https://en.wikipedia.org/wiki/Joint_Test_Action_Group

In JTAG, devices expose one or more test access ports (TAPs).

The picture above shows three TAPs, which might be individual chips or might be modules inside one chip.

A daisy chain of TAPs is called a scan chain, or (loosely) a target.

Scan chains can be arbitrarily long, but in practice twenty TAPs is unusually long.

To use JTAG, a host is connected to the target's JTAG signals (TMS, TCK, TDI, TDO, etc.) through some kind of JTAG adapter,

which may need to handle issues like level shifting and galvanic isolation.

The adapter connects to the host using some interface such as USB, PCI, Ethernet, and so forth.

Primitives

The host communicates with the TAPs by manipulating TMS and TDI in conjunction with TCK,

and reading results through TDO (which is the only standard host-side input).

TMS/TDI/TCK output transitions create the basic JTAG communication primitive on which higher layer protocols build:

  • State switching ...
    All TAPs are in the same state, and that state changes on TCK transitions.
    This JTAG state machine is part of the JTAG spec, and includes sixteen states.
    There are six “stable states” where keeping TMS stable prevents the state from changing.
    In all other states, TCK always changes that state.

    In addition, asserting TRST forces entry to one of those stable states (Test_Logic_Reset),
    in a slightly quicker way than the alternative of holding TMS high and cycling TCK five times.

  • Shifting ...
    Most parts of the JTAG state machine support two stable states used to transfer data.
    Each TAP has aninstruction register (IR) and a data register (DR).
    The size of those registers varies between TAPs, and those registers are combined
    through TDI and TDO to form a large shift register.
    (The size of the DR is a function of the value in that TAP's current IR, and possibly of the value specified by a SCAN_N instruction.)
    There are three operations defined on that shift register:

    • Capturing a temporary value

      • Entry to the Shift_IR stable state goes via the Capture_IR state, loading the shift register with a partially fixed value (not the current instruction)
      • Entry to the Shift_DR stable state goes via the Capture_DR state, loading the value of the Data Register specified by the TAP's current IR.
    • Shifting that value bit-by-bit, in either the Shift_IR or Shift_DR stable state;
      TCK transitions shift the shift register one bit, from TDI towards TDO, exactly like a SPI mode 1 data transfer
      through a daisy chain of devices (with TMS=0 acting like the chip select signal, TDI as MOSI, etc.).
    • Updating IR or DR from the temporary value shifted in, on transition through the Update_IR or Update_DR state.
      Note that it is not possible to read (capture) a register without writing (updating) it, and vice versa.
      A common idiom adds flag bits to say whether the update should have side effects,
      or whether the hardware is ready to execute such side effects.
  • Running ...
    One stable state is called Run_Test/Idle. The distinction is TAP-specific.
    Clocking TCK in the Idle state has no particular side effects, but clocking it in the Run_Test state may change system state.
    For example, some ARM9 cores support a debugging mode where TCK cycles in the Run_Test state drive the instruction pipeline.

So at a basic level, using JTAG involves reading and writing instructions and their associated data registers;
and sometimes involves running a number of test cycles.

Behind those registers is hardware that is not specified by JTAG,
and which has its own states that is affected by JTAG activities.

Most JTAG hosts use the shortest path between two states, perhaps constrained by quirks of the adapter.
(For example, one adapter[which?] only handles paths whose lengths are multiples of seven bits.)

Some layers built on top of JTAG monitor the state transitions, and use uncommon paths to trigger higher level operations.

Some ARM cores use such sequences to enter and exit a two-wire (non-JTAG) SWD mode.

A Zero Bit Scan (ZBS) sequence is used in IEEE 1149.7[7] to access advanced functionality
such as switching TAPs into and out of scan chains, power management, and a different two-wire mode.

JTAG IEEE Std 1149.1 (boundary scan) instructions

Instruction register sizes tend to be small, perhaps four or seven bits wide.

Except for BYPASS and EXTEST, all instruction opcodes are defined by the TAP implementor,

as are their associated data registers; undefined instruction codes should not be used. Two key instructions are:

  • The BYPASS instruction, opcode all ones regardless of the TAP's instruction register size,
    must be supported by all TAPs. It is associated with a single bit data register (also called BYPASS) which always reads as zero.
  • The optional IDCODE instruction, with an implementor-defined opcode.
    IDCODE is associated with a 32-bit register (IDCODE).
    Its data uses a standardized format that includes a manufacturer code (derived from the JEDEC Standard Manufacturer's Identification Code standard, JEP-106),
    a part number assigned by the manufacturer, and a part version code.
    IDCODE is widely, but not universally, supported.

On exit from the RESET state, the instruction register is preloaded with either BYPASS or IDCODE.
This allows JTAG hosts to identify the size and, at least partially, contents of the scan chain to which they are connected.

(They can enter the RESET state then scan the Data Register until they read back the data they wrote.
A BYPASS register has only a zero bit; while an IDCODE register is 32-bits and starts with a one.
So the bits not written by the host can easily be mapped to TAPs.)

Such identification is often used to sanity check manual configuration, since IDCODE is often unspecific.

It could for example identify an ARM Cortex-M3 based microcontroller, without specifying the microcontroller vendor or model;
or a particular FPGA, but not how it has been programmed.

A common idiom involves shifting BYPASS into the instruction registers of all TAPs except one,
which receives some other instruction. That way all TAPs except one expose a single bit data register,
and values can be selectively shifted into or out of that one TAP's data register without affecting any other TAP.

The IEEE 1149.1 (JTAG) standard describes a number of instructions to support boundary scan applications.
Some of these instructions are "mandatory", but TAPs used for debug instead of boundary scan testing
sometimes provide minimal or no support for these instructions.
Those "mandatory" instructions operate on the Boundary Scan Register (BSR) defined in theBSDL file, and include:

  • EXTEST for external testing, such as using pins to probe board-level behaviors
  • PRELOAD loading pin output values before EXTEST (sometimes combined with SAMPLE)
  • SAMPLE reading pin values into the boundary scan register

IEEE-defined "Optional" instructions include:

  • CLAMP a variant of BYPASS which drives the output pins using the PRELOADed values
  • HIGHZ deactivates the outputs of all pins
  • INTEST for internal testing, such as using pins to probe on-chip behaviors
  • RUNBIST places the chip in a self-test mode
  • USERCODE returns a user-defined code, for example to identify which FPGA image is active

Devices may define more instructions, and those definitions should be part of a BSDL file provided by the manufacturer.
They are often just be marked as PRIVATE.

Boundary scan register

Devices communicate to the world via a set of input and output pins.

By themselves, these pins provide limited visibility into the workings of the device.

However, devices that support boundary scan contain a shift-register cell for each signal pin of the device.

These registers are connected in a dedicated path around the device's boundary (hence the name).

The path creates a virtual access capability that circumvents the normal inputs and outputs,

providing direct control of the device and detailed visibility for signals.[9]

The contents of the boundary scan register, including signal I/O capabilities,

are usually described by the manufacturer using a part-specific BSDL file.

These are used with design 'netlists' from CAD/EDA systems to develop tests used in board manufacturing.

Commercial test systems often cost several thousand dollars for a complete system,

and include diagnostic options to pinpoint faults such as open circuits and shorts.

They may also offer schematic or layout viewers to depict the fault in a graphical manner.

To enable boundary scanning, IC vendors add logic to each of their devices,

including scan cells for each of the signal pins.

These cells are then connected together to form the boundary scan shift register (BSR),

which is connected to a TAP controller.

These designs are parts of most Verilog or VHDL libraries.

Overhead for this additional logic is minimal, and generally is well worth the price to enable efficient testing at the board level.

JTAG Communications model的更多相关文章

  1. PMBOK及PMP考试精要

    PROJECT MANAGEMENT KNOWLEDGE AREAS项目管理知识体系 2 PROJECT LIFE CYCLE / PROJECT MANAGEMENT PROCESS GROUPS项 ...

  2. GDBus

    1. https://en.wikipedia.org/wiki/D-Bus In computing, D-Bus (for "Desktop Bus"[4]), a softw ...

  3. Spring Boot笔记一

    Spring Boot 入门 Spring Boot 简介 > 简化Spring应用开发的一个框架:> 整个Spring技术栈的一个大整合:> J2EE开发的一站式解决方案: 微服务 ...

  4. Using an open debug interconnect model to simplify embedded systems design

    Using an open debug interconnect model to simplify embedded systems design Tom Cunningham, Freescale ...

  5. STM32 使用 printf 发送数据配置方法 -- 串口 UART, JTAG SWO, JLINK RTT

    STM32串口通信中使用printf发送数据配置方法(开发环境 Keil RVMDK) http://home.eeworld.com.cn/my/space-uid-338727-blogid-47 ...

  6. [转]How WebKit’s Event Model Works

    原文:https://homes.cs.washington.edu/~burg/projects/timelapse/articles/webkit-event-implementation/ Fi ...

  7. Communications link failure异常解决

    一,异常现象 com.bill99.inf.ibatis.DBException: queryForList error::sqlId=orgOrderAssetsMapping.queryModel ...

  8. Edge Intelligence: On-Demand Deep Learning Model Co-Inference with Device-Edge Synergy

    边缘智能:按需深度学习模型和设备边缘协同的共同推理 本文为SIGCOMM 2018 Workshop (Mobile Edge Communications, MECOMM)论文. 笔者翻译了该论文. ...

  9. JTAG 引脚自动识别 JTAG Finder, JTAG Pinout Tool, JTAG Pin Finder, JTAG pinout detector, JTAGULATOR, Easy-JTAG, JTAG Enumeration

    JTAG Finder Figuring out the JTAG Pinouts on a Device is usually the most time-consuming and frustra ...

随机推荐

  1. 【转】详解linux vi命令用法

    功能最强在的编辑器--vi vi是所有UNIX系统都会提供的屏幕编辑器,它提供了一个视窗设备,通过它可以编辑文件.当然,对UNIX系统略有所知的人, 或多或少都觉得vi超级难用,但vi是最基本的编辑器 ...

  2. Ubuntu 14.04 + gnome session back (metacity) 任务栏右上角图标消失问题解决

    没错, 就是说右上角的所有图标 (时间啊, 系统啊所有的)都消失了. 通过下列命令可以恢复 dconf reset -f /org/gnome/gnome-panel/ 参考这篇帖子: Upgrade ...

  3. SVM Kernel Functions

    ==================================================================== This article came from here. Th ...

  4. 用代码截图去理解MVC原理

    [概述] 看了蒋金楠先生的<Asp.Net Mvc框架揭密>,这本书详细地讲解了mvc的原理,很深奥也很复杂,看了几遍才将就明白了一点.他在第一章用了一个他自己写的mvc框架作为例子,代码 ...

  5. LeetCode(23):合并K个排序链表

    Hard! 题目描述: 合并 k 个排序链表,返回合并后的排序链表.请分析和描述算法的复杂度. 示例: 输入: [   1->4->5,   1->3->4,   2-> ...

  6. kafka查看消费数据

    一.如何查看 在老版本中,使用kafka-run-class.sh 脚本进行查看.但是对于最新版本,kafka-run-class.sh 已经不能使用,必须使用另外一个脚本才行,它就是kafka-co ...

  7. 数学之美——HMM模型(二)解码和Forward算法

    上一篇讨论了HMM的基本概念和一些性质,HMM在现实中还是比较常见的,因此也带来一了一系列的HMM应用问题.HMM应用主要面向三个方面:预测.解码和学习.这篇主要讨论预测. 简单来说,预测就是给定HM ...

  8. mysql 账号授权

    一.移除权限 revoke all privileges on py_bond_2_1.* from pycf@"%"; flush privileges; 二.添加用户并授权 g ...

  9. has the wrong structure

    mysql 5.6升级到5.7之后报错 root@localhost:mysql.sock [test]>show variables like '%log%' ; ERROR 1682 (HY ...

  10. 远程登陆linux连接mysql root账号报错:2003-can't connect to MYSQL serve(转)

    远程连接mysql root账号报错:2003-can't connect to MYSQL serve 1.远程连接Linux系统,登录数据库:mysql -uroot -p(密码) 2.修改roo ...