GD32W51x User Manual
253
NVIC
TPIU
Flash
Memory
Controller
Flash
Memory
AHB to APB
Bridge2(PTZPPC2)
AHB to APB
securable
Trustzone_
aware
Trustzone_a
ware
securable
Slave
Slave
Slave
Slave
Master
Cbus
Master
DMA1
ARM Cortex-M33
Processor
SW/JTAG
Syst
e
m
C
o
d
e
A
H
B
M
a
tri
x
APB
2
APB
1
Icache
DMA0
Master
Master
Master
AHB
SysDecode2
(HTZPPC1)
Slave
TZMMPCX
WIFI
Slave
AHB
SysDecode1
(HTZPPC2)
Slave
AHB
SysDecode3
QSPI
SQPI
securable
Trustzone_aware
securable
Trustzone_
aware
TZSPC
TZIAC
TZBMPC
AHB1
securable peripheral
sec/priv
NSMx_LEN
NSMx_SADD
AHB1
securable peripheral
sec/priv
Bridge1(PTZPPC1)
APB peripherals
SRAMX
Controller
SRAMX
Slave
TZBMPCX
Master
APB peripherals
SRAM illegal interrupt
secure states of all blocks
secure states of all blocks
AHB3 illegal interrupt
AHB2
illegal interrupt
(1)
(2)
AHB2
illegal event
AHB1
illegal event
TZBMPCX
illegal event
TZMMPCX
illegal event
TZPCU
TZEN
TZIAC
illegal
interrupt
TZIAC illegal interrupt
APB
securable peripheral
sec/priv
There are three different sub-blocks, TrustZone® security privilege controller (TZSPC),
TrustZone® block-based memory protection controller (TZBMPC) and TrustZone® illegal
access controller (TZIAC) in TZPCU. These are the union function of TrustZone® protection
controller which is beyond AHB and ARMv8-M. These beyond functions are realized through:
APB TrustZone® peripheral protection controller (PTZPPC) in AHB/APB bridge gates
transactions to, and responses from securable APB peripherals when a security violation
occurs; AHB TrustZone® peripheral protection controller (HTZPPC) in AHB address decode
gates transactions to, and responses from securable/privilege APB peripherals when a
security violation occurs; TrustZone® block-based TZBMPCx firewalls gates transactions to,
and responses from SRAMs on chip; TrustZone® mark TZMMPCx firewalls gates
transactions to, and responses from memories off chip.
Figure 9-1. Block diagram of TZPCU
shows the ARMv8-M (Cortex-M33) security
architecture with secure, securable and TrustZone-aware peripherals, these peripherals are
divided by PTZPPC and HTZPPC, and introduced by
Table 9-1. TrustZone® peripherals
.
Table 9-1. TrustZone® peripherals
Peripherals
Introduce
privilege
TZSPC define w hether the peripherals can connect to
PTZPPC/ HTZ PPC
securable
TZSPC define w hether the peripherals can connect to
PTZPPC/HTZ PPC
secure
Peripherals are alw ays secure connect to PTZPPC/ HTZPPC (such
as TZIAC and TZBMPC)
non-secure and non-privilege
Peripherals do not filter w ith PTZPPC/ HTZ PPC,
connected directly
to AHB/APB
TrustZone-aw are
Refer to TrustZone-aw are peripherals describe below .