2023-11-24 12:32:37 -05:00
|
|
|
/*
|
2024-01-02 04:56:07 -05:00
|
|
|
* SPDX-FileCopyrightText: 2015-2024 Espressif Systems (Shanghai) CO LTD
|
2023-11-24 12:32:37 -05:00
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "sdkconfig.h"
|
|
|
|
#include "esp_attr.h"
|
|
|
|
#include "esp_err.h"
|
|
|
|
#include "esp_check.h"
|
|
|
|
#include "esp_system.h"
|
|
|
|
#include "esp_log.h"
|
|
|
|
#include "esp_heap_caps_init.h"
|
|
|
|
#include "spi_flash_mmap.h"
|
|
|
|
#include "esp_flash_internal.h"
|
|
|
|
#include "esp_newlib.h"
|
|
|
|
#include "esp_efuse.h"
|
|
|
|
#include "esp_efuse_table.h"
|
|
|
|
#include "esp_flash_encrypt.h"
|
|
|
|
#include "esp_partition.h"
|
|
|
|
#include "esp_secure_boot.h"
|
|
|
|
#include "esp_xt_wdt.h"
|
|
|
|
#include "esp_cpu.h"
|
|
|
|
#include "esp_private/startup_internal.h"
|
|
|
|
#include "soc/soc_caps.h"
|
|
|
|
#include "hal/wdt_hal.h"
|
|
|
|
#include "hal/uart_types.h"
|
|
|
|
#include "hal/uart_ll.h"
|
|
|
|
#include "hal/efuse_hal.h"
|
|
|
|
|
|
|
|
#if CONFIG_SW_COEXIST_ENABLE || CONFIG_EXTERNAL_COEX_ENABLE
|
|
|
|
#include "private/esp_coexist_internal.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if __has_include("esp_app_desc.h")
|
|
|
|
#include "esp_app_desc.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_PM_ENABLE
|
|
|
|
#include "esp_pm.h"
|
|
|
|
#include "esp_private/pm_impl.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "esp_private/esp_clk.h"
|
|
|
|
#include "esp_private/spi_flash_os.h"
|
|
|
|
#include "esp_private/brownout.h"
|
|
|
|
|
|
|
|
#include "esp_rom_caps.h"
|
|
|
|
#include "esp_rom_sys.h"
|
|
|
|
|
2023-12-05 21:37:15 -05:00
|
|
|
#if SOC_BOD_SUPPORTED
|
|
|
|
#include "hal/brownout_ll.h"
|
|
|
|
#endif
|
|
|
|
|
2023-11-24 12:32:37 -05:00
|
|
|
#if CONFIG_SPIRAM
|
|
|
|
#include "esp_psram.h"
|
|
|
|
#include "esp_private/esp_psram_extram.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// Using the same tag as in startup.c to keep the logs unchanged
|
|
|
|
static const char* TAG = "cpu_start";
|
|
|
|
|
|
|
|
// Hook to force the linker to include this file
|
|
|
|
void esp_system_include_startup_funcs(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
// [refactor-todo] Most of these init functions should be moved to the respective components.
|
|
|
|
|
|
|
|
ESP_SYSTEM_INIT_FN(init_show_cpu_freq, CORE, BIT(0), 10)
|
|
|
|
{
|
|
|
|
ESP_EARLY_LOGI(TAG, "Pro cpu start user code");
|
|
|
|
int cpu_freq = esp_clk_cpu_freq();
|
|
|
|
ESP_EARLY_LOGI(TAG, "cpu freq: %d Hz", cpu_freq);
|
|
|
|
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
ESP_SYSTEM_INIT_FN(init_heap, CORE, BIT(0), 100)
|
|
|
|
{
|
|
|
|
heap_caps_init();
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
ESP_SYSTEM_INIT_FN(init_psram_heap, CORE, BIT(0), 103)
|
|
|
|
{
|
|
|
|
#if CONFIG_SPIRAM_BOOT_INIT && (CONFIG_SPIRAM_USE_CAPS_ALLOC || CONFIG_SPIRAM_USE_MALLOC)
|
|
|
|
if (esp_psram_is_initialized()) {
|
|
|
|
esp_err_t r = esp_psram_extram_add_to_heap_allocator();
|
|
|
|
if (r != ESP_OK) {
|
|
|
|
ESP_EARLY_LOGE(TAG, "External RAM could not be added to heap!");
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
#if CONFIG_SPIRAM_USE_MALLOC
|
|
|
|
heap_caps_malloc_extmem_enable(CONFIG_SPIRAM_MALLOC_ALWAYSINTERNAL);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
ESP_SYSTEM_INIT_FN(init_brownout, CORE, BIT(0), 104)
|
|
|
|
{
|
|
|
|
// [refactor-todo] leads to call chain rtc_is_register (driver) -> esp_intr_alloc (esp32/esp32s2) ->
|
|
|
|
// malloc (newlib) -> heap_caps_malloc (heap), so heap must be at least initialized
|
2023-12-05 21:37:15 -05:00
|
|
|
#if CONFIG_ESP_BROWNOUT_DET
|
2023-11-24 12:32:37 -05:00
|
|
|
esp_brownout_init();
|
2023-12-05 21:37:15 -05:00
|
|
|
#else
|
|
|
|
#if SOC_CAPS_NO_RESET_BY_ANA_BOD
|
|
|
|
brownout_ll_ana_reset_enable(false);
|
|
|
|
#endif // SOC_CAPS_NO_RESET_BY_ANA_BOD
|
|
|
|
#endif // CONFIG_ESP_BROWNOUT_DET
|
2023-11-24 12:32:37 -05:00
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
ESP_SYSTEM_INIT_FN(init_newlib_time, CORE, BIT(0), 105)
|
|
|
|
{
|
|
|
|
esp_newlib_time_init();
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if !CONFIG_APP_BUILD_TYPE_PURE_RAM_APP
|
|
|
|
ESP_SYSTEM_INIT_FN(init_flash, CORE, BIT(0), 130)
|
|
|
|
{
|
|
|
|
#if CONFIG_SPI_FLASH_ROM_IMPL
|
|
|
|
spi_flash_rom_impl_init();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
esp_flash_app_init();
|
|
|
|
esp_err_t flash_ret = esp_flash_init_default_chip();
|
|
|
|
assert(flash_ret == ESP_OK);
|
|
|
|
(void)flash_ret;
|
|
|
|
#if CONFIG_SPI_FLASH_BROWNOUT_RESET
|
|
|
|
spi_flash_needs_reset_check();
|
|
|
|
#endif // CONFIG_SPI_FLASH_BROWNOUT_RESET
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif // !CONFIG_APP_BUILD_TYPE_PURE_RAM_APP
|
|
|
|
|
|
|
|
#ifdef CONFIG_EFUSE_VIRTUAL
|
|
|
|
ESP_SYSTEM_INIT_FN(init_virtual_efuse, CORE, BIT(0), 140)
|
|
|
|
{
|
|
|
|
ESP_LOGW(TAG, "eFuse virtual mode is enabled. If Secure boot or Flash encryption is enabled then it does not provide any security. FOR TESTING ONLY!");
|
|
|
|
#ifdef CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH
|
|
|
|
const esp_partition_t *efuse_partition = esp_partition_find_first(ESP_PARTITION_TYPE_DATA, ESP_PARTITION_SUBTYPE_DATA_EFUSE_EM, NULL);
|
|
|
|
if (efuse_partition) {
|
|
|
|
esp_efuse_init_virtual_mode_in_flash(efuse_partition->address, efuse_partition->size);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif // CONFIG_EFUSE_VIRTUAL
|
|
|
|
|
|
|
|
ESP_SYSTEM_INIT_FN(init_secure, CORE, BIT(0), 150)
|
|
|
|
{
|
2024-01-23 03:41:14 -05:00
|
|
|
#if CONFIG_BOOTLOADER_APP_ANTI_ROLLBACK
|
|
|
|
// For anti-rollback case, recheck security version before we boot-up the current application
|
|
|
|
const esp_app_desc_t *desc = esp_app_get_description();
|
|
|
|
ESP_RETURN_ON_FALSE(esp_efuse_check_secure_version(desc->secure_version), ESP_FAIL, TAG, "Incorrect secure version of app");
|
|
|
|
#endif
|
|
|
|
|
2023-11-24 12:32:37 -05:00
|
|
|
#ifdef CONFIG_SECURE_FLASH_ENC_ENABLED
|
|
|
|
esp_flash_encryption_init_checks();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(CONFIG_SECURE_BOOT) || defined(CONFIG_SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT)
|
|
|
|
// Note: in some configs this may read flash, so placed after flash init
|
|
|
|
esp_secure_boot_init_checks();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if SOC_EFUSE_ECDSA_USE_HARDWARE_K
|
|
|
|
if (esp_efuse_find_purpose(ESP_EFUSE_KEY_PURPOSE_ECDSA_KEY, NULL)) {
|
|
|
|
// ECDSA key purpose block is present and hence permanently enable
|
|
|
|
// the hardware TRNG supplied k mode (most secure mode)
|
|
|
|
ESP_RETURN_ON_ERROR(esp_efuse_write_field_bit(ESP_EFUSE_ECDSA_FORCE_USE_HARDWARE_K), TAG, "Failed to enable hardware k mode");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_SECURE_DISABLE_ROM_DL_MODE
|
|
|
|
ESP_RETURN_ON_ERROR(esp_efuse_disable_rom_download_mode(), TAG, "Failed to disable ROM download mode");
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_SECURE_ENABLE_SECURE_ROM_DL_MODE
|
|
|
|
ESP_RETURN_ON_ERROR(esp_efuse_enable_rom_secure_download_mode(), TAG, "Failed to enable Secure Download mode");
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_ESP32_DISABLE_BASIC_ROM_CONSOLE
|
|
|
|
esp_efuse_disable_basic_rom_console();
|
|
|
|
#endif
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set efuse ROM_LOG_MODE on first boot
|
|
|
|
//
|
|
|
|
// For CONFIG_BOOT_ROM_LOG_ALWAYS_ON (default) or undefined (ESP32), leave
|
|
|
|
// ROM_LOG_MODE undefined (no need to call this function during startup)
|
|
|
|
#if CONFIG_BOOT_ROM_LOG_ALWAYS_OFF
|
|
|
|
#define ROM_LOG_MODE ESP_EFUSE_ROM_LOG_ALWAYS_OFF
|
|
|
|
#elif CONFIG_BOOT_ROM_LOG_ON_GPIO_LOW
|
|
|
|
#define ROM_LOG_MODE ESP_EFUSE_ROM_LOG_ON_GPIO_LOW
|
|
|
|
#elif CONFIG_BOOT_ROM_LOG_ON_GPIO_HIGH
|
|
|
|
#define ROM_LOG_MODE ESP_EFUSE_ROM_LOG_ON_GPIO_HIGH
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef ROM_LOG_MODE
|
|
|
|
ESP_SYSTEM_INIT_FN(init_rom_log, CORE, BIT(0), 160)
|
|
|
|
{
|
2024-01-29 20:40:10 -05:00
|
|
|
if (ets_efuse_get_uart_print_control() == ROM_LOG_MODE) {
|
2024-01-02 04:56:07 -05:00
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
2023-11-24 12:32:37 -05:00
|
|
|
esp_err_t err = esp_efuse_set_rom_log_scheme(ROM_LOG_MODE);
|
2024-01-02 04:56:07 -05:00
|
|
|
|
2023-11-24 12:32:37 -05:00
|
|
|
if (err == ESP_ERR_NOT_SUPPORTED) {
|
|
|
|
err = ESP_OK;
|
|
|
|
}
|
|
|
|
ESP_RETURN_ON_ERROR(err, TAG, "Failed to set ROM log scheme");
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif // ROM_LOG_MODE
|
|
|
|
|
|
|
|
#if CONFIG_ESP_XT_WDT
|
|
|
|
ESP_SYSTEM_INIT_FN(init_xt_wdt, CORE, BIT(0), 170)
|
|
|
|
{
|
|
|
|
esp_xt_wdt_config_t cfg = {
|
|
|
|
.timeout = CONFIG_ESP_XT_WDT_TIMEOUT,
|
|
|
|
.auto_backup_clk_enable = CONFIG_ESP_XT_WDT_BACKUP_CLK_ENABLE,
|
|
|
|
};
|
|
|
|
return esp_xt_wdt_init(&cfg);
|
|
|
|
}
|
|
|
|
#endif // CONFIG_ESP_XT_WDT
|
|
|
|
|
|
|
|
#if CONFIG_PM_ENABLE
|
|
|
|
ESP_SYSTEM_INIT_FN(init_pm, SECONDARY, BIT(0), 201)
|
|
|
|
{
|
|
|
|
esp_pm_impl_init();
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif // CONFIG_PM_ENABLE
|
|
|
|
|
|
|
|
#if SOC_APB_BACKUP_DMA
|
|
|
|
ESP_SYSTEM_INIT_FN(init_apb_dma, SECONDARY, BIT(0), 203)
|
|
|
|
{
|
|
|
|
extern void esp_apb_backup_dma_lock_init(void);
|
|
|
|
esp_apb_backup_dma_lock_init();
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if CONFIG_SW_COEXIST_ENABLE || CONFIG_EXTERNAL_COEX_ENABLE
|
|
|
|
ESP_SYSTEM_INIT_FN(init_coexist, SECONDARY, BIT(0), 204)
|
|
|
|
{
|
|
|
|
esp_coex_adapter_register(&g_coex_adapter_funcs);
|
|
|
|
coex_pre_init();
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif // CONFIG_SW_COEXIST_ENABLE || CONFIG_EXTERNAL_COEX_ENABLE
|
|
|
|
|
|
|
|
#ifdef CONFIG_COMPILER_CXX_EXCEPTIONS
|
|
|
|
/**
|
|
|
|
* This function overwrites a the same function of libsupc++ (part of libstdc++).
|
|
|
|
* Consequently, libsupc++ will then follow our configured exception emergency pool size.
|
|
|
|
*
|
|
|
|
* It will be called even with -fno-exception for user code since the stdlib still uses exceptions.
|
|
|
|
*/
|
|
|
|
size_t __cxx_eh_arena_size_get(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_COMPILER_CXX_EXCEPTIONS
|
|
|
|
return CONFIG_COMPILER_CXX_EXCEPTIONS_EMG_POOL_SIZE;
|
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
// workaround for C++ exception crashes
|
|
|
|
void _Unwind_SetNoFunctionContextInstall(unsigned char enable) __attribute__((weak, alias("_Unwind_SetNoFunctionContextInstall_Default")));
|
|
|
|
// workaround for C++ exception large memory allocation
|
|
|
|
void _Unwind_SetEnableExceptionFdeSorting(unsigned char enable);
|
|
|
|
|
|
|
|
static IRAM_ATTR void _Unwind_SetNoFunctionContextInstall_Default(unsigned char enable __attribute__((unused)))
|
|
|
|
{
|
|
|
|
(void)0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ESP_SYSTEM_INIT_FN(init_cxx_exceptions, SECONDARY, BIT(0), 205)
|
|
|
|
{
|
|
|
|
ESP_EARLY_LOGD(TAG, "Setting C++ exception workarounds.");
|
|
|
|
_Unwind_SetNoFunctionContextInstall(1);
|
|
|
|
_Unwind_SetEnableExceptionFdeSorting(0);
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif // CONFIG_COMPILER_CXX_EXCEPTIONS
|
|
|
|
|
|
|
|
#ifndef CONFIG_BOOTLOADER_WDT_DISABLE_IN_USER_CODE
|
|
|
|
ESP_SYSTEM_INIT_FN(init_disable_rtc_wdt, SECONDARY, BIT(0), 999)
|
|
|
|
{
|
|
|
|
wdt_hal_context_t rtc_wdt_ctx = RWDT_HAL_CONTEXT_DEFAULT();
|
|
|
|
wdt_hal_write_protect_disable(&rtc_wdt_ctx);
|
|
|
|
wdt_hal_disable(&rtc_wdt_ctx);
|
|
|
|
wdt_hal_write_protect_enable(&rtc_wdt_ctx);
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
#endif // CONFIG_BOOTLOADER_WDT_DISABLE_IN_USER_CODE
|