mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-10-31 04:59:55 +00:00 
			
		
		
		
	 f7f1a222cc
			
		
	
	f7f1a222cc
	
	
	
		
			
			change(bootloader): remove ignore efuse check flag (temp) change(bootloader): use int for the minimum efuse blk rev (temp)
		
			
				
	
	
		
			106 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			106 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * SPDX-FileCopyrightText: 2022 Espressif Systems (Shanghai) CO LTD
 | |
|  *
 | |
|  * SPDX-License-Identifier: Apache-2.0
 | |
|  */
 | |
| 
 | |
| #include <assert.h>
 | |
| #include <sys/param.h>
 | |
| #include "esp_app_desc.h"
 | |
| #include "esp_attr.h"
 | |
| #include "sdkconfig.h"
 | |
| 
 | |
| 
 | |
| // Application version info
 | |
| const __attribute__((weak)) __attribute__((section(".rodata_desc")))  esp_app_desc_t esp_app_desc = {
 | |
|     .magic_word = ESP_APP_DESC_MAGIC_WORD,
 | |
| #ifdef CONFIG_APP_EXCLUDE_PROJECT_VER_VAR
 | |
|     .version = "",
 | |
| #else
 | |
|     .version = PROJECT_VER,
 | |
| #endif
 | |
| 
 | |
| #ifdef CONFIG_APP_EXCLUDE_PROJECT_NAME_VAR
 | |
|     .project_name = "",
 | |
| #else
 | |
|     .project_name = PROJECT_NAME,
 | |
| #endif
 | |
|     .idf_ver = IDF_VER,
 | |
| 
 | |
| #ifdef CONFIG_BOOTLOADER_APP_SECURE_VERSION
 | |
|     .secure_version = CONFIG_BOOTLOADER_APP_SECURE_VERSION,
 | |
| #else
 | |
|     .secure_version = 0,
 | |
| #endif
 | |
| 
 | |
| #if defined(CONFIG_APP_COMPILE_TIME_DATE) && !defined(CONFIG_APP_REPRODUCIBLE_BUILD)
 | |
|     .time = __TIME__,
 | |
|     .date = __DATE__,
 | |
| #else
 | |
|     .time = "",
 | |
|     .date = "",
 | |
| #endif
 | |
|     .min_efuse_blk_rev_full = CONFIG_ESP_EFUSE_BLOCK_REV_MIN_FULL,
 | |
|     .max_efuse_blk_rev_full = CONFIG_ESP_EFUSE_BLOCK_REV_MAX_FULL,
 | |
| };
 | |
| 
 | |
| 
 | |
| #ifndef CONFIG_APP_EXCLUDE_PROJECT_VER_VAR
 | |
| _Static_assert(sizeof(PROJECT_VER) <= sizeof(esp_app_desc.version), "PROJECT_VER is longer than version field in structure");
 | |
| #endif
 | |
| _Static_assert(sizeof(IDF_VER) <= sizeof(esp_app_desc.idf_ver), "IDF_VER is longer than idf_ver field in structure");
 | |
| #ifndef CONFIG_APP_EXCLUDE_PROJECT_NAME_VAR
 | |
| _Static_assert(sizeof(PROJECT_NAME) <= sizeof(esp_app_desc.project_name), "PROJECT_NAME is longer than project_name field in structure");
 | |
| #endif
 | |
| 
 | |
| const esp_app_desc_t *esp_app_get_description(void)
 | |
| {
 | |
|     return &esp_app_desc;
 | |
| }
 | |
| 
 | |
| /* The following two functions may be called from the panic handler
 | |
|  * or core dump, hence IRAM_ATTR.
 | |
|  */
 | |
| 
 | |
| static inline char IRAM_ATTR to_hex_digit(unsigned val)
 | |
| {
 | |
|     return (val < 10) ? ('0' + val) : ('a' + val - 10);
 | |
| }
 | |
| 
 | |
| __attribute__((constructor)) void esp_init_app_elf_sha256(void)
 | |
| {
 | |
|     esp_app_get_elf_sha256(NULL, 0);
 | |
| }
 | |
| 
 | |
| /* The esp_app_desc.app_elf_sha256 should be possible to print in panic handler during cache is disabled.
 | |
|  * But because the cache is disabled the reading esp_app_desc.app_elf_sha256 is not right and
 | |
|  * can lead to a complete lock-up of the CPU.
 | |
|  * For this reason we do a reading of esp_app_desc.app_elf_sha256 while start up in esp_init_app_elf_sha256()
 | |
|  * and keep it in the static s_app_elf_sha256 value.
 | |
|  */
 | |
| int IRAM_ATTR esp_app_get_elf_sha256(char* dst, size_t size)
 | |
| {
 | |
|     static char s_app_elf_sha256[CONFIG_APP_RETRIEVE_LEN_ELF_SHA / 2];
 | |
|     static bool first_call = true;
 | |
|     if (first_call) {
 | |
|         first_call = false;
 | |
|         // At -O2 optimization level, GCC optimizes out the copying of the first byte of the app_elf_sha256,
 | |
|         // because it is zero at compile time, and only modified afterwards by esptool.
 | |
|         // Casting to volatile disables the optimization.
 | |
|         const volatile uint8_t* src = (const volatile uint8_t*)esp_app_desc.app_elf_sha256;
 | |
|         for (size_t i = 0; i < sizeof(s_app_elf_sha256); ++i) {
 | |
|             s_app_elf_sha256[i] = src[i];
 | |
|         }
 | |
|     }
 | |
|     if (dst == NULL || size == 0) {
 | |
|         return 0;
 | |
|     }
 | |
|     size_t n = MIN((size - 1) / 2, sizeof(s_app_elf_sha256));
 | |
|     for (size_t i = 0; i < n; ++i) {
 | |
|         dst[2*i] = to_hex_digit(s_app_elf_sha256[i] >> 4);
 | |
|         dst[2*i + 1] = to_hex_digit(s_app_elf_sha256[i] & 0xf);
 | |
|     }
 | |
|     dst[2*n] = 0;
 | |
|     return 2*n + 1;
 | |
| }
 |