完善资料让更多小伙伴认识你,还能领取20积分哦, 立即完善>
我的查询-我使用PIC32 MX370F512HWE在DEVCFG0寄存器中有代码保护(CP)位。我需要知道这个钻头的严重程度。我们使用PrabMA来实现这一点。当我们启用这个位时,我需要知道控制器是否可以读/写/擦除。我们正在使用皮克特3编程我们的控制器如果有人尝试使用这一点,请分享你的专业知识。
以上来自于百度翻译 以下为原文 My query - I am using PIC32mx370f512h We have code protect (cp) bit in devcfg0 register. I need to know the severity of this bit. We are enabling this using pragma. I need to know whether the controller can be read/write/erased when we enable this bit. Also what will be covered under the term external programming device as mentioned in data sheet. We are using pickit 3 for programming our controller If some one has tried using this bit, please share your expertise. Thanks in advance |
|
相关推荐
6个回答
|
|
当CP位被启用时,这意味着除非首先擦除设备,否则外部程序员将不被允许访问闪存。这是通过PGCX/PGDX引脚,以及JTAG引脚。它不能做的是防止内部代码做任何事情在内部。例如,代码保护的引导加载程序仍然可以擦除不同的区域,编程它们,甚至在需要时将它们发送到串行端口。
以上来自于百度翻译 以下为原文 When the CP bit is enabled, this means that external programmers will not be permitted to access the Flash memory unless the device is erased first. This is through the PGCx/PGDx pins, as well as the JTAG pins. What it won't do is prevent internal code from doing anything internally. For example, a bootloader that is code protected could still erase different areas, program them, and even send them out the serial port if desired. |
|
|
|
谢谢拉里,所以我们可以用JTAG擦除控制器,但是我们不能用任何可能的方法读取BEX(不包括Bootloader)。但是我们仍然可以在控制器程序内存被擦除之后使用JTAG对控制器进行编程。
以上来自于百度翻译 以下为原文 Thanks Larry, So we can erase the controller using JTAG ,however we cannot read the hex by any possible means(excluding bootloader). But still we can program the controller using JTAG after the controller program memory gets erased.? |
|
|
|
|
|
|
|
我尝试在启动加载程序和应用程序中启用具有CP位的控制器,它工作正常。我不能读取内存,并且一次擦除就能够写入它。但是,我想知道CP配置位是否将存储在静态存储器中,如果可能的话。一个黑客来擦除那个特定的内存并读取我的十六进制。如果在引导加载程序和应用程序中CP位配置不同(在应用程序中启用,在引导加载程序中禁用),控制器将如何运行?
以上来自于百度翻译 以下为原文 I tried flashing my controller with CP bit enabled in both boot loader and application; and it works as expected. I am not able to read the memory and able to write it once erased. However I would like to know whether the CP configuration bit will be stored in a static memory and if it is possible for a hacker to erase that particular memory and read my hex. Also how will the controller behave if CP bit configuration are different in boot loader and application (enabled in application and disabled in boot loader) |
|
|
|
它存储在配置文件中,它在闪存中,与程序相同。不可能使用标准的微芯片工具,在不擦除所有东西的情况下擦除该比特。Microchip不能保证它是不可能做到的,因为黑客们已经知道要尽可能地把顶部磨掉。芯片和目标内部电池用激光器,但这是一个非常昂贵的操作,他们可能只写自己的代码更便宜。注意它在PIC数据表的第二页上所说的:这取决于引导加载程序,如果它注意到指定的配置位。在应用图像中。
以上来自于百度翻译 以下为原文 It is stored in the CONFIG word, which is in FLASH memory, the same as your program. It is not possible using standard Microchip tools, to erase that bit without erasing everything. Microchip do not guarantee that it is impossible to do, as hackers have been known to go as far as to grind the top off chips and target internal cells with lasers, but that is an extremely expensive operation, and they could probably just write their own code cheaper. Note what it says on the second last page of your PIC datasheet: That depends upon the bootloader, if it takes notice of configuration bits specified in the application image. |
|
|
|
这取决于引导加载程序,如果它注意到在应用程序映像中指定的配置位。要重新状态,除非引导加载程序读取应用程序映像中指定的配置位并在加载映像时更新它们,配置设置并不重要。当你编译你的应用程序时-比尔
以上来自于百度翻译 以下为原文 That depends upon the bootloader, if it takes notice of configuration bits specified in the application image. To restate, unless the bootloader reads the configuration bits specified in the application image and updates them when loading the image, it doesn't matter what the configuration settings are when you compile your application. -Bill |
|
|
|
只有小组成员才能发言,加入小组>>
5145 浏览 9 评论
1993 浏览 8 评论
1921 浏览 10 评论
请问是否能把一个ADC值转换成两个字节用来设置PWM占空比?
3162 浏览 3 评论
请问电源和晶体值之间有什么关系吗?PIC在正常条件下运行4MHz需要多少电压?
2218 浏览 5 评论
713浏览 1评论
601浏览 1评论
有偿咨询,关于MPLAB X IPE烧录PIC32MX所遇到的问题
484浏览 1评论
PIC Kit3出现目标设备ID(00000000)与预期的设备ID(02c20000)不匹配。是什么原因
613浏览 0评论
512浏览 0评论
小黑屋| 手机版| Archiver| 电子发烧友 ( 湘ICP备2023018690号 )
GMT+8, 2024-11-11 03:34 , Processed in 1.150353 second(s), Total 86, Slave 70 queries .
Powered by 电子发烧友网
© 2015 bbs.elecfans.com
关注我们的微信
下载发烧友APP
电子发烧友观察
版权所有 © 湖南华秋数字科技有限公司
电子发烧友 (电路图) 湘公网安备 43011202000918 号 电信与信息服务业务经营许可证:合字B2-20210191 工商网监 湘ICP备2023018690号