X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2FGoodFETMSP430.py;h=580534b7ad0b4b65eca6534b1b75c2ecc8886c9e;hp=22b7ee82245bbc02d32284eee14d2b1a9cbfe1b3;hb=2e3eabe60e117a56637fd1ca621152826e84e05b;hpb=4b2f28239ea1c0f76117e813fc8838f8a368d2bf diff --git a/client/GoodFETMSP430.py b/client/GoodFETMSP430.py index 22b7ee8..580534b 100644 --- a/client/GoodFETMSP430.py +++ b/client/GoodFETMSP430.py @@ -36,25 +36,44 @@ class GoodFETMSP430(GoodFET): (ord(self.data[2])<<16)+(ord(self.data[3])<<24)); return DeviceID; def MSP430peek(self,adr): - """Read the contents of memory at an address.""" - self.data=[adr&0xff, (adr&0xff00)>>8]; - self.writecmd(self.MSP430APP,0x02,2,self.data); + """Read a word at an address.""" + self.data=[adr&0xff, (adr&0xff00)>>8, + (adr&0xff0000)>>16,(adr&0xff000000)>>24, + ]; + self.writecmd(self.MSP430APP,0x02,4,self.data,1); return ord(self.data[0])+(ord(self.data[1])<<8); + def MSP430peekblock(self,adr,blocks=1): + """Grab a few block from an SPI Flash ROM. Block size is unknown""" + data=[adr&0xff, (adr&0xff00)>>8, + (adr&0xff0000)>>16,(adr&0xff000000)>>24, + blocks]; + + self.writecmd(self.MSP430APP,0x02,5,data,blocks); + return self.data; + def MSP430poke(self,adr,val): - """Read the contents of memory at an address.""" - self.data=[adr&0xff, (adr&0xff00)>>8, val&0xff, (val&0xff00)>>8]; - self.writecmd(self.MSP430APP,0x03,4,self.data); - return;# ord(self.data[0])+(ord(self.data[1])<<8); + """Write the contents of memory at an address.""" + self.data=[adr&0xff, (adr&0xff00)>>8, + (adr&0xff0000)>>16,(adr&0xff000000)>>24, + val&0xff, (val&0xff00)>>8]; + self.writecmd(self.MSP430APP,0x03,6,self.data); + return ord(self.data[0])+(ord(self.data[1])<<8); + def MSP430pokeflash(self,adr,val): + """Write the contents of flash memory at an address.""" + self.data=[adr&0xff, (adr&0xff00)>>8, + (adr&0xff0000)>>16,(adr&0xff000000)>>24, + val&0xff, (val&0xff00)>>8]; + self.writecmd(self.MSP430APP,0xE1,6,self.data); + return ord(self.data[0])+(ord(self.data[1])<<8); + def MSP430start(self): """Start debugging.""" self.writecmd(self.MSP430APP,0x20,0,self.data); self.JTAGID=ord(self.data[0]); - #print "Identified as %02x." % id; - if(self.JTAGID==0x89 or self.JTAGID==0x91): - print "Successfully connected." - else: - print "Error, misidentified as %02x." % id; - + #print "Identified as %02x." % self.JTAGID; + if(not (self.JTAGID==0x89 or self.JTAGID==0x91)): + print "Error, misidentified as %02x." % self.JTAGID; + def MSP430haltcpu(self): """Halt the CPU.""" self.writecmd(self.MSP430APP,0xA0,0,self.data); @@ -77,24 +96,84 @@ class GoodFETMSP430(GoodFET): return self.data[0]; def MSP430ident(self): """Grab self-identification word from 0x0FF0 as big endian.""" + ident=0x00; if(self.JTAGID==0x89): i=self.MSP430peek(0x0ff0); ident=((i&0xFF00)>>8)+((i&0xFF)<<8) + if(self.JTAGID==0x91): i=self.MSP430peek(0x1A04); ident=((i&0xFF00)>>8)+((i&0xFF)<<8) + #ident=0x0091; + return ident; + def MSP430identstr(self): + """Grab model string.""" + return self.MSP430devices.get(self.MSP430ident()); + MSP430devices={ + #MSP430F2xx + 0xf227: "MSP430F22xx", + 0xf213: "MSP430F21x1", + 0xf249: "MSP430F24x", + 0xf26f: "MSP430F261x", + 0xf237: "MSP430F23x0", + + + #MSP430F1xx + 0xf16c: "MSP430F161x", + 0xf149: "MSP430F13x", #or f14x(1) + 0xf112: "MSP430F11x", #or f11x1 + 0xf143: "MSP430F14x", + 0xf112: "MSP430F11x", #or F11x1A + 0xf123: "MSP430F1xx", #or F123x + 0x1132: "MSP430F1122", #or F1132 + 0x1232: "MSP430F1222", #or F1232 + 0xf169: "MSP430F16x", + + #MSP430F4xx + 0xF449: "MSP430F43x", #or F44x + 0xF427: "MSP430FE42x", #or FW42x, F415, F417 + 0xF439: "MSP430FG43x", + 0xf46f: "MSP430FG46xx", #or F471xx + + } def MSP430test(self): """Test MSP430 JTAG. Requires that a chip be attached.""" if self.MSP430ident()==0xffff: print "Is anything connected?"; - print "Testing RAM."; - temp=self.MSP430peek(0x0200); - self.MSP430poke(0x0200,0xdead); - if(self.MSP430peek(0x0200)!=0xdead): - print "Poke of 0x0200 did not set to 0xDEAD properly."; - return; - self.MSP430poke(0x0200,temp); #restore old value. + print "Testing RAM from 200 to 210."; + for a in range(0x200,0x210): + self.MSP430poke(a,0); + if(self.MSP430peek(a)!=0): + print "Fault at %06x" % a; + self.MSP430poke(a,0xffff); + if(self.MSP430peek(a)!=0xffff): + print "Fault at %06x" % a; + + print "Testing identity consistency." + ident=self.MSP430ident(); + for a in range(1,20): + ident2=self.MSP430ident(); + if ident!=ident2: + print "Identity %04x!=%04x" % (ident,ident2); + + print "Testing flash erase." + self.MSP430masserase(); + for a in range(0xffe0, 0xffff): + if self.MSP430peek(a)!=0xffff: + print "%04x unerased, equals %04x" % ( + a, self.MSP430peek(a)); + + print "Testing flash write." + for a in range(0xffe0, 0xffff): + self.MSP430pokeflash(a,0xbeef); + if self.MSP430peek(a)!=0xbeef: + print "%04x unset, equals %04x" % ( + a, self.MSP430peek(a)); + + print "Tests complete, erasing." + self.MSP430masserase(); + def MSP430flashtest(self): self.MSP430masserase(); i=0x2500; @@ -106,16 +185,7 @@ class GoodFETMSP430(GoodFET): def MSP430masserase(self): """Erase MSP430 flash memory.""" self.writecmd(self.MSP430APP,0xE3,0,None); - def MSP430writeflash(self,adr,val): - """Write a word of flash memory.""" - if(self.MSP430peek(adr)!=0xFFFF): - print "FLASH ERROR: %04x not clear." % adr; - data=[adr&0xFF,(adr&0xFF00)>>8,val&0xFF,(val&0xFF00)>>8]; - self.writecmd(self.MSP430APP,0xE1,4,data); - rval=ord(self.data[0])+(ord(self.data[1])<<8); - if(val!=rval): - print "FLASH WRITE ERROR AT %04x. Found %04x, wrote %04x." % (adr,rval,val); - + def MSP430dumpbsl(self): self.MSP430dumpmem(0xC00,0xfff); def MSP430dumpallmem(self):