2 ## This file is part of the libsigrokdecode project.
4 ## Copyright (C) 2012-2014 Uwe Hermann <uwe@hermann-uwe.de>
6 ## This program is free software; you can redistribute it and/or modify
7 ## it under the terms of the GNU General Public License as published by
8 ## the Free Software Foundation; either version 2 of the License, or
9 ## (at your option) any later version.
11 ## This program is distributed in the hope that it will be useful,
12 ## but WITHOUT ANY WARRANTY; without even the implied warranty of
13 ## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 ## GNU General Public License for more details.
16 ## You should have received a copy of the GNU General Public License
17 ## along with this program; if not, write to the Free Software
18 ## Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
21 import sigrokdecode as srd
24 VENDOR_CODE_ATMEL = 0x1e
26 class Decoder(srd.Decoder):
30 longname = 'AVR In-System Programming'
31 desc = 'Protocol for in-system programming Atmel AVR MCUs.'
33 inputs = ['spi', 'logic']
37 {'id': 'reset', 'name': 'RESET#', 'desc': 'Target AVR MCU reset'},
41 ['pe', 'Programming enable'],
42 ['rsb0', 'Read signature byte 0'],
43 ['rsb1', 'Read signature byte 1'],
44 ['rsb2', 'Read signature byte 2'],
46 ['rfb', 'Read fuse bits'],
47 ['rhfb', 'Read high fuse bits'],
48 ['refb', 'Read extended fuse bits'],
49 ['warnings', 'Warnings'],
54 ('commands', 'Commands', tuple(range(7 + 1))),
55 ('warnings', 'Warnings', (8,)),
56 ('dev', 'Device', (9,)),
59 def __init__(self, **kwargs):
61 self.mosi_bytes, self.miso_bytes = [], []
62 self.cmd_ss, self.cmd_es = 0, 0
63 self.xx, self.yy, self.zz, self.mm = 0, 0, 0, 0
67 # self.out_python = self.register(srd.OUTPUT_PYTHON)
68 self.out_ann = self.register(srd.OUTPUT_ANN)
71 self.put(self.cmd_ss, self.cmd_es, self.out_ann, data)
73 def handle_cmd_programming_enable(self, cmd, ret):
75 # Note: The chip doesn't send any ACK for 'Programming enable'.
76 self.putx([0, ['Programming enable']])
78 # Sanity check on reply.
79 if ret[1:4] != [0xac, 0x53, cmd[2]]:
80 self.putx([8, ['Warning: Unexpected bytes in reply!']])
82 def handle_cmd_read_signature_byte_0x00(self, cmd, ret):
83 # Signature byte 0x00: vendor code.
84 self.vendor_code = ret[3]
85 v = vendor_code[self.vendor_code]
86 self.putx([1, ['Vendor code: 0x%02x (%s)' % (ret[3], v)]])
89 self.xx = cmd[1] # Same as ret[2].
93 # Sanity check on reply.
94 if ret[1] != 0x30 or ret[2] != cmd[1]:
95 self.putx([8, ['Warning: Unexpected bytes in reply!']])
97 # Sanity check for the vendor code.
98 if self.vendor_code != VENDOR_CODE_ATMEL:
99 self.putx([8, ['Warning: Vendor code was not 0x1e (Atmel)!']])
101 def handle_cmd_read_signature_byte_0x01(self, cmd, ret):
102 # Signature byte 0x01: part family and memory size.
103 self.part_fam_flash_size = ret[3]
104 self.putx([2, ['Part family / memory size: 0x%02x' % ret[3]]])
108 self.device_ss = self.cmd_ss
110 # Sanity check on reply.
111 if ret[1] != 0x30 or ret[2] != cmd[1] or ret[0] != self.yy:
112 self.putx([8, ['Warning: Unexpected bytes in reply!']])
114 def handle_cmd_read_signature_byte_0x02(self, cmd, ret):
115 # Signature byte 0x02: part number.
116 self.part_number = ret[3]
117 self.putx([3, ['Part number: 0x%02x' % ret[3]]])
119 p = part[(self.part_fam_flash_size, self.part_number)]
120 data = [9, ['Device: Atmel %s' % p]]
121 self.put(self.device_ss, self.cmd_es, self.out_ann, data)
123 # Sanity check on reply.
124 if ret[1] != 0x30 or ret[2] != self.xx or ret[0] != self.mm:
125 self.putx([8, ['Warning: Unexpected bytes in reply!']])
127 self.xx, self.yy, self.zz, self.mm = 0, 0, 0, 0
129 def handle_cmd_chip_erase(self, cmd, ret):
130 # Chip erase (erases both flash an EEPROM).
131 # Upon successful chip erase, the lock bits will also be erased.
132 # The only way to end a Chip Erase cycle is to release RESET#.
133 self.putx([4, ['Chip erase']])
135 # TODO: Check/handle RESET#.
137 # Sanity check on reply.
138 bit = (ret[2] & (1 << 7)) >> 7
139 if ret[1] != 0xac or bit != 1 or ret[3] != cmd[2]:
140 self.putx([8, ['Warning: Unexpected bytes in reply!']])
142 def handle_cmd_read_fuse_bits(self, cmd, ret):
144 self.putx([5, ['Read fuse bits: 0x%02x' % ret[3]]])
146 # TODO: Decode fuse bits.
147 # TODO: Sanity check on reply.
149 def handle_cmd_read_fuse_high_bits(self, cmd, ret):
150 # Read fuse high bits.
151 self.putx([6, ['Read fuse high bits: 0x%02x' % ret[3]]])
153 # TODO: Decode fuse bits.
154 # TODO: Sanity check on reply.
156 def handle_cmd_read_extended_fuse_bits(self, cmd, ret):
157 # Read extended fuse bits.
158 self.putx([7, ['Read extended fuse bits: 0x%02x' % ret[3]]])
160 # TODO: Decode fuse bits.
161 # TODO: Sanity check on reply.
163 def handle_command(self, cmd, ret):
164 if cmd[:2] == [0xac, 0x53]:
165 self.handle_cmd_programming_enable(cmd, ret)
166 elif cmd[0] == 0xac and (cmd[1] & (1 << 7)) == (1 << 7):
167 self.handle_cmd_chip_erase(cmd, ret)
168 elif cmd[:3] == [0x50, 0x00, 0x00]:
169 self.handle_cmd_read_fuse_bits(cmd, ret)
170 elif cmd[:3] == [0x58, 0x08, 0x00]:
171 self.handle_cmd_read_fuse_high_bits(cmd, ret)
172 elif cmd[:3] == [0x50, 0x08, 0x00]:
173 self.handle_cmd_read_extended_fuse_bits(cmd, ret)
174 elif cmd[0] == 0x30 and cmd[2] == 0x00:
175 self.handle_cmd_read_signature_byte_0x00(cmd, ret)
176 elif cmd[0] == 0x30 and cmd[2] == 0x01:
177 self.handle_cmd_read_signature_byte_0x01(cmd, ret)
178 elif cmd[0] == 0x30 and cmd[2] == 0x02:
179 self.handle_cmd_read_signature_byte_0x02(cmd, ret)
181 c = '%02x %02x %02x %02x' % tuple(cmd)
182 r = '%02x %02x %02x %02x' % tuple(ret)
183 self.putx([0, ['Unknown command: %s (reply: %s)!' % (c, r)]])
185 def decode(self, ss, es, data):
186 ptype, mosi, miso = data
188 # For now, only use DATA and BITS packets.
189 if ptype not in ('DATA', 'BITS'):
192 # Store the individual bit values and ss/es numbers. The next packet
193 # is guaranteed to be a 'DATA' packet belonging to this 'BITS' one.
195 self.miso_bits, self.mosi_bits = miso, mosi
198 self.ss, self.es = ss, es
200 if len(self.mosi_bytes) == 0:
204 self.mosi_bytes.append(mosi)
205 self.miso_bytes.append(miso)
207 # All commands consist of 4 bytes.
208 if len(self.mosi_bytes) < 4:
213 self.handle_command(self.mosi_bytes, self.miso_bytes)