mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-10-31 21:14:37 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			214 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			214 lines
		
	
	
		
			7.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // Copyright 2020 Espressif Systems (Shanghai) Co., Ltd.
 | |
| //
 | |
| // Licensed under the Apache License, Version 2.0 (the "License");
 | |
| // you may not use this file except in compliance with the License.
 | |
| // You may obtain a copy of the License at
 | |
| //
 | |
| //     http://www.apache.org/licenses/LICENSE-2.0
 | |
| //
 | |
| // Unless required by applicable law or agreed to in writing, software
 | |
| // distributed under the License is distributed on an "AS IS" BASIS,
 | |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| // See the License for the specific language governing permissions and
 | |
| // limitations under the License.
 | |
| 
 | |
| #include "string.h"
 | |
| #include "sdkconfig.h"
 | |
| #include "esp_err.h"
 | |
| #include "esp_log.h"
 | |
| #if CONFIG_IDF_TARGET_ESP32
 | |
| #include "esp32/rom/spi_flash.h"
 | |
| #elif CONFIG_IDF_TARGET_ESP32S2
 | |
| #include "esp32s2/rom/spi_flash.h"
 | |
| #include "esp32s2/rom/ets_sys.h"
 | |
| #endif
 | |
| #include "esp_rom_crc.h"
 | |
| #include "esp_rom_gpio.h"
 | |
| #include "esp_flash_partitions.h"
 | |
| #include "bootloader_flash.h"
 | |
| #include "bootloader_common.h"
 | |
| #include "soc/gpio_periph.h"
 | |
| #include "soc/rtc.h"
 | |
| #include "soc/efuse_reg.h"
 | |
| #include "soc/soc_memory_layout.h"
 | |
| #include "hal/gpio_ll.h"
 | |
| #include "esp_image_format.h"
 | |
| #include "bootloader_sha.h"
 | |
| #include "sys/param.h"
 | |
| #include "bootloader_flash_priv.h"
 | |
| 
 | |
| #define ESP_PARTITION_HASH_LEN 32 /* SHA-256 digest length */
 | |
| 
 | |
| static const char* TAG = "boot_comm";
 | |
| 
 | |
| uint32_t bootloader_common_ota_select_crc(const esp_ota_select_entry_t *s)
 | |
| {
 | |
|     return esp_rom_crc32_le(UINT32_MAX, (uint8_t*)&s->ota_seq, 4);
 | |
| }
 | |
| 
 | |
| bool bootloader_common_ota_select_invalid(const esp_ota_select_entry_t *s)
 | |
| {
 | |
|     return s->ota_seq == UINT32_MAX || s->ota_state == ESP_OTA_IMG_INVALID || s->ota_state == ESP_OTA_IMG_ABORTED;
 | |
| }
 | |
| 
 | |
| bool bootloader_common_ota_select_valid(const esp_ota_select_entry_t *s)
 | |
| {
 | |
|     return bootloader_common_ota_select_invalid(s) == false && s->crc == bootloader_common_ota_select_crc(s);
 | |
| }
 | |
| 
 | |
| int bootloader_common_get_active_otadata(esp_ota_select_entry_t *two_otadata)
 | |
| {
 | |
|     if (two_otadata == NULL) {
 | |
|         return -1;
 | |
|     }
 | |
|     bool valid_two_otadata[2];
 | |
|     valid_two_otadata[0] = bootloader_common_ota_select_valid(&two_otadata[0]);
 | |
|     valid_two_otadata[1] = bootloader_common_ota_select_valid(&two_otadata[1]);
 | |
|     return bootloader_common_select_otadata(two_otadata, valid_two_otadata, true);
 | |
| }
 | |
| 
 | |
| esp_err_t bootloader_common_check_chip_validity(const esp_image_header_t* img_hdr, esp_image_type type)
 | |
| {
 | |
|     esp_err_t err = ESP_OK;
 | |
|     esp_chip_id_t chip_id = CONFIG_IDF_FIRMWARE_CHIP_ID;
 | |
|     if (chip_id != img_hdr->chip_id) {
 | |
|         ESP_LOGE(TAG, "mismatch chip ID, expected %d, found %d", chip_id, img_hdr->chip_id);
 | |
|         err = ESP_FAIL;
 | |
|     }
 | |
|     uint8_t revision = bootloader_common_get_chip_revision();
 | |
|     if (revision < img_hdr->min_chip_rev) {
 | |
|         /* To fix this error, please update mininum supported chip revision from configuration,
 | |
|          * located in TARGET (e.g. ESP32) specific options under "Component config" menu */
 | |
|         ESP_LOGE(TAG, "This chip is revision %d but the application is configured for minimum revision %d. Can't run.", revision, img_hdr->min_chip_rev);
 | |
|         err = ESP_FAIL;
 | |
|     } else if (revision != img_hdr->min_chip_rev) {
 | |
| #ifdef BOOTLOADER_BUILD
 | |
|         ESP_LOGI(TAG, "chip revision: %d, min. %s chip revision: %d", revision, type == ESP_IMAGE_BOOTLOADER ? "bootloader" : "application", img_hdr->min_chip_rev);
 | |
| #endif
 | |
|     }
 | |
|     return err;
 | |
| }
 | |
| 
 | |
| int bootloader_common_select_otadata(const esp_ota_select_entry_t *two_otadata, bool *valid_two_otadata, bool max)
 | |
| {
 | |
|     if (two_otadata == NULL || valid_two_otadata == NULL) {
 | |
|         return -1;
 | |
|     }
 | |
|     int active_otadata = -1;
 | |
|     if (valid_two_otadata[0] && valid_two_otadata[1]) {
 | |
|         uint32_t condition = (max == true) ? MAX(two_otadata[0].ota_seq, two_otadata[1].ota_seq) : MIN(two_otadata[0].ota_seq, two_otadata[1].ota_seq);
 | |
|         if (condition == two_otadata[0].ota_seq) {
 | |
|             active_otadata = 0;
 | |
|         } else {
 | |
|             active_otadata = 1;
 | |
|         }
 | |
|         ESP_LOGD(TAG, "Both OTA copies are valid");
 | |
|     } else {
 | |
|         for (int i = 0; i < 2; ++i) {
 | |
|             if (valid_two_otadata[i]) {
 | |
|                 active_otadata = i;
 | |
|                 ESP_LOGD(TAG, "Only otadata[%d] is valid", i);
 | |
|                 break;
 | |
|             }
 | |
|         }
 | |
|     }
 | |
|     return active_otadata;
 | |
| }
 | |
| 
 | |
| esp_err_t bootloader_common_get_partition_description(const esp_partition_pos_t *partition, esp_app_desc_t *app_desc)
 | |
| {
 | |
|     if (partition == NULL || app_desc == NULL || partition->offset == 0) {
 | |
|         return ESP_ERR_INVALID_ARG;
 | |
|     }
 | |
| 
 | |
|     const uint32_t app_desc_offset = sizeof(esp_image_header_t) + sizeof(esp_image_segment_header_t);
 | |
|     const uint32_t mmap_size = app_desc_offset + sizeof(esp_app_desc_t);
 | |
|     const uint8_t *image = bootloader_mmap(partition->offset, mmap_size);
 | |
|     if (image == NULL) {
 | |
|         ESP_LOGE(TAG, "bootloader_mmap(0x%x, 0x%x) failed", partition->offset, mmap_size);
 | |
|         return ESP_FAIL;
 | |
|     }
 | |
| 
 | |
|     memcpy(app_desc, image + app_desc_offset, sizeof(esp_app_desc_t));
 | |
|     bootloader_munmap(image);
 | |
| 
 | |
|     if (app_desc->magic_word != ESP_APP_DESC_MAGIC_WORD) {
 | |
|         return ESP_ERR_NOT_FOUND;
 | |
|     }
 | |
| 
 | |
|     return ESP_OK;
 | |
| }
 | |
| 
 | |
| #if defined( CONFIG_BOOTLOADER_SKIP_VALIDATE_IN_DEEP_SLEEP ) || defined( CONFIG_BOOTLOADER_CUSTOM_RESERVE_RTC )
 | |
| 
 | |
| #define RTC_RETAIN_MEM_ADDR (SOC_RTC_DATA_HIGH - sizeof(rtc_retain_mem_t))
 | |
| 
 | |
| rtc_retain_mem_t *const rtc_retain_mem = (rtc_retain_mem_t *)RTC_RETAIN_MEM_ADDR;
 | |
| 
 | |
| #if !IS_BOOTLOADER_BUILD
 | |
| /* The app needs to be told this memory is reserved, important if configured to use RTC memory as heap.
 | |
| 
 | |
|    Note that keeping this macro here only works when other symbols in this file are referenced by the app, as
 | |
|    this feature is otherwise 100% part of the bootloader. However this seems to happen in all apps.
 | |
|  */
 | |
| SOC_RESERVE_MEMORY_REGION(RTC_RETAIN_MEM_ADDR, RTC_RETAIN_MEM_ADDR + sizeof(rtc_retain_mem_t), rtc_retain_mem);
 | |
| #endif
 | |
| 
 | |
| static bool check_rtc_retain_mem(void)
 | |
| {
 | |
|     return esp_rom_crc32_le(UINT32_MAX, (uint8_t*)rtc_retain_mem, sizeof(rtc_retain_mem_t) - sizeof(rtc_retain_mem->crc)) == rtc_retain_mem->crc && rtc_retain_mem->crc != UINT32_MAX;
 | |
| }
 | |
| 
 | |
| static void update_rtc_retain_mem_crc(void)
 | |
| {
 | |
|     rtc_retain_mem->crc = esp_rom_crc32_le(UINT32_MAX, (uint8_t*)rtc_retain_mem, sizeof(rtc_retain_mem_t) - sizeof(rtc_retain_mem->crc));
 | |
| }
 | |
| 
 | |
| void bootloader_common_reset_rtc_retain_mem(void)
 | |
| {
 | |
|     memset(rtc_retain_mem, 0, sizeof(rtc_retain_mem_t));
 | |
| }
 | |
| 
 | |
| uint16_t bootloader_common_get_rtc_retain_mem_reboot_counter(void)
 | |
| {
 | |
|     if (check_rtc_retain_mem()) {
 | |
|         return rtc_retain_mem->reboot_counter;
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| esp_partition_pos_t* bootloader_common_get_rtc_retain_mem_partition(void)
 | |
| {
 | |
|     if (check_rtc_retain_mem()) {
 | |
|         return &rtc_retain_mem->partition;
 | |
|     }
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| void bootloader_common_update_rtc_retain_mem(esp_partition_pos_t* partition, bool reboot_counter)
 | |
| {
 | |
|     if (reboot_counter) {
 | |
|         if (!check_rtc_retain_mem()) {
 | |
|             bootloader_common_reset_rtc_retain_mem();
 | |
|         }
 | |
|         if (++rtc_retain_mem->reboot_counter == 0) {
 | |
|             // do not allow to overflow. Stop it.
 | |
|             --rtc_retain_mem->reboot_counter;
 | |
|         }
 | |
| 
 | |
|     }
 | |
| 
 | |
|     if (partition != NULL) {
 | |
|         rtc_retain_mem->partition.offset = partition->offset;
 | |
|         rtc_retain_mem->partition.size   = partition->size;
 | |
|     }
 | |
| 
 | |
|     update_rtc_retain_mem_crc();
 | |
| }
 | |
| 
 | |
| rtc_retain_mem_t* bootloader_common_get_rtc_retain_mem(void)
 | |
| {
 | |
|     return rtc_retain_mem;
 | |
| }
 | |
| #endif // defined( CONFIG_BOOTLOADER_SKIP_VALIDATE_IN_DEEP_SLEEP ) || defined( CONFIG_BOOTLOADER_CUSTOM_RESERVE_RTC )
 | 
