OLD | NEW |
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
4 * | 4 * |
5 * High-level firmware API for loading and verifying rewritable firmware. | 5 * High-level firmware API for loading and verifying rewritable firmware. |
6 * (Firmware portion) | 6 * (Firmware portion) |
7 */ | 7 */ |
8 | 8 |
9 #include "load_firmware_fw.h" | 9 #include "load_firmware_fw.h" |
10 #include "rollback_index.h" | 10 #include "rollback_index.h" |
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
51 debug("LoadFirmware started...\n"); | 51 debug("LoadFirmware started...\n"); |
52 | 52 |
53 /* Must have a root key */ | 53 /* Must have a root key */ |
54 if (!root_key) { | 54 if (!root_key) { |
55 debug("No root key\n"); | 55 debug("No root key\n"); |
56 return LOAD_FIRMWARE_RECOVERY; | 56 return LOAD_FIRMWARE_RECOVERY; |
57 } | 57 } |
58 | 58 |
59 /* Initialize the TPM and read rollback indices. */ | 59 /* Initialize the TPM and read rollback indices. */ |
60 /* TODO: fix SetupTPM parameter for developer mode */ | 60 /* TODO: fix SetupTPM parameter for developer mode */ |
61 if (0 != SetupTPM(RO_NORMAL_MODE, 0)) { | 61 if (0 != RollbackFirmwareSetup(0, &tpm_key_version, &tpm_fw_version)) { |
62 debug("SetupTPM failed\n"); | |
63 return LOAD_FIRMWARE_RECOVERY; | |
64 } | |
65 if (0 != GetStoredVersions(FIRMWARE_VERSIONS, | |
66 &tpm_key_version, &tpm_fw_version)) { | |
67 debug("Unable to get stored versions.\n"); | 62 debug("Unable to get stored versions.\n"); |
68 return LOAD_FIRMWARE_RECOVERY; | 63 return LOAD_FIRMWARE_RECOVERY; |
69 } | 64 } |
70 | 65 |
71 /* Allocate our internal data */ | 66 /* Allocate our internal data */ |
72 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); | 67 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); |
73 if (!lfi) | 68 if (!lfi) |
74 return LOAD_FIRMWARE_RECOVERY; | 69 return LOAD_FIRMWARE_RECOVERY; |
75 params->load_firmware_internal = (uint8_t*)lfi; | 70 params->load_firmware_internal = (uint8_t*)lfi; |
76 | 71 |
(...skipping 133 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
210 Free(lfi); | 205 Free(lfi); |
211 params->load_firmware_internal = NULL; | 206 params->load_firmware_internal = NULL; |
212 | 207 |
213 /* Handle finding good firmware */ | 208 /* Handle finding good firmware */ |
214 if (good_index >= 0) { | 209 if (good_index >= 0) { |
215 | 210 |
216 /* Update TPM if necessary */ | 211 /* Update TPM if necessary */ |
217 if ((lowest_key_version > tpm_key_version) || | 212 if ((lowest_key_version > tpm_key_version) || |
218 (lowest_key_version == tpm_key_version && | 213 (lowest_key_version == tpm_key_version && |
219 lowest_fw_version > tpm_fw_version)) { | 214 lowest_fw_version > tpm_fw_version)) { |
220 if (0 != WriteStoredVersions(FIRMWARE_VERSIONS, | 215 if (0 != RollbackFirmwareWrite((uint16_t)lowest_key_version, |
221 (uint16_t)lowest_key_version, | 216 (uint16_t)lowest_fw_version)) { |
222 (uint16_t)lowest_fw_version)) { | |
223 debug("Unable to write stored versions.\n"); | 217 debug("Unable to write stored versions.\n"); |
224 return LOAD_FIRMWARE_RECOVERY; | 218 return LOAD_FIRMWARE_RECOVERY; |
225 } | 219 } |
226 } | 220 } |
227 | 221 |
228 /* Lock Firmware TPM rollback indices from further writes. In | 222 /* Lock firmware versions in TPM */ |
229 * this design, this is done by setting the globalLock bit, which | 223 if (0 != RollbackFirmwareLock()) { |
230 * is cleared only by TPM_Init at reboot. */ | |
231 if (0 != LockFirmwareVersions()) { | |
232 debug("Unable to lock firmware versions.\n"); | 224 debug("Unable to lock firmware versions.\n"); |
233 return LOAD_FIRMWARE_RECOVERY; | 225 return LOAD_FIRMWARE_RECOVERY; |
234 } | 226 } |
235 | 227 |
236 /* Success */ | 228 /* Success */ |
237 debug("Will boot firmware index %d\n", (int)params->firmware_index); | 229 debug("Will boot firmware index %d\n", (int)params->firmware_index); |
238 return LOAD_FIRMWARE_SUCCESS; | 230 return LOAD_FIRMWARE_SUCCESS; |
239 } | 231 } |
240 | 232 |
241 /* If we're still here, no good firmware, so go to recovery mode. */ | 233 /* If we're still here, no good firmware, so go to recovery mode. */ |
242 debug("Alas, no good firmware.\n"); | 234 debug("Alas, no good firmware.\n"); |
243 return LOAD_FIRMWARE_RECOVERY; | 235 return LOAD_FIRMWARE_RECOVERY; |
244 } | 236 } |
OLD | NEW |