| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  | /*
 | 
					
						
							| 
									
										
										
										
											2023-07-17 11:59:28 +02:00
										 |  |  |  * SPDX-FileCopyrightText: 2015-2023 Espressif Systems (Shanghai) CO LTD | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  |  * | 
					
						
							|  |  |  |  * SPDX-License-Identifier: Apache-2.0 | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #include <stdlib.h>
 | 
					
						
							|  |  |  | #include <assert.h>
 | 
					
						
							|  |  |  | #include <string.h>
 | 
					
						
							|  |  |  | #include <stdio.h>
 | 
					
						
							|  |  |  | #include <sys/lock.h>
 | 
					
						
							|  |  |  | #include "sdkconfig.h"
 | 
					
						
							|  |  |  | #include "esp_flash_partitions.h"
 | 
					
						
							|  |  |  | #include "esp_attr.h"
 | 
					
						
							|  |  |  | #include "esp_flash.h"
 | 
					
						
							|  |  |  | #include "esp_partition.h"
 | 
					
						
							|  |  |  | #include "esp_flash_encrypt.h"
 | 
					
						
							|  |  |  | #include "esp_log.h"
 | 
					
						
							|  |  |  | #include "esp_rom_md5.h"
 | 
					
						
							| 
									
										
										
										
											2022-06-27 15:24:07 +08:00
										 |  |  | #include "spi_flash_mmap.h"
 | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  | #include "bootloader_common.h"
 | 
					
						
							|  |  |  | #include "esp_ota_ops.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #define HASH_LEN 32 /* SHA-256 digest length */
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | esp_err_t esp_partition_read(const esp_partition_t *partition, | 
					
						
							|  |  |  |                              size_t src_offset, void *dst, size_t size) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     assert(partition != NULL); | 
					
						
							|  |  |  |     if (src_offset > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_ARG; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (src_offset + size > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_SIZE; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (!partition->encrypted) { | 
					
						
							|  |  |  |         return esp_flash_read(partition->flash_chip, dst, partition->address + src_offset, size); | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #if CONFIG_SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE
 | 
					
						
							|  |  |  |     if (partition->flash_chip != esp_flash_default_chip) { | 
					
						
							|  |  |  |         return ESP_ERR_NOT_SUPPORTED; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     /* Encrypted partitions need to be read via a cache mapping */ | 
					
						
							|  |  |  |     const void *buf; | 
					
						
							| 
									
										
										
										
											2022-11-02 19:18:57 +08:00
										 |  |  |     esp_partition_mmap_handle_t handle; | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  |     esp_err_t err = esp_partition_mmap(partition, src_offset, size, | 
					
						
							|  |  |  |                                        SPI_FLASH_MMAP_DATA, &buf, &handle); | 
					
						
							|  |  |  |     if (err != ESP_OK) { | 
					
						
							|  |  |  |         return err; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     memcpy(dst, buf, size); | 
					
						
							| 
									
										
										
										
											2022-11-07 19:31:29 +08:00
										 |  |  |     esp_partition_munmap(handle); | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  |     return ESP_OK; | 
					
						
							|  |  |  | #else
 | 
					
						
							|  |  |  |     return ESP_ERR_NOT_SUPPORTED; | 
					
						
							|  |  |  | #endif // CONFIG_SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE
 | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | esp_err_t esp_partition_write(const esp_partition_t *partition, | 
					
						
							|  |  |  |                               size_t dst_offset, const void *src, size_t size) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     assert(partition != NULL); | 
					
						
							| 
									
										
										
										
											2023-07-17 11:59:28 +02:00
										 |  |  |     if (partition->readonly) { | 
					
						
							|  |  |  |         return ESP_ERR_NOT_ALLOWED; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  |     if (dst_offset > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_ARG; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (dst_offset + size > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_SIZE; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     dst_offset = partition->address + dst_offset; | 
					
						
							|  |  |  |     if (!partition->encrypted) { | 
					
						
							|  |  |  |         return esp_flash_write(partition->flash_chip, src, dst_offset, size); | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | #if CONFIG_SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE
 | 
					
						
							|  |  |  |     if (partition->flash_chip != esp_flash_default_chip) { | 
					
						
							|  |  |  |         return ESP_ERR_NOT_SUPPORTED; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     return esp_flash_write_encrypted(partition->flash_chip, dst_offset, src, size); | 
					
						
							|  |  |  | #else
 | 
					
						
							|  |  |  |     return ESP_ERR_NOT_SUPPORTED; | 
					
						
							|  |  |  | #endif // CONFIG_SPI_FLASH_ENABLE_ENCRYPTED_READ_WRITE
 | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | esp_err_t esp_partition_read_raw(const esp_partition_t *partition, | 
					
						
							|  |  |  |                                  size_t src_offset, void *dst, size_t size) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     assert(partition != NULL); | 
					
						
							|  |  |  |     if (src_offset > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_ARG; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (src_offset + size > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_SIZE; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return esp_flash_read(partition->flash_chip, dst, partition->address + src_offset, size); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | esp_err_t esp_partition_write_raw(const esp_partition_t *partition, | 
					
						
							|  |  |  |                                   size_t dst_offset, const void *src, size_t size) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     assert(partition != NULL); | 
					
						
							| 
									
										
										
										
											2023-07-17 11:59:28 +02:00
										 |  |  |     if (partition->readonly) { | 
					
						
							|  |  |  |         return ESP_ERR_NOT_ALLOWED; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  |     if (dst_offset > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_ARG; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (dst_offset + size > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_SIZE; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     dst_offset = partition->address + dst_offset; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return esp_flash_write(partition->flash_chip, src, dst_offset, size); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | esp_err_t esp_partition_erase_range(const esp_partition_t *partition, | 
					
						
							|  |  |  |                                     size_t offset, size_t size) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     assert(partition != NULL); | 
					
						
							| 
									
										
										
										
											2023-07-17 11:59:28 +02:00
										 |  |  |     if (partition->readonly) { | 
					
						
							|  |  |  |         return ESP_ERR_NOT_ALLOWED; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  |     if (offset > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_ARG; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (offset + size > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_SIZE; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (size % SPI_FLASH_SEC_SIZE != 0) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_SIZE; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (offset % SPI_FLASH_SEC_SIZE != 0) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_ARG; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2022-06-27 15:24:07 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  |     return esp_flash_erase_region(partition->flash_chip, partition->address + offset, size); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /*
 | 
					
						
							|  |  |  |  * Note: current implementation ignores the possibility of multiple regions in the same partition being | 
					
						
							|  |  |  |  * mapped. Reference counting and address space re-use is delegated to spi_flash_mmap. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * If this becomes a performance issue (i.e. if we need to map multiple regions within the partition), | 
					
						
							|  |  |  |  * we can add esp_partition_mmapv which will accept an array of offsets and sizes, and return array of | 
					
						
							|  |  |  |  * mmaped pointers, and a single handle for all these regions. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | esp_err_t esp_partition_mmap(const esp_partition_t *partition, size_t offset, size_t size, | 
					
						
							| 
									
										
										
										
											2022-10-14 14:15:32 +02:00
										 |  |  |                              esp_partition_mmap_memory_t memory, | 
					
						
							|  |  |  |                              const void **out_ptr, esp_partition_mmap_handle_t *out_handle) | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  | { | 
					
						
							|  |  |  |     assert(partition != NULL); | 
					
						
							|  |  |  |     if (offset > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_ARG; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (offset + size > partition->size) { | 
					
						
							|  |  |  |         return ESP_ERR_INVALID_SIZE; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (partition->flash_chip != esp_flash_default_chip) { | 
					
						
							|  |  |  |         return ESP_ERR_NOT_SUPPORTED; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     size_t phys_addr = partition->address + offset; | 
					
						
							| 
									
										
										
										
											2022-06-01 10:14:48 +08:00
										 |  |  |     // offset within mmu page size block
 | 
					
						
							|  |  |  |     size_t region_offset = phys_addr & (CONFIG_MMU_PAGE_SIZE - 1); | 
					
						
							|  |  |  |     size_t mmap_addr = phys_addr & ~(CONFIG_MMU_PAGE_SIZE - 1); | 
					
						
							| 
									
										
										
										
											2022-10-14 14:15:32 +02:00
										 |  |  |     esp_err_t rc = spi_flash_mmap(mmap_addr, size + region_offset, (spi_flash_mmap_memory_t) memory, out_ptr, (spi_flash_mmap_handle_t*) out_handle); | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  |     // adjust returned pointer to point to the correct offset
 | 
					
						
							|  |  |  |     if (rc == ESP_OK) { | 
					
						
							|  |  |  |         *out_ptr = (void *) (((ptrdiff_t) * out_ptr) + region_offset); | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     return rc; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-10-14 14:15:32 +02:00
										 |  |  | void esp_partition_munmap(esp_partition_mmap_handle_t handle) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     spi_flash_munmap((spi_flash_mmap_handle_t) handle); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  | esp_err_t esp_partition_get_sha256(const esp_partition_t *partition, uint8_t *sha_256) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     return bootloader_common_get_sha256_of_partition(partition->address, partition->size, partition->type, sha_256); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | bool esp_partition_check_identity(const esp_partition_t *partition_1, const esp_partition_t *partition_2) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     uint8_t sha_256[2][HASH_LEN] = { 0 }; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (esp_partition_get_sha256(partition_1, sha_256[0]) == ESP_OK && | 
					
						
							|  |  |  |             esp_partition_get_sha256(partition_2, sha_256[1]) == ESP_OK) { | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         if (memcmp(sha_256[0], sha_256[1], HASH_LEN) == 0) { | 
					
						
							|  |  |  |             // The partitions are identity
 | 
					
						
							|  |  |  |             return true; | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     return false; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-07-17 11:59:28 +02:00
										 |  |  | bool esp_partition_is_flash_region_writable(size_t addr, size_t size) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     esp_partition_iterator_t it = esp_partition_find(ESP_PARTITION_TYPE_ANY, ESP_PARTITION_SUBTYPE_ANY, NULL); | 
					
						
							|  |  |  |     for (; it != NULL; it = esp_partition_next(it)) { | 
					
						
							|  |  |  |         const esp_partition_t *p = esp_partition_get(it); | 
					
						
							|  |  |  |         if (p->readonly) { | 
					
						
							|  |  |  |             if (addr >= p->address && addr < p->address + p->size) { | 
					
						
							|  |  |  |                 return false; | 
					
						
							|  |  |  |             } | 
					
						
							|  |  |  |             if (addr < p->address && addr + size > p->address) { | 
					
						
							|  |  |  |                 return false; | 
					
						
							|  |  |  |             } | 
					
						
							|  |  |  |         } | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     return true; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  | bool esp_partition_main_flash_region_safe(size_t addr, size_t size) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     if (addr <= ESP_PARTITION_TABLE_OFFSET + ESP_PARTITION_TABLE_MAX_LEN) { | 
					
						
							|  |  |  |         return false; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     const esp_partition_t *p = esp_ota_get_running_partition(); | 
					
						
							|  |  |  |     if (addr >= p->address && addr < p->address + p->size) { | 
					
						
							|  |  |  |         return false; | 
					
						
							|  |  |  |     } | 
					
						
							|  |  |  |     if (addr < p->address && addr + size > p->address) { | 
					
						
							|  |  |  |         return false; | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2023-07-17 11:59:28 +02:00
										 |  |  |     return true; | 
					
						
							| 
									
										
										
										
											2022-01-28 18:16:13 +01:00
										 |  |  | } |