123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659 |
- /* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
- * Use of this source code is governed by a BSD-style license that can be
- * found in the LICENSE file.
- *
- * High-level firmware wrapper API - entry points for kernel selection
- */
- #include "sysincludes.h"
- #include "2sysincludes.h"
- #include "2common.h"
- #include "2misc.h"
- #include "2nvstorage.h"
- #include "2rsa.h"
- #include "ec_sync.h"
- #include "gbb_access.h"
- #include "gbb_header.h"
- #include "load_kernel_fw.h"
- #include "region.h"
- #include "rollback_index.h"
- #include "utility.h"
- #include "vb2_common.h"
- #include "vboot_api.h"
- #include "vboot_common.h"
- #include "vboot_kernel.h"
- #include "vboot_nvstorage.h"
- /* Global variables */
- static VbNvContext vnc;
- static struct RollbackSpaceFwmp fwmp;
- static LoadKernelParams lkp;
- static struct vb2_context ctx;
- static uint8_t *unaligned_workbuf;
- #ifdef CHROMEOS_ENVIRONMENT
- /* Global variable accessors for unit tests */
- struct RollbackSpaceFwmp *VbApiKernelGetFwmp(void)
- {
- return &fwmp;
- }
- struct LoadKernelParams *VbApiKernelGetParams(void)
- {
- return &lkp;
- }
- #endif
- /**
- * Set recovery request (called from vboot_api_kernel.c functions only)
- */
- static void VbSetRecoveryRequest(struct vb2_context *ctx,
- uint32_t recovery_request)
- {
- VB2_DEBUG("VbSetRecoveryRequest(%d)\n", (int)recovery_request);
- vb2_nv_set(ctx, VB2_NV_RECOVERY_REQUEST, recovery_request);
- }
- static void VbNvLoad(void)
- {
- VbExNvStorageRead(vnc.raw);
- VbNvSetup(&vnc);
- }
- static void VbNvCommit(void)
- {
- VbNvTeardown(&vnc);
- if (vnc.raw_changed)
- VbExNvStorageWrite(vnc.raw);
- }
- void vb2_nv_commit(struct vb2_context *ctx)
- {
- /* Copy nvdata back to old vboot1 nv context if needed */
- if (ctx->flags & VB2_CONTEXT_NVDATA_CHANGED) {
- memcpy(vnc.raw, ctx->nvdata, VB2_NVDATA_SIZE);
- vnc.raw_changed = 1;
- ctx->flags &= ~VB2_CONTEXT_NVDATA_CHANGED;
- }
- VbNvCommit();
- }
- uint32_t vb2_get_fwmp_flags(void)
- {
- return fwmp.flags;
- }
- /**
- * Attempt loading a kernel from the specified type(s) of disks.
- *
- * If successful, sets p->disk_handle to the disk for the kernel and returns
- * VBERROR_SUCCESS.
- *
- * @param ctx Vboot context
- * @param cparams Vboot common params
- * @param p Parameters for loading kernel
- * @param get_info_flags Flags to pass to VbExDiskGetInfo()
- * @return VBERROR_SUCCESS, VBERROR_NO_DISK_FOUND if no disks of the specified
- * type were found, or other non-zero VBERROR_ codes for other failures.
- */
- uint32_t VbTryLoadKernel(struct vb2_context *ctx, VbCommonParams *cparams,
- uint32_t get_info_flags)
- {
- VbError_t retval = VBERROR_UNKNOWN;
- VbDiskInfo* disk_info = NULL;
- uint32_t disk_count = 0;
- uint32_t i;
- VB2_DEBUG("VbTryLoadKernel() start, get_info_flags=0x%x\n",
- (unsigned)get_info_flags);
- lkp.fwmp = &fwmp;
- lkp.nv_context = &vnc;
- lkp.disk_handle = NULL;
- /* Find disks */
- if (VBERROR_SUCCESS != VbExDiskGetInfo(&disk_info, &disk_count,
- get_info_flags))
- disk_count = 0;
- VB2_DEBUG("VbTryLoadKernel() found %d disks\n", (int)disk_count);
- if (0 == disk_count) {
- VbSetRecoveryRequest(ctx, VBNV_RECOVERY_RW_NO_DISK);
- return VBERROR_NO_DISK_FOUND;
- }
- /* Loop over disks */
- for (i = 0; i < disk_count; i++) {
- VB2_DEBUG("VbTryLoadKernel() trying disk %d\n", (int)i);
- /*
- * Sanity-check what we can. FWIW, VbTryLoadKernel() is always
- * called with only a single bit set in get_info_flags.
- *
- * Ensure 512-byte sectors and non-trivially sized disk (for
- * cgptlib) and that we got a partition with only the flags we
- * asked for.
- */
- if (512 != disk_info[i].bytes_per_lba ||
- 16 > disk_info[i].lba_count ||
- get_info_flags != (disk_info[i].flags &
- ~VB_DISK_FLAG_EXTERNAL_GPT)) {
- VB2_DEBUG(" skipping: bytes_per_lba=%" PRIu64
- " lba_count=%" PRIu64 " flags=0x%x\n",
- disk_info[i].bytes_per_lba,
- disk_info[i].lba_count,
- disk_info[i].flags);
- continue;
- }
- lkp.disk_handle = disk_info[i].handle;
- lkp.bytes_per_lba = disk_info[i].bytes_per_lba;
- lkp.gpt_lba_count = disk_info[i].lba_count;
- lkp.streaming_lba_count = disk_info[i].streaming_lba_count
- ?: lkp.gpt_lba_count;
- lkp.boot_flags |= disk_info[i].flags & VB_DISK_FLAG_EXTERNAL_GPT
- ? BOOT_FLAG_EXTERNAL_GPT : 0;
- retval = LoadKernel(ctx, &lkp, cparams);
- VB2_DEBUG("VbTryLoadKernel() LoadKernel() = %d\n", retval);
- /*
- * Stop now if we found a kernel.
- *
- * TODO: If recovery requested, should track the farthest we
- * get, instead of just returning the value from the last disk
- * attempted.
- */
- if (VBERROR_SUCCESS == retval)
- break;
- }
- /* If we didn't find any good kernels, don't return a disk handle. */
- if (VBERROR_SUCCESS != retval) {
- VbSetRecoveryRequest(ctx, VBNV_RECOVERY_RW_NO_KERNEL);
- lkp.disk_handle = NULL;
- }
- VbExDiskFreeInfo(disk_info, lkp.disk_handle);
- /*
- * Pass through return code. Recovery reason (if any) has already been
- * set by LoadKernel().
- */
- return retval;
- }
- VbError_t VbBootNormal(struct vb2_context *ctx, VbCommonParams *cparams)
- {
- VbSharedDataHeader *shared =
- (VbSharedDataHeader *)cparams->shared_data_blob;
- /* Boot from fixed disk only */
- VB2_DEBUG("Entering\n");
- VbError_t rv = VbTryLoadKernel(ctx, cparams, VB_DISK_FLAG_FIXED);
- VB2_DEBUG("Checking if TPM kernel version needs advancing\n");
- if ((1 == shared->firmware_index) && (shared->flags & VBSD_FWB_TRIED)) {
- /*
- * Special cases for when we're trying a new firmware B. These
- * are needed because firmware updates also usually change the
- * kernel key, which means that the B firmware can only boot a
- * new kernel, and the old firmware in A can only boot the
- * previous kernel.
- *
- * Don't advance the TPM if we're trying a new firmware B,
- * because we don't yet know if the new kernel will
- * successfully boot. We still want to be able to fall back to
- * the previous firmware+kernel if the new firmware+kernel
- * fails.
- *
- * If we found only invalid kernels, reboot and try again.
- * This allows us to fall back to the previous firmware+kernel
- * instead of giving up and going to recovery mode right away.
- * We'll still go to recovery mode if we run out of tries and
- * the old firmware can't find a kernel it likes.
- */
- if (rv == VBERROR_INVALID_KERNEL_FOUND) {
- VB2_DEBUG("Trying FW B; only found invalid kernels.\n");
- VbSetRecoveryRequest(ctx, VBNV_RECOVERY_NOT_REQUESTED);
- }
- return rv;
- }
- if ((shared->kernel_version_tpm > shared->kernel_version_tpm_start) &&
- RollbackKernelWrite(shared->kernel_version_tpm)) {
- VB2_DEBUG("Error writing kernel versions to TPM.\n");
- VbSetRecoveryRequest(ctx, VBNV_RECOVERY_RW_TPM_W_ERROR);
- return VBERROR_TPM_WRITE_KERNEL;
- }
- return rv;
- }
- /* This function is also used by tests */
- void VbApiKernelFree(VbCommonParams *cparams)
- {
- /* VbSelectAndLoadKernel() always allocates this, tests don't */
- if (cparams->gbb) {
- free(cparams->gbb);
- cparams->gbb = NULL;
- }
- if (cparams->bmp) {
- free(cparams->bmp);
- cparams->bmp = NULL;
- }
- }
- static VbError_t vb2_kernel_setup(VbCommonParams *cparams,
- VbSelectAndLoadKernelParams *kparams)
- {
- VbSharedDataHeader *shared =
- (VbSharedDataHeader *)cparams->shared_data_blob;
- /* Start timer */
- shared->timer_vb_select_and_load_kernel_enter = VbExGetTimer();
- /*
- * Set up vboot context.
- *
- * TODO: Propagate this up to higher API levels, and use more of the
- * context fields (e.g. secdatak) and flags.
- */
- memset(&ctx, 0, sizeof(ctx));
- VbNvLoad();
- memcpy(ctx.nvdata, vnc.raw, VB2_NVDATA_SIZE);
- if (shared->recovery_reason)
- ctx.flags |= VB2_CONTEXT_RECOVERY_MODE;
- if (shared->flags & VBSD_BOOT_DEV_SWITCH_ON)
- ctx.flags |= VB2_CONTEXT_DEVELOPER_MODE;
- ctx.workbuf_size = VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE +
- VB2_WORKBUF_ALIGN;
- unaligned_workbuf = ctx.workbuf = malloc(ctx.workbuf_size);
- if (!unaligned_workbuf) {
- VB2_DEBUG("Can't allocate work buffer\n");
- VbSetRecoveryRequest(&ctx, VB2_RECOVERY_RW_SHARED_DATA);
- return VBERROR_INIT_SHARED_DATA;
- }
- if (VB2_SUCCESS != vb2_align(&ctx.workbuf, &ctx.workbuf_size,
- VB2_WORKBUF_ALIGN,
- VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE)) {
- VB2_DEBUG("Can't align work buffer\n");
- VbSetRecoveryRequest(&ctx, VB2_RECOVERY_RW_SHARED_DATA);
- return VBERROR_INIT_SHARED_DATA;
- }
- if (VB2_SUCCESS != vb2_init_context(&ctx)) {
- VB2_DEBUG("Can't init vb2_context\n");
- free(unaligned_workbuf);
- VbSetRecoveryRequest(&ctx, VB2_RECOVERY_RW_SHARED_DATA);
- return VBERROR_INIT_SHARED_DATA;
- }
- struct vb2_shared_data *sd = vb2_get_sd(&ctx);
- sd->recovery_reason = shared->recovery_reason;
- /*
- * If we're in recovery mode just to do memory retraining, all we
- * need to do is reboot.
- */
- if (shared->recovery_reason == VBNV_RECOVERY_TRAIN_AND_REBOOT) {
- VB2_DEBUG("Reboot after retraining in recovery.\n");
- return VBERROR_REBOOT_REQUIRED;
- }
- /* Fill in params for calls to LoadKernel() */
- memset(&lkp, 0, sizeof(lkp));
- lkp.kernel_buffer = kparams->kernel_buffer;
- lkp.kernel_buffer_size = kparams->kernel_buffer_size;
- /* Clear output params in case we fail */
- kparams->disk_handle = NULL;
- kparams->partition_number = 0;
- kparams->bootloader_address = 0;
- kparams->bootloader_size = 0;
- kparams->flags = 0;
- memset(kparams->partition_guid, 0, sizeof(kparams->partition_guid));
- /* Read GBB header, since we'll needs flags from it */
- cparams->bmp = NULL;
- cparams->gbb = malloc(sizeof(*cparams->gbb));
- uint32_t retval = VbGbbReadHeader_static(cparams, cparams->gbb);
- if (retval)
- return retval;
- /* Read kernel version from the TPM. Ignore errors in recovery mode. */
- if (RollbackKernelRead(&shared->kernel_version_tpm)) {
- VB2_DEBUG("Unable to get kernel versions from TPM\n");
- if (!shared->recovery_reason) {
- VbSetRecoveryRequest(&ctx,
- VBNV_RECOVERY_RW_TPM_R_ERROR);
- return VBERROR_TPM_READ_KERNEL;
- }
- }
- shared->kernel_version_tpm_start = shared->kernel_version_tpm;
- /* Read FWMP. Ignore errors in recovery mode. */
- if (cparams->gbb->flags & GBB_FLAG_DISABLE_FWMP) {
- memset(&fwmp, 0, sizeof(fwmp));
- } else if (RollbackFwmpRead(&fwmp)) {
- VB2_DEBUG("Unable to get FWMP from TPM\n");
- if (!shared->recovery_reason) {
- VbSetRecoveryRequest(&ctx,
- VBNV_RECOVERY_RW_TPM_R_ERROR);
- return VBERROR_TPM_READ_FWMP;
- }
- }
- return VBERROR_SUCCESS;
- }
- static VbError_t vb2_kernel_phase4(VbCommonParams *cparams,
- VbSelectAndLoadKernelParams *kparams)
- {
- VbSharedDataHeader *shared =
- (VbSharedDataHeader *)cparams->shared_data_blob;
- /* Save disk parameters */
- kparams->disk_handle = lkp.disk_handle;
- kparams->partition_number = lkp.partition_number;
- kparams->bootloader_address = lkp.bootloader_address;
- kparams->bootloader_size = lkp.bootloader_size;
- kparams->flags = lkp.flags;
- kparams->kernel_buffer = lkp.kernel_buffer;
- kparams->kernel_buffer_size = lkp.kernel_buffer_size;
- memcpy(kparams->partition_guid, lkp.partition_guid,
- sizeof(kparams->partition_guid));
- /* Lock the kernel versions if not in recovery mode */
- if (!shared->recovery_reason &&
- RollbackKernelLock(shared->recovery_reason)) {
- VB2_DEBUG("Error locking kernel versions.\n");
- VbSetRecoveryRequest(&ctx, VBNV_RECOVERY_RW_TPM_L_ERROR);
- return VBERROR_TPM_LOCK_KERNEL;
- }
- return VBERROR_SUCCESS;
- }
- static void vb2_kernel_cleanup(struct vb2_context *ctx, VbCommonParams *cparams)
- {
- VbSharedDataHeader *shared =
- (VbSharedDataHeader *)cparams->shared_data_blob;
- /*
- * Clean up vboot context.
- *
- * TODO: This should propagate up to higher levels
- */
- /* Free buffers */
- free(unaligned_workbuf);
- VbApiKernelFree(cparams);
- vb2_nv_commit(ctx);
- /* Stop timer */
- shared->timer_vb_select_and_load_kernel_exit = VbExGetTimer();
- }
- VbError_t VbSelectAndLoadKernel(VbCommonParams *cparams,
- VbSelectAndLoadKernelParams *kparams)
- {
- VbSharedDataHeader *shared =
- (VbSharedDataHeader *)cparams->shared_data_blob;
- VbError_t retval = vb2_kernel_setup(cparams, kparams);
- if (retval)
- goto VbSelectAndLoadKernel_exit;
- /*
- * Do EC software sync if necessary. This has UI, but it's just a
- * single non-interactive WAIT screen.
- */
- retval = ec_sync_all(&ctx, cparams);
- if (retval)
- goto VbSelectAndLoadKernel_exit;
- /* Select boot path */
- if (shared->recovery_reason) {
- /* Recovery boot. This has UI. */
- if (kparams->inflags & VB_SALK_INFLAGS_ENABLE_DETACHABLE_UI)
- retval = VbBootRecoveryMenu(&ctx, cparams);
- else
- retval = VbBootRecovery(&ctx, cparams);
- VbExEcEnteringMode(0, VB_EC_RECOVERY);
- } else if (shared->flags & VBSD_BOOT_DEV_SWITCH_ON) {
- /* Developer boot. This has UI. */
- if (kparams->inflags & VB_SALK_INFLAGS_ENABLE_DETACHABLE_UI)
- retval = VbBootDeveloperMenu(&ctx, cparams);
- else
- retval = VbBootDeveloper(&ctx, cparams);
- VbExEcEnteringMode(0, VB_EC_DEVELOPER);
- } else {
- /* Normal boot */
- retval = VbBootNormal(&ctx, cparams);
- VbExEcEnteringMode(0, VB_EC_NORMAL);
- }
- VbSelectAndLoadKernel_exit:
- if (VBERROR_SUCCESS == retval)
- retval = vb2_kernel_phase4(cparams, kparams);
- vb2_kernel_cleanup(&ctx, cparams);
- /* Pass through return value from boot path */
- VB2_DEBUG("Returning %d\n", (int)retval);
- return retval;
- }
- VbError_t VbVerifyMemoryBootImage(VbCommonParams *cparams,
- VbSelectAndLoadKernelParams *kparams,
- void *boot_image,
- size_t image_size)
- {
- VbError_t retval;
- VbPublicKey* kernel_subkey = NULL;
- uint8_t *kbuf;
- VbKeyBlockHeader *key_block;
- VbSharedDataHeader *shared =
- (VbSharedDataHeader *)cparams->shared_data_blob;
- VbKernelPreambleHeader *preamble;
- uint64_t body_offset;
- int hash_only = 0;
- int dev_switch;
- uint32_t allow_fastboot_full_cap = 0;
- uint8_t *workbuf = NULL;
- struct vb2_workbuf wb;
- if ((boot_image == NULL) || (image_size == 0))
- return VBERROR_INVALID_PARAMETER;
- /* Clear output params in case we fail. */
- kparams->disk_handle = NULL;
- kparams->partition_number = 0;
- kparams->bootloader_address = 0;
- kparams->bootloader_size = 0;
- kparams->flags = 0;
- memset(kparams->partition_guid, 0, sizeof(kparams->partition_guid));
- kbuf = boot_image;
- /* Read GBB Header */
- cparams->bmp = NULL;
- cparams->gbb = malloc(sizeof(*cparams->gbb));
- retval = VbGbbReadHeader_static(cparams, cparams->gbb);
- if (VBERROR_SUCCESS != retval) {
- VB2_DEBUG("Gbb read header failed.\n");
- return retval;
- }
- /*
- * We don't care verifying the image if:
- * 1. dev-mode switch is on and
- * 2a. GBB_FLAG_FORCE_DEV_BOOT_FASTBOOT_FULL_CAP is set, or
- * 2b. DEV_BOOT_FASTBOOT_FULL_CAP flag is set in NvStorage
- *
- * Check only the integrity of the image.
- */
- dev_switch = shared->flags & VBSD_BOOT_DEV_SWITCH_ON;
- VbNvLoad();
- VbNvGet(&vnc, VB2_NV_DEV_BOOT_FASTBOOT_FULL_CAP,
- &allow_fastboot_full_cap);
- if (0 == allow_fastboot_full_cap) {
- allow_fastboot_full_cap = !!(cparams->gbb->flags &
- GBB_FLAG_FORCE_DEV_BOOT_FASTBOOT_FULL_CAP);
- }
- if (dev_switch && allow_fastboot_full_cap) {
- VB2_DEBUG("Only performing integrity-check.\n");
- hash_only = 1;
- } else {
- /* Get recovery key. */
- retval = VbGbbReadRecoveryKey(cparams, &kernel_subkey);
- if (VBERROR_SUCCESS != retval) {
- VB2_DEBUG("Gbb Read Recovery key failed.\n");
- return retval;
- }
- }
- /* If we fail at any step, retval returned would be invalid kernel. */
- retval = VBERROR_INVALID_KERNEL_FOUND;
- /* Allocate work buffer */
- workbuf = (uint8_t *)malloc(VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE);
- if (!workbuf)
- goto fail;
- vb2_workbuf_init(&wb, workbuf, VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE);
- /* Verify the key block. */
- key_block = (VbKeyBlockHeader *)kbuf;
- struct vb2_keyblock *keyblock2 = (struct vb2_keyblock *)kbuf;
- int rv;
- if (hash_only) {
- rv = vb2_verify_keyblock_hash(keyblock2, image_size, &wb);
- } else {
- /* Unpack kernel subkey */
- struct vb2_public_key kernel_subkey2;
- if (VB2_SUCCESS !=
- vb2_unpack_key(&kernel_subkey2,
- (struct vb2_packed_key *)kernel_subkey)) {
- VB2_DEBUG("Unable to unpack kernel subkey\n");
- goto fail;
- }
- rv = vb2_verify_keyblock(keyblock2, image_size,
- &kernel_subkey2, &wb);
- }
- if (VB2_SUCCESS != rv) {
- VB2_DEBUG("Verifying key block signature/hash failed.\n");
- goto fail;
- }
- /* Check the key block flags against the current boot mode. */
- if (!(key_block->key_block_flags &
- (dev_switch ? KEY_BLOCK_FLAG_DEVELOPER_1 :
- KEY_BLOCK_FLAG_DEVELOPER_0))) {
- VB2_DEBUG("Key block developer flag mismatch.\n");
- if (hash_only == 0)
- goto fail;
- }
- if (!(key_block->key_block_flags & KEY_BLOCK_FLAG_RECOVERY_1)) {
- VB2_DEBUG("Key block recovery flag mismatch.\n");
- if (hash_only == 0)
- goto fail;
- }
- /* Get key for preamble/data verification from the key block. */
- struct vb2_public_key data_key2;
- if (VB2_SUCCESS != vb2_unpack_key(&data_key2, &keyblock2->data_key)) {
- VB2_DEBUG("Unable to unpack kernel data key\n");
- goto fail;
- }
- /* Verify the preamble, which follows the key block */
- preamble = (VbKernelPreambleHeader *)(kbuf + key_block->key_block_size);
- struct vb2_kernel_preamble *preamble2 =
- (struct vb2_kernel_preamble *)
- (kbuf + key_block->key_block_size);
- if (VB2_SUCCESS != vb2_verify_kernel_preamble(
- preamble2,
- image_size - key_block->key_block_size,
- &data_key2,
- &wb)) {
- VB2_DEBUG("Preamble verification failed.\n");
- goto fail;
- }
- VB2_DEBUG("Kernel preamble is good.\n");
- /* Verify kernel data */
- body_offset = key_block->key_block_size + preamble->preamble_size;
- if (VB2_SUCCESS != vb2_verify_data(
- (const uint8_t *)(kbuf + body_offset),
- image_size - body_offset,
- (struct vb2_signature *)&preamble->body_signature,
- &data_key2, &wb)) {
- VB2_DEBUG("Kernel data verification failed.\n");
- goto fail;
- }
- VB2_DEBUG("Kernel is good.\n");
- /* Fill in output parameters. */
- kparams->kernel_buffer = kbuf + body_offset;
- kparams->kernel_buffer_size = image_size - body_offset;
- kparams->bootloader_address = preamble->bootloader_address;
- kparams->bootloader_size = preamble->bootloader_size;
- if (VbKernelHasFlags(preamble) == VBOOT_SUCCESS)
- kparams->flags = preamble->flags;
- retval = VBERROR_SUCCESS;
- fail:
- VbApiKernelFree(cparams);
- if (NULL != kernel_subkey)
- free(kernel_subkey);
- if (NULL != workbuf)
- free(workbuf);
- return retval;
- }
- VbError_t VbUnlockDevice(void)
- {
- VB2_DEBUG("Enabling dev-mode...\n");
- if (TPM_SUCCESS != SetVirtualDevMode(1))
- return VBERROR_TPM_SET_BOOT_MODE_STATE;
- VB2_DEBUG("Mode change will take effect on next reboot.\n");
- return VBERROR_SUCCESS;
- }
- VbError_t VbLockDevice(void)
- {
- VbNvLoad();
- VB2_DEBUG("Storing request to leave dev-mode.\n");
- VbNvSet(&vnc, VBNV_DISABLE_DEV_REQUEST, 1);
- VbNvCommit();
- VB2_DEBUG("Mode change will take effect on next reboot.\n");
- return VBERROR_SUCCESS;
- }
|