1
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
38
39
40
41
42
43
44
45
46
47
48
49
50
56
57
58
59
60
61
62
63
73
74
75
76
77
78
79
80
83
84
85
86
87
91
92
97
98
103
104
105
106
107
108
109
110
111
112
113
114
115
116
118
119
120
121
123
124
125
126
127
128
129
130
131
132
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
156
159
160
161
162
174
175
180
181
182
183
189
190
191
192
197
198
199
200
201
202
206
207
222
223
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
265
266
267
268
269
270
271
272
273
274
275
276
279
280
281
282
285
286
287
291
293
294
295
296
297
298
301
302
303
307
308
309
310
311
322
323
324
325
328
329
337
338
339
340
341
342
352
353
354
355
356
363
365
366
367
368
369
370
371
372
373
374
375
390
396
397
404
405
/* ... */
#include <stdarg.h>
#include <sys/param.h>
#include "esp_attr.h"
#include "esp_private/system_internal.h"
#include "esp_flash.h"
#include "esp_flash_partitions.h"
#include "freertos/FreeRTOS.h"
#include "freertos/task.h"
#include "hal/spi_types.h"
#include "sdkconfig.h"
#include "esp_log.h"
#include "esp_compiler.h"
#include "esp_rom_sys.h"
#include "esp_private/spi_flash_os.h"
#include "esp_private/cache_utils.h"
#include "esp_private/spi_share_hw_ctrl.h"16 includes
#define SPI_FLASH_CACHE_NO_DISABLE (CONFIG_SPI_FLASH_AUTO_SUSPEND || (CONFIG_SPIRAM_FETCH_INSTRUCTIONS && CONFIG_SPIRAM_RODATA) || CONFIG_APP_BUILD_TYPE_RAM)
static const char TAG[] = "spi_flash";
#if SPI_FLASH_CACHE_NO_DISABLE
static _lock_t s_spi1_flash_mutex;
#endif
/* ... */
/* ... */
typedef struct {
spi_bus_lock_dev_handle_t dev_lock;
bool no_protect;
uint32_t acquired_since_us;
uint32_t released_since_us;
}{ ... } app_func_arg_t;
static inline void on_spi_released(app_func_arg_t* ctx);
static inline void on_spi_acquired(app_func_arg_t* ctx);
static inline void on_spi_yielded(app_func_arg_t* ctx);
static inline bool on_spi_check_yield(app_func_arg_t* ctx);
#if !SPI_FLASH_CACHE_NO_DISABLE
IRAM_ATTR static void cache_enable(void* arg)
{
spi_flash_enable_interrupts_caches_and_other_cpu();
}{ ... }
IRAM_ATTR static void cache_disable(void* arg)
{
spi_flash_disable_interrupts_caches_and_other_cpu();
}{ ... }
#endif/* ... */
static IRAM_ATTR esp_err_t acquire_spi_bus_lock(void *arg)
{
spi_bus_lock_dev_handle_t dev_lock = ((app_func_arg_t *)arg)->dev_lock;
esp_err_t ret = spi_bus_lock_acquire_start(dev_lock, portMAX_DELAY);
if (ret != ESP_OK) {
return ret;
}{...}
spi_bus_lock_touch(dev_lock);
return ESP_OK;
}{ ... }
static IRAM_ATTR esp_err_t release_spi_bus_lock(void *arg)
{
return spi_bus_lock_acquire_end(((app_func_arg_t *)arg)->dev_lock);
}{ ... }
static IRAM_ATTR esp_err_t spi23_start(void *arg){
esp_err_t ret = acquire_spi_bus_lock(arg);
on_spi_acquired((app_func_arg_t*)arg);
return ret;
}{ ... }
static IRAM_ATTR esp_err_t spi23_end(void *arg){
esp_err_t ret = release_spi_bus_lock(arg);
on_spi_released((app_func_arg_t*)arg);
return ret;
}{ ... }
static IRAM_ATTR esp_err_t spi1_start(void *arg)
{
esp_err_t ret = ESP_OK;
/* ... */
#if CONFIG_SPI_FLASH_SHARE_SPI1_BUS
ret = acquire_spi_bus_lock(arg);/* ... */
#elif SPI_FLASH_CACHE_NO_DISABLE
_lock_acquire(&s_spi1_flash_mutex);
#else
cache_disable(NULL);/* ... */
#endif
on_spi_acquired((app_func_arg_t*)arg);
return ret;
}{ ... }
static IRAM_ATTR esp_err_t spi1_end(void *arg)
{
esp_err_t ret = ESP_OK;
/* ... */
#if CONFIG_SPI_FLASH_SHARE_SPI1_BUS
ret = release_spi_bus_lock(arg);
#elif SPI_FLASH_CACHE_NO_DISABLE
_lock_release(&s_spi1_flash_mutex);
#else
cache_enable(NULL);
#endif
on_spi_released((app_func_arg_t*)arg);
return ret;
}{ ... }
static IRAM_ATTR esp_err_t spi_flash_os_check_yield(void *arg, uint32_t chip_status, uint32_t* out_request)
{
assert (chip_status == 0);
esp_err_t ret = ESP_ERR_TIMEOUT;
uint32_t request = 0;
if (on_spi_check_yield((app_func_arg_t *)arg)) {
request = SPI_FLASH_YIELD_REQ_YIELD;
ret = ESP_OK;
}{...}
if (out_request) {
*out_request = request;
}{...}
return ret;
}{ ... }
static IRAM_ATTR esp_err_t spi_flash_os_yield(void *arg, uint32_t* out_status)
{
if (likely(xTaskGetSchedulerState() == taskSCHEDULER_RUNNING)) {
#ifdef CONFIG_SPI_FLASH_ERASE_YIELD_TICKS
vTaskDelay(CONFIG_SPI_FLASH_ERASE_YIELD_TICKS);
#else
vTaskDelay(1);
#endif
}{...}
on_spi_yielded((app_func_arg_t*)arg);
return ESP_OK;
}{ ... }
static IRAM_ATTR esp_err_t delay_us(void *arg, uint32_t us)
{
esp_rom_delay_us(us);
return ESP_OK;
}{ ... }
static IRAM_ATTR void* get_buffer_malloc(void* arg, size_t reqest_size, size_t* out_size)
{
/* ... */
void* ret = NULL;
unsigned retries = 5;
size_t read_chunk_size = reqest_size;
while(ret == NULL && retries--) {
read_chunk_size = MIN(read_chunk_size, heap_caps_get_largest_free_block(MALLOC_CAP_INTERNAL | MALLOC_CAP_8BIT));
read_chunk_size = (read_chunk_size + 3) & ~3;
ret = heap_caps_malloc(read_chunk_size, MALLOC_CAP_INTERNAL | MALLOC_CAP_8BIT);
}{...}
ESP_LOGV(TAG, "allocate temp buffer: %p (%d)", ret, read_chunk_size);
*out_size = (ret != NULL? read_chunk_size: 0);
return ret;
}{ ... }
static IRAM_ATTR void release_buffer_malloc(void* arg, void *temp_buf)
{
free(temp_buf);
}{ ... }
static IRAM_ATTR esp_err_t main_flash_region_protected(void* arg, size_t start_addr, size_t size)
{
if (!esp_partition_is_flash_region_writable(start_addr, size)) {
return ESP_ERR_NOT_ALLOWED;
}{...}
#if !CONFIG_SPI_FLASH_DANGEROUS_WRITE_ALLOWED
if (((app_func_arg_t*)arg)->no_protect || esp_partition_main_flash_region_safe(start_addr, size)) {
return ESP_OK;
}{...} else {
return ESP_ERR_NOT_SUPPORTED;
}{...}
#endif/* ... */
return ESP_OK;
}{ ... }
static IRAM_ATTR void main_flash_op_status(uint32_t op_status)
{
bool is_erasing = op_status & SPI_FLASH_OS_IS_ERASING_STATUS_FLAG;
spi_flash_set_erasing_flag(is_erasing);
}{ ... }
static DRAM_ATTR app_func_arg_t main_flash_arg = {};
static const DRAM_ATTR esp_flash_os_functions_t esp_flash_spi1_default_os_functions = {
.start = spi1_start,
.end = spi1_end,
.region_protected = main_flash_region_protected,
.delay_us = delay_us,
.get_temp_buffer = get_buffer_malloc,
.release_temp_buffer = release_buffer_malloc,
.check_yield = spi_flash_os_check_yield,
.yield = spi_flash_os_yield,
#if CONFIG_SPI_FLASH_BROWNOUT_RESET
.set_flash_op_status = main_flash_op_status,
#else
.set_flash_op_status = NULL,
#endif
}{...};
static const esp_flash_os_functions_t esp_flash_spi23_default_os_functions = {
.start = spi23_start,
.end = spi23_end,
.delay_us = delay_us,
.get_temp_buffer = get_buffer_malloc,
.release_temp_buffer = release_buffer_malloc,
.region_protected = NULL,
.check_yield = spi_flash_os_check_yield,
.yield = spi_flash_os_yield,
.set_flash_op_status = NULL,
}{...};
static bool use_bus_lock(int host_id)
{
if (host_id != SPI1_HOST) {
return true;
}{...}
#if CONFIG_SPI_FLASH_SHARE_SPI1_BUS
return true;
#else
return false;
#endif
}{ ... }
esp_err_t esp_flash_init_os_functions(esp_flash_t *chip, int host_id, spi_bus_lock_dev_handle_t dev_handle)
{
if (use_bus_lock(host_id) && !dev_handle) {
return ESP_ERR_INVALID_ARG;
}{...}
chip->os_func_data = heap_caps_malloc(sizeof(app_func_arg_t),
MALLOC_CAP_INTERNAL | MALLOC_CAP_8BIT);
if (chip->os_func_data == NULL) {
return ESP_ERR_NO_MEM;
}{...}
switch (host_id) {
case SPI1_HOST:
chip->os_func = &esp_flash_spi1_default_os_functions;
break;...
case SPI2_HOST:
#if SOC_SPI_PERIPH_NUM > 2...
case SPI3_HOST:
#endif
chip->os_func = &esp_flash_spi23_default_os_functions;
break;
default:
return ESP_ERR_INVALID_ARG;
break;...
}{...}
*(app_func_arg_t*) chip->os_func_data = (app_func_arg_t) {
.dev_lock = dev_handle,
.no_protect = true,
}{...};
return ESP_OK;
}{ ... }
esp_err_t esp_flash_deinit_os_functions(esp_flash_t* chip, spi_bus_lock_dev_handle_t* out_dev_handle)
{
if (chip->os_func_data) {
*out_dev_handle = ((app_func_arg_t*)chip->os_func_data)->dev_lock;
free(chip->os_func_data);
}{...}
chip->os_func = NULL;
chip->os_func_data = NULL;
return ESP_OK;
}{ ... }
esp_err_t esp_flash_init_main_bus_lock(void)
{
/* ... */
#if CONFIG_SPI_FLASH_SHARE_SPI1_BUS
spi_bus_lock_set_bg_control(g_main_spi_bus_lock, cache_enable, cache_disable, NULL);
esp_err_t err = spi_bus_lock_init_main_dev();
if (err != ESP_OK) {
return err;
}{...}
return ESP_OK;/* ... */
#else
return ESP_ERR_NOT_SUPPORTED;
#endif
}{ ... }
esp_err_t esp_flash_app_enable_os_functions(esp_flash_t* chip)
{
main_flash_arg = (app_func_arg_t) {
.dev_lock = g_spi_lock_main_flash_dev,
.no_protect = false,
}{...};
chip->os_func = &esp_flash_spi1_default_os_functions;
chip->os_func_data = &main_flash_arg;
return ESP_OK;
}{ ... }
esp_err_t esp_flash_set_dangerous_write_protection(esp_flash_t *chip, const bool protect)
{
#if !CONFIG_SPI_FLASH_DANGEROUS_WRITE_ALLOWED
if (chip == NULL) {
return ESP_ERR_INVALID_ARG;
}{...}
if (chip->os_func_data != NULL) {
((app_func_arg_t*)chip->os_func_data)->no_protect = !protect;
}{...}
#else/* ... */
(void)chip;
(void)protect;/* ... */
#endif
return ESP_OK;
}{ ... }
static inline IRAM_ATTR bool on_spi_check_yield(app_func_arg_t* ctx)
{
#ifdef CONFIG_SPI_FLASH_YIELD_DURING_ERASE
uint32_t time = esp_system_get_time();
if ((time - ctx->released_since_us) >= CONFIG_SPI_FLASH_ERASE_YIELD_TICKS * portTICK_PERIOD_MS * 1000) {
ctx->acquired_since_us = time;
}{...} else if ((time - ctx->acquired_since_us) >= CONFIG_SPI_FLASH_ERASE_YIELD_DURATION_MS * 1000) {
return true;
}{...}
/* ... */#endif
return false;
}{ ... }
static inline IRAM_ATTR void on_spi_released(app_func_arg_t* ctx)
{
#ifdef CONFIG_SPI_FLASH_YIELD_DURING_ERASE
ctx->released_since_us = esp_system_get_time();
#endif
}{ ... }
static inline IRAM_ATTR void on_spi_acquired(app_func_arg_t* ctx)
{
}{ ... }
static inline IRAM_ATTR void on_spi_yielded(app_func_arg_t* ctx)
{
uint32_t time = esp_system_get_time();
ctx->acquired_since_us = time;
}{ ... }