jtag: retire jtag_get/set_end_state()
[openocd.git] / src / target / arm966e.c
1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
4 * *
5 * Copyright (C) 2008 by Spencer Oliver *
6 * spen@spen-soft.co.uk *
7 * *
8 * This program is free software; you can redistribute it and/or modify *
9 * it under the terms of the GNU General Public License as published by *
10 * the Free Software Foundation; either version 2 of the License, or *
11 * (at your option) any later version. *
12 * *
13 * This program is distributed in the hope that it will be useful, *
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
16 * GNU General Public License for more details. *
17 * *
18 * You should have received a copy of the GNU General Public License *
19 * along with this program; if not, write to the *
20 * Free Software Foundation, Inc., *
21 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
22 ***************************************************************************/
23 #ifdef HAVE_CONFIG_H
24 #include "config.h"
25 #endif
26
27 #include "arm966e.h"
28 #include "target_type.h"
29 #include "arm_opcodes.h"
30
31
32 #if 0
33 #define _DEBUG_INSTRUCTION_EXECUTION_
34 #endif
35
36 int arm966e_init_arch_info(struct target *target, struct arm966e_common *arm966e, struct jtag_tap *tap)
37 {
38 struct arm7_9_common *arm7_9 = &arm966e->arm7_9_common;
39
40 /* initialize arm7/arm9 specific info (including armv4_5) */
41 arm9tdmi_init_arch_info(target, arm7_9, tap);
42
43 arm966e->common_magic = ARM966E_COMMON_MAGIC;
44
45 /* The ARM966E-S implements the ARMv5TE architecture which
46 * has the BKPT instruction, so we don't have to use a watchpoint comparator
47 */
48 arm7_9->arm_bkpt = ARMV5_BKPT(0x0);
49 arm7_9->thumb_bkpt = ARMV5_T_BKPT(0x0) & 0xffff;
50
51 return ERROR_OK;
52 }
53
54 static int arm966e_target_create(struct target *target, Jim_Interp *interp)
55 {
56 struct arm966e_common *arm966e = calloc(1,sizeof(struct arm966e_common));
57
58 return arm966e_init_arch_info(target, arm966e, target->tap);
59 }
60
61 static int arm966e_verify_pointer(struct command_context *cmd_ctx,
62 struct arm966e_common *arm966e)
63 {
64 if (arm966e->common_magic != ARM966E_COMMON_MAGIC) {
65 command_print(cmd_ctx, "target is not an ARM966");
66 return ERROR_TARGET_INVALID;
67 }
68 return ERROR_OK;
69 }
70
71 /*
72 * REVISIT: The "read_cp15" and "write_cp15" commands could hook up
73 * to eventual mrc() and mcr() routines ... the reg_addr values being
74 * constructed (for CP15 only) from Opcode_1, Opcode_2, and CRn values.
75 * See section 7.3 of the ARM966E-S TRM.
76 */
77
78 static int arm966e_read_cp15(struct target *target, int reg_addr, uint32_t *value)
79 {
80 int retval = ERROR_OK;
81 struct arm7_9_common *arm7_9 = target_to_arm7_9(target);
82 struct arm_jtag *jtag_info = &arm7_9->jtag_info;
83 struct scan_field fields[3];
84 uint8_t reg_addr_buf = reg_addr & 0x3f;
85 uint8_t nr_w_buf = 0;
86
87 if ((retval = arm_jtag_scann(jtag_info, 0xf, TAP_IDLE)) != ERROR_OK)
88 {
89 return retval;
90 }
91 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL, TAP_IDLE);
92
93 fields[0].num_bits = 32;
94 /* REVISIT: table 7-2 shows that bits 31-31 need to be
95 * specified for accessing BIST registers ...
96 */
97 fields[0].out_value = NULL;
98 fields[0].in_value = NULL;
99
100 fields[1].num_bits = 6;
101 fields[1].out_value = &reg_addr_buf;
102 fields[1].in_value = NULL;
103
104 fields[2].num_bits = 1;
105 fields[2].out_value = &nr_w_buf;
106 fields[2].in_value = NULL;
107
108 jtag_add_dr_scan(jtag_info->tap, 3, fields, TAP_IDLE);
109
110 fields[1].in_value = (uint8_t *)value;
111
112 jtag_add_dr_scan(jtag_info->tap, 3, fields, TAP_IDLE);
113
114 jtag_add_callback(arm_le_to_h_u32, (jtag_callback_data_t)value);
115
116
117 #ifdef _DEBUG_INSTRUCTION_EXECUTION_
118 if ((retval = jtag_execute_queue()) != ERROR_OK)
119 {
120 return retval;
121 }
122 LOG_DEBUG("addr: 0x%x value: %8.8x", reg_addr, *value);
123 #endif
124
125 return ERROR_OK;
126 }
127
128 // EXPORTED to str9x (flash)
129 int arm966e_write_cp15(struct target *target, int reg_addr, uint32_t value)
130 {
131 int retval = ERROR_OK;
132 struct arm7_9_common *arm7_9 = target_to_arm7_9(target);
133 struct arm_jtag *jtag_info = &arm7_9->jtag_info;
134 struct scan_field fields[3];
135 uint8_t reg_addr_buf = reg_addr & 0x3f;
136 uint8_t nr_w_buf = 1;
137 uint8_t value_buf[4];
138
139 buf_set_u32(value_buf, 0, 32, value);
140
141 if ((retval = arm_jtag_scann(jtag_info, 0xf, TAP_IDLE)) != ERROR_OK)
142 {
143 return retval;
144 }
145 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL, TAP_IDLE);
146
147 fields[0].num_bits = 32;
148 fields[0].out_value = value_buf;
149 fields[0].in_value = NULL;
150
151 fields[1].num_bits = 6;
152 fields[1].out_value = &reg_addr_buf;
153 fields[1].in_value = NULL;
154
155 fields[2].num_bits = 1;
156 fields[2].out_value = &nr_w_buf;
157 fields[2].in_value = NULL;
158
159 jtag_add_dr_scan(jtag_info->tap, 3, fields, TAP_IDLE);
160
161 #ifdef _DEBUG_INSTRUCTION_EXECUTION_
162 LOG_DEBUG("addr: 0x%x value: %8.8x", reg_addr, value);
163 #endif
164
165 return ERROR_OK;
166 }
167
168 COMMAND_HANDLER(arm966e_handle_cp15_command)
169 {
170 int retval;
171 struct target *target = get_current_target(CMD_CTX);
172 struct arm966e_common *arm966e = target_to_arm966(target);
173
174 retval = arm966e_verify_pointer(CMD_CTX, arm966e);
175 if (retval != ERROR_OK)
176 return retval;
177
178 if (target->state != TARGET_HALTED)
179 {
180 command_print(CMD_CTX, "target must be stopped for \"%s\" command", CMD_NAME);
181 return ERROR_OK;
182 }
183
184 /* one or more argument, access a single register (write if second argument is given */
185 if (CMD_ARGC >= 1)
186 {
187 uint32_t address;
188 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[0], address);
189
190 if (CMD_ARGC == 1)
191 {
192 uint32_t value;
193 if ((retval = arm966e_read_cp15(target, address, &value)) != ERROR_OK)
194 {
195 command_print(CMD_CTX,
196 "couldn't access reg %" PRIi32,
197 address);
198 return ERROR_OK;
199 }
200 if ((retval = jtag_execute_queue()) != ERROR_OK)
201 {
202 return retval;
203 }
204
205 command_print(CMD_CTX, "%" PRIi32 ": %8.8" PRIx32,
206 address, value);
207 }
208 else if (CMD_ARGC == 2)
209 {
210 uint32_t value;
211 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[1], value);
212 if ((retval = arm966e_write_cp15(target, address, value)) != ERROR_OK)
213 {
214 command_print(CMD_CTX,
215 "couldn't access reg %" PRIi32,
216 address);
217 return ERROR_OK;
218 }
219 command_print(CMD_CTX, "%" PRIi32 ": %8.8" PRIx32,
220 address, value);
221 }
222 }
223
224 return ERROR_OK;
225 }
226
227 static const struct command_registration arm966e_exec_command_handlers[] = {
228 {
229 .name = "cp15",
230 .handler = arm966e_handle_cp15_command,
231 .mode = COMMAND_EXEC,
232 .usage = "regnum [value]",
233 .help = "display/modify cp15 register",
234 },
235 COMMAND_REGISTRATION_DONE
236 };
237
238 const struct command_registration arm966e_command_handlers[] = {
239 {
240 .chain = arm9tdmi_command_handlers,
241 },
242 {
243 .name = "arm966e",
244 .mode = COMMAND_ANY,
245 .help = "arm966e command group",
246 .chain = arm966e_exec_command_handlers,
247 },
248 COMMAND_REGISTRATION_DONE
249 };
250
251 /** Holds methods for ARM966 targets. */
252 struct target_type arm966e_target =
253 {
254 .name = "arm966e",
255
256 .poll = arm7_9_poll,
257 .arch_state = arm_arch_state,
258
259 .target_request_data = arm7_9_target_request_data,
260
261 .halt = arm7_9_halt,
262 .resume = arm7_9_resume,
263 .step = arm7_9_step,
264
265 .assert_reset = arm7_9_assert_reset,
266 .deassert_reset = arm7_9_deassert_reset,
267 .soft_reset_halt = arm7_9_soft_reset_halt,
268
269 .get_gdb_reg_list = arm_get_gdb_reg_list,
270
271 .read_memory = arm7_9_read_memory,
272 .write_memory = arm7_9_write_memory,
273 .bulk_write_memory = arm7_9_bulk_write_memory,
274
275 .checksum_memory = arm_checksum_memory,
276 .blank_check_memory = arm_blank_check_memory,
277
278 .run_algorithm = armv4_5_run_algorithm,
279
280 .add_breakpoint = arm7_9_add_breakpoint,
281 .remove_breakpoint = arm7_9_remove_breakpoint,
282 .add_watchpoint = arm7_9_add_watchpoint,
283 .remove_watchpoint = arm7_9_remove_watchpoint,
284
285 .commands = arm966e_command_handlers,
286 .target_create = arm966e_target_create,
287 .init_target = arm9tdmi_init_target,
288 .examine = arm7_9_examine,
289 .check_reset = arm7_9_check_reset,
290 };

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)