This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

RTT viewer or Segger message: CTRL-AP indicates that the device is secured (J-Link V6.88a Info)

Working in a Windows 64 environment with nRF Connect SDK v1.5.0. Target is a custom nRF5340 board connected through a nRF5340-PDK as a debugger, via USB.

I can no longer use RTT Viewer to connect to our target: any attempt to connect pops up a message saying CTRL-AP indicates that the device is secured... Do you want to unsecure the device?

Answering YES fully erases the target. Answering NO results in denied connection.

 

The same message is popping up when trying to run the debugger directly via Segger (the debugger works, but only after it fully erased the target and reuploaded the code).

This was not happening before, but we are unsure of what was changed to cause it and how to get around.

Regards

Bruno

Parents Reply Children
  • Hi Vidar,

    I tried your 1651.multicore build and flashed our custom 5340 board's net and app cores with the GENERATED_CP_APPLICATION_merged_domains.hex and GENERATED_CP_NETWORK_merged_domains.hex files, but every time I launch the RTT Viewer, I get the "CTRL-AP indicates that the device is secured" which causes the device to be re-flashed so the RTT can connect. I've attempted flashing with west flash --recover, JFlashLite, and NRF Programmer for Windows 10, but none have worked. I've attempted doing "nrfjprog --recover --coprocessor CP_NETWORK" and "nrfjprog --recover" but no matter how I reset or recover the device, the CTRL-AP is always secured. What can I do to get around this? I'm just using the latest DTM sample for the 5340 and adding CONFIG_CLOCK_CONTROL_NRF_K32SRC_RC=y to each core's .conf file.

    Thanks,

    Brad

    LOG: J-Link RTT Viewer V7.88m: Logging started.
    LOG: Connecting to J-Link via USB...
    LOG: Device "NRF5340_XXAA_NET" selected.
    LOG: ConfigTargetSettings() start
    LOG: ConfigTargetSettings() end - Took 10us
    LOG: InitTarget() start
    LOG: CTRL-AP indicates that the device is secured.
    For debugger connection the device needs to be unsecured.
    Note: Unsecuring will trigger a mass erase of the internal flash, SRAM and UICR of both the application and the network core.
    
    
    LOG: Executing default behavior previously saved in the registry.
    LOG: Device will be unsecured now.
    LOG: InitTarget() end - Took 766ms
    LOG: Found SW-DP with ID 0x6BA02477
    LOG: DPIDR: 0x6BA02477
    LOG: CoreSight SoC-400 or earlier
    LOG: AP map detection skipped. Manually configured AP map found.
    LOG: AP[0]: AHB-AP (IDR: Not set)
    LOG: AP[1]: AHB-AP (IDR: Not set)
    LOG: AP[2]: MEM-AP (IDR: Not set)
    LOG: AP[3]: MEM-AP (IDR: Not set)
    LOG: AP[1]: Core found
    LOG: AP[1]: AHB-AP ROM base: 0xE00FE000
    LOG: CPUID register: 0x410FD214. Implementer code: 0x41 (ARM)
    LOG: Feature set: Mainline
    LOG: Cache: No cache
    
    LOG: Found Cortex-M33 r0p4, Little endian.
    LOG: FPUnit: 8 code (BP) slots and 0 literal slots
    LOG: Security extension: not implemented
    LOG: CoreSight components:
    LOG: ROMTbl[0] @ E00FE000
    LOG: [0][0]: E00FF000 CID B105100D PID 000BB4C9 ROM Table
    LOG: ROMTbl[1] @ E00FF000
    LOG: [1][0]: E000E000 CID B105900D PID 000BBD21 DEVARCH 47702A04 DEVTYPE 00 Cortex-M33
    LOG: [1][1]: E0001000 CID B105900D PID 000BBD21 DEVARCH 47701A02 DEVTYPE 00 DWT
    LOG: [1][2]: E0002000 CID B105900D PID 000BBD21 DEVARCH 47701A03 DEVTYPE 00 FPB
    LOG: [1][6]: E0042000 CID B105900D PID 000BBD21 DEVARCH 47701A14 DEVTYPE 14 CSS600-CTI
    LOG: RTT Viewer connected.

  • Hi,

    Please try using the attached hex files and see if you get the same result. This time, I built the sample with CONFIG_CLOCK_CONTROL_NRF_K32SRC_RC=y, and the DCDC regulators are disabled in case your board does not have the optional DCDC inductors mounted.

    Symbols to disable the DCDC regulators (must be applied to the app core build)

    CONFIG_BOARD_ENABLE_DCDC_APP=n
    CONFIG_BOARD_ENABLE_DCDC_NET=n
    CONFIG_BOARD_ENABLE_DCDC_HV=n

    nrfjprog commands to program the hex files

    $ nrfjprog --coprocessor CP_NETWORK --program net.hex --recover --verify
    $ nrfjprog --program app.hex --recover --verify -r
    

    hex files

    4370.app.hex

    net.hex

Related