]>
Commit | Line | Data |
---|---|---|
3bd76451 | 1 | ## |
50bd5d25 | 2 | ## This file is part of the libsigrokdecode project. |
3bd76451 UH |
3 | ## |
4 | ## Copyright (C) 2012 Uwe Hermann <uwe@hermann-uwe.de> | |
5 | ## | |
6 | ## This program is free software; you can redistribute it and/or modify | |
7 | ## it under the terms of the GNU General Public License as published by | |
8 | ## the Free Software Foundation; either version 2 of the License, or | |
9 | ## (at your option) any later version. | |
10 | ## | |
11 | ## This program is distributed in the hope that it will be useful, | |
12 | ## but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | ## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | ## GNU General Public License for more details. | |
15 | ## | |
16 | ## You should have received a copy of the GNU General Public License | |
17 | ## along with this program; if not, write to the Free Software | |
18 | ## Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA | |
19 | ## | |
20 | ||
21 | # AVR ISP protocol decoder | |
22 | ||
23 | import sigrokdecode as srd | |
77adad94 | 24 | from .parts import * |
3bd76451 UH |
25 | |
26 | VENDOR_CODE_ATMEL = 0x1e | |
27 | ||
28 | class Decoder(srd.Decoder): | |
29 | api_version = 1 | |
30 | id = 'avr_isp' | |
31 | name = 'AVR ISP' | |
d523eae6 | 32 | longname = 'AVR In-System Programming' |
3bd76451 UH |
33 | desc = 'Protocol for in-system programming Atmel AVR MCUs.' |
34 | license = 'gplv2+' | |
35 | inputs = ['spi', 'logic'] | |
36 | outputs = ['avr_isp'] | |
37 | probes = [] | |
38 | optional_probes = [ | |
39 | {'id': 'reset', 'name': 'RESET#', 'desc': 'Target AVR MCU reset'}, | |
40 | ] | |
41 | options = {} | |
42 | annotations = [ | |
43 | ['Text', 'Human-readable text'], | |
44 | ['Warnings', 'Human-readable warnings'], | |
45 | ] | |
46 | ||
47 | def __init__(self, **kwargs): | |
48 | self.state = 'IDLE' | |
49 | self.mosi_bytes, self.miso_bytes = [], [] | |
50 | self.cmd_ss, self.cmd_es = 0, 0 | |
51 | self.xx, self.yy, self.zz, self.mm = 0, 0, 0, 0 | |
52 | ||
8915b346 | 53 | def start(self): |
be465111 BV |
54 | # self.out_proto = self.register(srd.OUTPUT_PYTHON) |
55 | self.out_ann = self.register(srd.OUTPUT_ANN) | |
3bd76451 | 56 | |
3bd76451 UH |
57 | def putx(self, data): |
58 | self.put(self.cmd_ss, self.cmd_es, self.out_ann, data) | |
59 | ||
60 | def handle_cmd_programming_enable(self, cmd, ret): | |
61 | # Programming enable. | |
62 | # Note: The chip doesn't send any ACK for 'Programming enable'. | |
63 | self.putx([0, ['Programming enable']]) | |
64 | ||
65 | # Sanity check on reply. | |
66 | if ret[1:4] != [0xac, 0x53, cmd[2]]: | |
67 | self.putx([1, ['Warning: Unexpected bytes in reply!']]) | |
68 | ||
69 | def handle_cmd_read_signature_byte_0x00(self, cmd, ret): | |
70 | # Signature byte 0x00: vendor code. | |
71 | self.vendor_code = ret[3] | |
72 | v = vendor_code[self.vendor_code] | |
73 | self.putx([0, ['Vendor code: 0x%02x (%s)' % (ret[3], v)]]) | |
74 | ||
75 | # Store for later. | |
76 | self.xx = cmd[1] # Same as ret[2]. | |
77 | self.yy = cmd[3] | |
78 | self.zz = ret[0] | |
79 | ||
80 | # Sanity check on reply. | |
81 | if ret[1] != 0x30 or ret[2] != cmd[1]: | |
82 | self.putx([1, ['Warning: Unexpected bytes in reply!']]) | |
83 | ||
84 | # Sanity check for the vendor code. | |
85 | if self.vendor_code != VENDOR_CODE_ATMEL: | |
86 | self.putx([1, ['Warning: Vendor code was not 0x1e (Atmel)!']]) | |
87 | ||
88 | def handle_cmd_read_signature_byte_0x01(self, cmd, ret): | |
89 | # Signature byte 0x01: part family and memory size. | |
90 | self.part_fam_flash_size = ret[3] | |
91 | self.putx([0, ['Part family / memory size: 0x%02x' % ret[3]]]) | |
92 | ||
93 | # Store for later. | |
94 | self.mm = cmd[3] | |
95 | ||
96 | # Sanity check on reply. | |
97 | if ret[1] != 0x30 or ret[2] != cmd[1] or ret[0] != self.yy: | |
98 | self.putx([1, ['Warning: Unexpected bytes in reply!']]) | |
99 | ||
100 | def handle_cmd_read_signature_byte_0x02(self, cmd, ret): | |
101 | # Signature byte 0x02: part number. | |
102 | self.part_number = ret[3] | |
103 | self.putx([0, ['Part number: 0x%02x' % ret[3]]]) | |
104 | ||
105 | # TODO: Fix range. | |
106 | p = part[(self.part_fam_flash_size, self.part_number)] | |
107 | self.putx([0, ['Device: Atmel %s' % p]]) | |
108 | ||
109 | # Sanity check on reply. | |
110 | if ret[1] != 0x30 or ret[2] != self.xx or ret[0] != self.mm: | |
111 | self.putx([1, ['Warning: Unexpected bytes in reply!']]) | |
112 | ||
113 | self.xx, self.yy, self.zz, self.mm = 0, 0, 0, 0 | |
114 | ||
115 | def handle_cmd_chip_erase(self, cmd, ret): | |
1fd698dc UH |
116 | # Chip erase (erases both flash an EEPROM). |
117 | # Upon successful chip erase, the lock bits will also be erased. | |
118 | # The only way to end a Chip Erase cycle is to release RESET#. | |
3bd76451 UH |
119 | self.putx([0, ['Chip erase']]) |
120 | ||
1fd698dc UH |
121 | # TODO: Check/handle RESET#. |
122 | ||
123 | # Sanity check on reply. | |
124 | bit = (ret[2] & (1 << 7)) >> 7 | |
125 | if ret[1] != 0xac or bit != 1 or ret[3] != cmd[2]: | |
126 | self.putx([1, ['Warning: Unexpected bytes in reply!']]) | |
127 | ||
3bd76451 UH |
128 | def handle_cmd_read_fuse_bits(self, cmd, ret): |
129 | # Read fuse bits. | |
130 | self.putx([0, ['Read fuse bits: 0x%02x' % ret[3]]]) | |
131 | ||
132 | # TODO: Decode fuse bits. | |
133 | # TODO: Sanity check on reply. | |
134 | ||
135 | def handle_cmd_read_fuse_high_bits(self, cmd, ret): | |
136 | # Read fuse high bits. | |
137 | self.putx([0, ['Read fuse high bits: 0x%02x' % ret[3]]]) | |
138 | ||
139 | # TODO: Decode fuse bits. | |
140 | # TODO: Sanity check on reply. | |
141 | ||
142 | def handle_cmd_read_extended_fuse_bits(self, cmd, ret): | |
143 | # Read extended fuse bits. | |
144 | self.putx([0, ['Read extended fuse bits: 0x%02x' % ret[3]]]) | |
145 | ||
146 | # TODO: Decode fuse bits. | |
147 | # TODO: Sanity check on reply. | |
148 | ||
149 | def handle_command(self, cmd, ret): | |
150 | if cmd[:2] == [0xac, 0x53]: | |
151 | self.handle_cmd_programming_enable(cmd, ret) | |
152 | elif cmd[0] == 0xac and (cmd[1] & (1 << 7)) == (1 << 7): | |
153 | self.handle_cmd_chip_erase(cmd, ret) | |
154 | elif cmd[:3] == [0x50, 0x00, 0x00]: | |
155 | self.handle_cmd_read_fuse_bits(cmd, ret) | |
156 | elif cmd[:3] == [0x58, 0x08, 0x00]: | |
157 | self.handle_cmd_read_fuse_high_bits(cmd, ret) | |
158 | elif cmd[:3] == [0x50, 0x08, 0x00]: | |
159 | self.handle_cmd_read_extended_fuse_bits(cmd, ret) | |
160 | elif cmd[0] == 0x30 and cmd[2] == 0x00: | |
161 | self.handle_cmd_read_signature_byte_0x00(cmd, ret) | |
162 | elif cmd[0] == 0x30 and cmd[2] == 0x01: | |
163 | self.handle_cmd_read_signature_byte_0x01(cmd, ret) | |
164 | elif cmd[0] == 0x30 and cmd[2] == 0x02: | |
165 | self.handle_cmd_read_signature_byte_0x02(cmd, ret) | |
166 | else: | |
167 | c = '%02x %02x %02x %02x' % tuple(cmd) | |
168 | r = '%02x %02x %02x %02x' % tuple(ret) | |
169 | self.putx([0, ['Unknown command: %s (reply: %s)!' % (c, r)]]) | |
170 | ||
171 | def decode(self, ss, es, data): | |
172 | ptype, mosi, miso = data | |
173 | ||
174 | if ptype != 'DATA': | |
175 | return | |
176 | ||
177 | # self.put(0, 0, self.out_ann, | |
178 | # [0, ['MOSI: 0x%02x, MISO: 0x%02x' % (mosi, miso)]]) | |
179 | ||
180 | self.ss, self.es = ss, es | |
181 | ||
182 | # Append new bytes. | |
183 | self.mosi_bytes.append(mosi) | |
184 | self.miso_bytes.append(miso) | |
185 | ||
186 | if len(self.mosi_bytes) == 0: | |
187 | self.cmd_ss = ss | |
188 | ||
189 | # All commands consist of 4 bytes. | |
190 | if len(self.mosi_bytes) < 4: | |
191 | return | |
192 | ||
193 | self.cmd_es = es | |
194 | ||
195 | self.handle_command(self.mosi_bytes, self.miso_bytes) | |
196 | ||
197 | self.mosi_bytes = [] | |
198 | self.miso_bytes = [] | |
199 |