blob: ce628519af5c9304a7bf14c7928198c42bafee86 [file] [log] [blame]
David Brown5153bd62017-01-06 11:16:53 -07001/*
2 * Copyright (c) 2012-2014 Wind River Systems, Inc.
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Marti Bolivareb940802017-05-01 23:15:29 -040017#include <assert.h>
David Brown5153bd62017-01-06 11:16:53 -070018#include <zephyr.h>
Peter Bigot54c1e3f2020-01-25 05:50:12 -060019#include <drivers/gpio.h>
Andrzej Puzdrowskif1d189c2019-12-12 09:34:11 +010020#include <sys/__assert.h>
Peter Bigot54c1e3f2020-01-25 05:50:12 -060021#include <drivers/flash.h>
Andrzej Puzdrowskif99a4c72019-06-28 15:16:35 +020022#include <drivers/timer/system_timer.h>
Emanuele Di Santoc4bf7802018-07-20 11:39:57 +020023#include <usb/usb_device.h>
Evan Gates4632d8d2018-06-28 13:27:40 -070024#include <soc.h>
David Brown5153bd62017-01-06 11:16:53 -070025
Marti Bolivar51181cf2017-03-20 11:03:41 -040026#include "target.h"
27
Marti Bolivar4a97b4c2017-01-31 18:20:02 -050028#include "bootutil/bootutil_log.h"
Ricardo Salveti3a2c1242017-01-19 10:22:35 -020029#include "bootutil/image.h"
30#include "bootutil/bootutil.h"
Andrzej Puzdrowskib788c712018-04-12 12:42:49 +020031#include "flash_map_backend/flash_map_backend.h"
Ricardo Salveti3a2c1242017-01-19 10:22:35 -020032
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020033#ifdef CONFIG_MCUBOOT_SERIAL
Marko Kiiskila149b4572018-06-06 14:18:54 +030034#include "boot_serial/boot_serial.h"
35#include "serial_adapter/serial_adapter.h"
36
37const struct boot_uart_funcs boot_funcs = {
38 .read = console_read,
39 .write = console_write
40};
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020041#endif
42
Rajavardhan Gundi51c9d702019-02-20 14:08:52 +053043#ifdef CONFIG_BOOT_WAIT_FOR_USB_DFU
44#include <usb/class/usb_dfu.h>
45#endif
46
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +010047#if CONFIG_MCUBOOT_CLEANUP_ARM_CORE
48#include <arm_cleanup.h>
49#endif
50
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +010051#if defined(CONFIG_LOG) && !defined(CONFIG_LOG_IMMEDIATE)
52#ifdef CONFIG_LOG_PROCESS_THREAD
53#warning "The log internal thread for log processing can't transfer the log"\
54 "well for MCUBoot."
55#else
56#include <logging/log_ctrl.h>
57
Krzysztof Chruscinski821214e2020-03-24 07:50:32 +010058#define BOOT_LOG_PROCESSING_INTERVAL K_MSEC(30) /* [ms] */
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +010059
60/* log are processing in custom routine */
Andrzej Puzdrowskiaf148532020-02-25 12:51:26 +010061K_THREAD_STACK_DEFINE(boot_log_stack, CONFIG_MCUBOOT_LOG_THREAD_STACK_SIZE);
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +010062struct k_thread boot_log_thread;
Andrzej Puzdrowski84591632020-02-24 11:50:19 +010063volatile bool boot_log_stop = false;
64K_SEM_DEFINE(boot_log_sem, 1, 1);
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +010065
66/* log processing need to be initalized by the application */
67#define ZEPHYR_BOOT_LOG_START() zephyr_boot_log_start()
Andrzej Puzdrowski84591632020-02-24 11:50:19 +010068#define ZEPHYR_BOOT_LOG_STOP() zephyr_boot_log_stop()
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +010069#endif /* CONFIG_LOG_PROCESS_THREAD */
70#else
71/* synchronous log mode doesn't need to be initalized by the application */
72#define ZEPHYR_BOOT_LOG_START() do { } while (false)
Andrzej Puzdrowski84591632020-02-24 11:50:19 +010073#define ZEPHYR_BOOT_LOG_STOP() do { } while (false)
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +010074#endif /* defined(CONFIG_LOG) && !defined(CONFIG_LOG_IMMEDIATE) */
75
Jon Helge Nistade58f9bd2019-11-25 15:59:52 +010076#ifdef CONFIG_SOC_FAMILY_NRF
77#include <hal/nrf_power.h>
78
79static inline bool boot_skip_serial_recovery()
80{
Fabio Utzig63b4eac2019-12-17 09:59:47 -030081#if NRF_POWER_HAS_RESETREAS
Jon Helge Nistade58f9bd2019-11-25 15:59:52 +010082 u32_t rr = nrf_power_resetreas_get(NRF_POWER);
83
84 return !(rr == 0 || (rr & NRF_POWER_RESETREAS_RESETPIN_MASK));
85#else
86 return false;
87#endif
88}
89#else
90static inline bool boot_skip_serial_recovery()
91{
92 return false;
93}
94#endif
95
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +010096MCUBOOT_LOG_MODULE_REGISTER(mcuboot);
97
Andrew Boie7238f512017-03-02 13:39:06 -080098void os_heap_init(void);
99
100#if defined(CONFIG_ARM)
101struct arm_vector_table {
David Brown0d0652a2017-04-11 17:33:30 -0600102 uint32_t msp;
103 uint32_t reset;
David Brown5153bd62017-01-06 11:16:53 -0700104};
105
Emanuele Di Santofcfff582018-11-01 16:06:36 +0100106extern void sys_clock_disable(void);
107
Andrew Boie7238f512017-03-02 13:39:06 -0800108static void do_boot(struct boot_rsp *rsp)
109{
David Brown0d0652a2017-04-11 17:33:30 -0600110 struct arm_vector_table *vt;
Marti Bolivareb940802017-05-01 23:15:29 -0400111 uintptr_t flash_base;
112 int rc;
Andrew Boie7238f512017-03-02 13:39:06 -0800113
David Brown0d0652a2017-04-11 17:33:30 -0600114 /* The beginning of the image is the ARM vector table, containing
115 * the initial stack pointer address and the reset vector
116 * consecutively. Manually set the stack pointer and jump into the
117 * reset vector
118 */
Marti Bolivareb940802017-05-01 23:15:29 -0400119 rc = flash_device_base(rsp->br_flash_dev_id, &flash_base);
120 assert(rc == 0);
121
122 vt = (struct arm_vector_table *)(flash_base +
123 rsp->br_image_off +
David Brown0d0652a2017-04-11 17:33:30 -0600124 rsp->br_hdr->ih_hdr_size);
125 irq_lock();
Andrzej Puzdrowski960a2d62019-08-12 16:28:26 +0200126#ifdef CONFIG_SYS_CLOCK_EXISTS
David Brown0d0652a2017-04-11 17:33:30 -0600127 sys_clock_disable();
Andrzej Puzdrowski960a2d62019-08-12 16:28:26 +0200128#endif
Jun Li01bef712019-05-08 21:55:54 -0700129#ifdef CONFIG_USB
Emanuele Di Santoc4bf7802018-07-20 11:39:57 +0200130 /* Disable the USB to prevent it from firing interrupts */
131 usb_disable();
132#endif
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100133#if CONFIG_MCUBOOT_CLEANUP_ARM_CORE
134 cleanup_arm_nvic(); /* cleanup NVIC registers */
135#endif
David Brown57837b92018-03-13 15:56:38 -0600136 __set_MSP(vt->msp);
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100137#if CONFIG_MCUBOOT_CLEANUP_ARM_CORE
138 __set_CONTROL(0x00); /* application will configures core on its own */
139#endif
David Brown0d0652a2017-04-11 17:33:30 -0600140 ((void (*)(void))vt->reset)();
Andrew Boie7238f512017-03-02 13:39:06 -0800141}
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530142
143#elif defined(CONFIG_XTENSA)
144#define SRAM_BASE_ADDRESS 0xBE030000
145
146static void copy_img_to_SRAM(int slot, unsigned int hdr_offset)
147{
148 const struct flash_area *fap;
149 int area_id;
150 int rc;
151 unsigned char *dst = (unsigned char *)(SRAM_BASE_ADDRESS + hdr_offset);
152
153 BOOT_LOG_INF("Copying image to SRAM");
154
155 area_id = flash_area_id_from_image_slot(slot);
156 rc = flash_area_open(area_id, &fap);
157 if (rc != 0) {
Fabio Utzigcac58f62019-09-06 08:52:35 -0300158 BOOT_LOG_ERR("flash_area_open failed with %d\n", rc);
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530159 goto done;
160 }
161
162 rc = flash_area_read(fap, hdr_offset, dst, fap->fa_size - hdr_offset);
163 if (rc != 0) {
Fabio Utzigcac58f62019-09-06 08:52:35 -0300164 BOOT_LOG_ERR("flash_area_read failed with %d\n", rc);
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530165 goto done;
166 }
167
168done:
169 flash_area_close(fap);
170}
171
172/* Entry point (.ResetVector) is at the very beginning of the image.
173 * Simply copy the image to a suitable location and jump there.
174 */
175static void do_boot(struct boot_rsp *rsp)
176{
177 void *start;
178
179 BOOT_LOG_INF("br_image_off = 0x%x\n", rsp->br_image_off);
180 BOOT_LOG_INF("ih_hdr_size = 0x%x\n", rsp->br_hdr->ih_hdr_size);
181
182 /* Copy from the flash to HP SRAM */
183 copy_img_to_SRAM(0, rsp->br_hdr->ih_hdr_size);
184
185 /* Jump to entry point */
186 start = (void *)(SRAM_BASE_ADDRESS + rsp->br_hdr->ih_hdr_size);
187 ((void (*)(void))start)();
188}
189
Andrew Boie7238f512017-03-02 13:39:06 -0800190#else
191/* Default: Assume entry point is at the very beginning of the image. Simply
192 * lock interrupts and jump there. This is the right thing to do for X86 and
193 * possibly other platforms.
194 */
195static void do_boot(struct boot_rsp *rsp)
196{
Marti Bolivareb940802017-05-01 23:15:29 -0400197 uintptr_t flash_base;
David Brown0d0652a2017-04-11 17:33:30 -0600198 void *start;
Marti Bolivareb940802017-05-01 23:15:29 -0400199 int rc;
Andrew Boie7238f512017-03-02 13:39:06 -0800200
Marti Bolivareb940802017-05-01 23:15:29 -0400201 rc = flash_device_base(rsp->br_flash_dev_id, &flash_base);
202 assert(rc == 0);
203
204 start = (void *)(flash_base + rsp->br_image_off +
205 rsp->br_hdr->ih_hdr_size);
Andrew Boie7238f512017-03-02 13:39:06 -0800206
David Brown0d0652a2017-04-11 17:33:30 -0600207 /* Lock interrupts and dive into the entry point */
208 irq_lock();
209 ((void (*)(void))start)();
Andrew Boie7238f512017-03-02 13:39:06 -0800210}
211#endif
David Brown5153bd62017-01-06 11:16:53 -0700212
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100213#if defined(CONFIG_LOG) && !defined(CONFIG_LOG_IMMEDIATE) &&\
214 !defined(CONFIG_LOG_PROCESS_THREAD)
215/* The log internal thread for log processing can't transfer log well as has too
216 * low priority.
217 * Dedicated thread for log processing below uses highest application
218 * priority. This allows to transmit all logs without adding k_sleep/k_yield
219 * anywhere else int the code.
220 */
221
222/* most simple log processing theread */
223void boot_log_thread_func(void *dummy1, void *dummy2, void *dummy3)
224{
225 (void)dummy1;
226 (void)dummy2;
227 (void)dummy3;
228
229 log_init();
230
231 while (1) {
232 if (log_process(false) == false) {
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100233 if (boot_log_stop) {
234 break;
235 }
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100236 k_sleep(BOOT_LOG_PROCESSING_INTERVAL);
237 }
238 }
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100239
240 k_sem_give(&boot_log_sem);
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100241}
242
243void zephyr_boot_log_start(void)
244{
245 /* start logging thread */
246 k_thread_create(&boot_log_thread, boot_log_stack,
247 K_THREAD_STACK_SIZEOF(boot_log_stack),
248 boot_log_thread_func, NULL, NULL, NULL,
249 K_HIGHEST_APPLICATION_THREAD_PRIO, 0,
250 BOOT_LOG_PROCESSING_INTERVAL);
251
252 k_thread_name_set(&boot_log_thread, "logging");
253}
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100254
255void zephyr_boot_log_stop(void)
256{
257 boot_log_stop = true;
258
259 /* wait until log procesing thread expired
260 * This can be reworked using a thread_join() API once a such will be
261 * available in zephyr.
262 * see https://github.com/zephyrproject-rtos/zephyr/issues/21500
263 */
264 (void)k_sem_take(&boot_log_sem, K_FOREVER);
265}
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100266#endif/* defined(CONFIG_LOG) && !defined(CONFIG_LOG_IMMEDIATE) &&\
267 !defined(CONFIG_LOG_PROCESS_THREAD) */
268
David Brown5153bd62017-01-06 11:16:53 -0700269void main(void)
270{
David Brown0d0652a2017-04-11 17:33:30 -0600271 struct boot_rsp rsp;
272 int rc;
David Brown5153bd62017-01-06 11:16:53 -0700273
David Brown0d0652a2017-04-11 17:33:30 -0600274 BOOT_LOG_INF("Starting bootloader");
Ricardo Salveti7cf3d9e2017-01-18 16:38:22 -0200275
David Brown0d0652a2017-04-11 17:33:30 -0600276 os_heap_init();
David Brown5153bd62017-01-06 11:16:53 -0700277
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100278 ZEPHYR_BOOT_LOG_START();
279
Kumar Gala32b61f32020-04-08 12:02:03 -0500280#if (!defined(CONFIG_XTENSA) && defined(DT_CHOSEN_ZEPHYR_FLASH_CONTROLLER_LABEL))
281 if (!flash_device_get_binding(DT_CHOSEN_ZEPHYR_FLASH_CONTROLLER_LABEL)) {
282 BOOT_LOG_ERR("Flash device %s not found",
283 DT_CHOSEN_ZEPHYR_FLASH_CONTROLLER_LABEL);
David Brown0d0652a2017-04-11 17:33:30 -0600284 while (1)
285 ;
286 }
Rajavardhan Gundi24321c32019-02-08 12:48:34 +0530287#elif (defined(CONFIG_XTENSA) && defined(DT_JEDEC_SPI_NOR_0_LABEL))
288 if (!flash_device_get_binding(DT_JEDEC_SPI_NOR_0_LABEL)) {
289 BOOT_LOG_ERR("Flash device %s not found", DT_JEDEC_SPI_NOR_0_LABEL);
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530290 while (1)
291 ;
292 }
Rajavardhan Gundic3353b22018-12-06 17:24:10 +0530293#endif
David Brown5153bd62017-01-06 11:16:53 -0700294
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200295#ifdef CONFIG_MCUBOOT_SERIAL
296
297 struct device *detect_port;
Peter Bigot36e90292020-01-30 05:36:47 -0600298 u32_t detect_value = !CONFIG_BOOT_SERIAL_DETECT_PIN_VAL;
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200299
300 detect_port = device_get_binding(CONFIG_BOOT_SERIAL_DETECT_PORT);
301 __ASSERT(detect_port, "Error: Bad port for boot serial detection.\n");
302
Peter Bigot36e90292020-01-30 05:36:47 -0600303 /* The default presence value is 0 which would normally be
304 * active-low, but historically the raw value was checked so we'll
305 * use the raw interface.
306 */
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200307 rc = gpio_pin_configure(detect_port, CONFIG_BOOT_SERIAL_DETECT_PIN,
Peter Bigot36e90292020-01-30 05:36:47 -0600308#ifdef GPIO_INPUT
309 GPIO_INPUT | GPIO_PULL_UP
310#else
311 GPIO_DIR_IN | GPIO_PUD_PULL_UP
312#endif
Andrzej Puzdrowski5d96bd22020-02-20 10:35:33 +0100313 );
Andrzej Puzdrowski82d73952018-06-13 14:55:51 +0200314 __ASSERT(rc == 0, "Error of boot detect pin initialization.\n");
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200315
Peter Bigot36e90292020-01-30 05:36:47 -0600316#ifdef GPIO_INPUT
317 rc = gpio_pin_get_raw(detect_port, CONFIG_BOOT_SERIAL_DETECT_PIN);
318 detect_value = rc;
319#else
Emanuele Di Santofcfff582018-11-01 16:06:36 +0100320 rc = gpio_pin_read(detect_port, CONFIG_BOOT_SERIAL_DETECT_PIN,
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200321 &detect_value);
Peter Bigot36e90292020-01-30 05:36:47 -0600322#endif
323 __ASSERT(rc >= 0, "Error of the reading the detect pin.\n");
Jon Helge Nistade58f9bd2019-11-25 15:59:52 +0100324 if (detect_value == CONFIG_BOOT_SERIAL_DETECT_PIN_VAL &&
325 !boot_skip_serial_recovery()) {
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200326 BOOT_LOG_INF("Enter the serial recovery mode");
Marko Kiiskila149b4572018-06-06 14:18:54 +0300327 rc = boot_console_init();
Carles Cufie2a36122018-06-15 10:51:02 +0200328 __ASSERT(rc == 0, "Error initializing boot console.\n");
Marko Kiiskila149b4572018-06-06 14:18:54 +0300329 boot_serial_start(&boot_funcs);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200330 __ASSERT(0, "Bootloader serial process was terminated unexpectedly.\n");
331 }
332#endif
333
Rajavardhan Gundi51c9d702019-02-20 14:08:52 +0530334#ifdef CONFIG_BOOT_WAIT_FOR_USB_DFU
Andrzej Puzdrowskiac1f1ff2020-02-05 08:40:12 +0100335 rc = usb_enable(NULL);
336 if (rc) {
337 BOOT_LOG_ERR("Cannot enable USB");
338 } else {
339 BOOT_LOG_INF("Waiting for USB DFU");
340 wait_for_usb_dfu();
341 BOOT_LOG_INF("USB DFU wait time elapsed");
342 }
Rajavardhan Gundi51c9d702019-02-20 14:08:52 +0530343#endif
344
David Brown0d0652a2017-04-11 17:33:30 -0600345 rc = boot_go(&rsp);
346 if (rc != 0) {
347 BOOT_LOG_ERR("Unable to find bootable image");
348 while (1)
349 ;
350 }
David Brown5153bd62017-01-06 11:16:53 -0700351
Marti Bolivar88f48d92017-05-01 22:30:02 -0400352 BOOT_LOG_INF("Bootloader chainload address offset: 0x%x",
353 rsp.br_image_off);
Andrzej Puzdrowskib788c712018-04-12 12:42:49 +0200354
David Brown0d0652a2017-04-11 17:33:30 -0600355 BOOT_LOG_INF("Jumping to the first image slot");
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100356 ZEPHYR_BOOT_LOG_STOP();
David Brown0d0652a2017-04-11 17:33:30 -0600357 do_boot(&rsp);
David Brown5153bd62017-01-06 11:16:53 -0700358
David Brown0d0652a2017-04-11 17:33:30 -0600359 BOOT_LOG_ERR("Never should get here");
360 while (1)
361 ;
David Brown5153bd62017-01-06 11:16:53 -0700362}