2 # GoodFET Client Library
4 # (C) 2009 Travis Goodspeed <travis at radiantmachines.com>
6 # This code is being rewritten and refactored. You've been warned!
11 from GoodFET import GoodFET;
12 from intelhex import IntelHex;
14 import xml.dom.minidom, time;
16 class GoodFETCC(GoodFET):
17 """A GoodFET variant for use with Chipcon 8051 Zigbee SoC."""
23 smartrfpath="/opt/smartrf7";
24 def loadsymbols(self):
25 try: self.SRF_loadsymbols();
27 if self.verbose>0: print "SmartRF not found at %s." % self.smartrfpath;
28 def SRF_chipdom(self,chip="cc1110", doc="register_definition.xml"):
29 fn="%s/config/xml/%s/%s" % (self.smartrfpath,chip,doc);
30 #print "Opening %s" % fn;
31 return xml.dom.minidom.parse(fn)
33 def CMDrs(self,args=[]):
34 """Chip command to grab the radio state."""
36 self.SRF_radiostate();
38 print "Error printing radio state.";
39 print "SmartRF not found at %s." % self.smartrfpath;
40 def SRF_bitfieldstr(self,bf):
47 for e in bf.childNodes:
48 if e.localName=="Name" and e.childNodes: name= e.childNodes[0].nodeValue;
49 elif e.localName=="Start": start=e.childNodes[0].nodeValue;
50 elif e.localName=="Stop": stop=e.childNodes[0].nodeValue;
51 return " [%s:%s] %30s " % (start,stop,name);
52 def SRF_radiostate(self):
54 chip=self.CCversions.get(ident&0xFF00);
55 dom=self.SRF_chipdom(chip,"register_definition.xml");
56 for e in dom.getElementsByTagName("registerdefinition"):
57 for f in e.childNodes:
58 if f.localName=="DeviceName":
59 print "// %s RadioState" % (f.childNodes[0].nodeValue);
60 elif f.localName=="Register":
65 for g in f.childNodes:
66 if g.localName=="Name":
67 name=g.childNodes[0].nodeValue;
68 elif g.localName=="Address":
69 address=g.childNodes[0].nodeValue;
70 elif g.localName=="Description":
72 description=g.childNodes[0].nodeValue;
73 elif g.localName=="Bitfield":
74 bitfields+="%17s/* %-50s */\n" % ("",self.SRF_bitfieldstr(g));
75 #print "SFRX(%10s, %s); /* %50s */" % (name,address, description);
76 print "%-10s=0x%02x; /* %-50s */" % (
77 name,self.CCpeekdatabyte(eval(address)), description);
78 if bitfields!="": print bitfields.rstrip();
79 def RF_setfreq(self,frequency):
80 """Set the frequency in Hz."""
81 #FIXME CC1110 specific
82 #Some frequencies fail, probably and FSCAL thing.
85 freq=int(hz/396.728515625);
88 freq1=(freq&0xFF00)>>8;
89 freq2=(freq&0xFF0000)>>16;
91 self.pokebysym("FREQ2",freq2);
92 self.pokebysym("FREQ1",freq1);
93 self.pokebysym("FREQ0",freq0);
95 self.pokebysym("TEST1",0x31);
96 self.pokebysym("TEST0",0x09);
99 #self.pokebysym("FSCAL2" , 0x2A); #above mid
100 self.pokebysym("FSCAL2" , 0x0A); #beneath mid
102 #self.CC_RFST_CAL(); #SCAL
106 def RF_getfreq(self):
107 """Get the frequency in Hz."""
108 #FIXME CC1110 specific
110 #return (2400+self.peek(0x05))*10**6
111 #self.poke(0x05,chan);
113 #freq2=self.CCpeekdatabyte(0xdf09);
114 #freq1=self.CCpeekdatabyte(0xdf0a);
115 #freq0=self.CCpeekdatabyte(0xdf0b);
118 freq2=self.peekbysym("FREQ2");
119 freq1=self.peekbysym("FREQ1");
120 freq0=self.peekbysym("FREQ0");
121 freq=(freq2<<16)+(freq1<<8)+freq0;
125 hz=freq*396.728515625;
128 lastshellcode="none";
129 def shellcodefile(self,filename,wait=1):
130 """Run a fragment of shellcode by name."""
131 #FIXME: should identify chip model number, use shellcode for that chip.
133 if self.lastshellcode!=filename:
134 self.lastshellcode=filename;
136 file=file.replace("GoodFETCC.pyc","GoodFETCC.py");
137 path=file.replace("client/GoodFETCC.py","shellcode/chipcon/cc1110/");
138 filename=path+filename;
141 h=IntelHex(filename);
142 for i in h._buf.keys():
143 self.CCpokedatabyte(i,h[i]);
146 self.CCdebuginstr([0x02, 0xf0, 0x00]); #ljmp 0xF000
148 while wait>0 and (0==self.CCstatus()&0x20):
151 #print "Waiting for shell code to return.";
154 return self.CCstatus()&0x20;
155 def shellcode(self,code,wait=1):
156 """Copy a block of code into RAM and execute it."""
160 self.pokebyte(0xF000+i,byte);
162 #print "Code loaded, executing."
163 self.CCdebuginstr([0x02, 0xf0, 0x00]); #ljmp 0xF000
165 while wait>0 and (0==self.CCstatus()&0x20):
168 #print "Waiting for shell code to return.";
170 def CC1110_crystal(self):
171 """Start the main crystal of the CC1110 oscillating, needed for radio use."""
172 code=[0x53, 0xBE, 0xFB, #anl SLEEP, #0xFB
174 0xE5, 0xBE, #mov a,SLEEP
175 0x30, 0xE6, 0xFB, #jnb acc.6, back
176 0x53, 0xc6, 0xB8, #anl CLKCON, #0xB8
178 0xE5, 0xC6, #mov a,CLKCON
179 0x20, 0xE6, 0xFB, #jb acc.6, two
180 0x43, 0xBE, 0x04, #orl SLEEP, #0x04
183 self.shellcode(code);
185 #Slower to load, but produced from C.
186 #self.shellcodefile("crystal.ihx");
189 """Move the radio to its idle state."""
193 #Chipcon RF strobes. CC1110 specific
198 def CC_RFST_IDLE(self):
199 """Switch the radio to idle mode, clearing overflows and errors."""
200 self.CC_RFST(self.RFST_IDLE);
201 def CC_RFST_TX(self):
202 """Switch the radio to TX mode."""
203 self.CC_RFST(self.RFST_TX);
204 def CC_RFST_RX(self):
205 """Switch the radio to RX mode."""
206 self.CC_RFST(self.RFST_RX);
207 def CC_RFST_CAL(self):
208 """Calibrate strobe the radio."""
209 self.CC_RFST(self.RFST_CAL);
210 def CC_RFST(self,state=RFST_IDLE):
212 self.pokebyte(RFST,state); #Return to idle state.
215 def config_simpliciti(self,band="none"):
216 self.pokebysym("FSCTRL1" , 0x0C) #08 # Frequency synthesizer control.
217 self.pokebysym("FSCTRL0" , 0x00) # Frequency synthesizer control.
219 #Don't change these while the radio is active.
220 self.pokebysym("FSCAL3" , 0xEA) # Frequency synthesizer calibration.
221 self.pokebysym("FSCAL2" , 0x2A) # Frequency synthesizer calibration.
222 self.pokebysym("FSCAL1" , 0x00) # Frequency synthesizer calibration.
223 self.pokebysym("FSCAL0" , 0x1F) # Frequency synthesizer calibration.
225 if band=="ismeu" or band=="eu":
226 self.pokebysym("FREQ2" , 0x21) # Frequency control word, high byte.
227 self.pokebysym("FREQ1" , 0x71) # Frequency control word, middle byte.
228 self.pokebysym("FREQ0" , 0x7a) # Frequency control word, low byte.
229 elif band=="ismus" or band=="us":
230 self.pokebysym("FREQ2" , 0x22) # Frequency control word, high byte.
231 self.pokebysym("FREQ1" , 0xB1) # Frequency control word, middle byte.
232 self.pokebysym("FREQ0" , 0x3B) # Frequency control word, low byte.
233 elif band=="ismlf" or band=="lf":
234 self.pokebysym("FREQ2" , 0x10) # Frequency control word, high byte.
235 self.pokebysym("FREQ1" , 0xB0) # Frequency control word, middle byte.
236 self.pokebysym("FREQ0" , 0x71) # Frequency control word, low byte.
240 #Got a frequency, not a band.
241 self.RF_setfreq(eval(band));
242 self.pokebysym("MDMCFG4" , 0x7B) # Modem configuration.
243 self.pokebysym("MDMCFG3" , 0x83) # Modem configuration.
244 self.pokebysym("MDMCFG2" , 0x13) # Modem configuration.
245 self.pokebysym("MDMCFG1" , 0x22) # Modem configuration.
246 self.pokebysym("MDMCFG0" , 0xF8) # Modem configuration.
247 if band=="ismus" or band=="us":
248 self.pokebysym("CHANNR" , 20) # Channel number.
250 self.pokebysym("CHANNR" , 0x00) # Channel number.
251 self.pokebysym("DEVIATN" , 0x42) # Modem deviation setting (when FSK modulation is enabled).
253 self.pokebysym("FREND1" , 0xB6) # Front end RX configuration.
254 self.pokebysym("FREND0" , 0x10) # Front end RX configuration.
255 self.pokebysym("MCSM0" , 0x18) # Main Radio Control State Machine configuration.
256 self.pokebysym("FOCCFG" , 0x1D) # Frequency Offset Compensation Configuration.
257 self.pokebysym("BSCFG" , 0x1C) # Bit synchronization Configuration.
259 self.pokebysym("AGCCTRL2" , 0xC7) # AGC control.
260 self.pokebysym("AGCCTRL1" , 0x00) # AGC control.
261 self.pokebysym("AGCCTRL0" , 0xB2) # AGC control.
263 self.pokebysym("TEST2" , 0x81) # Various test settings.
264 self.pokebysym("TEST1" , 0x35) # Various test settings.
265 self.pokebysym("TEST0" , 0x09) # Various test settings.
266 self.pokebysym("PA_TABLE0", 0xc0) # Max output power.
267 self.pokebysym("PKTCTRL1" , 0x04) # Packet automation control, w/ lqi
268 #self.pokebysym("PKTCTRL1" , 0x00) # Packet automation control. w/o lqi
269 self.pokebysym("PKTCTRL0" , 0x05) # Packet automation control, w/ checksum.
270 #self.pokebysym("PKTCTRL0" , 0x00) # Packet automation control, w/o checksum, fixed length
271 self.pokebysym("ADDR" , 0x01) # Device address.
272 self.pokebysym("PKTLEN" , 0xFF) # Packet length.
274 self.pokebysym("SYNC1",0xD3);
275 self.pokebysym("SYNC0",0x91);
277 def RF_carrier(self):
278 """Hold a carrier wave on the present frequency."""
280 self.CC1110_crystal(); #FIXME, '1110 specific.
286 self.config_simpliciti();
288 #Don't change these while the radio is active.
289 #self.pokebysym("FSCAL3" , 0xA9) # Frequency synthesizer calibration.
290 #self.pokebysym("FSCAL2" , 0x0A) # Frequency synthesizer calibration.
291 #self.pokebysym("FSCAL1" , 0x00) # Frequency synthesizer calibration.
292 #self.pokebysym("FSCAL0" , 0x11) # Frequency synthesizer calibration.
295 #self.pokebysym("PA_TABLE0", 0xFF) # PA output power setting.
297 #This is what drops to OOK.
298 #Comment to keep GFSK, might be better at jamming.
299 self.pokebysym("MDMCFG4" , 0x86) # Modem configuration.
300 self.pokebysym("MDMCFG3" , 0x83) # Modem configuration.
301 self.pokebysym("MDMCFG2" , 0x30) # Modem configuration.
302 self.pokebysym("MDMCFG1" , 0x22) # Modem configuration.
303 self.pokebysym("MDMCFG0" , 0xF8) # Modem configuration.
306 self.pokebysym("SYNC1",0xAA);
307 self.pokebysym("SYNC0",0xAA);
311 #while ((MARCSTATE & MARCSTATE_MARC_STATE) != MARC_STATE_TX);
314 while((state!=0x13)):
315 self.pokebyte(RFST,0x03); #RFST=RFST_STX
317 state=self.peekbysym("MARCSTATE")&0x1F;
318 #print "state=%02x" % state;
319 print "Holding a carrier on %f MHz." % (self.RF_getfreq()/10**6);
323 def RF_getsmac(self):
324 """Return the source MAC address."""
326 #Register 0A is RX_ADDR_P0, five bytes.
327 mac=self.peekbysym("ADDR");
329 def RF_setsmac(self,mac):
330 """Set the source MAC address."""
331 self.pokebysym("ADDR",mac);
333 def RF_gettmac(self):
334 """Return the target MAC address."""
336 def RF_settmac(self,mac):
337 """Set the target MAC address."""
339 def RF_rxpacket(self):
340 """Get a packet from the radio. Returns None if none is waiting."""
341 self.shellcodefile("rxpacket.ihx");
342 len=self.peek8(0xFE00,"xdata");
343 return self.peekblock(0xFE00,len+3,"data");
344 def RF_txpacket(self,packet):
345 """Transmit a packet. Untested."""
347 self.pokeblock(0xFE00,packet,"data");
348 self.shellcodefile("txpacket.ihx");
350 def RF_txrxpacket(self,packet):
351 """Transmit a packet. Untested."""
353 self.pokeblock(0xFE00,packet,"data");
354 self.shellcodefile("txrxpacket.ihx");
355 len=self.peek8(0xFE00,"xdata");
356 return self.peekblock(0xFE00,len+3,"data");
358 def RF_getrssi(self):
359 """Returns the received signal strenght, with a weird offset."""
361 rssireg=self.symbols.get("RSSI");
362 return self.CCpeekdatabyte(rssireg)^0x80;
364 if self.verbose>0: print "RSSI reg doesn't exist.";
366 #RSSI doesn't exist on 2.4GHz devices. Maybe RSSIL and RSSIH?
367 rssilreg=self.symbols.get("RSSIL");
368 rssil=self.CCpeekdatabyte(rssilreg);
369 rssihreg=self.symbols.get("RSSIL");
370 rssih=self.CCpeekdatabyte(rssihreg);
371 return (rssih<<8)|rssil;
373 if self.verbose>0: print "RSSIL/RSSIH regs don't exist.";
379 def SRF_loadsymbols(self):
380 ident=self.CCident();
381 chip=self.CCversions.get(ident&0xFF00);
382 dom=self.SRF_chipdom(chip,"register_definition.xml");
383 for e in dom.getElementsByTagName("registerdefinition"):
384 for f in e.childNodes:
385 if f.localName=="Register":
390 for g in f.childNodes:
391 if g.localName=="Name":
392 name=g.childNodes[0].nodeValue;
393 elif g.localName=="Address":
394 address=g.childNodes[0].nodeValue;
395 elif g.localName=="Description":
397 description=g.childNodes[0].nodeValue;
398 elif g.localName=="Bitfield":
399 bitfields+="%17s/* %-50s */\n" % ("",self.SRF_bitfieldstr(g));
400 #print "SFRX(%10s, %s); /* %50s */" % (name,address, description);
401 self.symbols.define(eval(address),name,description,"data");
407 self.writecmd(self.APP,0x86,0,self.data);
410 def CCreleasecpu(self):
411 """Resume the CPU."""
412 self.writecmd(self.APP,0x87,0,self.data);
416 #print "Status: %s" % self.CCstatusstr();
418 #Grab ident three times, should be equal.
419 ident1=self.CCident();
420 ident2=self.CCident();
421 ident3=self.CCident();
422 if(ident1!=ident2 or ident2!=ident3):
423 print "Error, repeated ident attempts unequal."
424 print "%04x, %04x, %04x" % (ident1, ident2, ident3);
426 #Single step, printing PC.
427 print "Tracing execution at startup."
428 for i in range(1,15):
430 byte=self.CCpeekcodebyte(i);
431 #print "PC=%04x, %02x" % (pc, byte);
434 print "Verifying that debugging a NOP doesn't affect the PC."
435 for i in range(1,15):
437 self.CCdebuginstr([0x00]);
438 if(pc!=self.CCgetPC()):
439 print "ERROR: PC changed during CCdebuginstr([NOP])!";
441 print "Checking pokes to XRAM."
442 for i in range(0xf000,0xf020):
443 self.CCpokedatabyte(i,0xde);
444 if(self.CCpeekdatabyte(i)!=0xde):
445 print "Error in XDATA at 0x%04x" % i;
447 #print "Status: %s." % self.CCstatusstr();
453 """Move the FET into the CC2430/CC2530 application."""
454 #print "Initializing Chipcon.";
455 self.writecmd(self.APP,0x10,0,self.data);
456 def CCrd_config(self):
457 """Read the config register of a Chipcon."""
458 self.writecmd(self.APP,0x82,0,self.data);
459 return ord(self.data[0]);
460 def CCwr_config(self,config):
461 """Write the config register of a Chipcon."""
462 self.writecmd(self.APP,0x81,1,[config&0xFF]);
463 def CClockchip(self):
464 """Set the flash lock bit in info mem."""
465 self.writecmd(self.APP, 0x9A, 0, None);
467 """Set the flash lock bit in info mem."""
471 CCversions={0x0100:"cc1110",
477 0xA500:"cc2530", #page 52 of SWRU191
480 CCpagesizes={0x01: 1024, #"CC1110",
481 0x11: 1024, #"CC1111",
482 0x85: 2048, #"CC2430",
483 0x89: 2048, #"CC2431",
484 0x81: 1024, #"CC2510",
485 0x91: 1024, #"CC2511",
486 0xA5: 2048, #"CC2530", #page 52 of SWRU191
487 0xB5: 2048, #"CC2531",
488 0xFF: 0 } #"CCmissing"};
489 def infostring(self):
490 return self.CCidentstr();
491 def CCidentstr(self):
492 ident=self.CCident();
493 chip=self.CCversions.get(ident&0xFF00);
494 pagesize=self.CCpagesizes.get(ident>0xFF);
496 return "%s/r%0.4x/ps0x%0.4x" % (chip, ident, pagesize);
498 return "%04x" % ident;
500 """Get a chipcon's ID."""
501 self.writecmd(self.APP,0x8B,0,None);
502 chip=ord(self.data[0]);
503 rev=ord(self.data[1]);
504 return (chip<<8)+rev;
505 def CCpagesize(self):
506 """Get a chipcon's ID."""
507 self.writecmd(self.APP,0x8B,0,None);
508 chip=ord(self.data[0]);
509 size=self.CCpagesizes.get(chip);
511 print "ERROR: Pagesize undefined.";
512 print "chip=%0.4x" %chip;
517 return self.CCgetPC();
519 """Get a chipcon's PC."""
520 self.writecmd(self.APP,0x83,0,None);
521 hi=ord(self.data[0]);
522 lo=ord(self.data[1]);
524 def CCcmd(self,phrase):
525 self.writecmd(self.APP,0x00,len(phrase),phrase);
526 val=ord(self.data[0]);
527 print "Got %02x" % val;
529 def CCdebuginstr(self,instr):
530 self.writecmd(self.APP,0x88,len(instr),instr);
531 return ord(self.data[0]);
532 #def peekblock(self,adr,length,memory="vn"):
533 # """Return a block of data, broken"""
534 # data=[adr&0xff, (adr&0xff00)>>8,
535 # length&0xFF,(length&0xFF00)>>8];
536 # self.writecmd(self.APP,0x91,4,data);
537 # return [ord(x) for x in self.data]
538 def peek8(self,address, memory="code"):
539 if(memory=="code" or memory=="flash" or memory=="vn"):
540 return self.CCpeekcodebyte(address);
541 elif(memory=="data" or memory=="xdata" or memory=="ram"):
542 return self.CCpeekdatabyte(address);
543 elif(memory=="idata" or memory=="iram"):
544 return self.CCpeekirambyte(address);
545 print "%s is an unknown memory." % memory;
547 def CCpeekcodebyte(self,adr):
548 """Read the contents of code memory at an address."""
549 self.data=[adr&0xff, (adr&0xff00)>>8];
550 self.writecmd(self.APP,0x90,2,self.data);
551 return ord(self.data[0]);
552 def CCpeekdatabyte(self,adr):
553 """Read the contents of data memory at an address."""
554 self.data=[adr&0xff, (adr&0xff00)>>8];
555 self.writecmd(self.APP,0x91, 2, self.data);
556 return ord(self.data[0]);
557 def CCpeekirambyte(self,adr):
558 """Read the contents of IRAM at an address."""
559 self.data=[adr&0xff];
560 self.writecmd(self.APP,0x02, 1, self.data);
561 return ord(self.data[0]);
562 def CCpeekiramword(self,adr):
563 """Read the little-endian contents of IRAM at an address."""
564 return self.CCpeekirambyte(adr)+(
565 self.CCpeekirambyte(adr+1)<<8);
566 def CCpokeiramword(self,adr,val):
567 self.CCpokeirambyte(adr,val&0xff);
568 self.CCpokeirambyte(adr+1,(val>>8)&0xff);
569 def CCpokeirambyte(self,adr,val):
570 """Write the contents of IRAM at an address."""
571 self.data=[adr&0xff, val&0xff];
572 self.writecmd(self.APP,0x02, 2, self.data);
573 return ord(self.data[0]);
574 def pokebyte(self,adr,val,mem="xdata"):
575 self.CCpokedatabyte(adr,val);
576 def CCpokedatabyte(self,adr,val):
577 """Write a byte to data memory."""
578 self.data=[adr&0xff, (adr&0xff00)>>8, val];
579 self.writecmd(self.APP, 0x92, 3, self.data);
580 return ord(self.data[0]);
581 def CCchiperase(self):
582 """Erase all of the target's memory."""
583 self.writecmd(self.APP,0x80,0,None);
585 """Erase all of the target's memory."""
590 """Check the status."""
591 self.writecmd(self.APP,0x84,0,None);
592 return ord(self.data[0])
594 CCstatusbits={0x80 : "erase_busy",
598 0x08 : "halt_status",
603 CCconfigbits={0x20 : "soft_power_mode", #new for CC2530
606 0x02 : "timer_suspend",
607 0x01 : "sel_flash_info_page" #stricken from CC2530
611 """Check the status as a string."""
612 status=self.CCstatus();
617 str="%s %s" %(self.CCstatusbits[i],str);
621 """Start debugging."""
623 self.writecmd(self.APP,0x20,0,self.data);
624 ident=self.CCidentstr();
625 #print "Target identifies as %s." % ident;
626 #print "Status: %s." % self.status();
629 #Get SmartRF Studio regs if they exist.
633 """Stop debugging."""
634 self.writecmd(self.APP,0x21,0,self.data);
635 def CCstep_instr(self):
636 """Step one instruction."""
637 self.writecmd(self.APP,0x89,0,self.data);
638 def CCeraseflashbuffer(self):
639 """Erase the 2kB flash buffer"""
640 self.writecmd(self.APP,0x99);
641 def CCflashpage(self,adr):
642 """Flash 2kB a page of flash from 0xF000 in XDATA"""
647 print "Flashing buffer to 0x%06x" % adr;
648 self.writecmd(self.APP,0x95,4,data);
650 def setsecret(self,value):
651 """Set a secret word for later retreival. Used by glitcher."""
653 pagelen = self.CCpagesize(); #Varies by chip.
654 print "page=%04x, pagelen=%04x" % (page,pagelen);
656 self.CCeraseflashbuffer();
657 print "Setting secret to %x" % value;
658 self.CCpokedatabyte(0xF000,value);
659 self.CCpokedatabyte(0xF800,value);
660 print "Setting secret to %x==%x" % (value,
661 self.CCpeekdatabyte(0xf000));
663 print "code[0]=%x" % self.CCpeekcodebyte(0);
665 """Get a secret word. Used by glitcher."""
666 secret=self.CCpeekcodebyte(0);
667 #print "Got secret %02x" % secret;
670 def dump(self,file,start=0,stop=0xffff):
671 """Dump an intel hex file from code memory."""
672 print "Dumping code from %04x to %04x as %s." % (start,stop,file);
676 h[i]=self.CCpeekcodebyte(i);
678 print "Dumped %04x."%i;
679 h.write_hex_file(file); #buffer to disk.
681 h.write_hex_file(file);
683 def flash(self,file):
684 """Flash an intel hex file to code memory."""
685 print "Flashing %s" % file;
689 pagelen = self.CCpagesize(); #Varies by chip.
691 #print "page=%04x, pagelen=%04x" % (page,pagelen);
695 #Wipe the RAM buffer for the next flash page.
696 self.CCeraseflashbuffer();
697 for i in h._buf.keys():
698 while(i>=page+pagelen):
700 self.CCflashpage(page);
701 #client.CCeraseflashbuffer();
703 print "Flashed page at %06x" % page
706 #Place byte into buffer.
707 self.CCpokedatabyte(0xF000+i-page,
711 print "Buffering %04x toward %06x" % (i,page);
713 self.CCflashpage(page);
714 print "Flashed final page at %06x" % page;