1 /***************************************************************************
2 * Copyright (C) 2015 by David Ung *
4 * This program is free software; you can redistribute it and/or modify *
5 * it under the terms of the GNU General Public License as published by *
6 * the Free Software Foundation; either version 2 of the License, or *
7 * (at your option) any later version. *
9 * This program is distributed in the hope that it will be useful, *
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
12 * GNU General Public License for more details. *
14 * You should have received a copy of the GNU General Public License *
15 * along with this program; if not, write to the *
16 * Free Software Foundation, Inc., *
18 ***************************************************************************/
24 #include "breakpoints.h"
27 #include "target_request.h"
28 #include "target_type.h"
29 #include "armv8_opcodes.h"
30 #include "armv8_cache.h"
31 #include <helper/time_support.h>
33 static int aarch64_poll(struct target
*target
);
34 static int aarch64_debug_entry(struct target
*target
);
35 static int aarch64_restore_context(struct target
*target
, bool bpwp
);
36 static int aarch64_set_breakpoint(struct target
*target
,
37 struct breakpoint
*breakpoint
, uint8_t matchmode
);
38 static int aarch64_set_context_breakpoint(struct target
*target
,
39 struct breakpoint
*breakpoint
, uint8_t matchmode
);
40 static int aarch64_set_hybrid_breakpoint(struct target
*target
,
41 struct breakpoint
*breakpoint
);
42 static int aarch64_unset_breakpoint(struct target
*target
,
43 struct breakpoint
*breakpoint
);
44 static int aarch64_mmu(struct target
*target
, int *enabled
);
45 static int aarch64_virt2phys(struct target
*target
,
46 target_addr_t virt
, target_addr_t
*phys
);
47 static int aarch64_read_apb_ap_memory(struct target
*target
,
48 uint64_t address
, uint32_t size
, uint32_t count
, uint8_t *buffer
);
50 static int aarch64_restore_system_control_reg(struct target
*target
)
52 int retval
= ERROR_OK
;
54 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
55 struct armv8_common
*armv8
= target_to_armv8(target
);
57 if (aarch64
->system_control_reg
!= aarch64
->system_control_reg_curr
) {
58 aarch64
->system_control_reg_curr
= aarch64
->system_control_reg
;
59 /* LOG_INFO("cp15_control_reg: %8.8" PRIx32, cortex_v8->cp15_control_reg); */
61 switch (armv8
->arm
.core_mode
) {
65 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
68 aarch64
->system_control_reg
);
69 if (retval
!= ERROR_OK
)
74 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
77 aarch64
->system_control_reg
);
78 if (retval
!= ERROR_OK
)
83 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
86 aarch64
->system_control_reg
);
87 if (retval
!= ERROR_OK
)
91 retval
= armv8
->arm
.mcr(target
, 15, 0, 0, 1, 0, aarch64
->system_control_reg
);
92 if (retval
!= ERROR_OK
)
100 /* check address before aarch64_apb read write access with mmu on
101 * remove apb predictible data abort */
102 static int aarch64_check_address(struct target
*target
, uint32_t address
)
107 /* modify system_control_reg in order to enable or disable mmu for :
108 * - virt2phys address conversion
109 * - read or write memory in phys or virt address */
110 static int aarch64_mmu_modify(struct target
*target
, int enable
)
112 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
113 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
114 int retval
= ERROR_OK
;
117 /* if mmu enabled at target stop and mmu not enable */
118 if (!(aarch64
->system_control_reg
& 0x1U
)) {
119 LOG_ERROR("trying to enable mmu on target stopped with mmu disable");
122 if (!(aarch64
->system_control_reg_curr
& 0x1U
)) {
123 aarch64
->system_control_reg_curr
|= 0x1U
;
124 switch (armv8
->arm
.core_mode
) {
128 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
131 aarch64
->system_control_reg_curr
);
132 if (retval
!= ERROR_OK
)
137 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
140 aarch64
->system_control_reg_curr
);
141 if (retval
!= ERROR_OK
)
146 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
149 aarch64
->system_control_reg_curr
);
150 if (retval
!= ERROR_OK
)
154 LOG_DEBUG("unknow cpu state 0x%x" PRIx32
, armv8
->arm
.core_state
);
158 if (aarch64
->system_control_reg_curr
& 0x4U
) {
159 /* data cache is active */
160 aarch64
->system_control_reg_curr
&= ~0x4U
;
161 /* flush data cache armv7 function to be called */
162 if (armv8
->armv8_mmu
.armv8_cache
.flush_all_data_cache
)
163 armv8
->armv8_mmu
.armv8_cache
.flush_all_data_cache(target
);
165 if ((aarch64
->system_control_reg_curr
& 0x1U
)) {
166 aarch64
->system_control_reg_curr
&= ~0x1U
;
167 switch (armv8
->arm
.core_mode
) {
171 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
174 aarch64
->system_control_reg_curr
);
175 if (retval
!= ERROR_OK
)
180 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
183 aarch64
->system_control_reg_curr
);
184 if (retval
!= ERROR_OK
)
189 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
192 aarch64
->system_control_reg_curr
);
193 if (retval
!= ERROR_OK
)
197 LOG_DEBUG("unknow cpu state 0x%x" PRIx32
, armv8
->arm
.core_state
);
206 * Basic debug access, very low level assumes state is saved
208 static int aarch64_init_debug_access(struct target
*target
)
210 struct armv8_common
*armv8
= target_to_armv8(target
);
216 /* Clear Sticky Power Down status Bit in PRSR to enable access to
217 the registers in the Core Power Domain */
218 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
219 armv8
->debug_base
+ CPUV8_DBG_PRSR
, &dummy
);
220 if (retval
!= ERROR_OK
)
224 * Static CTI configuration:
225 * Channel 0 -> trigger outputs HALT request to PE
226 * Channel 1 -> trigger outputs Resume request to PE
227 * Gate all channel trigger events from entering the CTM
231 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
232 armv8
->cti_base
+ CTI_CTR
, 1);
233 /* By default, gate all channel triggers to and from the CTM */
234 if (retval
== ERROR_OK
)
235 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
236 armv8
->cti_base
+ CTI_GATE
, 0);
237 /* output halt requests to PE on channel 0 trigger */
238 if (retval
== ERROR_OK
)
239 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
240 armv8
->cti_base
+ CTI_OUTEN0
, CTI_CHNL(0));
241 /* output restart requests to PE on channel 1 trigger */
242 if (retval
== ERROR_OK
)
243 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
244 armv8
->cti_base
+ CTI_OUTEN1
, CTI_CHNL(1));
245 if (retval
!= ERROR_OK
)
248 /* Resync breakpoint registers */
250 /* Since this is likely called from init or reset, update target state information*/
251 return aarch64_poll(target
);
254 /* Write to memory mapped registers directly with no cache or mmu handling */
255 static int aarch64_dap_write_memap_register_u32(struct target
*target
,
260 struct armv8_common
*armv8
= target_to_armv8(target
);
262 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
, address
, value
);
267 static int aarch64_dpm_setup(struct aarch64_common
*a8
, uint64_t debug
)
269 struct arm_dpm
*dpm
= &a8
->armv8_common
.dpm
;
272 dpm
->arm
= &a8
->armv8_common
.arm
;
275 retval
= armv8_dpm_setup(dpm
);
276 if (retval
== ERROR_OK
)
277 retval
= armv8_dpm_initialize(dpm
);
282 static int aarch64_set_dscr_bits(struct target
*target
, unsigned long bit_mask
, unsigned long value
)
284 struct armv8_common
*armv8
= target_to_armv8(target
);
288 int retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
289 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
290 if (ERROR_OK
!= retval
)
296 dscr
|= value
& bit_mask
;
299 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
300 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
304 static struct target
*get_aarch64(struct target
*target
, int32_t coreid
)
306 struct target_list
*head
;
310 while (head
!= (struct target_list
*)NULL
) {
312 if ((curr
->coreid
== coreid
) && (curr
->state
== TARGET_HALTED
))
318 static int aarch64_halt(struct target
*target
);
320 static int aarch64_halt_smp(struct target
*target
)
322 int retval
= ERROR_OK
;
323 struct target_list
*head
= target
->head
;
325 while (head
!= (struct target_list
*)NULL
) {
326 struct target
*curr
= head
->target
;
327 struct armv8_common
*armv8
= target_to_armv8(curr
);
329 /* open the gate for channel 0 to let HALT requests pass to the CTM */
331 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
332 armv8
->cti_base
+ CTI_GATE
, CTI_CHNL(0));
333 if (retval
== ERROR_OK
)
334 retval
= aarch64_set_dscr_bits(curr
, DSCR_HDE
, DSCR_HDE
);
336 if (retval
!= ERROR_OK
)
342 /* halt the target PE */
343 if (retval
== ERROR_OK
)
344 retval
= aarch64_halt(target
);
349 static int update_halt_gdb(struct target
*target
)
352 if (target
->gdb_service
&& target
->gdb_service
->core
[0] == -1) {
353 target
->gdb_service
->target
= target
;
354 target
->gdb_service
->core
[0] = target
->coreid
;
355 retval
+= aarch64_halt_smp(target
);
361 * Cortex-A8 Run control
364 static int aarch64_poll(struct target
*target
)
366 int retval
= ERROR_OK
;
368 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
369 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
370 enum target_state prev_target_state
= target
->state
;
371 /* toggle to another core is done by gdb as follow */
372 /* maint packet J core_id */
374 /* the next polling trigger an halt event sent to gdb */
375 if ((target
->state
== TARGET_HALTED
) && (target
->smp
) &&
376 (target
->gdb_service
) &&
377 (target
->gdb_service
->target
== NULL
)) {
378 target
->gdb_service
->target
=
379 get_aarch64(target
, target
->gdb_service
->core
[1]);
380 target_call_event_callbacks(target
, TARGET_EVENT_HALTED
);
383 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
384 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
385 if (retval
!= ERROR_OK
)
387 aarch64
->cpudbg_dscr
= dscr
;
389 if (DSCR_RUN_MODE(dscr
) == 0x3) {
390 if (prev_target_state
!= TARGET_HALTED
) {
391 /* We have a halting debug event */
392 LOG_DEBUG("Target halted");
393 target
->state
= TARGET_HALTED
;
394 if ((prev_target_state
== TARGET_RUNNING
)
395 || (prev_target_state
== TARGET_UNKNOWN
)
396 || (prev_target_state
== TARGET_RESET
)) {
397 retval
= aarch64_debug_entry(target
);
398 if (retval
!= ERROR_OK
)
401 retval
= update_halt_gdb(target
);
402 if (retval
!= ERROR_OK
)
405 target_call_event_callbacks(target
,
406 TARGET_EVENT_HALTED
);
408 if (prev_target_state
== TARGET_DEBUG_RUNNING
) {
411 retval
= aarch64_debug_entry(target
);
412 if (retval
!= ERROR_OK
)
415 retval
= update_halt_gdb(target
);
416 if (retval
!= ERROR_OK
)
420 target_call_event_callbacks(target
,
421 TARGET_EVENT_DEBUG_HALTED
);
425 target
->state
= TARGET_RUNNING
;
430 static int aarch64_halt(struct target
*target
)
432 int retval
= ERROR_OK
;
434 struct armv8_common
*armv8
= target_to_armv8(target
);
437 * add HDE in halting debug mode
439 retval
= aarch64_set_dscr_bits(target
, DSCR_HDE
, DSCR_HDE
);
440 if (retval
!= ERROR_OK
)
443 /* trigger an event on channel 0, this outputs a halt request to the PE */
444 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
445 armv8
->cti_base
+ CTI_APPPULSE
, CTI_CHNL(0));
446 if (retval
!= ERROR_OK
)
449 long long then
= timeval_ms();
451 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
452 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
453 if (retval
!= ERROR_OK
)
455 if ((dscr
& DSCRV8_HALT_MASK
) != 0)
457 if (timeval_ms() > then
+ 1000) {
458 LOG_ERROR("Timeout waiting for halt");
463 target
->debug_reason
= DBG_REASON_DBGRQ
;
468 static int aarch64_internal_restore(struct target
*target
, int current
,
469 uint64_t *address
, int handle_breakpoints
, int debug_execution
)
471 struct armv8_common
*armv8
= target_to_armv8(target
);
472 struct arm
*arm
= &armv8
->arm
;
476 if (!debug_execution
)
477 target_free_all_working_areas(target
);
479 /* current = 1: continue on current pc, otherwise continue at <address> */
480 resume_pc
= buf_get_u64(arm
->pc
->value
, 0, 64);
482 resume_pc
= *address
;
484 *address
= resume_pc
;
486 /* Make sure that the Armv7 gdb thumb fixups does not
487 * kill the return address
489 switch (arm
->core_state
) {
491 resume_pc
&= 0xFFFFFFFC;
493 case ARM_STATE_AARCH64
:
494 resume_pc
&= 0xFFFFFFFFFFFFFFFC;
496 case ARM_STATE_THUMB
:
497 case ARM_STATE_THUMB_EE
:
498 /* When the return address is loaded into PC
499 * bit 0 must be 1 to stay in Thumb state
503 case ARM_STATE_JAZELLE
:
504 LOG_ERROR("How do I resume into Jazelle state??");
507 LOG_DEBUG("resume pc = 0x%16" PRIx64
, resume_pc
);
508 buf_set_u64(arm
->pc
->value
, 0, 64, resume_pc
);
511 armv8_dpm_modeswitch(&armv8
->dpm
, ARM_MODE_ANY
);
513 /* called it now before restoring context because it uses cpu
514 * register r0 for restoring system control register */
515 retval
= aarch64_restore_system_control_reg(target
);
516 if (retval
!= ERROR_OK
)
518 retval
= aarch64_restore_context(target
, handle_breakpoints
);
519 if (retval
!= ERROR_OK
)
521 target
->debug_reason
= DBG_REASON_NOTHALTED
;
522 target
->state
= TARGET_RUNNING
;
524 /* registers are now invalid */
525 register_cache_invalidate(arm
->core_cache
);
530 static int aarch64_internal_restart(struct target
*target
, bool slave_pe
)
532 struct armv8_common
*armv8
= target_to_armv8(target
);
533 struct arm
*arm
= &armv8
->arm
;
537 * * Restart core and wait for it to be started. Clear ITRen and sticky
538 * * exception flags: see ARMv7 ARM, C5.9.
540 * REVISIT: for single stepping, we probably want to
541 * disable IRQs by default, with optional override...
544 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
545 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
546 if (retval
!= ERROR_OK
)
549 if ((dscr
& DSCR_ITE
) == 0)
550 LOG_ERROR("DSCR InstrCompl must be set before leaving debug!");
552 /* make sure to acknowledge the halt event before resuming */
553 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
554 armv8
->cti_base
+ CTI_INACK
, CTI_TRIG(HALT
));
557 * open the CTI gate for channel 1 so that the restart events
558 * get passed along to all PEs
560 if (retval
== ERROR_OK
)
561 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
562 armv8
->cti_base
+ CTI_GATE
, CTI_CHNL(1));
563 if (retval
!= ERROR_OK
)
567 /* trigger an event on channel 1, generates a restart request to the PE */
568 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
569 armv8
->cti_base
+ CTI_APPPULSE
, CTI_CHNL(1));
570 if (retval
!= ERROR_OK
)
573 long long then
= timeval_ms();
575 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
576 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
577 if (retval
!= ERROR_OK
)
579 if ((dscr
& DSCR_HDE
) != 0)
581 if (timeval_ms() > then
+ 1000) {
582 LOG_ERROR("Timeout waiting for resume");
588 target
->debug_reason
= DBG_REASON_NOTHALTED
;
589 target
->state
= TARGET_RUNNING
;
591 /* registers are now invalid */
592 register_cache_invalidate(arm
->core_cache
);
597 static int aarch64_restore_smp(struct target
*target
, int handle_breakpoints
)
600 struct target_list
*head
;
604 while (head
!= (struct target_list
*)NULL
) {
606 if ((curr
!= target
) && (curr
->state
!= TARGET_RUNNING
)) {
607 /* resume current address , not in step mode */
608 retval
+= aarch64_internal_restore(curr
, 1, &address
,
609 handle_breakpoints
, 0);
610 retval
+= aarch64_internal_restart(curr
, true);
618 static int aarch64_resume(struct target
*target
, int current
,
619 target_addr_t address
, int handle_breakpoints
, int debug_execution
)
622 uint64_t addr
= address
;
624 /* dummy resume for smp toggle in order to reduce gdb impact */
625 if ((target
->smp
) && (target
->gdb_service
->core
[1] != -1)) {
626 /* simulate a start and halt of target */
627 target
->gdb_service
->target
= NULL
;
628 target
->gdb_service
->core
[0] = target
->gdb_service
->core
[1];
629 /* fake resume at next poll we play the target core[1], see poll*/
630 target_call_event_callbacks(target
, TARGET_EVENT_RESUMED
);
633 aarch64_internal_restore(target
, current
, &addr
, handle_breakpoints
,
636 target
->gdb_service
->core
[0] = -1;
637 retval
= aarch64_restore_smp(target
, handle_breakpoints
);
638 if (retval
!= ERROR_OK
)
641 aarch64_internal_restart(target
, false);
643 if (!debug_execution
) {
644 target
->state
= TARGET_RUNNING
;
645 target_call_event_callbacks(target
, TARGET_EVENT_RESUMED
);
646 LOG_DEBUG("target resumed at 0x%" PRIx64
, addr
);
648 target
->state
= TARGET_DEBUG_RUNNING
;
649 target_call_event_callbacks(target
, TARGET_EVENT_DEBUG_RESUMED
);
650 LOG_DEBUG("target debug resumed at 0x%" PRIx64
, addr
);
656 static int aarch64_debug_entry(struct target
*target
)
658 int retval
= ERROR_OK
;
659 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
660 struct armv8_common
*armv8
= target_to_armv8(target
);
661 struct arm_dpm
*dpm
= &armv8
->dpm
;
662 enum arm_state core_state
;
664 LOG_DEBUG("%s dscr = 0x%08" PRIx32
, target_name(target
), aarch64
->cpudbg_dscr
);
666 dpm
->dscr
= aarch64
->cpudbg_dscr
;
667 core_state
= armv8_dpm_get_core_state(dpm
);
668 armv8_select_opcodes(armv8
, core_state
== ARM_STATE_AARCH64
);
669 armv8_select_reg_access(armv8
, core_state
== ARM_STATE_AARCH64
);
671 /* make sure to clear all sticky errors */
672 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
673 armv8
->debug_base
+ CPUV8_DBG_DRCR
, DRCR_CSE
);
674 if (retval
!= ERROR_OK
)
677 /* Examine debug reason */
678 armv8_dpm_report_dscr(&armv8
->dpm
, aarch64
->cpudbg_dscr
);
680 /* save address of instruction that triggered the watchpoint? */
681 if (target
->debug_reason
== DBG_REASON_WATCHPOINT
) {
685 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
686 armv8
->debug_base
+ CPUV8_DBG_WFAR1
,
688 if (retval
!= ERROR_OK
)
692 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
693 armv8
->debug_base
+ CPUV8_DBG_WFAR0
,
695 if (retval
!= ERROR_OK
)
698 armv8_dpm_report_wfar(&armv8
->dpm
, wfar
);
701 retval
= armv8_dpm_read_current_registers(&armv8
->dpm
);
703 if (retval
== ERROR_OK
&& armv8
->post_debug_entry
)
704 retval
= armv8
->post_debug_entry(target
);
709 static int aarch64_post_debug_entry(struct target
*target
)
711 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
712 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
715 /* clear sticky errors */
716 mem_ap_write_atomic_u32(armv8
->debug_ap
,
717 armv8
->debug_base
+ CPUV8_DBG_DRCR
, DRCR_CSE
);
719 switch (armv8
->arm
.core_mode
) {
721 armv8_dpm_modeswitch(&armv8
->dpm
, ARMV8_64_EL1H
);
725 retval
= armv8
->arm
.mrs(target
, 3, /*op 0*/
728 &aarch64
->system_control_reg
);
729 if (retval
!= ERROR_OK
)
734 retval
= armv8
->arm
.mrs(target
, 3, /*op 0*/
737 &aarch64
->system_control_reg
);
738 if (retval
!= ERROR_OK
)
743 retval
= armv8
->arm
.mrs(target
, 3, /*op 0*/
746 &aarch64
->system_control_reg
);
747 if (retval
!= ERROR_OK
)
752 retval
= armv8
->arm
.mrc(target
, 15, 0, 0, 1, 0, &aarch64
->system_control_reg
);
753 if (retval
!= ERROR_OK
)
758 LOG_INFO("cannot read system control register in this mode");
762 armv8_dpm_modeswitch(&armv8
->dpm
, ARM_MODE_ANY
);
764 LOG_DEBUG("System_register: %8.8" PRIx32
, aarch64
->system_control_reg
);
765 aarch64
->system_control_reg_curr
= aarch64
->system_control_reg
;
767 if (armv8
->armv8_mmu
.armv8_cache
.info
== -1) {
768 armv8_identify_cache(armv8
);
769 armv8_read_mpidr(armv8
);
772 armv8
->armv8_mmu
.mmu_enabled
=
773 (aarch64
->system_control_reg
& 0x1U
) ? 1 : 0;
774 armv8
->armv8_mmu
.armv8_cache
.d_u_cache_enabled
=
775 (aarch64
->system_control_reg
& 0x4U
) ? 1 : 0;
776 armv8
->armv8_mmu
.armv8_cache
.i_cache_enabled
=
777 (aarch64
->system_control_reg
& 0x1000U
) ? 1 : 0;
778 aarch64
->curr_mode
= armv8
->arm
.core_mode
;
782 static int aarch64_step(struct target
*target
, int current
, target_addr_t address
,
783 int handle_breakpoints
)
785 struct armv8_common
*armv8
= target_to_armv8(target
);
789 if (target
->state
!= TARGET_HALTED
) {
790 LOG_WARNING("target not halted");
791 return ERROR_TARGET_NOT_HALTED
;
794 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
795 armv8
->debug_base
+ CPUV8_DBG_EDECR
, &edecr
);
796 if (retval
!= ERROR_OK
)
799 /* make sure EDECR.SS is not set when restoring the register */
802 /* set EDECR.SS to enter hardware step mode */
803 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
804 armv8
->debug_base
+ CPUV8_DBG_EDECR
, (edecr
|0x4));
805 if (retval
!= ERROR_OK
)
808 /* disable interrupts while stepping */
809 retval
= aarch64_set_dscr_bits(target
, 0x3 << 22, 0x3 << 22);
810 if (retval
!= ERROR_OK
)
813 /* resume the target */
814 retval
= aarch64_resume(target
, current
, address
, 0, 0);
815 if (retval
!= ERROR_OK
)
818 long long then
= timeval_ms();
819 while (target
->state
!= TARGET_HALTED
) {
820 retval
= aarch64_poll(target
);
821 if (retval
!= ERROR_OK
)
823 if (timeval_ms() > then
+ 1000) {
824 LOG_ERROR("timeout waiting for target halt");
830 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
831 armv8
->debug_base
+ CPUV8_DBG_EDECR
, edecr
);
832 if (retval
!= ERROR_OK
)
835 /* restore interrupts */
836 retval
= aarch64_set_dscr_bits(target
, 0x3 << 22, 0);
837 if (retval
!= ERROR_OK
)
843 static int aarch64_restore_context(struct target
*target
, bool bpwp
)
845 struct armv8_common
*armv8
= target_to_armv8(target
);
849 if (armv8
->pre_restore_context
)
850 armv8
->pre_restore_context(target
);
852 return armv8_dpm_write_dirty_registers(&armv8
->dpm
, bpwp
);
857 * Cortex-A8 Breakpoint and watchpoint functions
860 /* Setup hardware Breakpoint Register Pair */
861 static int aarch64_set_breakpoint(struct target
*target
,
862 struct breakpoint
*breakpoint
, uint8_t matchmode
)
867 uint8_t byte_addr_select
= 0x0F;
868 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
869 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
870 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
872 if (breakpoint
->set
) {
873 LOG_WARNING("breakpoint already set");
877 if (breakpoint
->type
== BKPT_HARD
) {
879 while (brp_list
[brp_i
].used
&& (brp_i
< aarch64
->brp_num
))
881 if (brp_i
>= aarch64
->brp_num
) {
882 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
883 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
885 breakpoint
->set
= brp_i
+ 1;
886 if (breakpoint
->length
== 2)
887 byte_addr_select
= (3 << (breakpoint
->address
& 0x02));
888 control
= ((matchmode
& 0x7) << 20)
890 | (byte_addr_select
<< 5)
892 brp_list
[brp_i
].used
= 1;
893 brp_list
[brp_i
].value
= breakpoint
->address
& 0xFFFFFFFFFFFFFFFC;
894 brp_list
[brp_i
].control
= control
;
895 bpt_value
= brp_list
[brp_i
].value
;
897 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
898 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
899 (uint32_t)(bpt_value
& 0xFFFFFFFF));
900 if (retval
!= ERROR_OK
)
902 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
903 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_i
].BRPn
,
904 (uint32_t)(bpt_value
>> 32));
905 if (retval
!= ERROR_OK
)
908 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
909 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
910 brp_list
[brp_i
].control
);
911 if (retval
!= ERROR_OK
)
913 LOG_DEBUG("brp %i control 0x%0" PRIx32
" value 0x%" TARGET_PRIxADDR
, brp_i
,
914 brp_list
[brp_i
].control
,
915 brp_list
[brp_i
].value
);
917 } else if (breakpoint
->type
== BKPT_SOFT
) {
920 buf_set_u32(code
, 0, 32, ARMV8_HLT(0x11));
921 retval
= target_read_memory(target
,
922 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
923 breakpoint
->length
, 1,
924 breakpoint
->orig_instr
);
925 if (retval
!= ERROR_OK
)
928 armv8_cache_d_inner_flush_virt(armv8
,
929 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
932 retval
= target_write_memory(target
,
933 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
934 breakpoint
->length
, 1, code
);
935 if (retval
!= ERROR_OK
)
938 armv8_cache_d_inner_flush_virt(armv8
,
939 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
942 armv8_cache_i_inner_inval_virt(armv8
,
943 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
946 breakpoint
->set
= 0x11; /* Any nice value but 0 */
949 /* Ensure that halting debug mode is enable */
950 retval
= aarch64_set_dscr_bits(target
, DSCR_HDE
, DSCR_HDE
);
951 if (retval
!= ERROR_OK
) {
952 LOG_DEBUG("Failed to set DSCR.HDE");
959 static int aarch64_set_context_breakpoint(struct target
*target
,
960 struct breakpoint
*breakpoint
, uint8_t matchmode
)
962 int retval
= ERROR_FAIL
;
965 uint8_t byte_addr_select
= 0x0F;
966 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
967 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
968 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
970 if (breakpoint
->set
) {
971 LOG_WARNING("breakpoint already set");
974 /*check available context BRPs*/
975 while ((brp_list
[brp_i
].used
||
976 (brp_list
[brp_i
].type
!= BRP_CONTEXT
)) && (brp_i
< aarch64
->brp_num
))
979 if (brp_i
>= aarch64
->brp_num
) {
980 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
984 breakpoint
->set
= brp_i
+ 1;
985 control
= ((matchmode
& 0x7) << 20)
987 | (byte_addr_select
<< 5)
989 brp_list
[brp_i
].used
= 1;
990 brp_list
[brp_i
].value
= (breakpoint
->asid
);
991 brp_list
[brp_i
].control
= control
;
992 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
993 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
994 brp_list
[brp_i
].value
);
995 if (retval
!= ERROR_OK
)
997 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
998 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
999 brp_list
[brp_i
].control
);
1000 if (retval
!= ERROR_OK
)
1002 LOG_DEBUG("brp %i control 0x%0" PRIx32
" value 0x%" TARGET_PRIxADDR
, brp_i
,
1003 brp_list
[brp_i
].control
,
1004 brp_list
[brp_i
].value
);
1009 static int aarch64_set_hybrid_breakpoint(struct target
*target
, struct breakpoint
*breakpoint
)
1011 int retval
= ERROR_FAIL
;
1012 int brp_1
= 0; /* holds the contextID pair */
1013 int brp_2
= 0; /* holds the IVA pair */
1014 uint32_t control_CTX
, control_IVA
;
1015 uint8_t CTX_byte_addr_select
= 0x0F;
1016 uint8_t IVA_byte_addr_select
= 0x0F;
1017 uint8_t CTX_machmode
= 0x03;
1018 uint8_t IVA_machmode
= 0x01;
1019 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1020 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1021 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
1023 if (breakpoint
->set
) {
1024 LOG_WARNING("breakpoint already set");
1027 /*check available context BRPs*/
1028 while ((brp_list
[brp_1
].used
||
1029 (brp_list
[brp_1
].type
!= BRP_CONTEXT
)) && (brp_1
< aarch64
->brp_num
))
1032 printf("brp(CTX) found num: %d\n", brp_1
);
1033 if (brp_1
>= aarch64
->brp_num
) {
1034 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
1038 while ((brp_list
[brp_2
].used
||
1039 (brp_list
[brp_2
].type
!= BRP_NORMAL
)) && (brp_2
< aarch64
->brp_num
))
1042 printf("brp(IVA) found num: %d\n", brp_2
);
1043 if (brp_2
>= aarch64
->brp_num
) {
1044 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
1048 breakpoint
->set
= brp_1
+ 1;
1049 breakpoint
->linked_BRP
= brp_2
;
1050 control_CTX
= ((CTX_machmode
& 0x7) << 20)
1053 | (CTX_byte_addr_select
<< 5)
1055 brp_list
[brp_1
].used
= 1;
1056 brp_list
[brp_1
].value
= (breakpoint
->asid
);
1057 brp_list
[brp_1
].control
= control_CTX
;
1058 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1059 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_1
].BRPn
,
1060 brp_list
[brp_1
].value
);
1061 if (retval
!= ERROR_OK
)
1063 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1064 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_1
].BRPn
,
1065 brp_list
[brp_1
].control
);
1066 if (retval
!= ERROR_OK
)
1069 control_IVA
= ((IVA_machmode
& 0x7) << 20)
1072 | (IVA_byte_addr_select
<< 5)
1074 brp_list
[brp_2
].used
= 1;
1075 brp_list
[brp_2
].value
= breakpoint
->address
& 0xFFFFFFFFFFFFFFFC;
1076 brp_list
[brp_2
].control
= control_IVA
;
1077 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1078 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_2
].BRPn
,
1079 brp_list
[brp_2
].value
& 0xFFFFFFFF);
1080 if (retval
!= ERROR_OK
)
1082 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1083 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_2
].BRPn
,
1084 brp_list
[brp_2
].value
>> 32);
1085 if (retval
!= ERROR_OK
)
1087 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1088 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_2
].BRPn
,
1089 brp_list
[brp_2
].control
);
1090 if (retval
!= ERROR_OK
)
1096 static int aarch64_unset_breakpoint(struct target
*target
, struct breakpoint
*breakpoint
)
1099 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1100 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1101 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
1103 if (!breakpoint
->set
) {
1104 LOG_WARNING("breakpoint not set");
1108 if (breakpoint
->type
== BKPT_HARD
) {
1109 if ((breakpoint
->address
!= 0) && (breakpoint
->asid
!= 0)) {
1110 int brp_i
= breakpoint
->set
- 1;
1111 int brp_j
= breakpoint
->linked_BRP
;
1112 if ((brp_i
< 0) || (brp_i
>= aarch64
->brp_num
)) {
1113 LOG_DEBUG("Invalid BRP number in breakpoint");
1116 LOG_DEBUG("rbp %i control 0x%0" PRIx32
" value 0x%" TARGET_PRIxADDR
, brp_i
,
1117 brp_list
[brp_i
].control
, brp_list
[brp_i
].value
);
1118 brp_list
[brp_i
].used
= 0;
1119 brp_list
[brp_i
].value
= 0;
1120 brp_list
[brp_i
].control
= 0;
1121 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1122 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1123 brp_list
[brp_i
].control
);
1124 if (retval
!= ERROR_OK
)
1126 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1127 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1128 (uint32_t)brp_list
[brp_i
].value
);
1129 if (retval
!= ERROR_OK
)
1131 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1132 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_i
].BRPn
,
1133 (uint32_t)brp_list
[brp_i
].value
);
1134 if (retval
!= ERROR_OK
)
1136 if ((brp_j
< 0) || (brp_j
>= aarch64
->brp_num
)) {
1137 LOG_DEBUG("Invalid BRP number in breakpoint");
1140 LOG_DEBUG("rbp %i control 0x%0" PRIx32
" value 0x%0" PRIx64
, brp_j
,
1141 brp_list
[brp_j
].control
, brp_list
[brp_j
].value
);
1142 brp_list
[brp_j
].used
= 0;
1143 brp_list
[brp_j
].value
= 0;
1144 brp_list
[brp_j
].control
= 0;
1145 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1146 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_j
].BRPn
,
1147 brp_list
[brp_j
].control
);
1148 if (retval
!= ERROR_OK
)
1150 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1151 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_j
].BRPn
,
1152 (uint32_t)brp_list
[brp_j
].value
);
1153 if (retval
!= ERROR_OK
)
1155 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1156 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_j
].BRPn
,
1157 (uint32_t)brp_list
[brp_j
].value
);
1158 if (retval
!= ERROR_OK
)
1161 breakpoint
->linked_BRP
= 0;
1162 breakpoint
->set
= 0;
1166 int brp_i
= breakpoint
->set
- 1;
1167 if ((brp_i
< 0) || (brp_i
>= aarch64
->brp_num
)) {
1168 LOG_DEBUG("Invalid BRP number in breakpoint");
1171 LOG_DEBUG("rbp %i control 0x%0" PRIx32
" value 0x%0" PRIx64
, brp_i
,
1172 brp_list
[brp_i
].control
, brp_list
[brp_i
].value
);
1173 brp_list
[brp_i
].used
= 0;
1174 brp_list
[brp_i
].value
= 0;
1175 brp_list
[brp_i
].control
= 0;
1176 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1177 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1178 brp_list
[brp_i
].control
);
1179 if (retval
!= ERROR_OK
)
1181 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1182 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1183 brp_list
[brp_i
].value
);
1184 if (retval
!= ERROR_OK
)
1187 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1188 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_i
].BRPn
,
1189 (uint32_t)brp_list
[brp_i
].value
);
1190 if (retval
!= ERROR_OK
)
1192 breakpoint
->set
= 0;
1196 /* restore original instruction (kept in target endianness) */
1198 armv8_cache_d_inner_flush_virt(armv8
,
1199 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1200 breakpoint
->length
);
1202 if (breakpoint
->length
== 4) {
1203 retval
= target_write_memory(target
,
1204 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1205 4, 1, breakpoint
->orig_instr
);
1206 if (retval
!= ERROR_OK
)
1209 retval
= target_write_memory(target
,
1210 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1211 2, 1, breakpoint
->orig_instr
);
1212 if (retval
!= ERROR_OK
)
1216 armv8_cache_d_inner_flush_virt(armv8
,
1217 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1218 breakpoint
->length
);
1220 armv8_cache_i_inner_inval_virt(armv8
,
1221 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1222 breakpoint
->length
);
1224 breakpoint
->set
= 0;
1229 static int aarch64_add_breakpoint(struct target
*target
,
1230 struct breakpoint
*breakpoint
)
1232 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1234 if ((breakpoint
->type
== BKPT_HARD
) && (aarch64
->brp_num_available
< 1)) {
1235 LOG_INFO("no hardware breakpoint available");
1236 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
1239 if (breakpoint
->type
== BKPT_HARD
)
1240 aarch64
->brp_num_available
--;
1242 return aarch64_set_breakpoint(target
, breakpoint
, 0x00); /* Exact match */
1245 static int aarch64_add_context_breakpoint(struct target
*target
,
1246 struct breakpoint
*breakpoint
)
1248 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1250 if ((breakpoint
->type
== BKPT_HARD
) && (aarch64
->brp_num_available
< 1)) {
1251 LOG_INFO("no hardware breakpoint available");
1252 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
1255 if (breakpoint
->type
== BKPT_HARD
)
1256 aarch64
->brp_num_available
--;
1258 return aarch64_set_context_breakpoint(target
, breakpoint
, 0x02); /* asid match */
1261 static int aarch64_add_hybrid_breakpoint(struct target
*target
,
1262 struct breakpoint
*breakpoint
)
1264 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1266 if ((breakpoint
->type
== BKPT_HARD
) && (aarch64
->brp_num_available
< 1)) {
1267 LOG_INFO("no hardware breakpoint available");
1268 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
1271 if (breakpoint
->type
== BKPT_HARD
)
1272 aarch64
->brp_num_available
--;
1274 return aarch64_set_hybrid_breakpoint(target
, breakpoint
); /* ??? */
1278 static int aarch64_remove_breakpoint(struct target
*target
, struct breakpoint
*breakpoint
)
1280 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1283 /* It is perfectly possible to remove breakpoints while the target is running */
1284 if (target
->state
!= TARGET_HALTED
) {
1285 LOG_WARNING("target not halted");
1286 return ERROR_TARGET_NOT_HALTED
;
1290 if (breakpoint
->set
) {
1291 aarch64_unset_breakpoint(target
, breakpoint
);
1292 if (breakpoint
->type
== BKPT_HARD
)
1293 aarch64
->brp_num_available
++;
1300 * Cortex-A8 Reset functions
1303 static int aarch64_assert_reset(struct target
*target
)
1305 struct armv8_common
*armv8
= target_to_armv8(target
);
1309 /* FIXME when halt is requested, make it work somehow... */
1311 /* Issue some kind of warm reset. */
1312 if (target_has_event_action(target
, TARGET_EVENT_RESET_ASSERT
))
1313 target_handle_event(target
, TARGET_EVENT_RESET_ASSERT
);
1314 else if (jtag_get_reset_config() & RESET_HAS_SRST
) {
1315 /* REVISIT handle "pulls" cases, if there's
1316 * hardware that needs them to work.
1318 jtag_add_reset(0, 1);
1320 LOG_ERROR("%s: how to reset?", target_name(target
));
1324 /* registers are now invalid */
1325 register_cache_invalidate(armv8
->arm
.core_cache
);
1327 target
->state
= TARGET_RESET
;
1332 static int aarch64_deassert_reset(struct target
*target
)
1338 /* be certain SRST is off */
1339 jtag_add_reset(0, 0);
1341 retval
= aarch64_poll(target
);
1342 if (retval
!= ERROR_OK
)
1345 if (target
->reset_halt
) {
1346 if (target
->state
!= TARGET_HALTED
) {
1347 LOG_WARNING("%s: ran after reset and before halt ...",
1348 target_name(target
));
1349 retval
= target_halt(target
);
1350 if (retval
!= ERROR_OK
)
1358 static int aarch64_write_apb_ap_memory(struct target
*target
,
1359 uint64_t address
, uint32_t size
,
1360 uint32_t count
, const uint8_t *buffer
)
1362 /* write memory through APB-AP */
1363 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1364 struct armv8_common
*armv8
= target_to_armv8(target
);
1365 struct arm_dpm
*dpm
= &armv8
->dpm
;
1366 struct arm
*arm
= &armv8
->arm
;
1367 int total_bytes
= count
* size
;
1369 int start_byte
= address
& 0x3;
1370 int end_byte
= (address
+ total_bytes
) & 0x3;
1373 uint8_t *tmp_buff
= NULL
;
1375 LOG_DEBUG("Writing APB-AP memory address 0x%" PRIx64
" size %" PRIu32
" count%" PRIu32
,
1376 address
, size
, count
);
1377 if (target
->state
!= TARGET_HALTED
) {
1378 LOG_WARNING("target not halted");
1379 return ERROR_TARGET_NOT_HALTED
;
1382 total_u32
= DIV_ROUND_UP((address
& 3) + total_bytes
, 4);
1384 /* Mark register R0 as dirty, as it will be used
1385 * for transferring the data.
1386 * It will be restored automatically when exiting
1389 reg
= armv8_reg_current(arm
, 1);
1392 reg
= armv8_reg_current(arm
, 0);
1395 /* clear any abort */
1396 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1397 armv8
->debug_base
+ CPUV8_DBG_DRCR
, DRCR_CSE
);
1398 if (retval
!= ERROR_OK
)
1402 /* This algorithm comes from DDI0487A.g, chapter J9.1 */
1404 /* The algorithm only copies 32 bit words, so the buffer
1405 * should be expanded to include the words at either end.
1406 * The first and last words will be read first to avoid
1407 * corruption if needed.
1409 tmp_buff
= malloc(total_u32
* 4);
1411 if ((start_byte
!= 0) && (total_u32
> 1)) {
1412 /* First bytes not aligned - read the 32 bit word to avoid corrupting
1413 * the other bytes in the word.
1415 retval
= aarch64_read_apb_ap_memory(target
, (address
& ~0x3), 4, 1, tmp_buff
);
1416 if (retval
!= ERROR_OK
)
1417 goto error_free_buff_w
;
1420 /* If end of write is not aligned, or the write is less than 4 bytes */
1421 if ((end_byte
!= 0) ||
1422 ((total_u32
== 1) && (total_bytes
!= 4))) {
1424 /* Read the last word to avoid corruption during 32 bit write */
1425 int mem_offset
= (total_u32
-1) * 4;
1426 retval
= aarch64_read_apb_ap_memory(target
, (address
& ~0x3) + mem_offset
, 4, 1, &tmp_buff
[mem_offset
]);
1427 if (retval
!= ERROR_OK
)
1428 goto error_free_buff_w
;
1431 /* Copy the write buffer over the top of the temporary buffer */
1432 memcpy(&tmp_buff
[start_byte
], buffer
, total_bytes
);
1434 /* We now have a 32 bit aligned buffer that can be written */
1437 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1438 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1439 if (retval
!= ERROR_OK
)
1440 goto error_free_buff_w
;
1442 /* Set Normal access mode */
1443 dscr
= (dscr
& ~DSCR_MA
);
1444 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1445 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1447 if (arm
->core_state
== ARM_STATE_AARCH64
) {
1448 /* Write X0 with value 'address' using write procedure */
1449 /* Step 1.a+b - Write the address for read access into DBGDTR_EL0 */
1450 /* Step 1.c - Copy value from DTR to R0 using instruction mrs DBGDTR_EL0, x0 */
1451 retval
= dpm
->instr_write_data_dcc_64(dpm
,
1452 ARMV8_MRS(SYSTEM_DBG_DBGDTR_EL0
, 0), address
& ~0x3ULL
);
1454 /* Write R0 with value 'address' using write procedure */
1455 /* Step 1.a+b - Write the address for read access into DBGDTRRX */
1456 /* Step 1.c - Copy value from DTR to R0 using instruction mrc DBGDTRTXint, r0 */
1457 dpm
->instr_write_data_dcc(dpm
,
1458 ARMV4_5_MRC(14, 0, 0, 0, 5, 0), address
& ~0x3ULL
);
1461 /* Step 1.d - Change DCC to memory mode */
1462 dscr
= dscr
| DSCR_MA
;
1463 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1464 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1465 if (retval
!= ERROR_OK
)
1466 goto error_unset_dtr_w
;
1469 /* Step 2.a - Do the write */
1470 retval
= mem_ap_write_buf_noincr(armv8
->debug_ap
,
1471 tmp_buff
, 4, total_u32
, armv8
->debug_base
+ CPUV8_DBG_DTRRX
);
1472 if (retval
!= ERROR_OK
)
1473 goto error_unset_dtr_w
;
1475 /* Step 3.a - Switch DTR mode back to Normal mode */
1476 dscr
= (dscr
& ~DSCR_MA
);
1477 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1478 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1479 if (retval
!= ERROR_OK
)
1480 goto error_unset_dtr_w
;
1482 /* Check for sticky abort flags in the DSCR */
1483 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1484 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1485 if (retval
!= ERROR_OK
)
1486 goto error_free_buff_w
;
1489 if (dscr
& (DSCR_ERR
| DSCR_SYS_ERROR_PEND
)) {
1490 /* Abort occurred - clear it and exit */
1491 LOG_ERROR("abort occurred - dscr = 0x%08" PRIx32
, dscr
);
1492 mem_ap_write_atomic_u32(armv8
->debug_ap
,
1493 armv8
->debug_base
+ CPUV8_DBG_DRCR
, 1<<2);
1494 armv8_dpm_handle_exception(dpm
);
1495 goto error_free_buff_w
;
1503 /* Unset DTR mode */
1504 mem_ap_read_atomic_u32(armv8
->debug_ap
,
1505 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1506 dscr
= (dscr
& ~DSCR_MA
);
1507 mem_ap_write_atomic_u32(armv8
->debug_ap
,
1508 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1515 static int aarch64_read_apb_ap_memory(struct target
*target
,
1516 target_addr_t address
, uint32_t size
,
1517 uint32_t count
, uint8_t *buffer
)
1519 /* read memory through APB-AP */
1520 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1521 struct armv8_common
*armv8
= target_to_armv8(target
);
1522 struct arm_dpm
*dpm
= &armv8
->dpm
;
1523 struct arm
*arm
= &armv8
->arm
;
1524 int total_bytes
= count
* size
;
1526 int start_byte
= address
& 0x3;
1527 int end_byte
= (address
+ total_bytes
) & 0x3;
1530 uint8_t *tmp_buff
= NULL
;
1534 LOG_DEBUG("Reading APB-AP memory address 0x%" TARGET_PRIxADDR
" size %" PRIu32
" count%" PRIu32
,
1535 address
, size
, count
);
1536 if (target
->state
!= TARGET_HALTED
) {
1537 LOG_WARNING("target not halted");
1538 return ERROR_TARGET_NOT_HALTED
;
1541 total_u32
= DIV_ROUND_UP((address
& 3) + total_bytes
, 4);
1542 /* Mark register X0, X1 as dirty, as it will be used
1543 * for transferring the data.
1544 * It will be restored automatically when exiting
1547 reg
= armv8_reg_current(arm
, 1);
1550 reg
= armv8_reg_current(arm
, 0);
1553 /* clear any abort */
1554 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1555 armv8
->debug_base
+ CPUV8_DBG_DRCR
, DRCR_CSE
);
1556 if (retval
!= ERROR_OK
)
1557 goto error_free_buff_r
;
1560 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1561 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1563 /* This algorithm comes from DDI0487A.g, chapter J9.1 */
1565 /* Set Normal access mode */
1566 dscr
= (dscr
& ~DSCR_MA
);
1567 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1568 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1570 if (arm
->core_state
== ARM_STATE_AARCH64
) {
1571 /* Write X0 with value 'address' using write procedure */
1572 /* Step 1.a+b - Write the address for read access into DBGDTR_EL0 */
1573 /* Step 1.c - Copy value from DTR to R0 using instruction mrs DBGDTR_EL0, x0 */
1574 retval
+= dpm
->instr_write_data_dcc_64(dpm
,
1575 ARMV8_MRS(SYSTEM_DBG_DBGDTR_EL0
, 0), address
& ~0x3ULL
);
1576 /* Step 1.d - Dummy operation to ensure EDSCR.Txfull == 1 */
1577 retval
+= dpm
->instr_execute(dpm
, ARMV8_MSR_GP(SYSTEM_DBG_DBGDTR_EL0
, 0));
1578 /* Step 1.e - Change DCC to memory mode */
1579 dscr
= dscr
| DSCR_MA
;
1580 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1581 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1582 /* Step 1.f - read DBGDTRTX and discard the value */
1583 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1584 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &value
);
1586 /* Write R0 with value 'address' using write procedure */
1587 /* Step 1.a+b - Write the address for read access into DBGDTRRXint */
1588 /* Step 1.c - Copy value from DTR to R0 using instruction mrc DBGDTRTXint, r0 */
1589 retval
+= dpm
->instr_write_data_dcc(dpm
,
1590 ARMV4_5_MRC(14, 0, 0, 0, 5, 0), address
& ~0x3ULL
);
1591 /* Step 1.d - Dummy operation to ensure EDSCR.Txfull == 1 */
1592 retval
+= dpm
->instr_execute(dpm
, ARMV4_5_MCR(14, 0, 0, 0, 5, 0));
1593 /* Step 1.e - Change DCC to memory mode */
1594 dscr
= dscr
| DSCR_MA
;
1595 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1596 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1597 /* Step 1.f - read DBGDTRTX and discard the value */
1598 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1599 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &value
);
1602 if (retval
!= ERROR_OK
)
1603 goto error_unset_dtr_r
;
1605 /* Optimize the read as much as we can, either way we read in a single pass */
1606 if ((start_byte
) || (end_byte
)) {
1607 /* The algorithm only copies 32 bit words, so the buffer
1608 * should be expanded to include the words at either end.
1609 * The first and last words will be read into a temp buffer
1610 * to avoid corruption
1612 tmp_buff
= malloc(total_u32
* 4);
1614 goto error_unset_dtr_r
;
1616 /* use the tmp buffer to read the entire data */
1617 u8buf_ptr
= tmp_buff
;
1619 /* address and read length are aligned so read directly into the passed buffer */
1622 /* Read the data - Each read of the DTRTX register causes the instruction to be reissued
1623 * Abort flags are sticky, so can be read at end of transactions
1625 * This data is read in aligned to 32 bit boundary.
1628 /* Step 2.a - Loop n-1 times, each read of DBGDTRTX reads the data from [X0] and
1629 * increments X0 by 4. */
1630 retval
= mem_ap_read_buf_noincr(armv8
->debug_ap
, u8buf_ptr
, 4, total_u32
-1,
1631 armv8
->debug_base
+ CPUV8_DBG_DTRTX
);
1632 if (retval
!= ERROR_OK
)
1633 goto error_unset_dtr_r
;
1635 /* Step 3.a - set DTR access mode back to Normal mode */
1636 dscr
= (dscr
& ~DSCR_MA
);
1637 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1638 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1639 if (retval
!= ERROR_OK
)
1640 goto error_free_buff_r
;
1642 /* Step 3.b - read DBGDTRTX for the final value */
1643 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1644 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &value
);
1645 memcpy(u8buf_ptr
+ (total_u32
-1) * 4, &value
, 4);
1647 /* Check for sticky abort flags in the DSCR */
1648 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1649 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1650 if (retval
!= ERROR_OK
)
1651 goto error_free_buff_r
;
1655 if (dscr
& (DSCR_ERR
| DSCR_SYS_ERROR_PEND
)) {
1656 /* Abort occurred - clear it and exit */
1657 LOG_ERROR("abort occurred - dscr = 0x%08" PRIx32
, dscr
);
1658 mem_ap_write_atomic_u32(armv8
->debug_ap
,
1659 armv8
->debug_base
+ CPUV8_DBG_DRCR
, DRCR_CSE
);
1660 armv8_dpm_handle_exception(dpm
);
1661 goto error_free_buff_r
;
1664 /* check if we need to copy aligned data by applying any shift necessary */
1666 memcpy(buffer
, tmp_buff
+ start_byte
, total_bytes
);
1674 /* Unset DTR mode */
1675 mem_ap_read_atomic_u32(armv8
->debug_ap
,
1676 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1677 dscr
= (dscr
& ~DSCR_MA
);
1678 mem_ap_write_atomic_u32(armv8
->debug_ap
,
1679 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1686 static int aarch64_read_phys_memory(struct target
*target
,
1687 target_addr_t address
, uint32_t size
,
1688 uint32_t count
, uint8_t *buffer
)
1690 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1691 LOG_DEBUG("Reading memory at real address 0x%" TARGET_PRIxADDR
"; size %" PRId32
"; count %" PRId32
,
1692 address
, size
, count
);
1694 if (count
&& buffer
) {
1695 /* read memory through APB-AP */
1696 retval
= aarch64_mmu_modify(target
, 0);
1697 if (retval
!= ERROR_OK
)
1699 retval
= aarch64_read_apb_ap_memory(target
, address
, size
, count
, buffer
);
1704 static int aarch64_read_memory(struct target
*target
, target_addr_t address
,
1705 uint32_t size
, uint32_t count
, uint8_t *buffer
)
1707 int mmu_enabled
= 0;
1710 /* aarch64 handles unaligned memory access */
1711 LOG_DEBUG("Reading memory at address 0x%" TARGET_PRIxADDR
"; size %" PRId32
"; count %" PRId32
, address
,
1714 /* determine if MMU was enabled on target stop */
1715 retval
= aarch64_mmu(target
, &mmu_enabled
);
1716 if (retval
!= ERROR_OK
)
1720 retval
= aarch64_check_address(target
, address
);
1721 if (retval
!= ERROR_OK
)
1723 /* enable MMU as we could have disabled it for phys access */
1724 retval
= aarch64_mmu_modify(target
, 1);
1725 if (retval
!= ERROR_OK
)
1728 return aarch64_read_apb_ap_memory(target
, address
, size
, count
, buffer
);
1731 static int aarch64_write_phys_memory(struct target
*target
,
1732 target_addr_t address
, uint32_t size
,
1733 uint32_t count
, const uint8_t *buffer
)
1735 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1737 LOG_DEBUG("Writing memory to real address 0x%" TARGET_PRIxADDR
"; size %" PRId32
"; count %" PRId32
, address
,
1740 if (count
&& buffer
) {
1741 /* write memory through APB-AP */
1742 retval
= aarch64_mmu_modify(target
, 0);
1743 if (retval
!= ERROR_OK
)
1745 return aarch64_write_apb_ap_memory(target
, address
, size
, count
, buffer
);
1751 static int aarch64_write_memory(struct target
*target
, target_addr_t address
,
1752 uint32_t size
, uint32_t count
, const uint8_t *buffer
)
1754 int mmu_enabled
= 0;
1757 /* aarch64 handles unaligned memory access */
1758 LOG_DEBUG("Writing memory at address 0x%" TARGET_PRIxADDR
"; size %" PRId32
1759 "; count %" PRId32
, address
, size
, count
);
1761 /* determine if MMU was enabled on target stop */
1762 retval
= aarch64_mmu(target
, &mmu_enabled
);
1763 if (retval
!= ERROR_OK
)
1767 retval
= aarch64_check_address(target
, address
);
1768 if (retval
!= ERROR_OK
)
1770 /* enable MMU as we could have disabled it for phys access */
1771 retval
= aarch64_mmu_modify(target
, 1);
1772 if (retval
!= ERROR_OK
)
1775 return aarch64_write_apb_ap_memory(target
, address
, size
, count
, buffer
);
1778 static int aarch64_handle_target_request(void *priv
)
1780 struct target
*target
= priv
;
1781 struct armv8_common
*armv8
= target_to_armv8(target
);
1784 if (!target_was_examined(target
))
1786 if (!target
->dbg_msg_enabled
)
1789 if (target
->state
== TARGET_RUNNING
) {
1792 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1793 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1795 /* check if we have data */
1796 while ((dscr
& DSCR_DTR_TX_FULL
) && (retval
== ERROR_OK
)) {
1797 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1798 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &request
);
1799 if (retval
== ERROR_OK
) {
1800 target_request(target
, request
);
1801 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1802 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1810 static int aarch64_examine_first(struct target
*target
)
1812 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1813 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1814 struct adiv5_dap
*swjdp
= armv8
->arm
.dap
;
1816 int retval
= ERROR_OK
;
1817 uint64_t debug
, ttypr
;
1819 uint32_t tmp0
, tmp1
;
1820 debug
= ttypr
= cpuid
= 0;
1822 /* We do one extra read to ensure DAP is configured,
1823 * we call ahbap_debugport_init(swjdp) instead
1825 retval
= dap_dp_init(swjdp
);
1826 if (retval
!= ERROR_OK
)
1829 /* Search for the APB-AB - it is needed for access to debug registers */
1830 retval
= dap_find_ap(swjdp
, AP_TYPE_APB_AP
, &armv8
->debug_ap
);
1831 if (retval
!= ERROR_OK
) {
1832 LOG_ERROR("Could not find APB-AP for debug access");
1836 retval
= mem_ap_init(armv8
->debug_ap
);
1837 if (retval
!= ERROR_OK
) {
1838 LOG_ERROR("Could not initialize the APB-AP");
1842 armv8
->debug_ap
->memaccess_tck
= 80;
1844 if (!target
->dbgbase_set
) {
1846 /* Get ROM Table base */
1848 int32_t coreidx
= target
->coreid
;
1849 retval
= dap_get_debugbase(armv8
->debug_ap
, &dbgbase
, &apid
);
1850 if (retval
!= ERROR_OK
)
1852 /* Lookup 0x15 -- Processor DAP */
1853 retval
= dap_lookup_cs_component(armv8
->debug_ap
, dbgbase
, 0x15,
1854 &armv8
->debug_base
, &coreidx
);
1855 if (retval
!= ERROR_OK
)
1857 LOG_DEBUG("Detected core %" PRId32
" dbgbase: %08" PRIx32
1858 " apid: %08" PRIx32
, coreidx
, armv8
->debug_base
, apid
);
1860 armv8
->debug_base
= target
->dbgbase
;
1862 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1863 armv8
->debug_base
+ CPUV8_DBG_LOCKACCESS
, 0xC5ACCE55);
1864 if (retval
!= ERROR_OK
) {
1865 LOG_DEBUG("LOCK debug access fail");
1869 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1870 armv8
->debug_base
+ CPUV8_DBG_OSLAR
, 0);
1871 if (retval
!= ERROR_OK
) {
1872 LOG_DEBUG("Examine %s failed", "oslock");
1876 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1877 armv8
->debug_base
+ CPUV8_DBG_MAINID0
, &cpuid
);
1878 if (retval
!= ERROR_OK
) {
1879 LOG_DEBUG("Examine %s failed", "CPUID");
1883 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1884 armv8
->debug_base
+ CPUV8_DBG_MEMFEATURE0
, &tmp0
);
1885 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1886 armv8
->debug_base
+ CPUV8_DBG_MEMFEATURE0
+ 4, &tmp1
);
1887 if (retval
!= ERROR_OK
) {
1888 LOG_DEBUG("Examine %s failed", "Memory Model Type");
1892 ttypr
= (ttypr
<< 32) | tmp0
;
1894 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1895 armv8
->debug_base
+ CPUV8_DBG_DBGFEATURE0
, &tmp0
);
1896 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1897 armv8
->debug_base
+ CPUV8_DBG_DBGFEATURE0
+ 4, &tmp1
);
1898 if (retval
!= ERROR_OK
) {
1899 LOG_DEBUG("Examine %s failed", "ID_AA64DFR0_EL1");
1903 debug
= (debug
<< 32) | tmp0
;
1905 LOG_DEBUG("cpuid = 0x%08" PRIx32
, cpuid
);
1906 LOG_DEBUG("ttypr = 0x%08" PRIx64
, ttypr
);
1907 LOG_DEBUG("debug = 0x%08" PRIx64
, debug
);
1909 if (target
->ctibase
== 0) {
1910 /* assume a v8 rom table layout */
1911 armv8
->cti_base
= target
->ctibase
= armv8
->debug_base
+ 0x10000;
1912 LOG_INFO("Target ctibase is not set, assuming 0x%0" PRIx32
, target
->ctibase
);
1914 armv8
->cti_base
= target
->ctibase
;
1916 armv8
->arm
.core_type
= ARM_MODE_MON
;
1917 retval
= aarch64_dpm_setup(aarch64
, debug
);
1918 if (retval
!= ERROR_OK
)
1921 /* Setup Breakpoint Register Pairs */
1922 aarch64
->brp_num
= (uint32_t)((debug
>> 12) & 0x0F) + 1;
1923 aarch64
->brp_num_context
= (uint32_t)((debug
>> 28) & 0x0F) + 1;
1924 aarch64
->brp_num_available
= aarch64
->brp_num
;
1925 aarch64
->brp_list
= calloc(aarch64
->brp_num
, sizeof(struct aarch64_brp
));
1926 for (i
= 0; i
< aarch64
->brp_num
; i
++) {
1927 aarch64
->brp_list
[i
].used
= 0;
1928 if (i
< (aarch64
->brp_num
-aarch64
->brp_num_context
))
1929 aarch64
->brp_list
[i
].type
= BRP_NORMAL
;
1931 aarch64
->brp_list
[i
].type
= BRP_CONTEXT
;
1932 aarch64
->brp_list
[i
].value
= 0;
1933 aarch64
->brp_list
[i
].control
= 0;
1934 aarch64
->brp_list
[i
].BRPn
= i
;
1937 LOG_DEBUG("Configured %i hw breakpoints", aarch64
->brp_num
);
1939 target_set_examined(target
);
1943 static int aarch64_examine(struct target
*target
)
1945 int retval
= ERROR_OK
;
1947 /* don't re-probe hardware after each reset */
1948 if (!target_was_examined(target
))
1949 retval
= aarch64_examine_first(target
);
1951 /* Configure core debug access */
1952 if (retval
== ERROR_OK
)
1953 retval
= aarch64_init_debug_access(target
);
1959 * Cortex-A8 target creation and initialization
1962 static int aarch64_init_target(struct command_context
*cmd_ctx
,
1963 struct target
*target
)
1965 /* examine_first() does a bunch of this */
1969 static int aarch64_init_arch_info(struct target
*target
,
1970 struct aarch64_common
*aarch64
, struct jtag_tap
*tap
)
1972 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1973 struct adiv5_dap
*dap
= armv8
->arm
.dap
;
1975 armv8
->arm
.dap
= dap
;
1977 /* Setup struct aarch64_common */
1978 aarch64
->common_magic
= AARCH64_COMMON_MAGIC
;
1979 /* tap has no dap initialized */
1981 tap
->dap
= dap_init();
1983 /* Leave (only) generic DAP stuff for debugport_init() */
1984 tap
->dap
->tap
= tap
;
1987 armv8
->arm
.dap
= tap
->dap
;
1989 aarch64
->fast_reg_read
= 0;
1991 /* register arch-specific functions */
1992 armv8
->examine_debug_reason
= NULL
;
1994 armv8
->post_debug_entry
= aarch64_post_debug_entry
;
1996 armv8
->pre_restore_context
= NULL
;
1998 armv8
->armv8_mmu
.read_physical_memory
= aarch64_read_phys_memory
;
2000 /* REVISIT v7a setup should be in a v7a-specific routine */
2001 armv8_init_arch_info(target
, armv8
);
2002 target_register_timer_callback(aarch64_handle_target_request
, 1, 1, target
);
2007 static int aarch64_target_create(struct target
*target
, Jim_Interp
*interp
)
2009 struct aarch64_common
*aarch64
= calloc(1, sizeof(struct aarch64_common
));
2011 return aarch64_init_arch_info(target
, aarch64
, target
->tap
);
2014 static int aarch64_mmu(struct target
*target
, int *enabled
)
2016 if (target
->state
!= TARGET_HALTED
) {
2017 LOG_ERROR("%s: target not halted", __func__
);
2018 return ERROR_TARGET_INVALID
;
2021 *enabled
= target_to_aarch64(target
)->armv8_common
.armv8_mmu
.mmu_enabled
;
2025 static int aarch64_virt2phys(struct target
*target
, target_addr_t virt
,
2026 target_addr_t
*phys
)
2028 return armv8_mmu_translate_va_pa(target
, virt
, phys
, 1);
2031 COMMAND_HANDLER(aarch64_handle_cache_info_command
)
2033 struct target
*target
= get_current_target(CMD_CTX
);
2034 struct armv8_common
*armv8
= target_to_armv8(target
);
2036 return armv8_handle_cache_info_command(CMD_CTX
,
2037 &armv8
->armv8_mmu
.armv8_cache
);
2041 COMMAND_HANDLER(aarch64_handle_dbginit_command
)
2043 struct target
*target
= get_current_target(CMD_CTX
);
2044 if (!target_was_examined(target
)) {
2045 LOG_ERROR("target not examined yet");
2049 return aarch64_init_debug_access(target
);
2051 COMMAND_HANDLER(aarch64_handle_smp_off_command
)
2053 struct target
*target
= get_current_target(CMD_CTX
);
2054 /* check target is an smp target */
2055 struct target_list
*head
;
2056 struct target
*curr
;
2057 head
= target
->head
;
2059 if (head
!= (struct target_list
*)NULL
) {
2060 while (head
!= (struct target_list
*)NULL
) {
2061 curr
= head
->target
;
2065 /* fixes the target display to the debugger */
2066 target
->gdb_service
->target
= target
;
2071 COMMAND_HANDLER(aarch64_handle_smp_on_command
)
2073 struct target
*target
= get_current_target(CMD_CTX
);
2074 struct target_list
*head
;
2075 struct target
*curr
;
2076 head
= target
->head
;
2077 if (head
!= (struct target_list
*)NULL
) {
2079 while (head
!= (struct target_list
*)NULL
) {
2080 curr
= head
->target
;
2088 COMMAND_HANDLER(aarch64_handle_smp_gdb_command
)
2090 struct target
*target
= get_current_target(CMD_CTX
);
2091 int retval
= ERROR_OK
;
2092 struct target_list
*head
;
2093 head
= target
->head
;
2094 if (head
!= (struct target_list
*)NULL
) {
2095 if (CMD_ARGC
== 1) {
2097 COMMAND_PARSE_NUMBER(int, CMD_ARGV
[0], coreid
);
2098 if (ERROR_OK
!= retval
)
2100 target
->gdb_service
->core
[1] = coreid
;
2103 command_print(CMD_CTX
, "gdb coreid %" PRId32
" -> %" PRId32
, target
->gdb_service
->core
[0]
2104 , target
->gdb_service
->core
[1]);
2109 static const struct command_registration aarch64_exec_command_handlers
[] = {
2111 .name
= "cache_info",
2112 .handler
= aarch64_handle_cache_info_command
,
2113 .mode
= COMMAND_EXEC
,
2114 .help
= "display information about target caches",
2119 .handler
= aarch64_handle_dbginit_command
,
2120 .mode
= COMMAND_EXEC
,
2121 .help
= "Initialize core debug",
2124 { .name
= "smp_off",
2125 .handler
= aarch64_handle_smp_off_command
,
2126 .mode
= COMMAND_EXEC
,
2127 .help
= "Stop smp handling",
2132 .handler
= aarch64_handle_smp_on_command
,
2133 .mode
= COMMAND_EXEC
,
2134 .help
= "Restart smp handling",
2139 .handler
= aarch64_handle_smp_gdb_command
,
2140 .mode
= COMMAND_EXEC
,
2141 .help
= "display/fix current core played to gdb",
2146 COMMAND_REGISTRATION_DONE
2148 static const struct command_registration aarch64_command_handlers
[] = {
2150 .chain
= arm_command_handlers
,
2153 .chain
= armv8_command_handlers
,
2157 .mode
= COMMAND_ANY
,
2158 .help
= "Cortex-A command group",
2160 .chain
= aarch64_exec_command_handlers
,
2162 COMMAND_REGISTRATION_DONE
2165 struct target_type aarch64_target
= {
2168 .poll
= aarch64_poll
,
2169 .arch_state
= armv8_arch_state
,
2171 .halt
= aarch64_halt
,
2172 .resume
= aarch64_resume
,
2173 .step
= aarch64_step
,
2175 .assert_reset
= aarch64_assert_reset
,
2176 .deassert_reset
= aarch64_deassert_reset
,
2178 /* REVISIT allow exporting VFP3 registers ... */
2179 .get_gdb_reg_list
= armv8_get_gdb_reg_list
,
2181 .read_memory
= aarch64_read_memory
,
2182 .write_memory
= aarch64_write_memory
,
2184 .checksum_memory
= arm_checksum_memory
,
2185 .blank_check_memory
= arm_blank_check_memory
,
2187 .run_algorithm
= armv4_5_run_algorithm
,
2189 .add_breakpoint
= aarch64_add_breakpoint
,
2190 .add_context_breakpoint
= aarch64_add_context_breakpoint
,
2191 .add_hybrid_breakpoint
= aarch64_add_hybrid_breakpoint
,
2192 .remove_breakpoint
= aarch64_remove_breakpoint
,
2193 .add_watchpoint
= NULL
,
2194 .remove_watchpoint
= NULL
,
2196 .commands
= aarch64_command_handlers
,
2197 .target_create
= aarch64_target_create
,
2198 .init_target
= aarch64_init_target
,
2199 .examine
= aarch64_examine
,
2201 .read_phys_memory
= aarch64_read_phys_memory
,
2202 .write_phys_memory
= aarch64_write_phys_memory
,
2204 .virt2phys
= aarch64_virt2phys
,
Linking to existing account procedure
If you already have an account and want to add another login method
you
MUST first sign in with your existing account and
then change URL to read
https://review.openocd.org/login/?link
to get to this page again but this time it'll work for linking. Thank you.
SSH host keys fingerprints
1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=.. |
|+o.. . |
|*.o . . |
|+B . . . |
|Bo. = o S |
|Oo.+ + = |
|oB=.* = . o |
| =+=.+ + E |
|. .=o . o |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)