project:arm_debugging:start
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| project:arm_debugging:start [2019/12/07 18:16] – [Black Magic Probe] BMP + execution trace abyssal | project:arm_debugging:start [2021/06/05 19:29] (current) – [Example: Unbricking (restoring) Proxmark bootloader] Flash bootloader and fullimage from same build abyssal | ||
|---|---|---|---|
| Line 303: | Line 303: | ||
| This is happening mostly on cheap clones of proxmark3 Easy. | This is happening mostly on cheap clones of proxmark3 Easy. | ||
| + | To debug Proxmark on newer OpenOCD >= 0.10.0, you may set fast memory access and fast DCC downloads: | ||
| + | < | ||
| + | openocd -c " | ||
| + | </ | ||
| + | Seems that flashing bootloader may not be enough, flash bootloader.elf and fullimage.elf from the same build in a single session (e.g. use '' | ||
| ===== J-link connected to Proxmark ===== | ===== J-link connected to Proxmark ===== | ||
| {{ : | {{ : | ||
| + | ===== SystemView for J-link - visualization of interrupts or other functions ===== | ||
| + | |||
| + | There is an instrumentation possible with changes to code to show how your functions and interrupts behave - [[https:// | ||
| + | |||
| + | Here is an example showing "tail chaining" | ||
| + | |||
| + | {{: | ||
| + | |||
| + | If you add extra functions, it may measure your functions as well: | ||
| + | |||
| + | {{: | ||
| + | |||
| + | As a side note, ST-link on STM32 discovery boards can be reflashed to JLink (works only on discovery boards, not on separate ST-links). | ||
| + | |||
| + | ===== ARM ETM trace - recording executed instructions ===== | ||
| + | |||
| + | ARM processors (Cortex M1+ and others) have built-in a nifty feature that you can record all instructions executed. This requires quite costly hardware (expect 2000 EUR price - JTrace, Lauterbach and uLink), but it can be handy in debugging DMA and interrupts. | ||
| + | |||
| + | An example ETM trace: | ||
| + | |||
| + | {{: | ||
| + | |||
| + | ===== ARM ITM trace - recording samples of executed instructions, | ||
| + | |||
| + | You can get code profile like this with ITM (screenshow from '' | ||
| + | |||
| + | {{: | ||
| + | To get this working, [[https:// | ||
| ====== Flyswatter connected to Proxmark ====== | ====== Flyswatter connected to Proxmark ====== | ||
| Line 483: | Line 515: | ||
| Pinout on the debug board is only findable in sources under src/ | Pinout on the debug board is only findable in sources under src/ | ||
| + | |||
| + | Interesting features: | ||
| + | |||
| + | 1. you can catch hardware ARM interrupts, e.g. " | ||
| + | 2. SWD and JTAG boundary scan of devices | ||
| + | 3. you can use multiple devices connected | ||
| + | |||
| + | |||
| + | Differences from OpenOCD+GDB: | ||
| + | |||
| + | 1. you can't use OpenOCD flashing or other OpenOCD commands (this is since BMP created USB-UART device and not a network device) | ||
| + | 2. commands used are different, e.g. BMP has " | ||
| BMP creates / | BMP creates / | ||
| - | Some interesting features compared to old OpenOCD+gdb | + | Some interesting features compared to old OpenOCD+gdb |
| + | |||
| + | * https:// | ||
| + | * https:// | ||
| + | |||
| + | Note that you have to disable memory protections in order to read some memory (**set mem inaccessible-by-default off**), even then some parts that are accessible via STLink are not with BMP. | ||
| + | |||
| + | ==== Building and flashing Black Magic Probe on STLink v2 device ==== | ||
| + | |||
| + | In the build directory: | ||
| + | |||
| + | < | ||
| + | make PROBE_HOST=stlink ST_BOOTLOADER=1 | ||
| + | </ | ||
| + | |||
| + | Get the stlink-tool and build it in a directory different from blackmagic sources: | ||
| + | |||
| + | < | ||
| + | git clone https:// | ||
| + | cd stlink-tool | ||
| + | git submodule init | ||
| + | git submodule update | ||
| + | make | ||
| + | </ | ||
| + | |||
| + | Flash the built BMP with STLink bootloader (you may need to replug the STLink): | ||
| + | |||
| + | < | ||
| + | ./ | ||
| + | </ | ||
| + | |||
| + | After each replug of STLink, you need to run '' | ||
| + | |||
| + | < | ||
| + | ./ | ||
| + | </ | ||
| + | |||
| + | After this, ''/ | ||
| + | |||
| + | < | ||
| + | # Black Magic Probe | ||
| + | # there are two connections, | ||
| + | SUBSYSTEM==" | ||
| + | SUBSYSTEM==" | ||
| + | # Automatic running of stlink-tool, | ||
| + | # | ||
| + | </ | ||
| + | |||
| + | Beware of ModemManager, | ||
| + | |||
| + | ==== Useful GDB script for better visualization ==== | ||
| + | |||
| + | If you are reversing low-level assembler interface, catching interrupts, or doing some low-level work, this is a good interface for GDB: https:// | ||
| + | |||
| + | Qt Creator can still be used though, but you might need to send the **target extended-remote / | ||
| + | |||
| + | Preview of the GDB dashboard: | ||
| + | |||
| + | {{: | ||
| + | ==== Invocation inside GDB ==== | ||
| + | |||
| + | First of all, you need to use /dev/ttyACM (or the symlink / | ||
| + | |||
| + | < | ||
| + | >>> | ||
| + | Remote debugging using / | ||
| + | >>> | ||
| + | General commands: | ||
| + | version -- Display firmware version info | ||
| + | help -- Display help for monitor commands | ||
| + | jtag_scan -- Scan JTAG chain for devices | ||
| + | swdp_scan -- Scan SW-DP for devices | ||
| + | targets -- Display list of available targets | ||
| + | morse -- Display morse error message | ||
| + | halt_timeout -- Timeout (ms) to wait until Cortex-M is halted: (Default 2000) | ||
| + | connect_srst -- Configure connect under SRST: (enable|disable) | ||
| + | hard_srst -- Force a pulse on the hard SRST line - disconnects target | ||
| + | traceswo -- Start trace capture, NRZ mode: (baudrate) | ||
| + | >>> | ||
| + | Target voltage: unknown | ||
| + | Available Targets: | ||
| + | No. Att Driver | ||
| + | | ||
| + | >>> | ||
| + | >>> | ||
| + | >>> | ||
| + | </ | ||
| + | |||
| + | ==== Reflashing BMP back STLink v2 (possibly may work with v2.1) ==== | ||
| + | |||
| + | You either need to find the original STLink firmware somewhere (or have dumped it before) and use '' | ||
| + | |||
| + | Note on v2 vs v2.1 from BMP developer: | ||
| + | |||
| + | //To reflash ST-Link v2, un- and replug to get into the St bootloader. Stlinkv2-1 needs a warm reset to enter the bootloader, but mostly STLinkUpgrade.jar will not recognize the chip. Try with some old version of STLinkUpgrade.jar.// | ||
| + | |||
| + | //B.t.w,BMP with git can now run some things from the command line, when PC-hosted, e.g. " | ||
| + | |||
| + | ==== Cheap Chinese STLink v2 clones ==== | ||
| + | |||
| + | Some of them can be reflashed to BMP, some can't (stlink-tool reports error). There are more versions, so the pinout on the outside and also on the board depends on the specific clone type. | ||
| + | |||
| + | An example how to [[http:// | ||
| + | |||
| + | Original STLink (flashed with BMP with ST bootloader) using to program BMP on the cheap clone (haven' | ||
| + | |||
| + | {{: | ||
| + | |||
| + | |||
| + | ==== BMP PC-hosted with BMP HW target ==== | ||
| + | |||
| + | For BMP built with '' | ||
| + | |||
| + | < | ||
| + | ./ | ||
| + | </ | ||
| + | |||
| + | It will create port 2000 listening for GDB connection and you can use the classic BMP commands like scan and attach: | ||
| + | |||
| + | < | ||
| + | >>> | ||
| + | Remote debugging using :2000 | ||
| + | >>> | ||
| + | Target voltage: unknown | ||
| + | Available Targets: | ||
| + | No. Att Driver | ||
| + | | ||
| + | >>> | ||
| + | Attaching to program: blackmagic-stlink-v2/ | ||
| + | 0x0800effc in st_usbfs_ep_read_packet (dev=< | ||
| + | 230 USB_SET_EP_RX_STAT(addr, | ||
| + | |||
| + | </ | ||
| + | |||
| + | |||
| + | ==== BMP PC-hosted with unmodified STLink v2 target (requires firmware >= V2J32xx) ==== | ||
| + | |||
| + | Upgrade STLink fw first with the STLinkUpgrade tool mentioned before. | ||
| + | |||
| + | With this firmware you can use external unmodified STLink with BMP ('' | ||
| + | |||
| + | < | ||
| + | ./ | ||
| + | </ | ||
| + | |||
| + | It will create port 2000 listening for GDB connection and you can use the classic BMP commands like scan and attach: | ||
| + | |||
| + | < | ||
| + | >>> | ||
| + | Remote debugging using :2000 | ||
| + | >>> | ||
| + | Target voltage: unknown | ||
| + | Available Targets: | ||
| + | No. Att Driver | ||
| + | | ||
| + | >>> | ||
| + | Attaching to program: blackmagic-stlink-v2/ | ||
| + | 0x0800effc in st_usbfs_ep_read_packet (dev=< | ||
| + | 230 USB_SET_EP_RX_STAT(addr, | ||
| + | |||
| + | </ | ||
| - | * https:// | + | ===== Other useful tools that are specific to STM32 chips ===== |
| - | * https:// | + | |
| - | Note that you have to disable memory protections in order to read some memory (set mem inaccessible-by-default off), even then some parts that are accessible via STLink | + | * [[https:// |
| + | * [[https:// | ||
| + | * [[https:// | ||
project/arm_debugging/start.1575742589.txt.gz · Last modified: 2019/12/07 18:16 by abyssal