MM912H634CM1AE Freescale Semiconductor, MM912H634CM1AE Datasheet - Page 232

no-image

MM912H634CM1AE

Manufacturer Part Number
MM912H634CM1AE
Description
64KS12 LIN2xLS/HS Isense
Manufacturer
Freescale Semiconductor
Series
-r
Datasheet

Specifications of MM912H634CM1AE

Applications
Automotive
Core Processor
HCS12
Program Memory Type
FLASH (64 kB)
Controller Series
HCS12
Ram Size
6K x 8
Interface
LIN
Number Of I /o
-
Voltage - Supply
5.5 V ~ 27 V
Operating Temperature
-40°C ~ 125°C
Mounting Type
Surface Mount
Package / Case
48-LQFP Exposed Pad
Lead Free Status / Rohs Status
Lead free / RoHS Compliant
One cycle after bdm_unsecure is asserted the secure firmware is disabled from the map.
In secure mode aBDM access to a non register address will be translated to a peripheral register address, and BDM registers
are not accessible.
No BDM global access is possible if the chip is secured.
In secured expanded mode or emulation mode, FLASH and EEPROM are disabled by the MMC.
4.34.2
When security is active and the blank check is performed and failed, only BDM hardware commands are available. If the blank
check is succeeds, all BDM commands are available.
The BDM status register contains a bit called UNSEC. This bit is only writable by the secure firmware in special single chip mode.
Based on the state of this bit, the BDM generates a signal called “unsecure”. The bit and signal are always reset to 0 (=
de-asserted = secure).
If the user resets into special single chip mode with the part secured, an alternate BDM firmware (“SECURE firmware”), is placed
in the map along with the standard BDM firmware. The secure firmware has higher priority than the standard firmware, but it is
smaller (less bytes). The secure firmware covers the vector space, but does not reach the beginning of the BDM firmware space.
When blank check is successfully performed, UNSEC is asserted. The BDM program jumps to the start of the standard BDM
firmware program and the secure firmware is turned off. If the blank check fails, then the ENBDM bit in the BDMSTS register is
set without asserting UNSEC, and the BDM firmware code enters a loop. This enables the BDM hardware commands. In secure
mode the MMC restricts BDM accesses to the register space.
With UNSEC asserted, security is off and the user can change the state of the secure bits in the FLASH. Note that if the user
does not change the state of these bits to “unsecured”, the part will be secured again when it is next taken out of reset.
4.34.3
S12X_DBG will disable the trace buffer, but breakpoints are still valid.
4.34.4
XGATE internal registers XGCCR, XGPC, and XGR1 - XGR7 can not be written and will read zero from IPBI.
Single stepping in XGATE is not possible.
XGATE code residing in the internal RAM cannot be protected:
4.35
The BDM contains a secure firmware code. This firmware code is invoked when the user comes out of reset in special single chip
mode with security enabled. The function of the firmware code is straight forward:
If either the FLASH or the EEPROM is not erased, then security is not released. The ENBDM bit is set and the code enters a
loop. This allows BDM hardware commands, which may be used to erase the EEPROM and FLASH.
Note that erasing the memories and erasing / reprogramming the security bits is NOT part of the firmware code. The user must
perform these operations.
The blank check of FLASH and EEPROM is done in the BDM firmware. As such it could be changed on future parts. The current
scheme uses the NVM command state-machines (FTX, EETX) to perform the blank check.
Freescale Semiconductor
1.
2.
3.
4.
5.
start MCU in NSC, let it run for a while
reset into SSC, MASERS the NVM
reset into SSC, blank check of BDM secure firmware succeeds
MCU is temporarily unsecured
BDM can be used to read internal RAM (contents not affected by reset)
Verify the FLASH is erased
Verify the EEPROM is erased
If both are erased, release security
Secure firmware Code Overview
BDM
DBG
XGATE
MM912_634 Advance Information, Rev. 4.0
232

Related parts for MM912H634CM1AE