SWRU626 December   2025 CC3501E , CC3551E

 

  1.   1
  2. Read This First
    1. 1.1 About This Manual
    2. 1.2 Register, Field, and Bit Calls
    3.     Trademarks
  3. Architecture Overview
    1. 2.1  Target Applications
    2. 2.2  Introduction
    3. 2.3  Internal System Diagram
    4. 2.4  Arm Cortex M33
      1. 2.4.1 Processor Core
      2. 2.4.2 SysTick Timer
      3. 2.4.3 Nested Vectored Interrupt Controller
      4. 2.4.4 System Control Block (SCB)
      5. 2.4.5 TI AI instruction extensions
    5. 2.5  Power Management
      1. 2.5.1 VDD_MAIN
      2. 2.5.2 VDD_IO
      3. 2.5.3 VDDSF
      4. 2.5.4 VDD_PA
    6. 2.6  Debug Subsystem (DEBUGSS)
    7. 2.7  Memory Subsystem (MEMSS)
      1. 2.7.1 External Memory Interface
    8. 2.8  Hardware Security Module
    9. 2.9  General Purpose Timers (GPT)
    10. 2.10 Real Time Clock (RTC)
    11. 2.11 Direct Memory Access
    12. 2.12 GPIOs
    13. 2.13 Communication Peripherals
      1. 2.13.1 UART
      2. 2.13.2 I2C
      3. 2.13.3 SPI
      4. 2.13.4 I2S
      5. 2.13.5 SDMMC
      6. 2.13.6 SDIO
      7. 2.13.7 CAN
      8. 2.13.8 ADC
  4. Arm Cortex-M33 Processor
    1. 3.1 Arm Cortex-M33 Processor Introduction
    2. 3.2 Block Diagram
    3. 3.3 M33 instantiation parameters
    4. 3.4 Arm Cortex-M33 System Peripheral Details
      1. 3.4.1 Floating Point Unit (FPU)
      2. 3.4.2 Memory Protection Unit (MPU)
      3. 3.4.3 Digital Signal Processing (DSP)
      4. 3.4.4 Security Attribution Unit (SAU)
      5. 3.4.5 System Timer
      6. 3.4.6 Nested Vectored Interrupt Controller
      7. 3.4.7 System Control Block
      8. 3.4.8 System Control Space
    5. 3.5 CPU Sub-System Peripheral Details
      1. 3.5.1 Trace Port Interface Unit (TPIU)
      2. 3.5.2 DAP Bridge and Debug Authentication
      3. 3.5.3 Implementation Defined Attribution Unit (IDAU)
    6. 3.6 Programming Model
      1. 3.6.1 Modes of operation and execution
        1. 3.6.1.1 Security states
        2. 3.6.1.2 Operating modes
        3. 3.6.1.3 Operating states
        4. 3.6.1.4 Privileged access and unprivileged user access
      2. 3.6.2 Instruction set summary
      3. 3.6.3 Memory model
        1. 3.6.3.1 Private Peripheral Bus
        2. 3.6.3.2 Unaligned accesses
      4. 3.6.4 Processor core registers summary
      5. 3.6.5 Exceptions
        1. 3.6.5.1 Exception handling and prioritization
    7. 3.7 TrustZone-M
      1. 3.7.1 Overview
      2. 3.7.2 M33 Configuration
      3. 3.7.3 Description of elements
        1. 3.7.3.1 IDAU (Implementation Defined Attribution Unit)
          1. 3.7.3.1.1 Expected use
    8. 3.8 CC35xx Host MCU Registers
      1. 3.8.1 HOSTMCU_AON Registers
      2. 3.8.2 HOST_MCU Registers
      3. 3.8.3 HOST_MCU_SEC Registers
    9. 3.9 Arm® Cortex®-M33 Registers
      1. 3.9.1  CPU_ROM_TABLE Registers
      2. 3.9.2  TPIU Registers
      3. 3.9.3  DCB Registers
      4. 3.9.4  DIB Registers
      5. 3.9.5  DWT Registers
      6. 3.9.6  FPB Registers
      7. 3.9.7  FPE Registers
      8. 3.9.8  ICB Registers
      9. 3.9.9  ITM Registers
      10. 3.9.10 MPU Registers
      11. 3.9.11 NVIC Registers
      12. 3.9.12 SAU Registers
      13. 3.9.13 SCB Registers
      14. 3.9.14 SYSTIMER Registers
      15. 3.9.15 SYSTICK Registers
  5. Memory Map
    1. 4.1 Memory Map
  6. Interrupts and Events
    1. 5.1 Exception Model
      1. 5.1.1 Exception States
      2. 5.1.2 Exception Types
      3. 5.1.3 Exception Handlers
      4. 5.1.4 Vector Table
      5. 5.1.5 Exception Priorities
      6. 5.1.6 Interrupt Priority Grouping
      7. 5.1.7 Exception Entry and Return
        1. 5.1.7.1 Exception Entry
        2. 5.1.7.2 Exception Return
    2. 5.2 Fault Handling
      1. 5.2.1 Fault Types
      2. 5.2.2 Fault Escalation to HardFault
      3. 5.2.3 Fault Status Registers and Fault Address Registers
      4. 5.2.4 Lockup
    3. 5.3 Security State Switches
    4. 5.4 Event Manager
      1. 5.4.1 Introduction
      2. 5.4.2 Interrupts List
      3. 5.4.3 Wakeup Sources
      4. 5.4.4 Shared Peripherals MUX Selector
        1. 5.4.4.1 ADC HW Event Selector Mux
        2. 5.4.4.2 I2S HW Event Selector Mux
        3. 5.4.4.3 PDM HW Event Selector Mux
      5. 5.4.5 Timers MUX Selector Mux
        1. 5.4.5.1 SysTimer0 HW Event Selector Mux
        2. 5.4.5.2 SysTimer1 HW Event Selector Mux
        3. 5.4.5.3 RTC HW Event Selector Mux
      6. 5.4.6 GPTIMERs MUX Selector Mux
        1. 5.4.6.1 GPTIMER0 HW Event Selector Mux
        2. 5.4.6.2 GPTIMER1 HW Event Selector Mux
    5. 5.5 SOC_IC Registers
    6. 5.6 SOC_AON Registers
    7. 5.7 SOC_AAON Registers
  7. Debug Subsystem (DEBUGSS)
    1. 6.1 Introduction
    2. 6.2 Block Diagram
    3. 6.3 Overview
    4. 6.4 Physical Interface
    5. 6.5 Debug Access Ports
    6. 6.6 Debug Features
      1. 6.6.1 Processor Debug
      2. 6.6.2 Breakpoint Unit (BPU)
      3. 6.6.3 Peripheral Debug
    7. 6.7 Behavior in Low Power Modes
    8. 6.8 Debug Access Control
    9. 6.9 SOC_DEBUGSS Registers
  8. Power, Reset, Clock Management
    1. 7.1 Power Management
      1. 7.1.1 Power Supply System
        1. 7.1.1.1 VDD_MAIN
        2. 7.1.1.2 VIO
        3. 7.1.1.3 VDDSF
        4. 7.1.1.4 VPA
      2. 7.1.2 Power States
      3. 7.1.3 Power Domains
      4. 7.1.4 Brownout (BOR)
      5. 7.1.5 Boot Sequence
    2. 7.2 Reset
      1. 7.2.1 Reset Cause
      2. 7.2.2 Watchdog Timer (WDT)
    3. 7.3 Clocks
      1. 7.3.1 Fast Clock
      2. 7.3.2 Slow Clock
        1. 7.3.2.1 Slow Clock Overview
        2. 7.3.2.2 Slow Clock Tree
        3. 7.3.2.3 Slow Clock Boot Process
    4. 7.4 PRCM_AON Registers
    5. 7.5 PRCM_SCRATCHPAD Registers
  9. Memory Subsystem (MEMSS)
    1. 8.1  Introduction
    2. 8.2  SRAM
    3. 8.3  D-Cache
    4. 8.4  Flash
    5. 8.5  PSRAM
    6. 8.6  XiP Memory Access
      1. 8.6.1 OTFDE
      2. 8.6.2 xSPI
      3. 8.6.3 Topology
      4. 8.6.4 µDMA
      5. 8.6.5 Arbiter
    7. 8.7  ICACHE Registers
    8. 8.8  DCACHE Registers
    9. 8.9  OSPI Registers
    10. 8.10 HOST_XIP Registers
  10. Hardware Security Module (HSM)
    1. 9.1 Introduction
    2. 9.2 Overview
    3. 9.3 Mailbox and Register Access Firewall
    4. 9.4 DMA Firewall
    5. 9.5 HSM Key Storage
    6. 9.6 HSM Registers
    7. 9.7 HSM_NON_SEC Registers
    8. 9.8 HSM_SEC Registers
  11. 10Device Boot and Bootloader
    1. 10.1 CC35xx Boot Concept
    2. 10.2 Features
    3. 10.3 Vendor Images Format and Processing
      1. 10.3.1 External Flash Arrangement
      2. 10.3.2 Vendor Images Format
    4. 10.4 Boot Flows
      1. 10.4.1 Application Execution Boot Flow
      2. 10.4.2 Activation Flow
      3. 10.4.3 Initial Programming Flow
      4. 10.4.4 Reprogramming Flow
      5. 10.4.5 Wireless Connectivity Testing Tool Flow
    5. 10.5 Chain of Trust
  12. 11Direct Memory Access (DMA)
    1. 11.1 Overview
    2. 11.2 Block Diagram
    3. 11.3 Functional Description
      1. 11.3.1 Channels Assignment
      2. 11.3.2 Transfer Types
      3. 11.3.3 Addressing Modes
      4. 11.3.4 Transfer Modes
      5. 11.3.5 DMA Aligner Support
      6. 11.3.6 Initiating DMA Transfers
      7. 11.3.7 Stopping DMA Transfers
      8. 11.3.8 Channel Priorities
      9. 11.3.9 DMA Interrupts
    4. 11.4 HOST_DMA Registers
  13. 12One Time Programming (OTP)
  14. 13General Purpose Timers (GPT)
    1. 13.1 Overview
    2. 13.2 Block Diagram
    3. 13.3 Functional Description
      1. 13.3.1  Prescaler
      2. 13.3.2  Counter
      3. 13.3.3  Target
      4. 13.3.4  Channel Input Logic
      5. 13.3.5  Channel Output Logic
      6. 13.3.6  Channel Actions
        1. 13.3.6.1 Period and Pulse Width Measurement
        2. 13.3.6.2 Clear on Zero, Toggle on Compare Repeatedly
        3. 13.3.6.3 Set on Zero, Toggle on Compare Repeatedly
      7. 13.3.7  Channel Capture Configuration
      8. 13.3.8  Channel Filters
        1. 13.3.8.1 Setting up the Channel Filters
      9. 13.3.9  Synchronize Multiple GPTimers
      10. 13.3.10 Interrupts, ADC Trigger, and DMA Request
    4. 13.4 Timer Modes
      1. 13.4.1 Quadrature Decoder
      2. 13.4.2 DMA
      3. 13.4.3 IR Generation
      4. 13.4.4 Fault and Park
      5. 13.4.5 Dead-Band
      6. 13.4.6 Dead-Band, Fault and Park
      7. 13.4.7 Example Application: Brushless DC (BLDC) Motor
    5. 13.5 GPTIMER Registers
  15. 14System Timer (SysTimer)
    1. 14.1 Overview
    2. 14.2 Block Diagram
    3. 14.3 Functional Description
      1. 14.3.1 Common Channel Features
        1. 14.3.1.1 Compare Mode
        2. 14.3.1.2 Capture Mode
        3. 14.3.1.3 Additional Channel Arming Methods
      2. 14.3.2 Interrupts and Events
    4. 14.4 SYSRESOURCES Registers
    5. 14.5 SYSTIM Registers
  16. 15Real-Time Clock (RTC)
    1. 15.1 Introduction
    2. 15.2 Block Diagram
    3. 15.3 Interrupts and Events
      1. 15.3.1 Input Event
      2. 15.3.2 Output Event
      3. 15.3.3 Arming and Disarming Channels
    4. 15.4 CAPTURE and COMPARE Configurations
      1. 15.4.1 CHANNEL 0 - COMPARE CHANNEL
      2. 15.4.2 CHANNEL 1 - CAPTURE CHANNEL
    5. 15.5 RTC Registers
  17. 16General Purpose Input/Output (GPIOs)
    1. 16.1 Introduction
    2. 16.2 Block Diagram
    3. 16.3 I/O Mapping and Configuration
      1. 16.3.1 Basic I/O Mapping
      2. 16.3.2 Pin Mapping
    4. 16.4 Edge Detection
    5. 16.5 GPIO
    6. 16.6 I/O Pins
    7. 16.7 Unused Pins
    8. 16.8 IOMUX Registers
  18. 17Universal Asynchronous Receivers/Transmitters (UART)
    1. 17.1 Introduction
    2. 17.2 Block Diagram
    3. 17.3 UART Functional Description
      1. 17.3.1 Transmit and Receive Logic
      2. 17.3.2 Baud Rate Generation
      3. 17.3.3 FIFO Operation
        1. 17.3.3.1 FIFO Remapping
      4. 17.3.4 Data Transmission
      5. 17.3.5 Flow Control
      6. 17.3.6 IrDA Encoding and Decoding
      7. 17.3.7 Interrupts
      8. 17.3.8 Loopback Operation
    4. 17.4 UART-LIN Specification
      1. 17.4.1 Break transmission in UART mode
      2. 17.4.2 Break reception in UART mode
      3. 17.4.3 Break/Synch transmission in LIN mode
      4. 17.4.4 Break/Synch reception in LIN mode
      5. 17.4.5 Dormant mode operation
      6. 17.4.6 Event signal generation
      7. 17.4.7 Event signal detection when device is in active/idle modes
      8. 17.4.8 Event signal detection when device is in sleep mode
    5. 17.5 Interface to Host DMA
    6. 17.6 Initialization and Configuration
    7. 17.7 UART Registers
  19. 18Serial Peripheral Interface (SPI)
    1. 18.1 Overview
      1. 18.1.1 Features
      2. 18.1.2 Block Diagram
    2. 18.2 Signal Description
    3. 18.3 Functional Description
      1. 18.3.1  Clock Control
      2. 18.3.2  FIFO Operation
        1. 18.3.2.1 Transmit FIFO
        2. 18.3.2.2 Repeated Transmit Operation
        3. 18.3.2.3 Receive FIFO
        4. 18.3.2.4 FIFO Flush
      3. 18.3.3  Interrupts
      4. 18.3.4  Data Format
      5. 18.3.5  Delayed Data Sampling
      6. 18.3.6  Chip Select Control
      7. 18.3.7  Command Data Control
      8. 18.3.8  Protocol Descriptions
        1. 18.3.8.1 Motorola SPI Frame Format
        2. 18.3.8.2 Texas Instruments Synchronous Serial Frame Format
        3. 18.3.8.3 MICROWIRE Frame Format
      9. 18.3.9  CRC Configuration
      10. 18.3.10 Auto CRC Functionality
      11. 18.3.11 SPI Status
      12. 18.3.12 Debug Halt
    4. 18.4 Host DMA Operation
    5. 18.5 Initialization and Configuration
    6. 18.6 SPI Registers
  20. 19Inter-Integrated Circuit (I2C) Interface
    1. 19.1 Introduction
    2. 19.2 Block Diagram
    3. 19.3 Functional Description
      1. 19.3.1 Clock Control
        1. 19.3.1.1 Internal Clock
        2. 19.3.1.2 External Clock
      2. 19.3.2 General Architecture
        1. 19.3.2.1  Start and Stop Conditions
        2. 19.3.2.2  Data Format with 7-Bit Address
        3. 19.3.2.3  Data Format with 10-Bit Addressing
          1. 19.3.2.3.1 Additional 10-Bit Scenarios
        4. 19.3.2.4  Acknowledge
        5. 19.3.2.5  Repeated Start
        6. 19.3.2.6  Clock Stretching
        7. 19.3.2.7  Arbitration
        8. 19.3.2.8  Multi-Controller mode
        9. 19.3.2.9  Glitch Suppression
        10. 19.3.2.10 FIFO Operation
        11. 19.3.2.11 Burst Mode Operation
        12. 19.3.2.12 DMA Operation
        13. 19.3.2.13 Flush Stale Tx Data in Target Mode
          1. 19.3.2.13.1 Recommended Sequence
        14. 19.3.2.14 SMBUS 3.0 Support
          1. 19.3.2.14.1 Quick Command
          2. 19.3.2.14.2 Acknowledge Control
          3. 19.3.2.14.3 Alert Response protocol
          4. 19.3.2.14.4 Address Resolution Protocol
          5. 19.3.2.14.5 Enhanced Acknowledge Control
    4. 19.4 Initialization and Configuration
    5. 19.5 Interrupts
    6. 19.6 I2C Registers
  21. 20Secure Digital Multimedia Card (SDMMC)
    1. 20.1 Introduction
      1. 20.1.1 SDMMC Features
      2. 20.1.2 Integration
    2. 20.2 Functional Description
      1. 20.2.1  SDMMC Functional Modes
        1. 20.2.1.1 SDMMC Connected to an SD Card
        2. 20.2.1.2 Protocol and Data Format
          1. 20.2.1.2.1 Protocol
          2. 20.2.1.2.2 Data Format
      2. 20.2.2  SD Card Feedback
      3. 20.2.3  Resets
        1. 20.2.3.1 Hardware Reset
        2. 20.2.3.2 Software Reset
      4. 20.2.4  Interrupt Requests
        1. 20.2.4.1 Interrupt-Driven Operation
        2. 20.2.4.2 Polling
      5. 20.2.5  DMA Modes
        1. 20.2.5.1 DMA Peripheral Mode Operations
          1. 20.2.5.1.1 DMA Receive Mode
          2. 20.2.5.1.2 DMA Transmit Mode
      6. 20.2.6  Buffer Management
        1. 20.2.6.1 Data Buffer
          1. 20.2.6.1.1 Memory Size and Block Length
          2. 20.2.6.1.2 Data Buffer Status
      7. 20.2.7  Transfer Process
        1. 20.2.7.1 Different Types of Commands
        2. 20.2.7.2 Different Types of Responses
      8. 20.2.8  Transfer or Command Status and Error Reporting
        1. 20.2.8.1 Busy Timeout for R1b, R5b Response Type
        2. 20.2.8.2 Busy Timeout After Write CRC Status
        3. 20.2.8.3 Write CRC Status Timeout
        4. 20.2.8.4 Read Data Timeout
      9. 20.2.9  Auto Command 12 Timings
        1. 20.2.9.1 Auto Command 12 Timings During Write Transfer
        2. 20.2.9.2 Auto Command 12 Timings During Read Transfer
      10. 20.2.10 Transfer Stop
      11. 20.2.11 Output Signals Generation
        1. 20.2.11.1 Generation on Falling Edge of SDMMC Clock
        2. 20.2.11.2 Generation on Rising Edge of SDMMC Clock
      12. 20.2.12 Test Registers
      13. 20.2.13 SDMMC Hardware Status Features
    3. 20.3 Low-Level Programming Models
      1. 20.3.1 SDMMC Initialization Flow
        1. 20.3.1.1 Enable OCP and CLKADPI Clocks
        2. 20.3.1.2 SD Soft Reset Flow
        3. 20.3.1.3 Set SD Default Capabilities
        4. 20.3.1.4 SDMMC Host and Bus Configuration
      2. 20.3.2 Operational Modes Configuration
        1. 20.3.2.1 Basic Operations for SDMMC
        2. 20.3.2.2 Card Detection, Identification, and Selection
    4. 20.4 SDMMC Registers
  22. 21Secure Digital Input/Output (SDIO)
    1. 21.1 Introduction
    2. 21.2 Block Diagram
    3. 21.3 Functional Description
      1. 21.3.1 SDIO Interface Description
      2. 21.3.2 Protocol and Data Format
      3. 21.3.3 I/O Read/Write Command
        1. 21.3.3.1 IO_WR_DIRECT Command (CMD52)
        2. 21.3.3.2 IO_WR_EXTENDED Command (CMD53)
      4. 21.3.4 Reset
      5. 21.3.5 FIFO Operation
        1. 21.3.5.1 Rx FIFO (For Host Write)
        2. 21.3.5.2 Tx FIFO (For Host Read)
      6. 21.3.6 Interrupt Request
        1. 21.3.6.1 External Host IRQ
        2. 21.3.6.2 M33 IRQ
      7. 21.3.7 Transaction Details
        1. 21.3.7.1 Host write to SDIO IP (Rx FIFO)
          1. 21.3.7.1.1 Host write to SDIO IP (Rx FIFO) – Long SW latency case
          2. 21.3.7.1.2 Host write to SDIO IP (Rx FIFO) – CRC Error Case
        2. 21.3.7.2 Host reads from SDIO (TX buffer)
    4. 21.4 SDIO_CORE Registers
    5. 21.5 SDIO_CARD_FN1 Registers
  23. 22Inter-Integrated Circuit Sound (I2S)
    1. 22.1  Introduction
    2. 22.2  Block Diagram
    3. 22.3  Signal Descriptions
    4. 22.4  Functional Description
      1. 22.4.1 Pin Configuration
      2. 22.4.2 Serial Format Configuration
        1. 22.4.2.1 Register Configuration
      3. 22.4.3 Left-Justified (LJF)
        1. 22.4.3.1 Register Configuration
      4. 22.4.4 Right-Justified (RJF)
        1. 22.4.4.1 Register Configuration
      5. 22.4.5 DSP
        1. 22.4.5.1 Register Configuration
      6. 22.4.6 Clock Configuration
    5. 22.5  Memory Interface
      1. 22.5.1 Sample Word Length
      2. 22.5.2 Padding Mechanism
      3. 22.5.3 Channel Mapping
      4. 22.5.4 Sample Storage in Memory
      5. 22.5.5 DMA Operation
        1. 22.5.5.1 Start-Up
        2. 22.5.5.2 Operation
        3. 22.5.5.3 Shutdown
    6. 22.6  Samplestamp Generator
      1. 22.6.1 Samplestamp Counters
      2. 22.6.2 Start-Up Triggers
      3. 22.6.3 Samplestamp Capture
      4. 22.6.4 Achieving constant audio latency
    7. 22.7  Error Detection
    8. 22.8  Usage
      1. 22.8.1 Start-Up Sequence
      2. 22.8.2 Shutdown Sequence
    9. 22.9  I2S Configuration Guideline
    10. 22.10 I2S Registers
  24. 23Pulse Density Modulation (PDM)
    1. 23.1  Introduction
    2. 23.2  Block Diagram
    3. 23.3  Input Selection
      1. 23.3.1 PDM Data Mode
      2. 23.3.2 Manchester Input Mode
    4. 23.4  CIC Filter
      1. 23.4.1 Filter Design
      2. 23.4.2 Digital Filter Output
      3. 23.4.3 Offset Binary Mode
      4. 23.4.4 Twos-Complement Mode
    5. 23.5  FIFO Organization in Different Modes
      1. 23.5.1 Single Mono Microphone Configuration
        1. 23.5.1.1 24-bit Sample Size
          1. 23.5.1.1.1 32-bit Data Read
        2. 23.5.1.2 16-bit Sample Size
          1. 23.5.1.2.1 32-bit Data Read
          2. 23.5.1.2.2 16-bit Data Read
        3. 23.5.1.3 8-bit Sample Size
          1. 23.5.1.3.1 32-bit Data Read
          2. 23.5.1.3.2 16-bit Data Read
          3. 23.5.1.3.3 8-bit Data Read
      2. 23.5.2 Stereo or Dual Mono Microphone Configuration
        1. 23.5.2.1 24-bit Sample Size
          1. 23.5.2.1.1 32-bit Data Read
        2. 23.5.2.2 16-bit Sample Size
          1. 23.5.2.2.1 32-bit Data Read
          2. 23.5.2.2.2 16-bit Data Read
        3. 23.5.2.3 8-bit Sample Size
          1. 23.5.2.3.1 32-bit Data Read
          2. 23.5.2.3.2 16-bit Data Read
          3. 23.5.2.3.3 8-bit Data Read
      3. 23.5.3 FIFO Threshold Setting
      4. 23.5.4 Reset FIFO
    6. 23.6  Automatic Gain Control (AGC)
      1. 23.6.1 Operation in 2's Complement Format
      2. 23.6.2 Operation in Offset Binary Format
    7. 23.7  Interrupts
    8. 23.8  Clock Select and Control
    9. 23.9  DMA Operation
    10. 23.10 Samplestamp Generator
      1. 23.10.1 Samplestamp Counters
      2. 23.10.2 Start-Up Triggers
      3. 23.10.3 Samplestamp Capture
      4. 23.10.4 Achieving Constant Audio Latency
    11. 23.11 Debug‑Mode Flag Behavior
    12. 23.12 Software Guidelines
    13. 23.13 PDM Registers
  25. 24Analog to Digital Converter (ADC)
    1. 24.1 Overview
    2. 24.2 Block Diagram
    3. 24.3 Functional Description
      1. 24.3.1  ADC Core
      2. 24.3.2  Voltage Reference Options
      3. 24.3.3  Internal Channels
      4. 24.3.4  Resolution Modes
      5. 24.3.5  ADC Clocking
      6. 24.3.6  Power Down Behavior
      7. 24.3.7  Sampling Trigger Sources and Sampling Modes
        1. 24.3.7.1 AUTO Sampling Mode
        2. 24.3.7.2 MANUAL Sampling Mode
      8. 24.3.8  Sampling Period
      9. 24.3.9  Conversion Modes
      10. 24.3.10 ADC Data Format
      11. 24.3.11 Status Register
      12. 24.3.12 ADC Events
        1. 24.3.12.1 Generic Event Publishers (INT_EVENT0 & INT_EVENT1)
        2. 24.3.12.2 DMA Trigger Event Publisher (INT_EVENT2)
        3. 24.3.12.3 Generic Event Subscriber
      13. 24.3.13 Advanced Features
        1. 24.3.13.1 Window Comparator
        2. 24.3.13.2 DMA & FIFO Operation
          1. 24.3.13.2.1 DMA/CPU Operation in Non-FIFO Mode (FIFOEN=0)
          2. 24.3.13.2.2 DMA/CPU Operation in FIFO Mode (FIFOEN=1)
          3. 24.3.13.2.3 DMA/CPU Operation Summary Matrix
        3. 24.3.13.3 Ad-hoc Single Conversion
    4. 24.4 ADC Registers
  26. 25Controller Area Network (CAN)
    1. 25.1 Introduction
    2. 25.2 Functions
    3. 25.3 DCAN Subsystem
    4. 25.4 DCAN Functional Description
      1. 25.4.1 Operating Modes
        1. 25.4.1.1 Software Initialization
        2. 25.4.1.2 Normal Operation
        3. 25.4.1.3 Restricted Operation Mode
        4. 25.4.1.4 Bus Monitoring Mode
        5. 25.4.1.5 Disabled Automatic Retransmission
          1. 25.4.1.5.1 Frame Transmission in DAR Mode
        6. 25.4.1.6 Power Down (Sleep Mode)
          1. 25.4.1.6.1 DCAN clock stop and wake operations
          2. 25.4.1.6.2 DCAN debug suspend operation
        7. 25.4.1.7 Test Modes
          1. 25.4.1.7.1 External Loop Back Mode
          2. 25.4.1.7.2 Internal Loop Back Mode
      2. 25.4.2 Timestamp Generation
        1. 25.4.2.1 Block Diagram
      3. 25.4.3 Timeout Counter
      4. 25.4.4 Rx Handling
        1. 25.4.4.1 Acceptance Filtering
          1. 25.4.4.1.1 Range Filter
          2. 25.4.4.1.2 Filter for specific IDs
          3. 25.4.4.1.3 Classic Bit Mask Filter
          4. 25.4.4.1.4 Standard Message ID Filtering
          5. 25.4.4.1.5 Extended Message ID Filtering
        2. 25.4.4.2 Rx FIFOs
          1. 25.4.4.2.1 Rx FIFO Blocking Mode
          2. 25.4.4.2.2 Rx FIFO Overwrite Mode
        3. 25.4.4.3 Dedicated Rx Buffers
          1. 25.4.4.3.1 Rx Buffer Handling
        4. 25.4.4.4 Debug on CAN Support
          1. 25.4.4.4.1 Filtering for Debug Messages
          2. 25.4.4.4.2 Debug Message Handling
      5. 25.4.5 Tx Handling
        1. 25.4.5.1 Transmit Pause
        2. 25.4.5.2 Dedicated Tx Buffers
        3. 25.4.5.3 Tx FIFO
        4. 25.4.5.4 Tx Queue
        5. 25.4.5.5 Mixed Dedicated Tx Buffers / Tx FIFO
        6. 25.4.5.6 Mixed Dedicated Tx Buffers / Tx Queue
        7. 25.4.5.7 Transmit Cancellation
        8. 25.4.5.8 Tx Event Handling
      6. 25.4.6 FIFO Acknowledge Handling
      7. 25.4.7 DCAN Message RAM
        1. 25.4.7.1 Message RAM Configuration
        2. 25.4.7.2 Rx Buffer and FIFO Element
        3. 25.4.7.3 Tx Buffer Element
        4. 25.4.7.4 Tx Event FIFO Element
        5. 25.4.7.5 Standard Message ID Filter Element
        6. 25.4.7.6 Extended Message ID Filter Element
      8. 25.4.8 Interrupt Requests
    5. 25.5 DCAN Wrapper
    6. 25.6 DCAN Clock Enable
    7. 25.7 DCAN Registers
  27. 26Revision History

SOC_AON Registers

Table 5-22 lists the memory-mapped registers for the SOC_AON registers. All register offset addresses not listed in Table 5-22 should be considered as reserved locations and the register contents should not be modified.

Table 5-22 SOC_AON Registers
OffsetAcronymRegister NameSection
ChSPEVTCTLPeripheral Interrupt ControlSection 5.6.1
10hTMEVTCTLTimers Interrupt ControlSection 5.6.2
14hGPT0EVTCTL0GPTIMER0 Interrupt Control 0Section 5.6.3
18hGPT1EVTCTL0GPTIMER1 Interrupt ControlSection 5.6.4
54hDMEMSTARTData Ram Start AdressSection 5.6.5
58hDMEMENDData Ram End AdressSection 5.6.6
64hTCMSTARTTCM Data Ram Start AdressSection 5.6.7
68hTCMENDTCM Data Ram End AdressSection 5.6.8
7ChGPIOEVTS0GPIO Event Status 0Section 5.6.9
80hGPIOEVTS1GPIO Event Status 1Section 5.6.10
84hMEMSSCTL0MEMSS Control 0Section 5.6.11
88hMEMSSCTL1MEMSS Control 1Section 5.6.12
9ChVTORSVTOR Host Secure AddressSection 5.6.13
A0hVTORNSVTOR Host Non-Secure AddressSection 5.6.14
A8hCPULOCKSCPU LocksSection 5.6.15
AChHOSTLOCKSHost LocksSection 5.6.16
B0hHOSTBOOTHost Boot DoneSection 5.6.17
B4hSECCFGSecurity ConfigurationsSection 5.6.18
D4hERRSIMASKError Host Secured Interrupt MaskSection 5.6.19
D8hERRSISETError Host Secured Interrupt SetSection 5.6.20
DChERRSICLRError Host Secured Interrupt ClearSection 5.6.21
E0hERRSIMSETError Host Secured Masked Interrupt SetSection 5.6.22
E4hERRSIMCLRError Host Secured Masked Interrupt ClearSection 5.6.23
E8hERRSRISError Host Secured Raw Interrupt StatusSection 5.6.24
EChERRSMISDoorbell Host Secured Masked Interrupt StatusSection 5.6.25
F0hGPT0EVTCTL1GPTIMER0 Interrupt Control 1Section 5.6.26
F4hGPT1EVTCTL1GPTIMER1 Interrupt Control 1Section 5.6.27
104hESMSTACSTESM's StatusSection 5.6.28
10ChMEMSSCFGMEMSS ConfigurationsSection 5.6.29
138hGPIOMIS0SGPIO's Masked Interrupt Status 0Section 5.6.30
13ChGPIOMIS1SGPIO's Masked Interrupt Status 1Section 5.6.31
140hGPIOFNC0SGPIO's Interrupt Mask 0Section 5.6.32
144hGPIOFNC1SGPIO's Interrupt Mask 1Section 5.6.33
14ChESM1VAL2NDESM1 Second Magic ValueSection 5.6.34
150hESM2VAL2NDESM2 Second Magic ValueSection 5.6.35
154hESM1STA2NDESM1 Second Magic Value StatusSection 5.6.36
158hESM2STA2NDESM2 Second Magic Value StatusSection 5.6.37
15ChFWCFGHOSTHost Firewall BypassSection 5.6.38
160hFWCFGDMADMA Firewall BypassSection 5.6.39
164hFWCFGFPRPHPeripherals Firewall BypassSection 5.6.40
168hFWCFGM33Cortex Firewall BypassSection 5.6.41
16ChFWCFGMEMSSMEMSS Firewall BypassSection 5.6.42
170hFWIOGENSELIOMUX Common Firewall ConfigurationSection 5.6.43
174hFWPRCMHOSTPRCM HOST Firewall ConfigurationSection 5.6.44
178hFWPRCMSPADPRCM Scratchpad Firewall ConfigurationSection 5.6.45
17ChFWPRCMCMNPRCM Common Firewall ConfigurationSection 5.6.46
180hFWCKMClock Manager Firewall ConfigurationSection 5.6.47
184hFWSOCICInterconnect Firewall ConfigurationSection 5.6.48
188hFWAONM33SSOC AON Host Secure Aperture Firewall ConfigurationSection 5.6.49
18ChFWAONM33NSSOC AON Host Non-Secure Aperture Firewall ConfigurationSection 5.6.50
190hFWAAONM33SSOC AAON Host Secure Aperture Firewall ConfigurationSection 5.6.51
194hFWAAONM33NSSOC AAON Host Non-Secure Aperture Firewall ConfigurationSection 5.6.52
198hFWCMNRTCRTC Firewall ConfigurationSection 5.6.53
19ChFWMEMSS0MEMSS Region 0 Firewall ConfigurationSection 5.6.54
1A0hFWMEMSS1MEMSS Region 1 Firewall ConfigurationSection 5.6.55
1A4hFWMEMSS2MEMSS Region 2 Firewall ConfigurationSection 5.6.56
1A8hFWHOSTAONHOST AON Target Firewall ConfigurationSection 5.6.57
1B0hFWHIFHIF Firewall ConfigurationSection 5.6.58
1B4hFWHOST0HOST Target Region 0 Firewall ConfigurationSection 5.6.59
1B8hFWHOST1HOST Target Region 1 Firewall ConfigurationSection 5.6.60
1BChFWHOST2HOST Target Region 2 Firewall ConfigurationSection 5.6.61
1C0hFWHOST3HOST Target Region 3 Firewall ConfigurationSection 5.6.62
1C4hFWHOST4HOST Target Region 4 Firewall ConfigurationSection 5.6.63
1C8hFWHOST5HOST Target Region 5 Firewall ConfigurationSection 5.6.64
1CChFWHOST6HOST Target Region 6 Firewall ConfigurationSection 5.6.65
1D0hFWHOST7HOST Target Region 7 Firewall ConfigurationSection 5.6.66
1D4hFWHOST8HOST Target Region 8 Firewall ConfigurationSection 5.6.67
1D8hFWHOST9HOST Target Region 9 Firewall ConfigurationSection 5.6.68
1DChFWHOST10HOST Target Region 10 Firewall ConfigurationSection 5.6.69
1E0hFWHOST11HOST Target Region 11 Firewall ConfigurationSection 5.6.70
1E4hFWXIPOSPIxSPI Registers Firewall ConfigurationSection 5.6.71
1E8hFWXIPINDACxSPI Indac Firewall ConfigurationSection 5.6.72
1EChFWXIPGENxSPI General Firewall ConfigurationSection 5.6.73
1F0hFWXIPUDMASxSPI uDMA Secured Firewall ConfigurationSection 5.6.74
1F4hFWXIPUDMANSxSPI uDMA Non-Secured Firewall ConfigurationSection 5.6.75
1F8hFWOTFDE0xSPI OTFDE 0 Firewall ConfigurationSection 5.6.76
1FChFWOTFDE1xSPI OTFDE 1 Firewall ConfigurationSection 5.6.77
200hFWOTFDE2xSPI OTFDE 2 Firewall ConfigurationSection 5.6.78
204hFWOTFDE3xSPI OTFDE 3 Firewall ConfigurationSection 5.6.79
208hFWDMAGENDMA Target Common Firewall ConfigurationSection 5.6.80
20ChFWDMA0DMA Target Region 0 Firewall ConfigurationSection 5.6.81
210hFWDMA1DMA Target Region 1 Firewall ConfigurationSection 5.6.82
214hFWDMA2DMA Target Region 2 Firewall ConfigurationSection 5.6.83
218hFWDMA3DMA Target Region 3 Firewall ConfigurationSection 5.6.84
21ChFWDMA4DMA Target Region 4 Firewall ConfigurationSection 5.6.85
220hFWDMA5DMA Target Region 5 Firewall ConfigurationSection 5.6.86
224hFWDMA6DMA Target Region 6 Firewall ConfigurationSection 5.6.87
228hFWDMA7DMA Target Region 7 Firewall ConfigurationSection 5.6.88
22ChFWDMA8DMA Target Region 8 Firewall ConfigurationSection 5.6.89
230hFWDMA9DMA Target Region 9 Firewall ConfigurationSection 5.6.90
234hFWDMA10DMA Target Region 10 Firewall ConfigurationSection 5.6.91
238hFWDMA11DMA Target Region 11 Firewall ConfigurationSection 5.6.92
23ChFWHSMEIPNSHSM EIP Non-Secured Registers Firewall ConfigurationSection 5.6.93
240hFWHSMEIPSHSM EIP Secured Registers Firewall ConfigurationSection 5.6.94
244hFWHSMWRAPNSHSM Non-Secured Wrapper Firewall ConfigurationSection 5.6.95
248hFWHSMWRAPSHSM Secured Wrapper Firewall ConfigurationSection 5.6.96
24ChFWHSMDBGHSM Debug Memory Firewall ConfigurationSection 5.6.97
250hFWI2C0I2C 0 Firewall ConfigurationSection 5.6.98
254hFWI2C1I2C 1 Firewall ConfigurationSection 5.6.99
258hFWSPSPI0SPI 0 Firewall ConfigurationSection 5.6.100
25ChFWSPSPI1SPI 1 Firewall ConfigurationSection 5.6.101
260hFWSPUART0UART 0 Firewall ConfigurationSection 5.6.102
264hFWSPUART1UART 1 Firewall ConfigurationSection 5.6.103
268hFWSPGPT0GPTIMER0 Firewall ConfigurationSection 5.6.104
26ChFWSPGPT1GPTIMER1 Firewall ConfigurationSection 5.6.105
270hFWSPI2SI2S Firewall ConfigurationSection 5.6.106
274hFWPDMPDM Firewall ConfigurationSection 5.6.107
278hFWSPCANDCAN Firewall ConfigurationSection 5.6.108
27ChFWSPADCADC Firewall ConfigurationSection 5.6.109
280hFWSPSDMMCSDMMC Firewall ConfigurationSection 5.6.110
284hFWSPSDIOSDIO CARD Firewall ConfigurationSection 5.6.111
288hFWSPUART2UART 2 Firewall ConfigurationSection 5.6.112
28ChUDMANSCTLuDMA Non-Secured Channel ControlSection 5.6.113
290hFWIOPAD0IOMUX PAD 0 Firewall ConfigurationSection 5.6.114
294hFWIOPAD1IOMUX PAD 1 Firewall ConfigurationSection 5.6.115
298hFWIOPAD2IOMUX PAD 2 Firewall ConfigurationSection 5.6.116
29ChFWIOPAD3IOMUX PAD 3 Firewall ConfigurationSection 5.6.117
2A0hFWIOPAD4IOMUX PAD 4 Firewall ConfigurationSection 5.6.118
2A4hFWIOPAD5IOMUX PAD 5 Firewall ConfigurationSection 5.6.119
2A8hFWIOPAD6IOMUX PAD 6 Firewall ConfigurationSection 5.6.120
2AChFWIOPAD7IOMUX PAD 7 Firewall ConfigurationSection 5.6.121
2B0hFWIOPAD8IOMUX PAD 8 Firewall ConfigurationSection 5.6.122
2B4hFWIOPAD9IOMUX PAD 9 Firewall ConfigurationSection 5.6.123
2B8hFWIOPAD10IOMUX PAD 10 Firewall ConfigurationSection 5.6.124
2BChFWIOPAD11IOMUX PAD 11 Firewall ConfigurationSection 5.6.125
2C0hFWIOPAD12IOMUX PAD 12 Firewall ConfigurationSection 5.6.126
2C4hFWIOPAD13IOMUX PAD 13 Firewall ConfigurationSection 5.6.127
2C8hFWIOPAD14IOMUX PAD 14 Firewall ConfigurationSection 5.6.128
2CChFWIOPAD15IOMUX PAD 15 Firewall ConfigurationSection 5.6.129
2D0hFWIOPAD16IOMUX PAD 16 Firewall ConfigurationSection 5.6.130
2D4hFWIOPAD17IOMUX PAD 17 Firewall ConfigurationSection 5.6.131
2D8hFWIOPAD18IOMUX PAD 18 Firewall ConfigurationSection 5.6.132
2DChFWIOPAD19IOMUX PAD 19 Firewall ConfigurationSection 5.6.133
2E0hFWIOPAD20IOMUX PAD 20 Firewall ConfigurationSection 5.6.134
2E4hFWIOPAD21IOMUX PAD 21 Firewall ConfigurationSection 5.6.135
2E8hFWIOPAD22IOMUX PAD 22 Firewall ConfigurationSection 5.6.136
2EChFWIOPAD23IOMUX PAD 23 Firewall ConfigurationSection 5.6.137
2F0hFWIOPAD24IOMUX PAD 24 Firewall ConfigurationSection 5.6.138
2F4hFWIOPAD25IOMUX PAD 25 Firewall ConfigurationSection 5.6.139
2F8hFWIOPAD26IOMUX PAD 26 Firewall ConfigurationSection 5.6.140
2FChFWIOPAD27IOMUX PAD 27 Firewall ConfigurationSection 5.6.141
300hFWIOPAD28IOMUX PAD 28 Firewall ConfigurationSection 5.6.142
304hFWIOPAD29IOMUX PAD 29 Firewall ConfigurationSection 5.6.143
308hFWIOPAD30IOMUX PAD 30 Firewall ConfigurationSection 5.6.144
30ChFWIOPAD31IOMUX PAD 31 Firewall ConfigurationSection 5.6.145
310hFWIOPAD32IOMUX PAD 32 Firewall ConfigurationSection 5.6.146
314hFWIOPAD33IOMUX PAD 33 Firewall ConfigurationSection 5.6.147
318hFWIOPAD34IOMUX PAD 34 Firewall ConfigurationSection 5.6.148
31ChFWIOPAD35IOMUX PAD 35 Firewall ConfigurationSection 5.6.149
320hFWIOPAD36IOMUX PAD 36 Firewall ConfigurationSection 5.6.150
324hFWIOPAD37IOMUX PAD 37 Firewall ConfigurationSection 5.6.151
328hFWIOPAD38IOMUX PAD 38 Firewall ConfigurationSection 5.6.152
32ChFWIOPAD39IOMUX PAD 39 Firewall ConfigurationSection 5.6.153
330hFWIOPAD40IOMUX PAD 40 Firewall ConfigurationSection 5.6.154
334hFWIOPAD41IOMUX PAD 41 Firewall ConfigurationSection 5.6.155
338hFWIOPAD42IOMUX PAD 42 Firewall ConfigurationSection 5.6.156
33ChFWIOPAD43IOMUX PAD 43 Firewall ConfigurationSection 5.6.157
340hFWIOPAD44IOMUX PAD 44 Firewall ConfigurationSection 5.6.158
344hFWIOPAD45IOMUX PAD 45 Firewall ConfigurationSection 5.6.159
348hFWIOPAD46IOMUX PAD 46 Firewall ConfigurationSection 5.6.160
34ChFWIOPAD47IOMUX PAD 47 Firewall ConfigurationSection 5.6.161
350hFWIOPAD48IOMUX PAD 48 Firewall ConfigurationSection 5.6.162
354hFWDMA12DMA Target Region 12 Firewall ConfigurationSection 5.6.163
358hFWDMA13DMA Target Region 13 Firewall ConfigurationSection 5.6.164
1000hUSECSTBMicro Second STBSection 5.6.165
1044hGPIOEVT0NSGPIO Event Status 0Section 5.6.166
1048hGPIOEVT1NSGPIO Event Status 1Section 5.6.167
1054hDBM33NS0Doorbell Host Non-Secured Interrupt MaskSection 5.6.168
1058hDBNSISETDoorbell Host Non-Secured Interrupt SetSection 5.6.169
105ChDBNSICLRDoorbell Host Non-Secured Interrupt ClearSection 5.6.170
1060hDBNSIMSETDoorbell Host Non-Secured Masked Interrupt SetSection 5.6.171
1064hDBNSIMCLRDoorbell Host Non-Secured Masked Interrupt ClearSection 5.6.172
1068hDBNSRISDoorbell Host Non-Secured Raw Interrupt StatusSection 5.6.173
106ChDBNSMISDoorbell Host Non-Secured Masked Interrupt StatusSection 5.6.174
1070hGPIOMIS0NSGPIO's Non-Secured Masked Interrupt Status 0Section 5.6.175
1074hGPIOMIS1NSGPIO's Non-Secured Masked Interrupt Status 1Section 5.6.176
1078hGPIOFNC0NSGPIO's Non-Secured Function 0Section 5.6.177
107ChGPIOFNC1NSGPIO's Non-Secured Function 1Section 5.6.178

Complex bit access types are encoded to fit into small table cells. Table 5-23 shows the codes that are used for access types in this section.

Table 5-23 SOC_AON Access Type Codes
Access TypeCodeDescription
Read Type
RRRead
Write Type
WWWrite
Reset or Default Value
-nValue after reset or the default value

5.6.1 SPEVTCTL Register (Offset = Ch) [Reset = 00000000h]

SPEVTCTL is shown in Table 5-24.

Return to the Summary Table.

Shared Peripherals Event MUXs Selectors. This register selects events to ADC, I2S and PDM.

Table 5-24 SPEVTCTL Register Field Descriptions
BitFieldTypeResetDescription
31-23RESERVEDR0hReserved
22-16PDMR/W0hPDM Event Selector. This field selects event to PDM.
15RESERVEDR0hReserved
14-8I2SR/W0hI2S Event Selector. This field selects event to I2S.
7-6RESERVEDR0hReserved
5-0ADCR/W0hADC Event Selector. This field selects event to ADC.

5.6.2 TMEVTCTL Register (Offset = 10h) [Reset = 00000000h]

TMEVTCTL is shown in Table 5-25.

Return to the Summary Table.

Timers Event MUXs Selectors. This register selects events to SYSTIMER and RTC. There are two MUXs of SYSTIMER and one for RTC.

Table 5-25 TMEVTCTL Register Field Descriptions
BitFieldTypeResetDescription
31-23RESERVEDR0hReserved
22-16RTCR/W0hRTC Event Selector. This field selects event to RTC.
15-14RESERVEDR0hReserved
13-8SYSTM1R/W0hSYSTIMER Event 2nd Selector. This field selects event to SYSTIMER.
7-6RESERVEDR0hReserved
5-0SYSTM0R/W0hSYSTIMER Event 1st Selector. This field selects event to SYSTIMER.

5.6.3 GPT0EVTCTL0 Register (Offset = 14h) [Reset = 00000000h]

GPT0EVTCTL0 is shown in Table 5-26.

Return to the Summary Table.

GPTIMER0 Channels Event MUXs Selectors. This register selects events to GPTIMER0. There are 4 event MUXs for GPTIMER Channels.

Table 5-26 GPT0EVTCTL0 Register Field Descriptions
BitFieldTypeResetDescription
31-28RESERVEDR0hReserved
27-21CH3SELR/W0hThis field selects MUX output to CH3 of GPTIMER0 IRQ.
20-14CH2SELR/W0hThis field selects MUX output to CH2 of GPTIMER0 IRQ.
13-7CH1SELR/W0hThis field selects MUX output to CH1 of GPTIMER0 IRQ.
6-0CH0SELR/W0hThis field selects MUX output to CH0 of GPTIMER0 IRQ.

5.6.4 GPT1EVTCTL0 Register (Offset = 18h) [Reset = 00000000h]

GPT1EVTCTL0 is shown in Table 5-27.

Return to the Summary Table.

GPTIMER1 Event MUXs Selectors. This register selects events to GPTIMER1. There are 4 event MUXs for GPTIMER Channels.

Table 5-27 GPT1EVTCTL0 Register Field Descriptions
BitFieldTypeResetDescription
31-28RESERVEDR0hReserved
27-21CH3SELR/W0hThis field selects MUX output to CH3 of GPTIMER1 IRQ.
20-14CH2SELR/W0hThis field selects MUX output to CH2 of GPTIMER1 IRQ.
13-7CH1SELR/W0hThis field selects MUX output to CH1 of GPTIMER1 IRQ.
6-0CH0SELR/W0hThis field selects MUX output to CH0 of GPTIMER1 IRQ.

5.6.5 DMEMSTART Register (Offset = 54h) [Reset = 28000000h]

DMEMSTART is shown in Table 5-28.

Return to the Summary Table.

DATA Memory MEMSS Start Address. DMEM Start Address-also define S/NS region split

Table 5-28 DMEMSTART Register Field Descriptions
BitFieldTypeResetDescription
31-12ADDRR/W00028000hDMEM Start Address-also define S/NS region split
11-0RESERVEDR0hReserved

5.6.6 DMEMEND Register (Offset = 58h) [Reset = 2FFFFFFFh]

DMEMEND is shown in Table 5-29.

Return to the Summary Table.

DATA Memory MEMSS End Address. DMEM end Address-also define S/NS region split

Table 5-29 DMEMEND Register Field Descriptions
BitFieldTypeResetDescription
31-12ADDRR/W0002FFFFhDMEM end Address-also define S/NS region split
11-0RESERVEDR0hReserved

5.6.7 TCMSTART Register (Offset = 64h) [Reset = 20000000h]

TCMSTART is shown in Table 5-30.

Return to the Summary Table.

TCM DATA Memory MEMSS Start Address. TCM data Start Address-also define S/NS region split

Table 5-30 TCMSTART Register Field Descriptions
BitFieldTypeResetDescription
31-10ADDRR/W00080000hTCM data Start Address-also define S/NS region split
9-0RESERVEDR0hReserved

5.6.8 TCMEND Register (Offset = 68h) [Reset = 27FFFFFFh]

TCMEND is shown in Table 5-31.

Return to the Summary Table.

TCM DATA Memory MEMSS End Address. TCM data end Address-also define S/NS region split

Table 5-31 TCMEND Register Field Descriptions
BitFieldTypeResetDescription
31-10ADDRR/W0009FFFFhTCM data end Address-also define S/NS region split
9-0RESERVEDR0hReserved

5.6.9 GPIOEVTS0 Register (Offset = 7Ch) [Reset = 00000000h]

GPIOEVTS0 is shown in Table 5-32.

Return to the Summary Table.

Secured GPIO Event Status, 1st Register. 45 bits status over two registers.

Table 5-32 GPIOEVTS0 Register Field Descriptions
BitFieldTypeResetDescription
31-0STA31TO0R0hSecured event status , first 32 bits. ([31:0])

5.6.10 GPIOEVTS1 Register (Offset = 80h) [Reset = 00000000h]

GPIOEVTS1 is shown in Table 5-33.

Return to the Summary Table.

Secured GPIO Event Status, 2nd Register. 45 bits status over two registers.

Table 5-33 GPIOEVTS1 Register Field Descriptions
BitFieldTypeResetDescription
31-13RESERVEDR0hReserved
12-0STA44TO32R0hSecured event status , 13 MSBs. ([44:32])

5.6.11 MEMSSCTL0 Register (Offset = 84h) [Reset = 00000000h]

MEMSSCTL0 is shown in Table 5-34.

Return to the Summary Table.

MEMSS General Control Register. This register controls starvation mechanism counter value and MEMSS bus fault mask.

Table 5-34 MEMSSCTL0 Register Field Descriptions
BitFieldTypeResetDescription
31-7RESERVEDR0hReserved
6-4BFLTMSTAR0hBus Fault Masked Status. Out of Memory Index: 0. No error 1. M33 Code 2. M33 Data #1 + #2 3. M3 Code 4. M3 Data 5. M3 PRAM 6. BLE Code 7. Global OCP
3BFLTMASKR/W0hMEMSS Bus Fault Mask 1. Mask 0. Do not mask
2-0STRVCNTVR/W0hStarvation Counter Value Configuration. That value reflect how long writing to mailbox can be delayed.

5.6.12 MEMSSCTL1 Register (Offset = 88h) [Reset = 00000000h]

MEMSSCTL1 is shown in Table 5-35.

Return to the Summary Table.

MEMSS General Control Register. This is a status register for bus fault raw status.

Table 5-35 MEMSSCTL1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2-0BFLTRWSTAR0hBus Fault Raw Status. Error indication from memss. Out of Memory Index: 0. No error 1. M33 Code 2. M33 Data #1 + #2 3. M3 Code 4. M3 Data 5. M3 PRAM 6. BLE Code 7. Global OCP Type: Read-Clear

5.6.13 VTORS Register (Offset = 9Ch) [Reset = 00000000h]

VTORS is shown in Table 5-36.

Return to the Summary Table.

M33 Secure Vector Table Base Address.

Table 5-36 VTORS Register Field Descriptions
BitFieldTypeResetDescription
31-7ADDRR/W0hinit VTOR Secured Address.
6-0RESERVEDR0hReserved

5.6.14 VTORNS Register (Offset = A0h) [Reset = 00000000h]

VTORNS is shown in Table 5-37.

Return to the Summary Table.

M33 Non-Secure Vector Table Base Address.

Table 5-37 VTORNS Register Field Descriptions
BitFieldTypeResetDescription
31-7ADDRR/W0hinit VTOR non Secured address
6-0RESERVEDR0hReserved

5.6.15 CPULOCKS Register (Offset = A8h) [Reset = 00000000h]

CPULOCKS is shown in Table 5-38.

Return to the Summary Table.

CPU Locks. This register contain 5 locks. Issued to M33 Cortex and used to lock internal cortex registers. LOCKSVTAIRCR, LOCKNSVTOR, LOCKSMPU, LOCKNSMPU, LOCKSAU.

Table 5-38 CPULOCKS Register Field Descriptions
BitFieldTypeResetDescription
31-5RESERVEDR0hReserved
4SAUR/W0hLocking this Cortex internal configuration
3NSPMUR/W0hLocking this Cortex internal configuration
2SMPUR/W0hLocking this Cortex internal configuration
1NSVTORR/W0hLocking this Cortex internal configuration
0SVTAIRCRR/W0hLocking this Cortex internal configuration

5.6.16 HOSTLOCKS Register (Offset = ACh) [Reset = 00000000h]

HOSTLOCKS is shown in Table 5-39.

Return to the Summary Table.

Host Lock Signals. lock once. Do Not lock until written. When written Locked immediately, cleared only at soc aon reset or por reset. These are host security lock configurations (some can be also locked by TI)

Table 5-39 HOSTLOCKS Register Field Descriptions
BitFieldTypeResetDescription
31-7RESERVEDR0hReserved
6PERIPHEVTR/W0hLocking the firewall configurations of: HIF, CORE, CORE AON, HSM, shared Periphs
5M3EVTR/W0hLocking the configurations of M3 Events
4FLASHR/W0hLocking the configurations of On The Fly Enc/Decryption Module Region Related Registers (four registers per region, four regions)
3DMAR/W0hLocking the configurations of System DMA
2MEMSSANDFWR/W0hLocking the configurations of Memory Sub System
1M33R/W0hLocking the configurations of Host MCU, both Secured and non Secured
0CACHER/W0hLocking the configurations of ICACHE

5.6.17 HOSTBOOT Register (Offset = B0h) [Reset = 00000000h]

HOSTBOOT is shown in Table 5-40.

Return to the Summary Table.

Host Boot Done 1 lock. Write once. Asserted by FW by the end of soc boot done Or in elevated mode By either by TI of by the host and indicates device exit from secure boot mode. this signal also locks host security configurations , Locked immediately , cleared only at soc aon reset or por reset

Table 5-40 HOSTBOOT Register Field Descriptions
BitFieldTypeResetDescription
31-1RESERVEDR0hReserved
0DONER/W0hLocking host security configurations

5.6.18 SECCFG Register (Offset = B4h) [Reset = 00000000h]

SECCFG is shown in Table 5-41.

Return to the Summary Table.

Security Configurations.

Table 5-41 SECCFG Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2BLKSBSWRR/W0hBLOCK SBUS WRITE LOCK Enable this field to block sbus write transactions
1SELNSIRQR/W0hThis field determine whether the 4 SW interrupts MSbits will be owned by secured/non secured. 0. Non-Secured 1. Secured
0BLKDMAR/W0hThis Field blocks the uDMA transactions to CMEM. 0. un-Block 1. Block

5.6.19 ERRSIMASK Register (Offset = D4h) [Reset = 00000000h]

ERRSIMASK is shown in Table 5-42.

Return to the Summary Table.

M33 Secured Error IMASK. Mask Event. '0' - CLR - Clear Interrupt Mask '1' - SET - Set Interrupt Mask

Table 5-42 ERRSIMASK Register Field Descriptions
BitFieldTypeResetDescription
31-9RESERVEDR0hReserved
8-0IMASKR/W0hBits division to events: bit[8] - UDMA ERR IRQ bit[7] - CORE ELP WATCHDOG Timer bit[6] - SOC IC IRQs - Address Watch bit[5] - SOC IC IRQs - IC Timeout bit[4] - SOC IC IRQs - serror bit[3] - CORE to SDIO WATCHDOG bit[2] - PLL Unlock bit[1] - MEMss bus fault bit[0] - HSM fatal error

5.6.20 ERRSISET Register (Offset = D8h) [Reset = 00000000h]

ERRSISET is shown in Table 5-43.

Return to the Summary Table.

M33 Secured Error ISET. Sets event in RIS Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - SET - Sets interrupt

Table 5-43 ERRSISET Register Field Descriptions
BitFieldTypeResetDescription
31-9RESERVEDR0hReserved
8-0ISETW0hBits division to events: bit[8] - UDMA ERR IRQ bit[7] - CORE ELP WATCHDOG Timer bit[6] - SOC IC IRQs - Address Watch bit[5] - SOC IC IRQs - IC Timeout bit[4] - SOC IC IRQs - serror bit[3] - CORE to SDIO WATCHDOG bit[2] - PLL Unlock bit[1] - MEMss bus fault bit[0] - HSM fatal error Type: Write-Clear

5.6.21 ERRSICLR Register (Offset = DCh) [Reset = 00000000h]

ERRSICLR is shown in Table 5-44.

Return to the Summary Table.

M33 Secured Error ICLR. Clears event in RIS Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - CLR - Clears the Event

Table 5-44 ERRSICLR Register Field Descriptions
BitFieldTypeResetDescription
31-9RESERVEDR0hReserved
8-0ICLRW0hBits division to events: bit[8] - UDMA ERR IRQ bit[7] - CORE ELP WATCHDOG Timer bit[6] - SOC IC IRQs - Address Watch bit[5] - SOC IC IRQs - IC Timeout bit[4] - SOC IC IRQs - serror bit[3] - CORE to SDIO WATCHDOG bit[2] - PLL Unlock bit[1] - MEMss bus fault bit[0] - HSM fatal error Type: Write-Clear

5.6.22 ERRSIMSET Register (Offset = E0h) [Reset = 00000000h]

ERRSIMSET is shown in Table 5-45.

Return to the Summary Table.

M33 Secured Error IMSET. Sets Event Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - SET - Set interrupt mask

Table 5-45 ERRSIMSET Register Field Descriptions
BitFieldTypeResetDescription
31-9RESERVEDR0hReserved
8-0IMSETW0hBits division to events: bit[8] - UDMA ERR IRQ bit[7] - CORE ELP WATCHDOG Timer bit[6] - SOC IC IRQs - Address Watch bit[5] - SOC IC IRQs - IC Timeout bit[4] - SOC IC IRQs - serror bit[3] - CORE to SDIO WATCHDOG bit[2] - PLL Unlock bit[1] - MEMss bus fault bit[0] - HSM fatal error Type: Write-Clear

5.6.23 ERRSIMCLR Register (Offset = E4h) [Reset = 00000000h]

ERRSIMCLR is shown in Table 5-46.

Return to the Summary Table.

M33 Secured Error IMCLR. Clears Event Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - CLR - Clear interrupt mask

Table 5-46 ERRSIMCLR Register Field Descriptions
BitFieldTypeResetDescription
31-9RESERVEDR0hReserved
8-0IMCLRW0hBits division to events: bit[8] - UDMA ERR IRQ bit[7] - CORE ELP WATCHDOG Timer bit[6] - SOC IC IRQs - Address Watch bit[5] - SOC IC IRQs - IC Timeout bit[4] - SOC IC IRQs - serror bit[3] - CORE to SDIO WATCHDOG bit[2] - PLL Unlock bit[1] - MEMss bus fault bit[0] - HSM fatal error Type: Write-Clear

5.6.24 ERRSRIS Register (Offset = E8h) [Reset = 00000000h]

ERRSRIS is shown in Table 5-47.

Return to the Summary Table.

M33 Secured Error RIS. Raw interrupt status for event. This bit is set to 1 when an event is received. when the corresponding bit in ICLR is set to 1, this bit will be cleared. Read 0 - CLR - Interrupt did not occur Read 1 - SET - Interrupt occurred

Table 5-47 ERRSRIS Register Field Descriptions
BitFieldTypeResetDescription
31-9RESERVEDR0hReserved
8-0RISR0hBits division to events: bit[8] - UDMA ERR IRQ bit[7] - CORE ELP WATCHDOG Timer bit[6] - SOC IC IRQs - Address Watch bit[5] - SOC IC IRQs - IC Timeout bit[4] - SOC IC IRQs - serror bit[3] - CORE to SDIO WATCHDOG bit[2] - PLL Unlock bit[1] - MEMss bus fault bit[0] - HSM fatal error

5.6.25 ERRSMIS Register (Offset = ECh) [Reset = 00000000h]

ERRSMIS is shown in Table 5-48.

Return to the Summary Table.

M33 Secured Error MIS. Mask interrupt status for event Read 0 - CLR - Interrupt did not occur Read 1 - SET - Interrupt occurred

Table 5-48 ERRSMIS Register Field Descriptions
BitFieldTypeResetDescription
31-9RESERVEDR0hReserved
8-0MISR0hBits division to events: bit[8] - UDMA ERR IRQ bit[7] - CORE ELP WATCHDOG Timer bit[6] - SOC IC IRQs - Address Watch bit[5] - SOC IC IRQs - IC Timeout bit[4] - SOC IC IRQs - serror bit[3] - CORE to SDIO WATCHDOG bit[2] - PLL Unlock bit[1] - MEMss bus fault bit[0] - HSM fatal error

5.6.26 GPT0EVTCTL1 Register (Offset = F0h) [Reset = 00000000h]

GPT0EVTCTL1 is shown in Table 5-49.

Return to the Summary Table.

GPTIMER0 Sync, Tick Enable and Fault Event MUXs Selectors. This register selects events to GPTIMER0.

Table 5-49 GPT0EVTCTL1 Register Field Descriptions
BitFieldTypeResetDescription
31-23RESERVEDR0hReserved
22-16FAULTR/W0hSelects fault MUX output to GPTIMER0 IRQ
15RESERVEDR0hReserved
14-8TICKENR/W0hSelects tick enable MUX output to GPTIMER0 IRQ
7RESERVEDR0hReserved
6-0SYNCR/W0hSelects sync MUX output to GPTIMER0 IRQ

5.6.27 GPT1EVTCTL1 Register (Offset = F4h) [Reset = 00000000h]

GPT1EVTCTL1 is shown in Table 5-50.

Return to the Summary Table.

GPTIMER1 Sync, Tick Enable and Fault Event MUXs Selectors. This register selects events to GPTIMER1.

Table 5-50 GPT1EVTCTL1 Register Field Descriptions
BitFieldTypeResetDescription
31-23RESERVEDR0hReserved
22-16FAULTR/W0hSelects fault MUX output to GPTIMER0 IRQ
15RESERVEDR0hReserved
14-8TICKENR/W0hSelects tick enable MUX output to GPTIMER0 IRQ
7RESERVEDR0hReserved
6-0SYNCR/W0hSelects sync MUX output to GPTIMER0 IRQ

5.6.28 ESMSTACST Register (Offset = 104h) [Reset = 00000000h]

ESMSTACST is shown in Table 5-51.

Return to the Summary Table.

Customer ESMs Status. status register , for each of the ESM (enable sequence monitor) what is the status (Done, violated, or None) Final ESM status for the entire ESM - ESM machine + magic value comparators

Table 5-51 ESMSTACST Register Field Descriptions
BitFieldTypeResetDescription
31-10RESERVEDR0hReserved
9ESM2VIOR0hThis field indicates that ESM1 is violated.
8ESM2DONER0hThis field indicates that ESM2 is done.
7-2RESERVEDR0hReserved
1ESM1VIOR0hThis field indicates that ESM1 is violated.
0ESM1DONER0hThis field indicates that ESM1 is done.

5.6.29 MEMSSCFG Register (Offset = 10Ch) [Reset = 00000000h]

MEMSSCFG is shown in Table 5-52.

Return to the Summary Table.

MEMSS Configurations. Supported Memory configurations: Functional Modes: 0x0. Baseline 0x1. Extended M3 0x2. Extended throughput 0x3. Extended throughput + WIFI features 0x4. Extended Host Execution 0x5. Extended M33 Data Debug Modes (OCLA Memory): 0x6. Core debug (<M33 Data) 0x7. Core debug Extended throughput (<M33 Data <M3 Exec) 0x8. Core debug PHY only (<M3,M33 Data) 0x9. Host debug (<M3 Exec) 0xA. Host debug extended Host Execution 0xB. Host debug extended M33 Data

Table 5-52 MEMSSCFG Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0MODER/W0hMEMSS mode of bank ownership

5.6.30 GPIOMIS0S Register (Offset = 138h) [Reset = 00000000h]

GPIOMIS0S is shown in Table 5-53.

Return to the Summary Table.

Secured Gpio MIS.

Table 5-53 GPIOMIS0S Register Field Descriptions
BitFieldTypeResetDescription
31-031TO0R0h32 LSBs of MIS. (45 Total)

5.6.31 GPIOMIS1S Register (Offset = 13Ch) [Reset = 00000000h]

GPIOMIS1S is shown in Table 5-54.

Return to the Summary Table.

Secured Gpio MIS.

Table 5-54 GPIOMIS1S Register Field Descriptions
BitFieldTypeResetDescription
31-13RESERVEDR0hReserved
12-044TO32R0h13 MSBs of MIS. (45 Total)

5.6.32 GPIOFNC0S Register (Offset = 140h) [Reset = 00000000h]

GPIOFNC0S is shown in Table 5-55.

Return to the Summary Table.

Secured GPIO Functional Mask. 0. Mask 1. Un-Mask

Table 5-55 GPIOFNC0S Register Field Descriptions
BitFieldTypeResetDescription
31-0MASK31TO0R/W0h32 LSBs of MASK. (45 Total)

5.6.33 GPIOFNC1S Register (Offset = 144h) [Reset = 00000000h]

GPIOFNC1S is shown in Table 5-56.

Return to the Summary Table.

Secured GPIO Functional Mask. 0. Mask 1. Un-Mask

Table 5-56 GPIOFNC1S Register Field Descriptions
BitFieldTypeResetDescription
31-13RESERVEDR0hReserved
12-0MASK44TO32R/W0h13 MSBs of MASK. (45 Total)

5.6.34 ESM1VAL2ND Register (Offset = 14Ch) [Reset = 00000000h]

ESM1VAL2ND is shown in Table 5-57.

Return to the Summary Table.

ESM1 2nd Magic Value. This value is compared to hard coded value and unmask ESM only when value is matched. This additional compare allow additional protection on ESM and also allow vendor to unmask ESM only at the end of vendor secure boot (SBL) is completed

Table 5-57 ESM1VAL2ND Register Field Descriptions
BitFieldTypeResetDescription
31-8RESERVEDR0hReserved
7-0MGCVALR/W0hESM 2nd magic value

5.6.35 ESM2VAL2ND Register (Offset = 150h) [Reset = 00000000h]

ESM2VAL2ND is shown in Table 5-58.

Return to the Summary Table.

ESM2 2nd Magic Value. This value is compared to hard coded value and unmask ESM only when value is matched. This additional compare allow additional protection on ESM and also allow vendor to unmask ESM only at the end of vendor secure boot (SBL) is completed

Table 5-58 ESM2VAL2ND Register Field Descriptions
BitFieldTypeResetDescription
31-8RESERVEDR0hReserved
7-0MGCVALR/W0hESM 2nd magic value

5.6.36 ESM1STA2ND Register (Offset = 154h) [Reset = 00000000h]

ESM1STA2ND is shown in Table 5-59.

Return to the Summary Table.

ESM1 2nd Magic Value Status. ESM magic value match indication.

Table 5-59 ESM1STA2ND Register Field Descriptions
BitFieldTypeResetDescription
31-2RESERVEDR0hReserved
1FAULTR0hESM 2nd magic val fault ( note: indicates fault before a write to the magic val register)
0DONER0hESM 2nd magic val match

5.6.37 ESM2STA2ND Register (Offset = 158h) [Reset = 00000000h]

ESM2STA2ND is shown in Table 5-60.

Return to the Summary Table.

ESM2 2nd Magic Value. ESM magic value match indication.

Table 5-60 ESM2STA2ND Register Field Descriptions
BitFieldTypeResetDescription
31-2RESERVEDR0hReserved
1FAULTR0hESM 2nd magic val fault ( note: indicates fault before a write to the magic val register)
0DONER0hESM 2nd magic val match

5.6.38 FWCFGHOST Register (Offset = 15Ch) [Reset = 00000000h]

FWCFGHOST is shown in Table 5-61.

Return to the Summary Table.

HOST FW Bypass.

Table 5-61 FWCFGHOST Register Field Descriptions
BitFieldTypeResetDescription
31-1RESERVEDR0hReserved
0BYPASSR/W1hbypass the following module's firewall configuration: IOMUX_COMMON_SEL PRCM_AON_HOST PRCM_AON_COMMON SCRATCHPAD PLLSHARING SOC_IC SOC_AON_M33_S SOC_AON_M33_NS SOC_AAON_M33_S SOC_AAON_M33_NS RTC XIP_OSPI XIP_OSPI_INDAC XIP_GENERAL XIP_UDMA_SEC XIP_UDMA_NON_SEC OTFDE_REGION0-3 HOST_DMA_GENERAL_CFG

5.6.39 FWCFGDMA Register (Offset = 160h) [Reset = 00000000h]

FWCFGDMA is shown in Table 5-62.

Return to the Summary Table.

DMA FW BYPASS

Table 5-62 FWCFGDMA Register Field Descriptions
BitFieldTypeResetDescription
31-1RESERVEDR0hReserved
0BYPASSR/W1hBypass the firewall configuration for HOST_DMA module

5.6.40 FWCFGFPRPH Register (Offset = 164h) [Reset = 00000000h]

FWCFGFPRPH is shown in Table 5-63.

Return to the Summary Table.

Peripheral Firewall Bypass.

Table 5-63 FWCFGFPRPH Register Field Descriptions
BitFieldTypeResetDescription
31-1RESERVEDR0hReserved
0BYPASSR/W1hbypass the following module's firewall configuration: HIF HSM CORE_AON I2C0/1 SPI0/1 UART0/1 GPTIMER0/1 I2S PDM CAN ADC SDMMC SDIO

5.6.41 FWCFGM33 Register (Offset = 168h) [Reset = 00000000h]

FWCFGM33 is shown in Table 5-64.

Return to the Summary Table.

HOST MCU Firewall Bypass

Table 5-64 FWCFGM33 Register Field Descriptions
BitFieldTypeResetDescription
31-1RESERVEDR0hReserved
0BYPASSR/W1hbypass the firewall configuration for HOST MCU module.

5.6.42 FWCFGMEMSS Register (Offset = 16Ch) [Reset = 00000000h]

FWCFGMEMSS is shown in Table 5-65.

Return to the Summary Table.

MEMSS Firewall Bypass

Table 5-65 FWCFGMEMSS Register Field Descriptions
BitFieldTypeResetDescription
31-1RESERVEDR0hReserved
0BYPASSR/W1hbypass the Firewall configuration for MEMSS module.

5.6.43 FWIOGENSEL Register (Offset = 170h) [Reset = 00000000h]

FWIOGENSEL is shown in Table 5-66.

Return to the Summary Table.

IOMUX General firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-66 FWIOGENSEL Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.44 FWPRCMHOST Register (Offset = 174h) [Reset = 00000000h]

FWPRCMHOST is shown in Table 5-67.

Return to the Summary Table.

PRCM_HOST firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-67 FWPRCMHOST Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed
1CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
0M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed

5.6.45 FWPRCMSPAD Register (Offset = 178h) [Reset = 00000000h]

FWPRCMSPAD is shown in Table 5-68.

Return to the Summary Table.

M33 SCRATCHPAD firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-68 FWPRCMSPAD Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.46 FWPRCMCMN Register (Offset = 17Ch) [Reset = 00000000h]

FWPRCMCMN is shown in Table 5-69.

Return to the Summary Table.

PRCM_COMMON firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-69 FWPRCMCMN Register Field Descriptions
BitFieldTypeResetDescription
31-6RESERVEDR0hReserved
5CORENSRDR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
4CORENSWRR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
3M33NSRDR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed
2M33NSWRR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed
1M33SRDR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33SWRR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed

5.6.47 FWCKM Register (Offset = 180h) [Reset = 00000000h]

FWCKM is shown in Table 5-70.

Return to the Summary Table.

CKM firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-70 FWCKM Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.48 FWSOCIC Register (Offset = 184h) [Reset = 00000000h]

FWSOCIC is shown in Table 5-71.

Return to the Summary Table.

SOC_IC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-71 FWSOCIC Register Field Descriptions
BitFieldTypeResetDescription
31-6RESERVEDR0hReserved
5CORENSRDR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
4CORENSWRR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
3M33SRDR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
2M33SWRR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
1M33NSRDR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed
0M33NSWRR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.49 FWAONM33S Register (Offset = 188h) [Reset = 00000000h]

FWAONM33S is shown in Table 5-72.

Return to the Summary Table.

AON_M33_S firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-72 FWAONM33S Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.50 FWAONM33NS Register (Offset = 18Ch) [Reset = 00000000h]

FWAONM33NS is shown in Table 5-73.

Return to the Summary Table.

AON_M33_NS firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-73 FWAONM33NS Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.51 FWAAONM33S Register (Offset = 190h) [Reset = 00000000h]

FWAAONM33S is shown in Table 5-74.

Return to the Summary Table.

AAON_M33_S firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-74 FWAAONM33S Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.52 FWAAONM33NS Register (Offset = 194h) [Reset = 00000000h]

FWAAONM33NS is shown in Table 5-75.

Return to the Summary Table.

AAON_M33_NS firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-75 FWAAONM33NS Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.53 FWCMNRTC Register (Offset = 198h) [Reset = 00000000h]

FWCMNRTC is shown in Table 5-76.

Return to the Summary Table.

RTC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-76 FWCMNRTC Register Field Descriptions
BitFieldTypeResetDescription
31-6RESERVEDR0hReserved
5CORENSRDR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
4CORENSWRR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
3M33SRDR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
2M33SWRR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
1M33NSRDR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed
0M33NSWRR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.54 FWMEMSS0 Register (Offset = 19Ch) [Reset = 00000000h]

FWMEMSS0 is shown in Table 5-77.

Return to the Summary Table.

MEMSS region 0 firewall access permission for 3 controller id : 0 - M33 Non Secured (valid only in privilege mode) 1 - M33 Secured (valid only in privilege mode) 2 - Core (Non Secure) MEMSS address space: 0x41C00000 - 0x41CCFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max window size is 256Kb (M33D banks) + 10*32K (Flex) = 576Kb

Table 5-77 FWMEMSS0 Register Field Descriptions
BitFieldTypeResetDescription
31-26RESERVEDR0hReserved
25-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id MEMSS address space: 0x41C00000 - 0x41CCFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max window size is 576Kb example: worker base address: 0x41C40000 current address to access: 0x41C41514 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x41C41514 --> ((0x41C41514 - 0x41C40000) >> 10) -->0x5 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15-14RESERVEDR0hReserved
13-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id MEMSS address space: 0x41C00000 - 0x41CCFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max base value is 0x23F max window size is 576Kb example: worker base address: 0x41C40000 current address to access: 0x41C40504 region_base_address: 0x1 region_base_address_len: 0x1 0x41C40504 --> ((0x41C40504 - 0x41C40000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: (valid only in privilege mode) '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: (valid only in privilege mode) '0' - access not allowed '1' - access allowed

5.6.55 FWMEMSS1 Register (Offset = 1A0h) [Reset = 00000000h]

FWMEMSS1 is shown in Table 5-78.

Return to the Summary Table.

MEMSS region 1 firewall access permission for 3 controller id : 0 - M33 Non Secured (valid only in privilege mode) 1 - M33 Secured (valid only in privilege mode) 2 - Core (Non Secure) MEMSS address space: 0x41C00000 - 0x41CCFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max window size is 256Kb (M33D banks) + 10*32K (Flex) = 576Kb

Table 5-78 FWMEMSS1 Register Field Descriptions
BitFieldTypeResetDescription
31-26RESERVEDR0hReserved
25-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id MEMSS address space: 0x41C00000 - 0x41CCFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max window size is 576Kb example: worker base address: 0x41C40000 current address to access: 0x41C41514 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x41C41514 --> ((0x41C41514 - 0x41C40000) >> 10) -->0x5 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15-14RESERVEDR0hReserved
13-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id MEMSS address space: 0x41C00000 - 0x41DFFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max base value is 0x23F max window size is 576Kb example: worker base address: 0x41C40000 current address to access: 0x41C40504 region_base_address: 0x1 region_base_address_len: 0x1 0x41C40504 --> ((0x41C40504 - 0x41C40000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: (valid only in privilege mode) '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: (valid only in privilege mode) '0' - access not allowed '1' - access allowed

5.6.56 FWMEMSS2 Register (Offset = 1A4h) [Reset = 00000000h]

FWMEMSS2 is shown in Table 5-79.

Return to the Summary Table.

MEMSS region 2 firewall access permission for 3 controller id : 0 - M33 Non Secured (valid only in privilege mode) 1 - M33 Secured (valid only in privilege mode) 2 - Core (Non Secure) MEMSS address space: 0x41C00000 - 0x41CCFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max window size is 256Kb (M33D banks) + 10*32K (Flex) = 576Kb

Table 5-79 FWMEMSS2 Register Field Descriptions
BitFieldTypeResetDescription
31-26RESERVEDR0hReserved
25-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id MEMSS address space: 0x41C00000 - 0x41CCFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max window size is 576Kb example: worker base address: 0x41C40000 current address to access: 0x41C41514 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x41C41514 --> ((0x41C41514 - 0x41C40000) >> 10) -->0x5 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15-14RESERVEDR0hReserved
13-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id MEMSS address space: 0x41C00000 - 0x41DFFFFF for Memss the base address for security firewalls is 0x41c40000 ( M33 Data Ram from global port access) max base value is 0x23F max window size is 576Kb example: worker base address: 0x41C40000 current address to access: 0x41C40504 region_base_address: 0x1 region_base_address_len: 0x1 0x41C40504 --> ((0x41C40504 - 0x41C40000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: (valid only in privilege mode) '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 non Secured: (valid only in privilege mode) '0' - access not allowed '1' - access allowed

5.6.57 FWHOSTAON Register (Offset = 1A8h) [Reset = 00000000h]

FWHOSTAON is shown in Table 5-80.

Return to the Summary Table.

HOST_AON_SLV firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-80 FWHOSTAON Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.58 FWHIF Register (Offset = 1B0h) [Reset = 00000000h]

FWHIF is shown in Table 5-81.

Return to the Summary Table.

HIF firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure) - Not in use , core always has access.

Table 5-81 FWHIF Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.59 FWHOST0 Register (Offset = 1B4h) [Reset = 00000000h]

FWHOST0 is shown in Table 5-82.

Return to the Summary Table.

HOST MCU region 0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-82 FWHOST0 Register Field Descriptions
BitFieldTypeResetDescription
31-26RESERVEDR0hReserved
25-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_0 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_0 base_len can range from: ##register base_len value## 0x0 - 0x7F for HOST_MCU_REGION_0 the base address for security firewalls is 0x23F80000 ( HOST_MCU_REGION_0 ) max window size is 128Kb example: worker base address: 0x23F80000 current address to access: 0x23F81504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x23F81504 --> ((0x23F81504 - 0x23F80000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_0 is assigned to TCM DATA RAM HOST_MCU_REGION_0 base address can range from: ##register base value## 0x0 - 0x27F ##absolute equivalent value## 0x23F800000 - 0x2401FC00 for HOST_MCU_REGION_0 the base address for security firewalls is 0x23F80000 ( M33 TCM Data RAM ) max window size is 128Kb example: worker base address: 0x23F80000 current address to access: 0x23F80504 region_base_address: 0x1 region_base_address_len: 0x1 0x23F80504 --> ((0x23F80504 - 0x23F800000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.60 FWHOST1 Register (Offset = 1B8h) [Reset = 00000000h]

FWHOST1 is shown in Table 5-83.

Return to the Summary Table.

HOST MCU region 1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-83 FWHOST1 Register Field Descriptions
BitFieldTypeResetDescription
31-26RESERVEDR0hReserved
25-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_0 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_0 base_len can range from: ##register base_len value## 0x0 - 0x7F for HOST_MCU_REGION_0 the base address for security firewalls is 0x23F80000 ( HOST_MCU_REGION_1 ) max window size is 128Kb example: worker base address: 0x23F80000 current address to access: 0x23F81504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x23F81504 --> ((0x23F81504 - 0x23F80000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_1 is assigned to TCM DATA RAM HOST_MCU_REGION_1 base address can range from: ##register base value## 0x0 - 0x27F ##absolute equivalent value## 0x23F800000 - 0x2401FC00 for HOST_MCU_REGION_0 the base address for security firewalls is 0x23F80000 ( M33 TCM Data RAM ) max window size is 128Kb example: worker base address: 0x23F80000 current address to access: 0x23F80504 region_base_address: 0x1 region_base_address_len: 0x1 0x23F80504 --> ((0x23F80504 - 0x23F800000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.61 FWHOST2 Register (Offset = 1BCh) [Reset = 00000000h]

FWHOST2 is shown in Table 5-84.

Return to the Summary Table.

HOST MCU region 2 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-84 FWHOST2 Register Field Descriptions
BitFieldTypeResetDescription
31-26RESERVEDR0hReserved
25-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_2 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_2 base_len can range from: ##register base_len value## 0x0 - 0x240 for HOST_MCU_REGION_0 the base address for security firewalls is 0x2BF00000 ( HOST_MCU_REGION_2 ) max window size is 576Kb example: worker base address: 0x2BF00000 current address to access: 0x2BF01504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x2BF01504 --> ((0x2BF01504 - 0x2BF00000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_2 is assigned to M33 DATA RAM HOST_MCU_REGION_2 base address can range from: ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF00000 - 0x2C08FC00 for HOST_MCU_REGION_2 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF000000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF000000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.62 FWHOST3 Register (Offset = 1C0h) [Reset = 00000000h]

FWHOST3 is shown in Table 5-85.

Return to the Summary Table.

HOST MCU region 3 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-85 FWHOST3 Register Field Descriptions
BitFieldTypeResetDescription
31-26RESERVEDR0hReserved
25-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_2 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_2 base_len can range from: ##register base_len value## 0x0 - 0x240 for HOST_MCU_REGION_0 the base address for security firewalls is 0x2BF00000 ( HOST_MCU_REGION_2 ) max window size is 576Kb example: worker base address: 0x2BF00000 current address to access: 0x2BF01504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x2BF01504 --> ((0x2BF01504 - 0x2BF00000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_3 is assigned to M33 DATA RAM HOST_MCU_REGION_3 base address can range from: ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF00000 - 0x2C08FC00 for HOST_MCU_REGION_2 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF000000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF000000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.63 FWHOST4 Register (Offset = 1C4h) [Reset = 00000000h]

FWHOST4 is shown in Table 5-86.

Return to the Summary Table.

access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-86 FWHOST4 Register Field Descriptions
BitFieldTypeResetDescription
31-27RESERVEDR0hReserved
26BASESELR/W0hBase select for Reserved region defaulted to M33 TCM Data RAM (base_sel = 0): this select bit will assign this region to either TCM Data (base_sel = 0) ##register base value## 0x0 - 0x80 ##absolute equivalent value## 0x200000000 - 0x20001FFFF or Data RAM (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF00000 - 0x2C08FC00 for HOST_MCU_REGION_4 with base_sel = 0 the base address for security firewalls is 0x23F80000 ( M33 TCM Data RAM ) max window size is 128Kb (depending on the MEMSS mode) for HOST_MCU_REGION_4 with base_sel = 1 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF00000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
25-16LENR/W0haddress base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_4 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_4 base_len can range from: base_sel = 0 ##register base_len value## 0x0 - 0x7F base_sel = 0 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM M33 Data RAM ) max window size is 128Kb ################# base_sel = 1 ##register base_len value## 0x0 - 0x240 base_sel = 1 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 (M33 Data RAM ) max window size is 576Kb ################# example: worker base address: 0x23F80000 current address to access: 0x23F81504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x23F81504 --> ((0x23F81504 - 0x23F80000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_4 is assigned to TCM DATA RAM (base_sel = 0) or M33 Data Ram (base_sel = 1) HOST_MCU_REGION_4 base address can range from: (base_sel = 0) ##register base value## 0x0 - 0x27F ##absolute equivalent value## 0x23F80000 - 0x2401FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM Data RAM ) max window size is 128Kb ################## (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF000000 - 0x2C08FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF000000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.64 FWHOST5 Register (Offset = 1C8h) [Reset = 00000000h]

FWHOST5 is shown in Table 5-87.

Return to the Summary Table.

HOST MCU region 5 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-87 FWHOST5 Register Field Descriptions
BitFieldTypeResetDescription
31-27RESERVEDR0hReserved
26BASESELR/W0hBase select for Reserved region defaulted to M33 TCM Data RAM (base_sel = 0): this select bit will assign this region to either TCM Data (base_sel = 0) ##register base value## 0x0 - 0x80 ##absolute equivalent value## 0x200000000 - 0x20001FFFF or Data RAM (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF00000 - 0x2C08FC00 for HOST_MCU_REGION_4 with base_sel = 0 the base address for security firewalls is 0x23F80000 ( M33 TCM Data RAM ) max window size is 128Kb (depending on the MEMSS mode) for HOST_MCU_REGION_4 with base_sel = 1 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF00000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
25-16LENR/W0haddress base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_4 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_4 base_len can range from: base_sel = 0 ##register base_len value## 0x0 - 0x7F base_sel = 0 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM M33 Data RAM ) max window size is 128Kb ################# base_sel = 1 ##register base_len value## 0x0 - 0x240 base_sel = 1 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 (M33 Data RAM ) max window size is 576Kb ################# example: worker base address: 0x23F80000 current address to access: 0x23F81504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x23F81504 --> ((0x23F81504 - 0x23F80000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_4 is assigned to TCM DATA RAM (base_sel = 0) or M33 Data Ram (base_sel = 1) HOST_MCU_REGION_4 base address can range from: (base_sel = 0) ##register base value## 0x0 - 0x27F ##absolute equivalent value## 0x23F80000 - 0x2401FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM Data RAM ) max window size is 128Kb ################## (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF000000 - 0x2C08FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF000000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.65 FWHOST6 Register (Offset = 1CCh) [Reset = 00000000h]

FWHOST6 is shown in Table 5-88.

Return to the Summary Table.

HOST MCU region 6 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-88 FWHOST6 Register Field Descriptions
BitFieldTypeResetDescription
31-27RESERVEDR0hReserved
26BASESELR/W1hBase select for Reserved region defaulted to M33 TCM Data RAM (base_sel = 0): this select bit will assign this region to either TCM Data (base_sel = 0) ##register base value## 0x0 - 0x80 ##absolute equivalent value## 0x200000000 - 0x20001FFFF or Data RAM (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF00000 - 0x2C08FC00 for HOST_MCU_REGION_4 with base_sel = 0 the base address for security firewalls is 0x23F80000 ( M33 TCM Data RAM ) max window size is 128Kb (depending on the MEMSS mode) for HOST_MCU_REGION_4 with base_sel = 1 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF00000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
25-16LENR/W0haddress base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_4 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_4 base_len can range from: base_sel = 0 ##register base_len value## 0x0 - 0x7F base_sel = 0 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM M33 Data RAM ) max window size is 128Kb ################# base_sel = 1 ##register base_len value## 0x0 - 0x240 base_sel = 1 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 (M33 Data RAM ) max window size is 576Kb ################# example: worker base address: 0x23F80000 current address to access: 0x23F81504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x23F81504 --> ((0x23F81504 - 0x23F80000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_4 is assigned to TCM DATA RAM (base_sel = 0) or M33 Data Ram (base_sel = 1) HOST_MCU_REGION_4 base address can range from: (base_sel = 0) ##register base value## 0x0 - 0x27F ##absolute equivalent value## 0x23F80000 - 0x2401FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM Data RAM ) max window size is 128Kb ################## (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF000000 - 0x2C08FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF000000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.66 FWHOST7 Register (Offset = 1D0h) [Reset = 00000000h]

FWHOST7 is shown in Table 5-89.

Return to the Summary Table.

HOST MCU region 7 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-89 FWHOST7 Register Field Descriptions
BitFieldTypeResetDescription
31-27RESERVEDR0hReserved
26BASESELR/W01hBase select for Reserved region defaulted to M33 TCM Data RAM (base_sel = 0): this select bit will assign this region to either TCM Data (base_sel = 0) ##register base value## 0x0 - 0x80 ##absolute equivalent value## 0x200000000 - 0x20001FFFF or Data RAM (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF00000 - 0x2C08FC00 for HOST_MCU_REGION_4 with base_sel = 0 the base address for security firewalls is 0x23F80000 ( M33 TCM Data RAM ) max window size is 128Kb (depending on the MEMSS mode) for HOST_MCU_REGION_4 with base_sel = 1 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF00000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
25-16LENR/W0haddress base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU_REGION_4 address space: 0x20000000 - 0x2FFFFFFF HOST_MCU_REGION_4 base_len can range from: base_sel = 0 ##register base_len value## 0x0 - 0x7F base_sel = 0 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM M33 Data RAM ) max window size is 128Kb ################# base_sel = 1 ##register base_len value## 0x0 - 0x240 base_sel = 1 --> HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 (M33 Data RAM ) max window size is 576Kb ################# example: worker base address: 0x23F80000 current address to access: 0x23F81504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x23F81504 --> ((0x23F81504 - 0x23F80000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15RESERVEDR0hReserved
14-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HOST_MCU address space: 0x00000000 - 0x2FFFFFFF / 0x41900000 - 0x4190FFFF HOST_MCU_REGION_4 is assigned to TCM DATA RAM (base_sel = 0) or M33 Data Ram (base_sel = 1) HOST_MCU_REGION_4 base address can range from: (base_sel = 0) ##register base value## 0x0 - 0x27F ##absolute equivalent value## 0x23F80000 - 0x2401FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x23F80000 ( TCM Data RAM ) max window size is 128Kb ################## (base_sel = 1) ##register base value## 0x0 - 0x63F ##absolute equivalent value## 0x2BF000000 - 0x2C08FC00 for HOST_MCU_REGION_4 the base address for security firewalls is 0x2BF00000 ( M33 Data RAM ) max window size is 576Kb (depending on the MEMSS mode) example: worker base address: 0x2BF000000 current address to access: 0x2BF00504 region_base_address: 0x1 region_base_address_len: 0x1 0x2BF00504 --> ((0x2BF00504 - 0x2BF00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.67 FWHOST8 Register (Offset = 1D4h) [Reset = 00000000h]

FWHOST8 is shown in Table 5-90.

Return to the Summary Table.

HOST MCU region 8 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-90 FWHOST8 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.68 FWHOST9 Register (Offset = 1D8h) [Reset = 00000000h]

FWHOST9 is shown in Table 5-91.

Return to the Summary Table.

HOST MCU region 9 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-91 FWHOST9 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.69 FWHOST10 Register (Offset = 1DCh) [Reset = 00000000h]

FWHOST10 is shown in Table 5-92.

Return to the Summary Table.

HOST MCU region 10 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-92 FWHOST10 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.70 FWHOST11 Register (Offset = 1E0h) [Reset = 00000000h]

FWHOST11 is shown in Table 5-93.

Return to the Summary Table.

HOST MCU region 11 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-93 FWHOST11 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.71 FWXIPOSPI Register (Offset = 1E4h) [Reset = 00000000h]

FWXIPOSPI is shown in Table 5-94.

Return to the Summary Table.

XIP_OSPI firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-94 FWXIPOSPI Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.72 FWXIPINDAC Register (Offset = 1E8h) [Reset = 00000000h]

FWXIPINDAC is shown in Table 5-95.

Return to the Summary Table.

OSPI_INDAC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-95 FWXIPINDAC Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.73 FWXIPGEN Register (Offset = 1ECh) [Reset = 00000000h]

FWXIPGEN is shown in Table 5-96.

Return to the Summary Table.

XIP_GEN firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-96 FWXIPGEN Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.74 FWXIPUDMAS Register (Offset = 1F0h) [Reset = 00000000h]

FWXIPUDMAS is shown in Table 5-97.

Return to the Summary Table.

XIP_UDMA_SEC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-97 FWXIPUDMAS Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.75 FWXIPUDMANS Register (Offset = 1F4h) [Reset = 00000000h]

FWXIPUDMANS is shown in Table 5-98.

Return to the Summary Table.

UDMA_NONSEC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-98 FWXIPUDMANS Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.76 FWOTFDE0 Register (Offset = 1F8h) [Reset = 00000000h]

FWOTFDE0 is shown in Table 5-99.

Return to the Summary Table.

OTFDE_REGION0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-99 FWOTFDE0 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.77 FWOTFDE1 Register (Offset = 1FCh) [Reset = 00000000h]

FWOTFDE1 is shown in Table 5-100.

Return to the Summary Table.

OTFDE_REGION1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-100 FWOTFDE1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.78 FWOTFDE2 Register (Offset = 200h) [Reset = 00000000h]

FWOTFDE2 is shown in Table 5-101.

Return to the Summary Table.

OTFDE_REGION2 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-101 FWOTFDE2 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.79 FWOTFDE3 Register (Offset = 204h) [Reset = 00000000h]

FWOTFDE3 is shown in Table 5-102.

Return to the Summary Table.

OTFDE_REGION3 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-102 FWOTFDE3 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.80 FWDMAGEN Register (Offset = 208h) [Reset = 00000000h]

FWDMAGEN is shown in Table 5-103.

Return to the Summary Table.

DMA_GEN firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-103 FWDMAGEN Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.81 FWDMA0 Register (Offset = 20Ch) [Reset = 00000000h]

FWDMA0 is shown in Table 5-104.

Return to the Summary Table.

DMA_CH_0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-104 FWDMA0 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.82 FWDMA1 Register (Offset = 210h) [Reset = 00000000h]

FWDMA1 is shown in Table 5-105.

Return to the Summary Table.

DMA_CH_1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-105 FWDMA1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.83 FWDMA2 Register (Offset = 214h) [Reset = 00000000h]

FWDMA2 is shown in Table 5-106.

Return to the Summary Table.

DMA_CH_2 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-106 FWDMA2 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.84 FWDMA3 Register (Offset = 218h) [Reset = 00000000h]

FWDMA3 is shown in Table 5-107.

Return to the Summary Table.

DMA_CH_3 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-107 FWDMA3 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.85 FWDMA4 Register (Offset = 21Ch) [Reset = 00000000h]

FWDMA4 is shown in Table 5-108.

Return to the Summary Table.

DMA_CH_4 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-108 FWDMA4 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.86 FWDMA5 Register (Offset = 220h) [Reset = 00000000h]

FWDMA5 is shown in Table 5-109.

Return to the Summary Table.

DMA_CH_5 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-109 FWDMA5 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.87 FWDMA6 Register (Offset = 224h) [Reset = 00000000h]

FWDMA6 is shown in Table 5-110.

Return to the Summary Table.

DMA_CH_6 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-110 FWDMA6 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.88 FWDMA7 Register (Offset = 228h) [Reset = 00000000h]

FWDMA7 is shown in Table 5-111.

Return to the Summary Table.

DMA_CH_7 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-111 FWDMA7 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.89 FWDMA8 Register (Offset = 22Ch) [Reset = 00000000h]

FWDMA8 is shown in Table 5-112.

Return to the Summary Table.

DMA_CH_8 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-112 FWDMA8 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.90 FWDMA9 Register (Offset = 230h) [Reset = 00000000h]

FWDMA9 is shown in Table 5-113.

Return to the Summary Table.

DMA_CH_9 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-113 FWDMA9 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.91 FWDMA10 Register (Offset = 234h) [Reset = 00000000h]

FWDMA10 is shown in Table 5-114.

Return to the Summary Table.

DMA_CH_10 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-114 FWDMA10 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.92 FWDMA11 Register (Offset = 238h) [Reset = 00000000h]

FWDMA11 is shown in Table 5-115.

Return to the Summary Table.

DMA_CH_11 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-115 FWDMA11 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.93 FWHSMEIPNS Register (Offset = 23Ch) [Reset = 00000000h]

FWHSMEIPNS is shown in Table 5-116.

Return to the Summary Table.

HSM EIP NONSEC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-116 FWHSMEIPNS Register Field Descriptions
BitFieldTypeResetDescription
31-21RESERVEDR0hReserved
20-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HSM address space: 0x41B00000 - 0x41B3FFFF HSM_EIP_REGS base_len can range from: ##register base_len value## 0x0 - 0xF for HSM the base address for security firewalls is 0x41B00000 ( HSM_EIP_REGS ) max window size is 16Kb example: worker base address: 0x41B00000 current address to access: 0x41B01504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x41B01504 --> ((0x41B01504 - 0x41B00000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15-9RESERVEDR0hReserved
8-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HSM address space: 0x41B00000 - 0x41B3FFFF HSM_EIP_REGS base address can range from: ##register base value## 0x0 - 0xF ##absolute equivalent value## 0x41B00000 - 0x41B03FFF for HSM the base address for security firewalls is 0x41B00000 ( HSM_EIP_REGS ) max window size is 16Kb example: worker base address: 0x41B00000 current address to access: 0x41B00504 region_base_address: 0x1 region_base_address_len: 0x1 0x41B00504 --> ((0x41B00504 - 0x41B00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.94 FWHSMEIPS Register (Offset = 240h) [Reset = 00000000h]

FWHSMEIPS is shown in Table 5-117.

Return to the Summary Table.

HSM EIP SEC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-117 FWHSMEIPS Register Field Descriptions
BitFieldTypeResetDescription
31-21RESERVEDR0hReserved
20-16LENR/W0haddress base with 1K granularity : address base len for firewall is the offset from the region's base address indicated in the same region field describing the end of a firewall window that has a certain access rules (R/W Permission) for each controller-id HSM address space: 0x41B00000 - 0x41B3FFFF HSM_EIP_REGS base_len can range from: ##register base_len value## 0x0 - 0xF for HSM the base address for security firewalls is 0x41B00000 ( HSM_EIP_REGS ) max window size is 16Kb example: worker base address: 0x41B00000 current address to access: 0x41B01504 region_base_address: 0x4 region_base_address_len: 0x2 --> (region_base_address + region_base_address_len) --> 0x4+0x2 -->0x6 0x41B01504 --> ((0x41B01504 - 0x41B00000) >> 10) -->0x4 0x4 <= 0x5 < 0x6 that address falls on the region window and therefor obeys to that region set of access rules
15-9RESERVEDR0hReserved
8-4BASER/W0haddress base with 1K granularity : address base for firewall is the the offset start address from a worker base address describing the beginning of a firewall window that has a certain access rules (R/W Permission) for each controller-id HSM address space: 0x41B00000 - 0x41B3FFFF HSM_EIP_REGS base address can range from: ##register base value## 0x0 - ##absolute equivalent value## 0x41B00000 - 0x41B03FFF for HSM the base address for security firewalls is 0x41B00000 ( HSM_EIP_REGS ) max window size is 16Kb example: worker base address: 0x41B00000 current address to access: 0x41B00504 region_base_address: 0x1 region_base_address_len: 0x1 0x41B00504 --> ((0x41B00504 - 0x41B00000) >> 10) --> 0x1 0x1(base) <= 0x1(current) < 0x1(base)+0x1(len) that address falls on the region window and therefor obeys to that region set of access rules
3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.95 FWHSMWRAPNS Register (Offset = 244h) [Reset = 00000000h]

FWHSMWRAPNS is shown in Table 5-118.

Return to the Summary Table.

HSM Wrapper NONSEC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-118 FWHSMWRAPNS Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.96 FWHSMWRAPS Register (Offset = 248h) [Reset = 00000000h]

FWHSMWRAPS is shown in Table 5-119.

Return to the Summary Table.

HSM Wrapper SEC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-119 FWHSMWRAPS Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.97 FWHSMDBG Register (Offset = 24Ch) [Reset = 00000000h]

FWHSMDBG is shown in Table 5-120.

Return to the Summary Table.

HSM DEBUG firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-120 FWHSMDBG Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.98 FWI2C0 Register (Offset = 250h) [Reset = 00000000h]

FWI2C0 is shown in Table 5-121.

Return to the Summary Table.

I2C0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-121 FWI2C0 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.99 FWI2C1 Register (Offset = 254h) [Reset = 00000000h]

FWI2C1 is shown in Table 5-122.

Return to the Summary Table.

I2C1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-122 FWI2C1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.100 FWSPSPI0 Register (Offset = 258h) [Reset = 00000000h]

FWSPSPI0 is shown in Table 5-123.

Return to the Summary Table.

SPI0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-123 FWSPSPI0 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.101 FWSPSPI1 Register (Offset = 25Ch) [Reset = 00000000h]

FWSPSPI1 is shown in Table 5-124.

Return to the Summary Table.

SPI1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-124 FWSPSPI1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.102 FWSPUART0 Register (Offset = 260h) [Reset = 00000000h]

FWSPUART0 is shown in Table 5-125.

Return to the Summary Table.

UART0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-125 FWSPUART0 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.103 FWSPUART1 Register (Offset = 264h) [Reset = 00000000h]

FWSPUART1 is shown in Table 5-126.

Return to the Summary Table.

UART1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-126 FWSPUART1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.104 FWSPGPT0 Register (Offset = 268h) [Reset = 00000000h]

FWSPGPT0 is shown in Table 5-127.

Return to the Summary Table.

GPTIMER0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-127 FWSPGPT0 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.105 FWSPGPT1 Register (Offset = 26Ch) [Reset = 00000000h]

FWSPGPT1 is shown in Table 5-128.

Return to the Summary Table.

GPTIMER1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-128 FWSPGPT1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.106 FWSPI2S Register (Offset = 270h) [Reset = 00000000h]

FWSPI2S is shown in Table 5-129.

Return to the Summary Table.

I2S firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-129 FWSPI2S Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.107 FWPDM Register (Offset = 274h) [Reset = 00000000h]

FWPDM is shown in Table 5-130.

Return to the Summary Table.

PDM firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-130 FWPDM Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.108 FWSPCAN Register (Offset = 278h) [Reset = 00000000h]

FWSPCAN is shown in Table 5-131.

Return to the Summary Table.

CAN firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-131 FWSPCAN Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.109 FWSPADC Register (Offset = 27Ch) [Reset = 00000000h]

FWSPADC is shown in Table 5-132.

Return to the Summary Table.

ADC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-132 FWSPADC Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.110 FWSPSDMMC Register (Offset = 280h) [Reset = 00000000h]

FWSPSDMMC is shown in Table 5-133.

Return to the Summary Table.

SDMMC firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-133 FWSPSDMMC Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.111 FWSPSDIO Register (Offset = 284h) [Reset = 00000000h]

FWSPSDIO is shown in Table 5-134.

Return to the Summary Table.

SDIO firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-134 FWSPSDIO Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.112 FWSPUART2 Register (Offset = 288h) [Reset = 00000000h]

FWSPUART2 is shown in Table 5-135.

Return to the Summary Table.

UART2 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-135 FWSPUART2 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.113 UDMANSCTL Register (Offset = 28Ch) [Reset = 00000000h]

UDMANSCTL is shown in Table 5-136.

Return to the Summary Table.

uDMA Non-secured Channel Control.

Table 5-136 UDMANSCTL Register Field Descriptions
BitFieldTypeResetDescription
31-1RESERVEDR0hReserved
0ACCPERR/W0hAccess Permission. Define uDMA non-sec channel access permission to secured flash address: '0' - access not allowed '1' - access allowed

5.6.114 FWIOPAD0 Register (Offset = 290h) [Reset = 00000000h]

FWIOPAD0 is shown in Table 5-137.

Return to the Summary Table.

IOMUX_PAD_0 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-137 FWIOPAD0 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.115 FWIOPAD1 Register (Offset = 294h) [Reset = 00000000h]

FWIOPAD1 is shown in Table 5-138.

Return to the Summary Table.

IOMUX_PAD_1 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-138 FWIOPAD1 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.116 FWIOPAD2 Register (Offset = 298h) [Reset = 00000000h]

FWIOPAD2 is shown in Table 5-139.

Return to the Summary Table.

IOMUX_PAD_2 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-139 FWIOPAD2 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.117 FWIOPAD3 Register (Offset = 29Ch) [Reset = 00000000h]

FWIOPAD3 is shown in Table 5-140.

Return to the Summary Table.

IOMUX_PAD_3 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-140 FWIOPAD3 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.118 FWIOPAD4 Register (Offset = 2A0h) [Reset = 00000000h]

FWIOPAD4 is shown in Table 5-141.

Return to the Summary Table.

IOMUX_PAD_4 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-141 FWIOPAD4 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.119 FWIOPAD5 Register (Offset = 2A4h) [Reset = 00000000h]

FWIOPAD5 is shown in Table 5-142.

Return to the Summary Table.

IOMUX_PAD_5 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-142 FWIOPAD5 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.120 FWIOPAD6 Register (Offset = 2A8h) [Reset = 00000000h]

FWIOPAD6 is shown in Table 5-143.

Return to the Summary Table.

IOMUX_PAD_6 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-143 FWIOPAD6 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.121 FWIOPAD7 Register (Offset = 2ACh) [Reset = 00000000h]

FWIOPAD7 is shown in Table 5-144.

Return to the Summary Table.

IOMUX_PAD_7 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-144 FWIOPAD7 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.122 FWIOPAD8 Register (Offset = 2B0h) [Reset = 00000000h]

FWIOPAD8 is shown in Table 5-145.

Return to the Summary Table.

IOMUX_PAD_8 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-145 FWIOPAD8 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.123 FWIOPAD9 Register (Offset = 2B4h) [Reset = 00000000h]

FWIOPAD9 is shown in Table 5-146.

Return to the Summary Table.

IOMUX_PAD_9 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-146 FWIOPAD9 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.124 FWIOPAD10 Register (Offset = 2B8h) [Reset = 00000000h]

FWIOPAD10 is shown in Table 5-147.

Return to the Summary Table.

IOMUX_PAD_10 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-147 FWIOPAD10 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.125 FWIOPAD11 Register (Offset = 2BCh) [Reset = 00000000h]

FWIOPAD11 is shown in Table 5-148.

Return to the Summary Table.

IOMUX_PAD_11 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-148 FWIOPAD11 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.126 FWIOPAD12 Register (Offset = 2C0h) [Reset = 00000000h]

FWIOPAD12 is shown in Table 5-149.

Return to the Summary Table.

IOMUX_PAD_12 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-149 FWIOPAD12 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.127 FWIOPAD13 Register (Offset = 2C4h) [Reset = 00000000h]

FWIOPAD13 is shown in Table 5-150.

Return to the Summary Table.

IOMUX_PAD_13 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-150 FWIOPAD13 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.128 FWIOPAD14 Register (Offset = 2C8h) [Reset = 00000000h]

FWIOPAD14 is shown in Table 5-151.

Return to the Summary Table.

IOMUX_PAD_14 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-151 FWIOPAD14 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.129 FWIOPAD15 Register (Offset = 2CCh) [Reset = 00000000h]

FWIOPAD15 is shown in Table 5-152.

Return to the Summary Table.

IOMUX_PAD_15 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-152 FWIOPAD15 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.130 FWIOPAD16 Register (Offset = 2D0h) [Reset = 00000000h]

FWIOPAD16 is shown in Table 5-153.

Return to the Summary Table.

IOMUX_PAD_16 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-153 FWIOPAD16 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.131 FWIOPAD17 Register (Offset = 2D4h) [Reset = 00000000h]

FWIOPAD17 is shown in Table 5-154.

Return to the Summary Table.

IOMUX_PAD_17 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-154 FWIOPAD17 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.132 FWIOPAD18 Register (Offset = 2D8h) [Reset = 00000000h]

FWIOPAD18 is shown in Table 5-155.

Return to the Summary Table.

IOMUX_PAD_18 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-155 FWIOPAD18 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.133 FWIOPAD19 Register (Offset = 2DCh) [Reset = 00000000h]

FWIOPAD19 is shown in Table 5-156.

Return to the Summary Table.

IOMUX_PAD_19 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-156 FWIOPAD19 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.134 FWIOPAD20 Register (Offset = 2E0h) [Reset = 00000000h]

FWIOPAD20 is shown in Table 5-157.

Return to the Summary Table.

IOMUX_PAD_20 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-157 FWIOPAD20 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.135 FWIOPAD21 Register (Offset = 2E4h) [Reset = 00000000h]

FWIOPAD21 is shown in Table 5-158.

Return to the Summary Table.

IOMUX_PAD_21 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-158 FWIOPAD21 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.136 FWIOPAD22 Register (Offset = 2E8h) [Reset = 00000000h]

FWIOPAD22 is shown in Table 5-159.

Return to the Summary Table.

IOMUX_PAD_22 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-159 FWIOPAD22 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.137 FWIOPAD23 Register (Offset = 2ECh) [Reset = 00000000h]

FWIOPAD23 is shown in Table 5-160.

Return to the Summary Table.

IOMUX_PAD_23 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-160 FWIOPAD23 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.138 FWIOPAD24 Register (Offset = 2F0h) [Reset = 00000000h]

FWIOPAD24 is shown in Table 5-161.

Return to the Summary Table.

IOMUX_PAD_24 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-161 FWIOPAD24 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.139 FWIOPAD25 Register (Offset = 2F4h) [Reset = 00000000h]

FWIOPAD25 is shown in Table 5-162.

Return to the Summary Table.

IOMUX_PAD_25 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-162 FWIOPAD25 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.140 FWIOPAD26 Register (Offset = 2F8h) [Reset = 00000000h]

FWIOPAD26 is shown in Table 5-163.

Return to the Summary Table.

IOMUX_PAD_26 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-163 FWIOPAD26 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.141 FWIOPAD27 Register (Offset = 2FCh) [Reset = 00000000h]

FWIOPAD27 is shown in Table 5-164.

Return to the Summary Table.

IOMUX_PAD_27 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-164 FWIOPAD27 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.142 FWIOPAD28 Register (Offset = 300h) [Reset = 00000000h]

FWIOPAD28 is shown in Table 5-165.

Return to the Summary Table.

IOMUX_PAD_28 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-165 FWIOPAD28 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.143 FWIOPAD29 Register (Offset = 304h) [Reset = 00000000h]

FWIOPAD29 is shown in Table 5-166.

Return to the Summary Table.

IOMUX_PAD_29 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-166 FWIOPAD29 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.144 FWIOPAD30 Register (Offset = 308h) [Reset = 00000000h]

FWIOPAD30 is shown in Table 5-167.

Return to the Summary Table.

IOMUX_PAD_30 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-167 FWIOPAD30 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.145 FWIOPAD31 Register (Offset = 30Ch) [Reset = 00000000h]

FWIOPAD31 is shown in Table 5-168.

Return to the Summary Table.

IOMUX_PAD_31 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-168 FWIOPAD31 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.146 FWIOPAD32 Register (Offset = 310h) [Reset = 00000000h]

FWIOPAD32 is shown in Table 5-169.

Return to the Summary Table.

IOMUX_PAD_32 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-169 FWIOPAD32 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.147 FWIOPAD33 Register (Offset = 314h) [Reset = 00000000h]

FWIOPAD33 is shown in Table 5-170.

Return to the Summary Table.

IOMUX_PAD_33 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-170 FWIOPAD33 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.148 FWIOPAD34 Register (Offset = 318h) [Reset = 00000000h]

FWIOPAD34 is shown in Table 5-171.

Return to the Summary Table.

IOMUX_PAD_34 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-171 FWIOPAD34 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.149 FWIOPAD35 Register (Offset = 31Ch) [Reset = 00000000h]

FWIOPAD35 is shown in Table 5-172.

Return to the Summary Table.

IOMUX_PAD_35 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-172 FWIOPAD35 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.150 FWIOPAD36 Register (Offset = 320h) [Reset = 00000000h]

FWIOPAD36 is shown in Table 5-173.

Return to the Summary Table.

IOMUX_PAD_36 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-173 FWIOPAD36 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.151 FWIOPAD37 Register (Offset = 324h) [Reset = 00000000h]

FWIOPAD37 is shown in Table 5-174.

Return to the Summary Table.

IOMUX_PAD_37 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-174 FWIOPAD37 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.152 FWIOPAD38 Register (Offset = 328h) [Reset = 00000000h]

FWIOPAD38 is shown in Table 5-175.

Return to the Summary Table.

IOMUX_PAD_38 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-175 FWIOPAD38 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.153 FWIOPAD39 Register (Offset = 32Ch) [Reset = 00000000h]

FWIOPAD39 is shown in Table 5-176.

Return to the Summary Table.

IOMUX_PAD_39 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-176 FWIOPAD39 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.154 FWIOPAD40 Register (Offset = 330h) [Reset = 00000000h]

FWIOPAD40 is shown in Table 5-177.

Return to the Summary Table.

IOMUX_PAD_40 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-177 FWIOPAD40 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.155 FWIOPAD41 Register (Offset = 334h) [Reset = 00000000h]

FWIOPAD41 is shown in Table 5-178.

Return to the Summary Table.

IOMUX_PAD_41 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-178 FWIOPAD41 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.156 FWIOPAD42 Register (Offset = 338h) [Reset = 00000000h]

FWIOPAD42 is shown in Table 5-179.

Return to the Summary Table.

IOMUX_PAD_42 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-179 FWIOPAD42 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.157 FWIOPAD43 Register (Offset = 33Ch) [Reset = 00000000h]

FWIOPAD43 is shown in Table 5-180.

Return to the Summary Table.

IOMUX_PAD_43 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-180 FWIOPAD43 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.158 FWIOPAD44 Register (Offset = 340h) [Reset = 00000000h]

FWIOPAD44 is shown in Table 5-181.

Return to the Summary Table.

IOMUX_PAD_44 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-181 FWIOPAD44 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.159 FWIOPAD45 Register (Offset = 344h) [Reset = 00000000h]

FWIOPAD45 is shown in Table 5-182.

Return to the Summary Table.

IOMUX_PAD_45 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-182 FWIOPAD45 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.160 FWIOPAD46 Register (Offset = 348h) [Reset = 00000000h]

FWIOPAD46 is shown in Table 5-183.

Return to the Summary Table.

IOMUX_PAD_46 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-183 FWIOPAD46 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.161 FWIOPAD47 Register (Offset = 34Ch) [Reset = 00000000h]

FWIOPAD47 is shown in Table 5-184.

Return to the Summary Table.

IOMUX_PAD_47 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-184 FWIOPAD47 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.162 FWIOPAD48 Register (Offset = 350h) [Reset = 00000000h]

FWIOPAD48 is shown in Table 5-185.

Return to the Summary Table.

IOMUX_PAD_48 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-185 FWIOPAD48 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.163 FWDMA12 Register (Offset = 354h) [Reset = 00000000h]

FWDMA12 is shown in Table 5-186.

Return to the Summary Table.

DMA_CH_12 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-186 FWDMA12 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.164 FWDMA13 Register (Offset = 358h) [Reset = 00000000h]

FWDMA13 is shown in Table 5-187.

Return to the Summary Table.

DMA_CH_13 firewall access permission for 3 controller id : 0 - M33 Non Secured 1 - M33 Secured 2 - Core (Non Secure)

Table 5-187 FWDMA13 Register Field Descriptions
BitFieldTypeResetDescription
31-3RESERVEDR0hReserved
2CORENSR/W0hController Core Non Secured: '0' - access not allowed '1' - access allowed
1M33SR/W0hController M33 Secured: '0' - access not allowed '1' - access allowed
0M33NSR/W0hController M33 None Secured: '0' - access not allowed '1' - access allowed

5.6.165 USECSTB Register (Offset = 1000h) [Reset = 00000000h]

USECSTB is shown in Table 5-188.

Return to the Summary Table.

Micro Second STB

Table 5-188 USECSTB Register Field Descriptions
BitFieldTypeResetDescription
31-14RESERVEDR0hReserved
13-816USR/WFhSet how many micro second strobes are in 16 micro seconds, minus 1. Default: 16-1 =15.
7-0USR/W4FhSet how many soc clk are in one micro second, minus 1. for 40mhz : should be 39. for 80mhz : should be 79. (Soc clock default is 80MHz)

5.6.166 GPIOEVT0NS Register (Offset = 1044h) [Reset = 00000000h]

GPIOEVT0NS is shown in Table 5-189.

Return to the Summary Table.

Non-Secured GPIO Event Status, 1st Register. 45 bits status over two registers.

Table 5-189 GPIOEVT0NS Register Field Descriptions
BitFieldTypeResetDescription
31-0STA31TO0R0hNon-Secured event status , first 32 bits. ([31:0])

5.6.167 GPIOEVT1NS Register (Offset = 1048h) [Reset = 00000000h]

GPIOEVT1NS is shown in Table 5-190.

Return to the Summary Table.

Non-Secured GPIO Event Status, 2nd Register. 45 bits status over two registers.

Table 5-190 GPIOEVT1NS Register Field Descriptions
BitFieldTypeResetDescription
31-13RESERVEDR0hReserved
12-0STA44TO32R0hNon-Secured event status , 13 MSBs. ([44:32])

5.6.168 DBM33NS0 Register (Offset = 1054h) [Reset = 00000000h]

DBM33NS0 is shown in Table 5-191.

Return to the Summary Table.

M33 Non-Secured Doorbell IMASK. Mask Event. '0' - CLR - Clear Interrupt Mask '1' - SET - Set Interrupt Mask

Table 5-191 DBM33NS0 Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0IMASKR/W0hbit3 - doorbell 7 M3 IRQ bit2 - doorbell 6 M3 IRQ bit1 - doorbell 3 M3 IRQ bit0 - doorbell 2 M3 IRQ

5.6.169 DBNSISET Register (Offset = 1058h) [Reset = 00000000h]

DBNSISET is shown in Table 5-192.

Return to the Summary Table.

M33 Non-Secured Doorbells ISET. Sets event in RIS Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - SET - Sets interrupt

Table 5-192 DBNSISET Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0ISETW0hbit3 - doorbell 7 M3 IRQ bit2 - doorbell 6 M3 IRQ bit1 - doorbell 3 M3 IRQ bit0 - doorbell 2 M3 IRQ Type: Write-Clear

5.6.170 DBNSICLR Register (Offset = 105Ch) [Reset = 00000000h]

DBNSICLR is shown in Table 5-193.

Return to the Summary Table.

M33 Non-Secured Doorbell ICLR. Clears event in RIS Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - CLR - Clears the Event

Table 5-193 DBNSICLR Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0ICLRW0hbit3 - doorbell 7 M3 IRQ bit2 - doorbell 6 M3 IRQ bit1 - doorbell 3 M3 IRQ bit0 - doorbell 2 M3 IRQ Type: Write-Clear

5.6.171 DBNSIMSET Register (Offset = 1060h) [Reset = 00000000h]

DBNSIMSET is shown in Table 5-194.

Return to the Summary Table.

M33 Non-Secured Doorbell IMSET. Sets Event Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - SET - Set interrupt mask

Table 5-194 DBNSIMSET Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0IMSETW0hbit3 - doorbell 7 M3 IRQ bit2 - doorbell 6 M3 IRQ bit1 - doorbell 3 M3 IRQ bit0 - doorbell 2 M3 IRQ Type: Write-Clear

5.6.172 DBNSIMCLR Register (Offset = 1064h) [Reset = 00000000h]

DBNSIMCLR is shown in Table 5-195.

Return to the Summary Table.

M33 Non-Secured Doorbell IMCLR, Clears Event Write 0 - NO_EFFECT - Writing 0 has no effect Write 1 - CLR - Clear interrupt mask

Table 5-195 DBNSIMCLR Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0IMCLRW0hbit3 - doorbell 7 M3 IRQ bit2 - doorbell 6 M3 IRQ bit1 - doorbell 3 M3 IRQ bit0 - doorbell 2 M3 IRQ Type: Write-Clear

5.6.173 DBNSRIS Register (Offset = 1068h) [Reset = 00000000h]

DBNSRIS is shown in Table 5-196.

Return to the Summary Table.

M33 Non-Secured Doorbell RIS. Raw interrupt status for event. This bit is set to 1 when an event is received. when the corresponding bit in ICLR is set to 1, this bit will be cleared. Read 0 - CLR - Interrupt did not occur Read 1 - SET - Interrupt occurred

Table 5-196 DBNSRIS Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0RISR0hbit3 - doorbell 7 M3 IRQ bit2 - doorbell 6 M3 IRQ bit1 - doorbell 3 M3 IRQ bit0 - doorbell 2 M3 IRQ

5.6.174 DBNSMIS Register (Offset = 106Ch) [Reset = 00000000h]

DBNSMIS is shown in Table 5-197.

Return to the Summary Table.

M33 Non-Secured Doorbell MIS. Mask interrupt status for event Read 0 - CLR - Interrupt did not occur Read 1 - SET - Interrupt occurred

Table 5-197 DBNSMIS Register Field Descriptions
BitFieldTypeResetDescription
31-4RESERVEDR0hReserved
3-0MISR0hbit3 - doorbell 7 M3 IRQ bit2 - doorbell 6 M3 IRQ bit1 - doorbell 3 M3 IRQ bit0 - doorbell 2 M3 IRQ

5.6.175 GPIOMIS0NS Register (Offset = 1070h) [Reset = 00000000h]

GPIOMIS0NS is shown in Table 5-198.

Return to the Summary Table.

Non Secured GPIO MIS. 31-0

Table 5-198 GPIOMIS0NS Register Field Descriptions
BitFieldTypeResetDescription
31-031TO0R0h32 LSBs of GPIO MIS

5.6.176 GPIOMIS1NS Register (Offset = 1074h) [Reset = 00000000h]

GPIOMIS1NS is shown in Table 5-199.

Return to the Summary Table.

Non Secure GPIO MIS. 44-32

Table 5-199 GPIOMIS1NS Register Field Descriptions
BitFieldTypeResetDescription
31-13RESERVEDR0hReserved
12-044TO32R0h13 MSBs of GPIO MIS. 44-32

5.6.177 GPIOFNC0NS Register (Offset = 1078h) [Reset = 00000000h]

GPIOFNC0NS is shown in Table 5-200.

Return to the Summary Table.

Non Secured GPIO Functional Mask. 31-0 0. Mask 1. Un-Mask

Table 5-200 GPIOFNC0NS Register Field Descriptions
BitFieldTypeResetDescription
31-0MASK31TO0R/W0h32 LSBs of non-secured functional mask for GPIO.

5.6.178 GPIOFNC1NS Register (Offset = 107Ch) [Reset = 00000000h]

GPIOFNC1NS is shown in Table 5-201.

Return to the Summary Table.

non secured gpio functional mask

Table 5-201 GPIOFNC1NS Register Field Descriptions
BitFieldTypeResetDescription
31-13RESERVEDR0hReserved
12-0MASK44TO32R/W0h13 MSBs of non-secured functional mask for GPIO. 44-32