jtag: retire tap field
[openocd.git] / src / jtag / core.c
blob2e09cb6d58bcb5e026af80cc2a50f2ef539fad25
1 /***************************************************************************
2 * Copyright (C) 2009 Zachary T Welch *
3 * zw@superlucidity.net *
4 * *
5 * Copyright (C) 2007,2008,2009 Øyvind Harboe *
6 * oyvind.harboe@zylin.com *
7 * *
8 * Copyright (C) 2009 SoftPLC Corporation *
9 * http://softplc.com *
10 * dick@softplc.com *
11 * *
12 * Copyright (C) 2005 by Dominic Rath *
13 * Dominic.Rath@gmx.de *
14 * *
15 * This program is free software; you can redistribute it and/or modify *
16 * it under the terms of the GNU General Public License as published by *
17 * the Free Software Foundation; either version 2 of the License, or *
18 * (at your option) any later version. *
19 * *
20 * This program is distributed in the hope that it will be useful, *
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
23 * GNU General Public License for more details. *
24 * *
25 * You should have received a copy of the GNU General Public License *
26 * along with this program; if not, write to the *
27 * Free Software Foundation, Inc., *
28 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
29 ***************************************************************************/
30 #ifdef HAVE_CONFIG_H
31 #include "config.h"
32 #endif
34 #include "jtag.h"
35 #include "interface.h"
37 #ifdef HAVE_STRINGS_H
38 #include <strings.h>
39 #endif
42 /// The number of JTAG queue flushes (for profiling and debugging purposes).
43 static int jtag_flush_queue_count;
45 static void jtag_add_scan_check(struct jtag_tap *active, void (*jtag_add_scan)(struct jtag_tap *active, int in_num_fields, const struct scan_field *in_fields, tap_state_t state),
46 int in_num_fields, struct scan_field *in_fields, tap_state_t state);
48 /**
49 * The jtag_error variable is set when an error occurs while executing
50 * the queue. Application code may set this using jtag_set_error(),
51 * when an error occurs during processing that should be reported during
52 * jtag_execute_queue().
54 * Tts value may be checked with jtag_get_error() and cleared with
55 * jtag_error_clear(). This value is returned (and cleared) by
56 * jtag_execute_queue().
58 static int jtag_error = ERROR_OK;
60 static const char *jtag_event_strings[] =
62 [JTAG_TRST_ASSERTED] = "TAP reset",
63 [JTAG_TAP_EVENT_SETUP] = "TAP setup",
64 [JTAG_TAP_EVENT_ENABLE] = "TAP enabled",
65 [JTAG_TAP_EVENT_DISABLE] = "TAP disabled",
69 * JTAG adapters must initialize with TRST and SRST de-asserted
70 * (they're negative logic, so that means *high*). But some
71 * hardware doesn't necessarily work that way ... so set things
72 * up so that jtag_init() always forces that state.
74 static int jtag_trst = -1;
75 static int jtag_srst = -1;
77 /**
78 * List all TAPs that have been created.
80 static struct jtag_tap *__jtag_all_taps = NULL;
81 /**
82 * The number of TAPs in the __jtag_all_taps list, used to track the
83 * assigned chain position to new TAPs
85 static unsigned jtag_num_taps = 0;
87 static enum reset_types jtag_reset_config = RESET_NONE;
88 static tap_state_t cmd_queue_end_state = TAP_RESET;
89 tap_state_t cmd_queue_cur_state = TAP_RESET;
91 static bool jtag_verify_capture_ir = true;
92 static int jtag_verify = 1;
94 /* how long the OpenOCD should wait before attempting JTAG communication after reset lines deasserted (in ms) */
95 static int jtag_nsrst_delay = 0; /* default to no nSRST delay */
96 static int jtag_ntrst_delay = 0; /* default to no nTRST delay */
97 static int jtag_nsrst_assert_width = 0; /* width of assertion */
98 static int jtag_ntrst_assert_width = 0; /* width of assertion */
101 * Contains a single callback along with a pointer that will be passed
102 * when an event occurs.
104 struct jtag_event_callback {
105 /// a event callback
106 jtag_event_handler_t callback;
107 /// the private data to pass to the callback
108 void* priv;
109 /// the next callback
110 struct jtag_event_callback* next;
113 /* callbacks to inform high-level handlers about JTAG state changes */
114 static struct jtag_event_callback *jtag_event_callbacks;
116 /* speed in kHz*/
117 static int speed_khz = 0;
118 /* speed to fallback to when RCLK is requested but not supported */
119 static int rclk_fallback_speed_khz = 0;
120 static enum {CLOCK_MODE_SPEED, CLOCK_MODE_KHZ, CLOCK_MODE_RCLK} clock_mode;
121 static int jtag_speed = 0;
123 static struct jtag_interface *jtag = NULL;
125 /* configuration */
126 struct jtag_interface *jtag_interface = NULL;
128 void jtag_set_error(int error)
130 if ((error == ERROR_OK) || (jtag_error != ERROR_OK))
131 return;
132 jtag_error = error;
134 int jtag_get_error(void)
136 return jtag_error;
138 int jtag_error_clear(void)
140 int temp = jtag_error;
141 jtag_error = ERROR_OK;
142 return temp;
145 /************/
147 static bool jtag_poll = 1;
149 bool is_jtag_poll_safe(void)
151 /* Polling can be disabled explicitly with set_enabled(false).
152 * It is also implicitly disabled while TRST is active and
153 * while SRST is gating the JTAG clock.
155 if (!jtag_poll || jtag_trst != 0)
156 return false;
157 return jtag_srst == 0 || (jtag_reset_config & RESET_SRST_NO_GATING);
160 bool jtag_poll_get_enabled(void)
162 return jtag_poll;
165 void jtag_poll_set_enabled(bool value)
167 jtag_poll = value;
170 /************/
172 struct jtag_tap *jtag_all_taps(void)
174 return __jtag_all_taps;
177 unsigned jtag_tap_count(void)
179 return jtag_num_taps;
182 unsigned jtag_tap_count_enabled(void)
184 struct jtag_tap *t = jtag_all_taps();
185 unsigned n = 0;
186 while (t)
188 if (t->enabled)
189 n++;
190 t = t->next_tap;
192 return n;
195 /// Append a new TAP to the chain of all taps.
196 void jtag_tap_add(struct jtag_tap *t)
198 t->abs_chain_position = jtag_num_taps++;
200 struct jtag_tap **tap = &__jtag_all_taps;
201 while (*tap != NULL)
202 tap = &(*tap)->next_tap;
203 *tap = t;
206 /* returns a pointer to the n-th device in the scan chain */
207 static inline struct jtag_tap *jtag_tap_by_position(unsigned n)
209 struct jtag_tap *t = jtag_all_taps();
211 while (t && n-- > 0)
212 t = t->next_tap;
214 return t;
217 struct jtag_tap *jtag_tap_by_string(const char *s)
219 /* try by name first */
220 struct jtag_tap *t = jtag_all_taps();
222 while (t)
224 if (0 == strcmp(t->dotted_name, s))
225 return t;
226 t = t->next_tap;
229 /* no tap found by name, so try to parse the name as a number */
230 unsigned n;
231 if (parse_uint(s, &n) != ERROR_OK)
232 return NULL;
234 /* FIXME remove this numeric fallback code late June 2010, along
235 * with all info in the User's Guide that TAPs have numeric IDs.
236 * Also update "scan_chain" output to not display the numbers.
238 t = jtag_tap_by_position(n);
239 if (t)
240 LOG_WARNING("Specify TAP '%s' by name, not number %u",
241 t->dotted_name, n);
243 return t;
246 struct jtag_tap* jtag_tap_next_enabled(struct jtag_tap* p)
248 p = p ? p->next_tap : jtag_all_taps();
249 while (p)
251 if (p->enabled)
252 return p;
253 p = p->next_tap;
255 return NULL;
258 const char *jtag_tap_name(const struct jtag_tap *tap)
260 return (tap == NULL) ? "(unknown)" : tap->dotted_name;
264 int jtag_register_event_callback(jtag_event_handler_t callback, void *priv)
266 struct jtag_event_callback **callbacks_p = &jtag_event_callbacks;
268 if (callback == NULL)
270 return ERROR_INVALID_ARGUMENTS;
273 if (*callbacks_p)
275 while ((*callbacks_p)->next)
276 callbacks_p = &((*callbacks_p)->next);
277 callbacks_p = &((*callbacks_p)->next);
280 (*callbacks_p) = malloc(sizeof(struct jtag_event_callback));
281 (*callbacks_p)->callback = callback;
282 (*callbacks_p)->priv = priv;
283 (*callbacks_p)->next = NULL;
285 return ERROR_OK;
288 int jtag_unregister_event_callback(jtag_event_handler_t callback, void *priv)
290 struct jtag_event_callback **callbacks_p;
291 struct jtag_event_callback **next;
293 if (callback == NULL)
295 return ERROR_INVALID_ARGUMENTS;
298 for (callbacks_p = &jtag_event_callbacks;
299 *callbacks_p != NULL;
300 callbacks_p = next)
302 next = &((*callbacks_p)->next);
304 if ((*callbacks_p)->priv != priv)
305 continue;
307 if ((*callbacks_p)->callback == callback)
309 free(*callbacks_p);
310 *callbacks_p = *next;
314 return ERROR_OK;
317 int jtag_call_event_callbacks(enum jtag_event event)
319 struct jtag_event_callback *callback = jtag_event_callbacks;
321 LOG_DEBUG("jtag event: %s", jtag_event_strings[event]);
323 while (callback)
325 struct jtag_event_callback *next;
327 /* callback may remove itself */
328 next = callback->next;
329 callback->callback(event, callback->priv);
330 callback = next;
333 return ERROR_OK;
336 static void jtag_checks(void)
338 assert(jtag_trst == 0);
341 static void jtag_prelude(tap_state_t state)
343 jtag_checks();
345 assert(state != TAP_INVALID);
347 cmd_queue_cur_state = state;
350 void jtag_alloc_in_value32(struct scan_field *field)
352 interface_jtag_alloc_in_value32(field);
355 void jtag_add_ir_scan_noverify(struct jtag_tap *active, int in_count, const struct scan_field *in_fields,
356 tap_state_t state)
358 jtag_prelude(state);
360 int retval = interface_jtag_add_ir_scan(active, in_count, in_fields, state);
361 jtag_set_error(retval);
365 void jtag_add_ir_scan(struct jtag_tap *active, int in_num_fields, struct scan_field *in_fields, tap_state_t state)
367 assert(state != TAP_RESET);
369 if (jtag_verify && jtag_verify_capture_ir)
371 /* 8 x 32 bit id's is enough for all invocations */
373 for (int j = 0; j < in_num_fields; j++)
375 /* if we are to run a verification of the ir scan, we need to get the input back.
376 * We may have to allocate space if the caller didn't ask for the input back.
378 in_fields[j].check_value = active->expected;
379 in_fields[j].check_mask = active->expected_mask;
381 jtag_add_scan_check(active, jtag_add_ir_scan_noverify, in_num_fields, in_fields, state);
382 } else
384 jtag_add_ir_scan_noverify(active, in_num_fields, in_fields, state);
388 void jtag_add_plain_ir_scan(int in_num_fields, const struct scan_field *in_fields,
389 tap_state_t state)
391 assert(state != TAP_RESET);
393 jtag_prelude(state);
395 int retval = interface_jtag_add_plain_ir_scan(
396 in_num_fields, in_fields, state);
397 jtag_set_error(retval);
400 static int jtag_check_value_inner(uint8_t *captured, uint8_t *in_check_value,
401 uint8_t *in_check_mask, int num_bits);
403 static int jtag_check_value_mask_callback(jtag_callback_data_t data0, jtag_callback_data_t data1, jtag_callback_data_t data2, jtag_callback_data_t data3)
405 return jtag_check_value_inner((uint8_t *)data0, (uint8_t *)data1, (uint8_t *)data2, (int)data3);
408 static void jtag_add_scan_check(struct jtag_tap *active, void (*jtag_add_scan)(struct jtag_tap *active, int in_num_fields, const struct scan_field *in_fields, tap_state_t state),
409 int in_num_fields, struct scan_field *in_fields, tap_state_t state)
411 for (int i = 0; i < in_num_fields; i++)
413 struct scan_field *field = &in_fields[i];
414 field->allocated = 0;
415 field->modified = 0;
416 if (field->check_value || field->in_value)
417 continue;
418 interface_jtag_add_scan_check_alloc(field);
419 field->modified = 1;
422 jtag_add_scan(active, in_num_fields, in_fields, state);
424 for (int i = 0; i < in_num_fields; i++)
426 if ((in_fields[i].check_value != NULL) && (in_fields[i].in_value != NULL))
428 /* this is synchronous for a minidriver */
429 jtag_add_callback4(jtag_check_value_mask_callback, (jtag_callback_data_t)in_fields[i].in_value,
430 (jtag_callback_data_t)in_fields[i].check_value,
431 (jtag_callback_data_t)in_fields[i].check_mask,
432 (jtag_callback_data_t)in_fields[i].num_bits);
434 if (in_fields[i].allocated)
436 free(in_fields[i].in_value);
438 if (in_fields[i].modified)
440 in_fields[i].in_value = NULL;
445 void jtag_add_dr_scan_check(struct jtag_tap *active, int in_num_fields, struct scan_field *in_fields, tap_state_t state)
447 if (jtag_verify)
449 jtag_add_scan_check(active, jtag_add_dr_scan, in_num_fields, in_fields, state);
450 } else
452 jtag_add_dr_scan(active, in_num_fields, in_fields, state);
457 void jtag_add_dr_scan(struct jtag_tap *active, int in_num_fields, const struct scan_field *in_fields,
458 tap_state_t state)
460 assert(state != TAP_RESET);
462 jtag_prelude(state);
464 int retval;
465 retval = interface_jtag_add_dr_scan(active, in_num_fields, in_fields, state);
466 jtag_set_error(retval);
469 void jtag_add_plain_dr_scan(int in_num_fields, const struct scan_field *in_fields,
470 tap_state_t state)
472 assert(state != TAP_RESET);
474 jtag_prelude(state);
476 int retval;
477 retval = interface_jtag_add_plain_dr_scan(in_num_fields, in_fields, state);
478 jtag_set_error(retval);
481 void jtag_add_tlr(void)
483 jtag_prelude(TAP_RESET);
484 jtag_set_error(interface_jtag_add_tlr());
486 /* NOTE: order here matches TRST path in jtag_add_reset() */
487 jtag_call_event_callbacks(JTAG_TRST_ASSERTED);
488 jtag_notify_event(JTAG_TRST_ASSERTED);
492 * If supported by the underlying adapter, this clocks a raw bit sequence
493 * onto TMS for switching betwen JTAG and SWD modes.
495 * DO NOT use this to bypass the integrity checks and logging provided
496 * by the jtag_add_pathmove() and jtag_add_statemove() calls.
498 * @param nbits How many bits to clock out.
499 * @param seq The bit sequence. The LSB is bit 0 of seq[0].
500 * @param state The JTAG tap state to record on completion. Use
501 * TAP_INVALID to represent being in in SWD mode.
503 * @todo Update naming conventions to stop assuming everything is JTAG.
505 int jtag_add_tms_seq(unsigned nbits, const uint8_t *seq, enum tap_state state)
507 int retval;
509 if (!(jtag->supported & DEBUG_CAP_TMS_SEQ))
510 return ERROR_JTAG_NOT_IMPLEMENTED;
512 jtag_checks();
513 cmd_queue_cur_state = state;
515 retval = interface_add_tms_seq(nbits, seq, state);
516 jtag_set_error(retval);
517 return retval;
520 void jtag_add_pathmove(int num_states, const tap_state_t *path)
522 tap_state_t cur_state = cmd_queue_cur_state;
524 /* the last state has to be a stable state */
525 if (!tap_is_state_stable(path[num_states - 1]))
527 LOG_ERROR("BUG: TAP path doesn't finish in a stable state");
528 jtag_set_error(ERROR_JTAG_NOT_STABLE_STATE);
529 return;
532 for (int i = 0; i < num_states; i++)
534 if (path[i] == TAP_RESET)
536 LOG_ERROR("BUG: TAP_RESET is not a valid state for pathmove sequences");
537 jtag_set_error(ERROR_JTAG_STATE_INVALID);
538 return;
541 if (tap_state_transition(cur_state, true) != path[i]
542 && tap_state_transition(cur_state, false) != path[i])
544 LOG_ERROR("BUG: %s -> %s isn't a valid TAP transition",
545 tap_state_name(cur_state), tap_state_name(path[i]));
546 jtag_set_error(ERROR_JTAG_TRANSITION_INVALID);
547 return;
549 cur_state = path[i];
552 jtag_checks();
554 jtag_set_error(interface_jtag_add_pathmove(num_states, path));
555 cmd_queue_cur_state = path[num_states - 1];
558 int jtag_add_statemove(tap_state_t goal_state)
560 tap_state_t cur_state = cmd_queue_cur_state;
562 if (goal_state != cur_state)
564 LOG_DEBUG("cur_state=%s goal_state=%s",
565 tap_state_name(cur_state),
566 tap_state_name(goal_state));
569 /* If goal is RESET, be paranoid and force that that transition
570 * (e.g. five TCK cycles, TMS high). Else trust "cur_state".
572 if (goal_state == TAP_RESET)
573 jtag_add_tlr();
574 else if (goal_state == cur_state)
575 /* nothing to do */ ;
577 else if (tap_is_state_stable(cur_state) && tap_is_state_stable(goal_state))
579 unsigned tms_bits = tap_get_tms_path(cur_state, goal_state);
580 unsigned tms_count = tap_get_tms_path_len(cur_state, goal_state);
581 tap_state_t moves[8];
582 assert(tms_count < ARRAY_SIZE(moves));
584 for (unsigned i = 0; i < tms_count; i++, tms_bits >>= 1)
586 bool bit = tms_bits & 1;
588 cur_state = tap_state_transition(cur_state, bit);
589 moves[i] = cur_state;
592 jtag_add_pathmove(tms_count, moves);
594 else if (tap_state_transition(cur_state, true) == goal_state
595 || tap_state_transition(cur_state, false) == goal_state)
597 jtag_add_pathmove(1, &goal_state);
600 else
601 return ERROR_FAIL;
603 return ERROR_OK;
606 void jtag_add_runtest(int num_cycles, tap_state_t state)
608 jtag_prelude(state);
609 jtag_set_error(interface_jtag_add_runtest(num_cycles, state));
613 void jtag_add_clocks(int num_cycles)
615 if (!tap_is_state_stable(cmd_queue_cur_state))
617 LOG_ERROR("jtag_add_clocks() called with TAP in unstable state \"%s\"",
618 tap_state_name(cmd_queue_cur_state));
619 jtag_set_error(ERROR_JTAG_NOT_STABLE_STATE);
620 return;
623 if (num_cycles > 0)
625 jtag_checks();
626 jtag_set_error(interface_jtag_add_clocks(num_cycles));
630 void jtag_add_reset(int req_tlr_or_trst, int req_srst)
632 int trst_with_tlr = 0;
633 int new_srst = 0;
634 int new_trst = 0;
636 /* Without SRST, we must use target-specific JTAG operations
637 * on each target; callers should not be requesting SRST when
638 * that signal doesn't exist.
640 * RESET_SRST_PULLS_TRST is a board or chip level quirk, which
641 * can kick in even if the JTAG adapter can't drive TRST.
643 if (req_srst) {
644 if (!(jtag_reset_config & RESET_HAS_SRST)) {
645 LOG_ERROR("BUG: can't assert SRST");
646 jtag_set_error(ERROR_FAIL);
647 return;
649 if ((jtag_reset_config & RESET_SRST_PULLS_TRST) != 0
650 && !req_tlr_or_trst) {
651 LOG_ERROR("BUG: can't assert only SRST");
652 jtag_set_error(ERROR_FAIL);
653 return;
655 new_srst = 1;
658 /* JTAG reset (entry to TAP_RESET state) can always be achieved
659 * using TCK and TMS; that may go through a TAP_{IR,DR}UPDATE
660 * state first. TRST accelerates it, and bypasses those states.
662 * RESET_TRST_PULLS_SRST is a board or chip level quirk, which
663 * can kick in even if the JTAG adapter can't drive SRST.
665 if (req_tlr_or_trst) {
666 if (!(jtag_reset_config & RESET_HAS_TRST))
667 trst_with_tlr = 1;
668 else if ((jtag_reset_config & RESET_TRST_PULLS_SRST) != 0
669 && !req_srst)
670 trst_with_tlr = 1;
671 else
672 new_trst = 1;
675 /* Maybe change TRST and/or SRST signal state */
676 if (jtag_srst != new_srst || jtag_trst != new_trst) {
677 int retval;
679 retval = interface_jtag_add_reset(new_trst, new_srst);
680 if (retval != ERROR_OK)
681 jtag_set_error(retval);
682 else
683 retval = jtag_execute_queue();
685 if (retval != ERROR_OK) {
686 LOG_ERROR("TRST/SRST error %d", retval);
687 return;
691 /* SRST resets everything hooked up to that signal */
692 if (jtag_srst != new_srst) {
693 jtag_srst = new_srst;
694 if (jtag_srst)
696 LOG_DEBUG("SRST line asserted");
697 if (jtag_nsrst_assert_width)
698 jtag_add_sleep(jtag_nsrst_assert_width * 1000);
700 else {
701 LOG_DEBUG("SRST line released");
702 if (jtag_nsrst_delay)
703 jtag_add_sleep(jtag_nsrst_delay * 1000);
707 /* Maybe enter the JTAG TAP_RESET state ...
708 * - using only TMS, TCK, and the JTAG state machine
709 * - or else more directly, using TRST
711 * TAP_RESET should be invisible to non-debug parts of the system.
713 if (trst_with_tlr) {
714 LOG_DEBUG("JTAG reset with TLR instead of TRST");
715 jtag_set_end_state(TAP_RESET);
716 jtag_add_tlr();
718 } else if (jtag_trst != new_trst) {
719 jtag_trst = new_trst;
720 if (jtag_trst) {
721 LOG_DEBUG("TRST line asserted");
722 tap_set_state(TAP_RESET);
723 if (jtag_ntrst_assert_width)
724 jtag_add_sleep(jtag_ntrst_assert_width * 1000);
725 } else {
726 LOG_DEBUG("TRST line released");
727 if (jtag_ntrst_delay)
728 jtag_add_sleep(jtag_ntrst_delay * 1000);
730 /* We just asserted nTRST, so we're now in TAP_RESET.
731 * Inform possible listeners about this, now that
732 * JTAG instructions and data can be shifted. This
733 * sequence must match jtag_add_tlr().
735 jtag_call_event_callbacks(JTAG_TRST_ASSERTED);
736 jtag_notify_event(JTAG_TRST_ASSERTED);
741 tap_state_t jtag_set_end_state(tap_state_t state)
743 if ((state == TAP_DRSHIFT)||(state == TAP_IRSHIFT))
745 LOG_ERROR("BUG: TAP_DRSHIFT/IRSHIFT can't be end state. Calling code should use a larger scan field");
748 if (state != TAP_INVALID)
749 cmd_queue_end_state = state;
750 return cmd_queue_end_state;
753 tap_state_t jtag_get_end_state(void)
755 return cmd_queue_end_state;
758 void jtag_add_sleep(uint32_t us)
760 /// @todo Here, keep_alive() appears to be a layering violation!!!
761 keep_alive();
762 jtag_set_error(interface_jtag_add_sleep(us));
765 static int jtag_check_value_inner(uint8_t *captured, uint8_t *in_check_value,
766 uint8_t *in_check_mask, int num_bits)
768 int retval = ERROR_OK;
769 int compare_failed;
771 if (in_check_mask)
772 compare_failed = buf_cmp_mask(captured, in_check_value, in_check_mask, num_bits);
773 else
774 compare_failed = buf_cmp(captured, in_check_value, num_bits);
776 if (compare_failed) {
777 char *captured_str, *in_check_value_str;
778 int bits = (num_bits > DEBUG_JTAG_IOZ)
779 ? DEBUG_JTAG_IOZ
780 : num_bits;
782 /* NOTE: we've lost diagnostic context here -- 'which tap' */
784 captured_str = buf_to_str(captured, bits, 16);
785 in_check_value_str = buf_to_str(in_check_value, bits, 16);
787 LOG_WARNING("Bad value '%s' captured during DR or IR scan:",
788 captured_str);
789 LOG_WARNING(" check_value: 0x%s", in_check_value_str);
791 free(captured_str);
792 free(in_check_value_str);
794 if (in_check_mask) {
795 char *in_check_mask_str;
797 in_check_mask_str = buf_to_str(in_check_mask, bits, 16);
798 LOG_WARNING(" check_mask: 0x%s", in_check_mask_str);
799 free(in_check_mask_str);
802 retval = ERROR_JTAG_QUEUE_FAILED;
804 return retval;
807 void jtag_check_value_mask(struct scan_field *field, uint8_t *value, uint8_t *mask)
809 assert(field->in_value != NULL);
811 if (value == NULL)
813 /* no checking to do */
814 return;
817 jtag_execute_queue_noclear();
819 int retval = jtag_check_value_inner(field->in_value, value, mask, field->num_bits);
820 jtag_set_error(retval);
825 int default_interface_jtag_execute_queue(void)
827 if (NULL == jtag)
829 LOG_ERROR("No JTAG interface configured yet. "
830 "Issue 'init' command in startup scripts "
831 "before communicating with targets.");
832 return ERROR_FAIL;
835 return jtag->execute_queue();
838 void jtag_execute_queue_noclear(void)
840 jtag_flush_queue_count++;
841 jtag_set_error(interface_jtag_execute_queue());
844 int jtag_get_flush_queue_count(void)
846 return jtag_flush_queue_count;
849 int jtag_execute_queue(void)
851 jtag_execute_queue_noclear();
852 return jtag_error_clear();
855 static int jtag_reset_callback(enum jtag_event event, void *priv)
857 struct jtag_tap *tap = priv;
859 if (event == JTAG_TRST_ASSERTED)
861 tap->enabled = !tap->disabled_after_reset;
863 /* current instruction is either BYPASS or IDCODE */
864 buf_set_ones(tap->cur_instr, tap->ir_length);
865 tap->bypass = 1;
868 return ERROR_OK;
871 void jtag_sleep(uint32_t us)
873 alive_sleep(us/1000);
876 /* Maximum number of enabled JTAG devices we expect in the scan chain,
877 * plus one (to detect garbage at the end). Devices that don't support
878 * IDCODE take up fewer bits, possibly allowing a few more devices.
880 #define JTAG_MAX_CHAIN_SIZE 20
882 #define EXTRACT_MFG(X) (((X) & 0xffe) >> 1)
883 #define EXTRACT_PART(X) (((X) & 0xffff000) >> 12)
884 #define EXTRACT_VER(X) (((X) & 0xf0000000) >> 28)
886 /* A reserved manufacturer ID is used in END_OF_CHAIN_FLAG, so we
887 * know that no valid TAP will have it as an IDCODE value.
889 #define END_OF_CHAIN_FLAG 0x000000ff
891 /* a larger IR length than we ever expect to autoprobe */
892 #define JTAG_IRLEN_MAX 60
894 static int jtag_examine_chain_execute(uint8_t *idcode_buffer, unsigned num_idcode)
896 struct scan_field field = {
897 .num_bits = num_idcode * 32,
898 .out_value = idcode_buffer,
899 .in_value = idcode_buffer,
902 // initialize to the end of chain ID value
903 for (unsigned i = 0; i < JTAG_MAX_CHAIN_SIZE; i++)
904 buf_set_u32(idcode_buffer, i * 32, 32, END_OF_CHAIN_FLAG);
906 jtag_add_plain_dr_scan(1, &field, TAP_DRPAUSE);
907 jtag_add_tlr();
908 return jtag_execute_queue();
911 static bool jtag_examine_chain_check(uint8_t *idcodes, unsigned count)
913 uint8_t zero_check = 0x0;
914 uint8_t one_check = 0xff;
916 for (unsigned i = 0; i < count * 4; i++)
918 zero_check |= idcodes[i];
919 one_check &= idcodes[i];
922 /* if there wasn't a single non-zero bit or if all bits were one,
923 * the scan is not valid. We wrote a mix of both values; either
925 * - There's a hardware issue (almost certainly):
926 * + all-zeroes can mean a target stuck in JTAG reset
927 * + all-ones tends to mean no target
928 * - The scan chain is WAY longer than we can handle, *AND* either
929 * + there are several hundreds of TAPs in bypass, or
930 * + at least a few dozen TAPs all have an all-ones IDCODE
932 if (zero_check == 0x00 || one_check == 0xff)
934 LOG_ERROR("JTAG scan chain interrogation failed: all %s",
935 (zero_check == 0x00) ? "zeroes" : "ones");
936 LOG_ERROR("Check JTAG interface, timings, target power, etc.");
937 return false;
939 return true;
942 static void jtag_examine_chain_display(enum log_levels level, const char *msg,
943 const char *name, uint32_t idcode)
945 log_printf_lf(level, __FILE__, __LINE__, __FUNCTION__,
946 "JTAG tap: %s %16.16s: 0x%08x "
947 "(mfg: 0x%3.3x, part: 0x%4.4x, ver: 0x%1.1x)",
948 name, msg,
949 (unsigned int)idcode,
950 (unsigned int)EXTRACT_MFG(idcode),
951 (unsigned int)EXTRACT_PART(idcode),
952 (unsigned int)EXTRACT_VER(idcode));
955 static bool jtag_idcode_is_final(uint32_t idcode)
958 * Some devices, such as AVR8, will output all 1's instead
959 * of TDI input value at end of chain. Allow those values
960 * instead of failing.
962 return idcode == END_OF_CHAIN_FLAG || idcode == 0xFFFFFFFF;
966 * This helper checks that remaining bits in the examined chain data are
967 * all as expected, but a single JTAG device requires only 64 bits to be
968 * read back correctly. This can help identify and diagnose problems
969 * with the JTAG chain earlier, gives more helpful/explicit error messages.
970 * Returns TRUE iff garbage was found.
972 static bool jtag_examine_chain_end(uint8_t *idcodes, unsigned count, unsigned max)
974 bool triggered = false;
975 for (; count < max - 31; count += 32)
977 uint32_t idcode = buf_get_u32(idcodes, count, 32);
979 /* do not trigger the warning if the data looks good */
980 if (jtag_idcode_is_final(idcode))
981 continue;
982 LOG_WARNING("Unexpected idcode after end of chain: %d 0x%08x",
983 count, (unsigned int)idcode);
984 triggered = true;
986 return triggered;
989 static bool jtag_examine_chain_match_tap(const struct jtag_tap *tap)
991 uint32_t idcode = tap->idcode;
993 /* ignore expected BYPASS codes; warn otherwise */
994 if (0 == tap->expected_ids_cnt && !idcode)
995 return true;
997 /* optionally ignore the JTAG version field */
998 uint32_t mask = tap->ignore_version ? ~(0xff << 24) : ~0;
1000 idcode &= mask;
1002 /* Loop over the expected identification codes and test for a match */
1003 unsigned ii, limit = tap->expected_ids_cnt;
1005 for (ii = 0; ii < limit; ii++)
1007 uint32_t expected = tap->expected_ids[ii] & mask;
1009 if (idcode == expected)
1010 return true;
1012 /* treat "-expected-id 0" as a "don't-warn" wildcard */
1013 if (0 == tap->expected_ids[ii])
1014 return true;
1017 /* If none of the expected ids matched, warn */
1018 jtag_examine_chain_display(LOG_LVL_WARNING, "UNEXPECTED",
1019 tap->dotted_name, tap->idcode);
1020 for (ii = 0; ii < limit; ii++)
1022 char msg[32];
1024 snprintf(msg, sizeof(msg), "expected %u of %u", ii + 1, limit);
1025 jtag_examine_chain_display(LOG_LVL_ERROR, msg,
1026 tap->dotted_name, tap->expected_ids[ii]);
1028 return false;
1031 /* Try to examine chain layout according to IEEE 1149.1 §12
1032 * This is called a "blind interrogation" of the scan chain.
1034 static int jtag_examine_chain(void)
1036 uint8_t idcode_buffer[JTAG_MAX_CHAIN_SIZE * 4];
1037 unsigned bit_count;
1038 int retval;
1039 int tapcount = 0;
1040 bool autoprobe = false;
1042 /* DR scan to collect BYPASS or IDCODE register contents.
1043 * Then make sure the scan data has both ones and zeroes.
1045 LOG_DEBUG("DR scan interrogation for IDCODE/BYPASS");
1046 retval = jtag_examine_chain_execute(idcode_buffer, JTAG_MAX_CHAIN_SIZE);
1047 if (retval != ERROR_OK)
1048 return retval;
1049 if (!jtag_examine_chain_check(idcode_buffer, JTAG_MAX_CHAIN_SIZE))
1050 return ERROR_JTAG_INIT_FAILED;
1052 /* point at the 1st tap */
1053 struct jtag_tap *tap = jtag_tap_next_enabled(NULL);
1055 if (!tap)
1056 autoprobe = true;
1058 for (bit_count = 0;
1059 tap && bit_count < (JTAG_MAX_CHAIN_SIZE * 32) - 31;
1060 tap = jtag_tap_next_enabled(tap))
1062 uint32_t idcode = buf_get_u32(idcode_buffer, bit_count, 32);
1064 if ((idcode & 1) == 0)
1066 /* Zero for LSB indicates a device in bypass */
1067 LOG_INFO("TAP %s does not have IDCODE",
1068 tap->dotted_name);
1069 idcode = 0;
1070 tap->hasidcode = false;
1072 bit_count += 1;
1074 else
1076 /* Friendly devices support IDCODE */
1077 tap->hasidcode = true;
1078 jtag_examine_chain_display(LOG_LVL_INFO,
1079 "tap/device found",
1080 tap->dotted_name, idcode);
1082 bit_count += 32;
1084 tap->idcode = idcode;
1086 /* ensure the TAP ID matches what was expected */
1087 if (!jtag_examine_chain_match_tap(tap))
1088 retval = ERROR_JTAG_INIT_SOFT_FAIL;
1091 /* Fail if too many TAPs were enabled for us to verify them all. */
1092 if (tap) {
1093 LOG_ERROR("Too many TAPs enabled; '%s' ignored.",
1094 tap->dotted_name);
1095 return ERROR_JTAG_INIT_FAILED;
1098 /* if autoprobing, the tap list is still empty ... populate it! */
1099 while (autoprobe && bit_count < (JTAG_MAX_CHAIN_SIZE * 32) - 31) {
1100 uint32_t idcode;
1101 char buf[12];
1103 /* Is there another TAP? */
1104 idcode = buf_get_u32(idcode_buffer, bit_count, 32);
1105 if (jtag_idcode_is_final(idcode))
1106 break;
1108 /* Default everything in this TAP except IR length.
1110 * REVISIT create a jtag_alloc(chip, tap) routine, and
1111 * share it with jim_newtap_cmd().
1113 tap = calloc(1, sizeof *tap);
1114 if (!tap)
1115 return ERROR_FAIL;
1117 sprintf(buf, "auto%d", tapcount++);
1118 tap->chip = strdup(buf);
1119 tap->tapname = strdup("tap");
1121 sprintf(buf, "%s.%s", tap->chip, tap->tapname);
1122 tap->dotted_name = strdup(buf);
1124 /* tap->ir_length == 0 ... signifying irlen autoprobe */
1125 tap->ir_capture_mask = 0x03;
1126 tap->ir_capture_value = 0x01;
1128 tap->enabled = true;
1130 if ((idcode & 1) == 0) {
1131 bit_count += 1;
1132 tap->hasidcode = false;
1133 } else {
1134 bit_count += 32;
1135 tap->hasidcode = true;
1136 tap->idcode = idcode;
1138 tap->expected_ids_cnt = 1;
1139 tap->expected_ids = malloc(sizeof(uint32_t));
1140 tap->expected_ids[0] = idcode;
1143 LOG_WARNING("AUTO %s - use \"jtag newtap "
1144 "%s %s -expected-id 0x%8.8" PRIx32 " ...\"",
1145 tap->dotted_name, tap->chip, tap->tapname,
1146 tap->idcode);
1148 jtag_tap_init(tap);
1151 /* After those IDCODE or BYPASS register values should be
1152 * only the data we fed into the scan chain.
1154 if (jtag_examine_chain_end(idcode_buffer, bit_count,
1155 8 * sizeof(idcode_buffer))) {
1156 LOG_ERROR("double-check your JTAG setup (interface, "
1157 "speed, missing TAPs, ...)");
1158 return ERROR_JTAG_INIT_FAILED;
1161 /* Return success or, for backwards compatibility if only
1162 * some IDCODE values mismatched, a soft/continuable fault.
1164 return retval;
1168 * Validate the date loaded by entry to the Capture-IR state, to help
1169 * find errors related to scan chain configuration (wrong IR lengths)
1170 * or communication.
1172 * Entry state can be anything. On non-error exit, all TAPs are in
1173 * bypass mode. On error exits, the scan chain is reset.
1175 static int jtag_validate_ircapture(void)
1177 struct jtag_tap *tap;
1178 int total_ir_length = 0;
1179 uint8_t *ir_test = NULL;
1180 struct scan_field field;
1181 int val;
1182 int chain_pos = 0;
1183 int retval;
1185 /* when autoprobing, accomodate huge IR lengths */
1186 for (tap = NULL, total_ir_length = 0;
1187 (tap = jtag_tap_next_enabled(tap)) != NULL;
1188 total_ir_length += tap->ir_length) {
1189 if (tap->ir_length == 0)
1190 total_ir_length += JTAG_IRLEN_MAX;
1193 /* increase length to add 2 bit sentinel after scan */
1194 total_ir_length += 2;
1196 ir_test = malloc(DIV_ROUND_UP(total_ir_length, 8));
1197 if (ir_test == NULL)
1198 return ERROR_FAIL;
1200 /* after this scan, all TAPs will capture BYPASS instructions */
1201 buf_set_ones(ir_test, total_ir_length);
1203 field.num_bits = total_ir_length;
1204 field.out_value = ir_test;
1205 field.in_value = ir_test;
1207 jtag_add_plain_ir_scan(1, &field, TAP_IDLE);
1209 LOG_DEBUG("IR capture validation scan");
1210 retval = jtag_execute_queue();
1211 if (retval != ERROR_OK)
1212 goto done;
1214 tap = NULL;
1215 chain_pos = 0;
1217 for (;;) {
1218 tap = jtag_tap_next_enabled(tap);
1219 if (tap == NULL) {
1220 break;
1223 /* If we're autoprobing, guess IR lengths. They must be at
1224 * least two bits. Guessing will fail if (a) any TAP does
1225 * not conform to the JTAG spec; or (b) when the upper bits
1226 * captured from some conforming TAP are nonzero. Or if
1227 * (c) an IR length is longer than 32 bits -- which is only
1228 * an implementation limit, which could someday be raised.
1230 * REVISIT optimization: if there's a *single* TAP we can
1231 * lift restrictions (a) and (b) by scanning a recognizable
1232 * pattern before the all-ones BYPASS. Check for where the
1233 * pattern starts in the result, instead of an 0...01 value.
1235 * REVISIT alternative approach: escape to some tcl code
1236 * which could provide more knowledge, based on IDCODE; and
1237 * only guess when that has no success.
1239 if (tap->ir_length == 0) {
1240 tap->ir_length = 2;
1241 while ((val = buf_get_u32(ir_test, chain_pos,
1242 tap->ir_length + 1)) == 1
1243 && tap->ir_length <= 32) {
1244 tap->ir_length++;
1246 LOG_WARNING("AUTO %s - use \"... -irlen %d\"",
1247 jtag_tap_name(tap), tap->ir_length);
1250 /* Validate the two LSBs, which must be 01 per JTAG spec.
1252 * Or ... more bits could be provided by TAP declaration.
1253 * Plus, some taps (notably in i.MX series chips) violate
1254 * this part of the JTAG spec, so their capture mask/value
1255 * attributes might disable this test.
1257 val = buf_get_u32(ir_test, chain_pos, tap->ir_length);
1258 if ((val & tap->ir_capture_mask) != tap->ir_capture_value) {
1259 LOG_ERROR("%s: IR capture error; saw 0x%0*x not 0x%0*x",
1260 jtag_tap_name(tap),
1261 (tap->ir_length + 7) / tap->ir_length,
1262 val,
1263 (tap->ir_length + 7) / tap->ir_length,
1264 (unsigned) tap->ir_capture_value);
1266 retval = ERROR_JTAG_INIT_FAILED;
1267 goto done;
1269 LOG_DEBUG("%s: IR capture 0x%0*x", jtag_tap_name(tap),
1270 (tap->ir_length + 7) / tap->ir_length, val);
1271 chain_pos += tap->ir_length;
1274 /* verify the '11' sentinel we wrote is returned at the end */
1275 val = buf_get_u32(ir_test, chain_pos, 2);
1276 if (val != 0x3)
1278 char *cbuf = buf_to_str(ir_test, total_ir_length, 16);
1280 LOG_ERROR("IR capture error at bit %d, saw 0x%s not 0x...3",
1281 chain_pos, cbuf);
1282 free(cbuf);
1283 retval = ERROR_JTAG_INIT_FAILED;
1286 done:
1287 free(ir_test);
1288 if (retval != ERROR_OK) {
1289 jtag_add_tlr();
1290 jtag_execute_queue();
1292 return retval;
1296 void jtag_tap_init(struct jtag_tap *tap)
1298 unsigned ir_len_bits;
1299 unsigned ir_len_bytes;
1301 /* if we're autoprobing, cope with potentially huge ir_length */
1302 ir_len_bits = tap->ir_length ? : JTAG_IRLEN_MAX;
1303 ir_len_bytes = DIV_ROUND_UP(ir_len_bits, 8);
1305 tap->expected = calloc(1, ir_len_bytes);
1306 tap->expected_mask = calloc(1, ir_len_bytes);
1307 tap->cur_instr = malloc(ir_len_bytes);
1309 /// @todo cope better with ir_length bigger than 32 bits
1310 if (ir_len_bits > 32)
1311 ir_len_bits = 32;
1313 buf_set_u32(tap->expected, 0, ir_len_bits, tap->ir_capture_value);
1314 buf_set_u32(tap->expected_mask, 0, ir_len_bits, tap->ir_capture_mask);
1316 // TAP will be in bypass mode after jtag_validate_ircapture()
1317 tap->bypass = 1;
1318 buf_set_ones(tap->cur_instr, tap->ir_length);
1320 // register the reset callback for the TAP
1321 jtag_register_event_callback(&jtag_reset_callback, tap);
1323 LOG_DEBUG("Created Tap: %s @ abs position %d, "
1324 "irlen %d, capture: 0x%x mask: 0x%x", tap->dotted_name,
1325 tap->abs_chain_position, tap->ir_length,
1326 (unsigned) tap->ir_capture_value,
1327 (unsigned) tap->ir_capture_mask);
1328 jtag_tap_add(tap);
1331 void jtag_tap_free(struct jtag_tap *tap)
1333 jtag_unregister_event_callback(&jtag_reset_callback, tap);
1335 /// @todo is anything missing? no memory leaks please
1336 free((void *)tap->expected);
1337 free((void *)tap->expected_ids);
1338 free((void *)tap->chip);
1339 free((void *)tap->tapname);
1340 free((void *)tap->dotted_name);
1341 free(tap);
1344 int jtag_interface_init(struct command_context *cmd_ctx)
1346 if (jtag)
1347 return ERROR_OK;
1349 if (!jtag_interface)
1351 /* nothing was previously specified by "interface" command */
1352 LOG_ERROR("JTAG interface has to be specified, see \"interface\" command");
1353 return ERROR_JTAG_INVALID_INTERFACE;
1356 jtag = jtag_interface;
1357 if (jtag_interface->init() != ERROR_OK)
1359 jtag = NULL;
1360 return ERROR_JTAG_INIT_FAILED;
1363 int requested_khz = jtag_get_speed_khz();
1364 int actual_khz = requested_khz;
1365 int retval = jtag_get_speed_readable(&actual_khz);
1366 if (ERROR_OK != retval)
1367 LOG_INFO("interface specific clock speed value %d", jtag_get_speed());
1368 else if (actual_khz)
1370 if ((CLOCK_MODE_RCLK == clock_mode)
1371 || ((CLOCK_MODE_KHZ == clock_mode) && !requested_khz))
1373 LOG_INFO("RCLK (adaptive clock speed) not supported - fallback to %d kHz"
1374 , actual_khz);
1376 else
1377 LOG_INFO("clock speed %d kHz", actual_khz);
1379 else
1380 LOG_INFO("RCLK (adaptive clock speed)");
1382 return ERROR_OK;
1385 int jtag_init_inner(struct command_context *cmd_ctx)
1387 struct jtag_tap *tap;
1388 int retval;
1389 bool issue_setup = true;
1391 LOG_DEBUG("Init JTAG chain");
1393 tap = jtag_tap_next_enabled(NULL);
1394 if (tap == NULL) {
1395 /* Once JTAG itself is properly set up, and the scan chain
1396 * isn't absurdly large, IDCODE autoprobe should work fine.
1398 * But ... IRLEN autoprobe can fail even on systems which
1399 * are fully conformant to JTAG. Also, JTAG setup can be
1400 * quite finicky on some systems.
1402 * REVISIT: if TAP autoprobe works OK, then in many cases
1403 * we could escape to tcl code and set up targets based on
1404 * the TAP's IDCODE values.
1406 LOG_WARNING("There are no enabled taps. "
1407 "AUTO PROBING MIGHT NOT WORK!!");
1409 /* REVISIT default clock will often be too fast ... */
1412 jtag_add_tlr();
1413 if ((retval = jtag_execute_queue()) != ERROR_OK)
1414 return retval;
1416 /* Examine DR values first. This discovers problems which will
1417 * prevent communication ... hardware issues like TDO stuck, or
1418 * configuring the wrong number of (enabled) TAPs.
1420 retval = jtag_examine_chain();
1421 switch (retval) {
1422 case ERROR_OK:
1423 /* complete success */
1424 break;
1425 case ERROR_JTAG_INIT_SOFT_FAIL:
1426 /* For backward compatibility reasons, try coping with
1427 * configuration errors involving only ID mismatches.
1428 * We might be able to talk to the devices.
1430 LOG_ERROR("Trying to use configured scan chain anyway...");
1431 issue_setup = false;
1432 break;
1433 default:
1434 /* some hard error; already issued diagnostics */
1435 return retval;
1438 /* Now look at IR values. Problems here will prevent real
1439 * communication. They mostly mean that the IR length is
1440 * wrong ... or that the IR capture value is wrong. (The
1441 * latter is uncommon, but easily worked around: provide
1442 * ircapture/irmask values during TAP setup.)
1444 retval = jtag_validate_ircapture();
1445 if (retval != ERROR_OK)
1446 return retval;
1448 if (issue_setup)
1449 jtag_notify_event(JTAG_TAP_EVENT_SETUP);
1450 else
1451 LOG_WARNING("Bypassing JTAG setup events due to errors");
1454 return ERROR_OK;
1457 int jtag_interface_quit(void)
1459 if (!jtag || !jtag->quit)
1460 return ERROR_OK;
1462 // close the JTAG interface
1463 int result = jtag->quit();
1464 if (ERROR_OK != result)
1465 LOG_ERROR("failed: %d", result);
1467 return ERROR_OK;
1471 int jtag_init_reset(struct command_context *cmd_ctx)
1473 int retval;
1475 if ((retval = jtag_interface_init(cmd_ctx)) != ERROR_OK)
1476 return retval;
1478 LOG_DEBUG("Initializing with hard TRST+SRST reset");
1481 * This procedure is used by default when OpenOCD triggers a reset.
1482 * It's now done through an overridable Tcl "init_reset" wrapper.
1484 * This started out as a more powerful "get JTAG working" reset than
1485 * jtag_init_inner(), applying TRST because some chips won't activate
1486 * JTAG without a TRST cycle (presumed to be async, though some of
1487 * those chips synchronize JTAG activation using TCK).
1489 * But some chips only activate JTAG as part of an SRST cycle; SRST
1490 * got mixed in. So it became a hard reset routine, which got used
1491 * in more places, and which coped with JTAG reset being forced as
1492 * part of SRST (srst_pulls_trst).
1494 * And even more corner cases started to surface: TRST and/or SRST
1495 * assertion timings matter; some chips need other JTAG operations;
1496 * TRST/SRST sequences can need to be different from these, etc.
1498 * Systems should override that wrapper to support system-specific
1499 * requirements that this not-fully-generic code doesn't handle.
1501 * REVISIT once Tcl code can read the reset_config modes, this won't
1502 * need to be a C routine at all...
1504 jtag_add_reset(1, 0); /* TAP_RESET, using TMS+TCK or TRST */
1505 if (jtag_reset_config & RESET_HAS_SRST)
1507 jtag_add_reset(1, 1);
1508 if ((jtag_reset_config & RESET_SRST_PULLS_TRST) == 0)
1509 jtag_add_reset(0, 1);
1511 jtag_add_reset(0, 0);
1512 if ((retval = jtag_execute_queue()) != ERROR_OK)
1513 return retval;
1515 /* Check that we can communication on the JTAG chain + eventually we want to
1516 * be able to perform enumeration only after OpenOCD has started
1517 * telnet and GDB server
1519 * That would allow users to more easily perform any magic they need to before
1520 * reset happens.
1522 return jtag_init_inner(cmd_ctx);
1525 int jtag_init(struct command_context *cmd_ctx)
1527 int retval;
1529 if ((retval = jtag_interface_init(cmd_ctx)) != ERROR_OK)
1530 return retval;
1532 /* guard against oddball hardware: force resets to be inactive */
1533 jtag_add_reset(0, 0);
1534 if ((retval = jtag_execute_queue()) != ERROR_OK)
1535 return retval;
1537 if (Jim_Eval_Named(cmd_ctx->interp, "jtag_init", __FILE__, __LINE__) != JIM_OK)
1538 return ERROR_FAIL;
1540 return ERROR_OK;
1543 unsigned jtag_get_speed_khz(void)
1545 return speed_khz;
1548 static int jtag_khz_to_speed(unsigned khz, int* speed)
1550 LOG_DEBUG("convert khz to interface specific speed value");
1551 speed_khz = khz;
1552 if (jtag != NULL)
1554 LOG_DEBUG("have interface set up");
1555 int speed_div1;
1556 int retval = jtag->khz(jtag_get_speed_khz(), &speed_div1);
1557 if (ERROR_OK != retval)
1559 return retval;
1561 *speed = speed_div1;
1563 return ERROR_OK;
1566 static int jtag_rclk_to_speed(unsigned fallback_speed_khz, int* speed)
1568 int retval = jtag_khz_to_speed(0, speed);
1569 if ((ERROR_OK != retval) && fallback_speed_khz)
1571 LOG_DEBUG("trying fallback speed...");
1572 retval = jtag_khz_to_speed(fallback_speed_khz, speed);
1574 return retval;
1577 static int jtag_set_speed(int speed)
1579 jtag_speed = speed;
1580 /* this command can be called during CONFIG,
1581 * in which case jtag isn't initialized */
1582 return jtag ? jtag->speed(speed) : ERROR_OK;
1585 int jtag_config_khz(unsigned khz)
1587 LOG_DEBUG("handle jtag khz");
1588 clock_mode = CLOCK_MODE_KHZ;
1589 int speed = 0;
1590 int retval = jtag_khz_to_speed(khz, &speed);
1591 return (ERROR_OK != retval) ? retval : jtag_set_speed(speed);
1594 int jtag_config_rclk(unsigned fallback_speed_khz)
1596 LOG_DEBUG("handle jtag rclk");
1597 clock_mode = CLOCK_MODE_RCLK;
1598 rclk_fallback_speed_khz = fallback_speed_khz;
1599 int speed = 0;
1600 int retval = jtag_rclk_to_speed(fallback_speed_khz, &speed);
1601 return (ERROR_OK != retval) ? retval : jtag_set_speed(speed);
1604 int jtag_get_speed(void)
1606 int speed;
1607 switch(clock_mode)
1609 case CLOCK_MODE_SPEED:
1610 speed = jtag_speed;
1611 break;
1612 case CLOCK_MODE_KHZ:
1613 jtag_khz_to_speed(jtag_get_speed_khz(), &speed);
1614 break;
1615 case CLOCK_MODE_RCLK:
1616 jtag_rclk_to_speed(rclk_fallback_speed_khz, &speed);
1617 break;
1618 default:
1619 LOG_ERROR("BUG: unknown jtag clock mode");
1620 speed = 0;
1621 break;
1623 return speed;
1626 int jtag_get_speed_readable(int *khz)
1628 return jtag ? jtag->speed_div(jtag_get_speed(), khz) : ERROR_OK;
1631 void jtag_set_verify(bool enable)
1633 jtag_verify = enable;
1636 bool jtag_will_verify()
1638 return jtag_verify;
1641 void jtag_set_verify_capture_ir(bool enable)
1643 jtag_verify_capture_ir = enable;
1646 bool jtag_will_verify_capture_ir()
1648 return jtag_verify_capture_ir;
1651 int jtag_power_dropout(int *dropout)
1653 if (jtag == NULL)
1655 /* TODO: as the jtag interface is not valid all
1656 * we can do at the moment is exit OpenOCD */
1657 LOG_ERROR("No Valid JTAG Interface Configured.");
1658 exit(-1);
1660 return jtag->power_dropout(dropout);
1663 int jtag_srst_asserted(int *srst_asserted)
1665 return jtag->srst_asserted(srst_asserted);
1668 enum reset_types jtag_get_reset_config(void)
1670 return jtag_reset_config;
1672 void jtag_set_reset_config(enum reset_types type)
1674 jtag_reset_config = type;
1677 int jtag_get_trst(void)
1679 return jtag_trst;
1681 int jtag_get_srst(void)
1683 return jtag_srst;
1686 void jtag_set_nsrst_delay(unsigned delay)
1688 jtag_nsrst_delay = delay;
1690 unsigned jtag_get_nsrst_delay(void)
1692 return jtag_nsrst_delay;
1694 void jtag_set_ntrst_delay(unsigned delay)
1696 jtag_ntrst_delay = delay;
1698 unsigned jtag_get_ntrst_delay(void)
1700 return jtag_ntrst_delay;
1704 void jtag_set_nsrst_assert_width(unsigned delay)
1706 jtag_nsrst_assert_width = delay;
1708 unsigned jtag_get_nsrst_assert_width(void)
1710 return jtag_nsrst_assert_width;
1712 void jtag_set_ntrst_assert_width(unsigned delay)
1714 jtag_ntrst_assert_width = delay;
1716 unsigned jtag_get_ntrst_assert_width(void)
1718 return jtag_ntrst_assert_width;