| OLD | NEW |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * High-level firmware API for loading and verifying rewritable firmware. | 5 * High-level firmware API for loading and verifying rewritable firmware. |
| 6 * (Firmware portion) | 6 * (Firmware portion) |
| 7 */ | 7 */ |
| 8 | 8 |
| 9 #include "load_firmware_fw.h" | 9 #include "load_firmware_fw.h" |
| 10 #include "rollback_index.h" | 10 #include "rollback_index.h" |
| (...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 51 debug("LoadFirmware started...\n"); | 51 debug("LoadFirmware started...\n"); |
| 52 | 52 |
| 53 /* Must have a root key */ | 53 /* Must have a root key */ |
| 54 if (!root_key) { | 54 if (!root_key) { |
| 55 debug("No root key\n"); | 55 debug("No root key\n"); |
| 56 return LOAD_FIRMWARE_RECOVERY; | 56 return LOAD_FIRMWARE_RECOVERY; |
| 57 } | 57 } |
| 58 | 58 |
| 59 /* Initialize the TPM and read rollback indices. */ | 59 /* Initialize the TPM and read rollback indices. */ |
| 60 /* TODO: fix SetupTPM parameter for developer mode */ | 60 /* TODO: fix SetupTPM parameter for developer mode */ |
| 61 if (0 != SetupTPM(RO_NORMAL_MODE, 0)) { | 61 if (0 != RollbackFirmwareSetup(0, &tpm_key_version, &tpm_fw_version)) { |
| 62 debug("SetupTPM failed\n"); | |
| 63 return LOAD_FIRMWARE_RECOVERY; | |
| 64 } | |
| 65 if (0 != GetStoredVersions(FIRMWARE_VERSIONS, | |
| 66 &tpm_key_version, &tpm_fw_version)) { | |
| 67 debug("Unable to get stored versions.\n"); | 62 debug("Unable to get stored versions.\n"); |
| 68 return LOAD_FIRMWARE_RECOVERY; | 63 return LOAD_FIRMWARE_RECOVERY; |
| 69 } | 64 } |
| 70 | 65 |
| 71 /* Allocate our internal data */ | 66 /* Allocate our internal data */ |
| 72 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); | 67 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); |
| 73 if (!lfi) | 68 if (!lfi) |
| 74 return LOAD_FIRMWARE_RECOVERY; | 69 return LOAD_FIRMWARE_RECOVERY; |
| 75 params->load_firmware_internal = (uint8_t*)lfi; | 70 params->load_firmware_internal = (uint8_t*)lfi; |
| 76 | 71 |
| (...skipping 133 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 210 Free(lfi); | 205 Free(lfi); |
| 211 params->load_firmware_internal = NULL; | 206 params->load_firmware_internal = NULL; |
| 212 | 207 |
| 213 /* Handle finding good firmware */ | 208 /* Handle finding good firmware */ |
| 214 if (good_index >= 0) { | 209 if (good_index >= 0) { |
| 215 | 210 |
| 216 /* Update TPM if necessary */ | 211 /* Update TPM if necessary */ |
| 217 if ((lowest_key_version > tpm_key_version) || | 212 if ((lowest_key_version > tpm_key_version) || |
| 218 (lowest_key_version == tpm_key_version && | 213 (lowest_key_version == tpm_key_version && |
| 219 lowest_fw_version > tpm_fw_version)) { | 214 lowest_fw_version > tpm_fw_version)) { |
| 220 if (0 != WriteStoredVersions(FIRMWARE_VERSIONS, | 215 if (0 != RollbackFirmwareWrite((uint16_t)lowest_key_version, |
| 221 (uint16_t)lowest_key_version, | 216 (uint16_t)lowest_fw_version)) { |
| 222 (uint16_t)lowest_fw_version)) { | |
| 223 debug("Unable to write stored versions.\n"); | 217 debug("Unable to write stored versions.\n"); |
| 224 return LOAD_FIRMWARE_RECOVERY; | 218 return LOAD_FIRMWARE_RECOVERY; |
| 225 } | 219 } |
| 226 } | 220 } |
| 227 | 221 |
| 228 /* Lock Firmware TPM rollback indices from further writes. In | 222 /* Lock firmware versions in TPM */ |
| 229 * this design, this is done by setting the globalLock bit, which | 223 if (0 != RollbackFirmwareLock()) { |
| 230 * is cleared only by TPM_Init at reboot. */ | |
| 231 if (0 != LockFirmwareVersions()) { | |
| 232 debug("Unable to lock firmware versions.\n"); | 224 debug("Unable to lock firmware versions.\n"); |
| 233 return LOAD_FIRMWARE_RECOVERY; | 225 return LOAD_FIRMWARE_RECOVERY; |
| 234 } | 226 } |
| 235 | 227 |
| 236 /* Success */ | 228 /* Success */ |
| 237 debug("Will boot firmware index %d\n", (int)params->firmware_index); | 229 debug("Will boot firmware index %d\n", (int)params->firmware_index); |
| 238 return LOAD_FIRMWARE_SUCCESS; | 230 return LOAD_FIRMWARE_SUCCESS; |
| 239 } | 231 } |
| 240 | 232 |
| 241 /* If we're still here, no good firmware, so go to recovery mode. */ | 233 /* If we're still here, no good firmware, so go to recovery mode. */ |
| 242 debug("Alas, no good firmware.\n"); | 234 debug("Alas, no good firmware.\n"); |
| 243 return LOAD_FIRMWARE_RECOVERY; | 235 return LOAD_FIRMWARE_RECOVERY; |
| 244 } | 236 } |
| OLD | NEW |