target: add Espressif ESP32-S3 basic support
[openocd.git] / src / target / arm_adi_v5.c
1 /***************************************************************************
2 * Copyright (C) 2006 by Magnus Lundin *
3 * lundin@mlu.mine.nu *
4 * *
5 * Copyright (C) 2008 by Spencer Oliver *
6 * spen@spen-soft.co.uk *
7 * *
8 * Copyright (C) 2009-2010 by Oyvind Harboe *
9 * oyvind.harboe@zylin.com *
10 * *
11 * Copyright (C) 2009-2010 by David Brownell *
12 * *
13 * Copyright (C) 2013 by Andreas Fritiofson *
14 * andreas.fritiofson@gmail.com *
15 * *
16 * Copyright (C) 2019-2021, Ampere Computing LLC *
17 * *
18 * This program is free software; you can redistribute it and/or modify *
19 * it under the terms of the GNU General Public License as published by *
20 * the Free Software Foundation; either version 2 of the License, or *
21 * (at your option) any later version. *
22 * *
23 * This program is distributed in the hope that it will be useful, *
24 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
25 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
26 * GNU General Public License for more details. *
27 * *
28 * You should have received a copy of the GNU General Public License *
29 * along with this program. If not, see <http://www.gnu.org/licenses/>. *
30 ***************************************************************************/
31
32 /**
33 * @file
34 * This file implements support for the ARM Debug Interface version 5 (ADIv5)
35 * debugging architecture. Compared with previous versions, this includes
36 * a low pin-count Serial Wire Debug (SWD) alternative to JTAG for message
37 * transport, and focuses on memory mapped resources as defined by the
38 * CoreSight architecture.
39 *
40 * A key concept in ADIv5 is the Debug Access Port, or DAP. A DAP has two
41 * basic components: a Debug Port (DP) transporting messages to and from a
42 * debugger, and an Access Port (AP) accessing resources. Three types of DP
43 * are defined. One uses only JTAG for communication, and is called JTAG-DP.
44 * One uses only SWD for communication, and is called SW-DP. The third can
45 * use either SWD or JTAG, and is called SWJ-DP. The most common type of AP
46 * is used to access memory mapped resources and is called a MEM-AP. Also a
47 * JTAG-AP is also defined, bridging to JTAG resources; those are uncommon.
48 *
49 * This programming interface allows DAP pipelined operations through a
50 * transaction queue. This primarily affects AP operations (such as using
51 * a MEM-AP to access memory or registers). If the current transaction has
52 * not finished by the time the next one must begin, and the ORUNDETECT bit
53 * is set in the DP_CTRL_STAT register, the SSTICKYORUN status is set and
54 * further AP operations will fail. There are two basic methods to avoid
55 * such overrun errors. One involves polling for status instead of using
56 * transaction pipelining. The other involves adding delays to ensure the
57 * AP has enough time to complete one operation before starting the next
58 * one. (For JTAG these delays are controlled by memaccess_tck.)
59 */
60
61 /*
62 * Relevant specifications from ARM include:
63 *
64 * ARM(tm) Debug Interface v5 Architecture Specification ARM IHI 0031E
65 * CoreSight(tm) v1.0 Architecture Specification ARM IHI 0029B
66 *
67 * CoreSight(tm) DAP-Lite TRM, ARM DDI 0316D
68 * Cortex-M3(tm) TRM, ARM DDI 0337G
69 */
70
71 #ifdef HAVE_CONFIG_H
72 #include "config.h"
73 #endif
74
75 #include "jtag/interface.h"
76 #include "arm.h"
77 #include "arm_adi_v5.h"
78 #include "arm_coresight.h"
79 #include "jtag/swd.h"
80 #include "transport/transport.h"
81 #include <helper/align.h>
82 #include <helper/jep106.h>
83 #include <helper/time_support.h>
84 #include <helper/list.h>
85 #include <helper/jim-nvp.h>
86
87 /* ARM ADI Specification requires at least 10 bits used for TAR autoincrement */
88
89 /*
90 uint32_t tar_block_size(uint32_t address)
91 Return the largest block starting at address that does not cross a tar block size alignment boundary
92 */
93 static uint32_t max_tar_block_size(uint32_t tar_autoincr_block, target_addr_t address)
94 {
95 return tar_autoincr_block - ((tar_autoincr_block - 1) & address);
96 }
97
98 /***************************************************************************
99 * *
100 * DP and MEM-AP register access through APACC and DPACC *
101 * *
102 ***************************************************************************/
103
104 static int mem_ap_setup_csw(struct adiv5_ap *ap, uint32_t csw)
105 {
106 csw |= ap->csw_default;
107
108 if (csw != ap->csw_value) {
109 /* LOG_DEBUG("DAP: Set CSW %x",csw); */
110 int retval = dap_queue_ap_write(ap, MEM_AP_REG_CSW(ap->dap), csw);
111 if (retval != ERROR_OK) {
112 ap->csw_value = 0;
113 return retval;
114 }
115 ap->csw_value = csw;
116 }
117 return ERROR_OK;
118 }
119
120 static int mem_ap_setup_tar(struct adiv5_ap *ap, target_addr_t tar)
121 {
122 if (!ap->tar_valid || tar != ap->tar_value) {
123 /* LOG_DEBUG("DAP: Set TAR %x",tar); */
124 int retval = dap_queue_ap_write(ap, MEM_AP_REG_TAR(ap->dap), (uint32_t)(tar & 0xffffffffUL));
125 if (retval == ERROR_OK && is_64bit_ap(ap)) {
126 /* See if bits 63:32 of tar is different from last setting */
127 if ((ap->tar_value >> 32) != (tar >> 32))
128 retval = dap_queue_ap_write(ap, MEM_AP_REG_TAR64(ap->dap), (uint32_t)(tar >> 32));
129 }
130 if (retval != ERROR_OK) {
131 ap->tar_valid = false;
132 return retval;
133 }
134 ap->tar_value = tar;
135 ap->tar_valid = true;
136 }
137 return ERROR_OK;
138 }
139
140 static int mem_ap_read_tar(struct adiv5_ap *ap, target_addr_t *tar)
141 {
142 uint32_t lower;
143 uint32_t upper = 0;
144
145 int retval = dap_queue_ap_read(ap, MEM_AP_REG_TAR(ap->dap), &lower);
146 if (retval == ERROR_OK && is_64bit_ap(ap))
147 retval = dap_queue_ap_read(ap, MEM_AP_REG_TAR64(ap->dap), &upper);
148
149 if (retval != ERROR_OK) {
150 ap->tar_valid = false;
151 return retval;
152 }
153
154 retval = dap_run(ap->dap);
155 if (retval != ERROR_OK) {
156 ap->tar_valid = false;
157 return retval;
158 }
159
160 *tar = (((target_addr_t)upper) << 32) | (target_addr_t)lower;
161
162 ap->tar_value = *tar;
163 ap->tar_valid = true;
164 return ERROR_OK;
165 }
166
167 static uint32_t mem_ap_get_tar_increment(struct adiv5_ap *ap)
168 {
169 switch (ap->csw_value & CSW_ADDRINC_MASK) {
170 case CSW_ADDRINC_SINGLE:
171 switch (ap->csw_value & CSW_SIZE_MASK) {
172 case CSW_8BIT:
173 return 1;
174 case CSW_16BIT:
175 return 2;
176 case CSW_32BIT:
177 return 4;
178 default:
179 return 0;
180 }
181 case CSW_ADDRINC_PACKED:
182 return 4;
183 }
184 return 0;
185 }
186
187 /* mem_ap_update_tar_cache is called after an access to MEM_AP_REG_DRW
188 */
189 static void mem_ap_update_tar_cache(struct adiv5_ap *ap)
190 {
191 if (!ap->tar_valid)
192 return;
193
194 uint32_t inc = mem_ap_get_tar_increment(ap);
195 if (inc >= max_tar_block_size(ap->tar_autoincr_block, ap->tar_value))
196 ap->tar_valid = false;
197 else
198 ap->tar_value += inc;
199 }
200
201 /**
202 * Queue transactions setting up transfer parameters for the
203 * currently selected MEM-AP.
204 *
205 * Subsequent transfers using registers like MEM_AP_REG_DRW or MEM_AP_REG_BD2
206 * initiate data reads or writes using memory or peripheral addresses.
207 * If the CSW is configured for it, the TAR may be automatically
208 * incremented after each transfer.
209 *
210 * @param ap The MEM-AP.
211 * @param csw MEM-AP Control/Status Word (CSW) register to assign. If this
212 * matches the cached value, the register is not changed.
213 * @param tar MEM-AP Transfer Address Register (TAR) to assign. If this
214 * matches the cached address, the register is not changed.
215 *
216 * @return ERROR_OK if the transaction was properly queued, else a fault code.
217 */
218 static int mem_ap_setup_transfer(struct adiv5_ap *ap, uint32_t csw, target_addr_t tar)
219 {
220 int retval;
221 retval = mem_ap_setup_csw(ap, csw);
222 if (retval != ERROR_OK)
223 return retval;
224 retval = mem_ap_setup_tar(ap, tar);
225 if (retval != ERROR_OK)
226 return retval;
227 return ERROR_OK;
228 }
229
230 /**
231 * Asynchronous (queued) read of a word from memory or a system register.
232 *
233 * @param ap The MEM-AP to access.
234 * @param address Address of the 32-bit word to read; it must be
235 * readable by the currently selected MEM-AP.
236 * @param value points to where the word will be stored when the
237 * transaction queue is flushed (assuming no errors).
238 *
239 * @return ERROR_OK for success. Otherwise a fault code.
240 */
241 int mem_ap_read_u32(struct adiv5_ap *ap, target_addr_t address,
242 uint32_t *value)
243 {
244 int retval;
245
246 /* Use banked addressing (REG_BDx) to avoid some link traffic
247 * (updating TAR) when reading several consecutive addresses.
248 */
249 retval = mem_ap_setup_transfer(ap,
250 CSW_32BIT | (ap->csw_value & CSW_ADDRINC_MASK),
251 address & 0xFFFFFFFFFFFFFFF0ull);
252 if (retval != ERROR_OK)
253 return retval;
254
255 return dap_queue_ap_read(ap, MEM_AP_REG_BD0(ap->dap) | (address & 0xC), value);
256 }
257
258 /**
259 * Synchronous read of a word from memory or a system register.
260 * As a side effect, this flushes any queued transactions.
261 *
262 * @param ap The MEM-AP to access.
263 * @param address Address of the 32-bit word to read; it must be
264 * readable by the currently selected MEM-AP.
265 * @param value points to where the result will be stored.
266 *
267 * @return ERROR_OK for success; *value holds the result.
268 * Otherwise a fault code.
269 */
270 int mem_ap_read_atomic_u32(struct adiv5_ap *ap, target_addr_t address,
271 uint32_t *value)
272 {
273 int retval;
274
275 retval = mem_ap_read_u32(ap, address, value);
276 if (retval != ERROR_OK)
277 return retval;
278
279 return dap_run(ap->dap);
280 }
281
282 /**
283 * Asynchronous (queued) write of a word to memory or a system register.
284 *
285 * @param ap The MEM-AP to access.
286 * @param address Address to be written; it must be writable by
287 * the currently selected MEM-AP.
288 * @param value Word that will be written to the address when transaction
289 * queue is flushed (assuming no errors).
290 *
291 * @return ERROR_OK for success. Otherwise a fault code.
292 */
293 int mem_ap_write_u32(struct adiv5_ap *ap, target_addr_t address,
294 uint32_t value)
295 {
296 int retval;
297
298 /* Use banked addressing (REG_BDx) to avoid some link traffic
299 * (updating TAR) when writing several consecutive addresses.
300 */
301 retval = mem_ap_setup_transfer(ap,
302 CSW_32BIT | (ap->csw_value & CSW_ADDRINC_MASK),
303 address & 0xFFFFFFFFFFFFFFF0ull);
304 if (retval != ERROR_OK)
305 return retval;
306
307 return dap_queue_ap_write(ap, MEM_AP_REG_BD0(ap->dap) | (address & 0xC),
308 value);
309 }
310
311 /**
312 * Synchronous write of a word to memory or a system register.
313 * As a side effect, this flushes any queued transactions.
314 *
315 * @param ap The MEM-AP to access.
316 * @param address Address to be written; it must be writable by
317 * the currently selected MEM-AP.
318 * @param value Word that will be written.
319 *
320 * @return ERROR_OK for success; the data was written. Otherwise a fault code.
321 */
322 int mem_ap_write_atomic_u32(struct adiv5_ap *ap, target_addr_t address,
323 uint32_t value)
324 {
325 int retval = mem_ap_write_u32(ap, address, value);
326
327 if (retval != ERROR_OK)
328 return retval;
329
330 return dap_run(ap->dap);
331 }
332
333 /**
334 * Synchronous write of a block of memory, using a specific access size.
335 *
336 * @param ap The MEM-AP to access.
337 * @param buffer The data buffer to write. No particular alignment is assumed.
338 * @param size Which access size to use, in bytes. 1, 2 or 4.
339 * @param count The number of writes to do (in size units, not bytes).
340 * @param address Address to be written; it must be writable by the currently selected MEM-AP.
341 * @param addrinc Whether the target address should be increased for each write or not. This
342 * should normally be true, except when writing to e.g. a FIFO.
343 * @return ERROR_OK on success, otherwise an error code.
344 */
345 static int mem_ap_write(struct adiv5_ap *ap, const uint8_t *buffer, uint32_t size, uint32_t count,
346 target_addr_t address, bool addrinc)
347 {
348 struct adiv5_dap *dap = ap->dap;
349 size_t nbytes = size * count;
350 const uint32_t csw_addrincr = addrinc ? CSW_ADDRINC_SINGLE : CSW_ADDRINC_OFF;
351 uint32_t csw_size;
352 target_addr_t addr_xor;
353 int retval = ERROR_OK;
354
355 /* TI BE-32 Quirks mode:
356 * Writes on big-endian TMS570 behave very strangely. Observed behavior:
357 * size write address bytes written in order
358 * 4 TAR ^ 0 (val >> 24), (val >> 16), (val >> 8), (val)
359 * 2 TAR ^ 2 (val >> 8), (val)
360 * 1 TAR ^ 3 (val)
361 * For example, if you attempt to write a single byte to address 0, the processor
362 * will actually write a byte to address 3.
363 *
364 * To make writes of size < 4 work as expected, we xor a value with the address before
365 * setting the TAP, and we set the TAP after every transfer rather then relying on
366 * address increment. */
367
368 if (size == 4) {
369 csw_size = CSW_32BIT;
370 addr_xor = 0;
371 } else if (size == 2) {
372 csw_size = CSW_16BIT;
373 addr_xor = dap->ti_be_32_quirks ? 2 : 0;
374 } else if (size == 1) {
375 csw_size = CSW_8BIT;
376 addr_xor = dap->ti_be_32_quirks ? 3 : 0;
377 } else {
378 return ERROR_TARGET_UNALIGNED_ACCESS;
379 }
380
381 if (ap->unaligned_access_bad && (address % size != 0))
382 return ERROR_TARGET_UNALIGNED_ACCESS;
383
384 while (nbytes > 0) {
385 uint32_t this_size = size;
386
387 /* Select packed transfer if possible */
388 if (addrinc && ap->packed_transfers && nbytes >= 4
389 && max_tar_block_size(ap->tar_autoincr_block, address) >= 4) {
390 this_size = 4;
391 retval = mem_ap_setup_csw(ap, csw_size | CSW_ADDRINC_PACKED);
392 } else {
393 retval = mem_ap_setup_csw(ap, csw_size | csw_addrincr);
394 }
395
396 if (retval != ERROR_OK)
397 break;
398
399 retval = mem_ap_setup_tar(ap, address ^ addr_xor);
400 if (retval != ERROR_OK)
401 return retval;
402
403 /* How many source bytes each transfer will consume, and their location in the DRW,
404 * depends on the type of transfer and alignment. See ARM document IHI0031C. */
405 uint32_t outvalue = 0;
406 uint32_t drw_byte_idx = address;
407 if (dap->ti_be_32_quirks) {
408 switch (this_size) {
409 case 4:
410 outvalue |= (uint32_t)*buffer++ << 8 * (3 ^ (drw_byte_idx++ & 3) ^ addr_xor);
411 outvalue |= (uint32_t)*buffer++ << 8 * (3 ^ (drw_byte_idx++ & 3) ^ addr_xor);
412 outvalue |= (uint32_t)*buffer++ << 8 * (3 ^ (drw_byte_idx++ & 3) ^ addr_xor);
413 outvalue |= (uint32_t)*buffer++ << 8 * (3 ^ (drw_byte_idx & 3) ^ addr_xor);
414 break;
415 case 2:
416 outvalue |= (uint32_t)*buffer++ << 8 * (1 ^ (drw_byte_idx++ & 3) ^ addr_xor);
417 outvalue |= (uint32_t)*buffer++ << 8 * (1 ^ (drw_byte_idx & 3) ^ addr_xor);
418 break;
419 case 1:
420 outvalue |= (uint32_t)*buffer++ << 8 * (0 ^ (drw_byte_idx & 3) ^ addr_xor);
421 break;
422 }
423 } else {
424 switch (this_size) {
425 case 4:
426 outvalue |= (uint32_t)*buffer++ << 8 * (drw_byte_idx++ & 3);
427 outvalue |= (uint32_t)*buffer++ << 8 * (drw_byte_idx++ & 3);
428 /* fallthrough */
429 case 2:
430 outvalue |= (uint32_t)*buffer++ << 8 * (drw_byte_idx++ & 3);
431 /* fallthrough */
432 case 1:
433 outvalue |= (uint32_t)*buffer++ << 8 * (drw_byte_idx & 3);
434 }
435 }
436
437 nbytes -= this_size;
438
439 retval = dap_queue_ap_write(ap, MEM_AP_REG_DRW(dap), outvalue);
440 if (retval != ERROR_OK)
441 break;
442
443 mem_ap_update_tar_cache(ap);
444 if (addrinc)
445 address += this_size;
446 }
447
448 /* REVISIT: Might want to have a queued version of this function that does not run. */
449 if (retval == ERROR_OK)
450 retval = dap_run(dap);
451
452 if (retval != ERROR_OK) {
453 target_addr_t tar;
454 if (mem_ap_read_tar(ap, &tar) == ERROR_OK)
455 LOG_ERROR("Failed to write memory at " TARGET_ADDR_FMT, tar);
456 else
457 LOG_ERROR("Failed to write memory and, additionally, failed to find out where");
458 }
459
460 return retval;
461 }
462
463 /**
464 * Synchronous read of a block of memory, using a specific access size.
465 *
466 * @param ap The MEM-AP to access.
467 * @param buffer The data buffer to receive the data. No particular alignment is assumed.
468 * @param size Which access size to use, in bytes. 1, 2 or 4.
469 * @param count The number of reads to do (in size units, not bytes).
470 * @param adr Address to be read; it must be readable by the currently selected MEM-AP.
471 * @param addrinc Whether the target address should be increased after each read or not. This
472 * should normally be true, except when reading from e.g. a FIFO.
473 * @return ERROR_OK on success, otherwise an error code.
474 */
475 static int mem_ap_read(struct adiv5_ap *ap, uint8_t *buffer, uint32_t size, uint32_t count,
476 target_addr_t adr, bool addrinc)
477 {
478 struct adiv5_dap *dap = ap->dap;
479 size_t nbytes = size * count;
480 const uint32_t csw_addrincr = addrinc ? CSW_ADDRINC_SINGLE : CSW_ADDRINC_OFF;
481 uint32_t csw_size;
482 target_addr_t address = adr;
483 int retval = ERROR_OK;
484
485 /* TI BE-32 Quirks mode:
486 * Reads on big-endian TMS570 behave strangely differently than writes.
487 * They read from the physical address requested, but with DRW byte-reversed.
488 * For example, a byte read from address 0 will place the result in the high bytes of DRW.
489 * Also, packed 8-bit and 16-bit transfers seem to sometimes return garbage in some bytes,
490 * so avoid them. */
491
492 if (size == 4)
493 csw_size = CSW_32BIT;
494 else if (size == 2)
495 csw_size = CSW_16BIT;
496 else if (size == 1)
497 csw_size = CSW_8BIT;
498 else
499 return ERROR_TARGET_UNALIGNED_ACCESS;
500
501 if (ap->unaligned_access_bad && (adr % size != 0))
502 return ERROR_TARGET_UNALIGNED_ACCESS;
503
504 /* Allocate buffer to hold the sequence of DRW reads that will be made. This is a significant
505 * over-allocation if packed transfers are going to be used, but determining the real need at
506 * this point would be messy. */
507 uint32_t *read_buf = calloc(count, sizeof(uint32_t));
508 /* Multiplication count * sizeof(uint32_t) may overflow, calloc() is safe */
509 uint32_t *read_ptr = read_buf;
510 if (!read_buf) {
511 LOG_ERROR("Failed to allocate read buffer");
512 return ERROR_FAIL;
513 }
514
515 /* Queue up all reads. Each read will store the entire DRW word in the read buffer. How many
516 * useful bytes it contains, and their location in the word, depends on the type of transfer
517 * and alignment. */
518 while (nbytes > 0) {
519 uint32_t this_size = size;
520
521 /* Select packed transfer if possible */
522 if (addrinc && ap->packed_transfers && nbytes >= 4
523 && max_tar_block_size(ap->tar_autoincr_block, address) >= 4) {
524 this_size = 4;
525 retval = mem_ap_setup_csw(ap, csw_size | CSW_ADDRINC_PACKED);
526 } else {
527 retval = mem_ap_setup_csw(ap, csw_size | csw_addrincr);
528 }
529 if (retval != ERROR_OK)
530 break;
531
532 retval = mem_ap_setup_tar(ap, address);
533 if (retval != ERROR_OK)
534 break;
535
536 retval = dap_queue_ap_read(ap, MEM_AP_REG_DRW(dap), read_ptr++);
537 if (retval != ERROR_OK)
538 break;
539
540 nbytes -= this_size;
541 if (addrinc)
542 address += this_size;
543
544 mem_ap_update_tar_cache(ap);
545 }
546
547 if (retval == ERROR_OK)
548 retval = dap_run(dap);
549
550 /* Restore state */
551 address = adr;
552 nbytes = size * count;
553 read_ptr = read_buf;
554
555 /* If something failed, read TAR to find out how much data was successfully read, so we can
556 * at least give the caller what we have. */
557 if (retval != ERROR_OK) {
558 target_addr_t tar;
559 if (mem_ap_read_tar(ap, &tar) == ERROR_OK) {
560 /* TAR is incremented after failed transfer on some devices (eg Cortex-M4) */
561 LOG_ERROR("Failed to read memory at " TARGET_ADDR_FMT, tar);
562 if (nbytes > tar - address)
563 nbytes = tar - address;
564 } else {
565 LOG_ERROR("Failed to read memory and, additionally, failed to find out where");
566 nbytes = 0;
567 }
568 }
569
570 /* Replay loop to populate caller's buffer from the correct word and byte lane */
571 while (nbytes > 0) {
572 uint32_t this_size = size;
573
574 if (addrinc && ap->packed_transfers && nbytes >= 4
575 && max_tar_block_size(ap->tar_autoincr_block, address) >= 4) {
576 this_size = 4;
577 }
578
579 if (dap->ti_be_32_quirks) {
580 switch (this_size) {
581 case 4:
582 *buffer++ = *read_ptr >> 8 * (3 - (address++ & 3));
583 *buffer++ = *read_ptr >> 8 * (3 - (address++ & 3));
584 /* fallthrough */
585 case 2:
586 *buffer++ = *read_ptr >> 8 * (3 - (address++ & 3));
587 /* fallthrough */
588 case 1:
589 *buffer++ = *read_ptr >> 8 * (3 - (address++ & 3));
590 }
591 } else {
592 switch (this_size) {
593 case 4:
594 *buffer++ = *read_ptr >> 8 * (address++ & 3);
595 *buffer++ = *read_ptr >> 8 * (address++ & 3);
596 /* fallthrough */
597 case 2:
598 *buffer++ = *read_ptr >> 8 * (address++ & 3);
599 /* fallthrough */
600 case 1:
601 *buffer++ = *read_ptr >> 8 * (address++ & 3);
602 }
603 }
604
605 read_ptr++;
606 nbytes -= this_size;
607 }
608
609 free(read_buf);
610 return retval;
611 }
612
613 int mem_ap_read_buf(struct adiv5_ap *ap,
614 uint8_t *buffer, uint32_t size, uint32_t count, target_addr_t address)
615 {
616 return mem_ap_read(ap, buffer, size, count, address, true);
617 }
618
619 int mem_ap_write_buf(struct adiv5_ap *ap,
620 const uint8_t *buffer, uint32_t size, uint32_t count, target_addr_t address)
621 {
622 return mem_ap_write(ap, buffer, size, count, address, true);
623 }
624
625 int mem_ap_read_buf_noincr(struct adiv5_ap *ap,
626 uint8_t *buffer, uint32_t size, uint32_t count, target_addr_t address)
627 {
628 return mem_ap_read(ap, buffer, size, count, address, false);
629 }
630
631 int mem_ap_write_buf_noincr(struct adiv5_ap *ap,
632 const uint8_t *buffer, uint32_t size, uint32_t count, target_addr_t address)
633 {
634 return mem_ap_write(ap, buffer, size, count, address, false);
635 }
636
637 /*--------------------------------------------------------------------------*/
638
639
640 #define DAP_POWER_DOMAIN_TIMEOUT (10)
641
642 /*--------------------------------------------------------------------------*/
643
644 /**
645 * Invalidate cached DP select and cached TAR and CSW of all APs
646 */
647 void dap_invalidate_cache(struct adiv5_dap *dap)
648 {
649 dap->select = DP_SELECT_INVALID;
650 dap->last_read = NULL;
651
652 int i;
653 for (i = 0; i <= DP_APSEL_MAX; i++) {
654 /* force csw and tar write on the next mem-ap access */
655 dap->ap[i].tar_valid = false;
656 dap->ap[i].csw_value = 0;
657 }
658 }
659
660 /**
661 * Initialize a DAP. This sets up the power domains, prepares the DP
662 * for further use and activates overrun checking.
663 *
664 * @param dap The DAP being initialized.
665 */
666 int dap_dp_init(struct adiv5_dap *dap)
667 {
668 int retval;
669
670 LOG_DEBUG("%s", adiv5_dap_name(dap));
671
672 dap->do_reconnect = false;
673 dap_invalidate_cache(dap);
674
675 /*
676 * Early initialize dap->dp_ctrl_stat.
677 * In jtag mode only, if the following queue run (in dap_dp_poll_register)
678 * fails and sets the sticky error, it will trigger the clearing
679 * of the sticky. Without this initialization system and debug power
680 * would be disabled while clearing the sticky error bit.
681 */
682 dap->dp_ctrl_stat = CDBGPWRUPREQ | CSYSPWRUPREQ;
683
684 /*
685 * This write operation clears the sticky error bit in jtag mode only and
686 * is ignored in swd mode. It also powers-up system and debug domains in
687 * both jtag and swd modes, if not done before.
688 */
689 retval = dap_queue_dp_write(dap, DP_CTRL_STAT, dap->dp_ctrl_stat | SSTICKYERR);
690 if (retval != ERROR_OK)
691 return retval;
692
693 retval = dap_queue_dp_read(dap, DP_CTRL_STAT, NULL);
694 if (retval != ERROR_OK)
695 return retval;
696
697 retval = dap_queue_dp_write(dap, DP_CTRL_STAT, dap->dp_ctrl_stat);
698 if (retval != ERROR_OK)
699 return retval;
700
701 /* Check that we have debug power domains activated */
702 LOG_DEBUG("DAP: wait CDBGPWRUPACK");
703 retval = dap_dp_poll_register(dap, DP_CTRL_STAT,
704 CDBGPWRUPACK, CDBGPWRUPACK,
705 DAP_POWER_DOMAIN_TIMEOUT);
706 if (retval != ERROR_OK)
707 return retval;
708
709 if (!dap->ignore_syspwrupack) {
710 LOG_DEBUG("DAP: wait CSYSPWRUPACK");
711 retval = dap_dp_poll_register(dap, DP_CTRL_STAT,
712 CSYSPWRUPACK, CSYSPWRUPACK,
713 DAP_POWER_DOMAIN_TIMEOUT);
714 if (retval != ERROR_OK)
715 return retval;
716 }
717
718 retval = dap_queue_dp_read(dap, DP_CTRL_STAT, NULL);
719 if (retval != ERROR_OK)
720 return retval;
721
722 /* With debug power on we can activate OVERRUN checking */
723 dap->dp_ctrl_stat = CDBGPWRUPREQ | CSYSPWRUPREQ | CORUNDETECT;
724 retval = dap_queue_dp_write(dap, DP_CTRL_STAT, dap->dp_ctrl_stat);
725 if (retval != ERROR_OK)
726 return retval;
727 retval = dap_queue_dp_read(dap, DP_CTRL_STAT, NULL);
728 if (retval != ERROR_OK)
729 return retval;
730
731 retval = dap_run(dap);
732 if (retval != ERROR_OK)
733 return retval;
734
735 return retval;
736 }
737
738 /**
739 * Initialize a DAP or do reconnect if DAP is not accessible.
740 *
741 * @param dap The DAP being initialized.
742 */
743 int dap_dp_init_or_reconnect(struct adiv5_dap *dap)
744 {
745 LOG_DEBUG("%s", adiv5_dap_name(dap));
746
747 /*
748 * Early initialize dap->dp_ctrl_stat.
749 * In jtag mode only, if the following atomic reads fail and set the
750 * sticky error, it will trigger the clearing of the sticky. Without this
751 * initialization system and debug power would be disabled while clearing
752 * the sticky error bit.
753 */
754 dap->dp_ctrl_stat = CDBGPWRUPREQ | CSYSPWRUPREQ;
755
756 dap->do_reconnect = false;
757
758 dap_dp_read_atomic(dap, DP_CTRL_STAT, NULL);
759 if (dap->do_reconnect) {
760 /* dap connect calls dap_dp_init() after transport dependent initialization */
761 return dap->ops->connect(dap);
762 } else {
763 return dap_dp_init(dap);
764 }
765 }
766
767 /**
768 * Initialize a DAP. This sets up the power domains, prepares the DP
769 * for further use, and arranges to use AP #0 for all AP operations
770 * until dap_ap-select() changes that policy.
771 *
772 * @param ap The MEM-AP being initialized.
773 */
774 int mem_ap_init(struct adiv5_ap *ap)
775 {
776 /* check that we support packed transfers */
777 uint32_t csw, cfg;
778 int retval;
779 struct adiv5_dap *dap = ap->dap;
780
781 /* Set ap->cfg_reg before calling mem_ap_setup_transfer(). */
782 /* mem_ap_setup_transfer() needs to know if the MEM_AP supports LPAE. */
783 retval = dap_queue_ap_read(ap, MEM_AP_REG_CFG(dap), &cfg);
784 if (retval != ERROR_OK)
785 return retval;
786
787 retval = dap_run(dap);
788 if (retval != ERROR_OK)
789 return retval;
790
791 ap->cfg_reg = cfg;
792 ap->tar_valid = false;
793 ap->csw_value = 0; /* force csw and tar write */
794 retval = mem_ap_setup_transfer(ap, CSW_8BIT | CSW_ADDRINC_PACKED, 0);
795 if (retval != ERROR_OK)
796 return retval;
797
798 retval = dap_queue_ap_read(ap, MEM_AP_REG_CSW(dap), &csw);
799 if (retval != ERROR_OK)
800 return retval;
801
802 retval = dap_run(dap);
803 if (retval != ERROR_OK)
804 return retval;
805
806 if (csw & CSW_ADDRINC_PACKED)
807 ap->packed_transfers = true;
808 else
809 ap->packed_transfers = false;
810
811 /* Packed transfers on TI BE-32 processors do not work correctly in
812 * many cases. */
813 if (dap->ti_be_32_quirks)
814 ap->packed_transfers = false;
815
816 LOG_DEBUG("MEM_AP Packed Transfers: %s",
817 ap->packed_transfers ? "enabled" : "disabled");
818
819 /* The ARM ADI spec leaves implementation-defined whether unaligned
820 * memory accesses work, only work partially, or cause a sticky error.
821 * On TI BE-32 processors, reads seem to return garbage in some bytes
822 * and unaligned writes seem to cause a sticky error.
823 * TODO: it would be nice to have a way to detect whether unaligned
824 * operations are supported on other processors. */
825 ap->unaligned_access_bad = dap->ti_be_32_quirks;
826
827 LOG_DEBUG("MEM_AP CFG: large data %d, long address %d, big-endian %d",
828 !!(cfg & MEM_AP_REG_CFG_LD), !!(cfg & MEM_AP_REG_CFG_LA), !!(cfg & MEM_AP_REG_CFG_BE));
829
830 return ERROR_OK;
831 }
832
833 /**
834 * Put the debug link into SWD mode, if the target supports it.
835 * The link's initial mode may be either JTAG (for example,
836 * with SWJ-DP after reset) or SWD.
837 *
838 * Note that targets using the JTAG-DP do not support SWD, and that
839 * some targets which could otherwise support it may have been
840 * configured to disable SWD signaling
841 *
842 * @param dap The DAP used
843 * @return ERROR_OK or else a fault code.
844 */
845 int dap_to_swd(struct adiv5_dap *dap)
846 {
847 LOG_DEBUG("Enter SWD mode");
848
849 return dap_send_sequence(dap, JTAG_TO_SWD);
850 }
851
852 /**
853 * Put the debug link into JTAG mode, if the target supports it.
854 * The link's initial mode may be either SWD or JTAG.
855 *
856 * Note that targets implemented with SW-DP do not support JTAG, and
857 * that some targets which could otherwise support it may have been
858 * configured to disable JTAG signaling
859 *
860 * @param dap The DAP used
861 * @return ERROR_OK or else a fault code.
862 */
863 int dap_to_jtag(struct adiv5_dap *dap)
864 {
865 LOG_DEBUG("Enter JTAG mode");
866
867 return dap_send_sequence(dap, SWD_TO_JTAG);
868 }
869
870 /* CID interpretation -- see ARM IHI 0029E table B2-7
871 * and ARM IHI 0031E table D1-2.
872 *
873 * From 2009/11/25 commit 21378f58b604:
874 * "OptimoDE DESS" is ARM's semicustom DSPish stuff.
875 * Let's keep it as is, for the time being
876 */
877 static const char *class_description[16] = {
878 [0x0] = "Generic verification component",
879 [0x1] = "ROM table",
880 [0x2] = "Reserved",
881 [0x3] = "Reserved",
882 [0x4] = "Reserved",
883 [0x5] = "Reserved",
884 [0x6] = "Reserved",
885 [0x7] = "Reserved",
886 [0x8] = "Reserved",
887 [0x9] = "CoreSight component",
888 [0xA] = "Reserved",
889 [0xB] = "Peripheral Test Block",
890 [0xC] = "Reserved",
891 [0xD] = "OptimoDE DESS", /* see above */
892 [0xE] = "Generic IP component",
893 [0xF] = "CoreLink, PrimeCell or System component",
894 };
895
896 #define ARCH_ID(architect, archid) ( \
897 (((architect) << ARM_CS_C9_DEVARCH_ARCHITECT_SHIFT) & ARM_CS_C9_DEVARCH_ARCHITECT_MASK) | \
898 (((archid) << ARM_CS_C9_DEVARCH_ARCHID_SHIFT) & ARM_CS_C9_DEVARCH_ARCHID_MASK) \
899 )
900
901 static const struct {
902 uint32_t arch_id;
903 const char *description;
904 } class0x9_devarch[] = {
905 /* keep same unsorted order as in ARM IHI0029E */
906 { ARCH_ID(ARM_ID, 0x0A00), "RAS architecture" },
907 { ARCH_ID(ARM_ID, 0x1A01), "Instrumentation Trace Macrocell (ITM) architecture" },
908 { ARCH_ID(ARM_ID, 0x1A02), "DWT architecture" },
909 { ARCH_ID(ARM_ID, 0x1A03), "Flash Patch and Breakpoint unit (FPB) architecture" },
910 { ARCH_ID(ARM_ID, 0x2A04), "Processor debug architecture (ARMv8-M)" },
911 { ARCH_ID(ARM_ID, 0x6A05), "Processor debug architecture (ARMv8-R)" },
912 { ARCH_ID(ARM_ID, 0x0A10), "PC sample-based profiling" },
913 { ARCH_ID(ARM_ID, 0x4A13), "Embedded Trace Macrocell (ETM) architecture" },
914 { ARCH_ID(ARM_ID, 0x1A14), "Cross Trigger Interface (CTI) architecture" },
915 { ARCH_ID(ARM_ID, 0x6A15), "Processor debug architecture (v8.0-A)" },
916 { ARCH_ID(ARM_ID, 0x7A15), "Processor debug architecture (v8.1-A)" },
917 { ARCH_ID(ARM_ID, 0x8A15), "Processor debug architecture (v8.2-A)" },
918 { ARCH_ID(ARM_ID, 0x2A16), "Processor Performance Monitor (PMU) architecture" },
919 { ARCH_ID(ARM_ID, 0x0A17), "Memory Access Port v2 architecture" },
920 { ARCH_ID(ARM_ID, 0x0A27), "JTAG Access Port v2 architecture" },
921 { ARCH_ID(ARM_ID, 0x0A31), "Basic trace router" },
922 { ARCH_ID(ARM_ID, 0x0A37), "Power requestor" },
923 { ARCH_ID(ARM_ID, 0x0A47), "Unknown Access Port v2 architecture" },
924 { ARCH_ID(ARM_ID, 0x0A50), "HSSTP architecture" },
925 { ARCH_ID(ARM_ID, 0x0A63), "System Trace Macrocell (STM) architecture" },
926 { ARCH_ID(ARM_ID, 0x0A75), "CoreSight ELA architecture" },
927 { ARCH_ID(ARM_ID, 0x0AF7), "CoreSight ROM architecture" },
928 };
929
930 #define DEVARCH_ID_MASK (ARM_CS_C9_DEVARCH_ARCHITECT_MASK | ARM_CS_C9_DEVARCH_ARCHID_MASK)
931 #define DEVARCH_MEM_AP ARCH_ID(ARM_ID, 0x0A17)
932 #define DEVARCH_ROM_C_0X9 ARCH_ID(ARM_ID, 0x0AF7)
933 #define DEVARCH_UNKNOWN_V2 ARCH_ID(ARM_ID, 0x0A47)
934
935 static const char *class0x9_devarch_description(uint32_t devarch)
936 {
937 if (!(devarch & ARM_CS_C9_DEVARCH_PRESENT))
938 return "not present";
939
940 for (unsigned int i = 0; i < ARRAY_SIZE(class0x9_devarch); i++)
941 if ((devarch & DEVARCH_ID_MASK) == class0x9_devarch[i].arch_id)
942 return class0x9_devarch[i].description;
943
944 return "unknown";
945 }
946
947 static const struct {
948 enum ap_type type;
949 const char *description;
950 } ap_types[] = {
951 { AP_TYPE_JTAG_AP, "JTAG-AP" },
952 { AP_TYPE_COM_AP, "COM-AP" },
953 { AP_TYPE_AHB3_AP, "MEM-AP AHB3" },
954 { AP_TYPE_APB_AP, "MEM-AP APB2 or APB3" },
955 { AP_TYPE_AXI_AP, "MEM-AP AXI3 or AXI4" },
956 { AP_TYPE_AHB5_AP, "MEM-AP AHB5" },
957 { AP_TYPE_APB4_AP, "MEM-AP APB4" },
958 { AP_TYPE_AXI5_AP, "MEM-AP AXI5" },
959 { AP_TYPE_AHB5H_AP, "MEM-AP AHB5 with enhanced HPROT" },
960 };
961
962 static const char *ap_type_to_description(enum ap_type type)
963 {
964 for (unsigned int i = 0; i < ARRAY_SIZE(ap_types); i++)
965 if (type == ap_types[i].type)
966 return ap_types[i].description;
967
968 return "Unknown";
969 }
970
971 bool is_ap_num_valid(struct adiv5_dap *dap, uint64_t ap_num)
972 {
973 if (!dap)
974 return false;
975
976 /* no autodetection, by now, so uninitialized is equivalent to ADIv5 for
977 * backward compatibility */
978 if (!is_adiv6(dap)) {
979 if (ap_num > DP_APSEL_MAX)
980 return false;
981 return true;
982 }
983
984 if (is_adiv6(dap)) {
985 if (ap_num & 0x0fffULL)
986 return false;
987 if (dap->asize != 0)
988 if (ap_num & ((~0ULL) << dap->asize))
989 return false;
990 return true;
991 }
992
993 return false;
994 }
995
996 /*
997 * This function checks the ID for each access port to find the requested Access Port type
998 * It also calls dap_get_ap() to increment the AP refcount
999 */
1000 int dap_find_get_ap(struct adiv5_dap *dap, enum ap_type type_to_find, struct adiv5_ap **ap_out)
1001 {
1002 if (is_adiv6(dap)) {
1003 /* TODO: scan the ROM table and detect the AP available */
1004 LOG_DEBUG("On ADIv6 we cannot scan all the possible AP");
1005 return ERROR_FAIL;
1006 }
1007
1008 /* Maximum AP number is 255 since the SELECT register is 8 bits */
1009 for (unsigned int ap_num = 0; ap_num <= DP_APSEL_MAX; ap_num++) {
1010 struct adiv5_ap *ap = dap_get_ap(dap, ap_num);
1011 if (!ap)
1012 continue;
1013
1014 /* read the IDR register of the Access Port */
1015 uint32_t id_val = 0;
1016
1017 int retval = dap_queue_ap_read(ap, AP_REG_IDR(dap), &id_val);
1018 if (retval != ERROR_OK) {
1019 dap_put_ap(ap);
1020 return retval;
1021 }
1022
1023 retval = dap_run(dap);
1024
1025 /* Reading register for a non-existent AP should not cause an error,
1026 * but just to be sure, try to continue searching if an error does happen.
1027 */
1028 if (retval == ERROR_OK && (id_val & AP_TYPE_MASK) == type_to_find) {
1029 LOG_DEBUG("Found %s at AP index: %d (IDR=0x%08" PRIX32 ")",
1030 ap_type_to_description(type_to_find),
1031 ap_num, id_val);
1032
1033 *ap_out = ap;
1034 return ERROR_OK;
1035 }
1036 dap_put_ap(ap);
1037 }
1038
1039 LOG_DEBUG("No %s found", ap_type_to_description(type_to_find));
1040 return ERROR_FAIL;
1041 }
1042
1043 static inline bool is_ap_in_use(struct adiv5_ap *ap)
1044 {
1045 return ap->refcount > 0 || ap->config_ap_never_release;
1046 }
1047
1048 static struct adiv5_ap *_dap_get_ap(struct adiv5_dap *dap, uint64_t ap_num)
1049 {
1050 if (!is_ap_num_valid(dap, ap_num)) {
1051 LOG_ERROR("Invalid AP#0x%" PRIx64, ap_num);
1052 return NULL;
1053 }
1054 if (is_adiv6(dap)) {
1055 for (unsigned int i = 0; i <= DP_APSEL_MAX; i++) {
1056 struct adiv5_ap *ap = &dap->ap[i];
1057 if (is_ap_in_use(ap) && ap->ap_num == ap_num) {
1058 ++ap->refcount;
1059 return ap;
1060 }
1061 }
1062 for (unsigned int i = 0; i <= DP_APSEL_MAX; i++) {
1063 struct adiv5_ap *ap = &dap->ap[i];
1064 if (!is_ap_in_use(ap)) {
1065 ap->ap_num = ap_num;
1066 ++ap->refcount;
1067 return ap;
1068 }
1069 }
1070 LOG_ERROR("No more AP available!");
1071 return NULL;
1072 }
1073
1074 /* ADIv5 */
1075 struct adiv5_ap *ap = &dap->ap[ap_num];
1076 ap->ap_num = ap_num;
1077 ++ap->refcount;
1078 return ap;
1079 }
1080
1081 /* Return AP with specified ap_num. Increment AP refcount */
1082 struct adiv5_ap *dap_get_ap(struct adiv5_dap *dap, uint64_t ap_num)
1083 {
1084 struct adiv5_ap *ap = _dap_get_ap(dap, ap_num);
1085 if (ap)
1086 LOG_DEBUG("refcount AP#0x%" PRIx64 " get %u", ap_num, ap->refcount);
1087 return ap;
1088 }
1089
1090 /* Return AP with specified ap_num. Increment AP refcount and keep it non-zero */
1091 struct adiv5_ap *dap_get_config_ap(struct adiv5_dap *dap, uint64_t ap_num)
1092 {
1093 struct adiv5_ap *ap = _dap_get_ap(dap, ap_num);
1094 if (ap) {
1095 ap->config_ap_never_release = true;
1096 LOG_DEBUG("refcount AP#0x%" PRIx64 " get_config %u", ap_num, ap->refcount);
1097 }
1098 return ap;
1099 }
1100
1101 /* Decrement AP refcount and release the AP when refcount reaches zero */
1102 int dap_put_ap(struct adiv5_ap *ap)
1103 {
1104 if (ap->refcount == 0) {
1105 LOG_ERROR("BUG: refcount AP#0x%" PRIx64 " put underflow", ap->ap_num);
1106 return ERROR_FAIL;
1107 }
1108
1109 --ap->refcount;
1110
1111 LOG_DEBUG("refcount AP#0x%" PRIx64 " put %u", ap->ap_num, ap->refcount);
1112 if (!is_ap_in_use(ap)) {
1113 /* defaults from dap_instance_init() */
1114 ap->ap_num = DP_APSEL_INVALID;
1115 ap->memaccess_tck = 255;
1116 ap->tar_autoincr_block = (1 << 10);
1117 ap->csw_default = CSW_AHB_DEFAULT;
1118 ap->cfg_reg = MEM_AP_REG_CFG_INVALID;
1119 }
1120 return ERROR_OK;
1121 }
1122
1123 static int dap_get_debugbase(struct adiv5_ap *ap,
1124 target_addr_t *dbgbase, uint32_t *apid)
1125 {
1126 struct adiv5_dap *dap = ap->dap;
1127 int retval;
1128 uint32_t baseptr_upper, baseptr_lower;
1129
1130 if (ap->cfg_reg == MEM_AP_REG_CFG_INVALID) {
1131 retval = dap_queue_ap_read(ap, MEM_AP_REG_CFG(dap), &ap->cfg_reg);
1132 if (retval != ERROR_OK)
1133 return retval;
1134 }
1135 retval = dap_queue_ap_read(ap, MEM_AP_REG_BASE(dap), &baseptr_lower);
1136 if (retval != ERROR_OK)
1137 return retval;
1138 retval = dap_queue_ap_read(ap, AP_REG_IDR(dap), apid);
1139 if (retval != ERROR_OK)
1140 return retval;
1141 /* MEM_AP_REG_BASE64 is defined as 'RES0'; can be read and then ignored on 32 bits AP */
1142 if (ap->cfg_reg == MEM_AP_REG_CFG_INVALID || is_64bit_ap(ap)) {
1143 retval = dap_queue_ap_read(ap, MEM_AP_REG_BASE64(dap), &baseptr_upper);
1144 if (retval != ERROR_OK)
1145 return retval;
1146 }
1147
1148 retval = dap_run(dap);
1149 if (retval != ERROR_OK)
1150 return retval;
1151
1152 if (!is_64bit_ap(ap))
1153 baseptr_upper = 0;
1154 *dbgbase = (((target_addr_t)baseptr_upper) << 32) | baseptr_lower;
1155
1156 return ERROR_OK;
1157 }
1158
1159 int adiv6_dap_read_baseptr(struct command_invocation *cmd, struct adiv5_dap *dap, uint64_t *baseptr)
1160 {
1161 uint32_t baseptr_lower, baseptr_upper = 0;
1162 int retval;
1163
1164 if (dap->asize > 32) {
1165 retval = dap_queue_dp_read(dap, DP_BASEPTR1, &baseptr_upper);
1166 if (retval != ERROR_OK)
1167 return retval;
1168 }
1169
1170 retval = dap_dp_read_atomic(dap, DP_BASEPTR0, &baseptr_lower);
1171 if (retval != ERROR_OK)
1172 return retval;
1173
1174 if ((baseptr_lower & DP_BASEPTR0_VALID) != DP_BASEPTR0_VALID) {
1175 command_print(cmd, "System root table not present");
1176 return ERROR_FAIL;
1177 }
1178
1179 baseptr_lower &= ~0x0fff;
1180 *baseptr = (((uint64_t)baseptr_upper) << 32) | baseptr_lower;
1181
1182 return ERROR_OK;
1183 }
1184
1185 /**
1186 * Method to access the CoreSight component.
1187 * On ADIv5, CoreSight components are on the bus behind a MEM-AP.
1188 * On ADIv6, CoreSight components can either be on the bus behind a MEM-AP
1189 * or directly in the AP.
1190 */
1191 enum coresight_access_mode {
1192 CS_ACCESS_AP,
1193 CS_ACCESS_MEM_AP,
1194 };
1195
1196 /** Holds registers and coordinates of a CoreSight component */
1197 struct cs_component_vals {
1198 struct adiv5_ap *ap;
1199 target_addr_t component_base;
1200 uint64_t pid;
1201 uint32_t cid;
1202 uint32_t devarch;
1203 uint32_t devid;
1204 uint32_t devtype_memtype;
1205 enum coresight_access_mode mode;
1206 };
1207
1208 /**
1209 * Helper to read CoreSight component's registers, either on the bus
1210 * behind a MEM-AP or directly in the AP.
1211 *
1212 * @param mode Method to access the component (AP or MEM-AP).
1213 * @param ap Pointer to AP containing the component.
1214 * @param component_base On MEM-AP access method, base address of the component.
1215 * @param reg Offset of the component's register to read.
1216 * @param value Pointer to the store the read value.
1217 *
1218 * @return ERROR_OK on success, else a fault code.
1219 */
1220 static int dap_queue_read_reg(enum coresight_access_mode mode, struct adiv5_ap *ap,
1221 uint64_t component_base, unsigned int reg, uint32_t *value)
1222 {
1223 if (mode == CS_ACCESS_AP)
1224 return dap_queue_ap_read(ap, reg, value);
1225
1226 /* mode == CS_ACCESS_MEM_AP */
1227 return mem_ap_read_u32(ap, component_base + reg, value);
1228 }
1229
1230 /**
1231 * Read the CoreSight registers needed during ROM Table Parsing (RTP).
1232 *
1233 * @param mode Method to access the component (AP or MEM-AP).
1234 * @param ap Pointer to AP containing the component.
1235 * @param component_base On MEM-AP access method, base address of the component.
1236 * @param v Pointer to the struct holding the value of registers.
1237 *
1238 * @return ERROR_OK on success, else a fault code.
1239 */
1240 static int rtp_read_cs_regs(enum coresight_access_mode mode, struct adiv5_ap *ap,
1241 target_addr_t component_base, struct cs_component_vals *v)
1242 {
1243 assert(IS_ALIGNED(component_base, ARM_CS_ALIGN));
1244 assert(ap && v);
1245
1246 uint32_t cid0, cid1, cid2, cid3;
1247 uint32_t pid0, pid1, pid2, pid3, pid4;
1248 int retval = ERROR_OK;
1249
1250 v->ap = ap;
1251 v->component_base = component_base;
1252 v->mode = mode;
1253
1254 /* sort by offset to gain speed */
1255
1256 /*
1257 * Registers DEVARCH, DEVID and DEVTYPE are valid on Class 0x9 devices
1258 * only, but are at offset above 0xf00, so can be read on any device
1259 * without triggering error. Read them for eventual use on Class 0x9.
1260 */
1261 if (retval == ERROR_OK)
1262 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_C9_DEVARCH, &v->devarch);
1263
1264 if (retval == ERROR_OK)
1265 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_C9_DEVID, &v->devid);
1266
1267 /* Same address as ARM_CS_C1_MEMTYPE */
1268 if (retval == ERROR_OK)
1269 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_C9_DEVTYPE, &v->devtype_memtype);
1270
1271 if (retval == ERROR_OK)
1272 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_PIDR4, &pid4);
1273
1274 if (retval == ERROR_OK)
1275 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_PIDR0, &pid0);
1276 if (retval == ERROR_OK)
1277 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_PIDR1, &pid1);
1278 if (retval == ERROR_OK)
1279 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_PIDR2, &pid2);
1280 if (retval == ERROR_OK)
1281 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_PIDR3, &pid3);
1282
1283 if (retval == ERROR_OK)
1284 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_CIDR0, &cid0);
1285 if (retval == ERROR_OK)
1286 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_CIDR1, &cid1);
1287 if (retval == ERROR_OK)
1288 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_CIDR2, &cid2);
1289 if (retval == ERROR_OK)
1290 retval = dap_queue_read_reg(mode, ap, component_base, ARM_CS_CIDR3, &cid3);
1291
1292 if (retval == ERROR_OK)
1293 retval = dap_run(ap->dap);
1294 if (retval != ERROR_OK) {
1295 LOG_DEBUG("Failed read CoreSight registers");
1296 return retval;
1297 }
1298
1299 v->cid = (cid3 & 0xff) << 24
1300 | (cid2 & 0xff) << 16
1301 | (cid1 & 0xff) << 8
1302 | (cid0 & 0xff);
1303 v->pid = (uint64_t)(pid4 & 0xff) << 32
1304 | (pid3 & 0xff) << 24
1305 | (pid2 & 0xff) << 16
1306 | (pid1 & 0xff) << 8
1307 | (pid0 & 0xff);
1308
1309 return ERROR_OK;
1310 }
1311
1312 /* Part number interpretations are from Cortex
1313 * core specs, the CoreSight components TRM
1314 * (ARM DDI 0314H), CoreSight System Design
1315 * Guide (ARM DGI 0012D) and ETM specs; also
1316 * from chip observation (e.g. TI SDTI).
1317 */
1318
1319 static const struct dap_part_nums {
1320 uint16_t designer_id;
1321 uint16_t part_num;
1322 const char *type;
1323 const char *full;
1324 } dap_part_nums[] = {
1325 { ARM_ID, 0x000, "Cortex-M3 SCS", "(System Control Space)", },
1326 { ARM_ID, 0x001, "Cortex-M3 ITM", "(Instrumentation Trace Module)", },
1327 { ARM_ID, 0x002, "Cortex-M3 DWT", "(Data Watchpoint and Trace)", },
1328 { ARM_ID, 0x003, "Cortex-M3 FPB", "(Flash Patch and Breakpoint)", },
1329 { ARM_ID, 0x008, "Cortex-M0 SCS", "(System Control Space)", },
1330 { ARM_ID, 0x00a, "Cortex-M0 DWT", "(Data Watchpoint and Trace)", },
1331 { ARM_ID, 0x00b, "Cortex-M0 BPU", "(Breakpoint Unit)", },
1332 { ARM_ID, 0x00c, "Cortex-M4 SCS", "(System Control Space)", },
1333 { ARM_ID, 0x00d, "CoreSight ETM11", "(Embedded Trace)", },
1334 { ARM_ID, 0x00e, "Cortex-M7 FPB", "(Flash Patch and Breakpoint)", },
1335 { ARM_ID, 0x193, "SoC-600 TSGEN", "(Timestamp Generator)", },
1336 { ARM_ID, 0x470, "Cortex-M1 ROM", "(ROM Table)", },
1337 { ARM_ID, 0x471, "Cortex-M0 ROM", "(ROM Table)", },
1338 { ARM_ID, 0x490, "Cortex-A15 GIC", "(Generic Interrupt Controller)", },
1339 { ARM_ID, 0x492, "Cortex-R52 GICD", "(Distributor)", },
1340 { ARM_ID, 0x493, "Cortex-R52 GICR", "(Redistributor)", },
1341 { ARM_ID, 0x4a1, "Cortex-A53 ROM", "(v8 Memory Map ROM Table)", },
1342 { ARM_ID, 0x4a2, "Cortex-A57 ROM", "(ROM Table)", },
1343 { ARM_ID, 0x4a3, "Cortex-A53 ROM", "(v7 Memory Map ROM Table)", },
1344 { ARM_ID, 0x4a4, "Cortex-A72 ROM", "(ROM Table)", },
1345 { ARM_ID, 0x4a9, "Cortex-A9 ROM", "(ROM Table)", },
1346 { ARM_ID, 0x4aa, "Cortex-A35 ROM", "(v8 Memory Map ROM Table)", },
1347 { ARM_ID, 0x4af, "Cortex-A15 ROM", "(ROM Table)", },
1348 { ARM_ID, 0x4b5, "Cortex-R5 ROM", "(ROM Table)", },
1349 { ARM_ID, 0x4b8, "Cortex-R52 ROM", "(ROM Table)", },
1350 { ARM_ID, 0x4c0, "Cortex-M0+ ROM", "(ROM Table)", },
1351 { ARM_ID, 0x4c3, "Cortex-M3 ROM", "(ROM Table)", },
1352 { ARM_ID, 0x4c4, "Cortex-M4 ROM", "(ROM Table)", },
1353 { ARM_ID, 0x4c7, "Cortex-M7 PPB ROM", "(Private Peripheral Bus ROM Table)", },
1354 { ARM_ID, 0x4c8, "Cortex-M7 ROM", "(ROM Table)", },
1355 { ARM_ID, 0x4e0, "Cortex-A35 ROM", "(v7 Memory Map ROM Table)", },
1356 { ARM_ID, 0x4e4, "Cortex-A76 ROM", "(ROM Table)", },
1357 { ARM_ID, 0x906, "CoreSight CTI", "(Cross Trigger)", },
1358 { ARM_ID, 0x907, "CoreSight ETB", "(Trace Buffer)", },
1359 { ARM_ID, 0x908, "CoreSight CSTF", "(Trace Funnel)", },
1360 { ARM_ID, 0x909, "CoreSight ATBR", "(Advanced Trace Bus Replicator)", },
1361 { ARM_ID, 0x910, "CoreSight ETM9", "(Embedded Trace)", },
1362 { ARM_ID, 0x912, "CoreSight TPIU", "(Trace Port Interface Unit)", },
1363 { ARM_ID, 0x913, "CoreSight ITM", "(Instrumentation Trace Macrocell)", },
1364 { ARM_ID, 0x914, "CoreSight SWO", "(Single Wire Output)", },
1365 { ARM_ID, 0x917, "CoreSight HTM", "(AHB Trace Macrocell)", },
1366 { ARM_ID, 0x920, "CoreSight ETM11", "(Embedded Trace)", },
1367 { ARM_ID, 0x921, "Cortex-A8 ETM", "(Embedded Trace)", },
1368 { ARM_ID, 0x922, "Cortex-A8 CTI", "(Cross Trigger)", },
1369 { ARM_ID, 0x923, "Cortex-M3 TPIU", "(Trace Port Interface Unit)", },
1370 { ARM_ID, 0x924, "Cortex-M3 ETM", "(Embedded Trace)", },
1371 { ARM_ID, 0x925, "Cortex-M4 ETM", "(Embedded Trace)", },
1372 { ARM_ID, 0x930, "Cortex-R4 ETM", "(Embedded Trace)", },
1373 { ARM_ID, 0x931, "Cortex-R5 ETM", "(Embedded Trace)", },
1374 { ARM_ID, 0x932, "CoreSight MTB-M0+", "(Micro Trace Buffer)", },
1375 { ARM_ID, 0x941, "CoreSight TPIU-Lite", "(Trace Port Interface Unit)", },
1376 { ARM_ID, 0x950, "Cortex-A9 PTM", "(Program Trace Macrocell)", },
1377 { ARM_ID, 0x955, "Cortex-A5 ETM", "(Embedded Trace)", },
1378 { ARM_ID, 0x95a, "Cortex-A72 ETM", "(Embedded Trace)", },
1379 { ARM_ID, 0x95b, "Cortex-A17 PTM", "(Program Trace Macrocell)", },
1380 { ARM_ID, 0x95d, "Cortex-A53 ETM", "(Embedded Trace)", },
1381 { ARM_ID, 0x95e, "Cortex-A57 ETM", "(Embedded Trace)", },
1382 { ARM_ID, 0x95f, "Cortex-A15 PTM", "(Program Trace Macrocell)", },
1383 { ARM_ID, 0x961, "CoreSight TMC", "(Trace Memory Controller)", },
1384 { ARM_ID, 0x962, "CoreSight STM", "(System Trace Macrocell)", },
1385 { ARM_ID, 0x975, "Cortex-M7 ETM", "(Embedded Trace)", },
1386 { ARM_ID, 0x9a0, "CoreSight PMU", "(Performance Monitoring Unit)", },
1387 { ARM_ID, 0x9a1, "Cortex-M4 TPIU", "(Trace Port Interface Unit)", },
1388 { ARM_ID, 0x9a4, "CoreSight GPR", "(Granular Power Requester)", },
1389 { ARM_ID, 0x9a5, "Cortex-A5 PMU", "(Performance Monitor Unit)", },
1390 { ARM_ID, 0x9a7, "Cortex-A7 PMU", "(Performance Monitor Unit)", },
1391 { ARM_ID, 0x9a8, "Cortex-A53 CTI", "(Cross Trigger)", },
1392 { ARM_ID, 0x9a9, "Cortex-M7 TPIU", "(Trace Port Interface Unit)", },
1393 { ARM_ID, 0x9ae, "Cortex-A17 PMU", "(Performance Monitor Unit)", },
1394 { ARM_ID, 0x9af, "Cortex-A15 PMU", "(Performance Monitor Unit)", },
1395 { ARM_ID, 0x9b6, "Cortex-R52 PMU/CTI/ETM", "(Performance Monitor Unit/Cross Trigger/ETM)", },
1396 { ARM_ID, 0x9b7, "Cortex-R7 PMU", "(Performance Monitor Unit)", },
1397 { ARM_ID, 0x9d3, "Cortex-A53 PMU", "(Performance Monitor Unit)", },
1398 { ARM_ID, 0x9d7, "Cortex-A57 PMU", "(Performance Monitor Unit)", },
1399 { ARM_ID, 0x9d8, "Cortex-A72 PMU", "(Performance Monitor Unit)", },
1400 { ARM_ID, 0x9da, "Cortex-A35 PMU/CTI/ETM", "(Performance Monitor Unit/Cross Trigger/ETM)", },
1401 { ARM_ID, 0x9e2, "SoC-600 APB-AP", "(APB4 Memory Access Port)", },
1402 { ARM_ID, 0x9e3, "SoC-600 AHB-AP", "(AHB5 Memory Access Port)", },
1403 { ARM_ID, 0x9e4, "SoC-600 AXI-AP", "(AXI Memory Access Port)", },
1404 { ARM_ID, 0x9e5, "SoC-600 APv1 Adapter", "(Access Port v1 Adapter)", },
1405 { ARM_ID, 0x9e6, "SoC-600 JTAG-AP", "(JTAG Access Port)", },
1406 { ARM_ID, 0x9e7, "SoC-600 TPIU", "(Trace Port Interface Unit)", },
1407 { ARM_ID, 0x9e8, "SoC-600 TMC ETR/ETS", "(Embedded Trace Router/Streamer)", },
1408 { ARM_ID, 0x9e9, "SoC-600 TMC ETB", "(Embedded Trace Buffer)", },
1409 { ARM_ID, 0x9ea, "SoC-600 TMC ETF", "(Embedded Trace FIFO)", },
1410 { ARM_ID, 0x9eb, "SoC-600 ATB Funnel", "(Trace Funnel)", },
1411 { ARM_ID, 0x9ec, "SoC-600 ATB Replicator", "(Trace Replicator)", },
1412 { ARM_ID, 0x9ed, "SoC-600 CTI", "(Cross Trigger)", },
1413 { ARM_ID, 0x9ee, "SoC-600 CATU", "(Address Translation Unit)", },
1414 { ARM_ID, 0xc05, "Cortex-A5 Debug", "(Debug Unit)", },
1415 { ARM_ID, 0xc07, "Cortex-A7 Debug", "(Debug Unit)", },
1416 { ARM_ID, 0xc08, "Cortex-A8 Debug", "(Debug Unit)", },
1417 { ARM_ID, 0xc09, "Cortex-A9 Debug", "(Debug Unit)", },
1418 { ARM_ID, 0xc0e, "Cortex-A17 Debug", "(Debug Unit)", },
1419 { ARM_ID, 0xc0f, "Cortex-A15 Debug", "(Debug Unit)", },
1420 { ARM_ID, 0xc14, "Cortex-R4 Debug", "(Debug Unit)", },
1421 { ARM_ID, 0xc15, "Cortex-R5 Debug", "(Debug Unit)", },
1422 { ARM_ID, 0xc17, "Cortex-R7 Debug", "(Debug Unit)", },
1423 { ARM_ID, 0xd03, "Cortex-A53 Debug", "(Debug Unit)", },
1424 { ARM_ID, 0xd04, "Cortex-A35 Debug", "(Debug Unit)", },
1425 { ARM_ID, 0xd07, "Cortex-A57 Debug", "(Debug Unit)", },
1426 { ARM_ID, 0xd08, "Cortex-A72 Debug", "(Debug Unit)", },
1427 { ARM_ID, 0xd0b, "Cortex-A76 Debug", "(Debug Unit)", },
1428 { ARM_ID, 0xd0c, "Neoverse N1", "(Debug Unit)", },
1429 { ARM_ID, 0xd13, "Cortex-R52 Debug", "(Debug Unit)", },
1430 { ARM_ID, 0xd49, "Neoverse N2", "(Debug Unit)", },
1431 { 0x017, 0x120, "TI SDTI", "(System Debug Trace Interface)", }, /* from OMAP3 memmap */
1432 { 0x017, 0x343, "TI DAPCTL", "", }, /* from OMAP3 memmap */
1433 { 0x017, 0x9af, "MSP432 ROM", "(ROM Table)" },
1434 { 0x01f, 0xcd0, "Atmel CPU with DSU", "(CPU)" },
1435 { 0x041, 0x1db, "XMC4500 ROM", "(ROM Table)" },
1436 { 0x041, 0x1df, "XMC4700/4800 ROM", "(ROM Table)" },
1437 { 0x041, 0x1ed, "XMC1000 ROM", "(ROM Table)" },
1438 { 0x065, 0x000, "SHARC+/Blackfin+", "", },
1439 { 0x070, 0x440, "Qualcomm QDSS Component v1", "(Qualcomm Designed CoreSight Component v1)", },
1440 { 0x0bf, 0x100, "Brahma-B53 Debug", "(Debug Unit)", },
1441 { 0x0bf, 0x9d3, "Brahma-B53 PMU", "(Performance Monitor Unit)", },
1442 { 0x0bf, 0x4a1, "Brahma-B53 ROM", "(ROM Table)", },
1443 { 0x0bf, 0x721, "Brahma-B53 ROM", "(ROM Table)", },
1444 { 0x1eb, 0x181, "Tegra 186 ROM", "(ROM Table)", },
1445 { 0x1eb, 0x202, "Denver ETM", "(Denver Embedded Trace)", },
1446 { 0x1eb, 0x211, "Tegra 210 ROM", "(ROM Table)", },
1447 { 0x1eb, 0x302, "Denver Debug", "(Debug Unit)", },
1448 { 0x1eb, 0x402, "Denver PMU", "(Performance Monitor Unit)", },
1449 };
1450
1451 static const struct dap_part_nums *pidr_to_part_num(unsigned int designer_id, unsigned int part_num)
1452 {
1453 static const struct dap_part_nums unknown = {
1454 .type = "Unrecognized",
1455 .full = "",
1456 };
1457
1458 for (unsigned int i = 0; i < ARRAY_SIZE(dap_part_nums); i++)
1459 if (dap_part_nums[i].designer_id == designer_id && dap_part_nums[i].part_num == part_num)
1460 return &dap_part_nums[i];
1461
1462 return &unknown;
1463 }
1464
1465 static int dap_devtype_display(struct command_invocation *cmd, uint32_t devtype)
1466 {
1467 const char *major = "Reserved", *subtype = "Reserved";
1468 const unsigned int minor = (devtype & ARM_CS_C9_DEVTYPE_SUB_MASK) >> ARM_CS_C9_DEVTYPE_SUB_SHIFT;
1469 const unsigned int devtype_major = (devtype & ARM_CS_C9_DEVTYPE_MAJOR_MASK) >> ARM_CS_C9_DEVTYPE_MAJOR_SHIFT;
1470 switch (devtype_major) {
1471 case 0:
1472 major = "Miscellaneous";
1473 switch (minor) {
1474 case 0:
1475 subtype = "other";
1476 break;
1477 case 4:
1478 subtype = "Validation component";
1479 break;
1480 }
1481 break;
1482 case 1:
1483 major = "Trace Sink";
1484 switch (minor) {
1485 case 0:
1486 subtype = "other";
1487 break;
1488 case 1:
1489 subtype = "Port";
1490 break;
1491 case 2:
1492 subtype = "Buffer";
1493 break;
1494 case 3:
1495 subtype = "Router";
1496 break;
1497 }
1498 break;
1499 case 2:
1500 major = "Trace Link";
1501 switch (minor) {
1502 case 0:
1503 subtype = "other";
1504 break;
1505 case 1:
1506 subtype = "Funnel, router";
1507 break;
1508 case 2:
1509 subtype = "Filter";
1510 break;
1511 case 3:
1512 subtype = "FIFO, buffer";
1513 break;
1514 }
1515 break;
1516 case 3:
1517 major = "Trace Source";
1518 switch (minor) {
1519 case 0:
1520 subtype = "other";
1521 break;
1522 case 1:
1523 subtype = "Processor";
1524 break;
1525 case 2:
1526 subtype = "DSP";
1527 break;
1528 case 3:
1529 subtype = "Engine/Coprocessor";
1530 break;
1531 case 4:
1532 subtype = "Bus";
1533 break;
1534 case 6:
1535 subtype = "Software";
1536 break;
1537 }
1538 break;
1539 case 4:
1540 major = "Debug Control";
1541 switch (minor) {
1542 case 0:
1543 subtype = "other";
1544 break;
1545 case 1:
1546 subtype = "Trigger Matrix";
1547 break;
1548 case 2:
1549 subtype = "Debug Auth";
1550 break;
1551 case 3:
1552 subtype = "Power Requestor";
1553 break;
1554 }
1555 break;
1556 case 5:
1557 major = "Debug Logic";
1558 switch (minor) {
1559 case 0:
1560 subtype = "other";
1561 break;
1562 case 1:
1563 subtype = "Processor";
1564 break;
1565 case 2:
1566 subtype = "DSP";
1567 break;
1568 case 3:
1569 subtype = "Engine/Coprocessor";
1570 break;
1571 case 4:
1572 subtype = "Bus";
1573 break;
1574 case 5:
1575 subtype = "Memory";
1576 break;
1577 }
1578 break;
1579 case 6:
1580 major = "Performance Monitor";
1581 switch (minor) {
1582 case 0:
1583 subtype = "other";
1584 break;
1585 case 1:
1586 subtype = "Processor";
1587 break;
1588 case 2:
1589 subtype = "DSP";
1590 break;
1591 case 3:
1592 subtype = "Engine/Coprocessor";
1593 break;
1594 case 4:
1595 subtype = "Bus";
1596 break;
1597 case 5:
1598 subtype = "Memory";
1599 break;
1600 }
1601 break;
1602 }
1603 command_print(cmd, "\t\tType is 0x%02x, %s, %s",
1604 devtype & ARM_CS_C9_DEVTYPE_MASK,
1605 major, subtype);
1606 return ERROR_OK;
1607 }
1608
1609 /**
1610 * Actions/operations to be executed while parsing ROM tables.
1611 */
1612 struct rtp_ops {
1613 /**
1614 * Executed at the start of a new AP, typically to print the AP header.
1615 * @param ap Pointer to AP.
1616 * @param depth The current depth level of ROM table.
1617 * @param priv Pointer to private data.
1618 * @return ERROR_OK on success, else a fault code.
1619 */
1620 int (*ap_header)(struct adiv5_ap *ap, int depth, void *priv);
1621 /**
1622 * Executed at the start of a new MEM-AP, typically to print the MEM-AP header.
1623 * @param retval Error encountered while reading AP.
1624 * @param ap Pointer to AP.
1625 * @param dbgbase Value of MEM-AP Debug Base Address register.
1626 * @param apid Value of MEM-AP IDR Identification Register.
1627 * @param depth The current depth level of ROM table.
1628 * @param priv Pointer to private data.
1629 * @return ERROR_OK on success, else a fault code.
1630 */
1631 int (*mem_ap_header)(int retval, struct adiv5_ap *ap, uint64_t dbgbase,
1632 uint32_t apid, int depth, void *priv);
1633 /**
1634 * Executed when a CoreSight component is parsed, typically to print
1635 * information on the component.
1636 * @param retval Error encountered while reading component's registers.
1637 * @param v Pointer to a container of the component's registers.
1638 * @param depth The current depth level of ROM table.
1639 * @param priv Pointer to private data.
1640 * @return ERROR_OK on success, else a fault code.
1641 */
1642 int (*cs_component)(int retval, struct cs_component_vals *v, int depth, void *priv);
1643 /**
1644 * Executed for each entry of a ROM table, typically to print the entry
1645 * and information about validity or end-of-table mark.
1646 * @param retval Error encountered while reading the ROM table entry.
1647 * @param depth The current depth level of ROM table.
1648 * @param offset The offset of the entry in the ROM table.
1649 * @param romentry The value of the ROM table entry.
1650 * @param priv Pointer to private data.
1651 * @return ERROR_OK on success, else a fault code.
1652 */
1653 int (*rom_table_entry)(int retval, int depth, unsigned int offset, uint64_t romentry,
1654 void *priv);
1655 /**
1656 * Private data
1657 */
1658 void *priv;
1659 };
1660
1661 /**
1662 * Wrapper around struct rtp_ops::ap_header.
1663 */
1664 static int rtp_ops_ap_header(const struct rtp_ops *ops,
1665 struct adiv5_ap *ap, int depth)
1666 {
1667 if (ops->ap_header)
1668 return ops->ap_header(ap, depth, ops->priv);
1669
1670 return ERROR_OK;
1671 }
1672
1673 /**
1674 * Wrapper around struct rtp_ops::mem_ap_header.
1675 * Input parameter @a retval is propagated.
1676 */
1677 static int rtp_ops_mem_ap_header(const struct rtp_ops *ops,
1678 int retval, struct adiv5_ap *ap, uint64_t dbgbase, uint32_t apid, int depth)
1679 {
1680 if (!ops->mem_ap_header)
1681 return retval;
1682
1683 int retval1 = ops->mem_ap_header(retval, ap, dbgbase, apid, depth, ops->priv);
1684 if (retval != ERROR_OK)
1685 return retval;
1686 return retval1;
1687 }
1688
1689 /**
1690 * Wrapper around struct rtp_ops::cs_component.
1691 * Input parameter @a retval is propagated.
1692 */
1693 static int rtp_ops_cs_component(const struct rtp_ops *ops,
1694 int retval, struct cs_component_vals *v, int depth)
1695 {
1696 if (!ops->cs_component)
1697 return retval;
1698
1699 int retval1 = ops->cs_component(retval, v, depth, ops->priv);
1700 if (retval != ERROR_OK)
1701 return retval;
1702 return retval1;
1703 }
1704
1705 /**
1706 * Wrapper around struct rtp_ops::rom_table_entry.
1707 * Input parameter @a retval is propagated.
1708 */
1709 static int rtp_ops_rom_table_entry(const struct rtp_ops *ops,
1710 int retval, int depth, unsigned int offset, uint64_t romentry)
1711 {
1712 if (!ops->rom_table_entry)
1713 return retval;
1714
1715 int retval1 = ops->rom_table_entry(retval, depth, offset, romentry, ops->priv);
1716 if (retval != ERROR_OK)
1717 return retval;
1718 return retval1;
1719 }
1720
1721 /* Broken ROM tables can have circular references. Stop after a while */
1722 #define ROM_TABLE_MAX_DEPTH (16)
1723
1724 /**
1725 * Value used only during lookup of a CoreSight component in ROM table.
1726 * Return CORESIGHT_COMPONENT_FOUND when component is found.
1727 * Return ERROR_OK when component is not found yet.
1728 * Return any other ERROR_* in case of error.
1729 */
1730 #define CORESIGHT_COMPONENT_FOUND (1)
1731
1732 static int rtp_ap(const struct rtp_ops *ops, struct adiv5_ap *ap, int depth);
1733 static int rtp_cs_component(enum coresight_access_mode mode, const struct rtp_ops *ops,
1734 struct adiv5_ap *ap, target_addr_t dbgbase, bool *is_mem_ap, int depth);
1735
1736 static int rtp_rom_loop(enum coresight_access_mode mode, const struct rtp_ops *ops,
1737 struct adiv5_ap *ap, target_addr_t base_address, int depth,
1738 unsigned int width, unsigned int max_entries)
1739 {
1740 /* ADIv6 AP ROM table provide offset from current AP */
1741 if (mode == CS_ACCESS_AP)
1742 base_address = ap->ap_num;
1743
1744 assert(IS_ALIGNED(base_address, ARM_CS_ALIGN));
1745
1746 unsigned int offset = 0;
1747 while (max_entries--) {
1748 uint64_t romentry;
1749 uint32_t romentry_low, romentry_high;
1750 target_addr_t component_base;
1751 unsigned int saved_offset = offset;
1752
1753 int retval = dap_queue_read_reg(mode, ap, base_address, offset, &romentry_low);
1754 offset += 4;
1755 if (retval == ERROR_OK && width == 64) {
1756 retval = dap_queue_read_reg(mode, ap, base_address, offset, &romentry_high);
1757 offset += 4;
1758 }
1759 if (retval == ERROR_OK)
1760 retval = dap_run(ap->dap);
1761 if (retval != ERROR_OK) {
1762 LOG_DEBUG("Failed read ROM table entry");
1763 return retval;
1764 }
1765
1766 if (width == 64) {
1767 romentry = (((uint64_t)romentry_high) << 32) | romentry_low;
1768 component_base = base_address +
1769 ((((uint64_t)romentry_high) << 32) | (romentry_low & ARM_CS_ROMENTRY_OFFSET_MASK));
1770 } else {
1771 romentry = romentry_low;
1772 /* "romentry" is signed */
1773 component_base = base_address + (int32_t)(romentry_low & ARM_CS_ROMENTRY_OFFSET_MASK);
1774 if (!is_64bit_ap(ap))
1775 component_base = (uint32_t)component_base;
1776 }
1777 retval = rtp_ops_rom_table_entry(ops, retval, depth, saved_offset, romentry);
1778 if (retval != ERROR_OK)
1779 return retval;
1780
1781 if (romentry == 0) {
1782 /* End of ROM table */
1783 break;
1784 }
1785
1786 if (!(romentry & ARM_CS_ROMENTRY_PRESENT))
1787 continue;
1788
1789 /* Recurse */
1790 if (mode == CS_ACCESS_AP) {
1791 struct adiv5_ap *next_ap = dap_get_ap(ap->dap, component_base);
1792 if (!next_ap) {
1793 LOG_DEBUG("Wrong AP # 0x%" PRIx64, component_base);
1794 continue;
1795 }
1796 retval = rtp_ap(ops, next_ap, depth + 1);
1797 dap_put_ap(next_ap);
1798 } else {
1799 /* mode == CS_ACCESS_MEM_AP */
1800 retval = rtp_cs_component(mode, ops, ap, component_base, NULL, depth + 1);
1801 }
1802 if (retval == CORESIGHT_COMPONENT_FOUND)
1803 return CORESIGHT_COMPONENT_FOUND;
1804 if (retval != ERROR_OK) {
1805 /* TODO: do we need to send an ABORT before continuing? */
1806 LOG_DEBUG("Ignore error parsing CoreSight component");
1807 continue;
1808 }
1809 }
1810
1811 return ERROR_OK;
1812 }
1813
1814 static int rtp_cs_component(enum coresight_access_mode mode, const struct rtp_ops *ops,
1815 struct adiv5_ap *ap, target_addr_t base_address, bool *is_mem_ap, int depth)
1816 {
1817 struct cs_component_vals v;
1818 int retval;
1819
1820 assert(IS_ALIGNED(base_address, ARM_CS_ALIGN));
1821
1822 if (is_mem_ap)
1823 *is_mem_ap = false;
1824
1825 if (depth > ROM_TABLE_MAX_DEPTH)
1826 retval = ERROR_FAIL;
1827 else
1828 retval = rtp_read_cs_regs(mode, ap, base_address, &v);
1829
1830 retval = rtp_ops_cs_component(ops, retval, &v, depth);
1831 if (retval == CORESIGHT_COMPONENT_FOUND)
1832 return CORESIGHT_COMPONENT_FOUND;
1833 if (retval != ERROR_OK)
1834 return ERROR_OK; /* Don't abort recursion */
1835
1836 if (!is_valid_arm_cs_cidr(v.cid))
1837 return ERROR_OK; /* Don't abort recursion */
1838
1839 const unsigned int class = ARM_CS_CIDR_CLASS(v.cid);
1840
1841 if (class == ARM_CS_CLASS_0X1_ROM_TABLE)
1842 return rtp_rom_loop(mode, ops, ap, base_address, depth, 32, 960);
1843
1844 if (class == ARM_CS_CLASS_0X9_CS_COMPONENT) {
1845 if ((v.devarch & ARM_CS_C9_DEVARCH_PRESENT) == 0)
1846 return ERROR_OK;
1847
1848 if (is_mem_ap) {
1849 if ((v.devarch & DEVARCH_ID_MASK) == DEVARCH_MEM_AP)
1850 *is_mem_ap = true;
1851
1852 /* SoC-600 APv1 Adapter */
1853 if ((v.devarch & DEVARCH_ID_MASK) == DEVARCH_UNKNOWN_V2 &&
1854 ARM_CS_PIDR_DESIGNER(v.pid) == ARM_ID &&
1855 ARM_CS_PIDR_PART(v.pid) == 0x9e5)
1856 *is_mem_ap = true;
1857 }
1858
1859 /* quit if not ROM table */
1860 if ((v.devarch & DEVARCH_ID_MASK) != DEVARCH_ROM_C_0X9)
1861 return ERROR_OK;
1862
1863 if ((v.devid & ARM_CS_C9_DEVID_FORMAT_MASK) == ARM_CS_C9_DEVID_FORMAT_64BIT)
1864 return rtp_rom_loop(mode, ops, ap, base_address, depth, 64, 256);
1865 else
1866 return rtp_rom_loop(mode, ops, ap, base_address, depth, 32, 512);
1867 }
1868
1869 /* Class other than 0x1 and 0x9 */
1870 return ERROR_OK;
1871 }
1872
1873 static int rtp_ap(const struct rtp_ops *ops, struct adiv5_ap *ap, int depth)
1874 {
1875 uint32_t apid;
1876 target_addr_t dbgbase, invalid_entry;
1877
1878 int retval = rtp_ops_ap_header(ops, ap, depth);
1879 if (retval != ERROR_OK || depth > ROM_TABLE_MAX_DEPTH)
1880 return ERROR_OK; /* Don't abort recursion */
1881
1882 if (is_adiv6(ap->dap)) {
1883 bool is_mem_ap;
1884 retval = rtp_cs_component(CS_ACCESS_AP, ops, ap, 0, &is_mem_ap, depth);
1885 if (retval == CORESIGHT_COMPONENT_FOUND)
1886 return CORESIGHT_COMPONENT_FOUND;
1887 if (retval != ERROR_OK)
1888 return ERROR_OK; /* Don't abort recursion */
1889
1890 if (!is_mem_ap)
1891 return ERROR_OK;
1892 /* Continue for an ADIv6 MEM-AP or SoC-600 APv1 Adapter */
1893 }
1894
1895 /* Now we read ROM table ID registers, ref. ARM IHI 0029B sec */
1896 retval = dap_get_debugbase(ap, &dbgbase, &apid);
1897 if (retval != ERROR_OK)
1898 return retval;
1899 retval = rtp_ops_mem_ap_header(ops, retval, ap, dbgbase, apid, depth);
1900 if (retval != ERROR_OK)
1901 return retval;
1902
1903 if (apid == 0)
1904 return ERROR_FAIL;
1905
1906 /* NOTE: a MEM-AP may have a single CoreSight component that's
1907 * not a ROM table ... or have no such components at all.
1908 */
1909 const unsigned int class = (apid & AP_REG_IDR_CLASS_MASK) >> AP_REG_IDR_CLASS_SHIFT;
1910
1911 if (class == AP_REG_IDR_CLASS_MEM_AP) {
1912 if (is_64bit_ap(ap))
1913 invalid_entry = 0xFFFFFFFFFFFFFFFFull;
1914 else
1915 invalid_entry = 0xFFFFFFFFul;
1916
1917 if (dbgbase != invalid_entry && (dbgbase & 0x3) != 0x2) {
1918 retval = rtp_cs_component(CS_ACCESS_MEM_AP, ops, ap,
1919 dbgbase & 0xFFFFFFFFFFFFF000ull, NULL, depth);
1920 if (retval == CORESIGHT_COMPONENT_FOUND)
1921 return CORESIGHT_COMPONENT_FOUND;
1922 }
1923 }
1924
1925 return ERROR_OK;
1926 }
1927
1928 /* Actions for command "dap info" */
1929
1930 static int dap_info_ap_header(struct adiv5_ap *ap, int depth, void *priv)
1931 {
1932 struct command_invocation *cmd = priv;
1933
1934 if (depth > ROM_TABLE_MAX_DEPTH) {
1935 command_print(cmd, "\tTables too deep");
1936 return ERROR_FAIL;
1937 }
1938
1939 command_print(cmd, "%sAP # 0x%" PRIx64, (depth) ? "\t\t" : "", ap->ap_num);
1940 return ERROR_OK;
1941 }
1942
1943 static int dap_info_mem_ap_header(int retval, struct adiv5_ap *ap,
1944 target_addr_t dbgbase, uint32_t apid, int depth, void *priv)
1945 {
1946 struct command_invocation *cmd = priv;
1947 target_addr_t invalid_entry;
1948 char tabs[17] = "";
1949
1950 if (retval != ERROR_OK) {
1951 command_print(cmd, "\t\tCan't read MEM-AP, the corresponding core might be turned off");
1952 return retval;
1953 }
1954
1955 if (depth > ROM_TABLE_MAX_DEPTH) {
1956 command_print(cmd, "\tTables too deep");
1957 return ERROR_FAIL;
1958 }
1959
1960 if (depth)
1961 snprintf(tabs, sizeof(tabs), "\t[L%02d] ", depth);
1962
1963 command_print(cmd, "\t\tAP ID register 0x%8.8" PRIx32, apid);
1964 if (apid == 0) {
1965 command_print(cmd, "\t\tNo AP found at this AP#0x%" PRIx64, ap->ap_num);
1966 return ERROR_FAIL;
1967 }
1968
1969 command_print(cmd, "\t\tType is %s", ap_type_to_description(apid & AP_TYPE_MASK));
1970
1971 /* NOTE: a MEM-AP may have a single CoreSight component that's
1972 * not a ROM table ... or have no such components at all.
1973 */
1974 const unsigned int class = (apid & AP_REG_IDR_CLASS_MASK) >> AP_REG_IDR_CLASS_SHIFT;
1975
1976 if (class == AP_REG_IDR_CLASS_MEM_AP) {
1977 if (is_64bit_ap(ap))
1978 invalid_entry = 0xFFFFFFFFFFFFFFFFull;
1979 else
1980 invalid_entry = 0xFFFFFFFFul;
1981
1982 command_print(cmd, "%sMEM-AP BASE " TARGET_ADDR_FMT, tabs, dbgbase);
1983
1984 if (dbgbase == invalid_entry || (dbgbase & 0x3) == 0x2) {
1985 command_print(cmd, "\t\tNo ROM table present");
1986 } else {
1987 if (dbgbase & 0x01)
1988 command_print(cmd, "\t\tValid ROM table present");
1989 else
1990 command_print(cmd, "\t\tROM table in legacy format");
1991 }
1992 }
1993
1994 return ERROR_OK;
1995 }
1996
1997 static int dap_info_cs_component(int retval, struct cs_component_vals *v, int depth, void *priv)
1998 {
1999 struct command_invocation *cmd = priv;
2000
2001 if (depth > ROM_TABLE_MAX_DEPTH) {
2002 command_print(cmd, "\tTables too deep");
2003 return ERROR_FAIL;
2004 }
2005
2006 if (v->mode == CS_ACCESS_MEM_AP)
2007 command_print(cmd, "\t\tComponent base address " TARGET_ADDR_FMT, v->component_base);
2008
2009 if (retval != ERROR_OK) {
2010 command_print(cmd, "\t\tCan't read component, the corresponding core might be turned off");
2011 return retval;
2012 }
2013
2014 if (!is_valid_arm_cs_cidr(v->cid)) {
2015 command_print(cmd, "\t\tInvalid CID 0x%08" PRIx32, v->cid);
2016 return ERROR_OK; /* Don't abort recursion */
2017 }
2018
2019 /* component may take multiple 4K pages */
2020 uint32_t size = ARM_CS_PIDR_SIZE(v->pid);
2021 if (size > 0)
2022 command_print(cmd, "\t\tStart address " TARGET_ADDR_FMT, v->component_base - 0x1000 * size);
2023
2024 command_print(cmd, "\t\tPeripheral ID 0x%010" PRIx64, v->pid);
2025
2026 const unsigned int part_num = ARM_CS_PIDR_PART(v->pid);
2027 unsigned int designer_id = ARM_CS_PIDR_DESIGNER(v->pid);
2028
2029 if (v->pid & ARM_CS_PIDR_JEDEC) {
2030 /* JEP106 code */
2031 command_print(cmd, "\t\tDesigner is 0x%03x, %s",
2032 designer_id, jep106_manufacturer(designer_id));
2033 } else {
2034 /* Legacy ASCII ID, clear invalid bits */
2035 designer_id &= 0x7f;
2036 command_print(cmd, "\t\tDesigner ASCII code 0x%02x, %s",
2037 designer_id, designer_id == 0x41 ? "ARM" : "<unknown>");
2038 }
2039
2040 const struct dap_part_nums *partnum = pidr_to_part_num(designer_id, part_num);
2041 command_print(cmd, "\t\tPart is 0x%03x, %s %s", part_num, partnum->type, partnum->full);
2042
2043 const unsigned int class = ARM_CS_CIDR_CLASS(v->cid);
2044 command_print(cmd, "\t\tComponent class is 0x%x, %s", class, class_description[class]);
2045
2046 if (class == ARM_CS_CLASS_0X1_ROM_TABLE) {
2047 if (v->devtype_memtype & ARM_CS_C1_MEMTYPE_SYSMEM_MASK)
2048 command_print(cmd, "\t\tMEMTYPE system memory present on bus");
2049 else
2050 command_print(cmd, "\t\tMEMTYPE system memory not present: dedicated debug bus");
2051 return ERROR_OK;
2052 }
2053
2054 if (class == ARM_CS_CLASS_0X9_CS_COMPONENT) {
2055 dap_devtype_display(cmd, v->devtype_memtype);
2056
2057 /* REVISIT also show ARM_CS_C9_DEVID */
2058
2059 if ((v->devarch & ARM_CS_C9_DEVARCH_PRESENT) == 0)
2060 return ERROR_OK;
2061
2062 unsigned int architect_id = ARM_CS_C9_DEVARCH_ARCHITECT(v->devarch);
2063 unsigned int revision = ARM_CS_C9_DEVARCH_REVISION(v->devarch);
2064 command_print(cmd, "\t\tDev Arch is 0x%08" PRIx32 ", %s \"%s\" rev.%u", v->devarch,
2065 jep106_manufacturer(architect_id), class0x9_devarch_description(v->devarch),
2066 revision);
2067
2068 if ((v->devarch & DEVARCH_ID_MASK) == DEVARCH_ROM_C_0X9) {
2069 command_print(cmd, "\t\tType is ROM table");
2070
2071 if (v->devid & ARM_CS_C9_DEVID_SYSMEM_MASK)
2072 command_print(cmd, "\t\tMEMTYPE system memory present on bus");
2073 else
2074 command_print(cmd, "\t\tMEMTYPE system memory not present: dedicated debug bus");
2075 }
2076 return ERROR_OK;
2077 }
2078
2079 /* Class other than 0x1 and 0x9 */
2080 return ERROR_OK;
2081 }
2082
2083 static int dap_info_rom_table_entry(int retval, int depth,
2084 unsigned int offset, uint64_t romentry, void *priv)
2085 {
2086 struct command_invocation *cmd = priv;
2087 char tabs[16] = "";
2088
2089 if (depth)
2090 snprintf(tabs, sizeof(tabs), "[L%02d] ", depth);
2091
2092 if (retval != ERROR_OK) {
2093 command_print(cmd, "\t%sROMTABLE[0x%x] Read error", tabs, offset);
2094 command_print(cmd, "\t\tUnable to continue");
2095 command_print(cmd, "\t%s\tStop parsing of ROM table", tabs);
2096 return retval;
2097 }
2098
2099 command_print(cmd, "\t%sROMTABLE[0x%x] = 0x%08" PRIx64,
2100 tabs, offset, romentry);
2101
2102 if (romentry == 0) {
2103 command_print(cmd, "\t%s\tEnd of ROM table", tabs);
2104 return ERROR_OK;
2105 }
2106
2107 if (!(romentry & ARM_CS_ROMENTRY_PRESENT)) {
2108 command_print(cmd, "\t\tComponent not present");
2109 return ERROR_OK;
2110 }
2111
2112 return ERROR_OK;
2113 }
2114
2115 int dap_info_command(struct command_invocation *cmd, struct adiv5_ap *ap)
2116 {
2117 struct rtp_ops dap_info_ops = {
2118 .ap_header = dap_info_ap_header,
2119 .mem_ap_header = dap_info_mem_ap_header,
2120 .cs_component = dap_info_cs_component,
2121 .rom_table_entry = dap_info_rom_table_entry,
2122 .priv = cmd,
2123 };
2124
2125 return rtp_ap(&dap_info_ops, ap, 0);
2126 }
2127
2128 /* Actions for dap_lookup_cs_component() */
2129
2130 struct dap_lookup_data {
2131 /* input */
2132 unsigned int idx;
2133 unsigned int type;
2134 /* output */
2135 uint64_t component_base;
2136 uint64_t ap_num;
2137 };
2138
2139 static int dap_lookup_cs_component_cs_component(int retval,
2140 struct cs_component_vals *v, int depth, void *priv)
2141 {
2142 struct dap_lookup_data *lookup = priv;
2143
2144 if (retval != ERROR_OK)
2145 return retval;
2146
2147 if (!is_valid_arm_cs_cidr(v->cid))
2148 return ERROR_OK;
2149
2150 const unsigned int class = ARM_CS_CIDR_CLASS(v->cid);
2151 if (class != ARM_CS_CLASS_0X9_CS_COMPONENT)
2152 return ERROR_OK;
2153
2154 if ((v->devtype_memtype & ARM_CS_C9_DEVTYPE_MASK) != lookup->type)
2155 return ERROR_OK;
2156
2157 if (lookup->idx) {
2158 /* search for next one */
2159 --lookup->idx;
2160 return ERROR_OK;
2161 }
2162
2163 /* Found! */
2164 lookup->component_base = v->component_base;
2165 lookup->ap_num = v->ap->ap_num;
2166 return CORESIGHT_COMPONENT_FOUND;
2167 }
2168
2169 int dap_lookup_cs_component(struct adiv5_ap *ap, uint8_t type,
2170 target_addr_t *addr, int32_t core_id)
2171 {
2172 struct dap_lookup_data lookup = {
2173 .type = type,
2174 .idx = core_id,
2175 };
2176 struct rtp_ops dap_lookup_cs_component_ops = {
2177 .ap_header = NULL,
2178 .mem_ap_header = NULL,
2179 .cs_component = dap_lookup_cs_component_cs_component,
2180 .rom_table_entry = NULL,
2181 .priv = &lookup,
2182 };
2183
2184 int retval = rtp_ap(&dap_lookup_cs_component_ops, ap, 0);
2185 if (retval == CORESIGHT_COMPONENT_FOUND) {
2186 if (lookup.ap_num != ap->ap_num) {
2187 /* TODO: handle search from root ROM table */
2188 LOG_DEBUG("CS lookup ended in AP # 0x%" PRIx64 ". Ignore it", lookup.ap_num);
2189 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE;
2190 }
2191 LOG_DEBUG("CS lookup found at 0x%" PRIx64, lookup.component_base);
2192 *addr = lookup.component_base;
2193 return ERROR_OK;
2194 }
2195 if (retval != ERROR_OK) {
2196 LOG_DEBUG("CS lookup error %d", retval);
2197 return retval;
2198 }
2199 LOG_DEBUG("CS lookup not found");
2200 return ERROR_TARGET_RESOURCE_NOT_AVAILABLE;
2201 }
2202
2203 enum adiv5_cfg_param {
2204 CFG_DAP,
2205 CFG_AP_NUM,
2206 CFG_BASEADDR,
2207 CFG_CTIBASE, /* DEPRECATED */
2208 };
2209
2210 static const struct jim_nvp nvp_config_opts[] = {
2211 { .name = "-dap", .value = CFG_DAP },
2212 { .name = "-ap-num", .value = CFG_AP_NUM },
2213 { .name = "-baseaddr", .value = CFG_BASEADDR },
2214 { .name = "-ctibase", .value = CFG_CTIBASE }, /* DEPRECATED */
2215 { .name = NULL, .value = -1 }
2216 };
2217
2218 static int adiv5_jim_spot_configure(struct jim_getopt_info *goi,
2219 struct adiv5_dap **dap_p, uint64_t *ap_num_p, uint32_t *base_p)
2220 {
2221 assert(dap_p && ap_num_p);
2222
2223 if (!goi->argc)
2224 return JIM_OK;
2225
2226 Jim_SetEmptyResult(goi->interp);
2227
2228 struct jim_nvp *n;
2229 int e = jim_nvp_name2value_obj(goi->interp, nvp_config_opts,
2230 goi->argv[0], &n);
2231 if (e != JIM_OK)
2232 return JIM_CONTINUE;
2233
2234 /* base_p can be NULL, then '-baseaddr' option is treated as unknown */
2235 if (!base_p && (n->value == CFG_BASEADDR || n->value == CFG_CTIBASE))
2236 return JIM_CONTINUE;
2237
2238 e = jim_getopt_obj(goi, NULL);
2239 if (e != JIM_OK)
2240 return e;
2241
2242 switch (n->value) {
2243 case CFG_DAP:
2244 if (goi->isconfigure) {
2245 Jim_Obj *o_t;
2246 struct adiv5_dap *dap;
2247 e = jim_getopt_obj(goi, &o_t);
2248 if (e != JIM_OK)
2249 return e;
2250 dap = dap_instance_by_jim_obj(goi->interp, o_t);
2251 if (!dap) {
2252 Jim_SetResultString(goi->interp, "DAP name invalid!", -1);
2253 return JIM_ERR;
2254 }
2255 if (*dap_p && *dap_p != dap) {
2256 Jim_SetResultString(goi->interp,
2257 "DAP assignment cannot be changed!", -1);
2258 return JIM_ERR;
2259 }
2260 *dap_p = dap;
2261 } else {
2262 if (goi->argc)
2263 goto err_no_param;
2264 if (!*dap_p) {
2265 Jim_SetResultString(goi->interp, "DAP not configured", -1);
2266 return JIM_ERR;
2267 }
2268 Jim_SetResultString(goi->interp, adiv5_dap_name(*dap_p), -1);
2269 }
2270 break;
2271
2272 case CFG_AP_NUM:
2273 if (goi->isconfigure) {
2274 /* jim_wide is a signed 64 bits int, ap_num is unsigned with max 52 bits */
2275 jim_wide ap_num;
2276 e = jim_getopt_wide(goi, &ap_num);
2277 if (e != JIM_OK)
2278 return e;
2279 /* we still don't know dap->adi_version */
2280 if (ap_num < 0 || (ap_num > DP_APSEL_MAX && (ap_num & 0xfff))) {
2281 Jim_SetResultString(goi->interp, "Invalid AP number!", -1);
2282 return JIM_ERR;
2283 }
2284 *ap_num_p = ap_num;
2285 } else {
2286 if (goi->argc)
2287 goto err_no_param;
2288 if (*ap_num_p == DP_APSEL_INVALID) {
2289 Jim_SetResultString(goi->interp, "AP number not configured", -1);
2290 return JIM_ERR;
2291 }
2292 Jim_SetResult(goi->interp, Jim_NewIntObj(goi->interp, *ap_num_p));
2293 }
2294 break;
2295
2296 case CFG_CTIBASE:
2297 LOG_WARNING("DEPRECATED! use \'-baseaddr' not \'-ctibase\'");
2298 /* fall through */
2299 case CFG_BASEADDR:
2300 if (goi->isconfigure) {
2301 jim_wide base;
2302 e = jim_getopt_wide(goi, &base);
2303 if (e != JIM_OK)
2304 return e;
2305 *base_p = (uint32_t)base;
2306 } else {
2307 if (goi->argc)
2308 goto err_no_param;
2309 Jim_SetResult(goi->interp, Jim_NewIntObj(goi->interp, *base_p));
2310 }
2311 break;
2312 };
2313
2314 return JIM_OK;
2315
2316 err_no_param:
2317 Jim_WrongNumArgs(goi->interp, goi->argc, goi->argv, "NO PARAMS");
2318 return JIM_ERR;
2319 }
2320
2321 int adiv5_jim_configure(struct target *target, struct jim_getopt_info *goi)
2322 {
2323 struct adiv5_private_config *pc;
2324 int e;
2325
2326 pc = (struct adiv5_private_config *)target->private_config;
2327 if (!pc) {
2328 pc = calloc(1, sizeof(struct adiv5_private_config));
2329 if (!pc) {
2330 LOG_ERROR("Out of memory");
2331 return JIM_ERR;
2332 }
2333 pc->ap_num = DP_APSEL_INVALID;
2334 target->private_config = pc;
2335 }
2336
2337 target->has_dap = true;
2338
2339 e = adiv5_jim_spot_configure(goi, &pc->dap, &pc->ap_num, NULL);
2340 if (e != JIM_OK)
2341 return e;
2342
2343 if (pc->dap && !target->dap_configured) {
2344 if (target->tap_configured) {
2345 pc->dap = NULL;
2346 Jim_SetResultString(goi->interp,
2347 "-chain-position and -dap configparams are mutually exclusive!", -1);
2348 return JIM_ERR;
2349 }
2350 target->tap = pc->dap->tap;
2351 target->dap_configured = true;
2352 }
2353
2354 return JIM_OK;
2355 }
2356
2357 int adiv5_verify_config(struct adiv5_private_config *pc)
2358 {
2359 if (!pc)
2360 return ERROR_FAIL;
2361
2362 if (!pc->dap)
2363 return ERROR_FAIL;
2364
2365 return ERROR_OK;
2366 }
2367
2368 int adiv5_jim_mem_ap_spot_configure(struct adiv5_mem_ap_spot *cfg,
2369 struct jim_getopt_info *goi)
2370 {
2371 return adiv5_jim_spot_configure(goi, &cfg->dap, &cfg->ap_num, &cfg->base);
2372 }
2373
2374 int adiv5_mem_ap_spot_init(struct adiv5_mem_ap_spot *p)
2375 {
2376 p->dap = NULL;
2377 p->ap_num = DP_APSEL_INVALID;
2378 p->base = 0;
2379 return ERROR_OK;
2380 }
2381
2382 COMMAND_HANDLER(handle_dap_info_command)
2383 {
2384 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2385 uint64_t apsel;
2386
2387 switch (CMD_ARGC) {
2388 case 0:
2389 apsel = dap->apsel;
2390 break;
2391 case 1:
2392 if (!strcmp(CMD_ARGV[0], "root")) {
2393 if (!is_adiv6(dap)) {
2394 command_print(CMD, "Option \"root\" not allowed with ADIv5 DAP");
2395 return ERROR_COMMAND_ARGUMENT_INVALID;
2396 }
2397 int retval = adiv6_dap_read_baseptr(CMD, dap, &apsel);
2398 if (retval != ERROR_OK) {
2399 command_print(CMD, "Failed reading DAP baseptr");
2400 return retval;
2401 }
2402 break;
2403 }
2404 COMMAND_PARSE_NUMBER(u64, CMD_ARGV[0], apsel);
2405 if (!is_ap_num_valid(dap, apsel)) {
2406 command_print(CMD, "Invalid AP number");
2407 return ERROR_COMMAND_ARGUMENT_INVALID;
2408 }
2409 break;
2410 default:
2411 return ERROR_COMMAND_SYNTAX_ERROR;
2412 }
2413
2414 struct adiv5_ap *ap = dap_get_ap(dap, apsel);
2415 if (!ap) {
2416 command_print(CMD, "Cannot get AP");
2417 return ERROR_FAIL;
2418 }
2419
2420 int retval = dap_info_command(CMD, ap);
2421 dap_put_ap(ap);
2422 return retval;
2423 }
2424
2425 COMMAND_HANDLER(dap_baseaddr_command)
2426 {
2427 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2428 uint64_t apsel;
2429 uint32_t baseaddr_lower, baseaddr_upper;
2430 struct adiv5_ap *ap;
2431 target_addr_t baseaddr;
2432 int retval;
2433
2434 baseaddr_upper = 0;
2435
2436 switch (CMD_ARGC) {
2437 case 0:
2438 apsel = dap->apsel;
2439 break;
2440 case 1:
2441 COMMAND_PARSE_NUMBER(u64, CMD_ARGV[0], apsel);
2442 if (!is_ap_num_valid(dap, apsel)) {
2443 command_print(CMD, "Invalid AP number");
2444 return ERROR_COMMAND_ARGUMENT_INVALID;
2445 }
2446 break;
2447 default:
2448 return ERROR_COMMAND_SYNTAX_ERROR;
2449 }
2450
2451 /* NOTE: assumes we're talking to a MEM-AP, which
2452 * has a base address. There are other kinds of AP,
2453 * though they're not common for now. This should
2454 * use the ID register to verify it's a MEM-AP.
2455 */
2456
2457 ap = dap_get_ap(dap, apsel);
2458 if (!ap) {
2459 command_print(CMD, "Cannot get AP");
2460 return ERROR_FAIL;
2461 }
2462
2463 retval = dap_queue_ap_read(ap, MEM_AP_REG_BASE(dap), &baseaddr_lower);
2464
2465 if (retval == ERROR_OK && ap->cfg_reg == MEM_AP_REG_CFG_INVALID)
2466 retval = dap_queue_ap_read(ap, MEM_AP_REG_CFG(dap), &ap->cfg_reg);
2467
2468 if (retval == ERROR_OK && (ap->cfg_reg == MEM_AP_REG_CFG_INVALID || is_64bit_ap(ap))) {
2469 /* MEM_AP_REG_BASE64 is defined as 'RES0'; can be read and then ignored on 32 bits AP */
2470 retval = dap_queue_ap_read(ap, MEM_AP_REG_BASE64(dap), &baseaddr_upper);
2471 }
2472
2473 if (retval == ERROR_OK)
2474 retval = dap_run(dap);
2475 dap_put_ap(ap);
2476 if (retval != ERROR_OK)
2477 return retval;
2478
2479 if (is_64bit_ap(ap)) {
2480 baseaddr = (((target_addr_t)baseaddr_upper) << 32) | baseaddr_lower;
2481 command_print(CMD, "0x%016" PRIx64, baseaddr);
2482 } else
2483 command_print(CMD, "0x%08" PRIx32, baseaddr_lower);
2484
2485 return ERROR_OK;
2486 }
2487
2488 COMMAND_HANDLER(dap_memaccess_command)
2489 {
2490 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2491 struct adiv5_ap *ap;
2492 uint32_t memaccess_tck;
2493
2494 switch (CMD_ARGC) {
2495 case 0:
2496 ap = dap_get_ap(dap, dap->apsel);
2497 if (!ap) {
2498 command_print(CMD, "Cannot get AP");
2499 return ERROR_FAIL;
2500 }
2501 memaccess_tck = ap->memaccess_tck;
2502 break;
2503 case 1:
2504 ap = dap_get_config_ap(dap, dap->apsel);
2505 if (!ap) {
2506 command_print(CMD, "Cannot get AP");
2507 return ERROR_FAIL;
2508 }
2509 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[0], memaccess_tck);
2510 ap->memaccess_tck = memaccess_tck;
2511 break;
2512 default:
2513 return ERROR_COMMAND_SYNTAX_ERROR;
2514 }
2515
2516 dap_put_ap(ap);
2517
2518 command_print(CMD, "memory bus access delay set to %" PRIu32 " tck",
2519 memaccess_tck);
2520
2521 return ERROR_OK;
2522 }
2523
2524 COMMAND_HANDLER(dap_apsel_command)
2525 {
2526 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2527 uint64_t apsel;
2528
2529 switch (CMD_ARGC) {
2530 case 0:
2531 command_print(CMD, "0x%" PRIx64, dap->apsel);
2532 return ERROR_OK;
2533 case 1:
2534 COMMAND_PARSE_NUMBER(u64, CMD_ARGV[0], apsel);
2535 if (!is_ap_num_valid(dap, apsel)) {
2536 command_print(CMD, "Invalid AP number");
2537 return ERROR_COMMAND_ARGUMENT_INVALID;
2538 }
2539 break;
2540 default:
2541 return ERROR_COMMAND_SYNTAX_ERROR;
2542 }
2543
2544 dap->apsel = apsel;
2545 return ERROR_OK;
2546 }
2547
2548 COMMAND_HANDLER(dap_apcsw_command)
2549 {
2550 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2551 struct adiv5_ap *ap;
2552 uint32_t csw_val, csw_mask;
2553
2554 switch (CMD_ARGC) {
2555 case 0:
2556 ap = dap_get_ap(dap, dap->apsel);
2557 if (!ap) {
2558 command_print(CMD, "Cannot get AP");
2559 return ERROR_FAIL;
2560 }
2561 command_print(CMD, "AP#0x%" PRIx64 " selected, csw 0x%8.8" PRIx32,
2562 dap->apsel, ap->csw_default);
2563 break;
2564 case 1:
2565 if (strcmp(CMD_ARGV[0], "default") == 0)
2566 csw_val = CSW_AHB_DEFAULT;
2567 else
2568 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[0], csw_val);
2569
2570 if (csw_val & (CSW_SIZE_MASK | CSW_ADDRINC_MASK)) {
2571 LOG_ERROR("CSW value cannot include 'Size' and 'AddrInc' bit-fields");
2572 return ERROR_COMMAND_ARGUMENT_INVALID;
2573 }
2574 ap = dap_get_config_ap(dap, dap->apsel);
2575 if (!ap) {
2576 command_print(CMD, "Cannot get AP");
2577 return ERROR_FAIL;
2578 }
2579 ap->csw_default = csw_val;
2580 break;
2581 case 2:
2582 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[0], csw_val);
2583 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[1], csw_mask);
2584 if (csw_mask & (CSW_SIZE_MASK | CSW_ADDRINC_MASK)) {
2585 LOG_ERROR("CSW mask cannot include 'Size' and 'AddrInc' bit-fields");
2586 return ERROR_COMMAND_ARGUMENT_INVALID;
2587 }
2588 ap = dap_get_config_ap(dap, dap->apsel);
2589 if (!ap) {
2590 command_print(CMD, "Cannot get AP");
2591 return ERROR_FAIL;
2592 }
2593 ap->csw_default = (ap->csw_default & ~csw_mask) | (csw_val & csw_mask);
2594 break;
2595 default:
2596 return ERROR_COMMAND_SYNTAX_ERROR;
2597 }
2598 dap_put_ap(ap);
2599
2600 return ERROR_OK;
2601 }
2602
2603
2604
2605 COMMAND_HANDLER(dap_apid_command)
2606 {
2607 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2608 uint64_t apsel;
2609 uint32_t apid;
2610 int retval;
2611
2612 switch (CMD_ARGC) {
2613 case 0:
2614 apsel = dap->apsel;
2615 break;
2616 case 1:
2617 COMMAND_PARSE_NUMBER(u64, CMD_ARGV[0], apsel);
2618 if (!is_ap_num_valid(dap, apsel)) {
2619 command_print(CMD, "Invalid AP number");
2620 return ERROR_COMMAND_ARGUMENT_INVALID;
2621 }
2622 break;
2623 default:
2624 return ERROR_COMMAND_SYNTAX_ERROR;
2625 }
2626
2627 struct adiv5_ap *ap = dap_get_ap(dap, apsel);
2628 if (!ap) {
2629 command_print(CMD, "Cannot get AP");
2630 return ERROR_FAIL;
2631 }
2632 retval = dap_queue_ap_read(ap, AP_REG_IDR(dap), &apid);
2633 if (retval != ERROR_OK) {
2634 dap_put_ap(ap);
2635 return retval;
2636 }
2637 retval = dap_run(dap);
2638 dap_put_ap(ap);
2639 if (retval != ERROR_OK)
2640 return retval;
2641
2642 command_print(CMD, "0x%8.8" PRIx32, apid);
2643
2644 return retval;
2645 }
2646
2647 COMMAND_HANDLER(dap_apreg_command)
2648 {
2649 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2650 uint64_t apsel;
2651 uint32_t reg, value;
2652 int retval;
2653
2654 if (CMD_ARGC < 2 || CMD_ARGC > 3)
2655 return ERROR_COMMAND_SYNTAX_ERROR;
2656
2657 COMMAND_PARSE_NUMBER(u64, CMD_ARGV[0], apsel);
2658 if (!is_ap_num_valid(dap, apsel)) {
2659 command_print(CMD, "Invalid AP number");
2660 return ERROR_COMMAND_ARGUMENT_INVALID;
2661 }
2662
2663 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[1], reg);
2664 if (is_adiv6(dap)) {
2665 if (reg >= 4096 || (reg & 3)) {
2666 command_print(CMD, "Invalid reg value (should be less than 4096 and 4 bytes aligned)");
2667 return ERROR_COMMAND_ARGUMENT_INVALID;
2668 }
2669 } else { /* ADI version 5 */
2670 if (reg >= 256 || (reg & 3)) {
2671 command_print(CMD, "Invalid reg value (should be less than 256 and 4 bytes aligned)");
2672 return ERROR_COMMAND_ARGUMENT_INVALID;
2673 }
2674 }
2675
2676 struct adiv5_ap *ap = dap_get_ap(dap, apsel);
2677 if (!ap) {
2678 command_print(CMD, "Cannot get AP");
2679 return ERROR_FAIL;
2680 }
2681
2682 if (CMD_ARGC == 3) {
2683 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[2], value);
2684 /* see if user supplied register address is a match for the CSW or TAR register */
2685 if (reg == MEM_AP_REG_CSW(dap)) {
2686 ap->csw_value = 0; /* invalid, in case write fails */
2687 retval = dap_queue_ap_write(ap, reg, value);
2688 if (retval == ERROR_OK)
2689 ap->csw_value = value;
2690 } else if (reg == MEM_AP_REG_TAR(dap)) {
2691 retval = dap_queue_ap_write(ap, reg, value);
2692 if (retval == ERROR_OK)
2693 ap->tar_value = (ap->tar_value & ~0xFFFFFFFFull) | value;
2694 else {
2695 /* To track independent writes to TAR and TAR64, two tar_valid flags */
2696 /* should be used. To keep it simple, tar_valid is only invalidated on a */
2697 /* write fail. This approach causes a later re-write of the TAR and TAR64 */
2698 /* if tar_valid is false. */
2699 ap->tar_valid = false;
2700 }
2701 } else if (reg == MEM_AP_REG_TAR64(dap)) {
2702 retval = dap_queue_ap_write(ap, reg, value);
2703 if (retval == ERROR_OK)
2704 ap->tar_value = (ap->tar_value & 0xFFFFFFFFull) | (((target_addr_t)value) << 32);
2705 else {
2706 /* See above comment for the MEM_AP_REG_TAR failed write case */
2707 ap->tar_valid = false;
2708 }
2709 } else {
2710 retval = dap_queue_ap_write(ap, reg, value);
2711 }
2712 } else {
2713 retval = dap_queue_ap_read(ap, reg, &value);
2714 }
2715 if (retval == ERROR_OK)
2716 retval = dap_run(dap);
2717
2718 dap_put_ap(ap);
2719
2720 if (retval != ERROR_OK)
2721 return retval;
2722
2723 if (CMD_ARGC == 2)
2724 command_print(CMD, "0x%08" PRIx32, value);
2725
2726 return retval;
2727 }
2728
2729 COMMAND_HANDLER(dap_dpreg_command)
2730 {
2731 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2732 uint32_t reg, value;
2733 int retval;
2734
2735 if (CMD_ARGC < 1 || CMD_ARGC > 2)
2736 return ERROR_COMMAND_SYNTAX_ERROR;
2737
2738 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[0], reg);
2739 if (reg >= 256 || (reg & 3)) {
2740 command_print(CMD, "Invalid reg value (should be less than 256 and 4 bytes aligned)");
2741 return ERROR_COMMAND_ARGUMENT_INVALID;
2742 }
2743
2744 if (CMD_ARGC == 2) {
2745 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[1], value);
2746 retval = dap_queue_dp_write(dap, reg, value);
2747 } else {
2748 retval = dap_queue_dp_read(dap, reg, &value);
2749 }
2750 if (retval == ERROR_OK)
2751 retval = dap_run(dap);
2752
2753 if (retval != ERROR_OK)
2754 return retval;
2755
2756 if (CMD_ARGC == 1)
2757 command_print(CMD, "0x%08" PRIx32, value);
2758
2759 return retval;
2760 }
2761
2762 COMMAND_HANDLER(dap_ti_be_32_quirks_command)
2763 {
2764 struct adiv5_dap *dap = adiv5_get_dap(CMD_DATA);
2765 return CALL_COMMAND_HANDLER(handle_command_parse_bool, &dap->ti_be_32_quirks,
2766 "TI BE-32 quirks mode");
2767 }
2768
2769 const struct command_registration dap_instance_commands[] = {
2770 {
2771 .name = "info",
2772 .handler = handle_dap_info_command,
2773 .mode = COMMAND_EXEC,
2774 .help = "display ROM table for specified MEM-AP (default currently selected AP) "
2775 "or the ADIv6 root ROM table",
2776 .usage = "[ap_num | 'root']",
2777 },
2778 {
2779 .name = "apsel",
2780 .handler = dap_apsel_command,
2781 .mode = COMMAND_ANY,
2782 .help = "Set the currently selected AP (default 0) "
2783 "and display the result",
2784 .usage = "[ap_num]",
2785 },
2786 {
2787 .name = "apcsw",
2788 .handler = dap_apcsw_command,
2789 .mode = COMMAND_ANY,
2790 .help = "Set CSW default bits",
2791 .usage = "[value [mask]]",
2792 },
2793
2794 {
2795 .name = "apid",
2796 .handler = dap_apid_command,
2797 .mode = COMMAND_EXEC,
2798 .help = "return ID register from AP "
2799 "(default currently selected AP)",
2800 .usage = "[ap_num]",
2801 },
2802 {
2803 .name = "apreg",
2804 .handler = dap_apreg_command,
2805 .mode = COMMAND_EXEC,
2806 .help = "read/write a register from AP "
2807 "(reg is byte address of a word register, like 0 4 8...)",
2808 .usage = "ap_num reg [value]",
2809 },
2810 {
2811 .name = "dpreg",
2812 .handler = dap_dpreg_command,
2813 .mode = COMMAND_EXEC,
2814 .help = "read/write a register from DP "
2815 "(reg is byte address (bank << 4 | reg) of a word register, like 0 4 8...)",
2816 .usage = "reg [value]",
2817 },
2818 {
2819 .name = "baseaddr",
2820 .handler = dap_baseaddr_command,
2821 .mode = COMMAND_EXEC,
2822 .help = "return debug base address from MEM-AP "
2823 "(default currently selected AP)",
2824 .usage = "[ap_num]",
2825 },
2826 {
2827 .name = "memaccess",
2828 .handler = dap_memaccess_command,
2829 .mode = COMMAND_EXEC,
2830 .help = "set/get number of extra tck for MEM-AP memory "
2831 "bus access [0-255]",
2832 .usage = "[cycles]",
2833 },
2834 {
2835 .name = "ti_be_32_quirks",
2836 .handler = dap_ti_be_32_quirks_command,
2837 .mode = COMMAND_CONFIG,
2838 .help = "set/get quirks mode for TI TMS450/TMS570 processors",
2839 .usage = "[enable]",
2840 },
2841 COMMAND_REGISTRATION_DONE
2842 };

Linking to existing account procedure

If you already have an account and want to add another login method you MUST first sign in with your existing account and then change URL to read https://review.openocd.org/login/?link to get to this page again but this time it'll work for linking. Thank you.

SSH host keys fingerprints

1024 SHA256:YKx8b7u5ZWdcbp7/4AeXNaqElP49m6QrwfXaqQGJAOk gerrit-code-review@openocd.zylin.com (DSA)
384 SHA256:jHIbSQa4REvwCFG4cq5LBlBLxmxSqelQPem/EXIrxjk gerrit-code-review@openocd.org (ECDSA)
521 SHA256:UAOPYkU9Fjtcao0Ul/Rrlnj/OsQvt+pgdYSZ4jOYdgs gerrit-code-review@openocd.org (ECDSA)
256 SHA256:A13M5QlnozFOvTllybRZH6vm7iSt0XLxbA48yfc2yfY gerrit-code-review@openocd.org (ECDSA)
256 SHA256:spYMBqEYoAOtK7yZBrcwE8ZpYt6b68Cfh9yEVetvbXg gerrit-code-review@openocd.org (ED25519)
+--[ED25519 256]--+
|=..              |
|+o..   .         |
|*.o   . .        |
|+B . . .         |
|Bo. = o S        |
|Oo.+ + =         |
|oB=.* = . o      |
| =+=.+   + E     |
|. .=o   . o      |
+----[SHA256]-----+
2048 SHA256:0Onrb7/PHjpo6iVZ7xQX2riKN83FJ3KGU0TvI0TaFG4 gerrit-code-review@openocd.zylin.com (RSA)