Boot: Add 'revert' support to direct-xip mode
The 'revert' mechanism in direct-xip is similar to the one in swap mode.
It requires the trailer magic to be added to the signed image. When a
reboot happens without the image being confirmed at runtime (without the
image_ok flag being set), the bootloader considers the image faulty and
erases it. After this it will attempt to boot the previous image
instead. The images can also be made permanent (marked as confirmed in
advance) just like in swap mode.
Change-Id: Ibde9361d4a7302dd8efbb277b691b71eca0ca877
Signed-off-by: David Vincze <david.vincze@linaro.org>
diff --git a/boot/bootutil/src/loader.c b/boot/bootutil/src/loader.c
index 431f4dd..b81a7ce 100644
--- a/boot/bootutil/src/loader.c
+++ b/boot/bootutil/src/loader.c
@@ -2047,6 +2047,75 @@
return image_cnt;
}
+#ifdef MCUBOOT_DIRECT_XIP_REVERT
+/**
+ * Checks whether the image in the given slot was previously selected to run.
+ * Erases the image if it was selected but its execution failed, otherwise marks
+ * it as selected if it has not been before.
+ *
+ * @param state Image metadata from the image trailer. This function fills
+ * this struct with the data read from the image trailer.
+ * @param slot Image slot number.
+ *
+ * @return 0 on success; nonzero on failure.
+ */
+static int
+boot_select_or_erase(struct boot_swap_state *state, uint32_t slot)
+{
+ const struct flash_area *fap;
+ int fa_id;
+ int rc;
+
+ fa_id = flash_area_id_from_image_slot(slot);
+ rc = flash_area_open(fa_id, &fap);
+ assert(rc == 0);
+
+ memset(state, 0, sizeof(struct boot_swap_state));
+ rc = boot_read_swap_state(fap, state);
+ assert(rc == 0);
+
+ if (state->magic != BOOT_MAGIC_GOOD ||
+ (state->copy_done == BOOT_FLAG_SET &&
+ state->image_ok != BOOT_FLAG_SET)) {
+ /*
+ * A reboot happened without the image being confirmed at
+ * runtime or its trailer is corrupted/invalid. Erase the image
+ * to prevent it from being selected again on the next reboot.
+ */
+ BOOT_LOG_DBG("Erasing faulty image in the %s slot.",
+ (slot == BOOT_PRIMARY_SLOT) ? "primary" : "secondary");
+ rc = flash_area_erase(fap, 0, fap->fa_size);
+ assert(rc == 0);
+
+ flash_area_close(fap);
+ rc = -1;
+ } else {
+ if (state->copy_done != BOOT_FLAG_SET) {
+ if (state->copy_done == BOOT_FLAG_BAD) {
+ BOOT_LOG_DBG("The copy_done flag had an unexpected value. Its "
+ "value was neither 'set' nor 'unset', but 'bad'.");
+ }
+ /*
+ * Set the copy_done flag, indicating that the image has been
+ * selected to boot. It can be set in advance, before even
+ * validating the image, because in case the validation fails, the
+ * entire image slot will be erased (including the trailer).
+ */
+ rc = boot_write_copy_done(fap);
+ if (rc != 0) {
+ BOOT_LOG_WRN("Failed to set copy_done flag of the image in "
+ "the %s slot.", (slot == BOOT_PRIMARY_SLOT) ?
+ "primary" : "secondary");
+ rc = 0;
+ }
+ }
+ flash_area_close(fap);
+ }
+
+ return rc;
+}
+#endif /* MCUBOOT_DIRECT_XIP_REVERT */
+
#ifdef MCUBOOT_RAM_LOAD
#if !defined(IMAGE_EXECUTABLE_RAM_START) || !defined(IMAGE_EXECUTABLE_RAM_SIZE)
@@ -2207,6 +2276,9 @@
uint32_t img_sz;
uint32_t img_loaded = 0;
#endif /* MCUBOOT_RAM_LOAD */
+#ifdef MCUBOOT_DIRECT_XIP_REVERT
+ struct boot_swap_state slot_state;
+#endif /* MCUBOOT_DIRECT_XIP_REVERT */
fih_int fih_rc = FIH_FAILURE;
memset(state, 0, sizeof(struct boot_loader_state));
@@ -2234,7 +2306,6 @@
/* Select the newest and valid image. */
for (i = 0; i < img_cnt; i++) {
selected_slot = 0;
- selected_image_header = NULL;
/* Iterate over all the slots that are in use (contain an image)
* and select the one that holds the newest image.
@@ -2257,6 +2328,17 @@
selected_image_header = hdr;
}
}
+
+#ifdef MCUBOOT_DIRECT_XIP_REVERT
+ rc = boot_select_or_erase(&slot_state, selected_slot);
+ if (rc != 0) {
+ /* The selected image slot has been erased. */
+ slot_usage[selected_slot] = 0;
+ selected_image_header = NULL;
+ continue;
+ }
+#endif /* MCUBOOT_DIRECT_XIP_REVERT */
+
#ifdef MCUBOOT_RAM_LOAD
/* Image is first loaded to RAM and authenticated there in order to
* prevent TOCTOU attack during image copy. This could be applied
@@ -2268,6 +2350,8 @@
&img_sz);
if (rc != 0 ) {
/* Image loading failed try the next one. */
+ slot_usage[selected_slot] = 0;
+ selected_image_header = NULL;
continue;
} else {
img_loaded = 1;
@@ -2294,6 +2378,7 @@
* and start over.
*/
slot_usage[selected_slot] = 0;
+ selected_image_header = NULL;
}
if (fih_not_eq(fih_rc, FIH_SUCCESS) || (selected_image_header == NULL)) {
@@ -2305,13 +2390,24 @@
/* Update the stored security counter with the newer (active) image's
* security counter value.
*/
- rc = boot_update_security_counter(0, selected_slot,
- selected_image_header);
- if (rc != 0) {
- BOOT_LOG_ERR("Security counter update failed after image "
- "validation.");
- goto out;
+#ifdef MCUBOOT_DIRECT_XIP_REVERT
+ /* When the 'revert' mechanism is enabled in direct-xip mode, the
+ * security counter can be increased only after reboot, if the image
+ * has been confirmed at runtime (the image_ok flag has been set).
+ * This way a 'revert' can be performed when it's necessary.
+ */
+ if (slot_state.image_ok == BOOT_FLAG_SET) {
+#endif
+ rc = boot_update_security_counter(0, selected_slot,
+ selected_image_header);
+ if (rc != 0) {
+ BOOT_LOG_ERR("Security counter update failed after image "
+ "validation.");
+ goto out;
+ }
+#ifdef MCUBOOT_DIRECT_XIP_REVERT
}
+#endif
#endif /* MCUBOOT_HW_ROLLBACK_PROT */
#ifdef MCUBOOT_MEASURED_BOOT
diff --git a/boot/zephyr/Kconfig b/boot/zephyr/Kconfig
index 3f2374b..1386f5e 100644
--- a/boot/zephyr/Kconfig
+++ b/boot/zephyr/Kconfig
@@ -224,9 +224,18 @@
mode results in a simpler code path and smaller code size.
endchoice
-endif
-if !SINGLE_APPLICATION_SLOT
+config BOOT_DIRECT_XIP_REVERT
+ bool "Enable the revert mechanism in direct-xip mode"
+ default n
+ help
+ If y, enables the revert mechanism in direct-xip similar to the one in
+ swap mode. It requires the trailer magic to be added to the signed image.
+ When a reboot happens without the image being confirmed at runtime, the
+ bootloader considers the image faulty and erases it. After this it will
+ attempt to boot the previous image. The images can also be made permanent
+ (marked as confirmed in advance) just like in swap mode.
+
config BOOT_BOOTSTRAP
bool "Bootstrap erased the primary slot from the secondary slot"
default n
@@ -276,7 +285,7 @@
back when swapping from the primary slot to the secondary slot. The
encryption mechanism used in this case is ECIES using primitives
described under "ECIES-X25519 encryption" in docs/encrypted_images.md.
-endif
+endif # !SINGLE_APPLICATION_SLOT
config BOOT_MAX_IMG_SECTORS
int "Maximum number of sectors per image slot"
diff --git a/boot/zephyr/include/mcuboot_config/mcuboot_config.h b/boot/zephyr/include/mcuboot_config/mcuboot_config.h
index 0ccf36d..4f852be 100644
--- a/boot/zephyr/include/mcuboot_config/mcuboot_config.h
+++ b/boot/zephyr/include/mcuboot_config/mcuboot_config.h
@@ -70,6 +70,10 @@
#define MCUBOOT_DIRECT_XIP
#endif
+#ifdef CONFIG_BOOT_DIRECT_XIP_REVERT
+#define MCUBOOT_DIRECT_XIP_REVERT
+#endif
+
#ifdef CONFIG_UPDATEABLE_IMAGE_NUMBER
#define MCUBOOT_IMAGE_NUMBER CONFIG_UPDATEABLE_IMAGE_NUMBER
#else