1    /*
     2     * Copyright (c) 2015-2019, Texas Instruments Incorporated
     3     * All rights reserved.
     4     *
     5     * Redistribution and use in source and binary forms, with or without
     6     * modification, are permitted provided that the following conditions
     7     * are met:
     8     *
     9     * *  Redistributions of source code must retain the above copyright
    10     *    notice, this list of conditions and the following disclaimer.
    11     *
    12     * *  Redistributions in binary form must reproduce the above copyright
    13     *    notice, this list of conditions and the following disclaimer in the
    14     *    documentation and/or other materials provided with the distribution.
    15     *
    16     * *  Neither the name of Texas Instruments Incorporated nor the names of
    17     *    its contributors may be used to endorse or promote products derived
    18     *    from this software without specific prior written permission.
    19     *
    20     * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
    21     * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    22     * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    23     * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
    24     * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
    25     * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
    26     * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
    27     * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    28     * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
    29     * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
    30     * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    31     */
    32    /*
    33     *  ======== BIOS.xdc ========
    34     */
    35    
    36    package ti.sysbios;
    37    
    38    import xdc.rov.ViewInfo;
    39    
    40    import xdc.runtime.Error;
    41    import xdc.runtime.IHeap;
    42    import xdc.runtime.Types;
    43    
    44    /*! ======== BIOS ========
    45     *  SYS/BIOS Top-Level Manager
    46     *
    47     *  This module is responsible for setting up global parameters
    48     *  pertaining to SYS/BIOS and for performing the SYS/BIOS startup
    49     *  sequence.
    50     *
    51     *  SYS/BIOS configures the
    52     *  {@link xdc.runtime.Memory#defaultHeapInstance Memory.defaultHeapInstance}
    53     *  using a {@link ti.sysbios.heaps.HeapMem HeapMem} instance of size
    54     *  {@link #heapSize}.
    55     *
    56     *  The SYS/BIOS startup sequence is logically divided into two phases: those
    57     *  operations that occur prior to the application's "main()" function being
    58     *  called, and those operations that are performed after the application's
    59     *  "main()" function is invoked.
    60     *
    61     *  The "before main()" startup sequence is governed completely by the RTSC
    62     *  runtime package's {@link xdc.runtime.Startup Startup} module.
    63     *
    64     *  The "after main()" startup sequence is governed by SYS/BIOS and is
    65     *  initiated by an explicit call to the {@link #start BIOS_start()} function
    66     *  at the end of the application's main() function.
    67     *
    68     *  Control points are provided at various places in each of the two startup
    69     *  sequences for user startup operations to be inserted.
    70     *
    71     *  The RTSC runtime startup sequence is as follows:
    72     *
    73     *  @p(nlist)
    74     *  - Immediately after CPU reset, perform target-specific CPU
    75     *  initialization (beginning at c_int00).
    76     *  - Prior to cinit(), run the user-supplied "reset functions"
    77     *  (see {@link xdc.runtime.Reset#fxns Reset.fxns}).
    78     *  - Run cinit() to initialize C runtime environment.
    79     *  - Run the user-supplied "first functions"
    80     *  (see {@link xdc.runtime.Startup#firstFxns Startup.firstFxns}).
    81     *  - Run all the module initialization functions.
    82     *  - Run pinit().
    83     *  - Run the user-supplied "last functions"
    84     *  (see {@link xdc.runtime.Startup#lastFxns Startup.lastFxns}).
    85     *  - Run main().
    86     *  @p
    87     *
    88     *  The SYS/BIOS startup sequence begins at the end of main() when
    89     *  BIOS_start() is called:
    90     *
    91     *  @p(nlist)
    92     *  - Run the user-supplied "startup functions"
    93     *  (see {@link #startupFxns BIOS.startupFxns}).
    94     *  - Enable Hardware Interrupts.
    95     *  - Enable Software Interrupts. If the system supports Software Interrupts
    96     *  (Swis) (see {@link #swiEnabled BIOS.swiEnabled}), then the SYS/BIOS
    97     *  startup sequence enables Swis at this point.
    98     *  - Timer Startup. If the system supports Timers, then at this point all
    99     *  statically configured timers are initialized per their
   100     *  user-configuration.
   101     *  If a timer was configured to start "automatically", it is started here.
   102     *  - Task Startup. If the system supports Tasks
   103     *  (see {@link #taskEnabled BIOS.taskEnabled}),
   104     *  then task scheduling begins here. If there are no statically or
   105     *  dynamically created Tasks in the system, then execution proceeds
   106     *  directly to the Idle loop.
   107     *  @p
   108     *
   109     *  @a(Note)
   110     *  Local variables defined in main() no longer exist once BIOS_start() is
   111     *  called. The RAM where main's local variables reside is reassigned for
   112     *  use as the interrupt stack during the execution of BIOS_start().
   113     *
   114     *  Below is a configuration script excerpt that installs a user-supplied
   115     *  startup function at every possible control point in the RTSC and
   116     *  SYS/BIOS startup sequence:
   117     *
   118     *  @p(code)
   119     *  // get handle to xdc Startup module
   120     *  var Startup = xdc.useModule('xdc.runtime.Startup');
   121     *
   122     *  // install "reset function"
   123     *  Startup.resetFxn = '&myReset';
   124     *
   125     *  // install a "first function"
   126     *  var len = Startup.firstFxns.length
   127     *  Startup.firstFxns.length++;
   128     *  Startup.firstFxns[len] = '&myFirst';
   129     *
   130     *  // install a "last function"
   131     *  var len = Startup.lastFxns.length
   132     *  Startup.lastFxns.length++;
   133     *  Startup.lastFxns[len] = '&myLast';
   134     *
   135     *  // get handle to SYS/BIOS module
   136     *  var BIOS = xdc.useModule('ti.sysbios.BIOS');
   137     *
   138     *  // install a SYS/BIOS startup function
   139     *  BIOS.addUserStartupFunction('&myBiosStartup');
   140     *  @p
   141     *
   142     *  @p(html)
   143     *  <h3> Calling Context </h3>
   144     *  <table border="1" cellpadding="3">
   145     *    <colgroup span="1"></colgroup> <colgroup span="5" align="center">
   146     *    </colgroup>
   147     *
   148     *    <tr><th> Function                 </th><th>  Hwi   </th><th>  Swi   </th>
   149     *    <th>  Task  </th><th>  Main  </th><th>  Startup  </th></tr>
   150     *    <!--                                        -->
   151     *    <tr><td> {@link #getCpuFreq}      </td><td>   Y    </td><td>   Y    </td>
   152     *    <td>   Y    </td><td>   Y    </td><td>   Y    </td></tr>
   153     *    <tr><td> {@link #getThreadType}   </td><td>   Y    </td><td>   Y    </td>
   154     *    <td>   Y    </td><td>   Y    </td><td>   N    </td></tr>
   155     *    <tr><td> {@link #setCpuFreq}      </td><td>   Y    </td><td>   Y    </td>
   156     *    <td>   Y    </td><td>   Y    </td><td>   Y    </td></tr>
   157     *    <tr><td> {@link #start}      </td><td>   N    </td><td>   N    </td>
   158     *    <td>   N    </td><td>   Y    </td><td>   N    </td></tr>
   159     *    <tr><td colspan="6"> Definitions: <br />
   160     *       <ul>
   161     *         <li> <b>Hwi</b>: API is callable from a Hwi thread. </li>
   162     *         <li> <b>Swi</b>: API is callable from a Swi thread. </li>
   163     *         <li> <b>Task</b>: API is callable from a Task thread. </li>
   164     *         <li> <b>Main</b>: API is callable during any of these phases: </li>
   165     *           <ul>
   166     *             <li> In your module startup after this module is started
   167     *                  (e.g. BIOS_Module_startupDone() returns TRUE). </li>
   168     *             <li> During xdc.runtime.Startup.lastFxns. </li>
   169     *             <li> During main().</li>
   170     *             <li> During BIOS.startupFxns.</li>
   171     *           </ul>
   172     *         <li> <b>Startup</b>: API is callable during any of these phases:</li>
   173     *           <ul>
   174     *             <li> During xdc.runtime.Startup.firstFxns.</li>
   175     *             <li> In your module startup before this module is started
   176     *                  (e.g. BIOS_Module_startupDone() returns FALSE).</li>
   177     *           </ul>
   178     *       </ul>
   179     *    </td></tr>
   180     *
   181     *  </table>
   182     *  @p
   183     */
   184    
   185    @CustomHeader   /* to check for codegen compatibility */
   186    @Template("./BIOS.xdt")
   187    
   188    @DirectCall
   189    module BIOS
   190    {
   191        /*!
   192         *  ======== ThreadType ========
   193         *  Current thread type definitions
   194         *
   195         *  These values are returned by {@link #getThreadType BIOS_getThreadType}.
   196         *
   197         *  @see #getThreadType
   198         */
   199        enum ThreadType {
   200            ThreadType_Hwi,         /*! Current thread is a Hwi */
   201            ThreadType_Swi,         /*! Current thread is a Swi */
   202            ThreadType_Task,        /*! Current thread is a Task */
   203            ThreadType_Main         /*! Current thread is Boot/Main */
   204        };
   205    
   206        /*!
   207         *  ======== RtsLockType ========
   208         *  Type of Gate to use in the TI RTS library
   209         *
   210         *  @field(NoLocking) no gate is added to the RTS library.  In this case,
   211         *  the application needs to be careful to always serialize access to the
   212         *  inherently  non-reentrant ANSI C functions (such as `malloc()`,
   213         *  `printf()`, etc.).
   214         *
   215         *  @field(GateHwi) Interrupts are disabled and restored to maintain
   216         *  re-entrancy.  This is a very efficient lock but will also result in
   217         *  unbounded interrupt latency times.  If real-time response to interrupts
   218         *  is important, you should not use this gate to lock the RTS library.
   219         *
   220         *  @field(GateSwi) Swis are disabled and restored to maintain
   221         *  re-entrancy.
   222         *
   223         *  @field(GateMutex) A single mutex is used to maintain re-entrancy.
   224         *
   225         *  @field(GateMutexPri) A single priority inheriting mutex is used to
   226         *  maintain re-entrancy.
   227         *
   228         *  @see #rtsGateType
   229         */
   230        enum RtsLockType {
   231            NoLocking,
   232            GateHwi,
   233            GateSwi,
   234            GateMutex,
   235            GateMutexPri
   236        };
   237    
   238        /*!
   239         *  ======== LibType ========
   240         *  SYS/BIOS library selection options
   241         *
   242         *  This enumeration defines all the SYS/BIOS library types
   243         *  supported by the product.  You can select the library type by setting
   244         *  the {@link #libType BIOS.libType} configuration parameter.
   245         *
   246         *  @field(LibType_Instrumented) The library is built with logging and
   247         *  assertions enabled.
   248         *
   249         *  @field(LibType_NonInstrumented) The library is built with logging and
   250         *  assertions disabled.
   251         *
   252         *  @field(LibType_Custom) The library is built using the options
   253         *  specified by {@link #customCCOpts}. Program optimization is performed
   254         *  to reduce the size of the executable and improve its performance.
   255         *  Enough debug information is retained to allow you to step through the
   256         *  application code in CCS and locate global variables.
   257         *
   258         *  @field(LibType_Debug) This setting is similar to the LibType_Custom
   259         *  setting, however, no program optimization is performed. The resulting
   260         *  executable is fully debuggable, and you can step into SYS/BIOS code.
   261         *  The tradeoff is that the executable is larger and runs slower than
   262         *  builds that use the LibType_Custom option.
   263         *
   264         *  @see #libType
   265         */
   266        enum LibType {
   267            LibType_Instrumented,           /*! Instrumented (Asserts and Logs enabled) */
   268            LibType_NonInstrumented,        /*! Non-instrumented (Asserts and Logs disabled) */
   269            LibType_Custom,                 /*! Custom (Fully configurable) */
   270            LibType_Debug                   /*! Debug (Fully configurable) */
   271        };
   272    
   273        /*! Used in APIs that take a timeout to specify wait forever */
   274        const UInt WAIT_FOREVER = ~(0U);
   275    
   276        /*! Used in APIs that take a timeout to specify no waiting */
   277        const UInt NO_WAIT = 0U;
   278    
   279        /*! User startup function type definition. */
   280        typedef Void (*StartupFuncPtr)(Void);
   281    
   282        /*!
   283         *  ======== ModuleView ========
   284         *  @_nodoc
   285         */
   286        metaonly struct ModuleView {
   287            String       currentThreadType[];
   288            String       rtsGateType;
   289            Int          cpuFreqLow;
   290            Int          cpuFreqHigh;
   291            Bool         clockEnabled;
   292            Bool         swiEnabled;
   293            Bool         taskEnabled;
   294            String       startFunc;
   295        }
   296    
   297        /*!
   298         *  ======== ErrorView ========
   299         *  @_nodoc
   300         */
   301        metaonly struct ErrorView {
   302            String mod;
   303            String tab;
   304            String inst;
   305            String field;
   306            String message;
   307        }
   308    
   309        /*!
   310         *  ======== rovViewInfo ========
   311         *  @_nodoc
   312         */
   313        @Facet
   314        metaonly config ViewInfo.Instance rovViewInfo =
   315            ViewInfo.create({
   316                viewMap: [
   317                [
   318                    'Module',
   319                    {
   320                        type: ViewInfo.MODULE,
   321                        viewInitFxn: 'viewInitModule',
   322                        structName: 'ModuleView'
   323                    }
   324                ],
   325                [
   326                    'Scan for errors...',
   327                    {
   328                        type: ViewInfo.MODULE_DATA,
   329                        viewInitFxn: 'viewInitErrorScan',
   330                        structName: 'ErrorView'
   331                    }
   332                ],
   333                ]
   334            });
   335    
   336        /*!
   337         *  ======== libType ========
   338         *  SYS/BIOS Library type
   339         *
   340         *  The SYS/BIOS runtime is built in the form of a library that is
   341         *  linked with your application.  Several forms of this library are
   342         *  supported by the SYS/BIOS product.  This configuration parameter
   343         *  allows you to select the form of the SYS/BIOS library to use.
   344         *
   345         *  The default value of libType is
   346         *  {@link #LibType_Instrumented BIOS_LibType_Instrumented}.  For a
   347         *  complete list of options and what they offer see {@link #LibType}.
   348         */
   349        metaonly config LibType libType = LibType_Instrumented;
   350    
   351        /*!
   352         *  ======== customCCOpts ========
   353         *  Compiler options used when building a custom SYS/BIOS library
   354         *
   355         *  When {@link #libType BIOS.libType} is set to
   356         *  {@link #LibType_Custom BIOS_LibType_Custom} or
   357         *  {@link #LibType_Debug BIOS_LibType_Debug},
   358         *  this string contains the options passed to the compiler during any
   359         *  build of the SYS/BIOS sources.
   360         *
   361         *  In addition to the options specified by `BIOS.customCCOpts`, several
   362         *  `-D` and `-I` options are also passed to the compiler.  The options
   363         *  specified by `BIOS.customCCOpts` are, however, the first options passed
   364         *  to the compiler on the command line.
   365         *
   366         *  To view the custom compiler options, add the following line to your
   367         *  config script:
   368         *
   369         *  @p(code)
   370         *  print(BIOS.customCCOpts);
   371         *  @p
   372         *
   373         *  When {@link #libType BIOS.libType} is set to
   374         *  {@link #LibType_Custom BIOS_LibType_Custom},
   375         *  `BIOS.customCCOpts` is initialized to settings that create a highly
   376         *  optimized SYS/BIOS library.
   377         *
   378         *  When {@link #libType BIOS.libType} is set to
   379         *  {@link #LibType_Debug BIOS_LibType_Debug},
   380         *  `BIOS.customCCOpts` is initialized to settings that create a
   381         *  non-optimized SYS/BIOS library that can be used to single-step through
   382         *  the APIs with the CCS debugger.
   383         *
   384         *  More information about using `BIOS.customCCOpts` is provided in the
   385         *  {@link https://processors.wiki.ti.com/index.php/SYS/BIOS_FAQs SYS/BIOS FAQs}.
   386         *
   387         *  @a(Warning)
   388         *  The default value of `BIOS.customCCOpts`, which is derived from the
   389         *  target specified by your configuration, includes runtime model options
   390         *  (such as endianess) that must be the same for all sources built and
   391         *  linked into your application.  You must not change or add any options
   392         *  that can alter the runtime model specified by the default value of
   393         *  `BIOS.customCCOpts`.
   394         *
   395         *  @a(Warning)
   396         *  Setting `BIOS.libType` overwrites `BIOS.customCCOpts`. Therefore, if an
   397         *  application's *.cfg file sets both these config params, the libType must
   398         *  be set before customCCOpts so the changes to customCCOpts persist.
   399         */
   400        metaonly config String customCCOpts;
   401    
   402        /*!
   403         *  ======== includeXdcRuntime ========
   404         *  Include xdc.runtime sources in custom built library 
   405         *
   406         *  By default, the xdc.runtime library sources are not included in the
   407         *  custom SYS/BIOS library created for the application. Instead,
   408         *  the pre-built xdc.runtime library is provided by the respective target
   409         *  used to build the application.
   410         *
   411         *  Setting this parameter to true will cause the xdc.runtime library
   412         *  sources to be included in the custom SYS/BIOS library. This setting
   413         *  yields the most efficient library in both code size and runtime
   414         *  performance.
   415         */
   416        metaonly config Bool includeXdcRuntime = false;
   417    
   418        /*!
   419         *  ======== smpEnabled ========
   420         *  Enables multi core SMP task scheduling
   421         *
   422         *  This functionality is available on only select multi-core devices.
   423         *
   424         *  More information about SMP/BIOS is provided here:
   425         *  {@link https://processors.wiki.ti.com/index.php/SMP/BIOS SMP/BIOS}.
   426         */
   427        config Bool smpEnabled = false;
   428    
   429        /*!
   430         *  ======== mpeEnabled ========
   431         *  Enables Memory Protection Extensions (MPE)
   432         *
   433         *  SYS/BIOS memory protection extensions add the capability to
   434         *  create privileged and unprivileged tasks as well as define
   435         *  access privileges for the unprivileged tasks.
   436         *
   437         *  This functionality is available on only select devices.
   438         */
   439        config Bool mpeEnabled = false;
   440    
   441        /*!
   442         *  ======== psaEnabled ========
   443         *  Enables ARM's Platform Security Architecture (PSA) extensions
   444         *
   445         *  This functionality is available on only select devices.
   446         */
   447        metaonly config Bool psaEnabled = false;
   448    
   449        /*!
   450         *  ======== cpuFreq ========
   451         *  CPU frequency in Hz
   452         *
   453         *  This configuration parameter allow SYS/BIOS to convert various
   454         *  periods between timer ticks (or instruction cycles) and real-time
   455         *  units.  For example, timer periods expressed in micro-seconds need
   456         *  to be converted into timer ticks in order to properly program the
   457         *  timers.
   458         *
   459         *  The default value of this parameter is obtained from the platform
   460         *  (the clockRate property of {@link xdc.cfg.Program#cpu Program.cpu})
   461         *  which is the CPU clock rate when the processor is reset.
   462         *
   463         *  @a(Example)
   464         *  If CPU frequency is 720MHz, the following configuration script
   465         *  configures SYS/BIOS with the proper clock frequency:
   466         *  @p(code)
   467         *     var BIOS = xdc.useModule('ti.sysbios.BIOS');
   468         *     BIOS.cpuFreq.hi = 0;
   469         *     BIOS.cpuFreq.lo = 720000000;
   470         *  @p
   471         */
   472        config Types.FreqHz cpuFreq;
   473    
   474        /*!
   475         *  ======== runtimeCreatesEnabled ========
   476         *  Runtime instance creation enable flag.
   477         *
   478         *  true = Mod_create() & Mod_delete() callable at runtime
   479         *  false = Mod_create() & Mod_delete() not callable at runtime
   480         */
   481        config Bool runtimeCreatesEnabled = true;
   482    
   483        /*!
   484         *  ======== taskEnabled ========
   485         *  SYS/BIOS Task services enable flag
   486         *
   487         *  The following behaviors occur when {@link #taskEnabled} is
   488         *  set to false:
   489         *
   490         *  @p(blist)
   491         *  - Static {@link ti.sysbios.knl.Task Task} creation will
   492         *    result in a fatal build error.
   493         *  - The Idle task object is not created.
   494         *    (The Idle functions are invoked within the {@link #start()}
   495         *    thread.)
   496         *  - Runtime calls to Task_create will trigger an assertion violation
   497         *    via {@link xdc.runtime.Assert#isTrue}.
   498         *  @p
   499         */
   500        config Bool taskEnabled = true;
   501    
   502        /*!
   503         *  ======== swiEnabled ========
   504         *  SYS/BIOS Swi services enable flag
   505         *
   506         *  The following behaviors occur when {@link #swiEnabled} is
   507         *  set to false:
   508         *
   509         *  @p(blist)
   510         *  - Static {@link ti.sysbios.knl.Swi Swi} creation will
   511         *    result in a fatal build error.
   512         *  - See other effects as noted for {@link #clockEnabled} = false;
   513         *  - Runtime calls to Swi_create will trigger an assertion violation
   514         *    via {@link xdc.runtime.Assert#isTrue}.
   515         *  @p
   516         */
   517        config Bool swiEnabled = true;
   518    
   519        /*!
   520         *  ======== clockEnabled ========
   521         *  SYS/BIOS Clock services enable flag
   522         *
   523         *  The following behaviors occur when {@link #clockEnabled} is
   524         *  set to false:
   525         *
   526         *  @p(blist)
   527         *  - Static Clock creation will result in a fatal build error.
   528         *  - No Clock Swi is created.
   529         *  - The {@link ti.sysbios.knl.Clock#tickSource Clock_tickSource}
   530         *    is set to
   531         *    {@link ti.sysbios.knl.Clock#TickSource_NULL Clock_TickSource_NULL}
   532         *    to prevent a Timer object from being created.
   533         *  - For APIs that take a timeout, values other than {@link #NO_WAIT}
   534         *    will be equivalent to {@link #WAIT_FOREVER}.
   535         *  @p
   536         */
   537        config Bool clockEnabled = true;
   538    
   539        /*!
   540         *  ======== assertsEnabled ========
   541         *  SYS/BIOS Assert checking in Custom SYS/BIOS library enable flag
   542         *
   543         *  When set to true, Assert checking code is compiled into
   544         *  the custom library created when {@link #libType BIOS.libType}
   545         *  is set to {@link #LibType_Custom BIOS_LibType_Custom} or
   546         *  {@link #LibType_Debug BIOS_LibType_Debug}.
   547         *
   548         *  When set to false, Assert checking code is removed from the custom
   549         *  library created when BIOS.libType is set to BIOS.LibType_Custom
   550         *  or BIOS.LibType_Debug.
   551         *  This option can considerably improve runtime performance as well
   552         *  significantly reduce the application's code size.
   553         *
   554         *  see {@link #libType BIOS.libType}.
   555         */
   556        metaonly config Bool assertsEnabled = true;
   557    
   558        /*!
   559         *  ======== logsEnabled ========
   560         *  SYS/BIOS Log support in Custom SYS/BIOS library enable flag
   561         *
   562         *  When set to true, SYS/BIOS execution Log code is compiled into
   563         *  the custom library created when {@link #libType BIOS.libType}
   564         *  is set to {@link #LibType_Custom BIOS_LibType_Custom} or
   565         *  {@link #LibType_Debug BIOS_LibType_Debug}. 
   566         *
   567         *  When set to false, all Log code is removed from
   568         *  the custom library created when BIOS.libType = BIOS.LibType_Custom
   569         *  or BIOS.LibType_Debug.
   570         *  This option can considerably improve runtime performance as well
   571         *  significantly reduce the application's code size.
   572         *
   573         *  see {@link #libType BIOS.libType}.
   574         *
   575         *  @a(Warning) Since interrupts
   576         *  are enabled when logs are generated, this setting will have the
   577         *  side effect of requiring task stacks to be sized large enough
   578         *  to absorb two interrupt contexts rather than one. 
   579         *  See the discussion on task stacks in {@link ti.sysbios.knl.Task
   580         *  Task} for more information.
   581         */
   582        metaonly config Bool logsEnabled = true;
   583    
   584        /*!
   585         *  ======== defaultKernelHeapInstance ========
   586         *  Default Kernel heap instance
   587         *
   588         *  If SYS/BIOS Memory Protection Extensions
   589         *  {@link #mpeEnabled BIOS.mpeEnabled} are enabled, a dedicated kernel
   590         *  heap is created. This heap is used for allocating kernel objects
   591         *  when create() calls are made. The kernel heap resides in privileged
   592         *  memory and is protected against unauthorized access from User Tasks.
   593         */
   594        config IHeap.Handle defaultKernelHeapInstance = null;
   595    
   596        /*!
   597         *  ======== kernelHeapSize ========
   598         *  Kernel heap size, units are in MAUs
   599         *
   600         *  If SYS/BIOS Memory Protection Extensions
   601         *  {@link #mpeEnabled BIOS.mpeEnabled} are enabled, a dedicated kernel
   602         *  heap is created. This heap is used for allocating kernel objects
   603         *  when create() calls are made. The kernel heap resides in privileged
   604         *  memory and is protected against unauthorized access from User Tasks.
   605         */
   606        config SizeT kernelHeapSize = 0x1000;
   607    
   608        /*!
   609         *  ======== kernelHeapSection ========
   610         *  Kernel heap section name
   611         */
   612        config CString kernelHeapSection = ".kernel_heap";
   613    
   614        /*!
   615         *  ======== heapSize ========
   616         *  Size of system heap, units are in MAUs
   617         *
   618         *  The system heap is, by default, used to allocate instance object
   619         *  state structures, such as {@link ti.sysbios.knl.Task Task} objects
   620         *  and their stacks, {@link ti.sysbios.knl.Semaphore Semaphore} objects,
   621         *  etc.
   622         *
   623         *  If the application configuration does not set
   624         *  Memory.defaultHeapInstance, then SYS/BIOS will create a
   625         *  {@link ti.sysbios.heaps.HeapMem HeapMem} heap of this size.  This
   626         *  heap will be assigned to
   627         *  {@link xdc.runtime.Memory#defaultHeapInstance Memory.defaultHeapInstance}
   628         *  and will therefore be used as the default system heap.  This heap
   629         *  will also be used by the SYS/BIOS version of the standard C library
   630         *  functions malloc(), calloc() and free().
   631         *
   632         *  @a(Note)
   633         *  If SYS/BIOS Memory Protection Extensions
   634         *  {@link #mpeEnabled BIOS.mpeEnabled} are enabled, a dedicated kernel heap
   635         *  is allocated (see
   636         *  {@link #defaultKernelHeapInstance BIOS.defaultKernelHeapInstance}). The
   637         *  System heap is placed in a public section (accessible from
   638         *  privileged and user Tasks) called ".public_heap" by default.
   639         */
   640        config SizeT heapSize = 0x1000;
   641    
   642        /*!
   643         *  ======== heapSection ========
   644         *  Section to place the system heap
   645         *
   646         *  This configuration parameter allows you to specify a named output
   647         *  section that will contain the SYS/BIOS system heap.  The system heap
   648         *  is, by default, used to allocate {@link ti.sysbios.knl.Task Task}
   649         *  stacks and instance object state structures.  So, giving this section
   650         *  a name and explicitly placing it via a linker command file can
   651         *  significantly improve system performance.
   652         *
   653         *  If heapSection is `null` (or `undefined`) the system heap is placed
   654         *  in the target's default data section.
   655         *
   656         *  @a(Note)
   657         *  If SYS/BIOS Memory Protection Extensions
   658         *  {@link #mpeEnabled BIOS.mpeEnabled} are enabled, a dedicated kernel heap
   659         *  is allocated (see
   660         *  {@link #defaultKernelHeapInstance BIOS.defaultKernelHeapInstance}). The
   661         *  System heap is placed in a public section (accessible from
   662         *  privileged and user Tasks) called ".public_heap" by default.
   663         */
   664        config String heapSection = null;
   665    
   666        /*!
   667         *  ======== heapTrackEnabled ========
   668         *  Use HeapTrack with system default heap
   669         *
   670         *  This configuration parameter will add a HeapTrack instance on top of
   671         *  the system heap. HeapTrack adds a tracker packet to every allocated
   672         *  buffer and displays the information in RTOS Object Viewer (ROV).
   673         *  An assert will be raised on a free if there was a buffer overflow.
   674         */
   675        config Bool heapTrackEnabled = false;
   676    
   677        /*!
   678         *  ======== setupSecureContext ========
   679         *  @_nodoc
   680         *  Sets up a secure context when using secure version of BIOS
   681         *
   682         *  This is available for some C66 secure devices only.
   683         *  This parameter take effect only when 'useSK' is set to true.
   684         *  If set to true, a call to Hwi_setupSC() is done in a last function.
   685         */
   686        config Bool setupSecureContext = false;
   687    
   688        /*!
   689         *  ======== useSK ========
   690         *  @_nodoc
   691         *  use the secure version of BIOS
   692         *
   693         *  This is available for some C66 secure devices only.
   694         *  This parameter can only be used with the custom build.
   695         */
   696        config Bool useSK = false;
   697    
   698        /*!
   699         *  ======== rtsGateType ========
   700         *  Gate to make sure TI RTS library APIs are re-entrant
   701         *
   702         *  The application gets to determine the type of gate (lock) that is used
   703         *  in the TI RTS library. The gate will be used to guarantee re-entrancy
   704         *  of the RTS APIs.
   705         *
   706         *  The type of gate depends on the type of threads that are going to
   707         *  be calling into the RTS library.  For example, if both Swi and Task
   708         *  threads are going to be calling the RTS library's printf, GateSwi
   709         *  should be used. In this case, Hwi threads are not impacted (i.e.
   710         *  disabled) during the printf calls from the Swi or Task threads.
   711         *
   712         *  If NoLocking is used, the RTS lock is not plugged and re-entrancy for
   713         *  the TI RTS library calls are not guaranteed. The application can plug
   714         *  the RTS locks directly if it wants.
   715         *
   716         *  Numerous gate types are provided by SYS/BIOS.  Each has its advantages
   717         *  and disadvantages.  The following list summarizes when each type is
   718         *  appropriate for protecting an underlying non-reentrant RTS library.
   719         *  @p(dlist)
   720         *      - {@link #GateHwi}:
   721         *        Interrupts are disabled and restored to maintain re-entrancy.
   722         *        Use if only making RTS calls from a Hwi, Swi and/or Task.
   723         *
   724         *      - {@link #GateSwi}:
   725         *        Swis are disabled and restored to maintain re-entrancy. Use if
   726         *        only making RTS calls from a Swi and/or Task.
   727         *
   728         *      - {@link #GateMutex}:
   729         *        A single mutex is used to maintain re-entrancy.  Use if only
   730         *        making RTS calls from a Task.  Blocks only Tasks that are
   731         *        also trying to execute critical regions of RTS library.
   732         *
   733         *      - {@link #GateMutexPri}:
   734         *        A priority inheriting mutex is used to maintain re-entrancy.
   735         *        Blocks only Tasks that are also trying to execute critical
   736         *        regions of RTS library.  Raises the priority of the Task that
   737         *        is executing the critical region in the RTS library to the
   738         *        level of the highest priority Task that is block by the mutex.
   739         *  @p
   740         *
   741         *  The default value of rtsGateType depends on the type of threading
   742         *  model enabled by other configuration parameters.
   743         *  If {@link #taskEnabled} is true, {@link #GateMutex} is used.
   744         *  If {@link #swiEnabled} is true and {@link #taskEnabled} is false:
   745         *  {@link #GateSwi} is used.
   746         *  If both {@link #swiEnabled} and {@link #taskEnabled} are false:
   747         *  {@link xdc.runtime#GateNull} is used.
   748         *
   749         *  If {@link #taskEnabled} is false, the user should not select
   750         *  {@link #GateMutex} (or other Task level gates). Similarly, if
   751         *  {@link #taskEnabled} and {@link #swiEnabled}are false, the user
   752         *  should not select {@link #GateSwi} or the Task level gates.
   753         */
   754        metaonly config RtsLockType rtsGateType;
   755    
   756        /*!
   757         *  ======== startupFxns ========
   758         *  Functions to be executed at the beginning of BIOS_start()
   759         *
   760         *  These user (or middleware) functions are executed before Hwis,
   761         *  Swis, and Tasks are started.
   762         */
   763        metaonly config StartupFuncPtr startupFxns[] = [];
   764    
   765        /*!
   766         *  ======== version ========
   767         *  SYS/BIOS version number macro
   768         *
   769         *  This macro has a hex value that represents the SYS/BIOS version
   770         *  number. The hex value has the version format 0xMmmpp, where
   771         *  M is a single digit Major number, mm is a 2 digit minor number
   772         *  and pp is a 2 digit patch number.
   773         *
   774         *  Example: A macro hex value of 0x64501 implies that the SYS/BIOS
   775         *  product version number is 6.45.01
   776         */
   777        const UInt32 version = 0x67601;
   778    
   779        /*!
   780         *  ======== addUserStartupFunction ========
   781         *  @_nodoc
   782         *  Statically add a function to the startupFxns table.
   783         */
   784        metaonly Void addUserStartupFunction(StartupFuncPtr func);
   785    
   786        /*!
   787         *  ======== linkedWithIncorrectBootLibrary ========
   788         *  Application was linked with incorrect Boot library
   789         *
   790         *  This function has a loop that spins forever. If execution
   791         *  reaches this function, it indicates that the application
   792         *  was linked with an incorrect boot library and the XDC
   793         *  runtime startup functions did not get run. This can happen
   794         *  if the code gen tool's RTS library was before SYS/BIOS's
   795         *  generated linker cmd file on the link line.
   796         */
   797        Void linkedWithIncorrectBootLibrary();
   798    
   799        /*!
   800         *  ======== start ========
   801         *  Start SYS/BIOS
   802         *
   803         *  The user's main() function is required to call this function
   804         *  after all other user initializations have been performed.
   805         *
   806         *  This function does not return.
   807         *
   808         *  This function performs any remaining SYS/BIOS initializations
   809         *  and then transfers control to the highest priority ready
   810         *  task if {@link #taskEnabled} is true. If {@link #taskEnabled}
   811         *  is false, control is transferred directly to the Idle Loop.
   812         *
   813         *  The SYS/BIOS start sequence is as follows:
   814         *  @p(blist)
   815         *  - Invoke all the functions in the {@link #startupFxns} array.
   816         *  - call {@link ti.sysbios.hal.Hwi#enable Hwi_startup()}
   817         *    to enable interrupts.
   818         *  - if {@link #swiEnabled} is true, call
   819         *    {@link ti.sysbios.knl.Swi#enable Swi_startup()} to enable
   820         *    the Swi scheduler.
   821         *  - Start any statically created or constructed Timers
   822         *    in the {@link ti.sysbios.hal.Timer#StartMode Timer_StartMode_AUTO}
   823         *    mode.
   824         *  - if {@link #taskEnabled} is true, enable the Task scheduler
   825         *    and transfer the execution thread to the highest priority
   826         *    task in the {@link ti.sysbios.knl.Task#Mode Task_Mode_READY}
   827         *    mode.
   828         *  - Otherwise, fall directly into the Idle Loop.
   829         *  @p
   830         *
   831         */
   832        Void start();
   833    
   834        /*!
   835         *  ======== exit ========
   836         *  Exit currently running SYS/BIOS executable
   837         *
   838         *  This function is called when a SYS/BIOS executable needs to terminate
   839         *  normally.  This function sets the internal SYS/BIOS threadType to
   840         *  {@link #ThreadType_Main} and then calls
   841         *  {@link xdc.runtime.System#exit System_exit}(stat), passing along
   842         *  the 'stat' argument.
   843         *
   844         *  All functions bound via
   845         * `{@link xdc.runtime.System#atexit System_atexit}` or the ANSI C
   846         *  Standard Library `atexit` function are then executed.
   847         *
   848         *  @param(stat)    exit status to return to calling environment.
   849         */
   850        Void exit(Int stat);
   851    
   852        /*!
   853         *  ======== getThreadType ========
   854         *  Get the current thread type
   855         *
   856         *  @b(returns)     Current thread type
   857         */
   858        ThreadType getThreadType();
   859    
   860        /*!
   861         *  @_nodoc
   862         *  ======== setThreadType ========
   863         *  Set the current thread type
   864         *
   865         *  Called by the various threadType owners.
   866         *
   867         *  @param(ttype)   New thread type value
   868         *  @b(returns)     Previous thread type
   869         */
   870        ThreadType setThreadType(ThreadType ttype);
   871    
   872        /*!
   873         *  ======== setCpuFreq ========
   874         *  Set CPU Frequency in Hz
   875         *
   876         *  This API is not thread safe. Please use appropriate locks.
   877         */
   878        Void setCpuFreq(Types.FreqHz *freq);
   879    
   880        /*!
   881         *  ======== getCpuFreq ========
   882         *  Get CPU frequency in Hz
   883         *
   884         *  This API is not thread safe. Please use appropriate locks.
   885         */
   886        Void getCpuFreq(Types.FreqHz *freq);
   887    
   888        /*!
   889         *  @_nodoc
   890         *  ======== getCpuFrequency ========
   891         *  Get CPU frequency in Hz.
   892         *
   893         *  This function is currently used by UIA and is called in the
   894         *  UIAMetaData validate() function.
   895         *  NOTE: Javascript does not support UInt64, so this only works
   896         *  if the frequency is less than 4GHz.  Keep this function for
   897         *  backwards compatibility (for awhile).
   898         */
   899        metaonly UInt64 getCpuFrequency();
   900    
   901        /*!
   902         *  @_nodoc
   903         *  ======== getCpuFreqMeta ========
   904         *  Get CPU frequency in Hz.
   905         *
   906         *  This function is currently used by UIA and is called in the
   907         *  UIAMetaData validate() function.
   908         */
   909        metaonly Types.FreqHz getCpuFreqMeta();
   910    
   911        /*!
   912         *  @_nodoc
   913         *  ======== getTimestampFrequency ========
   914         *  Get timestamp frequency in Hz.  If we don't know the timestamp
   915         *  frequency of the device, return 0.
   916         *
   917         *  This function is currently used by UIA and is called in the
   918         *  UIAMetaData validate() function.
   919         *  NOTE: Javascript does not support UInt64, so this only works
   920         *  if the frequency is less than 4GHz.  Keep this function for
   921         *  backwards compatability (for awhile).
   922         */
   923        metaonly UInt64 getTimestampFrequency();
   924    
   925        /*!
   926         *  @_nodoc
   927         *  ======== getTimestampFreqMeta ========
   928         *  Get timestamp frequency in Hz.  If we don't know the timestamp
   929         *  frequency of the device, return 0.
   930         *
   931         *  This function is currently used by UIA and is called in the
   932         *  UIAMetaData validate() function.
   933         */
   934        metaonly Types.FreqHz getTimestampFreqMeta();
   935    
   936        /*!
   937         *  @_nodoc
   938         *  ======== getDefaultTimestampProvider ========
   939         *  Returns the name of the TimestampProvider module BIOS will set
   940         *  xdc.runtime.Timestamp.SupportProxy to if it hasn't been configured
   941         *  in the user's config script.
   942         *
   943         *  This function is meant to be used by modules that have their own
   944         *  TimestampProvider proxies if they want to initialize them to the
   945         *  default xdc.runtime.Timestamp.SupportProxy binding selected by BIOS:
   946         *
   947         *  if (!this.$written("TimestampProxy")) {
   948         *      if (xdc.runtime.$written("Timestamp.SupportProxy") {
   949         *          this.TimestampProxy = xdc.runtime.Timestamp.SupportProxy;
   950         *      }
   951         *      else {
   952         *          this.TimestampProxy = xdc.module(BIOS.getDefaultTimestampProvider());
   953         *      }
   954         *  }
   955         */
   956        metaonly String getDefaultTimestampProvider();
   957    
   958    internal:
   959    
   960        /*
   961         *  ======== buildingAppLib ========
   962         *  Enable custom build of SYS/BIOS from source
   963         *
   964         *  true = building application-specific custom lib
   965         *  false = building internal instrumented/nonInstrumented lib
   966         */
   967        metaonly config Bool buildingAppLib = true;
   968    
   969        /*
   970         *  ======== libDir ========
   971         *  Specify output library directory
   972         */
   973        metaonly config String libDir = null;
   974    
   975        /*
   976         *  @_nodoc
   977         *  ======== codeCoverageEnabled ========
   978         *  Setting this to 'true' will tweak other settings for
   979         *  code coverage.
   980         *
   981         *  For example, by setting this to true, the code that melts
   982         *  away when hook.length is 0 does not melt away.
   983         */
   984        metaonly config Bool codeCoverageEnabled = false;
   985    
   986        /*
   987         *  ======== getCCOpts ========
   988         *  Get the compiler options necessary to build
   989         */
   990        metaonly String getCCOpts(String target);
   991    
   992        /*
   993         *  ======== intSize ========
   994         *  Used to determine number of bits in an Int
   995         */
   996        struct intSize {
   997            Int intSize;
   998        }
   999    
  1000        /*
  1001         *  ======== bitsPerInt ========
  1002         *  Number of bits in an integer
  1003         *
  1004         *  Used for error checking
  1005         */
  1006        metaonly config Char bitsPerInt;
  1007    
  1008        /*
  1009         *  ======== installedErrorHook ========
  1010         *  User/default Error.raiseHook
  1011         *
  1012         *  BIOS_errorRaiseHook() calls this after setting threadType
  1013         *  to Main so that GateMutex's threadType check will
  1014         *  pass.
  1015         */
  1016        config Void (*installedErrorHook)(Error.Block *);
  1017    
  1018        /*
  1019         *  ======== errorRaiseHook ========
  1020         *  Error.raiseHook that sets threadType to Main so
  1021         *  threadType checking Asserts will pass.
  1022         */
  1023        Void errorRaiseHook(Error.Block *eb);
  1024    
  1025        /*
  1026         *  ======== startFunc ========
  1027         *  Generated BIOS_start function
  1028         */
  1029        Void startFunc();
  1030    
  1031        /*
  1032         *  ======== atExitFunc ========
  1033         *  Generated BIOS_atExitFunc function
  1034         */
  1035        Void atExitFunc(Int stat);
  1036    
  1037        /*
  1038         *  ======== exitFunc ========
  1039         *  Generated BIOS_exitFunc function
  1040         */
  1041        Void exitFunc(Int stat);
  1042    
  1043        /*
  1044         *  ======== registerRTSLock ========
  1045         *  Register the RTS lock
  1046         *
  1047         *  Added as a startup function in BIOS.xs.
  1048         */
  1049        Void registerRTSLock();
  1050    
  1051        /*
  1052         *  ======== removeRTSLock ========
  1053         *  Remove the RTS locks
  1054         *
  1055         *  This function is called by BIOS_exit().
  1056         */
  1057        Void removeRTSLock();
  1058    
  1059        /*
  1060         *  ======== rtsLock ========
  1061         *  Called by rts _lock() function
  1062         */
  1063        Void rtsLock();
  1064    
  1065        /*
  1066         *  ======== rtsUnLock ========
  1067         *  Called by rts _unlock() function
  1068         */
  1069        Void rtsUnlock();
  1070    
  1071        /*
  1072         *  ======== nullFunc ========
  1073         */
  1074        Void nullFunc();
  1075    
  1076        /*
  1077         *  ======== fireFrequencyUpdate ========
  1078         */
  1079        function fireFrequencyUpdate(newFreq);
  1080    
  1081        /*
  1082         *  ======== RtsGateProxy ========
  1083         *  Gate proxy to be used for the rts gate
  1084         */
  1085        proxy RtsGateProxy inherits xdc.runtime.IGateProvider;
  1086    
  1087        /*
  1088         *  ======== StartFuncPtr ========
  1089         *  Function prototype for the generated BIOS_start
  1090         */
  1091        typedef Void (*StartFuncPtr)(void);
  1092    
  1093        /*
  1094         *  ======== ExitFuncPtr ========
  1095         *  Function prototype for the generated BIOS_exit
  1096         */
  1097        typedef Void (*ExitFuncPtr)(Int);
  1098    
  1099        /*
  1100         *  ======== Module_State ========
  1101         */
  1102        struct Module_State {
  1103            Types.FreqHz        cpuFreq;            /* in KHz */
  1104            UInt                rtsGateCount;       /* count for nesting */
  1105            IArg                rtsGateKey;         /* key for unlocking */
  1106            RtsGateProxy.Handle rtsGate;            /* gate for RTS calls */
  1107            ThreadType          threadType;         /* Curr Thread Type */
  1108                                                    /* (Hwi, Swi, Task) */
  1109            ThreadType          smpThreadType[];    /* SMP Core specific */
  1110                                                    /* Thread Type */
  1111            volatile StartFuncPtr startFunc;
  1112            volatile ExitFuncPtr  exitFunc;
  1113        };
  1114    }