This repository has been archived on 2023-07-17. You can view files and clone it, but cannot push or open issues or pull requests.
bl_mcu_sdk/examples/boot2_isp/blsp_media_boot.c

405 lines
14 KiB
C
Raw Normal View History

2022-11-25 20:16:20 +08:00
/**
******************************************************************************
* @file blsp_media_boot.c
* @version V1.2
* @date
* @brief This file is the peripheral case c file
******************************************************************************
* @attention
*
* <h2><center>&copy; COPYRIGHT(c) 2018 Bouffalo Lab</center></h2>
*
* Redistribution and use in source and binary forms, with or without modification,
* are permitted provided that the following conditions are met:
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
* 3. Neither the name of Bouffalo Lab nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
******************************************************************************
*/
#include "stdint.h"
#include "string.h"
#include "blsp_port.h"
#include "blsp_bootinfo.h"
#include "blsp_common.h"
#include "blsp_boot_parser.h"
#include "blsp_media_boot.h"
#include "softcrc.h"
#include "bflb_eflash_loader_interface.h"
extern int main(void);
/****************************************************************************/ /**
* @brief Media boot calculate hash
*
* @param startAddr: Start address to calculate
* @param totalLen: Data length to calculate
*
* @return BL_Err_Type
*
*******************************************************************************/
static int32_t blsp_mediaboot_cal_hash(uint32_t start_addr, uint32_t total_len)
{
int32_t deal_len = 0;
int32_t read_len = 0;
uint32_t addr = start_addr;
int32_t ret;
while (deal_len < total_len) {
read_len = total_len - deal_len;
if (read_len > BFLB_BOOT2_READBUF_SIZE) {
read_len = BFLB_BOOT2_READBUF_SIZE;
}
ret = blsp_mediaboot_read(addr, g_boot2_read_buf, read_len);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
/* Update hash*/
bflb_sha256_update(sha, &ctx_sha256, g_boot2_read_buf, read_len);
addr += read_len;
deal_len += read_len;
}
return BFLB_BOOT2_SUCCESS;
}
#if BLSP_BOOT2_SUPPORT_SIGN_ENCRYPT
/****************************************************************************/ /**
* @brief Media boot read signature
*
* @param addr: Start address to read signature
* @param len: Signature length pointer
*
* @return BL_Err_Type
*
*******************************************************************************/
static int32_t blsp_mediaboot_read_signaure(uint32_t addr, uint32_t *len)
{
int32_t ret = BFLB_BOOT2_SUCCESS;
uint32_t sig_len = 0;
uint8_t *ptmp;
/* Read signature*/
ret = blsp_mediaboot_read(addr, (uint8_t *)&sig_len, sizeof(sig_len));
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
addr += sizeof(sig_len);
if (sig_len > HAL_BOOT2_SIGN_MAXSIZE) {
return BFLB_BOOT2_IMG_SIGNATURE_LEN_ERROR;
}
/* Tail 4 bytes for crc */
ptmp = ((uint8_t *)g_boot2_read_buf);
ret = blsp_mediaboot_read(addr, (uint8_t *)(ptmp + sizeof(sig_len)), sig_len + 4);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
2022-12-21 20:59:44 +08:00
arch_memcpy_fast(g_boot2_read_buf, &sig_len, sizeof(sig_len));
2022-11-25 20:16:20 +08:00
addr += (sig_len + 4);
*len = sig_len;
return ret;
}
#endif
/****************************************************************************/ /**
* @brief Media boot parse one firmware
*
* @param g_boot_img_cfg: Boot image config pointer to hold parsed information
* @param bootheaderAddr: Bootheader start address
* @param imgAddr: Image start address
*
* @return BL_Err_Type
*
*******************************************************************************/
static int32_t blsp_mediaboot_parse_one_group(boot2_image_config *boot_img_cfg, uint32_t boot_header_addr, uint32_t img_addr)
{
uint32_t addr;
int32_t ret;
addr = boot_header_addr + hal_boot2_get_bootheader_offset();
/* Read boot header*/
LOG_F("R header from %08x\r\n", addr);
ret = blsp_mediaboot_read(addr, g_boot2_read_buf, sizeof(struct hal_bootheader_t));
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
addr += sizeof(struct hal_bootheader_t);
ret = hal_boot_parse_bootheader(boot_img_cfg, (uint8_t *)g_boot2_read_buf);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
/* we init hash here since aes iv need to be caled as image hash */
bflb_sha_init(sha, SHA_MODE_SHA256);
bflb_sha256_start(sha, &ctx_sha256);
/* Due to OTA, the flash_offset is changed, so copy from partition info */
boot_img_cfg->basic_cfg.group_image_offset = img_addr;
#if BLSP_BOOT2_SUPPORT_SIGN_ENCRYPT
uint32_t sig_len = 0;
/* If sign enable,get pk key and signature*/
if (boot_img_cfg->basic_cfg.sign_type) {
/* Read public key */
LOG_F("R PK\r\n");
ret = blsp_mediaboot_read(addr, g_boot2_read_buf, sizeof(boot_pk_config));
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
ret = blsp_boot_parse_pkey(boot_img_cfg, (uint8_t *)g_boot2_read_buf, 1);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
#if defined(CHIP_BL606P) || defined(CHIP_BL808)
addr += sizeof(boot_pk_config);
if (hal_boot2_get_grp_count() > 1) {
/* Read public key 2*/
LOG_F("R PK2\r\n");
ret = blsp_mediaboot_read(addr, g_boot2_read_buf, sizeof(boot_pk_config));
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
ret = blsp_boot_parse_pkey(boot_img_cfg, (uint8_t *)g_boot2_read_buf, 0);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
}
#endif
addr += sizeof(boot_pk_config);
/* Read signature*/
LOG_F("R SIG1\r\n");
blsp_mediaboot_read_signaure(addr, &sig_len);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
ret = blsp_boot_parse_signature(boot_img_cfg, (uint8_t *)g_boot2_read_buf, 1);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
#if defined(CHIP_BL606P) || defined(CHIP_BL808)
/*len+data+crc*/
addr += sizeof(sig_len);
addr += (sig_len + 4);
if (hal_boot2_get_grp_count() > 1) {
/* Read signature2*/
LOG_F("R SIG2\r\n");
blsp_mediaboot_read_signaure(addr, &sig_len);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
ret = blsp_boot_parse_signature(boot_img_cfg, (uint8_t *)g_boot2_read_buf, 0);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
}
#endif
/*len+data+crc*/
addr += sizeof(sig_len);
addr += (sig_len + 4);
}
/* If encrypt enable,get AES key*/
if (boot_img_cfg->basic_cfg.encrypt_type) {
/* Read aes iv*/
LOG_F("R IV\r\n");
ret = blsp_mediaboot_read(addr, g_boot2_read_buf, sizeof(boot_aes_config));
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
addr += sizeof(boot_aes_config);
ret = blsp_boot_parse_aesiv(boot_img_cfg, (uint8_t *)g_boot2_read_buf);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
}
#endif
if (boot_img_cfg->basic_cfg.no_segment) {
/* Flash image */
if (!boot_img_cfg->basic_cfg.hash_ignore) {
LOG_F("Cal hash addr 0x%08x,len %d\r\n", img_addr, boot_img_cfg->basic_cfg.img_len_cnt);
ret = blsp_mediaboot_cal_hash(img_addr,
boot_img_cfg->basic_cfg.img_len_cnt);
if (ret != BFLB_BOOT2_SUCCESS) {
LOG_E("Cal hash err\r\n");
return ret;
}
ret = blsp_boot_parser_check_hash(boot_img_cfg);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
}
#if BLSP_BOOT2_SUPPORT_SIGN_ENCRYPT
ret = blsp_boot_parser_check_signature(boot_img_cfg);
if (ret != BFLB_BOOT2_SUCCESS) {
return ret;
}
#endif
boot_img_cfg->img_valid = 1;
} else {
boot_img_cfg->img_valid = 0;
}
return ret;
}
/****************************************************************************/ /**
* @brief Media boot read data
*
* @param addr: Start address to read
* @param data: Data buffer to hold read data
* @param len: Data length to read
*
* @return BL_Err_Type
*
*******************************************************************************/
int32_t ATTR_TCM_SECTION blsp_mediaboot_read(uint32_t addr, uint8_t *data, uint32_t len)
{
bflb_flash_read(addr, data, len);
return BFLB_BOOT2_SUCCESS;
}
/****************************************************************************/ /**
* @brief Media boot main process
*
* @param cpuBootheaderAddr[BLSP_BOOT2_CPU_GROUP_MAX]: CPU bootheader address list
* @param cpuRollBack[BLSP_BOOT2_CPU_GROUP_MAX]: CPU need roll back flag hold list
* @param rollBack: 1 for rollback when imge error occurs, 0 for not rollback when imge error occurs
*
* @return int32_t
*
*******************************************************************************/
int32_t blsp_mediaboot_main(uint32_t group_boot_header_addr[BLSP_BOOT2_CPU_GROUP_MAX], uint8_t group_roll_back[BLSP_BOOT2_CPU_GROUP_MAX], uint8_t roll_back)
{
int32_t ret;
uint32_t i = 0, core;
uint32_t valid_group_found = 0;
uint32_t boot_header_addr[BLSP_BOOT2_CPU_GROUP_MAX];
LOG_F("Media boot main\r\n");
/* Reset some parameters*/
for (i = 0; i < BLSP_BOOT2_CPU_GROUP_MAX; i++) {
memset(&g_boot_img_cfg[i], 0, sizeof(g_boot_img_cfg[i]));
boot_header_addr[i] = group_boot_header_addr[i];
group_roll_back[i] = 0;
}
/* Try to boot from flash */
for (i = 0; i < BLSP_BOOT2_CPU_GROUP_MAX; i++) {
if (boot_header_addr[i] == 0) {
LOG_E("Group %d not boot\r\n", i);
continue;
}
ret = blsp_mediaboot_parse_one_group(&g_boot_img_cfg[i], boot_header_addr[i],
boot_header_addr[i] + BFLB_FW_IMG_OFFSET_AFTER_HEADER);
if (ret != BFLB_BOOT2_SUCCESS) {
LOG_E("Group %d parse fail\r\n", i);
group_roll_back[i] = 1;
} else {
valid_group_found++;
}
}
/* roll_back == 1 means need to check rock back, and can not jump away */
if ((valid_group_found != hal_boot2_get_grp_count()) && (1 == roll_back)) {
#if BLSP_BOOT2_CPU_GROUP_MAX > 1
if (boot_header_addr[1] == 0 && (valid_group_found == 1)) {
LOG_F("One group Only\r\n");
} else
#endif
{
LOG_E("Group roll back\r\n");
return BFLB_BOOT2_IMG_Roll_Back;
}
}
if (valid_group_found == 0) {
LOG_E("no valid group found\r\n");
return BFLB_BOOT2_IMG_ALL_INVALID_ERROR;
}
/* Get msp and pc value */
for (i = 0; i < BLSP_BOOT2_CPU_GROUP_MAX; i++) {
if (!g_boot_img_cfg[i].img_valid) {
continue;
}
for (core = 0; core < BLSP_BOOT2_CPU_MAX; core++) {
if (g_boot_img_cfg[i].cpu_cfg[core].boot_entry == 0) {
#ifdef ARCH_RISCV
g_boot_img_cfg[i].cpu_cfg[core].boot_entry = ((uint32_t)main) & 0xff000000;
#endif
}
}
}
for (i = 0; i < BLSP_BOOT2_CPU_GROUP_MAX; i++) {
if (!g_boot_img_cfg[i].img_valid) {
continue;
}
for (core = 0; core < BLSP_BOOT2_CPU_MAX; core++) {
if (g_boot_img_cfg[i].cpu_cfg[core].config_enable) {
if (g_boot_img_cfg[i].cpu_cfg[core].halt_cpu == 0) {
LOG_F("group[%d] offset %08x ,core[%d] offset %08x ", i,
g_boot_img_cfg[i].basic_cfg.group_image_offset,
core,
g_boot_img_cfg[i].cpu_cfg[core].image_address_offset);
LOG_F("bootentry %08x\r\n", g_boot_img_cfg[i].cpu_cfg[core].boot_entry);
}
}
}
}
#if BLSP_BOOT2_CPU_MAX > 1
LOG_F("group[%d],core[%d] halt cpu %d\r\n", 0, 1, g_boot_img_cfg[0].cpu_cfg[1].halt_cpu);
#endif
blsp_boot2_show_timer();
bflb_eflash_loader_if_set(BFLB_EFLASH_LOADER_IF_UART);
if (0 == bflb_eflash_loader_if_handshake_poll(0)) {
bflb_eflash_loader_main();
}
/* Prepare jump to entry*/
blsp_mediaboot_pre_jump();
/* We should never get here unless something is wrong */
return BFLB_BOOT2_FAIL;
}