ElectronicCats / CatSniffer

CatSniffer is an original multiprotocol and multiband board for sniffing, communicating, and attacking IoT (Internet of Things) devices using the latest radio IoT protocols. It is a highly portable USB stick that integrates TI CC1352, Semtech SX1262, and an RP2040 for V3 or a Microchip SAMD21E17 for V2
https://github.com/ElectronicCats/CatSniffer
Other
507 stars 67 forks source link

ElectronicCats #49

Closed fe8769a closed 8 months ago

fe8769a commented 9 months ago

Hello I just received my catsniffer today . I have 40 years of computers stall knowledge and the same in radio reception.

I don't know how to begun

Under windows 10 , my catsniffer is recognize as com 3 but no led are lighting I tried to push all buttons as described in documentation -- no chance

I have plenty of windows, linux , raspi computers all kind of versions

I installed the arduino IDE on a raspi 4 using dragon OS v31 (ubuntu) trying to communicate with catsniffer

I have error in running Arduino 1.8.19 like :+1:

Arduino: 1.8.19 (Linux), Board: "Arduino Uno"

/tmp/arduino_modified_sketch_710303/sketch_sep25a.ino: In function 'void setup()': sketch_sep25a:68:3: error: 'Serial1' was not declared in this scope Serial1.begin(baud); ^~~ /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino:68:3: note: suggested alternative: 'Serial' Serial1.begin(baud); ^~~ Serial /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino: In function 'void loop()': sketch_sep25a:91:5: error: 'Serial1' was not declared in this scope Serial1.write(Serial.read()); // read it and send it out Serial1 (pins 0 & 1) ^~~ /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino:91:5: note: suggested alternative: 'Serial' Serial1.write(Serial.read()); // read it and send it out Serial1 (pins 0 & 1) ^~~ Serial sketch_sep25a:94:7: error: 'Serial1' was not declared in this scope if (Serial1.available()) { // If anything comes in Serial1 (pins 0 & 1) ^~~ /tmp/arduino_modified_sketch_710303/sketch_sep25a.ino:94:7: note: suggested alternative: 'Serial' if (Serial1.available()) { // If anything comes in Serial1 (pins 0 & 1) ^~~ Serial exit status 1 'Serial1' was not declared in this scope

This report would have more information with "Show verbose output during compilation" option enabled in File -> Preferences.


Can you explain the way to use catsniffer in windows 10 with TI packets sniffer

is there any different firmware for different applications ?

What is the exact way to start catsniffer

1- serial passthrough ? how ? 2- serial passthrough with bootloader ?

-- using sniffe ? how ? different firmware ?

Thanks for help

Marcelol52 commented 8 months ago

Okya, thanks for trying agian. Let me check if I can replicate the issue and find a solution.

alphafox02 commented 8 months ago

For the record I too had the same exact failure to erase the flash when I ran openocd with windows. I messed around and erased portions of it and eventually gave up. Turning it back on would result in no leds.

However, no leds turned out to not be a problem and getting the rp2040 back was as simple as using the different button combo you mentioned above.

What’s very odd is that I built openocd on Linux and this time the flash completely erased, I returned the rp2040 back to serial with boot loader, and was able to flash the firmware over and over with the waterfall of leds going and the 4th led off.

What’s even more odd is that I made a video of the steps but during the video I failed to get an erase of the flash on Linux with openocd, but still managed to get back into bootloader mode .

Video is up on Youtube.

fe8769a commented 8 months ago

do you have direct link to youtube , I can find only links to dragon os or wardragon

thanks

Le lun. 23 oct. 2023 à 18:50, alphafox02 @.***> a écrit :

For the record I too had the same exact failure to erase the flash when I ran openocd with windows. I messed around and erased portions of it and eventually gave up. Turning it back on would result in no leds.

However, no leds turned out to not be a problem and getting the rp2040 back was as simple as using the different button combo you mentioned above.

What’s very odd is that I built openocd on Linux and this time the flash completely erased, I returned the rp2040 back to serial with boot loader, and was able to flash the firmware over and over with the waterfall of leds going and the 4th led off.

What’s even more odd is that I made a video of the steps but during the video I failed to get an erase of the flash on Linux with openocd, but still managed to get back into bootloader mode .

Video is up on Youtube.

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775609999, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7BMYZME7QAMA3GRJLYA2N7DAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVGYYDSOJZHE . You are receiving this because you authored the thread.Message ID: @.***>

--

fe8769a commented 8 months ago

I still have access to telnet and openocd . I made my tests with linux because under windows I have a compil error in make -openocd

Le lun. 23 oct. 2023 à 18:54, fe8769 @.***> a écrit :

do you have direct link to youtube , I can find only links to dragon os or wardragon

thanks

Le lun. 23 oct. 2023 à 18:50, alphafox02 @.***> a écrit :

For the record I too had the same exact failure to erase the flash when I ran openocd with windows. I messed around and erased portions of it and eventually gave up. Turning it back on would result in no leds.

However, no leds turned out to not be a problem and getting the rp2040 back was as simple as using the different button combo you mentioned above.

What’s very odd is that I built openocd on Linux and this time the flash completely erased, I returned the rp2040 back to serial with boot loader, and was able to flash the firmware over and over with the waterfall of leds going and the 4th led off.

What’s even more odd is that I made a video of the steps but during the video I failed to get an erase of the flash on Linux with openocd, but still managed to get back into bootloader mode .

Video is up on Youtube.

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775609999, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7BMYZME7QAMA3GRJLYA2N7DAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVGYYDSOJZHE . You are receiving this because you authored the thread.Message ID: @.***>

--

--

alphafox02 commented 8 months ago

WarDragon Flashing CatSniffer w/ Sniffle + Overall Usage Tips (V3.1, DragonOS FocalX) https://youtu.be/GgVDzQrIjXc

In English and very important to pay attention to differences in way or getting to rp2040 depending on what you have it loaded with. You’ll see my flash did not erase, but I was still able to get back to boot loader mode and flash.

fe8769a commented 8 months ago

I watched your video . I have the same error :

failed erasing sectors 0 to 87

I restart laptop, change usb port (2 in front, 1 in back) . I have always this error

I tried to google my error "DAP transaction stalled (WAIT) - slowing down" but I'm lost by english and knowledge

It could be a wrong setting in cfg files

Le lun. 23 oct. 2023 à 19:56, alphafox02 @.***> a écrit :

WarDragon Flashing CatSniffer w/ Sniffle + Overall Usage Tips (V3.1, DragonOS FocalX) https://youtu.be/GgVDzQrIjXc

In English and very important to pay attention to differences in way or getting to rp2040 depending on what you have it loaded with. You’ll see my flash did not erase, but I was still able to get back to boot loader mode and flash.

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775724253, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV3E4MCWU7W6YKYIT4DYA2VWHAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVG4ZDIMRVGM . You are receiving this because you authored the thread.Message ID: @.***>

--

alphafox02 commented 8 months ago

Unlikely, as I did the same steps and as I mentioned in the video it did in fact erase one time. But as I showed, even when it failed, I was able to recover.

Try this in the state you have it now. Plus the CatSniffer in, there will be no lights on. Press an hold Reset 1 then SW1, then release Reset 1 and then release SW1 in that exact order. If the USB C port is facing left and you're looking down at the switches, Reset 1 is on the right and SW1 is on the left.

That should pop up the RP2040. Drag over the serial with boot loader file from the V3 firmware folder and let the CatSniffer process it, I think you'll then see a couple lights blinking. Then push and hold Boot1, then Reset 1, then release Reset 1 and then release boot 1. You should see 3 lights doing a waterfall pattern with one led completely off.

Now try and use the python tool and load the firmware like I show in the video.

alphafox02 commented 8 months ago

Also once you have the boot loader with serial loaded back on the procedure to get into the RP2040 will be like it was when you originally received the CatSniffer.

Marcelol52 commented 8 months ago

Also once you have the boot loader with serial loaded back on the procedure to get into the RP2040 will be like it was when you originally received the CatSniffer.

With either firmware loaded on the RP2040 you can use the second method (Press an hold Reset 1 then SW1, then release Reset 1 and then release SW1) to enter bootloader mode. We are going to change the wiki to show this, I think this will make it easier to understand.

alphafox02 commented 8 months ago

That'd be great, would help avoid confusion. I still have no idea why I was able to erase once with Openocd but only once on linux after having tried it on Windows.

Curious though as to what the point of erasing the flash is since I was able to get back into bootloader mode without it completing the flash erase? Also, if you recall, all my first attempts at getting into bootloader mode was met with the waterfall of lights and a flashing 4th light.

I'm not sure if that one successful erase of the flash is what did it, but now each time I do the bootloader mode I get the waterfall of lights with no 4th led on and a good flash of firmware.

fe8769a commented 8 months ago

Well I'm lost with a lot of information and lack of english knowledge ..

all my leds are now OFF . What is the way to go back to a normal state ?

what is the exact way of switches

General purpose switch mean ? reset SAMD : reset CC1352 reset CC1352

LEDS

On wiki LED 2 is top of card

So it is LED 2 LED 1 LED 3 LED4 at the bottom


My only request is to use TI packet sniffer

Le lun. 23 oct. 2023 à 22:00, alphafox02 @.***> a écrit :

That'd be great, would help avoid confusion. I still have no idea why I was able to erase once with Openocd but only once on linux after having tried it on Windows.

Curious though as to what the point of erasing the flash is since I was able to get back into bootloader mode without it completing the flash erase? Also, if you recall, all my first attempts at getting into bootloader mode was met with the waterfall of lights and a flashing 4th light.

I'm not sure if that one successful erase of the flash is what did it, but now each time I do the bootloader mode I get the waterfall of lights with no 4th led on and a good flash of firmware.

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1775929383, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDVYWAFJ7GD6HMEF46DLYA3EGDAVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZVHEZDSMZYGM . You are receiving this because you authored the thread.Message ID: @.***>

--

alphafox02 commented 8 months ago

Position CatSniffer with USB C port facing left. Look down at the buttons. Press and hold Reset 1 (top right button) then press and hold SW1 (top left button) then release Reset 1 then release SW 1.

You should see RP2040 pop up a drive on your laptop. Drag over the file and place it into the storage that opened SerialPassthroughwithboot.ino.elf.uf2

You should now be back to having lights, hopefully. From here, still have your CatSniffer with USBC facing left. Then press and hold Boot 1 (bottom right) button, then press and hold Reset one (top right), then release Reset one then release boot 1 and see if you have the LED 2, LED1, and LED3 blinking downwards with LED4 off.

If you made it this far it should be in bootloader mode. Then proceed to load firmware with the python tool.

Marcelol52 commented 8 months ago

That'd be great, would help avoid confusion. I still have no idea why I was able to erase once with Openocd but only once on linux after having tried it on Windows.

Curious though as to what the point of erasing the flash is since I was able to get back into bootloader mode without it completing the flash erase? Also, if you recall, all my first attempts at getting into bootloader mode was met with the waterfall of lights and a flashing 4th light.

I'm not sure if that one successful erase of the flash is what did it, but now each time I do the bootloader mode I get the waterfall of lights with no 4th led on and a good flash of firmware.

Answering your question about erasing the flash. When a firmware is incorrectly loaded to the cc1352 the board's bootloder can break or get deactivated. This will keep the board from going into bootloader mode (waterfall pattern), and you will not be able to load other firmwares. The only way to recover the board is by erasing the memory on the cc1352. Before, with CatSniffer v2 the only way to achive this was with an external cJTAG programmer. With CatSniffer V3 you can use the RP2040 to erase the memory "form inside". If you were able to do it successfully at least once, that restored the bootloader on your board and that is why you are now able to load any other firmware with the python tool.

Marcelol52 commented 8 months ago

I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU. CatSniffer_bootloader_modes

fe8769a commented 8 months ago

Hello

With no LED I'm able to see catsniffer under windows in COM9

Then on a linux laptop :

I was able to restore leds.

I was able to copy SerialPassthroughwithboot.ino.elf.uf2 to media pressing twice button

Now in order to respect documentation, I need to put CC1352 in bootloader mode . After reading all messages here , I have 2 methods (one with picture , one in text)

1- HOLD BOOT1, PRESS RESETS RELEASE BOOT1 --> top D3 led is blinking

the result

sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex [sudo] password for fe8769: Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'

2- HOLD RESET1, HOLD BOOT1 , RELEASE RESET1

LED D3 LED D2 LED D1 are blinking one after the others

The result :

sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'

after

I tried to erase

I copy free_dap_catsniffer.uf2 to the media --> all LEDS went OFF

ON one terminal, I did

sudo openocd -f interface/cmsis-dap.cfg -c "transport select jtag" -f target/ti_cc13x2.cfg -s tcl [sudo] password for fe8769: Open On-Chip Debugger 0.11.0 Licensed under GNU GPL v2 For bug reports, read http://openocd.org/doc/doxygen/bugs.html jtag cortex_m reset_config vectreset

Info : Listening on port 6666 for tcl connections Info : Listening on port 4444 for telnet connections Info : Using CMSIS-DAPv2 interface with VID:PID=0x6666:0x9930, serial=7F17C5F9 Info : CMSIS-DAP: SWD Supported Info : CMSIS-DAP: JTAG Supported Info : CMSIS-DAP: FW Version = 2.0.0 Info : CMSIS-DAP: Serial# = 7F17C5F9 Info : CMSIS-DAP: Interface Initialised (JTAG) Info : SWCLK/TCK = 1 SWDIO/TMS = 1 TDI = 1 TDO = 0 nTRST = 0 nRESET = 1 Info : CMSIS-DAP: Interface ready Info : clock speed 4000 kHz Info : cmsis-dap JTAG TLR_RESET Info : cmsis-dap JTAG TLR_RESET Info : JTAG tap: cc13x2.jrc tap/device found: 0x1bb7702f (mfg: 0x017 (Texas Instruments), part: 0xbb77, ver: 0x1) Info : JTAG tap: cc13x2.cpu enabled Info : cc13x2.cpu: hardware has 6 breakpoints, 4 watchpoints Info : starting gdb server for cc13x2.cpu on 3333 Info : Listening on port 3333 for gdb connections Info : accepting 'telnet' connection on tcp/4444 target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0

On other terminal I did

elnet localhost 4444 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. Open On-Chip Debugger

halt target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0 flash erase_sector 0 0 last DAP transaction stalled (WAIT) - slowing down cc26xx: Flash operation failed failed erasing sectors 0 to 87

So now what can I do ?

Le mar. 24 oct. 2023 à 00:11, Marcelo Arredondo @.***> a écrit :

I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU. [image: CatSniffer_bootloader_modes] https://user-images.githubusercontent.com/139595394/277489617-f98a0435-7da1-495f-9825-c9bff894498f.png

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1776102441, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV2CIKAOXRWWZN4LRHTYA3TR7AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZWGEYDENBUGE . You are receiving this because you authored the thread.Message ID: @.***>

--

fe8769a commented 8 months ago

I have exactly what alphafox02 did

Position CatSniffer with USB C port facing left. Look down at the buttons. Press and hold Reset 1 (top right button) then press and hold SW1 (top left button) then release Reset 1 then release SW 1.

You should see RP2040 pop up a drive on your laptop. Drag over the file and place it into the storage that opened SerialPassthroughwithboot.ino.elf.uf2 -----------------------------> fine

You should now be back to having lights, hopefully. From here, still have your CatSniffer with USBC facing left. Then press and hold Boot 1 (bottom right) button, then press and hold Reset one (top right), then release Reset one then release boot 1 and see if you have the LED 2, LED1, and LED3 blinking downwards with LED4 off. --------------> FINE -means in bootloader mode

If you made it this far it should be in bootloader mode. Then proceed to load firmware with the python tool. -----------> Timeout

Le mar. 24 oct. 2023 à 22:14, fe8769 @.***> a écrit :

Hello

With no LED I'm able to see catsniffer under windows in COM9

Then on a linux laptop :

I was able to restore leds.

I was able to copy SerialPassthroughwithboot.ino.elf.uf2 to media pressing twice button

Now in order to respect documentation, I need to put CC1352 in bootloader mode . After reading all messages here , I have 2 methods (one with picture , one in text)

1- HOLD BOOT1, PRESS RESETS RELEASE BOOT1 --> top D3 led is blinking

the result

sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex [sudo] password for fe8769: Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'

2- HOLD RESET1, HOLD BOOT1 , RELEASE RESET1

LED D3 LED D2 LED D1 are blinking one after the others

The result :

sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'

after

I tried to erase

I copy free_dap_catsniffer.uf2 to the media --> all LEDS went OFF

ON one terminal, I did

sudo openocd -f interface/cmsis-dap.cfg -c "transport select jtag" -f target/ti_cc13x2.cfg -s tcl [sudo] password for fe8769: Open On-Chip Debugger 0.11.0 Licensed under GNU GPL v2 For bug reports, read http://openocd.org/doc/doxygen/bugs.html jtag cortex_m reset_config vectreset

Info : Listening on port 6666 for tcl connections Info : Listening on port 4444 for telnet connections Info : Using CMSIS-DAPv2 interface with VID:PID=0x6666:0x9930, serial=7F17C5F9 Info : CMSIS-DAP: SWD Supported Info : CMSIS-DAP: JTAG Supported Info : CMSIS-DAP: FW Version = 2.0.0 Info : CMSIS-DAP: Serial# = 7F17C5F9 Info : CMSIS-DAP: Interface Initialised (JTAG) Info : SWCLK/TCK = 1 SWDIO/TMS = 1 TDI = 1 TDO = 0 nTRST = 0 nRESET = 1 Info : CMSIS-DAP: Interface ready Info : clock speed 4000 kHz Info : cmsis-dap JTAG TLR_RESET Info : cmsis-dap JTAG TLR_RESET Info : JTAG tap: cc13x2.jrc tap/device found: 0x1bb7702f (mfg: 0x017 (Texas Instruments), part: 0xbb77, ver: 0x1) Info : JTAG tap: cc13x2.cpu enabled Info : cc13x2.cpu: hardware has 6 breakpoints, 4 watchpoints Info : starting gdb server for cc13x2.cpu on 3333 Info : Listening on port 3333 for gdb connections Info : accepting 'telnet' connection on tcp/4444 target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0

On other terminal I did

elnet localhost 4444 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. Open On-Chip Debugger

halt target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0 flash erase_sector 0 0 last DAP transaction stalled (WAIT) - slowing down cc26xx: Flash operation failed failed erasing sectors 0 to 87

So now what can I do ?

Le mar. 24 oct. 2023 à 00:11, Marcelo Arredondo @.***> a écrit :

I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU. [image: CatSniffer_bootloader_modes] https://user-images.githubusercontent.com/139595394/277489617-f98a0435-7da1-495f-9825-c9bff894498f.png

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1776102441, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV2CIKAOXRWWZN4LRHTYA3TR7AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZWGEYDENBUGE . You are receiving this because you authored the thread.Message ID: @.***>

--

--

fe8769a commented 8 months ago

Same with windows 10 - same error

Le mer. 25 oct. 2023 à 16:19, fe8769 @.***> a écrit :

I have exactly what alphafox02 did

Position CatSniffer with USB C port facing left. Look down at the buttons. Press and hold Reset 1 (top right button) then press and hold SW1 (top left button) then release Reset 1 then release SW 1.

You should see RP2040 pop up a drive on your laptop. Drag over the file and place it into the storage that opened SerialPassthroughwithboot.ino.elf.uf2 -----------------------------> fine

You should now be back to having lights, hopefully. From here, still have your CatSniffer with USBC facing left. Then press and hold Boot 1 (bottom right) button, then press and hold Reset one (top right), then release Reset one then release boot 1 and see if you have the LED 2, LED1, and LED3 blinking downwards with LED4 off. --------------> FINE -means in bootloader mode

If you made it this far it should be in bootloader mode. Then proceed to load firmware with the python tool. -----------> Timeout

Le mar. 24 oct. 2023 à 22:14, fe8769 @.***> a écrit :

Hello

With no LED I'm able to see catsniffer under windows in COM9

Then on a linux laptop :

I was able to restore leds.

I was able to copy SerialPassthroughwithboot.ino.elf.uf2 to media pressing twice button

Now in order to respect documentation, I need to put CC1352 in bootloader mode . After reading all messages here , I have 2 methods (one with picture , one in text)

1- HOLD BOOT1, PRESS RESETS RELEASE BOOT1 --> top D3 led is blinking

the result

sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex [sudo] password for fe8769: Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'

2- HOLD RESET1, HOLD BOOT1 , RELEASE RESET1

LED D3 LED D2 LED D1 are blinking one after the others

The result :

sudo python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... ERROR: Timeout waiting for ACK/NACK after 'Synch (0x55 0x55)'

after

I tried to erase

I copy free_dap_catsniffer.uf2 to the media --> all LEDS went OFF

ON one terminal, I did

sudo openocd -f interface/cmsis-dap.cfg -c "transport select jtag" -f target/ti_cc13x2.cfg -s tcl [sudo] password for fe8769: Open On-Chip Debugger 0.11.0 Licensed under GNU GPL v2 For bug reports, read http://openocd.org/doc/doxygen/bugs.html jtag cortex_m reset_config vectreset

Info : Listening on port 6666 for tcl connections Info : Listening on port 4444 for telnet connections Info : Using CMSIS-DAPv2 interface with VID:PID=0x6666:0x9930, serial=7F17C5F9 Info : CMSIS-DAP: SWD Supported Info : CMSIS-DAP: JTAG Supported Info : CMSIS-DAP: FW Version = 2.0.0 Info : CMSIS-DAP: Serial# = 7F17C5F9 Info : CMSIS-DAP: Interface Initialised (JTAG) Info : SWCLK/TCK = 1 SWDIO/TMS = 1 TDI = 1 TDO = 0 nTRST = 0 nRESET = 1 Info : CMSIS-DAP: Interface ready Info : clock speed 4000 kHz Info : cmsis-dap JTAG TLR_RESET Info : cmsis-dap JTAG TLR_RESET Info : JTAG tap: cc13x2.jrc tap/device found: 0x1bb7702f (mfg: 0x017 (Texas Instruments), part: 0xbb77, ver: 0x1) Info : JTAG tap: cc13x2.cpu enabled Info : cc13x2.cpu: hardware has 6 breakpoints, 4 watchpoints Info : starting gdb server for cc13x2.cpu on 3333 Info : Listening on port 3333 for gdb connections Info : accepting 'telnet' connection on tcp/4444 target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0

On other terminal I did

elnet localhost 4444 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. Open On-Chip Debugger

halt target halted due to debug-request, current mode: Thread xPSR: 0x61000000 pc: 0x1000118e msp: 0x11001ff0 flash erase_sector 0 0 last DAP transaction stalled (WAIT) - slowing down cc26xx: Flash operation failed failed erasing sectors 0 to 87

So now what can I do ?

Le mar. 24 oct. 2023 à 00:11, Marcelo Arredondo @.***> a écrit :

I will leave this image I made here, hope it clarifies the bootloader methods we suggest for each MCU. [image: CatSniffer_bootloader_modes] https://user-images.githubusercontent.com/139595394/277489617-f98a0435-7da1-495f-9825-c9bff894498f.png

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1776102441, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV2CIKAOXRWWZN4LRHTYA3TR7AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZWGEYDENBUGE . You are receiving this because you authored the thread.Message ID: @.***>

--

--

--

Marcelol52 commented 8 months ago

Hi fe8769,

Can you try doing the process to erase the memory again but change this command 'flash erase_sector 0 0 last' for 'flash erase_sector 0 1 last', this will jump sector 0 that seems to be getting stuck in the erase process. Let me know if this works. If the memory gets erased try loading a firmware again with the python tool as we discussed before.

fe8769a commented 8 months ago

GREAT .................................................................................................................................................................................................................................................................................... madre de dios

Le mer. 25 oct. 2023 à 18:52, Marcelo Arredondo @.***> a écrit :

Hi fe8769,

Can you try doing the process to erase the memory again but change this command 'flash erase_sector 0 0 last' for 'flash erase_sector 0 1 last', this will jump sector 0 that seems to be getting stuck in the erase process. Let me know if this works. If the memory gets erased try loading a firmware again with the python tool as we discussed before.

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1779681089, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7NL2KLLSSZDMITTDTYBE7V3AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZZGY4DCMBYHE . You are receiving this because you authored the thread.Message ID: @.***>

--

fe8769a commented 8 months ago

python3 cc2538-bsl.py -e -w -v sniffer_fw_Catsniffer_v3.x.hex Opening port /dev/ttyACM0, baud 500000 Reading data from sniffer_fw_Catsniffer_v3.x.hex Firmware file: Intel Hex Connecting to target... CC1350 PG2.0 (7x7mm): 704KB Flash, 20KB SRAM, CCFG.BL_CONFIG at 0x000AFFD8 Primary IEEE Address: 00:12:4B:00:29:B6:82:4C Performing mass erase Erasing all main bank flash sectors Erase done Writing 720896 bytes starting at address 0x00000000 Write 208 bytes at 0x000AFF308 Write done Verifying by comparing CRC32 calculations. Verified (match: 0x52c24bf8)

Assuming I m still in boot loader mode , what is the way to exit ?

on smart RF sniffer

I have an error : please upgrade your sniffer software Device ID=8 firmware ID =0x51

Le mer. 25 oct. 2023 à 19:24, fe8769 @.***> a écrit :

GREAT .................................................................................................................................................................................................................................................................................... madre de dios

Le mer. 25 oct. 2023 à 18:52, Marcelo Arredondo @.***> a écrit :

Hi fe8769,

Can you try doing the process to erase the memory again but change this command 'flash erase_sector 0 0 last' for 'flash erase_sector 0 1 last', this will jump sector 0 that seems to be getting stuck in the erase process. Let me know if this works. If the memory gets erased try loading a firmware again with the python tool as we discussed before.

— Reply to this email directly, view it on GitHub https://github.com/ElectronicCats/CatSniffer/issues/49#issuecomment-1779681089, or unsubscribe https://github.com/notifications/unsubscribe-auth/AIANDV7NL2KLLSSZDMITTDTYBE7V3AVCNFSM6AAAAAA5GP7MB6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTONZZGY4DCMBYHE . You are receiving this because you authored the thread.Message ID: @.***>

--

--

Marcelol52 commented 8 months ago

Those are great news, this means your board is ready to go. You should be able to change the firmware now at any moment with the python tool. After the firmware is loaded it is recommended just to reset the board once.

The error you sent in Packet Sniffer is just letting you know that you have an older version of the software, just go to the official Texas Instruments website and download the latest version, it should be 1.10

fe8769a commented 8 months ago

Well at least Packet sniffer is working . Thanks everyone for help .