10. Working with Rauc System ==================================================== The RAUC is the software update mechanism used to update the CC pilot devices starting from CC Linux 4.0. The detailed information about the RAUC can be found in the **CCLinux-RaucGuide** *[2]* and how to update the device with RAUC can be found in the **CCLinux-SoftwareGuide** *[1]*. This section gives more details about how to work with RAUC related things such as boot up scripts, configurations and the location of configurations,etc. ==================================================== 10.1 Recipe for creating Rauc bundles ==================================================== Once the RAUC is setup on the target, we need to create update bundles to update the target. Yocto support for using RAUC is provided by the **meta-rauc** layer ***[4.2.17]***. Here is an example yocto rauc bundle recipe for '***CCpilot-v700-4.x.x.x-system-update-bundle.bb***' .. code-block:: DESCRIPTION = "V700 system update bundle generator" inherit bundle RAUC_BUNDLE_COMPATIBLE = "CrossControl V700" RAUC_BUNDLE_SLOTS = "bootloader rootfs appfs" RAUC_BUNDLE_FORMAT = "verity" # Slot bootloader RAUC_SLOT_bootloader = "imx-boot" RAUC_SLOT_bootloader[file] = "imx-boot.img" RAUC_SLOT_bootloader[depends] = "imx-boot:do_deploy" # Slot rootfs RAUC_SLOT_rootfs = "ccpilot-v700-release" RAUC_SLOT_rootfs[fstype] = "ext4" RAUC_SLOT_rootfs[adaptive] = "block-hash-index" # Slot appfs RAUC_SLOT_appfs = "ccpilot-v700-appfs" RAUC_SLOT_appfs[fstype] = "ext4" RAUC_SLOT_appfs[adaptive] = "block-hash-index" RAUC_KEY_FILE = "${COREBASE}/../meta-cc/meta-bsp-v700/recipes-core/rauc/files/development-1.key.pem" RAUC_CERT_FILE = "${COREBASE}/../meta-cc/meta-bsp-v700/recipes-core/rauc/files/development-1.cert.pem" ------------------------------------------------------------------ 10.1.1 Rauc Development Certificates ------------------------------------------------------------------ The RAUC bundle format consists of the images and a manifest, contained in a SquashFS image. The SquashFS is followed by a public key signature over the full image. The signature is stored (together with the signer’s certificate) in the CMS format. Before installation, the signer certificate is verified against the keyring(s) already stored on the system and the signer’s public key is then used to verify the bundle signature. RAUC uses **OpenSSL** as a library for signing and verification of bundles. For development purpose, a CA root certificate file, a developement keyring and a development certificate file based on the CA root certificate is created using OpenSSL. These files will be located in the **recipes-core** of meta-bsp-<platform>. refer ***[4.2.5]*** The CA ceritificate will end up in '***system.conf***' file .. code-block:: [keyring] path=/etc/rauc/ca.cert.pem and the development certificate and keyring will be used to create a bundle .. code-block:: RAUC_KEY_FILE = "${COREBASE}/../meta-cc/meta-bsp-v700/recipes-core/rauc/files/development-1.key.pem" RAUC_CERT_FILE = "${COREBASE}/../meta-cc/meta-bsp-v700/recipes-core/rauc/files/development-1.cert.pem" The rauc bundle created with the development keyring and ceritificate will be verified against the CA root certificate in the '***system.conf***' file when updating the system. ==================================================== 10.2 Rauc System Conf File ==================================================== A configuration file named system.conf which is a part of root file system describes the number and type of available slots. This file is loaded from /etc/rauc/ and it is used to validate storage locations for update images. Each board type requires its special configuration. Below is an example of how the ***system.conf*** file looks for one of the platform: .. code-block:: [system] compatible=CrossControl V700 bootloader=uboot data-directory=/data/rauc bundle-formats=-plain [keyring] path=/etc/rauc/ca.cert.pem [log.install-log] filename=install.log events=install format=readable max-size=100K max-files=5 [slot.bootloader.0] device=/dev/mmcblk1 type=boot-emmc install-same=false [slot.rootfs.0] device=/dev/mmcblk1p2 type=ext4 bootname=A install-same=false [slot.rootfs.1] device=/dev/mmcblk1p3 type=ext4 bootname=B install-same=false [slot.appfs.0] device=/dev/mmcblk1p4 type=ext4 parent=rootfs.0 install-same=false [slot.appfs.1] device=/dev/mmcblk1p5 type=ext4 parent=rootfs.1 install-same=false The system conf file will be same for all the platforms with uboot bootloader, but for X1200 the bootloader is grub. So the system conf file will be different only on the bootloader part, but rest of the conf will be same. .. code-block:: [system] compatible=CrossControl X1200 bootloader=grub grubenv=/efi/EFI/BOOT/grubenv data-directory=/data/rauc bundle-formats=-plain [slot.efi.0] device=/dev/mmcblk0 type=boot-gpt-switch region-start=1M region-size=256M install-same=false ==================================================== 10.3 Utils needed by Rauc ==================================================== Rauc binary needs certain firmware utils on the kernel to set certain bootloader environmental variables from the kernel after the system update. The utils needed is same for all the platforms which uses *uboot* as bootloader and only differs for X1200 which uses *grub* as a bootloader. **Table 1** shows the kernel utils needed for different platforms. .. list-table:: Table 1: Kernel Utilities needed by RAUC :widths: 30 30 :header-rows: 1 * - V700/V1x00/Vx10/Yukon - X1200 * - fw_setenv / fw_printenv - grub-editenv .. note:: 'fw-setenv' and 'fw-printenv' are the uboot fw utils will be installed into the target by the libubootenv package. Make sure libubootenv image ends up in the image. .. note:: 'grub-editenv' will be installed into the target by default by the Grub bootloader. ==================================================== 10.4 Firmware environment config ==================================================== The environmental variables either from U-Boot or Grub will end up in the boot partition on the target. 1. The U-Boot fw utils (fw_setenv / fw_printenv) will look for config file 'fw_env.config' file in the /etc directory where to set or edit the U-Boot environmental variables. 2. The Grub util (grub_editenv) will look for 'grubenv' file in the /efi/EFI/BOOT directory of boot partition to set or edit the Grub environmental variables. ==================================================== 10.5 Rauc Boot Script ==================================================== To enable handling of redundant booting into Slot A or B, manual boot scripting is required. The boot script will be same for all the devices (V700/V1x00/Vx10/Yukon) that uses U-Boot, but differs for X1200 which uses Grub as bootloader. The boot script differs for U-Boot and grub, to store and modify variables in its Environment. Properly configured, the environment can be accessed both from the bootloader itself as well as from Linux userspace. The default RAUC U-Boot and Grub boot selection implementation requires a boot script using specific set of variables that are persisted to the environment as stateful slot selection information. .. note:: The boot script variables will be different for U-Boot and Grub. ------------------------------------------------------------------ 10.5.1 Rauc boot script for U-Boot ------------------------------------------------------------------ The U-Boot Rauc boot script will be into implemented into the board header file in the uboot source as a patch. .. code-block:: "test -n "${BOOT_ORDER}" || env set BOOT_ORDER "A B"; " "test -n "${BOOT_A_LEFT}" || env set BOOT_A_LEFT 3; " "test -n "${BOOT_B_LEFT}" || env set BOOT_B_LEFT 3; " "env set rauc_slot; " "env set mmcpartroot; " "env set mmcroot; " "for BOOT_SLOT in "${BOOT_ORDER}"; do " "if test "x${mmcpartroot}" != "x"; then " "; " "elif test "x${BOOT_SLOT}" = "xA"; then " "if itest ${BOOT_A_LEFT} -gt 0; then " "setexpr BOOT_A_LEFT ${BOOT_A_LEFT} - 1; " "echo "Booting valid RAUC slot A, ${BOOT_A_LEFT} attempts remaining"; " "setenv rauc_slot "A"; " "setenv mmcpartroot 2; " "setenv mmcroot /dev/mmcblk1p2; " "fi; " "elif test "x${BOOT_SLOT}" = "xB"; then " "if itest ${BOOT_B_LEFT} -gt 0; then " "setexpr BOOT_B_LEFT ${BOOT_B_LEFT} - 1; " "echo "Booting valid RAUC slot B, ${BOOT_B_LEFT} attempts remaining"; " "setenv rauc_slot "B"; " "setenv mmcpartroot 3; " "setenv mmcroot /dev/mmcblk1p3; " "fi; " "fi; " "done; " "if test -n "${mmcpartroot}"; then " "run mmcrootargs; " "run mmcargs; " "saveenv; " "else " "echo "No valid RAUC slot found. Resetting attempts to 3"; " "setenv BOOT_A_LEFT 3; " "setenv BOOT_B_LEFT 3; " "saveenv; " "reset; " "fi; " ------------------------------------------------------------------ 10.5.2 Rauc boot script for Grub ------------------------------------------------------------------ The Grub Rauc boot script will be implemented in the 'grub.cfg' file of grub-bootconf which will end up in the boot partition */efi/EFI/BOOT/* .. code-block:: serial --unit=0 --speed=115200 --word=8 --parity=no --stop=1 # default boot to Main A default=0 # timeout 1 second timeout=1 set ORDER="A B" set A_OK=0 set B_OK=0 set A_TRY=0 set B_TRY=0 set RAUC_SLOT=A load_env --file=(hd0,1)/EFI/BOOT/grubenv # select bootable slot for SLOT in $ORDER; do if [ "$SLOT" == "A" ]; then INDEX=0 OK=$A_OK TRY=$A_TRY A_TRY=1 fi if [ "$SLOT" == "B" ]; then INDEX=1 OK=$B_OK TRY=$B_TRY B_TRY=1 fi if [ "$OK" -eq 1 -a "$TRY" -eq 0 ]; then default=$INDEX break fi done # reset booted flags if [ "$default" -eq 0 ]; then if [ "$A_OK" -eq 1 -a "$A_TRY" -eq 1 ]; then A_TRY=0 fi if [ "$B_OK" -eq 1 -a "$B_TRY" -eq 1 ]; then B_TRY=0 fi fi save_env --file=(hd0,1)/EFI/BOOT/grubenv A_TRY A_OK B_TRY B_OK ORDER FACTORY_RESET ROOTARGS="rootwait ro rootfstype=ext4 device=/dev/mmcblk0 rwdevice=/dev/mmcblk0p6 rwfstype=ext4 rwreset=no" BOOTARGS="console=ttyS5,115200 net.ifnames=0 panic=60 quiet intel_iommu=off" menuentry "Main A (OK=$A_OK TRY=$A_TRY)"{ linux (hd0,2)/boot/bzImage LABEL=root_A root=/dev/mmcblk0p2 $ROOTARGS $BOOTARGS rauc.slot=A initrd (hd0,2)/boot/microcode.cpio set RAUC_SLOT=A save_env --file=(hd0,1)/EFI/BOOT/grubenv RAUC_SLOT } menuentry "Main B (OK=$B_OK TRY=$B_TRY)"{ linux (hd0,3)/boot/bzImage LABEL=root_B root=/dev/mmcblk0p3 $ROOTARGS $BOOTARGS rauc.slot=B initrd (hd0,3)/boot/microcode.cpio set RAUC_SLOT=B save_env --file=(hd0,1)/EFI/BOOT/grubenv RAUC_SLOT }