typedef struct {
bool impebreak;
+ bool allhavereset;
+ bool anyhavereset;
bool allnonexistant;
bool anynonexistant;
bool allunavail;
unsigned autoexecdata;
} abstractauto_t;
+typedef struct {
+ unsigned version;
+ bool readonaddr;
+ unsigned sbaccess;
+ bool autoincrement;
+ bool readondata;
+ unsigned error;
+ unsigned asize;
+ bool access128;
+ bool access64;
+ bool access32;
+ bool access16;
+ bool access8;
+} sbcs_t;
+
class debug_module_t : public abstract_device_t
{
public:
- debug_module_t(sim_t *sim, unsigned progbufsize);
+ /*
+ * If require_authentication is true, then a debugger must authenticate as
+ * follows:
+ * 1. Read a 32-bit value from authdata:
+ * 2. Write the value that was read back, plus one, to authdata.
+ */
+ debug_module_t(sim_t *sim, unsigned progbufsize, unsigned max_bus_master_bits,
+ bool require_authentication);
~debug_module_t();
void add_device(bus_t *bus);
bool dmi_read(unsigned address, uint32_t *value);
bool dmi_write(unsigned address, uint32_t value);
+ // Called when one of the attached harts was reset.
+ void proc_reset(unsigned id);
+
private:
static const unsigned datasize = 2;
// Size of program_buffer in 32-bit words, as exposed to the rest of the
// Actual size of the program buffer, which is 1 word bigger than we let on
// to implement the implicit ebreak at the end.
unsigned program_buffer_bytes;
+ unsigned max_bus_master_bits;
+ bool require_authentication;
static const unsigned debug_data_start = 0x380;
unsigned debug_progbuf_start;
- static const unsigned debug_abstract_size = 2;
+ static const unsigned debug_abstract_size = 5;
unsigned debug_abstract_start;
+ // R/W this through custom registers, to allow debuggers to test that
+ // functionality.
+ unsigned custom_base;
+
+ // We only support 1024 harts currently. More requires at least resizing
+ // the arrays below, and their corresponding special memory regions.
+ static const unsigned hartsellen = 10;
sim_t *sim;
uint8_t debug_abstract[debug_abstract_size * 4];
uint8_t *program_buffer;
uint8_t dmdata[datasize * 4];
-
+
bool halted[1024];
bool resumeack[1024];
+ bool havereset[1024];
uint8_t debug_rom_flags[1024];
void write32(uint8_t *rom, unsigned int index, uint32_t value);
uint32_t read32(uint8_t *rom, unsigned int index);
+ void sb_autoincrement();
+ void sb_read();
+ void sb_write();
+ unsigned sb_access_bits();
+
dmcontrol_t dmcontrol;
dmstatus_t dmstatus;
abstractcs_t abstractcs;
abstractauto_t abstractauto;
uint32_t command;
+ sbcs_t sbcs;
+ uint32_t sbaddress[4];
+ uint32_t sbdata[4];
+
+ uint32_t challenge;
+ const uint32_t secret = 1;
+
processor_t *current_proc() const;
void reset();
bool perform_abstract_command();