This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

MSP430FR5994: Unable to Mass Erase with BSL

Part Number: MSP430FR5994
Other Parts Discussed in Thread: MSP-FET

After changing the memory mapping in the linker to expand the space in FRAM we are unable to program this microcontroller. Specifically, the line change was "FRAM: origin = 0x4000, length = 0xFF80." Reading section 2.2.2 of slaa685, we wrote data into 0xFF80 and seem to have enabled the e-fuse (although the odds of having written exactly 0x5555 or 0xAAAA seem astronomical).

Tying to flash with Code Composer Studio we get the message "Error connecting to the target: The Debug Interface to the device has been secured." Trying to use MSP430Flasher we get the same message "ERROR: The Debug Interface to the device has been secured."

It would seem that BSL's MASS_ERASE (or using a bad password with RX_PASSWORD) should wipe the memory and save us, however we are unable to get any response from the bootloader. We are fairly certain the wiring is correct because we are able to run these commands on an MSP-FET connected to another (not bricked) board that is wired the same way.

Using BSL Scripter we get the message "[ACK_ERROR_MESSAGE]Unknown ACK value!". Using another command that definitely does return an ACK and does not require a password (CHANGE_BAUD_RATE) we get the same error.

Anything else we can try?

  • Hi Hunter,

    Thanks for reaching out!

    I suspect that you actually did mass erase your device, but you need to provide the default password to unlock it.

    It looks like you are already working with the BSL Scripter, but here is a link to the download folder just in case:

    When you download the BSL Scripter, you should see a folder called "ScriptExampleWindows" in the installation path. If you open this and go to FRxx_uart, you will find script_FRxx_uart.txt along with password files and a blinkLED example. The picture below shows the terminal output when I execute the BSL-Scripter and run the script_FRxx_uart.txt.

    When you give your device the wrong BSL password, you will get the "Unknown ACK value" message. When this happens, you mass erase the device - even though it does not explicitly say so.

    When the device is erased, you should be able to provide the default BSL password and unlock the device (like in the picture above).

    Please let me know if you have any questions.

    Thanks!

    -Mitch

  • Hi,

    could it be that you also wrote to the BSL lock signatures located at 0xFF84 and 0xFF86 as described in the users guide?
    If you have locked JTAG interface and BSL there is not way to get the part back because you enabled accidently the highest security level.

**Attention** This is a public forum