1 // THIS HEADER FILE IS AUTOMATICALLY GENERATED -- DO NOT EDIT
4 * Copyright (c) 2024 Raspberry Pi Ltd.
6 * SPDX-License-Identifier: BSD-3-Clause
8 // =============================================================================
9 // Register block : ACCESSCTRL
12 // Description : Hardware access control registers
13 // =============================================================================
14 #ifndef _HARDWARE_REGS_ACCESSCTRL_H
15 #define _HARDWARE_REGS_ACCESSCTRL_H
16 // =============================================================================
17 // Register : ACCESSCTRL_LOCK
18 // Description : Once a LOCK bit is written to 1, ACCESSCTRL silently ignores
19 // writes from that master. LOCK is writable only by a Secure,
20 // Privileged processor or debugger.
22 // LOCK bits are only writable when their value is zero. Once set,
23 // they can never be cleared, except by a full reset of ACCESSCTRL
25 // Setting the LOCK bit does not affect whether an access raises a
26 // bus error. Unprivileged writes, or writes from the DMA, will
27 // continue to raise bus errors. All other accesses will continue
29 #define ACCESSCTRL_LOCK_OFFSET _u(0x00000000)
30 #define ACCESSCTRL_LOCK_BITS _u(0x0000000f)
31 #define ACCESSCTRL_LOCK_RESET _u(0x00000004)
32 // -----------------------------------------------------------------------------
33 // Field : ACCESSCTRL_LOCK_DEBUG
34 #define ACCESSCTRL_LOCK_DEBUG_RESET _u(0x0)
35 #define ACCESSCTRL_LOCK_DEBUG_BITS _u(0x00000008)
36 #define ACCESSCTRL_LOCK_DEBUG_MSB _u(3)
37 #define ACCESSCTRL_LOCK_DEBUG_LSB _u(3)
38 #define ACCESSCTRL_LOCK_DEBUG_ACCESS "RW"
39 // -----------------------------------------------------------------------------
40 // Field : ACCESSCTRL_LOCK_DMA
41 #define ACCESSCTRL_LOCK_DMA_RESET _u(0x1)
42 #define ACCESSCTRL_LOCK_DMA_BITS _u(0x00000004)
43 #define ACCESSCTRL_LOCK_DMA_MSB _u(2)
44 #define ACCESSCTRL_LOCK_DMA_LSB _u(2)
45 #define ACCESSCTRL_LOCK_DMA_ACCESS "RO"
46 // -----------------------------------------------------------------------------
47 // Field : ACCESSCTRL_LOCK_CORE1
48 #define ACCESSCTRL_LOCK_CORE1_RESET _u(0x0)
49 #define ACCESSCTRL_LOCK_CORE1_BITS _u(0x00000002)
50 #define ACCESSCTRL_LOCK_CORE1_MSB _u(1)
51 #define ACCESSCTRL_LOCK_CORE1_LSB _u(1)
52 #define ACCESSCTRL_LOCK_CORE1_ACCESS "RW"
53 // -----------------------------------------------------------------------------
54 // Field : ACCESSCTRL_LOCK_CORE0
55 #define ACCESSCTRL_LOCK_CORE0_RESET _u(0x0)
56 #define ACCESSCTRL_LOCK_CORE0_BITS _u(0x00000001)
57 #define ACCESSCTRL_LOCK_CORE0_MSB _u(0)
58 #define ACCESSCTRL_LOCK_CORE0_LSB _u(0)
59 #define ACCESSCTRL_LOCK_CORE0_ACCESS "RW"
60 // =============================================================================
61 // Register : ACCESSCTRL_FORCE_CORE_NS
62 // Description : Force core 1's bus accesses to always be Non-secure, no matter
63 // the core's internal state.
65 // Useful for schemes where one core is designated as the Non-
66 // secure core, since some peripherals may filter individual
67 // registers internally based on security state but not on master
69 #define ACCESSCTRL_FORCE_CORE_NS_OFFSET _u(0x00000004)
70 #define ACCESSCTRL_FORCE_CORE_NS_BITS _u(0x00000002)
71 #define ACCESSCTRL_FORCE_CORE_NS_RESET _u(0x00000000)
72 // -----------------------------------------------------------------------------
73 // Field : ACCESSCTRL_FORCE_CORE_NS_CORE1
74 #define ACCESSCTRL_FORCE_CORE_NS_CORE1_RESET _u(0x0)
75 #define ACCESSCTRL_FORCE_CORE_NS_CORE1_BITS _u(0x00000002)
76 #define ACCESSCTRL_FORCE_CORE_NS_CORE1_MSB _u(1)
77 #define ACCESSCTRL_FORCE_CORE_NS_CORE1_LSB _u(1)
78 #define ACCESSCTRL_FORCE_CORE_NS_CORE1_ACCESS "RW"
79 // =============================================================================
80 // Register : ACCESSCTRL_CFGRESET
81 // Description : Write 1 to reset all ACCESSCTRL configuration, except for the
82 // LOCK and FORCE_CORE_NS registers.
84 // This bit is used in the RP2350 bootrom to quickly restore
85 // ACCESSCTRL to a known state during the boot path.
87 // Note that, like all registers in ACCESSCTRL, this register is
88 // not writable when the writer's corresponding LOCK bit is set,
89 // therefore a master which has been locked out of ACCESSCTRL can
90 // not use the CFGRESET register to disturb its contents.
91 #define ACCESSCTRL_CFGRESET_OFFSET _u(0x00000008)
92 #define ACCESSCTRL_CFGRESET_BITS _u(0x00000001)
93 #define ACCESSCTRL_CFGRESET_RESET _u(0x00000000)
94 #define ACCESSCTRL_CFGRESET_MSB _u(0)
95 #define ACCESSCTRL_CFGRESET_LSB _u(0)
96 #define ACCESSCTRL_CFGRESET_ACCESS "SC"
97 // =============================================================================
98 // Register : ACCESSCTRL_GPIO_NSMASK0
99 // Description : Control whether GPIO0...31 are accessible to Non-secure code.
100 // Writable only by a Secure, Privileged processor or debugger.
102 // 0 -> Secure access only
104 // 1 -> Secure + Non-secure access
105 #define ACCESSCTRL_GPIO_NSMASK0_OFFSET _u(0x0000000c)
106 #define ACCESSCTRL_GPIO_NSMASK0_BITS _u(0xffffffff)
107 #define ACCESSCTRL_GPIO_NSMASK0_RESET _u(0x00000000)
108 #define ACCESSCTRL_GPIO_NSMASK0_MSB _u(31)
109 #define ACCESSCTRL_GPIO_NSMASK0_LSB _u(0)
110 #define ACCESSCTRL_GPIO_NSMASK0_ACCESS "RW"
111 // =============================================================================
112 // Register : ACCESSCTRL_GPIO_NSMASK1
113 // Description : Control whether GPIO32..47 are accessible to Non-secure code,
114 // and whether QSPI and USB bitbang are accessible through the
115 // Non-secure SIO. Writable only by a Secure, Privileged processor
117 #define ACCESSCTRL_GPIO_NSMASK1_OFFSET _u(0x00000010)
118 #define ACCESSCTRL_GPIO_NSMASK1_BITS _u(0xff00ffff)
119 #define ACCESSCTRL_GPIO_NSMASK1_RESET _u(0x00000000)
120 // -----------------------------------------------------------------------------
121 // Field : ACCESSCTRL_GPIO_NSMASK1_QSPI_SD
122 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SD_RESET _u(0x0)
123 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SD_BITS _u(0xf0000000)
124 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SD_MSB _u(31)
125 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SD_LSB _u(28)
126 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SD_ACCESS "RW"
127 // -----------------------------------------------------------------------------
128 // Field : ACCESSCTRL_GPIO_NSMASK1_QSPI_CSN
129 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_RESET _u(0x0)
130 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_BITS _u(0x08000000)
131 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_MSB _u(27)
132 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_LSB _u(27)
133 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_CSN_ACCESS "RW"
134 // -----------------------------------------------------------------------------
135 // Field : ACCESSCTRL_GPIO_NSMASK1_QSPI_SCK
136 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_RESET _u(0x0)
137 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_BITS _u(0x04000000)
138 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_MSB _u(26)
139 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_LSB _u(26)
140 #define ACCESSCTRL_GPIO_NSMASK1_QSPI_SCK_ACCESS "RW"
141 // -----------------------------------------------------------------------------
142 // Field : ACCESSCTRL_GPIO_NSMASK1_USB_DM
143 #define ACCESSCTRL_GPIO_NSMASK1_USB_DM_RESET _u(0x0)
144 #define ACCESSCTRL_GPIO_NSMASK1_USB_DM_BITS _u(0x02000000)
145 #define ACCESSCTRL_GPIO_NSMASK1_USB_DM_MSB _u(25)
146 #define ACCESSCTRL_GPIO_NSMASK1_USB_DM_LSB _u(25)
147 #define ACCESSCTRL_GPIO_NSMASK1_USB_DM_ACCESS "RW"
148 // -----------------------------------------------------------------------------
149 // Field : ACCESSCTRL_GPIO_NSMASK1_USB_DP
150 #define ACCESSCTRL_GPIO_NSMASK1_USB_DP_RESET _u(0x0)
151 #define ACCESSCTRL_GPIO_NSMASK1_USB_DP_BITS _u(0x01000000)
152 #define ACCESSCTRL_GPIO_NSMASK1_USB_DP_MSB _u(24)
153 #define ACCESSCTRL_GPIO_NSMASK1_USB_DP_LSB _u(24)
154 #define ACCESSCTRL_GPIO_NSMASK1_USB_DP_ACCESS "RW"
155 // -----------------------------------------------------------------------------
156 // Field : ACCESSCTRL_GPIO_NSMASK1_GPIO
157 #define ACCESSCTRL_GPIO_NSMASK1_GPIO_RESET _u(0x0000)
158 #define ACCESSCTRL_GPIO_NSMASK1_GPIO_BITS _u(0x0000ffff)
159 #define ACCESSCTRL_GPIO_NSMASK1_GPIO_MSB _u(15)
160 #define ACCESSCTRL_GPIO_NSMASK1_GPIO_LSB _u(0)
161 #define ACCESSCTRL_GPIO_NSMASK1_GPIO_ACCESS "RW"
162 // =============================================================================
163 // Register : ACCESSCTRL_ROM
164 // Description : Control whether debugger, DMA, core 0 and core 1 can access
165 // ROM, and at what security/privilege levels they can do so.
167 // Defaults to fully open access.
169 // This register is writable only from a Secure, Privileged
170 // processor or debugger, with the exception of the NSU bit, which
171 // becomes Non-secure-Privileged-writable when the NSP bit is set.
172 #define ACCESSCTRL_ROM_OFFSET _u(0x00000014)
173 #define ACCESSCTRL_ROM_BITS _u(0x000000ff)
174 #define ACCESSCTRL_ROM_RESET _u(0x000000ff)
175 // -----------------------------------------------------------------------------
176 // Field : ACCESSCTRL_ROM_DBG
177 // Description : If 1, ROM can be accessed by the debugger, at
178 // security/privilege levels permitted by SP/NSP/SU/NSU in this
180 #define ACCESSCTRL_ROM_DBG_RESET _u(0x1)
181 #define ACCESSCTRL_ROM_DBG_BITS _u(0x00000080)
182 #define ACCESSCTRL_ROM_DBG_MSB _u(7)
183 #define ACCESSCTRL_ROM_DBG_LSB _u(7)
184 #define ACCESSCTRL_ROM_DBG_ACCESS "RW"
185 // -----------------------------------------------------------------------------
186 // Field : ACCESSCTRL_ROM_DMA
187 // Description : If 1, ROM can be accessed by the DMA, at security/privilege
188 // levels permitted by SP/NSP/SU/NSU in this register.
189 #define ACCESSCTRL_ROM_DMA_RESET _u(0x1)
190 #define ACCESSCTRL_ROM_DMA_BITS _u(0x00000040)
191 #define ACCESSCTRL_ROM_DMA_MSB _u(6)
192 #define ACCESSCTRL_ROM_DMA_LSB _u(6)
193 #define ACCESSCTRL_ROM_DMA_ACCESS "RW"
194 // -----------------------------------------------------------------------------
195 // Field : ACCESSCTRL_ROM_CORE1
196 // Description : If 1, ROM can be accessed by core 1, at security/privilege
197 // levels permitted by SP/NSP/SU/NSU in this register.
198 #define ACCESSCTRL_ROM_CORE1_RESET _u(0x1)
199 #define ACCESSCTRL_ROM_CORE1_BITS _u(0x00000020)
200 #define ACCESSCTRL_ROM_CORE1_MSB _u(5)
201 #define ACCESSCTRL_ROM_CORE1_LSB _u(5)
202 #define ACCESSCTRL_ROM_CORE1_ACCESS "RW"
203 // -----------------------------------------------------------------------------
204 // Field : ACCESSCTRL_ROM_CORE0
205 // Description : If 1, ROM can be accessed by core 0, at security/privilege
206 // levels permitted by SP/NSP/SU/NSU in this register.
207 #define ACCESSCTRL_ROM_CORE0_RESET _u(0x1)
208 #define ACCESSCTRL_ROM_CORE0_BITS _u(0x00000010)
209 #define ACCESSCTRL_ROM_CORE0_MSB _u(4)
210 #define ACCESSCTRL_ROM_CORE0_LSB _u(4)
211 #define ACCESSCTRL_ROM_CORE0_ACCESS "RW"
212 // -----------------------------------------------------------------------------
213 // Field : ACCESSCTRL_ROM_SP
214 // Description : If 1, ROM can be accessed from a Secure, Privileged context.
215 #define ACCESSCTRL_ROM_SP_RESET _u(0x1)
216 #define ACCESSCTRL_ROM_SP_BITS _u(0x00000008)
217 #define ACCESSCTRL_ROM_SP_MSB _u(3)
218 #define ACCESSCTRL_ROM_SP_LSB _u(3)
219 #define ACCESSCTRL_ROM_SP_ACCESS "RW"
220 // -----------------------------------------------------------------------------
221 // Field : ACCESSCTRL_ROM_SU
222 // Description : If 1, and SP is also set, ROM can be accessed from a Secure,
223 // Unprivileged context.
224 #define ACCESSCTRL_ROM_SU_RESET _u(0x1)
225 #define ACCESSCTRL_ROM_SU_BITS _u(0x00000004)
226 #define ACCESSCTRL_ROM_SU_MSB _u(2)
227 #define ACCESSCTRL_ROM_SU_LSB _u(2)
228 #define ACCESSCTRL_ROM_SU_ACCESS "RW"
229 // -----------------------------------------------------------------------------
230 // Field : ACCESSCTRL_ROM_NSP
231 // Description : If 1, ROM can be accessed from a Non-secure, Privileged
233 #define ACCESSCTRL_ROM_NSP_RESET _u(0x1)
234 #define ACCESSCTRL_ROM_NSP_BITS _u(0x00000002)
235 #define ACCESSCTRL_ROM_NSP_MSB _u(1)
236 #define ACCESSCTRL_ROM_NSP_LSB _u(1)
237 #define ACCESSCTRL_ROM_NSP_ACCESS "RW"
238 // -----------------------------------------------------------------------------
239 // Field : ACCESSCTRL_ROM_NSU
240 // Description : If 1, and NSP is also set, ROM can be accessed from a Non-
241 // secure, Unprivileged context.
243 // This bit is writable from a Non-secure, Privileged context, if
244 // and only if the NSP bit is set.
245 #define ACCESSCTRL_ROM_NSU_RESET _u(0x1)
246 #define ACCESSCTRL_ROM_NSU_BITS _u(0x00000001)
247 #define ACCESSCTRL_ROM_NSU_MSB _u(0)
248 #define ACCESSCTRL_ROM_NSU_LSB _u(0)
249 #define ACCESSCTRL_ROM_NSU_ACCESS "RW"
250 // =============================================================================
251 // Register : ACCESSCTRL_XIP_MAIN
252 // Description : Control whether debugger, DMA, core 0 and core 1 can access
253 // XIP_MAIN, and at what security/privilege levels they can do so.
255 // Defaults to fully open access.
257 // This register is writable only from a Secure, Privileged
258 // processor or debugger, with the exception of the NSU bit, which
259 // becomes Non-secure-Privileged-writable when the NSP bit is set.
260 #define ACCESSCTRL_XIP_MAIN_OFFSET _u(0x00000018)
261 #define ACCESSCTRL_XIP_MAIN_BITS _u(0x000000ff)
262 #define ACCESSCTRL_XIP_MAIN_RESET _u(0x000000ff)
263 // -----------------------------------------------------------------------------
264 // Field : ACCESSCTRL_XIP_MAIN_DBG
265 // Description : If 1, XIP_MAIN can be accessed by the debugger, at
266 // security/privilege levels permitted by SP/NSP/SU/NSU in this
268 #define ACCESSCTRL_XIP_MAIN_DBG_RESET _u(0x1)
269 #define ACCESSCTRL_XIP_MAIN_DBG_BITS _u(0x00000080)
270 #define ACCESSCTRL_XIP_MAIN_DBG_MSB _u(7)
271 #define ACCESSCTRL_XIP_MAIN_DBG_LSB _u(7)
272 #define ACCESSCTRL_XIP_MAIN_DBG_ACCESS "RW"
273 // -----------------------------------------------------------------------------
274 // Field : ACCESSCTRL_XIP_MAIN_DMA
275 // Description : If 1, XIP_MAIN can be accessed by the DMA, at
276 // security/privilege levels permitted by SP/NSP/SU/NSU in this
278 #define ACCESSCTRL_XIP_MAIN_DMA_RESET _u(0x1)
279 #define ACCESSCTRL_XIP_MAIN_DMA_BITS _u(0x00000040)
280 #define ACCESSCTRL_XIP_MAIN_DMA_MSB _u(6)
281 #define ACCESSCTRL_XIP_MAIN_DMA_LSB _u(6)
282 #define ACCESSCTRL_XIP_MAIN_DMA_ACCESS "RW"
283 // -----------------------------------------------------------------------------
284 // Field : ACCESSCTRL_XIP_MAIN_CORE1
285 // Description : If 1, XIP_MAIN can be accessed by core 1, at security/privilege
286 // levels permitted by SP/NSP/SU/NSU in this register.
287 #define ACCESSCTRL_XIP_MAIN_CORE1_RESET _u(0x1)
288 #define ACCESSCTRL_XIP_MAIN_CORE1_BITS _u(0x00000020)
289 #define ACCESSCTRL_XIP_MAIN_CORE1_MSB _u(5)
290 #define ACCESSCTRL_XIP_MAIN_CORE1_LSB _u(5)
291 #define ACCESSCTRL_XIP_MAIN_CORE1_ACCESS "RW"
292 // -----------------------------------------------------------------------------
293 // Field : ACCESSCTRL_XIP_MAIN_CORE0
294 // Description : If 1, XIP_MAIN can be accessed by core 0, at security/privilege
295 // levels permitted by SP/NSP/SU/NSU in this register.
296 #define ACCESSCTRL_XIP_MAIN_CORE0_RESET _u(0x1)
297 #define ACCESSCTRL_XIP_MAIN_CORE0_BITS _u(0x00000010)
298 #define ACCESSCTRL_XIP_MAIN_CORE0_MSB _u(4)
299 #define ACCESSCTRL_XIP_MAIN_CORE0_LSB _u(4)
300 #define ACCESSCTRL_XIP_MAIN_CORE0_ACCESS "RW"
301 // -----------------------------------------------------------------------------
302 // Field : ACCESSCTRL_XIP_MAIN_SP
303 // Description : If 1, XIP_MAIN can be accessed from a Secure, Privileged
305 #define ACCESSCTRL_XIP_MAIN_SP_RESET _u(0x1)
306 #define ACCESSCTRL_XIP_MAIN_SP_BITS _u(0x00000008)
307 #define ACCESSCTRL_XIP_MAIN_SP_MSB _u(3)
308 #define ACCESSCTRL_XIP_MAIN_SP_LSB _u(3)
309 #define ACCESSCTRL_XIP_MAIN_SP_ACCESS "RW"
310 // -----------------------------------------------------------------------------
311 // Field : ACCESSCTRL_XIP_MAIN_SU
312 // Description : If 1, and SP is also set, XIP_MAIN can be accessed from a
313 // Secure, Unprivileged context.
314 #define ACCESSCTRL_XIP_MAIN_SU_RESET _u(0x1)
315 #define ACCESSCTRL_XIP_MAIN_SU_BITS _u(0x00000004)
316 #define ACCESSCTRL_XIP_MAIN_SU_MSB _u(2)
317 #define ACCESSCTRL_XIP_MAIN_SU_LSB _u(2)
318 #define ACCESSCTRL_XIP_MAIN_SU_ACCESS "RW"
319 // -----------------------------------------------------------------------------
320 // Field : ACCESSCTRL_XIP_MAIN_NSP
321 // Description : If 1, XIP_MAIN can be accessed from a Non-secure, Privileged
323 #define ACCESSCTRL_XIP_MAIN_NSP_RESET _u(0x1)
324 #define ACCESSCTRL_XIP_MAIN_NSP_BITS _u(0x00000002)
325 #define ACCESSCTRL_XIP_MAIN_NSP_MSB _u(1)
326 #define ACCESSCTRL_XIP_MAIN_NSP_LSB _u(1)
327 #define ACCESSCTRL_XIP_MAIN_NSP_ACCESS "RW"
328 // -----------------------------------------------------------------------------
329 // Field : ACCESSCTRL_XIP_MAIN_NSU
330 // Description : If 1, and NSP is also set, XIP_MAIN can be accessed from a Non-
331 // secure, Unprivileged context.
333 // This bit is writable from a Non-secure, Privileged context, if
334 // and only if the NSP bit is set.
335 #define ACCESSCTRL_XIP_MAIN_NSU_RESET _u(0x1)
336 #define ACCESSCTRL_XIP_MAIN_NSU_BITS _u(0x00000001)
337 #define ACCESSCTRL_XIP_MAIN_NSU_MSB _u(0)
338 #define ACCESSCTRL_XIP_MAIN_NSU_LSB _u(0)
339 #define ACCESSCTRL_XIP_MAIN_NSU_ACCESS "RW"
340 // =============================================================================
341 // Register : ACCESSCTRL_SRAM0
342 // Description : Control whether debugger, DMA, core 0 and core 1 can access
343 // SRAM0, and at what security/privilege levels they can do so.
345 // Defaults to fully open access.
347 // This register is writable only from a Secure, Privileged
348 // processor or debugger, with the exception of the NSU bit, which
349 // becomes Non-secure-Privileged-writable when the NSP bit is set.
350 #define ACCESSCTRL_SRAM0_OFFSET _u(0x0000001c)
351 #define ACCESSCTRL_SRAM0_BITS _u(0x000000ff)
352 #define ACCESSCTRL_SRAM0_RESET _u(0x000000ff)
353 // -----------------------------------------------------------------------------
354 // Field : ACCESSCTRL_SRAM0_DBG
355 // Description : If 1, SRAM0 can be accessed by the debugger, at
356 // security/privilege levels permitted by SP/NSP/SU/NSU in this
358 #define ACCESSCTRL_SRAM0_DBG_RESET _u(0x1)
359 #define ACCESSCTRL_SRAM0_DBG_BITS _u(0x00000080)
360 #define ACCESSCTRL_SRAM0_DBG_MSB _u(7)
361 #define ACCESSCTRL_SRAM0_DBG_LSB _u(7)
362 #define ACCESSCTRL_SRAM0_DBG_ACCESS "RW"
363 // -----------------------------------------------------------------------------
364 // Field : ACCESSCTRL_SRAM0_DMA
365 // Description : If 1, SRAM0 can be accessed by the DMA, at security/privilege
366 // levels permitted by SP/NSP/SU/NSU in this register.
367 #define ACCESSCTRL_SRAM0_DMA_RESET _u(0x1)
368 #define ACCESSCTRL_SRAM0_DMA_BITS _u(0x00000040)
369 #define ACCESSCTRL_SRAM0_DMA_MSB _u(6)
370 #define ACCESSCTRL_SRAM0_DMA_LSB _u(6)
371 #define ACCESSCTRL_SRAM0_DMA_ACCESS "RW"
372 // -----------------------------------------------------------------------------
373 // Field : ACCESSCTRL_SRAM0_CORE1
374 // Description : If 1, SRAM0 can be accessed by core 1, at security/privilege
375 // levels permitted by SP/NSP/SU/NSU in this register.
376 #define ACCESSCTRL_SRAM0_CORE1_RESET _u(0x1)
377 #define ACCESSCTRL_SRAM0_CORE1_BITS _u(0x00000020)
378 #define ACCESSCTRL_SRAM0_CORE1_MSB _u(5)
379 #define ACCESSCTRL_SRAM0_CORE1_LSB _u(5)
380 #define ACCESSCTRL_SRAM0_CORE1_ACCESS "RW"
381 // -----------------------------------------------------------------------------
382 // Field : ACCESSCTRL_SRAM0_CORE0
383 // Description : If 1, SRAM0 can be accessed by core 0, at security/privilege
384 // levels permitted by SP/NSP/SU/NSU in this register.
385 #define ACCESSCTRL_SRAM0_CORE0_RESET _u(0x1)
386 #define ACCESSCTRL_SRAM0_CORE0_BITS _u(0x00000010)
387 #define ACCESSCTRL_SRAM0_CORE0_MSB _u(4)
388 #define ACCESSCTRL_SRAM0_CORE0_LSB _u(4)
389 #define ACCESSCTRL_SRAM0_CORE0_ACCESS "RW"
390 // -----------------------------------------------------------------------------
391 // Field : ACCESSCTRL_SRAM0_SP
392 // Description : If 1, SRAM0 can be accessed from a Secure, Privileged context.
393 #define ACCESSCTRL_SRAM0_SP_RESET _u(0x1)
394 #define ACCESSCTRL_SRAM0_SP_BITS _u(0x00000008)
395 #define ACCESSCTRL_SRAM0_SP_MSB _u(3)
396 #define ACCESSCTRL_SRAM0_SP_LSB _u(3)
397 #define ACCESSCTRL_SRAM0_SP_ACCESS "RW"
398 // -----------------------------------------------------------------------------
399 // Field : ACCESSCTRL_SRAM0_SU
400 // Description : If 1, and SP is also set, SRAM0 can be accessed from a Secure,
401 // Unprivileged context.
402 #define ACCESSCTRL_SRAM0_SU_RESET _u(0x1)
403 #define ACCESSCTRL_SRAM0_SU_BITS _u(0x00000004)
404 #define ACCESSCTRL_SRAM0_SU_MSB _u(2)
405 #define ACCESSCTRL_SRAM0_SU_LSB _u(2)
406 #define ACCESSCTRL_SRAM0_SU_ACCESS "RW"
407 // -----------------------------------------------------------------------------
408 // Field : ACCESSCTRL_SRAM0_NSP
409 // Description : If 1, SRAM0 can be accessed from a Non-secure, Privileged
411 #define ACCESSCTRL_SRAM0_NSP_RESET _u(0x1)
412 #define ACCESSCTRL_SRAM0_NSP_BITS _u(0x00000002)
413 #define ACCESSCTRL_SRAM0_NSP_MSB _u(1)
414 #define ACCESSCTRL_SRAM0_NSP_LSB _u(1)
415 #define ACCESSCTRL_SRAM0_NSP_ACCESS "RW"
416 // -----------------------------------------------------------------------------
417 // Field : ACCESSCTRL_SRAM0_NSU
418 // Description : If 1, and NSP is also set, SRAM0 can be accessed from a Non-
419 // secure, Unprivileged context.
421 // This bit is writable from a Non-secure, Privileged context, if
422 // and only if the NSP bit is set.
423 #define ACCESSCTRL_SRAM0_NSU_RESET _u(0x1)
424 #define ACCESSCTRL_SRAM0_NSU_BITS _u(0x00000001)
425 #define ACCESSCTRL_SRAM0_NSU_MSB _u(0)
426 #define ACCESSCTRL_SRAM0_NSU_LSB _u(0)
427 #define ACCESSCTRL_SRAM0_NSU_ACCESS "RW"
428 // =============================================================================
429 // Register : ACCESSCTRL_SRAM1
430 // Description : Control whether debugger, DMA, core 0 and core 1 can access
431 // SRAM1, and at what security/privilege levels they can do so.
433 // Defaults to fully open access.
435 // This register is writable only from a Secure, Privileged
436 // processor or debugger, with the exception of the NSU bit, which
437 // becomes Non-secure-Privileged-writable when the NSP bit is set.
438 #define ACCESSCTRL_SRAM1_OFFSET _u(0x00000020)
439 #define ACCESSCTRL_SRAM1_BITS _u(0x000000ff)
440 #define ACCESSCTRL_SRAM1_RESET _u(0x000000ff)
441 // -----------------------------------------------------------------------------
442 // Field : ACCESSCTRL_SRAM1_DBG
443 // Description : If 1, SRAM1 can be accessed by the debugger, at
444 // security/privilege levels permitted by SP/NSP/SU/NSU in this
446 #define ACCESSCTRL_SRAM1_DBG_RESET _u(0x1)
447 #define ACCESSCTRL_SRAM1_DBG_BITS _u(0x00000080)
448 #define ACCESSCTRL_SRAM1_DBG_MSB _u(7)
449 #define ACCESSCTRL_SRAM1_DBG_LSB _u(7)
450 #define ACCESSCTRL_SRAM1_DBG_ACCESS "RW"
451 // -----------------------------------------------------------------------------
452 // Field : ACCESSCTRL_SRAM1_DMA
453 // Description : If 1, SRAM1 can be accessed by the DMA, at security/privilege
454 // levels permitted by SP/NSP/SU/NSU in this register.
455 #define ACCESSCTRL_SRAM1_DMA_RESET _u(0x1)
456 #define ACCESSCTRL_SRAM1_DMA_BITS _u(0x00000040)
457 #define ACCESSCTRL_SRAM1_DMA_MSB _u(6)
458 #define ACCESSCTRL_SRAM1_DMA_LSB _u(6)
459 #define ACCESSCTRL_SRAM1_DMA_ACCESS "RW"
460 // -----------------------------------------------------------------------------
461 // Field : ACCESSCTRL_SRAM1_CORE1
462 // Description : If 1, SRAM1 can be accessed by core 1, at security/privilege
463 // levels permitted by SP/NSP/SU/NSU in this register.
464 #define ACCESSCTRL_SRAM1_CORE1_RESET _u(0x1)
465 #define ACCESSCTRL_SRAM1_CORE1_BITS _u(0x00000020)
466 #define ACCESSCTRL_SRAM1_CORE1_MSB _u(5)
467 #define ACCESSCTRL_SRAM1_CORE1_LSB _u(5)
468 #define ACCESSCTRL_SRAM1_CORE1_ACCESS "RW"
469 // -----------------------------------------------------------------------------
470 // Field : ACCESSCTRL_SRAM1_CORE0
471 // Description : If 1, SRAM1 can be accessed by core 0, at security/privilege
472 // levels permitted by SP/NSP/SU/NSU in this register.
473 #define ACCESSCTRL_SRAM1_CORE0_RESET _u(0x1)
474 #define ACCESSCTRL_SRAM1_CORE0_BITS _u(0x00000010)
475 #define ACCESSCTRL_SRAM1_CORE0_MSB _u(4)
476 #define ACCESSCTRL_SRAM1_CORE0_LSB _u(4)
477 #define ACCESSCTRL_SRAM1_CORE0_ACCESS "RW"
478 // -----------------------------------------------------------------------------
479 // Field : ACCESSCTRL_SRAM1_SP
480 // Description : If 1, SRAM1 can be accessed from a Secure, Privileged context.
481 #define ACCESSCTRL_SRAM1_SP_RESET _u(0x1)
482 #define ACCESSCTRL_SRAM1_SP_BITS _u(0x00000008)
483 #define ACCESSCTRL_SRAM1_SP_MSB _u(3)
484 #define ACCESSCTRL_SRAM1_SP_LSB _u(3)
485 #define ACCESSCTRL_SRAM1_SP_ACCESS "RW"
486 // -----------------------------------------------------------------------------
487 // Field : ACCESSCTRL_SRAM1_SU
488 // Description : If 1, and SP is also set, SRAM1 can be accessed from a Secure,
489 // Unprivileged context.
490 #define ACCESSCTRL_SRAM1_SU_RESET _u(0x1)
491 #define ACCESSCTRL_SRAM1_SU_BITS _u(0x00000004)
492 #define ACCESSCTRL_SRAM1_SU_MSB _u(2)
493 #define ACCESSCTRL_SRAM1_SU_LSB _u(2)
494 #define ACCESSCTRL_SRAM1_SU_ACCESS "RW"
495 // -----------------------------------------------------------------------------
496 // Field : ACCESSCTRL_SRAM1_NSP
497 // Description : If 1, SRAM1 can be accessed from a Non-secure, Privileged
499 #define ACCESSCTRL_SRAM1_NSP_RESET _u(0x1)
500 #define ACCESSCTRL_SRAM1_NSP_BITS _u(0x00000002)
501 #define ACCESSCTRL_SRAM1_NSP_MSB _u(1)
502 #define ACCESSCTRL_SRAM1_NSP_LSB _u(1)
503 #define ACCESSCTRL_SRAM1_NSP_ACCESS "RW"
504 // -----------------------------------------------------------------------------
505 // Field : ACCESSCTRL_SRAM1_NSU
506 // Description : If 1, and NSP is also set, SRAM1 can be accessed from a Non-
507 // secure, Unprivileged context.
509 // This bit is writable from a Non-secure, Privileged context, if
510 // and only if the NSP bit is set.
511 #define ACCESSCTRL_SRAM1_NSU_RESET _u(0x1)
512 #define ACCESSCTRL_SRAM1_NSU_BITS _u(0x00000001)
513 #define ACCESSCTRL_SRAM1_NSU_MSB _u(0)
514 #define ACCESSCTRL_SRAM1_NSU_LSB _u(0)
515 #define ACCESSCTRL_SRAM1_NSU_ACCESS "RW"
516 // =============================================================================
517 // Register : ACCESSCTRL_SRAM2
518 // Description : Control whether debugger, DMA, core 0 and core 1 can access
519 // SRAM2, and at what security/privilege levels they can do so.
521 // Defaults to fully open access.
523 // This register is writable only from a Secure, Privileged
524 // processor or debugger, with the exception of the NSU bit, which
525 // becomes Non-secure-Privileged-writable when the NSP bit is set.
526 #define ACCESSCTRL_SRAM2_OFFSET _u(0x00000024)
527 #define ACCESSCTRL_SRAM2_BITS _u(0x000000ff)
528 #define ACCESSCTRL_SRAM2_RESET _u(0x000000ff)
529 // -----------------------------------------------------------------------------
530 // Field : ACCESSCTRL_SRAM2_DBG
531 // Description : If 1, SRAM2 can be accessed by the debugger, at
532 // security/privilege levels permitted by SP/NSP/SU/NSU in this
534 #define ACCESSCTRL_SRAM2_DBG_RESET _u(0x1)
535 #define ACCESSCTRL_SRAM2_DBG_BITS _u(0x00000080)
536 #define ACCESSCTRL_SRAM2_DBG_MSB _u(7)
537 #define ACCESSCTRL_SRAM2_DBG_LSB _u(7)
538 #define ACCESSCTRL_SRAM2_DBG_ACCESS "RW"
539 // -----------------------------------------------------------------------------
540 // Field : ACCESSCTRL_SRAM2_DMA
541 // Description : If 1, SRAM2 can be accessed by the DMA, at security/privilege
542 // levels permitted by SP/NSP/SU/NSU in this register.
543 #define ACCESSCTRL_SRAM2_DMA_RESET _u(0x1)
544 #define ACCESSCTRL_SRAM2_DMA_BITS _u(0x00000040)
545 #define ACCESSCTRL_SRAM2_DMA_MSB _u(6)
546 #define ACCESSCTRL_SRAM2_DMA_LSB _u(6)
547 #define ACCESSCTRL_SRAM2_DMA_ACCESS "RW"
548 // -----------------------------------------------------------------------------
549 // Field : ACCESSCTRL_SRAM2_CORE1
550 // Description : If 1, SRAM2 can be accessed by core 1, at security/privilege
551 // levels permitted by SP/NSP/SU/NSU in this register.
552 #define ACCESSCTRL_SRAM2_CORE1_RESET _u(0x1)
553 #define ACCESSCTRL_SRAM2_CORE1_BITS _u(0x00000020)
554 #define ACCESSCTRL_SRAM2_CORE1_MSB _u(5)
555 #define ACCESSCTRL_SRAM2_CORE1_LSB _u(5)
556 #define ACCESSCTRL_SRAM2_CORE1_ACCESS "RW"
557 // -----------------------------------------------------------------------------
558 // Field : ACCESSCTRL_SRAM2_CORE0
559 // Description : If 1, SRAM2 can be accessed by core 0, at security/privilege
560 // levels permitted by SP/NSP/SU/NSU in this register.
561 #define ACCESSCTRL_SRAM2_CORE0_RESET _u(0x1)
562 #define ACCESSCTRL_SRAM2_CORE0_BITS _u(0x00000010)
563 #define ACCESSCTRL_SRAM2_CORE0_MSB _u(4)
564 #define ACCESSCTRL_SRAM2_CORE0_LSB _u(4)
565 #define ACCESSCTRL_SRAM2_CORE0_ACCESS "RW"
566 // -----------------------------------------------------------------------------
567 // Field : ACCESSCTRL_SRAM2_SP
568 // Description : If 1, SRAM2 can be accessed from a Secure, Privileged context.
569 #define ACCESSCTRL_SRAM2_SP_RESET _u(0x1)
570 #define ACCESSCTRL_SRAM2_SP_BITS _u(0x00000008)
571 #define ACCESSCTRL_SRAM2_SP_MSB _u(3)
572 #define ACCESSCTRL_SRAM2_SP_LSB _u(3)
573 #define ACCESSCTRL_SRAM2_SP_ACCESS "RW"
574 // -----------------------------------------------------------------------------
575 // Field : ACCESSCTRL_SRAM2_SU
576 // Description : If 1, and SP is also set, SRAM2 can be accessed from a Secure,
577 // Unprivileged context.
578 #define ACCESSCTRL_SRAM2_SU_RESET _u(0x1)
579 #define ACCESSCTRL_SRAM2_SU_BITS _u(0x00000004)
580 #define ACCESSCTRL_SRAM2_SU_MSB _u(2)
581 #define ACCESSCTRL_SRAM2_SU_LSB _u(2)
582 #define ACCESSCTRL_SRAM2_SU_ACCESS "RW"
583 // -----------------------------------------------------------------------------
584 // Field : ACCESSCTRL_SRAM2_NSP
585 // Description : If 1, SRAM2 can be accessed from a Non-secure, Privileged
587 #define ACCESSCTRL_SRAM2_NSP_RESET _u(0x1)
588 #define ACCESSCTRL_SRAM2_NSP_BITS _u(0x00000002)
589 #define ACCESSCTRL_SRAM2_NSP_MSB _u(1)
590 #define ACCESSCTRL_SRAM2_NSP_LSB _u(1)
591 #define ACCESSCTRL_SRAM2_NSP_ACCESS "RW"
592 // -----------------------------------------------------------------------------
593 // Field : ACCESSCTRL_SRAM2_NSU
594 // Description : If 1, and NSP is also set, SRAM2 can be accessed from a Non-
595 // secure, Unprivileged context.
597 // This bit is writable from a Non-secure, Privileged context, if
598 // and only if the NSP bit is set.
599 #define ACCESSCTRL_SRAM2_NSU_RESET _u(0x1)
600 #define ACCESSCTRL_SRAM2_NSU_BITS _u(0x00000001)
601 #define ACCESSCTRL_SRAM2_NSU_MSB _u(0)
602 #define ACCESSCTRL_SRAM2_NSU_LSB _u(0)
603 #define ACCESSCTRL_SRAM2_NSU_ACCESS "RW"
604 // =============================================================================
605 // Register : ACCESSCTRL_SRAM3
606 // Description : Control whether debugger, DMA, core 0 and core 1 can access
607 // SRAM3, and at what security/privilege levels they can do so.
609 // Defaults to fully open access.
611 // This register is writable only from a Secure, Privileged
612 // processor or debugger, with the exception of the NSU bit, which
613 // becomes Non-secure-Privileged-writable when the NSP bit is set.
614 #define ACCESSCTRL_SRAM3_OFFSET _u(0x00000028)
615 #define ACCESSCTRL_SRAM3_BITS _u(0x000000ff)
616 #define ACCESSCTRL_SRAM3_RESET _u(0x000000ff)
617 // -----------------------------------------------------------------------------
618 // Field : ACCESSCTRL_SRAM3_DBG
619 // Description : If 1, SRAM3 can be accessed by the debugger, at
620 // security/privilege levels permitted by SP/NSP/SU/NSU in this
622 #define ACCESSCTRL_SRAM3_DBG_RESET _u(0x1)
623 #define ACCESSCTRL_SRAM3_DBG_BITS _u(0x00000080)
624 #define ACCESSCTRL_SRAM3_DBG_MSB _u(7)
625 #define ACCESSCTRL_SRAM3_DBG_LSB _u(7)
626 #define ACCESSCTRL_SRAM3_DBG_ACCESS "RW"
627 // -----------------------------------------------------------------------------
628 // Field : ACCESSCTRL_SRAM3_DMA
629 // Description : If 1, SRAM3 can be accessed by the DMA, at security/privilege
630 // levels permitted by SP/NSP/SU/NSU in this register.
631 #define ACCESSCTRL_SRAM3_DMA_RESET _u(0x1)
632 #define ACCESSCTRL_SRAM3_DMA_BITS _u(0x00000040)
633 #define ACCESSCTRL_SRAM3_DMA_MSB _u(6)
634 #define ACCESSCTRL_SRAM3_DMA_LSB _u(6)
635 #define ACCESSCTRL_SRAM3_DMA_ACCESS "RW"
636 // -----------------------------------------------------------------------------
637 // Field : ACCESSCTRL_SRAM3_CORE1
638 // Description : If 1, SRAM3 can be accessed by core 1, at security/privilege
639 // levels permitted by SP/NSP/SU/NSU in this register.
640 #define ACCESSCTRL_SRAM3_CORE1_RESET _u(0x1)
641 #define ACCESSCTRL_SRAM3_CORE1_BITS _u(0x00000020)
642 #define ACCESSCTRL_SRAM3_CORE1_MSB _u(5)
643 #define ACCESSCTRL_SRAM3_CORE1_LSB _u(5)
644 #define ACCESSCTRL_SRAM3_CORE1_ACCESS "RW"
645 // -----------------------------------------------------------------------------
646 // Field : ACCESSCTRL_SRAM3_CORE0
647 // Description : If 1, SRAM3 can be accessed by core 0, at security/privilege
648 // levels permitted by SP/NSP/SU/NSU in this register.
649 #define ACCESSCTRL_SRAM3_CORE0_RESET _u(0x1)
650 #define ACCESSCTRL_SRAM3_CORE0_BITS _u(0x00000010)
651 #define ACCESSCTRL_SRAM3_CORE0_MSB _u(4)
652 #define ACCESSCTRL_SRAM3_CORE0_LSB _u(4)
653 #define ACCESSCTRL_SRAM3_CORE0_ACCESS "RW"
654 // -----------------------------------------------------------------------------
655 // Field : ACCESSCTRL_SRAM3_SP
656 // Description : If 1, SRAM3 can be accessed from a Secure, Privileged context.
657 #define ACCESSCTRL_SRAM3_SP_RESET _u(0x1)
658 #define ACCESSCTRL_SRAM3_SP_BITS _u(0x00000008)
659 #define ACCESSCTRL_SRAM3_SP_MSB _u(3)
660 #define ACCESSCTRL_SRAM3_SP_LSB _u(3)
661 #define ACCESSCTRL_SRAM3_SP_ACCESS "RW"
662 // -----------------------------------------------------------------------------
663 // Field : ACCESSCTRL_SRAM3_SU
664 // Description : If 1, and SP is also set, SRAM3 can be accessed from a Secure,
665 // Unprivileged context.
666 #define ACCESSCTRL_SRAM3_SU_RESET _u(0x1)
667 #define ACCESSCTRL_SRAM3_SU_BITS _u(0x00000004)
668 #define ACCESSCTRL_SRAM3_SU_MSB _u(2)
669 #define ACCESSCTRL_SRAM3_SU_LSB _u(2)
670 #define ACCESSCTRL_SRAM3_SU_ACCESS "RW"
671 // -----------------------------------------------------------------------------
672 // Field : ACCESSCTRL_SRAM3_NSP
673 // Description : If 1, SRAM3 can be accessed from a Non-secure, Privileged
675 #define ACCESSCTRL_SRAM3_NSP_RESET _u(0x1)
676 #define ACCESSCTRL_SRAM3_NSP_BITS _u(0x00000002)
677 #define ACCESSCTRL_SRAM3_NSP_MSB _u(1)
678 #define ACCESSCTRL_SRAM3_NSP_LSB _u(1)
679 #define ACCESSCTRL_SRAM3_NSP_ACCESS "RW"
680 // -----------------------------------------------------------------------------
681 // Field : ACCESSCTRL_SRAM3_NSU
682 // Description : If 1, and NSP is also set, SRAM3 can be accessed from a Non-
683 // secure, Unprivileged context.
685 // This bit is writable from a Non-secure, Privileged context, if
686 // and only if the NSP bit is set.
687 #define ACCESSCTRL_SRAM3_NSU_RESET _u(0x1)
688 #define ACCESSCTRL_SRAM3_NSU_BITS _u(0x00000001)
689 #define ACCESSCTRL_SRAM3_NSU_MSB _u(0)
690 #define ACCESSCTRL_SRAM3_NSU_LSB _u(0)
691 #define ACCESSCTRL_SRAM3_NSU_ACCESS "RW"
692 // =============================================================================
693 // Register : ACCESSCTRL_SRAM4
694 // Description : Control whether debugger, DMA, core 0 and core 1 can access
695 // SRAM4, and at what security/privilege levels they can do so.
697 // Defaults to fully open access.
699 // This register is writable only from a Secure, Privileged
700 // processor or debugger, with the exception of the NSU bit, which
701 // becomes Non-secure-Privileged-writable when the NSP bit is set.
702 #define ACCESSCTRL_SRAM4_OFFSET _u(0x0000002c)
703 #define ACCESSCTRL_SRAM4_BITS _u(0x000000ff)
704 #define ACCESSCTRL_SRAM4_RESET _u(0x000000ff)
705 // -----------------------------------------------------------------------------
706 // Field : ACCESSCTRL_SRAM4_DBG
707 // Description : If 1, SRAM4 can be accessed by the debugger, at
708 // security/privilege levels permitted by SP/NSP/SU/NSU in this
710 #define ACCESSCTRL_SRAM4_DBG_RESET _u(0x1)
711 #define ACCESSCTRL_SRAM4_DBG_BITS _u(0x00000080)
712 #define ACCESSCTRL_SRAM4_DBG_MSB _u(7)
713 #define ACCESSCTRL_SRAM4_DBG_LSB _u(7)
714 #define ACCESSCTRL_SRAM4_DBG_ACCESS "RW"
715 // -----------------------------------------------------------------------------
716 // Field : ACCESSCTRL_SRAM4_DMA
717 // Description : If 1, SRAM4 can be accessed by the DMA, at security/privilege
718 // levels permitted by SP/NSP/SU/NSU in this register.
719 #define ACCESSCTRL_SRAM4_DMA_RESET _u(0x1)
720 #define ACCESSCTRL_SRAM4_DMA_BITS _u(0x00000040)
721 #define ACCESSCTRL_SRAM4_DMA_MSB _u(6)
722 #define ACCESSCTRL_SRAM4_DMA_LSB _u(6)
723 #define ACCESSCTRL_SRAM4_DMA_ACCESS "RW"
724 // -----------------------------------------------------------------------------
725 // Field : ACCESSCTRL_SRAM4_CORE1
726 // Description : If 1, SRAM4 can be accessed by core 1, at security/privilege
727 // levels permitted by SP/NSP/SU/NSU in this register.
728 #define ACCESSCTRL_SRAM4_CORE1_RESET _u(0x1)
729 #define ACCESSCTRL_SRAM4_CORE1_BITS _u(0x00000020)
730 #define ACCESSCTRL_SRAM4_CORE1_MSB _u(5)
731 #define ACCESSCTRL_SRAM4_CORE1_LSB _u(5)
732 #define ACCESSCTRL_SRAM4_CORE1_ACCESS "RW"
733 // -----------------------------------------------------------------------------
734 // Field : ACCESSCTRL_SRAM4_CORE0
735 // Description : If 1, SRAM4 can be accessed by core 0, at security/privilege
736 // levels permitted by SP/NSP/SU/NSU in this register.
737 #define ACCESSCTRL_SRAM4_CORE0_RESET _u(0x1)
738 #define ACCESSCTRL_SRAM4_CORE0_BITS _u(0x00000010)
739 #define ACCESSCTRL_SRAM4_CORE0_MSB _u(4)
740 #define ACCESSCTRL_SRAM4_CORE0_LSB _u(4)
741 #define ACCESSCTRL_SRAM4_CORE0_ACCESS "RW"
742 // -----------------------------------------------------------------------------
743 // Field : ACCESSCTRL_SRAM4_SP
744 // Description : If 1, SRAM4 can be accessed from a Secure, Privileged context.
745 #define ACCESSCTRL_SRAM4_SP_RESET _u(0x1)
746 #define ACCESSCTRL_SRAM4_SP_BITS _u(0x00000008)
747 #define ACCESSCTRL_SRAM4_SP_MSB _u(3)
748 #define ACCESSCTRL_SRAM4_SP_LSB _u(3)
749 #define ACCESSCTRL_SRAM4_SP_ACCESS "RW"
750 // -----------------------------------------------------------------------------
751 // Field : ACCESSCTRL_SRAM4_SU
752 // Description : If 1, and SP is also set, SRAM4 can be accessed from a Secure,
753 // Unprivileged context.
754 #define ACCESSCTRL_SRAM4_SU_RESET _u(0x1)
755 #define ACCESSCTRL_SRAM4_SU_BITS _u(0x00000004)
756 #define ACCESSCTRL_SRAM4_SU_MSB _u(2)
757 #define ACCESSCTRL_SRAM4_SU_LSB _u(2)
758 #define ACCESSCTRL_SRAM4_SU_ACCESS "RW"
759 // -----------------------------------------------------------------------------
760 // Field : ACCESSCTRL_SRAM4_NSP
761 // Description : If 1, SRAM4 can be accessed from a Non-secure, Privileged
763 #define ACCESSCTRL_SRAM4_NSP_RESET _u(0x1)
764 #define ACCESSCTRL_SRAM4_NSP_BITS _u(0x00000002)
765 #define ACCESSCTRL_SRAM4_NSP_MSB _u(1)
766 #define ACCESSCTRL_SRAM4_NSP_LSB _u(1)
767 #define ACCESSCTRL_SRAM4_NSP_ACCESS "RW"
768 // -----------------------------------------------------------------------------
769 // Field : ACCESSCTRL_SRAM4_NSU
770 // Description : If 1, and NSP is also set, SRAM4 can be accessed from a Non-
771 // secure, Unprivileged context.
773 // This bit is writable from a Non-secure, Privileged context, if
774 // and only if the NSP bit is set.
775 #define ACCESSCTRL_SRAM4_NSU_RESET _u(0x1)
776 #define ACCESSCTRL_SRAM4_NSU_BITS _u(0x00000001)
777 #define ACCESSCTRL_SRAM4_NSU_MSB _u(0)
778 #define ACCESSCTRL_SRAM4_NSU_LSB _u(0)
779 #define ACCESSCTRL_SRAM4_NSU_ACCESS "RW"
780 // =============================================================================
781 // Register : ACCESSCTRL_SRAM5
782 // Description : Control whether debugger, DMA, core 0 and core 1 can access
783 // SRAM5, and at what security/privilege levels they can do so.
785 // Defaults to fully open access.
787 // This register is writable only from a Secure, Privileged
788 // processor or debugger, with the exception of the NSU bit, which
789 // becomes Non-secure-Privileged-writable when the NSP bit is set.
790 #define ACCESSCTRL_SRAM5_OFFSET _u(0x00000030)
791 #define ACCESSCTRL_SRAM5_BITS _u(0x000000ff)
792 #define ACCESSCTRL_SRAM5_RESET _u(0x000000ff)
793 // -----------------------------------------------------------------------------
794 // Field : ACCESSCTRL_SRAM5_DBG
795 // Description : If 1, SRAM5 can be accessed by the debugger, at
796 // security/privilege levels permitted by SP/NSP/SU/NSU in this
798 #define ACCESSCTRL_SRAM5_DBG_RESET _u(0x1)
799 #define ACCESSCTRL_SRAM5_DBG_BITS _u(0x00000080)
800 #define ACCESSCTRL_SRAM5_DBG_MSB _u(7)
801 #define ACCESSCTRL_SRAM5_DBG_LSB _u(7)
802 #define ACCESSCTRL_SRAM5_DBG_ACCESS "RW"
803 // -----------------------------------------------------------------------------
804 // Field : ACCESSCTRL_SRAM5_DMA
805 // Description : If 1, SRAM5 can be accessed by the DMA, at security/privilege
806 // levels permitted by SP/NSP/SU/NSU in this register.
807 #define ACCESSCTRL_SRAM5_DMA_RESET _u(0x1)
808 #define ACCESSCTRL_SRAM5_DMA_BITS _u(0x00000040)
809 #define ACCESSCTRL_SRAM5_DMA_MSB _u(6)
810 #define ACCESSCTRL_SRAM5_DMA_LSB _u(6)
811 #define ACCESSCTRL_SRAM5_DMA_ACCESS "RW"
812 // -----------------------------------------------------------------------------
813 // Field : ACCESSCTRL_SRAM5_CORE1
814 // Description : If 1, SRAM5 can be accessed by core 1, at security/privilege
815 // levels permitted by SP/NSP/SU/NSU in this register.
816 #define ACCESSCTRL_SRAM5_CORE1_RESET _u(0x1)
817 #define ACCESSCTRL_SRAM5_CORE1_BITS _u(0x00000020)
818 #define ACCESSCTRL_SRAM5_CORE1_MSB _u(5)
819 #define ACCESSCTRL_SRAM5_CORE1_LSB _u(5)
820 #define ACCESSCTRL_SRAM5_CORE1_ACCESS "RW"
821 // -----------------------------------------------------------------------------
822 // Field : ACCESSCTRL_SRAM5_CORE0
823 // Description : If 1, SRAM5 can be accessed by core 0, at security/privilege
824 // levels permitted by SP/NSP/SU/NSU in this register.
825 #define ACCESSCTRL_SRAM5_CORE0_RESET _u(0x1)
826 #define ACCESSCTRL_SRAM5_CORE0_BITS _u(0x00000010)
827 #define ACCESSCTRL_SRAM5_CORE0_MSB _u(4)
828 #define ACCESSCTRL_SRAM5_CORE0_LSB _u(4)
829 #define ACCESSCTRL_SRAM5_CORE0_ACCESS "RW"
830 // -----------------------------------------------------------------------------
831 // Field : ACCESSCTRL_SRAM5_SP
832 // Description : If 1, SRAM5 can be accessed from a Secure, Privileged context.
833 #define ACCESSCTRL_SRAM5_SP_RESET _u(0x1)
834 #define ACCESSCTRL_SRAM5_SP_BITS _u(0x00000008)
835 #define ACCESSCTRL_SRAM5_SP_MSB _u(3)
836 #define ACCESSCTRL_SRAM5_SP_LSB _u(3)
837 #define ACCESSCTRL_SRAM5_SP_ACCESS "RW"
838 // -----------------------------------------------------------------------------
839 // Field : ACCESSCTRL_SRAM5_SU
840 // Description : If 1, and SP is also set, SRAM5 can be accessed from a Secure,
841 // Unprivileged context.
842 #define ACCESSCTRL_SRAM5_SU_RESET _u(0x1)
843 #define ACCESSCTRL_SRAM5_SU_BITS _u(0x00000004)
844 #define ACCESSCTRL_SRAM5_SU_MSB _u(2)
845 #define ACCESSCTRL_SRAM5_SU_LSB _u(2)
846 #define ACCESSCTRL_SRAM5_SU_ACCESS "RW"
847 // -----------------------------------------------------------------------------
848 // Field : ACCESSCTRL_SRAM5_NSP
849 // Description : If 1, SRAM5 can be accessed from a Non-secure, Privileged
851 #define ACCESSCTRL_SRAM5_NSP_RESET _u(0x1)
852 #define ACCESSCTRL_SRAM5_NSP_BITS _u(0x00000002)
853 #define ACCESSCTRL_SRAM5_NSP_MSB _u(1)
854 #define ACCESSCTRL_SRAM5_NSP_LSB _u(1)
855 #define ACCESSCTRL_SRAM5_NSP_ACCESS "RW"
856 // -----------------------------------------------------------------------------
857 // Field : ACCESSCTRL_SRAM5_NSU
858 // Description : If 1, and NSP is also set, SRAM5 can be accessed from a Non-
859 // secure, Unprivileged context.
861 // This bit is writable from a Non-secure, Privileged context, if
862 // and only if the NSP bit is set.
863 #define ACCESSCTRL_SRAM5_NSU_RESET _u(0x1)
864 #define ACCESSCTRL_SRAM5_NSU_BITS _u(0x00000001)
865 #define ACCESSCTRL_SRAM5_NSU_MSB _u(0)
866 #define ACCESSCTRL_SRAM5_NSU_LSB _u(0)
867 #define ACCESSCTRL_SRAM5_NSU_ACCESS "RW"
868 // =============================================================================
869 // Register : ACCESSCTRL_SRAM6
870 // Description : Control whether debugger, DMA, core 0 and core 1 can access
871 // SRAM6, and at what security/privilege levels they can do so.
873 // Defaults to fully open access.
875 // This register is writable only from a Secure, Privileged
876 // processor or debugger, with the exception of the NSU bit, which
877 // becomes Non-secure-Privileged-writable when the NSP bit is set.
878 #define ACCESSCTRL_SRAM6_OFFSET _u(0x00000034)
879 #define ACCESSCTRL_SRAM6_BITS _u(0x000000ff)
880 #define ACCESSCTRL_SRAM6_RESET _u(0x000000ff)
881 // -----------------------------------------------------------------------------
882 // Field : ACCESSCTRL_SRAM6_DBG
883 // Description : If 1, SRAM6 can be accessed by the debugger, at
884 // security/privilege levels permitted by SP/NSP/SU/NSU in this
886 #define ACCESSCTRL_SRAM6_DBG_RESET _u(0x1)
887 #define ACCESSCTRL_SRAM6_DBG_BITS _u(0x00000080)
888 #define ACCESSCTRL_SRAM6_DBG_MSB _u(7)
889 #define ACCESSCTRL_SRAM6_DBG_LSB _u(7)
890 #define ACCESSCTRL_SRAM6_DBG_ACCESS "RW"
891 // -----------------------------------------------------------------------------
892 // Field : ACCESSCTRL_SRAM6_DMA
893 // Description : If 1, SRAM6 can be accessed by the DMA, at security/privilege
894 // levels permitted by SP/NSP/SU/NSU in this register.
895 #define ACCESSCTRL_SRAM6_DMA_RESET _u(0x1)
896 #define ACCESSCTRL_SRAM6_DMA_BITS _u(0x00000040)
897 #define ACCESSCTRL_SRAM6_DMA_MSB _u(6)
898 #define ACCESSCTRL_SRAM6_DMA_LSB _u(6)
899 #define ACCESSCTRL_SRAM6_DMA_ACCESS "RW"
900 // -----------------------------------------------------------------------------
901 // Field : ACCESSCTRL_SRAM6_CORE1
902 // Description : If 1, SRAM6 can be accessed by core 1, at security/privilege
903 // levels permitted by SP/NSP/SU/NSU in this register.
904 #define ACCESSCTRL_SRAM6_CORE1_RESET _u(0x1)
905 #define ACCESSCTRL_SRAM6_CORE1_BITS _u(0x00000020)
906 #define ACCESSCTRL_SRAM6_CORE1_MSB _u(5)
907 #define ACCESSCTRL_SRAM6_CORE1_LSB _u(5)
908 #define ACCESSCTRL_SRAM6_CORE1_ACCESS "RW"
909 // -----------------------------------------------------------------------------
910 // Field : ACCESSCTRL_SRAM6_CORE0
911 // Description : If 1, SRAM6 can be accessed by core 0, at security/privilege
912 // levels permitted by SP/NSP/SU/NSU in this register.
913 #define ACCESSCTRL_SRAM6_CORE0_RESET _u(0x1)
914 #define ACCESSCTRL_SRAM6_CORE0_BITS _u(0x00000010)
915 #define ACCESSCTRL_SRAM6_CORE0_MSB _u(4)
916 #define ACCESSCTRL_SRAM6_CORE0_LSB _u(4)
917 #define ACCESSCTRL_SRAM6_CORE0_ACCESS "RW"
918 // -----------------------------------------------------------------------------
919 // Field : ACCESSCTRL_SRAM6_SP
920 // Description : If 1, SRAM6 can be accessed from a Secure, Privileged context.
921 #define ACCESSCTRL_SRAM6_SP_RESET _u(0x1)
922 #define ACCESSCTRL_SRAM6_SP_BITS _u(0x00000008)
923 #define ACCESSCTRL_SRAM6_SP_MSB _u(3)
924 #define ACCESSCTRL_SRAM6_SP_LSB _u(3)
925 #define ACCESSCTRL_SRAM6_SP_ACCESS "RW"
926 // -----------------------------------------------------------------------------
927 // Field : ACCESSCTRL_SRAM6_SU
928 // Description : If 1, and SP is also set, SRAM6 can be accessed from a Secure,
929 // Unprivileged context.
930 #define ACCESSCTRL_SRAM6_SU_RESET _u(0x1)
931 #define ACCESSCTRL_SRAM6_SU_BITS _u(0x00000004)
932 #define ACCESSCTRL_SRAM6_SU_MSB _u(2)
933 #define ACCESSCTRL_SRAM6_SU_LSB _u(2)
934 #define ACCESSCTRL_SRAM6_SU_ACCESS "RW"
935 // -----------------------------------------------------------------------------
936 // Field : ACCESSCTRL_SRAM6_NSP
937 // Description : If 1, SRAM6 can be accessed from a Non-secure, Privileged
939 #define ACCESSCTRL_SRAM6_NSP_RESET _u(0x1)
940 #define ACCESSCTRL_SRAM6_NSP_BITS _u(0x00000002)
941 #define ACCESSCTRL_SRAM6_NSP_MSB _u(1)
942 #define ACCESSCTRL_SRAM6_NSP_LSB _u(1)
943 #define ACCESSCTRL_SRAM6_NSP_ACCESS "RW"
944 // -----------------------------------------------------------------------------
945 // Field : ACCESSCTRL_SRAM6_NSU
946 // Description : If 1, and NSP is also set, SRAM6 can be accessed from a Non-
947 // secure, Unprivileged context.
949 // This bit is writable from a Non-secure, Privileged context, if
950 // and only if the NSP bit is set.
951 #define ACCESSCTRL_SRAM6_NSU_RESET _u(0x1)
952 #define ACCESSCTRL_SRAM6_NSU_BITS _u(0x00000001)
953 #define ACCESSCTRL_SRAM6_NSU_MSB _u(0)
954 #define ACCESSCTRL_SRAM6_NSU_LSB _u(0)
955 #define ACCESSCTRL_SRAM6_NSU_ACCESS "RW"
956 // =============================================================================
957 // Register : ACCESSCTRL_SRAM7
958 // Description : Control whether debugger, DMA, core 0 and core 1 can access
959 // SRAM7, and at what security/privilege levels they can do so.
961 // Defaults to fully open access.
963 // This register is writable only from a Secure, Privileged
964 // processor or debugger, with the exception of the NSU bit, which
965 // becomes Non-secure-Privileged-writable when the NSP bit is set.
966 #define ACCESSCTRL_SRAM7_OFFSET _u(0x00000038)
967 #define ACCESSCTRL_SRAM7_BITS _u(0x000000ff)
968 #define ACCESSCTRL_SRAM7_RESET _u(0x000000ff)
969 // -----------------------------------------------------------------------------
970 // Field : ACCESSCTRL_SRAM7_DBG
971 // Description : If 1, SRAM7 can be accessed by the debugger, at
972 // security/privilege levels permitted by SP/NSP/SU/NSU in this
974 #define ACCESSCTRL_SRAM7_DBG_RESET _u(0x1)
975 #define ACCESSCTRL_SRAM7_DBG_BITS _u(0x00000080)
976 #define ACCESSCTRL_SRAM7_DBG_MSB _u(7)
977 #define ACCESSCTRL_SRAM7_DBG_LSB _u(7)
978 #define ACCESSCTRL_SRAM7_DBG_ACCESS "RW"
979 // -----------------------------------------------------------------------------
980 // Field : ACCESSCTRL_SRAM7_DMA
981 // Description : If 1, SRAM7 can be accessed by the DMA, at security/privilege
982 // levels permitted by SP/NSP/SU/NSU in this register.
983 #define ACCESSCTRL_SRAM7_DMA_RESET _u(0x1)
984 #define ACCESSCTRL_SRAM7_DMA_BITS _u(0x00000040)
985 #define ACCESSCTRL_SRAM7_DMA_MSB _u(6)
986 #define ACCESSCTRL_SRAM7_DMA_LSB _u(6)
987 #define ACCESSCTRL_SRAM7_DMA_ACCESS "RW"
988 // -----------------------------------------------------------------------------
989 // Field : ACCESSCTRL_SRAM7_CORE1
990 // Description : If 1, SRAM7 can be accessed by core 1, at security/privilege
991 // levels permitted by SP/NSP/SU/NSU in this register.
992 #define ACCESSCTRL_SRAM7_CORE1_RESET _u(0x1)
993 #define ACCESSCTRL_SRAM7_CORE1_BITS _u(0x00000020)
994 #define ACCESSCTRL_SRAM7_CORE1_MSB _u(5)
995 #define ACCESSCTRL_SRAM7_CORE1_LSB _u(5)
996 #define ACCESSCTRL_SRAM7_CORE1_ACCESS "RW"
997 // -----------------------------------------------------------------------------
998 // Field : ACCESSCTRL_SRAM7_CORE0
999 // Description : If 1, SRAM7 can be accessed by core 0, at security/privilege
1000 // levels permitted by SP/NSP/SU/NSU in this register.
1001 #define ACCESSCTRL_SRAM7_CORE0_RESET _u(0x1)
1002 #define ACCESSCTRL_SRAM7_CORE0_BITS _u(0x00000010)
1003 #define ACCESSCTRL_SRAM7_CORE0_MSB _u(4)
1004 #define ACCESSCTRL_SRAM7_CORE0_LSB _u(4)
1005 #define ACCESSCTRL_SRAM7_CORE0_ACCESS "RW"
1006 // -----------------------------------------------------------------------------
1007 // Field : ACCESSCTRL_SRAM7_SP
1008 // Description : If 1, SRAM7 can be accessed from a Secure, Privileged context.
1009 #define ACCESSCTRL_SRAM7_SP_RESET _u(0x1)
1010 #define ACCESSCTRL_SRAM7_SP_BITS _u(0x00000008)
1011 #define ACCESSCTRL_SRAM7_SP_MSB _u(3)
1012 #define ACCESSCTRL_SRAM7_SP_LSB _u(3)
1013 #define ACCESSCTRL_SRAM7_SP_ACCESS "RW"
1014 // -----------------------------------------------------------------------------
1015 // Field : ACCESSCTRL_SRAM7_SU
1016 // Description : If 1, and SP is also set, SRAM7 can be accessed from a Secure,
1017 // Unprivileged context.
1018 #define ACCESSCTRL_SRAM7_SU_RESET _u(0x1)
1019 #define ACCESSCTRL_SRAM7_SU_BITS _u(0x00000004)
1020 #define ACCESSCTRL_SRAM7_SU_MSB _u(2)
1021 #define ACCESSCTRL_SRAM7_SU_LSB _u(2)
1022 #define ACCESSCTRL_SRAM7_SU_ACCESS "RW"
1023 // -----------------------------------------------------------------------------
1024 // Field : ACCESSCTRL_SRAM7_NSP
1025 // Description : If 1, SRAM7 can be accessed from a Non-secure, Privileged
1027 #define ACCESSCTRL_SRAM7_NSP_RESET _u(0x1)
1028 #define ACCESSCTRL_SRAM7_NSP_BITS _u(0x00000002)
1029 #define ACCESSCTRL_SRAM7_NSP_MSB _u(1)
1030 #define ACCESSCTRL_SRAM7_NSP_LSB _u(1)
1031 #define ACCESSCTRL_SRAM7_NSP_ACCESS "RW"
1032 // -----------------------------------------------------------------------------
1033 // Field : ACCESSCTRL_SRAM7_NSU
1034 // Description : If 1, and NSP is also set, SRAM7 can be accessed from a Non-
1035 // secure, Unprivileged context.
1037 // This bit is writable from a Non-secure, Privileged context, if
1038 // and only if the NSP bit is set.
1039 #define ACCESSCTRL_SRAM7_NSU_RESET _u(0x1)
1040 #define ACCESSCTRL_SRAM7_NSU_BITS _u(0x00000001)
1041 #define ACCESSCTRL_SRAM7_NSU_MSB _u(0)
1042 #define ACCESSCTRL_SRAM7_NSU_LSB _u(0)
1043 #define ACCESSCTRL_SRAM7_NSU_ACCESS "RW"
1044 // =============================================================================
1045 // Register : ACCESSCTRL_SRAM8
1046 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1047 // SRAM8, and at what security/privilege levels they can do so.
1049 // Defaults to fully open access.
1051 // This register is writable only from a Secure, Privileged
1052 // processor or debugger, with the exception of the NSU bit, which
1053 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1054 #define ACCESSCTRL_SRAM8_OFFSET _u(0x0000003c)
1055 #define ACCESSCTRL_SRAM8_BITS _u(0x000000ff)
1056 #define ACCESSCTRL_SRAM8_RESET _u(0x000000ff)
1057 // -----------------------------------------------------------------------------
1058 // Field : ACCESSCTRL_SRAM8_DBG
1059 // Description : If 1, SRAM8 can be accessed by the debugger, at
1060 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1062 #define ACCESSCTRL_SRAM8_DBG_RESET _u(0x1)
1063 #define ACCESSCTRL_SRAM8_DBG_BITS _u(0x00000080)
1064 #define ACCESSCTRL_SRAM8_DBG_MSB _u(7)
1065 #define ACCESSCTRL_SRAM8_DBG_LSB _u(7)
1066 #define ACCESSCTRL_SRAM8_DBG_ACCESS "RW"
1067 // -----------------------------------------------------------------------------
1068 // Field : ACCESSCTRL_SRAM8_DMA
1069 // Description : If 1, SRAM8 can be accessed by the DMA, at security/privilege
1070 // levels permitted by SP/NSP/SU/NSU in this register.
1071 #define ACCESSCTRL_SRAM8_DMA_RESET _u(0x1)
1072 #define ACCESSCTRL_SRAM8_DMA_BITS _u(0x00000040)
1073 #define ACCESSCTRL_SRAM8_DMA_MSB _u(6)
1074 #define ACCESSCTRL_SRAM8_DMA_LSB _u(6)
1075 #define ACCESSCTRL_SRAM8_DMA_ACCESS "RW"
1076 // -----------------------------------------------------------------------------
1077 // Field : ACCESSCTRL_SRAM8_CORE1
1078 // Description : If 1, SRAM8 can be accessed by core 1, at security/privilege
1079 // levels permitted by SP/NSP/SU/NSU in this register.
1080 #define ACCESSCTRL_SRAM8_CORE1_RESET _u(0x1)
1081 #define ACCESSCTRL_SRAM8_CORE1_BITS _u(0x00000020)
1082 #define ACCESSCTRL_SRAM8_CORE1_MSB _u(5)
1083 #define ACCESSCTRL_SRAM8_CORE1_LSB _u(5)
1084 #define ACCESSCTRL_SRAM8_CORE1_ACCESS "RW"
1085 // -----------------------------------------------------------------------------
1086 // Field : ACCESSCTRL_SRAM8_CORE0
1087 // Description : If 1, SRAM8 can be accessed by core 0, at security/privilege
1088 // levels permitted by SP/NSP/SU/NSU in this register.
1089 #define ACCESSCTRL_SRAM8_CORE0_RESET _u(0x1)
1090 #define ACCESSCTRL_SRAM8_CORE0_BITS _u(0x00000010)
1091 #define ACCESSCTRL_SRAM8_CORE0_MSB _u(4)
1092 #define ACCESSCTRL_SRAM8_CORE0_LSB _u(4)
1093 #define ACCESSCTRL_SRAM8_CORE0_ACCESS "RW"
1094 // -----------------------------------------------------------------------------
1095 // Field : ACCESSCTRL_SRAM8_SP
1096 // Description : If 1, SRAM8 can be accessed from a Secure, Privileged context.
1097 #define ACCESSCTRL_SRAM8_SP_RESET _u(0x1)
1098 #define ACCESSCTRL_SRAM8_SP_BITS _u(0x00000008)
1099 #define ACCESSCTRL_SRAM8_SP_MSB _u(3)
1100 #define ACCESSCTRL_SRAM8_SP_LSB _u(3)
1101 #define ACCESSCTRL_SRAM8_SP_ACCESS "RW"
1102 // -----------------------------------------------------------------------------
1103 // Field : ACCESSCTRL_SRAM8_SU
1104 // Description : If 1, and SP is also set, SRAM8 can be accessed from a Secure,
1105 // Unprivileged context.
1106 #define ACCESSCTRL_SRAM8_SU_RESET _u(0x1)
1107 #define ACCESSCTRL_SRAM8_SU_BITS _u(0x00000004)
1108 #define ACCESSCTRL_SRAM8_SU_MSB _u(2)
1109 #define ACCESSCTRL_SRAM8_SU_LSB _u(2)
1110 #define ACCESSCTRL_SRAM8_SU_ACCESS "RW"
1111 // -----------------------------------------------------------------------------
1112 // Field : ACCESSCTRL_SRAM8_NSP
1113 // Description : If 1, SRAM8 can be accessed from a Non-secure, Privileged
1115 #define ACCESSCTRL_SRAM8_NSP_RESET _u(0x1)
1116 #define ACCESSCTRL_SRAM8_NSP_BITS _u(0x00000002)
1117 #define ACCESSCTRL_SRAM8_NSP_MSB _u(1)
1118 #define ACCESSCTRL_SRAM8_NSP_LSB _u(1)
1119 #define ACCESSCTRL_SRAM8_NSP_ACCESS "RW"
1120 // -----------------------------------------------------------------------------
1121 // Field : ACCESSCTRL_SRAM8_NSU
1122 // Description : If 1, and NSP is also set, SRAM8 can be accessed from a Non-
1123 // secure, Unprivileged context.
1125 // This bit is writable from a Non-secure, Privileged context, if
1126 // and only if the NSP bit is set.
1127 #define ACCESSCTRL_SRAM8_NSU_RESET _u(0x1)
1128 #define ACCESSCTRL_SRAM8_NSU_BITS _u(0x00000001)
1129 #define ACCESSCTRL_SRAM8_NSU_MSB _u(0)
1130 #define ACCESSCTRL_SRAM8_NSU_LSB _u(0)
1131 #define ACCESSCTRL_SRAM8_NSU_ACCESS "RW"
1132 // =============================================================================
1133 // Register : ACCESSCTRL_SRAM9
1134 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1135 // SRAM9, and at what security/privilege levels they can do so.
1137 // Defaults to fully open access.
1139 // This register is writable only from a Secure, Privileged
1140 // processor or debugger, with the exception of the NSU bit, which
1141 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1142 #define ACCESSCTRL_SRAM9_OFFSET _u(0x00000040)
1143 #define ACCESSCTRL_SRAM9_BITS _u(0x000000ff)
1144 #define ACCESSCTRL_SRAM9_RESET _u(0x000000ff)
1145 // -----------------------------------------------------------------------------
1146 // Field : ACCESSCTRL_SRAM9_DBG
1147 // Description : If 1, SRAM9 can be accessed by the debugger, at
1148 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1150 #define ACCESSCTRL_SRAM9_DBG_RESET _u(0x1)
1151 #define ACCESSCTRL_SRAM9_DBG_BITS _u(0x00000080)
1152 #define ACCESSCTRL_SRAM9_DBG_MSB _u(7)
1153 #define ACCESSCTRL_SRAM9_DBG_LSB _u(7)
1154 #define ACCESSCTRL_SRAM9_DBG_ACCESS "RW"
1155 // -----------------------------------------------------------------------------
1156 // Field : ACCESSCTRL_SRAM9_DMA
1157 // Description : If 1, SRAM9 can be accessed by the DMA, at security/privilege
1158 // levels permitted by SP/NSP/SU/NSU in this register.
1159 #define ACCESSCTRL_SRAM9_DMA_RESET _u(0x1)
1160 #define ACCESSCTRL_SRAM9_DMA_BITS _u(0x00000040)
1161 #define ACCESSCTRL_SRAM9_DMA_MSB _u(6)
1162 #define ACCESSCTRL_SRAM9_DMA_LSB _u(6)
1163 #define ACCESSCTRL_SRAM9_DMA_ACCESS "RW"
1164 // -----------------------------------------------------------------------------
1165 // Field : ACCESSCTRL_SRAM9_CORE1
1166 // Description : If 1, SRAM9 can be accessed by core 1, at security/privilege
1167 // levels permitted by SP/NSP/SU/NSU in this register.
1168 #define ACCESSCTRL_SRAM9_CORE1_RESET _u(0x1)
1169 #define ACCESSCTRL_SRAM9_CORE1_BITS _u(0x00000020)
1170 #define ACCESSCTRL_SRAM9_CORE1_MSB _u(5)
1171 #define ACCESSCTRL_SRAM9_CORE1_LSB _u(5)
1172 #define ACCESSCTRL_SRAM9_CORE1_ACCESS "RW"
1173 // -----------------------------------------------------------------------------
1174 // Field : ACCESSCTRL_SRAM9_CORE0
1175 // Description : If 1, SRAM9 can be accessed by core 0, at security/privilege
1176 // levels permitted by SP/NSP/SU/NSU in this register.
1177 #define ACCESSCTRL_SRAM9_CORE0_RESET _u(0x1)
1178 #define ACCESSCTRL_SRAM9_CORE0_BITS _u(0x00000010)
1179 #define ACCESSCTRL_SRAM9_CORE0_MSB _u(4)
1180 #define ACCESSCTRL_SRAM9_CORE0_LSB _u(4)
1181 #define ACCESSCTRL_SRAM9_CORE0_ACCESS "RW"
1182 // -----------------------------------------------------------------------------
1183 // Field : ACCESSCTRL_SRAM9_SP
1184 // Description : If 1, SRAM9 can be accessed from a Secure, Privileged context.
1185 #define ACCESSCTRL_SRAM9_SP_RESET _u(0x1)
1186 #define ACCESSCTRL_SRAM9_SP_BITS _u(0x00000008)
1187 #define ACCESSCTRL_SRAM9_SP_MSB _u(3)
1188 #define ACCESSCTRL_SRAM9_SP_LSB _u(3)
1189 #define ACCESSCTRL_SRAM9_SP_ACCESS "RW"
1190 // -----------------------------------------------------------------------------
1191 // Field : ACCESSCTRL_SRAM9_SU
1192 // Description : If 1, and SP is also set, SRAM9 can be accessed from a Secure,
1193 // Unprivileged context.
1194 #define ACCESSCTRL_SRAM9_SU_RESET _u(0x1)
1195 #define ACCESSCTRL_SRAM9_SU_BITS _u(0x00000004)
1196 #define ACCESSCTRL_SRAM9_SU_MSB _u(2)
1197 #define ACCESSCTRL_SRAM9_SU_LSB _u(2)
1198 #define ACCESSCTRL_SRAM9_SU_ACCESS "RW"
1199 // -----------------------------------------------------------------------------
1200 // Field : ACCESSCTRL_SRAM9_NSP
1201 // Description : If 1, SRAM9 can be accessed from a Non-secure, Privileged
1203 #define ACCESSCTRL_SRAM9_NSP_RESET _u(0x1)
1204 #define ACCESSCTRL_SRAM9_NSP_BITS _u(0x00000002)
1205 #define ACCESSCTRL_SRAM9_NSP_MSB _u(1)
1206 #define ACCESSCTRL_SRAM9_NSP_LSB _u(1)
1207 #define ACCESSCTRL_SRAM9_NSP_ACCESS "RW"
1208 // -----------------------------------------------------------------------------
1209 // Field : ACCESSCTRL_SRAM9_NSU
1210 // Description : If 1, and NSP is also set, SRAM9 can be accessed from a Non-
1211 // secure, Unprivileged context.
1213 // This bit is writable from a Non-secure, Privileged context, if
1214 // and only if the NSP bit is set.
1215 #define ACCESSCTRL_SRAM9_NSU_RESET _u(0x1)
1216 #define ACCESSCTRL_SRAM9_NSU_BITS _u(0x00000001)
1217 #define ACCESSCTRL_SRAM9_NSU_MSB _u(0)
1218 #define ACCESSCTRL_SRAM9_NSU_LSB _u(0)
1219 #define ACCESSCTRL_SRAM9_NSU_ACCESS "RW"
1220 // =============================================================================
1221 // Register : ACCESSCTRL_DMA
1222 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1223 // DMA, and at what security/privilege levels they can do so.
1225 // Defaults to Secure access from any master.
1227 // This register is writable only from a Secure, Privileged
1228 // processor or debugger, with the exception of the NSU bit, which
1229 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1230 #define ACCESSCTRL_DMA_OFFSET _u(0x00000044)
1231 #define ACCESSCTRL_DMA_BITS _u(0x000000ff)
1232 #define ACCESSCTRL_DMA_RESET _u(0x000000fc)
1233 // -----------------------------------------------------------------------------
1234 // Field : ACCESSCTRL_DMA_DBG
1235 // Description : If 1, DMA can be accessed by the debugger, at
1236 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1238 #define ACCESSCTRL_DMA_DBG_RESET _u(0x1)
1239 #define ACCESSCTRL_DMA_DBG_BITS _u(0x00000080)
1240 #define ACCESSCTRL_DMA_DBG_MSB _u(7)
1241 #define ACCESSCTRL_DMA_DBG_LSB _u(7)
1242 #define ACCESSCTRL_DMA_DBG_ACCESS "RW"
1243 // -----------------------------------------------------------------------------
1244 // Field : ACCESSCTRL_DMA_DMA
1245 // Description : If 1, DMA can be accessed by the DMA, at security/privilege
1246 // levels permitted by SP/NSP/SU/NSU in this register.
1247 #define ACCESSCTRL_DMA_DMA_RESET _u(0x1)
1248 #define ACCESSCTRL_DMA_DMA_BITS _u(0x00000040)
1249 #define ACCESSCTRL_DMA_DMA_MSB _u(6)
1250 #define ACCESSCTRL_DMA_DMA_LSB _u(6)
1251 #define ACCESSCTRL_DMA_DMA_ACCESS "RW"
1252 // -----------------------------------------------------------------------------
1253 // Field : ACCESSCTRL_DMA_CORE1
1254 // Description : If 1, DMA can be accessed by core 1, at security/privilege
1255 // levels permitted by SP/NSP/SU/NSU in this register.
1256 #define ACCESSCTRL_DMA_CORE1_RESET _u(0x1)
1257 #define ACCESSCTRL_DMA_CORE1_BITS _u(0x00000020)
1258 #define ACCESSCTRL_DMA_CORE1_MSB _u(5)
1259 #define ACCESSCTRL_DMA_CORE1_LSB _u(5)
1260 #define ACCESSCTRL_DMA_CORE1_ACCESS "RW"
1261 // -----------------------------------------------------------------------------
1262 // Field : ACCESSCTRL_DMA_CORE0
1263 // Description : If 1, DMA can be accessed by core 0, at security/privilege
1264 // levels permitted by SP/NSP/SU/NSU in this register.
1265 #define ACCESSCTRL_DMA_CORE0_RESET _u(0x1)
1266 #define ACCESSCTRL_DMA_CORE0_BITS _u(0x00000010)
1267 #define ACCESSCTRL_DMA_CORE0_MSB _u(4)
1268 #define ACCESSCTRL_DMA_CORE0_LSB _u(4)
1269 #define ACCESSCTRL_DMA_CORE0_ACCESS "RW"
1270 // -----------------------------------------------------------------------------
1271 // Field : ACCESSCTRL_DMA_SP
1272 // Description : If 1, DMA can be accessed from a Secure, Privileged context.
1273 #define ACCESSCTRL_DMA_SP_RESET _u(0x1)
1274 #define ACCESSCTRL_DMA_SP_BITS _u(0x00000008)
1275 #define ACCESSCTRL_DMA_SP_MSB _u(3)
1276 #define ACCESSCTRL_DMA_SP_LSB _u(3)
1277 #define ACCESSCTRL_DMA_SP_ACCESS "RW"
1278 // -----------------------------------------------------------------------------
1279 // Field : ACCESSCTRL_DMA_SU
1280 // Description : If 1, and SP is also set, DMA can be accessed from a Secure,
1281 // Unprivileged context.
1282 #define ACCESSCTRL_DMA_SU_RESET _u(0x1)
1283 #define ACCESSCTRL_DMA_SU_BITS _u(0x00000004)
1284 #define ACCESSCTRL_DMA_SU_MSB _u(2)
1285 #define ACCESSCTRL_DMA_SU_LSB _u(2)
1286 #define ACCESSCTRL_DMA_SU_ACCESS "RW"
1287 // -----------------------------------------------------------------------------
1288 // Field : ACCESSCTRL_DMA_NSP
1289 // Description : If 1, DMA can be accessed from a Non-secure, Privileged
1291 #define ACCESSCTRL_DMA_NSP_RESET _u(0x0)
1292 #define ACCESSCTRL_DMA_NSP_BITS _u(0x00000002)
1293 #define ACCESSCTRL_DMA_NSP_MSB _u(1)
1294 #define ACCESSCTRL_DMA_NSP_LSB _u(1)
1295 #define ACCESSCTRL_DMA_NSP_ACCESS "RW"
1296 // -----------------------------------------------------------------------------
1297 // Field : ACCESSCTRL_DMA_NSU
1298 // Description : If 1, and NSP is also set, DMA can be accessed from a Non-
1299 // secure, Unprivileged context.
1301 // This bit is writable from a Non-secure, Privileged context, if
1302 // and only if the NSP bit is set.
1303 #define ACCESSCTRL_DMA_NSU_RESET _u(0x0)
1304 #define ACCESSCTRL_DMA_NSU_BITS _u(0x00000001)
1305 #define ACCESSCTRL_DMA_NSU_MSB _u(0)
1306 #define ACCESSCTRL_DMA_NSU_LSB _u(0)
1307 #define ACCESSCTRL_DMA_NSU_ACCESS "RW"
1308 // =============================================================================
1309 // Register : ACCESSCTRL_USBCTRL
1310 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1311 // USBCTRL, and at what security/privilege levels they can do so.
1313 // Defaults to Secure access from any master.
1315 // This register is writable only from a Secure, Privileged
1316 // processor or debugger, with the exception of the NSU bit, which
1317 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1318 #define ACCESSCTRL_USBCTRL_OFFSET _u(0x00000048)
1319 #define ACCESSCTRL_USBCTRL_BITS _u(0x000000ff)
1320 #define ACCESSCTRL_USBCTRL_RESET _u(0x000000fc)
1321 // -----------------------------------------------------------------------------
1322 // Field : ACCESSCTRL_USBCTRL_DBG
1323 // Description : If 1, USBCTRL can be accessed by the debugger, at
1324 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1326 #define ACCESSCTRL_USBCTRL_DBG_RESET _u(0x1)
1327 #define ACCESSCTRL_USBCTRL_DBG_BITS _u(0x00000080)
1328 #define ACCESSCTRL_USBCTRL_DBG_MSB _u(7)
1329 #define ACCESSCTRL_USBCTRL_DBG_LSB _u(7)
1330 #define ACCESSCTRL_USBCTRL_DBG_ACCESS "RW"
1331 // -----------------------------------------------------------------------------
1332 // Field : ACCESSCTRL_USBCTRL_DMA
1333 // Description : If 1, USBCTRL can be accessed by the DMA, at security/privilege
1334 // levels permitted by SP/NSP/SU/NSU in this register.
1335 #define ACCESSCTRL_USBCTRL_DMA_RESET _u(0x1)
1336 #define ACCESSCTRL_USBCTRL_DMA_BITS _u(0x00000040)
1337 #define ACCESSCTRL_USBCTRL_DMA_MSB _u(6)
1338 #define ACCESSCTRL_USBCTRL_DMA_LSB _u(6)
1339 #define ACCESSCTRL_USBCTRL_DMA_ACCESS "RW"
1340 // -----------------------------------------------------------------------------
1341 // Field : ACCESSCTRL_USBCTRL_CORE1
1342 // Description : If 1, USBCTRL can be accessed by core 1, at security/privilege
1343 // levels permitted by SP/NSP/SU/NSU in this register.
1344 #define ACCESSCTRL_USBCTRL_CORE1_RESET _u(0x1)
1345 #define ACCESSCTRL_USBCTRL_CORE1_BITS _u(0x00000020)
1346 #define ACCESSCTRL_USBCTRL_CORE1_MSB _u(5)
1347 #define ACCESSCTRL_USBCTRL_CORE1_LSB _u(5)
1348 #define ACCESSCTRL_USBCTRL_CORE1_ACCESS "RW"
1349 // -----------------------------------------------------------------------------
1350 // Field : ACCESSCTRL_USBCTRL_CORE0
1351 // Description : If 1, USBCTRL can be accessed by core 0, at security/privilege
1352 // levels permitted by SP/NSP/SU/NSU in this register.
1353 #define ACCESSCTRL_USBCTRL_CORE0_RESET _u(0x1)
1354 #define ACCESSCTRL_USBCTRL_CORE0_BITS _u(0x00000010)
1355 #define ACCESSCTRL_USBCTRL_CORE0_MSB _u(4)
1356 #define ACCESSCTRL_USBCTRL_CORE0_LSB _u(4)
1357 #define ACCESSCTRL_USBCTRL_CORE0_ACCESS "RW"
1358 // -----------------------------------------------------------------------------
1359 // Field : ACCESSCTRL_USBCTRL_SP
1360 // Description : If 1, USBCTRL can be accessed from a Secure, Privileged
1362 #define ACCESSCTRL_USBCTRL_SP_RESET _u(0x1)
1363 #define ACCESSCTRL_USBCTRL_SP_BITS _u(0x00000008)
1364 #define ACCESSCTRL_USBCTRL_SP_MSB _u(3)
1365 #define ACCESSCTRL_USBCTRL_SP_LSB _u(3)
1366 #define ACCESSCTRL_USBCTRL_SP_ACCESS "RW"
1367 // -----------------------------------------------------------------------------
1368 // Field : ACCESSCTRL_USBCTRL_SU
1369 // Description : If 1, and SP is also set, USBCTRL can be accessed from a
1370 // Secure, Unprivileged context.
1371 #define ACCESSCTRL_USBCTRL_SU_RESET _u(0x1)
1372 #define ACCESSCTRL_USBCTRL_SU_BITS _u(0x00000004)
1373 #define ACCESSCTRL_USBCTRL_SU_MSB _u(2)
1374 #define ACCESSCTRL_USBCTRL_SU_LSB _u(2)
1375 #define ACCESSCTRL_USBCTRL_SU_ACCESS "RW"
1376 // -----------------------------------------------------------------------------
1377 // Field : ACCESSCTRL_USBCTRL_NSP
1378 // Description : If 1, USBCTRL can be accessed from a Non-secure, Privileged
1380 #define ACCESSCTRL_USBCTRL_NSP_RESET _u(0x0)
1381 #define ACCESSCTRL_USBCTRL_NSP_BITS _u(0x00000002)
1382 #define ACCESSCTRL_USBCTRL_NSP_MSB _u(1)
1383 #define ACCESSCTRL_USBCTRL_NSP_LSB _u(1)
1384 #define ACCESSCTRL_USBCTRL_NSP_ACCESS "RW"
1385 // -----------------------------------------------------------------------------
1386 // Field : ACCESSCTRL_USBCTRL_NSU
1387 // Description : If 1, and NSP is also set, USBCTRL can be accessed from a Non-
1388 // secure, Unprivileged context.
1390 // This bit is writable from a Non-secure, Privileged context, if
1391 // and only if the NSP bit is set.
1392 #define ACCESSCTRL_USBCTRL_NSU_RESET _u(0x0)
1393 #define ACCESSCTRL_USBCTRL_NSU_BITS _u(0x00000001)
1394 #define ACCESSCTRL_USBCTRL_NSU_MSB _u(0)
1395 #define ACCESSCTRL_USBCTRL_NSU_LSB _u(0)
1396 #define ACCESSCTRL_USBCTRL_NSU_ACCESS "RW"
1397 // =============================================================================
1398 // Register : ACCESSCTRL_PIO0
1399 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1400 // PIO0, and at what security/privilege levels they can do so.
1402 // Defaults to Secure access from any master.
1404 // This register is writable only from a Secure, Privileged
1405 // processor or debugger, with the exception of the NSU bit, which
1406 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1407 #define ACCESSCTRL_PIO0_OFFSET _u(0x0000004c)
1408 #define ACCESSCTRL_PIO0_BITS _u(0x000000ff)
1409 #define ACCESSCTRL_PIO0_RESET _u(0x000000fc)
1410 // -----------------------------------------------------------------------------
1411 // Field : ACCESSCTRL_PIO0_DBG
1412 // Description : If 1, PIO0 can be accessed by the debugger, at
1413 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1415 #define ACCESSCTRL_PIO0_DBG_RESET _u(0x1)
1416 #define ACCESSCTRL_PIO0_DBG_BITS _u(0x00000080)
1417 #define ACCESSCTRL_PIO0_DBG_MSB _u(7)
1418 #define ACCESSCTRL_PIO0_DBG_LSB _u(7)
1419 #define ACCESSCTRL_PIO0_DBG_ACCESS "RW"
1420 // -----------------------------------------------------------------------------
1421 // Field : ACCESSCTRL_PIO0_DMA
1422 // Description : If 1, PIO0 can be accessed by the DMA, at security/privilege
1423 // levels permitted by SP/NSP/SU/NSU in this register.
1424 #define ACCESSCTRL_PIO0_DMA_RESET _u(0x1)
1425 #define ACCESSCTRL_PIO0_DMA_BITS _u(0x00000040)
1426 #define ACCESSCTRL_PIO0_DMA_MSB _u(6)
1427 #define ACCESSCTRL_PIO0_DMA_LSB _u(6)
1428 #define ACCESSCTRL_PIO0_DMA_ACCESS "RW"
1429 // -----------------------------------------------------------------------------
1430 // Field : ACCESSCTRL_PIO0_CORE1
1431 // Description : If 1, PIO0 can be accessed by core 1, at security/privilege
1432 // levels permitted by SP/NSP/SU/NSU in this register.
1433 #define ACCESSCTRL_PIO0_CORE1_RESET _u(0x1)
1434 #define ACCESSCTRL_PIO0_CORE1_BITS _u(0x00000020)
1435 #define ACCESSCTRL_PIO0_CORE1_MSB _u(5)
1436 #define ACCESSCTRL_PIO0_CORE1_LSB _u(5)
1437 #define ACCESSCTRL_PIO0_CORE1_ACCESS "RW"
1438 // -----------------------------------------------------------------------------
1439 // Field : ACCESSCTRL_PIO0_CORE0
1440 // Description : If 1, PIO0 can be accessed by core 0, at security/privilege
1441 // levels permitted by SP/NSP/SU/NSU in this register.
1442 #define ACCESSCTRL_PIO0_CORE0_RESET _u(0x1)
1443 #define ACCESSCTRL_PIO0_CORE0_BITS _u(0x00000010)
1444 #define ACCESSCTRL_PIO0_CORE0_MSB _u(4)
1445 #define ACCESSCTRL_PIO0_CORE0_LSB _u(4)
1446 #define ACCESSCTRL_PIO0_CORE0_ACCESS "RW"
1447 // -----------------------------------------------------------------------------
1448 // Field : ACCESSCTRL_PIO0_SP
1449 // Description : If 1, PIO0 can be accessed from a Secure, Privileged context.
1450 #define ACCESSCTRL_PIO0_SP_RESET _u(0x1)
1451 #define ACCESSCTRL_PIO0_SP_BITS _u(0x00000008)
1452 #define ACCESSCTRL_PIO0_SP_MSB _u(3)
1453 #define ACCESSCTRL_PIO0_SP_LSB _u(3)
1454 #define ACCESSCTRL_PIO0_SP_ACCESS "RW"
1455 // -----------------------------------------------------------------------------
1456 // Field : ACCESSCTRL_PIO0_SU
1457 // Description : If 1, and SP is also set, PIO0 can be accessed from a Secure,
1458 // Unprivileged context.
1459 #define ACCESSCTRL_PIO0_SU_RESET _u(0x1)
1460 #define ACCESSCTRL_PIO0_SU_BITS _u(0x00000004)
1461 #define ACCESSCTRL_PIO0_SU_MSB _u(2)
1462 #define ACCESSCTRL_PIO0_SU_LSB _u(2)
1463 #define ACCESSCTRL_PIO0_SU_ACCESS "RW"
1464 // -----------------------------------------------------------------------------
1465 // Field : ACCESSCTRL_PIO0_NSP
1466 // Description : If 1, PIO0 can be accessed from a Non-secure, Privileged
1468 #define ACCESSCTRL_PIO0_NSP_RESET _u(0x0)
1469 #define ACCESSCTRL_PIO0_NSP_BITS _u(0x00000002)
1470 #define ACCESSCTRL_PIO0_NSP_MSB _u(1)
1471 #define ACCESSCTRL_PIO0_NSP_LSB _u(1)
1472 #define ACCESSCTRL_PIO0_NSP_ACCESS "RW"
1473 // -----------------------------------------------------------------------------
1474 // Field : ACCESSCTRL_PIO0_NSU
1475 // Description : If 1, and NSP is also set, PIO0 can be accessed from a Non-
1476 // secure, Unprivileged context.
1478 // This bit is writable from a Non-secure, Privileged context, if
1479 // and only if the NSP bit is set.
1480 #define ACCESSCTRL_PIO0_NSU_RESET _u(0x0)
1481 #define ACCESSCTRL_PIO0_NSU_BITS _u(0x00000001)
1482 #define ACCESSCTRL_PIO0_NSU_MSB _u(0)
1483 #define ACCESSCTRL_PIO0_NSU_LSB _u(0)
1484 #define ACCESSCTRL_PIO0_NSU_ACCESS "RW"
1485 // =============================================================================
1486 // Register : ACCESSCTRL_PIO1
1487 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1488 // PIO1, and at what security/privilege levels they can do so.
1490 // Defaults to Secure access from any master.
1492 // This register is writable only from a Secure, Privileged
1493 // processor or debugger, with the exception of the NSU bit, which
1494 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1495 #define ACCESSCTRL_PIO1_OFFSET _u(0x00000050)
1496 #define ACCESSCTRL_PIO1_BITS _u(0x000000ff)
1497 #define ACCESSCTRL_PIO1_RESET _u(0x000000fc)
1498 // -----------------------------------------------------------------------------
1499 // Field : ACCESSCTRL_PIO1_DBG
1500 // Description : If 1, PIO1 can be accessed by the debugger, at
1501 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1503 #define ACCESSCTRL_PIO1_DBG_RESET _u(0x1)
1504 #define ACCESSCTRL_PIO1_DBG_BITS _u(0x00000080)
1505 #define ACCESSCTRL_PIO1_DBG_MSB _u(7)
1506 #define ACCESSCTRL_PIO1_DBG_LSB _u(7)
1507 #define ACCESSCTRL_PIO1_DBG_ACCESS "RW"
1508 // -----------------------------------------------------------------------------
1509 // Field : ACCESSCTRL_PIO1_DMA
1510 // Description : If 1, PIO1 can be accessed by the DMA, at security/privilege
1511 // levels permitted by SP/NSP/SU/NSU in this register.
1512 #define ACCESSCTRL_PIO1_DMA_RESET _u(0x1)
1513 #define ACCESSCTRL_PIO1_DMA_BITS _u(0x00000040)
1514 #define ACCESSCTRL_PIO1_DMA_MSB _u(6)
1515 #define ACCESSCTRL_PIO1_DMA_LSB _u(6)
1516 #define ACCESSCTRL_PIO1_DMA_ACCESS "RW"
1517 // -----------------------------------------------------------------------------
1518 // Field : ACCESSCTRL_PIO1_CORE1
1519 // Description : If 1, PIO1 can be accessed by core 1, at security/privilege
1520 // levels permitted by SP/NSP/SU/NSU in this register.
1521 #define ACCESSCTRL_PIO1_CORE1_RESET _u(0x1)
1522 #define ACCESSCTRL_PIO1_CORE1_BITS _u(0x00000020)
1523 #define ACCESSCTRL_PIO1_CORE1_MSB _u(5)
1524 #define ACCESSCTRL_PIO1_CORE1_LSB _u(5)
1525 #define ACCESSCTRL_PIO1_CORE1_ACCESS "RW"
1526 // -----------------------------------------------------------------------------
1527 // Field : ACCESSCTRL_PIO1_CORE0
1528 // Description : If 1, PIO1 can be accessed by core 0, at security/privilege
1529 // levels permitted by SP/NSP/SU/NSU in this register.
1530 #define ACCESSCTRL_PIO1_CORE0_RESET _u(0x1)
1531 #define ACCESSCTRL_PIO1_CORE0_BITS _u(0x00000010)
1532 #define ACCESSCTRL_PIO1_CORE0_MSB _u(4)
1533 #define ACCESSCTRL_PIO1_CORE0_LSB _u(4)
1534 #define ACCESSCTRL_PIO1_CORE0_ACCESS "RW"
1535 // -----------------------------------------------------------------------------
1536 // Field : ACCESSCTRL_PIO1_SP
1537 // Description : If 1, PIO1 can be accessed from a Secure, Privileged context.
1538 #define ACCESSCTRL_PIO1_SP_RESET _u(0x1)
1539 #define ACCESSCTRL_PIO1_SP_BITS _u(0x00000008)
1540 #define ACCESSCTRL_PIO1_SP_MSB _u(3)
1541 #define ACCESSCTRL_PIO1_SP_LSB _u(3)
1542 #define ACCESSCTRL_PIO1_SP_ACCESS "RW"
1543 // -----------------------------------------------------------------------------
1544 // Field : ACCESSCTRL_PIO1_SU
1545 // Description : If 1, and SP is also set, PIO1 can be accessed from a Secure,
1546 // Unprivileged context.
1547 #define ACCESSCTRL_PIO1_SU_RESET _u(0x1)
1548 #define ACCESSCTRL_PIO1_SU_BITS _u(0x00000004)
1549 #define ACCESSCTRL_PIO1_SU_MSB _u(2)
1550 #define ACCESSCTRL_PIO1_SU_LSB _u(2)
1551 #define ACCESSCTRL_PIO1_SU_ACCESS "RW"
1552 // -----------------------------------------------------------------------------
1553 // Field : ACCESSCTRL_PIO1_NSP
1554 // Description : If 1, PIO1 can be accessed from a Non-secure, Privileged
1556 #define ACCESSCTRL_PIO1_NSP_RESET _u(0x0)
1557 #define ACCESSCTRL_PIO1_NSP_BITS _u(0x00000002)
1558 #define ACCESSCTRL_PIO1_NSP_MSB _u(1)
1559 #define ACCESSCTRL_PIO1_NSP_LSB _u(1)
1560 #define ACCESSCTRL_PIO1_NSP_ACCESS "RW"
1561 // -----------------------------------------------------------------------------
1562 // Field : ACCESSCTRL_PIO1_NSU
1563 // Description : If 1, and NSP is also set, PIO1 can be accessed from a Non-
1564 // secure, Unprivileged context.
1566 // This bit is writable from a Non-secure, Privileged context, if
1567 // and only if the NSP bit is set.
1568 #define ACCESSCTRL_PIO1_NSU_RESET _u(0x0)
1569 #define ACCESSCTRL_PIO1_NSU_BITS _u(0x00000001)
1570 #define ACCESSCTRL_PIO1_NSU_MSB _u(0)
1571 #define ACCESSCTRL_PIO1_NSU_LSB _u(0)
1572 #define ACCESSCTRL_PIO1_NSU_ACCESS "RW"
1573 // =============================================================================
1574 // Register : ACCESSCTRL_PIO2
1575 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1576 // PIO2, and at what security/privilege levels they can do so.
1578 // Defaults to Secure access from any master.
1580 // This register is writable only from a Secure, Privileged
1581 // processor or debugger, with the exception of the NSU bit, which
1582 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1583 #define ACCESSCTRL_PIO2_OFFSET _u(0x00000054)
1584 #define ACCESSCTRL_PIO2_BITS _u(0x000000ff)
1585 #define ACCESSCTRL_PIO2_RESET _u(0x000000fc)
1586 // -----------------------------------------------------------------------------
1587 // Field : ACCESSCTRL_PIO2_DBG
1588 // Description : If 1, PIO2 can be accessed by the debugger, at
1589 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1591 #define ACCESSCTRL_PIO2_DBG_RESET _u(0x1)
1592 #define ACCESSCTRL_PIO2_DBG_BITS _u(0x00000080)
1593 #define ACCESSCTRL_PIO2_DBG_MSB _u(7)
1594 #define ACCESSCTRL_PIO2_DBG_LSB _u(7)
1595 #define ACCESSCTRL_PIO2_DBG_ACCESS "RW"
1596 // -----------------------------------------------------------------------------
1597 // Field : ACCESSCTRL_PIO2_DMA
1598 // Description : If 1, PIO2 can be accessed by the DMA, at security/privilege
1599 // levels permitted by SP/NSP/SU/NSU in this register.
1600 #define ACCESSCTRL_PIO2_DMA_RESET _u(0x1)
1601 #define ACCESSCTRL_PIO2_DMA_BITS _u(0x00000040)
1602 #define ACCESSCTRL_PIO2_DMA_MSB _u(6)
1603 #define ACCESSCTRL_PIO2_DMA_LSB _u(6)
1604 #define ACCESSCTRL_PIO2_DMA_ACCESS "RW"
1605 // -----------------------------------------------------------------------------
1606 // Field : ACCESSCTRL_PIO2_CORE1
1607 // Description : If 1, PIO2 can be accessed by core 1, at security/privilege
1608 // levels permitted by SP/NSP/SU/NSU in this register.
1609 #define ACCESSCTRL_PIO2_CORE1_RESET _u(0x1)
1610 #define ACCESSCTRL_PIO2_CORE1_BITS _u(0x00000020)
1611 #define ACCESSCTRL_PIO2_CORE1_MSB _u(5)
1612 #define ACCESSCTRL_PIO2_CORE1_LSB _u(5)
1613 #define ACCESSCTRL_PIO2_CORE1_ACCESS "RW"
1614 // -----------------------------------------------------------------------------
1615 // Field : ACCESSCTRL_PIO2_CORE0
1616 // Description : If 1, PIO2 can be accessed by core 0, at security/privilege
1617 // levels permitted by SP/NSP/SU/NSU in this register.
1618 #define ACCESSCTRL_PIO2_CORE0_RESET _u(0x1)
1619 #define ACCESSCTRL_PIO2_CORE0_BITS _u(0x00000010)
1620 #define ACCESSCTRL_PIO2_CORE0_MSB _u(4)
1621 #define ACCESSCTRL_PIO2_CORE0_LSB _u(4)
1622 #define ACCESSCTRL_PIO2_CORE0_ACCESS "RW"
1623 // -----------------------------------------------------------------------------
1624 // Field : ACCESSCTRL_PIO2_SP
1625 // Description : If 1, PIO2 can be accessed from a Secure, Privileged context.
1626 #define ACCESSCTRL_PIO2_SP_RESET _u(0x1)
1627 #define ACCESSCTRL_PIO2_SP_BITS _u(0x00000008)
1628 #define ACCESSCTRL_PIO2_SP_MSB _u(3)
1629 #define ACCESSCTRL_PIO2_SP_LSB _u(3)
1630 #define ACCESSCTRL_PIO2_SP_ACCESS "RW"
1631 // -----------------------------------------------------------------------------
1632 // Field : ACCESSCTRL_PIO2_SU
1633 // Description : If 1, and SP is also set, PIO2 can be accessed from a Secure,
1634 // Unprivileged context.
1635 #define ACCESSCTRL_PIO2_SU_RESET _u(0x1)
1636 #define ACCESSCTRL_PIO2_SU_BITS _u(0x00000004)
1637 #define ACCESSCTRL_PIO2_SU_MSB _u(2)
1638 #define ACCESSCTRL_PIO2_SU_LSB _u(2)
1639 #define ACCESSCTRL_PIO2_SU_ACCESS "RW"
1640 // -----------------------------------------------------------------------------
1641 // Field : ACCESSCTRL_PIO2_NSP
1642 // Description : If 1, PIO2 can be accessed from a Non-secure, Privileged
1644 #define ACCESSCTRL_PIO2_NSP_RESET _u(0x0)
1645 #define ACCESSCTRL_PIO2_NSP_BITS _u(0x00000002)
1646 #define ACCESSCTRL_PIO2_NSP_MSB _u(1)
1647 #define ACCESSCTRL_PIO2_NSP_LSB _u(1)
1648 #define ACCESSCTRL_PIO2_NSP_ACCESS "RW"
1649 // -----------------------------------------------------------------------------
1650 // Field : ACCESSCTRL_PIO2_NSU
1651 // Description : If 1, and NSP is also set, PIO2 can be accessed from a Non-
1652 // secure, Unprivileged context.
1654 // This bit is writable from a Non-secure, Privileged context, if
1655 // and only if the NSP bit is set.
1656 #define ACCESSCTRL_PIO2_NSU_RESET _u(0x0)
1657 #define ACCESSCTRL_PIO2_NSU_BITS _u(0x00000001)
1658 #define ACCESSCTRL_PIO2_NSU_MSB _u(0)
1659 #define ACCESSCTRL_PIO2_NSU_LSB _u(0)
1660 #define ACCESSCTRL_PIO2_NSU_ACCESS "RW"
1661 // =============================================================================
1662 // Register : ACCESSCTRL_CORESIGHT_TRACE
1663 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1664 // CORESIGHT_TRACE, and at what security/privilege levels they can
1667 // Defaults to Secure, Privileged processor or debug access only.
1669 // This register is writable only from a Secure, Privileged
1670 // processor or debugger, with the exception of the NSU bit, which
1671 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1672 #define ACCESSCTRL_CORESIGHT_TRACE_OFFSET _u(0x00000058)
1673 #define ACCESSCTRL_CORESIGHT_TRACE_BITS _u(0x000000ff)
1674 #define ACCESSCTRL_CORESIGHT_TRACE_RESET _u(0x000000b8)
1675 // -----------------------------------------------------------------------------
1676 // Field : ACCESSCTRL_CORESIGHT_TRACE_DBG
1677 // Description : If 1, CORESIGHT_TRACE can be accessed by the debugger, at
1678 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1680 #define ACCESSCTRL_CORESIGHT_TRACE_DBG_RESET _u(0x1)
1681 #define ACCESSCTRL_CORESIGHT_TRACE_DBG_BITS _u(0x00000080)
1682 #define ACCESSCTRL_CORESIGHT_TRACE_DBG_MSB _u(7)
1683 #define ACCESSCTRL_CORESIGHT_TRACE_DBG_LSB _u(7)
1684 #define ACCESSCTRL_CORESIGHT_TRACE_DBG_ACCESS "RW"
1685 // -----------------------------------------------------------------------------
1686 // Field : ACCESSCTRL_CORESIGHT_TRACE_DMA
1687 // Description : If 1, CORESIGHT_TRACE can be accessed by the DMA, at
1688 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1690 #define ACCESSCTRL_CORESIGHT_TRACE_DMA_RESET _u(0x0)
1691 #define ACCESSCTRL_CORESIGHT_TRACE_DMA_BITS _u(0x00000040)
1692 #define ACCESSCTRL_CORESIGHT_TRACE_DMA_MSB _u(6)
1693 #define ACCESSCTRL_CORESIGHT_TRACE_DMA_LSB _u(6)
1694 #define ACCESSCTRL_CORESIGHT_TRACE_DMA_ACCESS "RW"
1695 // -----------------------------------------------------------------------------
1696 // Field : ACCESSCTRL_CORESIGHT_TRACE_CORE1
1697 // Description : If 1, CORESIGHT_TRACE can be accessed by core 1, at
1698 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1700 #define ACCESSCTRL_CORESIGHT_TRACE_CORE1_RESET _u(0x1)
1701 #define ACCESSCTRL_CORESIGHT_TRACE_CORE1_BITS _u(0x00000020)
1702 #define ACCESSCTRL_CORESIGHT_TRACE_CORE1_MSB _u(5)
1703 #define ACCESSCTRL_CORESIGHT_TRACE_CORE1_LSB _u(5)
1704 #define ACCESSCTRL_CORESIGHT_TRACE_CORE1_ACCESS "RW"
1705 // -----------------------------------------------------------------------------
1706 // Field : ACCESSCTRL_CORESIGHT_TRACE_CORE0
1707 // Description : If 1, CORESIGHT_TRACE can be accessed by core 0, at
1708 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1710 #define ACCESSCTRL_CORESIGHT_TRACE_CORE0_RESET _u(0x1)
1711 #define ACCESSCTRL_CORESIGHT_TRACE_CORE0_BITS _u(0x00000010)
1712 #define ACCESSCTRL_CORESIGHT_TRACE_CORE0_MSB _u(4)
1713 #define ACCESSCTRL_CORESIGHT_TRACE_CORE0_LSB _u(4)
1714 #define ACCESSCTRL_CORESIGHT_TRACE_CORE0_ACCESS "RW"
1715 // -----------------------------------------------------------------------------
1716 // Field : ACCESSCTRL_CORESIGHT_TRACE_SP
1717 // Description : If 1, CORESIGHT_TRACE can be accessed from a Secure, Privileged
1719 #define ACCESSCTRL_CORESIGHT_TRACE_SP_RESET _u(0x1)
1720 #define ACCESSCTRL_CORESIGHT_TRACE_SP_BITS _u(0x00000008)
1721 #define ACCESSCTRL_CORESIGHT_TRACE_SP_MSB _u(3)
1722 #define ACCESSCTRL_CORESIGHT_TRACE_SP_LSB _u(3)
1723 #define ACCESSCTRL_CORESIGHT_TRACE_SP_ACCESS "RW"
1724 // -----------------------------------------------------------------------------
1725 // Field : ACCESSCTRL_CORESIGHT_TRACE_SU
1726 // Description : If 1, and SP is also set, CORESIGHT_TRACE can be accessed from
1727 // a Secure, Unprivileged context.
1728 #define ACCESSCTRL_CORESIGHT_TRACE_SU_RESET _u(0x0)
1729 #define ACCESSCTRL_CORESIGHT_TRACE_SU_BITS _u(0x00000004)
1730 #define ACCESSCTRL_CORESIGHT_TRACE_SU_MSB _u(2)
1731 #define ACCESSCTRL_CORESIGHT_TRACE_SU_LSB _u(2)
1732 #define ACCESSCTRL_CORESIGHT_TRACE_SU_ACCESS "RW"
1733 // -----------------------------------------------------------------------------
1734 // Field : ACCESSCTRL_CORESIGHT_TRACE_NSP
1735 // Description : If 1, CORESIGHT_TRACE can be accessed from a Non-secure,
1736 // Privileged context.
1737 #define ACCESSCTRL_CORESIGHT_TRACE_NSP_RESET _u(0x0)
1738 #define ACCESSCTRL_CORESIGHT_TRACE_NSP_BITS _u(0x00000002)
1739 #define ACCESSCTRL_CORESIGHT_TRACE_NSP_MSB _u(1)
1740 #define ACCESSCTRL_CORESIGHT_TRACE_NSP_LSB _u(1)
1741 #define ACCESSCTRL_CORESIGHT_TRACE_NSP_ACCESS "RW"
1742 // -----------------------------------------------------------------------------
1743 // Field : ACCESSCTRL_CORESIGHT_TRACE_NSU
1744 // Description : If 1, and NSP is also set, CORESIGHT_TRACE can be accessed from
1745 // a Non-secure, Unprivileged context.
1747 // This bit is writable from a Non-secure, Privileged context, if
1748 // and only if the NSP bit is set.
1749 #define ACCESSCTRL_CORESIGHT_TRACE_NSU_RESET _u(0x0)
1750 #define ACCESSCTRL_CORESIGHT_TRACE_NSU_BITS _u(0x00000001)
1751 #define ACCESSCTRL_CORESIGHT_TRACE_NSU_MSB _u(0)
1752 #define ACCESSCTRL_CORESIGHT_TRACE_NSU_LSB _u(0)
1753 #define ACCESSCTRL_CORESIGHT_TRACE_NSU_ACCESS "RW"
1754 // =============================================================================
1755 // Register : ACCESSCTRL_CORESIGHT_PERIPH
1756 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1757 // CORESIGHT_PERIPH, and at what security/privilege levels they
1760 // Defaults to Secure, Privileged processor or debug access only.
1762 // This register is writable only from a Secure, Privileged
1763 // processor or debugger, with the exception of the NSU bit, which
1764 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1765 #define ACCESSCTRL_CORESIGHT_PERIPH_OFFSET _u(0x0000005c)
1766 #define ACCESSCTRL_CORESIGHT_PERIPH_BITS _u(0x000000ff)
1767 #define ACCESSCTRL_CORESIGHT_PERIPH_RESET _u(0x000000b8)
1768 // -----------------------------------------------------------------------------
1769 // Field : ACCESSCTRL_CORESIGHT_PERIPH_DBG
1770 // Description : If 1, CORESIGHT_PERIPH can be accessed by the debugger, at
1771 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1773 #define ACCESSCTRL_CORESIGHT_PERIPH_DBG_RESET _u(0x1)
1774 #define ACCESSCTRL_CORESIGHT_PERIPH_DBG_BITS _u(0x00000080)
1775 #define ACCESSCTRL_CORESIGHT_PERIPH_DBG_MSB _u(7)
1776 #define ACCESSCTRL_CORESIGHT_PERIPH_DBG_LSB _u(7)
1777 #define ACCESSCTRL_CORESIGHT_PERIPH_DBG_ACCESS "RW"
1778 // -----------------------------------------------------------------------------
1779 // Field : ACCESSCTRL_CORESIGHT_PERIPH_DMA
1780 // Description : If 1, CORESIGHT_PERIPH can be accessed by the DMA, at
1781 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1783 #define ACCESSCTRL_CORESIGHT_PERIPH_DMA_RESET _u(0x0)
1784 #define ACCESSCTRL_CORESIGHT_PERIPH_DMA_BITS _u(0x00000040)
1785 #define ACCESSCTRL_CORESIGHT_PERIPH_DMA_MSB _u(6)
1786 #define ACCESSCTRL_CORESIGHT_PERIPH_DMA_LSB _u(6)
1787 #define ACCESSCTRL_CORESIGHT_PERIPH_DMA_ACCESS "RW"
1788 // -----------------------------------------------------------------------------
1789 // Field : ACCESSCTRL_CORESIGHT_PERIPH_CORE1
1790 // Description : If 1, CORESIGHT_PERIPH can be accessed by core 1, at
1791 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1793 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE1_RESET _u(0x1)
1794 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE1_BITS _u(0x00000020)
1795 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE1_MSB _u(5)
1796 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE1_LSB _u(5)
1797 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE1_ACCESS "RW"
1798 // -----------------------------------------------------------------------------
1799 // Field : ACCESSCTRL_CORESIGHT_PERIPH_CORE0
1800 // Description : If 1, CORESIGHT_PERIPH can be accessed by core 0, at
1801 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1803 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE0_RESET _u(0x1)
1804 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE0_BITS _u(0x00000010)
1805 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE0_MSB _u(4)
1806 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE0_LSB _u(4)
1807 #define ACCESSCTRL_CORESIGHT_PERIPH_CORE0_ACCESS "RW"
1808 // -----------------------------------------------------------------------------
1809 // Field : ACCESSCTRL_CORESIGHT_PERIPH_SP
1810 // Description : If 1, CORESIGHT_PERIPH can be accessed from a Secure,
1811 // Privileged context.
1812 #define ACCESSCTRL_CORESIGHT_PERIPH_SP_RESET _u(0x1)
1813 #define ACCESSCTRL_CORESIGHT_PERIPH_SP_BITS _u(0x00000008)
1814 #define ACCESSCTRL_CORESIGHT_PERIPH_SP_MSB _u(3)
1815 #define ACCESSCTRL_CORESIGHT_PERIPH_SP_LSB _u(3)
1816 #define ACCESSCTRL_CORESIGHT_PERIPH_SP_ACCESS "RW"
1817 // -----------------------------------------------------------------------------
1818 // Field : ACCESSCTRL_CORESIGHT_PERIPH_SU
1819 // Description : If 1, and SP is also set, CORESIGHT_PERIPH can be accessed from
1820 // a Secure, Unprivileged context.
1821 #define ACCESSCTRL_CORESIGHT_PERIPH_SU_RESET _u(0x0)
1822 #define ACCESSCTRL_CORESIGHT_PERIPH_SU_BITS _u(0x00000004)
1823 #define ACCESSCTRL_CORESIGHT_PERIPH_SU_MSB _u(2)
1824 #define ACCESSCTRL_CORESIGHT_PERIPH_SU_LSB _u(2)
1825 #define ACCESSCTRL_CORESIGHT_PERIPH_SU_ACCESS "RW"
1826 // -----------------------------------------------------------------------------
1827 // Field : ACCESSCTRL_CORESIGHT_PERIPH_NSP
1828 // Description : If 1, CORESIGHT_PERIPH can be accessed from a Non-secure,
1829 // Privileged context.
1830 #define ACCESSCTRL_CORESIGHT_PERIPH_NSP_RESET _u(0x0)
1831 #define ACCESSCTRL_CORESIGHT_PERIPH_NSP_BITS _u(0x00000002)
1832 #define ACCESSCTRL_CORESIGHT_PERIPH_NSP_MSB _u(1)
1833 #define ACCESSCTRL_CORESIGHT_PERIPH_NSP_LSB _u(1)
1834 #define ACCESSCTRL_CORESIGHT_PERIPH_NSP_ACCESS "RW"
1835 // -----------------------------------------------------------------------------
1836 // Field : ACCESSCTRL_CORESIGHT_PERIPH_NSU
1837 // Description : If 1, and NSP is also set, CORESIGHT_PERIPH can be accessed
1838 // from a Non-secure, Unprivileged context.
1840 // This bit is writable from a Non-secure, Privileged context, if
1841 // and only if the NSP bit is set.
1842 #define ACCESSCTRL_CORESIGHT_PERIPH_NSU_RESET _u(0x0)
1843 #define ACCESSCTRL_CORESIGHT_PERIPH_NSU_BITS _u(0x00000001)
1844 #define ACCESSCTRL_CORESIGHT_PERIPH_NSU_MSB _u(0)
1845 #define ACCESSCTRL_CORESIGHT_PERIPH_NSU_LSB _u(0)
1846 #define ACCESSCTRL_CORESIGHT_PERIPH_NSU_ACCESS "RW"
1847 // =============================================================================
1848 // Register : ACCESSCTRL_SYSINFO
1849 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1850 // SYSINFO, and at what security/privilege levels they can do so.
1852 // Defaults to fully open access.
1854 // This register is writable only from a Secure, Privileged
1855 // processor or debugger, with the exception of the NSU bit, which
1856 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1857 #define ACCESSCTRL_SYSINFO_OFFSET _u(0x00000060)
1858 #define ACCESSCTRL_SYSINFO_BITS _u(0x000000ff)
1859 #define ACCESSCTRL_SYSINFO_RESET _u(0x000000ff)
1860 // -----------------------------------------------------------------------------
1861 // Field : ACCESSCTRL_SYSINFO_DBG
1862 // Description : If 1, SYSINFO can be accessed by the debugger, at
1863 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1865 #define ACCESSCTRL_SYSINFO_DBG_RESET _u(0x1)
1866 #define ACCESSCTRL_SYSINFO_DBG_BITS _u(0x00000080)
1867 #define ACCESSCTRL_SYSINFO_DBG_MSB _u(7)
1868 #define ACCESSCTRL_SYSINFO_DBG_LSB _u(7)
1869 #define ACCESSCTRL_SYSINFO_DBG_ACCESS "RW"
1870 // -----------------------------------------------------------------------------
1871 // Field : ACCESSCTRL_SYSINFO_DMA
1872 // Description : If 1, SYSINFO can be accessed by the DMA, at security/privilege
1873 // levels permitted by SP/NSP/SU/NSU in this register.
1874 #define ACCESSCTRL_SYSINFO_DMA_RESET _u(0x1)
1875 #define ACCESSCTRL_SYSINFO_DMA_BITS _u(0x00000040)
1876 #define ACCESSCTRL_SYSINFO_DMA_MSB _u(6)
1877 #define ACCESSCTRL_SYSINFO_DMA_LSB _u(6)
1878 #define ACCESSCTRL_SYSINFO_DMA_ACCESS "RW"
1879 // -----------------------------------------------------------------------------
1880 // Field : ACCESSCTRL_SYSINFO_CORE1
1881 // Description : If 1, SYSINFO can be accessed by core 1, at security/privilege
1882 // levels permitted by SP/NSP/SU/NSU in this register.
1883 #define ACCESSCTRL_SYSINFO_CORE1_RESET _u(0x1)
1884 #define ACCESSCTRL_SYSINFO_CORE1_BITS _u(0x00000020)
1885 #define ACCESSCTRL_SYSINFO_CORE1_MSB _u(5)
1886 #define ACCESSCTRL_SYSINFO_CORE1_LSB _u(5)
1887 #define ACCESSCTRL_SYSINFO_CORE1_ACCESS "RW"
1888 // -----------------------------------------------------------------------------
1889 // Field : ACCESSCTRL_SYSINFO_CORE0
1890 // Description : If 1, SYSINFO can be accessed by core 0, at security/privilege
1891 // levels permitted by SP/NSP/SU/NSU in this register.
1892 #define ACCESSCTRL_SYSINFO_CORE0_RESET _u(0x1)
1893 #define ACCESSCTRL_SYSINFO_CORE0_BITS _u(0x00000010)
1894 #define ACCESSCTRL_SYSINFO_CORE0_MSB _u(4)
1895 #define ACCESSCTRL_SYSINFO_CORE0_LSB _u(4)
1896 #define ACCESSCTRL_SYSINFO_CORE0_ACCESS "RW"
1897 // -----------------------------------------------------------------------------
1898 // Field : ACCESSCTRL_SYSINFO_SP
1899 // Description : If 1, SYSINFO can be accessed from a Secure, Privileged
1901 #define ACCESSCTRL_SYSINFO_SP_RESET _u(0x1)
1902 #define ACCESSCTRL_SYSINFO_SP_BITS _u(0x00000008)
1903 #define ACCESSCTRL_SYSINFO_SP_MSB _u(3)
1904 #define ACCESSCTRL_SYSINFO_SP_LSB _u(3)
1905 #define ACCESSCTRL_SYSINFO_SP_ACCESS "RW"
1906 // -----------------------------------------------------------------------------
1907 // Field : ACCESSCTRL_SYSINFO_SU
1908 // Description : If 1, and SP is also set, SYSINFO can be accessed from a
1909 // Secure, Unprivileged context.
1910 #define ACCESSCTRL_SYSINFO_SU_RESET _u(0x1)
1911 #define ACCESSCTRL_SYSINFO_SU_BITS _u(0x00000004)
1912 #define ACCESSCTRL_SYSINFO_SU_MSB _u(2)
1913 #define ACCESSCTRL_SYSINFO_SU_LSB _u(2)
1914 #define ACCESSCTRL_SYSINFO_SU_ACCESS "RW"
1915 // -----------------------------------------------------------------------------
1916 // Field : ACCESSCTRL_SYSINFO_NSP
1917 // Description : If 1, SYSINFO can be accessed from a Non-secure, Privileged
1919 #define ACCESSCTRL_SYSINFO_NSP_RESET _u(0x1)
1920 #define ACCESSCTRL_SYSINFO_NSP_BITS _u(0x00000002)
1921 #define ACCESSCTRL_SYSINFO_NSP_MSB _u(1)
1922 #define ACCESSCTRL_SYSINFO_NSP_LSB _u(1)
1923 #define ACCESSCTRL_SYSINFO_NSP_ACCESS "RW"
1924 // -----------------------------------------------------------------------------
1925 // Field : ACCESSCTRL_SYSINFO_NSU
1926 // Description : If 1, and NSP is also set, SYSINFO can be accessed from a Non-
1927 // secure, Unprivileged context.
1929 // This bit is writable from a Non-secure, Privileged context, if
1930 // and only if the NSP bit is set.
1931 #define ACCESSCTRL_SYSINFO_NSU_RESET _u(0x1)
1932 #define ACCESSCTRL_SYSINFO_NSU_BITS _u(0x00000001)
1933 #define ACCESSCTRL_SYSINFO_NSU_MSB _u(0)
1934 #define ACCESSCTRL_SYSINFO_NSU_LSB _u(0)
1935 #define ACCESSCTRL_SYSINFO_NSU_ACCESS "RW"
1936 // =============================================================================
1937 // Register : ACCESSCTRL_RESETS
1938 // Description : Control whether debugger, DMA, core 0 and core 1 can access
1939 // RESETS, and at what security/privilege levels they can do so.
1941 // Defaults to Secure access from any master.
1943 // This register is writable only from a Secure, Privileged
1944 // processor or debugger, with the exception of the NSU bit, which
1945 // becomes Non-secure-Privileged-writable when the NSP bit is set.
1946 #define ACCESSCTRL_RESETS_OFFSET _u(0x00000064)
1947 #define ACCESSCTRL_RESETS_BITS _u(0x000000ff)
1948 #define ACCESSCTRL_RESETS_RESET _u(0x000000fc)
1949 // -----------------------------------------------------------------------------
1950 // Field : ACCESSCTRL_RESETS_DBG
1951 // Description : If 1, RESETS can be accessed by the debugger, at
1952 // security/privilege levels permitted by SP/NSP/SU/NSU in this
1954 #define ACCESSCTRL_RESETS_DBG_RESET _u(0x1)
1955 #define ACCESSCTRL_RESETS_DBG_BITS _u(0x00000080)
1956 #define ACCESSCTRL_RESETS_DBG_MSB _u(7)
1957 #define ACCESSCTRL_RESETS_DBG_LSB _u(7)
1958 #define ACCESSCTRL_RESETS_DBG_ACCESS "RW"
1959 // -----------------------------------------------------------------------------
1960 // Field : ACCESSCTRL_RESETS_DMA
1961 // Description : If 1, RESETS can be accessed by the DMA, at security/privilege
1962 // levels permitted by SP/NSP/SU/NSU in this register.
1963 #define ACCESSCTRL_RESETS_DMA_RESET _u(0x1)
1964 #define ACCESSCTRL_RESETS_DMA_BITS _u(0x00000040)
1965 #define ACCESSCTRL_RESETS_DMA_MSB _u(6)
1966 #define ACCESSCTRL_RESETS_DMA_LSB _u(6)
1967 #define ACCESSCTRL_RESETS_DMA_ACCESS "RW"
1968 // -----------------------------------------------------------------------------
1969 // Field : ACCESSCTRL_RESETS_CORE1
1970 // Description : If 1, RESETS can be accessed by core 1, at security/privilege
1971 // levels permitted by SP/NSP/SU/NSU in this register.
1972 #define ACCESSCTRL_RESETS_CORE1_RESET _u(0x1)
1973 #define ACCESSCTRL_RESETS_CORE1_BITS _u(0x00000020)
1974 #define ACCESSCTRL_RESETS_CORE1_MSB _u(5)
1975 #define ACCESSCTRL_RESETS_CORE1_LSB _u(5)
1976 #define ACCESSCTRL_RESETS_CORE1_ACCESS "RW"
1977 // -----------------------------------------------------------------------------
1978 // Field : ACCESSCTRL_RESETS_CORE0
1979 // Description : If 1, RESETS can be accessed by core 0, at security/privilege
1980 // levels permitted by SP/NSP/SU/NSU in this register.
1981 #define ACCESSCTRL_RESETS_CORE0_RESET _u(0x1)
1982 #define ACCESSCTRL_RESETS_CORE0_BITS _u(0x00000010)
1983 #define ACCESSCTRL_RESETS_CORE0_MSB _u(4)
1984 #define ACCESSCTRL_RESETS_CORE0_LSB _u(4)
1985 #define ACCESSCTRL_RESETS_CORE0_ACCESS "RW"
1986 // -----------------------------------------------------------------------------
1987 // Field : ACCESSCTRL_RESETS_SP
1988 // Description : If 1, RESETS can be accessed from a Secure, Privileged context.
1989 #define ACCESSCTRL_RESETS_SP_RESET _u(0x1)
1990 #define ACCESSCTRL_RESETS_SP_BITS _u(0x00000008)
1991 #define ACCESSCTRL_RESETS_SP_MSB _u(3)
1992 #define ACCESSCTRL_RESETS_SP_LSB _u(3)
1993 #define ACCESSCTRL_RESETS_SP_ACCESS "RW"
1994 // -----------------------------------------------------------------------------
1995 // Field : ACCESSCTRL_RESETS_SU
1996 // Description : If 1, and SP is also set, RESETS can be accessed from a Secure,
1997 // Unprivileged context.
1998 #define ACCESSCTRL_RESETS_SU_RESET _u(0x1)
1999 #define ACCESSCTRL_RESETS_SU_BITS _u(0x00000004)
2000 #define ACCESSCTRL_RESETS_SU_MSB _u(2)
2001 #define ACCESSCTRL_RESETS_SU_LSB _u(2)
2002 #define ACCESSCTRL_RESETS_SU_ACCESS "RW"
2003 // -----------------------------------------------------------------------------
2004 // Field : ACCESSCTRL_RESETS_NSP
2005 // Description : If 1, RESETS can be accessed from a Non-secure, Privileged
2007 #define ACCESSCTRL_RESETS_NSP_RESET _u(0x0)
2008 #define ACCESSCTRL_RESETS_NSP_BITS _u(0x00000002)
2009 #define ACCESSCTRL_RESETS_NSP_MSB _u(1)
2010 #define ACCESSCTRL_RESETS_NSP_LSB _u(1)
2011 #define ACCESSCTRL_RESETS_NSP_ACCESS "RW"
2012 // -----------------------------------------------------------------------------
2013 // Field : ACCESSCTRL_RESETS_NSU
2014 // Description : If 1, and NSP is also set, RESETS can be accessed from a Non-
2015 // secure, Unprivileged context.
2017 // This bit is writable from a Non-secure, Privileged context, if
2018 // and only if the NSP bit is set.
2019 #define ACCESSCTRL_RESETS_NSU_RESET _u(0x0)
2020 #define ACCESSCTRL_RESETS_NSU_BITS _u(0x00000001)
2021 #define ACCESSCTRL_RESETS_NSU_MSB _u(0)
2022 #define ACCESSCTRL_RESETS_NSU_LSB _u(0)
2023 #define ACCESSCTRL_RESETS_NSU_ACCESS "RW"
2024 // =============================================================================
2025 // Register : ACCESSCTRL_IO_BANK0
2026 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2027 // IO_BANK0, and at what security/privilege levels they can do so.
2029 // Defaults to Secure access from any master.
2031 // This register is writable only from a Secure, Privileged
2032 // processor or debugger, with the exception of the NSU bit, which
2033 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2034 #define ACCESSCTRL_IO_BANK0_OFFSET _u(0x00000068)
2035 #define ACCESSCTRL_IO_BANK0_BITS _u(0x000000ff)
2036 #define ACCESSCTRL_IO_BANK0_RESET _u(0x000000fc)
2037 // -----------------------------------------------------------------------------
2038 // Field : ACCESSCTRL_IO_BANK0_DBG
2039 // Description : If 1, IO_BANK0 can be accessed by the debugger, at
2040 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2042 #define ACCESSCTRL_IO_BANK0_DBG_RESET _u(0x1)
2043 #define ACCESSCTRL_IO_BANK0_DBG_BITS _u(0x00000080)
2044 #define ACCESSCTRL_IO_BANK0_DBG_MSB _u(7)
2045 #define ACCESSCTRL_IO_BANK0_DBG_LSB _u(7)
2046 #define ACCESSCTRL_IO_BANK0_DBG_ACCESS "RW"
2047 // -----------------------------------------------------------------------------
2048 // Field : ACCESSCTRL_IO_BANK0_DMA
2049 // Description : If 1, IO_BANK0 can be accessed by the DMA, at
2050 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2052 #define ACCESSCTRL_IO_BANK0_DMA_RESET _u(0x1)
2053 #define ACCESSCTRL_IO_BANK0_DMA_BITS _u(0x00000040)
2054 #define ACCESSCTRL_IO_BANK0_DMA_MSB _u(6)
2055 #define ACCESSCTRL_IO_BANK0_DMA_LSB _u(6)
2056 #define ACCESSCTRL_IO_BANK0_DMA_ACCESS "RW"
2057 // -----------------------------------------------------------------------------
2058 // Field : ACCESSCTRL_IO_BANK0_CORE1
2059 // Description : If 1, IO_BANK0 can be accessed by core 1, at security/privilege
2060 // levels permitted by SP/NSP/SU/NSU in this register.
2061 #define ACCESSCTRL_IO_BANK0_CORE1_RESET _u(0x1)
2062 #define ACCESSCTRL_IO_BANK0_CORE1_BITS _u(0x00000020)
2063 #define ACCESSCTRL_IO_BANK0_CORE1_MSB _u(5)
2064 #define ACCESSCTRL_IO_BANK0_CORE1_LSB _u(5)
2065 #define ACCESSCTRL_IO_BANK0_CORE1_ACCESS "RW"
2066 // -----------------------------------------------------------------------------
2067 // Field : ACCESSCTRL_IO_BANK0_CORE0
2068 // Description : If 1, IO_BANK0 can be accessed by core 0, at security/privilege
2069 // levels permitted by SP/NSP/SU/NSU in this register.
2070 #define ACCESSCTRL_IO_BANK0_CORE0_RESET _u(0x1)
2071 #define ACCESSCTRL_IO_BANK0_CORE0_BITS _u(0x00000010)
2072 #define ACCESSCTRL_IO_BANK0_CORE0_MSB _u(4)
2073 #define ACCESSCTRL_IO_BANK0_CORE0_LSB _u(4)
2074 #define ACCESSCTRL_IO_BANK0_CORE0_ACCESS "RW"
2075 // -----------------------------------------------------------------------------
2076 // Field : ACCESSCTRL_IO_BANK0_SP
2077 // Description : If 1, IO_BANK0 can be accessed from a Secure, Privileged
2079 #define ACCESSCTRL_IO_BANK0_SP_RESET _u(0x1)
2080 #define ACCESSCTRL_IO_BANK0_SP_BITS _u(0x00000008)
2081 #define ACCESSCTRL_IO_BANK0_SP_MSB _u(3)
2082 #define ACCESSCTRL_IO_BANK0_SP_LSB _u(3)
2083 #define ACCESSCTRL_IO_BANK0_SP_ACCESS "RW"
2084 // -----------------------------------------------------------------------------
2085 // Field : ACCESSCTRL_IO_BANK0_SU
2086 // Description : If 1, and SP is also set, IO_BANK0 can be accessed from a
2087 // Secure, Unprivileged context.
2088 #define ACCESSCTRL_IO_BANK0_SU_RESET _u(0x1)
2089 #define ACCESSCTRL_IO_BANK0_SU_BITS _u(0x00000004)
2090 #define ACCESSCTRL_IO_BANK0_SU_MSB _u(2)
2091 #define ACCESSCTRL_IO_BANK0_SU_LSB _u(2)
2092 #define ACCESSCTRL_IO_BANK0_SU_ACCESS "RW"
2093 // -----------------------------------------------------------------------------
2094 // Field : ACCESSCTRL_IO_BANK0_NSP
2095 // Description : If 1, IO_BANK0 can be accessed from a Non-secure, Privileged
2097 #define ACCESSCTRL_IO_BANK0_NSP_RESET _u(0x0)
2098 #define ACCESSCTRL_IO_BANK0_NSP_BITS _u(0x00000002)
2099 #define ACCESSCTRL_IO_BANK0_NSP_MSB _u(1)
2100 #define ACCESSCTRL_IO_BANK0_NSP_LSB _u(1)
2101 #define ACCESSCTRL_IO_BANK0_NSP_ACCESS "RW"
2102 // -----------------------------------------------------------------------------
2103 // Field : ACCESSCTRL_IO_BANK0_NSU
2104 // Description : If 1, and NSP is also set, IO_BANK0 can be accessed from a Non-
2105 // secure, Unprivileged context.
2107 // This bit is writable from a Non-secure, Privileged context, if
2108 // and only if the NSP bit is set.
2109 #define ACCESSCTRL_IO_BANK0_NSU_RESET _u(0x0)
2110 #define ACCESSCTRL_IO_BANK0_NSU_BITS _u(0x00000001)
2111 #define ACCESSCTRL_IO_BANK0_NSU_MSB _u(0)
2112 #define ACCESSCTRL_IO_BANK0_NSU_LSB _u(0)
2113 #define ACCESSCTRL_IO_BANK0_NSU_ACCESS "RW"
2114 // =============================================================================
2115 // Register : ACCESSCTRL_IO_BANK1
2116 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2117 // IO_BANK1, and at what security/privilege levels they can do so.
2119 // Defaults to Secure access from any master.
2121 // This register is writable only from a Secure, Privileged
2122 // processor or debugger, with the exception of the NSU bit, which
2123 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2124 #define ACCESSCTRL_IO_BANK1_OFFSET _u(0x0000006c)
2125 #define ACCESSCTRL_IO_BANK1_BITS _u(0x000000ff)
2126 #define ACCESSCTRL_IO_BANK1_RESET _u(0x000000fc)
2127 // -----------------------------------------------------------------------------
2128 // Field : ACCESSCTRL_IO_BANK1_DBG
2129 // Description : If 1, IO_BANK1 can be accessed by the debugger, at
2130 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2132 #define ACCESSCTRL_IO_BANK1_DBG_RESET _u(0x1)
2133 #define ACCESSCTRL_IO_BANK1_DBG_BITS _u(0x00000080)
2134 #define ACCESSCTRL_IO_BANK1_DBG_MSB _u(7)
2135 #define ACCESSCTRL_IO_BANK1_DBG_LSB _u(7)
2136 #define ACCESSCTRL_IO_BANK1_DBG_ACCESS "RW"
2137 // -----------------------------------------------------------------------------
2138 // Field : ACCESSCTRL_IO_BANK1_DMA
2139 // Description : If 1, IO_BANK1 can be accessed by the DMA, at
2140 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2142 #define ACCESSCTRL_IO_BANK1_DMA_RESET _u(0x1)
2143 #define ACCESSCTRL_IO_BANK1_DMA_BITS _u(0x00000040)
2144 #define ACCESSCTRL_IO_BANK1_DMA_MSB _u(6)
2145 #define ACCESSCTRL_IO_BANK1_DMA_LSB _u(6)
2146 #define ACCESSCTRL_IO_BANK1_DMA_ACCESS "RW"
2147 // -----------------------------------------------------------------------------
2148 // Field : ACCESSCTRL_IO_BANK1_CORE1
2149 // Description : If 1, IO_BANK1 can be accessed by core 1, at security/privilege
2150 // levels permitted by SP/NSP/SU/NSU in this register.
2151 #define ACCESSCTRL_IO_BANK1_CORE1_RESET _u(0x1)
2152 #define ACCESSCTRL_IO_BANK1_CORE1_BITS _u(0x00000020)
2153 #define ACCESSCTRL_IO_BANK1_CORE1_MSB _u(5)
2154 #define ACCESSCTRL_IO_BANK1_CORE1_LSB _u(5)
2155 #define ACCESSCTRL_IO_BANK1_CORE1_ACCESS "RW"
2156 // -----------------------------------------------------------------------------
2157 // Field : ACCESSCTRL_IO_BANK1_CORE0
2158 // Description : If 1, IO_BANK1 can be accessed by core 0, at security/privilege
2159 // levels permitted by SP/NSP/SU/NSU in this register.
2160 #define ACCESSCTRL_IO_BANK1_CORE0_RESET _u(0x1)
2161 #define ACCESSCTRL_IO_BANK1_CORE0_BITS _u(0x00000010)
2162 #define ACCESSCTRL_IO_BANK1_CORE0_MSB _u(4)
2163 #define ACCESSCTRL_IO_BANK1_CORE0_LSB _u(4)
2164 #define ACCESSCTRL_IO_BANK1_CORE0_ACCESS "RW"
2165 // -----------------------------------------------------------------------------
2166 // Field : ACCESSCTRL_IO_BANK1_SP
2167 // Description : If 1, IO_BANK1 can be accessed from a Secure, Privileged
2169 #define ACCESSCTRL_IO_BANK1_SP_RESET _u(0x1)
2170 #define ACCESSCTRL_IO_BANK1_SP_BITS _u(0x00000008)
2171 #define ACCESSCTRL_IO_BANK1_SP_MSB _u(3)
2172 #define ACCESSCTRL_IO_BANK1_SP_LSB _u(3)
2173 #define ACCESSCTRL_IO_BANK1_SP_ACCESS "RW"
2174 // -----------------------------------------------------------------------------
2175 // Field : ACCESSCTRL_IO_BANK1_SU
2176 // Description : If 1, and SP is also set, IO_BANK1 can be accessed from a
2177 // Secure, Unprivileged context.
2178 #define ACCESSCTRL_IO_BANK1_SU_RESET _u(0x1)
2179 #define ACCESSCTRL_IO_BANK1_SU_BITS _u(0x00000004)
2180 #define ACCESSCTRL_IO_BANK1_SU_MSB _u(2)
2181 #define ACCESSCTRL_IO_BANK1_SU_LSB _u(2)
2182 #define ACCESSCTRL_IO_BANK1_SU_ACCESS "RW"
2183 // -----------------------------------------------------------------------------
2184 // Field : ACCESSCTRL_IO_BANK1_NSP
2185 // Description : If 1, IO_BANK1 can be accessed from a Non-secure, Privileged
2187 #define ACCESSCTRL_IO_BANK1_NSP_RESET _u(0x0)
2188 #define ACCESSCTRL_IO_BANK1_NSP_BITS _u(0x00000002)
2189 #define ACCESSCTRL_IO_BANK1_NSP_MSB _u(1)
2190 #define ACCESSCTRL_IO_BANK1_NSP_LSB _u(1)
2191 #define ACCESSCTRL_IO_BANK1_NSP_ACCESS "RW"
2192 // -----------------------------------------------------------------------------
2193 // Field : ACCESSCTRL_IO_BANK1_NSU
2194 // Description : If 1, and NSP is also set, IO_BANK1 can be accessed from a Non-
2195 // secure, Unprivileged context.
2197 // This bit is writable from a Non-secure, Privileged context, if
2198 // and only if the NSP bit is set.
2199 #define ACCESSCTRL_IO_BANK1_NSU_RESET _u(0x0)
2200 #define ACCESSCTRL_IO_BANK1_NSU_BITS _u(0x00000001)
2201 #define ACCESSCTRL_IO_BANK1_NSU_MSB _u(0)
2202 #define ACCESSCTRL_IO_BANK1_NSU_LSB _u(0)
2203 #define ACCESSCTRL_IO_BANK1_NSU_ACCESS "RW"
2204 // =============================================================================
2205 // Register : ACCESSCTRL_PADS_BANK0
2206 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2207 // PADS_BANK0, and at what security/privilege levels they can do
2210 // Defaults to Secure access from any master.
2212 // This register is writable only from a Secure, Privileged
2213 // processor or debugger, with the exception of the NSU bit, which
2214 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2215 #define ACCESSCTRL_PADS_BANK0_OFFSET _u(0x00000070)
2216 #define ACCESSCTRL_PADS_BANK0_BITS _u(0x000000ff)
2217 #define ACCESSCTRL_PADS_BANK0_RESET _u(0x000000fc)
2218 // -----------------------------------------------------------------------------
2219 // Field : ACCESSCTRL_PADS_BANK0_DBG
2220 // Description : If 1, PADS_BANK0 can be accessed by the debugger, at
2221 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2223 #define ACCESSCTRL_PADS_BANK0_DBG_RESET _u(0x1)
2224 #define ACCESSCTRL_PADS_BANK0_DBG_BITS _u(0x00000080)
2225 #define ACCESSCTRL_PADS_BANK0_DBG_MSB _u(7)
2226 #define ACCESSCTRL_PADS_BANK0_DBG_LSB _u(7)
2227 #define ACCESSCTRL_PADS_BANK0_DBG_ACCESS "RW"
2228 // -----------------------------------------------------------------------------
2229 // Field : ACCESSCTRL_PADS_BANK0_DMA
2230 // Description : If 1, PADS_BANK0 can be accessed by the DMA, at
2231 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2233 #define ACCESSCTRL_PADS_BANK0_DMA_RESET _u(0x1)
2234 #define ACCESSCTRL_PADS_BANK0_DMA_BITS _u(0x00000040)
2235 #define ACCESSCTRL_PADS_BANK0_DMA_MSB _u(6)
2236 #define ACCESSCTRL_PADS_BANK0_DMA_LSB _u(6)
2237 #define ACCESSCTRL_PADS_BANK0_DMA_ACCESS "RW"
2238 // -----------------------------------------------------------------------------
2239 // Field : ACCESSCTRL_PADS_BANK0_CORE1
2240 // Description : If 1, PADS_BANK0 can be accessed by core 1, at
2241 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2243 #define ACCESSCTRL_PADS_BANK0_CORE1_RESET _u(0x1)
2244 #define ACCESSCTRL_PADS_BANK0_CORE1_BITS _u(0x00000020)
2245 #define ACCESSCTRL_PADS_BANK0_CORE1_MSB _u(5)
2246 #define ACCESSCTRL_PADS_BANK0_CORE1_LSB _u(5)
2247 #define ACCESSCTRL_PADS_BANK0_CORE1_ACCESS "RW"
2248 // -----------------------------------------------------------------------------
2249 // Field : ACCESSCTRL_PADS_BANK0_CORE0
2250 // Description : If 1, PADS_BANK0 can be accessed by core 0, at
2251 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2253 #define ACCESSCTRL_PADS_BANK0_CORE0_RESET _u(0x1)
2254 #define ACCESSCTRL_PADS_BANK0_CORE0_BITS _u(0x00000010)
2255 #define ACCESSCTRL_PADS_BANK0_CORE0_MSB _u(4)
2256 #define ACCESSCTRL_PADS_BANK0_CORE0_LSB _u(4)
2257 #define ACCESSCTRL_PADS_BANK0_CORE0_ACCESS "RW"
2258 // -----------------------------------------------------------------------------
2259 // Field : ACCESSCTRL_PADS_BANK0_SP
2260 // Description : If 1, PADS_BANK0 can be accessed from a Secure, Privileged
2262 #define ACCESSCTRL_PADS_BANK0_SP_RESET _u(0x1)
2263 #define ACCESSCTRL_PADS_BANK0_SP_BITS _u(0x00000008)
2264 #define ACCESSCTRL_PADS_BANK0_SP_MSB _u(3)
2265 #define ACCESSCTRL_PADS_BANK0_SP_LSB _u(3)
2266 #define ACCESSCTRL_PADS_BANK0_SP_ACCESS "RW"
2267 // -----------------------------------------------------------------------------
2268 // Field : ACCESSCTRL_PADS_BANK0_SU
2269 // Description : If 1, and SP is also set, PADS_BANK0 can be accessed from a
2270 // Secure, Unprivileged context.
2271 #define ACCESSCTRL_PADS_BANK0_SU_RESET _u(0x1)
2272 #define ACCESSCTRL_PADS_BANK0_SU_BITS _u(0x00000004)
2273 #define ACCESSCTRL_PADS_BANK0_SU_MSB _u(2)
2274 #define ACCESSCTRL_PADS_BANK0_SU_LSB _u(2)
2275 #define ACCESSCTRL_PADS_BANK0_SU_ACCESS "RW"
2276 // -----------------------------------------------------------------------------
2277 // Field : ACCESSCTRL_PADS_BANK0_NSP
2278 // Description : If 1, PADS_BANK0 can be accessed from a Non-secure, Privileged
2280 #define ACCESSCTRL_PADS_BANK0_NSP_RESET _u(0x0)
2281 #define ACCESSCTRL_PADS_BANK0_NSP_BITS _u(0x00000002)
2282 #define ACCESSCTRL_PADS_BANK0_NSP_MSB _u(1)
2283 #define ACCESSCTRL_PADS_BANK0_NSP_LSB _u(1)
2284 #define ACCESSCTRL_PADS_BANK0_NSP_ACCESS "RW"
2285 // -----------------------------------------------------------------------------
2286 // Field : ACCESSCTRL_PADS_BANK0_NSU
2287 // Description : If 1, and NSP is also set, PADS_BANK0 can be accessed from a
2288 // Non-secure, Unprivileged context.
2290 // This bit is writable from a Non-secure, Privileged context, if
2291 // and only if the NSP bit is set.
2292 #define ACCESSCTRL_PADS_BANK0_NSU_RESET _u(0x0)
2293 #define ACCESSCTRL_PADS_BANK0_NSU_BITS _u(0x00000001)
2294 #define ACCESSCTRL_PADS_BANK0_NSU_MSB _u(0)
2295 #define ACCESSCTRL_PADS_BANK0_NSU_LSB _u(0)
2296 #define ACCESSCTRL_PADS_BANK0_NSU_ACCESS "RW"
2297 // =============================================================================
2298 // Register : ACCESSCTRL_PADS_QSPI
2299 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2300 // PADS_QSPI, and at what security/privilege levels they can do
2303 // Defaults to Secure access from any master.
2305 // This register is writable only from a Secure, Privileged
2306 // processor or debugger, with the exception of the NSU bit, which
2307 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2308 #define ACCESSCTRL_PADS_QSPI_OFFSET _u(0x00000074)
2309 #define ACCESSCTRL_PADS_QSPI_BITS _u(0x000000ff)
2310 #define ACCESSCTRL_PADS_QSPI_RESET _u(0x000000fc)
2311 // -----------------------------------------------------------------------------
2312 // Field : ACCESSCTRL_PADS_QSPI_DBG
2313 // Description : If 1, PADS_QSPI can be accessed by the debugger, at
2314 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2316 #define ACCESSCTRL_PADS_QSPI_DBG_RESET _u(0x1)
2317 #define ACCESSCTRL_PADS_QSPI_DBG_BITS _u(0x00000080)
2318 #define ACCESSCTRL_PADS_QSPI_DBG_MSB _u(7)
2319 #define ACCESSCTRL_PADS_QSPI_DBG_LSB _u(7)
2320 #define ACCESSCTRL_PADS_QSPI_DBG_ACCESS "RW"
2321 // -----------------------------------------------------------------------------
2322 // Field : ACCESSCTRL_PADS_QSPI_DMA
2323 // Description : If 1, PADS_QSPI can be accessed by the DMA, at
2324 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2326 #define ACCESSCTRL_PADS_QSPI_DMA_RESET _u(0x1)
2327 #define ACCESSCTRL_PADS_QSPI_DMA_BITS _u(0x00000040)
2328 #define ACCESSCTRL_PADS_QSPI_DMA_MSB _u(6)
2329 #define ACCESSCTRL_PADS_QSPI_DMA_LSB _u(6)
2330 #define ACCESSCTRL_PADS_QSPI_DMA_ACCESS "RW"
2331 // -----------------------------------------------------------------------------
2332 // Field : ACCESSCTRL_PADS_QSPI_CORE1
2333 // Description : If 1, PADS_QSPI can be accessed by core 1, at
2334 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2336 #define ACCESSCTRL_PADS_QSPI_CORE1_RESET _u(0x1)
2337 #define ACCESSCTRL_PADS_QSPI_CORE1_BITS _u(0x00000020)
2338 #define ACCESSCTRL_PADS_QSPI_CORE1_MSB _u(5)
2339 #define ACCESSCTRL_PADS_QSPI_CORE1_LSB _u(5)
2340 #define ACCESSCTRL_PADS_QSPI_CORE1_ACCESS "RW"
2341 // -----------------------------------------------------------------------------
2342 // Field : ACCESSCTRL_PADS_QSPI_CORE0
2343 // Description : If 1, PADS_QSPI can be accessed by core 0, at
2344 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2346 #define ACCESSCTRL_PADS_QSPI_CORE0_RESET _u(0x1)
2347 #define ACCESSCTRL_PADS_QSPI_CORE0_BITS _u(0x00000010)
2348 #define ACCESSCTRL_PADS_QSPI_CORE0_MSB _u(4)
2349 #define ACCESSCTRL_PADS_QSPI_CORE0_LSB _u(4)
2350 #define ACCESSCTRL_PADS_QSPI_CORE0_ACCESS "RW"
2351 // -----------------------------------------------------------------------------
2352 // Field : ACCESSCTRL_PADS_QSPI_SP
2353 // Description : If 1, PADS_QSPI can be accessed from a Secure, Privileged
2355 #define ACCESSCTRL_PADS_QSPI_SP_RESET _u(0x1)
2356 #define ACCESSCTRL_PADS_QSPI_SP_BITS _u(0x00000008)
2357 #define ACCESSCTRL_PADS_QSPI_SP_MSB _u(3)
2358 #define ACCESSCTRL_PADS_QSPI_SP_LSB _u(3)
2359 #define ACCESSCTRL_PADS_QSPI_SP_ACCESS "RW"
2360 // -----------------------------------------------------------------------------
2361 // Field : ACCESSCTRL_PADS_QSPI_SU
2362 // Description : If 1, and SP is also set, PADS_QSPI can be accessed from a
2363 // Secure, Unprivileged context.
2364 #define ACCESSCTRL_PADS_QSPI_SU_RESET _u(0x1)
2365 #define ACCESSCTRL_PADS_QSPI_SU_BITS _u(0x00000004)
2366 #define ACCESSCTRL_PADS_QSPI_SU_MSB _u(2)
2367 #define ACCESSCTRL_PADS_QSPI_SU_LSB _u(2)
2368 #define ACCESSCTRL_PADS_QSPI_SU_ACCESS "RW"
2369 // -----------------------------------------------------------------------------
2370 // Field : ACCESSCTRL_PADS_QSPI_NSP
2371 // Description : If 1, PADS_QSPI can be accessed from a Non-secure, Privileged
2373 #define ACCESSCTRL_PADS_QSPI_NSP_RESET _u(0x0)
2374 #define ACCESSCTRL_PADS_QSPI_NSP_BITS _u(0x00000002)
2375 #define ACCESSCTRL_PADS_QSPI_NSP_MSB _u(1)
2376 #define ACCESSCTRL_PADS_QSPI_NSP_LSB _u(1)
2377 #define ACCESSCTRL_PADS_QSPI_NSP_ACCESS "RW"
2378 // -----------------------------------------------------------------------------
2379 // Field : ACCESSCTRL_PADS_QSPI_NSU
2380 // Description : If 1, and NSP is also set, PADS_QSPI can be accessed from a
2381 // Non-secure, Unprivileged context.
2383 // This bit is writable from a Non-secure, Privileged context, if
2384 // and only if the NSP bit is set.
2385 #define ACCESSCTRL_PADS_QSPI_NSU_RESET _u(0x0)
2386 #define ACCESSCTRL_PADS_QSPI_NSU_BITS _u(0x00000001)
2387 #define ACCESSCTRL_PADS_QSPI_NSU_MSB _u(0)
2388 #define ACCESSCTRL_PADS_QSPI_NSU_LSB _u(0)
2389 #define ACCESSCTRL_PADS_QSPI_NSU_ACCESS "RW"
2390 // =============================================================================
2391 // Register : ACCESSCTRL_BUSCTRL
2392 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2393 // BUSCTRL, and at what security/privilege levels they can do so.
2395 // Defaults to Secure access from any master.
2397 // This register is writable only from a Secure, Privileged
2398 // processor or debugger, with the exception of the NSU bit, which
2399 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2400 #define ACCESSCTRL_BUSCTRL_OFFSET _u(0x00000078)
2401 #define ACCESSCTRL_BUSCTRL_BITS _u(0x000000ff)
2402 #define ACCESSCTRL_BUSCTRL_RESET _u(0x000000fc)
2403 // -----------------------------------------------------------------------------
2404 // Field : ACCESSCTRL_BUSCTRL_DBG
2405 // Description : If 1, BUSCTRL can be accessed by the debugger, at
2406 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2408 #define ACCESSCTRL_BUSCTRL_DBG_RESET _u(0x1)
2409 #define ACCESSCTRL_BUSCTRL_DBG_BITS _u(0x00000080)
2410 #define ACCESSCTRL_BUSCTRL_DBG_MSB _u(7)
2411 #define ACCESSCTRL_BUSCTRL_DBG_LSB _u(7)
2412 #define ACCESSCTRL_BUSCTRL_DBG_ACCESS "RW"
2413 // -----------------------------------------------------------------------------
2414 // Field : ACCESSCTRL_BUSCTRL_DMA
2415 // Description : If 1, BUSCTRL can be accessed by the DMA, at security/privilege
2416 // levels permitted by SP/NSP/SU/NSU in this register.
2417 #define ACCESSCTRL_BUSCTRL_DMA_RESET _u(0x1)
2418 #define ACCESSCTRL_BUSCTRL_DMA_BITS _u(0x00000040)
2419 #define ACCESSCTRL_BUSCTRL_DMA_MSB _u(6)
2420 #define ACCESSCTRL_BUSCTRL_DMA_LSB _u(6)
2421 #define ACCESSCTRL_BUSCTRL_DMA_ACCESS "RW"
2422 // -----------------------------------------------------------------------------
2423 // Field : ACCESSCTRL_BUSCTRL_CORE1
2424 // Description : If 1, BUSCTRL can be accessed by core 1, at security/privilege
2425 // levels permitted by SP/NSP/SU/NSU in this register.
2426 #define ACCESSCTRL_BUSCTRL_CORE1_RESET _u(0x1)
2427 #define ACCESSCTRL_BUSCTRL_CORE1_BITS _u(0x00000020)
2428 #define ACCESSCTRL_BUSCTRL_CORE1_MSB _u(5)
2429 #define ACCESSCTRL_BUSCTRL_CORE1_LSB _u(5)
2430 #define ACCESSCTRL_BUSCTRL_CORE1_ACCESS "RW"
2431 // -----------------------------------------------------------------------------
2432 // Field : ACCESSCTRL_BUSCTRL_CORE0
2433 // Description : If 1, BUSCTRL can be accessed by core 0, at security/privilege
2434 // levels permitted by SP/NSP/SU/NSU in this register.
2435 #define ACCESSCTRL_BUSCTRL_CORE0_RESET _u(0x1)
2436 #define ACCESSCTRL_BUSCTRL_CORE0_BITS _u(0x00000010)
2437 #define ACCESSCTRL_BUSCTRL_CORE0_MSB _u(4)
2438 #define ACCESSCTRL_BUSCTRL_CORE0_LSB _u(4)
2439 #define ACCESSCTRL_BUSCTRL_CORE0_ACCESS "RW"
2440 // -----------------------------------------------------------------------------
2441 // Field : ACCESSCTRL_BUSCTRL_SP
2442 // Description : If 1, BUSCTRL can be accessed from a Secure, Privileged
2444 #define ACCESSCTRL_BUSCTRL_SP_RESET _u(0x1)
2445 #define ACCESSCTRL_BUSCTRL_SP_BITS _u(0x00000008)
2446 #define ACCESSCTRL_BUSCTRL_SP_MSB _u(3)
2447 #define ACCESSCTRL_BUSCTRL_SP_LSB _u(3)
2448 #define ACCESSCTRL_BUSCTRL_SP_ACCESS "RW"
2449 // -----------------------------------------------------------------------------
2450 // Field : ACCESSCTRL_BUSCTRL_SU
2451 // Description : If 1, and SP is also set, BUSCTRL can be accessed from a
2452 // Secure, Unprivileged context.
2453 #define ACCESSCTRL_BUSCTRL_SU_RESET _u(0x1)
2454 #define ACCESSCTRL_BUSCTRL_SU_BITS _u(0x00000004)
2455 #define ACCESSCTRL_BUSCTRL_SU_MSB _u(2)
2456 #define ACCESSCTRL_BUSCTRL_SU_LSB _u(2)
2457 #define ACCESSCTRL_BUSCTRL_SU_ACCESS "RW"
2458 // -----------------------------------------------------------------------------
2459 // Field : ACCESSCTRL_BUSCTRL_NSP
2460 // Description : If 1, BUSCTRL can be accessed from a Non-secure, Privileged
2462 #define ACCESSCTRL_BUSCTRL_NSP_RESET _u(0x0)
2463 #define ACCESSCTRL_BUSCTRL_NSP_BITS _u(0x00000002)
2464 #define ACCESSCTRL_BUSCTRL_NSP_MSB _u(1)
2465 #define ACCESSCTRL_BUSCTRL_NSP_LSB _u(1)
2466 #define ACCESSCTRL_BUSCTRL_NSP_ACCESS "RW"
2467 // -----------------------------------------------------------------------------
2468 // Field : ACCESSCTRL_BUSCTRL_NSU
2469 // Description : If 1, and NSP is also set, BUSCTRL can be accessed from a Non-
2470 // secure, Unprivileged context.
2472 // This bit is writable from a Non-secure, Privileged context, if
2473 // and only if the NSP bit is set.
2474 #define ACCESSCTRL_BUSCTRL_NSU_RESET _u(0x0)
2475 #define ACCESSCTRL_BUSCTRL_NSU_BITS _u(0x00000001)
2476 #define ACCESSCTRL_BUSCTRL_NSU_MSB _u(0)
2477 #define ACCESSCTRL_BUSCTRL_NSU_LSB _u(0)
2478 #define ACCESSCTRL_BUSCTRL_NSU_ACCESS "RW"
2479 // =============================================================================
2480 // Register : ACCESSCTRL_ADC0
2481 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2482 // ADC0, and at what security/privilege levels they can do so.
2484 // Defaults to Secure access from any master.
2486 // This register is writable only from a Secure, Privileged
2487 // processor or debugger, with the exception of the NSU bit, which
2488 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2489 #define ACCESSCTRL_ADC0_OFFSET _u(0x0000007c)
2490 #define ACCESSCTRL_ADC0_BITS _u(0x000000ff)
2491 #define ACCESSCTRL_ADC0_RESET _u(0x000000fc)
2492 // -----------------------------------------------------------------------------
2493 // Field : ACCESSCTRL_ADC0_DBG
2494 // Description : If 1, ADC0 can be accessed by the debugger, at
2495 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2497 #define ACCESSCTRL_ADC0_DBG_RESET _u(0x1)
2498 #define ACCESSCTRL_ADC0_DBG_BITS _u(0x00000080)
2499 #define ACCESSCTRL_ADC0_DBG_MSB _u(7)
2500 #define ACCESSCTRL_ADC0_DBG_LSB _u(7)
2501 #define ACCESSCTRL_ADC0_DBG_ACCESS "RW"
2502 // -----------------------------------------------------------------------------
2503 // Field : ACCESSCTRL_ADC0_DMA
2504 // Description : If 1, ADC0 can be accessed by the DMA, at security/privilege
2505 // levels permitted by SP/NSP/SU/NSU in this register.
2506 #define ACCESSCTRL_ADC0_DMA_RESET _u(0x1)
2507 #define ACCESSCTRL_ADC0_DMA_BITS _u(0x00000040)
2508 #define ACCESSCTRL_ADC0_DMA_MSB _u(6)
2509 #define ACCESSCTRL_ADC0_DMA_LSB _u(6)
2510 #define ACCESSCTRL_ADC0_DMA_ACCESS "RW"
2511 // -----------------------------------------------------------------------------
2512 // Field : ACCESSCTRL_ADC0_CORE1
2513 // Description : If 1, ADC0 can be accessed by core 1, at security/privilege
2514 // levels permitted by SP/NSP/SU/NSU in this register.
2515 #define ACCESSCTRL_ADC0_CORE1_RESET _u(0x1)
2516 #define ACCESSCTRL_ADC0_CORE1_BITS _u(0x00000020)
2517 #define ACCESSCTRL_ADC0_CORE1_MSB _u(5)
2518 #define ACCESSCTRL_ADC0_CORE1_LSB _u(5)
2519 #define ACCESSCTRL_ADC0_CORE1_ACCESS "RW"
2520 // -----------------------------------------------------------------------------
2521 // Field : ACCESSCTRL_ADC0_CORE0
2522 // Description : If 1, ADC0 can be accessed by core 0, at security/privilege
2523 // levels permitted by SP/NSP/SU/NSU in this register.
2524 #define ACCESSCTRL_ADC0_CORE0_RESET _u(0x1)
2525 #define ACCESSCTRL_ADC0_CORE0_BITS _u(0x00000010)
2526 #define ACCESSCTRL_ADC0_CORE0_MSB _u(4)
2527 #define ACCESSCTRL_ADC0_CORE0_LSB _u(4)
2528 #define ACCESSCTRL_ADC0_CORE0_ACCESS "RW"
2529 // -----------------------------------------------------------------------------
2530 // Field : ACCESSCTRL_ADC0_SP
2531 // Description : If 1, ADC0 can be accessed from a Secure, Privileged context.
2532 #define ACCESSCTRL_ADC0_SP_RESET _u(0x1)
2533 #define ACCESSCTRL_ADC0_SP_BITS _u(0x00000008)
2534 #define ACCESSCTRL_ADC0_SP_MSB _u(3)
2535 #define ACCESSCTRL_ADC0_SP_LSB _u(3)
2536 #define ACCESSCTRL_ADC0_SP_ACCESS "RW"
2537 // -----------------------------------------------------------------------------
2538 // Field : ACCESSCTRL_ADC0_SU
2539 // Description : If 1, and SP is also set, ADC0 can be accessed from a Secure,
2540 // Unprivileged context.
2541 #define ACCESSCTRL_ADC0_SU_RESET _u(0x1)
2542 #define ACCESSCTRL_ADC0_SU_BITS _u(0x00000004)
2543 #define ACCESSCTRL_ADC0_SU_MSB _u(2)
2544 #define ACCESSCTRL_ADC0_SU_LSB _u(2)
2545 #define ACCESSCTRL_ADC0_SU_ACCESS "RW"
2546 // -----------------------------------------------------------------------------
2547 // Field : ACCESSCTRL_ADC0_NSP
2548 // Description : If 1, ADC0 can be accessed from a Non-secure, Privileged
2550 #define ACCESSCTRL_ADC0_NSP_RESET _u(0x0)
2551 #define ACCESSCTRL_ADC0_NSP_BITS _u(0x00000002)
2552 #define ACCESSCTRL_ADC0_NSP_MSB _u(1)
2553 #define ACCESSCTRL_ADC0_NSP_LSB _u(1)
2554 #define ACCESSCTRL_ADC0_NSP_ACCESS "RW"
2555 // -----------------------------------------------------------------------------
2556 // Field : ACCESSCTRL_ADC0_NSU
2557 // Description : If 1, and NSP is also set, ADC0 can be accessed from a Non-
2558 // secure, Unprivileged context.
2560 // This bit is writable from a Non-secure, Privileged context, if
2561 // and only if the NSP bit is set.
2562 #define ACCESSCTRL_ADC0_NSU_RESET _u(0x0)
2563 #define ACCESSCTRL_ADC0_NSU_BITS _u(0x00000001)
2564 #define ACCESSCTRL_ADC0_NSU_MSB _u(0)
2565 #define ACCESSCTRL_ADC0_NSU_LSB _u(0)
2566 #define ACCESSCTRL_ADC0_NSU_ACCESS "RW"
2567 // =============================================================================
2568 // Register : ACCESSCTRL_HSTX
2569 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2570 // HSTX, and at what security/privilege levels they can do so.
2572 // Defaults to Secure access from any master.
2574 // This register is writable only from a Secure, Privileged
2575 // processor or debugger, with the exception of the NSU bit, which
2576 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2577 #define ACCESSCTRL_HSTX_OFFSET _u(0x00000080)
2578 #define ACCESSCTRL_HSTX_BITS _u(0x000000ff)
2579 #define ACCESSCTRL_HSTX_RESET _u(0x000000fc)
2580 // -----------------------------------------------------------------------------
2581 // Field : ACCESSCTRL_HSTX_DBG
2582 // Description : If 1, HSTX can be accessed by the debugger, at
2583 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2585 #define ACCESSCTRL_HSTX_DBG_RESET _u(0x1)
2586 #define ACCESSCTRL_HSTX_DBG_BITS _u(0x00000080)
2587 #define ACCESSCTRL_HSTX_DBG_MSB _u(7)
2588 #define ACCESSCTRL_HSTX_DBG_LSB _u(7)
2589 #define ACCESSCTRL_HSTX_DBG_ACCESS "RW"
2590 // -----------------------------------------------------------------------------
2591 // Field : ACCESSCTRL_HSTX_DMA
2592 // Description : If 1, HSTX can be accessed by the DMA, at security/privilege
2593 // levels permitted by SP/NSP/SU/NSU in this register.
2594 #define ACCESSCTRL_HSTX_DMA_RESET _u(0x1)
2595 #define ACCESSCTRL_HSTX_DMA_BITS _u(0x00000040)
2596 #define ACCESSCTRL_HSTX_DMA_MSB _u(6)
2597 #define ACCESSCTRL_HSTX_DMA_LSB _u(6)
2598 #define ACCESSCTRL_HSTX_DMA_ACCESS "RW"
2599 // -----------------------------------------------------------------------------
2600 // Field : ACCESSCTRL_HSTX_CORE1
2601 // Description : If 1, HSTX can be accessed by core 1, at security/privilege
2602 // levels permitted by SP/NSP/SU/NSU in this register.
2603 #define ACCESSCTRL_HSTX_CORE1_RESET _u(0x1)
2604 #define ACCESSCTRL_HSTX_CORE1_BITS _u(0x00000020)
2605 #define ACCESSCTRL_HSTX_CORE1_MSB _u(5)
2606 #define ACCESSCTRL_HSTX_CORE1_LSB _u(5)
2607 #define ACCESSCTRL_HSTX_CORE1_ACCESS "RW"
2608 // -----------------------------------------------------------------------------
2609 // Field : ACCESSCTRL_HSTX_CORE0
2610 // Description : If 1, HSTX can be accessed by core 0, at security/privilege
2611 // levels permitted by SP/NSP/SU/NSU in this register.
2612 #define ACCESSCTRL_HSTX_CORE0_RESET _u(0x1)
2613 #define ACCESSCTRL_HSTX_CORE0_BITS _u(0x00000010)
2614 #define ACCESSCTRL_HSTX_CORE0_MSB _u(4)
2615 #define ACCESSCTRL_HSTX_CORE0_LSB _u(4)
2616 #define ACCESSCTRL_HSTX_CORE0_ACCESS "RW"
2617 // -----------------------------------------------------------------------------
2618 // Field : ACCESSCTRL_HSTX_SP
2619 // Description : If 1, HSTX can be accessed from a Secure, Privileged context.
2620 #define ACCESSCTRL_HSTX_SP_RESET _u(0x1)
2621 #define ACCESSCTRL_HSTX_SP_BITS _u(0x00000008)
2622 #define ACCESSCTRL_HSTX_SP_MSB _u(3)
2623 #define ACCESSCTRL_HSTX_SP_LSB _u(3)
2624 #define ACCESSCTRL_HSTX_SP_ACCESS "RW"
2625 // -----------------------------------------------------------------------------
2626 // Field : ACCESSCTRL_HSTX_SU
2627 // Description : If 1, and SP is also set, HSTX can be accessed from a Secure,
2628 // Unprivileged context.
2629 #define ACCESSCTRL_HSTX_SU_RESET _u(0x1)
2630 #define ACCESSCTRL_HSTX_SU_BITS _u(0x00000004)
2631 #define ACCESSCTRL_HSTX_SU_MSB _u(2)
2632 #define ACCESSCTRL_HSTX_SU_LSB _u(2)
2633 #define ACCESSCTRL_HSTX_SU_ACCESS "RW"
2634 // -----------------------------------------------------------------------------
2635 // Field : ACCESSCTRL_HSTX_NSP
2636 // Description : If 1, HSTX can be accessed from a Non-secure, Privileged
2638 #define ACCESSCTRL_HSTX_NSP_RESET _u(0x0)
2639 #define ACCESSCTRL_HSTX_NSP_BITS _u(0x00000002)
2640 #define ACCESSCTRL_HSTX_NSP_MSB _u(1)
2641 #define ACCESSCTRL_HSTX_NSP_LSB _u(1)
2642 #define ACCESSCTRL_HSTX_NSP_ACCESS "RW"
2643 // -----------------------------------------------------------------------------
2644 // Field : ACCESSCTRL_HSTX_NSU
2645 // Description : If 1, and NSP is also set, HSTX can be accessed from a Non-
2646 // secure, Unprivileged context.
2648 // This bit is writable from a Non-secure, Privileged context, if
2649 // and only if the NSP bit is set.
2650 #define ACCESSCTRL_HSTX_NSU_RESET _u(0x0)
2651 #define ACCESSCTRL_HSTX_NSU_BITS _u(0x00000001)
2652 #define ACCESSCTRL_HSTX_NSU_MSB _u(0)
2653 #define ACCESSCTRL_HSTX_NSU_LSB _u(0)
2654 #define ACCESSCTRL_HSTX_NSU_ACCESS "RW"
2655 // =============================================================================
2656 // Register : ACCESSCTRL_I2C0
2657 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2658 // I2C0, and at what security/privilege levels they can do so.
2660 // Defaults to Secure access from any master.
2662 // This register is writable only from a Secure, Privileged
2663 // processor or debugger, with the exception of the NSU bit, which
2664 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2665 #define ACCESSCTRL_I2C0_OFFSET _u(0x00000084)
2666 #define ACCESSCTRL_I2C0_BITS _u(0x000000ff)
2667 #define ACCESSCTRL_I2C0_RESET _u(0x000000fc)
2668 // -----------------------------------------------------------------------------
2669 // Field : ACCESSCTRL_I2C0_DBG
2670 // Description : If 1, I2C0 can be accessed by the debugger, at
2671 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2673 #define ACCESSCTRL_I2C0_DBG_RESET _u(0x1)
2674 #define ACCESSCTRL_I2C0_DBG_BITS _u(0x00000080)
2675 #define ACCESSCTRL_I2C0_DBG_MSB _u(7)
2676 #define ACCESSCTRL_I2C0_DBG_LSB _u(7)
2677 #define ACCESSCTRL_I2C0_DBG_ACCESS "RW"
2678 // -----------------------------------------------------------------------------
2679 // Field : ACCESSCTRL_I2C0_DMA
2680 // Description : If 1, I2C0 can be accessed by the DMA, at security/privilege
2681 // levels permitted by SP/NSP/SU/NSU in this register.
2682 #define ACCESSCTRL_I2C0_DMA_RESET _u(0x1)
2683 #define ACCESSCTRL_I2C0_DMA_BITS _u(0x00000040)
2684 #define ACCESSCTRL_I2C0_DMA_MSB _u(6)
2685 #define ACCESSCTRL_I2C0_DMA_LSB _u(6)
2686 #define ACCESSCTRL_I2C0_DMA_ACCESS "RW"
2687 // -----------------------------------------------------------------------------
2688 // Field : ACCESSCTRL_I2C0_CORE1
2689 // Description : If 1, I2C0 can be accessed by core 1, at security/privilege
2690 // levels permitted by SP/NSP/SU/NSU in this register.
2691 #define ACCESSCTRL_I2C0_CORE1_RESET _u(0x1)
2692 #define ACCESSCTRL_I2C0_CORE1_BITS _u(0x00000020)
2693 #define ACCESSCTRL_I2C0_CORE1_MSB _u(5)
2694 #define ACCESSCTRL_I2C0_CORE1_LSB _u(5)
2695 #define ACCESSCTRL_I2C0_CORE1_ACCESS "RW"
2696 // -----------------------------------------------------------------------------
2697 // Field : ACCESSCTRL_I2C0_CORE0
2698 // Description : If 1, I2C0 can be accessed by core 0, at security/privilege
2699 // levels permitted by SP/NSP/SU/NSU in this register.
2700 #define ACCESSCTRL_I2C0_CORE0_RESET _u(0x1)
2701 #define ACCESSCTRL_I2C0_CORE0_BITS _u(0x00000010)
2702 #define ACCESSCTRL_I2C0_CORE0_MSB _u(4)
2703 #define ACCESSCTRL_I2C0_CORE0_LSB _u(4)
2704 #define ACCESSCTRL_I2C0_CORE0_ACCESS "RW"
2705 // -----------------------------------------------------------------------------
2706 // Field : ACCESSCTRL_I2C0_SP
2707 // Description : If 1, I2C0 can be accessed from a Secure, Privileged context.
2708 #define ACCESSCTRL_I2C0_SP_RESET _u(0x1)
2709 #define ACCESSCTRL_I2C0_SP_BITS _u(0x00000008)
2710 #define ACCESSCTRL_I2C0_SP_MSB _u(3)
2711 #define ACCESSCTRL_I2C0_SP_LSB _u(3)
2712 #define ACCESSCTRL_I2C0_SP_ACCESS "RW"
2713 // -----------------------------------------------------------------------------
2714 // Field : ACCESSCTRL_I2C0_SU
2715 // Description : If 1, and SP is also set, I2C0 can be accessed from a Secure,
2716 // Unprivileged context.
2717 #define ACCESSCTRL_I2C0_SU_RESET _u(0x1)
2718 #define ACCESSCTRL_I2C0_SU_BITS _u(0x00000004)
2719 #define ACCESSCTRL_I2C0_SU_MSB _u(2)
2720 #define ACCESSCTRL_I2C0_SU_LSB _u(2)
2721 #define ACCESSCTRL_I2C0_SU_ACCESS "RW"
2722 // -----------------------------------------------------------------------------
2723 // Field : ACCESSCTRL_I2C0_NSP
2724 // Description : If 1, I2C0 can be accessed from a Non-secure, Privileged
2726 #define ACCESSCTRL_I2C0_NSP_RESET _u(0x0)
2727 #define ACCESSCTRL_I2C0_NSP_BITS _u(0x00000002)
2728 #define ACCESSCTRL_I2C0_NSP_MSB _u(1)
2729 #define ACCESSCTRL_I2C0_NSP_LSB _u(1)
2730 #define ACCESSCTRL_I2C0_NSP_ACCESS "RW"
2731 // -----------------------------------------------------------------------------
2732 // Field : ACCESSCTRL_I2C0_NSU
2733 // Description : If 1, and NSP is also set, I2C0 can be accessed from a Non-
2734 // secure, Unprivileged context.
2736 // This bit is writable from a Non-secure, Privileged context, if
2737 // and only if the NSP bit is set.
2738 #define ACCESSCTRL_I2C0_NSU_RESET _u(0x0)
2739 #define ACCESSCTRL_I2C0_NSU_BITS _u(0x00000001)
2740 #define ACCESSCTRL_I2C0_NSU_MSB _u(0)
2741 #define ACCESSCTRL_I2C0_NSU_LSB _u(0)
2742 #define ACCESSCTRL_I2C0_NSU_ACCESS "RW"
2743 // =============================================================================
2744 // Register : ACCESSCTRL_I2C1
2745 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2746 // I2C1, and at what security/privilege levels they can do so.
2748 // Defaults to Secure access from any master.
2750 // This register is writable only from a Secure, Privileged
2751 // processor or debugger, with the exception of the NSU bit, which
2752 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2753 #define ACCESSCTRL_I2C1_OFFSET _u(0x00000088)
2754 #define ACCESSCTRL_I2C1_BITS _u(0x000000ff)
2755 #define ACCESSCTRL_I2C1_RESET _u(0x000000fc)
2756 // -----------------------------------------------------------------------------
2757 // Field : ACCESSCTRL_I2C1_DBG
2758 // Description : If 1, I2C1 can be accessed by the debugger, at
2759 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2761 #define ACCESSCTRL_I2C1_DBG_RESET _u(0x1)
2762 #define ACCESSCTRL_I2C1_DBG_BITS _u(0x00000080)
2763 #define ACCESSCTRL_I2C1_DBG_MSB _u(7)
2764 #define ACCESSCTRL_I2C1_DBG_LSB _u(7)
2765 #define ACCESSCTRL_I2C1_DBG_ACCESS "RW"
2766 // -----------------------------------------------------------------------------
2767 // Field : ACCESSCTRL_I2C1_DMA
2768 // Description : If 1, I2C1 can be accessed by the DMA, at security/privilege
2769 // levels permitted by SP/NSP/SU/NSU in this register.
2770 #define ACCESSCTRL_I2C1_DMA_RESET _u(0x1)
2771 #define ACCESSCTRL_I2C1_DMA_BITS _u(0x00000040)
2772 #define ACCESSCTRL_I2C1_DMA_MSB _u(6)
2773 #define ACCESSCTRL_I2C1_DMA_LSB _u(6)
2774 #define ACCESSCTRL_I2C1_DMA_ACCESS "RW"
2775 // -----------------------------------------------------------------------------
2776 // Field : ACCESSCTRL_I2C1_CORE1
2777 // Description : If 1, I2C1 can be accessed by core 1, at security/privilege
2778 // levels permitted by SP/NSP/SU/NSU in this register.
2779 #define ACCESSCTRL_I2C1_CORE1_RESET _u(0x1)
2780 #define ACCESSCTRL_I2C1_CORE1_BITS _u(0x00000020)
2781 #define ACCESSCTRL_I2C1_CORE1_MSB _u(5)
2782 #define ACCESSCTRL_I2C1_CORE1_LSB _u(5)
2783 #define ACCESSCTRL_I2C1_CORE1_ACCESS "RW"
2784 // -----------------------------------------------------------------------------
2785 // Field : ACCESSCTRL_I2C1_CORE0
2786 // Description : If 1, I2C1 can be accessed by core 0, at security/privilege
2787 // levels permitted by SP/NSP/SU/NSU in this register.
2788 #define ACCESSCTRL_I2C1_CORE0_RESET _u(0x1)
2789 #define ACCESSCTRL_I2C1_CORE0_BITS _u(0x00000010)
2790 #define ACCESSCTRL_I2C1_CORE0_MSB _u(4)
2791 #define ACCESSCTRL_I2C1_CORE0_LSB _u(4)
2792 #define ACCESSCTRL_I2C1_CORE0_ACCESS "RW"
2793 // -----------------------------------------------------------------------------
2794 // Field : ACCESSCTRL_I2C1_SP
2795 // Description : If 1, I2C1 can be accessed from a Secure, Privileged context.
2796 #define ACCESSCTRL_I2C1_SP_RESET _u(0x1)
2797 #define ACCESSCTRL_I2C1_SP_BITS _u(0x00000008)
2798 #define ACCESSCTRL_I2C1_SP_MSB _u(3)
2799 #define ACCESSCTRL_I2C1_SP_LSB _u(3)
2800 #define ACCESSCTRL_I2C1_SP_ACCESS "RW"
2801 // -----------------------------------------------------------------------------
2802 // Field : ACCESSCTRL_I2C1_SU
2803 // Description : If 1, and SP is also set, I2C1 can be accessed from a Secure,
2804 // Unprivileged context.
2805 #define ACCESSCTRL_I2C1_SU_RESET _u(0x1)
2806 #define ACCESSCTRL_I2C1_SU_BITS _u(0x00000004)
2807 #define ACCESSCTRL_I2C1_SU_MSB _u(2)
2808 #define ACCESSCTRL_I2C1_SU_LSB _u(2)
2809 #define ACCESSCTRL_I2C1_SU_ACCESS "RW"
2810 // -----------------------------------------------------------------------------
2811 // Field : ACCESSCTRL_I2C1_NSP
2812 // Description : If 1, I2C1 can be accessed from a Non-secure, Privileged
2814 #define ACCESSCTRL_I2C1_NSP_RESET _u(0x0)
2815 #define ACCESSCTRL_I2C1_NSP_BITS _u(0x00000002)
2816 #define ACCESSCTRL_I2C1_NSP_MSB _u(1)
2817 #define ACCESSCTRL_I2C1_NSP_LSB _u(1)
2818 #define ACCESSCTRL_I2C1_NSP_ACCESS "RW"
2819 // -----------------------------------------------------------------------------
2820 // Field : ACCESSCTRL_I2C1_NSU
2821 // Description : If 1, and NSP is also set, I2C1 can be accessed from a Non-
2822 // secure, Unprivileged context.
2824 // This bit is writable from a Non-secure, Privileged context, if
2825 // and only if the NSP bit is set.
2826 #define ACCESSCTRL_I2C1_NSU_RESET _u(0x0)
2827 #define ACCESSCTRL_I2C1_NSU_BITS _u(0x00000001)
2828 #define ACCESSCTRL_I2C1_NSU_MSB _u(0)
2829 #define ACCESSCTRL_I2C1_NSU_LSB _u(0)
2830 #define ACCESSCTRL_I2C1_NSU_ACCESS "RW"
2831 // =============================================================================
2832 // Register : ACCESSCTRL_PWM
2833 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2834 // PWM, and at what security/privilege levels they can do so.
2836 // Defaults to Secure access from any master.
2838 // This register is writable only from a Secure, Privileged
2839 // processor or debugger, with the exception of the NSU bit, which
2840 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2841 #define ACCESSCTRL_PWM_OFFSET _u(0x0000008c)
2842 #define ACCESSCTRL_PWM_BITS _u(0x000000ff)
2843 #define ACCESSCTRL_PWM_RESET _u(0x000000fc)
2844 // -----------------------------------------------------------------------------
2845 // Field : ACCESSCTRL_PWM_DBG
2846 // Description : If 1, PWM can be accessed by the debugger, at
2847 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2849 #define ACCESSCTRL_PWM_DBG_RESET _u(0x1)
2850 #define ACCESSCTRL_PWM_DBG_BITS _u(0x00000080)
2851 #define ACCESSCTRL_PWM_DBG_MSB _u(7)
2852 #define ACCESSCTRL_PWM_DBG_LSB _u(7)
2853 #define ACCESSCTRL_PWM_DBG_ACCESS "RW"
2854 // -----------------------------------------------------------------------------
2855 // Field : ACCESSCTRL_PWM_DMA
2856 // Description : If 1, PWM can be accessed by the DMA, at security/privilege
2857 // levels permitted by SP/NSP/SU/NSU in this register.
2858 #define ACCESSCTRL_PWM_DMA_RESET _u(0x1)
2859 #define ACCESSCTRL_PWM_DMA_BITS _u(0x00000040)
2860 #define ACCESSCTRL_PWM_DMA_MSB _u(6)
2861 #define ACCESSCTRL_PWM_DMA_LSB _u(6)
2862 #define ACCESSCTRL_PWM_DMA_ACCESS "RW"
2863 // -----------------------------------------------------------------------------
2864 // Field : ACCESSCTRL_PWM_CORE1
2865 // Description : If 1, PWM can be accessed by core 1, at security/privilege
2866 // levels permitted by SP/NSP/SU/NSU in this register.
2867 #define ACCESSCTRL_PWM_CORE1_RESET _u(0x1)
2868 #define ACCESSCTRL_PWM_CORE1_BITS _u(0x00000020)
2869 #define ACCESSCTRL_PWM_CORE1_MSB _u(5)
2870 #define ACCESSCTRL_PWM_CORE1_LSB _u(5)
2871 #define ACCESSCTRL_PWM_CORE1_ACCESS "RW"
2872 // -----------------------------------------------------------------------------
2873 // Field : ACCESSCTRL_PWM_CORE0
2874 // Description : If 1, PWM can be accessed by core 0, at security/privilege
2875 // levels permitted by SP/NSP/SU/NSU in this register.
2876 #define ACCESSCTRL_PWM_CORE0_RESET _u(0x1)
2877 #define ACCESSCTRL_PWM_CORE0_BITS _u(0x00000010)
2878 #define ACCESSCTRL_PWM_CORE0_MSB _u(4)
2879 #define ACCESSCTRL_PWM_CORE0_LSB _u(4)
2880 #define ACCESSCTRL_PWM_CORE0_ACCESS "RW"
2881 // -----------------------------------------------------------------------------
2882 // Field : ACCESSCTRL_PWM_SP
2883 // Description : If 1, PWM can be accessed from a Secure, Privileged context.
2884 #define ACCESSCTRL_PWM_SP_RESET _u(0x1)
2885 #define ACCESSCTRL_PWM_SP_BITS _u(0x00000008)
2886 #define ACCESSCTRL_PWM_SP_MSB _u(3)
2887 #define ACCESSCTRL_PWM_SP_LSB _u(3)
2888 #define ACCESSCTRL_PWM_SP_ACCESS "RW"
2889 // -----------------------------------------------------------------------------
2890 // Field : ACCESSCTRL_PWM_SU
2891 // Description : If 1, and SP is also set, PWM can be accessed from a Secure,
2892 // Unprivileged context.
2893 #define ACCESSCTRL_PWM_SU_RESET _u(0x1)
2894 #define ACCESSCTRL_PWM_SU_BITS _u(0x00000004)
2895 #define ACCESSCTRL_PWM_SU_MSB _u(2)
2896 #define ACCESSCTRL_PWM_SU_LSB _u(2)
2897 #define ACCESSCTRL_PWM_SU_ACCESS "RW"
2898 // -----------------------------------------------------------------------------
2899 // Field : ACCESSCTRL_PWM_NSP
2900 // Description : If 1, PWM can be accessed from a Non-secure, Privileged
2902 #define ACCESSCTRL_PWM_NSP_RESET _u(0x0)
2903 #define ACCESSCTRL_PWM_NSP_BITS _u(0x00000002)
2904 #define ACCESSCTRL_PWM_NSP_MSB _u(1)
2905 #define ACCESSCTRL_PWM_NSP_LSB _u(1)
2906 #define ACCESSCTRL_PWM_NSP_ACCESS "RW"
2907 // -----------------------------------------------------------------------------
2908 // Field : ACCESSCTRL_PWM_NSU
2909 // Description : If 1, and NSP is also set, PWM can be accessed from a Non-
2910 // secure, Unprivileged context.
2912 // This bit is writable from a Non-secure, Privileged context, if
2913 // and only if the NSP bit is set.
2914 #define ACCESSCTRL_PWM_NSU_RESET _u(0x0)
2915 #define ACCESSCTRL_PWM_NSU_BITS _u(0x00000001)
2916 #define ACCESSCTRL_PWM_NSU_MSB _u(0)
2917 #define ACCESSCTRL_PWM_NSU_LSB _u(0)
2918 #define ACCESSCTRL_PWM_NSU_ACCESS "RW"
2919 // =============================================================================
2920 // Register : ACCESSCTRL_SPI0
2921 // Description : Control whether debugger, DMA, core 0 and core 1 can access
2922 // SPI0, and at what security/privilege levels they can do so.
2924 // Defaults to Secure access from any master.
2926 // This register is writable only from a Secure, Privileged
2927 // processor or debugger, with the exception of the NSU bit, which
2928 // becomes Non-secure-Privileged-writable when the NSP bit is set.
2929 #define ACCESSCTRL_SPI0_OFFSET _u(0x00000090)
2930 #define ACCESSCTRL_SPI0_BITS _u(0x000000ff)
2931 #define ACCESSCTRL_SPI0_RESET _u(0x000000fc)
2932 // -----------------------------------------------------------------------------
2933 // Field : ACCESSCTRL_SPI0_DBG
2934 // Description : If 1, SPI0 can be accessed by the debugger, at
2935 // security/privilege levels permitted by SP/NSP/SU/NSU in this
2937 #define ACCESSCTRL_SPI0_DBG_RESET _u(0x1)
2938 #define ACCESSCTRL_SPI0_DBG_BITS _u(0x00000080)
2939 #define ACCESSCTRL_SPI0_DBG_MSB _u(7)
2940 #define ACCESSCTRL_SPI0_DBG_LSB _u(7)
2941 #define ACCESSCTRL_SPI0_DBG_ACCESS "RW"
2942 // -----------------------------------------------------------------------------
2943 // Field : ACCESSCTRL_SPI0_DMA
2944 // Description : If 1, SPI0 can be accessed by the DMA, at security/privilege
2945 // levels permitted by SP/NSP/SU/NSU in this register.
2946 #define ACCESSCTRL_SPI0_DMA_RESET _u(0x1)
2947 #define ACCESSCTRL_SPI0_DMA_BITS _u(0x00000040)
2948 #define ACCESSCTRL_SPI0_DMA_MSB _u(6)
2949 #define ACCESSCTRL_SPI0_DMA_LSB _u(6)
2950 #define ACCESSCTRL_SPI0_DMA_ACCESS "RW"
2951 // -----------------------------------------------------------------------------
2952 // Field : ACCESSCTRL_SPI0_CORE1
2953 // Description : If 1, SPI0 can be accessed by core 1, at security/privilege
2954 // levels permitted by SP/NSP/SU/NSU in this register.
2955 #define ACCESSCTRL_SPI0_CORE1_RESET _u(0x1)
2956 #define ACCESSCTRL_SPI0_CORE1_BITS _u(0x00000020)
2957 #define ACCESSCTRL_SPI0_CORE1_MSB _u(5)
2958 #define ACCESSCTRL_SPI0_CORE1_LSB _u(5)
2959 #define ACCESSCTRL_SPI0_CORE1_ACCESS "RW"
2960 // -----------------------------------------------------------------------------
2961 // Field : ACCESSCTRL_SPI0_CORE0
2962 // Description : If 1, SPI0 can be accessed by core 0, at security/privilege
2963 // levels permitted by SP/NSP/SU/NSU in this register.
2964 #define ACCESSCTRL_SPI0_CORE0_RESET _u(0x1)
2965 #define ACCESSCTRL_SPI0_CORE0_BITS _u(0x00000010)
2966 #define ACCESSCTRL_SPI0_CORE0_MSB _u(4)
2967 #define ACCESSCTRL_SPI0_CORE0_LSB _u(4)
2968 #define ACCESSCTRL_SPI0_CORE0_ACCESS "RW"
2969 // -----------------------------------------------------------------------------
2970 // Field : ACCESSCTRL_SPI0_SP
2971 // Description : If 1, SPI0 can be accessed from a Secure, Privileged context.
2972 #define ACCESSCTRL_SPI0_SP_RESET _u(0x1)
2973 #define ACCESSCTRL_SPI0_SP_BITS _u(0x00000008)
2974 #define ACCESSCTRL_SPI0_SP_MSB _u(3)
2975 #define ACCESSCTRL_SPI0_SP_LSB _u(3)
2976 #define ACCESSCTRL_SPI0_SP_ACCESS "RW"
2977 // -----------------------------------------------------------------------------
2978 // Field : ACCESSCTRL_SPI0_SU
2979 // Description : If 1, and SP is also set, SPI0 can be accessed from a Secure,
2980 // Unprivileged context.
2981 #define ACCESSCTRL_SPI0_SU_RESET _u(0x1)
2982 #define ACCESSCTRL_SPI0_SU_BITS _u(0x00000004)
2983 #define ACCESSCTRL_SPI0_SU_MSB _u(2)
2984 #define ACCESSCTRL_SPI0_SU_LSB _u(2)
2985 #define ACCESSCTRL_SPI0_SU_ACCESS "RW"
2986 // -----------------------------------------------------------------------------
2987 // Field : ACCESSCTRL_SPI0_NSP
2988 // Description : If 1, SPI0 can be accessed from a Non-secure, Privileged
2990 #define ACCESSCTRL_SPI0_NSP_RESET _u(0x0)
2991 #define ACCESSCTRL_SPI0_NSP_BITS _u(0x00000002)
2992 #define ACCESSCTRL_SPI0_NSP_MSB _u(1)
2993 #define ACCESSCTRL_SPI0_NSP_LSB _u(1)
2994 #define ACCESSCTRL_SPI0_NSP_ACCESS "RW"
2995 // -----------------------------------------------------------------------------
2996 // Field : ACCESSCTRL_SPI0_NSU
2997 // Description : If 1, and NSP is also set, SPI0 can be accessed from a Non-
2998 // secure, Unprivileged context.
3000 // This bit is writable from a Non-secure, Privileged context, if
3001 // and only if the NSP bit is set.
3002 #define ACCESSCTRL_SPI0_NSU_RESET _u(0x0)
3003 #define ACCESSCTRL_SPI0_NSU_BITS _u(0x00000001)
3004 #define ACCESSCTRL_SPI0_NSU_MSB _u(0)
3005 #define ACCESSCTRL_SPI0_NSU_LSB _u(0)
3006 #define ACCESSCTRL_SPI0_NSU_ACCESS "RW"
3007 // =============================================================================
3008 // Register : ACCESSCTRL_SPI1
3009 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3010 // SPI1, and at what security/privilege levels they can do so.
3012 // Defaults to Secure access from any master.
3014 // This register is writable only from a Secure, Privileged
3015 // processor or debugger, with the exception of the NSU bit, which
3016 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3017 #define ACCESSCTRL_SPI1_OFFSET _u(0x00000094)
3018 #define ACCESSCTRL_SPI1_BITS _u(0x000000ff)
3019 #define ACCESSCTRL_SPI1_RESET _u(0x000000fc)
3020 // -----------------------------------------------------------------------------
3021 // Field : ACCESSCTRL_SPI1_DBG
3022 // Description : If 1, SPI1 can be accessed by the debugger, at
3023 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3025 #define ACCESSCTRL_SPI1_DBG_RESET _u(0x1)
3026 #define ACCESSCTRL_SPI1_DBG_BITS _u(0x00000080)
3027 #define ACCESSCTRL_SPI1_DBG_MSB _u(7)
3028 #define ACCESSCTRL_SPI1_DBG_LSB _u(7)
3029 #define ACCESSCTRL_SPI1_DBG_ACCESS "RW"
3030 // -----------------------------------------------------------------------------
3031 // Field : ACCESSCTRL_SPI1_DMA
3032 // Description : If 1, SPI1 can be accessed by the DMA, at security/privilege
3033 // levels permitted by SP/NSP/SU/NSU in this register.
3034 #define ACCESSCTRL_SPI1_DMA_RESET _u(0x1)
3035 #define ACCESSCTRL_SPI1_DMA_BITS _u(0x00000040)
3036 #define ACCESSCTRL_SPI1_DMA_MSB _u(6)
3037 #define ACCESSCTRL_SPI1_DMA_LSB _u(6)
3038 #define ACCESSCTRL_SPI1_DMA_ACCESS "RW"
3039 // -----------------------------------------------------------------------------
3040 // Field : ACCESSCTRL_SPI1_CORE1
3041 // Description : If 1, SPI1 can be accessed by core 1, at security/privilege
3042 // levels permitted by SP/NSP/SU/NSU in this register.
3043 #define ACCESSCTRL_SPI1_CORE1_RESET _u(0x1)
3044 #define ACCESSCTRL_SPI1_CORE1_BITS _u(0x00000020)
3045 #define ACCESSCTRL_SPI1_CORE1_MSB _u(5)
3046 #define ACCESSCTRL_SPI1_CORE1_LSB _u(5)
3047 #define ACCESSCTRL_SPI1_CORE1_ACCESS "RW"
3048 // -----------------------------------------------------------------------------
3049 // Field : ACCESSCTRL_SPI1_CORE0
3050 // Description : If 1, SPI1 can be accessed by core 0, at security/privilege
3051 // levels permitted by SP/NSP/SU/NSU in this register.
3052 #define ACCESSCTRL_SPI1_CORE0_RESET _u(0x1)
3053 #define ACCESSCTRL_SPI1_CORE0_BITS _u(0x00000010)
3054 #define ACCESSCTRL_SPI1_CORE0_MSB _u(4)
3055 #define ACCESSCTRL_SPI1_CORE0_LSB _u(4)
3056 #define ACCESSCTRL_SPI1_CORE0_ACCESS "RW"
3057 // -----------------------------------------------------------------------------
3058 // Field : ACCESSCTRL_SPI1_SP
3059 // Description : If 1, SPI1 can be accessed from a Secure, Privileged context.
3060 #define ACCESSCTRL_SPI1_SP_RESET _u(0x1)
3061 #define ACCESSCTRL_SPI1_SP_BITS _u(0x00000008)
3062 #define ACCESSCTRL_SPI1_SP_MSB _u(3)
3063 #define ACCESSCTRL_SPI1_SP_LSB _u(3)
3064 #define ACCESSCTRL_SPI1_SP_ACCESS "RW"
3065 // -----------------------------------------------------------------------------
3066 // Field : ACCESSCTRL_SPI1_SU
3067 // Description : If 1, and SP is also set, SPI1 can be accessed from a Secure,
3068 // Unprivileged context.
3069 #define ACCESSCTRL_SPI1_SU_RESET _u(0x1)
3070 #define ACCESSCTRL_SPI1_SU_BITS _u(0x00000004)
3071 #define ACCESSCTRL_SPI1_SU_MSB _u(2)
3072 #define ACCESSCTRL_SPI1_SU_LSB _u(2)
3073 #define ACCESSCTRL_SPI1_SU_ACCESS "RW"
3074 // -----------------------------------------------------------------------------
3075 // Field : ACCESSCTRL_SPI1_NSP
3076 // Description : If 1, SPI1 can be accessed from a Non-secure, Privileged
3078 #define ACCESSCTRL_SPI1_NSP_RESET _u(0x0)
3079 #define ACCESSCTRL_SPI1_NSP_BITS _u(0x00000002)
3080 #define ACCESSCTRL_SPI1_NSP_MSB _u(1)
3081 #define ACCESSCTRL_SPI1_NSP_LSB _u(1)
3082 #define ACCESSCTRL_SPI1_NSP_ACCESS "RW"
3083 // -----------------------------------------------------------------------------
3084 // Field : ACCESSCTRL_SPI1_NSU
3085 // Description : If 1, and NSP is also set, SPI1 can be accessed from a Non-
3086 // secure, Unprivileged context.
3088 // This bit is writable from a Non-secure, Privileged context, if
3089 // and only if the NSP bit is set.
3090 #define ACCESSCTRL_SPI1_NSU_RESET _u(0x0)
3091 #define ACCESSCTRL_SPI1_NSU_BITS _u(0x00000001)
3092 #define ACCESSCTRL_SPI1_NSU_MSB _u(0)
3093 #define ACCESSCTRL_SPI1_NSU_LSB _u(0)
3094 #define ACCESSCTRL_SPI1_NSU_ACCESS "RW"
3095 // =============================================================================
3096 // Register : ACCESSCTRL_TIMER0
3097 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3098 // TIMER0, and at what security/privilege levels they can do so.
3100 // Defaults to Secure access from any master.
3102 // This register is writable only from a Secure, Privileged
3103 // processor or debugger, with the exception of the NSU bit, which
3104 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3105 #define ACCESSCTRL_TIMER0_OFFSET _u(0x00000098)
3106 #define ACCESSCTRL_TIMER0_BITS _u(0x000000ff)
3107 #define ACCESSCTRL_TIMER0_RESET _u(0x000000fc)
3108 // -----------------------------------------------------------------------------
3109 // Field : ACCESSCTRL_TIMER0_DBG
3110 // Description : If 1, TIMER0 can be accessed by the debugger, at
3111 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3113 #define ACCESSCTRL_TIMER0_DBG_RESET _u(0x1)
3114 #define ACCESSCTRL_TIMER0_DBG_BITS _u(0x00000080)
3115 #define ACCESSCTRL_TIMER0_DBG_MSB _u(7)
3116 #define ACCESSCTRL_TIMER0_DBG_LSB _u(7)
3117 #define ACCESSCTRL_TIMER0_DBG_ACCESS "RW"
3118 // -----------------------------------------------------------------------------
3119 // Field : ACCESSCTRL_TIMER0_DMA
3120 // Description : If 1, TIMER0 can be accessed by the DMA, at security/privilege
3121 // levels permitted by SP/NSP/SU/NSU in this register.
3122 #define ACCESSCTRL_TIMER0_DMA_RESET _u(0x1)
3123 #define ACCESSCTRL_TIMER0_DMA_BITS _u(0x00000040)
3124 #define ACCESSCTRL_TIMER0_DMA_MSB _u(6)
3125 #define ACCESSCTRL_TIMER0_DMA_LSB _u(6)
3126 #define ACCESSCTRL_TIMER0_DMA_ACCESS "RW"
3127 // -----------------------------------------------------------------------------
3128 // Field : ACCESSCTRL_TIMER0_CORE1
3129 // Description : If 1, TIMER0 can be accessed by core 1, at security/privilege
3130 // levels permitted by SP/NSP/SU/NSU in this register.
3131 #define ACCESSCTRL_TIMER0_CORE1_RESET _u(0x1)
3132 #define ACCESSCTRL_TIMER0_CORE1_BITS _u(0x00000020)
3133 #define ACCESSCTRL_TIMER0_CORE1_MSB _u(5)
3134 #define ACCESSCTRL_TIMER0_CORE1_LSB _u(5)
3135 #define ACCESSCTRL_TIMER0_CORE1_ACCESS "RW"
3136 // -----------------------------------------------------------------------------
3137 // Field : ACCESSCTRL_TIMER0_CORE0
3138 // Description : If 1, TIMER0 can be accessed by core 0, at security/privilege
3139 // levels permitted by SP/NSP/SU/NSU in this register.
3140 #define ACCESSCTRL_TIMER0_CORE0_RESET _u(0x1)
3141 #define ACCESSCTRL_TIMER0_CORE0_BITS _u(0x00000010)
3142 #define ACCESSCTRL_TIMER0_CORE0_MSB _u(4)
3143 #define ACCESSCTRL_TIMER0_CORE0_LSB _u(4)
3144 #define ACCESSCTRL_TIMER0_CORE0_ACCESS "RW"
3145 // -----------------------------------------------------------------------------
3146 // Field : ACCESSCTRL_TIMER0_SP
3147 // Description : If 1, TIMER0 can be accessed from a Secure, Privileged context.
3148 #define ACCESSCTRL_TIMER0_SP_RESET _u(0x1)
3149 #define ACCESSCTRL_TIMER0_SP_BITS _u(0x00000008)
3150 #define ACCESSCTRL_TIMER0_SP_MSB _u(3)
3151 #define ACCESSCTRL_TIMER0_SP_LSB _u(3)
3152 #define ACCESSCTRL_TIMER0_SP_ACCESS "RW"
3153 // -----------------------------------------------------------------------------
3154 // Field : ACCESSCTRL_TIMER0_SU
3155 // Description : If 1, and SP is also set, TIMER0 can be accessed from a Secure,
3156 // Unprivileged context.
3157 #define ACCESSCTRL_TIMER0_SU_RESET _u(0x1)
3158 #define ACCESSCTRL_TIMER0_SU_BITS _u(0x00000004)
3159 #define ACCESSCTRL_TIMER0_SU_MSB _u(2)
3160 #define ACCESSCTRL_TIMER0_SU_LSB _u(2)
3161 #define ACCESSCTRL_TIMER0_SU_ACCESS "RW"
3162 // -----------------------------------------------------------------------------
3163 // Field : ACCESSCTRL_TIMER0_NSP
3164 // Description : If 1, TIMER0 can be accessed from a Non-secure, Privileged
3166 #define ACCESSCTRL_TIMER0_NSP_RESET _u(0x0)
3167 #define ACCESSCTRL_TIMER0_NSP_BITS _u(0x00000002)
3168 #define ACCESSCTRL_TIMER0_NSP_MSB _u(1)
3169 #define ACCESSCTRL_TIMER0_NSP_LSB _u(1)
3170 #define ACCESSCTRL_TIMER0_NSP_ACCESS "RW"
3171 // -----------------------------------------------------------------------------
3172 // Field : ACCESSCTRL_TIMER0_NSU
3173 // Description : If 1, and NSP is also set, TIMER0 can be accessed from a Non-
3174 // secure, Unprivileged context.
3176 // This bit is writable from a Non-secure, Privileged context, if
3177 // and only if the NSP bit is set.
3178 #define ACCESSCTRL_TIMER0_NSU_RESET _u(0x0)
3179 #define ACCESSCTRL_TIMER0_NSU_BITS _u(0x00000001)
3180 #define ACCESSCTRL_TIMER0_NSU_MSB _u(0)
3181 #define ACCESSCTRL_TIMER0_NSU_LSB _u(0)
3182 #define ACCESSCTRL_TIMER0_NSU_ACCESS "RW"
3183 // =============================================================================
3184 // Register : ACCESSCTRL_TIMER1
3185 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3186 // TIMER1, and at what security/privilege levels they can do so.
3188 // Defaults to Secure access from any master.
3190 // This register is writable only from a Secure, Privileged
3191 // processor or debugger, with the exception of the NSU bit, which
3192 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3193 #define ACCESSCTRL_TIMER1_OFFSET _u(0x0000009c)
3194 #define ACCESSCTRL_TIMER1_BITS _u(0x000000ff)
3195 #define ACCESSCTRL_TIMER1_RESET _u(0x000000fc)
3196 // -----------------------------------------------------------------------------
3197 // Field : ACCESSCTRL_TIMER1_DBG
3198 // Description : If 1, TIMER1 can be accessed by the debugger, at
3199 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3201 #define ACCESSCTRL_TIMER1_DBG_RESET _u(0x1)
3202 #define ACCESSCTRL_TIMER1_DBG_BITS _u(0x00000080)
3203 #define ACCESSCTRL_TIMER1_DBG_MSB _u(7)
3204 #define ACCESSCTRL_TIMER1_DBG_LSB _u(7)
3205 #define ACCESSCTRL_TIMER1_DBG_ACCESS "RW"
3206 // -----------------------------------------------------------------------------
3207 // Field : ACCESSCTRL_TIMER1_DMA
3208 // Description : If 1, TIMER1 can be accessed by the DMA, at security/privilege
3209 // levels permitted by SP/NSP/SU/NSU in this register.
3210 #define ACCESSCTRL_TIMER1_DMA_RESET _u(0x1)
3211 #define ACCESSCTRL_TIMER1_DMA_BITS _u(0x00000040)
3212 #define ACCESSCTRL_TIMER1_DMA_MSB _u(6)
3213 #define ACCESSCTRL_TIMER1_DMA_LSB _u(6)
3214 #define ACCESSCTRL_TIMER1_DMA_ACCESS "RW"
3215 // -----------------------------------------------------------------------------
3216 // Field : ACCESSCTRL_TIMER1_CORE1
3217 // Description : If 1, TIMER1 can be accessed by core 1, at security/privilege
3218 // levels permitted by SP/NSP/SU/NSU in this register.
3219 #define ACCESSCTRL_TIMER1_CORE1_RESET _u(0x1)
3220 #define ACCESSCTRL_TIMER1_CORE1_BITS _u(0x00000020)
3221 #define ACCESSCTRL_TIMER1_CORE1_MSB _u(5)
3222 #define ACCESSCTRL_TIMER1_CORE1_LSB _u(5)
3223 #define ACCESSCTRL_TIMER1_CORE1_ACCESS "RW"
3224 // -----------------------------------------------------------------------------
3225 // Field : ACCESSCTRL_TIMER1_CORE0
3226 // Description : If 1, TIMER1 can be accessed by core 0, at security/privilege
3227 // levels permitted by SP/NSP/SU/NSU in this register.
3228 #define ACCESSCTRL_TIMER1_CORE0_RESET _u(0x1)
3229 #define ACCESSCTRL_TIMER1_CORE0_BITS _u(0x00000010)
3230 #define ACCESSCTRL_TIMER1_CORE0_MSB _u(4)
3231 #define ACCESSCTRL_TIMER1_CORE0_LSB _u(4)
3232 #define ACCESSCTRL_TIMER1_CORE0_ACCESS "RW"
3233 // -----------------------------------------------------------------------------
3234 // Field : ACCESSCTRL_TIMER1_SP
3235 // Description : If 1, TIMER1 can be accessed from a Secure, Privileged context.
3236 #define ACCESSCTRL_TIMER1_SP_RESET _u(0x1)
3237 #define ACCESSCTRL_TIMER1_SP_BITS _u(0x00000008)
3238 #define ACCESSCTRL_TIMER1_SP_MSB _u(3)
3239 #define ACCESSCTRL_TIMER1_SP_LSB _u(3)
3240 #define ACCESSCTRL_TIMER1_SP_ACCESS "RW"
3241 // -----------------------------------------------------------------------------
3242 // Field : ACCESSCTRL_TIMER1_SU
3243 // Description : If 1, and SP is also set, TIMER1 can be accessed from a Secure,
3244 // Unprivileged context.
3245 #define ACCESSCTRL_TIMER1_SU_RESET _u(0x1)
3246 #define ACCESSCTRL_TIMER1_SU_BITS _u(0x00000004)
3247 #define ACCESSCTRL_TIMER1_SU_MSB _u(2)
3248 #define ACCESSCTRL_TIMER1_SU_LSB _u(2)
3249 #define ACCESSCTRL_TIMER1_SU_ACCESS "RW"
3250 // -----------------------------------------------------------------------------
3251 // Field : ACCESSCTRL_TIMER1_NSP
3252 // Description : If 1, TIMER1 can be accessed from a Non-secure, Privileged
3254 #define ACCESSCTRL_TIMER1_NSP_RESET _u(0x0)
3255 #define ACCESSCTRL_TIMER1_NSP_BITS _u(0x00000002)
3256 #define ACCESSCTRL_TIMER1_NSP_MSB _u(1)
3257 #define ACCESSCTRL_TIMER1_NSP_LSB _u(1)
3258 #define ACCESSCTRL_TIMER1_NSP_ACCESS "RW"
3259 // -----------------------------------------------------------------------------
3260 // Field : ACCESSCTRL_TIMER1_NSU
3261 // Description : If 1, and NSP is also set, TIMER1 can be accessed from a Non-
3262 // secure, Unprivileged context.
3264 // This bit is writable from a Non-secure, Privileged context, if
3265 // and only if the NSP bit is set.
3266 #define ACCESSCTRL_TIMER1_NSU_RESET _u(0x0)
3267 #define ACCESSCTRL_TIMER1_NSU_BITS _u(0x00000001)
3268 #define ACCESSCTRL_TIMER1_NSU_MSB _u(0)
3269 #define ACCESSCTRL_TIMER1_NSU_LSB _u(0)
3270 #define ACCESSCTRL_TIMER1_NSU_ACCESS "RW"
3271 // =============================================================================
3272 // Register : ACCESSCTRL_UART0
3273 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3274 // UART0, and at what security/privilege levels they can do so.
3276 // Defaults to Secure access from any master.
3278 // This register is writable only from a Secure, Privileged
3279 // processor or debugger, with the exception of the NSU bit, which
3280 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3281 #define ACCESSCTRL_UART0_OFFSET _u(0x000000a0)
3282 #define ACCESSCTRL_UART0_BITS _u(0x000000ff)
3283 #define ACCESSCTRL_UART0_RESET _u(0x000000fc)
3284 // -----------------------------------------------------------------------------
3285 // Field : ACCESSCTRL_UART0_DBG
3286 // Description : If 1, UART0 can be accessed by the debugger, at
3287 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3289 #define ACCESSCTRL_UART0_DBG_RESET _u(0x1)
3290 #define ACCESSCTRL_UART0_DBG_BITS _u(0x00000080)
3291 #define ACCESSCTRL_UART0_DBG_MSB _u(7)
3292 #define ACCESSCTRL_UART0_DBG_LSB _u(7)
3293 #define ACCESSCTRL_UART0_DBG_ACCESS "RW"
3294 // -----------------------------------------------------------------------------
3295 // Field : ACCESSCTRL_UART0_DMA
3296 // Description : If 1, UART0 can be accessed by the DMA, at security/privilege
3297 // levels permitted by SP/NSP/SU/NSU in this register.
3298 #define ACCESSCTRL_UART0_DMA_RESET _u(0x1)
3299 #define ACCESSCTRL_UART0_DMA_BITS _u(0x00000040)
3300 #define ACCESSCTRL_UART0_DMA_MSB _u(6)
3301 #define ACCESSCTRL_UART0_DMA_LSB _u(6)
3302 #define ACCESSCTRL_UART0_DMA_ACCESS "RW"
3303 // -----------------------------------------------------------------------------
3304 // Field : ACCESSCTRL_UART0_CORE1
3305 // Description : If 1, UART0 can be accessed by core 1, at security/privilege
3306 // levels permitted by SP/NSP/SU/NSU in this register.
3307 #define ACCESSCTRL_UART0_CORE1_RESET _u(0x1)
3308 #define ACCESSCTRL_UART0_CORE1_BITS _u(0x00000020)
3309 #define ACCESSCTRL_UART0_CORE1_MSB _u(5)
3310 #define ACCESSCTRL_UART0_CORE1_LSB _u(5)
3311 #define ACCESSCTRL_UART0_CORE1_ACCESS "RW"
3312 // -----------------------------------------------------------------------------
3313 // Field : ACCESSCTRL_UART0_CORE0
3314 // Description : If 1, UART0 can be accessed by core 0, at security/privilege
3315 // levels permitted by SP/NSP/SU/NSU in this register.
3316 #define ACCESSCTRL_UART0_CORE0_RESET _u(0x1)
3317 #define ACCESSCTRL_UART0_CORE0_BITS _u(0x00000010)
3318 #define ACCESSCTRL_UART0_CORE0_MSB _u(4)
3319 #define ACCESSCTRL_UART0_CORE0_LSB _u(4)
3320 #define ACCESSCTRL_UART0_CORE0_ACCESS "RW"
3321 // -----------------------------------------------------------------------------
3322 // Field : ACCESSCTRL_UART0_SP
3323 // Description : If 1, UART0 can be accessed from a Secure, Privileged context.
3324 #define ACCESSCTRL_UART0_SP_RESET _u(0x1)
3325 #define ACCESSCTRL_UART0_SP_BITS _u(0x00000008)
3326 #define ACCESSCTRL_UART0_SP_MSB _u(3)
3327 #define ACCESSCTRL_UART0_SP_LSB _u(3)
3328 #define ACCESSCTRL_UART0_SP_ACCESS "RW"
3329 // -----------------------------------------------------------------------------
3330 // Field : ACCESSCTRL_UART0_SU
3331 // Description : If 1, and SP is also set, UART0 can be accessed from a Secure,
3332 // Unprivileged context.
3333 #define ACCESSCTRL_UART0_SU_RESET _u(0x1)
3334 #define ACCESSCTRL_UART0_SU_BITS _u(0x00000004)
3335 #define ACCESSCTRL_UART0_SU_MSB _u(2)
3336 #define ACCESSCTRL_UART0_SU_LSB _u(2)
3337 #define ACCESSCTRL_UART0_SU_ACCESS "RW"
3338 // -----------------------------------------------------------------------------
3339 // Field : ACCESSCTRL_UART0_NSP
3340 // Description : If 1, UART0 can be accessed from a Non-secure, Privileged
3342 #define ACCESSCTRL_UART0_NSP_RESET _u(0x0)
3343 #define ACCESSCTRL_UART0_NSP_BITS _u(0x00000002)
3344 #define ACCESSCTRL_UART0_NSP_MSB _u(1)
3345 #define ACCESSCTRL_UART0_NSP_LSB _u(1)
3346 #define ACCESSCTRL_UART0_NSP_ACCESS "RW"
3347 // -----------------------------------------------------------------------------
3348 // Field : ACCESSCTRL_UART0_NSU
3349 // Description : If 1, and NSP is also set, UART0 can be accessed from a Non-
3350 // secure, Unprivileged context.
3352 // This bit is writable from a Non-secure, Privileged context, if
3353 // and only if the NSP bit is set.
3354 #define ACCESSCTRL_UART0_NSU_RESET _u(0x0)
3355 #define ACCESSCTRL_UART0_NSU_BITS _u(0x00000001)
3356 #define ACCESSCTRL_UART0_NSU_MSB _u(0)
3357 #define ACCESSCTRL_UART0_NSU_LSB _u(0)
3358 #define ACCESSCTRL_UART0_NSU_ACCESS "RW"
3359 // =============================================================================
3360 // Register : ACCESSCTRL_UART1
3361 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3362 // UART1, and at what security/privilege levels they can do so.
3364 // Defaults to Secure access from any master.
3366 // This register is writable only from a Secure, Privileged
3367 // processor or debugger, with the exception of the NSU bit, which
3368 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3369 #define ACCESSCTRL_UART1_OFFSET _u(0x000000a4)
3370 #define ACCESSCTRL_UART1_BITS _u(0x000000ff)
3371 #define ACCESSCTRL_UART1_RESET _u(0x000000fc)
3372 // -----------------------------------------------------------------------------
3373 // Field : ACCESSCTRL_UART1_DBG
3374 // Description : If 1, UART1 can be accessed by the debugger, at
3375 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3377 #define ACCESSCTRL_UART1_DBG_RESET _u(0x1)
3378 #define ACCESSCTRL_UART1_DBG_BITS _u(0x00000080)
3379 #define ACCESSCTRL_UART1_DBG_MSB _u(7)
3380 #define ACCESSCTRL_UART1_DBG_LSB _u(7)
3381 #define ACCESSCTRL_UART1_DBG_ACCESS "RW"
3382 // -----------------------------------------------------------------------------
3383 // Field : ACCESSCTRL_UART1_DMA
3384 // Description : If 1, UART1 can be accessed by the DMA, at security/privilege
3385 // levels permitted by SP/NSP/SU/NSU in this register.
3386 #define ACCESSCTRL_UART1_DMA_RESET _u(0x1)
3387 #define ACCESSCTRL_UART1_DMA_BITS _u(0x00000040)
3388 #define ACCESSCTRL_UART1_DMA_MSB _u(6)
3389 #define ACCESSCTRL_UART1_DMA_LSB _u(6)
3390 #define ACCESSCTRL_UART1_DMA_ACCESS "RW"
3391 // -----------------------------------------------------------------------------
3392 // Field : ACCESSCTRL_UART1_CORE1
3393 // Description : If 1, UART1 can be accessed by core 1, at security/privilege
3394 // levels permitted by SP/NSP/SU/NSU in this register.
3395 #define ACCESSCTRL_UART1_CORE1_RESET _u(0x1)
3396 #define ACCESSCTRL_UART1_CORE1_BITS _u(0x00000020)
3397 #define ACCESSCTRL_UART1_CORE1_MSB _u(5)
3398 #define ACCESSCTRL_UART1_CORE1_LSB _u(5)
3399 #define ACCESSCTRL_UART1_CORE1_ACCESS "RW"
3400 // -----------------------------------------------------------------------------
3401 // Field : ACCESSCTRL_UART1_CORE0
3402 // Description : If 1, UART1 can be accessed by core 0, at security/privilege
3403 // levels permitted by SP/NSP/SU/NSU in this register.
3404 #define ACCESSCTRL_UART1_CORE0_RESET _u(0x1)
3405 #define ACCESSCTRL_UART1_CORE0_BITS _u(0x00000010)
3406 #define ACCESSCTRL_UART1_CORE0_MSB _u(4)
3407 #define ACCESSCTRL_UART1_CORE0_LSB _u(4)
3408 #define ACCESSCTRL_UART1_CORE0_ACCESS "RW"
3409 // -----------------------------------------------------------------------------
3410 // Field : ACCESSCTRL_UART1_SP
3411 // Description : If 1, UART1 can be accessed from a Secure, Privileged context.
3412 #define ACCESSCTRL_UART1_SP_RESET _u(0x1)
3413 #define ACCESSCTRL_UART1_SP_BITS _u(0x00000008)
3414 #define ACCESSCTRL_UART1_SP_MSB _u(3)
3415 #define ACCESSCTRL_UART1_SP_LSB _u(3)
3416 #define ACCESSCTRL_UART1_SP_ACCESS "RW"
3417 // -----------------------------------------------------------------------------
3418 // Field : ACCESSCTRL_UART1_SU
3419 // Description : If 1, and SP is also set, UART1 can be accessed from a Secure,
3420 // Unprivileged context.
3421 #define ACCESSCTRL_UART1_SU_RESET _u(0x1)
3422 #define ACCESSCTRL_UART1_SU_BITS _u(0x00000004)
3423 #define ACCESSCTRL_UART1_SU_MSB _u(2)
3424 #define ACCESSCTRL_UART1_SU_LSB _u(2)
3425 #define ACCESSCTRL_UART1_SU_ACCESS "RW"
3426 // -----------------------------------------------------------------------------
3427 // Field : ACCESSCTRL_UART1_NSP
3428 // Description : If 1, UART1 can be accessed from a Non-secure, Privileged
3430 #define ACCESSCTRL_UART1_NSP_RESET _u(0x0)
3431 #define ACCESSCTRL_UART1_NSP_BITS _u(0x00000002)
3432 #define ACCESSCTRL_UART1_NSP_MSB _u(1)
3433 #define ACCESSCTRL_UART1_NSP_LSB _u(1)
3434 #define ACCESSCTRL_UART1_NSP_ACCESS "RW"
3435 // -----------------------------------------------------------------------------
3436 // Field : ACCESSCTRL_UART1_NSU
3437 // Description : If 1, and NSP is also set, UART1 can be accessed from a Non-
3438 // secure, Unprivileged context.
3440 // This bit is writable from a Non-secure, Privileged context, if
3441 // and only if the NSP bit is set.
3442 #define ACCESSCTRL_UART1_NSU_RESET _u(0x0)
3443 #define ACCESSCTRL_UART1_NSU_BITS _u(0x00000001)
3444 #define ACCESSCTRL_UART1_NSU_MSB _u(0)
3445 #define ACCESSCTRL_UART1_NSU_LSB _u(0)
3446 #define ACCESSCTRL_UART1_NSU_ACCESS "RW"
3447 // =============================================================================
3448 // Register : ACCESSCTRL_OTP
3449 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3450 // OTP, and at what security/privilege levels they can do so.
3452 // Defaults to Secure access from any master.
3454 // This register is writable only from a Secure, Privileged
3455 // processor or debugger, with the exception of the NSU bit, which
3456 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3457 #define ACCESSCTRL_OTP_OFFSET _u(0x000000a8)
3458 #define ACCESSCTRL_OTP_BITS _u(0x000000ff)
3459 #define ACCESSCTRL_OTP_RESET _u(0x000000fc)
3460 // -----------------------------------------------------------------------------
3461 // Field : ACCESSCTRL_OTP_DBG
3462 // Description : If 1, OTP can be accessed by the debugger, at
3463 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3465 #define ACCESSCTRL_OTP_DBG_RESET _u(0x1)
3466 #define ACCESSCTRL_OTP_DBG_BITS _u(0x00000080)
3467 #define ACCESSCTRL_OTP_DBG_MSB _u(7)
3468 #define ACCESSCTRL_OTP_DBG_LSB _u(7)
3469 #define ACCESSCTRL_OTP_DBG_ACCESS "RW"
3470 // -----------------------------------------------------------------------------
3471 // Field : ACCESSCTRL_OTP_DMA
3472 // Description : If 1, OTP can be accessed by the DMA, at security/privilege
3473 // levels permitted by SP/NSP/SU/NSU in this register.
3474 #define ACCESSCTRL_OTP_DMA_RESET _u(0x1)
3475 #define ACCESSCTRL_OTP_DMA_BITS _u(0x00000040)
3476 #define ACCESSCTRL_OTP_DMA_MSB _u(6)
3477 #define ACCESSCTRL_OTP_DMA_LSB _u(6)
3478 #define ACCESSCTRL_OTP_DMA_ACCESS "RW"
3479 // -----------------------------------------------------------------------------
3480 // Field : ACCESSCTRL_OTP_CORE1
3481 // Description : If 1, OTP can be accessed by core 1, at security/privilege
3482 // levels permitted by SP/NSP/SU/NSU in this register.
3483 #define ACCESSCTRL_OTP_CORE1_RESET _u(0x1)
3484 #define ACCESSCTRL_OTP_CORE1_BITS _u(0x00000020)
3485 #define ACCESSCTRL_OTP_CORE1_MSB _u(5)
3486 #define ACCESSCTRL_OTP_CORE1_LSB _u(5)
3487 #define ACCESSCTRL_OTP_CORE1_ACCESS "RW"
3488 // -----------------------------------------------------------------------------
3489 // Field : ACCESSCTRL_OTP_CORE0
3490 // Description : If 1, OTP can be accessed by core 0, at security/privilege
3491 // levels permitted by SP/NSP/SU/NSU in this register.
3492 #define ACCESSCTRL_OTP_CORE0_RESET _u(0x1)
3493 #define ACCESSCTRL_OTP_CORE0_BITS _u(0x00000010)
3494 #define ACCESSCTRL_OTP_CORE0_MSB _u(4)
3495 #define ACCESSCTRL_OTP_CORE0_LSB _u(4)
3496 #define ACCESSCTRL_OTP_CORE0_ACCESS "RW"
3497 // -----------------------------------------------------------------------------
3498 // Field : ACCESSCTRL_OTP_SP
3499 // Description : If 1, OTP can be accessed from a Secure, Privileged context.
3500 #define ACCESSCTRL_OTP_SP_RESET _u(0x1)
3501 #define ACCESSCTRL_OTP_SP_BITS _u(0x00000008)
3502 #define ACCESSCTRL_OTP_SP_MSB _u(3)
3503 #define ACCESSCTRL_OTP_SP_LSB _u(3)
3504 #define ACCESSCTRL_OTP_SP_ACCESS "RW"
3505 // -----------------------------------------------------------------------------
3506 // Field : ACCESSCTRL_OTP_SU
3507 // Description : If 1, and SP is also set, OTP can be accessed from a Secure,
3508 // Unprivileged context.
3509 #define ACCESSCTRL_OTP_SU_RESET _u(0x1)
3510 #define ACCESSCTRL_OTP_SU_BITS _u(0x00000004)
3511 #define ACCESSCTRL_OTP_SU_MSB _u(2)
3512 #define ACCESSCTRL_OTP_SU_LSB _u(2)
3513 #define ACCESSCTRL_OTP_SU_ACCESS "RW"
3514 // -----------------------------------------------------------------------------
3515 // Field : ACCESSCTRL_OTP_NSP
3516 // Description : If 1, OTP can be accessed from a Non-secure, Privileged
3518 #define ACCESSCTRL_OTP_NSP_RESET _u(0x0)
3519 #define ACCESSCTRL_OTP_NSP_BITS _u(0x00000002)
3520 #define ACCESSCTRL_OTP_NSP_MSB _u(1)
3521 #define ACCESSCTRL_OTP_NSP_LSB _u(1)
3522 #define ACCESSCTRL_OTP_NSP_ACCESS "RW"
3523 // -----------------------------------------------------------------------------
3524 // Field : ACCESSCTRL_OTP_NSU
3525 // Description : If 1, and NSP is also set, OTP can be accessed from a Non-
3526 // secure, Unprivileged context.
3528 // This bit is writable from a Non-secure, Privileged context, if
3529 // and only if the NSP bit is set.
3530 #define ACCESSCTRL_OTP_NSU_RESET _u(0x0)
3531 #define ACCESSCTRL_OTP_NSU_BITS _u(0x00000001)
3532 #define ACCESSCTRL_OTP_NSU_MSB _u(0)
3533 #define ACCESSCTRL_OTP_NSU_LSB _u(0)
3534 #define ACCESSCTRL_OTP_NSU_ACCESS "RW"
3535 // =============================================================================
3536 // Register : ACCESSCTRL_TBMAN
3537 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3538 // TBMAN, and at what security/privilege levels they can do so.
3540 // Defaults to Secure access from any master.
3542 // This register is writable only from a Secure, Privileged
3543 // processor or debugger, with the exception of the NSU bit, which
3544 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3545 #define ACCESSCTRL_TBMAN_OFFSET _u(0x000000ac)
3546 #define ACCESSCTRL_TBMAN_BITS _u(0x000000ff)
3547 #define ACCESSCTRL_TBMAN_RESET _u(0x000000fc)
3548 // -----------------------------------------------------------------------------
3549 // Field : ACCESSCTRL_TBMAN_DBG
3550 // Description : If 1, TBMAN can be accessed by the debugger, at
3551 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3553 #define ACCESSCTRL_TBMAN_DBG_RESET _u(0x1)
3554 #define ACCESSCTRL_TBMAN_DBG_BITS _u(0x00000080)
3555 #define ACCESSCTRL_TBMAN_DBG_MSB _u(7)
3556 #define ACCESSCTRL_TBMAN_DBG_LSB _u(7)
3557 #define ACCESSCTRL_TBMAN_DBG_ACCESS "RW"
3558 // -----------------------------------------------------------------------------
3559 // Field : ACCESSCTRL_TBMAN_DMA
3560 // Description : If 1, TBMAN can be accessed by the DMA, at security/privilege
3561 // levels permitted by SP/NSP/SU/NSU in this register.
3562 #define ACCESSCTRL_TBMAN_DMA_RESET _u(0x1)
3563 #define ACCESSCTRL_TBMAN_DMA_BITS _u(0x00000040)
3564 #define ACCESSCTRL_TBMAN_DMA_MSB _u(6)
3565 #define ACCESSCTRL_TBMAN_DMA_LSB _u(6)
3566 #define ACCESSCTRL_TBMAN_DMA_ACCESS "RW"
3567 // -----------------------------------------------------------------------------
3568 // Field : ACCESSCTRL_TBMAN_CORE1
3569 // Description : If 1, TBMAN can be accessed by core 1, at security/privilege
3570 // levels permitted by SP/NSP/SU/NSU in this register.
3571 #define ACCESSCTRL_TBMAN_CORE1_RESET _u(0x1)
3572 #define ACCESSCTRL_TBMAN_CORE1_BITS _u(0x00000020)
3573 #define ACCESSCTRL_TBMAN_CORE1_MSB _u(5)
3574 #define ACCESSCTRL_TBMAN_CORE1_LSB _u(5)
3575 #define ACCESSCTRL_TBMAN_CORE1_ACCESS "RW"
3576 // -----------------------------------------------------------------------------
3577 // Field : ACCESSCTRL_TBMAN_CORE0
3578 // Description : If 1, TBMAN can be accessed by core 0, at security/privilege
3579 // levels permitted by SP/NSP/SU/NSU in this register.
3580 #define ACCESSCTRL_TBMAN_CORE0_RESET _u(0x1)
3581 #define ACCESSCTRL_TBMAN_CORE0_BITS _u(0x00000010)
3582 #define ACCESSCTRL_TBMAN_CORE0_MSB _u(4)
3583 #define ACCESSCTRL_TBMAN_CORE0_LSB _u(4)
3584 #define ACCESSCTRL_TBMAN_CORE0_ACCESS "RW"
3585 // -----------------------------------------------------------------------------
3586 // Field : ACCESSCTRL_TBMAN_SP
3587 // Description : If 1, TBMAN can be accessed from a Secure, Privileged context.
3588 #define ACCESSCTRL_TBMAN_SP_RESET _u(0x1)
3589 #define ACCESSCTRL_TBMAN_SP_BITS _u(0x00000008)
3590 #define ACCESSCTRL_TBMAN_SP_MSB _u(3)
3591 #define ACCESSCTRL_TBMAN_SP_LSB _u(3)
3592 #define ACCESSCTRL_TBMAN_SP_ACCESS "RW"
3593 // -----------------------------------------------------------------------------
3594 // Field : ACCESSCTRL_TBMAN_SU
3595 // Description : If 1, and SP is also set, TBMAN can be accessed from a Secure,
3596 // Unprivileged context.
3597 #define ACCESSCTRL_TBMAN_SU_RESET _u(0x1)
3598 #define ACCESSCTRL_TBMAN_SU_BITS _u(0x00000004)
3599 #define ACCESSCTRL_TBMAN_SU_MSB _u(2)
3600 #define ACCESSCTRL_TBMAN_SU_LSB _u(2)
3601 #define ACCESSCTRL_TBMAN_SU_ACCESS "RW"
3602 // -----------------------------------------------------------------------------
3603 // Field : ACCESSCTRL_TBMAN_NSP
3604 // Description : If 1, TBMAN can be accessed from a Non-secure, Privileged
3606 #define ACCESSCTRL_TBMAN_NSP_RESET _u(0x0)
3607 #define ACCESSCTRL_TBMAN_NSP_BITS _u(0x00000002)
3608 #define ACCESSCTRL_TBMAN_NSP_MSB _u(1)
3609 #define ACCESSCTRL_TBMAN_NSP_LSB _u(1)
3610 #define ACCESSCTRL_TBMAN_NSP_ACCESS "RW"
3611 // -----------------------------------------------------------------------------
3612 // Field : ACCESSCTRL_TBMAN_NSU
3613 // Description : If 1, and NSP is also set, TBMAN can be accessed from a Non-
3614 // secure, Unprivileged context.
3616 // This bit is writable from a Non-secure, Privileged context, if
3617 // and only if the NSP bit is set.
3618 #define ACCESSCTRL_TBMAN_NSU_RESET _u(0x0)
3619 #define ACCESSCTRL_TBMAN_NSU_BITS _u(0x00000001)
3620 #define ACCESSCTRL_TBMAN_NSU_MSB _u(0)
3621 #define ACCESSCTRL_TBMAN_NSU_LSB _u(0)
3622 #define ACCESSCTRL_TBMAN_NSU_ACCESS "RW"
3623 // =============================================================================
3624 // Register : ACCESSCTRL_POWMAN
3625 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3626 // POWMAN, and at what security/privilege levels they can do so.
3628 // Defaults to Secure, Privileged processor or debug access only.
3630 // This register is writable only from a Secure, Privileged
3631 // processor or debugger, with the exception of the NSU bit, which
3632 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3633 #define ACCESSCTRL_POWMAN_OFFSET _u(0x000000b0)
3634 #define ACCESSCTRL_POWMAN_BITS _u(0x000000ff)
3635 #define ACCESSCTRL_POWMAN_RESET _u(0x000000b8)
3636 // -----------------------------------------------------------------------------
3637 // Field : ACCESSCTRL_POWMAN_DBG
3638 // Description : If 1, POWMAN can be accessed by the debugger, at
3639 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3641 #define ACCESSCTRL_POWMAN_DBG_RESET _u(0x1)
3642 #define ACCESSCTRL_POWMAN_DBG_BITS _u(0x00000080)
3643 #define ACCESSCTRL_POWMAN_DBG_MSB _u(7)
3644 #define ACCESSCTRL_POWMAN_DBG_LSB _u(7)
3645 #define ACCESSCTRL_POWMAN_DBG_ACCESS "RW"
3646 // -----------------------------------------------------------------------------
3647 // Field : ACCESSCTRL_POWMAN_DMA
3648 // Description : If 1, POWMAN can be accessed by the DMA, at security/privilege
3649 // levels permitted by SP/NSP/SU/NSU in this register.
3650 #define ACCESSCTRL_POWMAN_DMA_RESET _u(0x0)
3651 #define ACCESSCTRL_POWMAN_DMA_BITS _u(0x00000040)
3652 #define ACCESSCTRL_POWMAN_DMA_MSB _u(6)
3653 #define ACCESSCTRL_POWMAN_DMA_LSB _u(6)
3654 #define ACCESSCTRL_POWMAN_DMA_ACCESS "RW"
3655 // -----------------------------------------------------------------------------
3656 // Field : ACCESSCTRL_POWMAN_CORE1
3657 // Description : If 1, POWMAN can be accessed by core 1, at security/privilege
3658 // levels permitted by SP/NSP/SU/NSU in this register.
3659 #define ACCESSCTRL_POWMAN_CORE1_RESET _u(0x1)
3660 #define ACCESSCTRL_POWMAN_CORE1_BITS _u(0x00000020)
3661 #define ACCESSCTRL_POWMAN_CORE1_MSB _u(5)
3662 #define ACCESSCTRL_POWMAN_CORE1_LSB _u(5)
3663 #define ACCESSCTRL_POWMAN_CORE1_ACCESS "RW"
3664 // -----------------------------------------------------------------------------
3665 // Field : ACCESSCTRL_POWMAN_CORE0
3666 // Description : If 1, POWMAN can be accessed by core 0, at security/privilege
3667 // levels permitted by SP/NSP/SU/NSU in this register.
3668 #define ACCESSCTRL_POWMAN_CORE0_RESET _u(0x1)
3669 #define ACCESSCTRL_POWMAN_CORE0_BITS _u(0x00000010)
3670 #define ACCESSCTRL_POWMAN_CORE0_MSB _u(4)
3671 #define ACCESSCTRL_POWMAN_CORE0_LSB _u(4)
3672 #define ACCESSCTRL_POWMAN_CORE0_ACCESS "RW"
3673 // -----------------------------------------------------------------------------
3674 // Field : ACCESSCTRL_POWMAN_SP
3675 // Description : If 1, POWMAN can be accessed from a Secure, Privileged context.
3676 #define ACCESSCTRL_POWMAN_SP_RESET _u(0x1)
3677 #define ACCESSCTRL_POWMAN_SP_BITS _u(0x00000008)
3678 #define ACCESSCTRL_POWMAN_SP_MSB _u(3)
3679 #define ACCESSCTRL_POWMAN_SP_LSB _u(3)
3680 #define ACCESSCTRL_POWMAN_SP_ACCESS "RW"
3681 // -----------------------------------------------------------------------------
3682 // Field : ACCESSCTRL_POWMAN_SU
3683 // Description : If 1, and SP is also set, POWMAN can be accessed from a Secure,
3684 // Unprivileged context.
3685 #define ACCESSCTRL_POWMAN_SU_RESET _u(0x0)
3686 #define ACCESSCTRL_POWMAN_SU_BITS _u(0x00000004)
3687 #define ACCESSCTRL_POWMAN_SU_MSB _u(2)
3688 #define ACCESSCTRL_POWMAN_SU_LSB _u(2)
3689 #define ACCESSCTRL_POWMAN_SU_ACCESS "RW"
3690 // -----------------------------------------------------------------------------
3691 // Field : ACCESSCTRL_POWMAN_NSP
3692 // Description : If 1, POWMAN can be accessed from a Non-secure, Privileged
3694 #define ACCESSCTRL_POWMAN_NSP_RESET _u(0x0)
3695 #define ACCESSCTRL_POWMAN_NSP_BITS _u(0x00000002)
3696 #define ACCESSCTRL_POWMAN_NSP_MSB _u(1)
3697 #define ACCESSCTRL_POWMAN_NSP_LSB _u(1)
3698 #define ACCESSCTRL_POWMAN_NSP_ACCESS "RW"
3699 // -----------------------------------------------------------------------------
3700 // Field : ACCESSCTRL_POWMAN_NSU
3701 // Description : If 1, and NSP is also set, POWMAN can be accessed from a Non-
3702 // secure, Unprivileged context.
3704 // This bit is writable from a Non-secure, Privileged context, if
3705 // and only if the NSP bit is set.
3706 #define ACCESSCTRL_POWMAN_NSU_RESET _u(0x0)
3707 #define ACCESSCTRL_POWMAN_NSU_BITS _u(0x00000001)
3708 #define ACCESSCTRL_POWMAN_NSU_MSB _u(0)
3709 #define ACCESSCTRL_POWMAN_NSU_LSB _u(0)
3710 #define ACCESSCTRL_POWMAN_NSU_ACCESS "RW"
3711 // =============================================================================
3712 // Register : ACCESSCTRL_TRNG
3713 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3714 // TRNG, and at what security/privilege levels they can do so.
3716 // Defaults to Secure, Privileged processor or debug access only.
3718 // This register is writable only from a Secure, Privileged
3719 // processor or debugger, with the exception of the NSU bit, which
3720 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3721 #define ACCESSCTRL_TRNG_OFFSET _u(0x000000b4)
3722 #define ACCESSCTRL_TRNG_BITS _u(0x000000ff)
3723 #define ACCESSCTRL_TRNG_RESET _u(0x000000b8)
3724 // -----------------------------------------------------------------------------
3725 // Field : ACCESSCTRL_TRNG_DBG
3726 // Description : If 1, TRNG can be accessed by the debugger, at
3727 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3729 #define ACCESSCTRL_TRNG_DBG_RESET _u(0x1)
3730 #define ACCESSCTRL_TRNG_DBG_BITS _u(0x00000080)
3731 #define ACCESSCTRL_TRNG_DBG_MSB _u(7)
3732 #define ACCESSCTRL_TRNG_DBG_LSB _u(7)
3733 #define ACCESSCTRL_TRNG_DBG_ACCESS "RW"
3734 // -----------------------------------------------------------------------------
3735 // Field : ACCESSCTRL_TRNG_DMA
3736 // Description : If 1, TRNG can be accessed by the DMA, at security/privilege
3737 // levels permitted by SP/NSP/SU/NSU in this register.
3738 #define ACCESSCTRL_TRNG_DMA_RESET _u(0x0)
3739 #define ACCESSCTRL_TRNG_DMA_BITS _u(0x00000040)
3740 #define ACCESSCTRL_TRNG_DMA_MSB _u(6)
3741 #define ACCESSCTRL_TRNG_DMA_LSB _u(6)
3742 #define ACCESSCTRL_TRNG_DMA_ACCESS "RW"
3743 // -----------------------------------------------------------------------------
3744 // Field : ACCESSCTRL_TRNG_CORE1
3745 // Description : If 1, TRNG can be accessed by core 1, at security/privilege
3746 // levels permitted by SP/NSP/SU/NSU in this register.
3747 #define ACCESSCTRL_TRNG_CORE1_RESET _u(0x1)
3748 #define ACCESSCTRL_TRNG_CORE1_BITS _u(0x00000020)
3749 #define ACCESSCTRL_TRNG_CORE1_MSB _u(5)
3750 #define ACCESSCTRL_TRNG_CORE1_LSB _u(5)
3751 #define ACCESSCTRL_TRNG_CORE1_ACCESS "RW"
3752 // -----------------------------------------------------------------------------
3753 // Field : ACCESSCTRL_TRNG_CORE0
3754 // Description : If 1, TRNG can be accessed by core 0, at security/privilege
3755 // levels permitted by SP/NSP/SU/NSU in this register.
3756 #define ACCESSCTRL_TRNG_CORE0_RESET _u(0x1)
3757 #define ACCESSCTRL_TRNG_CORE0_BITS _u(0x00000010)
3758 #define ACCESSCTRL_TRNG_CORE0_MSB _u(4)
3759 #define ACCESSCTRL_TRNG_CORE0_LSB _u(4)
3760 #define ACCESSCTRL_TRNG_CORE0_ACCESS "RW"
3761 // -----------------------------------------------------------------------------
3762 // Field : ACCESSCTRL_TRNG_SP
3763 // Description : If 1, TRNG can be accessed from a Secure, Privileged context.
3764 #define ACCESSCTRL_TRNG_SP_RESET _u(0x1)
3765 #define ACCESSCTRL_TRNG_SP_BITS _u(0x00000008)
3766 #define ACCESSCTRL_TRNG_SP_MSB _u(3)
3767 #define ACCESSCTRL_TRNG_SP_LSB _u(3)
3768 #define ACCESSCTRL_TRNG_SP_ACCESS "RW"
3769 // -----------------------------------------------------------------------------
3770 // Field : ACCESSCTRL_TRNG_SU
3771 // Description : If 1, and SP is also set, TRNG can be accessed from a Secure,
3772 // Unprivileged context.
3773 #define ACCESSCTRL_TRNG_SU_RESET _u(0x0)
3774 #define ACCESSCTRL_TRNG_SU_BITS _u(0x00000004)
3775 #define ACCESSCTRL_TRNG_SU_MSB _u(2)
3776 #define ACCESSCTRL_TRNG_SU_LSB _u(2)
3777 #define ACCESSCTRL_TRNG_SU_ACCESS "RW"
3778 // -----------------------------------------------------------------------------
3779 // Field : ACCESSCTRL_TRNG_NSP
3780 // Description : If 1, TRNG can be accessed from a Non-secure, Privileged
3782 #define ACCESSCTRL_TRNG_NSP_RESET _u(0x0)
3783 #define ACCESSCTRL_TRNG_NSP_BITS _u(0x00000002)
3784 #define ACCESSCTRL_TRNG_NSP_MSB _u(1)
3785 #define ACCESSCTRL_TRNG_NSP_LSB _u(1)
3786 #define ACCESSCTRL_TRNG_NSP_ACCESS "RW"
3787 // -----------------------------------------------------------------------------
3788 // Field : ACCESSCTRL_TRNG_NSU
3789 // Description : If 1, and NSP is also set, TRNG can be accessed from a Non-
3790 // secure, Unprivileged context.
3792 // This bit is writable from a Non-secure, Privileged context, if
3793 // and only if the NSP bit is set.
3794 #define ACCESSCTRL_TRNG_NSU_RESET _u(0x0)
3795 #define ACCESSCTRL_TRNG_NSU_BITS _u(0x00000001)
3796 #define ACCESSCTRL_TRNG_NSU_MSB _u(0)
3797 #define ACCESSCTRL_TRNG_NSU_LSB _u(0)
3798 #define ACCESSCTRL_TRNG_NSU_ACCESS "RW"
3799 // =============================================================================
3800 // Register : ACCESSCTRL_SHA256
3801 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3802 // SHA256, and at what security/privilege levels they can do so.
3804 // Defaults to Secure, Privileged access only.
3806 // This register is writable only from a Secure, Privileged
3807 // processor or debugger, with the exception of the NSU bit, which
3808 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3809 #define ACCESSCTRL_SHA256_OFFSET _u(0x000000b8)
3810 #define ACCESSCTRL_SHA256_BITS _u(0x000000ff)
3811 #define ACCESSCTRL_SHA256_RESET _u(0x000000f8)
3812 // -----------------------------------------------------------------------------
3813 // Field : ACCESSCTRL_SHA256_DBG
3814 // Description : If 1, SHA256 can be accessed by the debugger, at
3815 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3817 #define ACCESSCTRL_SHA256_DBG_RESET _u(0x1)
3818 #define ACCESSCTRL_SHA256_DBG_BITS _u(0x00000080)
3819 #define ACCESSCTRL_SHA256_DBG_MSB _u(7)
3820 #define ACCESSCTRL_SHA256_DBG_LSB _u(7)
3821 #define ACCESSCTRL_SHA256_DBG_ACCESS "RW"
3822 // -----------------------------------------------------------------------------
3823 // Field : ACCESSCTRL_SHA256_DMA
3824 // Description : If 1, SHA256 can be accessed by the DMA, at security/privilege
3825 // levels permitted by SP/NSP/SU/NSU in this register.
3826 #define ACCESSCTRL_SHA256_DMA_RESET _u(0x1)
3827 #define ACCESSCTRL_SHA256_DMA_BITS _u(0x00000040)
3828 #define ACCESSCTRL_SHA256_DMA_MSB _u(6)
3829 #define ACCESSCTRL_SHA256_DMA_LSB _u(6)
3830 #define ACCESSCTRL_SHA256_DMA_ACCESS "RW"
3831 // -----------------------------------------------------------------------------
3832 // Field : ACCESSCTRL_SHA256_CORE1
3833 // Description : If 1, SHA256 can be accessed by core 1, at security/privilege
3834 // levels permitted by SP/NSP/SU/NSU in this register.
3835 #define ACCESSCTRL_SHA256_CORE1_RESET _u(0x1)
3836 #define ACCESSCTRL_SHA256_CORE1_BITS _u(0x00000020)
3837 #define ACCESSCTRL_SHA256_CORE1_MSB _u(5)
3838 #define ACCESSCTRL_SHA256_CORE1_LSB _u(5)
3839 #define ACCESSCTRL_SHA256_CORE1_ACCESS "RW"
3840 // -----------------------------------------------------------------------------
3841 // Field : ACCESSCTRL_SHA256_CORE0
3842 // Description : If 1, SHA256 can be accessed by core 0, at security/privilege
3843 // levels permitted by SP/NSP/SU/NSU in this register.
3844 #define ACCESSCTRL_SHA256_CORE0_RESET _u(0x1)
3845 #define ACCESSCTRL_SHA256_CORE0_BITS _u(0x00000010)
3846 #define ACCESSCTRL_SHA256_CORE0_MSB _u(4)
3847 #define ACCESSCTRL_SHA256_CORE0_LSB _u(4)
3848 #define ACCESSCTRL_SHA256_CORE0_ACCESS "RW"
3849 // -----------------------------------------------------------------------------
3850 // Field : ACCESSCTRL_SHA256_SP
3851 // Description : If 1, SHA256 can be accessed from a Secure, Privileged context.
3852 #define ACCESSCTRL_SHA256_SP_RESET _u(0x1)
3853 #define ACCESSCTRL_SHA256_SP_BITS _u(0x00000008)
3854 #define ACCESSCTRL_SHA256_SP_MSB _u(3)
3855 #define ACCESSCTRL_SHA256_SP_LSB _u(3)
3856 #define ACCESSCTRL_SHA256_SP_ACCESS "RW"
3857 // -----------------------------------------------------------------------------
3858 // Field : ACCESSCTRL_SHA256_SU
3859 // Description : If 1, and SP is also set, SHA256 can be accessed from a Secure,
3860 // Unprivileged context.
3861 #define ACCESSCTRL_SHA256_SU_RESET _u(0x0)
3862 #define ACCESSCTRL_SHA256_SU_BITS _u(0x00000004)
3863 #define ACCESSCTRL_SHA256_SU_MSB _u(2)
3864 #define ACCESSCTRL_SHA256_SU_LSB _u(2)
3865 #define ACCESSCTRL_SHA256_SU_ACCESS "RW"
3866 // -----------------------------------------------------------------------------
3867 // Field : ACCESSCTRL_SHA256_NSP
3868 // Description : If 1, SHA256 can be accessed from a Non-secure, Privileged
3870 #define ACCESSCTRL_SHA256_NSP_RESET _u(0x0)
3871 #define ACCESSCTRL_SHA256_NSP_BITS _u(0x00000002)
3872 #define ACCESSCTRL_SHA256_NSP_MSB _u(1)
3873 #define ACCESSCTRL_SHA256_NSP_LSB _u(1)
3874 #define ACCESSCTRL_SHA256_NSP_ACCESS "RW"
3875 // -----------------------------------------------------------------------------
3876 // Field : ACCESSCTRL_SHA256_NSU
3877 // Description : If 1, and NSP is also set, SHA256 can be accessed from a Non-
3878 // secure, Unprivileged context.
3880 // This bit is writable from a Non-secure, Privileged context, if
3881 // and only if the NSP bit is set.
3882 #define ACCESSCTRL_SHA256_NSU_RESET _u(0x0)
3883 #define ACCESSCTRL_SHA256_NSU_BITS _u(0x00000001)
3884 #define ACCESSCTRL_SHA256_NSU_MSB _u(0)
3885 #define ACCESSCTRL_SHA256_NSU_LSB _u(0)
3886 #define ACCESSCTRL_SHA256_NSU_ACCESS "RW"
3887 // =============================================================================
3888 // Register : ACCESSCTRL_SYSCFG
3889 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3890 // SYSCFG, and at what security/privilege levels they can do so.
3892 // Defaults to Secure, Privileged processor or debug access only.
3894 // This register is writable only from a Secure, Privileged
3895 // processor or debugger, with the exception of the NSU bit, which
3896 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3897 #define ACCESSCTRL_SYSCFG_OFFSET _u(0x000000bc)
3898 #define ACCESSCTRL_SYSCFG_BITS _u(0x000000ff)
3899 #define ACCESSCTRL_SYSCFG_RESET _u(0x000000b8)
3900 // -----------------------------------------------------------------------------
3901 // Field : ACCESSCTRL_SYSCFG_DBG
3902 // Description : If 1, SYSCFG can be accessed by the debugger, at
3903 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3905 #define ACCESSCTRL_SYSCFG_DBG_RESET _u(0x1)
3906 #define ACCESSCTRL_SYSCFG_DBG_BITS _u(0x00000080)
3907 #define ACCESSCTRL_SYSCFG_DBG_MSB _u(7)
3908 #define ACCESSCTRL_SYSCFG_DBG_LSB _u(7)
3909 #define ACCESSCTRL_SYSCFG_DBG_ACCESS "RW"
3910 // -----------------------------------------------------------------------------
3911 // Field : ACCESSCTRL_SYSCFG_DMA
3912 // Description : If 1, SYSCFG can be accessed by the DMA, at security/privilege
3913 // levels permitted by SP/NSP/SU/NSU in this register.
3914 #define ACCESSCTRL_SYSCFG_DMA_RESET _u(0x0)
3915 #define ACCESSCTRL_SYSCFG_DMA_BITS _u(0x00000040)
3916 #define ACCESSCTRL_SYSCFG_DMA_MSB _u(6)
3917 #define ACCESSCTRL_SYSCFG_DMA_LSB _u(6)
3918 #define ACCESSCTRL_SYSCFG_DMA_ACCESS "RW"
3919 // -----------------------------------------------------------------------------
3920 // Field : ACCESSCTRL_SYSCFG_CORE1
3921 // Description : If 1, SYSCFG can be accessed by core 1, at security/privilege
3922 // levels permitted by SP/NSP/SU/NSU in this register.
3923 #define ACCESSCTRL_SYSCFG_CORE1_RESET _u(0x1)
3924 #define ACCESSCTRL_SYSCFG_CORE1_BITS _u(0x00000020)
3925 #define ACCESSCTRL_SYSCFG_CORE1_MSB _u(5)
3926 #define ACCESSCTRL_SYSCFG_CORE1_LSB _u(5)
3927 #define ACCESSCTRL_SYSCFG_CORE1_ACCESS "RW"
3928 // -----------------------------------------------------------------------------
3929 // Field : ACCESSCTRL_SYSCFG_CORE0
3930 // Description : If 1, SYSCFG can be accessed by core 0, at security/privilege
3931 // levels permitted by SP/NSP/SU/NSU in this register.
3932 #define ACCESSCTRL_SYSCFG_CORE0_RESET _u(0x1)
3933 #define ACCESSCTRL_SYSCFG_CORE0_BITS _u(0x00000010)
3934 #define ACCESSCTRL_SYSCFG_CORE0_MSB _u(4)
3935 #define ACCESSCTRL_SYSCFG_CORE0_LSB _u(4)
3936 #define ACCESSCTRL_SYSCFG_CORE0_ACCESS "RW"
3937 // -----------------------------------------------------------------------------
3938 // Field : ACCESSCTRL_SYSCFG_SP
3939 // Description : If 1, SYSCFG can be accessed from a Secure, Privileged context.
3940 #define ACCESSCTRL_SYSCFG_SP_RESET _u(0x1)
3941 #define ACCESSCTRL_SYSCFG_SP_BITS _u(0x00000008)
3942 #define ACCESSCTRL_SYSCFG_SP_MSB _u(3)
3943 #define ACCESSCTRL_SYSCFG_SP_LSB _u(3)
3944 #define ACCESSCTRL_SYSCFG_SP_ACCESS "RW"
3945 // -----------------------------------------------------------------------------
3946 // Field : ACCESSCTRL_SYSCFG_SU
3947 // Description : If 1, and SP is also set, SYSCFG can be accessed from a Secure,
3948 // Unprivileged context.
3949 #define ACCESSCTRL_SYSCFG_SU_RESET _u(0x0)
3950 #define ACCESSCTRL_SYSCFG_SU_BITS _u(0x00000004)
3951 #define ACCESSCTRL_SYSCFG_SU_MSB _u(2)
3952 #define ACCESSCTRL_SYSCFG_SU_LSB _u(2)
3953 #define ACCESSCTRL_SYSCFG_SU_ACCESS "RW"
3954 // -----------------------------------------------------------------------------
3955 // Field : ACCESSCTRL_SYSCFG_NSP
3956 // Description : If 1, SYSCFG can be accessed from a Non-secure, Privileged
3958 #define ACCESSCTRL_SYSCFG_NSP_RESET _u(0x0)
3959 #define ACCESSCTRL_SYSCFG_NSP_BITS _u(0x00000002)
3960 #define ACCESSCTRL_SYSCFG_NSP_MSB _u(1)
3961 #define ACCESSCTRL_SYSCFG_NSP_LSB _u(1)
3962 #define ACCESSCTRL_SYSCFG_NSP_ACCESS "RW"
3963 // -----------------------------------------------------------------------------
3964 // Field : ACCESSCTRL_SYSCFG_NSU
3965 // Description : If 1, and NSP is also set, SYSCFG can be accessed from a Non-
3966 // secure, Unprivileged context.
3968 // This bit is writable from a Non-secure, Privileged context, if
3969 // and only if the NSP bit is set.
3970 #define ACCESSCTRL_SYSCFG_NSU_RESET _u(0x0)
3971 #define ACCESSCTRL_SYSCFG_NSU_BITS _u(0x00000001)
3972 #define ACCESSCTRL_SYSCFG_NSU_MSB _u(0)
3973 #define ACCESSCTRL_SYSCFG_NSU_LSB _u(0)
3974 #define ACCESSCTRL_SYSCFG_NSU_ACCESS "RW"
3975 // =============================================================================
3976 // Register : ACCESSCTRL_CLOCKS
3977 // Description : Control whether debugger, DMA, core 0 and core 1 can access
3978 // CLOCKS, and at what security/privilege levels they can do so.
3980 // Defaults to Secure, Privileged processor or debug access only.
3982 // This register is writable only from a Secure, Privileged
3983 // processor or debugger, with the exception of the NSU bit, which
3984 // becomes Non-secure-Privileged-writable when the NSP bit is set.
3985 #define ACCESSCTRL_CLOCKS_OFFSET _u(0x000000c0)
3986 #define ACCESSCTRL_CLOCKS_BITS _u(0x000000ff)
3987 #define ACCESSCTRL_CLOCKS_RESET _u(0x000000b8)
3988 // -----------------------------------------------------------------------------
3989 // Field : ACCESSCTRL_CLOCKS_DBG
3990 // Description : If 1, CLOCKS can be accessed by the debugger, at
3991 // security/privilege levels permitted by SP/NSP/SU/NSU in this
3993 #define ACCESSCTRL_CLOCKS_DBG_RESET _u(0x1)
3994 #define ACCESSCTRL_CLOCKS_DBG_BITS _u(0x00000080)
3995 #define ACCESSCTRL_CLOCKS_DBG_MSB _u(7)
3996 #define ACCESSCTRL_CLOCKS_DBG_LSB _u(7)
3997 #define ACCESSCTRL_CLOCKS_DBG_ACCESS "RW"
3998 // -----------------------------------------------------------------------------
3999 // Field : ACCESSCTRL_CLOCKS_DMA
4000 // Description : If 1, CLOCKS can be accessed by the DMA, at security/privilege
4001 // levels permitted by SP/NSP/SU/NSU in this register.
4002 #define ACCESSCTRL_CLOCKS_DMA_RESET _u(0x0)
4003 #define ACCESSCTRL_CLOCKS_DMA_BITS _u(0x00000040)
4004 #define ACCESSCTRL_CLOCKS_DMA_MSB _u(6)
4005 #define ACCESSCTRL_CLOCKS_DMA_LSB _u(6)
4006 #define ACCESSCTRL_CLOCKS_DMA_ACCESS "RW"
4007 // -----------------------------------------------------------------------------
4008 // Field : ACCESSCTRL_CLOCKS_CORE1
4009 // Description : If 1, CLOCKS can be accessed by core 1, at security/privilege
4010 // levels permitted by SP/NSP/SU/NSU in this register.
4011 #define ACCESSCTRL_CLOCKS_CORE1_RESET _u(0x1)
4012 #define ACCESSCTRL_CLOCKS_CORE1_BITS _u(0x00000020)
4013 #define ACCESSCTRL_CLOCKS_CORE1_MSB _u(5)
4014 #define ACCESSCTRL_CLOCKS_CORE1_LSB _u(5)
4015 #define ACCESSCTRL_CLOCKS_CORE1_ACCESS "RW"
4016 // -----------------------------------------------------------------------------
4017 // Field : ACCESSCTRL_CLOCKS_CORE0
4018 // Description : If 1, CLOCKS can be accessed by core 0, at security/privilege
4019 // levels permitted by SP/NSP/SU/NSU in this register.
4020 #define ACCESSCTRL_CLOCKS_CORE0_RESET _u(0x1)
4021 #define ACCESSCTRL_CLOCKS_CORE0_BITS _u(0x00000010)
4022 #define ACCESSCTRL_CLOCKS_CORE0_MSB _u(4)
4023 #define ACCESSCTRL_CLOCKS_CORE0_LSB _u(4)
4024 #define ACCESSCTRL_CLOCKS_CORE0_ACCESS "RW"
4025 // -----------------------------------------------------------------------------
4026 // Field : ACCESSCTRL_CLOCKS_SP
4027 // Description : If 1, CLOCKS can be accessed from a Secure, Privileged context.
4028 #define ACCESSCTRL_CLOCKS_SP_RESET _u(0x1)
4029 #define ACCESSCTRL_CLOCKS_SP_BITS _u(0x00000008)
4030 #define ACCESSCTRL_CLOCKS_SP_MSB _u(3)
4031 #define ACCESSCTRL_CLOCKS_SP_LSB _u(3)
4032 #define ACCESSCTRL_CLOCKS_SP_ACCESS "RW"
4033 // -----------------------------------------------------------------------------
4034 // Field : ACCESSCTRL_CLOCKS_SU
4035 // Description : If 1, and SP is also set, CLOCKS can be accessed from a Secure,
4036 // Unprivileged context.
4037 #define ACCESSCTRL_CLOCKS_SU_RESET _u(0x0)
4038 #define ACCESSCTRL_CLOCKS_SU_BITS _u(0x00000004)
4039 #define ACCESSCTRL_CLOCKS_SU_MSB _u(2)
4040 #define ACCESSCTRL_CLOCKS_SU_LSB _u(2)
4041 #define ACCESSCTRL_CLOCKS_SU_ACCESS "RW"
4042 // -----------------------------------------------------------------------------
4043 // Field : ACCESSCTRL_CLOCKS_NSP
4044 // Description : If 1, CLOCKS can be accessed from a Non-secure, Privileged
4046 #define ACCESSCTRL_CLOCKS_NSP_RESET _u(0x0)
4047 #define ACCESSCTRL_CLOCKS_NSP_BITS _u(0x00000002)
4048 #define ACCESSCTRL_CLOCKS_NSP_MSB _u(1)
4049 #define ACCESSCTRL_CLOCKS_NSP_LSB _u(1)
4050 #define ACCESSCTRL_CLOCKS_NSP_ACCESS "RW"
4051 // -----------------------------------------------------------------------------
4052 // Field : ACCESSCTRL_CLOCKS_NSU
4053 // Description : If 1, and NSP is also set, CLOCKS can be accessed from a Non-
4054 // secure, Unprivileged context.
4056 // This bit is writable from a Non-secure, Privileged context, if
4057 // and only if the NSP bit is set.
4058 #define ACCESSCTRL_CLOCKS_NSU_RESET _u(0x0)
4059 #define ACCESSCTRL_CLOCKS_NSU_BITS _u(0x00000001)
4060 #define ACCESSCTRL_CLOCKS_NSU_MSB _u(0)
4061 #define ACCESSCTRL_CLOCKS_NSU_LSB _u(0)
4062 #define ACCESSCTRL_CLOCKS_NSU_ACCESS "RW"
4063 // =============================================================================
4064 // Register : ACCESSCTRL_XOSC
4065 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4066 // XOSC, and at what security/privilege levels they can do so.
4068 // Defaults to Secure, Privileged processor or debug access only.
4070 // This register is writable only from a Secure, Privileged
4071 // processor or debugger, with the exception of the NSU bit, which
4072 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4073 #define ACCESSCTRL_XOSC_OFFSET _u(0x000000c4)
4074 #define ACCESSCTRL_XOSC_BITS _u(0x000000ff)
4075 #define ACCESSCTRL_XOSC_RESET _u(0x000000b8)
4076 // -----------------------------------------------------------------------------
4077 // Field : ACCESSCTRL_XOSC_DBG
4078 // Description : If 1, XOSC can be accessed by the debugger, at
4079 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4081 #define ACCESSCTRL_XOSC_DBG_RESET _u(0x1)
4082 #define ACCESSCTRL_XOSC_DBG_BITS _u(0x00000080)
4083 #define ACCESSCTRL_XOSC_DBG_MSB _u(7)
4084 #define ACCESSCTRL_XOSC_DBG_LSB _u(7)
4085 #define ACCESSCTRL_XOSC_DBG_ACCESS "RW"
4086 // -----------------------------------------------------------------------------
4087 // Field : ACCESSCTRL_XOSC_DMA
4088 // Description : If 1, XOSC can be accessed by the DMA, at security/privilege
4089 // levels permitted by SP/NSP/SU/NSU in this register.
4090 #define ACCESSCTRL_XOSC_DMA_RESET _u(0x0)
4091 #define ACCESSCTRL_XOSC_DMA_BITS _u(0x00000040)
4092 #define ACCESSCTRL_XOSC_DMA_MSB _u(6)
4093 #define ACCESSCTRL_XOSC_DMA_LSB _u(6)
4094 #define ACCESSCTRL_XOSC_DMA_ACCESS "RW"
4095 // -----------------------------------------------------------------------------
4096 // Field : ACCESSCTRL_XOSC_CORE1
4097 // Description : If 1, XOSC can be accessed by core 1, at security/privilege
4098 // levels permitted by SP/NSP/SU/NSU in this register.
4099 #define ACCESSCTRL_XOSC_CORE1_RESET _u(0x1)
4100 #define ACCESSCTRL_XOSC_CORE1_BITS _u(0x00000020)
4101 #define ACCESSCTRL_XOSC_CORE1_MSB _u(5)
4102 #define ACCESSCTRL_XOSC_CORE1_LSB _u(5)
4103 #define ACCESSCTRL_XOSC_CORE1_ACCESS "RW"
4104 // -----------------------------------------------------------------------------
4105 // Field : ACCESSCTRL_XOSC_CORE0
4106 // Description : If 1, XOSC can be accessed by core 0, at security/privilege
4107 // levels permitted by SP/NSP/SU/NSU in this register.
4108 #define ACCESSCTRL_XOSC_CORE0_RESET _u(0x1)
4109 #define ACCESSCTRL_XOSC_CORE0_BITS _u(0x00000010)
4110 #define ACCESSCTRL_XOSC_CORE0_MSB _u(4)
4111 #define ACCESSCTRL_XOSC_CORE0_LSB _u(4)
4112 #define ACCESSCTRL_XOSC_CORE0_ACCESS "RW"
4113 // -----------------------------------------------------------------------------
4114 // Field : ACCESSCTRL_XOSC_SP
4115 // Description : If 1, XOSC can be accessed from a Secure, Privileged context.
4116 #define ACCESSCTRL_XOSC_SP_RESET _u(0x1)
4117 #define ACCESSCTRL_XOSC_SP_BITS _u(0x00000008)
4118 #define ACCESSCTRL_XOSC_SP_MSB _u(3)
4119 #define ACCESSCTRL_XOSC_SP_LSB _u(3)
4120 #define ACCESSCTRL_XOSC_SP_ACCESS "RW"
4121 // -----------------------------------------------------------------------------
4122 // Field : ACCESSCTRL_XOSC_SU
4123 // Description : If 1, and SP is also set, XOSC can be accessed from a Secure,
4124 // Unprivileged context.
4125 #define ACCESSCTRL_XOSC_SU_RESET _u(0x0)
4126 #define ACCESSCTRL_XOSC_SU_BITS _u(0x00000004)
4127 #define ACCESSCTRL_XOSC_SU_MSB _u(2)
4128 #define ACCESSCTRL_XOSC_SU_LSB _u(2)
4129 #define ACCESSCTRL_XOSC_SU_ACCESS "RW"
4130 // -----------------------------------------------------------------------------
4131 // Field : ACCESSCTRL_XOSC_NSP
4132 // Description : If 1, XOSC can be accessed from a Non-secure, Privileged
4134 #define ACCESSCTRL_XOSC_NSP_RESET _u(0x0)
4135 #define ACCESSCTRL_XOSC_NSP_BITS _u(0x00000002)
4136 #define ACCESSCTRL_XOSC_NSP_MSB _u(1)
4137 #define ACCESSCTRL_XOSC_NSP_LSB _u(1)
4138 #define ACCESSCTRL_XOSC_NSP_ACCESS "RW"
4139 // -----------------------------------------------------------------------------
4140 // Field : ACCESSCTRL_XOSC_NSU
4141 // Description : If 1, and NSP is also set, XOSC can be accessed from a Non-
4142 // secure, Unprivileged context.
4144 // This bit is writable from a Non-secure, Privileged context, if
4145 // and only if the NSP bit is set.
4146 #define ACCESSCTRL_XOSC_NSU_RESET _u(0x0)
4147 #define ACCESSCTRL_XOSC_NSU_BITS _u(0x00000001)
4148 #define ACCESSCTRL_XOSC_NSU_MSB _u(0)
4149 #define ACCESSCTRL_XOSC_NSU_LSB _u(0)
4150 #define ACCESSCTRL_XOSC_NSU_ACCESS "RW"
4151 // =============================================================================
4152 // Register : ACCESSCTRL_ROSC
4153 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4154 // ROSC, and at what security/privilege levels they can do so.
4156 // Defaults to Secure, Privileged processor or debug access only.
4158 // This register is writable only from a Secure, Privileged
4159 // processor or debugger, with the exception of the NSU bit, which
4160 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4161 #define ACCESSCTRL_ROSC_OFFSET _u(0x000000c8)
4162 #define ACCESSCTRL_ROSC_BITS _u(0x000000ff)
4163 #define ACCESSCTRL_ROSC_RESET _u(0x000000b8)
4164 // -----------------------------------------------------------------------------
4165 // Field : ACCESSCTRL_ROSC_DBG
4166 // Description : If 1, ROSC can be accessed by the debugger, at
4167 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4169 #define ACCESSCTRL_ROSC_DBG_RESET _u(0x1)
4170 #define ACCESSCTRL_ROSC_DBG_BITS _u(0x00000080)
4171 #define ACCESSCTRL_ROSC_DBG_MSB _u(7)
4172 #define ACCESSCTRL_ROSC_DBG_LSB _u(7)
4173 #define ACCESSCTRL_ROSC_DBG_ACCESS "RW"
4174 // -----------------------------------------------------------------------------
4175 // Field : ACCESSCTRL_ROSC_DMA
4176 // Description : If 1, ROSC can be accessed by the DMA, at security/privilege
4177 // levels permitted by SP/NSP/SU/NSU in this register.
4178 #define ACCESSCTRL_ROSC_DMA_RESET _u(0x0)
4179 #define ACCESSCTRL_ROSC_DMA_BITS _u(0x00000040)
4180 #define ACCESSCTRL_ROSC_DMA_MSB _u(6)
4181 #define ACCESSCTRL_ROSC_DMA_LSB _u(6)
4182 #define ACCESSCTRL_ROSC_DMA_ACCESS "RW"
4183 // -----------------------------------------------------------------------------
4184 // Field : ACCESSCTRL_ROSC_CORE1
4185 // Description : If 1, ROSC can be accessed by core 1, at security/privilege
4186 // levels permitted by SP/NSP/SU/NSU in this register.
4187 #define ACCESSCTRL_ROSC_CORE1_RESET _u(0x1)
4188 #define ACCESSCTRL_ROSC_CORE1_BITS _u(0x00000020)
4189 #define ACCESSCTRL_ROSC_CORE1_MSB _u(5)
4190 #define ACCESSCTRL_ROSC_CORE1_LSB _u(5)
4191 #define ACCESSCTRL_ROSC_CORE1_ACCESS "RW"
4192 // -----------------------------------------------------------------------------
4193 // Field : ACCESSCTRL_ROSC_CORE0
4194 // Description : If 1, ROSC can be accessed by core 0, at security/privilege
4195 // levels permitted by SP/NSP/SU/NSU in this register.
4196 #define ACCESSCTRL_ROSC_CORE0_RESET _u(0x1)
4197 #define ACCESSCTRL_ROSC_CORE0_BITS _u(0x00000010)
4198 #define ACCESSCTRL_ROSC_CORE0_MSB _u(4)
4199 #define ACCESSCTRL_ROSC_CORE0_LSB _u(4)
4200 #define ACCESSCTRL_ROSC_CORE0_ACCESS "RW"
4201 // -----------------------------------------------------------------------------
4202 // Field : ACCESSCTRL_ROSC_SP
4203 // Description : If 1, ROSC can be accessed from a Secure, Privileged context.
4204 #define ACCESSCTRL_ROSC_SP_RESET _u(0x1)
4205 #define ACCESSCTRL_ROSC_SP_BITS _u(0x00000008)
4206 #define ACCESSCTRL_ROSC_SP_MSB _u(3)
4207 #define ACCESSCTRL_ROSC_SP_LSB _u(3)
4208 #define ACCESSCTRL_ROSC_SP_ACCESS "RW"
4209 // -----------------------------------------------------------------------------
4210 // Field : ACCESSCTRL_ROSC_SU
4211 // Description : If 1, and SP is also set, ROSC can be accessed from a Secure,
4212 // Unprivileged context.
4213 #define ACCESSCTRL_ROSC_SU_RESET _u(0x0)
4214 #define ACCESSCTRL_ROSC_SU_BITS _u(0x00000004)
4215 #define ACCESSCTRL_ROSC_SU_MSB _u(2)
4216 #define ACCESSCTRL_ROSC_SU_LSB _u(2)
4217 #define ACCESSCTRL_ROSC_SU_ACCESS "RW"
4218 // -----------------------------------------------------------------------------
4219 // Field : ACCESSCTRL_ROSC_NSP
4220 // Description : If 1, ROSC can be accessed from a Non-secure, Privileged
4222 #define ACCESSCTRL_ROSC_NSP_RESET _u(0x0)
4223 #define ACCESSCTRL_ROSC_NSP_BITS _u(0x00000002)
4224 #define ACCESSCTRL_ROSC_NSP_MSB _u(1)
4225 #define ACCESSCTRL_ROSC_NSP_LSB _u(1)
4226 #define ACCESSCTRL_ROSC_NSP_ACCESS "RW"
4227 // -----------------------------------------------------------------------------
4228 // Field : ACCESSCTRL_ROSC_NSU
4229 // Description : If 1, and NSP is also set, ROSC can be accessed from a Non-
4230 // secure, Unprivileged context.
4232 // This bit is writable from a Non-secure, Privileged context, if
4233 // and only if the NSP bit is set.
4234 #define ACCESSCTRL_ROSC_NSU_RESET _u(0x0)
4235 #define ACCESSCTRL_ROSC_NSU_BITS _u(0x00000001)
4236 #define ACCESSCTRL_ROSC_NSU_MSB _u(0)
4237 #define ACCESSCTRL_ROSC_NSU_LSB _u(0)
4238 #define ACCESSCTRL_ROSC_NSU_ACCESS "RW"
4239 // =============================================================================
4240 // Register : ACCESSCTRL_PLL_SYS
4241 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4242 // PLL_SYS, and at what security/privilege levels they can do so.
4244 // Defaults to Secure, Privileged processor or debug access only.
4246 // This register is writable only from a Secure, Privileged
4247 // processor or debugger, with the exception of the NSU bit, which
4248 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4249 #define ACCESSCTRL_PLL_SYS_OFFSET _u(0x000000cc)
4250 #define ACCESSCTRL_PLL_SYS_BITS _u(0x000000ff)
4251 #define ACCESSCTRL_PLL_SYS_RESET _u(0x000000b8)
4252 // -----------------------------------------------------------------------------
4253 // Field : ACCESSCTRL_PLL_SYS_DBG
4254 // Description : If 1, PLL_SYS can be accessed by the debugger, at
4255 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4257 #define ACCESSCTRL_PLL_SYS_DBG_RESET _u(0x1)
4258 #define ACCESSCTRL_PLL_SYS_DBG_BITS _u(0x00000080)
4259 #define ACCESSCTRL_PLL_SYS_DBG_MSB _u(7)
4260 #define ACCESSCTRL_PLL_SYS_DBG_LSB _u(7)
4261 #define ACCESSCTRL_PLL_SYS_DBG_ACCESS "RW"
4262 // -----------------------------------------------------------------------------
4263 // Field : ACCESSCTRL_PLL_SYS_DMA
4264 // Description : If 1, PLL_SYS can be accessed by the DMA, at security/privilege
4265 // levels permitted by SP/NSP/SU/NSU in this register.
4266 #define ACCESSCTRL_PLL_SYS_DMA_RESET _u(0x0)
4267 #define ACCESSCTRL_PLL_SYS_DMA_BITS _u(0x00000040)
4268 #define ACCESSCTRL_PLL_SYS_DMA_MSB _u(6)
4269 #define ACCESSCTRL_PLL_SYS_DMA_LSB _u(6)
4270 #define ACCESSCTRL_PLL_SYS_DMA_ACCESS "RW"
4271 // -----------------------------------------------------------------------------
4272 // Field : ACCESSCTRL_PLL_SYS_CORE1
4273 // Description : If 1, PLL_SYS can be accessed by core 1, at security/privilege
4274 // levels permitted by SP/NSP/SU/NSU in this register.
4275 #define ACCESSCTRL_PLL_SYS_CORE1_RESET _u(0x1)
4276 #define ACCESSCTRL_PLL_SYS_CORE1_BITS _u(0x00000020)
4277 #define ACCESSCTRL_PLL_SYS_CORE1_MSB _u(5)
4278 #define ACCESSCTRL_PLL_SYS_CORE1_LSB _u(5)
4279 #define ACCESSCTRL_PLL_SYS_CORE1_ACCESS "RW"
4280 // -----------------------------------------------------------------------------
4281 // Field : ACCESSCTRL_PLL_SYS_CORE0
4282 // Description : If 1, PLL_SYS can be accessed by core 0, at security/privilege
4283 // levels permitted by SP/NSP/SU/NSU in this register.
4284 #define ACCESSCTRL_PLL_SYS_CORE0_RESET _u(0x1)
4285 #define ACCESSCTRL_PLL_SYS_CORE0_BITS _u(0x00000010)
4286 #define ACCESSCTRL_PLL_SYS_CORE0_MSB _u(4)
4287 #define ACCESSCTRL_PLL_SYS_CORE0_LSB _u(4)
4288 #define ACCESSCTRL_PLL_SYS_CORE0_ACCESS "RW"
4289 // -----------------------------------------------------------------------------
4290 // Field : ACCESSCTRL_PLL_SYS_SP
4291 // Description : If 1, PLL_SYS can be accessed from a Secure, Privileged
4293 #define ACCESSCTRL_PLL_SYS_SP_RESET _u(0x1)
4294 #define ACCESSCTRL_PLL_SYS_SP_BITS _u(0x00000008)
4295 #define ACCESSCTRL_PLL_SYS_SP_MSB _u(3)
4296 #define ACCESSCTRL_PLL_SYS_SP_LSB _u(3)
4297 #define ACCESSCTRL_PLL_SYS_SP_ACCESS "RW"
4298 // -----------------------------------------------------------------------------
4299 // Field : ACCESSCTRL_PLL_SYS_SU
4300 // Description : If 1, and SP is also set, PLL_SYS can be accessed from a
4301 // Secure, Unprivileged context.
4302 #define ACCESSCTRL_PLL_SYS_SU_RESET _u(0x0)
4303 #define ACCESSCTRL_PLL_SYS_SU_BITS _u(0x00000004)
4304 #define ACCESSCTRL_PLL_SYS_SU_MSB _u(2)
4305 #define ACCESSCTRL_PLL_SYS_SU_LSB _u(2)
4306 #define ACCESSCTRL_PLL_SYS_SU_ACCESS "RW"
4307 // -----------------------------------------------------------------------------
4308 // Field : ACCESSCTRL_PLL_SYS_NSP
4309 // Description : If 1, PLL_SYS can be accessed from a Non-secure, Privileged
4311 #define ACCESSCTRL_PLL_SYS_NSP_RESET _u(0x0)
4312 #define ACCESSCTRL_PLL_SYS_NSP_BITS _u(0x00000002)
4313 #define ACCESSCTRL_PLL_SYS_NSP_MSB _u(1)
4314 #define ACCESSCTRL_PLL_SYS_NSP_LSB _u(1)
4315 #define ACCESSCTRL_PLL_SYS_NSP_ACCESS "RW"
4316 // -----------------------------------------------------------------------------
4317 // Field : ACCESSCTRL_PLL_SYS_NSU
4318 // Description : If 1, and NSP is also set, PLL_SYS can be accessed from a Non-
4319 // secure, Unprivileged context.
4321 // This bit is writable from a Non-secure, Privileged context, if
4322 // and only if the NSP bit is set.
4323 #define ACCESSCTRL_PLL_SYS_NSU_RESET _u(0x0)
4324 #define ACCESSCTRL_PLL_SYS_NSU_BITS _u(0x00000001)
4325 #define ACCESSCTRL_PLL_SYS_NSU_MSB _u(0)
4326 #define ACCESSCTRL_PLL_SYS_NSU_LSB _u(0)
4327 #define ACCESSCTRL_PLL_SYS_NSU_ACCESS "RW"
4328 // =============================================================================
4329 // Register : ACCESSCTRL_PLL_USB
4330 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4331 // PLL_USB, and at what security/privilege levels they can do so.
4333 // Defaults to Secure, Privileged processor or debug access only.
4335 // This register is writable only from a Secure, Privileged
4336 // processor or debugger, with the exception of the NSU bit, which
4337 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4338 #define ACCESSCTRL_PLL_USB_OFFSET _u(0x000000d0)
4339 #define ACCESSCTRL_PLL_USB_BITS _u(0x000000ff)
4340 #define ACCESSCTRL_PLL_USB_RESET _u(0x000000b8)
4341 // -----------------------------------------------------------------------------
4342 // Field : ACCESSCTRL_PLL_USB_DBG
4343 // Description : If 1, PLL_USB can be accessed by the debugger, at
4344 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4346 #define ACCESSCTRL_PLL_USB_DBG_RESET _u(0x1)
4347 #define ACCESSCTRL_PLL_USB_DBG_BITS _u(0x00000080)
4348 #define ACCESSCTRL_PLL_USB_DBG_MSB _u(7)
4349 #define ACCESSCTRL_PLL_USB_DBG_LSB _u(7)
4350 #define ACCESSCTRL_PLL_USB_DBG_ACCESS "RW"
4351 // -----------------------------------------------------------------------------
4352 // Field : ACCESSCTRL_PLL_USB_DMA
4353 // Description : If 1, PLL_USB can be accessed by the DMA, at security/privilege
4354 // levels permitted by SP/NSP/SU/NSU in this register.
4355 #define ACCESSCTRL_PLL_USB_DMA_RESET _u(0x0)
4356 #define ACCESSCTRL_PLL_USB_DMA_BITS _u(0x00000040)
4357 #define ACCESSCTRL_PLL_USB_DMA_MSB _u(6)
4358 #define ACCESSCTRL_PLL_USB_DMA_LSB _u(6)
4359 #define ACCESSCTRL_PLL_USB_DMA_ACCESS "RW"
4360 // -----------------------------------------------------------------------------
4361 // Field : ACCESSCTRL_PLL_USB_CORE1
4362 // Description : If 1, PLL_USB can be accessed by core 1, at security/privilege
4363 // levels permitted by SP/NSP/SU/NSU in this register.
4364 #define ACCESSCTRL_PLL_USB_CORE1_RESET _u(0x1)
4365 #define ACCESSCTRL_PLL_USB_CORE1_BITS _u(0x00000020)
4366 #define ACCESSCTRL_PLL_USB_CORE1_MSB _u(5)
4367 #define ACCESSCTRL_PLL_USB_CORE1_LSB _u(5)
4368 #define ACCESSCTRL_PLL_USB_CORE1_ACCESS "RW"
4369 // -----------------------------------------------------------------------------
4370 // Field : ACCESSCTRL_PLL_USB_CORE0
4371 // Description : If 1, PLL_USB can be accessed by core 0, at security/privilege
4372 // levels permitted by SP/NSP/SU/NSU in this register.
4373 #define ACCESSCTRL_PLL_USB_CORE0_RESET _u(0x1)
4374 #define ACCESSCTRL_PLL_USB_CORE0_BITS _u(0x00000010)
4375 #define ACCESSCTRL_PLL_USB_CORE0_MSB _u(4)
4376 #define ACCESSCTRL_PLL_USB_CORE0_LSB _u(4)
4377 #define ACCESSCTRL_PLL_USB_CORE0_ACCESS "RW"
4378 // -----------------------------------------------------------------------------
4379 // Field : ACCESSCTRL_PLL_USB_SP
4380 // Description : If 1, PLL_USB can be accessed from a Secure, Privileged
4382 #define ACCESSCTRL_PLL_USB_SP_RESET _u(0x1)
4383 #define ACCESSCTRL_PLL_USB_SP_BITS _u(0x00000008)
4384 #define ACCESSCTRL_PLL_USB_SP_MSB _u(3)
4385 #define ACCESSCTRL_PLL_USB_SP_LSB _u(3)
4386 #define ACCESSCTRL_PLL_USB_SP_ACCESS "RW"
4387 // -----------------------------------------------------------------------------
4388 // Field : ACCESSCTRL_PLL_USB_SU
4389 // Description : If 1, and SP is also set, PLL_USB can be accessed from a
4390 // Secure, Unprivileged context.
4391 #define ACCESSCTRL_PLL_USB_SU_RESET _u(0x0)
4392 #define ACCESSCTRL_PLL_USB_SU_BITS _u(0x00000004)
4393 #define ACCESSCTRL_PLL_USB_SU_MSB _u(2)
4394 #define ACCESSCTRL_PLL_USB_SU_LSB _u(2)
4395 #define ACCESSCTRL_PLL_USB_SU_ACCESS "RW"
4396 // -----------------------------------------------------------------------------
4397 // Field : ACCESSCTRL_PLL_USB_NSP
4398 // Description : If 1, PLL_USB can be accessed from a Non-secure, Privileged
4400 #define ACCESSCTRL_PLL_USB_NSP_RESET _u(0x0)
4401 #define ACCESSCTRL_PLL_USB_NSP_BITS _u(0x00000002)
4402 #define ACCESSCTRL_PLL_USB_NSP_MSB _u(1)
4403 #define ACCESSCTRL_PLL_USB_NSP_LSB _u(1)
4404 #define ACCESSCTRL_PLL_USB_NSP_ACCESS "RW"
4405 // -----------------------------------------------------------------------------
4406 // Field : ACCESSCTRL_PLL_USB_NSU
4407 // Description : If 1, and NSP is also set, PLL_USB can be accessed from a Non-
4408 // secure, Unprivileged context.
4410 // This bit is writable from a Non-secure, Privileged context, if
4411 // and only if the NSP bit is set.
4412 #define ACCESSCTRL_PLL_USB_NSU_RESET _u(0x0)
4413 #define ACCESSCTRL_PLL_USB_NSU_BITS _u(0x00000001)
4414 #define ACCESSCTRL_PLL_USB_NSU_MSB _u(0)
4415 #define ACCESSCTRL_PLL_USB_NSU_LSB _u(0)
4416 #define ACCESSCTRL_PLL_USB_NSU_ACCESS "RW"
4417 // =============================================================================
4418 // Register : ACCESSCTRL_TICKS
4419 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4420 // TICKS, and at what security/privilege levels they can do so.
4422 // Defaults to Secure, Privileged processor or debug access only.
4424 // This register is writable only from a Secure, Privileged
4425 // processor or debugger, with the exception of the NSU bit, which
4426 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4427 #define ACCESSCTRL_TICKS_OFFSET _u(0x000000d4)
4428 #define ACCESSCTRL_TICKS_BITS _u(0x000000ff)
4429 #define ACCESSCTRL_TICKS_RESET _u(0x000000b8)
4430 // -----------------------------------------------------------------------------
4431 // Field : ACCESSCTRL_TICKS_DBG
4432 // Description : If 1, TICKS can be accessed by the debugger, at
4433 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4435 #define ACCESSCTRL_TICKS_DBG_RESET _u(0x1)
4436 #define ACCESSCTRL_TICKS_DBG_BITS _u(0x00000080)
4437 #define ACCESSCTRL_TICKS_DBG_MSB _u(7)
4438 #define ACCESSCTRL_TICKS_DBG_LSB _u(7)
4439 #define ACCESSCTRL_TICKS_DBG_ACCESS "RW"
4440 // -----------------------------------------------------------------------------
4441 // Field : ACCESSCTRL_TICKS_DMA
4442 // Description : If 1, TICKS can be accessed by the DMA, at security/privilege
4443 // levels permitted by SP/NSP/SU/NSU in this register.
4444 #define ACCESSCTRL_TICKS_DMA_RESET _u(0x0)
4445 #define ACCESSCTRL_TICKS_DMA_BITS _u(0x00000040)
4446 #define ACCESSCTRL_TICKS_DMA_MSB _u(6)
4447 #define ACCESSCTRL_TICKS_DMA_LSB _u(6)
4448 #define ACCESSCTRL_TICKS_DMA_ACCESS "RW"
4449 // -----------------------------------------------------------------------------
4450 // Field : ACCESSCTRL_TICKS_CORE1
4451 // Description : If 1, TICKS can be accessed by core 1, at security/privilege
4452 // levels permitted by SP/NSP/SU/NSU in this register.
4453 #define ACCESSCTRL_TICKS_CORE1_RESET _u(0x1)
4454 #define ACCESSCTRL_TICKS_CORE1_BITS _u(0x00000020)
4455 #define ACCESSCTRL_TICKS_CORE1_MSB _u(5)
4456 #define ACCESSCTRL_TICKS_CORE1_LSB _u(5)
4457 #define ACCESSCTRL_TICKS_CORE1_ACCESS "RW"
4458 // -----------------------------------------------------------------------------
4459 // Field : ACCESSCTRL_TICKS_CORE0
4460 // Description : If 1, TICKS can be accessed by core 0, at security/privilege
4461 // levels permitted by SP/NSP/SU/NSU in this register.
4462 #define ACCESSCTRL_TICKS_CORE0_RESET _u(0x1)
4463 #define ACCESSCTRL_TICKS_CORE0_BITS _u(0x00000010)
4464 #define ACCESSCTRL_TICKS_CORE0_MSB _u(4)
4465 #define ACCESSCTRL_TICKS_CORE0_LSB _u(4)
4466 #define ACCESSCTRL_TICKS_CORE0_ACCESS "RW"
4467 // -----------------------------------------------------------------------------
4468 // Field : ACCESSCTRL_TICKS_SP
4469 // Description : If 1, TICKS can be accessed from a Secure, Privileged context.
4470 #define ACCESSCTRL_TICKS_SP_RESET _u(0x1)
4471 #define ACCESSCTRL_TICKS_SP_BITS _u(0x00000008)
4472 #define ACCESSCTRL_TICKS_SP_MSB _u(3)
4473 #define ACCESSCTRL_TICKS_SP_LSB _u(3)
4474 #define ACCESSCTRL_TICKS_SP_ACCESS "RW"
4475 // -----------------------------------------------------------------------------
4476 // Field : ACCESSCTRL_TICKS_SU
4477 // Description : If 1, and SP is also set, TICKS can be accessed from a Secure,
4478 // Unprivileged context.
4479 #define ACCESSCTRL_TICKS_SU_RESET _u(0x0)
4480 #define ACCESSCTRL_TICKS_SU_BITS _u(0x00000004)
4481 #define ACCESSCTRL_TICKS_SU_MSB _u(2)
4482 #define ACCESSCTRL_TICKS_SU_LSB _u(2)
4483 #define ACCESSCTRL_TICKS_SU_ACCESS "RW"
4484 // -----------------------------------------------------------------------------
4485 // Field : ACCESSCTRL_TICKS_NSP
4486 // Description : If 1, TICKS can be accessed from a Non-secure, Privileged
4488 #define ACCESSCTRL_TICKS_NSP_RESET _u(0x0)
4489 #define ACCESSCTRL_TICKS_NSP_BITS _u(0x00000002)
4490 #define ACCESSCTRL_TICKS_NSP_MSB _u(1)
4491 #define ACCESSCTRL_TICKS_NSP_LSB _u(1)
4492 #define ACCESSCTRL_TICKS_NSP_ACCESS "RW"
4493 // -----------------------------------------------------------------------------
4494 // Field : ACCESSCTRL_TICKS_NSU
4495 // Description : If 1, and NSP is also set, TICKS can be accessed from a Non-
4496 // secure, Unprivileged context.
4498 // This bit is writable from a Non-secure, Privileged context, if
4499 // and only if the NSP bit is set.
4500 #define ACCESSCTRL_TICKS_NSU_RESET _u(0x0)
4501 #define ACCESSCTRL_TICKS_NSU_BITS _u(0x00000001)
4502 #define ACCESSCTRL_TICKS_NSU_MSB _u(0)
4503 #define ACCESSCTRL_TICKS_NSU_LSB _u(0)
4504 #define ACCESSCTRL_TICKS_NSU_ACCESS "RW"
4505 // =============================================================================
4506 // Register : ACCESSCTRL_WATCHDOG
4507 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4508 // WATCHDOG, and at what security/privilege levels they can do so.
4510 // Defaults to Secure, Privileged processor or debug access only.
4512 // This register is writable only from a Secure, Privileged
4513 // processor or debugger, with the exception of the NSU bit, which
4514 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4515 #define ACCESSCTRL_WATCHDOG_OFFSET _u(0x000000d8)
4516 #define ACCESSCTRL_WATCHDOG_BITS _u(0x000000ff)
4517 #define ACCESSCTRL_WATCHDOG_RESET _u(0x000000b8)
4518 // -----------------------------------------------------------------------------
4519 // Field : ACCESSCTRL_WATCHDOG_DBG
4520 // Description : If 1, WATCHDOG can be accessed by the debugger, at
4521 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4523 #define ACCESSCTRL_WATCHDOG_DBG_RESET _u(0x1)
4524 #define ACCESSCTRL_WATCHDOG_DBG_BITS _u(0x00000080)
4525 #define ACCESSCTRL_WATCHDOG_DBG_MSB _u(7)
4526 #define ACCESSCTRL_WATCHDOG_DBG_LSB _u(7)
4527 #define ACCESSCTRL_WATCHDOG_DBG_ACCESS "RW"
4528 // -----------------------------------------------------------------------------
4529 // Field : ACCESSCTRL_WATCHDOG_DMA
4530 // Description : If 1, WATCHDOG can be accessed by the DMA, at
4531 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4533 #define ACCESSCTRL_WATCHDOG_DMA_RESET _u(0x0)
4534 #define ACCESSCTRL_WATCHDOG_DMA_BITS _u(0x00000040)
4535 #define ACCESSCTRL_WATCHDOG_DMA_MSB _u(6)
4536 #define ACCESSCTRL_WATCHDOG_DMA_LSB _u(6)
4537 #define ACCESSCTRL_WATCHDOG_DMA_ACCESS "RW"
4538 // -----------------------------------------------------------------------------
4539 // Field : ACCESSCTRL_WATCHDOG_CORE1
4540 // Description : If 1, WATCHDOG can be accessed by core 1, at security/privilege
4541 // levels permitted by SP/NSP/SU/NSU in this register.
4542 #define ACCESSCTRL_WATCHDOG_CORE1_RESET _u(0x1)
4543 #define ACCESSCTRL_WATCHDOG_CORE1_BITS _u(0x00000020)
4544 #define ACCESSCTRL_WATCHDOG_CORE1_MSB _u(5)
4545 #define ACCESSCTRL_WATCHDOG_CORE1_LSB _u(5)
4546 #define ACCESSCTRL_WATCHDOG_CORE1_ACCESS "RW"
4547 // -----------------------------------------------------------------------------
4548 // Field : ACCESSCTRL_WATCHDOG_CORE0
4549 // Description : If 1, WATCHDOG can be accessed by core 0, at security/privilege
4550 // levels permitted by SP/NSP/SU/NSU in this register.
4551 #define ACCESSCTRL_WATCHDOG_CORE0_RESET _u(0x1)
4552 #define ACCESSCTRL_WATCHDOG_CORE0_BITS _u(0x00000010)
4553 #define ACCESSCTRL_WATCHDOG_CORE0_MSB _u(4)
4554 #define ACCESSCTRL_WATCHDOG_CORE0_LSB _u(4)
4555 #define ACCESSCTRL_WATCHDOG_CORE0_ACCESS "RW"
4556 // -----------------------------------------------------------------------------
4557 // Field : ACCESSCTRL_WATCHDOG_SP
4558 // Description : If 1, WATCHDOG can be accessed from a Secure, Privileged
4560 #define ACCESSCTRL_WATCHDOG_SP_RESET _u(0x1)
4561 #define ACCESSCTRL_WATCHDOG_SP_BITS _u(0x00000008)
4562 #define ACCESSCTRL_WATCHDOG_SP_MSB _u(3)
4563 #define ACCESSCTRL_WATCHDOG_SP_LSB _u(3)
4564 #define ACCESSCTRL_WATCHDOG_SP_ACCESS "RW"
4565 // -----------------------------------------------------------------------------
4566 // Field : ACCESSCTRL_WATCHDOG_SU
4567 // Description : If 1, and SP is also set, WATCHDOG can be accessed from a
4568 // Secure, Unprivileged context.
4569 #define ACCESSCTRL_WATCHDOG_SU_RESET _u(0x0)
4570 #define ACCESSCTRL_WATCHDOG_SU_BITS _u(0x00000004)
4571 #define ACCESSCTRL_WATCHDOG_SU_MSB _u(2)
4572 #define ACCESSCTRL_WATCHDOG_SU_LSB _u(2)
4573 #define ACCESSCTRL_WATCHDOG_SU_ACCESS "RW"
4574 // -----------------------------------------------------------------------------
4575 // Field : ACCESSCTRL_WATCHDOG_NSP
4576 // Description : If 1, WATCHDOG can be accessed from a Non-secure, Privileged
4578 #define ACCESSCTRL_WATCHDOG_NSP_RESET _u(0x0)
4579 #define ACCESSCTRL_WATCHDOG_NSP_BITS _u(0x00000002)
4580 #define ACCESSCTRL_WATCHDOG_NSP_MSB _u(1)
4581 #define ACCESSCTRL_WATCHDOG_NSP_LSB _u(1)
4582 #define ACCESSCTRL_WATCHDOG_NSP_ACCESS "RW"
4583 // -----------------------------------------------------------------------------
4584 // Field : ACCESSCTRL_WATCHDOG_NSU
4585 // Description : If 1, and NSP is also set, WATCHDOG can be accessed from a Non-
4586 // secure, Unprivileged context.
4588 // This bit is writable from a Non-secure, Privileged context, if
4589 // and only if the NSP bit is set.
4590 #define ACCESSCTRL_WATCHDOG_NSU_RESET _u(0x0)
4591 #define ACCESSCTRL_WATCHDOG_NSU_BITS _u(0x00000001)
4592 #define ACCESSCTRL_WATCHDOG_NSU_MSB _u(0)
4593 #define ACCESSCTRL_WATCHDOG_NSU_LSB _u(0)
4594 #define ACCESSCTRL_WATCHDOG_NSU_ACCESS "RW"
4595 // =============================================================================
4596 // Register : ACCESSCTRL_RSM
4597 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4598 // RSM, and at what security/privilege levels they can do so.
4600 // Defaults to Secure, Privileged processor or debug access only.
4602 // This register is writable only from a Secure, Privileged
4603 // processor or debugger, with the exception of the NSU bit, which
4604 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4605 #define ACCESSCTRL_RSM_OFFSET _u(0x000000dc)
4606 #define ACCESSCTRL_RSM_BITS _u(0x000000ff)
4607 #define ACCESSCTRL_RSM_RESET _u(0x000000b8)
4608 // -----------------------------------------------------------------------------
4609 // Field : ACCESSCTRL_RSM_DBG
4610 // Description : If 1, RSM can be accessed by the debugger, at
4611 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4613 #define ACCESSCTRL_RSM_DBG_RESET _u(0x1)
4614 #define ACCESSCTRL_RSM_DBG_BITS _u(0x00000080)
4615 #define ACCESSCTRL_RSM_DBG_MSB _u(7)
4616 #define ACCESSCTRL_RSM_DBG_LSB _u(7)
4617 #define ACCESSCTRL_RSM_DBG_ACCESS "RW"
4618 // -----------------------------------------------------------------------------
4619 // Field : ACCESSCTRL_RSM_DMA
4620 // Description : If 1, RSM can be accessed by the DMA, at security/privilege
4621 // levels permitted by SP/NSP/SU/NSU in this register.
4622 #define ACCESSCTRL_RSM_DMA_RESET _u(0x0)
4623 #define ACCESSCTRL_RSM_DMA_BITS _u(0x00000040)
4624 #define ACCESSCTRL_RSM_DMA_MSB _u(6)
4625 #define ACCESSCTRL_RSM_DMA_LSB _u(6)
4626 #define ACCESSCTRL_RSM_DMA_ACCESS "RW"
4627 // -----------------------------------------------------------------------------
4628 // Field : ACCESSCTRL_RSM_CORE1
4629 // Description : If 1, RSM can be accessed by core 1, at security/privilege
4630 // levels permitted by SP/NSP/SU/NSU in this register.
4631 #define ACCESSCTRL_RSM_CORE1_RESET _u(0x1)
4632 #define ACCESSCTRL_RSM_CORE1_BITS _u(0x00000020)
4633 #define ACCESSCTRL_RSM_CORE1_MSB _u(5)
4634 #define ACCESSCTRL_RSM_CORE1_LSB _u(5)
4635 #define ACCESSCTRL_RSM_CORE1_ACCESS "RW"
4636 // -----------------------------------------------------------------------------
4637 // Field : ACCESSCTRL_RSM_CORE0
4638 // Description : If 1, RSM can be accessed by core 0, at security/privilege
4639 // levels permitted by SP/NSP/SU/NSU in this register.
4640 #define ACCESSCTRL_RSM_CORE0_RESET _u(0x1)
4641 #define ACCESSCTRL_RSM_CORE0_BITS _u(0x00000010)
4642 #define ACCESSCTRL_RSM_CORE0_MSB _u(4)
4643 #define ACCESSCTRL_RSM_CORE0_LSB _u(4)
4644 #define ACCESSCTRL_RSM_CORE0_ACCESS "RW"
4645 // -----------------------------------------------------------------------------
4646 // Field : ACCESSCTRL_RSM_SP
4647 // Description : If 1, RSM can be accessed from a Secure, Privileged context.
4648 #define ACCESSCTRL_RSM_SP_RESET _u(0x1)
4649 #define ACCESSCTRL_RSM_SP_BITS _u(0x00000008)
4650 #define ACCESSCTRL_RSM_SP_MSB _u(3)
4651 #define ACCESSCTRL_RSM_SP_LSB _u(3)
4652 #define ACCESSCTRL_RSM_SP_ACCESS "RW"
4653 // -----------------------------------------------------------------------------
4654 // Field : ACCESSCTRL_RSM_SU
4655 // Description : If 1, and SP is also set, RSM can be accessed from a Secure,
4656 // Unprivileged context.
4657 #define ACCESSCTRL_RSM_SU_RESET _u(0x0)
4658 #define ACCESSCTRL_RSM_SU_BITS _u(0x00000004)
4659 #define ACCESSCTRL_RSM_SU_MSB _u(2)
4660 #define ACCESSCTRL_RSM_SU_LSB _u(2)
4661 #define ACCESSCTRL_RSM_SU_ACCESS "RW"
4662 // -----------------------------------------------------------------------------
4663 // Field : ACCESSCTRL_RSM_NSP
4664 // Description : If 1, RSM can be accessed from a Non-secure, Privileged
4666 #define ACCESSCTRL_RSM_NSP_RESET _u(0x0)
4667 #define ACCESSCTRL_RSM_NSP_BITS _u(0x00000002)
4668 #define ACCESSCTRL_RSM_NSP_MSB _u(1)
4669 #define ACCESSCTRL_RSM_NSP_LSB _u(1)
4670 #define ACCESSCTRL_RSM_NSP_ACCESS "RW"
4671 // -----------------------------------------------------------------------------
4672 // Field : ACCESSCTRL_RSM_NSU
4673 // Description : If 1, and NSP is also set, RSM can be accessed from a Non-
4674 // secure, Unprivileged context.
4676 // This bit is writable from a Non-secure, Privileged context, if
4677 // and only if the NSP bit is set.
4678 #define ACCESSCTRL_RSM_NSU_RESET _u(0x0)
4679 #define ACCESSCTRL_RSM_NSU_BITS _u(0x00000001)
4680 #define ACCESSCTRL_RSM_NSU_MSB _u(0)
4681 #define ACCESSCTRL_RSM_NSU_LSB _u(0)
4682 #define ACCESSCTRL_RSM_NSU_ACCESS "RW"
4683 // =============================================================================
4684 // Register : ACCESSCTRL_XIP_CTRL
4685 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4686 // XIP_CTRL, and at what security/privilege levels they can do so.
4688 // Defaults to Secure, Privileged processor or debug access only.
4690 // This register is writable only from a Secure, Privileged
4691 // processor or debugger, with the exception of the NSU bit, which
4692 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4693 #define ACCESSCTRL_XIP_CTRL_OFFSET _u(0x000000e0)
4694 #define ACCESSCTRL_XIP_CTRL_BITS _u(0x000000ff)
4695 #define ACCESSCTRL_XIP_CTRL_RESET _u(0x000000b8)
4696 // -----------------------------------------------------------------------------
4697 // Field : ACCESSCTRL_XIP_CTRL_DBG
4698 // Description : If 1, XIP_CTRL can be accessed by the debugger, at
4699 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4701 #define ACCESSCTRL_XIP_CTRL_DBG_RESET _u(0x1)
4702 #define ACCESSCTRL_XIP_CTRL_DBG_BITS _u(0x00000080)
4703 #define ACCESSCTRL_XIP_CTRL_DBG_MSB _u(7)
4704 #define ACCESSCTRL_XIP_CTRL_DBG_LSB _u(7)
4705 #define ACCESSCTRL_XIP_CTRL_DBG_ACCESS "RW"
4706 // -----------------------------------------------------------------------------
4707 // Field : ACCESSCTRL_XIP_CTRL_DMA
4708 // Description : If 1, XIP_CTRL can be accessed by the DMA, at
4709 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4711 #define ACCESSCTRL_XIP_CTRL_DMA_RESET _u(0x0)
4712 #define ACCESSCTRL_XIP_CTRL_DMA_BITS _u(0x00000040)
4713 #define ACCESSCTRL_XIP_CTRL_DMA_MSB _u(6)
4714 #define ACCESSCTRL_XIP_CTRL_DMA_LSB _u(6)
4715 #define ACCESSCTRL_XIP_CTRL_DMA_ACCESS "RW"
4716 // -----------------------------------------------------------------------------
4717 // Field : ACCESSCTRL_XIP_CTRL_CORE1
4718 // Description : If 1, XIP_CTRL can be accessed by core 1, at security/privilege
4719 // levels permitted by SP/NSP/SU/NSU in this register.
4720 #define ACCESSCTRL_XIP_CTRL_CORE1_RESET _u(0x1)
4721 #define ACCESSCTRL_XIP_CTRL_CORE1_BITS _u(0x00000020)
4722 #define ACCESSCTRL_XIP_CTRL_CORE1_MSB _u(5)
4723 #define ACCESSCTRL_XIP_CTRL_CORE1_LSB _u(5)
4724 #define ACCESSCTRL_XIP_CTRL_CORE1_ACCESS "RW"
4725 // -----------------------------------------------------------------------------
4726 // Field : ACCESSCTRL_XIP_CTRL_CORE0
4727 // Description : If 1, XIP_CTRL can be accessed by core 0, at security/privilege
4728 // levels permitted by SP/NSP/SU/NSU in this register.
4729 #define ACCESSCTRL_XIP_CTRL_CORE0_RESET _u(0x1)
4730 #define ACCESSCTRL_XIP_CTRL_CORE0_BITS _u(0x00000010)
4731 #define ACCESSCTRL_XIP_CTRL_CORE0_MSB _u(4)
4732 #define ACCESSCTRL_XIP_CTRL_CORE0_LSB _u(4)
4733 #define ACCESSCTRL_XIP_CTRL_CORE0_ACCESS "RW"
4734 // -----------------------------------------------------------------------------
4735 // Field : ACCESSCTRL_XIP_CTRL_SP
4736 // Description : If 1, XIP_CTRL can be accessed from a Secure, Privileged
4738 #define ACCESSCTRL_XIP_CTRL_SP_RESET _u(0x1)
4739 #define ACCESSCTRL_XIP_CTRL_SP_BITS _u(0x00000008)
4740 #define ACCESSCTRL_XIP_CTRL_SP_MSB _u(3)
4741 #define ACCESSCTRL_XIP_CTRL_SP_LSB _u(3)
4742 #define ACCESSCTRL_XIP_CTRL_SP_ACCESS "RW"
4743 // -----------------------------------------------------------------------------
4744 // Field : ACCESSCTRL_XIP_CTRL_SU
4745 // Description : If 1, and SP is also set, XIP_CTRL can be accessed from a
4746 // Secure, Unprivileged context.
4747 #define ACCESSCTRL_XIP_CTRL_SU_RESET _u(0x0)
4748 #define ACCESSCTRL_XIP_CTRL_SU_BITS _u(0x00000004)
4749 #define ACCESSCTRL_XIP_CTRL_SU_MSB _u(2)
4750 #define ACCESSCTRL_XIP_CTRL_SU_LSB _u(2)
4751 #define ACCESSCTRL_XIP_CTRL_SU_ACCESS "RW"
4752 // -----------------------------------------------------------------------------
4753 // Field : ACCESSCTRL_XIP_CTRL_NSP
4754 // Description : If 1, XIP_CTRL can be accessed from a Non-secure, Privileged
4756 #define ACCESSCTRL_XIP_CTRL_NSP_RESET _u(0x0)
4757 #define ACCESSCTRL_XIP_CTRL_NSP_BITS _u(0x00000002)
4758 #define ACCESSCTRL_XIP_CTRL_NSP_MSB _u(1)
4759 #define ACCESSCTRL_XIP_CTRL_NSP_LSB _u(1)
4760 #define ACCESSCTRL_XIP_CTRL_NSP_ACCESS "RW"
4761 // -----------------------------------------------------------------------------
4762 // Field : ACCESSCTRL_XIP_CTRL_NSU
4763 // Description : If 1, and NSP is also set, XIP_CTRL can be accessed from a Non-
4764 // secure, Unprivileged context.
4766 // This bit is writable from a Non-secure, Privileged context, if
4767 // and only if the NSP bit is set.
4768 #define ACCESSCTRL_XIP_CTRL_NSU_RESET _u(0x0)
4769 #define ACCESSCTRL_XIP_CTRL_NSU_BITS _u(0x00000001)
4770 #define ACCESSCTRL_XIP_CTRL_NSU_MSB _u(0)
4771 #define ACCESSCTRL_XIP_CTRL_NSU_LSB _u(0)
4772 #define ACCESSCTRL_XIP_CTRL_NSU_ACCESS "RW"
4773 // =============================================================================
4774 // Register : ACCESSCTRL_XIP_QMI
4775 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4776 // XIP_QMI, and at what security/privilege levels they can do so.
4778 // Defaults to Secure, Privileged processor or debug access only.
4780 // This register is writable only from a Secure, Privileged
4781 // processor or debugger, with the exception of the NSU bit, which
4782 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4783 #define ACCESSCTRL_XIP_QMI_OFFSET _u(0x000000e4)
4784 #define ACCESSCTRL_XIP_QMI_BITS _u(0x000000ff)
4785 #define ACCESSCTRL_XIP_QMI_RESET _u(0x000000b8)
4786 // -----------------------------------------------------------------------------
4787 // Field : ACCESSCTRL_XIP_QMI_DBG
4788 // Description : If 1, XIP_QMI can be accessed by the debugger, at
4789 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4791 #define ACCESSCTRL_XIP_QMI_DBG_RESET _u(0x1)
4792 #define ACCESSCTRL_XIP_QMI_DBG_BITS _u(0x00000080)
4793 #define ACCESSCTRL_XIP_QMI_DBG_MSB _u(7)
4794 #define ACCESSCTRL_XIP_QMI_DBG_LSB _u(7)
4795 #define ACCESSCTRL_XIP_QMI_DBG_ACCESS "RW"
4796 // -----------------------------------------------------------------------------
4797 // Field : ACCESSCTRL_XIP_QMI_DMA
4798 // Description : If 1, XIP_QMI can be accessed by the DMA, at security/privilege
4799 // levels permitted by SP/NSP/SU/NSU in this register.
4800 #define ACCESSCTRL_XIP_QMI_DMA_RESET _u(0x0)
4801 #define ACCESSCTRL_XIP_QMI_DMA_BITS _u(0x00000040)
4802 #define ACCESSCTRL_XIP_QMI_DMA_MSB _u(6)
4803 #define ACCESSCTRL_XIP_QMI_DMA_LSB _u(6)
4804 #define ACCESSCTRL_XIP_QMI_DMA_ACCESS "RW"
4805 // -----------------------------------------------------------------------------
4806 // Field : ACCESSCTRL_XIP_QMI_CORE1
4807 // Description : If 1, XIP_QMI can be accessed by core 1, at security/privilege
4808 // levels permitted by SP/NSP/SU/NSU in this register.
4809 #define ACCESSCTRL_XIP_QMI_CORE1_RESET _u(0x1)
4810 #define ACCESSCTRL_XIP_QMI_CORE1_BITS _u(0x00000020)
4811 #define ACCESSCTRL_XIP_QMI_CORE1_MSB _u(5)
4812 #define ACCESSCTRL_XIP_QMI_CORE1_LSB _u(5)
4813 #define ACCESSCTRL_XIP_QMI_CORE1_ACCESS "RW"
4814 // -----------------------------------------------------------------------------
4815 // Field : ACCESSCTRL_XIP_QMI_CORE0
4816 // Description : If 1, XIP_QMI can be accessed by core 0, at security/privilege
4817 // levels permitted by SP/NSP/SU/NSU in this register.
4818 #define ACCESSCTRL_XIP_QMI_CORE0_RESET _u(0x1)
4819 #define ACCESSCTRL_XIP_QMI_CORE0_BITS _u(0x00000010)
4820 #define ACCESSCTRL_XIP_QMI_CORE0_MSB _u(4)
4821 #define ACCESSCTRL_XIP_QMI_CORE0_LSB _u(4)
4822 #define ACCESSCTRL_XIP_QMI_CORE0_ACCESS "RW"
4823 // -----------------------------------------------------------------------------
4824 // Field : ACCESSCTRL_XIP_QMI_SP
4825 // Description : If 1, XIP_QMI can be accessed from a Secure, Privileged
4827 #define ACCESSCTRL_XIP_QMI_SP_RESET _u(0x1)
4828 #define ACCESSCTRL_XIP_QMI_SP_BITS _u(0x00000008)
4829 #define ACCESSCTRL_XIP_QMI_SP_MSB _u(3)
4830 #define ACCESSCTRL_XIP_QMI_SP_LSB _u(3)
4831 #define ACCESSCTRL_XIP_QMI_SP_ACCESS "RW"
4832 // -----------------------------------------------------------------------------
4833 // Field : ACCESSCTRL_XIP_QMI_SU
4834 // Description : If 1, and SP is also set, XIP_QMI can be accessed from a
4835 // Secure, Unprivileged context.
4836 #define ACCESSCTRL_XIP_QMI_SU_RESET _u(0x0)
4837 #define ACCESSCTRL_XIP_QMI_SU_BITS _u(0x00000004)
4838 #define ACCESSCTRL_XIP_QMI_SU_MSB _u(2)
4839 #define ACCESSCTRL_XIP_QMI_SU_LSB _u(2)
4840 #define ACCESSCTRL_XIP_QMI_SU_ACCESS "RW"
4841 // -----------------------------------------------------------------------------
4842 // Field : ACCESSCTRL_XIP_QMI_NSP
4843 // Description : If 1, XIP_QMI can be accessed from a Non-secure, Privileged
4845 #define ACCESSCTRL_XIP_QMI_NSP_RESET _u(0x0)
4846 #define ACCESSCTRL_XIP_QMI_NSP_BITS _u(0x00000002)
4847 #define ACCESSCTRL_XIP_QMI_NSP_MSB _u(1)
4848 #define ACCESSCTRL_XIP_QMI_NSP_LSB _u(1)
4849 #define ACCESSCTRL_XIP_QMI_NSP_ACCESS "RW"
4850 // -----------------------------------------------------------------------------
4851 // Field : ACCESSCTRL_XIP_QMI_NSU
4852 // Description : If 1, and NSP is also set, XIP_QMI can be accessed from a Non-
4853 // secure, Unprivileged context.
4855 // This bit is writable from a Non-secure, Privileged context, if
4856 // and only if the NSP bit is set.
4857 #define ACCESSCTRL_XIP_QMI_NSU_RESET _u(0x0)
4858 #define ACCESSCTRL_XIP_QMI_NSU_BITS _u(0x00000001)
4859 #define ACCESSCTRL_XIP_QMI_NSU_MSB _u(0)
4860 #define ACCESSCTRL_XIP_QMI_NSU_LSB _u(0)
4861 #define ACCESSCTRL_XIP_QMI_NSU_ACCESS "RW"
4862 // =============================================================================
4863 // Register : ACCESSCTRL_XIP_AUX
4864 // Description : Control whether debugger, DMA, core 0 and core 1 can access
4865 // XIP_AUX, and at what security/privilege levels they can do so.
4867 // Defaults to Secure, Privileged access only.
4869 // This register is writable only from a Secure, Privileged
4870 // processor or debugger, with the exception of the NSU bit, which
4871 // becomes Non-secure-Privileged-writable when the NSP bit is set.
4872 #define ACCESSCTRL_XIP_AUX_OFFSET _u(0x000000e8)
4873 #define ACCESSCTRL_XIP_AUX_BITS _u(0x000000ff)
4874 #define ACCESSCTRL_XIP_AUX_RESET _u(0x000000f8)
4875 // -----------------------------------------------------------------------------
4876 // Field : ACCESSCTRL_XIP_AUX_DBG
4877 // Description : If 1, XIP_AUX can be accessed by the debugger, at
4878 // security/privilege levels permitted by SP/NSP/SU/NSU in this
4880 #define ACCESSCTRL_XIP_AUX_DBG_RESET _u(0x1)
4881 #define ACCESSCTRL_XIP_AUX_DBG_BITS _u(0x00000080)
4882 #define ACCESSCTRL_XIP_AUX_DBG_MSB _u(7)
4883 #define ACCESSCTRL_XIP_AUX_DBG_LSB _u(7)
4884 #define ACCESSCTRL_XIP_AUX_DBG_ACCESS "RW"
4885 // -----------------------------------------------------------------------------
4886 // Field : ACCESSCTRL_XIP_AUX_DMA
4887 // Description : If 1, XIP_AUX can be accessed by the DMA, at security/privilege
4888 // levels permitted by SP/NSP/SU/NSU in this register.
4889 #define ACCESSCTRL_XIP_AUX_DMA_RESET _u(0x1)
4890 #define ACCESSCTRL_XIP_AUX_DMA_BITS _u(0x00000040)
4891 #define ACCESSCTRL_XIP_AUX_DMA_MSB _u(6)
4892 #define ACCESSCTRL_XIP_AUX_DMA_LSB _u(6)
4893 #define ACCESSCTRL_XIP_AUX_DMA_ACCESS "RW"
4894 // -----------------------------------------------------------------------------
4895 // Field : ACCESSCTRL_XIP_AUX_CORE1
4896 // Description : If 1, XIP_AUX can be accessed by core 1, at security/privilege
4897 // levels permitted by SP/NSP/SU/NSU in this register.
4898 #define ACCESSCTRL_XIP_AUX_CORE1_RESET _u(0x1)
4899 #define ACCESSCTRL_XIP_AUX_CORE1_BITS _u(0x00000020)
4900 #define ACCESSCTRL_XIP_AUX_CORE1_MSB _u(5)
4901 #define ACCESSCTRL_XIP_AUX_CORE1_LSB _u(5)
4902 #define ACCESSCTRL_XIP_AUX_CORE1_ACCESS "RW"
4903 // -----------------------------------------------------------------------------
4904 // Field : ACCESSCTRL_XIP_AUX_CORE0
4905 // Description : If 1, XIP_AUX can be accessed by core 0, at security/privilege
4906 // levels permitted by SP/NSP/SU/NSU in this register.
4907 #define ACCESSCTRL_XIP_AUX_CORE0_RESET _u(0x1)
4908 #define ACCESSCTRL_XIP_AUX_CORE0_BITS _u(0x00000010)
4909 #define ACCESSCTRL_XIP_AUX_CORE0_MSB _u(4)
4910 #define ACCESSCTRL_XIP_AUX_CORE0_LSB _u(4)
4911 #define ACCESSCTRL_XIP_AUX_CORE0_ACCESS "RW"
4912 // -----------------------------------------------------------------------------
4913 // Field : ACCESSCTRL_XIP_AUX_SP
4914 // Description : If 1, XIP_AUX can be accessed from a Secure, Privileged
4916 #define ACCESSCTRL_XIP_AUX_SP_RESET _u(0x1)
4917 #define ACCESSCTRL_XIP_AUX_SP_BITS _u(0x00000008)
4918 #define ACCESSCTRL_XIP_AUX_SP_MSB _u(3)
4919 #define ACCESSCTRL_XIP_AUX_SP_LSB _u(3)
4920 #define ACCESSCTRL_XIP_AUX_SP_ACCESS "RW"
4921 // -----------------------------------------------------------------------------
4922 // Field : ACCESSCTRL_XIP_AUX_SU
4923 // Description : If 1, and SP is also set, XIP_AUX can be accessed from a
4924 // Secure, Unprivileged context.
4925 #define ACCESSCTRL_XIP_AUX_SU_RESET _u(0x0)
4926 #define ACCESSCTRL_XIP_AUX_SU_BITS _u(0x00000004)
4927 #define ACCESSCTRL_XIP_AUX_SU_MSB _u(2)
4928 #define ACCESSCTRL_XIP_AUX_SU_LSB _u(2)
4929 #define ACCESSCTRL_XIP_AUX_SU_ACCESS "RW"
4930 // -----------------------------------------------------------------------------
4931 // Field : ACCESSCTRL_XIP_AUX_NSP
4932 // Description : If 1, XIP_AUX can be accessed from a Non-secure, Privileged
4934 #define ACCESSCTRL_XIP_AUX_NSP_RESET _u(0x0)
4935 #define ACCESSCTRL_XIP_AUX_NSP_BITS _u(0x00000002)
4936 #define ACCESSCTRL_XIP_AUX_NSP_MSB _u(1)
4937 #define ACCESSCTRL_XIP_AUX_NSP_LSB _u(1)
4938 #define ACCESSCTRL_XIP_AUX_NSP_ACCESS "RW"
4939 // -----------------------------------------------------------------------------
4940 // Field : ACCESSCTRL_XIP_AUX_NSU
4941 // Description : If 1, and NSP is also set, XIP_AUX can be accessed from a Non-
4942 // secure, Unprivileged context.
4944 // This bit is writable from a Non-secure, Privileged context, if
4945 // and only if the NSP bit is set.
4946 #define ACCESSCTRL_XIP_AUX_NSU_RESET _u(0x0)
4947 #define ACCESSCTRL_XIP_AUX_NSU_BITS _u(0x00000001)
4948 #define ACCESSCTRL_XIP_AUX_NSU_MSB _u(0)
4949 #define ACCESSCTRL_XIP_AUX_NSU_LSB _u(0)
4950 #define ACCESSCTRL_XIP_AUX_NSU_ACCESS "RW"
4951 // =============================================================================
4952 #endif // _HARDWARE_REGS_ACCESSCTRL_H