1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
use embassy_stm32::ipcc::{IpccRxChannel, IpccTxChannel};
use crate::cmd::CmdPacket;
use crate::consts::TlPacketType;
use crate::evt::EvtBox;
#[cfg(feature = "wb55_ble")]
use crate::shci::ShciBleInitCmdParam;
use crate::shci::{SchiCommandStatus, ShciOpcode};
use crate::sub::mm;
use crate::tables::{SysTable, WirelessFwInfoTable};
use crate::unsafe_linked_list::LinkedListNode;
use crate::wb55::{SYS_CMD_BUF, SYSTEM_EVT_QUEUE, TL_DEVICE_INFO_TABLE, TL_SYS_TABLE};
/// A guard that, once constructed, allows for sys commands to be sent to CPU2.
pub struct Sys<'a> {
ipcc_system_cmd_rsp_channel: IpccTxChannel<'a>,
ipcc_system_event_channel: IpccRxChannel<'a>,
}
impl<'a> Sys<'a> {
/// TL_Sys_Init
pub(crate) fn new(
ipcc_system_cmd_rsp_channel: IpccTxChannel<'a>,
ipcc_system_event_channel: IpccRxChannel<'a>,
) -> Self {
unsafe {
LinkedListNode::init_head(SYSTEM_EVT_QUEUE.as_mut_ptr());
TL_SYS_TABLE.as_mut_ptr().write_volatile(SysTable {
pcmd_buffer: SYS_CMD_BUF.as_mut_ptr(),
sys_queue: SYSTEM_EVT_QUEUE.as_ptr(),
});
}
Self {
ipcc_system_cmd_rsp_channel,
ipcc_system_event_channel,
}
}
/// Returns CPU2 wireless firmware information (if present).
pub fn wireless_fw_info(&self) -> Option<WirelessFwInfoTable> {
let info = unsafe { TL_DEVICE_INFO_TABLE.as_mut_ptr().read_volatile().wireless_fw_info_table };
// Zero version indicates that CPU2 wasn't active and didn't fill the information table
if info.version != 0 { Some(info) } else { None }
}
pub async fn write(&mut self, opcode: ShciOpcode, payload: &[u8]) {
self.ipcc_system_cmd_rsp_channel
.send(|| unsafe {
CmdPacket::write_into(SYS_CMD_BUF.as_mut_ptr(), TlPacketType::SysCmd, opcode as u16, payload);
})
.await;
}
/// `HW_IPCC_SYS_CmdEvtNot`
pub async fn write_and_get_response(
&mut self,
opcode: ShciOpcode,
payload: &[u8],
) -> Result<SchiCommandStatus, ()> {
self.write(opcode, payload).await;
self.ipcc_system_cmd_rsp_channel.flush().await;
unsafe { SchiCommandStatus::from_packet(SYS_CMD_BUF.as_ptr()) }
}
#[cfg(feature = "wb55_mac")]
pub async fn shci_c2_mac_802_15_4_init(&mut self) -> Result<SchiCommandStatus, ()> {
self.write_and_get_response(ShciOpcode::Mac802_15_4Init, &[]).await
}
/// Send a request to CPU2 to initialise the BLE stack.
///
/// This must be called before any BLE commands are sent via the BLE channel (according to
/// AN5289, Figures 65 and 66). It should only be called after CPU2 sends a system event, via
/// `HW_IPCC_SYS_EvtNot`, aka `IoBusCallBackUserEvt` (as detailed in Figure 65), aka
/// [crate::sub::ble::hci::host::uart::UartHci::read].
#[cfg(feature = "wb55_ble")]
pub async fn shci_c2_ble_init(&mut self, param: ShciBleInitCmdParam) -> Result<SchiCommandStatus, ()> {
self.write_and_get_response(ShciOpcode::BleInit, param.payload()).await
}
/// `HW_IPCC_SYS_EvtNot`
///
/// This method takes the place of the `HW_IPCC_SYS_EvtNot`/`SysUserEvtRx`/`APPE_SysUserEvtRx`,
/// as the embassy implementation avoids the need to call C public bindings, and instead
/// handles the event channels directly.
pub async fn read(&mut self) -> EvtBox<mm::MemoryManager<'_>> {
self.ipcc_system_event_channel
.receive(|| unsafe {
if let Some(node_ptr) =
critical_section::with(|cs| LinkedListNode::remove_head(cs, SYSTEM_EVT_QUEUE.as_mut_ptr()))
{
Some(EvtBox::new(node_ptr.cast()))
} else {
None
}
})
.await
}
}
|