@@ -48,9 +48,10 @@ MCUBoot is an open-source secure bootloader used by RW61x to apply the
48
48
self-upgrade. For more details, please refer to the
49
49
[ MCUBoot documentation] ( https://github.com/mcu-tools/mcuboot/blob/main/docs/design.md ) .
50
50
51
- For RW61x platform, the bootloader is configured to use the flash remapping
52
- mechanism by default, in order to perform the image upgrade. This is achieved by
53
- using the ` MCUBoot DIRECT-XIP ` upgrade mode.
51
+ In our use case, the bootloader runs the application residing in the primary
52
+ partition. In order to run the OTA update image, the bootloader will swap the
53
+ content of the primary and the secondary partitions. This type of upgrade is
54
+ called swap-move and is the default upgrade configured by MCUBoot.
54
55
55
56
## OTA Software Update process for RW61x example application
56
57
@@ -85,42 +86,47 @@ J-Link > exec EnableEraseAllFlashBanks
85
86
J-Link > erase 0x8000000, 0x88a0000
86
87
```
87
88
88
- - MCUBoot application can be built with SDK installed, using instructions
89
-
90
- below.
91
-
92
- - Retrieve the mcuboot directory with :
89
+ - Using MCUXPresso, import the ` mcuboot_opensource ` demo example from the SDK
90
+ previously downloaded. The example can be found under the ` ota_examples `
91
+ folder.
92
+ ![ mcuboot_demo] ( ../../../examples/platform/nxp/rt/rw61x/doc/images/mcuboot_demo.PNG )
93
+ - Before building the demo example, it should be specified that the
94
+ application to be run by the bootloader is monolithic. As a result, only one
95
+ image will be upgraded by the bootloader. This can be done by defining
96
+ ` MONOLITHIC_APP ` as 1 in the settings of the ` mcuboot_opensource ` project :
93
97
94
98
```
95
- user@ubuntu: cd ~/Desktop/connectedhomeip/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/armgcc
99
+ Right click on the Project -> Properties -> C/C++ Build -> Settings -> Tool Settings -> MCU C Compiler -> Preprocessor -> Add "MONOLITHIC_APP=1" in the Defined Symbols
96
100
```
97
101
98
- ` <rw612 board> ` : Supported rw612 boards are: ` rdrw612bga ` or ` frdmrw612 `
102
+ ![ rw610_mcuboot_monolithic ] ( ../../../examples/platform/nxp/rt/rw61x/doc/images/mcuboot_monolithic_app.PNG )
99
103
100
- - Build the mcuboot application :
104
+ - Build the demo example project.
101
105
102
106
```
103
- user@ubuntu: chmod +x build_flash_release.sh
104
- user@ubuntu: export ARMGCC_DIR=/opt/gcc-arm-none-eabi-10.3-2021.10 # with ARMGCC_DIR referencing the compiler path
105
- user@ubuntu: ./build_flash_release.sh
107
+ Right click on the Project -> Build Project
106
108
```
107
109
108
- - Program the generated binary to the target board.
110
+ - Program the demo example to the target board.
109
111
110
112
```
111
- J-Link > loadbin ~/Desktop/connectedhomeip/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ota_examples/mcuboot_opensource/armgcc/flash_release/mcuboot_opensource. elf
113
+ Right click on the Project -> Debug -> As->SEGGER JLink probes -> OK -> Select elf file
112
114
```
113
115
114
- - If it runs successfully, the following logs will be displayed on the
115
- terminal :
116
+ Note : The mcuboot binary is loaded in flash at address 0x8000000.
117
+
118
+ - To run the flashed demo, either press the reset button of the device or use
119
+ the debugger IDE of MCUXpresso. If it runs successfully, the following logs
120
+ will be displayed on the terminal :
116
121
117
122
```
118
123
hello sbl.
119
- Disabling flash remapping function
120
- Bootloader Version 2.0.0
121
- Image 0 Primary slot: Image not found
122
- Image 0 Secondary slot: Image not found
123
- No slot to load for image 0
124
+ Bootloader Version 1.9.0
125
+ Primary image: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
126
+ Secondary image: magic=unset, swap_type=0x1, copy_done=0x3, image_ok=0x3
127
+ Boot source: none
128
+ Swap type: none
129
+ erasing trailer; fa_id=2
124
130
Unable to find bootable image
125
131
```
126
132
@@ -129,7 +135,7 @@ partitions to be the size of 4.4 MB. If the size is to be changed, the partition
129
135
addresses should be modified in the flash_partitioning.h accordingly. For more
130
136
information about the flash partitioning with mcuboot, please refer to the
131
137
dedicated readme.txt located in
132
- "` <matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board> /ota_examples/mcuboot_opensource/` ".
138
+ "` SDK_RW612/boards/rdrw612bga /ota_examples/mcuboot_opensource/` ".
133
139
134
140
### Generating and flashing the signed application image
135
141
@@ -156,15 +162,15 @@ arm-none-eabi-objcopy -R .flash_config -R .NVM -O binary chip-rw61x-all-cluster-
156
162
157
163
To sign the image and wrap the raw binary of the application with the header and
158
164
trailer, "` imgtool ` " is provided in the SDK and can be found in
159
- "` <matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo /middleware/mcuboot_opensource/scripts/` ".
165
+ "` /middleware/mcuboot_opensource/scripts/ ` ".
160
166
161
167
The following commands can be run (make sure to replace the /path/to/file/binary
162
168
with the adequate files):
163
169
164
170
```
165
- user@ubuntu: cd ~/Desktop/<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/ middleware/mcuboot_opensource/scripts/
171
+ user@ubuntu: cd ~/Desktop/SDK_RW612/ middleware/mcuboot_opensource/scripts
166
172
167
- user@ubuntu: python3 imgtool.py sign --key ~/Desktop/<matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board>/ ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem --align 4 --header-size 0x1000 --pad-header --pad --confirm --slot-size 0x440000 --max-sectors 1088 --version "1.0" ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example.bin ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example_SIGNED.bin
173
+ user@ubuntu: python3 imgtool.py sign --key ~/Desktop/SDK_RW612/boards/rdrw612bga/ ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem --align 4 --header-size 0x1000 --pad-header --slot-size 0x440000 --max-sectors 1088 --version "1.0" ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example.bin ~/Desktop/connectedhomeip/examples/all-clusters-app/nxp/rt/rw61x/out/debug/chip-rw61x-all-cluster-example_SIGNED.bin
168
174
```
169
175
170
176
Notes :
@@ -176,7 +182,7 @@ Notes :
176
182
adjusted accordingly.
177
183
- In this example, the image is signed with the private key provided by the
178
184
SDK as an example
179
- (` <matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board> /ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem` ),
185
+ (` SDK_RW612/boards/rdrw612bga /ota_examples/mcuboot_opensource/keys/sign-rsa2048-priv.pem` ),
180
186
MCUBoot is built with its corresponding public key which would be used to
181
187
verify the integrity of the image. It is possible to generate a new pair of
182
188
keys using the following commands. This procedure should be done prior to
@@ -195,7 +201,7 @@ user@ubuntu: python3 imgtool.py getpub -k priv_key.pem
195
201
```
196
202
197
203
- The extracted public key can then be copied to the
198
- ` <matter_repo_root>/third_party/nxp/nxp_matter_support/github_sdk/common_sdk/repo/examples/<rw612 board> /ota_examples/mcuboot_opensource/keys/sign-rsa2048-pub.c` ,
204
+ ` SDK_RW612/boards/rdrw612bga /ota_examples/mcuboot_opensource/keys/sign-rsa2048-pub.c` ,
199
205
given as a value to the rsa_pub_key[ ] array.
200
206
201
207
The resulting output is the signed binary of the application version "1.0".
@@ -215,12 +221,11 @@ application and run it.
215
221
To generate the OTA update image the same procedure can be followed from the
216
222
[ Generating and flashing the signed application image] ( #generating-and-flashing-the-signed-application-image )
217
223
sub-section, replacing the "--version "1.0"" argument with "--version "2.0""
218
- (recent version of the update), without arguments "--pad" "--confirm" when
219
- running ` imgtool ` script during OTA Update Image generation.
224
+ (recent version of the update).
220
225
221
226
Note : When building the update image, the build arguments
222
- nxp_software_version=2 nxp_software_version_string =\" 2.0\" can be added to the
223
- gn gen command in order to specify the upgraded version.
227
+ ` nxp_software_version=2 nxp_sofware_version_string =\"2.0\" ` can be added to the
228
+ ` gn gen ` command in order to specify the upgraded version.
224
229
225
230
When the signed binary of the update is generated, the file should be converted
226
231
into OTA format. To do so, the ota_image_tool is provided in the repo and can be
0 commit comments