This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

MSP430G2553: MSP low-power microcontroller forum

Part Number: MSP430G2553

I'm trying to upgrade the MSPG2553 using the steps outlined in this support ticket: https://e2e.ti.com/support/microcontrollers/msp-low-power-microcontrollers-group/msp430/f/msp-low-power-microcontroller-forum/991977/msp430g2553-msp430g2553-uart-firmware-update-using-bsl-problem/3663997?tisearch=e2e-sitesearch&keymatch=BSLSKEY#3663997

Essentially, hardware entry to BSL, then mass erase, then enter default password, then program.

Is there a way to protect the INFO-A segment from a mass erase in this case? We've confirmed in our testing that hardware entry to BSL disables the LOCKA bit with no apparent way to prevent this. We've also tried setting the BSLSKEY to 0x0000 as suggested by the linked ticket. Doing so prevents an erase on a bad password, but doesn't change the behavior of a mass erase.

Is there anything else we can do? Ideally we do not want to go to a backup plan of either software entry to BSL or having to enter a password before erasing the chip.

**Attention** This is a public forum