5. Global TrustZone® controller (GTZC)

5.1 GTZC introduction

This section includes the description of the three following sub-blocks:

These sub-blocks are used to configure TrustZone system security in a product having bus agents with programmable-security and privileged attributes (securable) such as:

5.2 GTZC main features

GTZC main features are listed below:

5.2.1 GTZC TrustZone system architecture

The Armv8-M supports security per TrustZone-M model with isolation between:

The TrustZone architecture is extended beyond AHB and Armv8-M with:

AHB and APB peripherals can be categorized as:

AHB securable masters can be configured in the TZSC to be secure/non-secure and/or privilege/non-privilege.

Application information

The TZSC, MPCBB and TZIC sub-blocks can be used in one of the following ways:

The Armv8-M security architecture with secure, securable and TrustZone-aware peripherals is shown in Figure 14.

Figure 14. GTZC in Armv8-M subsystem block diagram

Figure 14. GTZC in Armv8-M subsystem block diagram. This block diagram illustrates the system architecture for Armv8-M, focusing on the Global TrustZone Controller (GTZC). At the top, an Armv8-M MCU and AHB masters are connected to a central AHB bus. The AHB masters connect through a 'Security master wrapper' which provides 'Master sec/priv' signals to the GTZC. The GTZC itself is connected to the AHB bus and contains sub-blocks TZIC, MPC BBx, and TZSC. The TZSC provides 'Periph sec/priv' signals to various components. On the left, an AHB2/APB bridge with a 'Sec/priv gate' connects the AHB bus to an APB bus. The APB bus connects to securable peripherals: UART, SPI, and Timer. On the right, the GTZC connects to MPCBBx and MPCWMx blocks. MPCBBx manages 'Internal SRAM' divided into blocks (Block 1- NS, Block 2 - S, Block 3 - S, Block 4 - NS, ..., Block N-1 - S, Block N - NS). MPCWMx manages 'External memories' divided into NS (Non-Secure) blocks. Other securable peripherals include Crypto (AES) and an AHB-PPC stub. The diagram is labeled MSv48198V2.
Figure 14. GTZC in Armv8-M subsystem block diagram. This block diagram illustrates the system architecture for Armv8-M, focusing on the Global TrustZone Controller (GTZC). At the top, an Armv8-M MCU and AHB masters are connected to a central AHB bus. The AHB masters connect through a 'Security master wrapper' which provides 'Master sec/priv' signals to the GTZC. The GTZC itself is connected to the AHB bus and contains sub-blocks TZIC, MPC BBx, and TZSC. The TZSC provides 'Periph sec/priv' signals to various components. On the left, an AHB2/APB bridge with a 'Sec/priv gate' connects the AHB bus to an APB bus. The APB bus connects to securable peripherals: UART, SPI, and Timer. On the right, the GTZC connects to MPCBBx and MPCWMx blocks. MPCBBx manages 'Internal SRAM' divided into blocks (Block 1- NS, Block 2 - S, Block 3 - S, Block 4 - NS, ..., Block N-1 - S, Block N - NS). MPCWMx manages 'External memories' divided into NS (Non-Secure) blocks. Other securable peripherals include Crypto (AES) and an AHB-PPC stub. The diagram is labeled MSv48198V2.

5.3 GTZC functional description

5.3.1 GTZC block diagram

Figure 15 describes the combined feature of TZSC, MPCBB and TZIC. Each sub-block is controlled by its own AHB configuration port. The TZSC defines which peripheral is secured and/or privileged.

The privilege configuration bit of a given peripheral can be modified by a secure-privilege transaction when the peripheral has been configured as secure, otherwise a privileged transaction (non-secure) is sufficient. The definition of these privilege attributes is possible even when TZEN = 0.

The secure configuration bit a given peripheral can be modified only with a secure-privilege transaction if the peripheral has been configured as privilege, otherwise a secure transaction (non-privileged) is sufficient.

Figure 15. GTZC block diagram

Figure 15. GTZC block diagram. The diagram shows the Global TrustZone controller (GTZC) block containing three sub-modules: TZSC, MPCBB, and TZIC. The TZSC module has registers SECCFGR, PRIVCFGR, and MPCWMR, and outputs Sec/NSec and Priv/NPriv signals. The MPCBB module has registers MPCBB_VCTR and MPCBB_LCKVTR, and outputs the MPCBBVCT signal to an internal block-based memory controller. The TZIC module has registers IER, SR, and FCR, and outputs the GTZC_IRQn signal to the NVIC. All three modules are connected to an AHB bus. The TZSC module also receives a TZEN signal from option bytes. The TZIC module receives N x ILA_event signals from peripherals. Dashed lines indicate ILA events: TZSC_ILA_event from TZSC to MPCBB, MPCBB_ILA_event from MPCBB to TZIC, and TZIC_ILA_event from TZIC to the peripherals.
Figure 15. GTZC block diagram. The diagram shows the Global TrustZone controller (GTZC) block containing three sub-modules: TZSC, MPCBB, and TZIC. The TZSC module has registers SECCFGR, PRIVCFGR, and MPCWMR, and outputs Sec/NSec and Priv/NPriv signals. The MPCBB module has registers MPCBB_VCTR and MPCBB_LCKVTR, and outputs the MPCBBVCT signal to an internal block-based memory controller. The TZIC module has registers IER, SR, and FCR, and outputs the GTZC_IRQn signal to the NVIC. All three modules are connected to an AHB bus. The TZSC module also receives a TZEN signal from option bytes. The TZIC module receives N x ILA_event signals from peripherals. Dashed lines indicate ILA events: TZSC_ILA_event from TZSC to MPCBB, MPCBB_ILA_event from MPCBB to TZIC, and TZIC_ILA_event from TZIC to the peripherals.

MSV48199V2

5.3.2 Illegal access definition

Three different types of illegal access exist:

Any non-secure transaction trying to write a secure resource is considered as illegal and thus the addressed resource generates an illegal access event for illegal write access, and a bus error for illegal fetch access. However some exceptions exist on transactions to secure and privilege configuration registers; these later ones authorized non-secure read access to secure registers (see GTZC_TZSC_SECCFGRx and GTZC_TZSC_PRIVCFGRx registers).

Any secure transaction trying to access a non-secure block in internal block-based SRAM or watermarked external memory, is considered as illegal.

Correct settings of the TZIC allows the capture of the associated event and then generates the GTZC_IRQn interrupt to the NVIC. This applies for read, write and execute access.

Concerning the MPCBB controller, there is an option to ignore secure data read/write access on non-secure SRAM blocks, by setting the SRWILADIS configuration bit in the GTZC_MPCBBx_CR register. Secure read and write data transactions are then allowed on non-secure SRAM blocks, while secure execution access remains not allowed.

Any secure execute transaction trying to access a non-secure peripheral register or memory is considered as illegal and generates a bus error.

Any non-privilege transaction trying to access a privilege resource is considered as illegal. There is no illegal access event generated for this type of illegal access. The addressed resource follows a silent-fail behavior, returning all zero data for read and ignoring any write. No bus error is generated.

5.3.3 TrustZone security controller (TZSC)

This block is composed of a configurable set of registers, providing the following features:

Note: x represents the target external memory interface (such as FMC or OCTOSPI). The total area considered as non-secure is the sum of the two independent ones. An overlap of one section over the other one has no specific effect.

Table 24 describes the characteristics of the available MPCWMx.

Table 24. MPCWMx

MPCTypeNumber of regionsTarget memory interface
MPCWM1Non secure watermark (region)2OCTOSPI
MPCWM2Non secure watermark (region)2FMC_NOR bank
MPCWM3Non secure watermark (region)1FMC_NAND bank

5.3.4 Memory protection controller - block based (MPCBB)

For block-based memory protection controller (internal SRAM), the below registers are available:

Note: y represents the number of super-blocks (super-block = 32 blocks of SRAM_BB_size). On the STM32L552xx and STM32L562xx devices, the SRAM size = 192 Kbytes and the block size = 256 bytes, then super-block size = 32 * 256 = 8 Kbytes and y = 192 / 8 = 24. It means 24 vector registers (32-bit) are needed to control the secure state of all the 256-byte blocks. Concerning the lock bit, only one 32-bit lock register is needed since a single lock bit applies on a super-block (32 * 256 bytes).

Table 25 describes the characteristics of the available MPCBBx.

Table 25. MPCBBx

MPCTypeNumber of blocksTarget memory interface
MPCBB1Block based (block size = 256 bytes)768SRAM1
MPCBB2Block based (block size = 256 bytes)256SRAM2

5.3.5 TrustZone illegal access controller (TZIC)

This block concentrates all illegal access source events. It is used only when the system is TrustZone enabled (TZEN = 1).

TZIC allows the trace of which event triggered the NVIC GTZC_IRQn. Register masks (GTZC_TZIC_IERx) are available to filter unwanted event. On unmasked illegal event, the TZIC generates the GTZC_IRQn signal to NVIC that corresponds to the GTZC_IRQn secure interrupt.

For each illegal event source, a status flag and a clear bit exist (respectively within GTZC_TZIC_SRx and GTZC_TZIC_FCRx registers). The reset value of mask registers (GTZC_TZIC_IERx) is such that all events are masked.

5.3.6 Power-on/reset state

The power-on and reset state of the TZSC clear all bits of GTZC_TZSC_SECCFGRx and GTZC_TZSC_PRIVCFGRx registers to 0, which respectively means non-secure and non-privilege. Concerning the internal SRAM, the reset values of the GTZC_MPCBBx_VCTRY registers are set to 0xFFFF FFFF, making all blocks of the block-based SRAM memory secure. This is valid only when TrustZone security is enabled at system level (TZEN = 1). In the other case (legacy mode, TZEN = 0), the reset values of the GTZC_MPCBBx_VCTRY registers are set to 0x0000 0000 so that all block-based SRAM memories are non-secure.

Same thing applies for external memories, all MPCWMx_NSWMyR registers must be set to 0xFFFF FFFF, making the whole external memory non-secure. Secure Boot code can then program the security settings, making components secure or not as needed.

5.3.7 DMA requests

TZSC does not support any DMA interface.

5.4 GTZC events

MPCBB and TZIC are secure peripherals, thus they both systematically generate an illegal access event when accessed by a non-secure access. The TZSC is a TrustZone-aware peripheral, meaning that secure and non-secure registers co-exist within the peripheral. An

exception exists for the GTZC_TZSC_SECCFGR and GTZC_TZSC_PRIVCGFR: any read access, secure or not, are supported.

5.5 GTZC_TZSC registers

All registers are accessed only by words (32-bit).

5.5.1 GTZC_TZSC control register (GTZC_TZSC_CR)

Address offset: 0x000

Reset value: 0x0000 0000

Write-secure access only.

Read accesses are authorized for any type of transactions, secure or not, privilege or not.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.LCK
rw

Bits 31:1 Reserved, must be kept at reset value.

Bit 0 LCK : lock the configuration of TZSC items until next reset

This bit is unset by default and once set, it can not be reset until global TZSC reset.

0: control register not locked

1: control register locked

5.5.2 GTZC_TZSC secure configuration register 1 (GTZC_TZSC_SECCFGR1)

Address offset: 0x010

Reset value: 0x0000 0000

Write-secure access only.

This register can be written only by privilege secure transaction when corresponding TZSC_PRIVCFGR register signal is set to 1. If a given PRIV bit is not set, the equivalent SEC bit can be written by non- privilege secure transaction.

Read accesses are authorized for any type of transactions, secure or not, privilege or not.

31302928272625242322212019181716
SPI1SECTIM1SECCOMPSECVREFBUFSECUCPD1SECUSBFSSECFDCAN1SECLPTIM3SECLPTIM2SECI2C4SECLPUART1SECLPTIM1SECOPAMPSECDAC1SECCRSSECI2C3SEC
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
I2C2SECI2C1SECUART5SECUART4SECUSART3SECUSART2SECSPI3SECSPI2SECIWDGSECWWDGSECTIM7SECTIM6SECTIM5SECTIM4SECTIM3SECTIM2SEC
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bit 31 SPI1SEC : secure access mode for SPI1

0: non-secure

1: secure

Bit 30 TIM1SEC : secure access mode for TIM1

0: non-secure

1: secure

Bit 29 COMPSEC : secure access mode for COMP

0: non-secure

1: secure

Bit 28 VREFBUFSEC : secure access mode for VREFBUF

0: non-secure

1: secure

Bit 27 UCPD1SEC : secure access mode for UCPD1

0: non-secure

1: secure

Bit 26 USBFSSEC : secure access mode for USB FS

0: non-secure

1: secure

Bit 25 FDCAN1SEC : secure access mode for FDCAN1

0: non-secure

1: secure

  1. Bit 24 LPTIM3SEC : secure access mode for LPTIM3
    0: non-secure
    1: secure
  2. Bit 23 LPTIM2SEC : secure access mode for LPTIM2
    0: non-secure
    1: secure
  3. Bit 22 I2C4SEC : secure access mode for I2C4
    0: non-secure
    1: secure
  4. Bit 21 LPUART1SEC : secure access mode for LPUART1
    0: non-secure
    1: secure
  5. Bit 20 LPTIM1SEC : secure access mode for LPTIM1
    0: non-secure
    1: secure
  6. Bit 19 OPAMPSEC : secure access mode for OPAMP
    0: non-secure
    1: secure
  7. Bit 18 DAC1SEC : secure access mode for DAC1
    0: non-secure
    1: secure
  8. Bit 17 CRSSEC : secure access mode for CRS
    0: non-secure
    1: secure
  9. Bit 16 I2C3SEC : secure access mode for I2C3
    0: non-secure
    1: secure
  10. Bit 15 I2C2SEC : secure access mode for I2C2
    0: non-secure
    1: secure
  11. Bit 14 I2C1SEC : secure access mode for I2C1
    0: non-secure
    1: secure
  12. Bit 13 UART5SEC : secure access mode for UART5
    0: non-secure
    1: secure
  13. Bit 12 UART4SEC : secure access mode for UART4
    0: non-secure
    1: secure
  14. Bit 11 USART3SEC : secure access mode for USART3
    0: non-secure
    1: secure
  15. Bit 10 USART2SEC : secure access mode for USART2
    0: non-secure
    1: secure
  1. Bit 9 SPI3SEC : secure access mode for SPI3
    0: non-secure
    1: secure
  2. Bit 8 SPI2SEC : secure access mode for SPI2
    0: non-secure
    1: secure
  3. Bit 7 IWDGSEC : secure access mode for IWDG
    0: non-secure
    1: secure
  4. Bit 6 WWDGSEC : secure access mode for WWDG
    0: non-secure
    1: secure
  5. Bit 5 TIM7SEC : secure access mode for TIM7
    0: non-secure
    1: secure
  6. Bit 4 TIM6SEC : secure access mode for TIM6
    0: non-secure
    1: secure
  7. Bit 3 TIM5SEC : secure access mode for TIM5
    0: non-secure
    1: secure
  8. Bit 2 TIM4SEC : secure access mode for TIM4
    0: non-secure
    1: secure
  9. Bit 1 TIM3SEC : secure access mode for TIM3
    0: non-secure
    1: secure
  10. Bit 0 TIM2SEC : secure access mode for TIM2
    0: non-secure
    1: secure

5.5.3 GTZC_TZSC secure configuration register 2 (GTZC_TZSC_SECCFGR2)

Address offset: 0x014

Reset value: 0x0000 0000

Write-secure access only.

This register can be written only by privilege secure transaction when corresponding TZSC_PRIVCFGR register signal is set to 1. If a given PRIV is not set, the equivalent SEC bit can be written by non- privilege secure transaction.

Read accesses are authorized for any type of transactions, secure or not, privilege or not.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.OCTOSPI1_REGSECFMC_REGSECSDMMC1SEC
rwrwrw
1514131211109876543210
PKASECRNGSECHASHSECAESSECADCSECICACHE_REGSECTSCSECCRCSECDFSDM1SECSAI2SECSAI1SECTIM17SECTIM16SECTIM15SECUSART1SECTIM8SEC
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bits 31:19 Reserved, must be kept at reset value.

Bit 18 OCTOSPI1_REGSEC : secure access mode for OCTOSPI1 registers

0: non-secure

1: secure

Bit 17 FMC_REGSEC : secure access mode for FMC registers

0: non-secure

1: secure

Bit 16 SDMMC1SEC : secure access mode for SDMMC1

0: non-secure

1: secure

Bit 15 PKASEC : secure access mode for PKA

0: non-secure

1: secure

Bit 14 RNGSEC : secure access mode for RNG

0: non-secure

1: secure

Bit 13 HASHSEC : secure access mode for HASH

0: non-secure

1: secure

  1. Bit 12 AESSEC : secure access mode for AES
    0: non-secure
    1: secure
  2. Bit 11 ADCSEC : secure access mode for ADC
    0: non-secure
    1: secure
  3. Bit 10 ICACHE_REGSEC : secure access mode for ICACHE registers
    0: non-secure
    1: secure
  4. Bit 9 TSCSEC : secure access mode for TSC
    0: non-secure
    1: secure
  5. Bit 8 CRCSEC : secure access mode for CRC
    0: non-secure
    1: secure
  6. Bit 7 DFSDM1SEC : secure access mode for DFSDM1
    0: non-secure
    1: secure
  7. Bit 6 SAI2SEC : secure access mode for SAI2
    0: non-secure
    1: secure
  8. Bit 5 SAI1SEC : secure access mode for SAI1
    0: non-secure
    1: secure
  9. Bit 4 TIM17SEC : secure access mode for TIM17
    0: non-secure
    1: secure
  10. Bit 3 TIM16SEC : secure access mode for TIM16
    0: non-secure
    1: secure
  11. Bit 2 TIM15SEC : secure access mode for TIM15
    0: non-secure
    1: secure
  12. Bit 1 USART1SEC : secure access mode for USART1
    0: non-secure
    1: secure
  13. Bit 0 TIM8SEC : secure access mode for TIM8
    0: non-secure
    1: secure

5.5.4 GTZC_TZSC privilege configuration register 1 (GTZC_TZSC_PRIVCFGR1)

Address offset: 0x020

Reset value: 0x0000 0000

Write-privileged access only.

This register can be read or written only by secure privilege transaction when corresponding TZSC_SECCFGR register signal is set to 1. If a given SEC bit is not set, the equivalent PRIV bit can be read/written by non-secure privileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privilege or not.

31302928272625242322212019181716
SPI1PRIVTIM1PRIVCOMPPRIVVREFBUFPRIVUCPD1PRIVUSBFSPRIVFDCAN1PRIVLPTIM3PRIVLPTIM2PRIVI2C4PRIVLPUART1PRIVLPTIM1PRIVOPAMPPRIVDAC1PRIVCRSPRIVI2C3PRIV
r/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/w
1514131211109876543210
I2C2PRIVI2C1PRIVUART5PRIVUART4PRIVUSART3PRIVUSART2PRIVSPI3PRIVSPI2PRIVIWDGPRIVWWDGPRIVTIM7PRIVTIM6PRIVTIM5PRIVTIM4PRIVTIM3PRIVTIM2PRIV
r/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/w

Bit 31 SPI1PRIV : privilege access mode for SPI1

0: non-privilege

1: privilege

Bit 30 TIM1PRIV : privilege access mode for TIM1

0: non-privilege

1: privilege

Bit 29 COMPPRIV : privilege access mode for COMP

0: non-privilege

1: privilege

Bit 28 VREFBUFPRIV : privilege access mode for VREFBUF

0: non-privilege

1: privilege

Bit 27 UCPD1PRIV : privilege access mode for UCPD1

0: non-privilege

1: privilege

Bit 26 USBFSPRIV : privilege access mode for USB FS

0: non-privilege

1: privilege

Bit 25 FDCAN1PRIV : privilege access mode for FDCAN1

0: non-privilege

1: privilege

  1. Bit 24 LPTIM3PRIV : privilege access mode for LPTIM3
    0: non-privilege
    1: privilege
  2. Bit 23 LPTIM2PRIV : privilege access mode for LPTIM2
    0: non-privilege
    1: privilege
  3. Bit 22 I2C4PRIV : privilege access mode for I2C4
    0: non-privilege
    1: privilege
  4. Bit 21 LPUART1PRIV : privilege access mode for LPUART1
    0: non-privilege
    1: privilege
  5. Bit 20 LPTIM1PRIV : privilege access mode for LPTIM1
    0: non-privilege
    1: privilege
  6. Bit 19 OPAMPPRIV : privilege access mode for OPAMP
    0: non-privilege
    1: privilege
  7. Bit 18 DAC1PRIV : privilege access mode for DAC1
    0: non-privilege
    1: privilege
  8. Bit 17 CRSPRIV : privilege access mode for CRS
    0: non-privilege
    1: privilege
  9. Bit 16 I2C3PRIV : privilege access mode for I2C3
    0: non-privilege
    1: privilege
  10. Bit 15 I2C2PRIV : privilege access mode for I2C2
    0: non-privilege
    1: privilege
  11. Bit 14 I2C1PRIV : privilege access mode for I2C1
    0: non-privilege
    1: privilege
  12. Bit 13 UART5PRIV : privilege access mode for UART5
    0: non-privilege
    1: privilege
  13. Bit 12 UART4PRIV : privilege access mode for UART4
    0: non-privilege
    1: privilege
  14. Bit 11 USART3PRIV : privilege access mode for USART3
    0: non-privilege
    1: privilege
  15. Bit 10 USART2PRIV : privilege access mode for USART2
    0: non-privilege
    1: privilege
  1. Bit 9 SPI3PRIV : privilege access mode for SPI3
    0: non-privilege
    1: privilege
  2. Bit 8 SPI2PRIV : privilege access mode for SPI2
    0: non-privilege
    1: privilege
  3. Bit 7 IWDGPRIV : privilege access mode for IWDG
    0: non-privilege
    1: privilege
  4. Bit 6 WWDGPRIV : privilege access mode for WWDG
    0: non-privilege
    1: privilege
  5. Bit 5 TIM7PRIV : privilege access mode for TIM7
    0: non-privilege
    1: privilege
  6. Bit 4 TIM6PRIV : privilege access mode for TIM6
    0: non-privilege
    1: privilege
  7. Bit 3 TIM5PRIV : privilege access mode for TIM5
    0: non-privilege
    1: privilege
  8. Bit 2 TIM4PRIV : privilege access mode for TIM4
    0: non-privilege
    1: privilege
  9. Bit 1 TIM3PRIV : privilege access mode for TIM3
    0: non-privilege
    1: privilege
  10. Bit 0 TIM2PRIV : privilege access mode for TIM2
    0: non-privilege
    1: privilege

5.5.5 GTZC_TZSC privilege configuration register 2 (GTZC_TZSC_PRIVCFGR2)

Address offset: 0x024

Reset value: 0x0000 0000

Write-privileged access only.

This register can be read or written only by secure privilege transaction when corresponding TZSC_SECCFGR register signal is set to 1. If a given SEC bit is not set, the equivalent PRIV bit can be read/written by non-secure privileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privilege or not.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.OCTOSPI1_REGPRIVFMC_REGPRIVSDMMC1PRIV
rwrwrw
1514131211109876543210
PKAPRIVRNGPRIVHASHPRIVAESPRIVADCPRIVICACHE_REGPRIVTSCPRIVCRCPRIVDFSDM1PRIVSAI2PRIVSAI1PRIVTIM17PRIVTIM16PRIVTIM15PRIVUSART1PRIVTIM8PRIV
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bits 31:19 Reserved, must be kept at reset value.

Bit 18 OCTOSPI1_REGPRIV : privilege access mode for OCTOSPI1 registers

0: non-privilege

1: privilege

Bit 17 FMC_REGPRIV : privilege access mode for FMC registers

0: non-privilege

1: privilege

Bit 16 SDMMC1PRIV : privilege access mode for SDMMC1

0: non-privilege

1: privilege

Bit 15 PKAPRIV : privilege access mode for PKA

0: non-privilege

1: privilege

Bit 14 RNGPRIV : privilege access mode for RNG

0: non-privilege

1: privilege

Bit 13 HASHPRIV : privilege access mode for HASH

0: non-privilege

1: privilege

  1. Bit 12 AESPRIV : privilege access mode for AES
    0: non-privilege
    1: privilege
  2. Bit 11 ADCPRIV : privilege access mode for ADC
    0: non-privilege
    1: privilege
  3. Bit 10 ICACHE_REGPRIV : privilege access mode for ICACHE registers
    0: non-privilege
    1: privilege
  4. Bit 9 TSCPRIV : privilege access mode for TSC
    0: non-privilege
    1: privilege
  5. Bit 8 CRCPRI : privilege access mode for CRC
    0: non-privilege
    1: privilege
  6. Bit 7 DFSDM1PRIV : privilege access mode for DFSDM1
    0: non-privilege
    1: privilege
  7. Bit 6 SAI2PRIV : privilege access mode for SAI2
    0: non-privilege
    1: privilege
  8. Bit 5 SAI1PRIV : privilege access mode for SAI1
    0: non-privilege
    1: privilege
  9. Bit 4 TIM17PRIV : privilege access mode for TIM17
    0: non-privilege
    1: privilege
  10. Bit 3 TIM16PRIV : privilege access mode for TIM16
    0: non-privilege
    1: privilege
  11. Bit 2 TIM15PRIV : privilege access mode for TIM15
    0: non-privilege
    1: privilege
  12. Bit 1 USART1PRIV : privilege access mode for USART1
    0: non-privilege
    1: privilege
  13. Bit 0 TIM8PRIV : privilege access mode for TIM8
    0: non-privilege
    1: privilege

5.5.6 GTZC_TZSC external memory x non-secure watermark register 1 (GTZC_TZSC_MPCWMxANSR)

Address offset: 0x030 + 0x008 * (x-1), (x = 1 to 3)

Reset value: 0x0000 0000

The given reset value is valid when TZEN = 1. The reset value is 0x0800 0000 when TZEN = 0.

Secure access only.

Caution: When NSWM1STRT + NSWM1LGTH is higher than the maximum size allowed for the memory, a saturation of NSWM1LGTH is applied automatically.

31302928272625242322212019181716
Res.Res.Res.Res.NSWM1LGTH[11:0]
rwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
Res.Res.Res.Res.Res.NSWM1STRT[10:0]
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:28 Reserved, must be kept at reset value.

Bits 27:16 NSWM1LGTH[11:0] : length of the first non-secure area (multiple of 128 Kbytes)

Note: If programmed NSWM1LGTH + NSWM1STRT is over 2048, the value stored in the register is truncated to (0x800 - NSWM1STRT). Any subsequent read returns this value.

Bits 15:11 Reserved, must be kept at reset value.

Bits 10:0 NSWM1STRT[10:0] : offset address for the first non-secure area (multiple of 128 Kbytes)

Note: External memories which are watermark controlled start fully non-secure at reset when TZEN = 0. When TZEN = 1, external memories start fully secure (inverted reset-value).

5.5.7 GTZC_TZSC external memory x non-secure watermark register 2 (GTZC_TZSC_MPCWMxBNSR)

Address offset: 0x034 + 0x008 * (x-1), (x = 1 to 2)

Reset value: 0x0000 0000

The given reset value is valid when TZEN = 1. The reset value is 0x0800 0000 when TZEN = 0.

Secure access only.

Caution: When NSWM1STRT + NSWM1LGTH is higher than the maximum size allowed for the memory, a saturation of NSWM1LGTH is applied automatically.

Note: If NSWM1LGTH = 0, the region 1 is disabled and the only non-secure memory space is defined by NSWMPxWM2.

If both NSWMPxWM1 and NSWMPxWM2 have the reset value 0x0000 0000, all the memory space of the external memory x (FMC NOR/SRAM or OCTOSPI) is secure.

If NSWM1LGTH = 0x800 and NSWM1STRT = 0, the whole 256-Mbyte memory space is non-secure (independent of NSWMPxWM2 value).

If NSWM1LGTH = 0x001 and NSWM1STRT = 0x7FF, only one 128-Kbyte block is defined as non-secure (at address offset = 0x0FFE 0000, ending at 0x0FFF FFFF).

31302928272625242322212019181716
Res.Res.Res.Res.NSWM2LGTH[11:0]
rwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
Res.Res.Res.Res.Res.NSWM2STRT[10:0]
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:28 Reserved, must be kept at reset value.

Bits 27:16 NSWM2LGTH[11:0] : length of the second non-secure area (multiple of 128 Kbytes)

Note: If programmed NSWM2LGTH + NSWM2STRT is over 2048, the value stored in the register is truncated to (0x800 - NSWM2STRT). Any subsequent read returns this value.

Bits 15:11 Reserved, must be kept at reset value.

Bits 10:0 NSWM2STRT[10:0] : offset address for the second non-secure area (multiple of 128 Kbytes)

Note: External memories which are watermark controlled start fully non-secure at reset when TZEN = 0. When TZEN = 1, external memories start fully secure (inverted reset-value).

5.5.8 GTZC_TZSC register map and reset values

Table 26. GTZC_TZSC register map and reset values

OffsetRegister313029282726252423222120191817161514131211109876543210
0x000GTZC_TZSC_CRRes.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.ILCK
Reset value0
0x004 to 0x00CReservedReserved
0x010GTZC_TZSC_SECCFG1SP11SECTIM11SECCOMPSECVREFBUFSECUOPD1SECUSBFSSSECFDCAN1SECLPTIM3SECLPTIM2SECI2C4SECLPUART1SECLPTIM1SECOPAMPSECDAC1SECCRSSECI2C3SECI2C2SECI2C1SECUART5SECUART4SECUSART3SECUSART2SECSPI3SECSPI2SECIWDGSECWWDGSECTIM7SECTIM6SECTIM5SECTIM4SECTIM3SECTIM2SEC
Reset value0000000000000000000000000000000
0x014GTZC_TZSC_SECCFG2Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.OCTOSPI1_REGSECFMC_REGSECSDMMC1SECPKASECRNGSECHASHSECAESSECADCSECICACHE_REGSECTSCSECCRCSECDFSDM1SECSAI2SECSAI1SECTIM17SECTIM16SECTIM15SECUSART1SECTIM8SEC
Reset value000000000000000000
0x018 to 0x01CReservedReserved

Table 26. GTZC_TZSC register map and reset values (continued)

OffsetRegister313029282726252423222120191817161514131211109876543210
0x020GTZC_TZSC
_PRIVCFG1
SPI1PRIVTIM1PRIVCOMP1PRIVVREFBUFP1PRIVUCPD1PRIVUSBFSPIPRIVFDCAN1PRIVLPTIM3PRIVLPTIM2PRIVI2C4PRIVLPUART1PRIVLPTIM1PRIVOPAMP1PRIVDAC1PRIVCRS1PRIVI2C3PRIVI2C2PRIVI2C1PRIVUART5PRIVUART4PRIVUSART3PRIVUSART2PRIVSPI3PRIVSPI2PRIVIWDGPRIVWWDGPRIVTIM7PRIVTIM6PRIVTIM5PRIVTIM4PRIVTIM3PRIVTIM2PRIV
Reset value00000000000000000000000000000000
0x024GTZC_TZSC
_PRIVCFG2
ResResResResResResResResResResResResResResOCTOSP1_REGPRIVFMC_REGPRIVSDMMC1PRIVPKAPRIVRNGPRIVHASHPRIVAESPRIVADCP1PRIVICACHE_REGPRIVTSCPRIVCRCP1PRIVDFSDM1PRIVSAI2PRIVSAI1PRIVTIM17PRIVTIM16PRIVTIM15PRIVUSART1PRIV
Reset value00000000000000000
0x028 to
0x02C
ReservedReserved
0x030GTZC_TZSC
_MPCWM1ANSR
ResResResResNSWM1LGTH[11:0]ResResResResResNSWM1STR[10:0]
Reset value00000000000000000000000
0x034GTZC_TZSC
_MPCWM1BNSR
ResResResResNSWM2LGTH[11:0]ResResResResResNSWM2STR[10:0]
Reset value00000000000000000000000
0x038GTZC_TZSC
_MPCWM2ANSR
ResResResResNSWM1LGTH[11:0]ResResResResResNSWM1STR[10:0]
Reset value00000000000000000000000
0x03CGTZC_TZSC
_MPCWM2BNSR
ResResResResNSWM2LGTH[11:0]ResResResResResNSWM2STR[10:0]
Reset value00000000000000000000000
0x040GTZC_TZSC
_MPCWM3ANSR
ResResResResNSWM1LGTH[11:0]ResResResResResNSWM1STR[10:0]
Reset value00000000000000000000000
Refer to Section 2.3 on page 86 for the register boundary addresses.

5.6 GTZC_MPCBB registers

All registers are accessed only by words (32-bit).

5.6.1 GTZC_MPCBBx control register (GTZC_MPCBBx_CR) (x = 1 to 2)

Address offset: 0x800 + 0x400 * (x - 1)

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
SRWILADISINVSECSTATERes.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
rwrw
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.LCK
rw

Bit 31 SRWILADIS: secure read/write illegal access disable

This bit disables the detection of an illegal access when a secure read/write transaction access a non-secure blocks of the block-based SRAM (secure fetch on non-secure block is always considered illegal).

0: enabled, secure read/write access not allowed on non-secure SRAM block

1: disabled, secure read/write access allowed on non-secure SRAM block

Bit 30 INVSECSTATE: default security state

This bit is used to invert the MPCBB status information (secure or non-secure) connected to the RCC, in order to define the MPCBB clock control as secure or not.

0: default state (source clock secured if a secure area exists in the MPCBB and vice-versa)

1: invert the state, source clock remains secure even if no secure block is set in the MPCBB

Bits 29:1 Reserved, must be kept at reset value.

Bit 0 LCK: lock the control register of the MPCBB sub-block until next reset

This bit is unset by default and once set, it can not be reset until global TZSC reset.

0: control register not locked

1: control register locked

5.6.2 GTZC_MPCBB1 lock register 1(GTZC_MPCBB1_LCKVTR1)

Address offset: 0x810

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.LCKSB23LCKSB22LCKSB21LCKSB20LCKSB19LCKSB18LCKSB17LCKSB16
1514131211109876543210
LCKSB15LCKSB14LCKSB13LCKSB12LCKSB11LCKSB10LCKSB9LCKSB8LCKSB7LCKSB6LCKSB5LCKSB4LCKSB3LCKSB2LCKSB1LCKSB0
rworworworworworworworworworworworworworworworwo

Bits 31:24 Reserved, must be kept at reset value.

Bits 23:0 LCKSB[23:0] : lock/unlock status of secure access mode for the super-blocks 0 to 23

0x0000 0000: security configuration unlocked for all super-blocks

....

0x0000 00FF: security configuration locked only for super-blocks 0 to 7

....

0x0080 0001: security configuration locked for super-blocks 0 and 23

5.6.3 GTZC_MPCBB2 lock register 1 (GTZC_MPCBB2_LCKVTR1)

Address offset: 0xC10

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.LCKSB7LCKSB6LCKSB5LCKSB4LCKSB3LCKSB2LCKSB1LCKSB0
rworworworworworworworwo

Bits 31:8 Reserved, must be kept at reset value.

Bits 7:0 LCKSB[7:0] : lock/unlock status of secure access mode for the super-blocks 0 to 7

0x00: security configuration unlocked for all super-blocks

....

0xFF: security configuration locked for super-blocks 0 to 7

5.6.4 GTZC_MPCBBx vector register y
(GTZC_MPCBBx_VCTRY) (x = 1 to 2)

Address offset: 0x900 + 0x04 * y, (y = 0 to 23)

Reset value: 0xFFFF FFFF

The given reset value is valid when TZEN = 1. The reset value is 0x0000 0000 when TZEN = 0.

Secure access only.

31302928272625242322212019181716
B(31 + 32 * y)B(30 + 32 * y)B(29 + 32 * y)B(28 + 32 * y)B(27 + 32 * y)B(26 + 32 * y)B(25 + 32 * y)B(24 + 32 * y)B(23 + 32 * y)B(22 + 32 * y)B(21 + 32 * y)B(20 + 32 * y)B(19 + 32 * y)B(18 + 32 * y)B(17 + 32 * y)B(16 + 32 * y)
RWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRW
1514131211109876543210
B(15 + 32 * y)B(14 + 32 * y)B(13 + 32 * y)B(12 + 32 * y)B(11 + 32 * y)B(10 + 32 * y)B(9 + 32 * y)B(8 + 32 * y)B(7 + 32 * y)B(6 + 32 * y)B(5 + 32 * y)B(4 + 32 * y)B(3 + 32 * y)B(2 + 32 * y)B(1 + 32 * y)B(32 * y)
RWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRW

Bits 31:0 B[31+ 32 * y:32 * y] : define secure access mode for the super-block y

0x0000 0000: all blocks of super-block y are non-secure.

...

0x0000 00FF: only blocks 0 to 7 of super-block y are secure.

...

0x8000 0001: only blocks 0 and 31 of super-block y are secure.

...

0xFFFF FFFF: all super-blocks are secure.

5.6.5 GTZC_MPCBB1 register map and reset values

Table 27. GTZC_MPCBB1 register map and reset values

OffsetRegister313029282726252423222120191817161514131211109876543210
0x800GTZC_MPCBB1
_CR
SRWILADISINVSECSTATERes.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.LCK
Reset value000
0x804 to
0x80C
ReservedReserved
0x810GTZC_MPCBB1
_LCKVTR1
Res.Res.Res.Res.Res.Res.Res.Res.00000000000000000000000
Reset value0
0x814 to
0x8FC
ReservedReserved
0x900 +
0x004 *y
(y = 0 to
23)
GTZC_MPCBB1
_VCTRY
B(31 + 32 * y)B(30 + 32 * y)B(29 + 32 * y)B(28 + 32 * y)B(27 + 32 * y)B(26 + 32 * y)B(25 + 32 * y)B(24 + 32 * y)B(23 + 32 * y)B(22 + 32 * y)B(21 + 32 * y)B(20 + 32 * y)B(19 + 32 * y)B(18 + 32 * y)B(17 + 32 * y)B(16 + 32 * y)B(15 + 32 * y)B(14 + 32 * y)B(13 + 32 * y)B(12 + 32 * y)B(11 + 32 * y)B(10 + 32 * y)B(9 + 32 * y)B(8 + 32 * y)B(7 + 32 * y)B(6 + 32 * y)B(5 + 32 * y)B(4 + 32 * y)B(3 + 32 * y)B(2 + 32 * y)B(1 + 32 * y)
Reset value1111111111111111111111111111111

Refer to Section 2.3 on page 86 for the register boundary addresses.

5.6.6 GTZC_MPCBB2 register map and reset values

Table 28. GTZC_MPCBB2 register map and reset values

OffsetRegister313029282726252423222120191817161514131211109876543210
0xC00GTZC_MPCBB2
_CR
SRWILADISINVSECSTATERes.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.LCK
Reset value000
0xC04 to
0xC0C
ReservedReserved
0xC10GTZC_MPCBB2
_LCKVTR1
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.0000000
Reset value0
0xC14 to
0xCFC
ReservedReserved
0xD00 +
0x004 *y
(y = 0 to
7)
GTZC_MPCBB2
_VCTRY
B(31 + 32 * y)B(30 + 32 * y)B(29 + 32 * y)B(28 + 32 * y)B(27 + 32 * y)B(26 + 32 * y)B(25 + 32 * y)B(24 + 32 * y)B(23 + 32 * y)B(22 + 32 * y)B(21 + 32 * y)B(20 + 32 * y)B(19 + 32 * y)B(18 + 32 * y)B(17 + 32 * y)B(16 + 32 * y)B(15 + 32 * y)B(14 + 32 * y)B(13 + 32 * y)B(12 + 32 * y)B(11 + 32 * y)B(10 + 32 * y)B(9 + 32 * y)B(8 + 32 * y)B(7 + 32 * y)B(6 + 32 * y)B(5 + 32 * y)B(4 + 32 * y)B(3 + 32 * y)B(2 + 32 * y)B(1 + 32 * y)
Reset value1111111111111111111111111111111

Refer to Section 2.3 on page 86 for the register boundary addresses.

5.7 GTZC_TZIC registers

All registers are accessed only by words (32-bit).

5.7.1 GTZC_TZIC interrupt enable register 1 (GTZC_TZIC_IER1)

Address offset: 0x400

Reset value: 0x0000 0000

Secure access only.

This register is used to enable/disable generation of GTZC_IRQn interrupt towards NVIC on illegal access event for each source.

31302928272625242322212019181716
SP11IETIM1IECOMPIEVREFBUFIEUCPD1IEUSBFSIEFDCAN1IELPTIM3IELPTIM2IEI2C4IELPUART1IELPTIM1IEOPAMP1IEDAC1IECRSIEI2C3IE
r/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/w

1514131211109876543210
I2C2IEI2C1IEUART5IEUART4IEUSART3IEUSART2IESP3IESP2IEIWDGIEWWDGIETIM7IETIM6IETIM5IETIM4IETIM3IETIM2IE
r/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/wr/w

Bit 31 SP11IE : illegal access interrupt enable for SP11

0: disabled

1: enabled

Bit 30 TIM1IE : illegal access interrupt enable for TIM1

0: disabled

1: enabled

Bit 29 COMPIE : illegal access interrupt enable for COMP

0: disabled

1: enabled

Bit 28 VREFBUFIE : illegal access interrupt enable for VREFBUF

0: disabled

1: enabled

Bit 27 UCPD1IE : illegal access interrupt enable for UCPD1

0: disabled

1: enabled

Bit 26 USBFSIE : illegal access interrupt enable for USBFS

0: disabled

1: enabled

Bit 25 FDCAN1IE : illegal access interrupt enable for FDCAN1

0: disabled

1: enabled

  1. Bit 24 LPTIM3IE : illegal access interrupt enable for LPTIM3
    0: disabled
    1: enabled
  2. Bit 23 LPTIM2IE : illegal access interrupt enable for LPTIM2
    0: disabled
    1: enabled
  3. Bit 22 I2C4IE : illegal access interrupt enable for I2C4
    0: disabled
    1: enabled
  4. Bit 21 LPUART1IE : illegal access interrupt enable for LPUART1
    0: disabled
    1: enabled
  5. Bit 20 LPTIM1IE : illegal access interrupt enable for LPTIM1
    0: disabled
    1: enabled
  6. Bit 19 OPAMPIE : illegal access interrupt enable for OPAMP
    0: disabled
    1: enabled
  7. Bit 18 DAC1IE : illegal access interrupt enable for DAC1
    0: disabled
    1: enabled
  8. Bit 17 CRSIE : illegal access interrupt enable for CRS
    0: disabled
    1: enabled
  9. Bit 16 I2C3IE : illegal access interrupt enable for I2C3
    0: disabled
    1: enabled
  10. Bit 15 I2C2IE : illegal access interrupt enable for I2C2
    0: disabled
    1: enabled
  11. Bit 14 I2C1IE : illegal access interrupt enable for I2C1
    0: disabled
    1: enabled
  12. Bit 13 UART5IE : illegal access interrupt enable for UART5
    0: disabled
    1: enabled
  13. Bit 12 UART4IE : illegal access interrupt enable for UART4
    0: disabled
    1: enabled
  14. Bit 11 USART3IE : illegal access interrupt enable for USART3
    0: disabled
    1: enabled
  15. Bit 10 USART2IE : illegal access interrupt enable for USART2
    0: disabled
    1: enabled
  1. Bit 9 SPI3IE : illegal access interrupt enable for SPI3
    0: disabled
    1: enabled
  2. Bit 8 SPI2IE : illegal access interrupt enable for SPI2
    0: disabled
    1: enabled
  3. Bit 7 IWDGIE : illegal access interrupt enable for IWDG
    0: disabled
    1: enabled
  4. Bit 6 WWDGIE : illegal access interrupt enable for WWDG
    0: disabled
    1: enabled
  5. Bit 5 TIM7IE : illegal access interrupt enable for TIM7
    0: disabled
    1: enabled
  6. Bit 4 TIM6IE : illegal access interrupt enable for TIM6
    0: disabled
    1: enabled
  7. Bit 3 TIM5IE : illegal access interrupt enable for TIM5
    0: disabled
    1: enabled
  8. Bit 2 TIM4IE : illegal access interrupt enable for TIM4
    0: disabled
    1: enabled
  9. Bit 1 TIM3IE : illegal access interrupt enable for TIM3
    0: disabled
    1: enabled
  10. Bit 0 TIM2IE : illegal access interrupt enable for TIM2
    0: disabled
    1: enabled

5.7.2 GTZC_TZIC interrupt enable register 2 (GTZC_TZIC_IER2)

Address offset: 0x404

Reset value: 0x0000 0000

Secure access only.

This register is used to enable interrupt of illegal access.

31302928272625242322212019181716
Res.Res.OTFDEC1IEEXTIIEFLASH_REGIEFLASHIERCCIEDMAMUX1IEDMA2IEDMA1IESYSCFGIEPWRIERTCIEOCTOSP1_REGIEFMC_REGIESDMMC1IE
rwrwrwrwrwrwrwrwrwrwrwrwrwrw

1514131211109876543210
PKAIERNGIEHASHIEAESIEADCIEICACHE_REGIETSCIECRCEDFSDM1IESA2IESA1IETIM17IETIM16IETIM15IEUSART1IETIM8IE
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bits 31:30 Reserved, must be kept at reset value.

Bit 29 OTFDEC1IE : illegal access interrupt enable for OTFDEC

0: disabled
1: enabled

Bit 28 EXTIIE : illegal access interrupt enable for EXTI

0: disabled
1: enabled

Bit 27 FLASH_REGIE : illegal access interrupt enable for FLASH registers

0: disabled
1: enabled

Bit 26 FLASHIE : illegal access interrupt enable for FLASH

0: disabled
1: enabled

Bit 25 RCCIE : illegal access interrupt enable for RCC

0: disabled
1: enabled

Bit 24 DMAMUX1IE : illegal access interrupt enable for DMAMUX1

0: disabled
1: enabled

Bit 23 DMA2IE : illegal access interrupt enable for DMA2

0: disabled
1: enabled

  1. Bit 22 DMA1IE : illegal access interrupt enable for DMA1
    0: disabled
    1: enabled
  2. Bit 21 SYSCFGIE : illegal access interrupt enable for SYSCFG
    0: disabled
    1: enabled
  3. Bit 20 PWRIE : illegal access interrupt enable for PWR
    0: disabled
    1: enabled
  4. Bit 19 RTCIE : illegal access interrupt enable for RTC
    0: disabled
    1: enabled
  5. Bit 18 OCTOSPI1_REGIE : illegal access interrupt enable for OCTOSPI1 registers
    0: disabled
    1: enabled
  6. Bit 17 FMC_REGIE : illegal access interrupt enable for FMC registers
    0: disabled
    1: enabled
  7. Bit 16 SDMMC1IE : illegal access interrupt enable for SDMMC1
    0: disabled
    1: enabled
  8. Bit 15 PKAIE : illegal access interrupt enable for PKA
    0: disabled
    1: enabled
  9. Bit 14 RNGIE : illegal access interrupt enable for RNG
    0: disabled
    1: enabled
  10. Bit 13 HASHIE : illegal access interrupt enable for HASH
    0: disabled
    1: enabled
  11. Bit 12 AESIE : illegal access interrupt enable for AES
    0: disabled
    1: enabled
  12. Bit 11 ADCIE : illegal access interrupt enable for ADC
    0: disabled
    1: enabled
  13. Bit 10 ICACHE_REGIE : illegal access interrupt enable for ICACHE registers
    0: disabled
    1: enabled
  14. Bit 9 TSCIE : illegal access interrupt enable for TSC
    0: disabled
    1: enabled
  15. Bit 8 CRCIE : illegal access interrupt enable for CRC
    0: disabled
    1: enabled
  1. Bit 7 DFSDM1IE : illegal access interrupt enable for DFSDM1
    0: disabled
    1: enabled
  2. Bit 6 SAI2IE : illegal access interrupt enable for SAI2
    0: disabled
    1: enabled
  3. Bit 5 SAI1IE : illegal access interrupt enable for SAI1
    0: disabled
    1: enabled
  4. Bit 4 TIM17IE : illegal access interrupt enable for TIM17
    0: disabled
    1: enabled
  5. Bit 3 TIM16IE : illegal access interrupt enable for TIM16
    0: disabled
    1: enabled
  6. Bit 2 TIM15IE : illegal access interrupt enable for TIM15
    0: disabled
    1: enabled
  7. Bit 1 USART1IE : illegal access interrupt enable for USART1
    0: disabled
    1: enabled
  8. Bit 0 TIM8IE : illegal access interrupt enable for TIM8
    0: disabled
    1: enabled

5.7.3 GTZC_TZIC interrupt enable register 3 (GTZC_TZIC_IER3)

Address offset: 0x408

Reset value: 0x0000 0000

Secure access only.

This register is used to enable interrupt of illegal access.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.MPCCB2_REGIESRAM2IEMPCCB1_REGIESRAM1IEOCTOSP11_MEMIEFMC_MEMIETZICIETZSCIE
rwrwrwrwrwrwrwrw

Bits 31:8 Reserved, must be kept at reset value.

  1. Bit 7 MPCBB2_REGIE : illegal access interrupt enable for MPCBB2 registers
    0: disabled
    1: enabled
  2. Bit 6 SRAM2IE : illegal access interrupt enable for SRAM2
    0: disabled
    1: enabled
  3. Bit 5 MPCBB1_REGIE : illegal access interrupt enable for MPCBB1 registers
    0: disabled
    1: enabled
  4. Bit 4 SRAM1IE : illegal access interrupt enable for SRAM1
    0: disabled
    1: enabled
  5. Bit 3 OCTOSPI1_MEMIE : illegal access interrupt enable for OCTOSPI1 memory interface
    0: disabled
    1: enabled
  6. Bit 2 FMC_MEMIE : illegal access interrupt enable for FMC NAND and FMC NOR memories
    0: disabled
    1: enabled
  7. Bit 1 TZICIE : illegal access interrupt enable for TZIC registers
    0: disabled
    1: enabled
  8. Bit 0 TZSCIE : illegal access interrupt enable TZSC
    0: disabled
    1: enabled

5.7.4 GTZC_TZIC status register 1 (GTZC_TZIC_SR1)

Address offset: 0x410

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
SPI1FTIM1FCOMPFVREFBUFFUCPD1FUSBFSFFDCAN1FLPTIM3FLPTIM2FI2C4FLPUART1FLPTIM1FOPAMPFDAC1FCRSFI2C3F
rrrrrrrrrrrrrrrr
1514131211109876543210
I2C2FI2C1FUART5FUART4FUSART3FUSART2FSP3FSP2FIWDGFWWDGFTIM7FTIM6FTIM5FTIM4FTIM3FTIM2F
rrrrrrrrrrrrrrrr
  1. Bit 31 SPI1F : illegal access flag for SPI1
    0: no illegal access event
    1: an illegal access event pending
  1. Bit 30 TIM1F : illegal access flag for TIM1
    0: no illegal access event
    1: an illegal access event pending
  2. Bit 29 COMPF : illegal access flag for COMP
    0: no illegal access event
    1: an illegal access event pending
  3. Bit 28 VREFBUF : illegal access flag for VREFBUF
    0: no illegal access event
    1: an illegal access event pending
  4. Bit 27 UCPD1F : illegal access flag for UCPD1
    0: no illegal access event
    1: an illegal access event pending
  5. Bit 26 USBFSF : illegal access flag for USB FS
    0: no illegal access event
    1: an illegal access event pending
  6. Bit 25 FDCAN1F : illegal access flag for FDCAN1
    0: no illegal access event
    1: an illegal access event pending
  7. Bit 24 LPTIM3F : illegal access flag for LPTIM3
    0: no illegal access event
    1: an illegal access event pending
  8. Bit 23 LPTIM2F : illegal access flag for LPTIM2
    0: no illegal access event
    1: an illegal access event pending
  9. Bit 22 I2C4F : illegal access flag for I2C4
    0: no illegal access event
    1: an illegal access event pending
  10. Bit 21 LPUART1F : illegal access flag for LPUART1
    0: no illegal access event
    1: an illegal access event pending
  11. Bit 20 LPTIM1F : illegal access flag for LPTIM1
    0: no illegal access event
    1: an illegal access event pending
  12. Bit 19 OPAMPF : illegal access flag for OPAMP
    0: no illegal access event
    1: an illegal access event pending
  13. Bit 18 DAC1F : illegal access flag for DAC1
    0: no illegal access event
    1: an illegal access event pending
  14. Bit 17 CRSF : illegal access flag for CRS
    0: no illegal access event
    1: an illegal access event pending
  15. Bit 16 I2C3F : illegal access flag for I2C3
    0: no illegal access event
    1: an illegal access event pending
  1. Bit 15 I2C2F : illegal access flag for I2C2
    0: no illegal access event
    1: an illegal access event pending
  2. Bit 14 I2C1F : illegal access flag for I2C1
    0: no illegal access event
    1: an illegal access event pending
  3. Bit 13 UART5F : illegal access flag for UART5
    0: no illegal access event
    1: an illegal access event pending
  4. Bit 12 UART4F : illegal access flag for UART4
    0: no illegal access event
    1: an illegal access event pending
  5. Bit 11 USART3F : illegal access flag for USART3
    0: no illegal access event
    1: an illegal access event pending
  6. Bit 10 USART2F : illegal access flag for USART2
    0: no illegal access event
    1: an illegal access event pending
  7. Bit 9 SPI3F : illegal access flag for SPI3
    0: no illegal access event
    1: an illegal access event pending
  8. Bit 8 SPI2F : illegal access flag for SPI2
    0: no illegal access event
    1: an illegal access event pending
  9. Bit 7 IWDGF : illegal access flag for IWDG
    0: no illegal access event
    1: an illegal access event pending
  10. Bit 6 WWDGF : illegal access flag for WWDG
    0: no illegal access event
    1: an illegal access event pending
  11. Bit 5 TIM7F : illegal access flag for TIM7
    0: no illegal access event
    1: an illegal access event pending
  12. Bit 4 TIM6F : illegal access flag for TIM6
    0: no illegal access event
    1: an illegal access event pending
  13. Bit 3 TIM5F : illegal access flag for TIM5
    0: no illegal access event
    1: an illegal access event pending
  14. Bit 2 TIM4F : illegal access flag for TIM4
    0: no illegal access event
    1: an illegal access event pending
  15. Bit 1 TIM3F : illegal access flag for TIM3
    0: no illegal access event
    1: an illegal access event pending

Bit 0 TIM2F : illegal access flag for TIM2

0: no illegal access event

1: an illegal access event pending

5.7.5 GTZC_TZIC status register 2 (GTZC_TZIC_SR2)

Address offset: 0x414

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
Res.Res.OTFDEC1FEXTIFFLASH_REGFFLASHFRCCFDMAMUX1FDMA2FDMA1FSYSCFGFPWRFRTCOCTOSP1_REGFFMC_REGFSDMMC1F
rrrrrrrrrrrrrr
1514131211109876543210
PKAFRNGFHASHFAESFADCICACHE_REGFTSCFCRGFDFSDM1FSAI2FSAI1FTIM17FTIM16FTIM15FUSART1FTIM8F
rrrrrrrrrrrrrrrr

Bits 31:30 Reserved, must be kept at reset value.

Bit 29 OTFDEC1F : illegal access flag for OTFDEC1

0: no illegal access event

1: an illegal access event pending

Bit 28 EXTIF : illegal access flag for EXTI

0: no illegal access event

1: an illegal access event pending

Bit 27 FLASH_REGF : illegal access flag for FLASH registers

0: no illegal access event

1: an illegal access event pending

Bit 26 FLASHF : illegal access flag for FLASH

0: no illegal access event

1: an illegal access event pending

Bit 25 RCCF : illegal access flag for RCC

0: no illegal access event

1: an illegal access event pending

Bit 24 DMAMUX1F : illegal access flag for DMAMUX1

0: no illegal access event

1: an illegal access event pending

Bit 23 DMA2F : illegal access flag for DMA2

0: no illegal access event

1: an illegal access event pending

  1. Bit 22 DMA1F : illegal access flag for DMA1
    0: no illegal access event
    1: an illegal access event pending
  2. Bit 21 SYSCFG : illegal access flag for SYSCFG
    0: no illegal access event
    1: an illegal access event pending
  3. Bit 20 PWRF : illegal access flag for PWR
    0: no illegal access event
    1: an illegal access event pending
  4. Bit 19 RTCF : illegal access flag for RTC
    0: no illegal access event
    1: an illegal access event pending
  5. Bit 18 OCTOSPI1_REGF : illegal access flag for OCTOSPI1 registers
    0: no illegal access event
    1: an illegal access event pending
  6. Bit 17 FMC_REGF : illegal access flag for FMC registers
    0: no illegal access event
    1: an illegal access event pending
  7. Bit 16 SDMMC1F : illegal access flag for SDMMC1
    0: no illegal access event
    1: an illegal access event pending
  8. Bit 15 PKAF : illegal access flag for PKA
    0: no illegal access event
    1: an illegal access event pending
  9. Bit 14 RNGF : illegal access flag for RNG
    0: no illegal access event
    1: an illegal access event pending
  10. Bit 13 HASHF : illegal access flag for HASH
    0: no illegal access event
    1: an illegal access event pending
  11. Bit 12 AESF : illegal access flag for AES
    0: no illegal access event
    1: an illegal access event pending
  12. Bit 11 ADC : illegal access flag for ADC
    0: no illegal access event
    1: an illegal access event pending
  13. Bit 10 ICACHE_REGF : illegal access flag for ICACHE registers
    0: no illegal access event
    1: an illegal access event pending
  14. Bit 9 TSCF : illegal access flag for TSC
    0: no illegal access event
    1: an illegal access event pending
  15. Bit 8 CRCF : illegal access flag for CRC
    0: no illegal access event
    1: an illegal access event pending

5.7.6 GTZC_TZIC status register 3 (GTZC_TZIC_SR3)

Address offset: 0x418

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.MPCCBB2_REGFSRAM2FMPCCBB1_REGFSRAM1FOCTOSP1_MEMFFMC_MEMFTZICFTZSCF
rrrrrrrr

Bits 31:8 Reserved, must be kept at reset value.

Bit 7 MPCBB2_REGF : illegal access flag for MPCBB2 registers

0: no illegal access event

1: an illegal access event pending

Bit 6 SRAM2F : illegal access flag for SRAM2

0: no illegal access event

1: an illegal access event pending

Bit 5 MPCBB1_REGF : illegal access flag for MPCBB1 registers

0: no illegal access event

1: an illegal access event pending

Bit 4 SRAM1F : illegal access flag for SRAM1

0: no illegal access event

1: an illegal access event pending

Bit 3 OCTOSPI1_MEMF : illegal access flag for OCTOSPI memory interface

0: no illegal access event

1: an illegal access event pending

Bit 2 FMC_MEMF : illegal access flag for FMC NAND and FMC NOR memory interface

0: no illegal access event

1: an illegal access event pending

Bit 1 TZICF : illegal access flag for TZIC

0: no illegal access event

1: an illegal access event pending

Bit 0 TZSCF : illegal access flag for TZSC

0: no illegal access event

1: an illegal access event pending

5.7.7 GTZC_TZIC flag clear register 1 (GTZC_TZIC_FCR1)

Address offset: 0x420

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
SPI1FCTIM1FCCOMPFCVREFBUFCUCPD1FCUSBFSFCFDCAN1FCLPTIM3FCLPTIM2FCI2C4FCLPUART1FCLPTIM1FCOPAMPFCDAC1FCCRSFCI2C3FC
wwwwwwwwwwwwwwww
1514131211109876543210
I2C2FCI2C1FCUART5FCUART4FCUSART3FCUSART2FCSP3FCSP2FCIWDGFCWWDGFCTIM7FCTIM6FCTIM5FCTIM4FCTIM3FCTIM2FC
wwwwwwwwwwwwwwww

Bit 31 SPI1FC : clear the illegal access flag for SPI1

0: no action

1: status flag cleared

  1. Bit 30 TIM1FC : clear the illegal access flag for TIM1
    0: no action
    1: status flag cleared
  2. Bit 29 COMPFC : clear the illegal access flag for COMP
    0: no action
    1: status flag cleared
  3. Bit 28 VREFBUFC : clear the illegal access flag for VREFBUF
    0: no action
    1: status flag cleared
  4. Bit 27 UCPD1FC : clear the illegal access flag for UCPD1
    0: no action
    1: status flag cleared
  5. Bit 26 USBFSFC : clear the illegal access flag for USB FS
    0: no action
    1: status flag cleared
  6. Bit 25 FDCAN1FC : clear the illegal access flag for FDCAN1
    0: no action
    1: status flag cleared
  7. Bit 24 LPTIM3FC : clear the illegal access flag for LPTIM3
    0: no action
    1: status flag cleared
  8. Bit 23 LPTIM2FC : clear the illegal access flag for LPTIM2
    0: no action
    1: status flag cleared
  9. Bit 22 I2C4FC : clear the illegal access flag for I2C4
    0: no action
    1: status flag cleared
  10. Bit 21 LPUART1FC : clear the illegal access flag for LPUART1
    0: no action
    1: status flag cleared
  11. Bit 20 LPTIM1FC : clear the illegal access flag for LPTIM1
    0: no action
    1: status flag cleared
  12. Bit 19 OPAMPFC : clear the illegal access flag for OPAMP
    0: no action
    1: status flag cleared
  13. Bit 18 DAC1FC : clear the illegal access flag for DAC1
    0: no action
    1: status flag cleared
  14. Bit 17 CRSFC : clear the illegal access flag for CRS
    0: no action
    1: status flag cleared
  15. Bit 16 I2C3FC : clear the illegal access flag for I2C3
    0: no action
    1: status flag cleared
  1. Bit 15 I2C2FC : clear the illegal access flag for I2C2
    0: no action
    1: status flag cleared
  2. Bit 14 I2C1FC : clear the illegal access flag for I2C1
    0: no action
    1: status flag cleared
  3. Bit 13 UART5FC : clear the illegal access flag for UART5
    0: no action
    1: status flag cleared
  4. Bit 12 UART4FC : clear the illegal access flag for UART4
    0: no action
    1: status flag cleared
  5. Bit 11 USART3FC : clear the illegal access flag for USART3
    0: no action
    1: status flag cleared
  6. Bit 10 USART2FC : clear the illegal access flag for USART2
    0: no action
    1: status flag cleared
  7. Bit 9 SPI3FC : clear the illegal access flag for SPI3
    0: no action
    1: status flag cleared
  8. Bit 8 SPI2FC : clear the illegal access flag for SPI2
    0: no action
    1: status flag cleared
  9. Bit 7 IWDGFC : clear the illegal access flag for IWDG
    0: no action
    1: status flag cleared
  10. Bit 6 WWDGFC : clear the illegal access flag for WWDG
    0: no action
    1: status flag cleared
  11. Bit 5 TIM7FC : clear the illegal access flag for TIM7
    0: no action
    1: status flag cleared
  12. Bit 4 TIM6FC : clear the illegal access flag for TIM6
    0: no action
    1: status flag cleared
  13. Bit 3 TIM5FC : clear the illegal access flag for TIM5
    0: no action
    1: status flag cleared 1: enable
  14. Bit 2 TIM4FC : clear the illegal access flag for TIM4
    0: no action
    1: status flag cleared
  15. Bit 1 TIM3FC : clear the illegal access flag for TIM3
    0: no action
    1: status flag cleared

Bit 0 TIM2FC : clear the illegal access flag for TIM2

0: no action

1: status flag cleared

5.7.8 GTZC_TZIC flag clear register 2 (GTZC_TZIC_FCR2)

Address offset: 0x424

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
Res.Res.OTFDEC1FCEXTIFCFLASH_REGFCFLASHFCRCCFCDMAMUX1FCDMA2FCDMA1FCSYSCFGFCPWRFCRTCFCOCTOSPPI1_REGFCFMC_REGFCSDMMC1FC
wwwwwwwwwwwwww
1514131211109876543210
PKAFCRNGFCHASHFCAESFCADCFCICACHE_REGFCTSCFCCRCFCDFSDM1FCSAI2FCSAI1FCTIM17FCTIM16FCTIM15FCUSART1FCTIM8FC
wwwwwwwwwwwwwwww

Bits 31:30 Reserved, must be kept at reset value.

Bit 29 OTFDEC1FC : clear the illegal access flag for OTFDEC1

0: no action

1: status flag cleared

Bit 28 EXTIFC : clear the illegal access flag for EXTI

0: no action

1: status flag cleared

Bit 27 FLASH_REGFC : clear the illegal access flag for FLASH registers

0: no action

1: status flag cleared

Bit 26 FLASHFC : clear the illegal access flag for FLASH

0: no action

1: status flag cleared

Bit 25 RCCFC : clear the illegal access flag for RCC

0: no action

1: status flag cleared

Bit 24 DMAMUX1FC : clear the illegal access flag for DMAMUX1

0: no action

1: status flag cleared

  1. Bit 23 DMA2FC : clear the illegal access flag for DMA2
    0: no action
    1: status flag cleared
  2. Bit 22 DMA1FC : clear the illegal access flag for DMA1
    0: no action
    1: status flag cleared
  3. Bit 21 SYSCFGFC : clear the illegal access flag for SYSCFG
    0: no action
    1: status flag cleared
  4. Bit 20 PWRFC : clear the illegal access flag for PWR
    0: no action
    1: status flag cleared
  5. Bit 19 RTCFC : clear the illegal access flag for RTC
    0: no action
    1: status flag cleared
  6. Bit 18 OCTOSPI1_REGFC : clear the illegal access flag for OCTOPSPI1 registers
    0: no action
    1: status flag cleared
  7. Bit 17 FMC_REGFC : clear the illegal access flag for FMC registers
    0: no action
    1: status flag cleared
  8. Bit 16 SDMMC1FC : clear the illegal access flag for SDMMC1
    0: no action
    1: status flag cleared
  9. Bit 15 PKAFC : clear the illegal access flag for PKA
    0: no action
    1: status flag cleared
  10. Bit 14 RNGFC : clear the illegal access flag for RNG
    0: no action
    1: status flag cleared
  11. Bit 13 HASHFC : clear the illegal access flag for HASH
    0: no action
    1: status flag cleared
  12. Bit 12 AESFC : clear the illegal access flag for AES
    0: no action
    1: status flag cleared
  13. Bit 11 ADCFC : clear the illegal access flag for ADC
    0: no action
    1: status flag cleared
  14. Bit 10 ICACHE_REGFC : clear the illegal access flag for ICACHE registers
    0: no action
    1: status flag cleared
  15. Bit 9 TSCFC : clear the illegal access flag for TSC
    0: no action
    1: status flag cleared

5.7.9 GTZC_TZIC flag clear register 3 (GTZC_TZIC_FCR3)

Address offset: 0x428

Reset value: 0x0000 0000

Secure access only.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.MPCBB2_REGFCSRAM2FCMPCBB1_REGFCSRAM1FCOCTOSPI1_MEMFCFMC_MEMFCTZICFCTZSCFC
wwwwwwww

Bits 31:8 Reserved, must be kept at reset value.

Bit 7 MPCBB2_REGFC : clear the illegal access flag for MPCBB2 registers

Bit 6 SRAM2FC : clear the illegal access flag for SRAM2

Bit 5 MPCBB1_REGFC : clear the illegal access flag for MPCBB1 registers

Bit 4 SRAM1FC : clear the illegal access flag for SRAM1

Bit 3 OCTOSPI1_MEMFC : clear the illegal access flag for OCTOSPI memory interface

Bit 2 FMC_MEMFC : clear the illegal access flag for FMC NAND and FMC NOR memory interface

Bit 1 TZICFC : clear the illegal access flag for TZIC

Bit 0 TZSCFC : clear the illegal access flag for TZSC

5.7.10 GTZC_TZIC register map and reset values

Table 29. GTZC_TZIC register map and reset values

OffsetRegister313029282726252423222120191817161514131211109876543210
0x400GTZC_TZIC_IER1SPI1IETIM1IECOMPIEVREFBUFIEUCPD1IEUSBFSIEFDCAN1IELPTIM3IELPTIM2IEI2C4IELPUART1IELPTIM1IEOPAMPIEDAC1IECRSIEI2C3IEI2C2IEI2C1IEUART5IEUART4IEUSART3IEUSART2IESPI3IESPI2IEIWDGIEWWDGIETIM7IETIM6IETIM5IETIM4IETIM3IETIM2IE
Reset value00000000000000000000000000000000
0x404GTZC_TZIC_IER2Res.Res.OTFDEC1IEEXTIIEFLASH_REGIEFLASHIERCCIEDMAMUX1IEDMA2IEDMA1IESYSCFGIEPWRIERTCIEOCTOSPI1_REGIEFMC_REGIESDMMC1IEPKAIERNGIEHASHIEAESIEADCIEICACHE_REGIETSCIECRCIEDFSDM1IESAI2IESAI1IETIM17IETIM16IETIM15IEUSART1IETIM8IE
Reset value000000000000000000000000000000

Table 29. GTZC_TZIC register map and reset values (continued)

OffsetRegister313029282726252423222120191817161514131211109876543210
0x408GTZC_TZIC_IER3ResResResResResResResResResResResResResResResResResResResResResResResResResMPCCB2_REGIESRAM2IEMPCCB1_REGIESRAM1IEOCTOSP1_MEMIEFMC_MEMIETZICIETZSCIE
Reset value00000000
0x40CReservedReserved
0x410GTZC_TZIC_SR1SP1IFTIM1IFCOMPFVREFBUFFUCPD1FUSBFSFFDCAN1FLPTIM3FLPTIM2FI2C4FLPUART1FLPTIM1FOPAMPFDAC1FCRSFI2C3FI2C2FI2C1FUART5FUART4FUSART3FUSART2FSPI3FSPI2FIWDGFWWDGFTIM7FTIM6FTIM5FTIMIFTIM3FTIM2F
Reset value00000000000000000000000000000000
0x414GTZC_TZIC_SR2ResResOTFDEC1FEXTIFFLASH_REGFFLASHFRCOFDMAMUX1FDMA2FDMA1FSYSCFGFPWRFRTCFOCTOSP1_REGFFMC_REGFSDMMC1FPKAFRNGFHASHFAESFADCfICACHE_REGFTSCFCRCFDFSDM1FSAI2FSAI1FTIM17FTIM16FTIM15FUSART1FTIM8F
Reset value000000000000000000000000000000
0x418GTZC_TZIC_SR3ResResResResResResResResResResResResResResResResResResResResResResResResResMPCCB2_REGFSRAM2FMPCCB1_REGFSRAM1FOCTOSP1_MEMFFMC_MEMFTZICFTZSCF
Reset value00000000
0x41CReservedReserved
0x420GTZC_TZIC_FCR1SP1FCTIM1FCCOMPFCVREFBUFFCUCPD1FCUSBFSFCFDCAN1FCLPTIM3FCLPTIM2FCI2C4FCLPUART1FCLPTIM1FCOPAMPFCDAC1FCCRSFCI2C3FCI2C2FCI2C1FCUART5FCUART4FCUSART3FCUSART2FCSPI3FCSPI2FCIWDGFCWWDGFCTIM7FCTIM6FCTIM5FCTIM4FCTIM3FCTIM2FC
Reset value00000000000000000000000000000000
0x424GTZC_TZIC_FCR2ResResOTFDEC1FCEXTIFCFLASH_REGFCFLASHFCRCOFCDMAMUX1FCDMA2FCDMA1FCSYSCFGFCPWRFCRTCFCOCTOSP1_REGFCFMC_REGFCSDMMC1FCPKAFCRNGFCHASHFCAESFCADCFCICACHE_REGFCTSCFCCRCFCDFSDM1FCSAI2FCSAI1FCTIM17FCTIM16FCTIM15FCUSART1FCTIM8FC
Reset value000000000000000000000000000000
0x428GTZC_TZIC_FCR3ResResResResResResResResResResResResResResResResResResResResResResResResResMPCCB2_REGFCSRAM2FCMPCCB1_REGFCSRAM1FCOCTOSP1_MEMFCFMC_MEMFCTZICFCTZSCFC
Reset value00000000
Refer to Section 2.3 on page 86 for the register boundary addresses.