ETM internal peripheral

Revision as of 12:07, 24 September 2020 by Registered User

1. Article purpose[edit source]

The purpose of this article is to:

  • briefly introduce the ETM peripheral and its main features
  • indicate the level of security supported by this hardware block
  • explain how each instance can be allocated to the three runtime contexts and linked to the corresponding software components
  • explain, when necessary, how to configure the ETM peripheral.

2. Peripheral overview[edit source]

The ETM peripheral is used to log instruction trace into the embedded trace FIFO (ETF). This trace include hardware events (the list is given in the STM32MP15 reference manuals). Once in the ETF buffer, the trace can directly be dumped from the Cortex®-A7 or to the trace port interface unit (TPIU), connected to an external probe able to decode it.
This peripheral has two instances, one for each Cortex®-A7 core.

2.1. Features[edit source]

Refer to the STM32MP15 reference manuals for the complete list of features, and to the software components, introduced below, to see which features are really implemented.

2.2. Security support[edit source]

The ETM is a non secure peripheral.

3. Peripheral usage and associated software[edit source]

3.1. Boot time[edit source]

The ETM is not used at boot time.

3.2. Runtime[edit source]

3.2.1. Overview[edit source]

The ETM can be assigned to the Cortex®-A7 non-secure for using in Linux with CoreSight framework.
This driver allows to select the hardware events (listed in the STM32MP15 reference manuals) to log via the ETM peripheral into the ETF and dump it in the Linux console for analysis.

3.2.2. Software frameworks[edit source]

Domain Peripheral Software frameworks Comment
Cortex-A7
secure
(OP-TEE)
Cortex-A7
non-secure
(Linux)
Cortex-M4

(STM32Cube)
Trace & Debug ETM Linux CoreSight framework

3.2.3. Peripheral configuration[edit source]

The configuration is applied by the firmware running in the context to which the peripheral is assigned. The configuration can be done alone via the STM32CubeMX tool for all internal peripherals, and then manually completed (particularly for external peripherals), according to the information given in the corresponding software framework article.

3.2.4. Peripheral assignment[edit source]

Internal peripherals

Check boxes illustrate the possible peripheral allocations supported by STM32 MPU Embedded Software:

  • means that the peripheral can be assigned () to the given runtime context.
  • is used for system peripherals that cannot be unchecked because they are statically connected in the device.

Refer to How to assign an internal peripheral to a runtime context for more information on how to assign peripherals manually or via STM32CubeMX.
The present chapter describes STMicroelectronics recommendations or choice of implementation. Additional possiblities might be described in STM32MP15 reference manuals.

Domain Peripheral Runtime allocation Comment
Instance Cortex-A7
secure
(OP-TEE)
Cortex-A7
non-secure
(Linux)
Cortex-M4

(STM32Cube)
Trace & Debug ETM ETM0
ETM1

4. References[edit source]