Image Layout

This section primarily introduces the Image format and Flash layout.

Image Format

All images that support upgrades are composed of a 1280-byte image header and a variable-length payload. The image header contains the image type, size, version number, hash value, signature information, etc.

Image Header Format

The definitions of each field in the image header are as follows:

Definitions of Each Field in the Image Header

Memory Segment

Size(Bytes)

Functions

image_signature

384

Signature of the image, used for authentication when secure boot is enabled

image_hash

32

Hash check for the image, used for verifying the integrity of the image

image_control_header

12

Control information of the image, for details please refer to Image Control Header format

uuid

16

UUID value of the image

exe_base

4

Execution address of the image

load_src

4

Starting address of the code loaded into RAM

load_len

4

Size of the code loaded into RAM

image_base

4

Flash address of the image

dev_id

2

Not used

flash_layout_size_4k

2

Size of the flash layout (unit: 4K)

magic_pattern

4

Pattern information of the image

dec_key

16

Not used

load_dst

4

Starting address of the code loaded into Flash

ex_info

24

Information of the heap and the RAM

git_ver

16

Version information of the image

RSA Public Key

388

Used for authentication when secure boot is enabled

flash_sec_cfg

20

Flash security configuration information

image_info

344

For the OTA Header, image_info represents the starting address and size of each image in the OTA Bank. For other images, image_info is reserved.

Image Control Header Format

ctrl_header format in image header is shown as follows.

typedef struct _IMG_CTRL_HEADER_FORMAT
{
    uint16_t crc16;
    uint8_t ic_type;
    uint8_t secure_version;
    union
    {
        uint16_t value;
        struct
        {
            uint16_t xip: 1; // payload is executed on flash
            uint16_t enc: 1; // all the payload is encrypted
            uint16_t load_when_boot: 1; // load image when boot
            uint16_t enc_load: 1; // encrypt load part or not
            uint16_t enc_key_select: 3; // referenced to ENC_KEY_SELECT
            uint16_t not_ready: 1; //for copy image in ota
            uint16_t not_obsolete: 1; //for copy image in ota
            uint16_t integrity_check_en_in_boot: 1; // enable image integrity check in boot flow
            uint16_t compressed_not_ready: 1;
            uint16_t compressed_not_obsolete: 1;
            uint16_t rsvd: 1;
            uint16_t image_type: 3; /*for app 000b: normal image, 001b:compressed image, other for more types
            for patch in temp bank consist of 001b: patch+fsbl, 010b: patch+app, 011b: patch+fsbl+app*/
        };
    } ctrl_flag;
    uint16_t image_id;
    uint32_t payload_len;
} T_IMG_CTRL_HEADER_FORMAT;
  • ic_type represents IC type, which has the value of 15 when RTL87x2G chip is used.

  • secure_version indicates version of secure boot image.

  • image_id identifies different types of image, among which SCCD, OCCD cannot be updated through DFU.

typedef enum
{
    IMG_SCCD             = 0x379D,
    IMG_OCCD             = 0x379E,
    IMG_BOOTPATCH        = 0x379F,          /*!< KM4 boot patch */
    IMG_DFU_FIRST        = IMG_BOOTPATCH,
    IMG_OTA              = 0x37A0,          /*!< OTA header */
    IMG_SECUREMCUAPP     = 0x37A2,          /*!< KM4 secure app */
    IMG_SECUREMCUAPPDATA = 0x37A3,          /*!< KM4 secure app data */
    IMG_BT_STACKPATCH    = 0x37A6,          /*!< BT stack patch */
    IMG_BANK_FIRST       = IMG_BT_STACKPATCH,
    IMG_MCUPATCH         = 0x37A7,          /*!< KM4 non-secure rom patch */
    IMG_UPPERSTACK       = 0x37A8,          /*!< KM4 non-secure Upperstack */
    IMG_MCUAPP           = 0x37A9,          /*!< KM4 non-secure app */
    IMG_MCUCFGDATA       = 0x37AA,          /*!< KM4 MCUConfigData */
    IMG_MCUAPPDATA1      = 0x37AE,
    IMG_MCUAPPDATA2      = 0x37AF,
    IMG_MCUAPPDATA3      = 0x37B0,
    IMG_MCUAPPDATA4      = 0x37B1,
    IMG_MCUAPPDATA5      = 0x37B2,
    IMG_MCUAPPDATA6      = 0x37B3,
    IMG_ZIGBEESTACK      = 0x37B4,          /*!< KM4 Zigbee stack */

    IMG_MAX              = 0x37B5,
    IMG_DFU_MAX          = IMG_MAX,

    IMG_RO_DATA1         = 0x3A81,
    IMG_RO_DATA2         = 0x3A82,
    IMG_RO_DATA3         = 0x3A83,
    IMG_RO_DATA4         = 0x3A84,
    IMG_RO_DATA5         = 0x3A85,
    IMG_RO_DATA6         = 0x3A86,

    IMG_USER_DATA8       = 0xFFF7,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA_FIRST  = IMG_USER_DATA8,
    IMG_USER_DATA7       = 0xFFF8,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA6       = 0xFFF9,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA5       = 0xFFFA,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA4       = 0xFFFB,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA3       = 0xFFFC,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA2       = 0xFFFD,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA1       = 0xFFFE,    /*!< the image data only support unsafe single bank ota */
    IMG_USER_DATA_MAX    = 0xFFFF,    /*!< the image data only support unsafe single bank ota */
} IMG_ID;
  • The unit of payload_len is bytes, which indicates the size of the image, not including the 1280 bytes of the image header. The total length of the image is the payload_len plus 1280 bytes.

  • crc16 represents the crc16 checksum of the image. By default, the image uses SHA256 for verification, and the checksum is stored in image_hash. The crc16 can be ignored.

  • The ctrl_flag and its bit-fields related to DFU are only not_ready and not_obsolete .

    • not_ready indicates whether the image is valid. By default, the not_ready field in the image header of files published, compiled, or generated by tools is all 0.

      • There is a risk of power outage when transferring the image to the backup area via Bluetooth. Therefore, before writing to the backup area, it is necessary to change not_ready to 1 and then write to the flash.

      • Only when the image transfer is complete and the image integrity check is successful, modify the not_ready in the backup area image to 0, indicating the backup area image is valid.

      • After the system restarts, the activation process of the backup image is completed by the BootLoader.

    • not_obsolete indicates if the image should be abandoned and its default value is 1.

      • When bank switching is supported, not_obsolete is invalid during the DFU process.

      • When bank switching is not supported, after the DFU upgrade is complete, the boot code determines that not_ready is 0 and not_obsolete is 1. At this time, the image will be transferred from the OTA TMP area to the corresponding image run area in OTA Bank0. After the transfer is successful, write the not_obsolete in the OTA TMP area image to 0 to prevent repeated transfers. This ensures that the upgraded image is properly installed and run, and the old image is marked as obsolete to avoid being used again.

Flash Layout

Flash Layout

Flash Layout of RTL87x2G consists of Reserved, OEM Header, Bank0 Boot Patch, Bank1 Boot Patch, OTA Bank0, OTA Bank1, OTA TMP, Secure APP, FTL and APP defined section. The starting address for accessing flash is 0x04000000. Memory and corresponding function of flash is shown in Flash Memory and Function Description.

../../../../_images/Flash_Layout.png

Flash Layout

Flash Memory and Function Description

Memory Segment

Starting Address

Size(Bytes)

Functions

Support DFU

OEM Config

0x04010000

0x1000

Storage of Config information, including Bluetooth address and Customizable Flash Layout.

No

Bank0 Boot Patch

Variable

(Determined by Efuse)

Variable

(Determined by Efuse)

Flash boot loader.

Bank0 Boot Patch and Bank1 Boot Patch have the same function and serve as backup areas for each other.

Yes

Bank1 Boot Patch

Variable

(Determined by Efuse)

Variable

(Determined by Efuse)

Flash boot loader.

Yes

OTA Bank0

Variable

(defined in OEM Config)

Variable

(defined in OEM Config)

OTA Bank0 is primarily used to store the firmware and runtime data of the device. For specific functions, refer to OTA Bank Flash Segmentation.

Yes

OTA Bank1

Variable

(defined in OEM Config)

Variable

(defined in OEM Config)

In the supporting Bank switching OTA scheme, if OTA Bank0 is the active area, then OTA Bank1 will be the backup area. Conversely, if OTA Bank1 is the active area, then OTA Bank0 will be the backup area.

Yes

Bank0 Secure APP

Variable (defined in OEM Config)

Variable

(defined in OEM Config)

When TrustZone is enabled, Secure APP (Secure Application) can run in the TrustZone environment, ensuring the security protection of sensitive data and operations.

In this case, Bank0 Secure APP and Bank1 Secure APP have the same function and act as backup areas for each other.

Yes

Bank1 Secure APP

Variable

(defined in OEM Config)

Variable

(defined in OEM Config)

Same as Bank0 Secure APP, serving as a backup area for each other

Yes

OTA TMP

Variable

(defined in OEM Config)

Variable

(defined in OEM Config)

If not using supporting Bank switching for OTA updates, and instead using one bank as the backup area, then the size of the backup area must be equal to or greater than the maximum size of the image stored in OTA bank0.

Yes

FTL

Variable

(defined in OEM Config)

Variable

(defined in OEM Config)

This area supports accessing flash by logical address

No

APP Defined Section

Variable

(defined in OEM Config)

Variable

(defined in OEM Config)

The remaining space of the Flash can be used as the application’s customized area. This region is not managed by the OTA scheme, and users can freely use it to store and manage their own data, code, or other application-related content.

No

OTA Bank layout and description for each part is shown below.

../../../../_images/Layout_of_OTA_Bank.png

Layout of OTA Bank

OTA Bank Flash Segmentation

Memory Segment

Starting Address

Size(Bytes)

Functions

Support DFU or not

OTA Header

Determined in the OEM Config region

4KB

This region contains the OTA Header version and start address and size of the images in the bank

Yes, when using supporting Bank switching scheme

No, when using non-supporting Bank switching scheme

System Patch

Determined in the OTA Header region

Variable

This region contains the code that optimizes and extends the system in non-secure ROM

Yes

BT Stack Patch

Determined in the OTA Header region

Variable

Bluetooth controller protocol stack optimization and extension code

Yes

BT Host

Determined in the OTA Header region

Variable

Implements part of the code for HCI and above Bluetooth protocol stack

Yes

APP

Determined in the OTA Header region

Variable

This region contains project code

Yes

APP Config File

Determined in the OTA Header region

Variable

APP Config information

Yes

APP Data1

Determined in the OTA Header region

Variable

Application’s customized area

Yes

APP Data2

Determined in the OTA Header region

Variable

Application’s customized area

Yes

APP Data3

Determined in the OTA Header region

Variable

Application’s customized area

Yes

APP Data4

Determined in the OTA Header region

Variable

Application’s customized area

Yes

APP Data5

Determined in the OTA Header region

Variable

Application’s customized area

Yes

APP Data6

Determined in the OTA Header region

Variable

Application’s customized area

Yes

Method of Adjusting Flash Layout

Flash layout settings are divided into two levels: the High Level Flash map is determined by the config file, while the OTA Bank map is determined by the OTA Header file. Users can configure custom flash layout through the Config Set option in MP Tool, as shown below.

../../../../_images/MPTool_config.png

Generate config file through MP Tool

For the convenience of users, Realtek also provides Flash Map Generate Tool for generating flash map.ini and flash_map.h files. The flash map.ini file can be imported into MP Tool to generate config file and OTA header respectively. The flash_map.h file needs to be copied to the APP project directory to compile a correct and runnable APP image.

../../../../_images/FlashMapGenerateTool.png

Flash Map Generate Tool configures Flash Map

But at the same time, the following principles must be followed to adjust the flash layout.

  1. If you choose supporting Bank switching scheme, ensure that the size of OTA bank0 is equal to the size of OTA bank1, and set the size of the OTA TMP area to 0.

  2. If you choose non-supporting Bank switching scheme, set the size of OTA bank1 to 0, and the size of the OTA TMP area should not be smaller than the size of the largest image in OTA bank0.

  3. In order to lock all the code areas to prevent unexpected flash write and erase operations, align the offset of the end address of OTA Bank1 relative to the start address of the flash to the actually selected flash address as much as possible. Please refer to Software Block Protect.

  4. Because the data stored in the APP Data1, APP Data2, APP Data3, APP Data4, APP Data5 or APP Data6 area in the OTA bank may fall within the locked range of the flash, this area is generally stored as read-only data. If it is necessary to store data that needs to be rewritten, it should be placed in the “APP Defined Section” area.

Flash Layout Example

Based on the Method of Adjusting Flash Layout, this section provides examples of the flash layout under Supporting Bank Switching and Non-supporting Bank Switching.

Supporting Bank Switching

Flash Layout Sample(supporting Bank switching)

Sample Layout for flash(total size = 2M)

Size(Bytes)

Start Address

Reserved

4K

0x04000000

OEM Header

4K

0x04001000

Bank0 Boot Patch

32K

0x04002000

Bank1 Boot Patch

32K

0x0400A000

OTA Bank0

596K

0x04012000

  • OTA Header

4K

0x04012000

  • System Patch code

32K

0x04013000

  • BT Stack Patch code

60K

0x0401B000

  • BT Host code

212K

0x0402A000

  • APP code

284K

0x0405F000

  • APP Config File

4K

0x040A6000

  • APP data1

0K

0x040A7000

  • APP data2

0K

0x040A7000

  • APP data3

0K

0x040A7000

  • APP data4

0K

0x040A7000

  • APP data5

0K

0x040A7000

  • APP data6

0K

0x040A7000

OTA Bank1

596K

0x040A7000

  • OTA Header

4K

0x040A7000

  • System Patch code

32K

0x040A8000

  • BT Stack Patch code

60K

0x040B0000

  • BT Host code

212K

0x040BF000

  • APP code

284K

0x040F4000

  • APP Config File

4K

0x0413B000

  • APP data1

0K

0x0413C000

  • APP data2

0K

0x0413C000

  • APP data3

0K

0x0413C000

  • APP data4

0K

0x0413C000

  • APP data5

0K

0x0413C000

  • APP data6

0K

0x0413C000

Bank0 Secure APP code

0K

0x0413C000

Bank0 Secure APP Data

0K

0x0413C000

Bank1 Secure APP code

0K

0x0413C000

Bank1 Secure APP Data

0K

0x0413C000

OTA Temp

32K

0x0413C000

FTL

16K

0x04148000

APP Defined Section

736K

0x040FF000

Note

Flash Layout should be determined based on actual size of image and data.

Non-supporting Bank Switching

Flash Layout Sample (non-supporting Bank switching)

Sample Layout for flash (total size = 1M)

Size (Bytes)

Start Address

Reserved

4K

0x04000000

OEM Header

4K

0x04001000

Bank0 Boot Patch

32K

0x04002000

Bank1 Boot Patch

32K

0x0400A000

OTA Bank0

612K

0x04012000

  • OTA Header

4K

0x04012000

  • System Patch code

32K

0x04013000

  • BT Stack Patch code

60K

0x0401B000

  • BT Host code

212K

0x0402A000

  • APP code

304K

0x0405F000

  • APP Config File

4K

0x040AC000

  • APP data1

0K

0x040AD000

  • APP data2

0K

0x040AD000

  • APP data3

0K

0x040AD000

  • APP data4

0K

0x040AD000

  • APP data5

0K

0x040AD000

  • APP data6

0K

0x040AD000

OTA Bank1 (Equal to 0)

0K

0x040AD000

Bank0 Secure APP code

0K

0x040AD000

Bank0 Secure APP Data

0K

0x040AD000

Bank1 Secure APP code

0K

0x040AD000

Bank1 Secure APP Data

0K

0x040AD000

OTA Temp

312K

0x040AD000

FTL

16K

0x040FB000

Note

The space for APP data is not allocated in this sample. Flash Layout should be distributed based on the actual size of image and data.