mcuboot/docs/readme-espressif.md

1254 lines
47 KiB
Markdown
Raw Normal View History

# [Building and using MCUboot with Espressif's chips](#building-and-using-mcuboot-with-espressifs-chips)
The MCUBoot Espressif's port depends on HAL (Hardware Abstraction Layer) sources based on ESP-IDF
or 3rd party frameworks as such as Zephyr-RTOS (`zephyrproject-rtos/hal_espressif/`) or NuttX RTOS
(`espressif/esp-hal-3rdparty`). Building the MCUboot Espressif's port and its features is platform
dependent, therefore, the system environment including toolchains, must be set accordingly. A
standalone build version means that ESP-IDF and its toolchain are used as source. For 3rd parties
framework, HAL path and toolchain must be set.
Documentation about the MCUboot bootloader design, operation and features can be found in the
[design document](design.md).
## [SoC support availability](#soc-support-availability)
The current port is available for use in the following SoCs within the OSes:
| | ESP32 | ESP32-S2 | ESP32-C3 | ESP32-S3 | ESP32-C2 | ESP32-C6 | ESP32-H2 |
| :----: | :-----: | :-----: | :-----: | :-----: | :---------: | :-----: | :-----: |
| Zephyr | Supported | Supported | Supported | Supported | In progress | In progress | In progress |
| NuttX | Supported | Supported | Supported | Supported | In progress | In progress | In progress |
Notice that any customization in the memory layout from the OS application must be done aware of
the bootloader own memory layout to avoid overlapping. More information on the section
[Memory map organization for OS compatibility](#memory-map-organization-for-os-compatibility).
## [Installing requirements and dependencies](#installing-requirements-and-dependencies)
The following instructions considers a MCUboot Espressif port standalone build.
1. Install additional packages required for development with MCUboot:
```bash
cd ~/mcuboot # or to your directory where MCUboot is cloned
```
```bash
pip3 install --user -r scripts/requirements.txt
```
2. Update the Mbed TLS submodule required by MCUboot:
```bash
git submodule update --init --recursive ext/mbedtls
```
3. If ESP-IDF is the chosen option for use as HAL layer and the system already have ESP-IDF
installed, ensure that the environment is set:
```bash
<IDF_PATH>/install.sh
```
```bash
. <IDF_PATH>/export.sh
```
---
***Note***
*If desirable, instructions for ESP-IDF installation can be found
[here](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/get-started/index.html#manual-installation)*
---
---
***Note***
*The other HALs mentioned above like `hal_espressif` from Zephyr RTOS or `esp-hal-3rdparty`
from NuttX RTOS environments also can be used for the bootloader standalone build, however as
eventually code revision may differ from what is currently expected, it is recommended using
them only within their RTOS build system.*
---
4. If ESP-IDF is not installed and will not be used, install `esptool`:
```bash
pip3 install esptool
```
## [Building the bootloader itself](#building-the-bootloader-itself)
The MCUboot Espressif port bootloader is built using the toolchain and tools provided by Espressif.
Additional configuration related to MCUboot features and slot partitioning may be made using the
`port/<TARGET>/bootloader.conf` file or passing a custom config file using the
`-DMCUBOOT_CONFIG_FILE` argument on the first step below.
---
***Note***
*Replace `<TARGET>` with the target ESP32 family (like `esp32`, `esp32s2` and others).*
---
1. Compile and generate the BIN:
```bash
cmake -DCMAKE_TOOLCHAIN_FILE=tools/toolchain-<TARGET>.cmake -DMCUBOOT_TARGET=<TARGET> -DESP_HAL_PATH=<ESP_HAL_PATH> -DMCUBOOT_FLASH_PORT=<PORT> -B build -GNinja
```
```bash
ninja -C build/
```
---
***Note***
*If using ESP-IDF as HAL layer source, `ESP_HAL_PATH` can be ommited.*
*If desirable, `<TOOLCHAIN_BIN_DIR>` can be defined with the path for a different compatible
toolchain, however it is recommended to actually create a CMake toolchain file and
pass it through `<CMAKE_TOOLCHAIN_FILE>` variable since it may require a distinct set of
compilation flags.*
---
2. Flash MCUboot in your device:
```bash
ninja -C build/ flash
```
If `MCUBOOT_FLASH_PORT` arg was not passed to `cmake`, the default `PORT` for flashing will be
`/dev/ttyUSB0`.
Alternatively:
```bash
esptool.py -p <PORT> -b <BAUD> --before default_reset --after no_reset --chip <TARGET> write_flash --flash_mode dio --flash_size <FLASH_SIZE> --flash_freq 40m <BOOTLOADER_FLASH_OFFSET> build/mcuboot_<TARGET>.bin
```
---
***Note***
You may adjust the port `<PORT>` (like `/dev/ttyUSB0`) and baud rate `<BAUD>` (like `2000000`)
according to the connection with your board. You can also skip `<PORT>` and `<BAUD>` parameters
so that esptool tries to automatically detect it.
*`<FLASH_SIZE>` can be found using the command below:*
```bash
esptool.py -p <PORT> -b <BAUD> flash_id
```
The output contains device information and its flash size:
```
Detected flash size: 4MB
```
*`<BOOTLOADER_FLASH_OFFSET>` value must follow one of the addresses below:*
| ESP32 | ESP32-S2 | ESP32-C3 | ESP32-S3 | ESP32-C2 | ESP32-C6 | ESP32-H2 |
| :-----: | :-----: | :-----: | :-----: | :-----: | :-----: | :-----: |
| 0x1000 | 0x1000 | 0x0000 | 0x0000 | 0x0000 | 0x0000 | 0x0000 |
---
3. Reset your device
## [Signing and flashing an application](#signing-and-flashing-an-application)
1. Images can be regularly signed with the `scripts/imgtool.py` script:
```bash
imgtool.py sign --align 4 -v 0 -H 32 --pad-header -S <SLOT_SIZE> <BIN_IN> <SIGNED_BIN>
```
---
***Note***
`<SLOT_SIZE>` is the size of the slot to be used.
Default slot0 size is `0x100000`, but it can change as per application flash partitions.
For Zephyr images, `--pad-header` is not needed as it already has the padding for MCUboot
header.
---
:warning: ***ATTENTION***
*This is the basic signing needed for adding MCUboot headers and trailers.
For signing with a crypto key and guarantee the authenticity of the image being booted, see the
section [MCUboot image signature verification](#mcuboot-image-signature-verification) below.*
---
2. Flash the signed application:
```bash
esptool.py -p <PORT> -b <BAUD> --before default_reset --after hard_reset --chip <TARGET> write_flash --flash_mode dio --flash_size <FLASH_SIZE> --flash_freq 40m <SLOT_OFFSET> <SIGNED_BIN>
```
# [Downgrade prevention](#downgrade-prevention)
Downgrade prevention (avoid updating of images to an older version) can be enabled using the
following configuration:
```
CONFIG_ESP_DOWNGRADE_PREVENTION=y
```
MCUboot will then verify and compare the new image version number with the current one before
perform an update swap.
Version number is added to the image when signing it with `imgtool` (`-v` parameter, e.g.
`-v 1.0.0`).
### [Downgrade prevention with security counter](#downgrade-prevention-with-security-counter)
It is also possible to rely on a security counter, also added to the image when signing with
`imgtool` (`-s` parameter), apart from version number. This allows image downgrade at some extent,
since any update must have greater or equal security counter value. Enable using the following
configuration:
```
CONFIG_ESP_DOWNGRADE_PREVENTION_SECURITY_COUNTER=y
```
E.g.: if the current image was signed using `-s 1` parameter, an eventual update image must have
been signed using security counter `-s 1` or greater.
# [Security Chain on Espressif port](#security-chain-on-espressif-port)
[MCUboot encrypted images](encrypted_images.md) do not provide full code confidentiality when only
external storage is available (see [Threat model](encrypted_images.md#threat-model)) since by
MCUboot design the image in Primary Slot, from where the image is executed, is stored plaintext.
Espressif chips have off-chip flash memory, so to ensure a security chain along with MCUboot image
signature verification, the hardware-assisted Secure Boot and Flash Encryption were made available
on the MCUboot Espressif port.
## [MCUboot image signature verification](#mcuboot-image-signature-verification)
The image that MCUboot is booting can be signed with 4 types of keys: RSA-2048, RSA-3072, EC256 and
ED25519. In order to enable the feature, the **bootloader** must be compiled with the following
configurations:
---
***Note***
*It is strongly recommended to generate a new signing key using `imgtool` instead of use the
existent samples.*
---
#### For EC256 algorithm use
```
CONFIG_ESP_SIGN_EC256=y
# Use Tinycrypt lib for EC256 or ED25519 signing
CONFIG_ESP_USE_TINYCRYPT=y
CONFIG_ESP_SIGN_KEY_FILE=<YOUR_SIGNING_KEY.pem>
```
#### For ED25519 algorithm use
```
CONFIG_ESP_SIGN_ED25519=y
# Use Tinycrypt lib for EC256 or ED25519 signing
CONFIG_ESP_USE_TINYCRYPT=y
CONFIG_ESP_SIGN_KEY_FILE=<YOUR_SIGNING_KEY.pem>
```
#### For RSA (2048 or 3072) algorithm use
```
CONFIG_ESP_SIGN_RSA=y
# RSA_LEN is 2048 or 3072
CONFIG_ESP_SIGN_RSA_LEN=<RSA_LEN>
# Use Mbed TLS lib for RSA image signing
CONFIG_ESP_USE_MBEDTLS=y
CONFIG_ESP_SIGN_KEY_FILE=<YOUR_SIGNING_KEY.pem>
```
Notice that the public key will be embedded in the bootloader code, since the hardware key storage
is not supported by Espressif port.
### [Signing the image](#signing-the-image)
Now you need to sign the **image binary**, use the `imgtool` with `-k` parameter:
```bash
imgtool.py sign -k <YOUR_SIGNING_KEY.pem> --pad --pad-sig --align 4 -v 0 -H 32 --pad-header -S 0x00100000 <BIN_IN> <BIN_OUT>
```
If signing a Zephyr image, the `--pad-header` is not needed, as it already have the padding for
MCUboot header.
## [Secure Boot](#secure-boot)
The Secure Boot implementation is based on
[IDF's Secure Boot V2](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/secure-boot-v2.html),
is hardware-assisted and RSA based - except ESP32-C2 that uses ECDSA signing scheme - and has the
role for ensuring that only authorized code will be executed on the device. This is done through
bootloader signature checking by the ROM bootloader.
***Note***: ROM bootloader is the First Stage Bootloader, while the Espressif MCUboot port is the
Second Stage Bootloader.
### [Building bootloader with Secure Boot](#building-bootloader-with-secure-boot)
In order to build the bootloader with the feature on, the following configurations must be enabled:
```
CONFIG_SECURE_BOOT=1
CONFIG_SECURE_BOOT_V2_ENABLED=1
CONFIG_SECURE_SIGNED_ON_BOOT=1
```
For the currently supported chips, with exception of ESP32-C2, enable RSA signing scheme:
```
CONFIG_SECURE_SIGNED_APPS_RSA_SCHEME=1
CONFIG_SECURE_BOOT_SUPPORTS_RSA=1
```
For ESP32-C2, enable ECDSA signing scheme and, if working with Flash Encryption too, enable the
configuration to burn keys to efuse together:
```
CONFIG_SECURE_SIGNED_APPS_ECDSA_V2_SCHEME=1
CONFIG_SECURE_BOOT_FLASH_ENC_KEYS_BURN_TOGETHER=1
```
---
:warning: ***ATTENTION***
*On development phase is recommended add the following configuration in order to keep the debugging
enabled and also to avoid any unrecoverable/permanent state change:*
```
CONFIG_SECURE_BOOT_ALLOW_JTAG=1
CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1
# Options for enabling eFuse emulation in Flash
CONFIG_EFUSE_VIRTUAL=1
CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1
```
---
---
:warning: ***ATTENTION***
*You can disable UART Download Mode by adding the following configuration:*
```
CONFIG_SECURE_DISABLE_ROM_DL_MODE=1
```
*This may be suitable for __production__ builds. __After disabling UART Download Mode you will not
be able to flash other images through UART.__*
*Otherwise, you can switch the UART ROM Download Mode to the Secure Download Mode. It will limit
the use of Download Mode functions to simple flash read, write and erase operations.*
```
CONFIG_SECURE_ENABLE_SECURE_ROM_DL_MODE=1
```
*Once the device makes its first full boot, these configurations cannot be reverted*
---
Once the **bootloader image** is built, the resulting binary file is required to be signed with
`espsecure.py` tool.
First create a signing key:
```bash
espsecure.py generate_signing_key --version 2 <BOOTLOADER_SIGNING_KEY.pem>
```
Then sign the bootloader image:
```bash
espsecure.py sign_data --version 2 --keyfile <BOOTLOADER_SIGNING_KEY.pem> -o <BOOTLOADER_BIN_OUT> <BOOTLOADER_BIN_IN>
```
---
:warning: ***ATTENTION***
*Once the bootloader is flashed and the device resets, the **first boot will enable Secure Boot**
and the bootloader and key **no longer can be modified**. So **ENSURE** that both bootloader and
key are correct and you did not forget anything before flashing.*
---
Flash the bootloader as following, with `--after no_reset` flag, so you can reset the device only
when assured:
```bash
esptool.py -p <PORT> -b 2000000 --after no_reset --chip <ESP_CHIP> write_flash --flash_mode dio --flash_size <FLASH_SIZE> --flash_freq 40m <BOOTLOADER_FLASH_OFFSET> <SIGNED_BOOTLOADER_BIN>
```
### [Secure Boot Process](#secure-boot-process)
Secure boot uses a signature block appended to the bootloader image in order to verify the
authenticity. The signature block contains the RSA-3072 signature of that image and the RSA-3072
public key.
On its **first boot** the Secure Boot is not enabled on the device eFuses yet, neither the key nor
digests. So the first boot will have the following process:
1. On startup, since it is the first boot, the ROM bootloader will not verify the bootloader image
(the Secure Boot bit in the eFuse is disabled) yet, so it proceeds to execute it (our MCUboot
bootloader port).
2. Bootloader calculates the SHA-256 hash digest of the public key and writes the result to eFuse.
3. Bootloader validates the application images and prepare the booting process (MCUboot phase).
4. Bootloader burns eFuse to enable Secure Boot V2.
5. Bootloader proceeds to load the Primary image.
After that the Secure Boot feature is permanently enabled and on every next boot the ROM bootloader
will verify the MCUboot bootloader image. The process of an usual boot:
1. On startup, the ROM bootloader checks the Secure Boot enable bit in the eFuse. If it is enabled,
the boot will proceed as following.
2. ROM bootloader verifies the bootloader's signature block integrity (magic number and CRC).
Interrupt boot if it fails.
3. ROM bootloader verifies the bootloader image, interrupt boot if any step fails:
1. Compare the SHA-256 hash digest of the public key embedded in the bootloaders signature
block with the digest saved in the eFuses.
2. Generate the application image digest and match it with the image digest in the signature
block.
3. Use the public key to verify the signature of the bootloader image, using RSA-PSS with the
image digest calculated from previous step for comparison.
4. ROM bootloader executes the bootloader image.
5. Bootloader does the usual verification (MCUboot phase).
6. Proceeds to boot the Primary image.
## [Flash Encryption](#flash-encryption)
The Espressif Flash Encryption is hardware-assisted, transparent to the MCUboot process and is an
additional security measure beyond MCUboot existent features.
The Flash Encryption implementation is also based on
[IDF](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/flash-encryption.html)
and is intended for encrypting off-chip flash memory contents, so it is protected against physical
reading.
When enabling the Flash Encryption, the user can encrypt the content either using a **device
generated key** (remains unknown and unreadable) or a **host generated key** (owner is responsible
for keeping the key private and safe). After the flash encryption gets enabled through eFuse
burning on the device, all read and write operations are decrypted/encrypted in runtime.
### [Building bootloader with Flash Encryption](#building-bootloader-with-flash-encryption)
In order to build the bootloader with the feature on, the following configurations must be enabled:
For **release mode**:
```
CONFIG_SECURE_FLASH_ENC_ENABLED=1
CONFIG_SECURE_FLASH_ENCRYPTION_MODE_RELEASE=1
```
For **development mode**:
```
CONFIG_SECURE_FLASH_ENC_ENABLED=1
CONFIG_SECURE_FLASH_ENCRYPTION_MODE_DEVELOPMENT=1
```
---
:warning: ***ATTENTION***
*On development phase is strongly recommended adding the following configuration in order to keep
the debugging enabled and also to avoid any unrecoverable/permanent state change:*
```
CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_ENC=1
CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_DEC=1
CONFIG_SECURE_FLASH_UART_BOOTLOADER_ALLOW_CACHE=1
CONFIG_SECURE_BOOT_ALLOW_JTAG=1
# Options for enabling eFuse emulation in Flash
CONFIG_EFUSE_VIRTUAL=1
CONFIG_EFUSE_VIRTUAL_KEEP_IN_FLASH=1
```
---
---
:warning: ***ATTENTION***
*Unless the recommended flags for __DEVELOPMENT MODE__ were enabled, the actions made by Flash
Encryption process are __PERMANENT__.* \
*Once the bootloader is flashed and the device resets, the __first boot will enable Flash
Encryption, encrypt the flash content including bootloader and image slots, burn the eFuses that no
longer can be modified__ and if device generated the key __it will not be recoverable__.* \
*When on __RELEASE MODE__, __ENSURE__ that the application with an update agent is flashed before
reset the device.*
*In the same way as Secure Boot feature, you can disable UART Download Mode by adding the following
configuration:*
```
CONFIG_SECURE_DISABLE_ROM_DL_MODE=1
```
*This may be suitable for __production__ builds. __After disabling UART Download Mode you will not
be able to flash other images through UART.__*
*Otherwise, you can switch the UART Download Mode to the Secure Download Mode. It will limit the
use of Download Mode functions to simple flash read, write and erase operations.*
```
CONFIG_SECURE_ENABLE_SECURE_ROM_DL_MODE=1
```
*These configurations cannot be reverted after the device's first boot*
---
### [Signing the image when working with Flash Encryption](#signing-the-image-when-working-with-flash-encryption)
When enabling flash encryption, it is required to signed the image using 32-byte alignment:
`--align 32 --max-align 32`.
Command example:
```bash
imgtool.py sign -k <YOUR_SIGNING_KEY.pem> --pad --pad-sig --align 32 --max-align 32 -v 0 -H 32 --pad-header -S <SLOT_SIZE> <BIN_IN> <BIN_OUT>
```
### [Device generated key](#device-generated-key)
First ensure that the application image is able to perform encrypted read and write operations to
the SPI Flash. Flash the bootloader and application normally:
```bash
esptool.py -p <PORT> -b 2000000 --after no_reset --chip <ESP_CHIP> write_flash --flash_mode dio --flash_size <FLASH_SIZE> --flash_freq 40m <BOOTLOADER_FLASH_OFFSET> <BOOTLOADER_BIN>
```
```bash
esptool.py -p <PORT> -b 2000000 --after no_reset --chip <ESP_CHIP> write_flash --flash_mode dio --flash_size <FLASH_SIZE> --flash_freq 40m <PRIMARY_SLOT_FLASH_OFFSET> <APPLICATION_BIN>
```
On the **first boot**, the bootloader will:
1. Generate Flash Encryption key and write to eFuse.
2. Encrypt flash in-place including bootloader, image primary/secondary slot and scratch.
3. Burn eFuse to enable Flash Encryption.
4. Reset system to ensure Flash Encryption cache resets properly.
### [Host generated key](#host-generated-key)
First ensure that the application image is able to perform encrypted read and write operations to
the SPI Flash. Also ensure that the **UART ROM Download Mode is not disabled** - or that the
**Secure Download Mode is enabled**. Before flashing, generate the encryption key using
`espsecure.py` tool:
```bash
espsecure.py generate_flash_encryption_key <FLASH_ENCRYPTION_KEY.bin>
```
Burn the key into the device's eFuse (keep a copy on the host), this action can be done **only
once**:
---
:warning: ***ATTENTION***
*eFuse emulation in Flash configuration options do not have any effect, so if the key burning
command below is used, it will actually burn the physical eFuse.*
---
- ESP32
```bash
espefuse.py --port PORT burn_key flash_encryption <FLASH_ENCRYPTION_KEY.bin>
```
- ESP32S2, ESP32C3 and ESP32S3
```bash
espefuse.py --port PORT burn_key BLOCK <FLASH_ENCRYPTION_KEY.bin> <KEYPURPOSE>
```
`BLOCK` is a free keyblock between `BLOCK_KEY0` and `BLOCK_KEY5`. And `KEYPURPOSE` is either
`XTS_AES_128_KEY`, `XTS_AES_256_KEY_1`, `XTS_AES_256_KEY_2` (AES XTS 256 is available only in
ESP32S2).
Now, similar as the Device generated key, the bootloader and application can be flashed plaintext.
The **first boot** will encrypt the flash content using the host key burned in the eFuse instead
of generate a new one.
Flashing the bootloader and application:
```bash
esptool.py -p <PORT> -b 2000000 --after no_reset --chip <ESP_CHIP> write_flash --flash_mode dio --flash_size <FLASH_SIZE> --flash_freq 40m <BOOTLOADER_FLASH_OFFSET> <BOOTLOADER_BIN>
```
```bash
esptool.py -p <PORT> -b 2000000 --after no_reset --chip <ESP_CHIP> write_flash --flash_mode dio --flash_size <FLASH_SIZE> --flash_freq 40m <PRIMARY_SLOT_FLASH_OFFSET> <APPLICATION_BIN>
```
On the **first boot**, the bootloader will:
1. Encrypt flash in-place including bootloader, image primary/secondary slot and scratch using the
written key.
2. Burn eFuse to enable Flash Encryption.
3. Reset system to ensure Flash Encryption cache resets properly.
Encrypting data on the host:
- ESP32
```bash
espsecure.py encrypt_flash_data --keyfile <FLASH_ENCRYPTION_KEY.bin> --address <FLASH_OFFSET> --output <OUTPUT_DATA> <INPUT_DATA>
```
- ESP32-S2, ESP32-C3 and ESP32-S3
```bash
espsecure.py encrypt_flash_data --aes_xts --keyfile <FLASH_ENCRYPTION_KEY.bin> --address <FLASH_OFFSET> --output <OUTPUT_DATA> <INPUT_DATA>
```
---
***Note***
OTA updates are required to be sent plaintext. The reason is that, as said before, after the Flash
Encryption is enabled all read/write operations are decrypted/encrypted in runtime, so as e.g. if
pre-encrypted data is sent for an OTA update, it would be wrongly double-encrypted when the update
agent writes to the flash.
For updating with an image encrypted on the host, flash it through serial using `esptool.py` as
above. **UART ROM Download Mode must not be disabled**.
---
## [Security Chain scheme](#security-chain-scheme)
Using the 3 features, Secure Boot, Image signature verification and Flash Encryption, a Security
Chain can be established so only trusted code is executed, and also the code and content residing
in the off-chip flash are protected against undesirable reading.
The overall final process when all features are enabled:
1. ROM bootloader validates the MCUboot bootloader using RSA signature verification.
2. MCUboot bootloader validates the image using the chosen algorithm EC256/RSA/ED25519. It also
validates an upcoming image when updating.
3. Flash Encryption guarantees that code and data are not exposed.
### [Size Limitation](#size-limitation)
When all 3 features are enable at same time, the bootloader size may exceed the fixed limit for
the ROM bootloader checking on the Espressif chips **depending on which algorithm** was chosen for
MCUboot image signing. The issue <https://github.com/mcu-tools/mcuboot/issues/1262> was created to
track this limitation.
## [Multi image](#multi-image)
The multi image feature (currently limited to 2 images) allows the images to be updated separately
(each one has its own primary and secondary slot) by MCUboot.
The Espressif port bootloader handles the boot in two different approaches:
### [Host OS boots second image](#host-os-boots-second-image)
Host OS from the *first image* is responsible for booting the *second image*, therefore the
bootloader is aware of the second image regions and can update it, however it does not load
neither boots it.
Configuration example (`bootloader.conf`):
```
CONFIG_ESP_BOOTLOADER_SIZE=0xF000
CONFIG_ESP_MCUBOOT_WDT_ENABLE=y
# Enables multi image, if it is not defined, its assumed
# only one updatable image
CONFIG_ESP_IMAGE_NUMBER=2
# Example of values to be used when multi image is enabled
# Notice that the OS layer and update agent must be aware
# of these regions
CONFIG_ESP_APPLICATION_SIZE=0x50000
CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000
CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x60000
CONFIG_ESP_IMAGE1_PRIMARY_START_ADDRESS=0xB0000
CONFIG_ESP_IMAGE1_SECONDARY_START_ADDRESS=0x100000
CONFIG_ESP_SCRATCH_OFFSET=0x150000
CONFIG_ESP_SCRATCH_SIZE=0x40000
```
### [Multi boot](#multi-boot)
In the multi boot approach the bootloader is responsible for booting two different images in two
different CPUs, firstly the *second image* on the APP CPU and then the *first image* on the PRO
CPU (current CPU), it is also responsible for update both images as well. Thus multi boot will be
only supported by Espressif multi core chips - currently only ESP32 is implemented.
---
***Note***
*The host OSes in each CPU must handle how the resources are divided/controlled between then.*
---
Configuration example:
```
CONFIG_ESP_BOOTLOADER_SIZE=0xF000
CONFIG_ESP_MCUBOOT_WDT_ENABLE=y
# Enables multi image, if it is not defined, its assumed
# only one updatable image
CONFIG_ESP_IMAGE_NUMBER=2
# Enables multi image boot on independent processors
# (main host OS is not responsible for booting the second image)
# Use only with CONFIG_ESP_IMAGE_NUMBER=2
CONFIG_ESP_MULTI_PROCESSOR_BOOT=y
# Example of values to be used when multi image is enabled
# Notice that the OS layer and update agent must be aware
# of these regions
CONFIG_ESP_APPLICATION_SIZE=0x50000
CONFIG_ESP_IMAGE0_PRIMARY_START_ADDRESS=0x10000
CONFIG_ESP_IMAGE0_SECONDARY_START_ADDRESS=0x60000
CONFIG_ESP_IMAGE1_PRIMARY_START_ADDRESS=0xB0000
CONFIG_ESP_IMAGE1_SECONDARY_START_ADDRESS=0x100000
CONFIG_ESP_SCRATCH_OFFSET=0x150000
CONFIG_ESP_SCRATCH_SIZE=0x40000
```
### [Image version dependency](#image-version-dependency)
MCUboot allows version dependency check between the images when updating them. As `imgtool.py`
allows a version assigment when signing an image, it is also possible to add the version
dependency constraint:
```bash
imgtool.py sign --align 4 -v <VERSION> -d "(<IMAGE_INDEX>, <VERSION_DEPENDENCY>)" -H 32 --pad-header -S <SLOT_SIZE> <BIN_IN> <SIGNED_BIN>
```
- `<VERSION>` defines the version of the image being signed.
- `"(<IMAGE_INDEX>, <VERSION_DEPENDENCY>)"` defines the minimum version and from which image is
needed to satisfy the dependency.
---
Example:
```bash
imgtool.py sign --align 4 -v 1.0.0 -d "(1, 0.0.1+0)" -H 32 --pad-header -S 0x100000 image0.bin image0-signed.bin
```
Supposing that the image 0 is being signed, its version is 1.0.0 and it depends on image 1 with
version at least 0.0.1+0.
---
## [Serial recovery mode](#serial-recovery-mode)
Serial recovery mode allows management through MCUMGR (more information and how to install it:
<https://github.com/apache/mynewt-mcumgr-cli>) for communicating and uploading a firmware to the
device.
Configuration example:
```
# Enables the MCUboot Serial Recovery, that allows the use of
# MCUMGR to upload a firmware through the serial port
CONFIG_ESP_MCUBOOT_SERIAL=y
# GPIO used to boot on Serial Recovery
CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=32
# GPIO input type (0 for Pull-down, 1 for Pull-up)
CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0
# GPIO signal value
CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1
# Delay time for identify the GPIO signal
CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5
# UART port used for serial communication
CONFIG_ESP_SERIAL_BOOT_UART_NUM=1
# GPIO for Serial RX signal
CONFIG_ESP_SERIAL_BOOT_GPIO_RX=25
# GPIO for Serial TX signal
CONFIG_ESP_SERIAL_BOOT_GPIO_TX=26
```
When enabled, the bootloader checks the if the GPIO `<CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT>`
configured has the signal value `<CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL>` for approximately
`<CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S>` seconds for entering the Serial recovery mode. Example:
a button configured on GPIO 32 pressed for 5 seconds.
Serial mode then uses the UART port configured for communication
(`<CONFIG_ESP_SERIAL_BOOT_UART_NUM>`, pins `<CONFIG_ESP_SERIAL_BOOT_GPIO_RX>`,
`<CONFIG_ESP_SERIAL_BOOT_GPIO_RX>`).
### [Serial Recovery through USB JTAG Serial port](#serial-recovery-through-usb-jtag-serial-port)
Some chips, like ESP32-C3 and ESP32-S3 have an integrated USB JTAG Serial Controller that
implements a serial port (CDC) that can also be used for handling MCUboot Serial Recovery.
More information about the USB pins and hardware configuration:
- ESP32-C3: <https://docs.espressif.com/projects/esp-idf/en/latest/esp32c3/api-guides/usb-serial-jtag-console.html>
- ESP32-S3: <https://docs.espressif.com/projects/esp-idf/en/latest/esp32s3/api-guides/usb-serial-jtag-console.html>
- ESP32-C6: <https://docs.espressif.com/projects/esp-idf/en/latest/esp32c6/api-guides/usb-serial-jtag-console.html>
- ESP32-H2: <https://docs.espressif.com/projects/esp-idf/en/latest/esp32h2/api-guides/usb-serial-jtag-console.html>
Configuration example:
```
# Use Serial through USB JTAG Serial port for Serial Recovery
CONFIG_ESP_MCUBOOT_SERIAL_USB_SERIAL_JTAG=y
# Use sector erasing (recommended) instead of entire image size
# erasing when uploading through Serial Recovery
CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY=y
# GPIO used to boot on Serial Recovery
CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT=5
# GPIO input type (0 for Pull-down, 1 for Pull-up)
CONFIG_ESP_SERIAL_BOOT_GPIO_INPUT_TYPE=0
# GPIO signal value
CONFIG_ESP_SERIAL_BOOT_GPIO_DETECT_VAL=1
# Delay time for identify the GPIO signal
CONFIG_ESP_SERIAL_BOOT_DETECT_DELAY_S=5
```
---
:warning: ***ATTENTION***
*When working with Flash Encryption enabled, `CONFIG_ESP_MCUBOOT_ERASE_PROGRESSIVELY` must be
__disabled__, although it is recommended for common Serial Recovery usage*
---
### [MCUMGR image upload example](#mcumgr-image-upload-example)
After entering the Serial recovery mode on the device, MCUMGR can be used as following:
Configure the connection:
```bash
mcumgr conn add esp type="serial" connstring="dev=<PORT>,baud=115200,mtu=256"
```
Upload the image (the process may take some time):
```bash
mcumgr -c esp image upload <IMAGE_BIN>
```
Reset the device:
```bash
mcumgr -c esp reset
```
---
:warning: ***ATTENTION***
*Serial recovery mode uploads the image to the PRIMARY_SLOT, therefore if the upload process gets
interrupted the image may be corrupted and unable to boot*
---
## [Memory map organization for OS compatibility](#memory-map-organization-for-os-compatibility)
When adding support for this MCUboot port to an OS or even customizing an already supported
application memory layout, it is mandatory for the OS linker script to avoid overlaping on
`iram_loader_seg` and `dram_seg` bootloader RAM regions. Although part of the RAM becomes initially
unavailable, it is reclaimable by the OS after boot as heap.
Therefore, the application must be designed aware of the bootloader memory usage.
---
***Note***
*Mostly of the Espressif chips have a separation on the address space for the same physical memory
ammount: IRAM (accessed by the instruction bus) and DRAM (accessed by the data bus), which means
that they need to be accessed by different addresses ranges depending on type, but refer to the
same region. More information on the
[Espressif TRMs](https://www.espressif.com/en/support/documents/technical-documents?keys=&field_download_document_type_tid%5B%5D=963).*
---
The following diagrams illustrate a memory organization from the bootloader point of view (notice
that the addresses and sizes may vary depending on the chip), they reflect the linker script
`boot/espressif/port/<TARGET>/ld/bootloader.ld`:
### ESP32
#### ESP32 standard
```
SRAM0
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40070000 / --------- - SRAM0 START
* | ^ |
* | | PRO CPU Cache | *NOT CLAIMABLE BY OS RAM
* | v |
* +--------+--------------+------+ 0x40078000 / ----------
* | ^ |
* | | | *NOT CLAIMABLE BY OS RAM
* | | iram_loader_seg | *Region usable as iram_loader_seg during boot
* | | (APP CPU Cache) | as APP CPU is not initialized yet
* | | |
* | v |
* +--------+--------------+------+ 0x40080000 / ----------
* | ^ |
* | | FREE | *CLAIMABLE BY OS RAM
* | v |
* +------------------------------+ 0x40090000 / ----------
* | ^ |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | v |
* +--------+--------------+------+ 0x40099000 / ----------
* | | FREE | *CLAIMABLE BY OS RAM
* +------------------------------+ 0x4009FFFF / ---------- - SRAM0 END
SRAM1
IRAM ADDR / DRAM ADDR
* +------------------------------+ 0x400A0000 / 0x3FFFFFFF - SRAM1 START
* | ^ |
* | | | *** SHOULD NOT BE OVERLAPPED ***
* | | dram_seg | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x400AB900 / 0x3FFF4700
* | ^ |
* | | |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +--------+--------------+------+ 0x400BFFFF / 0x3FFE0000 - SRAM1 END
Note: On ESP32 the SRAM1 addresses are accessed in reverse order comparing Instruction
bus (IRAM) and Data bus (DRAM), but refer to the same location. See the TRM for more
information.
SRAM2
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ ---------- / 0x3FFAE000 - SRAM2 START
* | | FREE | *CLAIMABLE BY OS RAM
* +--------+--------------+------+ ---------- / 0x3FFDFFFF - SRAM2 END
```
#### ESP32 Multi Processor Boot
This is the linker script mapping when the `CONFIG_ESP_MULTI_PROCESSOR_BOOT` is enabled
([Multi boot](#multi-boot)) since APP CPU Cache region cannot be used for `iram_loader_seg` region
as there would be conflict when the bootloader starts the APP CPU before jump to the main
application.
```
SRAM0
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40070000 / --------- - SRAM0 START
* | ^ |
* | | |
* | | Cache | *Used by PRO CPU and APP CPU as Cache
* | | |
* | v |
* +--------+--------------+------+ 0x40080000 / ----------
* | ^ |
* | | FREE | *CLAIMABLE BY OS RAM
* | v |
* +------------------------------+ 0x40090000 / ----------
* | ^ |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | v |
* +--------+--------------+------+ 0x40099000 / ----------
* | | FREE | *CLAIMABLE BY OS RAM
* +------------------------------+ 0x4009FFFF / ---------- - SRAM0 END
SRAM1
IRAM ADDR / DRAM ADDR
* +------------------------------+ 0x400A0000 / 0x3FFFFFFF - SRAM1 START
* | ^ |
* | | | *** SHOULD NOT BE OVERLAPPED ***
* | | dram_seg | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x400AB900 / 0x3FFF4700
* | ^ |
* | | | *** SHOULD NOT BE OVERLAPPED ***
* | | iram_loader_seg | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | | |
* | v |
* +------------------------------+ 0x400B1E00 / 0x3FFEE200
* | ^ |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | v |
* +--------+--------------+------+ 0x400BFFFF / 0x3FFE0000 - SRAM1 END
Note: On ESP32 the SRAM1 addresses are accessed in reverse order comparing Instruction
bus (IRAM) and Data bus (DRAM), but refer to the same location. See the TRM for more
information.
SRAM2
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ ---------- / 0x3FFAE000 - SRAM2 START
* | | FREE | *CLAIMABLE BY OS RAM
* +--------+--------------+------+ ---------- / 0x3FFDFFFF - SRAM2 END
```
### ESP32-S2
```
SRAM0
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40020000 / 0x3FFB0000 - SRAM0 START
* | | FREE | *CLAIMABLE BY OS RAM
* +--------+--------------+------+ 0x40027FFF / 0x3FFB7FFF - SRAM0 END
SRAM1
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40028000 / 0x3FFB8000 - SRAM1 START
* | ^ |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | v |
* +--------+--------------+------+ 0x40047000 / 0x3FFD7000
* | ^ |
* | | |
* | | |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +------------------------------+ 0x40050000 / 0x3FFE0000
* | ^ |
* | | |
* | | |
* | | iram_loader_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | | |
* | v |
* +------------------------------+ 0x40056000 / 0x3FFE6000
* | ^ |
* | | |
* | | dram_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x4006FFFF / 0x3FFFFFFF - SRAM1 END
```
### ESP32-S3
```
SRAM0
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40370000 / ---------- - SRAM0 START
* | | FREE | *CLAIMABLE BY OS RAM
* +--------+--------------+------+ 0x40377FFF / ---------- - SRAM0 END
SRAM1
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40378000 / 0x3FC88000 - SRAM1 START
* | ^ |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | v |
* +--------+--------------+------+ 0x403B0000 / 0x3FCC0000
* | ^ |
* | | |
* | | |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +------------------------------+ 0x403BA000 / 0x3FCCA000
* | ^ |
* | | |
* | | |
* | | iram_loader_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | | |
* | v |
* +------------------------------+ 0x403C0000 / 0x3FCD0000
* | ^ |
* | | |
* | | dram_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x403DFFFF / 0x3FCEFFFF - SRAM1 END
SRAM2
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ ---------- / 0x3FCF0000 - SRAM2 START
* | | FREE | *CLAIMABLE BY OS RAM
* +--------+--------------+------+ ---------- / 0x3FCFFFFF - SRAM2 END
```
### ESP32-C2
```
SRAM0
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x4037C000 / ---------- - SRAM0 START
* | | FREE | *CLAIMABLE BY OS RAM
* +--------+--------------+------+ 0x4037FFFF / ---------- - SRAM0 END
SRAM1
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40380000 / 0x3FCA0000 - SRAM1 START
* | ^ |
* | | |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +--------+--------------+------+ 0x403A1370 / 0x3FCC1370
* | ^ |
* | | |
* | | |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +------------------------------+ 0x403A9B70 / 0x3FCC9B70
* | ^ |
* | | |
* | | |
* | | iram_loader_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | | |
* | v |
* +------------------------------+ 0x403B0B70 / 0x3FCD0B70
* | ^ |
* | | |
* | | dram_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x403BFFFF / 0x3FCDFFFF - SRAM1 END
```
### ESP32-C3
```
SRAM0
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x4037C000 / ---------- - SRAM0 START
* | | FREE | *CLAIMABLE BY OS RAM
* +--------+--------------+------+ 0x4037FFFF / ---------- - SRAM0 END
SRAM1
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40380000 / 0x3FC80000 - SRAM1 START
* | ^ |
* | | |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +--------+--------------+------+ 0x403C7000 / 0x3FCC7000
* | ^ |
* | | |
* | | |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +------------------------------+ 0x403D0000 / 0x3FCD0000
* | ^ |
* | | |
* | | |
* | | iram_loader_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | | |
* | v |
* +------------------------------+ 0x403D5400 / 0x3FCD5400
* | ^ |
* | | |
* | | dram_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x403DFFFF / 0x3FCDFFFF - SRAM1 END
```
### ESP32-C6
```
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40800000 / 0x40800000 - HP SRAM START
* | ^ |
* | | |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +--------+--------------+------+ 0x40860610 / 0x40860610
* | ^ |
* | | |
* | | |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +------------------------------+ 0x40869610 / 0x40869610
* | ^ |
* | | |
* | | |
* | | iram_loader_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | | |
* | v |
* +------------------------------+ 0x40870610 / 0x40870610
* | ^ |
* | | |
* | | dram_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x4087FFFF / 0x4087FFFF - HP SRAM END
```
### ESP32-H2
```
IRAM ADDR / DRAM ADDR
* +--------+--------------+------+ 0x40800000 / 0x40800000 - HP SRAM START
* | ^ |
* | | |
* | | |
* | | FREE | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +--------+--------------+------+ 0x408317D0 / 0x408317D0
* | ^ |
* | | |
* | | |
* | | iram_seg | *CLAIMABLE BY OS RAM
* | | |
* | | |
* | v |
* +------------------------------+ 0x40839FD0 / 0x40839FD0
* | ^ |
* | | |
* | | |
* | | iram_loader_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | | |
* | v |
* +------------------------------+ 0x40840FD0 / 0x40840FD0
* | ^ |
* | | |
* | | dram_seg | *** SHOULD NOT BE OVERLAPPED ***
* | | | *** OS CAN RECLAIM IT AFTER BOOT LATER AS HEAP ***
* | v |
* +--------+--------------+------+ 0x4084FFFF / 0x4084FFFF - HP SRAM END
```