Closed fe8769a closed 8 months ago
Okya, thanks for trying agian. Let me check if I can replicate the issue and find a solution.
For the record I too had the same exact failure to erase the flash when I ran openocd with windows. I messed around and erased portions of it and eventually gave up. Turning it back on would result in no leds.
However, no leds turned out to not be a problem and getting the rp2040 back was as simple as using the different button combo you mentioned above.
What’s very odd is that I built openocd on Linux and this time the flash completely erased, I returned the rp2040 back to serial with boot loader, and was able to flash the firmware over and over with the waterfall of leds going and the 4th led off.
What’s even more odd is that I made a video of the steps but during the video I failed to get an erase of the flash on Linux with openocd, but still managed to get back into bootloader mode .
Video is up on Youtube.
do you have direct link to youtube , I can find only links to dragon os or wardragon
thanks
Le lun. 23 oct. 2023 à 18:50, alphafox02 @.***> a écrit :
For the record I too had the same exact failure to erase the flash when I ran openocd with windows. I messed around and erased portions of it and eventually gave up. Turning it back on would result in no leds.
However, no leds turned out to not be a problem and getting the rp2040 back was as simple as using the different button combo you mentioned above.
What’s very odd is that I built openocd on Linux and this time the flash completely erased, I returned the rp2040 back to serial with boot loader, and was able to flash the firmware over and over with the waterfall of leds going and the 4th led off.
What’s even more odd is that I made a video of the steps but during the video I failed to get an erase of the flash on Linux with openocd, but still managed to get back into bootloader mode .
Video is up on Youtube.
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775609999, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7BMYZME7QAMA3GRJLYA2N7DAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVGYYDSOJZHE . You are receiving this because you authored the thread.Message ID: @.***>
--
I still have access to telnet and openocd . I made my tests with linux because under windows I have a compil error in make -openocd
Le lun. 23 oct. 2023 à 18:54, fe8769 @.***> a écrit :
do you have direct link to youtube , I can find only links to dragon os or wardragon
thanks
Le lun. 23 oct. 2023 à 18:50, alphafox02 @.***> a écrit :
For the record I too had the same exact failure to erase the flash when I ran openocd with windows. I messed around and erased portions of it and eventually gave up. Turning it back on would result in no leds.
However, no leds turned out to not be a problem and getting the rp2040 back was as simple as using the different button combo you mentioned above.
What’s very odd is that I built openocd on Linux and this time the flash completely erased, I returned the rp2040 back to serial with boot loader, and was able to flash the firmware over and over with the waterfall of leds going and the 4th led off.
What’s even more odd is that I made a video of the steps but during the video I failed to get an erase of the flash on Linux with openocd, but still managed to get back into bootloader mode .
Video is up on Youtube.
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775609999, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7BMYZME7QAMA3GRJLYA2N7DAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVGYYDSOJZHE . You are receiving this because you authored the thread.Message ID: @.***>
--
--
WarDragon Flashing CatSniffer w/ Sniffle + Overall Usage Tips (V3.1, DragonOS FocalX) https://youtu.be/GgVDzQrIjXc
In English and very important to pay attention to differences in way or getting to rp2040 depending on what you have it loaded with. You’ll see my flash did not erase, but I was still able to get back to boot loader mode and flash.
I watched your video . I have the same error :
failed erasing sectors 0 to 87
I restart laptop, change usb port (2 in front, 1 in back) . I have always this error
I tried to google my error "DAP transaction stalled (WAIT) - slowing down" but I'm lost by english and knowledge
It could be a wrong setting in cfg files
Le lun. 23 oct. 2023 à 19:56, alphafox02 @.***> a écrit :
WarDragon Flashing CatSniffer w/ Sniffle + Overall Usage Tips (V3.1, DragonOS FocalX) https://youtu.be/GgVDzQrIjXc
In English and very important to pay attention to differences in way or getting to rp2040 depending on what you have it loaded with. You’ll see my flash did not erase, but I was still able to get back to boot loader mode and flash.
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775724253, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV3E4MCWU7W6YKYIT4DYA2VWHAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVG4ZDIMRVGM . You are receiving this because you authored the thread.Message ID: @.***>
--
Unlikely, as I did the same steps and as I mentioned in the video it did in fact erase one time. But as I showed, even when it failed, I was able to recover.
Try this in the state you have it now. Plus the CatSniffer in, there will be no lights on. Press an hold Reset 1 then SW1, then release Reset 1 and then release SW1 in that exact order. If the USB C port is facing left and you're looking down at the switches, Reset 1 is on the right and SW1 is on the left.
That should pop up the RP2040. Drag over the serial with boot loader file from the V3 firmware folder and let the CatSniffer process it, I think you'll then see a couple lights blinking. Then push and hold Boot1, then Reset 1, then release Reset 1 and then release boot 1. You should see 3 lights doing a waterfall pattern with one led completely off.
Now try and use the python tool and load the firmware like I show in the video.
Also once you have the boot loader with serial loaded back on the procedure to get into the RP2040 will be like it was when you originally received the CatSniffer.
Also once you have the boot loader with serial loaded back on the procedure to get into the RP2040 will be like it was when you originally received the CatSniffer.
With either firmware loaded on the RP2040 you can use the second method (Press an hold Reset 1 then SW1, then release Reset 1 and then release SW1) to enter bootloader mode. We are going to change the wiki to show this, I think this will make it easier to understand.
That'd be great, would help avoid confusion. I still have no idea why I was able to erase once with Openocd but only once on linux after having tried it on Windows.
Curious though as to what the point of erasing the flash is since I was able to get back into bootloader mode without it completing the flash erase? Also, if you recall, all my first attempts at getting into bootloader mode was met with the waterfall of lights and a flashing 4th light.
I'm not sure if that one successful erase of the flash is what did it, but now each time I do the bootloader mode I get the waterfall of lights with no 4th led on and a good flash of firmware.
Well I'm lost with a lot of information and lack of english knowledge ..
all my leds are now OFF . What is the way to go back to a normal state ?
what is the exact way of switches
General purpose switch mean ? reset SAMD : reset CC1352 reset CC1352
LEDS
On wiki LED 2 is top of card
So it is LED 2 LED 1 LED 3 LED4 at the bottom
My only request is to use TI packet sniffer
Le lun. 23 oct. 2023 à 22:00, alphafox02 @.***> a écrit :
That'd be great, would help avoid confusion. I still have no idea why I was able to erase once with Openocd but only once on linux after having tried it on Windows.
Curious though as to what the point of erasing the flash is since I was able to get back into bootloader mode without it completing the flash erase? Also, if you recall, all my first attempts at getting into bootloader mode was met with the waterfall of lights and a flashing 4th light.
I'm not sure if that one successful erase of the flash is what did it, but now each time I do the bootloader mode I get the waterfall of lights with no 4th led on and a good flash of firmware.
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775929383, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDVYWAFJ7GD6HMEF46DLYA3EGDAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVHEZDSMZYGM . You are receiving this because you authored the thread.Message ID: @.***>
--
Position CatSniffer with USB C port facing left. Look down at the buttons. Press and hold Reset 1 (top right button) then press and hold SW1 (top left button) then release Reset 1 then release SW 1.
You should see RP2040 pop up a drive on your laptop. Drag over the file and place it into the storage that opened SerialPassthroughwithboot.ino.elf.uf2
You should now be back to having lights, hopefully. From here, still have your CatSniffer with USBC facing left. Then press and hold Boot 1 (bottom right) button, then press and hold Reset one (top right), then release Reset one then release boot 1 and see if you have the LED 2, LED1, and LED3 blinking downwards with LED4 off.
If you made it this far it should be in bootloader mode. Then proceed to load firmware with the python tool.
That'd be great, would help avoid confusion. I still have no idea why I was able to erase once with Openocd but only once on linux after having tried it on Windows.
Curious though as to what the point of erasing the flash is since I was able to get back into bootloader mode without it completing the flash erase? Also, if you recall, all my first attempts at getting into bootloader mode was met with the waterfall of lights and a flashing 4th light.
I'm not sure if that one successful erase of the flash is what did it, but now each time I do the bootloader mode I get the waterfall of lights with no 4th led on and a good flash of firmware.
Answering your question about erasing the flash. When a firmware is incorrectly loaded to the cc1352 the board's bootloder can break or get deactivated. This will keep the board from going into bootloader mode (waterfall pattern), and you will not be able to load other firmwares. The only way to recover the board is by erasing the memory on the cc1352. Before, with CatSniffer v2 the only way to achive this was with an external cJTAG programmer. With CatSniffer V3 you can use the RP2040 to erase the memory "form inside". If you were able to do it successfully at least once, that restored the bootloader on your board and that is why you are now able to load any other firmware with the python tool.
I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU.
Hello
With no LED I'm able to see catsniffer under windows in COM9
Then on a linux laptop :
I was able to restore leds.
I was able to copy SerialPassthroughwithboot.ino.elf.uf2 to media pressing twice button
Now in order to respect documentation, I need to put CC1352 in bootloader mode . After reading all messages here , I have 2 methods (one with picture , one in text)
1- HOLD BOOT1, PRESS RESETS RELEASE BOOT1 --> top D3 led is blinking
the result
sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex [sudo] password for fe8769: Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'
2- HOLD RESET1, HOLD BOOT1 , RELEASE RESET1
LED D3 LED D2 LED D1 are blinking one after the others
The result :
sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'
after
I tried to erase
I copy free_dap_catsniffer.uf2 to the media --> all LEDS went OFF
ON one terminal, I did
sudo openocd -f interface/cmsis-dap.cfg -c "transport select jtag" -f target/ti_cc13x2.cfg -s tcl [sudo] password for fe8769: Open On-Chip Debugger 0.11.0 Licensed under GNU GPL v2 For bug reports, read http://openocd.org/doc/doxygen/bugs.html jtag cortex_m reset_config vectreset
Info : Listening on port 6666 for tcl connections Info : Listening on port 4444 for telnet connections Info : Using CMSIS-DAPv2 interface with VID:PID=0x6666:0x9930, serial=7F17C5F9 Info : CMSIS-DAP: SWD Supported Info : CMSIS-DAP: JTAG Supported Info : CMSIS-DAP: FW Version = 2.0.0 Info : CMSIS-DAP: Serial# = 7F17C5F9 Info : CMSIS-DAP: Interface Initialised (JTAG) Info : SWCLK/TCK = 1 SWDIO/TMS = 1 TDI = 1 TDO = 0 nTRST = 0 nRESET = 1 Info : CMSIS-DAP: Interface ready Info : clock speed 4000 kHz Info : cmsis-dap JTAG TLR_RESET Info : cmsis-dap JTAG TLR_RESET Info : JTAG tap: cc13x2.jrc tap/device found: 0x1bb7702f (mfg: 0x017 (Texas Instruments), part: 0xbb77, ver: 0x1) Info : JTAG tap: cc13x2.cpu enabled Info : cc13x2.cpu: hardware has 6 breakpoints, 4 watchpoints Info : starting gdb server for cc13x2.cpu on 3333 Info : Listening on port 3333 for gdb connections Info : accepting 'telnet' connection on tcp/4444 target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0
On other terminal I did
elnet localhost 4444 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. Open On-Chip Debugger
halt target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0 flash erase_sector 0 0 last DAP transaction stalled (WAIT) - slowing down cc26xx: Flash operation failed failed erasing sectors 0 to 87
So now what can I do ?
Le mar. 24 oct. 2023 à 00:11, Marcelo Arredondo @.***> a écrit :
I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU. [image: CatSniffer_bootloader_modes] https://user-images.githubusercontent.com/139595394/277489617-f98a0435-7da1-495f-9825-c9bff894498f.png
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1776102441, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV2CIKAOXRWWZN4LRHTYA3TR7AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZWGEYDENBUGE . You are receiving this because you authored the thread.Message ID: @.***>
--
I have exactly what alphafox02 did
Position CatSniffer with USB C port facing left. Look down at the buttons. Press and hold Reset 1 (top right button) then press and hold SW1 (top left button) then release Reset 1 then release SW 1.
You should see RP2040 pop up a drive on your laptop. Drag over the file and place it into the storage that opened SerialPassthroughwithboot.ino.elf.uf2 -----------------------------> fine
You should now be back to having lights, hopefully. From here, still have your CatSniffer with USBC facing left. Then press and hold Boot 1 (bottom right) button, then press and hold Reset one (top right), then release Reset one then release boot 1 and see if you have the LED 2, LED1, and LED3 blinking downwards with LED4 off. --------------> FINE -means in bootloader mode
If you made it this far it should be in bootloader mode. Then proceed to load firmware with the python tool. -----------> Timeout
Le mar. 24 oct. 2023 à 22:14, fe8769 @.***> a écrit :
Hello
With no LED I'm able to see catsniffer under windows in COM9
Then on a linux laptop :
I was able to restore leds.
I was able to copy SerialPassthroughwithboot.ino.elf.uf2 to media pressing twice button
Now in order to respect documentation, I need to put CC1352 in bootloader mode . After reading all messages here , I have 2 methods (one with picture , one in text)
1- HOLD BOOT1, PRESS RESETS RELEASE BOOT1 --> top D3 led is blinking
the result
sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex [sudo] password for fe8769: Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'
2- HOLD RESET1, HOLD BOOT1 , RELEASE RESET1
LED D3 LED D2 LED D1 are blinking one after the others
The result :
sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'
after
I tried to erase
I copy free_dap_catsniffer.uf2 to the media --> all LEDS went OFF
ON one terminal, I did
sudo openocd -f interface/cmsis-dap.cfg -c "transport select jtag" -f target/ti_cc13x2.cfg -s tcl [sudo] password for fe8769: Open On-Chip Debugger 0.11.0 Licensed under GNU GPL v2 For bug reports, read http://openocd.org/doc/doxygen/bugs.html jtag cortex_m reset_config vectreset
Info : Listening on port 6666 for tcl connections Info : Listening on port 4444 for telnet connections Info : Using CMSIS-DAPv2 interface with VID:PID=0x6666:0x9930, serial=7F17C5F9 Info : CMSIS-DAP: SWD Supported Info : CMSIS-DAP: JTAG Supported Info : CMSIS-DAP: FW Version = 2.0.0 Info : CMSIS-DAP: Serial# = 7F17C5F9 Info : CMSIS-DAP: Interface Initialised (JTAG) Info : SWCLK/TCK = 1 SWDIO/TMS = 1 TDI = 1 TDO = 0 nTRST = 0 nRESET = 1 Info : CMSIS-DAP: Interface ready Info : clock speed 4000 kHz Info : cmsis-dap JTAG TLR_RESET Info : cmsis-dap JTAG TLR_RESET Info : JTAG tap: cc13x2.jrc tap/device found: 0x1bb7702f (mfg: 0x017 (Texas Instruments), part: 0xbb77, ver: 0x1) Info : JTAG tap: cc13x2.cpu enabled Info : cc13x2.cpu: hardware has 6 breakpoints, 4 watchpoints Info : starting gdb server for cc13x2.cpu on 3333 Info : Listening on port 3333 for gdb connections Info : accepting 'telnet' connection on tcp/4444 target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0
On other terminal I did
elnet localhost 4444 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. Open On-Chip Debugger
halt target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0 flash erase_sector 0 0 last DAP transaction stalled (WAIT) - slowing down cc26xx: Flash operation failed failed erasing sectors 0 to 87
So now what can I do ?
Le mar. 24 oct. 2023 à 00:11, Marcelo Arredondo @.***> a écrit :
I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU. [image: CatSniffer_bootloader_modes] https://user-images.githubusercontent.com/139595394/277489617-f98a0435-7da1-495f-9825-c9bff894498f.png
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1776102441, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV2CIKAOXRWWZN4LRHTYA3TR7AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZWGEYDENBUGE . You are receiving this because you authored the thread.Message ID: @.***>
--
--
Same with windows 10 - same error
Le mer. 25 oct. 2023 à 16:19, fe8769 @.***> a écrit :
I have exactly what alphafox02 did
Position CatSniffer with USB C port facing left. Look down at the buttons. Press and hold Reset 1 (top right button) then press and hold SW1 (top left button) then release Reset 1 then release SW 1.
You should see RP2040 pop up a drive on your laptop. Drag over the file and place it into the storage that opened SerialPassthroughwithboot.ino.elf.uf2 -----------------------------> fine
You should now be back to having lights, hopefully. From here, still have your CatSniffer with USBC facing left. Then press and hold Boot 1 (bottom right) button, then press and hold Reset one (top right), then release Reset one then release boot 1 and see if you have the LED 2, LED1, and LED3 blinking downwards with LED4 off. --------------> FINE -means in bootloader mode
If you made it this far it should be in bootloader mode. Then proceed to load firmware with the python tool. -----------> Timeout
Le mar. 24 oct. 2023 à 22:14, fe8769 @.***> a écrit :
Hello
With no LED I'm able to see catsniffer under windows in COM9
Then on a linux laptop :
I was able to restore leds.
I was able to copy SerialPassthroughwithboot.ino.elf.uf2 to media pressing twice button
Now in order to respect documentation, I need to put CC1352 in bootloader mode . After reading all messages here , I have 2 methods (one with picture , one in text)
1- HOLD BOOT1, PRESS RESETS RELEASE BOOT1 --> top D3 led is blinking
the result
sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex [sudo] password for fe8769: Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'
2- HOLD RESET1, HOLD BOOT1 , RELEASE RESET1
LED D3 LED D2 LED D1 are blinking one after the others
The result :
sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'
after
I tried to erase
I copy free_dap_catsniffer.uf2 to the media --> all LEDS went OFF
ON one terminal, I did
sudo openocd -f interface/cmsis-dap.cfg -c "transport select jtag" -f target/ti_cc13x2.cfg -s tcl [sudo] password for fe8769: Open On-Chip Debugger 0.11.0 Licensed under GNU GPL v2 For bug reports, read http://openocd.org/doc/doxygen/bugs.html jtag cortex_m reset_config vectreset
Info : Listening on port 6666 for tcl connections Info : Listening on port 4444 for telnet connections Info : Using CMSIS-DAPv2 interface with VID:PID=0x6666:0x9930, serial=7F17C5F9 Info : CMSIS-DAP: SWD Supported Info : CMSIS-DAP: JTAG Supported Info : CMSIS-DAP: FW Version = 2.0.0 Info : CMSIS-DAP: Serial# = 7F17C5F9 Info : CMSIS-DAP: Interface Initialised (JTAG) Info : SWCLK/TCK = 1 SWDIO/TMS = 1 TDI = 1 TDO = 0 nTRST = 0 nRESET = 1 Info : CMSIS-DAP: Interface ready Info : clock speed 4000 kHz Info : cmsis-dap JTAG TLR_RESET Info : cmsis-dap JTAG TLR_RESET Info : JTAG tap: cc13x2.jrc tap/device found: 0x1bb7702f (mfg: 0x017 (Texas Instruments), part: 0xbb77, ver: 0x1) Info : JTAG tap: cc13x2.cpu enabled Info : cc13x2.cpu: hardware has 6 breakpoints, 4 watchpoints Info : starting gdb server for cc13x2.cpu on 3333 Info : Listening on port 3333 for gdb connections Info : accepting 'telnet' connection on tcp/4444 target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0
On other terminal I did
elnet localhost 4444 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. Open On-Chip Debugger
halt target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0 flash erase_sector 0 0 last DAP transaction stalled (WAIT) - slowing down cc26xx: Flash operation failed failed erasing sectors 0 to 87
So now what can I do ?
Le mar. 24 oct. 2023 à 00:11, Marcelo Arredondo @.***> a écrit :
I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU. [image: CatSniffer_bootloader_modes] https://user-images.githubusercontent.com/139595394/277489617-f98a0435-7da1-495f-9825-c9bff894498f.png
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1776102441, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV2CIKAOXRWWZN4LRHTYA3TR7AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZWGEYDENBUGE . You are receiving this because you authored the thread.Message ID: @.***>
--
--
--
Hi fe8769,
Can you try doing the process to erase the memory again but change this command 'flash erase_sector 0 0 last' for 'flash erase_sector 0 1 last', this will jump sector 0 that seems to be getting stuck in the erase process. Let me know if this works. If the memory gets erased try loading a firmware again with the python tool as we discussed before.
GREAT .................................................................................................................................................................................................................................................................................... madre de dios
Le mer. 25 oct. 2023 à 18:52, Marcelo Arredondo @.***> a écrit :
Hi fe8769,
Can you try doing the process to erase the memory again but change this command 'flash erase_sector 0 0 last' for 'flash erase_sector 0 1 last', this will jump sector 0 that seems to be getting stuck in the erase process. Let me know if this works. If the memory gets erased try loading a firmware again with the python tool as we discussed before.
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1779681089, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7NL2KLLSSZDMITTDTYBE7V3AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZZGY4DCMBYHE . You are receiving this because you authored the thread.Message ID: @.***>
--
python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... CC1350 PG2.0 (7x7mm): 704KB Flash, 20KB SRAM, CCFG.BL_CONFIG at 0x000AFFD8 Primary IEEE Address: 00:12:4B:00:29:B6:82:4C Performing mass erase Erasing all main bank flash sectors Erase done Writing 720896 bytes starting at address 0x00000000 Write 208 bytes at 0x000AFF308 Write done Verifying by comparing CRC32 calculations. Verified (match: 0x52c24bf8)
Assuming I m still in boot loader mode , what is the way to exit ?
on smart RF sniffer
I have an error : please upgrade your sniffer software Device ID=8 firmware ID =0x51
Le mer. 25 oct. 2023 à 19:24, fe8769 @.***> a écrit :
GREAT .................................................................................................................................................................................................................................................................................... madre de dios
Le mer. 25 oct. 2023 à 18:52, Marcelo Arredondo @.***> a écrit :
Hi fe8769,
Can you try doing the process to erase the memory again but change this command 'flash erase_sector 0 0 last' for 'flash erase_sector 0 1 last', this will jump sector 0 that seems to be getting stuck in the erase process. Let me know if this works. If the memory gets erased try loading a firmware again with the python tool as we discussed before.
— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1779681089, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7NL2KLLSSZDMITTDTYBE7V3AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZZGY4DCMBYHE . You are receiving this because you authored the thread.Message ID: @.***>
--
--
Those are great news, this means your board is ready to go. You should be able to change the firmware now at any moment with the python tool. After the firmware is loaded it is recommended just to reset the board once.
The error you sent in Packet Sniffer is just letting you know that you have an older version of the software, just go to the official Texas Instruments website and download the latest version, it should be 1.10
Well at least Packet sniffer is working . Thanks everyone for help .
Hello I just received my catsniffer today . I have 40 years of computers stall knowledge and the same in radio reception.
I don't know how to begun
Under windows 10 , my catsniffer is recognize as com 3 but no led are lighting I tried to push all buttons as described in documentation -- no chance
I have plenty of windows, linux , raspi computers all kind of versions
I installed the arduino IDE on a raspi 4 using dragon OS v31 (ubuntu) trying to communicate with catsniffer
I have error in running Arduino 1.8.19 like :+1:
Arduino: 1.8.19 (Linux), Board: "Arduino Uno"
/tmp/arduino_modified_sketch_710303/sketch_sep25a.ino: In function 'void setup()': sketch_sep25a:68:3: error: 'Serial1' was not declared in this scope Serial1.begin(baud); ^
~~ /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino:68:3: note: suggested alternative: 'Serial' Serial1.begin(baud); ^~~ Serial /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino: In function 'void loop()': sketch_sep25a:91:5: error: 'Serial1' was not declared in this scope Serial1.write(Serial.read()); // read it and send it out Serial1 (pins 0 & 1) ^~~ /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino:91:5: note: suggested alternative: 'Serial' Serial1.write(Serial.read()); // read it and send it out Serial1 (pins 0 & 1) ^~~ Serial sketch_sep25a:94:7: error: 'Serial1' was not declared in this scope if (Serial1.available()) { // If anything comes in Serial1 (pins 0 & 1) ^~~ /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino:94:7: note: suggested alternative: 'Serial' if (Serial1.available()) { // If anything comes in Serial1 (pins 0 & 1) ^~~ Serial exit status 1 'Serial1' was not declared in this scopeThis report would have more information with "Show verbose output during compilation" option enabled in File -> Preferences.
Can you explain the way to use catsniffer in windows 10 with TI packets sniffer
is there any different firmware for different applications ?
What is the exact way to start catsniffer
1- serial passthrough ? how ? 2- serial passthrough with bootloader ?
-- using sniffe ? how ? different firmware ?
Thanks for help