urjaman has quit [Read error: Connection reset by peer]
zkrx has quit [Ping timeout: 260 seconds]
zkrx has joined #openocd
urjaman has joined #openocd
tsal has quit [Ping timeout: 260 seconds]
tsal has joined #openocd
zjason has joined #openocd
Hawk777 has joined #openocd
renrelkha has quit [Quit: bye]
renrelkha has joined #openocd
jancoow has quit [Ping timeout: 246 seconds]
jancoow has joined #openocd
jancoow has quit [Write error: Connection reset by peer]
jancoow has joined #openocd
nerozero has joined #openocd
Hawk777 has quit [Quit: Leaving.]
Haohmaru has joined #openocd
Guest15 has joined #openocd
Guest15 has quit [Client Quit]
PsySc0rpi0n has quit [Quit: Leaving]
firelegend has joined #openocd
PsySc0rpi0n has joined #openocd
<firelegend>
Hey guys. I...have a question. I have a device with a JTAG interface, but it's actually JTAG-like. It supports boundary scan, but the rest of the powerful debug stuff which allow me to modify registers and single step are hidden. Any advice how I may be able to reverse engineer the protocol?
urjaman has quit [Ping timeout: 268 seconds]
<firelegend>
I mean I guess I could try openocd as-is, but I doubt it would work. My guess is a special mode must be entered by writing specific values for a specific duration
<karlp>
you can do boundary scan with openocd, though tit's not very common.
<karlp>
you're on your own for figuring things out though,
<karlp>
things like TI's icepick might provide some inspiration on what the mechanisms are though?
<karlp>
it's kinda hard to give useful feedback with "I've got this thing, and I want to figure it out" with no further information though :)
<firelegend>
Well it's the proprietary Hitachi Debug Interface so thats about as much as I know. Shares the same pins as JTAG, but everything else is hidden behind an NDA or expensive hardware worth thousands.
<firelegend>
But I also have no idea how to start. Bruteforce the protocol by fuzzing or decap the chip and see what hides underneath, but I have no microscope for that.
firelegend has quit [Quit: Client closed]
firelegend has joined #openocd
<karlp>
I'd be looking for old tools and docs, and, _at least_ talking specifically about what actual part you're trying to target when you speak to people :)
<firelegend>
Well it's an automotive ECU with a Renesas MCU. I've been reverse engineering the firmware, however without tracing and single stepping I am at a loss
<firelegend>
Yes, I have access to the datasheet, but it doesn't say anything about the other modes except boundary scan, and upon further research I was told all that related documentation of the JTAG-like interface is hidden behind NDAs for select few companies.
* karlp
shrugs
<karlp>
well, maybe someone else will help. You stillw on't even say what cpu you have, so I'm going to back to my own work.
<firelegend>
They are all pretty much the same, but it's SH7055
<firelegend>
Due to the nature of the architecture and compiler, without tracing, register inspection, a lot of functionality is not revealed.
<firelegend>
Especially when important MMIO registers were accessed with adding to a previous offset(not obfuscation) for space savings.
merethan_ has joined #openocd
crabbedhaloablut has quit [Ping timeout: 255 seconds]