[coreboot-gerrit] Change in coreboot[master]: [WIP]mb/opencellular/elgon: Enable write protection

Patrick Rudolph (Code Review) gerrit at coreboot.org
Wed Nov 7 15:26:10 CET 2018


Patrick Rudolph has uploaded this change for review. ( https://review.coreboot.org/29532


Change subject: [WIP]mb/opencellular/elgon: Enable write protection
......................................................................

[WIP]mb/opencellular/elgon: Enable write protection

* Verify the flash write protection on each boot
* Program non-volatile write protection on first boot

Change-Id: I6a940c69ecb1dfd9704b2101c263570bebc5540e
Signed-off-by: Patrick Rudolph <patrick.rudolph at 9elements.com>
---
M src/mainboard/opencellular/elgon/bootblock.c
1 file changed, 44 insertions(+), 1 deletion(-)



  git pull ssh://review.coreboot.org:29418/coreboot refs/changes/32/29532/1

diff --git a/src/mainboard/opencellular/elgon/bootblock.c b/src/mainboard/opencellular/elgon/bootblock.c
index e6109f1..9dfd1b8 100644
--- a/src/mainboard/opencellular/elgon/bootblock.c
+++ b/src/mainboard/opencellular/elgon/bootblock.c
@@ -18,6 +18,9 @@
 #include <soc/spi.h>
 #include <soc/uart.h>
 #include <soc/gpio.h>
+#include <spi_flash.h>
+#include <console/console.h>
+#include <fmap.h>
 #include "mainboard.h"
 
 void bootblock_mainboard_early_init(void)
@@ -49,8 +52,48 @@
 	gpio_output(ELGON_GPIO_SPI_MUX, 1);
 }
 
+/**
+ * Handle flash write protection.
+ * This code verifies the write-protection on each boot.
+ * Enabling the write protection does only run on the first boot.
+ * An error is fatal as it breaks the Chain Of Trust.
+ */
+static void protect_ro_rgn_spi_flash(void)
+{
+	const struct spi_flash *flash = boot_device_spi_flash();
+	const char *fmapname = "WP_RO";
+	struct region ro_rgn;
+
+	if (fmap_locate_area(fmapname, &ro_rgn)) {
+		printk(BIOS_ERR, "%s: No %s FMAP section.\n", __func__,
+			fmapname);
+		die("Can't verify flash protections!");
+	}
+
+	u8 reg8 = 0;
+	spi_flash_status(flash, &reg8);
+
+	/* Check if SRP0 is set and RO region is protected */
+	if (!(reg8 & 0x80) ||
+	    spi_flash_is_write_protected(flash, &ro_rgn) != 1) {
+		printk(BIOS_WARNING, "%s: FMAP section %s is not write-protected\n",
+			 __func__, fmapname);
+
+		/*
+		* Need to protect flash region :
+		* WP_RO read only and use /WP pin
+		* non-volatile programming
+		*/
+		if (spi_flash_set_write_protected(flash, &ro_rgn, 1,
+		    SPI_WRITE_PROTECTION_PIN) != 0)
+			die("Failed to write-protect WP_RO region!");
+	}
+	printk(BIOS_INFO, "%s: FMAP section %s is write-protected\n",
+	       __func__, fmapname);
+}
+
 void bootblock_mainboard_init(void)
 {
 	configure_spi_flash();
-	// FIXME: Check SPI flash WP bits
+	protect_ro_rgn_spi_flash();
 }

-- 
To view, visit https://review.coreboot.org/29532
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings

Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-MessageType: newchange
Gerrit-Change-Id: I6a940c69ecb1dfd9704b2101c263570bebc5540e
Gerrit-Change-Number: 29532
Gerrit-PatchSet: 1
Gerrit-Owner: Patrick Rudolph <patrick.rudolph at 9elements.com>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.coreboot.org/pipermail/coreboot-gerrit/attachments/20181107/d62d1173/attachment.html>


More information about the coreboot-gerrit mailing list