5. Global TrustZone® controller (GTZC)

5.1 GTZC introduction

The global TrustZone controller (GTZC) block that contains the following subblocks:

These subblocks are used to configure TrustZone system security in a product having bus agents with programmable-security and privileged attributes such as:

5.2 GTZC main features

GTZC TrustZone system architecture

The Armv8-M supports security per TrustZone-M model with isolation between:

The TrustZone architecture is extended beyond AHB and Armv8-M with:

AHB and APB peripherals can be categorized as:

AHB securable masters can be configured in the TZSC to be secure/non-secure and/or privileged/unprivileged.

Application information

The TZSC, MPCBB, and TZIC can be used in one of the following ways:

The Armv8-M security architecture with secure, securable, and TrustZone-aware peripherals is shown in Figure 16.

Figure 16. GTZC in Armv8-M subsystem block diagram

Figure 16. GTZC in Armv8-M subsystem block diagram. This block diagram illustrates the system architecture for Armv8-M, centered around the Cortex-M33 processor and AHB masters connected to an AHB bus. The Global TrustZone Controller (GTZC) is shown with its sub-blocks: TZSC, TZIC, and MPCBBx. The TZSC is connected to the AHB bus and has a 'Periph sec/priv' signal. The TZIC is connected to the Cortex-M33 via an IRQ signal. The MPCBBx sub-blocks are connected to the AHB bus and have 'Periph sec/priv' signals. The diagram also shows an AHB2/APB bridge with a 'Sec/priv gate' connected to the AHB bus. Below the bridge, an APB bus connects to securable peripherals including UART, SPI, and Timer. To the right, AHB masters are connected to the AHB bus. An AHB-PPC stub is connected to the AHB bus and has a 'Periph sec/priv' signal. Below the stub, securable peripherals include Crypto (AES). The diagram also shows securable memories, including Internal SRAM and External memories. The Internal SRAM is connected to the AHB bus and has a 'Periph sec/priv' signal. The External memories are connected to the AHB bus and have a 'Periph sec/priv' signal. The diagram is labeled with 'MSv63637V1' in the bottom right corner.
Figure 16. GTZC in Armv8-M subsystem block diagram. This block diagram illustrates the system architecture for Armv8-M, centered around the Cortex-M33 processor and AHB masters connected to an AHB bus. The Global TrustZone Controller (GTZC) is shown with its sub-blocks: TZSC, TZIC, and MPCBBx. The TZSC is connected to the AHB bus and has a 'Periph sec/priv' signal. The TZIC is connected to the Cortex-M33 via an IRQ signal. The MPCBBx sub-blocks are connected to the AHB bus and have 'Periph sec/priv' signals. The diagram also shows an AHB2/APB bridge with a 'Sec/priv gate' connected to the AHB bus. Below the bridge, an APB bus connects to securable peripherals including UART, SPI, and Timer. To the right, AHB masters are connected to the AHB bus. An AHB-PPC stub is connected to the AHB bus and has a 'Periph sec/priv' signal. Below the stub, securable peripherals include Crypto (AES). The diagram also shows securable memories, including Internal SRAM and External memories. The Internal SRAM is connected to the AHB bus and has a 'Periph sec/priv' signal. The External memories are connected to the AHB bus and have a 'Periph sec/priv' signal. The diagram is labeled with 'MSv63637V1' in the bottom right corner.

5.3 GTZC implementation

The STM32H5 devices embed one instance of GTZC.

Table 27. GTZC features

GTZC sub-blocksGTZC1
TZSCX
TZICX
MPCBB sub-block (number of MPCBBs)X (3)

Table 28 shows the address offset of GTZC subblocks versus GTZC base address (refer to Section 2.3 for GTZC1 base address).

Table 28. GTZC1 sub-block address offset

GTZC1 sub-blockAddress offset
GTZC1_TZSC0x0
GTZC1_TZIC0x400
GTZC1_MPCBB10x800
GTZC1_MPCBB20xC00
GTZC1_MPCBB30x1000

Table 29 and Table 30 describe the characteristics of the available MPCWMs.

Table 29. MPCWM resource assignment

GTZCMPCTarget memory interfaceNumber of sec/non-sec and priv/unpriv regionsWatermark granularity (bytes)
GTZC1MPCWM1OCTOSPI12128 K
MPCWM2FMC_NOR bank2128 K
MPCWM3FMC_NAND bank1128 K
FMC_SDRAM bank 1 (1)1128 K
MPCWM4BKPSRAM132
FMC_SDRAM_bank 2 (1)1128 K

1. Not available on STM32H523/33xx devices.

Table 30. MPCWM3 and MPCWM4 (subregions A and B)

GTZMPCTarget memory interfaceSubregion
GTZC1MPCWM3FMC_NAND bankA
FMC_SDRAM bank 1 (1)B
MPCWM4BKPSRAMA
FMC_SDRAM_bank 2 (1)B

1. Not available on STM32H523/33xx devices.

Table 31 and Table 32 describe the characteristics of the available MPCBBs.

Table 31. MPCBB resource assignment (STM32H562/63/73xx devices)

GTZCMPCResourceMemory size (Kbytes)Block size (bytes)Number of blocksNumber of super-blocks
GTZC1MPCBB1SRAM125651251216
MPCBB2SRAM2641284
MPCBB3SRAM332064020

Table 32. MPCBB resource assignment (STM32H523/33xx devices)

GTZCMPCResourceMemory size (Kbytes)Block size (bytes)Number of blocksNumber of super-blocks
GTZC1MPCBB1SRAM11285122568
MPCBB2SRAM2801605
MPCBB3SRAM3641284

5.4 GTZC functional description

5.4.1 GTZC block diagram

Figure 17 describes the combined feature of TZSC, MPCBB, and TZIC. Each sub-block is controlled by its own AHB configuration port.

The TZSC defines which peripheral is secure and/or privileged. The privileged configuration bit of a peripheral can be modified by a secure privileged transaction when the peripheral is configured as secure. Otherwise, a privileged transaction (non-secure) is sufficient.

On the opposite, the secure configuration bit of a peripheral can be modified only with a secure privileged transaction if the peripheral is configured as privileged. Otherwise, a secure transaction (unprivileged) is sufficient.

The secure configuration bit of a given RAM block can be modified only with a secure privileged transaction if the same block is configured as privileged. Otherwise, a secure transaction (unprivileged) is sufficient.

The TZIC gathers illegal events generated within the system when an illegal access is detected. TZIC can then generate a secure interrupt towards the CPU if needed.

Figure 17. GTZC block diagram

Figure 17. GTZC block diagram. The diagram shows the Global TrustZone controller (GTZC) block diagram. It consists of three main sub-blocks: TZSC, MPCBB, and TZIC. The TZSC block contains SECCFGR, PRIVCFGR, MPCWMxzCFGR, and MPCWMxzR registers. The MPCBB block contains CFGLOCK, SECCFGR, and PRIVCFGR registers. The TZIC block contains IER, SR, and FCR registers. The GTZC block is connected to various peripherals, external memories, and backup SRAM. The diagram also shows the flow of illegal access (ILA) events from the sub-blocks to the GTZC (global ILA interrupt to NVIC). The diagram is labeled with 'Secure/nonsecure', 'Privileged/unprivileged', and 'ILA= illegal access (security only)'. The diagram is labeled with 'MSv63638V1'.

The diagram illustrates the internal structure of the Global TrustZone controller (GTZC). It is composed of three primary functional blocks:

All three blocks send ILA events to the GTZC (Global TrustZone Controller) , which then triggers a global ILA interrupt to the NVIC. The diagram also shows connections to option bytes (TZEN), AHB buses, and various system resources (peripherals, external memories, backup SRAM, internal SRAMs). A legend indicates that 'ILA= illegal access (security only)' and the diagram is identified by 'MSv63638V1'.

Figure 17. GTZC block diagram. The diagram shows the Global TrustZone controller (GTZC) block diagram. It consists of three main sub-blocks: TZSC, MPCBB, and TZIC. The TZSC block contains SECCFGR, PRIVCFGR, MPCWMxzCFGR, and MPCWMxzR registers. The MPCBB block contains CFGLOCK, SECCFGR, and PRIVCFGR registers. The TZIC block contains IER, SR, and FCR registers. The GTZC block is connected to various peripherals, external memories, and backup SRAM. The diagram also shows the flow of illegal access (ILA) events from the sub-blocks to the GTZC (global ILA interrupt to NVIC). The diagram is labeled with 'Secure/nonsecure', 'Privileged/unprivileged', and 'ILA= illegal access (security only)'. The diagram is labeled with 'MSv63638V1'.

5.4.2 Illegal access definition

Three different types of illegal access exist:

Any non-secure transaction trying to write a secure resource is considered as illegal, hence the addressed resource generates an illegal access interrupt for illegal write access and a bus error for illegal fetch access. There are some exceptions on secure and privileged configuration registers: the latter ones authorize non secure read access to secure registers (see GTZC1_TZSC_SECCFGRx/GTZC1_TZSC_PRIVCFGRx).

Any secure transaction trying to access non-secure block in internal block-based SRAM or watermarked memory is considered as illegal.

A correct TZIC setting allows the capture of the associated event and then generates the GTZC_IRQn interrupt to the NVIC. This applies for read, write, and execute access.

Concerning the MPCBB controller, there is an option to ignore secure data read/write access on non-secure SRAM blocks, by setting the SRWILADIS bit in the GTZC1_MPCBBz_CR register. Secure read and write data transactions are then

allowed on non-secure SRAM blocks, while secure execution access remains not allowed.

Any secure execute transaction trying to access a non-secure peripheral register is considered as illegal and generates a bus error.

Any unprivileged transaction trying to access a privileged resource is considered as illegal. There is no illegal access event generated for illegal read and write accesses. The addressed resource follows a silent-fail behavior, returning all 0 data for read and ignoring any write. No bus error is generated. A bus error is generated when an unprivileged execute transaction tries to access a privileged memory.

5.4.3 TrustZone security controller (TZSC)

The TZSC is composed of a configurable set of registers, providing the following features:

A control register for each subregion can be used to enable/disable the watermark memory protection controller, and to define the right attributes of each subregion.

Figure 18. Watermark memory protection controller (region x/subregions A and B)

Diagram of Watermark memory protection controller (region x/subregions A and B)

The diagram illustrates the memory protection configuration for Region x. The region is initially 'Secure privileged by default'. It is divided into sub-regions based on start and length registers. Sub-region B is defined by SUBB_START and SUBB_LENGTH, and Sub-region A is defined by SUBA_START and SUBA_LENGTH. The diagram shows the following memory layout from top to bottom:

Memory addresses and registers are indicated on the left and right:

Diagram of Watermark memory protection controller (region x/subregions A and B)

In Figure 18, region x represents the external memory or backup SRAM region (such as FMC bank, OCTOSPI1, or BKPSRAM). Secure and privileged attributes of subregions A

and B are independently configurable. When no subregions are defined or enabled on the region x, the default attribute of the region x is set as secure-privileged.

The following tables describe the secure/privileged properties of the common area of subregions A and B, when an overlap exists.

Table 33. Secure properties of subregions A and B

Subregion ASubregion BProperties of overlapped region A and B
Non-secureNon-secureNon-secure
Non-secureSecureNon-secure
SecureNon-secureNon-secure
SecureSecureSecure

Table 34. Privileged properties of subregions A and B

Subregion ASubregion BProperties of overlapped region A and B
UnprivilegedUnprivilegedUnprivileged
UnprivilegedPrivilegedUnprivileged
PrivilegedUnprivilegedUnprivileged
PrivilegedPrivilegedPrivileged

5.4.4 Memory protection controller - block based (MPCBB)

The MPCBB is composed of a configurable set of registers allowing to define security and privileged policy for internal SRAMs. The security and privileged policy can be individually configured per each 512-byte block.

Figure 19. MPCBB block diagram

Figure 19. MPCBB block diagram. The diagram shows the MPCBB block connected to an AHB bus. The MPCBB contains four registers: MPCBB_CR, MPCBB_SECCFGR, MPCBB_PRIVCFGR, and MPCBB_CFGLOCK. The MPCBB_CR register is connected to the AHB bus. The MPCBB_SECCFGR and MPCBB_PRIVCFGR registers are connected to the AHB bus and output 'Secure/nonsecure' and 'Privileged/unprivileged' signals respectively. The MPCBB_CFGLOCK register is connected to the AHB bus and outputs an 'MPCBB_ILA_event (to TZIC)' signal. The ILA signal is defined as 'illegal access (security only)'. The diagram also shows a 'TZEN (from option bytes)' input to the MPCBB block. The diagram is labeled 'MSv63636V1'.
Figure 19. MPCBB block diagram. The diagram shows the MPCBB block connected to an AHB bus. The MPCBB contains four registers: MPCBB_CR, MPCBB_SECCFGR, MPCBB_PRIVCFGR, and MPCBB_CFGLOCK. The MPCBB_CR register is connected to the AHB bus. The MPCBB_SECCFGR and MPCBB_PRIVCFGR registers are connected to the AHB bus and output 'Secure/nonsecure' and 'Privileged/unprivileged' signals respectively. The MPCBB_CFGLOCK register is connected to the AHB bus and outputs an 'MPCBB_ILA_event (to TZIC)' signal. The ILA signal is defined as 'illegal access (security only)'. The diagram also shows a 'TZEN (from option bytes)' input to the MPCBB block. The diagram is labeled 'MSv63636V1'.

To set up the MPCBB, the following actions are needed (for example at boot time):

An MPCBB super-block is made of 32 consecutive blocks. For each super-block, secure application can lock all related security/privileged bits using the correct bits in GTZC1_MPCBBz_CFGLOCK. This lock remains active until the next system reset.

Note: The block size is 512 bytes. The super-block size is 512 * 32 = 16 Kbytes.

5.4.5 TrustZone illegal access controller (TZIC)

The TZIC concentrates all illegal access source events. It is used only when the system is TrustZone enabled (TZEN = 0xB4).

TZIC allows to trace (flag) the event that triggered the secure illegal access interrupt. Register masks (GTZC1_TZIC_IERx) are available to filter unwanted event. On an unmasked illegal event, TZIC generates the GTZC_IRQn interrupt to the NVIC.

For each illegal event source, a status flag and a clear bit exist (respectively within GTZC1_TZIC_SRx and GTZC1_TZIC_FCRx). The reset value of mask registers (GTZC1_TZIC_IERx) is such that all events are masked.

5.4.6 Power-on/reset state

The power-on and reset state of the TZSC clear to 0 all bits of GTZC1_TZSC_SECCFGRx and GTZC1_TZSC_PRIVCFGRx, meaning that all securable peripherals are respectively set to non-secure and unprivileged.

For internal SRAMx (x = 1 to 3), all GTZC1_MPCBBz_SECCFGRx and GTZC1_MPCBBz_PRIVCFGRx are set:

For external memories and backup SRAM, GTZC1_TZSC_MPCWMxzR registers are set:

Secure boot code can then program the security settings, making components secure or not as needed.

5.5 GTZC interrupts

TZIC is a secure peripheral, thus it systematically generates an illegal access event when accessed by a non-secure access. The MPCBB and TZSC are TrustZone-aware peripherals, meaning that secure and non-secure registers coexist within the peripheral.

Table 35. GTZC interrupt request

Interrupt acronymInterrupt eventEvent flagEnable control bitInterrupt clear methodExit Sleep modeExit Stop modeExit Standby mode
GTZCIllegal accessAll flags in GTZC1_TZIC_SRxAll bits in GTZC1_TZIC_IERxWrite 1 in the bit GTZC1_TZIC_FCRxYesYesNo

5.6 GTZC1 TZSC registers

All registers are accessed only by words (32-bit).

5.6.1 GTZC1 TZSC control register (GTZC1_TZSC_CR)

Address offset: 0x000

Reset value: 0x0000 0000

Secure privileged access only.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.LCK
rs

Bits 31:1 Reserved, must be kept at reset value.

Bit 0 LCK : lock the configuration of GTZC1_TZSC_SECCFGRx and GTZC1_TZSC_PRIVCFGRx until next reset

This bit is cleared by default, and once set, it cannot be reset until system reset.

0: configuration of all GTZC1_TZSC_SECCFGRx and GTZC1_TZSC_PRIVCFGRx not locked

1: configuration of all GTZC1_TZSC_SECCFGRx and GTZC1_TZSC_PRIVCFGRx locked

5.6.2 GTZC1 TZSC secure configuration register 1 (GTZC1_TZSC_SECCFGR1)

Address offset: 0x010

Reset value: 0x0000 0000

Write-secure access only.

This register can be written only by a secure privileged transaction when the corresponding GTZC1_TZSC_PRIVCFGR signal is set to 1. If a given PRIV bit is not set, the equivalent SEC bit can be written by secure unprivileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privileged or not.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM2 SECDTSSECUART12 SECUART9 SECUART8 SECUART7 SECDAC1SECHDMIC ECSECUSART 11SECUSART 10SECUSART 6SECCRSSECI3C1SECI2C2SECI2C1SECUART5 SEC
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
UART4 SECUSART 3SECUSART 2SECSPI3SECSPI2SECIWDGSECWWDG SECTIM14S ECTIM13S ECTIM12S ECTIM7SECTIM6SECTIM5SECTIM4SECTIM3SECTIM2SEC
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw
  1. Bit 31 LPTIM2SEC : secure access mode for LPTIM2
    0: non-secure
    1: secure
  2. Bit 30 DTSSEC : secure access mode for DTS
    0: non-secure
    1: secure
  3. Bit 29 UART12SEC : secure access mode for UART12
    0: non-secure
    1: secure
  4. Bit 28 UART9SEC : secure access mode for UART9
    0: non-secure
    1: secure
  5. Bit 27 UART8SEC : secure access mode for UART8
    0: non-secure
    1: secure
  6. Bit 26 UART7SEC : secure access mode for UART7
    0: non-secure
    1: secure
  7. Bit 25 DAC1SEC : secure access mode for DAC1
    0: non-secure
    1: secure
  8. Bit 24 HDMICESEC : secure access mode for HDMICEC
    0: non-secure
    1: secure
  9. Bit 23 USART11SEC : secure access mode for USART11
    0: non-secure
    1: secure
  10. Bit 22 USART10SEC : secure access mode for USART10
    0: non-secure
    1: secure
  11. Bit 21 USART6SEC : secure access mode for USART6
    0: non-secure
    1: secure
  12. Bit 20 CRSSEC : secure access mode for CRS
    0: non-secure
    1: secure
  13. Bit 19 I3C1SEC : secure access mode for I3C1
    0: non-secure
    1: secure
  14. Bit 18 I2C2SEC : secure access mode for I2C2
    0: non-secure
    1: secure
  1. Bit 17 I2C1SEC : secure access mode for I2C1
    0: non-secure
    1: secure
  2. Bit 16 UART5SEC : secure access mode for UART5
    0: non-secure
    1: secure
  3. Bit 15 UART4SEC : secure access mode for UART4
    0: non-secure
    1: secure
  4. Bit 14 USART3SEC : secure access mode for USART3
    0: non-secure
    1: secure
  5. Bit 13 USART2SEC : secure access mode for USART2
    0: non-secure
    1: secure
  6. Bit 12 SPI3SEC : secure access mode for SPI3
    0: non-secure
    1: secure
  7. Bit 11 SPI2SEC : secure access mode for SPI2
    0: non-secure
    1: secure
  8. Bit 10 IWDGSEC : secure access mode for IWDG
    0: non-secure
    1: secure
  9. Bit 9 WWDGSEC : secure access mode for WWDG
    0: non-secure
    1: secure
  10. Bit 8 TIM14SEC : secure access mode for TIM14
    0: non-secure
    1: secure
  11. Bit 7 TIM13SEC : secure access mode for TIM13
    0: non-secure
    1: secure
  12. Bit 6 TIM12SEC : secure access mode for TIM12
    0: non-secure
    1: secure
  13. Bit 5 TIM7SEC : secure access mode for TIM7
    0: non-secure
    1: secure
  14. Bit 4 TIM6SEC : secure access mode for TIM6
    0: non-secure
    1: secure
  15. Bit 3 TIM5SEC : secure access mode for TIM5
    0: non-secure
    1: secure

Bit 2 TIM4SEC : secure access mode for TIM4

0: non-secure

1: secure

Bit 1 TIM3SEC : secure access mode for TIM3

0: non-secure

1: secure

Bit 0 TIM2SEC : secure access mode for TIM2

0: non-secure

1: secure

5.6.3 GTZC1 TZSC secure configuration register 2 (GTZC1_TZSC_SECCFGR2)

Address offset: 0x014

Reset value: 0x0000 0000

Write-secure access only.

This register can be written only by a secure privileged transaction when the corresponding GTZC1_TZSC_PRIVCFGR signal is set to 1. If a given PRIV is not set, the equivalent SEC bit can be written by a secure unprivileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privileged or not.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM5
SEC
LPTIM4
SEC
LPTIM3
SEC
LPTIM1
SEC
I2C4
SEC
I2C3
SEC
LPUART1
SEC
SPI5
SEC
Res.Res.Res.Res.USB
SEC
SAI2
SEC
SAI1
SEC
SPI6
SEC
rwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
SPI4
SEC
TIM17
SEC
TIM16
SEC
TIM15
SEC
USART
1SEC
TIM8
SEC
SPI1
SEC
TIM1
SEC
Res.Res.Res.Res.Res.UCPD
SEC
FDCAN2
SEC
FDCAN1
SEC
rwrwrwrwrwrwrwrwrwrwrw

Bit 31 LPTIM5SEC : secure access mode for LPTIM5

0: non-secure

1: secure

Bit 30 LPTIM4SEC : secure access mode for LPTIM4

0: non-secure

1: secure

Bit 29 LPTIM3SEC : secure access mode for LPTIM3

0: non-secure

1: secure

Bit 28 LPTIM1SEC : secure access mode for LPTIM1

0: non-secure

1: secure

Bit 27 I2C4SEC : secure access mode for I2C4

0: non-secure

1: secure

Bit 26 I2C3SEC : secure access mode for I2C3

0: non-secure

1: secure

Bit 25 LPUART1SEC : secure access mode for LPUART

0: non-secure

1: secure

Bit 24 SPI5SEC : secure access mode for SPI5

0: non-secure

1: secure

Bits 23:20 Reserved, must be kept at reset value.

Bit 19 USBSEC : secure access mode for USB

0: non-secure

1: secure

Bit 18 SAI2SEC : secure access mode for SAI2

0: non-secure

1: secure

Bit 17 SAI1SEC : secure access mode for SAI1

0: non-secure

1: secure

Bit 16 SPI6SEC : secure access mode for SPI6

0: non-secure

1: secure

Bit 15 SPI4SEC : secure access mode for SPI4

0: non-secure

1: secure

Bit 14 TIM17SEC : secure access mode for TIM17

0: non-secure

1: secure

Bit 13 TIM16SEC : secure access mode for TIM16

0: non-secure

1: secure

Bit 12 TIM15SEC : secure access mode for TIM15

0: non-secure

1: secure

Bit 11 USART1SEC : secure access mode for USART1

0: non-secure

1: secure

Bit 10 TIM8SEC : secure access mode for TIM8

0: non-secure

1: secure

Bit 9 SPI1SEC : secure access mode for SPI1

0: non-secure

1: secure

Bit 8 TIM1SEC : secure access mode for TIM1

0: non-secure

1: secure

Bits 7:3 Reserved, must be kept at reset value.

Bit 2 UCPDSEC : secure access mode for UCPD

0: non-secure

1: secure

Bit 1 FDCAN2SEC : secure access mode for FDCAN2

0: non-secure

1: secure

Bit 0 FDCAN1SEC : secure access mode for FDCAN1

0: non-secure

1: secure

5.6.4 GTZC1 TZSC secure configuration register 3 (GTZC1_TZSC_SECCFGR3)

Address offset: 0x018

Reset value: 0x0000 0000

Write-secure access only.

This register can be written only by a secure privileged transaction when the corresponding GTZC1_TZSC_PRIVCFGR is set to 1. If a given PRIV is not set, the equivalent SEC bit can be written by a secure unprivileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privileged or not.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.Res.Res.Res.RAMCFGSECRes.OCTOSPI1SECFMCSECSDMMC2SECSDMMC1SECPKASECSAESSSECRNGSECHASHSECAESSEC
rwrwrwrwrwrwrwrwrwrw
1514131211109876543210
DCMISECADC12SECDCACHESECICACHESECETHSECFMACSECCORDICSECCRCSECRes.Res.Res.Res.Res.I3C2SECVREFBUFSECLPTIM6SEC
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:27 Reserved, must be kept at reset value.

Bit 26 RAMCFGSEC : secure access mode for RAMSCFG

0: non-secure

1: secure

Bit 25 Reserved, must be kept at reset value.

  1. Bit 24 OCTOSPI1SEC : secure access mode for OCTOSPI1
    0: non-secure
    1: secure
  2. Bit 23 FMCSEC : secure access mode for FMC
    0: non-secure
    1: secure
  3. Bit 22 SDMMC2SEC : secure access mode for SDMMC2
    0: non-secure
    1: secure
  4. Bit 21 SDMMC1SEC : secure access mode for SDMMC1
    0: non-secure
    1: secure
  5. Bit 20 PKASEC : secure access mode for PKA
    0: non-secure
    1: secure
  6. Bit 19 SAESSEC : secure access mode for SAES
    0: non-secure
    1: secure
  7. Bit 18 RNGSEC : secure access mode for RNG
    0: non-secure
    1: secure
  8. Bit 17 HASHSEC : secure access mode for HASH
    0: non-secure
    1: secure
  9. Bit 16 AESSEC : secure access mode for AES
    0: non-secure
    1: secure
  10. Bit 15 DCMISEC : secure access mode for DCMI
    0: non-secure
    1: secure
  11. Bit 14 ADC12SEC : secure access mode for ADC1 and ADC2
    0: non-secure
    1: secure
  12. Bit 13 DCACHESEC : secure access mode for DCACHE
    0: non-secure
    1: secure
  13. Bit 12 ICACHESEC : secure access mode for ICACHE
    0: non-secure
    1: secure
  14. Bit 11 ETHSEC : secure access mode for register of ETH
    0: non-secure
    1: secure
  15. Bit 10 FMACSEC : secure access mode for FMAC
    0: non-secure
    1: secure

Bit 9 CORDICSEC : secure access mode for CORDIC

0: non-secure

1: secure

Bit 8 CRCSEC : secure access mode for CRC

0: non-secure

1: secure

Bits 7:3 Reserved, must be kept at reset value.

Bit 2 I3C2SEC : secure access mode for I3C2

0: non-secure

1: secure

Bit 1 VREFBUFSEC : secure access mode for VREFBUF

0: non-secure

1: secure

Bit 0 LPTIM6SEC : secure access mode for LPTIM6

0: non-secure

1: secure

5.6.5 GTZC1 TZSC privilege configuration register 1 (GTZC1_TZSC_PRIVCFGR1)

Address offset: 0x020

Reset value: 0x0000 0000

Write-privileged access only.

This register can be read or written only by a secure privileged transaction when the corresponding GTZC1_TZSC_SECCFGR signal is set to 1. If a given SEC bit is not set, the equivalent PRIV bit can be read/written by a non-secure privileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privileged or not.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM2
PRIV
DTSPR
IV
UART1
2PRIV
UART9
PRIV
UART8
PRIV
UART7
PRIV
DAC1P
RIV
HDMIC
ECPRI
V
USART
11PRIV
USART
10PRIV
USART
6PRIV
CRSPR
IV
I3C1PR
IV
I2C2PR
IV
I2C1PR
IV
UART5
PRIV
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
UART4
PRIV
USART
3PRIV
USART
2PRIV
SPI3P
RIV
SPI2P
RIV
IWDGP
RIV
WWDG
PRIV
TIM14P
RIV
TIM13P
RIV
TIM12P
RIV
TIM7P
RIV
TIM6P
RIV
TIM5P
RIV
TIM4P
RIV
TIM3P
RIV
TIM2P
RIV
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bit 31 LPTIM2PRIV : privileged access mode for LPTIM2

0: unprivileged

1: privileged

Bit 30 DTSPRIV : privileged access mode for DTS

0: unprivileged

1: privileged

  1. Bit 29 UART12PRIV : privileged access mode for UART12
    0: unprivileged
    1: privileged
  2. Bit 28 UART9PRIV : privileged access mode for UART9
    0: unprivileged
    1: privileged
  3. Bit 27 UART8PRIV : privileged access mode for UART8
    0: unprivileged
    1: privileged
  4. Bit 26 UART7PRIV : privileged access mode for UART7
    0: unprivileged
    1: privileged
  5. Bit 25 DAC1PRIV : privileged access mode for DAC1
    0: unprivileged
    1: privileged
  6. Bit 24 HDMICECPRIV : privileged access mode for HDMICEC
    0: unprivileged
    1: privileged
  7. Bit 23 USART11PRIV : privileged access mode for USART11
    0: unprivileged
    1: privileged
  8. Bit 22 USART10PRIV : privileged access mode for USART10
    0: unprivileged
    1: privileged
  9. Bit 21 USART6PRIV : privileged access mode for USART6
    0: unprivileged
    1: privileged
  10. Bit 20 CRSPRIV : privileged access mode for CRS
    0: unprivileged
    1: privileged
  11. Bit 19 I3C1PRIV : privileged access mode for I3C1
    0: unprivileged
    1: privileged
  12. Bit 18 I2C2PRIV : privileged access mode for I2C2
    0: unprivileged
    1: privileged
  13. Bit 17 I2C1PRIV : privileged access mode for I2C1
    0: unprivileged
    1: privileged
  14. Bit 16 UART5PRIV : privileged access mode for UART5
    0: unprivileged
    1: privileged
  15. Bit 15 UART4PRIV : privileged access mode for UART4
    0: unprivileged
    1: privileged
  1. Bit 14 USART3PRIV : privileged access mode for USART3
    0: unprivileged
    1: privileged
  2. Bit 13 USART2PRIV : privileged access mode for USART2
    0: unprivileged
    1: privileged
  3. Bit 12 SPI3PRIV : privileged access mode for SPI3
    0: unprivileged
    1: privileged
  4. Bit 11 SPI2PRIV : privileged access mode for SPI2
    0: unprivileged
    1: privileged
  5. Bit 10 IWDGPRIV : privileged access mode for IWDG
    0: unprivileged
    1: privileged
  6. Bit 9 WWDGPRIV : privileged access mode for WWDG
    0: unprivileged
    1: privileged
  7. Bit 8 TIM14PRIV : privileged access mode for TIM14
    0: unprivileged
    1: privileged
  8. Bit 7 TIM13PRIV : privileged access mode for TIM13
    0: unprivileged
    1: privileged
  9. Bit 6 TIM12PRIV : privileged access mode for TIM12
    0: unprivileged
    1: privileged
  10. Bit 5 TIM7PRIV : privileged access mode for TIM7
    0: unprivileged
    1: privileged
  11. Bit 4 TIM6PRIV : privileged access mode for TIM6
    0: unprivileged
    1: privileged
  12. Bit 3 TIM5PRIV : privileged access mode for TIM5
    0: unprivileged
    1: privileged
  13. Bit 2 TIM4PRIV : privileged access mode for TIM4
    0: unprivileged
    1: privileged
  14. Bit 1 TIM3PRIV : privileged access mode for TIM3
    0: unprivileged
    1: privileged
  15. Bit 0 TIM2PRIV : privileged access mode for TIM2
    0: unprivileged
    1: privileged

5.6.6 GTZC1 TZSC privilege configuration register 2 (GTZC1_TZSC_PRIVCFG2)

Address offset: 0x024

Reset value: 0x0000 0000

Write-privileged access only.

This register can be read or written only by a secure privileged transaction when the corresponding GTZC1_TZSC_SECCFGR signal is set to 1. If a given SEC bit is not set, the equivalent PRIV bit can be read/written by a non-secure privileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privileged or not.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM5
PRIV
LPTIM4
PRIV
LPTIM3
PRIV
LPTIM1
PRIV
I2C4PR
IV
I2C3PR
IV
LPUART
1PRIV
SPI5P
RIV
Res.Res.Res.Res.USBPR
IV
SAI2P
RIV
SAI1P
RIV
SPI6P
RIV
rwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
SPI4P
RIV
TIM17P
RIV
TIM16P
RIV
TIM15P
RIV
USART
1PRIV
TIM8P
RIV
SPI1P
RIV
TIM1P
RIV
Res.Res.Res.Res.Res.UCPDP
RIV
FDCAN
2PRIV
FDCAN
1PRIV
rwrwrwrwrwrwrwrwrwrwrw

Bit 31 LPTIM5PRIV : privileged access mode for LPTIM5

0: unprivileged

1: privileged

Bit 30 LPTIM4PRIV : privileged access mode for LPTIM4

0: unprivileged

1: privileged

Bit 29 LPTIM3PRIV : privileged access mode for LPTIM3

0: unprivileged

1: privileged

Bit 28 LPTIM1PRIV : privileged access mode for LPTIM1

0: unprivileged

1: privileged

Bit 27 I2C4PRIV : privileged access mode for I2C4

0: unprivileged

1: privileged

Bit 26 I2C3PRIV : privileged access mode for I2C3

0: unprivileged

1: privileged

Bit 25 LPUART1PRIV : privileged access mode for LPUART

0: unprivileged

1: privileged

Bit 24 SPI5PRIV : privileged access mode for SPI5

0: unprivileged

1: privileged

Bits 23:20 Reserved, must be kept at reset value.

Bit 19 USBPRIV : privileged access mode for USB

0: unprivileged

1: privileged

Bit 18 SAI2PRIV : privileged access mode for SAI2

0: unprivileged

1: privileged

Bit 17 SAI1PRIV : privileged access mode for SAI1

0: unprivileged

1: privileged

Bit 16 SPI6PRIV : privileged access mode for SPI6

0: unprivileged

1: privileged

Bit 15 SPI4PRIV : privileged access mode for SPI4

0: unprivileged

1: privileged

Bit 14 TIM17PRIV : privileged access mode for TIM17

0: unprivileged

1: privileged

Bit 13 TIM16PRIV : privileged access mode for TIM16

0: unprivileged

1: privileged

Bit 12 TIM15PRIV : privileged access mode for TIM15

0: unprivileged

1: privileged

Bit 11 USART1PRIV : privileged access mode for USART1

0: unprivileged

1: privileged

Bit 10 TIM8PRIV : privileged access mode for TIM8

0: unprivileged

1: privileged

Bit 9 SPI1PRIV : privileged access mode for SPI1

0: unprivileged

1: privileged

Bit 8 TIM1PRIV : privileged access mode for TIM1

0: unprivileged

1: privileged

Bits 7:3 Reserved, must be kept at reset value.

Bit 2 UCPDPRIV : privileged access mode for UCPD

0: unprivileged

1: privileged

Bit 1 FDCAN2PRIV : privileged access mode for FDCAN2

0: unprivileged

1: privileged

Bit 0 FDCAN1PRIV : privileged access mode for FDCAN1

0: unprivileged

1: privileged

5.6.7 GTZC1 TZSC privilege configuration register 3 (GTZC1_TZSC_PRIVCFGR3)

Address offset: 0x028

Reset value: 0x0000 0000

Write-privileged access only.

This register can be read or written only by a secure privileged transaction when the corresponding GTZC1_TZSC_SECCFGR signal is set to 1. If a given SEC bit is not set, the equivalent PRIV bit can be read/written by a non-secure privileged transaction.

Read accesses are authorized for any type of transactions, secure or not, privileged or not.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.Res.Res.Res.RAMCFG
PRIV
Res.OCTO
SPI1
PRIV
FMC
PRIV
SDMMC
C2
PRIV
SDMMC
C1
PRIV
PKA
PRIV
SAES
PRIV
RNG
PRIV
HASH
PRIV
AES
PRIV
rwrwrwrwrwrwrwrwrwrw
1514131211109876543210
DCMI
PRIV
ADC12
PRIV
DCACHE
PRIV
ICACHE
PRIV
ETH
PRIV
FMAC
PRIV
CORDIC
PRIV
CRC
PRIV
Res.Res.Res.Res.Res.I3C2
PRIV
VREFBUF
PRIV
LPTIM6
PRIV
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:27 Reserved, must be kept at reset value.

Bit 26 RAMCFGPRIV : privileged access mode for RAMSCFG

0: unprivileged

1: privileged

Bit 25 Reserved, must be kept at reset value.

Bit 24 OCTOSPI1PRIV : privileged access mode for OCTOSPI1

0: unprivileged

1: privileged

Bit 23 FMCPRIV : privileged access mode for FMC

0: unprivileged

1: privileged

Bit 22 SDMMC2PRIV : privileged access mode for SDMMC2

0: unprivileged

1: privileged

Bit 21 SDMMC1PRIV : privileged access mode for SDMMC1

0: unprivileged

1: privileged

  1. Bit 20 PKAPRIV : privileged access mode for PKA
    0: unprivileged
    1: privileged
  2. Bit 19 SAESPRIV : privileged access mode for SAES
    0: unprivileged
    1: privileged
  3. Bit 18 RNGPRIV : privileged access mode for RNG
    0: unprivileged
    1: privileged
  4. Bit 17 HASHPRIV : privileged access mode for HASH
    0: unprivileged
    1: privileged
  5. Bit 16 AESPRIV : privileged access mode for AES
    0: unprivileged
    1: privileged
  6. Bit 15 DCMIPRIV : privileged access mode for DCMI
    0: unprivileged
    1: privileged
  7. Bit 14 ADC12PRIV : privileged access mode for ADC1 and ADC2
    0: unprivileged
    1: privileged
  8. Bit 13 DCACHEPRIV : privileged access mode for DCACHE
    0: unprivileged
    1: privileged
  9. Bit 12 ICACHEPRIV : privileged access mode for ICACHE
    0: unprivileged
    1: privileged
  10. Bit 11 ETHPRIV : privileged access mode for register of ETH
    0: unprivileged
    1: privileged
  11. Bit 10 FMACPRIV : privileged access mode for FMAC
    0: unprivileged
    1: privileged
  12. Bit 9 CORDICPRIV : privileged access mode for CORDIC
    0: unprivileged
    1: privileged
  13. Bit 8 CRCPRIV : privileged access mode for CRC
    0: unprivileged
    1: privileged
  14. Bits 7:3 Reserved, must be kept at reset value.
  15. Bit 2 I3C2PRIV : privileged access mode for I3C2
    0: unprivileged
    1: privileged

Bit 1 VREFBUFPRIV : privileged access mode for VREFBUF

0: unprivileged

1: privileged

Bit 0 LPTIM6PRIV : privileged access mode for LPTIM6

0: unprivileged

1: privileged

5.6.8 GTZC1 TZSC memory x subregion A watermark configuration register (GTZC1_TZSC_MPCWMxACFGR)

Address offset: 0x40 + 0x10 *(x - 1) (x = 1 to 4)

Reset value: 0x0000 0000

Secure privilege access only.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.PRIVSECRes.Res.Res.Res.Res.Res.SRLOCKSREN
rwrwrsrw

Bits 31:10 Reserved, must be kept at reset value.

Bit 9 PRIV : Privileged subregion A of base region x

This bit is taken into account only if SREN is set.

0: Privileged and unprivileged accesses are granted in subregion A.

1: Only privileged accesses are granted in subregion A of region x.

Bit 8 SEC : Secure subregion A of base region x

This bit is taken into account only if SREN is set.

0: Only non-secure data accesses are granted to subregion A of region x.

1: Only secure data accesses are granted to subregion A of region x.

Bits 7:2 Reserved, must be kept at reset value.

Bit 1 SRLOCK : Subregion A lock

This bit, once set, can be cleared only by a system reset.

0: GTZC1_TZSC_MPCWMxCFGR, GTZC1_TZSC_MPCWMxAR and GTZC1_TZSC_MPCWMxBR can be written.

1: Writes to GTZC1_TZSC_MPCWMxCFGR, GTZC1_TZSC_MPCWMxAR and GTZC1_TZSC_MPCWMxBR are ignored.

Bit 0 SREN : Subregion A enable

0: subregion A is disabled. Access control of base region x applies to any access between this subregion start- and end-addresses.

1: subregion A of region x is enabled. Access control defined in GTZC1_TZSC_MPCWMxCFGR applies to any access between this subregion start- and end-addresses, defined in GTZC1_TZSC_MPCWMxAR and GTZC1_TZSC_MPCWMxBR.

Note: Watermark controlled external memories start fully non-secure/unprivileged at reset when TZEN = 0xC3. When TZEN = 0xB4, they start fully secure/fully privileged (inverted reset-value).

5.6.9 GTZC1 TZSC memory x subregion A watermark register (GTZC1_TZSC_MPCWMxAR)

Address offset: \( 0x44 + 0x10 \times (x - 1) \) ( \( x = 1 \) to \( 4 \) )

Reset value: 0x0000 0000

The given reset value is valid when TZEN = 0xB4. The reset value is 0x0800 0000 when TZEN = 0xC3.

Secure privilege access only.

When SUBA_START + SUBA_LENGTH is higher than the maximum size allowed for the memory, a saturation of SUBA_LENGTH is applied automatically.

When an overlap of subregion A and B exists, secure/privileged attributes of both subregions apply on the common section (see Section 5.4.3 )

31302928272625242322212019181716
Res.Res.Res.Res.SUBA_LENGTH[11:0]
rwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
Res.Res.Res.Res.Res.SUBA_START[10:0]
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:28 Reserved, must be kept at reset value.

Bits 27:16 SUBA_LENGTH[11:0] : Length of subregion A in region x

This field defines the length of the subregion A, to be multiplied by the granularity defined in Table 29 .

When SUBA_START + SUBA_LENGTH is higher than the maximum size allowed for the memory, a saturation of SUBA_LENGTH is applied automatically. If SUBA_LENGTH = 0, subregion A is disabled (SREN bit in GTZC1_TZSC_MPCMWxACFGR is cleared).

Bits 15:11 Reserved, must be kept at reset value.

Bits 10:0 SUBA_START[10:0] : Start of subregion A in region x

This field defines the address offset of the subregion A, to be multiplied by the granularity defined in Table 29 , versus the start of the region x.

Watermark controlled external memories start fully non-secure at reset when TZEN = 0xC3. When TZEN = 0xB4, they start fully secure (inverted reset value).

5.6.10 GTZC1 TZSC memory x subregion B watermark configuration register (GTZC1_TZSC_MPCWMxBCFGR)

Address offset: \( 0x48 + 0x10 \times (x - 1) \) ( \( x = 1 \) to \( 4 \) )

Reset value: 0x0000 0000

Secure privilege access only.

31302928272625242322212019181716
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
1514131211109876543210
Res.Res.Res.Res.Res.Res.PRIVSECRes.Res.Res.Res.Res.Res.SRLOCKSREN
rwrwrsrw

Bits 31:10 Reserved, must be kept at reset value.

Bit 9 PRIV : Privileged subregion B of base region x

This bit is taken into account only if SREN is set.

0: Privileged and unprivileged accesses are granted in subregion A.

1: Only privileged accesses are granted in subregion A of region x.

Bit 8 SEC : Secure subregion B of base region x

This bit is taken into account only if SREN is set.

0: Only non-secure data accesses are granted to subregion A of region x.

1: Only secure data accesses are granted to subregion A of region x.

Bits 7:2 Reserved, must be kept at reset value.

Bit 1 SRLOCK : Subregion B lock

This bit, once set, can be cleared only by a system reset.

0: GTZC1_TZSC_MPCWMxCFGR, GTZC1_TZSC_MPCWMxAR and GTZC1_TZSC_MPCWMxBR can be written.

1: Writes to GTZC1_TZSC_MPCWMxCFGR, GTZC1_TZSC_MPCWMxAR and GTZC1_TZSC_MPCWMxBR are ignored.

Bit 0 SREN : Subregion B enable

0: subregion B is disabled. Access control of base region x applies to any access between this subregion start- and end-addresses.

1: subregion B of region x is enabled. Access control defined in GTZC1_TZSC_MPCWMx_CFGR applies to any access between this subregion start- and end-addresses, defined in GTZC1_TZSC_MPCWMxAR and GTZC1_TZSC_MPCWMxBR.

Note: Watermark controlled external memories start fully non-secure/unprivileged at reset when TZEN = 0xC3. When TZEN = 0xB4, they start fully secure/fully privileged (inverted reset-value).

5.6.11 GTZC1 TZSC memory x subregion B watermark register (GTZC1_TZSC_MPCWMxBR)

Address offset: 0x4C + 0x10 *(x - 1) (x = 1 to 4)

Reset value: 0x0000 0000

The given reset value is valid when TZEN = 0xB4. The reset value is 0x0800 0000 when TZEN = 0xC3.

Secure privilege access only.

When SUBB_START + SUBB_LENGTH is higher than the maximum size allowed for the memory, a saturation of SUBB_LENGTH is applied automatically.

When an overlap of subregion A and B exists, secure/privileged attributes of both subregions apply on the common section (see Section 5.4.3 )

31302928272625242322212019181716
Res.Res.Res.Res.SUBB_LENGTH[11:0]
rwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
Res.Res.Res.Res.Res.SUBB_START[10:0]
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:28 Reserved, must be kept at reset value.

Bits 27:16 SUBB_LENGTH[11:0] : Length of subregion B in region x

This field defines the length of the subregion B, to be multiplied by the granularity defined in Table 29 .

When SUBB_START + SUBB_LENGTH is higher than the maximum size allowed for the memory, a saturation of SUBB_LENGTH is applied automatically.

If SUBB_LENGTH = 0, the subregion B is disabled (SREN bit in GTZC1_TZSC_MPCMWxBCFGR is cleared).

Bits 15:11 Reserved, must be kept at reset value.

Bits 10:0 SUBB_START[10:0] : Start of subregion B in region x

This field defines the address offset of the subregion B, to be multiplied by the granularity defined in Table 29 , versus the start of the region x.

Wtermark controlled external memories start fully non-secure at reset when TZEN = 0xC3.

When TZEN = 0xB4, they start fully secure (inverted reset value).

5.6.12 GTZC1 TZSC register map

Table 36. GTZC1 TZSC register map and reset values

OffsetRegister313029282726252423222120191817161514131211109876543210
0x000GTZC1_TZSC_CRResResResResResResResResResResResResResResResResResResResResResResResResResResResResResResRes0LCK
Reset value
0x004-0x00CReservedReserved
0x010GTZC1_TZSC_SECCFGGR1LPTIM25SECDTSSECUART12SECUART95SECUART85SECUART75SECDAC15SECHDMI2CEC5SECUSART115SECUSART110SECUSART65SECCRSSECI3C15SECI2C25SECI2C15SECUART55SECUART45SECUSART35SECUSART25SECSPI35SECSPI25SECIWDG5SECWWDG5SECTIM145SECTIM135SECTIM1125SECTIM75SECTIM65SECTIM55SECTIM45SECTIM35SECTIM25SEC
Reset value00000000000000000000000000000000
0x014GTZC1_TZSC_SECCFGGR2LPTIM55SECLPTIM45SECLPTIM35SECLPTIM15SECI2C45SECI2C35SECLPUART15SECSPI55SECResResResResUSB5SECSAI25SECSAI15SECSPI65SECSPI45SECTIM175SECTIM165SECTIM155SECUSART15SECTIM85SECSPI15SECTIM15SECRes.Res.Res.Res.Res.Res.UCPD5SECFDCAN25SEC
Reset value0000000000000000000000
0x018GTZC1_TZSC_SECCFGGR3ResResResResResRAMCFG5SECResOCTOSPI15SECFMC5SECSDMMC25SECSDMMC15SECPKASECSAES5SECRNG5SECHASH5SECAES5SECDCMI5SECADC125SECDCACHEHE5SECICACHEHE5SECETH5SECFMAC5SECCORDIC5SECCRC5SECRes.Res.Res.Res.Res.Res.ICG25SECVREFBUF5SEC
Reset value00000000000000000000
0x01CReservedReserved
0x020GTZC1_TZSC_PRIVCFGGR1LPTIM2PRIVDTSPRIVUART12PRIVUART9PRIVUART8PRIVUART7PRIVDAC1PRIVHDMI2CECPRIVUSART11PRIVUSART10PRIVUSART6PRIVCRSPRIVI3C1PRIVI2C2PRIVI2C1PRIVUART5PRIVUART4PRIVUSART3PRIVUSART2PRIVSPI3PRIVSPI2PRIVIWDGPRIVWWDGPRIVTIM14PRIVTIM13PRIVTIM112PRIVTIM7PRIVTIM6PRIVTIM5PRIVTIM4PRIVTIM3PRIVTIM2PRIV
Reset value0000000000000000000000000000000
0x024GTZC1_TZSC_PRIVCFGGR2LPTIM5PRIVLPTIM4PRIVLPTIM3PRIVLPTIM1PRIVI2C4PRIVI2C3PRIVLPUART1PRIVSPI5PRIVResResResResUSBPRIVSAI2PRIVSAI1PRIVSPI6PRIVSPI4PRIVTIM17PRIVTIM16PRIVTIM15PRIVUSART1PRIVTIM8PRIVSPI1PRIVTIM1PRIVRes.Res.Res.Res.Res.Res.UCPDPRIVFDCAN2PRIV
Reset value0000000000000000000000
0x028GTZC1_TZSC_PRIVCFGGR3ResResResResResRAMCFGPRIVResOCTOSPI1PRIVFMCPRIVSDMMC2PRIVSDMMC1PRIVPKAPRIVSAESPRIVRNGPRIVHASHPRIVAESPRIVDCMIPRIVADC12PRIVDCACHEPRIVICACHEPRIVETHPRIVFMACPRIVCORDICPRIVCRCPRIVRes.Res.Res.Res.Res.Res.ICG2PRIVVREFBUFPRIV
Reset value00000000000000000000
0x02C-0x03CReservedReserved
0x040GTZC1_TZSC_MPCWM1ACFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECRes.Res.Res.Res.Res.Res.Res.SRLOCK
Reset value0000
0x044GTZC1_TZSC_MPCWM1ARResResResResSUBA_LENGTH[11:0]ResResResResResSUBA_START[10:0]
Reset value0000000000000000000000
0x048GTZC1_TZSC_MPCWM1BCFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECRes.Res.Res.Res.Res.Res.Res.SRLOCK
Reset value0000

Table 36. GTZC1 TZSC register map and reset values (continued)

OffsetRegister313029282726252423222120191817161514131211109876543210
0x04CGTZC1_TZSC_MPCWM1BRResResResResSUBB_LENGTH[11:0]ResResResResResSUBB_START[10:0]
Reset value000000000000000000000000
0x050GTZC1_TZSC_MPCWM2ACFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECResResResResResResResSRLOCKSREN
Reset value0000
0x054GTZC1_TZSC_MPCWM2ARResResResResSUBA_LENGTH[11:0]ResResResResResSUBA_START[10:0]
Reset value000000000000000000000000
0x058GTZC1_TZSC_MPCWM2BCFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECResResResResResResResSRLOCKSREN
Reset value0000
0x05CGTZC1_TZSC_MPCWM2BRResResResResSUBB_LENGTH[11:0]ResResResResResSUBB_START[10:0]
Reset value000000000000000000000000
0x060GTZC1_TZSC_MPCWM3ACFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECResResResResResResResSRLOCKSREN
Reset value0000
0x064GTZC1_TZSC_MPCWM3ARResResResResSUBA_LENGTH[11:0]ResResResResResSUBA_START[10:0]
Reset value000000000000000000000000
0x068GTZC1_TZSC_MPCWM3BCFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECResResResResResResResSRLOCKSREN
Reset value0000
0x06CGTZC1_TZSC_MPCWM3BRResResResResSUBB_LENGTH[11:0]ResResResResResSUBB_START[10:0]
Reset value000000000000000000000000
0x070GTZC1_TZSC_MPCWM4ACFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECResResResResResResResSRLOCKSREN
Reset value0000
0x074GTZC1_TZSC_MPCWM4ARResResResResSUBA_LENGTH[11:0]ResResResResResSUBA_START[10:0]
Reset value000000000000000000000000
0x078GTZC1_TZSC_MPCWM4BCFGGRResResResResResResResResResResResResResResResResResResResResResResPRIVSECResResResResResResResSRLOCKSREN
Reset value0000
0x07CGTZC1_TZSC_MPCWM4BRResResResResSUBB_LENGTH[11:0]ResResResResResSUBB_START[10:0]
Reset value000000000000000000000000
Refer to Table 28: GTZC1 sub-block address offset .

5.7 GTZC1 TZIC registers

All registers are accessed only by words (32-bit).

5.7.1 GTZC1 TZIC interrupt enable register 1 (GTZC1_TZIC_IER1)

Address offset: 0x000

Reset value: 0x0000 0000

Secure privileged access only.

This register is used to enable interrupt of illegal access.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM2 IEDTSIEUART1 2IEUART9 IEUART8 IEUART7 IEDAC1 IEHDMICE IEUSART 11IEUSART 10IEUSART 6IECRSIEI3C1IEI2C2IEI2C1IEUART5 IE
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

1514131211109876543210
UART4 IEUSART 3IEUSART 2IESPI3IESPI2IEIWDG IEWWDG IETIM14 IETIM13 IETIM12 IETIM7 IETIM6 IETIM5 IETIM4 IETIM3 IETIM2 IE
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bit 31 LPTIM2IE : illegal access interrupt enable for LPTIM2

0: interrupt disabled

1: interrupt enabled

Bit 30 DTSIE : illegal access interrupt enable for DTS

0: interrupt disabled

1: interrupt enabled

Bit 29 UART12IE : illegal access interrupt enable for UART12

0: interrupt disabled

1: interrupt enabled

Bit 28 UART9IE : illegal access interrupt enable for UART9

0: interrupt disabled

1: interrupt enabled

Bit 27 UART8IE : illegal access interrupt enable for UART8

0: interrupt disabled

1: interrupt enabled

Bit 26 UART7IE : illegal access interrupt enable for UART7

0: interrupt disabled

1: interrupt enabled

Bit 25 DAC1IE : illegal access interrupt enable for DAC1

0: interrupt disabled

1: interrupt enabled

Bit 24 HDMICEIE : illegal access interrupt enable for HDMICE

0: interrupt disabled

1: interrupt enabled

  1. Bit 23 USART11IE : illegal access interrupt enable for USART11
    0: interrupt disabled
    1: interrupt enabled
  2. Bit 22 USART10IE : illegal access interrupt enable for USART10
    0: interrupt disabled
    1: interrupt enabled
  3. Bit 21 USART6IE : illegal access interrupt enable for USART6
    0: interrupt disabled
    1: interrupt enabled
  4. Bit 20 CRSIE : illegal access interrupt enable for CRS
    0: interrupt disabled
    1: interrupt enabled
  5. Bit 19 I3C1IE : illegal access interrupt enable for I3C1
    0: interrupt disabled
    1: interrupt enabled
  6. Bit 18 I2C2IE : illegal access interrupt enable for I2C2
    0: interrupt disabled
    1: interrupt enabled
  7. Bit 17 I2C1IE : illegal access interrupt enable for I2C1
    0: interrupt disabled
    1: interrupt enabled
  8. Bit 16 UART5IE : illegal access interrupt enable for UART5
    0: interrupt disabled
    1: interrupt enabled
  9. Bit 15 UART4IE : illegal access interrupt enable for UART4
    0: interrupt disabled
    1: interrupt enabled
  10. Bit 14 USART3IE : illegal access interrupt enable for USART3
    0: interrupt disabled
    1: interrupt enabled
  11. Bit 13 USART2IE : illegal access interrupt enable for USART2
    0: interrupt disabled
    1: interrupt enabled
  12. Bit 12 SPI3IE : illegal access interrupt enable for SPI3
    0: interrupt disabled
    1: interrupt enabled
  13. Bit 11 SPI2IE : illegal access interrupt enable for SPI2
    0: interrupt disabled
    1: interrupt enabled
  14. Bit 10 IWDGIE : illegal access interrupt enable for IWDG
    0: interrupt disabled
    1: interrupt enabled
  15. Bit 9 WWDGIE : illegal access interrupt enable for WWDG
    0: interrupt disabled
    1: interrupt enabled
  1. Bit 8 TIM14IE : illegal access interrupt enable for TIM14
    0: interrupt disabled
    1: interrupt enabled
  2. Bit 7 TIM13IE : illegal access interrupt enable for TIM13
    0: interrupt disabled
    1: interrupt enabled
  3. Bit 6 TIM12IE : illegal access interrupt enable for TIM12
    0: interrupt disabled
    1: interrupt enabled
  4. Bit 5 TIM7IE : illegal access interrupt enable for TIM7
    0: interrupt disabled
    1: interrupt enabled
  5. Bit 4 TIM6IE : illegal access interrupt enable for TIM6
    0: interrupt disabled
    1: interrupt enabled
  6. Bit 3 TIM5IE : illegal access interrupt enable for TIM5
    0: interrupt disabled
    1: interrupt enabled
  7. Bit 2 TIM4IE : illegal access interrupt enable for TIM4
    0: interrupt disabled
    1: interrupt enabled
  8. Bit 1 TIM3IE : illegal access interrupt enable for TIM3
    0: interrupt disabled
    1: interrupt enabled
  9. Bit 0 TIM2IE : illegal access interrupt enable for TIM2
    0: interrupt disabled
    1: interrupt enabled

5.7.2 GTZC1 TZIC interrupt enable register 2 (GTZC1_TZIC_IER2)

Address offset: 0x004

Reset value: 0x0000 0000

Secure privileged access only.

This register is used to enable interrupt of illegal access.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM5 IELPTIM4 IELPTIM3 IELPTIM1 IEI2C4IEI2C3IELPUART1IESPI5IERes.Res.Res.Res.USBIESAI2IESAI1IESPI6IE
rwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
SPI4IETIM17IETIM16IETIM15IEUSART1IETIM8IESPI1IETIM1IERes.Res.Res.Res.Res.UCPDI EFDCAN2IEFDCAN1IE
rwrwrwrwrwrwrwrwrwrwrw

Bit 31 LPTIM5IE : illegal access interrupt enable for LPTIM5

0: interrupt disabled

1: interrupt enabled

Bit 30 LPTIM4IE : illegal access interrupt enable for LPTIM4

0: interrupt disabled

1: interrupt enabled

Bit 29 LPTIM3IE : illegal access interrupt enable for LPTIM3

0: interrupt disabled

1: interrupt enabled

Bit 28 LPTIM1IE : illegal access interrupt enable for LPTIM1

0: interrupt disabled

1: interrupt enabled

Bit 27 I2C4IE : illegal access interrupt enable for I2C4

0: interrupt disabled

1: interrupt enabled

Bit 26 I2C3IE : illegal access interrupt enable for I2C3

0: interrupt disabled

1: interrupt enabled

Bit 25 LPUART1IE : illegal access interrupt enable for LPUART

0: interrupt disabled

1: interrupt enabled

Bit 24 SPI5IE : illegal access interrupt enable for SPI5

0: interrupt disabled

1: interrupt enabled

Bits 23:20 Reserved, must be kept at reset value.

Bit 19 USBIE : illegal access interrupt enable for USB

0: interrupt disabled

1: interrupt enabled

Bit 18 SAI2IE : illegal access interrupt enable for SAI2

0: interrupt disabled

1: interrupt enabled

Bit 17 SAI1IE : illegal access interrupt enable for SAI1

0: interrupt disabled

1: interrupt enabled

Bit 16 SPI6IE : illegal access interrupt enable for SPI6

0: interrupt disabled

1: interrupt enabled

Bit 15 SPI4IE : illegal access interrupt enable for SPI4

0: interrupt disabled

1: interrupt enabled

Bit 14 TIM17IE : illegal access interrupt enable for TIM17

0: interrupt disabled

1: interrupt enabled

  1. Bit 13 TIM16IE : illegal access interrupt enable for TIM16
    0: interrupt disabled
    1: interrupt enabled
  2. Bit 12 TIM15IE : illegal access interrupt enable for TIM15
    0: interrupt disabled
    1: interrupt enabled
  3. Bit 11 USART1IE : illegal access interrupt enable for USART1
    0: interrupt disabled
    1: interrupt enabled
  4. Bit 10 TIM8IE : illegal access interrupt enable for TIM8
    0: interrupt disabled
    1: interrupt enabled
  5. Bit 9 SPI1IE : illegal access interrupt enable for SPI1
    0: interrupt disabled
    1: interrupt enabled
  6. Bit 8 TIM1IE : illegal access interrupt enable for TIM1
    0: interrupt disabled
    1: interrupt enabled
  7. Bits 7:3 Reserved, must be kept at reset value.
  8. Bit 2 UCPDIE : illegal access interrupt enable for UCPD
    0: interrupt disabled
    1: interrupt enabled
  9. Bit 1 FDCAN2IE : illegal access interrupt enable for FDCAN2
    0: interrupt disabled
    1: interrupt enabled
  10. Bit 0 FDCAN1IE : illegal access interrupt enable for FDCAN1
    0: interrupt disabled
    1: interrupt enabled

5.7.3 GTZC1 TZIC interrupt enable register 3 (GTZC1_TZIC_IER3)

Address offset: 0x008

Reset value: 0x0000 0000

Secure privileged access only.

This register is used to enable interrupt of illegal access.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.Res.Res.Res.RAMCFGIERes.OCTOSPI1IEFMICIESDMMC2IESDMMC1IEPKAIESAESIERNGIEHASHIEAESIE
rwrwrwrwrwrwrwrwrwrw
1514131211109876543210
DCMIIIEADC12IEDCACHEIEICACHEIEETHIEFMACIECORDICIECRCIERes.Res.Res.Res.Res.I3C2IEVREFBUFIELPTIM6IE
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:27 Reserved, must be kept at reset value.

Bit 26 RAMCFGIE : illegal access interrupt enable for RAMSCFG

0: interrupt disabled

1: interrupt enabled

Bit 25 Reserved, must be kept at reset value.

Bit 24 OCTOSPI1IE : illegal access interrupt enable for OCTOSPI1

0: interrupt disabled

1: interrupt enabled

Bit 23 FMICIE : illegal access interrupt enable for FMC

0: interrupt disabled

1: interrupt enabled

Bit 22 SDMMC2IE : illegal access interrupt enable for SDMMC2

0: interrupt disabled

1: interrupt enabled

Bit 21 SDMMC1IE : illegal access interrupt enable for SDMMC1

0: interrupt disabled

1: interrupt enabled

Bit 20 PKAIE : illegal access interrupt enable for PKA

0: interrupt disabled

1: interrupt enabled

Bit 19 SAESIE : illegal access interrupt enable for SAES

0: interrupt disabled

1: interrupt enabled

Bit 18 RNGIE : illegal access interrupt enable for RNG

0: interrupt disabled

1: interrupt enabled

Bit 17 HASHIE : illegal access interrupt enable for HASH

0: interrupt disabled

1: interrupt enabled

Bit 16 AESIE : illegal access interrupt enable for AES

0: interrupt disabled

1: interrupt enabled

Bit 15 DCMIIIE : illegal access interrupt enable for DCMI

0: interrupt disabled

1: interrupt enabled

  1. Bit 14 ADC12IE : illegal access interrupt enable for ADC1 and ADC2
    0: interrupt disabled
    1: interrupt enabled
  2. Bit 13 DCACHEIE : illegal access interrupt enable for DCACHE
    0: interrupt disabled
    1: interrupt enabled
  3. Bit 12 ICACHEIE : illegal access interrupt enable for ICACHE
    0: interrupt disabled
    1: interrupt enabled
  4. Bit 11 ETHIE : illegal access interrupt enable for register of ETH
    0: interrupt disabled
    1: interrupt enabled
  5. Bit 10 FMACIE : illegal access interrupt enable for FMAC
    0: interrupt disabled
    1: interrupt enabled
  6. Bit 9 CORDICIE : illegal access interrupt enable for CORDIC
    0: interrupt disabled
    1: interrupt enabled
  7. Bit 8 CRCEIE : illegal access interrupt enable for CRC
    0: interrupt disabled
    1: interrupt enabled
  8. Bits 7:3 Reserved, must be kept at reset value.
  9. Bit 2 I3C2IE : illegal access interrupt enable for I3C2
    0: interrupt disabled
    1: interrupt enabled
  10. Bit 1 VREFBUFIE : illegal access interrupt enable for VREFBUF
    0: interrupt disabled
    1: interrupt enabled
  11. Bit 0 LPTIM6IE : illegal access interrupt enable for LPTIM6
    0: interrupt disabled
    1: interrupt enabled

5.7.4 GTZC1 TZIC interrupt enable register 4 (GTZC1_TZIC_IER4)

Address offset: 0x00C

Reset value: 0x0000 0000

Secure privileged access only.

This register is used to enable interrupt of illegal access.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.MPCBB3_RE
GIE
SRAM3
IE
MPCBB2_RE
GIE
SRAM2
IE
MPCBB1_RE
GIE
SRAM1
IE
Res.Res.Res.BKPSR
AMIE
FMC_
MEMIE
OCTOSPI1_M
EMIE
TZIC1I
E
TZSC1I
E
rwrwrwrwrwrwrwrwrwrwrw

1514131211109876543210
Res.Res.Res.Res.EXTIIECCIEPWRIETAMPI
E
RTCIESBSIERes.OTFDE
C1IE
FLASHI
E
FLASH
_REGI
E
GPDM
A2IE
GPDM
A1IE
rwrwrwrwrwrwrwrwrwrwrw

Bits 31:30 Reserved, must be kept at reset value.

Bit 29 MPCBB3_REGIE : illegal access interrupt enable for MPCBB3 registers

0: interrupt disabled

1: interrupt enabled

Bit 28 SRAM3IE : illegal access interrupt enable for SRAM3

0: interrupt disabled

1: interrupt enabled

Bit 27 MPCBB2_REGIE : illegal access interrupt enable for MPCBB2 registers

0: interrupt disabled

1: interrupt enabled

Bit 26 SRAM2IE : illegal access interrupt enable for SRAM2

0: interrupt disabled

1: interrupt enabled

Bit 25 MPCBB1_REGIE : illegal access interrupt enable for MPCBB1 registers

0: interrupt disabled

1: interrupt enabled

Bit 24 SRAM1IE : illegal access interrupt enable for SRAM1

0: interrupt disabled

1: interrupt enabled

Bits 23:21 Reserved, must be kept at reset value.

Bit 20 BKPSRAMIE : illegal access interrupt enable for MPCWM4 (BKPSRAM) memory bank

0: interrupt disabled

1: interrupt enabled

Bit 19 FMC_MEMIE : illegal access interrupt enable for MPCWM2 (FMC_NOR bank), MPCWM3 (FMC_NAND bank and FMC_SDRAM bank 1), and MPCWM4 (FMC_SDRAM bank 2)

0: interrupt disabled

1: interrupt enabled

Bit 18 OCTOSPI1_MEMIE : illegal access interrupt enable for MPCWM1 (OCTOSPI1) memory bank

0: interrupt disabled

1: interrupt enabled

Bit 17 TZIC1IE : illegal access interrupt enable for GTZC1 TZIC registers

0: interrupt disabled

1: interrupt enabled

Bit 16 TZSC1IE : illegal access interrupt enable for GTZC1 TZSC registers

0: interrupt disabled

1: interrupt enabled

Bits 15:12 Reserved, must be kept at reset value.

Bit 11 EXTIE : illegal access interrupt enable for EXTI

0: interrupt disabled

1: interrupt enabled

Bit 10 RCCIE : illegal access interrupt enable for RCC

0: interrupt disabled

1: interrupt enabled

Bit 9 PWRIE : illegal access interrupt enable for PWR

0: interrupt disabled

1: interrupt enabled

Bit 8 TAMPIE : illegal access interrupt enable for TAMP

0: interrupt disabled

1: interrupt enabled

Bit 7 RTCIE : illegal access interrupt enable for RTC

0: interrupt disabled

1: interrupt enabled

Bit 6 SBSIE : illegal access interrupt enable for SBS

0: interrupt disabled

1: interrupt enabled

Bit 5 Reserved, must be kept at reset value.

Bit 4 OTFDEC1IE : illegal access interrupt enable for OTFDEC1

0: interrupt disabled

1: interrupt enabled

Bit 3 FLASHIE : illegal access interrupt enable for FLASH memory

0: interrupt disabled

1: interrupt enabled

Bit 2 FLASH_REGIE : illegal access interrupt enable for FLASH registers

0: interrupt disabled

1: interrupt enabled

Bit 1 GPDMA2IE : illegal access interrupt enable for GPDMA2

0: interrupt disabled

1: interrupt enabled

Bit 0 GPDMA1IE : illegal access interrupt enable for GPDMA1

0: interrupt disabled

1: interrupt enabled

5.7.5 GTZC1 TZIC status register 1 (GTZC1_TZIC_SR1)

Address offset: 0x010

Reset value: 0x0000 0000

Secure privileged access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM2
F
DTSFUART1
2F
UART9
F
UART8
F
UART7
F
DAC1FHDMIC
ECF
USART
11F
USART
10F
USART
6F
CRSFI3C1FI2C2FI2C1FUART5
F
rrrrrrrrrrrrrrrr
1514131211109876543210
UART4
F
USART
3F
USART
2F
SPI3FSPI2FIWDGFWWDG
F
TIM14FTIM13FTIM12FTIM7FTIM6FTIM5FTIM4FTIM3FTIM2F
rrrrrrrrrrrrrrrr

Bit 31 LPTIM2F : illegal access flag for LPTIM2

0: no illegal access event

1: illegal access event

Bit 30 DTSF : illegal access flag for DTS

0: no illegal access event

1: illegal access event

Bit 29 UART12F : illegal access flag for UART12

0: no illegal access event

1: illegal access event

Bit 28 UART9F : illegal access flag for UART9

0: no illegal access event

1: illegal access event

Bit 27 UART8F : illegal access flag for UART8

0: no illegal access event

1: illegal access event

Bit 26 UART7F : illegal access flag for UART7

0: no illegal access event

1: illegal access event

Bit 25 DAC1F : illegal access flag for DAC1

0: no illegal access event

1: illegal access event

Bit 24 HDMICECF : illegal access flag for HDMICEC

0: no illegal access event

1: illegal access event

Bit 23 USART11F : illegal access flag for USART11

0: no illegal access event

1: illegal access event

Bit 22 USART10F : illegal access flag for USART10

0: no illegal access event

1: illegal access event

Bit 21 USART6F : illegal access flag for USART6

0: no illegal access event

1: illegal access event

  1. Bit 20 CRSF : illegal access flag for CRS
    0: no illegal access event
    1: illegal access event
  2. Bit 19 I3C1F : illegal access flag for I3C1
    0: no illegal access event
    1: illegal access event
  3. Bit 18 I2C2F : illegal access flag for I2C2
    0: no illegal access event
    1: illegal access event
  4. Bit 17 I2C1F : illegal access flag for I2C1
    0: no illegal access event
    1: illegal access event
  5. Bit 16 UART5F : illegal access flag for UART5
    0: no illegal access event
    1: illegal access event
  6. Bit 15 UART4F : illegal access flag for UART4
    0: no illegal access event
    1: illegal access event
  7. Bit 14 USART3F : illegal access flag for USART3
    0: no illegal access event
    1: illegal access event
  8. Bit 13 USART2F : illegal access flag for USART2
    0: no illegal access event
    1: illegal access event
  9. Bit 12 SPI3F : illegal access flag for SPI3
    0: no illegal access event
    1: illegal access event
  10. Bit 11 SPI2F : illegal access flag for SPI2
    0: no illegal access event
    1: illegal access event
  11. Bit 10 IWDGF : illegal access flag for IWDG
    0: no illegal access event
    1: illegal access event
  12. Bit 9 WWDGF : illegal access flag for WWDG
    0: no illegal access event
    1: illegal access event
  13. Bit 8 TIM14F : illegal access flag for TIM14
    0: no illegal access event
    1: illegal access event
  14. Bit 7 TIM13F : illegal access flag for TIM13
    0: no illegal access event
    1: illegal access event
  15. Bit 6 TIM12F : illegal access flag for TIM12
    0: no illegal access event
    1: illegal access event
  1. Bit 5 TIM7F : illegal access flag for TIM7
    0: no illegal access event
    1: illegal access event
  2. Bit 4 TIM6F : illegal access flag for TIM6
    0: no illegal access event
    1: illegal access event
  3. Bit 3 TIM5F : illegal access flag for TIM5
    0: no illegal access event
    1: illegal access event
  4. Bit 2 TIM4F : illegal access flag for TIM4
    0: no illegal access event
    1: illegal access event
  5. Bit 1 TIM3F : illegal access flag for TIM3
    0: no illegal access event
    1: illegal access event
  6. Bit 0 TIM2F : illegal access flag for TIM2
    0: no illegal access event
    1: illegal access event

5.7.6 GTZC1 TZIC status register 2 (GTZC1_TZIC_SR2)

Address offset: 0x014

Reset value: 0x0000 0000

Secure privileged access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
LPTIM5FLPTIM4FLPTIM3FLPTIM1FI2C4FI2C3FLPUART1FSPI5FRes.Res.Res.Res.USBFSAI2FSAI1FSPI6F
rrrrrrrrrrrr
1514131211109876543210
SPI4FTIM17FTIM16FTIM15FUSART1FTIM8FSPI1FTIM1FRes.Res.Res.Res.Res.UCPDFFDCAN2FFDCAN1F
rrrrrrrrrrr
  1. Bit 31 LPTIM5F : illegal access flag for LPTIM5
    0: no illegal access event
    1: illegal access event
  2. Bit 30 LPTIM4F : illegal access flag for LPTIM4
    0: no illegal access event
    1: illegal access event
  3. Bit 29 LPTIM3F : illegal access flag for LPTIM3
    0: no illegal access event
    1: illegal access event

Bit 28 LPTIM1F : illegal access flag for LPTIM1

0: no illegal access event

1: illegal access event

Bit 27 I2C4F : illegal access flag for I2C4

0: no illegal access event

1: illegal access event

Bit 26 I2C3F : illegal access flag for I2C3

0: no illegal access event

1: illegal access event

Bit 25 LPUART1F : illegal access flag for LPUART

0: no illegal access event

1: illegal access event

Bit 24 SPI5F : illegal access flag for SPI5

0: no illegal access event

1: illegal access event

Bits 23:20 Reserved, must be kept at reset value.

Bit 19 USBF : illegal access flag for USB

0: no illegal access event

1: illegal access event

Bit 18 SAI2F : illegal access flag for SAI2

0: no illegal access event

1: illegal access event

Bit 17 SAI1F : illegal access flag for SAI1

0: no illegal access event

1: illegal access event

Bit 16 SPI6F : illegal access flag for SPI6

0: no illegal access event

1: illegal access event

Bit 15 SPI4F : illegal access flag for SPI4

0: no illegal access event

1: illegal access event

Bit 14 TIM17F : illegal access flag for TIM17

0: no illegal access event

1: illegal access event

Bit 13 TIM16F : illegal access flag for TIM16

0: no illegal access event

1: illegal access event

Bit 12 TIM15F : illegal access flag for TIM15

0: no illegal access event

1: illegal access event

Bit 11 USART1F : illegal access flag for USART1

0: no illegal access event

1: illegal access event

Bit 10 TIM8F : illegal access flag for TIM8

0: no illegal access event

1: illegal access event

Bit 9 SPI1F : illegal access flag for SPI1

0: no illegal access event

1: illegal access event

Bit 8 TIM1F : illegal access flag for TIM1

0: no illegal access event

1: illegal access event

Bits 7:3 Reserved, must be kept at reset value.

Bit 2 UCPDF : illegal access flag for UCPD

0: no illegal access event

1: illegal access event

Bit 1 FDCAN2F : illegal access flag for FDCAN2

0: no illegal access event

1: illegal access event

Bit 0 FDCAN1F : illegal access flag for FDCAN1

0: no illegal access event

1: illegal access event

5.7.7 GTZC1 TZIC status register 3 (GTZC1_TZIC_SR3)

Address offset: 0x018

Reset value: 0x0000 0000

Secure privileged access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.Res.Res.Res.RAMCFGFRes.OCTOSPI1FFMCFSDMM C2FSDMM C1FPKAFSAESFRNGFHASHFAESF
rrrrrrrrrr
1514131211109876543210
DCMIFADC12 FDCAC HEFICACH EFETHFFMACFCORDI CFCRCFRes.Res.Res.Res.Res.I3C2FVREFB UFFLPTIM6 F
rrrrrrrrrrr

Bits 31:27 Reserved, must be kept at reset value.

Bit 26 RAMCFGF : illegal access flag for RAMSCFG

0: no illegal access event

1: illegal access event

Bit 25 Reserved, must be kept at reset value.

Bit 24 OCTOSPI1F : illegal access flag for OCTOSPI1

0: no illegal access event

1: illegal access event

  1. Bit 23 FMCF : illegal access flag for FMC
    0: no illegal access event
    1: illegal access event
  2. Bit 22 SDMMC2F : illegal access flag for SDMMC2
    0: no illegal access event
    1: illegal access event
  3. Bit 21 SDMMC1F : illegal access flag for SDMMC1
    0: no illegal access event
    1: illegal access event
  4. Bit 20 PKAF : illegal access flag for PKA
    0: no illegal access event
    1: illegal access event
  5. Bit 19 SAESF : illegal access flag for SAES
    0: no illegal access event
    1: illegal access event
  6. Bit 18 RNGF : illegal access flag for RNG
    0: no illegal access event
    1: illegal access event
  7. Bit 17 HASHF : illegal access flag for HASH
    0: no illegal access event
    1: illegal access event
  8. Bit 16 AESF : illegal access flag for AES
    0: no illegal access event
    1: illegal access event
  9. Bit 15 DCMIF : illegal access flag for DCMI
    0: no illegal access event
    1: illegal access event
  10. Bit 14 ADC12F : illegal access flag for ADC1 and ADC2
    0: no illegal access event
    1: illegal access event
  11. Bit 13 DCACHEF : illegal access flag for DCACHE
    0: no illegal access event
    1: illegal access event
  12. Bit 12 ICACHEF : illegal access flag for ICACHE
    0: no illegal access event
    1: illegal access event
  13. Bit 11 ETHF : illegal access flag for register of ETH
    0: no illegal access event
    1: illegal access event
  14. Bit 10 FMACF : illegal access flag for FMAC
    0: no illegal access event
    1: illegal access event
  15. Bit 9 CORDICF : illegal access flag for CORDIC
    0: no illegal access event
    1: illegal access event

Bit 8 CRCF : illegal access flag for CRC

0: no illegal access event

1: illegal access event

Bits 7:3 Reserved, must be kept at reset value.

Bit 2 I3C2F : illegal access flag for I3C2

0: no illegal access event

1: illegal access event

Bit 1 VREFBUF : illegal access flag for VREFBUF

0: no illegal access event

1: illegal access event

Bit 0 LPTIM6F : illegal access flag for LPTIM6

0: no illegal access event

1: illegal access event

5.7.8 GTZC1 TZIC status register 4 (GTZC1_TZIC_SR4)

Address offset: 0x01C

Reset value: 0x0000 0000

Secure privileged access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.MPCB
B3_RE
GF
SRAM3
F
MPCB
B2_RE
GF
SRAM2
F
MPCB
B1_RE
GF
SRAM1
F
Res.Res.Res.BKPSR
AMF
FMC
MEMF
OCTOS
PI1_M
EMF
TZIC1FTZSC1
F
rrrrrrrrrrr
1514131211109876543210
Res.Res.Res.Res.EXTIFRCCFPWRFTAMPFRTCFSBSFRes.OTFDE
C1F
FLASH
F
FLASH
_REGF
GPDM
A2F
GPDM
A1F
rrrrrrrrrrr

Bits 31:30 Reserved, must be kept at reset value.

Bit 29 MPCBB3_REGF : illegal access flag for MPCBB3 registers

0: no illegal access event

1: illegal access event

Bit 28 SRAM3F : illegal access flag for SRAM3

0: no illegal access event

1: illegal access event

Bit 27 MPCBB2_REGF : illegal access flag for MPCBB2 registers

0: no illegal access event

1: illegal access event

Bit 26 SRAM2F : illegal access flag for SRAM2

0: no illegal access event

1: illegal access event

  1. Bit 25 MPCBB1_REGF : illegal access flag for MPCBB1 registers
    0: no illegal access event
    1: illegal access event
  2. Bit 24 SRAM1F : illegal access flag for SRAM1
    0: no illegal access event
    1: illegal access event
  3. Bits 23:21 Reserved, must be kept at reset value.
  4. Bit 20 BKPSRAMF : illegal access flag for MPCWM4 (BKPSRAM) memory bank
    0: no illegal access event
    1: illegal access event
  5. Bit 19 FMC_MEMF : illegal access flag for MPCWM2 (FMC_NOR bank), MPCWM3 (FMC_NAND bank and FMC_SDRAM bank 1), and MPCWM4 (FMC_SDRAM bank 2)
    0: no illegal access event
    1: illegal access event
  6. Bit 18 OCTOSPI1_MEMF : illegal access flag for MPCWM1 (OCTOSPI1) memory bank
    0: no illegal access event
    1: illegal access event
  7. Bit 17 TZIC1F : illegal access flag for GTZC1 TZIC registers
    0: no illegal access event
    1: illegal access event
  8. Bit 16 TZSC1F : illegal access flag for GTZC1 TZSC registers
    0: no illegal access event
    1: illegal access event
  9. Bits 15:12 Reserved, must be kept at reset value.
  10. Bit 11 EXTIF : illegal access flag for EXTI
    0: no illegal access event
    1: illegal access event
  11. Bit 10 RCCF : illegal access flag for RCC
    0: no illegal access event
    1: illegal access event
  12. Bit 9 PWRF : illegal access flag for PWR
    0: no illegal access event
    1: illegal access event
  13. Bit 8 TAMPF : illegal access flag for TAMP
    0: no illegal access event
    1: illegal access event
  14. Bit 7 RTCF : illegal access flag for RTC
    0: no illegal access event
    1: illegal access event
  15. Bit 6 SBSF : illegal access flag for SBS
    0: no illegal access event
    1: illegal access event
  16. Bit 5 Reserved, must be kept at reset value.

Bit 4 OTFDEC1F : illegal access flag for OTFDEC1

0: no illegal access event

1: illegal access event

Bit 3 FLASHF : illegal access flag for FLASH memory

0: no illegal access event

1: illegal access event

Bit 2 FLASH_REGF : illegal access flag for FLASH registers

0: no illegal access event

1: illegal access event

Bit 1 GPDMA2F : illegal access flag for GPDMA2

0: no illegal access event

1: illegal access event

Bit 0 GPDMA1F : illegal access flag for GPDMA1

0: no illegal access event

1: illegal access event

5.7.9 GTZC1 TZIC flag clear register 1 (GTZC1_TZIC_FCR1)

Address offset: 0x020

Reset value: 0x0000 0000

Secure privileged access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
CLPTI
M2F
CDTSFCUART
12F
CUART
9F
CUART
8F
CUART
7F
CDAC1
F
CHDMI
CECF
CUSAR
T11F
CUSAR
T10F
CUSAR
T6F
CCRSFCI3C1FCI2C2FCI2C1FCUART
5F
wwwwwwwwwwwwwwww
1514131211109876543210
CUART
4F
CUSAR
T3F
CUSAR
T2F
CSPI3FCSPI2FCIWDG
F
CWWD
GF
CTIM1
4F
CTIM1
3F
CTIM1
2F
CTIM7
F
CTIM6
F
CTIM5
F
CTIM4
F
CTIM3
F
CTIM2
F
wwwwwwwwwwwwwwww

Bit 31 CLPTIM2F : clear the illegal access flag for LPTIM2

0: no action

1: status flag cleared

Bit 30 CDTSF : clear the illegal access flag for DTS

0: no action

1: status flag cleared

Bit 29 CUART12F : clear the illegal access flag for UART12

0: no action

1: status flag cleared

Bit 28 CUART9F : clear the illegal access flag for UART9

0: no action

1: status flag cleared

  1. Bit 27 CUART8F : clear the illegal access flag for UART8
    0: no action
    1: status flag cleared
  2. Bit 26 CUART7F : clear the illegal access flag for UART7
    0: no action
    1: status flag cleared
  3. Bit 25 CDAC1F : clear the illegal access flag for DAC1
    0: no action
    1: status flag cleared
  4. Bit 24 CHDMICECF : clear the illegal access flag for HDMICEC
    0: no action
    1: status flag cleared
  5. Bit 23 CUSART11F : clear the illegal access flag for USART11
    0: no action
    1: status flag cleared
  6. Bit 22 CUSART10F : clear the illegal access flag for USART10
    0: no action
    1: status flag cleared
  7. Bit 21 CUSART6F : clear the illegal access flag for USART6
    0: no action
    1: status flag cleared
  8. Bit 20 CCRSF : clear the illegal access flag for CRS
    0: no action
    1: status flag cleared
  9. Bit 19 CI3C1F : clear the illegal access flag for I3C1
    0: no action
    1: status flag cleared
  10. Bit 18 CI2C2F : clear the illegal access flag for I2C2
    0: no action
    1: status flag cleared
  11. Bit 17 CI2C1F : clear the illegal access flag for I2C1
    0: no action
    1: status flag cleared
  12. Bit 16 CUART5F : clear the illegal access flag for UART5
    0: no action
    1: status flag cleared
  13. Bit 15 CUART4F : clear the illegal access flag for UART4
    0: no action
    1: status flag cleared
  14. Bit 14 CUSART3F : clear the illegal access flag for USART3
    0: no action
    1: status flag cleared
  15. Bit 13 CUSART2F : clear the illegal access flag for USART2
    0: no action
    1: status flag cleared
  1. Bit 12 CSPI3F : clear the illegal access flag for SPI3
    0: no action
    1: status flag cleared
  2. Bit 11 CSPI2F : clear the illegal access flag for SPI2
    0: no action
    1: status flag cleared
  3. Bit 10 CIWDGF : clear the illegal access flag for IWDG
    0: no action
    1: status flag cleared
  4. Bit 9 CWWDGF : clear the illegal access flag for WWDG
    0: no action
    1: status flag cleared
  5. Bit 8 CTIM14F : clear the illegal access flag for TIM14
    0: no action
    1: status flag cleared
  6. Bit 7 CTIM13F : clear the illegal access flag for TIM13
    0: no action
    1: status flag cleared
  7. Bit 6 CTIM12F : clear the illegal access flag for TIM12
    0: no action
    1: status flag cleared
  8. Bit 5 CTIM7F : clear the illegal access flag for TIM7
    0: no action
    1: status flag cleared
  9. Bit 4 CTIM6F : clear the illegal access flag for TIM6
    0: no action
    1: status flag cleared
  10. Bit 3 CTIM5F : clear the illegal access flag for TIM5
    0: no action
    1: status flag cleared
  11. Bit 2 CTIM4F : clear the illegal access flag for TIM4
    0: no action
    1: status flag cleared
  12. Bit 1 CTIM3F : clear the illegal access flag for TIM3
    0: no action
    1: status flag cleared
  13. Bit 0 CTIM2F : clear the illegal access flag for TIM2
    0: no action
    1: status flag cleared

5.7.10 GTZC1 TZIC flag clear register 2 (GTZC1_TZIC_FCR2)

Address offset: 0x024

Reset value: 0x0000 0000

Secure privileged access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
CLPTI
M5F
CLPTI
M4F
CLPTI
M3F
CLPTI
M1F
CI2C4FCI2C3FCLPUA
RT1F
CSP15FRes.Res.Res.Res.CUSBFCSAI2FCSAI1FCSPI6F
wwwwwwwwwwww
1514131211109876543210
CSPI4FCTIM1
7F
CTIM1
6F
CTIM1
5F
CUSAR
T1F
CTIM8
F
CSPI1FCTIM1
F
Res.Res.Res.Res.Res.CUCP
DF
CFDCA
N2F
CFDCA
N1F
wwwwwwwwwww

Bit 31 CLPTIM5F : clear the illegal access flag for LPTIM5

0: no action

1: status flag cleared

Bit 30 CLPTIM4F : clear the illegal access flag for LPTIM4

0: no action

1: status flag cleared

Bit 29 CLPTIM3F : clear the illegal access flag for LPTIM3

0: no action

1: status flag cleared

Bit 28 CLPTIM1F : clear the illegal access flag for LPTIM1

0: no action

1: status flag cleared

Bit 27 CI2C4F : clear the illegal access flag for I2C4

0: no action

1: status flag cleared

Bit 26 CI2C3F : clear the illegal access flag for I2C3

0: no action

1: status flag cleared

Bit 25 CLPUART1F : clear the illegal access flag for LPUART

0: no action

1: status flag cleared

Bit 24 CSP15F : clear the illegal access flag for SPI5

0: no action

1: status flag cleared

Bits 23:20 Reserved, must be kept at reset value.

Bit 19 CUSBF : clear the illegal access flag for USB

0: no action

1: status flag cleared

Bit 18 CSAI2F : clear the illegal access flag for SAI2

0: no action

1: status flag cleared

Bit 17 CSAI1F : clear the illegal access flag for SAI1

0: no action

1: status flag cleared

  1. Bit 16 CSPI6F : clear the illegal access flag for SPI6
    0: no action
    1: status flag cleared
  2. Bit 15 CSPI4F : clear the illegal access flag for SPI4
    0: no action
    1: status flag cleared
  3. Bit 14 CTIM17F : clear the illegal access flag for TIM17
    0: no action
    1: status flag cleared
  4. Bit 13 CTIM16F : clear the illegal access flag for TIM16
    0: no action
    1: status flag cleared
  5. Bit 12 CTIM15F : clear the illegal access flag for TIM15
    0: no action
    1: status flag cleared
  6. Bit 11 CUSART1F : clear the illegal access flag for USART1
    0: no action
    1: status flag cleared
  7. Bit 10 CTIM8F : clear the illegal access flag for TIM8
    0: no action
    1: status flag cleared
  8. Bit 9 CSPI1F : clear the illegal access flag for SPI1
    0: no action
    1: status flag cleared
  9. Bit 8 CTIM1F : clear the illegal access flag for TIM1
    0: no action
    1: status flag cleared
  10. Bits 7:3 Reserved, must be kept at reset value.
  11. Bit 2 CUCPDF : clear the illegal access flag for UCPD
    0: no action
    1: status flag cleared
  12. Bit 1 CFDCAN2F : clear the illegal access flag for FDCAN2
    0: no action
    1: status flag cleared
  13. Bit 0 CFDCAN1F : clear the illegal access flag for FDCAN1
    0: no action
    1: status flag cleared

5.7.11 GTZC1 TZIC flag clear register 3 (GTZC1_TZIC_FCR3)

Address offset: 0x028

Reset value: 0x0000 0000

Secure privilege access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.Res.Res.Res.CRAM
CFGF
Res.COCT
OSPI1
F
CFMCFCSDM
MC2F
CSDM
MC1F
CPKAFCSAES
F
CRNG
F
CHASH
F
CAESF
wwwwwwwwww
1514131211109876543210
CDCMI
F
CADC1
2F
CDCA
CHEF
CICAC
HEF
CETHFCFMA
CF
CCOR
DICF
CCRCFRes.Res.Res.Res.Res.CI3C2FCVREF
BUFF
CLPTI
M6F
wwwwwwwwwww

Bits 31:27 Reserved, must be kept at reset value.

Bit 26 CRAMCFGF : clear illegal access flag for RAMSCFG

0: no action

1: status flag cleared

Bit 25 Reserved, must be kept at reset value.

Bit 24 COCTOSPI1F : clear illegal access flag for OCTOSPI1

0: no action

1: status flag cleared

Bit 23 CFMCF : clear illegal access flag for FMC

0: no action

1: status flag cleared

Bit 22 CSDMMC2F : clear illegal access flag for SDMMC2

0: no action

1: status flag cleared

Bit 21 CSDMMC1F : clear illegal access flag for SDMMC1

0: no action

1: status flag cleared

Bit 20 CPKAF : clear illegal access flag for PKA

0: no action

1: status flag cleared

Bit 19 CSAESF : clear illegal access flag for SAES

0: no action

1: status flag cleared

Bit 18 CRNGF : clear illegal access flag for RNG

0: no action

1: status flag cleared

Bit 17 CHASHF : clear illegal access flag for HASH

0: no action

1: status flag cleared

Bit 16 CAESF : clear illegal access flag for AES

0: no action

1: status flag cleared

  1. Bit 15 CDCMIF : clear illegal access flag for DCMI
    0: no action
    1: status flag cleared
  2. Bit 14 CADC12F : clear illegal access flag for ADC1 and ADC2
    0: no action
    1: status flag cleared
  3. Bit 13 CDCACHEF : clear illegal access flag for DCACHE
    0: no action
    1: status flag cleared
  4. Bit 12 CICACHEF : clear illegal access flag for ICACHE
    0: no action
    1: status flag cleared
  5. Bit 11 CETHF : clear illegal access flag for register of ETH
    0: no action
    1: status flag cleared
  6. Bit 10 CFMACF : clear illegal access flag for FMAC
    0: no action
    1: status flag cleared
  7. Bit 9 CCORDICF : clear illegal access flag for CORDIC
    0: no action
    1: status flag cleared
  8. Bit 8 CCRCF : clear illegal access flag for CRC
    0: no action
    1: status flag cleared
  9. Bits 7:3 Reserved, must be kept at reset value.
  10. Bit 2 CI3C2F : clear illegal access flag for I3C2
    0: no action
    1: status flag cleared
  11. Bit 1 CVREFBUF : clear illegal access flag for VREFBUF
    0: no action
    1: status flag cleared
  12. Bit 0 CLPTIM6F : clear illegal access flag for LPTIM6
    0: no action
    1: status flag cleared

5.7.12 GTZC1 TZIC flag clear register 4 (GTZC1_TZIC_FCR4)

Address offset: 0x02C

Reset value: 0x0000 0000

Secure privilege access only.

Refer to the device datasheet for the peripheral availability. If not present, consider the associated bit as reserved, and keep it at reset value.

31302928272625242322212019181716
Res.Res.CMPCC
BB3_R
EGF
CSRA
M3F
CMPCC
BB2_R
EGF
CSRA
M2F
CMPCC
BB1_R
EGF
CSRA
M1F
Res.Res.Res.CBKPS
RAMF
CFMC
_MEMF
COCT
OSPI1_
MEMF
CTZIC1
F
CTZSC
1F
wwwwwwwwwww
1514131211109876543210
Res.Res.Res.Res.CEXTI
F
CRCCFCPWR
F
CTAMP
F
CRTCFCSBSFRes.COTFD
EC1F
CFLAS
HF
CFLAS
H_REG
F
CGPD
MA2F
CGPD
MA1F
wwwwwwwwwww

Bits 31:30 Reserved, must be kept at reset value.

Bit 29 CMPCCBB3_REGF : clear the illegal access flag for MPCBB3 registers

0: no action

1: status flag cleared

Bit 28 CSRAM3F : clear the illegal access flag for SRAM3

0: no action

1: status flag cleared

Bit 27 CMPCCBB2_REGF : clear the illegal access flag for MPCBB2 registers

0: no action

1: status flag cleared

Bit 26 CSRAM2F : clear the illegal access flag for SRAM2

0: no action

1: status flag cleared

Bit 25 CMPCCBB1_REGF : clear the illegal access flag for MPCBB1 registers

0: no action

1: status flag cleared

Bit 24 CSRAM1F : clear the illegal access flag for SRAM1

0: no action

1: status flag cleared

Bits 23:21 Reserved, must be kept at reset value.

Bit 20 CBKPSRAMF : clear the illegal access flag for MPCWM4 (BKPSRAM) memory bank

0: no action

1: status flag cleared

Bit 19 CFMC_MEMF : clear the illegal access flag for MPCWM2 (FMC_NOR bank), MPCWM3 (FMC_NAND bank and FMC_SDRAM bank 1), and MPCWM4 (FMC_SDRAM bank 2)

0: no action

1: status flag cleared

Bit 18 COCTOSPI1_MEMF : clear the illegal access flag for MPCWM1 (OCTOSPI1) memory bank

0: no action

1: status flag cleared

Bit 17 CTZIC1F : clear the illegal access flag for GTZC1 TZIC registers

0: no action

1: status flag cleared

Bit 16 CTZSC1F : clear the illegal access flag for GTZC1 TZSC registers

0: no action

1: status flag cleared

Bits 15:12 Reserved, must be kept at reset value.

Bit 11 CEXTIF : clear the illegal access flag for EXTI

0: no action

1: status flag cleared

Bit 10 CRCCF : clear the illegal access flag for RCC

0: no action

1: status flag cleared

Bit 9 CPWRF : clear the illegal access flag for PWR

0: no action

1: status flag cleared

Bit 8 CTAMPF : clear the illegal access flag for TAMP

0: no action

1: status flag cleared

Bit 7 CRTCF : clear the illegal access flag for RTC

0: no action

1: status flag cleared

Bit 6 CSBSF : clear the illegal access flag for SBS

0: no action

1: status flag cleared

Bit 5 Reserved, must be kept at reset value.

Bit 4 COTFDEC1F : clear the illegal access flag for OTFDEC1

0: no action

1: status flag cleared

Bit 3 CFLASHF : clear the illegal access flag for FLASH memory

0: no action

1: status flag cleared

Bit 2 CFLASH_REGF : clear the illegal access flag for FLASH registers

0: no action

1: status flag cleared

Bit 1 CGPDMA2F : clear the illegal access flag for GPDMA2

0: no action

1: status flag cleared

Bit 0 CGPDMA1F : clear the illegal access flag for GPDMA1

0: no action

1: status flag cleared

5.7.13 GTZC1 TZIC register map

Table 37. GTZC1 TZIC register map and reset values

OffsetRegister313029282726252423222120191817161514131211109876543210
0x000GTZC1_TZIC_IER1LPTIM2IEDTSIEUART12IEUART9IEUART8IEUART7IEDAC1IEHDMICEIEUSART11IEUSART10IEUSART6IECRSIEI3C1IEI2C2IEI2C1IEUART5IEUART4IEUSART3IEUSART2IESPI3IESPI2IEIWDGIEWWDGIETIM14IETIM13IETIM112IETIM7IETIM6IETIM5IETIM4IETIM3IETIM2IE
Reset value00000000000000000000000000000000
0x004GTZC1_TZIC_IER2LPTIM5IELPTIM4IELPTIM3IELPTIM1IEI2C4IEI2C3IELPUART1IESPI5IERes.Res.Res.Res.USBIESAI2IESAI1IESPI6IESPI4IETIM17IETIM16IETIM15IEUSART1IETIM8IESPI1IETIM1IERes.Res.Res.Res.Res.Res.UCPDIEFDCAN2IE
Reset value0000000000000000000000
0x008GTZC1_TZIC_IER3Res.Res.Res.Res.Res.RAMCFGIERes.OCTOSPI1IEFMCIESDMMC2IESDMMC1IEPKAIESAESIERNGIEHASHIEAESIEDCMIIEADC12IEDCACHEIEICACHEIEETHIEFMACIECORDICIECRCIERes.Res.Res.Res.Res.Res.I3C2IEVREFBUFIE
Reset value00000000000000000000
0x00CGTZC1_TZIC_IER4Res.Res.MPCCB3_REGIESRAM3IEMPCCB2_REGIESRAM2IEMPCCB1_REGIESRAM1IERes.Res.Res.BKPSRAMIEFMC_MEMIEOCTOSPI1_MEMIETZIC1IETZSC1IERes.Res.Res.Res.EXTIIERCCIEPWRIETAMPIERTCIESBSIERes.OTFDEC1IEFLASHIEFLASH_REGIEGPDMA2IEGPDMA1IE
Reset value0000000000000000000000
0x010GTZC1_TZIC_SR1LPTIM2FDTSFUART12FUART9FUART8FUART7FDAC1FHDMICEFUSART11FUSART10FUSART6FCRSFI3C1FI2C2FI2C1FUART5FUART4FUSART3FUSART2FSPI3FSPI2FIWDGFWWDGFTIM14FTIM13FTIM112FTIM7FTIM6FTIM5FTIM4FTIM3FTIM2F
Reset value00000000000000000000000000000000
0x014GTZC1_TZIC_SR2LPTIM5FLPTIM4FLPTIM3FLPTIM1FI2C4FI2C3FLPUART1FSPI5FRes.Res.Res.Res.USBFSAI2FSAI1FSPI6FSPI4FTIM17FTIM16FTIM15FUSART1FTIM8FSPI1FTIM1FRes.Res.Res.Res.Res.Res.UCPDFFDCAN2F
Reset value0000000000000000000000
0x018GTZC1_TZIC_SR3Res.Res.Res.Res.Res.RAMCFGFRes.OCTOSPI1FFMCFSDMMC2FSDMMC1FPKAFSAESFRNGFHASHFAESFDCMIFADC12FDCACHEFICACHEFETHFFMACFCORDICFCRCFRes.Res.Res.Res.Res.Res.I3C2FVREFBUFF
Reset value00000000000000000000
0x01CGTZC1_TZIC_SR4Res.Res.MPCCB3_REGFSRAM3FMPCCB2_REGFSRAM2FMPCCB1_REGFSRAM1FRes.Res.Res.BKPSRAMFFMC_MEMFOCTOSPI1_MEMFTZIC1FTZSC1FRes.Res.Res.Res.EXTIFRCCFPWRFTAMPFRTCFSBSFRes.OTFDEC1FFLASHFFLASH_REGFGPDMA2FGPDMA1F
Reset value0000000000000000000000
0x020GTZC1_TZIC_FCR1CLPTIM2FCDTSFCUART12FCUART9FCUART8FCUART7FCDAC1FCHDMICEFCUSART11FCUSART10FCUSART6FCCRSFCI3C1FCI2C2FCI2C1FCUART5FCUART4FCUSART3FCUSART2FCSPI3FCSPI2FCIWDGFCWWDGFCTIM14FCTIM13FCTIM112FCTIM7FCTIM6FCTIM5FCTIM4FCTIM3FCTIM2F
Reset value00000000000000000000000000000000

Table 37. GTZC1 TZIC register map and reset values (continued)

OffsetRegister313029282726252423222120191817161514131211109876543210
0x024GTZC1_TZIC_FCR2CLPTIM5FCLPTIM4FCLPTIM3FCLPTIM1FCI2C4FCI2C3FCLPUART1FCSPI5FRes.Res.Res.Res.CUSBFCSAI2FCSAI1FCSPI6FCSPI4FCTIM17FCTIM16FCTIM15FCUSART1FCTIM8FCSPI1FCTIM1FRes.Res.Res.Res.Res.Res.Res.Res.
Reset value00000000000000000000
0x028GTZC1_TZIC_FCR3Res.Res.Res.Res.Res.CRAMCFGFRes.COCTOSP11FCFMCFCSDMMC2FCSDMMC1FCPKAFCSAESFCRNGFCHASHFCAESFCDCMIFCADC12FCDCACHEFCIACACHEFCETHFCFMACFCCORDICFCCRCFRes.Res.Res.Res.Res.Res.Res.Res.
Reset value000000000000000000
0x02CGTZC1_TZIC_FCR4Res.Res.CMP CBB3_REGFCSRAM3FCMP CBB2_REGFCSRAM2FCMP CBB1_REGFCSRAM1FRes.Res.Res.OBKPSRAMFCFMC_MEMFCOCTOSP11_MEMFCTZIC1FCTZSC1FRes.Res.Res.Res.CEXTIFCRCOFCPWRFCTAMPFCRTCFCSBSFRes.COTFDEC1FCFLASHFCFLASH_REGFCGPDMA2FCGPDMA1F
Reset value0000000000000000000000
Refer to Table 28: GTZC1 sub-block address offset .

5.8 GTZC1 MPCBBz registers (z = 1 to 3)

All registers are accessed only by words (32-bit).

5.8.1 GTZC1 SRAMz MPCBB control register (GTZC1_MPCBBz_CR) (z = 1 to 3)

Address offset: 0x000

Reset value: 0x0000 0000

Secure privileged access only.

31302928272625242322212019181716
SRWILADISINVSECSTATERes.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.
rwrw
1514131211109876543210
Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.GLOCK
rs

Bit 31 SRWILADIS : secure read/write illegal access disable

This bit disables the detection of an illegal access when a secure read/write transaction access a non-secure blocks of the block-based SRAM (secure fetch on non-secure block is always considered illegal).

0: enabled, secure read/write access not allowed on non-secure SRAM block

1: disabled, secure read/write access allowed on non-secure SRAM block

Bit 30 INVSECSTATE : SRAMx clocks security state

This bit is used to define the internal SRAMs clocks control in RCC as secure or not.

0: SRAMs clocks are secure if a secure area exists in the MPCBB. It is non secure if there is no secure area.

1: SRAMs clocks are non-secure even if a secure area exists in the MPCBB, and secure even if no secure block is set in the MPCBB.

Bits 29:1 Reserved, must be kept at reset value.

Bit 0 GLOCK : lock the control register of the MPCBB until next reset

This bit is cleared by default, and once set, it cannot be reset until system reset.

0: control register not locked

1: control register locked

5.8.2 GTZC1 SRAMz MPCBB configuration lock register 1 (GTZC1_MPCBBz_CFGLOCK1) (z = 1 to 3)

Address offset: 0x010

Reset value: 0x0000 0000

Secure privileged access only.

31302928272625242322212019181716
SPLCK 31SPLCK 30SPLCK 29SPLCK 28SPLCK 27SPLCK 26SPLCK 25SPLCK 24SPLCK 23SPLCK 22SPLCK 21SPLCK 20SPLCK 19SPLCK 18SPLCK 17SPLCK 16
rsrsrsrsrsrsrsrsrsrsrsrsrsrsrsrs
1514131211109876543210
SPLCK 15SPLCK 14SPLCK 13SPLCK 12SPLCK 11SPLCK 10SPLCK 9SPLCK 8SPLCK 7SPLCK 6SPLCK 5SPLCK 4SPLCK 3SPLCK 2SPLCK 1SPLCK 0
rsrsrsrsrsrsrsrsrsrsrsrsrsrsrsrs

Bits 31:0 SPLCKy : Security/privilege configuration lock for super-block (y = 31 to 0)

This bit is set by software and can be cleared only by system reset.

0: GTZC1_MPCBBz_SECCFG Ry and GTZC1_MPCBBz_PRIVCFG Ry can be written.

1: Writes to GTZC1_MPCBBz_SECCFG Ry and GTZC1_MPCBBz_PRIVCFG Ry are ignored

5.8.3 GTZC1 SRAMz MPCBB security configuration for super-block x register (GTZC1_MPCBBz_SECCFG Rx) (z = 1 to 3)

Address offset: 0x100 + 0x4 * x, (x = 0 to 31)

Reset value: 0xFFFF FFFF

The given reset value is valid when TZEN = 0xB4. The reset value is 0x0000 0000 when TZEN = 0xC3.

Write access to this register is secure only. Any read is allowed.

31302928272625242322212019181716
SEC31SEC30SEC29SEC28SEC27SEC26SEC25SEC24SEC23SEC22SEC21SEC20SEC19SEC18SEC17SEC16
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw
1514131211109876543210
SEC15SEC14SEC13SEC12SEC11SEC10SEC9SEC8SEC7SEC6SEC5SEC4SEC3SEC2SEC1SEC0
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bits 31:0 SECy : Security configuration for block y (y = 31 to 0)

0: Non-secure access only to block y, belonging to super-block x. Secure access is also allowed if the SRWILADIS bit is set in GTZC1_MPCBBz_CR.

1: Secure access only to block y, belonging to super-block x.

Unprivileged write to this bit is ignored if PRIVy bit is set in GTZC1_MPCBBz_PRIVCFG Rx.

Writes are ignored if SPLCKx bit is set in GTZC1_MPCBBz_CFGLOCK.

5.8.4 GTZC1 SRAMz MPCBB privileged configuration for super-block x register (GTZC1_MPCBBz_PRIVCFG Rx) (z = 1 to 3)

Address offset: 0x200 + 0x4 * x, (x = 0 to 31)

Reset value: 0xFFFF FFFF

The given reset value is valid when TZEN = 0xB4. The reset value is 0x0000 0000 when TZEN = 0xC3. Write access to this register is privileged only. Any read is allowed.

31302928272625242322212019181716
PRIV31PRIV30PRIV29PRIV28PRIV27PRIV26PRIV25PRIV24PRIV23PRIV22PRIV21PRIV20PRIV19PRIV18PRIV17PRIV16
1514131211109876543210
PRIV15PRIV14PRIV13PRIV12PRIV11PRIV10PRIV9PRIV8PRIV7PRIV6PRIV5PRIV4PRIV3PRIV2PRIV1PRIV0
rwrwrwrwrwrwrwrwrwrwrwrwrwrwrwrw

Bits 31:0 PRIVy : Privileged configuration for block y, belonging to super-block x (y = 31 to 0).

0: Privileged and unprivileged access to block y, belonging to super-block x

1: Only privileged access to block y, belonging to super-block x

Non-secure write to this bit is ignored if SECy bit is set in GTZC1_MPCBBz_SECCFGRx.

Writes are ignored if SPLCKx bit is set in GTZC1_MPCBBz_CFGLOCK.

5.8.5 GTZC1 MPCBBz register map (z = 1 to 3)

Table 38. GTZC1 MPCBBz register map and reset values (z = 1 to 3)

OffsetRegister313029282726252423222120191817161514131211109876543210
0x000GTZC1_MPCBBz_CRSRWILADISINVSECSTATERes.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.Res.GLCK
Reset value000
0x004-
0x00C
ReservedReserved
0x010GTZC1_MPCBBz_CFGLOCK1SPLCK31SPLCK30SPLCK29SPLCK28SPLCK27SPLCK26SPLCK25SPLCK24SPLCK23SPLCK22SPLCK21SPLCK20SPLCK19SPLCK18SPLCK17SPLCK16SPLCK15SPLCK14SPLCK13SPLCK12SPLCK11SPLCK10SPLCK9SPLCK8SPLCK7SPLCK6SPLCK5SPLCK4SPLCK3SPLCK2SPLCK1SPLCK0
Reset value00000000000000000000000000000000
0x014-
0x0FC
ReservedReserved
0x100 +
0x04 *x
(x = 0 to 31)
GTZC1_MPCBBz_SECCFGRxSEC31SEC30SEC29SEC28SEC27SEC26SEC25SEC24SEC23SEC22SEC21SEC20SEC19SEC18SEC17SEC16SEC15SEC14SEC13SEC12SEC11SEC10SEC9SEC8SEC7SEC6SEC5SEC4SEC3SEC2SEC1SEC0
Reset value11111111111111111111111111111111
0x180-
0x1FC
ReservedReserved
0x200 +
0x04 *x
(x = 0 to 31)
GTZC1_MPCBBz_PRIVCFGRxPRIV31PRIV30PRIV29PRIV28PRIV27PRIV26PRIV25PRIV24PRIV23PRIV22PRIV21PRIV20PRIV19PRIV18PRIV17PRIV16PRIV15PRIV14PRIV13PRIV12PRIV11PRIV10PRIV9PRIV8PRIV7PRIV6PRIV5PRIV4PRIV3PRIV2PRIV1PRIV0
Reset value11111111111111111111111111111111

Refer to Table 28: GTZC1 sub-block address offset .