mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-24 02:05:01 +00:00
BUG=chromium-os:18383 TEST=compiles for both x86 and ARM; boots on my test system Change-Id: I6c7dc1dd086fb06e4ad8daa053bccdf61a463240 Reviewed-on: http://gerrit.chromium.org/gerrit/4977 Reviewed-by: Bill Richardson <wfrichar@chromium.org> Reviewed-by: Stefan Reinauer <reinauer@google.com> Tested-by: Randall Spangler <rspangler@chromium.org>
155 lines
5.0 KiB
C
155 lines
5.0 KiB
C
/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* High-level firmware wrapper API - entry points for init, firmware selection
|
|
*/
|
|
|
|
#include "gbb_header.h"
|
|
#include "load_firmware_fw.h"
|
|
#include "rollback_index.h"
|
|
#include "tpm_bootmode.h"
|
|
#include "utility.h"
|
|
#include "vboot_api.h"
|
|
#include "vboot_common.h"
|
|
#include "vboot_nvstorage.h"
|
|
|
|
|
|
/* Set recovery request */
|
|
static void VbSfRequestRecovery(VbNvContext *vnc, uint32_t recovery_request) {
|
|
VBDEBUG(("VbSfRequestRecovery(%d)\n", (int)recovery_request));
|
|
VbNvSet(vnc, VBNV_RECOVERY_REQUEST, recovery_request);
|
|
}
|
|
|
|
|
|
VbError_t VbSelectFirmware(VbCommonParams* cparams,
|
|
VbSelectFirmwareParams* fparams) {
|
|
VbSharedDataHeader* shared = (VbSharedDataHeader*)cparams->shared_data_blob;
|
|
VbNvContext vnc;
|
|
VbError_t retval = VBERROR_UNKNOWN; /* Assume error until proven successful */
|
|
int is_rec = (shared->recovery_reason ? 1 : 0);
|
|
int is_dev = (shared->flags & VBSD_BOOT_DEV_SWITCH_ON ? 1 : 0);
|
|
uint32_t tpm_version = 0;
|
|
uint32_t tpm_status = 0;
|
|
|
|
/* Start timer */
|
|
shared->timer_vb_select_firmware_enter = VbExGetTimer();
|
|
|
|
/* Load NV storage */
|
|
VbExNvStorageRead(vnc.raw);
|
|
VbNvSetup(&vnc);
|
|
|
|
/* Initialize the TPM */
|
|
VBPERFSTART("VB_TPMI");
|
|
tpm_status = RollbackFirmwareSetup(is_rec, is_dev, &tpm_version);
|
|
VBPERFEND("VB_TPMI");
|
|
if (0 != tpm_status) {
|
|
VBDEBUG(("Unable to setup TPM and read firmware version.\n"));
|
|
|
|
if (TPM_E_MUST_REBOOT == tpm_status) {
|
|
/* TPM wants to reboot into the same mode we're in now */
|
|
VBDEBUG(("TPM requires a reboot.\n"));
|
|
if (!is_rec) {
|
|
/* Not recovery mode. Just reboot (not into recovery). */
|
|
retval = VBERROR_TPM_REBOOT_REQUIRED;
|
|
goto VbSelectFirmware_exit;
|
|
} else if (VBNV_RECOVERY_RO_TPM_REBOOT != shared->recovery_reason) {
|
|
/* In recovery mode now, and we haven't requested a TPM reboot yet,
|
|
* so request one. */
|
|
VbSfRequestRecovery(&vnc, VBNV_RECOVERY_RO_TPM_REBOOT);
|
|
retval = VBERROR_TPM_REBOOT_REQUIRED;
|
|
goto VbSelectFirmware_exit;
|
|
}
|
|
}
|
|
|
|
if (!is_rec) {
|
|
VbSfRequestRecovery(&vnc, VBNV_RECOVERY_RO_TPM_ERROR);
|
|
retval = VBERROR_TPM_FIRMWARE_SETUP;
|
|
goto VbSelectFirmware_exit;
|
|
}
|
|
}
|
|
shared->fw_version_tpm_start = tpm_version;
|
|
shared->fw_version_tpm = tpm_version;
|
|
|
|
if (is_rec) {
|
|
/* Recovery is requested; go straight to recovery without checking the
|
|
* RW firmware. */
|
|
VBDEBUG(("VbSelectFirmware() detected recovery request, reason=%d.\n",
|
|
(int)shared->recovery_reason));
|
|
|
|
/* Go directly to recovery mode */
|
|
fparams->selected_firmware = VB_SELECT_FIRMWARE_RECOVERY;
|
|
|
|
} else {
|
|
/* Chain to LoadFirmware() */
|
|
retval = LoadFirmware(cparams, fparams, &vnc);
|
|
|
|
/* Exit if we failed to find an acceptable firmware */
|
|
if (VBERROR_SUCCESS != retval)
|
|
goto VbSelectFirmware_exit;
|
|
|
|
/* Translate the selected firmware path */
|
|
if (shared->flags & VBSD_LF_USE_RO_NORMAL) {
|
|
/* Request the read-only normal/dev code path */
|
|
fparams->selected_firmware = VB_SELECT_FIRMWARE_READONLY;
|
|
} else if (0 == shared->firmware_index)
|
|
fparams->selected_firmware = VB_SELECT_FIRMWARE_A;
|
|
else
|
|
fparams->selected_firmware = VB_SELECT_FIRMWARE_B;
|
|
|
|
/* Update TPM if necessary */
|
|
if (shared->fw_version_tpm_start < shared->fw_version_tpm) {
|
|
VBPERFSTART("VB_TPMU");
|
|
tpm_status = RollbackFirmwareWrite(shared->fw_version_tpm);
|
|
VBPERFEND("VB_TPMU");
|
|
if (0 != tpm_status) {
|
|
VBDEBUG(("Unable to write firmware version to TPM.\n"));
|
|
VbSfRequestRecovery(&vnc, VBNV_RECOVERY_RO_TPM_ERROR);
|
|
retval = VBERROR_TPM_WRITE_FIRMWARE;
|
|
goto VbSelectFirmware_exit;
|
|
}
|
|
}
|
|
|
|
/* Lock firmware versions in TPM */
|
|
VBPERFSTART("VB_TPML");
|
|
tpm_status = RollbackFirmwareLock();
|
|
VBPERFEND("VB_TPML");
|
|
if (0 != tpm_status) {
|
|
VBDEBUG(("Unable to lock firmware version in TPM.\n"));
|
|
VbSfRequestRecovery(&vnc, VBNV_RECOVERY_RO_TPM_ERROR);
|
|
retval = VBERROR_TPM_LOCK_FIRMWARE;
|
|
goto VbSelectFirmware_exit;
|
|
}
|
|
}
|
|
|
|
/* At this point, we have a good idea of how we are going to
|
|
* boot. Update the TPM with this state information. */
|
|
tpm_status = SetTPMBootModeState(is_dev, is_rec, shared->fw_keyblock_flags);
|
|
if (0 != tpm_status) {
|
|
VBDEBUG(("Unable to update the TPM with boot mode information.\n"));
|
|
if (!is_rec) {
|
|
VbSfRequestRecovery(&vnc, VBNV_RECOVERY_RO_TPM_ERROR);
|
|
retval = VBERROR_TPM_SET_BOOT_MODE_STATE;
|
|
goto VbSelectFirmware_exit;
|
|
}
|
|
}
|
|
|
|
/* Success! */
|
|
retval = VBERROR_SUCCESS;
|
|
|
|
VbSelectFirmware_exit:
|
|
|
|
/* Save NV storage */
|
|
VbNvTeardown(&vnc);
|
|
if (vnc.raw_changed)
|
|
VbExNvStorageWrite(vnc.raw);
|
|
|
|
/* Stop timer */
|
|
shared->timer_vb_select_firmware_exit = VbExGetTimer();
|
|
|
|
/* Should always have a known error code */
|
|
VbAssert(VBERROR_UNKNOWN != retval);
|
|
|
|
return retval;
|
|
}
|