SLAU846A June 2023 – October 2023 MSPM0G1105 , MSPM0G1106 , MSPM0G1107 , MSPM0G1505 , MSPM0G1506 , MSPM0G1507 , MSPM0G3105 , MSPM0G3105-Q1 , MSPM0G3106 , MSPM0G3106-Q1 , MSPM0G3107 , MSPM0G3107-Q1 , MSPM0G3505 , MSPM0G3505-Q1 , MSPM0G3506 , MSPM0G3506-Q1 , MSPM0G3507 , MSPM0G3507-Q1
Table 1-7 lists the memory-mapped registers for the NONMAIN registers. All register offset addresses not listed in Table 1-7 should be considered as reserved locations and the register contents should not be modified.
Offset | Acronym | Register Name | Group | Section |
---|---|---|---|---|
41C00000h | BCRCONFIGID | Configuration ID of BCR Structure | Go | |
41C00004h | BOOTCFG0 | Serial wire debug (SWD) lock policy. | Go | |
41C00008h | BOOTCFG1 | BSL invoke pin policy. | Go | |
41C0000Ch + formula | PWDDEBUGLOCK[y] | SWD command and password authentication request. | Go | |
41C0001Ch | BOOTCFG2 | Fast boot mode policy and BSL mode policy. | Go | |
41C00020h | BOOTCFG3 | Mass erase and factory reset mode policies. These policies affect SWD initiated and BSL initiated mass erase and factory reset commands. If the SW-DP is disabled (SWDP_MODE is disabled), SWD initiated commands are not allowed as the SW-DP is fully disabled. If the BSL is disabled (BSLMODE is disabled), these settings are a a don't care for BSL initiated commands as the BSL is not enabled to be invoked. | Go | |
41C00024h + formula | PWDMASSERASE[y] | SWD mass erase command password (must be provided via DSSM to authenticate a mass erase command). | Go | |
41C00034h + formula | PWDFACTORYRESET[y] | SWD factory reset command password (must be provided via DSSM to authenticate a factory reset command). | Go | |
41C00044h | FLASHSWP0 | Static write protection policy for the first 32kB of flash memory. When protected, sectors will not be available for program or erase by either the bootloader or application code. | Go | |
41C00048h | FLASHSWP1 | Static write protection policy for additional sectors of flash memory. When protected, sectors will not be available for program or erase by either the bootloader or application code. | Go | |
41C0004Ch | BOOTCFG4 | Go | ||
41C00050h | APPCRCSTART | Start address of the application CRC check (must be an address in a MAIN flash region). | Go | |
41C00054h | APPCRCLENGTH | Length of the application area to include in the application CRC check (in bytes), starting from APPCRCSTART. | Go | |
41C00058h | APPCRC | Expected application CRC check digest (CRC-32) to test against during boot. | Go | |
41C0005Ch | BOOTCRC | CRC digest (CRC-32) of the BCR (boot configuration) portion of the NONMAIN memory. | Go | |
41C00100h | BSLCONFIGID | BSL configuration ID. | Go | |
41C00104h | BSLPINCFG0 | BSL UART pin configuration. | Go | |
41C00108h | BSLPINCFG1 | BSL I2C pin configuration. | Go | |
41C0010Ch | BSLCONFIG0 | BSL invoke pin configuration and memory read-out policy. | Go | |
41C00110h + formula | BSLPW[y] | 256-bit BSL access password. | Go | |
41C00130h | BSLPLUGINCFG | Defines the presence and type of a BSL plug-in in MAIN flash memory. | Go | |
41C00134h + formula | BSLPLUGINHOOK[y] | Function pointers for plug-in init, receive, transmit, and de-init functions. | Go | |
41C00144h | PATCHHOOKID | Alternate BSL configuration. | Go | |
41C00148h | SBLADDRESS | Address of an alternate BSL. | Go | |
41C0014Ch | BSLAPPVER | Address of the application version word. | Go | |
41C00150h | BSLCONFIG1 | BSL security configuration. | Go | |
41C00154h | BSLCRC | CRC digest (CRC-32) of the BSL_CONFIG portion of the NONMAIN memory. | Go |
Complex bit access types are encoded to fit into small table cells. Table 1-8 shows the codes that are used for access types in this section.
Access Type | Code | Description |
---|---|---|
Read Type | ||
R | R | Read |
Write Type | ||
W | W | Write |
Reset or Default Value | ||
-n | Value after reset or the default value | |
Register Array Variables | ||
i,j,k,l,m,n | When these variables are used in a register name, an offset, or an address, they refer to the value of a register array where the register is part of a group of repeating registers. The register groups form a hierarchical structure and the array is represented with a formula. | |
y | When this variable is used in a register name, an offset, or an address it refers to the value of a register array. |
BCRCONFIGID is shown in Figure 1-2 and described in Table 1-9.
Return to the Summary Table.
Configuration ID of BCR Structure
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
CONFIG | |||||||||||||||||||||||||||||||
R/W-00000001h | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | CONFIG | R/W | 00000001h | Configuration ID of the BOOTCFG |
BOOTCFG0 is shown in Figure 1-3 and described in Table 1-10.
Return to the Summary Table.
Serial wire debug (SWD) lock policy.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
SWDP_MODE | DEBUGACCESS | ||||||||||||||||||||||||||||||
R/W-AABBh | W-AABBh | ||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | SWDP_MODE | R/W | AABBh | The serial wire debug port (SW-DP) access policy. This policy sets whether any communication is allowed with the device via the SWD pins (to any DAP). When disabled, no SWD communication is possible regardless of the configuration of the DEBUGACCESS field.
5566h = The SW-DP is fully disabled and no device access is possible via the SW-DP (0x5566 and all other values NOT 0xAABB). AABBh = The SW-DP is enabled and device access is set by the additional policies in NONMAIN. |
15-0 | DEBUGACCESS | W | AABBh | The debug access policy for accessing the AHB-AP, ET-AP, and PWR-AP debug access ports. Note that if SWDP_MODE is set to DISABLED, the value of this field is ignored and the debug port will remain fully locked.
5566h = Access to AHB-AP, ET-AP, and PWR-AP via SWD is disabled (0x5566 and all other values NOT 0xCCDD or 0xAABB). AABBh = Access to AHB-AP, ET-AP, and PWR-AP via SWD is enabled. CCDDh = Access to AHB-AP, ET-AP, and PWR-AP via SWD is only enabled when the correct password is provided via the DSSM before BCR execution. |
BOOTCFG1 is shown in Figure 1-4 and described in Table 1-11.
Return to the Summary Table.
BSL invoke pin policy.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
BSL_PIN_INVOKE | TI_FA_MODE | ||||||||||||||||||||||||||||||
R/W-AABBh | R/W-AABBh | ||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | BSL_PIN_INVOKE | R/W | AABBh | Boot strap loader (BSL) pin invoke method enable/disable policy.
5566h = The BSL_INVOKE pin is not checked during boot (0x5566 and all other values NOT 0xAABB). AABBh = The BSL_INVOKE pin is checked during boot. |
15-0 | TI_FA_MODE | R/W | AABBh | Sets the TI failure analysis enable/disable policy. If enabled, a re-test request through DSSM is allowed, else it is not allowed. Note that if SWDP_MODE is set to disabled, this field is ignored and failure analysis is not possible.
5566h = TI failure analysis is not allowed (0x5566 and all other values NOT 0xAABB). AABBh = TI failure analysis is allowed. |
PWDDEBUGLOCK[y] is shown in Figure 1-5 and described in Table 1-12.
Return to the Summary Table.
SWD command and password authentication request.
Offset = 41C0000Ch + (y * 4h); where y = 0h to 3h
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
PW | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | PW | R/W | FFFFFFFFh | Password |
BOOTCFG2 is shown in Figure 1-6 and described in Table 1-13.
Return to the Summary Table.
Fast boot mode policy and BSL mode policy.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
BSLMODE | FASTBOOTMODE | ||||||||||||||||||||||||||||||
AABBh | FFFFh | ||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | BSLMODE | AABBh | BSLMODE configures the boot strap loader enable/disable policy.
5566h = The BSL is disabled (0x5566 and all other values NOT 0xAABB). AABBh = The BSL is enabled. | |
15-0 | FASTBOOTMODE | FFFFh | FASTBOOTMODE configures the fast boot mode enable/disable policy.
5566h = Fast boot mode is disabled. All enabled BSL invoke conditions are evaluated (0x5566 and all other values NOT 0xAABB). AABBh = Fast boot mode is enabled. Only the software BSL invoke condition is evaluated. |
BOOTCFG3 is shown in Figure 1-7 and described in Table 1-14.
Return to the Summary Table.
Mass erase and factory reset mode policies. These policies affect SWD initiated and BSL initiated mass erase and factory reset commands. If the SW-DP is disabled (SWDP_MODE is disabled), SWD initiated commands are not allowed as the SW-DP is fully disabled. If the BSL is disabled (BSLMODE is disabled), these settings are a a don't care for BSL initiated commands as the BSL is not enabled to be invoked.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
FACTORYRESETCMDACCESS | |||||||||||||||
R/W-AABBh | |||||||||||||||
15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
MASSERASECMDACCESS | |||||||||||||||
R/W-AABBh | |||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | FACTORYRESETCMDACCESS | R/W | AABBh | The factory reset command policy.
5566h = The factory reset command is not allowed (0x5566 and all other values NOT 0xAABB or 0xCCDD). AABBh = The factory reset command is allowed. CCDDh = The factory reset command is allowed only when the matching password is provided via the DSSM. |
15-0 | MASSERASECMDACCESS | R/W | AABBh | The mass erase command policy.
5566h = The mass erase command is not allowed (0x5566 and all other values NOT 0xAABB or 0xCCDD). AABBh = The mass erase command is allowed. CCDDh = The mass erase command is allowed only when the matching password is provided via the DSSM. |
PWDMASSERASE[y] is shown in Figure 1-8 and described in Table 1-15.
Return to the Summary Table.
SWD mass erase command password (must be provided via DSSM to authenticate a mass erase command).
Offset = 41C00024h + (y * 4h); where y = 0h to 3h
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
PW | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | PW | R/W | FFFFFFFFh | Password |
PWDFACTORYRESET[y] is shown in Figure 1-9 and described in Table 1-16.
Return to the Summary Table.
SWD factory reset command password (must be provided via DSSM to authenticate a factory reset command).
Offset = 41C00034h + (y * 4h); where y = 0h to 3h
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
PW | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | PW | R/W | FFFFFFFFh | Password |
FLASHSWP0 is shown in Figure 1-10 and described in Table 1-17.
Return to the Summary Table.
Static write protection policy for the first 32kB of flash memory. When protected, sectors will not be available for program or erase by either the bootloader or application code.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
MAINLOW | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | MAINLOW | R/W | FFFFFFFFh | 1 bit per sector (Setting a bit to 0 disables write, 1 enables write). |
FLASHSWP1 is shown in Figure 1-11 and described in Table 1-18.
Return to the Summary Table.
Static write protection policy for additional sectors of flash memory. When protected, sectors will not be available for program or erase by either the bootloader or application code.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
MAINHIGH | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | MAINHIGH | R/W | FFFFFFFFh | 1 bit per 8 sectors. Bits 3:0, not used as covered with FLASHSWP0.(Setting a bit to 0 disables write, 1 enables write) |
BOOTCFG4 is shown in Figure 1-12 and described in Table 1-19.
Return to the Summary Table.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
APPCRCMODE | |||||||
R/W-FFFFh | |||||||
23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
APPCRCMODE | |||||||
R/W-FFFFh | |||||||
15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
RESERVED | |||||||
R/W- | |||||||
7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
RESERVED | NONMAINSWP | ||||||
R/W- | R/W-FFFFh | ||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | APPCRCMODE | R/W | FFFFh | APPCRCMODE enables or disables the boot time CRC check of a segment of MAIN flash memory.
5566h = The boot time MAIN flash CRC check is disabled. The application code in MAIN flash is always started unless the reset vector or stack pointer are blank/unprogrammed (0x5566 and all other values NOT 0xAABB). AABBh = The boot time MAIN flash CRC check is enabled. If the boot time CRC check passes, the application code in MAIN flash is started unless the reset vector or stack pointer are blank (unprogrammed). In the event of a failing CRC check, the application code in MAIN flash will not be started and the boot process fails. |
15-1 | RESERVED | R/W | 0h | |
0 | NONMAINSWP | R/W | FFFFh | Static write protection policy for entire NONMAIN device configuration memory. Setting bit to 0 disables program/erase of the NONMAIN by all means other than a SWD-initiated factory reset, 1 enables program/erase of the NONMAIN by normal means. |
APPCRCSTART is shown in Figure 1-13 and described in Table 1-20.
Return to the Summary Table.
Start address of the application CRC check (must be an address in a MAIN flash region).
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
ADDRESS | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | ADDRESS | R/W | FFFFFFFFh | Application CRC check start address |
APPCRCLENGTH is shown in Figure 1-14 and described in Table 1-21.
Return to the Summary Table.
Length of the application area to include in the application CRC check (in bytes), starting from APPCRCSTART.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
LENGTH | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | LENGTH | R/W | FFFFFFFFh | Application CRC check source data length |
APPCRC is shown in Figure 1-15 and described in Table 1-22.
Return to the Summary Table.
Expected application CRC check digest (CRC-32) to test against during boot.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
DIGEST | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | DIGEST | R/W | FFFFFFFFh | Application CRC check expected digest. |
BOOTCRC is shown in Figure 1-16 and described in Table 1-23.
Return to the Summary Table.
CRC digest (CRC-32) of the BCR (boot configuration) portion of the NONMAIN memory.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
DIGEST | |||||||||||||||||||||||||||||||
R/W-1879DAC3h | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | DIGEST | R/W | 1879DAC3h | BCR boot configuration data CRC digest. |
BSLCONFIGID is shown in Figure 1-17 and described in Table 1-24.
Return to the Summary Table.
BSL configuration ID.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
CONFIG | |||||||||||||||||||||||||||||||
R/W-00000001h | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | CONFIG | R/W | 00000001h | Configuration ID of the BSL_CONFIG. |
BSLPINCFG0 is shown in Figure 1-18 and described in Table 1-25.
Return to the Summary Table.
BSL UART pin configuration.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
UARTTX_MUX_SEL | UARTTX_PAD_NUM | ||||||||||||||
R/W-02h | R/W-18h | ||||||||||||||
15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
UARTRX_MUX_SEL | UARTRX_PAD_NUM | ||||||||||||||
R/W-02h | R/W-17h | ||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-24 | UARTTX_MUX_SEL | R/W | 02h | UART TX IOMUX PINCM mux selection. |
23-16 | UARTTX_PAD_NUM | R/W | 18h | UART TX IOMUX PINCM register. |
15-8 | UARTRX_MUX_SEL | R/W | 02h | UART RX IOMUX PINCM mux selection. |
7-0 | UARTRX_PAD_NUM | R/W | 17h | UART RX IOMUX PINCM register. |
BSLPINCFG1 is shown in Figure 1-19 and described in Table 1-26.
Return to the Summary Table.
BSL I2C pin configuration.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
I2CSCL_MUX_SEL | I2CSCL_PAD_NUM | ||||||||||||||
R/W-03h | R/W-2h | ||||||||||||||
15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
I2CSDA_MUX_SEL | I2CSDA_PAD_NUM | ||||||||||||||
R/W-03h | R/W-1h | ||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-24 | I2CSCL_MUX_SEL | R/W | 03h | I2C SCL IOMUX PINCM mux selection. |
23-16 | I2CSCL_PAD_NUM | R/W | 2h | I2C SCL IOMUX PINCM register. |
15-8 | I2CSDA_MUX_SEL | R/W | 03h | I2C SDA IOMUX PINCM mux selection. |
7-0 | I2CSDA_PAD_NUM | R/W | 1h | I2C SDA IOMUX PINCM register. |
BSLCONFIG0 is shown in Figure 1-20 and described in Table 1-27.
Return to the Summary Table.
BSL invoke pin configuration and memory read-out policy.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 |
READOUTEN | |||||||
R/W-FFFFh | |||||||
23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
READOUTEN | |||||||
R/W-FFFFh | |||||||
15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 |
RESERVED | BSLIVK_GPIOPORT | BSLIVK_GPIOPIN | |||||
R-0h | R/W- | R/W-12h | |||||
7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
BSLIVK_LVL | RESERVED | BSLIVK_PAD_NUM | |||||
R/W-1h | R-0h | R/W-13h | |||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | READOUTEN | R/W | FFFFh | Sets the memory read-out policy for the BSL interface.
5566h = Memory read-out is not possible via the BSL interface (0x5566 and all other values NOT 0xAABB). AABBh = Memory contents may be read via the BSL interface. |
15-14 | RESERVED | R | 0h | |
13 | BSLIVK_GPIOPORT | R/W | 0h | The BSL_invoke GPIO port index corresponding to the pad used for BSL_invoke.
0h = The BSL_invoke pin is on GPIO port A. 1h = The BSL_invoke pin is on GPIO port B. |
12-8 | BSLIVK_GPIOPIN | R/W | 12h | The BSL_invoke GPIO pin index corresponding to the pad used for BSL_invoke. |
7 | BSLIVK_LVL | R/W | 1h | The BSL_invoke input logic level which shall invoke the BSL.
0h = LOW 1h = HIGH |
6 | RESERVED | R | 0h | |
5-0 | BSLIVK_PAD_NUM | R/W | 13h | The IOMUX PINCM register corresponding to the pad to be used for BSL_invoke. |
BSLPW[y] is shown in Figure 1-21 and described in Table 1-28.
Return to the Summary Table.
256-bit BSL access password.
Offset = 41C00110h + (y * 4h); where y = 0h to 7h
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
PASSWORD | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | PASSWORD | R/W | FFFFFFFFh | Password |
BSLPLUGINCFG is shown in Figure 1-22 and described in Table 1-29.
Return to the Summary Table.
Defines the presence and type of a BSL plug-in in MAIN flash memory.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 |
SRAMEXISTS | FLASHEXISTS | ||||||||||||||
R/W-FFh | R/W-FFh | ||||||||||||||
15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
PLUGINTYPE | |||||||||||||||
R/W-FFFFh | |||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-24 | SRAMEXISTS | R/W | FFh | SRAM consumed by Flash plugin, from 0x00 to 0xFF. |
23-16 | FLASHEXISTS | R/W | FFh | The field tells if Flash Plugin exists are not. 0xBB - Flash Plugin exists; 0xFF (all other values) - Only ROM plugins will be used. |
15-0 | PLUGINTYPE | R/W | FFFFh | The type code for the BSL plug-in.
1000h = Plug-in is for UART. 2000h = Plug-in is for I2C. FFFFh = For all other values. Any other interfaces with valid hooks will be added to Plugin list. |
BSLPLUGINHOOK[y] is shown in Figure 1-23 and described in Table 1-30.
Return to the Summary Table.
Function pointers for plug-in init, receive, transmit, and de-init functions.
Offset = 41C00134h + (y * 4h); where y = 0h to 3h
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
BSLPLUGIN | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | BSLPLUGIN | R/W | FFFFFFFFh | Address of the BSL plug-in hook. Byte [3-0] : Init; Byte [7-4] : Receive; Byte [11-8] : Send; Byte [15-12] : Deinit |
PATCHHOOKID is shown in Figure 1-24 and described in Table 1-31.
Return to the Summary Table.
Alternate BSL configuration.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
RESERVED | ID | ||||||||||||||||||||||||||||||
R/W- | R/W-FFFFFFFFh | ||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | RESERVED | R/W | 0h | |
15-0 | ID | R/W | FFFFFFFFh | ID field to invoke an alternate BSL.
5566h = Do not use an alternate BSL (0x5566 and all other values NOT 0xAABB). AABBh = Use the alternate BSL. |
SBLADDRESS is shown in Figure 1-25 and described in Table 1-32.
Return to the Summary Table.
Address of an alternate BSL.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
ADDRESS | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | ADDRESS | R/W | FFFFFFFFh | Address of the alternate BSL, if present. |
BSLAPPVER is shown in Figure 1-26 and described in Table 1-33.
Return to the Summary Table.
Address of the application version word.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
ADDRESS | |||||||||||||||||||||||||||||||
R/W-FFFFFFFFh | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | ADDRESS | R/W | FFFFFFFFh | Address of the application version word (must be a valid flash address to be returned). |
BSLCONFIG1 is shown in Figure 1-27 and described in Table 1-34.
Return to the Summary Table.
BSL security configuration.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
TARGETADDR | ALERTACTION | ||||||||||||||||||||||||||||||
R/W-0048h | R/W-FFFFh | ||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-16 | TARGETADDR | R/W | 0048h | I2C target address to be used for the BSL I2C communication. |
15-0 | ALERTACTION | R/W | FFFFh | Action to take upon a security alert condition.
5566h = Ignore the security alert condition (0x5566 and all other values NOT 0xAABB or 0xCCDD). AABBh = Trigger a factory reset. Note that if sectors in MAIN or NONMAIN flash are write protected they will not be affected by the BSL factory reset. CCDDh = Re-configure the NONMAIN region to disable the BSL. This is not supported if the NONMAIN region is configured to be write protected. |
BSLCRC is shown in Figure 1-28 and described in Table 1-35.
Return to the Summary Table.
CRC digest (CRC-32) of the BSL_CONFIG portion of the NONMAIN memory.
31 | 30 | 29 | 28 | 27 | 26 | 25 | 24 | 23 | 22 | 21 | 20 | 19 | 18 | 17 | 16 | 15 | 14 | 13 | 12 | 11 | 10 | 9 | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 |
DIGEST | |||||||||||||||||||||||||||||||
R/W-8C76DE95h | |||||||||||||||||||||||||||||||
Bit | Field | Type | Reset | Description |
---|---|---|---|---|
31-0 | DIGEST | R/W | 8C76DE95h | BSL configuration data CRC digest |