1 /***************************************************************************
2 * Copyright (C) 2009 Zachary T Welch *
3 * zw@superlucidity.net *
5 * Copyright (C) 2007,2008,2009 Øyvind Harboe *
6 * oyvind.harboe@zylin.com *
8 * Copyright (C) 2009 SoftPLC Corporation *
12 * Copyright (C) 2005 by Dominic Rath *
13 * Dominic.Rath@gmx.de *
15 * This program is free software; you can redistribute it and/or modify *
16 * it under the terms of the GNU General Public License as published by *
17 * the Free Software Foundation; either version 2 of the License, or *
18 * (at your option) any later version. *
20 * This program is distributed in the hope that it will be useful, *
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of *
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
23 * GNU General Public License for more details. *
25 * You should have received a copy of the GNU General Public License *
26 * along with this program; if not, write to the *
27 * Free Software Foundation, Inc., *
28 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
29 ***************************************************************************/
35 #include "interface.h"
42 /// The number of JTAG queue flushes (for profiling and debugging purposes).
43 static int jtag_flush_queue_count
;
45 static void jtag_add_scan_check(void (*jtag_add_scan
)(int in_num_fields
, const struct scan_field
*in_fields
, tap_state_t state
),
46 int in_num_fields
, struct scan_field
*in_fields
, tap_state_t state
);
49 * The jtag_error variable is set when an error occurs while executing
50 * the queue. Application code may set this using jtag_set_error(),
51 * when an error occurs during processing that should be reported during
52 * jtag_execute_queue().
54 * Tts value may be checked with jtag_get_error() and cleared with
55 * jtag_error_clear(). This value is returned (and cleared) by
56 * jtag_execute_queue().
58 static int jtag_error
= ERROR_OK
;
60 static const char *jtag_event_strings
[] =
62 [JTAG_TRST_ASSERTED
] = "TAP reset",
63 [JTAG_TAP_EVENT_SETUP
] = "TAP setup",
64 [JTAG_TAP_EVENT_ENABLE
] = "TAP enabled",
65 [JTAG_TAP_EVENT_DISABLE
] = "TAP disabled",
69 * JTAG adapters must initialize with TRST and SRST de-asserted
70 * (they're negative logic, so that means *high*). But some
71 * hardware doesn't necessarily work that way ... so set things
72 * up so that jtag_init() always forces that state.
74 static int jtag_trst
= -1;
75 static int jtag_srst
= -1;
78 * List all TAPs that have been created.
80 static struct jtag_tap
*__jtag_all_taps
= NULL
;
82 * The number of TAPs in the __jtag_all_taps list, used to track the
83 * assigned chain position to new TAPs
85 static unsigned jtag_num_taps
= 0;
87 static enum reset_types jtag_reset_config
= RESET_NONE
;
88 static tap_state_t cmd_queue_end_state
= TAP_RESET
;
89 tap_state_t cmd_queue_cur_state
= TAP_RESET
;
91 static bool jtag_verify_capture_ir
= true;
92 static int jtag_verify
= 1;
94 /* how long the OpenOCD should wait before attempting JTAG communication after reset lines deasserted (in ms) */
95 static int jtag_nsrst_delay
= 0; /* default to no nSRST delay */
96 static int jtag_ntrst_delay
= 0; /* default to no nTRST delay */
97 static int jtag_nsrst_assert_width
= 0; /* width of assertion */
98 static int jtag_ntrst_assert_width
= 0; /* width of assertion */
101 * Contains a single callback along with a pointer that will be passed
102 * when an event occurs.
104 struct jtag_event_callback
{
106 jtag_event_handler_t callback
;
107 /// the private data to pass to the callback
109 /// the next callback
110 struct jtag_event_callback
* next
;
113 /* callbacks to inform high-level handlers about JTAG state changes */
114 static struct jtag_event_callback
*jtag_event_callbacks
;
117 static int speed_khz
= 0;
118 /* speed to fallback to when RCLK is requested but not supported */
119 static int rclk_fallback_speed_khz
= 0;
120 static enum {CLOCK_MODE_SPEED
, CLOCK_MODE_KHZ
, CLOCK_MODE_RCLK
} clock_mode
;
121 static int jtag_speed
= 0;
123 static struct jtag_interface
*jtag
= NULL
;
126 struct jtag_interface
*jtag_interface
= NULL
;
128 void jtag_set_error(int error
)
130 if ((error
== ERROR_OK
) || (jtag_error
!= ERROR_OK
))
134 int jtag_get_error(void)
138 int jtag_error_clear(void)
140 int temp
= jtag_error
;
141 jtag_error
= ERROR_OK
;
147 static bool jtag_poll
= 1;
149 bool is_jtag_poll_safe(void)
151 /* Polling can be disabled explicitly with set_enabled(false).
152 * It is also implicitly disabled while TRST is active and
153 * while SRST is gating the JTAG clock.
155 if (!jtag_poll
|| jtag_trst
!= 0)
157 return jtag_srst
== 0 || (jtag_reset_config
& RESET_SRST_NO_GATING
);
160 bool jtag_poll_get_enabled(void)
165 void jtag_poll_set_enabled(bool value
)
172 struct jtag_tap
*jtag_all_taps(void)
174 return __jtag_all_taps
;
177 unsigned jtag_tap_count(void)
179 return jtag_num_taps
;
182 unsigned jtag_tap_count_enabled(void)
184 struct jtag_tap
*t
= jtag_all_taps();
195 /// Append a new TAP to the chain of all taps.
196 void jtag_tap_add(struct jtag_tap
*t
)
198 t
->abs_chain_position
= jtag_num_taps
++;
200 struct jtag_tap
**tap
= &__jtag_all_taps
;
202 tap
= &(*tap
)->next_tap
;
206 /* returns a pointer to the n-th device in the scan chain */
207 static inline struct jtag_tap
*jtag_tap_by_position(unsigned n
)
209 struct jtag_tap
*t
= jtag_all_taps();
217 struct jtag_tap
*jtag_tap_by_string(const char *s
)
219 /* try by name first */
220 struct jtag_tap
*t
= jtag_all_taps();
224 if (0 == strcmp(t
->dotted_name
, s
))
229 /* no tap found by name, so try to parse the name as a number */
231 if (parse_uint(s
, &n
) != ERROR_OK
)
234 /* FIXME remove this numeric fallback code late June 2010, along
235 * with all info in the User's Guide that TAPs have numeric IDs.
236 * Also update "scan_chain" output to not display the numbers.
238 t
= jtag_tap_by_position(n
);
240 LOG_WARNING("Specify TAP '%s' by name, not number %u",
246 struct jtag_tap
* jtag_tap_next_enabled(struct jtag_tap
* p
)
248 p
= p
? p
->next_tap
: jtag_all_taps();
258 const char *jtag_tap_name(const struct jtag_tap
*tap
)
260 return (tap
== NULL
) ? "(unknown)" : tap
->dotted_name
;
264 int jtag_register_event_callback(jtag_event_handler_t callback
, void *priv
)
266 struct jtag_event_callback
**callbacks_p
= &jtag_event_callbacks
;
268 if (callback
== NULL
)
270 return ERROR_INVALID_ARGUMENTS
;
275 while ((*callbacks_p
)->next
)
276 callbacks_p
= &((*callbacks_p
)->next
);
277 callbacks_p
= &((*callbacks_p
)->next
);
280 (*callbacks_p
) = malloc(sizeof(struct jtag_event_callback
));
281 (*callbacks_p
)->callback
= callback
;
282 (*callbacks_p
)->priv
= priv
;
283 (*callbacks_p
)->next
= NULL
;
288 int jtag_unregister_event_callback(jtag_event_handler_t callback
, void *priv
)
290 struct jtag_event_callback
**callbacks_p
;
291 struct jtag_event_callback
**next
;
293 if (callback
== NULL
)
295 return ERROR_INVALID_ARGUMENTS
;
298 for (callbacks_p
= &jtag_event_callbacks
;
299 *callbacks_p
!= NULL
;
302 next
= &((*callbacks_p
)->next
);
304 if ((*callbacks_p
)->priv
!= priv
)
307 if ((*callbacks_p
)->callback
== callback
)
310 *callbacks_p
= *next
;
317 int jtag_call_event_callbacks(enum jtag_event event
)
319 struct jtag_event_callback
*callback
= jtag_event_callbacks
;
321 LOG_DEBUG("jtag event: %s", jtag_event_strings
[event
]);
325 struct jtag_event_callback
*next
;
327 /* callback may remove itself */
328 next
= callback
->next
;
329 callback
->callback(event
, callback
->priv
);
336 static void jtag_checks(void)
338 assert(jtag_trst
== 0);
341 static void jtag_prelude(tap_state_t state
)
345 assert(state
!= TAP_INVALID
);
347 cmd_queue_cur_state
= state
;
350 void jtag_alloc_in_value32(struct scan_field
*field
)
352 interface_jtag_alloc_in_value32(field
);
355 void jtag_add_ir_scan_noverify(int in_count
, const struct scan_field
*in_fields
,
360 int retval
= interface_jtag_add_ir_scan(in_count
, in_fields
, state
);
361 jtag_set_error(retval
);
365 void jtag_add_ir_scan(int in_num_fields
, struct scan_field
*in_fields
, tap_state_t state
)
367 assert(state
!= TAP_RESET
);
369 if (jtag_verify
&& jtag_verify_capture_ir
)
371 /* 8 x 32 bit id's is enough for all invocations */
373 for (int j
= 0; j
< in_num_fields
; j
++)
375 /* if we are to run a verification of the ir scan, we need to get the input back.
376 * We may have to allocate space if the caller didn't ask for the input back.
378 in_fields
[j
].check_value
= in_fields
[j
].tap
->expected
;
379 in_fields
[j
].check_mask
= in_fields
[j
].tap
->expected_mask
;
381 jtag_add_scan_check(jtag_add_ir_scan_noverify
, in_num_fields
, in_fields
, state
);
384 jtag_add_ir_scan_noverify(in_num_fields
, in_fields
, state
);
388 void jtag_add_plain_ir_scan(int in_num_fields
, const struct scan_field
*in_fields
,
391 assert(state
!= TAP_RESET
);
395 int retval
= interface_jtag_add_plain_ir_scan(
396 in_num_fields
, in_fields
, state
);
397 jtag_set_error(retval
);
400 static int jtag_check_value_inner(uint8_t *captured
, uint8_t *in_check_value
,
401 uint8_t *in_check_mask
, int num_bits
);
403 static int jtag_check_value_mask_callback(jtag_callback_data_t data0
, jtag_callback_data_t data1
, jtag_callback_data_t data2
, jtag_callback_data_t data3
)
405 return jtag_check_value_inner((uint8_t *)data0
, (uint8_t *)data1
, (uint8_t *)data2
, (int)data3
);
408 static void jtag_add_scan_check(void (*jtag_add_scan
)(int in_num_fields
, const struct scan_field
*in_fields
, tap_state_t state
),
409 int in_num_fields
, struct scan_field
*in_fields
, tap_state_t state
)
411 for (int i
= 0; i
< in_num_fields
; i
++)
413 struct scan_field
*field
= &in_fields
[i
];
414 field
->allocated
= 0;
416 if (field
->check_value
|| field
->in_value
)
418 interface_jtag_add_scan_check_alloc(field
);
422 jtag_add_scan(in_num_fields
, in_fields
, state
);
424 for (int i
= 0; i
< in_num_fields
; i
++)
426 if ((in_fields
[i
].check_value
!= NULL
) && (in_fields
[i
].in_value
!= NULL
))
428 /* this is synchronous for a minidriver */
429 jtag_add_callback4(jtag_check_value_mask_callback
, (jtag_callback_data_t
)in_fields
[i
].in_value
,
430 (jtag_callback_data_t
)in_fields
[i
].check_value
,
431 (jtag_callback_data_t
)in_fields
[i
].check_mask
,
432 (jtag_callback_data_t
)in_fields
[i
].num_bits
);
434 if (in_fields
[i
].allocated
)
436 free(in_fields
[i
].in_value
);
438 if (in_fields
[i
].modified
)
440 in_fields
[i
].in_value
= NULL
;
445 void jtag_add_dr_scan_check(int in_num_fields
, struct scan_field
*in_fields
, tap_state_t state
)
449 jtag_add_scan_check(jtag_add_dr_scan
, in_num_fields
, in_fields
, state
);
452 jtag_add_dr_scan(in_num_fields
, in_fields
, state
);
457 void jtag_add_dr_scan(int in_num_fields
, const struct scan_field
*in_fields
,
460 assert(state
!= TAP_RESET
);
465 retval
= interface_jtag_add_dr_scan(in_num_fields
, in_fields
, state
);
466 jtag_set_error(retval
);
469 void jtag_add_plain_dr_scan(int in_num_fields
, const struct scan_field
*in_fields
,
472 assert(state
!= TAP_RESET
);
477 retval
= interface_jtag_add_plain_dr_scan(in_num_fields
, in_fields
, state
);
478 jtag_set_error(retval
);
481 void jtag_add_tlr(void)
483 jtag_prelude(TAP_RESET
);
484 jtag_set_error(interface_jtag_add_tlr());
486 /* NOTE: order here matches TRST path in jtag_add_reset() */
487 jtag_call_event_callbacks(JTAG_TRST_ASSERTED
);
488 jtag_notify_event(JTAG_TRST_ASSERTED
);
491 void jtag_add_pathmove(int num_states
, const tap_state_t
*path
)
493 tap_state_t cur_state
= cmd_queue_cur_state
;
495 /* the last state has to be a stable state */
496 if (!tap_is_state_stable(path
[num_states
- 1]))
498 LOG_ERROR("BUG: TAP path doesn't finish in a stable state");
499 jtag_set_error(ERROR_JTAG_NOT_STABLE_STATE
);
503 for (int i
= 0; i
< num_states
; i
++)
505 if (path
[i
] == TAP_RESET
)
507 LOG_ERROR("BUG: TAP_RESET is not a valid state for pathmove sequences");
508 jtag_set_error(ERROR_JTAG_STATE_INVALID
);
512 if (tap_state_transition(cur_state
, true) != path
[i
]
513 && tap_state_transition(cur_state
, false) != path
[i
])
515 LOG_ERROR("BUG: %s -> %s isn't a valid TAP transition",
516 tap_state_name(cur_state
), tap_state_name(path
[i
]));
517 jtag_set_error(ERROR_JTAG_TRANSITION_INVALID
);
525 jtag_set_error(interface_jtag_add_pathmove(num_states
, path
));
526 cmd_queue_cur_state
= path
[num_states
- 1];
529 int jtag_add_statemove(tap_state_t goal_state
)
531 tap_state_t cur_state
= cmd_queue_cur_state
;
533 if (goal_state
!= cur_state
)
535 LOG_DEBUG("cur_state=%s goal_state=%s",
536 tap_state_name(cur_state
),
537 tap_state_name(goal_state
));
540 /* If goal is RESET, be paranoid and force that that transition
541 * (e.g. five TCK cycles, TMS high). Else trust "cur_state".
543 if (goal_state
== TAP_RESET
)
545 else if (goal_state
== cur_state
)
546 /* nothing to do */ ;
548 else if (tap_is_state_stable(cur_state
) && tap_is_state_stable(goal_state
))
550 unsigned tms_bits
= tap_get_tms_path(cur_state
, goal_state
);
551 unsigned tms_count
= tap_get_tms_path_len(cur_state
, goal_state
);
552 tap_state_t moves
[8];
553 assert(tms_count
< ARRAY_SIZE(moves
));
555 for (unsigned i
= 0; i
< tms_count
; i
++, tms_bits
>>= 1)
557 bool bit
= tms_bits
& 1;
559 cur_state
= tap_state_transition(cur_state
, bit
);
560 moves
[i
] = cur_state
;
563 jtag_add_pathmove(tms_count
, moves
);
565 else if (tap_state_transition(cur_state
, true) == goal_state
566 || tap_state_transition(cur_state
, false) == goal_state
)
568 jtag_add_pathmove(1, &goal_state
);
577 void jtag_add_runtest(int num_cycles
, tap_state_t state
)
580 jtag_set_error(interface_jtag_add_runtest(num_cycles
, state
));
584 void jtag_add_clocks(int num_cycles
)
586 if (!tap_is_state_stable(cmd_queue_cur_state
))
588 LOG_ERROR("jtag_add_clocks() called with TAP in unstable state \"%s\"",
589 tap_state_name(cmd_queue_cur_state
));
590 jtag_set_error(ERROR_JTAG_NOT_STABLE_STATE
);
597 jtag_set_error(interface_jtag_add_clocks(num_cycles
));
601 void jtag_add_reset(int req_tlr_or_trst
, int req_srst
)
603 int trst_with_tlr
= 0;
607 /* Without SRST, we must use target-specific JTAG operations
608 * on each target; callers should not be requesting SRST when
609 * that signal doesn't exist.
611 * RESET_SRST_PULLS_TRST is a board or chip level quirk, which
612 * can kick in even if the JTAG adapter can't drive TRST.
615 if (!(jtag_reset_config
& RESET_HAS_SRST
)) {
616 LOG_ERROR("BUG: can't assert SRST");
617 jtag_set_error(ERROR_FAIL
);
620 if ((jtag_reset_config
& RESET_SRST_PULLS_TRST
) != 0
621 && !req_tlr_or_trst
) {
622 LOG_ERROR("BUG: can't assert only SRST");
623 jtag_set_error(ERROR_FAIL
);
629 /* JTAG reset (entry to TAP_RESET state) can always be achieved
630 * using TCK and TMS; that may go through a TAP_{IR,DR}UPDATE
631 * state first. TRST accelerates it, and bypasses those states.
633 * RESET_TRST_PULLS_SRST is a board or chip level quirk, which
634 * can kick in even if the JTAG adapter can't drive SRST.
636 if (req_tlr_or_trst
) {
637 if (!(jtag_reset_config
& RESET_HAS_TRST
))
639 else if ((jtag_reset_config
& RESET_TRST_PULLS_SRST
) != 0
646 /* Maybe change TRST and/or SRST signal state */
647 if (jtag_srst
!= new_srst
|| jtag_trst
!= new_trst
) {
650 retval
= interface_jtag_add_reset(new_trst
, new_srst
);
651 if (retval
!= ERROR_OK
)
652 jtag_set_error(retval
);
654 retval
= jtag_execute_queue();
656 if (retval
!= ERROR_OK
) {
657 LOG_ERROR("TRST/SRST error %d", retval
);
662 /* SRST resets everything hooked up to that signal */
663 if (jtag_srst
!= new_srst
) {
664 jtag_srst
= new_srst
;
667 LOG_DEBUG("SRST line asserted");
668 if (jtag_nsrst_assert_width
)
669 jtag_add_sleep(jtag_nsrst_assert_width
* 1000);
672 LOG_DEBUG("SRST line released");
673 if (jtag_nsrst_delay
)
674 jtag_add_sleep(jtag_nsrst_delay
* 1000);
678 /* Maybe enter the JTAG TAP_RESET state ...
679 * - using only TMS, TCK, and the JTAG state machine
680 * - or else more directly, using TRST
682 * TAP_RESET should be invisible to non-debug parts of the system.
685 LOG_DEBUG("JTAG reset with TLR instead of TRST");
686 jtag_set_end_state(TAP_RESET
);
689 } else if (jtag_trst
!= new_trst
) {
690 jtag_trst
= new_trst
;
692 LOG_DEBUG("TRST line asserted");
693 tap_set_state(TAP_RESET
);
694 if (jtag_ntrst_assert_width
)
695 jtag_add_sleep(jtag_ntrst_assert_width
* 1000);
697 LOG_DEBUG("TRST line released");
698 if (jtag_ntrst_delay
)
699 jtag_add_sleep(jtag_ntrst_delay
* 1000);
701 /* We just asserted nTRST, so we're now in TAP_RESET.
702 * Inform possible listeners about this, now that
703 * JTAG instructions and data can be shifted. This
704 * sequence must match jtag_add_tlr().
706 jtag_call_event_callbacks(JTAG_TRST_ASSERTED
);
707 jtag_notify_event(JTAG_TRST_ASSERTED
);
712 tap_state_t
jtag_set_end_state(tap_state_t state
)
714 if ((state
== TAP_DRSHIFT
)||(state
== TAP_IRSHIFT
))
716 LOG_ERROR("BUG: TAP_DRSHIFT/IRSHIFT can't be end state. Calling code should use a larger scan field");
719 if (state
!= TAP_INVALID
)
720 cmd_queue_end_state
= state
;
721 return cmd_queue_end_state
;
724 tap_state_t
jtag_get_end_state(void)
726 return cmd_queue_end_state
;
729 void jtag_add_sleep(uint32_t us
)
731 /// @todo Here, keep_alive() appears to be a layering violation!!!
733 jtag_set_error(interface_jtag_add_sleep(us
));
736 static int jtag_check_value_inner(uint8_t *captured
, uint8_t *in_check_value
,
737 uint8_t *in_check_mask
, int num_bits
)
739 int retval
= ERROR_OK
;
743 compare_failed
= buf_cmp_mask(captured
, in_check_value
, in_check_mask
, num_bits
);
745 compare_failed
= buf_cmp(captured
, in_check_value
, num_bits
);
747 if (compare_failed
) {
748 char *captured_str
, *in_check_value_str
;
749 int bits
= (num_bits
> DEBUG_JTAG_IOZ
)
753 /* NOTE: we've lost diagnostic context here -- 'which tap' */
755 captured_str
= buf_to_str(captured
, bits
, 16);
756 in_check_value_str
= buf_to_str(in_check_value
, bits
, 16);
758 LOG_WARNING("Bad value '%s' captured during DR or IR scan:",
760 LOG_WARNING(" check_value: 0x%s", in_check_value_str
);
763 free(in_check_value_str
);
766 char *in_check_mask_str
;
768 in_check_mask_str
= buf_to_str(in_check_mask
, bits
, 16);
769 LOG_WARNING(" check_mask: 0x%s", in_check_mask_str
);
770 free(in_check_mask_str
);
773 retval
= ERROR_JTAG_QUEUE_FAILED
;
778 void jtag_check_value_mask(struct scan_field
*field
, uint8_t *value
, uint8_t *mask
)
780 assert(field
->in_value
!= NULL
);
784 /* no checking to do */
788 jtag_execute_queue_noclear();
790 int retval
= jtag_check_value_inner(field
->in_value
, value
, mask
, field
->num_bits
);
791 jtag_set_error(retval
);
796 int default_interface_jtag_execute_queue(void)
800 LOG_ERROR("No JTAG interface configured yet. "
801 "Issue 'init' command in startup scripts "
802 "before communicating with targets.");
806 return jtag
->execute_queue();
809 void jtag_execute_queue_noclear(void)
811 jtag_flush_queue_count
++;
812 jtag_set_error(interface_jtag_execute_queue());
815 int jtag_get_flush_queue_count(void)
817 return jtag_flush_queue_count
;
820 int jtag_execute_queue(void)
822 jtag_execute_queue_noclear();
823 return jtag_error_clear();
826 static int jtag_reset_callback(enum jtag_event event
, void *priv
)
828 struct jtag_tap
*tap
= priv
;
830 if (event
== JTAG_TRST_ASSERTED
)
832 tap
->enabled
= !tap
->disabled_after_reset
;
834 /* current instruction is either BYPASS or IDCODE */
835 buf_set_ones(tap
->cur_instr
, tap
->ir_length
);
842 void jtag_sleep(uint32_t us
)
844 alive_sleep(us
/1000);
847 /* Maximum number of enabled JTAG devices we expect in the scan chain,
848 * plus one (to detect garbage at the end). Devices that don't support
849 * IDCODE take up fewer bits, possibly allowing a few more devices.
851 #define JTAG_MAX_CHAIN_SIZE 20
853 #define EXTRACT_MFG(X) (((X) & 0xffe) >> 1)
854 #define EXTRACT_PART(X) (((X) & 0xffff000) >> 12)
855 #define EXTRACT_VER(X) (((X) & 0xf0000000) >> 28)
857 /* A reserved manufacturer ID is used in END_OF_CHAIN_FLAG, so we
858 * know that no valid TAP will have it as an IDCODE value.
860 #define END_OF_CHAIN_FLAG 0x000000ff
862 /* a larger IR length than we ever expect to autoprobe */
863 #define JTAG_IRLEN_MAX 60
865 static int jtag_examine_chain_execute(uint8_t *idcode_buffer
, unsigned num_idcode
)
867 struct scan_field field
= {
869 .num_bits
= num_idcode
* 32,
870 .out_value
= idcode_buffer
,
871 .in_value
= idcode_buffer
,
874 // initialize to the end of chain ID value
875 for (unsigned i
= 0; i
< JTAG_MAX_CHAIN_SIZE
; i
++)
876 buf_set_u32(idcode_buffer
, i
* 32, 32, END_OF_CHAIN_FLAG
);
878 jtag_add_plain_dr_scan(1, &field
, TAP_DRPAUSE
);
880 return jtag_execute_queue();
883 static bool jtag_examine_chain_check(uint8_t *idcodes
, unsigned count
)
885 uint8_t zero_check
= 0x0;
886 uint8_t one_check
= 0xff;
888 for (unsigned i
= 0; i
< count
* 4; i
++)
890 zero_check
|= idcodes
[i
];
891 one_check
&= idcodes
[i
];
894 /* if there wasn't a single non-zero bit or if all bits were one,
895 * the scan is not valid. We wrote a mix of both values; either
897 * - There's a hardware issue (almost certainly):
898 * + all-zeroes can mean a target stuck in JTAG reset
899 * + all-ones tends to mean no target
900 * - The scan chain is WAY longer than we can handle, *AND* either
901 * + there are several hundreds of TAPs in bypass, or
902 * + at least a few dozen TAPs all have an all-ones IDCODE
904 if (zero_check
== 0x00 || one_check
== 0xff)
906 LOG_ERROR("JTAG scan chain interrogation failed: all %s",
907 (zero_check
== 0x00) ? "zeroes" : "ones");
908 LOG_ERROR("Check JTAG interface, timings, target power, etc.");
914 static void jtag_examine_chain_display(enum log_levels level
, const char *msg
,
915 const char *name
, uint32_t idcode
)
917 log_printf_lf(level
, __FILE__
, __LINE__
, __FUNCTION__
,
918 "JTAG tap: %s %16.16s: 0x%08x "
919 "(mfg: 0x%3.3x, part: 0x%4.4x, ver: 0x%1.1x)",
921 (unsigned int)idcode
,
922 (unsigned int)EXTRACT_MFG(idcode
),
923 (unsigned int)EXTRACT_PART(idcode
),
924 (unsigned int)EXTRACT_VER(idcode
));
927 static bool jtag_idcode_is_final(uint32_t idcode
)
930 * Some devices, such as AVR8, will output all 1's instead
931 * of TDI input value at end of chain. Allow those values
932 * instead of failing.
934 return idcode
== END_OF_CHAIN_FLAG
|| idcode
== 0xFFFFFFFF;
938 * This helper checks that remaining bits in the examined chain data are
939 * all as expected, but a single JTAG device requires only 64 bits to be
940 * read back correctly. This can help identify and diagnose problems
941 * with the JTAG chain earlier, gives more helpful/explicit error messages.
942 * Returns TRUE iff garbage was found.
944 static bool jtag_examine_chain_end(uint8_t *idcodes
, unsigned count
, unsigned max
)
946 bool triggered
= false;
947 for (; count
< max
- 31; count
+= 32)
949 uint32_t idcode
= buf_get_u32(idcodes
, count
, 32);
951 /* do not trigger the warning if the data looks good */
952 if (jtag_idcode_is_final(idcode
))
954 LOG_WARNING("Unexpected idcode after end of chain: %d 0x%08x",
955 count
, (unsigned int)idcode
);
961 static bool jtag_examine_chain_match_tap(const struct jtag_tap
*tap
)
963 uint32_t idcode
= tap
->idcode
;
965 /* ignore expected BYPASS codes; warn otherwise */
966 if (0 == tap
->expected_ids_cnt
&& !idcode
)
969 /* optionally ignore the JTAG version field */
970 uint32_t mask
= tap
->ignore_version
? ~(0xff << 24) : ~0;
974 /* Loop over the expected identification codes and test for a match */
975 unsigned ii
, limit
= tap
->expected_ids_cnt
;
977 for (ii
= 0; ii
< limit
; ii
++)
979 uint32_t expected
= tap
->expected_ids
[ii
] & mask
;
981 if (idcode
== expected
)
984 /* treat "-expected-id 0" as a "don't-warn" wildcard */
985 if (0 == tap
->expected_ids
[ii
])
989 /* If none of the expected ids matched, warn */
990 jtag_examine_chain_display(LOG_LVL_WARNING
, "UNEXPECTED",
991 tap
->dotted_name
, tap
->idcode
);
992 for (ii
= 0; ii
< limit
; ii
++)
996 snprintf(msg
, sizeof(msg
), "expected %u of %u", ii
+ 1, limit
);
997 jtag_examine_chain_display(LOG_LVL_ERROR
, msg
,
998 tap
->dotted_name
, tap
->expected_ids
[ii
]);
1003 /* Try to examine chain layout according to IEEE 1149.1 §12
1004 * This is called a "blind interrogation" of the scan chain.
1006 static int jtag_examine_chain(void)
1008 uint8_t idcode_buffer
[JTAG_MAX_CHAIN_SIZE
* 4];
1012 bool autoprobe
= false;
1014 /* DR scan to collect BYPASS or IDCODE register contents.
1015 * Then make sure the scan data has both ones and zeroes.
1017 LOG_DEBUG("DR scan interrogation for IDCODE/BYPASS");
1018 retval
= jtag_examine_chain_execute(idcode_buffer
, JTAG_MAX_CHAIN_SIZE
);
1019 if (retval
!= ERROR_OK
)
1021 if (!jtag_examine_chain_check(idcode_buffer
, JTAG_MAX_CHAIN_SIZE
))
1022 return ERROR_JTAG_INIT_FAILED
;
1024 /* point at the 1st tap */
1025 struct jtag_tap
*tap
= jtag_tap_next_enabled(NULL
);
1031 tap
&& bit_count
< (JTAG_MAX_CHAIN_SIZE
* 32) - 31;
1032 tap
= jtag_tap_next_enabled(tap
))
1034 uint32_t idcode
= buf_get_u32(idcode_buffer
, bit_count
, 32);
1036 if ((idcode
& 1) == 0)
1038 /* Zero for LSB indicates a device in bypass */
1039 LOG_INFO("TAP %s does not have IDCODE",
1042 tap
->hasidcode
= false;
1048 /* Friendly devices support IDCODE */
1049 tap
->hasidcode
= true;
1050 jtag_examine_chain_display(LOG_LVL_INFO
,
1052 tap
->dotted_name
, idcode
);
1056 tap
->idcode
= idcode
;
1058 /* ensure the TAP ID matches what was expected */
1059 if (!jtag_examine_chain_match_tap(tap
))
1060 retval
= ERROR_JTAG_INIT_SOFT_FAIL
;
1063 /* Fail if too many TAPs were enabled for us to verify them all. */
1065 LOG_ERROR("Too many TAPs enabled; '%s' ignored.",
1067 return ERROR_JTAG_INIT_FAILED
;
1070 /* if autoprobing, the tap list is still empty ... populate it! */
1071 while (autoprobe
&& bit_count
< (JTAG_MAX_CHAIN_SIZE
* 32) - 31) {
1075 /* Is there another TAP? */
1076 idcode
= buf_get_u32(idcode_buffer
, bit_count
, 32);
1077 if (jtag_idcode_is_final(idcode
))
1080 /* Default everything in this TAP except IR length.
1082 * REVISIT create a jtag_alloc(chip, tap) routine, and
1083 * share it with jim_newtap_cmd().
1085 tap
= calloc(1, sizeof *tap
);
1089 sprintf(buf
, "auto%d", tapcount
++);
1090 tap
->chip
= strdup(buf
);
1091 tap
->tapname
= strdup("tap");
1093 sprintf(buf
, "%s.%s", tap
->chip
, tap
->tapname
);
1094 tap
->dotted_name
= strdup(buf
);
1096 /* tap->ir_length == 0 ... signifying irlen autoprobe */
1097 tap
->ir_capture_mask
= 0x03;
1098 tap
->ir_capture_value
= 0x01;
1100 tap
->enabled
= true;
1102 if ((idcode
& 1) == 0) {
1104 tap
->hasidcode
= false;
1107 tap
->hasidcode
= true;
1108 tap
->idcode
= idcode
;
1110 tap
->expected_ids_cnt
= 1;
1111 tap
->expected_ids
= malloc(sizeof(uint32_t));
1112 tap
->expected_ids
[0] = idcode
;
1115 LOG_WARNING("AUTO %s - use \"jtag newtap "
1116 "%s %s -expected-id 0x%8.8" PRIx32
" ...\"",
1117 tap
->dotted_name
, tap
->chip
, tap
->tapname
,
1123 /* After those IDCODE or BYPASS register values should be
1124 * only the data we fed into the scan chain.
1126 if (jtag_examine_chain_end(idcode_buffer
, bit_count
,
1127 8 * sizeof(idcode_buffer
))) {
1128 LOG_ERROR("double-check your JTAG setup (interface, "
1129 "speed, missing TAPs, ...)");
1130 return ERROR_JTAG_INIT_FAILED
;
1133 /* Return success or, for backwards compatibility if only
1134 * some IDCODE values mismatched, a soft/continuable fault.
1140 * Validate the date loaded by entry to the Capture-IR state, to help
1141 * find errors related to scan chain configuration (wrong IR lengths)
1144 * Entry state can be anything. On non-error exit, all TAPs are in
1145 * bypass mode. On error exits, the scan chain is reset.
1147 static int jtag_validate_ircapture(void)
1149 struct jtag_tap
*tap
;
1150 int total_ir_length
= 0;
1151 uint8_t *ir_test
= NULL
;
1152 struct scan_field field
;
1157 /* when autoprobing, accomodate huge IR lengths */
1158 for (tap
= NULL
, total_ir_length
= 0;
1159 (tap
= jtag_tap_next_enabled(tap
)) != NULL
;
1160 total_ir_length
+= tap
->ir_length
) {
1161 if (tap
->ir_length
== 0)
1162 total_ir_length
+= JTAG_IRLEN_MAX
;
1165 /* increase length to add 2 bit sentinel after scan */
1166 total_ir_length
+= 2;
1168 ir_test
= malloc(DIV_ROUND_UP(total_ir_length
, 8));
1169 if (ir_test
== NULL
)
1172 /* after this scan, all TAPs will capture BYPASS instructions */
1173 buf_set_ones(ir_test
, total_ir_length
);
1176 field
.num_bits
= total_ir_length
;
1177 field
.out_value
= ir_test
;
1178 field
.in_value
= ir_test
;
1180 jtag_add_plain_ir_scan(1, &field
, TAP_IDLE
);
1182 LOG_DEBUG("IR capture validation scan");
1183 retval
= jtag_execute_queue();
1184 if (retval
!= ERROR_OK
)
1191 tap
= jtag_tap_next_enabled(tap
);
1196 /* If we're autoprobing, guess IR lengths. They must be at
1197 * least two bits. Guessing will fail if (a) any TAP does
1198 * not conform to the JTAG spec; or (b) when the upper bits
1199 * captured from some conforming TAP are nonzero. Or if
1200 * (c) an IR length is longer than 32 bits -- which is only
1201 * an implementation limit, which could someday be raised.
1203 * REVISIT optimization: if there's a *single* TAP we can
1204 * lift restrictions (a) and (b) by scanning a recognizable
1205 * pattern before the all-ones BYPASS. Check for where the
1206 * pattern starts in the result, instead of an 0...01 value.
1208 * REVISIT alternative approach: escape to some tcl code
1209 * which could provide more knowledge, based on IDCODE; and
1210 * only guess when that has no success.
1212 if (tap
->ir_length
== 0) {
1214 while ((val
= buf_get_u32(ir_test
, chain_pos
,
1215 tap
->ir_length
+ 1)) == 1
1216 && tap
->ir_length
<= 32) {
1219 LOG_WARNING("AUTO %s - use \"... -irlen %d\"",
1220 jtag_tap_name(tap
), tap
->ir_length
);
1223 /* Validate the two LSBs, which must be 01 per JTAG spec.
1225 * Or ... more bits could be provided by TAP declaration.
1226 * Plus, some taps (notably in i.MX series chips) violate
1227 * this part of the JTAG spec, so their capture mask/value
1228 * attributes might disable this test.
1230 val
= buf_get_u32(ir_test
, chain_pos
, tap
->ir_length
);
1231 if ((val
& tap
->ir_capture_mask
) != tap
->ir_capture_value
) {
1232 LOG_ERROR("%s: IR capture error; saw 0x%0*x not 0x%0*x",
1234 (tap
->ir_length
+ 7) / tap
->ir_length
,
1236 (tap
->ir_length
+ 7) / tap
->ir_length
,
1237 (unsigned) tap
->ir_capture_value
);
1239 retval
= ERROR_JTAG_INIT_FAILED
;
1242 LOG_DEBUG("%s: IR capture 0x%0*x", jtag_tap_name(tap
),
1243 (tap
->ir_length
+ 7) / tap
->ir_length
, val
);
1244 chain_pos
+= tap
->ir_length
;
1247 /* verify the '11' sentinel we wrote is returned at the end */
1248 val
= buf_get_u32(ir_test
, chain_pos
, 2);
1251 char *cbuf
= buf_to_str(ir_test
, total_ir_length
, 16);
1253 LOG_ERROR("IR capture error at bit %d, saw 0x%s not 0x...3",
1256 retval
= ERROR_JTAG_INIT_FAILED
;
1261 if (retval
!= ERROR_OK
) {
1263 jtag_execute_queue();
1269 void jtag_tap_init(struct jtag_tap
*tap
)
1271 unsigned ir_len_bits
;
1272 unsigned ir_len_bytes
;
1274 /* if we're autoprobing, cope with potentially huge ir_length */
1275 ir_len_bits
= tap
->ir_length
? : JTAG_IRLEN_MAX
;
1276 ir_len_bytes
= DIV_ROUND_UP(ir_len_bits
, 8);
1278 tap
->expected
= calloc(1, ir_len_bytes
);
1279 tap
->expected_mask
= calloc(1, ir_len_bytes
);
1280 tap
->cur_instr
= malloc(ir_len_bytes
);
1282 /// @todo cope better with ir_length bigger than 32 bits
1283 if (ir_len_bits
> 32)
1286 buf_set_u32(tap
->expected
, 0, ir_len_bits
, tap
->ir_capture_value
);
1287 buf_set_u32(tap
->expected_mask
, 0, ir_len_bits
, tap
->ir_capture_mask
);
1289 // TAP will be in bypass mode after jtag_validate_ircapture()
1291 buf_set_ones(tap
->cur_instr
, tap
->ir_length
);
1293 // register the reset callback for the TAP
1294 jtag_register_event_callback(&jtag_reset_callback
, tap
);
1296 LOG_DEBUG("Created Tap: %s @ abs position %d, "
1297 "irlen %d, capture: 0x%x mask: 0x%x", tap
->dotted_name
,
1298 tap
->abs_chain_position
, tap
->ir_length
,
1299 (unsigned) tap
->ir_capture_value
,
1300 (unsigned) tap
->ir_capture_mask
);
1304 void jtag_tap_free(struct jtag_tap
*tap
)
1306 jtag_unregister_event_callback(&jtag_reset_callback
, tap
);
1308 /// @todo is anything missing? no memory leaks please
1309 free((void *)tap
->expected
);
1310 free((void *)tap
->expected_ids
);
1311 free((void *)tap
->chip
);
1312 free((void *)tap
->tapname
);
1313 free((void *)tap
->dotted_name
);
1317 int jtag_interface_init(struct command_context
*cmd_ctx
)
1322 if (!jtag_interface
)
1324 /* nothing was previously specified by "interface" command */
1325 LOG_ERROR("JTAG interface has to be specified, see \"interface\" command");
1326 return ERROR_JTAG_INVALID_INTERFACE
;
1329 jtag
= jtag_interface
;
1330 if (jtag_interface
->init() != ERROR_OK
)
1333 return ERROR_JTAG_INIT_FAILED
;
1336 int requested_khz
= jtag_get_speed_khz();
1337 int actual_khz
= requested_khz
;
1338 int retval
= jtag_get_speed_readable(&actual_khz
);
1339 if (ERROR_OK
!= retval
)
1340 LOG_INFO("interface specific clock speed value %d", jtag_get_speed());
1341 else if (actual_khz
)
1343 if ((CLOCK_MODE_RCLK
== clock_mode
)
1344 || ((CLOCK_MODE_KHZ
== clock_mode
) && !requested_khz
))
1346 LOG_INFO("RCLK (adaptive clock speed) not supported - fallback to %d kHz"
1350 LOG_INFO("clock speed %d kHz", actual_khz
);
1353 LOG_INFO("RCLK (adaptive clock speed)");
1358 int jtag_init_inner(struct command_context
*cmd_ctx
)
1360 struct jtag_tap
*tap
;
1362 bool issue_setup
= true;
1364 LOG_DEBUG("Init JTAG chain");
1366 tap
= jtag_tap_next_enabled(NULL
);
1368 /* Once JTAG itself is properly set up, and the scan chain
1369 * isn't absurdly large, IDCODE autoprobe should work fine.
1371 * But ... IRLEN autoprobe can fail even on systems which
1372 * are fully conformant to JTAG. Also, JTAG setup can be
1373 * quite finicky on some systems.
1375 * REVISIT: if TAP autoprobe works OK, then in many cases
1376 * we could escape to tcl code and set up targets based on
1377 * the TAP's IDCODE values.
1379 LOG_WARNING("There are no enabled taps. "
1380 "AUTO PROBING MIGHT NOT WORK!!");
1382 /* REVISIT default clock will often be too fast ... */
1386 if ((retval
= jtag_execute_queue()) != ERROR_OK
)
1389 /* Examine DR values first. This discovers problems which will
1390 * prevent communication ... hardware issues like TDO stuck, or
1391 * configuring the wrong number of (enabled) TAPs.
1393 retval
= jtag_examine_chain();
1396 /* complete success */
1398 case ERROR_JTAG_INIT_SOFT_FAIL
:
1399 /* For backward compatibility reasons, try coping with
1400 * configuration errors involving only ID mismatches.
1401 * We might be able to talk to the devices.
1403 LOG_ERROR("Trying to use configured scan chain anyway...");
1404 issue_setup
= false;
1407 /* some hard error; already issued diagnostics */
1411 /* Now look at IR values. Problems here will prevent real
1412 * communication. They mostly mean that the IR length is
1413 * wrong ... or that the IR capture value is wrong. (The
1414 * latter is uncommon, but easily worked around: provide
1415 * ircapture/irmask values during TAP setup.)
1417 retval
= jtag_validate_ircapture();
1418 if (retval
!= ERROR_OK
)
1422 jtag_notify_event(JTAG_TAP_EVENT_SETUP
);
1424 LOG_WARNING("Bypassing JTAG setup events due to errors");
1430 int jtag_interface_quit(void)
1432 if (!jtag
|| !jtag
->quit
)
1435 // close the JTAG interface
1436 int result
= jtag
->quit();
1437 if (ERROR_OK
!= result
)
1438 LOG_ERROR("failed: %d", result
);
1444 int jtag_init_reset(struct command_context
*cmd_ctx
)
1448 if ((retval
= jtag_interface_init(cmd_ctx
)) != ERROR_OK
)
1451 LOG_DEBUG("Initializing with hard TRST+SRST reset");
1454 * This procedure is used by default when OpenOCD triggers a reset.
1455 * It's now done through an overridable Tcl "init_reset" wrapper.
1457 * This started out as a more powerful "get JTAG working" reset than
1458 * jtag_init_inner(), applying TRST because some chips won't activate
1459 * JTAG without a TRST cycle (presumed to be async, though some of
1460 * those chips synchronize JTAG activation using TCK).
1462 * But some chips only activate JTAG as part of an SRST cycle; SRST
1463 * got mixed in. So it became a hard reset routine, which got used
1464 * in more places, and which coped with JTAG reset being forced as
1465 * part of SRST (srst_pulls_trst).
1467 * And even more corner cases started to surface: TRST and/or SRST
1468 * assertion timings matter; some chips need other JTAG operations;
1469 * TRST/SRST sequences can need to be different from these, etc.
1471 * Systems should override that wrapper to support system-specific
1472 * requirements that this not-fully-generic code doesn't handle.
1474 * REVISIT once Tcl code can read the reset_config modes, this won't
1475 * need to be a C routine at all...
1477 jtag_add_reset(1, 0); /* TAP_RESET, using TMS+TCK or TRST */
1478 if (jtag_reset_config
& RESET_HAS_SRST
)
1480 jtag_add_reset(1, 1);
1481 if ((jtag_reset_config
& RESET_SRST_PULLS_TRST
) == 0)
1482 jtag_add_reset(0, 1);
1484 jtag_add_reset(0, 0);
1485 if ((retval
= jtag_execute_queue()) != ERROR_OK
)
1488 /* Check that we can communication on the JTAG chain + eventually we want to
1489 * be able to perform enumeration only after OpenOCD has started
1490 * telnet and GDB server
1492 * That would allow users to more easily perform any magic they need to before
1495 return jtag_init_inner(cmd_ctx
);
1498 int jtag_init(struct command_context
*cmd_ctx
)
1502 if ((retval
= jtag_interface_init(cmd_ctx
)) != ERROR_OK
)
1505 /* guard against oddball hardware: force resets to be inactive */
1506 jtag_add_reset(0, 0);
1507 if ((retval
= jtag_execute_queue()) != ERROR_OK
)
1510 if (Jim_Eval_Named(cmd_ctx
->interp
, "jtag_init", __FILE__
, __LINE__
) != JIM_OK
)
1516 unsigned jtag_get_speed_khz(void)
1521 static int jtag_khz_to_speed(unsigned khz
, int* speed
)
1523 LOG_DEBUG("convert khz to interface specific speed value");
1527 LOG_DEBUG("have interface set up");
1529 int retval
= jtag
->khz(jtag_get_speed_khz(), &speed_div1
);
1530 if (ERROR_OK
!= retval
)
1534 *speed
= speed_div1
;
1539 static int jtag_rclk_to_speed(unsigned fallback_speed_khz
, int* speed
)
1541 int retval
= jtag_khz_to_speed(0, speed
);
1542 if ((ERROR_OK
!= retval
) && fallback_speed_khz
)
1544 LOG_DEBUG("trying fallback speed...");
1545 retval
= jtag_khz_to_speed(fallback_speed_khz
, speed
);
1550 static int jtag_set_speed(int speed
)
1553 /* this command can be called during CONFIG,
1554 * in which case jtag isn't initialized */
1555 return jtag
? jtag
->speed(speed
) : ERROR_OK
;
1558 int jtag_config_khz(unsigned khz
)
1560 LOG_DEBUG("handle jtag khz");
1561 clock_mode
= CLOCK_MODE_KHZ
;
1563 int retval
= jtag_khz_to_speed(khz
, &speed
);
1564 return (ERROR_OK
!= retval
) ? retval
: jtag_set_speed(speed
);
1567 int jtag_config_rclk(unsigned fallback_speed_khz
)
1569 LOG_DEBUG("handle jtag rclk");
1570 clock_mode
= CLOCK_MODE_RCLK
;
1571 rclk_fallback_speed_khz
= fallback_speed_khz
;
1573 int retval
= jtag_rclk_to_speed(fallback_speed_khz
, &speed
);
1574 return (ERROR_OK
!= retval
) ? retval
: jtag_set_speed(speed
);
1577 int jtag_get_speed(void)
1582 case CLOCK_MODE_SPEED
:
1585 case CLOCK_MODE_KHZ
:
1586 jtag_khz_to_speed(jtag_get_speed_khz(), &speed
);
1588 case CLOCK_MODE_RCLK
:
1589 jtag_rclk_to_speed(rclk_fallback_speed_khz
, &speed
);
1592 LOG_ERROR("BUG: unknown jtag clock mode");
1599 int jtag_get_speed_readable(int *khz
)
1601 return jtag
? jtag
->speed_div(jtag_get_speed(), khz
) : ERROR_OK
;
1604 void jtag_set_verify(bool enable
)
1606 jtag_verify
= enable
;
1609 bool jtag_will_verify()
1614 void jtag_set_verify_capture_ir(bool enable
)
1616 jtag_verify_capture_ir
= enable
;
1619 bool jtag_will_verify_capture_ir()
1621 return jtag_verify_capture_ir
;
1624 int jtag_power_dropout(int *dropout
)
1626 return jtag
->power_dropout(dropout
);
1629 int jtag_srst_asserted(int *srst_asserted
)
1631 return jtag
->srst_asserted(srst_asserted
);
1634 enum reset_types
jtag_get_reset_config(void)
1636 return jtag_reset_config
;
1638 void jtag_set_reset_config(enum reset_types type
)
1640 jtag_reset_config
= type
;
1643 int jtag_get_trst(void)
1647 int jtag_get_srst(void)
1652 void jtag_set_nsrst_delay(unsigned delay
)
1654 jtag_nsrst_delay
= delay
;
1656 unsigned jtag_get_nsrst_delay(void)
1658 return jtag_nsrst_delay
;
1660 void jtag_set_ntrst_delay(unsigned delay
)
1662 jtag_ntrst_delay
= delay
;
1664 unsigned jtag_get_ntrst_delay(void)
1666 return jtag_ntrst_delay
;
1670 void jtag_set_nsrst_assert_width(unsigned delay
)
1672 jtag_nsrst_assert_width
= delay
;
1674 unsigned jtag_get_nsrst_assert_width(void)
1676 return jtag_nsrst_assert_width
;
1678 void jtag_set_ntrst_assert_width(unsigned delay
)
1680 jtag_ntrst_assert_width
= delay
;
1682 unsigned jtag_get_ntrst_assert_width(void)
1684 return jtag_ntrst_assert_width
;