typedef struct {
bool impebreak;
+ bool allhavereset;
+ bool anyhavereset;
bool allnonexistant;
bool anynonexistant;
bool allunavail;
class debug_module_t : public abstract_device_t
{
public:
- debug_module_t(sim_t *sim, unsigned progbufsize, unsigned max_bus_master_bits);
+ /*
+ * If require_authentication is true, then a debugger must authenticate as
+ * follows:
+ * 1. Read a 32-bit value from authdata:
+ * 2. Write the value that was read back, plus one, to authdata.
+ */
+ debug_module_t(sim_t *sim, unsigned progbufsize, unsigned max_bus_master_bits,
+ bool require_authentication);
~debug_module_t();
void add_device(bus_t *bus);
bool dmi_read(unsigned address, uint32_t *value);
bool dmi_write(unsigned address, uint32_t value);
+ // Called when one of the attached harts was reset.
+ void proc_reset(unsigned id);
+
private:
static const unsigned datasize = 2;
// Size of program_buffer in 32-bit words, as exposed to the rest of the
// Actual size of the program buffer, which is 1 word bigger than we let on
// to implement the implicit ebreak at the end.
unsigned program_buffer_bytes;
- unsigned max_bus_master_bits ;
+ unsigned max_bus_master_bits;
+ bool require_authentication;
static const unsigned debug_data_start = 0x380;
unsigned debug_progbuf_start;
static const unsigned debug_abstract_size = 5;
unsigned debug_abstract_start;
+ // We only support 1024 harts currently. More requires at least resizing
+ // the arrays below, and their corresponding special memory regions.
static const unsigned hartsellen = 10;
sim_t *sim;
uint8_t debug_abstract[debug_abstract_size * 4];
uint8_t *program_buffer;
uint8_t dmdata[datasize * 4];
-
+
bool halted[1024];
bool resumeack[1024];
+ bool havereset[1024];
uint8_t debug_rom_flags[1024];
void write32(uint8_t *rom, unsigned int index, uint32_t value);
uint32_t sbaddress[4];
uint32_t sbdata[4];
+ uint32_t challenge;
+ const uint32_t secret = 1;
+
processor_t *current_proc() const;
void reset();
bool perform_abstract_command();