zephyr/subsys/dfu/img_util/flash_img.c
Jamie McCrae 0e8cc3e52d dfu: Add support for new MCUboot swap using offset mode
Allows using this newly introduced MCUboot algorithm

Signed-off-by: Jamie McCrae <jamie.mccrae@nordicsemi.no>
2025-02-10 19:05:25 +01:00

307 lines
7.9 KiB
C

/*
* Copyright (c) 2017-2025 Nordic Semiconductor ASA
* Copyright (c) 2017 Linaro Limited
* Copyright (c) 2020 Gerson Fernando Budke <nandojve@gmail.com>
*
* SPDX-License-Identifier: Apache-2.0
*/
#include <zephyr/types.h>
#include <assert.h>
#include <stddef.h>
#include <stdio.h>
#include <string.h>
#include <zephyr/logging/log.h>
#include <zephyr/dfu/mcuboot.h>
#include <zephyr/dfu/flash_img.h>
#include <zephyr/dfu/mcuboot.h>
#include <zephyr/storage/flash_map.h>
#include <zephyr/storage/stream_flash.h>
LOG_MODULE_REGISTER(flash_img, CONFIG_IMG_MANAGER_LOG_LEVEL);
#ifdef CONFIG_IMG_ERASE_PROGRESSIVELY
#include <bootutil/bootutil_public.h>
#endif
#include <zephyr/devicetree.h>
#ifdef CONFIG_TRUSTED_EXECUTION_NONSECURE
#define UPLOAD_FLASH_AREA_LABEL slot1_ns_partition
#else
#if FIXED_PARTITION_EXISTS(slot1_partition)
#define UPLOAD_FLASH_AREA_LABEL slot1_partition
#else
#define UPLOAD_FLASH_AREA_LABEL slot0_partition
#endif
#endif
#ifdef CONFIG_MCUBOOT_BOOTLOADER_MODE_RAM_LOAD
/* For RAM LOAD mode, the active image must be fetched from the bootloader */
#define UPLOAD_FLASH_AREA_ID flash_img_get_upload_slot()
#else
/* FIXED_PARTITION_ID() values used below are auto-generated by DT */
#define UPLOAD_FLASH_AREA_ID FIXED_PARTITION_ID(UPLOAD_FLASH_AREA_LABEL)
#endif /* CONFIG_MCUBOOT_BOOTLOADER_MODE_RAM_LOAD */
#define UPLOAD_FLASH_AREA_CONTROLLER \
DT_GPARENT(DT_NODELABEL(UPLOAD_FLASH_AREA_LABEL))
#if DT_NODE_HAS_PROP(UPLOAD_FLASH_AREA_CONTROLLER, write_block_size)
#define FLASH_WRITE_BLOCK_SIZE \
DT_PROP(UPLOAD_FLASH_AREA_CONTROLLER, write_block_size)
BUILD_ASSERT((CONFIG_IMG_BLOCK_BUF_SIZE % FLASH_WRITE_BLOCK_SIZE == 0),
"CONFIG_IMG_BLOCK_BUF_SIZE is not a multiple of "
"FLASH_WRITE_BLOCK_SIZE");
#endif
#define FLASH_CHECK_ERASED_BUFFER_SIZE 16
#define ERASED_VAL_32(x) (((x) << 24) | ((x) << 16) | ((x) << 8) | (x))
static int scramble_mcuboot_trailer(struct flash_img_context *ctx)
{
int rc = 0;
#ifdef CONFIG_IMG_ERASE_PROGRESSIVELY
if (stream_flash_bytes_written(&ctx->stream) == 0) {
off_t toff = boot_get_trailer_status_offset(ctx->flash_area->fa_size);
off_t offset;
size_t size;
const struct flash_parameters *fparams =
flash_get_parameters(flash_area_get_device(ctx->flash_area));
#ifdef CONFIG_STREAM_FLASH_ERASE
/* for erasable devices prgressive-erase works only along with
* CONFIG_STREAM_FLASH_ERASE option.
*/
if (flash_params_get_erase_cap(fparams) & FLASH_ERASE_C_EXPLICIT) {
/* On devices with explicit erase we are aligning to page
* layout.
*/
struct flash_pages_info info;
rc = flash_get_page_info_by_offs(flash_area_get_device(ctx->flash_area),
toff, &info);
if (rc != 0) {
return rc;
}
offset = info.start_offset;
size = info.size;
} else
#endif
{
/* On devices with no erase, we are aligning to write block
* size.
*/
offset = (toff + fparams->write_block_size - 1) &
~(fparams->write_block_size - 1);
/* No alignment correction needed here, offset is corrected already
* and, size should be aligned.
*/
size = ctx->flash_area->fa_size - offset;
}
rc = flash_area_flatten(ctx->flash_area, offset, size);
}
#endif
return rc;
}
int flash_img_buffered_write(struct flash_img_context *ctx, const uint8_t *data,
size_t len, bool flush)
{
int rc;
/* If there is a need to erase the trailer, that should happen before any
* write is done to partition.
*/
rc = scramble_mcuboot_trailer(ctx);
if (rc != 0) {
return rc;
}
/* if CONFIG_IMG_ERASE_PROGRESSIVELY is enabled the enabled CONFIG_STREAM_FLASH_ERASE
* ensures that stream_flash erases flash progresively.
*/
rc = stream_flash_buffered_write(&ctx->stream, data, len, flush);
if (!flush) {
return rc;
}
flash_area_close(ctx->flash_area);
ctx->flash_area = NULL;
return rc;
}
size_t flash_img_bytes_written(struct flash_img_context *ctx)
{
return stream_flash_bytes_written(&ctx->stream);
}
#if defined(CONFIG_MCUBOOT_BOOTLOADER_MODE_SWAP_USING_OFFSET)
/**
* Determines if the specified area of flash is completely unwritten.
*
* @param fa pointer to flash area to scan
*
* @return 0 when not empty, 1 when empty, negative errno code on error.
*/
static int flash_check_erased(const struct flash_area *fa)
{
uint32_t data[FLASH_CHECK_ERASED_BUFFER_SIZE];
off_t addr;
off_t end;
int bytes_to_read;
int rc;
int i;
uint8_t erased_val;
uint32_t erased_val_32;
assert(fa->fa_size % sizeof(erased_val_32) == 0);
erased_val = flash_area_erased_val(fa);
erased_val_32 = ERASED_VAL_32(erased_val);
end = fa->fa_size;
for (addr = 0; addr < end; addr += sizeof(data)) {
if (end - addr < sizeof(data)) {
bytes_to_read = end - addr;
} else {
bytes_to_read = sizeof(data);
}
rc = flash_area_read(fa, addr, data, bytes_to_read);
if (rc < 0) {
LOG_ERR("Failed to read data from flash area: %d", rc);
return rc;
}
for (i = 0; i < bytes_to_read / sizeof(erased_val_32); i++) {
if (data[i] != erased_val_32) {
return 0;
}
}
}
return 1;
}
#endif
int flash_img_init_id(struct flash_img_context *ctx, uint8_t area_id)
{
int rc;
const struct device *flash_dev;
#if defined(CONFIG_MCUBOOT_BOOTLOADER_MODE_SWAP_USING_OFFSET)
uint32_t sector_count = SWAP_USING_OFFSET_SECTOR_UPDATE_BEGIN;
struct flash_sector sector_data;
#endif
rc = flash_area_open(area_id,
(const struct flash_area **)&(ctx->flash_area));
if (rc) {
return rc;
}
flash_dev = flash_area_get_device(ctx->flash_area);
#if defined(CONFIG_MCUBOOT_BOOTLOADER_MODE_SWAP_USING_OFFSET)
/* Query size of first sector in flash for upgrade slot, so it can be erased, and begin
* upload started at the second sector
*/
rc = flash_area_sectors((const struct flash_area *)ctx->flash_area, &sector_count,
&sector_data);
if (rc && rc != -ENOMEM) {
flash_area_close(ctx->flash_area);
ctx->flash_area = NULL;
return rc;
} else if (sector_count != SWAP_USING_OFFSET_SECTOR_UPDATE_BEGIN) {
flash_area_close(ctx->flash_area);
ctx->flash_area = NULL;
return -ENOENT;
}
if (!flash_check_erased((const struct flash_area *)ctx->flash_area)) {
/* Flash is not empty, therefore flatten/erase the area to prevent issues when
* the firmware update process begins
*/
rc = flash_area_flatten((const struct flash_area *)ctx->flash_area, 0,
sector_data.fs_size);
if (rc) {
flash_area_close(ctx->flash_area);
ctx->flash_area = NULL;
return rc;
}
}
return stream_flash_init(&ctx->stream, flash_dev, ctx->buf, CONFIG_IMG_BLOCK_BUF_SIZE,
(ctx->flash_area->fa_off + sector_data.fs_size),
(ctx->flash_area->fa_size - sector_data.fs_size), NULL);
#else
return stream_flash_init(&ctx->stream, flash_dev, ctx->buf,
CONFIG_IMG_BLOCK_BUF_SIZE, ctx->flash_area->fa_off,
ctx->flash_area->fa_size, NULL);
#endif
}
#ifdef CONFIG_MCUBOOT_BOOTLOADER_MODE_RAM_LOAD
uint8_t flash_img_get_upload_slot(void)
{
uint8_t slot;
slot = boot_fetch_active_slot();
if (slot == FIXED_PARTITION_ID(slot0_partition)) {
return FIXED_PARTITION_ID(slot1_partition);
}
return FIXED_PARTITION_ID(slot0_partition);
}
#else /* CONFIG_MCUBOOT_BOOTLOADER_MODE_RAM_LOAD */
uint8_t flash_img_get_upload_slot(void)
{
return UPLOAD_FLASH_AREA_ID;
}
#endif /* CONFIG_MCUBOOT_BOOTLOADER_MODE_RAM_LOAD */
int flash_img_init(struct flash_img_context *ctx)
{
return flash_img_init_id(ctx, UPLOAD_FLASH_AREA_ID);
}
#if defined(CONFIG_IMG_ENABLE_IMAGE_CHECK)
int flash_img_check(struct flash_img_context *ctx,
const struct flash_img_check *fic,
uint8_t area_id)
{
struct flash_area_check fac;
int rc;
if (!ctx || !fic) {
return -EINVAL;
}
rc = flash_area_open(area_id,
(const struct flash_area **)&(ctx->flash_area));
if (rc) {
return rc;
}
fac.match = fic->match;
fac.clen = fic->clen;
fac.off = boot_get_image_start_offset(area_id);
fac.rbuf = ctx->buf;
fac.rblen = sizeof(ctx->buf);
rc = flash_area_check_int_sha256(ctx->flash_area, &fac);
flash_area_close(ctx->flash_area);
ctx->flash_area = NULL;
return rc;
}
#endif