JTAG Communications model
https://en.wikipedia.org/wiki/Joint_Test_Action_Group
In JTAG, devices expose one or more test access ports (TAPs).
The picture above shows three TAPs, which might be individual chips or might be modules inside one chip.
A daisy chain of TAPs is called a scan chain, or (loosely) a target.
Scan chains can be arbitrarily long, but in practice twenty TAPs is unusually long.
To use JTAG, a host is connected to the target's JTAG signals (TMS, TCK, TDI, TDO, etc.) through some kind of JTAG adapter,
which may need to handle issues like level shifting and galvanic isolation.
The adapter connects to the host using some interface such as USB, PCI, Ethernet, and so forth.
Primitives
The host communicates with the TAPs by manipulating TMS and TDI in conjunction with TCK,
and reading results through TDO (which is the only standard host-side input).
TMS/TDI/TCK output transitions create the basic JTAG communication primitive on which higher layer protocols build:
- State switching ...
All TAPs are in the same state, and that state changes on TCK transitions.
This JTAG state machine is part of the JTAG spec, and includes sixteen states.
There are six “stable states” where keeping TMS stable prevents the state from changing.
In all other states, TCK always changes that state.In addition, asserting TRST forces entry to one of those stable states (Test_Logic_Reset),
in a slightly quicker way than the alternative of holding TMS high and cycling TCK five times.
- Shifting ...
Most parts of the JTAG state machine support two stable states used to transfer data.
Each TAP has aninstruction register (IR) and a data register (DR).
The size of those registers varies between TAPs, and those registers are combined
through TDI and TDO to form a large shift register.
(The size of the DR is a function of the value in that TAP's current IR, and possibly of the value specified by a SCAN_N instruction.)
There are three operations defined on that shift register:- Capturing a temporary value
- Entry to the Shift_IR stable state goes via the Capture_IR state, loading the shift register with a partially fixed value (not the current instruction)
- Entry to the Shift_DR stable state goes via the Capture_DR state, loading the value of the Data Register specified by the TAP's current IR.
- Shifting that value bit-by-bit, in either the Shift_IR or Shift_DR stable state;
TCK transitions shift the shift register one bit, from TDI towards TDO, exactly like a SPI mode 1 data transfer
through a daisy chain of devices (with TMS=0 acting like the chip select signal, TDI as MOSI, etc.). - Updating IR or DR from the temporary value shifted in, on transition through the Update_IR or Update_DR state.
Note that it is not possible to read (capture) a register without writing (updating) it, and vice versa.
A common idiom adds flag bits to say whether the update should have side effects,
or whether the hardware is ready to execute such side effects.
- Capturing a temporary value
- Running ...
One stable state is called Run_Test/Idle. The distinction is TAP-specific.
Clocking TCK in the Idle state has no particular side effects, but clocking it in the Run_Test state may change system state.
For example, some ARM9 cores support a debugging mode where TCK cycles in the Run_Test state drive the instruction pipeline.
So at a basic level, using JTAG involves reading and writing instructions and their associated data registers;
and sometimes involves running a number of test cycles.
Behind those registers is hardware that is not specified by JTAG,
and which has its own states that is affected by JTAG activities.
Most JTAG hosts use the shortest path between two states, perhaps constrained by quirks of the adapter.
(For example, one adapter[which?] only handles paths whose lengths are multiples of seven bits.)
Some layers built on top of JTAG monitor the state transitions, and use uncommon paths to trigger higher level operations.
Some ARM cores use such sequences to enter and exit a two-wire (non-JTAG) SWD mode.
A Zero Bit Scan (ZBS) sequence is used in IEEE 1149.7[7] to access advanced functionality
such as switching TAPs into and out of scan chains, power management, and a different two-wire mode.
JTAG IEEE Std 1149.1 (boundary scan) instructions
Instruction register sizes tend to be small, perhaps four or seven bits wide.
Except for BYPASS and EXTEST, all instruction opcodes are defined by the TAP implementor,
as are their associated data registers; undefined instruction codes should not be used. Two key instructions are:
- The BYPASS instruction, opcode all ones regardless of the TAP's instruction register size,
must be supported by all TAPs. It is associated with a single bit data register (also called BYPASS) which always reads as zero. - The optional IDCODE instruction, with an implementor-defined opcode.
IDCODE is associated with a 32-bit register (IDCODE).
Its data uses a standardized format that includes a manufacturer code (derived from the JEDEC Standard Manufacturer's Identification Code standard, JEP-106),
a part number assigned by the manufacturer, and a part version code.
IDCODE is widely, but not universally, supported.
On exit from the RESET state, the instruction register is preloaded with either BYPASS or IDCODE.
This allows JTAG hosts to identify the size and, at least partially, contents of the scan chain to which they are connected.
(They can enter the RESET state then scan the Data Register until they read back the data they wrote.
A BYPASS register has only a zero bit; while an IDCODE register is 32-bits and starts with a one.
So the bits not written by the host can easily be mapped to TAPs.)
Such identification is often used to sanity check manual configuration, since IDCODE is often unspecific.
It could for example identify an ARM Cortex-M3 based microcontroller, without specifying the microcontroller vendor or model;
or a particular FPGA, but not how it has been programmed.
A common idiom involves shifting BYPASS into the instruction registers of all TAPs except one,
which receives some other instruction. That way all TAPs except one expose a single bit data register,
and values can be selectively shifted into or out of that one TAP's data register without affecting any other TAP.
The IEEE 1149.1 (JTAG) standard describes a number of instructions to support boundary scan applications.
Some of these instructions are "mandatory", but TAPs used for debug instead of boundary scan testing
sometimes provide minimal or no support for these instructions.
Those "mandatory" instructions operate on the Boundary Scan Register (BSR) defined in theBSDL file, and include:
- EXTEST for external testing, such as using pins to probe board-level behaviors
- PRELOAD loading pin output values before EXTEST (sometimes combined with SAMPLE)
- SAMPLE reading pin values into the boundary scan register
IEEE-defined "Optional" instructions include:
- CLAMP a variant of BYPASS which drives the output pins using the PRELOADed values
- HIGHZ deactivates the outputs of all pins
- INTEST for internal testing, such as using pins to probe on-chip behaviors
- RUNBIST places the chip in a self-test mode
- USERCODE returns a user-defined code, for example to identify which FPGA image is active
Devices may define more instructions, and those definitions should be part of a BSDL file provided by the manufacturer.
They are often just be marked as PRIVATE.
Boundary scan register
Devices communicate to the world via a set of input and output pins.
By themselves, these pins provide limited visibility into the workings of the device.
However, devices that support boundary scan contain a shift-register cell for each signal pin of the device.
These registers are connected in a dedicated path around the device's boundary (hence the name).
The path creates a virtual access capability that circumvents the normal inputs and outputs,
providing direct control of the device and detailed visibility for signals.[9]
The contents of the boundary scan register, including signal I/O capabilities,
are usually described by the manufacturer using a part-specific BSDL file.
These are used with design 'netlists' from CAD/EDA systems to develop tests used in board manufacturing.
Commercial test systems often cost several thousand dollars for a complete system,
and include diagnostic options to pinpoint faults such as open circuits and shorts.
They may also offer schematic or layout viewers to depict the fault in a graphical manner.
To enable boundary scanning, IC vendors add logic to each of their devices,
including scan cells for each of the signal pins.
These cells are then connected together to form the boundary scan shift register (BSR),
which is connected to a TAP controller.
These designs are parts of most Verilog or VHDL libraries.
Overhead for this additional logic is minimal, and generally is well worth the price to enable efficient testing at the board level.
JTAG Communications model的更多相关文章
- PMBOK及PMP考试精要
PROJECT MANAGEMENT KNOWLEDGE AREAS项目管理知识体系 2 PROJECT LIFE CYCLE / PROJECT MANAGEMENT PROCESS GROUPS项 ...
- GDBus
1. https://en.wikipedia.org/wiki/D-Bus In computing, D-Bus (for "Desktop Bus"[4]), a softw ...
- Spring Boot笔记一
Spring Boot 入门 Spring Boot 简介 > 简化Spring应用开发的一个框架:> 整个Spring技术栈的一个大整合:> J2EE开发的一站式解决方案: 微服务 ...
- Using an open debug interconnect model to simplify embedded systems design
Using an open debug interconnect model to simplify embedded systems design Tom Cunningham, Freescale ...
- STM32 使用 printf 发送数据配置方法 -- 串口 UART, JTAG SWO, JLINK RTT
STM32串口通信中使用printf发送数据配置方法(开发环境 Keil RVMDK) http://home.eeworld.com.cn/my/space-uid-338727-blogid-47 ...
- [转]How WebKit’s Event Model Works
原文:https://homes.cs.washington.edu/~burg/projects/timelapse/articles/webkit-event-implementation/ Fi ...
- Communications link failure异常解决
一,异常现象 com.bill99.inf.ibatis.DBException: queryForList error::sqlId=orgOrderAssetsMapping.queryModel ...
- Edge Intelligence: On-Demand Deep Learning Model Co-Inference with Device-Edge Synergy
边缘智能:按需深度学习模型和设备边缘协同的共同推理 本文为SIGCOMM 2018 Workshop (Mobile Edge Communications, MECOMM)论文. 笔者翻译了该论文. ...
- JTAG 引脚自动识别 JTAG Finder, JTAG Pinout Tool, JTAG Pin Finder, JTAG pinout detector, JTAGULATOR, Easy-JTAG, JTAG Enumeration
JTAG Finder Figuring out the JTAG Pinouts on a Device is usually the most time-consuming and frustra ...
随机推荐
- git的权威指南
CHENYILONG 博客 git的权威指南 全屏 © chenyilong.本站由Postach.io 博客
- js深复制
一般来讲深复制主要是为了复制js对象中的引用类型,引用类型在普通的赋值操作下相当于是引用,修改复制对象也会影响原对象,简单的方法的话可以使用JSON.parse(JSON.stringify(obj) ...
- 关联查询resultMap使用规则总结——(十一)
resultType: 作用: 将查询结果按照sql列名pojo属性名一致性映射到pojo中. 场合: 常见一些明细记录的展示,比如用户购买商品明细,将关联查询信息全部展示在页面时,此时可直接使用re ...
- jquery模型(外壳实现)
详细解释: 1.现在传入的参数是window,document,可以知道是它俩引用 2. 3. 4.每次调用jquery方法,都会创建一个实例,但是内存并没有暴涨,原因是:jquery里面new 的这 ...
- MongoDB 进阶模式设计
原文链接:http://www.mongoing.com/mongodb-advanced-pattern-design 12月12日上午,TJ在开源中国的年终盛典会上分享了文档模型设计的进阶技巧,就 ...
- linux诡异的硬盘不足
phpmyadmin页面登录不进去,ftp也连不上.而服务端的service都开着的.直觉是看一下硬盘使用情况. df -TH 发现可用空间几乎为0 但是查看各个目录使用情况: du -sh /* | ...
- .NetCore使用FluentValidation实现友好验证提示
Nuget包导入FluentValidation.AspNetCore 官方的用法是在services中添加如下来操作 services.AddMvc().AddFluentValidation(co ...
- FileSystemResource在Srping FrameWork 5中的变化
之前在项目中一直使用FileSystemResource这个类作为PropertyPlaceholderConfigurer的Resource引入部署目录外的配置文件,并设置了setIgnoreRes ...
- 【AtCoder】Tenka1 Programmer Contest(C - F)
C - Align 考的时候,我大胆猜了结论,就是一小一大一小一大这么排 证明的话,由于我们总是要加上相邻的最大值而减去最小值,我们就让最大值都保持在前面 如果长度为奇数,要么就是大小大小大,要么是小 ...
- ref:linux用户和组管理,/etc/passwd,/etc/shadow和/etc/group 文件内容解释
ref:https://www.cnblogs.com/xuha0/p/5519232.html 与用户相关的系统配置文件主要有/etc/passwd 和/etc/shadow,其中/etc/shad ...