1 /***************************************************************************
2 * Copyright (C) 2015 by David Ung *
4 * This program is free software; you can redistribute it and/or modify *
5 * it under the terms of the GNU General Public License as published by *
6 * the Free Software Foundation; either version 2 of the License, or *
7 * (at your option) any later version. *
9 * This program is distributed in the hope that it will be useful, *
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
12 * GNU General Public License for more details. *
14 * You should have received a copy of the GNU General Public License *
15 * along with this program; if not, write to the *
16 * Free Software Foundation, Inc., *
18 ***************************************************************************/
24 #include "breakpoints.h"
27 #include "target_request.h"
28 #include "target_type.h"
29 #include "armv8_opcodes.h"
30 #include "armv8_cache.h"
31 #include <helper/time_support.h>
33 static int aarch64_poll(struct target
*target
);
34 static int aarch64_debug_entry(struct target
*target
);
35 static int aarch64_restore_context(struct target
*target
, bool bpwp
);
36 static int aarch64_set_breakpoint(struct target
*target
,
37 struct breakpoint
*breakpoint
, uint8_t matchmode
);
38 static int aarch64_set_context_breakpoint(struct target
*target
,
39 struct breakpoint
*breakpoint
, uint8_t matchmode
);
40 static int aarch64_set_hybrid_breakpoint(struct target
*target
,
41 struct breakpoint
*breakpoint
);
42 static int aarch64_unset_breakpoint(struct target
*target
,
43 struct breakpoint
*breakpoint
);
44 static int aarch64_mmu(struct target
*target
, int *enabled
);
45 static int aarch64_virt2phys(struct target
*target
,
46 target_addr_t virt
, target_addr_t
*phys
);
47 static int aarch64_read_apb_ap_memory(struct target
*target
,
48 uint64_t address
, uint32_t size
, uint32_t count
, uint8_t *buffer
);
50 static int aarch64_restore_system_control_reg(struct target
*target
)
52 int retval
= ERROR_OK
;
54 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
55 struct armv8_common
*armv8
= target_to_armv8(target
);
57 if (aarch64
->system_control_reg
!= aarch64
->system_control_reg_curr
) {
58 aarch64
->system_control_reg_curr
= aarch64
->system_control_reg
;
59 /* LOG_INFO("cp15_control_reg: %8.8" PRIx32, cortex_v8->cp15_control_reg); */
61 switch (armv8
->arm
.core_mode
) {
65 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
68 aarch64
->system_control_reg
);
69 if (retval
!= ERROR_OK
)
74 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
77 aarch64
->system_control_reg
);
78 if (retval
!= ERROR_OK
)
83 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
86 aarch64
->system_control_reg
);
87 if (retval
!= ERROR_OK
)
91 retval
= armv8
->arm
.mcr(target
, 15, 0, 0, 1, 0, aarch64
->system_control_reg
);
92 if (retval
!= ERROR_OK
)
100 /* check address before aarch64_apb read write access with mmu on
101 * remove apb predictible data abort */
102 static int aarch64_check_address(struct target
*target
, uint32_t address
)
107 /* modify system_control_reg in order to enable or disable mmu for :
108 * - virt2phys address conversion
109 * - read or write memory in phys or virt address */
110 static int aarch64_mmu_modify(struct target
*target
, int enable
)
112 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
113 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
114 int retval
= ERROR_OK
;
117 /* if mmu enabled at target stop and mmu not enable */
118 if (!(aarch64
->system_control_reg
& 0x1U
)) {
119 LOG_ERROR("trying to enable mmu on target stopped with mmu disable");
122 if (!(aarch64
->system_control_reg_curr
& 0x1U
)) {
123 aarch64
->system_control_reg_curr
|= 0x1U
;
124 switch (armv8
->arm
.core_mode
) {
128 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
131 aarch64
->system_control_reg_curr
);
132 if (retval
!= ERROR_OK
)
137 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
140 aarch64
->system_control_reg_curr
);
141 if (retval
!= ERROR_OK
)
146 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
149 aarch64
->system_control_reg_curr
);
150 if (retval
!= ERROR_OK
)
154 LOG_DEBUG("unknow cpu state 0x%x" PRIx32
, armv8
->arm
.core_state
);
158 if (aarch64
->system_control_reg_curr
& 0x4U
) {
159 /* data cache is active */
160 aarch64
->system_control_reg_curr
&= ~0x4U
;
161 /* flush data cache armv7 function to be called */
162 if (armv8
->armv8_mmu
.armv8_cache
.flush_all_data_cache
)
163 armv8
->armv8_mmu
.armv8_cache
.flush_all_data_cache(target
);
165 if ((aarch64
->system_control_reg_curr
& 0x1U
)) {
166 aarch64
->system_control_reg_curr
&= ~0x1U
;
167 switch (armv8
->arm
.core_mode
) {
171 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
174 aarch64
->system_control_reg_curr
);
175 if (retval
!= ERROR_OK
)
180 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
183 aarch64
->system_control_reg_curr
);
184 if (retval
!= ERROR_OK
)
189 retval
= armv8
->arm
.msr(target
, 3, /*op 0*/
192 aarch64
->system_control_reg_curr
);
193 if (retval
!= ERROR_OK
)
197 LOG_DEBUG("unknow cpu state 0x%x" PRIx32
, armv8
->arm
.core_state
);
206 * Basic debug access, very low level assumes state is saved
208 static int aarch64_init_debug_access(struct target
*target
)
210 struct armv8_common
*armv8
= target_to_armv8(target
);
216 /* Clear Sticky Power Down status Bit in PRSR to enable access to
217 the registers in the Core Power Domain */
218 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
219 armv8
->debug_base
+ CPUV8_DBG_PRSR
, &dummy
);
220 if (retval
!= ERROR_OK
)
224 * Static CTI configuration:
225 * Channel 0 -> trigger outputs HALT request to PE
226 * Channel 1 -> trigger outputs Resume request to PE
227 * Gate all channel trigger events from entering the CTM
231 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
232 armv8
->cti_base
+ CTI_CTR
, 1);
233 /* By default, gate all channel triggers to and from the CTM */
234 if (retval
== ERROR_OK
)
235 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
236 armv8
->cti_base
+ CTI_GATE
, 0);
237 /* output halt requests to PE on channel 0 trigger */
238 if (retval
== ERROR_OK
)
239 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
240 armv8
->cti_base
+ CTI_OUTEN0
, CTI_CHNL(0));
241 /* output restart requests to PE on channel 1 trigger */
242 if (retval
== ERROR_OK
)
243 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
244 armv8
->cti_base
+ CTI_OUTEN1
, CTI_CHNL(1));
245 if (retval
!= ERROR_OK
)
248 /* Resync breakpoint registers */
250 /* Since this is likely called from init or reset, update target state information*/
251 return aarch64_poll(target
);
254 /* Write to memory mapped registers directly with no cache or mmu handling */
255 static int aarch64_dap_write_memap_register_u32(struct target
*target
,
260 struct armv8_common
*armv8
= target_to_armv8(target
);
262 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
, address
, value
);
267 static int aarch64_dpm_setup(struct aarch64_common
*a8
, uint64_t debug
)
269 struct arm_dpm
*dpm
= &a8
->armv8_common
.dpm
;
272 dpm
->arm
= &a8
->armv8_common
.arm
;
275 retval
= armv8_dpm_setup(dpm
);
276 if (retval
== ERROR_OK
)
277 retval
= armv8_dpm_initialize(dpm
);
282 static int aarch64_set_dscr_bits(struct target
*target
, unsigned long bit_mask
, unsigned long value
)
284 struct armv8_common
*armv8
= target_to_armv8(target
);
288 int retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
289 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
290 if (ERROR_OK
!= retval
)
296 dscr
|= value
& bit_mask
;
299 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
300 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
304 static struct target
*get_aarch64(struct target
*target
, int32_t coreid
)
306 struct target_list
*head
;
310 while (head
!= (struct target_list
*)NULL
) {
312 if ((curr
->coreid
== coreid
) && (curr
->state
== TARGET_HALTED
))
318 static int aarch64_halt(struct target
*target
);
320 static int aarch64_halt_smp(struct target
*target
)
322 int retval
= ERROR_OK
;
323 struct target_list
*head
= target
->head
;
325 while (head
!= (struct target_list
*)NULL
) {
326 struct target
*curr
= head
->target
;
327 struct armv8_common
*armv8
= target_to_armv8(curr
);
329 /* open the gate for channel 0 to let HALT requests pass to the CTM */
331 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
332 armv8
->cti_base
+ CTI_GATE
, CTI_CHNL(0));
333 if (retval
== ERROR_OK
)
334 retval
= aarch64_set_dscr_bits(curr
, DSCR_HDE
, DSCR_HDE
);
336 if (retval
!= ERROR_OK
)
342 /* halt the target PE */
343 if (retval
== ERROR_OK
)
344 retval
= aarch64_halt(target
);
349 static int update_halt_gdb(struct target
*target
)
352 if (target
->gdb_service
&& target
->gdb_service
->core
[0] == -1) {
353 target
->gdb_service
->target
= target
;
354 target
->gdb_service
->core
[0] = target
->coreid
;
355 retval
+= aarch64_halt_smp(target
);
361 * Cortex-A8 Run control
364 static int aarch64_poll(struct target
*target
)
366 int retval
= ERROR_OK
;
368 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
369 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
370 enum target_state prev_target_state
= target
->state
;
371 /* toggle to another core is done by gdb as follow */
372 /* maint packet J core_id */
374 /* the next polling trigger an halt event sent to gdb */
375 if ((target
->state
== TARGET_HALTED
) && (target
->smp
) &&
376 (target
->gdb_service
) &&
377 (target
->gdb_service
->target
== NULL
)) {
378 target
->gdb_service
->target
=
379 get_aarch64(target
, target
->gdb_service
->core
[1]);
380 target_call_event_callbacks(target
, TARGET_EVENT_HALTED
);
383 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
384 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
385 if (retval
!= ERROR_OK
)
387 aarch64
->cpudbg_dscr
= dscr
;
389 if (DSCR_RUN_MODE(dscr
) == 0x3) {
390 if (prev_target_state
!= TARGET_HALTED
) {
391 /* We have a halting debug event */
392 LOG_DEBUG("Target halted");
393 target
->state
= TARGET_HALTED
;
394 if ((prev_target_state
== TARGET_RUNNING
)
395 || (prev_target_state
== TARGET_UNKNOWN
)
396 || (prev_target_state
== TARGET_RESET
)) {
397 retval
= aarch64_debug_entry(target
);
398 if (retval
!= ERROR_OK
)
401 retval
= update_halt_gdb(target
);
402 if (retval
!= ERROR_OK
)
405 target_call_event_callbacks(target
,
406 TARGET_EVENT_HALTED
);
408 if (prev_target_state
== TARGET_DEBUG_RUNNING
) {
411 retval
= aarch64_debug_entry(target
);
412 if (retval
!= ERROR_OK
)
415 retval
= update_halt_gdb(target
);
416 if (retval
!= ERROR_OK
)
420 target_call_event_callbacks(target
,
421 TARGET_EVENT_DEBUG_HALTED
);
425 target
->state
= TARGET_RUNNING
;
430 static int aarch64_halt(struct target
*target
)
432 int retval
= ERROR_OK
;
434 struct armv8_common
*armv8
= target_to_armv8(target
);
437 * add HDE in halting debug mode
439 retval
= aarch64_set_dscr_bits(target
, DSCR_HDE
, DSCR_HDE
);
440 if (retval
!= ERROR_OK
)
443 /* trigger an event on channel 0, this outputs a halt request to the PE */
444 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
445 armv8
->cti_base
+ CTI_APPPULSE
, CTI_CHNL(0));
446 if (retval
!= ERROR_OK
)
449 long long then
= timeval_ms();
451 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
452 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
453 if (retval
!= ERROR_OK
)
455 if ((dscr
& DSCRV8_HALT_MASK
) != 0)
457 if (timeval_ms() > then
+ 1000) {
458 LOG_ERROR("Timeout waiting for halt");
463 target
->debug_reason
= DBG_REASON_DBGRQ
;
468 static int aarch64_internal_restore(struct target
*target
, int current
,
469 uint64_t *address
, int handle_breakpoints
, int debug_execution
)
471 struct armv8_common
*armv8
= target_to_armv8(target
);
472 struct arm
*arm
= &armv8
->arm
;
476 if (!debug_execution
)
477 target_free_all_working_areas(target
);
479 /* current = 1: continue on current pc, otherwise continue at <address> */
480 resume_pc
= buf_get_u64(arm
->pc
->value
, 0, 64);
482 resume_pc
= *address
;
484 *address
= resume_pc
;
486 /* Make sure that the Armv7 gdb thumb fixups does not
487 * kill the return address
489 switch (arm
->core_state
) {
491 resume_pc
&= 0xFFFFFFFC;
493 case ARM_STATE_AARCH64
:
494 resume_pc
&= 0xFFFFFFFFFFFFFFFC;
496 case ARM_STATE_THUMB
:
497 case ARM_STATE_THUMB_EE
:
498 /* When the return address is loaded into PC
499 * bit 0 must be 1 to stay in Thumb state
503 case ARM_STATE_JAZELLE
:
504 LOG_ERROR("How do I resume into Jazelle state??");
507 LOG_DEBUG("resume pc = 0x%016" PRIx64
, resume_pc
);
508 buf_set_u64(arm
->pc
->value
, 0, 64, resume_pc
);
512 /* called it now before restoring context because it uses cpu
513 * register r0 for restoring system control register */
514 retval
= aarch64_restore_system_control_reg(target
);
515 if (retval
== ERROR_OK
)
516 retval
= aarch64_restore_context(target
, handle_breakpoints
);
521 static int aarch64_internal_restart(struct target
*target
, bool slave_pe
)
523 struct armv8_common
*armv8
= target_to_armv8(target
);
524 struct arm
*arm
= &armv8
->arm
;
528 * * Restart core and wait for it to be started. Clear ITRen and sticky
529 * * exception flags: see ARMv7 ARM, C5.9.
531 * REVISIT: for single stepping, we probably want to
532 * disable IRQs by default, with optional override...
535 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
536 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
537 if (retval
!= ERROR_OK
)
540 if ((dscr
& DSCR_ITE
) == 0)
541 LOG_ERROR("DSCR.ITE must be set before leaving debug!");
542 if ((dscr
& DSCR_ERR
) != 0)
543 LOG_ERROR("DSCR.ERR must be cleared before leaving debug!");
545 /* make sure to acknowledge the halt event before resuming */
546 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
547 armv8
->cti_base
+ CTI_INACK
, CTI_TRIG(HALT
));
550 * open the CTI gate for channel 1 so that the restart events
551 * get passed along to all PEs
553 if (retval
== ERROR_OK
)
554 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
555 armv8
->cti_base
+ CTI_GATE
, CTI_CHNL(1));
556 if (retval
!= ERROR_OK
)
560 /* trigger an event on channel 1, generates a restart request to the PE */
561 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
562 armv8
->cti_base
+ CTI_APPPULSE
, CTI_CHNL(1));
563 if (retval
!= ERROR_OK
)
566 long long then
= timeval_ms();
568 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
569 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
570 if (retval
!= ERROR_OK
)
572 if ((dscr
& DSCR_HDE
) != 0)
574 if (timeval_ms() > then
+ 1000) {
575 LOG_ERROR("Timeout waiting for resume");
581 target
->debug_reason
= DBG_REASON_NOTHALTED
;
582 target
->state
= TARGET_RUNNING
;
584 /* registers are now invalid */
585 register_cache_invalidate(arm
->core_cache
);
586 register_cache_invalidate(arm
->core_cache
->next
);
591 static int aarch64_restore_smp(struct target
*target
, int handle_breakpoints
)
594 struct target_list
*head
;
598 while (head
!= (struct target_list
*)NULL
) {
600 if ((curr
!= target
) && (curr
->state
!= TARGET_RUNNING
)) {
601 /* resume current address , not in step mode */
602 retval
+= aarch64_internal_restore(curr
, 1, &address
,
603 handle_breakpoints
, 0);
604 retval
+= aarch64_internal_restart(curr
, true);
612 static int aarch64_resume(struct target
*target
, int current
,
613 target_addr_t address
, int handle_breakpoints
, int debug_execution
)
616 uint64_t addr
= address
;
618 /* dummy resume for smp toggle in order to reduce gdb impact */
619 if ((target
->smp
) && (target
->gdb_service
->core
[1] != -1)) {
620 /* simulate a start and halt of target */
621 target
->gdb_service
->target
= NULL
;
622 target
->gdb_service
->core
[0] = target
->gdb_service
->core
[1];
623 /* fake resume at next poll we play the target core[1], see poll*/
624 target_call_event_callbacks(target
, TARGET_EVENT_RESUMED
);
627 aarch64_internal_restore(target
, current
, &addr
, handle_breakpoints
,
630 target
->gdb_service
->core
[0] = -1;
631 retval
= aarch64_restore_smp(target
, handle_breakpoints
);
632 if (retval
!= ERROR_OK
)
635 aarch64_internal_restart(target
, false);
637 if (!debug_execution
) {
638 target
->state
= TARGET_RUNNING
;
639 target_call_event_callbacks(target
, TARGET_EVENT_RESUMED
);
640 LOG_DEBUG("target resumed at 0x%" PRIx64
, addr
);
642 target
->state
= TARGET_DEBUG_RUNNING
;
643 target_call_event_callbacks(target
, TARGET_EVENT_DEBUG_RESUMED
);
644 LOG_DEBUG("target debug resumed at 0x%" PRIx64
, addr
);
650 static int aarch64_debug_entry(struct target
*target
)
652 int retval
= ERROR_OK
;
653 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
654 struct armv8_common
*armv8
= target_to_armv8(target
);
655 struct arm_dpm
*dpm
= &armv8
->dpm
;
656 enum arm_state core_state
;
658 LOG_DEBUG("%s dscr = 0x%08" PRIx32
, target_name(target
), aarch64
->cpudbg_dscr
);
660 dpm
->dscr
= aarch64
->cpudbg_dscr
;
661 core_state
= armv8_dpm_get_core_state(dpm
);
662 armv8_select_opcodes(armv8
, core_state
== ARM_STATE_AARCH64
);
663 armv8_select_reg_access(armv8
, core_state
== ARM_STATE_AARCH64
);
665 /* make sure to clear all sticky errors */
666 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
667 armv8
->debug_base
+ CPUV8_DBG_DRCR
, DRCR_CSE
);
669 /* discard async exceptions */
670 if (retval
== ERROR_OK
)
671 retval
= dpm
->instr_cpsr_sync(dpm
);
673 if (retval
!= ERROR_OK
)
676 /* Examine debug reason */
677 armv8_dpm_report_dscr(dpm
, aarch64
->cpudbg_dscr
);
679 /* save address of instruction that triggered the watchpoint? */
680 if (target
->debug_reason
== DBG_REASON_WATCHPOINT
) {
684 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
685 armv8
->debug_base
+ CPUV8_DBG_WFAR1
,
687 if (retval
!= ERROR_OK
)
691 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
692 armv8
->debug_base
+ CPUV8_DBG_WFAR0
,
694 if (retval
!= ERROR_OK
)
697 armv8_dpm_report_wfar(&armv8
->dpm
, wfar
);
700 retval
= armv8_dpm_read_current_registers(&armv8
->dpm
);
702 if (retval
== ERROR_OK
&& armv8
->post_debug_entry
)
703 retval
= armv8
->post_debug_entry(target
);
708 static int aarch64_post_debug_entry(struct target
*target
)
710 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
711 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
714 switch (armv8
->arm
.core_mode
) {
716 armv8_dpm_modeswitch(&armv8
->dpm
, ARMV8_64_EL1H
);
720 retval
= armv8
->arm
.mrs(target
, 3, /*op 0*/
723 &aarch64
->system_control_reg
);
724 if (retval
!= ERROR_OK
)
729 retval
= armv8
->arm
.mrs(target
, 3, /*op 0*/
732 &aarch64
->system_control_reg
);
733 if (retval
!= ERROR_OK
)
738 retval
= armv8
->arm
.mrs(target
, 3, /*op 0*/
741 &aarch64
->system_control_reg
);
742 if (retval
!= ERROR_OK
)
747 retval
= armv8
->arm
.mrc(target
, 15, 0, 0, 1, 0, &aarch64
->system_control_reg
);
748 if (retval
!= ERROR_OK
)
753 LOG_INFO("cannot read system control register in this mode");
757 armv8_dpm_modeswitch(&armv8
->dpm
, ARM_MODE_ANY
);
759 LOG_DEBUG("System_register: %8.8" PRIx32
, aarch64
->system_control_reg
);
760 aarch64
->system_control_reg_curr
= aarch64
->system_control_reg
;
762 if (armv8
->armv8_mmu
.armv8_cache
.info
== -1) {
763 armv8_identify_cache(armv8
);
764 armv8_read_mpidr(armv8
);
767 armv8
->armv8_mmu
.mmu_enabled
=
768 (aarch64
->system_control_reg
& 0x1U
) ? 1 : 0;
769 armv8
->armv8_mmu
.armv8_cache
.d_u_cache_enabled
=
770 (aarch64
->system_control_reg
& 0x4U
) ? 1 : 0;
771 armv8
->armv8_mmu
.armv8_cache
.i_cache_enabled
=
772 (aarch64
->system_control_reg
& 0x1000U
) ? 1 : 0;
773 aarch64
->curr_mode
= armv8
->arm
.core_mode
;
777 static int aarch64_step(struct target
*target
, int current
, target_addr_t address
,
778 int handle_breakpoints
)
780 struct armv8_common
*armv8
= target_to_armv8(target
);
784 if (target
->state
!= TARGET_HALTED
) {
785 LOG_WARNING("target not halted");
786 return ERROR_TARGET_NOT_HALTED
;
789 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
790 armv8
->debug_base
+ CPUV8_DBG_EDECR
, &edecr
);
791 if (retval
!= ERROR_OK
)
794 /* make sure EDECR.SS is not set when restoring the register */
797 /* set EDECR.SS to enter hardware step mode */
798 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
799 armv8
->debug_base
+ CPUV8_DBG_EDECR
, (edecr
|0x4));
800 if (retval
!= ERROR_OK
)
803 /* disable interrupts while stepping */
804 retval
= aarch64_set_dscr_bits(target
, 0x3 << 22, 0x3 << 22);
805 if (retval
!= ERROR_OK
)
808 /* resume the target */
809 retval
= aarch64_resume(target
, current
, address
, 0, 0);
810 if (retval
!= ERROR_OK
)
813 long long then
= timeval_ms();
814 while (target
->state
!= TARGET_HALTED
) {
815 retval
= aarch64_poll(target
);
816 if (retval
!= ERROR_OK
)
818 if (timeval_ms() > then
+ 1000) {
819 LOG_ERROR("timeout waiting for target halt");
825 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
826 armv8
->debug_base
+ CPUV8_DBG_EDECR
, edecr
);
827 if (retval
!= ERROR_OK
)
830 /* restore interrupts */
831 retval
= aarch64_set_dscr_bits(target
, 0x3 << 22, 0);
832 if (retval
!= ERROR_OK
)
838 static int aarch64_restore_context(struct target
*target
, bool bpwp
)
840 struct armv8_common
*armv8
= target_to_armv8(target
);
844 if (armv8
->pre_restore_context
)
845 armv8
->pre_restore_context(target
);
847 return armv8_dpm_write_dirty_registers(&armv8
->dpm
, bpwp
);
852 * Cortex-A8 Breakpoint and watchpoint functions
855 /* Setup hardware Breakpoint Register Pair */
856 static int aarch64_set_breakpoint(struct target
*target
,
857 struct breakpoint
*breakpoint
, uint8_t matchmode
)
862 uint8_t byte_addr_select
= 0x0F;
863 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
864 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
865 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
867 if (breakpoint
->set
) {
868 LOG_WARNING("breakpoint already set");
872 if (breakpoint
->type
== BKPT_HARD
) {
874 while (brp_list
[brp_i
].used
&& (brp_i
< aarch64
->brp_num
))
876 if (brp_i
>= aarch64
->brp_num
) {
877 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
878 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
880 breakpoint
->set
= brp_i
+ 1;
881 if (breakpoint
->length
== 2)
882 byte_addr_select
= (3 << (breakpoint
->address
& 0x02));
883 control
= ((matchmode
& 0x7) << 20)
885 | (byte_addr_select
<< 5)
887 brp_list
[brp_i
].used
= 1;
888 brp_list
[brp_i
].value
= breakpoint
->address
& 0xFFFFFFFFFFFFFFFC;
889 brp_list
[brp_i
].control
= control
;
890 bpt_value
= brp_list
[brp_i
].value
;
892 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
893 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
894 (uint32_t)(bpt_value
& 0xFFFFFFFF));
895 if (retval
!= ERROR_OK
)
897 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
898 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_i
].BRPn
,
899 (uint32_t)(bpt_value
>> 32));
900 if (retval
!= ERROR_OK
)
903 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
904 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
905 brp_list
[brp_i
].control
);
906 if (retval
!= ERROR_OK
)
908 LOG_DEBUG("brp %i control 0x%0" PRIx32
" value 0x%" TARGET_PRIxADDR
, brp_i
,
909 brp_list
[brp_i
].control
,
910 brp_list
[brp_i
].value
);
912 } else if (breakpoint
->type
== BKPT_SOFT
) {
915 buf_set_u32(code
, 0, 32, ARMV8_HLT(0x11));
916 retval
= target_read_memory(target
,
917 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
918 breakpoint
->length
, 1,
919 breakpoint
->orig_instr
);
920 if (retval
!= ERROR_OK
)
923 armv8_cache_d_inner_flush_virt(armv8
,
924 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
927 retval
= target_write_memory(target
,
928 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
929 breakpoint
->length
, 1, code
);
930 if (retval
!= ERROR_OK
)
933 armv8_cache_d_inner_flush_virt(armv8
,
934 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
937 armv8_cache_i_inner_inval_virt(armv8
,
938 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
941 breakpoint
->set
= 0x11; /* Any nice value but 0 */
944 /* Ensure that halting debug mode is enable */
945 retval
= aarch64_set_dscr_bits(target
, DSCR_HDE
, DSCR_HDE
);
946 if (retval
!= ERROR_OK
) {
947 LOG_DEBUG("Failed to set DSCR.HDE");
954 static int aarch64_set_context_breakpoint(struct target
*target
,
955 struct breakpoint
*breakpoint
, uint8_t matchmode
)
957 int retval
= ERROR_FAIL
;
960 uint8_t byte_addr_select
= 0x0F;
961 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
962 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
963 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
965 if (breakpoint
->set
) {
966 LOG_WARNING("breakpoint already set");
969 /*check available context BRPs*/
970 while ((brp_list
[brp_i
].used
||
971 (brp_list
[brp_i
].type
!= BRP_CONTEXT
)) && (brp_i
< aarch64
->brp_num
))
974 if (brp_i
>= aarch64
->brp_num
) {
975 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
979 breakpoint
->set
= brp_i
+ 1;
980 control
= ((matchmode
& 0x7) << 20)
982 | (byte_addr_select
<< 5)
984 brp_list
[brp_i
].used
= 1;
985 brp_list
[brp_i
].value
= (breakpoint
->asid
);
986 brp_list
[brp_i
].control
= control
;
987 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
988 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
989 brp_list
[brp_i
].value
);
990 if (retval
!= ERROR_OK
)
992 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
993 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
994 brp_list
[brp_i
].control
);
995 if (retval
!= ERROR_OK
)
997 LOG_DEBUG("brp %i control 0x%0" PRIx32
" value 0x%" TARGET_PRIxADDR
, brp_i
,
998 brp_list
[brp_i
].control
,
999 brp_list
[brp_i
].value
);
1004 static int aarch64_set_hybrid_breakpoint(struct target
*target
, struct breakpoint
*breakpoint
)
1006 int retval
= ERROR_FAIL
;
1007 int brp_1
= 0; /* holds the contextID pair */
1008 int brp_2
= 0; /* holds the IVA pair */
1009 uint32_t control_CTX
, control_IVA
;
1010 uint8_t CTX_byte_addr_select
= 0x0F;
1011 uint8_t IVA_byte_addr_select
= 0x0F;
1012 uint8_t CTX_machmode
= 0x03;
1013 uint8_t IVA_machmode
= 0x01;
1014 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1015 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1016 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
1018 if (breakpoint
->set
) {
1019 LOG_WARNING("breakpoint already set");
1022 /*check available context BRPs*/
1023 while ((brp_list
[brp_1
].used
||
1024 (brp_list
[brp_1
].type
!= BRP_CONTEXT
)) && (brp_1
< aarch64
->brp_num
))
1027 printf("brp(CTX) found num: %d\n", brp_1
);
1028 if (brp_1
>= aarch64
->brp_num
) {
1029 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
1033 while ((brp_list
[brp_2
].used
||
1034 (brp_list
[brp_2
].type
!= BRP_NORMAL
)) && (brp_2
< aarch64
->brp_num
))
1037 printf("brp(IVA) found num: %d\n", brp_2
);
1038 if (brp_2
>= aarch64
->brp_num
) {
1039 LOG_ERROR("ERROR Can not find free Breakpoint Register Pair");
1043 breakpoint
->set
= brp_1
+ 1;
1044 breakpoint
->linked_BRP
= brp_2
;
1045 control_CTX
= ((CTX_machmode
& 0x7) << 20)
1048 | (CTX_byte_addr_select
<< 5)
1050 brp_list
[brp_1
].used
= 1;
1051 brp_list
[brp_1
].value
= (breakpoint
->asid
);
1052 brp_list
[brp_1
].control
= control_CTX
;
1053 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1054 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_1
].BRPn
,
1055 brp_list
[brp_1
].value
);
1056 if (retval
!= ERROR_OK
)
1058 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1059 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_1
].BRPn
,
1060 brp_list
[brp_1
].control
);
1061 if (retval
!= ERROR_OK
)
1064 control_IVA
= ((IVA_machmode
& 0x7) << 20)
1067 | (IVA_byte_addr_select
<< 5)
1069 brp_list
[brp_2
].used
= 1;
1070 brp_list
[brp_2
].value
= breakpoint
->address
& 0xFFFFFFFFFFFFFFFC;
1071 brp_list
[brp_2
].control
= control_IVA
;
1072 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1073 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_2
].BRPn
,
1074 brp_list
[brp_2
].value
& 0xFFFFFFFF);
1075 if (retval
!= ERROR_OK
)
1077 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1078 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_2
].BRPn
,
1079 brp_list
[brp_2
].value
>> 32);
1080 if (retval
!= ERROR_OK
)
1082 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1083 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_2
].BRPn
,
1084 brp_list
[brp_2
].control
);
1085 if (retval
!= ERROR_OK
)
1091 static int aarch64_unset_breakpoint(struct target
*target
, struct breakpoint
*breakpoint
)
1094 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1095 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1096 struct aarch64_brp
*brp_list
= aarch64
->brp_list
;
1098 if (!breakpoint
->set
) {
1099 LOG_WARNING("breakpoint not set");
1103 if (breakpoint
->type
== BKPT_HARD
) {
1104 if ((breakpoint
->address
!= 0) && (breakpoint
->asid
!= 0)) {
1105 int brp_i
= breakpoint
->set
- 1;
1106 int brp_j
= breakpoint
->linked_BRP
;
1107 if ((brp_i
< 0) || (brp_i
>= aarch64
->brp_num
)) {
1108 LOG_DEBUG("Invalid BRP number in breakpoint");
1111 LOG_DEBUG("rbp %i control 0x%0" PRIx32
" value 0x%" TARGET_PRIxADDR
, brp_i
,
1112 brp_list
[brp_i
].control
, brp_list
[brp_i
].value
);
1113 brp_list
[brp_i
].used
= 0;
1114 brp_list
[brp_i
].value
= 0;
1115 brp_list
[brp_i
].control
= 0;
1116 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1117 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1118 brp_list
[brp_i
].control
);
1119 if (retval
!= ERROR_OK
)
1121 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1122 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1123 (uint32_t)brp_list
[brp_i
].value
);
1124 if (retval
!= ERROR_OK
)
1126 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1127 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_i
].BRPn
,
1128 (uint32_t)brp_list
[brp_i
].value
);
1129 if (retval
!= ERROR_OK
)
1131 if ((brp_j
< 0) || (brp_j
>= aarch64
->brp_num
)) {
1132 LOG_DEBUG("Invalid BRP number in breakpoint");
1135 LOG_DEBUG("rbp %i control 0x%0" PRIx32
" value 0x%0" PRIx64
, brp_j
,
1136 brp_list
[brp_j
].control
, brp_list
[brp_j
].value
);
1137 brp_list
[brp_j
].used
= 0;
1138 brp_list
[brp_j
].value
= 0;
1139 brp_list
[brp_j
].control
= 0;
1140 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1141 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_j
].BRPn
,
1142 brp_list
[brp_j
].control
);
1143 if (retval
!= ERROR_OK
)
1145 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1146 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_j
].BRPn
,
1147 (uint32_t)brp_list
[brp_j
].value
);
1148 if (retval
!= ERROR_OK
)
1150 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1151 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_j
].BRPn
,
1152 (uint32_t)brp_list
[brp_j
].value
);
1153 if (retval
!= ERROR_OK
)
1156 breakpoint
->linked_BRP
= 0;
1157 breakpoint
->set
= 0;
1161 int brp_i
= breakpoint
->set
- 1;
1162 if ((brp_i
< 0) || (brp_i
>= aarch64
->brp_num
)) {
1163 LOG_DEBUG("Invalid BRP number in breakpoint");
1166 LOG_DEBUG("rbp %i control 0x%0" PRIx32
" value 0x%0" PRIx64
, brp_i
,
1167 brp_list
[brp_i
].control
, brp_list
[brp_i
].value
);
1168 brp_list
[brp_i
].used
= 0;
1169 brp_list
[brp_i
].value
= 0;
1170 brp_list
[brp_i
].control
= 0;
1171 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1172 + CPUV8_DBG_BCR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1173 brp_list
[brp_i
].control
);
1174 if (retval
!= ERROR_OK
)
1176 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1177 + CPUV8_DBG_BVR_BASE
+ 16 * brp_list
[brp_i
].BRPn
,
1178 brp_list
[brp_i
].value
);
1179 if (retval
!= ERROR_OK
)
1182 retval
= aarch64_dap_write_memap_register_u32(target
, armv8
->debug_base
1183 + CPUV8_DBG_BVR_BASE
+ 4 + 16 * brp_list
[brp_i
].BRPn
,
1184 (uint32_t)brp_list
[brp_i
].value
);
1185 if (retval
!= ERROR_OK
)
1187 breakpoint
->set
= 0;
1191 /* restore original instruction (kept in target endianness) */
1193 armv8_cache_d_inner_flush_virt(armv8
,
1194 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1195 breakpoint
->length
);
1197 if (breakpoint
->length
== 4) {
1198 retval
= target_write_memory(target
,
1199 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1200 4, 1, breakpoint
->orig_instr
);
1201 if (retval
!= ERROR_OK
)
1204 retval
= target_write_memory(target
,
1205 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1206 2, 1, breakpoint
->orig_instr
);
1207 if (retval
!= ERROR_OK
)
1211 armv8_cache_d_inner_flush_virt(armv8
,
1212 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1213 breakpoint
->length
);
1215 armv8_cache_i_inner_inval_virt(armv8
,
1216 breakpoint
->address
& 0xFFFFFFFFFFFFFFFE,
1217 breakpoint
->length
);
1219 breakpoint
->set
= 0;
1224 static int aarch64_add_breakpoint(struct target
*target
,
1225 struct breakpoint
*breakpoint
)
1227 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1229 if ((breakpoint
->type
== BKPT_HARD
) && (aarch64
->brp_num_available
< 1)) {
1230 LOG_INFO("no hardware breakpoint available");
1231 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
1234 if (breakpoint
->type
== BKPT_HARD
)
1235 aarch64
->brp_num_available
--;
1237 return aarch64_set_breakpoint(target
, breakpoint
, 0x00); /* Exact match */
1240 static int aarch64_add_context_breakpoint(struct target
*target
,
1241 struct breakpoint
*breakpoint
)
1243 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1245 if ((breakpoint
->type
== BKPT_HARD
) && (aarch64
->brp_num_available
< 1)) {
1246 LOG_INFO("no hardware breakpoint available");
1247 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
1250 if (breakpoint
->type
== BKPT_HARD
)
1251 aarch64
->brp_num_available
--;
1253 return aarch64_set_context_breakpoint(target
, breakpoint
, 0x02); /* asid match */
1256 static int aarch64_add_hybrid_breakpoint(struct target
*target
,
1257 struct breakpoint
*breakpoint
)
1259 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1261 if ((breakpoint
->type
== BKPT_HARD
) && (aarch64
->brp_num_available
< 1)) {
1262 LOG_INFO("no hardware breakpoint available");
1263 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE
;
1266 if (breakpoint
->type
== BKPT_HARD
)
1267 aarch64
->brp_num_available
--;
1269 return aarch64_set_hybrid_breakpoint(target
, breakpoint
); /* ??? */
1273 static int aarch64_remove_breakpoint(struct target
*target
, struct breakpoint
*breakpoint
)
1275 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1278 /* It is perfectly possible to remove breakpoints while the target is running */
1279 if (target
->state
!= TARGET_HALTED
) {
1280 LOG_WARNING("target not halted");
1281 return ERROR_TARGET_NOT_HALTED
;
1285 if (breakpoint
->set
) {
1286 aarch64_unset_breakpoint(target
, breakpoint
);
1287 if (breakpoint
->type
== BKPT_HARD
)
1288 aarch64
->brp_num_available
++;
1295 * Cortex-A8 Reset functions
1298 static int aarch64_assert_reset(struct target
*target
)
1300 struct armv8_common
*armv8
= target_to_armv8(target
);
1304 /* FIXME when halt is requested, make it work somehow... */
1306 /* Issue some kind of warm reset. */
1307 if (target_has_event_action(target
, TARGET_EVENT_RESET_ASSERT
))
1308 target_handle_event(target
, TARGET_EVENT_RESET_ASSERT
);
1309 else if (jtag_get_reset_config() & RESET_HAS_SRST
) {
1310 /* REVISIT handle "pulls" cases, if there's
1311 * hardware that needs them to work.
1313 jtag_add_reset(0, 1);
1315 LOG_ERROR("%s: how to reset?", target_name(target
));
1319 /* registers are now invalid */
1320 register_cache_invalidate(armv8
->arm
.core_cache
);
1322 target
->state
= TARGET_RESET
;
1327 static int aarch64_deassert_reset(struct target
*target
)
1333 /* be certain SRST is off */
1334 jtag_add_reset(0, 0);
1336 retval
= aarch64_poll(target
);
1337 if (retval
!= ERROR_OK
)
1340 if (target
->reset_halt
) {
1341 if (target
->state
!= TARGET_HALTED
) {
1342 LOG_WARNING("%s: ran after reset and before halt ...",
1343 target_name(target
));
1344 retval
= target_halt(target
);
1345 if (retval
!= ERROR_OK
)
1353 static int aarch64_write_apb_ap_memory(struct target
*target
,
1354 uint64_t address
, uint32_t size
,
1355 uint32_t count
, const uint8_t *buffer
)
1357 /* write memory through APB-AP */
1358 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1359 struct armv8_common
*armv8
= target_to_armv8(target
);
1360 struct arm_dpm
*dpm
= &armv8
->dpm
;
1361 struct arm
*arm
= &armv8
->arm
;
1362 int total_bytes
= count
* size
;
1364 int start_byte
= address
& 0x3;
1365 int end_byte
= (address
+ total_bytes
) & 0x3;
1368 uint8_t *tmp_buff
= NULL
;
1370 LOG_DEBUG("Writing APB-AP memory address 0x%" PRIx64
" size %" PRIu32
" count%" PRIu32
,
1371 address
, size
, count
);
1372 if (target
->state
!= TARGET_HALTED
) {
1373 LOG_WARNING("target not halted");
1374 return ERROR_TARGET_NOT_HALTED
;
1377 total_u32
= DIV_ROUND_UP((address
& 3) + total_bytes
, 4);
1379 /* Mark register R0 as dirty, as it will be used
1380 * for transferring the data.
1381 * It will be restored automatically when exiting
1384 reg
= armv8_reg_current(arm
, 1);
1387 reg
= armv8_reg_current(arm
, 0);
1390 /* This algorithm comes from DDI0487A.g, chapter J9.1 */
1392 /* The algorithm only copies 32 bit words, so the buffer
1393 * should be expanded to include the words at either end.
1394 * The first and last words will be read first to avoid
1395 * corruption if needed.
1397 tmp_buff
= malloc(total_u32
* 4);
1399 if ((start_byte
!= 0) && (total_u32
> 1)) {
1400 /* First bytes not aligned - read the 32 bit word to avoid corrupting
1401 * the other bytes in the word.
1403 retval
= aarch64_read_apb_ap_memory(target
, (address
& ~0x3), 4, 1, tmp_buff
);
1404 if (retval
!= ERROR_OK
)
1405 goto error_free_buff_w
;
1408 /* If end of write is not aligned, or the write is less than 4 bytes */
1409 if ((end_byte
!= 0) ||
1410 ((total_u32
== 1) && (total_bytes
!= 4))) {
1412 /* Read the last word to avoid corruption during 32 bit write */
1413 int mem_offset
= (total_u32
-1) * 4;
1414 retval
= aarch64_read_apb_ap_memory(target
, (address
& ~0x3) + mem_offset
, 4, 1, &tmp_buff
[mem_offset
]);
1415 if (retval
!= ERROR_OK
)
1416 goto error_free_buff_w
;
1419 /* Copy the write buffer over the top of the temporary buffer */
1420 memcpy(&tmp_buff
[start_byte
], buffer
, total_bytes
);
1422 /* We now have a 32 bit aligned buffer that can be written */
1425 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1426 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1427 if (retval
!= ERROR_OK
)
1428 goto error_free_buff_w
;
1430 /* Set Normal access mode */
1431 dscr
= (dscr
& ~DSCR_MA
);
1432 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1433 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1435 if (arm
->core_state
== ARM_STATE_AARCH64
) {
1436 /* Write X0 with value 'address' using write procedure */
1437 /* Step 1.a+b - Write the address for read access into DBGDTR_EL0 */
1438 /* Step 1.c - Copy value from DTR to R0 using instruction mrs DBGDTR_EL0, x0 */
1439 retval
= dpm
->instr_write_data_dcc_64(dpm
,
1440 ARMV8_MRS(SYSTEM_DBG_DBGDTR_EL0
, 0), address
& ~0x3ULL
);
1442 /* Write R0 with value 'address' using write procedure */
1443 /* Step 1.a+b - Write the address for read access into DBGDTRRX */
1444 /* Step 1.c - Copy value from DTR to R0 using instruction mrc DBGDTRTXint, r0 */
1445 dpm
->instr_write_data_dcc(dpm
,
1446 ARMV4_5_MRC(14, 0, 0, 0, 5, 0), address
& ~0x3ULL
);
1449 /* Step 1.d - Change DCC to memory mode */
1450 dscr
= dscr
| DSCR_MA
;
1451 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1452 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1453 if (retval
!= ERROR_OK
)
1454 goto error_unset_dtr_w
;
1457 /* Step 2.a - Do the write */
1458 retval
= mem_ap_write_buf_noincr(armv8
->debug_ap
,
1459 tmp_buff
, 4, total_u32
, armv8
->debug_base
+ CPUV8_DBG_DTRRX
);
1460 if (retval
!= ERROR_OK
)
1461 goto error_unset_dtr_w
;
1463 /* Step 3.a - Switch DTR mode back to Normal mode */
1464 dscr
= (dscr
& ~DSCR_MA
);
1465 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1466 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1467 if (retval
!= ERROR_OK
)
1468 goto error_unset_dtr_w
;
1470 /* Check for sticky abort flags in the DSCR */
1471 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1472 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1473 if (retval
!= ERROR_OK
)
1474 goto error_free_buff_w
;
1477 if (dscr
& (DSCR_ERR
| DSCR_SYS_ERROR_PEND
)) {
1478 /* Abort occurred - clear it and exit */
1479 LOG_ERROR("abort occurred - dscr = 0x%08" PRIx32
, dscr
);
1480 armv8_dpm_handle_exception(dpm
);
1481 goto error_free_buff_w
;
1489 /* Unset DTR mode */
1490 mem_ap_read_atomic_u32(armv8
->debug_ap
,
1491 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1492 dscr
= (dscr
& ~DSCR_MA
);
1493 mem_ap_write_atomic_u32(armv8
->debug_ap
,
1494 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1501 static int aarch64_read_apb_ap_memory(struct target
*target
,
1502 target_addr_t address
, uint32_t size
,
1503 uint32_t count
, uint8_t *buffer
)
1505 /* read memory through APB-AP */
1506 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1507 struct armv8_common
*armv8
= target_to_armv8(target
);
1508 struct arm_dpm
*dpm
= &armv8
->dpm
;
1509 struct arm
*arm
= &armv8
->arm
;
1510 int total_bytes
= count
* size
;
1512 int start_byte
= address
& 0x3;
1513 int end_byte
= (address
+ total_bytes
) & 0x3;
1516 uint8_t *tmp_buff
= NULL
;
1520 LOG_DEBUG("Reading APB-AP memory address 0x%" TARGET_PRIxADDR
" size %" PRIu32
" count%" PRIu32
,
1521 address
, size
, count
);
1522 if (target
->state
!= TARGET_HALTED
) {
1523 LOG_WARNING("target not halted");
1524 return ERROR_TARGET_NOT_HALTED
;
1527 total_u32
= DIV_ROUND_UP((address
& 3) + total_bytes
, 4);
1528 /* Mark register X0, X1 as dirty, as it will be used
1529 * for transferring the data.
1530 * It will be restored automatically when exiting
1533 reg
= armv8_reg_current(arm
, 1);
1536 reg
= armv8_reg_current(arm
, 0);
1540 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1541 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1543 /* This algorithm comes from DDI0487A.g, chapter J9.1 */
1545 /* Set Normal access mode */
1546 dscr
= (dscr
& ~DSCR_MA
);
1547 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1548 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1550 if (arm
->core_state
== ARM_STATE_AARCH64
) {
1551 /* Write X0 with value 'address' using write procedure */
1552 /* Step 1.a+b - Write the address for read access into DBGDTR_EL0 */
1553 /* Step 1.c - Copy value from DTR to R0 using instruction mrs DBGDTR_EL0, x0 */
1554 retval
+= dpm
->instr_write_data_dcc_64(dpm
,
1555 ARMV8_MRS(SYSTEM_DBG_DBGDTR_EL0
, 0), address
& ~0x3ULL
);
1556 /* Step 1.d - Dummy operation to ensure EDSCR.Txfull == 1 */
1557 retval
+= dpm
->instr_execute(dpm
, ARMV8_MSR_GP(SYSTEM_DBG_DBGDTR_EL0
, 0));
1558 /* Step 1.e - Change DCC to memory mode */
1559 dscr
= dscr
| DSCR_MA
;
1560 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1561 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1562 /* Step 1.f - read DBGDTRTX and discard the value */
1563 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1564 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &value
);
1566 /* Write R0 with value 'address' using write procedure */
1567 /* Step 1.a+b - Write the address for read access into DBGDTRRXint */
1568 /* Step 1.c - Copy value from DTR to R0 using instruction mrc DBGDTRTXint, r0 */
1569 retval
+= dpm
->instr_write_data_dcc(dpm
,
1570 ARMV4_5_MRC(14, 0, 0, 0, 5, 0), address
& ~0x3ULL
);
1571 /* Step 1.d - Dummy operation to ensure EDSCR.Txfull == 1 */
1572 retval
+= dpm
->instr_execute(dpm
, ARMV4_5_MCR(14, 0, 0, 0, 5, 0));
1573 /* Step 1.e - Change DCC to memory mode */
1574 dscr
= dscr
| DSCR_MA
;
1575 retval
+= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1576 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1577 /* Step 1.f - read DBGDTRTX and discard the value */
1578 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1579 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &value
);
1582 if (retval
!= ERROR_OK
)
1583 goto error_unset_dtr_r
;
1585 /* Optimize the read as much as we can, either way we read in a single pass */
1586 if ((start_byte
) || (end_byte
)) {
1587 /* The algorithm only copies 32 bit words, so the buffer
1588 * should be expanded to include the words at either end.
1589 * The first and last words will be read into a temp buffer
1590 * to avoid corruption
1592 tmp_buff
= malloc(total_u32
* 4);
1594 goto error_unset_dtr_r
;
1596 /* use the tmp buffer to read the entire data */
1597 u8buf_ptr
= tmp_buff
;
1599 /* address and read length are aligned so read directly into the passed buffer */
1602 /* Read the data - Each read of the DTRTX register causes the instruction to be reissued
1603 * Abort flags are sticky, so can be read at end of transactions
1605 * This data is read in aligned to 32 bit boundary.
1608 /* Step 2.a - Loop n-1 times, each read of DBGDTRTX reads the data from [X0] and
1609 * increments X0 by 4. */
1610 retval
= mem_ap_read_buf_noincr(armv8
->debug_ap
, u8buf_ptr
, 4, total_u32
-1,
1611 armv8
->debug_base
+ CPUV8_DBG_DTRTX
);
1612 if (retval
!= ERROR_OK
)
1613 goto error_unset_dtr_r
;
1615 /* Step 3.a - set DTR access mode back to Normal mode */
1616 dscr
= (dscr
& ~DSCR_MA
);
1617 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1618 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1619 if (retval
!= ERROR_OK
)
1620 goto error_free_buff_r
;
1622 /* Step 3.b - read DBGDTRTX for the final value */
1623 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1624 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &value
);
1625 memcpy(u8buf_ptr
+ (total_u32
-1) * 4, &value
, 4);
1627 /* Check for sticky abort flags in the DSCR */
1628 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1629 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1630 if (retval
!= ERROR_OK
)
1631 goto error_free_buff_r
;
1635 if (dscr
& (DSCR_ERR
| DSCR_SYS_ERROR_PEND
)) {
1636 /* Abort occurred - clear it and exit */
1637 LOG_ERROR("abort occurred - dscr = 0x%08" PRIx32
, dscr
);
1638 armv8_dpm_handle_exception(dpm
);
1639 goto error_free_buff_r
;
1642 /* check if we need to copy aligned data by applying any shift necessary */
1644 memcpy(buffer
, tmp_buff
+ start_byte
, total_bytes
);
1652 /* Unset DTR mode */
1653 mem_ap_read_atomic_u32(armv8
->debug_ap
,
1654 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1655 dscr
= (dscr
& ~DSCR_MA
);
1656 mem_ap_write_atomic_u32(armv8
->debug_ap
,
1657 armv8
->debug_base
+ CPUV8_DBG_DSCR
, dscr
);
1664 static int aarch64_read_phys_memory(struct target
*target
,
1665 target_addr_t address
, uint32_t size
,
1666 uint32_t count
, uint8_t *buffer
)
1668 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1669 LOG_DEBUG("Reading memory at real address 0x%" TARGET_PRIxADDR
"; size %" PRId32
"; count %" PRId32
,
1670 address
, size
, count
);
1672 if (count
&& buffer
) {
1673 /* read memory through APB-AP */
1674 retval
= aarch64_mmu_modify(target
, 0);
1675 if (retval
!= ERROR_OK
)
1677 retval
= aarch64_read_apb_ap_memory(target
, address
, size
, count
, buffer
);
1682 static int aarch64_read_memory(struct target
*target
, target_addr_t address
,
1683 uint32_t size
, uint32_t count
, uint8_t *buffer
)
1685 int mmu_enabled
= 0;
1688 /* aarch64 handles unaligned memory access */
1689 LOG_DEBUG("Reading memory at address 0x%" TARGET_PRIxADDR
"; size %" PRId32
"; count %" PRId32
, address
,
1692 /* determine if MMU was enabled on target stop */
1693 retval
= aarch64_mmu(target
, &mmu_enabled
);
1694 if (retval
!= ERROR_OK
)
1698 retval
= aarch64_check_address(target
, address
);
1699 if (retval
!= ERROR_OK
)
1701 /* enable MMU as we could have disabled it for phys access */
1702 retval
= aarch64_mmu_modify(target
, 1);
1703 if (retval
!= ERROR_OK
)
1706 return aarch64_read_apb_ap_memory(target
, address
, size
, count
, buffer
);
1709 static int aarch64_write_phys_memory(struct target
*target
,
1710 target_addr_t address
, uint32_t size
,
1711 uint32_t count
, const uint8_t *buffer
)
1713 int retval
= ERROR_COMMAND_SYNTAX_ERROR
;
1715 LOG_DEBUG("Writing memory to real address 0x%" TARGET_PRIxADDR
"; size %" PRId32
"; count %" PRId32
, address
,
1718 if (count
&& buffer
) {
1719 /* write memory through APB-AP */
1720 retval
= aarch64_mmu_modify(target
, 0);
1721 if (retval
!= ERROR_OK
)
1723 return aarch64_write_apb_ap_memory(target
, address
, size
, count
, buffer
);
1729 static int aarch64_write_memory(struct target
*target
, target_addr_t address
,
1730 uint32_t size
, uint32_t count
, const uint8_t *buffer
)
1732 int mmu_enabled
= 0;
1735 /* aarch64 handles unaligned memory access */
1736 LOG_DEBUG("Writing memory at address 0x%" TARGET_PRIxADDR
"; size %" PRId32
1737 "; count %" PRId32
, address
, size
, count
);
1739 /* determine if MMU was enabled on target stop */
1740 retval
= aarch64_mmu(target
, &mmu_enabled
);
1741 if (retval
!= ERROR_OK
)
1745 retval
= aarch64_check_address(target
, address
);
1746 if (retval
!= ERROR_OK
)
1748 /* enable MMU as we could have disabled it for phys access */
1749 retval
= aarch64_mmu_modify(target
, 1);
1750 if (retval
!= ERROR_OK
)
1753 return aarch64_write_apb_ap_memory(target
, address
, size
, count
, buffer
);
1756 static int aarch64_handle_target_request(void *priv
)
1758 struct target
*target
= priv
;
1759 struct armv8_common
*armv8
= target_to_armv8(target
);
1762 if (!target_was_examined(target
))
1764 if (!target
->dbg_msg_enabled
)
1767 if (target
->state
== TARGET_RUNNING
) {
1770 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1771 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1773 /* check if we have data */
1774 while ((dscr
& DSCR_DTR_TX_FULL
) && (retval
== ERROR_OK
)) {
1775 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1776 armv8
->debug_base
+ CPUV8_DBG_DTRTX
, &request
);
1777 if (retval
== ERROR_OK
) {
1778 target_request(target
, request
);
1779 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1780 armv8
->debug_base
+ CPUV8_DBG_DSCR
, &dscr
);
1788 static int aarch64_examine_first(struct target
*target
)
1790 struct aarch64_common
*aarch64
= target_to_aarch64(target
);
1791 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1792 struct adiv5_dap
*swjdp
= armv8
->arm
.dap
;
1794 int retval
= ERROR_OK
;
1795 uint64_t debug
, ttypr
;
1797 uint32_t tmp0
, tmp1
;
1798 debug
= ttypr
= cpuid
= 0;
1800 /* We do one extra read to ensure DAP is configured,
1801 * we call ahbap_debugport_init(swjdp) instead
1803 retval
= dap_dp_init(swjdp
);
1804 if (retval
!= ERROR_OK
)
1807 /* Search for the APB-AB - it is needed for access to debug registers */
1808 retval
= dap_find_ap(swjdp
, AP_TYPE_APB_AP
, &armv8
->debug_ap
);
1809 if (retval
!= ERROR_OK
) {
1810 LOG_ERROR("Could not find APB-AP for debug access");
1814 retval
= mem_ap_init(armv8
->debug_ap
);
1815 if (retval
!= ERROR_OK
) {
1816 LOG_ERROR("Could not initialize the APB-AP");
1820 armv8
->debug_ap
->memaccess_tck
= 80;
1822 if (!target
->dbgbase_set
) {
1824 /* Get ROM Table base */
1826 int32_t coreidx
= target
->coreid
;
1827 retval
= dap_get_debugbase(armv8
->debug_ap
, &dbgbase
, &apid
);
1828 if (retval
!= ERROR_OK
)
1830 /* Lookup 0x15 -- Processor DAP */
1831 retval
= dap_lookup_cs_component(armv8
->debug_ap
, dbgbase
, 0x15,
1832 &armv8
->debug_base
, &coreidx
);
1833 if (retval
!= ERROR_OK
)
1835 LOG_DEBUG("Detected core %" PRId32
" dbgbase: %08" PRIx32
1836 " apid: %08" PRIx32
, coreidx
, armv8
->debug_base
, apid
);
1838 armv8
->debug_base
= target
->dbgbase
;
1840 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1841 armv8
->debug_base
+ CPUV8_DBG_LOCKACCESS
, 0xC5ACCE55);
1842 if (retval
!= ERROR_OK
) {
1843 LOG_DEBUG("LOCK debug access fail");
1847 retval
= mem_ap_write_atomic_u32(armv8
->debug_ap
,
1848 armv8
->debug_base
+ CPUV8_DBG_OSLAR
, 0);
1849 if (retval
!= ERROR_OK
) {
1850 LOG_DEBUG("Examine %s failed", "oslock");
1854 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1855 armv8
->debug_base
+ CPUV8_DBG_MAINID0
, &cpuid
);
1856 if (retval
!= ERROR_OK
) {
1857 LOG_DEBUG("Examine %s failed", "CPUID");
1861 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1862 armv8
->debug_base
+ CPUV8_DBG_MEMFEATURE0
, &tmp0
);
1863 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1864 armv8
->debug_base
+ CPUV8_DBG_MEMFEATURE0
+ 4, &tmp1
);
1865 if (retval
!= ERROR_OK
) {
1866 LOG_DEBUG("Examine %s failed", "Memory Model Type");
1870 ttypr
= (ttypr
<< 32) | tmp0
;
1872 retval
= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1873 armv8
->debug_base
+ CPUV8_DBG_DBGFEATURE0
, &tmp0
);
1874 retval
+= mem_ap_read_atomic_u32(armv8
->debug_ap
,
1875 armv8
->debug_base
+ CPUV8_DBG_DBGFEATURE0
+ 4, &tmp1
);
1876 if (retval
!= ERROR_OK
) {
1877 LOG_DEBUG("Examine %s failed", "ID_AA64DFR0_EL1");
1881 debug
= (debug
<< 32) | tmp0
;
1883 LOG_DEBUG("cpuid = 0x%08" PRIx32
, cpuid
);
1884 LOG_DEBUG("ttypr = 0x%08" PRIx64
, ttypr
);
1885 LOG_DEBUG("debug = 0x%08" PRIx64
, debug
);
1887 if (target
->ctibase
== 0) {
1888 /* assume a v8 rom table layout */
1889 armv8
->cti_base
= target
->ctibase
= armv8
->debug_base
+ 0x10000;
1890 LOG_INFO("Target ctibase is not set, assuming 0x%0" PRIx32
, target
->ctibase
);
1892 armv8
->cti_base
= target
->ctibase
;
1894 armv8
->arm
.core_type
= ARM_MODE_MON
;
1895 retval
= aarch64_dpm_setup(aarch64
, debug
);
1896 if (retval
!= ERROR_OK
)
1899 /* Setup Breakpoint Register Pairs */
1900 aarch64
->brp_num
= (uint32_t)((debug
>> 12) & 0x0F) + 1;
1901 aarch64
->brp_num_context
= (uint32_t)((debug
>> 28) & 0x0F) + 1;
1902 aarch64
->brp_num_available
= aarch64
->brp_num
;
1903 aarch64
->brp_list
= calloc(aarch64
->brp_num
, sizeof(struct aarch64_brp
));
1904 for (i
= 0; i
< aarch64
->brp_num
; i
++) {
1905 aarch64
->brp_list
[i
].used
= 0;
1906 if (i
< (aarch64
->brp_num
-aarch64
->brp_num_context
))
1907 aarch64
->brp_list
[i
].type
= BRP_NORMAL
;
1909 aarch64
->brp_list
[i
].type
= BRP_CONTEXT
;
1910 aarch64
->brp_list
[i
].value
= 0;
1911 aarch64
->brp_list
[i
].control
= 0;
1912 aarch64
->brp_list
[i
].BRPn
= i
;
1915 LOG_DEBUG("Configured %i hw breakpoints", aarch64
->brp_num
);
1917 target_set_examined(target
);
1921 static int aarch64_examine(struct target
*target
)
1923 int retval
= ERROR_OK
;
1925 /* don't re-probe hardware after each reset */
1926 if (!target_was_examined(target
))
1927 retval
= aarch64_examine_first(target
);
1929 /* Configure core debug access */
1930 if (retval
== ERROR_OK
)
1931 retval
= aarch64_init_debug_access(target
);
1937 * Cortex-A8 target creation and initialization
1940 static int aarch64_init_target(struct command_context
*cmd_ctx
,
1941 struct target
*target
)
1943 /* examine_first() does a bunch of this */
1947 static int aarch64_init_arch_info(struct target
*target
,
1948 struct aarch64_common
*aarch64
, struct jtag_tap
*tap
)
1950 struct armv8_common
*armv8
= &aarch64
->armv8_common
;
1951 struct adiv5_dap
*dap
= armv8
->arm
.dap
;
1953 armv8
->arm
.dap
= dap
;
1955 /* Setup struct aarch64_common */
1956 aarch64
->common_magic
= AARCH64_COMMON_MAGIC
;
1957 /* tap has no dap initialized */
1959 tap
->dap
= dap_init();
1961 /* Leave (only) generic DAP stuff for debugport_init() */
1962 tap
->dap
->tap
= tap
;
1965 armv8
->arm
.dap
= tap
->dap
;
1967 aarch64
->fast_reg_read
= 0;
1969 /* register arch-specific functions */
1970 armv8
->examine_debug_reason
= NULL
;
1972 armv8
->post_debug_entry
= aarch64_post_debug_entry
;
1974 armv8
->pre_restore_context
= NULL
;
1976 armv8
->armv8_mmu
.read_physical_memory
= aarch64_read_phys_memory
;
1978 /* REVISIT v7a setup should be in a v7a-specific routine */
1979 armv8_init_arch_info(target
, armv8
);
1980 target_register_timer_callback(aarch64_handle_target_request
, 1, 1, target
);
1985 static int aarch64_target_create(struct target
*target
, Jim_Interp
*interp
)
1987 struct aarch64_common
*aarch64
= calloc(1, sizeof(struct aarch64_common
));
1989 return aarch64_init_arch_info(target
, aarch64
, target
->tap
);
1992 static int aarch64_mmu(struct target
*target
, int *enabled
)
1994 if (target
->state
!= TARGET_HALTED
) {
1995 LOG_ERROR("%s: target not halted", __func__
);
1996 return ERROR_TARGET_INVALID
;
1999 *enabled
= target_to_aarch64(target
)->armv8_common
.armv8_mmu
.mmu_enabled
;
2003 static int aarch64_virt2phys(struct target
*target
, target_addr_t virt
,
2004 target_addr_t
*phys
)
2006 return armv8_mmu_translate_va_pa(target
, virt
, phys
, 1);
2009 COMMAND_HANDLER(aarch64_handle_cache_info_command
)
2011 struct target
*target
= get_current_target(CMD_CTX
);
2012 struct armv8_common
*armv8
= target_to_armv8(target
);
2014 return armv8_handle_cache_info_command(CMD_CTX
,
2015 &armv8
->armv8_mmu
.armv8_cache
);
2019 COMMAND_HANDLER(aarch64_handle_dbginit_command
)
2021 struct target
*target
= get_current_target(CMD_CTX
);
2022 if (!target_was_examined(target
)) {
2023 LOG_ERROR("target not examined yet");
2027 return aarch64_init_debug_access(target
);
2029 COMMAND_HANDLER(aarch64_handle_smp_off_command
)
2031 struct target
*target
= get_current_target(CMD_CTX
);
2032 /* check target is an smp target */
2033 struct target_list
*head
;
2034 struct target
*curr
;
2035 head
= target
->head
;
2037 if (head
!= (struct target_list
*)NULL
) {
2038 while (head
!= (struct target_list
*)NULL
) {
2039 curr
= head
->target
;
2043 /* fixes the target display to the debugger */
2044 target
->gdb_service
->target
= target
;
2049 COMMAND_HANDLER(aarch64_handle_smp_on_command
)
2051 struct target
*target
= get_current_target(CMD_CTX
);
2052 struct target_list
*head
;
2053 struct target
*curr
;
2054 head
= target
->head
;
2055 if (head
!= (struct target_list
*)NULL
) {
2057 while (head
!= (struct target_list
*)NULL
) {
2058 curr
= head
->target
;
2066 COMMAND_HANDLER(aarch64_handle_smp_gdb_command
)
2068 struct target
*target
= get_current_target(CMD_CTX
);
2069 int retval
= ERROR_OK
;
2070 struct target_list
*head
;
2071 head
= target
->head
;
2072 if (head
!= (struct target_list
*)NULL
) {
2073 if (CMD_ARGC
== 1) {
2075 COMMAND_PARSE_NUMBER(int, CMD_ARGV
[0], coreid
);
2076 if (ERROR_OK
!= retval
)
2078 target
->gdb_service
->core
[1] = coreid
;
2081 command_print(CMD_CTX
, "gdb coreid %" PRId32
" -> %" PRId32
, target
->gdb_service
->core
[0]
2082 , target
->gdb_service
->core
[1]);
2087 static const struct command_registration aarch64_exec_command_handlers
[] = {
2089 .name
= "cache_info",
2090 .handler
= aarch64_handle_cache_info_command
,
2091 .mode
= COMMAND_EXEC
,
2092 .help
= "display information about target caches",
2097 .handler
= aarch64_handle_dbginit_command
,
2098 .mode
= COMMAND_EXEC
,
2099 .help
= "Initialize core debug",
2102 { .name
= "smp_off",
2103 .handler
= aarch64_handle_smp_off_command
,
2104 .mode
= COMMAND_EXEC
,
2105 .help
= "Stop smp handling",
2110 .handler
= aarch64_handle_smp_on_command
,
2111 .mode
= COMMAND_EXEC
,
2112 .help
= "Restart smp handling",
2117 .handler
= aarch64_handle_smp_gdb_command
,
2118 .mode
= COMMAND_EXEC
,
2119 .help
= "display/fix current core played to gdb",
2124 COMMAND_REGISTRATION_DONE
2126 static const struct command_registration aarch64_command_handlers
[] = {
2128 .chain
= arm_command_handlers
,
2131 .chain
= armv8_command_handlers
,
2135 .mode
= COMMAND_ANY
,
2136 .help
= "Cortex-A command group",
2138 .chain
= aarch64_exec_command_handlers
,
2140 COMMAND_REGISTRATION_DONE
2143 struct target_type aarch64_target
= {
2146 .poll
= aarch64_poll
,
2147 .arch_state
= armv8_arch_state
,
2149 .halt
= aarch64_halt
,
2150 .resume
= aarch64_resume
,
2151 .step
= aarch64_step
,
2153 .assert_reset
= aarch64_assert_reset
,
2154 .deassert_reset
= aarch64_deassert_reset
,
2156 /* REVISIT allow exporting VFP3 registers ... */
2157 .get_gdb_reg_list
= armv8_get_gdb_reg_list
,
2159 .read_memory
= aarch64_read_memory
,
2160 .write_memory
= aarch64_write_memory
,
2162 .checksum_memory
= arm_checksum_memory
,
2163 .blank_check_memory
= arm_blank_check_memory
,
2165 .run_algorithm
= armv4_5_run_algorithm
,
2167 .add_breakpoint
= aarch64_add_breakpoint
,
2168 .add_context_breakpoint
= aarch64_add_context_breakpoint
,
2169 .add_hybrid_breakpoint
= aarch64_add_hybrid_breakpoint
,
2170 .remove_breakpoint
= aarch64_remove_breakpoint
,
2171 .add_watchpoint
= NULL
,
2172 .remove_watchpoint
= NULL
,
2174 .commands
= aarch64_command_handlers
,
2175 .target_create
= aarch64_target_create
,
2176 .init_target
= aarch64_init_target
,
2177 .examine
= aarch64_examine
,
2179 .read_phys_memory
= aarch64_read_phys_memory
,
2180 .write_phys_memory
= aarch64_write_phys_memory
,
2182 .virt2phys
= aarch64_virt2phys
,
Linking to existing account procedure
If you already have an account and want to add another login method
you
MUST first sign in with your existing account and
then change URL to read
https://review.openocd.org/login/?link
to get to this page again but this time it'll work for linking. Thank you.
SSH host keys fingerprints
1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=.. |
|+o.. . |
|*.o . . |
|+B . . . |
|Bo. = o S |
|Oo.+ + = |
|oB=.* = . o |
| =+=.+ + E |
|. .=o . o |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)