mirror of
https://github.com/DarkFlippers/unleashed-firmware
synced 2024-11-27 15:00:46 +00:00
acc39a4bc0
* Api Symbols: replace asserts with checks * Api Symbols: replace asserts with checks part 2 * Update no args function signatures with void, to help compiler to track incorrect usage * More unavoidable void * Update PVS config and code to make it happy * Format sources * nfc: fix checks * dead code cleanup & include fixes Co-authored-by: gornekich <n.gorbadey@gmail.com> Co-authored-by: hedger <hedger@users.noreply.github.com> Co-authored-by: hedger <hedger@nanode.su>
563 lines
19 KiB
C
563 lines
19 KiB
C
#include <furi_hal_flash.h>
|
|
#include <furi_hal_bt.h>
|
|
#include <furi_hal_power.h>
|
|
#include <furi_hal_cortex.h>
|
|
#include <furi.h>
|
|
#include <ble/ble.h>
|
|
#include <interface/patterns/ble_thread/shci/shci.h>
|
|
|
|
#include <stm32wbxx.h>
|
|
#include <stm32wbxx_ll_hsem.h>
|
|
|
|
#include <hsem_map.h>
|
|
|
|
#include <FreeRTOS.h>
|
|
#include <task.h>
|
|
|
|
#define TAG "FuriHalFlash"
|
|
|
|
#define FURI_HAL_CRITICAL_MSG "Critical flash operation fail"
|
|
#define FURI_HAL_FLASH_READ_BLOCK (8U)
|
|
#define FURI_HAL_FLASH_WRITE_BLOCK (8U)
|
|
#define FURI_HAL_FLASH_PAGE_SIZE (4096U)
|
|
#define FURI_HAL_FLASH_CYCLES_COUNT (10000U)
|
|
#define FURI_HAL_FLASH_TIMEOUT (1000U)
|
|
#define FURI_HAL_FLASH_KEY1 (0x45670123U)
|
|
#define FURI_HAL_FLASH_KEY2 (0xCDEF89ABU)
|
|
#define FURI_HAL_FLASH_TOTAL_PAGES (256U)
|
|
#define FURI_HAL_FLASH_SR_ERRORS \
|
|
(FLASH_SR_OPERR | FLASH_SR_PROGERR | FLASH_SR_WRPERR | FLASH_SR_PGAERR | FLASH_SR_SIZERR | \
|
|
FLASH_SR_PGSERR | FLASH_SR_MISERR | FLASH_SR_FASTERR | FLASH_SR_RDERR | FLASH_SR_OPTVERR)
|
|
|
|
#define FURI_HAL_FLASH_OPT_KEY1 (0x08192A3BU)
|
|
#define FURI_HAL_FLASH_OPT_KEY2 (0x4C5D6E7FU)
|
|
#define FURI_HAL_FLASH_OB_TOTAL_WORDS (0x80 / (sizeof(uint32_t) * 2))
|
|
|
|
/* STM32CubeWB/Projects/P-NUCLEO-WB55.Nucleo/Applications/BLE/BLE_RfWithFlash/Core/Src/flash_driver.c
|
|
* ProcessSingleFlashOperation, quote:
|
|
> In most BLE application, the flash should not be blocked by the CPU2 longer than FLASH_TIMEOUT_VALUE (1000ms)
|
|
> However, it could be that for some marginal application, this time is longer.
|
|
> ... there is no other way than waiting the operation to be completed.
|
|
> If for any reason this test is never passed, this means there is a failure in the system and there is no other
|
|
> way to recover than applying a device reset.
|
|
*/
|
|
#define FURI_HAL_FLASH_C2_LOCK_TIMEOUT_MS (3000U) /* 3 seconds */
|
|
|
|
#define IS_ADDR_ALIGNED_64BITS(__VALUE__) (((__VALUE__) & 0x7U) == (0x00UL))
|
|
#define IS_FLASH_PROGRAM_ADDRESS(__VALUE__) \
|
|
(((__VALUE__) >= FLASH_BASE) && ((__VALUE__) <= (FLASH_BASE + FLASH_SIZE - 8UL)) && \
|
|
(((__VALUE__) % 8UL) == 0UL))
|
|
|
|
/* Free flash space borders, exported by linker */
|
|
extern const void __free_flash_start__;
|
|
|
|
size_t furi_hal_flash_get_base(void) {
|
|
return FLASH_BASE;
|
|
}
|
|
|
|
size_t furi_hal_flash_get_read_block_size(void) {
|
|
return FURI_HAL_FLASH_READ_BLOCK;
|
|
}
|
|
|
|
size_t furi_hal_flash_get_write_block_size(void) {
|
|
return FURI_HAL_FLASH_WRITE_BLOCK;
|
|
}
|
|
|
|
size_t furi_hal_flash_get_page_size(void) {
|
|
return FURI_HAL_FLASH_PAGE_SIZE;
|
|
}
|
|
|
|
size_t furi_hal_flash_get_cycles_count(void) {
|
|
return FURI_HAL_FLASH_CYCLES_COUNT;
|
|
}
|
|
|
|
const void* furi_hal_flash_get_free_start_address(void) {
|
|
return &__free_flash_start__;
|
|
}
|
|
|
|
const void* furi_hal_flash_get_free_end_address(void) {
|
|
uint32_t sfr_reg_val = READ_REG(FLASH->SFR);
|
|
uint32_t sfsa = (READ_BIT(sfr_reg_val, FLASH_SFR_SFSA) >> FLASH_SFR_SFSA_Pos);
|
|
return (const void*)((sfsa * FURI_HAL_FLASH_PAGE_SIZE) + FLASH_BASE);
|
|
}
|
|
|
|
size_t furi_hal_flash_get_free_page_start_address(void) {
|
|
size_t start = (size_t)furi_hal_flash_get_free_start_address();
|
|
size_t page_start = start - start % FURI_HAL_FLASH_PAGE_SIZE;
|
|
if(page_start != start) {
|
|
page_start += FURI_HAL_FLASH_PAGE_SIZE;
|
|
}
|
|
return page_start;
|
|
}
|
|
|
|
size_t furi_hal_flash_get_free_page_count(void) {
|
|
size_t end = (size_t)furi_hal_flash_get_free_end_address();
|
|
size_t page_start = (size_t)furi_hal_flash_get_free_page_start_address();
|
|
return (end - page_start) / FURI_HAL_FLASH_PAGE_SIZE;
|
|
}
|
|
|
|
void furi_hal_flash_init(void) {
|
|
/* Errata 2.2.9, Flash OPTVERR flag is always set after system reset */
|
|
// WRITE_REG(FLASH->SR, FLASH_SR_OPTVERR);
|
|
/* Actually, reset all error flags on start */
|
|
if(READ_BIT(FLASH->SR, FURI_HAL_FLASH_SR_ERRORS)) {
|
|
FURI_LOG_W(TAG, "FLASH->SR 0x%08lX(Known ERRATA)", FLASH->SR);
|
|
WRITE_REG(FLASH->SR, FURI_HAL_FLASH_SR_ERRORS);
|
|
}
|
|
}
|
|
|
|
static void furi_hal_flash_unlock(void) {
|
|
/* verify Flash is locked */
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_LOCK) != 0U);
|
|
|
|
/* Authorize the FLASH Registers access */
|
|
WRITE_REG(FLASH->KEYR, FURI_HAL_FLASH_KEY1);
|
|
__ISB();
|
|
WRITE_REG(FLASH->KEYR, FURI_HAL_FLASH_KEY2);
|
|
|
|
/* verify Flash is unlocked */
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_LOCK) == 0U);
|
|
}
|
|
|
|
static void furi_hal_flash_lock(void) {
|
|
/* verify Flash is unlocked */
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_LOCK) == 0U);
|
|
|
|
/* Set the LOCK Bit to lock the FLASH Registers access */
|
|
/* @Note The lock and unlock procedure is done only using CR registers even from CPU2 */
|
|
SET_BIT(FLASH->CR, FLASH_CR_LOCK);
|
|
|
|
/* verify Flash is locked */
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_LOCK) != 0U);
|
|
}
|
|
|
|
static void furi_hal_flash_begin_with_core2(bool erase_flag) {
|
|
furi_hal_power_insomnia_enter();
|
|
/* Take flash controller ownership */
|
|
while(LL_HSEM_1StepLock(HSEM, CFG_HW_FLASH_SEMID) != 0) {
|
|
furi_thread_yield();
|
|
}
|
|
|
|
/* Unlock flash operation */
|
|
furi_hal_flash_unlock();
|
|
|
|
/* Erase activity notification */
|
|
if(erase_flag) SHCI_C2_FLASH_EraseActivity(ERASE_ACTIVITY_ON);
|
|
|
|
/* 64mHz 5us core2 flag protection */
|
|
for(volatile uint32_t i = 0; i < 35; i++)
|
|
;
|
|
|
|
FuriHalCortexTimer timer = furi_hal_cortex_timer_get(FURI_HAL_FLASH_C2_LOCK_TIMEOUT_MS * 1000);
|
|
while(true) {
|
|
/* Wait till flash controller become usable */
|
|
while(LL_FLASH_IsActiveFlag_OperationSuspended()) {
|
|
furi_check(!furi_hal_cortex_timer_is_expired(timer));
|
|
furi_thread_yield();
|
|
};
|
|
|
|
/* Just a little more love */
|
|
taskENTER_CRITICAL();
|
|
|
|
/* Actually we already have mutex for it, but specification is specification */
|
|
if(LL_HSEM_IsSemaphoreLocked(HSEM, CFG_HW_BLOCK_FLASH_REQ_BY_CPU1_SEMID)) {
|
|
taskEXIT_CRITICAL();
|
|
furi_check(!furi_hal_cortex_timer_is_expired(timer));
|
|
furi_thread_yield();
|
|
continue;
|
|
}
|
|
|
|
/* Take sempahopre and prevent core2 from anything funky */
|
|
if(LL_HSEM_1StepLock(HSEM, CFG_HW_BLOCK_FLASH_REQ_BY_CPU2_SEMID) != 0) {
|
|
taskEXIT_CRITICAL();
|
|
furi_check(!furi_hal_cortex_timer_is_expired(timer));
|
|
furi_thread_yield();
|
|
continue;
|
|
}
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void furi_hal_flash_begin(bool erase_flag) {
|
|
/* Acquire dangerous ops mutex */
|
|
furi_hal_bt_lock_core2();
|
|
|
|
/* If Core2 is running use IPC locking */
|
|
if(furi_hal_bt_is_alive()) {
|
|
furi_hal_flash_begin_with_core2(erase_flag);
|
|
} else {
|
|
furi_hal_flash_unlock();
|
|
}
|
|
}
|
|
|
|
static void furi_hal_flash_end_with_core2(bool erase_flag) {
|
|
/* Funky ops are ok at this point */
|
|
LL_HSEM_ReleaseLock(HSEM, CFG_HW_BLOCK_FLASH_REQ_BY_CPU2_SEMID, 0);
|
|
|
|
/* Task switching is ok */
|
|
taskEXIT_CRITICAL();
|
|
|
|
/* Doesn't make much sense, does it? */
|
|
while(READ_BIT(FLASH->SR, FLASH_SR_BSY)) {
|
|
furi_thread_yield();
|
|
}
|
|
|
|
/* Erase activity over, core2 can continue */
|
|
if(erase_flag) SHCI_C2_FLASH_EraseActivity(ERASE_ACTIVITY_OFF);
|
|
|
|
/* Lock flash controller */
|
|
furi_hal_flash_lock();
|
|
|
|
/* Release flash controller ownership */
|
|
LL_HSEM_ReleaseLock(HSEM, CFG_HW_FLASH_SEMID, 0);
|
|
furi_hal_power_insomnia_exit();
|
|
}
|
|
|
|
static void furi_hal_flash_end(bool erase_flag) {
|
|
/* If Core2 is running - use IPC locking */
|
|
if(furi_hal_bt_is_alive()) {
|
|
furi_hal_flash_end_with_core2(erase_flag);
|
|
} else {
|
|
furi_hal_flash_lock();
|
|
}
|
|
|
|
/* Release dangerous ops mutex */
|
|
furi_hal_bt_unlock_core2();
|
|
}
|
|
|
|
static void furi_hal_flush_cache(void) {
|
|
/* Flush instruction cache */
|
|
if(READ_BIT(FLASH->ACR, FLASH_ACR_ICEN) == FLASH_ACR_ICEN) {
|
|
/* Disable instruction cache */
|
|
LL_FLASH_DisableInstCache();
|
|
/* Reset instruction cache */
|
|
LL_FLASH_EnableInstCacheReset();
|
|
LL_FLASH_DisableInstCacheReset();
|
|
/* Enable instruction cache */
|
|
LL_FLASH_EnableInstCache();
|
|
}
|
|
|
|
/* Flush data cache */
|
|
if(READ_BIT(FLASH->ACR, FLASH_ACR_DCEN) == FLASH_ACR_DCEN) {
|
|
/* Disable data cache */
|
|
LL_FLASH_DisableDataCache();
|
|
/* Reset data cache */
|
|
LL_FLASH_EnableDataCacheReset();
|
|
LL_FLASH_DisableDataCacheReset();
|
|
/* Enable data cache */
|
|
LL_FLASH_EnableDataCache();
|
|
}
|
|
}
|
|
|
|
bool furi_hal_flash_wait_last_operation(uint32_t timeout) {
|
|
uint32_t error = 0;
|
|
|
|
/* Wait for the FLASH operation to complete by polling on BUSY flag to be reset.
|
|
Even if the FLASH operation fails, the BUSY flag will be reset and an error
|
|
flag will be set */
|
|
FuriHalCortexTimer timer = furi_hal_cortex_timer_get(timeout * 1000);
|
|
while(READ_BIT(FLASH->SR, FLASH_SR_BSY)) {
|
|
if(furi_hal_cortex_timer_is_expired(timer)) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/* Check FLASH operation error flags */
|
|
error = FLASH->SR;
|
|
|
|
/* Check FLASH End of Operation flag */
|
|
if((error & FLASH_SR_EOP) != 0U) {
|
|
/* Clear FLASH End of Operation pending bit */
|
|
CLEAR_BIT(FLASH->SR, FLASH_SR_EOP);
|
|
}
|
|
|
|
/* Now update error variable to only error value */
|
|
error &= FURI_HAL_FLASH_SR_ERRORS;
|
|
|
|
furi_check(error == 0);
|
|
|
|
/* clear error flags */
|
|
CLEAR_BIT(FLASH->SR, error);
|
|
|
|
/* Wait for control register to be written */
|
|
timer = furi_hal_cortex_timer_get(timeout * 1000);
|
|
while(READ_BIT(FLASH->SR, FLASH_SR_CFGBSY)) {
|
|
if(furi_hal_cortex_timer_is_expired(timer)) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void furi_hal_flash_erase(uint8_t page) {
|
|
furi_hal_flash_begin(true);
|
|
|
|
/* Ensure that controller state is valid */
|
|
furi_check(FLASH->SR == 0);
|
|
|
|
/* Verify that next operation can be proceed */
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
|
|
/* Select page and start operation */
|
|
MODIFY_REG(
|
|
FLASH->CR, FLASH_CR_PNB, ((page << FLASH_CR_PNB_Pos) | FLASH_CR_PER | FLASH_CR_STRT));
|
|
|
|
/* Wait for last operation to be completed */
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
|
|
/* If operation is completed or interrupted, disable the Page Erase Bit */
|
|
CLEAR_BIT(FLASH->CR, (FLASH_CR_PER | FLASH_CR_PNB));
|
|
|
|
/* Flush the caches to be sure of the data consistency */
|
|
furi_hal_flush_cache();
|
|
|
|
furi_hal_flash_end(true);
|
|
}
|
|
|
|
static inline void furi_hal_flash_write_dword_internal_nowait(size_t address, uint64_t* data) {
|
|
/* Program first word */
|
|
*(uint32_t*)address = (uint32_t)*data;
|
|
|
|
/* Barrier to ensure programming is performed in 2 steps, in right order
|
|
(independently of compiler optimization behavior) */
|
|
__ISB();
|
|
|
|
/* Program second word */
|
|
*(uint32_t*)(address + 4U) = (uint32_t)(*data >> 32U);
|
|
}
|
|
|
|
static inline void furi_hal_flash_write_dword_internal(size_t address, uint64_t* data) {
|
|
furi_hal_flash_write_dword_internal_nowait(address, data);
|
|
|
|
/* Wait for last operation to be completed */
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
}
|
|
|
|
void furi_hal_flash_write_dword(size_t address, uint64_t data) {
|
|
furi_hal_flash_begin(false);
|
|
|
|
/* Ensure that controller state is valid */
|
|
furi_check(FLASH->SR == 0);
|
|
|
|
/* Check the parameters */
|
|
furi_check(IS_ADDR_ALIGNED_64BITS(address));
|
|
furi_check(IS_FLASH_PROGRAM_ADDRESS(address));
|
|
|
|
/* Set PG bit */
|
|
SET_BIT(FLASH->CR, FLASH_CR_PG);
|
|
|
|
/* Do the thing */
|
|
furi_hal_flash_write_dword_internal(address, &data);
|
|
|
|
/* If the program operation is completed, disable the PG or FSTPG Bit */
|
|
CLEAR_BIT(FLASH->CR, FLASH_CR_PG);
|
|
|
|
furi_hal_flash_end(false);
|
|
|
|
/* Wait for last operation to be completed */
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
}
|
|
|
|
static size_t furi_hal_flash_get_page_address(uint8_t page) {
|
|
return furi_hal_flash_get_base() + page * FURI_HAL_FLASH_PAGE_SIZE;
|
|
}
|
|
|
|
void furi_hal_flash_program_page(const uint8_t page, const uint8_t* data, uint16_t _length) {
|
|
uint16_t length = _length;
|
|
furi_check(length <= FURI_HAL_FLASH_PAGE_SIZE);
|
|
|
|
furi_hal_flash_erase(page);
|
|
|
|
furi_hal_flash_begin(false);
|
|
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
|
|
/* Ensure that controller state is valid */
|
|
furi_check(FLASH->SR == 0);
|
|
|
|
size_t page_start_address = furi_hal_flash_get_page_address(page);
|
|
|
|
size_t length_written = 0;
|
|
|
|
const uint16_t FAST_PROG_BLOCK_SIZE = 512;
|
|
const uint8_t DWORD_PROG_BLOCK_SIZE = 8;
|
|
|
|
/* Write as much data as we can in fast mode */
|
|
if(length >= FAST_PROG_BLOCK_SIZE) {
|
|
taskENTER_CRITICAL();
|
|
/* Enable fast flash programming mode */
|
|
SET_BIT(FLASH->CR, FLASH_CR_FSTPG);
|
|
|
|
while(length_written < (length / FAST_PROG_BLOCK_SIZE * FAST_PROG_BLOCK_SIZE)) {
|
|
/* No context switch in the middle of the operation */
|
|
furi_hal_flash_write_dword_internal_nowait(
|
|
page_start_address + length_written, (uint64_t*)(data + length_written));
|
|
length_written += DWORD_PROG_BLOCK_SIZE;
|
|
|
|
if((length_written % FAST_PROG_BLOCK_SIZE) == 0) {
|
|
/* Wait for block operation to be completed */
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
}
|
|
}
|
|
CLEAR_BIT(FLASH->CR, FLASH_CR_FSTPG);
|
|
taskEXIT_CRITICAL();
|
|
}
|
|
|
|
/* Enable regular (dword) programming mode */
|
|
SET_BIT(FLASH->CR, FLASH_CR_PG);
|
|
if((length % FAST_PROG_BLOCK_SIZE) != 0) {
|
|
/* Write tail in regular, dword mode */
|
|
while(length_written < (length / DWORD_PROG_BLOCK_SIZE * DWORD_PROG_BLOCK_SIZE)) {
|
|
furi_hal_flash_write_dword_internal(
|
|
page_start_address + length_written, (uint64_t*)&data[length_written]);
|
|
length_written += DWORD_PROG_BLOCK_SIZE;
|
|
}
|
|
}
|
|
|
|
if((length % DWORD_PROG_BLOCK_SIZE) != 0) {
|
|
/* there are more bytes, not fitting into dwords */
|
|
uint64_t tail_data = 0;
|
|
for(int32_t tail_i = 0; tail_i < (length % DWORD_PROG_BLOCK_SIZE); ++tail_i) {
|
|
tail_data |= (((uint64_t)data[length_written + tail_i]) << (tail_i * 8));
|
|
}
|
|
|
|
furi_hal_flash_write_dword_internal(page_start_address + length_written, &tail_data);
|
|
}
|
|
/* Disable the PG Bit */
|
|
CLEAR_BIT(FLASH->CR, FLASH_CR_PG);
|
|
|
|
furi_hal_flash_end(false);
|
|
}
|
|
|
|
int16_t furi_hal_flash_get_page_number(size_t address) {
|
|
const size_t flash_base = furi_hal_flash_get_base();
|
|
if((address < flash_base) ||
|
|
(address > flash_base + FURI_HAL_FLASH_TOTAL_PAGES * FURI_HAL_FLASH_PAGE_SIZE)) {
|
|
return -1;
|
|
}
|
|
|
|
return (address - flash_base) / FURI_HAL_FLASH_PAGE_SIZE;
|
|
}
|
|
|
|
uint32_t furi_hal_flash_ob_get_word(size_t word_idx, bool complementary) {
|
|
furi_check(word_idx <= FURI_HAL_FLASH_OB_TOTAL_WORDS);
|
|
const uint32_t* ob_data = (const uint32_t*)(OPTION_BYTE_BASE);
|
|
size_t raw_word_idx = word_idx * 2;
|
|
if(complementary) {
|
|
raw_word_idx += 1;
|
|
}
|
|
return ob_data[raw_word_idx];
|
|
}
|
|
|
|
void furi_hal_flash_ob_unlock(void) {
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_OPTLOCK) != 0U);
|
|
furi_hal_flash_begin(true);
|
|
WRITE_REG(FLASH->OPTKEYR, FURI_HAL_FLASH_OPT_KEY1);
|
|
__ISB();
|
|
WRITE_REG(FLASH->OPTKEYR, FURI_HAL_FLASH_OPT_KEY2);
|
|
/* verify OB area is unlocked */
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_OPTLOCK) == 0U);
|
|
}
|
|
|
|
void furi_hal_flash_ob_lock(void) {
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_OPTLOCK) == 0U);
|
|
SET_BIT(FLASH->CR, FLASH_CR_OPTLOCK);
|
|
furi_hal_flash_end(true);
|
|
furi_check(READ_BIT(FLASH->CR, FLASH_CR_OPTLOCK) != 0U);
|
|
}
|
|
|
|
typedef enum {
|
|
FuriHalFlashObInvalid,
|
|
FuriHalFlashObRegisterUserRead,
|
|
FuriHalFlashObRegisterPCROP1AStart,
|
|
FuriHalFlashObRegisterPCROP1AEnd,
|
|
FuriHalFlashObRegisterWRPA,
|
|
FuriHalFlashObRegisterWRPB,
|
|
FuriHalFlashObRegisterPCROP1BStart,
|
|
FuriHalFlashObRegisterPCROP1BEnd,
|
|
FuriHalFlashObRegisterIPCCMail,
|
|
FuriHalFlashObRegisterSecureFlash,
|
|
FuriHalFlashObRegisterC2Opts,
|
|
} FuriHalFlashObRegister;
|
|
|
|
typedef struct {
|
|
FuriHalFlashObRegister ob_reg;
|
|
uint32_t* ob_register_address;
|
|
} FuriHalFlashObMapping;
|
|
|
|
#define OB_REG_DEF(INDEX, REG) \
|
|
{ .ob_reg = INDEX, .ob_register_address = (uint32_t*)(REG) }
|
|
|
|
static const FuriHalFlashObMapping furi_hal_flash_ob_reg_map[FURI_HAL_FLASH_OB_TOTAL_WORDS] = {
|
|
OB_REG_DEF(FuriHalFlashObRegisterUserRead, (&FLASH->OPTR)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterPCROP1AStart, (&FLASH->PCROP1ASR)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterPCROP1AEnd, (&FLASH->PCROP1AER)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterWRPA, (&FLASH->WRP1AR)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterWRPB, (&FLASH->WRP1BR)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterPCROP1BStart, (&FLASH->PCROP1BSR)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterPCROP1BEnd, (&FLASH->PCROP1BER)),
|
|
|
|
OB_REG_DEF(FuriHalFlashObInvalid, (NULL)),
|
|
OB_REG_DEF(FuriHalFlashObInvalid, (NULL)),
|
|
OB_REG_DEF(FuriHalFlashObInvalid, (NULL)),
|
|
OB_REG_DEF(FuriHalFlashObInvalid, (NULL)),
|
|
OB_REG_DEF(FuriHalFlashObInvalid, (NULL)),
|
|
OB_REG_DEF(FuriHalFlashObInvalid, (NULL)),
|
|
|
|
OB_REG_DEF(FuriHalFlashObRegisterIPCCMail, (&FLASH->IPCCBR)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterSecureFlash, (NULL)),
|
|
OB_REG_DEF(FuriHalFlashObRegisterC2Opts, (NULL)),
|
|
};
|
|
#undef OB_REG_DEF
|
|
|
|
void furi_hal_flash_ob_apply(void) {
|
|
furi_hal_flash_ob_unlock();
|
|
/* OBL_LAUNCH: When set to 1, this bit forces the option byte reloading.
|
|
* It cannot be written if OPTLOCK is set */
|
|
SET_BIT(FLASH->CR, FLASH_CR_OBL_LAUNCH);
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
furi_hal_flash_ob_lock();
|
|
}
|
|
|
|
bool furi_hal_flash_ob_set_word(size_t word_idx, const uint32_t value) {
|
|
furi_check(word_idx < FURI_HAL_FLASH_OB_TOTAL_WORDS);
|
|
|
|
const FuriHalFlashObMapping* reg_def = &furi_hal_flash_ob_reg_map[word_idx];
|
|
if(reg_def->ob_register_address == NULL) {
|
|
FURI_LOG_E(TAG, "Attempt to set RO OB word %d", word_idx);
|
|
return false;
|
|
}
|
|
|
|
FURI_LOG_W(
|
|
TAG,
|
|
"Setting OB reg %d for word %d (addr 0x%08lX) to 0x%08lX",
|
|
reg_def->ob_reg,
|
|
word_idx,
|
|
(uint32_t)reg_def->ob_register_address,
|
|
value);
|
|
|
|
/* 1. Clear OPTLOCK option lock bit with the clearing sequence */
|
|
furi_hal_flash_ob_unlock();
|
|
|
|
/* 2. Write the desired options value in the options registers */
|
|
*reg_def->ob_register_address = value;
|
|
|
|
/* 3. Check that no Flash memory operation is on going by checking the BSY && PESD */
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
while(LL_FLASH_IsActiveFlag_OperationSuspended()) {
|
|
furi_thread_yield();
|
|
};
|
|
|
|
/* 4. Set the Options start bit OPTSTRT */
|
|
SET_BIT(FLASH->CR, FLASH_CR_OPTSTRT);
|
|
|
|
/* 5. Wait for the BSY bit to be cleared. */
|
|
furi_check(furi_hal_flash_wait_last_operation(FURI_HAL_FLASH_TIMEOUT));
|
|
furi_hal_flash_ob_lock();
|
|
return true;
|
|
}
|
|
|
|
const FuriHalFlashRawOptionByteData* furi_hal_flash_ob_get_raw_ptr(void) {
|
|
return (const FuriHalFlashRawOptionByteData*)OPTION_BYTE_BASE;
|
|
}
|