| OLD | NEW |
| 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * High-level firmware API for loading and verifying rewritable firmware. | 5 * High-level firmware API for loading and verifying rewritable firmware. |
| 6 * (Firmware portion) | 6 * (Firmware portion) |
| 7 */ | 7 */ |
| 8 | 8 |
| 9 #include "load_firmware_fw.h" | 9 #include "load_firmware_fw.h" |
| 10 #include "rollback_index.h" | 10 #include "rollback_index.h" |
| (...skipping 22 matching lines...) Expand all Loading... |
| 33 | 33 |
| 34 int LoadFirmware(LoadFirmwareParams* params) { | 34 int LoadFirmware(LoadFirmwareParams* params) { |
| 35 | 35 |
| 36 VbPublicKey* root_key = (VbPublicKey*)params->firmware_root_key_blob; | 36 VbPublicKey* root_key = (VbPublicKey*)params->firmware_root_key_blob; |
| 37 VbLoadFirmwareInternal* lfi; | 37 VbLoadFirmwareInternal* lfi; |
| 38 | 38 |
| 39 uint16_t tpm_key_version = 0; | 39 uint16_t tpm_key_version = 0; |
| 40 uint16_t tpm_fw_version = 0; | 40 uint16_t tpm_fw_version = 0; |
| 41 uint64_t lowest_key_version = 0xFFFF; | 41 uint64_t lowest_key_version = 0xFFFF; |
| 42 uint64_t lowest_fw_version = 0xFFFF; | 42 uint64_t lowest_fw_version = 0xFFFF; |
| 43 uint32_t status; |
| 43 int good_index = -1; | 44 int good_index = -1; |
| 44 int index; | 45 int index; |
| 45 | 46 |
| 46 /* Clear output params in case we fail */ | 47 /* Clear output params in case we fail */ |
| 47 params->firmware_index = 0; | 48 params->firmware_index = 0; |
| 48 | 49 |
| 49 VBDEBUG(("LoadFirmware started...\n")); | 50 VBDEBUG(("LoadFirmware started...\n")); |
| 50 | 51 |
| 51 if (params->kernel_sign_key_size < sizeof(VbPublicKey)) { | 52 if (params->kernel_sign_key_size < sizeof(VbPublicKey)) { |
| 52 VBDEBUG(("Kernel sign key buffer too small\n")); | 53 VBDEBUG(("Kernel sign key buffer too small\n")); |
| 53 return LOAD_FIRMWARE_RECOVERY; | 54 return LOAD_FIRMWARE_RECOVERY; |
| 54 } | 55 } |
| 55 | 56 |
| 56 /* Must have a root key */ | 57 /* Must have a root key */ |
| 57 if (!root_key) { | 58 if (!root_key) { |
| 58 VBDEBUG(("No root key\n")); | 59 VBDEBUG(("No root key\n")); |
| 59 return LOAD_FIRMWARE_RECOVERY; | 60 return LOAD_FIRMWARE_RECOVERY; |
| 60 } | 61 } |
| 61 | 62 |
| 62 /* Initialize the TPM and read rollback indices. */ | 63 /* Initialize the TPM and read rollback indices. */ |
| 63 if (0 != RollbackFirmwareSetup(params->boot_flags & BOOT_FLAG_DEVELOPER)) { | 64 status = RollbackFirmwareSetup(params->boot_flags & BOOT_FLAG_DEVELOPER); |
| 65 if (0 != status) { |
| 64 VBDEBUG(("Unable to setup TPM.\n")); | 66 VBDEBUG(("Unable to setup TPM.\n")); |
| 65 return LOAD_FIRMWARE_RECOVERY; | 67 return (status == TPM_E_MUST_REBOOT ? |
| 68 LOAD_FIRMWARE_REBOOT : LOAD_FIRMWARE_RECOVERY); |
| 66 } | 69 } |
| 67 if (0 != RollbackFirmwareRead(&tpm_key_version, &tpm_fw_version)) { | 70 status = RollbackFirmwareRead(&tpm_key_version, &tpm_fw_version); |
| 71 if (0 != status) { |
| 68 VBDEBUG(("Unable to read stored versions.\n")); | 72 VBDEBUG(("Unable to read stored versions.\n")); |
| 69 return LOAD_FIRMWARE_RECOVERY; | 73 return (status == TPM_E_MUST_REBOOT ? |
| 74 LOAD_FIRMWARE_REBOOT : LOAD_FIRMWARE_RECOVERY); |
| 70 } | 75 } |
| 71 | 76 |
| 72 /* Allocate our internal data */ | 77 /* Allocate our internal data */ |
| 73 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); | 78 lfi = (VbLoadFirmwareInternal*)Malloc(sizeof(VbLoadFirmwareInternal)); |
| 74 if (!lfi) | 79 if (!lfi) |
| 75 return LOAD_FIRMWARE_RECOVERY; | 80 return LOAD_FIRMWARE_RECOVERY; |
| 76 params->load_firmware_internal = (uint8_t*)lfi; | 81 params->load_firmware_internal = (uint8_t*)lfi; |
| 77 | 82 |
| 78 /* Loop over indices */ | 83 /* Loop over indices */ |
| 79 for (index = 0; index < 2; index++) { | 84 for (index = 0; index < 2; index++) { |
| (...skipping 132 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 212 Free(lfi); | 217 Free(lfi); |
| 213 params->load_firmware_internal = NULL; | 218 params->load_firmware_internal = NULL; |
| 214 | 219 |
| 215 /* Handle finding good firmware */ | 220 /* Handle finding good firmware */ |
| 216 if (good_index >= 0) { | 221 if (good_index >= 0) { |
| 217 | 222 |
| 218 /* Update TPM if necessary */ | 223 /* Update TPM if necessary */ |
| 219 if ((lowest_key_version > tpm_key_version) || | 224 if ((lowest_key_version > tpm_key_version) || |
| 220 (lowest_key_version == tpm_key_version && | 225 (lowest_key_version == tpm_key_version && |
| 221 lowest_fw_version > tpm_fw_version)) { | 226 lowest_fw_version > tpm_fw_version)) { |
| 222 if (0 != RollbackFirmwareWrite((uint16_t)lowest_key_version, | 227 |
| 223 (uint16_t)lowest_fw_version)) { | 228 |
| 229 status = RollbackFirmwareWrite((uint16_t)lowest_key_version, |
| 230 (uint16_t)lowest_fw_version); |
| 231 if (0 != status) { |
| 224 VBDEBUG(("Unable to write stored versions.\n")); | 232 VBDEBUG(("Unable to write stored versions.\n")); |
| 225 return LOAD_FIRMWARE_RECOVERY; | 233 return (status == TPM_E_MUST_REBOOT ? |
| 234 LOAD_FIRMWARE_REBOOT : LOAD_FIRMWARE_RECOVERY); |
| 226 } | 235 } |
| 227 } | 236 } |
| 228 | 237 |
| 229 /* Lock firmware versions in TPM */ | 238 /* Lock firmware versions in TPM */ |
| 230 if (0 != RollbackFirmwareLock()) { | 239 status = RollbackFirmwareLock(); |
| 240 if (0 != status) { |
| 231 VBDEBUG(("Unable to lock firmware versions.\n")); | 241 VBDEBUG(("Unable to lock firmware versions.\n")); |
| 232 return LOAD_FIRMWARE_RECOVERY; | 242 return (status == TPM_E_MUST_REBOOT ? |
| 243 LOAD_FIRMWARE_REBOOT : LOAD_FIRMWARE_RECOVERY); |
| 233 } | 244 } |
| 234 | 245 |
| 235 /* Success */ | 246 /* Success */ |
| 236 VBDEBUG(("Will boot firmware index %d\n", (int)params->firmware_index)); | 247 VBDEBUG(("Will boot firmware index %d\n", (int)params->firmware_index)); |
| 237 return LOAD_FIRMWARE_SUCCESS; | 248 return LOAD_FIRMWARE_SUCCESS; |
| 238 } | 249 } |
| 239 | 250 |
| 240 /* If we're still here, no good firmware, so go to recovery mode. */ | 251 /* If we're still here, no good firmware, so go to recovery mode. */ |
| 241 VBDEBUG(("Alas, no good firmware.\n")); | 252 VBDEBUG(("Alas, no good firmware.\n")); |
| 242 return LOAD_FIRMWARE_RECOVERY; | 253 return LOAD_FIRMWARE_RECOVERY; |
| 243 } | 254 } |
| OLD | NEW |