summaryrefslogtreecommitdiff
path: root/common/vboot.c
blob: 8f20054dccc1eb7618268a063122541848e746b7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
/* Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
 * Use of this source code is governed by a BSD-style license that can be
 * found in the LICENSE file.
 */

/* Verified boot module for Chrome EC */

#include "console.h"
#include "gpio.h"
#include "keyboard_scan.h"
#include "system.h"
#include "util.h"
#include "vboot.h"

/* Console output macros */
#define CPUTS(outstr) cputs(CC_VBOOT, outstr)
#define CPRINTF(format, args...) cprintf(CC_VBOOT, format, ## args)


/* Might I want to jump to one of the RW images? */
static int maybe_jump_to_other_image(void)
{
	/* Not all boards even have RW EC firmware. I think it's just Link at
	 * the moment. */
#ifndef BOARD_link
	/* TODO: (crosbug.com/p/8561) once daisy can warm-boot to another
	 * image, enable it here too. */
	CPUTS("[Vboot staying in RO because that's all there is]\n");
	return 0;
#endif

	/* We'll only jump to another image if we're currently in RO */
	if (system_get_image_copy() != SYSTEM_IMAGE_RO)
		return 0;

#ifdef CONFIG_TASK_KEYSCAN
	/* Don't jump if recovery requested */
	if (keyboard_scan_recovery_pressed()) {
		CPUTS("[Vboot staying in RO because recovery key pressed]\n");
		return 0;
	}
#endif

	/* Don't jump if we're in RO becuase we jumped there (this keeps us
	 * from jumping to RO only to jump right back). */
	if (system_jumped_to_this_image())
		return 0;

#if !defined(BOARD_daisy)
	/* TODO: (crosbug.com/p/8572) Daisy doesn't define a GPIO
	 * for the recovery signal from servo, so can't check it. */
	if (gpio_get_level(GPIO_RECOVERYn) == 0) {
		CPUTS("[Vboot staying in RO due to recovery signal]\n");
		return 0;
	}
#endif

	/* Okay, we might want to jump to a RW image. */
	return 1;
}

/*****************************************************************************/
/* Initialization */

int vboot_pre_init(void)
{
	/* FIXME(wfrichar): crosbug.com/p/7453: should protect flash */
	return EC_SUCCESS;
}


int vboot_init(void)
{
	/* nothing to do, so do nothing */
	if (!maybe_jump_to_other_image())
		return EC_SUCCESS;

	/* FIXME(wfrichar): placeholder for full verified boot implementation.
	 * TBD exactly how, but we may want to continue in RO firmware, jump
	 * directly to one of the RW firmwares, etc. */
	CPRINTF("[ROOT_KEY is at 0x%x, size 0x%x]\n",
		CONFIG_VBOOT_ROOTKEY_OFF, CONFIG_VBOOT_ROOTKEY_SIZE);
	CPRINTF("[FW_MAIN_A is at 0x%x, size 0x%x]\n",
		CONFIG_FW_A_OFF, CONFIG_FW_A_SIZE);
	CPRINTF("[VBLOCK_A is at 0x%x, size 0x%x]\n",
		CONFIG_VBLOCK_A_OFF, CONFIG_VBLOCK_A_SIZE);
	CPRINTF("[FW_MAIN_B is at 0x%x, size 0x%x]\n",
		CONFIG_FW_B_OFF, CONFIG_FW_B_SIZE);
	CPRINTF("[VBLOCK_B is at 0x%x, size 0x%x]\n",
		CONFIG_VBLOCK_B_OFF, CONFIG_VBLOCK_B_SIZE);

	system_run_image_copy(SYSTEM_IMAGE_RW_A, 0);
	return EC_SUCCESS;
}