blob: fe0016c8cf037edfc3b8a50b291ebf4694857c93 [file] [log] [blame]
David Brown5153bd62017-01-06 11:16:53 -07001/*
2 * Copyright (c) 2012-2014 Wind River Systems, Inc.
Tamas Banee6615d2020-09-30 07:58:48 +01003 * Copyright (c) 2020 Arm Limited
Jamie McCraeb3e3ce32023-02-22 09:11:57 +00004 * Copyright (c) 2021-2023 Nordic Semiconductor ASA
David Brown5153bd62017-01-06 11:16:53 -07005 *
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
9 *
10 * http://www.apache.org/licenses/LICENSE-2.0
11 *
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
17 */
18
Marti Bolivareb940802017-05-01 23:15:29 -040019#include <assert.h>
Gerard Marull-Paretas34dd9e72022-05-09 12:13:12 +020020#include <zephyr/kernel.h>
Gerard Marull-Paretas3cd2cec2022-05-09 12:10:05 +020021#include <zephyr/devicetree.h>
22#include <zephyr/drivers/gpio.h>
23#include <zephyr/sys/__assert.h>
24#include <zephyr/drivers/flash.h>
25#include <zephyr/drivers/timer/system_timer.h>
26#include <zephyr/usb/usb_device.h>
Evan Gates4632d8d2018-06-28 13:27:40 -070027#include <soc.h>
Gerard Marull-Paretas3cd2cec2022-05-09 12:10:05 +020028#include <zephyr/linker/linker-defs.h>
David Brown5153bd62017-01-06 11:16:53 -070029
Jamie McCrae24ac8cc2024-03-19 08:18:44 +000030#if defined(CONFIG_BOOT_DISABLE_CACHES)
31#include <zephyr/cache.h>
32#endif
33
Lucas Tamborrino9bf7ce82023-09-05 11:20:50 -030034#if defined(CONFIG_ARM)
Gerard Marull-Paretas11ecbf62023-06-30 09:58:41 +020035#include <cmsis_core.h>
Lucas Tamborrino9bf7ce82023-09-05 11:20:50 -030036#endif
Yonatan Schachterb22eb6a2022-07-29 18:16:09 +030037
Jamie McCrae433b8482023-08-16 07:33:24 +010038#include "io/io.h"
Marti Bolivar51181cf2017-03-20 11:03:41 -040039#include "target.h"
40
Marti Bolivar4a97b4c2017-01-31 18:20:02 -050041#include "bootutil/bootutil_log.h"
Ricardo Salveti3a2c1242017-01-19 10:22:35 -020042#include "bootutil/image.h"
43#include "bootutil/bootutil.h"
Tamas Banee6615d2020-09-30 07:58:48 +010044#include "bootutil/fault_injection_hardening.h"
Jamie McCrae56cb6102022-03-23 11:57:03 +000045#include "bootutil/mcuboot_status.h"
Andrzej Puzdrowskib788c712018-04-12 12:42:49 +020046#include "flash_map_backend/flash_map_backend.h"
Ricardo Salveti3a2c1242017-01-19 10:22:35 -020047
Marek Matej67693442023-01-23 17:54:36 +010048/* Check if Espressif target is supported */
Sylvio Alvesb794d332024-03-04 10:08:30 -030049#ifdef CONFIG_SOC_FAMILY_ESPRESSIF_ESP32
Marek Matej67693442023-01-23 17:54:36 +010050
51#include <bootloader_init.h>
Marek Matejc87d41e2024-08-16 22:41:36 +020052#include <esp_image_loader.h>
Marek Matej67693442023-01-23 17:54:36 +010053
54#define IMAGE_INDEX_0 0
55#define IMAGE_INDEX_1 1
56
57#define PRIMARY_SLOT 0
58#define SECONDARY_SLOT 1
59
60#define IMAGE0_PRIMARY_START_ADDRESS \
61 DT_PROP_BY_IDX(DT_NODE_BY_FIXED_PARTITION_LABEL(image_0), reg, 0)
62#define IMAGE0_PRIMARY_SIZE \
63 DT_PROP_BY_IDX(DT_NODE_BY_FIXED_PARTITION_LABEL(image_0), reg, 1)
64
65#define IMAGE1_PRIMARY_START_ADDRESS \
66 DT_PROP_BY_IDX(DT_NODE_BY_FIXED_PARTITION_LABEL(image_1), reg, 0)
67#define IMAGE1_PRIMARY_SIZE \
68 DT_PROP_BY_IDX(DT_NODE_BY_FIXED_PARTITION_LABEL(image_1), reg, 1)
69
Sylvio Alvesb794d332024-03-04 10:08:30 -030070#endif /* CONFIG_SOC_FAMILY_ESPRESSIF_ESP32 */
Marek Matej67693442023-01-23 17:54:36 +010071
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020072#ifdef CONFIG_MCUBOOT_SERIAL
Marko Kiiskila149b4572018-06-06 14:18:54 +030073#include "boot_serial/boot_serial.h"
74#include "serial_adapter/serial_adapter.h"
75
76const struct boot_uart_funcs boot_funcs = {
77 .read = console_read,
78 .write = console_write
79};
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020080#endif
81
Josh Gao837cf882020-11-13 18:51:27 -080082#if defined(CONFIG_BOOT_USB_DFU_WAIT) || defined(CONFIG_BOOT_USB_DFU_GPIO)
Gerard Marull-Paretas3cd2cec2022-05-09 12:10:05 +020083#include <zephyr/usb/class/usb_dfu.h>
Rajavardhan Gundi51c9d702019-02-20 14:08:52 +053084#endif
85
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +010086#if CONFIG_MCUBOOT_CLEANUP_ARM_CORE
87#include <arm_cleanup.h>
88#endif
89
Gerard Marull-Paretasa513b8e2021-01-26 22:50:38 +010090/* CONFIG_LOG_MINIMAL is the legacy Kconfig property,
91 * replaced by CONFIG_LOG_MODE_MINIMAL.
92 */
Dominik Ermel5b7ed6a2021-02-26 14:26:48 +000093#if (defined(CONFIG_LOG_MODE_MINIMAL) || defined(CONFIG_LOG_MINIMAL))
94#define ZEPHYR_LOG_MODE_MINIMAL 1
95#endif
Gerard Marull-Paretasa513b8e2021-01-26 22:50:38 +010096
Marek Pietafb47d2e2022-03-11 14:24:07 +010097/* CONFIG_LOG_IMMEDIATE is the legacy Kconfig property,
98 * replaced by CONFIG_LOG_MODE_IMMEDIATE.
99 */
100#if (defined(CONFIG_LOG_MODE_IMMEDIATE) || defined(CONFIG_LOG_IMMEDIATE))
101#define ZEPHYR_LOG_MODE_IMMEDIATE 1
102#endif
103
104#if defined(CONFIG_LOG) && !defined(ZEPHYR_LOG_MODE_IMMEDIATE) && \
Dominik Ermel5b7ed6a2021-02-26 14:26:48 +0000105 !defined(ZEPHYR_LOG_MODE_MINIMAL)
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100106#ifdef CONFIG_LOG_PROCESS_THREAD
107#warning "The log internal thread for log processing can't transfer the log"\
108 "well for MCUBoot."
109#else
Gerard Marull-Paretas3cd2cec2022-05-09 12:10:05 +0200110#include <zephyr/logging/log_ctrl.h>
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100111
Krzysztof Chruscinski821214e2020-03-24 07:50:32 +0100112#define BOOT_LOG_PROCESSING_INTERVAL K_MSEC(30) /* [ms] */
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100113
114/* log are processing in custom routine */
Andrzej Puzdrowskiaf148532020-02-25 12:51:26 +0100115K_THREAD_STACK_DEFINE(boot_log_stack, CONFIG_MCUBOOT_LOG_THREAD_STACK_SIZE);
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100116struct k_thread boot_log_thread;
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100117volatile bool boot_log_stop = false;
118K_SEM_DEFINE(boot_log_sem, 1, 1);
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100119
120/* log processing need to be initalized by the application */
121#define ZEPHYR_BOOT_LOG_START() zephyr_boot_log_start()
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100122#define ZEPHYR_BOOT_LOG_STOP() zephyr_boot_log_stop()
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100123#endif /* CONFIG_LOG_PROCESS_THREAD */
124#else
125/* synchronous log mode doesn't need to be initalized by the application */
126#define ZEPHYR_BOOT_LOG_START() do { } while (false)
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100127#define ZEPHYR_BOOT_LOG_STOP() do { } while (false)
Marek Pietafb47d2e2022-03-11 14:24:07 +0100128#endif /* defined(CONFIG_LOG) && !defined(ZEPHYR_LOG_MODE_IMMEDIATE) && \
129 * !defined(ZEPHYR_LOG_MODE_MINIMAL)
130 */
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100131
Carlos Falgueras Garcíaa4b4b0f2021-06-22 10:00:22 +0200132BOOT_LOG_MODULE_REGISTER(mcuboot);
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +0100133
Andrew Boie7238f512017-03-02 13:39:06 -0800134void os_heap_init(void);
135
136#if defined(CONFIG_ARM)
Rafał Kuźniad854bb62020-06-17 15:06:47 +0200137
Rafał Kuźniad854bb62020-06-17 15:06:47 +0200138#ifdef CONFIG_SW_VECTOR_RELAY
139extern void *_vector_table_pointer;
Rafał Kuźniad854bb62020-06-17 15:06:47 +0200140#endif
141
Andrew Boie7238f512017-03-02 13:39:06 -0800142struct arm_vector_table {
David Brown0d0652a2017-04-11 17:33:30 -0600143 uint32_t msp;
144 uint32_t reset;
David Brown5153bd62017-01-06 11:16:53 -0700145};
146
Andrew Boie7238f512017-03-02 13:39:06 -0800147static void do_boot(struct boot_rsp *rsp)
148{
David Brown0d0652a2017-04-11 17:33:30 -0600149 struct arm_vector_table *vt;
Andrew Boie7238f512017-03-02 13:39:06 -0800150
David Brown0d0652a2017-04-11 17:33:30 -0600151 /* The beginning of the image is the ARM vector table, containing
152 * the initial stack pointer address and the reset vector
153 * consecutively. Manually set the stack pointer and jump into the
154 * reset vector
155 */
Daniel DeGrassee4574442022-09-01 15:47:01 -0500156#ifdef CONFIG_BOOT_RAM_LOAD
157 /* Get ram address for image */
158 vt = (struct arm_vector_table *)(rsp->br_hdr->ih_load_addr + rsp->br_hdr->ih_hdr_size);
159#else
Daniel DeGrassee4574442022-09-01 15:47:01 -0500160 int rc;
Mahesh Mahadevan453096b2024-02-06 21:06:54 -0600161 const struct flash_area *fap;
162 static uint32_t dst[2];
Daniel DeGrassee4574442022-09-01 15:47:01 -0500163
164 /* Jump to flash image */
Mahesh Mahadevan453096b2024-02-06 21:06:54 -0600165 rc = flash_area_open(rsp->br_flash_dev_id, &fap);
Marti Bolivareb940802017-05-01 23:15:29 -0400166 assert(rc == 0);
167
Mahesh Mahadevan453096b2024-02-06 21:06:54 -0600168 rc = flash_area_read(fap, rsp->br_hdr->ih_hdr_size, dst, sizeof(dst));
169 assert(rc == 0);
170#ifndef CONFIG_ASSERT
171 /* Enter a lock up as asserts are disabled */
172 if (rc != 0) {
173 while (1);
174 }
175#endif
176
177 flash_area_close(fap);
178
179 vt = (struct arm_vector_table *)dst;
Daniel DeGrassee4574442022-09-01 15:47:01 -0500180#endif
Arvid Rosén9ed399c2020-08-19 08:57:11 +0200181
Joakim Andersson90b8f692022-12-21 15:52:53 +0100182 if (IS_ENABLED(CONFIG_SYSTEM_TIMER_HAS_DISABLE_SUPPORT)) {
183 sys_clock_disable();
184 }
Andrzej Puzdrowskie9c6b4d2021-12-14 14:09:02 +0100185
Johann Fischerd2e87aa2021-08-27 13:30:07 +0200186#ifdef CONFIG_USB_DEVICE_STACK
Emanuele Di Santoc4bf7802018-07-20 11:39:57 +0200187 /* Disable the USB to prevent it from firing interrupts */
188 usb_disable();
189#endif
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100190#if CONFIG_MCUBOOT_CLEANUP_ARM_CORE
191 cleanup_arm_nvic(); /* cleanup NVIC registers */
Ioannis Glaropoulos70af7082020-10-22 15:14:48 +0200192
Jamie McCrae24ac8cc2024-03-19 08:18:44 +0000193#if defined(CONFIG_BOOT_DISABLE_CACHES)
194 /* Flush and disable instruction/data caches before chain-loading the application */
195 (void)sys_cache_instr_flush_all();
196 (void)sys_cache_data_flush_all();
197 sys_cache_instr_disable();
198 sys_cache_data_disable();
Ioannis Glaropoulos70af7082020-10-22 15:14:48 +0200199#endif
200
Henrik Brix Andersen008f4a72020-12-08 14:40:19 +0100201#if CONFIG_CPU_HAS_ARM_MPU || CONFIG_CPU_HAS_NXP_MPU
Ioannis Glaropoulos70af7082020-10-22 15:14:48 +0200202 z_arm_clear_arm_mpu_config();
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100203#endif
Rafał Kuźniad854bb62020-06-17 15:06:47 +0200204
Håkon Øye Amundsen6a8dbba2020-10-01 12:52:38 +0000205#if defined(CONFIG_BUILTIN_STACK_GUARD) && \
206 defined(CONFIG_CPU_CORTEX_M_HAS_SPLIM)
207 /* Reset limit registers to avoid inflicting stack overflow on image
208 * being booted.
209 */
210 __set_PSPLIM(0);
211 __set_MSPLIM(0);
212#endif
213
Sigvart Hovland9647c462021-08-20 16:33:55 +0200214#else
215 irq_lock();
Ioannis Glaropoulos70af7082020-10-22 15:14:48 +0200216#endif /* CONFIG_MCUBOOT_CLEANUP_ARM_CORE */
217
Rafał Kuźniad854bb62020-06-17 15:06:47 +0200218#ifdef CONFIG_BOOT_INTR_VEC_RELOC
Rafał Kuźnia505c6e62020-07-17 13:18:15 +0200219#if defined(CONFIG_SW_VECTOR_RELAY)
220 _vector_table_pointer = vt;
221#ifdef CONFIG_CPU_CORTEX_M_HAS_VTOR
222 SCB->VTOR = (uint32_t)__vector_relay_table;
Rafał Kuźniad854bb62020-06-17 15:06:47 +0200223#endif
Rafał Kuźnia505c6e62020-07-17 13:18:15 +0200224#elif defined(CONFIG_CPU_CORTEX_M_HAS_VTOR)
225 SCB->VTOR = (uint32_t)vt;
226#endif /* CONFIG_SW_VECTOR_RELAY */
227#else /* CONFIG_BOOT_INTR_VEC_RELOC */
228#if defined(CONFIG_CPU_CORTEX_M_HAS_VTOR) && defined(CONFIG_SW_VECTOR_RELAY)
229 _vector_table_pointer = _vector_start;
230 SCB->VTOR = (uint32_t)__vector_relay_table;
231#endif
232#endif /* CONFIG_BOOT_INTR_VEC_RELOC */
Rafał Kuźniad854bb62020-06-17 15:06:47 +0200233
David Brown57837b92018-03-13 15:56:38 -0600234 __set_MSP(vt->msp);
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100235#if CONFIG_MCUBOOT_CLEANUP_ARM_CORE
236 __set_CONTROL(0x00); /* application will configures core on its own */
Andrzej Puzdrowski56c15e72020-10-29 09:16:50 +0100237 __ISB();
Andrzej Puzdrowski9a605b62020-03-16 13:34:30 +0100238#endif
David Brown0d0652a2017-04-11 17:33:30 -0600239 ((void (*)(void))vt->reset)();
Andrew Boie7238f512017-03-02 13:39:06 -0800240}
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530241
Marek Matej67693442023-01-23 17:54:36 +0100242#elif defined(CONFIG_XTENSA) || defined(CONFIG_RISCV)
243
Sylvio Alvesb794d332024-03-04 10:08:30 -0300244#ifndef CONFIG_SOC_FAMILY_ESPRESSIF_ESP32
Marek Matej67693442023-01-23 17:54:36 +0100245
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530246#define SRAM_BASE_ADDRESS 0xBE030000
247
248static void copy_img_to_SRAM(int slot, unsigned int hdr_offset)
249{
250 const struct flash_area *fap;
251 int area_id;
252 int rc;
253 unsigned char *dst = (unsigned char *)(SRAM_BASE_ADDRESS + hdr_offset);
254
255 BOOT_LOG_INF("Copying image to SRAM");
256
257 area_id = flash_area_id_from_image_slot(slot);
258 rc = flash_area_open(area_id, &fap);
259 if (rc != 0) {
Fabio Utzigcac58f62019-09-06 08:52:35 -0300260 BOOT_LOG_ERR("flash_area_open failed with %d\n", rc);
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530261 goto done;
262 }
263
264 rc = flash_area_read(fap, hdr_offset, dst, fap->fa_size - hdr_offset);
265 if (rc != 0) {
Fabio Utzigcac58f62019-09-06 08:52:35 -0300266 BOOT_LOG_ERR("flash_area_read failed with %d\n", rc);
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530267 goto done;
268 }
269
270done:
271 flash_area_close(fap);
272}
Sylvio Alvesb794d332024-03-04 10:08:30 -0300273#endif /* !CONFIG_SOC_FAMILY_ESPRESSIF_ESP32 */
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530274
275/* Entry point (.ResetVector) is at the very beginning of the image.
276 * Simply copy the image to a suitable location and jump there.
277 */
278static void do_boot(struct boot_rsp *rsp)
279{
Sylvio Alves334d2c22024-07-01 13:12:27 -0300280#ifndef CONFIG_SOC_FAMILY_ESPRESSIF_ESP32
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530281 void *start;
Sylvio Alves334d2c22024-07-01 13:12:27 -0300282#endif /* CONFIG_SOC_FAMILY_ESPRESSIF_ESP32 */
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530283
284 BOOT_LOG_INF("br_image_off = 0x%x\n", rsp->br_image_off);
285 BOOT_LOG_INF("ih_hdr_size = 0x%x\n", rsp->br_hdr->ih_hdr_size);
286
Sylvio Alvesb794d332024-03-04 10:08:30 -0300287#ifdef CONFIG_SOC_FAMILY_ESPRESSIF_ESP32
Marek Matej67693442023-01-23 17:54:36 +0100288 int slot = (rsp->br_image_off == IMAGE0_PRIMARY_START_ADDRESS) ?
289 PRIMARY_SLOT : SECONDARY_SLOT;
290 /* Load memory segments and start from entry point */
291 start_cpu0_image(IMAGE_INDEX_0, slot, rsp->br_hdr->ih_hdr_size);
292#else
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530293 /* Copy from the flash to HP SRAM */
294 copy_img_to_SRAM(0, rsp->br_hdr->ih_hdr_size);
295
296 /* Jump to entry point */
297 start = (void *)(SRAM_BASE_ADDRESS + rsp->br_hdr->ih_hdr_size);
298 ((void (*)(void))start)();
Sylvio Alvesb794d332024-03-04 10:08:30 -0300299#endif /* CONFIG_SOC_FAMILY_ESPRESSIF_ESP32 */
Rajavardhan Gundi40c28e32018-12-09 13:32:01 +0530300}
301
Andrew Boie7238f512017-03-02 13:39:06 -0800302#else
303/* Default: Assume entry point is at the very beginning of the image. Simply
304 * lock interrupts and jump there. This is the right thing to do for X86 and
305 * possibly other platforms.
306 */
307static void do_boot(struct boot_rsp *rsp)
308{
David Brown0d0652a2017-04-11 17:33:30 -0600309 void *start;
Martin Jäger477ed812022-07-21 11:45:45 +0200310
Jim Tanee1b7b92022-04-07 11:26:28 +0800311#if defined(MCUBOOT_RAM_LOAD)
312 start = (void *)(rsp->br_hdr->ih_load_addr + rsp->br_hdr->ih_hdr_size);
313#else
314 uintptr_t flash_base;
Marti Bolivareb940802017-05-01 23:15:29 -0400315 int rc;
Andrew Boie7238f512017-03-02 13:39:06 -0800316
Marti Bolivareb940802017-05-01 23:15:29 -0400317 rc = flash_device_base(rsp->br_flash_dev_id, &flash_base);
318 assert(rc == 0);
319
320 start = (void *)(flash_base + rsp->br_image_off +
321 rsp->br_hdr->ih_hdr_size);
Jim Tanee1b7b92022-04-07 11:26:28 +0800322#endif
Andrew Boie7238f512017-03-02 13:39:06 -0800323
David Brown0d0652a2017-04-11 17:33:30 -0600324 /* Lock interrupts and dive into the entry point */
325 irq_lock();
326 ((void (*)(void))start)();
Andrew Boie7238f512017-03-02 13:39:06 -0800327}
328#endif
David Brown5153bd62017-01-06 11:16:53 -0700329
Marek Pietafb47d2e2022-03-11 14:24:07 +0100330#if defined(CONFIG_LOG) && !defined(ZEPHYR_LOG_MODE_IMMEDIATE) && \
Dominik Ermel5b7ed6a2021-02-26 14:26:48 +0000331 !defined(CONFIG_LOG_PROCESS_THREAD) && !defined(ZEPHYR_LOG_MODE_MINIMAL)
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100332/* The log internal thread for log processing can't transfer log well as has too
333 * low priority.
334 * Dedicated thread for log processing below uses highest application
335 * priority. This allows to transmit all logs without adding k_sleep/k_yield
336 * anywhere else int the code.
337 */
338
339/* most simple log processing theread */
340void boot_log_thread_func(void *dummy1, void *dummy2, void *dummy3)
341{
342 (void)dummy1;
343 (void)dummy2;
344 (void)dummy3;
345
Martin Jäger477ed812022-07-21 11:45:45 +0200346 log_init();
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100347
Martin Jäger477ed812022-07-21 11:45:45 +0200348 while (1) {
Martin Jäger31751822022-07-21 11:49:32 +0200349#if defined(CONFIG_LOG1) || defined(CONFIG_LOG2)
350 /* support Zephyr legacy logging implementation before commit c5f2cde */
Martin Jäger477ed812022-07-21 11:45:45 +0200351 if (log_process(false) == false) {
Martin Jäger31751822022-07-21 11:49:32 +0200352#else
353 if (log_process() == false) {
354#endif
Martin Jäger477ed812022-07-21 11:45:45 +0200355 if (boot_log_stop) {
356 break;
357 }
358 k_sleep(BOOT_LOG_PROCESSING_INTERVAL);
359 }
360 }
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100361
Martin Jäger477ed812022-07-21 11:45:45 +0200362 k_sem_give(&boot_log_sem);
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100363}
364
365void zephyr_boot_log_start(void)
366{
Martin Jäger477ed812022-07-21 11:45:45 +0200367 /* start logging thread */
368 k_thread_create(&boot_log_thread, boot_log_stack,
369 K_THREAD_STACK_SIZEOF(boot_log_stack),
370 boot_log_thread_func, NULL, NULL, NULL,
371 K_HIGHEST_APPLICATION_THREAD_PRIO, 0,
372 BOOT_LOG_PROCESSING_INTERVAL);
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100373
Martin Jäger477ed812022-07-21 11:45:45 +0200374 k_thread_name_set(&boot_log_thread, "logging");
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100375}
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100376
377void zephyr_boot_log_stop(void)
378{
379 boot_log_stop = true;
380
381 /* wait until log procesing thread expired
382 * This can be reworked using a thread_join() API once a such will be
383 * available in zephyr.
384 * see https://github.com/zephyrproject-rtos/zephyr/issues/21500
385 */
386 (void)k_sem_take(&boot_log_sem, K_FOREVER);
387}
Marek Pietafb47d2e2022-03-11 14:24:07 +0100388#endif /* defined(CONFIG_LOG) && !defined(ZEPHYR_LOG_MODE_IMMEDIATE) && \
389 * !defined(CONFIG_LOG_PROCESS_THREAD) && !defined(ZEPHYR_LOG_MODE_MINIMAL)
390 */
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100391
Jamie McCrae6902abb2023-04-04 13:50:43 +0100392#ifdef CONFIG_MCUBOOT_SERIAL
393static void boot_serial_enter()
394{
395 int rc;
396
397#ifdef CONFIG_MCUBOOT_INDICATION_LED
Piotr Dymacz2a74a2b2023-12-05 14:26:22 +0100398 io_led_set(1);
Jamie McCrae6902abb2023-04-04 13:50:43 +0100399#endif
400
401 mcuboot_status_change(MCUBOOT_STATUS_SERIAL_DFU_ENTERED);
402
403 BOOT_LOG_INF("Enter the serial recovery mode");
404 rc = boot_console_init();
405 __ASSERT(rc == 0, "Error initializing boot console.\n");
406 boot_serial_start(&boot_funcs);
407 __ASSERT(0, "Bootloader serial process was terminated unexpectedly.\n");
408}
409#endif
410
Keith Packardec2ac822023-04-27 09:56:10 -0700411int main(void)
David Brown5153bd62017-01-06 11:16:53 -0700412{
David Brown0d0652a2017-04-11 17:33:30 -0600413 struct boot_rsp rsp;
414 int rc;
Michael Grand5047f032022-11-24 16:49:56 +0100415 FIH_DECLARE(fih_rc, FIH_FAILURE);
David Brown5153bd62017-01-06 11:16:53 -0700416
Jeppe Odgaard4420bb62023-04-11 09:43:10 +0200417 MCUBOOT_WATCHDOG_SETUP();
Andrzej Puzdrowski210b3182020-10-13 13:52:15 +0200418 MCUBOOT_WATCHDOG_FEED();
419
Dominik Ermelcd07ed32021-02-17 15:18:01 +0000420#if !defined(MCUBOOT_DIRECT_XIP)
David Brown0d0652a2017-04-11 17:33:30 -0600421 BOOT_LOG_INF("Starting bootloader");
Dominik Ermelcd07ed32021-02-17 15:18:01 +0000422#else
423 BOOT_LOG_INF("Starting Direct-XIP bootloader");
424#endif
Ricardo Salveti7cf3d9e2017-01-18 16:38:22 -0200425
Jared Wolff8e4d7912021-01-21 19:34:05 -0500426#ifdef CONFIG_MCUBOOT_INDICATION_LED
427 /* LED init */
Piotr Dymaczd99154f2023-12-05 13:41:59 +0100428 io_led_init();
Jared Wolff8e4d7912021-01-21 19:34:05 -0500429#endif
430
David Brown0d0652a2017-04-11 17:33:30 -0600431 os_heap_init();
David Brown5153bd62017-01-06 11:16:53 -0700432
Andrzej Puzdrowski3f092bd2020-02-17 13:25:32 +0100433 ZEPHYR_BOOT_LOG_START();
434
Tamas Banee6615d2020-09-30 07:58:48 +0100435 (void)rc;
436
Jamie McCrae56cb6102022-03-23 11:57:03 +0000437 mcuboot_status_change(MCUBOOT_STATUS_STARTUP);
438
Jamie McCraeb3e3ce32023-02-22 09:11:57 +0000439#ifdef CONFIG_BOOT_SERIAL_ENTRANCE_GPIO
Jamie McCrae433b8482023-08-16 07:33:24 +0100440 if (io_detect_pin() &&
441 !io_boot_skip_serial_recovery()) {
Jamie McCrae6902abb2023-04-04 13:50:43 +0100442 boot_serial_enter();
Josh Gao837cf882020-11-13 18:51:27 -0800443 }
444#endif
445
Jamie McCrae35941fe2023-03-28 10:04:18 +0100446#ifdef CONFIG_BOOT_SERIAL_PIN_RESET
Jamie McCrae433b8482023-08-16 07:33:24 +0100447 if (io_detect_pin_reset()) {
Jamie McCrae6902abb2023-04-04 13:50:43 +0100448 boot_serial_enter();
Jamie McCrae35941fe2023-03-28 10:04:18 +0100449 }
450#endif
451
Josh Gao837cf882020-11-13 18:51:27 -0800452#if defined(CONFIG_BOOT_USB_DFU_GPIO)
Jamie McCrae433b8482023-08-16 07:33:24 +0100453 if (io_detect_pin()) {
Josh Gao837cf882020-11-13 18:51:27 -0800454#ifdef CONFIG_MCUBOOT_INDICATION_LED
Piotr Dymacz2a74a2b2023-12-05 14:26:22 +0100455 io_led_set(1);
Josh Gao837cf882020-11-13 18:51:27 -0800456#endif
Jamie McCrae56cb6102022-03-23 11:57:03 +0000457
458 mcuboot_status_change(MCUBOOT_STATUS_USB_DFU_ENTERED);
459
Josh Gao837cf882020-11-13 18:51:27 -0800460 rc = usb_enable(NULL);
461 if (rc) {
462 BOOT_LOG_ERR("Cannot enable USB");
463 } else {
464 BOOT_LOG_INF("Waiting for USB DFU");
465 wait_for_usb_dfu(K_FOREVER);
466 BOOT_LOG_INF("USB DFU wait time elapsed");
467 }
468 }
469#elif defined(CONFIG_BOOT_USB_DFU_WAIT)
Andrzej Puzdrowskiac1f1ff2020-02-05 08:40:12 +0100470 rc = usb_enable(NULL);
471 if (rc) {
472 BOOT_LOG_ERR("Cannot enable USB");
473 } else {
474 BOOT_LOG_INF("Waiting for USB DFU");
Jamie McCrae56cb6102022-03-23 11:57:03 +0000475
476 mcuboot_status_change(MCUBOOT_STATUS_USB_DFU_WAITING);
477
Josh Gao837cf882020-11-13 18:51:27 -0800478 wait_for_usb_dfu(K_MSEC(CONFIG_BOOT_USB_DFU_WAIT_DELAY_MS));
Andrzej Puzdrowskiac1f1ff2020-02-05 08:40:12 +0100479 BOOT_LOG_INF("USB DFU wait time elapsed");
Jamie McCrae56cb6102022-03-23 11:57:03 +0000480
481 mcuboot_status_change(MCUBOOT_STATUS_USB_DFU_TIMED_OUT);
Andrzej Puzdrowskiac1f1ff2020-02-05 08:40:12 +0100482 }
Rajavardhan Gundi51c9d702019-02-20 14:08:52 +0530483#endif
484
Wouter Cappellee3822f82022-01-19 15:39:43 +0100485#ifdef CONFIG_BOOT_SERIAL_WAIT_FOR_DFU
486 /* Initialize the boot console, so we can already fill up our buffers while
487 * waiting for the boot image check to finish. This image check, can take
488 * some time, so it's better to reuse thistime to already receive the
489 * initial mcumgr command(s) into our buffers
490 */
491 rc = boot_console_init();
492 int timeout_in_ms = CONFIG_BOOT_SERIAL_WAIT_FOR_DFU_TIMEOUT;
493 uint32_t start = k_uptime_get_32();
Piotr Dymacz3790f5f2022-12-15 14:58:45 +0100494
495#ifdef CONFIG_MCUBOOT_INDICATION_LED
Piotr Dymacz2a74a2b2023-12-05 14:26:22 +0100496 io_led_set(1);
Piotr Dymacz3790f5f2022-12-15 14:58:45 +0100497#endif
Wouter Cappellee3822f82022-01-19 15:39:43 +0100498#endif
499
Tamas Banee6615d2020-09-30 07:58:48 +0100500 FIH_CALL(boot_go, fih_rc, &rsp);
Wouter Cappellee3822f82022-01-19 15:39:43 +0100501
Jamie McCraeb3e3ce32023-02-22 09:11:57 +0000502#ifdef CONFIG_BOOT_SERIAL_BOOT_MODE
Jamie McCrae433b8482023-08-16 07:33:24 +0100503 if (io_detect_boot_mode()) {
Jamie McCraeb3e3ce32023-02-22 09:11:57 +0000504 /* Boot mode to stay in bootloader, clear status and enter serial
505 * recovery mode
506 */
Jamie McCrae6902abb2023-04-04 13:50:43 +0100507 boot_serial_enter();
Jamie McCraeb3e3ce32023-02-22 09:11:57 +0000508 }
509#endif
510
Wouter Cappellee3822f82022-01-19 15:39:43 +0100511#ifdef CONFIG_BOOT_SERIAL_WAIT_FOR_DFU
512 timeout_in_ms -= (k_uptime_get_32() - start);
513 if( timeout_in_ms <= 0 ) {
514 /* at least one check if time was expired */
515 timeout_in_ms = 1;
516 }
Jamie McCrae254714b2022-04-07 09:00:31 +0100517 boot_serial_check_start(&boot_funcs,timeout_in_ms);
Piotr Dymacz3790f5f2022-12-15 14:58:45 +0100518
519#ifdef CONFIG_MCUBOOT_INDICATION_LED
Piotr Dymacz2a74a2b2023-12-05 14:26:22 +0100520 io_led_set(0);
Piotr Dymacz3790f5f2022-12-15 14:58:45 +0100521#endif
Wouter Cappellee3822f82022-01-19 15:39:43 +0100522#endif
523
Michael Grand5047f032022-11-24 16:49:56 +0100524 if (FIH_NOT_EQ(fih_rc, FIH_SUCCESS)) {
David Brown0d0652a2017-04-11 17:33:30 -0600525 BOOT_LOG_ERR("Unable to find bootable image");
Jamie McCrae56cb6102022-03-23 11:57:03 +0000526
527 mcuboot_status_change(MCUBOOT_STATUS_NO_BOOTABLE_IMAGE_FOUND);
528
Jamie McCraefd79db32023-03-10 11:19:36 +0000529#ifdef CONFIG_BOOT_SERIAL_NO_APPLICATION
530 /* No bootable image and configuration set to remain in serial
531 * recovery mode
532 */
Jamie McCrae6902abb2023-04-04 13:50:43 +0100533 boot_serial_enter();
Fabian Pflugca06b9f2024-08-24 11:15:39 +0200534#elif defined(CONFIG_BOOT_USB_DFU_NO_APPLICATION)
535 rc = usb_enable(NULL);
536 if (rc && rc != -EALREADY) {
537 BOOT_LOG_ERR("Cannot enable USB");
538 } else {
539 BOOT_LOG_INF("Waiting for USB DFU");
540 wait_for_usb_dfu(K_FOREVER);
541 }
Jamie McCraefd79db32023-03-10 11:19:36 +0000542#endif
543
Tamas Banee6615d2020-09-30 07:58:48 +0100544 FIH_PANIC;
David Brown0d0652a2017-04-11 17:33:30 -0600545 }
David Brown5153bd62017-01-06 11:16:53 -0700546
Jamie McCrae7fc3ad32024-07-24 14:09:45 +0100547#ifdef CONFIG_BOOT_RAM_LOAD
548 BOOT_LOG_INF("Bootloader chainload address offset: 0x%x",
549 rsp.br_hdr->ih_load_addr);
550#else
Marti Bolivar88f48d92017-05-01 22:30:02 -0400551 BOOT_LOG_INF("Bootloader chainload address offset: 0x%x",
552 rsp.br_image_off);
Jamie McCrae7fc3ad32024-07-24 14:09:45 +0100553#endif
Andrzej Puzdrowskib788c712018-04-12 12:42:49 +0200554
Dominik Ermelcd07ed32021-02-17 15:18:01 +0000555#if defined(MCUBOOT_DIRECT_XIP)
556 BOOT_LOG_INF("Jumping to the image slot");
557#else
David Brown0d0652a2017-04-11 17:33:30 -0600558 BOOT_LOG_INF("Jumping to the first image slot");
Dominik Ermelcd07ed32021-02-17 15:18:01 +0000559#endif
Jamie McCrae56cb6102022-03-23 11:57:03 +0000560
561 mcuboot_status_change(MCUBOOT_STATUS_BOOTABLE_IMAGE_FOUND);
562
Andrzej Puzdrowski84591632020-02-24 11:50:19 +0100563 ZEPHYR_BOOT_LOG_STOP();
David Brown0d0652a2017-04-11 17:33:30 -0600564 do_boot(&rsp);
David Brown5153bd62017-01-06 11:16:53 -0700565
Jamie McCrae56cb6102022-03-23 11:57:03 +0000566 mcuboot_status_change(MCUBOOT_STATUS_BOOT_FAILED);
567
David Brown0d0652a2017-04-11 17:33:30 -0600568 BOOT_LOG_ERR("Never should get here");
569 while (1)
570 ;
David Brown5153bd62017-01-06 11:16:53 -0700571}