This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Hello,
So, I'm trying to understand how the CC3220SF works with the XiP flash when debugging and running on it's own. Here's how my device is setup.
Powering the device up the first time, after it unpacks the gang image it does nothing. This is expected, as there's no MCU bin.
The device then can be connected to in CCS, programmed with our application code and debugged. This is also expected, as the device was in development mode.
Removing the power and repowering the device the functionality is returned to the "do nothing" functionality. It acts as there is no application.
This is a bit unexpected, because it tells me the the CC3220 seems to be erasing the XiP which contained the application data or maybe it is ignoring the fact the XiP is still programmed. At any rate, I'm trying to understand why this is the case. Can anyone help me understand what the CC3220SF is doing at bootup that would cause it to erase/not execute the data in XiP flash? Thanks!
Hi Kobi,
OK, so that worked.
The caveat to that is, it worked after I realized that the functionality is tied to a bit of code that's in a TI file (CC3220SF_LAUNCHXL.c) that wasn't in my project. This was found after Googling and landing in the AWS FreeRTOS repo at the mentioned file. I pulled the snipped out of the file and put it into one of my application's files.
This makes my question about documentation of the magic debug header data slightly more important to me.
Thanks again for your help, by the way.
-Tom
Where did you get the "CC3220SF_LAUNCHXL.c" from?
It was part of the files for the last couple of releases.
Have you created yours with the pinmux tool?
br,
Kobi
So, if you Google ".dbghdr", which is the item in the map file that should be there after compiling, the second result (for me) is:
github.com/.../CC3220SF_LAUNCHXL.c
This is the supporting code that AWS includes in their repo for the AWS demo on the SF LP.
That was what lead me to understanding how the Predefined symbol actually caused the desired effect.
EDIT: It actually looks like the guys from Zephyr wrote a really good comment header for it. Here's their whole file:
/* * Copyright (c) 2017, Texas Instruments Incorporated * * SPDX-License-Identifier: Apache-2.0 */ /* * This debug header, located at the start of flash, indicates * to the bootloader that this is a debug image, allowing * debuggers and flash-loaders to access the chip over JTAG. * Also, on subsequent reboots, the bootloader skips the integrity * check, preventing the image from being mass erased. * * See section 21.10: "Debugging Flash User Application Using JTAG" * in the CC3220 TRM: http://www.ti.com/lit/ug/swru465/swru465.pdf */ #ifdef CONFIG_CC3220SF_DEBUG __attribute__ ((section(".dbghdr"))) const unsigned long ulDebugHeader[] = { 0x5AA5A55A, 0x000FF800, 0xEFA3247D }; #endif
So it looks like the real reference is Section 21.10: "Debugging Flash User Application Using JTAG" in the CC3220 TRM: http://www.ti.com/lit/ug/swru465/swru465.pdf
Have you created yours with the pinmux tool?
Good question. No, we actually started with a CC3220S and have decided that the SF may be the better path. So we have started off using a lot of the CC3220S related files from the LP demos. So our CC3220S_LAUNCHXL.c file didn't contain the SF specific debug header snippet.
So,
The resolution of this issue is "put some debug data at the beginning of the application data space and the secure boot loader will leave the XiP alone".
The reference document that gives this is Section 21.10: "Debugging Flash User Application Using JTAG" in the CC3220 TRM
The TI way to implement the inclusion of this data is to do the following:
/* * Debug functionality for the CC3220SF Module * * This debug header, located at the start of flash, indicates * to the bootloader that this is a debug image, allowing * debuggers and flash-loaders to access the chip over JTAG. * Also, on subsequent reboots, the bootloader skips the integrity * check, preventing the image from being mass erased. * * See section 21.10: "Debugging Flash User Application Using JTAG" * in the CC3220 TRM: www.ti.com/.../swru465.pdf */ #if defined(__SF_DEBUG__) #if defined(__TI_COMPILER_VERSION__) #pragma DATA_SECTION(ulDebugHeader, ".dbghdr") #elif defined(__IAR_SYSTEMS_ICC__) #pragma data_location=".dbghdr" #elif defined(__GNUC__) __attribute__ ((section (".dbghdr"))) #endif const unsigned long ulDebugHeader[] = { 0x5AA5A55A, 0x000FF800, 0xEFA3247D }; #endif
Doing this will stop the Secure Bootloader from erasing the application in the XiP flash.