]> sigrok.org Git - libsigrokdecode.git/blame - decoders/avr_isp/pd.py
Avoid GError warning when unloading decoders.
[libsigrokdecode.git] / decoders / avr_isp / pd.py
CommitLineData
3bd76451 1##
50bd5d25 2## This file is part of the libsigrokdecode project.
3bd76451
UH
3##
4## Copyright (C) 2012 Uwe Hermann <uwe@hermann-uwe.de>
5##
6## This program is free software; you can redistribute it and/or modify
7## it under the terms of the GNU General Public License as published by
8## the Free Software Foundation; either version 2 of the License, or
9## (at your option) any later version.
10##
11## This program is distributed in the hope that it will be useful,
12## but WITHOUT ANY WARRANTY; without even the implied warranty of
13## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14## GNU General Public License for more details.
15##
16## You should have received a copy of the GNU General Public License
17## along with this program; if not, write to the Free Software
18## Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19##
20
21# AVR ISP protocol decoder
22
23import sigrokdecode as srd
77adad94 24from .parts import *
3bd76451
UH
25
26VENDOR_CODE_ATMEL = 0x1e
27
28class Decoder(srd.Decoder):
29 api_version = 1
30 id = 'avr_isp'
31 name = 'AVR ISP'
d523eae6 32 longname = 'AVR In-System Programming'
3bd76451
UH
33 desc = 'Protocol for in-system programming Atmel AVR MCUs.'
34 license = 'gplv2+'
35 inputs = ['spi', 'logic']
36 outputs = ['avr_isp']
37 probes = []
38 optional_probes = [
39 {'id': 'reset', 'name': 'RESET#', 'desc': 'Target AVR MCU reset'},
40 ]
41 options = {}
42 annotations = [
43 ['Text', 'Human-readable text'],
44 ['Warnings', 'Human-readable warnings'],
45 ]
46
47 def __init__(self, **kwargs):
48 self.state = 'IDLE'
49 self.mosi_bytes, self.miso_bytes = [], []
50 self.cmd_ss, self.cmd_es = 0, 0
51 self.xx, self.yy, self.zz, self.mm = 0, 0, 0, 0
52
8915b346 53 def start(self):
be465111
BV
54 # self.out_proto = self.register(srd.OUTPUT_PYTHON)
55 self.out_ann = self.register(srd.OUTPUT_ANN)
3bd76451 56
3bd76451
UH
57 def putx(self, data):
58 self.put(self.cmd_ss, self.cmd_es, self.out_ann, data)
59
60 def handle_cmd_programming_enable(self, cmd, ret):
61 # Programming enable.
62 # Note: The chip doesn't send any ACK for 'Programming enable'.
63 self.putx([0, ['Programming enable']])
64
65 # Sanity check on reply.
66 if ret[1:4] != [0xac, 0x53, cmd[2]]:
67 self.putx([1, ['Warning: Unexpected bytes in reply!']])
68
69 def handle_cmd_read_signature_byte_0x00(self, cmd, ret):
70 # Signature byte 0x00: vendor code.
71 self.vendor_code = ret[3]
72 v = vendor_code[self.vendor_code]
73 self.putx([0, ['Vendor code: 0x%02x (%s)' % (ret[3], v)]])
74
75 # Store for later.
76 self.xx = cmd[1] # Same as ret[2].
77 self.yy = cmd[3]
78 self.zz = ret[0]
79
80 # Sanity check on reply.
81 if ret[1] != 0x30 or ret[2] != cmd[1]:
82 self.putx([1, ['Warning: Unexpected bytes in reply!']])
83
84 # Sanity check for the vendor code.
85 if self.vendor_code != VENDOR_CODE_ATMEL:
86 self.putx([1, ['Warning: Vendor code was not 0x1e (Atmel)!']])
87
88 def handle_cmd_read_signature_byte_0x01(self, cmd, ret):
89 # Signature byte 0x01: part family and memory size.
90 self.part_fam_flash_size = ret[3]
91 self.putx([0, ['Part family / memory size: 0x%02x' % ret[3]]])
92
93 # Store for later.
94 self.mm = cmd[3]
95
96 # Sanity check on reply.
97 if ret[1] != 0x30 or ret[2] != cmd[1] or ret[0] != self.yy:
98 self.putx([1, ['Warning: Unexpected bytes in reply!']])
99
100 def handle_cmd_read_signature_byte_0x02(self, cmd, ret):
101 # Signature byte 0x02: part number.
102 self.part_number = ret[3]
103 self.putx([0, ['Part number: 0x%02x' % ret[3]]])
104
105 # TODO: Fix range.
106 p = part[(self.part_fam_flash_size, self.part_number)]
107 self.putx([0, ['Device: Atmel %s' % p]])
108
109 # Sanity check on reply.
110 if ret[1] != 0x30 or ret[2] != self.xx or ret[0] != self.mm:
111 self.putx([1, ['Warning: Unexpected bytes in reply!']])
112
113 self.xx, self.yy, self.zz, self.mm = 0, 0, 0, 0
114
115 def handle_cmd_chip_erase(self, cmd, ret):
1fd698dc
UH
116 # Chip erase (erases both flash an EEPROM).
117 # Upon successful chip erase, the lock bits will also be erased.
118 # The only way to end a Chip Erase cycle is to release RESET#.
3bd76451
UH
119 self.putx([0, ['Chip erase']])
120
1fd698dc
UH
121 # TODO: Check/handle RESET#.
122
123 # Sanity check on reply.
124 bit = (ret[2] & (1 << 7)) >> 7
125 if ret[1] != 0xac or bit != 1 or ret[3] != cmd[2]:
126 self.putx([1, ['Warning: Unexpected bytes in reply!']])
127
3bd76451
UH
128 def handle_cmd_read_fuse_bits(self, cmd, ret):
129 # Read fuse bits.
130 self.putx([0, ['Read fuse bits: 0x%02x' % ret[3]]])
131
132 # TODO: Decode fuse bits.
133 # TODO: Sanity check on reply.
134
135 def handle_cmd_read_fuse_high_bits(self, cmd, ret):
136 # Read fuse high bits.
137 self.putx([0, ['Read fuse high bits: 0x%02x' % ret[3]]])
138
139 # TODO: Decode fuse bits.
140 # TODO: Sanity check on reply.
141
142 def handle_cmd_read_extended_fuse_bits(self, cmd, ret):
143 # Read extended fuse bits.
144 self.putx([0, ['Read extended fuse bits: 0x%02x' % ret[3]]])
145
146 # TODO: Decode fuse bits.
147 # TODO: Sanity check on reply.
148
149 def handle_command(self, cmd, ret):
150 if cmd[:2] == [0xac, 0x53]:
151 self.handle_cmd_programming_enable(cmd, ret)
152 elif cmd[0] == 0xac and (cmd[1] & (1 << 7)) == (1 << 7):
153 self.handle_cmd_chip_erase(cmd, ret)
154 elif cmd[:3] == [0x50, 0x00, 0x00]:
155 self.handle_cmd_read_fuse_bits(cmd, ret)
156 elif cmd[:3] == [0x58, 0x08, 0x00]:
157 self.handle_cmd_read_fuse_high_bits(cmd, ret)
158 elif cmd[:3] == [0x50, 0x08, 0x00]:
159 self.handle_cmd_read_extended_fuse_bits(cmd, ret)
160 elif cmd[0] == 0x30 and cmd[2] == 0x00:
161 self.handle_cmd_read_signature_byte_0x00(cmd, ret)
162 elif cmd[0] == 0x30 and cmd[2] == 0x01:
163 self.handle_cmd_read_signature_byte_0x01(cmd, ret)
164 elif cmd[0] == 0x30 and cmd[2] == 0x02:
165 self.handle_cmd_read_signature_byte_0x02(cmd, ret)
166 else:
167 c = '%02x %02x %02x %02x' % tuple(cmd)
168 r = '%02x %02x %02x %02x' % tuple(ret)
169 self.putx([0, ['Unknown command: %s (reply: %s)!' % (c, r)]])
170
171 def decode(self, ss, es, data):
172 ptype, mosi, miso = data
173
174 if ptype != 'DATA':
175 return
176
177 # self.put(0, 0, self.out_ann,
178 # [0, ['MOSI: 0x%02x, MISO: 0x%02x' % (mosi, miso)]])
179
180 self.ss, self.es = ss, es
181
182 # Append new bytes.
183 self.mosi_bytes.append(mosi)
184 self.miso_bytes.append(miso)
185
186 if len(self.mosi_bytes) == 0:
187 self.cmd_ss = ss
188
189 # All commands consist of 4 bytes.
190 if len(self.mosi_bytes) < 4:
191 return
192
193 self.cmd_es = es
194
195 self.handle_command(self.mosi_bytes, self.miso_bytes)
196
197 self.mosi_bytes = []
198 self.miso_bytes = []
199