jtag: linuxgpiod: drop extra parenthesis
[openocd.git] / src / flash / nor / xmc4xxx.c
1 /**************************************************************************
2 * Copyright (C) 2015 Jeff Ciesielski <jeffciesielski@gmail.com> *
3 * *
4 * This program is free software; you can redistribute it and/or modify *
5 * it under the terms of the GNU General Public License as published by *
6 * the Free Software Foundation; either version 2 of the License, or *
7 * (at your option) any later version. *
8 * *
9 * This program is distributed in the hope that it will be useful, *
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
12 * GNU General Public License for more details. *
13 * *
14 * You should have received a copy of the GNU General Public License *
15 * along with this program. If not, see <http://www.gnu.org/licenses/>. *
16 ***************************************************************************/
17
18 #ifdef HAVE_CONFIG_H
19 #include "config.h"
20 #endif
21
22 #include "imp.h"
23 #include <helper/binarybuffer.h>
24 #include <target/algorithm.h>
25 #include <target/armv7m.h>
26
27 /* Maximum number of sectors */
28 #define MAX_XMC_SECTORS 12
29
30 /* System control unit registers */
31 #define SCU_REG_BASE 0x50004000
32
33 #define SCU_ID_CHIP 0x04
34
35 /* Base of the non-cached flash memory */
36 #define PFLASH_BASE 0x0C000000
37
38 /* User configuration block offsets */
39 #define UCB0_BASE 0x00000000
40 #define UCB1_BASE 0x00000400
41 #define UCB2_BASE 0x00000800
42
43 /* Flash register base */
44 #define FLASH_REG_BASE 0x58000000
45
46 /* PMU ID Registers */
47 #define FLASH_REG_PMU_ID (FLASH_REG_BASE | 0x0508)
48
49 /* PMU Fields */
50 #define PMU_MOD_REV_MASK 0xFF
51 #define PMU_MOD_TYPE_MASK 0xFF00
52 #define PMU_MOD_NO_MASK 0xFFFF0000
53
54 /* Prefetch Config */
55 #define FLASH_REG_PREF_PCON (FLASH_REG_BASE | 0x4000)
56
57 /* Prefetch Fields */
58 #define PCON_IBYP (1 << 0)
59 #define PCON_IINV (1 << 1)
60
61 /* Flash ID Register */
62 #define FLASH_REG_FLASH0_ID (FLASH_REG_BASE | 0x2008)
63
64 /* Flash Status Register */
65 #define FLASH_REG_FLASH0_FSR (FLASH_REG_BASE | 0x2010)
66
67 #define FSR_PBUSY (0)
68 #define FSR_FABUSY (1)
69 #define FSR_PROG (4)
70 #define FSR_ERASE (5)
71 #define FSR_PFPAGE (6)
72 #define FSR_PFOPER (8)
73 #define FSR_SQER (10)
74 #define FSR_PROER (11)
75 #define FSR_PFSBER (12)
76 #define FSR_PFDBER (14)
77 #define FSR_PROIN (16)
78 #define FSR_RPROIN (18)
79 #define FSR_RPRODIS (19)
80 #define FSR_WPROIN0 (21)
81 #define FSR_WPROIN1 (22)
82 #define FSR_WPROIN2 (23)
83 #define FSR_WPRODIS0 (25)
84 #define FSR_WPRODIS1 (26)
85 #define FSR_SLM (28)
86 #define FSR_VER (31)
87
88 #define FSR_PBUSY_MASK (0x01 << FSR_PBUSY)
89 #define FSR_FABUSY_MASK (0x01 << FSR_FABUSY)
90 #define FSR_PROG_MASK (0x01 << FSR_PROG)
91 #define FSR_ERASE_MASK (0x01 << FSR_ERASE)
92 #define FSR_PFPAGE_MASK (0x01 << FSR_PFPAGE)
93 #define FSR_PFOPER_MASK (0x01 << FSR_PFOPER)
94 #define FSR_SQER_MASK (0x01 << FSR_SQER)
95 #define FSR_PROER_MASK (0x01 << FSR_PROER)
96 #define FSR_PFSBER_MASK (0x01 << FSR_PFSBER)
97 #define FSR_PFDBER_MASK (0x01 << FSR_PFDBER)
98 #define FSR_PROIN_MASK (0x01 << FSR_PROIN)
99 #define FSR_RPROIN_MASK (0x01 << FSR_RPROIN)
100 #define FSR_RPRODIS_MASK (0x01 << FSR_RPRODIS)
101 #define FSR_WPROIN0_MASK (0x01 << FSR_WPROIN0)
102 #define FSR_WPROIN1_MASK (0x01 << FSR_WPROIN1)
103 #define FSR_WPROIN2_MASK (0x01 << FSR_WPROIN2)
104 #define FSR_WPRODIS0_MASK (0x01 << FSR_WPRODIS0)
105 #define FSR_WPRODIS1_MASK (0x01 << FSR_WPRODIS1)
106 #define FSR_SLM_MASK (0x01 << FSR_SLM)
107 #define FSR_VER_MASK (0x01 << FSR_VER)
108
109 /* Flash Config Register */
110 #define FLASH_REG_FLASH0_FCON (FLASH_REG_BASE | 0x2014)
111
112 #define FCON_WSPFLASH (0)
113 #define FCON_WSECPF (4)
114 #define FCON_IDLE (13)
115 #define FCON_ESLDIS (14)
116 #define FCON_SLEEP (15)
117 #define FCON_RPA (16)
118 #define FCON_DCF (17)
119 #define FCON_DDF (18)
120 #define FCON_VOPERM (24)
121 #define FCON_SQERM (25)
122 #define FCON_PROERM (26)
123 #define FCON_PFSBERM (27)
124 #define FCON_PFDBERM (29)
125 #define FCON_EOBM (31)
126
127 #define FCON_WSPFLASH_MASK (0x0f << FCON_WSPFLASH)
128 #define FCON_WSECPF_MASK (0x01 << FCON_WSECPF)
129 #define FCON_IDLE_MASK (0x01 << FCON_IDLE)
130 #define FCON_ESLDIS_MASK (0x01 << FCON_ESLDIS)
131 #define FCON_SLEEP_MASK (0x01 << FCON_SLEEP)
132 #define FCON_RPA_MASK (0x01 << FCON_RPA)
133 #define FCON_DCF_MASK (0x01 << FCON_DCF)
134 #define FCON_DDF_MASK (0x01 << FCON_DDF)
135 #define FCON_VOPERM_MASK (0x01 << FCON_VOPERM)
136 #define FCON_SQERM_MASK (0x01 << FCON_SQERM)
137 #define FCON_PROERM_MASK (0x01 << FCON_PROERM)
138 #define FCON_PFSBERM_MASK (0x01 << FCON_PFSBERM)
139 #define FCON_PFDBERM_MASK (0x01 << FCON_PFDBERM)
140 #define FCON_EOBM_MASK (0x01 << FCON_EOBM)
141
142 /* Flash Margin Control Register */
143 #define FLASH_REG_FLASH0_MARP (FLASH_REG_BASE | 0x2018)
144
145 #define MARP_MARGIN (0)
146 #define MARP_TRAPDIS (15)
147
148 #define MARP_MARGIN_MASK (0x0f << MARP_MARGIN)
149 #define MARP_TRAPDIS_MASK (0x01 << MARP_TRAPDIS)
150
151 /* Flash Protection Registers */
152 #define FLASH_REG_FLASH0_PROCON0 (FLASH_REG_BASE | 0x2020)
153 #define FLASH_REG_FLASH0_PROCON1 (FLASH_REG_BASE | 0x2024)
154 #define FLASH_REG_FLASH0_PROCON2 (FLASH_REG_BASE | 0x2028)
155
156 #define PROCON_S0L (0)
157 #define PROCON_S1L (1)
158 #define PROCON_S2L (2)
159 #define PROCON_S3L (3)
160 #define PROCON_S4L (4)
161 #define PROCON_S5L (5)
162 #define PROCON_S6L (6)
163 #define PROCON_S7L (7)
164 #define PROCON_S8L (8)
165 #define PROCON_S9L (9)
166 #define PROCON_S10_S11L (10)
167 #define PROCON_RPRO (15)
168
169 #define PROCON_S0L_MASK (0x01 << PROCON_S0L)
170 #define PROCON_S1L_MASK (0x01 << PROCON_S1L)
171 #define PROCON_S2L_MASK (0x01 << PROCON_S2L)
172 #define PROCON_S3L_MASK (0x01 << PROCON_S3L)
173 #define PROCON_S4L_MASK (0x01 << PROCON_S4L)
174 #define PROCON_S5L_MASK (0x01 << PROCON_S5L)
175 #define PROCON_S6L_MASK (0x01 << PROCON_S6L)
176 #define PROCON_S7L_MASK (0x01 << PROCON_S7L)
177 #define PROCON_S8L_MASK (0x01 << PROCON_S8L)
178 #define PROCON_S9L_MASK (0x01 << PROCON_S9L)
179 #define PROCON_S10_S11L_MASK (0x01 << PROCON_S10_S11L)
180 #define PROCON_RPRO_MASK (0x01 << PROCON_RPRO)
181
182 #define FLASH_PROTECT_CONFIRMATION_CODE 0x8AFE15C3
183
184 /* Flash controller configuration values */
185 #define FLASH_ID_XMC4500 0xA2
186 #define FLASH_ID_XMC4300_XMC4700_4800 0x92
187 #define FLASH_ID_XMC4100_4200 0x9C
188 #define FLASH_ID_XMC4400 0x9F
189
190 /* Timeouts */
191 #define FLASH_OP_TIMEOUT 5000
192
193 /* Flash commands (write/erase/protect) are performed using special
194 * command sequences that are written to magic addresses in the flash controller */
195 /* Command sequence addresses. See reference manual, section 8: Flash Command Sequences */
196 #define FLASH_CMD_ERASE_1 0x0C005554
197 #define FLASH_CMD_ERASE_2 0x0C00AAA8
198 #define FLASH_CMD_ERASE_3 FLASH_CMD_ERASE_1
199 #define FLASH_CMD_ERASE_4 FLASH_CMD_ERASE_1
200 #define FLASH_CMD_ERASE_5 FLASH_CMD_ERASE_2
201 /* ERASE_6 is the sector base address */
202
203 #define FLASH_CMD_CLEAR_STATUS FLASH_CMD_ERASE_1
204
205 #define FLASH_CMD_ENTER_PAGEMODE FLASH_CMD_ERASE_1
206
207 #define FLASH_CMD_LOAD_PAGE_1 0x0C0055F0
208 #define FLASH_CMD_LOAD_PAGE_2 0x0C0055F4
209
210 #define FLASH_CMD_WRITE_PAGE_1 FLASH_CMD_ERASE_1
211 #define FLASH_CMD_WRITE_PAGE_2 FLASH_CMD_ERASE_2
212 #define FLASH_CMD_WRITE_PAGE_3 FLASH_CMD_ERASE_1
213 /* WRITE_PAGE_4 is the page base address */
214
215 #define FLASH_CMD_TEMP_UNPROT_1 FLASH_CMD_ERASE_1
216 #define FLASH_CMD_TEMP_UNPROT_2 FLASH_CMD_ERASE_2
217 #define FLASH_CMD_TEMP_UNPROT_3 0x0C00553C
218 #define FLASH_CMD_TEMP_UNPROT_4 FLASH_CMD_ERASE_2
219 #define FLASH_CMD_TEMP_UNPROT_5 FLASH_CMD_ERASE_2
220 #define FLASH_CMD_TEMP_UNPROT_6 0x0C005558
221
222 struct xmc4xxx_flash_bank {
223 bool probed;
224
225 /* We need the flash controller ID to choose the sector layout */
226 uint32_t fcon_id;
227
228 /* Passwords used for protection operations */
229 uint32_t pw1;
230 uint32_t pw2;
231 bool pw_set;
232
233 /* Protection flags */
234 bool read_protected;
235
236 bool write_prot_otp[MAX_XMC_SECTORS];
237 };
238
239 struct xmc4xxx_command_seq {
240 uint32_t address;
241 uint32_t magic;
242 };
243
244 /* Sector capacities. See section 8 of xmc4x00_rm */
245 static const unsigned int sector_capacity_8[8] = {
246 16, 16, 16, 16, 16, 16, 16, 128
247 };
248
249 static const unsigned int sector_capacity_9[9] = {
250 16, 16, 16, 16, 16, 16, 16, 128, 256
251 };
252
253 static const unsigned int sector_capacity_12[12] = {
254 16, 16, 16, 16, 16, 16, 16, 16, 128, 256, 256, 256
255 };
256
257 static const unsigned int sector_capacity_16[16] = {
258 16, 16, 16, 16, 16, 16, 16, 16, 128, 256, 256, 256, 256, 256, 256, 256
259 };
260
261 static int xmc4xxx_write_command_sequence(struct flash_bank *bank,
262 struct xmc4xxx_command_seq *seq,
263 int seq_len)
264 {
265 int res = ERROR_OK;
266
267 for (int i = 0; i < seq_len; i++) {
268 res = target_write_u32(bank->target, seq[i].address,
269 seq[i].magic);
270 if (res != ERROR_OK)
271 return res;
272 }
273
274 return ERROR_OK;
275 }
276
277 static int xmc4xxx_load_bank_layout(struct flash_bank *bank)
278 {
279 const unsigned int *capacity = NULL;
280
281 /* At this point, we know which flash controller ID we're
282 * talking to and simply need to fill out the bank structure accordingly */
283 LOG_DEBUG("%u sectors", bank->num_sectors);
284
285 switch (bank->num_sectors) {
286 case 8:
287 capacity = sector_capacity_8;
288 break;
289 case 9:
290 capacity = sector_capacity_9;
291 break;
292 case 12:
293 capacity = sector_capacity_12;
294 break;
295 case 16:
296 capacity = sector_capacity_16;
297 break;
298 default:
299 LOG_ERROR("Unexpected number of sectors, %u\n",
300 bank->num_sectors);
301 return ERROR_FAIL;
302 }
303
304 /* This looks like a bank that we understand, now we know the
305 * corresponding sector capacities and we can add those up into the
306 * bank size. */
307 uint32_t total_offset = 0;
308 bank->sectors = calloc(bank->num_sectors,
309 sizeof(struct flash_sector));
310 for (unsigned int i = 0; i < bank->num_sectors; i++) {
311 bank->sectors[i].size = capacity[i] * 1024;
312 bank->sectors[i].offset = total_offset;
313 bank->sectors[i].is_erased = -1;
314 bank->sectors[i].is_protected = -1;
315
316 bank->size += bank->sectors[i].size;
317 LOG_DEBUG("\t%d: %uk", i, capacity[i]);
318 total_offset += bank->sectors[i].size;
319 }
320
321 /* This part doesn't follow the typical standard of 0xff
322 * being the erased value.*/
323 bank->default_padded_value = bank->erased_value = 0x00;
324
325 return ERROR_OK;
326 }
327
328 static int xmc4xxx_probe(struct flash_bank *bank)
329 {
330 int res;
331 uint32_t devid, config;
332 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
333 uint8_t flash_id;
334
335 if (fb->probed)
336 return ERROR_OK;
337
338 /* It's not possible for the DAP to access the OTP locations needed for
339 * probing the part info and Flash geometry so we require that the target
340 * be halted before proceeding. */
341 if (bank->target->state != TARGET_HALTED) {
342 LOG_WARNING("Cannot communicate... target not halted.");
343 return ERROR_TARGET_NOT_HALTED;
344 }
345
346 /* The SCU registers contain the ID of the chip */
347 res = target_read_u32(bank->target, SCU_REG_BASE + SCU_ID_CHIP, &devid);
348 if (res != ERROR_OK) {
349 LOG_ERROR("Cannot read device identification register.");
350 return res;
351 }
352
353 /* Make sure this is a XMC4000 family device */
354 if ((devid & 0xF0000) != 0x40000 && devid != 0) {
355 LOG_ERROR("Platform ID doesn't match XMC4xxx: 0x%08" PRIx32, devid);
356 return ERROR_FAIL;
357 }
358
359 LOG_DEBUG("Found XMC4xxx with devid: 0x%08" PRIx32, devid);
360
361 /* Now sanity-check the Flash controller itself. */
362 res = target_read_u32(bank->target, FLASH_REG_FLASH0_ID,
363 &config);
364 if (res != ERROR_OK) {
365 LOG_ERROR("Cannot read Flash bank configuration.");
366 return res;
367 }
368 flash_id = (config & 0xff0000) >> 16;
369
370 /* The Flash configuration register is our only means of
371 * determining the sector layout. We need to make sure that
372 * we understand the type of controller we're dealing with */
373 switch (flash_id) {
374 case FLASH_ID_XMC4100_4200:
375 bank->num_sectors = 8;
376 LOG_DEBUG("XMC4xxx: XMC4100/4200 detected.");
377 break;
378 case FLASH_ID_XMC4400:
379 bank->num_sectors = 9;
380 LOG_DEBUG("XMC4xxx: XMC4400 detected.");
381 break;
382 case FLASH_ID_XMC4500:
383 bank->num_sectors = 12;
384 LOG_DEBUG("XMC4xxx: XMC4500 detected.");
385 break;
386 case FLASH_ID_XMC4300_XMC4700_4800:
387 bank->num_sectors = 16;
388 LOG_DEBUG("XMC4xxx: XMC4700/4800 detected.");
389 break;
390 default:
391 LOG_ERROR("XMC4xxx: Unexpected flash ID. got %02" PRIx8,
392 flash_id);
393 return ERROR_FAIL;
394 }
395
396 /* Retrieve information about the particular bank we're probing and fill in
397 * the bank structure accordingly. */
398 res = xmc4xxx_load_bank_layout(bank);
399 if (res == ERROR_OK) {
400 /* We're done */
401 fb->probed = true;
402 } else {
403 LOG_ERROR("Unable to load bank information.");
404 return ERROR_FAIL;
405 }
406
407 return ERROR_OK;
408 }
409
410 static int xmc4xxx_get_sector_start_addr(struct flash_bank *bank,
411 unsigned int sector, uint32_t *ret_addr)
412 {
413 /* Make sure we understand this sector */
414 if (sector > bank->num_sectors)
415 return ERROR_FAIL;
416
417 *ret_addr = bank->base + bank->sectors[sector].offset;
418
419 return ERROR_OK;
420
421 }
422
423 static int xmc4xxx_clear_flash_status(struct flash_bank *bank)
424 {
425 int res;
426 /* TODO: Do we need to check for sequence error? */
427 LOG_INFO("Clearing flash status");
428 res = target_write_u32(bank->target, FLASH_CMD_CLEAR_STATUS,
429 0xF5);
430 if (res != ERROR_OK) {
431 LOG_ERROR("Unable to write erase command sequence");
432 return res;
433 }
434
435 return ERROR_OK;
436 }
437
438 static int xmc4xxx_get_flash_status(struct flash_bank *bank, uint32_t *status)
439 {
440 int res;
441
442 res = target_read_u32(bank->target, FLASH_REG_FLASH0_FSR, status);
443
444 if (res != ERROR_OK)
445 LOG_ERROR("Cannot read flash status register.");
446
447 return res;
448 }
449
450 static int xmc4xxx_wait_status_busy(struct flash_bank *bank, int timeout)
451 {
452 int res;
453 uint32_t status;
454
455 res = xmc4xxx_get_flash_status(bank, &status);
456 if (res != ERROR_OK)
457 return res;
458
459 /* While the flash controller is busy, wait */
460 while (status & FSR_PBUSY_MASK) {
461 res = xmc4xxx_get_flash_status(bank, &status);
462 if (res != ERROR_OK)
463 return res;
464
465 if (timeout-- <= 0) {
466 LOG_ERROR("Timed out waiting for flash");
467 return ERROR_FAIL;
468 }
469 alive_sleep(1);
470 keep_alive();
471 }
472
473 if (status & FSR_PROER_MASK) {
474 LOG_ERROR("XMC4xxx flash protected");
475 res = ERROR_FAIL;
476 }
477
478 return res;
479 }
480
481 static int xmc4xxx_erase_sector(struct flash_bank *bank, uint32_t address,
482 bool user_config)
483 {
484 int res;
485 uint32_t status;
486
487 /* See reference manual table 8.4: Command Sequences for Flash Control */
488 struct xmc4xxx_command_seq erase_cmd_seq[6] = {
489 {FLASH_CMD_ERASE_1, 0xAA},
490 {FLASH_CMD_ERASE_2, 0x55},
491 {FLASH_CMD_ERASE_3, 0x80},
492 {FLASH_CMD_ERASE_4, 0xAA},
493 {FLASH_CMD_ERASE_5, 0x55},
494 {0xFF, 0xFF} /* Needs filled in */
495 };
496
497 /* We need to fill in the base address of the sector we'll be
498 * erasing, as well as the magic code that determines whether
499 * this is a standard flash sector or a user configuration block */
500
501 erase_cmd_seq[5].address = address;
502 if (user_config) {
503 /* Removing flash protection requires the addition of
504 * the base address */
505 erase_cmd_seq[5].address += bank->base;
506 erase_cmd_seq[5].magic = 0xC0;
507 } else {
508 erase_cmd_seq[5].magic = 0x30;
509 }
510
511 res = xmc4xxx_write_command_sequence(bank, erase_cmd_seq,
512 ARRAY_SIZE(erase_cmd_seq));
513 if (res != ERROR_OK)
514 return res;
515
516 /* Read the flash status register */
517 res = target_read_u32(bank->target, FLASH_REG_FLASH0_FSR, &status);
518 if (res != ERROR_OK) {
519 LOG_ERROR("Cannot read flash status register.");
520 return res;
521 }
522
523 /* Check for a sequence error */
524 if (status & FSR_SQER_MASK) {
525 LOG_ERROR("Error with flash erase sequence");
526 return ERROR_FAIL;
527 }
528
529 /* Make sure a flash erase was triggered */
530 if (!(status & FSR_ERASE_MASK)) {
531 LOG_ERROR("Flash failed to erase");
532 return ERROR_FAIL;
533 }
534
535 /* Now we must wait for the erase operation to end */
536 res = xmc4xxx_wait_status_busy(bank, FLASH_OP_TIMEOUT);
537
538 return res;
539 }
540
541 static int xmc4xxx_erase(struct flash_bank *bank, unsigned int first,
542 unsigned int last)
543 {
544 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
545 int res;
546
547 if (bank->target->state != TARGET_HALTED) {
548 LOG_ERROR("Unable to erase, target is not halted");
549 return ERROR_TARGET_NOT_HALTED;
550 }
551
552 if (!fb->probed) {
553 res = xmc4xxx_probe(bank);
554 if (res != ERROR_OK)
555 return res;
556 }
557
558 uint32_t tmp_addr;
559 /* Loop through the sectors and erase each one */
560 for (unsigned int i = first; i <= last; i++) {
561 res = xmc4xxx_get_sector_start_addr(bank, i, &tmp_addr);
562 if (res != ERROR_OK) {
563 LOG_ERROR("Invalid sector %u", i);
564 return res;
565 }
566
567 LOG_DEBUG("Erasing sector %u @ 0x%08"PRIx32, i, tmp_addr);
568
569 res = xmc4xxx_erase_sector(bank, tmp_addr, false);
570 if (res != ERROR_OK) {
571 LOG_ERROR("Unable to write erase command sequence");
572 goto clear_status_and_exit;
573 }
574
575 /* Now we must wait for the erase operation to end */
576 res = xmc4xxx_wait_status_busy(bank, FLASH_OP_TIMEOUT);
577
578 if (res != ERROR_OK)
579 goto clear_status_and_exit;
580 }
581
582 clear_status_and_exit:
583 res = xmc4xxx_clear_flash_status(bank);
584 return res;
585
586 }
587
588 static int xmc4xxx_enter_page_mode(struct flash_bank *bank)
589 {
590 int res;
591 uint32_t status;
592
593 res = target_write_u32(bank->target, FLASH_CMD_ENTER_PAGEMODE, 0x50);
594 if (res != ERROR_OK) {
595 LOG_ERROR("Unable to write enter page mode command");
596 return ERROR_FAIL;
597 }
598
599 res = xmc4xxx_get_flash_status(bank, &status);
600
601 if (res != ERROR_OK)
602 return res;
603
604 /* Make sure we're in page mode */
605 if (!(status & FSR_PFPAGE_MASK)) {
606 LOG_ERROR("Unable to enter page mode");
607 return ERROR_FAIL;
608 }
609
610 /* Make sure we didn't encounter a sequence error */
611 if (status & FSR_SQER_MASK) {
612 LOG_ERROR("Sequence error while entering page mode");
613 return ERROR_FAIL;
614 }
615
616 return res;
617 }
618
619 static int xmc4xxx_write_page(struct flash_bank *bank, const uint8_t *pg_buf,
620 uint32_t offset, bool user_config)
621 {
622 int res;
623 uint32_t status;
624
625 /* Base of the flash write command */
626 struct xmc4xxx_command_seq write_cmd_seq[4] = {
627 {FLASH_CMD_WRITE_PAGE_1, 0xAA},
628 {FLASH_CMD_WRITE_PAGE_2, 0x55},
629 {FLASH_CMD_WRITE_PAGE_3, 0xFF}, /* Needs filled in */
630 {0xFF, 0xFF} /* Needs filled in */
631 };
632
633 /* The command sequence differs depending on whether this is
634 * being written to standard flash or the user configuration
635 * area */
636 if (user_config)
637 write_cmd_seq[2].magic = 0xC0;
638 else
639 write_cmd_seq[2].magic = 0xA0;
640
641 /* Finally, we need to add the address that this page will be
642 * written to */
643 write_cmd_seq[3].address = bank->base + offset;
644 write_cmd_seq[3].magic = 0xAA;
645
646
647 /* Flash pages are written 256 bytes at a time. For each 256
648 * byte chunk, we need to:
649 * 1. Enter page mode. This activates the flash write buffer
650 * 2. Load the page buffer with data (2x 32 bit words at a time)
651 * 3. Burn the page buffer into its intended location
652 * If the starting offset is not on a 256 byte boundary, we
653 * will need to pad the beginning of the write buffer
654 * accordingly. Likewise, if the last page does not fill the
655 * buffer, we should pad it to avoid leftover data from being
656 * written to flash
657 */
658 res = xmc4xxx_enter_page_mode(bank);
659 if (res != ERROR_OK)
660 return res;
661
662 /* Copy the data into the page buffer*/
663 for (int i = 0; i < 256; i += 8) {
664 uint32_t w_lo = target_buffer_get_u32(bank->target, &pg_buf[i]);
665 uint32_t w_hi = target_buffer_get_u32(bank->target, &pg_buf[i + 4]);
666 LOG_DEBUG("WLO: %08"PRIx32, w_lo);
667 LOG_DEBUG("WHI: %08"PRIx32, w_hi);
668
669 /* Data is loaded 2x 32 bit words at a time */
670 res = target_write_u32(bank->target, FLASH_CMD_LOAD_PAGE_1, w_lo);
671 if (res != ERROR_OK)
672 return res;
673
674 res = target_write_u32(bank->target, FLASH_CMD_LOAD_PAGE_2, w_hi);
675 if (res != ERROR_OK)
676 return res;
677
678 /* Check for an error */
679 res = xmc4xxx_get_flash_status(bank, &status);
680 if (res != ERROR_OK)
681 return res;
682
683 if (status & FSR_SQER_MASK) {
684 LOG_ERROR("Error loading page buffer");
685 return ERROR_FAIL;
686 }
687 }
688
689 /* The page buffer is now full, time to commit it to flash */
690
691 res = xmc4xxx_write_command_sequence(bank, write_cmd_seq, ARRAY_SIZE(write_cmd_seq));
692 if (res != ERROR_OK) {
693 LOG_ERROR("Unable to enter write command sequence");
694 return res;
695 }
696
697 /* Read the flash status register */
698 res = xmc4xxx_get_flash_status(bank, &status);
699 if (res != ERROR_OK)
700 return res;
701
702 /* Check for a sequence error */
703 if (status & FSR_SQER_MASK) {
704 LOG_ERROR("Error with flash write sequence");
705 return ERROR_FAIL;
706 }
707
708 /* Make sure a flash write was triggered */
709 if (!(status & FSR_PROG_MASK)) {
710 LOG_ERROR("Failed to write flash page");
711 return ERROR_FAIL;
712 }
713
714 /* Wait for the write operation to end */
715 res = xmc4xxx_wait_status_busy(bank, FLASH_OP_TIMEOUT);
716 if (res != ERROR_OK)
717 return res;
718
719 /* TODO: Verify that page was written without error */
720 return res;
721 }
722
723 static int xmc4xxx_write(struct flash_bank *bank, const uint8_t *buffer,
724 uint32_t offset, uint32_t count)
725 {
726 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
727 int res = ERROR_OK;
728
729 if (bank->target->state != TARGET_HALTED) {
730 LOG_ERROR("Unable to erase, target is not halted");
731 return ERROR_TARGET_NOT_HALTED;
732 }
733
734 if (!fb->probed) {
735 res = xmc4xxx_probe(bank);
736 if (res != ERROR_OK)
737 return res;
738 }
739
740 /* Make sure we won't run off the end of the flash bank */
741 if ((offset + count) > (bank->size)) {
742 LOG_ERROR("Attempting to write past the end of flash");
743 return ERROR_FAIL;
744 }
745
746
747 /* Attempt to write the passed in buffer to flash */
748 /* Pages are written 256 bytes at a time, we need to handle
749 * scenarios where padding is required at the beginning and
750 * end of a page */
751 while (count) {
752 /* page working area */
753 uint8_t tmp_buf[256] = {0};
754
755 /* Amount of data we'll be writing to this page */
756 int remaining;
757 int end_pad;
758
759 remaining = MIN(count, sizeof(tmp_buf));
760 end_pad = sizeof(tmp_buf) - remaining;
761
762 /* Make sure we're starting on a page boundary */
763 int start_pad = offset % 256;
764 if (start_pad) {
765 LOG_INFO("Write does not start on a 256 byte boundary. "
766 "Padding by %d bytes", start_pad);
767 memset(tmp_buf, 0xff, start_pad);
768 /* Subtract the amount of start offset from
769 * the amount of data we'll need to write */
770 remaining -= start_pad;
771 }
772
773 /* Remove the amount we'll be writing from the total count */
774 count -= remaining;
775
776 /* Now copy in the remaining data */
777 memcpy(&tmp_buf[start_pad], buffer, remaining);
778
779 if (end_pad) {
780 LOG_INFO("Padding end of page @" TARGET_ADDR_FMT " by %d bytes",
781 bank->base + offset, end_pad);
782 memset(&tmp_buf[256 - end_pad], 0xff, end_pad);
783 }
784
785 /* Now commit this page to flash, if there was start
786 * padding, we should subtract that from the target offset */
787 res = xmc4xxx_write_page(bank, tmp_buf, (offset - start_pad), false);
788 if (res != ERROR_OK) {
789 LOG_ERROR("Unable to write flash page");
790 goto abort_write_and_exit;
791 }
792
793 /* Advance the buffer pointer */
794 buffer += remaining;
795
796 /* Advance the offset */
797 offset += remaining;
798 }
799
800 abort_write_and_exit:
801 xmc4xxx_clear_flash_status(bank);
802 return res;
803
804 }
805
806 static int xmc4xxx_get_info_command(struct flash_bank *bank, struct command_invocation *cmd)
807 {
808 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
809 uint32_t scu_idcode;
810
811 if (bank->target->state != TARGET_HALTED) {
812 LOG_WARNING("Cannot communicate... target not halted.");
813 return ERROR_TARGET_NOT_HALTED;
814 }
815
816 /* The SCU registers contain the ID of the chip */
817 int res = target_read_u32(bank->target, SCU_REG_BASE + SCU_ID_CHIP, &scu_idcode);
818 if (res != ERROR_OK) {
819 LOG_ERROR("Cannot read device identification register.");
820 return res;
821 }
822
823 uint16_t dev_id = (scu_idcode & 0xfff0) >> 4;
824 uint16_t rev_id = scu_idcode & 0xf;
825 const char *dev_str;
826 const char *rev_str = NULL;
827
828 switch (dev_id) {
829 case 0x100:
830 dev_str = "XMC4100";
831
832 switch (rev_id) {
833 case 0x1:
834 rev_str = "AA";
835 break;
836 case 0x2:
837 rev_str = "AB";
838 break;
839 }
840 break;
841 case 0x200:
842 dev_str = "XMC4200";
843
844 switch (rev_id) {
845 case 0x1:
846 rev_str = "AA";
847 break;
848 case 0x2:
849 rev_str = "AB";
850 break;
851 }
852 break;
853 case 0x300:
854 dev_str = "XMC4300";
855
856 switch (rev_id) {
857 case 0x1:
858 rev_str = "AA";
859 }
860 break;
861 case 0x400:
862 dev_str = "XMC4400";
863
864 switch (rev_id) {
865 case 0x1:
866 rev_str = "AA";
867 break;
868 case 0x2:
869 rev_str = "AB";
870 break;
871 }
872 break;
873 case 0:
874 /* XMC4500 EES AA13 with date codes before GE212
875 * had zero SCU_IDCHIP
876 */
877 dev_str = "XMC4500 EES";
878 rev_str = "AA13";
879 break;
880 case 0x500:
881 dev_str = "XMC4500";
882
883 switch (rev_id) {
884 case 0x2:
885 rev_str = "AA";
886 break;
887 case 0x3:
888 rev_str = "AB";
889 break;
890 case 0x4:
891 rev_str = "AC";
892 break;
893 }
894 break;
895 case 0x700:
896 dev_str = "XMC4700";
897
898 switch (rev_id) {
899 case 0x1:
900 rev_str = "EES-AA";
901 break;
902 }
903 break;
904 case 0x800:
905 dev_str = "XMC4800";
906
907 switch (rev_id) {
908 case 0x1:
909 rev_str = "EES-AA";
910 break;
911 }
912 break;
913
914 default:
915 command_print_sameline(cmd, "Cannot identify target as an XMC4xxx. SCU_ID: %"PRIx32 "\n", scu_idcode);
916 return ERROR_OK;
917 }
918
919 /* String to declare protection data held in the private driver */
920 char prot_str[512] = {0};
921 if (fb->read_protected)
922 snprintf(prot_str, sizeof(prot_str), "\nFlash is read protected");
923
924 bool otp_enabled = false;
925 for (unsigned int i = 0; i < bank->num_sectors; i++)
926 if (fb->write_prot_otp[i])
927 otp_enabled = true;
928
929 /* If OTP Write protection is enabled (User 2), list each
930 * sector that has it enabled */
931 char otp_str[14];
932 if (otp_enabled) {
933 strcat(prot_str, "\nOTP Protection is enabled for sectors:\n");
934 for (unsigned int i = 0; i < bank->num_sectors; i++) {
935 if (fb->write_prot_otp[i]) {
936 snprintf(otp_str, sizeof(otp_str), "- %d\n", i);
937 strncat(prot_str, otp_str, sizeof(prot_str) - strlen(prot_str) - 1);
938 }
939 }
940 }
941
942 if (rev_str)
943 command_print_sameline(cmd, "%s - Rev: %s%s", dev_str, rev_str, prot_str);
944 else
945 command_print_sameline(cmd, "%s - Rev: unknown (0x%01x)%s", dev_str, rev_id, prot_str);
946
947 return ERROR_OK;
948 }
949
950 static int xmc4xxx_temp_unprotect(struct flash_bank *bank, int user_level)
951 {
952 struct xmc4xxx_flash_bank *fb;
953 int res = ERROR_OK;
954 uint32_t status = 0;
955
956 struct xmc4xxx_command_seq temp_unprot_seq[6] = {
957 {FLASH_CMD_TEMP_UNPROT_1, 0xAA},
958 {FLASH_CMD_TEMP_UNPROT_2, 0x55},
959 {FLASH_CMD_TEMP_UNPROT_3, 0xFF}, /* Needs filled in */
960 {FLASH_CMD_TEMP_UNPROT_4, 0xFF}, /* Needs filled in */
961 {FLASH_CMD_TEMP_UNPROT_5, 0xFF}, /* Needs filled in */
962 {FLASH_CMD_TEMP_UNPROT_6, 0x05}
963 };
964
965 if (user_level < 0 || user_level > 2) {
966 LOG_ERROR("Invalid user level, must be 0-2");
967 return ERROR_FAIL;
968 }
969
970 fb = bank->driver_priv;
971
972 /* Fill in the user level and passwords */
973 temp_unprot_seq[2].magic = user_level;
974 temp_unprot_seq[3].magic = fb->pw1;
975 temp_unprot_seq[4].magic = fb->pw2;
976
977 res = xmc4xxx_write_command_sequence(bank, temp_unprot_seq,
978 ARRAY_SIZE(temp_unprot_seq));
979 if (res != ERROR_OK) {
980 LOG_ERROR("Unable to write temp unprotect sequence");
981 return res;
982 }
983
984 res = xmc4xxx_get_flash_status(bank, &status);
985 if (res != ERROR_OK)
986 return res;
987
988 if (status & FSR_WPRODIS0) {
989 LOG_INFO("Flash is temporarily unprotected");
990 } else {
991 LOG_INFO("Unable to disable flash protection");
992 res = ERROR_FAIL;
993 }
994
995
996 return res;
997 }
998
999 static int xmc4xxx_flash_unprotect(struct flash_bank *bank, int32_t level)
1000 {
1001 uint32_t addr;
1002 int res;
1003
1004 switch (level) {
1005 case 0:
1006 addr = UCB0_BASE;
1007 break;
1008 case 1:
1009 addr = UCB1_BASE;
1010 break;
1011 default:
1012 LOG_ERROR("Invalid user level. Must be 0-1");
1013 return ERROR_FAIL;
1014 }
1015
1016 res = xmc4xxx_erase_sector(bank, addr, true);
1017
1018 if (res != ERROR_OK)
1019 LOG_ERROR("Error erasing user configuration block");
1020
1021 return res;
1022 }
1023
1024 /* Reference: "XMC4500 Flash Protection.pptx" app note */
1025 static int xmc4xxx_flash_protect(struct flash_bank *bank, int level, bool read_protect,
1026 unsigned int first, unsigned int last)
1027 {
1028 /* User configuration block buffers */
1029 uint8_t ucp0_buf[8 * sizeof(uint32_t)] = {0};
1030 uint32_t ucb_base = 0;
1031 uint32_t procon = 0;
1032 int res = ERROR_OK;
1033 uint32_t status = 0;
1034 bool proin = false;
1035
1036 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
1037
1038 /* Read protect only works for user 0, make sure we don't try
1039 * to do something silly */
1040 if (level != 0 && read_protect) {
1041 LOG_ERROR("Read protection is for user level 0 only!");
1042 return ERROR_FAIL;
1043 }
1044
1045 /* Check to see if protection is already installed for the
1046 * specified user level. If it is, the user configuration
1047 * block will need to be erased before we can continue */
1048
1049 /* Grab the flash status register*/
1050 res = xmc4xxx_get_flash_status(bank, &status);
1051 if (res != ERROR_OK)
1052 return res;
1053
1054 switch (level) {
1055 case 0:
1056 if ((status & FSR_RPROIN_MASK) || (status & FSR_WPROIN0_MASK))
1057 proin = true;
1058 break;
1059 case 1:
1060 if (status & FSR_WPROIN1_MASK)
1061 proin = true;
1062 break;
1063 case 2:
1064 if (status & FSR_WPROIN2_MASK)
1065 proin = true;
1066 break;
1067 }
1068
1069 if (proin) {
1070 LOG_ERROR("Flash protection is installed for user %d"
1071 " and must be removed before continuing", level);
1072 return ERROR_FAIL;
1073 }
1074
1075 /* If this device has 12 flash sectors, protection for
1076 * sectors 10 & 11 are handled jointly. If we are trying to
1077 * write all sectors, we should decrement
1078 * last to ensure we don't write to a register bit that
1079 * doesn't exist*/
1080 if ((bank->num_sectors == 12) && (last == 12))
1081 last--;
1082
1083 /* We need to fill out the procon register representation
1084 * that we will be writing to the device */
1085 for (unsigned int i = first; i <= last; i++)
1086 procon |= 1 << i;
1087
1088 /* If read protection is requested, set the appropriate bit
1089 * (we checked that this is allowed above) */
1090 if (read_protect)
1091 procon |= PROCON_RPRO_MASK;
1092
1093 LOG_DEBUG("Setting flash protection with procon:");
1094 LOG_DEBUG("PROCON: %"PRIx32, procon);
1095
1096 /* First we need to copy in the procon register to the buffer
1097 * we're going to attempt to write. This is written twice */
1098 target_buffer_set_u32(bank->target, &ucp0_buf[0 * 4], procon);
1099 target_buffer_set_u32(bank->target, &ucp0_buf[2 * 4], procon);
1100
1101 /* Now we must copy in both flash passwords. As with the
1102 * procon data, this must be written twice (4 total words
1103 * worth of data) */
1104 target_buffer_set_u32(bank->target, &ucp0_buf[4 * 4], fb->pw1);
1105 target_buffer_set_u32(bank->target, &ucp0_buf[5 * 4], fb->pw2);
1106 target_buffer_set_u32(bank->target, &ucp0_buf[6 * 4], fb->pw1);
1107 target_buffer_set_u32(bank->target, &ucp0_buf[7 * 4], fb->pw2);
1108
1109 /* Finally, (if requested) we copy in the confirmation
1110 * code so that the protection is permanent and will
1111 * require a password to undo. */
1112 target_buffer_set_u32(bank->target, &ucp0_buf[0 * 4], FLASH_PROTECT_CONFIRMATION_CODE);
1113 target_buffer_set_u32(bank->target, &ucp0_buf[2 * 4], FLASH_PROTECT_CONFIRMATION_CODE);
1114
1115 /* Now that the data is copied into place, we must write
1116 * these pages into flash */
1117
1118 /* The user configuration block base depends on what level of
1119 * protection we're trying to install, select the proper one */
1120 switch (level) {
1121 case 0:
1122 ucb_base = UCB0_BASE;
1123 break;
1124 case 1:
1125 ucb_base = UCB1_BASE;
1126 break;
1127 case 2:
1128 ucb_base = UCB2_BASE;
1129 break;
1130 }
1131
1132 /* Write the user config pages */
1133 res = xmc4xxx_write_page(bank, ucp0_buf, ucb_base, true);
1134 if (res != ERROR_OK) {
1135 LOG_ERROR("Error writing user configuration block 0");
1136 return res;
1137 }
1138
1139 return ERROR_OK;
1140 }
1141
1142 static int xmc4xxx_protect(struct flash_bank *bank, int set, unsigned int first,
1143 unsigned int last)
1144 {
1145 int ret;
1146 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
1147
1148 /* Check for flash passwords */
1149 if (!fb->pw_set) {
1150 LOG_ERROR("Flash passwords not set, use xmc4xxx flash_password to set them");
1151 return ERROR_FAIL;
1152 }
1153
1154 /* We want to clear flash protection temporarily*/
1155 if (set == 0) {
1156 LOG_WARNING("Flash protection will be temporarily disabled"
1157 " for all pages (User 0 only)!");
1158 ret = xmc4xxx_temp_unprotect(bank, 0);
1159 return ret;
1160 }
1161
1162 /* Install write protection for user 0 on the specified pages */
1163 ret = xmc4xxx_flash_protect(bank, 0, false, first, last);
1164
1165 return ret;
1166 }
1167
1168 static int xmc4xxx_protect_check(struct flash_bank *bank)
1169 {
1170 int ret;
1171 uint32_t protection[3] = {0};
1172 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
1173
1174 ret = target_read_u32(bank->target, FLASH_REG_FLASH0_PROCON0, &protection[0]);
1175 if (ret != ERROR_OK) {
1176 LOG_ERROR("Unable to read flash User0 protection register");
1177 return ret;
1178 }
1179
1180 ret = target_read_u32(bank->target, FLASH_REG_FLASH0_PROCON1, &protection[1]);
1181 if (ret != ERROR_OK) {
1182 LOG_ERROR("Unable to read flash User1 protection register");
1183 return ret;
1184 }
1185
1186 ret = target_read_u32(bank->target, FLASH_REG_FLASH0_PROCON2, &protection[2]);
1187 if (ret != ERROR_OK) {
1188 LOG_ERROR("Unable to read flash User2 protection register");
1189 return ret;
1190 }
1191
1192 unsigned int sectors = bank->num_sectors;
1193
1194 /* On devices with 12 sectors, sectors 10 & 11 are protected
1195 * together instead of individually */
1196 if (sectors == 12)
1197 sectors--;
1198
1199 /* Clear the protection status */
1200 for (unsigned int i = 0; i < bank->num_sectors; i++) {
1201 bank->sectors[i].is_protected = 0;
1202 fb->write_prot_otp[i] = false;
1203 }
1204 fb->read_protected = false;
1205
1206 /* The xmc4xxx series supports 3 levels of user protection
1207 * (User0, User1 (low priority), and User 2(OTP), we need to
1208 * check all 3 */
1209 for (unsigned int i = 0; i < ARRAY_SIZE(protection); i++) {
1210
1211 /* Check for write protection on every available
1212 * sector */
1213 for (unsigned int j = 0; j < sectors; j++) {
1214 int set = (protection[i] & (1 << j)) ? 1 : 0;
1215 bank->sectors[j].is_protected |= set;
1216
1217 /* Handle sector 11 */
1218 if (j == 10)
1219 bank->sectors[j + 1].is_protected |= set;
1220
1221 /* User 2 indicates this protection is
1222 * permanent, make note in the private driver structure */
1223 if (i == 2 && set) {
1224 fb->write_prot_otp[j] = true;
1225
1226 /* Handle sector 11 */
1227 if (j == 10)
1228 fb->write_prot_otp[j + 1] = true;
1229 }
1230
1231 }
1232 }
1233
1234 /* XMC4xxx also supports read protection, make a note
1235 * in the private driver structure */
1236 if (protection[0] & PROCON_RPRO_MASK)
1237 fb->read_protected = true;
1238
1239 return ERROR_OK;
1240 }
1241
1242 FLASH_BANK_COMMAND_HANDLER(xmc4xxx_flash_bank_command)
1243 {
1244 bank->driver_priv = malloc(sizeof(struct xmc4xxx_flash_bank));
1245
1246 if (!bank->driver_priv)
1247 return ERROR_FLASH_OPERATION_FAILED;
1248
1249 (void)memset(bank->driver_priv, 0, sizeof(struct xmc4xxx_flash_bank));
1250
1251 return ERROR_OK;
1252 }
1253
1254 COMMAND_HANDLER(xmc4xxx_handle_flash_password_command)
1255 {
1256 int res;
1257 struct flash_bank *bank;
1258
1259 if (CMD_ARGC < 3)
1260 return ERROR_COMMAND_SYNTAX_ERROR;
1261
1262 res = CALL_COMMAND_HANDLER(flash_command_get_bank, 0, &bank);
1263 if (res != ERROR_OK)
1264 return res;
1265
1266 struct xmc4xxx_flash_bank *fb = bank->driver_priv;
1267
1268 errno = 0;
1269
1270 /* We skip over the flash bank */
1271 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[1], fb->pw1);
1272
1273 if (errno)
1274 return ERROR_COMMAND_SYNTAX_ERROR;
1275
1276 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[2], fb->pw2);
1277
1278 if (errno)
1279 return ERROR_COMMAND_SYNTAX_ERROR;
1280
1281 fb->pw_set = true;
1282
1283 command_print(CMD, "XMC4xxx flash passwords set to:\n");
1284 command_print(CMD, "-0x%08"PRIx32"\n", fb->pw1);
1285 command_print(CMD, "-0x%08"PRIx32"\n", fb->pw2);
1286 return ERROR_OK;
1287 }
1288
1289 COMMAND_HANDLER(xmc4xxx_handle_flash_unprotect_command)
1290 {
1291 struct flash_bank *bank;
1292 int res;
1293 int32_t level;
1294
1295 if (CMD_ARGC < 2)
1296 return ERROR_COMMAND_SYNTAX_ERROR;
1297
1298 res = CALL_COMMAND_HANDLER(flash_command_get_bank, 0, &bank);
1299 if (res != ERROR_OK)
1300 return res;
1301
1302 COMMAND_PARSE_NUMBER(s32, CMD_ARGV[1], level);
1303
1304 res = xmc4xxx_flash_unprotect(bank, level);
1305
1306 return res;
1307 }
1308
1309 static const struct command_registration xmc4xxx_exec_command_handlers[] = {
1310 {
1311 .name = "flash_password",
1312 .handler = xmc4xxx_handle_flash_password_command,
1313 .mode = COMMAND_EXEC,
1314 .usage = "bank_id password1 password2",
1315 .help = "Set the flash passwords used for protect operations. "
1316 "Passwords should be in standard hex form (0x00000000). "
1317 "(You must call this before any other protect commands) "
1318 "NOTE: The xmc4xxx's UCB area only allows for FOUR cycles. "
1319 "Please use protection carefully!",
1320 },
1321 {
1322 .name = "flash_unprotect",
1323 .handler = xmc4xxx_handle_flash_unprotect_command,
1324 .mode = COMMAND_EXEC,
1325 .usage = "bank_id user_level[0-1]",
1326 .help = "Permanently Removes flash protection (read and write) "
1327 "for the specified user level",
1328 },
1329 COMMAND_REGISTRATION_DONE
1330 };
1331
1332 static const struct command_registration xmc4xxx_command_handlers[] = {
1333 {
1334 .name = "xmc4xxx",
1335 .mode = COMMAND_ANY,
1336 .help = "xmc4xxx flash command group",
1337 .usage = "",
1338 .chain = xmc4xxx_exec_command_handlers,
1339 },
1340 COMMAND_REGISTRATION_DONE
1341 };
1342
1343 const struct flash_driver xmc4xxx_flash = {
1344 .name = "xmc4xxx",
1345 .commands = xmc4xxx_command_handlers,
1346 .flash_bank_command = xmc4xxx_flash_bank_command,
1347 .erase = xmc4xxx_erase,
1348 .write = xmc4xxx_write,
1349 .read = default_flash_read,
1350 .probe = xmc4xxx_probe,
1351 .auto_probe = xmc4xxx_probe,
1352 .erase_check = default_flash_blank_check,
1353 .info = xmc4xxx_get_info_command,
1354 .protect_check = xmc4xxx_protect_check,
1355 .protect = xmc4xxx_protect,
1356 .free_driver_priv = default_flash_free_driver_priv,
1357 };

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)