I tortured the KLtab boards in many ways, but could never get them
to behave like the chip on the non-programmable Anelok board #2.

There is one thing that I didn't try yet, and that's completely
locking down one of the chips on the KLtab boards. The reason is of
course that this would make the board unusable - unless I implement
some clever backdoor.

But in any case, if the chip was protected that way, then it wouldn't
indicate that it can be mass-erased, would it ?

Well, I don't know for sure yet, but I noticed something else: a
while ago, I had broken the build process of the boot loader in a
way that would put incorrect data at the location of the
all-important Flash security byte (FSEC).

I reconstructed the likely version of the boot loader I had at that
time, and found that FSEC was probably set to 0xed. This decodes to:

11 = backdoor disabled
10 = mass erase disabled
11 = Freescale access granted
01 = MCU security status is secure

The backdoor is a mechanism that needs firmware support, so that
wouldn't work with this broken boot loader, even if I had implemented
such support (which I haven't). All other settings are such that I
can't get in :-(

This still doesn't explain why the chip happily announces that it
could be mass-erased, but all the other clues are there.

So the next step will be to try to unsolder it and replace it with a
new one. Let's see how much damage that does ...

Oh, and in completely unrelated news, my Ben-based SWD programmer
now requires the user to announce explicitly what protection level
the binary about to be flashed will set. If there's a mismatch, it
will politely refuse to mess things up.

- Werner

_______________________________________________
Qi Hardware Discussion List
Mail to list (members only): [email protected]
Subscribe or Unsubscribe: 
http://lists.en.qi-hardware.com/mailman/listinfo/discussion

Reply via email to