12. Bootloader
12.1. Description
A bootloader is a program to load initialization code. In our case, it is the initial segment of the program located at the start of the flash of the microcontroller (TI TMS570LC4357), and its primary purpose is to update the foxBMS 2 application via interfaces like CAN on the fly without the use of a debugger.
With the help of the bootloader, the compiled binary file of the foxBMS 2 application can be easily uploaded to the BMS-Master by using the bootloader PC application that is integrated into the fox CLI tool. This tool not only provides the function to upload the binary of foxBMS 2 into the hardware but can also be used to check the current status of the bootloader and start the uploaded foxBMS 2 application manually. In addition, the user can also use it to reset the boot process if any unexpected issues appear.
In summary, this bootloader PC application provides the following functionalities:
checking the status of the bootloader
updating/flashing the foxBMS 2 application
resetting the boot process
starting the foxBMS 2 application
To enable an automatic start of the foxBMS 2 application, a timeout check has been implemented in the initial phase of the bootloader, as shown in Fig. 12.1. If there is no valid application onboard, the bootloader will return to its original routine, and the timeout will no longer be activated. Since the timeout duration is very short, the commands to load application and reset the bootloader should be executed before powering on the BMS-Master.
Fig. 12.1 Initial timeout check for bootloader
Before using this PC application, the bootloader should be compiled and flashed into the hardware if there is no bootloader pre-installed in the BMS-Master. Similar to building the foxBMS 2 application in Building the Application, the fox CLI tool can be used to build the bootloader application by using the following command:
.\fox.ps1 waf build_bootloader_embedded./fox.sh waf build_bootloader_embedded./fox.sh waf build_bootloader_embedded
After flashing the binary of the bootloader into the BMS-Master, it is possible to use the bootloader PC application to communicate with it.
12.2. How to Use It?
To build the bootloader binary, use the command variant
build_bootloader_embedded
.
After the binary is successfully built, user can flash it into the BMS-Master
board using a debugger.
Once the binary is flashed, you can control it using commands available in the
fox CLI tool.
This bootloader PC application provides the following commands to interact
with the bootloader:
Check the status of the bootloader:
.\fox.ps1 bootloader check
./fox.sh bootloader check
./fox.sh bootloader check
Upload a new foxBMS 2 application into the flash memory of BMS-Master:
.\fox.ps1 bootloader load-app
./fox.sh bootloader load-app
./fox.sh bootloader load-app
(To use this function, a foxBMS 2 binary should be built in advance following the instructions described in Building the Application. In addition, the command should be executed before powering on the BMS-Master, and the board should be powered on first if the instruction “Waiting bootloader to be powered on …” is displaying in the terminal.)
Reset the boot process:
.\fox.ps1 bootloader reset
./fox.sh bootloader reset
./fox.sh bootloader reset
(Like the command to load a new foxBMS 2 application, the reset command should also be executed before powering on the BMS-Master. The board should then be powered on after the instruction “Waiting bootloader to be powered on…” is displaying in the terminal.)
(In the case of an error status, a reset command or a power-on restart should resolve the problem. If not, the user could contact foxBMS team for further support.)
Start the foxBMS 2 application on BMS-Master manually:
.\fox.ps1 bootloader run-app
./fox.sh bootloader run-app
./fox.sh bootloader run-app
To get more information, add -vv after command, for example:
.\fox.ps1 bootloader check -vv
./fox.sh bootloader check -vv
./fox.sh bootloader check -vv
12.2.1. Description of the foxBMS 2 Application Update Process Using the Bootloader
To transfer the application binary to the BMS-Master, the binary file needs to be parsed into small sectors first, and a CRC signature is calculated for each sector. The ‘sector’ used in this context has been defined based on the data block that can be stored in the corresponding flash sector of the physical flash memory. To enable data transfer via CAN messages, which have the maximum size of 8 bytes, each sector is further divided into subsectors that contain 1024 * 8 bytes of data, as shown in Fig. 12.2:
Fig. 12.2 The division of the foxBMS 2 application binary file during data transfer
The communication between the PC application and the bootloader has been implemented via pre-defined CAN messages. As shown in Fig. 12.3, to transfer a program, the PC application will send a CAN request “command to transfer program” to inform the bootloader that a program is going to be transferred. Once the bootloader receives the command, it will reply with an “ACK message” to inform the PC application that it has received this command and is prepared for the next step. The PC application will then start sending the information relevant to the current data transfer process. After that, the PC application must receive an ACK message from the bootloader to ensure it has processed the program information and is ready for the binary data.
Next, the PC application starts transferring the binary data. It iteratively sends one data sector after another as depicted in Fig. 12.2. As shown, each subsector is transferred by sending the loop number and 8 bytes of data in every iteration. Once the bootloader has successfully received 1024 * 8 bytes of data, it responds with an “ACK message” to signal the PC application to send the next subsector.
Fig. 12.3 Communication between the PC-side application and the bootloader
Once a sector transfer is completed, the program sector will be written into its relevant flash space, and a CRC signature will be calculated. Next, the CRC signature for this program sector will be sent to the host computer and compared with the calculated CRC signature to ensure that the flashed section data is correct. If both CRC signatures are equal, the next sector will be transferred. Otherwise, the bootloader will wait for the same sector data again.
After all sectors are successfully sent, the vector table will be sent in four parts together with a CRC signature to the bootloader to ensure the validity of the vector table.
12.3. Project Structure
This bootloader project contains two parts: the bootloader itself and the PC application, which communicates with the bootloader. The file structures of these two parts is as following:
Module |
Description |
---|---|
driver |
Contains low level driver modules to control the on-board resources. |
engine |
Contains mid-level engine modules to control the overall program flow. |
hal |
Contains the build script and the hash code for HALCoGen. |
main |
Contains the files where the ‘main’ function and ‘_c_int00’ function are located. In addition, it also contains the linker script for configuring the memory distribution and the files supported at the system level. |
Module |
Description |
---|---|
bootloader.py |
Contains the Bootloader class, which serves as the main entry point for sending application data or requests to the bootloader. |
bootloader_can.py |
Contains the BootloaderInterfaceCan class, which enables high-level communication with the bootloader via CAN. |
bootloader_can_basics.py |
Contains the BootloaderCanBasics class, where the basic CAN communication functions, including sending and receiving specified messages, are implemented. |
bootloader_binary_file.py |
Contains the BootloaderBinaryFile class, responsible for managing the application binary file and providing functions to perform operations on it, such as calculating CRC, extracting data, and more. |
bootloader_can_messages.py |
Contains all enums of CAN messages and functions to get specified CAN messages in a dictionary. |
12.4. Memory Configuration
The microcontroller (TI TMS570LC4357) has two independent flash banks. Each of them consists of 16 sectors and has a storage area of 2MB. While the sizes of the sectors in the second flash bank are uniform, the sizes of the sectors in the first flash bank are not identical. More details can be found in Technical Reference Manual of TMS570LC43 .
In this project, the flash memory (from 0x0x00000000
to 0x00400000
)
has been divided into 5 regions, as shown in Table 12.3.
The initial vector table is saved in the memory labeled
VECTORS_TABLE_INIT
, and the second vector table, where the actual exception
entries are implemented, is saved in the memory labeled
VECTORS_TABLE
.
More details about the vector tables can be found in
Section 12.6.2.
The program of bootloader (except for its vector table) has been saved in the
memory labeled BOOTLOADER
.
The binary of foxBMS 2 is supposed to be put in the memory labeled
PROGRAM_PLACE_HOLDER
.
The information of the program will be saved to memory labeled
PROGRAM_INFO_AREA
.
In this project, the RAM of the microcontroller is configured as shown in
Table 12.3.
As the names indicate, the memory labeled STACK
refers to the space
allocated for stack usage, while the memory labeled RAM
serves as the
general RAM space.
The memory labeled RAM_FLASH
serves as the section buffer to temporarily
store transferred data before it is written to flash sector.
The flash-related functions and libraries will run from the memory labeled
RAM_FLASH_API
.
More details can be found in Section 12.6.4.
The memory labeled with the ECC
prefix is where the calculated error
correction codes (ECC) are saved.
More details about the ECC can be found in
Technical Reference Manual of TMS570LC43
.
NAME |
ORIGIN |
LENGTH |
ATTR |
FILL |
---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12.5. Functional Mechanisms
The functions of the bootloader are implemented through the cooperation of two independent final state machines (FSMs). One FSM is called the boot FSM, as it directly controls the boot process of the bootloader. The other is called the CAN FSM because it helps control the CAN communication and ensures the correct sequence of the data transfer process.
This section will first present the CAN FSM and the boot FSM separately, using their corresponding state diagrams. After that, the functional mechanism of the bootloader will be demonstrated by explaining the principles of starting the foxBMS 2 application, resetting the boot process, and uploading the foxBMS 2 application into the flash memory of the BMS-Master.
12.5.1. CAN FSM
The entire state diagram of the CAN FSM state machine is shown in Fig. 12.4.
Fig. 12.4 State diagram of the CAN FSM
12.5.2. Boot FSM
As shown in Fig. 12.5, at the start of the program, the state of
the boot FSM is initialized to BOOT_FSM_STATE_WAIT
.
From this state, the state of the boot FSM can change to
BOOT_FSM_STATE_LOAD
, BOOT_FSM_STATE_RUN
, or BOOT_FSM_STATE_RESET
in
response to changes in the CAN FSM.
If any error happens during the state BOOT_FSM_STATE_LOAD
,
BOOT_FSM_STATE_RUN
or BOOT_FSM_STATE_RESET
, the state of the boot FSM
will change to BOOT_FSM_STATE_ERROR
.
Fig. 12.5 State diagram of the boot FSM
12.5.3. Start the foxBMS 2 Application
The foxBMS 2 application starts automatically, if no CAN request to the
CAN_FSM_STATE_MACHINE
has been received within the defined timeout.
The application will start earlier if the corresponding request is sent to the
bootloader via the CAN bus.
Once the CAN module has received this CAN message, it will change its state
from the initial state CAN_FSM_STATE_NO_COMMUNICATION
to
CAN_FSM_STATE_RUN_PROGRAM
as shown in Fig. 12.6.
If the boot FSM is in the expected state (BOOT_FSM_STATE_WAIT
), at this
moment, a validation process will be initiated to check if the flashed foxBMS 2
application is valid.
The bootloader will only jump into the application if the validation process
was successful.
Otherwise, it will inform the host PC that there is no valid program available.
Fig. 12.6 Interaction between the boot FSM and the CAN FSM after a “run-app” command is issued
12.5.4. Reset the Boot Process
If a reset request (see Section 12.2) has been sent via the CAN bus,
the CAN FSM state will change to CAN_FSM_STATE_RESET_BOOT
from any state
as shown in Fig. 12.7.
After that, the bootloader will reset its boot-relevant configurations,
including global variables that contain the boot- and CAN-relevant program
information.
Additionally, the sector buffer RAM area where the sector data is temporarily
stored will be cleared, and the flash sectors where the application data is
supposed to be written will be erased.
Finally, a software reset will be performed to reset the MCU.
Fig. 12.7 Interaction between the boot FSM and the CAN FSM after a “reset” command is issued
12.5.5. Transfer the foxBMS 2 Application
If the incoming CAN message indicates a start of the data transfer process, the
CAN FSM state will change to CAN_FSM_STATE_WAIT_FOR_INFO
, and the boot FSM
state will change to BOOT_FSM_STATE_LOAD
, as shown in
Fig. 12.8.
Fig. 12.8 Interaction between the boot FSM and the CAN FSM after a “load-app” command is issued
Once the information of the program has been successfully transferred, the
state of the CAN FSM will change from CAN_FSM_STATE_WAIT_FOR_INFO
to CAN_FSM_STATE_WAIT_FOR_DATA_LOOPS
.
To ensure that the transferred data (8 bytes each time) is correct, in the
innermost loop, a corresponding loop number needs to be sent before the
transmission of the corresponding data in 8 bytes, as shown in
Fig. 12.3.
Only if the loop number is the one the CAN module expects, the data bytes will
be considered correct and will be written into the sector buffer.
Essentially, the loop number can also be understood as the key to enabling the
reception of the corresponding 8-byte program data.
To transmit the data efficiently and precisely, the entire program will be
divided into sectors, as mentioned in
Section 12.2.1.
The program sector size is identical to the size of corresponding physical
flash sector section.
If a whole sector has been transferred and written into the sector buffer, the
corresponding flash sector will be written using the data that is temporarily
saved in the sector buffer.
Immediately afterwards, the written flash sector will be validated by comparing
the received CRC signature (8 bytes) with the calculated CRC signature
(8 bytes).
If the result is invalid, the variables involved in data transfer and the
sector buffer will be reset to their original state at the start of the data
transfer for this sector.
Additionally, the CAN FSM state will reset to either
CAN_FSM_STATE_WAIT_FOR_DATA_LOOPS
or
CAN_FSM_STATE_RECEIVED_8_BYTES_CRC
.
Once all data has been received, written, and validated, the CAN FSM state will
be set to CAN_FSM_STATE_FINISHED_FINAL_VALIDATION
, as shown in
Fig. 12.4.
Meanwhile, the CRC signature of the last sector, which is also the CRC
signature of the entire application binary, will be saved in the flash memory
where the program information is stored.
After the entire program has been received and validated, the vector table for this program will also be transferred and validated. Meanwhile, its state will be updated accordingly, as shown in Fig. 12.4.
12.6. Developer Notes
12.6.1. What Should Be Considered/Modified While Configuring the Flash Memory?
To configure the memory of the microcontroller (TI TMS570LC4357), several parts need to be considered/configured:
The linker script of the application (foxBMS 2)
app.cmd
andapp_hex.cmd
.The linker script of the bootloader
bootloader.cmd
.The address jump between the first vector table and the second vector table, which is defined in
intvecs.asm
.The corresponding macros defined in the bootloader header file :
boot_cfg.h
.
12.6.2. About Vector Table
The
vector table
is usually placed at the start address (0x00
) of the flash and has a length
of 0x20
.
It contains eight 32-bit ARM instructions in our case.
In the bootloader, there are two vector tables (VECTORS_TABLE_INIT
and
VECTORS_TABLE
)
located at 0x00
and 0x0001FFE0
of the flash memory.
The first vector table only reroutes the undefined entry, the SVC
(supervisor call) entry, the prefetch entry, the data abort entry, and the
phantom interrupt entry, to these inside the second vector table
(VECTORS_TABLE
).
The second vector table hosts the real functions entries to handle these
exception entries using
b xxx.
Different from handlers listed above, the reset entry points always to the _c_int00
function which will also be called first before any other functions.
The IRQ and FIQ interrupt table will be loaded by
ldr pc, [pc, #-0x1b0]
inside the first vector table.
The configuration and initialization of the vectored interrupt manager is done
in _c_int00
by vimInit()
.
During booting, the _c_int00
function is first called, but the actual
working exception entries (except for IRQ and FIQ) will be the ones defined the
second vector table.
After the foxBMS 2 application is flashed, the foxBMS 2 application vector
table will overwrite the second vector table VECTORS_TABLE
.
This means that by jumping into the second vector table, the _c_int00
function of the application will be called, where the configuration for, e.g.,
VIM will be reset for the application.
Meanwhile, the real entries for the exceptions will be replaced by the entries
shipped with the application.
12.6.3. Change Operation Mode
Since some functions inside flash and CRC modules change values in the protected flash area, such as register values, certain privileges need to be claimed before calling these functions.
To raise the privilege, SVC handlers are implemented to change the value of the program status register.
12.6.4. How to Load the “Flash API” into the SRAM?
To erase and write the flash bank where the bootloader is located, the relevant flash API and all functions that use the flash API need to be executed from SRAM rather than flash. More details can be found in here, which is also called run-time relocation. To execute program code from SRAM, the following steps must be done:
Change the MPU configuration for the region from
0x08000000
to0x0807FFFF
toPRIV_RW_USER_RW_EXEC
to enable calling the functions in this area without triggering any error. More details can be found in hereConfigure loading the flash API and flash relevant functions to flash memory and run them from SRAM by using build-in link operators in linker script. More details can be found in here.
12.6.5. How to Use the Onboard CRC Module in Semi-AUTO Mode?
There is an onboard CRC controller available on the TMS570LC43. It offers three modes of operation: Auto, Semi-CPU, and Full-CPU. In our case, the Semi-CPU mode is used to calculate the CRC. Unlike Auto mode, where the CRC calculation and evaluation are performed without CPU intervention, in Semi-CPU mode, the generated CRC signature must be compared with a pre-determined CRC value with the assistance of the CPU.
More detailed information regarding CRC onboard module and the CRC algorithm used within the CRC onboard module can be found in here.
12.6.6. How to Jump to a Certain Address?
When you power-up the BMS, the bootloader will start first because the
bootloader’s reset vector that is located at the first flash address 0x00
.
From the address area where the bootloader program is located, it is possible to jump to another address using the following code example:
uint32_t boot_jumpAddress;
boot_jumpAddress = (uint32_t)APP_START_ADDRESS;
((void (*)(void))boot_jumpAddress)();
This code performs the following actions:
boot_jumpAddress = (uint32_t)APP_START_ADDRESS;
assigns the value of APP_START_ADDRESS
(0x00020020
) to the
boot_jumpAddress
variable after casting it to an unsigned 32-bit
integer.
((void (*)(void))boot_jumpAddress)();
is a function pointer cast and call operation. Here’s what it does :
(void (*)(void))boot_jumpAddress
casts theboot_jumpAddress
variable to a function pointer. This cast assumes that the address stored inboot_jumpAddress
points to a function with no arguments and no return value (i.e., a function that takesvoid
as both its argument and return types).()
immediately invokes (calls) the function pointed to by the casted function pointer.
In summary, this code converts an address (boot_jumpAddress
) into
a function pointer and then calls the function at that address.