2011-01-10 12:13:52 -06:00
|
|
|
/***************************************************************************
|
|
|
|
* Copyright (C) 2005 by Dominic Rath *
|
|
|
|
* Dominic.Rath@gmx.de *
|
|
|
|
* *
|
|
|
|
* Copyright (C) 2008 by Spencer Oliver *
|
|
|
|
* spen@spen-soft.co.uk *
|
|
|
|
*
|
|
|
|
* Copyright (C) 2011 by Erik Botö
|
|
|
|
* erik.boto@pelagicore.com
|
2012-01-31 11:55:03 -06:00
|
|
|
*
|
2011-01-10 12:13:52 -06:00
|
|
|
* This program is free software; you can redistribute it and/or modify *
|
|
|
|
* it under the terms of the GNU General Public License as published by *
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or *
|
|
|
|
* (at your option) any later version. *
|
|
|
|
* *
|
|
|
|
* This program is distributed in the hope that it will be useful, *
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
|
|
|
|
* GNU General Public License for more details. *
|
|
|
|
* *
|
|
|
|
* You should have received a copy of the GNU General Public License *
|
2016-05-16 15:41:00 -05:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>. *
|
2011-01-10 12:13:52 -06:00
|
|
|
***************************************************************************/
|
2012-01-31 11:55:03 -06:00
|
|
|
|
2011-01-10 12:13:52 -06:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "imp.h"
|
|
|
|
#include <helper/binarybuffer.h>
|
|
|
|
#include <target/algorithm.h>
|
|
|
|
#include <target/armv7m.h>
|
|
|
|
|
|
|
|
/* em357 register locations */
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
#define EM357_FLASH_ACR 0x40008000
|
|
|
|
#define EM357_FLASH_KEYR 0x40008004
|
|
|
|
#define EM357_FLASH_OPTKEYR 0x40008008
|
|
|
|
#define EM357_FLASH_SR 0x4000800C
|
|
|
|
#define EM357_FLASH_CR 0x40008010
|
|
|
|
#define EM357_FLASH_AR 0x40008014
|
|
|
|
#define EM357_FLASH_OBR 0x4000801C
|
|
|
|
#define EM357_FLASH_WRPR 0x40008020
|
2011-01-10 12:13:52 -06:00
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
#define EM357_FPEC_CLK 0x4000402c
|
2011-01-10 12:13:52 -06:00
|
|
|
/* option byte location */
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
#define EM357_OB_RDP 0x08040800
|
|
|
|
#define EM357_OB_WRP0 0x08040808
|
|
|
|
#define EM357_OB_WRP1 0x0804080A
|
|
|
|
#define EM357_OB_WRP2 0x0804080C
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
/* FLASH_CR register bits */
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
#define FLASH_PG (1 << 0)
|
|
|
|
#define FLASH_PER (1 << 1)
|
|
|
|
#define FLASH_MER (1 << 2)
|
|
|
|
#define FLASH_OPTPG (1 << 4)
|
|
|
|
#define FLASH_OPTER (1 << 5)
|
|
|
|
#define FLASH_STRT (1 << 6)
|
|
|
|
#define FLASH_LOCK (1 << 7)
|
|
|
|
#define FLASH_OPTWRE (1 << 9)
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
/* FLASH_SR register bits */
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
#define FLASH_BSY (1 << 0)
|
|
|
|
#define FLASH_PGERR (1 << 2)
|
|
|
|
#define FLASH_WRPRTERR (1 << 4)
|
|
|
|
#define FLASH_EOP (1 << 5)
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
/* EM357_FLASH_OBR bit definitions (reading) */
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
#define OPT_ERROR 0
|
|
|
|
#define OPT_READOUT 1
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
/* register unlock keys */
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
#define KEY1 0x45670123
|
|
|
|
#define KEY2 0xCDEF89AB
|
2011-01-10 12:13:52 -06:00
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
struct em357_options {
|
2011-01-10 12:13:52 -06:00
|
|
|
uint16_t RDP;
|
|
|
|
uint16_t user_options;
|
|
|
|
uint16_t protection[3];
|
|
|
|
};
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
struct em357_flash_bank {
|
2011-01-10 12:13:52 -06:00
|
|
|
struct em357_options option_bytes;
|
|
|
|
int ppage_size;
|
2020-07-01 03:23:59 -05:00
|
|
|
bool probed;
|
2011-01-10 12:13:52 -06:00
|
|
|
};
|
|
|
|
|
|
|
|
static int em357_mass_erase(struct flash_bank *bank);
|
|
|
|
|
|
|
|
/* flash bank em357 <base> <size> 0 0 <target#>
|
|
|
|
*/
|
|
|
|
FLASH_BANK_COMMAND_HANDLER(em357_flash_bank_command)
|
|
|
|
{
|
|
|
|
struct em357_flash_bank *em357_info;
|
|
|
|
|
|
|
|
if (CMD_ARGC < 6)
|
2011-12-16 00:48:39 -06:00
|
|
|
return ERROR_COMMAND_SYNTAX_ERROR;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
em357_info = malloc(sizeof(struct em357_flash_bank));
|
|
|
|
bank->driver_priv = em357_info;
|
|
|
|
|
2020-07-01 03:23:59 -05:00
|
|
|
em357_info->probed = false;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int em357_get_flash_status(struct flash_bank *bank, uint32_t *status)
|
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
return target_read_u32(target, EM357_FLASH_SR, status);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_wait_status_busy(struct flash_bank *bank, int timeout)
|
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
uint32_t status;
|
|
|
|
int retval = ERROR_OK;
|
|
|
|
|
|
|
|
/* wait for busy to clear */
|
2012-01-31 11:55:03 -06:00
|
|
|
for (;; ) {
|
2011-01-10 12:13:52 -06:00
|
|
|
retval = em357_get_flash_status(bank, &status);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
LOG_DEBUG("status: 0x%" PRIx32 "", status);
|
|
|
|
if ((status & FLASH_BSY) == 0)
|
|
|
|
break;
|
2012-01-31 11:55:03 -06:00
|
|
|
if (timeout-- <= 0) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("timed out waiting for flash");
|
|
|
|
return ERROR_FAIL;
|
|
|
|
}
|
|
|
|
alive_sleep(1);
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (status & FLASH_WRPRTERR) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("em357 device protected");
|
|
|
|
retval = ERROR_FAIL;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (status & FLASH_PGERR) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("em357 device programming failed");
|
|
|
|
retval = ERROR_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Clear but report errors */
|
2012-01-31 11:55:03 -06:00
|
|
|
if (status & (FLASH_WRPRTERR | FLASH_PGERR)) {
|
2011-01-10 12:13:52 -06:00
|
|
|
/* If this operation fails, we ignore it and report the original
|
|
|
|
* retval
|
|
|
|
*/
|
|
|
|
target_write_u32(target, EM357_FLASH_SR, FLASH_WRPRTERR | FLASH_PGERR);
|
|
|
|
}
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_read_options(struct flash_bank *bank)
|
|
|
|
{
|
|
|
|
uint32_t optiondata;
|
|
|
|
struct em357_flash_bank *em357_info = NULL;
|
|
|
|
struct target *target = bank->target;
|
|
|
|
|
|
|
|
em357_info = bank->driver_priv;
|
|
|
|
|
|
|
|
/* read current option bytes */
|
|
|
|
int retval = target_read_u32(target, EM357_FLASH_OBR, &optiondata);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
em357_info->option_bytes.user_options = (uint16_t)0xFFFC | ((optiondata >> 2) & 0x03);
|
|
|
|
em357_info->option_bytes.RDP = (optiondata & (1 << OPT_READOUT)) ? 0xFFFF : 0x5AA5;
|
|
|
|
|
|
|
|
if (optiondata & (1 << OPT_READOUT))
|
|
|
|
LOG_INFO("Device Security Bit Set");
|
|
|
|
|
|
|
|
/* each bit refers to a 4bank protection */
|
|
|
|
retval = target_read_u32(target, EM357_FLASH_WRPR, &optiondata);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
em357_info->option_bytes.protection[0] = (uint16_t)optiondata;
|
|
|
|
em357_info->option_bytes.protection[1] = (uint16_t)(optiondata >> 8);
|
|
|
|
em357_info->option_bytes.protection[2] = (uint16_t)(optiondata >> 16);
|
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_erase_options(struct flash_bank *bank)
|
|
|
|
{
|
|
|
|
struct em357_flash_bank *em357_info = NULL;
|
|
|
|
struct target *target = bank->target;
|
|
|
|
|
|
|
|
em357_info = bank->driver_priv;
|
|
|
|
|
|
|
|
/* read current options */
|
|
|
|
em357_read_options(bank);
|
|
|
|
|
|
|
|
/* unlock flash registers */
|
|
|
|
int retval = target_write_u32(target, EM357_FLASH_KEYR, KEY1);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_KEYR, KEY2);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* unlock option flash registers */
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_OPTKEYR, KEY1);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_OPTKEYR, KEY2);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* erase option bytes */
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_OPTER | FLASH_OPTWRE);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_OPTER | FLASH_STRT | FLASH_OPTWRE);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 10);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* clear readout protection and complementary option bytes
|
|
|
|
* this will also force a device unlock if set */
|
|
|
|
em357_info->option_bytes.RDP = 0x5AA5;
|
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_write_options(struct flash_bank *bank)
|
|
|
|
{
|
|
|
|
struct em357_flash_bank *em357_info = NULL;
|
|
|
|
struct target *target = bank->target;
|
|
|
|
|
|
|
|
em357_info = bank->driver_priv;
|
|
|
|
|
|
|
|
/* unlock flash registers */
|
|
|
|
int retval = target_write_u32(target, EM357_FLASH_KEYR, KEY1);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_KEYR, KEY2);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* unlock option flash registers */
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_OPTKEYR, KEY1);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_OPTKEYR, KEY2);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* program option bytes */
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_OPTPG | FLASH_OPTWRE);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 10);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* write protection byte 1 */
|
|
|
|
retval = target_write_u16(target, EM357_OB_WRP0, em357_info->option_bytes.protection[0]);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 10);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* write protection byte 2 */
|
|
|
|
retval = target_write_u16(target, EM357_OB_WRP1, em357_info->option_bytes.protection[1]);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 10);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* write protection byte 3 */
|
|
|
|
retval = target_write_u16(target, EM357_OB_WRP2, em357_info->option_bytes.protection[2]);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 10);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* write readout protection bit */
|
|
|
|
retval = target_write_u16(target, EM357_OB_RDP, em357_info->option_bytes.RDP);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 10);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_LOCK);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_protect_check(struct flash_bank *bank)
|
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
struct em357_flash_bank *em357_info = bank->driver_priv;
|
|
|
|
|
|
|
|
uint32_t protection;
|
|
|
|
int i, s;
|
|
|
|
int num_bits;
|
|
|
|
int set;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (target->state != TARGET_HALTED) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("Target not halted");
|
|
|
|
return ERROR_TARGET_NOT_HALTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* each bit refers to a 4bank protection (bit 0-23) */
|
|
|
|
int retval = target_read_u32(target, EM357_FLASH_WRPR, &protection);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* each protection bit is for 4 * 2K pages */
|
|
|
|
num_bits = (bank->num_sectors / em357_info->ppage_size);
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
for (i = 0; i < num_bits; i++) {
|
2011-01-10 12:13:52 -06:00
|
|
|
set = 1;
|
|
|
|
if (protection & (1 << i))
|
|
|
|
set = 0;
|
|
|
|
|
|
|
|
for (s = 0; s < em357_info->ppage_size; s++)
|
|
|
|
bank->sectors[(i * em357_info->ppage_size) + s].is_protected = set;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
2020-06-07 10:00:13 -05:00
|
|
|
static int em357_erase(struct flash_bank *bank, unsigned int first,
|
|
|
|
unsigned int last)
|
2011-01-10 12:13:52 -06:00
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (bank->target->state != TARGET_HALTED) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("Target not halted");
|
|
|
|
return ERROR_TARGET_NOT_HALTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((first == 0) && (last == (bank->num_sectors - 1)))
|
|
|
|
return em357_mass_erase(bank);
|
|
|
|
|
2013-04-17 15:46:07 -05:00
|
|
|
/* Enable FPEC clock */
|
|
|
|
target_write_u32(target, EM357_FPEC_CLK, 0x00000001);
|
|
|
|
|
2011-01-10 12:13:52 -06:00
|
|
|
/* unlock flash registers */
|
|
|
|
int retval = target_write_u32(target, EM357_FLASH_KEYR, KEY1);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_KEYR, KEY2);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
2020-06-07 10:00:13 -05:00
|
|
|
for (unsigned int i = first; i <= last; i++) {
|
2011-01-10 12:13:52 -06:00
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_PER);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_AR,
|
|
|
|
bank->base + bank->sectors[i].offset);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_PER | FLASH_STRT);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 100);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_LOCK);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
2020-06-07 10:00:13 -05:00
|
|
|
static int em357_protect(struct flash_bank *bank, int set, unsigned int first,
|
|
|
|
unsigned int last)
|
2011-01-10 12:13:52 -06:00
|
|
|
{
|
|
|
|
struct em357_flash_bank *em357_info = NULL;
|
|
|
|
struct target *target = bank->target;
|
|
|
|
uint16_t prot_reg[4] = {0xFFFF, 0xFFFF, 0xFFFF, 0xFFFF};
|
2020-06-07 10:00:13 -05:00
|
|
|
int reg, bit;
|
2011-01-10 12:13:52 -06:00
|
|
|
int status;
|
|
|
|
uint32_t protection;
|
|
|
|
|
|
|
|
em357_info = bank->driver_priv;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (target->state != TARGET_HALTED) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("Target not halted");
|
|
|
|
return ERROR_TARGET_NOT_HALTED;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if ((first % em357_info->ppage_size) != 0) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_WARNING("aligned start protect sector to a %d sector boundary",
|
2012-01-31 11:55:03 -06:00
|
|
|
em357_info->ppage_size);
|
2011-01-10 12:13:52 -06:00
|
|
|
first = first - (first % em357_info->ppage_size);
|
|
|
|
}
|
2012-01-31 11:55:03 -06:00
|
|
|
if (((last + 1) % em357_info->ppage_size) != 0) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_WARNING("aligned end protect sector to a %d sector boundary",
|
2012-01-31 11:55:03 -06:00
|
|
|
em357_info->ppage_size);
|
2011-01-10 12:13:52 -06:00
|
|
|
last++;
|
|
|
|
last = last - (last % em357_info->ppage_size);
|
|
|
|
last--;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* each bit refers to a 4bank protection */
|
|
|
|
int retval = target_read_u32(target, EM357_FLASH_WRPR, &protection);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
prot_reg[0] = (uint16_t)protection;
|
|
|
|
prot_reg[1] = (uint16_t)(protection >> 8);
|
|
|
|
prot_reg[2] = (uint16_t)(protection >> 16);
|
|
|
|
|
2020-06-07 10:00:13 -05:00
|
|
|
for (unsigned int i = first; i <= last; i++) {
|
2011-01-10 12:13:52 -06:00
|
|
|
reg = (i / em357_info->ppage_size) / 8;
|
|
|
|
bit = (i / em357_info->ppage_size) - (reg * 8);
|
|
|
|
|
|
|
|
LOG_WARNING("reg, bit: %d, %d", reg, bit);
|
|
|
|
if (set)
|
|
|
|
prot_reg[reg] &= ~(1 << bit);
|
|
|
|
else
|
|
|
|
prot_reg[reg] |= (1 << bit);
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
status = em357_erase_options(bank);
|
|
|
|
if (retval != ERROR_OK)
|
2011-01-10 12:13:52 -06:00
|
|
|
return status;
|
|
|
|
|
|
|
|
em357_info->option_bytes.protection[0] = prot_reg[0];
|
|
|
|
em357_info->option_bytes.protection[1] = prot_reg[1];
|
|
|
|
em357_info->option_bytes.protection[2] = prot_reg[2];
|
|
|
|
|
|
|
|
return em357_write_options(bank);
|
|
|
|
}
|
|
|
|
|
2014-03-10 16:23:07 -05:00
|
|
|
static int em357_write_block(struct flash_bank *bank, const uint8_t *buffer,
|
2012-01-31 11:55:03 -06:00
|
|
|
uint32_t offset, uint32_t count)
|
2011-01-10 12:13:52 -06:00
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
uint32_t buffer_size = 16384;
|
2012-09-30 16:01:51 -05:00
|
|
|
struct working_area *write_algorithm;
|
2011-01-10 12:13:52 -06:00
|
|
|
struct working_area *source;
|
|
|
|
uint32_t address = bank->base + offset;
|
|
|
|
struct reg_param reg_params[4];
|
|
|
|
struct armv7m_algorithm armv7m_info;
|
|
|
|
int retval = ERROR_OK;
|
|
|
|
|
2020-07-11 17:00:47 -05:00
|
|
|
/* see contrib/loaders/flash/stm32x.s for src, the same is used here except for
|
2011-01-10 12:13:52 -06:00
|
|
|
* a modified *_FLASH_BASE */
|
|
|
|
|
|
|
|
static const uint8_t em357_flash_write_code[] = {
|
2012-01-31 11:55:03 -06:00
|
|
|
/* #define EM357_FLASH_CR_OFFSET 0x10
|
|
|
|
* #define EM357_FLASH_SR_OFFSET 0x0C
|
|
|
|
* write: */
|
2011-01-10 12:13:52 -06:00
|
|
|
0x08, 0x4c, /* ldr r4, EM357_FLASH_BASE */
|
|
|
|
0x1c, 0x44, /* add r4, r3 */
|
2012-01-31 11:55:03 -06:00
|
|
|
/* write_half_word: */
|
2011-01-10 12:13:52 -06:00
|
|
|
0x01, 0x23, /* movs r3, #0x01 */
|
2012-01-31 11:55:03 -06:00
|
|
|
0x23, 0x61, /* str r3, [r4,
|
|
|
|
*#EM357_FLASH_CR_OFFSET] */
|
2011-01-10 12:13:52 -06:00
|
|
|
0x30, 0xf8, 0x02, 0x3b, /* ldrh r3, [r0], #0x02 */
|
|
|
|
0x21, 0xf8, 0x02, 0x3b, /* strh r3, [r1], #0x02 */
|
2012-01-31 11:55:03 -06:00
|
|
|
/* busy: */
|
|
|
|
0xe3, 0x68, /* ldr r3, [r4,
|
|
|
|
*#EM357_FLASH_SR_OFFSET] */
|
2011-01-10 12:13:52 -06:00
|
|
|
0x13, 0xf0, 0x01, 0x0f, /* tst r3, #0x01 */
|
|
|
|
0xfb, 0xd0, /* beq busy */
|
|
|
|
0x13, 0xf0, 0x14, 0x0f, /* tst r3, #0x14 */
|
|
|
|
0x01, 0xd1, /* bne exit */
|
|
|
|
0x01, 0x3a, /* subs r2, r2, #0x01 */
|
|
|
|
0xf0, 0xd1, /* bne write_half_word */
|
2012-01-31 11:55:03 -06:00
|
|
|
/* exit: */
|
2011-01-10 12:13:52 -06:00
|
|
|
0x00, 0xbe, /* bkpt #0x00 */
|
|
|
|
0x00, 0x80, 0x00, 0x40, /* EM357_FLASH_BASE: .word 0x40008000 */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* flash write code */
|
|
|
|
if (target_alloc_working_area(target, sizeof(em357_flash_write_code),
|
2012-09-30 16:01:51 -05:00
|
|
|
&write_algorithm) != ERROR_OK) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_WARNING("no working area available, can't do block memory writes");
|
|
|
|
return ERROR_TARGET_RESOURCE_NOT_AVAILABLE;
|
2012-01-31 11:55:03 -06:00
|
|
|
}
|
2011-01-10 12:13:52 -06:00
|
|
|
|
2012-09-30 16:01:51 -05:00
|
|
|
retval = target_write_buffer(target, write_algorithm->address,
|
2013-09-28 14:43:37 -05:00
|
|
|
sizeof(em357_flash_write_code), em357_flash_write_code);
|
2012-01-31 11:55:03 -06:00
|
|
|
if (retval != ERROR_OK)
|
2011-01-10 12:13:52 -06:00
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* memory buffer */
|
2012-01-31 11:55:03 -06:00
|
|
|
while (target_alloc_working_area_try(target, buffer_size, &source) != ERROR_OK) {
|
2011-01-10 12:13:52 -06:00
|
|
|
buffer_size /= 2;
|
2012-01-31 11:55:03 -06:00
|
|
|
if (buffer_size <= 256) {
|
2012-09-30 16:01:51 -05:00
|
|
|
/* we already allocated the writing code, but failed to get a
|
2011-01-10 12:13:52 -06:00
|
|
|
* buffer, free the algorithm */
|
2012-09-30 16:01:51 -05:00
|
|
|
target_free_working_area(target, write_algorithm);
|
2011-01-10 12:13:52 -06:00
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
LOG_WARNING(
|
|
|
|
"no large enough working area available, can't do block memory writes");
|
2011-01-10 12:13:52 -06:00
|
|
|
return ERROR_TARGET_RESOURCE_NOT_AVAILABLE;
|
|
|
|
}
|
2012-01-31 11:55:03 -06:00
|
|
|
}
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
armv7m_info.common_magic = ARMV7M_COMMON_MAGIC;
|
2013-02-01 09:50:20 -06:00
|
|
|
armv7m_info.core_mode = ARM_MODE_THREAD;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
init_reg_param(®_params[0], "r0", 32, PARAM_OUT);
|
|
|
|
init_reg_param(®_params[1], "r1", 32, PARAM_OUT);
|
|
|
|
init_reg_param(®_params[2], "r2", 32, PARAM_OUT);
|
|
|
|
init_reg_param(®_params[3], "r3", 32, PARAM_IN_OUT);
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
while (count > 0) {
|
2011-01-10 12:13:52 -06:00
|
|
|
uint32_t thisrun_count = (count > (buffer_size / 2)) ?
|
2012-01-31 11:55:03 -06:00
|
|
|
(buffer_size / 2) : count;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
retval = target_write_buffer(target, source->address, thisrun_count * 2, buffer);
|
|
|
|
if (retval != ERROR_OK)
|
2011-01-10 12:13:52 -06:00
|
|
|
break;
|
|
|
|
|
|
|
|
buf_set_u32(reg_params[0].value, 0, 32, source->address);
|
|
|
|
buf_set_u32(reg_params[1].value, 0, 32, address);
|
|
|
|
buf_set_u32(reg_params[2].value, 0, 32, thisrun_count);
|
|
|
|
buf_set_u32(reg_params[3].value, 0, 32, 0);
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
retval = target_run_algorithm(target, 0, NULL, 4, reg_params,
|
2012-09-30 16:01:51 -05:00
|
|
|
write_algorithm->address, 0, 10000, &armv7m_info);
|
2012-01-31 11:55:03 -06:00
|
|
|
if (retval != ERROR_OK) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("error executing em357 flash write algorithm");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (buf_get_u32(reg_params[3].value, 0, 32) & FLASH_PGERR) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("flash memory not erased before writing");
|
|
|
|
/* Clear but report errors */
|
|
|
|
target_write_u32(target, EM357_FLASH_SR, FLASH_PGERR);
|
|
|
|
retval = ERROR_FAIL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (buf_get_u32(reg_params[3].value, 0, 32) & FLASH_WRPRTERR) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("flash memory write protected");
|
|
|
|
/* Clear but report errors */
|
|
|
|
target_write_u32(target, EM357_FLASH_SR, FLASH_WRPRTERR);
|
|
|
|
retval = ERROR_FAIL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
buffer += thisrun_count * 2;
|
|
|
|
address += thisrun_count * 2;
|
|
|
|
count -= thisrun_count;
|
|
|
|
}
|
|
|
|
|
|
|
|
target_free_working_area(target, source);
|
2012-09-30 16:01:51 -05:00
|
|
|
target_free_working_area(target, write_algorithm);
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
destroy_reg_param(®_params[0]);
|
|
|
|
destroy_reg_param(®_params[1]);
|
|
|
|
destroy_reg_param(®_params[2]);
|
|
|
|
destroy_reg_param(®_params[3]);
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2014-03-10 16:23:07 -05:00
|
|
|
static int em357_write(struct flash_bank *bank, const uint8_t *buffer,
|
2012-01-31 11:55:03 -06:00
|
|
|
uint32_t offset, uint32_t count)
|
2011-01-10 12:13:52 -06:00
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
uint32_t words_remaining = (count / 2);
|
|
|
|
uint32_t bytes_remaining = (count & 0x00000001);
|
|
|
|
uint32_t address = bank->base + offset;
|
|
|
|
uint32_t bytes_written = 0;
|
|
|
|
int retval;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (bank->target->state != TARGET_HALTED) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("Target not halted");
|
|
|
|
return ERROR_TARGET_NOT_HALTED;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (offset & 0x1) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_WARNING("offset 0x%" PRIx32 " breaks required 2-byte alignment", offset);
|
|
|
|
return ERROR_FLASH_DST_BREAKS_ALIGNMENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* unlock flash registers */
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_KEYR, KEY1);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_KEYR, KEY2);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
2013-04-17 15:46:07 -05:00
|
|
|
target_write_u32(target, EM357_FPEC_CLK, 0x00000001);
|
|
|
|
|
2011-01-10 12:13:52 -06:00
|
|
|
/* multiple half words (2-byte) to be programmed? */
|
2012-01-31 11:55:03 -06:00
|
|
|
if (words_remaining > 0) {
|
2011-01-10 12:13:52 -06:00
|
|
|
/* try using a block write */
|
2012-01-31 11:55:03 -06:00
|
|
|
retval = em357_write_block(bank, buffer, offset, words_remaining);
|
|
|
|
if (retval != ERROR_OK) {
|
|
|
|
if (retval == ERROR_TARGET_RESOURCE_NOT_AVAILABLE) {
|
2011-01-10 12:13:52 -06:00
|
|
|
/* if block write failed (no sufficient working area),
|
|
|
|
* we use normal (slow) single dword accesses */
|
2012-01-31 11:55:03 -06:00
|
|
|
LOG_WARNING(
|
|
|
|
"couldn't use block writes, falling back to single memory accesses");
|
2011-01-10 12:13:52 -06:00
|
|
|
}
|
2012-01-31 11:55:03 -06:00
|
|
|
} else {
|
2011-01-10 12:13:52 -06:00
|
|
|
buffer += words_remaining * 2;
|
|
|
|
address += words_remaining * 2;
|
|
|
|
words_remaining = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((retval != ERROR_OK) && (retval != ERROR_TARGET_RESOURCE_NOT_AVAILABLE))
|
|
|
|
return retval;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
while (words_remaining > 0) {
|
2011-01-10 12:13:52 -06:00
|
|
|
uint16_t value;
|
|
|
|
memcpy(&value, buffer + bytes_written, sizeof(uint16_t));
|
|
|
|
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_PG);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u16(target, address, value);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 5);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
bytes_written += 2;
|
|
|
|
words_remaining--;
|
|
|
|
address += 2;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (bytes_remaining) {
|
2011-01-10 12:13:52 -06:00
|
|
|
uint16_t value = 0xffff;
|
|
|
|
memcpy(&value, buffer + bytes_written, bytes_remaining);
|
|
|
|
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_PG);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u16(target, address, value);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 5);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
return target_write_u32(target, EM357_FLASH_CR, FLASH_LOCK);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_probe(struct flash_bank *bank)
|
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
struct em357_flash_bank *em357_info = bank->driver_priv;
|
|
|
|
int i;
|
|
|
|
uint16_t num_pages;
|
|
|
|
int page_size;
|
|
|
|
uint32_t base_address = 0x08000000;
|
|
|
|
|
2020-07-01 03:23:59 -05:00
|
|
|
em357_info->probed = false;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
2013-04-17 15:46:07 -05:00
|
|
|
switch (bank->size) {
|
|
|
|
case 0x10000:
|
|
|
|
/* 64k -- 64 1k pages */
|
|
|
|
num_pages = 64;
|
|
|
|
page_size = 1024;
|
|
|
|
break;
|
|
|
|
case 0x20000:
|
|
|
|
/* 128k -- 128 1k pages */
|
|
|
|
num_pages = 128;
|
|
|
|
page_size = 1024;
|
|
|
|
break;
|
|
|
|
case 0x30000:
|
|
|
|
/* 192k -- 96 2k pages */
|
|
|
|
num_pages = 96;
|
|
|
|
page_size = 2048;
|
|
|
|
break;
|
|
|
|
case 0x40000:
|
|
|
|
/* 256k -- 128 2k pages */
|
|
|
|
num_pages = 128;
|
|
|
|
page_size = 2048;
|
|
|
|
break;
|
2016-09-26 16:05:52 -05:00
|
|
|
case 0x80000:
|
|
|
|
/* 512k -- 256 2k pages */
|
|
|
|
num_pages = 256;
|
|
|
|
page_size = 2048;
|
|
|
|
break;
|
2013-04-17 15:46:07 -05:00
|
|
|
default:
|
|
|
|
LOG_WARNING("No size specified for em357 flash driver, assuming 192k!");
|
|
|
|
num_pages = 96;
|
|
|
|
page_size = 2048;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-01-10 12:13:52 -06:00
|
|
|
/* Enable FPEC CLK */
|
|
|
|
int retval = target_write_u32(target, EM357_FPEC_CLK, 0x00000001);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
em357_info->ppage_size = 4;
|
|
|
|
|
|
|
|
LOG_INFO("flash size = %dkbytes", num_pages*page_size/1024);
|
|
|
|
|
2020-08-17 03:08:35 -05:00
|
|
|
free(bank->sectors);
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
bank->base = base_address;
|
|
|
|
bank->size = (num_pages * page_size);
|
|
|
|
bank->num_sectors = num_pages;
|
|
|
|
bank->sectors = malloc(sizeof(struct flash_sector) * num_pages);
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
for (i = 0; i < num_pages; i++) {
|
2011-01-10 12:13:52 -06:00
|
|
|
bank->sectors[i].offset = i * page_size;
|
|
|
|
bank->sectors[i].size = page_size;
|
|
|
|
bank->sectors[i].is_erased = -1;
|
|
|
|
bank->sectors[i].is_protected = 1;
|
|
|
|
}
|
|
|
|
|
2020-07-01 03:23:59 -05:00
|
|
|
em357_info->probed = true;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_auto_probe(struct flash_bank *bank)
|
|
|
|
{
|
|
|
|
struct em357_flash_bank *em357_info = bank->driver_priv;
|
|
|
|
if (em357_info->probed)
|
|
|
|
return ERROR_OK;
|
|
|
|
return em357_probe(bank);
|
|
|
|
}
|
|
|
|
|
|
|
|
COMMAND_HANDLER(em357_handle_lock_command)
|
|
|
|
{
|
|
|
|
struct target *target = NULL;
|
|
|
|
struct em357_flash_bank *em357_info = NULL;
|
|
|
|
|
|
|
|
if (CMD_ARGC < 1)
|
2011-12-16 00:48:39 -06:00
|
|
|
return ERROR_COMMAND_SYNTAX_ERROR;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
struct flash_bank *bank;
|
|
|
|
int retval = CALL_COMMAND_HANDLER(flash_command_get_bank, 0, &bank);
|
2021-07-03 09:47:35 -05:00
|
|
|
if (retval != ERROR_OK)
|
2011-01-10 12:13:52 -06:00
|
|
|
return retval;
|
|
|
|
|
|
|
|
em357_info = bank->driver_priv;
|
|
|
|
|
|
|
|
target = bank->target;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (target->state != TARGET_HALTED) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("Target not halted");
|
|
|
|
return ERROR_TARGET_NOT_HALTED;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (em357_erase_options(bank) != ERROR_OK) {
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 failed to erase options");
|
2011-01-10 12:13:52 -06:00
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* set readout protection */
|
|
|
|
em357_info->option_bytes.RDP = 0;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (em357_write_options(bank) != ERROR_OK) {
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 failed to lock device");
|
2011-01-10 12:13:52 -06:00
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 locked");
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
COMMAND_HANDLER(em357_handle_unlock_command)
|
|
|
|
{
|
|
|
|
struct target *target = NULL;
|
|
|
|
|
|
|
|
if (CMD_ARGC < 1)
|
2011-12-16 00:48:39 -06:00
|
|
|
return ERROR_COMMAND_SYNTAX_ERROR;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
struct flash_bank *bank;
|
|
|
|
int retval = CALL_COMMAND_HANDLER(flash_command_get_bank, 0, &bank);
|
2021-07-03 09:47:35 -05:00
|
|
|
if (retval != ERROR_OK)
|
2011-01-10 12:13:52 -06:00
|
|
|
return retval;
|
|
|
|
|
|
|
|
target = bank->target;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (target->state != TARGET_HALTED) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("Target not halted");
|
|
|
|
return ERROR_TARGET_NOT_HALTED;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (em357_erase_options(bank) != ERROR_OK) {
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 failed to unlock device");
|
2011-01-10 12:13:52 -06:00
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (em357_write_options(bank) != ERROR_OK) {
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 failed to lock device");
|
2011-01-10 12:13:52 -06:00
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 unlocked.\n"
|
2012-01-31 11:55:03 -06:00
|
|
|
"INFO: a reset or power cycle is required "
|
|
|
|
"for the new settings to take effect.");
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int em357_mass_erase(struct flash_bank *bank)
|
|
|
|
{
|
|
|
|
struct target *target = bank->target;
|
|
|
|
|
2012-01-31 11:55:03 -06:00
|
|
|
if (target->state != TARGET_HALTED) {
|
2011-01-10 12:13:52 -06:00
|
|
|
LOG_ERROR("Target not halted");
|
|
|
|
return ERROR_TARGET_NOT_HALTED;
|
|
|
|
}
|
|
|
|
|
2013-04-17 15:46:07 -05:00
|
|
|
/* Make sure the flash clock is on */
|
|
|
|
target_write_u32(target, EM357_FPEC_CLK, 0x00000001);
|
|
|
|
|
2011-01-10 12:13:52 -06:00
|
|
|
/* unlock option flash registers */
|
|
|
|
int retval = target_write_u32(target, EM357_FLASH_KEYR, KEY1);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_KEYR, KEY2);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
/* mass erase flash memory */
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_MER);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_MER | FLASH_STRT);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_wait_status_busy(bank, 100);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = target_write_u32(target, EM357_FLASH_CR, FLASH_LOCK);
|
|
|
|
if (retval != ERROR_OK)
|
|
|
|
return retval;
|
|
|
|
|
|
|
|
return ERROR_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
COMMAND_HANDLER(em357_handle_mass_erase_command)
|
|
|
|
{
|
|
|
|
if (CMD_ARGC < 1)
|
2011-12-16 00:48:39 -06:00
|
|
|
return ERROR_COMMAND_SYNTAX_ERROR;
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
struct flash_bank *bank;
|
|
|
|
int retval = CALL_COMMAND_HANDLER(flash_command_get_bank, 0, &bank);
|
2021-07-03 09:47:35 -05:00
|
|
|
if (retval != ERROR_OK)
|
2011-01-10 12:13:52 -06:00
|
|
|
return retval;
|
|
|
|
|
|
|
|
retval = em357_mass_erase(bank);
|
2021-05-07 05:02:23 -05:00
|
|
|
if (retval == ERROR_OK)
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 mass erase complete");
|
2021-05-07 05:02:23 -05:00
|
|
|
else
|
helper/command: change prototype of command_print/command_print_sameline
To prepare for handling TCL return values consistently, all calls
to command_print/command_print_sameline should switch to CMD as
first parameter.
Change prototype of command_print() and command_print_sameline()
to pass CMD instead of CMD_CTX.
Since the first parameter is currently not used, the change can be
done though scripts without manual coding.
This patch is created using the command:
sed -i PATTERN $(find src/ doc/ -type f)
with all the following patters:
's/\(command_print(cmd\)->ctx,/\1,/'
's/\(command_print(CMD\)_CTX,/\1,/'
's/\(command_print(struct command_\)context \*context,/\1invocation *cmd,/'
's/\(command_print_sameline(cmd\)->ctx,/\1,/'
's/\(command_print_sameline(CMD\)_CTX,/\1,/'
's/\(command_print_sameline(struct command_\)context \*context,/\1invocation *cmd,/'
This change is inspired by http://openocd.zylin.com/1815 from Paul
Fertser but is now done through scripting.
Change-Id: I3386d8f96cdc477e7a2308dd18269de3bed04385
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: Paul Fertser <fercerpav@gmail.com>
Reviewed-on: http://openocd.zylin.com/5081
Tested-by: jenkins
Reviewed-by: Tomas Vanek <vanekt@fbl.cz>
2019-04-03 03:37:24 -05:00
|
|
|
command_print(CMD, "em357 mass erase failed");
|
2011-01-10 12:13:52 -06:00
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct command_registration em357_exec_command_handlers[] = {
|
|
|
|
{
|
|
|
|
.name = "lock",
|
2011-12-16 00:48:39 -06:00
|
|
|
.usage = "<bank>",
|
2011-01-10 12:13:52 -06:00
|
|
|
.handler = em357_handle_lock_command,
|
|
|
|
.mode = COMMAND_EXEC,
|
|
|
|
.help = "Lock entire flash device.",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.name = "unlock",
|
2011-12-16 00:48:39 -06:00
|
|
|
.usage = "<bank>",
|
2011-01-10 12:13:52 -06:00
|
|
|
.handler = em357_handle_unlock_command,
|
|
|
|
.mode = COMMAND_EXEC,
|
|
|
|
.help = "Unlock entire protected flash device.",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.name = "mass_erase",
|
2011-12-16 00:48:39 -06:00
|
|
|
.usage = "<bank>",
|
2011-01-10 12:13:52 -06:00
|
|
|
.handler = em357_handle_mass_erase_command,
|
|
|
|
.mode = COMMAND_EXEC,
|
|
|
|
.help = "Erase entire flash device.",
|
|
|
|
},
|
|
|
|
COMMAND_REGISTRATION_DONE
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct command_registration em357_command_handlers[] = {
|
|
|
|
{
|
|
|
|
.name = "em357",
|
|
|
|
.mode = COMMAND_ANY,
|
|
|
|
.help = "em357 flash command group",
|
2012-01-09 10:14:18 -06:00
|
|
|
.usage = "",
|
2011-01-10 12:13:52 -06:00
|
|
|
.chain = em357_exec_command_handlers,
|
|
|
|
},
|
|
|
|
COMMAND_REGISTRATION_DONE
|
|
|
|
};
|
|
|
|
|
2018-12-13 13:53:59 -06:00
|
|
|
const struct flash_driver em357_flash = {
|
2011-01-10 12:13:52 -06:00
|
|
|
.name = "em357",
|
|
|
|
.commands = em357_command_handlers,
|
|
|
|
.flash_bank_command = em357_flash_bank_command,
|
|
|
|
.erase = em357_erase,
|
|
|
|
.protect = em357_protect,
|
|
|
|
.write = em357_write,
|
|
|
|
.read = default_flash_read,
|
|
|
|
.probe = em357_probe,
|
|
|
|
.auto_probe = em357_auto_probe,
|
2012-05-10 04:33:07 -05:00
|
|
|
.erase_check = default_flash_blank_check,
|
2011-01-10 12:13:52 -06:00
|
|
|
.protect_check = em357_protect_check,
|
2018-02-15 03:25:50 -06:00
|
|
|
.free_driver_priv = default_flash_free_driver_priv,
|
2011-01-10 12:13:52 -06:00
|
|
|
};
|