Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * Functions for loading a kernel from disk. | 5 * Functions for loading a kernel from disk. |
| 6 * (Firmware portion) | 6 * (Firmware portion) |
| 7 */ | 7 */ |
| 8 | 8 |
| 9 #include "vboot_kernel.h" | 9 #include "vboot_kernel.h" |
| 10 | 10 |
| (...skipping 106 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 117 uint64_t part_start, part_size; | 117 uint64_t part_start, part_size; |
| 118 uint64_t blba = params->bytes_per_lba; | 118 uint64_t blba = params->bytes_per_lba; |
| 119 uint64_t kbuf_sectors = KBUF_SIZE / blba; | 119 uint64_t kbuf_sectors = KBUF_SIZE / blba; |
| 120 uint8_t* kbuf = NULL; | 120 uint8_t* kbuf = NULL; |
| 121 int found_partitions = 0; | 121 int found_partitions = 0; |
| 122 int good_partition = -1; | 122 int good_partition = -1; |
| 123 uint16_t tpm_key_version = 0; | 123 uint16_t tpm_key_version = 0; |
| 124 uint16_t tpm_kernel_version = 0; | 124 uint16_t tpm_kernel_version = 0; |
| 125 uint64_t lowest_key_version = 0xFFFF; | 125 uint64_t lowest_key_version = 0xFFFF; |
| 126 uint64_t lowest_kernel_version = 0xFFFF; | 126 uint64_t lowest_kernel_version = 0xFFFF; |
| 127 int is_dev = ((BOOT_FLAG_DEVELOPER & params->boot_flags) && | 127 int is_dev = (BOOT_FLAG_DEVELOPER & params->boot_flags); |
| 128 !(BOOT_FLAG_RECOVERY & params->boot_flags)); | 128 int is_rec = (BOOT_FLAG_RECOVERY & params->boot_flags); |
| 129 int is_normal = (!(BOOT_FLAG_DEVELOPER & params->boot_flags) && | 129 int is_normal = (!is_dev && !is_rec); |
| 130 !(BOOT_FLAG_RECOVERY & params->boot_flags)); | |
| 131 | 130 |
| 132 /* Clear output params in case we fail */ | 131 /* Clear output params in case we fail */ |
| 133 params->partition_number = 0; | 132 params->partition_number = 0; |
| 134 params->bootloader_address = 0; | 133 params->bootloader_address = 0; |
| 135 params->bootloader_size = 0; | 134 params->bootloader_size = 0; |
| 136 | 135 |
| 137 /* Let the TPM know if we're in recovery mode */ | 136 /* Let the TPM know if we're in recovery mode */ |
| 138 if (BOOT_FLAG_RECOVERY & params->boot_flags) { | 137 if (is_rec) { |
| 139 if (0 != RollbackKernelRecovery(BOOT_FLAG_DEVELOPER & params->boot_flags | 138 if (0 != RollbackKernelRecovery(is_dev ? 1 : 0)) { |
|
Luigi Semenzato
2010/06/24 20:18:43
If our convention for booleans is 0 for false, and
| |
| 140 ? 1 : 0)) { | |
| 141 VBDEBUG(("Error setting up TPM for recovery kernel\n")); | 139 VBDEBUG(("Error setting up TPM for recovery kernel\n")); |
| 142 return LOAD_KERNEL_RECOVERY; | 140 /* Ignore return code, since we need to boot recovery mode to |
| 141 * fix the TPM. */ | |
| 143 } | 142 } |
| 144 } | 143 } |
| 145 | 144 |
| 146 if (is_normal) { | 145 if (is_normal) { |
| 147 /* Read current kernel key index from TPM. Assumes TPM is already | 146 /* Read current kernel key index from TPM. Assumes TPM is already |
| 148 * initialized. */ | 147 * initialized. */ |
| 149 if (0 != RollbackKernelRead(&tpm_key_version, &tpm_kernel_version)) { | 148 if (0 != RollbackKernelRead(&tpm_key_version, &tpm_kernel_version)) { |
| 150 VBDEBUG(("Unable to get kernel versions from TPM\n")); | 149 VBDEBUG(("Unable to get kernel versions from TPM\n")); |
| 151 return LOAD_KERNEL_RECOVERY; | 150 return LOAD_KERNEL_RECOVERY; |
| 152 } | 151 } |
| 153 } else if (is_dev) { | 152 } else if (is_dev && !is_rec) { |
| 154 /* In developer mode, we ignore the kernel subkey, and just use | 153 /* In developer mode, we ignore the kernel subkey, and just use |
| 155 * the SHA-512 hash to verify the key block. */ | 154 * the SHA-512 hash to verify the key block. */ |
| 156 kernel_subkey = NULL; | 155 kernel_subkey = NULL; |
| 157 } | 156 } |
| 158 | 157 |
| 159 do { | 158 do { |
| 160 /* Read GPT data */ | 159 /* Read GPT data */ |
| 161 gpt.sector_bytes = (uint32_t)blba; | 160 gpt.sector_bytes = (uint32_t)blba; |
| 162 gpt.drive_sectors = params->ending_lba + 1; | 161 gpt.drive_sectors = params->ending_lba + 1; |
| 163 if (0 != AllocAndReadGptData(&gpt)) { | 162 if (0 != AllocAndReadGptData(&gpt)) { |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 198 | 197 |
| 199 /* Verify the key block */ | 198 /* Verify the key block */ |
| 200 key_block = (VbKeyBlockHeader*)kbuf; | 199 key_block = (VbKeyBlockHeader*)kbuf; |
| 201 if ((0 != KeyBlockVerify(key_block, KBUF_SIZE, kernel_subkey))) { | 200 if ((0 != KeyBlockVerify(key_block, KBUF_SIZE, kernel_subkey))) { |
| 202 VBDEBUG(("Verifying key block failed.\n")); | 201 VBDEBUG(("Verifying key block failed.\n")); |
| 203 continue; | 202 continue; |
| 204 } | 203 } |
| 205 | 204 |
| 206 /* Check the key block flags against the current boot mode */ | 205 /* Check the key block flags against the current boot mode */ |
| 207 if (!(key_block->key_block_flags && | 206 if (!(key_block->key_block_flags && |
| 208 ((BOOT_FLAG_DEVELOPER & params->boot_flags) ? | 207 (is_dev ? KEY_BLOCK_FLAG_DEVELOPER_1 : |
| 209 KEY_BLOCK_FLAG_DEVELOPER_1 : KEY_BLOCK_FLAG_DEVELOPER_0))) { | 208 KEY_BLOCK_FLAG_DEVELOPER_0))) { |
| 210 VBDEBUG(("Developer flag mismatch.\n")); | 209 VBDEBUG(("Developer flag mismatch.\n")); |
| 211 continue; | 210 continue; |
| 212 } | 211 } |
| 213 if (!(key_block->key_block_flags && | 212 if (!(key_block->key_block_flags && |
| 214 ((BOOT_FLAG_RECOVERY & params->boot_flags) ? | 213 (is_rec ? KEY_BLOCK_FLAG_RECOVERY_1 : |
| 215 KEY_BLOCK_FLAG_RECOVERY_1 : KEY_BLOCK_FLAG_RECOVERY_0))) { | 214 KEY_BLOCK_FLAG_RECOVERY_0))) { |
| 216 VBDEBUG(("Recovery flag mismatch.\n")); | 215 VBDEBUG(("Recovery flag mismatch.\n")); |
| 217 continue; | 216 continue; |
| 218 } | 217 } |
| 219 | 218 |
| 220 /* Check for rollback of key version. Note this is implicitly | 219 /* Check for rollback of key version. Note this is implicitly |
| 221 * skipped in recovery and developer modes because those set | 220 * skipped in recovery and developer modes because those set |
| 222 * key_version=0 above. */ | 221 * key_version=0 above. */ |
| 223 key_version = key_block->data_key.key_version; | 222 key_version = key_block->data_key.key_version; |
| 224 if (key_version < tpm_key_version) { | 223 if (key_version < tpm_key_version) { |
| 225 VBDEBUG(("Key version too old.\n")); | 224 VBDEBUG(("Key version too old.\n")); |
| (...skipping 141 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 367 (lowest_key_version == tpm_key_version && | 366 (lowest_key_version == tpm_key_version && |
| 368 lowest_kernel_version > tpm_kernel_version)) { | 367 lowest_kernel_version > tpm_kernel_version)) { |
| 369 if (0 != RollbackKernelWrite((uint16_t)lowest_key_version, | 368 if (0 != RollbackKernelWrite((uint16_t)lowest_key_version, |
| 370 (uint16_t)lowest_kernel_version)) { | 369 (uint16_t)lowest_kernel_version)) { |
| 371 VBDEBUG(("Error writing kernel versions to TPM.\n")); | 370 VBDEBUG(("Error writing kernel versions to TPM.\n")); |
| 372 return LOAD_KERNEL_RECOVERY; | 371 return LOAD_KERNEL_RECOVERY; |
| 373 } | 372 } |
| 374 } | 373 } |
| 375 } | 374 } |
| 376 | 375 |
| 377 /* Lock the kernel versions, since we're about to boot the kernel */ | 376 /* Lock the kernel versions */ |
|
Luigi Semenzato
2010/06/24 20:18:43
I think that here we may want to invert the condit
| |
| 378 if (0 != RollbackKernelLock()) { | 377 if (0 != RollbackKernelLock()) { |
| 379 VBDEBUG(("Error locking kernel versions.\n")); | 378 VBDEBUG(("Error locking kernel versions.\n")); |
| 380 return LOAD_KERNEL_RECOVERY; | 379 /* Don't reboot to recovery mode if we're already there */ |
| 380 if (!is_rec) | |
| 381 return LOAD_KERNEL_RECOVERY; | |
| 381 } | 382 } |
| 382 | 383 |
| 383 /* Success! */ | 384 /* Success! */ |
| 384 return LOAD_KERNEL_SUCCESS; | 385 return LOAD_KERNEL_SUCCESS; |
| 385 } | 386 } |
| 386 | 387 |
| 387 // Handle error cases | 388 // Handle error cases |
| 388 if (found_partitions) | 389 if (found_partitions) |
| 389 return LOAD_KERNEL_INVALID; | 390 return LOAD_KERNEL_INVALID; |
| 390 else | 391 else |
| 391 return LOAD_KERNEL_NOT_FOUND; | 392 return LOAD_KERNEL_NOT_FOUND; |
| 392 } | 393 } |
| OLD | NEW |