Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(142)

Issue 2792009: Fix normal/recovery mode, and RO firmware vs. RW firmware behavior. (Closed)

Created:
10 years, 6 months ago by Luigi Semenzato
Modified:
9 years, 7 months ago
CC:
chromium-os-reviews_chromium.org, dneiss, adlr
Base URL:
ssh://git@chromiumos-git/vboot_reference.git
Visibility:
Public.

Description

Fix normal/recovery mode, and RO firmware vs. RW firmware behavior. BUG: chrome-os-partner: 1154 TEST: none

Patch Set 1 #

Patch Set 2 : shutting down for the move #

Total comments: 2

Patch Set 3 : Clear TPM on transitions into developer mode. #

Patch Set 4 : couple small fixes #

Patch Set 5 : add a comment #

Total comments: 2
Unified diffs Side-by-side diffs Delta from patch set Stats (+150 lines, -101 lines) Patch
M tests/rollback_index_mock.c View 1 2 1 chunk +1 line, -1 line 0 comments Download
M vboot_firmware/include/rollback_index.h View 1 2 3 4 2 chunks +20 lines, -2 lines 1 comment Download
M vboot_firmware/lib/firmware_image_fw.c View 1 2 1 chunk +1 line, -1 line 0 comments Download
M vboot_firmware/lib/include/tss_constants.h View 1 chunk +1 line, -0 lines 0 comments Download
M vboot_firmware/lib/rollback_index.c View 1 2 3 9 chunks +124 lines, -95 lines 0 comments Download
M vboot_firmware/lib/vboot_firmware.c View 1 2 1 chunk +2 lines, -1 line 1 comment Download
M vboot_firmware/linktest/main.c View 1 2 1 chunk +1 line, -1 line 0 comments Download

Messages

Total messages: 9 (0 generated)
Luigi Semenzato
This change follows a clarification from Randall on how we enter recovery mode and what ...
10 years, 6 months ago (2010-06-10 23:39:28 UTC) #1
gauravsh
http://codereview.chromium.org/2792009/diff/3001/4004 File vboot_firmware/lib/rollback_index.c (right): http://codereview.chromium.org/2792009/diff/3001/4004#newcode112 vboot_firmware/lib/rollback_index.c:112: case FIRMWARE_VERSIONS: Is the reason for this part of ...
10 years, 6 months ago (2010-06-11 08:57:24 UTC) #2
Luigi Semenzato
Sorry---I meant to temporarily withdraw the review request. I am in the middle of adding ...
10 years, 6 months ago (2010-06-11 13:49:43 UTC) #3
Luigi Semenzato
In addition to the changes described at the beginning of this thread, I have added ...
10 years, 6 months ago (2010-06-12 00:45:19 UTC) #4
Randall Spangler
On Fri, Jun 11, 2010 at 5:45 PM, <semenzato@chromium.org> wrote: > In addition to the ...
10 years, 6 months ago (2010-06-12 16:19:35 UTC) #5
Luigi Semenzato
On Sat, Jun 12, 2010 at 9:19 AM, Randall Spangler <rspangler@chromium.org> wrote: > I'll look ...
10 years, 6 months ago (2010-06-13 00:39:02 UTC) #6
gauravsh
lgtm http://codereview.chromium.org/2792009/diff/12001/6003 File vboot_firmware/include/rollback_index.h (right): http://codereview.chromium.org/2792009/diff/12001/6003#newcode55 vboot_firmware/include/rollback_index.h:55: uint32_t SetupTPM(int mode, int developer_flag); comment about what ...
10 years, 6 months ago (2010-06-14 10:57:53 UTC) #7
Will Drewry
On Fri, Jun 11, 2010 at 7:45 PM, <semenzato@chromium.org> wrote: > In addition to the ...
10 years, 6 months ago (2010-06-22 15:37:42 UTC) #8
Luigi Semenzato
10 years, 6 months ago (2010-06-22 16:26:37 UTC) #9
On Tue, Jun 22, 2010 at 8:37 AM, Will Drewry <wad@chromium.org> wrote:
> On Fri, Jun 11, 2010 at 7:45 PM,  <semenzato@chromium.org> wrote:
>> In addition to the changes described at the beginning of this thread, I have
>> added code that detects transitions between developer mode and normal mode,
>> and
>> clears the TPM on transitions into developer mode (but not into normal
>> mode).
>>
>
> Thanks for doing this! This might also be the right place to do a
> not-in-use RAM wipe, but Randall will probably have a better opinion
> on that :)
>
>> Actually, shouldn't we clear the TPM on the opposite transition too?
>>
>>  Otherwise
>> someone might return to the store a machine with a TPM owned by him, no?
>
> Yup - also, if the SRK isn't available for use then we won't be able
> to slave keychains off of it, etc and the user will have to go through
> recovery.  Having to go through recovery after devmode use probably
> won't be too uncommon, but it'd be nice to ensure that the TPM is in a
> shiny state when we transition back if we can.

Thank you for confirming this.  The current code clears the TPM on
both transitions.

>> Anyhow: the SetupTPM API changes in this CL, and I fixed the callers so that
>> the
>> code compiles, but nothing else.  These are the changes:
>>
>> 1. There are two parameters, MODE and DEVELOPER_FLAG.  They must be passed
>> accordingly to the boot mode.  (I know---not all combinations are
>> meaningful.)
>>
>> 2. If SetupTPM returns TPM_SUCCESS, the caller may proceed.  If it returns
>> TPM_MUST_REBOOT, the caller must reboot in normal mode.  For all other
>> values,
>> it must reboot in recovery mode.
>>
>> http://codereview.chromium.org/2792009/show
>>
>

Powered by Google App Engine
This is Rietveld 408576698