Configuration Issues with the RA6 Ethernet Controller
In this article, we'll discuss one of the most common issues that catch many people out when developing a “flat” application that uses the Ethernet controller on the RA Family Microcontrollers with Arm® TrustZone® technology. Currently, this covers the RA6M4 and RA6M5 microcontrollers.
Renesas has introduced TrustZone on our latest generation of microcontrollers based on the Arm Cortex®-M33 core. TrustZone provides a solution for application isolation to complement the advanced security features available on many of these products. TrustZone divides the MCU and application into secure and non-secure regions. Code in the secure region can access both secure and non-secure memory and device resources, but code in the non-secure region can assess only non-secure memory and device resources.
The ability to separate the secure and non-secure parts of your application is extremely useful for many applications, especially those concerned with IP protection and maintaining a strong Root of Trust for application updates.
While this ability to provide isolation is extremely useful for many applications, for other applications, isolation isn’t required. To support these use cases, it’s also possible to implement what we call a “flat” application, where TrustZone isolation is minimized.
A flat project exists (almost!) completely within TrustZone’s secure region. However, it’s important to understand that TrustZone is still active, so there can be some issues that we have to manage.
There are a few things that are important to understand:
●Any code placed in external memory (such as OSPI or QSPI) will be non-secure.
●The Ethernet Direct Memory Access Controller (EDMAC) is designed to be a non-secure bus master, so the associated Ethernet RAM buffers must be placed in non-secure RAM.
●In many cases, the development tools will automatically manage the required Device Lifecycle Management (DLM) manipulation and TrustZone boundary setting in the background. This must be manually duplicated for production programming.
In a flat project that includes the Ethernet controller, all code, data, and peripherals are placed in a single secure region, except for the EDMAC RAM buffers, which must remain in the non-secure region. This requires configuration of the Implementation Defined Attribution Unit (IDAU), which must be programmed into the nonvolatile memory using serial programming commands when the device lifecycle is in the Secure Software Development (SSD) state. For more information, see the Security Features section in your chosen RA microcontroller hardware manual.
If you are having problems with the Ethernet controller on these devices, one of the first things we would recommend is that you check that the TrustZone boundaries are configured correctly in the IDAU and that the DLM state is set to SSD.
I hope this brief explanation of how TrustZone can affect the operation of the Ethernet controller on TrustZone-enabled RA 32-bit microcontrollers can help you identify and resolve any issues you might encounter.
- +1 Like
- Add to Favorites
Recommend
- Renesas RA Family Mainstream 32-bit Microcontrollers: RA4M3, RA6M4, RA6M5 Group BGA Package Product Addition
- Renesas RA6M4: 200 MHz Arm® Cortex®-M33 MCU with 1 MB Code Flash Memory
- Renesas and Panthronics introduce new cost- and space-saving design for secure mobile PoS terminals
- Renesas DSP Solution on Renesas Lab on the Cloud, Input Analog Signals Directly From A Signal Generator To The Rx231 Microcontroller Evaluation Board
- Renesas Secure Key Installation with Free of Charge DLM Service
- Renesas Extends IoT Security Leadership With PSA Certified Level 2 and SESIP Certification for RA Family MCUs
- New RA6M4 MCU Group‘s Integrated Secure Crypto Engine in Concert with Arm® TrustZone® Technology
- Renesas‘ Semiconductor Manufacturing Factory (Naka Factory) Fire: Production Capacity Has Recovered to 88%
This document is provided by Sekorm Platform for VIP exclusive service. The copyright is owned by Sekorm. Without authorization, any medias, websites or individual are not allowed to reprint. When authorizing the reprint, the link of www.sekorm.com must be indicated.