[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-24 Thread Aaron Durbin via coreboot
On Thu, Jan 24, 2019 at 6:24 PM Julius Werner wrote: > > What does that practically look like? Every time we have to re-walk we > have to reverify the integrity of the metadata. > > I mean, that is exactly what we're doing right now anyway (unless > something significantly changed in CBFS code

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-24 Thread Julius Werner
> What does that practically look like? Every time we have to re-walk we have > to reverify the integrity of the metadata. I mean, that is exactly what we're doing right now anyway (unless something significantly changed in CBFS code since the last time I checked). For every single CBFS file

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-24 Thread Aaron Durbin via coreboot
; > -Ursprüngliche Nachricht- > > Von: Julius Werner [mailto:jwer...@chromium.org] > > Gesendet: Donnerstag, 24. Januar 2019 00:01 > > An: Aaron Durbin > > Cc: Julius Werner; Arthur Heymans; Coreboot > > Betreff: [coreboot] Re: Fallback mechanisms on x86 with >

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-24 Thread Aaron Durbin via coreboot
On Wed, Jan 23, 2019 at 4:00 PM Julius Werner wrote: > > For 1, this is attempting to protect physical attack. Obviously this > particular problem can't be solved in isolation, but it's something to > think about. > > But isn't this something that per-file hashing would probably make > easier to

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-23 Thread Zeh, Werner
4. Januar 2019 00:01 > An: Aaron Durbin > Cc: Julius Werner; Arthur Heymans; Coreboot > Betreff: [coreboot] Re: Fallback mechanisms on x86 with > C_ENVIRONMENT_BOOTBLOCK > > > For 1, this is attempting to protect physical attack. Obviously this > > particular problem ca

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-23 Thread Julius Werner
> For 1, this is attempting to protect physical attack. Obviously this > particular problem can't be solved in isolation, but it's something to think > about. But isn't this something that per-file hashing would probably make easier to protect against, not harder? I mean, right now we just hash

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-23 Thread Aaron Durbin via coreboot
On Tue, Jan 22, 2019 at 6:21 PM Julius Werner wrote: > > FWIW, it's my opinion I think we'll need to start splitting cbfs into > smaller ones. This isn't specific to this situation, but splitting slots > into multiple cbfses (rw-a-1, rw-a-2, etc) allows one to chain/group > resources as they

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-22 Thread Julius Werner
> There's a trycount that I think defaults to 10. After 10 failing tries it > should switch slots. There's also a 'set good firmware' notion which signals > to the firmware one was able to boot. This is picked up on the next reboot > and the information is passed through vboot non volatile

[coreboot] Re: Fallback mechanisms on x86 with C_ENVIRONMENT_BOOTBLOCK

2019-01-22 Thread Aaron Durbin via coreboot
On Tue, Jan 22, 2019 at 6:45 AM Arthur Heymans wrote: > Hi > > As more and more x86 platforms are moving to C_ENVIRONMENT_BOOTBLOCK > and therefore don't use a romcc compiled bootblock anymore a certain > question arises. With the romcc bootblock there was a normal/fallback > mechanism. > > It