/* * SPDX-FileCopyrightText: 2015-2024 Espressif Systems (Shanghai) CO LTD * * SPDX-License-Identifier: Apache-2.0 */ #include #include #include "sdkconfig.h" #include "esp_attr.h" #include "esp_err.h" #include "esp_check.h" #include "esp_system.h" #include "esp_log.h" #include "esp_heap_caps_init.h" #include "spi_flash_mmap.h" #include "esp_flash_internal.h" #include "esp_newlib.h" #include "esp_timer.h" #include "esp_efuse.h" #include "esp_efuse_table.h" #include "esp_flash_encrypt.h" #include "esp_partition.h" #include "esp_secure_boot.h" #include "esp_xt_wdt.h" #include "esp_cpu.h" #include "esp_private/startup_internal.h" #include "soc/soc_caps.h" #include "hal/wdt_hal.h" #include "hal/uart_types.h" #include "hal/uart_ll.h" #include "hal/efuse_hal.h" #if CONFIG_SW_COEXIST_ENABLE || CONFIG_EXTERNAL_COEX_ENABLE #include "private/esp_coexist_internal.h" #endif #if __has_include("esp_app_desc.h") #include "esp_app_desc.h" #endif #if CONFIG_PM_ENABLE #include "esp_pm.h" #include "esp_private/pm_impl.h" #endif #include "esp_private/esp_clk.h" #include "esp_private/spi_flash_os.h" #include "esp_private/brownout.h" #include "esp_rom_caps.h" #include "esp_rom_sys.h" #if CONFIG_SPIRAM #include "esp_psram.h" #include "esp_private/esp_psram_extram.h" #endif // Using the same tag as in startup.c to keep the logs unchanged static const char* TAG = "cpu_start"; // Hook to force the linker to include this file void esp_system_include_startup_funcs(void) { } // [refactor-todo] Most of these init functions should be moved to the respective components. ESP_SYSTEM_INIT_FN(init_show_cpu_freq, CORE, BIT(0), 10) { ESP_EARLY_LOGI(TAG, "Pro cpu start user code"); int cpu_freq = esp_clk_cpu_freq(); ESP_EARLY_LOGI(TAG, "cpu freq: %d Hz", cpu_freq); return ESP_OK; } ESP_SYSTEM_INIT_FN(init_heap, CORE, BIT(0), 100) { heap_caps_init(); return ESP_OK; } ESP_SYSTEM_INIT_FN(init_timer, CORE, BIT(0), 101) { esp_timer_early_init(); return ESP_OK; } ESP_SYSTEM_INIT_FN(init_psram_heap, CORE, BIT(0), 103) { #if CONFIG_SPIRAM_BOOT_INIT && (CONFIG_SPIRAM_USE_CAPS_ALLOC || CONFIG_SPIRAM_USE_MALLOC) if (esp_psram_is_initialized()) { esp_err_t r = esp_psram_extram_add_to_heap_allocator(); if (r != ESP_OK) { ESP_EARLY_LOGE(TAG, "External RAM could not be added to heap!"); abort(); } #if CONFIG_SPIRAM_USE_MALLOC heap_caps_malloc_extmem_enable(CONFIG_SPIRAM_MALLOC_ALWAYSINTERNAL); #endif } #endif return ESP_OK; } #if CONFIG_ESP_BROWNOUT_DET ESP_SYSTEM_INIT_FN(init_brownout, CORE, BIT(0), 104) { // [refactor-todo] leads to call chain rtc_is_register (driver) -> esp_intr_alloc (esp32/esp32s2) -> // malloc (newlib) -> heap_caps_malloc (heap), so heap must be at least initialized esp_brownout_init(); return ESP_OK; } #endif ESP_SYSTEM_INIT_FN(init_newlib_time, CORE, BIT(0), 105) { esp_newlib_time_init(); return ESP_OK; } #if !CONFIG_APP_BUILD_TYPE_PURE_RAM_APP ESP_SYSTEM_INIT_FN(init_flash, CORE, BIT(0), 130) { #if CONFIG_SPI_FLASH_ROM_IMPL spi_flash_rom_impl_init(); #endif esp_flash_app_init(); esp_err_t flash_ret = esp_flash_init_default_chip(); assert(flash_ret == ESP_OK); (void)flash_ret; #if CONFIG_SPI_FLASH_BROWNOUT_RESET spi_flash_needs_reset_check(); #endif // CONFIG_SPI_FLASH_BROWNOUT_RESET return ESP_OK; } #endif // !CONFIG_APP_BUILD_TYPE_PURE_RAM_APP #ifdef CONFIG_EFUSE_VIRTUAL ESP_SYSTEM_INIT_FN(init_virtual_efuse, CORE, BIT(0), 140) { ESP_LOGW(TAG, "eFuse virtual mode is enabled. If Secure boot or Flash encryption is enabled then it does not provide any security. FOR TESTING ONLY!"); #ifdef CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH const esp_partition_t *efuse_partition = esp_partition_find_first(ESP_PARTITION_TYPE_DATA, ESP_PARTITION_SUBTYPE_DATA_EFUSE_EM, NULL); if (efuse_partition) { esp_efuse_init_virtual_mode_in_flash(efuse_partition->address, efuse_partition->size); } #endif return ESP_OK; } #endif // CONFIG_EFUSE_VIRTUAL ESP_SYSTEM_INIT_FN(init_secure, CORE, BIT(0), 150) { #if CONFIG_BOOTLOADER_APP_ANTI_ROLLBACK // For anti-rollback case, recheck security version before we boot-up the current application const esp_app_desc_t *desc = esp_app_get_description(); ESP_RETURN_ON_FALSE(esp_efuse_check_secure_version(desc->secure_version), ESP_FAIL, TAG, "Incorrect secure version of app"); #endif #ifdef CONFIG_SECURE_FLASH_ENC_ENABLED esp_flash_encryption_init_checks(); #endif #if defined(CONFIG_SECURE_BOOT) || defined(CONFIG_SECURE_SIGNED_ON_UPDATE_NO_SECURE_BOOT) // Note: in some configs this may read flash, so placed after flash init esp_secure_boot_init_checks(); #endif #if SOC_EFUSE_ECDSA_USE_HARDWARE_K if (esp_efuse_find_purpose(ESP_EFUSE_KEY_PURPOSE_ECDSA_KEY, NULL)) { // ECDSA key purpose block is present and hence permanently enable // the hardware TRNG supplied k mode (most secure mode) ESP_RETURN_ON_ERROR(esp_efuse_write_field_bit(ESP_EFUSE_ECDSA_FORCE_USE_HARDWARE_K), TAG, "Failed to enable hardware k mode"); } #endif #if CONFIG_SECURE_DISABLE_ROM_DL_MODE ESP_RETURN_ON_ERROR(esp_efuse_disable_rom_download_mode(), TAG, "Failed to disable ROM download mode"); #endif #if CONFIG_SECURE_ENABLE_SECURE_ROM_DL_MODE ESP_RETURN_ON_ERROR(esp_efuse_enable_rom_secure_download_mode(), TAG, "Failed to enable Secure Download mode"); #endif #if CONFIG_ESP32_DISABLE_BASIC_ROM_CONSOLE esp_efuse_disable_basic_rom_console(); #endif return ESP_OK; } // Set efuse ROM_LOG_MODE on first boot // // For CONFIG_BOOT_ROM_LOG_ALWAYS_ON (default) or undefined (ESP32), leave // ROM_LOG_MODE undefined (no need to call this function during startup) #if CONFIG_BOOT_ROM_LOG_ALWAYS_OFF #define ROM_LOG_MODE ESP_EFUSE_ROM_LOG_ALWAYS_OFF #elif CONFIG_BOOT_ROM_LOG_ON_GPIO_LOW #define ROM_LOG_MODE ESP_EFUSE_ROM_LOG_ON_GPIO_LOW #elif CONFIG_BOOT_ROM_LOG_ON_GPIO_HIGH #define ROM_LOG_MODE ESP_EFUSE_ROM_LOG_ON_GPIO_HIGH #endif #ifdef ROM_LOG_MODE ESP_SYSTEM_INIT_FN(init_rom_log, CORE, BIT(0), 160) { if (ets_efuse_get_uart_print_control() == ROM_LOG_MODE) { return ESP_OK; } esp_err_t err = esp_efuse_set_rom_log_scheme(ROM_LOG_MODE); if (err == ESP_ERR_NOT_SUPPORTED) { err = ESP_OK; } ESP_RETURN_ON_ERROR(err, TAG, "Failed to set ROM log scheme"); return ESP_OK; } #endif // ROM_LOG_MODE #if CONFIG_ESP_XT_WDT ESP_SYSTEM_INIT_FN(init_xt_wdt, CORE, BIT(0), 170) { esp_xt_wdt_config_t cfg = { .timeout = CONFIG_ESP_XT_WDT_TIMEOUT, .auto_backup_clk_enable = CONFIG_ESP_XT_WDT_BACKUP_CLK_ENABLE, }; return esp_xt_wdt_init(&cfg); } #endif // CONFIG_ESP_XT_WDT #if CONFIG_PM_ENABLE ESP_SYSTEM_INIT_FN(init_pm, SECONDARY, BIT(0), 201) { esp_pm_impl_init(); return ESP_OK; } #endif // CONFIG_PM_ENABLE #if SOC_APB_BACKUP_DMA ESP_SYSTEM_INIT_FN(init_apb_dma, SECONDARY, BIT(0), 203) { extern void esp_apb_backup_dma_lock_init(void); esp_apb_backup_dma_lock_init(); return ESP_OK; } #endif #if CONFIG_SW_COEXIST_ENABLE || CONFIG_EXTERNAL_COEX_ENABLE ESP_SYSTEM_INIT_FN(init_coexist, SECONDARY, BIT(0), 204) { esp_coex_adapter_register(&g_coex_adapter_funcs); coex_pre_init(); return ESP_OK; } #endif // CONFIG_SW_COEXIST_ENABLE || CONFIG_EXTERNAL_COEX_ENABLE #ifdef CONFIG_COMPILER_CXX_EXCEPTIONS /** * This function overwrites a the same function of libsupc++ (part of libstdc++). * Consequently, libsupc++ will then follow our configured exception emergency pool size. * * It will be called even with -fno-exception for user code since the stdlib still uses exceptions. */ size_t __cxx_eh_arena_size_get(void) { #ifdef CONFIG_COMPILER_CXX_EXCEPTIONS return CONFIG_COMPILER_CXX_EXCEPTIONS_EMG_POOL_SIZE; #else return 0; #endif } // workaround for C++ exception crashes void _Unwind_SetNoFunctionContextInstall(unsigned char enable) __attribute__((weak, alias("_Unwind_SetNoFunctionContextInstall_Default"))); // workaround for C++ exception large memory allocation void _Unwind_SetEnableExceptionFdeSorting(unsigned char enable); static IRAM_ATTR void _Unwind_SetNoFunctionContextInstall_Default(unsigned char enable __attribute__((unused))) { (void)0; } ESP_SYSTEM_INIT_FN(init_cxx_exceptions, SECONDARY, BIT(0), 205) { ESP_EARLY_LOGD(TAG, "Setting C++ exception workarounds."); _Unwind_SetNoFunctionContextInstall(1); _Unwind_SetEnableExceptionFdeSorting(0); return ESP_OK; } #endif // CONFIG_COMPILER_CXX_EXCEPTIONS #ifndef CONFIG_BOOTLOADER_WDT_DISABLE_IN_USER_CODE ESP_SYSTEM_INIT_FN(init_disable_rtc_wdt, SECONDARY, BIT(0), 999) { wdt_hal_context_t rtc_wdt_ctx = RWDT_HAL_CONTEXT_DEFAULT(); wdt_hal_write_protect_disable(&rtc_wdt_ctx); wdt_hal_disable(&rtc_wdt_ctx); wdt_hal_write_protect_enable(&rtc_wdt_ctx); return ESP_OK; } #endif // CONFIG_BOOTLOADER_WDT_DISABLE_IN_USER_CODE