⚠️
Hi there.. thanks for coming to the forums. Exciting news! we’re now in the process of moving to our new forum platform that will offer better functionality and is contained within the main Dialog website. All posts and accounts have been migrated. We’re now accepting traffic on the new forum only - please POST any new threads at//www.wsdof.com/support. We’ll be fixing bugs / optimising the searching and tagging over the coming days.
4 posts / 0 new
Last post
fritsch
Offline
Last seen:2 months 1 week ago
加入ed:2017-10-18 14:17
DA14580

Hi,
我分析了VITALTRACKER的软件(用DA14580提供的DA14580),在SmartSnippet Studio中的Segger Jlink。我可以读取SPI-Flash内存和OTP内存的内容。
I found that the OPT Header describes the Adress of JTAG as "Disabled". How can i connect the Target when with JTAG "Disabled"? Can anyone explain me that?
感谢您的调查。

best regards
Friedhelm.

Device:
PM_Dialog
Offline
Last seen:7小时46分钟前
Staff
加入ed:2018-02-08 11:03
Hi fritsch,

Hi fritsch,

When programming the “JTAG disable” bit in the OTP header you can no longer use the Serial Wire Debugger port.

Thanks, PM_Dialog

fritsch
Offline
Last seen:2 months 1 week ago
加入ed:2017-10-18 14:17
Hi

Hi
At the first time of my analyse i thougt it was a random contents in the memories.
In the OTP-Header is the JTAG Disable Flag "Disabled" with grey background underlined, so that the flag cannot be changed. OK thats the programmers choice.
但是如何通过Segger Ozone和JLink GDB服务器与JTAG / JLINK调试器进行连接。SmartSnippetStudio告诉我正确的目标 - 星座,Otpheader的内容被倾倒,并在地址JTAG标志上是AA AA AA AA读。当我完全接受您的回复时,这是不可能的。
A part of the dump of the OTP Header is following:

47F00 Application Flag 1 0x00000000:Emty OTP 00 00 00 00
47F04 Application Flag 2 0x00000000:Emty OTP 00 00 00 00
47F08 RF_Trim Bits [31:16) =RF_TRIM1 00 15 68 8F
47F0C CRC CRC16的校准00 00 00 32 FD
47F10保留免费未来00 00 00 00 00
47F14 Reserved 00 00 00 00
47F18 Reserved 00 00 00 00
47F1C保留00 00 00 00 00
47F20 Reserved 00 00 00 00
47F24 Reserved 00 00 00 00
47F28 Reserved 00 00 00 00 00
47F2C Reserved 00 00 00 00
47F30 Reserved 00 00 00 00
47F34 Reserved 00 00 00 00
47F38 Reserved 00 00 00 00
47F3C Reserved 00 00 00 00
47F40 Reserved 00 00 00 00
47F44 Custom Fields Custom Fields 00 00 00 00
47F48 Custom Fields Custom Fields 00 00 00 00
47F4C Custom Fields Custom Fields 00 00 00 00
47F50 Custom Fields Custom Fields 00 00 00 00
47F54 Custom Fields Custom Fields 00 00 00 00
47F58 Custom Fields Custom Fields 00 00 00 00
47F5C Custom Fields Custom Fields 00 00 00 00
47F60 Custom Fields Custom Fields 00 00 00 00
47F64时间戳字节3,字节2,BYTE1,BYTE0 0A F8 5A 5E
47F68 Tester Bits[7:2]=Tester_ID, 00 01 00 00
47F6C Position Byte3: LOT, Byte2: Wafer Byte1: Y coord, Byte0: X coord 00 00 00 00
47F70 Package used 0x00=WLCSP34, 0xAA=QFN40, 0x55=QFN48,0x99 KGD QFN40
47F74 32KHz源SELEC 0x00 XTAL 32KHz,0xAA:RC 32KHz RC
47F78 Calibration Flag Bit[31:16]: 0A5A5, Bit5: Trim_VCO_Cal, Bit4: A5 A5 00 2D
47F7C LNA调节值LNA装饰值07 42 A1 D1
47F80 RFIO Capacitance Trim RFIO Capacitance Trim Value 00 00 00 00
47F84 BandGap Trim Values BandGap Trim Values 00 00 2A 62
47F88 RC 16 Trim Values RC 16 Trim Values 00 00 00 09
47F8C XTAL 16MHz Trim XTAL 16MHz Trim Values 00 00 00 00
47F90 VCO Trim Values VCO Trim Values 00 00 00 02
47F94 Customer Code Signatur Hash Signature of Code 00 00 00 00
47F98 Customer Code Signatur Hash Signature of Code 00 00 00 00
47F9C Customer Code Signatur Hash Signature of Code 00 00 00 00
47FA0 Customer Code Signatur Hash Signature of Code 00 00 00 00
47FA4 Customer Code Signatur Hash Signature of Code 00 00 00 00
47FA8 Customer Code Signatur Hash Signature of Code 00 00 00 00
47FAC Customer Code Signatur Hash Signature of Code 00 00 00 00
47FB0 Customer Code Signatur Hash Signature of Code 00 00 00 00
47FB4 Customer Code Signatur Hash Signature of Code 00 00 00 00
47FB8 Customer Code Signatur Hash Signature of Code 00 00 00 00
47FBC Customer Code Signatur Hash Signature of Code 00 00 00 00
47FC0 Customer Code Signatur Hash Signature of Code 00 00 00 00
47FC4客户代码Signatur哈希签名代码00 00 00 00 00
47FC8客户代码Signatur哈希签名代码00 00 00 00 00
47FCC Customer Code Signatur Hash Signature of Code 00 00 00 00
47FD0 Signatur Algorihm 0x00 None,0xAA: MD5, 0x55: SHA-1, 0xFF: CRC32 None
47FD4 Device unique ID Device number (written as a string of bytes, i.e. 17 9D2A 1E
47FD8 Device unique ID Device number (written as a string of bytes, i.e. FE 60 00 00
47 fdc定制字段自定义字段00 00 00 00
47FE0 Custom Fields Custom Fields 00 00 00 00
47FE4 Custom Fields Custom Fields 00 00 00 00
47FE8自定义字段自定义字段00 00 00 00 00
47FEC Custom Fields Custom Fields 00 00 00 00
47FF0 Custom Fields Custom Fields 00 00 00 00
47FF4重新映射标志0x00 SRAM Remapped为0,0xAA OTP Remapped到0 SRAM
47FF8 DMA Length Number of 32-Bit words 0x2000 words 00 00 00 00
47FFC JTAG Enable Flag 0x00 Enable, 0xAA Disable AA AA AA AA
我很好奇。
best regards
fritsch

PM_Dialog
Offline
Last seen:7小时46分钟前
Staff
加入ed:2018-02-08 11:03
Hi fritsch,

Hi fritsch,

The JTAG could be disabled into the OTP, but if the application that is mirrored from the OTP enables the JTAG bit, then you could read the OTP. Be aware that when you attach the Smart Snippets into the OTP head and the JTAG bit is enabled from the application, you will read that the JTAG OPT field is disabled.

Thanks, PM_Dialog