>64-pin/128-pin LPC2000 devices with a Boot Loader ID >= 1.6 have >flash Read Protection. Ashling users can can check your device's ID >using FlashLPC (I think the Philips ISP programmer supports this as >well). Code read protection is enabled by programming the flash >address location 0x1FC (User flash sector 0) with value 0x87654321. >If Read Protection is enabled then the device has to be fully erased >(thus disabling Read Protection) before it can be re-programmed. >We're currently adding support for this in our tools; further >announcements shortly. > >BTW, use this information at your own risk. Philips Applications >will be making "official" announcements shortly. I guess this kind of protection is quite useless, perhaphs this is why Philips doen't disclosure the JTAG direct access to Flash read/write routines, but it's pretty simple to disassemble IAP bootloader (I've read somewhere on Russian ARM forum that there are few peoples who are doing this) and to have direct access to Flash through JTAG instead through IAP I even read on the same Russian forum that one guy sucessfully overwrote (by mistake) bootloader Flash when tried to write huge file through the Philips ISP, thus made the chip absolutely useless without the bootloader code inside. Best regards Tsvetan
Message
Re: Code Protection
2004-02-20 by tsvetanusunov
Attachments
- No local attachments were found for this message.