SPRACS4 June 2020 TMS320F2800132 , TMS320F2800133 , TMS320F2800135 , TMS320F2800137 , TMS320F2800152-Q1 , TMS320F2800153-Q1 , TMS320F2800154-Q1 , TMS320F2800155 , TMS320F2800155-Q1 , TMS320F2800156-Q1 , TMS320F2800157 , TMS320F2800157-Q1 , TMS320F28384D , TMS320F28384D-Q1 , TMS320F28384S , TMS320F28384S-Q1 , TMS320F28386D , TMS320F28386D-Q1 , TMS320F28386S , TMS320F28386S-Q1 , TMS320F28388D , TMS320F28388S , TMS320F28P650DH , TMS320F28P650DK , TMS320F28P650SH , TMS320F28P650SK , TMS320F28P659DH-Q1 , TMS320F28P659DK-Q1 , TMS320F28P659SH-Q1
Sometimes, you may want to permanently disable the JTAG interface on the device in the field. This can be achieved by programming the 128-bit JTAG password value as ALL_0 and enabling the JTAGLOCK module (JLM). Once this is done, JTAGLOCK can not be disable again hence you cannot connect to the target via CCS for any further debug on that device. Table 5 provides the required security configuration to permanently enable JTAGLOCK feature.
Security Configuration | Value |
---|---|
Z1OTP_LINKPOINTER1 | 0x0000_0000 |
Z1OTP_LINKPOINTER2 | 0x0000_0000 |
Z1OTP_LINKPOINTER3 | 0x0000_0000 |
Z1OTP_JLM_ENABLE | 0x0000_0000 (Enable JTAGLOCK) |
Z1OTP_JTAGPSWDH1 | 0x0000_0000 |
Z1OTP_JTAGPSWDH0 | 0x0000_0000 |
Z1OTP_JTAGPSWDL1 | 0x0000_0000 |
Z1OTP_JTAGPSWDL0 | 0x0000_0000 |
NOTE
Devices with JTAGLOCK will limit TI’s ability to perform a complete analysis for customer returns in the event of a device failure. You need to provide the JTAGLOCK password to TI along with the unit for analysis. If the permanent JTAGLOCK is used, TI will not be able to perform failure analysis.
NOTE
In this case LINKPOINTERs are also programmed with ALL_0 values. This means last Zone Select Block (ZSB) has been used and security configurations cannot be changed any more on this device.