FWU Metadata partition protection
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-08-23 5:52 AM - edited ‎2024-08-23 5:53 AM
Hi,
I'm looking at the wic file for STM32MP13 and see two metadata partitions for ATF firmware update. I'm wondering how are these partitions secured from access / modifications from non-trusted world? Since write (and optionally read) operation should only be performed from secure world what is the mechanism that prevents doing this from non secure world? Is there any? If so, how is this configured? I'm also curious whether the same mechanism applies to STM32MP2
- Labels:
-
STM32MP13 Lines
-
STM32MP25 Lines
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-08-26 2:33 AM
Hello @pp2,
metadata partitions are not secured, so that the firmware update agent running on linux is able to write boot options into it, and TF-A is able to read them.
BR,
Christophe
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-08-26 2:56 AM
Thanks, how about fip-a and fip-b partitions then? Are they also fully accessible from non-secure world? Because from what I understand these partitions should be updated from secure-world only, so are they protected somehow from modifications originated from non-secure world?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
‎2024-08-28 12:43 AM
Hello @pp2,
With OpenSTLinux distribution, fip-a and fip-b are accessible from non-secure world (for the same reason as metadata).
On a final product, I would recommand to tune linux permissions to forbid user to access to these partitions.
To ensure fip paritition integrity on boot, using secure boot could be an option.
BR,
Christophe
