Tool/software: TI-RTOS
Hi,
I am studying CSM and trying to experiment.
To briefly describe the overall flow of the CSM
1. Program the password and place it in the PWL.
2. If I try to debug through JTAG, I can compare it with PWL by putting the correct value in the key register, then, debugging is possible if it matches.
3. Unable to access secure memory from non-secure memory, but call is possible.
4. You can freely use non-secure memory in secure memory.
It has been described that in non-secure memory, the program counter can be used to call content in secure memory, what is the call to?
and, Can you show an example that allows me to write code to access secure memory from non-secure memory?
As the first student to study embedded, I do not know too much. I would be grateful if you kindly explain it to me in detail.
Thanks and regards,
Han