1 /***************************************************************************
2 * Copyright (C) 2006 by Magnus Lundin *
5 * Copyright (C) 2008 by Spencer Oliver *
6 * spen@spen-soft.co.uk *
8 * Copyright (C) 2009-2010 by Oyvind Harboe *
9 * oyvind.harboe@zylin.com *
11 * Copyright (C) 2009-2010 by David Brownell *
13 * Copyright (C) 2013 by Andreas Fritiofson *
14 * andreas.fritiofson@gmail.com *
16 * Copyright (C) 2019-2021, Ampere Computing LLC *
18 * This program is free software; you can redistribute it and/or modify *
19 * it under the terms of the GNU General Public License as published by *
20 * the Free Software Foundation; either version 2 of the License, or *
21 * (at your option) any later version. *
23 * This program is distributed in the hope that it will be useful, *
24 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
25 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
26 * GNU General Public License for more details. *
28 * You should have received a copy of the GNU General Public License *
29 * along with this program. If not, see <http://www.gnu.org/licenses/>. *
30 ***************************************************************************/
34 * This file implements support for the ARM Debug Interface version 5 (ADIv5)
35 * debugging architecture. Compared with previous versions, this includes
36 * a low pin-count Serial Wire Debug (SWD) alternative to JTAG for message
37 * transport, and focuses on memory mapped resources as defined by the
38 * CoreSight architecture.
40 * A key concept in ADIv5 is the Debug Access Port, or DAP. A DAP has two
41 * basic components: a Debug Port (DP) transporting messages to and from a
42 * debugger, and an Access Port (AP) accessing resources. Three types of DP
43 * are defined. One uses only JTAG for communication, and is called JTAG-DP.
44 * One uses only SWD for communication, and is called SW-DP. The third can
45 * use either SWD or JTAG, and is called SWJ-DP. The most common type of AP
46 * is used to access memory mapped resources and is called a MEM-AP. Also a
47 * JTAG-AP is also defined, bridging to JTAG resources; those are uncommon.
49 * This programming interface allows DAP pipelined operations through a
50 * transaction queue. This primarily affects AP operations (such as using
51 * a MEM-AP to access memory or registers). If the current transaction has
52 * not finished by the time the next one must begin, and the ORUNDETECT bit
53 * is set in the DP_CTRL_STAT register, the SSTICKYORUN status is set and
54 * further AP operations will fail. There are two basic methods to avoid
55 * such overrun errors. One involves polling for status instead of using
56 * transaction pipelining. The other involves adding delays to ensure the
57 * AP has enough time to complete one operation before starting the next
58 * one. (For JTAG these delays are controlled by memaccess_tck.)
62 * Relevant specifications from ARM include:
64 * ARM(tm) Debug Interface v5 Architecture Specification ARM IHI 0031E
65 * CoreSight(tm) v1.0 Architecture Specification ARM IHI 0029B
67 * CoreSight(tm) DAP-Lite TRM, ARM DDI 0316D
68 * Cortex-M3(tm) TRM, ARM DDI 0337G
75 #include "jtag/interface.h"
77 #include "arm_adi_v5.h"
78 #include "arm_coresight.h"
80 #include "transport/transport.h"
81 #include <helper/align.h>
82 #include <helper/jep106.h>
83 #include <helper/time_support.h>
84 #include <helper/list.h>
85 #include <helper/jim-nvp.h>
87 /* ARM ADI Specification requires at least 10 bits used for TAR autoincrement */
90 uint32_t tar_block_size(uint32_t address)
91 Return the largest block starting at address that does not cross a tar block size alignment boundary
93 static uint32_t max_tar_block_size(uint32_t tar_autoincr_block
, target_addr_t address
)
95 return tar_autoincr_block
- ((tar_autoincr_block
- 1) & address
);
98 /***************************************************************************
100 * DP and MEM-AP register access through APACC and DPACC *
102 ***************************************************************************/
104 static int mem_ap_setup_csw(struct adiv5_ap
*ap
, uint32_t csw
)
106 csw
|= ap
->csw_default
;
108 if (csw
!= ap
->csw_value
) {
109 /* LOG_DEBUG("DAP: Set CSW %x",csw); */
110 int retval
= dap_queue_ap_write(ap
, MEM_AP_REG_CSW(ap
->dap
), csw
);
111 if (retval
!= ERROR_OK
) {
120 static int mem_ap_setup_tar(struct adiv5_ap
*ap
, target_addr_t tar
)
122 if (!ap
->tar_valid
|| tar
!= ap
->tar_value
) {
123 /* LOG_DEBUG("DAP: Set TAR %x",tar); */
124 int retval
= dap_queue_ap_write(ap
, MEM_AP_REG_TAR(ap
->dap
), (uint32_t)(tar
& 0xffffffffUL
));
125 if (retval
== ERROR_OK
&& is_64bit_ap(ap
)) {
126 /* See if bits 63:32 of tar is different from last setting */
127 if ((ap
->tar_value
>> 32) != (tar
>> 32))
128 retval
= dap_queue_ap_write(ap
, MEM_AP_REG_TAR64(ap
->dap
), (uint32_t)(tar
>> 32));
130 if (retval
!= ERROR_OK
) {
131 ap
->tar_valid
= false;
135 ap
->tar_valid
= true;
140 static int mem_ap_read_tar(struct adiv5_ap
*ap
, target_addr_t
*tar
)
145 int retval
= dap_queue_ap_read(ap
, MEM_AP_REG_TAR(ap
->dap
), &lower
);
146 if (retval
== ERROR_OK
&& is_64bit_ap(ap
))
147 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_TAR64(ap
->dap
), &upper
);
149 if (retval
!= ERROR_OK
) {
150 ap
->tar_valid
= false;
154 retval
= dap_run(ap
->dap
);
155 if (retval
!= ERROR_OK
) {
156 ap
->tar_valid
= false;
160 *tar
= (((target_addr_t
)upper
) << 32) | (target_addr_t
)lower
;
162 ap
->tar_value
= *tar
;
163 ap
->tar_valid
= true;
167 static uint32_t mem_ap_get_tar_increment(struct adiv5_ap
*ap
)
169 switch (ap
->csw_value
& CSW_ADDRINC_MASK
) {
170 case CSW_ADDRINC_SINGLE
:
171 switch (ap
->csw_value
& CSW_SIZE_MASK
) {
181 case CSW_ADDRINC_PACKED
:
187 /* mem_ap_update_tar_cache is called after an access to MEM_AP_REG_DRW
189 static void mem_ap_update_tar_cache(struct adiv5_ap
*ap
)
194 uint32_t inc
= mem_ap_get_tar_increment(ap
);
195 if (inc
>= max_tar_block_size(ap
->tar_autoincr_block
, ap
->tar_value
))
196 ap
->tar_valid
= false;
198 ap
->tar_value
+= inc
;
202 * Queue transactions setting up transfer parameters for the
203 * currently selected MEM-AP.
205 * Subsequent transfers using registers like MEM_AP_REG_DRW or MEM_AP_REG_BD2
206 * initiate data reads or writes using memory or peripheral addresses.
207 * If the CSW is configured for it, the TAR may be automatically
208 * incremented after each transfer.
210 * @param ap The MEM-AP.
211 * @param csw MEM-AP Control/Status Word (CSW) register to assign. If this
212 * matches the cached value, the register is not changed.
213 * @param tar MEM-AP Transfer Address Register (TAR) to assign. If this
214 * matches the cached address, the register is not changed.
216 * @return ERROR_OK if the transaction was properly queued, else a fault code.
218 static int mem_ap_setup_transfer(struct adiv5_ap
*ap
, uint32_t csw
, target_addr_t tar
)
221 retval
= mem_ap_setup_csw(ap
, csw
);
222 if (retval
!= ERROR_OK
)
224 retval
= mem_ap_setup_tar(ap
, tar
);
225 if (retval
!= ERROR_OK
)
231 * Asynchronous (queued) read of a word from memory or a system register.
233 * @param ap The MEM-AP to access.
234 * @param address Address of the 32-bit word to read; it must be
235 * readable by the currently selected MEM-AP.
236 * @param value points to where the word will be stored when the
237 * transaction queue is flushed (assuming no errors).
239 * @return ERROR_OK for success. Otherwise a fault code.
241 int mem_ap_read_u32(struct adiv5_ap
*ap
, target_addr_t address
,
246 /* Use banked addressing (REG_BDx) to avoid some link traffic
247 * (updating TAR) when reading several consecutive addresses.
249 retval
= mem_ap_setup_transfer(ap
,
250 CSW_32BIT
| (ap
->csw_value
& CSW_ADDRINC_MASK
),
251 address
& 0xFFFFFFFFFFFFFFF0ull
);
252 if (retval
!= ERROR_OK
)
255 return dap_queue_ap_read(ap
, MEM_AP_REG_BD0(ap
->dap
) | (address
& 0xC), value
);
259 * Synchronous read of a word from memory or a system register.
260 * As a side effect, this flushes any queued transactions.
262 * @param ap The MEM-AP to access.
263 * @param address Address of the 32-bit word to read; it must be
264 * readable by the currently selected MEM-AP.
265 * @param value points to where the result will be stored.
267 * @return ERROR_OK for success; *value holds the result.
268 * Otherwise a fault code.
270 int mem_ap_read_atomic_u32(struct adiv5_ap
*ap
, target_addr_t address
,
275 retval
= mem_ap_read_u32(ap
, address
, value
);
276 if (retval
!= ERROR_OK
)
279 return dap_run(ap
->dap
);
283 * Asynchronous (queued) write of a word to memory or a system register.
285 * @param ap The MEM-AP to access.
286 * @param address Address to be written; it must be writable by
287 * the currently selected MEM-AP.
288 * @param value Word that will be written to the address when transaction
289 * queue is flushed (assuming no errors).
291 * @return ERROR_OK for success. Otherwise a fault code.
293 int mem_ap_write_u32(struct adiv5_ap
*ap
, target_addr_t address
,
298 /* Use banked addressing (REG_BDx) to avoid some link traffic
299 * (updating TAR) when writing several consecutive addresses.
301 retval
= mem_ap_setup_transfer(ap
,
302 CSW_32BIT
| (ap
->csw_value
& CSW_ADDRINC_MASK
),
303 address
& 0xFFFFFFFFFFFFFFF0ull
);
304 if (retval
!= ERROR_OK
)
307 return dap_queue_ap_write(ap
, MEM_AP_REG_BD0(ap
->dap
) | (address
& 0xC),
312 * Synchronous write of a word to memory or a system register.
313 * As a side effect, this flushes any queued transactions.
315 * @param ap The MEM-AP to access.
316 * @param address Address to be written; it must be writable by
317 * the currently selected MEM-AP.
318 * @param value Word that will be written.
320 * @return ERROR_OK for success; the data was written. Otherwise a fault code.
322 int mem_ap_write_atomic_u32(struct adiv5_ap
*ap
, target_addr_t address
,
325 int retval
= mem_ap_write_u32(ap
, address
, value
);
327 if (retval
!= ERROR_OK
)
330 return dap_run(ap
->dap
);
334 * Synchronous write of a block of memory, using a specific access size.
336 * @param ap The MEM-AP to access.
337 * @param buffer The data buffer to write. No particular alignment is assumed.
338 * @param size Which access size to use, in bytes. 1, 2 or 4.
339 * @param count The number of writes to do (in size units, not bytes).
340 * @param address Address to be written; it must be writable by the currently selected MEM-AP.
341 * @param addrinc Whether the target address should be increased for each write or not. This
342 * should normally be true, except when writing to e.g. a FIFO.
343 * @return ERROR_OK on success, otherwise an error code.
345 static int mem_ap_write(struct adiv5_ap
*ap
, const uint8_t *buffer
, uint32_t size
, uint32_t count
,
346 target_addr_t address
, bool addrinc
)
348 struct adiv5_dap
*dap
= ap
->dap
;
349 size_t nbytes
= size
* count
;
350 const uint32_t csw_addrincr
= addrinc
? CSW_ADDRINC_SINGLE
: CSW_ADDRINC_OFF
;
352 target_addr_t addr_xor
;
353 int retval
= ERROR_OK
;
355 /* TI BE-32 Quirks mode:
356 * Writes on big-endian TMS570 behave very strangely. Observed behavior:
357 * size write address bytes written in order
358 * 4 TAR ^ 0 (val >> 24), (val >> 16), (val >> 8), (val)
359 * 2 TAR ^ 2 (val >> 8), (val)
361 * For example, if you attempt to write a single byte to address 0, the processor
362 * will actually write a byte to address 3.
364 * To make writes of size < 4 work as expected, we xor a value with the address before
365 * setting the TAP, and we set the TAP after every transfer rather then relying on
366 * address increment. */
369 csw_size
= CSW_32BIT
;
371 } else if (size
== 2) {
372 csw_size
= CSW_16BIT
;
373 addr_xor
= dap
->ti_be_32_quirks
? 2 : 0;
374 } else if (size
== 1) {
376 addr_xor
= dap
->ti_be_32_quirks
? 3 : 0;
378 return ERROR_TARGET_UNALIGNED_ACCESS
;
381 if (ap
->unaligned_access_bad
&& (address
% size
!= 0))
382 return ERROR_TARGET_UNALIGNED_ACCESS
;
385 uint32_t this_size
= size
;
387 /* Select packed transfer if possible */
388 if (addrinc
&& ap
->packed_transfers
&& nbytes
>= 4
389 && max_tar_block_size(ap
->tar_autoincr_block
, address
) >= 4) {
391 retval
= mem_ap_setup_csw(ap
, csw_size
| CSW_ADDRINC_PACKED
);
393 retval
= mem_ap_setup_csw(ap
, csw_size
| csw_addrincr
);
396 if (retval
!= ERROR_OK
)
399 retval
= mem_ap_setup_tar(ap
, address
^ addr_xor
);
400 if (retval
!= ERROR_OK
)
403 /* How many source bytes each transfer will consume, and their location in the DRW,
404 * depends on the type of transfer and alignment. See ARM document IHI0031C. */
405 uint32_t outvalue
= 0;
406 uint32_t drw_byte_idx
= address
;
407 if (dap
->ti_be_32_quirks
) {
410 outvalue
|= (uint32_t)*buffer
++ << 8 * (3 ^ (drw_byte_idx
++ & 3) ^ addr_xor
);
411 outvalue
|= (uint32_t)*buffer
++ << 8 * (3 ^ (drw_byte_idx
++ & 3) ^ addr_xor
);
412 outvalue
|= (uint32_t)*buffer
++ << 8 * (3 ^ (drw_byte_idx
++ & 3) ^ addr_xor
);
413 outvalue
|= (uint32_t)*buffer
++ << 8 * (3 ^ (drw_byte_idx
& 3) ^ addr_xor
);
416 outvalue
|= (uint32_t)*buffer
++ << 8 * (1 ^ (drw_byte_idx
++ & 3) ^ addr_xor
);
417 outvalue
|= (uint32_t)*buffer
++ << 8 * (1 ^ (drw_byte_idx
& 3) ^ addr_xor
);
420 outvalue
|= (uint32_t)*buffer
++ << 8 * (0 ^ (drw_byte_idx
& 3) ^ addr_xor
);
426 outvalue
|= (uint32_t)*buffer
++ << 8 * (drw_byte_idx
++ & 3);
427 outvalue
|= (uint32_t)*buffer
++ << 8 * (drw_byte_idx
++ & 3);
430 outvalue
|= (uint32_t)*buffer
++ << 8 * (drw_byte_idx
++ & 3);
433 outvalue
|= (uint32_t)*buffer
++ << 8 * (drw_byte_idx
& 3);
439 retval
= dap_queue_ap_write(ap
, MEM_AP_REG_DRW(dap
), outvalue
);
440 if (retval
!= ERROR_OK
)
443 mem_ap_update_tar_cache(ap
);
445 address
+= this_size
;
448 /* REVISIT: Might want to have a queued version of this function that does not run. */
449 if (retval
== ERROR_OK
)
450 retval
= dap_run(dap
);
452 if (retval
!= ERROR_OK
) {
454 if (mem_ap_read_tar(ap
, &tar
) == ERROR_OK
)
455 LOG_ERROR("Failed to write memory at " TARGET_ADDR_FMT
, tar
);
457 LOG_ERROR("Failed to write memory and, additionally, failed to find out where");
464 * Synchronous read of a block of memory, using a specific access size.
466 * @param ap The MEM-AP to access.
467 * @param buffer The data buffer to receive the data. No particular alignment is assumed.
468 * @param size Which access size to use, in bytes. 1, 2 or 4.
469 * @param count The number of reads to do (in size units, not bytes).
470 * @param adr Address to be read; it must be readable by the currently selected MEM-AP.
471 * @param addrinc Whether the target address should be increased after each read or not. This
472 * should normally be true, except when reading from e.g. a FIFO.
473 * @return ERROR_OK on success, otherwise an error code.
475 static int mem_ap_read(struct adiv5_ap
*ap
, uint8_t *buffer
, uint32_t size
, uint32_t count
,
476 target_addr_t adr
, bool addrinc
)
478 struct adiv5_dap
*dap
= ap
->dap
;
479 size_t nbytes
= size
* count
;
480 const uint32_t csw_addrincr
= addrinc
? CSW_ADDRINC_SINGLE
: CSW_ADDRINC_OFF
;
482 target_addr_t address
= adr
;
483 int retval
= ERROR_OK
;
485 /* TI BE-32 Quirks mode:
486 * Reads on big-endian TMS570 behave strangely differently than writes.
487 * They read from the physical address requested, but with DRW byte-reversed.
488 * For example, a byte read from address 0 will place the result in the high bytes of DRW.
489 * Also, packed 8-bit and 16-bit transfers seem to sometimes return garbage in some bytes,
493 csw_size
= CSW_32BIT
;
495 csw_size
= CSW_16BIT
;
499 return ERROR_TARGET_UNALIGNED_ACCESS
;
501 if (ap
->unaligned_access_bad
&& (adr
% size
!= 0))
502 return ERROR_TARGET_UNALIGNED_ACCESS
;
504 /* Allocate buffer to hold the sequence of DRW reads that will be made. This is a significant
505 * over-allocation if packed transfers are going to be used, but determining the real need at
506 * this point would be messy. */
507 uint32_t *read_buf
= calloc(count
, sizeof(uint32_t));
508 /* Multiplication count * sizeof(uint32_t) may overflow, calloc() is safe */
509 uint32_t *read_ptr
= read_buf
;
511 LOG_ERROR("Failed to allocate read buffer");
515 /* Queue up all reads. Each read will store the entire DRW word in the read buffer. How many
516 * useful bytes it contains, and their location in the word, depends on the type of transfer
519 uint32_t this_size
= size
;
521 /* Select packed transfer if possible */
522 if (addrinc
&& ap
->packed_transfers
&& nbytes
>= 4
523 && max_tar_block_size(ap
->tar_autoincr_block
, address
) >= 4) {
525 retval
= mem_ap_setup_csw(ap
, csw_size
| CSW_ADDRINC_PACKED
);
527 retval
= mem_ap_setup_csw(ap
, csw_size
| csw_addrincr
);
529 if (retval
!= ERROR_OK
)
532 retval
= mem_ap_setup_tar(ap
, address
);
533 if (retval
!= ERROR_OK
)
536 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_DRW(dap
), read_ptr
++);
537 if (retval
!= ERROR_OK
)
542 address
+= this_size
;
544 mem_ap_update_tar_cache(ap
);
547 if (retval
== ERROR_OK
)
548 retval
= dap_run(dap
);
552 nbytes
= size
* count
;
555 /* If something failed, read TAR to find out how much data was successfully read, so we can
556 * at least give the caller what we have. */
557 if (retval
!= ERROR_OK
) {
559 if (mem_ap_read_tar(ap
, &tar
) == ERROR_OK
) {
560 /* TAR is incremented after failed transfer on some devices (eg Cortex-M4) */
561 LOG_ERROR("Failed to read memory at " TARGET_ADDR_FMT
, tar
);
562 if (nbytes
> tar
- address
)
563 nbytes
= tar
- address
;
565 LOG_ERROR("Failed to read memory and, additionally, failed to find out where");
570 /* Replay loop to populate caller's buffer from the correct word and byte lane */
572 uint32_t this_size
= size
;
574 if (addrinc
&& ap
->packed_transfers
&& nbytes
>= 4
575 && max_tar_block_size(ap
->tar_autoincr_block
, address
) >= 4) {
579 if (dap
->ti_be_32_quirks
) {
582 *buffer
++ = *read_ptr
>> 8 * (3 - (address
++ & 3));
583 *buffer
++ = *read_ptr
>> 8 * (3 - (address
++ & 3));
586 *buffer
++ = *read_ptr
>> 8 * (3 - (address
++ & 3));
589 *buffer
++ = *read_ptr
>> 8 * (3 - (address
++ & 3));
594 *buffer
++ = *read_ptr
>> 8 * (address
++ & 3);
595 *buffer
++ = *read_ptr
>> 8 * (address
++ & 3);
598 *buffer
++ = *read_ptr
>> 8 * (address
++ & 3);
601 *buffer
++ = *read_ptr
>> 8 * (address
++ & 3);
613 int mem_ap_read_buf(struct adiv5_ap
*ap
,
614 uint8_t *buffer
, uint32_t size
, uint32_t count
, target_addr_t address
)
616 return mem_ap_read(ap
, buffer
, size
, count
, address
, true);
619 int mem_ap_write_buf(struct adiv5_ap
*ap
,
620 const uint8_t *buffer
, uint32_t size
, uint32_t count
, target_addr_t address
)
622 return mem_ap_write(ap
, buffer
, size
, count
, address
, true);
625 int mem_ap_read_buf_noincr(struct adiv5_ap
*ap
,
626 uint8_t *buffer
, uint32_t size
, uint32_t count
, target_addr_t address
)
628 return mem_ap_read(ap
, buffer
, size
, count
, address
, false);
631 int mem_ap_write_buf_noincr(struct adiv5_ap
*ap
,
632 const uint8_t *buffer
, uint32_t size
, uint32_t count
, target_addr_t address
)
634 return mem_ap_write(ap
, buffer
, size
, count
, address
, false);
637 /*--------------------------------------------------------------------------*/
640 #define DAP_POWER_DOMAIN_TIMEOUT (10)
642 /*--------------------------------------------------------------------------*/
645 * Invalidate cached DP select and cached TAR and CSW of all APs
647 void dap_invalidate_cache(struct adiv5_dap
*dap
)
649 dap
->select
= DP_SELECT_INVALID
;
650 dap
->last_read
= NULL
;
653 for (i
= 0; i
<= DP_APSEL_MAX
; i
++) {
654 /* force csw and tar write on the next mem-ap access */
655 dap
->ap
[i
].tar_valid
= false;
656 dap
->ap
[i
].csw_value
= 0;
661 * Initialize a DAP. This sets up the power domains, prepares the DP
662 * for further use and activates overrun checking.
664 * @param dap The DAP being initialized.
666 int dap_dp_init(struct adiv5_dap
*dap
)
670 LOG_DEBUG("%s", adiv5_dap_name(dap
));
672 dap
->do_reconnect
= false;
673 dap_invalidate_cache(dap
);
676 * Early initialize dap->dp_ctrl_stat.
677 * In jtag mode only, if the following queue run (in dap_dp_poll_register)
678 * fails and sets the sticky error, it will trigger the clearing
679 * of the sticky. Without this initialization system and debug power
680 * would be disabled while clearing the sticky error bit.
682 dap
->dp_ctrl_stat
= CDBGPWRUPREQ
| CSYSPWRUPREQ
;
685 * This write operation clears the sticky error bit in jtag mode only and
686 * is ignored in swd mode. It also powers-up system and debug domains in
687 * both jtag and swd modes, if not done before.
689 retval
= dap_queue_dp_write(dap
, DP_CTRL_STAT
, dap
->dp_ctrl_stat
| SSTICKYERR
);
690 if (retval
!= ERROR_OK
)
693 retval
= dap_queue_dp_read(dap
, DP_CTRL_STAT
, NULL
);
694 if (retval
!= ERROR_OK
)
697 retval
= dap_queue_dp_write(dap
, DP_CTRL_STAT
, dap
->dp_ctrl_stat
);
698 if (retval
!= ERROR_OK
)
701 /* Check that we have debug power domains activated */
702 LOG_DEBUG("DAP: wait CDBGPWRUPACK");
703 retval
= dap_dp_poll_register(dap
, DP_CTRL_STAT
,
704 CDBGPWRUPACK
, CDBGPWRUPACK
,
705 DAP_POWER_DOMAIN_TIMEOUT
);
706 if (retval
!= ERROR_OK
)
709 if (!dap
->ignore_syspwrupack
) {
710 LOG_DEBUG("DAP: wait CSYSPWRUPACK");
711 retval
= dap_dp_poll_register(dap
, DP_CTRL_STAT
,
712 CSYSPWRUPACK
, CSYSPWRUPACK
,
713 DAP_POWER_DOMAIN_TIMEOUT
);
714 if (retval
!= ERROR_OK
)
718 retval
= dap_queue_dp_read(dap
, DP_CTRL_STAT
, NULL
);
719 if (retval
!= ERROR_OK
)
722 /* With debug power on we can activate OVERRUN checking */
723 dap
->dp_ctrl_stat
= CDBGPWRUPREQ
| CSYSPWRUPREQ
| CORUNDETECT
;
724 retval
= dap_queue_dp_write(dap
, DP_CTRL_STAT
, dap
->dp_ctrl_stat
);
725 if (retval
!= ERROR_OK
)
727 retval
= dap_queue_dp_read(dap
, DP_CTRL_STAT
, NULL
);
728 if (retval
!= ERROR_OK
)
731 retval
= dap_run(dap
);
732 if (retval
!= ERROR_OK
)
739 * Initialize a DAP or do reconnect if DAP is not accessible.
741 * @param dap The DAP being initialized.
743 int dap_dp_init_or_reconnect(struct adiv5_dap
*dap
)
745 LOG_DEBUG("%s", adiv5_dap_name(dap
));
748 * Early initialize dap->dp_ctrl_stat.
749 * In jtag mode only, if the following atomic reads fail and set the
750 * sticky error, it will trigger the clearing of the sticky. Without this
751 * initialization system and debug power would be disabled while clearing
752 * the sticky error bit.
754 dap
->dp_ctrl_stat
= CDBGPWRUPREQ
| CSYSPWRUPREQ
;
756 dap
->do_reconnect
= false;
758 dap_dp_read_atomic(dap
, DP_CTRL_STAT
, NULL
);
759 if (dap
->do_reconnect
) {
760 /* dap connect calls dap_dp_init() after transport dependent initialization */
761 return dap
->ops
->connect(dap
);
763 return dap_dp_init(dap
);
768 * Initialize a DAP. This sets up the power domains, prepares the DP
769 * for further use, and arranges to use AP #0 for all AP operations
770 * until dap_ap-select() changes that policy.
772 * @param ap The MEM-AP being initialized.
774 int mem_ap_init(struct adiv5_ap
*ap
)
776 /* check that we support packed transfers */
779 struct adiv5_dap
*dap
= ap
->dap
;
781 /* Set ap->cfg_reg before calling mem_ap_setup_transfer(). */
782 /* mem_ap_setup_transfer() needs to know if the MEM_AP supports LPAE. */
783 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_CFG(dap
), &cfg
);
784 if (retval
!= ERROR_OK
)
787 retval
= dap_run(dap
);
788 if (retval
!= ERROR_OK
)
792 ap
->tar_valid
= false;
793 ap
->csw_value
= 0; /* force csw and tar write */
794 retval
= mem_ap_setup_transfer(ap
, CSW_8BIT
| CSW_ADDRINC_PACKED
, 0);
795 if (retval
!= ERROR_OK
)
798 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_CSW(dap
), &csw
);
799 if (retval
!= ERROR_OK
)
802 retval
= dap_run(dap
);
803 if (retval
!= ERROR_OK
)
806 if (csw
& CSW_ADDRINC_PACKED
)
807 ap
->packed_transfers
= true;
809 ap
->packed_transfers
= false;
811 /* Packed transfers on TI BE-32 processors do not work correctly in
813 if (dap
->ti_be_32_quirks
)
814 ap
->packed_transfers
= false;
816 LOG_DEBUG("MEM_AP Packed Transfers: %s",
817 ap
->packed_transfers
? "enabled" : "disabled");
819 /* The ARM ADI spec leaves implementation-defined whether unaligned
820 * memory accesses work, only work partially, or cause a sticky error.
821 * On TI BE-32 processors, reads seem to return garbage in some bytes
822 * and unaligned writes seem to cause a sticky error.
823 * TODO: it would be nice to have a way to detect whether unaligned
824 * operations are supported on other processors. */
825 ap
->unaligned_access_bad
= dap
->ti_be_32_quirks
;
827 LOG_DEBUG("MEM_AP CFG: large data %d, long address %d, big-endian %d",
828 !!(cfg
& MEM_AP_REG_CFG_LD
), !!(cfg
& MEM_AP_REG_CFG_LA
), !!(cfg
& MEM_AP_REG_CFG_BE
));
834 * Put the debug link into SWD mode, if the target supports it.
835 * The link's initial mode may be either JTAG (for example,
836 * with SWJ-DP after reset) or SWD.
838 * Note that targets using the JTAG-DP do not support SWD, and that
839 * some targets which could otherwise support it may have been
840 * configured to disable SWD signaling
842 * @param dap The DAP used
843 * @return ERROR_OK or else a fault code.
845 int dap_to_swd(struct adiv5_dap
*dap
)
847 LOG_DEBUG("Enter SWD mode");
849 return dap_send_sequence(dap
, JTAG_TO_SWD
);
853 * Put the debug link into JTAG mode, if the target supports it.
854 * The link's initial mode may be either SWD or JTAG.
856 * Note that targets implemented with SW-DP do not support JTAG, and
857 * that some targets which could otherwise support it may have been
858 * configured to disable JTAG signaling
860 * @param dap The DAP used
861 * @return ERROR_OK or else a fault code.
863 int dap_to_jtag(struct adiv5_dap
*dap
)
865 LOG_DEBUG("Enter JTAG mode");
867 return dap_send_sequence(dap
, SWD_TO_JTAG
);
870 /* CID interpretation -- see ARM IHI 0029E table B2-7
871 * and ARM IHI 0031E table D1-2.
873 * From 2009/11/25 commit 21378f58b604:
874 * "OptimoDE DESS" is ARM's semicustom DSPish stuff.
875 * Let's keep it as is, for the time being
877 static const char *class_description
[16] = {
878 [0x0] = "Generic verification component",
887 [0x9] = "CoreSight component",
889 [0xB] = "Peripheral Test Block",
891 [0xD] = "OptimoDE DESS", /* see above */
892 [0xE] = "Generic IP component",
893 [0xF] = "CoreLink, PrimeCell or System component",
896 #define ARCH_ID(architect, archid) ( \
897 (((architect) << ARM_CS_C9_DEVARCH_ARCHITECT_SHIFT) & ARM_CS_C9_DEVARCH_ARCHITECT_MASK) | \
898 (((archid) << ARM_CS_C9_DEVARCH_ARCHID_SHIFT) & ARM_CS_C9_DEVARCH_ARCHID_MASK) \
901 static const struct {
903 const char *description
;
904 } class0x9_devarch
[] = {
905 /* keep same unsorted order as in ARM IHI0029E */
906 { ARCH_ID(ARM_ID
, 0x0A00), "RAS architecture" },
907 { ARCH_ID(ARM_ID
, 0x1A01), "Instrumentation Trace Macrocell (ITM) architecture" },
908 { ARCH_ID(ARM_ID
, 0x1A02), "DWT architecture" },
909 { ARCH_ID(ARM_ID
, 0x1A03), "Flash Patch and Breakpoint unit (FPB) architecture" },
910 { ARCH_ID(ARM_ID
, 0x2A04), "Processor debug architecture (ARMv8-M)" },
911 { ARCH_ID(ARM_ID
, 0x6A05), "Processor debug architecture (ARMv8-R)" },
912 { ARCH_ID(ARM_ID
, 0x0A10), "PC sample-based profiling" },
913 { ARCH_ID(ARM_ID
, 0x4A13), "Embedded Trace Macrocell (ETM) architecture" },
914 { ARCH_ID(ARM_ID
, 0x1A14), "Cross Trigger Interface (CTI) architecture" },
915 { ARCH_ID(ARM_ID
, 0x6A15), "Processor debug architecture (v8.0-A)" },
916 { ARCH_ID(ARM_ID
, 0x7A15), "Processor debug architecture (v8.1-A)" },
917 { ARCH_ID(ARM_ID
, 0x8A15), "Processor debug architecture (v8.2-A)" },
918 { ARCH_ID(ARM_ID
, 0x2A16), "Processor Performance Monitor (PMU) architecture" },
919 { ARCH_ID(ARM_ID
, 0x0A17), "Memory Access Port v2 architecture" },
920 { ARCH_ID(ARM_ID
, 0x0A27), "JTAG Access Port v2 architecture" },
921 { ARCH_ID(ARM_ID
, 0x0A31), "Basic trace router" },
922 { ARCH_ID(ARM_ID
, 0x0A37), "Power requestor" },
923 { ARCH_ID(ARM_ID
, 0x0A47), "Unknown Access Port v2 architecture" },
924 { ARCH_ID(ARM_ID
, 0x0A50), "HSSTP architecture" },
925 { ARCH_ID(ARM_ID
, 0x0A63), "System Trace Macrocell (STM) architecture" },
926 { ARCH_ID(ARM_ID
, 0x0A75), "CoreSight ELA architecture" },
927 { ARCH_ID(ARM_ID
, 0x0AF7), "CoreSight ROM architecture" },
930 #define DEVARCH_ID_MASK (ARM_CS_C9_DEVARCH_ARCHITECT_MASK | ARM_CS_C9_DEVARCH_ARCHID_MASK)
931 #define DEVARCH_ROM_C_0X9 ARCH_ID(ARM_ID, 0x0AF7)
933 static const char *class0x9_devarch_description(uint32_t devarch
)
935 if (!(devarch
& ARM_CS_C9_DEVARCH_PRESENT
))
936 return "not present";
938 for (unsigned int i
= 0; i
< ARRAY_SIZE(class0x9_devarch
); i
++)
939 if ((devarch
& DEVARCH_ID_MASK
) == class0x9_devarch
[i
].arch_id
)
940 return class0x9_devarch
[i
].description
;
945 static const struct {
947 const char *description
;
949 { AP_TYPE_JTAG_AP
, "JTAG-AP" },
950 { AP_TYPE_COM_AP
, "COM-AP" },
951 { AP_TYPE_AHB3_AP
, "MEM-AP AHB3" },
952 { AP_TYPE_APB_AP
, "MEM-AP APB2 or APB3" },
953 { AP_TYPE_AXI_AP
, "MEM-AP AXI3 or AXI4" },
954 { AP_TYPE_AHB5_AP
, "MEM-AP AHB5" },
955 { AP_TYPE_APB4_AP
, "MEM-AP APB4" },
956 { AP_TYPE_AXI5_AP
, "MEM-AP AXI5" },
957 { AP_TYPE_AHB5H_AP
, "MEM-AP AHB5 with enhanced HPROT" },
960 static const char *ap_type_to_description(enum ap_type type
)
962 for (unsigned int i
= 0; i
< ARRAY_SIZE(ap_types
); i
++)
963 if (type
== ap_types
[i
].type
)
964 return ap_types
[i
].description
;
970 * This function checks the ID for each access port to find the requested Access Port type
971 * It also calls dap_get_ap() to increment the AP refcount
973 int dap_find_get_ap(struct adiv5_dap
*dap
, enum ap_type type_to_find
, struct adiv5_ap
**ap_out
)
977 /* Maximum AP number is 255 since the SELECT register is 8 bits */
978 for (ap_num
= 0; ap_num
<= DP_APSEL_MAX
; ap_num
++) {
979 struct adiv5_ap
*ap
= dap_get_ap(dap
, ap_num
);
983 /* read the IDR register of the Access Port */
986 int retval
= dap_queue_ap_read(ap
, AP_REG_IDR(dap
), &id_val
);
987 if (retval
!= ERROR_OK
) {
992 retval
= dap_run(dap
);
994 /* Reading register for a non-existent AP should not cause an error,
995 * but just to be sure, try to continue searching if an error does happen.
997 if (retval
== ERROR_OK
&& (id_val
& AP_TYPE_MASK
) == type_to_find
) {
998 LOG_DEBUG("Found %s at AP index: %d (IDR=0x%08" PRIX32
")",
999 ap_type_to_description(type_to_find
),
1008 LOG_DEBUG("No %s found", ap_type_to_description(type_to_find
));
1012 static inline bool is_ap_in_use(struct adiv5_ap
*ap
)
1014 return ap
->refcount
> 0 || ap
->config_ap_never_release
;
1017 static struct adiv5_ap
*_dap_get_ap(struct adiv5_dap
*dap
, unsigned int ap_num
)
1019 if (ap_num
> DP_APSEL_MAX
) {
1020 LOG_ERROR("Invalid AP#%u", ap_num
);
1023 struct adiv5_ap
*ap
= &dap
->ap
[ap_num
];
1028 /* Return AP with specified ap_num. Increment AP refcount */
1029 struct adiv5_ap
*dap_get_ap(struct adiv5_dap
*dap
, unsigned int ap_num
)
1031 struct adiv5_ap
*ap
= _dap_get_ap(dap
, ap_num
);
1033 LOG_DEBUG("refcount AP#%u get %u", ap_num
, ap
->refcount
);
1037 /* Return AP with specified ap_num. Increment AP refcount and keep it non-zero */
1038 struct adiv5_ap
*dap_get_config_ap(struct adiv5_dap
*dap
, unsigned int ap_num
)
1040 struct adiv5_ap
*ap
= _dap_get_ap(dap
, ap_num
);
1042 ap
->config_ap_never_release
= true;
1043 LOG_DEBUG("refcount AP#%u get_config %u", ap_num
, ap
->refcount
);
1048 /* Decrement AP refcount and release the AP when refcount reaches zero */
1049 int dap_put_ap(struct adiv5_ap
*ap
)
1051 if (ap
->refcount
== 0) {
1052 LOG_ERROR("BUG: refcount AP#%" PRIu8
" put underflow", ap
->ap_num
);
1058 LOG_DEBUG("refcount AP#%" PRIu8
" put %u", ap
->ap_num
, ap
->refcount
);
1059 if (!is_ap_in_use(ap
)) {
1060 /* defaults from dap_instance_init() */
1061 ap
->memaccess_tck
= 255;
1062 ap
->tar_autoincr_block
= (1 << 10);
1063 ap
->csw_default
= CSW_AHB_DEFAULT
;
1064 ap
->cfg_reg
= MEM_AP_REG_CFG_INVALID
;
1069 static int dap_get_debugbase(struct adiv5_ap
*ap
,
1070 target_addr_t
*dbgbase
, uint32_t *apid
)
1072 struct adiv5_dap
*dap
= ap
->dap
;
1074 uint32_t baseptr_upper
, baseptr_lower
;
1076 if (ap
->cfg_reg
== MEM_AP_REG_CFG_INVALID
) {
1077 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_CFG(dap
), &ap
->cfg_reg
);
1078 if (retval
!= ERROR_OK
)
1081 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_BASE(dap
), &baseptr_lower
);
1082 if (retval
!= ERROR_OK
)
1084 retval
= dap_queue_ap_read(ap
, AP_REG_IDR(dap
), apid
);
1085 if (retval
!= ERROR_OK
)
1087 /* MEM_AP_REG_BASE64 is defined as 'RES0'; can be read and then ignored on 32 bits AP */
1088 if (ap
->cfg_reg
== MEM_AP_REG_CFG_INVALID
|| is_64bit_ap(ap
)) {
1089 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_BASE64(dap
), &baseptr_upper
);
1090 if (retval
!= ERROR_OK
)
1094 retval
= dap_run(dap
);
1095 if (retval
!= ERROR_OK
)
1098 if (!is_64bit_ap(ap
))
1100 *dbgbase
= (((target_addr_t
)baseptr_upper
) << 32) | baseptr_lower
;
1105 /** Holds registers and coordinates of a CoreSight component */
1106 struct cs_component_vals
{
1107 struct adiv5_ap
*ap
;
1108 target_addr_t component_base
;
1113 uint32_t devtype_memtype
;
1117 * Read the CoreSight registers needed during ROM Table Parsing (RTP).
1119 * @param ap Pointer to AP containing the component.
1120 * @param component_base On MEM-AP access method, base address of the component.
1121 * @param v Pointer to the struct holding the value of registers.
1123 * @return ERROR_OK on success, else a fault code.
1125 static int rtp_read_cs_regs(struct adiv5_ap
*ap
, target_addr_t component_base
,
1126 struct cs_component_vals
*v
)
1128 assert(IS_ALIGNED(component_base
, ARM_CS_ALIGN
));
1131 uint32_t cid0
, cid1
, cid2
, cid3
;
1132 uint32_t pid0
, pid1
, pid2
, pid3
, pid4
;
1133 int retval
= ERROR_OK
;
1136 v
->component_base
= component_base
;
1138 /* sort by offset to gain speed */
1141 * Registers DEVARCH, DEVID and DEVTYPE are valid on Class 0x9 devices
1142 * only, but are at offset above 0xf00, so can be read on any device
1143 * without triggering error. Read them for eventual use on Class 0x9.
1145 if (retval
== ERROR_OK
)
1146 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_C9_DEVARCH
, &v
->devarch
);
1148 if (retval
== ERROR_OK
)
1149 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_C9_DEVID
, &v
->devid
);
1151 /* Same address as ARM_CS_C1_MEMTYPE */
1152 if (retval
== ERROR_OK
)
1153 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_C9_DEVTYPE
, &v
->devtype_memtype
);
1155 if (retval
== ERROR_OK
)
1156 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_PIDR4
, &pid4
);
1158 if (retval
== ERROR_OK
)
1159 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_PIDR0
, &pid0
);
1160 if (retval
== ERROR_OK
)
1161 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_PIDR1
, &pid1
);
1162 if (retval
== ERROR_OK
)
1163 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_PIDR2
, &pid2
);
1164 if (retval
== ERROR_OK
)
1165 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_PIDR3
, &pid3
);
1167 if (retval
== ERROR_OK
)
1168 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_CIDR0
, &cid0
);
1169 if (retval
== ERROR_OK
)
1170 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_CIDR1
, &cid1
);
1171 if (retval
== ERROR_OK
)
1172 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_CIDR2
, &cid2
);
1173 if (retval
== ERROR_OK
)
1174 retval
= mem_ap_read_u32(ap
, component_base
+ ARM_CS_CIDR3
, &cid3
);
1176 if (retval
== ERROR_OK
)
1177 retval
= dap_run(ap
->dap
);
1178 if (retval
!= ERROR_OK
) {
1179 LOG_DEBUG("Failed read CoreSight registers");
1183 v
->cid
= (cid3
& 0xff) << 24
1184 | (cid2
& 0xff) << 16
1185 | (cid1
& 0xff) << 8
1187 v
->pid
= (uint64_t)(pid4
& 0xff) << 32
1188 | (pid3
& 0xff) << 24
1189 | (pid2
& 0xff) << 16
1190 | (pid1
& 0xff) << 8
1196 /* Part number interpretations are from Cortex
1197 * core specs, the CoreSight components TRM
1198 * (ARM DDI 0314H), CoreSight System Design
1199 * Guide (ARM DGI 0012D) and ETM specs; also
1200 * from chip observation (e.g. TI SDTI).
1203 static const struct dap_part_nums
{
1204 uint16_t designer_id
;
1208 } dap_part_nums
[] = {
1209 { ARM_ID
, 0x000, "Cortex-M3 SCS", "(System Control Space)", },
1210 { ARM_ID
, 0x001, "Cortex-M3 ITM", "(Instrumentation Trace Module)", },
1211 { ARM_ID
, 0x002, "Cortex-M3 DWT", "(Data Watchpoint and Trace)", },
1212 { ARM_ID
, 0x003, "Cortex-M3 FPB", "(Flash Patch and Breakpoint)", },
1213 { ARM_ID
, 0x008, "Cortex-M0 SCS", "(System Control Space)", },
1214 { ARM_ID
, 0x00a, "Cortex-M0 DWT", "(Data Watchpoint and Trace)", },
1215 { ARM_ID
, 0x00b, "Cortex-M0 BPU", "(Breakpoint Unit)", },
1216 { ARM_ID
, 0x00c, "Cortex-M4 SCS", "(System Control Space)", },
1217 { ARM_ID
, 0x00d, "CoreSight ETM11", "(Embedded Trace)", },
1218 { ARM_ID
, 0x00e, "Cortex-M7 FPB", "(Flash Patch and Breakpoint)", },
1219 { ARM_ID
, 0x193, "SoC-600 TSGEN", "(Timestamp Generator)", },
1220 { ARM_ID
, 0x470, "Cortex-M1 ROM", "(ROM Table)", },
1221 { ARM_ID
, 0x471, "Cortex-M0 ROM", "(ROM Table)", },
1222 { ARM_ID
, 0x490, "Cortex-A15 GIC", "(Generic Interrupt Controller)", },
1223 { ARM_ID
, 0x492, "Cortex-R52 GICD", "(Distributor)", },
1224 { ARM_ID
, 0x493, "Cortex-R52 GICR", "(Redistributor)", },
1225 { ARM_ID
, 0x4a1, "Cortex-A53 ROM", "(v8 Memory Map ROM Table)", },
1226 { ARM_ID
, 0x4a2, "Cortex-A57 ROM", "(ROM Table)", },
1227 { ARM_ID
, 0x4a3, "Cortex-A53 ROM", "(v7 Memory Map ROM Table)", },
1228 { ARM_ID
, 0x4a4, "Cortex-A72 ROM", "(ROM Table)", },
1229 { ARM_ID
, 0x4a9, "Cortex-A9 ROM", "(ROM Table)", },
1230 { ARM_ID
, 0x4aa, "Cortex-A35 ROM", "(v8 Memory Map ROM Table)", },
1231 { ARM_ID
, 0x4af, "Cortex-A15 ROM", "(ROM Table)", },
1232 { ARM_ID
, 0x4b5, "Cortex-R5 ROM", "(ROM Table)", },
1233 { ARM_ID
, 0x4b8, "Cortex-R52 ROM", "(ROM Table)", },
1234 { ARM_ID
, 0x4c0, "Cortex-M0+ ROM", "(ROM Table)", },
1235 { ARM_ID
, 0x4c3, "Cortex-M3 ROM", "(ROM Table)", },
1236 { ARM_ID
, 0x4c4, "Cortex-M4 ROM", "(ROM Table)", },
1237 { ARM_ID
, 0x4c7, "Cortex-M7 PPB ROM", "(Private Peripheral Bus ROM Table)", },
1238 { ARM_ID
, 0x4c8, "Cortex-M7 ROM", "(ROM Table)", },
1239 { ARM_ID
, 0x4e0, "Cortex-A35 ROM", "(v7 Memory Map ROM Table)", },
1240 { ARM_ID
, 0x4e4, "Cortex-A76 ROM", "(ROM Table)", },
1241 { ARM_ID
, 0x906, "CoreSight CTI", "(Cross Trigger)", },
1242 { ARM_ID
, 0x907, "CoreSight ETB", "(Trace Buffer)", },
1243 { ARM_ID
, 0x908, "CoreSight CSTF", "(Trace Funnel)", },
1244 { ARM_ID
, 0x909, "CoreSight ATBR", "(Advanced Trace Bus Replicator)", },
1245 { ARM_ID
, 0x910, "CoreSight ETM9", "(Embedded Trace)", },
1246 { ARM_ID
, 0x912, "CoreSight TPIU", "(Trace Port Interface Unit)", },
1247 { ARM_ID
, 0x913, "CoreSight ITM", "(Instrumentation Trace Macrocell)", },
1248 { ARM_ID
, 0x914, "CoreSight SWO", "(Single Wire Output)", },
1249 { ARM_ID
, 0x917, "CoreSight HTM", "(AHB Trace Macrocell)", },
1250 { ARM_ID
, 0x920, "CoreSight ETM11", "(Embedded Trace)", },
1251 { ARM_ID
, 0x921, "Cortex-A8 ETM", "(Embedded Trace)", },
1252 { ARM_ID
, 0x922, "Cortex-A8 CTI", "(Cross Trigger)", },
1253 { ARM_ID
, 0x923, "Cortex-M3 TPIU", "(Trace Port Interface Unit)", },
1254 { ARM_ID
, 0x924, "Cortex-M3 ETM", "(Embedded Trace)", },
1255 { ARM_ID
, 0x925, "Cortex-M4 ETM", "(Embedded Trace)", },
1256 { ARM_ID
, 0x930, "Cortex-R4 ETM", "(Embedded Trace)", },
1257 { ARM_ID
, 0x931, "Cortex-R5 ETM", "(Embedded Trace)", },
1258 { ARM_ID
, 0x932, "CoreSight MTB-M0+", "(Micro Trace Buffer)", },
1259 { ARM_ID
, 0x941, "CoreSight TPIU-Lite", "(Trace Port Interface Unit)", },
1260 { ARM_ID
, 0x950, "Cortex-A9 PTM", "(Program Trace Macrocell)", },
1261 { ARM_ID
, 0x955, "Cortex-A5 ETM", "(Embedded Trace)", },
1262 { ARM_ID
, 0x95a, "Cortex-A72 ETM", "(Embedded Trace)", },
1263 { ARM_ID
, 0x95b, "Cortex-A17 PTM", "(Program Trace Macrocell)", },
1264 { ARM_ID
, 0x95d, "Cortex-A53 ETM", "(Embedded Trace)", },
1265 { ARM_ID
, 0x95e, "Cortex-A57 ETM", "(Embedded Trace)", },
1266 { ARM_ID
, 0x95f, "Cortex-A15 PTM", "(Program Trace Macrocell)", },
1267 { ARM_ID
, 0x961, "CoreSight TMC", "(Trace Memory Controller)", },
1268 { ARM_ID
, 0x962, "CoreSight STM", "(System Trace Macrocell)", },
1269 { ARM_ID
, 0x975, "Cortex-M7 ETM", "(Embedded Trace)", },
1270 { ARM_ID
, 0x9a0, "CoreSight PMU", "(Performance Monitoring Unit)", },
1271 { ARM_ID
, 0x9a1, "Cortex-M4 TPIU", "(Trace Port Interface Unit)", },
1272 { ARM_ID
, 0x9a4, "CoreSight GPR", "(Granular Power Requester)", },
1273 { ARM_ID
, 0x9a5, "Cortex-A5 PMU", "(Performance Monitor Unit)", },
1274 { ARM_ID
, 0x9a7, "Cortex-A7 PMU", "(Performance Monitor Unit)", },
1275 { ARM_ID
, 0x9a8, "Cortex-A53 CTI", "(Cross Trigger)", },
1276 { ARM_ID
, 0x9a9, "Cortex-M7 TPIU", "(Trace Port Interface Unit)", },
1277 { ARM_ID
, 0x9ae, "Cortex-A17 PMU", "(Performance Monitor Unit)", },
1278 { ARM_ID
, 0x9af, "Cortex-A15 PMU", "(Performance Monitor Unit)", },
1279 { ARM_ID
, 0x9b6, "Cortex-R52 PMU/CTI/ETM", "(Performance Monitor Unit/Cross Trigger/ETM)", },
1280 { ARM_ID
, 0x9b7, "Cortex-R7 PMU", "(Performance Monitor Unit)", },
1281 { ARM_ID
, 0x9d3, "Cortex-A53 PMU", "(Performance Monitor Unit)", },
1282 { ARM_ID
, 0x9d7, "Cortex-A57 PMU", "(Performance Monitor Unit)", },
1283 { ARM_ID
, 0x9d8, "Cortex-A72 PMU", "(Performance Monitor Unit)", },
1284 { ARM_ID
, 0x9da, "Cortex-A35 PMU/CTI/ETM", "(Performance Monitor Unit/Cross Trigger/ETM)", },
1285 { ARM_ID
, 0x9e2, "SoC-600 APB-AP", "(APB4 Memory Access Port)", },
1286 { ARM_ID
, 0x9e3, "SoC-600 AHB-AP", "(AHB5 Memory Access Port)", },
1287 { ARM_ID
, 0x9e4, "SoC-600 AXI-AP", "(AXI Memory Access Port)", },
1288 { ARM_ID
, 0x9e5, "SoC-600 APv1 Adapter", "(Access Port v1 Adapter)", },
1289 { ARM_ID
, 0x9e6, "SoC-600 JTAG-AP", "(JTAG Access Port)", },
1290 { ARM_ID
, 0x9e7, "SoC-600 TPIU", "(Trace Port Interface Unit)", },
1291 { ARM_ID
, 0x9e8, "SoC-600 TMC ETR/ETS", "(Embedded Trace Router/Streamer)", },
1292 { ARM_ID
, 0x9e9, "SoC-600 TMC ETB", "(Embedded Trace Buffer)", },
1293 { ARM_ID
, 0x9ea, "SoC-600 TMC ETF", "(Embedded Trace FIFO)", },
1294 { ARM_ID
, 0x9eb, "SoC-600 ATB Funnel", "(Trace Funnel)", },
1295 { ARM_ID
, 0x9ec, "SoC-600 ATB Replicator", "(Trace Replicator)", },
1296 { ARM_ID
, 0x9ed, "SoC-600 CTI", "(Cross Trigger)", },
1297 { ARM_ID
, 0x9ee, "SoC-600 CATU", "(Address Translation Unit)", },
1298 { ARM_ID
, 0xc05, "Cortex-A5 Debug", "(Debug Unit)", },
1299 { ARM_ID
, 0xc07, "Cortex-A7 Debug", "(Debug Unit)", },
1300 { ARM_ID
, 0xc08, "Cortex-A8 Debug", "(Debug Unit)", },
1301 { ARM_ID
, 0xc09, "Cortex-A9 Debug", "(Debug Unit)", },
1302 { ARM_ID
, 0xc0e, "Cortex-A17 Debug", "(Debug Unit)", },
1303 { ARM_ID
, 0xc0f, "Cortex-A15 Debug", "(Debug Unit)", },
1304 { ARM_ID
, 0xc14, "Cortex-R4 Debug", "(Debug Unit)", },
1305 { ARM_ID
, 0xc15, "Cortex-R5 Debug", "(Debug Unit)", },
1306 { ARM_ID
, 0xc17, "Cortex-R7 Debug", "(Debug Unit)", },
1307 { ARM_ID
, 0xd03, "Cortex-A53 Debug", "(Debug Unit)", },
1308 { ARM_ID
, 0xd04, "Cortex-A35 Debug", "(Debug Unit)", },
1309 { ARM_ID
, 0xd07, "Cortex-A57 Debug", "(Debug Unit)", },
1310 { ARM_ID
, 0xd08, "Cortex-A72 Debug", "(Debug Unit)", },
1311 { ARM_ID
, 0xd0b, "Cortex-A76 Debug", "(Debug Unit)", },
1312 { ARM_ID
, 0xd0c, "Neoverse N1", "(Debug Unit)", },
1313 { ARM_ID
, 0xd13, "Cortex-R52 Debug", "(Debug Unit)", },
1314 { ARM_ID
, 0xd49, "Neoverse N2", "(Debug Unit)", },
1315 { 0x017, 0x120, "TI SDTI", "(System Debug Trace Interface)", }, /* from OMAP3 memmap */
1316 { 0x017, 0x343, "TI DAPCTL", "", }, /* from OMAP3 memmap */
1317 { 0x017, 0x9af, "MSP432 ROM", "(ROM Table)" },
1318 { 0x01f, 0xcd0, "Atmel CPU with DSU", "(CPU)" },
1319 { 0x041, 0x1db, "XMC4500 ROM", "(ROM Table)" },
1320 { 0x041, 0x1df, "XMC4700/4800 ROM", "(ROM Table)" },
1321 { 0x041, 0x1ed, "XMC1000 ROM", "(ROM Table)" },
1322 { 0x065, 0x000, "SHARC+/Blackfin+", "", },
1323 { 0x070, 0x440, "Qualcomm QDSS Component v1", "(Qualcomm Designed CoreSight Component v1)", },
1324 { 0x0bf, 0x100, "Brahma-B53 Debug", "(Debug Unit)", },
1325 { 0x0bf, 0x9d3, "Brahma-B53 PMU", "(Performance Monitor Unit)", },
1326 { 0x0bf, 0x4a1, "Brahma-B53 ROM", "(ROM Table)", },
1327 { 0x0bf, 0x721, "Brahma-B53 ROM", "(ROM Table)", },
1328 { 0x1eb, 0x181, "Tegra 186 ROM", "(ROM Table)", },
1329 { 0x1eb, 0x202, "Denver ETM", "(Denver Embedded Trace)", },
1330 { 0x1eb, 0x211, "Tegra 210 ROM", "(ROM Table)", },
1331 { 0x1eb, 0x302, "Denver Debug", "(Debug Unit)", },
1332 { 0x1eb, 0x402, "Denver PMU", "(Performance Monitor Unit)", },
1335 static const struct dap_part_nums
*pidr_to_part_num(unsigned int designer_id
, unsigned int part_num
)
1337 static const struct dap_part_nums unknown
= {
1338 .type
= "Unrecognized",
1342 for (unsigned int i
= 0; i
< ARRAY_SIZE(dap_part_nums
); i
++)
1343 if (dap_part_nums
[i
].designer_id
== designer_id
&& dap_part_nums
[i
].part_num
== part_num
)
1344 return &dap_part_nums
[i
];
1349 static int dap_devtype_display(struct command_invocation
*cmd
, uint32_t devtype
)
1351 const char *major
= "Reserved", *subtype
= "Reserved";
1352 const unsigned int minor
= (devtype
& ARM_CS_C9_DEVTYPE_SUB_MASK
) >> ARM_CS_C9_DEVTYPE_SUB_SHIFT
;
1353 const unsigned int devtype_major
= (devtype
& ARM_CS_C9_DEVTYPE_MAJOR_MASK
) >> ARM_CS_C9_DEVTYPE_MAJOR_SHIFT
;
1354 switch (devtype_major
) {
1356 major
= "Miscellaneous";
1362 subtype
= "Validation component";
1367 major
= "Trace Sink";
1384 major
= "Trace Link";
1390 subtype
= "Funnel, router";
1396 subtype
= "FIFO, buffer";
1401 major
= "Trace Source";
1407 subtype
= "Processor";
1413 subtype
= "Engine/Coprocessor";
1419 subtype
= "Software";
1424 major
= "Debug Control";
1430 subtype
= "Trigger Matrix";
1433 subtype
= "Debug Auth";
1436 subtype
= "Power Requestor";
1441 major
= "Debug Logic";
1447 subtype
= "Processor";
1453 subtype
= "Engine/Coprocessor";
1464 major
= "Performance Monitor";
1470 subtype
= "Processor";
1476 subtype
= "Engine/Coprocessor";
1487 command_print(cmd
, "\t\tType is 0x%02x, %s, %s",
1488 devtype
& ARM_CS_C9_DEVTYPE_MASK
,
1494 * Actions/operations to be executed while parsing ROM tables.
1498 * Executed at the start of a new MEM-AP, typically to print the MEM-AP header.
1499 * @param retval Error encountered while reading AP.
1500 * @param ap Pointer to AP.
1501 * @param dbgbase Value of MEM-AP Debug Base Address register.
1502 * @param apid Value of MEM-AP IDR Identification Register.
1503 * @param priv Pointer to private data.
1504 * @return ERROR_OK on success, else a fault code.
1506 int (*mem_ap_header
)(int retval
, struct adiv5_ap
*ap
, uint64_t dbgbase
,
1507 uint32_t apid
, void *priv
);
1509 * Executed when a CoreSight component is parsed, typically to print
1510 * information on the component.
1511 * @param retval Error encountered while reading component's registers.
1512 * @param v Pointer to a container of the component's registers.
1513 * @param depth The current depth level of ROM table.
1514 * @param priv Pointer to private data.
1515 * @return ERROR_OK on success, else a fault code.
1517 int (*cs_component
)(int retval
, struct cs_component_vals
*v
, int depth
, void *priv
);
1519 * Executed for each entry of a ROM table, typically to print the entry
1520 * and information about validity or end-of-table mark.
1521 * @param retval Error encountered while reading the ROM table entry.
1522 * @param depth The current depth level of ROM table.
1523 * @param offset The offset of the entry in the ROM table.
1524 * @param romentry The value of the ROM table entry.
1525 * @param priv Pointer to private data.
1526 * @return ERROR_OK on success, else a fault code.
1528 int (*rom_table_entry
)(int retval
, int depth
, unsigned int offset
, uint64_t romentry
,
1537 * Wrapper around struct rtp_ops::mem_ap_header.
1538 * Input parameter @a retval is propagated.
1540 static int rtp_ops_mem_ap_header(const struct rtp_ops
*ops
,
1541 int retval
, struct adiv5_ap
*ap
, uint64_t dbgbase
, uint32_t apid
)
1543 if (!ops
->mem_ap_header
)
1546 int retval1
= ops
->mem_ap_header(retval
, ap
, dbgbase
, apid
, ops
->priv
);
1547 if (retval
!= ERROR_OK
)
1553 * Wrapper around struct rtp_ops::cs_component.
1554 * Input parameter @a retval is propagated.
1556 static int rtp_ops_cs_component(const struct rtp_ops
*ops
,
1557 int retval
, struct cs_component_vals
*v
, int depth
)
1559 if (!ops
->cs_component
)
1562 int retval1
= ops
->cs_component(retval
, v
, depth
, ops
->priv
);
1563 if (retval
!= ERROR_OK
)
1569 * Wrapper around struct rtp_ops::rom_table_entry.
1570 * Input parameter @a retval is propagated.
1572 static int rtp_ops_rom_table_entry(const struct rtp_ops
*ops
,
1573 int retval
, int depth
, unsigned int offset
, uint64_t romentry
)
1575 if (!ops
->rom_table_entry
)
1578 int retval1
= ops
->rom_table_entry(retval
, depth
, offset
, romentry
, ops
->priv
);
1579 if (retval
!= ERROR_OK
)
1584 /* Broken ROM tables can have circular references. Stop after a while */
1585 #define ROM_TABLE_MAX_DEPTH (16)
1588 * Value used only during lookup of a CoreSight component in ROM table.
1589 * Return CORESIGHT_COMPONENT_FOUND when component is found.
1590 * Return ERROR_OK when component is not found yet.
1591 * Return any other ERROR_* in case of error.
1593 #define CORESIGHT_COMPONENT_FOUND (1)
1595 static int rtp_cs_component(const struct rtp_ops
*ops
,
1596 struct adiv5_ap
*ap
, target_addr_t dbgbase
, int depth
);
1598 static int rtp_rom_loop(const struct rtp_ops
*ops
,
1599 struct adiv5_ap
*ap
, target_addr_t base_address
, int depth
,
1600 unsigned int width
, unsigned int max_entries
)
1602 assert(IS_ALIGNED(base_address
, ARM_CS_ALIGN
));
1604 unsigned int offset
= 0;
1605 while (max_entries
--) {
1607 uint32_t romentry_low
, romentry_high
;
1608 target_addr_t component_base
;
1609 unsigned int saved_offset
= offset
;
1611 int retval
= mem_ap_read_u32(ap
, base_address
+ offset
, &romentry_low
);
1613 if (retval
== ERROR_OK
&& width
== 64) {
1614 retval
= mem_ap_read_u32(ap
, base_address
+ offset
, &romentry_high
);
1617 if (retval
== ERROR_OK
)
1618 retval
= dap_run(ap
->dap
);
1619 if (retval
!= ERROR_OK
) {
1620 LOG_DEBUG("Failed read ROM table entry");
1625 romentry
= (((uint64_t)romentry_high
) << 32) | romentry_low
;
1626 component_base
= base_address
+
1627 ((((uint64_t)romentry_high
) << 32) | (romentry_low
& ARM_CS_ROMENTRY_OFFSET_MASK
));
1629 romentry
= romentry_low
;
1630 /* "romentry" is signed */
1631 component_base
= base_address
+ (int32_t)(romentry_low
& ARM_CS_ROMENTRY_OFFSET_MASK
);
1632 if (!is_64bit_ap(ap
))
1633 component_base
= (uint32_t)component_base
;
1635 retval
= rtp_ops_rom_table_entry(ops
, retval
, depth
, saved_offset
, romentry
);
1636 if (retval
!= ERROR_OK
)
1639 if (romentry
== 0) {
1640 /* End of ROM table */
1644 if (!(romentry
& ARM_CS_ROMENTRY_PRESENT
))
1648 retval
= rtp_cs_component(ops
, ap
, component_base
, depth
+ 1);
1649 if (retval
== CORESIGHT_COMPONENT_FOUND
)
1650 return CORESIGHT_COMPONENT_FOUND
;
1651 if (retval
!= ERROR_OK
) {
1652 /* TODO: do we need to send an ABORT before continuing? */
1653 LOG_DEBUG("Ignore error parsing CoreSight component");
1661 static int rtp_cs_component(const struct rtp_ops
*ops
,
1662 struct adiv5_ap
*ap
, target_addr_t base_address
, int depth
)
1664 struct cs_component_vals v
;
1667 assert(IS_ALIGNED(base_address
, ARM_CS_ALIGN
));
1669 if (depth
> ROM_TABLE_MAX_DEPTH
)
1670 retval
= ERROR_FAIL
;
1672 retval
= rtp_read_cs_regs(ap
, base_address
, &v
);
1674 retval
= rtp_ops_cs_component(ops
, retval
, &v
, depth
);
1675 if (retval
== CORESIGHT_COMPONENT_FOUND
)
1676 return CORESIGHT_COMPONENT_FOUND
;
1677 if (retval
!= ERROR_OK
)
1678 return ERROR_OK
; /* Don't abort recursion */
1680 if (!is_valid_arm_cs_cidr(v
.cid
))
1681 return ERROR_OK
; /* Don't abort recursion */
1683 const unsigned int class = ARM_CS_CIDR_CLASS(v
.cid
);
1685 if (class == ARM_CS_CLASS_0X1_ROM_TABLE
)
1686 return rtp_rom_loop(ops
, ap
, base_address
, depth
, 32, 960);
1688 if (class == ARM_CS_CLASS_0X9_CS_COMPONENT
) {
1689 if ((v
.devarch
& ARM_CS_C9_DEVARCH_PRESENT
) == 0)
1692 /* quit if not ROM table */
1693 if ((v
.devarch
& DEVARCH_ID_MASK
) != DEVARCH_ROM_C_0X9
)
1696 if ((v
.devid
& ARM_CS_C9_DEVID_FORMAT_MASK
) == ARM_CS_C9_DEVID_FORMAT_64BIT
)
1697 return rtp_rom_loop(ops
, ap
, base_address
, depth
, 64, 256);
1699 return rtp_rom_loop(ops
, ap
, base_address
, depth
, 32, 512);
1702 /* Class other than 0x1 and 0x9 */
1706 static int rtp_ap(const struct rtp_ops
*ops
, struct adiv5_ap
*ap
)
1710 target_addr_t dbgbase
, invalid_entry
;
1712 /* Now we read ROM table ID registers, ref. ARM IHI 0029B sec */
1713 retval
= dap_get_debugbase(ap
, &dbgbase
, &apid
);
1714 if (retval
!= ERROR_OK
)
1716 retval
= rtp_ops_mem_ap_header(ops
, retval
, ap
, dbgbase
, apid
);
1717 if (retval
!= ERROR_OK
)
1723 /* NOTE: a MEM-AP may have a single CoreSight component that's
1724 * not a ROM table ... or have no such components at all.
1726 const unsigned int class = (apid
& AP_REG_IDR_CLASS_MASK
) >> AP_REG_IDR_CLASS_SHIFT
;
1728 if (class == AP_REG_IDR_CLASS_MEM_AP
) {
1729 if (is_64bit_ap(ap
))
1730 invalid_entry
= 0xFFFFFFFFFFFFFFFFull
;
1732 invalid_entry
= 0xFFFFFFFFul
;
1734 if (dbgbase
!= invalid_entry
&& (dbgbase
& 0x3) != 0x2) {
1735 retval
= rtp_cs_component(ops
, ap
, dbgbase
& 0xFFFFFFFFFFFFF000ull
, 0);
1736 if (retval
== CORESIGHT_COMPONENT_FOUND
)
1737 return CORESIGHT_COMPONENT_FOUND
;
1744 /* Actions for command "dap info" */
1746 static int dap_info_mem_ap_header(int retval
, struct adiv5_ap
*ap
,
1747 target_addr_t dbgbase
, uint32_t apid
, void *priv
)
1749 struct command_invocation
*cmd
= priv
;
1750 target_addr_t invalid_entry
;
1752 if (retval
!= ERROR_OK
) {
1753 command_print(cmd
, "\t\tCan't read MEM-AP, the corresponding core might be turned off");
1757 command_print(cmd
, "AP ID register 0x%8.8" PRIx32
, apid
);
1759 command_print(cmd
, "No AP found at this ap 0x%x", ap
->ap_num
);
1763 command_print(cmd
, "\tType is %s", ap_type_to_description(apid
& AP_TYPE_MASK
));
1765 /* NOTE: a MEM-AP may have a single CoreSight component that's
1766 * not a ROM table ... or have no such components at all.
1768 const unsigned int class = (apid
& AP_REG_IDR_CLASS_MASK
) >> AP_REG_IDR_CLASS_SHIFT
;
1770 if (class == AP_REG_IDR_CLASS_MEM_AP
) {
1771 if (is_64bit_ap(ap
))
1772 invalid_entry
= 0xFFFFFFFFFFFFFFFFull
;
1774 invalid_entry
= 0xFFFFFFFFul
;
1776 command_print(cmd
, "MEM-AP BASE " TARGET_ADDR_FMT
, dbgbase
);
1778 if (dbgbase
== invalid_entry
|| (dbgbase
& 0x3) == 0x2) {
1779 command_print(cmd
, "\tNo ROM table present");
1782 command_print(cmd
, "\tValid ROM table present");
1784 command_print(cmd
, "\tROM table in legacy format");
1791 static int dap_info_cs_component(int retval
, struct cs_component_vals
*v
, int depth
, void *priv
)
1793 struct command_invocation
*cmd
= priv
;
1795 if (depth
> ROM_TABLE_MAX_DEPTH
) {
1796 command_print(cmd
, "\tTables too deep");
1800 command_print(cmd
, "\t\tComponent base address " TARGET_ADDR_FMT
, v
->component_base
);
1802 if (retval
!= ERROR_OK
) {
1803 command_print(cmd
, "\t\tCan't read component, the corresponding core might be turned off");
1807 if (!is_valid_arm_cs_cidr(v
->cid
)) {
1808 command_print(cmd
, "\t\tInvalid CID 0x%08" PRIx32
, v
->cid
);
1809 return ERROR_OK
; /* Don't abort recursion */
1812 /* component may take multiple 4K pages */
1813 uint32_t size
= ARM_CS_PIDR_SIZE(v
->pid
);
1815 command_print(cmd
, "\t\tStart address " TARGET_ADDR_FMT
, v
->component_base
- 0x1000 * size
);
1817 command_print(cmd
, "\t\tPeripheral ID 0x%010" PRIx64
, v
->pid
);
1819 const unsigned int part_num
= ARM_CS_PIDR_PART(v
->pid
);
1820 unsigned int designer_id
= ARM_CS_PIDR_DESIGNER(v
->pid
);
1822 if (v
->pid
& ARM_CS_PIDR_JEDEC
) {
1824 command_print(cmd
, "\t\tDesigner is 0x%03x, %s",
1825 designer_id
, jep106_manufacturer(designer_id
));
1827 /* Legacy ASCII ID, clear invalid bits */
1828 designer_id
&= 0x7f;
1829 command_print(cmd
, "\t\tDesigner ASCII code 0x%02x, %s",
1830 designer_id
, designer_id
== 0x41 ? "ARM" : "<unknown>");
1833 const struct dap_part_nums
*partnum
= pidr_to_part_num(designer_id
, part_num
);
1834 command_print(cmd
, "\t\tPart is 0x%03x, %s %s", part_num
, partnum
->type
, partnum
->full
);
1836 const unsigned int class = ARM_CS_CIDR_CLASS(v
->cid
);
1837 command_print(cmd
, "\t\tComponent class is 0x%x, %s", class, class_description
[class]);
1839 if (class == ARM_CS_CLASS_0X1_ROM_TABLE
) {
1840 if (v
->devtype_memtype
& ARM_CS_C1_MEMTYPE_SYSMEM_MASK
)
1841 command_print(cmd
, "\t\tMEMTYPE system memory present on bus");
1843 command_print(cmd
, "\t\tMEMTYPE system memory not present: dedicated debug bus");
1847 if (class == ARM_CS_CLASS_0X9_CS_COMPONENT
) {
1848 dap_devtype_display(cmd
, v
->devtype_memtype
);
1850 /* REVISIT also show ARM_CS_C9_DEVID */
1852 if ((v
->devarch
& ARM_CS_C9_DEVARCH_PRESENT
) == 0)
1855 unsigned int architect_id
= ARM_CS_C9_DEVARCH_ARCHITECT(v
->devarch
);
1856 unsigned int revision
= ARM_CS_C9_DEVARCH_REVISION(v
->devarch
);
1857 command_print(cmd
, "\t\tDev Arch is 0x%08" PRIx32
", %s \"%s\" rev.%u", v
->devarch
,
1858 jep106_manufacturer(architect_id
), class0x9_devarch_description(v
->devarch
),
1861 if ((v
->devarch
& DEVARCH_ID_MASK
) == DEVARCH_ROM_C_0X9
) {
1862 command_print(cmd
, "\t\tType is ROM table");
1864 if (v
->devid
& ARM_CS_C9_DEVID_SYSMEM_MASK
)
1865 command_print(cmd
, "\t\tMEMTYPE system memory present on bus");
1867 command_print(cmd
, "\t\tMEMTYPE system memory not present: dedicated debug bus");
1872 /* Class other than 0x1 and 0x9 */
1876 static int dap_info_rom_table_entry(int retval
, int depth
,
1877 unsigned int offset
, uint64_t romentry
, void *priv
)
1879 struct command_invocation
*cmd
= priv
;
1883 snprintf(tabs
, sizeof(tabs
), "[L%02d] ", depth
);
1885 if (retval
!= ERROR_OK
) {
1886 command_print(cmd
, "\t%sROMTABLE[0x%x] Read error", tabs
, offset
);
1887 command_print(cmd
, "\t\tUnable to continue");
1888 command_print(cmd
, "\t%s\tStop parsing of ROM table", tabs
);
1892 command_print(cmd
, "\t%sROMTABLE[0x%x] = 0x%08" PRIx64
,
1893 tabs
, offset
, romentry
);
1895 if (romentry
== 0) {
1896 command_print(cmd
, "\t%s\tEnd of ROM table", tabs
);
1900 if (!(romentry
& ARM_CS_ROMENTRY_PRESENT
)) {
1901 command_print(cmd
, "\t\tComponent not present");
1908 int dap_info_command(struct command_invocation
*cmd
, struct adiv5_ap
*ap
)
1910 struct rtp_ops dap_info_ops
= {
1911 .mem_ap_header
= dap_info_mem_ap_header
,
1912 .cs_component
= dap_info_cs_component
,
1913 .rom_table_entry
= dap_info_rom_table_entry
,
1917 return rtp_ap(&dap_info_ops
, ap
);
1920 /* Actions for dap_lookup_cs_component() */
1922 struct dap_lookup_data
{
1927 uint64_t component_base
;
1930 static int dap_lookup_cs_component_cs_component(int retval
,
1931 struct cs_component_vals
*v
, int depth
, void *priv
)
1933 struct dap_lookup_data
*lookup
= priv
;
1935 if (retval
!= ERROR_OK
)
1938 if (!is_valid_arm_cs_cidr(v
->cid
))
1941 const unsigned int class = ARM_CS_CIDR_CLASS(v
->cid
);
1942 if (class != ARM_CS_CLASS_0X9_CS_COMPONENT
)
1945 if ((v
->devtype_memtype
& ARM_CS_C9_DEVTYPE_MASK
) != lookup
->type
)
1949 /* search for next one */
1955 lookup
->component_base
= v
->component_base
;
1956 return CORESIGHT_COMPONENT_FOUND
;
1959 int dap_lookup_cs_component(struct adiv5_ap
*ap
, uint8_t type
,
1960 target_addr_t
*addr
, int32_t core_id
)
1962 struct dap_lookup_data lookup
= {
1966 struct rtp_ops dap_lookup_cs_component_ops
= {
1967 .mem_ap_header
= NULL
,
1968 .cs_component
= dap_lookup_cs_component_cs_component
,
1969 .rom_table_entry
= NULL
,
1973 int retval
= rtp_ap(&dap_lookup_cs_component_ops
, ap
);
1974 if (retval
== CORESIGHT_COMPONENT_FOUND
) {
1975 LOG_DEBUG("CS lookup found at 0x%" PRIx64
, lookup
.component_base
);
1976 *addr
= lookup
.component_base
;
1979 if (retval
!= ERROR_OK
) {
1980 LOG_DEBUG("CS lookup error %d", retval
);
1983 LOG_DEBUG("CS lookup not found");
1984 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
1987 enum adiv5_cfg_param
{
1991 CFG_CTIBASE
, /* DEPRECATED */
1994 static const struct jim_nvp nvp_config_opts
[] = {
1995 { .name
= "-dap", .value
= CFG_DAP
},
1996 { .name
= "-ap-num", .value
= CFG_AP_NUM
},
1997 { .name
= "-baseaddr", .value
= CFG_BASEADDR
},
1998 { .name
= "-ctibase", .value
= CFG_CTIBASE
}, /* DEPRECATED */
1999 { .name
= NULL
, .value
= -1 }
2002 static int adiv5_jim_spot_configure(struct jim_getopt_info
*goi
,
2003 struct adiv5_dap
**dap_p
, int *ap_num_p
, uint32_t *base_p
)
2005 assert(dap_p
&& ap_num_p
);
2010 Jim_SetEmptyResult(goi
->interp
);
2013 int e
= jim_nvp_name2value_obj(goi
->interp
, nvp_config_opts
,
2016 return JIM_CONTINUE
;
2018 /* base_p can be NULL, then '-baseaddr' option is treated as unknown */
2019 if (!base_p
&& (n
->value
== CFG_BASEADDR
|| n
->value
== CFG_CTIBASE
))
2020 return JIM_CONTINUE
;
2022 e
= jim_getopt_obj(goi
, NULL
);
2028 if (goi
->isconfigure
) {
2030 struct adiv5_dap
*dap
;
2031 e
= jim_getopt_obj(goi
, &o_t
);
2034 dap
= dap_instance_by_jim_obj(goi
->interp
, o_t
);
2036 Jim_SetResultString(goi
->interp
, "DAP name invalid!", -1);
2039 if (*dap_p
&& *dap_p
!= dap
) {
2040 Jim_SetResultString(goi
->interp
,
2041 "DAP assignment cannot be changed!", -1);
2049 Jim_SetResultString(goi
->interp
, "DAP not configured", -1);
2052 Jim_SetResultString(goi
->interp
, adiv5_dap_name(*dap_p
), -1);
2057 if (goi
->isconfigure
) {
2059 e
= jim_getopt_wide(goi
, &ap_num
);
2062 if (ap_num
< 0 || ap_num
> DP_APSEL_MAX
) {
2063 Jim_SetResultString(goi
->interp
, "Invalid AP number!", -1);
2070 if (*ap_num_p
== DP_APSEL_INVALID
) {
2071 Jim_SetResultString(goi
->interp
, "AP number not configured", -1);
2074 Jim_SetResult(goi
->interp
, Jim_NewIntObj(goi
->interp
, *ap_num_p
));
2079 LOG_WARNING("DEPRECATED! use \'-baseaddr' not \'-ctibase\'");
2082 if (goi
->isconfigure
) {
2084 e
= jim_getopt_wide(goi
, &base
);
2087 *base_p
= (uint32_t)base
;
2091 Jim_SetResult(goi
->interp
, Jim_NewIntObj(goi
->interp
, *base_p
));
2099 Jim_WrongNumArgs(goi
->interp
, goi
->argc
, goi
->argv
, "NO PARAMS");
2103 int adiv5_jim_configure(struct target
*target
, struct jim_getopt_info
*goi
)
2105 struct adiv5_private_config
*pc
;
2108 pc
= (struct adiv5_private_config
*)target
->private_config
;
2110 pc
= calloc(1, sizeof(struct adiv5_private_config
));
2112 LOG_ERROR("Out of memory");
2115 pc
->ap_num
= DP_APSEL_INVALID
;
2116 target
->private_config
= pc
;
2119 target
->has_dap
= true;
2121 e
= adiv5_jim_spot_configure(goi
, &pc
->dap
, &pc
->ap_num
, NULL
);
2125 if (pc
->dap
&& !target
->dap_configured
) {
2126 if (target
->tap_configured
) {
2128 Jim_SetResultString(goi
->interp
,
2129 "-chain-position and -dap configparams are mutually exclusive!", -1);
2132 target
->tap
= pc
->dap
->tap
;
2133 target
->dap_configured
= true;
2139 int adiv5_verify_config(struct adiv5_private_config
*pc
)
2150 int adiv5_jim_mem_ap_spot_configure(struct adiv5_mem_ap_spot
*cfg
,
2151 struct jim_getopt_info
*goi
)
2153 return adiv5_jim_spot_configure(goi
, &cfg
->dap
, &cfg
->ap_num
, &cfg
->base
);
2156 int adiv5_mem_ap_spot_init(struct adiv5_mem_ap_spot
*p
)
2159 p
->ap_num
= DP_APSEL_INVALID
;
2164 COMMAND_HANDLER(handle_dap_info_command
)
2166 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2174 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], apsel
);
2175 if (apsel
> DP_APSEL_MAX
) {
2176 command_print(CMD
, "Invalid AP number");
2177 return ERROR_COMMAND_ARGUMENT_INVALID
;
2181 return ERROR_COMMAND_SYNTAX_ERROR
;
2184 struct adiv5_ap
*ap
= dap_get_ap(dap
, apsel
);
2186 command_print(CMD
, "Cannot get AP");
2190 int retval
= dap_info_command(CMD
, ap
);
2195 COMMAND_HANDLER(dap_baseaddr_command
)
2197 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2198 uint32_t apsel
, baseaddr_lower
, baseaddr_upper
;
2199 struct adiv5_ap
*ap
;
2200 target_addr_t baseaddr
;
2210 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], apsel
);
2211 /* AP address is in bits 31:24 of DP_SELECT */
2212 if (apsel
> DP_APSEL_MAX
) {
2213 command_print(CMD
, "Invalid AP number");
2214 return ERROR_COMMAND_ARGUMENT_INVALID
;
2218 return ERROR_COMMAND_SYNTAX_ERROR
;
2221 /* NOTE: assumes we're talking to a MEM-AP, which
2222 * has a base address. There are other kinds of AP,
2223 * though they're not common for now. This should
2224 * use the ID register to verify it's a MEM-AP.
2227 ap
= dap_get_ap(dap
, apsel
);
2229 command_print(CMD
, "Cannot get AP");
2233 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_BASE(dap
), &baseaddr_lower
);
2235 if (retval
== ERROR_OK
&& ap
->cfg_reg
== MEM_AP_REG_CFG_INVALID
)
2236 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_CFG(dap
), &ap
->cfg_reg
);
2238 if (retval
== ERROR_OK
&& (ap
->cfg_reg
== MEM_AP_REG_CFG_INVALID
|| is_64bit_ap(ap
))) {
2239 /* MEM_AP_REG_BASE64 is defined as 'RES0'; can be read and then ignored on 32 bits AP */
2240 retval
= dap_queue_ap_read(ap
, MEM_AP_REG_BASE64(dap
), &baseaddr_upper
);
2243 if (retval
== ERROR_OK
)
2244 retval
= dap_run(dap
);
2246 if (retval
!= ERROR_OK
)
2249 if (is_64bit_ap(ap
)) {
2250 baseaddr
= (((target_addr_t
)baseaddr_upper
) << 32) | baseaddr_lower
;
2251 command_print(CMD
, "0x%016" PRIx64
, baseaddr
);
2253 command_print(CMD
, "0x%08" PRIx32
, baseaddr_lower
);
2258 COMMAND_HANDLER(dap_memaccess_command
)
2260 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2261 struct adiv5_ap
*ap
;
2262 uint32_t memaccess_tck
;
2266 ap
= dap_get_ap(dap
, dap
->apsel
);
2268 command_print(CMD
, "Cannot get AP");
2271 memaccess_tck
= ap
->memaccess_tck
;
2274 ap
= dap_get_config_ap(dap
, dap
->apsel
);
2276 command_print(CMD
, "Cannot get AP");
2279 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], memaccess_tck
);
2280 ap
->memaccess_tck
= memaccess_tck
;
2283 return ERROR_COMMAND_SYNTAX_ERROR
;
2288 command_print(CMD
, "memory bus access delay set to %" PRIu32
" tck",
2294 COMMAND_HANDLER(dap_apsel_command
)
2296 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2301 command_print(CMD
, "%" PRIu32
, dap
->apsel
);
2304 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], apsel
);
2305 /* AP address is in bits 31:24 of DP_SELECT */
2306 if (apsel
> DP_APSEL_MAX
) {
2307 command_print(CMD
, "Invalid AP number");
2308 return ERROR_COMMAND_ARGUMENT_INVALID
;
2312 return ERROR_COMMAND_SYNTAX_ERROR
;
2319 COMMAND_HANDLER(dap_apcsw_command
)
2321 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2322 struct adiv5_ap
*ap
;
2323 uint32_t csw_val
, csw_mask
;
2327 ap
= dap_get_ap(dap
, dap
->apsel
);
2329 command_print(CMD
, "Cannot get AP");
2332 command_print(CMD
, "ap %" PRIu32
" selected, csw 0x%8.8" PRIx32
,
2333 dap
->apsel
, ap
->csw_default
);
2336 if (strcmp(CMD_ARGV
[0], "default") == 0)
2337 csw_val
= CSW_AHB_DEFAULT
;
2339 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], csw_val
);
2341 if (csw_val
& (CSW_SIZE_MASK
| CSW_ADDRINC_MASK
)) {
2342 LOG_ERROR("CSW value cannot include 'Size' and 'AddrInc' bit-fields");
2343 return ERROR_COMMAND_ARGUMENT_INVALID
;
2345 ap
= dap_get_config_ap(dap
, dap
->apsel
);
2347 command_print(CMD
, "Cannot get AP");
2350 ap
->csw_default
= csw_val
;
2353 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], csw_val
);
2354 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[1], csw_mask
);
2355 if (csw_mask
& (CSW_SIZE_MASK
| CSW_ADDRINC_MASK
)) {
2356 LOG_ERROR("CSW mask cannot include 'Size' and 'AddrInc' bit-fields");
2357 return ERROR_COMMAND_ARGUMENT_INVALID
;
2359 ap
= dap_get_config_ap(dap
, dap
->apsel
);
2361 command_print(CMD
, "Cannot get AP");
2364 ap
->csw_default
= (ap
->csw_default
& ~csw_mask
) | (csw_val
& csw_mask
);
2367 return ERROR_COMMAND_SYNTAX_ERROR
;
2376 COMMAND_HANDLER(dap_apid_command
)
2378 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2379 uint32_t apsel
, apid
;
2387 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], apsel
);
2388 /* AP address is in bits 31:24 of DP_SELECT */
2389 if (apsel
> DP_APSEL_MAX
) {
2390 command_print(CMD
, "Invalid AP number");
2391 return ERROR_COMMAND_ARGUMENT_INVALID
;
2395 return ERROR_COMMAND_SYNTAX_ERROR
;
2398 struct adiv5_ap
*ap
= dap_get_ap(dap
, apsel
);
2400 command_print(CMD
, "Cannot get AP");
2403 retval
= dap_queue_ap_read(ap
, AP_REG_IDR(dap
), &apid
);
2404 if (retval
!= ERROR_OK
) {
2408 retval
= dap_run(dap
);
2410 if (retval
!= ERROR_OK
)
2413 command_print(CMD
, "0x%8.8" PRIx32
, apid
);
2418 COMMAND_HANDLER(dap_apreg_command
)
2420 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2421 uint32_t apsel
, reg
, value
;
2424 if (CMD_ARGC
< 2 || CMD_ARGC
> 3)
2425 return ERROR_COMMAND_SYNTAX_ERROR
;
2427 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], apsel
);
2428 /* AP address is in bits 31:24 of DP_SELECT */
2429 if (apsel
> DP_APSEL_MAX
) {
2430 command_print(CMD
, "Invalid AP number");
2431 return ERROR_COMMAND_ARGUMENT_INVALID
;
2434 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[1], reg
);
2435 if (reg
>= 256 || (reg
& 3)) {
2436 command_print(CMD
, "Invalid reg value (should be less than 256 and 4 bytes aligned)");
2437 return ERROR_COMMAND_ARGUMENT_INVALID
;
2440 struct adiv5_ap
*ap
= dap_get_ap(dap
, apsel
);
2442 command_print(CMD
, "Cannot get AP");
2446 if (CMD_ARGC
== 3) {
2447 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[2], value
);
2448 /* see if user supplied register address is a match for the CSW or TAR register */
2449 if (reg
== MEM_AP_REG_CSW(dap
)) {
2450 ap
->csw_value
= 0; /* invalid, in case write fails */
2451 retval
= dap_queue_ap_write(ap
, reg
, value
);
2452 if (retval
== ERROR_OK
)
2453 ap
->csw_value
= value
;
2454 } else if (reg
== MEM_AP_REG_TAR(dap
)) {
2455 retval
= dap_queue_ap_write(ap
, reg
, value
);
2456 if (retval
== ERROR_OK
)
2457 ap
->tar_value
= (ap
->tar_value
& ~0xFFFFFFFFull
) | value
;
2459 /* To track independent writes to TAR and TAR64, two tar_valid flags */
2460 /* should be used. To keep it simple, tar_valid is only invalidated on a */
2461 /* write fail. This approach causes a later re-write of the TAR and TAR64 */
2462 /* if tar_valid is false. */
2463 ap
->tar_valid
= false;
2465 } else if (reg
== MEM_AP_REG_TAR64(dap
)) {
2466 retval
= dap_queue_ap_write(ap
, reg
, value
);
2467 if (retval
== ERROR_OK
)
2468 ap
->tar_value
= (ap
->tar_value
& 0xFFFFFFFFull
) | (((target_addr_t
)value
) << 32);
2470 /* See above comment for the MEM_AP_REG_TAR failed write case */
2471 ap
->tar_valid
= false;
2474 retval
= dap_queue_ap_write(ap
, reg
, value
);
2477 retval
= dap_queue_ap_read(ap
, reg
, &value
);
2479 if (retval
== ERROR_OK
)
2480 retval
= dap_run(dap
);
2484 if (retval
!= ERROR_OK
)
2488 command_print(CMD
, "0x%08" PRIx32
, value
);
2493 COMMAND_HANDLER(dap_dpreg_command
)
2495 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2496 uint32_t reg
, value
;
2499 if (CMD_ARGC
< 1 || CMD_ARGC
> 2)
2500 return ERROR_COMMAND_SYNTAX_ERROR
;
2502 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[0], reg
);
2503 if (reg
>= 256 || (reg
& 3)) {
2504 command_print(CMD
, "Invalid reg value (should be less than 256 and 4 bytes aligned)");
2505 return ERROR_COMMAND_ARGUMENT_INVALID
;
2508 if (CMD_ARGC
== 2) {
2509 COMMAND_PARSE_NUMBER(u32
, CMD_ARGV
[1], value
);
2510 retval
= dap_queue_dp_write(dap
, reg
, value
);
2512 retval
= dap_queue_dp_read(dap
, reg
, &value
);
2514 if (retval
== ERROR_OK
)
2515 retval
= dap_run(dap
);
2517 if (retval
!= ERROR_OK
)
2521 command_print(CMD
, "0x%08" PRIx32
, value
);
2526 COMMAND_HANDLER(dap_ti_be_32_quirks_command
)
2528 struct adiv5_dap
*dap
= adiv5_get_dap(CMD_DATA
);
2529 return CALL_COMMAND_HANDLER(handle_command_parse_bool
, &dap
->ti_be_32_quirks
,
2530 "TI BE-32 quirks mode");
2533 const struct command_registration dap_instance_commands
[] = {
2536 .handler
= handle_dap_info_command
,
2537 .mode
= COMMAND_EXEC
,
2538 .help
= "display ROM table for MEM-AP "
2539 "(default currently selected AP)",
2540 .usage
= "[ap_num]",
2544 .handler
= dap_apsel_command
,
2545 .mode
= COMMAND_ANY
,
2546 .help
= "Set the currently selected AP (default 0) "
2547 "and display the result",
2548 .usage
= "[ap_num]",
2552 .handler
= dap_apcsw_command
,
2553 .mode
= COMMAND_ANY
,
2554 .help
= "Set CSW default bits",
2555 .usage
= "[value [mask]]",
2560 .handler
= dap_apid_command
,
2561 .mode
= COMMAND_EXEC
,
2562 .help
= "return ID register from AP "
2563 "(default currently selected AP)",
2564 .usage
= "[ap_num]",
2568 .handler
= dap_apreg_command
,
2569 .mode
= COMMAND_EXEC
,
2570 .help
= "read/write a register from AP "
2571 "(reg is byte address of a word register, like 0 4 8...)",
2572 .usage
= "ap_num reg [value]",
2576 .handler
= dap_dpreg_command
,
2577 .mode
= COMMAND_EXEC
,
2578 .help
= "read/write a register from DP "
2579 "(reg is byte address (bank << 4 | reg) of a word register, like 0 4 8...)",
2580 .usage
= "reg [value]",
2584 .handler
= dap_baseaddr_command
,
2585 .mode
= COMMAND_EXEC
,
2586 .help
= "return debug base address from MEM-AP "
2587 "(default currently selected AP)",
2588 .usage
= "[ap_num]",
2591 .name
= "memaccess",
2592 .handler
= dap_memaccess_command
,
2593 .mode
= COMMAND_EXEC
,
2594 .help
= "set/get number of extra tck for MEM-AP memory "
2595 "bus access [0-255]",
2596 .usage
= "[cycles]",
2599 .name
= "ti_be_32_quirks",
2600 .handler
= dap_ti_be_32_quirks_command
,
2601 .mode
= COMMAND_CONFIG
,
2602 .help
= "set/get quirks mode for TI TMS450/TMS570 processors",
2603 .usage
= "[enable]",
2605 COMMAND_REGISTRATION_DONE
Linking to existing account procedure
If you already have an account and want to add another login method
you
MUST first sign in with your existing account and
then change URL to read
https://review.openocd.org/login/?link
to get to this page again but this time it'll work for linking. Thank you.
SSH host keys fingerprints
1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=.. |
|+o.. . |
|*.o . . |
|+B . . . |
|Bo. = o S |
|Oo.+ + = |
|oB=.* = . o |
| =+=.+ + E |
|. .=o . o |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)