Step by step configuration to setup a blank RPi, and get OTP reading working. OTP writing unfortunately does not work.
- I used an RPi3 - any RPi would do.
- Installet RaspberryOS Lite on SD card- Change hostname and enable SSH by pressing CTRL-Shift-X in RPI Imager
- Configure Wifi by createing
wpa_supplicant.conf
using https://codepen.io/LilTrublMakr/full/yRGPrv/, then copy it to the SD card. - SSH into the RPi over Wifi (See IP on console output - I got 10.0.1.83) using pi/raspberry
- Use
passwd
to change password. - Manual configuration: sudo raspi-config
- reboot
- Install all the tools listed below
$ sudo apt-get update && sudo apt-get upgrade
$ sudo apt-get install git git-core autoconf build-essential libtool
$ sudo apt-get install libreadline-gplv2-dev libncursesw5-dev libssl-dev libsqlite3-dev tk-dev libgdbm-dev libc6-dev libbz2-dev
$ sudo apt-get install python-dev python3-distutils python3-pip
$ sudo pip install pathlib
$ sudo pip install hexrec
$ git clone git://git.code.sf.net/p/urjtag/git urjtag
$ cd urjtag/urjtag/
$ sudo apt-get install autopoint bison flex python2.7-dev python3-dev
$ ./autogen.sh
$ ./configure
$ make
$ sudo make install
$ sudo ldconfig
Test UrJTAG by first configuring the GPIO's and then execute the jtag
command as below.
Ensure GPIO's are exported and the the GPIO that controlls the high Vpp voltage for OTP programming is off.
$ ls /sys/class/gpio
$ echo 8 > /sys/class/gpio/export
$ echo 18 > /sys/class/gpio/export
$ echo 23 > /sys/class/gpio/export
$ echo 24 > /sys/class/gpio/export
$ echo 25 > /sys/class/gpio/export
$ echo out > /sys/class/gpio/gpio8/direction
$ echo 0 > /sys/class/gpio/gpio8/value
$ cat /sys/class/gpio/gpio14/direction
in
$ cat /sys/class/gpio/gpio14/value
0
$ echo out >/sys/class/gpio/gpio14/direction
$ cat /sys/class/gpio/gpio14/direction
out
$ cat /sys/class/gpio/gpio14/value
0
$ echo 1 > /sys/class/gpio/gpio14/value
$ echo 0 > /sys/class/gpio/gpio14/value
$ echo in >/sys/class/gpio/gpio14/direction
Unfortunately the irmck343 does not respond properly to a device scan, so the device file have to be included manually. However the device then have a READID register that can be read.
$ sudo jtag
jtag> cable gpio tms=18 tdi=23 tdo=24 tck=25
jtag> detect
IR length: 8
Chain length: 1
Device Id: not supported (bit 0 was not a 1)
jtag> include /home/pi/urjtag/urjtag/data/infineon/IRMCF343/irmck343
jtag> instruction READID
jtag> shift ir
jtag> shift DR
jtag> dr
01000010 (0x42)
For unknown reasons, Urjtag requires the GPIO's to be exported at startup, and then sometimes after use they are unexported. To fix this, I wrapped the startup in a script:
$ ./start.sh
UrJTAG 2021.03 #3d3a9b45
Copyright (C) 2002, 2003 ETC s.r.o.
Copyright (C) 2007, 2008, 2009 Kolja Waschk and the respective authors
UrJTAG is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
There is absolutely no warranty for UrJTAG.
warning: UrJTAG may damage your hardware!
Type "quit" to exit, "help" for help.
To be even more lazy, I wrapped the cable setup etc. in an include file:
jtag> include ./start
Initializing GPIO JTAG Chain
IR length: 8
Chain length: 1
Device Id: not supported (bit 0 was not a 1)
01000010 (0x42)
Finally I created an include file to test reading from the OTP, which can be executed by using include ./test_read
Unfortunately I quickly found out that I needed a bus-driver to do anything usefull (like easy reading from the OTP, and controlling the Vpp and TCK while programming), and that required understanding a lot of things in urjtag in order to create a custom TAP driver. Python to the rescue...
Also here, for unknown reasons, Urjtag requires the GPIO's to be exported before use.
However, this time I fixed in in the python file, sp simply execute ./test.py
to get started.
Complete readout of the otp in the irmck343 is implemented (although it's not possible to determen if the read operation was properly unlocked, or if the read data is scrambled.
A test mode to try to write back to the irmck343 is also implemented, but it does not to work. At least these reasons for this are plausable, but the exact reason is still unknown:
- The timing requirements of the TCK sufficient the hacked way I did it.
- The timing of the Vpp voltage may not be sufficient the hacked way I did it.
- The exact application of Vpp may be entirely wrong, but unfortunately it's not properly documented.
A proper TAP/bus-driver may be needed to be implemented in Urjtag for better control of TCK and Vpp signals. The test mode output looks like this (Chip detection isn't done, so if the irmck343 isn't powered, all data are zero!):
$ cd ~/urjtag/urjtag
$ sudo ./test.py
Executing test.py
READID: 0x42 (Should be 0x42)
Otp unlocked!
Reading 10 bytes from otp
irmck343_read_otp_to_memory executed in 0.004762172698974609 seconds
Read: 0x0000: 0x02
Read: 0x0001: 0x4C
Read: 0x0002: 0xEC
Read: 0x0003: 0x7C
Read: 0x0004: 0x00
Read: 0x0005: 0x7D
Read: 0x0006: 0x01
Read: 0x0007: 0x7E
Read: 0x0008: 0x01
Read: 0x0009: 0x7F
Reading done
Modify one value.
Memory: 0x0000: 0x02 - Zeroed!
Attempt Burn with modified data!!
Burn: 0x0000: 0x00
Burn: 0x0001: 0x4C
Burn: 0x0002: 0xEC
Burn: 0x0003: 0x7C
Burn: 0x0004: 0x00
Burn: 0x0005: 0x7D
Burn: 0x0006: 0x01
Burn: 0x0007: 0x7E
Burn: 0x0008: 0x01
Burn: 0x0009: 0x7F
Burn done!!
READID: 0x00 (Should be 0x42)
Otp unlocked!
Reading 10 bytes from otp
irmck343_read_otp_to_memory executed in 0.0030870437622070312 seconds
Re-Read: 0x0000: 0x02
Re-Read: 0x0001: 0x4C
Re-Read: 0x0002: 0xEC
Re-Read: 0x0003: 0x7C
Re-Read: 0x0004: 0x00
Re-Read: 0x0005: 0x7D
Re-Read: 0x0006: 0x01
Re-Read: 0x0007: 0x7E
Re-Read: 0x0008: 0x01
Re-Read: 0x0009: 0x7F
Reading done
- IRMCx300 Software Developers Guide (see section 6.4)
- copy PARTS to /home/pi/urjtag/urjtag/data/infineon/
- copy irmck343 to /home/pi/urjtag/urjtag/data/infineon/IRMCF343/
- copy STEPPINGS to /home/pi/urjtag/urjtag/data/infineon/IRMCF343/
- copy start to /home/pi/urjtag/urjtag/
- copy start.sh to /home/pi/urjtag/urjtag/
Make sure the scripts are executeable:
$ cd ~/urjtag/urjtag
$ chmod u+x start.sh
$ chmod u+x test.py
Happy hacking! Flemming [email protected], December 2021.