pub struct ACCESSCTRL { /* private fields */ }Expand description
Hardware access control registers
Implementations§
Source§impl ACCESSCTRL
impl ACCESSCTRL
Sourcepub const PTR: *const RegisterBlock = {0x40060000 as *const rp235x_hal::rp235x_pac::accessctrl::RegisterBlock}
pub const PTR: *const RegisterBlock = {0x40060000 as *const rp235x_hal::rp235x_pac::accessctrl::RegisterBlock}
Pointer to the register block
Sourcepub const fn ptr() -> *const RegisterBlock
pub const fn ptr() -> *const RegisterBlock
Return the pointer to the register block
Sourcepub unsafe fn steal() -> ACCESSCTRL
pub unsafe fn steal() -> ACCESSCTRL
Steal an instance of this peripheral
§Safety
Ensure that the new instance of the peripheral cannot be used in a way that may race with any existing instances, for example by only accessing read-only or write-only registers, or by consuming the original peripheral and using critical sections to coordinate access between multiple new instances.
Additionally, other software such as HALs may rely on only one peripheral instance existing to ensure memory safety; ensure no stolen instances are passed to such software.
Methods from Deref<Target = RegisterBlock>§
Sourcepub fn lock(&self) -> &Reg<LOCK_SPEC>
pub fn lock(&self) -> &Reg<LOCK_SPEC>
0x00 - Once a LOCK bit is written to 1, ACCESSCTRL silently ignores writes from that master. LOCK is writable only by a Secure, Privileged processor or debugger. LOCK bits are only writable when their value is zero. Once set, they can never be cleared, except by a full reset of ACCESSCTRL Setting the LOCK bit does not affect whether an access raises a bus error. Unprivileged writes, or writes from the DMA, will continue to raise bus errors. All other accesses will continue not to.
Sourcepub fn force_core_ns(&self) -> &Reg<FORCE_CORE_NS_SPEC>
pub fn force_core_ns(&self) -> &Reg<FORCE_CORE_NS_SPEC>
0x04 - Force core 1’s bus accesses to always be Non-secure, no matter the core’s internal state. Useful for schemes where one core is designated as the Non-secure core, since some peripherals may filter individual registers internally based on security state but not on master ID.
Sourcepub fn cfgreset(&self) -> &Reg<CFGRESET_SPEC>
pub fn cfgreset(&self) -> &Reg<CFGRESET_SPEC>
0x08 - Write 1 to reset all ACCESSCTRL configuration, except for the LOCK and FORCE_CORE_NS registers. This bit is used in the RP2350 bootrom to quickly restore ACCESSCTRL to a known state during the boot path. Note that, like all registers in ACCESSCTRL, this register is not writable when the writer’s corresponding LOCK bit is set, therefore a master which has been locked out of ACCESSCTRL can not use the CFGRESET register to disturb its contents.
Sourcepub fn gpio_nsmask0(&self) -> &Reg<GPIO_NSMASK0_SPEC>
pub fn gpio_nsmask0(&self) -> &Reg<GPIO_NSMASK0_SPEC>
0x0c - Control whether GPIO0…31 are accessible to Non-secure code. Writable only by a Secure, Privileged processor or debugger. 0 -> Secure access only 1 -> Secure + Non-secure access
Sourcepub fn gpio_nsmask1(&self) -> &Reg<GPIO_NSMASK1_SPEC>
pub fn gpio_nsmask1(&self) -> &Reg<GPIO_NSMASK1_SPEC>
0x10 - Control whether GPIO32..47 are accessible to Non-secure code, and whether QSPI and USB bitbang are accessible through the Non-secure SIO. Writable only by a Secure, Privileged processor or debugger.
Sourcepub fn rom(&self) -> &Reg<ROM_SPEC>
pub fn rom(&self) -> &Reg<ROM_SPEC>
0x14 - Control whether debugger, DMA, core 0 and core 1 can access ROM, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn xip_main(&self) -> &Reg<XIP_MAIN_SPEC>
pub fn xip_main(&self) -> &Reg<XIP_MAIN_SPEC>
0x18 - Control whether debugger, DMA, core 0 and core 1 can access XIP_MAIN, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram0(&self) -> &Reg<SRAM0_SPEC>
pub fn sram0(&self) -> &Reg<SRAM0_SPEC>
0x1c - Control whether debugger, DMA, core 0 and core 1 can access SRAM0, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram1(&self) -> &Reg<SRAM1_SPEC>
pub fn sram1(&self) -> &Reg<SRAM1_SPEC>
0x20 - Control whether debugger, DMA, core 0 and core 1 can access SRAM1, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram2(&self) -> &Reg<SRAM2_SPEC>
pub fn sram2(&self) -> &Reg<SRAM2_SPEC>
0x24 - Control whether debugger, DMA, core 0 and core 1 can access SRAM2, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram3(&self) -> &Reg<SRAM3_SPEC>
pub fn sram3(&self) -> &Reg<SRAM3_SPEC>
0x28 - Control whether debugger, DMA, core 0 and core 1 can access SRAM3, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram4(&self) -> &Reg<SRAM4_SPEC>
pub fn sram4(&self) -> &Reg<SRAM4_SPEC>
0x2c - Control whether debugger, DMA, core 0 and core 1 can access SRAM4, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram5(&self) -> &Reg<SRAM5_SPEC>
pub fn sram5(&self) -> &Reg<SRAM5_SPEC>
0x30 - Control whether debugger, DMA, core 0 and core 1 can access SRAM5, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram6(&self) -> &Reg<SRAM6_SPEC>
pub fn sram6(&self) -> &Reg<SRAM6_SPEC>
0x34 - Control whether debugger, DMA, core 0 and core 1 can access SRAM6, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram7(&self) -> &Reg<SRAM7_SPEC>
pub fn sram7(&self) -> &Reg<SRAM7_SPEC>
0x38 - Control whether debugger, DMA, core 0 and core 1 can access SRAM7, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram8(&self) -> &Reg<SRAM8_SPEC>
pub fn sram8(&self) -> &Reg<SRAM8_SPEC>
0x3c - Control whether debugger, DMA, core 0 and core 1 can access SRAM8, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sram9(&self) -> &Reg<SRAM9_SPEC>
pub fn sram9(&self) -> &Reg<SRAM9_SPEC>
0x40 - Control whether debugger, DMA, core 0 and core 1 can access SRAM9, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn dma(&self) -> &Reg<DMA_SPEC>
pub fn dma(&self) -> &Reg<DMA_SPEC>
0x44 - Control whether debugger, DMA, core 0 and core 1 can access DMA, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn usbctrl(&self) -> &Reg<USBCTRL_SPEC>
pub fn usbctrl(&self) -> &Reg<USBCTRL_SPEC>
0x48 - Control whether debugger, DMA, core 0 and core 1 can access USBCTRL, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pio0(&self) -> &Reg<PIO0_SPEC>
pub fn pio0(&self) -> &Reg<PIO0_SPEC>
0x4c - Control whether debugger, DMA, core 0 and core 1 can access PIO0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pio1(&self) -> &Reg<PIO1_SPEC>
pub fn pio1(&self) -> &Reg<PIO1_SPEC>
0x50 - Control whether debugger, DMA, core 0 and core 1 can access PIO1, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pio2(&self) -> &Reg<PIO2_SPEC>
pub fn pio2(&self) -> &Reg<PIO2_SPEC>
0x54 - Control whether debugger, DMA, core 0 and core 1 can access PIO2, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn coresight_trace(&self) -> &Reg<CORESIGHT_TRACE_SPEC>
pub fn coresight_trace(&self) -> &Reg<CORESIGHT_TRACE_SPEC>
0x58 - Control whether debugger, DMA, core 0 and core 1 can access CORESIGHT_TRACE, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn coresight_periph(&self) -> &Reg<CORESIGHT_PERIPH_SPEC>
pub fn coresight_periph(&self) -> &Reg<CORESIGHT_PERIPH_SPEC>
0x5c - Control whether debugger, DMA, core 0 and core 1 can access CORESIGHT_PERIPH, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sysinfo(&self) -> &Reg<SYSINFO_SPEC>
pub fn sysinfo(&self) -> &Reg<SYSINFO_SPEC>
0x60 - Control whether debugger, DMA, core 0 and core 1 can access SYSINFO, and at what security/privilege levels they can do so. Defaults to fully open access. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn resets(&self) -> &Reg<RESETS_SPEC>
pub fn resets(&self) -> &Reg<RESETS_SPEC>
0x64 - Control whether debugger, DMA, core 0 and core 1 can access RESETS, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn io_bank0(&self) -> &Reg<IO_BANK0_SPEC>
pub fn io_bank0(&self) -> &Reg<IO_BANK0_SPEC>
0x68 - Control whether debugger, DMA, core 0 and core 1 can access IO_BANK0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn io_bank1(&self) -> &Reg<IO_BANK1_SPEC>
pub fn io_bank1(&self) -> &Reg<IO_BANK1_SPEC>
0x6c - Control whether debugger, DMA, core 0 and core 1 can access IO_BANK1, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pads_bank0(&self) -> &Reg<PADS_BANK0_SPEC>
pub fn pads_bank0(&self) -> &Reg<PADS_BANK0_SPEC>
0x70 - Control whether debugger, DMA, core 0 and core 1 can access PADS_BANK0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pads_qspi(&self) -> &Reg<PADS_QSPI_SPEC>
pub fn pads_qspi(&self) -> &Reg<PADS_QSPI_SPEC>
0x74 - Control whether debugger, DMA, core 0 and core 1 can access PADS_QSPI, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn busctrl(&self) -> &Reg<BUSCTRL_SPEC>
pub fn busctrl(&self) -> &Reg<BUSCTRL_SPEC>
0x78 - Control whether debugger, DMA, core 0 and core 1 can access BUSCTRL, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn adc0(&self) -> &Reg<ADC0_SPEC>
pub fn adc0(&self) -> &Reg<ADC0_SPEC>
0x7c - Control whether debugger, DMA, core 0 and core 1 can access ADC0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn hstx(&self) -> &Reg<HSTX_SPEC>
pub fn hstx(&self) -> &Reg<HSTX_SPEC>
0x80 - Control whether debugger, DMA, core 0 and core 1 can access HSTX, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn i2c0(&self) -> &Reg<I2C0_SPEC>
pub fn i2c0(&self) -> &Reg<I2C0_SPEC>
0x84 - Control whether debugger, DMA, core 0 and core 1 can access I2C0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn i2c1(&self) -> &Reg<I2C1_SPEC>
pub fn i2c1(&self) -> &Reg<I2C1_SPEC>
0x88 - Control whether debugger, DMA, core 0 and core 1 can access I2C1, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pwm(&self) -> &Reg<PWM_SPEC>
pub fn pwm(&self) -> &Reg<PWM_SPEC>
0x8c - Control whether debugger, DMA, core 0 and core 1 can access PWM, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn spi0(&self) -> &Reg<SPI0_SPEC>
pub fn spi0(&self) -> &Reg<SPI0_SPEC>
0x90 - Control whether debugger, DMA, core 0 and core 1 can access SPI0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn spi1(&self) -> &Reg<SPI1_SPEC>
pub fn spi1(&self) -> &Reg<SPI1_SPEC>
0x94 - Control whether debugger, DMA, core 0 and core 1 can access SPI1, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn timer0(&self) -> &Reg<TIMER0_SPEC>
pub fn timer0(&self) -> &Reg<TIMER0_SPEC>
0x98 - Control whether debugger, DMA, core 0 and core 1 can access TIMER0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn timer1(&self) -> &Reg<TIMER1_SPEC>
pub fn timer1(&self) -> &Reg<TIMER1_SPEC>
0x9c - Control whether debugger, DMA, core 0 and core 1 can access TIMER1, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn uart0(&self) -> &Reg<UART0_SPEC>
pub fn uart0(&self) -> &Reg<UART0_SPEC>
0xa0 - Control whether debugger, DMA, core 0 and core 1 can access UART0, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn uart1(&self) -> &Reg<UART1_SPEC>
pub fn uart1(&self) -> &Reg<UART1_SPEC>
0xa4 - Control whether debugger, DMA, core 0 and core 1 can access UART1, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn otp(&self) -> &Reg<OTP_SPEC>
pub fn otp(&self) -> &Reg<OTP_SPEC>
0xa8 - Control whether debugger, DMA, core 0 and core 1 can access OTP, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn tbman(&self) -> &Reg<TBMAN_SPEC>
pub fn tbman(&self) -> &Reg<TBMAN_SPEC>
0xac - Control whether debugger, DMA, core 0 and core 1 can access TBMAN, and at what security/privilege levels they can do so. Defaults to Secure access from any master. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn powman(&self) -> &Reg<POWMAN_SPEC>
pub fn powman(&self) -> &Reg<POWMAN_SPEC>
0xb0 - Control whether debugger, DMA, core 0 and core 1 can access POWMAN, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn trng(&self) -> &Reg<TRNG_SPEC>
pub fn trng(&self) -> &Reg<TRNG_SPEC>
0xb4 - Control whether debugger, DMA, core 0 and core 1 can access TRNG, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn sha256(&self) -> &Reg<SHA256_SPEC>
pub fn sha256(&self) -> &Reg<SHA256_SPEC>
0xb8 - Control whether debugger, DMA, core 0 and core 1 can access SHA256, and at what security/privilege levels they can do so. Defaults to Secure, Privileged access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn syscfg(&self) -> &Reg<SYSCFG_SPEC>
pub fn syscfg(&self) -> &Reg<SYSCFG_SPEC>
0xbc - Control whether debugger, DMA, core 0 and core 1 can access SYSCFG, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn clocks(&self) -> &Reg<CLOCKS_SPEC>
pub fn clocks(&self) -> &Reg<CLOCKS_SPEC>
0xc0 - Control whether debugger, DMA, core 0 and core 1 can access CLOCKS, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn xosc(&self) -> &Reg<XOSC_SPEC>
pub fn xosc(&self) -> &Reg<XOSC_SPEC>
0xc4 - Control whether debugger, DMA, core 0 and core 1 can access XOSC, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn rosc(&self) -> &Reg<ROSC_SPEC>
pub fn rosc(&self) -> &Reg<ROSC_SPEC>
0xc8 - Control whether debugger, DMA, core 0 and core 1 can access ROSC, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pll_sys(&self) -> &Reg<PLL_SYS_SPEC>
pub fn pll_sys(&self) -> &Reg<PLL_SYS_SPEC>
0xcc - Control whether debugger, DMA, core 0 and core 1 can access PLL_SYS, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn pll_usb(&self) -> &Reg<PLL_USB_SPEC>
pub fn pll_usb(&self) -> &Reg<PLL_USB_SPEC>
0xd0 - Control whether debugger, DMA, core 0 and core 1 can access PLL_USB, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn ticks(&self) -> &Reg<TICKS_SPEC>
pub fn ticks(&self) -> &Reg<TICKS_SPEC>
0xd4 - Control whether debugger, DMA, core 0 and core 1 can access TICKS, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn watchdog(&self) -> &Reg<WATCHDOG_SPEC>
pub fn watchdog(&self) -> &Reg<WATCHDOG_SPEC>
0xd8 - Control whether debugger, DMA, core 0 and core 1 can access WATCHDOG, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn rsm(&self) -> &Reg<RSM_SPEC>
pub fn rsm(&self) -> &Reg<RSM_SPEC>
0xdc - Control whether debugger, DMA, core 0 and core 1 can access RSM, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn xip_ctrl(&self) -> &Reg<XIP_CTRL_SPEC>
pub fn xip_ctrl(&self) -> &Reg<XIP_CTRL_SPEC>
0xe0 - Control whether debugger, DMA, core 0 and core 1 can access XIP_CTRL, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn xip_qmi(&self) -> &Reg<XIP_QMI_SPEC>
pub fn xip_qmi(&self) -> &Reg<XIP_QMI_SPEC>
0xe4 - Control whether debugger, DMA, core 0 and core 1 can access XIP_QMI, and at what security/privilege levels they can do so. Defaults to Secure, Privileged processor or debug access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Sourcepub fn xip_aux(&self) -> &Reg<XIP_AUX_SPEC>
pub fn xip_aux(&self) -> &Reg<XIP_AUX_SPEC>
0xe8 - Control whether debugger, DMA, core 0 and core 1 can access XIP_AUX, and at what security/privilege levels they can do so. Defaults to Secure, Privileged access only. This register is writable only from a Secure, Privileged processor or debugger, with the exception of the NSU bit, which becomes Non-secure-Privileged-writable when the NSP bit is set.
Trait Implementations§
Source§impl Debug for ACCESSCTRL
impl Debug for ACCESSCTRL
Source§impl Deref for ACCESSCTRL
impl Deref for ACCESSCTRL
Source§type Target = RegisterBlock
type Target = RegisterBlock
impl Send for ACCESSCTRL
Auto Trait Implementations§
impl Freeze for ACCESSCTRL
impl RefUnwindSafe for ACCESSCTRL
impl !Sync for ACCESSCTRL
impl Unpin for ACCESSCTRL
impl UnwindSafe for ACCESSCTRL
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<Choices> CoproductSubsetter<CNil, HNil> for Choices
impl<Choices> CoproductSubsetter<CNil, HNil> for Choices
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left is true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self into a Left variant of Either<Self, Self>
if into_left(&self) returns true.
Converts self into a Right variant of Either<Self, Self>
otherwise. Read more