2 # Serial Bootstrap Loader software for the MSP430 embedded proccessor.
4 # (C) 2001-2003 Chris Liechti <cliechti@gmx.net>
5 # this is distributed under a free software license, see license-bsl.txt
7 # fixes from Colin Domoney
9 # based on the application note slas96b.pdf from Texas Instruments, Inc.,
11 # additional infos from slaa089a.pdf
13 # Forked by Travis Goodspeed <travis at tnbelt.com> for use with the GoodFET
16 # This WIP is intended to save the info flash when using --fromweb.
18 # - Save info flash before actionMassErase
19 # - Make actionFromweb use board name to get the right firmware image
20 # - Program saved info after other programming is complete
21 # - Make saveinfo detect missing info (all 0xFF)
22 # - Download image from web before erasing
24 # - Trim unnecessary BSL unlocks
25 # - Add param to override saveinfo with a provided info.txt
26 # - Figure out better way to saveinfo when -P is required
27 # - Maybe use the best guess from contrib/infos/ when nothing better is provided?
28 # - If saveinfo gets something interesting, request a copy
29 # - Use FTDI Serial Number to archive info text and/or password (dragorn's idea)
30 # /sys/bus/usb-serial/devices/ttyUSB0/../../serial
32 import sys, time, string, cStringIO, struct
33 #sys.path.append("/usr/lib/tinyos") #We no longer require TinyOS.
34 import serial, os, subprocess, glob
36 #forked from TinyOS Telos version.
37 VERSION = string.split("Revision: 1.39-goodfet-8 ")[1]
39 DEBUG = 0 #disable debug messages by default
41 #copy of the patch file provided by TI
42 #this part is (C) by Texas Instruments
44 31 40 1A 02 09 43 B0 12 2A 0E B0 12 BA 0D 55 42
45 0B 02 75 90 12 00 1F 24 B0 12 BA 02 55 42 0B 02
46 75 90 16 00 16 24 75 90 14 00 11 24 B0 12 84 0E
47 06 3C B0 12 94 0E 03 3C 21 53 B0 12 8C 0E B2 40
48 10 A5 2C 01 B2 40 00 A5 28 01 30 40 42 0C 30 40
49 76 0D 30 40 AC 0C 16 42 0E 02 17 42 10 02 E2 B2
50 08 02 14 24 B0 12 10 0F 36 90 00 10 06 28 B2 40
51 00 A5 2C 01 B2 40 40 A5 28 01 D6 42 06 02 00 00
52 16 53 17 83 EF 23 B0 12 BA 02 D3 3F B0 12 10 0F
53 17 83 FC 23 B0 12 BA 02 D0 3F 18 42 12 02 B0 12
54 10 0F D2 42 06 02 12 02 B0 12 10 0F D2 42 06 02
55 13 02 38 E3 18 92 12 02 BF 23 E2 B3 08 02 BC 23
60 #These BSL's are (C) by TI. They come with the application note slaa089a
62 24 02 2E 02 31 40 20 02 2B D2 C0 43 EA FF 32 C2
63 F2 C0 32 00 00 00 B2 40 80 5A 20 01 F2 40 85 00
64 57 00 F2 40 80 00 56 00 E2 D3 21 00 E2 D3 22 00
65 E2 C3 26 00 E2 C2 2A 00 E2 C2 2E 00 B2 40 10 A5
66 2C 01 B2 40 00 A5 28 01 3B C0 3A 00 B0 12 D6 04
67 82 43 12 02 09 43 36 40 0A 02 37 42 B0 12 AC 05
68 C6 4C 00 00 16 53 17 83 F9 23 D2 92 0C 02 0D 02
69 28 20 55 42 0B 02 75 90 12 00 80 24 75 90 10 00
70 6D 24 B0 12 9C 04 55 42 0B 02 75 90 18 00 31 24
71 75 90 1E 00 B8 24 75 90 20 00 17 24 2B B2 11 24
72 75 90 16 00 22 24 75 90 14 00 B3 24 75 90 1A 00
73 18 24 75 90 1C 00 45 24 04 3C B0 12 36 05 BE 3F
74 21 53 B0 12 3C 05 BA 3F 03 43 B0 12 36 05 D2 42
75 0E 02 56 00 D2 42 0F 02 57 00 D2 42 10 02 16 02
76 AD 3F B0 12 36 05 10 42 0E 02 16 42 0E 02 15 43
77 07 3C 36 40 FE FF B2 40 06 A5 10 02 35 40 0C 00
78 B2 40 00 A5 2C 01 92 42 10 02 28 01 B6 43 00 00
79 92 B3 2C 01 FD 23 15 83 F3 23 36 90 FE FF CD 27
80 37 40 80 00 36 F0 80 FF 36 90 00 11 0E 28 07 57
81 36 F0 00 FF 36 90 00 12 08 28 07 57 36 F0 00 FE
82 04 3C 16 42 0E 02 17 42 10 02 35 43 75 96 03 20
83 17 83 FC 23 B2 3F 82 46 00 02 B3 3F 36 40 E0 FF
84 37 40 20 00 B0 12 AC 05 7C 96 01 24 2B D3 17 83
85 F9 23 2B C2 B0 12 9C 04 2B D2 9F 3F 16 42 0E 02
86 17 42 10 02 2B B2 38 24 3B D0 10 00 B0 12 AC 05
87 36 90 00 10 06 2C 36 90 00 01 09 2C C6 4C 00 00
88 25 3C B2 40 00 A5 2C 01 B2 40 40 A5 28 01 16 B3
89 03 20 C2 4C 14 02 1A 3C C2 4C 15 02 86 9A FD FF
90 08 24 2B D3 3B B0 20 00 04 20 3B D0 20 00 82 46
91 00 02 36 90 01 02 04 28 3B D2 3B B0 10 00 02 24
92 3B C0 32 00 1A 42 14 02 86 4A FF FF 16 53 17 83
93 CD 23 B0 12 9C 04 61 3F B0 12 AC 05 17 83 FC 23
94 B0 12 9C 04 5E 3F B2 40 F0 0F 0E 02 B2 40 10 00
95 10 02 B2 40 80 00 0A 02 D2 42 10 02 0C 02 D2 42
96 10 02 0D 02 82 43 12 02 09 43 36 40 0A 02 27 42
97 7C 46 B0 12 40 05 17 83 FB 23 16 42 0E 02 17 42
98 10 02 36 90 00 01 0A 28 B2 46 14 02 5C 42 14 02
99 B0 12 40 05 17 83 5C 42 15 02 01 3C 7C 46 B0 12
100 40 05 17 83 EE 23 B2 E3 12 02 5C 42 12 02 B0 12
101 40 05 5C 42 13 02 B0 12 40 05 E0 3E 18 42 12 02
102 B0 12 AC 05 C2 4C 12 02 B0 12 AC 05 C2 4C 13 02
103 38 E3 3B B2 0A 24 86 9A FE FF 07 24 3B B0 20 00
104 04 20 16 53 82 46 00 02 2B D3 18 92 12 02 08 23
105 2B B3 06 23 30 41 E2 B2 28 00 FD 27 E2 B2 28 00
106 FD 23 B2 40 24 02 60 01 E2 B2 28 00 FD 27 15 42
107 70 01 05 11 05 11 05 11 82 45 02 02 05 11 82 45
108 04 02 B2 80 1E 00 04 02 57 42 16 02 37 80 03 00
109 05 11 05 11 17 53 FD 23 35 50 40 A5 82 45 2A 01
110 35 42 B2 40 24 02 60 01 92 92 70 01 02 02 FC 2F
111 15 83 F7 23 09 43 7C 40 90 00 02 3C 7C 40 A0 00
112 C2 43 07 02 C9 EC 12 02 19 E3 1B C3 55 42 07 02
113 55 45 56 05 00 55 0C 2E 2E 2E 2E 2E 2E 2E 2E 1A
114 34 34 92 42 70 01 72 01 B2 50 0C 00 72 01 07 3C
115 1B B3 0B 20 82 43 62 01 92 B3 62 01 FD 27 E2 C3
116 21 00 0A 3C 4C 11 F6 2B 1B E3 82 43 62 01 92 B3
117 62 01 FD 27 E2 D3 21 00 92 52 02 02 72 01 D2 53
118 07 02 F0 90 0C 00 61 FC D1 23 30 41 C2 43 09 02
119 1B C3 55 42 09 02 55 45 BC 05 00 55 0C 56 56 56
120 56 56 56 56 56 36 76 00 E2 B2 28 00 FD 23 92 42
121 70 01 72 01 92 52 04 02 72 01 82 43 62 01 92 B3
122 62 01 FD 27 E2 B2 28 00 1E 28 2B D3 1C 3C 4C 10
123 1A 3C 82 43 62 01 92 B3 62 01 FD 27 E2 B2 28 00
124 01 28 1B E3 1B B3 01 24 2B D3 C9 EC 12 02 19 E3
125 0A 3C 82 43 62 01 92 B3 62 01 FD 27 E2 B2 28 00
126 E6 2B 4C 10 1B E3 92 52 02 02 72 01 D2 53 09 02
127 C0 3F 82 43 62 01 92 B3 62 01 FD 27 E2 B2 28 00
133 24 02 2E 02 31 40 20 02 2B D2 C0 43 EA FF 32 C2
134 F2 C0 32 00 00 00 B2 40 80 5A 20 01 32 D0 40 00
135 C2 43 50 00 F2 40 98 00 51 00 F2 C0 80 00 52 00
136 D2 D3 21 00 D2 D3 22 00 D2 C3 26 00 E2 C3 22 00
137 E2 C3 26 00 B2 40 10 A5 2C 01 B2 40 00 A5 28 01
138 3B C0 3A 00 B0 12 DE 04 82 43 12 02 09 43 36 40
139 0A 02 37 42 B0 12 B4 05 C6 4C 00 00 16 53 17 83
140 F9 23 D2 92 0C 02 0D 02 28 20 55 42 0B 02 75 90
141 12 00 80 24 75 90 10 00 6D 24 B0 12 A4 04 55 42
142 0B 02 75 90 18 00 31 24 75 90 1E 00 B8 24 75 90
143 20 00 17 24 2B B2 11 24 75 90 16 00 22 24 75 90
144 14 00 B3 24 75 90 1A 00 18 24 75 90 1C 00 45 24
145 04 3C B0 12 3E 05 BE 3F 21 53 B0 12 44 05 BA 3F
146 03 43 B0 12 3E 05 D2 42 0E 02 50 00 D2 42 0F 02
147 51 00 D2 42 10 02 16 02 AD 3F B0 12 3E 05 10 42
148 0E 02 16 42 0E 02 15 43 07 3C 36 40 FE FF B2 40
149 06 A5 10 02 35 40 0C 00 B2 40 00 A5 2C 01 92 42
150 10 02 28 01 B6 43 00 00 92 B3 2C 01 FD 23 15 83
151 F3 23 36 90 FE FF CD 27 37 40 80 00 36 F0 80 FF
152 36 90 00 11 0E 28 07 57 36 F0 00 FF 36 90 00 12
153 08 28 07 57 36 F0 00 FE 04 3C 16 42 0E 02 17 42
154 10 02 35 43 75 96 03 20 17 83 FC 23 B2 3F 82 46
155 00 02 B3 3F 36 40 E0 FF 37 40 20 00 B0 12 B4 05
156 7C 96 01 24 2B D3 17 83 F9 23 2B C2 B0 12 A4 04
157 2B D2 9F 3F 16 42 0E 02 17 42 10 02 2B B2 38 24
158 3B D0 10 00 B0 12 B4 05 36 90 00 10 06 2C 36 90
159 00 01 09 2C C6 4C 00 00 25 3C B2 40 00 A5 2C 01
160 B2 40 40 A5 28 01 16 B3 03 20 C2 4C 14 02 1A 3C
161 C2 4C 15 02 86 9A FD FF 08 24 2B D3 3B B0 20 00
162 04 20 3B D0 20 00 82 46 00 02 36 90 01 02 04 28
163 3B D2 3B B0 10 00 02 24 3B C0 32 00 1A 42 14 02
164 86 4A FF FF 16 53 17 83 CD 23 B0 12 A4 04 61 3F
165 B0 12 B4 05 17 83 FC 23 B0 12 A4 04 5E 3F B2 40
166 F0 0F 0E 02 B2 40 10 00 10 02 B2 40 80 00 0A 02
167 D2 42 10 02 0C 02 D2 42 10 02 0D 02 82 43 12 02
168 09 43 36 40 0A 02 27 42 7C 46 B0 12 48 05 17 83
169 FB 23 16 42 0E 02 17 42 10 02 36 90 00 01 0A 28
170 B2 46 14 02 5C 42 14 02 B0 12 48 05 17 83 5C 42
171 15 02 01 3C 7C 46 B0 12 48 05 17 83 EE 23 B2 E3
172 12 02 5C 42 12 02 B0 12 48 05 5C 42 13 02 B0 12
173 48 05 E0 3E 18 42 12 02 B0 12 B4 05 C2 4C 12 02
174 B0 12 B4 05 C2 4C 13 02 38 E3 3B B2 0A 24 86 9A
175 FE FF 07 24 3B B0 20 00 04 20 16 53 82 46 00 02
176 2B D3 18 92 12 02 08 23 2B B3 06 23 30 41 E2 B3
177 20 00 FD 27 E2 B3 20 00 FD 23 B2 40 24 02 60 01
178 E2 B3 20 00 FD 27 15 42 70 01 05 11 05 11 05 11
179 82 45 02 02 05 11 82 45 04 02 B2 80 1E 00 04 02
180 57 42 16 02 37 80 03 00 05 11 05 11 17 53 FD 23
181 35 50 40 A5 82 45 2A 01 35 42 B2 40 24 02 60 01
182 92 92 70 01 02 02 FC 2F 15 83 F7 23 09 43 7C 40
183 90 00 02 3C 7C 40 A0 00 C2 43 07 02 C9 EC 12 02
184 19 E3 1B C3 55 42 07 02 55 45 5E 05 00 55 0C 2E
185 2E 2E 2E 2E 2E 2E 2E 1A 34 34 92 42 70 01 72 01
186 B2 50 0C 00 72 01 07 3C 1B B3 0B 20 82 43 62 01
187 92 B3 62 01 FD 27 D2 C3 21 00 0A 3C 4C 11 F6 2B
188 1B E3 82 43 62 01 92 B3 62 01 FD 27 D2 D3 21 00
189 92 52 02 02 72 01 D2 53 07 02 F0 90 0C 00 59 FC
190 D1 23 30 41 C2 43 09 02 1B C3 55 42 09 02 55 45
191 C4 05 00 55 0C 56 56 56 56 56 56 56 56 36 76 00
192 E2 B3 20 00 FD 23 92 42 70 01 72 01 92 52 04 02
193 72 01 82 43 62 01 92 B3 62 01 FD 27 E2 B3 20 00
194 1E 28 2B D3 1C 3C 4C 10 1A 3C 82 43 62 01 92 B3
195 62 01 FD 27 E2 B3 20 00 01 28 1B E3 1B B3 01 24
196 2B D3 C9 EC 12 02 19 E3 0A 3C 82 43 62 01 92 B3
197 62 01 FD 27 E2 B3 20 00 E6 2B 4C 10 1B E3 92 52
198 02 02 72 01 D2 53 09 02 C0 3F 82 43 62 01 92 B3
199 62 01 FD 27 E2 B3 20 00 01 2C 2B D3 30 41
203 #cpu types for "change baudrate"
204 #use strings as ID so that they can be used in outputs too
212 0xf16c: F1x, #for GoodFET10 to '20
218 0xf26f: F2x, #for GoodFET20
219 0xf227: F2x, #for GoodFET30
223 FIRMWARE_BASEURL = "http://goodfet.sourceforge.net/dist/";
227 #'apimote': "apimote1", # .hex not uploaded yet
228 #'apimote1': "apimote1",
229 'facedancer10': "facedancer10",
230 'facedancer11': "facedancer11",
231 'facedancer20': "facedancer20",
232 'facedancer21': "facedancer21",
233 'goodfet11': "goodfet11",
234 'goodfet31': "goodfet31",
235 'goodfet41': "goodfet41",
236 'goodfet42': "goodfet42",
237 'goodthopter10': "goodthopter10",
238 'goodthopter11': "goodthopter11",
240 'telosbbt': "telosb",
245 class BSLException(Exception):
249 "lowlevel communication"
256 BSL_TXBLK = 0x12 #Transmit block to boot loader
257 BSL_RXBLK = 0x14 #Receive block from boot loader
258 BSL_ERASE = 0x16 #Erase one segment
259 BSL_MERAS = 0x18 #Erase complete FLASH memory
260 BSL_CHANGEBAUD = 0x20 #Change baudrate
261 BSL_LOADPC = 0x1A #Load PC and start execution
262 BSL_TXVERSION = 0x1E #Get BSL version
264 #Upper limit of address range that might be modified by
266 BSL_CRITICAL_ADDR = 0x0A00
275 QUERY_RESPONSE = 0x50
277 OPEN_CONNECTION = 0xC0
278 ACK_CONNECTION = 0x40
289 ERR_COM = "Unspecific error"
290 ERR_RX_NAK = "NAK received (wrong password?)"
291 #ERR_CMD_NOT_COMPLETED = "Command did not send ACK: indicates that it didn't complete correctly"
292 ERR_CMD_FAILED = "Command failed, is not defined or is not allowed"
293 ERR_BSL_SYNC = "Bootstrap loader synchronization error (maybe you need -P)"
294 ERR_FRAME_NUMBER = "Frame sequence number error."
298 def calcChecksum(self, data, length):
299 """Calculates a checksum of "data"."""
302 for i in range(length/2):
303 checksum = checksum ^ (ord(data[i*2]) | (ord(data[i*2+1]) << 8)) #xor-ing
304 return 0xffff & (checksum ^ 0xffff) #inverting
306 def __init__(self, aTimeout = None, aProlongFactor = None):
307 """init bsl object, don't connect yet"""
309 self.timeout = self.DEFAULT_TIMEOUT
311 self.timeout = aTimeout
312 if aProlongFactor is None:
313 self.prolongFactor = self.DEFAULT_PROLONG
315 self.prolongFactor = aProlongFactor
317 #flags for inverted use of control pins
318 #used for some hardware
325 self.protocolMode = self.MODE_BSL
326 self.BSLMemAccessWarning = 0 #Default: no warning.
329 def comInit(self, port):
330 """Tries to open the serial port given and
331 initialises the port and variables.
332 The timeout and the number of allowed errors is multiplied by
333 'aProlongFactor' after transmission of a command to give
334 plenty of time to the micro controller to finish the command.
335 Returns zero if the function is successful."""
336 if DEBUG > 1: sys.stderr.write("* comInit()\n")
341 # Startup-Baudrate: 9600,8,E,1, 1s timeout
342 self.serialport = serial.Serial(
345 parity = serial.PARITY_EVEN,
346 timeout = self.timeout
348 if DEBUG: sys.stderr.write("using serial port %r\n" % self.serialport.portstr)
351 self.SetRSTpin() #enable power
352 self.SetTESTpin() #enable power
353 self.serialport.flushInput()
354 self.serialport.flushOutput()
357 """Closes the used serial port.
358 This function must be called at the end of a program,
359 otherwise the serial port might not be released and can not be
360 used in other programs.
361 Returns zero if the function is successful."""
362 if DEBUG > 1: sys.stderr.write("* comDone()")
363 self.SetRSTpin(1) #disable power
364 self.SetTESTpin(0) #disable power
365 self.serialport.close()
367 def comRxHeader(self):
368 """receive header and split data"""
369 if DEBUG > 1: sys.stderr.write("* comRxHeader()\n")
371 hdr = self.serialport.read(1)
372 if not hdr: raise BSLException("Timeout")
373 rxHeader = ord(hdr) & 0xf0;
374 rxNum = ord(hdr) & 0x0f;
376 if self.protocolMode == self.MODE_BSL:
380 if DEBUG > 1: sys.stderr.write("* comRxHeader() OK\n")
381 return rxHeader, rxNum
383 def comRxFrame(self, rxNum):
384 if DEBUG > 1: sys.stderr.write("* comRxFrame()\n")
385 rxFrame = chr(self.DATA_FRAME | rxNum)
387 if DEBUG > 2: sys.stderr.write(" comRxFrame() header...\n")
388 rxFramedata = self.serialport.read(3)
389 if len(rxFramedata) != 3: raise BSLException("Timeout")
390 rxFrame = rxFrame + rxFramedata
392 if DEBUG > 3: sys.stderr.write(" comRxFrame() check header...\n")
393 if rxFrame[1] == chr(0) and rxFrame[2] == rxFrame[3]: #Add. header info. correct?
394 rxLengthCRC = ord(rxFrame[2]) + 2 #Add CRC-Bytes to length
395 if DEBUG > 2: sys.stderr.write(" comRxFrame() receiving data, size: %s\n" % rxLengthCRC)
397 rxFramedata = self.serialport.read(rxLengthCRC)
398 if len(rxFramedata) != rxLengthCRC: raise BSLException("Timeout")
399 rxFrame = rxFrame + rxFramedata
400 #Check received frame:
401 if DEBUG > 3: sys.stderr.write(" comRxFrame() crc check\n")
402 #rxLength+4: Length with header but w/o CRC:
403 checksum = self.calcChecksum(rxFrame, ord(rxFrame[2]) + 4)
404 if rxFrame[ord(rxFrame[2])+4] == chr(0xff & checksum) and \
405 rxFrame[ord(rxFrame[2])+5] == chr(0xff & (checksum >> 8)): #Checksum correct?
406 #Frame received correctly (=> send next frame)
407 if DEBUG > 2: sys.stderr.write("* comRxFrame() OK\n")
410 if DEBUG: sys.stderr.write(" comRxFrame() Checksum wrong\n")
412 if DEBUG: sys.stderr.write(" comRxFrame() Header corrupt %r" % rxFrame)
413 raise BSLException(self.ERR_COM) #Frame has errors!
415 def comTxHeader(self, txHeader):
417 if DEBUG > 1: sys.stderr.write("* txHeader()\n")
418 self.serialport.write(txHeader)
420 def comTxRx(self, cmd, dataOut, length):
421 """Sends the command cmd with the data given in dataOut to the
422 microcontroller and expects either an acknowledge or a frame
423 with result from the microcontroller. The results are stored
424 in dataIn (if not a NULL pointer is passed).
425 In this routine all the necessary protocol stuff is handled.
426 Returns zero if the function was successful."""
427 if DEBUG > 1: sys.stderr.write("* comTxRx()\n")
432 dataOut = list(dataOut) #convert to a list for simpler data fill in
433 #Transmitting part ----------------------------------------
434 #Prepare data for transmit
435 if (length % 2) != 0:
436 #/* Fill with one byte to have even number of bytes to send */
437 if self.protocolMode == self.MODE_BSL:
438 dataOut.append(0xFF) #fill with 0xFF
440 dataOut.append(0) #fill with zero
442 txFrame = "%c%c%c%c" % (self.DATA_FRAME | self.seqNo, cmd, len(dataOut), len(dataOut))
444 self.reqNo = (self.seqNo + 1) % self.MAX_FRAME_COUNT
446 txFrame = txFrame + string.join(dataOut,'')
447 checksum = self.calcChecksum(txFrame, length + 4)
448 txFrame = txFrame + chr(checksum & 0xff)
449 txFrame = txFrame + chr((checksum >> 8) & 0xff)
451 accessAddr = (0x0212 + (checksum^0xffff)) & 0xfffe #0x0212: Address of wCHKSUM
452 if self.BSLMemAccessWarning and accessAddr < self.BSL_CRITICAL_ADDR:
453 sys.stderr.write("WARNING: This command might change data at address %04x or %04x!\n" % (accessAddr, accessAddr + 1))
455 self.serialport.flushInput() #clear receiving queue
456 #TODO: Check after each transmitted character,
457 #TODO: if microcontroller did send a character (probably a NAK!).
459 self.serialport.write(c)
460 if DEBUG > 3: sys.stderr.write("\ttx %02x" % ord(c))
461 #if self.serialport.inWaiting(): break #abort when BSL replies, probably NAK
463 if DEBUG > 1: sys.stderr.write( " comTxRx() transmit OK\n")
465 #Receiving part -------------------------------------------
466 rxHeader, rxNum = self.comRxHeader() #receive header
467 if DEBUG > 1: sys.stderr.write(" comTxRx() rxHeader=0x%02x, rxNum=%d, seqNo=%d, reqNo=%s\n" % (rxHeader, rxNum, self.seqNo, self.reqNo))
468 if rxHeader == self.DATA_ACK: #acknowledge/OK
469 if DEBUG > 2: sys.stderr.write(" comTxRx() DATA_ACK\n")
470 if rxNum == self.reqNo:
471 self.seqNo = self.reqNo
472 if DEBUG > 2: sys.stderr.write("* comTxRx() DATA_ACK OK\n")
473 return #Acknowledge received correctly => next frame
474 raise BSLException(self.ERR_FRAME_NUMBER)
475 elif rxHeader == self.DATA_NAK: #not acknowledge/error
476 if DEBUG > 2: sys.stderr.write("* comTxRx() DATA_NAK\n")
477 raise BSLException(self.ERR_RX_NAK)
478 elif rxHeader == self.DATA_FRAME: #receive data
479 if DEBUG > 2: sys.stderr.write("* comTxRx() DATA_FRAME\n")
480 if rxNum == self.reqNo:
481 rxFrame = self.comRxFrame(rxNum)
483 raise BSLException(self.ERR_FRAME_NUMBER)
484 elif rxHeader == self.CMD_FAILED: #Frame ok, but command failed.
485 if DEBUG > 2: sys.stderr.write("* comTxRx() CMD_FAILED\n")
486 raise BSLException(self.ERR_CMD_FAILED)
488 raise BSLException("Unknown header 0x%02x\nAre you downloading to RAM into an old device that requires the patch? Try option -U" % rxHeader)
490 def SetDTR(self, level, invert):
491 """Controls DTR pin (0: GND; 1: VCC; unless inverted flag is set)"""
493 self.serialport.setDTR(not level)
495 self.serialport.setDTR(level)
499 def SetRTS(self, level, invert):
500 """Controls RTS pin (0: GND; 1: VCC; unless inverted flag is set)"""
502 self.serialport.setRTS(not level)
504 self.serialport.setRTS(level)
508 def SetRSTpin(self, level=1):
509 """Controls RST/NMI pin (0: GND; 1: VCC; unless inverted flag is set)"""
511 self.SetRTS(level, self.invertRST)
513 self.SetDTR(level, self.invertRST)
515 def SetTESTpin(self, level=1):
516 """Controls TEST pin (inverted on board: 0: VCC; 1: GND; unless inverted flag is set)"""
518 self.SetDTR(level, self.invertTEST)
520 self.SetRTS(level, self.invertTEST)
522 def telosSetSCL(self, level):
523 self.serialport.setRTS(not level)
525 def telosSetSDA(self, level):
526 self.serialport.setDTR(not level)
528 def telosI2CStart(self):
533 def telosI2CStop(self):
538 def telosI2CWriteBit(self, bit):
540 self.telosSetSDA(bit)
546 def telosI2CWriteByte(self, byte):
547 self.telosI2CWriteBit( byte & 0x80 );
548 self.telosI2CWriteBit( byte & 0x40 );
549 self.telosI2CWriteBit( byte & 0x20 );
550 self.telosI2CWriteBit( byte & 0x10 );
551 self.telosI2CWriteBit( byte & 0x08 );
552 self.telosI2CWriteBit( byte & 0x04 );
553 self.telosI2CWriteBit( byte & 0x02 );
554 self.telosI2CWriteBit( byte & 0x01 );
555 self.telosI2CWriteBit( 0 ); # "acknowledge"
557 def telosI2CWriteCmd(self, addr, cmdbyte):
559 self.telosI2CWriteByte( 0x90 | (addr << 1) )
560 self.telosI2CWriteByte( cmdbyte )
562 def writepicROM(self, address, data):
563 ''' Writes data to @address'''
564 for i in range(7,-1,-1):
565 self.picROMclock((address >> i) & 0x01)
568 for i in range(7,-1,-1):
569 s = ((data >> i) & 0x01)
572 r = not self.picROMclock(s, True)
574 r = not self.picROMclock(s)
575 recbuf = (recbuf << 1) + r
577 self.picROMclock(0, True)
579 #while not self.serial.getCTS():
584 def readpicROM(self, address):
585 ''' reads a byte from @address'''
586 for i in range(7,-1,-1):
587 self.picROMclock((address >> i) & 0x01)
591 for i in range(7,-1,-1):
592 r = self.picROMclock(0)
593 recbuf = (recbuf << 1) + r
598 def picROMclock(self, masterout, slow = False):
599 #print "setting masterout to "+str(masterout)
600 self.serialport.setRTS(masterout)
601 self.serialport.setDTR(1)
603 self.serialport.setDTR(0)
606 return self.serialport.getCTS()
608 def picROMfastclock(self, masterout):
609 #print "setting masterout to "+str(masterout)
610 self.serialport.setRTS(masterout)
611 self.serialport.setDTR(1)
612 self.serialport.setDTR(0)
614 return self.serialport.getCTS()
616 def bslResetZ1(self, invokeBSL=0):
618 Applies BSL entry sequence on RST/NMI and TEST/VPP pins
620 invokeBSL = 1: complete sequence
621 invokeBSL = 0: only RST/NMI pin accessed
623 By now only BSL mode is accessed
626 if DEBUG > 1: sys.stderr.write("* bslReset(invokeBSL=%s)\n" % invokeBSL)
628 #sys.stderr.write("in Z1 bsl reset...\n")
630 self.writepicROM(0xFF, 0xFF)
632 #sys.stderr.write("z1 bsl reset done...\n")
634 #sys.stderr.write("in Z1 reset...\n")
636 self.writepicROM(0xFF, 0xFE)
638 #sys.stderr.write("z1 reset done...\n")
640 def telosBReset(self,invokeBSL=0):
641 # "BSL entry sequence at dedicated JTAG pins"
642 # rst !s0: 0 0 0 0 1 1
643 # tck !s1: 1 0 1 0 0 1
646 # "BSL entry sequence at shared JTAG pins"
647 # rst !s0: 0 0 0 0 1 1
648 # tck !s1: 0 1 0 1 1 0
652 self.telosI2CWriteCmd(0,1)
653 self.telosI2CWriteCmd(0,3)
654 self.telosI2CWriteCmd(0,1)
655 self.telosI2CWriteCmd(0,3)
656 self.telosI2CWriteCmd(0,2)
657 self.telosI2CWriteCmd(0,0)
659 self.telosI2CWriteCmd(0,3)
660 self.telosI2CWriteCmd(0,2)
662 # This line was not defined inside the else: block, not sure where it
664 self.telosI2CWriteCmd(0,0)
665 time.sleep(0.250) #give MSP430's oscillator time to stabilize
666 self.serialport.flushInput() #clear buffers
668 def bslReset(self, invokeBSL=0):
669 """Applies BSL entry sequence on RST/NMI and TEST/VPP pins
671 invokeBSL = 1: complete sequence
672 invokeBSL = 0: only RST/NMI pin accessed
674 RST is inverted twice on boot loader hardware
675 TEST is inverted (only once)
676 Need positive voltage on DTR, RTS for power-supply of hardware"""
678 self.telosBReset(invokeBSL)
682 if DEBUG > 1: sys.stderr.write("* entering bsl with z1\n")
683 self.bslResetZ1(invokeBSL)
687 if DEBUG > 1: sys.stderr.write("* bslReset(invokeBSL=%s)\n" % invokeBSL)
688 self.SetRSTpin(1) #power suply
689 self.SetTESTpin(1) #power suply
690 time.sleep(0.250) #charge capacitor on boot loader hardware
696 self.SetRSTpin(0) #RST pin: GND
699 self.SetTESTpin(1) #TEST pin: GND
700 self.SetTESTpin(0) #TEST pin: Vcc
701 self.SetTESTpin(1) #TEST pin: GND
702 self.SetTESTpin(0) #TEST pin: Vcc
703 self.SetRSTpin (1) #RST pin: Vcc
704 self.SetTESTpin(1) #TEST pin: GND
706 self.SetRSTpin(1) #RST pin: Vcc
707 time.sleep(0.250) #give MSP430's oscillator time to stabilize
709 self.serialport.flushInput() #clear buffers
711 def bslSync(self,wait=0):
712 """Transmits Synchronization character and expects to receive Acknowledge character
713 if wait is 0 it must work the first time. otherwise if wait is 1
714 it is retried (forever).
716 loopcnt = 5 #Max. tries to get synchronization
718 if DEBUG > 1: sys.stderr.write("* bslSync(wait=%d)\n" % wait)
719 while wait or loopcnt:
720 loopcnt = loopcnt - 1 #count down tries
721 self.serialport.flushInput() #clear input, in case a prog is running
723 self.serialport.write(chr(self.BSL_SYNC)) #Send synchronization byte
724 c = self.serialport.read(1) #read answer
725 if c == chr(self.DATA_ACK): #ACk
726 if DEBUG > 1: sys.stderr.write(" bslSync() OK\n")
727 return #Sync. successful
731 sys.stderr.write(" bslSync() timeout, retry ...\n")
733 #nmi may have caused the first reset to be ignored, try again
738 sys.stderr.write(" bslSync() timeout, retry ...\n")
741 sys.stderr.write(" bslSync() timeout\n")
743 if DEBUG > 1: sys.stderr.write(" bslSync() failed (0x%02x), retry ...\n" % ord(c))
745 raise BSLException(self.ERR_BSL_SYNC) #Sync. failed
747 def bslTxRx(self, cmd, addr, length = 0, blkout = None, wait=0):
748 """Transmits a command (cmd) with its parameters:
749 start-address (addr), length (len) and additional
750 data (blkout) to boot loader.
751 wait specified if the bsl sync should be tried once or
753 Parameters return by boot loader are passed via blkin.
755 if DEBUG > 1: sys.stderr.write("* bslTxRx()\n")
757 if cmd == self.BSL_TXBLK:
758 #Align to even start address
760 addr = addr - 1 #Decrement address and
761 blkout = chr(0xFF) + blkOut #fill first byte of blkout with 0xFF
763 #Make sure that len is even
764 if (length % 2) != 0:
765 blkout = blkout + chr(0xFF) #Inc. len and fill last byte of blkout with 0xFF
768 elif cmd == self.BSL_RXBLK:
769 #Align to even start address
771 addr = addr - 1 #Decrement address but
772 length = length + 1 #request an additional byte
773 #Make sure that len is even
774 if (length % 2) != 0:
777 #if cmd == self.BSL_TXBLK or cmd == self.BSL_TXPWORD:
780 #Add necessary information data to frame
781 dataOut = struct.pack("<HH", addr, length)
783 if blkout: #Copy data out of blkout into frame
784 dataOut = dataOut + blkout
786 self.bslSync(wait) #synchronize BSL
787 rxFrame = self.comTxRx(cmd, dataOut, len(dataOut)) #Send frame
788 if rxFrame: #test answer
789 return rxFrame[4:] #return only data w/o [hdr,null,len,len]
795 """store a string with memory contents along with its startaddress"""
796 def __init__(self, startaddress = 0, data=None):
801 self.startaddress = startaddress
803 def __getitem__(self, index):
804 return self.data[index]
807 return len(self.data)
810 return "Segment(startaddress = 0x%04x, data=%r)" % (self.startaddress, self.data)
813 """represent memory contents. with functions to load files"""
814 def __init__(self, filename=None):
817 self.filename = filename
818 self.loadFile(filename)
820 def append(self, seg):
821 self.segments.append(seg)
823 def __getitem__(self, index):
824 return self.segments[index]
827 return len(self.segments)
829 def loadIHex(self, file):
830 """load data from a (opened) file in Intel-HEX format"""
834 lines = file.readlines()
836 if l[0] != ':': raise BSLException("File Format Error\n")
837 l = l.strip() #fix CR-LF issues...
838 length = int(l[1:3],16)
839 address = int(l[3:7],16)
840 type = int(l[7:9],16)
841 check = int(l[-2:],16)
843 if currentAddr != address:
845 self.segments.append( Segment(startAddr, string.join(segmentdata,'')) )
846 startAddr = currentAddr = address
848 for i in range(length):
849 segmentdata.append( chr(int(l[9+2*i:11+2*i],16)) )
850 currentAddr = length + currentAddr
851 elif type in (0x01, 0x02, 0x03, 0x04, 0x05):
854 sys.stderr.write("Ignored unknown field (type 0x%02x) in ihex file.\n" % type)
856 self.segments.append( Segment(startAddr, string.join(segmentdata,'')) )
858 def loadTIText(self, file):
859 """load data from a (opened) file in TI-Text format"""
863 #Convert data for MSP430, TXT-File is parsed line by line
869 if l[0] == 'q': break
870 elif l[0] == '@': #if @ => new address => send frame and set new addr.
871 #create a new segment
873 self.segments.append( Segment(startAddr, string.join(segmentdata,'')) )
874 startAddr = int(l[1:],16)
877 for i in string.split(l):
878 segmentdata.append(chr(int(i,16)))
880 self.segments.append( Segment(startAddr, string.join(segmentdata,'')) )
882 def loadELF(self, file):
883 """load data from a (opened) file in ELF object format.
884 File must be seekable"""
886 obj = elf.ELFObject()
888 if obj.e_type != elf.ELFObject.ET_EXEC:
889 raise Exception("No executable")
890 for section in obj.getSections():
892 sys.stderr.write("ELF section %s at 0x%04x %d bytes\n" % (section.name, section.lma, len(section.data)))
893 if len(section.data):
894 self.segments.append( Segment(section.lma, section.data) )
896 def loadString(self, startAddr=0, string=None):
897 """fill memory with the contents of a binary chunk of data."""
898 self.segments.append(Segment(startAddr, string));
900 def loadFile(self, filename):
901 """fill memory with the contents of a file. file type is determined from extension"""
902 #TODO: do a contents based detection
903 if filename[-4:].lower() == '.txt':
904 self.loadTIText(open(filename, "rb"))
905 elif filename[-4:].lower() in ('.a43', '.hex'):
906 self.loadIHex(open(filename, "rb"))
908 self.loadELF(open(filename, "rb"))
910 def getMemrange(self, fromadr, toadr):
911 """get a range of bytes from the memory. unavailable values are filled with 0xff."""
913 toadr = toadr + 1 #python indxes are excluding end, so include it
914 while fromadr < toadr:
915 #print "fromto: %04x %04x" % (fromadr, toadr)
916 for seg in self.segments:
918 segend = seg.startaddress + len(seg.data)
919 if seg.startaddress <= fromadr and fromadr < segend:
920 #print "startok 0x%04x %d" % (seg.startaddress, len(seg.data))
921 #print ("0x%04x "*3) % (segend, fromadr, toadr)
922 if toadr > segend: #not all data in segment
923 #print "out of segment"
924 catchlength = segend-fromadr
926 catchlength = toadr-fromadr
929 res = res + seg.data[fromadr-seg.startaddress : fromadr-seg.startaddress+catchlength]
930 fromadr = fromadr + catchlength #adjust start
931 if len(res) >= toadr-fromadr:
935 fromadr = fromadr + 1 #adjust start
937 #print "res: %r" % res
941 class BootStrapLoader(LowLevel):
942 """higher level Bootstrap Loader functions."""
944 ERR_VERIFY_FAILED = "Error: verification failed"
945 ERR_ERASE_CHECK_FAILED = "Error: erase check failed"
947 ACTION_PROGRAM = 0x01 #Mask: program data
948 ACTION_VERIFY = 0x02 #Mask: verify data
949 ACTION_ERASE_CHECK = 0x04 #Mask: erase check
951 #Max. bytes sent within one frame if parsing a TI TXT file.
952 #( >= 16 and == n*16 and <= MAX_DATA_BYTES!)
956 def __init__(self, *args, **kargs):
957 LowLevel.__init__(self, *args, **kargs)
959 self.meraseCycles = 1
960 self.patchRequired = 0
965 self.maxData = self.MAXDATA
970 data=self.uploadData(0x1000,256);
974 data = self.fetchinfo();
977 hex+=("%02x "%ord(c));
983 sys.stderr.write('Checking for info flash...')
985 data = self.fetchinfo();
988 if ord(c) is not 255:
992 sys.stderr.write(' Saved!\n')
994 self.info = Memory();
995 self.info.loadString(0x1000,data);
997 sys.stderr.write(' None.\n')
998 sys.stderr.write('Look at contrib/infos/README.txt for better performance.\n')
1001 def preparePatch(self):
1002 """prepare to download patch"""
1003 if DEBUG > 1: sys.stderr.write("* preparePatch()\n")
1005 if self.patchLoaded:
1006 #Load PC with 0x0220.
1007 #This will invoke the patched bootstrap loader subroutines.
1008 self.bslTxRx(self.BSL_LOADPC, #Command: Load PC
1009 0x0220) #Address to load into PC
1010 self.BSLMemAccessWarning = 0 #Error is removed within workaround code
1013 def postPatch(self):
1014 """setup after the patch is loaded"""
1015 if DEBUG > 1: sys.stderr.write("* postPatch()\n")
1016 if self.patchLoaded:
1017 self.BSLMemAccessWarning = 1 #Turn warning back on.
1020 def verifyBlk(self, addr, blkout, action):
1021 """verify memory against data or 0xff"""
1022 if DEBUG > 1: sys.stderr.write("* verifyBlk()\n")
1024 if action & self.ACTION_VERIFY or action & self.ACTION_ERASE_CHECK:
1025 if DEBUG: sys.stderr.write(" Check starting at 0x%04x, %d bytes ... \n" % (addr, len(blkout)))
1028 blkin = self.bslTxRx(self.BSL_RXBLK, addr, len(blkout))
1031 for i in range(len(blkout)):
1032 if action & self.ACTION_VERIFY:
1033 #Compare data in blkout and blkin
1034 if blkin[i] != blkout[i]:
1035 sys.stderr.write("Verification failed at 0x%04x (0x%02x, 0x%02x)\n" % (addr+i, ord(blkin[i]), ord(blkout[i])))
1037 raise BSLException(self.ERR_VERIFY_FAILED) #Verify failed!
1039 elif action & self.ACTION_ERASE_CHECK:
1040 #Compare data in blkin with erase pattern
1041 if blkin[i] != chr(0xff):
1042 sys.stderr.write("Erase Check failed at 0x%04x (0x%02x)\n" % (addr+i, ord(blkin[i])))
1044 raise BSLException(self.ERR_ERASE_CHECK_FAILED) #Erase Check failed!
1046 def readBlk(self,adr,len):
1047 """Read a block of memory."""
1048 blkin = self.bslTxRx(self.BSL_RXBLK, addr, len(blkout))
1050 def programBlk(self, addr, blkout, action):
1051 """program a memory block"""
1052 if DEBUG > 1: sys.stderr.write("* programBlk()\n")
1054 #Check, if specified range is erased
1055 self.verifyBlk(addr, blkout, action & self.ACTION_ERASE_CHECK)
1057 if action & self.ACTION_PROGRAM:
1058 if DEBUG: sys.stderr.write(" Program starting at 0x%04x, %i bytes ...\n" % (addr, len(blkout)))
1061 self.bslTxRx(self.BSL_TXBLK, addr, len(blkout), blkout)
1065 self.verifyBlk(addr, blkout, action & self.ACTION_VERIFY)
1068 #list of tuples or lists:
1069 #segements = [ (addr1, [d0,d1,d2,...]), (addr2, [e0,e1,e2,...])]
1070 def programData(self, segments, action):
1071 """programm or verify data"""
1072 if DEBUG > 1: sys.stderr.write("* programData()\n")
1073 for seg in segments:
1074 currentAddr = seg.startaddress
1076 while pstart<len(seg.data):
1077 length = self.MAXDATA
1078 if pstart+length > len(seg.data):
1079 length = len(seg.data) - pstart
1080 self.programBlk(currentAddr, seg.data[pstart:pstart+length], action)
1081 pstart = pstart + length
1082 currentAddr = currentAddr + length
1083 self.byteCtr = self.byteCtr + length #total sum
1085 def uploadData(self, startaddress, size, wait=0):
1086 """upload a datablock"""
1087 if DEBUG > 1: sys.stderr.write("* uploadData()\n")
1091 length = self.maxData
1092 if pstart+length > size:
1093 length = size - pstart
1094 data = data + self.bslTxRx(self.BSL_RXBLK,
1095 pstart+startaddress,
1097 wait=wait)[:-2] #cut away checksum
1098 pstart = pstart + length
1101 def txPasswd(self, passwd=None, wait=0):
1102 """transmit password, default if None is given."""
1103 if DEBUG > 1: sys.stderr.write("* txPassword(%r)\n" % passwd)
1105 #Send "standard" password to get access to protected functions.
1106 sys.stderr.write("Transmit default password ...\n")
1108 #Flash is completely erased, the contents of all Flash cells is 0xff
1109 passwd = chr(0xff)*32
1111 #sanity check of password
1112 if len(passwd) != 32:
1113 raise ValueError, "password has wrong length (%d)\n" % len(passwd)
1114 sys.stderr.write('Transmit password ...\n')
1117 self.bslTxRx(self.BSL_TXPWORD, #Command: Transmit Password
1118 0xffe0, #Address of interupt vectors
1119 0x0020, #Number of bytes
1121 wait=wait) #if wait is 1, try to sync forever
1124 #-----------------------------------------------------------------
1126 def actionMassErase(self):
1127 """Erase the flash memory completely (with mass erase command)"""
1128 sys.stderr.write("Mass Erase...\n")
1130 self.bslReset(1) #Invoke the boot loader.
1131 for i in range(self.meraseCycles):
1132 if i == 1: sys.stderr.write("Additional Mass Erase Cycles...\n")
1133 self.bslTxRx(self.BSL_MERAS, #Command: Mass Erase
1134 0xff00, #Any address within flash memory.
1135 0xa506) #Required setting for mass erase!
1136 self.passwd = None #No password file required!
1137 #print "Mass Erase complete"
1138 #Transmit password to get access to protected BSL functions.
1141 def actionStartBSL(self, usepatch=1, adjsp=1, replacementBSL=None, forceBSL=0, mayuseBSL=0, speed=None, bslreset=1):
1142 """start BSL, download patch if desired and needed, adjust SP if desired"""
1143 sys.stderr.write("Invoking BSL...\n")
1146 #for '30, invertTEST=0, else =1
1148 self.bslReset(1) #Invoke the boot loader.
1151 self.txPasswd(self.passwd) #transmit password
1153 #Read actual bootstrap loader version.
1154 #sys.stderr.write("Reading BSL version ...\n")
1155 blkin = self.bslTxRx(self.BSL_RXBLK, #Command: Read/Receive Block
1156 0x0ff0, #Start address
1157 16) #No. of bytes to read
1158 dev_id, bslVerHi, bslVerLo = struct.unpack(">H8xBB4x", blkin[:-2]) #cut away checksum and extract data
1162 if self.cpu is None: #cpy type forced?
1163 if deviceids.has_key(dev_id):
1164 self.cpu = deviceids[dev_id] #try to autodectect CPU type
1167 sys.stderr.write("Autodetect successful: %04x -> %s\n" % (dev_id, self.cpu))
1169 sys.stderr.write("Autodetect failed! Unkown ID: %04x. Trying to continue anyway.\n" % dev_id)
1170 self.cpu = F1x #assume something and try anyway..
1172 sys.stderr.write("Current bootstrap loader version: %x.%x (Device ID: %04x)\n" % (bslVerHi, bslVerLo, dev_id))
1174 self.bslVer = (bslVerHi << 8) | bslVerLo
1176 if self.bslVer <= 0x0110: #check if patch is needed
1177 self.BSLMemAccessWarning = 1
1179 self.BSLMemAccessWarning = 0 #Fixed in newer versions of BSL.
1181 if self.bslVer <= 0x0130 and adjsp:
1182 #only do this on BSL where it's needed to prevent
1183 #malfunction with F4xx devices/ newer ROM-BSLs
1185 #Execute function within bootstrap loader
1186 #to prepare stack pointer for the following patch.
1187 #This function will lock the protected functions again.
1188 sys.stderr.write("Adjust SP. Load PC with 0x0C22 ...\n")
1189 self.bslTxRx(self.BSL_LOADPC, #Command: Load PC
1190 0x0C22) #Address to load into PC
1191 #Re-send password to re-gain access to protected functions.
1192 self.txPasswd(self.passwd)
1194 #get internal BSL replacement if needed or forced by the user
1195 #required if speed is set but an old BSL is in the device
1196 #if a BSL is given by the user, that one is used and not the internal one
1197 if ((mayuseBSL and speed and self.bslVer < 0x0150) or forceBSL) and replacementBSL is None:
1198 replacementBSL = Memory() #File to program
1201 sys.stderr.write("Using built in BSL replacement for F4x devices\n")
1203 replacementBSL.loadTIText(cStringIO.StringIO(F4X_BSL)) #parse embedded BSL
1206 sys.stderr.write("Using built in BSL replacement for F1x devices\n")
1208 replacementBSL.loadTIText(cStringIO.StringIO(F1X_BSL)) #parse embedded BSL
1210 #now download the new BSL, if allowed and needed (version lower than the
1211 #the replacement) or forced
1212 if replacementBSL is not None:
1213 self.actionDownloadBSL(replacementBSL)
1215 #debug message with the real BSL version in use (may have changed after replacement BSL)
1217 sys.stderr.write("Current bootstrap loader version: 0x%04x\n" % (self.bslVer,))
1220 #now apply workarounds or patches if BSL in use requires that
1221 if self.bslVer <= 0x0110: #check if patch is needed
1222 if usepatch: #test if patch is desired
1223 sys.stderr.write("Patch for flash programming required!\n")
1224 self.patchRequired = 1
1226 sys.stderr.write("Load and verify patch ...\n")
1228 #Programming and verification is done in one pass.
1229 #The patch file is only read and parsed once.
1230 segments = Memory() #data to program
1231 segments.loadTIText(cStringIO.StringIO(PATCH)) #parse embedded patch
1233 self.programData(segments, self.ACTION_PROGRAM | self.ACTION_VERIFY)
1234 self.patchLoaded = 1
1237 sys.stderr.write("Device needs patch, but not applied (usepatch is false).\n") #message if not patched
1239 #should the baudrate be changed?
1240 if speed is not None:
1241 self.actionChangeBaudrate(speed) #change baudrate
1243 def actionDownloadBSL(self, bslsegments):
1244 sys.stderr.write("Load new BSL into RAM...\n")
1246 self.programData(bslsegments, self.ACTION_PROGRAM)
1247 sys.stderr.write("Verify new BSL...\n")
1249 self.programData(bslsegments, self.ACTION_VERIFY) #File to verify
1251 #Read startvector of bootstrap loader
1252 #blkin = self.bslTxRx(self.BSL_RXBLK, 0x0300, 2)
1253 #blkin = self.bslTxRx(self.BSL_RXBLK, 0x0220, 2)
1254 blkin = self.bslTxRx(self.BSL_RXBLK, bslsegments[0].startaddress, 2)
1255 startaddr = struct.unpack("<H", blkin[:2])[0]
1257 sys.stderr.write("Starting new BSL at 0x%04x...\n" % startaddr)
1259 self.bslTxRx(self.BSL_LOADPC, #Command: Load PC
1260 startaddr) #Address to load into PC
1262 #BSL-Bugs should be fixed within "new" BSL
1263 self.BSLMemAccessWarning = 0
1264 self.patchRequired = 0
1265 self.patchLoaded = 0
1267 #Re-send password to re-gain access to protected functions.
1268 self.txPasswd(self.passwd)
1270 #update version info
1271 #verison only valid for the internal ones, but it also makes sure
1272 #that the patches are not applied if the user d/ls one
1273 self.bslVer = 0x0150
1275 def actionEraseCheck(self):
1276 """check the erasure of required flash cells."""
1277 sys.stderr.write("Erase Check by file ...\n")
1279 if self.data is not None:
1280 self.programData(self.data, self.ACTION_ERASE_CHECK)
1282 raise BSLException, "cannot do erase check against data with not knowing the actual data"
1284 def actionProgram(self):
1285 """program data into flash memory."""
1286 if self.data is not None:
1287 sys.stderr.write("Program ...\n")
1289 self.programData(self.data, self.ACTION_PROGRAM)
1290 sys.stderr.write("%i bytes programmed.\n" % self.byteCtr)
1293 raise BSLException, "programming without data not possible"
1295 def prepareFromweb(self):
1296 """Grab GoodFET firmware from the web."""
1297 url="%s%s.hex" % (FIRMWARE_BASEURL, self.board);
1298 print "Grabbing %s firmware from %s" % (self.board, url);
1299 fn="/tmp/.%s.hex" % self.board
1301 subprocess.call(['curl', '-sS', url, '-o', fn])
1303 print "Failed to run curl, trying wget"
1305 subprocess.call(['wget', '-nv', url, '-O', fn])
1307 print "Failed to fetch firmware. Maybe you need to install curl or wget?"
1310 def actionFromweb(self):
1311 """Flash the GoodFET firmware which has been downloaded in an earlier step."""
1312 fn="/tmp/.%s.hex" % self.board
1315 sys.stderr.write("Program ...\n")
1317 self.programData(fw, self.ACTION_PROGRAM | self.ACTION_VERIFY)
1318 sys.stderr.write("%i bytes programmed.\n" % self.byteCtr)
1321 def actionVerify(self):
1322 """Verify programmed data"""
1323 if self.data is not None:
1324 sys.stderr.write("Verify ...\n")
1326 self.programData(self.data, self.ACTION_VERIFY)
1328 raise BSLException, "verify without data not possible"
1330 def actionReset(self):
1331 """perform a reset, start user programm"""
1332 sys.stderr.write("Reset device ...\n")
1334 self.bslReset(0) #only reset
1336 def actionRun(self, address=0x220):
1337 """start program at specified address"""
1338 sys.stderr.write("Load PC with 0x%04x ...\n" % address)
1340 self.bslTxRx(self.BSL_LOADPC, #Command: Load PC
1341 address) #Address to load into PC
1343 #table with values from slaa089a.pdf
1346 9600:[0x8580, 0x0000],
1347 19200:[0x86e0, 0x0001],
1348 38400:[0x87e0, 0x0002],
1351 9600:[0x8580, 0x0000],
1352 19200:[0x8B00, 0x0001],
1353 38400:[0x8C80, 0x0002],
1356 9600:[0x9800, 0x0000],
1357 19200:[0xb000, 0x0001],
1358 38400:[0xc800, 0x0002],
1361 def actionChangeBaudrate(self, baudrate=9600):
1362 """change baudrate. first the command is sent, then the comm
1363 port is reprogrammed. only possible with newer MSP430-BSL versions.
1364 (ROM >=1.6, downloadable >=1.5)"""
1366 baudconfigs = self.bauratetable[self.cpu]
1368 raise ValueError, "unknown CPU type %s, can't switch baudrate" % self.cpu
1370 a,l = baudconfigs[baudrate]
1372 raise ValueError, "baudrate not valid. valid values are %r" % baudconfigs.keys()
1374 sys.stderr.write("Changing baudrate to %d ...\n" % baudrate)
1376 self.bslTxRx(self.BSL_CHANGEBAUD, #Command: change baudrate
1377 a, l) #args are coded in adr and len
1378 time.sleep(0.010) #recomended delay
1379 self.serialport.setBaudrate(baudrate)
1381 def actionReadBSLVersion(self):
1382 """informational output of BSL version number.
1383 (newer MSP430-BSLs only)"""
1384 ans = self.bslTxRx(self.BSL_TXVERSION, 0) #Command: receive version info
1385 #the following values are in big endian style!!!
1386 family_type, bsl_version = struct.unpack(">H8xH4x", ans[:-2]) #cut away checksum and extract data
1387 print "Device Type: 0x%04x\nBSL version: 0x%04x\n" % (family_type, bsl_version)
1391 """print some help message"""
1392 sys.stderr.write("""
1393 USAGE: %s [options] [file]
1396 If "-" is specified as file the data is read from the stdinput.
1397 A file ending with ".txt" is considered to be in TIText format,
1398 '.a43' and '.hex' as IntelHex and all other filenames are
1399 considered as ELF files.
1402 -h, --help Show this help screen.
1403 -c, --comport=port Specify the communication port to be used.
1408 -P, --password=file Specify a file with the interrupt vectors that
1409 are used as password. This can be any file that
1410 has previously been used to program the device.
1411 (e.g. -P INT_VECT.TXT or -P goodfet.hex).
1412 -f, --framesize=num Max. number of data bytes within one transmitted
1413 frame (16 to 240 in steps of 16) (e.g. -f 240).
1414 -m, --erasecycles=num Number of mass erase cycles (default is 1). Some
1415 old F149 devices need additional erase cycles.
1416 On newer devices it is no longer needed. (e.g. for
1418 -U, --unpatched Do not download the BSL patch, even when it is
1419 needed. This is used when a program is downloaded
1420 into RAM and executed from there (and where flash
1421 programming is not needed.)
1422 -D, --debug Increase level of debug messages. This won't be
1423 very useful for the average user...
1424 -I, --intelhex Force fileformat to IntelHex
1425 -T, --titext Force fileformat to be TIText
1426 -N, --notimeout Don't use timeout on serial port (use with care)
1427 -B, --bsl=bsl.txt Load and use new BSL from the TI Text file
1428 -S, --speed=baud Reconfigure speed, only possible with newer
1429 MSP403-BSL versions (>1.5, read slaa089a.pdf for
1430 details). If the --bsl option is not used, an
1431 internal BSL replacement will be loaded.
1432 Needs a target with at least 2kB RAM!
1433 Possible values are 9600, 19200, 38400
1435 -1, --f1x Specify CPU family, in case autodetect fails
1436 -2, --f2x Specify CPU family, in case autodetect fails
1437 -4, --f4x Specify CPU family, in case autodetect fails
1438 --F1x and --f2x are only needed when the "change
1439 baudrate" feature is used and the autodetect feature
1440 fails. If the device ID that is uploaded is known, it
1441 has precedence to the command line option.
1442 --invert-reset Invert signal on RST pin (used for some BSL hardware)
1443 --invert-test Invert signal on TEST/TCK pin (used for some BSL
1445 --swap-reset-test Swap the RST and TEST pins (used for some BSL hardware)
1446 --telos-latch Special twiddle in BSL reset for Telos hardware
1447 --telos-i2c DTR/RTS map via an I2C switch to TCK/RST in Telos Rev.B
1448 --telos Implies options --invert-reset, --invert-test,
1449 --swap-reset-test, and --telos-latch
1450 --telosb Implies options --swap-reset-test, --telos-i2c,
1451 --no-BSL-download, and --speed=38400
1452 --apimote Implies --swap-reset-test
1456 --goodthopter Same as GF30.
1457 --tmote Identical operation to --telosb
1459 --no-BSL-download Do not download replacement BSL (disable automatic)
1460 --force-BSL-download Download replacement BSL even if not needed (the one
1461 in the device would have the required features)
1462 --slow Add delays when operating the conrol pins. Useful if
1463 the pins/circuit has high capacitance.
1464 --dumpinfo Print the info flash timing data so you can save a copy
1465 for later. You must provide -P if flash is not empty.
1467 Program Flow Specifiers:
1468 -e, --masserase Mass Erase (clear all flash memory)
1469 -E, --erasecheck Erase Check by file
1470 -p, --program Program file
1471 -v, --verify Verify by file
1473 The order of the above options matters! The table is ordered by normal
1474 execution order. For the options "Epv" a file must be specified.
1475 Program flow specifiers default to "pvr" if a file is given.
1476 Don't forget to specify "e" or "eE" when programming flash!
1479 -u, --upload=addr Upload a datablock (see also: -s).
1480 -s, --size=num Size of the data block do upload. (Default is 2)
1481 -x, --hex Show a hexadecimal display of the uploaded data.
1483 -b, --bin Get binary uploaded data. This can be used
1484 to redirect the output into a file.
1487 -g, --go=address Start programm execution at specified address.
1488 This implies option --wait.
1489 -r, --reset Reset connected MSP430. Starts application.
1490 This is a normal device reset and will start
1491 the programm that is specified in the reset
1492 vector. (see also -g)
1493 -w, --wait Wait for <ENTER> before closing serial port.
1495 If it says "NAK received" it's probably because you specified no or a
1497 """ % (sys.argv[0], VERSION))
1499 #add some arguments to a function, but don't call it yet, instead return
1500 #a wrapper object for later invocation
1502 """create a callable with some arguments specified in advance"""
1503 def __init__(self, fun, *args, **kwargs):
1505 self.pending = args[:]
1506 self.kwargs = kwargs.copy()
1508 def __call__(self, *args, **kwargs):
1509 if kwargs and self.kwargs:
1510 kw = self.kwargs.copy()
1513 kw = kwargs or self.kwargs
1514 return apply(self.fun, self.pending + args, kw)
1517 #first try if it a function
1519 return "curry(%s, %r, %r)" % (self.fun.func_name, self.pending, self.kwargs)
1520 except AttributeError:
1521 #fallback for callable classes
1522 return "curry(%s, %r, %r)" % (self.fun, self.pending, self.kwargs)
1524 def hexify(line, bytes, width=16):
1525 return '%04x %s%s %s' % (
1527 ('%02x '*len(bytes)) % tuple(bytes),
1528 ' '* (width-len(bytes)),
1529 ('%c'*len(bytes)) % tuple(map(lambda x: (x>=32 and x<127) and x or ord('.'), bytes))
1539 comPort = None #Default setting.
1543 wait = 0 #wait at the end
1545 bsl = BootStrapLoader()
1559 bsl.invertTEST = itest
1562 opts, args = getopt.getopt(sys.argv[1:],
1563 "hc:P:wf:m:eEpvrg:UDudsxbITNB:S:V14",
1564 ["help", "comport=", "password=", "wait", "framesize=",
1565 "erasecycles=", "masserase", "erasecheck", "program",
1566 "verify", "reset", "go=", "unpatched", "debug",
1567 "upload=", "download=", "size=", "hex", "bin",
1568 "intelhex", "titext", "notimeout", "bsl=", "speed=",
1569 "bslversion", "f1x", "f2x", "f4x", "invert-reset", "invert-test",
1570 "swap-reset-test", "telos-latch", "telos-i2c", "telos", "telosb",
1571 "tmote","no-BSL-download", "force-BSL-download", "slow",
1572 "dumpivt", "dumpinfo", "fromweb",
1573 "goodfet40", "goodfet30", "goodthopter", "goodfet20", "goodfet10",
1575 "nhbadge", "nhbadgeb", "goodfet"
1578 except getopt.GetoptError:
1579 # print help information and exit:
1584 if o in ("-h", "--help"):
1587 elif o in ("-c", "--comport"):
1589 comPort = int(a) #try to convert decimal
1591 comPort = a #take the string and let serial driver decide
1592 elif o in ("-P", "--password"):
1593 #extract password from file
1594 bsl.passwd = Memory(a).getMemrange(0xffe0, 0xffff)
1595 elif o in ("-w", "--wait"):
1597 elif o in ("--dumpivt"):
1599 elif o in ("--dumpinfo"):
1601 elif o in ("-f", "--framesize"):
1603 maxData = int(a) #try to convert decimal
1605 sys.stderr.write("framesize must be a valid number\n")
1607 #Make sure that conditions for maxData are met:
1608 #( >= 16 and == n*16 and <= MAX_DATA_BYTES!)
1609 if maxData > BootStrapLoader.MAX_DATA_BYTES:
1610 maxData = BootStrapLoader.MAX_DATA_BYTES
1613 bsl.maxData = maxData - (maxData % 16)
1614 sys.stderr.write( "Max. number of data bytes within one frame set to %i.\n" % maxData)
1615 elif o in ("-m", "--erasecycles"):
1617 meraseCycles = int(a) #try to convert decimal
1619 sys.stderr.write("erasecycles must be a valid number\n")
1621 #sanity check of value
1622 if meraseCycles < 1:
1623 sys.stderr.write("erasecycles must be a positive number\n")
1625 if meraseCycles > 20:
1626 sys.stderr.write("warning: erasecycles set to a large number (>20): %d\n" % meraseCycles)
1627 sys.stderr.write( "Number of mass erase cycles set to %i.\n" % meraseCycles)
1628 bsl.meraseCycles = meraseCycles
1629 elif o in ("-e", "--masserase"):
1630 deviceinit.append(bsl.actionMassErase) #Erase Flash
1631 elif o in ("-E", "--erasecheck"):
1632 deviceinit.append(bsl.actionEraseCheck) #Erase Check (by file)
1633 elif o in ("-p", "--program"):
1634 todo.append(bsl.actionProgram) #Program file
1635 elif o in ("--fromweb"):
1636 deviceinit.append(bsl.prepareFromweb) #Download firmware
1637 deviceinit.append(bsl.actionMassErase) #Erase Flash
1638 todo.append(bsl.actionFromweb) #Program GoodFET code
1639 elif o in ("-v", "--verify"):
1640 todo.append(bsl.actionVerify) #Verify file
1641 elif o in ("-r", "--reset"):
1643 elif o in ("-g", "--go"):
1645 goaddr = int(a) #try to convert decimal
1648 goaddr = int(a[2:],16) #try to convert hex
1650 sys.stderr.write("go address must be a valid number\n")
1653 elif o in ("-U", "--unpatched"):
1655 elif o in ("-D", "--debug"):
1657 elif o in ("-u", "--upload"):
1659 startaddr = int(a) #try to convert decimal
1662 startaddr = int(a,16) #try to convert hex
1664 sys.stderr.write("upload address must be a valid number\n")
1666 elif o in ("-s", "--size"):
1673 sys.stderr.write("size must be a valid number\n")
1675 elif o in ("-x", "--hex"):
1677 elif o in ("-b", "--bin"):
1679 elif o in ("-I", "--intelhex"):
1681 elif o in ("-T", "--titext"):
1683 elif o in ("-N", "--notimeout"):
1685 elif o in ("-B", "--bsl"):
1686 bslrepl = Memory() #File to program
1688 elif o in ("-V", "--bslversion"):
1689 todo.append(bsl.actionReadBSLVersion) #load replacement BSL as first item
1690 elif o in ("-S", "--speed"):
1692 speed = int(a) #try to convert decimal
1694 sys.stderr.write("speed must be decimal number\n")
1696 elif o in ("-1", "--f1x"):
1698 elif o in ("-2", "--f2x"):
1700 elif o in ("-4", "--f4x"):
1702 elif o in ("--invert-reset", ):
1704 elif o in ("--invert-test", ):
1706 elif o in ("--swap-reset-test", ):
1708 elif o in ("--telos-latch", ):
1710 elif o in ("--telos-i2c", ):
1712 elif o in ("--telos", ):
1717 elif o in ("--goodfet10", ):
1720 elif o in ("--goodfet20", ):
1723 elif o in ("--goodfet30", "--goodfet31", "--goodthopter" ):
1726 elif o in ("--goodfet40", ):
1729 elif o in ("--goodfet", ):
1732 elif o in ("--apimote",):
1733 bsl.swapRSTTEST = 1;
1734 elif o in ("--nhbadge", "--nhbadgeb" ):
1737 elif o in ("--telosb", ):
1742 elif o in ("--tmote", ):
1747 elif o in ("--z1", ):
1750 elif o in ("--no-BSL-download", ):
1752 elif o in ("--force-BSL-download", ):
1754 elif o in ("--slow", ):
1758 sys.stderr.write("Use -h for help\n");
1759 sys.stderr.write("Use --fromweb to upgrade a GoodFET.\n")
1760 elif len(args) == 1: #a filename is given
1761 if not todo: #if there are no actions yet
1762 todo.extend([ #add some useful actions...
1767 else: #number of args is wrong
1771 if DEBUG: #debug infos
1772 sys.stderr.write("Debug level set to %d\n" % DEBUG)
1773 sys.stderr.write("Python version: %s\n" % sys.version)
1775 #sanity check of options
1776 if notimeout and goaddr is not None and startaddr is not None:
1777 sys.stderr.write("Option --notimeout can not be used together with both --upload and --go\n")
1781 sys.stderr.write("Warning: option --notimeout can cause improper function in some cases!\n")
1784 if goaddr and reset:
1785 sys.stderr.write("Warning: option --reset ignored as --go is specified!\n")
1788 if startaddr and reset:
1789 sys.stderr.write("Warning: option --reset ignored as --upload is specified!\n")
1793 if os.environ.get("board")==None:
1795 print "Board not specified. Defaulting to goodfet41.";
1796 raw_input("Press Ctrl+C to cancel, or Enter to continue.");
1802 bsl.board=BOARDS[os.environ.get("board").lower()];
1806 print "Unknown board specified. Try goodfet41, facedancer11, or similar.";
1809 if bsl.board=='telosb':
1815 if bsl.board=='apimote':
1816 bsl.swapRSTTEST = 1;
1819 if comPort is None and os.environ.get("GOODFET")!=None:
1820 glob_list = glob.glob(os.environ.get("GOODFET"));
1821 if len(glob_list) > 0:
1822 comPort = glob_list[0];
1824 glob_list = glob.glob("/dev/tty.usbserial*");
1825 if len(glob_list) > 0:
1826 comPort = glob_list[0];
1828 glob_list = glob.glob("/dev/ttyUSB*");
1829 if len(glob_list) > 0:
1830 comPort = glob_list[0];
1832 from scanwin32 import winScan;
1834 for order,comport,desc,hwid in sorted(scan.comports()):
1836 if hwid.index('FTDI')==0:
1838 #print "Using FTDI port %s" % port
1842 sys.stderr.write("MSP430 Bootstrap Loader Version: %s\n" % VERSION)
1846 #prepare data to download
1847 bsl.data = Memory() #prepare downloaded data
1848 if filetype is not None: #if the filetype is given...
1849 if filename is None:
1850 raise ValueError("no filename but filetype specified")
1851 if filename == '-': #get data from stdin
1854 file = open(filename, "rb") #or from a file
1855 if filetype == 0: #select load function
1856 bsl.data.loadIHex(file) #intel hex
1858 bsl.data.loadTIText(file) #TI's format
1860 raise ValueError("illegal filetype specified")
1861 else: #no filetype given...
1862 if filename == '-': #for stdin:
1863 bsl.data.loadIHex(sys.stdin) #assume intel hex
1865 bsl.data.loadFile(filename) #autodetect otherwise
1867 if DEBUG > 3: sys.stderr.write("File: %r" % filename)
1869 bsl.comInit(comPort) #init port
1871 if bsl.actionMassErase in deviceinit:
1872 bsl.actionStartBSL()
1875 #initialization list
1876 if deviceinit: #erase and erase check
1877 if DEBUG: sys.stderr.write("Preparing device ...\n")
1878 #bsl.actionStartBSL(usepatch=0, adjsp=0) #no workarounds needed
1879 #if speed: bsl.actionChangeBaudrate(speed) #change baud rate as fast as possible
1880 for f in deviceinit: f()
1882 if todo or goaddr or startaddr:
1883 if DEBUG: sys.stderr.write("Actions ...\n")
1886 usepatch=not unpatched,
1887 replacementBSL=bslrepl,
1889 mayuseBSL=mayuseBSL,
1895 if DEBUG > 0: #debug
1896 #show a nice list of sheduled actions
1897 sys.stderr.write("TODO list:\n")
1900 sys.stderr.write(" %s\n" % f.func_name)
1901 except AttributeError:
1902 sys.stderr.write(" %r\n" % f)
1903 for f in todo: f() #work through todo list
1905 if bsl.info is not None:
1906 sys.stderr.write('Programming info flash...\n')
1908 bsl.programData(bsl.info, bsl.ACTION_PROGRAM)
1910 if reset: #reset device first if desired
1913 bsl.txPasswd(); #default pass
1914 data=bsl.uploadData(0xc00,1024);
1917 hex+=("%02x "%ord(c));
1920 # I don't know what bslreset is all about, but if it is enabled and
1921 # the wrong password is provided, the chip gets erased.
1925 bsl.actionStartBSL(bslreset=reset)
1928 if goaddr is not None: #start user programm at specified address
1929 bsl.actionRun(goaddr) #load PC and execute
1931 #upload datablock and output
1932 if startaddr is not None:
1933 if goaddr: #if a program was started...
1934 #don't restart BSL but wait for the device to enter it itself
1935 sys.stderr.write("Waiting for device to reconnect for upload: ")
1937 bsl.txPasswd(bsl.passwd, wait=1) #synchronize, try forever...
1938 data = bsl.uploadData(startaddr, size) #upload data
1940 data = bsl.uploadData(startaddr, size) #upload data
1941 if hexoutput: #depending on output format
1943 while m < len(data): #print a hex display
1944 print hexify(startaddr+m, map(ord,data[m:m+16]))
1947 sys.stdout.write(data) #binary output w/o newline!
1948 wait = 0 #wait makes no sense as after the upload the device is still in BSL
1950 if wait: #wait at the end if desired
1951 sys.stderr.write("Press <ENTER> ...\n") #display a prompt
1953 raw_input() #wait for newline
1955 bsl.comDone() #Release serial communication port
1957 if __name__ == '__main__':
1961 raise #let pass exit() calls
1962 except KeyboardInterrupt:
1963 if DEBUG: raise #show full trace in debug mode
1964 sys.stderr.write("user abort.\n") #short messy in user mode
1965 sys.exit(1) #set errorlevel for script usage
1966 except Exception, msg: #every Exception is caught and displayed
1967 if DEBUG: raise #show full trace in debug mode
1968 #sys.stderr.write("\nAn error occoured:\n%s\n" % msg) #short messy in user mode
1969 #sys.exit(1) #set errorlevel for script usage