The CTRL register is shown in the following table.
| Field Name | Bits | Type | Reset Value | Description |
|---|---|---|---|---|
| Reserved | 31:7 | ro | 0x0 | Reserved |
| PoisonAxiResp | 6:5 | rw | 0x3 |
Select AXI response to poisoned transactions.
Note: If ExternalSinkEn is enabled, then
the peripheral at the address specified in the POISON register
transmits the response.
|
| ExternalSinkEn | 4 | rw | 0x0 |
0: Transactions poisoned by address terminate in the XMPU_PL 1: Transactions poisoned by address are routed to a sink specified by POISON[PL_SINK_ADDR] |
| PoisonAttributeEn | 3 | rw | 0x1 |
0: Transaction is not poisoned. AxProt[1] remains at original value. 1: Enables Poison by Address. Transaction routed to internal or external sink address. See CTRL[ExternalSinkEn] |
| PoisonAddressEn | 2 | rw | 0x1 |
0: Transaction is not poisoned. Transaction proceeds to original address. 1: Enables Poison by Address. Transaction routed to internal or external sink address. See CTRL[ExternalSinkEn] |
| DefWrAllowed | 0 | rw | 0x1 |
Default Write Allowed. Ensure the following steps are implemented if a write transaction address and master ID miss in the Region List: 0: poison the transaction with a Write Permission Violation 1: transaction allowed, regardless of security level |
| DefRdAllowed | 0 | rw | 0x1 |
Default Read Allowed. If a read transaction address and master ID miss in the Region List, then: 0: poison the transaction with a Read Permission Violation 1: transaction allowed, regardless of security level |