Last edited one week ago

STM32MP23 memory mapping

Applicable for STM32MP23x lines



This article describes how the STM32 MPU Embedded Software distribution maps the various software memory needs in internal and external volatile memories.


1. Overview[edit | edit source]

This article shows the default memory mapping defined by STMicroelectronics in STM32MPU Embedded Software. It uses a subset of all memory regions that are exposed at hardware level: customers may use other memory regions or aliases that are not shown here but are described in the STM32 MPU reference manuals.
The objective of the default STM32MPU Embedded Software memory mapping is to propose a generic memory mapping that:

  • allows demonstrating all the features proposed by the hardware platform and associated software.
  • is compliant with the official ST boards.

2. Memory mapping[edit | edit source]

2.1. Overall memory mapping[edit | edit source]

The following figure shows assignment of the different memories to the different execution contexts.

The different memory aliases required by Cortex-M33 Armv8-M architecture to differentiate secure and non-secure memories are not represented in below figure.


ROM codeSYSRAMSRAMRETRAMVDERAMLPSRAM*LPSRAMBKPSRAMDDR
STM32MP25 memory mapping

(*) LPSRAM only available on STM32MP25x lines More info.png

(**) CM0+ only available on STM32MP25x lines More info.png

3. Internal RAM mapping[edit | edit source]

SYRAM, SRAMs, RETRAM, VDERAM and LPSRAM internal RAMs are mapped several times at different aliases in the memory map:

For SYRAM, SRAMs, RETRAM and VDERAM possible aliases are: 0x0A0. ...., 0x0E0. ...., 0x20.. .... and 0x30.. .....

For LPSRAM possible aliases are: 0x200C0000 and 0x300C0000.

3.1. Overview[edit | edit source]

The SYSRAM, RETRAM, SRAM1/2, and VDERAM (if Video decoder and Video encoder are not used) can be assigned to different execution contexts of the platform by configuring the [RISAB internal peripheral|RISAB]] memory firewall.

The STM32MPU Embedded Software is based on a default internal RAM memory mapping which can be modified by customer to fit with its product requirements. The next chapters describe the constraints per type of RAM and memory region.

3.1.1. SYSRAM[edit | edit source]

The following figure shows the evolution of the SYSRAM mapping during boot flow.

STM32MP25 sysram mapping.png

At runtime, the SYSRAM is split in two regions:

  • 128kB Cortex-A35 Secure region dedicated to TF-A BL31 secure monitor.
  • 128kB Cortex-A35 non-secure region dedicated to HPDMA linked lists management.

See SYSRAM internal memory for more information.

3.1.2. SRAM1 and SRAM2[edit | edit source]

In Cortex-A35 main processor mode, SRAM1 is used by FSBL TF-A BL2 to store DDR controller firmware and prepare OTP shadow.

At runtime, the first 4kByte of the SRAM1 are reserved for OTP shadow allowing to share OTP between Cortex-A35 OP-TEE secure OS and Cortex-M33 TF-M secure OS.
Rest of SRAM1 and SRAM2 are allocated in STM32MPU Embedded Software to Cortex-M33 secure and non-secure firmware, when not located in DDR for some low power or performance reasons.
The following figure shows the evolution of SRAM mapping during boot flow: STM32MP25 sram mapping.png


3.1.3. RETRAM[edit | edit source]

In STM32MPU Embedded Software, RETRAM is used for:

  • DDR parameters saving to restore DDR access on low power modes exit.
  • Cortex-M33 firmware that must be preserved in low power Standby mode. It is mainly the low power entry and exit functions executed by the Cortex-M33 secure context.

STM32MP25 retram mapping.png

3.1.4. BKPSRAM[edit | edit source]

In STM32MPU Embedded Software, the BKPSRAM is used as following:

  • 4kB dedicated to secure SW components context saving for restoration during low power exit sequence.
  • 4kB for TF-M Internal Trusted Storage (ITS).

STM32MP25 bkpsram mapping.png


3.1.5. VDERAM[edit | edit source]

In STM32MPU Embedded Software, VDERAM is by default allocated to hardware video encoder and decoder if VENC or VDEC is assigned to one execution context.
Else if none is used, VDERAM could be allocated to any execution context.

3.1.6. LPSRAM (only on STM32MP25x lines More info.png)[edit | edit source]

LPSRAM are dedicated to Cortex-M0+ firmware and associated shared memory. The default memory mapping is the following one:

STM32MP25 lpsram mapping.png

4. DDR mapping[edit | edit source]

STM32MPU Embedded Software proposes a generic DDR mapping compliant with DDR from 256MByte to 4GByte, allowing to demonstrate all STM32MPU Embedded Software features.

The first 64MByte are reserved to firmware:

  • Cortex-M33 secure OS (TF-M code and data)
  • Cortex-M33 non-secure application (Cube code and data)
  • Cortex-A35 secure OS (OP-TEE)
  • Shared memory IPC between Cortex-A35 and Cortex-M33

Rest of the DDR is allocated to the Linux kernel and applications.
All bus master peripherals can access only to the lower 2GByte of DDR as they are 32bit capable. Linux CMA and reserved memories used for contiguous buffers allocation must be defined in the first 2GByte of DDR.
In case of generic memory allocation done in the higher 2GByte of DDR, Linux kernel offers SWIOTLB mechanism to recopy data in a bounce buffer located in the lower 2GByte of DDR compliant with 32bit bus master peripherals.

The following figure shows the evolution of the DDR mapping during the boot sequence.

STM32MP25 DDR mapping.png

Info white.png Information
Note:
U-Boot supports a maximum size of 2GB DDR.

It is customer responsibility to adapt DDR mapping to its product configuration (DDR size and SW components)

4.1. How to configure RAM mapping[edit | edit source]

The memory mapping is defined in each SW component device tree file using Reserved_memory bindings. Customer can change name, based address, size, and access rights of each region according to its product needs.

To ensure the consistency of the system, memory declarations of each SW component have to be updated according to the expected configuration.

ST recommands using STM32CubeMX tools to generate coherent memory mapping with associated access rights.