-
-
Notifications
You must be signed in to change notification settings - Fork 842
Feature: detect GD32VW553 #2186
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
dragonmux
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Only got a couple of relatively small notes. With them addressed, we'll be happy to merge this as this looks great!
src/target/jtag_devs.c
Outdated
| .idmask = 0x0fffffffU, | ||
| #if ENABLE_DEBUG == 1 | ||
| .descr = "RISC-V debug v0.13.", | ||
| .descr = "Andes DTM", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We would like to keep the more generic string here, as while this is useful, the generic string pools and thus doesn't take additional space up.. If we do keep this revised string, we would prefer to see something like "Andes Tech RV DTM." - with the . included for consistency with the other entries.
src/target/jtag_devs.c
Outdated
| .descr = "Andes DTM", | ||
| #endif | ||
| .handler = riscv_jtag_dtm_handler, | ||
| }, | ||
| { | ||
| .idcode = 0x00307a6dU, | ||
| .idmask = 0x0fffffffU, | ||
| #if ENABLE_DEBUG == 1 | ||
| .descr = "Nuclei Systems DTM", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Similar note here.
ec38a28 to
715795c
Compare
* The value was used internally by BMD as RV_GIGADEVICE, but it does not belong to Gigadevice (SoC vendor) or to Nucleisys (processor vendor). This is visible on JTAG TAP IDCODE of DTM and RISC-V mvendorid CSR of GD32VF103 SoC.
* Proper JEP-106 value of 0xa36 belonging to Nuclei Systems Technology * 307 is related to Nuclei N307 processor core
715795c to
a56c174
Compare
dragonmux
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, merging. Thank you for the contribution!
Detailed description
Not tested as I don't have that board, only GD32VF103. But going by the logs, it makes sense:
Info : JTAG tap: gd32vw553.cpu tap/device found: 0x10307a6d (mfg: 0x536 (Nuclei System Technology Co Ltd), part: 0x0307, ver: 0x1)Info : JTAG tap: auto0.tap tap/device found: 0x790007a3 (mfg: 0x3d1 (GigaDevice Semiconductor (Beijing)), part: 0x9000, ver: 0x7)There is valuable internal cleanup w.r.t. JTAG and generic RISC-V probe paths. I can discard
gd32vw5_probe()stub, and the weak nop mechanism will simply return false for it.Your checklist for this pull request
Closing issues