- improved ETB trace output
[openocd.git] / src / target / arm966e.c
1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
4 * *
5 * This program is free software; you can redistribute it and/or modify *
6 * it under the terms of the GNU General Public License as published by *
7 * the Free Software Foundation; either version 2 of the License, or *
8 * (at your option) any later version. *
9 * *
10 * This program is distributed in the hope that it will be useful, *
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
13 * GNU General Public License for more details. *
14 * *
15 * You should have received a copy of the GNU General Public License *
16 * along with this program; if not, write to the *
17 * Free Software Foundation, Inc., *
18 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
19 ***************************************************************************/
20 #ifdef HAVE_CONFIG_H
21 #include "config.h"
22 #endif
23
24 #include "arm966e.h"
25
26 #include "arm7_9_common.h"
27 #include "register.h"
28 #include "target.h"
29 #include "armv4_5.h"
30 #include "embeddedice.h"
31 #include "log.h"
32 #include "jtag.h"
33 #include "arm_jtag.h"
34
35 #include <stdlib.h>
36 #include <string.h>
37
38 #if 0
39 #define _DEBUG_INSTRUCTION_EXECUTION_
40 #endif
41
42 /* cli handling */
43 int arm966e_register_commands(struct command_context_s *cmd_ctx);
44
45 /* forward declarations */
46 int arm966e_deassert_reset(target_t *target);
47 int arm966e_assert_reset(target_t *target);
48 int arm966e_target_command(struct command_context_s *cmd_ctx, char *cmd, char **args, int argc, struct target_s *target);
49 int arm966e_init_target(struct command_context_s *cmd_ctx, struct target_s *target);
50 int arm966e_quit(void);
51
52 target_type_t arm966e_target =
53 {
54 .name = "arm966e",
55
56 .poll = arm7_9_poll,
57 .arch_state = armv4_5_arch_state,
58
59 .halt = arm7_9_halt,
60 .resume = arm7_9_resume,
61 .step = arm7_9_step,
62
63 .assert_reset = arm966e_assert_reset,
64 .deassert_reset = arm966e_deassert_reset,
65 .soft_reset_halt = arm7_9_soft_reset_halt,
66 .prepare_reset_halt = arm7_9_prepare_reset_halt,
67
68 .get_gdb_reg_list = armv4_5_get_gdb_reg_list,
69
70 .read_memory = arm7_9_read_memory,
71 .write_memory = arm7_9_write_memory,
72 .bulk_write_memory = arm7_9_bulk_write_memory,
73
74 .run_algorithm = armv4_5_run_algorithm,
75
76 .add_breakpoint = arm7_9_add_breakpoint,
77 .remove_breakpoint = arm7_9_remove_breakpoint,
78 .add_watchpoint = arm7_9_add_watchpoint,
79 .remove_watchpoint = arm7_9_remove_watchpoint,
80
81 .register_commands = arm966e_register_commands,
82 .target_command = arm966e_target_command,
83 .init_target = arm966e_init_target,
84 .quit = arm966e_quit,
85 };
86
87 int arm966e_assert_reset(target_t *target)
88 {
89 int retval;
90
91 DEBUG("target->state: %s", target_state_strings[target->state]);
92
93 if (target->state == TARGET_HALTED || target->state == TARGET_UNKNOWN)
94 {
95 /* assert SRST and TRST */
96 /* system would get ouf sync if we didn't reset test-logic, too */
97 if ((retval = jtag_add_reset(1, 1)) != ERROR_OK)
98 {
99 if (retval == ERROR_JTAG_RESET_CANT_SRST)
100 {
101 WARNING("can't assert srst");
102 return retval;
103 }
104 else
105 {
106 ERROR("unknown error");
107 exit(-1);
108 }
109 }
110 jtag_add_sleep(5000);
111 if ((retval = jtag_add_reset(0, 1)) != ERROR_OK)
112 {
113 if (retval == ERROR_JTAG_RESET_WOULD_ASSERT_TRST)
114 {
115 WARNING("srst resets test logic, too");
116 retval = jtag_add_reset(1, 1);
117 }
118 }
119 }
120 else
121 {
122 if ((retval = jtag_add_reset(0, 1)) != ERROR_OK)
123 {
124 if (retval == ERROR_JTAG_RESET_WOULD_ASSERT_TRST)
125 {
126 WARNING("srst resets test logic, too");
127 retval = jtag_add_reset(1, 1);
128 }
129
130 if (retval == ERROR_JTAG_RESET_CANT_SRST)
131 {
132 WARNING("can't assert srst");
133 return retval;
134 }
135 else if (retval != ERROR_OK)
136 {
137 ERROR("unknown error");
138 exit(-1);
139 }
140 }
141 }
142
143 target->state = TARGET_RESET;
144 jtag_add_sleep(50000);
145
146 armv4_5_invalidate_core_regs(target);
147
148 return ERROR_OK;
149 }
150
151 int arm966e_deassert_reset(target_t *target)
152 {
153 arm7_9_deassert_reset( target );
154
155 return ERROR_OK;
156 }
157
158 int arm966e_init_target(struct command_context_s *cmd_ctx, struct target_s *target)
159 {
160 arm9tdmi_init_target(cmd_ctx, target);
161
162 return ERROR_OK;
163 }
164
165 int arm966e_quit(void)
166 {
167
168 return ERROR_OK;
169 }
170
171 int arm966e_init_arch_info(target_t *target, arm966e_common_t *arm966e, int chain_pos, char *variant)
172 {
173 arm9tdmi_common_t *arm9tdmi = &arm966e->arm9tdmi_common;
174 arm7_9_common_t *arm7_9 = &arm9tdmi->arm7_9_common;
175
176 arm9tdmi_init_arch_info(target, arm9tdmi, chain_pos, variant);
177
178 arm9tdmi->arch_info = arm966e;
179 arm966e->common_magic = ARM966E_COMMON_MAGIC;
180
181 /* The ARM966E-S implements the ARMv5TE architecture which
182 * has the BKPT instruction, so we don't have to use a watchpoint comparator
183 */
184 arm7_9->arm_bkpt = ARMV5_BKPT(0x0);
185 arm7_9->thumb_bkpt = ARMV5_T_BKPT(0x0) & 0xffff;
186
187 arm7_9->sw_bkpts_use_wp = 0;
188 arm7_9->sw_bkpts_enabled = 1;
189
190 return ERROR_OK;
191 }
192
193 int arm966e_target_command(struct command_context_s *cmd_ctx, char *cmd, char **args, int argc, struct target_s *target)
194 {
195 int chain_pos;
196 char *variant = NULL;
197 arm966e_common_t *arm966e = malloc(sizeof(arm966e_common_t));
198
199 if (argc < 4)
200 {
201 ERROR("'target arm966e' requires at least one additional argument");
202 exit(-1);
203 }
204
205 chain_pos = strtoul(args[3], NULL, 0);
206
207 if (argc >= 5)
208 variant = args[4];
209
210 DEBUG("chain_pos: %i, variant: %s", chain_pos, variant);
211
212 arm966e_init_arch_info(target, arm966e, chain_pos, variant);
213
214 return ERROR_OK;
215 }
216
217 int arm966e_get_arch_pointers(target_t *target, armv4_5_common_t **armv4_5_p, arm7_9_common_t **arm7_9_p, arm9tdmi_common_t **arm9tdmi_p, arm966e_common_t **arm966e_p)
218 {
219 armv4_5_common_t *armv4_5 = target->arch_info;
220 arm7_9_common_t *arm7_9;
221 arm9tdmi_common_t *arm9tdmi;
222 arm966e_common_t *arm966e;
223
224 if (armv4_5->common_magic != ARMV4_5_COMMON_MAGIC)
225 {
226 return -1;
227 }
228
229 arm7_9 = armv4_5->arch_info;
230 if (arm7_9->common_magic != ARM7_9_COMMON_MAGIC)
231 {
232 return -1;
233 }
234
235 arm9tdmi = arm7_9->arch_info;
236 if (arm9tdmi->common_magic != ARM9TDMI_COMMON_MAGIC)
237 {
238 return -1;
239 }
240
241 arm966e = arm9tdmi->arch_info;
242 if (arm966e->common_magic != ARM966E_COMMON_MAGIC)
243 {
244 return -1;
245 }
246
247 *armv4_5_p = armv4_5;
248 *arm7_9_p = arm7_9;
249 *arm9tdmi_p = arm9tdmi;
250 *arm966e_p = arm966e;
251
252 return ERROR_OK;
253 }
254
255 int arm966e_read_cp15(target_t *target, int reg_addr, u32 *value)
256 {
257 armv4_5_common_t *armv4_5 = target->arch_info;
258 arm7_9_common_t *arm7_9 = armv4_5->arch_info;
259 arm_jtag_t *jtag_info = &arm7_9->jtag_info;
260 scan_field_t fields[3];
261 u8 reg_addr_buf = reg_addr & 0x3f;
262 u8 nr_w_buf = 0;
263
264 jtag_add_end_state(TAP_RTI);
265 arm_jtag_scann(jtag_info, 0xf);
266 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL);
267
268 fields[0].device = jtag_info->chain_pos;
269 fields[0].num_bits = 32;
270 fields[0].out_value = NULL;
271 fields[0].out_mask = NULL;
272 fields[0].in_value = NULL;
273 fields[0].in_check_value = NULL;
274 fields[0].in_check_mask = NULL;
275 fields[0].in_handler = NULL;
276 fields[0].in_handler_priv = NULL;
277
278 fields[1].device = jtag_info->chain_pos;
279 fields[1].num_bits = 6;
280 fields[1].out_value = &reg_addr_buf;
281 fields[1].out_mask = NULL;
282 fields[1].in_value = NULL;
283 fields[1].in_check_value = NULL;
284 fields[1].in_check_mask = NULL;
285 fields[1].in_handler = NULL;
286 fields[1].in_handler_priv = NULL;
287
288 fields[2].device = jtag_info->chain_pos;
289 fields[2].num_bits = 1;
290 fields[2].out_value = &nr_w_buf;
291 fields[2].out_mask = NULL;
292 fields[2].in_value = NULL;
293 fields[2].in_check_value = NULL;
294 fields[2].in_check_mask = NULL;
295 fields[2].in_handler = NULL;
296 fields[2].in_handler_priv = NULL;
297
298 jtag_add_dr_scan(3, fields, -1, NULL);
299
300 fields[0].in_value = (u8*)value;
301
302 jtag_add_dr_scan(3, fields, -1, NULL);
303
304 return ERROR_OK;
305 }
306
307 int arm966e_write_cp15(target_t *target, int reg_addr, u32 value)
308 {
309 armv4_5_common_t *armv4_5 = target->arch_info;
310 arm7_9_common_t *arm7_9 = armv4_5->arch_info;
311 arm_jtag_t *jtag_info = &arm7_9->jtag_info;
312 scan_field_t fields[3];
313 u8 reg_addr_buf = reg_addr & 0x3f;
314 u8 nr_w_buf = 1;
315
316 jtag_add_end_state(TAP_RTI);
317 arm_jtag_scann(jtag_info, 0xf);
318 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL);
319
320 fields[0].device = jtag_info->chain_pos;
321 fields[0].num_bits = 32;
322 fields[0].out_value = (u8*)&value;
323 fields[0].out_mask = NULL;
324 fields[0].in_value = NULL;
325 fields[0].in_check_value = NULL;
326 fields[0].in_check_mask = NULL;
327 fields[0].in_handler = NULL;
328 fields[0].in_handler_priv = NULL;
329
330 fields[1].device = jtag_info->chain_pos;
331 fields[1].num_bits = 6;
332 fields[1].out_value = &reg_addr_buf;
333 fields[1].out_mask = NULL;
334 fields[1].in_value = NULL;
335 fields[1].in_check_value = NULL;
336 fields[1].in_check_mask = NULL;
337 fields[1].in_handler = NULL;
338 fields[1].in_handler_priv = NULL;
339
340 fields[2].device = jtag_info->chain_pos;
341 fields[2].num_bits = 1;
342 fields[2].out_value = &nr_w_buf;
343 fields[2].out_mask = NULL;
344 fields[2].in_value = NULL;
345 fields[2].in_check_value = NULL;
346 fields[2].in_check_mask = NULL;
347 fields[2].in_handler = NULL;
348 fields[2].in_handler_priv = NULL;
349
350 jtag_add_dr_scan(3, fields, -1, NULL);
351
352 return ERROR_OK;
353 }
354
355 int arm966e_handle_cp15_command(struct command_context_s *cmd_ctx, char *cmd, char **args, int argc)
356 {
357 int retval;
358 target_t *target = get_current_target(cmd_ctx);
359 armv4_5_common_t *armv4_5;
360 arm7_9_common_t *arm7_9;
361 arm9tdmi_common_t *arm9tdmi;
362 arm966e_common_t *arm966e;
363 arm_jtag_t *jtag_info;
364
365 if (arm966e_get_arch_pointers(target, &armv4_5, &arm7_9, &arm9tdmi, &arm966e) != ERROR_OK)
366 {
367 command_print(cmd_ctx, "current target isn't an ARM966e target");
368 return ERROR_OK;
369 }
370
371 jtag_info = &arm7_9->jtag_info;
372
373 if (target->state != TARGET_HALTED)
374 {
375 command_print(cmd_ctx, "target must be stopped for \"%s\" command", cmd);
376 return ERROR_OK;
377 }
378
379 /* one or more argument, access a single register (write if second argument is given */
380 if (argc >= 1)
381 {
382 int address = strtoul(args[0], NULL, 0);
383
384 if (argc == 1)
385 {
386 u32 value;
387 if ((retval = arm966e_read_cp15(target, address, &value)) != ERROR_OK)
388 {
389 command_print(cmd_ctx, "couldn't access reg %i", address);
390 return ERROR_OK;
391 }
392 jtag_execute_queue();
393
394 command_print(cmd_ctx, "%i: %8.8x", address, value);
395 }
396 else if (argc == 2)
397 {
398 u32 value = strtoul(args[1], NULL, 0);
399 if ((retval = arm966e_write_cp15(target, address, value)) != ERROR_OK)
400 {
401 command_print(cmd_ctx, "couldn't access reg %i", address);
402 return ERROR_OK;
403 }
404 command_print(cmd_ctx, "%i: %8.8x", address, value);
405 }
406 }
407
408 return ERROR_OK;
409 }
410
411 int arm966e_register_commands(struct command_context_s *cmd_ctx)
412 {
413 int retval;
414 command_t *arm966e_cmd;
415
416 retval = arm7_9_register_commands(cmd_ctx);
417 arm966e_cmd = register_command(cmd_ctx, NULL, "arm966e", NULL, COMMAND_ANY, "arm966e specific commands");
418 register_command(cmd_ctx, arm966e_cmd, "cp15", arm966e_handle_cp15_command, COMMAND_EXEC, "display/modify cp15 register <num> [value]");
419
420 return ERROR_OK;
421 }

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)