-
Notifications
You must be signed in to change notification settings - Fork 7.3k
esp32c3 does not build with mcuboot and CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256 #86210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @tqjp! We appreciate you submitting your first issue for our open-source project. 🌟 Even though I'm a bot, I can assure you that the whole community is genuinely grateful for your time and effort. 🤖💙 |
If this is the Zephyr port, the one built with The SecurebootV2, the hardware backed option, is not on roadmap on our side for the Zephyr port. I suggest using Espressif port for all of that. |
It does actually work, as you point out, but with the higher IRAM settings. And what is meant with |
Zephyr Port of MCUboot on ESP32 devicesMCUboot's Secure Boot (soft based) will prevent a bogus/hacked image to be loaded on the device. For example, the attacker tried to tamper, send a compromised image OTA to the device for update. The keys wouldn't match, no update will be made and device is safe (Cybersecurity). But one with a cable could go there and re-flash the device, including the bootloader. Or remove the Flash chip and copy its contents. Ok, the smart will remind me that there is e-fuse option for disabling flashing - but that is irreversible for ALL, attackers and non-attackers. And it is ineffective against flash removal and copying. IMPORTANT:
Espressif Port of MCUbootEspressif Port uses hardware backed SecurebootV2, which offers physical and cyber security. You can't flash a bogus image, and don't need to burn e-fuses. It also offers Flash Encryption, so only that specific ESP32 knows what is written to its flash - no attack by removing the flash chip. (This is on my favorite option: let the device randomly select its key and only it will know what it is written). |
Thank you for the detailed description. We will have a look at the Espressif Port then. Although it seems that for the esp32s3 the change in |
Well, it is marked because MCUboot - Zephyr Port is indeed supported; it works, albeit without many features. The table there is better understood as an overview. It's always suggested to TIY ( try it youself :) ) and ask if tests show things are not as expected. My suggestions is labeling this as feature request, as it was not intended to work. I'll ask to remove the |
I think this basic functionality is needed, although without secure boot, the existing implementation can provide basic protection for Bluetooth OTA after disabling debugging and disabling UART firmware downloads. |
Try with zephyr v4.1.0-rc2. I just saw that the IRAM value has been increased a little bit since V4.0.0 and it seems to work, or at least it builds without errors, in our use case. |
It is already covered by Espressif Port. Although we are pending the BT support on Espressif port, it is far more likely for us to add BT to Espressif Port than add any functionality in Zephyr Port. |
This issue has been marked as stale because it has been open (more than) 60 days with no activity. Remove the stale label or add a comment saying that you would like to have the label removed otherwise this issue will automatically be closed in 14 days. Note, that you can always re-open a closed issue at any time. |
Describe the bug
esp32c3 IRAM overflows when using mcuboot and CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256
To Reproduce
Adding
to
sysbuild.conf
Expected behavior
Build completes without errors.
Logs and console output
Environment (please complete the following information):
Additional context
Increasing
BOOTLOADER_IRAM_SEG_LEN
inzephyr/soc/espressif/esp32c3/memory.h
similarly as described in #76566 for the esp32s3 to0xb000
solves the issue.Why isn't there a CONFIG setting or similar to set those values?
The text was updated successfully, but these errors were encountered: