Hi all,

As the long awaited update of the OSS-FET-Driver has still not 
arrived, this is a minor update to the 0.5 series and it comes 
with the idea of FET virtualization (0.6.0 will be released within 
the next version of the OSS v3 driver)

As the v3 driver has a protocol to communicate with the FET via USB,
the first step is to redirect the output of the driver from USB
to socket. There is a patch which adds a new device to the driver,
called simulator. The patch will change no further functionality of 
the driver and can be fully deactivated by a flag at compile time. 
The new device acts as a socket client and looks on port 33333 for 
a matching server (the port is set to this value at compile time, 
later versions will add dynamic port setting).

The second part is a server which is listening to this port 
and implements the protocol on the virtual FET side. This service 
is able to interpret messages which are coming from the driver 
and to create the necessary response messages. Data blocks 
are reassembled if needed and assigned to the driver specific 
abstraction layer (HAL). A public interface provides the collected 
HAL data to the following instance.

Last but not least, the third part implements a simulator component. 
The version in this release consist only a very simple model 
which implements functionality which is needed to identify the 
target (and only for 5xx). To do this, it needs some information 
about the target which should be simulated and this information 
is provided by the database extractor, introduced with one of the 
last versions. The starting point is the target name type (for 
example MSP430F5438A) which is selectable by the user and comes 
from the server component. The model creates register and memory 
section information directly from the data which stored in the 
database component and assigned to the given target name.

The simulator works together with any debug tool which is
using the v3 driver for communication. Here is a test with
mspdebug:


mspdebug-0.19> ./mspdebug tilib -d simulator
MSPDebug version 0.19 - debugging tool for MSP430 MCUs
Copyright (C) 2009-2012 Daniel Beer <dlb...@gmail.com>
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

MSP430_Initialize: simulator
Firmware version is 30203015
MSP430_VCC: 3000 mV
MSP430_OpenDevice
MSP430_GetFoundDevice
Device: MSP430F5438A (id = 0x009f)
8 breakpoints available
MSP430_EEM_Init

Available commands:
    =         delbreak  gdb       load      opt       reset     simio     
    alias     dis       help      locka     prog      run       step      
    break     erase     hexout    md        read      set       sym       
    cgraph    exit      isearch   mw        regs      setbreak  

Available options:
    color           gdb_loop        iradix          
    fet_block_size  gdbc_xfer_size  quiet           

Type "help <topic>" for more information.
Press Ctrl+D to quit.

(mspdebug) regs
    ( PC: 05c00)  ( R4: cccc4)  ( R8: cccc8)  (R12: ccccc)  
    ( SP: 05bfc)  ( R5: cccc5)  ( R9: cccc9)  (R13: ccccd)  
    ( SR: 00000)  ( R6: cccc6)  (R10: cccca)  (R14: cccce)  
    ( R3: 00000)  ( R7: cccc7)  (R11: ccccb)  (R15: ccccf)  
0x5c00:
    05c00: aa aa aa aa               DADD    @R10,    0xaaaa(R10)
    05c04: aa aa aa aa               DADD    @R10,    0xaaaa(R10)
    05c08: aa aa aa aa               DADD    @R10,    0xaaaa(R10)
    05c0c: aa aa aa aa               DADD    @R10,    0xaaaa(R10)
(mspdebug)

Downloadable as usual at:

https://sourceforge.net/projects/msp4linux/files/

Hubert
-- 
NEU: FreePhone 3-fach-Flat mit kostenlosem Smartphone!                          
        
Jetzt informieren: http://mobile.1und1.de/?ac=OM.PW.PW003K20328T7073a

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Mspgcc-users mailing list
Mspgcc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/mspgcc-users

Reply via email to