Boot: Add 'revert' support to direct-xip mode

The 'revert' mechanism in direct-xip is similar to the one in swap mode.
It requires the trailer magic to be added to the signed image. When a
reboot happens without the image being confirmed at runtime (without the
image_ok flag being set), the bootloader considers the image faulty and
erases it. After this it will attempt to boot the previous image
instead. The images can also be made permanent (marked as confirmed in
advance) just like in swap mode.

Change-Id: Ibde9361d4a7302dd8efbb277b691b71eca0ca877
Signed-off-by: David Vincze <david.vincze@linaro.org>
This commit is contained in:
David Vincze 2020-10-22 13:53:29 +02:00 committed by Dávid Vincze
parent f6c692315c
commit 505fba252e
5 changed files with 151 additions and 10 deletions

View File

@ -2047,6 +2047,75 @@ boot_get_slot_usage(struct boot_loader_state *state, uint8_t slot_usage[],
return image_cnt;
}
#ifdef MCUBOOT_DIRECT_XIP_REVERT
/**
* Checks whether the image in the given slot was previously selected to run.
* Erases the image if it was selected but its execution failed, otherwise marks
* it as selected if it has not been before.
*
* @param state Image metadata from the image trailer. This function fills
* this struct with the data read from the image trailer.
* @param slot Image slot number.
*
* @return 0 on success; nonzero on failure.
*/
static int
boot_select_or_erase(struct boot_swap_state *state, uint32_t slot)
{
const struct flash_area *fap;
int fa_id;
int rc;
fa_id = flash_area_id_from_image_slot(slot);
rc = flash_area_open(fa_id, &fap);
assert(rc == 0);
memset(state, 0, sizeof(struct boot_swap_state));
rc = boot_read_swap_state(fap, state);
assert(rc == 0);
if (state->magic != BOOT_MAGIC_GOOD ||
(state->copy_done == BOOT_FLAG_SET &&
state->image_ok != BOOT_FLAG_SET)) {
/*
* A reboot happened without the image being confirmed at
* runtime or its trailer is corrupted/invalid. Erase the image
* to prevent it from being selected again on the next reboot.
*/
BOOT_LOG_DBG("Erasing faulty image in the %s slot.",
(slot == BOOT_PRIMARY_SLOT) ? "primary" : "secondary");
rc = flash_area_erase(fap, 0, fap->fa_size);
assert(rc == 0);
flash_area_close(fap);
rc = -1;
} else {
if (state->copy_done != BOOT_FLAG_SET) {
if (state->copy_done == BOOT_FLAG_BAD) {
BOOT_LOG_DBG("The copy_done flag had an unexpected value. Its "
"value was neither 'set' nor 'unset', but 'bad'.");
}
/*
* Set the copy_done flag, indicating that the image has been
* selected to boot. It can be set in advance, before even
* validating the image, because in case the validation fails, the
* entire image slot will be erased (including the trailer).
*/
rc = boot_write_copy_done(fap);
if (rc != 0) {
BOOT_LOG_WRN("Failed to set copy_done flag of the image in "
"the %s slot.", (slot == BOOT_PRIMARY_SLOT) ?
"primary" : "secondary");
rc = 0;
}
}
flash_area_close(fap);
}
return rc;
}
#endif /* MCUBOOT_DIRECT_XIP_REVERT */
#ifdef MCUBOOT_RAM_LOAD
#if !defined(IMAGE_EXECUTABLE_RAM_START) || !defined(IMAGE_EXECUTABLE_RAM_SIZE)
@ -2207,6 +2276,9 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
uint32_t img_sz;
uint32_t img_loaded = 0;
#endif /* MCUBOOT_RAM_LOAD */
#ifdef MCUBOOT_DIRECT_XIP_REVERT
struct boot_swap_state slot_state;
#endif /* MCUBOOT_DIRECT_XIP_REVERT */
fih_int fih_rc = FIH_FAILURE;
memset(state, 0, sizeof(struct boot_loader_state));
@ -2234,7 +2306,6 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
/* Select the newest and valid image. */
for (i = 0; i < img_cnt; i++) {
selected_slot = 0;
selected_image_header = NULL;
/* Iterate over all the slots that are in use (contain an image)
* and select the one that holds the newest image.
@ -2257,6 +2328,17 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
selected_image_header = hdr;
}
}
#ifdef MCUBOOT_DIRECT_XIP_REVERT
rc = boot_select_or_erase(&slot_state, selected_slot);
if (rc != 0) {
/* The selected image slot has been erased. */
slot_usage[selected_slot] = 0;
selected_image_header = NULL;
continue;
}
#endif /* MCUBOOT_DIRECT_XIP_REVERT */
#ifdef MCUBOOT_RAM_LOAD
/* Image is first loaded to RAM and authenticated there in order to
* prevent TOCTOU attack during image copy. This could be applied
@ -2268,6 +2350,8 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
&img_sz);
if (rc != 0 ) {
/* Image loading failed try the next one. */
slot_usage[selected_slot] = 0;
selected_image_header = NULL;
continue;
} else {
img_loaded = 1;
@ -2294,6 +2378,7 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
* and start over.
*/
slot_usage[selected_slot] = 0;
selected_image_header = NULL;
}
if (fih_not_eq(fih_rc, FIH_SUCCESS) || (selected_image_header == NULL)) {
@ -2305,13 +2390,24 @@ context_boot_go(struct boot_loader_state *state, struct boot_rsp *rsp)
/* Update the stored security counter with the newer (active) image's
* security counter value.
*/
rc = boot_update_security_counter(0, selected_slot,
selected_image_header);
if (rc != 0) {
BOOT_LOG_ERR("Security counter update failed after image "
"validation.");
goto out;
#ifdef MCUBOOT_DIRECT_XIP_REVERT
/* When the 'revert' mechanism is enabled in direct-xip mode, the
* security counter can be increased only after reboot, if the image
* has been confirmed at runtime (the image_ok flag has been set).
* This way a 'revert' can be performed when it's necessary.
*/
if (slot_state.image_ok == BOOT_FLAG_SET) {
#endif
rc = boot_update_security_counter(0, selected_slot,
selected_image_header);
if (rc != 0) {
BOOT_LOG_ERR("Security counter update failed after image "
"validation.");
goto out;
}
#ifdef MCUBOOT_DIRECT_XIP_REVERT
}
#endif
#endif /* MCUBOOT_HW_ROLLBACK_PROT */
#ifdef MCUBOOT_MEASURED_BOOT

View File

@ -224,9 +224,18 @@ config BOOT_DIRECT_XIP
mode results in a simpler code path and smaller code size.
endchoice
endif
if !SINGLE_APPLICATION_SLOT
config BOOT_DIRECT_XIP_REVERT
bool "Enable the revert mechanism in direct-xip mode"
default n
help
If y, enables the revert mechanism in direct-xip similar to the one in
swap mode. It requires the trailer magic to be added to the signed image.
When a reboot happens without the image being confirmed at runtime, the
bootloader considers the image faulty and erases it. After this it will
attempt to boot the previous image. The images can also be made permanent
(marked as confirmed in advance) just like in swap mode.
config BOOT_BOOTSTRAP
bool "Bootstrap erased the primary slot from the secondary slot"
default n
@ -276,7 +285,7 @@ config BOOT_ENCRYPT_X25519
back when swapping from the primary slot to the secondary slot. The
encryption mechanism used in this case is ECIES using primitives
described under "ECIES-X25519 encryption" in docs/encrypted_images.md.
endif
endif # !SINGLE_APPLICATION_SLOT
config BOOT_MAX_IMG_SECTORS
int "Maximum number of sectors per image slot"

View File

@ -70,6 +70,10 @@
#define MCUBOOT_DIRECT_XIP
#endif
#ifdef CONFIG_BOOT_DIRECT_XIP_REVERT
#define MCUBOOT_DIRECT_XIP_REVERT
#endif
#ifdef CONFIG_UPDATEABLE_IMAGE_NUMBER
#define MCUBOOT_IMAGE_NUMBER CONFIG_UPDATEABLE_IMAGE_NUMBER
#else

View File

@ -233,6 +233,9 @@ then checks its validity (integrity check, signature verification etc.). If the
image is invalid MCUboot erases its memory slot and starts to validate the other
image. After a successful validation of the selected image the bootloader
chain-loads it.
An additional "revert" mechanism is also supported. For more information, please
read the [corresponding section](#direct-xip-revert).
Handling the primary and secondary slots as equals has its drawbacks. Since the
images are not moved between the slots, the on-the-fly image
encryption/decryption can't be supported (it only applies to storing the image
@ -329,6 +332,33 @@ The "swap type" is a high-level representation of the outcome of the
boot. Subsequent sections describe how mcuboot determines the swap type from
the bit-level contents of flash.
### [Revert mechanism in direct-xip mode](#direct-xip-revert)
The direct-xip mode also supports a "revert" mechanism which is the equivalent
of the swap mode's "revert" swap. It can be enabled with the
MCUBOOT_DIRECT_XIP_REVERT config option and an image trailer must also be added
to the signed images (the "--pad" option of the `imgtool` script must be used).
For more information on this please read the [Image Trailer](#image-trailer)
section and the [imgtool](imgtool.md) documentation. Making the images permanent
(marking them as confirmed in advance) is also supported just like in swap mode.
The individual steps of the direct-xip mode's "revert" mechanism are the
following:
1. Select the slot which holds the newest potential image.
2. Was the image previously selected to run (during a previous boot)?
+ Yes: Did the image mark itself "OK" (was the self-test successful)?
+ Yes.
- Proceed to step 3.
+ No.
- Erase the image from the slot to prevent it from being selected
again during the next boot.
- Return to step 1 (the bootloader will attempt to select and
possibly boot the previous image if there is one).
+ No.
- Mark the image as "selected" (set the copy_done flag in the trailer).
- Proceed to step 3.
3. Proceed to image validation ...
## [Image Trailer](#image-trailer)
For the bootloader to be able to determine the current state and what actions

View File

@ -57,6 +57,8 @@
/* Uncomment to enable the direct-xip code path. */
/* #define MCUBOOT_DIRECT_XIP */
/* Uncomment to enable the revert mechanism in direct-xip mode. */
/* #define MCUBOOT_DIRECT_XIP_REVERT */
/* Uncomment to enable the ram-load code path. */
/* #define MCUBOOT_RAM_LOAD */