You, a system and equipment manufacturer or designer, are responsible to ensure that your systems (and
any TI hardware or software components incorporated in your systems) meet all applicable safety,
regulatory, and system-level performance requirements. All application and safety related information in
this document (including application descriptions, suggested safety measures, suggested TI products, and
other materials) is provided for reference only. You understand and agree that your use of TI components
in safety critical applications is entirely at your risk, and that you (as buyer) agree to defend, indemnify,
and hold harmless TI from any and all damages, claims, suits, or expense resulting from such use.
This document is a safety manual for the Texas Instruments Hercules safety critical microcontroller
product family. The product family utilizes a common safety architecture that is implemented in multiple
application focused products. Product configurations supported by this safety manual include silicon
revisions A and B of the following products: (Note that the part numbers listed below are for revision B;
other revisions are slightly different. The device revision can be determined by the symbols marked on the
top of the device as seen in Figure 1 below this list).
•RM4xx Safety Critical Microcontrollers
– RM57L843-ZWT (Orderable Part #: RM57L843BZWTT)
– RM57L843-ZWT (Orderable Part #: RM57L843BZWTTR)
SafeTI is a trademark of Texas Instruments.
ARM, Cortex are registered trademarks of ARM Limited.
Adobe is a trademark of Adobe Systems Incorporated in the United States, and/or other countries.
IBM, DOORS are registered trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide.
Microsoft, Excel are registered trademarks of Microsoft Corporation in the United States and/or other countries, or both.
All other trademarks are the property of their respective owners.
8
Figure 1. Device Revision Code Identification
This Safety Manual provides information needed by system developers to assist in the creation of a safety
critical system using a supported Hercules microcontroller. This document contains:
•An overview of the superset product architecture
•An overview of the development process utilized to reduce systematic failures
•An overview of the safety architecture for management of random failures
•The details of architecture partitions, implemented safety mechanisms
The following information is documented in the Safety Analysis Report Summary for RM57x ARM®-Based
Safety Critical Microcontrollers (SPNU578) and is not repeated in this document:
•Summary of failure rates of the MCU estimated at the chip level
•Assumptions of use utilized in calculation of safety metrics
•Summary of targeted standard (IEC 61508, ISO 26262, and so forth) safety metrics at the chip level
The following information is documented in the Detailed Safety Analysis Report for RM57x ARM®-Based
Safety Critical Microcontrollers (SPNU579) and is not repeated in this document:
•Fault model used to estimate device failure rates suitable to enable calculation of customized failure
•Quantitative FMEA (also known as FMEDA, Failure Modes, Effects, and Diagnostics Analysis) with
The following information is documented in the Safety Report, and will not be repeated in this document:
•Results of assessments of compliance to targeted standards
The user of this document should have a general familiarity with the Hercules product families. For more
information, see http://www.ti.com/hercules. This document is intended to be used in conjunction with the
pertinent data sheets, technical reference manuals, and other documentation for the products under
development.
For information which is beyond the scope of the listed deliverables, please contact your TI sales
representative or http://www.ti.com.
Introduction
rates
detail to the sub-module level of the device, suitable to enable calculation based on customized
application of diagnostics
The RM57x 65 nm Hercules product family is an evolution of the proven TMS570LS Hercules products in
the 65 nm manufacturing process. A simplified graphical view of the product superset architecture can be
seen in Figure 2. This is a basic representation of the architecture and is not all inclusive. For example,
products in the family may scale based on the number of peripherals, number of bus master peripherals,
or amount of memory - but the programmer's model remains consistent.
The Hercules product architecture utilizes the ARM Cortex®-R5F CPU in a cached memory configuration
with both instruction and data caches. The Cortex-R5F CPU is implemented with a checker Cortex-R5F
CPU in a lockstep configuration. This provides cycle by cycle checking of correct CPU operation while
keeping a simple, easy to use, single core programmer's model. The Cortex R5F CPU has a multithreaded level two bus master interface, which provides access to the level two memory hierarchy,
supporting up to seven concurrent CPU accesses in flight. A level two slave interface allows bus masters
access to the level one cache memories for test, debug, and fault insertion purposes. A separate low
latency peripheral port provides access to peripherals. In addition, a Snoop Control Unit (SCU) module is
present to snoop non-CPU bus master accesses for the purpose of I/O cache coherency.
The level two device hierarchy is dominated by two switched central resource interconnect modules (also
known as bus matrices or crossbars): CPU Interconnect Subsystem and Peripheral Interconnect
Subsystem. These device level interconnect modules allow multiple bus masters to access multiple bus
slaves. Prioritization, routing, decode, and arbitration functions are provided. Access to the memory
subsystem (Flash, FEE, SRAM, and EMIF) is provided via the CPU Interconnect Subsystem. Peripherals
are accessed via the Peripheral Interconnect Subsystem and multiple level three peripheral interconnect
segments (PCR1, PCR2, and PCR3). Bus masters to the level two device hierarchy include CPUs, bus
master peripherals, debug bus masters, and general purpose direct memory access (DMA) controllers.
Bus slaves on the level two hierarchy include the primary Flash memory, primary SRAM, Flash EEPROM
emulation memory, and external memory interface (EMIF), one or more peripheral bus segments (PCRs),
and Cortex-R5F slave port access..
The level three hierarchy is primarily composed of peripherals. Peripherals are grouped into one or more
peripheral bus segments (PCRs), managed by a peripheral central resource. The peripheral central
resource provides address decode functionality for bus transactions targeting peripherals.
Hercules RM57x Product Overview
2.1Targeted Applications
The Hercules MCU family is targeted at general purpose safety applications. Multiple safety applications
were analyzed during the concept phase. Example target applications include:
•Automotive braking systems, including anti-lock braking (ABS), anti-lock braking with traction control
(ABS+ TC), and electronic stability control (ESC)
•Motor control systems, particularly electronic power steering (EPS) systems and electric vehicle (EV)
power train
•General purpose safety computation, such as integrated sensor cluster processing and vehicle strategy
generation in an active safety system
•Industrial automation such as programmable logic controllers (PLCs) and programmable automation
controllers (PACs) for safety critical process control
In the case of overlapping requirements between target systems, TI has attempted to design the device
respecting the most stringent requirements. For example, the fault tolerant time intervals for timer logic in
an ESC application are typically on the order of 100 ms. In an EPS application, the fault tolerant time
interval is typically on the order of 10 ms. In such case, TI has performed timer subsystem analysis
respecting <10 ms fault tolerant time interval.
While TI considered certain applications during the development of these devices, this should not restrict a
customer who wishes to implement other systems. With all safety critical components, rationalization of
the component safety concept to the system safety concept should be executed by the system integrator.
This device is a Type B device, as defined in IEC 61508:2010
This device claims no hardware fault tolerance (HFT = 0), as defined in IEC 61508:2010
For safety components developed according to many safety standards, it is expected that the component
safety manual will provide a list of product safety constraints. For a simple component, or more complex
components developed for a single application, this is a reasonable response. However, the Hercules
product family is both a complex design and is not developed targeting a single, specific application.
Therefore, a single set of product safety constraints cannot govern all viable uses of the product. The
Detailed Safety Analysis Report for RM57x ARM®-Based Safety Critical Microcontrollers (SPNU579)
provides a reference implementation of the Hercules product in a common system with relevant product
safety constraints.
Hercules Development Process for Management of Systematic Faults
3Hercules Development Process for Management of Systematic Faults
For a safety critical development, it is necessary to manage both systematic and random faults. Texas
Instruments has created a unique development process for safety critical semiconductors that greatly
reduces probability of systematic failure. This process builds on a standard Quality Managed (QM)
development process as the foundation for safety critical development. This process is then augmented by
a second layer of development activities that are specific to safety critical developments targeting IEC
61508.
In 2007, TI first saw the need to augment this standard development process in order to develop products
according to IEC 61508. TI engaged with safety industry leader exida consulting to ensure the
development was compliant to the standard. During 2008, a process for safety critical development
according to IEC 61508 1st edition was implemented. This process has been executed on multiple
microcontroller developments that are currently shipping into safety critical systems. The Hercules family
product and safety architectures described in this document began development under the IEC 61508
development flow.
By mid 2009, it became clear that the emerging IEC 61508 2nd edition functional safety standards would
require enhanced process flow capabilities. Due to the lack of maturity of these draft standards, it was not
possible to implement a development process that ensured compliance before final drafts were available.
In mid 2010, TI started development of a process flow compliant to IEC 61508 2nd edition. TI worked in
detail with Yogitech and found that the companies have complementary capabilities. A partnership was
established for engineering services and safety consulting services to accelerate new safety-related
product development. Yogitech's existing fRMethodology development process and TI's IEC 61508
development process were merged and enhanced to create a new process addressing IEC 61508 2nd
edition.
Hercules Development Process for Management of Systematic Faults
3.1TI Standard MCU Automotive Development Process
Texas Instruments has been developing automotive microcontrollers for safety critical and non-safety
critical automotive applications for over twenty years. Automotive markets have strong requirements on
quality management and high reliability of product. Though not explicitly developed for compliance to a
functional safety standard, the TI standard MCU Automotive development process already features many
elements necessary to manage systematic faults. This development process can be considered to be
Quality Managed (QM), but does not achieve an IEC 61058 Safety Integrity Level (SIL). For up-to-date
information on TI quality process certifications, see http://www.ti.com/quality.
The standard process breaks development into phases:
•Business opportunity pre-screen
•Program planning
•Create
•Validate, sample, and characterize
•Qualify
•Ramp to production and sustaining production
The standard process is illustrated in Figure 3.
www.ti.com
Figure 3. TI Standard MCU Automotive QM Development Process
Hercules Development Process for Management of Systematic Faults
3.2TI MCU Automotive Legacy IEC 61508 Development Process
Texas Instruments developed an initial process for developing safety critical automotive microcontrollers in
2008. This process was developed targeting the IEC 61508 1st edition standard, as augmented with
available committee drafts of the 2nd edition. The process is developed as an additional layer of activities
that should be carried out in addition to the standard MCU Automotive QM development process. This
process as applied on the TMS570LS20216S product development has been assessed suitable for use in
IEC 61508 SIL 3 applications by exida Certification S.A. (certificate TI 071227 C001). In July 2012 the
development process and the TMS570LS20x/10x product family was assessed to the IEC 61508:2010
standard and certified suitable for use in IEC 61508 SIL 3 applications by exida Certification Services
(certificate TI 1204073 C001).
Key new activities in this process included:
•Nomination of a safety manager with ownership of all safety related activities
•Development of a safety plan to track safety related activities
•Generation, application, and validation of safety requirements
•Execution of qualitative (FMEA) and quantitative (FMEDA) safety analysis
•Authoring of safety manual and safety analysis report to support customer development
3.3Yogitech fRMethodology Development Process
fRMethodology is the “white-box” approach for safety design exploration proprietary of YOGITECH,
including:
•fRFMEA, a methodology to perform the FMEA of an integrated circuit in accordance to IEC 61508
•fRFI, a tool to perform fault injection of an integrated circuit based on inputs derived from fRFMEA
YOGITECH’s fRMethodology mainly consists of:
•Splitting the component or system in elementary parts (“sensitive zones”)
•Computing their failure rates
•Using those failure rates to compute safety metrics
•Validating the results with fault injection
•Allowing sensitivity analyses of those metrics by changing architectural or technological parameters
•Delivering to the customer numbers to compare different architectures
3.4Hercules Enhanced Safety Development Process
The Hercules enhanced safety development process is a merger of the existing TI and Yogitech flows for
functional safety development. The goal of the process development is to take the best aspects of each
flow and collaborate, resulting in the best in class capabilities to reduce systematic faults.
The process flow is targeted for compliance to IEC 61508, and is under a process of continuous
improvement to incorporate new features of emerging functional safety standards. These functional safety
standards are targeted because TI and Yogitech believe they best represent the state of the art in
functional safety development for semiconductors. While not directly targeted at other functional safety
standards, it is expected that products developed to industry state-of-the-art can be readily utilized in other
functional safety systems.
The resulting flow was subsequently assessed by TUEV SUED for compliance to IEC 61508 and ISO
26262 and further enhanced based on technical findings. The development flow is certified by TUEV
SUED under certificate Q4B 13 03 84071 001.
Hercules Development Process for Management of Systematic Faults
Key elements of the combined process flow are:
•Assumptions on system level design, safety concept, and requirements based on TI's expertise in
safety critical systems development
•Combined qualitative and quantitative or similar safety analysis techniques comprehending the sum of
silicon failure modes and diagnostic techniques known to both TI and Yogitech
•Fault estimation based on multiple industry standards as well as TI manufacturing data
•Application of Yogitech's state-of-the-art fault injection techniques for validation of claimed diagnostic
coverage
•Integration of lessons learned by both companies through multiple safety critical developments to IEC
61508
The Figure 4 is shown below in a simplified graphic.
Hercules Product Architecture for Management of Random Faults
4Hercules Product Architecture for Management of Random Faults
For a safety critical development it is necessary to manage both systematic and random faults. The
Hercules product architecture includes many safety mechanisms, which can detect and respond to
random faults when used correctly. This section of the document describes the architectural safety
concept for the MCU.
4.1Safe Island Philosophy and Architecture Partition to Support Safety Analysis
(FMEA/FMEDA)
The RM4x Hercules processors share a common safety architecture concept called a “safe island”
philosophy. The basic concept involves a balance between application of hardware diagnostics and
software diagnostics to manage functional safety, while balancing cost concerns. In the “safe island”
approach, a core set of elements are allocated continuously operating hardware safety mechanisms. This
core set of elements, including power and clock and reset, CPU, Flash memory, SRAM and associated
interconnect to Flash and SRAM, is needed to assure any functionally correct execution of software. Once
correct operation of these elements is confirmed, software can be executed on these elements in order to
provide software-based diagnostics on other device elements, such as peripherals. This concept has been
proven viable through multiple generations of safety-critical products in the automotive passenger vehicle
space.
Figure 5 illustrates the safe island approach overlaid to a superset configuration of the Hercules product
architecture.
www.ti.com
Figure 5. Partition of Hercules MCU for Safety Analysis
Figure 5 illustrates three architectural partitions:
•“Safe Island Layer” (RED) – This is the region of logic that is needed for all processing operations. This
logic is protected heavily by on board hardware diagnostics and specific assumptions of use to assure
a high level of confidence in safe operation. Once this region is safed, it can be used to provide
comprehensive software diagnostics on other design elements.
•“Blended Layer” (BLUE) – This is the region of logic that includes most safety critical peripherals. This
region has less reliance on hardware diagnostics. Software diagnostics and application protocols are
overlaid to provide the remainder of needed diagnostic coverage.
•“Offline Layer” (BLACK) – This region of logic has minimal or no integrated hardware diagnostics.
Many features in this layer are used only for debug, test, and calibration functions; they are not active
during safety critical operation. Logic in this region could be utilized for safety critical operation
assuming appropriate software diagnostics or system level measures are added by the system
integrator.
4.2Identification of Parts/Elements
For the purposes of a safety analysis, each module on this device can be considered to be a part or
element. Each part or element has been assigned a three letter unique identifier, which is used uniformly
in the Safety Manual, Safety Analysis Report, and FMEDA Documents to identify the element and it's
diagnostics. Table 1 lists each element present on this device and the unique identifier for this element.
The overall IEC 61508 systematic capability of the MCU is SC3. TI does not make claims of systematic
capability for specific IP modules on the device.
Table 1. Identification of Parts/Elements
Hercules Product Architecture for Management of Random Faults
Part / Element NameUnique Identifier
ClockCLK
Cortex-R5F Central Processing Unit (CPU)CPU
Controller Area Network (DCAN)CAN
Cortex-R5F Central Processing Unit (CPU) Debug and TraceDBG
CPU Interconnect SubsystemMEM
Data Modification UnitDMM
Direct Memory Access (DMA)DMA
Enhanced Capture (eCAP)CAP
EFuse Static ConfigurationEFU
External Memory Interface (EMIF)EMF
Enhanced Pulse Width Modulators (ePWM)PWM
Enhanced Quadrature Encoder Pulse (eQEP)QEP
Error Profiling ControllerEPC
Error Signaling Module (ESM)ESM
EthernetETH
Flash EEPROM Emulation (FEE)FEE
Primary FlashFLA
General Purpose Input/Output (GIO)GIO
Inter-Integrated Circuit (I2C)IIC
Input/Output (I/O) Multiplexing Module (IOMM)IOM
Joint Technical Action Group (JTAG) Debug/Trace/Calibration
Access
Local Interconnect Network (LIN)LIN
Multi-Buffered Analog to Digital Converter (MibADC)ADC
Multi-Buffered Serial Peripheral Interface (MibSPI)MSP
High-End Timer (N2HET) Including HET Transfer Unit (HTU)HET
One Time Programmable (OTP) Flash Static ConfigurationOTP
Peripheral Interconnect SubsystemPER
Hercules Product Architecture for Management of Random Faults
Table 1. Identification of Parts/Elements (continued)
Part / Element NameUnique Identifier
Peripheral Central Resource 1P1T
Peripheral Central Resource 2P2T
Peripheral Central Resource 3P3T
Power Management Module (PMM)PMM
Parameter Overlay ModulePOM
Power SupplyPWR
RAM Trace PortRTP
ResetRST
Real Time Interrupt (RTI) Operating System TimerRTI
Serial Communications Interface (SCI)SCI
SRAMRAM
System Control ModuleSYS
Temperature SensorsTSN
Vectored Interrupt Module (VIM)VIM
NOTE: The terms "element" and "part" may have specific meaning and imply specific requirements
dependent on the targeted functional safety standard. The terms are used here in a general sense.
TheHercules Architecture Brief Description of Elements section contains a brief description of the
elements listed above. For a full functional description of any of these modules, see the device-specific
technical reference manual.
www.ti.com
4.3Management of Family Variants
The Hercules family architecture supports multiple product variants. These products could be implemented
as unique silicon designs or they can be shared silicon designs that have elements disabled or not
assured by specification, even if present in silicon. Only the elements of the superset architecture that are
specifically detailed in the device-specific data sheet and technical reference manual are assured to be
present and operate. When developing for the Hercules platform, it is recommended that the safety
concept be based on the superset product architecture to enable maximum scalability across family
variants. The superset architecture shown in the previous section is valid for all device part numbers noted
in the introduction of the safety manual.
4.4Operating States
The Hercules MCU products have a common architectural definition of operating states. These operating
states should be observed by the system developer in their software and system level design concepts.
The operating states state machine is shown in Figure 6 and described below.
Hercules Product Architecture for Management of Random Faults
Figure 6. Operating States of the Hercules MCU
•"Powered Off" - This is the initial operating state of the Hercules MCU. No power is applied to either
core or I/O power supply and the device is non-functional. This state can only transition to the safe
state, and can only be reached from the safe state.
•"Safe" - In the safe state, the Hercules MCU is powered but non-operational. The nPORRST (power-on
reset, also known as cold reset) is asserted by the system but is not released until power supplies
have ramped to a stable state. The internal voltage monitor (VMON) safety mechanism also continues
to assert the nPORRST internal to the device if power supplies are not within a minimum operational
range. When the product is in the safe state, the CPU and peripherals are non-functional. Output
drivers are tri-stated and input/output pins are kept in an input only state.
•"Cold Boot" - In the cold boot state, key analog elements, digital control logic, and debug logic are
initialized for future use. The CPU remains powered but non-operational. When the cold boot process
is completed, the SYS_nRST signal is internally released, leading to the warm boot stage. The
SYS_nRST signal transition change can be monitored externally on the SYS_nRST I/O pin.
•"Warm Boot" - The warm boot mode resets digital logic and enables the CPU. The CPU begins
executing software from Flash memory and software initialization of the device can begin. There is no
hardware interlock to say that warm boot is completed; this is a software decision.
•"Operational" - During the operational mode, the device is capable of supporting safety critical
Hercules Product Architecture for Management of Random Faults
4.5Management of Errors
When a diagnostic detects a fault, the error must be indicated. The Hercules product architecture provides
aggregation of fault indication from internal safety mechanisms using a peripheral logic known as the error
signaling module (ESM). The ESM provides mechanisms to classify errors by severity and to provide
programmable error response. The ESM does not, in and of itself, impact the overall function of the device
and serves the limited purpose of fault aggregation and classification. The error classifications in the ESM
are summarized in Table 2.
Table 2. Summary of ESM Error Indication
Error Group Interrupt ResponseError Pin ResponseNotes
1
2Non maskable interrupt generatedError pin activatedFor errors that are generally of critical severity
3No interrupt responseError pin activated
The error response is action that is taken by the MCU or system when an error is indicated. There are
multiple potential of error response possible for the Hercules product. The system integrator is responsible
to determine what error response should be taken and to ensure that this is consistent with the system
safety concept.
•CPU abort - This response is implemented directly in the CPU, for diagnostics implemented in the
CPU. During an abort, the program sequence transfers context to an abort handler and software has
an opportunity to manage the fault.
•CPU interrupt - This response can be implemented for diagnostics outside the CPU. An interrupt
allows events external to the CPU to generate a program sequence context transfer to an interrupt
handler where software has an opportunity to manage the fault.
•Generation of SYS_nRST - This response allows the device to change states to warm boot from
operational state. The SYS_nRST could be generated from an external monitor or internally by the
software reset or watchdog. Re-entry to the warm reset state allows possibility for software recovery
when recovery in the operational state was not possible.
•Generation of nPORRST - This response allows the device to change state to safe state from cold
boot, warm boot, or operational states. From this state, it is possible to re-enter cold boot to attempt
recovery when recovery via warm boot is not possible. It is also possible to move to the powered-down
state, if desired, to implement a system level safe state. This response can be generated from the
internal voltage monitor, but is primarily driven by monitors external to the MCU.
The ESM provides multiple registers that can be read by the CPU to determine the current status of
diagnostics and the state of the nERROR pin. For the severe group 2 errors, a shadow register is
provided that is not reset by SYS_nRST. This allows the possibility of warm reset reinitialization to identify
that a group 2 error initiated the external reset.
It is possible for the CPU to trigger the nERROR pin response manually to test system behavior or to
notify external logic of an internal fault not automatically indicated to ESM. The CPU is responsible to clear
indicated errors in the ESM, including clearing of the nERROR pin response.
The EPC is used as a complement to the ESM for error profiling . The primary goal of this module is to
provide a unified correctable ECC error (single bit ECC fault) profiling capability and error address cache
on ECC failures in system bus memory slaves like Flash, FEE, and SRAM. The secondary goal of this
module is to provide an ECC error reporting capability for bus masters, which do not natively have ECC
logic built in like the DMA and TUs. The ECC generation and evaluation logic for bus masters such as
DMA and the TUs are built into the CPU Interconnect Subsystem.
System level management of the external error response can be simplified through the use of a TI
TPS6538x power supply and safety companion device developed for use with the Hercules family.
Programmable interrupt and
programmable interrupt priority
Programmable response
www.ti.com
For errors that are generally not of critical
severity
For critical errors that are seen by diagnostic
implemented in CPU
You, as a system and equipment manufacturer or designer, are responsible to ensure that your systems
(and any TI hardware or software components incorporated in your systems) meet all applicable safety,
regulatory, and system-level performance requirements. All application and safety related information in
this document (including application descriptions, suggested safety measures, suggested TI products, and
other materials) is provided for reference only. You understand and agree that your use of TI components
in safety critical applications is entirely at your risk, and that you (as buyer) agree to defend, indemnify,
and hold TI harmless from any and all damages, claims, suits, or expense resulting from such use.
A brief description of each element on this device and the general assumptions of use are provided in
Section 6.
A list of diagnostic mechanisms for this device and a brief description for each diagnostic are provided in
Section 7.
The effectiveness of the hardware safety mechanisms is noted in the Detailed Safety Analysis Report forRM57x ARM®-Based Safety Critical Microcontrollers (SPNU579).
This information should be used to determine the strategy for utilizing safety mechanisms. The details of
each safety mechanism can be found in the device-specific technical reference manual.
Depending on the safety standard and end equipment targeted, it may be necessary to manage not only
single point faults, but also latent faults. Many of the safety mechanisms described in this section can be
used as primary diagnostics, diagnostics for latent fault, or both. When considering system design for
management of latent faults, take care to include failure of execution resources when considering latent
faults with software diagnostics, such as failure of CPU and memories.
System Integrator Recommendations
5.1System Integrator Activities
The system integrator is responsible for carrying out a number of product development activities. These
activities carried out may include but are not limited to the following:
•Operational and Environmental Constraints
– Verify that the implementation of the TI component in the system design is compliant to
requirements in TI documentation. This includes but is not limited to the requirements found in
technical reference manuals, data sheets, errata documents, safety manuals, and safety analysis
reports
– Verify that the system operational lifetime (power-on hours) does not exceed lifetime specifications
for the TI component, as specified in the device data sheet. If the operational lifetime (power-on
hours) is not specified in the data sheet, the use case does not match published conditions, or
there are questions regarding device lifetime, please contact a TI quality/reliability engineering
representative or http://www.ti.com.
– Define system maintenance requirements. The Hercules MCU does not require maintenance.
– Define system repair requirements. The Hercules MCU is non-repairable with respect to permanent
faults. A power-on reset of the Hercules MCU may be considered a repair activity for transient
faults per some definitions of system repair requirements.
– Define system decommissioning requirements. The Hercules MCU has no specific decommisioning
requirements.
– Define system disposal requirements. The Hercules MCU has no specific disposal requirements.
•Avoidance of Systematic Errors
– Verify the application of appropriate best practices at all stages of hardware and system
development (including development of hardware and system diagnostics external to the MCU) to
avoid systematic failure and to control random failures. This may include but is not limited to
compliance to the requirements documented in IEC61508-2;Annex A Tables A.15 through A.18, as
well as Annex B Tables B.1 through B.6
– Verify that any software implemented (including software diagnostics) is developed with an
appropriate set of measures to avoid systematic errors
•Safety Concept Definition
– Define the supported safety functions and verify that the microcontroller behaves properly to
support execution of the defined safety function. This microcontroller is a generic product, which is
capable of supporting a variety of safety functions but does not have fixed support for any specific
safety function.
– Define the system-level safe state concept considering safe-state entry, maintenance of safe state,
and safe-state exit as appropriate to the application and verify correct implementation
– Define the system-level error-handling concept and verify correct implementation.
– Define appropriate overall timing requirements for safety metrics to be calculated for the application
– Define appropriate safety metric targets for the application
•Safety Concept Implementation
– Select and implement an appropriate set of diagnostics and safety mechanisms from the MCU
safety manual as necessary to satisfy the requirements of the targeted standards and the high level
safety concept. Dependent on the results of the system level safety analysis, it may not be
necessary to implement all diagnostic measures which TI has identified.
– For the device diagnostics listed as "system" in Table 4, implement the diagnostic in a manner that
meets functional safety requirements of the system, particularly monitoring of the external clock,
monitoring of voltage, and MCU state monitoring via external watchdog logic. TI's recommendations
are based on analysis of what faults might be detected external to the MCU when considering fault
models/failure modes described in IEC 61508 -2 Annex A as to be considered for any claims of
high diagnostic coverage, including both permanent and transient failure modes.
– Implement appropriate mechanisms to detect shorts between pins on the device. Tests may include
I/O loopback tests, information redundancy, or system-level mechanisms designed to detect shorts.
– Any end-to-end communications diagnostics implemented should consider the failure modes and
potential mitigating safety measures described in IEC 61784-3:2010 and summarized in IEC 617843:2010 in Table 1.
– Ensure that any additional system level hardware or software diagnostics created or implemented
by the system integrator are developed with an appropriate process to avoid systematic errors.
– Define an appropriate diagnostic test interval per diagnostic to be implemented.
•Verification of Safety Concept including Safety Metric Calculation
– Verify the behavior of the MCU outputs in the system when the MCU is in a faulted condition.
– Evaluate the system design for specific failure modes of functional logic and diagnostic logic which
are detectable based on the specific application usage and the specific diagnostics applied. TI's
safety analysis for the MCU considers all fault models noted in IEC 61508-2 Annex A as to be
considered for any claims of high diagnostic coverage, including both permanent and transient
failure modes. Refer to the Safety Analysis Report for more details.
– Evaluate the system design for specific failure modes of functional logic and diagnostic logic which
are not detectable based on the specific application usage and the specific diagnostics applied. TI's
safety analysis for the MCU considers all fault models noted in IEC 61508-2 Annex A as to be
considered for any claims of high diagnostic coverage, including both permanent and transient
failure modes. Refer to the Safety Analysis Report for more details and ensure that the system
design considers system level diagnostics recommended by TI, such as external voltage
supervision, external watchdog, and so forth.
– Verify that the implemented diagnostics meet the target diagnostic test interval per diagnostic.
– Estimate failure rates and diagnostic coverage per failure mode with respect to specific application
usage. TI provides tools to support this activity in the Safety Analysis Report (SAR).
– Verify that environmental and operational constraints are properly modeled in the FMEDA to
provide failure rate estimates.
– Verify that appropriate on-chip design elements are selected in the FMEDA for the specific safety
function under analysis.
– Verify that targeted safety metrics are calculated and achieved
– Verify the diagnostic coverage achieved by the implemented system and software based
diagnostics.
– Verify that the safety analysis considers MCU elements which are necessary to support the primary
function, such as clock, power, OTP configuration, and similar. Many times the focus of analysis is
the functional datapath but the elements necessary to support proper operation should also be
considered.
– Execute a co-existence/freedom from interference analysis per the targeted standard to confirm that
implemented functionality can co-exist without interference.
– Execute a dependent failure/common cause analysis to consider possible dependent/common
cause failures on the sub-elements of the MCU, including pin level connections.
5.2Hints for Performing Dependent/Common Cause Failure Analysis Including the
Hercules MCU
The following steps may be useful for performing dependent/common cause failure analysis when using
the Hercules MCU:
•Consider a relevant list of dependent fault/common cause fault initiators, such as the lists found in the
draft ISO/PAS 19451 document, “Application of ISO 26262 to Semiconductors”
•Verify that the dependent failure analysis considers the impact of the software tasks running on the
MCU, including hardware and software interactions and task/operating system interactions.
•Verify that the dependent failure analysis considers the impact of pin/ball level interactions on the MCU
package, including aspects related to the selected I/O multiplexing
5.3Hints for Improving Independence of Function/Co-Existence of Function When Using
the Hercules MCU
The following steps may be useful for improving independence of function when using the Hercules MCU:
•Verify that unused interrupt channels are disabled in the VIM
•Verify that unused interrupt sources are disabled in the source peripherals
•Hold peripheral chip selects in reset with the PCR if the peripherals are unused
•Leave peripherals in default reset state if not controlled via PCR
•Power down power domains if all logic in power domain is not used
•Disable event triggers if unused
•Power down the ADC cores if MibADCs are unused
•Utilize peripheral bus master memory protection units (MPUs) to only allow access to needed transmit
and receive buffers
•Utilize the CPU MPU to support isolation of separate software tasks running on the CPU
•Utilize privileged access modes as a secondary level of task isolation
•Utilize bus master ID filtering when available to limit allocation of peripherals to bus masters
•When possible, separate critical I/O functions by using non adjacent I/O pins/balls. Consider using the
pin muxing logic to support such separation.
•Power down unused clock sources.
•Disable unused clock domains.
•Power down the flash pump logic if flash memory is not used after boot.
5.4Support for System Integrator Activities
If you have any questions regarding usage of the TI documentation for system integration, or if you have
questions regarding MCU level functional safety standard work products not provided as part of the TI
documentation package, please contact TI support. The preferred and fastest method to contact TI
support is via the E2E forum at http://e2e.ti.com/support/microcontrollers/hercules/default.aspx.
This section contains a brief description of the elements identified on this device in Table 1. For a full
functional description of any of these modules, see the device-specific technical reference manual.
6.1Power Supply
The Hercules device family products require an external device to supply the necessary voltages and
currents for proper operation. Separate voltage rails are available for core logic and I/O logic (including
multi-buffered analog-to-digital converter (MibADC), Flash pump and oscillator).
The following tests can be applied as diagnostics for this module (to provide diagnostic coverage on a
specific function):
•Internal Voltage Monitor (VMON)
•External Voltage Supervisor
•MibADC Converter Calibration
•External Watchdog
6.1.1Notes
•Management of voltage supervision at system level can be simplified by using a TI TPS6538x power
supply and safety companion device developed for use with the Hercules family.
•Devices can be implemented with multiple power rails that are intended to be ganged together on the
system PCB. For proper operation of power diagnostics, it is recommended to implement one voltage
supervisor per ganged rail.
•Common mode failure analysis of the external voltage supervisor may be useful to determine
dependencies in the voltage generation and supervision circuitry
www.ti.com
6.2Power Management Module (PMM)
The power management module (PMM) is responsible for control of switchable power domains.
Dependent on the family variant used, one or more power domains can be implemented. Power domains
can be permanently configured at manufacturing time by TI or they can be user programmable. To
determine the power domains supported on your MCU, see the device-specific data sheet. For
programming information, see the device-specific technical reference manual.
The following tests can be applied as diagnostics for this module (to provide diagnostic coverage on a
specific function):
•Internal Voltage Monitor (VMON)
•External Voltage Supervisor
•Lockstep PSCON
•Power Domain Inactivity Monitor
•Privileged Mode Access and Multi-Bit Keys for Control Registers
•Periodic Software Readback of Static Configuration Registers
•Software Readback of Written Configuration
The following tests can be applied as a test-for-diagnostic on this module, and could be used to meet
Latent Fault Metric Requirements of ISO26262 (in combination with other diagnostics on the primary
function):
•PSCONs continue to function normally during lockstep compare self-test, but no comparison function is
present.
•When the CPU is in a halting debug state, no comparison of PSCON outputs is performed.
6.3Clocks
The Hercules device family products are primarily synchronous logic devices and as such require clock
signals for proper operation. The clock management logic includes clock sources, clock generation logic
including clock multiplication by phase lock loops (PLLs), clock dividers, and clock distribution logic. The
registers that are used to program the clock management logic are located in the system control module.
The following tests can be applied as diagnostics for this module (to provide diagnostic coverage on a
specific function):
•LPOCLKDET
•PLL Slip Detector
•Dual Clock Comparator (DCC)
•External Monitoring via ECLK
•Internal Watchdog - DWD
•Internal Watchdog - DWWD
•External Watchdog
•Periodic Software Readback of Static Configuration Registers
•Software Readback of Written Configuration
The following tests can be applied as test-for-diagnostics on this module to meet Latent Fault Metric
Requirements of ISO26262 (in combination with other diagnostics on the primary function):
•Software Test of DCC Functionality
•Software Test of DWD Functionality
•Software Test of DWWD Functionality
•CPU Lockstep Compare
•Flash Data ECC
•SRAM Data ECC
Brief Description of Elements
6.3.1Notes
•Management of the external watchdog functionality at system level can be simplified by using a TI
TPS6538x power supply and safety companion device developed for use with the Hercules family.
•User can improve the accuracy of the LPOCLKDET diagnostic via programming the trim values in the
HF LPO. This would require the customer to determine the LPO trim value during their manufacturing
test via comparison to a calibrated clock source.
•There are many possible implementations of watchdogs for use in providing clock and CPU
diagnostics. In general, TI advises the use of an external watchdog over an internal watchdog for
reasons of reduced common mode failure. TI also advises the use of a program sequence, windowed,
or question and answer watchdog as opposed to a single threshold watchdog due to the additional
failure modes that can be detected by a more advanced watchdog.
•Driving a high-frequency clock output on the ECLK pin may have EMI implications.
6.4Reset
The Hercules device family products require an external reset at cold and power-on (nPORRST) to place
all asynchronous and synchronous logic into a known state. The power-on reset generates an internal
warm reset (nRST) signal to reset the majority of digital logic as part of the boot process. The nRST signal
is provided at device level as an I/O pin; it will toggle when asserted internally and can be driven externally
to generate a warm reset. For more information on the reset functionality, see the device-specific data
sheet.
The following tests can be applied as diagnostics for this module (to provide diagnostic coverage on a
specific function):
•External Monitoring of Warm Reset (nRST)
•Software Check of Cause of Last Reset
•Software Warm Reset Generation
•Glitch Filtering on Reset Pins
•Use of Status Shadow Registers
•Periodic Software Readback of Static Configuration Registers
•Software Readback of Written Configuration
•Software Test for Reset
•External Watchdog
The following tests can be applied as a test-for-diagnostic on this module, and could be used to meet
Latent Fault Metric Requirements of ISO26262 (In combination with other diagnostics on the primary
function)
•Internal Watchdog
•CPU Lockstep Compare
•Flash Data ECC
•SRAM Data ECC
6.4.1Notes
•Management of reset at system level can be simplified by using a TI TPS6538x power supply and
safety companion device developed for use with the Hercules family.
•Internal watchdogs are not a viable option for reset diagnostics as the monitored reset signals interact
with the internal watchdogs.
www.ti.com
6.5System Control Module
The system control module contains the memory-mapped registers to interface clock, reset, and other
system related control and status logic. The system control module is also responsible for generating the
synchronization of system resets and delivering the warm system reset nRST.
The following tests can be applied as diagnostics for this module (to provide diagnostic coverage on a
specific function):
•Privileged Mode Access and Multi-Bit Enable Keys for Control Registers
•Software Readback of Written Configuration
•Periodic Software Readback of Static Configuration Registers
•Multi-Bit Keyed Self-Correctable High-Integrity Bits
The following tests can be applied as test-for-diagnostics on this module to meet Latent Fault Metric
Requirements of ISO26262 (in combination with other diagnostics on the primary function):
•Internal Watchdog
•External Watchdog
•CPU Lockstep Compare
•Flash Data ECC
•SRAM Data ECC
6.5.1Notes
•Depending on targeted metrics, a user can elect to implement a periodic software test of static
configuration registers in the system control module. Such a test can provide additional diagnostic
coverage for disruption by soft error.
•Review the clock and reset sections as these features are closely controlled by the system control
The ESM provides unified aggregation and prioritization of on-board hardware diagnostic errors. For more
information, see Management of Errors.
The following tests can be applied as diagnostics for this module (to provide diagnostic coverage on a
specific function):
•Periodic Software Readback of Static Configuration Registers
•Boot Time Software Test of Error Path Reporting
•Periodic Software Test of Error Path Reporting
•Use of Status Shadow Registers
•Software Readback of Written Configuration
The following tests can be applied as test-for-diagnostics on this module to meet Latent Fault Metric
Requirements of ISO26262 (in combination with other diagnostics on the primary function):
•Internal Watchdog
•External Watchdog
•CPU Lockstep Compare
•Flash Data ECC
•SRAM Data ECC
Brief Description of Elements
6.6.1Notes
•Software testing of the ESM error path can be combined with boot time latent tests of hardware
diagnostics to reduce startup time.
•Testing of ESM error path may result in assertion of the nERROR diagnostic output. System integrator
should ensure that the system can manage or recover gracefully from the nERROR event.
6.7CPU Subsystem
The Hercules product family relies on the ARM®Cortex-R5F CPU to provide general-purpose processing.
The Cortex-R5F is a high performance CPU with embedded safety diagnostics. The R5F is also designed
for easy integration into a 1oo1D lockstep configuration. These aspects make the Cortex-R5F an
outstanding CPU for functional safety products.
The following tests can be applied as diagnostics for this module (to provide diagnostic coverage on a
specific function):
•CPU Lockstep Compare
•Boot Time Execution of LBIST STC
•Periodic Execution of LBIST STC
•Memory Protection Unit (MPU)
•Online Profiling Using PMU
•Illegal Operation and Instruction Trapping
•Periodic Software Readback of Static Configuration Registers
The following tests can be applied as a test-for-diagnostic on this module, and could be used to meet
Latent Fault Metric Requirements of ISO26262 (in combination with other diagnostics on the primary
function):
•Lockstep Compare Self-Test
•LBIST Auto-Coverage
•Software Test of PBIST
•PBIST Auto-Coverage
•Software Readback of Written Configuration (PBIST)
•Flash Data ECC
•Data ECC
6.7.1Measures to Mitigate Common Mode Failure in CPU Subsystem
The Hercules lockstep CPU subsystem design includes multiple best practices to mitigate common mode
failure:
•Physical diversity:
– Physical core hard macros are spaced at least 100 µm apart.
– Each CPU is uniquely diversified in terms of the cell placements .
•Temporal diversity:
– Timing delay blocks are inserted to delay the operation of the CPUs by two cycles as shown in