-
Notifications
You must be signed in to change notification settings - Fork 238
[wip] [nrf noup] boot/bootutil/loader: image discovery by ih_load_address #461
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
nvlsianpu
wants to merge
1
commit into
nrfconnect:main
Choose a base branch
from
nvlsianpu:img_disc_by_load_addr
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -84,6 +84,29 @@ int pcd_version_cmp_net(const struct flash_area *fap, struct image_header *hdr); | |
#include "bootutil/key_revocation.h" | ||
#endif | ||
|
||
#ifdef CONFIG_PARTITION_MANAGER_ENABLED | ||
#define THREE_CAT_(a, b, c) (a##b##c) | ||
#define THREE_CAT(a, b, c) THREE_CAT_(a, b, c) | ||
|
||
#ifdef CONFIG_NCS_IS_VARIANT_IMAGE | ||
/* Running from slot 1, checking slot 0 */ | ||
#define NCS_VARIANT_SLOT_ID 0 | ||
#else /* CONFIG_NCS_IS_VARIANT_IMAGE */ | ||
/* Running from slot 0, checking slot 1 */ | ||
#define NCS_VARIANT_SLOT_ID 1 | ||
#endif /* CONFIG_NCS_IS_VARIANT_IMAGE */ | ||
|
||
#define NCS_VARIANT_SLOT_MIN_ADDR THREE_CAT(PM_S, NCS_VARIANT_SLOT_ID, _ADDRESS) | ||
#define NCS_VARIANT_SLOT_MAX_ADDR ((NCS_VARIANT_SLOT_MIN_ADDR) + THREE_CAT(PM_S, NCS_VARIANT_SLOT_ID, _SIZE)) | ||
|
||
#if CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER == -1 | ||
#define CHECK_MCUBOOT_IMAGE 0 | ||
#else | ||
#define CHECK_MCUBOOT_IMAGE 1 | ||
#endif | ||
|
||
#endif /* CONFIG_PARTITION_MANAGER_ENABLED */ | ||
|
||
BOOT_LOG_MODULE_DECLARE(mcuboot); | ||
|
||
static struct boot_loader_state boot_data; | ||
|
@@ -1150,12 +1173,15 @@ boot_validate_slot(struct boot_loader_state *state, int slot, | |
goto out; | ||
} | ||
|
||
#if MCUBOOT_IMAGE_NUMBER > 1 && !defined(MCUBOOT_ENC_IMAGES) && defined(MCUBOOT_VERIFY_IMG_ADDRESS) | ||
#if MCUBOOT_IMAGE_NUMBER > 1 && \ | ||
(!defined(MCUBOOT_ENC_IMAGES) || defined(CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS)) && \ | ||
defined(MCUBOOT_VERIFY_IMG_ADDRESS) | ||
/* Verify that the image in the secondary slot has a reset address | ||
* located in the primary slot. This is done to avoid users incorrectly | ||
* overwriting an application written to the incorrect slot. | ||
* This feature is only supported by ARM platforms. | ||
*/ | ||
|
||
#if MCUBOOT_IMAGE_NUMBER >= 3 | ||
/* Currently the MCUboot can be configured for up to 3 image, where image number 2 is | ||
* designated for XIP, where it is the second part of image stored in slots of image | ||
|
@@ -1167,58 +1193,72 @@ boot_validate_slot(struct boot_loader_state *state, int slot, | |
} | ||
#endif | ||
if (fap == BOOT_IMG_AREA(state, BOOT_SLOT_SECONDARY)) { | ||
const struct flash_area *pri_fa = BOOT_IMG_AREA(state, BOOT_SLOT_PRIMARY); | ||
struct image_header *secondary_hdr = boot_img_hdr(state, slot); | ||
uint32_t reset_value = 0; | ||
uint32_t reset_addr = secondary_hdr->ih_hdr_size + sizeof(reset_value); | ||
uint32_t min_addr, max_addr; | ||
bool check_addresses = false; | ||
uint32_t internal_img_addr = 0; /* either the reset handler addres or the image beginning addres */ | ||
uint32_t min_addr; | ||
uint32_t max_addr; | ||
|
||
if (flash_area_read(fap, reset_addr, &reset_value, sizeof(reset_value)) != 0) { | ||
min_addr = flash_area_get_off(BOOT_IMG_AREA(state, BOOT_SLOT_PRIMARY)); | ||
max_addr = flash_area_get_size(BOOT_IMG_AREA(state, BOOT_SLOT_PRIMARY)) + min_addr; | ||
|
||
#ifdef CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS | ||
internal_img_addr = secondary_hdr->ih_load_addr; | ||
#else | ||
const uint32_t offset = secondary_hdr->ih_hdr_size + sizeof(internal_img_addr); | ||
BOOT_LOG_DBG("Getting image %d internal addr from offset %d", | ||
BOOT_CURR_IMG(state), offset); | ||
/* Read reset vector from ARM vector table */ | ||
if (flash_area_read(fap, offset, &internal_img_addr, sizeof(internal_img_addr)) != 0) { | ||
BOOT_LOG_ERR("Failed to read image load address", BOOT_CURR_IMG(state)); | ||
fih_rc = FIH_NO_BOOTABLE_IMAGE; | ||
goto out; | ||
} | ||
#endif | ||
BOOT_LOG_DBG("Image %d expected load address 0x%x", BOOT_CURR_IMG(state), internal_img_addr); | ||
|
||
#ifdef PM_CPUNET_APP_ADDRESS | ||
#ifdef CONFIG_PARTITION_MANAGER_ENABLED | ||
/* The primary slot for the network core is emulated in RAM. | ||
* Its flash_area hasn't got relevant boundaries. | ||
* Therfore need to override its boundaries for the check. | ||
*/ | ||
#ifdef PM_CPUNET_APP_ADDRESS | ||
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_NETWORK_CORE_IMAGE_NUMBER) { | ||
|
||
BOOT_LOG_DBG("Image %d is NETCORE image", BOOT_CURR_IMG(state)); | ||
|
||
min_addr = PM_CPUNET_APP_ADDRESS; | ||
max_addr = PM_CPUNET_APP_ADDRESS + PM_CPUNET_APP_SIZE; | ||
check_addresses = true; | ||
} else | ||
#endif | ||
#if CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER != -1 | ||
} | ||
#endif /* PM_CPUNET_APP_SIZE */ | ||
|
||
#if CHECK_MCUBOOT_IMAGE == 1 | ||
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER) { | ||
#if (CONFIG_NCS_IS_VARIANT_IMAGE) | ||
min_addr = PM_S0_ADDRESS; | ||
max_addr = (PM_S0_ADDRESS + PM_S0_SIZE); | ||
#else | ||
min_addr = PM_S1_ADDRESS; | ||
max_addr = (PM_S1_ADDRESS + PM_S1_SIZE); | ||
#endif | ||
check_addresses = true; | ||
} else | ||
#endif | ||
|
||
BOOT_LOG_DBG("Image %d is another stage MCBoot image", BOOT_CURR_IMG(state)); | ||
|
||
min_addr = NCS_VARIANT_SLOT_MIN_ADDR; | ||
max_addr = NCS_VARIANT_SLOT_MAX_ADDR; | ||
} | ||
#endif /* CHECK_MCUBOOT_IMAGE */ | ||
|
||
#if CONFIG_MCUBOOT_APPLICATION_IMAGE_NUMBER != -1 | ||
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_APPLICATION_IMAGE_NUMBER) { | ||
#if CONFIG_MCUBOOT_MCUBOOT_IMAGE_NUMBER != -1 | ||
#if (CONFIG_NCS_IS_VARIANT_IMAGE) | ||
min_addr = MIN(pri_fa->fa_off, PM_S0_ADDRESS); | ||
max_addr = MAX((pri_fa->fa_off + pri_fa->fa_size), (PM_S0_ADDRESS + PM_S0_SIZE)); | ||
#else | ||
min_addr = MIN(pri_fa->fa_off, PM_S1_ADDRESS); | ||
max_addr = MAX((pri_fa->fa_off + pri_fa->fa_size), (PM_S1_ADDRESS + PM_S1_SIZE)); | ||
#endif | ||
#else | ||
min_addr = pri_fa->fa_off; | ||
max_addr = pri_fa->fa_off + pri_fa->fa_size; | ||
|
||
BOOT_LOG_DBG("Image %d is application MCBoot image", BOOT_CURR_IMG(state)); | ||
|
||
/* If not checking the MCUboot image, then we leave the original | ||
* min/max assignments from the primary slot read. */ | ||
#if CHECK_MCUBOOT_IMAGE == 1 | ||
min_addr = MIN(min_addr, NCS_VARIANT_SLOT_MIN_ADDR); | ||
max_addr = MAX(max_addr, NCS_VARIANT_SLOT_MAX_ADDR); | ||
#endif | ||
check_addresses = true; | ||
} | ||
#endif | ||
#endif /* CONFIG_PARTITION_MANAGER_ENABLED */ | ||
|
||
if (check_addresses == true && (reset_value < min_addr || reset_value > max_addr)) { | ||
BOOT_LOG_DBG("Check 0x%x is within [min_addr, max_addr] = [0x%x, 0x%x)", | ||
internal_img_addr, min_addr, max_addr); | ||
if (internal_img_addr < min_addr || internal_img_addr >= max_addr) { | ||
BOOT_LOG_ERR("Reset address of image in secondary slot is not in the primary slot"); | ||
BOOT_LOG_ERR("Erasing image from secondary slot"); | ||
|
||
|
@@ -1232,6 +1272,7 @@ boot_validate_slot(struct boot_loader_state *state, int slot, | |
fih_rc = FIH_NO_BOOTABLE_IMAGE; | ||
goto out; | ||
} | ||
LOG_DBG("Image %d validation OK", BOOT_CURR_IMG(state)); | ||
} | ||
#endif | ||
|
||
|
@@ -1435,6 +1476,18 @@ static inline void sec_slot_cleanup_if_unusable(void) | |
#endif /* defined(CONFIG_MCUBOOT_CLEANUP_UNUSABLE_SECONDARY) &&\ | ||
defined(PM_S1_ADDRESS) || defined(CONFIG_SOC_NRF5340_CPUAPP) */ | ||
|
||
#define IS_IN_RANGE_CPUNET_APP_ADDR(_addr) (((_addr) >= PM_CPUNET_APP_ADDRESS) && ((_addr) < PM_CPUNET_APP_END_ADDRESS)) | ||
#define _IS_IN_RANGE_S_VARIANT_ADDR(_addr, x) (((_addr) >= PM_S##x##_ADDRESS) && ((_addr) <= (PM_S##x##_ADDRESS + PM_S##x##_SIZE))) | ||
#if defined(CONFIG_NCS_IS_VARIANT_IMAGE) | ||
#define IS_IN_RANGE_S_ALTERNATE_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 0) | ||
#define IS_IN_RANGE_S_CURRENT_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 1) | ||
#else | ||
#define IS_IN_RANGE_S_ALTERNATE_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 1) | ||
#define IS_IN_RANGE_S_CURRENT_ADDR(_addr) _IS_IN_RANGE_S_VARIANT_ADDR(_addr, 0) | ||
#endif | ||
#define IS_IN_RANGE_IMAGE_ADDR(_addr, _fa) \ | ||
(((_addr) >= flash_area_get_off(_fa)) && (_addr) < (flash_area_get_off(_fa) + flash_area_get_size(_fa))) | ||
|
||
/** | ||
* Determines which swap operation to perform, if any. If it is determined | ||
* that a swap operation is required, the image in the secondary slot is checked | ||
|
@@ -1458,8 +1511,9 @@ boot_validated_swap_type(struct boot_loader_state *state, | |
const struct flash_area *secondary_fa = | ||
BOOT_IMG_AREA(state, BOOT_SLOT_SECONDARY); | ||
struct image_header *hdr = boot_img_hdr(state, BOOT_SLOT_SECONDARY); | ||
uint32_t reset_addr = 0; | ||
uint32_t internal_img_addr = 0; /* either the reset handler addres or the image beginning addres */ | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. few place it needs correcting |
||
int rc = 0; | ||
|
||
/* Patch needed for NCS. Since image 0 (the app) and image 1 (the other | ||
* B1 slot S0 or S1) share the same secondary slot, we need to check | ||
* whether the update candidate in the secondary slot is intended for | ||
|
@@ -1469,18 +1523,22 @@ boot_validated_swap_type(struct boot_loader_state *state, | |
*/ | ||
|
||
if (hdr->ih_magic == IMAGE_MAGIC) { | ||
#ifdef CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS | ||
internal_img_addr = hdr->ih_load_addr; | ||
#else | ||
rc = flash_area_read(secondary_fa, hdr->ih_hdr_size + | ||
sizeof(uint32_t), &reset_addr, | ||
sizeof(reset_addr)); | ||
sizeof(uint32_t), &internal_img_addr, | ||
sizeof(internal_img_addr)); | ||
if (rc != 0) { | ||
return BOOT_SWAP_TYPE_FAIL; | ||
} | ||
#endif /* CONFIG_MCUBOOT_USE_CHECK_LOAD_ADDRESS */ | ||
|
||
sec_slot_touch(state); | ||
|
||
#ifdef PM_S1_ADDRESS | ||
#ifdef PM_CPUNET_B0N_ADDRESS | ||
if(!(reset_addr >= PM_CPUNET_APP_ADDRESS && reset_addr < PM_CPUNET_APP_END_ADDRESS)) | ||
if(!IS_IN_RANGE_CPUNET_APP_ADDR(internal_img_addr)) | ||
#endif | ||
{ | ||
const struct flash_area *primary_fa; | ||
|
@@ -1492,11 +1550,7 @@ boot_validated_swap_type(struct boot_loader_state *state, | |
} | ||
|
||
/* Check start and end of primary slot for current image */ | ||
#if (CONFIG_NCS_IS_VARIANT_IMAGE) | ||
if (reset_addr >= PM_S0_ADDRESS && reset_addr <= (PM_S0_ADDRESS + PM_S0_SIZE)) { | ||
#else | ||
if (reset_addr >= PM_S1_ADDRESS && reset_addr <= (PM_S1_ADDRESS + PM_S1_SIZE)) { | ||
#endif | ||
if (IS_IN_RANGE_S_ALTERNATE_ADDR(internal_img_addr)) { | ||
if (BOOT_CURR_IMG(state) == CONFIG_MCUBOOT_APPLICATION_IMAGE_NUMBER) { | ||
/* This is not the s0/s1 upgrade image but the application image, pretend | ||
* there is no image so the NSIB update can be loaded | ||
|
@@ -1505,18 +1559,14 @@ boot_validated_swap_type(struct boot_loader_state *state, | |
} | ||
|
||
owner_nsib[BOOT_CURR_IMG(state)] = true; | ||
#if (CONFIG_NCS_IS_VARIANT_IMAGE) | ||
} else if (reset_addr >= PM_S1_ADDRESS && reset_addr <= (PM_S1_ADDRESS + PM_S1_SIZE)) { | ||
#else | ||
} else if (reset_addr >= PM_S0_ADDRESS && reset_addr <= (PM_S0_ADDRESS + PM_S0_SIZE)) { | ||
#endif | ||
} else if (IS_IN_RANGE_S_CURRENT_ADDR(internal_img_addr)) { | ||
/* NSIB upgrade but for the wrong slot, must be erased */ | ||
BOOT_LOG_ERR("Image in slot is for wrong s0/s1 image"); | ||
flash_area_erase(secondary_fa, 0, secondary_fa->fa_size); | ||
sec_slot_untouch(state); | ||
BOOT_LOG_ERR("Cleaned-up secondary slot of image %d", BOOT_CURR_IMG(state)); | ||
return BOOT_SWAP_TYPE_FAIL; | ||
} else if (reset_addr < primary_fa->fa_off || reset_addr > (primary_fa->fa_off + primary_fa->fa_size)) { | ||
} else if (!IS_IN_RANGE_IMAGE_ADDR(internal_img_addr, primary_fa)) { | ||
/* The image in the secondary slot is not intended for any */ | ||
return BOOT_SWAP_TYPE_NONE; | ||
} | ||
|
@@ -1553,8 +1603,7 @@ boot_validated_swap_type(struct boot_loader_state *state, | |
* update and indicate to the caller of this function that no update is | ||
* available | ||
*/ | ||
if (upgrade_valid && reset_addr >= PM_CPUNET_APP_ADDRESS && | ||
reset_addr < PM_CPUNET_APP_END_ADDRESS) { | ||
if (upgrade_valid && IS_IN_RANGE_CPUNET_APP_ADDR(internal_img_addr)) { | ||
struct image_header *hdr = (struct image_header *)secondary_fa->fa_off; | ||
uint32_t vtable_addr = (uint32_t)hdr + hdr->ih_hdr_size; | ||
uint32_t *net_core_fw_addr = (uint32_t *)(vtable_addr); | ||
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
*address