helper/jim-eventloop: review scope of symbols
[openocd/dnglaze.git] / src / target / arm966e.c
blobb4207c8c15df0e3e4946945b1f10e23bbfb2627f
1 /***************************************************************************
2 * Copyright (C) 2005 by Dominic Rath *
3 * Dominic.Rath@gmx.de *
4 * *
5 * Copyright (C) 2008 by Spencer Oliver *
6 * spen@spen-soft.co.uk *
7 * *
8 * This program is free software; you can redistribute it and/or modify *
9 * it under the terms of the GNU General Public License as published by *
10 * the Free Software Foundation; either version 2 of the License, or *
11 * (at your option) any later version. *
12 * *
13 * This program is distributed in the hope that it will be useful, *
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
16 * GNU General Public License for more details. *
17 * *
18 * You should have received a copy of the GNU General Public License *
19 * along with this program; if not, write to the *
20 * Free Software Foundation, Inc., *
21 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
22 ***************************************************************************/
23 #ifdef HAVE_CONFIG_H
24 #include "config.h"
25 #endif
27 #include "arm966e.h"
28 #include "target_type.h"
29 #include "arm_opcodes.h"
32 #if 0
33 #define _DEBUG_INSTRUCTION_EXECUTION_
34 #endif
36 int arm966e_init_arch_info(struct target *target, struct arm966e_common *arm966e, struct jtag_tap *tap)
38 struct arm7_9_common *arm7_9 = &arm966e->arm7_9_common;
40 /* initialize arm7/arm9 specific info (including armv4_5) */
41 arm9tdmi_init_arch_info(target, arm7_9, tap);
43 arm966e->common_magic = ARM966E_COMMON_MAGIC;
45 /* The ARM966E-S implements the ARMv5TE architecture which
46 * has the BKPT instruction, so we don't have to use a watchpoint comparator
48 arm7_9->arm_bkpt = ARMV5_BKPT(0x0);
49 arm7_9->thumb_bkpt = ARMV5_T_BKPT(0x0) & 0xffff;
51 return ERROR_OK;
54 static int arm966e_target_create(struct target *target, Jim_Interp *interp)
56 struct arm966e_common *arm966e = calloc(1,sizeof(struct arm966e_common));
58 return arm966e_init_arch_info(target, arm966e, target->tap);
61 static int arm966e_verify_pointer(struct command_context *cmd_ctx,
62 struct arm966e_common *arm966e)
64 if (arm966e->common_magic != ARM966E_COMMON_MAGIC) {
65 command_print(cmd_ctx, "target is not an ARM966");
66 return ERROR_TARGET_INVALID;
68 return ERROR_OK;
72 * REVISIT: The "read_cp15" and "write_cp15" commands could hook up
73 * to eventual mrc() and mcr() routines ... the reg_addr values being
74 * constructed (for CP15 only) from Opcode_1, Opcode_2, and CRn values.
75 * See section 7.3 of the ARM966E-S TRM.
78 static int arm966e_read_cp15(struct target *target, int reg_addr, uint32_t *value)
80 int retval = ERROR_OK;
81 struct arm7_9_common *arm7_9 = target_to_arm7_9(target);
82 struct arm_jtag *jtag_info = &arm7_9->jtag_info;
83 struct scan_field fields[3];
84 uint8_t reg_addr_buf = reg_addr & 0x3f;
85 uint8_t nr_w_buf = 0;
87 if ((retval = arm_jtag_scann(jtag_info, 0xf, TAP_IDLE)) != ERROR_OK)
89 return retval;
91 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL, TAP_IDLE);
93 fields[0].num_bits = 32;
94 /* REVISIT: table 7-2 shows that bits 31-31 need to be
95 * specified for accessing BIST registers ...
97 fields[0].out_value = NULL;
98 fields[0].in_value = NULL;
100 fields[1].num_bits = 6;
101 fields[1].out_value = &reg_addr_buf;
102 fields[1].in_value = NULL;
104 fields[2].num_bits = 1;
105 fields[2].out_value = &nr_w_buf;
106 fields[2].in_value = NULL;
108 jtag_add_dr_scan(jtag_info->tap, 3, fields, TAP_IDLE);
110 fields[1].in_value = (uint8_t *)value;
112 jtag_add_dr_scan(jtag_info->tap, 3, fields, TAP_IDLE);
114 jtag_add_callback(arm_le_to_h_u32, (jtag_callback_data_t)value);
117 #ifdef _DEBUG_INSTRUCTION_EXECUTION_
118 if ((retval = jtag_execute_queue()) != ERROR_OK)
120 return retval;
122 LOG_DEBUG("addr: 0x%x value: %8.8x", reg_addr, *value);
123 #endif
125 return ERROR_OK;
128 // EXPORTED to str9x (flash)
129 int arm966e_write_cp15(struct target *target, int reg_addr, uint32_t value)
131 int retval = ERROR_OK;
132 struct arm7_9_common *arm7_9 = target_to_arm7_9(target);
133 struct arm_jtag *jtag_info = &arm7_9->jtag_info;
134 struct scan_field fields[3];
135 uint8_t reg_addr_buf = reg_addr & 0x3f;
136 uint8_t nr_w_buf = 1;
137 uint8_t value_buf[4];
139 buf_set_u32(value_buf, 0, 32, value);
141 if ((retval = arm_jtag_scann(jtag_info, 0xf, TAP_IDLE)) != ERROR_OK)
143 return retval;
145 arm_jtag_set_instr(jtag_info, jtag_info->intest_instr, NULL, TAP_IDLE);
147 fields[0].num_bits = 32;
148 fields[0].out_value = value_buf;
149 fields[0].in_value = NULL;
151 fields[1].num_bits = 6;
152 fields[1].out_value = &reg_addr_buf;
153 fields[1].in_value = NULL;
155 fields[2].num_bits = 1;
156 fields[2].out_value = &nr_w_buf;
157 fields[2].in_value = NULL;
159 jtag_add_dr_scan(jtag_info->tap, 3, fields, TAP_IDLE);
161 #ifdef _DEBUG_INSTRUCTION_EXECUTION_
162 LOG_DEBUG("addr: 0x%x value: %8.8x", reg_addr, value);
163 #endif
165 return ERROR_OK;
168 COMMAND_HANDLER(arm966e_handle_cp15_command)
170 int retval;
171 struct target *target = get_current_target(CMD_CTX);
172 struct arm966e_common *arm966e = target_to_arm966(target);
174 retval = arm966e_verify_pointer(CMD_CTX, arm966e);
175 if (retval != ERROR_OK)
176 return retval;
178 if (target->state != TARGET_HALTED)
180 command_print(CMD_CTX, "target must be stopped for \"%s\" command", CMD_NAME);
181 return ERROR_OK;
184 /* one or more argument, access a single register (write if second argument is given */
185 if (CMD_ARGC >= 1)
187 uint32_t address;
188 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[0], address);
190 if (CMD_ARGC == 1)
192 uint32_t value;
193 if ((retval = arm966e_read_cp15(target, address, &value)) != ERROR_OK)
195 command_print(CMD_CTX,
196 "couldn't access reg %" PRIi32,
197 address);
198 return ERROR_OK;
200 if ((retval = jtag_execute_queue()) != ERROR_OK)
202 return retval;
205 command_print(CMD_CTX, "%" PRIi32 ": %8.8" PRIx32,
206 address, value);
208 else if (CMD_ARGC == 2)
210 uint32_t value;
211 COMMAND_PARSE_NUMBER(u32, CMD_ARGV[1], value);
212 if ((retval = arm966e_write_cp15(target, address, value)) != ERROR_OK)
214 command_print(CMD_CTX,
215 "couldn't access reg %" PRIi32,
216 address);
217 return ERROR_OK;
219 command_print(CMD_CTX, "%" PRIi32 ": %8.8" PRIx32,
220 address, value);
224 return ERROR_OK;
227 static const struct command_registration arm966e_exec_command_handlers[] = {
229 .name = "cp15",
230 .handler = arm966e_handle_cp15_command,
231 .mode = COMMAND_EXEC,
232 .usage = "regnum [value]",
233 .help = "display/modify cp15 register",
235 COMMAND_REGISTRATION_DONE
238 const struct command_registration arm966e_command_handlers[] = {
240 .chain = arm9tdmi_command_handlers,
243 .name = "arm966e",
244 .mode = COMMAND_ANY,
245 .help = "arm966e command group",
246 .chain = arm966e_exec_command_handlers,
248 COMMAND_REGISTRATION_DONE
251 /** Holds methods for ARM966 targets. */
252 struct target_type arm966e_target =
254 .name = "arm966e",
256 .poll = arm7_9_poll,
257 .arch_state = arm_arch_state,
259 .target_request_data = arm7_9_target_request_data,
261 .halt = arm7_9_halt,
262 .resume = arm7_9_resume,
263 .step = arm7_9_step,
265 .assert_reset = arm7_9_assert_reset,
266 .deassert_reset = arm7_9_deassert_reset,
267 .soft_reset_halt = arm7_9_soft_reset_halt,
269 .get_gdb_reg_list = arm_get_gdb_reg_list,
271 .read_memory = arm7_9_read_memory,
272 .write_memory = arm7_9_write_memory,
273 .bulk_write_memory = arm7_9_bulk_write_memory,
275 .checksum_memory = arm_checksum_memory,
276 .blank_check_memory = arm_blank_check_memory,
278 .run_algorithm = armv4_5_run_algorithm,
280 .add_breakpoint = arm7_9_add_breakpoint,
281 .remove_breakpoint = arm7_9_remove_breakpoint,
282 .add_watchpoint = arm7_9_add_watchpoint,
283 .remove_watchpoint = arm7_9_remove_watchpoint,
285 .commands = arm966e_command_handlers,
286 .target_create = arm966e_target_create,
287 .init_target = arm9tdmi_init_target,
288 .examine = arm7_9_examine,
289 .check_reset = arm7_9_check_reset,