2018-03-28 02:34 AM
Hi, after running some software tests, we have locked the processor. In the past, I have managed to use a uLink2 debugger to unprotect the flash, and re-gain access.
This time, the debugger won't even connect
'Cannot access Memory (@ 0xe00ffff0), Read, Acc Size 4 Byte'.
I suspect we might have enabled the full protection level that locks out JTAG. Does this seem likely, or can you suggest a workaround?
Thanks Jim
2018-03-28 03:34 AM
Have you tried connecting with BOOT0 high?
If you have been fiddling with the protection level and removed access, you will need to replace the chip or access via the code you already have programmed in the device. Usually best to have code to probe, query, etc while doing development.
2018-03-28 03:51 AM
>>I suspect we might have enabled the full protection level that locks out JTAG.
Is that what you were doing? Doesn't occur 'randomly', and is not reversible.
Do stupid things, win stupid prizes, you'll need to replace the part if you've provided no alternate means to communicate with it.
2018-03-28 04:18 AM
There are attacks published against fully read protected STM32. but probably not worth a try...
2018-03-28 07:48 AM
Someone was experimenting with software test case generation software. It looks like it thought it would be fun to test the HAL then nothing worked anymore.