SWCU194 March 2023 CC1314R10 , CC1354P10 , CC1354R10 , CC2674P10 , CC2674R10
Region | Start Address | End Address | User Config | ID(1) | IVALID(1) | S/NS | NSC | Additional Comments |
---|---|---|---|---|---|---|---|---|
Secure Flash | 0x0 | CCFG:TRUSTZONE_ FLASH_CFG.NSCADDR_ BOUNDARY - 1 | CCFG | 1 | 1 | S | 0 | VTOR_S (Secure vector base address) is 0x0 by default |
NSC Flash | CCFG:TRUSTZONE_ FLASH_CFG.NSCADDR_ BOUNDARY | CCFG:TRUSTZONE_ FLASH_CFG.NSADDR_ BOUNDARY- 1 | CCFG | 2 | 1 | S | 1 | NSC: Non-secure callable Flash region. Note that bus masters in the SoC will see this region as Secure. The NSC property of the memory is only used by the CPU |
Non-secure Flash | CCFG:TRUSTZONE_ FLASH_CFG.NSADDR_ BOUNDARY | End of Flash (device dependent) | CCFG | 3 | 1 | NS | 0 | Non-secure region |
BROM/GPRAM(2) | 0x10000000 | 0x1FFFFFFF | Hardcoded | 4 | 1 | S | 0 | Secure region |
Secure SRAM | 0x20000000 | CCFG:TRUSTZONE_ SRAM_CFG.NSCADDR_ BOUNDARY- 1 | CCFG | 5 | 1 | S | 0 | Secure SRAM region |
NSC SRAM | CCFG:TRUSTZONE_ SRAM_CFG.NSCADDR_ BOUNDARY | CCFG:TRUSTZONE_ SRAM_CFG.NSADDR_ BOUNDARY- 1 | CCFG | 6 | 1 | S | 1 | NSC: Non-secure callable SRAM region. Note that bus masters in the SoC will see this region as Secure. The NSC property of the memory is only used by the CPU |
Non-secure SRAM | CCFG:TRUSTZONE_ SRAM_CFG.NSADDR_ BOUNDARY | 0x3FFFFFFF | CCFG | 7 | 1 | NS | 0 | Non-Secure SRAM |
Non-secure Peripheral Region | 0x40000000 | 0x57FFFFFF | Hardcoded | 8 | 1 | NS | 0 | |
Secure Peripheral Region | 0x58000000 | 0x5FFFFFFF | Hardcoded | 9 | 1 | S | 0 | |
Non-secure Peripheral Region Alias (non-posted) | 0x60000000 | 0x77FFFFFF | Hardcoded | 10 | 1 | NS | 0 | |
Secure Peripheral Region Alias (non-posted) | 0x78000000 | 0x7FFFFFFF | Hardcoded | 11 | 1 | S | 0 | |
Non-secure (reserved) | 0x80000000 | 0xDFFFFFFF | Hardcoded | 12 | 1 | NS | 0 | |
Exempt (ARM Implementation) | 0xE0000000 | 0xE0043FFF | Hardcoded | 0 | 0 | S | 0 | System Control Space exempted by ARM |
Non-secure (reserved) | 0xE0044000 | 0xE00FDFFF | Hardcoded | 12 | 1 | NS | 0 | |
Exempt (Processor ROM Table) | 0xE00FE000 | 0xE00FFFFF | Hardcoded | 0 | 0 | S | 0 | Excluded explicitly by IDAU |
Internal (reserved) | 0xE0100000 | 0xFFFFFFFF | Hardcoded | 13 | 1 | NS | 0 |
Boundaries between S, NSC, and S regions must be configured such that the rules below are being followed:
The granularity required for the different watermark boundaries between S and NS are showed in Table 3-2.
CCFG Register |
Granularity |
---|---|
TRUSTZONE_SRAM_CFG.NSCADDR_BOUNDARY | 1 KB |
TRUSTZONE_SRAM_CFG.NSADDR_BOUNDARY | 1 KB |
TRUSTZONE_FLASH_CFG.NSCADDR_BOUNDARY | 1 KB |
TRUSTZONE_FLASH_CFG.NSADDR_BOUNDARY | 8 KB |
Non-secure (NS) addresses may be accessed by the Cortex®-M33 when in either the Secure or the Non-secure state. Further, NS addresses may be accessed by any of the masters in the system (DMA, I2S, Radio, or CRYPTO).
Secure (S) addresses may only be accessed by the Cortex®-M33 when it is in the Secure state, or by other Secure masters in the system. The only secure master in the system (other than the M33 in secure state) is the internal DMA of the AES and Hash Cryptoprocessor core (CRYPTO).
IDAU Security Attribution | SAU Security Attribution | Final Security Attribution |
---|---|---|
NS |
S |
S |
NSC |
NSC |
|
NS |
NS |
|
NSC |
S |
S |
NSC |
NSC |
|
NS |
NSC |
|
S |
S |
S |
NS |
S |
|
NSC |
S |