<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://switchbrew.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Vale</id>
	<title>Nintendo Switch Brew - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://switchbrew.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Vale"/>
	<link rel="alternate" type="text/html" href="https://switchbrew.org/wiki/Special:Contributions/Vale"/>
	<updated>2026-04-19T12:11:29Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://switchbrew.org/w/index.php?title=TSEC&amp;diff=10700</id>
		<title>TSEC</title>
		<link rel="alternate" type="text/html" href="https://switchbrew.org/w/index.php?title=TSEC&amp;diff=10700"/>
		<updated>2021-02-18T18:29:43Z</updated>

		<summary type="html">&lt;p&gt;Vale: Rename cprecmac occurence to cgfmul&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;TSEC (Tegra Security Co-processor) is a dedicated unit powered by a NVIDIA Falcon microprocessor with crypto extensions.&lt;br /&gt;
&lt;br /&gt;
= Driver =&lt;br /&gt;
A host driver for communicating with the TSEC is mapped to physical address 0x54500000 with a total size of 0x40000 bytes and exposes several registers.&lt;br /&gt;
&lt;br /&gt;
== Registers ==&lt;br /&gt;
The TSEC&#039;s MMIO space is divided as follows:&lt;br /&gt;
* 0x54500000 to 0x54501000: THI (Tegra Host Interface)&lt;br /&gt;
* 0x54501000 to 0x54501400: [[#Falcon|FALCON (Falcon microcontroller)]]&lt;br /&gt;
* 0x54501400 to 0x54501600: [[#SCP|SCP (Secure coprocessor)]]&lt;br /&gt;
* 0x54501600 to 0x54501680: TFBIF (Tegra Framebuffer Interface)&lt;br /&gt;
* 0x54501680 to 0x54501700: CG (Clock Gate)&lt;br /&gt;
* 0x54501700 to 0x54501800: BAR0 (HOST1X device DMA)&lt;br /&gt;
* 0x54501800 to 0x54501900: TEGRA (Miscellaneous interfaces)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Name&lt;br /&gt;
!  Address&lt;br /&gt;
!  Width&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT|TSEC_THI_INCR_SYNCPT]]&lt;br /&gt;
| 0x54500000&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT_CTRL|TSEC_THI_INCR_SYNCPT_CTRL]]&lt;br /&gt;
| 0x54500004&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT_ERR|TSEC_THI_INCR_SYNCPT_ERR]]&lt;br /&gt;
| 0x54500008&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW_INCR_SYNCPT|TSEC_THI_CTXSW_INCR_SYNCPT]]&lt;br /&gt;
| 0x5450000C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW|TSEC_THI_CTXSW]]&lt;br /&gt;
| 0x54500020&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW_NEXT|TSEC_THI_CTXSW_NEXT]]&lt;br /&gt;
| 0x54500024&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONT_SYNCPT_EOF|TSEC_THI_CONT_SYNCPT_EOF]]&lt;br /&gt;
| 0x54500028&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONT_SYNCPT_L1|TSEC_THI_CONT_SYNCPT_L1]]&lt;br /&gt;
| 0x5450002C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_STREAMID0|TSEC_THI_STREAMID0]]&lt;br /&gt;
| 0x54500030&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_STREAMID1|TSEC_THI_STREAMID1]]&lt;br /&gt;
| 0x54500034&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_THI_SEC|TSEC_THI_THI_SEC]]&lt;br /&gt;
| 0x54500038&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_METHOD0|TSEC_THI_METHOD0]]&lt;br /&gt;
| 0x54500040&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_METHOD1|TSEC_THI_METHOD1]]&lt;br /&gt;
| 0x54500044&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONTEXT_SWITCH|TSEC_THI_CONTEXT_SWITCH]]&lt;br /&gt;
| 0x54500060&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INT_STATUS|TSEC_THI_INT_STATUS]]&lt;br /&gt;
| 0x54500078&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INT_MASK|TSEC_THI_INT_MASK]]&lt;br /&gt;
| 0x5450007C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONFIG0|TSEC_THI_CONFIG0]]&lt;br /&gt;
| 0x54500080&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_DBG_MISC|TSEC_THI_DBG_MISC]]&lt;br /&gt;
| 0x54500084&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_SLCG_OVERRIDE_HIGH_A|TSEC_THI_SLCG_OVERRIDE_HIGH_A]]&lt;br /&gt;
| 0x54500088&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_SLCG_OVERRIDE_LOW_A|TSEC_THI_SLCG_OVERRIDE_LOW_A]]&lt;br /&gt;
| 0x5450008C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CLK_OVERRIDE|TSEC_THI_CLK_OVERRIDE]]&lt;br /&gt;
| 0x54500E00&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSSET|TSEC_FALCON_IRQSSET]]&lt;br /&gt;
| 0x54501000&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSCLR|TSEC_FALCON_IRQSCLR]]&lt;br /&gt;
| 0x54501004&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSTAT|TSEC_FALCON_IRQSTAT]]&lt;br /&gt;
| 0x54501008&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMODE|TSEC_FALCON_IRQMODE]]&lt;br /&gt;
| 0x5450100C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMSET|TSEC_FALCON_IRQMSET]]&lt;br /&gt;
| 0x54501010&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMCLR|TSEC_FALCON_IRQMCLR]]&lt;br /&gt;
| 0x54501014&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMASK|TSEC_FALCON_IRQMASK]]&lt;br /&gt;
| 0x54501018&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQDEST|TSEC_FALCON_IRQDEST]]&lt;br /&gt;
| 0x5450101C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRINT|TSEC_FALCON_GPTMRINT]]&lt;br /&gt;
| 0x54501020&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRVAL|TSEC_FALCON_GPTMRVAL]]&lt;br /&gt;
| 0x54501024&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRCTL|TSEC_FALCON_GPTMRCTL]]&lt;br /&gt;
| 0x54501028&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PTIMER0|TSEC_FALCON_PTIMER0]]&lt;br /&gt;
| 0x5450102C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PTIMER1|TSEC_FALCON_PTIMER1]]&lt;br /&gt;
| 0x54501030&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_WDTMRVAL|TSEC_FALCON_WDTMRVAL]]&lt;br /&gt;
| 0x54501034&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_WDTMRCTL|TSEC_FALCON_WDTMRCTL]]&lt;br /&gt;
| 0x54501038&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQDEST2|TSEC_FALCON_IRQDEST2]]&lt;br /&gt;
| 0x5450103C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MAILBOX0|TSEC_FALCON_MAILBOX0]]&lt;br /&gt;
| 0x54501040&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MAILBOX1|TSEC_FALCON_MAILBOX1]]&lt;br /&gt;
| 0x54501044&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ITFEN|TSEC_FALCON_ITFEN]]&lt;br /&gt;
| 0x54501048&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IDLESTATE|TSEC_FALCON_IDLESTATE]]&lt;br /&gt;
| 0x5450104C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CURCTX|TSEC_FALCON_CURCTX]]&lt;br /&gt;
| 0x54501050&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_NXTCTX|TSEC_FALCON_NXTCTX]]&lt;br /&gt;
| 0x54501054&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CTXACK|TSEC_FALCON_CTXACK]]&lt;br /&gt;
| 0x54501058&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_FHSTATE|TSEC_FALCON_FHSTATE]]&lt;br /&gt;
| 0x5450105C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PRIVSTATE|TSEC_FALCON_PRIVSTATE]]&lt;br /&gt;
| 0x54501060&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDDATA|TSEC_FALCON_MTHDDATA]]&lt;br /&gt;
| 0x54501064&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDID|TSEC_FALCON_MTHDID]]&lt;br /&gt;
| 0x54501068&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDWDAT|TSEC_FALCON_MTHDWDAT]]&lt;br /&gt;
| 0x5450106C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDCOUNT|TSEC_FALCON_MTHDCOUNT]]&lt;br /&gt;
| 0x54501070&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDPOP|TSEC_FALCON_MTHDPOP]]&lt;br /&gt;
| 0x54501074&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDRAMSZ|TSEC_FALCON_MTHDRAMSZ]]&lt;br /&gt;
| 0x54501078&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SFTRESET|TSEC_FALCON_SFTRESET]]&lt;br /&gt;
| 0x5450107C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_OS|TSEC_FALCON_OS]]&lt;br /&gt;
| 0x54501080&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RM|TSEC_FALCON_RM]]&lt;br /&gt;
| 0x54501084&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SOFT_PM|TSEC_FALCON_SOFT_PM]]&lt;br /&gt;
| 0x54501088&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SOFT_MODE|TSEC_FALCON_SOFT_MODE]]&lt;br /&gt;
| 0x5450108C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DEBUG1|TSEC_FALCON_DEBUG1]]&lt;br /&gt;
| 0x54501090&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DEBUGINFO|TSEC_FALCON_DEBUGINFO]]&lt;br /&gt;
| 0x54501094&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT1|TSEC_FALCON_IBRKPT1]]&lt;br /&gt;
| 0x54501098&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT2|TSEC_FALCON_IBRKPT2]]&lt;br /&gt;
| 0x5450109C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CGCTL|TSEC_FALCON_CGCTL]]&lt;br /&gt;
| 0x545010A0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ENGCTL|TSEC_FALCON_ENGCTL]]&lt;br /&gt;
| 0x545010A4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PMM|TSEC_FALCON_PMM]]&lt;br /&gt;
| 0x545010A8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ADDR|TSEC_FALCON_ADDR]]&lt;br /&gt;
| 0x545010AC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT3|TSEC_FALCON_IBRKPT3]]&lt;br /&gt;
| 0x545010B0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT4|TSEC_FALCON_IBRKPT4]]&lt;br /&gt;
| 0x545010B4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT5|TSEC_FALCON_IBRKPT5]]&lt;br /&gt;
| 0x545010B8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXCI|TSEC_FALCON_EXCI]]&lt;br /&gt;
| 0x545010D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SVEC_SPR|TSEC_FALCON_SVEC_SPR]]&lt;br /&gt;
| 0x545010D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RSTAT0|TSEC_FALCON_RSTAT0]]&lt;br /&gt;
| 0x545010D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RSTAT3|TSEC_FALCON_RSTAT3]]&lt;br /&gt;
| 0x545010DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_E0&lt;br /&gt;
| 0x545010E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CPUCTL|TSEC_FALCON_CPUCTL]]&lt;br /&gt;
| 0x54501100&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_BOOTVEC|TSEC_FALCON_BOOTVEC]]&lt;br /&gt;
| 0x54501104&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_HWCFG|TSEC_FALCON_HWCFG]]&lt;br /&gt;
| 0x54501108&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMACTL|TSEC_FALCON_DMACTL]]&lt;br /&gt;
| 0x5450110C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFBASE|TSEC_FALCON_DMATRFBASE]]&lt;br /&gt;
| 0x54501110&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFMOFFS|TSEC_FALCON_DMATRFMOFFS]]&lt;br /&gt;
| 0x54501114&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFCMD|TSEC_FALCON_DMATRFCMD]]&lt;br /&gt;
| 0x54501118&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFFBOFFS|TSEC_FALCON_DMATRFFBOFFS]]&lt;br /&gt;
| 0x5450111C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAPOLL_FB|TSEC_FALCON_DMAPOLL_FB]]&lt;br /&gt;
| 0x54501120&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAPOLL_CP|TSEC_FALCON_DMAPOLL_CP]]&lt;br /&gt;
| 0x54501124&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_HWCFG1|TSEC_FALCON_HWCFG1]]&lt;br /&gt;
| 0x5450112C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CPUCTL_ALIAS|TSEC_FALCON_CPUCTL_ALIAS]]&lt;br /&gt;
| 0x54501130&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_STACKCFG|TSEC_FALCON_STACKCFG]]&lt;br /&gt;
| 0x54501138&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]]&lt;br /&gt;
| 0x54501140&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMSTAT|TSEC_FALCON_IMSTAT]]&lt;br /&gt;
| 0x54501144&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_TRACEIDX|TSEC_FALCON_TRACEIDX]]&lt;br /&gt;
| 0x54501148&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_TRACEPC|TSEC_FALCON_TRACEPC]]&lt;br /&gt;
| 0x5450114C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLRNG0|TSEC_FALCON_IMFILLRNG0]]&lt;br /&gt;
| 0x54501150&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLRNG1|TSEC_FALCON_IMFILLRNG1]]&lt;br /&gt;
| 0x54501154&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLCTL|TSEC_FALCON_IMFILLCTL]]&lt;br /&gt;
| 0x54501158&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMCTL_DEBUG|TSEC_FALCON_IMCTL_DEBUG]]&lt;br /&gt;
| 0x5450115C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CMEMBASE|TSEC_FALCON_CMEMBASE]]&lt;br /&gt;
| 0x54501160&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMAPERT|TSEC_FALCON_DMEMAPERT]]&lt;br /&gt;
| 0x54501164&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXTERRADDR|TSEC_FALCON_EXTERRADDR]]&lt;br /&gt;
| 0x54501168&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXTERRSTAT|TSEC_FALCON_EXTERRSTAT]]&lt;br /&gt;
| 0x5450116C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CG2|TSEC_FALCON_CG2]]&lt;br /&gt;
| 0x5450117C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC0]]&lt;br /&gt;
| 0x54501180&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD0]]&lt;br /&gt;
| 0x54501184&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT0]]&lt;br /&gt;
| 0x54501188&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC1]]&lt;br /&gt;
| 0x54501190&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD1]]&lt;br /&gt;
| 0x54501194&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT1]]&lt;br /&gt;
| 0x54501198&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC2]]&lt;br /&gt;
| 0x545011A0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD2]]&lt;br /&gt;
| 0x545011A4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT2]]&lt;br /&gt;
| 0x545011A8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC3]]&lt;br /&gt;
| 0x545011B0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD3]]&lt;br /&gt;
| 0x545011B4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT3]]&lt;br /&gt;
| 0x545011B8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC0]]&lt;br /&gt;
| 0x545011C0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD0]]&lt;br /&gt;
| 0x545011C4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC1]]&lt;br /&gt;
| 0x545011C8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD1]]&lt;br /&gt;
| 0x545011CC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC2]]&lt;br /&gt;
| 0x545011D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD2]]&lt;br /&gt;
| 0x545011D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC3]]&lt;br /&gt;
| 0x545011D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD3]]&lt;br /&gt;
| 0x545011DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC4]]&lt;br /&gt;
| 0x545011E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD4]]&lt;br /&gt;
| 0x545011E4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC5]]&lt;br /&gt;
| 0x545011E8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD5]]&lt;br /&gt;
| 0x545011EC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC6]]&lt;br /&gt;
| 0x545011F0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD6]]&lt;br /&gt;
| 0x545011F4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC7]]&lt;br /&gt;
| 0x545011F8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD7]]&lt;br /&gt;
| 0x545011FC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_CMD|TSEC_FALCON_ICD_CMD]]&lt;br /&gt;
| 0x54501200&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_ADDR|TSEC_FALCON_ICD_ADDR]]&lt;br /&gt;
| 0x54501204&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_WDATA|TSEC_FALCON_ICD_WDATA]]&lt;br /&gt;
| 0x54501208&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_RDATA|TSEC_FALCON_ICD_RDATA]]&lt;br /&gt;
| 0x5450120C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SCTL|TSEC_FALCON_SCTL]]&lt;br /&gt;
| 0x54501240&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SSTAT|TSEC_FALCON_SSTAT]]&lt;br /&gt;
| 0x54501244&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_250&lt;br /&gt;
| 0x54501250&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_260&lt;br /&gt;
| 0x54501260&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_IMEM|TSEC_FALCON_SPROT_IMEM]]&lt;br /&gt;
| 0x54501280&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_DMEM|TSEC_FALCON_SPROT_DMEM]]&lt;br /&gt;
| 0x54501284&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_CPUCTL|TSEC_FALCON_SPROT_CPUCTL]]&lt;br /&gt;
| 0x54501288&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_MISC|TSEC_FALCON_SPROT_MISC]]&lt;br /&gt;
| 0x5450128C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_IRQ|TSEC_FALCON_SPROT_IRQ]]&lt;br /&gt;
| 0x54501290&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_MTHD|TSEC_FALCON_SPROT_MTHD]]&lt;br /&gt;
| 0x54501294&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_SCTL|TSEC_FALCON_SPROT_SCTL]]&lt;br /&gt;
| 0x54501298&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_WDTMR|TSEC_FALCON_SPROT_WDTMR]]&lt;br /&gt;
| 0x5450129C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW|TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW]]&lt;br /&gt;
| 0x545012C0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH|TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH]]&lt;br /&gt;
| 0x545012C4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW|TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW]]&lt;br /&gt;
| 0x545012C8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH|TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH]]&lt;br /&gt;
| 0x545012CC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW|TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW]]&lt;br /&gt;
| 0x545012D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH|TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH]]&lt;br /&gt;
| 0x545012D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW|TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW]]&lt;br /&gt;
| 0x545012D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH|TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH]]&lt;br /&gt;
| 0x545012DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CTL|TSEC_FALCON_DMAINFO_CTL]]&lt;br /&gt;
| 0x545012E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]]&lt;br /&gt;
| 0x54501400&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]]&lt;br /&gt;
| 0x54501404&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_STAT|TSEC_SCP_CTL_STAT]]&lt;br /&gt;
| 0x54501408&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_LOCK|TSEC_SCP_CTL_LOCK]]&lt;br /&gt;
| 0x5450140C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CFG|TSEC_SCP_CFG]]&lt;br /&gt;
| 0x54501410&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_SCP|TSEC_SCP_CTL_SCP]]&lt;br /&gt;
| 0x54501414&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_PKEY|TSEC_SCP_CTL_PKEY]]&lt;br /&gt;
| 0x54501418&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_DBG|TSEC_SCP_CTL_DBG]]&lt;br /&gt;
| 0x5450141C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG0|TSEC_SCP_DBG0]]&lt;br /&gt;
| 0x54501420&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG1|TSEC_SCP_DBG1]]&lt;br /&gt;
| 0x54501424&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG2|TSEC_SCP_DBG2]]&lt;br /&gt;
| 0x54501428&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CMD|TSEC_SCP_CMD]]&lt;br /&gt;
| 0x54501430&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT0|TSEC_SCP_STAT0]]&lt;br /&gt;
| 0x54501450&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT1|TSEC_SCP_STAT1]]&lt;br /&gt;
| 0x54501454&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT2|TSEC_SCP_STAT2]]&lt;br /&gt;
| 0x54501458&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RNG_STAT0|TSEC_SCP_RNG_STAT0]]&lt;br /&gt;
| 0x54501470&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RNG_STAT1|TSEC_SCP_RNG_STAT1]]&lt;br /&gt;
| 0x54501474&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_IRQSTAT|TSEC_SCP_IRQSTAT]]&lt;br /&gt;
| 0x54501480&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_IRQMASK|TSEC_SCP_IRQMASK]]&lt;br /&gt;
| 0x54501484&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_ACL_ERR|TSEC_SCP_ACL_ERR]]&lt;br /&gt;
| 0x54501490&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_SEC_ERR|TSEC_SCP_SEC_ERR]]&lt;br /&gt;
| 0x54501494&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CMD_ERR|TSEC_SCP_CMD_ERR]]&lt;br /&gt;
| 0x54501498&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTL0]]&lt;br /&gt;
| 0x54501500&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RND_CTL1|TSEC_SCP_RND_CTL1]]&lt;br /&gt;
| 0x54501504&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL2&lt;br /&gt;
| 0x54501508&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL3&lt;br /&gt;
| 0x5450150C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL4&lt;br /&gt;
| 0x54501510&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL5&lt;br /&gt;
| 0x54501514&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL6&lt;br /&gt;
| 0x54501518&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL7&lt;br /&gt;
| 0x5450151C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL8&lt;br /&gt;
| 0x54501520&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL9&lt;br /&gt;
| 0x54501524&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL10&lt;br /&gt;
| 0x54501528&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL11&lt;br /&gt;
| 0x5450152C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_CTL|TSEC_TFBIF_CTL]]&lt;br /&gt;
| 0x54501600&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_MCCIF_FIFOCTRL|TSEC_TFBIF_MCCIF_FIFOCTRL]]&lt;br /&gt;
| 0x54501604&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_THROTTLE|TSEC_TFBIF_THROTTLE]]&lt;br /&gt;
| 0x54501608&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_STAT0|TSEC_TFBIF_DBG_STAT0]]&lt;br /&gt;
| 0x5450160C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_STAT1|TSEC_TFBIF_DBG_STAT1]]&lt;br /&gt;
| 0x54501610&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_RDCOUNT_LO|TSEC_TFBIF_DBG_RDCOUNT_LO]]&lt;br /&gt;
| 0x54501614&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_RDCOUNT_HI|TSEC_TFBIF_DBG_RDCOUNT_HI]]&lt;br /&gt;
| 0x54501618&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_WRCOUNT_LO|TSEC_TFBIF_DBG_WRCOUNT_LO]]&lt;br /&gt;
| 0x5450161C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_WRCOUNT_HI|TSEC_TFBIF_DBG_WRCOUNT_HI]]&lt;br /&gt;
| 0x54501620&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R32COUNT|TSEC_TFBIF_DBG_R32COUNT]]&lt;br /&gt;
| 0x54501624&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R64COUNT|TSEC_TFBIF_DBG_R64COUNT]]&lt;br /&gt;
| 0x54501628&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R128COUNT|TSEC_TFBIF_DBG_R128COUNT]]&lt;br /&gt;
| 0x5450162C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TFBIF_UNK_30&lt;br /&gt;
| 0x54501630&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_MCCIF_FIFOCTRL1|TSEC_TFBIF_MCCIF_FIFOCTRL1]]&lt;br /&gt;
| 0x54501634&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_WRR_RDP|TSEC_TFBIF_WRR_RDP]]&lt;br /&gt;
| 0x54501638&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_SPROT_EMEM|TSEC_TFBIF_SPROT_EMEM]]&lt;br /&gt;
| 0x54501640&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_TRANSCFG|TSEC_TFBIF_TRANSCFG]]&lt;br /&gt;
| 0x54501644&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_REGIONCFG|TSEC_TFBIF_REGIONCFG]]&lt;br /&gt;
| 0x54501648&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_MASK|TSEC_TFBIF_ACTMON_ACTIVE_MASK]]&lt;br /&gt;
| 0x5450164C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_BORPS|TSEC_TFBIF_ACTMON_ACTIVE_BORPS]]&lt;br /&gt;
| 0x54501650&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT|TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT]]&lt;br /&gt;
| 0x54501654&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_MASK|TSEC_TFBIF_ACTMON_MCB_MASK]]&lt;br /&gt;
| 0x54501660&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_BORPS|TSEC_TFBIF_ACTMON_MCB_BORPS]]&lt;br /&gt;
| 0x54501664&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_WEIGHT|TSEC_TFBIF_ACTMON_MCB_WEIGHT]]&lt;br /&gt;
| 0x54501668&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_THI_TRANSPROP|TSEC_TFBIF_THI_TRANSPROP]]&lt;br /&gt;
| 0x54501670&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_CG|TSEC_CG]]&lt;br /&gt;
| 0x545016D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_CTL|TSEC_BAR0_CTL]]&lt;br /&gt;
| 0x54501700&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_ADDR|TSEC_BAR0_ADDR]]&lt;br /&gt;
| 0x54501704&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_DATA|TSEC_BAR0_DATA]]&lt;br /&gt;
| 0x54501708&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_TIMEOUT|TSEC_BAR0_TIMEOUT]]&lt;br /&gt;
| 0x5450170C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_00&lt;br /&gt;
| 0x54501800&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_04&lt;br /&gt;
| 0x54501804&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_08&lt;br /&gt;
| 0x54501808&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_0C&lt;br /&gt;
| 0x5450180C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_10&lt;br /&gt;
| 0x54501810&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_14&lt;br /&gt;
| 0x54501814&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_18&lt;br /&gt;
| 0x54501818&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_1C&lt;br /&gt;
| 0x5450181C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_20&lt;br /&gt;
| 0x54501820&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_24&lt;br /&gt;
| 0x54501824&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_28&lt;br /&gt;
| 0x54501828&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_2C&lt;br /&gt;
| 0x5450182C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_30&lt;br /&gt;
| 0x54501830&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_34&lt;br /&gt;
| 0x54501834&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TEGRA_CTL|TSEC_TEGRA_CTL]]&lt;br /&gt;
| 0x54501838&lt;br /&gt;
| 0x04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_INDX&lt;br /&gt;
|-&lt;br /&gt;
| 10-17&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT_CTRL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_0&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_0&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_1&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_1&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_2&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_2&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_3&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_3&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_4&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_IMM&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_OPDONE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_RD_DONE&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_REG_WR_SAFE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_ENGINE_IDLE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW_INCR_SYNCPT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_INCR_SYNCPT_INDX&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_CURR_CLASS&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CTXSW_AUTO_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 11-20&lt;br /&gt;
| TSEC_THI_CTXSW_CURR_CHANNEL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW_NEXT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_NEXT_NEXT_CLASS&lt;br /&gt;
|-&lt;br /&gt;
| 10-19&lt;br /&gt;
| TSEC_THI_CTXSW_NEXT_NEXT_CHANNEL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONT_SYNCPT_EOF ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_EOF_INDEX&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_EOF_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONT_SYNCPT_L1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_L1_INDEX&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_L1_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_STREAMID0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_THI_STREAMID0_ID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_STREAMID1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_THI_STREAMID1_ID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_THI_SEC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_THI_SEC_TZ_LOCK&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_THI_SEC_TZ_AUTH&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_THI_THI_SEC_CH_LOCK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_METHOD0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_THI_METHOD0_OFFSET&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used to encode and send a method&#039;s ID over HOST1X to TSEC. This register mirrors the functionality of HOST1X&#039;s channel opcode submission.&lt;br /&gt;
&lt;br /&gt;
The following methods are available:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  ID&lt;br /&gt;
!  Method&lt;br /&gt;
|-&lt;br /&gt;
| 0x100&lt;br /&gt;
| NOP&lt;br /&gt;
|-&lt;br /&gt;
| 0x140&lt;br /&gt;
| PM_TRIGGER&lt;br /&gt;
|-&lt;br /&gt;
| 0x200&lt;br /&gt;
| SET_APPLICATION_ID&lt;br /&gt;
|-&lt;br /&gt;
| 0x204&lt;br /&gt;
| SET_WATCHDOG_TIMER&lt;br /&gt;
|-&lt;br /&gt;
| 0x240&lt;br /&gt;
| SEMAPHORE_A&lt;br /&gt;
|-&lt;br /&gt;
| 0x244&lt;br /&gt;
| SEMAPHORE_B&lt;br /&gt;
|-&lt;br /&gt;
| 0x248&lt;br /&gt;
| SEMAPHORE_C&lt;br /&gt;
|-&lt;br /&gt;
| 0x24C&lt;br /&gt;
| CTX_SAVE_AREA&lt;br /&gt;
|-&lt;br /&gt;
| 0x250&lt;br /&gt;
| CTX_SWITCH&lt;br /&gt;
|-&lt;br /&gt;
| 0x300&lt;br /&gt;
| EXECUTE&lt;br /&gt;
|-&lt;br /&gt;
| 0x304&lt;br /&gt;
| SEMAPHORE_D&lt;br /&gt;
|-&lt;br /&gt;
| 0x500&lt;br /&gt;
| HDCP_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x504&lt;br /&gt;
| HDCP_CREATE_SESSION&lt;br /&gt;
|-&lt;br /&gt;
| 0x508&lt;br /&gt;
| HDCP_VERIFY_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x50C&lt;br /&gt;
| HDCP_GENERATE_EKM&lt;br /&gt;
|-&lt;br /&gt;
| 0x510&lt;br /&gt;
| HDCP_REVOCATION_CHECK&lt;br /&gt;
|-&lt;br /&gt;
| 0x514&lt;br /&gt;
| HDCP_VERIFY_HPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x518&lt;br /&gt;
| HDCP_ENCRYPT_PAIRING_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x51C&lt;br /&gt;
| HDCP_DECRYPT_PAIRING_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x520&lt;br /&gt;
| HDCP_UPDATE_SESSION&lt;br /&gt;
|-&lt;br /&gt;
| 0x524&lt;br /&gt;
| HDCP_GENERATE_LC_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x528&lt;br /&gt;
| HDCP_VERIFY_LPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x52C&lt;br /&gt;
| HDCP_GENERATE_SKE_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x530&lt;br /&gt;
| HDCP_VERIFY_VPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x534&lt;br /&gt;
| HDCP_ENCRYPTION_RUN_CTRL&lt;br /&gt;
|-&lt;br /&gt;
| 0x538&lt;br /&gt;
| HDCP_SESSION_CTRL&lt;br /&gt;
|-&lt;br /&gt;
| 0x53C&lt;br /&gt;
| HDCP_COMPUTE_SPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x540&lt;br /&gt;
| HDCP_GET_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x544&lt;br /&gt;
| HDCP_EXCHANGE_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x548&lt;br /&gt;
| HDCP_DECRYPT_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x54C&lt;br /&gt;
| HDCP_GET_HPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x550&lt;br /&gt;
| HDCP_GENERATE_EKH_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x554&lt;br /&gt;
| HDCP_VERIFY_RTT_CHALLENGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x558&lt;br /&gt;
| HDCP_GET_LPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x55C&lt;br /&gt;
| HDCP_DECRYPT_KS&lt;br /&gt;
|-&lt;br /&gt;
| 0x560&lt;br /&gt;
| HDCP_DECRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x564&lt;br /&gt;
| HDCP_GET_RRX&lt;br /&gt;
|-&lt;br /&gt;
| 0x568&lt;br /&gt;
| HDCP_DECRYPT_REENCRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x56C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x570&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x574&lt;br /&gt;
| HDCP_DECRYPT_STORED_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x578&lt;br /&gt;
| HDCP_GET_CURRENT_RESOLUTION&lt;br /&gt;
|-&lt;br /&gt;
| 0x57C&lt;br /&gt;
| HDCP_GET_CURRENT_VERSION&lt;br /&gt;
|-&lt;br /&gt;
| 0x700&lt;br /&gt;
| HDCP_VALIDATE_SRM&lt;br /&gt;
|-&lt;br /&gt;
| 0x704&lt;br /&gt;
| HDCP_VALIDATE_STREAM&lt;br /&gt;
|-&lt;br /&gt;
| 0x708&lt;br /&gt;
| HDCP_TEST_SECURE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 0x70C&lt;br /&gt;
| HDCP_SET_DCP_KPUB&lt;br /&gt;
|-&lt;br /&gt;
| 0x710&lt;br /&gt;
| HDCP_SET_RX_KPUB&lt;br /&gt;
|-&lt;br /&gt;
| 0x714&lt;br /&gt;
| HDCP_SET_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x718&lt;br /&gt;
| HDCP_SET_SCRATCH_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x71C&lt;br /&gt;
| HDCP_SET_SRM&lt;br /&gt;
|-&lt;br /&gt;
| 0x720&lt;br /&gt;
| HDCP_SET_RECEIVER_ID_LIST&lt;br /&gt;
|-&lt;br /&gt;
| 0x724&lt;br /&gt;
| HDCP_SET_SPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x728&lt;br /&gt;
| HDCP_SET_ENC_INPUT_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x72C&lt;br /&gt;
| HDCP_SET_ENC_OUTPUT_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x730&lt;br /&gt;
| HDCP_GET_RTT_CHALLENGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x734&lt;br /&gt;
| HDCP_STREAM_MANAGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x738&lt;br /&gt;
| HDCP_READ_CAPS&lt;br /&gt;
|-&lt;br /&gt;
| 0x73C&lt;br /&gt;
| HDCP_ENCRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x740&lt;br /&gt;
| [6.0.0+] HDCP_GET_CURRENT_NONCE&lt;br /&gt;
|-&lt;br /&gt;
| 0x1114&lt;br /&gt;
| PM_TRIGGER_END&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_METHOD1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_METHOD1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used to encode and send a method&#039;s data over HOST1X to TSEC. This register mirrors the functionality of HOST1X&#039;s channel opcode submission.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONTEXT_SWITCH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_THI_CONTEXT_SWITCH_PTR&lt;br /&gt;
|-&lt;br /&gt;
| 30-31&lt;br /&gt;
| TSEC_THI_CONTEXT_SWITCH_TARGET&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INT_STATUS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INT_STATUS_FALCON_INT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INT_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INT_MASK_FALCON_INT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONFIG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_CONFIG0_RETURN_SYNCPT_ON_ERR&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_CONFIG0_IDLE_SYNCPT_INC_ENG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_DBG_MISC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_DBG_MISC_CLIENT_IDLE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_IDLE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_SYNCPT_PENDING_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_IDLE_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_SLCG_OVERRIDE_HIGH_A ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_THI_SLCG_OVERRIDE_HIGH_A_REG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_SLCG_OVERRIDE_LOW_A ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_SLCG_OVERRIDE_LOW_A_REG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CLK_OVERRIDE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_CLK_OVERRIDE_CYA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSSET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSSET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSSET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSSET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSSET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSSET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSSET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSSET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSSET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSSET_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSSET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for setting Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSCLR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for clearing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the status of Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMODE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for changing the mode Falcon&#039;s IRQs. A value of 1 means level triggered while a value of 0 means edge triggered.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMSET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMSET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMSET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMSET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMSET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMSET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMSET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMSET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMSET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMSET_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMSET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for setting the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMCLR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for clearing the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMASK_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMASK_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMASK_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMASK_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMASK_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMASK_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMASK_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMASK_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMASK_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMASK_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the value of the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQDEST ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_EXT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for routing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRINT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_GPTMRINT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRVAL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_GPTMRVAL_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_GPTMRCTL_GPTMREN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PTIMER0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_PTIMER0_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PTIMER1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_PTIMER1_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_WDTMRVAL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_WDTMRVAL_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_WDTMRCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_WDTMRCTL_WDTMREN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQDEST2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQDEST2_HOST_DMA&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQDEST2_TARGET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for routing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MAILBOX0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MAILBOX0_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Scratch register for reading/writing data to Falcon.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MAILBOX1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MAILBOX1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Scratch register for reading/writing data to Falcon.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ITFEN ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_ITFEN_CTXEN&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_ITFEN_MTHDEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for enabling/disabling Falcon interfaces.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IDLESTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IDLESTATE_FALCON_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 1-15&lt;br /&gt;
| TSEC_FALCON_IDLESTATE_EXT_BUSY&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for detecting if Falcon is busy or not.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CURCTX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXPTR&lt;br /&gt;
|-&lt;br /&gt;
| 28-29&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXTGT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_NXTCTX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXPTR&lt;br /&gt;
|-&lt;br /&gt;
| 28-29&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXTGT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CTXACK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CTXACK_SAVE_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CTXACK_REST_ACK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_FHSTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_FHSTATE_FALCON_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 1-15&lt;br /&gt;
| TSEC_FALCON_FHSTATE_EXT_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_FHSTATE_ENGINE_FAULTED&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_FHSTATE_STALL_REQ&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PRIVSTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_PRIVSTATE_PRIV&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MTHDDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDID ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_FALCON_MTHDID_ID&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_FALCON_MTHDID_SUBCH&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_MTHDID_PRIV&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_MTHDID_WPEND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDWDAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MTHDWDAT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDCOUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_MTHDCOUNT_COUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDPOP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_MTHDPOP_POP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDRAMSZ ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_MTHDRAMSZ_RAMSZ&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SFTRESET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_SFTRESET_EXT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_OS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_OS_VERSION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_RM_CONFIG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SOFT_PM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_PROBE&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_TRIGGER_END&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_TRIGGER_START&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SOFT_MODE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_SOFT_MODE_PROBE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DEBUG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_DEBUG1_MTHD_DRAIN_TIME&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_DEBUG1_CTXSW_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_DEBUG1_TRACE_FORMAT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DEBUGINFO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DEBUGINFO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for UCODE self revocation. This register takes the base address of the GSC carveout shifted right by 8.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] [[NV_services|nvservices]] sets this to 0x8005FF00 &amp;gt;&amp;gt; 8 (physical DRAM address inside the GPU UCODE carveout) before starting the nvhost_tsec firmware.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CGCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CGCTL_CG_OVERRIDE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ENGCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_ENGCTL_INV_CONTEXT&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_ENGCTL_SET_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_ENGCTL_CLR_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_ENGCTL_SWITCH_CONTEXT&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_FALCON_ENGCTL_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_FALCON_ENGCTL_STALLACK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PMM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_STALL_SEL&lt;br /&gt;
 0x00: ANY&lt;br /&gt;
 0x01: CODE&lt;br /&gt;
 0x02: DMAQ&lt;br /&gt;
 0x03: DMFENCE&lt;br /&gt;
 0x04: DMWAIT&lt;br /&gt;
 0x05: IMWAIT&lt;br /&gt;
 0x06: IPND&lt;br /&gt;
 0x07: LDSTQ&lt;br /&gt;
 0x08: SB&lt;br /&gt;
 0x09: ANY_SC&lt;br /&gt;
 0x0A: CODE_SC&lt;br /&gt;
 0x0B: DMAQ_SC&lt;br /&gt;
 0x0C: DMFENCE_SC&lt;br /&gt;
 0x0D: DMWAIT_SC&lt;br /&gt;
 0x0E: IMWAIT_SC&lt;br /&gt;
 0x0F: IPND_SC&lt;br /&gt;
 0x10: LDSTQ_SC&lt;br /&gt;
 0x11: SB_SC&lt;br /&gt;
|-&lt;br /&gt;
| 5-7&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_IDLE_SEL&lt;br /&gt;
 0x00: WAITING&lt;br /&gt;
 0x01: ENG_IDLE&lt;br /&gt;
 0x02: MTHD_FULL&lt;br /&gt;
 0x03: WAITING_SC&lt;br /&gt;
 0x04: ENG_IDLE_SC&lt;br /&gt;
 0x05: MTHD_FULL_SC&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_SOFTPM0_SEL&lt;br /&gt;
 0x00: 0&lt;br /&gt;
 0x01: 1&lt;br /&gt;
 0x02: 2&lt;br /&gt;
 0x03: 3&lt;br /&gt;
 0x04: 4&lt;br /&gt;
 0x05: 5&lt;br /&gt;
 0x06: 0_SC&lt;br /&gt;
 0x07: 1_SC&lt;br /&gt;
 0x08: 2_SC&lt;br /&gt;
 0x09: 3_SC&lt;br /&gt;
 0x0A: 4_SC&lt;br /&gt;
 0x0B: 5_SC&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_SOFTPM1_SEL&lt;br /&gt;
 0x00: 0&lt;br /&gt;
|-&lt;br /&gt;
| 17-19&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_DSTAT_SEL&lt;br /&gt;
 0x00: 1KTRANSFER&lt;br /&gt;
 0x01: RREQ&lt;br /&gt;
 0x02: WREQ&lt;br /&gt;
 0x03: TWREQ&lt;br /&gt;
 0x04: 1KTRANSFER_SC&lt;br /&gt;
 0x05: RREQ_SC&lt;br /&gt;
 0x06: WREQ_SC&lt;br /&gt;
 0x07: TWREQ_SC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL0_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
 0x01: RACKQ_FULL&lt;br /&gt;
 0x02: WREQQ_FULL&lt;br /&gt;
 0x03: WDATQ_FULL&lt;br /&gt;
 0x04: WACKQ_FULL&lt;br /&gt;
 0x05: MREQQ_FULL&lt;br /&gt;
 0x06: RREQ_PEND&lt;br /&gt;
 0x07: WREQ_PEND&lt;br /&gt;
 0x08: RDATQ_FULL_SC&lt;br /&gt;
 0x09: RACKQ_FULL_SC&lt;br /&gt;
 0x0A: WREQQ_FULL_SC&lt;br /&gt;
 0x0B: WDATQ_FULL_SC&lt;br /&gt;
 0x0C: WACKQ_FULL_SC&lt;br /&gt;
 0x0D: MREQQ_FULL_SC&lt;br /&gt;
 0x0E: RREQ_PEND_SC&lt;br /&gt;
 0x0F: WREQ_PEND_SC&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL1_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL2_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_ADDR_LSB&lt;br /&gt;
|-&lt;br /&gt;
| 6-11&lt;br /&gt;
| TSEC_FALCON_ADDR_MSB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT3 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT4 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT5 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXCI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-19&lt;br /&gt;
| TSEC_FALCON_EXCI_EXPC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| TSEC_FALCON_EXCI_EXCAUSE&lt;br /&gt;
 0x00: TRAP0&lt;br /&gt;
 0x01: TRAP1&lt;br /&gt;
 0x02: TRAP2&lt;br /&gt;
 0x03: TRAP3&lt;br /&gt;
 0x08: ILL_INS (invalid opcode)&lt;br /&gt;
 0x09: INV_INS (authentication entry)&lt;br /&gt;
 0x0A: MISS_INS (page miss)&lt;br /&gt;
 0x0B: DHIT_INS (page multiple hit)&lt;br /&gt;
 0x0F: BRKPT_INS (breakpoint hit)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information about raised exceptions.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SVEC_SPR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_FALCON_SVEC_SPR_SIGPASS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RSTAT0 ===&lt;br /&gt;
Mirror of the [[#TSEC_FALCON_ICD_RDATA|ICD status register 0]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RSTAT3 ===&lt;br /&gt;
Mirror of the [[#TSEC_FALCON_ICD_RDATA|ICD status register 3]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CPUCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CPUCTL_IINVAL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CPUCTL_STARTCPU&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_CPUCTL_SRESET&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_CPUCTL_HRESET&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_CPUCTL_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_CPUCTL_STOPPED&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_CPUCTL_ALIAS_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for signaling the Falcon CPU.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_BOOTVEC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_BOOTVEC_VEC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the Falcon&#039;s boot vector address.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_HWCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-8&lt;br /&gt;
| TSEC_FALCON_HWCFG_IMEM_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 9-17&lt;br /&gt;
| TSEC_FALCON_HWCFG_DMEM_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 18-26&lt;br /&gt;
| TSEC_FALCON_HWCFG_METHODFIFO_DEPTH&lt;br /&gt;
|-&lt;br /&gt;
| 27-31&lt;br /&gt;
| TSEC_FALCON_HWCFG_DMAQUEUE_DEPTH&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMACTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMACTL_REQUIRE_CTX&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMACTL_DMEM_SCRUBBING&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_DMACTL_IMEM_SCRUBBING&lt;br /&gt;
|-&lt;br /&gt;
| 3-6&lt;br /&gt;
| TSEC_FALCON_DMACTL_DMAQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_DMACTL_SECURE_STAT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring the Falcon&#039;s DMA engine.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFBASE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMATRFBASE_BASE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Base address of the external memory buffer, shifted right by 8.&lt;br /&gt;
&lt;br /&gt;
The current transfer address is calculated by adding [[#TSEC_FALCON_DMATRFFBOFFS|TSEC_FALCON_DMATRFFBOFFS]] to the base.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFMOFFS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_DMATRFMOFFS_OFFS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For transfers to DMEM: the destination address.&lt;br /&gt;
For transfers to IMEM: the destination virtual IMEM page.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFCMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_FULL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 2-3&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_SEC&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_IMEM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_WRITE&lt;br /&gt;
|-&lt;br /&gt;
| 8-10&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_CTXDMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring DMA transfers.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFFBOFFS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMATRFFBOFFS_OFFS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For transfers to IMEM: the destination physical IMEM page.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAPOLL_FB ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_FENCE_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_DMA_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_CFG_R_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_CFG_W_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_WCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_RCOUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of a DMA transfer between the Falcon and external memory.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAPOLL_CP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_FENCE_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_DMA_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_CFG_R_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_CFG_W_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_WCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_RCOUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of a DMA transfer between the Falcon and the SCP.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_HWCFG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CORE_REV&lt;br /&gt;
|-&lt;br /&gt;
| 4-5&lt;br /&gt;
| TSEC_FALCON_HWCFG1_SECURITY_MODEL&lt;br /&gt;
|-&lt;br /&gt;
| 6-7&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CORE_REV_SUBVERSION&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_HWCFG1_IMEM_PORTS&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DMEM_PORTS&lt;br /&gt;
|-&lt;br /&gt;
| 16-20&lt;br /&gt;
| TSEC_FALCON_HWCFG1_TAG_WIDTH&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DBG_PRIV_BUS&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CSB_SIZE_16M&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_HWCFG1_PRIV_DIRECT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DMEM_APERTURES&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_HWCFG1_IMEM_AUTOFILL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CPUCTL_ALIAS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CPUCTL_ALIAS_STARTCPU&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_STACKCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_STACKCFG_BOTTOM&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_STACKCFG_SPEXC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IMCTL_ADDR_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_FALCON_IMCTL_CMD&lt;br /&gt;
 0x00: NOP&lt;br /&gt;
 0x01: IMINV (ITLB)&lt;br /&gt;
 0x02: IMBLK (PTLB)&lt;br /&gt;
 0x03: IMTAG (VTLB)&lt;br /&gt;
 0x04: IMTAG_SETVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the Falcon TLB.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_IMSTAT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the result of the last command from [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_TRACEIDX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_MAXIDX&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_CNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the index for tracing with [[#TSEC_FALCON_TRACEPC|TSEC_FALCON_TRACEPC]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_TRACEPC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_TRACEPC_PC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the PC of the last call or branch executed.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLRNG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG0_TAG_LO&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG0_TAG_HI&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLRNG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG1_TAG_LO&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG1_TAG_HI&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_IMFILLCTL_NBLOCKS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMCTL_DEBUG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IMCTL_DEBUG_ADDR_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_FALCON_IMCTL_DEBUG_CMD&lt;br /&gt;
 0x00: NOP&lt;br /&gt;
 0x02: IMBLK&lt;br /&gt;
 0x03: IMTAG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CMEMBASE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 18-31&lt;br /&gt;
| TSEC_FALCON_CMEMBASE_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMAPERT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_TIME_OUT&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_TIME_UNIT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 17-19&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_LDSTQ_NUM&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXTERRADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_EXTERRADDR_ADDR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXTERRSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_PC&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_STAT&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_VALID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CG2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_DMA&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_GC6_SR_FSM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_PIPE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_DIV&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_ICD&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_CFG&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_PMB&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_RF&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_MUL&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_LDST&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_TSYNC&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_IRQSTAT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_TOP&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FBIF&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 2-7&lt;br /&gt;
| TSEC_FALCON_IMEMC_OFFS&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IMEMC_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_FALCON_IMEMC_AINCW&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_FALCON_IMEMC_AINCR&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_FALCON_IMEMC_SECURE&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_ATOMIC&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_WR_VIO&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_LOCK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring access to Falcon&#039;s IMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_IMEMD_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the value for an IMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMEMT_TAG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the virtual page index for an IMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 2-7&lt;br /&gt;
| TSEC_FALCON_DMEMC_OFFS&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_DMEMC_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_FALCON_DMEMC_AINCW&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_FALCON_DMEMC_AINCR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring access to Falcon&#039;s DMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMEMD_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the value for a DMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_CMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_OPC&lt;br /&gt;
 0x00: STOP&lt;br /&gt;
 0x01: RUN (run from PC)&lt;br /&gt;
 0x02: JRUN (run from address)&lt;br /&gt;
 0x03: RUNB (run from PC)&lt;br /&gt;
 0x04: JRUNB (run from address)&lt;br /&gt;
 0x05: STEP (step from PC)&lt;br /&gt;
 0x06: JSTEP (step from address)&lt;br /&gt;
 0x07: EMASK (set exception mask)&lt;br /&gt;
 0x08: RREG (read register)&lt;br /&gt;
 0x09: WREG (write register)&lt;br /&gt;
 0x0A: RDM (read data memory)&lt;br /&gt;
 0x0B: WDM (write data memory)&lt;br /&gt;
 0x0C: RCM (read MMIO/configuration memory)&lt;br /&gt;
 0x0D: WCM (write MMIO/configuration memory)&lt;br /&gt;
 0x0E: RSTAT (read status)&lt;br /&gt;
 0x0F: SBU (store buffer update)&lt;br /&gt;
|-&lt;br /&gt;
| 6-7&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_SZ&lt;br /&gt;
 0x00: B (byte)&lt;br /&gt;
 0x01: HW (half word)&lt;br /&gt;
 0x02: W (word)&lt;br /&gt;
|-&lt;br /&gt;
| 8-12&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_IDX&lt;br /&gt;
 0x00: REG0 | RSTAT0 | WB0&lt;br /&gt;
 0x01: REG1 | RSTAT1 | WB1&lt;br /&gt;
 0x02: REG2 | RSTAT2 | WB2&lt;br /&gt;
 0x03: REG3 | RSTAT3 | WB3&lt;br /&gt;
 0x04: REG4 | RSTAT4&lt;br /&gt;
 0x05: REG5 | RSTAT5&lt;br /&gt;
 0x06: REG6&lt;br /&gt;
 0x07: REG7&lt;br /&gt;
 0x08: REG8&lt;br /&gt;
 0x09: REG9&lt;br /&gt;
 0x0A: REG10&lt;br /&gt;
 0x0B: REG11&lt;br /&gt;
 0x0C: REG12&lt;br /&gt;
 0x0D: REG13&lt;br /&gt;
 0x0E: REG14&lt;br /&gt;
 0x0F: REG15&lt;br /&gt;
 0x10: IV0&lt;br /&gt;
 0x11: IV1&lt;br /&gt;
 0x12: UNDEFINED&lt;br /&gt;
 0x13: EV&lt;br /&gt;
 0x14: SP&lt;br /&gt;
 0x15: PC&lt;br /&gt;
 0x16: IMB&lt;br /&gt;
 0x17: DMB&lt;br /&gt;
 0x18: CSW&lt;br /&gt;
 0x19: CCR&lt;br /&gt;
 0x1A: SEC&lt;br /&gt;
 0x1B: CTX&lt;br /&gt;
 0x1C: EXCI&lt;br /&gt;
 0x1D: SEC1&lt;br /&gt;
 0x1E: IMB1&lt;br /&gt;
 0x1F: DMB1&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_ERROR&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_RDVLD&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_PARM&lt;br /&gt;
 0x0001: EMASK_TRAP0&lt;br /&gt;
 0x0002: EMASK_TRAP1&lt;br /&gt;
 0x0004: EMASK_TRAP2&lt;br /&gt;
 0x0008: EMASK_TRAP3&lt;br /&gt;
 0x0010: EMASK_EXC_UNIMP&lt;br /&gt;
 0x0020: EMASK_EXC_IMISS&lt;br /&gt;
 0x0040: EMASK_EXC_IMHIT&lt;br /&gt;
 0x0080: EMASK_EXC_IBREAK&lt;br /&gt;
 0x0100: EMASK_IV0&lt;br /&gt;
 0x0200: EMASK_IV1&lt;br /&gt;
 0x0400: EMASK_IV2&lt;br /&gt;
 0x0800: EMASK_EXT0&lt;br /&gt;
 0x1000: EMASK_EXT1&lt;br /&gt;
 0x2000: EMASK_EXT2&lt;br /&gt;
 0x4000: EMASK_EXT3&lt;br /&gt;
 0x8000: EMASK_EXT4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for sending commands to the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_ADDR_ADDR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the target address for the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_WDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_WDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the data for writing using the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_RDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_RDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the data read using the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
When reading from an internal status register (STAT), the following applies:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| RSTAT0_MEM_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| RSTAT0_DMA_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| RSTAT0_FENCE_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| RSTAT0_DIV_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT0_DMA_STALL_DMAQ&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| RSTAT0_DMA_STALL_DMWAITING&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| RSTAT0_DMA_STALL_IMWAITING&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| RSTAT0_ANY_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| RSTAT0_SBFULL_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| RSTAT0_SBHIT_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| RSTAT0_FLOW_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| RSTAT0_SP_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| RSTAT0_BL_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| RSTAT0_IPND_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| RSTAT0_LDSTQ_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| RSTAT0_NOINSTR_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT0_HALTSTOP_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT0_AFILL_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT0_EXC_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 23-25&lt;br /&gt;
| RSTAT0_IRQ_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| RSTAT0_VALIDRD&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| RSTAT0_WAITING&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| RSTAT0_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| RSTAT0_MTHD_FULL&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| RSTAT1_WB_ALLOC&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| RSTAT1_WB_VALID&lt;br /&gt;
|-&lt;br /&gt;
| 8-9&lt;br /&gt;
| RSTAT1_WB0_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 10-11&lt;br /&gt;
| RSTAT1_WB1_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| RSTAT1_WB2_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 14-15&lt;br /&gt;
| RSTAT1_WB3_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 16-19&lt;br /&gt;
| RSTAT1_WB0_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| RSTAT1_WB1_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| RSTAT1_WB2_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| RSTAT1_WB3_IDX&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| RSTAT2_DMAQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT2_DMA_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 5-7&lt;br /&gt;
| RSTAT2_LDSTQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 16-19&lt;br /&gt;
| RSTAT2_EM_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| RSTAT2_EM_ACKED&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| RSTAT2_EM_ISWR&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| RSTAT2_EM_DVLD&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| RSTAT3_MTHD_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| RSTAT3_CTXSW_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| RSTAT3_DMA_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| RSTAT3_SCP_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT3_LDST_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| RSTAT3_SBWB_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 6-8&lt;br /&gt;
| RSTAT3_CSWIE&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| RSTAT3_CSWE&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| RSTAT3_CTXSW_STATE&lt;br /&gt;
 0x00: IDLE&lt;br /&gt;
 0x01: SM_CHECK&lt;br /&gt;
 0x02: SM_SAVE&lt;br /&gt;
 0x03: SM_SAVE_WAIT&lt;br /&gt;
 0x04: SM_BLK_BIND&lt;br /&gt;
 0x05: SM_RESET&lt;br /&gt;
 0x06: SM_RESETWAIT&lt;br /&gt;
 0x07: SM_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| RSTAT3_CTXSW_PEND&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| RSTAT3_DMA_FBREQ_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| RSTAT3_DMA_ACKQ_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| RSTAT3_DMA_RDQ_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT3_DMA_WR_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT3_DMA_RD_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT3_LDST_XT_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| RSTAT3_LDST_XT_BLOCK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| RSTAT3_ENG_IDLE&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| RSTAT4_ICD_STATE&lt;br /&gt;
 0x00: NORMAL&lt;br /&gt;
 0x01: WAIT_ISSUE_CLEAR&lt;br /&gt;
 0x02: WAIT_EXLDQ_CLEAR&lt;br /&gt;
 0x03: FULL_DBG_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 2-3&lt;br /&gt;
| RSTAT4_ICD_MODE&lt;br /&gt;
 0x00: SUPPRESSICD&lt;br /&gt;
 0x01: ENTERICD_IBRK&lt;br /&gt;
 0x02: ENTERICD_STEP&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP0&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP1&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP2&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP3&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_UNIMP&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IMISS&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IMHIT&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IBREAK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV0&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV1&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV2&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT0&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT1&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT2&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT3&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT4&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| RSTAT5_LRU_STATE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_SCTL_LSMODE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_SCTL_HSMODE&lt;br /&gt;
|-&lt;br /&gt;
| 4-5&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| Initialize the transition to LS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| Set on memory protection violation&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_IMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to Falcon IMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_DMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to Falcon DMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_CPUCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the [[#TSEC_FALCON_CPUCTL|TSEC_FALCON_CPUCTL]] register.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_MISC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_PRIVSTATE|TSEC_FALCON_PRIVSTATE]]&lt;br /&gt;
* [[#TSEC_FALCON_SFTRESET|TSEC_FALCON_SFTRESET]]&lt;br /&gt;
* [[#TSEC_FALCON_ADDR|TSEC_FALCON_ADDR]]&lt;br /&gt;
* [[#TSEC_FALCON_DMACTL|TSEC_FALCON_DMACTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IMSTAT|TSEC_FALCON_IMSTAT]]&lt;br /&gt;
* TSEC_FALCON_UNK_250&lt;br /&gt;
* [[#TSEC_FALCON_DMAINFO_CTL|TSEC_FALCON_DMAINFO_CTL]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_IRQ ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_IRQMODE|TSEC_FALCON_IRQMODE]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQMSET|TSEC_FALCON_IRQMSET]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQMCLR|TSEC_FALCON_IRQMCLR]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQDEST|TSEC_FALCON_IRQDEST]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRINT|TSEC_FALCON_GPTMRINT]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRVAL|TSEC_FALCON_GPTMRVAL]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRCTL|TSEC_FALCON_GPTMRCTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQDEST2|TSEC_FALCON_IRQDEST2]]&lt;br /&gt;
* TSEC_FALCON_UNK_E0&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_MTHD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_ITFEN|TSEC_FALCON_ITFEN]]&lt;br /&gt;
* [[#TSEC_FALCON_CURCTX|TSEC_FALCON_CURCTX]]&lt;br /&gt;
* [[#TSEC_FALCON_NXTCTX|TSEC_FALCON_NXTCTX]]&lt;br /&gt;
* [[#TSEC_FALCON_CTXACK|TSEC_FALCON_CTXACK]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDDATA|TSEC_FALCON_MTHDDATA]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDID|TSEC_FALCON_MTHDID]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDWDAT|TSEC_FALCON_MTHDWDAT]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDCOUNT|TSEC_FALCON_MTHDCOUNT]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDPOP|TSEC_FALCON_MTHDPOP]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDRAMSZ|TSEC_FALCON_MTHDRAMSZ]]&lt;br /&gt;
* [[#TSEC_FALCON_DEBUG1|TSEC_FALCON_DEBUG1]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_SCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the [[#TSEC_FALCON_SCTL|TSEC_FALCON_SCTL]] register.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_WDTMR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_WDTMRVAL|TSEC_FALCON_WDTMRVAL]]&lt;br /&gt;
* [[#TSEC_FALCON_WDTMRCTL|TSEC_FALCON_WDTMRCTL]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CTL_CLR_FBRD&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CTL_CLR_FBWR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| Enable the [[#LOAD|LOAD]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Enable the [[#STORE|STORE]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| Enable the [[#CMD|CMD]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Enable the [[#SEQ|SEQ]] block&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Enable the [[#CTL|CTL]] block&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Clear [[#SEQ|SEQ]] block&#039;s pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Clear the main [[#SCP|SCP]] pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| Enable [[#RNG|RNG]] block&#039;s test mode&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Enable the [[#RNG|RNG]] block&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Enable [[#LOAD|LOAD]] block&#039;s interface dummy mode (all reads return 0)&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Enable [[#LOAD|LOAD]] block&#039;s interface bypassing (all reads are dropped)&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Enable [[#STORE|STORE]] block&#039;s interface bypassing (all writes are dropped)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_STAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_SCP_CTL_STAT_DEBUG_MODE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_LOCK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Enable lockdown mode (locks IMEM and DMEM)&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Lock the [[#SCP|SCP]]&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls lockdown mode and can only be cleared in Heavy Secure mode.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#AES|AES]] block&#039;s endianness&lt;br /&gt;
 0: Little&lt;br /&gt;
 1: Big&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Flush [[#CMD|CMD]] block&#039;s pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| Carry chain size&lt;br /&gt;
 0: 32 bits&lt;br /&gt;
 1: 64 bits&lt;br /&gt;
 2: 96 bits&lt;br /&gt;
 3: 128 bits&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| Timeout value&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_SCP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Swap [[#SCP|SCP]] master&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Current [[#SCP|SCP]] master&lt;br /&gt;
 0: Falcon&lt;br /&gt;
 1: External&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_PKEY ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_SCP_CTL_PKEY_REQUEST_RELOAD&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_SCP_CTL_PKEY_LOADED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_DBG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Index&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Auto-increment&lt;br /&gt;
|-&lt;br /&gt;
| 5-6&lt;br /&gt;
| Target&lt;br /&gt;
 0: None&lt;br /&gt;
 1: STORE&lt;br /&gt;
 2: LOAD&lt;br /&gt;
 3: SEQ&lt;br /&gt;
|-&lt;br /&gt;
| 8-12&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current sequence size&lt;br /&gt;
|-&lt;br /&gt;
| 13-16&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction address&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction is valid&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| [[#SEQ|SEQ]] block is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 19-22&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s pipeline size&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s current operation is valid&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#LOAD|LOAD]] block is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 25-26&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s pipeline size&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s current operation is valid&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| [[#STORE|STORE]] block is running in HS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for debugging the [[#LOAD|LOAD]], [[#STORE|STORE]] and [[#SEQ|SEQ]] blocks.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s first operand&lt;br /&gt;
|-&lt;br /&gt;
| 4-9&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s second operand&lt;br /&gt;
|-&lt;br /&gt;
| 10-14&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s opcode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for retrieving debug data. Contains information on the last crypto sequence created when debugging the SEQ controller.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s state&lt;br /&gt;
 0: Idle&lt;br /&gt;
 1: Recording is active (cs0begin/cs1begin)&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Number of [[#SEQ|SEQ]] block&#039;s instructions left&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| Active crypto key register&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for retrieving additional debug data associated with the [[#SEQ|SEQ]] block.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Destination register&lt;br /&gt;
|-&lt;br /&gt;
| 8-13&lt;br /&gt;
| Source register or immediate value&lt;br /&gt;
|-&lt;br /&gt;
| 20-24&lt;br /&gt;
| Command opcode&lt;br /&gt;
 0x0:  nop (fuc5 opcode 0x00) &lt;br /&gt;
 0x1:  cmov (fuc5 opcode 0x84)&lt;br /&gt;
 0x2:  cxsin (fuc5 opcode 0x88) or xdst (with cxset)&lt;br /&gt;
 0x3:  cxsout (fuc5 opcode 0x8C) or xdld (with cxset) &lt;br /&gt;
 0x4:  crnd (fuc5 opcode 0x90)&lt;br /&gt;
 0x5:  cs0begin (fuc5 opcode 0x94)&lt;br /&gt;
 0x6:  cs0exec (fuc5 opcode 0x98)&lt;br /&gt;
 0x7:  cs1begin (fuc5 opcode 0x9C)&lt;br /&gt;
 0x8:  cs1exec (fuc5 opcode 0xA0)&lt;br /&gt;
 0x9:  invalid (fuc5 opcode 0xA4)&lt;br /&gt;
 0xA:  cchmod (fuc5 opcode 0xA8)&lt;br /&gt;
 0xB:  cxor (fuc5 opcode 0xAC)&lt;br /&gt;
 0xC:  cadd (fuc5 opcode 0xB0)&lt;br /&gt;
 0xD:  cand (fuc5 opcode 0xB4)&lt;br /&gt;
 0xE:  crev (fuc5 opcode 0xB8)&lt;br /&gt;
 0xF:  cgfmul (fuc5 opcode 0xBC)&lt;br /&gt;
 0x10: csecret (fuc5 opcode 0xC0)&lt;br /&gt;
 0x11: ckeyreg (fuc5 opcode 0xC4)&lt;br /&gt;
 0x12: ckexp (fuc5 opcode 0xC8)&lt;br /&gt;
 0x13: ckrexp (fuc5 opcode 0xCC)&lt;br /&gt;
 0x14: cenc (fuc5 opcode 0xD0)&lt;br /&gt;
 0x15: cdec (fuc5 opcode 0xD4)&lt;br /&gt;
 0x16: csigcmp (fuc5 opcode 0xD8)&lt;br /&gt;
 0x17: csigenc (fuc5 opcode 0xDC)&lt;br /&gt;
 0x18: csigclr (fuc5 opcode 0xE0)&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s current instruction is valid&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| [[#CMD|CMD]] block is running in HS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on the last crypto command executed.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#SCP|SCP]] is active&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| [[#SEQ|SEQ]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#CTL|CTL]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| [[#AES|AES]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#RNG|RNG]] block is active&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of the hardware blocks and interfaces.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| Signature comparison result&lt;br /&gt;
 0: None&lt;br /&gt;
 1: Running&lt;br /&gt;
 2: Failed&lt;br /&gt;
 3: Succeeded&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface received a valid operation&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface received a valid instruction&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of the last authentication attempt and other miscellaneous statuses.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4&lt;br /&gt;
| Current [[#SEQ|SEQ]] block opcode&lt;br /&gt;
|-&lt;br /&gt;
| 5-9&lt;br /&gt;
| Current [[#CMD|CMD]] block&#039;s interface opcode&lt;br /&gt;
|-&lt;br /&gt;
| 10-14&lt;br /&gt;
| Pending [[#CMD|CMD]] block opcode&lt;br /&gt;
|-&lt;br /&gt;
| 15-16&lt;br /&gt;
| Current [[#AES|AES]] block operation&lt;br /&gt;
 0: Encryption&lt;br /&gt;
 1: Decryption&lt;br /&gt;
 2: Key expansion&lt;br /&gt;
 3: Key reverse expansion&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| [[#STORE|STORE]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| [[#LOAD|LOAD]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| [[#RNG|RNG]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| [[#AES|AES]] block is stalled&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of crypto operations.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RNG_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] block is ready&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RNG_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_IRQSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| ACL error&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| SEC error&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#CMD|CMD]] error&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Single step&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#RND|RND]] operation&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Timeout&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the status of crypto IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_IRQMASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| ACL error&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| SEC error&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#CMD|CMD]] error&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Single step&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#RND|RND]] operation&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Timeout&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the value of the mask for crypto IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_ACL_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Writing to a crypto register without the correct ACL&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Reading from a crypto register without the correct ACL&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Invalid ACL change (cchmod)&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| ACL error occurred&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on errors generated by the [[#TSEC_SCP_IRQSTAT|ACL error]] IRQ.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_SEC_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 1-2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 5-6&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 17-18&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 21-22&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 25-26&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| SEC error occurred&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CMD_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Invalid [[#CMD|CMD]] command&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Empty [[#SEQ|SEQ]] sequence&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#SEQ|SEQ]] sequence is too long&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| [[#SEQ|SEQ]] sequence was not finished&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Forbidden signature operation (csigcmp, csigenc or csigclr in NS mode)&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Invalid signature operation (csigcmp in HS mode)&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Forbidden ACL change (cchmod in NS mode)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on errors generated by the [[#TSEC_SCP_IRQSTAT|CMD error]] IRQ.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RND_CTL0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| [[#RND|RND]] clock trigger lower limit&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RND_CTL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| [[#RND|RND]] clock trigger upper limit&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| [[#RND|RND]] clock trigger mask&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_BWCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_CTL_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_IDLEWDERR&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_CTL_RESET&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_CTL_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_CTL_IDLEWDERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_CTL_SRTOUT&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_SRTOUT&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_TFBIF_CTL_SRTOVAL&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_CTL_VPR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_MCCIF_FIFOCTRL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WRCL_MCLE2X&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RDMC_RDFAST&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WRMC_CLLE2X&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RDCL_RDFAST&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_CCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RCLK_OVR_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WCLK_OVR_MODE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_THROTTLE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_BUCKET_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 16-27&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_LEAK_COUNT&lt;br /&gt;
|-&lt;br /&gt;
| 30-31&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_LEAK_SIZE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_1K_TRANSFER&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RREQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WREQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_TAGQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RDATQ&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RACKQ&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WREQQ&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WDATQ&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WACKQ&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RREQ_PENDING&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WREQ_PENDING&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_MREQ&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_ENGINE_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RMCCIF_IDLE &lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WMCCIF_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_CSB_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RU_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WU_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_UNWEIGHT_ACTMON_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_UNWEIGHT_ACTMON_MCB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_RDCOUNT_LO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_RDCOUNT_LO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_RDCOUNT_HI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_RDCOUNT_HI_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_WRCOUNT_LO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_WRCOUNT_LO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_WRCOUNT_HI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_WRCOUNT_HI_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R32COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R32COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R64COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R64COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R128COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R128COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_MCCIF_FIFOCTRL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL1_SRD2MC_REORDER_DEPTH_LIMIT&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL1_SWR2MC_REORDER_DEPTH_LIMIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_WRR_RDP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_TFBIF_WRR_RDP_EXT_WEIGHT&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_TFBIF_WRR_RDP_INT_WEIGHT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_SPROT_EMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to external memory regions. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_TRANSCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT0_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT1_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT2_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT3_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT4_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT5_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT6_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT7_SWID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Configures the software ID per CTXDMA port for memory transactions. Software ID 0 (HW_SWID) forces all transactions to go through the SMMU while software ID 1 (PHY_SWID) bypasses it. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] The nvhost_tsec firmware sets this register to 0x10 or 0x111110 before reading memory from the GPU UCODE carveout.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_REGIONCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-2&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T0_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T0_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 4-6&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T1_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T1_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 8-10&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T2_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T2_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T3_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T3_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 16-18&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T4_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T4_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 20-22&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T5_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T5_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T6_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T6_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 28-30&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T7_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T7_VPR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Configures the aperture ID and VPR mode per CTXDMA port for memory region accessing. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] The nvhost_tsec firmware sets this register to 0x20 or 0x140 before reading memory from the GPU UCODE carveout.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_STARVED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_STALLED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_DELAYED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_ACTIVE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the memory access mask for the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_BORPS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STARVED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STARVED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STALLED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STALLED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_DELAYED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_DELAYED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_ACTIVE_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_ACTIVE_OPERATION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the billions of records per second count for the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_STARVED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_STALLED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_DELAYED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_ACTIVE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_BORPS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STARVED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STARVED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STALLED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STALLED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_DELAYED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_DELAYED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_ACTIVE_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_ACTIVE_OPERATION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_WEIGHT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_WEIGHT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_THI_TRANSPROP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_STREAMID0&lt;br /&gt;
|-&lt;br /&gt;
| 8-14&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_STREAMID1&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_TZ_AUTH&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_CG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_CG_IDLE_CG_DLY_CNT&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_CG_IDLE_CG_EN&lt;br /&gt;
|-&lt;br /&gt;
| 16-18&lt;br /&gt;
| TSEC_CG_WAKEUP_DLY_CNT&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_CG_WAKEUP_DLY_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_BAR0_CTL_READ&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_BAR0_CTL_WRITE&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| TSEC_BAR0_CTL_BYTE_MASK&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| TSEC_BAR0_CTL_STATUS&lt;br /&gt;
 0: Idle&lt;br /&gt;
 1: Busy&lt;br /&gt;
 2: Error&lt;br /&gt;
 3: Disabled&lt;br /&gt;
|-&lt;br /&gt;
| 16-17&lt;br /&gt;
| TSEC_BAR0_CTL_SEC_MODE&lt;br /&gt;
 0: None&lt;br /&gt;
 1: Invalid&lt;br /&gt;
 2: Light Secure&lt;br /&gt;
 3: Heavy Secure&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_BAR0_CTL_INIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
Starting a transfer over BAR0 automatically sets TSEC_BAR0_CTL_SEC_MODE to the current Falcon security mode. Once set, any attempts to start a transfer from a lower security level will fail.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_ADDR_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the address for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_DATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_DATA_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the data for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_TIMEOUT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_TIMEOUT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the timeout value for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TEGRA_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TEGRA_CTL_TKFI_KFUSE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_TEGRA_CTL_TKFI_RESTART_FSM_KFUSE&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_FORCE_IDLE_INPUTS_I2C&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_RESTART_FSM_HOST1X&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_RESTART_FSM_APB&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_DISABLE_OUTPUT_I2C&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Falcon ==&lt;br /&gt;
&amp;quot;Falcon&amp;quot; (FAst Logic CONtroller) is a proprietary general purpose CPU which can be found inside various hardware blocks that require some sort of logic processing such as TSEC (TSECA and TSECB), NVDEC, NVENC, NVJPG, VIC, GPU PMU and XUSB.&lt;br /&gt;
&lt;br /&gt;
=== Processor Registers ===&lt;br /&gt;
A total of 32 processor registers are available in the Falcon CPU.&lt;br /&gt;
&lt;br /&gt;
==== REG0-REG15 ====&lt;br /&gt;
These are 16 32-bit GPRs (general purpose registers).&lt;br /&gt;
&lt;br /&gt;
==== IV0 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 0. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IV1 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 1. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IV2 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 2. This register is considered &amp;quot;UNDEFINED&amp;quot; and appears to be unused.&lt;br /&gt;
&lt;br /&gt;
==== EV ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for the exception vector. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;tv&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SP ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the current stack pointer. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== PC ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the current program counter. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IMB ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the external base address for IMEM transfers.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xcbase&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== DMB ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the external base address for DMEM transfers.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xdbase&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CSW ====&lt;br /&gt;
This is a SPR (special purpose register) that holds various flag bits.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7 || General purpose predicates&lt;br /&gt;
|-&lt;br /&gt;
| 8 || ALU carry flag&lt;br /&gt;
|-&lt;br /&gt;
| 9 || ALU signed overflow flag&lt;br /&gt;
|-&lt;br /&gt;
| 10 || ALU sign flag&lt;br /&gt;
|-&lt;br /&gt;
| 11 || ALU zero flag&lt;br /&gt;
|-&lt;br /&gt;
| 16 || Interrupt 0 enable&lt;br /&gt;
|-&lt;br /&gt;
| 17 || Interrupt 1 enable&lt;br /&gt;
|-&lt;br /&gt;
| 18 || Interrupt 2 enable (undefined)&lt;br /&gt;
|-&lt;br /&gt;
| 20 || Interrupt 0 saved enable&lt;br /&gt;
|-&lt;br /&gt;
| 21 || Interrupt 1 saved enable&lt;br /&gt;
|-&lt;br /&gt;
| 22 || Interrupt 2 saved enable (undefined)&lt;br /&gt;
|-&lt;br /&gt;
| 24 || Exception active&lt;br /&gt;
|-&lt;br /&gt;
| 26-31 || Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;flags&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CCR ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the SCP DMA override functionality. The value of this register is set using the &amp;quot;cxset&amp;quot; instruction which provides a way to change the behavior of a variable amount of successively executed DMA-related instructions (&amp;quot;xdwait&amp;quot;, &amp;quot;xdst&amp;quot; and &amp;quot;xdld&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable&lt;br /&gt;
! Bits || Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4 || Number of instructions the override is valid for (0x1F means infinite)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Crypto source/destination select&lt;br /&gt;
 0: Crypto register&lt;br /&gt;
 1: Crypto stream&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Bypass mode&lt;br /&gt;
 0: Disabled&lt;br /&gt;
 1: Enabled&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Internal memory select&lt;br /&gt;
 0: DMEM&lt;br /&gt;
 1: IMEM&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;cx&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SEC ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the SCP authentication process.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7 || Start of region to authenticate (in pages of 0x100 bytes)&lt;br /&gt;
|-&lt;br /&gt;
| 16 || Force secure DMA transfers&lt;br /&gt;
|-&lt;br /&gt;
| 17 || Decrypt region to authenticate&lt;br /&gt;
|-&lt;br /&gt;
| 18 || Signature check passed&lt;br /&gt;
|-&lt;br /&gt;
| 19 || Suppress interrupts and exceptions&lt;br /&gt;
|-&lt;br /&gt;
| 24-31 || Size of region to authenticate (in pages of 0x100 bytes)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;cauth&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CTX ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the CTXDMA ports.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-2 || CTXDMA port for code loads (xcld)&lt;br /&gt;
|-&lt;br /&gt;
| 4-6 || CTXDMA port for code stores (invalid)&lt;br /&gt;
|-&lt;br /&gt;
| 8-10 || CTXDMA port for data loads (xdld)&lt;br /&gt;
|-&lt;br /&gt;
| 12-14 || CTXDMA port for data stores (xdst)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xtargets&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== EXCI ====&lt;br /&gt;
This is a SPR (special purpose register) that holds information on raised exceptions.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-19 || Exception PC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23 || Exception cause&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;tstatus&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SEC1 ====&lt;br /&gt;
Only available in Falcon v6+ CPUs, marked as &amp;quot;RESERVED&amp;quot; for v5.&lt;br /&gt;
&lt;br /&gt;
==== IMB1 ====&lt;br /&gt;
Only available in Falcon v6+ CPUs, marked as &amp;quot;RESERVED&amp;quot; for v5.&lt;br /&gt;
&lt;br /&gt;
==== DMB1 ====&lt;br /&gt;
Only available in Falcon v6+ CPUs, marked as &amp;quot;RESERVED&amp;quot; for v5.&lt;br /&gt;
&lt;br /&gt;
=== Secure BootROM ===&lt;br /&gt;
Certain Falcon CPUs may have an optional &amp;quot;Secure BootROM&amp;quot;, but contrary to the common purpose of bootrom code, this doesn&#039;t execute while booting the CPU. In fact, being a microprocessor, Falcon is designed to execute user supplied code right off the bat in a clean slate state. However, Falcon can be paired with a [[#SCP|secure co-processor]] and provide a cryptosystem for any hardware block that may require it, originating what is known as a &amp;quot;secretful&amp;quot; unit.&lt;br /&gt;
&lt;br /&gt;
Secretful Falcon CPUs have [[#TSEC_FALCON_HWCFG1|TSEC_FALCON_HWCFG1_SECURITY_MODEL]] set to 3, which means they support &amp;quot;Heavy Secure&amp;quot; mode (or &amp;quot;HS&amp;quot; for short). While in HS mode, the Falcon&#039;s DMEM and IMEM regions are protected from read and write operations, which effectively hides code and data from attackers.&lt;br /&gt;
&lt;br /&gt;
Entering HS mode first requires uploading code marked as &amp;quot;secure&amp;quot; to Falcon, which can be done from MMIO using [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC]] with the [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC_SECURE]] bit set. Upon jumping to a page marked as secret, the [[#TSEC_FALCON_EXCI|INV_INS]] exception is raised which tells the Falcon to start executing the secure bootrom code.&lt;br /&gt;
&lt;br /&gt;
The secure bootrom lives in a hidden ROM region, instead of IMEM, and is mapped as --x at address 0. On Falcon v5 CPUs its size is 0x367 bytes.&lt;br /&gt;
&lt;br /&gt;
==== Initialization ====&lt;br /&gt;
The first instructions of the secure bootrom simply save each [[#REG0-REG15|GPR]] to the stack and check the contents of the [[#SEC|SEC SPR]].&lt;br /&gt;
&lt;br /&gt;
==== Authentication ====&lt;br /&gt;
The main purpose of the secure bootrom is to authenticate the code pages marked as &amp;quot;secure&amp;quot;. This is done by first extracting the base address and size of the region to authenticate from the [[#SEC|SEC SPR]], then calculating a signature over this region and finally comparing it to the value of the [[#SCP|SCP]] register $c6.&lt;br /&gt;
&lt;br /&gt;
If the comparison is successful, bit 18 of [[#SEC|SEC SPR]] is set (which is mirrored in [[#TSEC_FALCON_SVEC_SPR|TSEC_FALCON_SVEC_SPR]]), the signature comparison result in [[#TSEC_SCP_STAT1|TSEC_SCP_STAT1]] is set to 3 and each page from the region to authenticate is marked as valid. Bit 19 of [[#SEC|SEC SPR]] is also automatically set, preventing any interrupts or exceptions from being raised while in HS mode, but contrary to bit 18 this one can be manually cleared by authenticated code.&lt;br /&gt;
&lt;br /&gt;
Below is the authentication algorithm&#039;s pseudocode:&lt;br /&gt;
&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
// This runs in a loop for each 0x100 bytes page.&lt;br /&gt;
cs0begin 0x03&lt;br /&gt;
cxsin $c4&lt;br /&gt;
cenc $c3 $c5&lt;br /&gt;
cxor $c5 $c3&lt;br /&gt;
ckeyreg $c4&lt;br /&gt;
cxor $c5 $c5&lt;br /&gt;
cs0exec 0x11&lt;br /&gt;
...&lt;br /&gt;
// Use secret 0x01 as key and $c7 as seed.&lt;br /&gt;
csecret $c3 1&lt;br /&gt;
ckeyreg $c3&lt;br /&gt;
cenc $c3 $c7&lt;br /&gt;
ckeyreg $c3&lt;br /&gt;
cenc $c4 $c5&lt;br /&gt;
csigcmp $c4 $c6&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Decryption ====&lt;br /&gt;
If bit 17 is set in the [[#SEC|SEC SPR]], the secure bootrom will additionally attempt to decrypt the region to authenticate.&lt;br /&gt;
&lt;br /&gt;
Below is the decryption algorithm&#039;s pseudocode: &lt;br /&gt;
&amp;lt;syntaxhighlight&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
// Use secret 0x06 as key.&lt;br /&gt;
cs0begin 0x03&lt;br /&gt;
cxsin $c3&lt;br /&gt;
cdec $c4 $c3&lt;br /&gt;
cxsout $c4&lt;br /&gt;
csecret $c5 0x06&lt;br /&gt;
ckexp $c5 $c5&lt;br /&gt;
cs0exec 0x10&lt;br /&gt;
ckeyreg $c5&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Exit ====&lt;br /&gt;
The secure bootrom finishes by restoring each [[#REG0-REG15|GPR]] from stack and returning from the exception state. This will result in the authenticated code region being executed in HS mode until the current [[#PC|PC]] points to an address outside of the authenticated region. When this happens, each page from the authenticated region is automatically marked as invalid without any involvement of the secure bootrom, meaning that the secure bootrom is only invoked when entering HS mode.&lt;br /&gt;
&lt;br /&gt;
== SCP ==&lt;br /&gt;
&amp;quot;SCP&amp;quot; (Secure Co-Processor) is a proprietary coprocessor which can be found inside every [[#Falcon|Falcon]] that supports [[#Secure BootROM|Heavy Secure Mode]]. On the Tegra X1 these are TSECA, TSECB, NVDEC and the GPU&#039;s PMU.&lt;br /&gt;
&lt;br /&gt;
=== Hardware ===&lt;br /&gt;
SCP is subdivided into several specialized hardware blocks and interfaces.&lt;br /&gt;
&lt;br /&gt;
==== LOAD ====&lt;br /&gt;
Block for handling memory reads from SCP to Falcon. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== STORE ====&lt;br /&gt;
Block for handling memory writes from Falcon to SCP. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== CMD ====&lt;br /&gt;
Block for translating Falcon crypto operands into SCP commands. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]]. The status of the current command is reported through register [[#TSEC_SCP_CMD|TSEC_SCP_CMD]].&lt;br /&gt;
&lt;br /&gt;
==== SEQ ====&lt;br /&gt;
Block for recording and executing sequences of crypto operations in the form of macros.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== CTL ====&lt;br /&gt;
Overseer block for controlling certain SCP features.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
Registers [[#TSEC_SCP_CTL_STAT|TSEC_SCP_CTL_STAT]], [[#TSEC_SCP_CTL_LOCK|TSEC_SCP_CTL_LOCK]], [[#TSEC_SCP_CTL_SCP|TSEC_SCP_CTL_SCP]], [[#TSEC_SCP_CTL_PKEY|TSEC_SCP_CTL_PKEY]] and [[#TSEC_SCP_CTL_DBG|TSEC_SCP_CTL_DBG]] refer to this block.&lt;br /&gt;
&lt;br /&gt;
==== AES ====&lt;br /&gt;
Block for providing AES-128-ECB functionality.&lt;br /&gt;
&lt;br /&gt;
==== RNG ====&lt;br /&gt;
Block for encapsulating and controlling the internal random number generator.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]] and reports the status of the internal random number generator through registers [[#TSEC_SCP_RNG_STAT0|TSEC_SCP_RNG_STAT0]] and [[#TSEC_SCP_RNG_STAT1|TSEC_SCP_RNG_STAT1]].&lt;br /&gt;
&lt;br /&gt;
===== RND =====&lt;br /&gt;
Internal random number generator.&lt;br /&gt;
&lt;br /&gt;
Can be configured by the [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTLx]] registers.&lt;br /&gt;
&lt;br /&gt;
=== Operations ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Opcode&lt;br /&gt;
!  Name&lt;br /&gt;
!  Operand0&lt;br /&gt;
!  Operand1&lt;br /&gt;
!  Operation&lt;br /&gt;
!  Condition&lt;br /&gt;
|-&lt;br /&gt;
| 0 || nop || N/A || N/A || ||&lt;br /&gt;
|-&lt;br /&gt;
| 1 || mov || $cX || $cY || &amp;lt;code&amp;gt;$cX = $cY; ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 2 || sin || $cX || N/A || &amp;lt;code&amp;gt;$cX = read_stream(); ACL(X) = ???;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 3 || sout || $cX || N/A || &amp;lt;code&amp;gt;write_stream($cX);&amp;lt;/code&amp;gt; || ?&lt;br /&gt;
|-&lt;br /&gt;
| 4 || [[#rnd|rnd]] || $cX || N/A || &amp;lt;code&amp;gt;$cX = read_rnd(); ACL(X) = ???;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 5 || s0begin || immX || N/A || &amp;lt;code&amp;gt;record_macro_for_N_instructions(0, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 6 || s0exec || immX || N/A || &amp;lt;code&amp;gt;execute_macro_N_times(0, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 7 || s1begin || immX || N/A || &amp;lt;code&amp;gt;record_macro_for_N_instructions(1, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 8 || s1exec || immX || N/A || &amp;lt;code&amp;gt;execute_macro_N_times(1, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 9 || &amp;lt;invalid&amp;gt; || || || ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xA || [[#chmod|chmod]] || $cX || immY || Complicated, see [[#ACL|ACL]]. ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xB || xor || $cX || $cY || &amp;lt;code&amp;gt;$cX ^= $cY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2) &amp;amp;&amp;amp; (ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xC || add || $cX || immY || &amp;lt;code&amp;gt;$cX += immY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xD || and || $cX || $cY || &amp;lt;code&amp;gt;$cX &amp;amp;= $cY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2) &amp;amp;&amp;amp; (ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xE || rev || $cX || $cY || &amp;lt;code&amp;gt;$cX = endian_swap128($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xF || gfmul || $cX || $cY || &amp;lt;code&amp;gt;$cX = gfmul($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0x10 || secret || $cX || immY || &amp;lt;code&amp;gt;$cX = load_secret(immY); ACL(X) = load_secret_acl(immY);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x11 || keyreg || $cX || N/A || &amp;lt;code&amp;gt;active_key_idx = $cX;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x12 || kexp || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_kexp($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x13 || krexp || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_kexp_reverse($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x14 || enc || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_enc(active_key_idx, $cY); ACL(X) = ACL(active_key_idx) &amp;amp; ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x15 || dec || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_dec(active_key_idx, $cY); ACL(X) = ACL(active_key_idx) &amp;amp; ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x16 || [[#sigcmp|sigcmp]] || $cX || $cY || &amp;lt;code&amp;gt;if (hash_verify($cX, $cY)) { has_sig = true; current_sig = $cX; }&amp;lt;/code&amp;gt; || ?&lt;br /&gt;
|-&lt;br /&gt;
| 0x17 || sigenc || $cX || $cY || &amp;lt;code&amp;gt;if (has_sig) { $cX = aes_enc($cY, current_sig); ACL(X) = 0x13; }&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x18 || [[#sigclr|sigclr]] || N/A || N/A || &amp;lt;code&amp;gt;has_sig = false;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== sigcmp ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c XY d8     csigcmp $cY $cX&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Takes 2 crypto registers as operands and is automatically executed when jumping to a code region previously uploaded as secret. This instruction does not work in secure mode.&lt;br /&gt;
&lt;br /&gt;
==== sigclr ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c 00 e0     csigclr&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction takes no operands and clears the saved cauth signature used by the csigenc instruction.&lt;br /&gt;
&lt;br /&gt;
==== chmod ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c XY a8     cchmod $cY 0X&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;00000000: f5 3c XY a9     cchmod $cY 1X&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction takes a crypto register and a 5 bit immediate value which represents the [[#ACL|ACL]] mask to set.&lt;br /&gt;
&lt;br /&gt;
==== rnd ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c 0X 90     crnd $cX&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction initializes a crypto register with random data.&lt;br /&gt;
&lt;br /&gt;
Executing this instruction only succeeds if the RNG controller is enabled for the SCP, which requires taking the following steps:&lt;br /&gt;
* Write 0x7FFF to [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTL0]].&lt;br /&gt;
* Write 0x3FF0000 to [[#TSEC_SCP_RND_CTL1|TSEC_SCP_RND_CTL1]].&lt;br /&gt;
* Write 0xFF00 to TSEC_SCP_RND_CTL11.&lt;br /&gt;
* Write 0x1000 to [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]].&lt;br /&gt;
&lt;br /&gt;
Otherwise it hangs forever.&lt;br /&gt;
&lt;br /&gt;
=== ACLs ===&lt;br /&gt;
Each crypto register has an associated access control list with the following format:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bit&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0 || Secure key. Forced set if bit1 is set. Once cleared, cannot be set again.&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Secure readable. Once cleared, cannot be set again.&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Insecure key. Forced set if bit3 is set. Forced clear if bit0 is clear. Can be toggled back and forth.&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Insecure readable. Forced clear if bit1 is clear. Can be toggled back and forth.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Insecure overwritable. Can be toggled back and forth.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On boot, the ACL is 0x1F for all $cX.&lt;br /&gt;
&lt;br /&gt;
Loading into $cX using xdst instruction sets ACL($cX) to 0x13 and 0x1F, for secure and insecure mode respectively.&lt;br /&gt;
&lt;br /&gt;
Spilling a $cX to DMEM using xdld instruction is allowed if (ACL($cX) &amp;amp; 2) or (ACL($cX) &amp;amp; 8), for secure and insecure mode respectively.&lt;br /&gt;
&lt;br /&gt;
Loading a secret into $cX sets a per-secret ACL, unconditionally.&lt;br /&gt;
&lt;br /&gt;
=== Secrets ===&lt;br /&gt;
[[#Secure BootROM|Heavy Secure Mode]] has access to 64 128-bit keys which are burned at factory. These keys can be loaded using the $csecret instruction which takes the target crypto register and the key index as arguments.&lt;br /&gt;
&lt;br /&gt;
Secrets are specific to each Falcon unit with the exception of secret 0x3F. This secret is effectively empty (all zeros), but is configured to be overwritten with the KFUSE private key once the KFUSE clock is enabled. The KFUSE private key is console-unique.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable&lt;br /&gt;
! Index || ACL || Description&lt;br /&gt;
|-&lt;br /&gt;
| 0x00 || 0x13 || Used by [[TSEC_Firmware#Keygen|Keygen]], nvhost_tsec, nvhost_nvdec_bl020_prod, nvhost_nvdec020_prod, nvhost_nvdec020_ns and acr_ucode firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x01 || 0x10 || Used by Falcon&#039;s [[#Secure BootROM|Secure BootROM]] for the signature generation algorithm.&lt;br /&gt;
|-&lt;br /&gt;
| 0x02 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x03 || 0x11 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x04 || 0x10 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x05 || 0x13 || Used by nvhost_tsec, nvhost_nvdec_bl020_prod, nvhost_nvdec020_prod, nvhost_nvdec020_ns and acr_ucode firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x06 || 0x11 || Used by Falcon&#039;s [[#Secure BootROM|Secure BootROM]] as key to decrypt data during authentication (decided by bit 17 in the [[#SEC|SEC]] register).&lt;br /&gt;
|-&lt;br /&gt;
| 0x07 || 0x11 || Used by [6.0.0+] nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x08 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x09 || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x0A || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0B || 0x10 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x0C || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0D || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0E || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0F || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x10 || 0x11 || Used by [1.0.0-5.1.0] nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x11 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x12 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x13 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x14 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x15 || 0x13 || Used by nvhost_nvdec_bl020_prod, [5.0.0+] nvhost_nvdec020_prod, [5.0.0+] nvhost_nvdec020_ns and [6.0.0+] nvhost_tsec firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x16 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x17 || 0x10 || Used by [11.0.0+] nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x18 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x19 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1A || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1B || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1C || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1D || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1E || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1F || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x20 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x21 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x22 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x23 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x24 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x25 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x26 || 0x10 || Used by [[TSEC_Firmware#KeygenLdr|KeygenLdr]] and [[TSEC_Firmware#SecureBoot|SecureBoot]]&lt;br /&gt;
|-&lt;br /&gt;
| 0x27 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x28 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x29 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2A || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2B || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2C || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2D || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2E || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2F || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x30 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x31 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x32 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x33 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x34 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x35 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x36 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x37 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x38 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x39 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3A || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3B || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3C || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x3D || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3E || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3F || 0x10 || Used by [[TSEC_Firmware#Keygen|Keygen]], nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Vale</name></author>
	</entry>
	<entry>
		<id>https://switchbrew.org/w/index.php?title=TSEC_Firmware&amp;diff=9950</id>
		<title>TSEC Firmware</title>
		<link rel="alternate" type="text/html" href="https://switchbrew.org/w/index.php?title=TSEC_Firmware&amp;diff=9950"/>
		<updated>2020-09-05T17:33:14Z</updated>

		<summary type="html">&lt;p&gt;Vale: Fix FALCON_HWCFG MMIO names&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Boot Process =&lt;br /&gt;
TSEC is configured and initialized by the first bootloader during key generation.&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] TSEC is now configured at the end of the first bootloader&#039;s main function.&lt;br /&gt;
&lt;br /&gt;
== Initialization ==&lt;br /&gt;
During this stage several clocks are programmed.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Program the HOST1X clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_L, CLK_OUT_ENB_L, CLK_SOURCE_HOST1X and CLK_L_HOST1X&lt;br /&gt;
    enable_host1x_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the TSEC clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_U, CLK_OUT_ENB_U, CLK_SOURCE_TSEC and CLK_U_TSEC&lt;br /&gt;
    enable_tsec_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR_SAFE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_Y, CLK_OUT_ENB_Y and CLK_Y_SOR_SAFE&lt;br /&gt;
    enable_sor_safe_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR0 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X and CLK_X_SOR0&lt;br /&gt;
    enable_sor0_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR1 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X, CLK_SOURCE_SOR1 and CLK_X_SOR1&lt;br /&gt;
    enable_sor1_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the KFUSE clock resets&lt;br /&gt;
    // Uses RST_DEVICES_H, CLK_OUT_ENB_H and CLK_H_KFUSE&lt;br /&gt;
    enable_kfuse_clkrst();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
In this stage the Falcon IRQs, interfaces and DMA engine are configured.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear the Falcon DMA control register&lt;br /&gt;
    *(u32 *)FALCON_DMACTL = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon IRQs&lt;br /&gt;
    *(u32 *)FALCON_IRQMSET = 0xFFF2;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon IRQs&lt;br /&gt;
    *(u32 *)FALCON_IRQDEST = 0xFFF0;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon interfaces&lt;br /&gt;
    *(u32 *)FALCON_ITFEN = 0x03;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for Falcon&#039;s DMA engine to be idle&lt;br /&gt;
    wait_flcn_dma_idle();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Firmware loading ==&lt;br /&gt;
The Falcon firmware code is stored in the first bootloader&#039;s data segment in IMEM.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set DMA transfer base address to 0x40011900 &amp;gt;&amp;gt; 0x08&lt;br /&gt;
    *(u32 *)FALCON_DMATRFBASE = 0x400119;&lt;br /&gt;
 &lt;br /&gt;
    u32 trf_mode = 0;     // A value of 0 sets FALCON_DMATRFCMD_IMEM&lt;br /&gt;
    u32 dst_offset = 0;&lt;br /&gt;
    u32 src_offset = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Load code into Falcon (0x100 bytes at a time)&lt;br /&gt;
    while (src_offset &amp;lt; 0xF00)&lt;br /&gt;
    {&lt;br /&gt;
        flcn_load_firm(trf_mode, src_offset, dst_offset);&lt;br /&gt;
        src_offset += 0x100;&lt;br /&gt;
        dst_offset += 0x100;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] The transfer base address and size of the Falcon firmware code changed.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set DMA transfer base address to 0x40010E00 &amp;gt;&amp;gt; 0x08&lt;br /&gt;
    *(u32 *)FALCON_DMATRFBASE = 0x40010E;&lt;br /&gt;
 &lt;br /&gt;
    u32 trf_mode = 0;     // A value of 0 sets FALCON_DMATRFCMD_IMEM&lt;br /&gt;
    u32 dst_offset = 0;&lt;br /&gt;
    u32 src_offset = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Load code into Falcon (0x100 bytes at a time)&lt;br /&gt;
    while (src_offset &amp;lt; 0x2900)&lt;br /&gt;
    {&lt;br /&gt;
        flcn_load_firm(trf_mode, src_offset, dst_offset);&lt;br /&gt;
        src_offset += 0x100;&lt;br /&gt;
        dst_offset += 0x100;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Firmware booting ==&lt;br /&gt;
Falcon is booted up and the first bootloader waits for it to finish.&lt;br /&gt;
    // Set magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0x34C2E1DA;&lt;br /&gt;
 &lt;br /&gt;
    // Clear Falcon scratch1 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon boot key version in scratch0 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH0 = 0x01;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon&#039;s boot vector address&lt;br /&gt;
    *(u32 *)FALCON_BOOTVEC = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Signal Falcon&#039;s CPU&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0x02;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for Falcon&#039;s DMA engine to be idle&lt;br /&gt;
    wait_flcn_dma_idle();&lt;br /&gt;
 &lt;br /&gt;
    u32 boot_res = 0;&lt;br /&gt;
 &lt;br /&gt;
    // The bootloader allows the TSEC two seconds from this point to do its job&lt;br /&gt;
    u32 maximum_time = read_timer() + 2000000; &lt;br /&gt;
 &lt;br /&gt;
    while (!boot_res)&lt;br /&gt;
    {&lt;br /&gt;
        // Read boot result from scratch1 MMIO&lt;br /&gt;
        boot_res = *(u32 *)FALCON_SCRATCH1;&lt;br /&gt;
    &lt;br /&gt;
        // Read from TIMERUS_CNTR_1US (microseconds from boot)&lt;br /&gt;
        u32 current_time = read_timer();&lt;br /&gt;
    &lt;br /&gt;
        // Booting is taking too long&lt;br /&gt;
        if (current_time &amp;gt; maximum_time)&lt;br /&gt;
            panic();&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Invalid boot result was returned&lt;br /&gt;
    if (boot_res != 0xB0B0B0B0)&lt;br /&gt;
        panic();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] Falcon is booted up, but the first bootloader is left in an infinite loop.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0x34C2E1DA;&lt;br /&gt;
 &lt;br /&gt;
    // Clear Falcon scratch1 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon boot key version in scratch0 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH0 = 0x01;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon&#039;s boot vector address&lt;br /&gt;
    *(u32 *)FALCON_BOOTVEC = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Signal Falcon&#039;s CPU&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0x02;&lt;br /&gt;
 &lt;br /&gt;
    // Infinite loop&lt;br /&gt;
    while (1);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== TSEC key generation ==&lt;br /&gt;
The TSEC key is generated by reading SOR1 registers modified by the Falcon CPU.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Read TSEC key&lt;br /&gt;
    u32 tsec_key[4]; &lt;br /&gt;
    tsec_key[0] = *(u32 *)NV_SOR_DP_HDCP_BKSV_LSB;&lt;br /&gt;
    tsec_key[1] = *(u32 *)NV_SOR_TMDS_HDCP_BKSV_LSB;&lt;br /&gt;
    tsec_key[2] = *(u32 *)NV_SOR_TMDS_HDCP_CN_MSB;&lt;br /&gt;
    tsec_key[3] = *(u32 *)NV_SOR_TMDS_HDCP_CN_LSB;&lt;br /&gt;
 &lt;br /&gt;
    // Clear SOR1 registers&lt;br /&gt;
    *(u32 *)NV_SOR_DP_HDCP_BKSV_LSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_BKSV_LSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_CN_MSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_CN_LSB = 0;&lt;br /&gt;
 &lt;br /&gt;
    if (out_size &amp;lt; 0x10)&lt;br /&gt;
        out_size = 0x10;&lt;br /&gt;
 &lt;br /&gt;
    // Copy back the TSEC key&lt;br /&gt;
    memcpy(out_buf, tsec_key, out_size);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] This is now done inside an encrypted TSEC payload.&lt;br /&gt;
&lt;br /&gt;
== Cleanup ==&lt;br /&gt;
Clocks and resets are disabled before returning.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Deprogram KFUSE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_H, CLK_OUT_ENB_H and CLK_H_KFUSE&lt;br /&gt;
    disable_kfuse_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR1 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X, CLK_SOURCE_SOR1 and CLK_X_SOR1&lt;br /&gt;
    disable_sor1_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR0 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X and CLK_X_SOR0&lt;br /&gt;
    disable_sor0_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR_SAFE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_Y, CLK_OUT_ENB_Y and CLK_Y_SOR_SAFE&lt;br /&gt;
    disable_sor_safe_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram TSEC clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_U, CLK_OUT_ENB_U, CLK_SOURCE_TSEC and CLK_U_TSEC&lt;br /&gt;
    disable_tsec_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram HOST1X clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_L, CLK_OUT_ENB_L, CLK_SOURCE_HOST1X and CLK_L_HOST1X&lt;br /&gt;
    disable_host1x_clkrst();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= TSEC Firmware =&lt;br /&gt;
The actual code loaded into TSEC is assembled in NVIDIA&#039;s proprietary fuc5 ISA using crypto extensions.&lt;br /&gt;
Stored inside the first bootloader, this firmware binary is split into 4 blobs (names are unofficial): [[#Boot|Boot]] (unencrypted and unauthenticated code), [[#KeygenLdr|KeygenLdr]] (unencrypted and authenticated code), [[#Keygen|Keygen]] (encrypted and authenticated code) and [[#Key data|key data]].&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] There are now 2 new blobs (names are unofficial): [[#SecureBootLdr|SecureBootLdr]] (unencrypted and unauthenticated code), [[#SecureBoot|SecureBoot]] (part unencrypted and unauthenticated code, part encrypted and authenticated code).&lt;br /&gt;
&lt;br /&gt;
Firmware can be disassembled with [http://envytools.readthedocs.io/en/latest/ envytools&#039;] [https://github.com/envytools/envytools/tree/master/envydis envydis]:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;envydis -i tsec_fw.bin -m falcon -V fuc5 -F crypt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that the instruction set has variable length instructions, and the disassembler is not very good at detecting locations it should start disassembling from. One needs to disassemble multiple sub-regions and join them together.&lt;br /&gt;
&lt;br /&gt;
== Boot ==&lt;br /&gt;
During this stage, [[#Key data|key data]] is loaded and [[#KeygenLdr|KeygenLdr]] is authenticated, loaded and executed.&lt;br /&gt;
Before returning, this stage writes back to the host (using MMIO registers) and sets the key used by the first bootloader.&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] During this stage, [[#Key data|key data]] is loaded and execution jumps to [[#SecureBootLdr|SecureBootLdr]].&lt;br /&gt;
&lt;br /&gt;
=== Initialization ===&lt;br /&gt;
The firmware initially sets up the stack pointer to the end of the available data segment.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x09;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x1FF;&lt;br /&gt;
    data_seg_size &amp;lt;&amp;lt;= 0x08;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    *(u32 *)sp = data_seg_size;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
The firmware reads the [[#Key data|key data]] blob and then loads, authenticates and executes [[#KeygenLdr|KeygenLdr]] which sets the TSEC key.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 dmem_start = 0;&lt;br /&gt;
    u8 key_data_buf[0x7C];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data blob from code segment&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x7C;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Read the next stage from code segment into data space&lt;br /&gt;
    u32 blob1_addr = 0x400;&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    memcpy_i2d(dmem_start, blob1_addr, blob1_size);&lt;br /&gt;
 &lt;br /&gt;
    // Upload the next stage into Falcon&#039;s code segment&lt;br /&gt;
    u32 blob1_virt_addr = 0x300;&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob1_virt_addr, dmem_start, blob1_size, blob1_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    u32 boot_res = 0;&lt;br /&gt;
    u32 time = 0;&lt;br /&gt;
    bool is_blob_dec = false;&lt;br /&gt;
 &lt;br /&gt;
    while (true)&lt;br /&gt;
    {&lt;br /&gt;
        if (time == 4000001)&lt;br /&gt;
        {&lt;br /&gt;
            // Write boot failed (timeout) magic to FALCON_SCRATCH1&lt;br /&gt;
            boot_res = 0xC0C0C0C0;&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
       &lt;br /&gt;
            break;&lt;br /&gt;
        }&lt;br /&gt;
    &lt;br /&gt;
        // Load key version from FALCON_SCRATCH0 (bootloader sends 0x01)&lt;br /&gt;
        u32 key_version = *(u32 *)FALCON_SCRATCH0;&lt;br /&gt;
 &lt;br /&gt;
        if (key_version == 0x64)&lt;br /&gt;
        {&lt;br /&gt;
            // Skip all next stages&lt;br /&gt;
            boot_res = 0xB0B0B0B0;&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
       &lt;br /&gt;
            break;&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
            if (key_version &amp;gt; 0x03)&lt;br /&gt;
                boot_res = 0xD0D0D0D0;    // Invalid key version&lt;br /&gt;
            else if (key_version == 0)&lt;br /&gt;
                boot_res = 0xB0B0B0B0;    // No keys used&lt;br /&gt;
            else&lt;br /&gt;
            {&lt;br /&gt;
                u32 key_buf[0x7C];&lt;br /&gt;
          &lt;br /&gt;
                // Copy key data&lt;br /&gt;
                memcpy(key_buf, key_data_buf, 0x7C);&lt;br /&gt;
 &lt;br /&gt;
                u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
                u32 blob1_hash_addr = key_buf + 0x20; &lt;br /&gt;
 &lt;br /&gt;
                // Set auth_addr to 0x300 and auth_size to blob1_size&lt;br /&gt;
                $cauth = ((blob1_size &amp;lt;&amp;lt; 0x10) | 0x03);&lt;br /&gt;
&lt;br /&gt;
                // The next 2 xfer instructions will be overridden&lt;br /&gt;
                // and target changes from DMA to crypto&lt;br /&gt;
                cxset(0x02);&lt;br /&gt;
          &lt;br /&gt;
                // Transfer data to crypto register c6&lt;br /&gt;
                xdst(0, (blob1_hash_addr | crypto_reg_flag));&lt;br /&gt;
 	  			&lt;br /&gt;
                // Wait for all data loads/stores to finish&lt;br /&gt;
                xdwait();&lt;br /&gt;
          &lt;br /&gt;
                // Jump to KeygenLdr&lt;br /&gt;
                u32 keygenldr_res = exec_keygenldr(key_buf, key_version, is_blob_dec);&lt;br /&gt;
                is_blob_dec = true;  // Set this to prevent decrypting again&lt;br /&gt;
 &lt;br /&gt;
                // Set boot finish magic on success&lt;br /&gt;
                if (keygenldr_res == 0)&lt;br /&gt;
                    boot_res = 0xB0B0B0B0&lt;br /&gt;
            }&lt;br /&gt;
       &lt;br /&gt;
            // Write result to FALCON_SCRATCH1&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
 &lt;br /&gt;
            if (boot_res == 0xB0B0B0B0)&lt;br /&gt;
                break;&lt;br /&gt;
        }&lt;br /&gt;
 &lt;br /&gt;
        time++;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Overwrite the TSEC key in SOR1 registers&lt;br /&gt;
    // This has no effect because the KeygenLdr locks out the TSEC DMA engine&lt;br /&gt;
    tsec_set_key(key_data_buf);&lt;br /&gt;
 &lt;br /&gt;
    return boot_res;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] The firmware calculates the start address of [[#SecureBootLdr|SecureBootLdr]] through [[#Key data|key data]] and jumps to it.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 key_data_buf[0x84];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data blob&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x84;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Calculate the next blob&#039;s address in Falcon code segment&lt;br /&gt;
    u32 blob4_size = *(u32 *)(key_data_buf + 0x80);&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    u32 blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    u32 blob3_addr = blob0_size + blob1_size + 0x100 + blob2_size + blob4_size;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to next blob&lt;br /&gt;
    (void *)blob3_addr();&lt;br /&gt;
  &lt;br /&gt;
    return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== tsec_set_key ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_data_buf&#039;&#039;&#039; (a 16 bytes buffer) as argument and writes its contents to SOR1 registers.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C300 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_TIMEOUT = 0xFFF;&lt;br /&gt;
 &lt;br /&gt;
    // Read the key&#039;s words&lt;br /&gt;
    u32 key0 = *(u32 *)(key_data_buf + 0x00);&lt;br /&gt;
    u32 key1 = *(u32 *)(key_data_buf + 0x04);&lt;br /&gt;
    u32 key2 = *(u32 *)(key_data_buf + 0x08);&lt;br /&gt;
    u32 key3 = *(u32 *)(key_data_buf + 0x0C);&lt;br /&gt;
 &lt;br /&gt;
    u32 result = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Write key0 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_DP_HDCP_BKSV_LSB, key0);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key1 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_BKSV_LSB, key1);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key2 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_CN_MSB, key2);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key3 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_CN_LSB, key3);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    return result;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== tsec_dma_write =====&lt;br /&gt;
This method takes &#039;&#039;&#039;addr&#039;&#039;&#039; and &#039;&#039;&#039;value&#039;&#039;&#039; as arguments and performs a DMA write using TSEC MMIO.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 result = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC DMA engine&lt;br /&gt;
    // This waits for bit 0x0C in TSEC_DMA_CMD to be 0&lt;br /&gt;
    result = wait_tsec_dma();&lt;br /&gt;
 &lt;br /&gt;
    // Wait failed&lt;br /&gt;
    if (result)&lt;br /&gt;
        return 1;&lt;br /&gt;
 &lt;br /&gt;
    // Set the destination address&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C100 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_ADDR = addr;&lt;br /&gt;
 &lt;br /&gt;
    // Set the value&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C200 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_VAL = value;&lt;br /&gt;
 &lt;br /&gt;
    // Start transfer&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C000 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_CMD = 0x800000F2;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC DMA engine&lt;br /&gt;
    // This waits for bit 0x0C in TSEC_DMA_CMD to be 0&lt;br /&gt;
    result = wait_tsec_dma();&lt;br /&gt;
 &lt;br /&gt;
    // Wait failed&lt;br /&gt;
    if (result)&lt;br /&gt;
        return 1;&lt;br /&gt;
 &lt;br /&gt;
    return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KeygenLdr ==&lt;br /&gt;
This stage is responsible for reconfiguring the Falcon&#039;s crypto co-processor and loading, decrypting, authenticating and executing [[#Keygen|Keygen]].&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Clear overrides&lt;br /&gt;
    cxset(0x80);&lt;br /&gt;
 &lt;br /&gt;
    // Clear bit 0x13 in cauth&lt;br /&gt;
    $cauth = ($cauth &amp;amp; ~(1 &amp;lt;&amp;lt; 0x13));&lt;br /&gt;
 &lt;br /&gt;
    // Set the target port for memory transfers&lt;br /&gt;
    $xtargets = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c0&lt;br /&gt;
    // This should clear any leftover data&lt;br /&gt;
    xdst(0, 0);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers, except c6 which is used for auth&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cmov($c1, $c0);&lt;br /&gt;
    cmov($c2, $c0);&lt;br /&gt;
    cmov($c3, $c0);&lt;br /&gt;
    cmov($c4, $c0);&lt;br /&gt;
    cmov($c5, $c0);&lt;br /&gt;
    cmov($c7, $c0);&lt;br /&gt;
 &lt;br /&gt;
    // Clear TSEC_TEGRA_CTL_TKFI_KFUSE&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x20E00 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_TEGRA_CTL &amp;amp;= 0xFFFEFFFF;&lt;br /&gt;
 &lt;br /&gt;
    // Set TSEC_SCP_CTL_PKEY_REQUEST_RELOAD&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x10600 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_SCP_CTL_PKEY |= 0x01;&lt;br /&gt;
 &lt;br /&gt;
    u32 is_pkey_loaded = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC_SCP_CTL_PKEY_LOADED&lt;br /&gt;
    while (!is_pkey_loaded)&lt;br /&gt;
        is_pkey_loaded = (*(u32 *)TSEC_SCP_CTL_PKEY &amp;amp; 0x02);&lt;br /&gt;
 &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x09;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x1FF;&lt;br /&gt;
    data_seg_size &amp;lt;&amp;lt;= 0x08;&lt;br /&gt;
 &lt;br /&gt;
    // Check stack bounds&lt;br /&gt;
    if (($sp &amp;gt;= data_seg_size) || ($sp &amp;lt; 0x800))&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Load and execute the Keygen stage&lt;br /&gt;
    load_keygen(key_buf, key_version, is_blob_dec);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x10300 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_SCP_CTL_LOCK = 0;&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== load_keygen ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_buf&#039;&#039;&#039;, &#039;&#039;&#039;key_version&#039;&#039;&#039; and &#039;&#039;&#039;is_blob_dec&#039;&#039;&#039; as arguments and is responsible for loading, decrypting, authenticating and executing [[#Keygen|Keygen]].&lt;br /&gt;
Notably, it also does AES-CMAC over the unauthorized [[#Boot|Boot]] blob to make sure it hasn&#039;t been tampered with.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 res = 0;&lt;br /&gt;
 &lt;br /&gt;
    u32 dmem_start = 0;&lt;br /&gt;
    u32 blob0_addr = 0;&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_buf + 0x70); &lt;br /&gt;
 &lt;br /&gt;
    // Load blob0 code to the start of the data segment&lt;br /&gt;
    memcpy_i2d(dmem_start, blob0_addr, blob0_size);&lt;br /&gt;
 &lt;br /&gt;
    // Generate &amp;quot;CODE_SIG_01&amp;quot; key into c4 crypto register&lt;br /&gt;
    gen_usr_key(0, 0);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt buffer with c4&lt;br /&gt;
    u8 sig_key[0x10];&lt;br /&gt;
    enc_buf(sig_key, blob0_size);&lt;br /&gt;
 &lt;br /&gt;
    u32 src_addr = dmem_start;&lt;br /&gt;
    u32 src_size = blob0_size;&lt;br /&gt;
    u32 iv_addr = sig_key;&lt;br /&gt;
    u32 dst_addr = sig_key;&lt;br /&gt;
    u32 mode = 0x02;   // AES-CMAC&lt;br /&gt;
    u32 use_imem = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Do AES-CMAC over blob0 code&lt;br /&gt;
    do_crypto(src_addr, src_size, iv_addr, dst_addr, mode, use_imem);&lt;br /&gt;
 &lt;br /&gt;
    // Compare the resulting hash with the one from the key buffer&lt;br /&gt;
    if (memcmp(dst_addr, key_buf + 0x10, 0x10))&lt;br /&gt;
    {&lt;br /&gt;
        res = 0xDEADBEEF;&lt;br /&gt;
        return res;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_buf + 0x74);&lt;br /&gt;
 &lt;br /&gt;
    // Decrypt Keygen blob if needed&lt;br /&gt;
    if (!is_blob_dec)&lt;br /&gt;
    {&lt;br /&gt;
        // Read Stage2&#039;s size from key buffer&lt;br /&gt;
        u32 blob2_size = *(u32 *)(key_buf + 0x78);&lt;br /&gt;
 &lt;br /&gt;
        // Check stack bounds&lt;br /&gt;
        if ($sp &amp;gt; blob2_size)&lt;br /&gt;
        {&lt;br /&gt;
            u32 blob2_virt_addr = blob0_size + blob1_size;&lt;br /&gt;
            u32 blob2_phys_addr = blob2_virt_addr + 0x100;&lt;br /&gt;
       &lt;br /&gt;
            // Read the encrypted Keygen blob&lt;br /&gt;
            memcpy_i2d(dmem_start, blob2_phys_addr, blob2_size);&lt;br /&gt;
 &lt;br /&gt;
            // Generate &amp;quot;CODE_ENC_01&amp;quot; key into c4 crypto register&lt;br /&gt;
            gen_usr_key(0x01, 0x01);&lt;br /&gt;
       &lt;br /&gt;
            u32 src_addr = dmem_start;&lt;br /&gt;
            u32 src_size = blob2_size;&lt;br /&gt;
            u32 iv_addr = key_buf + 0x40;&lt;br /&gt;
            u32 dst_addr = dmem_start;&lt;br /&gt;
            u32 mode = 0;   // AES-128-CBC&lt;br /&gt;
            u32 use_imem = 0;&lt;br /&gt;
       &lt;br /&gt;
            // Decrypt Keygen blob with AES-128-CBC&lt;br /&gt;
            do_crypto(src_addr, src_size, iv_addr, dst_addr, mode, use_imem);&lt;br /&gt;
       &lt;br /&gt;
            // Upload decrypted Keygen into Falcon&#039;s code segment&lt;br /&gt;
            bool use_secret = true;&lt;br /&gt;
            memcpy_d2i(blob2_virt_addr, dmem_start, blob2_size, blob2_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
            // Clear out the decrypted blob&lt;br /&gt;
            memset(dmem_start, 0, blob2_size);&lt;br /&gt;
        }&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob2_hash_addr = key_buf + 0x30;&lt;br /&gt;
 &lt;br /&gt;
    // Transfer the Keygen auth hash to crypto register c6&lt;br /&gt;
    xdst(0, (blob2_hash_addr | crypto_reg_flag));&lt;br /&gt;
 				&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Save previous cauth value&lt;br /&gt;
    u32 cauth_old = $cauth;&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to blob2_virt_addr and auth_size to blob2_size&lt;br /&gt;
    $cauth = ((blob2_virt_addr &amp;gt;&amp;gt; 0x08) | (blob2_size &amp;lt;&amp;lt; 0x10));&lt;br /&gt;
 &lt;br /&gt;
    u32 hovi_key_addr = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Select next stage key&lt;br /&gt;
    if (key_version == 0x01)		        // Use HOVI_EKS_01&lt;br /&gt;
        hovi_key_addr = key_buf + 0x50;&lt;br /&gt;
    else if (key_version == 0x02)	        // Use HOVI_COMMON_01&lt;br /&gt;
        hovi_key_addr = key_buf + 0x60;&lt;br /&gt;
    else if (key_version == 0x03)	        // Use debug key (empty)&lt;br /&gt;
        hovi_key_addr = key_buf + 0x00;&lt;br /&gt;
    else&lt;br /&gt;
        res = 0xD0D0D0D0&lt;br /&gt;
 	&lt;br /&gt;
    // Jump to Keygen&lt;br /&gt;
    if (hovi_key_addr)&lt;br /&gt;
        res = exec_keygen(hovi_key_addr, key_version);&lt;br /&gt;
          &lt;br /&gt;
    // Clear out key data&lt;br /&gt;
    memset(key_buf, 0, 0x7C);&lt;br /&gt;
 &lt;br /&gt;
    // Restore previous cauth value&lt;br /&gt;
    $cauth = cauth_old;&lt;br /&gt;
 &lt;br /&gt;
    return res;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== gen_usr_key =====&lt;br /&gt;
This method takes &#039;&#039;&#039;type&#039;&#039;&#039; and &#039;&#039;&#039;mode&#039;&#039;&#039; as arguments and generates a key.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 seed_buf[0x10];&lt;br /&gt;
 &lt;br /&gt;
    // Read a 16 bytes seed based on supplied type&lt;br /&gt;
    /*&lt;br /&gt;
        type == 0: &amp;quot;CODE_SIG_01&amp;quot; + null padding&lt;br /&gt;
        type == 1: &amp;quot;CODE_ENC_01&amp;quot; + null padding&lt;br /&gt;
    */&lt;br /&gt;
    get_seed(seed_buf, type);&lt;br /&gt;
 &lt;br /&gt;
    // This will write the seed into crypto register c0 &lt;br /&gt;
    crypto_store(0, seed_buf);&lt;br /&gt;
 &lt;br /&gt;
    // Load selected secret into crypto register c1&lt;br /&gt;
    csecret($c1, 0x26);&lt;br /&gt;
 &lt;br /&gt;
    // Bind c1 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg($c1);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt seed_buf in c0 using keyreg value as key into c1&lt;br /&gt;
    cenc($c1, $c0);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt the auth signature (stored in c6) with c1 and store in c1&lt;br /&gt;
    csigenc($c1, $c1);&lt;br /&gt;
 &lt;br /&gt;
    // Copy the result to c4 (will be used as key)&lt;br /&gt;
    cmov($c4, $c1);&lt;br /&gt;
 &lt;br /&gt;
    // Do key expansion for decryption if necessary&lt;br /&gt;
    if (mode != 0)&lt;br /&gt;
        ckexp($c4, $c4);&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== enc_buf =====&lt;br /&gt;
This method takes &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) and &#039;&#039;&#039;size&#039;&#039;&#039; as arguments and encrypts the supplied buffer.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set first 3 words to null&lt;br /&gt;
    *(u32 *)(buf + 0x00) = 0;&lt;br /&gt;
    *(u32 *)(buf + 0x04) = 0;&lt;br /&gt;
    *(u32 *)(buf + 0x08) = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Swap halves (b16, b32 and b16 again) and store it as the last word&lt;br /&gt;
    *(u32 *)(buf + 0x0C) = (&lt;br /&gt;
        ((size &amp;amp; 0x000000FF) &amp;lt;&amp;lt; 0x08&lt;br /&gt;
        | (size &amp;amp; 0x0000FF00) &amp;gt;&amp;gt; 0x08) &amp;lt;&amp;lt; 0x10&lt;br /&gt;
        | ((size &amp;amp; 0x00FF0000) &amp;gt;&amp;gt; 0x10) &amp;lt;&amp;lt; 0x08&lt;br /&gt;
        | (size &amp;amp; 0xFF000000) &amp;gt;&amp;gt; 0x18&lt;br /&gt;
    );&lt;br /&gt;
 &lt;br /&gt;
    // This will write buf into crypto register c3 &lt;br /&gt;
    crypto_store(0x03, buf);&lt;br /&gt;
 &lt;br /&gt;
    // Bind c4 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg($c4);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt buf in c3 using keyreg value as key and store in c5&lt;br /&gt;
    cenc($c5, $c3);&lt;br /&gt;
 &lt;br /&gt;
    // This will read into buf from crypto register c5 &lt;br /&gt;
    crypto_load(0x05, buf);&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== crypto_store =====&lt;br /&gt;
This method takes &#039;&#039;&#039;reg&#039;&#039;&#039; (a crypto register) and &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) as arguments and loads the supplied buffer into the crypto register.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next two xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Encode the source buffer and the destination register for the xfer&lt;br /&gt;
    u32 crypto_xfer_flag = (u32)buf | reg &amp;lt;&amp;lt; 0x10;&lt;br /&gt;
&lt;br /&gt;
    // Transfer the supplied buffer to the supplied crypto register&lt;br /&gt;
    xdst(crypto_xfer_flag, crypto_xfer_flag);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== crypto_load =====&lt;br /&gt;
This method takes &#039;&#039;&#039;reg&#039;&#039;&#039; (a crypto register) and &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) as arguments and loads the contents of the supplied register into the supplied buffer.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next two xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Encode the destination buffer and the source register for the xfer&lt;br /&gt;
    u32 crypto_xfer_flag = (u32)buf | reg &amp;lt;&amp;lt; 0x10;&lt;br /&gt;
&lt;br /&gt;
    // Transfer the contents of the supplied crypto register into the supplied buffer&lt;br /&gt;
    xdld(crypto_xfer_flag, crypto_xfer_flag);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== do_crypto =====&lt;br /&gt;
This is the method responsible for all crypto operations performed during [[#KeygenLdr|KeygenLdr]]. It takes &#039;&#039;&#039;src_addr&#039;&#039;&#039;, &#039;&#039;&#039;src_size&#039;&#039;&#039;, &#039;&#039;&#039;iv_addr&#039;&#039;&#039;, &#039;&#039;&#039;dst_addr&#039;&#039;&#039;, &#039;&#039;&#039;mode&#039;&#039;&#039; and &#039;&#039;&#039;use_imem&#039;&#039;&#039; as arguments.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Check for invalid source data size&lt;br /&gt;
    if (!src_size || (src_size &amp;amp; 0x0F))&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Check for invalid source data address&lt;br /&gt;
    if (src_addr &amp;amp; 0x0F)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Check for invalid destination data address&lt;br /&gt;
    if (dst_addr &amp;amp; 0x0F)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Use IV if available&lt;br /&gt;
    if (iv_addr)&lt;br /&gt;
    {&lt;br /&gt;
        // This will write the iv_addr into crypto register c5 &lt;br /&gt;
        crypto_store(0x05, iv_addr);&lt;br /&gt;
    }&lt;br /&gt;
    else&lt;br /&gt;
    {&lt;br /&gt;
        // Clear c5 register (use null IV)&lt;br /&gt;
        cxor($c5, $c5);&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Bind c4 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg(c4);&lt;br /&gt;
 &lt;br /&gt;
    if (mode == 0x00)	              // AES-128-CBC decrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 5 instructions&lt;br /&gt;
        cs0begin(0x05);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cdec($c2, $c3);               // Decrypt from c3 into c2&lt;br /&gt;
        cxor($c5, $c2);               // XOR c2 with c5 and store in c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
        cmov($c5, $c3);               // Move c3 into c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x01)	      // AES-128-CBC encrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 4 instructions&lt;br /&gt;
        cs0begin(0x04);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cxor($c3, $c5);               // XOR c5 with c3 and store in c3&lt;br /&gt;
        cenc($c5, $c3);               // Encrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x02)	      // AES-CMAC&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cxor($c5, $c3);               // XOR c5 with c3 and store in c5&lt;br /&gt;
        cenc($c5, $c5);               // Encrypt from c5 into c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x03)	      // AES-128-ECB decrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cdec($c5, $c3);               // Decrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x04)	      // AES-128-ECB encrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cenc($c5, $c3);               // Encrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else&lt;br /&gt;
        return;&lt;br /&gt;
 &lt;br /&gt;
    // Main loop&lt;br /&gt;
    while (src_size &amp;gt; 0)&lt;br /&gt;
    {&lt;br /&gt;
        u32 blk_count = (src_size &amp;gt;&amp;gt; 0x04);&lt;br /&gt;
 	&lt;br /&gt;
        if (blk_count &amp;gt; 0x10)&lt;br /&gt;
            blk_count = 0x10;&lt;br /&gt;
   &lt;br /&gt;
        // Check size align&lt;br /&gt;
        if (blk_count &amp;amp; (blk_count - 0x01))&lt;br /&gt;
            blk_count = 0x01;&lt;br /&gt;
 &lt;br /&gt;
        u32 blk_size = (blk_count &amp;lt;&amp;lt; 0x04);&lt;br /&gt;
   &lt;br /&gt;
        u32 crypto_xfer_src = 0;&lt;br /&gt;
        u32 crypto_xfer_dst = 0;&lt;br /&gt;
   &lt;br /&gt;
        if (block_size == 0x20)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00030000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00030000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 2 times (1 for each block)&lt;br /&gt;
            cs0exec(0x02);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x40)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00040000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00040000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 4 times (1 for each block)&lt;br /&gt;
            cs0exec(0x04);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x80)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00050000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00050000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 8 times (1 for each block)&lt;br /&gt;
            cs0exec(0x08);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x100)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00060000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00060000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 16 times (1 for each block)&lt;br /&gt;
            cs0exec(0x10);&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00020000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00020000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 1 time (1 for each block)&lt;br /&gt;
            cs0exec(0x01);&lt;br /&gt;
 &lt;br /&gt;
            // Ensure proper block size&lt;br /&gt;
            block_size = 0x10;&lt;br /&gt;
        }&lt;br /&gt;
 &lt;br /&gt;
        // The next xfer instruction will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto input/output stream&lt;br /&gt;
        if (use_imem)&lt;br /&gt;
            cxset(0xA1);         // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
        else&lt;br /&gt;
            cxset(0x21);         // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 &lt;br /&gt;
        // Transfer data into the crypto input/output stream&lt;br /&gt;
        xdst(crypto_xfer_src, crypto_xfer_src);&lt;br /&gt;
   &lt;br /&gt;
        // AES-CMAC only needs one more xfer instruction&lt;br /&gt;
        if (mode == 0x02)&lt;br /&gt;
        {&lt;br /&gt;
            // The next xfer instruction will be overridden&lt;br /&gt;
            // and target changes from DMA to crypto input/output stream&lt;br /&gt;
            if (use_imem)&lt;br /&gt;
                cxset(0xA1);     // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
            else&lt;br /&gt;
                cxset(0x21);     // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 		&lt;br /&gt;
            // Wait for all data loads/stores to finish&lt;br /&gt;
            xdwait();&lt;br /&gt;
        }&lt;br /&gt;
        else  // AES enc/dec needs 2 more xfer instructions&lt;br /&gt;
        {&lt;br /&gt;
            // The next 2 xfer instructions will be overridden&lt;br /&gt;
            // and target changes from DMA to crypto input/output stream&lt;br /&gt;
            if (use_imem)&lt;br /&gt;
                cxset(0xA2);            // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
            else&lt;br /&gt;
                cxset(0x22);            // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 &lt;br /&gt;
            // Transfer data from the crypto input/output stream&lt;br /&gt;
            xdld(crypto_xfer_dst, crypto_xfer_dst);&lt;br /&gt;
 		&lt;br /&gt;
            // Wait for all data loads/stores to finish&lt;br /&gt;
            xdwait();&lt;br /&gt;
 &lt;br /&gt;
            // Increase the destination address by block size&lt;br /&gt;
            dst_addr += block_size;&lt;br /&gt;
        }&lt;br /&gt;
   &lt;br /&gt;
        // Increase the source address by block size&lt;br /&gt;
        src_addr += block_size;&lt;br /&gt;
 &lt;br /&gt;
        // Decrease the source size by block size&lt;br /&gt;
        src_size -= block_size;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // AES-CMAC result is in c5&lt;br /&gt;
    if (mode == 0x02)&lt;br /&gt;
    {&lt;br /&gt;
        // This will read into dst_addr from crypto register c5 &lt;br /&gt;
        crypto_load(0x05, dst_addr);&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Keygen ==&lt;br /&gt;
This stage is decrypted by [[#KeygenLdr|KeygenLdr]] using a key generated by encrypting the KeygenLdr auth signature with a seed encrypted with a csecret. It will generate the final TSEC key.&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
The main function takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; and &#039;&#039;&#039;key_type&#039;&#039;&#039; as arguments from [[#KeygenLdr|KeygenLdr]].&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 falcon_rev = *(u32 *)FALCON_HWCFG2 &amp;amp; 0x0F;&lt;br /&gt;
&lt;br /&gt;
    // Falcon hardware revision must be 5&lt;br /&gt;
    if (falcon_rev != 0x05)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set the target port for memory transfers&lt;br /&gt;
    $xtargets = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Generate the TSEC key&lt;br /&gt;
    gen_tsec_key(key_addr, key_type);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== gen_tsec_key ====&lt;br /&gt;
This method is responsible for generating the final TSEC key. It takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; and &#039;&#039;&#039;key_type&#039;&#039;&#039; as arguments.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // This will use TSEC DMA to look for 0x34C2E1DA in host1x scratch space&lt;br /&gt;
    u32 host1x_res = check_host1x_magic();&lt;br /&gt;
&lt;br /&gt;
    // Failed to find magic word&lt;br /&gt;
    if (host1x_res != 0)&lt;br /&gt;
        return;&lt;br /&gt;
    &lt;br /&gt;
    u32 crypto_reg_flag = 0x00000000;&lt;br /&gt;
&lt;br /&gt;
    // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto register&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Transfer the seed in key_addr to crypto register c0&lt;br /&gt;
    xdst(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
   &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    crypto_reg_flag = 0x00020000;&lt;br /&gt;
&lt;br /&gt;
    if (key_type == 0x01)        // HOVI_EKS_01&lt;br /&gt;
    {&lt;br /&gt;
        // Load selected secret into crypto register c1&lt;br /&gt;
        csecret($c1, 0x3F);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c1 and store in c1&lt;br /&gt;
        csigenc($c1, $c1);&lt;br /&gt;
        &lt;br /&gt;
        // Load selected secret into crypto register c2&lt;br /&gt;
        csecret($c2, 0x00);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the seed from key_addr and store in c2&lt;br /&gt;
        cenc($c2, $c0);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);        &lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c2 and store in c2&lt;br /&gt;
        csigenc($c2, $c2);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
        &lt;br /&gt;
        // Encrypt c1 and store in c2&lt;br /&gt;
        cenc($c2, $c1);&lt;br /&gt;
        &lt;br /&gt;
        // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto register&lt;br /&gt;
        cxset(0x02);&lt;br /&gt;
        &lt;br /&gt;
        // Transfer the resulting key from crypto register c2 to key_addr&lt;br /&gt;
        xdld(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
        &lt;br /&gt;
        // Wait for all data loads/stores to finish&lt;br /&gt;
        xdwait();&lt;br /&gt;
    }&lt;br /&gt;
    else if (key == 0x02)        // HOVI_COMMON_01&lt;br /&gt;
    {&lt;br /&gt;
        // Load selected secret into crypto register c2&lt;br /&gt;
        csecret($c2, 0x00);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the seed from key_addr and store in c2&lt;br /&gt;
        cenc($c2, $c0);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);        &lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c2 and store in c2&lt;br /&gt;
        csigenc($c2, $c2);&lt;br /&gt;
        &lt;br /&gt;
        // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto register&lt;br /&gt;
        cxset(0x02);&lt;br /&gt;
        &lt;br /&gt;
        // Transfer the resulting key from crypto register c2 to key_addr&lt;br /&gt;
        xdld(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
        &lt;br /&gt;
        // Wait for all data loads/stores to finish&lt;br /&gt;
        xdwait();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Use TSEC DMA to write the key in SOR1 registers&lt;br /&gt;
    sor1_set_key(key_addr);&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== sor1_set_key ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; (start address of a 16 bytes buffer) as argument and transfers its contents to SOR1 registers.&lt;br /&gt;
&lt;br /&gt;
The implementation is equivalent to [[#tsec_set_key|tsec_set_key]].&lt;br /&gt;
&lt;br /&gt;
== SecureBootLdr ==&lt;br /&gt;
[6.2.0+] This was introduced to try to recover the secure boot from the RCM vulnerability.&lt;br /&gt;
&lt;br /&gt;
This stage starts by authenticating and executing [[#KeygenLdr|KeygenLdr]] which in turn authenticates, decrypts and executes [[#Keygen|Keygen]] (both blobs remain unchanged from previous firmware versions).&lt;br /&gt;
After the TSEC key has been generated, execution returns to this stage which then parses and executes [[#SecureBoot|SecureBoot]].&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 key_data_buf[0x84];&lt;br /&gt;
    u8 tmp_key_data_buf[0x84];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data from memory&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x84;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Read the KeygenLdr blob from memory&lt;br /&gt;
    u32 boot_base_addr = 0;&lt;br /&gt;
    u32 blob1_addr = 0x400;&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    memcpy_i2d(boot_base_addr, blob1_addr, blob1_size);&lt;br /&gt;
  &lt;br /&gt;
    // Upload the next code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob1_virt_addr = 0x300;&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob1_virt_addr, boot_base_addr, blob1_size, blob1_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    // Backup the key data&lt;br /&gt;
    memcpy(tmp_key_data_buf, key_data_buf, 0x84);&lt;br /&gt;
 &lt;br /&gt;
    // Save previous cauth value&lt;br /&gt;
    u32 cauth_old = $cauth;&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x300 and auth_size to blob1_size&lt;br /&gt;
    $cauth = ((blob1_size &amp;lt;&amp;lt; 0x10) | (0x300 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob1_hash_addr = tmp_key_data_buf + 0x20; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob1_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    u32 key_version = 0x01;&lt;br /&gt;
    bool is_blob_dec = false;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to KeygenLdr&lt;br /&gt;
    u32 keygenldr_res = exec_keygenldr(tmp_key_data_buf, key_version, is_blob_dec);&lt;br /&gt;
 &lt;br /&gt;
    // Set boot finish magic on success&lt;br /&gt;
    if (keygenldr_res == 0)&lt;br /&gt;
        keygenldr_res = 0xB0B0B0B0&lt;br /&gt;
       &lt;br /&gt;
    // Write result to FALCON_SCRATCH1&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = keygenldr_res;&lt;br /&gt;
 &lt;br /&gt;
    if (keygenldr_res != 0xB0B0B0B0)&lt;br /&gt;
        return keygenldr_res;&lt;br /&gt;
 &lt;br /&gt;
    // Restore previous cauth value&lt;br /&gt;
    $cauth = cauth_old;&lt;br /&gt;
 &lt;br /&gt;
    u8 flcn_hdr_buf[0x18];&lt;br /&gt;
    u8 flcn_os_hdr_buf[0x10];&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    u32 blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon header from memory&lt;br /&gt;
    u32 blob4_flcn_hdr_addr = (((blob0_size + blob1_size) + 0x100) + blob2_size);&lt;br /&gt;
    memcpy_i2d(flcn_hdr_buf, blob4_flcn_hdr_addr, 0x18);&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 flcn_hdr_size = *(u32 *)(flcn_hdr_buf + 0x0C);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon OS header from memory&lt;br /&gt;
    u32 blob4_flcn_os_hdr_addr = ((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_hdr_size);&lt;br /&gt;
    memcpy_i2d(flcn_os_hdr_buf, blob4_flcn_os_hdr_addr, 0x10);&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 flcn_code_hdr_size = *(u32 *)(flcn_hdr_buf + 0x10);&lt;br /&gt;
    u32 flcn_os_size = *(u32 *)(flcn_os_hdr_buf + 0x04);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon OS image from memory&lt;br /&gt;
    u32 blob4_flcn_os_addr = ((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_code_hdr_size);&lt;br /&gt;
    memcpy_i2d(boot_base_addr, blob4_flcn_os_hdr_addr, flcn_os_size);&lt;br /&gt;
 &lt;br /&gt;
    // Upload the SecureBoot&#039;s Falcon OS image boot stub code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob4_flcn_os_boot_virt_addr = 0;&lt;br /&gt;
    u32 blob4_flcn_os_boot_size = 0x100;&lt;br /&gt;
    use_secret = false;&lt;br /&gt;
    memcpy_d2i(blob4_flcn_os_boot_virt_addr, boot_base_addr, blob4_flcn_os_boot_size, blob4_flcn_os_boot_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    flcn_os_size = *(u32 *)(flcn_os_hdr_buf + 0x04); &lt;br /&gt;
 &lt;br /&gt;
    // Upload the SecureBoot blob&#039;s Falcon OS encrypted image code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob4_flcn_os_img_virt_addr = 0x100;&lt;br /&gt;
    u32 blob4_flcn_os_img_size = (flcn_os_size - 0x100);&lt;br /&gt;
    use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob4_flcn_os_img_virt_addr, boot_base_addr + 0x100, blob4_flcn_os_img_size, blob4_flcn_os_img_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    flcn_code_hdr_size = *(u32 *)(flcn_hdr_buf + 0x10);&lt;br /&gt;
    u32 flcn_os_code_size = *(u32 *)(flcn_os_hdr_buf + 0x08);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s falcon OS image&#039;s hash from memory&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = (((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_code_hdr_size) + flcn_os_code_size);&lt;br /&gt;
    memcpy_i2d(0, blob4_flcn_os_img_hash_addr, 0x10);&lt;br /&gt;
 &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x03;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x3FC0;&lt;br /&gt;
 &lt;br /&gt;
    u32 data_addr = 0x10;&lt;br /&gt;
 &lt;br /&gt;
    // Clear all data except the first 0x10 bytes (SecureBoot blob&#039;s Falcon OS image&#039;s hash)&lt;br /&gt;
    for (int data_word_count = 0x04; data_word_count &amp;lt; data_seg_size; data_word_count++)&lt;br /&gt;
    {&lt;br /&gt;
        *(u32 *)(data_addr) = 0; &lt;br /&gt;
        data_addr += 0x04;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
 &lt;br /&gt;
    // Jump to SecureBoot&lt;br /&gt;
    load_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0xB0B0B0B0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SecureBoot ==&lt;br /&gt;
[6.2.0+] This was introduced to try to recover the secure boot from the RCM vulnerability.&lt;br /&gt;
&lt;br /&gt;
This stage prepares the stack then authenticates, decrypts and executes the SecureBoot blob&#039;s Falcon OS image.&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image boot stub&lt;br /&gt;
    init_secboot();&lt;br /&gt;
 &lt;br /&gt;
    // Halt execution&lt;br /&gt;
    exit();&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== init_secboot ====&lt;br /&gt;
This method takes no arguments and is responsible for loading, authenticating and executing [[#SecureBoot|SecureBoot]].&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read the transfer base address from IO space&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)FALCON_DMATRFBASE;&lt;br /&gt;
 &lt;br /&gt;
    // Copy transfer base address to data memory&lt;br /&gt;
    u32 scratch_data_addr = 0x300;&lt;br /&gt;
    *(u32 *)scratch_data_addr = xfer_ext_base_addr;&lt;br /&gt;
 &lt;br /&gt;
    // Set the transfer base address&lt;br /&gt;
    xcbase(xfer_ext_base_addr);&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = 0; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob4_flcn_os_img_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    cmov($c7, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x100, auth_size to 0x1300,&lt;br /&gt;
    // bit 16 (use_secret) and bit 17 (is_encrypted)&lt;br /&gt;
    $cauth = ((0x02 &amp;lt;&amp;lt; 0x10) | (0x01 &amp;lt;&amp;lt; 0x10) | (0x1300 &amp;lt;&amp;lt; 0x10) | (0x100 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image&lt;br /&gt;
    exec_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0x0F0F0F0F;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[8.1.0+] Removed transfer base address setting and added IMEM protection.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = 0; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob4_flcn_os_img_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    cmov($c7, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x100, auth_size to 0x1D00,&lt;br /&gt;
    // bit 16 (use_secret) and bit 17 (is_encrypted)&lt;br /&gt;
    $cauth = ((0x02 &amp;lt;&amp;lt; 0x10) | (0x01 &amp;lt;&amp;lt; 0x10) | (0x1D00 &amp;lt;&amp;lt; 0x10) | (0x100 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
&lt;br /&gt;
    // Fill remaining IMEM with secret pages&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(0x1E00, 0, 0x2200, 0x1E00, use_secret);&lt;br /&gt;
    memcpy_d2i(0x4000, 0, 0x4000, 0x4000, use_secret);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image&lt;br /&gt;
    exec_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0x0F0F0F0F;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== exec_secboot ====&lt;br /&gt;
This is the signed and encrypted portion of the [[#SecureBoot|SecureBoot]] payload.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Recover the transfer base address from the stack&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)scratch_data_addr;&lt;br /&gt;
&lt;br /&gt;
    // Return the TLB entry that covers the virtual address&lt;br /&gt;
    u32 tlb_entry = vtlb(xfer_ext_base_addr);&lt;br /&gt;
    &lt;br /&gt;
    // Clear Falcon CPU control&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0;&lt;br /&gt;
    &lt;br /&gt;
    // Halt if the external page is marked as secret&lt;br /&gt;
    if ((tlb_entry &amp;amp; 0x4000000) != 0)&lt;br /&gt;
        exit();&lt;br /&gt;
    &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
    &lt;br /&gt;
    // Fill all DMEM with a pointer to a trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; data_seg_size; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Initialize the TRNG and generate random data in DMEM&lt;br /&gt;
    init_rnd();&lt;br /&gt;
    &lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    u32 rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Load the TSEC key from SOR1 registers into DMEM&lt;br /&gt;
    sor1_get_key();&lt;br /&gt;
&lt;br /&gt;
    // Initialize CAR registers&lt;br /&gt;
    car_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Ensure CLK_RST_CONTROLLER_CLK_SOURCE_TSEC_0 is 0x02&lt;br /&gt;
    test_clk_source_tsec();&lt;br /&gt;
&lt;br /&gt;
    // Set FLOW_MODE_WAITEVENT in FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    halt_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Initialize the CCPLEX&lt;br /&gt;
    ccplex_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    bool is_se_ready = false;&lt;br /&gt;
&lt;br /&gt;
    // Wait for SE to be ready&lt;br /&gt;
    while (!is_se_ready)&lt;br /&gt;
        is_se_ready = check_se_status();&lt;br /&gt;
    &lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    u32 mc_iram_aperture_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (mc_iram_aperture_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Clear the entire DMEM region&lt;br /&gt;
        clear_dmem();&lt;br /&gt;
        &lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Ensure FUSE_SKU_INFO is 0x83&lt;br /&gt;
    test_fuse_sku_info();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC key to SE keyslot 0x0C&lt;br /&gt;
    se_set_keyslot_12();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC root key to SE keyslot 0x0D&lt;br /&gt;
    se_set_keyslot_13();&lt;br /&gt;
&lt;br /&gt;
    // Decrypt Package1&lt;br /&gt;
    decrypt_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Parse Package1 header and return entry address&lt;br /&gt;
    u32 entry_addr = parse_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Set the exception vectors&lt;br /&gt;
    set_excp_vec(entry_addr);&lt;br /&gt;
&lt;br /&gt;
    // Fill the top 0x500 bytes in DMEM with a pointer to trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; 0x500; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
    &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    unlock_scp();&lt;br /&gt;
&lt;br /&gt;
    // Clear FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    resume_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Clear the entire DMEM region&lt;br /&gt;
    clear_dmem();&lt;br /&gt;
        &lt;br /&gt;
    // Halt 5 times for no good reason&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[7.0.0+] Many changes were introduced to mitigate and prevent attacks.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Recover the transfer base address from the stack&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)scratch_data_addr;&lt;br /&gt;
&lt;br /&gt;
    // Return the TLB entry that covers the virtual address&lt;br /&gt;
    u32 tlb_entry = vtlb(xfer_ext_base_addr);&lt;br /&gt;
    &lt;br /&gt;
    // Clear Falcon CPU control&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0;&lt;br /&gt;
    &lt;br /&gt;
    // Halt if the external page is marked as secret&lt;br /&gt;
    if ((tlb_entry &amp;amp; 0x4000000) != 0)&lt;br /&gt;
        exit();&lt;br /&gt;
    &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
    &lt;br /&gt;
    // Fill all DMEM with a pointer to a trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; data_seg_size; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Initialize the TRNG and generate random data in DMEM&lt;br /&gt;
    init_rnd();&lt;br /&gt;
    &lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    u32 rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Enable and test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x01);&lt;br /&gt;
&lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
    se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
    // Test randomized offsets for read/write integrity in MC, FUSE, IRAM and TZRAM&lt;br /&gt;
    u32 test_res = test_mc_fuse_iram_tzram();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization by enabling and disabling random CAR devices&lt;br /&gt;
    test_res = test_car();&lt;br /&gt;
    &lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Set FLOW_MODE_WAITEVENT in FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    halt_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Initialize the CCPLEX&lt;br /&gt;
    ccplex_init();&lt;br /&gt;
&lt;br /&gt;
    // Check if SE is ready&lt;br /&gt;
    u32 se_status = check_se_status();&lt;br /&gt;
&lt;br /&gt;
    if (se_status != 0)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Load the TSEC key from SOR1 registers into DMEM&lt;br /&gt;
    sor1_get_key();&lt;br /&gt;
&lt;br /&gt;
    // Initialize CAR registers&lt;br /&gt;
    car_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization by enabling and disabling random CAR devices&lt;br /&gt;
    test_res = test_car();&lt;br /&gt;
    &lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Ensure FUSE_SKU_INFO is 0x83&lt;br /&gt;
    test_fuse_sku_info();&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Decrypt Package1&lt;br /&gt;
    decrypt_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC root key to SE keyslot 0x0D&lt;br /&gt;
    se_set_keyslot_13();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC key to SE keyslot 0x0C&lt;br /&gt;
    se_set_keyslot_12();&lt;br /&gt;
&lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test randomized offsets for read/write integrity in MC, FUSE, IRAM and TZRAM&lt;br /&gt;
    test_res = test_mc_fuse_iram_tzram();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Parse Package1 header and return entry address&lt;br /&gt;
    u32 entry_addr = parse_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Set the exception vectors&lt;br /&gt;
    set_excp_vec(entry_addr);&lt;br /&gt;
&lt;br /&gt;
    // Fill the top 0x500 bytes in DMEM with a pointer to trap function (just exits)&lt;br /&gt;
    for (int i = 0; i &amp;lt; 0x500; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
    &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    unlock_scp();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Clear FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    resume_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Clear the entire DMEM region and every crypto register&lt;br /&gt;
    clear_dmem_and_crypto();&lt;br /&gt;
        &lt;br /&gt;
    // Halt 5 times for no good reason&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[8.1.0+] Key derivation algorithm was changed. Very minor changes were introduced to mitigate and prevent attacks.&lt;br /&gt;
&lt;br /&gt;
== Key data ==&lt;br /&gt;
Small buffer stored after the [[#Boot|Boot]] blob and used across all stages.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Offset&lt;br /&gt;
!  Size&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0x00&lt;br /&gt;
| 0x10&lt;br /&gt;
| Debug key (empty)&lt;br /&gt;
|-&lt;br /&gt;
| 0x10&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob0 ([[#Boot|Boot]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x20&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob1 ([[#KeygenLdr|KeygenLdr]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x30&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x40&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) AES IV&lt;br /&gt;
|-&lt;br /&gt;
| 0x50&lt;br /&gt;
| 0x10&lt;br /&gt;
| HOVI EKS seed&lt;br /&gt;
|-&lt;br /&gt;
| 0x60&lt;br /&gt;
| 0x10&lt;br /&gt;
| HOVI COMMON seed&lt;br /&gt;
|-&lt;br /&gt;
| 0x70&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob0 ([[#Boot|Boot]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x74&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob1 ([[#KeygenLdr|KeygenLdr]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x78&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x7C&lt;br /&gt;
| 0x04&lt;br /&gt;
| [6.2.0+] blob3 ([[#SecureBootLdr|SecureBootLdr]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x80&lt;br /&gt;
| 0x04&lt;br /&gt;
| [6.2.0+] blob4 ([[#SecureBoot|SecureBoot]]) size&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Vale</name></author>
	</entry>
	<entry>
		<id>https://switchbrew.org/w/index.php?title=TSEC&amp;diff=9947</id>
		<title>TSEC</title>
		<link rel="alternate" type="text/html" href="https://switchbrew.org/w/index.php?title=TSEC&amp;diff=9947"/>
		<updated>2020-09-05T16:12:56Z</updated>

		<summary type="html">&lt;p&gt;Vale: Change the keyreg operand to crypto register&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;TSEC (Tegra Security Co-processor) is a dedicated unit powered by a NVIDIA Falcon microprocessor with crypto extensions.&lt;br /&gt;
&lt;br /&gt;
= Driver =&lt;br /&gt;
A host driver for communicating with the TSEC is mapped to physical address 0x54500000 with a total size of 0x40000 bytes and exposes several registers.&lt;br /&gt;
&lt;br /&gt;
== Registers ==&lt;br /&gt;
The TSEC&#039;s MMIO space is divided as follows:&lt;br /&gt;
* 0x54500000 to 0x54501000: THI (Tegra Host Interface)&lt;br /&gt;
* 0x54501000 to 0x54501400: [[#Falcon|FALCON (Falcon microcontroller)]]&lt;br /&gt;
* 0x54501400 to 0x54501600: [[#SCP|SCP (Secure coprocessor)]]&lt;br /&gt;
* 0x54501600 to 0x54501680: TFBIF (Tegra Framebuffer Interface)&lt;br /&gt;
* 0x54501680 to 0x54501700: CG (Clock Gate)&lt;br /&gt;
* 0x54501700 to 0x54501800: BAR0 (HOST1X device DMA)&lt;br /&gt;
* 0x54501800 to 0x54501900: TEGRA (Miscellaneous interfaces)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Name&lt;br /&gt;
!  Address&lt;br /&gt;
!  Width&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT|TSEC_THI_INCR_SYNCPT]]&lt;br /&gt;
| 0x54500000&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT_CTRL|TSEC_THI_INCR_SYNCPT_CTRL]]&lt;br /&gt;
| 0x54500004&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT_ERR|TSEC_THI_INCR_SYNCPT_ERR]]&lt;br /&gt;
| 0x54500008&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW_INCR_SYNCPT|TSEC_THI_CTXSW_INCR_SYNCPT]]&lt;br /&gt;
| 0x5450000C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW|TSEC_THI_CTXSW]]&lt;br /&gt;
| 0x54500020&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW_NEXT|TSEC_THI_CTXSW_NEXT]]&lt;br /&gt;
| 0x54500024&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONT_SYNCPT_EOF|TSEC_THI_CONT_SYNCPT_EOF]]&lt;br /&gt;
| 0x54500028&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONT_SYNCPT_L1|TSEC_THI_CONT_SYNCPT_L1]]&lt;br /&gt;
| 0x5450002C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_STREAMID0|TSEC_THI_STREAMID0]]&lt;br /&gt;
| 0x54500030&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_STREAMID1|TSEC_THI_STREAMID1]]&lt;br /&gt;
| 0x54500034&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_THI_SEC|TSEC_THI_THI_SEC]]&lt;br /&gt;
| 0x54500038&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_METHOD0|TSEC_THI_METHOD0]]&lt;br /&gt;
| 0x54500040&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_METHOD1|TSEC_THI_METHOD1]]&lt;br /&gt;
| 0x54500044&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONTEXT_SWITCH|TSEC_THI_CONTEXT_SWITCH]]&lt;br /&gt;
| 0x54500060&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INT_STATUS|TSEC_THI_INT_STATUS]]&lt;br /&gt;
| 0x54500078&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INT_MASK|TSEC_THI_INT_MASK]]&lt;br /&gt;
| 0x5450007C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONFIG0|TSEC_THI_CONFIG0]]&lt;br /&gt;
| 0x54500080&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_DBG_MISC|TSEC_THI_DBG_MISC]]&lt;br /&gt;
| 0x54500084&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_SLCG_OVERRIDE_HIGH_A|TSEC_THI_SLCG_OVERRIDE_HIGH_A]]&lt;br /&gt;
| 0x54500088&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_SLCG_OVERRIDE_LOW_A|TSEC_THI_SLCG_OVERRIDE_LOW_A]]&lt;br /&gt;
| 0x5450008C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CLK_OVERRIDE|TSEC_THI_CLK_OVERRIDE]]&lt;br /&gt;
| 0x54500E00&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSSET|TSEC_FALCON_IRQSSET]]&lt;br /&gt;
| 0x54501000&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSCLR|TSEC_FALCON_IRQSCLR]]&lt;br /&gt;
| 0x54501004&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSTAT|TSEC_FALCON_IRQSTAT]]&lt;br /&gt;
| 0x54501008&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMODE|TSEC_FALCON_IRQMODE]]&lt;br /&gt;
| 0x5450100C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMSET|TSEC_FALCON_IRQMSET]]&lt;br /&gt;
| 0x54501010&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMCLR|TSEC_FALCON_IRQMCLR]]&lt;br /&gt;
| 0x54501014&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMASK|TSEC_FALCON_IRQMASK]]&lt;br /&gt;
| 0x54501018&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQDEST|TSEC_FALCON_IRQDEST]]&lt;br /&gt;
| 0x5450101C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRINT|TSEC_FALCON_GPTMRINT]]&lt;br /&gt;
| 0x54501020&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRVAL|TSEC_FALCON_GPTMRVAL]]&lt;br /&gt;
| 0x54501024&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRCTL|TSEC_FALCON_GPTMRCTL]]&lt;br /&gt;
| 0x54501028&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PTIMER0|TSEC_FALCON_PTIMER0]]&lt;br /&gt;
| 0x5450102C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PTIMER1|TSEC_FALCON_PTIMER1]]&lt;br /&gt;
| 0x54501030&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_WDTMRVAL|TSEC_FALCON_WDTMRVAL]]&lt;br /&gt;
| 0x54501034&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_WDTMRCTL|TSEC_FALCON_WDTMRCTL]]&lt;br /&gt;
| 0x54501038&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQDEST2|TSEC_FALCON_IRQDEST2]]&lt;br /&gt;
| 0x5450103C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MAILBOX0|TSEC_FALCON_MAILBOX0]]&lt;br /&gt;
| 0x54501040&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MAILBOX1|TSEC_FALCON_MAILBOX1]]&lt;br /&gt;
| 0x54501044&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ITFEN|TSEC_FALCON_ITFEN]]&lt;br /&gt;
| 0x54501048&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IDLESTATE|TSEC_FALCON_IDLESTATE]]&lt;br /&gt;
| 0x5450104C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CURCTX|TSEC_FALCON_CURCTX]]&lt;br /&gt;
| 0x54501050&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_NXTCTX|TSEC_FALCON_NXTCTX]]&lt;br /&gt;
| 0x54501054&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CTXACK|TSEC_FALCON_CTXACK]]&lt;br /&gt;
| 0x54501058&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_FHSTATE|TSEC_FALCON_FHSTATE]]&lt;br /&gt;
| 0x5450105C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PRIVSTATE|TSEC_FALCON_PRIVSTATE]]&lt;br /&gt;
| 0x54501060&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDDATA|TSEC_FALCON_MTHDDATA]]&lt;br /&gt;
| 0x54501064&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDID|TSEC_FALCON_MTHDID]]&lt;br /&gt;
| 0x54501068&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDWDAT|TSEC_FALCON_MTHDWDAT]]&lt;br /&gt;
| 0x5450106C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDCOUNT|TSEC_FALCON_MTHDCOUNT]]&lt;br /&gt;
| 0x54501070&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDPOP|TSEC_FALCON_MTHDPOP]]&lt;br /&gt;
| 0x54501074&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDRAMSZ|TSEC_FALCON_MTHDRAMSZ]]&lt;br /&gt;
| 0x54501078&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SFTRESET|TSEC_FALCON_SFTRESET]]&lt;br /&gt;
| 0x5450107C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_OS|TSEC_FALCON_OS]]&lt;br /&gt;
| 0x54501080&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RM|TSEC_FALCON_RM]]&lt;br /&gt;
| 0x54501084&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SOFT_PM|TSEC_FALCON_SOFT_PM]]&lt;br /&gt;
| 0x54501088&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SOFT_MODE|TSEC_FALCON_SOFT_MODE]]&lt;br /&gt;
| 0x5450108C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DEBUG1|TSEC_FALCON_DEBUG1]]&lt;br /&gt;
| 0x54501090&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DEBUGINFO|TSEC_FALCON_DEBUGINFO]]&lt;br /&gt;
| 0x54501094&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT1|TSEC_FALCON_IBRKPT1]]&lt;br /&gt;
| 0x54501098&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT2|TSEC_FALCON_IBRKPT2]]&lt;br /&gt;
| 0x5450109C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CGCTL|TSEC_FALCON_CGCTL]]&lt;br /&gt;
| 0x545010A0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ENGCTL|TSEC_FALCON_ENGCTL]]&lt;br /&gt;
| 0x545010A4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PMM|TSEC_FALCON_PMM]]&lt;br /&gt;
| 0x545010A8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ADDR|TSEC_FALCON_ADDR]]&lt;br /&gt;
| 0x545010AC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT3|TSEC_FALCON_IBRKPT3]]&lt;br /&gt;
| 0x545010B0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT4|TSEC_FALCON_IBRKPT4]]&lt;br /&gt;
| 0x545010B4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT5|TSEC_FALCON_IBRKPT5]]&lt;br /&gt;
| 0x545010B8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXCI|TSEC_FALCON_EXCI]]&lt;br /&gt;
| 0x545010D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SVEC_SPR|TSEC_FALCON_SVEC_SPR]]&lt;br /&gt;
| 0x545010D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RSTAT0|TSEC_FALCON_RSTAT0]]&lt;br /&gt;
| 0x545010D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RSTAT3|TSEC_FALCON_RSTAT3]]&lt;br /&gt;
| 0x545010DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_E0&lt;br /&gt;
| 0x545010E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CPUCTL|TSEC_FALCON_CPUCTL]]&lt;br /&gt;
| 0x54501100&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_BOOTVEC|TSEC_FALCON_BOOTVEC]]&lt;br /&gt;
| 0x54501104&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_HWCFG|TSEC_FALCON_HWCFG]]&lt;br /&gt;
| 0x54501108&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMACTL|TSEC_FALCON_DMACTL]]&lt;br /&gt;
| 0x5450110C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFBASE|TSEC_FALCON_DMATRFBASE]]&lt;br /&gt;
| 0x54501110&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFMOFFS|TSEC_FALCON_DMATRFMOFFS]]&lt;br /&gt;
| 0x54501114&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFCMD|TSEC_FALCON_DMATRFCMD]]&lt;br /&gt;
| 0x54501118&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFFBOFFS|TSEC_FALCON_DMATRFFBOFFS]]&lt;br /&gt;
| 0x5450111C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAPOLL_FB|TSEC_FALCON_DMAPOLL_FB]]&lt;br /&gt;
| 0x54501120&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAPOLL_CP|TSEC_FALCON_DMAPOLL_CP]]&lt;br /&gt;
| 0x54501124&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_HWCFG1|TSEC_FALCON_HWCFG1]]&lt;br /&gt;
| 0x5450112C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CPUCTL_ALIAS|TSEC_FALCON_CPUCTL_ALIAS]]&lt;br /&gt;
| 0x54501130&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_STACKCFG|TSEC_FALCON_STACKCFG]]&lt;br /&gt;
| 0x54501138&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]]&lt;br /&gt;
| 0x54501140&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMSTAT|TSEC_FALCON_IMSTAT]]&lt;br /&gt;
| 0x54501144&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_TRACEIDX|TSEC_FALCON_TRACEIDX]]&lt;br /&gt;
| 0x54501148&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_TRACEPC|TSEC_FALCON_TRACEPC]]&lt;br /&gt;
| 0x5450114C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLRNG0|TSEC_FALCON_IMFILLRNG0]]&lt;br /&gt;
| 0x54501150&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLRNG1|TSEC_FALCON_IMFILLRNG1]]&lt;br /&gt;
| 0x54501154&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLCTL|TSEC_FALCON_IMFILLCTL]]&lt;br /&gt;
| 0x54501158&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMCTL_DEBUG|TSEC_FALCON_IMCTL_DEBUG]]&lt;br /&gt;
| 0x5450115C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CMEMBASE|TSEC_FALCON_CMEMBASE]]&lt;br /&gt;
| 0x54501160&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMAPERT|TSEC_FALCON_DMEMAPERT]]&lt;br /&gt;
| 0x54501164&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXTERRADDR|TSEC_FALCON_EXTERRADDR]]&lt;br /&gt;
| 0x54501168&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXTERRSTAT|TSEC_FALCON_EXTERRSTAT]]&lt;br /&gt;
| 0x5450116C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CG2|TSEC_FALCON_CG2]]&lt;br /&gt;
| 0x5450117C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC0]]&lt;br /&gt;
| 0x54501180&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD0]]&lt;br /&gt;
| 0x54501184&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT0]]&lt;br /&gt;
| 0x54501188&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC1]]&lt;br /&gt;
| 0x54501190&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD1]]&lt;br /&gt;
| 0x54501194&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT1]]&lt;br /&gt;
| 0x54501198&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC2]]&lt;br /&gt;
| 0x545011A0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD2]]&lt;br /&gt;
| 0x545011A4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT2]]&lt;br /&gt;
| 0x545011A8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC3]]&lt;br /&gt;
| 0x545011B0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD3]]&lt;br /&gt;
| 0x545011B4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT3]]&lt;br /&gt;
| 0x545011B8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC0]]&lt;br /&gt;
| 0x545011C0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD0]]&lt;br /&gt;
| 0x545011C4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC1]]&lt;br /&gt;
| 0x545011C8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD1]]&lt;br /&gt;
| 0x545011CC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC2]]&lt;br /&gt;
| 0x545011D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD2]]&lt;br /&gt;
| 0x545011D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC3]]&lt;br /&gt;
| 0x545011D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD3]]&lt;br /&gt;
| 0x545011DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC4]]&lt;br /&gt;
| 0x545011E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD4]]&lt;br /&gt;
| 0x545011E4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC5]]&lt;br /&gt;
| 0x545011E8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD5]]&lt;br /&gt;
| 0x545011EC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC6]]&lt;br /&gt;
| 0x545011F0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD6]]&lt;br /&gt;
| 0x545011F4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC7]]&lt;br /&gt;
| 0x545011F8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD7]]&lt;br /&gt;
| 0x545011FC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_CMD|TSEC_FALCON_ICD_CMD]]&lt;br /&gt;
| 0x54501200&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_ADDR|TSEC_FALCON_ICD_ADDR]]&lt;br /&gt;
| 0x54501204&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_WDATA|TSEC_FALCON_ICD_WDATA]]&lt;br /&gt;
| 0x54501208&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_RDATA|TSEC_FALCON_ICD_RDATA]]&lt;br /&gt;
| 0x5450120C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SCTL|TSEC_FALCON_SCTL]]&lt;br /&gt;
| 0x54501240&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SSTAT|TSEC_FALCON_SSTAT]]&lt;br /&gt;
| 0x54501244&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_250&lt;br /&gt;
| 0x54501250&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_260&lt;br /&gt;
| 0x54501260&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_IMEM|TSEC_FALCON_SPROT_IMEM]]&lt;br /&gt;
| 0x54501280&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_DMEM|TSEC_FALCON_SPROT_DMEM]]&lt;br /&gt;
| 0x54501284&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_CPUCTL|TSEC_FALCON_SPROT_CPUCTL]]&lt;br /&gt;
| 0x54501288&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_MISC|TSEC_FALCON_SPROT_MISC]]&lt;br /&gt;
| 0x5450128C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_IRQ|TSEC_FALCON_SPROT_IRQ]]&lt;br /&gt;
| 0x54501290&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_MTHD|TSEC_FALCON_SPROT_MTHD]]&lt;br /&gt;
| 0x54501294&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_SCTL|TSEC_FALCON_SPROT_SCTL]]&lt;br /&gt;
| 0x54501298&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_WDTMR|TSEC_FALCON_SPROT_WDTMR]]&lt;br /&gt;
| 0x5450129C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW|TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW]]&lt;br /&gt;
| 0x545012C0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH|TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH]]&lt;br /&gt;
| 0x545012C4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW|TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW]]&lt;br /&gt;
| 0x545012C8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH|TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH]]&lt;br /&gt;
| 0x545012CC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW|TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW]]&lt;br /&gt;
| 0x545012D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH|TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH]]&lt;br /&gt;
| 0x545012D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW|TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW]]&lt;br /&gt;
| 0x545012D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH|TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH]]&lt;br /&gt;
| 0x545012DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CTL|TSEC_FALCON_DMAINFO_CTL]]&lt;br /&gt;
| 0x545012E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]]&lt;br /&gt;
| 0x54501400&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]]&lt;br /&gt;
| 0x54501404&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_STAT|TSEC_SCP_CTL_STAT]]&lt;br /&gt;
| 0x54501408&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_LOCK|TSEC_SCP_CTL_LOCK]]&lt;br /&gt;
| 0x5450140C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CFG|TSEC_SCP_CFG]]&lt;br /&gt;
| 0x54501410&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_SCP|TSEC_SCP_CTL_SCP]]&lt;br /&gt;
| 0x54501414&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_PKEY|TSEC_SCP_CTL_PKEY]]&lt;br /&gt;
| 0x54501418&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_DBG|TSEC_SCP_CTL_DBG]]&lt;br /&gt;
| 0x5450141C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG0|TSEC_SCP_DBG0]]&lt;br /&gt;
| 0x54501420&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG1|TSEC_SCP_DBG1]]&lt;br /&gt;
| 0x54501424&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG2|TSEC_SCP_DBG2]]&lt;br /&gt;
| 0x54501428&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CMD|TSEC_SCP_CMD]]&lt;br /&gt;
| 0x54501430&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT0|TSEC_SCP_STAT0]]&lt;br /&gt;
| 0x54501450&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT1|TSEC_SCP_STAT1]]&lt;br /&gt;
| 0x54501454&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT2|TSEC_SCP_STAT2]]&lt;br /&gt;
| 0x54501458&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RNG_STAT0|TSEC_SCP_RNG_STAT0]]&lt;br /&gt;
| 0x54501470&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RNG_STAT1|TSEC_SCP_RNG_STAT1]]&lt;br /&gt;
| 0x54501474&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_IRQSTAT|TSEC_SCP_IRQSTAT]]&lt;br /&gt;
| 0x54501480&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_IRQMASK|TSEC_SCP_IRQMASK]]&lt;br /&gt;
| 0x54501484&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_ACL_ERR|TSEC_SCP_ACL_ERR]]&lt;br /&gt;
| 0x54501490&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_SEC_ERR|TSEC_SCP_SEC_ERR]]&lt;br /&gt;
| 0x54501494&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CMD_ERR|TSEC_SCP_CMD_ERR]]&lt;br /&gt;
| 0x54501498&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTL0]]&lt;br /&gt;
| 0x54501500&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RND_CTL1|TSEC_SCP_RND_CTL1]]&lt;br /&gt;
| 0x54501504&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL2&lt;br /&gt;
| 0x54501508&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL3&lt;br /&gt;
| 0x5450150C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL4&lt;br /&gt;
| 0x54501510&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL5&lt;br /&gt;
| 0x54501514&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL6&lt;br /&gt;
| 0x54501518&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL7&lt;br /&gt;
| 0x5450151C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL8&lt;br /&gt;
| 0x54501520&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL9&lt;br /&gt;
| 0x54501524&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL10&lt;br /&gt;
| 0x54501528&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL11&lt;br /&gt;
| 0x5450152C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_CTL|TSEC_TFBIF_CTL]]&lt;br /&gt;
| 0x54501600&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_MCCIF_FIFOCTRL|TSEC_TFBIF_MCCIF_FIFOCTRL]]&lt;br /&gt;
| 0x54501604&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_THROTTLE|TSEC_TFBIF_THROTTLE]]&lt;br /&gt;
| 0x54501608&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_STAT0|TSEC_TFBIF_DBG_STAT0]]&lt;br /&gt;
| 0x5450160C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_STAT1|TSEC_TFBIF_DBG_STAT1]]&lt;br /&gt;
| 0x54501610&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_RDCOUNT_LO|TSEC_TFBIF_DBG_RDCOUNT_LO]]&lt;br /&gt;
| 0x54501614&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_RDCOUNT_HI|TSEC_TFBIF_DBG_RDCOUNT_HI]]&lt;br /&gt;
| 0x54501618&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_WRCOUNT_LO|TSEC_TFBIF_DBG_WRCOUNT_LO]]&lt;br /&gt;
| 0x5450161C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_WRCOUNT_HI|TSEC_TFBIF_DBG_WRCOUNT_HI]]&lt;br /&gt;
| 0x54501620&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R32COUNT|TSEC_TFBIF_DBG_R32COUNT]]&lt;br /&gt;
| 0x54501624&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R64COUNT|TSEC_TFBIF_DBG_R64COUNT]]&lt;br /&gt;
| 0x54501628&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R128COUNT|TSEC_TFBIF_DBG_R128COUNT]]&lt;br /&gt;
| 0x5450162C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TFBIF_UNK_30&lt;br /&gt;
| 0x54501630&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_MCCIF_FIFOCTRL1|TSEC_TFBIF_MCCIF_FIFOCTRL1]]&lt;br /&gt;
| 0x54501634&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_WRR_RDP|TSEC_TFBIF_WRR_RDP]]&lt;br /&gt;
| 0x54501638&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_SPROT_EMEM|TSEC_TFBIF_SPROT_EMEM]]&lt;br /&gt;
| 0x54501640&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_TRANSCFG|TSEC_TFBIF_TRANSCFG]]&lt;br /&gt;
| 0x54501644&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_REGIONCFG|TSEC_TFBIF_REGIONCFG]]&lt;br /&gt;
| 0x54501648&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_MASK|TSEC_TFBIF_ACTMON_ACTIVE_MASK]]&lt;br /&gt;
| 0x5450164C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_BORPS|TSEC_TFBIF_ACTMON_ACTIVE_BORPS]]&lt;br /&gt;
| 0x54501650&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT|TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT]]&lt;br /&gt;
| 0x54501654&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_MASK|TSEC_TFBIF_ACTMON_MCB_MASK]]&lt;br /&gt;
| 0x54501660&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_BORPS|TSEC_TFBIF_ACTMON_MCB_BORPS]]&lt;br /&gt;
| 0x54501664&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_WEIGHT|TSEC_TFBIF_ACTMON_MCB_WEIGHT]]&lt;br /&gt;
| 0x54501668&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_THI_TRANSPROP|TSEC_TFBIF_THI_TRANSPROP]]&lt;br /&gt;
| 0x54501670&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_CG|TSEC_CG]]&lt;br /&gt;
| 0x545016D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_CTL|TSEC_BAR0_CTL]]&lt;br /&gt;
| 0x54501700&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_ADDR|TSEC_BAR0_ADDR]]&lt;br /&gt;
| 0x54501704&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_DATA|TSEC_BAR0_DATA]]&lt;br /&gt;
| 0x54501708&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_TIMEOUT|TSEC_BAR0_TIMEOUT]]&lt;br /&gt;
| 0x5450170C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_00&lt;br /&gt;
| 0x54501800&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_04&lt;br /&gt;
| 0x54501804&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_08&lt;br /&gt;
| 0x54501808&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_0C&lt;br /&gt;
| 0x5450180C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_10&lt;br /&gt;
| 0x54501810&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_14&lt;br /&gt;
| 0x54501814&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_18&lt;br /&gt;
| 0x54501818&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_1C&lt;br /&gt;
| 0x5450181C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_20&lt;br /&gt;
| 0x54501820&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_24&lt;br /&gt;
| 0x54501824&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_28&lt;br /&gt;
| 0x54501828&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_2C&lt;br /&gt;
| 0x5450182C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_30&lt;br /&gt;
| 0x54501830&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_34&lt;br /&gt;
| 0x54501834&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TEGRA_CTL|TSEC_TEGRA_CTL]]&lt;br /&gt;
| 0x54501838&lt;br /&gt;
| 0x04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_INDX&lt;br /&gt;
|-&lt;br /&gt;
| 10-17&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT_CTRL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_0&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_0&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_1&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_1&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_2&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_2&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_3&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_3&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_4&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_IMM&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_OPDONE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_RD_DONE&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_REG_WR_SAFE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_ENGINE_IDLE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW_INCR_SYNCPT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_INCR_SYNCPT_INDX&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_CURR_CLASS&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CTXSW_AUTO_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 11-20&lt;br /&gt;
| TSEC_THI_CTXSW_CURR_CHANNEL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW_NEXT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_NEXT_NEXT_CLASS&lt;br /&gt;
|-&lt;br /&gt;
| 10-19&lt;br /&gt;
| TSEC_THI_CTXSW_NEXT_NEXT_CHANNEL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONT_SYNCPT_EOF ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_EOF_INDEX&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_EOF_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONT_SYNCPT_L1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_L1_INDEX&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_L1_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_STREAMID0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_THI_STREAMID0_ID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_STREAMID1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_THI_STREAMID1_ID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_THI_SEC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_THI_SEC_TZ_LOCK&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_THI_SEC_TZ_AUTH&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_THI_THI_SEC_CH_LOCK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_METHOD0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_THI_METHOD0_OFFSET&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used to encode and send a method&#039;s ID over HOST1X to TSEC. This register mirrors the functionality of HOST1X&#039;s channel opcode submission.&lt;br /&gt;
&lt;br /&gt;
The following methods are available:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  ID&lt;br /&gt;
!  Method&lt;br /&gt;
|-&lt;br /&gt;
| 0x100&lt;br /&gt;
| NOP&lt;br /&gt;
|-&lt;br /&gt;
| 0x140&lt;br /&gt;
| PM_TRIGGER&lt;br /&gt;
|-&lt;br /&gt;
| 0x200&lt;br /&gt;
| SET_APPLICATION_ID&lt;br /&gt;
|-&lt;br /&gt;
| 0x204&lt;br /&gt;
| SET_WATCHDOG_TIMER&lt;br /&gt;
|-&lt;br /&gt;
| 0x240&lt;br /&gt;
| SEMAPHORE_A&lt;br /&gt;
|-&lt;br /&gt;
| 0x244&lt;br /&gt;
| SEMAPHORE_B&lt;br /&gt;
|-&lt;br /&gt;
| 0x248&lt;br /&gt;
| SEMAPHORE_C&lt;br /&gt;
|-&lt;br /&gt;
| 0x24C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x250&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x300&lt;br /&gt;
| EXECUTE&lt;br /&gt;
|-&lt;br /&gt;
| 0x304&lt;br /&gt;
| SEMAPHORE_D&lt;br /&gt;
|-&lt;br /&gt;
| 0x500&lt;br /&gt;
| HDCP_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x504&lt;br /&gt;
| HDCP_CREATE_SESSION&lt;br /&gt;
|-&lt;br /&gt;
| 0x508&lt;br /&gt;
| HDCP_VERIFY_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x50C&lt;br /&gt;
| HDCP_GENERATE_EKM&lt;br /&gt;
|-&lt;br /&gt;
| 0x510&lt;br /&gt;
| HDCP_REVOCATION_CHECK&lt;br /&gt;
|-&lt;br /&gt;
| 0x514&lt;br /&gt;
| HDCP_VERIFY_HPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x518&lt;br /&gt;
| HDCP_ENCRYPT_PAIRING_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x51C&lt;br /&gt;
| HDCP_DECRYPT_PAIRING_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x520&lt;br /&gt;
| HDCP_UPDATE_SESSION&lt;br /&gt;
|-&lt;br /&gt;
| 0x524&lt;br /&gt;
| HDCP_GENERATE_LC_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x528&lt;br /&gt;
| HDCP_VERIFY_LPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x52C&lt;br /&gt;
| HDCP_GENERATE_SKE_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x530&lt;br /&gt;
| HDCP_VERIFY_VPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x534&lt;br /&gt;
| HDCP_ENCRYPTION_RUN_CTRL&lt;br /&gt;
|-&lt;br /&gt;
| 0x538&lt;br /&gt;
| HDCP_SESSION_CTRL&lt;br /&gt;
|-&lt;br /&gt;
| 0x53C&lt;br /&gt;
| HDCP_COMPUTE_SPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x540&lt;br /&gt;
| HDCP_GET_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x544&lt;br /&gt;
| HDCP_EXCHANGE_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x548&lt;br /&gt;
| HDCP_DECRYPT_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x54C&lt;br /&gt;
| HDCP_GET_HPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x550&lt;br /&gt;
| HDCP_GENERATE_EKH_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x554&lt;br /&gt;
| HDCP_VERIFY_RTT_CHALLENGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x558&lt;br /&gt;
| HDCP_GET_LPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x55C&lt;br /&gt;
| HDCP_DECRYPT_KS&lt;br /&gt;
|-&lt;br /&gt;
| 0x560&lt;br /&gt;
| HDCP_DECRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x564&lt;br /&gt;
| HDCP_GET_RRX&lt;br /&gt;
|-&lt;br /&gt;
| 0x568&lt;br /&gt;
| HDCP_DECRYPT_REENCRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x56C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x570&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x574&lt;br /&gt;
| HDCP_DECRYPT_STORED_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x578&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x57C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x700&lt;br /&gt;
| HDCP_VALIDATE_SRM&lt;br /&gt;
|-&lt;br /&gt;
| 0x704&lt;br /&gt;
| HDCP_VALIDATE_STREAM&lt;br /&gt;
|-&lt;br /&gt;
| 0x708&lt;br /&gt;
| HDCP_TEST_SECURE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 0x70C&lt;br /&gt;
| HDCP_SET_DCP_KPUB&lt;br /&gt;
|-&lt;br /&gt;
| 0x710&lt;br /&gt;
| HDCP_SET_RX_KPUB&lt;br /&gt;
|-&lt;br /&gt;
| 0x714&lt;br /&gt;
| HDCP_SET_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x718&lt;br /&gt;
| HDCP_SET_SCRATCH_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x71C&lt;br /&gt;
| HDCP_SET_SRM&lt;br /&gt;
|-&lt;br /&gt;
| 0x720&lt;br /&gt;
| HDCP_SET_RECEIVER_ID_LIST&lt;br /&gt;
|-&lt;br /&gt;
| 0x724&lt;br /&gt;
| HDCP_SET_SPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x728&lt;br /&gt;
| HDCP_SET_ENC_INPUT_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x72C&lt;br /&gt;
| HDCP_SET_ENC_OUTPUT_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x730&lt;br /&gt;
| HDCP_GET_RTT_CHALLENGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x734&lt;br /&gt;
| HDCP_STREAM_MANAGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x738&lt;br /&gt;
| HDCP_READ_CAPS&lt;br /&gt;
|-&lt;br /&gt;
| 0x73C&lt;br /&gt;
| HDCP_ENCRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x740&lt;br /&gt;
| [6.0.0+] HDCP_GET_CURRENT_NONCE&lt;br /&gt;
|-&lt;br /&gt;
| 0x1114&lt;br /&gt;
| PM_TRIGGER_END&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_METHOD1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_METHOD1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used to encode and send a method&#039;s data over HOST1X to TSEC. This register mirrors the functionality of HOST1X&#039;s channel opcode submission.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONTEXT_SWITCH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_THI_CONTEXT_SWITCH_PTR&lt;br /&gt;
|-&lt;br /&gt;
| 30-31&lt;br /&gt;
| TSEC_THI_CONTEXT_SWITCH_TARGET&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INT_STATUS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INT_STATUS_FALCON_INT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INT_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INT_MASK_FALCON_INT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONFIG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_CONFIG0_RETURN_SYNCPT_ON_ERR&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_CONFIG0_IDLE_SYNCPT_INC_ENG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_DBG_MISC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_DBG_MISC_CLIENT_IDLE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_IDLE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_SYNCPT_PENDING_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_IDLE_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_SLCG_OVERRIDE_HIGH_A ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_THI_SLCG_OVERRIDE_HIGH_A_REG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_SLCG_OVERRIDE_LOW_A ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_SLCG_OVERRIDE_LOW_A_REG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CLK_OVERRIDE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_CLK_OVERRIDE_CYA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSSET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSSET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSSET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSSET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSSET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSSET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSSET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSSET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSSET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSSET_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSSET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for setting Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSCLR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for clearing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the status of Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMODE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for changing the mode Falcon&#039;s IRQs. A value of 1 means level triggered while a value of 0 means edge triggered.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMSET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMSET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMSET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMSET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMSET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMSET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMSET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMSET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMSET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMSET_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMSET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for setting the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMCLR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for clearing the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMASK_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMASK_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMASK_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMASK_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMASK_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMASK_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMASK_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMASK_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMASK_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMASK_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the value of the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQDEST ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_EXT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for routing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRINT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_GPTMRINT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRVAL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_GPTMRVAL_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_GPTMRCTL_GPTMREN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PTIMER0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_PTIMER0_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PTIMER1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_PTIMER1_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_WDTMRVAL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_WDTMRVAL_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_WDTMRCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_WDTMRCTL_WDTMREN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQDEST2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQDEST2_HOST_DMA&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQDEST2_TARGET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for routing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MAILBOX0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MAILBOX0_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Scratch register for reading/writing data to Falcon.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MAILBOX1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MAILBOX1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Scratch register for reading/writing data to Falcon.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ITFEN ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_ITFEN_CTXEN&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_ITFEN_MTHDEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for enabling/disabling Falcon interfaces.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IDLESTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IDLESTATE_FALCON_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 1-15&lt;br /&gt;
| TSEC_FALCON_IDLESTATE_EXT_BUSY&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for detecting if Falcon is busy or not.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CURCTX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXPTR&lt;br /&gt;
|-&lt;br /&gt;
| 28-29&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXTGT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_NXTCTX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXPTR&lt;br /&gt;
|-&lt;br /&gt;
| 28-29&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXTGT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CTXACK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CTXACK_SAVE_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CTXACK_REST_ACK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_FHSTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_FHSTATE_FALCON_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 1-15&lt;br /&gt;
| TSEC_FALCON_FHSTATE_EXT_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_FHSTATE_ENGINE_FAULTED&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_FHSTATE_STALL_REQ&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PRIVSTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_PRIVSTATE_PRIV&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MTHDDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDID ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_FALCON_MTHDID_ID&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_FALCON_MTHDID_SUBCH&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_MTHDID_PRIV&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_MTHDID_WPEND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDWDAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MTHDWDAT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDCOUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_MTHDCOUNT_COUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDPOP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_MTHDPOP_POP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDRAMSZ ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_MTHDRAMSZ_RAMSZ&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SFTRESET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_SFTRESET_EXT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_OS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_OS_VERSION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_RM_CONFIG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SOFT_PM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_PROBE&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_TRIGGER_END&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_TRIGGER_START&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SOFT_MODE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_SOFT_MODE_PROBE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DEBUG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_DEBUG1_MTHD_DRAIN_TIME&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_DEBUG1_CTXSW_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_DEBUG1_TRACE_FORMAT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DEBUGINFO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DEBUGINFO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for UCODE self revocation. This register takes the base address of the GSC carveout shifted right by 8.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] [[NV_services|nvservices]] sets this to 0x8005FF00 &amp;gt;&amp;gt; 8 (physical DRAM address inside the GPU UCODE carveout) before starting the nvhost_tsec firmware.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CGCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CGCTL_CG_OVERRIDE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ENGCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_ENGCTL_INV_CONTEXT&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_ENGCTL_SET_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_ENGCTL_CLR_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_ENGCTL_SWITCH_CONTEXT&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_FALCON_ENGCTL_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_FALCON_ENGCTL_STALLACK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PMM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_STALL_SEL&lt;br /&gt;
 0x00: ANY&lt;br /&gt;
 0x01: CODE&lt;br /&gt;
 0x02: DMAQ&lt;br /&gt;
 0x03: DMFENCE&lt;br /&gt;
 0x04: DMWAIT&lt;br /&gt;
 0x05: IMWAIT&lt;br /&gt;
 0x06: IPND&lt;br /&gt;
 0x07: LDSTQ&lt;br /&gt;
 0x08: SB&lt;br /&gt;
 0x09: ANY_SC&lt;br /&gt;
 0x0A: CODE_SC&lt;br /&gt;
 0x0B: DMAQ_SC&lt;br /&gt;
 0x0C: DMFENCE_SC&lt;br /&gt;
 0x0D: DMWAIT_SC&lt;br /&gt;
 0x0E: IMWAIT_SC&lt;br /&gt;
 0x0F: IPND_SC&lt;br /&gt;
 0x10: LDSTQ_SC&lt;br /&gt;
 0x11: SB_SC&lt;br /&gt;
|-&lt;br /&gt;
| 5-7&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_IDLE_SEL&lt;br /&gt;
 0x00: WAITING&lt;br /&gt;
 0x01: ENG_IDLE&lt;br /&gt;
 0x02: MTHD_FULL&lt;br /&gt;
 0x03: WAITING_SC&lt;br /&gt;
 0x04: ENG_IDLE_SC&lt;br /&gt;
 0x05: MTHD_FULL_SC&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_SOFTPM0_SEL&lt;br /&gt;
 0x00: 0&lt;br /&gt;
 0x01: 1&lt;br /&gt;
 0x02: 2&lt;br /&gt;
 0x03: 3&lt;br /&gt;
 0x04: 4&lt;br /&gt;
 0x05: 5&lt;br /&gt;
 0x06: 0_SC&lt;br /&gt;
 0x07: 1_SC&lt;br /&gt;
 0x08: 2_SC&lt;br /&gt;
 0x09: 3_SC&lt;br /&gt;
 0x0A: 4_SC&lt;br /&gt;
 0x0B: 5_SC&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_SOFTPM1_SEL&lt;br /&gt;
 0x00: 0&lt;br /&gt;
|-&lt;br /&gt;
| 17-19&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_DSTAT_SEL&lt;br /&gt;
 0x00: 1KTRANSFER&lt;br /&gt;
 0x01: RREQ&lt;br /&gt;
 0x02: WREQ&lt;br /&gt;
 0x03: TWREQ&lt;br /&gt;
 0x04: 1KTRANSFER_SC&lt;br /&gt;
 0x05: RREQ_SC&lt;br /&gt;
 0x06: WREQ_SC&lt;br /&gt;
 0x07: TWREQ_SC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL0_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
 0x01: RACKQ_FULL&lt;br /&gt;
 0x02: WREQQ_FULL&lt;br /&gt;
 0x03: WDATQ_FULL&lt;br /&gt;
 0x04: WACKQ_FULL&lt;br /&gt;
 0x05: MREQQ_FULL&lt;br /&gt;
 0x06: RREQ_PEND&lt;br /&gt;
 0x07: WREQ_PEND&lt;br /&gt;
 0x08: RDATQ_FULL_SC&lt;br /&gt;
 0x09: RACKQ_FULL_SC&lt;br /&gt;
 0x0A: WREQQ_FULL_SC&lt;br /&gt;
 0x0B: WDATQ_FULL_SC&lt;br /&gt;
 0x0C: WACKQ_FULL_SC&lt;br /&gt;
 0x0D: MREQQ_FULL_SC&lt;br /&gt;
 0x0E: RREQ_PEND_SC&lt;br /&gt;
 0x0F: WREQ_PEND_SC&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL1_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL2_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_ADDR_LSB&lt;br /&gt;
|-&lt;br /&gt;
| 6-11&lt;br /&gt;
| TSEC_FALCON_ADDR_MSB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT3 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT4 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT5 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXCI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-19&lt;br /&gt;
| TSEC_FALCON_EXCI_EXPC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| TSEC_FALCON_EXCI_EXCAUSE&lt;br /&gt;
 0x00: TRAP0&lt;br /&gt;
 0x01: TRAP1&lt;br /&gt;
 0x02: TRAP2&lt;br /&gt;
 0x03: TRAP3&lt;br /&gt;
 0x08: ILL_INS (invalid opcode)&lt;br /&gt;
 0x09: INV_INS (authentication entry)&lt;br /&gt;
 0x0A: MISS_INS (page miss)&lt;br /&gt;
 0x0B: DHIT_INS (page multiple hit)&lt;br /&gt;
 0x0F: BRKPT_INS (breakpoint hit)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information about raised exceptions.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SVEC_SPR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_FALCON_SVEC_SPR_SIGPASS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RSTAT0 ===&lt;br /&gt;
Mirror of the [[#TSEC_FALCON_ICD_RDATA|ICD status register 0]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RSTAT3 ===&lt;br /&gt;
Mirror of the [[#TSEC_FALCON_ICD_RDATA|ICD status register 3]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CPUCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CPUCTL_IINVAL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CPUCTL_STARTCPU&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_CPUCTL_SRESET&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_CPUCTL_HRESET&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_CPUCTL_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_CPUCTL_STOPPED&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_CPUCTL_ALIAS_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for signaling the Falcon CPU.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_BOOTVEC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_BOOTVEC_VEC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the Falcon&#039;s boot vector address.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_HWCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-8&lt;br /&gt;
| TSEC_FALCON_HWCFG_IMEM_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 9-17&lt;br /&gt;
| TSEC_FALCON_HWCFG_DMEM_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 18-26&lt;br /&gt;
| TSEC_FALCON_HWCFG_METHODFIFO_DEPTH&lt;br /&gt;
|-&lt;br /&gt;
| 27-31&lt;br /&gt;
| TSEC_FALCON_HWCFG_DMAQUEUE_DEPTH&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMACTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMACTL_REQUIRE_CTX&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMACTL_DMEM_SCRUBBING&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_DMACTL_IMEM_SCRUBBING&lt;br /&gt;
|-&lt;br /&gt;
| 3-6&lt;br /&gt;
| TSEC_FALCON_DMACTL_DMAQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_DMACTL_SECURE_STAT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring the Falcon&#039;s DMA engine.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFBASE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMATRFBASE_BASE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Base address of the external memory buffer, shifted right by 8.&lt;br /&gt;
&lt;br /&gt;
The current transfer address is calculated by adding [[#TSEC_FALCON_DMATRFFBOFFS|TSEC_FALCON_DMATRFFBOFFS]] to the base.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFMOFFS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_DMATRFMOFFS_OFFS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For transfers to DMEM: the destination address.&lt;br /&gt;
For transfers to IMEM: the destination virtual IMEM page.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFCMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_FULL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 2-3&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_SEC&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_IMEM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_WRITE&lt;br /&gt;
|-&lt;br /&gt;
| 8-10&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_CTXDMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring DMA transfers.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFFBOFFS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMATRFFBOFFS_OFFS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For transfers to IMEM: the destination physical IMEM page.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAPOLL_FB ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_FENCE_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_DMA_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_CFG_R_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_CFG_W_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_WCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_RCOUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of a DMA transfer between the Falcon and external memory.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAPOLL_CP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_FENCE_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_DMA_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_CFG_R_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_CFG_W_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_WCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_RCOUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of a DMA transfer between the Falcon and the SCP.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_HWCFG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CORE_REV&lt;br /&gt;
|-&lt;br /&gt;
| 4-5&lt;br /&gt;
| TSEC_FALCON_HWCFG1_SECURITY_MODEL&lt;br /&gt;
|-&lt;br /&gt;
| 6-7&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CORE_REV_SUBVERSION&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_HWCFG1_IMEM_PORTS&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DMEM_PORTS&lt;br /&gt;
|-&lt;br /&gt;
| 16-20&lt;br /&gt;
| TSEC_FALCON_HWCFG1_TAG_WIDTH&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DBG_PRIV_BUS&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CSB_SIZE_16M&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_HWCFG1_PRIV_DIRECT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DMEM_APERTURES&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_HWCFG1_IMEM_AUTOFILL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CPUCTL_ALIAS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CPUCTL_ALIAS_STARTCPU&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_STACKCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_STACKCFG_BOTTOM&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_STACKCFG_SPEXC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IMCTL_ADDR_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_FALCON_IMCTL_CMD&lt;br /&gt;
 0x00: NOP&lt;br /&gt;
 0x01: IMINV (ITLB)&lt;br /&gt;
 0x02: IMBLK (PTLB)&lt;br /&gt;
 0x03: IMTAG (VTLB)&lt;br /&gt;
 0x04: IMTAG_SETVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the Falcon TLB.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_IMSTAT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the result of the last command from [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_TRACEIDX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_MAXIDX&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_CNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the index for tracing with [[#TSEC_FALCON_TRACEPC|TSEC_FALCON_TRACEPC]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_TRACEPC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_TRACEPC_PC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the PC of the last call or branch executed.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLRNG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG0_TAG_LO&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG0_TAG_HI&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLRNG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG1_TAG_LO&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG1_TAG_HI&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_IMFILLCTL_NBLOCKS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMCTL_DEBUG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IMCTL_DEBUG_ADDR_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_FALCON_IMCTL_DEBUG_CMD&lt;br /&gt;
 0x00: NOP&lt;br /&gt;
 0x02: IMBLK&lt;br /&gt;
 0x03: IMTAG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CMEMBASE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 18-31&lt;br /&gt;
| TSEC_FALCON_CMEMBASE_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMAPERT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_TIME_OUT&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_TIME_UNIT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 17-19&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_LDSTQ_NUM&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXTERRADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_EXTERRADDR_ADDR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXTERRSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_PC&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_STAT&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_VALID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CG2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_DMA&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_GC6_SR_FSM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_PIPE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_DIV&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_ICD&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_CFG&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_PMB&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_RF&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_MUL&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_LDST&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_TSYNC&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_IRQSTAT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_TOP&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FBIF&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 2-7&lt;br /&gt;
| TSEC_FALCON_IMEMC_OFFS&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IMEMC_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_FALCON_IMEMC_AINCW&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_FALCON_IMEMC_AINCR&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_FALCON_IMEMC_SECURE&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_ATOMIC&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_WR_VIO&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_LOCK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring access to Falcon&#039;s IMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_IMEMD_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the value for an IMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMEMT_TAG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the virtual page index for an IMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 2-7&lt;br /&gt;
| TSEC_FALCON_DMEMC_OFFS&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_DMEMC_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_FALCON_DMEMC_AINCW&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_FALCON_DMEMC_AINCR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring access to Falcon&#039;s DMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMEMD_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the value for a DMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_CMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_OPC&lt;br /&gt;
 0x00: STOP&lt;br /&gt;
 0x01: RUN (run from PC)&lt;br /&gt;
 0x02: JRUN (run from address)&lt;br /&gt;
 0x03: RUNB (run from PC)&lt;br /&gt;
 0x04: JRUNB (run from address)&lt;br /&gt;
 0x05: STEP (step from PC)&lt;br /&gt;
 0x06: JSTEP (step from address)&lt;br /&gt;
 0x07: EMASK (set exception mask)&lt;br /&gt;
 0x08: RREG (read register)&lt;br /&gt;
 0x09: WREG (write register)&lt;br /&gt;
 0x0A: RDM (read data memory)&lt;br /&gt;
 0x0B: WDM (write data memory)&lt;br /&gt;
 0x0C: RCM (read MMIO/configuration memory)&lt;br /&gt;
 0x0D: WCM (write MMIO/configuration memory)&lt;br /&gt;
 0x0E: RSTAT (read status)&lt;br /&gt;
 0x0F: SBU (store buffer update)&lt;br /&gt;
|-&lt;br /&gt;
| 6-7&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_SZ&lt;br /&gt;
 0x00: B (byte)&lt;br /&gt;
 0x01: HW (half word)&lt;br /&gt;
 0x02: W (word)&lt;br /&gt;
|-&lt;br /&gt;
| 8-12&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_IDX&lt;br /&gt;
 0x00: REG0 | RSTAT0 | WB0&lt;br /&gt;
 0x01: REG1 | RSTAT1 | WB1&lt;br /&gt;
 0x02: REG2 | RSTAT2 | WB2&lt;br /&gt;
 0x03: REG3 | RSTAT3 | WB3&lt;br /&gt;
 0x04: REG4 | RSTAT4&lt;br /&gt;
 0x05: REG5 | RSTAT5&lt;br /&gt;
 0x06: REG6&lt;br /&gt;
 0x07: REG7&lt;br /&gt;
 0x08: REG8&lt;br /&gt;
 0x09: REG9&lt;br /&gt;
 0x0A: REG10&lt;br /&gt;
 0x0B: REG11&lt;br /&gt;
 0x0C: REG12&lt;br /&gt;
 0x0D: REG13&lt;br /&gt;
 0x0E: REG14&lt;br /&gt;
 0x0F: REG15&lt;br /&gt;
 0x10: IV0&lt;br /&gt;
 0x11: IV1&lt;br /&gt;
 0x12: UNDEFINED&lt;br /&gt;
 0x13: EV&lt;br /&gt;
 0x14: SP&lt;br /&gt;
 0x15: PC&lt;br /&gt;
 0x16: IMB&lt;br /&gt;
 0x17: DMB&lt;br /&gt;
 0x18: CSW&lt;br /&gt;
 0x19: CCR&lt;br /&gt;
 0x1A: SEC&lt;br /&gt;
 0x1B: CTX&lt;br /&gt;
 0x1C: EXCI&lt;br /&gt;
 0x1D: SEC1&lt;br /&gt;
 0x1E: IMB1&lt;br /&gt;
 0x1F: DMB1&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_ERROR&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_RDVLD&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_PARM&lt;br /&gt;
 0x0001: EMASK_TRAP0&lt;br /&gt;
 0x0002: EMASK_TRAP1&lt;br /&gt;
 0x0004: EMASK_TRAP2&lt;br /&gt;
 0x0008: EMASK_TRAP3&lt;br /&gt;
 0x0010: EMASK_EXC_UNIMP&lt;br /&gt;
 0x0020: EMASK_EXC_IMISS&lt;br /&gt;
 0x0040: EMASK_EXC_IMHIT&lt;br /&gt;
 0x0080: EMASK_EXC_IBREAK&lt;br /&gt;
 0x0100: EMASK_IV0&lt;br /&gt;
 0x0200: EMASK_IV1&lt;br /&gt;
 0x0400: EMASK_IV2&lt;br /&gt;
 0x0800: EMASK_EXT0&lt;br /&gt;
 0x1000: EMASK_EXT1&lt;br /&gt;
 0x2000: EMASK_EXT2&lt;br /&gt;
 0x4000: EMASK_EXT3&lt;br /&gt;
 0x8000: EMASK_EXT4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for sending commands to the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_ADDR_ADDR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the target address for the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_WDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_WDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the data for writing using the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_RDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_RDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the data read using the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
When reading from an internal status register (STAT), the following applies:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| RSTAT0_MEM_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| RSTAT0_DMA_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| RSTAT0_FENCE_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| RSTAT0_DIV_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT0_DMA_STALL_DMAQ&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| RSTAT0_DMA_STALL_DMWAITING&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| RSTAT0_DMA_STALL_IMWAITING&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| RSTAT0_ANY_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| RSTAT0_SBFULL_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| RSTAT0_SBHIT_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| RSTAT0_FLOW_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| RSTAT0_SP_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| RSTAT0_BL_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| RSTAT0_IPND_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| RSTAT0_LDSTQ_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| RSTAT0_NOINSTR_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT0_HALTSTOP_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT0_AFILL_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT0_EXC_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 23-25&lt;br /&gt;
| RSTAT0_IRQ_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| RSTAT0_VALIDRD&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| RSTAT0_WAITING&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| RSTAT0_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| RSTAT0_MTHD_FULL&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| RSTAT1_WB_ALLOC&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| RSTAT1_WB_VALID&lt;br /&gt;
|-&lt;br /&gt;
| 8-9&lt;br /&gt;
| RSTAT1_WB0_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 10-11&lt;br /&gt;
| RSTAT1_WB1_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| RSTAT1_WB2_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 14-15&lt;br /&gt;
| RSTAT1_WB3_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 16-19&lt;br /&gt;
| RSTAT1_WB0_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| RSTAT1_WB1_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| RSTAT1_WB2_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| RSTAT1_WB3_IDX&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| RSTAT2_DMAQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT2_DMA_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 5-7&lt;br /&gt;
| RSTAT2_LDSTQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 16-19&lt;br /&gt;
| RSTAT2_EM_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| RSTAT2_EM_ACKED&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| RSTAT2_EM_ISWR&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| RSTAT2_EM_DVLD&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| RSTAT3_MTHD_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| RSTAT3_CTXSW_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| RSTAT3_DMA_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| RSTAT3_SCP_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT3_LDST_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| RSTAT3_SBWB_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 6-8&lt;br /&gt;
| RSTAT3_CSWIE&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| RSTAT3_CSWE&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| RSTAT3_CTXSW_STATE&lt;br /&gt;
 0x00: IDLE&lt;br /&gt;
 0x01: SM_CHECK&lt;br /&gt;
 0x02: SM_SAVE&lt;br /&gt;
 0x03: SM_SAVE_WAIT&lt;br /&gt;
 0x04: SM_BLK_BIND&lt;br /&gt;
 0x05: SM_RESET&lt;br /&gt;
 0x06: SM_RESETWAIT&lt;br /&gt;
 0x07: SM_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| RSTAT3_CTXSW_PEND&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| RSTAT3_DMA_FBREQ_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| RSTAT3_DMA_ACKQ_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| RSTAT3_DMA_RDQ_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT3_DMA_WR_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT3_DMA_RD_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT3_LDST_XT_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| RSTAT3_LDST_XT_BLOCK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| RSTAT3_ENG_IDLE&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| RSTAT4_ICD_STATE&lt;br /&gt;
 0x00: NORMAL&lt;br /&gt;
 0x01: WAIT_ISSUE_CLEAR&lt;br /&gt;
 0x02: WAIT_EXLDQ_CLEAR&lt;br /&gt;
 0x03: FULL_DBG_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 2-3&lt;br /&gt;
| RSTAT4_ICD_MODE&lt;br /&gt;
 0x00: SUPPRESSICD&lt;br /&gt;
 0x01: ENTERICD_IBRK&lt;br /&gt;
 0x02: ENTERICD_STEP&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP0&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP1&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP2&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP3&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_UNIMP&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IMISS&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IMHIT&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IBREAK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV0&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV1&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV2&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT0&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT1&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT2&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT3&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT4&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| RSTAT5_LRU_STATE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_SCTL_LSMODE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_SCTL_HSMODE&lt;br /&gt;
|-&lt;br /&gt;
| 4-5&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| Initialize the transition to LS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| Set on memory protection violation&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_IMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to Falcon IMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_DMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to Falcon DMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_CPUCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the [[#TSEC_FALCON_CPUCTL|TSEC_FALCON_CPUCTL]] register.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_MISC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_PRIVSTATE|TSEC_FALCON_PRIVSTATE]]&lt;br /&gt;
* [[#TSEC_FALCON_SFTRESET|TSEC_FALCON_SFTRESET]]&lt;br /&gt;
* [[#TSEC_FALCON_ADDR|TSEC_FALCON_ADDR]]&lt;br /&gt;
* [[#TSEC_FALCON_DMACTL|TSEC_FALCON_DMACTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IMSTAT|TSEC_FALCON_IMSTAT]]&lt;br /&gt;
* TSEC_FALCON_UNK_250&lt;br /&gt;
* [[#TSEC_FALCON_DMAINFO_CTL|TSEC_FALCON_DMAINFO_CTL]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_IRQ ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_IRQMODE|TSEC_FALCON_IRQMODE]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQMSET|TSEC_FALCON_IRQMSET]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQMCLR|TSEC_FALCON_IRQMCLR]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQDEST|TSEC_FALCON_IRQDEST]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRINT|TSEC_FALCON_GPTMRINT]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRVAL|TSEC_FALCON_GPTMRVAL]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRCTL|TSEC_FALCON_GPTMRCTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQDEST2|TSEC_FALCON_IRQDEST2]]&lt;br /&gt;
* TSEC_FALCON_UNK_E0&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_MTHD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_ITFEN|TSEC_FALCON_ITFEN]]&lt;br /&gt;
* [[#TSEC_FALCON_CURCTX|TSEC_FALCON_CURCTX]]&lt;br /&gt;
* [[#TSEC_FALCON_NXTCTX|TSEC_FALCON_NXTCTX]]&lt;br /&gt;
* [[#TSEC_FALCON_CTXACK|TSEC_FALCON_CTXACK]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDDATA|TSEC_FALCON_MTHDDATA]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDID|TSEC_FALCON_MTHDID]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDWDAT|TSEC_FALCON_MTHDWDAT]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDCOUNT|TSEC_FALCON_MTHDCOUNT]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDPOP|TSEC_FALCON_MTHDPOP]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDRAMSZ|TSEC_FALCON_MTHDRAMSZ]]&lt;br /&gt;
* [[#TSEC_FALCON_DEBUG1|TSEC_FALCON_DEBUG1]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_SCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the [[#TSEC_FALCON_SCTL|TSEC_FALCON_SCTL]] register.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_WDTMR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_WDTMRVAL|TSEC_FALCON_WDTMRVAL]]&lt;br /&gt;
* [[#TSEC_FALCON_WDTMRCTL|TSEC_FALCON_WDTMRCTL]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CTL_CLR_FBRD&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CTL_CLR_FBWR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| Enable the [[#LOAD|LOAD]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Enable the [[#STORE|STORE]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| Enable the [[#CMD|CMD]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Enable the [[#SEQ|SEQ]] block&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Enable the [[#CTL|CTL]] block&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Clear [[#SEQ|SEQ]] block&#039;s pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Clear the main [[#SCP|SCP]] pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| Enable [[#RNG|RNG]] block&#039;s test mode&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Enable the [[#RNG|RNG]] block&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Enable [[#LOAD|LOAD]] block&#039;s interface dummy mode (all reads return 0)&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Enable [[#LOAD|LOAD]] block&#039;s interface bypassing (all reads are dropped)&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Enable [[#STORE|STORE]] block&#039;s interface bypassing (all writes are dropped)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_STAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_SCP_CTL_STAT_DEBUG_MODE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_LOCK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Enable lockdown mode (locks IMEM and DMEM)&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Lock the [[#SCP|SCP]]&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls lockdown mode and can only be cleared in Heavy Secure mode.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#AES|AES]] block&#039;s endianness&lt;br /&gt;
 0: Little&lt;br /&gt;
 1: Big&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Flush [[#CMD|CMD]] block&#039;s pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| Carry chain size&lt;br /&gt;
 0: 32 bits&lt;br /&gt;
 1: 64 bits&lt;br /&gt;
 2: 96 bits&lt;br /&gt;
 3: 128 bits&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| Timeout value&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_SCP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Swap [[#SCP|SCP]] master&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Current [[#SCP|SCP]] master&lt;br /&gt;
 0: Falcon&lt;br /&gt;
 1: External&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_PKEY ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_SCP_CTL_PKEY_REQUEST_RELOAD&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_SCP_CTL_PKEY_LOADED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_DBG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Index&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Auto-increment&lt;br /&gt;
|-&lt;br /&gt;
| 5-6&lt;br /&gt;
| Target&lt;br /&gt;
 0: None&lt;br /&gt;
 1: STORE&lt;br /&gt;
 2: LOAD&lt;br /&gt;
 3: SEQ&lt;br /&gt;
|-&lt;br /&gt;
| 8-12&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current sequence size&lt;br /&gt;
|-&lt;br /&gt;
| 13-16&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction address&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction is valid&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| [[#SEQ|SEQ]] block is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 19-22&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s pipeline size&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s current operation is valid&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#LOAD|LOAD]] block is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 25-26&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s pipeline size&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s current operation is valid&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| [[#STORE|STORE]] block is running in HS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for debugging the [[#LOAD|LOAD]], [[#STORE|STORE]] and [[#SEQ|SEQ]] blocks.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s first operand&lt;br /&gt;
|-&lt;br /&gt;
| 4-9&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s second operand&lt;br /&gt;
|-&lt;br /&gt;
| 10-14&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s opcode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for retrieving debug data. Contains information on the last crypto sequence created when debugging the SEQ controller.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s state&lt;br /&gt;
 0: Idle&lt;br /&gt;
 1: Recording is active (cs0begin/cs1begin)&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Number of [[#SEQ|SEQ]] block&#039;s instructions left&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| Active crypto key register&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for retrieving additional debug data associated with the [[#SEQ|SEQ]] block.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Destination register&lt;br /&gt;
|-&lt;br /&gt;
| 8-13&lt;br /&gt;
| Source register or immediate value&lt;br /&gt;
|-&lt;br /&gt;
| 20-24&lt;br /&gt;
| Command opcode&lt;br /&gt;
 0x0:  nop (fuc5 opcode 0x00) &lt;br /&gt;
 0x1:  cmov (fuc5 opcode 0x84)&lt;br /&gt;
 0x2:  cxsin (fuc5 opcode 0x88) or xdst (with cxset)&lt;br /&gt;
 0x3:  cxsout (fuc5 opcode 0x8C) or xdld (with cxset) &lt;br /&gt;
 0x4:  crnd (fuc5 opcode 0x90)&lt;br /&gt;
 0x5:  cs0begin (fuc5 opcode 0x94)&lt;br /&gt;
 0x6:  cs0exec (fuc5 opcode 0x98)&lt;br /&gt;
 0x7:  cs1begin (fuc5 opcode 0x9C)&lt;br /&gt;
 0x8:  cs1exec (fuc5 opcode 0xA0)&lt;br /&gt;
 0x9:  invalid (fuc5 opcode 0xA4)&lt;br /&gt;
 0xA:  cchmod (fuc5 opcode 0xA8)&lt;br /&gt;
 0xB:  cxor (fuc5 opcode 0xAC)&lt;br /&gt;
 0xC:  cadd (fuc5 opcode 0xB0)&lt;br /&gt;
 0xD:  cand (fuc5 opcode 0xB4)&lt;br /&gt;
 0xE:  crev (fuc5 opcode 0xB8)&lt;br /&gt;
 0xF:  cprecmac (fuc5 opcode 0xBC)&lt;br /&gt;
 0x10: csecret (fuc5 opcode 0xC0)&lt;br /&gt;
 0x11: ckeyreg (fuc5 opcode 0xC4)&lt;br /&gt;
 0x12: ckexp (fuc5 opcode 0xC8)&lt;br /&gt;
 0x13: ckrexp (fuc5 opcode 0xCC)&lt;br /&gt;
 0x14: cenc (fuc5 opcode 0xD0)&lt;br /&gt;
 0x15: cdec (fuc5 opcode 0xD4)&lt;br /&gt;
 0x16: csigcmp (fuc5 opcode 0xD8)&lt;br /&gt;
 0x17: csigenc (fuc5 opcode 0xDC)&lt;br /&gt;
 0x18: csigclr (fuc5 opcode 0xE0)&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s current instruction is valid&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| [[#CMD|CMD]] block is running in HS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on the last crypto command executed.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#SCP|SCP]] is active&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| [[#SEQ|SEQ]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#CTL|CTL]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| [[#AES|AES]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#RNG|RNG]] block is active&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of the hardware blocks and interfaces.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| Signature comparison result&lt;br /&gt;
 0: None&lt;br /&gt;
 1: Running&lt;br /&gt;
 2: Failed&lt;br /&gt;
 3: Succeeded&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface received a valid operation&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface received a valid instruction&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of the last authentication attempt and other miscellaneous statuses.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4&lt;br /&gt;
| Current [[#SEQ|SEQ]] block opcode&lt;br /&gt;
|-&lt;br /&gt;
| 5-9&lt;br /&gt;
| Current [[#CMD|CMD]] block&#039;s interface opcode&lt;br /&gt;
|-&lt;br /&gt;
| 10-14&lt;br /&gt;
| Pending [[#CMD|CMD]] block opcode&lt;br /&gt;
|-&lt;br /&gt;
| 15-16&lt;br /&gt;
| Current [[#AES|AES]] block operation&lt;br /&gt;
 0: Encryption&lt;br /&gt;
 1: Decryption&lt;br /&gt;
 2: Key expansion&lt;br /&gt;
 3: Key reverse expansion&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| [[#STORE|STORE]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| [[#LOAD|LOAD]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| [[#RNG|RNG]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| [[#AES|AES]] block is stalled&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of crypto operations.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RNG_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] block is ready&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RNG_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_IRQSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| ACL error&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| SEC error&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#CMD|CMD]] error&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Single step&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#RND|RND]] operation&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Timeout&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the status of crypto IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_IRQMASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| ACL error&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| SEC error&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#CMD|CMD]] error&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Single step&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#RND|RND]] operation&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Timeout&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the value of the mask for crypto IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_ACL_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Writing to a crypto register without the correct ACL&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Reading from a crypto register without the correct ACL&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Invalid ACL change (cchmod)&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| ACL error occurred&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on errors generated by the [[#TSEC_SCP_IRQSTAT|ACL error]] IRQ.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_SEC_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 1-2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 5-6&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 17-18&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 21-22&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 25-26&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| SEC error occurred&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CMD_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Invalid [[#CMD|CMD]] command&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Empty [[#SEQ|SEQ]] sequence&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#SEQ|SEQ]] sequence is too long&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| [[#SEQ|SEQ]] sequence was not finished&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Forbidden signature operation (csigcmp, csigenc or csigclr in NS mode)&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Invalid signature operation (csigcmp in HS mode)&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Forbidden ACL change (cchmod in NS mode)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on errors generated by the [[#TSEC_SCP_IRQSTAT|CMD error]] IRQ.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RND_CTL0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| [[#RND|RND]] clock trigger lower limit&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RND_CTL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| [[#RND|RND]] clock trigger upper limit&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| [[#RND|RND]] clock trigger mask&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_BWCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_CTL_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_IDLEWDERR&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_CTL_RESET&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_CTL_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_CTL_IDLEWDERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_CTL_SRTOUT&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_SRTOUT&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_TFBIF_CTL_SRTOVAL&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_CTL_VPR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_MCCIF_FIFOCTRL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WRCL_MCLE2X&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RDMC_RDFAST&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WRMC_CLLE2X&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RDCL_RDFAST&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_CCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RCLK_OVR_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WCLK_OVR_MODE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_THROTTLE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_BUCKET_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 16-27&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_LEAK_COUNT&lt;br /&gt;
|-&lt;br /&gt;
| 30-31&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_LEAK_SIZE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_1K_TRANSFER&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RREQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WREQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_TAGQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RDATQ&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RACKQ&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WREQQ&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WDATQ&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WACKQ&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RREQ_PENDING&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WREQ_PENDING&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_MREQ&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_ENGINE_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RMCCIF_IDLE &lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WMCCIF_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_CSB_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RU_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WU_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_UNWEIGHT_ACTMON_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_UNWEIGHT_ACTMON_MCB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_RDCOUNT_LO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_RDCOUNT_LO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_RDCOUNT_HI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_RDCOUNT_HI_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_WRCOUNT_LO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_WRCOUNT_LO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_WRCOUNT_HI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_WRCOUNT_HI_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R32COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R32COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R64COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R64COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R128COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R128COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_MCCIF_FIFOCTRL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL1_SRD2MC_REORDER_DEPTH_LIMIT&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL1_SWR2MC_REORDER_DEPTH_LIMIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_WRR_RDP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_TFBIF_WRR_RDP_EXT_WEIGHT&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_TFBIF_WRR_RDP_INT_WEIGHT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_SPROT_EMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to external memory regions. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_TRANSCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT0_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT1_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT2_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT3_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT4_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT5_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT6_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT7_SWID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Configures the software ID per CTXDMA port for memory transactions. Software ID 0 (HW_SWID) forces all transactions to go through the SMMU while software ID 1 (PHY_SWID) bypasses it. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] The nvhost_tsec firmware sets this register to 0x10 or 0x111110 before reading memory from the GPU UCODE carveout.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_REGIONCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-2&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T0_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T0_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 4-6&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T1_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T1_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 8-10&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T2_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T2_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T3_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T3_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 16-18&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T4_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T4_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 20-22&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T5_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T5_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T6_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T6_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 28-30&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T7_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T7_VPR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Configures the aperture ID and VPR mode per CTXDMA port for memory region accessing. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] The nvhost_tsec firmware sets this register to 0x20 or 0x140 before reading memory from the GPU UCODE carveout.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_STARVED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_STALLED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_DELAYED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_ACTIVE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the memory access mask for the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_BORPS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STARVED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STARVED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STALLED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STALLED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_DELAYED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_DELAYED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_ACTIVE_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_ACTIVE_OPERATION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the billions of records per second count for the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_STARVED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_STALLED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_DELAYED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_ACTIVE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_BORPS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STARVED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STARVED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STALLED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STALLED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_DELAYED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_DELAYED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_ACTIVE_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_ACTIVE_OPERATION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_WEIGHT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_WEIGHT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_THI_TRANSPROP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_STREAMID0&lt;br /&gt;
|-&lt;br /&gt;
| 8-14&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_STREAMID1&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_TZ_AUTH&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_CG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_CG_IDLE_CG_DLY_CNT&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_CG_IDLE_CG_EN&lt;br /&gt;
|-&lt;br /&gt;
| 16-18&lt;br /&gt;
| TSEC_CG_WAKEUP_DLY_CNT&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_CG_WAKEUP_DLY_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_BAR0_CTL_READ&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_BAR0_CTL_WRITE&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| TSEC_BAR0_CTL_BYTE_MASK&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| TSEC_BAR0_CTL_STATUS&lt;br /&gt;
 0: Idle&lt;br /&gt;
 1: Busy&lt;br /&gt;
 2: Error&lt;br /&gt;
 3: Disabled&lt;br /&gt;
|-&lt;br /&gt;
| 16-17&lt;br /&gt;
| TSEC_BAR0_CTL_SEC_MODE&lt;br /&gt;
 0: None&lt;br /&gt;
 1: Invalid&lt;br /&gt;
 2: Light Secure&lt;br /&gt;
 3: Heavy Secure&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_BAR0_CTL_INIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
Starting a transfer over BAR0 automatically sets TSEC_BAR0_CTL_SEC_MODE to the current Falcon security mode. Once set, any attempts to start a transfer from a lower security level will fail.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_ADDR_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the address for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_DATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_DATA_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the data for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_TIMEOUT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_TIMEOUT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the timeout value for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TEGRA_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TEGRA_CTL_TKFI_KFUSE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_TEGRA_CTL_TKFI_RESTART_FSM_KFUSE&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_FORCE_IDLE_INPUTS_I2C&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_RESTART_FSM_HOST1X&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_RESTART_FSM_APB&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_DISABLE_OUTPUT_I2C&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Falcon ==&lt;br /&gt;
&amp;quot;Falcon&amp;quot; (FAst Logic CONtroller) is a proprietary general purpose CPU which can be found inside various hardware blocks that require some sort of logic processing such as TSEC (TSECA and TSECB), NVDEC, NVENC, NVJPG, VIC, GPU PMU and XUSB.&lt;br /&gt;
&lt;br /&gt;
=== Processor Registers ===&lt;br /&gt;
A total of 32 processor registers are available in the Falcon CPU.&lt;br /&gt;
&lt;br /&gt;
==== REG0-REG15 ====&lt;br /&gt;
These are 16 32-bit GPRs (general purpose registers).&lt;br /&gt;
&lt;br /&gt;
==== IV0 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 0. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IV1 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 1. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IV2 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 2. This register is considered &amp;quot;UNDEFINED&amp;quot; and appears to be unused.&lt;br /&gt;
&lt;br /&gt;
==== EV ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for the exception vector. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;tv&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SP ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the current stack pointer. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== PC ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the current program counter. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IMB ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the external base address for IMEM transfers.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xcbase&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== DMB ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the external base address for DMEM transfers.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xdbase&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CSW ====&lt;br /&gt;
This is a SPR (special purpose register) that holds various flag bits.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7 || General purpose predicates&lt;br /&gt;
|-&lt;br /&gt;
| 8 || ALU carry flag&lt;br /&gt;
|-&lt;br /&gt;
| 9 || ALU signed overflow flag&lt;br /&gt;
|-&lt;br /&gt;
| 10 || ALU sign flag&lt;br /&gt;
|-&lt;br /&gt;
| 11 || ALU zero flag&lt;br /&gt;
|-&lt;br /&gt;
| 16 || Interrupt 0 enable&lt;br /&gt;
|-&lt;br /&gt;
| 17 || Interrupt 1 enable&lt;br /&gt;
|-&lt;br /&gt;
| 18 || Interrupt 2 enable (undefined)&lt;br /&gt;
|-&lt;br /&gt;
| 20 || Interrupt 0 saved enable&lt;br /&gt;
|-&lt;br /&gt;
| 21 || Interrupt 1 saved enable&lt;br /&gt;
|-&lt;br /&gt;
| 22 || Interrupt 2 saved enable (undefined)&lt;br /&gt;
|-&lt;br /&gt;
| 24 || Exception active&lt;br /&gt;
|-&lt;br /&gt;
| 26-31 || Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;flags&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CCR ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the SCP DMA override functionality. The value of this register is set using the &amp;quot;cxset&amp;quot; instruction which provides a way to change the behavior of a variable amount of successively executed DMA-related instructions (&amp;quot;xdwait&amp;quot;, &amp;quot;xdst&amp;quot; and &amp;quot;xdld&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable&lt;br /&gt;
! Bits || Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4 || Number of instructions the override is valid for (0x1F means infinite)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Crypto source/destination select&lt;br /&gt;
 0: Crypto register&lt;br /&gt;
 1: Crypto stream&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Bypass mode&lt;br /&gt;
 0: Disabled&lt;br /&gt;
 1: Enabled&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Internal memory select&lt;br /&gt;
 0: DMEM&lt;br /&gt;
 1: IMEM&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;cx&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SEC ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the SCP authentication process.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7 || Start of region to authenticate (in pages of 0x100 bytes)&lt;br /&gt;
|-&lt;br /&gt;
| 16 || Force secure DMA transfers&lt;br /&gt;
|-&lt;br /&gt;
| 17 || Decrypt region to authenticate&lt;br /&gt;
|-&lt;br /&gt;
| 18 || Signature check passed&lt;br /&gt;
|-&lt;br /&gt;
| 19 || Suppress interrupts and exceptions&lt;br /&gt;
|-&lt;br /&gt;
| 24-31 || Size of region to authenticate (in pages of 0x100 bytes)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;cauth&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CTX ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the CTXDMA ports.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-2 || CTXDMA port for code loads (xcld)&lt;br /&gt;
|-&lt;br /&gt;
| 4-6 || CTXDMA port for code stores (invalid)&lt;br /&gt;
|-&lt;br /&gt;
| 8-10 || CTXDMA port for data loads (xdld)&lt;br /&gt;
|-&lt;br /&gt;
| 12-14 || CTXDMA port for data stores (xdst)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xtargets&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== EXCI ====&lt;br /&gt;
This is a SPR (special purpose register) that holds information on raised exceptions.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-19 || Exception PC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23 || Exception cause&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;tstatus&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SEC1 ====&lt;br /&gt;
Unknown. Marked as &amp;quot;RESERVED&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== IMB1 ====&lt;br /&gt;
Unknown. Marked as &amp;quot;RESERVED&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== DMB1 ====&lt;br /&gt;
Unknown. Marked as &amp;quot;RESERVED&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Heavy Secure Mode ===&lt;br /&gt;
==== Entry ====&lt;br /&gt;
From non-secure mode, upon jumping to a page marked as secret, a secret fault occurs. This causes the CPU to verify the region specified in $cauth against the MAC loaded in $c6. If the comparison is successful, the valid bit (bit0) is set on all pages in the $cauth region, and $pc is set to the base of the $cauth region. If the comparsion fails, the CPU is halted.&lt;br /&gt;
&lt;br /&gt;
==== Exit ====&lt;br /&gt;
The CPU automatically goes back to non-secure mode when returning back into non-secret pages. When this happens, the valid bit (bit0) in the TLB flags is cleared for all secret pages.&lt;br /&gt;
&lt;br /&gt;
==== Implementation ====&lt;br /&gt;
Under certain circumstances, it is possible to observe [[#sigcmp|sigcmp]] being briefly written to [[#TSEC_SCP_CMD|TSEC_SCP_CMD]] as &amp;quot;csigcmp $c4 $c6&amp;quot; while the opcodes in [[#TSEC_SCP_STAT2|TSEC_SCP_STAT2]] are set to &amp;quot;cxsin&amp;quot; and &amp;quot;csigcmp&amp;quot;, respectively.&lt;br /&gt;
&lt;br /&gt;
Via [[#TSEC_SCP_DBG0|TSEC_SCP_DBG0]] it can be observed that a 3-sized macro sequence is loaded into cs0 during a secure mode transition.&lt;br /&gt;
&lt;br /&gt;
== SCP ==&lt;br /&gt;
&amp;quot;SCP&amp;quot; (Secure Co-Processor) is a proprietary coprocessor which can be found inside every [[#Falcon|Falcon]] that supports [[#Heavy_Secure_Mode|Heavy Secure Mode]]. On the Tegra X1 these are TSECA, TSECB, NVDEC and the GPU&#039;s PMU.&lt;br /&gt;
&lt;br /&gt;
=== Hardware ===&lt;br /&gt;
SCP is subdivided into several specialized hardware blocks and interfaces.&lt;br /&gt;
&lt;br /&gt;
==== LOAD ====&lt;br /&gt;
Block for handling memory reads from SCP to Falcon. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== STORE ====&lt;br /&gt;
Block for handling memory writes from Falcon to SCP. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== CMD ====&lt;br /&gt;
Block for translating Falcon crypto operands into SCP commands. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]]. The status of the current command is reported through register [[#TSEC_SCP_CMD|TSEC_SCP_CMD]].&lt;br /&gt;
&lt;br /&gt;
==== SEQ ====&lt;br /&gt;
Block for recording and executing sequences of crypto operations in the form of macros.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== CTL ====&lt;br /&gt;
Overseer block for controlling certain SCP features.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
Registers [[#TSEC_SCP_CTL_STAT|TSEC_SCP_CTL_STAT]], [[#TSEC_SCP_CTL_LOCK|TSEC_SCP_CTL_LOCK]], [[#TSEC_SCP_CTL_SCP|TSEC_SCP_CTL_SCP]], [[#TSEC_SCP_CTL_PKEY|TSEC_SCP_CTL_PKEY]] and [[#TSEC_SCP_CTL_DBG|TSEC_SCP_CTL_DBG]] refer to this block.&lt;br /&gt;
&lt;br /&gt;
==== AES ====&lt;br /&gt;
Block for providing AES-128-ECB functionality.&lt;br /&gt;
&lt;br /&gt;
==== RNG ====&lt;br /&gt;
Block for encapsulating and controlling the internal random number generator.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]] and reports the status of the internal random number generator through registers [[#TSEC_SCP_RNG_STAT0|TSEC_SCP_RNG_STAT0]] and [[#TSEC_SCP_RNG_STAT1|TSEC_SCP_RNG_STAT1]].&lt;br /&gt;
&lt;br /&gt;
===== RND =====&lt;br /&gt;
Internal random number generator.&lt;br /&gt;
&lt;br /&gt;
Can be configured by the [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTLx]] registers.&lt;br /&gt;
&lt;br /&gt;
=== Operations ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Opcode&lt;br /&gt;
!  Name&lt;br /&gt;
!  Operand0&lt;br /&gt;
!  Operand1&lt;br /&gt;
!  Operation&lt;br /&gt;
!  Condition&lt;br /&gt;
|-&lt;br /&gt;
| 0 || nop || N/A || N/A || ||&lt;br /&gt;
|-&lt;br /&gt;
| 1 || mov || $cX || $cY || &amp;lt;code&amp;gt;$cX = $cY; ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 2 || sin || $cX || N/A || &amp;lt;code&amp;gt;$cX = read_stream(); ACL(X) = ???;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 3 || sout || $cX || N/A || &amp;lt;code&amp;gt;write_stream($cX);&amp;lt;/code&amp;gt; || ?&lt;br /&gt;
|-&lt;br /&gt;
| 4 || [[#rnd|rnd]] || $cX || N/A || &amp;lt;code&amp;gt;$cX = read_rnd(); ACL(X) = ???;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 5 || s0begin || immX || N/A || &amp;lt;code&amp;gt;record_macro_for_N_instructions(0, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 6 || s0exec || immX || N/A || &amp;lt;code&amp;gt;execute_macro_N_times(0, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 7 || s1begin || immX || N/A || &amp;lt;code&amp;gt;record_macro_for_N_instructions(1, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 8 || s1exec || immX || N/A || &amp;lt;code&amp;gt;execute_macro_N_times(1, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 9 || &amp;lt;invalid&amp;gt; || || || ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xA || [[#chmod|chmod]] || $cX || immY || Complicated, see [[#ACL|ACL]]. ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xB || xor || $cX || $cY || &amp;lt;code&amp;gt;$cX ^= $cY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2) &amp;amp;&amp;amp; (ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xC || add || $cX || immY || &amp;lt;code&amp;gt;$cX += immY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xD || and || $cX || $cY || &amp;lt;code&amp;gt;$cX &amp;amp;= $cY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2) &amp;amp;&amp;amp; (ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xE || rev || $cX || $cY || &amp;lt;code&amp;gt;$cX = endian_swap128($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xF || gfmul || $cX || $cY || &amp;lt;code&amp;gt;$cX = gfmul($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0x10 || secret || $cX || immY || &amp;lt;code&amp;gt;$cX = load_secret(immY); ACL(X) = load_secret_acl(immY);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x11 || keyreg || $cX || N/A || &amp;lt;code&amp;gt;active_key_idx = $cX;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x12 || kexp || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_kexp($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x13 || krexp || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_kexp_reverse($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x14 || enc || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_enc(active_key_idx, $cY); ACL(X) = ACL(active_key_idx) &amp;amp; ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x15 || dec || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_dec(active_key_idx, $cY); ACL(X) = ACL(active_key_idx) &amp;amp; ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x16 || [[#sigcmp|sigcmp]] || $cX || $cY || &amp;lt;code&amp;gt;if (hash_verify($cX, $cY)) { has_sig = true; current_sig = $cX; }&amp;lt;/code&amp;gt; || ?&lt;br /&gt;
|-&lt;br /&gt;
| 0x17 || sigenc || $cX || $cY || &amp;lt;code&amp;gt;if (has_sig) { $cX = aes_enc($cY, current_sig); ACL(X) = 0x13; }&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x18 || [[#sigclr|sigclr]] || N/A || N/A || &amp;lt;code&amp;gt;has_sig = false;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== sigcmp ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c XY d8     csigcmp $cY $cX&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Takes 2 crypto registers as operands and is automatically executed when jumping to a code region previously uploaded as secret. This instruction does not work in secure mode.&lt;br /&gt;
&lt;br /&gt;
==== sigclr ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c 00 e0     csigclr&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction takes no operands and clears the saved cauth signature used by the csigenc instruction.&lt;br /&gt;
&lt;br /&gt;
==== chmod ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c XY a8     cchmod $cY 0X&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;00000000: f5 3c XY a9     cchmod $cY 1X&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction takes a crypto register and a 5 bit immediate value which represents the [[#ACL|ACL]] mask to set.&lt;br /&gt;
&lt;br /&gt;
==== rnd ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c 0X 90     crnd $cX&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction initializes a crypto register with random data.&lt;br /&gt;
&lt;br /&gt;
Executing this instruction only succeeds if the RNG controller is enabled for the SCP, which requires taking the following steps:&lt;br /&gt;
* Write 0x7FFF to [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTL0]].&lt;br /&gt;
* Write 0x3FF0000 to [[#TSEC_SCP_RND_CTL1|TSEC_SCP_RND_CTL1]].&lt;br /&gt;
* Write 0xFF00 to TSEC_SCP_RND_CTL11.&lt;br /&gt;
* Write 0x1000 to [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]].&lt;br /&gt;
&lt;br /&gt;
Otherwise it hangs forever.&lt;br /&gt;
&lt;br /&gt;
=== ACLs ===&lt;br /&gt;
Each crypto register has an associated access control list with the following format:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bit&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0 || Secure key. Forced set if bit1 is set. Once cleared, cannot be set again.&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Secure readable. Once cleared, cannot be set again.&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Insecure key. Forced set if bit3 is set. Forced clear if bit0 is clear. Can be toggled back and forth.&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Insecure readable. Forced clear if bit1 is clear. Can be toggled back and forth.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Insecure overwritable. Can be toggled back and forth.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On boot, the ACL is 0x1F for all $cX.&lt;br /&gt;
&lt;br /&gt;
Loading into $cX using xdst instruction sets ACL($cX) to 0x13 and 0x1F, for secure and insecure mode respectively.&lt;br /&gt;
&lt;br /&gt;
Spilling a $cX to DMEM using xdld instruction is allowed if (ACL($cX) &amp;amp; 2) or (ACL($cX) &amp;amp; 8), for secure and insecure mode respectively.&lt;br /&gt;
&lt;br /&gt;
Loading a secret into $cX sets a per-secret ACL, unconditionally.&lt;br /&gt;
&lt;br /&gt;
=== Secrets ===&lt;br /&gt;
[[#Heavy_Secure_Mode|Heavy Secure Mode]] has access to 64 128-bit keys which are burned at factory. These keys can be loaded using the $csecret instruction which takes the target crypto register and the key index as arguments.&lt;br /&gt;
&lt;br /&gt;
Secrets are specific to each Falcon unit with the exception of secret 0x3F. This secret is effectively empty (all zeros), but is configured to be overwritten with the KFUSE private key once the KFUSE clock is enabled. The KFUSE private key is console-unique.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable&lt;br /&gt;
! Index || ACL || Description&lt;br /&gt;
|-&lt;br /&gt;
| 0x00 || 0x13 || Used by [[TSEC_Firmware#Keygen|Keygen]], nvhost_tsec, nvhost_nvdec_bl020_prod, nvhost_nvdec020_prod, nvhost_nvdec020_ns and acr_ucode firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x01 || 0x10 || Used by Falcon&#039;s Secure Boot ROM for the signature generation algorithm.&lt;br /&gt;
|-&lt;br /&gt;
| 0x02 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x03 || 0x11 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x04 || 0x10 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x05 || 0x13 || Used by nvhost_tsec, nvhost_nvdec_bl020_prod, nvhost_nvdec020_prod, nvhost_nvdec020_ns and acr_ucode firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x06 || 0x11 || Used by Falcon&#039;s Secure Boot ROM as key to decrypt data during authentication (decided by bit 17 in the [[#SEC|SEC]] register).&lt;br /&gt;
|-&lt;br /&gt;
| 0x07 || 0x11 || Used by [6.0.0+] nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x08 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x09 || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x0A || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0B || 0x10 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x0C || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0D || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0E || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0F || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x10 || 0x11 || Used by [1.0.0-5.1.0] nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x11 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x12 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x13 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x14 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x15 || 0x13 || Used by nvhost_nvdec_bl020_prod, [5.0.0+] nvhost_nvdec020_prod, [5.0.0+] nvhost_nvdec020_ns and [6.0.0+] nvhost_tsec firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x16 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x17 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x18 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x19 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1A || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1B || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1C || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1D || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1E || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1F || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x20 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x21 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x22 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x23 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x24 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x25 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x26 || 0x10 || Used by [[TSEC_Firmware#KeygenLdr|KeygenLdr]] and [[TSEC_Firmware#SecureBoot|SecureBoot]]&lt;br /&gt;
|-&lt;br /&gt;
| 0x27 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x28 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x29 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2A || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2B || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2C || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2D || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2E || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2F || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x30 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x31 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x32 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x33 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x34 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x35 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x36 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x37 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x38 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x39 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3A || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3B || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3C || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x3D || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3E || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3F || 0x10 || Used by [[TSEC_Firmware#Keygen|Keygen]], nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Vale</name></author>
	</entry>
	<entry>
		<id>https://switchbrew.org/w/index.php?title=TSEC&amp;diff=9946</id>
		<title>TSEC</title>
		<link rel="alternate" type="text/html" href="https://switchbrew.org/w/index.php?title=TSEC&amp;diff=9946"/>
		<updated>2020-09-05T15:13:05Z</updated>

		<summary type="html">&lt;p&gt;Vale: Correct the crypto opcodes for sigenc and sigclr&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;TSEC (Tegra Security Co-processor) is a dedicated unit powered by a NVIDIA Falcon microprocessor with crypto extensions.&lt;br /&gt;
&lt;br /&gt;
= Driver =&lt;br /&gt;
A host driver for communicating with the TSEC is mapped to physical address 0x54500000 with a total size of 0x40000 bytes and exposes several registers.&lt;br /&gt;
&lt;br /&gt;
== Registers ==&lt;br /&gt;
The TSEC&#039;s MMIO space is divided as follows:&lt;br /&gt;
* 0x54500000 to 0x54501000: THI (Tegra Host Interface)&lt;br /&gt;
* 0x54501000 to 0x54501400: [[#Falcon|FALCON (Falcon microcontroller)]]&lt;br /&gt;
* 0x54501400 to 0x54501600: [[#SCP|SCP (Secure coprocessor)]]&lt;br /&gt;
* 0x54501600 to 0x54501680: TFBIF (Tegra Framebuffer Interface)&lt;br /&gt;
* 0x54501680 to 0x54501700: CG (Clock Gate)&lt;br /&gt;
* 0x54501700 to 0x54501800: BAR0 (HOST1X device DMA)&lt;br /&gt;
* 0x54501800 to 0x54501900: TEGRA (Miscellaneous interfaces)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Name&lt;br /&gt;
!  Address&lt;br /&gt;
!  Width&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT|TSEC_THI_INCR_SYNCPT]]&lt;br /&gt;
| 0x54500000&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT_CTRL|TSEC_THI_INCR_SYNCPT_CTRL]]&lt;br /&gt;
| 0x54500004&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INCR_SYNCPT_ERR|TSEC_THI_INCR_SYNCPT_ERR]]&lt;br /&gt;
| 0x54500008&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW_INCR_SYNCPT|TSEC_THI_CTXSW_INCR_SYNCPT]]&lt;br /&gt;
| 0x5450000C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW|TSEC_THI_CTXSW]]&lt;br /&gt;
| 0x54500020&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CTXSW_NEXT|TSEC_THI_CTXSW_NEXT]]&lt;br /&gt;
| 0x54500024&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONT_SYNCPT_EOF|TSEC_THI_CONT_SYNCPT_EOF]]&lt;br /&gt;
| 0x54500028&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONT_SYNCPT_L1|TSEC_THI_CONT_SYNCPT_L1]]&lt;br /&gt;
| 0x5450002C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_STREAMID0|TSEC_THI_STREAMID0]]&lt;br /&gt;
| 0x54500030&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_STREAMID1|TSEC_THI_STREAMID1]]&lt;br /&gt;
| 0x54500034&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_THI_SEC|TSEC_THI_THI_SEC]]&lt;br /&gt;
| 0x54500038&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_METHOD0|TSEC_THI_METHOD0]]&lt;br /&gt;
| 0x54500040&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_METHOD1|TSEC_THI_METHOD1]]&lt;br /&gt;
| 0x54500044&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONTEXT_SWITCH|TSEC_THI_CONTEXT_SWITCH]]&lt;br /&gt;
| 0x54500060&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INT_STATUS|TSEC_THI_INT_STATUS]]&lt;br /&gt;
| 0x54500078&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_INT_MASK|TSEC_THI_INT_MASK]]&lt;br /&gt;
| 0x5450007C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CONFIG0|TSEC_THI_CONFIG0]]&lt;br /&gt;
| 0x54500080&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_DBG_MISC|TSEC_THI_DBG_MISC]]&lt;br /&gt;
| 0x54500084&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_SLCG_OVERRIDE_HIGH_A|TSEC_THI_SLCG_OVERRIDE_HIGH_A]]&lt;br /&gt;
| 0x54500088&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_SLCG_OVERRIDE_LOW_A|TSEC_THI_SLCG_OVERRIDE_LOW_A]]&lt;br /&gt;
| 0x5450008C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_THI_CLK_OVERRIDE|TSEC_THI_CLK_OVERRIDE]]&lt;br /&gt;
| 0x54500E00&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSSET|TSEC_FALCON_IRQSSET]]&lt;br /&gt;
| 0x54501000&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSCLR|TSEC_FALCON_IRQSCLR]]&lt;br /&gt;
| 0x54501004&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQSTAT|TSEC_FALCON_IRQSTAT]]&lt;br /&gt;
| 0x54501008&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMODE|TSEC_FALCON_IRQMODE]]&lt;br /&gt;
| 0x5450100C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMSET|TSEC_FALCON_IRQMSET]]&lt;br /&gt;
| 0x54501010&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMCLR|TSEC_FALCON_IRQMCLR]]&lt;br /&gt;
| 0x54501014&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQMASK|TSEC_FALCON_IRQMASK]]&lt;br /&gt;
| 0x54501018&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQDEST|TSEC_FALCON_IRQDEST]]&lt;br /&gt;
| 0x5450101C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRINT|TSEC_FALCON_GPTMRINT]]&lt;br /&gt;
| 0x54501020&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRVAL|TSEC_FALCON_GPTMRVAL]]&lt;br /&gt;
| 0x54501024&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_GPTMRCTL|TSEC_FALCON_GPTMRCTL]]&lt;br /&gt;
| 0x54501028&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PTIMER0|TSEC_FALCON_PTIMER0]]&lt;br /&gt;
| 0x5450102C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PTIMER1|TSEC_FALCON_PTIMER1]]&lt;br /&gt;
| 0x54501030&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_WDTMRVAL|TSEC_FALCON_WDTMRVAL]]&lt;br /&gt;
| 0x54501034&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_WDTMRCTL|TSEC_FALCON_WDTMRCTL]]&lt;br /&gt;
| 0x54501038&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IRQDEST2|TSEC_FALCON_IRQDEST2]]&lt;br /&gt;
| 0x5450103C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MAILBOX0|TSEC_FALCON_MAILBOX0]]&lt;br /&gt;
| 0x54501040&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MAILBOX1|TSEC_FALCON_MAILBOX1]]&lt;br /&gt;
| 0x54501044&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ITFEN|TSEC_FALCON_ITFEN]]&lt;br /&gt;
| 0x54501048&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IDLESTATE|TSEC_FALCON_IDLESTATE]]&lt;br /&gt;
| 0x5450104C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CURCTX|TSEC_FALCON_CURCTX]]&lt;br /&gt;
| 0x54501050&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_NXTCTX|TSEC_FALCON_NXTCTX]]&lt;br /&gt;
| 0x54501054&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CTXACK|TSEC_FALCON_CTXACK]]&lt;br /&gt;
| 0x54501058&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_FHSTATE|TSEC_FALCON_FHSTATE]]&lt;br /&gt;
| 0x5450105C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PRIVSTATE|TSEC_FALCON_PRIVSTATE]]&lt;br /&gt;
| 0x54501060&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDDATA|TSEC_FALCON_MTHDDATA]]&lt;br /&gt;
| 0x54501064&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDID|TSEC_FALCON_MTHDID]]&lt;br /&gt;
| 0x54501068&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDWDAT|TSEC_FALCON_MTHDWDAT]]&lt;br /&gt;
| 0x5450106C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDCOUNT|TSEC_FALCON_MTHDCOUNT]]&lt;br /&gt;
| 0x54501070&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDPOP|TSEC_FALCON_MTHDPOP]]&lt;br /&gt;
| 0x54501074&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_MTHDRAMSZ|TSEC_FALCON_MTHDRAMSZ]]&lt;br /&gt;
| 0x54501078&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SFTRESET|TSEC_FALCON_SFTRESET]]&lt;br /&gt;
| 0x5450107C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_OS|TSEC_FALCON_OS]]&lt;br /&gt;
| 0x54501080&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RM|TSEC_FALCON_RM]]&lt;br /&gt;
| 0x54501084&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SOFT_PM|TSEC_FALCON_SOFT_PM]]&lt;br /&gt;
| 0x54501088&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SOFT_MODE|TSEC_FALCON_SOFT_MODE]]&lt;br /&gt;
| 0x5450108C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DEBUG1|TSEC_FALCON_DEBUG1]]&lt;br /&gt;
| 0x54501090&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DEBUGINFO|TSEC_FALCON_DEBUGINFO]]&lt;br /&gt;
| 0x54501094&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT1|TSEC_FALCON_IBRKPT1]]&lt;br /&gt;
| 0x54501098&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT2|TSEC_FALCON_IBRKPT2]]&lt;br /&gt;
| 0x5450109C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CGCTL|TSEC_FALCON_CGCTL]]&lt;br /&gt;
| 0x545010A0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ENGCTL|TSEC_FALCON_ENGCTL]]&lt;br /&gt;
| 0x545010A4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_PMM|TSEC_FALCON_PMM]]&lt;br /&gt;
| 0x545010A8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ADDR|TSEC_FALCON_ADDR]]&lt;br /&gt;
| 0x545010AC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT3|TSEC_FALCON_IBRKPT3]]&lt;br /&gt;
| 0x545010B0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT4|TSEC_FALCON_IBRKPT4]]&lt;br /&gt;
| 0x545010B4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IBRKPT5|TSEC_FALCON_IBRKPT5]]&lt;br /&gt;
| 0x545010B8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXCI|TSEC_FALCON_EXCI]]&lt;br /&gt;
| 0x545010D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SVEC_SPR|TSEC_FALCON_SVEC_SPR]]&lt;br /&gt;
| 0x545010D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RSTAT0|TSEC_FALCON_RSTAT0]]&lt;br /&gt;
| 0x545010D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_RSTAT3|TSEC_FALCON_RSTAT3]]&lt;br /&gt;
| 0x545010DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_E0&lt;br /&gt;
| 0x545010E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CPUCTL|TSEC_FALCON_CPUCTL]]&lt;br /&gt;
| 0x54501100&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_BOOTVEC|TSEC_FALCON_BOOTVEC]]&lt;br /&gt;
| 0x54501104&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_HWCFG|TSEC_FALCON_HWCFG]]&lt;br /&gt;
| 0x54501108&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMACTL|TSEC_FALCON_DMACTL]]&lt;br /&gt;
| 0x5450110C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFBASE|TSEC_FALCON_DMATRFBASE]]&lt;br /&gt;
| 0x54501110&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFMOFFS|TSEC_FALCON_DMATRFMOFFS]]&lt;br /&gt;
| 0x54501114&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFCMD|TSEC_FALCON_DMATRFCMD]]&lt;br /&gt;
| 0x54501118&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMATRFFBOFFS|TSEC_FALCON_DMATRFFBOFFS]]&lt;br /&gt;
| 0x5450111C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAPOLL_FB|TSEC_FALCON_DMAPOLL_FB]]&lt;br /&gt;
| 0x54501120&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAPOLL_CP|TSEC_FALCON_DMAPOLL_CP]]&lt;br /&gt;
| 0x54501124&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_HWCFG1|TSEC_FALCON_HWCFG1]]&lt;br /&gt;
| 0x5450112C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CPUCTL_ALIAS|TSEC_FALCON_CPUCTL_ALIAS]]&lt;br /&gt;
| 0x54501130&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_STACKCFG|TSEC_FALCON_STACKCFG]]&lt;br /&gt;
| 0x54501138&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]]&lt;br /&gt;
| 0x54501140&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMSTAT|TSEC_FALCON_IMSTAT]]&lt;br /&gt;
| 0x54501144&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_TRACEIDX|TSEC_FALCON_TRACEIDX]]&lt;br /&gt;
| 0x54501148&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_TRACEPC|TSEC_FALCON_TRACEPC]]&lt;br /&gt;
| 0x5450114C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLRNG0|TSEC_FALCON_IMFILLRNG0]]&lt;br /&gt;
| 0x54501150&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLRNG1|TSEC_FALCON_IMFILLRNG1]]&lt;br /&gt;
| 0x54501154&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMFILLCTL|TSEC_FALCON_IMFILLCTL]]&lt;br /&gt;
| 0x54501158&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMCTL_DEBUG|TSEC_FALCON_IMCTL_DEBUG]]&lt;br /&gt;
| 0x5450115C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CMEMBASE|TSEC_FALCON_CMEMBASE]]&lt;br /&gt;
| 0x54501160&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMAPERT|TSEC_FALCON_DMEMAPERT]]&lt;br /&gt;
| 0x54501164&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXTERRADDR|TSEC_FALCON_EXTERRADDR]]&lt;br /&gt;
| 0x54501168&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_EXTERRSTAT|TSEC_FALCON_EXTERRSTAT]]&lt;br /&gt;
| 0x5450116C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_CG2|TSEC_FALCON_CG2]]&lt;br /&gt;
| 0x5450117C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC0]]&lt;br /&gt;
| 0x54501180&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD0]]&lt;br /&gt;
| 0x54501184&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT0]]&lt;br /&gt;
| 0x54501188&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC1]]&lt;br /&gt;
| 0x54501190&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD1]]&lt;br /&gt;
| 0x54501194&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT1]]&lt;br /&gt;
| 0x54501198&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC2]]&lt;br /&gt;
| 0x545011A0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD2]]&lt;br /&gt;
| 0x545011A4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT2]]&lt;br /&gt;
| 0x545011A8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMC|TSEC_FALCON_IMEMC3]]&lt;br /&gt;
| 0x545011B0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMD|TSEC_FALCON_IMEMD3]]&lt;br /&gt;
| 0x545011B4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_IMEMT|TSEC_FALCON_IMEMT3]]&lt;br /&gt;
| 0x545011B8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC0]]&lt;br /&gt;
| 0x545011C0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD0]]&lt;br /&gt;
| 0x545011C4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC1]]&lt;br /&gt;
| 0x545011C8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD1]]&lt;br /&gt;
| 0x545011CC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC2]]&lt;br /&gt;
| 0x545011D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD2]]&lt;br /&gt;
| 0x545011D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC3]]&lt;br /&gt;
| 0x545011D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD3]]&lt;br /&gt;
| 0x545011DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC4]]&lt;br /&gt;
| 0x545011E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD4]]&lt;br /&gt;
| 0x545011E4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC5]]&lt;br /&gt;
| 0x545011E8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD5]]&lt;br /&gt;
| 0x545011EC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC6]]&lt;br /&gt;
| 0x545011F0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD6]]&lt;br /&gt;
| 0x545011F4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMC|TSEC_FALCON_DMEMC7]]&lt;br /&gt;
| 0x545011F8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMEMD|TSEC_FALCON_DMEMD7]]&lt;br /&gt;
| 0x545011FC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_CMD|TSEC_FALCON_ICD_CMD]]&lt;br /&gt;
| 0x54501200&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_ADDR|TSEC_FALCON_ICD_ADDR]]&lt;br /&gt;
| 0x54501204&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_WDATA|TSEC_FALCON_ICD_WDATA]]&lt;br /&gt;
| 0x54501208&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_ICD_RDATA|TSEC_FALCON_ICD_RDATA]]&lt;br /&gt;
| 0x5450120C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SCTL|TSEC_FALCON_SCTL]]&lt;br /&gt;
| 0x54501240&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SSTAT|TSEC_FALCON_SSTAT]]&lt;br /&gt;
| 0x54501244&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_250&lt;br /&gt;
| 0x54501250&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_FALCON_UNK_260&lt;br /&gt;
| 0x54501260&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_IMEM|TSEC_FALCON_SPROT_IMEM]]&lt;br /&gt;
| 0x54501280&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_DMEM|TSEC_FALCON_SPROT_DMEM]]&lt;br /&gt;
| 0x54501284&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_CPUCTL|TSEC_FALCON_SPROT_CPUCTL]]&lt;br /&gt;
| 0x54501288&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_MISC|TSEC_FALCON_SPROT_MISC]]&lt;br /&gt;
| 0x5450128C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_IRQ|TSEC_FALCON_SPROT_IRQ]]&lt;br /&gt;
| 0x54501290&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_MTHD|TSEC_FALCON_SPROT_MTHD]]&lt;br /&gt;
| 0x54501294&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_SCTL|TSEC_FALCON_SPROT_SCTL]]&lt;br /&gt;
| 0x54501298&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_SPROT_WDTMR|TSEC_FALCON_SPROT_WDTMR]]&lt;br /&gt;
| 0x5450129C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW|TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW]]&lt;br /&gt;
| 0x545012C0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH|TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH]]&lt;br /&gt;
| 0x545012C4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW|TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW]]&lt;br /&gt;
| 0x545012C8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH|TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH]]&lt;br /&gt;
| 0x545012CC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW|TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW]]&lt;br /&gt;
| 0x545012D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH|TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH]]&lt;br /&gt;
| 0x545012D4&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW|TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW]]&lt;br /&gt;
| 0x545012D8&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH|TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH]]&lt;br /&gt;
| 0x545012DC&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_FALCON_DMAINFO_CTL|TSEC_FALCON_DMAINFO_CTL]]&lt;br /&gt;
| 0x545012E0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]]&lt;br /&gt;
| 0x54501400&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]]&lt;br /&gt;
| 0x54501404&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_STAT|TSEC_SCP_CTL_STAT]]&lt;br /&gt;
| 0x54501408&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_LOCK|TSEC_SCP_CTL_LOCK]]&lt;br /&gt;
| 0x5450140C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CFG|TSEC_SCP_CFG]]&lt;br /&gt;
| 0x54501410&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_SCP|TSEC_SCP_CTL_SCP]]&lt;br /&gt;
| 0x54501414&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_PKEY|TSEC_SCP_CTL_PKEY]]&lt;br /&gt;
| 0x54501418&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CTL_DBG|TSEC_SCP_CTL_DBG]]&lt;br /&gt;
| 0x5450141C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG0|TSEC_SCP_DBG0]]&lt;br /&gt;
| 0x54501420&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG1|TSEC_SCP_DBG1]]&lt;br /&gt;
| 0x54501424&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_DBG2|TSEC_SCP_DBG2]]&lt;br /&gt;
| 0x54501428&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CMD|TSEC_SCP_CMD]]&lt;br /&gt;
| 0x54501430&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT0|TSEC_SCP_STAT0]]&lt;br /&gt;
| 0x54501450&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT1|TSEC_SCP_STAT1]]&lt;br /&gt;
| 0x54501454&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_STAT2|TSEC_SCP_STAT2]]&lt;br /&gt;
| 0x54501458&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RNG_STAT0|TSEC_SCP_RNG_STAT0]]&lt;br /&gt;
| 0x54501470&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RNG_STAT1|TSEC_SCP_RNG_STAT1]]&lt;br /&gt;
| 0x54501474&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_IRQSTAT|TSEC_SCP_IRQSTAT]]&lt;br /&gt;
| 0x54501480&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_IRQMASK|TSEC_SCP_IRQMASK]]&lt;br /&gt;
| 0x54501484&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_ACL_ERR|TSEC_SCP_ACL_ERR]]&lt;br /&gt;
| 0x54501490&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_SEC_ERR|TSEC_SCP_SEC_ERR]]&lt;br /&gt;
| 0x54501494&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_CMD_ERR|TSEC_SCP_CMD_ERR]]&lt;br /&gt;
| 0x54501498&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTL0]]&lt;br /&gt;
| 0x54501500&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_SCP_RND_CTL1|TSEC_SCP_RND_CTL1]]&lt;br /&gt;
| 0x54501504&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL2&lt;br /&gt;
| 0x54501508&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL3&lt;br /&gt;
| 0x5450150C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL4&lt;br /&gt;
| 0x54501510&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL5&lt;br /&gt;
| 0x54501514&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL6&lt;br /&gt;
| 0x54501518&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL7&lt;br /&gt;
| 0x5450151C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL8&lt;br /&gt;
| 0x54501520&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL9&lt;br /&gt;
| 0x54501524&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL10&lt;br /&gt;
| 0x54501528&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_SCP_RND_CTL11&lt;br /&gt;
| 0x5450152C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_CTL|TSEC_TFBIF_CTL]]&lt;br /&gt;
| 0x54501600&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_MCCIF_FIFOCTRL|TSEC_TFBIF_MCCIF_FIFOCTRL]]&lt;br /&gt;
| 0x54501604&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_THROTTLE|TSEC_TFBIF_THROTTLE]]&lt;br /&gt;
| 0x54501608&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_STAT0|TSEC_TFBIF_DBG_STAT0]]&lt;br /&gt;
| 0x5450160C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_STAT1|TSEC_TFBIF_DBG_STAT1]]&lt;br /&gt;
| 0x54501610&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_RDCOUNT_LO|TSEC_TFBIF_DBG_RDCOUNT_LO]]&lt;br /&gt;
| 0x54501614&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_RDCOUNT_HI|TSEC_TFBIF_DBG_RDCOUNT_HI]]&lt;br /&gt;
| 0x54501618&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_WRCOUNT_LO|TSEC_TFBIF_DBG_WRCOUNT_LO]]&lt;br /&gt;
| 0x5450161C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_WRCOUNT_HI|TSEC_TFBIF_DBG_WRCOUNT_HI]]&lt;br /&gt;
| 0x54501620&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R32COUNT|TSEC_TFBIF_DBG_R32COUNT]]&lt;br /&gt;
| 0x54501624&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R64COUNT|TSEC_TFBIF_DBG_R64COUNT]]&lt;br /&gt;
| 0x54501628&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_DBG_R128COUNT|TSEC_TFBIF_DBG_R128COUNT]]&lt;br /&gt;
| 0x5450162C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TFBIF_UNK_30&lt;br /&gt;
| 0x54501630&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_MCCIF_FIFOCTRL1|TSEC_TFBIF_MCCIF_FIFOCTRL1]]&lt;br /&gt;
| 0x54501634&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_WRR_RDP|TSEC_TFBIF_WRR_RDP]]&lt;br /&gt;
| 0x54501638&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_SPROT_EMEM|TSEC_TFBIF_SPROT_EMEM]]&lt;br /&gt;
| 0x54501640&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_TRANSCFG|TSEC_TFBIF_TRANSCFG]]&lt;br /&gt;
| 0x54501644&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_REGIONCFG|TSEC_TFBIF_REGIONCFG]]&lt;br /&gt;
| 0x54501648&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_MASK|TSEC_TFBIF_ACTMON_ACTIVE_MASK]]&lt;br /&gt;
| 0x5450164C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_BORPS|TSEC_TFBIF_ACTMON_ACTIVE_BORPS]]&lt;br /&gt;
| 0x54501650&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT|TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT]]&lt;br /&gt;
| 0x54501654&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_MASK|TSEC_TFBIF_ACTMON_MCB_MASK]]&lt;br /&gt;
| 0x54501660&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_BORPS|TSEC_TFBIF_ACTMON_MCB_BORPS]]&lt;br /&gt;
| 0x54501664&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_ACTMON_MCB_WEIGHT|TSEC_TFBIF_ACTMON_MCB_WEIGHT]]&lt;br /&gt;
| 0x54501668&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TFBIF_THI_TRANSPROP|TSEC_TFBIF_THI_TRANSPROP]]&lt;br /&gt;
| 0x54501670&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_CG|TSEC_CG]]&lt;br /&gt;
| 0x545016D0&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_CTL|TSEC_BAR0_CTL]]&lt;br /&gt;
| 0x54501700&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_ADDR|TSEC_BAR0_ADDR]]&lt;br /&gt;
| 0x54501704&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_DATA|TSEC_BAR0_DATA]]&lt;br /&gt;
| 0x54501708&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_BAR0_TIMEOUT|TSEC_BAR0_TIMEOUT]]&lt;br /&gt;
| 0x5450170C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_00&lt;br /&gt;
| 0x54501800&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_04&lt;br /&gt;
| 0x54501804&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_08&lt;br /&gt;
| 0x54501808&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_0C&lt;br /&gt;
| 0x5450180C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_10&lt;br /&gt;
| 0x54501810&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_14&lt;br /&gt;
| 0x54501814&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_18&lt;br /&gt;
| 0x54501818&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_1C&lt;br /&gt;
| 0x5450181C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_20&lt;br /&gt;
| 0x54501820&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_24&lt;br /&gt;
| 0x54501824&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_28&lt;br /&gt;
| 0x54501828&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_2C&lt;br /&gt;
| 0x5450182C&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_30&lt;br /&gt;
| 0x54501830&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| TSEC_TEGRA_UNK_34&lt;br /&gt;
| 0x54501834&lt;br /&gt;
| 0x04&lt;br /&gt;
|-&lt;br /&gt;
| [[#TSEC_TEGRA_CTL|TSEC_TEGRA_CTL]]&lt;br /&gt;
| 0x54501838&lt;br /&gt;
| 0x04&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_INDX&lt;br /&gt;
|-&lt;br /&gt;
| 10-17&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT_CTRL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_0&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_0&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_1&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_1&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_2&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_2&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_3&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_3&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_SOFT_RESET_4&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_CTRL_NO_STALL_4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INCR_SYNCPT_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_IMM&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_OPDONE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_RD_DONE&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_REG_WR_SAFE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_INCR_SYNCPT_ERR_COND_STS_ENGINE_IDLE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW_INCR_SYNCPT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_INCR_SYNCPT_INDX&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_CURR_CLASS&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CTXSW_AUTO_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 11-20&lt;br /&gt;
| TSEC_THI_CTXSW_CURR_CHANNEL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CTXSW_NEXT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CTXSW_NEXT_NEXT_CLASS&lt;br /&gt;
|-&lt;br /&gt;
| 10-19&lt;br /&gt;
| TSEC_THI_CTXSW_NEXT_NEXT_CHANNEL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONT_SYNCPT_EOF ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_EOF_INDEX&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_EOF_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONT_SYNCPT_L1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-9&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_L1_INDEX&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_THI_CONT_SYNCPT_L1_COND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_STREAMID0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_THI_STREAMID0_ID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_STREAMID1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_THI_STREAMID1_ID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_THI_SEC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_THI_SEC_TZ_LOCK&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_THI_SEC_TZ_AUTH&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_THI_THI_SEC_CH_LOCK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_METHOD0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_THI_METHOD0_OFFSET&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used to encode and send a method&#039;s ID over HOST1X to TSEC. This register mirrors the functionality of HOST1X&#039;s channel opcode submission.&lt;br /&gt;
&lt;br /&gt;
The following methods are available:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  ID&lt;br /&gt;
!  Method&lt;br /&gt;
|-&lt;br /&gt;
| 0x100&lt;br /&gt;
| NOP&lt;br /&gt;
|-&lt;br /&gt;
| 0x140&lt;br /&gt;
| PM_TRIGGER&lt;br /&gt;
|-&lt;br /&gt;
| 0x200&lt;br /&gt;
| SET_APPLICATION_ID&lt;br /&gt;
|-&lt;br /&gt;
| 0x204&lt;br /&gt;
| SET_WATCHDOG_TIMER&lt;br /&gt;
|-&lt;br /&gt;
| 0x240&lt;br /&gt;
| SEMAPHORE_A&lt;br /&gt;
|-&lt;br /&gt;
| 0x244&lt;br /&gt;
| SEMAPHORE_B&lt;br /&gt;
|-&lt;br /&gt;
| 0x248&lt;br /&gt;
| SEMAPHORE_C&lt;br /&gt;
|-&lt;br /&gt;
| 0x24C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x250&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x300&lt;br /&gt;
| EXECUTE&lt;br /&gt;
|-&lt;br /&gt;
| 0x304&lt;br /&gt;
| SEMAPHORE_D&lt;br /&gt;
|-&lt;br /&gt;
| 0x500&lt;br /&gt;
| HDCP_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x504&lt;br /&gt;
| HDCP_CREATE_SESSION&lt;br /&gt;
|-&lt;br /&gt;
| 0x508&lt;br /&gt;
| HDCP_VERIFY_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x50C&lt;br /&gt;
| HDCP_GENERATE_EKM&lt;br /&gt;
|-&lt;br /&gt;
| 0x510&lt;br /&gt;
| HDCP_REVOCATION_CHECK&lt;br /&gt;
|-&lt;br /&gt;
| 0x514&lt;br /&gt;
| HDCP_VERIFY_HPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x518&lt;br /&gt;
| HDCP_ENCRYPT_PAIRING_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x51C&lt;br /&gt;
| HDCP_DECRYPT_PAIRING_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x520&lt;br /&gt;
| HDCP_UPDATE_SESSION&lt;br /&gt;
|-&lt;br /&gt;
| 0x524&lt;br /&gt;
| HDCP_GENERATE_LC_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x528&lt;br /&gt;
| HDCP_VERIFY_LPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x52C&lt;br /&gt;
| HDCP_GENERATE_SKE_INIT&lt;br /&gt;
|-&lt;br /&gt;
| 0x530&lt;br /&gt;
| HDCP_VERIFY_VPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x534&lt;br /&gt;
| HDCP_ENCRYPTION_RUN_CTRL&lt;br /&gt;
|-&lt;br /&gt;
| 0x538&lt;br /&gt;
| HDCP_SESSION_CTRL&lt;br /&gt;
|-&lt;br /&gt;
| 0x53C&lt;br /&gt;
| HDCP_COMPUTE_SPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x540&lt;br /&gt;
| HDCP_GET_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x544&lt;br /&gt;
| HDCP_EXCHANGE_INFO&lt;br /&gt;
|-&lt;br /&gt;
| 0x548&lt;br /&gt;
| HDCP_DECRYPT_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x54C&lt;br /&gt;
| HDCP_GET_HPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x550&lt;br /&gt;
| HDCP_GENERATE_EKH_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x554&lt;br /&gt;
| HDCP_VERIFY_RTT_CHALLENGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x558&lt;br /&gt;
| HDCP_GET_LPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x55C&lt;br /&gt;
| HDCP_DECRYPT_KS&lt;br /&gt;
|-&lt;br /&gt;
| 0x560&lt;br /&gt;
| HDCP_DECRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x564&lt;br /&gt;
| HDCP_GET_RRX&lt;br /&gt;
|-&lt;br /&gt;
| 0x568&lt;br /&gt;
| HDCP_DECRYPT_REENCRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x56C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x570&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x574&lt;br /&gt;
| HDCP_DECRYPT_STORED_KM&lt;br /&gt;
|-&lt;br /&gt;
| 0x578&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x57C&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 0x700&lt;br /&gt;
| HDCP_VALIDATE_SRM&lt;br /&gt;
|-&lt;br /&gt;
| 0x704&lt;br /&gt;
| HDCP_VALIDATE_STREAM&lt;br /&gt;
|-&lt;br /&gt;
| 0x708&lt;br /&gt;
| HDCP_TEST_SECURE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 0x70C&lt;br /&gt;
| HDCP_SET_DCP_KPUB&lt;br /&gt;
|-&lt;br /&gt;
| 0x710&lt;br /&gt;
| HDCP_SET_RX_KPUB&lt;br /&gt;
|-&lt;br /&gt;
| 0x714&lt;br /&gt;
| HDCP_SET_CERT_RX&lt;br /&gt;
|-&lt;br /&gt;
| 0x718&lt;br /&gt;
| HDCP_SET_SCRATCH_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x71C&lt;br /&gt;
| HDCP_SET_SRM&lt;br /&gt;
|-&lt;br /&gt;
| 0x720&lt;br /&gt;
| HDCP_SET_RECEIVER_ID_LIST&lt;br /&gt;
|-&lt;br /&gt;
| 0x724&lt;br /&gt;
| HDCP_SET_SPRIME&lt;br /&gt;
|-&lt;br /&gt;
| 0x728&lt;br /&gt;
| HDCP_SET_ENC_INPUT_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x72C&lt;br /&gt;
| HDCP_SET_ENC_OUTPUT_BUFFER&lt;br /&gt;
|-&lt;br /&gt;
| 0x730&lt;br /&gt;
| HDCP_GET_RTT_CHALLENGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x734&lt;br /&gt;
| HDCP_STREAM_MANAGE&lt;br /&gt;
|-&lt;br /&gt;
| 0x738&lt;br /&gt;
| HDCP_READ_CAPS&lt;br /&gt;
|-&lt;br /&gt;
| 0x73C&lt;br /&gt;
| HDCP_ENCRYPT&lt;br /&gt;
|-&lt;br /&gt;
| 0x740&lt;br /&gt;
| [6.0.0+] HDCP_GET_CURRENT_NONCE&lt;br /&gt;
|-&lt;br /&gt;
| 0x1114&lt;br /&gt;
| PM_TRIGGER_END&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_METHOD1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_METHOD1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used to encode and send a method&#039;s data over HOST1X to TSEC. This register mirrors the functionality of HOST1X&#039;s channel opcode submission.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONTEXT_SWITCH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_THI_CONTEXT_SWITCH_PTR&lt;br /&gt;
|-&lt;br /&gt;
| 30-31&lt;br /&gt;
| TSEC_THI_CONTEXT_SWITCH_TARGET&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INT_STATUS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INT_STATUS_FALCON_INT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_INT_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_INT_MASK_FALCON_INT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CONFIG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_CONFIG0_RETURN_SYNCPT_ON_ERR&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_THI_CONFIG0_IDLE_SYNCPT_INC_ENG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_DBG_MISC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_THI_DBG_MISC_CLIENT_IDLE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_IDLE_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_SYNCPT_PENDING_STATUS&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_THI_DBG_MISC_THI_IDLE_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_SLCG_OVERRIDE_HIGH_A ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_THI_SLCG_OVERRIDE_HIGH_A_REG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_SLCG_OVERRIDE_LOW_A ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_SLCG_OVERRIDE_LOW_A_REG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_THI_CLK_OVERRIDE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_THI_CLK_OVERRIDE_CYA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSSET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSSET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSSET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSSET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSSET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSSET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSSET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSSET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSSET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSSET_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSSET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for setting Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSCLR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSCLR_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for clearing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQSTAT_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the status of Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMODE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMODE_LVL_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for changing the mode Falcon&#039;s IRQs. A value of 1 means level triggered while a value of 0 means edge triggered.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMSET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMSET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMSET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMSET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMSET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMSET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMSET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMSET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMSET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMSET_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMSET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for setting the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMCLR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMCLR_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for clearing the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQMASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQMASK_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQMASK_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQMASK_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQMASK_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQMASK_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQMASK_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQMASK_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQMASK_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQMASK_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQMASK_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the value of the mask for Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQDEST ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IRQDEST_HOST_EXT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_MTHD&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_HALT&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_EXTERR&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_SWGEN0&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_SWGEN1&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_IRQDEST_TARGET_EXT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for routing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRINT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_GPTMRINT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRVAL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_GPTMRVAL_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_GPTMRCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_GPTMRCTL_GPTMREN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PTIMER0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_PTIMER0_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PTIMER1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_PTIMER1_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_WDTMRVAL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_WDTMRVAL_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_WDTMRCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_WDTMRCTL_WDTMREN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IRQDEST2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IRQDEST2_HOST_DMA&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_IRQDEST2_TARGET_DMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for routing Falcon&#039;s IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MAILBOX0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MAILBOX0_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Scratch register for reading/writing data to Falcon.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MAILBOX1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MAILBOX1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Scratch register for reading/writing data to Falcon.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ITFEN ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_ITFEN_CTXEN&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_ITFEN_MTHDEN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for enabling/disabling Falcon interfaces.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IDLESTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_IDLESTATE_FALCON_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 1-15&lt;br /&gt;
| TSEC_FALCON_IDLESTATE_EXT_BUSY&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for detecting if Falcon is busy or not.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CURCTX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXPTR&lt;br /&gt;
|-&lt;br /&gt;
| 28-29&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXTGT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_CURCTX_CTXVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_NXTCTX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-27&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXPTR&lt;br /&gt;
|-&lt;br /&gt;
| 28-29&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXTGT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_NXTCTX_CTXVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CTXACK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CTXACK_SAVE_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CTXACK_REST_ACK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_FHSTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_FHSTATE_FALCON_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 1-15&lt;br /&gt;
| TSEC_FALCON_FHSTATE_EXT_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_FHSTATE_ENGINE_FAULTED&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_FHSTATE_STALL_REQ&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PRIVSTATE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_PRIVSTATE_PRIV&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MTHDDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDID ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_FALCON_MTHDID_ID&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_FALCON_MTHDID_SUBCH&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_MTHDID_PRIV&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_MTHDID_WPEND&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDWDAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_MTHDWDAT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDCOUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_MTHDCOUNT_COUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDPOP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_MTHDPOP_POP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_MTHDRAMSZ ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_MTHDRAMSZ_RAMSZ&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SFTRESET ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_SFTRESET_EXT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_OS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_OS_VERSION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_RM_CONFIG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SOFT_PM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_PROBE&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_TRIGGER_END&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_SOFT_PM_TRIGGER_START&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SOFT_MODE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_SOFT_MODE_PROBE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DEBUG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_DEBUG1_MTHD_DRAIN_TIME&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_DEBUG1_CTXSW_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_DEBUG1_TRACE_FORMAT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DEBUGINFO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DEBUGINFO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for UCODE self revocation. This register takes the base address of the GSC carveout shifted right by 8.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] [[NV_services|nvservices]] sets this to 0x8005FF00 &amp;gt;&amp;gt; 8 (physical DRAM address inside the GPU UCODE carveout) before starting the nvhost_tsec firmware.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT1_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT2_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CGCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CGCTL_CG_OVERRIDE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ENGCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_ENGCTL_INV_CONTEXT&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_ENGCTL_SET_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_ENGCTL_CLR_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_ENGCTL_SWITCH_CONTEXT&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_FALCON_ENGCTL_STALLREQ&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_FALCON_ENGCTL_STALLACK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_PMM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_STALL_SEL&lt;br /&gt;
 0x00: ANY&lt;br /&gt;
 0x01: CODE&lt;br /&gt;
 0x02: DMAQ&lt;br /&gt;
 0x03: DMFENCE&lt;br /&gt;
 0x04: DMWAIT&lt;br /&gt;
 0x05: IMWAIT&lt;br /&gt;
 0x06: IPND&lt;br /&gt;
 0x07: LDSTQ&lt;br /&gt;
 0x08: SB&lt;br /&gt;
 0x09: ANY_SC&lt;br /&gt;
 0x0A: CODE_SC&lt;br /&gt;
 0x0B: DMAQ_SC&lt;br /&gt;
 0x0C: DMFENCE_SC&lt;br /&gt;
 0x0D: DMWAIT_SC&lt;br /&gt;
 0x0E: IMWAIT_SC&lt;br /&gt;
 0x0F: IPND_SC&lt;br /&gt;
 0x10: LDSTQ_SC&lt;br /&gt;
 0x11: SB_SC&lt;br /&gt;
|-&lt;br /&gt;
| 5-7&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_IDLE_SEL&lt;br /&gt;
 0x00: WAITING&lt;br /&gt;
 0x01: ENG_IDLE&lt;br /&gt;
 0x02: MTHD_FULL&lt;br /&gt;
 0x03: WAITING_SC&lt;br /&gt;
 0x04: ENG_IDLE_SC&lt;br /&gt;
 0x05: MTHD_FULL_SC&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_SOFTPM0_SEL&lt;br /&gt;
 0x00: 0&lt;br /&gt;
 0x01: 1&lt;br /&gt;
 0x02: 2&lt;br /&gt;
 0x03: 3&lt;br /&gt;
 0x04: 4&lt;br /&gt;
 0x05: 5&lt;br /&gt;
 0x06: 0_SC&lt;br /&gt;
 0x07: 1_SC&lt;br /&gt;
 0x08: 2_SC&lt;br /&gt;
 0x09: 3_SC&lt;br /&gt;
 0x0A: 4_SC&lt;br /&gt;
 0x0B: 5_SC&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| TSEC_FALCON_PMM_FALCON_SOFTPM1_SEL&lt;br /&gt;
 0x00: 0&lt;br /&gt;
|-&lt;br /&gt;
| 17-19&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_DSTAT_SEL&lt;br /&gt;
 0x00: 1KTRANSFER&lt;br /&gt;
 0x01: RREQ&lt;br /&gt;
 0x02: WREQ&lt;br /&gt;
 0x03: TWREQ&lt;br /&gt;
 0x04: 1KTRANSFER_SC&lt;br /&gt;
 0x05: RREQ_SC&lt;br /&gt;
 0x06: WREQ_SC&lt;br /&gt;
 0x07: TWREQ_SC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL0_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
 0x01: RACKQ_FULL&lt;br /&gt;
 0x02: WREQQ_FULL&lt;br /&gt;
 0x03: WDATQ_FULL&lt;br /&gt;
 0x04: WACKQ_FULL&lt;br /&gt;
 0x05: MREQQ_FULL&lt;br /&gt;
 0x06: RREQ_PEND&lt;br /&gt;
 0x07: WREQ_PEND&lt;br /&gt;
 0x08: RDATQ_FULL_SC&lt;br /&gt;
 0x09: RACKQ_FULL_SC&lt;br /&gt;
 0x0A: WREQQ_FULL_SC&lt;br /&gt;
 0x0B: WDATQ_FULL_SC&lt;br /&gt;
 0x0C: WACKQ_FULL_SC&lt;br /&gt;
 0x0D: MREQQ_FULL_SC&lt;br /&gt;
 0x0E: RREQ_PEND_SC&lt;br /&gt;
 0x0F: WREQ_PEND_SC&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL1_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| TSEC_FALCON_PMM_TFBIF_STALL2_SEL&lt;br /&gt;
 0x00: RDATQ_FULL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_FALCON_ADDR_LSB&lt;br /&gt;
|-&lt;br /&gt;
| 6-11&lt;br /&gt;
| TSEC_FALCON_ADDR_MSB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT3 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT3_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT4 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT4_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IBRKPT5 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_PC&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_SUPPRESS&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_SKIP&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IBRKPT5_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXCI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-19&lt;br /&gt;
| TSEC_FALCON_EXCI_EXPC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| TSEC_FALCON_EXCI_EXCAUSE&lt;br /&gt;
 0x00: TRAP0&lt;br /&gt;
 0x01: TRAP1&lt;br /&gt;
 0x02: TRAP2&lt;br /&gt;
 0x03: TRAP3&lt;br /&gt;
 0x08: ILL_INS (invalid opcode)&lt;br /&gt;
 0x09: INV_INS (authentication entry)&lt;br /&gt;
 0x0A: MISS_INS (page miss)&lt;br /&gt;
 0x0B: DHIT_INS (page multiple hit)&lt;br /&gt;
 0x0F: BRKPT_INS (breakpoint hit)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information about raised exceptions.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SVEC_SPR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| TSEC_FALCON_SVEC_SPR_SIGPASS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RSTAT0 ===&lt;br /&gt;
Mirror of the [[#TSEC_FALCON_ICD_RDATA|ICD status register 0]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_RSTAT3 ===&lt;br /&gt;
Mirror of the [[#TSEC_FALCON_ICD_RDATA|ICD status register 3]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CPUCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_CPUCTL_IINVAL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CPUCTL_STARTCPU&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_CPUCTL_SRESET&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_CPUCTL_HRESET&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_CPUCTL_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_CPUCTL_STOPPED&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_CPUCTL_ALIAS_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for signaling the Falcon CPU.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_BOOTVEC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_BOOTVEC_VEC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the Falcon&#039;s boot vector address.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_HWCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-8&lt;br /&gt;
| TSEC_FALCON_HWCFG_IMEM_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 9-17&lt;br /&gt;
| TSEC_FALCON_HWCFG_DMEM_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 18-26&lt;br /&gt;
| TSEC_FALCON_HWCFG_METHODFIFO_DEPTH&lt;br /&gt;
|-&lt;br /&gt;
| 27-31&lt;br /&gt;
| TSEC_FALCON_HWCFG_DMAQUEUE_DEPTH&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMACTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMACTL_REQUIRE_CTX&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMACTL_DMEM_SCRUBBING&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_DMACTL_IMEM_SCRUBBING&lt;br /&gt;
|-&lt;br /&gt;
| 3-6&lt;br /&gt;
| TSEC_FALCON_DMACTL_DMAQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_DMACTL_SECURE_STAT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring the Falcon&#039;s DMA engine.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFBASE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMATRFBASE_BASE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Base address of the external memory buffer, shifted right by 8.&lt;br /&gt;
&lt;br /&gt;
The current transfer address is calculated by adding [[#TSEC_FALCON_DMATRFFBOFFS|TSEC_FALCON_DMATRFFBOFFS]] to the base.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFMOFFS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_DMATRFMOFFS_OFFS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For transfers to DMEM: the destination address.&lt;br /&gt;
For transfers to IMEM: the destination virtual IMEM page.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFCMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_FULL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 2-3&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_SEC&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_IMEM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_WRITE&lt;br /&gt;
|-&lt;br /&gt;
| 8-10&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_FALCON_DMATRFCMD_CTXDMA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring DMA transfers.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMATRFFBOFFS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMATRFFBOFFS_OFFS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For transfers to IMEM: the destination physical IMEM page.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAPOLL_FB ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_FENCE_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_DMA_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_CFG_R_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_CFG_W_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_WCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_FB_RCOUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of a DMA transfer between the Falcon and external memory.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAPOLL_CP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_FENCE_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_DMA_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_CFG_R_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_CFG_W_FENCE&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_WCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_DMAPOLL_CP_RCOUNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of a DMA transfer between the Falcon and the SCP.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_HWCFG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CORE_REV&lt;br /&gt;
|-&lt;br /&gt;
| 4-5&lt;br /&gt;
| TSEC_FALCON_HWCFG1_SECURITY_MODEL&lt;br /&gt;
|-&lt;br /&gt;
| 6-7&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CORE_REV_SUBVERSION&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_HWCFG1_IMEM_PORTS&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DMEM_PORTS&lt;br /&gt;
|-&lt;br /&gt;
| 16-20&lt;br /&gt;
| TSEC_FALCON_HWCFG1_TAG_WIDTH&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DBG_PRIV_BUS&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_FALCON_HWCFG1_CSB_SIZE_16M&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_HWCFG1_PRIV_DIRECT&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_HWCFG1_DMEM_APERTURES&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_HWCFG1_IMEM_AUTOFILL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CPUCTL_ALIAS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CPUCTL_ALIAS_STARTCPU&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_STACKCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_STACKCFG_BOTTOM&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_STACKCFG_SPEXC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IMCTL_ADDR_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_FALCON_IMCTL_CMD&lt;br /&gt;
 0x00: NOP&lt;br /&gt;
 0x01: IMINV (ITLB)&lt;br /&gt;
 0x02: IMBLK (PTLB)&lt;br /&gt;
 0x03: IMTAG (VTLB)&lt;br /&gt;
 0x04: IMTAG_SETVLD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the Falcon TLB.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_IMSTAT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the result of the last command from [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_TRACEIDX ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 16-23&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_MAXIDX&lt;br /&gt;
|-&lt;br /&gt;
| 24-31&lt;br /&gt;
| TSEC_FALCON_TRACEIDX_CNT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the index for tracing with [[#TSEC_FALCON_TRACEPC|TSEC_FALCON_TRACEPC]].&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_TRACEPC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_TRACEPC_PC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the PC of the last call or branch executed.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLRNG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG0_TAG_LO&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG0_TAG_HI&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLRNG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG1_TAG_LO&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_IMFILLRNG1_TAG_HI&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMFILLCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_IMFILLCTL_NBLOCKS&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMCTL_DEBUG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_IMCTL_DEBUG_ADDR_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_FALCON_IMCTL_DEBUG_CMD&lt;br /&gt;
 0x00: NOP&lt;br /&gt;
 0x02: IMBLK&lt;br /&gt;
 0x03: IMTAG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CMEMBASE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 18-31&lt;br /&gt;
| TSEC_FALCON_CMEMBASE_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMAPERT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_TIME_OUT&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_TIME_UNIT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 17-19&lt;br /&gt;
| TSEC_FALCON_DMEMAPERT_LDSTQ_NUM&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXTERRADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_EXTERRADDR_ADDR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_EXTERRSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-23&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_PC&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_STAT&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_EXTERRSTAT_VALID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_CG2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_DMA&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_GC6_SR_FSM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_PIPE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_DIV&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_ICD&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_CFG&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_CTXSW&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_PMB&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_RF&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_MUL&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_LDST&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_TSYNC&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_GPTMR&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_WDTMR&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_IRQSTAT&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FALCON_TOP&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_FALCON_CG2_SLCG_FBIF&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 2-7&lt;br /&gt;
| TSEC_FALCON_IMEMC_OFFS&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_IMEMC_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_FALCON_IMEMC_AINCW&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_FALCON_IMEMC_AINCR&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_FALCON_IMEMC_SECURE&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_ATOMIC&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_WR_VIO&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_IMEMC_SEC_LOCK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring access to Falcon&#039;s IMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_IMEMD_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the value for an IMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_IMEMT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_FALCON_IMEMT_TAG&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the virtual page index for an IMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 2-7&lt;br /&gt;
| TSEC_FALCON_DMEMC_OFFS&lt;br /&gt;
|-&lt;br /&gt;
| 8-15&lt;br /&gt;
| TSEC_FALCON_DMEMC_BLK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_FALCON_DMEMC_AINCW&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_FALCON_DMEMC_AINCR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for configuring access to Falcon&#039;s DMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMEMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMEMD_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns or takes the value for a DMEM read/write operation.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_CMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_OPC&lt;br /&gt;
 0x00: STOP&lt;br /&gt;
 0x01: RUN (run from PC)&lt;br /&gt;
 0x02: JRUN (run from address)&lt;br /&gt;
 0x03: RUNB (run from PC)&lt;br /&gt;
 0x04: JRUNB (run from address)&lt;br /&gt;
 0x05: STEP (step from PC)&lt;br /&gt;
 0x06: JSTEP (step from address)&lt;br /&gt;
 0x07: EMASK (set exception mask)&lt;br /&gt;
 0x08: RREG (read register)&lt;br /&gt;
 0x09: WREG (write register)&lt;br /&gt;
 0x0A: RDM (read data memory)&lt;br /&gt;
 0x0B: WDM (write data memory)&lt;br /&gt;
 0x0C: RCM (read MMIO/configuration memory)&lt;br /&gt;
 0x0D: WCM (write MMIO/configuration memory)&lt;br /&gt;
 0x0E: RSTAT (read status)&lt;br /&gt;
 0x0F: SBU (store buffer update)&lt;br /&gt;
|-&lt;br /&gt;
| 6-7&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_SZ&lt;br /&gt;
 0x00: B (byte)&lt;br /&gt;
 0x01: HW (half word)&lt;br /&gt;
 0x02: W (word)&lt;br /&gt;
|-&lt;br /&gt;
| 8-12&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_IDX&lt;br /&gt;
 0x00: REG0 | RSTAT0 | WB0&lt;br /&gt;
 0x01: REG1 | RSTAT1 | WB1&lt;br /&gt;
 0x02: REG2 | RSTAT2 | WB2&lt;br /&gt;
 0x03: REG3 | RSTAT3 | WB3&lt;br /&gt;
 0x04: REG4 | RSTAT4&lt;br /&gt;
 0x05: REG5 | RSTAT5&lt;br /&gt;
 0x06: REG6&lt;br /&gt;
 0x07: REG7&lt;br /&gt;
 0x08: REG8&lt;br /&gt;
 0x09: REG9&lt;br /&gt;
 0x0A: REG10&lt;br /&gt;
 0x0B: REG11&lt;br /&gt;
 0x0C: REG12&lt;br /&gt;
 0x0D: REG13&lt;br /&gt;
 0x0E: REG14&lt;br /&gt;
 0x0F: REG15&lt;br /&gt;
 0x10: IV0&lt;br /&gt;
 0x11: IV1&lt;br /&gt;
 0x12: UNDEFINED&lt;br /&gt;
 0x13: EV&lt;br /&gt;
 0x14: SP&lt;br /&gt;
 0x15: PC&lt;br /&gt;
 0x16: IMB&lt;br /&gt;
 0x17: DMB&lt;br /&gt;
 0x18: CSW&lt;br /&gt;
 0x19: CCR&lt;br /&gt;
 0x1A: SEC&lt;br /&gt;
 0x1B: CTX&lt;br /&gt;
 0x1C: EXCI&lt;br /&gt;
 0x1D: SEC1&lt;br /&gt;
 0x1E: IMB1&lt;br /&gt;
 0x1F: DMB1&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_ERROR&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_RDVLD&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_FALCON_ICD_CMD_PARM&lt;br /&gt;
 0x0001: EMASK_TRAP0&lt;br /&gt;
 0x0002: EMASK_TRAP1&lt;br /&gt;
 0x0004: EMASK_TRAP2&lt;br /&gt;
 0x0008: EMASK_TRAP3&lt;br /&gt;
 0x0010: EMASK_EXC_UNIMP&lt;br /&gt;
 0x0020: EMASK_EXC_IMISS&lt;br /&gt;
 0x0040: EMASK_EXC_IMHIT&lt;br /&gt;
 0x0080: EMASK_EXC_IBREAK&lt;br /&gt;
 0x0100: EMASK_IV0&lt;br /&gt;
 0x0200: EMASK_IV1&lt;br /&gt;
 0x0400: EMASK_IV2&lt;br /&gt;
 0x0800: EMASK_EXT0&lt;br /&gt;
 0x1000: EMASK_EXT1&lt;br /&gt;
 0x2000: EMASK_EXT2&lt;br /&gt;
 0x4000: EMASK_EXT3&lt;br /&gt;
 0x8000: EMASK_EXT4&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for sending commands to the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_ADDR_ADDR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the target address for the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_WDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_WDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the data for writing using the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_ICD_RDATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_ICD_RDATA_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Returns the data read using the Falcon&#039;s in-chip debugger.&lt;br /&gt;
&lt;br /&gt;
When reading from an internal status register (STAT), the following applies:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| RSTAT0_MEM_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| RSTAT0_DMA_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| RSTAT0_FENCE_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| RSTAT0_DIV_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT0_DMA_STALL_DMAQ&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| RSTAT0_DMA_STALL_DMWAITING&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| RSTAT0_DMA_STALL_IMWAITING&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| RSTAT0_ANY_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| RSTAT0_SBFULL_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| RSTAT0_SBHIT_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| RSTAT0_FLOW_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| RSTAT0_SP_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| RSTAT0_BL_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| RSTAT0_IPND_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| RSTAT0_LDSTQ_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| RSTAT0_NOINSTR_STALL&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT0_HALTSTOP_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT0_AFILL_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT0_EXC_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 23-25&lt;br /&gt;
| RSTAT0_IRQ_FLUSH&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| RSTAT0_VALIDRD&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| RSTAT0_WAITING&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| RSTAT0_HALTED&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| RSTAT0_MTHD_FULL&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| RSTAT1_WB_ALLOC&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| RSTAT1_WB_VALID&lt;br /&gt;
|-&lt;br /&gt;
| 8-9&lt;br /&gt;
| RSTAT1_WB0_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 10-11&lt;br /&gt;
| RSTAT1_WB1_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| RSTAT1_WB2_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 14-15&lt;br /&gt;
| RSTAT1_WB3_SZ&lt;br /&gt;
|-&lt;br /&gt;
| 16-19&lt;br /&gt;
| RSTAT1_WB0_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| RSTAT1_WB1_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| RSTAT1_WB2_IDX&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| RSTAT1_WB3_IDX&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| RSTAT2_DMAQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT2_DMA_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 5-7&lt;br /&gt;
| RSTAT2_LDSTQ_NUM&lt;br /&gt;
|-&lt;br /&gt;
| 16-19&lt;br /&gt;
| RSTAT2_EM_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 20-23&lt;br /&gt;
| RSTAT2_EM_ACKED&lt;br /&gt;
|-&lt;br /&gt;
| 24-27&lt;br /&gt;
| RSTAT2_EM_ISWR&lt;br /&gt;
|-&lt;br /&gt;
| 28-31&lt;br /&gt;
| RSTAT2_EM_DVLD&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| RSTAT3_MTHD_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| RSTAT3_CTXSW_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| RSTAT3_DMA_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| RSTAT3_SCP_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| RSTAT3_LDST_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| RSTAT3_SBWB_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 6-8&lt;br /&gt;
| RSTAT3_CSWIE&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| RSTAT3_CSWE&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| RSTAT3_CTXSW_STATE&lt;br /&gt;
 0x00: IDLE&lt;br /&gt;
 0x01: SM_CHECK&lt;br /&gt;
 0x02: SM_SAVE&lt;br /&gt;
 0x03: SM_SAVE_WAIT&lt;br /&gt;
 0x04: SM_BLK_BIND&lt;br /&gt;
 0x05: SM_RESET&lt;br /&gt;
 0x06: SM_RESETWAIT&lt;br /&gt;
 0x07: SM_ACK&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| RSTAT3_CTXSW_PEND&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| RSTAT3_DMA_FBREQ_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| RSTAT3_DMA_ACKQ_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| RSTAT3_DMA_RDQ_EMPTY&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT3_DMA_WR_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT3_DMA_RD_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT3_LDST_XT_BUSY&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| RSTAT3_LDST_XT_BLOCK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| RSTAT3_ENG_IDLE&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| RSTAT4_ICD_STATE&lt;br /&gt;
 0x00: NORMAL&lt;br /&gt;
 0x01: WAIT_ISSUE_CLEAR&lt;br /&gt;
 0x02: WAIT_EXLDQ_CLEAR&lt;br /&gt;
 0x03: FULL_DBG_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 2-3&lt;br /&gt;
| RSTAT4_ICD_MODE&lt;br /&gt;
 0x00: SUPPRESSICD&lt;br /&gt;
 0x01: ENTERICD_IBRK&lt;br /&gt;
 0x02: ENTERICD_STEP&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP0&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP1&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP2&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| RSTAT4_ICD_EMASK_TRAP3&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_UNIMP&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IMISS&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IMHIT&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXC_IBREAK&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV0&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV1&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| RSTAT4_ICD_EMASK_IV2&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT0&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT1&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT2&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT3&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| RSTAT4_ICD_EMASK_EXT4&lt;br /&gt;
|}&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7&lt;br /&gt;
| RSTAT5_LRU_STATE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_SCTL_LSMODE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_SCTL_HSMODE&lt;br /&gt;
|-&lt;br /&gt;
| 4-5&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| Initialize the transition to LS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| Set on memory protection violation&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_IMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to Falcon IMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_DMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to Falcon DMEM.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_CPUCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the [[#TSEC_FALCON_CPUCTL|TSEC_FALCON_CPUCTL]] register.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_MISC ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_PRIVSTATE|TSEC_FALCON_PRIVSTATE]]&lt;br /&gt;
* [[#TSEC_FALCON_SFTRESET|TSEC_FALCON_SFTRESET]]&lt;br /&gt;
* [[#TSEC_FALCON_ADDR|TSEC_FALCON_ADDR]]&lt;br /&gt;
* [[#TSEC_FALCON_DMACTL|TSEC_FALCON_DMACTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IMCTL|TSEC_FALCON_IMCTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IMSTAT|TSEC_FALCON_IMSTAT]]&lt;br /&gt;
* TSEC_FALCON_UNK_250&lt;br /&gt;
* [[#TSEC_FALCON_DMAINFO_CTL|TSEC_FALCON_DMAINFO_CTL]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_IRQ ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_IRQMODE|TSEC_FALCON_IRQMODE]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQMSET|TSEC_FALCON_IRQMSET]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQMCLR|TSEC_FALCON_IRQMCLR]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQDEST|TSEC_FALCON_IRQDEST]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRINT|TSEC_FALCON_GPTMRINT]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRVAL|TSEC_FALCON_GPTMRVAL]]&lt;br /&gt;
* [[#TSEC_FALCON_GPTMRCTL|TSEC_FALCON_GPTMRCTL]]&lt;br /&gt;
* [[#TSEC_FALCON_IRQDEST2|TSEC_FALCON_IRQDEST2]]&lt;br /&gt;
* TSEC_FALCON_UNK_E0&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_MTHD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_ITFEN|TSEC_FALCON_ITFEN]]&lt;br /&gt;
* [[#TSEC_FALCON_CURCTX|TSEC_FALCON_CURCTX]]&lt;br /&gt;
* [[#TSEC_FALCON_NXTCTX|TSEC_FALCON_NXTCTX]]&lt;br /&gt;
* [[#TSEC_FALCON_CTXACK|TSEC_FALCON_CTXACK]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDDATA|TSEC_FALCON_MTHDDATA]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDID|TSEC_FALCON_MTHDID]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDWDAT|TSEC_FALCON_MTHDWDAT]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDCOUNT|TSEC_FALCON_MTHDCOUNT]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDPOP|TSEC_FALCON_MTHDPOP]]&lt;br /&gt;
* [[#TSEC_FALCON_MTHDRAMSZ|TSEC_FALCON_MTHDRAMSZ]]&lt;br /&gt;
* [[#TSEC_FALCON_DEBUG1|TSEC_FALCON_DEBUG1]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_SCTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the [[#TSEC_FALCON_SCTL|TSEC_FALCON_SCTL]] register.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_SPROT_WDTMR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to the following registers:&lt;br /&gt;
* [[#TSEC_FALCON_WDTMRVAL|TSEC_FALCON_WDTMRVAL]]&lt;br /&gt;
* [[#TSEC_FALCON_WDTMRCTL|TSEC_FALCON_WDTMRCTL]]&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBRD_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_FINISHED_FBWR_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBRD_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_LOW_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-30&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH_VAL&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CURRENT_FBWR_HIGH_OBIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_FALCON_DMAINFO_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CTL_CLR_FBRD&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_FALCON_DMAINFO_CTL_CLR_FBWR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| Enable the [[#LOAD|LOAD]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Enable the [[#STORE|STORE]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| Enable the [[#CMD|CMD]] block&#039;s interface&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Enable the [[#SEQ|SEQ]] block&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Enable the [[#CTL|CTL]] block&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Clear [[#SEQ|SEQ]] block&#039;s pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Clear the main [[#SCP|SCP]] pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| Enable [[#RNG|RNG]] block&#039;s test mode&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Enable the [[#RNG|RNG]] block&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Enable [[#LOAD|LOAD]] block&#039;s interface dummy mode (all reads return 0)&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Enable [[#LOAD|LOAD]] block&#039;s interface bypassing (all reads are dropped)&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Enable [[#STORE|STORE]] block&#039;s interface bypassing (all writes are dropped)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_STAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_SCP_CTL_STAT_DEBUG_MODE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_LOCK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Enable lockdown mode (locks IMEM and DMEM)&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Lock the [[#SCP|SCP]]&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls lockdown mode and can only be cleared in Heavy Secure mode.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#AES|AES]] block&#039;s endianness&lt;br /&gt;
 0: Little&lt;br /&gt;
 1: Big&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Flush [[#CMD|CMD]] block&#039;s pipeline&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| Carry chain size&lt;br /&gt;
 0: 32 bits&lt;br /&gt;
 1: 64 bits&lt;br /&gt;
 2: 96 bits&lt;br /&gt;
 3: 128 bits&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| Timeout value&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_SCP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Swap [[#SCP|SCP]] master&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| Current [[#SCP|SCP]] master&lt;br /&gt;
 0: Falcon&lt;br /&gt;
 1: External&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_PKEY ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_SCP_CTL_PKEY_REQUEST_RELOAD&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_SCP_CTL_PKEY_LOADED&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CTL_DBG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Index&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Auto-increment&lt;br /&gt;
|-&lt;br /&gt;
| 5-6&lt;br /&gt;
| Target&lt;br /&gt;
 0: None&lt;br /&gt;
 1: STORE&lt;br /&gt;
 2: LOAD&lt;br /&gt;
 3: SEQ&lt;br /&gt;
|-&lt;br /&gt;
| 8-12&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current sequence size&lt;br /&gt;
|-&lt;br /&gt;
| 13-16&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction address&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction is valid&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| [[#SEQ|SEQ]] block is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 19-22&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s pipeline size&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s current operation is valid&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#LOAD|LOAD]] block is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 25-26&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s pipeline size&lt;br /&gt;
|-&lt;br /&gt;
| 30&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s current operation is valid&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| [[#STORE|STORE]] block is running in HS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for debugging the [[#LOAD|LOAD]], [[#STORE|STORE]] and [[#SEQ|SEQ]] blocks.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s first operand&lt;br /&gt;
|-&lt;br /&gt;
| 4-9&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s second operand&lt;br /&gt;
|-&lt;br /&gt;
| 10-14&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s current instruction&#039;s opcode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for retrieving debug data. Contains information on the last crypto sequence created when debugging the SEQ controller.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_DBG2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| [[#SEQ|SEQ]] block&#039;s state&lt;br /&gt;
 0: Idle&lt;br /&gt;
 1: Recording is active (cs0begin/cs1begin)&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Number of [[#SEQ|SEQ]] block&#039;s instructions left&lt;br /&gt;
|-&lt;br /&gt;
| 12-15&lt;br /&gt;
| Active crypto key register&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for retrieving additional debug data associated with the [[#SEQ|SEQ]] block.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CMD ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Destination register&lt;br /&gt;
|-&lt;br /&gt;
| 8-13&lt;br /&gt;
| Source register or immediate value&lt;br /&gt;
|-&lt;br /&gt;
| 20-24&lt;br /&gt;
| Command opcode&lt;br /&gt;
 0x0:  nop (fuc5 opcode 0x00) &lt;br /&gt;
 0x1:  cmov (fuc5 opcode 0x84)&lt;br /&gt;
 0x2:  cxsin (fuc5 opcode 0x88) or xdst (with cxset)&lt;br /&gt;
 0x3:  cxsout (fuc5 opcode 0x8C) or xdld (with cxset) &lt;br /&gt;
 0x4:  crnd (fuc5 opcode 0x90)&lt;br /&gt;
 0x5:  cs0begin (fuc5 opcode 0x94)&lt;br /&gt;
 0x6:  cs0exec (fuc5 opcode 0x98)&lt;br /&gt;
 0x7:  cs1begin (fuc5 opcode 0x9C)&lt;br /&gt;
 0x8:  cs1exec (fuc5 opcode 0xA0)&lt;br /&gt;
 0x9:  invalid (fuc5 opcode 0xA4)&lt;br /&gt;
 0xA:  cchmod (fuc5 opcode 0xA8)&lt;br /&gt;
 0xB:  cxor (fuc5 opcode 0xAC)&lt;br /&gt;
 0xC:  cadd (fuc5 opcode 0xB0)&lt;br /&gt;
 0xD:  cand (fuc5 opcode 0xB4)&lt;br /&gt;
 0xE:  crev (fuc5 opcode 0xB8)&lt;br /&gt;
 0xF:  cprecmac (fuc5 opcode 0xBC)&lt;br /&gt;
 0x10: csecret (fuc5 opcode 0xC0)&lt;br /&gt;
 0x11: ckeyreg (fuc5 opcode 0xC4)&lt;br /&gt;
 0x12: ckexp (fuc5 opcode 0xC8)&lt;br /&gt;
 0x13: ckrexp (fuc5 opcode 0xCC)&lt;br /&gt;
 0x14: cenc (fuc5 opcode 0xD0)&lt;br /&gt;
 0x15: cdec (fuc5 opcode 0xD4)&lt;br /&gt;
 0x16: csigcmp (fuc5 opcode 0xD8)&lt;br /&gt;
 0x17: csigenc (fuc5 opcode 0xDC)&lt;br /&gt;
 0x18: csigclr (fuc5 opcode 0xE0)&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s current instruction is valid&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| [[#CMD|CMD]] block is running in HS mode&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on the last crypto command executed.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#SCP|SCP]] is active&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| [[#SEQ|SEQ]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#CTL|CTL]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is active&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| [[#AES|AES]] block is active&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#RNG|RNG]] block is active&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of the hardware blocks and interfaces.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-1&lt;br /&gt;
| Signature comparison result&lt;br /&gt;
 0: None&lt;br /&gt;
 1: Running&lt;br /&gt;
 2: Failed&lt;br /&gt;
 3: Succeeded&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| [[#LOAD|LOAD]] block&#039;s interface is ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| [[#STORE|STORE]] block&#039;s interface received a valid operation&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface is running in HS mode&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| [[#CMD|CMD]] block&#039;s interface received a valid instruction&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of the last authentication attempt and other miscellaneous statuses.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_STAT2 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4&lt;br /&gt;
| Current [[#SEQ|SEQ]] block opcode&lt;br /&gt;
|-&lt;br /&gt;
| 5-9&lt;br /&gt;
| Current [[#CMD|CMD]] block&#039;s interface opcode&lt;br /&gt;
|-&lt;br /&gt;
| 10-14&lt;br /&gt;
| Pending [[#CMD|CMD]] block opcode&lt;br /&gt;
|-&lt;br /&gt;
| 15-16&lt;br /&gt;
| Current [[#AES|AES]] block operation&lt;br /&gt;
 0: Encryption&lt;br /&gt;
 1: Decryption&lt;br /&gt;
 2: Key expansion&lt;br /&gt;
 3: Key reverse expansion&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| [[#STORE|STORE]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| [[#LOAD|LOAD]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| [[#RNG|RNG]] block is stalled&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 29&lt;br /&gt;
| [[#AES|AES]] block is stalled&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains the status of crypto operations.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RNG_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] block is ready&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RNG_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_IRQSTAT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| ACL error&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| SEC error&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#CMD|CMD]] error&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Single step&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#RND|RND]] operation&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Timeout&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the status of crypto IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_IRQMASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| [[#RND|RND]] ready&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| ACL error&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| SEC error&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [[#CMD|CMD]] error&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Single step&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [[#RND|RND]] operation&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| Timeout&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Used for getting the value of the mask for crypto IRQs.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_ACL_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Writing to a crypto register without the correct ACL&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Reading from a crypto register without the correct ACL&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| Invalid ACL change (cchmod)&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| ACL error occurred&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on errors generated by the [[#TSEC_SCP_IRQSTAT|ACL error]] IRQ.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_SEC_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 1-2&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 5-6&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 17-18&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 21-22&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 25-26&lt;br /&gt;
| Unknown&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| SEC error occurred&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_CMD_ERR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| Invalid [[#CMD|CMD]] command&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| Empty [[#SEQ|SEQ]] sequence&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [[#SEQ|SEQ]] sequence is too long&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| [[#SEQ|SEQ]] sequence was not finished&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| Forbidden signature operation (csigcmp, csigenc or csigclr in NS mode)&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| Invalid signature operation (csigcmp in HS mode)&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| Forbidden ACL change (cchmod in NS mode)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Contains information on errors generated by the [[#TSEC_SCP_IRQSTAT|CMD error]] IRQ.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RND_CTL0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| [[#RND|RND]] clock trigger lower limit&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_SCP_RND_CTL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| [[#RND|RND]] clock trigger upper limit&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| [[#RND|RND]] clock trigger mask&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_BWCOUNT&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_CTL_ENABLE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_IDLEWDERR&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_CTL_RESET&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_CTL_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_CTL_IDLEWDERR&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_CTL_SRTOUT&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_CTL_CLR_SRTOUT&lt;br /&gt;
|-&lt;br /&gt;
| 8-11&lt;br /&gt;
| TSEC_TFBIF_CTL_SRTOVAL&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_CTL_VPR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_MCCIF_FIFOCTRL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WRCL_MCLE2X&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RDMC_RDFAST&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WRMC_CLLE2X&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RDCL_RDFAST&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_CCLK_OVERRIDE&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_RCLK_OVR_MODE&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL_WCLK_OVR_MODE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_THROTTLE ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-11&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_BUCKET_SIZE&lt;br /&gt;
|-&lt;br /&gt;
| 16-27&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_LEAK_COUNT&lt;br /&gt;
|-&lt;br /&gt;
| 30-31&lt;br /&gt;
| TSEC_TFBIF_THROTTLE_LEAK_SIZE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_STAT0 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_1K_TRANSFER&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RREQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WREQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_TAGQ_ISSUED&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RDATQ&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RACKQ&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WREQQ&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WDATQ&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WACKQ&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_RREQ_PENDING&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_WREQ_PENDING&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_STALL_MREQ&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_ENGINE_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RMCCIF_IDLE &lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WMCCIF_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_CSB_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_RU_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_WU_IDLE&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_UNWEIGHT_ACTMON_ACTIVE&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT0_UNWEIGHT_ACTMON_MCB&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_STAT1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_STAT1_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_RDCOUNT_LO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_RDCOUNT_LO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_RDCOUNT_HI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_RDCOUNT_HI_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_WRCOUNT_LO ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_WRCOUNT_LO_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_WRCOUNT_HI ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_WRCOUNT_HI_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R32COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R32COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R64COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R64COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_DBG_R128COUNT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_DBG_R128COUNT_DATA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_MCCIF_FIFOCTRL1 ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL1_SRD2MC_REORDER_DEPTH_LIMIT&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_TFBIF_MCCIF_FIFOCTRL1_SWR2MC_REORDER_DEPTH_LIMIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_WRR_RDP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-15&lt;br /&gt;
| TSEC_TFBIF_WRR_RDP_EXT_WEIGHT&lt;br /&gt;
|-&lt;br /&gt;
| 16-31&lt;br /&gt;
| TSEC_TFBIF_WRR_RDP_INT_WEIGHT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_SPROT_EMEM ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-3&lt;br /&gt;
| Read access level&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| Write access level&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls accesses to external memory regions. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_TRANSCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT0_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT1_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT2_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT3_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT4_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT5_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT6_SWID&lt;br /&gt;
|-&lt;br /&gt;
| 28&lt;br /&gt;
| TSEC_TFBIF_TRANSCFG_ATT7_SWID&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Configures the software ID per CTXDMA port for memory transactions. Software ID 0 (HW_SWID) forces all transactions to go through the SMMU while software ID 1 (PHY_SWID) bypasses it. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] The nvhost_tsec firmware sets this register to 0x10 or 0x111110 before reading memory from the GPU UCODE carveout.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_REGIONCFG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-2&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T0_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T0_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 4-6&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T1_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T1_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 8-10&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T2_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T2_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 12-14&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T3_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T3_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 16-18&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T4_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T4_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 20-22&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T5_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T5_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 24-26&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T6_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T6_VPR&lt;br /&gt;
|-&lt;br /&gt;
| 28-30&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T7_APERT_ID&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_TFBIF_REGIONCFG_T7_VPR&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Configures the aperture ID and VPR mode per CTXDMA port for memory region accessing. Accessible in HS mode only.&lt;br /&gt;
&lt;br /&gt;
[6.0.0+] The nvhost_tsec firmware sets this register to 0x20 or 0x140 before reading memory from the GPU UCODE carveout.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_STARVED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_STALLED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_DELAYED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_MASK_ACTIVE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the memory access mask for the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_BORPS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STARVED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STARVED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STALLED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_STALLED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_DELAYED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_DELAYED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_ACTIVE_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_BORPS_ACTIVE_OPERATION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the billions of records per second count for the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_ACTMON_ACTIVE_WEIGHT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls the Activity Monitor. Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_MASK ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_STARVED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_STALLED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_DELAYED_MC&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_MASK_ACTIVE&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_BORPS ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STARVED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STARVED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STALLED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_STALLED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_DELAYED_MC_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_DELAYED_MC_OPERATION&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_ACTIVE_POLARITY&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_BORPS_ACTIVE_OPERATION&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_ACTMON_MCB_WEIGHT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_TFBIF_ACTMON_MCB_WEIGHT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Disconnected on the TSEC.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TFBIF_THI_TRANSPROP ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-6&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_STREAMID0&lt;br /&gt;
|-&lt;br /&gt;
| 8-14&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_STREAMID1&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TFBIF_THI_TRANSPROP_TZ_AUTH&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_CG ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-5&lt;br /&gt;
| TSEC_CG_IDLE_CG_DLY_CNT&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| TSEC_CG_IDLE_CG_EN&lt;br /&gt;
|-&lt;br /&gt;
| 16-18&lt;br /&gt;
| TSEC_CG_WAKEUP_DLY_CNT&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| TSEC_CG_WAKEUP_DLY_EN&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0&lt;br /&gt;
| TSEC_BAR0_CTL_READ&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| TSEC_BAR0_CTL_WRITE&lt;br /&gt;
|-&lt;br /&gt;
| 4-7&lt;br /&gt;
| TSEC_BAR0_CTL_BYTE_MASK&lt;br /&gt;
|-&lt;br /&gt;
| 12-13&lt;br /&gt;
| TSEC_BAR0_CTL_STATUS&lt;br /&gt;
 0: Idle&lt;br /&gt;
 1: Busy&lt;br /&gt;
 2: Error&lt;br /&gt;
 3: Disabled&lt;br /&gt;
|-&lt;br /&gt;
| 16-17&lt;br /&gt;
| TSEC_BAR0_CTL_SEC_MODE&lt;br /&gt;
 0: None&lt;br /&gt;
 1: Invalid&lt;br /&gt;
 2: Light Secure&lt;br /&gt;
 3: Heavy Secure&lt;br /&gt;
|-&lt;br /&gt;
| 31&lt;br /&gt;
| TSEC_BAR0_CTL_INIT&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Controls DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
Starting a transfer over BAR0 automatically sets TSEC_BAR0_CTL_SEC_MODE to the current Falcon security mode. Once set, any attempts to start a transfer from a lower security level will fail.&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_ADDR ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_ADDR_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the address for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_DATA ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_DATA_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the data for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_BAR0_TIMEOUT ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-31&lt;br /&gt;
| TSEC_BAR0_TIMEOUT_VAL&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Takes the timeout value for DMA transfers between TSEC and HOST1X (master and clients).&lt;br /&gt;
&lt;br /&gt;
=== TSEC_TEGRA_CTL ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| TSEC_TEGRA_CTL_TKFI_KFUSE&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| TSEC_TEGRA_CTL_TKFI_RESTART_FSM_KFUSE&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_FORCE_IDLE_INPUTS_I2C&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_RESTART_FSM_HOST1X&lt;br /&gt;
|-&lt;br /&gt;
| 26&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_RESTART_FSM_APB&lt;br /&gt;
|-&lt;br /&gt;
| 27&lt;br /&gt;
| TSEC_TEGRA_CTL_TMPI_DISABLE_OUTPUT_I2C&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Falcon ==&lt;br /&gt;
&amp;quot;Falcon&amp;quot; (FAst Logic CONtroller) is a proprietary general purpose CPU which can be found inside various hardware blocks that require some sort of logic processing such as TSEC (TSECA and TSECB), NVDEC, NVENC, NVJPG, VIC, GPU PMU and XUSB.&lt;br /&gt;
&lt;br /&gt;
=== Processor Registers ===&lt;br /&gt;
A total of 32 processor registers are available in the Falcon CPU.&lt;br /&gt;
&lt;br /&gt;
==== REG0-REG15 ====&lt;br /&gt;
These are 16 32-bit GPRs (general purpose registers).&lt;br /&gt;
&lt;br /&gt;
==== IV0 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 0. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IV1 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 1. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IV2 ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for interrupt vector 2. This register is considered &amp;quot;UNDEFINED&amp;quot; and appears to be unused.&lt;br /&gt;
&lt;br /&gt;
==== EV ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the address for the exception vector. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;tv&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SP ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the current stack pointer. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== PC ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the current program counter. Only bits 0 to 15 are used.&lt;br /&gt;
&lt;br /&gt;
==== IMB ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the external base address for IMEM transfers.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xcbase&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== DMB ====&lt;br /&gt;
This is a SPR (special purpose register) that holds the external base address for DMEM transfers.&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xdbase&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CSW ====&lt;br /&gt;
This is a SPR (special purpose register) that holds various flag bits.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7 || General purpose predicates&lt;br /&gt;
|-&lt;br /&gt;
| 8 || ALU carry flag&lt;br /&gt;
|-&lt;br /&gt;
| 9 || ALU signed overflow flag&lt;br /&gt;
|-&lt;br /&gt;
| 10 || ALU sign flag&lt;br /&gt;
|-&lt;br /&gt;
| 11 || ALU zero flag&lt;br /&gt;
|-&lt;br /&gt;
| 16 || Interrupt 0 enable&lt;br /&gt;
|-&lt;br /&gt;
| 17 || Interrupt 1 enable&lt;br /&gt;
|-&lt;br /&gt;
| 18 || Interrupt 2 enable (undefined)&lt;br /&gt;
|-&lt;br /&gt;
| 20 || Interrupt 0 saved enable&lt;br /&gt;
|-&lt;br /&gt;
| 21 || Interrupt 1 saved enable&lt;br /&gt;
|-&lt;br /&gt;
| 22 || Interrupt 2 saved enable (undefined)&lt;br /&gt;
|-&lt;br /&gt;
| 24 || Exception active&lt;br /&gt;
|-&lt;br /&gt;
| 26-31 || Unknown&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;flags&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CCR ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the SCP DMA override functionality. The value of this register is set using the &amp;quot;cxset&amp;quot; instruction which provides a way to change the behavior of a variable amount of successively executed DMA-related instructions (&amp;quot;xdwait&amp;quot;, &amp;quot;xdst&amp;quot; and &amp;quot;xdld&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable&lt;br /&gt;
! Bits || Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-4 || Number of instructions the override is valid for (0x1F means infinite)&lt;br /&gt;
|-&lt;br /&gt;
| 5 || Crypto source/destination select&lt;br /&gt;
 0: Crypto register&lt;br /&gt;
 1: Crypto stream&lt;br /&gt;
|-&lt;br /&gt;
| 6 || Bypass mode&lt;br /&gt;
 0: Disabled&lt;br /&gt;
 1: Enabled&lt;br /&gt;
|-&lt;br /&gt;
| 7 || Internal memory select&lt;br /&gt;
 0: DMEM&lt;br /&gt;
 1: IMEM&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;cx&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SEC ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the SCP authentication process.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-7 || Start of region to authenticate (in pages of 0x100 bytes)&lt;br /&gt;
|-&lt;br /&gt;
| 16 || Force secure DMA transfers&lt;br /&gt;
|-&lt;br /&gt;
| 17 || Decrypt region to authenticate&lt;br /&gt;
|-&lt;br /&gt;
| 18 || Signature check passed&lt;br /&gt;
|-&lt;br /&gt;
| 19 || Suppress interrupts and exceptions&lt;br /&gt;
|-&lt;br /&gt;
| 24-31 || Size of region to authenticate (in pages of 0x100 bytes)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;cauth&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== CTX ====&lt;br /&gt;
This is a SPR (special purpose register) that holds configuration bits for the CTXDMA ports.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-2 || CTXDMA port for code loads (xcld)&lt;br /&gt;
|-&lt;br /&gt;
| 4-6 || CTXDMA port for code stores (invalid)&lt;br /&gt;
|-&lt;br /&gt;
| 8-10 || CTXDMA port for data loads (xdld)&lt;br /&gt;
|-&lt;br /&gt;
| 12-14 || CTXDMA port for data stores (xdst)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;xtargets&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== EXCI ====&lt;br /&gt;
This is a SPR (special purpose register) that holds information on raised exceptions.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bits&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0-19 || Exception PC&lt;br /&gt;
|-&lt;br /&gt;
| 20-23 || Exception cause&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Alternative name (envytools): &amp;quot;tstatus&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== SEC1 ====&lt;br /&gt;
Unknown. Marked as &amp;quot;RESERVED&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== IMB1 ====&lt;br /&gt;
Unknown. Marked as &amp;quot;RESERVED&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==== DMB1 ====&lt;br /&gt;
Unknown. Marked as &amp;quot;RESERVED&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Heavy Secure Mode ===&lt;br /&gt;
==== Entry ====&lt;br /&gt;
From non-secure mode, upon jumping to a page marked as secret, a secret fault occurs. This causes the CPU to verify the region specified in $cauth against the MAC loaded in $c6. If the comparison is successful, the valid bit (bit0) is set on all pages in the $cauth region, and $pc is set to the base of the $cauth region. If the comparsion fails, the CPU is halted.&lt;br /&gt;
&lt;br /&gt;
==== Exit ====&lt;br /&gt;
The CPU automatically goes back to non-secure mode when returning back into non-secret pages. When this happens, the valid bit (bit0) in the TLB flags is cleared for all secret pages.&lt;br /&gt;
&lt;br /&gt;
==== Implementation ====&lt;br /&gt;
Under certain circumstances, it is possible to observe [[#sigcmp|sigcmp]] being briefly written to [[#TSEC_SCP_CMD|TSEC_SCP_CMD]] as &amp;quot;csigcmp $c4 $c6&amp;quot; while the opcodes in [[#TSEC_SCP_STAT2|TSEC_SCP_STAT2]] are set to &amp;quot;cxsin&amp;quot; and &amp;quot;csigcmp&amp;quot;, respectively.&lt;br /&gt;
&lt;br /&gt;
Via [[#TSEC_SCP_DBG0|TSEC_SCP_DBG0]] it can be observed that a 3-sized macro sequence is loaded into cs0 during a secure mode transition.&lt;br /&gt;
&lt;br /&gt;
== SCP ==&lt;br /&gt;
&amp;quot;SCP&amp;quot; (Secure Co-Processor) is a proprietary coprocessor which can be found inside every [[#Falcon|Falcon]] that supports [[#Heavy_Secure_Mode|Heavy Secure Mode]]. On the Tegra X1 these are TSECA, TSECB, NVDEC and the GPU&#039;s PMU.&lt;br /&gt;
&lt;br /&gt;
=== Hardware ===&lt;br /&gt;
SCP is subdivided into several specialized hardware blocks and interfaces.&lt;br /&gt;
&lt;br /&gt;
==== LOAD ====&lt;br /&gt;
Block for handling memory reads from SCP to Falcon. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== STORE ====&lt;br /&gt;
Block for handling memory writes from Falcon to SCP. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== CMD ====&lt;br /&gt;
Block for translating Falcon crypto operands into SCP commands. It communicates with Falcon over a dedicated interface.&lt;br /&gt;
&lt;br /&gt;
The interface can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]]. The status of the current command is reported through register [[#TSEC_SCP_CMD|TSEC_SCP_CMD]].&lt;br /&gt;
&lt;br /&gt;
==== SEQ ====&lt;br /&gt;
Block for recording and executing sequences of crypto operations in the form of macros.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
==== CTL ====&lt;br /&gt;
Overseer block for controlling certain SCP features.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL0|TSEC_SCP_CTL0]].&lt;br /&gt;
&lt;br /&gt;
Registers [[#TSEC_SCP_CTL_STAT|TSEC_SCP_CTL_STAT]], [[#TSEC_SCP_CTL_LOCK|TSEC_SCP_CTL_LOCK]], [[#TSEC_SCP_CTL_SCP|TSEC_SCP_CTL_SCP]], [[#TSEC_SCP_CTL_PKEY|TSEC_SCP_CTL_PKEY]] and [[#TSEC_SCP_CTL_DBG|TSEC_SCP_CTL_DBG]] refer to this block.&lt;br /&gt;
&lt;br /&gt;
==== AES ====&lt;br /&gt;
Block for providing AES-128-ECB functionality.&lt;br /&gt;
&lt;br /&gt;
==== RNG ====&lt;br /&gt;
Block for encapsulating and controlling the internal random number generator.&lt;br /&gt;
&lt;br /&gt;
Can be enabled or disabled by register [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]] and reports the status of the internal random number generator through registers [[#TSEC_SCP_RNG_STAT0|TSEC_SCP_RNG_STAT0]] and [[#TSEC_SCP_RNG_STAT1|TSEC_SCP_RNG_STAT1]].&lt;br /&gt;
&lt;br /&gt;
===== RND =====&lt;br /&gt;
Internal random number generator.&lt;br /&gt;
&lt;br /&gt;
Can be configured by the [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTLx]] registers.&lt;br /&gt;
&lt;br /&gt;
=== Operations ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Opcode&lt;br /&gt;
!  Name&lt;br /&gt;
!  Operand0&lt;br /&gt;
!  Operand1&lt;br /&gt;
!  Operation&lt;br /&gt;
!  Condition&lt;br /&gt;
|-&lt;br /&gt;
| 0 || nop || N/A || N/A || ||&lt;br /&gt;
|-&lt;br /&gt;
| 1 || mov || $cX || $cY || &amp;lt;code&amp;gt;$cX = $cY; ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 2 || sin || $cX || N/A || &amp;lt;code&amp;gt;$cX = read_stream(); ACL(X) = ???;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 3 || sout || $cX || N/A || &amp;lt;code&amp;gt;write_stream($cX);&amp;lt;/code&amp;gt; || ?&lt;br /&gt;
|-&lt;br /&gt;
| 4 || [[#rnd|rnd]] || $cX || N/A || &amp;lt;code&amp;gt;$cX = read_rnd(); ACL(X) = ???;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 5 || s0begin || immX || N/A || &amp;lt;code&amp;gt;record_macro_for_N_instructions(0, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 6 || s0exec || immX || N/A || &amp;lt;code&amp;gt;execute_macro_N_times(0, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 7 || s1begin || immX || N/A || &amp;lt;code&amp;gt;record_macro_for_N_instructions(1, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 8 || s1exec || immX || N/A || &amp;lt;code&amp;gt;execute_macro_N_times(1, immX);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 9 || &amp;lt;invalid&amp;gt; || || || ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xA || [[#chmod|chmod]] || $cX || immY || Complicated, see [[#ACL|ACL]]. ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xB || xor || $cX || $cY || &amp;lt;code&amp;gt;$cX ^= $cY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2) &amp;amp;&amp;amp; (ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xC || add || $cX || immY || &amp;lt;code&amp;gt;$cX += immY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xD || and || $cX || $cY || &amp;lt;code&amp;gt;$cX &amp;amp;= $cY;&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(X) &amp;amp; 2) &amp;amp;&amp;amp; (ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0xE || rev || $cX || $cY || &amp;lt;code&amp;gt;$cX = endian_swap128($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0xF || gfmul || $cX || $cY || &amp;lt;code&amp;gt;$cX = gfmul($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; || &amp;lt;code&amp;gt;(ACL(Y) &amp;amp; 2)&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 0x10 || secret || $cX || immY || &amp;lt;code&amp;gt;$cX = load_secret(immY); ACL(X) = load_secret_acl(immY);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x11 || keyreg || immX || N/A || &amp;lt;code&amp;gt;active_key_idx = immX;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x12 || kexp || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_kexp($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x13 || krexp || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_kexp_reverse($cY); ACL(X) = ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x14 || enc || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_enc(active_key_idx, $cY); ACL(X) = ACL(active_key_idx) &amp;amp; ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x15 || dec || $cX || $cY || &amp;lt;code&amp;gt;$cX = aes_dec(active_key_idx, $cY); ACL(X) = ACL(active_key_idx) &amp;amp; ACL(Y);&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x16 || [[#sigcmp|sigcmp]] || $cX || $cY || &amp;lt;code&amp;gt;if (hash_verify($cX, $cY)) { has_sig = true; current_sig = $cX; }&amp;lt;/code&amp;gt; || ?&lt;br /&gt;
|-&lt;br /&gt;
| 0x17 || sigenc || $cX || $cY || &amp;lt;code&amp;gt;if (has_sig) { $cX = aes_enc($cY, current_sig); ACL(X) = 0x13; }&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x18 || [[#sigclr|sigclr]] || N/A || N/A || &amp;lt;code&amp;gt;has_sig = false;&amp;lt;/code&amp;gt; ||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== sigcmp ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c XY d8     csigcmp $cY $cX&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Takes 2 crypto registers as operands and is automatically executed when jumping to a code region previously uploaded as secret. This instruction does not work in secure mode.&lt;br /&gt;
&lt;br /&gt;
==== sigclr ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c 00 e0     csigclr&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction takes no operands and clears the saved cauth signature used by the csigenc instruction.&lt;br /&gt;
&lt;br /&gt;
==== chmod ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c XY a8     cchmod $cY 0X&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;00000000: f5 3c XY a9     cchmod $cY 1X&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction takes a crypto register and a 5 bit immediate value which represents the [[#ACL|ACL]] mask to set.&lt;br /&gt;
&lt;br /&gt;
==== rnd ====&lt;br /&gt;
&amp;lt;code&amp;gt;00000000: f5 3c 0X 90     crnd $cX&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This instruction initializes a crypto register with random data.&lt;br /&gt;
&lt;br /&gt;
Executing this instruction only succeeds if the RNG controller is enabled for the SCP, which requires taking the following steps:&lt;br /&gt;
* Write 0x7FFF to [[#TSEC_SCP_RND_CTL0|TSEC_SCP_RND_CTL0]].&lt;br /&gt;
* Write 0x3FF0000 to [[#TSEC_SCP_RND_CTL1|TSEC_SCP_RND_CTL1]].&lt;br /&gt;
* Write 0xFF00 to TSEC_SCP_RND_CTL11.&lt;br /&gt;
* Write 0x1000 to [[#TSEC_SCP_CTL1|TSEC_SCP_CTL1]].&lt;br /&gt;
&lt;br /&gt;
Otherwise it hangs forever.&lt;br /&gt;
&lt;br /&gt;
=== ACLs ===&lt;br /&gt;
Each crypto register has an associated access control list with the following format:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Bit&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0 || Secure key. Forced set if bit1 is set. Once cleared, cannot be set again.&lt;br /&gt;
|-&lt;br /&gt;
| 1 || Secure readable. Once cleared, cannot be set again.&lt;br /&gt;
|-&lt;br /&gt;
| 2 || Insecure key. Forced set if bit3 is set. Forced clear if bit0 is clear. Can be toggled back and forth.&lt;br /&gt;
|-&lt;br /&gt;
| 3 || Insecure readable. Forced clear if bit1 is clear. Can be toggled back and forth.&lt;br /&gt;
|-&lt;br /&gt;
| 4 || Insecure overwritable. Can be toggled back and forth.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
On boot, the ACL is 0x1F for all $cX.&lt;br /&gt;
&lt;br /&gt;
Loading into $cX using xdst instruction sets ACL($cX) to 0x13 and 0x1F, for secure and insecure mode respectively.&lt;br /&gt;
&lt;br /&gt;
Spilling a $cX to DMEM using xdld instruction is allowed if (ACL($cX) &amp;amp; 2) or (ACL($cX) &amp;amp; 8), for secure and insecure mode respectively.&lt;br /&gt;
&lt;br /&gt;
Loading a secret into $cX sets a per-secret ACL, unconditionally.&lt;br /&gt;
&lt;br /&gt;
=== Secrets ===&lt;br /&gt;
[[#Heavy_Secure_Mode|Heavy Secure Mode]] has access to 64 128-bit keys which are burned at factory. These keys can be loaded using the $csecret instruction which takes the target crypto register and the key index as arguments.&lt;br /&gt;
&lt;br /&gt;
Secrets are specific to each Falcon unit with the exception of secret 0x3F. This secret is effectively empty (all zeros), but is configured to be overwritten with the KFUSE private key once the KFUSE clock is enabled. The KFUSE private key is console-unique.&lt;br /&gt;
&lt;br /&gt;
{| class=wikitable&lt;br /&gt;
! Index || ACL || Description&lt;br /&gt;
|-&lt;br /&gt;
| 0x00 || 0x13 || Used by [[TSEC_Firmware#Keygen|Keygen]], nvhost_tsec, nvhost_nvdec_bl020_prod, nvhost_nvdec020_prod, nvhost_nvdec020_ns and acr_ucode firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x01 || 0x10 || Used by Falcon&#039;s Secure Boot ROM for the signature generation algorithm.&lt;br /&gt;
|-&lt;br /&gt;
| 0x02 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x03 || 0x11 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x04 || 0x10 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x05 || 0x13 || Used by nvhost_tsec, nvhost_nvdec_bl020_prod, nvhost_nvdec020_prod, nvhost_nvdec020_ns and acr_ucode firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x06 || 0x11 || Used by Falcon&#039;s Secure Boot ROM as key to decrypt data during authentication (decided by bit 17 in the [[#SEC|SEC]] register).&lt;br /&gt;
|-&lt;br /&gt;
| 0x07 || 0x11 || Used by [6.0.0+] nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x08 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x09 || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x0A || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0B || 0x10 || Used by nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x0C || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0D || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0E || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x0F || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x10 || 0x11 || Used by [1.0.0-5.1.0] nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x11 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x12 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x13 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x14 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x15 || 0x13 || Used by nvhost_nvdec_bl020_prod, [5.0.0+] nvhost_nvdec020_prod, [5.0.0+] nvhost_nvdec020_ns and [6.0.0+] nvhost_tsec firmwares.&lt;br /&gt;
|-&lt;br /&gt;
| 0x16 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x17 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x18 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x19 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1A || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1B || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1C || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1D || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1E || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x1F || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x20 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x21 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x22 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x23 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x24 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x25 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x26 || 0x10 || Used by [[TSEC_Firmware#KeygenLdr|KeygenLdr]] and [[TSEC_Firmware#SecureBoot|SecureBoot]]&lt;br /&gt;
|-&lt;br /&gt;
| 0x27 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x28 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x29 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2A || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2B || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2C || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2D || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2E || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x2F || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x30 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x31 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x32 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x33 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x34 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x35 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x36 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x37 || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x38 || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x39 || 0x13 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3A || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3B || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3C || 0x13 || Used by nvhost_tsec firmware.&lt;br /&gt;
|-&lt;br /&gt;
| 0x3D || 0x11 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3E || 0x10 ||&lt;br /&gt;
|-&lt;br /&gt;
| 0x3F || 0x10 || Used by [[TSEC_Firmware#Keygen|Keygen]], nvhost_tsec, nvhost_nvdec020_prod and nvhost_nvdec020_ns firmwares.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Vale</name></author>
	</entry>
	<entry>
		<id>https://switchbrew.org/w/index.php?title=TSEC_Firmware&amp;diff=9910</id>
		<title>TSEC Firmware</title>
		<link rel="alternate" type="text/html" href="https://switchbrew.org/w/index.php?title=TSEC_Firmware&amp;diff=9910"/>
		<updated>2020-08-19T19:08:14Z</updated>

		<summary type="html">&lt;p&gt;Vale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Boot Process =&lt;br /&gt;
TSEC is configured and initialized by the first bootloader during key generation.&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] TSEC is now configured at the end of the first bootloader&#039;s main function.&lt;br /&gt;
&lt;br /&gt;
== Initialization ==&lt;br /&gt;
During this stage several clocks are programmed.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Program the HOST1X clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_L, CLK_OUT_ENB_L, CLK_SOURCE_HOST1X and CLK_L_HOST1X&lt;br /&gt;
    enable_host1x_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the TSEC clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_U, CLK_OUT_ENB_U, CLK_SOURCE_TSEC and CLK_U_TSEC&lt;br /&gt;
    enable_tsec_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR_SAFE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_Y, CLK_OUT_ENB_Y and CLK_Y_SOR_SAFE&lt;br /&gt;
    enable_sor_safe_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR0 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X and CLK_X_SOR0&lt;br /&gt;
    enable_sor0_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR1 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X, CLK_SOURCE_SOR1 and CLK_X_SOR1&lt;br /&gt;
    enable_sor1_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the KFUSE clock resets&lt;br /&gt;
    // Uses RST_DEVICES_H, CLK_OUT_ENB_H and CLK_H_KFUSE&lt;br /&gt;
    enable_kfuse_clkrst();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
In this stage the Falcon IRQs, interfaces and DMA engine are configured.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear the Falcon DMA control register&lt;br /&gt;
    *(u32 *)FALCON_DMACTL = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon IRQs&lt;br /&gt;
    *(u32 *)FALCON_IRQMSET = 0xFFF2;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon IRQs&lt;br /&gt;
    *(u32 *)FALCON_IRQDEST = 0xFFF0;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon interfaces&lt;br /&gt;
    *(u32 *)FALCON_ITFEN = 0x03;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for Falcon&#039;s DMA engine to be idle&lt;br /&gt;
    wait_flcn_dma_idle();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Firmware loading ==&lt;br /&gt;
The Falcon firmware code is stored in the first bootloader&#039;s data segment in IMEM.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set DMA transfer base address to 0x40011900 &amp;gt;&amp;gt; 0x08&lt;br /&gt;
    *(u32 *)FALCON_DMATRFBASE = 0x400119;&lt;br /&gt;
 &lt;br /&gt;
    u32 trf_mode = 0;     // A value of 0 sets FALCON_DMATRFCMD_IMEM&lt;br /&gt;
    u32 dst_offset = 0;&lt;br /&gt;
    u32 src_offset = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Load code into Falcon (0x100 bytes at a time)&lt;br /&gt;
    while (src_offset &amp;lt; 0xF00)&lt;br /&gt;
    {&lt;br /&gt;
        flcn_load_firm(trf_mode, src_offset, dst_offset);&lt;br /&gt;
        src_offset += 0x100;&lt;br /&gt;
        dst_offset += 0x100;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] The transfer base address and size of the Falcon firmware code changed.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set DMA transfer base address to 0x40010E00 &amp;gt;&amp;gt; 0x08&lt;br /&gt;
    *(u32 *)FALCON_DMATRFBASE = 0x40010E;&lt;br /&gt;
 &lt;br /&gt;
    u32 trf_mode = 0;     // A value of 0 sets FALCON_DMATRFCMD_IMEM&lt;br /&gt;
    u32 dst_offset = 0;&lt;br /&gt;
    u32 src_offset = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Load code into Falcon (0x100 bytes at a time)&lt;br /&gt;
    while (src_offset &amp;lt; 0x2900)&lt;br /&gt;
    {&lt;br /&gt;
        flcn_load_firm(trf_mode, src_offset, dst_offset);&lt;br /&gt;
        src_offset += 0x100;&lt;br /&gt;
        dst_offset += 0x100;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Firmware booting ==&lt;br /&gt;
Falcon is booted up and the first bootloader waits for it to finish.&lt;br /&gt;
    // Set magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0x34C2E1DA;&lt;br /&gt;
 &lt;br /&gt;
    // Clear Falcon scratch1 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon boot key version in scratch0 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH0 = 0x01;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon&#039;s boot vector address&lt;br /&gt;
    *(u32 *)FALCON_BOOTVEC = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Signal Falcon&#039;s CPU&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0x02;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for Falcon&#039;s DMA engine to be idle&lt;br /&gt;
    wait_flcn_dma_idle();&lt;br /&gt;
 &lt;br /&gt;
    u32 boot_res = 0;&lt;br /&gt;
 &lt;br /&gt;
    // The bootloader allows the TSEC two seconds from this point to do its job&lt;br /&gt;
    u32 maximum_time = read_timer() + 2000000; &lt;br /&gt;
 &lt;br /&gt;
    while (!boot_res)&lt;br /&gt;
    {&lt;br /&gt;
        // Read boot result from scratch1 MMIO&lt;br /&gt;
        boot_res = *(u32 *)FALCON_SCRATCH1;&lt;br /&gt;
    &lt;br /&gt;
        // Read from TIMERUS_CNTR_1US (microseconds from boot)&lt;br /&gt;
        u32 current_time = read_timer();&lt;br /&gt;
    &lt;br /&gt;
        // Booting is taking too long&lt;br /&gt;
        if (current_time &amp;gt; maximum_time)&lt;br /&gt;
            panic();&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Invalid boot result was returned&lt;br /&gt;
    if (boot_res != 0xB0B0B0B0)&lt;br /&gt;
        panic();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] Falcon is booted up, but the first bootloader is left in an infinite loop.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0x34C2E1DA;&lt;br /&gt;
 &lt;br /&gt;
    // Clear Falcon scratch1 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon boot key version in scratch0 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH0 = 0x01;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon&#039;s boot vector address&lt;br /&gt;
    *(u32 *)FALCON_BOOTVEC = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Signal Falcon&#039;s CPU&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0x02;&lt;br /&gt;
 &lt;br /&gt;
    // Infinite loop&lt;br /&gt;
    while (1);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== TSEC key generation ==&lt;br /&gt;
The TSEC key is generated by reading SOR1 registers modified by the Falcon CPU.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Read TSEC key&lt;br /&gt;
    u32 tsec_key[4]; &lt;br /&gt;
    tsec_key[0] = *(u32 *)NV_SOR_DP_HDCP_BKSV_LSB;&lt;br /&gt;
    tsec_key[1] = *(u32 *)NV_SOR_TMDS_HDCP_BKSV_LSB;&lt;br /&gt;
    tsec_key[2] = *(u32 *)NV_SOR_TMDS_HDCP_CN_MSB;&lt;br /&gt;
    tsec_key[3] = *(u32 *)NV_SOR_TMDS_HDCP_CN_LSB;&lt;br /&gt;
 &lt;br /&gt;
    // Clear SOR1 registers&lt;br /&gt;
    *(u32 *)NV_SOR_DP_HDCP_BKSV_LSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_BKSV_LSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_CN_MSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_CN_LSB = 0;&lt;br /&gt;
 &lt;br /&gt;
    if (out_size &amp;lt; 0x10)&lt;br /&gt;
        out_size = 0x10;&lt;br /&gt;
 &lt;br /&gt;
    // Copy back the TSEC key&lt;br /&gt;
    memcpy(out_buf, tsec_key, out_size);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] This is now done inside an encrypted TSEC payload.&lt;br /&gt;
&lt;br /&gt;
== Cleanup ==&lt;br /&gt;
Clocks and resets are disabled before returning.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Deprogram KFUSE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_H, CLK_OUT_ENB_H and CLK_H_KFUSE&lt;br /&gt;
    disable_kfuse_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR1 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X, CLK_SOURCE_SOR1 and CLK_X_SOR1&lt;br /&gt;
    disable_sor1_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR0 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X and CLK_X_SOR0&lt;br /&gt;
    disable_sor0_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR_SAFE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_Y, CLK_OUT_ENB_Y and CLK_Y_SOR_SAFE&lt;br /&gt;
    disable_sor_safe_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram TSEC clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_U, CLK_OUT_ENB_U, CLK_SOURCE_TSEC and CLK_U_TSEC&lt;br /&gt;
    disable_tsec_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram HOST1X clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_L, CLK_OUT_ENB_L, CLK_SOURCE_HOST1X and CLK_L_HOST1X&lt;br /&gt;
    disable_host1x_clkrst();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= TSEC Firmware =&lt;br /&gt;
The actual code loaded into TSEC is assembled in NVIDIA&#039;s proprietary fuc5 ISA using crypto extensions.&lt;br /&gt;
Stored inside the first bootloader, this firmware binary is split into 4 blobs (names are unofficial): [[#Boot|Boot]] (unencrypted and unauthenticated code), [[#KeygenLdr|KeygenLdr]] (unencrypted and authenticated code), [[#Keygen|Keygen]] (encrypted and authenticated code) and [[#Key data|key data]].&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] There are now 2 new blobs (names are unofficial): [[#SecureBootLdr|SecureBootLdr]] (unencrypted and unauthenticated code), [[#SecureBoot|SecureBoot]] (part unencrypted and unauthenticated code, part encrypted and authenticated code).&lt;br /&gt;
&lt;br /&gt;
Firmware can be disassembled with [http://envytools.readthedocs.io/en/latest/ envytools&#039;] [https://github.com/envytools/envytools/tree/master/envydis envydis]:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;envydis -i tsec_fw.bin -m falcon -V fuc5 -F crypt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that the instruction set has variable length instructions, and the disassembler is not very good at detecting locations it should start disassembling from. One needs to disassemble multiple sub-regions and join them together.&lt;br /&gt;
&lt;br /&gt;
== Boot ==&lt;br /&gt;
During this stage, [[#Key data|key data]] is loaded and [[#KeygenLdr|KeygenLdr]] is authenticated, loaded and executed.&lt;br /&gt;
Before returning, this stage writes back to the host (using MMIO registers) and sets the key used by the first bootloader.&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] During this stage, [[#Key data|key data]] is loaded and execution jumps to [[#SecureBootLdr|SecureBootLdr]].&lt;br /&gt;
&lt;br /&gt;
=== Initialization ===&lt;br /&gt;
The firmware initially sets up the stack pointer to the end of the available data segment.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x09;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x1FF;&lt;br /&gt;
    data_seg_size &amp;lt;&amp;lt;= 0x08;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    *(u32 *)sp = data_seg_size;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
The firmware reads the [[#Key data|key data]] blob and then loads, authenticates and executes [[#KeygenLdr|KeygenLdr]] which sets the TSEC key.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 dmem_start = 0;&lt;br /&gt;
    u8 key_data_buf[0x7C];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data blob from code segment&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x7C;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Read the next stage from code segment into data space&lt;br /&gt;
    u32 blob1_addr = 0x400;&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    memcpy_i2d(dmem_start, blob1_addr, blob1_size);&lt;br /&gt;
 &lt;br /&gt;
    // Upload the next stage into Falcon&#039;s code segment&lt;br /&gt;
    u32 blob1_virt_addr = 0x300;&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob1_virt_addr, dmem_start, blob1_size, blob1_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    u32 boot_res = 0;&lt;br /&gt;
    u32 time = 0;&lt;br /&gt;
    bool is_blob_dec = false;&lt;br /&gt;
 &lt;br /&gt;
    while (true)&lt;br /&gt;
    {&lt;br /&gt;
        if (time == 4000001)&lt;br /&gt;
        {&lt;br /&gt;
            // Write boot failed (timeout) magic to FALCON_SCRATCH1&lt;br /&gt;
            boot_res = 0xC0C0C0C0;&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
       &lt;br /&gt;
            break;&lt;br /&gt;
        }&lt;br /&gt;
    &lt;br /&gt;
        // Load key version from FALCON_SCRATCH0 (bootloader sends 0x01)&lt;br /&gt;
        u32 key_version = *(u32 *)FALCON_SCRATCH0;&lt;br /&gt;
 &lt;br /&gt;
        if (key_version == 0x64)&lt;br /&gt;
        {&lt;br /&gt;
            // Skip all next stages&lt;br /&gt;
            boot_res = 0xB0B0B0B0;&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
       &lt;br /&gt;
            break;&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
            if (key_version &amp;gt; 0x03)&lt;br /&gt;
                boot_res = 0xD0D0D0D0;    // Invalid key version&lt;br /&gt;
            else if (key_version == 0)&lt;br /&gt;
                boot_res = 0xB0B0B0B0;    // No keys used&lt;br /&gt;
            else&lt;br /&gt;
            {&lt;br /&gt;
                u32 key_buf[0x7C];&lt;br /&gt;
          &lt;br /&gt;
                // Copy key data&lt;br /&gt;
                memcpy(key_buf, key_data_buf, 0x7C);&lt;br /&gt;
 &lt;br /&gt;
                u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
                u32 blob1_hash_addr = key_buf + 0x20; &lt;br /&gt;
 &lt;br /&gt;
                // Set auth_addr to 0x300 and auth_size to blob1_size&lt;br /&gt;
                $cauth = ((blob1_size &amp;lt;&amp;lt; 0x10) | 0x03);&lt;br /&gt;
&lt;br /&gt;
                // The next 2 xfer instructions will be overridden&lt;br /&gt;
                // and target changes from DMA to crypto&lt;br /&gt;
                cxset(0x02);&lt;br /&gt;
          &lt;br /&gt;
                // Transfer data to crypto register c6&lt;br /&gt;
                xdst(0, (blob1_hash_addr | crypto_reg_flag));&lt;br /&gt;
 	  			&lt;br /&gt;
                // Wait for all data loads/stores to finish&lt;br /&gt;
                xdwait();&lt;br /&gt;
          &lt;br /&gt;
                // Jump to KeygenLdr&lt;br /&gt;
                u32 keygenldr_res = exec_keygenldr(key_buf, key_version, is_blob_dec);&lt;br /&gt;
                is_blob_dec = true;  // Set this to prevent decrypting again&lt;br /&gt;
 &lt;br /&gt;
                // Set boot finish magic on success&lt;br /&gt;
                if (keygenldr_res == 0)&lt;br /&gt;
                    boot_res = 0xB0B0B0B0&lt;br /&gt;
            }&lt;br /&gt;
       &lt;br /&gt;
            // Write result to FALCON_SCRATCH1&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
 &lt;br /&gt;
            if (boot_res == 0xB0B0B0B0)&lt;br /&gt;
                break;&lt;br /&gt;
        }&lt;br /&gt;
 &lt;br /&gt;
        time++;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Overwrite the TSEC key in SOR1 registers&lt;br /&gt;
    // This has no effect because the KeygenLdr locks out the TSEC DMA engine&lt;br /&gt;
    tsec_set_key(key_data_buf);&lt;br /&gt;
 &lt;br /&gt;
    return boot_res;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] The firmware calculates the start address of [[#SecureBootLdr|SecureBootLdr]] through [[#Key data|key data]] and jumps to it.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 key_data_buf[0x84];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data blob&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x84;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Calculate the next blob&#039;s address in Falcon code segment&lt;br /&gt;
    u32 blob4_size = *(u32 *)(key_data_buf + 0x80);&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    u32 blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    u32 blob3_addr = blob0_size + blob1_size + 0x100 + blob2_size + blob4_size;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to next blob&lt;br /&gt;
    (void *)blob3_addr();&lt;br /&gt;
  &lt;br /&gt;
    return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== tsec_set_key ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_data_buf&#039;&#039;&#039; (a 16 bytes buffer) as argument and writes its contents to SOR1 registers.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C300 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_TIMEOUT = 0xFFF;&lt;br /&gt;
 &lt;br /&gt;
    // Read the key&#039;s words&lt;br /&gt;
    u32 key0 = *(u32 *)(key_data_buf + 0x00);&lt;br /&gt;
    u32 key1 = *(u32 *)(key_data_buf + 0x04);&lt;br /&gt;
    u32 key2 = *(u32 *)(key_data_buf + 0x08);&lt;br /&gt;
    u32 key3 = *(u32 *)(key_data_buf + 0x0C);&lt;br /&gt;
 &lt;br /&gt;
    u32 result = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Write key0 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_DP_HDCP_BKSV_LSB, key0);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key1 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_BKSV_LSB, key1);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key2 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_CN_MSB, key2);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key3 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_CN_LSB, key3);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    return result;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== tsec_dma_write =====&lt;br /&gt;
This method takes &#039;&#039;&#039;addr&#039;&#039;&#039; and &#039;&#039;&#039;value&#039;&#039;&#039; as arguments and performs a DMA write using TSEC MMIO.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 result = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC DMA engine&lt;br /&gt;
    // This waits for bit 0x0C in TSEC_DMA_CMD to be 0&lt;br /&gt;
    result = wait_tsec_dma();&lt;br /&gt;
 &lt;br /&gt;
    // Wait failed&lt;br /&gt;
    if (result)&lt;br /&gt;
        return 1;&lt;br /&gt;
 &lt;br /&gt;
    // Set the destination address&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C100 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_ADDR = addr;&lt;br /&gt;
 &lt;br /&gt;
    // Set the value&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C200 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_VAL = value;&lt;br /&gt;
 &lt;br /&gt;
    // Start transfer&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C000 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_CMD = 0x800000F2;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC DMA engine&lt;br /&gt;
    // This waits for bit 0x0C in TSEC_DMA_CMD to be 0&lt;br /&gt;
    result = wait_tsec_dma();&lt;br /&gt;
 &lt;br /&gt;
    // Wait failed&lt;br /&gt;
    if (result)&lt;br /&gt;
        return 1;&lt;br /&gt;
 &lt;br /&gt;
    return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KeygenLdr ==&lt;br /&gt;
This stage is responsible for reconfiguring the Falcon&#039;s crypto co-processor and loading, decrypting, authenticating and executing [[#Keygen|Keygen]].&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Clear overrides&lt;br /&gt;
    cxset(0x80);&lt;br /&gt;
 &lt;br /&gt;
    // Clear bit 0x13 in cauth&lt;br /&gt;
    $cauth = ($cauth &amp;amp; ~(1 &amp;lt;&amp;lt; 0x13));&lt;br /&gt;
 &lt;br /&gt;
    // Set the target port for memory transfers&lt;br /&gt;
    $xtargets = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c0&lt;br /&gt;
    // This should clear any leftover data&lt;br /&gt;
    xdst(0, 0);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers, except c6 which is used for auth&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cmov($c1, $c0);&lt;br /&gt;
    cmov($c2, $c0);&lt;br /&gt;
    cmov($c3, $c0);&lt;br /&gt;
    cmov($c4, $c0);&lt;br /&gt;
    cmov($c5, $c0);&lt;br /&gt;
    cmov($c7, $c0);&lt;br /&gt;
 &lt;br /&gt;
    // Clear TSEC_TEGRA_CTL_TKFI_KFUSE&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x20E00 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_TEGRA_CTL &amp;amp;= 0xFFFEFFFF;&lt;br /&gt;
 &lt;br /&gt;
    // Set TSEC_SCP_CTL_PKEY_REQUEST_RELOAD&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x10600 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_SCP_CTL_PKEY |= 0x01;&lt;br /&gt;
 &lt;br /&gt;
    u32 is_pkey_loaded = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC_SCP_CTL_PKEY_LOADED&lt;br /&gt;
    while (!is_pkey_loaded)&lt;br /&gt;
        is_pkey_loaded = (*(u32 *)TSEC_SCP_CTL_PKEY &amp;amp; 0x02);&lt;br /&gt;
 &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x09;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x1FF;&lt;br /&gt;
    data_seg_size &amp;lt;&amp;lt;= 0x08;&lt;br /&gt;
 &lt;br /&gt;
    // Check stack bounds&lt;br /&gt;
    if (($sp &amp;gt;= data_seg_size) || ($sp &amp;lt; 0x800))&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Load and execute the Keygen stage&lt;br /&gt;
    load_keygen(key_buf, key_version, is_blob_dec);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x10300 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_SCP_CTL_LOCK = 0;&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== load_keygen ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_buf&#039;&#039;&#039;, &#039;&#039;&#039;key_version&#039;&#039;&#039; and &#039;&#039;&#039;is_blob_dec&#039;&#039;&#039; as arguments and is responsible for loading, decrypting, authenticating and executing [[#Keygen|Keygen]].&lt;br /&gt;
Notably, it also does AES-CMAC over the unauthorized [[#Boot|Boot]] blob to make sure it hasn&#039;t been tampered with.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 res = 0;&lt;br /&gt;
 &lt;br /&gt;
    u32 dmem_start = 0;&lt;br /&gt;
    u32 blob0_addr = 0;&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_buf + 0x70); &lt;br /&gt;
 &lt;br /&gt;
    // Load blob0 code to the start of the data segment&lt;br /&gt;
    memcpy_i2d(dmem_start, blob0_addr, blob0_size);&lt;br /&gt;
 &lt;br /&gt;
    // Generate &amp;quot;CODE_SIG_01&amp;quot; key into c4 crypto register&lt;br /&gt;
    gen_usr_key(0, 0);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt buffer with c4&lt;br /&gt;
    u8 sig_key[0x10];&lt;br /&gt;
    enc_buf(sig_key, blob0_size);&lt;br /&gt;
 &lt;br /&gt;
    u32 src_addr = dmem_start;&lt;br /&gt;
    u32 src_size = blob0_size;&lt;br /&gt;
    u32 iv_addr = sig_key;&lt;br /&gt;
    u32 dst_addr = sig_key;&lt;br /&gt;
    u32 mode = 0x02;   // AES-CMAC&lt;br /&gt;
    u32 use_imem = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Do AES-CMAC over blob0 code&lt;br /&gt;
    do_crypto(src_addr, src_size, iv_addr, dst_addr, mode, use_imem);&lt;br /&gt;
 &lt;br /&gt;
    // Compare the resulting hash with the one from the key buffer&lt;br /&gt;
    if (memcmp(dst_addr, key_buf + 0x10, 0x10))&lt;br /&gt;
    {&lt;br /&gt;
        res = 0xDEADBEEF;&lt;br /&gt;
        return res;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_buf + 0x74);&lt;br /&gt;
 &lt;br /&gt;
    // Decrypt Keygen blob if needed&lt;br /&gt;
    if (!is_blob_dec)&lt;br /&gt;
    {&lt;br /&gt;
        // Read Stage2&#039;s size from key buffer&lt;br /&gt;
        u32 blob2_size = *(u32 *)(key_buf + 0x78);&lt;br /&gt;
 &lt;br /&gt;
        // Check stack bounds&lt;br /&gt;
        if ($sp &amp;gt; blob2_size)&lt;br /&gt;
        {&lt;br /&gt;
            u32 blob2_virt_addr = blob0_size + blob1_size;&lt;br /&gt;
            u32 blob2_phys_addr = blob2_virt_addr + 0x100;&lt;br /&gt;
       &lt;br /&gt;
            // Read the encrypted Keygen blob&lt;br /&gt;
            memcpy_i2d(dmem_start, blob2_phys_addr, blob2_size);&lt;br /&gt;
 &lt;br /&gt;
            // Generate &amp;quot;CODE_ENC_01&amp;quot; key into c4 crypto register&lt;br /&gt;
            gen_usr_key(0x01, 0x01);&lt;br /&gt;
       &lt;br /&gt;
            u32 src_addr = dmem_start;&lt;br /&gt;
            u32 src_size = blob2_size;&lt;br /&gt;
            u32 iv_addr = key_buf + 0x40;&lt;br /&gt;
            u32 dst_addr = dmem_start;&lt;br /&gt;
            u32 mode = 0;   // AES-128-CBC&lt;br /&gt;
            u32 use_imem = 0;&lt;br /&gt;
       &lt;br /&gt;
            // Decrypt Keygen blob with AES-128-CBC&lt;br /&gt;
            do_crypto(src_addr, src_size, iv_addr, dst_addr, mode, use_imem);&lt;br /&gt;
       &lt;br /&gt;
            // Upload decrypted Keygen into Falcon&#039;s code segment&lt;br /&gt;
            bool use_secret = true;&lt;br /&gt;
            memcpy_d2i(blob2_virt_addr, dmem_start, blob2_size, blob2_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
            // Clear out the decrypted blob&lt;br /&gt;
            memset(dmem_start, 0, blob2_size);&lt;br /&gt;
        }&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob2_hash_addr = key_buf + 0x30;&lt;br /&gt;
 &lt;br /&gt;
    // Transfer the Keygen auth hash to crypto register c6&lt;br /&gt;
    xdst(0, (blob2_hash_addr | crypto_reg_flag));&lt;br /&gt;
 				&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Save previous cauth value&lt;br /&gt;
    u32 cauth_old = $cauth;&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to blob2_virt_addr and auth_size to blob2_size&lt;br /&gt;
    $cauth = ((blob2_virt_addr &amp;gt;&amp;gt; 0x08) | (blob2_size &amp;lt;&amp;lt; 0x10));&lt;br /&gt;
 &lt;br /&gt;
    u32 hovi_key_addr = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Select next stage key&lt;br /&gt;
    if (key_version == 0x01)		        // Use HOVI_EKS_01&lt;br /&gt;
        hovi_key_addr = key_buf + 0x50;&lt;br /&gt;
    else if (key_version == 0x02)	        // Use HOVI_COMMON_01&lt;br /&gt;
        hovi_key_addr = key_buf + 0x60;&lt;br /&gt;
    else if (key_version == 0x03)	        // Use debug key (empty)&lt;br /&gt;
        hovi_key_addr = key_buf + 0x00;&lt;br /&gt;
    else&lt;br /&gt;
        res = 0xD0D0D0D0&lt;br /&gt;
 	&lt;br /&gt;
    // Jump to Keygen&lt;br /&gt;
    if (hovi_key_addr)&lt;br /&gt;
        res = exec_keygen(hovi_key_addr, key_version);&lt;br /&gt;
          &lt;br /&gt;
    // Clear out key data&lt;br /&gt;
    memset(key_buf, 0, 0x7C);&lt;br /&gt;
 &lt;br /&gt;
    // Restore previous cauth value&lt;br /&gt;
    $cauth = cauth_old;&lt;br /&gt;
 &lt;br /&gt;
    return res;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== gen_usr_key =====&lt;br /&gt;
This method takes &#039;&#039;&#039;type&#039;&#039;&#039; and &#039;&#039;&#039;mode&#039;&#039;&#039; as arguments and generates a key.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 seed_buf[0x10];&lt;br /&gt;
 &lt;br /&gt;
    // Read a 16 bytes seed based on supplied type&lt;br /&gt;
    /*&lt;br /&gt;
        type == 0: &amp;quot;CODE_SIG_01&amp;quot; + null padding&lt;br /&gt;
        type == 1: &amp;quot;CODE_ENC_01&amp;quot; + null padding&lt;br /&gt;
    */&lt;br /&gt;
    get_seed(seed_buf, type);&lt;br /&gt;
 &lt;br /&gt;
    // This will write the seed into crypto register c0 &lt;br /&gt;
    crypto_store(0, seed_buf);&lt;br /&gt;
 &lt;br /&gt;
    // Load selected secret into crypto register c1&lt;br /&gt;
    csecret($c1, 0x26);&lt;br /&gt;
 &lt;br /&gt;
    // Bind c1 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg($c1);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt seed_buf in c0 using keyreg value as key into c1&lt;br /&gt;
    cenc($c1, $c0);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt the auth signature (stored in c6) with c1 and store in c1&lt;br /&gt;
    csigenc($c1, $c1);&lt;br /&gt;
 &lt;br /&gt;
    // Copy the result to c4 (will be used as key)&lt;br /&gt;
    cmov($c4, $c1);&lt;br /&gt;
 &lt;br /&gt;
    // Do key expansion for decryption if necessary&lt;br /&gt;
    if (mode != 0)&lt;br /&gt;
        ckexp($c4, $c4);&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== enc_buf =====&lt;br /&gt;
This method takes &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) and &#039;&#039;&#039;size&#039;&#039;&#039; as arguments and encrypts the supplied buffer.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set first 3 words to null&lt;br /&gt;
    *(u32 *)(buf + 0x00) = 0;&lt;br /&gt;
    *(u32 *)(buf + 0x04) = 0;&lt;br /&gt;
    *(u32 *)(buf + 0x08) = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Swap halves (b16, b32 and b16 again) and store it as the last word&lt;br /&gt;
    *(u32 *)(buf + 0x0C) = (&lt;br /&gt;
        ((size &amp;amp; 0x000000FF) &amp;lt;&amp;lt; 0x08 | (size &amp;amp; 0x0000FF00) &amp;gt;&amp;gt; 0x08) &amp;lt;&amp;lt; 0x10&lt;br /&gt;
        | ((size &amp;amp; 0x00FF0000) &amp;gt;&amp;gt; 0x10) &amp;lt;&amp;lt; 0x08&lt;br /&gt;
        | (size &amp;amp; 0xFF000000) &amp;gt;&amp;gt; 0x18&lt;br /&gt;
    );&lt;br /&gt;
 &lt;br /&gt;
    // This will write buf into crypto register c3 &lt;br /&gt;
    crypto_store(0x03, buf);&lt;br /&gt;
 &lt;br /&gt;
    // Bind c4 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg($c4);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt buf in c3 using keyreg value as key and store in c5&lt;br /&gt;
    cenc($c5, $c3);&lt;br /&gt;
 &lt;br /&gt;
    // This will read into buf from crypto register c5 &lt;br /&gt;
    crypto_load(0x05, buf);&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== crypto_store =====&lt;br /&gt;
This method takes &#039;&#039;&#039;reg&#039;&#039;&#039; (a crypto register) and &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) as arguments and loads the supplied buffer into the crypto register.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next two xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Encode the source buffer and the destination register for the xfer&lt;br /&gt;
    u32 crypto_xfer_flag = (u32)buf | reg &amp;lt;&amp;lt; 0x10;&lt;br /&gt;
&lt;br /&gt;
    // Transfer the supplied buffer to the supplied crypto register&lt;br /&gt;
    xdst(crypto_xfer_flag, crypto_xfer_flag);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== crypto_load =====&lt;br /&gt;
This method takes &#039;&#039;&#039;reg&#039;&#039;&#039; (a crypto register) and &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) as arguments and loads the contents of the supplied register into the supplied buffer.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next two xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Encode the destination buffer and the source register for the xfer&lt;br /&gt;
    u32 crypto_xfer_flag = (u32)buf | reg &amp;lt;&amp;lt; 0x10;&lt;br /&gt;
&lt;br /&gt;
    // Transfer the contents of the supplied crypto register into the supplied buffer&lt;br /&gt;
    xdld(crypto_xfer_flag, crypto_xfer_flag);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== do_crypto =====&lt;br /&gt;
This is the method responsible for all crypto operations performed during [[#KeygenLdr|KeygenLdr]]. It takes &#039;&#039;&#039;src_addr&#039;&#039;&#039;, &#039;&#039;&#039;src_size&#039;&#039;&#039;, &#039;&#039;&#039;iv_addr&#039;&#039;&#039;, &#039;&#039;&#039;dst_addr&#039;&#039;&#039;, &#039;&#039;&#039;mode&#039;&#039;&#039; and &#039;&#039;&#039;use_imem&#039;&#039;&#039; as arguments.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Check for invalid source data size&lt;br /&gt;
    if (!src_size || (src_size &amp;amp; 0x0F))&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Check for invalid source data address&lt;br /&gt;
    if (src_addr &amp;amp; 0x0F)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Check for invalid destination data address&lt;br /&gt;
    if (dst_addr &amp;amp; 0x0F)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Use IV if available&lt;br /&gt;
    if (iv_addr)&lt;br /&gt;
    {&lt;br /&gt;
        // This will write the iv_addr into crypto register c5 &lt;br /&gt;
        crypto_store(0x05, iv_addr);&lt;br /&gt;
    }&lt;br /&gt;
    else&lt;br /&gt;
    {&lt;br /&gt;
        // Clear c5 register (use null IV)&lt;br /&gt;
        cxor($c5, $c5);&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Bind c4 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg(c4);&lt;br /&gt;
 &lt;br /&gt;
    if (mode == 0x00)	              // AES-128-CBC decrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 5 instructions&lt;br /&gt;
        cs0begin(0x05);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cdec($c2, $c3);               // Decrypt from c3 into c2&lt;br /&gt;
        cxor($c5, $c2);               // XOR c2 with c5 and store in c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
        cmov($c5, $c3);               // Move c3 into c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x01)	      // AES-128-CBC encrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 4 instructions&lt;br /&gt;
        cs0begin(0x04);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cxor($c3, $c5);               // XOR c5 with c3 and store in c3&lt;br /&gt;
        cenc($c5, $c3);               // Encrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x02)	      // AES-CMAC&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cxor($c5, $c3);               // XOR c5 with c3 and store in c5&lt;br /&gt;
        cenc($c5, $c5);               // Encrypt from c5 into c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x03)	      // AES-128-ECB decrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cdec($c5, $c3);               // Decrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x04)	      // AES-128-ECB encrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cenc($c5, $c3);               // Encrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else&lt;br /&gt;
        return;&lt;br /&gt;
 &lt;br /&gt;
    // Main loop&lt;br /&gt;
    while (src_size &amp;gt; 0)&lt;br /&gt;
    {&lt;br /&gt;
        u32 blk_count = (src_size &amp;gt;&amp;gt; 0x04);&lt;br /&gt;
 	&lt;br /&gt;
        if (blk_count &amp;gt; 0x10)&lt;br /&gt;
            blk_count = 0x10;&lt;br /&gt;
   &lt;br /&gt;
        // Check size align&lt;br /&gt;
        if (blk_count &amp;amp; (blk_count - 0x01))&lt;br /&gt;
            blk_count = 0x01;&lt;br /&gt;
 &lt;br /&gt;
        u32 blk_size = (blk_count &amp;lt;&amp;lt; 0x04);&lt;br /&gt;
   &lt;br /&gt;
        u32 crypto_xfer_src = 0;&lt;br /&gt;
        u32 crypto_xfer_dst = 0;&lt;br /&gt;
   &lt;br /&gt;
        if (block_size == 0x20)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00030000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00030000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 2 times (1 for each block)&lt;br /&gt;
            cs0exec(0x02);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x40)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00040000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00040000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 4 times (1 for each block)&lt;br /&gt;
            cs0exec(0x04);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x80)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00050000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00050000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 8 times (1 for each block)&lt;br /&gt;
            cs0exec(0x08);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x100)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00060000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00060000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 16 times (1 for each block)&lt;br /&gt;
            cs0exec(0x10);&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00020000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00020000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 1 time (1 for each block)&lt;br /&gt;
            cs0exec(0x01);&lt;br /&gt;
 &lt;br /&gt;
            // Ensure proper block size&lt;br /&gt;
            block_size = 0x10;&lt;br /&gt;
        }&lt;br /&gt;
 &lt;br /&gt;
        // The next xfer instruction will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto input/output stream&lt;br /&gt;
        if (use_imem)&lt;br /&gt;
            cxset(0xA1);         // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
        else&lt;br /&gt;
            cxset(0x21);         // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 &lt;br /&gt;
        // Transfer data into the crypto input/output stream&lt;br /&gt;
        xdst(crypto_xfer_src, crypto_xfer_src);&lt;br /&gt;
   &lt;br /&gt;
        // AES-CMAC only needs one more xfer instruction&lt;br /&gt;
        if (mode == 0x02)&lt;br /&gt;
        {&lt;br /&gt;
            // The next xfer instruction will be overridden&lt;br /&gt;
            // and target changes from DMA to crypto input/output stream&lt;br /&gt;
            if (use_imem)&lt;br /&gt;
                cxset(0xA1);     // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
            else&lt;br /&gt;
                cxset(0x21);     // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 		&lt;br /&gt;
            // Wait for all data loads/stores to finish&lt;br /&gt;
            xdwait();&lt;br /&gt;
        }&lt;br /&gt;
        else  // AES enc/dec needs 2 more xfer instructions&lt;br /&gt;
        {&lt;br /&gt;
            // The next 2 xfer instructions will be overridden&lt;br /&gt;
            // and target changes from DMA to crypto input/output stream&lt;br /&gt;
            if (use_imem)&lt;br /&gt;
                cxset(0xA2);            // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
            else&lt;br /&gt;
                cxset(0x22);            // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 &lt;br /&gt;
            // Transfer data from the crypto input/output stream&lt;br /&gt;
            xdld(crypto_xfer_dst, crypto_xfer_dst);&lt;br /&gt;
 		&lt;br /&gt;
            // Wait for all data loads/stores to finish&lt;br /&gt;
            xdwait();&lt;br /&gt;
 &lt;br /&gt;
            // Increase the destination address by block size&lt;br /&gt;
            dst_addr += block_size;&lt;br /&gt;
        }&lt;br /&gt;
   &lt;br /&gt;
        // Increase the source address by block size&lt;br /&gt;
        src_addr += block_size;&lt;br /&gt;
 &lt;br /&gt;
        // Decrease the source size by block size&lt;br /&gt;
        src_size -= block_size;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // AES-CMAC result is in c5&lt;br /&gt;
    if (mode == 0x02)&lt;br /&gt;
    {&lt;br /&gt;
        // This will read into dst_addr from crypto register c5 &lt;br /&gt;
        crypto_load(0x05, dst_addr);&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Keygen ==&lt;br /&gt;
This stage is decrypted by [[#KeygenLdr|KeygenLdr]] using a key generated by encrypting the KeygenLdr auth signature with a seed encrypted with a csecret. It will generate the final TSEC key.&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
The main function takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; and &#039;&#039;&#039;key_type&#039;&#039;&#039; as arguments from [[#KeygenLdr|KeygenLdr]].&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 falcon_rev = *(u32 *)UC_CAPS2 &amp;amp; 0x0F;&lt;br /&gt;
&lt;br /&gt;
    // Falcon hardware revision must be 5&lt;br /&gt;
    if (falcon_rev != 0x05)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set the target port for memory transfers&lt;br /&gt;
    $xtargets = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Generate the TSEC key&lt;br /&gt;
    gen_tsec_key(key_addr, key_type);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== gen_tsec_key ====&lt;br /&gt;
This method is responsible for generating the final TSEC key. It takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; and &#039;&#039;&#039;key_type&#039;&#039;&#039; as arguments.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // This will use TSEC DMA to look for 0x34C2E1DA in host1x scratch space&lt;br /&gt;
    u32 host1x_res = check_host1x_magic();&lt;br /&gt;
&lt;br /&gt;
    // Failed to find magic word&lt;br /&gt;
    if (host1x_res != 0)&lt;br /&gt;
        return;&lt;br /&gt;
    &lt;br /&gt;
    u32 crypto_reg_flag = 0x00000000;&lt;br /&gt;
&lt;br /&gt;
    // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto register&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Transfer the seed in key_addr to crypto register c0&lt;br /&gt;
    xdst(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
   &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    crypto_reg_flag = 0x00020000;&lt;br /&gt;
&lt;br /&gt;
    if (key_type == 0x01)        // HOVI_EKS_01&lt;br /&gt;
    {&lt;br /&gt;
        // Load selected secret into crypto register c1&lt;br /&gt;
        csecret($c1, 0x3F);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c1 and store in c1&lt;br /&gt;
        csigenc($c1, $c1);&lt;br /&gt;
        &lt;br /&gt;
        // Load selected secret into crypto register c2&lt;br /&gt;
        csecret($c2, 0x00);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the seed from key_addr and store in c2&lt;br /&gt;
        cenc($c2, $c0);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);        &lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c2 and store in c2&lt;br /&gt;
        csigenc($c2, $c2);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
        &lt;br /&gt;
        // Encrypt c1 and store in c2&lt;br /&gt;
        cenc($c2, $c1);&lt;br /&gt;
        &lt;br /&gt;
        // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto register&lt;br /&gt;
        cxset(0x02);&lt;br /&gt;
        &lt;br /&gt;
        // Transfer the resulting key from crypto register c2 to key_addr&lt;br /&gt;
        xdld(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
        &lt;br /&gt;
        // Wait for all data loads/stores to finish&lt;br /&gt;
        xdwait();&lt;br /&gt;
    }&lt;br /&gt;
    else if (key == 0x02)        // HOVI_COMMON_01&lt;br /&gt;
    {&lt;br /&gt;
        // Load selected secret into crypto register c2&lt;br /&gt;
        csecret($c2, 0x00);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the seed from key_addr and store in c2&lt;br /&gt;
        cenc($c2, $c0);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);        &lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c2 and store in c2&lt;br /&gt;
        csigenc($c2, $c2);&lt;br /&gt;
        &lt;br /&gt;
        // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto register&lt;br /&gt;
        cxset(0x02);&lt;br /&gt;
        &lt;br /&gt;
        // Transfer the resulting key from crypto register c2 to key_addr&lt;br /&gt;
        xdld(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
        &lt;br /&gt;
        // Wait for all data loads/stores to finish&lt;br /&gt;
        xdwait();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Use TSEC DMA to write the key in SOR1 registers&lt;br /&gt;
    sor1_set_key(key_addr);&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== sor1_set_key ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; (start address of a 16 bytes buffer) as argument and transfers its contents to SOR1 registers.&lt;br /&gt;
&lt;br /&gt;
The implementation is equivalent to [[#tsec_set_key|tsec_set_key]].&lt;br /&gt;
&lt;br /&gt;
== SecureBootLdr ==&lt;br /&gt;
[6.2.0+] This was introduced to try to recover the secure boot from the RCM vulnerability.&lt;br /&gt;
&lt;br /&gt;
This stage starts by authenticating and executing [[#KeygenLdr|KeygenLdr]] which in turn authenticates, decrypts and executes [[#Keygen|Keygen]] (both blobs remain unchanged from previous firmware versions).&lt;br /&gt;
After the TSEC key has been generated, execution returns to this stage which then parses and executes [[#SecureBoot|SecureBoot]].&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 key_data_buf[0x84];&lt;br /&gt;
    u8 tmp_key_data_buf[0x84];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data from memory&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x84;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Read the KeygenLdr blob from memory&lt;br /&gt;
    u32 boot_base_addr = 0;&lt;br /&gt;
    u32 blob1_addr = 0x400;&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    memcpy_i2d(boot_base_addr, blob1_addr, blob1_size);&lt;br /&gt;
  &lt;br /&gt;
    // Upload the next code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob1_virt_addr = 0x300;&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob1_virt_addr, boot_base_addr, blob1_size, blob1_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    // Backup the key data&lt;br /&gt;
    memcpy(tmp_key_data_buf, key_data_buf, 0x84);&lt;br /&gt;
 &lt;br /&gt;
    // Save previous cauth value&lt;br /&gt;
    u32 cauth_old = $cauth;&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x300 and auth_size to blob1_size&lt;br /&gt;
    $cauth = ((blob1_size &amp;lt;&amp;lt; 0x10) | (0x300 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob1_hash_addr = tmp_key_data_buf + 0x20; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob1_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    u32 key_version = 0x01;&lt;br /&gt;
    bool is_blob_dec = false;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to KeygenLdr&lt;br /&gt;
    u32 keygenldr_res = exec_keygenldr(tmp_key_data_buf, key_version, is_blob_dec);&lt;br /&gt;
 &lt;br /&gt;
    // Set boot finish magic on success&lt;br /&gt;
    if (keygenldr_res == 0)&lt;br /&gt;
        keygenldr_res = 0xB0B0B0B0&lt;br /&gt;
       &lt;br /&gt;
    // Write result to FALCON_SCRATCH1&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = keygenldr_res;&lt;br /&gt;
 &lt;br /&gt;
    if (keygenldr_res != 0xB0B0B0B0)&lt;br /&gt;
        return keygenldr_res;&lt;br /&gt;
 &lt;br /&gt;
    // Restore previous cauth value&lt;br /&gt;
    $cauth = cauth_old;&lt;br /&gt;
 &lt;br /&gt;
    u8 flcn_hdr_buf[0x18];&lt;br /&gt;
    u8 flcn_os_hdr_buf[0x10];&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    u32 blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon header from memory&lt;br /&gt;
    u32 blob4_flcn_hdr_addr = (((blob0_size + blob1_size) + 0x100) + blob2_size);&lt;br /&gt;
    memcpy_i2d(flcn_hdr_buf, blob4_flcn_hdr_addr, 0x18);&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 flcn_hdr_size = *(u32 *)(flcn_hdr_buf + 0x0C);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon OS header from memory&lt;br /&gt;
    u32 blob4_flcn_os_hdr_addr = ((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_hdr_size);&lt;br /&gt;
    memcpy_i2d(flcn_os_hdr_buf, blob4_flcn_os_hdr_addr, 0x10);&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 flcn_code_hdr_size = *(u32 *)(flcn_hdr_buf + 0x10);&lt;br /&gt;
    u32 flcn_os_size = *(u32 *)(flcn_os_hdr_buf + 0x04);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon OS image from memory&lt;br /&gt;
    u32 blob4_flcn_os_addr = ((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_code_hdr_size);&lt;br /&gt;
    memcpy_i2d(boot_base_addr, blob4_flcn_os_hdr_addr, flcn_os_size);&lt;br /&gt;
 &lt;br /&gt;
    // Upload the SecureBoot&#039;s Falcon OS image boot stub code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob4_flcn_os_boot_virt_addr = 0;&lt;br /&gt;
    u32 blob4_flcn_os_boot_size = 0x100;&lt;br /&gt;
    use_secret = false;&lt;br /&gt;
    memcpy_d2i(blob4_flcn_os_boot_virt_addr, boot_base_addr, blob4_flcn_os_boot_size, blob4_flcn_os_boot_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    flcn_os_size = *(u32 *)(flcn_os_hdr_buf + 0x04); &lt;br /&gt;
 &lt;br /&gt;
    // Upload the SecureBoot blob&#039;s Falcon OS encrypted image code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob4_flcn_os_img_virt_addr = 0x100;&lt;br /&gt;
    u32 blob4_flcn_os_img_size = (flcn_os_size - 0x100);&lt;br /&gt;
    use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob4_flcn_os_img_virt_addr, boot_base_addr + 0x100, blob4_flcn_os_img_size, blob4_flcn_os_img_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    flcn_code_hdr_size = *(u32 *)(flcn_hdr_buf + 0x10);&lt;br /&gt;
    u32 flcn_os_code_size = *(u32 *)(flcn_os_hdr_buf + 0x08);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s falcon OS image&#039;s hash from memory&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = (((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_code_hdr_size) + flcn_os_code_size);&lt;br /&gt;
    memcpy_i2d(0, blob4_flcn_os_img_hash_addr, 0x10);&lt;br /&gt;
 &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x03;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x3FC0;&lt;br /&gt;
 &lt;br /&gt;
    u32 data_addr = 0x10;&lt;br /&gt;
 &lt;br /&gt;
    // Clear all data except the first 0x10 bytes (SecureBoot blob&#039;s Falcon OS image&#039;s hash)&lt;br /&gt;
    for (int data_word_count = 0x04; data_word_count &amp;lt; data_seg_size; data_word_count++)&lt;br /&gt;
    {&lt;br /&gt;
        *(u32 *)(data_addr) = 0; &lt;br /&gt;
        data_addr += 0x04;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
 &lt;br /&gt;
    // Jump to SecureBoot&lt;br /&gt;
    load_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0xB0B0B0B0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SecureBoot ==&lt;br /&gt;
[6.2.0+] This was introduced to try to recover the secure boot from the RCM vulnerability.&lt;br /&gt;
&lt;br /&gt;
This stage prepares the stack then authenticates, decrypts and executes the SecureBoot blob&#039;s Falcon OS image.&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image boot stub&lt;br /&gt;
    init_secboot();&lt;br /&gt;
 &lt;br /&gt;
    // Halt execution&lt;br /&gt;
    exit();&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== init_secboot ====&lt;br /&gt;
This method takes no arguments and is responsible for loading, authenticating and executing [[#SecureBoot|SecureBoot]].&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read the transfer base address from IO space&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)FALCON_DMATRFBASE;&lt;br /&gt;
 &lt;br /&gt;
    // Copy transfer base address to data memory&lt;br /&gt;
    u32 scratch_data_addr = 0x300;&lt;br /&gt;
    *(u32 *)scratch_data_addr = xfer_ext_base_addr;&lt;br /&gt;
 &lt;br /&gt;
    // Set the transfer base address&lt;br /&gt;
    xcbase(xfer_ext_base_addr);&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = 0; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob4_flcn_os_img_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    cmov($c7, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x100, auth_size to 0x1300,&lt;br /&gt;
    // bit 16 (use_secret) and bit 17 (is_encrypted)&lt;br /&gt;
    $cauth = ((0x02 &amp;lt;&amp;lt; 0x10) | (0x01 &amp;lt;&amp;lt; 0x10) | (0x1300 &amp;lt;&amp;lt; 0x10) | (0x100 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image&lt;br /&gt;
    exec_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0x0F0F0F0F;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[8.1.0+] Removed transfer base address setting and added IMEM protection.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = 0; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob4_flcn_os_img_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    cmov($c7, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x100, auth_size to 0x1D00,&lt;br /&gt;
    // bit 16 (use_secret) and bit 17 (is_encrypted)&lt;br /&gt;
    $cauth = ((0x02 &amp;lt;&amp;lt; 0x10) | (0x01 &amp;lt;&amp;lt; 0x10) | (0x1D00 &amp;lt;&amp;lt; 0x10) | (0x100 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
&lt;br /&gt;
    // Fill remaining IMEM with secret pages&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(0x1E00, 0, 0x2200, 0x1E00, use_secret);&lt;br /&gt;
    memcpy_d2i(0x4000, 0, 0x4000, 0x4000, use_secret);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image&lt;br /&gt;
    exec_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0x0F0F0F0F;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== exec_secboot ====&lt;br /&gt;
This is the signed and encrypted portion of the [[#SecureBoot|SecureBoot]] payload.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Recover the transfer base address from the stack&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)scratch_data_addr;&lt;br /&gt;
&lt;br /&gt;
    // Return the TLB entry that covers the virtual address&lt;br /&gt;
    u32 tlb_entry = vtlb(xfer_ext_base_addr);&lt;br /&gt;
    &lt;br /&gt;
    // Clear Falcon CPU control&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0;&lt;br /&gt;
    &lt;br /&gt;
    // Halt if the external page is marked as secret&lt;br /&gt;
    if ((tlb_entry &amp;amp; 0x4000000) != 0)&lt;br /&gt;
        exit();&lt;br /&gt;
    &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
    &lt;br /&gt;
    // Fill all DMEM with a pointer to a trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; data_seg_size; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Initialize the TRNG and generate random data in DMEM&lt;br /&gt;
    init_rnd();&lt;br /&gt;
    &lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    u32 rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Load the TSEC key from SOR1 registers into DMEM&lt;br /&gt;
    sor1_get_key();&lt;br /&gt;
&lt;br /&gt;
    // Initialize CAR registers&lt;br /&gt;
    car_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Ensure CLK_RST_CONTROLLER_CLK_SOURCE_TSEC_0 is 0x02&lt;br /&gt;
    test_clk_source_tsec();&lt;br /&gt;
&lt;br /&gt;
    // Set FLOW_MODE_WAITEVENT in FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    halt_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Initialize the CCPLEX&lt;br /&gt;
    ccplex_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    bool is_se_ready = false;&lt;br /&gt;
&lt;br /&gt;
    // Wait for SE to be ready&lt;br /&gt;
    while (!is_se_ready)&lt;br /&gt;
        is_se_ready = check_se_status();&lt;br /&gt;
    &lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    u32 mc_iram_aperture_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (mc_iram_aperture_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Clear the entire DMEM region&lt;br /&gt;
        clear_dmem();&lt;br /&gt;
        &lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Ensure FUSE_SKU_INFO is 0x83&lt;br /&gt;
    test_fuse_sku_info();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC key to SE keyslot 0x0C&lt;br /&gt;
    se_set_keyslot_12();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC root key to SE keyslot 0x0D&lt;br /&gt;
    se_set_keyslot_13();&lt;br /&gt;
&lt;br /&gt;
    // Decrypt Package1&lt;br /&gt;
    decrypt_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Parse Package1 header and return entry address&lt;br /&gt;
    u32 entry_addr = parse_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Set the exception vectors&lt;br /&gt;
    set_excp_vec(entry_addr);&lt;br /&gt;
&lt;br /&gt;
    // Fill the top 0x500 bytes in DMEM with a pointer to trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; 0x500; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
    &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    unlock_scp();&lt;br /&gt;
&lt;br /&gt;
    // Clear FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    resume_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Clear the entire DMEM region&lt;br /&gt;
    clear_dmem();&lt;br /&gt;
        &lt;br /&gt;
    // Halt 5 times for no good reason&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[7.0.0+] Many changes were introduced to mitigate and prevent attacks.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Recover the transfer base address from the stack&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)scratch_data_addr;&lt;br /&gt;
&lt;br /&gt;
    // Return the TLB entry that covers the virtual address&lt;br /&gt;
    u32 tlb_entry = vtlb(xfer_ext_base_addr);&lt;br /&gt;
    &lt;br /&gt;
    // Clear Falcon CPU control&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0;&lt;br /&gt;
    &lt;br /&gt;
    // Halt if the external page is marked as secret&lt;br /&gt;
    if ((tlb_entry &amp;amp; 0x4000000) != 0)&lt;br /&gt;
        exit();&lt;br /&gt;
    &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
    &lt;br /&gt;
    // Fill all DMEM with a pointer to a trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; data_seg_size; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Initialize the TRNG and generate random data in DMEM&lt;br /&gt;
    init_rnd();&lt;br /&gt;
    &lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    u32 rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Enable and test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x01);&lt;br /&gt;
&lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
    se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
    // Test randomized offsets for read/write integrity in MC, FUSE, IRAM and TZRAM&lt;br /&gt;
    u32 test_res = test_mc_fuse_iram_tzram();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization by enabling and disabling random CAR devices&lt;br /&gt;
    test_res = test_car();&lt;br /&gt;
    &lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Set FLOW_MODE_WAITEVENT in FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    halt_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Initialize the CCPLEX&lt;br /&gt;
    ccplex_init();&lt;br /&gt;
&lt;br /&gt;
    // Check if SE is ready&lt;br /&gt;
    u32 se_status = check_se_status();&lt;br /&gt;
&lt;br /&gt;
    if (se_status != 0)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Load the TSEC key from SOR1 registers into DMEM&lt;br /&gt;
    sor1_get_key();&lt;br /&gt;
&lt;br /&gt;
    // Initialize CAR registers&lt;br /&gt;
    car_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization by enabling and disabling random CAR devices&lt;br /&gt;
    test_res = test_car();&lt;br /&gt;
    &lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Ensure FUSE_SKU_INFO is 0x83&lt;br /&gt;
    test_fuse_sku_info();&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Decrypt Package1&lt;br /&gt;
    decrypt_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC root key to SE keyslot 0x0D&lt;br /&gt;
    se_set_keyslot_13();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC key to SE keyslot 0x0C&lt;br /&gt;
    se_set_keyslot_12();&lt;br /&gt;
&lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test randomized offsets for read/write integrity in MC, FUSE, IRAM and TZRAM&lt;br /&gt;
    test_res = test_mc_fuse_iram_tzram();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Parse Package1 header and return entry address&lt;br /&gt;
    u32 entry_addr = parse_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Set the exception vectors&lt;br /&gt;
    set_excp_vec(entry_addr);&lt;br /&gt;
&lt;br /&gt;
    // Fill the top 0x500 bytes in DMEM with a pointer to trap function (just exits)&lt;br /&gt;
    for (int i = 0; i &amp;lt; 0x500; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
    &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    unlock_scp();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Clear FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    resume_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Clear the entire DMEM region and every crypto register&lt;br /&gt;
    clear_dmem_and_crypto();&lt;br /&gt;
        &lt;br /&gt;
    // Halt 5 times for no good reason&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[8.1.0+] Key derivation algorithm was changed. Very minor changes were introduced to mitigate and prevent attacks.&lt;br /&gt;
&lt;br /&gt;
== Key data ==&lt;br /&gt;
Small buffer stored after the [[#Boot|Boot]] blob and used across all stages.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Offset&lt;br /&gt;
!  Size&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0x00&lt;br /&gt;
| 0x10&lt;br /&gt;
| Debug key (empty)&lt;br /&gt;
|-&lt;br /&gt;
| 0x10&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob0 ([[#Boot|Boot]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x20&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob1 ([[#KeygenLdr|KeygenLdr]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x30&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x40&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) AES IV&lt;br /&gt;
|-&lt;br /&gt;
| 0x50&lt;br /&gt;
| 0x10&lt;br /&gt;
| HOVI EKS seed&lt;br /&gt;
|-&lt;br /&gt;
| 0x60&lt;br /&gt;
| 0x10&lt;br /&gt;
| HOVI COMMON seed&lt;br /&gt;
|-&lt;br /&gt;
| 0x70&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob0 ([[#Boot|Boot]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x74&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob1 ([[#KeygenLdr|KeygenLdr]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x78&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x7C&lt;br /&gt;
| 0x04&lt;br /&gt;
| [6.2.0+] blob3 ([[#SecureBootLdr|SecureBootLdr]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x80&lt;br /&gt;
| 0x04&lt;br /&gt;
| [6.2.0+] blob4 ([[#SecureBoot|SecureBoot]]) size&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Vale</name></author>
	</entry>
	<entry>
		<id>https://switchbrew.org/w/index.php?title=TSEC_Firmware&amp;diff=9909</id>
		<title>TSEC Firmware</title>
		<link rel="alternate" type="text/html" href="https://switchbrew.org/w/index.php?title=TSEC_Firmware&amp;diff=9909"/>
		<updated>2020-08-19T18:11:55Z</updated>

		<summary type="html">&lt;p&gt;Vale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Boot Process =&lt;br /&gt;
TSEC is configured and initialized by the first bootloader during key generation.&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] TSEC is now configured at the end of the first bootloader&#039;s main function.&lt;br /&gt;
&lt;br /&gt;
== Initialization ==&lt;br /&gt;
During this stage several clocks are programmed.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Program the HOST1X clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_L, CLK_OUT_ENB_L, CLK_SOURCE_HOST1X and CLK_L_HOST1X&lt;br /&gt;
    enable_host1x_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the TSEC clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_U, CLK_OUT_ENB_U, CLK_SOURCE_TSEC and CLK_U_TSEC&lt;br /&gt;
    enable_tsec_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR_SAFE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_Y, CLK_OUT_ENB_Y and CLK_Y_SOR_SAFE&lt;br /&gt;
    enable_sor_safe_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR0 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X and CLK_X_SOR0&lt;br /&gt;
    enable_sor0_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the SOR1 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X, CLK_SOURCE_SOR1 and CLK_X_SOR1&lt;br /&gt;
    enable_sor1_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Program the KFUSE clock resets&lt;br /&gt;
    // Uses RST_DEVICES_H, CLK_OUT_ENB_H and CLK_H_KFUSE&lt;br /&gt;
    enable_kfuse_clkrst();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Configuration ==&lt;br /&gt;
In this stage the Falcon IRQs, interfaces and DMA engine are configured.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear the Falcon DMA control register&lt;br /&gt;
    *(u32 *)FALCON_DMACTL = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon IRQs&lt;br /&gt;
    *(u32 *)FALCON_IRQMSET = 0xFFF2;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon IRQs&lt;br /&gt;
    *(u32 *)FALCON_IRQDEST = 0xFFF0;&lt;br /&gt;
 &lt;br /&gt;
    // Enable Falcon interfaces&lt;br /&gt;
    *(u32 *)FALCON_ITFEN = 0x03;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for Falcon&#039;s DMA engine to be idle&lt;br /&gt;
    wait_flcn_dma_idle();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Firmware loading ==&lt;br /&gt;
The Falcon firmware code is stored in the first bootloader&#039;s data segment in IMEM.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set DMA transfer base address to 0x40011900 &amp;gt;&amp;gt; 0x08&lt;br /&gt;
    *(u32 *)FALCON_DMATRFBASE = 0x400119;&lt;br /&gt;
 &lt;br /&gt;
    u32 trf_mode = 0;     // A value of 0 sets FALCON_DMATRFCMD_IMEM&lt;br /&gt;
    u32 dst_offset = 0;&lt;br /&gt;
    u32 src_offset = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Load code into Falcon (0x100 bytes at a time)&lt;br /&gt;
    while (src_offset &amp;lt; 0xF00)&lt;br /&gt;
    {&lt;br /&gt;
        flcn_load_firm(trf_mode, src_offset, dst_offset);&lt;br /&gt;
        src_offset += 0x100;&lt;br /&gt;
        dst_offset += 0x100;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] The transfer base address and size of the Falcon firmware code changed.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set DMA transfer base address to 0x40010E00 &amp;gt;&amp;gt; 0x08&lt;br /&gt;
    *(u32 *)FALCON_DMATRFBASE = 0x40010E;&lt;br /&gt;
 &lt;br /&gt;
    u32 trf_mode = 0;     // A value of 0 sets FALCON_DMATRFCMD_IMEM&lt;br /&gt;
    u32 dst_offset = 0;&lt;br /&gt;
    u32 src_offset = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Load code into Falcon (0x100 bytes at a time)&lt;br /&gt;
    while (src_offset &amp;lt; 0x2900)&lt;br /&gt;
    {&lt;br /&gt;
        flcn_load_firm(trf_mode, src_offset, dst_offset);&lt;br /&gt;
        src_offset += 0x100;&lt;br /&gt;
        dst_offset += 0x100;&lt;br /&gt;
    }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Firmware booting ==&lt;br /&gt;
Falcon is booted up and the first bootloader waits for it to finish.&lt;br /&gt;
    // Set magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0x34C2E1DA;&lt;br /&gt;
 &lt;br /&gt;
    // Clear Falcon scratch1 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon boot key version in scratch0 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH0 = 0x01;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon&#039;s boot vector address&lt;br /&gt;
    *(u32 *)FALCON_BOOTVEC = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Signal Falcon&#039;s CPU&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0x02;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for Falcon&#039;s DMA engine to be idle&lt;br /&gt;
    wait_flcn_dma_idle();&lt;br /&gt;
 &lt;br /&gt;
    u32 boot_res = 0;&lt;br /&gt;
 &lt;br /&gt;
    // The bootloader allows the TSEC two seconds from this point to do its job&lt;br /&gt;
    u32 maximum_time = read_timer() + 2000000; &lt;br /&gt;
 &lt;br /&gt;
    while (!boot_res)&lt;br /&gt;
    {&lt;br /&gt;
        // Read boot result from scratch1 MMIO&lt;br /&gt;
        boot_res = *(u32 *)FALCON_SCRATCH1;&lt;br /&gt;
    &lt;br /&gt;
        // Read from TIMERUS_CNTR_1US (microseconds from boot)&lt;br /&gt;
        u32 current_time = read_timer();&lt;br /&gt;
    &lt;br /&gt;
        // Booting is taking too long&lt;br /&gt;
        if (current_time &amp;gt; maximum_time)&lt;br /&gt;
            panic();&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Invalid boot result was returned&lt;br /&gt;
    if (boot_res != 0xB0B0B0B0)&lt;br /&gt;
        panic();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] Falcon is booted up, but the first bootloader is left in an infinite loop.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0x34C2E1DA;&lt;br /&gt;
 &lt;br /&gt;
    // Clear Falcon scratch1 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon boot key version in scratch0 MMIO&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH0 = 0x01;&lt;br /&gt;
 &lt;br /&gt;
    // Set Falcon&#039;s boot vector address&lt;br /&gt;
    *(u32 *)FALCON_BOOTVEC = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Signal Falcon&#039;s CPU&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0x02;&lt;br /&gt;
 &lt;br /&gt;
    // Infinite loop&lt;br /&gt;
    while (1);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== TSEC key generation ==&lt;br /&gt;
The TSEC key is generated by reading SOR1 registers modified by the Falcon CPU.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear magic value in host1x scratch space&lt;br /&gt;
    *(u32 *)0x50003300 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Read TSEC key&lt;br /&gt;
    u32 tsec_key[4]; &lt;br /&gt;
    tsec_key[0] = *(u32 *)NV_SOR_DP_HDCP_BKSV_LSB;&lt;br /&gt;
    tsec_key[1] = *(u32 *)NV_SOR_TMDS_HDCP_BKSV_LSB;&lt;br /&gt;
    tsec_key[2] = *(u32 *)NV_SOR_TMDS_HDCP_CN_MSB;&lt;br /&gt;
    tsec_key[3] = *(u32 *)NV_SOR_TMDS_HDCP_CN_LSB;&lt;br /&gt;
 &lt;br /&gt;
    // Clear SOR1 registers&lt;br /&gt;
    *(u32 *)NV_SOR_DP_HDCP_BKSV_LSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_BKSV_LSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_CN_MSB = 0;&lt;br /&gt;
    *(u32 *)NV_SOR_TMDS_HDCP_CN_LSB = 0;&lt;br /&gt;
 &lt;br /&gt;
    if (out_size &amp;lt; 0x10)&lt;br /&gt;
        out_size = 0x10;&lt;br /&gt;
 &lt;br /&gt;
    // Copy back the TSEC key&lt;br /&gt;
    memcpy(out_buf, tsec_key, out_size);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] This is now done inside an encrypted TSEC payload.&lt;br /&gt;
&lt;br /&gt;
== Cleanup ==&lt;br /&gt;
Clocks and resets are disabled before returning.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Deprogram KFUSE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_H, CLK_OUT_ENB_H and CLK_H_KFUSE&lt;br /&gt;
    disable_kfuse_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR1 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X, CLK_SOURCE_SOR1 and CLK_X_SOR1&lt;br /&gt;
    disable_sor1_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR0 clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_X, CLK_OUT_ENB_X and CLK_X_SOR0&lt;br /&gt;
    disable_sor0_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram SOR_SAFE clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_Y, CLK_OUT_ENB_Y and CLK_Y_SOR_SAFE&lt;br /&gt;
    disable_sor_safe_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram TSEC clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_U, CLK_OUT_ENB_U, CLK_SOURCE_TSEC and CLK_U_TSEC&lt;br /&gt;
    disable_tsec_clkrst();&lt;br /&gt;
 &lt;br /&gt;
    // Deprogram HOST1X clock and resets&lt;br /&gt;
    // Uses RST_DEVICES_L, CLK_OUT_ENB_L, CLK_SOURCE_HOST1X and CLK_L_HOST1X&lt;br /&gt;
    disable_host1x_clkrst();&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= TSEC Firmware =&lt;br /&gt;
The actual code loaded into TSEC is assembled in NVIDIA&#039;s proprietary fuc5 ISA using crypto extensions.&lt;br /&gt;
Stored inside the first bootloader, this firmware binary is split into 4 blobs (names are unofficial): [[#Boot|Boot]] (unencrypted and unauthenticated code), [[#KeygenLdr|KeygenLdr]] (unencrypted and authenticated code), [[#Keygen|Keygen]] (encrypted and authenticated code) and [[#Key data|key data]].&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] There are now 2 new blobs (names are unofficial): [[#SecureBootLdr|SecureBootLdr]] (unencrypted and unauthenticated code), [[#SecureBoot|SecureBoot]] (part unencrypted and unauthenticated code, part encrypted and authenticated code).&lt;br /&gt;
&lt;br /&gt;
Firmware can be disassembled with [http://envytools.readthedocs.io/en/latest/ envytools&#039;] [https://github.com/envytools/envytools/tree/master/envydis envydis]:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;envydis -i tsec_fw.bin -m falcon -V fuc5 -F crypt&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that the instruction set has variable length instructions, and the disassembler is not very good at detecting locations it should start disassembling from. One needs to disassemble multiple sub-regions and join them together.&lt;br /&gt;
&lt;br /&gt;
== Boot ==&lt;br /&gt;
During this stage, [[#Key data|key data]] is loaded and [[#KeygenLdr|KeygenLdr]] is authenticated, loaded and executed.&lt;br /&gt;
Before returning, this stage writes back to the host (using MMIO registers) and sets the key used by the first bootloader.&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] During this stage, [[#Key data|key data]] is loaded and execution jumps to [[#SecureBootLdr|SecureBootLdr]].&lt;br /&gt;
&lt;br /&gt;
=== Initialization ===&lt;br /&gt;
The firmware initially sets up the stack pointer to the end of the available data segment.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x09;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x1FF;&lt;br /&gt;
    data_seg_size &amp;lt;&amp;lt;= 0x08;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    *(u32 *)sp = data_seg_size;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
The firmware reads the [[#Key data|key data]] blob and then loads, authenticates and executes [[#KeygenLdr|KeygenLdr]] which sets the TSEC key.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 dmem_start = 0;&lt;br /&gt;
    u8 key_data_buf[0x7C];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data blob from code segment&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x7C;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Read the next stage from code segment into data space&lt;br /&gt;
    u32 blob1_addr = 0x400;&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    memcpy_i2d(dmem_start, blob1_addr, blob1_size);&lt;br /&gt;
 &lt;br /&gt;
    // Upload the next stage into Falcon&#039;s code segment&lt;br /&gt;
    u32 blob1_virt_addr = 0x300;&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob1_virt_addr, dmem_start, blob1_size, blob1_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    u32 boot_res = 0;&lt;br /&gt;
    u32 time = 0;&lt;br /&gt;
    bool is_blob_dec = false;&lt;br /&gt;
 &lt;br /&gt;
    while (true)&lt;br /&gt;
    {&lt;br /&gt;
        if (time == 4000001)&lt;br /&gt;
        {&lt;br /&gt;
            // Write boot failed (timeout) magic to FALCON_SCRATCH1&lt;br /&gt;
            boot_res = 0xC0C0C0C0;&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
       &lt;br /&gt;
            break;&lt;br /&gt;
        }&lt;br /&gt;
    &lt;br /&gt;
        // Load key version from FALCON_SCRATCH0 (bootloader sends 0x01)&lt;br /&gt;
        u32 key_version = *(u32 *)FALCON_SCRATCH0;&lt;br /&gt;
 &lt;br /&gt;
        if (key_version == 0x64)&lt;br /&gt;
        {&lt;br /&gt;
            // Skip all next stages&lt;br /&gt;
            boot_res = 0xB0B0B0B0;&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
       &lt;br /&gt;
            break;&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
            if (key_version &amp;gt; 0x03)&lt;br /&gt;
                boot_res = 0xD0D0D0D0;    // Invalid key version&lt;br /&gt;
            else if (key_version == 0)&lt;br /&gt;
                boot_res = 0xB0B0B0B0;    // No keys used&lt;br /&gt;
            else&lt;br /&gt;
            {&lt;br /&gt;
                u32 key_buf[0x7C];&lt;br /&gt;
          &lt;br /&gt;
                // Copy key data&lt;br /&gt;
                memcpy(key_buf, key_data_buf, 0x7C);&lt;br /&gt;
 &lt;br /&gt;
                u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
                u32 blob1_hash_addr = key_buf + 0x20; &lt;br /&gt;
 &lt;br /&gt;
                // Set auth_addr to 0x300 and auth_size to blob1_size&lt;br /&gt;
                $cauth = ((blob1_size &amp;lt;&amp;lt; 0x10) | 0x03);&lt;br /&gt;
&lt;br /&gt;
                // The next 2 xfer instructions will be overridden&lt;br /&gt;
                // and target changes from DMA to crypto&lt;br /&gt;
                cxset(0x02);&lt;br /&gt;
          &lt;br /&gt;
                // Transfer data to crypto register c6&lt;br /&gt;
                xdst(0, (blob1_hash_addr | crypto_reg_flag));&lt;br /&gt;
 	  			&lt;br /&gt;
                // Wait for all data loads/stores to finish&lt;br /&gt;
                xdwait();&lt;br /&gt;
          &lt;br /&gt;
                // Jump to KeygenLdr&lt;br /&gt;
                u32 keygenldr_res = exec_keygenldr(key_buf, key_version, is_blob_dec);&lt;br /&gt;
                is_blob_dec = true;  // Set this to prevent decrypting again&lt;br /&gt;
 &lt;br /&gt;
                // Set boot finish magic on success&lt;br /&gt;
                if (keygenldr_res == 0)&lt;br /&gt;
                    boot_res = 0xB0B0B0B0&lt;br /&gt;
            }&lt;br /&gt;
       &lt;br /&gt;
            // Write result to FALCON_SCRATCH1&lt;br /&gt;
            *(u32 *)FALCON_SCRATCH1 = boot_res;&lt;br /&gt;
 &lt;br /&gt;
            if (boot_res == 0xB0B0B0B0)&lt;br /&gt;
                break;&lt;br /&gt;
        }&lt;br /&gt;
 &lt;br /&gt;
        time++;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Overwrite the TSEC key in SOR1 registers&lt;br /&gt;
    // This has no effect because the KeygenLdr locks out the TSEC DMA engine&lt;br /&gt;
    tsec_set_key(key_data_buf);&lt;br /&gt;
 &lt;br /&gt;
    return boot_res;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[6.2.0+] The firmware calculates the start address of [[#SecureBootLdr|SecureBootLdr]] through [[#Key data|key data]] and jumps to it.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 key_data_buf[0x84];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data blob&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x84;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Calculate the next blob&#039;s address in Falcon code segment&lt;br /&gt;
    u32 blob4_size = *(u32 *)(key_data_buf + 0x80);&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    u32 blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    u32 blob3_addr = blob0_size + blob1_size + 0x100 + blob2_size + blob4_size;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to next blob&lt;br /&gt;
    (void *)blob3_addr();&lt;br /&gt;
  &lt;br /&gt;
    return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== tsec_set_key ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_data_buf&#039;&#039;&#039; (a 16 bytes buffer) as argument and writes its contents to SOR1 registers.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C300 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_TIMEOUT = 0xFFF;&lt;br /&gt;
 &lt;br /&gt;
    // Read the key&#039;s words&lt;br /&gt;
    u32 key0 = *(u32 *)(key_data_buf + 0x00);&lt;br /&gt;
    u32 key1 = *(u32 *)(key_data_buf + 0x04);&lt;br /&gt;
    u32 key2 = *(u32 *)(key_data_buf + 0x08);&lt;br /&gt;
    u32 key3 = *(u32 *)(key_data_buf + 0x0C);&lt;br /&gt;
 &lt;br /&gt;
    u32 result = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Write key0 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_DP_HDCP_BKSV_LSB, key0);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key1 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_BKSV_LSB, key1);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key2 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_CN_MSB, key2);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    // Write key3 to SOR1 and check for errors&lt;br /&gt;
    result = tsec_dma_write(NV_SOR_TMDS_HDCP_CN_LSB, key3);&lt;br /&gt;
    if (result)&lt;br /&gt;
        return result;&lt;br /&gt;
 &lt;br /&gt;
    return result;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== tsec_dma_write =====&lt;br /&gt;
This method takes &#039;&#039;&#039;addr&#039;&#039;&#039; and &#039;&#039;&#039;value&#039;&#039;&#039; as arguments and performs a DMA write using TSEC MMIO.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 result = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC DMA engine&lt;br /&gt;
    // This waits for bit 0x0C in TSEC_DMA_CMD to be 0&lt;br /&gt;
    result = wait_tsec_dma();&lt;br /&gt;
 &lt;br /&gt;
    // Wait failed&lt;br /&gt;
    if (result)&lt;br /&gt;
        return 1;&lt;br /&gt;
 &lt;br /&gt;
    // Set the destination address&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C100 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_ADDR = addr;&lt;br /&gt;
 &lt;br /&gt;
    // Set the value&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C200 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_VAL = value;&lt;br /&gt;
 &lt;br /&gt;
    // Start transfer&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x1C000 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_DMA_CMD = 0x800000F2;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC DMA engine&lt;br /&gt;
    // This waits for bit 0x0C in TSEC_DMA_CMD to be 0&lt;br /&gt;
    result = wait_tsec_dma();&lt;br /&gt;
 &lt;br /&gt;
    // Wait failed&lt;br /&gt;
    if (result)&lt;br /&gt;
        return 1;&lt;br /&gt;
 &lt;br /&gt;
    return 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KeygenLdr ==&lt;br /&gt;
This stage is responsible for reconfiguring the Falcon&#039;s crypto co-processor and loading, decrypting, authenticating and executing [[#Keygen|Keygen]].&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Clear overrides&lt;br /&gt;
    cxset(0x80);&lt;br /&gt;
 &lt;br /&gt;
    // Clear bit 0x13 in cauth&lt;br /&gt;
    $cauth = ($cauth &amp;amp; ~(1 &amp;lt;&amp;lt; 0x13));&lt;br /&gt;
 &lt;br /&gt;
    // Set the target port for memory transfers&lt;br /&gt;
    $xtargets = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c0&lt;br /&gt;
    // This should clear any leftover data&lt;br /&gt;
    xdst(0, 0);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers, except c6 which is used for auth&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cmov($c1, $c0);&lt;br /&gt;
    cmov($c2, $c0);&lt;br /&gt;
    cmov($c3, $c0);&lt;br /&gt;
    cmov($c4, $c0);&lt;br /&gt;
    cmov($c5, $c0);&lt;br /&gt;
    cmov($c7, $c0);&lt;br /&gt;
 &lt;br /&gt;
    // Clear TSEC_TEGRA_CTL_TKFI_KFUSE&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x20E00 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_TEGRA_CTL &amp;amp;= 0xFFFEFFFF;&lt;br /&gt;
 &lt;br /&gt;
    // Set TSEC_SCP_CTL_PKEY_REQUEST_RELOAD&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x10600 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_SCP_CTL_PKEY |= 0x01;&lt;br /&gt;
 &lt;br /&gt;
    u32 is_pkey_loaded = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Wait for TSEC_SCP_CTL_PKEY_LOADED&lt;br /&gt;
    while (!is_pkey_loaded)&lt;br /&gt;
        is_pkey_loaded = (*(u32 *)TSEC_SCP_CTL_PKEY &amp;amp; 0x02);&lt;br /&gt;
 &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x09;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x1FF;&lt;br /&gt;
    data_seg_size &amp;lt;&amp;lt;= 0x08;&lt;br /&gt;
 &lt;br /&gt;
    // Check stack bounds&lt;br /&gt;
    if (($sp &amp;gt;= data_seg_size) || ($sp &amp;lt; 0x800))&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Load and execute the Keygen stage&lt;br /&gt;
    load_keygen(key_buf, key_version, is_blob_dec);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    // This is TSEC_MMIO + 0x1000 + (0x10300 / 0x40)&lt;br /&gt;
    *(u32 *)TSEC_SCP_CTL_LOCK = 0;&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== load_keygen ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_buf&#039;&#039;&#039;, &#039;&#039;&#039;key_version&#039;&#039;&#039; and &#039;&#039;&#039;is_blob_dec&#039;&#039;&#039; as arguments and is responsible for loading, decrypting, authenticating and executing [[#Keygen|Keygen]].&lt;br /&gt;
Notably, it also does AES-CMAC over the unauthorized [[#Boot|Boot]] blob to make sure it hasn&#039;t been tampered with.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 res = 0;&lt;br /&gt;
 &lt;br /&gt;
    u32 dmem_start = 0;&lt;br /&gt;
    u32 blob0_addr = 0;&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_buf + 0x70); &lt;br /&gt;
 &lt;br /&gt;
    // Load blob0 code to the start of the data segment&lt;br /&gt;
    memcpy_i2d(dmem_start, blob0_addr, blob0_size);&lt;br /&gt;
 &lt;br /&gt;
    // Generate &amp;quot;CODE_SIG_01&amp;quot; key into c4 crypto register&lt;br /&gt;
    gen_usr_key(0, 0);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt buffer with c4&lt;br /&gt;
    u8 sig_key[0x10];&lt;br /&gt;
    enc_buf(sig_key, blob0_size);&lt;br /&gt;
 &lt;br /&gt;
    u32 src_addr = dmem_start;&lt;br /&gt;
    u32 src_size = blob0_size;&lt;br /&gt;
    u32 iv_addr = sig_key;&lt;br /&gt;
    u32 dst_addr = sig_key;&lt;br /&gt;
    u32 mode = 0x02;   // AES-CMAC&lt;br /&gt;
    u32 use_imem = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Do AES-CMAC over blob0 code&lt;br /&gt;
    do_crypto(src_addr, src_size, iv_addr, dst_addr, mode, use_imem);&lt;br /&gt;
 &lt;br /&gt;
    // Compare the resulting hash with the one from the key buffer&lt;br /&gt;
    if (memcmp(dst_addr, key_buf + 0x10, 0x10))&lt;br /&gt;
    {&lt;br /&gt;
        res = 0xDEADBEEF;&lt;br /&gt;
        return res;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_buf + 0x74);&lt;br /&gt;
 &lt;br /&gt;
    // Decrypt Keygen blob if needed&lt;br /&gt;
    if (!is_blob_dec)&lt;br /&gt;
    {&lt;br /&gt;
        // Read Stage2&#039;s size from key buffer&lt;br /&gt;
        u32 blob2_size = *(u32 *)(key_buf + 0x78);&lt;br /&gt;
 &lt;br /&gt;
        // Check stack bounds&lt;br /&gt;
        if ($sp &amp;gt; blob2_size)&lt;br /&gt;
        {&lt;br /&gt;
            u32 blob2_virt_addr = blob0_size + blob1_size;&lt;br /&gt;
            u32 blob2_phys_addr = blob2_virt_addr + 0x100;&lt;br /&gt;
       &lt;br /&gt;
            // Read the encrypted Keygen blob&lt;br /&gt;
            memcpy_i2d(dmem_start, blob2_phys_addr, blob2_size);&lt;br /&gt;
 &lt;br /&gt;
            // Generate &amp;quot;CODE_ENC_01&amp;quot; key into c4 crypto register&lt;br /&gt;
            gen_usr_key(0x01, 0x01);&lt;br /&gt;
       &lt;br /&gt;
            u32 src_addr = dmem_start;&lt;br /&gt;
            u32 src_size = blob2_size;&lt;br /&gt;
            u32 iv_addr = key_buf + 0x40;&lt;br /&gt;
            u32 dst_addr = dmem_start;&lt;br /&gt;
            u32 mode = 0;   // AES-128-CBC&lt;br /&gt;
            u32 use_imem = 0;&lt;br /&gt;
       &lt;br /&gt;
            // Decrypt Keygen blob with AES-128-CBC&lt;br /&gt;
            do_crypto(src_addr, src_size, iv_addr, dst_addr, mode, use_imem);&lt;br /&gt;
       &lt;br /&gt;
            // Upload decrypted Keygen into Falcon&#039;s code segment&lt;br /&gt;
            bool use_secret = true;&lt;br /&gt;
            memcpy_d2i(blob2_virt_addr, dmem_start, blob2_size, blob2_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
            // Clear out the decrypted blob&lt;br /&gt;
            memset(dmem_start, 0, blob2_size);&lt;br /&gt;
        }&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob2_hash_addr = key_buf + 0x30;&lt;br /&gt;
 &lt;br /&gt;
    // Transfer the Keygen auth hash to crypto register c6&lt;br /&gt;
    xdst(0, (blob2_hash_addr | crypto_reg_flag));&lt;br /&gt;
 				&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    // Save previous cauth value&lt;br /&gt;
    u32 cauth_old = $cauth;&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to blob2_virt_addr and auth_size to blob2_size&lt;br /&gt;
    $cauth = ((blob2_virt_addr &amp;gt;&amp;gt; 0x08) | (blob2_size &amp;lt;&amp;lt; 0x10));&lt;br /&gt;
 &lt;br /&gt;
    u32 hovi_key_addr = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Select next stage key&lt;br /&gt;
    if (key_version == 0x01)		        // Use HOVI_EKS_01&lt;br /&gt;
        hovi_key_addr = key_buf + 0x50;&lt;br /&gt;
    else if (key_version == 0x02)	        // Use HOVI_COMMON_01&lt;br /&gt;
        hovi_key_addr = key_buf + 0x60;&lt;br /&gt;
    else if (key_version == 0x03)	        // Use debug key (empty)&lt;br /&gt;
        hovi_key_addr = key_buf + 0x00;&lt;br /&gt;
    else&lt;br /&gt;
        res = 0xD0D0D0D0&lt;br /&gt;
 	&lt;br /&gt;
    // Jump to Keygen&lt;br /&gt;
    if (hovi_key_addr)&lt;br /&gt;
        res = exec_keygen(hovi_key_addr, key_version);&lt;br /&gt;
          &lt;br /&gt;
    // Clear out key data&lt;br /&gt;
    memset(key_buf, 0, 0x7C);&lt;br /&gt;
 &lt;br /&gt;
    // Restore previous cauth value&lt;br /&gt;
    $cauth = cauth_old;&lt;br /&gt;
 &lt;br /&gt;
    return res;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== gen_usr_key =====&lt;br /&gt;
This method takes &#039;&#039;&#039;type&#039;&#039;&#039; and &#039;&#039;&#039;mode&#039;&#039;&#039; as arguments and generates a key.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 seed_buf[0x10];&lt;br /&gt;
 &lt;br /&gt;
    // Read a 16 bytes seed based on supplied type&lt;br /&gt;
    /*&lt;br /&gt;
        type == 0: &amp;quot;CODE_SIG_01&amp;quot; + null padding&lt;br /&gt;
        type == 1: &amp;quot;CODE_ENC_01&amp;quot; + null padding&lt;br /&gt;
    */&lt;br /&gt;
    get_seed(seed_buf, type);&lt;br /&gt;
 &lt;br /&gt;
    // This will write the seed into crypto register c0 &lt;br /&gt;
    crypto_store(0, seed_buf);&lt;br /&gt;
 &lt;br /&gt;
    // Load selected secret into crypto register c1&lt;br /&gt;
    csecret($c1, 0x26);&lt;br /&gt;
 &lt;br /&gt;
    // Bind c1 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg($c1);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt seed_buf in c0 using keyreg value as key into c1&lt;br /&gt;
    cenc($c1, $c0);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt the auth signature (stored in c6) with c1 and store in c1&lt;br /&gt;
    csigenc($c1, $c1);&lt;br /&gt;
 &lt;br /&gt;
    // Copy the result to c4 (will be used as key)&lt;br /&gt;
    cmov($c4, $c1);&lt;br /&gt;
 &lt;br /&gt;
    // Do key expansion for decryption if necessary&lt;br /&gt;
    if (mode != 0)&lt;br /&gt;
        ckexp($c4, $c4);&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== enc_buf =====&lt;br /&gt;
This method takes &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) and &#039;&#039;&#039;size&#039;&#039;&#039; as arguments and encrypts the supplied buffer.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Set first 3 words to null&lt;br /&gt;
    *(u32 *)(buf + 0x00) = 0;&lt;br /&gt;
    *(u32 *)(buf + 0x04) = 0;&lt;br /&gt;
    *(u32 *)(buf + 0x08) = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Swap halves (b16, b32 and b16 again) and store it as the last word&lt;br /&gt;
    *(u32 *)(buf + 0x0C) = (&lt;br /&gt;
        ((size &amp;amp; 0x000000FF) &amp;lt;&amp;lt; 0x08 | (size &amp;amp; 0x0000FF00) &amp;gt;&amp;gt; 0x08) &amp;lt;&amp;lt; 0x10&lt;br /&gt;
        | ((size &amp;amp; 0x00FF0000) &amp;gt;&amp;gt; 0x10) &amp;lt;&amp;lt; 0x08&lt;br /&gt;
        | (size &amp;amp; 0xFF000000) &amp;gt;&amp;gt; 0x18&lt;br /&gt;
    );&lt;br /&gt;
 &lt;br /&gt;
    // This will write buf into crypto register c3 &lt;br /&gt;
    crypto_store(0x03, buf);&lt;br /&gt;
 &lt;br /&gt;
    // Bind c4 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg($c4);&lt;br /&gt;
 &lt;br /&gt;
    // Encrypt buf in c3 using keyreg value as key and store in c5&lt;br /&gt;
    cenc($c5, $c3);&lt;br /&gt;
 &lt;br /&gt;
    // This will read into buf from crypto register c5 &lt;br /&gt;
    crypto_load(0x05, buf);&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== crypto_store =====&lt;br /&gt;
This method takes &#039;&#039;&#039;reg&#039;&#039;&#039; (a crypto register) and &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) as arguments and loads the supplied buffer into the crypto register.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next two xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Encode the source buffer and the destination register for the xfer&lt;br /&gt;
    u32 crypto_xfer_flag = (u32)buf | reg &amp;lt;&amp;lt; 0x10;&lt;br /&gt;
&lt;br /&gt;
    // Transfer the supplied buffer to the supplied crypto register&lt;br /&gt;
    xdst(crypto_xfer_flag, crypto_xfer_flag);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== crypto_load =====&lt;br /&gt;
This method takes &#039;&#039;&#039;reg&#039;&#039;&#039; (a crypto register) and &#039;&#039;&#039;buf&#039;&#039;&#039; (a 16 bytes buffer) as arguments and loads the supplied buffer into the crypto register.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next two xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Encode the destination buffer and the source register for the xfer&lt;br /&gt;
    u32 crypto_xfer_flag = (u32)buf | reg &amp;lt;&amp;lt; 0x10;&lt;br /&gt;
&lt;br /&gt;
    // Transfer the contents of the supplied crypto register into the supplied buffer&lt;br /&gt;
    xdld(crypto_xfer_flag, crypto_xfer_flag);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===== do_crypto =====&lt;br /&gt;
This is the method responsible for all crypto operations performed during [[#KeygenLdr|KeygenLdr]]. It takes &#039;&#039;&#039;src_addr&#039;&#039;&#039;, &#039;&#039;&#039;src_size&#039;&#039;&#039;, &#039;&#039;&#039;iv_addr&#039;&#039;&#039;, &#039;&#039;&#039;dst_addr&#039;&#039;&#039;, &#039;&#039;&#039;mode&#039;&#039;&#039; and &#039;&#039;&#039;use_imem&#039;&#039;&#039; as arguments.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Check for invalid source data size&lt;br /&gt;
    if (!src_size || (src_size &amp;amp; 0x0F))&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Check for invalid source data address&lt;br /&gt;
    if (src_addr &amp;amp; 0x0F)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Check for invalid destination data address&lt;br /&gt;
    if (dst_addr &amp;amp; 0x0F)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Use IV if available&lt;br /&gt;
    if (iv_addr)&lt;br /&gt;
    {&lt;br /&gt;
        // This will write the iv_addr into crypto register c5 &lt;br /&gt;
        crypto_store(0x05, iv_addr);&lt;br /&gt;
    }&lt;br /&gt;
    else&lt;br /&gt;
    {&lt;br /&gt;
        // Clear c5 register (use null IV)&lt;br /&gt;
        cxor($c5, $c5);&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Bind c4 register as the key for enc/dec operations&lt;br /&gt;
    ckeyreg(c4);&lt;br /&gt;
 &lt;br /&gt;
    if (mode == 0x00)	              // AES-128-CBC decrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 5 instructions&lt;br /&gt;
        cs0begin(0x05);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cdec($c2, $c3);               // Decrypt from c3 into c2&lt;br /&gt;
        cxor($c5, $c2);               // XOR c2 with c5 and store in c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
        cmov($c5, $c3);               // Move c3 into c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x01)	      // AES-128-CBC encrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 4 instructions&lt;br /&gt;
        cs0begin(0x04);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cxor($c3, $c5);               // XOR c5 with c3 and store in c3&lt;br /&gt;
        cenc($c5, $c3);               // Encrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x02)	      // AES-CMAC&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cxor($c5, $c3);               // XOR c5 with c3 and store in c5&lt;br /&gt;
        cenc($c5, $c5);               // Encrypt from c5 into c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x03)	      // AES-128-ECB decrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cdec($c5, $c3);               // Decrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else if (mode == 0x04)	      // AES-128-ECB encrypt&lt;br /&gt;
    {&lt;br /&gt;
        // Create crypto script with 3 instructions&lt;br /&gt;
        cs0begin(0x03);&lt;br /&gt;
 	&lt;br /&gt;
        cxsin($c3);                   // Read 0x10 bytes from crypto stream into c3&lt;br /&gt;
        cenc($c5, $c3);               // Encrypt from c3 into c5&lt;br /&gt;
        cxsout($c5);                  // Write 0x10 bytes into crypto stream from c5&lt;br /&gt;
    }&lt;br /&gt;
    else&lt;br /&gt;
        return;&lt;br /&gt;
 &lt;br /&gt;
    // Main loop&lt;br /&gt;
    while (src_size &amp;gt; 0)&lt;br /&gt;
    {&lt;br /&gt;
        u32 blk_count = (src_size &amp;gt;&amp;gt; 0x04);&lt;br /&gt;
 	&lt;br /&gt;
        if (blk_count &amp;gt; 0x10)&lt;br /&gt;
            blk_count = 0x10;&lt;br /&gt;
   &lt;br /&gt;
        // Check size align&lt;br /&gt;
        if (blk_count &amp;amp; (blk_count - 0x01))&lt;br /&gt;
            blk_count = 0x01;&lt;br /&gt;
 &lt;br /&gt;
        u32 blk_size = (blk_count &amp;lt;&amp;lt; 0x04);&lt;br /&gt;
   &lt;br /&gt;
        u32 crypto_xfer_src = 0;&lt;br /&gt;
        u32 crypto_xfer_dst = 0;&lt;br /&gt;
   &lt;br /&gt;
        if (block_size == 0x20)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00030000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00030000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 2 times (1 for each block)&lt;br /&gt;
            cs0exec(0x02);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x40)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00040000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00040000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 4 times (1 for each block)&lt;br /&gt;
            cs0exec(0x04);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x80)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00050000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00050000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 8 times (1 for each block)&lt;br /&gt;
            cs0exec(0x08);&lt;br /&gt;
        }&lt;br /&gt;
        else if (block_size == 0x100)&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00060000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00060000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 16 times (1 for each block)&lt;br /&gt;
            cs0exec(0x10);&lt;br /&gt;
        }&lt;br /&gt;
        else&lt;br /&gt;
        {&lt;br /&gt;
            crypto_xfer_src = (0x00020000 | src_addr);&lt;br /&gt;
            crypto_xfer_dst = (0x00020000 | dst_addr);&lt;br /&gt;
      &lt;br /&gt;
            // Execute crypto script 1 time (1 for each block)&lt;br /&gt;
            cs0exec(0x01);&lt;br /&gt;
 &lt;br /&gt;
            // Ensure proper block size&lt;br /&gt;
            block_size = 0x10;&lt;br /&gt;
        }&lt;br /&gt;
 &lt;br /&gt;
        // The next xfer instruction will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto input/output stream&lt;br /&gt;
        if (use_imem)&lt;br /&gt;
            cxset(0xA1);         // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
        else&lt;br /&gt;
            cxset(0x21);         // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 &lt;br /&gt;
        // Transfer data into the crypto input/output stream&lt;br /&gt;
        xdst(crypto_xfer_src, crypto_xfer_src);&lt;br /&gt;
   &lt;br /&gt;
        // AES-CMAC only needs one more xfer instruction&lt;br /&gt;
        if (mode == 0x02)&lt;br /&gt;
        {&lt;br /&gt;
            // The next xfer instruction will be overridden&lt;br /&gt;
            // and target changes from DMA to crypto input/output stream&lt;br /&gt;
            if (use_imem)&lt;br /&gt;
                cxset(0xA1);     // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
            else&lt;br /&gt;
                cxset(0x21);     // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 		&lt;br /&gt;
            // Wait for all data loads/stores to finish&lt;br /&gt;
            xdwait();&lt;br /&gt;
        }&lt;br /&gt;
        else  // AES enc/dec needs 2 more xfer instructions&lt;br /&gt;
        {&lt;br /&gt;
            // The next 2 xfer instructions will be overridden&lt;br /&gt;
            // and target changes from DMA to crypto input/output stream&lt;br /&gt;
            if (use_imem)&lt;br /&gt;
                cxset(0xA2);            // Flag 0xA0 is falcon imem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
            else&lt;br /&gt;
                cxset(0x22);            // Flag 0x20 is external mem &amp;lt;-&amp;gt; crypto input/output stream&lt;br /&gt;
 &lt;br /&gt;
            // Transfer data from the crypto input/output stream&lt;br /&gt;
            xdld(crypto_xfer_dst, crypto_xfer_dst);&lt;br /&gt;
 		&lt;br /&gt;
            // Wait for all data loads/stores to finish&lt;br /&gt;
            xdwait();&lt;br /&gt;
 &lt;br /&gt;
            // Increase the destination address by block size&lt;br /&gt;
            dst_addr += block_size;&lt;br /&gt;
        }&lt;br /&gt;
   &lt;br /&gt;
        // Increase the source address by block size&lt;br /&gt;
        src_addr += block_size;&lt;br /&gt;
 &lt;br /&gt;
        // Decrease the source size by block size&lt;br /&gt;
        src_size -= block_size;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // AES-CMAC result is in c5&lt;br /&gt;
    if (mode == 0x02)&lt;br /&gt;
    {&lt;br /&gt;
        // This will read into dst_addr from crypto register c5 &lt;br /&gt;
        crypto_load(0x05, dst_addr);&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Keygen ==&lt;br /&gt;
This stage is decrypted by [[#KeygenLdr|KeygenLdr]] using a key generated by encrypting the KeygenLdr auth signature with a seed encrypted with a csecret. It will generate the final TSEC key.&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
The main function takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; and &#039;&#039;&#039;key_type&#039;&#039;&#039; as arguments from [[#KeygenLdr|KeygenLdr]].&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u32 falcon_rev = *(u32 *)UC_CAPS2 &amp;amp; 0x0F;&lt;br /&gt;
&lt;br /&gt;
    // Falcon hardware revision must be 5&lt;br /&gt;
    if (falcon_rev != 0x05)&lt;br /&gt;
        exit();&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Set the target port for memory transfers&lt;br /&gt;
    $xtargets = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Generate the TSEC key&lt;br /&gt;
    gen_tsec_key(key_addr, key_type);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== gen_tsec_key ====&lt;br /&gt;
This method is responsible for generating the final TSEC key. It takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; and &#039;&#039;&#039;key_type&#039;&#039;&#039; as arguments.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // This will use TSEC DMA to look for 0x34C2E1DA in host1x scratch space&lt;br /&gt;
    u32 host1x_res = check_host1x_magic();&lt;br /&gt;
&lt;br /&gt;
    // Failed to find magic word&lt;br /&gt;
    if (host1x_res != 0)&lt;br /&gt;
        return;&lt;br /&gt;
    &lt;br /&gt;
    u32 crypto_reg_flag = 0x00000000;&lt;br /&gt;
&lt;br /&gt;
    // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto register&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
&lt;br /&gt;
    // Transfer the seed in key_addr to crypto register c0&lt;br /&gt;
    xdst(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
   &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
&lt;br /&gt;
    crypto_reg_flag = 0x00020000;&lt;br /&gt;
&lt;br /&gt;
    if (key_type == 0x01)        // HOVI_EKS_01&lt;br /&gt;
    {&lt;br /&gt;
        // Load selected secret into crypto register c1&lt;br /&gt;
        csecret($c1, 0x3F);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c1 and store in c1&lt;br /&gt;
        csigenc($c1, $c1);&lt;br /&gt;
        &lt;br /&gt;
        // Load selected secret into crypto register c2&lt;br /&gt;
        csecret($c2, 0x00);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the seed from key_addr and store in c2&lt;br /&gt;
        cenc($c2, $c0);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);        &lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c2 and store in c2&lt;br /&gt;
        csigenc($c2, $c2);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
        &lt;br /&gt;
        // Encrypt c1 and store in c2&lt;br /&gt;
        cenc($c2, $c1);&lt;br /&gt;
        &lt;br /&gt;
        // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto register&lt;br /&gt;
        cxset(0x02);&lt;br /&gt;
        &lt;br /&gt;
        // Transfer the resulting key from crypto register c2 to key_addr&lt;br /&gt;
        xdld(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
        &lt;br /&gt;
        // Wait for all data loads/stores to finish&lt;br /&gt;
        xdwait();&lt;br /&gt;
    }&lt;br /&gt;
    else if (key == 0x02)        // HOVI_COMMON_01&lt;br /&gt;
    {&lt;br /&gt;
        // Load selected secret into crypto register c2&lt;br /&gt;
        csecret($c2, 0x00);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);&lt;br /&gt;
&lt;br /&gt;
        // Encrypt the seed from key_addr and store in c2&lt;br /&gt;
        cenc($c2, $c0);&lt;br /&gt;
&lt;br /&gt;
        // Bind c2 register as the key for enc/dec operations&lt;br /&gt;
        ckeyreg($c2);        &lt;br /&gt;
&lt;br /&gt;
        // Encrypt the auth signature with c2 and store in c2&lt;br /&gt;
        csigenc($c2, $c2);&lt;br /&gt;
        &lt;br /&gt;
        // The next 0x02 xfer instructions will be overridden&lt;br /&gt;
        // and target changes from DMA to crypto register&lt;br /&gt;
        cxset(0x02);&lt;br /&gt;
        &lt;br /&gt;
        // Transfer the resulting key from crypto register c2 to key_addr&lt;br /&gt;
        xdld(0, (key_addr | crypto_reg_flag));&lt;br /&gt;
        &lt;br /&gt;
        // Wait for all data loads/stores to finish&lt;br /&gt;
        xdwait();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Use TSEC DMA to write the key in SOR1 registers&lt;br /&gt;
    sor1_set_key(key_addr);&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== sor1_set_key ====&lt;br /&gt;
This method takes &#039;&#039;&#039;key_addr&#039;&#039;&#039; (start address of a 16 bytes buffer) as argument and transfers its contents to SOR1 registers.&lt;br /&gt;
&lt;br /&gt;
The implementation is equivalent to [[#tsec_set_key|tsec_set_key]].&lt;br /&gt;
&lt;br /&gt;
== SecureBootLdr ==&lt;br /&gt;
[6.2.0+] This was introduced to try to recover the secure boot from the RCM vulnerability.&lt;br /&gt;
&lt;br /&gt;
This stage starts by authenticating and executing [[#KeygenLdr|KeygenLdr]] which in turn authenticates, decrypts and executes [[#Keygen|Keygen]] (both blobs remain unchanged from previous firmware versions).&lt;br /&gt;
After the TSEC key has been generated, execution returns to this stage which then parses and executes [[#SecureBoot|SecureBoot]].&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    u8 key_data_buf[0x84];&lt;br /&gt;
    u8 tmp_key_data_buf[0x84];&lt;br /&gt;
 &lt;br /&gt;
    // Read the key data from memory&lt;br /&gt;
    u32 key_data_addr = 0x300;&lt;br /&gt;
    u32 key_data_size = 0x84;&lt;br /&gt;
    memcpy_i2d(key_data_buf, key_data_addr, key_data_size);&lt;br /&gt;
 &lt;br /&gt;
    // Read the KeygenLdr blob from memory&lt;br /&gt;
    u32 boot_base_addr = 0;&lt;br /&gt;
    u32 blob1_addr = 0x400;&lt;br /&gt;
    u32 blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    memcpy_i2d(boot_base_addr, blob1_addr, blob1_size);&lt;br /&gt;
  &lt;br /&gt;
    // Upload the next code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob1_virt_addr = 0x300;&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob1_virt_addr, boot_base_addr, blob1_size, blob1_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    // Backup the key data&lt;br /&gt;
    memcpy(tmp_key_data_buf, key_data_buf, 0x84);&lt;br /&gt;
 &lt;br /&gt;
    // Save previous cauth value&lt;br /&gt;
    u32 cauth_old = $cauth;&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x300 and auth_size to blob1_size&lt;br /&gt;
    $cauth = ((blob1_size &amp;lt;&amp;lt; 0x10) | (0x300 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // The next 2 xfer instructions will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x02);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob1_hash_addr = tmp_key_data_buf + 0x20; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob1_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    u32 key_version = 0x01;&lt;br /&gt;
    bool is_blob_dec = false;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to KeygenLdr&lt;br /&gt;
    u32 keygenldr_res = exec_keygenldr(tmp_key_data_buf, key_version, is_blob_dec);&lt;br /&gt;
 &lt;br /&gt;
    // Set boot finish magic on success&lt;br /&gt;
    if (keygenldr_res == 0)&lt;br /&gt;
        keygenldr_res = 0xB0B0B0B0&lt;br /&gt;
       &lt;br /&gt;
    // Write result to FALCON_SCRATCH1&lt;br /&gt;
    *(u32 *)FALCON_SCRATCH1 = keygenldr_res;&lt;br /&gt;
 &lt;br /&gt;
    if (keygenldr_res != 0xB0B0B0B0)&lt;br /&gt;
        return keygenldr_res;&lt;br /&gt;
 &lt;br /&gt;
    // Restore previous cauth value&lt;br /&gt;
    $cauth = cauth_old;&lt;br /&gt;
 &lt;br /&gt;
    u8 flcn_hdr_buf[0x18];&lt;br /&gt;
    u8 flcn_os_hdr_buf[0x10];&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    u32 blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    u32 blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon header from memory&lt;br /&gt;
    u32 blob4_flcn_hdr_addr = (((blob0_size + blob1_size) + 0x100) + blob2_size);&lt;br /&gt;
    memcpy_i2d(flcn_hdr_buf, blob4_flcn_hdr_addr, 0x18);&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 flcn_hdr_size = *(u32 *)(flcn_hdr_buf + 0x0C);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon OS header from memory&lt;br /&gt;
    u32 blob4_flcn_os_hdr_addr = ((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_hdr_size);&lt;br /&gt;
    memcpy_i2d(flcn_os_hdr_buf, blob4_flcn_os_hdr_addr, 0x10);&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    u32 flcn_code_hdr_size = *(u32 *)(flcn_hdr_buf + 0x10);&lt;br /&gt;
    u32 flcn_os_size = *(u32 *)(flcn_os_hdr_buf + 0x04);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s Falcon OS image from memory&lt;br /&gt;
    u32 blob4_flcn_os_addr = ((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_code_hdr_size);&lt;br /&gt;
    memcpy_i2d(boot_base_addr, blob4_flcn_os_hdr_addr, flcn_os_size);&lt;br /&gt;
 &lt;br /&gt;
    // Upload the SecureBoot&#039;s Falcon OS image boot stub code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob4_flcn_os_boot_virt_addr = 0;&lt;br /&gt;
    u32 blob4_flcn_os_boot_size = 0x100;&lt;br /&gt;
    use_secret = false;&lt;br /&gt;
    memcpy_d2i(blob4_flcn_os_boot_virt_addr, boot_base_addr, blob4_flcn_os_boot_size, blob4_flcn_os_boot_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    flcn_os_size = *(u32 *)(flcn_os_hdr_buf + 0x04); &lt;br /&gt;
 &lt;br /&gt;
    // Upload the SecureBoot blob&#039;s Falcon OS encrypted image code segment into Falcon&#039;s CODE region&lt;br /&gt;
    u32 blob4_flcn_os_img_virt_addr = 0x100;&lt;br /&gt;
    u32 blob4_flcn_os_img_size = (flcn_os_size - 0x100);&lt;br /&gt;
    use_secret = true;&lt;br /&gt;
    memcpy_d2i(blob4_flcn_os_img_virt_addr, boot_base_addr + 0x100, blob4_flcn_os_img_size, blob4_flcn_os_img_virt_addr, use_secret);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    blob1_size = *(u32 *)(key_data_buf + 0x74);&lt;br /&gt;
    blob2_size = *(u32 *)(key_data_buf + 0x78);&lt;br /&gt;
    blob0_size = *(u32 *)(key_data_buf + 0x70);&lt;br /&gt;
    flcn_code_hdr_size = *(u32 *)(flcn_hdr_buf + 0x10);&lt;br /&gt;
    u32 flcn_os_code_size = *(u32 *)(flcn_os_hdr_buf + 0x08);&lt;br /&gt;
 &lt;br /&gt;
    // Read the SecureBoot blob&#039;s falcon OS image&#039;s hash from memory&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = (((((blob0_size + blob1_size) + 0x100) + blob2_size) + flcn_code_hdr_size) + flcn_os_code_size);&lt;br /&gt;
    memcpy_i2d(0, blob4_flcn_os_img_hash_addr, 0x10);&lt;br /&gt;
 &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)FALCON_HWCFG;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x03;&lt;br /&gt;
    data_seg_size &amp;amp;= 0x3FC0;&lt;br /&gt;
 &lt;br /&gt;
    u32 data_addr = 0x10;&lt;br /&gt;
 &lt;br /&gt;
    // Clear all data except the first 0x10 bytes (SecureBoot blob&#039;s Falcon OS image&#039;s hash)&lt;br /&gt;
    for (int data_word_count = 0x04; data_word_count &amp;lt; data_seg_size; data_word_count++)&lt;br /&gt;
    {&lt;br /&gt;
        *(u32 *)(data_addr) = 0; &lt;br /&gt;
        data_addr += 0x04;&lt;br /&gt;
    }&lt;br /&gt;
 &lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
 &lt;br /&gt;
    // Jump to SecureBoot&lt;br /&gt;
    load_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0xB0B0B0B0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== SecureBoot ==&lt;br /&gt;
[6.2.0+] This was introduced to try to recover the secure boot from the RCM vulnerability.&lt;br /&gt;
&lt;br /&gt;
This stage prepares the stack then authenticates, decrypts and executes the SecureBoot blob&#039;s Falcon OS image.&lt;br /&gt;
&lt;br /&gt;
=== Main ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image boot stub&lt;br /&gt;
    init_secboot();&lt;br /&gt;
 &lt;br /&gt;
    // Halt execution&lt;br /&gt;
    exit();&lt;br /&gt;
 &lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== init_secboot ====&lt;br /&gt;
This method takes no arguments and is responsible for loading, authenticating and executing [[#SecureBoot|SecureBoot]].&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Read the transfer base address from IO space&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)FALCON_DMATRFBASE;&lt;br /&gt;
 &lt;br /&gt;
    // Copy transfer base address to data memory&lt;br /&gt;
    u32 scratch_data_addr = 0x300;&lt;br /&gt;
    *(u32 *)scratch_data_addr = xfer_ext_base_addr;&lt;br /&gt;
 &lt;br /&gt;
    // Set the transfer base address&lt;br /&gt;
    xcbase(xfer_ext_base_addr);&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = 0; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob4_flcn_os_img_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    cmov($c7, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x100, auth_size to 0x1300,&lt;br /&gt;
    // bit 16 (use_secret) and bit 17 (is_encrypted)&lt;br /&gt;
    $cauth = ((0x02 &amp;lt;&amp;lt; 0x10) | (0x01 &amp;lt;&amp;lt; 0x10) | (0x1300 &amp;lt;&amp;lt; 0x10) | (0x100 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image&lt;br /&gt;
    exec_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0x0F0F0F0F;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[8.1.0+] Removed transfer base address setting and added IMEM protection.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    u32 crypto_reg_flag = 0x00060000;&lt;br /&gt;
    u32 blob4_flcn_os_img_hash_addr = 0; &lt;br /&gt;
 &lt;br /&gt;
    // Transfer data to crypto register c6&lt;br /&gt;
    xdst(0, (blob4_flcn_os_img_hash_addr | crypto_reg_flag));&lt;br /&gt;
 &lt;br /&gt;
    // The next xfer instruction will be overridden&lt;br /&gt;
    // and target changes from DMA to crypto&lt;br /&gt;
    cxset(0x01);&lt;br /&gt;
 &lt;br /&gt;
    // Wait for all data loads/stores to finish&lt;br /&gt;
    xdwait();&lt;br /&gt;
 &lt;br /&gt;
    cmov($c7, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
 &lt;br /&gt;
    // Set auth_addr to 0x100, auth_size to 0x1D00,&lt;br /&gt;
    // bit 16 (use_secret) and bit 17 (is_encrypted)&lt;br /&gt;
    $cauth = ((0x02 &amp;lt;&amp;lt; 0x10) | (0x01 &amp;lt;&amp;lt; 0x10) | (0x1D00 &amp;lt;&amp;lt; 0x10) | (0x100 &amp;gt;&amp;gt; 0x08));&lt;br /&gt;
 &lt;br /&gt;
    // Clear interrupt flags&lt;br /&gt;
    $flags.ie0 = 0;&lt;br /&gt;
    $flags.ie1 = 0;&lt;br /&gt;
    $flags.ie2 = 0;&lt;br /&gt;
&lt;br /&gt;
    // Fill remaining IMEM with secret pages&lt;br /&gt;
    bool use_secret = true;&lt;br /&gt;
    memcpy_d2i(0x1E00, 0, 0x2200, 0x1E00, use_secret);&lt;br /&gt;
    memcpy_d2i(0x4000, 0, 0x4000, 0x4000, use_secret);&lt;br /&gt;
&lt;br /&gt;
    // Wait for all code loads to finish&lt;br /&gt;
    xcwait();&lt;br /&gt;
 &lt;br /&gt;
    // Jump to the SecureBoot blob&#039;s Falcon OS image&lt;br /&gt;
    exec_secboot();&lt;br /&gt;
 &lt;br /&gt;
    return 0x0F0F0F0F;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== exec_secboot ====&lt;br /&gt;
This is the signed and encrypted portion of the [[#SecureBoot|SecureBoot]] payload.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Recover the transfer base address from the stack&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)scratch_data_addr;&lt;br /&gt;
&lt;br /&gt;
    // Return the TLB entry that covers the virtual address&lt;br /&gt;
    u32 tlb_entry = vtlb(xfer_ext_base_addr);&lt;br /&gt;
    &lt;br /&gt;
    // Clear Falcon CPU control&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0;&lt;br /&gt;
    &lt;br /&gt;
    // Halt if the external page is marked as secret&lt;br /&gt;
    if ((tlb_entry &amp;amp; 0x4000000) != 0)&lt;br /&gt;
        exit();&lt;br /&gt;
    &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
    &lt;br /&gt;
    // Fill all DMEM with a pointer to a trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; data_seg_size; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Initialize the TRNG and generate random data in DMEM&lt;br /&gt;
    init_rnd();&lt;br /&gt;
    &lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    u32 rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Load the TSEC key from SOR1 registers into DMEM&lt;br /&gt;
    sor1_get_key();&lt;br /&gt;
&lt;br /&gt;
    // Initialize CAR registers&lt;br /&gt;
    car_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Ensure CLK_RST_CONTROLLER_CLK_SOURCE_TSEC_0 is 0x02&lt;br /&gt;
    test_clk_source_tsec();&lt;br /&gt;
&lt;br /&gt;
    // Set FLOW_MODE_WAITEVENT in FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    halt_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Initialize the CCPLEX&lt;br /&gt;
    ccplex_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    bool is_se_ready = false;&lt;br /&gt;
&lt;br /&gt;
    // Wait for SE to be ready&lt;br /&gt;
    while (!is_se_ready)&lt;br /&gt;
        is_se_ready = check_se_status();&lt;br /&gt;
    &lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    u32 mc_iram_aperture_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (mc_iram_aperture_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Clear the entire DMEM region&lt;br /&gt;
        clear_dmem();&lt;br /&gt;
        &lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Ensure FUSE_SKU_INFO is 0x83&lt;br /&gt;
    test_fuse_sku_info();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC key to SE keyslot 0x0C&lt;br /&gt;
    se_set_keyslot_12();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC root key to SE keyslot 0x0D&lt;br /&gt;
    se_set_keyslot_13();&lt;br /&gt;
&lt;br /&gt;
    // Decrypt Package1&lt;br /&gt;
    decrypt_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Parse Package1 header and return entry address&lt;br /&gt;
    u32 entry_addr = parse_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Set the exception vectors&lt;br /&gt;
    set_excp_vec(entry_addr);&lt;br /&gt;
&lt;br /&gt;
    // Fill the top 0x500 bytes in DMEM with a pointer to trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; 0x500; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
    &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    unlock_scp();&lt;br /&gt;
&lt;br /&gt;
    // Clear FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    resume_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Clear the entire DMEM region&lt;br /&gt;
    clear_dmem();&lt;br /&gt;
        &lt;br /&gt;
    // Halt 5 times for no good reason&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[7.0.0+] Many changes were introduced to mitigate and prevent attacks.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
    // Recover the transfer base address from the stack&lt;br /&gt;
    u32 xfer_ext_base_addr = *(u32 *)scratch_data_addr;&lt;br /&gt;
&lt;br /&gt;
    // Return the TLB entry that covers the virtual address&lt;br /&gt;
    u32 tlb_entry = vtlb(xfer_ext_base_addr);&lt;br /&gt;
    &lt;br /&gt;
    // Clear Falcon CPU control&lt;br /&gt;
    *(u32 *)FALCON_CPUCTL = 0;&lt;br /&gt;
    &lt;br /&gt;
    // Halt if the external page is marked as secret&lt;br /&gt;
    if ((tlb_entry &amp;amp; 0x4000000) != 0)&lt;br /&gt;
        exit();&lt;br /&gt;
    &lt;br /&gt;
    // Read data segment size from IO space&lt;br /&gt;
    u32 data_seg_size = *(u32 *)UC_CAPS;&lt;br /&gt;
    data_seg_size &amp;gt;&amp;gt;= 0x01;&lt;br /&gt;
    data_seg_size &amp;amp;= 0xFF00;&lt;br /&gt;
 &lt;br /&gt;
    // Set the stack pointer&lt;br /&gt;
    $sp = data_seg_size;&lt;br /&gt;
    &lt;br /&gt;
    // Fill all DMEM with a pointer to a trap function (just exits 3 times)&lt;br /&gt;
    for (int i = 0; i &amp;lt; data_seg_size; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Initialize the TRNG and generate random data in DMEM&lt;br /&gt;
    init_rnd();&lt;br /&gt;
    &lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    u32 rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Enable and test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x01);&lt;br /&gt;
&lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Issue a randomized delay and return a random value&lt;br /&gt;
    rnd_val = rnd_delay(0xFF);&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
    se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
    // Test randomized offsets for read/write integrity in MC, FUSE, IRAM and TZRAM&lt;br /&gt;
    u32 test_res = test_mc_fuse_iram_tzram();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization by enabling and disabling random CAR devices&lt;br /&gt;
    test_res = test_car();&lt;br /&gt;
    &lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Set FLOW_MODE_WAITEVENT in FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    halt_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Initialize the CCPLEX&lt;br /&gt;
    ccplex_init();&lt;br /&gt;
&lt;br /&gt;
    // Check if SE is ready&lt;br /&gt;
    u32 se_status = check_se_status();&lt;br /&gt;
&lt;br /&gt;
    if (se_status != 0)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Load the TSEC key from SOR1 registers into DMEM&lt;br /&gt;
    sor1_get_key();&lt;br /&gt;
&lt;br /&gt;
    // Initialize CAR registers&lt;br /&gt;
    car_init();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization by enabling and disabling random CAR devices&lt;br /&gt;
    test_res = test_car();&lt;br /&gt;
    &lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Ensure FUSE_SKU_INFO is 0x83&lt;br /&gt;
    test_fuse_sku_info();&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Decrypt Package1&lt;br /&gt;
    decrypt_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC root key to SE keyslot 0x0D&lt;br /&gt;
    se_set_keyslot_13();&lt;br /&gt;
&lt;br /&gt;
    // Write TSEC key to SE keyslot 0x0C&lt;br /&gt;
    se_set_keyslot_12();&lt;br /&gt;
&lt;br /&gt;
    // Clear the cauth signature&lt;br /&gt;
    csigclr();&lt;br /&gt;
&lt;br /&gt;
    // Check certain CAR, PMC and FUSE registers&lt;br /&gt;
    test_car_pmc_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
    &lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test randomized offsets for read/write integrity in MC, FUSE, IRAM and TZRAM&lt;br /&gt;
    test_res = test_mc_fuse_iram_tzram();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Parse Package1 header and return entry address&lt;br /&gt;
    u32 entry_addr = parse_pk11();&lt;br /&gt;
&lt;br /&gt;
    // Set the exception vectors&lt;br /&gt;
    set_excp_vec(entry_addr);&lt;br /&gt;
&lt;br /&gt;
    // Fill the top 0x500 bytes in DMEM with a pointer to trap function (just exits)&lt;br /&gt;
    for (int i = 0; i &amp;lt; 0x500; i += 0x04) {&lt;br /&gt;
        *(u32 *)i = (u32)trap_func();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Clear all crypto registers&lt;br /&gt;
    cxor($c0, $c0);&lt;br /&gt;
    cxor($c1, $c1);&lt;br /&gt;
    cxor($c2, $c2);&lt;br /&gt;
    cxor($c3, $c3);&lt;br /&gt;
    cxor($c4, $c4);&lt;br /&gt;
    cxor($c5, $c5);&lt;br /&gt;
    cxor($c6, $c6);&lt;br /&gt;
    cxor($c7, $c7);&lt;br /&gt;
    &lt;br /&gt;
    // Take SCP out of lockdown&lt;br /&gt;
    unlock_scp();&lt;br /&gt;
&lt;br /&gt;
    // Test memory transfer integrity&lt;br /&gt;
    test_res = test_mem_xfer();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Try to detect virtualization using MC_SMMU_AVPC_ASID and FUSE_ECO_RESERVE_0&lt;br /&gt;
    test_smmu_fuse();&lt;br /&gt;
&lt;br /&gt;
    // Test MC_IRAM_BOM and MC_IRAM_TOM&lt;br /&gt;
    test_res = test_mc_iram_aperture();&lt;br /&gt;
&lt;br /&gt;
    if (test_res != 0xAAAAAAAA)&lt;br /&gt;
    {&lt;br /&gt;
        // Fill SE keyslots 12 and 13 with random data&lt;br /&gt;
        se_set_keyslot_rnd();&lt;br /&gt;
&lt;br /&gt;
        // Clear the entire DMEM region and every crypto register&lt;br /&gt;
        clear_dmem_and_crypto();&lt;br /&gt;
&lt;br /&gt;
        // Halt 5 times for no good reason&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
        exit();&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    // Test SMMU bypassing in the TFBIF&lt;br /&gt;
    tfbif_smmu_cfg(0x00);&lt;br /&gt;
&lt;br /&gt;
    // Clear FLOW_CTLR_HALT_COP_EVENTS_0&lt;br /&gt;
    resume_bpmp();&lt;br /&gt;
&lt;br /&gt;
    // Clear the entire DMEM region and every crypto register&lt;br /&gt;
    clear_dmem_and_crypto();&lt;br /&gt;
        &lt;br /&gt;
    // Halt 5 times for no good reason&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
    exit();&lt;br /&gt;
&lt;br /&gt;
    return;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[8.1.0+] Key derivation algorithm was changed. Very minor changes were introduced to mitigate and prevent attacks.&lt;br /&gt;
&lt;br /&gt;
== Key data ==&lt;br /&gt;
Small buffer stored after the [[#Boot|Boot]] blob and used across all stages.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
!  Offset&lt;br /&gt;
!  Size&lt;br /&gt;
!  Description&lt;br /&gt;
|-&lt;br /&gt;
| 0x00&lt;br /&gt;
| 0x10&lt;br /&gt;
| Debug key (empty)&lt;br /&gt;
|-&lt;br /&gt;
| 0x10&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob0 ([[#Boot|Boot]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x20&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob1 ([[#KeygenLdr|KeygenLdr]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x30&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) auth hash&lt;br /&gt;
|-&lt;br /&gt;
| 0x40&lt;br /&gt;
| 0x10&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) AES IV&lt;br /&gt;
|-&lt;br /&gt;
| 0x50&lt;br /&gt;
| 0x10&lt;br /&gt;
| HOVI EKS seed&lt;br /&gt;
|-&lt;br /&gt;
| 0x60&lt;br /&gt;
| 0x10&lt;br /&gt;
| HOVI COMMON seed&lt;br /&gt;
|-&lt;br /&gt;
| 0x70&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob0 ([[#Boot|Boot]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x74&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob1 ([[#KeygenLdr|KeygenLdr]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x78&lt;br /&gt;
| 0x04&lt;br /&gt;
| blob2 ([[#Keygen|Keygen]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x7C&lt;br /&gt;
| 0x04&lt;br /&gt;
| [6.2.0+] blob3 ([[#SecureBootLdr|SecureBootLdr]]) size&lt;br /&gt;
|-&lt;br /&gt;
| 0x80&lt;br /&gt;
| 0x04&lt;br /&gt;
| [6.2.0+] blob4 ([[#SecureBoot|SecureBoot]]) size&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Vale</name></author>
	</entry>
</feed>