diff options
Diffstat (limited to 'examples/boot/bootloader')
| -rw-r--r-- | examples/boot/bootloader/nrf/Cargo.toml | 16 | ||||
| -rw-r--r-- | examples/boot/bootloader/rp/Cargo.toml | 12 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32-dual-bank/Cargo.toml | 12 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32/Cargo.toml | 12 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wb-dfu/Cargo.toml | 20 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wb-dfu/README.md | 26 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wb-dfu/memory.x | 8 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wb-dfu/secrets/key.pub.short | 1 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wb-dfu/src/main.rs | 29 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wba-dfu/.cargo/config.toml | 8 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wba-dfu/Cargo.toml | 70 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wba-dfu/README.md | 63 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wba-dfu/build.rs | 27 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wba-dfu/memory.x | 18 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wba-dfu/secrets/key.pub.short | 1 | ||||
| -rw-r--r-- | examples/boot/bootloader/stm32wba-dfu/src/main.rs | 158 |
16 files changed, 456 insertions, 25 deletions
diff --git a/examples/boot/bootloader/nrf/Cargo.toml b/examples/boot/bootloader/nrf/Cargo.toml index 34a0553e3..72b7114d4 100644 --- a/examples/boot/bootloader/nrf/Cargo.toml +++ b/examples/boot/bootloader/nrf/Cargo.toml | |||
| @@ -4,15 +4,16 @@ name = "nrf-bootloader-example" | |||
| 4 | version = "0.1.0" | 4 | version = "0.1.0" |
| 5 | description = "Bootloader for nRF chips" | 5 | description = "Bootloader for nRF chips" |
| 6 | license = "MIT OR Apache-2.0" | 6 | license = "MIT OR Apache-2.0" |
| 7 | publish = false | ||
| 7 | 8 | ||
| 8 | [dependencies] | 9 | [dependencies] |
| 9 | defmt = { version = "0.3", optional = true } | 10 | defmt = { version = "1.0.1", optional = true } |
| 10 | defmt-rtt = { version = "0.4", optional = true } | 11 | defmt-rtt = { version = "1.0.0", optional = true } |
| 11 | 12 | ||
| 12 | embassy-nrf = { path = "../../../../embassy-nrf", features = [] } | 13 | embassy-nrf = { path = "../../../../embassy-nrf", features = [] } |
| 13 | embassy-boot-nrf = { path = "../../../../embassy-boot-nrf" } | 14 | embassy-boot-nrf = { path = "../../../../embassy-boot-nrf" } |
| 14 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } | 15 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } |
| 15 | embassy-sync = { version = "0.6.2", path = "../../../../embassy-sync" } | 16 | embassy-sync = { version = "0.7.2", path = "../../../../embassy-sync" } |
| 16 | cortex-m-rt = { version = "0.7" } | 17 | cortex-m-rt = { version = "0.7" } |
| 17 | cfg-if = "1.0.0" | 18 | cfg-if = "1.0.0" |
| 18 | 19 | ||
| @@ -57,3 +58,12 @@ debug = false | |||
| 57 | debug-assertions = false | 58 | debug-assertions = false |
| 58 | opt-level = 0 | 59 | opt-level = 0 |
| 59 | overflow-checks = false | 60 | overflow-checks = false |
| 61 | |||
| 62 | [package.metadata.embassy] | ||
| 63 | build = [ | ||
| 64 | { target = "thumbv7em-none-eabi", features = ["embassy-nrf/nrf52840"] }, | ||
| 65 | { target = "thumbv8m.main-none-eabihf", features = ["embassy-nrf/nrf9160-ns"] }, | ||
| 66 | { target = "thumbv8m.main-none-eabihf", features = ["embassy-nrf/nrf9120-ns"] }, | ||
| 67 | { target = "thumbv8m.main-none-eabihf", features = ["embassy-nrf/nrf9151-ns"] }, | ||
| 68 | { target = "thumbv8m.main-none-eabihf", features = ["embassy-nrf/nrf9161-ns"] } | ||
| 69 | ] | ||
diff --git a/examples/boot/bootloader/rp/Cargo.toml b/examples/boot/bootloader/rp/Cargo.toml index 7c9c3c779..93a1c4edf 100644 --- a/examples/boot/bootloader/rp/Cargo.toml +++ b/examples/boot/bootloader/rp/Cargo.toml | |||
| @@ -4,14 +4,15 @@ name = "rp-bootloader-example" | |||
| 4 | version = "0.1.0" | 4 | version = "0.1.0" |
| 5 | description = "Example bootloader for RP2040 chips" | 5 | description = "Example bootloader for RP2040 chips" |
| 6 | license = "MIT OR Apache-2.0" | 6 | license = "MIT OR Apache-2.0" |
| 7 | publish = false | ||
| 7 | 8 | ||
| 8 | [dependencies] | 9 | [dependencies] |
| 9 | defmt = { version = "0.3", optional = true } | 10 | defmt = { version = "1.0.1", optional = true } |
| 10 | defmt-rtt = { version = "0.4", optional = true } | 11 | defmt-rtt = { version = "1.0.0", optional = true } |
| 11 | 12 | ||
| 12 | embassy-rp = { path = "../../../../embassy-rp", features = ["rp2040"] } | 13 | embassy-rp = { path = "../../../../embassy-rp", features = ["rp2040"] } |
| 13 | embassy-boot-rp = { path = "../../../../embassy-boot-rp" } | 14 | embassy-boot-rp = { path = "../../../../embassy-boot-rp" } |
| 14 | embassy-sync = { version = "0.6.2", path = "../../../../embassy-sync" } | 15 | embassy-sync = { version = "0.7.2", path = "../../../../embassy-sync" } |
| 15 | embassy-time = { path = "../../../../embassy-time", features = [] } | 16 | embassy-time = { path = "../../../../embassy-time", features = [] } |
| 16 | 17 | ||
| 17 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } | 18 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } |
| @@ -31,3 +32,8 @@ defmt = [ | |||
| 31 | [profile.release] | 32 | [profile.release] |
| 32 | debug = true | 33 | debug = true |
| 33 | opt-level = 's' | 34 | opt-level = 's' |
| 35 | |||
| 36 | [package.metadata.embassy] | ||
| 37 | build = [ | ||
| 38 | { target = "thumbv6m-none-eabi" } | ||
| 39 | ] | ||
diff --git a/examples/boot/bootloader/stm32-dual-bank/Cargo.toml b/examples/boot/bootloader/stm32-dual-bank/Cargo.toml index 4beb9c61c..95ca20a59 100644 --- a/examples/boot/bootloader/stm32-dual-bank/Cargo.toml +++ b/examples/boot/bootloader/stm32-dual-bank/Cargo.toml | |||
| @@ -4,10 +4,11 @@ name = "stm32-bootloader-dual-bank-flash-example" | |||
| 4 | version = "0.1.0" | 4 | version = "0.1.0" |
| 5 | description = "Example bootloader for dual-bank flash STM32 chips" | 5 | description = "Example bootloader for dual-bank flash STM32 chips" |
| 6 | license = "MIT OR Apache-2.0" | 6 | license = "MIT OR Apache-2.0" |
| 7 | publish = false | ||
| 7 | 8 | ||
| 8 | [dependencies] | 9 | [dependencies] |
| 9 | defmt = { version = "0.3", optional = true } | 10 | defmt = { version = "1.0.1", optional = true } |
| 10 | defmt-rtt = { version = "0.4", optional = true } | 11 | defmt-rtt = { version = "1.0.0", optional = true } |
| 11 | 12 | ||
| 12 | embassy-stm32 = { path = "../../../../embassy-stm32", features = [] } | 13 | embassy-stm32 = { path = "../../../../embassy-stm32", features = [] } |
| 13 | embassy-boot-stm32 = { path = "../../../../embassy-boot-stm32" } | 14 | embassy-boot-stm32 = { path = "../../../../embassy-boot-stm32" } |
| @@ -15,7 +16,7 @@ cortex-m = { version = "0.7.6", features = [ | |||
| 15 | "inline-asm", | 16 | "inline-asm", |
| 16 | "critical-section-single-core", | 17 | "critical-section-single-core", |
| 17 | ] } | 18 | ] } |
| 18 | embassy-sync = { version = "0.6.2", path = "../../../../embassy-sync" } | 19 | embassy-sync = { version = "0.7.2", path = "../../../../embassy-sync" } |
| 19 | cortex-m-rt = { version = "0.7" } | 20 | cortex-m-rt = { version = "0.7" } |
| 20 | embedded-storage = "0.3.1" | 21 | embedded-storage = "0.3.1" |
| 21 | embedded-storage-async = "0.4.0" | 22 | embedded-storage-async = "0.4.0" |
| @@ -54,3 +55,8 @@ debug = false | |||
| 54 | debug-assertions = false | 55 | debug-assertions = false |
| 55 | opt-level = 0 | 56 | opt-level = 0 |
| 56 | overflow-checks = false | 57 | overflow-checks = false |
| 58 | |||
| 59 | [package.metadata.embassy] | ||
| 60 | build = [ | ||
| 61 | { target = "thumbv7em-none-eabi", features = ["embassy-stm32/stm32h743zi"] } | ||
| 62 | ] | ||
diff --git a/examples/boot/bootloader/stm32/Cargo.toml b/examples/boot/bootloader/stm32/Cargo.toml index 9abad8636..526637f37 100644 --- a/examples/boot/bootloader/stm32/Cargo.toml +++ b/examples/boot/bootloader/stm32/Cargo.toml | |||
| @@ -4,15 +4,16 @@ name = "stm32-bootloader-example" | |||
| 4 | version = "0.1.0" | 4 | version = "0.1.0" |
| 5 | description = "Example bootloader for STM32 chips" | 5 | description = "Example bootloader for STM32 chips" |
| 6 | license = "MIT OR Apache-2.0" | 6 | license = "MIT OR Apache-2.0" |
| 7 | publish = false | ||
| 7 | 8 | ||
| 8 | [dependencies] | 9 | [dependencies] |
| 9 | defmt = { version = "0.3", optional = true } | 10 | defmt = { version = "1.0.1", optional = true } |
| 10 | defmt-rtt = { version = "0.4", optional = true } | 11 | defmt-rtt = { version = "1.0.0", optional = true } |
| 11 | 12 | ||
| 12 | embassy-stm32 = { path = "../../../../embassy-stm32", features = [] } | 13 | embassy-stm32 = { path = "../../../../embassy-stm32", features = [] } |
| 13 | embassy-boot-stm32 = { path = "../../../../embassy-boot-stm32" } | 14 | embassy-boot-stm32 = { path = "../../../../embassy-boot-stm32" } |
| 14 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } | 15 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } |
| 15 | embassy-sync = { version = "0.6.2", path = "../../../../embassy-sync" } | 16 | embassy-sync = { version = "0.7.2", path = "../../../../embassy-sync" } |
| 16 | cortex-m-rt = { version = "0.7" } | 17 | cortex-m-rt = { version = "0.7" } |
| 17 | embedded-storage = "0.3.1" | 18 | embedded-storage = "0.3.1" |
| 18 | embedded-storage-async = "0.4.0" | 19 | embedded-storage-async = "0.4.0" |
| @@ -56,3 +57,8 @@ debug = false | |||
| 56 | debug-assertions = false | 57 | debug-assertions = false |
| 57 | opt-level = 0 | 58 | opt-level = 0 |
| 58 | overflow-checks = false | 59 | overflow-checks = false |
| 60 | |||
| 61 | [package.metadata.embassy] | ||
| 62 | build = [ | ||
| 63 | { target = "thumbv7em-none-eabi", features = ["embassy-stm32/stm32l496zg"] } | ||
| 64 | ] | ||
diff --git a/examples/boot/bootloader/stm32wb-dfu/Cargo.toml b/examples/boot/bootloader/stm32wb-dfu/Cargo.toml index 01343b86b..ef10aeabf 100644 --- a/examples/boot/bootloader/stm32wb-dfu/Cargo.toml +++ b/examples/boot/bootloader/stm32wb-dfu/Cargo.toml | |||
| @@ -4,22 +4,23 @@ name = "stm32wb-dfu-bootloader-example" | |||
| 4 | version = "0.1.0" | 4 | version = "0.1.0" |
| 5 | description = "Example USB DFUbootloader for the STM32WB series of chips" | 5 | description = "Example USB DFUbootloader for the STM32WB series of chips" |
| 6 | license = "MIT OR Apache-2.0" | 6 | license = "MIT OR Apache-2.0" |
| 7 | publish = false | ||
| 7 | 8 | ||
| 8 | [dependencies] | 9 | [dependencies] |
| 9 | defmt = { version = "0.3", optional = true } | 10 | defmt = { version = "1.0.1", optional = true } |
| 10 | defmt-rtt = { version = "0.4", optional = true } | 11 | defmt-rtt = { version = "1.0.0", optional = true } |
| 11 | 12 | ||
| 12 | embassy-stm32 = { path = "../../../../embassy-stm32", features = [] } | 13 | embassy-stm32 = { path = "../../../../embassy-stm32", features = [] } |
| 13 | embassy-boot-stm32 = { path = "../../../../embassy-boot-stm32" } | 14 | embassy-boot-stm32 = { path = "../../../../embassy-boot-stm32" } |
| 14 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } | 15 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } |
| 15 | embassy-sync = { version = "0.6.2", path = "../../../../embassy-sync" } | 16 | embassy-sync = { version = "0.7.2", path = "../../../../embassy-sync" } |
| 16 | cortex-m-rt = { version = "0.7" } | 17 | cortex-m-rt = { version = "0.7" } |
| 17 | embedded-storage = "0.3.1" | 18 | embedded-storage = "0.3.1" |
| 18 | embedded-storage-async = "0.4.0" | 19 | embedded-storage-async = "0.4.0" |
| 19 | cfg-if = "1.0.0" | 20 | cfg-if = "1.0.0" |
| 20 | embassy-usb-dfu = { version = "0.1.0", path = "../../../../embassy-usb-dfu", features = ["dfu", "cortex-m"] } | 21 | embassy-usb-dfu = { version = "0.2.0", path = "../../../../embassy-usb-dfu", features = ["dfu", "cortex-m"] } |
| 21 | embassy-usb = { version = "0.4.0", path = "../../../../embassy-usb", default-features = false } | 22 | embassy-usb = { version = "0.5.1", path = "../../../../embassy-usb", default-features = false } |
| 22 | embassy-futures = { version = "0.1.1", path = "../../../../embassy-futures" } | 23 | embassy-futures = { version = "0.1.2", path = "../../../../embassy-futures" } |
| 23 | 24 | ||
| 24 | [features] | 25 | [features] |
| 25 | defmt = [ | 26 | defmt = [ |
| @@ -30,6 +31,7 @@ defmt = [ | |||
| 30 | "embassy-usb/defmt", | 31 | "embassy-usb/defmt", |
| 31 | "embassy-usb-dfu/defmt" | 32 | "embassy-usb-dfu/defmt" |
| 32 | ] | 33 | ] |
| 34 | verify = ["embassy-usb-dfu/ed25519-salty"] | ||
| 33 | 35 | ||
| 34 | [profile.dev] | 36 | [profile.dev] |
| 35 | debug = 2 | 37 | debug = 2 |
| @@ -61,3 +63,9 @@ debug = false | |||
| 61 | debug-assertions = false | 63 | debug-assertions = false |
| 62 | opt-level = 0 | 64 | opt-level = 0 |
| 63 | overflow-checks = false | 65 | overflow-checks = false |
| 66 | |||
| 67 | [package.metadata.embassy] | ||
| 68 | build = [ | ||
| 69 | { target = "thumbv7em-none-eabi", features = ["embassy-stm32/stm32wb55rg"] }, | ||
| 70 | { target = "thumbv7em-none-eabi", features = ["embassy-stm32/stm32wb55rg", "verify"] } | ||
| 71 | ] | ||
diff --git a/examples/boot/bootloader/stm32wb-dfu/README.md b/examples/boot/bootloader/stm32wb-dfu/README.md index 3c5f268a0..99a7002c4 100644 --- a/examples/boot/bootloader/stm32wb-dfu/README.md +++ b/examples/boot/bootloader/stm32wb-dfu/README.md | |||
| @@ -28,6 +28,32 @@ cargo objcopy --release -- -O binary fw.bin | |||
| 28 | dfu-util -d c0de:cafe -w -D fw.bin | 28 | dfu-util -d c0de:cafe -w -D fw.bin |
| 29 | ``` | 29 | ``` |
| 30 | 30 | ||
| 31 | ### 3. Sign Updates Before Flashing (Optional) | ||
| 32 | |||
| 33 | Currently, embassy-usb-dfu only supports a limited implementation of the generic support for ed25519-based update verfication in embassy-boot. This implementation assumes that a signature is simply concatenated to the end of an update binary. For more details, please see https://embassy.dev/book/#_verification and/or refer to the documentation for embassy-boot-dfu. | ||
| 34 | |||
| 35 | To sign (and then verify) application updates, you will first need to generate a key pair: | ||
| 36 | |||
| 37 | ``` | ||
| 38 | signify-openbsd -G -n -p secrets/key.pub -s secrets/key.sec | ||
| 39 | tail -n1 secrets/key.pub | base64 -d -i - | dd ibs=10 skip=1 > secrets/key.pub.short | ||
| 40 | ``` | ||
| 41 | |||
| 42 | Then you will need to sign all you binaries with the private key: | ||
| 43 | |||
| 44 | ``` | ||
| 45 | cargo objcopy --release -- -O binary fw.bin | ||
| 46 | shasum -a 512 -b fw.bin | head -c128 | xxd -p -r > target/fw-hash.txt | ||
| 47 | signify-openbsd -S -s secrets/key.sec -m target/fw-hash.txt -x target/fw-hash.sig | ||
| 48 | cp fw.bin fw-signed.bin | ||
| 49 | tail -n1 target/fw-hash.sig | base64 -d -i - | dd ibs=10 skip=1 >> fw-signed.bin | ||
| 50 | dfu-util -d c0de:cafe -w -D fw-signed.bin | ||
| 51 | ``` | ||
| 52 | |||
| 53 | Finally, as shown in this example with the `verify` feature flag enabled, you then need to embed the public key into your bootloader so that it can verify update signatures. | ||
| 54 | |||
| 55 | N.B. Please note that the exact steps above are NOT a good example of how to manage your keys securely. In a production environment, you should take great care to ensure that (at least the private key) is protected and not leaked into your version control system. | ||
| 56 | |||
| 31 | ## Troubleshooting | 57 | ## Troubleshooting |
| 32 | 58 | ||
| 33 | - Make sure your device is in DFU mode before flashing | 59 | - Make sure your device is in DFU mode before flashing |
diff --git a/examples/boot/bootloader/stm32wb-dfu/memory.x b/examples/boot/bootloader/stm32wb-dfu/memory.x index 858062631..77c4d2ee2 100644 --- a/examples/boot/bootloader/stm32wb-dfu/memory.x +++ b/examples/boot/bootloader/stm32wb-dfu/memory.x | |||
| @@ -1,10 +1,10 @@ | |||
| 1 | MEMORY | 1 | MEMORY |
| 2 | { | 2 | { |
| 3 | /* NOTE 1 K = 1 KiBi = 1024 bytes */ | 3 | /* NOTE 1 K = 1 KiBi = 1024 bytes */ |
| 4 | FLASH : ORIGIN = 0x08000000, LENGTH = 24K | 4 | FLASH : ORIGIN = 0x08000000, LENGTH = 48K |
| 5 | BOOTLOADER_STATE : ORIGIN = 0x08006000, LENGTH = 4K | 5 | BOOTLOADER_STATE : ORIGIN = 0x0800C000, LENGTH = 4K |
| 6 | ACTIVE : ORIGIN = 0x08008000, LENGTH = 128K | 6 | ACTIVE : ORIGIN = 0x0800D000, LENGTH = 120K |
| 7 | DFU : ORIGIN = 0x08028000, LENGTH = 132K | 7 | DFU : ORIGIN = 0x0802B000, LENGTH = 120K |
| 8 | RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 16K | 8 | RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 16K |
| 9 | } | 9 | } |
| 10 | 10 | ||
diff --git a/examples/boot/bootloader/stm32wb-dfu/secrets/key.pub.short b/examples/boot/bootloader/stm32wb-dfu/secrets/key.pub.short new file mode 100644 index 000000000..7a4de8585 --- /dev/null +++ b/examples/boot/bootloader/stm32wb-dfu/secrets/key.pub.short | |||
| @@ -0,0 +1 @@ | |||
| gB��p�M�S��z��Kg��!�F���!4�r \ No newline at end of file | |||
diff --git a/examples/boot/bootloader/stm32wb-dfu/src/main.rs b/examples/boot/bootloader/stm32wb-dfu/src/main.rs index 28216806e..107f243fd 100644 --- a/examples/boot/bootloader/stm32wb-dfu/src/main.rs +++ b/examples/boot/bootloader/stm32wb-dfu/src/main.rs | |||
| @@ -20,9 +20,17 @@ bind_interrupts!(struct Irqs { | |||
| 20 | USB_LP => usb::InterruptHandler<peripherals::USB>; | 20 | USB_LP => usb::InterruptHandler<peripherals::USB>; |
| 21 | }); | 21 | }); |
| 22 | 22 | ||
| 23 | // This is a randomly generated GUID to allow clients on Windows to find our device | 23 | // This is a randomly generated GUID to allow clients on Windows to find your device. |
| 24 | // | ||
| 25 | // N.B. update to a custom GUID for your own device! | ||
| 24 | const DEVICE_INTERFACE_GUIDS: &[&str] = &["{EAA9A5DC-30BA-44BC-9232-606CDC875321}"]; | 26 | const DEVICE_INTERFACE_GUIDS: &[&str] = &["{EAA9A5DC-30BA-44BC-9232-606CDC875321}"]; |
| 25 | 27 | ||
| 28 | // This is a randomly generated example key. | ||
| 29 | // | ||
| 30 | // N.B. Please replace with your own! | ||
| 31 | #[cfg(feature = "verify")] | ||
| 32 | static PUBLIC_SIGNING_KEY: &[u8; 32] = include_bytes!("../secrets/key.pub.short"); | ||
| 33 | |||
| 26 | #[entry] | 34 | #[entry] |
| 27 | fn main() -> ! { | 35 | fn main() -> ! { |
| 28 | let mut config = embassy_stm32::Config::default(); | 36 | let mut config = embassy_stm32::Config::default(); |
| @@ -55,7 +63,13 @@ fn main() -> ! { | |||
| 55 | let mut config_descriptor = [0; 256]; | 63 | let mut config_descriptor = [0; 256]; |
| 56 | let mut bos_descriptor = [0; 256]; | 64 | let mut bos_descriptor = [0; 256]; |
| 57 | let mut control_buf = [0; 4096]; | 65 | let mut control_buf = [0; 4096]; |
| 66 | |||
| 67 | #[cfg(not(feature = "verify"))] | ||
| 58 | let mut state = Control::new(updater, DfuAttributes::CAN_DOWNLOAD, ResetImmediate); | 68 | let mut state = Control::new(updater, DfuAttributes::CAN_DOWNLOAD, ResetImmediate); |
| 69 | |||
| 70 | #[cfg(feature = "verify")] | ||
| 71 | let mut state = Control::new(updater, DfuAttributes::CAN_DOWNLOAD, ResetImmediate, PUBLIC_SIGNING_KEY); | ||
| 72 | |||
| 59 | let mut builder = Builder::new( | 73 | let mut builder = Builder::new( |
| 60 | driver, | 74 | driver, |
| 61 | config, | 75 | config, |
| @@ -68,7 +82,8 @@ fn main() -> ! { | |||
| 68 | // We add MSOS headers so that the device automatically gets assigned the WinUSB driver on Windows. | 82 | // We add MSOS headers so that the device automatically gets assigned the WinUSB driver on Windows. |
| 69 | // Otherwise users need to do this manually using a tool like Zadig. | 83 | // Otherwise users need to do this manually using a tool like Zadig. |
| 70 | // | 84 | // |
| 71 | // It seems it is important for the DFU class that these headers be on the Device level. | 85 | // It seems these always need to be at added at the device level for this to work and for |
| 86 | // composite devices they also need to be added on the function level (as shown later). | ||
| 72 | // | 87 | // |
| 73 | builder.msos_descriptor(msos::windows_version::WIN8_1, 2); | 88 | builder.msos_descriptor(msos::windows_version::WIN8_1, 2); |
| 74 | builder.msos_feature(msos::CompatibleIdFeatureDescriptor::new("WINUSB", "")); | 89 | builder.msos_feature(msos::CompatibleIdFeatureDescriptor::new("WINUSB", "")); |
| @@ -77,7 +92,15 @@ fn main() -> ! { | |||
| 77 | msos::PropertyData::RegMultiSz(DEVICE_INTERFACE_GUIDS), | 92 | msos::PropertyData::RegMultiSz(DEVICE_INTERFACE_GUIDS), |
| 78 | )); | 93 | )); |
| 79 | 94 | ||
| 80 | usb_dfu::<_, _, _, _, 4096>(&mut builder, &mut state); | 95 | usb_dfu::<_, _, _, _, 4096>(&mut builder, &mut state, |func| { |
| 96 | // You likely don't have to add these function level headers if your USB device is not composite | ||
| 97 | // (i.e. if your device does not expose another interface in addition to DFU) | ||
| 98 | func.msos_feature(msos::CompatibleIdFeatureDescriptor::new("WINUSB", "")); | ||
| 99 | func.msos_feature(msos::RegistryPropertyFeatureDescriptor::new( | ||
| 100 | "DeviceInterfaceGUIDs", | ||
| 101 | msos::PropertyData::RegMultiSz(DEVICE_INTERFACE_GUIDS), | ||
| 102 | )); | ||
| 103 | }); | ||
| 81 | 104 | ||
| 82 | let mut dev = builder.build(); | 105 | let mut dev = builder.build(); |
| 83 | embassy_futures::block_on(dev.run()); | 106 | embassy_futures::block_on(dev.run()); |
diff --git a/examples/boot/bootloader/stm32wba-dfu/.cargo/config.toml b/examples/boot/bootloader/stm32wba-dfu/.cargo/config.toml new file mode 100644 index 000000000..1896068d8 --- /dev/null +++ b/examples/boot/bootloader/stm32wba-dfu/.cargo/config.toml | |||
| @@ -0,0 +1,8 @@ | |||
| 1 | [target.'cfg(all(target_arch = "arm", target_os = "none"))'] | ||
| 2 | runner = "probe-rs run --chip STM32WBA65RI" | ||
| 3 | |||
| 4 | [build] | ||
| 5 | target = "thumbv8m.main-none-eabihf" | ||
| 6 | |||
| 7 | [env] | ||
| 8 | DEFMT_LOG = "trace" | ||
diff --git a/examples/boot/bootloader/stm32wba-dfu/Cargo.toml b/examples/boot/bootloader/stm32wba-dfu/Cargo.toml new file mode 100644 index 000000000..16de7684e --- /dev/null +++ b/examples/boot/bootloader/stm32wba-dfu/Cargo.toml | |||
| @@ -0,0 +1,70 @@ | |||
| 1 | [package] | ||
| 2 | edition = "2021" | ||
| 3 | name = "stm32wba6-dfu-bootloader-example" | ||
| 4 | version = "0.1.0" | ||
| 5 | description = "Example USB DFUbootloader for the STM32WBA series of chips" | ||
| 6 | license = "MIT OR Apache-2.0" | ||
| 7 | publish = false | ||
| 8 | |||
| 9 | [dependencies] | ||
| 10 | defmt = { version = "1.0.1", optional = true } | ||
| 11 | defmt-rtt = { version = "1.0.0", optional = true } | ||
| 12 | |||
| 13 | embassy-stm32 = { path = "../../../../embassy-stm32", features = [] } | ||
| 14 | embassy-boot-stm32 = { path = "../../../../embassy-boot-stm32" } | ||
| 15 | cortex-m = { version = "0.7.6", features = ["inline-asm", "critical-section-single-core"] } | ||
| 16 | embassy-sync = { version = "0.7.2", path = "../../../../embassy-sync" } | ||
| 17 | cortex-m-rt = { version = "0.7" } | ||
| 18 | embedded-storage = "0.3.1" | ||
| 19 | embedded-storage-async = "0.4.0" | ||
| 20 | cfg-if = "1.0.0" | ||
| 21 | embassy-usb-dfu = { version = "0.2.0", path = "../../../../embassy-usb-dfu", features = ["dfu", "cortex-m"] } | ||
| 22 | embassy-usb = { version = "0.5.1", path = "../../../../embassy-usb", default-features = false } | ||
| 23 | embassy-futures = { version = "0.1.2", path = "../../../../embassy-futures" } | ||
| 24 | |||
| 25 | [features] | ||
| 26 | defmt = [ | ||
| 27 | "dep:defmt", | ||
| 28 | "dep:defmt-rtt", | ||
| 29 | "embassy-boot-stm32/defmt", | ||
| 30 | "embassy-stm32/defmt", | ||
| 31 | "embassy-usb/defmt", | ||
| 32 | "embassy-usb-dfu/defmt" | ||
| 33 | ] | ||
| 34 | verify = ["embassy-usb-dfu/ed25519-salty"] | ||
| 35 | |||
| 36 | [profile.dev] | ||
| 37 | debug = 2 | ||
| 38 | debug-assertions = true | ||
| 39 | incremental = false | ||
| 40 | opt-level = 'z' | ||
| 41 | overflow-checks = true | ||
| 42 | |||
| 43 | [profile.release] | ||
| 44 | codegen-units = 1 | ||
| 45 | debug = 2 | ||
| 46 | debug-assertions = false | ||
| 47 | incremental = false | ||
| 48 | lto = 'fat' | ||
| 49 | opt-level = 'z' | ||
| 50 | overflow-checks = false | ||
| 51 | |||
| 52 | # do not optimize proc-macro crates = faster builds from scratch | ||
| 53 | [profile.dev.build-override] | ||
| 54 | codegen-units = 8 | ||
| 55 | debug = false | ||
| 56 | debug-assertions = false | ||
| 57 | opt-level = 0 | ||
| 58 | overflow-checks = false | ||
| 59 | |||
| 60 | [profile.release.build-override] | ||
| 61 | codegen-units = 8 | ||
| 62 | debug = false | ||
| 63 | debug-assertions = false | ||
| 64 | opt-level = 0 | ||
| 65 | overflow-checks = false | ||
| 66 | |||
| 67 | [package.metadata.embassy] | ||
| 68 | build = [ | ||
| 69 | { target = "thumbv8m.main-none-eabihf", features = ["embassy-stm32/stm32wba65ri", "verify"] } | ||
| 70 | ] | ||
diff --git a/examples/boot/bootloader/stm32wba-dfu/README.md b/examples/boot/bootloader/stm32wba-dfu/README.md new file mode 100644 index 000000000..d50164255 --- /dev/null +++ b/examples/boot/bootloader/stm32wba-dfu/README.md | |||
| @@ -0,0 +1,63 @@ | |||
| 1 | # Bootloader for STM32 | ||
| 2 | |||
| 3 | This bootloader implementation uses `embassy-boot` and `embassy-usb-dfu` to manage firmware updates and interact with the flash memory on STM32WB55 devices. | ||
| 4 | |||
| 5 | ## Prerequisites | ||
| 6 | |||
| 7 | - Rust toolchain with `cargo` installed | ||
| 8 | - `cargo-flash` for flashing the bootloader | ||
| 9 | - `dfu-util` for firmware updates | ||
| 10 | - `cargo-binutils` for binary generation | ||
| 11 | |||
| 12 | ## Usage | ||
| 13 | |||
| 14 | ### 1. Flash the Bootloader | ||
| 15 | |||
| 16 | First, flash the bootloader to your device: | ||
| 17 | |||
| 18 | ``` | ||
| 19 | cargo flash --features embassy-stm32/stm32wba65ri --release --chip STM32WBA65RI | ||
| 20 | ``` | ||
| 21 | |||
| 22 | ### 2. Build and Flash Application | ||
| 23 | |||
| 24 | Generate your application binary and flash it using DFU: | ||
| 25 | |||
| 26 | ``` | ||
| 27 | cargo objcopy --release -- -O binary fw.bin | ||
| 28 | dfu-util -d c0de:cafe -w -D fw.bin | ||
| 29 | ``` | ||
| 30 | |||
| 31 | ### 3. Sign Updates Before Flashing (Optional) | ||
| 32 | |||
| 33 | Currently, embassy-usb-dfu only supports a limited implementation of the generic support for ed25519-based update verfication in embassy-boot. This implementation assumes that a signature is simply concatenated to the end of an update binary. For more details, please see https://embassy.dev/book/#_verification and/or refer to the documentation for embassy-boot-dfu. | ||
| 34 | |||
| 35 | To sign (and then verify) application updates, you will first need to generate a key pair: | ||
| 36 | |||
| 37 | ``` | ||
| 38 | signify-openbsd -G -n -p secrets/key.pub -s secrets/key.sec | ||
| 39 | tail -n1 secrets/key.pub | base64 -d -i - | dd ibs=10 skip=1 > secrets/key.pub.short | ||
| 40 | ``` | ||
| 41 | |||
| 42 | Then you will need to sign all you binaries with the private key: | ||
| 43 | |||
| 44 | ``` | ||
| 45 | cargo objcopy --release -- -O binary fw.bin | ||
| 46 | shasum -a 512 -b fw.bin | head -c128 | xxd -p -r > target/fw-hash.txt | ||
| 47 | signify-openbsd -S -s secrets/key.sec -m target/fw-hash.txt -x target/fw-hash.sig | ||
| 48 | cp fw.bin fw-signed.bin | ||
| 49 | tail -n1 target/fw-hash.sig | base64 -d -i - | dd ibs=10 skip=1 >> fw-signed.bin | ||
| 50 | dfu-util -d c0de:cafe -w -D fw-signed.bin | ||
| 51 | ``` | ||
| 52 | |||
| 53 | Finally, as shown in this example with the `verify` feature flag enabled, you then need to embed the public key into your bootloader so that it can verify update signatures. | ||
| 54 | |||
| 55 | N.B. Please note that the exact steps above are NOT a good example of how to manage your keys securely. In a production environment, you should take great care to ensure that (at least the private key) is protected and not leaked into your version control system. | ||
| 56 | |||
| 57 | ## Troubleshooting | ||
| 58 | |||
| 59 | - Make sure your device is in DFU mode before flashing | ||
| 60 | - Verify the USB VID:PID matches your device (c0de:cafe) | ||
| 61 | - Check USB connections if the device is not detected | ||
| 62 | - Make sure the transfer size option of `dfu-util` matches the bootloader configuration. By default, `dfu-util` will use the transfer size reported by the device, but you can override it with the `-t` option if needed. | ||
| 63 | - Make sure `control_buf` size is larger than or equal to the `usb_dfu` `BLOCK_SIZE` parameter (in this example, both are set to 4096 bytes). | ||
diff --git a/examples/boot/bootloader/stm32wba-dfu/build.rs b/examples/boot/bootloader/stm32wba-dfu/build.rs new file mode 100644 index 000000000..fd605991f --- /dev/null +++ b/examples/boot/bootloader/stm32wba-dfu/build.rs | |||
| @@ -0,0 +1,27 @@ | |||
| 1 | use std::env; | ||
| 2 | use std::fs::File; | ||
| 3 | use std::io::Write; | ||
| 4 | use std::path::PathBuf; | ||
| 5 | |||
| 6 | fn main() { | ||
| 7 | // Put `memory.x` in our output directory and ensure it's | ||
| 8 | // on the linker search path. | ||
| 9 | let out = &PathBuf::from(env::var_os("OUT_DIR").unwrap()); | ||
| 10 | File::create(out.join("memory.x")) | ||
| 11 | .unwrap() | ||
| 12 | .write_all(include_bytes!("memory.x")) | ||
| 13 | .unwrap(); | ||
| 14 | println!("cargo:rustc-link-search={}", out.display()); | ||
| 15 | |||
| 16 | // By default, Cargo will re-run a build script whenever | ||
| 17 | // any file in the project changes. By specifying `memory.x` | ||
| 18 | // here, we ensure the build script is only re-run when | ||
| 19 | // `memory.x` is changed. | ||
| 20 | println!("cargo:rerun-if-changed=memory.x"); | ||
| 21 | |||
| 22 | println!("cargo:rustc-link-arg-bins=--nmagic"); | ||
| 23 | println!("cargo:rustc-link-arg-bins=-Tlink.x"); | ||
| 24 | if env::var("CARGO_FEATURE_DEFMT").is_ok() { | ||
| 25 | println!("cargo:rustc-link-arg-bins=-Tdefmt.x"); | ||
| 26 | } | ||
| 27 | } | ||
diff --git a/examples/boot/bootloader/stm32wba-dfu/memory.x b/examples/boot/bootloader/stm32wba-dfu/memory.x new file mode 100644 index 000000000..105c9e960 --- /dev/null +++ b/examples/boot/bootloader/stm32wba-dfu/memory.x | |||
| @@ -0,0 +1,18 @@ | |||
| 1 | MEMORY | ||
| 2 | { | ||
| 3 | /* NOTE 1 K = 1 KiBi = 1024 bytes */ | ||
| 4 | FLASH : ORIGIN = 0x08000000, LENGTH = 80K | ||
| 5 | BOOTLOADER_STATE : ORIGIN = 0x08014000, LENGTH = 8K | ||
| 6 | ACTIVE : ORIGIN = 0x08016000, LENGTH = 120K | ||
| 7 | DFU : ORIGIN = 0x0803C000, LENGTH = 160K | ||
| 8 | RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 400K | ||
| 9 | } | ||
| 10 | |||
| 11 | __bootloader_state_start = ORIGIN(BOOTLOADER_STATE) - ORIGIN(FLASH); | ||
| 12 | __bootloader_state_end = ORIGIN(BOOTLOADER_STATE) + LENGTH(BOOTLOADER_STATE) - ORIGIN(FLASH); | ||
| 13 | |||
| 14 | __bootloader_active_start = ORIGIN(ACTIVE) - ORIGIN(FLASH); | ||
| 15 | __bootloader_active_end = ORIGIN(ACTIVE) + LENGTH(ACTIVE) - ORIGIN(FLASH); | ||
| 16 | |||
| 17 | __bootloader_dfu_start = ORIGIN(DFU) - ORIGIN(FLASH); | ||
| 18 | __bootloader_dfu_end = ORIGIN(DFU) + LENGTH(DFU) - ORIGIN(FLASH); \ No newline at end of file | ||
diff --git a/examples/boot/bootloader/stm32wba-dfu/secrets/key.pub.short b/examples/boot/bootloader/stm32wba-dfu/secrets/key.pub.short new file mode 100644 index 000000000..7a4de8585 --- /dev/null +++ b/examples/boot/bootloader/stm32wba-dfu/secrets/key.pub.short | |||
| @@ -0,0 +1 @@ | |||
| gB��p�M�S��z��Kg��!�F���!4�r \ No newline at end of file | |||
diff --git a/examples/boot/bootloader/stm32wba-dfu/src/main.rs b/examples/boot/bootloader/stm32wba-dfu/src/main.rs new file mode 100644 index 000000000..75d8d4199 --- /dev/null +++ b/examples/boot/bootloader/stm32wba-dfu/src/main.rs | |||
| @@ -0,0 +1,158 @@ | |||
| 1 | #![no_std] | ||
| 2 | #![no_main] | ||
| 3 | |||
| 4 | use core::cell::RefCell; | ||
| 5 | |||
| 6 | use cortex_m_rt::{entry, exception}; | ||
| 7 | #[cfg(feature = "defmt")] | ||
| 8 | use defmt_rtt as _; | ||
| 9 | use embassy_boot_stm32::*; | ||
| 10 | use embassy_stm32::flash::{Flash, BANK1_REGION, WRITE_SIZE}; | ||
| 11 | use embassy_stm32::usb::Driver; | ||
| 12 | use embassy_stm32::{bind_interrupts, peripherals, usb, Config}; | ||
| 13 | use embassy_sync::blocking_mutex::Mutex; | ||
| 14 | use embassy_usb::{msos, Builder}; | ||
| 15 | use embassy_usb_dfu::consts::DfuAttributes; | ||
| 16 | use embassy_usb_dfu::{usb_dfu, Control, ResetImmediate}; | ||
| 17 | |||
| 18 | bind_interrupts!(struct Irqs { | ||
| 19 | USB_OTG_HS => usb::InterruptHandler<peripherals::USB_OTG_HS>; | ||
| 20 | }); | ||
| 21 | |||
| 22 | // This is a randomly generated GUID to allow clients on Windows to find your device. | ||
| 23 | // | ||
| 24 | // N.B. update to a custom GUID for your own device! | ||
| 25 | const DEVICE_INTERFACE_GUIDS: &[&str] = &["{EAA9A5DC-30BA-44BC-9232-606CDC875321}"]; | ||
| 26 | |||
| 27 | // This is a randomly generated example key. | ||
| 28 | // | ||
| 29 | // N.B. Please replace with your own! | ||
| 30 | #[cfg(feature = "verify")] | ||
| 31 | static PUBLIC_SIGNING_KEY: &[u8; 32] = include_bytes!("../secrets/key.pub.short"); | ||
| 32 | |||
| 33 | #[entry] | ||
| 34 | fn main() -> ! { | ||
| 35 | let mut config = Config::default(); | ||
| 36 | |||
| 37 | { | ||
| 38 | use embassy_stm32::rcc::*; | ||
| 39 | config.rcc.pll1 = Some(Pll { | ||
| 40 | source: PllSource::HSI, | ||
| 41 | prediv: PllPreDiv::DIV1, // PLLM = 1 → HSI / 1 = 16 MHz | ||
| 42 | mul: PllMul::MUL30, // PLLN = 30 → 16 MHz * 30 = 480 MHz VCO | ||
| 43 | divr: Some(PllDiv::DIV5), // PLLR = 5 → 96 MHz (Sysclk) | ||
| 44 | divq: Some(PllDiv::DIV10), // PLLQ = 10 → 48 MHz | ||
| 45 | divp: Some(PllDiv::DIV30), // PLLP = 30 → 16 MHz (USB_OTG_HS) | ||
| 46 | frac: Some(0), // Fractional part (disabled) | ||
| 47 | }); | ||
| 48 | |||
| 49 | config.rcc.ahb_pre = AHBPrescaler::DIV1; | ||
| 50 | config.rcc.apb1_pre = APBPrescaler::DIV1; | ||
| 51 | config.rcc.apb2_pre = APBPrescaler::DIV1; | ||
| 52 | config.rcc.apb7_pre = APBPrescaler::DIV1; | ||
| 53 | config.rcc.ahb5_pre = AHB5Prescaler::DIV4; | ||
| 54 | |||
| 55 | config.rcc.voltage_scale = VoltageScale::RANGE1; | ||
| 56 | config.rcc.mux.otghssel = mux::Otghssel::PLL1_P; | ||
| 57 | config.rcc.sys = Sysclk::PLL1_R; | ||
| 58 | } | ||
| 59 | |||
| 60 | let p = embassy_stm32::init(config); | ||
| 61 | |||
| 62 | // Prevent a hard fault when accessing flash 'too early' after boot. | ||
| 63 | #[cfg(feature = "defmt")] | ||
| 64 | for _ in 0..10000000 { | ||
| 65 | cortex_m::asm::nop(); | ||
| 66 | } | ||
| 67 | |||
| 68 | let layout = Flash::new_blocking(p.FLASH).into_blocking_regions(); | ||
| 69 | let flash = Mutex::new(RefCell::new(layout.bank1_region)); | ||
| 70 | |||
| 71 | let config = BootLoaderConfig::from_linkerfile_blocking(&flash, &flash, &flash); | ||
| 72 | let active_offset = config.active.offset(); | ||
| 73 | let bl = BootLoader::prepare::<_, _, _, 2048>(config); | ||
| 74 | |||
| 75 | // Create the driver, from the HAL. | ||
| 76 | let mut ep_out_buffer = [0u8; 256]; | ||
| 77 | let mut config = embassy_stm32::usb::Config::default(); | ||
| 78 | |||
| 79 | config.vbus_detection = false; | ||
| 80 | |||
| 81 | if bl.state == State::DfuDetach { | ||
| 82 | let driver = Driver::new_hs(p.USB_OTG_HS, Irqs, p.PD6, p.PD7, &mut ep_out_buffer, config); | ||
| 83 | let mut config = embassy_usb::Config::new(0xc0de, 0xcafe); | ||
| 84 | config.manufacturer = Some("Embassy"); | ||
| 85 | config.product = Some("USB-DFU Bootloader example"); | ||
| 86 | config.serial_number = Some("1235678"); | ||
| 87 | |||
| 88 | let fw_config = FirmwareUpdaterConfig::from_linkerfile_blocking(&flash, &flash); | ||
| 89 | let mut buffer = AlignedBuffer([0; WRITE_SIZE]); | ||
| 90 | let updater = BlockingFirmwareUpdater::new(fw_config, &mut buffer.0[..]); | ||
| 91 | |||
| 92 | let mut config_descriptor = [0; 256]; | ||
| 93 | let mut bos_descriptor = [0; 256]; | ||
| 94 | let mut control_buf = [0; 4096]; | ||
| 95 | |||
| 96 | #[cfg(not(feature = "verify"))] | ||
| 97 | let mut state = Control::new(updater, DfuAttributes::CAN_DOWNLOAD, ResetImmediate); | ||
| 98 | |||
| 99 | #[cfg(feature = "verify")] | ||
| 100 | let mut state = Control::new(updater, DfuAttributes::CAN_DOWNLOAD, ResetImmediate, PUBLIC_SIGNING_KEY); | ||
| 101 | |||
| 102 | let mut builder = Builder::new( | ||
| 103 | driver, | ||
| 104 | config, | ||
| 105 | &mut config_descriptor, | ||
| 106 | &mut bos_descriptor, | ||
| 107 | &mut [], | ||
| 108 | &mut control_buf, | ||
| 109 | ); | ||
| 110 | |||
| 111 | // We add MSOS headers so that the device automatically gets assigned the WinUSB driver on Windows. | ||
| 112 | // Otherwise users need to do this manually using a tool like Zadig. | ||
| 113 | // | ||
| 114 | // It seems these always need to be at added at the device level for this to work and for | ||
| 115 | // composite devices they also need to be added on the function level (as shown later). | ||
| 116 | |||
| 117 | builder.msos_descriptor(msos::windows_version::WIN8_1, 2); | ||
| 118 | builder.msos_feature(msos::CompatibleIdFeatureDescriptor::new("WINUSB", "")); | ||
| 119 | builder.msos_feature(msos::RegistryPropertyFeatureDescriptor::new( | ||
| 120 | "DeviceInterfaceGUIDs", | ||
| 121 | msos::PropertyData::RegMultiSz(DEVICE_INTERFACE_GUIDS), | ||
| 122 | )); | ||
| 123 | |||
| 124 | usb_dfu::<_, _, _, _, 4096>(&mut builder, &mut state, |func| { | ||
| 125 | // You likely don't have to add these function level headers if your USB device is not composite | ||
| 126 | // (i.e. if your device does not expose another interface in addition to DFU) | ||
| 127 | func.msos_feature(msos::CompatibleIdFeatureDescriptor::new("WINUSB", "")); | ||
| 128 | func.msos_feature(msos::RegistryPropertyFeatureDescriptor::new( | ||
| 129 | "DeviceInterfaceGUIDs", | ||
| 130 | msos::PropertyData::RegMultiSz(DEVICE_INTERFACE_GUIDS), | ||
| 131 | )); | ||
| 132 | }); | ||
| 133 | |||
| 134 | let mut dev = builder.build(); | ||
| 135 | embassy_futures::block_on(dev.run()); | ||
| 136 | } | ||
| 137 | |||
| 138 | unsafe { bl.load(BANK1_REGION.base + active_offset) } | ||
| 139 | } | ||
| 140 | |||
| 141 | #[no_mangle] | ||
| 142 | #[cfg_attr(target_os = "none", link_section = ".HardFault.user")] | ||
| 143 | unsafe extern "C" fn HardFault() { | ||
| 144 | cortex_m::peripheral::SCB::sys_reset(); | ||
| 145 | } | ||
| 146 | |||
| 147 | #[exception] | ||
| 148 | unsafe fn DefaultHandler(_: i16) -> ! { | ||
| 149 | const SCB_ICSR: *const u32 = 0xE000_ED04 as *const u32; | ||
| 150 | let irqn = core::ptr::read_volatile(SCB_ICSR) as u8 as i16 - 16; | ||
| 151 | |||
| 152 | panic!("DefaultHandler #{:?}", irqn); | ||
| 153 | } | ||
| 154 | |||
| 155 | #[panic_handler] | ||
| 156 | fn panic(_info: &core::panic::PanicInfo) -> ! { | ||
| 157 | cortex_m::asm::udf(); | ||
| 158 | } | ||
