blob: e4da8b53c99f402a389feb10bfb3a54c3f9be208 [file] [log] [blame]
Christopher Collins92ea77f2016-12-12 15:59:26 -08001/*
2 * Licensed to the Apache Software Foundation (ASF) under one
3 * or more contributor license agreements. See the NOTICE file
4 * distributed with this work for additional information
5 * regarding copyright ownership. The ASF licenses this file
6 * to you under the Apache License, Version 2.0 (the
7 * "License"); you may not use this file except in compliance
8 * with the License. You may obtain a copy of the License at
9 *
10 * http://www.apache.org/licenses/LICENSE-2.0
11 *
12 * Unless required by applicable law or agreed to in writing,
13 * software distributed under the License is distributed on an
14 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15 * KIND, either express or implied. See the License for the
16 * specific language governing permissions and limitations
17 * under the License.
18 */
19#include <assert.h>
20#include <stddef.h>
21#include <inttypes.h>
22#include <ctype.h>
23#include <stdio.h>
24
25#include "sysflash/sysflash.h"
26
Fabio Utzig1a2e41a2017-11-17 12:13:09 -020027#include "bootutil/bootutil_log.h"
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +010028#include "zcbor_encode.h"
Fabio Utzig1a2e41a2017-11-17 12:13:09 -020029
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020030#ifdef __ZEPHYR__
Dominik Ermel1eedec32021-12-16 12:55:02 +000031#include <sys/reboot.h>
Andrzej Puzdrowskif1d189c2019-12-12 09:34:11 +010032#include <sys/byteorder.h>
33#include <sys/__assert.h>
Peter Bigot54c1e3f2020-01-25 05:50:12 -060034#include <drivers/flash.h>
Andrzej Puzdrowskif1d189c2019-12-12 09:34:11 +010035#include <sys/crc.h>
36#include <sys/base64.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020037#else
Christopher Collins92ea77f2016-12-12 15:59:26 -080038#include <bsp/bsp.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080039#include <hal/hal_system.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080040#include <os/endian.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080041#include <os/os_cputime.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020042#include <crc/crc16.h>
43#include <base64/base64.h>
Andrzej Puzdrowski386b5922018-04-06 19:26:24 +020044#endif /* __ZEPHYR__ */
45
Andrzej Puzdrowskib788c712018-04-12 12:42:49 +020046#include <flash_map_backend/flash_map_backend.h>
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020047#include <hal/hal_flash.h>
48#include <os/os.h>
49#include <os/os_malloc.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080050
51#include <bootutil/image.h>
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +020052#include <bootutil/bootutil.h>
Christopher Collins92ea77f2016-12-12 15:59:26 -080053
54#include "boot_serial/boot_serial.h"
55#include "boot_serial_priv.h"
56
Dominik Ermel3d4e55d2021-07-09 11:14:10 +000057#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +020058#include "bootutil_priv.h"
59#endif
60
Wouter Cappelle953a7612021-05-03 16:53:05 +020061#ifdef MCUBOOT_ENC_IMAGES
62#include "single_loader.h"
63#endif
64
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +010065#include "serial_recovery_cbor.h"
Dominik Ermel88bd5672022-06-07 15:17:06 +000066#include "serial_recovery_echo.h"
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +020067#include "bootutil/boot_hooks.h"
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +010068
Carlos Falgueras Garcíaa4b4b0f2021-06-22 10:00:22 +020069BOOT_LOG_MODULE_DECLARE(mcuboot);
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +010070
Marko Kiiskila149b4572018-06-06 14:18:54 +030071#define BOOT_SERIAL_INPUT_MAX 512
Andrzej Puzdrowskic9ac5cc2021-11-19 11:58:05 +010072#define BOOT_SERIAL_OUT_MAX (128 * BOOT_IMAGE_NUMBER)
Christopher Collins92ea77f2016-12-12 15:59:26 -080073
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020074#ifdef __ZEPHYR__
Carles Cufi0165be82018-03-26 17:43:51 +020075/* base64 lib encodes data to null-terminated string */
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020076#define BASE64_ENCODE_SIZE(in_size) ((((((in_size) - 1) / 3) * 4) + 4) + 1)
77
78#define CRC16_INITIAL_CRC 0 /* what to seed crc16 with */
79#define CRC_CITT_POLYMINAL 0x1021
80
81#define ntohs(x) sys_be16_to_cpu(x)
82#define htons(x) sys_cpu_to_be16(x)
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +020083#endif
Emanuele Di Santo9f1933d2018-11-20 10:59:59 +010084
Fabio Utzig6f49c272019-08-23 11:42:58 -030085#if (BOOT_IMAGE_NUMBER > 1)
86#define IMAGES_ITER(x) for ((x) = 0; (x) < BOOT_IMAGE_NUMBER; ++(x))
87#else
88#define IMAGES_ITER(x)
89#endif
90
Marko Kiiskila149b4572018-06-06 14:18:54 +030091static char in_buf[BOOT_SERIAL_INPUT_MAX + 1];
92static char dec_buf[BOOT_SERIAL_INPUT_MAX + 1];
Marko Kiiskila8b1ce3a2018-06-14 13:20:46 -070093const struct boot_uart_funcs *boot_uf;
Christopher Collins92ea77f2016-12-12 15:59:26 -080094static struct nmgr_hdr *bs_hdr;
Wouter Cappellee3822f82022-01-19 15:39:43 +010095static bool bs_entry;
Christopher Collins92ea77f2016-12-12 15:59:26 -080096
97static char bs_obuf[BOOT_SERIAL_OUT_MAX];
98
Christopher Collins92ea77f2016-12-12 15:59:26 -080099static void boot_serial_output(void);
100
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100101static zcbor_state_t cbor_state[2];
Christopher Collins92ea77f2016-12-12 15:59:26 -0800102
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000103void reset_cbor_state(void)
104{
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100105 zcbor_new_encode_state(cbor_state, 2, (uint8_t *)bs_obuf,
106 (size_t)bs_obuf + sizeof(bs_obuf), 0);
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000107}
108
Dominik Ermel3d51e432021-06-25 17:29:50 +0000109/**
Dominik Ermelbd69c3d2021-07-28 11:27:31 +0000110 * Function that processes MGMT_GROUP_ID_PERUSER mcumgr group and may be
111 * used to process any groups that have not been processed by generic boot
112 * serial implementation.
Dominik Ermel3d51e432021-06-25 17:29:50 +0000113 *
114 * @param[in] hdr -- the decoded header of mcumgr message;
115 * @param[in] buffer -- buffer with first mcumgr message;
116 * @param[in] len -- length of of data in buffer;
117 * @param[out] *cs -- object with encoded response.
118 *
119 * @return 0 on success; non-0 error code otherwise.
120 */
121extern int bs_peruser_system_specific(const struct nmgr_hdr *hdr,
122 const char *buffer,
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100123 int len, zcbor_state_t *cs);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800124
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000125#define zcbor_tstr_put_lit_cast(state, string) \
126 zcbor_tstr_encode_ptr(state, (uint8_t *)string, sizeof(string) - 1)
127
128#ifndef MCUBOOT_USE_SNPRINTF
Christopher Collins92ea77f2016-12-12 15:59:26 -0800129/*
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300130 * Convert version into string without use of snprintf().
Christopher Collins92ea77f2016-12-12 15:59:26 -0800131 */
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300132static int
133u32toa(char *tgt, uint32_t val)
Christopher Collins92ea77f2016-12-12 15:59:26 -0800134{
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300135 char *dst;
136 uint32_t d = 1;
137 uint32_t dgt;
138 int n = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800139
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300140 dst = tgt;
141 while (val / d >= 10) {
142 d *= 10;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800143 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300144 while (d) {
145 dgt = val / d;
146 val %= d;
147 d /= 10;
148 if (n || dgt > 0 || d == 0) {
149 *dst++ = dgt + '0';
150 ++n;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800151 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800152 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300153 *dst = '\0';
154
155 return dst - tgt;
156}
157
158/*
159 * dst has to be able to fit "255.255.65535.4294967295" (25 characters).
160 */
161static void
162bs_list_img_ver(char *dst, int maxlen, struct image_version *ver)
163{
164 int off;
165
166 off = u32toa(dst, ver->iv_major);
167 dst[off++] = '.';
168 off += u32toa(dst + off, ver->iv_minor);
169 dst[off++] = '.';
170 off += u32toa(dst + off, ver->iv_revision);
171 dst[off++] = '.';
172 off += u32toa(dst + off, ver->iv_build_num);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800173}
Dominik Ermeld49cfc12022-06-09 08:24:48 +0000174#else
175/*
176 * dst has to be able to fit "255.255.65535.4294967295" (25 characters).
177 */
178static void
179bs_list_img_ver(char *dst, int maxlen, struct image_version *ver)
180{
181 snprintf(dst, maxlen, "%hu.%hu.%hu.%u", (uint16_t)ver->iv_major,
182 (uint16_t)ver->iv_minor, ver->iv_revision, ver->iv_build_num);
183}
184#endif /* !MCUBOOT_USE_SNPRINTF */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800185
186/*
187 * List images.
188 */
189static void
190bs_list(char *buf, int len)
191{
Christopher Collins92ea77f2016-12-12 15:59:26 -0800192 struct image_header hdr;
193 uint8_t tmpbuf[64];
Øyvind Rønningstad9f4aefd2021-03-08 21:11:25 +0100194 uint32_t slot, area_id;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800195 const struct flash_area *fap;
Fabio Utzig6f49c272019-08-23 11:42:58 -0300196 uint8_t image_index;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800197
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100198 zcbor_map_start_encode(cbor_state, 1);
199 zcbor_tstr_put_lit_cast(cbor_state, "images");
200 zcbor_list_start_encode(cbor_state, 5);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300201 image_index = 0;
202 IMAGES_ITER(image_index) {
203 for (slot = 0; slot < 2; slot++) {
204 area_id = flash_area_id_from_multi_image_slot(image_index, slot);
205 if (flash_area_open(area_id, &fap)) {
206 continue;
207 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800208
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200209 int rc = BOOT_HOOK_CALL(boot_read_image_header_hook,
210 BOOT_HOOK_REGULAR, image_index, slot, &hdr);
211 if (rc == BOOT_HOOK_REGULAR)
212 {
213 flash_area_read(fap, 0, &hdr, sizeof(hdr));
214 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800215
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200216 fih_int fih_rc = FIH_FAILURE;
217
218 if (hdr.ih_magic == IMAGE_MAGIC)
219 {
220 BOOT_HOOK_CALL_FIH(boot_image_check_hook,
221 fih_int_encode(BOOT_HOOK_REGULAR),
222 fih_rc, image_index, slot);
223 if (fih_eq(fih_rc, BOOT_HOOK_REGULAR))
224 {
Wouter Cappelle953a7612021-05-03 16:53:05 +0200225#ifdef MCUBOOT_ENC_IMAGES
226 if (slot == 0 && IS_ENCRYPTED(&hdr)) {
227 /* Clear the encrypted flag we didn't supply a key
228 * This flag could be set if there was a decryption in place
229 * performed before. We will try to validate the image without
230 * decryption by clearing the flag in the heder. If
231 * still encrypted the validation will fail.
232 */
233 hdr.ih_flags &= ~(ENCRYPTIONFLAGS);
234 }
235#endif
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200236 FIH_CALL(bootutil_img_validate, fih_rc, NULL, 0, &hdr, fap, tmpbuf, sizeof(tmpbuf),
237 NULL, 0, NULL);
238 }
239 }
240
241 flash_area_close(fap);
242
243 if (fih_not_eq(fih_rc, FIH_SUCCESS)) {
Fabio Utzig6f49c272019-08-23 11:42:58 -0300244 continue;
245 }
Fabio Utzig6f49c272019-08-23 11:42:58 -0300246
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100247 zcbor_map_start_encode(cbor_state, 20);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300248
249#if (BOOT_IMAGE_NUMBER > 1)
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100250 zcbor_tstr_put_lit_cast(cbor_state, "image");
251 zcbor_uint32_put(cbor_state, image_index);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300252#endif
253
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100254 zcbor_tstr_put_lit_cast(cbor_state, "slot");
255 zcbor_uint32_put(cbor_state, slot);
256 zcbor_tstr_put_lit_cast(cbor_state, "version");
Fabio Utzig6f49c272019-08-23 11:42:58 -0300257
258 bs_list_img_ver((char *)tmpbuf, sizeof(tmpbuf), &hdr.ih_ver);
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100259 zcbor_tstr_encode_ptr(cbor_state, tmpbuf, strlen((char *)tmpbuf));
260 zcbor_map_end_encode(cbor_state, 20);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800261 }
Christopher Collins92ea77f2016-12-12 15:59:26 -0800262 }
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100263 zcbor_list_end_encode(cbor_state, 5);
264 zcbor_map_end_encode(cbor_state, 1);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800265 boot_serial_output();
266}
267
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000268#ifdef MCUBOOT_ERASE_PROGRESSIVELY
269
270/** Erases range of flash, aligned to sector size
271 *
272 * Function will erase all sectors withing [start, end] range; it does not check
273 * the @p start for alignment, and it will use @p end to find boundaries of las
274 * sector to erase. Function returns offset of the first byte past the last
275 * erased sector, so basically offset of next sector to be erased if needed.
276 * The function is intended to be called iteratively with previously returned
277 * offset as @p start.
278 *
279 * @param start starting offset, aligned to sector offset;
280 * @param end ending offset, maybe anywhere within sector;
281 *
282 * @retval On success: offset of the first byte past last erased sector;
283 * On failure: -EINVAL.
284 */
285static off_t erase_range(const struct flash_area *fap, off_t start, off_t end)
286{
287 struct flash_sector sect;
288 size_t size;
289 int rc;
290
291 if (end >= flash_area_get_size(fap)) {
292 return -EINVAL;
293 }
294
295 if (end < start) {
296 return start;
297 }
298
299 if (flash_area_sector_from_off(end, &sect)) {
300 return -EINVAL;
301 }
302
303 size = flash_sector_get_off(&sect) + flash_sector_get_size(&sect) - start;
304 BOOT_LOG_INF("Erasing range 0x%x:0x%x", start, start + size - 1);
305
306 rc = flash_area_erase(fap, start, size);
307 if (rc != 0) {
308 BOOT_LOG_ERR("Error %d while erasing range", rc);
309 return -EINVAL;
310 }
311
312 return start + size;
313}
314#endif
315
Christopher Collins92ea77f2016-12-12 15:59:26 -0800316/*
317 * Image upload request.
318 */
319static void
320bs_upload(char *buf, int len)
321{
Dominik Ermel5bd87442022-06-13 15:14:01 +0000322 static size_t img_size; /* Total image size, held for duration of upload */
323 static uint32_t curr_off; /* Expected current offset */
324 const uint8_t *img_chunk = NULL; /* Pointer to buffer with received image chunk */
325 size_t img_chunk_len = 0; /* Length of received image chunk */
326 size_t img_chunk_off = SIZE_MAX; /* Offset of image chunk within image */
327 uint8_t rem_bytes; /* Reminder bytes after aligning chunk write to
328 * to flash alignment */
Fabio Utzig6f49c272019-08-23 11:42:58 -0300329 int img_num;
Dominik Ermel5bd87442022-06-13 15:14:01 +0000330 size_t img_size_tmp = SIZE_MAX; /* Temp variable for image size */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800331 const struct flash_area *fap = NULL;
332 int rc;
Dominik Ermel3d4e55d2021-07-09 11:14:10 +0000333#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000334 static off_t not_yet_erased = 0; /* Offset of next byte to erase; writes to flash
335 * are done in consecutive manner and erases are done
336 * to allow currently received chunk to be written;
337 * this state variable holds information where last
338 * erase has stopped to let us know whether erase
339 * is needed to be able to write current chunk.
340 */
341 static struct flash_sector status_sector;
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200342#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800343
Fabio Utzig6f49c272019-08-23 11:42:58 -0300344 img_num = 0;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300345
346 /*
347 * Expected data format.
348 * {
Fabio Utzig6f49c272019-08-23 11:42:58 -0300349 * "image":<image number in a multi-image set (OPTIONAL)>
350 * "data":<image data>
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300351 * "len":<image len>
352 * "off":<current offset of image data>
353 * }
354 */
355
Øyvind Rønningstad212a35b2021-05-07 21:06:48 +0200356 struct Upload upload;
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100357 size_t decoded_len;
358 uint_fast8_t result = cbor_decode_Upload((const uint8_t *)buf, len, &upload, &decoded_len);
Øyvind Rønningstad212a35b2021-05-07 21:06:48 +0200359
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100360 if ((result != ZCBOR_SUCCESS) || (len != decoded_len)) {
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100361 goto out_invalid_data;
362 }
Dominik Ermel470e2f32020-01-10 13:28:48 +0000363
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100364 for (int i = 0; i < upload._Upload_members_count; i++) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100365 struct Member_ *member = &upload._Upload_members[i]._Upload_members;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100366 switch(member->_Member_choice) {
367 case _Member_image:
368 img_num = member->_Member_image;
369 break;
370 case _Member_data:
Dominik Ermel5bd87442022-06-13 15:14:01 +0000371 img_chunk = member->_Member_data.value;
372 img_chunk_len = member->_Member_data.len;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100373 break;
374 case _Member_len:
Dominik Ermel5bd87442022-06-13 15:14:01 +0000375 img_size_tmp = member->_Member_len;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100376 break;
377 case _Member_off:
Dominik Ermel5bd87442022-06-13 15:14:01 +0000378 img_chunk_off = member->_Member_off;
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100379 break;
380 case _Member_sha:
381 default:
382 /* Nothing to do. */
383 break;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300384 }
385 }
Øyvind Rønningstadf42a8202019-12-13 03:27:54 +0100386
Dominik Ermel5bd87442022-06-13 15:14:01 +0000387 if (img_chunk_off == SIZE_MAX || img_chunk == NULL) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300388 /*
389 * Offset must be set in every block.
390 */
391 goto out_invalid_data;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800392 }
393
Dominik Ermel48decca2021-07-09 10:23:58 +0000394#if !defined(MCUBOOT_SERIAL_DIRECT_IMAGE_UPLOAD)
Fabio Utzig6f49c272019-08-23 11:42:58 -0300395 rc = flash_area_open(flash_area_id_from_multi_image_slot(img_num, 0), &fap);
Dominik Ermel48decca2021-07-09 10:23:58 +0000396#else
397 rc = flash_area_open(flash_area_id_from_direct_image(img_num), &fap);
398#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800399 if (rc) {
400 rc = MGMT_ERR_EINVAL;
401 goto out;
402 }
403
Dominik Ermel5bd87442022-06-13 15:14:01 +0000404 if (img_chunk_off == 0) {
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000405 /* Receiving chunk with 0 offset resets the upload state; this basically
406 * means that upload has started from beginning.
407 */
408 const size_t area_size = flash_area_get_size(fap);
Dominik Ermel5bd87442022-06-13 15:14:01 +0000409
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000410 curr_off = 0;
411#ifdef MCUBOOT_ERASE_PROGRESSIVELY
412 /* Get trailer sector information; this is done early because inability to get
413 * that sector information means that upload will not work anyway.
414 * TODO: This is single occurrence issue, it should get detected during tests
415 * and fixed otherwise you are deploying broken mcuboot.
416 */
417 if (flash_area_sector_from_off(boot_status_off(fap), &status_sector)) {
418 rc = MGMT_ERR_EUNKNOWN;
419 BOOT_LOG_ERR("Unable to determine flash sector of the image trailer");
420 goto out;
421 }
422#endif
423
424
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200425#if defined(MCUBOOT_VALIDATE_PRIMARY_SLOT_ONCE)
426 /* We are using swap state at end of flash area to store validation
427 * result. Make sure the user cannot write it from an image to skip validation.
428 */
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000429 if (img_size_tmp > (area_size - BOOT_MAGIC_SZ)) {
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200430 goto out_invalid_data;
431 }
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000432#else
433 if (img_size_tmp > area_size) {
434 goto out_invalid_data;
435 }
436
Wouter Cappellebb7a39d2021-05-03 16:44:44 +0200437#endif
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000438
Dominik Ermel3d4e55d2021-07-09 11:14:10 +0000439#ifndef MCUBOOT_ERASE_PROGRESSIVELY
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000440 /* Non-progressive erase erases entire image slot when first chunk of
441 * an image is received.
442 */
443 rc = flash_area_erase(fap, 0, area_size);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800444 if (rc) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300445 goto out_invalid_data;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800446 }
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000447#else
448 not_yet_erased = 0;
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200449#endif
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000450
Dominik Ermel5bd87442022-06-13 15:14:01 +0000451 img_size = img_size_tmp;
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000452 } else if (img_chunk_off != curr_off) {
453 /* If received chunk offset does not match expected one jump, pretend
454 * success and jump to out; out will respond to client with success
455 * and request the expected offset, held by curr_off.
456 */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800457 rc = 0;
458 goto out;
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000459 } else if (curr_off + img_chunk_len > img_size) {
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200460 rc = MGMT_ERR_EINVAL;
461 goto out;
462 }
463
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000464#ifdef MCUBOOT_ERASE_PROGRESSIVELY
465 /* Progressive erase will erase enough flash, aligned to sector size,
466 * as needed for the current chunk to be written.
467 */
468 not_yet_erased = erase_range(fap, not_yet_erased,
469 curr_off + img_chunk_len - 1);
470
471 if (not_yet_erased < 0) {
472 rc = MGMT_ERR_EINVAL;
473 goto out;
474 }
475#endif
476
477 /* Writes are aligned to flash write alignment, so may drop a few bytes
478 * from the end of the buffer; we will request these bytes again with
479 * new buffer by responding with request for offset after the last aligned
480 * write.
481 */
Dominik Ermel5bd87442022-06-13 15:14:01 +0000482 rem_bytes = img_chunk_len % flash_area_align(fap);
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200483
Dominik Ermel5bd87442022-06-13 15:14:01 +0000484 if ((curr_off + img_chunk_len < img_size) && rem_bytes) {
485 img_chunk_len -= rem_bytes;
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200486 rem_bytes = 0;
Fabio Utzig30f6b2a2018-03-29 16:18:53 -0300487 }
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200488
Dominik Ermel5bd87442022-06-13 15:14:01 +0000489 BOOT_LOG_INF("Writing at 0x%x until 0x%x", curr_off, curr_off + img_chunk_len);
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200490 if (rem_bytes) {
491 /* the last chunk of the image might be unaligned */
492 uint8_t wbs_aligned[BOOT_MAX_ALIGN];
Dominik Ermel5bd87442022-06-13 15:14:01 +0000493 size_t w_size = img_chunk_len - rem_bytes;
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200494
495 if (w_size) {
Dominik Ermel5bd87442022-06-13 15:14:01 +0000496 rc = flash_area_write(fap, curr_off, img_chunk, w_size);
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200497 if (rc) {
498 goto out_invalid_data;
499 }
500 curr_off += w_size;
Dominik Ermel5bd87442022-06-13 15:14:01 +0000501 img_chunk_len -= w_size;
502 img_chunk += w_size;
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200503 }
504
Dominik Ermel5bd87442022-06-13 15:14:01 +0000505 if (img_chunk_len) {
506 memcpy(wbs_aligned, img_chunk, rem_bytes);
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200507 memset(wbs_aligned + rem_bytes, flash_area_erased_val(fap),
508 sizeof(wbs_aligned) - rem_bytes);
509 rc = flash_area_write(fap, curr_off, wbs_aligned, flash_area_align(fap));
510 }
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200511 } else {
Dominik Ermel5bd87442022-06-13 15:14:01 +0000512 rc = flash_area_write(fap, curr_off, img_chunk, img_chunk_len);
Andrzej Puzdrowskif48de7a2020-10-19 09:42:02 +0200513 }
514
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300515 if (rc == 0) {
Dominik Ermel5bd87442022-06-13 15:14:01 +0000516 curr_off += img_chunk_len;
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200517 if (curr_off == img_size) {
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200518#ifdef MCUBOOT_ERASE_PROGRESSIVELY
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200519 /* Assure that sector for image trailer was erased. */
520 /* Check whether it was erased during previous upload. */
Dominik Ermelbcc17b42022-06-15 15:33:04 +0000521 off_t start = flash_sector_get_off(&status_sector);
522
523 if (erase_range(fap, start, start) < 0) {
524 rc = MGMT_ERR_EUNKNOWN;
525 goto out;
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200526 }
Andrzej Puzdrowskic2e30cf2018-07-20 16:19:09 +0200527#endif
Andrzej Puzdrowski4f9c7302021-07-16 17:34:43 +0200528 rc = BOOT_HOOK_CALL(boot_serial_uploaded_hook, 0, img_num, fap,
529 img_size);
530 if (rc) {
531 BOOT_LOG_ERR("Error %d post upload hook", rc);
532 goto out;
533 }
534 }
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300535 } else {
536 out_invalid_data:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800537 rc = MGMT_ERR_EINVAL;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800538 }
Emanuele Di Santo205c8c62018-07-20 11:42:31 +0200539
Christopher Collins92ea77f2016-12-12 15:59:26 -0800540out:
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200541 BOOT_LOG_INF("RX: 0x%x", rc);
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100542 zcbor_map_start_encode(cbor_state, 10);
543 zcbor_tstr_put_lit_cast(cbor_state, "rc");
544 zcbor_uint32_put(cbor_state, rc);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800545 if (rc == 0) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100546 zcbor_tstr_put_lit_cast(cbor_state, "off");
547 zcbor_uint32_put(cbor_state, curr_off);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800548 }
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100549 zcbor_map_end_encode(cbor_state, 10);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800550
551 boot_serial_output();
552 flash_area_close(fap);
Wouter Cappelle953a7612021-05-03 16:53:05 +0200553
554#ifdef MCUBOOT_ENC_IMAGES
555 if (curr_off == img_size) {
556 /* Last sector received, now start a decryption on the image if it is encrypted*/
557 rc = boot_handle_enc_fw();
558 }
559#endif //#ifdef MCUBOOT_ENC_IMAGES
Christopher Collins92ea77f2016-12-12 15:59:26 -0800560}
561
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000562/*
563 * Send rc code only.
564 */
565static void
566bs_rc_rsp(int rc_code)
567{
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100568 zcbor_map_start_encode(cbor_state, 10);
569 zcbor_tstr_put_lit_cast(cbor_state, "rc");
570 zcbor_uint32_put(cbor_state, rc_code);
571 zcbor_map_end_encode(cbor_state, 10);
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000572 boot_serial_output();
573}
574
575
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200576#ifdef MCUBOOT_BOOT_MGMT_ECHO
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200577static void
578bs_echo(char *buf, int len)
579{
Dominik Ermel88bd5672022-06-07 15:17:06 +0000580 struct Echo echo = { 0 };
581 size_t decoded_len;
582 uint32_t rc = MGMT_ERR_EINVAL;
583 uint_fast8_t result = cbor_decode_Echo((const uint8_t *)buf, len, &echo, &decoded_len);
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200584
Dominik Ermel88bd5672022-06-07 15:17:06 +0000585 if ((result != ZCBOR_SUCCESS) || (len != decoded_len)) {
586 goto out;
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200587 }
Dominik Ermel88bd5672022-06-07 15:17:06 +0000588
589 if (echo._Echo_d.value == NULL) {
590 goto out;
591 }
592
593 zcbor_map_start_encode(cbor_state, 10);
594 zcbor_tstr_put_term(cbor_state, "r");
595 if (zcbor_tstr_encode(cbor_state, &echo._Echo_d) && zcbor_map_end_encode(cbor_state, 10)) {
596 boot_serial_output();
597 return;
598 } else {
599 rc = MGMT_ERR_ENOMEM;
600 }
601
602out:
603 reset_cbor_state();
604 bs_rc_rsp(rc);
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200605}
606#endif
607
Christopher Collins92ea77f2016-12-12 15:59:26 -0800608/*
Christopher Collins92ea77f2016-12-12 15:59:26 -0800609 * Reset, and (presumably) boot to newly uploaded image. Flush console
610 * before restarting.
611 */
Andrzej Puzdrowski268cdd02018-04-10 12:57:54 +0200612static void
Christopher Collins92ea77f2016-12-12 15:59:26 -0800613bs_reset(char *buf, int len)
614{
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000615 bs_rc_rsp(0);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800616
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200617#ifdef __ZEPHYR__
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200618#ifdef CONFIG_MULTITHREADING
Carles Cufi7e7b4ad2020-03-30 19:12:02 +0200619 k_sleep(K_MSEC(250));
Andrzej Puzdrowski0cf0dbd2021-05-14 11:55:57 +0200620#else
621 k_busy_wait(250000);
622#endif
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200623 sys_reboot(SYS_REBOOT_COLD);
624#else
Christopher Collins92ea77f2016-12-12 15:59:26 -0800625 os_cputime_delay_usecs(250000);
626 hal_system_reset();
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200627#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800628}
629
630/*
631 * Parse incoming line of input from console.
632 * Expect newtmgr protocol with serial transport.
633 */
634void
635boot_serial_input(char *buf, int len)
636{
637 struct nmgr_hdr *hdr;
638
639 hdr = (struct nmgr_hdr *)buf;
640 if (len < sizeof(*hdr) ||
641 (hdr->nh_op != NMGR_OP_READ && hdr->nh_op != NMGR_OP_WRITE) ||
642 (ntohs(hdr->nh_len) < len - sizeof(*hdr))) {
643 return;
644 }
645 bs_hdr = hdr;
646 hdr->nh_group = ntohs(hdr->nh_group);
647
648 buf += sizeof(*hdr);
649 len -= sizeof(*hdr);
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300650
Dominik Ermel4c0f6c12022-03-04 15:47:37 +0000651 reset_cbor_state();
Christopher Collins92ea77f2016-12-12 15:59:26 -0800652
653 /*
654 * Limited support for commands.
655 */
656 if (hdr->nh_group == MGMT_GROUP_ID_IMAGE) {
657 switch (hdr->nh_id) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300658 case IMGMGR_NMGR_ID_STATE:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800659 bs_list(buf, len);
660 break;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300661 case IMGMGR_NMGR_ID_UPLOAD:
Christopher Collins92ea77f2016-12-12 15:59:26 -0800662 bs_upload(buf, len);
663 break;
664 default:
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000665 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800666 break;
667 }
668 } else if (hdr->nh_group == MGMT_GROUP_ID_DEFAULT) {
669 switch (hdr->nh_id) {
Wouter Cappellee3ff1752021-05-03 16:36:22 +0200670 case NMGR_ID_ECHO:
671#ifdef MCUBOOT_BOOT_MGMT_ECHO
672 bs_echo(buf, len);
673#endif
674 break;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800675 case NMGR_ID_CONS_ECHO_CTRL:
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000676 bs_rc_rsp(0);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800677 break;
678 case NMGR_ID_RESET:
679 bs_reset(buf, len);
680 break;
681 default:
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000682 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800683 break;
684 }
Dominik Ermelbd69c3d2021-07-28 11:27:31 +0000685 } else if (MCUBOOT_PERUSER_MGMT_GROUP_ENABLED == 1) {
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100686 if (bs_peruser_system_specific(hdr, buf, len, cbor_state) == 0) {
Dominik Ermel3d51e432021-06-25 17:29:50 +0000687 boot_serial_output();
688 }
Dominik Ermelc9dc2242021-07-28 17:08:23 +0000689 } else {
690 bs_rc_rsp(MGMT_ERR_ENOTSUP);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800691 }
Wouter Cappellee3822f82022-01-19 15:39:43 +0100692#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
693 bs_entry = true;
694#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800695}
696
697static void
698boot_serial_output(void)
699{
700 char *data;
701 int len;
702 uint16_t crc;
703 uint16_t totlen;
704 char pkt_start[2] = { SHELL_NLIP_PKT_START1, SHELL_NLIP_PKT_START2 };
Dominik Ermel5ff89582022-03-03 17:09:07 +0000705 char buf[BOOT_SERIAL_OUT_MAX + sizeof(*bs_hdr) + sizeof(crc) + sizeof(totlen)];
706 char encoded_buf[BASE64_ENCODE_SIZE(sizeof(buf))];
Christopher Collins92ea77f2016-12-12 15:59:26 -0800707
708 data = bs_obuf;
Øyvind Rønningstada7d34ca2022-02-28 13:47:57 +0100709 len = (uint32_t)cbor_state->payload_mut - (uint32_t)bs_obuf;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800710
711 bs_hdr->nh_op++;
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300712 bs_hdr->nh_flags = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800713 bs_hdr->nh_len = htons(len);
714 bs_hdr->nh_group = htons(bs_hdr->nh_group);
715
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200716#ifdef __ZEPHYR__
Carles Cufib9192a42022-02-10 11:41:57 +0100717 crc = crc16_itu_t(CRC16_INITIAL_CRC, (uint8_t *)bs_hdr, sizeof(*bs_hdr));
718 crc = crc16_itu_t(crc, data, len);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200719#else
Christopher Collins92ea77f2016-12-12 15:59:26 -0800720 crc = crc16_ccitt(CRC16_INITIAL_CRC, bs_hdr, sizeof(*bs_hdr));
721 crc = crc16_ccitt(crc, data, len);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200722#endif
Christopher Collins92ea77f2016-12-12 15:59:26 -0800723 crc = htons(crc);
724
Marko Kiiskila149b4572018-06-06 14:18:54 +0300725 boot_uf->write(pkt_start, sizeof(pkt_start));
Christopher Collins92ea77f2016-12-12 15:59:26 -0800726
727 totlen = len + sizeof(*bs_hdr) + sizeof(crc);
728 totlen = htons(totlen);
729
730 memcpy(buf, &totlen, sizeof(totlen));
731 totlen = sizeof(totlen);
732 memcpy(&buf[totlen], bs_hdr, sizeof(*bs_hdr));
733 totlen += sizeof(*bs_hdr);
734 memcpy(&buf[totlen], data, len);
735 totlen += len;
736 memcpy(&buf[totlen], &crc, sizeof(crc));
737 totlen += sizeof(crc);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200738#ifdef __ZEPHYR__
739 size_t enc_len;
Carles Cufi0165be82018-03-26 17:43:51 +0200740 base64_encode(encoded_buf, sizeof(encoded_buf), &enc_len, buf, totlen);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200741 totlen = enc_len;
742#else
Christopher Collins92ea77f2016-12-12 15:59:26 -0800743 totlen = base64_encode(buf, totlen, encoded_buf, 1);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200744#endif
Marko Kiiskila149b4572018-06-06 14:18:54 +0300745 boot_uf->write(encoded_buf, totlen);
Dominik Ermel2f2b31c2022-03-03 12:39:27 +0000746 boot_uf->write("\n", 1);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200747 BOOT_LOG_INF("TX");
Christopher Collins92ea77f2016-12-12 15:59:26 -0800748}
749
750/*
751 * Returns 1 if full packet has been received.
752 */
753static int
754boot_serial_in_dec(char *in, int inlen, char *out, int *out_off, int maxout)
755{
756 int rc;
757 uint16_t crc;
758 uint16_t len;
Marko Kiiskilae5aeee42018-12-21 15:00:16 +0200759
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200760#ifdef __ZEPHYR__
761 int err;
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200762 err = base64_decode( &out[*out_off], maxout - *out_off, &rc, in, inlen - 2);
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200763 if (err) {
764 return -1;
765 }
766#else
Christopher Collins92ea77f2016-12-12 15:59:26 -0800767 if (*out_off + base64_decode_len(in) >= maxout) {
768 return -1;
769 }
770 rc = base64_decode(in, &out[*out_off]);
771 if (rc < 0) {
772 return -1;
773 }
Andrzej Puzdrowski8e96b832017-09-08 16:49:14 +0200774#endif
Fabio Utzig6f49c272019-08-23 11:42:58 -0300775
Christopher Collins92ea77f2016-12-12 15:59:26 -0800776 *out_off += rc;
Fabio Utzig6f49c272019-08-23 11:42:58 -0300777 if (*out_off <= sizeof(uint16_t)) {
778 return 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800779 }
Fabio Utzig6f49c272019-08-23 11:42:58 -0300780
781 len = ntohs(*(uint16_t *)out);
782 if (len != *out_off - sizeof(uint16_t)) {
783 return 0;
784 }
785
786 if (len > *out_off - sizeof(uint16_t)) {
787 len = *out_off - sizeof(uint16_t);
788 }
789
790 out += sizeof(uint16_t);
791#ifdef __ZEPHYR__
Carles Cufib9192a42022-02-10 11:41:57 +0100792 crc = crc16_itu_t(CRC16_INITIAL_CRC, out, len);
Fabio Utzig6f49c272019-08-23 11:42:58 -0300793#else
794 crc = crc16_ccitt(CRC16_INITIAL_CRC, out, len);
795#endif
796 if (crc || len <= sizeof(crc)) {
797 return 0;
798 }
799 *out_off -= sizeof(crc);
800 out[*out_off] = '\0';
801
802 return 1;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800803}
804
805/*
806 * Task which waits reading console, expecting to get image over
807 * serial port.
808 */
Wouter Cappellee3822f82022-01-19 15:39:43 +0100809static void
810boot_serial_read_console(const struct boot_uart_funcs *f,int timeout_in_ms)
Christopher Collins92ea77f2016-12-12 15:59:26 -0800811{
812 int rc;
813 int off;
David Brown57f0df32020-05-12 08:39:21 -0600814 int dec_off = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800815 int full_line;
Marko Kiiskila149b4572018-06-06 14:18:54 +0300816 int max_input;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100817 int elapsed_in_ms = 0;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800818
Marko Kiiskila149b4572018-06-06 14:18:54 +0300819 boot_uf = f;
Marko Kiiskila149b4572018-06-06 14:18:54 +0300820 max_input = sizeof(in_buf);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800821
822 off = 0;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100823 while (timeout_in_ms > 0 || bs_entry) {
Andrzej Puzdrowskiaea38eb2021-06-11 12:28:59 +0200824 MCUBOOT_CPU_IDLE();
Hein Wessels56d28f02021-11-19 08:42:08 +0100825 MCUBOOT_WATCHDOG_FEED();
Wouter Cappellee3822f82022-01-19 15:39:43 +0100826#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
827 uint32_t start = k_uptime_get_32();
828#endif
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200829 rc = f->read(in_buf + off, sizeof(in_buf) - off, &full_line);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800830 if (rc <= 0 && !full_line) {
Wouter Cappellee3822f82022-01-19 15:39:43 +0100831 goto check_timeout;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800832 }
833 off += rc;
834 if (!full_line) {
Marko Kiiskilace50ab02018-06-06 11:33:33 +0300835 if (off == max_input) {
836 /*
837 * Full line, no newline yet. Reset the input buffer.
838 */
839 off = 0;
840 }
Wouter Cappellee3822f82022-01-19 15:39:43 +0100841 goto check_timeout;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800842 }
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200843 if (in_buf[0] == SHELL_NLIP_PKT_START1 &&
844 in_buf[1] == SHELL_NLIP_PKT_START2) {
Christopher Collins92ea77f2016-12-12 15:59:26 -0800845 dec_off = 0;
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200846 rc = boot_serial_in_dec(&in_buf[2], off - 2, dec_buf, &dec_off, max_input);
847 } else if (in_buf[0] == SHELL_NLIP_DATA_START1 &&
848 in_buf[1] == SHELL_NLIP_DATA_START2) {
849 rc = boot_serial_in_dec(&in_buf[2], off - 2, dec_buf, &dec_off, max_input);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800850 }
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200851
852 /* serve errors: out of decode memory, or bad encoding */
Christopher Collins92ea77f2016-12-12 15:59:26 -0800853 if (rc == 1) {
Andrzej Puzdrowskiec1e4d12018-06-18 14:36:14 +0200854 boot_serial_input(&dec_buf[2], dec_off - 2);
Christopher Collins92ea77f2016-12-12 15:59:26 -0800855 }
856 off = 0;
Wouter Cappellee3822f82022-01-19 15:39:43 +0100857check_timeout:
858 /* Subtract elapsed time */
859#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
860 elapsed_in_ms = (k_uptime_get_32() - start);
861#endif
862 timeout_in_ms -= elapsed_in_ms;
Christopher Collins92ea77f2016-12-12 15:59:26 -0800863 }
864}
Wouter Cappellee3822f82022-01-19 15:39:43 +0100865
866/*
867 * Task which waits reading console, expecting to get image over
868 * serial port.
869 */
870void
871boot_serial_start(const struct boot_uart_funcs *f)
872{
873 bs_entry = true;
874 boot_serial_read_console(f,0);
875}
876
877#ifdef MCUBOOT_SERIAL_WAIT_FOR_DFU
878/*
879 * Task which waits reading console for a certain amount of timeout.
880 * If within this timeout no mcumgr command is received, the function is
881 * returning, else the serial boot is never exited
882 */
883void
884boot_serial_check_start(const struct boot_uart_funcs *f, int timeout_in_ms)
885{
886 bs_entry = false;
887 boot_serial_read_console(f,timeout_in_ms);
888}
889#endif