BusPirate

From Oh Mad Lab
Jump to navigation Jump to search

Bus Pirate v3

Upgrade Bootloader from v2.X to v4.X

  • This requires the "pyserial" package and I used 2.5RC2 from pyserial.sourceforge.net
  • With the Bus Pirate unplugged, on the ICSP header jumper the PGD and PGC pins together and plug the Bus Pirate in to the lappie with the USB cable
  • We have to use the older python script with the v2.X bootloader
 python P24qp.py -a ./BPv3-v2blupdaterVa3-v4.1.hex -s /dev/ttyUSB0 -v
  • Unplug the Bus Pirate and then remove the jumper from the PGD / PGC pins and plug the Bus Pirate back into the lappie via the USB cable
  • Connect to the Bus Pirate via serial (make sure the Bus Pirate is on the right dev, for me it's /dev/ttyUSB0):
 minicom -o
  • Press enter in the terminal and instead of the normal Bus Pirate prompt, you'll see an installer message asking you to type "Yes" to program the new bootloader
  • Type "Yes" and it will update the bootloader and the output should be similar to the following:
Erasing 0xA400... done
Erasing 0xA800... done
Writing row 0 1 2 3 4 5 6 7 done
Erasing 0x0000... done
Writing row 0... done

Success!
Upload new firmware with the ds30 Loader app to complete the upgrade
  • Now your ready to do a firmware update using the newer "pirate-loader_lnx" cli tool -- See "Firmware Updates using Bootloader v4.X"

Firmware Updates using Bootloader v4.X

  • With the Bus Pirate unplugged, on the ICSP header jumper the PGD and PGC pins together and plug the Bus Pirate in to the lappie with the USB cable
  • With the latest update tar.gz extracted, cd into the Bus Pirate v3 directory as such:
 cd BPv3\&v2go/
  • You might need to chmod the cli tool as such:
 chmod +x ../pirate-loader_lnx
  • Run the firmware update:
 ../pirate-loader_lnx --dev=/dev/ttyUSB0 --hex=./BPv3-Firmware-v4.2.hex --verbose
  • Once done, unplug the Bus Pirate and then remove the jumper from the PGD / PGC pins and plug the Bus Pirate back into the lappie via the USB cable
  • Connect to the Bus Pirate via serial (make sure the Bus Pirate is on the right dev, for me it's /dev/ttyUSB0):
 minicom -o
  • Press enter in the terminal and you'll see the normal Bus Pirate prompt "HiZ>"

I2c with the Maxim 7312

  • Set output mode:
 [0x42 0x06 0x00]
  • Set all off on port 1:
 [0x42 0x02 0x00]
  • Set first pin on for port 1:
 [0x042 0x02 0x01]

Bus Pirate to a STK500v2 AVR Clone

Not needed? Apparently avrdude can work directly with the bus pirate...
Unfortunately the stock firmware doesn't include the STK500 protocol and they are saying it's highly unlikely it ever will. That just means we'll need to flash back and forth for now. Here are the step to making the Bus Pirate a STK500v2 AVR clone.

  • With the Bus Pirate unplugged, on the ICSP header jumper the PGD and PGC pins together and plug the Bus Pirate in to the lappie with the USB cable
  • With the latest update tar.gz extracted, cd into the Bus Pirate v3 directory as such:
 cd BPv3\&v2go/
  • You might need to chmod the cli tool as such:
 chmod +x ../pirate-loader_lnx
  • Run the firmware update:
 ../pirate-loader_lnx --dev=/dev/ttyUSB0 --hex=./BPv3-STK500v2-v0b.hex --verbose
  • Once done, unplug the Bus Pirate and then remove the jumper from the PGD / PGC pins and plug the Bus Pirate back into the lappie via the USB cable
  • Now you should be able to use avrdude or similar

Install an AVR Toolchain

Prepare

  • Install some packages
 apt-get install bison texinfo gawk flex byacc gcc make libgmp3-dev libmpfr-dev

Binutils

  • Official site: http://www.gnu.org/software/binutils/
  • Download the latest binutils from here and compile:
  • NOTE 1: --disable-nls = Avoids the dependency on gettext (for i18n) being installed on the host. As LC_ALL=POSIX is set, NLS would not be used anyway even if enabled.
  • NOTE 2: --enable-install-libbfd = Binary File Descriptor library: Allows applications to use the same routines to operate on object files whatever the object file format. Basically, it adds ELF, or whatever executable format your toolchain outputs, support to binutils.
wget ftp://ftp.gnu.org/gnu/binutils/binutils-2.20.1.tar.gz
tar xvf binutils-2.20.1.tar.gz
cd binutils-2.20.1
mkdir obj-avr
cd obj-avr
../configure --target=avr --prefix=/usr/local/avr --disable-nls --enable-install-libbfd
make
make install

GCC Core

  • Official site: http://gcc.gnu.org/
  • Download the latest gcc-core from here and compile:
  • NOTE 1: --disable-libssp = Stack Smashing Protection library: This isn't supported by avr-gcc, so we need to disable it.
wget ftp://ftp.gnu.org/gnu/gcc/gcc-4.4.3/gcc-core-4.4.3.tar.gz
tar xfv gcc-core-4.4.3.tar.gz 
cd gcc-4.4.3
mkdir obj-avr
cd obj-avr
../configure --target=avr --prefix=/usr/local/avr --disable-nls --disable-libssp --enable-languages=c
make
make install

AVR-Libc

wget http://nongnu.askapache.com/avr-libc/avr-libc-1.6.8.tar.bz2
tar xfv avr-libc-1.6.8.tar.bz2
cd avr-libc-1.6.8
mkdir obj-avr
cd obj-avr
../configure --host=avr --prefix=/usr/local/avr --build=`./config.guess`
make
make install

AVRDude

This is only required only for programming the AVR.

cd /share
mkdir avrdude
cd avrdude
wget http://nongnu.askapache.com/avrdude/avrdude-5.9.tar.gz
tar xvf avrdude-5.9.tar.gz
cd avrdude-5.9
./configure --prefix=/usr/local/avr
make
make install
cp avrdude.conf /etc/

Setup

  • Configure avrdude by opening /etc/avrdude.conf and setting "default_serial" to "/dev/ttyUSB0" for the Bus Pirate
  • Add the following to your ~/.bash_profile (ssh) and/or ~/.bashrc (gui terminal) as needed:
PATH=$PATH:/usr/local/avr/bin
export PATH

Avrdude

  • Initial test:
 avrdude -p m328p -c buspirate
  • Output from the above should look like:
Detecting BusPirate...
**  
**  Bus Pirate v3
**  Firmware v4.2 Bootloader v4.1
**  DEVID:0x0447 REVID:0x3042 (B4)
**  http://dangerousprototypes.com
**
BusPirate: using BINARY mode
avrdude: AVR device initialized and ready to accept instructions

Reading | ################################################## | 100% 0.10s

avrdude: Device signature = 0x1e950f

avrdude: safemode: Fuses OK

avrdude done.  Thank you.
  • Programming:
 avrdude -p m328p -c buspirate -U flash:w:blink_1MHz.hex
  • Output from above:
Detecting BusPirate...
**  
**  Bus Pirate v3
**  Firmware v4.2 Bootloader v4.1
**  DEVID:0x0447 REVID:0x3042 (B4)
**  http://dangerousprototypes.com
**
BusPirate: using BINARY mode
avrdude: AVR device initialized and ready to accept instructions

Reading | ################################################## | 100% 0.10s

avrdude: Device signature = 0x1e950f
avrdude: NOTE: FLASH memory has been specified, an erase cycle will be performed
         To disable this feature, specify the -D option.
avrdude: erasing chip
avrdude: reading input file "blink_1MHz.hex"
avrdude: input file blink_1MHz.hex auto detected as Intel Hex
avrdude: writing flash (300 bytes):

Writing | ################################################## | 100% 9.79s

avrdude: 300 bytes of flash written
avrdude: verifying flash memory against blink_1MHz.hex:
avrdude: load data flash data from input file blink_1MHz.hex:
avrdude: input file blink_1MHz.hex auto detected as Intel Hex
avrdude: input file blink_1MHz.hex contains 300 bytes
avrdude: reading on-chip flash data:

Reading | ################################################## | 100% 9.59s

avrdude: verifying ...
avrdude: 300 bytes of flash verified

avrdude: safemode: Fuses OK

avrdude done.  Thank you.
  • To cheat and supply voltage to the chip you're programming you can draw from the Bus Pirate by using it's power supply. Simply connect, set a mode with the "m" command. Any mode will do, but "2" 1-Wire doesn't ask any follow up questions. Once you're in a mode, then use the "W" to turn on the power supplies and "w" to turn them off.

BusPirate Pin Map

Buspirate pin map.png