Update gen_esp32part.py (#11391)

* Update gen_esp32part.py

* change(tools): Push generated binaries to PR

* fix(formatting): Apply formatter

* change(tools): Push generated binaries to PR

* fix(gen_esp32part): Remove unnecessary generator

* change(tools): Push generated binaries to PR

* fix flake8 (#11393)

---------

Co-authored-by: Jason2866 <24528715+Jason2866@users.noreply.github.com>
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
This commit is contained in:
Lucas Saavedra Vaz 2025-05-27 08:16:13 -03:00 committed by GitHub
parent d960f61e0a
commit fa275971cd
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 146 additions and 34 deletions

Binary file not shown.

View file

@ -7,11 +7,8 @@
# See https://docs.espressif.com/projects/esp-idf/en/latest/api-guides/partition-tables.html
# for explanation of partition table structure and uses.
#
# SPDX-FileCopyrightText: 2016-2021 Espressif Systems (Shanghai) CO LTD
# SPDX-FileCopyrightText: 2016-2025 Espressif Systems (Shanghai) CO LTD
# SPDX-License-Identifier: Apache-2.0
from __future__ import division, print_function, unicode_literals
import argparse
import binascii
import errno
@ -22,26 +19,34 @@ import struct
import sys
MAX_PARTITION_LENGTH = 0xC00 # 3K for partition data (96 entries) leaves 1K in a 4K sector for signature
MD5_PARTITION_BEGIN = b"\xEB\xEB" + b"\xFF" * 14 # The first 2 bytes are like magic numbers for MD5 sum
MD5_PARTITION_BEGIN = b"\xeb\xeb" + b"\xff" * 14 # The first 2 bytes are like magic numbers for MD5 sum
PARTITION_TABLE_SIZE = 0x1000 # Size of partition table
MIN_PARTITION_SUBTYPE_APP_OTA = 0x10
NUM_PARTITION_SUBTYPE_APP_OTA = 16
MIN_PARTITION_SUBTYPE_APP_TEE = 0x30
NUM_PARTITION_SUBTYPE_APP_TEE = 2
SECURE_NONE = None
SECURE_V1 = "v1"
SECURE_V2 = "v2"
__version__ = "1.2"
__version__ = "1.5"
APP_TYPE = 0x00
DATA_TYPE = 0x01
BOOTLOADER_TYPE = 0x02
PARTITION_TABLE_TYPE = 0x03
TYPES = {
"bootloader": BOOTLOADER_TYPE,
"partition_table": PARTITION_TABLE_TYPE,
"app": APP_TYPE,
"data": DATA_TYPE,
}
NVS_RW_MIN_PARTITION_SIZE = 0x3000
def get_ptype_as_int(ptype):
"""Convert a string which might be numeric or the name of a partition type to an integer"""
@ -56,6 +61,15 @@ def get_ptype_as_int(ptype):
# Keep this map in sync with esp_partition_subtype_t enum in esp_partition.h
SUBTYPES = {
BOOTLOADER_TYPE: {
"primary": 0x00,
"ota": 0x01,
"recovery": 0x02,
},
PARTITION_TABLE_TYPE: {
"primary": 0x00,
"ota": 0x01,
},
APP_TYPE: {
"factory": 0x00,
"test": 0x20,
@ -72,6 +86,7 @@ SUBTYPES = {
"fat": 0x81,
"spiffs": 0x82,
"littlefs": 0x83,
"tee_ota": 0x90,
},
}
@ -90,6 +105,8 @@ def get_subtype_as_int(ptype, subtype):
ALIGNMENT = {
APP_TYPE: 0x10000,
DATA_TYPE: 0x1000,
BOOTLOADER_TYPE: 0x1000,
PARTITION_TABLE_TYPE: 0x1000,
}
@ -98,14 +115,18 @@ def get_alignment_offset_for_type(ptype):
def get_alignment_size_for_type(ptype):
if ptype == APP_TYPE and secure == SECURE_V1:
if ptype == APP_TYPE:
if secure == SECURE_V1:
# For secure boot v1 case, app partition must be 64K aligned
# signature block (68 bytes) lies at the very end of 64K block
return 0x10000
if ptype == APP_TYPE and secure == SECURE_V2:
elif secure == SECURE_V2:
# For secure boot v2 case, app partition must be 4K aligned
# signature block (4K) is kept after padding the unsigned image to 64K boundary
return 0x1000
else:
# For no secure boot enabled case, app partition must be 4K aligned (min. flash erase size)
return 0x1000
# No specific size alignment requirement as such
return 0x1
@ -115,6 +136,10 @@ def get_partition_type(ptype):
return APP_TYPE
if ptype == "data":
return DATA_TYPE
if ptype == "bootloader":
return BOOTLOADER_TYPE
if ptype == "partition_table":
return PARTITION_TABLE_TYPE
raise InputError("Invalid partition type")
@ -134,6 +159,8 @@ quiet = False
md5sum = True
secure = SECURE_NONE
offset_part_table = 0
primary_bootloader_offset = None
recovery_bootloader_offset = None
def status(msg):
@ -165,7 +192,7 @@ class PartitionTable(list):
return cls.from_csv(data), False
@classmethod
def from_csv(cls, csv_contents): # noqa: C901
def from_csv(cls, csv_contents):
res = PartitionTable()
lines = csv_contents.splitlines()
@ -194,6 +221,11 @@ class PartitionTable(list):
# fix up missing offsets & negative sizes
last_end = offset_part_table + PARTITION_TABLE_SIZE # first offset after partition table
for e in res:
is_primary_bootloader = e.type == BOOTLOADER_TYPE and e.subtype == SUBTYPES[e.type]["primary"]
is_primary_partition_table = e.type == PARTITION_TABLE_TYPE and e.subtype == SUBTYPES[e.type]["primary"]
if is_primary_bootloader or is_primary_partition_table:
# They do not participate in the restoration of missing offsets
continue
if e.offset is not None and e.offset < last_end:
if e == res[0]:
raise InputError(
@ -203,8 +235,8 @@ class PartitionTable(list):
)
else:
raise InputError(
"CSV Error at line %d: Partitions overlap. Partition sets offset 0x%x. Previous partition ends 0x%x" # noqa: E501
% (e.line_no, e.offset, last_end)
"CSV Error at line %d: Partitions overlap. Partition sets offset 0x%x. "
"Previous partition ends 0x%x" % (e.line_no, e.offset, last_end)
)
if e.offset is None:
pad_to = get_alignment_offset_for_type(e.type)
@ -246,14 +278,14 @@ class PartitionTable(list):
return p
return None
def verify(self): # noqa: C901
def verify(self):
# verify each partition individually
for p in self:
p.verify()
# check on duplicate name
names = [p.name for p in self]
duplicates = set(n for n in names if names.count(n) > 1) # noqa: C401
duplicates = {n for n in names if names.count(n) > 1}
# print sorted duplicate partitions by name
if len(duplicates) != 0:
@ -267,6 +299,9 @@ class PartitionTable(list):
last = None
for p in sorted(self, key=lambda x: x.offset):
if p.offset < offset_part_table + PARTITION_TABLE_SIZE:
is_primary_bootloader = p.type == BOOTLOADER_TYPE and p.subtype == SUBTYPES[p.type]["primary"]
is_primary_partition_table = p.type == PARTITION_TABLE_TYPE and p.subtype == SUBTYPES[p.type]["primary"]
if not (is_primary_bootloader or is_primary_partition_table):
raise InputError(
"Partition offset 0x%x is below 0x%x" % (p.offset, offset_part_table + PARTITION_TABLE_SIZE)
)
@ -282,7 +317,8 @@ class PartitionTable(list):
for p in otadata_duplicates:
critical("%s" % (p.to_csv()))
raise InputError(
'Found multiple otadata partitions. Only one partition can be defined with type="data"(1) and subtype="ota"(0).' # noqa: E501
"Found multiple otadata partitions. Only one partition can be defined with "
'type="data"(1) and subtype="ota"(0).'
)
if len(otadata_duplicates) == 1 and otadata_duplicates[0].size != 0x2000:
@ -290,6 +326,23 @@ class PartitionTable(list):
critical("%s" % (p.to_csv()))
raise InputError("otadata partition must have size = 0x2000")
# Above checks but for TEE otadata
otadata_duplicates = [
p for p in self if p.type == TYPES["data"] and p.subtype == SUBTYPES[DATA_TYPE]["tee_ota"]
]
if len(otadata_duplicates) > 1:
for p in otadata_duplicates:
critical("%s" % (p.to_csv()))
raise InputError(
"Found multiple TEE otadata partitions. Only one partition can be defined with "
'type="data"(1) and subtype="tee_ota"(0x90).'
)
if len(otadata_duplicates) == 1 and otadata_duplicates[0].size != 0x2000:
p = otadata_duplicates[0]
critical("%s" % (p.to_csv()))
raise InputError("TEE otadata partition must have size = 0x2000")
def flash_size(self):
"""Return the size that partitions will occupy in flash
(ie the offset the last partition ends at)
@ -321,7 +374,7 @@ class PartitionTable(list):
data = b[o : o + 32]
if len(data) != 32:
raise InputError("Partition table length must be a multiple of 32 bytes")
if data == b"\xFF" * 32:
if data == b"\xff" * 32:
return result # got end marker
if md5sum and data[:2] == MD5_PARTITION_BEGIN[:2]: # check only the magic number part
if data[16:] == md5.digest():
@ -342,7 +395,7 @@ class PartitionTable(list):
result += MD5_PARTITION_BEGIN + hashlib.md5(result).digest()
if len(result) >= MAX_PARTITION_LENGTH:
raise InputError("Binary partition table length (%d) longer than max" % len(result))
result += b"\xFF" * (MAX_PARTITION_LENGTH - len(result)) # pad the sector, for signing
result += b"\xff" * (MAX_PARTITION_LENGTH - len(result)) # pad the sector, for signing
return result
def to_csv(self, simple_formatting=False):
@ -352,16 +405,20 @@ class PartitionTable(list):
class PartitionDefinition(object):
MAGIC_BYTES = b"\xAA\x50"
MAGIC_BYTES = b"\xaa\x50"
# dictionary maps flag name (as used in CSV flags list, property name)
# to bit set in flags words in binary format
FLAGS = {"encrypted": 0}
FLAGS = {"encrypted": 0, "readonly": 1}
# add subtypes for the 16 OTA slot values ("ota_XX, etc.")
for ota_slot in range(NUM_PARTITION_SUBTYPE_APP_OTA):
SUBTYPES[TYPES["app"]]["ota_%d" % ota_slot] = MIN_PARTITION_SUBTYPE_APP_OTA + ota_slot
# add subtypes for the 2 TEE OTA slot values ("tee_XX, etc.")
for tee_slot in range(NUM_PARTITION_SUBTYPE_APP_TEE):
SUBTYPES[TYPES["app"]]["tee_%d" % tee_slot] = MIN_PARTITION_SUBTYPE_APP_TEE + tee_slot
def __init__(self):
self.name = ""
self.type = None
@ -369,6 +426,7 @@ class PartitionDefinition(object):
self.offset = None
self.size = None
self.encrypted = False
self.readonly = False
@classmethod
def from_csv(cls, line, line_no):
@ -381,8 +439,8 @@ class PartitionDefinition(object):
res.name = fields[0]
res.type = res.parse_type(fields[1])
res.subtype = res.parse_subtype(fields[2])
res.offset = res.parse_address(fields[3])
res.size = res.parse_address(fields[4])
res.offset = res.parse_address(fields[3], res.type, res.subtype)
res.size = res.parse_size(fields[4], res.type)
if res.size is None:
raise InputError("Size field can't be empty")
@ -452,12 +510,36 @@ class PartitionDefinition(object):
return SUBTYPES[DATA_TYPE]["undefined"]
return parse_int(strval, SUBTYPES.get(self.type, {}))
def parse_address(self, strval):
def parse_size(self, strval, ptype):
if ptype == BOOTLOADER_TYPE:
if primary_bootloader_offset is None:
raise InputError("Primary bootloader offset is not defined. Please use --primary-bootloader-offset")
return offset_part_table - primary_bootloader_offset
if ptype == PARTITION_TABLE_TYPE:
return PARTITION_TABLE_SIZE
if strval == "":
return None # PartitionTable will fill in default
return parse_int(strval)
def verify(self): # noqa: C901
def parse_address(self, strval, ptype, psubtype):
if ptype == BOOTLOADER_TYPE:
if psubtype == SUBTYPES[ptype]["primary"]:
if primary_bootloader_offset is None:
raise InputError("Primary bootloader offset is not defined. Please use --primary-bootloader-offset")
return primary_bootloader_offset
if psubtype == SUBTYPES[ptype]["recovery"]:
if recovery_bootloader_offset is None:
raise InputError(
"Recovery bootloader offset is not defined. Please use --recovery-bootloader-offset"
)
return recovery_bootloader_offset
if ptype == PARTITION_TABLE_TYPE and psubtype == SUBTYPES[ptype]["primary"]:
return offset_part_table
if strval == "":
return None # PartitionTable will fill in default
return parse_int(strval)
def verify(self):
if self.type is None:
raise ValidationError(self, "Type field is not set")
if self.subtype is None:
@ -469,7 +551,7 @@ class PartitionDefinition(object):
offset_align = get_alignment_offset_for_type(self.type)
if self.offset % offset_align:
raise ValidationError(self, "Offset 0x%x is not aligned to 0x%x" % (self.offset, offset_align))
if self.type == APP_TYPE and secure is not SECURE_NONE:
if self.type == APP_TYPE:
size_align = get_alignment_size_for_type(self.type)
if self.size % size_align:
raise ValidationError(self, "Size 0x%x is not aligned to 0x%x" % (self.size, size_align))
@ -489,6 +571,23 @@ class PartitionDefinition(object):
% (self.name, self.type, self.subtype)
)
always_rw_data_subtypes = [SUBTYPES[DATA_TYPE]["ota"], SUBTYPES[DATA_TYPE]["coredump"]]
if self.type == TYPES["data"] and self.subtype in always_rw_data_subtypes and self.readonly is True:
raise ValidationError(
self,
"'%s' partition of type %s and subtype %s is always read-write and cannot be read-only"
% (self.name, self.type, self.subtype),
)
if self.type == TYPES["data"] and self.subtype == SUBTYPES[DATA_TYPE]["nvs"]:
if self.size < NVS_RW_MIN_PARTITION_SIZE and self.readonly is False:
raise ValidationError(
self,
"""'%s' partition of type %s and subtype %s of this size (0x%x) must be flagged as 'readonly' \
(the size of read/write NVS has to be at least 0x%x)"""
% (self.name, self.type, self.subtype, self.size, NVS_RW_MIN_PARTITION_SIZE),
)
STRUCT_FORMAT = b"<2sBBLL16sL"
@classmethod
@ -574,11 +673,13 @@ def parse_int(v, keywords={}):
raise InputError("Value '%s' is not valid. Known keywords: %s" % (v, ", ".join(keywords)))
def main(): # noqa: C901
def main():
global quiet
global md5sum
global offset_part_table
global secure
global primary_bootloader_offset
global recovery_bootloader_offset
parser = argparse.ArgumentParser(description="ESP32 partition table utility")
parser.add_argument(
@ -600,6 +701,8 @@ def main(): # noqa: C901
)
parser.add_argument("--quiet", "-q", help="Don't print non-critical status messages to stderr", action="store_true")
parser.add_argument("--offset", "-o", help="Set offset partition table", default="0x8000")
parser.add_argument("--primary-bootloader-offset", help="Set primary bootloader offset", default=None)
parser.add_argument("--recovery-bootloader-offset", help="Set recovery bootloader offset", default=None)
parser.add_argument(
"--secure",
help="Require app partitions to be suitable for secure boot",
@ -622,6 +725,15 @@ def main(): # noqa: C901
md5sum = not args.disable_md5sum
secure = args.secure
offset_part_table = int(args.offset, 0)
if args.primary_bootloader_offset is not None:
primary_bootloader_offset = int(args.primary_bootloader_offset, 0)
if primary_bootloader_offset >= offset_part_table:
raise InputError(
f"Unsupported configuration. Primary bootloader must be below partition table. "
f"Check --primary-bootloader-offset={primary_bootloader_offset:#x} and --offset={offset_part_table:#x}"
)
if args.recovery_bootloader_offset is not None:
recovery_bootloader_offset = int(args.recovery_bootloader_offset, 0)
if args.extra_partition_subtypes:
add_extra_subtypes(args.extra_partition_subtypes)
@ -647,7 +759,7 @@ def main(): # noqa: C901
if input_is_binary:
output = table.to_csv()
with sys.stdout if args.output == "-" else open(args.output, "w") as f:
with sys.stdout if args.output == "-" else open(args.output, "w", encoding="utf-8") as f:
f.write(output)
else:
output = table.to_binary()