Registered User mNo edit summary |
Registered User mNo edit summary Tag: 2017 source edit |
||
(37 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
{{ApplicableFor | |||
|MPUs list=STM32MP13x, STM32MP15x | |MPUs list=STM32MP13x, STM32MP15x, STM32MP21x, STM32MP23x, STM32MP25x | ||
|MPUs checklist=STM32MP13x,STM32MP15x | |MPUs checklist=STM32MP13x, STM32MP15x, STM32MP21x, STM32MP23x, STM32MP25x | ||
}}</noinclude> | }} | ||
<noinclude></noinclude> | |||
==Article purpose== | ==Article purpose== | ||
The purpose of this article is to briefly introduce the SYSRAM internal memory and indicate the | The purpose of this article is to: | ||
* briefly introduce the SYSRAM internal memory peripheral and its main features, | |||
* indicate the peripheral instances assignment at boot time and their assignment at runtime (including whether instances can be allocated to secure contexts), | |||
* list the software frameworks and drivers managing the peripheral, | |||
* explain how to configure the peripheral. | |||
==Peripheral overview== | ==Peripheral overview== | ||
The '''SYSRAM''' is an internal memory peripheral. It is physically located near the Arm<sup>®</sup> Cortex-A to optimize the core performance. | The '''SYSRAM''' peripheral is an internal memory peripheral. It is physically located near the Arm<sup>®</sup> Cortex-A to optimize the core performance. | ||
* {{MicroprocessorDevice | device=13}} SYSRAM is 128-Kbyte wide | * {{MicroprocessorDevice | device=13}} SYSRAM is 128-Kbyte wide | ||
* {{MicroprocessorDevice | device=15}} SYSRAM is 256-Kbyte wide | * {{MicroprocessorDevice | device=15}} SYSRAM is 256-Kbyte wide | ||
* {{MicroprocessorDevice | device=2}} SYSRAM is 256-Kbyte wide | |||
On {{MicroprocessorDevice | device=1}}, the SYSRAM is protected by [[ETZPC internal peripheral|ETZPC firewall]]. By default, SYSRAM access is granted to Cortex-A7 secure. The SYSRAM can be split into 2 memory regions with a 4-Kbyte granularity: | |||
* a low secure region | |||
* a high non-secure region | |||
On {{MicroprocessorDevice | device=2}}, the SYSRAM is protected by [[RISAB internal peripheral|RISAB]] memory firewall, allowing to create some 4-Kbyte granularity memory regions with different access rights to share SYSRAM between the different execution contexts of the platform. | |||
By default, SYSRAM access is granted to Cortex-A35 secure. | |||
Refer to the [[STM32 MPU resources#Reference manuals|STM32 MPU reference manuals]] for the complete list of features, and to the software frameworks and drivers, introduced below, to see which features are implemented. | |||
Refer to the [[ | |||
== | ==Peripheral usage== | ||
This chapter is applicable in the scope of the '''OpenSTLinux BSP''' running on the Arm<sup>®</sup> Cortex<sup>®</sup>-A processor(s), and the '''STM32CubeMPU Package''' running on the Arm<sup>®</sup> Cortex<sup>®</sup>-M processor. | |||
===Boot time assignment=== | |||
===Boot time=== | ====On {{MicroprocessorDevice | device=13}}==== | ||
The [[STM32 MPU ROM code overview|ROM code]] leaves the SYSRAM secure when it jumps to the entry point of the FSBL that it has just loaded into the SYSRAM.<br> | |||
The [[STM32 MPU ROM code overview|ROM code]] leaves the SYSRAM secure when it jumps to the entry point of the FSBL that it just loaded into the SYSRAM.<br> | |||
The FSBL does not have to keep any context in SYSRAM when it jumps to the SSBL: each boot stage is independent from the other. | The FSBL does not have to keep any context in SYSRAM when it jumps to the SSBL: each boot stage is independent from the other. | ||
===== On {{MicroprocessorDevice | device=15}} | {{#lst:STM32MP1_internal_peripherals_assignment_table_template|stm32mp1_boottime}} | ||
<section begin=stm32mp13_boottime /> | |||
| rowspan="1" | Core/RAM | |||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="system peripheral" style="font-size:21px">✓</span> | |||
| <span title="system peripheral" style="font-size:21px">✓</span> | |||
| | |||
| | |||
|- | |||
<section end=stm32mp13_boottime /> | |||
|} | |||
====On {{MicroprocessorDevice | device=15}}==== | |||
The [[STM32 MPU ROM code overview|ROM code]] mainly configures the SYSRAM as a secure peripheral during its execution. It uses 9 Kbytes located at the beginning of the SYSRAM to store its read and write data. Among them, it stores the boot context in the first 512 bytes of SYSRAM: this boot context contains several information (such as the selected boot device) and pointers to the ROM code exported services (used for secure boot authentication). The ROM code loads the [[Boot chain overview|FSBL]] just after the boot context, into the remaining 247 Kbytes of SYSRAM, and eventually branches the Cortex<sup>®</sup>-A7 core 0 execution to this [[Boot chain overview|FSBL]].<br> | The [[STM32 MPU ROM code overview|ROM code]] mainly configures the SYSRAM as a secure peripheral during its execution. It uses 9 Kbytes located at the beginning of the SYSRAM to store its read and write data. Among them, it stores the boot context in the first 512 bytes of SYSRAM: this boot context contains several information (such as the selected boot device) and pointers to the ROM code exported services (used for secure boot authentication). The ROM code loads the [[Boot chain overview|FSBL]] just after the boot context, into the remaining 247 Kbytes of SYSRAM, and eventually branches the Cortex<sup>®</sup>-A7 core 0 execution to this [[Boot chain overview|FSBL]].<br> | ||
The [[Boot chain overview|FSBL]] code can use the whole SYSRAM, but it must take care not to overwrite the boot context before taking it into account. | The [[Boot chain overview|FSBL]] code can use the whole SYSRAM, but it must take care not to overwrite the boot context before taking it into account. | ||
===Runtime=== | {{#lst:STM32MP1_internal_peripherals_assignment_table_template|stm32mp1_boottime}} | ||
==== | <section begin=stm32mp15_boottime /> | ||
In | | rowspan="1" | Core/RAM | ||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="system peripheral" style="font-size:21px">✓</span> | |||
| <span title="system peripheral" style="font-size:21px">✓</span> | |||
| | |||
| | |||
|- | |||
<section end=stm32mp15_boottime /> | |||
|} | |||
====On {{MicroprocessorDevice | device=2}}==== | |||
The [[STM32 MPU ROM code overview|ROM code]] leaves the SYSRAM secure when it jumps to the entry point of the FSBL that it has just loaded into the SYSRAM.<br> | |||
The FSBL does not have to keep any context in SYSRAM when it jumps to the next boot stages: each boot stage is independent from the other. | |||
{{#lst:STM32MP2_internal_peripherals_assignment_table_template|stm32mp2_a35_boottime}} | |||
<section begin=stm32mp21_a35_boottime /><section begin=stm32mp23_a35_boottime /><section begin=stm32mp25_a35_boottime /> | |||
| rowspan="1" | Core/RAM | |||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="system peripheral" style="font-size:21px">✓</span> | |||
| <span title="system peripheral" style="font-size:21px">✓</span> | |||
| | |||
| | |||
|- | |||
<section end=stm32mp21_a35_boottime /><section end=stm32mp23_a35_boottime /><section end=stm32mp25_a35_boottime /> | |||
|} | |||
===Runtime assignment=== | |||
====On {{MicroprocessorDevice | device=13}}==== | |||
In OSTL distribution, the SYSRAM runtime mapping is the one reached at the end of the boot. It is consequently fully secure and can contain a secure monitor functions provided by [[STM32 MPU OP-TEE overview|OP-TEE]] secure OS to handle low power modes. | |||
STM32MP13 embeds an on-the-fly DDR cyphering engine, the [[DDRMCE internal peripheral]], allowing to put [[STM32 MPU OP-TEE overview|OP-TEE]] secure OS sensitive code inside the external [[DDRCTRL and DDRPHYC internal peripherals |DDR]], instead of the SYSRAM. | |||
You may decide to split the SYSRAM at runtime. In this case: | |||
* set the SYSRAM bottom secure, for a Cortex<sup>®</sup>-A7 secure monitor or a secure OS (such as [[STM32 MPU OP-TEE overview|OP-TEE]]) | |||
and | |||
* set the SYSRAM top non-secure, for instance for using in Linux<sup>®</sup> as [[Reserved memory|reserved memory]] | |||
{{#lst:STM32MP1_internal_peripherals_assignment_table_template|stm32mp13_runtime}} | |||
<section begin=stm32mp13_runtime /> | |||
| rowspan="1" | Core/RAM | |||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="assignable peripheral" style="font-size:21px">☑</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| Shareable (multiple choices supported) | |||
Secure section required for low power entry and exit | |||
|- | |||
<section end=stm32mp13_runtime /> | |||
|} | |||
====On {{MicroprocessorDevice | device=15}}==== | |||
In OSTL distribution, the SYSRAM runtime mapping is the one reached at the end of the boot. It is consequently fully secure and can contain a secure OS (like [[STM32 MPU OP-TEE overview|OP-TEE]]). | |||
You may decide to split the SYSRAM at runtime. In this case: | You may decide to split the SYSRAM at runtime. In this case: | ||
* set the SYSRAM bottom secure, for a Cortex<sup>®</sup>-A7 secure monitor | * set the SYSRAM bottom secure, for a Cortex<sup>®</sup>-A7 secure monitor or a secure OS (such as [[STM32 MPU OP-TEE overview|OP-TEE]]) | ||
and | and | ||
* set the SYSRAM top non-secure, for instance for using in Linux<sup>®</sup> as [[Reserved memory|reserved memory]] | * set the SYSRAM top non-secure, for instance for using in Linux<sup>®</sup> as [[Reserved memory|reserved memory]] | ||
{{#lst:STM32MP1_internal_peripherals_assignment_table_template|stm32mp15_runtime}} | |||
<section begin=stm32mp15_runtime /> | |||
| rowspan="1" | Core/RAM | |||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="assignable peripheral" style="font-size:21px">☑</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| <span title="assignable peripheral but not supported" style="font-size:21px">⬚</span> | |||
| Shareable (multiple choices supported) | |||
Secure section required for low power entry and exit | |||
|- | |||
<section end=stm32mp15_runtime /> | |||
|} | |||
====On {{MicroprocessorDevice | device=21}}==== | |||
In OSTL distribution, the SYSRAM runtime mapping is split into two regions. | |||
* one Cortex-A35 secure region dedicated to secure monitor which handles Cortex-A35 cluster | |||
* one Cortex-A35 non-secure region assigned to Linux kernel for [[HPDMA internal peripheral|HPDMA]] linked list management | |||
As SYSRAM is used by ROM code during D1Standby exit low power sequence, it is not recommended to assign SYSRAM to Cortex-M33 except if product doesn't plan to support Run2 and (LPLV)Stop2 low power modes. | |||
==== | {{#lst:STM32MP2_internal_peripherals_assignment_table_template|stm32mp21_runtime}} | ||
<section begin=stm32mp21_a35_runtime /> | |||
| rowspan="1" | Core/RAM | |||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="assigned peripheral" style="font-size:21px">☑</span><sup>BL31</sup></br> | |||
<span title="assignable peripheral" style="font-size:21px">☐</span><sup>OP-TEE</sup> | |||
| <span title="assigned peripheral" style="font-size:21px">☑</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| | |||
Cortex-A35 secure section required for low power entry and exit | |||
|- | |||
<section end=stm32mp21_a35_runtime /> | |||
|} | |||
====On {{MicroprocessorDevice | device=23}}==== | |||
In OSTL distribution, the SYSRAM runtime mapping is split into two regions. | |||
* one Cortex-A35 secure region dedicated to secure monitor which handles Cortex-A35 cluster | |||
* one Cortex-A35 non-secure region assigned to Linux kernel for [[HPDMA internal peripheral|HPDMA]] linked list management | |||
== | As SYSRAM is used by ROM code during D1Standby exit low power sequence, it is not recommended to assign SYSRAM to Cortex-M33 except if product doesn't plan to support Run2 and (LPLV)Stop2 low power modes. | ||
< | |||
{{#lst:STM32MP2_internal_peripherals_assignment_table_template|stm32mp23_runtime}} | |||
<section begin=stm32mp23_a35_runtime /> | |||
| rowspan="1" | Core/RAM | |||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="assigned peripheral" style="font-size:21px">☑</span><sup>BL31</sup></br> | |||
<span title="assignable peripheral" style="font-size:21px">☐</span><sup>OP-TEE</sup> | |||
| <span title="assigned peripheral" style="font-size:21px">☑</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| | |||
Cortex-A35 secure section required for low power entry and exit | |||
|- | |||
<section end=stm32mp23_a35_runtime /> | |||
|} | |||
====On {{MicroprocessorDevice | device=25}}==== | |||
In OSTL distribution, the SYSRAM runtime mapping is split into two regions. | |||
* one Cortex-A35 secure region dedicated to secure monitor which handles Cortex-A35 cluster | |||
* one Cortex-A35 non-secure region assigned to Linux kernel for [[HPDMA internal peripheral|HPDMA]] linked list management | |||
As SYSRAM is used by ROM code during D1Standby exit low power sequence, it is not recommended to assign SYSRAM to Cortex-M33 except if product doesn't plan to support Run2 and (LPLV)Stop2 low power modes. | |||
{{#lst:STM32MP2_internal_peripherals_assignment_table_template|stm32mp25_runtime}} | |||
<section begin=stm32mp25_a35_runtime /> | |||
| rowspan="1" | Core/RAM | |||
| rowspan="1" | [[SYSRAM internal memory|SYSRAM]] | |||
| SYSRAM | |||
| <span title="assigned peripheral" style="font-size:21px">☑</span><sup>BL31</sup></br> | |||
<span title="assignable peripheral" style="font-size:21px">☐</span><sup>OP-TEE</sup> | |||
| <span title="assigned peripheral" style="font-size:21px">☑</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| <span title="assignable peripheral" style="font-size:21px">☐</span> | |||
| | |||
| | |||
Cortex-A35 secure section required for low power entry and exit | |||
|- | |||
<section end=stm32mp25_a35_runtime /> | |||
|} | |||
==Software frameworks and drivers== | |||
Thus, below are listed the software frameworks and drivers managing the {{Green|XXX}} peripheral for the embedded software components listed in the above tables. | |||
* '''Linux<sup>®</sup>''': [[Reserved memory|Linux reserved memory]] | |||
* '''OP-TEE''': [[STM32 MPU OP-TEE overview|OP-TEE]] | |||
* '''TF-A BL2''': [[TF-A overview|TF-A BL2]] | |||
* '''TF-A BL31''': [[TF-A overview|TF-A BL31]] | |||
* '''TF-M''': [[TF-M overview|TF-M]] | |||
==How to assign and configure the peripheral== | |||
The peripheral assignment can be done via the [[STM32CubeMX]] graphical tool (and manually completed if needed).<br /> | |||
This tool also helps to configure the peripheral: | |||
* partial device trees (pin control and clock tree) generation for the OpenSTLinux software components, | |||
* HAL initialization code generation for the STM32CubeMPU Package. | |||
The configuration is applied by the firmware running in the context in which the peripheral is assigned. | |||
<noinclude> | <noinclude> | ||
[[Category:RAM interfaces]] | [[Category:RAM interfaces]] | ||
{{ArticleBasedOnModel | Internal peripheral article model}} | |||
{{PublicationRequestId | 9290 | 2018-10-22 | AnneJ}} | {{PublicationRequestId | 9290 | 2018-10-22 | AnneJ}} | ||
</noinclude> | </noinclude> |
Latest revision as of 16:23, 22 October 2024
1. Article purpose[edit | edit source]
The purpose of this article is to:
- briefly introduce the SYSRAM internal memory peripheral and its main features,
- indicate the peripheral instances assignment at boot time and their assignment at runtime (including whether instances can be allocated to secure contexts),
- list the software frameworks and drivers managing the peripheral,
- explain how to configure the peripheral.
2. Peripheral overview[edit | edit source]
The SYSRAM peripheral is an internal memory peripheral. It is physically located near the Arm® Cortex-A to optimize the core performance.
- STM32MP13x lines
SYSRAM is 128-Kbyte wide
- STM32MP15x lines
SYSRAM is 256-Kbyte wide
- STM32MP2 unknown microprocessor device SYSRAM is 256-Kbyte wide
On STM32MP1 Series, the SYSRAM is protected by ETZPC firewall. By default, SYSRAM access is granted to Cortex-A7 secure. The SYSRAM can be split into 2 memory regions with a 4-Kbyte granularity:
- a low secure region
- a high non-secure region
On STM32MP2 unknown microprocessor device, the SYSRAM is protected by RISAB memory firewall, allowing to create some 4-Kbyte granularity memory regions with different access rights to share SYSRAM between the different execution contexts of the platform. By default, SYSRAM access is granted to Cortex-A35 secure.
Refer to the STM32 MPU reference manuals for the complete list of features, and to the software frameworks and drivers, introduced below, to see which features are implemented.
3. Peripheral usage[edit | edit source]
This chapter is applicable in the scope of the OpenSTLinux BSP running on the Arm® Cortex®-A processor(s), and the STM32CubeMPU Package running on the Arm® Cortex®-M processor.
3.1. Boot time assignment[edit | edit source]
3.1.1. On STM32MP13x lines
[edit | edit source]
The ROM code leaves the SYSRAM secure when it jumps to the entry point of the FSBL that it has just loaded into the SYSRAM.
The FSBL does not have to keep any context in SYSRAM when it jumps to the SSBL: each boot stage is independent from the other.
Click on to expand or collapse the legend...
Domain | Peripheral | Boot time allocation | Comment ![]() | |||
---|---|---|---|---|---|---|
Instance | Cortex-A7 secure (ROM code) |
Cortex-A7 secure (TF-A BL2) |
Cortex-A7 non-secure (U-Boot) | |||
Core/RAM | SYSRAM | SYSRAM | ✓ | ✓ |
3.1.2. On STM32MP15x lines
[edit | edit source]
The ROM code mainly configures the SYSRAM as a secure peripheral during its execution. It uses 9 Kbytes located at the beginning of the SYSRAM to store its read and write data. Among them, it stores the boot context in the first 512 bytes of SYSRAM: this boot context contains several information (such as the selected boot device) and pointers to the ROM code exported services (used for secure boot authentication). The ROM code loads the FSBL just after the boot context, into the remaining 247 Kbytes of SYSRAM, and eventually branches the Cortex®-A7 core 0 execution to this FSBL.
The FSBL code can use the whole SYSRAM, but it must take care not to overwrite the boot context before taking it into account.
Click on to expand or collapse the legend...
Domain | Peripheral | Boot time allocation | Comment ![]() | |||
---|---|---|---|---|---|---|
Instance | Cortex-A7 secure (ROM code) |
Cortex-A7 secure (TF-A BL2) |
Cortex-A7 non-secure (U-Boot) | |||
Core/RAM | SYSRAM | SYSRAM | ✓ | ✓ |
3.1.3. On STM32MP2 unknown microprocessor device[edit | edit source]
The ROM code leaves the SYSRAM secure when it jumps to the entry point of the FSBL that it has just loaded into the SYSRAM.
The FSBL does not have to keep any context in SYSRAM when it jumps to the next boot stages: each boot stage is independent from the other.
Click on to expand or collapse the legend...
Domain | Peripheral | Boot time allocation | Comment ![]() | |||
---|---|---|---|---|---|---|
Instance | Cortex-A35 secure (ROM code) |
Cortex-A35 secure (TF-A BL2) |
Cortex-A35 nonsecure (U-Boot) | |||
Core/RAM | SYSRAM | SYSRAM | ✓ | ✓ |
3.2. Runtime assignment[edit | edit source]
3.2.1. On STM32MP13x lines
[edit | edit source]
In OSTL distribution, the SYSRAM runtime mapping is the one reached at the end of the boot. It is consequently fully secure and can contain a secure monitor functions provided by OP-TEE secure OS to handle low power modes.
STM32MP13 embeds an on-the-fly DDR cyphering engine, the DDRMCE internal peripheral, allowing to put OP-TEE secure OS sensitive code inside the external DDR, instead of the SYSRAM.
You may decide to split the SYSRAM at runtime. In this case:
- set the SYSRAM bottom secure, for a Cortex®-A7 secure monitor or a secure OS (such as OP-TEE)
and
- set the SYSRAM top non-secure, for instance for using in Linux® as reserved memory
Click on to expand or collapse the legend...
Domain | Peripheral | Runtime allocation | Comment ![]() | ||
---|---|---|---|---|---|
Instance | Cortex-A7 secure (OP-TEE) |
Cortex-A7 non-secure (Linux) | |||
Core/RAM | SYSRAM | SYSRAM | ☑ | ☐ | Shareable (multiple choices supported)
Secure section required for low power entry and exit |
3.2.2. On STM32MP15x lines
[edit | edit source]
In OSTL distribution, the SYSRAM runtime mapping is the one reached at the end of the boot. It is consequently fully secure and can contain a secure OS (like OP-TEE).
You may decide to split the SYSRAM at runtime. In this case:
- set the SYSRAM bottom secure, for a Cortex®-A7 secure monitor or a secure OS (such as OP-TEE)
and
- set the SYSRAM top non-secure, for instance for using in Linux® as reserved memory
Click on to expand or collapse the legend...
Domain | Peripheral | Runtime allocation | Comment ![]() | |||
---|---|---|---|---|---|---|
Instance | Cortex-A7 secure (OP-TEE) |
Cortex-A7 non-secure (Linux) |
Cortex-M4 (STM32Cube) | |||
Core/RAM | SYSRAM | SYSRAM | ☑ | ☐ | ⬚ | Shareable (multiple choices supported)
Secure section required for low power entry and exit |
3.2.3. On STM32MP21 unknown microprocessor device[edit | edit source]
In OSTL distribution, the SYSRAM runtime mapping is split into two regions.
- one Cortex-A35 secure region dedicated to secure monitor which handles Cortex-A35 cluster
- one Cortex-A35 non-secure region assigned to Linux kernel for HPDMA linked list management
As SYSRAM is used by ROM code during D1Standby exit low power sequence, it is not recommended to assign SYSRAM to Cortex-M33 except if product doesn't plan to support Run2 and (LPLV)Stop2 low power modes.
Click on to expand or collapse the legend...
Domain | Peripheral | Runtime allocation | Comment ![]() | ||||
---|---|---|---|---|---|---|---|
Instance | Cortex-A35 secure (OP-TEE / TF-A BL31) |
Cortex-A35 nonsecure (Linux) |
Cortex-M33 secure (TF-M) |
Cortex-M33 nonsecure (STM32Cube) | |||
Core/RAM | SYSRAM | SYSRAM | ☑BL31 ☐OP-TEE |
☑ | ☐ | ☐ |
Cortex-A35 secure section required for low power entry and exit |
3.2.4. On STM32MP23 unknown microprocessor device[edit | edit source]
In OSTL distribution, the SYSRAM runtime mapping is split into two regions.
- one Cortex-A35 secure region dedicated to secure monitor which handles Cortex-A35 cluster
- one Cortex-A35 non-secure region assigned to Linux kernel for HPDMA linked list management
As SYSRAM is used by ROM code during D1Standby exit low power sequence, it is not recommended to assign SYSRAM to Cortex-M33 except if product doesn't plan to support Run2 and (LPLV)Stop2 low power modes.
Click on to expand or collapse the legend...
Domain | Peripheral | Runtime allocation | Comment ![]() | ||||
---|---|---|---|---|---|---|---|
Instance | Cortex-A35 secure (OP-TEE / TF-A BL31) |
Cortex-A35 nonsecure (Linux) |
Cortex-M33 secure (TF-M) |
Cortex-M33 nonsecure (STM32Cube) | |||
Core/RAM | SYSRAM | SYSRAM | ☑BL31 ☐OP-TEE |
☑ | ☐ | ☐ |
Cortex-A35 secure section required for low power entry and exit |
3.2.5. On STM32MP25 unknown microprocessor device[edit | edit source]
In OSTL distribution, the SYSRAM runtime mapping is split into two regions.
- one Cortex-A35 secure region dedicated to secure monitor which handles Cortex-A35 cluster
- one Cortex-A35 non-secure region assigned to Linux kernel for HPDMA linked list management
As SYSRAM is used by ROM code during D1Standby exit low power sequence, it is not recommended to assign SYSRAM to Cortex-M33 except if product doesn't plan to support Run2 and (LPLV)Stop2 low power modes.
Click on to expand or collapse the legend...
Domain | Peripheral | Runtime allocation | Comment ![]() | |||||
---|---|---|---|---|---|---|---|---|
Instance | Cortex-A35 secure (OP-TEE / TF-A BL31) |
Cortex-A35 nonsecure (Linux) |
Cortex-M33 secure (TF-M) |
Cortex-M33 nonsecure (STM32Cube) |
Cortex-M0+ (STM32Cube) | |||
Core/RAM | SYSRAM | SYSRAM | ☑BL31 ☐OP-TEE |
☑ | ☐ | ☐ |
Cortex-A35 secure section required for low power entry and exit |
4. Software frameworks and drivers[edit | edit source]
Thus, below are listed the software frameworks and drivers managing the XXX peripheral for the embedded software components listed in the above tables.
- Linux®: Linux reserved memory
- OP-TEE: OP-TEE
- TF-A BL2: TF-A BL2
- TF-A BL31: TF-A BL31
- TF-M: TF-M
5. How to assign and configure the peripheral[edit | edit source]
The peripheral assignment can be done via the STM32CubeMX graphical tool (and manually completed if needed).
This tool also helps to configure the peripheral:
- partial device trees (pin control and clock tree) generation for the OpenSTLinux software components,
- HAL initialization code generation for the STM32CubeMPU Package.
The configuration is applied by the firmware running in the context in which the peripheral is assigned.