The following techniques and safety
measures are applicable for improving independence of function when using the
TMS320F280013x MCU:
- Hold peripheral clocks disable if
the available peripherals are unused (CLK14-Peripheral Clock Gating (PCLKCR)).
- Hold peripherals in reset if the
available peripherals are unused (RST9-Peripheral Soft Reset (SOFTPRES)).
- When possible, separate critical
I/O functions by using non adjacent I/O pins and balls.
- Partition the memory, per the application requirements, to the
respective processing units and configure the access protection mechanism for memories for each memory instance so
that only the permitted controllers have access to memory.
- The dual code security module (DCSM) can be used for functional
safety, where functions with different safety integrity levels can be executed
from different security zones (zone1, zone2, and unsecured zone), acting as
firewalls and thus mitigating risks resulting from interference from one secure
zone to another. For more information, see Achieving Coexistence of Safety
Functions for EV/HEV Using C2000™ MCUs.
- Disabling unused sources of SOC inputs to ADC can help avoid
interference from unused peripherals to disturb functionality of ADC.
- To avoid interference from spurious activity on MCU’s debug
port, JTAG1-Hardware Disable of JTAG Port can be used.
- Safety applications running on the CPU can be interfered by
unintentional faulty interrupt events to PIE module. PIE7-Maintaining Interrupt Handler for Unused Interrupts and PIE8-Online Monitoring of Interrupts and Events detect such
interfering failures.
- MCU resources that support CPU execution, such as memory,
interrupt controller, and so forth, can be impacted by resources from lower,
safety-integrity, safety functions coexisting on the same MCU. Safety mechanisms
such as SRAM11-Access Protection Mechanism for Memories, SRAM16–Information Redundancy Techniques, and SRAM17-CPU Handling of Illegal Operation, Illegal Results and Instruction
Trapping are able to detect such interference.
- Critical configuration registers can be victim to interference
from bus controllers on the MCU, which implements lower, safety-integrity
functions. These critical configuration registers can be protected by SYS1-Multi-Bit Enable Keys for Control Registers, SYS2-Lock Mechanism for Control Registers, and SYS8-EALLOW Protection for Critical Registers.