This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

MSP430F5529: BSL - Can't prevent mass erase on wrong password.

Part Number: MSP430F5529

Hi,

Using BSL via USB for in field updates. We don't care about a password, it just adds too much complexity for the user across different firmware versions. I am using MSP430 USB Firmware Upgrade Example v.1.3.1.

I wish to disable "mass erase" on a wrong password as our device has calibration data that must not be erased.

Document slau319m section 2.7 details the BSL password options and states that if the memory address directly below the interrupt table is 0x0000 then the BSL will not force a mass erase on an incorrect password.

I have set the address 0xFF7E to 0 as 0xFF80 is the bottom of the interrupt vector table on MSP430F5529 according to slas590m section 6.3.

This is also confirmed in the .map output file.

.TI.bound:u16BSL_Password 
*          0    0000ff7e    00000002     
                  0000ff7e    00000002     msp430_bsl.obj (.TI.bound:u16BSL_Password)

Yet despite the password failing, mass erase is always performed.

How do I stop this from happening on MSP430F5529?

Thanks

Stomp!

  • Chapter 2 of SLAU319 does not apply to the 5xx family.

    On the F5529, you cannot prevent mass erase without changing the BSL. But mass erase does not erase information memory.
  • Thanks.

    I downloaded the custom BSL source, looks like a bit of effort to get modified and revved up to CCSV7.

    Easier solution was to find the correct password for the firmware build I'm using.

    Problem solved for now.
    Thanks.

**Attention** This is a public forum