Other Parts Discussed in Thread: UNIFLASH
Hello,
For our project, I want to lock the JTag and I already have such working by setting the fill value in the linker for the JTag password to 0x5555 as below.
JTAGSIGNATURE : origin = 0xFF80, length = 0x0004, fill = 0x5555 /* Lock Jtag no password, BSL to override */
This works fine, and allows me to debug on the next load. However, and obviously, any subsequent load states that the JTag is secured. We have our own PC tool that uses the BSL and I am able to unsecure the JTag, but am looking for a more development friendly solution... In the current setup, after every debug session I have to use a separate tool to unlock the JTag... (requires disconnecting the emulator, since our programming board needs to control the TEST and RST lines to get into bootloader mode)
So, is there a way to do either of the below?
- Configure CCS to do a mass erase (we have masserase still enabled) prior to any debugging? The mass erase would have to be done thru the JTag emulator...
- Is there a way to use the HEX430.exe tool to flip the JTag signature when creating our output binary? I see we can fill holes, but seems it fills all or none with specified value. I would only want to specify the JTag signature to get updated. Then we can leave the linker command file with the jtag signature as open, and the HEX tool could "lock" the Jtag for us...
For this, I was trying to modify our ROMS section in our HEX430 config to separate out the JTAGSIGNATURE section and just fill, but I get memory ranges out of order errors... Also I am only providing one file name where I believe each ROMS clause needs a file name... - other options welcome...
I realize I can probably write a simple python script to post process what our use of HEX430 outputs and flip the 4 bytes, but looking to minimize the number of custom scripts our build is dependent on.
Thanks,
-mike