Expand description
Config security level register
Modules§
- The lock bit corresponding to the first slave. It is written by the secure software.
- The lock bit corresponding to the second slave. It is written by the secure software.
- Non-secure supervisor read access control for the first slave
- Non-secure supervisor read access control for the second slave
- Non-secure supervisor write access control for the first slave
- Non-secure supervisor write access control for the second slave
- Non-secure user read access control for the first slave
- Non-secure user read access control for the second slave
- Non-secure user write access control for the first slave
- Non-secure user write access control for the second slave
- Secure supervisor read access control for the first slave
- Secure supervisor read access control for the second slave
- Secure supervisor write access control for the first slave
- Secure supervisor write access control for the second slave
- Secure user read access control for the first slave
- Secure user read access control for the second slave
- Secure user write access control for the first slave
- Secure user write access control for the second slave