B.4 Rom Code Generation Flow - Texas Instruments TMS320C28x Reference Manual

Dsp cpu and instruction set
Table of Contents

Advertisement

ROM Code Generation Flow

B.4 ROM Code Generation Flow

Step 1: Submission of code to TI
There are three different possibilities while submitting a code for
ROM:
1) A single COFF file that contains code for both "customer-OTP"
as well as "customer ROM" may be submitted.
2) Code could be provided in two different COFF files, one for "cus-
tomer-OTP" and the other for "customer ROM".
3) Code could be provided for "customer ROM" alone and not the
"customer-OTP".
Step 2: Creating the ROM memory image
This is done by first creating a memory array corresponding to the
size of the ROM (including the OTP areas) and filling it with 0xFFFF.
The memory is then loaded with the customer COFF file(s), TI test
code and the D-number.
The numerical portion of the D-number is converted to its hexadeci-
mal equivalent and stored in 0x3F7FF2 & 0x3F7FF3 and 0x3D7BFC
& 0x3D7BFD. The symbol "DE" is not converted. For example, for
DE121001, the decimal number 121001 will be converted to its hex-
adecimal equivalent (1D8A9) and stored in the D-number locations.
D8A9 will be stored in address "n" and 0001 will be stored in address
"n+1". The D-number is stored in both "customer-OTP" as well as
"customer ROM" areas.
Step 3: Computation of checksum
The checksum is now computed for the ROM contents (Customer-
OTP, TI-OTP and main ROM arrays separately) using the following
algorithm:
The contents of an address is XORed with the address and the result
is stored in a variable. This is done for the chosen ROM array and
the results are added together. The final sum total becomes the
checksum for that ROM array. Only the least significant 16-bits of the
address are used for checksum computation. Any overflow at the
end is ignored and only 32-bits from the end-result are stored. Three
unique checksums are computed for the three ROM arrays (Custom-
er-OTP, TI-OTP and main ROM arrays) and stored as shown in the
table below.
The following memory zones are used for the purpose of checksum
computation:

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the TMS320C28x and is the answer not in the manual?

Table of Contents

Save PDF