We use Tiva TM4E123GH6ZRB as Embedded Controller on x86 COM-Express boards, based on both AMD and Intel chipsets, and we use its internal EEPROM to store permanent data, used when starting from G3 state (fully powered off device) to correctly identify and initialize the system.
In the last couple of months we started to find some boards with strange behavior, quickly recognized as a consequence of EEPROM write operations systematically failing.
After investigating, we discovered that the EEPROM was locked, as it is after password protecting it, and the only way to recover the parts was to use the Debug Mass Erase register: we did this with C.C.S. debug via JTAG, stopping the device and writing the register with the 0xE37B0001 pattern by hand.
Actually, our code does never use the locking mechanism, so writnig accidentally to the password registers is very unlikely even in vase of erratic code; this is why it is natural to pose some questions:
- does TI kernel code (SYS/BIOS 6.35.04.50) ever access those registers?
- could be for some reason that some chips came from TI with EEPROM already locked?
- does anyone know about similar cases, and if yes, what can they say on the subject?
Thanks in advance to anyone who can contribute to solve this issues
Fabio