-
Notifications
You must be signed in to change notification settings - Fork 943
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Wi-Fi firmware partition support for Pico 2 W #1969
base: develop
Are you sure you want to change the base?
Conversation
Enabled using the pico_use_partition_firmware(exe_name) cmake function
pinging @peterharperuk as he did a lot of the Wifi-related stuff for Pico 1. |
…ifi only firmware variants
d6121e9
to
508071f
Compare
Works nicely. I think we need to fix the Pico W (rp2040) build errors in src/rp2_common/pico_cyw43_driver/cyw43_driver.c |
Have added in separate PR #2054 |
RP2040 does not support partitions, so throw fatal_error at the CMake stage
I've added a check that it's not RP2040 in the CMake function, so it'll throw a fatal error at that point if you try to build a binary with |
If the Bazel checks are getting in your way, you can add the two new files to a |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tested this and it seems good.
Thanks, have done - I couldn't actually assign the issue to you, but have tagged you in it |
Is that still going to be happening? I guess choosing randomly-generated IDs is much less likely to produce an accidental collision than a "nice" ID like 0x123456789abcdef0 ? And should those IDs be added to a header-file, to allow other UF2s to make use of this Wi-Fi firmware partition? |
Yes - I was looking for ideas. We could go with |
* It requires the same minimum workarea size as `rom_pick_ab_partition`. | ||
* | ||
* Also checks that the chosen partition contained a valid image | ||
* For example, if an `explicit_buy` is pending then calling `pick_ab_partition` would normally clear the saved `flash_erase_addr` so the required erase would not |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This doxygen mentions both rom_pick_ab_partition
and pick_ab_partition
- are they referring to the same function or are they different?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
rom_…
is the SDK function wrapper for the pick_ab_partition
function - so I was using that to refer to it in the SDK (ie the function this calls internally, and where more docs are), but using pick_ab_partition
to refer to the behaviour of the underlying bootrom function
I've got no opinions on this so it's probably something that you and @peterharperuk ought to decide. Would MicroPython be able to use the same Wifi firmware partition as C-SDK code? (or is that another one of my stupidly naive questions? 😆 ) |
Yes, they definitely could - there's no C-SDK specific code in the Wifi firmware partition, it's just a raw binary blob, so should work with MicroPython too. |
… family Adds CYW43_WIFI_FW_PARTITION_ID define to override the partition ID
On a vaguely-related note, the doxygen at https://github.com/raspberrypi/pico-sdk/blob/develop/src/rp2_common/pico_bootrom/include/pico/bootrom.h#L834 talks about an "explicit buy flag" - is that the same thing as the TBYB flag referred to elsewhere? (If so, it might be worth editing that doxygen for consistency?) |
id |= buffer[i++]; | ||
id |= ((uint64_t)(buffer[i++]) << 32ull); | ||
if (id == CYW43_WIFI_FW_PARTITION_ID) { | ||
picked_p = p; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is it deliberate not to break here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No - I will add a break
id |= buffer[i++]; | ||
id |= ((uint64_t)(buffer[i++]) << 32ull); | ||
if (id == CYW43_WIFI_FW_PARTITION_ID) { | ||
picked_p = p; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is it deliberate not to break here?
if (picked_p == BOOTROM_ERROR_NOT_FOUND) { | ||
CYW43_DEBUG("Chosen CYW43 firmware partition was not verified\n"); | ||
} else if (picked_p == BOOTROM_ERROR_NOT_PERMITTED) { | ||
CYW43_DEBUG("Too many update boots going on at once\n"); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not sure what this error message means!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It means there are multiple partitions being updated at once, so if you update the boot partition with a TBYB image and the firmware partition in the same boot you get this error.
I can't actually think of a scenario when this might happen, because you can only have one flash_update_base
, but I left in the error handling for it in case it does (as I did get it to happen during my early testing, although the code has changed a lot since then)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
new source files should have copyright/license
// printf("IMAGE_DEF_TBYB_FLAGGED %08x\n", (uint32_t)&(scan_workarea->parsed_block_loops[0].image_def.core.tbyb_flagged) - (uint32_t)scan_workarea); | ||
// printf("IMAGE_DEF_BASE %08x\n", (uint32_t)&(scan_workarea->parsed_block_loops[0].image_def.core.enclosing_window.base) - (uint32_t)scan_workarea); | ||
// printf("IMAGE_DEF_REL_BLOCK_OFFSET %08x\n", (uint32_t)&(scan_workarea->parsed_block_loops[0].image_def.core.window_rel_block_offset) - (uint32_t)scan_workarea); | ||
#define VERSION_DOWNGRADE_ERASE_ADDR *(uint32_t*)0x400e0338 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
arguably these are not addresses. i would leave the leading * off and use in code references
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Technically they are addresses, eg the version downgrade erase address (ie the address in flash to erase) is stored at 0x400e0338
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Page 31 of the RP2350 datasheet says BOOTRAM_BASE 0x400e0000
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, more of a stylistic thing I guess; it's weird to see a CONSTANT as a lhs
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
but i'm ok
@@ -1071,6 +1071,29 @@ static inline int rom_get_last_boot_type(void) { | |||
*/ | |||
int rom_add_flash_runtime_partition(uint32_t start_offset, uint32_t size, uint32_t permissions); | |||
|
|||
/*! \brief Pick A/B partition with TBYB guards |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I still find the function description a bit confusing:
- maybe something along the lines of "Pick A/B partition for an arbitrary pair of partitions without disturbing any in process update A/B or TBYB boot" (needs improvement still)...
- not sure people know what a flash_erase_addr is maybe describe it in words (e.g. the erase of xxx because yyy"
- I'd say "using the flash_update_boot_window_base from the current boot"
#include "boot/picobin.h" | ||
#include <stdlib.h> | ||
|
||
// PICO_CONFIG: CYW43_WIFI_FW_PARTITION_ID, ID of Wi-Fi firmware partition, type=int, default=0x776966696669726d (wififirm), group=pico_cyw43_driver |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would put this in the header, it seems like other people might need to know the value
pico_promote_common_scope_vars() | ||
|
||
function(pico_use_partition_firmware TARGET) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think in the future as mentioned elsewhere we might want to allow more params to configure how we do things (partition size/loc, versioninfo, partition ID) but this is fine too add via CMake args later
That said, the name in the global namespace is a bit non-specific. perhaps `pico_configure_wifi_firmware_partition' (or select instead of configure
|
||
// PICO_CONFIG: CYW43_WIFI_FW_PARTITION_ID, ID of Wi-Fi firmware partition, type=int, default=0x776966696669726d (wififirm), group=pico_cyw43_driver | ||
#ifndef CYW43_WIFI_FW_PARTITION_ID | ||
#define CYW43_WIFI_FW_PARTITION_ID 0x776966696669726d // wififirm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was humming an hah-ing about this, as i don't know whether we want
a) this to be generic (so that different WiFi chips can use the same ID)
b) non-specific with version info, so people can search for the right partition
I think for now this is OK (even though the code is cyw43_ specific) as we can always change it in the future
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suspect that in the future we're likely to want to pass the CYW43_WIFI_FW_PARTITION_ID
from the CMake in which case the CYW43_USE_PARTITION_FIRMWARE
is perhaps superfluous, but i'm fine with it. (note i guess we won't pass ID from CMake for now as it would require dynamic JSON)
Please however rename CYW43_WIFI_FW_PARTITION_ID
to CYW43_WIFI_FIRMWARE_PARTITION_ID
as FW_ is not used as a contraction in any other defines... and I could go with CYW43_USE_FIRMWARE_PARTITION
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Finally, is this WiFi only; in which case either one or the other define should gain/lose _WIFI
This adds the ability to store and load the Wi-Fi firmware for Pico 2 W in a partition. It can be enabled by adding
pico_use_partition_firmware(<exe_name>)
to your CMakeLists.txt, which will embed a compatible partition table in the binary, and output lots of firmware UF2s to use (all called<exe_name>_firmware_..._.uf2
, eg..._firmware_w
for Wi-Fi only,..._firmware_wb
for Wi-Fi and Bluetooth,..._firmware_w_tbyb
for TBYB). You can also create your own partition table and use that.A Wi-Fi firmware partition is detected as having the ID
0x123456789abcdef0
, and the UF2 family_is for Wi-Fi firmware blobs is0x12345678
- these should probably both be changed to something else before merging? The default firmware partition starts at 3500K into the flash - should this be changed to depend on PICO_FLASH_SIZE_BYTES? The default firmware partition is also duplicated with A/B partitions in the same location in flash - this is required to ensure a signature check is performed before loading the Wi-Fi firmware, as there's no way to call the bootrom to check the signature of a single partition (unless chaining into it), you can only callpick_ab_partition
.The Wi-Fi firmware blob is marked in it's image_def as an RP2350 Risc-V executable, and the partition is marked as
ignored_during_riscv_boot
- this ensures that it can work with TBYB (as TBYB only works for executable image_defs), and that signature checks are performed before loading the firmware when Secure Boot is enabled (because signature checks are performed for all executable image_defs in a partition that is not markedignored_during_arm_boot
). This is slightly clunky, but seems to work robustly.Supercedes #1850, as it now includes that function in this PR, and shows a use for it.