foboot/booster
Sean Cross acdccf5f98 booster: change magic number for booster
Since the USB and flash communication layers are different, change the
magic number for booster.  This will prevent previous versions of foboot
from trying to launch our updater with the wrong version.

Signed-off-by: Sean Cross <sean@xobs.io>
2019-11-28 16:36:45 +08:00
..
include booster: change magic number for booster 2019-11-28 16:36:45 +08:00
ld booster: get functional build working 2019-08-28 11:30:03 +08:00
src booster: change magic number for booster 2019-11-28 16:36:45 +08:00
make-booster.c booster: make-booster: print hash on output 2019-11-24 20:09:14 +08:00
Makefile booster: build with -O2 2019-11-24 20:11:51 +08:00
README.md booster: change magic number for booster 2019-11-28 16:36:45 +08:00

Booster: the Foboot Updater

Foboot cannot update itself. It resides at offset 0, and writes to offset 0x40000. Any errors in writing would result in an unbootable device.

Booster is used to guide the installation of Foboot. Much like a booster rocket helps guide a payload into orbit, Booster guides the installation of Foboot, and is then discarded.

Usage

First, compile fobooster. Then, append the application header, and finally append the application itself. This can be accomplished with make-booster.

cd toboot/
make
cd ../booster/
make
gcc make-booster.c -o make-booster -Iinclude
./make-booster [flash-id] ../hw/build/gateware/top-multiboot.bin foboot-booster.bin

The following flash-id values are known:

  • EVT: 0xef177018
  • PVT: 0xc2152815 / 0xc8144015
  • Hacker: 0x1f148601

The resulting foboot-booster.bin can be flashed with Foboot itself as an ordinary program.

Design

The goal of Booster is to load a new bitstream onto Fomu. Because this bitstream contains code + a CPU, Booster will actually run from within the context of this new CPU.

THE NEW IMAGE IS ASSUMED TO BE 0x19700 (104192) BYTES LONG. The new image is padded by appending 0-bytes to it in order to get it to the correct length.

The SPI flash image looks something like this:

Hex Address Decimal Address Purpose
0x000000 0 Instructs the FPGA where to find SB_WARMBOOT images S0-S3 and for cold boot
0x0000a0 160 Normal offset for Foboot
0x040000 262144 New version of Foboot, including new CPU Core
0x05a000 368640 Start of Booster program
0x05a004 368644 Booster signature
0x05a008 368648 Booster length (not including bitstream / new image)
0x05a00c 368652 Booster checksum
0x05a010 368656 Actual length of new image
0x05a014 368660 Length of xxHash region
0x05a018 368664 xxHash seed
0x05a01c 368668 SPI ID of the target device
0x1FFFFF 20097151 End of flash

The "Booster Signature" is 0xfaa999b1 -- if it contains this value, then this might be a Booster program.

The "Booster Checksum" is the result of summing together [Booster length] 8-bit bytes, starting at offset 0x05a010. If this value is equal to Booster checksum, then Foboot will simply transfer control over to address 0x05a000.

Booster execution flow

The first thing Booster does is validate the new image. It does this by performing an xxHash of the new image, from address 0x040000. If the image does not match the hash, it will erase itself and show an error.

Next, Booster will validate that the start of the target image has a valid SB_WARMBOOT header. This specialized check ensures we don't accidentally write an invalid image.

If the address matches, it checks the SPI ID. If the ID does not match, then it will erase itself and show an error. Note that on some boards, such as PVT, there are multiple IDs that could match, so they are all treated the same.

If the ID does match, the update will begin.

The first step of the update is to erase block 0 and reprogram it with a temporary block that will point execution to address 0x400a0. This offset means that we can switch from the updater to Foboot by rewriting the execution address from 0x4000a0 to 0x0000a0.

From this point forward, Booster is effectively the only program on flash.

Booster will then proceed to write each block in turn. If the user unplugs the device in the middle of writing, then Booster will start back up where it left off. Booster will not overwrite a block that doesn't need updating.

After Booster has finished, it must reboot itself. The problem here is that we can't simply issue an SB_WARMBOOT request since that has already been programmed to load our image at 0x400000 -- we'd simply execute Booster again!

To work around this issue, Booster destroys itself. First it updates the SB_WARMBOOT block to point back to address 0. Then, it simply erases 0x5a000, which clears the special image.

Finally, it reboots. The ICE40 will load our image at 0x400000 (instead of from 0x0), however this shouldn't be an issue since we've already verified that image is correct, and both should be identical. If the user unplugs the device and re-inserts it, they will get the image at 0x0 as usual.