u(4)#defineACCESSCTRL_XOSC_CORE0_LSB_u(4)#defineACCESSCTRL_XOSC_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_SP// Description : If 1, XOSC can be accessed from a Secure, Privileged context.#defineACCESSCTRL_XOSC_SP_RESET_u(0x1)#defineACCESSCTRL_XOSC_SP_BITS_u(0x00000008)#defineACCESSCTRL_XOSC_SP_MSB_u(3)#defineACCESSCTRL_XOSC_SP_LSB_u(3)#defineACCESSCTRL_XOSC_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_SU// Description : If 1, and SP is also set, XOSC can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_XOSC_SU_RESET_u(0x0)#defineACCESSCTRL_XOSC_SU_BITS_u(0x00000004)#defineACCESSCTRL_XOSC_SU_MSB_u(2)#defineACCESSCTRL_XOSC_SU_LSB_u(2)#defineACCESSCTRL_XOSC_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_NSP// Description : If 1, XOSC can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_XOSC_NSP_RESET_u(0x0)#defineACCESSCTRL_XOSC_NSP_BITS_u(0x00000002)#defineACCESSCTRL_XOSC_NSP_MSB_u(1)#defineACCESSCTRL_XOSC_NSP_LSB_u(1)#defineACCESSCTRL_XOSC_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XOSC_NSU// Description : If 1, and NSP is also set, XOSC can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_XOSC_NSU_RESET_u(0x0)#defineACCESSCTRL_XOSC_NSU_BITS_u(0x00000001)#defineACCESSCTRL_XOSC_NSU_MSB_u(0)#defineACCESSCTRL_XOSC_NSU_LSB_u(0)#defineACCESSCTRL_XOSC_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_ROSC// Description : Control whether debugger, DMA, core 0 and core 1 can access// ROSC, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_ROSC_OFFSET_u(0x000000c8)#defineACCESSCTRL_ROSC_BITS_u(0x000000ff)#defineACCESSCTRL_ROSC_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_DBG// Description : If 1, ROSC can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_ROSC_DBG_RESET_u(0x1)#defineACCESSCTRL_ROSC_DBG_BITS_u(0x00000080)#defineACCESSCTRL_ROSC_DBG_MSB_u(7)#defineACCESSCTRL_ROSC_DBG_LSB_u(7)#defineACCESSCTRL_ROSC_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_DMA// Description : If 1, ROSC can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ROSC_DMA_RESET_u(0x0)#defineACCESSCTRL_ROSC_DMA_BITS_u(0x00000040)#defineACCESSCTRL_ROSC_DMA_MSB_u(6)#defineACCESSCTRL_ROSC_DMA_LSB_u(6)#defineACCESSCTRL_ROSC_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_CORE1// Description : If 1, ROSC can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ROSC_CORE1_RESET_u(0x1)#defineACCESSCTRL_ROSC_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_ROSC_CORE1_MSB_u(5)#defineACCESSCTRL_ROSC_CORE1_LSB_u(5)#defineACCESSCTRL_ROSC_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_CORE0// Description : If 1, ROSC can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_ROSC_CORE0_RESET_u(0x1)#defineACCESSCTRL_ROSC_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_ROSC_CORE0_MSB_u(4)#defineACCESSCTRL_ROSC_CORE0_LSB_u(4)#defineACCESSCTRL_ROSC_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_SP// Description : If 1, ROSC can be accessed from a Secure, Privileged context.#defineACCESSCTRL_ROSC_SP_RESET_u(0x1)#defineACCESSCTRL_ROSC_SP_BITS_u(0x00000008)#defineACCESSCTRL_ROSC_SP_MSB_u(3)#defineACCESSCTRL_ROSC_SP_LSB_u(3)#defineACCESSCTRL_ROSC_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_SU// Description : If 1, and SP is also set, ROSC can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_ROSC_SU_RESET_u(0x0)#defineACCESSCTRL_ROSC_SU_BITS_u(0x00000004)#defineACCESSCTRL_ROSC_SU_MSB_u(2)#defineACCESSCTRL_ROSC_SU_LSB_u(2)#defineACCESSCTRL_ROSC_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_NSP// Description : If 1, ROSC can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_ROSC_NSP_RESET_u(0x0)#defineACCESSCTRL_ROSC_NSP_BITS_u(0x00000002)#defineACCESSCTRL_ROSC_NSP_MSB_u(1)#defineACCESSCTRL_ROSC_NSP_LSB_u(1)#defineACCESSCTRL_ROSC_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_ROSC_NSU// Description : If 1, and NSP is also set, ROSC can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_ROSC_NSU_RESET_u(0x0)#defineACCESSCTRL_ROSC_NSU_BITS_u(0x00000001)#defineACCESSCTRL_ROSC_NSU_MSB_u(0)#defineACCESSCTRL_ROSC_NSU_LSB_u(0)#defineACCESSCTRL_ROSC_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PLL_SYS// Description : Control whether debugger, DMA, core 0 and core 1 can access// PLL_SYS, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PLL_SYS_OFFSET_u(0x000000cc)#defineACCESSCTRL_PLL_SYS_BITS_u(0x000000ff)#defineACCESSCTRL_PLL_SYS_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_DBG// Description : If 1, PLL_SYS can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PLL_SYS_DBG_RESET_u(0x1)#defineACCESSCTRL_PLL_SYS_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PLL_SYS_DBG_MSB_u(7)#defineACCESSCTRL_PLL_SYS_DBG_LSB_u(7)#defineACCESSCTRL_PLL_SYS_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_DMA// Description : If 1, PLL_SYS can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PLL_SYS_DMA_RESET_u(0x0)#defineACCESSCTRL_PLL_SYS_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PLL_SYS_DMA_MSB_u(6)#defineACCESSCTRL_PLL_SYS_DMA_LSB_u(6)#defineACCESSCTRL_PLL_SYS_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_CORE1// Description : If 1, PLL_SYS can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PLL_SYS_CORE1_RESET_u(0x1)#defineACCESSCTRL_PLL_SYS_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PLL_SYS_CORE1_MSB_u(5)#defineACCESSCTRL_PLL_SYS_CORE1_LSB_u(5)#defineACCESSCTRL_PLL_SYS_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_CORE0// Description : If 1, PLL_SYS can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PLL_SYS_CORE0_RESET_u(0x1)#defineACCESSCTRL_PLL_SYS_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PLL_SYS_CORE0_MSB_u(4)#defineACCESSCTRL_PLL_SYS_CORE0_LSB_u(4)#defineACCESSCTRL_PLL_SYS_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_SP// Description : If 1, PLL_SYS can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_PLL_SYS_SP_RESET_u(0x1)#defineACCESSCTRL_PLL_SYS_SP_BITS_u(0x00000008)#defineACCESSCTRL_PLL_SYS_SP_MSB_u(3)#defineACCESSCTRL_PLL_SYS_SP_LSB_u(3)#defineACCESSCTRL_PLL_SYS_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_SU// Description : If 1, and SP is also set, PLL_SYS can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_PLL_SYS_SU_RESET_u(0x0)#defineACCESSCTRL_PLL_SYS_SU_BITS_u(0x00000004)#defineACCESSCTRL_PLL_SYS_SU_MSB_u(2)#defineACCESSCTRL_PLL_SYS_SU_LSB_u(2)#defineACCESSCTRL_PLL_SYS_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_NSP// Description : If 1, PLL_SYS can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PLL_SYS_NSP_RESET_u(0x0)#defineACCESSCTRL_PLL_SYS_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PLL_SYS_NSP_MSB_u(1)#defineACCESSCTRL_PLL_SYS_NSP_LSB_u(1)#defineACCESSCTRL_PLL_SYS_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_SYS_NSU// Description : If 1, and NSP is also set, PLL_SYS can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PLL_SYS_NSU_RESET_u(0x0)#defineACCESSCTRL_PLL_SYS_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PLL_SYS_NSU_MSB_u(0)#defineACCESSCTRL_PLL_SYS_NSU_LSB_u(0)#defineACCESSCTRL_PLL_SYS_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_PLL_USB// Description : Control whether debugger, DMA, core 0 and core 1 can access// PLL_USB, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_PLL_USB_OFFSET_u(0x000000d0)#defineACCESSCTRL_PLL_USB_BITS_u(0x000000ff)#defineACCESSCTRL_PLL_USB_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_DBG// Description : If 1, PLL_USB can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_PLL_USB_DBG_RESET_u(0x1)#defineACCESSCTRL_PLL_USB_DBG_BITS_u(0x00000080)#defineACCESSCTRL_PLL_USB_DBG_MSB_u(7)#defineACCESSCTRL_PLL_USB_DBG_LSB_u(7)#defineACCESSCTRL_PLL_USB_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_DMA// Description : If 1, PLL_USB can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PLL_USB_DMA_RESET_u(0x0)#defineACCESSCTRL_PLL_USB_DMA_BITS_u(0x00000040)#defineACCESSCTRL_PLL_USB_DMA_MSB_u(6)#defineACCESSCTRL_PLL_USB_DMA_LSB_u(6)#defineACCESSCTRL_PLL_USB_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_CORE1// Description : If 1, PLL_USB can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PLL_USB_CORE1_RESET_u(0x1)#defineACCESSCTRL_PLL_USB_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_PLL_USB_CORE1_MSB_u(5)#defineACCESSCTRL_PLL_USB_CORE1_LSB_u(5)#defineACCESSCTRL_PLL_USB_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_CORE0// Description : If 1, PLL_USB can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_PLL_USB_CORE0_RESET_u(0x1)#defineACCESSCTRL_PLL_USB_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_PLL_USB_CORE0_MSB_u(4)#defineACCESSCTRL_PLL_USB_CORE0_LSB_u(4)#defineACCESSCTRL_PLL_USB_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_SP// Description : If 1, PLL_USB can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_PLL_USB_SP_RESET_u(0x1)#defineACCESSCTRL_PLL_USB_SP_BITS_u(0x00000008)#defineACCESSCTRL_PLL_USB_SP_MSB_u(3)#defineACCESSCTRL_PLL_USB_SP_LSB_u(3)#defineACCESSCTRL_PLL_USB_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_SU// Description : If 1, and SP is also set, PLL_USB can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_PLL_USB_SU_RESET_u(0x0)#defineACCESSCTRL_PLL_USB_SU_BITS_u(0x00000004)#defineACCESSCTRL_PLL_USB_SU_MSB_u(2)#defineACCESSCTRL_PLL_USB_SU_LSB_u(2)#defineACCESSCTRL_PLL_USB_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_NSP// Description : If 1, PLL_USB can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_PLL_USB_NSP_RESET_u(0x0)#defineACCESSCTRL_PLL_USB_NSP_BITS_u(0x00000002)#defineACCESSCTRL_PLL_USB_NSP_MSB_u(1)#defineACCESSCTRL_PLL_USB_NSP_LSB_u(1)#defineACCESSCTRL_PLL_USB_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_PLL_USB_NSU// Description : If 1, and NSP is also set, PLL_USB can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_PLL_USB_NSU_RESET_u(0x0)#defineACCESSCTRL_PLL_USB_NSU_BITS_u(0x00000001)#defineACCESSCTRL_PLL_USB_NSU_MSB_u(0)#defineACCESSCTRL_PLL_USB_NSU_LSB_u(0)#defineACCESSCTRL_PLL_USB_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_TICKS// Description : Control whether debugger, DMA, core 0 and core 1 can access// TICKS, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_TICKS_OFFSET_u(0x000000d4)#defineACCESSCTRL_TICKS_BITS_u(0x000000ff)#defineACCESSCTRL_TICKS_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_DBG// Description : If 1, TICKS can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_TICKS_DBG_RESET_u(0x1)#defineACCESSCTRL_TICKS_DBG_BITS_u(0x00000080)#defineACCESSCTRL_TICKS_DBG_MSB_u(7)#defineACCESSCTRL_TICKS_DBG_LSB_u(7)#defineACCESSCTRL_TICKS_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_DMA// Description : If 1, TICKS can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TICKS_DMA_RESET_u(0x0)#defineACCESSCTRL_TICKS_DMA_BITS_u(0x00000040)#defineACCESSCTRL_TICKS_DMA_MSB_u(6)#defineACCESSCTRL_TICKS_DMA_LSB_u(6)#defineACCESSCTRL_TICKS_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_CORE1// Description : If 1, TICKS can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TICKS_CORE1_RESET_u(0x1)#defineACCESSCTRL_TICKS_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_TICKS_CORE1_MSB_u(5)#defineACCESSCTRL_TICKS_CORE1_LSB_u(5)#defineACCESSCTRL_TICKS_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_CORE0// Description : If 1, TICKS can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_TICKS_CORE0_RESET_u(0x1)#defineACCESSCTRL_TICKS_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_TICKS_CORE0_MSB_u(4)#defineACCESSCTRL_TICKS_CORE0_LSB_u(4)#defineACCESSCTRL_TICKS_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_SP// Description : If 1, TICKS can be accessed from a Secure, Privileged context.#defineACCESSCTRL_TICKS_SP_RESET_u(0x1)#defineACCESSCTRL_TICKS_SP_BITS_u(0x00000008)#defineACCESSCTRL_TICKS_SP_MSB_u(3)#defineACCESSCTRL_TICKS_SP_LSB_u(3)#defineACCESSCTRL_TICKS_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_SU// Description : If 1, and SP is also set, TICKS can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_TICKS_SU_RESET_u(0x0)#defineACCESSCTRL_TICKS_SU_BITS_u(0x00000004)#defineACCESSCTRL_TICKS_SU_MSB_u(2)#defineACCESSCTRL_TICKS_SU_LSB_u(2)#defineACCESSCTRL_TICKS_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_NSP// Description : If 1, TICKS can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_TICKS_NSP_RESET_u(0x0)#defineACCESSCTRL_TICKS_NSP_BITS_u(0x00000002)#defineACCESSCTRL_TICKS_NSP_MSB_u(1)#defineACCESSCTRL_TICKS_NSP_LSB_u(1)#defineACCESSCTRL_TICKS_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_TICKS_NSU// Description : If 1, and NSP is also set, TICKS can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_TICKS_NSU_RESET_u(0x0)#defineACCESSCTRL_TICKS_NSU_BITS_u(0x00000001)#defineACCESSCTRL_TICKS_NSU_MSB_u(0)#defineACCESSCTRL_TICKS_NSU_LSB_u(0)#defineACCESSCTRL_TICKS_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_WATCHDOG// Description : Control whether debugger, DMA, core 0 and core 1 can access// WATCHDOG, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_WATCHDOG_OFFSET_u(0x000000d8)#defineACCESSCTRL_WATCHDOG_BITS_u(0x000000ff)#defineACCESSCTRL_WATCHDOG_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_DBG// Description : If 1, WATCHDOG can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_WATCHDOG_DBG_RESET_u(0x1)#defineACCESSCTRL_WATCHDOG_DBG_BITS_u(0x00000080)#defineACCESSCTRL_WATCHDOG_DBG_MSB_u(7)#defineACCESSCTRL_WATCHDOG_DBG_LSB_u(7)#defineACCESSCTRL_WATCHDOG_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_DMA// Description : If 1, WATCHDOG can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_WATCHDOG_DMA_RESET_u(0x0)#defineACCESSCTRL_WATCHDOG_DMA_BITS_u(0x00000040)#defineACCESSCTRL_WATCHDOG_DMA_MSB_u(6)#defineACCESSCTRL_WATCHDOG_DMA_LSB_u(6)#defineACCESSCTRL_WATCHDOG_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_CORE1// Description : If 1, WATCHDOG can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_WATCHDOG_CORE1_RESET_u(0x1)#defineACCESSCTRL_WATCHDOG_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_WATCHDOG_CORE1_MSB_u(5)#defineACCESSCTRL_WATCHDOG_CORE1_LSB_u(5)#defineACCESSCTRL_WATCHDOG_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_CORE0// Description : If 1, WATCHDOG can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_WATCHDOG_CORE0_RESET_u(0x1)#defineACCESSCTRL_WATCHDOG_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_WATCHDOG_CORE0_MSB_u(4)#defineACCESSCTRL_WATCHDOG_CORE0_LSB_u(4)#defineACCESSCTRL_WATCHDOG_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_SP// Description : If 1, WATCHDOG can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_WATCHDOG_SP_RESET_u(0x1)#defineACCESSCTRL_WATCHDOG_SP_BITS_u(0x00000008)#defineACCESSCTRL_WATCHDOG_SP_MSB_u(3)#defineACCESSCTRL_WATCHDOG_SP_LSB_u(3)#defineACCESSCTRL_WATCHDOG_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_SU// Description : If 1, and SP is also set, WATCHDOG can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_WATCHDOG_SU_RESET_u(0x0)#defineACCESSCTRL_WATCHDOG_SU_BITS_u(0x00000004)#defineACCESSCTRL_WATCHDOG_SU_MSB_u(2)#defineACCESSCTRL_WATCHDOG_SU_LSB_u(2)#defineACCESSCTRL_WATCHDOG_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_NSP// Description : If 1, WATCHDOG can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_WATCHDOG_NSP_RESET_u(0x0)#defineACCESSCTRL_WATCHDOG_NSP_BITS_u(0x00000002)#defineACCESSCTRL_WATCHDOG_NSP_MSB_u(1)#defineACCESSCTRL_WATCHDOG_NSP_LSB_u(1)#defineACCESSCTRL_WATCHDOG_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_WATCHDOG_NSU// Description : If 1, and NSP is also set, WATCHDOG can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_WATCHDOG_NSU_RESET_u(0x0)#defineACCESSCTRL_WATCHDOG_NSU_BITS_u(0x00000001)#defineACCESSCTRL_WATCHDOG_NSU_MSB_u(0)#defineACCESSCTRL_WATCHDOG_NSU_LSB_u(0)#defineACCESSCTRL_WATCHDOG_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_RSM// Description : Control whether debugger, DMA, core 0 and core 1 can access// RSM, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_RSM_OFFSET_u(0x000000dc)#defineACCESSCTRL_RSM_BITS_u(0x000000ff)#defineACCESSCTRL_RSM_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_DBG// Description : If 1, RSM can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_RSM_DBG_RESET_u(0x1)#defineACCESSCTRL_RSM_DBG_BITS_u(0x00000080)#defineACCESSCTRL_RSM_DBG_MSB_u(7)#defineACCESSCTRL_RSM_DBG_LSB_u(7)#defineACCESSCTRL_RSM_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_DMA// Description : If 1, RSM can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_RSM_DMA_RESET_u(0x0)#defineACCESSCTRL_RSM_DMA_BITS_u(0x00000040)#defineACCESSCTRL_RSM_DMA_MSB_u(6)#defineACCESSCTRL_RSM_DMA_LSB_u(6)#defineACCESSCTRL_RSM_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_CORE1// Description : If 1, RSM can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_RSM_CORE1_RESET_u(0x1)#defineACCESSCTRL_RSM_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_RSM_CORE1_MSB_u(5)#defineACCESSCTRL_RSM_CORE1_LSB_u(5)#defineACCESSCTRL_RSM_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_CORE0// Description : If 1, RSM can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_RSM_CORE0_RESET_u(0x1)#defineACCESSCTRL_RSM_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_RSM_CORE0_MSB_u(4)#defineACCESSCTRL_RSM_CORE0_LSB_u(4)#defineACCESSCTRL_RSM_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_SP// Description : If 1, RSM can be accessed from a Secure, Privileged context.#defineACCESSCTRL_RSM_SP_RESET_u(0x1)#defineACCESSCTRL_RSM_SP_BITS_u(0x00000008)#defineACCESSCTRL_RSM_SP_MSB_u(3)#defineACCESSCTRL_RSM_SP_LSB_u(3)#defineACCESSCTRL_RSM_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_SU// Description : If 1, and SP is also set, RSM can be accessed from a Secure,// Unprivileged context.#defineACCESSCTRL_RSM_SU_RESET_u(0x0)#defineACCESSCTRL_RSM_SU_BITS_u(0x00000004)#defineACCESSCTRL_RSM_SU_MSB_u(2)#defineACCESSCTRL_RSM_SU_LSB_u(2)#defineACCESSCTRL_RSM_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_NSP// Description : If 1, RSM can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_RSM_NSP_RESET_u(0x0)#defineACCESSCTRL_RSM_NSP_BITS_u(0x00000002)#defineACCESSCTRL_RSM_NSP_MSB_u(1)#defineACCESSCTRL_RSM_NSP_LSB_u(1)#defineACCESSCTRL_RSM_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_RSM_NSU// Description : If 1, and NSP is also set, RSM can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_RSM_NSU_RESET_u(0x0)#defineACCESSCTRL_RSM_NSU_BITS_u(0x00000001)#defineACCESSCTRL_RSM_NSU_MSB_u(0)#defineACCESSCTRL_RSM_NSU_LSB_u(0)#defineACCESSCTRL_RSM_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_XIP_CTRL// Description : Control whether debugger, DMA, core 0 and core 1 can access// XIP_CTRL, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_XIP_CTRL_OFFSET_u(0x000000e0)#defineACCESSCTRL_XIP_CTRL_BITS_u(0x000000ff)#defineACCESSCTRL_XIP_CTRL_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_DBG// Description : If 1, XIP_CTRL can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_XIP_CTRL_DBG_RESET_u(0x1)#defineACCESSCTRL_XIP_CTRL_DBG_BITS_u(0x00000080)#defineACCESSCTRL_XIP_CTRL_DBG_MSB_u(7)#defineACCESSCTRL_XIP_CTRL_DBG_LSB_u(7)#defineACCESSCTRL_XIP_CTRL_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_DMA// Description : If 1, XIP_CTRL can be accessed by the DMA, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_XIP_CTRL_DMA_RESET_u(0x0)#defineACCESSCTRL_XIP_CTRL_DMA_BITS_u(0x00000040)#defineACCESSCTRL_XIP_CTRL_DMA_MSB_u(6)#defineACCESSCTRL_XIP_CTRL_DMA_LSB_u(6)#defineACCESSCTRL_XIP_CTRL_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_CORE1// Description : If 1, XIP_CTRL can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_CTRL_CORE1_RESET_u(0x1)#defineACCESSCTRL_XIP_CTRL_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_XIP_CTRL_CORE1_MSB_u(5)#defineACCESSCTRL_XIP_CTRL_CORE1_LSB_u(5)#defineACCESSCTRL_XIP_CTRL_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_CORE0// Description : If 1, XIP_CTRL can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_CTRL_CORE0_RESET_u(0x1)#defineACCESSCTRL_XIP_CTRL_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_XIP_CTRL_CORE0_MSB_u(4)#defineACCESSCTRL_XIP_CTRL_CORE0_LSB_u(4)#defineACCESSCTRL_XIP_CTRL_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_SP// Description : If 1, XIP_CTRL can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_XIP_CTRL_SP_RESET_u(0x1)#defineACCESSCTRL_XIP_CTRL_SP_BITS_u(0x00000008)#defineACCESSCTRL_XIP_CTRL_SP_MSB_u(3)#defineACCESSCTRL_XIP_CTRL_SP_LSB_u(3)#defineACCESSCTRL_XIP_CTRL_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_SU// Description : If 1, and SP is also set, XIP_CTRL can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_XIP_CTRL_SU_RESET_u(0x0)#defineACCESSCTRL_XIP_CTRL_SU_BITS_u(0x00000004)#defineACCESSCTRL_XIP_CTRL_SU_MSB_u(2)#defineACCESSCTRL_XIP_CTRL_SU_LSB_u(2)#defineACCESSCTRL_XIP_CTRL_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_NSP// Description : If 1, XIP_CTRL can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_XIP_CTRL_NSP_RESET_u(0x0)#defineACCESSCTRL_XIP_CTRL_NSP_BITS_u(0x00000002)#defineACCESSCTRL_XIP_CTRL_NSP_MSB_u(1)#defineACCESSCTRL_XIP_CTRL_NSP_LSB_u(1)#defineACCESSCTRL_XIP_CTRL_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_CTRL_NSU// Description : If 1, and NSP is also set, XIP_CTRL can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_XIP_CTRL_NSU_RESET_u(0x0)#defineACCESSCTRL_XIP_CTRL_NSU_BITS_u(0x00000001)#defineACCESSCTRL_XIP_CTRL_NSU_MSB_u(0)#defineACCESSCTRL_XIP_CTRL_NSU_LSB_u(0)#defineACCESSCTRL_XIP_CTRL_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_XIP_QMI// Description : Control whether debugger, DMA, core 0 and core 1 can access// XIP_QMI, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged processor or debug access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_XIP_QMI_OFFSET_u(0x000000e4)#defineACCESSCTRL_XIP_QMI_BITS_u(0x000000ff)#defineACCESSCTRL_XIP_QMI_RESET_u(0x000000b8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_DBG// Description : If 1, XIP_QMI can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_XIP_QMI_DBG_RESET_u(0x1)#defineACCESSCTRL_XIP_QMI_DBG_BITS_u(0x00000080)#defineACCESSCTRL_XIP_QMI_DBG_MSB_u(7)#defineACCESSCTRL_XIP_QMI_DBG_LSB_u(7)#defineACCESSCTRL_XIP_QMI_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_DMA// Description : If 1, XIP_QMI can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_QMI_DMA_RESET_u(0x0)#defineACCESSCTRL_XIP_QMI_DMA_BITS_u(0x00000040)#defineACCESSCTRL_XIP_QMI_DMA_MSB_u(6)#defineACCESSCTRL_XIP_QMI_DMA_LSB_u(6)#defineACCESSCTRL_XIP_QMI_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_CORE1// Description : If 1, XIP_QMI can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_QMI_CORE1_RESET_u(0x1)#defineACCESSCTRL_XIP_QMI_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_XIP_QMI_CORE1_MSB_u(5)#defineACCESSCTRL_XIP_QMI_CORE1_LSB_u(5)#defineACCESSCTRL_XIP_QMI_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_CORE0// Description : If 1, XIP_QMI can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_QMI_CORE0_RESET_u(0x1)#defineACCESSCTRL_XIP_QMI_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_XIP_QMI_CORE0_MSB_u(4)#defineACCESSCTRL_XIP_QMI_CORE0_LSB_u(4)#defineACCESSCTRL_XIP_QMI_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_SP// Description : If 1, XIP_QMI can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_XIP_QMI_SP_RESET_u(0x1)#defineACCESSCTRL_XIP_QMI_SP_BITS_u(0x00000008)#defineACCESSCTRL_XIP_QMI_SP_MSB_u(3)#defineACCESSCTRL_XIP_QMI_SP_LSB_u(3)#defineACCESSCTRL_XIP_QMI_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_SU// Description : If 1, and SP is also set, XIP_QMI can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_XIP_QMI_SU_RESET_u(0x0)#defineACCESSCTRL_XIP_QMI_SU_BITS_u(0x00000004)#defineACCESSCTRL_XIP_QMI_SU_MSB_u(2)#defineACCESSCTRL_XIP_QMI_SU_LSB_u(2)#defineACCESSCTRL_XIP_QMI_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_NSP// Description : If 1, XIP_QMI can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_XIP_QMI_NSP_RESET_u(0x0)#defineACCESSCTRL_XIP_QMI_NSP_BITS_u(0x00000002)#defineACCESSCTRL_XIP_QMI_NSP_MSB_u(1)#defineACCESSCTRL_XIP_QMI_NSP_LSB_u(1)#defineACCESSCTRL_XIP_QMI_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_QMI_NSU// Description : If 1, and NSP is also set, XIP_QMI can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_XIP_QMI_NSU_RESET_u(0x0)#defineACCESSCTRL_XIP_QMI_NSU_BITS_u(0x00000001)#defineACCESSCTRL_XIP_QMI_NSU_MSB_u(0)#defineACCESSCTRL_XIP_QMI_NSU_LSB_u(0)#defineACCESSCTRL_XIP_QMI_NSU_ACCESS"RW"// =============================================================================// Register : ACCESSCTRL_XIP_AUX// Description : Control whether debugger, DMA, core 0 and core 1 can access// XIP_AUX, and at what security/privilege levels they can do so.//// Defaults to Secure, Privileged access only.//// This register is writable only from a Secure, Privileged// processor or debugger, with the exception of the NSU bit, which// becomes Non-secure-Privileged-writable when the NSP bit is set.#defineACCESSCTRL_XIP_AUX_OFFSET_u(0x000000e8)#defineACCESSCTRL_XIP_AUX_BITS_u(0x000000ff)#defineACCESSCTRL_XIP_AUX_RESET_u(0x000000f8)// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_DBG// Description : If 1, XIP_AUX can be accessed by the debugger, at// security/privilege levels permitted by SP/NSP/SU/NSU in this// register.#defineACCESSCTRL_XIP_AUX_DBG_RESET_u(0x1)#defineACCESSCTRL_XIP_AUX_DBG_BITS_u(0x00000080)#defineACCESSCTRL_XIP_AUX_DBG_MSB_u(7)#defineACCESSCTRL_XIP_AUX_DBG_LSB_u(7)#defineACCESSCTRL_XIP_AUX_DBG_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_DMA// Description : If 1, XIP_AUX can be accessed by the DMA, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_AUX_DMA_RESET_u(0x1)#defineACCESSCTRL_XIP_AUX_DMA_BITS_u(0x00000040)#defineACCESSCTRL_XIP_AUX_DMA_MSB_u(6)#defineACCESSCTRL_XIP_AUX_DMA_LSB_u(6)#defineACCESSCTRL_XIP_AUX_DMA_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_CORE1// Description : If 1, XIP_AUX can be accessed by core 1, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_AUX_CORE1_RESET_u(0x1)#defineACCESSCTRL_XIP_AUX_CORE1_BITS_u(0x00000020)#defineACCESSCTRL_XIP_AUX_CORE1_MSB_u(5)#defineACCESSCTRL_XIP_AUX_CORE1_LSB_u(5)#defineACCESSCTRL_XIP_AUX_CORE1_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_CORE0// Description : If 1, XIP_AUX can be accessed by core 0, at security/privilege// levels permitted by SP/NSP/SU/NSU in this register.#defineACCESSCTRL_XIP_AUX_CORE0_RESET_u(0x1)#defineACCESSCTRL_XIP_AUX_CORE0_BITS_u(0x00000010)#defineACCESSCTRL_XIP_AUX_CORE0_MSB_u(4)#defineACCESSCTRL_XIP_AUX_CORE0_LSB_u(4)#defineACCESSCTRL_XIP_AUX_CORE0_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_SP// Description : If 1, XIP_AUX can be accessed from a Secure, Privileged// context.#defineACCESSCTRL_XIP_AUX_SP_RESET_u(0x1)#defineACCESSCTRL_XIP_AUX_SP_BITS_u(0x00000008)#defineACCESSCTRL_XIP_AUX_SP_MSB_u(3)#defineACCESSCTRL_XIP_AUX_SP_LSB_u(3)#defineACCESSCTRL_XIP_AUX_SP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_SU// Description : If 1, and SP is also set, XIP_AUX can be accessed from a// Secure, Unprivileged context.#defineACCESSCTRL_XIP_AUX_SU_RESET_u(0x0)#defineACCESSCTRL_XIP_AUX_SU_BITS_u(0x00000004)#defineACCESSCTRL_XIP_AUX_SU_MSB_u(2)#defineACCESSCTRL_XIP_AUX_SU_LSB_u(2)#defineACCESSCTRL_XIP_AUX_SU_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_NSP// Description : If 1, XIP_AUX can be accessed from a Non-secure, Privileged// context.#defineACCESSCTRL_XIP_AUX_NSP_RESET_u(0x0)#defineACCESSCTRL_XIP_AUX_NSP_BITS_u(0x00000002)#defineACCESSCTRL_XIP_AUX_NSP_MSB_u(1)#defineACCESSCTRL_XIP_AUX_NSP_LSB_u(1)#defineACCESSCTRL_XIP_AUX_NSP_ACCESS"RW"// -----------------------------------------------------------------------------// Field : ACCESSCTRL_XIP_AUX_NSU// Description : If 1, and NSP is also set, XIP_AUX can be accessed from a Non-// secure, Unprivileged context.//// This bit is writable from a Non-secure, Privileged context, if// and only if the NSP bit is set.#defineACCESSCTRL_XIP_AUX_NSU_RESET_u(0x0)#defineACCESSCTRL_XIP_AUX_NSU_BITS_u(0x00000001)#defineACCESSCTRL_XIP_AUX_NSU_MSB_u(0)#defineACCESSCTRL_XIP_AUX_NSU_LSB_u(0)#defineACCESSCTRL_XIP_AUX_NSU_ACCESS"RW"2399 defines// =============================================================================/* ... */#endif// _HARDWARE_REGS_ACCESSCTRL_H
Details
Show: from
Types: Columns:
All items filtered out
All items filtered out
This file uses the notable symbols shown below. Click anywhere in the file to view more details.