Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Why MCUBOOT_SERIAL restores in area0 directly ? #271

Closed
b-allibert opened this issue Apr 20, 2018 · 4 comments
Closed

Why MCUBOOT_SERIAL restores in area0 directly ? #271

b-allibert opened this issue Apr 20, 2018 · 4 comments
Labels
answered Topic was clarified question

Comments

@b-allibert
Copy link

Hi team,
I have a quick question : i see that MCUBOOT_SERIAL feature seems to restore an image into area0 (i.e. the one used for execution, right ?).
But i'm wondering why this feature does not flash area1 and resets ? This would allow using the usual security mcuboot features for the next boot (i.e. authenticate and restore from area1 to area0 once authentication is OK)... but i guess i'm probably missing something here.
Thanks for your answer
Bastien

@uday-agarwal
Copy link

Hi there,

I am facing the same problem. Seems to me that an image uploaded over serial is written directly to slot 0, and slot 1 is never used. Also, I can't seem to find support for image erase, test, and confirm commands. Please advise as to whether this is correct, and if there's any planned support in future. Right now this is limiting me to use a single image only, and I'm not able to store two images in the target. My target device is nRF52 running Zephyr with mcuboot.

Best Regards
Uday

@utzig
Copy link
Member

utzig commented Dec 20, 2018

This functionality was intended to initialize a new equipment, not to install an upgrade image. Installing an upgrade image to slot1 is the job of the running firmware in slot0. You should check Zephyr's mcumgr support.

Also, the bootloader wouldn't really know what to do if serial bootloader downloaded an image to slot1 without an image already installed on slot0 because it needs some metadata (like image header) to decide what to do.

Regarding security features, just enable CONFIG_BOOT_VALIDATE_SLOT0 option, so that it never runs the image in slot0 without validation.

@uday-agarwal
Copy link

Got it. Thanks for the quick response! I'll look more closely at Zephyr support and come back for any followup questions. Thanks again.

@nvlsianpu nvlsianpu added question answered Topic was clarified labels Dec 20, 2018
@d3zd3z
Copy link
Member

d3zd3z commented Dec 2, 2019

This seems to be answered.

@d3zd3z d3zd3z closed this as completed Dec 2, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
answered Topic was clarified question
Projects
None yet
Development

No branches or pull requests

5 participants