Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mgmt: mcumgr: handle merged TF-M applications #77972

Open
JordanYates opened this issue Sep 4, 2024 · 6 comments · May be fixed by #84967
Open

mgmt: mcumgr: handle merged TF-M applications #77972

JordanYates opened this issue Sep 4, 2024 · 6 comments · May be fixed by #84967
Assignees
Labels
area: mcumgr area: TF-M ARM Trusted Firmware-M (TF-M) Enhancement Changes/Updates/Additions to existing features

Comments

@JordanYates
Copy link
Collaborator

Is your enhancement proposal related to a problem? Please describe.

The current image management implementation cannot handle TF-M applications that use a merged secure and non-secure application from the perspective of the bootloader (TFM_MCUBOOT_IMAGE_NUMBER == 1).

The flash area logic only refer to the secure partitions:

#define SLOT0_PARTITION slot0_partition
#define SLOT1_PARTITION slot1_partition
#define SLOT2_PARTITION slot2_partition
#define SLOT3_PARTITION slot3_partition
#define SLOT4_PARTITION slot4_partition
#define SLOT5_PARTITION slot5_partition

&flash0 {
partitions {
compatible = "fixed-partitions";
#address-cells = <1>;
#size-cells = <1>;
boot_partition: partition@0 {
label = "mcuboot";
reg = <0x00000000 0x10000>;
};
slot0_partition: partition@10000 {
label = "image-0";
};
slot0_ns_partition: partition@50000 {
label = "image-0-nonsecure";
};
slot1_partition: partition@85000 {
label = "image-1";
};
slot1_ns_partition: partition@c5000 {
label = "image-1-nonsecure";
};
storage_partition: partition@fa000 {
label = "storage";
reg = <0x000fa000 0x00006000>;
};
};
};

This results in the mcumgr commands trying to read the image header from the start of the secure flash (correct, but currently triggers a SecureFault) and the image trailer from the end of secure flash (incorrect, also triggers a SecureFault).

Describe the solution you'd like

The image management handlers should be updated to pull information from the correct flash areas (distinct from the slot ID) when built with TFM. This breaks the current assumptions that a single slot ID has a single corresponding flash area ID.

@JordanYates JordanYates added Enhancement Changes/Updates/Additions to existing features area: mcumgr area: TF-M ARM Trusted Firmware-M (TF-M) labels Sep 4, 2024
@nordicjm
Copy link
Collaborator

nordicjm commented Sep 4, 2024

Not sure I fully understand the bug, the image you want to upload that is merged, is that one contagious area with just one MCUboot header/trailer/signature for the whole area, or 2? If it is 2, you cannot upload it as a single file. Or do you mean that the _ns partitions are not used by MCUmgr?

@JordanYates
Copy link
Collaborator Author

The image is one contiguous area, with a single header and trailer. In essence, slot0_partition + slot0_ns_partition (as required by TFM_MCUBOOT_IMAGE_NUMBER == 1).
But, based on the devicetree partitioning, all the flash area operations are on the flash area corresponding with slot0_partition.
Hopefully it is obvious why any image operations would fail given that.

In fact I suspect (but have not tested) that this is broken for TFM_MCUBOOT_IMAGE_NUMBER == 2 as well, given that it is looking at the secure partition, not the non-secure partition.

@nordicjm nordicjm added this to mcumgr Sep 4, 2024
@github-project-automation github-project-automation bot moved this to To do in mcumgr Sep 4, 2024
@nordicjm nordicjm self-assigned this Sep 4, 2024
@JordanYates
Copy link
Collaborator Author

My plan on resolving this downstream is to tweak how the partitions are defined so that mcumgr gets a handle to the complete flash area, while still preserving the secure/nonsecure partitioning for other tooling:

		slot0_partition: partition@10000 {
			label = "image-0";
			reg = <0x00010000 0x000F0000>;
		};
		slot0_s_partition: subpartition@10000 {
			label = "image-0-secure";
			reg = <0x00010000 0x00030000>;
		};
		slot0_ns_partition: subpartition@40000 {
			label = "image-0-nonsecure";
			reg = <0x00040000 0xC0000>;
		};

The subpartition node name is required to avoid defining two nodes with the same name (partition@10000).
Note this sort of change would be made much easier upstream with #74707 (Which I note you have approved 👍).

@de-nordic
Copy link
Collaborator

I think we should separate partitioning from board definitions and provide something like partitioning profiles, for example: default, mcuboot and tfm, that would be given to a build as an option.

@JordanYates
Copy link
Collaborator Author

I think we should separate partitioning from board definitions and provide something like partitioning profiles, for example: default, mcuboot and tfm, that would be given to a build as an option.

Where would these profiles live, and how would they handle a secondary image that lives on external flash?

@de-nordic
Copy link
Collaborator

Where would these profiles live, and how would they handle a secondary image that lives on external flash?

I had two ideas for that, one was that every board defines these profiles that it is supposed to work with, as overlays - probably a lot of work.
Second was to define a templates for them and boards would have configurations for templates.

I have already off-line talk with @nordicjm regarding above and see how hard that would be to implement.

One of the reasons I wanted to have at least the mcuboot and default profile was so that both mcuboot and non-mcuboot builds would use zephyr,code-partition selected partition, but it's definition would just change; this would solve the problem where mcuboot build of an app is aware of how it is limited to a certain partition, while non-mcuboot builds ignore partitioning and can span into other partitions, like storage.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area: mcumgr area: TF-M ARM Trusted Firmware-M (TF-M) Enhancement Changes/Updates/Additions to existing features
Projects
Status: To do
Development

Successfully merging a pull request may close this issue.

3 participants