55ff397c0c
This refactoring of the chip specific bootloader creates the internal boot instance and aligned buffer in the prepare stage, so that they are automatically dropped after. This unlocks a use case where peripherals owning the flash need to be Drop'ed before load() happens.
147 lines
5.2 KiB
Rust
147 lines
5.2 KiB
Rust
#![no_std]
|
|
#![warn(missing_docs)]
|
|
#![doc = include_str!("../README.md")]
|
|
mod fmt;
|
|
|
|
pub use embassy_boot::{
|
|
AlignedBuffer, BlockingFirmwareState, BlockingFirmwareUpdater, BootLoaderConfig, FirmwareUpdaterConfig,
|
|
};
|
|
#[cfg(feature = "nightly")]
|
|
pub use embassy_boot::{FirmwareState, FirmwareUpdater};
|
|
use embassy_nrf::nvmc::PAGE_SIZE;
|
|
use embassy_nrf::peripherals::WDT;
|
|
use embassy_nrf::wdt;
|
|
use embedded_storage::nor_flash::{ErrorType, NorFlash, ReadNorFlash};
|
|
|
|
/// A bootloader for nRF devices.
|
|
pub struct BootLoader<const BUFFER_SIZE: usize = PAGE_SIZE>;
|
|
|
|
impl<const BUFFER_SIZE: usize> BootLoader<BUFFER_SIZE> {
|
|
/// Inspect the bootloader state and perform actions required before booting, such as swapping firmware.
|
|
pub fn prepare<ACTIVE: NorFlash, DFU: NorFlash, STATE: NorFlash>(
|
|
config: BootLoaderConfig<ACTIVE, DFU, STATE>,
|
|
) -> Self {
|
|
let mut aligned_buf = AlignedBuffer([0; BUFFER_SIZE]);
|
|
let mut boot = embassy_boot::BootLoader::new(config);
|
|
boot.prepare_boot(&mut aligned_buf.0).expect("Boot prepare error");
|
|
Self
|
|
}
|
|
|
|
/// Boots the application without softdevice mechanisms.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// This modifies the stack pointer and reset vector and will run code placed in the active partition.
|
|
#[cfg(not(feature = "softdevice"))]
|
|
pub unsafe fn load(self, start: u32) -> ! {
|
|
let mut p = cortex_m::Peripherals::steal();
|
|
p.SCB.invalidate_icache();
|
|
p.SCB.vtor.write(start);
|
|
cortex_m::asm::bootload(start as *const u32)
|
|
}
|
|
|
|
/// Boots the application assuming softdevice is present.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// This modifies the stack pointer and reset vector and will run code placed in the active partition.
|
|
#[cfg(feature = "softdevice")]
|
|
pub unsafe fn load(self, _app: u32) -> ! {
|
|
use nrf_softdevice_mbr as mbr;
|
|
const NRF_SUCCESS: u32 = 0;
|
|
|
|
// Address of softdevice which we'll forward interrupts to
|
|
let addr = 0x1000;
|
|
let mut cmd = mbr::sd_mbr_command_t {
|
|
command: mbr::NRF_MBR_COMMANDS_SD_MBR_COMMAND_IRQ_FORWARD_ADDRESS_SET,
|
|
params: mbr::sd_mbr_command_t__bindgen_ty_1 {
|
|
irq_forward_address_set: mbr::sd_mbr_command_irq_forward_address_set_t { address: addr },
|
|
},
|
|
};
|
|
let ret = mbr::sd_mbr_command(&mut cmd);
|
|
assert_eq!(ret, NRF_SUCCESS);
|
|
|
|
let msp = *(addr as *const u32);
|
|
let rv = *((addr + 4) as *const u32);
|
|
|
|
trace!("msp = {=u32:x}, rv = {=u32:x}", msp, rv);
|
|
|
|
// These instructions perform the following operations:
|
|
//
|
|
// * Modify control register to use MSP as stack pointer (clear spsel bit)
|
|
// * Synchronize instruction barrier
|
|
// * Initialize stack pointer (0x1000)
|
|
// * Set link register to not return (0xFF)
|
|
// * Jump to softdevice reset vector
|
|
core::arch::asm!(
|
|
"mrs {tmp}, CONTROL",
|
|
"bics {tmp}, {spsel}",
|
|
"msr CONTROL, {tmp}",
|
|
"isb",
|
|
"msr MSP, {msp}",
|
|
"mov lr, {new_lr}",
|
|
"bx {rv}",
|
|
// `out(reg) _` is not permitted in a `noreturn` asm! call,
|
|
// so instead use `in(reg) 0` and don't restore it afterwards.
|
|
tmp = in(reg) 0,
|
|
spsel = in(reg) 2,
|
|
new_lr = in(reg) 0xFFFFFFFFu32,
|
|
msp = in(reg) msp,
|
|
rv = in(reg) rv,
|
|
options(noreturn),
|
|
);
|
|
}
|
|
}
|
|
|
|
/// A flash implementation that wraps any flash and will pet a watchdog when touching flash.
|
|
pub struct WatchdogFlash<FLASH> {
|
|
flash: FLASH,
|
|
wdt: wdt::WatchdogHandle,
|
|
}
|
|
|
|
impl<FLASH> WatchdogFlash<FLASH> {
|
|
/// Start a new watchdog with a given flash and WDT peripheral and a timeout
|
|
pub fn start(flash: FLASH, wdt: WDT, config: wdt::Config) -> Self {
|
|
let (_wdt, [wdt]) = match wdt::Watchdog::try_new(wdt, config) {
|
|
Ok(x) => x,
|
|
Err(_) => {
|
|
// In case the watchdog is already running, just spin and let it expire, since
|
|
// we can't configure it anyway. This usually happens when we first program
|
|
// the device and the watchdog was previously active
|
|
info!("Watchdog already active with wrong config, waiting for it to timeout...");
|
|
loop {}
|
|
}
|
|
};
|
|
Self { flash, wdt }
|
|
}
|
|
}
|
|
|
|
impl<FLASH: ErrorType> ErrorType for WatchdogFlash<FLASH> {
|
|
type Error = FLASH::Error;
|
|
}
|
|
|
|
impl<FLASH: NorFlash> NorFlash for WatchdogFlash<FLASH> {
|
|
const WRITE_SIZE: usize = FLASH::WRITE_SIZE;
|
|
const ERASE_SIZE: usize = FLASH::ERASE_SIZE;
|
|
|
|
fn erase(&mut self, from: u32, to: u32) -> Result<(), Self::Error> {
|
|
self.wdt.pet();
|
|
self.flash.erase(from, to)
|
|
}
|
|
fn write(&mut self, offset: u32, data: &[u8]) -> Result<(), Self::Error> {
|
|
self.wdt.pet();
|
|
self.flash.write(offset, data)
|
|
}
|
|
}
|
|
|
|
impl<FLASH: ReadNorFlash> ReadNorFlash for WatchdogFlash<FLASH> {
|
|
const READ_SIZE: usize = FLASH::READ_SIZE;
|
|
fn read(&mut self, offset: u32, data: &mut [u8]) -> Result<(), Self::Error> {
|
|
self.wdt.pet();
|
|
self.flash.read(offset, data)
|
|
}
|
|
fn capacity(&self) -> usize {
|
|
self.flash.capacity()
|
|
}
|
|
}
|