esp-idf/components/esp_system
Mahavir Jain 4c95aa445d fix(ota): additional checks for secure version in anti-rollback case
Some additional checks related to secure version of the application in
anti-rollback case have been added to avoid any attempts to boot lower
security version but valid application (e.g., passive partition image).

- Read secure_version under sha256 protection

- First check has been added in the bootloader to ensure correct secure
  version after application verification and loading stage. This check
  happens before setting up the flash cache mapping and handling over
  the final control to application. This check ensures that application
  was not swapped (e.g., to lower security version but valid image) just
  before the load stage in bootloader.

- Second check has been added in the application startup code to ensure
  that currently booting app has higher security version than the one
  programmed in the eFuse for anti-rollback scenario. This will ensure
  that only the legit application boots-up on the device for
  anti-rollback case.
2024-02-15 15:08:26 +02:00
..
include feat(coredump): save twdt panic output to coredump elf file 2023-12-07 15:21:24 +01:00
ld fix: Fix ESP32-P4 lp_reserved_seg origin 2023-10-25 08:09:33 +02:00
port fix(rtc): fixed bbpll not calibrated from bootloader issue 2024-01-05 10:24:49 +08:00
task_wdt feat(coredump): save twdt panic output to coredump elf file 2023-12-07 15:21:24 +01:00
test_apps change(xtensa): Deprecate ".../xtensa_api.h" include path 2023-12-05 18:04:52 +08:00
test_eh_frame_parser System: implement libunwind library for RISC-V backtracing 2023-05-15 11:19:03 +08:00
app.lf feat(tcm): added tcm basic support on esp32p4 2023-07-25 05:59:10 +00:00
check_system_init_priorities.py esp_system: add a script to check the startup priorities 2022-07-12 16:58:14 +02:00
CMakeLists.txt feat(esp_system): implement hw stack guard for riscv chips 2023-07-01 16:27:40 +00:00
crosscore_int.c feat(wdt): add multicore support for WDTs on RISCV 2023-10-23 18:26:08 +08:00
debug_stubs.c esp_system: fix and reenable no-format warning 2023-03-28 13:42:44 +02:00
eh_frame_parser.c fix(esp_system): fix gcc 13.1.0 warnings 2023-10-09 12:13:02 +04:00
esp_err.c feature: add ram loadable app support 2023-02-01 17:57:22 +08:00
esp_ipc.c refactor(freertos): Refactor usage of portBASE_TYPE to BaseType_t 2023-07-31 17:10:34 +02:00
esp_system.c System: remove digital-system reset within OS restart when Memprot on 2023-06-26 20:22:59 +02:00
fpga_overrides.c feat(gptimer): use RCC atomic block to enable/reset peripheral 2023-08-22 17:05:35 +08:00
freertos_hooks.c hal: Deprecate interrupt_controller_hal.h, cpu_hal.h and cpu_ll.h interfaces 2022-07-22 00:06:06 +08:00
hw_stack_guard.c feat(esp_system): implement hw stack guard for riscv chips 2023-07-01 16:27:40 +00:00
int_wdt.c feat(gptimer): use RCC atomic block to enable/reset peripheral 2023-08-22 17:05:35 +08:00
Kconfig fix(rtc): fixed bbpll not calibrated from bootloader issue 2024-01-05 10:24:49 +08:00
linker.lf feat(uart): Add sdkconfig.ci.iram_safe test for UART driver 2023-08-30 11:30:03 +08:00
panic.c Merge branch 'check_debug_aware_config' into 'master' 2023-10-21 15:20:26 +08:00
README.md brownout: Disable the hardware BOD when BOD interrupt is enabled 2023-04-21 10:22:59 +08:00
sdkconfig.rename TWDT: Use the new TWDT Kconfig options in the examples and tests 2023-02-17 11:22:25 +08:00
sdkconfig.rename.esp32 kconfig: move remaining kconfig options out of target component 2022-05-23 17:57:45 +08:00
sdkconfig.rename.esp32c3 soc: moved kconfig options out of the target component. 2022-04-21 12:09:43 +08:00
sdkconfig.rename.esp32s2 soc: moved kconfig options out of the target component. 2022-04-21 12:09:43 +08:00
sdkconfig.rename.esp32s3 soc: moved kconfig options out of the target component. 2022-04-21 12:09:43 +08:00
stack_check.c esp_system: fix placement of __stack_chk_fail from flash to RAM 2022-12-07 08:49:12 +01:00
startup.c fix(ota): additional checks for secure version in anti-rollback case 2024-02-15 15:08:26 +02:00
system_init_fn.txt feat(esp_system): implement hw stack guard for riscv chips 2023-07-01 16:27:40 +00:00
system_time.c feat(esp_system): base support on p4 2023-07-25 05:59:10 +00:00
systick_etm.c systimer: assign counter and alarm in esp_hw_support 2023-01-10 17:05:49 +08:00
ubsan.c hal: Deprecate interrupt_controller_hal.h, cpu_hal.h and cpu_ll.h interfaces 2022-07-22 00:06:06 +08:00
xt_wdt.c esp_system: fix and reenable no-format warning 2023-03-28 13:42:44 +02:00

System Notes

Timekeeping

The following are the timekeeping mechanisms available and their differences:

  1. System time (esp_system_get_time)

Time with the origin at g_startup_time. The implementation is not handled by esp_system, but it does provide a default implementation using RTC timer. Currently, esp_timer provides system time, since the hardware timers are under the control of that component. However, no matter the underlying timer, the system time provider should maintain the definition of having the origin point at g_startup_time.

  1. esp_timer time (esp_timer_get_time)

This is the time read from an underlying hardware timer, controlled through config. Origin is at the point where the underlying timer starts counting.

  1. newlib time (gettimeofday)

Timekeeping function in standard library. Can be set (settimeofday) or moved forward/backward (adjtime); with the possibility of the changes being made persistent through config. Currently implemented in terms of system time, as the point of origin is fixed. If persistence is enabled, RTC time is also used in conjuction with system time.

  1. RTC time (esp_rtc_get_time_us)

Time read from RTC timer.

Brownout

on some boards, we name BOD1 as ana_bod, to unify the usage, using BOD1 in following passage.

BOD1 will be a little faster then BOD0, but BOD0 can be widely used(can reset rf, flash, or using interrupt, etc.) So, in IDF code, we use BOD1 in bootloader and BOD0 in the app.