mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2026-01-15 00:56:22 +00:00
The region API was a way for firmware and kernel verification to get at various blocks of caller-provided data. In practice, we only used it internally as a way to get at parts of the GBB. Prune it down to access only the bits of GBB we still need, from the buffer we already know we have. In the long run we should use the same vb2ex_read_resource() API that vb2 firmware verification does, but that should be done in a follow-up CL since it'll need to be coordinated with support in depthcharge. No change in functionality. BUG=chromium:611535 BRANCH=none TEST=make -j runtests; build bob firmware and boot it Change-Id: I5715cb8d88274164a1a73ed4a56bbd93af46f9bf Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/852798 Commit-Ready: ChromeOS CL Exonerator Bot <chromiumos-cl-exonerator@appspot.gserviceaccount.com> Reviewed-by: Stefan Reinauer <reinauer@chromium.org>
470 lines
16 KiB
C
470 lines
16 KiB
C
/* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* Display functions used in kernel selection.
|
|
*/
|
|
|
|
#include "sysincludes.h"
|
|
#include "2sysincludes.h"
|
|
|
|
#include "2common.h"
|
|
#include "2misc.h"
|
|
#include "2nvstorage.h"
|
|
#include "2sha.h"
|
|
#include "bmpblk_font.h"
|
|
#include "gbb_access.h"
|
|
#include "gbb_header.h"
|
|
#include "utility.h"
|
|
#include "vboot_api.h"
|
|
#include "vboot_common.h"
|
|
#include "vboot_display.h"
|
|
|
|
static uint32_t disp_current_screen = VB_SCREEN_BLANK;
|
|
static uint32_t disp_current_index = 0;
|
|
static uint32_t disp_disabled_idx_mask = 0;
|
|
|
|
__attribute__((weak))
|
|
VbError_t VbExGetLocalizationCount(uint32_t *count) {
|
|
*count = 0;
|
|
return VBERROR_UNKNOWN;
|
|
}
|
|
|
|
VbError_t VbDisplayScreen(struct vb2_context *ctx, uint32_t screen, int force)
|
|
{
|
|
uint32_t locale;
|
|
VbError_t rv;
|
|
|
|
/* If requested screen is the same as the current one, we're done. */
|
|
if (disp_current_screen == screen && !force)
|
|
return VBERROR_SUCCESS;
|
|
|
|
/* Read the locale last saved */
|
|
locale = vb2_nv_get(ctx, VB2_NV_LOCALIZATION_INDEX);
|
|
|
|
rv = VbExDisplayScreen(screen, locale);
|
|
|
|
if (rv == VBERROR_SUCCESS)
|
|
/* Keep track of the currently displayed screen */
|
|
disp_current_screen = screen;
|
|
|
|
return rv;
|
|
}
|
|
|
|
VbError_t VbDisplayMenu(struct vb2_context *ctx, uint32_t screen, int force,
|
|
uint32_t selected_index, uint32_t disabled_idx_mask)
|
|
{
|
|
uint32_t locale;
|
|
VbError_t rv;
|
|
uint32_t redraw_base_screen = 0;
|
|
|
|
/*
|
|
* If requested screen/selected_index is the same as the current one,
|
|
* we're done.
|
|
*/
|
|
if (disp_current_screen == screen &&
|
|
disp_current_index == selected_index &&
|
|
!force)
|
|
return VBERROR_SUCCESS;
|
|
|
|
/*
|
|
* If current screen is not the same, make sure we redraw the base
|
|
* screen as well to avoid having artifacts from the menu.
|
|
*/
|
|
if (disp_current_screen != screen)
|
|
redraw_base_screen = 1;
|
|
|
|
/* Read the locale last saved */
|
|
locale = vb2_nv_get(ctx, VB2_NV_LOCALIZATION_INDEX);
|
|
|
|
rv = VbExDisplayMenu(screen, locale, selected_index,
|
|
disabled_idx_mask, redraw_base_screen);
|
|
|
|
if (rv == VBERROR_SUCCESS) {
|
|
/*
|
|
* Keep track of the currently displayed screen and
|
|
* selected_index
|
|
*/
|
|
disp_current_screen = screen;
|
|
disp_current_index = selected_index;
|
|
disp_disabled_idx_mask = disabled_idx_mask;
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
static void Uint8ToString(char *buf, uint8_t val)
|
|
{
|
|
const char *trans = "0123456789abcdef";
|
|
*buf++ = trans[val >> 4];
|
|
*buf = trans[val & 0xF];
|
|
}
|
|
|
|
static void FillInSha1Sum(char *outbuf, VbPublicKey *key)
|
|
{
|
|
uint8_t *buf = ((uint8_t *)key) + key->key_offset;
|
|
uint64_t buflen = key->key_size;
|
|
uint8_t digest[VB2_SHA1_DIGEST_SIZE];
|
|
int i;
|
|
|
|
vb2_digest_buffer(buf, buflen, VB2_HASH_SHA1, digest, sizeof(digest));
|
|
for (i = 0; i < sizeof(digest); i++) {
|
|
Uint8ToString(outbuf, digest[i]);
|
|
outbuf += 2;
|
|
}
|
|
*outbuf = '\0';
|
|
}
|
|
|
|
const char *RecoveryReasonString(uint8_t code)
|
|
{
|
|
switch(code) {
|
|
case VB2_RECOVERY_NOT_REQUESTED:
|
|
return "Recovery not requested";
|
|
case VB2_RECOVERY_LEGACY:
|
|
return "Recovery requested from legacy utility";
|
|
case VB2_RECOVERY_RO_MANUAL:
|
|
return "recovery button pressed";
|
|
case VB2_RECOVERY_RO_INVALID_RW:
|
|
return "RW firmware failed signature check";
|
|
case VB2_RECOVERY_RO_S3_RESUME:
|
|
return "S3 resume failed";
|
|
case VB2_RECOVERY_DEP_RO_TPM_ERROR:
|
|
return "TPM error in read-only firmware";
|
|
case VB2_RECOVERY_RO_SHARED_DATA:
|
|
return "Shared data error in read-only firmware";
|
|
case VB2_RECOVERY_RO_TEST_S3:
|
|
return "Test error from S3Resume()";
|
|
case VB2_RECOVERY_RO_TEST_LFS:
|
|
return "Test error from LoadFirmwareSetup()";
|
|
case VB2_RECOVERY_RO_TEST_LF:
|
|
return "Test error from LoadFirmware()";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_NOT_DONE:
|
|
return "RW firmware check not done";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_DEV_MISMATCH:
|
|
return "RW firmware developer flag mismatch";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_REC_MISMATCH:
|
|
return "RW firmware recovery flag mismatch";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN +
|
|
VBSD_LF_CHECK_VERIFY_KEYBLOCK:
|
|
return "RW firmware unable to verify key block";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_KEY_ROLLBACK:
|
|
return "RW firmware key version rollback detected";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN +
|
|
VBSD_LF_CHECK_DATA_KEY_PARSE:
|
|
return "RW firmware unable to parse data key";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN +
|
|
VBSD_LF_CHECK_VERIFY_PREAMBLE:
|
|
return "RW firmware unable to verify preamble";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_FW_ROLLBACK:
|
|
return "RW firmware version rollback detected";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_GET_FW_BODY:
|
|
return "RW firmware unable to get firmware body";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN +
|
|
VBSD_LF_CHECK_HASH_WRONG_SIZE:
|
|
return "RW firmware hash is wrong size";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_VERIFY_BODY:
|
|
return "RW firmware unable to verify firmware body";
|
|
case VB2_RECOVERY_RO_INVALID_RW_CHECK_MIN + VBSD_LF_CHECK_NO_RO_NORMAL:
|
|
return "RW firmware read-only normal path is not supported";
|
|
case VB2_RECOVERY_RO_FIRMWARE:
|
|
return "Firmware problem outside of verified boot";
|
|
case VB2_RECOVERY_RO_TPM_REBOOT:
|
|
return "TPM requires a system reboot (should be transient)";
|
|
case VB2_RECOVERY_EC_SOFTWARE_SYNC:
|
|
return "EC software sync error";
|
|
case VB2_RECOVERY_EC_UNKNOWN_IMAGE:
|
|
return "EC software sync unable to determine active EC image";
|
|
case VB2_RECOVERY_DEP_EC_HASH:
|
|
return "EC software sync error obtaining EC image hash";
|
|
case VB2_RECOVERY_EC_EXPECTED_IMAGE:
|
|
return "EC software sync error "
|
|
"obtaining expected EC image from BIOS";
|
|
case VB2_RECOVERY_EC_EXPECTED_HASH:
|
|
return "EC software sync error "
|
|
"obtaining expected EC hash from BIOS";
|
|
case VB2_RECOVERY_EC_HASH_MISMATCH:
|
|
return "EC software sync error "
|
|
"comparing expected EC hash and image";
|
|
case VB2_RECOVERY_EC_UPDATE:
|
|
return "EC software sync error updating EC";
|
|
case VB2_RECOVERY_EC_JUMP_RW:
|
|
return "EC software sync unable to jump to EC-RW";
|
|
case VB2_RECOVERY_EC_PROTECT:
|
|
return "EC software sync protection error";
|
|
case VB2_RECOVERY_SECDATA_INIT:
|
|
return "Secure NVRAM (TPM) initialization error";
|
|
case VB2_RECOVERY_GBB_HEADER:
|
|
return "Error parsing GBB header";
|
|
case VB2_RECOVERY_TPM_CLEAR_OWNER:
|
|
return "Error trying to clear TPM owner";
|
|
case VB2_RECOVERY_DEV_SWITCH:
|
|
return "Error reading or updating developer switch";
|
|
case VB2_RECOVERY_FW_SLOT:
|
|
return "Error selecting RW firmware slot";
|
|
case VB2_RECOVERY_RO_UNSPECIFIED:
|
|
return "Unspecified/unknown error in RO firmware";
|
|
case VB2_RECOVERY_RW_DEV_SCREEN:
|
|
return "User requested recovery from dev-mode warning screen";
|
|
case VB2_RECOVERY_RW_NO_OS:
|
|
return "No OS kernel detected (or kernel rollback attempt?)";
|
|
case VB2_RECOVERY_RW_INVALID_OS:
|
|
return "OS kernel failed signature check";
|
|
case VB2_RECOVERY_DEP_RW_TPM_ERROR:
|
|
return "TPM error in rewritable firmware";
|
|
case VB2_RECOVERY_RW_DEV_MISMATCH:
|
|
return "RW firmware in dev mode, but dev switch is off";
|
|
case VB2_RECOVERY_RW_SHARED_DATA:
|
|
return "Shared data error in rewritable firmware";
|
|
case VB2_RECOVERY_RW_TEST_LK:
|
|
return "Test error from LoadKernel()";
|
|
case VB2_RECOVERY_DEP_RW_NO_DISK:
|
|
return "No bootable disk found";
|
|
case VB2_RECOVERY_TPM_E_FAIL:
|
|
return "TPM error that was not fixed by reboot";
|
|
case VB2_RECOVERY_RO_TPM_S_ERROR:
|
|
return "TPM setup error in read-only firmware";
|
|
case VB2_RECOVERY_RO_TPM_W_ERROR:
|
|
return "TPM write error in read-only firmware";
|
|
case VB2_RECOVERY_RO_TPM_L_ERROR:
|
|
return "TPM lock error in read-only firmware";
|
|
case VB2_RECOVERY_RO_TPM_U_ERROR:
|
|
return "TPM update error in read-only firmware";
|
|
case VB2_RECOVERY_RW_TPM_R_ERROR:
|
|
return "TPM read error in rewritable firmware";
|
|
case VB2_RECOVERY_RW_TPM_W_ERROR:
|
|
return "TPM write error in rewritable firmware";
|
|
case VB2_RECOVERY_RW_TPM_L_ERROR:
|
|
return "TPM lock error in rewritable firmware";
|
|
case VB2_RECOVERY_EC_HASH_FAILED:
|
|
return "EC software sync unable to get EC image hash";
|
|
case VB2_RECOVERY_EC_HASH_SIZE:
|
|
return "EC software sync invalid image hash size";
|
|
case VB2_RECOVERY_LK_UNSPECIFIED:
|
|
return "Unspecified error while trying to load kernel";
|
|
case VB2_RECOVERY_RW_NO_DISK:
|
|
return "No bootable storage device in system";
|
|
case VB2_RECOVERY_RW_NO_KERNEL:
|
|
return "No bootable kernel found on disk";
|
|
case VB2_RECOVERY_RW_BCB_ERROR:
|
|
return "BCB partition error on disk";
|
|
case VB2_RECOVERY_FW_FASTBOOT:
|
|
return "Fastboot-mode requested in firmware";
|
|
case VB2_RECOVERY_RO_TPM_REC_HASH_L_ERROR:
|
|
return "Recovery hash space lock error in RO firmware";
|
|
case VB2_RECOVERY_RW_UNSPECIFIED:
|
|
return "Unspecified/unknown error in RW firmware";
|
|
case VB2_RECOVERY_KE_DM_VERITY:
|
|
return "DM-verity error";
|
|
case VB2_RECOVERY_KE_UNSPECIFIED:
|
|
return "Unspecified/unknown error in kernel";
|
|
case VB2_RECOVERY_US_TEST:
|
|
return "Recovery mode test from user-mode";
|
|
case VB2_RECOVERY_BCB_USER_MODE:
|
|
return "User-mode requested recovery via BCB";
|
|
case VB2_RECOVERY_US_FASTBOOT:
|
|
return "User-mode requested fastboot mode";
|
|
case VB2_RECOVERY_TRAIN_AND_REBOOT:
|
|
return "User-mode requested DRAM train and reboot";
|
|
case VB2_RECOVERY_US_UNSPECIFIED:
|
|
return "Unspecified/unknown error in user-mode";
|
|
}
|
|
return "We have no idea what this means";
|
|
}
|
|
|
|
#define DEBUG_INFO_SIZE 512
|
|
|
|
VbError_t VbDisplayDebugInfo(struct vb2_context *ctx)
|
|
{
|
|
struct vb2_shared_data *sd = vb2_get_sd(ctx);
|
|
VbSharedDataHeader *shared = sd->vbsd;
|
|
char buf[DEBUG_INFO_SIZE] = "";
|
|
char sha1sum[VB2_SHA1_DIGEST_SIZE * 2 + 1];
|
|
char hwid[256];
|
|
uint32_t used = 0;
|
|
VbPublicKey *key;
|
|
VbError_t ret;
|
|
uint32_t i;
|
|
|
|
/* Redisplay current screen to overwrite any previous debug output.
|
|
* Need to use VbDisplayMenu instead of VbDisplayScreen
|
|
* in order to ensure that the selected menu item is
|
|
* highlighted. On a non-detachable screen, this will be a
|
|
* no-op.
|
|
*/
|
|
VbDisplayMenu(ctx, disp_current_screen, 1,
|
|
disp_current_index, disp_disabled_idx_mask);
|
|
|
|
/* Add hardware ID */
|
|
VbGbbReadHWID(ctx, hwid, sizeof(hwid));
|
|
used += StrnAppend(buf + used, "HWID: ", DEBUG_INFO_SIZE - used);
|
|
used += StrnAppend(buf + used, hwid, DEBUG_INFO_SIZE - used);
|
|
|
|
/* Add recovery reason and subcode */
|
|
i = vb2_nv_get(ctx, VB2_NV_RECOVERY_SUBCODE);
|
|
used += StrnAppend(buf + used,
|
|
"\nrecovery_reason: 0x", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used,
|
|
shared->recovery_reason, 16, 2);
|
|
used += StrnAppend(buf + used, " / 0x", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used, i, 16, 2);
|
|
used += StrnAppend(buf + used, " ", DEBUG_INFO_SIZE - used);
|
|
used += StrnAppend(buf + used,
|
|
RecoveryReasonString(shared->recovery_reason),
|
|
DEBUG_INFO_SIZE - used);
|
|
|
|
/* Add VbSharedData flags */
|
|
used += StrnAppend(buf + used, "\nVbSD.flags: 0x", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used,
|
|
shared->flags, 16, 8);
|
|
|
|
/* Add raw contents of VbNvStorage */
|
|
used += StrnAppend(buf + used, "\nVbNv.raw:", DEBUG_INFO_SIZE - used);
|
|
for (i = 0; i < VBNV_BLOCK_SIZE; i++) {
|
|
used += StrnAppend(buf + used, " ", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used,
|
|
ctx->nvdata[i], 16, 2);
|
|
}
|
|
|
|
/* Add dev_boot_usb flag */
|
|
i = vb2_nv_get(ctx, VB2_NV_DEV_BOOT_USB);
|
|
used += StrnAppend(buf + used, "\ndev_boot_usb: ", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used, i, 10, 0);
|
|
|
|
/* Add dev_boot_legacy flag */
|
|
i = vb2_nv_get(ctx, VB2_NV_DEV_BOOT_LEGACY);
|
|
used += StrnAppend(buf + used,
|
|
"\ndev_boot_legacy: ", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used, i, 10, 0);
|
|
|
|
/* Add dev_default_boot flag */
|
|
i = vb2_nv_get(ctx, VB2_NV_DEV_DEFAULT_BOOT);
|
|
used += StrnAppend(buf + used,
|
|
"\ndev_default_boot: ", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used, i, 10, 0);
|
|
|
|
/* Add dev_boot_signed_only flag */
|
|
i = vb2_nv_get(ctx, VB2_NV_DEV_BOOT_SIGNED_ONLY);
|
|
used += StrnAppend(buf + used, "\ndev_boot_signed_only: ",
|
|
DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used, i, 10, 0);
|
|
|
|
/* Add dev_boot_fastboot_full_cap flag */
|
|
i = vb2_nv_get(ctx, VB2_NV_DEV_BOOT_FASTBOOT_FULL_CAP);
|
|
used += StrnAppend(buf + used, "\ndev_boot_fastboot_full_cap: ",
|
|
DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used, i, 10, 0);
|
|
|
|
/* Add TPM versions */
|
|
used += StrnAppend(buf + used,
|
|
"\nTPM: fwver=0x", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used,
|
|
shared->fw_version_tpm, 16, 8);
|
|
used += StrnAppend(buf + used, " kernver=0x", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used,
|
|
shared->kernel_version_tpm, 16, 8);
|
|
|
|
/* Add GBB flags */
|
|
used += StrnAppend(buf + used,
|
|
"\ngbb.flags: 0x", DEBUG_INFO_SIZE - used);
|
|
used += Uint64ToString(buf + used, DEBUG_INFO_SIZE - used,
|
|
sd->gbb_flags, 16, 8);
|
|
|
|
/* Add sha1sum for Root & Recovery keys */
|
|
ret = VbGbbReadRootKey(ctx, &key);
|
|
if (!ret) {
|
|
FillInSha1Sum(sha1sum, key);
|
|
free(key);
|
|
used += StrnAppend(buf + used, "\ngbb.rootkey: ",
|
|
DEBUG_INFO_SIZE - used);
|
|
used += StrnAppend(buf + used, sha1sum,
|
|
DEBUG_INFO_SIZE - used);
|
|
}
|
|
|
|
ret = VbGbbReadRecoveryKey(ctx, &key);
|
|
if (!ret) {
|
|
FillInSha1Sum(sha1sum, key);
|
|
free(key);
|
|
used += StrnAppend(buf + used, "\ngbb.recovery_key: ",
|
|
DEBUG_INFO_SIZE - used);
|
|
used += StrnAppend(buf + used, sha1sum,
|
|
DEBUG_INFO_SIZE - used);
|
|
}
|
|
|
|
/* If we're in dev-mode, show the kernel subkey that we expect, too. */
|
|
if (0 == shared->recovery_reason) {
|
|
FillInSha1Sum(sha1sum, &shared->kernel_subkey);
|
|
used += StrnAppend(buf + used,
|
|
"\nkernel_subkey: ", DEBUG_INFO_SIZE - used);
|
|
used += StrnAppend(buf + used, sha1sum, DEBUG_INFO_SIZE - used);
|
|
}
|
|
|
|
/* Make sure we finish with a newline */
|
|
used += StrnAppend(buf + used, "\n", DEBUG_INFO_SIZE - used);
|
|
|
|
/* TODO: add more interesting data:
|
|
* - Information on current disks */
|
|
|
|
buf[DEBUG_INFO_SIZE - 1] = '\0';
|
|
return VbExDisplayDebugInfo(buf);
|
|
}
|
|
|
|
#define MAGIC_WORD_LEN 5
|
|
#define MAGIC_WORD "xyzzy"
|
|
static uint8_t MagicBuffer[MAGIC_WORD_LEN];
|
|
|
|
VbError_t VbCheckDisplayKey(struct vb2_context *ctx, uint32_t key)
|
|
{
|
|
int i;
|
|
|
|
/* Update key buffer */
|
|
for(i = 1; i < MAGIC_WORD_LEN; i++)
|
|
MagicBuffer[i - 1] = MagicBuffer[i];
|
|
/* Save as lower-case ASCII */
|
|
MagicBuffer[MAGIC_WORD_LEN - 1] = (key | 0x20) & 0xFF;
|
|
|
|
if ('\t' == key) {
|
|
/* Tab = display debug info */
|
|
return VbDisplayDebugInfo(ctx);
|
|
} else if (VB_KEY_LEFT == key || VB_KEY_RIGHT == key ||
|
|
VB_KEY_DOWN == key || VB_KEY_UP == key) {
|
|
/* Arrow keys = change localization */
|
|
uint32_t loc = 0;
|
|
uint32_t count = 0;
|
|
|
|
loc = vb2_nv_get(ctx, VB2_NV_LOCALIZATION_INDEX);
|
|
if (VBERROR_SUCCESS != VbExGetLocalizationCount(&count))
|
|
loc = 0; /* No localization count (bad GBB?) */
|
|
else if (VB_KEY_RIGHT == key || VB_KEY_UP == key)
|
|
loc = (loc < count - 1 ? loc + 1 : 0);
|
|
else
|
|
loc = (loc > 0 ? loc - 1 : count - 1);
|
|
VB2_DEBUG("VbCheckDisplayKey() - change localization to %d\n",
|
|
(int)loc);
|
|
vb2_nv_set(ctx, VB2_NV_LOCALIZATION_INDEX, loc);
|
|
vb2_nv_set(ctx, VB2_NV_BACKUP_NVRAM_REQUEST, 1);
|
|
|
|
#ifdef SAVE_LOCALE_IMMEDIATELY
|
|
/*
|
|
* This is a workaround for coreboot on x86, which will power
|
|
* off asynchronously without giving us a chance to react.
|
|
* This is not an example of the Right Way to do things. See
|
|
* chrome-os-partner:7689.
|
|
*/
|
|
if (ctx->flags & VB2_CONTEXT_NVDATA_CHANGED) {
|
|
VbExNvStorageWrite(ctx.nvdata);
|
|
ctx.flags &= ~VB2_CONTEXT_NVDATA_CHANGED;
|
|
}
|
|
#endif
|
|
|
|
/* Force redraw of current screen */
|
|
return VbDisplayScreen(ctx, disp_current_screen, 1);
|
|
}
|
|
|
|
if (0 == memcmp(MagicBuffer, MAGIC_WORD, MAGIC_WORD_LEN)) {
|
|
if (VBEASTEREGG)
|
|
(void)VbDisplayScreen(ctx, disp_current_screen, 1);
|
|
}
|
|
|
|
return VBERROR_SUCCESS;
|
|
}
|