English
Language : 

SM320F28335PTPMEP Datasheet, PDF (38/167 Pages) Texas Instruments – Digital Signal Controller (DSC)
SM320F28335-EP
SPRS581D – JUNE 2009 – REVISED MAY 2012
www.ti.com
3.2.9 Boot ROM
The Boot ROM is factory-programmed with boot-loading software. Boot-mode signals are provided to tell
the bootloader software what boot mode to use on power up. The user can select to boot normally or to
download new software from an external connection or to select boot software that is programmed in the
internal Flash/ROM. The Boot ROM also contains standard tables, such as SIN/COS waveforms, for use
in math related algorithms.
Table 3-4. Boot Mode Selection
MODE
F
E
D
C
B
A
9
8
7
6
5
4
3
2
1
GPIO87/XA15
1
1
1
1
1
1
1
1
0
0
0
0
0
0
0
GPIO86/XA14
1
1
1
1
0
0
0
0
1
1
1
1
0
0
0
0
0
0
(1) All four GPIO pins have an internal pullup.
GPIO85/XA13
1
1
0
0
1
1
0
0
1
1
0
0
1
1
0
0
GPIO84/XA12
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
0
MODE (1)
Jump to Flash
SCI-A boot
SPI-A boot
I2C-A boot
eCAN-A boot
McBSP-A boot
Jump to XINTF x16
Jump to XINTF x32
Jump to OTP
Parallel GPIO I/O boot
Parallel XINTF boot
Jump to SARAM
Branch to check boot mode
Branch to Flash, skip ADC calibration
Branch to SARAM, skip ADC
calibration
Branch to SCI, skip ADC calibration
NOTE
Modes 0, 1, and 2 in Table 3-4 are for TI debug only. Skipping the ADC calibration function
in an application will cause the ADC to operate outside of the stated specifications
3.2.10 Security
The devices support high levels of security to protect the user firmware from being reverse engineered.
The security features a 128-bit password (hardcoded for 16 wait-states), which the user programs into the
flash. One code security module (CSM) is used to protect the flash/OTP and the L0/L1/L2/L3 SARAM
blocks. The security feature prevents unauthorized users from examining the memory contents via the
JTAG port, executing code from external memory or trying to boot-load some undesirable software that
would export the secure memory contents. To enable access to the secure blocks, the user must write the
correct 128-bit KEY value, which matches the value stored in the password locations within the Flash.
In addition to the CSM, the emulation code security logic (ECSL) has been implemented to prevent
unauthorized users from stepping through secure code. Any code or data access to flash, user OTP, L0,
L1, L2 or L3 memory while the emulator is connected will trip the ECSL and break the emulation
connection. To allow emulation of secure code, while maintaining the CSM protection against secure
memory reads, the user must write the correct value into the lower 64 bits of the KEY register, which
matches the value stored in the lower 64 bits of the password locations within the flash. Note that dummy
reads of all 128 bits of the password in the flash must still be performed. If the lower 64 bits of the
password locations are all ones (unprogrammed), then the KEY value does not need to match.
38
Functional Overview
Copyright © 2009–2012, Texas Instruments Incorporated
Submit Documentation Feedback
Product Folder Link(s): SM320F28335-EP