ARM966: help/usage updates
[openocd.git] / src / target / arm966e.c
1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
4 * *
5 * Copyright (C) 2008 by Spencer Oliver *
6 * spen@spen-soft.co.uk *
7 * *
8 * This program is free software; you can redistribute it and/or modify *
9 * it under the terms of the GNU General Public License as published by *
10 * the Free Software Foundation; either version 2 of the License, or *
11 * (at your option) any later version. *
12 * *
13 * This program is distributed in the hope that it will be useful, *
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
16 * GNU General Public License for more details. *
17 * *
18 * You should have received a copy of the GNU General Public License *
19 * along with this program; if not, write to the *
20 * Free Software Foundation, Inc., *
21 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
22 ***************************************************************************/
23 #ifdef HAVE_CONFIG_H
24 #include "config.h"
25 #endif
26
27 #include "arm966e.h"
28 #include "target_type.h"
29 #include "arm_opcodes.h"
30
31
32 #if 0
33 #define _DEBUG_INSTRUCTION_EXECUTION_
34 #endif
35
36 int arm966e_init_arch_info(struct target *target, struct arm966e_common *arm966e, struct jtag_tap *tap)
37 {
38 struct arm7_9_common *arm7_9 = &arm966e->arm7_9_common;
39
40 /* initialize arm7/arm9 specific info (including armv4_5) */
41 arm9tdmi_init_arch_info(target, arm7_9, tap);
42
43 arm966e->common_magic = ARM966E_COMMON_MAGIC;
44
45 /* The ARM966E-S implements the ARMv5TE architecture which
46 * has the BKPT instruction, so we don't have to use a watchpoint comparator
47 */
48 arm7_9->arm_bkpt = ARMV5_BKPT(0x0);
49 arm7_9->thumb_bkpt = ARMV5_T_BKPT(0x0) & 0xffff;
50
51 return ERROR_OK;
52 }
53
54 static int arm966e_target_create(struct target *target, Jim_Interp *interp)
55 {
56 struct arm966e_common *arm966e = calloc(1,sizeof(struct arm966e_common));
57
58 return arm966e_init_arch_info(target, arm966e, target->tap);
59 }
60
61 static int arm966e_verify_pointer(struct command_context *cmd_ctx,
62 struct arm966e_common *arm966e)
63 {
64 if (arm966e->common_magic != ARM966E_COMMON_MAGIC) {
65 command_print(cmd_ctx, "target is not an ARM966");
66 return ERROR_TARGET_INVALID;
67 }
68 return ERROR_OK;
69 }
70
71 /*
72 * REVISIT: The "read_cp15" and "write_cp15" commands could hook up
73 * to eventual mrc() and mcr() routines ... the reg_addr values being
74 * constructed (for CP15 only) from Opcode_1, Opcode_2, and CRn values.
75 * See section 7.3 of the ARM966E-S TRM.
76 */
77
78 static int arm966e_read_cp15(struct target *target, int reg_addr, uint32_t *value)
79 {
80 int retval = ERROR_OK;
81 struct arm7_9_common *arm7_9 = target_to_arm7_9(target);
82 struct arm_jtag *jtag_info = &arm7_9->jtag_info;
83 struct scan_field fields[3];
84 uint8_t reg_addr_buf = reg_addr & 0x3f;
85 uint8_t nr_w_buf = 0;
86
87 jtag_set_end_state(TAP_IDLE);
88 if ((retval = arm_jtag_scann(jtag_info, 0xf)) != ERROR_OK)
89 {
90 return retval;
91 }
92 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL);
93
94 fields[0].tap = jtag_info->tap;
95 fields[0].num_bits = 32;
96 /* REVISIT: table 7-2 shows that bits 31-31 need to be
97 * specified for accessing BIST registers ...
98 */
99 fields[0].out_value = NULL;
100 fields[0].in_value = NULL;
101
102 fields[1].tap = jtag_info->tap;
103 fields[1].num_bits = 6;
104 fields[1].out_value = &reg_addr_buf;
105 fields[1].in_value = NULL;
106
107 fields[2].tap = jtag_info->tap;
108 fields[2].num_bits = 1;
109 fields[2].out_value = &nr_w_buf;
110 fields[2].in_value = NULL;
111
112 jtag_add_dr_scan(3, fields, jtag_get_end_state());
113
114 fields[1].in_value = (uint8_t *)value;
115
116 jtag_add_dr_scan(3, fields, jtag_get_end_state());
117
118 jtag_add_callback(arm_le_to_h_u32, (jtag_callback_data_t)value);
119
120
121 #ifdef _DEBUG_INSTRUCTION_EXECUTION_
122 if ((retval = jtag_execute_queue()) != ERROR_OK)
123 {
124 return retval;
125 }
126 LOG_DEBUG("addr: 0x%x value: %8.8x", reg_addr, *value);
127 #endif
128
129 return ERROR_OK;
130 }
131
132 // EXPORTED to str9x (flash)
133 int arm966e_write_cp15(struct target *target, int reg_addr, uint32_t value)
134 {
135 int retval = ERROR_OK;
136 struct arm7_9_common *arm7_9 = target_to_arm7_9(target);
137 struct arm_jtag *jtag_info = &arm7_9->jtag_info;
138 struct scan_field fields[3];
139 uint8_t reg_addr_buf = reg_addr & 0x3f;
140 uint8_t nr_w_buf = 1;
141 uint8_t value_buf[4];
142
143 buf_set_u32(value_buf, 0, 32, value);
144
145 jtag_set_end_state(TAP_IDLE);
146 if ((retval = arm_jtag_scann(jtag_info, 0xf)) != ERROR_OK)
147 {
148 return retval;
149 }
150 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL);
151
152 fields[0].tap = jtag_info->tap;
153 fields[0].num_bits = 32;
154 fields[0].out_value = value_buf;
155 fields[0].in_value = NULL;
156
157 fields[1].tap = jtag_info->tap;
158 fields[1].num_bits = 6;
159 fields[1].out_value = &reg_addr_buf;
160 fields[1].in_value = NULL;
161
162 fields[2].tap = jtag_info->tap;
163 fields[2].num_bits = 1;
164 fields[2].out_value = &nr_w_buf;
165 fields[2].in_value = NULL;
166
167 jtag_add_dr_scan(3, fields, jtag_get_end_state());
168
169 #ifdef _DEBUG_INSTRUCTION_EXECUTION_
170 LOG_DEBUG("addr: 0x%x value: %8.8x", reg_addr, value);
171 #endif
172
173 return ERROR_OK;
174 }
175
176 COMMAND_HANDLER(arm966e_handle_cp15_command)
177 {
178 int retval;
179 struct target *target = get_current_target(CMD_CTX);
180 struct arm966e_common *arm966e = target_to_arm966(target);
181
182 retval = arm966e_verify_pointer(CMD_CTX, arm966e);
183 if (retval != ERROR_OK)
184 return retval;
185
186 if (target->state != TARGET_HALTED)
187 {
188 command_print(CMD_CTX, "target must be stopped for \"%s\" command", CMD_NAME);
189 return ERROR_OK;
190 }
191
192 /* one or more argument, access a single register (write if second argument is given */
193 if (CMD_ARGC >= 1)
194 {
195 uint32_t address;
196 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[0], address);
197
198 if (CMD_ARGC == 1)
199 {
200 uint32_t value;
201 if ((retval = arm966e_read_cp15(target, address, &value)) != ERROR_OK)
202 {
203 command_print(CMD_CTX,
204 "couldn't access reg %" PRIi32,
205 address);
206 return ERROR_OK;
207 }
208 if ((retval = jtag_execute_queue()) != ERROR_OK)
209 {
210 return retval;
211 }
212
213 command_print(CMD_CTX, "%" PRIi32 ": %8.8" PRIx32,
214 address, value);
215 }
216 else if (CMD_ARGC == 2)
217 {
218 uint32_t value;
219 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[1], value);
220 if ((retval = arm966e_write_cp15(target, address, value)) != ERROR_OK)
221 {
222 command_print(CMD_CTX,
223 "couldn't access reg %" PRIi32,
224 address);
225 return ERROR_OK;
226 }
227 command_print(CMD_CTX, "%" PRIi32 ": %8.8" PRIx32,
228 address, value);
229 }
230 }
231
232 return ERROR_OK;
233 }
234
235 static const struct command_registration arm966e_exec_command_handlers[] = {
236 {
237 .name = "cp15",
238 .handler = arm966e_handle_cp15_command,
239 .mode = COMMAND_EXEC,
240 .usage = "regnum [value]",
241 .help = "display/modify cp15 register",
242 },
243 COMMAND_REGISTRATION_DONE
244 };
245
246 const struct command_registration arm966e_command_handlers[] = {
247 {
248 .chain = arm9tdmi_command_handlers,
249 },
250 {
251 .name = "arm966e",
252 .mode = COMMAND_ANY,
253 .help = "arm966e command group",
254 .chain = arm966e_exec_command_handlers,
255 },
256 COMMAND_REGISTRATION_DONE
257 };
258
259 /** Holds methods for ARM966 targets. */
260 struct target_type arm966e_target =
261 {
262 .name = "arm966e",
263
264 .poll = arm7_9_poll,
265 .arch_state = arm_arch_state,
266
267 .target_request_data = arm7_9_target_request_data,
268
269 .halt = arm7_9_halt,
270 .resume = arm7_9_resume,
271 .step = arm7_9_step,
272
273 .assert_reset = arm7_9_assert_reset,
274 .deassert_reset = arm7_9_deassert_reset,
275 .soft_reset_halt = arm7_9_soft_reset_halt,
276
277 .get_gdb_reg_list = arm_get_gdb_reg_list,
278
279 .read_memory = arm7_9_read_memory,
280 .write_memory = arm7_9_write_memory,
281 .bulk_write_memory = arm7_9_bulk_write_memory,
282
283 .checksum_memory = arm_checksum_memory,
284 .blank_check_memory = arm_blank_check_memory,
285
286 .run_algorithm = armv4_5_run_algorithm,
287
288 .add_breakpoint = arm7_9_add_breakpoint,
289 .remove_breakpoint = arm7_9_remove_breakpoint,
290 .add_watchpoint = arm7_9_add_watchpoint,
291 .remove_watchpoint = arm7_9_remove_watchpoint,
292
293 .commands = arm966e_command_handlers,
294 .target_create = arm966e_target_create,
295 .init_target = arm9tdmi_init_target,
296 .examine = arm7_9_examine,
297 };

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)