mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-25 02:35:22 +00:00
Modify EC software sync to update RO if necessary
Allow the AP to sync and verify the EC read only image after updating the rewritable image. BUG=chrome-os-partner:48703 BRANCH=none TEST=manual 1. Update EC to a new version 2. rebuild EC code 3. Update AP firmware 4. Reboot and check that the RO image is updated after the RW image is updated. CQ-DEPEND=CL:319213 Change-Id: I774ef25320103f20d8c7d1c180a220dd0819c04d Signed-off-by: Mary Ruthven <mruthven@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/320614 Reviewed-by: Randall Spangler <rspangler@chromium.org>
This commit is contained in:
@@ -120,9 +120,11 @@ enum VbErrorPredefined_t {
|
|||||||
VBERROR_UNSUPPORTED_REGION = 0x10025,
|
VBERROR_UNSUPPORTED_REGION = 0x10025,
|
||||||
/* No image present (returned from VbGbbReadImage() for missing image) */
|
/* No image present (returned from VbGbbReadImage() for missing image) */
|
||||||
VBERROR_NO_IMAGE_PRESENT = 0x10026,
|
VBERROR_NO_IMAGE_PRESENT = 0x10026,
|
||||||
|
|
||||||
/* failed to draw screen */
|
/* failed to draw screen */
|
||||||
VBERROR_SCREEN_DRAW = 0x10027,
|
VBERROR_SCREEN_DRAW = 0x10027,
|
||||||
|
/* failed to jump to RW image */
|
||||||
|
VBERROR_RW_JUMP_FAILED = 0x10028,
|
||||||
|
|
||||||
/* VbExEcGetExpectedRWHash() may return the following codes */
|
/* VbExEcGetExpectedRWHash() may return the following codes */
|
||||||
/* Compute expected RW hash from the EC image; BIOS doesn't have it */
|
/* Compute expected RW hash from the EC image; BIOS doesn't have it */
|
||||||
VBERROR_EC_GET_EXPECTED_HASH_FROM_IMAGE = 0x20000,
|
VBERROR_EC_GET_EXPECTED_HASH_FROM_IMAGE = 0x20000,
|
||||||
|
|||||||
@@ -654,26 +654,241 @@ static VbError_t EcProtect(int devidx, enum VbSelectFirmware_t select)
|
|||||||
return rv;
|
return rv;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static VbError_t EcUpdateImage(int devidx, VbCommonParams *cparams,
|
||||||
|
enum VbSelectFirmware_t select,
|
||||||
|
int *need_update, int in_rw)
|
||||||
|
{
|
||||||
|
VbSharedDataHeader *shared =
|
||||||
|
(VbSharedDataHeader *)cparams->shared_data_blob;
|
||||||
|
int rv;
|
||||||
|
int hash_size;
|
||||||
|
const uint8_t *hash = NULL;
|
||||||
|
const uint8_t *expected = NULL;
|
||||||
|
const uint8_t *ec_hash = NULL;
|
||||||
|
int expected_size;
|
||||||
|
uint8_t expected_hash[SHA256_DIGEST_SIZE];
|
||||||
|
int i;
|
||||||
|
int rw_request = select != VB_SELECT_FIRMWARE_READONLY;
|
||||||
|
|
||||||
|
*need_update = 0;
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"Check for %s update\n", rw_request ? "RW" : "RO"));
|
||||||
|
|
||||||
|
/* Get current EC hash. */
|
||||||
|
rv = VbExEcHashImage(devidx, select, &ec_hash, &hash_size);
|
||||||
|
|
||||||
|
if (rv) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcHashImage() returned %d\n", rv));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_FAILED);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
if (hash_size != SHA256_DIGEST_SIZE) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcHashImage() says size %d, not %d\n",
|
||||||
|
hash_size, SHA256_DIGEST_SIZE));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_SIZE);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
VBDEBUG(("EC-%s hash:", rw_request ? "RW" : "RO"));
|
||||||
|
for (i = 0; i < SHA256_DIGEST_SIZE; i++)
|
||||||
|
VBDEBUG(("%02x",ec_hash[i]));
|
||||||
|
VBDEBUG(("\n"));
|
||||||
|
|
||||||
|
/* Get expected EC hash. */
|
||||||
|
rv = VbExEcGetExpectedImageHash(devidx, select, &hash, &hash_size);
|
||||||
|
|
||||||
|
if (rv == VBERROR_EC_GET_EXPECTED_HASH_FROM_IMAGE) {
|
||||||
|
/*
|
||||||
|
* BIOS has verified EC image but doesn't have a precomputed
|
||||||
|
* hash for it, so we must compute the hash ourselves.
|
||||||
|
*/
|
||||||
|
hash = NULL;
|
||||||
|
} else if (rv) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcGetExpectedImageHash() returned %d\n", rv));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_EXPECTED_HASH);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
} else if (hash_size != SHA256_DIGEST_SIZE) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcGetExpectedImageHash() says size %d, not %d\n",
|
||||||
|
hash_size, SHA256_DIGEST_SIZE));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_EXPECTED_HASH);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
} else {
|
||||||
|
VBDEBUG(("Expected hash:"));
|
||||||
|
for (i = 0; i < SHA256_DIGEST_SIZE; i++)
|
||||||
|
VBDEBUG(("%02x", hash[i]));
|
||||||
|
VBDEBUG(("\n"));
|
||||||
|
*need_update = SafeMemcmp(ec_hash, hash, SHA256_DIGEST_SIZE);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Get expected EC image if we're sure we need to update (because the
|
||||||
|
* expected hash didn't match the EC) or we still don't know (because
|
||||||
|
* there was no expected hash and we need the image to compute one
|
||||||
|
* ourselves).
|
||||||
|
*/
|
||||||
|
if (*need_update || !hash) {
|
||||||
|
/* Get expected EC image */
|
||||||
|
rv = VbExEcGetExpectedImage(devidx, select, &expected,
|
||||||
|
&expected_size);
|
||||||
|
if (rv) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcGetExpectedImage() returned %d\n", rv));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_EXPECTED_IMAGE);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
VBDEBUG(("EcUpdateImage() - image len = %d\n", expected_size));
|
||||||
|
|
||||||
|
/* Hash expected image */
|
||||||
|
internal_SHA256(expected, expected_size, expected_hash);
|
||||||
|
VBDEBUG(("Computed hash of expected image:"));
|
||||||
|
for (i = 0; i < SHA256_DIGEST_SIZE; i++)
|
||||||
|
VBDEBUG(("%02x", expected_hash[i]));
|
||||||
|
VBDEBUG(("\n"));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!hash) {
|
||||||
|
/*
|
||||||
|
* BIOS didn't have expected EC hash, so check if we need
|
||||||
|
* update by comparing EC hash to the one we just computed.
|
||||||
|
*/
|
||||||
|
*need_update = SafeMemcmp(ec_hash, expected_hash,
|
||||||
|
SHA256_DIGEST_SIZE);
|
||||||
|
} else if (*need_update && SafeMemcmp(hash, expected_hash,
|
||||||
|
SHA256_DIGEST_SIZE)) {
|
||||||
|
/*
|
||||||
|
* We need to update, but the expected EC image doesn't match
|
||||||
|
* the expected EC hash we were given.
|
||||||
|
*/
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcGetExpectedImage() returned %d\n", rv));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_MISMATCH);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (in_rw && rw_request) {
|
||||||
|
if (*need_update) {
|
||||||
|
/*
|
||||||
|
* Check if BIOS should also load VGA Option ROM when
|
||||||
|
* rebooting to save another reboot if possible.
|
||||||
|
*/
|
||||||
|
if ((shared->flags & VBSD_EC_SLOW_UPDATE) &&
|
||||||
|
(shared->flags & VBSD_OPROM_MATTERS) &&
|
||||||
|
!(shared->flags & VBSD_OPROM_LOADED)) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - Reboot to "
|
||||||
|
"load VGA Option ROM\n"));
|
||||||
|
VbNvSet(&vnc, VBNV_OPROM_NEEDED, 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* EC is running the wrong RW image. Reboot the EC to
|
||||||
|
* RO so we can update it on the next boot.
|
||||||
|
*/
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"in RW, need to update RW, so reboot\n"));
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
|
||||||
|
VBDEBUG(("EcUpdateImage() in EC-RW and it matches\n"));
|
||||||
|
return VBERROR_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Update EC if necessary */
|
||||||
|
|
||||||
|
if (*need_update) {
|
||||||
|
VBDEBUG(("EcUpdateImage() updating EC-%s...\n",
|
||||||
|
rw_request ? "RW" : "RO"));
|
||||||
|
|
||||||
|
if (shared->flags & VBSD_EC_SLOW_UPDATE) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"EC is slow. Show WAIT screen.\n"));
|
||||||
|
|
||||||
|
/* Ensure the VGA Option ROM is loaded */
|
||||||
|
if ((shared->flags & VBSD_OPROM_MATTERS) &&
|
||||||
|
!(shared->flags & VBSD_OPROM_LOADED)) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - Reboot to "
|
||||||
|
"load VGA Option ROM\n"));
|
||||||
|
VbNvSet(&vnc, VBNV_OPROM_NEEDED, 1);
|
||||||
|
return VBERROR_VGA_OPROM_MISMATCH;
|
||||||
|
}
|
||||||
|
|
||||||
|
VbDisplayScreen(cparams, VB_SCREEN_WAIT, 0, &vnc);
|
||||||
|
}
|
||||||
|
|
||||||
|
rv = VbExEcUpdateImage(devidx, select, expected, expected_size);
|
||||||
|
|
||||||
|
if (rv != VBERROR_SUCCESS) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcUpdateImage() returned %d\n", rv));
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The EC may know it needs a reboot. It may need to
|
||||||
|
* unprotect the region before updating, or may need to
|
||||||
|
* reboot after updating. Either way, it's not an error
|
||||||
|
* requiring recovery mode.
|
||||||
|
*
|
||||||
|
* If we fail for any other reason, trigger recovery
|
||||||
|
* mode.
|
||||||
|
*/
|
||||||
|
if (rv != VBERROR_EC_REBOOT_TO_RO_REQUIRED)
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_UPDATE);
|
||||||
|
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Verify the EC was updated properly */
|
||||||
|
if (*need_update) {
|
||||||
|
/* Get current EC hash. */
|
||||||
|
rv = VbExEcHashImage(devidx, select, &ec_hash, &hash_size);
|
||||||
|
|
||||||
|
if (rv) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcHashImage() returned %d\n", rv));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_FAILED);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
if (hash_size != SHA256_DIGEST_SIZE) {
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"VbExEcHashImage() says size %d, not %d\n",
|
||||||
|
hash_size, SHA256_DIGEST_SIZE));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_SIZE);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
VBDEBUG(("Updated EC-%s hash:", rw_request ? "RW" : "RO"));
|
||||||
|
for (i = 0; i < SHA256_DIGEST_SIZE; i++)
|
||||||
|
VBDEBUG(("%02x",ec_hash[i]));
|
||||||
|
VBDEBUG(("\n"));
|
||||||
|
|
||||||
|
if (SafeMemcmp(ec_hash, hash, SHA256_DIGEST_SIZE)){
|
||||||
|
VBDEBUG(("EcUpdateImage() - "
|
||||||
|
"Failed to update EC-%s\n", rw_request ?
|
||||||
|
"RW" : "RO"));
|
||||||
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_UPDATE);
|
||||||
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return VBERROR_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
VbError_t VbEcSoftwareSync(int devidx, VbCommonParams *cparams)
|
VbError_t VbEcSoftwareSync(int devidx, VbCommonParams *cparams)
|
||||||
{
|
{
|
||||||
VbSharedDataHeader *shared =
|
VbSharedDataHeader *shared =
|
||||||
(VbSharedDataHeader *)cparams->shared_data_blob;
|
(VbSharedDataHeader *)cparams->shared_data_blob;
|
||||||
enum VbSelectFirmware_t rw;
|
enum VbSelectFirmware_t select_rw =
|
||||||
|
shared->firmware_index ? VB_SELECT_FIRMWARE_B :
|
||||||
|
VB_SELECT_FIRMWARE_A;
|
||||||
|
enum VbSelectFirmware_t select_ro = VB_SELECT_FIRMWARE_READONLY;
|
||||||
int in_rw = 0;
|
int in_rw = 0;
|
||||||
int rv;
|
int ro_try_count = 2;
|
||||||
const uint8_t *ec_hash = NULL;
|
int num_tries = 0;
|
||||||
int ec_hash_size;
|
uint32_t try_ro_sync, recovery_request;
|
||||||
const uint8_t *rw_hash = NULL;
|
int rv, updated_rw, updated_ro;
|
||||||
int rw_hash_size;
|
|
||||||
const uint8_t *expected = NULL;
|
|
||||||
int expected_size;
|
|
||||||
uint8_t expected_hash[SHA256_DIGEST_SIZE];
|
|
||||||
int need_update = 0;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
VBDEBUG(("VbEcSoftwareSync(devidx=%d)\n", devidx));
|
VBDEBUG(("VbEcSoftwareSync(devidx=%d)\n", devidx));
|
||||||
rw = shared->firmware_index ? VB_SELECT_FIRMWARE_B :
|
|
||||||
VB_SELECT_FIRMWARE_A;
|
|
||||||
|
|
||||||
/* Determine whether the EC is in RO or RW */
|
/* Determine whether the EC is in RO or RW */
|
||||||
rv = VbExEcRunningRW(devidx, &in_rw);
|
rv = VbExEcRunningRW(devidx, &in_rw);
|
||||||
@@ -722,7 +937,7 @@ VbError_t VbEcSoftwareSync(int devidx, VbCommonParams *cparams)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Protect the RW flash and stay in EC-RO */
|
/* Protect the RW flash and stay in EC-RO */
|
||||||
rv = EcProtect(devidx, rw);
|
rv = EcProtect(devidx, select_rw);
|
||||||
if (rv != VBERROR_SUCCESS)
|
if (rv != VBERROR_SUCCESS)
|
||||||
return rv;
|
return rv;
|
||||||
|
|
||||||
@@ -738,211 +953,82 @@ VbError_t VbEcSoftwareSync(int devidx, VbCommonParams *cparams)
|
|||||||
return VBERROR_SUCCESS;
|
return VBERROR_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Get hash of EC-RW */
|
VBDEBUG(("VbEcSoftwareSync() check for RW update.\n"));
|
||||||
rv = VbExEcHashImage(devidx, rw, &ec_hash, &ec_hash_size);
|
|
||||||
if (rv) {
|
/* Update the RW Image. */
|
||||||
|
rv = EcUpdateImage(devidx, cparams, select_rw, &updated_rw, in_rw);
|
||||||
|
|
||||||
|
if (rv != VBERROR_SUCCESS) {
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
VBDEBUG(("VbEcSoftwareSync() - "
|
||||||
"VbExEcHashImage() returned %d\n", rv));
|
"EcUpdateImage() returned %d\n", rv));
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_FAILED);
|
return rv;
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
}
|
|
||||||
if (ec_hash_size != SHA256_DIGEST_SIZE) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"VbExEcHashImage() says size %d, not %d\n",
|
|
||||||
ec_hash_size, SHA256_DIGEST_SIZE));
|
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_SIZE);
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
VBDEBUG(("EC hash:"));
|
/* Tell EC to jump to its RW image */
|
||||||
for (i = 0; i < SHA256_DIGEST_SIZE; i++)
|
if (!in_rw) {
|
||||||
VBDEBUG(("%02x", ec_hash[i]));
|
VBDEBUG(("VbEcSoftwareSync() jumping to EC-RW\n"));
|
||||||
VBDEBUG(("\n"));
|
rv = VbExEcJumpToRW(devidx);
|
||||||
|
|
||||||
/*
|
|
||||||
* Get expected EC-RW hash. Note that we've already checked for
|
|
||||||
* RO_NORMAL, so we know that the BIOS must be RW-A or RW-B, and
|
|
||||||
* therefore the EC must match.
|
|
||||||
*/
|
|
||||||
rv = VbExEcGetExpectedImageHash(devidx, rw, &rw_hash, &rw_hash_size);
|
|
||||||
|
|
||||||
if (rv == VBERROR_EC_GET_EXPECTED_HASH_FROM_IMAGE) {
|
|
||||||
/*
|
|
||||||
* BIOS has verified EC image but doesn't have a precomputed
|
|
||||||
* hash for it, so we must compute the hash ourselves.
|
|
||||||
*/
|
|
||||||
rw_hash = NULL;
|
|
||||||
} else if (rv) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"VbExEcGetExpectedRWHash() returned %d\n", rv));
|
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_EXPECTED_HASH);
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
} else if (rw_hash_size != SHA256_DIGEST_SIZE) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"VbExEcGetExpectedRWHash() says size %d, not %d\n",
|
|
||||||
rw_hash_size, SHA256_DIGEST_SIZE));
|
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_EXPECTED_HASH);
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
} else {
|
|
||||||
VBDEBUG(("Expected hash:"));
|
|
||||||
for (i = 0; i < SHA256_DIGEST_SIZE; i++)
|
|
||||||
VBDEBUG(("%02x", rw_hash[i]));
|
|
||||||
VBDEBUG(("\n"));
|
|
||||||
|
|
||||||
need_update = SafeMemcmp(ec_hash, rw_hash, SHA256_DIGEST_SIZE);
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Get expected EC-RW image if we're sure we need to update (because the
|
|
||||||
* expected hash didn't match the EC) or we still don't know (because
|
|
||||||
* there was no expected hash and we need the image to compute one
|
|
||||||
* ourselves).
|
|
||||||
*/
|
|
||||||
if (need_update || !rw_hash) {
|
|
||||||
/* Get expected EC-RW image */
|
|
||||||
rv = VbExEcGetExpectedImage(devidx, rw, &expected,
|
|
||||||
&expected_size);
|
|
||||||
if (rv) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"VbExEcGetExpectedRW() returned %d\n", rv));
|
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_EXPECTED_IMAGE);
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
}
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - expected len = %d\n",
|
|
||||||
expected_size));
|
|
||||||
|
|
||||||
/* Hash expected image */
|
|
||||||
internal_SHA256(expected, expected_size, expected_hash);
|
|
||||||
VBDEBUG(("Computed hash of expected image:"));
|
|
||||||
for (i = 0; i < SHA256_DIGEST_SIZE; i++)
|
|
||||||
VBDEBUG(("%02x", expected_hash[i]));
|
|
||||||
VBDEBUG(("\n"));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!rw_hash) {
|
|
||||||
/*
|
|
||||||
* BIOS didn't have expected EC hash, so check if we need
|
|
||||||
* update by comparing EC hash to the one we just computed.
|
|
||||||
*/
|
|
||||||
need_update = SafeMemcmp(ec_hash, expected_hash,
|
|
||||||
SHA256_DIGEST_SIZE);
|
|
||||||
} else if (need_update &&
|
|
||||||
SafeMemcmp(rw_hash, expected_hash, SHA256_DIGEST_SIZE)) {
|
|
||||||
/*
|
|
||||||
* We need to update, but the expected EC image doesn't match
|
|
||||||
* the expected EC hash we were given.
|
|
||||||
*/
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"VbExEcGetExpectedRW() returned %d\n", rv));
|
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_HASH_MISMATCH);
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* TODO: GBB flag to override whether we need update; needed for EC
|
|
||||||
* development.
|
|
||||||
*/
|
|
||||||
|
|
||||||
if (in_rw) {
|
|
||||||
if (need_update) {
|
|
||||||
/*
|
|
||||||
* Check if BIOS should also load VGA Option ROM when
|
|
||||||
* rebooting to save another reboot if possible.
|
|
||||||
*/
|
|
||||||
if ((shared->flags & VBSD_EC_SLOW_UPDATE) &&
|
|
||||||
(shared->flags & VBSD_OPROM_MATTERS) &&
|
|
||||||
!(shared->flags & VBSD_OPROM_LOADED)) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - Reboot to "
|
|
||||||
"load VGA Option ROM\n"));
|
|
||||||
VbNvSet(&vnc, VBNV_OPROM_NEEDED, 1);
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* EC is running the wrong RW image. Reboot the EC to
|
|
||||||
* RO so we can update it on the next boot.
|
|
||||||
*/
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"in RW, need to update RW, so reboot\n"));
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
}
|
|
||||||
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() in EC-RW and it matches\n"));
|
|
||||||
return VBERROR_SUCCESS;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Update EC if necessary */
|
|
||||||
if (need_update) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() updating EC-RW...\n"));
|
|
||||||
|
|
||||||
if (shared->flags & VBSD_EC_SLOW_UPDATE) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"EC is slow. Show WAIT screen.\n"));
|
|
||||||
|
|
||||||
/* Ensure the VGA Option ROM is loaded */
|
|
||||||
if ((shared->flags & VBSD_OPROM_MATTERS) &&
|
|
||||||
!(shared->flags & VBSD_OPROM_LOADED)) {
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() - Reboot to "
|
|
||||||
"load VGA Option ROM\n"));
|
|
||||||
VbNvSet(&vnc, VBNV_OPROM_NEEDED, 1);
|
|
||||||
return VBERROR_VGA_OPROM_MISMATCH;
|
|
||||||
}
|
|
||||||
|
|
||||||
VbDisplayScreen(cparams, VB_SCREEN_WAIT, 0, &vnc);
|
|
||||||
}
|
|
||||||
|
|
||||||
rv = VbExEcUpdateImage(devidx, rw, expected, expected_size);
|
|
||||||
|
|
||||||
if (rv != VBERROR_SUCCESS) {
|
if (rv != VBERROR_SUCCESS) {
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
VBDEBUG(("VbEcSoftwareSync() - "
|
||||||
"VbExEcUpdateImage() returned %d\n", rv));
|
"VbExEcJumpToRW() returned %x\n", rv));
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* The EC may know it needs a reboot. It may need to
|
* If the EC booted RO-normal and a previous AP boot
|
||||||
* unprotect RW before updating, or may need to reboot
|
* has called VbExEcStayInRO(), we need to reboot the EC
|
||||||
* after RW updated. Either way, it's not an error
|
* to unlock the ability to jump to the RW firmware.
|
||||||
* requiring recovery mode.
|
|
||||||
*
|
*
|
||||||
* If we fail for any other reason, trigger recovery
|
* All other errors trigger recovery mode.
|
||||||
* mode.
|
|
||||||
*/
|
*/
|
||||||
if (rv != VBERROR_EC_REBOOT_TO_RO_REQUIRED)
|
if (rv != VBERROR_EC_REBOOT_TO_RO_REQUIRED)
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_UPDATE);
|
VbSetRecoveryRequest(VBNV_RECOVERY_EC_JUMP_RW);
|
||||||
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* TODO: should ask EC to recompute its hash to verify it's
|
|
||||||
* correct before continuing?
|
|
||||||
*/
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Protect EC-RW flash */
|
VbNvGet(&vnc, VBNV_TRY_RO_SYNC, &try_ro_sync);
|
||||||
rv = EcProtect(devidx, rw);
|
|
||||||
|
if (!devidx && try_ro_sync &&
|
||||||
|
!(shared->flags & VBSD_BOOT_FIRMWARE_WP_ENABLED)) {
|
||||||
|
/* Reset RO Software Sync NV flag */
|
||||||
|
VbNvSet(&vnc, VBNV_TRY_RO_SYNC, 0);
|
||||||
|
|
||||||
|
VbNvGet(&vnc, VBNV_RECOVERY_REQUEST, &recovery_request);
|
||||||
|
|
||||||
|
/* Update the RO Image. */
|
||||||
|
while (num_tries < ro_try_count) {
|
||||||
|
VBDEBUG(("VbEcSoftwareSync() RO Software Sync\n"));
|
||||||
|
|
||||||
|
/* Get expected EC-RO Image. */
|
||||||
|
rv = EcUpdateImage(devidx, cparams, select_ro,
|
||||||
|
&updated_ro, in_rw);
|
||||||
|
if (rv == VBERROR_SUCCESS) {
|
||||||
|
/*
|
||||||
|
* If the RO update had failed, reset the
|
||||||
|
* recovery request.
|
||||||
|
*/
|
||||||
|
if (num_tries)
|
||||||
|
VbSetRecoveryRequest(recovery_request);
|
||||||
|
break;
|
||||||
|
} else
|
||||||
|
VBDEBUG(("VbEcSoftwareSync() - "
|
||||||
|
"EcUpdateImage() returned %d\n", rv));
|
||||||
|
|
||||||
|
num_tries++;
|
||||||
|
}
|
||||||
|
}
|
||||||
if (rv != VBERROR_SUCCESS)
|
if (rv != VBERROR_SUCCESS)
|
||||||
return rv;
|
return rv;
|
||||||
|
|
||||||
/* Tell EC to jump to its RW image */
|
/* Protect RO flash */
|
||||||
VBDEBUG(("VbEcSoftwareSync() jumping to EC-RW\n"));
|
rv = EcProtect(devidx, select_ro);
|
||||||
rv = VbExEcJumpToRW(devidx);
|
if (rv != VBERROR_SUCCESS)
|
||||||
if (rv != VBERROR_SUCCESS) {
|
return rv;
|
||||||
VBDEBUG(("VbEcSoftwareSync() - "
|
|
||||||
"VbExEcJumpToRW() returned %d\n", rv));
|
|
||||||
|
|
||||||
/*
|
/* Protect RW flash */
|
||||||
* If the EC booted RO-normal and a previous AP boot has called
|
rv = EcProtect(devidx, select_rw);
|
||||||
* VbExEcStayInRO(), we need to reboot the EC to unlock the
|
if (rv != VBERROR_SUCCESS)
|
||||||
* ability to jump to the RW firmware.
|
return rv;
|
||||||
*
|
|
||||||
* All other errors trigger recovery mode.
|
|
||||||
*/
|
|
||||||
if (rv != VBERROR_EC_REBOOT_TO_RO_REQUIRED)
|
|
||||||
VbSetRecoveryRequest(VBNV_RECOVERY_EC_JUMP_RW);
|
|
||||||
|
|
||||||
return VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
|
||||||
}
|
|
||||||
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() jumped to EC-RW\n"));
|
|
||||||
|
|
||||||
rv = VbExEcDisableJump(devidx);
|
rv = VbExEcDisableJump(devidx);
|
||||||
if (rv != VBERROR_SUCCESS) {
|
if (rv != VBERROR_SUCCESS) {
|
||||||
@@ -959,7 +1045,7 @@ VbError_t VbEcSoftwareSync(int devidx, VbCommonParams *cparams)
|
|||||||
* - the system has slow EC update flag set
|
* - the system has slow EC update flag set
|
||||||
* - the VGA Option ROM was needed and loaded
|
* - the VGA Option ROM was needed and loaded
|
||||||
*/
|
*/
|
||||||
if (need_update &&
|
if (updated_rw &&
|
||||||
!(shared->flags & VBSD_BOOT_DEV_SWITCH_ON) &&
|
!(shared->flags & VBSD_BOOT_DEV_SWITCH_ON) &&
|
||||||
(shared->flags & VBSD_EC_SLOW_UPDATE) &&
|
(shared->flags & VBSD_EC_SLOW_UPDATE) &&
|
||||||
(shared->flags & VBSD_OPROM_MATTERS) &&
|
(shared->flags & VBSD_OPROM_MATTERS) &&
|
||||||
@@ -969,8 +1055,8 @@ VbError_t VbEcSoftwareSync(int devidx, VbCommonParams *cparams)
|
|||||||
return VBERROR_VGA_OPROM_MISMATCH;
|
return VBERROR_VGA_OPROM_MISMATCH;
|
||||||
}
|
}
|
||||||
|
|
||||||
VBDEBUG(("VbEcSoftwareSync() in RW; done\n"));
|
|
||||||
return VBERROR_SUCCESS;
|
return rv;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* This function is also used by tests */
|
/* This function is also used by tests */
|
||||||
|
|||||||
@@ -30,17 +30,22 @@ static int trust_ec;
|
|||||||
static int mock_in_rw;
|
static int mock_in_rw;
|
||||||
static VbError_t in_rw_retval;
|
static VbError_t in_rw_retval;
|
||||||
static int protect_retval;
|
static int protect_retval;
|
||||||
static int ec_protected;
|
static int ec_ro_protected;
|
||||||
|
static int ec_rw_protected;
|
||||||
static int run_retval;
|
static int run_retval;
|
||||||
static int ec_run_image;
|
static int ec_run_image;
|
||||||
static int update_retval;
|
static int update_retval;
|
||||||
static int ec_updated;
|
static int ec_ro_updated;
|
||||||
|
static int ec_rw_updated;
|
||||||
static int get_expected_retval;
|
static int get_expected_retval;
|
||||||
static int shutdown_request_calls_left;
|
static int shutdown_request_calls_left;
|
||||||
|
|
||||||
static uint8_t mock_ec_hash[32];
|
static uint8_t mock_ec_ro_hash[32];
|
||||||
static int mock_ec_hash_size;
|
static uint8_t mock_ec_rw_hash[32];
|
||||||
|
static int mock_ec_ro_hash_size;
|
||||||
|
static int mock_ec_rw_hash_size;
|
||||||
static uint8_t want_ec_hash[32];
|
static uint8_t want_ec_hash[32];
|
||||||
|
static uint8_t update_hash;
|
||||||
static int want_ec_hash_size;
|
static int want_ec_hash_size;
|
||||||
static uint8_t mock_sha[32];
|
static uint8_t mock_sha[32];
|
||||||
|
|
||||||
@@ -73,9 +78,11 @@ static void ResetMocks(void)
|
|||||||
|
|
||||||
trust_ec = 0;
|
trust_ec = 0;
|
||||||
mock_in_rw = 0;
|
mock_in_rw = 0;
|
||||||
ec_protected = 0;
|
ec_ro_protected = 0;
|
||||||
|
ec_rw_protected = 0;
|
||||||
ec_run_image = 0; /* 0 = RO, 1 = RW */
|
ec_run_image = 0; /* 0 = RO, 1 = RW */
|
||||||
ec_updated = 0;
|
ec_ro_updated = 0;
|
||||||
|
ec_rw_updated = 0;
|
||||||
in_rw_retval = VBERROR_SUCCESS;
|
in_rw_retval = VBERROR_SUCCESS;
|
||||||
protect_retval = VBERROR_SUCCESS;
|
protect_retval = VBERROR_SUCCESS;
|
||||||
update_retval = VBERROR_SUCCESS;
|
update_retval = VBERROR_SUCCESS;
|
||||||
@@ -83,14 +90,20 @@ static void ResetMocks(void)
|
|||||||
get_expected_retval = VBERROR_SUCCESS;
|
get_expected_retval = VBERROR_SUCCESS;
|
||||||
shutdown_request_calls_left = -1;
|
shutdown_request_calls_left = -1;
|
||||||
|
|
||||||
Memset(mock_ec_hash, 0, sizeof(mock_ec_hash));
|
Memset(mock_ec_ro_hash, 0, sizeof(mock_ec_ro_hash));
|
||||||
mock_ec_hash[0] = 42;
|
mock_ec_ro_hash[0] = 42;
|
||||||
mock_ec_hash_size = sizeof(mock_ec_hash);
|
mock_ec_ro_hash_size = sizeof(mock_ec_ro_hash);
|
||||||
|
|
||||||
|
Memset(mock_ec_rw_hash, 0, sizeof(mock_ec_rw_hash));
|
||||||
|
mock_ec_rw_hash[0] = 42;
|
||||||
|
mock_ec_rw_hash_size = sizeof(mock_ec_rw_hash);
|
||||||
|
|
||||||
Memset(want_ec_hash, 0, sizeof(want_ec_hash));
|
Memset(want_ec_hash, 0, sizeof(want_ec_hash));
|
||||||
want_ec_hash[0] = 42;
|
want_ec_hash[0] = 42;
|
||||||
want_ec_hash_size = sizeof(want_ec_hash);
|
want_ec_hash_size = sizeof(want_ec_hash);
|
||||||
|
|
||||||
|
update_hash = 42;
|
||||||
|
|
||||||
Memset(mock_sha, 0, sizeof(want_ec_hash));
|
Memset(mock_sha, 0, sizeof(want_ec_hash));
|
||||||
mock_sha[0] = 42;
|
mock_sha[0] = 42;
|
||||||
|
|
||||||
@@ -125,7 +138,10 @@ VbError_t VbExEcRunningRW(int devidx, int *in_rw)
|
|||||||
|
|
||||||
VbError_t VbExEcProtect(int devidx, enum VbSelectFirmware_t select)
|
VbError_t VbExEcProtect(int devidx, enum VbSelectFirmware_t select)
|
||||||
{
|
{
|
||||||
ec_protected = 1;
|
if (select == VB_SELECT_FIRMWARE_READONLY)
|
||||||
|
ec_ro_protected = 1;
|
||||||
|
else
|
||||||
|
ec_rw_protected = 1;
|
||||||
return protect_retval;
|
return protect_retval;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -137,15 +153,18 @@ VbError_t VbExEcDisableJump(int devidx)
|
|||||||
VbError_t VbExEcJumpToRW(int devidx)
|
VbError_t VbExEcJumpToRW(int devidx)
|
||||||
{
|
{
|
||||||
ec_run_image = 1;
|
ec_run_image = 1;
|
||||||
|
mock_in_rw = 1;
|
||||||
return run_retval;
|
return run_retval;
|
||||||
}
|
}
|
||||||
|
|
||||||
VbError_t VbExEcHashImage(int devidx, enum VbSelectFirmware_t select,
|
VbError_t VbExEcHashImage(int devidx, enum VbSelectFirmware_t select,
|
||||||
const uint8_t **hash, int *hash_size)
|
const uint8_t **hash, int *hash_size)
|
||||||
{
|
{
|
||||||
*hash = mock_ec_hash;
|
*hash = select == VB_SELECT_FIRMWARE_READONLY ?
|
||||||
*hash_size = mock_ec_hash_size;
|
mock_ec_ro_hash : mock_ec_rw_hash;
|
||||||
return mock_ec_hash_size ? VBERROR_SUCCESS : VBERROR_SIMULATED;
|
*hash_size = select == VB_SELECT_FIRMWARE_READONLY ?
|
||||||
|
mock_ec_ro_hash_size : mock_ec_rw_hash_size;
|
||||||
|
return *hash_size ? VBERROR_SUCCESS : VBERROR_SIMULATED;
|
||||||
}
|
}
|
||||||
|
|
||||||
VbError_t VbExEcGetExpectedImage(int devidx, enum VbSelectFirmware_t select,
|
VbError_t VbExEcGetExpectedImage(int devidx, enum VbSelectFirmware_t select,
|
||||||
@@ -178,7 +197,13 @@ uint8_t *internal_SHA256(const uint8_t *data, uint64_t len, uint8_t *digest)
|
|||||||
VbError_t VbExEcUpdateImage(int devidx, enum VbSelectFirmware_t select,
|
VbError_t VbExEcUpdateImage(int devidx, enum VbSelectFirmware_t select,
|
||||||
const uint8_t *image, int image_size)
|
const uint8_t *image, int image_size)
|
||||||
{
|
{
|
||||||
ec_updated = 1;
|
if (select == VB_SELECT_FIRMWARE_READONLY) {
|
||||||
|
ec_ro_updated = 1;
|
||||||
|
mock_ec_ro_hash[0] = update_hash;
|
||||||
|
} else {
|
||||||
|
ec_rw_updated = 1;
|
||||||
|
mock_ec_rw_hash[0] = update_hash;
|
||||||
|
}
|
||||||
return update_retval;
|
return update_retval;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -208,7 +233,7 @@ static void VbSoftwareSyncTest(void)
|
|||||||
ResetMocks();
|
ResetMocks();
|
||||||
shared->recovery_reason = 123;
|
shared->recovery_reason = 123;
|
||||||
test_ssync(0, 0, "In recovery, EC-RO");
|
test_ssync(0, 0, "In recovery, EC-RO");
|
||||||
TEST_EQ(ec_protected, 0, " ec protected");
|
TEST_EQ(ec_rw_protected, 0, " ec rw protected");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
shared->recovery_reason = 123;
|
shared->recovery_reason = 123;
|
||||||
@@ -231,7 +256,7 @@ static void VbSoftwareSyncTest(void)
|
|||||||
ResetMocks();
|
ResetMocks();
|
||||||
shared->flags |= VBSD_LF_USE_RO_NORMAL;
|
shared->flags |= VBSD_LF_USE_RO_NORMAL;
|
||||||
test_ssync(0, 0, "AP-RO, EC-RO");
|
test_ssync(0, 0, "AP-RO, EC-RO");
|
||||||
TEST_EQ(ec_protected, 1, " ec protected");
|
TEST_EQ(ec_rw_protected, 1, " ec rw protected");
|
||||||
TEST_EQ(ec_run_image, 0, " ec run image");
|
TEST_EQ(ec_run_image, 0, " ec run image");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
@@ -254,12 +279,12 @@ static void VbSoftwareSyncTest(void)
|
|||||||
|
|
||||||
/* Calculate hashes */
|
/* Calculate hashes */
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
mock_ec_hash_size = 0;
|
mock_ec_rw_hash_size = 0;
|
||||||
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
||||||
VBNV_RECOVERY_EC_HASH_FAILED, "Bad EC hash");
|
VBNV_RECOVERY_EC_HASH_FAILED, "Bad EC hash");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
mock_ec_hash_size = 16;
|
mock_ec_rw_hash_size = 16;
|
||||||
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
||||||
VBNV_RECOVERY_EC_HASH_SIZE, "Bad EC hash size");
|
VBNV_RECOVERY_EC_HASH_SIZE, "Bad EC hash size");
|
||||||
|
|
||||||
@@ -295,32 +320,90 @@ static void VbSoftwareSyncTest(void)
|
|||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
mock_in_rw = 1;
|
mock_in_rw = 1;
|
||||||
mock_ec_hash[0]++;
|
mock_ec_rw_hash[0]++;
|
||||||
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
||||||
0, "Pending update needs reboot");
|
0, "Pending update needs reboot");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
mock_ec_hash[0]++;
|
mock_ec_rw_hash[0]++;
|
||||||
test_ssync(0, 0, "Update without reboot");
|
VbNvSet(VbApiKernelGetVnc(), VBNV_TRY_RO_SYNC, 1);
|
||||||
TEST_EQ(ec_protected, 1, " ec protected");
|
test_ssync(0, 0, "Update rw without reboot");
|
||||||
|
TEST_EQ(ec_rw_protected, 1, " ec rw protected");
|
||||||
TEST_EQ(ec_run_image, 1, " ec run image");
|
TEST_EQ(ec_run_image, 1, " ec run image");
|
||||||
TEST_EQ(ec_updated, 1, " ec updated");
|
TEST_EQ(ec_rw_updated, 1, " ec rw updated");
|
||||||
|
TEST_EQ(ec_ro_protected, 1, " ec ro protected");
|
||||||
|
TEST_EQ(ec_ro_updated, 0, " ec ro updated");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
mock_ec_hash[0]++;
|
mock_ec_rw_hash[0]++;
|
||||||
|
mock_ec_ro_hash[0]++;
|
||||||
|
VbNvSet(VbApiKernelGetVnc(), VBNV_TRY_RO_SYNC, 1);
|
||||||
|
test_ssync(0, 0, "Update rw and ro images without reboot");
|
||||||
|
TEST_EQ(ec_rw_protected, 1, " ec rw protected");
|
||||||
|
TEST_EQ(ec_run_image, 1, " ec run image");
|
||||||
|
TEST_EQ(ec_rw_updated, 1, " ec rw updated");
|
||||||
|
TEST_EQ(ec_ro_protected, 1, " ec ro protected");
|
||||||
|
TEST_EQ(ec_ro_updated, 1, " ec ro updated");
|
||||||
|
|
||||||
|
ResetMocks();
|
||||||
|
shared->flags |= VBSD_BOOT_FIRMWARE_WP_ENABLED;
|
||||||
|
VbNvSet(VbApiKernelGetVnc(), VBNV_TRY_RO_SYNC, 1);
|
||||||
|
mock_ec_rw_hash[0]++;
|
||||||
|
mock_ec_ro_hash[0]++;
|
||||||
|
test_ssync(0, 0, "WP enabled");
|
||||||
|
TEST_EQ(ec_rw_protected, 1, " ec rw protected");
|
||||||
|
TEST_EQ(ec_run_image, 1, " ec run image");
|
||||||
|
TEST_EQ(ec_rw_updated, 1, " ec rw updated");
|
||||||
|
TEST_EQ(ec_ro_protected, 1, " ec ro protected");
|
||||||
|
TEST_EQ(ec_ro_updated, 0, " ec ro updated");
|
||||||
|
|
||||||
|
ResetMocks();
|
||||||
|
VbNvSet(VbApiKernelGetVnc(), VBNV_TRY_RO_SYNC, 1);
|
||||||
|
mock_ec_ro_hash[0]++;
|
||||||
|
test_ssync(0, 0, "rw update not needed");
|
||||||
|
TEST_EQ(ec_rw_protected, 1, " ec rw protected");
|
||||||
|
TEST_EQ(ec_run_image, 1, " ec run image");
|
||||||
|
TEST_EQ(ec_rw_updated, 0, " ec rw not updated");
|
||||||
|
TEST_EQ(ec_ro_protected, 1, " ec ro protected");
|
||||||
|
TEST_EQ(ec_ro_updated, 1, " ec ro updated");
|
||||||
|
|
||||||
|
ResetMocks();
|
||||||
|
mock_ec_rw_hash[0]++;
|
||||||
|
mock_ec_ro_hash[0]++;
|
||||||
|
test_ssync(0, 0, "ro update not requested");
|
||||||
|
TEST_EQ(ec_rw_protected, 1, " ec rw protected");
|
||||||
|
TEST_EQ(ec_run_image, 1, " ec run image");
|
||||||
|
TEST_EQ(ec_rw_updated, 1, " ec rw updated");
|
||||||
|
TEST_EQ(ec_ro_protected, 1, " ec ro protected");
|
||||||
|
TEST_EQ(ec_ro_updated, 0, " ec ro updated");
|
||||||
|
|
||||||
|
ResetMocks();
|
||||||
|
mock_ec_rw_hash[0]++;
|
||||||
|
update_hash++;
|
||||||
|
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
||||||
|
VBNV_RECOVERY_EC_UPDATE, "updated hash mismatch");
|
||||||
|
TEST_EQ(ec_rw_protected, 0, " ec rw protected");
|
||||||
|
TEST_EQ(ec_run_image, 0, " ec run image");
|
||||||
|
TEST_EQ(ec_rw_updated, 1, " ec rw updated");
|
||||||
|
TEST_EQ(ec_ro_protected, 0, " ec ro protected");
|
||||||
|
TEST_EQ(ec_ro_updated, 0, " ec ro updated");
|
||||||
|
|
||||||
|
ResetMocks();
|
||||||
|
mock_ec_rw_hash[0]++;
|
||||||
update_retval = VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
update_retval = VBERROR_EC_REBOOT_TO_RO_REQUIRED;
|
||||||
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
||||||
0, "Reboot after update");
|
0, "Reboot after rw update");
|
||||||
TEST_EQ(ec_updated, 1, " ec updated");
|
TEST_EQ(ec_rw_updated, 1, " ec rw updated");
|
||||||
|
TEST_EQ(ec_ro_updated, 0, " ec rw updated");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
mock_ec_hash[0]++;
|
mock_ec_rw_hash[0]++;
|
||||||
update_retval = VBERROR_SIMULATED;
|
update_retval = VBERROR_SIMULATED;
|
||||||
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
|
||||||
VBNV_RECOVERY_EC_UPDATE, "Update failed");
|
VBNV_RECOVERY_EC_UPDATE, "Update failed");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
mock_ec_hash[0]++;
|
mock_ec_rw_hash[0]++;
|
||||||
shared->flags |= VBSD_EC_SLOW_UPDATE;
|
shared->flags |= VBSD_EC_SLOW_UPDATE;
|
||||||
test_ssync(0, 0, "Slow update");
|
test_ssync(0, 0, "Slow update");
|
||||||
TEST_EQ(screens_displayed[0], VB_SCREEN_WAIT, " wait screen");
|
TEST_EQ(screens_displayed[0], VB_SCREEN_WAIT, " wait screen");
|
||||||
@@ -332,9 +415,11 @@ static void VbSoftwareSyncTest(void)
|
|||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
test_ssync(0, 0, "AP-RW, EC-RO -> EC-RW");
|
test_ssync(0, 0, "AP-RW, EC-RO -> EC-RW");
|
||||||
TEST_EQ(ec_protected, 1, " ec protected");
|
TEST_EQ(ec_rw_protected, 1, " ec rw protected");
|
||||||
TEST_EQ(ec_run_image, 1, " ec run image");
|
TEST_EQ(ec_run_image, 1, " ec run image");
|
||||||
TEST_EQ(ec_updated, 0, " ec updated");
|
TEST_EQ(ec_rw_updated, 0, " ec rw updated");
|
||||||
|
TEST_EQ(ec_ro_protected, 1, " ec ro protected");
|
||||||
|
TEST_EQ(ec_ro_updated, 0, " ec ro updated");
|
||||||
|
|
||||||
ResetMocks();
|
ResetMocks();
|
||||||
run_retval = VBERROR_SIMULATED;
|
run_retval = VBERROR_SIMULATED;
|
||||||
|
|||||||
Reference in New Issue
Block a user