project:arm_debugging:start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
project:arm_debugging:start [2019/12/07 18:16] – [Black Magic Probe] BMP + execution trace abyssal | project:arm_debugging:start [2021/06/05 19:29] (current) – [Example: Unbricking (restoring) Proxmark bootloader] Flash bootloader and fullimage from same build abyssal | ||
---|---|---|---|
Line 303: | Line 303: | ||
This is happening mostly on cheap clones of proxmark3 Easy. | This is happening mostly on cheap clones of proxmark3 Easy. | ||
+ | To debug Proxmark on newer OpenOCD >= 0.10.0, you may set fast memory access and fast DCC downloads: | ||
+ | < | ||
+ | openocd -c " | ||
+ | </ | ||
+ | Seems that flashing bootloader may not be enough, flash bootloader.elf and fullimage.elf from the same build in a single session (e.g. use '' | ||
===== J-link connected to Proxmark ===== | ===== J-link connected to Proxmark ===== | ||
{{ : | {{ : | ||
+ | ===== SystemView for J-link - visualization of interrupts or other functions ===== | ||
+ | |||
+ | There is an instrumentation possible with changes to code to show how your functions and interrupts behave - [[https:// | ||
+ | |||
+ | Here is an example showing "tail chaining" | ||
+ | |||
+ | {{: | ||
+ | |||
+ | If you add extra functions, it may measure your functions as well: | ||
+ | |||
+ | {{: | ||
+ | |||
+ | As a side note, ST-link on STM32 discovery boards can be reflashed to JLink (works only on discovery boards, not on separate ST-links). | ||
+ | |||
+ | ===== ARM ETM trace - recording executed instructions ===== | ||
+ | |||
+ | ARM processors (Cortex M1+ and others) have built-in a nifty feature that you can record all instructions executed. This requires quite costly hardware (expect 2000 EUR price - JTrace, Lauterbach and uLink), but it can be handy in debugging DMA and interrupts. | ||
+ | |||
+ | An example ETM trace: | ||
+ | |||
+ | {{: | ||
+ | |||
+ | ===== ARM ITM trace - recording samples of executed instructions, | ||
+ | |||
+ | You can get code profile like this with ITM (screenshow from '' | ||
+ | |||
+ | {{: | ||
+ | To get this working, [[https:// | ||
====== Flyswatter connected to Proxmark ====== | ====== Flyswatter connected to Proxmark ====== | ||
Line 483: | Line 515: | ||
Pinout on the debug board is only findable in sources under src/ | Pinout on the debug board is only findable in sources under src/ | ||
+ | |||
+ | Interesting features: | ||
+ | |||
+ | 1. you can catch hardware ARM interrupts, e.g. " | ||
+ | 2. SWD and JTAG boundary scan of devices | ||
+ | 3. you can use multiple devices connected | ||
+ | |||
+ | |||
+ | Differences from OpenOCD+GDB: | ||
+ | |||
+ | 1. you can't use OpenOCD flashing or other OpenOCD commands (this is since BMP created USB-UART device and not a network device) | ||
+ | 2. commands used are different, e.g. BMP has " | ||
BMP creates / | BMP creates / | ||
- | Some interesting features compared to old OpenOCD+gdb | + | Some interesting features compared to old OpenOCD+gdb |
+ | |||
+ | * https:// | ||
+ | * https:// | ||
+ | |||
+ | Note that you have to disable memory protections in order to read some memory (**set mem inaccessible-by-default off**), even then some parts that are accessible via STLink are not with BMP. | ||
+ | |||
+ | ==== Building and flashing Black Magic Probe on STLink v2 device ==== | ||
+ | |||
+ | In the build directory: | ||
+ | |||
+ | < | ||
+ | make PROBE_HOST=stlink ST_BOOTLOADER=1 | ||
+ | </ | ||
+ | |||
+ | Get the stlink-tool and build it in a directory different from blackmagic sources: | ||
+ | |||
+ | < | ||
+ | git clone https:// | ||
+ | cd stlink-tool | ||
+ | git submodule init | ||
+ | git submodule update | ||
+ | make | ||
+ | </ | ||
+ | |||
+ | Flash the built BMP with STLink bootloader (you may need to replug the STLink): | ||
+ | |||
+ | < | ||
+ | ./ | ||
+ | </ | ||
+ | |||
+ | After each replug of STLink, you need to run '' | ||
+ | |||
+ | < | ||
+ | ./ | ||
+ | </ | ||
+ | |||
+ | After this, ''/ | ||
+ | |||
+ | < | ||
+ | # Black Magic Probe | ||
+ | # there are two connections, | ||
+ | SUBSYSTEM==" | ||
+ | SUBSYSTEM==" | ||
+ | # Automatic running of stlink-tool, | ||
+ | # | ||
+ | </ | ||
+ | |||
+ | Beware of ModemManager, | ||
+ | |||
+ | ==== Useful GDB script for better visualization ==== | ||
+ | |||
+ | If you are reversing low-level assembler interface, catching interrupts, or doing some low-level work, this is a good interface for GDB: https:// | ||
+ | |||
+ | Qt Creator can still be used though, but you might need to send the **target extended-remote / | ||
+ | |||
+ | Preview of the GDB dashboard: | ||
+ | |||
+ | {{: | ||
+ | ==== Invocation inside GDB ==== | ||
+ | |||
+ | First of all, you need to use /dev/ttyACM (or the symlink / | ||
+ | |||
+ | < | ||
+ | >>> | ||
+ | Remote debugging using / | ||
+ | >>> | ||
+ | General commands: | ||
+ | version -- Display firmware version info | ||
+ | help -- Display help for monitor commands | ||
+ | jtag_scan -- Scan JTAG chain for devices | ||
+ | swdp_scan -- Scan SW-DP for devices | ||
+ | targets -- Display list of available targets | ||
+ | morse -- Display morse error message | ||
+ | halt_timeout -- Timeout (ms) to wait until Cortex-M is halted: (Default 2000) | ||
+ | connect_srst -- Configure connect under SRST: (enable|disable) | ||
+ | hard_srst -- Force a pulse on the hard SRST line - disconnects target | ||
+ | traceswo -- Start trace capture, NRZ mode: (baudrate) | ||
+ | >>> | ||
+ | Target voltage: unknown | ||
+ | Available Targets: | ||
+ | No. Att Driver | ||
+ | | ||
+ | >>> | ||
+ | >>> | ||
+ | >>> | ||
+ | </ | ||
+ | |||
+ | ==== Reflashing BMP back STLink v2 (possibly may work with v2.1) ==== | ||
+ | |||
+ | You either need to find the original STLink firmware somewhere (or have dumped it before) and use '' | ||
+ | |||
+ | Note on v2 vs v2.1 from BMP developer: | ||
+ | |||
+ | //To reflash ST-Link v2, un- and replug to get into the St bootloader. Stlinkv2-1 needs a warm reset to enter the bootloader, but mostly STLinkUpgrade.jar will not recognize the chip. Try with some old version of STLinkUpgrade.jar.// | ||
+ | |||
+ | //B.t.w,BMP with git can now run some things from the command line, when PC-hosted, e.g. " | ||
+ | |||
+ | ==== Cheap Chinese STLink v2 clones ==== | ||
+ | |||
+ | Some of them can be reflashed to BMP, some can't (stlink-tool reports error). There are more versions, so the pinout on the outside and also on the board depends on the specific clone type. | ||
+ | |||
+ | An example how to [[http:// | ||
+ | |||
+ | Original STLink (flashed with BMP with ST bootloader) using to program BMP on the cheap clone (haven' | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | ==== BMP PC-hosted with BMP HW target ==== | ||
+ | |||
+ | For BMP built with '' | ||
+ | |||
+ | < | ||
+ | ./ | ||
+ | </ | ||
+ | |||
+ | It will create port 2000 listening for GDB connection and you can use the classic BMP commands like scan and attach: | ||
+ | |||
+ | < | ||
+ | >>> | ||
+ | Remote debugging using :2000 | ||
+ | >>> | ||
+ | Target voltage: unknown | ||
+ | Available Targets: | ||
+ | No. Att Driver | ||
+ | | ||
+ | >>> | ||
+ | Attaching to program: blackmagic-stlink-v2/ | ||
+ | 0x0800effc in st_usbfs_ep_read_packet (dev=< | ||
+ | 230 USB_SET_EP_RX_STAT(addr, | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | ==== BMP PC-hosted with unmodified STLink v2 target (requires firmware >= V2J32xx) ==== | ||
+ | |||
+ | Upgrade STLink fw first with the STLinkUpgrade tool mentioned before. | ||
+ | |||
+ | With this firmware you can use external unmodified STLink with BMP ('' | ||
+ | |||
+ | < | ||
+ | ./ | ||
+ | </ | ||
+ | |||
+ | It will create port 2000 listening for GDB connection and you can use the classic BMP commands like scan and attach: | ||
+ | |||
+ | < | ||
+ | >>> | ||
+ | Remote debugging using :2000 | ||
+ | >>> | ||
+ | Target voltage: unknown | ||
+ | Available Targets: | ||
+ | No. Att Driver | ||
+ | | ||
+ | >>> | ||
+ | Attaching to program: blackmagic-stlink-v2/ | ||
+ | 0x0800effc in st_usbfs_ep_read_packet (dev=< | ||
+ | 230 USB_SET_EP_RX_STAT(addr, | ||
+ | |||
+ | </ | ||
- | * https:// | + | ===== Other useful tools that are specific to STM32 chips ===== |
- | * https:// | + | |
- | Note that you have to disable memory protections in order to read some memory (set mem inaccessible-by-default off), even then some parts that are accessible via STLink | + | * [[https:// |
+ | * [[https:// | ||
+ | * [[https:// |
project/arm_debugging/start.1575742589.txt.gz · Last modified: 2019/12/07 18:16 by abyssal