Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1359)

Side by Side Diff: firmware/lib/vboot_firmware.c

Issue 2861020: Refactor rollback interface for LoadKernel(), LoadFirmware(). (Closed) Base URL: ssh://gitrw.chromium.org/vboot_reference.git
Patch Set: Created 10 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « firmware/lib/rollback_index.c ('k') | firmware/lib/vboot_kernel.c » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be 2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file. 3 * found in the LICENSE file.
4 * 4 *
5 * High-level firmware API for loading and verifying rewritable firmware. 5 * High-level firmware API for loading and verifying rewritable firmware.
6 * (Firmware portion) 6 * (Firmware portion)
7 */ 7 */
8 8
9 #include "load_firmware_fw.h" 9 #include "load_firmware_fw.h"
10 #include "rollback_index.h" 10 #include "rollback_index.h"
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after
51 debug("LoadFirmware started...\n"); 51 debug("LoadFirmware started...\n");
52 52
53 /* Must have a root key */ 53 /* Must have a root key */
54 if (!root_key) { 54 if (!root_key) {
55 debug("No root key\n"); 55 debug("No root key\n");
56 return LOAD_FIRMWARE_RECOVERY; 56 return LOAD_FIRMWARE_RECOVERY;
57 } 57 }
58 58
59 /* Initialize the TPM and read rollback indices. */ 59 /* Initialize the TPM and read rollback indices. */
60 /* TODO: fix SetupTPM parameter for developer mode */ 60 /* TODO: fix SetupTPM parameter for developer mode */
61 if (0 != SetupTPM(RO_NORMAL_MODE, 0)) { 61 if (0 != RollbackFirmwareSetup(0, &tpm_key_version, &tpm_fw_version)) {
62 debug("SetupTPM failed\n");
63 return LOAD_FIRMWARE_RECOVERY;
64 }
65 if (0 != GetStoredVersions(FIRMWARE_VERSIONS,
66 &tpm_key_version, &tpm_fw_version)) {
67 debug("Unable to get stored versions.\n"); 62 debug("Unable to get stored versions.\n");
68 return LOAD_FIRMWARE_RECOVERY; 63 return LOAD_FIRMWARE_RECOVERY;
69 } 64 }
70 65
71 /* Allocate our internal data */ 66 /* Allocate our internal data */
72 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); 67 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal));
73 if (!lfi) 68 if (!lfi)
74 return LOAD_FIRMWARE_RECOVERY; 69 return LOAD_FIRMWARE_RECOVERY;
75 params->load_firmware_internal = (uint8_t*)lfi; 70 params->load_firmware_internal = (uint8_t*)lfi;
76 71
(...skipping 133 matching lines...) Expand 10 before | Expand all | Expand 10 after
210 Free(lfi); 205 Free(lfi);
211 params->load_firmware_internal = NULL; 206 params->load_firmware_internal = NULL;
212 207
213 /* Handle finding good firmware */ 208 /* Handle finding good firmware */
214 if (good_index >= 0) { 209 if (good_index >= 0) {
215 210
216 /* Update TPM if necessary */ 211 /* Update TPM if necessary */
217 if ((lowest_key_version > tpm_key_version) || 212 if ((lowest_key_version > tpm_key_version) ||
218 (lowest_key_version == tpm_key_version && 213 (lowest_key_version == tpm_key_version &&
219 lowest_fw_version > tpm_fw_version)) { 214 lowest_fw_version > tpm_fw_version)) {
220 if (0 != WriteStoredVersions(FIRMWARE_VERSIONS, 215 if (0 != RollbackFirmwareWrite((uint16_t)lowest_key_version,
221 (uint16_t)lowest_key_version, 216 (uint16_t)lowest_fw_version)) {
222 (uint16_t)lowest_fw_version)) {
223 debug("Unable to write stored versions.\n"); 217 debug("Unable to write stored versions.\n");
224 return LOAD_FIRMWARE_RECOVERY; 218 return LOAD_FIRMWARE_RECOVERY;
225 } 219 }
226 } 220 }
227 221
228 /* Lock Firmware TPM rollback indices from further writes. In 222 /* Lock firmware versions in TPM */
229 * this design, this is done by setting the globalLock bit, which 223 if (0 != RollbackFirmwareLock()) {
230 * is cleared only by TPM_Init at reboot. */
231 if (0 != LockFirmwareVersions()) {
232 debug("Unable to lock firmware versions.\n"); 224 debug("Unable to lock firmware versions.\n");
233 return LOAD_FIRMWARE_RECOVERY; 225 return LOAD_FIRMWARE_RECOVERY;
234 } 226 }
235 227
236 /* Success */ 228 /* Success */
237 debug("Will boot firmware index %d\n", (int)params->firmware_index); 229 debug("Will boot firmware index %d\n", (int)params->firmware_index);
238 return LOAD_FIRMWARE_SUCCESS; 230 return LOAD_FIRMWARE_SUCCESS;
239 } 231 }
240 232
241 /* If we're still here, no good firmware, so go to recovery mode. */ 233 /* If we're still here, no good firmware, so go to recovery mode. */
242 debug("Alas, no good firmware.\n"); 234 debug("Alas, no good firmware.\n");
243 return LOAD_FIRMWARE_RECOVERY; 235 return LOAD_FIRMWARE_RECOVERY;
244 } 236 }
OLDNEW
« no previous file with comments | « firmware/lib/rollback_index.c ('k') | firmware/lib/vboot_kernel.c » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698