Quantcast
Channel: Raspberry Pi Forums
Viewing all articles
Browse latest Browse all 5424

General • Re: Verification of Boot ROM in RP2350

$
0
0
You can run a program on the RP2350 which will dump the 32KB ROM. Then you can manipulate that into being a binary image which you can then compare to what is built by that source code.

This MicroPython code run on my RP2350B board seems to have worked for me ...

Code:

from machine import mem8def Dump256BytePage(adr):  for msb in range(0, 256, 16):    h = "{:08X} :".format(adr + msb)    t = "  "    for lsb in range(16):      b = mem8[adr + msb + lsb]      h += " {:02X}".format(b)      if b > 0x20 and b < 0x7F : t += chr(b)      else                     : t += "."    print(h + t)for adr in range(0, 32*1024, 256):  Dump256BytePage(adr)  print("")

Code:

pi@Pi4B:~ $ mpremote connect /dev/ttyACM0 run dump-rp235x-rom.py > /tmp/rp235x-rom.txtpi@Pi4B:~ $ ls -l /tmp/rp235x-rom.txt-rw-r--r-- 1 pi pi 160000 Dec  9 15:43 /tmp/rp235x-rom.txt
Some snippets ...

Code:

00000000 : 00 00 00 F0 89 00 00 00 F9 02 00 00 F9 02 00 00  ................00000010 : 4D 75 02 02 D4 7C 75 00 35 00 28 43 29 20 32 30  Mu...|u.5.(C).2000000020 : 32 34 20 52 61 73 70 62 65 72 72 79 20 50 69 20  24.Raspberry.Pi.00000030 : 4C 74 64 00 84 FE 18 07 47 F6 D4 43 84 46 07 E0  Ltd.....G..C.F..00006740 : 00 01 01 72 61 73 70 62 65 72 72 79 70 69 2E 63  ...raspberrypi.c00006750 : 6F 6D 00 68 74 74 70 73 3A 2F 2F 72 61 73 70 62  om.https://raspb00006760 : 65 72 72 79 70 69 2E 63 6F 6D 2F 64 65 76 69 63  errypi.com/devic00006770 : 65 2F 52 50 32 3F 76 65 72 73 69 6F 6E 3D 01 78  e/RP2?version=.x00006780 : 78 78 78 78 78 78 78 78 78 78 00 52 61 73 70 62  xxxxxxxxxx.Raspb00006790 : 65 72 72 79 20 50 69 20 52 50 32 33 35 30 00 52  erry.Pi.RP2350.R000067A0 : 50 49 00 31 00 63 72 69 76 65 6E 73 00 00 00 00  PI.1.crivens....000067B0 : 43 67 53 67 53 67 98 67 8B 67 B0 67 75 69 3E 69  CgSgSg.g.g.gui>i000067C0 : 3C 68 74 6D 6C 3E 3C 68 65 61 64 3E 3C 6D 65 74  <html><head><met000067D0 : 61 20 68 74 74 70 2D 65 71 75 69 76 3D 22 72 65  a.http-equiv="re000067E0 : 66 72 65 73 68 22 20 63 6F 6E 74 65 6E 74 3D 22  fresh".content="000067F0 : 30 3B 55 52 4C 3D 27 27 22 2F 3E 3C 2F FA 36 62  0;URL=''"/></.6b00006800 : 6F 64 79 3E 52 65 64 69 72 65 63 74 69 6E 67 20  ody>Redirecting.00006810 : 74 6F 20 3C FD 48 72 65 66 FD 29 3E 3C 2F 61 FD  to.<.Href.)></a.00006820 : 2B 62 FC 25 3C 2F FB 6E B6 67 78 69 43 69 55 46  +b.%</.n.gxiCiUF00006830 : 32 20 42 6F 6F 74 6C 6F 61 64 65 72 20 76 31 2E  2.Bootloader.v1.00006840 : 30 0A 4D 6F 64 65 6C 3A 20 0A 42 6F 61 72 64 2D  0.Model:..Board-00006850 : 49 44 FD 0B 20 0A 10 50 94 0A 10 50 0E 6A 00 00  ID.....P...P.j..00006860 : 1B 6A 00 00 08 0B 10 50 28 0A 10 50 70 09 10 50  .j.....P(..Pp..P00006870 : 15 4D 00 00 0A 00 FC 01 03 06 00 00 08 00 02 00  .M..............00006880 : 01 09 02 37 00 02 01 00 80 19 09 04 00 00 02 08  ...7............00006890 : 06 50 00 07 05 81 02 40 00 00 07 05 02 02 40 00  .P.....@......@.000068A0 : 00 09 04 01 00 02 FF 00 00 00 07 05 03 02 40 00  ..............@.000068B0 : 00 07 05 84 02 40 00 00 12 01 10 02 00 00 00 40  .....@.........@000068C0 : 8A 2E 0F 00 00 01 01 02 03 01 14 00 03 00 57 49  ..............WI000068D0 : 4E 55 53 42 80 04 01 28 44 65 76 69 63 65 49 6E  NUSB...(DeviceIn000068E0 : 74 65 72 66 61 63 65 47 55 49 44 00 4E 7B 62 63  terfaceGUID.N{bc000068F0 : 37 33 39 38 63 31 2D 37 33 63 64 2D 34 63 62 37  7398c1-73cd-4cb700006900 : 2D 39 38 62 38 2D 39 31 33 61 38 66 63 61 37 62  -98b8-913a8fca7b00006910 : 66 36 7D 00 00 00 00 01 00 01 0C 00 03 08 00 20  f6}.............00006920 : 08 80 40 08 80 80 00 00 10 00 00 02 04 00 03 04  ..@.............00006930 : 00 04 10 00 00 10 B0 05 05 D0 06 05 D0 07 03 74  ...............t00006940 : 12 02 29 02 27 01 0B 20 F6 01 28 00 64 00 00 25  ..).'.....(.d..%00006950 : 39 00 FB 01 25 F9 08 49 4E 44 45 58 FD 25 48 54  9...%..INDEX.%HT00006960 : 4D 21 F2 20 02 F9 20 46 4F 5F 55 46 32 54 58 54  M!.....FO_UF2TXT00006970 : F1 20 03 FB 49 0D 0C 0C 0F 0E EB 3C 90 4D 53 57  ....I......<.MSW00006980 : 49 4E 34 2E 31 00 02 08 01 00 02 00 02 00 00 F8  IN4.1...........00006990 : 81 00 01 00 01 00 01 00 00 00 FF FF 03 00 00 00  ................000069A0 : 29 00 00 00 00 20 20 20 20 20 20 20 20 20 20 20  )...............000069B0 : 46 41 54 31 36 20 20 20 EB FE 00 08 08 08 0A 0B  FAT16...........00006A00 : 65 9D 9E 64 8A 9F 00 00 03 06 00 00 01 00 52 61  e..d..........Ra00006A10 : 73 70 62 65 72 72 79 20 50 69 00 52 50 32 33 35  spberry.Pi.RP23500006A20 : 30 20 42 6F 6F 74 00 00 BE 00 BE 00 F8 6A F8 6A  0.Boot.......j.j

Statistics: Posted by hippy — Mon Dec 09, 2024 3:49 pm



Viewing all articles
Browse latest Browse all 5424

Trending Articles