Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
153 changes: 101 additions & 52 deletions boot/bootutil/src/loader.c
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,29 @@ int pcd_version_cmp_net(const struct flash_area *fap, struct image_header *hdr);
#include "bootutil/key_revocation.h"
#endif

#ifdef CONFIG_PARTITION_MANAGER_ENABLED
#define THREE_CAT_(a, b, c) (a##b##c)
#define THREE_CAT(a, b, c) THREE_CAT_(a, b, c)

#ifdef CONFIG_NCS_IS_VARIANT_IMAGE
/* Running from slot 1, checking slot 0 */
#define NCS_VARIANT_SLOT_ID 0
#else /* CONFIG_NCS_IS_VARIANT_IMAGE */
/* Running from slot 0, checking slot 1 */
#define NCS_VARIANT_SLOT_ID 1
#endif /* CONFIG_NCS_IS_VARIANT_IMAGE */

#define NCS_VARIANT_SLOT_MIN_ADDR THREE_CAT(PM_S, NCS_VARIANT_SLOT_ID, _ADDRESS)
#define NCS_VARIANT_SLOT_MAX_ADDR ((NCS_VARIANT_SLOT_MIN_ADDR) + THREE_CAT(PM_S, NCS_VARIANT_SLOT_ID, _SIZE))

#if CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER == -1
#define CHECK_MCUBOOT_IMAGE 0
#else
#define CHECK_MCUBOOT_IMAGE 1
#endif

#endif /* CONFIG_PARTITION_MANAGER_ENABLED */

BOOT_LOG_MODULE_DECLARE(mcuboot);

static struct boot_loader_state boot_data;
Expand Down Expand Up @@ -1150,12 +1173,15 @@ boot_validate_slot(struct boot_loader_state *state, int slot,
goto out;
}

#if MCUBOOT_IMAGE_NUMBER > 1 && !defined(MCUBOOT_ENC_IMAGES) && defined(MCUBOOT_VERIFY_IMG_ADDRESS)
#if MCUBOOT_IMAGE_NUMBER > 1 && \
(!defined(MCUBOOT_ENC_IMAGES) || defined(CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS)) && \
defined(MCUBOOT_VERIFY_IMG_ADDRESS)
/* Verify that the image in the secondary slot has a reset address
* located in the primary slot. This is done to avoid users incorrectly
* overwriting an application written to the incorrect slot.
* This feature is only supported by ARM platforms.
*/

#if MCUBOOT_IMAGE_NUMBER >= 3
/* Currently the MCUboot can be configured for up to 3 image, where image number 2 is
* designated for XIP, where it is the second part of image stored in slots of image
Expand All @@ -1167,58 +1193,72 @@ boot_validate_slot(struct boot_loader_state *state, int slot,
}
#endif
if (fap == BOOT_IMG_AREA(state, BOOT_SLOT_SECONDARY)) {
const struct flash_area *pri_fa = BOOT_IMG_AREA(state, BOOT_SLOT_PRIMARY);
struct image_header *secondary_hdr = boot_img_hdr(state, slot);
uint32_t reset_value = 0;
uint32_t reset_addr = secondary_hdr->ih_hdr_size + sizeof(reset_value);
uint32_t min_addr, max_addr;
bool check_addresses = false;
uint32_t internal_img_addr = 0; /* either the reset handler addres or the image beginning addres */
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

*address

uint32_t min_addr;
uint32_t max_addr;

if (flash_area_read(fap, reset_addr, &reset_value, sizeof(reset_value)) != 0) {
min_addr = flash_area_get_off(BOOT_IMG_AREA(state, BOOT_SLOT_PRIMARY));
max_addr = flash_area_get_size(BOOT_IMG_AREA(state, BOOT_SLOT_PRIMARY)) + min_addr;

#ifdef CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS
internal_img_addr = secondary_hdr->ih_load_addr;
#else
const uint32_t offset = secondary_hdr->ih_hdr_size + sizeof(internal_img_addr);
BOOT_LOG_DBG("Getting image %d internal addr from offset %d",
BOOT_CURR_IMG(state), offset);
/* Read reset vector from ARM vector table */
if (flash_area_read(fap, offset, &internal_img_addr, sizeof(internal_img_addr)) != 0) {
BOOT_LOG_ERR("Failed to read image load address", BOOT_CURR_IMG(state));
fih_rc = FIH_NO_BOOTABLE_IMAGE;
goto out;
}
#endif
BOOT_LOG_DBG("Image %d expected load address 0x%x", BOOT_CURR_IMG(state), internal_img_addr);

#ifdef PM_CPUNET_APP_ADDRESS
#ifdef CONFIG_PARTITION_MANAGER_ENABLED
/* The primary slot for the network core is emulated in RAM.
* Its flash_area hasn't got relevant boundaries.
* Therfore need to override its boundaries for the check.
*/
#ifdef PM_CPUNET_APP_ADDRESS
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_NETWORK_CORE_IMAGE_NUMBER) {

BOOT_LOG_DBG("Image %d is NETCORE image", BOOT_CURR_IMG(state));

min_addr = PM_CPUNET_APP_ADDRESS;
max_addr = PM_CPUNET_APP_ADDRESS + PM_CPUNET_APP_SIZE;
check_addresses = true;
} else
#endif
#if CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER != -1
}
#endif /* PM_CPUNET_APP_SIZE */

#if CHECK_MCUBOOT_IMAGE == 1
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER) {
#if (CONFIG_NCS_IS_VARIANT_IMAGE)
min_addr = PM_S0_ADDRESS;
max_addr = (PM_S0_ADDRESS + PM_S0_SIZE);
#else
min_addr = PM_S1_ADDRESS;
max_addr = (PM_S1_ADDRESS + PM_S1_SIZE);
#endif
check_addresses = true;
} else
#endif

BOOT_LOG_DBG("Image %d is another stage MCBoot image", BOOT_CURR_IMG(state));

min_addr = NCS_VARIANT_SLOT_MIN_ADDR;
max_addr = NCS_VARIANT_SLOT_MAX_ADDR;
}
#endif /* CHECK_MCUBOOT_IMAGE */

#if CONFIG_MCUBOOT_APPLICATION_IMAGE_NUMBER != -1
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_APPLICATION_IMAGE_NUMBER) {
#if CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER != -1
#if (CONFIG_NCS_IS_VARIANT_IMAGE)
min_addr = MIN(pri_fa->fa_off, PM_S0_ADDRESS);
max_addr = MAX((pri_fa->fa_off + pri_fa->fa_size), (PM_S0_ADDRESS + PM_S0_SIZE));
#else
min_addr = MIN(pri_fa->fa_off, PM_S1_ADDRESS);
max_addr = MAX((pri_fa->fa_off + pri_fa->fa_size), (PM_S1_ADDRESS + PM_S1_SIZE));
#endif
#else
min_addr = pri_fa->fa_off;
max_addr = pri_fa->fa_off + pri_fa->fa_size;

BOOT_LOG_DBG("Image %d is application MCBoot image", BOOT_CURR_IMG(state));

/* If not checking the MCUboot image, then we leave the original
* min/max assignments from the primary slot read. */
#if CHECK_MCUBOOT_IMAGE == 1
min_addr = MIN(min_addr, NCS_VARIANT_SLOT_MIN_ADDR);
max_addr = MAX(max_addr, NCS_VARIANT_SLOT_MAX_ADDR);
#endif
check_addresses = true;
}
#endif
#endif /* CONFIG_PARTITION_MANAGER_ENABLED */

if (check_addresses == true && (reset_value < min_addr || reset_value > max_addr)) {
BOOT_LOG_DBG("Check 0x%x is within [min_addr, max_addr] = [0x%x, 0x%x)",
internal_img_addr, min_addr, max_addr);
if (internal_img_addr < min_addr || internal_img_addr >= max_addr) {
BOOT_LOG_ERR("Reset address of image in secondary slot is not in the primary slot");
BOOT_LOG_ERR("Erasing image from secondary slot");

Expand All @@ -1232,6 +1272,7 @@ boot_validate_slot(struct boot_loader_state *state, int slot,
fih_rc = FIH_NO_BOOTABLE_IMAGE;
goto out;
}
LOG_DBG("Image %d validation OK", BOOT_CURR_IMG(state));
}
#endif

Expand Down Expand Up @@ -1435,6 +1476,18 @@ static inline void sec_slot_cleanup_if_unusable(void)
#endif /* defined(CONFIG_MCUBOOT_CLEANUP_UNUSABLE_SECONDARY) &&\
defined(PM_S1_ADDRESS) || defined(CONFIG_SOC_NRF5340_CPUAPP) */

#define IS_IN_RANGE_CPUNET_APP_ADDR(_addr) (((_addr) >= PM_CPUNET_APP_ADDRESS) && ((_addr) < PM_CPUNET_APP_END_ADDRESS))
#define _IS_IN_RANGE_S_VARIANT_ADDR(_addr, x) (((_addr) >= PM_S##x##_ADDRESS) && ((_addr) <= (PM_S##x##_ADDRESS + PM_S##x##_SIZE)))
#if defined(CONFIG_NCS_IS_VARIANT_IMAGE)
#define IS_IN_RANGE_S_ALTERNATE_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 0)
#define IS_IN_RANGE_S_CURRENT_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 1)
#else
#define IS_IN_RANGE_S_ALTERNATE_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 1)
#define IS_IN_RANGE_S_CURRENT_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 0)
#endif
#define IS_IN_RANGE_IMAGE_ADDR(_addr, _fa) \
(((_addr) >= flash_area_get_off(_fa)) && (_addr) < (flash_area_get_off(_fa) + flash_area_get_size(_fa)))

/**
* Determines which swap operation to perform, if any. If it is determined
* that a swap operation is required, the image in the secondary slot is checked
Expand All @@ -1458,8 +1511,9 @@ boot_validated_swap_type(struct boot_loader_state *state,
const struct flash_area *secondary_fa =
BOOT_IMG_AREA(state, BOOT_SLOT_SECONDARY);
struct image_header *hdr = boot_img_hdr(state, BOOT_SLOT_SECONDARY);
uint32_t reset_addr = 0;
uint32_t internal_img_addr = 0; /* either the reset handler addres or the image beginning addres */
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

few place it needs correcting

int rc = 0;

/* Patch needed for NCS. Since image 0 (the app) and image 1 (the other
* B1 slot S0 or S1) share the same secondary slot, we need to check
* whether the update candidate in the secondary slot is intended for
Expand All @@ -1469,18 +1523,22 @@ boot_validated_swap_type(struct boot_loader_state *state,
*/

if (hdr->ih_magic == IMAGE_MAGIC) {
#ifdef CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS
internal_img_addr = hdr->ih_load_addr;
#else
rc = flash_area_read(secondary_fa, hdr->ih_hdr_size +
sizeof(uint32_t), &reset_addr,
sizeof(reset_addr));
sizeof(uint32_t), &internal_img_addr,
sizeof(internal_img_addr));
if (rc != 0) {
return BOOT_SWAP_TYPE_FAIL;
}
#endif /* CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS */

sec_slot_touch(state);

#ifdef PM_S1_ADDRESS
#ifdef PM_CPUNET_B0N_ADDRESS
if(!(reset_addr >= PM_CPUNET_APP_ADDRESS && reset_addr < PM_CPUNET_APP_END_ADDRESS))
if(!IS_IN_RANGE_CPUNET_APP_ADDR(internal_img_addr))
#endif
{
const struct flash_area *primary_fa;
Expand All @@ -1492,11 +1550,7 @@ boot_validated_swap_type(struct boot_loader_state *state,
}

/* Check start and end of primary slot for current image */
#if (CONFIG_NCS_IS_VARIANT_IMAGE)
if (reset_addr >= PM_S0_ADDRESS && reset_addr <= (PM_S0_ADDRESS + PM_S0_SIZE)) {
#else
if (reset_addr >= PM_S1_ADDRESS && reset_addr <= (PM_S1_ADDRESS + PM_S1_SIZE)) {
#endif
if (IS_IN_RANGE_S_ALTERNATE_ADDR(internal_img_addr)) {
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_APPLICATION_IMAGE_NUMBER) {
/* This is not the s0/s1 upgrade image but the application image, pretend
* there is no image so the NSIB update can be loaded
Expand All @@ -1505,18 +1559,14 @@ boot_validated_swap_type(struct boot_loader_state *state,
}

owner_nsib[BOOT_CURR_IMG(state)] = true;
#if (CONFIG_NCS_IS_VARIANT_IMAGE)
} else if (reset_addr >= PM_S1_ADDRESS && reset_addr <= (PM_S1_ADDRESS + PM_S1_SIZE)) {
#else
} else if (reset_addr >= PM_S0_ADDRESS && reset_addr <= (PM_S0_ADDRESS + PM_S0_SIZE)) {
#endif
} else if (IS_IN_RANGE_S_CURRENT_ADDR(internal_img_addr)) {
/* NSIB upgrade but for the wrong slot, must be erased */
BOOT_LOG_ERR("Image in slot is for wrong s0/s1 image");
flash_area_erase(secondary_fa, 0, secondary_fa->fa_size);
sec_slot_untouch(state);
BOOT_LOG_ERR("Cleaned-up secondary slot of image %d", BOOT_CURR_IMG(state));
return BOOT_SWAP_TYPE_FAIL;
} else if (reset_addr < primary_fa->fa_off || reset_addr > (primary_fa->fa_off + primary_fa->fa_size)) {
} else if (!IS_IN_RANGE_IMAGE_ADDR(internal_img_addr, primary_fa)) {
/* The image in the secondary slot is not intended for any */
return BOOT_SWAP_TYPE_NONE;
}
Expand Down Expand Up @@ -1553,8 +1603,7 @@ boot_validated_swap_type(struct boot_loader_state *state,
* update and indicate to the caller of this function that no update is
* available
*/
if (upgrade_valid && reset_addr >= PM_CPUNET_APP_ADDRESS &&
reset_addr < PM_CPUNET_APP_END_ADDRESS) {
if (upgrade_valid && IS_IN_RANGE_CPUNET_APP_ADDR(internal_img_addr)) {
struct image_header *hdr = (struct image_header *)secondary_fa->fa_off;
uint32_t vtable_addr = (uint32_t)hdr + hdr->ih_hdr_size;
uint32_t *net_core_fw_addr = (uint32_t *)(vtable_addr);
Expand Down
10 changes: 9 additions & 1 deletion boot/zephyr/Kconfig
Original file line number Diff line number Diff line change
Expand Up @@ -1398,10 +1398,18 @@ config NRF_MCUBOOT_BOOT_REQUEST
bool
imply FIND_NEXT_SLOT_HOOKS if BOOT_DIRECT_XIP || BOOT_RAM_LOAD

config MCUBOOT_USE_CHECK_LOAD_ADDRESS
bool "Use load address to verify application is in proper slot"
help
The bootloader will use the load address, from the image header,
to verify that binary is in slot designated for its execution.
When not selected reset vector, read from image, is used for
the same purpose.

config MCUBOOT_VERIFY_IMG_ADDRESS
bool "Verify reset address of image in secondary slot"
depends on UPDATEABLE_IMAGE_NUMBER > 1
depends on !BOOT_ENCRYPT_IMAGE
depends on !BOOT_ENCRYPT_IMAGE || MCUBOOT_USE_CHECK_LOAD_ADDRESS
depends on ARM
default y if BOOT_UPGRADE_ONLY
help
Expand Down